paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1811.06355 | 1 | 1811 | 2018-11-15T14:06:50 | Cost of selfishness in the allocation of cities in the Multiple Travelling Salesmen Problem | [
"cs.MA"
] | The decision to centralise or decentralise human organisations requires quantified evidence but little is available in the literature. We provide such data in a variant of the Multiple Travelling Salesmen Problem (MTSP) in which we study how the allocation sub-problem may be decentralised among selfish selfmen. Our contributions are (i) this modification of the MTSP in order to include selfishness, (ii) the proposition of organisations to solve this modified MTSP, and (iii) the comparison of these organisations. Our 5 organisations may be summarised as follows: (i) OptDecentr is a pure Centralised Organisation (CO) in which a Central Authority (CA) finds the best solution which could be found by a Decentralised Organisation (DO), (ii) Cluster and (iii) Auction are CO/DO hybrids, and (iv) P2P and (v) CNP are pure DO. Sixth and seventh organisations are used as benchmarks: (vi) NoRealloc is a pure DO which ignores the allocation problem, and (vii) FullCentr is a pure CO which solves a different problem, viz., the traditional MTSP. Comparing the efficiency of pairs of these mechanisms quantify the price of decentralising an organisation. In particular, our model of selfishness in OptDecentr makes the total route length 30% (respectively, 60%) longer with 5 (respectively, 9) salesmen than the traditional MTSP in FullCentr when the computation time is limited to 30 minutes. With this time limit, our results also seem to indicate that the level of coercion of the CA impacts more the total route length than the level of centralisation. | cs.MA | cs |
Cost of selfishness in the allocation of cities in the
Multiple Travelling Salesmen Problem
Thierry Moyaux1 & Eric Marcon2
1. Univ Lyon, INSA-Lyon, DISP, EA 4570, F-69621, France.
Corresponding author.
2. Univ Lyon, INSA-Lyon, UJM-Saint Etienne, DISP, EA 4570, F-69621, France.
November 16, 2018
Abstract
The decision to centralise or decentralise human organisations re-
quires quantified evidence but little is available in the literature. We
provide such data in a variant of the Multiple Travelling Salesmen
Problem (MTSP) in which we study how the allocation sub-problem
may be decentralised among selfish selfmen. Our contributions are
(i) this modification of the MTSP in order to include selfishness, (ii)
the proposition of organisations to solve this modified MTSP, and (iii)
the comparison of these organisations. Our 5 organisations may be
summarised as follows: (i) OptDecentr is a pure Centralised Organisa-
tion (CO) in which a Central Authority (CA) finds the best solution which
could be found by a Decentralised Organisation (DO), (ii) Cluster and
(iii) Auction are CO/DO hybrids, and (iv) P2P and (v) CNP are pure DO.
Sixth and seventh organisations are used as benchmarks: (vi) NoRealloc
is a pure DO which ignores the allocation problem, and (vii) FullCentr is
a pure CO which solves a different problem, viz., the traditional MTSP.
Comparing the efficiency of pairs of these mechanisms quantify the price
of decentralising an organisation. In particular, our model of selfishness in
OptDecentr makes the total route length 30% (respectively, 60%) longer
with 5 (respectively, 9) salesmen than the traditional MTSP in FullCentr
when the computation time is limited to 30 minutes. With this time limit,
our results also seem to indicate that the level of coercion of the CA
impacts more the total route length than the level of centralisation.
Keywords. Centralised Organisation (CO); Decentralised Organisation
(DO); Selfishness; Multiple Travelling Salesmen Problem (MTSP).
1
Introduction
Everybody has an opinion about the centralisation of decision. We believe
that this opinion depends too much on intuition rather than quantified
evidence. In addition, several criteria exist to compare organisations. For
1
instance, Centralised Organisation (CO) is often said to find the opti-
mum solution (or, at least, the best possible solution), while Decentralised
Organisation (DO) is more reactive. Two incomparable metrics are op-
posed here, namely, quality of the solution found and computation speed.
Like comparisons of capitalism and socialism (Ellman, 1989), numerical
comparisons of CO and DO rely on comparisons of specific organisations
instantiating these levels of centralisation.
In other words, it is difficult
to provide numerical evidence of the efficiency of CO and DO in gen-
eral, hence particular mechanisms of these approaches are compared.
In
this article, we call "mechanism" an instance of an "organisation", and
an "organisation" is an instance of an "approach". The possible "ap-
proaches" are pure CO and DO, and CO/DO hybrids. Let us illustrate
these three terms: The CO/DO hybrid approach can be instantiated as
an "organisation" with one or several (coercive) dispatchers, and/or (non-
coercive) mediators such as an auctioneer, or peer-to-peer negotiation,
etc. Next, the "organisation" with an auctioneer can be instantiated as
a "mechanism" as either an English (multiple-shot first-price) or Vickrey
(single-shot second-price) auction.
We think that the choice of a more or less centralised organisation is
a question too often addressed by political discussions as a consequence
of the lack of numerical evidence. This research question is important be-
cause the efficiency of organisations may be greatly improved by selecting
the appropriate decision organisation.
In fact, defenders of CO (respec-
tively, DO) spends much effort in developing their mechanism, while they
may obtain much better performances by introducing some features of
DO (respectively, CO) -- "If your only tool is a hammer then every prob-
lem looks like a nail", as the saying goes. Such a choice between various
organisations requires numerical data about these organisations, such as
the aforementioned quality of the solution and computation time. With
such data, an organisation could be designed depending on its constraints;
for instance, choosing the number of hierarchical levels and the appropri-
ate organisation on each level depending on the time available to make
a decision.
In particular, we believe that our work will shed light on the
organisation of the Physical Internet (Sarraj et al., 2014) since this project
aims at connecting CO logistics networks in a DO way.
The literature provides little quantified comparisons of CO and DO, as
noted in a review co-written by one of us (Moyaux and McBurney, 2012).
In addition to the papers referenced in this review, we now outline others
which compare CO and DO in applications to logistics. In this area, the
scarcity of quantified comparisons has also been noted (Mes et al., 2007,
p. 60). Similarly, Davidsson et al. (2005) regret the few quantitative com-
parisons of DO approaches with CO. One of the earliest such comparisons
in logistics is a work by Fisher et al. (1995, 1996) who propose an ex-
tension of Smith (1980)'s Contract Net Protocol (CNP) in which task
decomposition is decentralised in order to solve a static Vehicle Routing
Problem with Time Windows. Their experiment shows that their protocol
finds a total route length between 3% and 74% worse than the optimal
and is thus comparable to heuristics from Operations Research. Then,
they propose an improvement which reduces these figures by about 12%.
2
Since routing problems are NP-hard, the optimal route is often unknown
and some studies compare the results of DO with those of approximate
CO heuristics. In this context, Mes et al. (2007) report that their Vickrey
auction (DO) performs as good as or even better than centralised heuris-
tics to solve a dynamic Pickup and Delivery Problem with Time Windows
(PDPTW). For the same problem, M´ahr et al. (2010) also compare a
Vickrey auction (DO) to the approximate solution found by CPLEX in
a few 30-second intervals (CO). Their experimentation shows that the
auction outperforms CPLEX when service time duration is highly uncer-
tain. Next, van Lon and Holvoet (2015) compare a cheapest insertion
heuristic (CO) with an implementation of Fisher et al. (1995)'s Contract
Net Protocol (DO). Their results seem to indicate that DO outperforms
CO. Glaschenko et al. (2009) have implemented a real-time multiagent
scheduler for a taxi company in London, UK. The benefit of their tool is
distributed between the drivers and the company, resulting in an increase
of driver wages by 9%. Karmani et al. (2007) use a market-based ap-
proach to solve a capacitated version with multiple depot of the MTSP.
Their experiment shows that their approach scales to thousands of cities
and hundreds of salesmen with a total route length quite close to the op-
timum. Later, Kivelevitch et al. (2013) were inspired by this approach to
propose a distributed meta-heuristic. The total length of the routes are
within 1% of the optimal in 90% of the tested cases. More precisely, the
median total length of the route is 1.7% higher than the optimum and
4.8% higher in the worst of the tested cases, but the median run time
is 8 times faster than CPLEX. Nevertheless, this approach uses agents
with no autonomy at all (e.g., an agent can take one or all cities from
another agent without permission), hence we think it is more related to
parallel algorithms (Talbi, 2006) than to the making of decisions in hu-
man organisations with selfish agents as we investigate. Quite similarly,
others solve logistic problems (e.g., Travelling Salesman Problem (TSP)
by Xie and Liu (2009) and Hanna and Cagan (2009)) with agents who,
again, lack the human characteristics of selfishness and cannot hence be
used to design organisations as well.
The goal of this article is to compare CO with DO by measuring the
efficiency of several mechanisms on various levels of centralisation to solve
a modified Multiple Travelling Salesmen Problem (MTSP) (MTSP is the
Vehicle Routing Problem without capacities) such that the selfishness of
the salesmen is taken into account. It is important to notice that our sales-
men are selfishness because we want to investigate human organisations.
This article has the following contributions:
1. Conceptual contributions: CO and DO are different by nature be-
cause, for example, the social welfare (i.e., utility function of the
group) in CO may have no trivial relationship with the individual
utility functions in DO. Game Theory proposes models and tools to
study CO and DO, e.g., the Prisoner's Dilemma shows that DO may
find a solution (i.e., Nash equilibrium) which is Pareto dominated by
the solution found by CO. Taking this game-theoretic background
into account, we modify the MTSP by adding features represent-
ing the selfishness of the salesmen such that our modified MTSP
3
can be solved in more or less centralised organisations. Selfishness
means that a salesman maximises his1 own utility in a selfish manner
without paying attention to the social welfare of the community of
salesmen.
Subsection 2.2 introduces our MTSP constrained by 1-1 exchanges.
More precisely, the salesmen "own" an initial endowment of cities,
and they use a mechanism to modify this initial allocation of cities
by exchanging one city against one city exclusively, which we refer
to as "1-1 exchanges". This corresponds to our modified MTSP.
Section 6 discusses other possibilities to obtain a pair of CO and
DO versions of a problem.
2. Technical contributions: As said in the above literature review, no
previous work compares more than two kinds of organisations to
solve a same location and routing problem. Our organisations for
the exchange of cities are inspired by the classes of coordination
proposed in (Frayret, 2002, p. 131) as an extension to Mintzberg
(1978). To be precise, this paper studies the following organisations
which have various numbers of hierarchical levels, coercion levels
and number of rounds of interactions, as summarised in Figure 1:
1. OptDecentr makes the Central Authority (CA) find both (i) the
best allocation of cities to salesmen with the constraint of 1-1
exchanges and (ii) for each salesman, the shortest path visiting
all the cities allocated to this salesman -- this is a CO mechanism
which looks for the best solution which may be found by the
following five DO mechanisms;
2. Cluster makes the CA allocate groups of neighbouring cities to
the salesmen with the constraint of 1-1 exchanges, then every
salesman locally solves a TSP with his allocated cities;
3. Auction is similar to Cluster except that the CA is less coercive
since she plays the role of an auctioneer;
4. CNP (Contract Net Protocol) has no CA and every salesman
plays the role of an auctioneer;
5. P2P also has no CA and relies on bilateral negotiations.
Finally, two additional organisations are used as benchmarks:
6. NoRealloc assumes no reallocations of the cities among the
salesmen who only solve a TSP on their initial endowment;
7. FullCentr is the same as OptDecentr without the constraint of
1-1 exchanges, that is FullCentr is the only mechanism that
solves the traditional MTSP.
Since our experimentation simulates more agents than the number
of cores of the CPU in our computers, we perform only sequential
simulations, then we infer what would have happened in real life
with computations carried out in parallel.
As said above, we call "mechanism" an instance of an "organisa-
tion". However, this article uses both terms interchangeably because
1We always use "him" for a salesman and "her" for the Central Authority (CA).
4
y
t
i
r
o
h
t
u
a
l
a
r
t
n
e
c
e
v
i
c
r
e
o
C
y
t
i
r
o
h
t
u
a
l
a
r
t
n
e
c
s
s
e
l
r
e
w
o
P
y
t
i
r
o
h
t
u
a
l
a
r
t
n
e
c
o
N
Coercion level
d
n
u
o
r
e
l
g
n
i
S
(
)
s
n
o
i
t
c
a
r
e
t
n
i
f
o
MTSP constrained by 1−1 exchanges
Traditional MTSP
Cluster
CA=clustering
OptDecentr
FullCentr
CA=MTSP solver
s
d
n
u
o
r
e
l
p
i
t
l
u
M
)
s
n
o
i
t
c
a
r
e
t
n
i
f
o
(
d
n
u
o
r
e
l
g
n
i
S
(
)
s
n
o
i
t
c
a
r
e
t
n
i
f
o
Auction
CA=auctioneer
P2P
1−1 interactions
1−1 interactions
CNP
1−n interactions
1−n interactions
1−n interactions
NoRealloc
Central authorithy (CA)
Allocation problem
Operator (i.e., salesman)
Routing problem
Centralisation
level
Exchange of messages
Figure 1: Overview of the seven organisations compared.
it deals with one mechanism per organisation only. In fact, each of
the above organisations may be instantiated in mechanisms different
from our descriptions in Section 3, as shall be discussed in Section 6.
Finally, our mechanisms instantiating the above first five organi-
sations are new, since they solve the MTSP constrained by 1-1 ex-
changes which we have never seen in the literature. On the contrary,
benchmarks NoRealloc and FullCentr are not new as they solve a
classic Mixed-Integer Linear Programming (MILP) formulation of
TSP and MTSP.
3. Numerical contributions: Davidsson et al. (2007) compare four mech-
anisms on a same problem and we do not know of any work with
more mechanisms.
In comparison with this work, our work both
consider more mechanisms and present many more experimental re-
sults. In fact, our results are robust since we compare the efficiency
of the mechanisms when they solve the same instance among 130
for given numbers of salesmen and clients, and we present the fifth
and ninth deciles obtained by 130 instances.
The outline of this paper is as follows. Section 2 presents our frame-
work, i.e., our MTSP constrained by 1-1 exchanges, next hypotheses about
how to carry out a fair comparisons of the mechanisms. Section 3 details
the seven mechanisms. Section 4 shows how the duration of the parallel
5
computations of up to 10 agents (9 salesmen + 1 Central Authority (CA))
is inferred from the sequential computations in our experimentation on one
of our computers with a 4-core CPU. Section 5 presents the numerical re-
sults of this experimentation. Section 6 discusses these results, next how
other variants of MTSP may be introduced taking the selfishness of the
salesmen into account. Section 7 concludes.
2 Framework
This section first recalls the formulation of the traditional MTSP solved
by Mechanism FullCentr, next our MTSP constrained by 1-1 exchanges of
cities which is solved by the other six mechanisms. We assume that both
problems have n cities to be visited by one of m salesmen, and dij is the
Euclidean distance between Cities i and j. City i = 0 is the depot shared
by all salesmen.
2.1 Traditional MTSP: FullCentr
The traditional MTSP in Equations 1-8 uses the 2-index decision variable
xij such that xij = 1 only if one of the m salesmen goes from City i to
City j. The objective function in Equation 1 minimises the total distance
U trad travelled by all the salesmen. Equation 2 (respectively, 5) ensures
that m salesmen leave (respectively, enter) the depot. Similarly, Equation
3 (respectively, 4) ensures that a single salesman leaves (respectively, en-
ters) every city. Equation 6 is a constraint eliminating sub-routes by the
method of node potentials proposed by Miller et al. (1960) in which de-
cision variable pi counts the number of cities visited by a salesman before
he visits City i.
min U trad =
Pn−1
j=0,j6=i dijxij
i=0 Pn−1
Pn−1
j=1 x0j = m
Pn−1
j=0,j6=i xij = 1
Pn−1
i=0,i6=j xij = 1
Pn−1
i=1 xi0 = m
(1)
(2)
(3)
(4)
1 ≤ i < n
1 ≤ j < n
(5)
pi − pj + (n − 1).xij ≤ n − 2 1 ≤ i 6= j < n (6)
(7)
(8)
1 ≤ i < n
0 ≤ i, j < n
xij ∈ {0, 1}
pi ∈ ℜ+
2.2 Modified MTSP (constrained by 1-1 exchanges)
We now explain how we modify this traditional MTSP in order to include
the individual selfishness of the salesmen such that a DO can also solve
our modified problem. The following explanation calls U trad the social
welfare in the traditional MTSP (i.e., the total route length in Eq. 1), and
U mod the social welfare and umod
Salesman k's utility in the modified
MTSP. We make the following assumptions:
k
6
k
k
1. Hyp. 1 -- Individual utilities measure the travelled distance: We
as the distance travelled by Salesman k and U mod =
as the distance travelled by all. Of course, the advantage
define umod
Pk umod
of such a hypothesis is that U mod = U trad.
The drawback is that salesmen all want to get rid of their cities,
but no one accepts cities from other salesmen. Consequently, such
choices of umod
and U mod require the following two assumptions
which operate together.
k
2. Hyp. 2 -- Salesmen "own" an initial endowment of cities: Since
Hyp. 1 makes our distance-minimiser salesmen all want to reduce
the number of cities allocated to them, we cannot assume that they
will "fight" in order to obtain cities from a shared pool. Instead, we
assume that every Salesman k initially "owns" some cities, and he
tries to change this initial allocation by exchanging cities whenever
such an exchange reduces his individual distance umod
.
k
k
k′
and umod
3. Hyp. 3 -- Only 1-1 exchanges of cities are possible: Let us study
what happens when a Salesman k gives n cities to Salesman k′ and
receives n′ cities from k′ in a round of interaction. All exchanges
with n = n′ are rational for both salesmen when they reduce both
umod
, as shown in the next paragraph. This constraint
of n − n exchanges solves the above problem caused by selfishness
which makes salesmen want to give but not receive cities.
In this
article, we only consider the case n = n′ = 1; Cases n = n′ > 1 are
discussed in Section 6.
Let us detail why n < n′ cannot be accepted by k′ (the case n > n′
is similar). Without knowing the cities allocated to Salesman k′
(such a list of clients is private in DO), Salesman k will have trouble
convincing k′ to accept more than n′ = n city in an interaction
round.
In fact, a consequence of the triangular inequality is that
accepting n (respectively, n + 1, n + 2, etc.) cities while giving n − 1
(respectively, n, n + 1, etc.) increases more umod
than accepting
the same number of cities as the number given (except when a city
exactly lies on the optimal route -- which is known by k′ but ignored
by k). As a result, even when k proposes to give n close cities in
exchange for n′ cities, k′ would not be rational to accept n′ < n.
k′
The traditional MTSP is the problem faced, for example, by a home
health care service in which all nurses are employees and have hence no
individual utility function to optimise.
In contrast, our modified MTSP
corresponds to the problem faced by a private nurse association in which
the nurses have an initial endowment of patients (the patients either make
an appointment to their nurse or are provided by a physician) and the
association is a place in which the nurses may exchange patients when
this is mutually beneficial.
In this modified problem, every private nurse
has an individual utility function which they optimise.
7
2.3 Hypothesis Hyp. 4 about the computation time
In this article, we also make Assumption Hyp. 4 which states that we
only take account of the computation time of the MILP solver, namely
CPLEX. We choose to make this assumption as a solution to the problem
of comparing various organisations implemented in various environments
and languages. In fact, Hyp. 4 forbids the comparison of the duration of
the operation of a mechanism which mostly uses CPLEX with the duration
of another which simulates its interactions in AnyLogic2 which runs in
Java. Because of this hypothesis, we ignore the duration of anything not
computed by CPLEX, such as:
• Messages travel instantaneously : DO implies interactions which are
simulated by AnyLogic, not CPLEX. Hence, we ignore the travelling
time of the messages exchanged.
• Some techniques are not possible: We cannot use multiagent tech-
niques, such as BDI (Belief-Desire-Intention) architecture (Caballero et al.,
2011) or reinforcement learning (Gunady et al., 2014), which may
decrease the performance of our DO organisations. Similarly, Or-
ganisation Cluster cannot use the k-means algorithm, but a MILP
formulation usable by CPLEX. Likewise, the salesmen locally solve
a TSP in several of our organisations with CPLEX, but they cannot
use Concorde3 while it is often seen as the most efficient.
3 Allocation mechanisms
We now describe our six mechanisms/organisations to solve the MTSP
constrained by 1-1 exchanges. Figure 1 shows an overview in which we
can see, for example, that OptDecentr is more centralised than Cluster
and Auction, and Cluster has a more coercive CA than Auction. This
figure also points out that OptDecentr is the most centralised in the sense
that the CA solves both the allocation and all routing problems while the
other organisations let the salesmen locally solve a TSP on their allocated
cities. Some organisations operate in a single round while others need more
interactions. Finally, this figure recalls that FullCentr solves a problem
different than the other mechanisms. Each subsequent subsection details
a mechanism.
3.1 Pure DO: NoRealloc, P2P and CNP
We first present NoRealloc since its MILP formulation of TSP is both used
in P2P, Cluster and Auction, and the base of the MILP formulation of the
MTSP constrained by 1-1 exchanges in OptDecentr.
2The AnyLogic model and the outcomes of the experiments will be published on
www.github.com after acceptation of this article for publication.
3http://www.math.uwaterloo.ca/tsp/concorde/index.html
8
3.1.1 NoRealloc
As said above, NoRealloc ignores the allocation problem and lets every
salesman find the shortest route leaving the depot, visiting the N cities4
allocated to him in the initial endowment and returning to the depot.
There is a single round in which each of the m salesmen solves the TSP
in Equations 9-14. This formulation uses the 2-index decision variable
xij which equals one only if the considered salesman goes from City i to
City j.
min PN −1
j=0,j6=i dijxij
s.t.
i=0 PN −1
PN −1
PN −1
j=0,j6=i xij = 1
i=0,i6=j xij = 1
0 ≤ i < N
0 ≤ j < N
pi − pj + N.xij ≤ N − 1 1 ≤ i 6= j < N
pi ∈ ℜ+
xij ∈ {0, 1}
1 ≤ i < N
(i, j) ∈ {0, 1, . . . N − 1}2
(9)
(10)
(11)
(12)
(13)
(14)
With this notation, Equation 9 is the same as Equation 1 except that it
minimises the route length of a single salesman and n is thus replaced
by N , Equation 10 (respectively, 11) is similar to Equations 2 and 3
(respectively, 4 and 5) except that it does not need to distinguish the
case of the depot, and Equation 12 is the same constraint of sub-route
elimination as Equation 6.
3.1.2 P2P
Mechanism P2P has several interaction rounds in which instances of TSP
or a derivative of TSP are solved. The bottom of Figure 2 shows that
P2P consists of two state charts which may run concurrently, namely,
P2P host and P2P guest which replies to the former. Therefore, every
salesman may take part in two interactions simultaneously, the first as
guest and the second as host. Please remember that every salesman oper-
ates his own copy of the state charts in Figure 2. The names of the states
and transitions in both state charts all start with P2Pn action where n
indicates their order of activation in a round and action summarises the
action performed. P2P uses the variables at the top of Figure 2. Each of
these variables is a pointer to a city or salesman, except propCities[k][i]
that records previous interactions as a matrix of Booleans which are true
only when the considered salesman has already proposed City i to another
Salesman k in order to prevent infinite loops. allocatedCities (list of
cities currently allocated to the considered salesman), ownedCities (his
initial endowment) and route (similar to allocatedCities but with the
cities ordered according to the shortest route found by the mechanism in
use, thus P2P in this subsection) also are variables but AnyLogic shows
them with a different icon because they are collections of objects.
4 N may be different between salesmen in the two variants of TSP shown in this article.
We do not use Nk because N is a local variable for every salesman-agent k.
9
CPLEX
CPLEX
CPLEX
CPLEX
CPLEX
CPLEX
CPLEX
CPLEX
CPLEX
Figure 2: Implementation of the mechanisms in a salesman. ("CPLEX" ar-
rows point to transitions and states whose duration are taken into account.)
We now detail the operation of P2P. State P2P0 initialisation
mainly sets all entries in propCities[k][i] to f alse. AnyLogic always exe-
cutes the first state in all state charts, and transition P2P0 host starts
only fires when mechanism P2P is selected. The first salesman whose
P2P0 host starts fires first becomes the host in this round.
(This
state chart could generate more than one host at the same time, but
we prevent this by setting AnyLogic to use only one thread, as detailed
in Section 4.) Next, P2P2 host invites guest makes this host se-
lect a guest (i.e., the salesman with the lowest number of f alse in
propCities[k][i]) and send him an invitation. The guest was waiting
in state P2P1 guest waits for invitation and this message fires his
transition P2P3 guest receives invitation from host.
Then, P2P4 guest proposes a city is the first call to CPLEX in this
round of interaction. The guest solves the modified TSP in Equations 15-
23 in order to propose a city to the host. The goal of this model is to
find the city which should be removed from allocatedCities such that
the reduction of route length is maximised.5 Equations 15-23 modify the
formulation of TSP in Equations 9-14 by adding binary decision variable
kept such that kepti = 1 for the N − 1 cities to be kept and kepti = 0
5The problem in Equations 15-23 finds the city which causes the largest increase in
the route length. Instead of this single round, we may solve this problem in N − 1 rounds
in which the TSP in Equations 9-14 is solved with N − 1 cities (the ith round without
the ith city), then the shortest of the N − 1 obtained route lengths indicates the city to
be proposed. We have tested this method and seen that it takes more time than solving
Equations 15-23.
10
for the city to be proposed to the host.6
j=0,j6=i cijxij
i=0 PN −1
j=0,j6=i xij = kepti
min PN −1
s.t. PN −1
PN −1
PN −1
i=0,i6=j xij = keptj
i=1 kepti = N − 2
0 ≤ i < N
0 ≤ j < N
0 ≤ i < N
(15)
(16)
(17)
(18)
pi − pj + N.xij ≤ N − 1
kepti = 1
kepti ∈ {0, 1}
pi ∈ ℜ+
xij ∈ {0, 1}
(19)
1 ≤ i 6= j < N
ipropCities[host][i] = true (20)
i ∈ {1, . . . N − 1}
1 ≤ i < N
(i, j) ∈ {0, 1, . . . N − 1}2
(21)
(22)
(23)
Consequently, Equations 15 and 19 are the same as Equations 9 and
12. Equations 16 and 17 are similar to Equations 10 and 11 except for
the city i to be proposed which has kepti = 0. Equation 18 checks
that exactly one city will be proposed to the host. Equation 20 ensures
that a city previously proposed and returned by the guest will not be
proposed again.7 If propCities indicates that all cities have already been
proposed, then the considered guest proposes null, which fires transition
P2P5 host receives negotiation rejection.
Otherwise, the city proposed by the guest fires transition P2P5 host re-
ceives city proposed by guest and state P2P6 host proposes city -
to guest finds the city to be proposed by the host to the guest. This
is the second call to CPLEX in this round of interaction. Again, CPLEX
solves the above modified TSP in Equations 15-23 (with a small modifi-
cation: host needs to be replaced by guest in Equation 20). The guest
may not find a city reducing his route length and, hence, send a null
reply to the guest. Otherwise, he memorises in propCities not to keep
proposing the city he has just proposed.
P2P7 guest receives proposition and sends reply receives this
proposed city. If the city proposed by the host is null, then the guest sends
a message to confirm the failure of this round of negotiation. Otherwise,
he uses a CPLEX to solve the traditional TSP in Equations 9-14 with all his
cities, minus the one previously proposed to the host, plus the one which
has just been proposed by the host. If the proposed exchange reduces his
route length, then the guest sends an acceptation message and updates
his route length by taking this exchange into account, otherwise he sends
a null.
Finally, transition P2P8 host receives acceptation or rejection
If the guest accepts the exchange, the host modifies
receives this reply.
his allocatedCities then updates his route by solving Equations 9-14 and
6When this problem is solved by a salesman in Mechanism Auction, the end of this
sentence reads: ". . . kepti = 0 for the city to be proposed to the auctioneer".
7When Equations 15-23 are solved in Mechanism Auction, the previous sentence reads:
"Equation 20 ensures that a city previously proposed and returned by the auctioneer will not
be proposed again".
11
setting propCities[city][guest] = f alse for all his city in order to propose
any city to this guest again.
P2P9 host does nothing and P2P10 host waits make the host wait
for one millisecond. This tiny pause is requested by AnyLogic in order to
allow other salesmen to become host. Otherwise, Salesman 0 would keep
the control in all subsequent rounds until he has proposed all his cities,
next Salesman 1 would become host as long as he has not proposed all
his cities, then Salesman 2, etc.
Finally, note that P2P does not loop forever because State P2P2 host
invites guest does not send an invitation when propCities[k][i] =
true for all Salesmen k and all Cities i, which eventually causes every
salesman except one to stop acting as host.
3.1.3 CNP
Like (Frey et al., 2003), our Mechanism CNP is inspired by the Contract
Net Protocol. CNP is described by state charts CNP host and CNP guest
in Figure 2. Similarly to P2P, the states and transitions have a name
starting by CNPn action where n is the order of activation of the con-
sidered element and action describes it. CNP runs by rounds in which
a salesman (host) plays the role of an auctioneer who broadcasts a city
to give and the other salesmen (guests) reply by proposing a city to be
exchanged. Conversely to P2P, CNP has several guests.
The detail of this mechanism is as follows. CNP0 initialisation
sets all the entries in propCities[k][i] to f alse; This is performed by
all salesmen because the first state in all state charts is always exe-
cuted. All salesmen wait in state CNP1 guest waits for RFP. Transition
CNP2 host starts in all salesmen may fire because its condition only
checks that Mechanism CNP is selected; This condition fires first in one
of the salesmen who becomes the host in this round. (Like P2P, CNP
could have several hosts and we prevent this by allowing only one thread
in AnyLogic, as detailed in Section 4.) The host does the first use of
CPLEX in this round to select a city to give by solving the modified TSP
in Equations 15-23; This city is sent in a Request For Proposals to all the
guests in CNP3 host broadcasts RFPs. Every guest also uses CPLEX
to solve the problem in Equations 15-23 in order to make a proposal in
CNP5 guest sends proposal. When transitions CNP6 host received-
proposal and CNP6b host received proposal have received all these
proposals, the host selects the winner by calling CPLEX to test each pro-
posed city in CNP9 host sends allocation replies. More precisely,
for each city submitted by the guests, the host solves the traditional
TSP in Equations 9-14 with his allocated cities minus the city broad-
cast in the Request For Proposals (RFP) plus the city submitted by
the considered guest. The guest sends an acceptation message to the
guest who proposed the city reducing the most his route length.
In
this case, the guest updates his variables allocatedCities and route
(route points to the same cities as allocatedCities but in the order
minimising the route length).
If no city causes such a reduction, then
no acceptation is sent. Finally, the guest sends a rejection message to
12
the other guests. After the acceptation (respectively, rejection) message
has been received by CNP10 guest received acceptation (respectively,
CNP10 guest received rejection), another round may start.
After pure DO, we now turn our attention to pure CO.
3.2 CO with constraints of DO: OptDecentr
As previously said, OptDecentr is a CO organisation that mimics DO.
In other words, CA uses CPLEX in order to find the optimal solution of
our MTSP constrained by 1-1 exchanges. Please first notice that this
constraint of 1-1 exchanges of cities makes all salesmen always keep the
same number of cities as in their initial endowment. As a result, the
decision variable must identify the salesmen in order to ensure that their
number of allocated cities equals their number of cities owned in this
endowment. Consequently, OptDecentr uses a MILP model with the 3-
index decision variable xijk which equals one only if Salesmen k goes from
City i to City j:
min
s.t.
umod
k
k
k=1 umod
j=0,j6=i dijxijk
U mod = Pm
= Pn−1
Pn−1
i=0 Pn−1
j=1 x0jk = 1
Pn−1
Pn−1
j=0,j6=i Pm
i=0,i6=j Pm
k=1 xijk = 1
k=1 xijk = 1
Pn−1
i=1 xi0k = 1
Pn−1
pi − pj + n.xijk ≤ n − 1
j=0,j6=i xijk = Pn−1
l=0,l6=j xjlk) − xijk ≥ 0
i=0 Pn−1
(Pn−1
j=0 ojk
pi ∈ ℜ+
xijk ∈ {0, 1}
1 ≤ k ≤ m
1 ≤ k ≤ m
1 ≤ i < n
1 ≤ j < n
1 ≤ k ≤ m
(24)
(25)
(26)
(27)
(28)
(29)
1 ≤ i, j < n, 1 ≤ k ≤ m(30)
1 ≤ k ≤ m
(31)
0 ≤ i, j < n, 1 ≤ k ≤ m(32)
0 ≤ i < n
(33)
0 ≤ i, j < n, 1 ≤ k ≤ m(34)
In this model, Equations 24 and 25 minimise the total distance travelled
by the community of salesmen. Equation 26 (respectively, 29) checks that
all salesmen leave (respectively, enter) the depot. Equation 27 (respec-
tively, 28) checks that all cities are left (respectively, entered) exactly once.
Equation 30 is the same constraint of sub-route elimination as Equations
6, 12 and 19. Equation 32 ensures that the salesmen entering and leav-
ing a city are the same. Equation 31 checks that the number of cities
allocated to a salesman equals the number of cities he owns in his ini-
tial endowment. (The right-hand side in this equation is a constant as
Parameter ojk represents the initial endowment ("ownership") of cities,
modelled by ojk = 1 if City j is "owned" by Salesman k at the beginning
of the experiment, and ojk = 0 otherwise.)
13
3.3 CO/DO hybrids: Cluster and Auction
We now introduce our two hybrid organisations, viz., Cluster and Auction.
They are not pure DO since CA takes part in the allocation and not pure
CO because CA lets the salesmen locally solve the TSP in Equations 9-
14. Cluster is more coercive because the salesmen are supposed to let CA
know about all their cities in order to solve the allocation problem, while
Auction lets them free to never propose some of their cities if they want
for some reason (e.g., a city has an important client they want to keep or
not disclose). Conversely to P2P and CNP which only perform bilateral
exchanges, Cluster and Auction may involve more than two salesmen per
exchange during a round, that is, Salesman s1 may give a city to Salesman
s2, s2 give to s3, . . ., and sq give to s1 for any q ≤ m.
3.3.1 Cluster
Because of Hypothesis Hyp. 4 about the use of CPLEX to make all deci-
sions, Mechanism Cluster cannot use whichever solving methods from the
clustering literature but only those based on a MILP formulation. We use
the model proposed in (Rao, 1971, Sec. 5):
min
s.t.
D
D ≥ dij(xik + xjk − 1)
k=1 xik = 1
Pm
1 + Pn−1
j=1 xjk = Pn−1
xik ∈ {0, 1}, D > 0
j=1 ojk
(35)
1 ≤ i < j < n, 0 ≤ k < m (36)
1 ≤ i < n
0 ≤ k < m
1 ≤ i < n, 0 ≤ k < m
(37)
(38)
(39)
In this model, decision variable xik is a binary equal to one only when
City i is allocated to Salesman/Cluster k. Equations 35 and 36 are the
objective function which minimises the diameter of the cluster which has
the largest diameter. More precisely, Equation 36 includes the linearisation
of Dk ≥ dij xikxjk which ensures that the diameter of Cluster k is at
least the maximum distance between any two Cities i and j allocated to
this cluster; Please notice that such a formulation defines circular clusters
which may hence overlap. Like in any other allocation problem, Equation
37 checks that every city is affected to exactly one cluster/salesman. In
addition to the original model by Rao (1971), we add Equation 38 in
order to ensure that the size of the clusters(/salesmen) correspond to the
number of cities provided by every (cluster/)salesman, that is, if Salesman
k owns Pj ojk cities (again, ojk is a constant which equals one only if
Salesman k "owns" City j in his initial endowment), then a cluster with
Pj ojk cities must exist in order to be allocated to k.
As previously said, Mechanism Cluster operates in a single round: CA
first solves the problem in Equations 35-39 to allocate N cities to ev-
ery salesman8, then these salesmen locally solve the traditional TSP in
Equations 9-14.
8Like in Footnote 4, N may not be that same for all salesmen since it is a local variable.
14
CPLEX
Figure 3: State chart of Auction in the Central Authority (CA).
3.3.2 Auction
Auction is an organisation in which CA is an auctioneer who is thus less
coercive than in Cluster. Conversely to Cluster, Auction operates in several
rounds.
In each round, every salesman gives a city A to CA who either
gives it back if no other salesman wants it, or gives a city B proposed by
another salesman if exchanging A and B reduce the length travelled by
both salesmen. Figure 3 and the top right corner of Figure 2 detail the
states and transitions in this organisation. As above, their name has the
form An action where n helps the reader understand the order of their
activation and action summarises their goal.
At the beginning of a round, all salesmen wait in A1 wait for RFP
until CA sends them a Request For Proposals in A2 broadcast RFPs.
When a salesman receives this message, he uses CPLEX to look for a
city to give in A4 propose a city to give by solving the modified TSP
in Equations 15-23. When all salesmen have replied by sending either a
city or null to CA, CA broadcasts this list of replies to all salesmen in
A8 broadcast proposed cities. For each city in this list, every sales-
man uses CPLEX to compute a bid for it in A10 bid on every proposed-
city. A bid for a city is the additional distance travelled to visit it, or,
more technically, as the differences between:
• the shortest length of the route visiting their remaining N − 1 cities,
that is, their allocated cities except the one proposed to the auc-
tioneer in A4 propose a city to give. This is obtained by each
salesman by solving the TSP in Equations 9-14 once.
• the shortest length of the route visiting their remaining N − 1 cities
15
plus the city proposed by one of the other salesmen. This is obtained
by each salesman by solving the TSP in Equations 9-14 for each city
in the list of bids.
When all salesmen have returned their list of bids, CA uses CPLEX
to solve an allocation problem in A14 send allocation of cities. In
order to describe this problem, let us call savings[k][i] the bid of Sales-
man k for City i and binary decision variable xki equals 1 only if City
i is allocated to Salesman k. For simplicity, we write m the number of
salesmen who have not left the auction before the current round. The
allocation model solved by CA is described by Equations 40-44. The ob-
jective in Equation 40 allocates the cities such that the total route length
of all salesmen is minimum. The constraint in Equation 43 ensures that,
in every auction round, every salesman does not increase his individual
route length.
min
s.t.
Pm
k=1 Pm
i=0 savings[k][i].xki
Pm
Pm
i=0 xki = 1
k=1 xki ≤ 1
(40)
0 ≤ k < m (41)
Pm
0 ≤ i < m (42)
i=0 savings[k][i].xki ≤ savings[k][k] 0 ≤ k < m (43)
0 ≤ i, j ≤ m (44)
xki ∈ {0, 1}
4 Real time spans deduced from sequen-
tial simulations
After the description of the compared mechanisms, we now present how
the computation time span of every organisation is deduced from sequen-
tial experiments, that is, experiments running on a single thread of Any-
Logic. In fact, our experimentation involves up to 10 agents (9 salesmen
+ 1 CA) while each of our computers has a CPU with 4 cores only. Thus,
configuring AnyLogic to simulate this parallelism would require studying
how AnyLogic schedules up to 4 agents in parallel, then deduce how 10
agents would have behaved in reality. Instead, we prefer to make AnyLogic
carry out all computations sequentially, then infer how (pure and mixed)
DO would occur concurrently in real life. The time span of the CPLEX
computation (duration between the beginning of the first computation and
the end of the last one) in an experiment is deduced as follows.
• OptDecentr and FullCentr: CO uses no parallelism and the compu-
tation time span is thus equal to the computation time recorded in
our sequential experiments. More technically, this duration is the
difference between the two System.currentTimeMillis() after
and before cplex.solve(). This is also the Java code to measure
the duration of all CPLEX calls in all our organisations below.
• Auction: Figure 4a illustrates how AnyLogic sequentially runs the
operation of two salesmen, and Figure 4b how reality would look
like with parallelism:
-- AnyLogic: Figure 4a shows that Salesman 1 calls CPLEX for 5
ms in State A4 propose a city to give (summarised as "A4:
16
Round 1
Round 2
Round 1
Round 2
Salesman 1
Salesman 2
Salesman 3
Auctioneer
A4: 5 ms
A10: 15 ms
A10: 13 ms
A4: 7 ms
A4: 4 ms
A10: 11 ms
Salesman 1
A4: 5 ms
A10: 15 ms
Salesman 2
A4: 7 ms
A10: 13 ms
Salesman 3
A4: 4 ms
A10: 11 ms
A14: 27 ms
Auctioneer
A14: 27 ms
a) Simulation: Sequential experimentations find that Round 1
lasts (5+7+4)+(15+13+11)+27=82ms.
b) Reality: Round 1 with parallel decisions would
last max(5;7;4)+max(15;13;11)+27=49ms.
Figure 4: Difference between the computation time (a) in our experiments
and (b) in real (b) of one round of Auction. ("Ax:" is the beginning of the
the name in the state charts in Figures 2 and 3).
5ms" in Figures 4a and 4b), and Salesman 2 and 3 spend 7 ms
and 4 ms in this state. Next CA (auctioneer) receives the result
of these computations and broadcasts it to all salesmen (not
shown in Figures 4 because performed without CPLEX). Later,
Salesman 1 computes for 15 ms, Salesman 2 for 13 ms and
Salesman 3 for 11 ms in A10 bid on every proposed city.
Finally, the auctioneer computes for 27 ms in A14 send allo-
cation of cities. The duration observed in AnyLogic is the
sum of these durations, as shown in Figure 4a.
-- Reality :
In real
life, all states with the same name can be
computed in parallel, as shown in Figure 4b. It follows that the
duration of the CPLEX computations in a state is the maximum
of the durations of all salesmen in this state, i.e., this round
would take max(5; 7; 4) + max(15; 13; 11) + max(27) = 49ms.
• Cluster: The method for Cluster is the same as for Auction except
that (i) there is a single round, and (ii) every salesman solves the
TSP only once in this round. Shortly, the real-life duration is (i) the
time spent by CA solving the clustering problem in Equations 35-39
plus (ii) the maximum of the time spent by the salesmen solving the
TSP in Equations 9-14.
• NoRealloc: The method for NoRealloc is the same as Cluster without
CA, that is, the real-life duration is the maximum of the time spent
by the salesmen solving the TSP in Equations 9-14.
• P2P and CNP: The inference of the duration of interactions in pure
DO is the most complicated because several interactions of various
durations may take place concurrently. In contrast, the CA in Auc-
tion ensures that a new round starts only after the end of the previous
one. On the contrary, no CA synchronises interactions in P2P and
CNP because the state charts in Figure 2 allow every salesman to
be host and guest at the same time in two concurrent interactions.
We assume that interactions do not overlap, that is, an interaction
is never stopped between its start and end. This complies with our
observation of the operation of AnyLogic when only one thread is
17
a) Simulation
Salesman 1
I1−P2P4
I1−P2P7
I3−P2P6
I3−P2P8
Salesman 2
Salesman 3
Salesman 4
b) Reality
Salesman 1
I1−P2P4
I1−P2P6
I1−P2P8
I2−P2P6
I2−P2P8
I3−P2P4
I3−P2P7
I4−P2P6
I4−P2P8
I2−P2P4
I2−P2P7
I4−P2P4
I4−P2P7
Interaction I1
Interaction I2
Interaction I3
Interaction I4
I1−P2P7
I3−P2P6
I3−P2P8
Salesman 2
Salesman 3
Salesman 4
I1−P2P6
I2−P2P6
I2−P2P8
I1−P2P8
I3−P2P4
I3−P2P7
I4−P2P6
I4−P2P8
I2−P2P4
I2−P2P7
I4−P2P4
I4−P2P7
0
100
200
Time
300
Figure 5: Difference between the computation time (a) in our experiments
and (b) in real life in four rounds (called I1, I2, I3 and I4) of P2P interactions.
("Ix" refers to Interaction Ix and "-P2Py" to the names in the state charts in
Figure 2).
used.
In addition, using more threads would not change the total
duration of interactions and would just make it more complicated to
observe what we now explain. This explanation is provided for P2P
because it is the most complex as several bilateral interactions may
occur concurrently; CNP is slightly simpler because such overlaps
are made impossible by the fact that an interaction always involves
all salesmen.
In every round of a P2P interaction, we make AnyLogic record the
(i) identities of the host and guest in this round, (ii) the starting time
in AnyLogic of this round, and (iii) its duration (i.e., sum of (1) the
CPLEX computation time of the guest in P2P4 guest proposes a-
city, (2) the time of the host in P2P6 host proposes city to-
guest, (3) the time of the guest in P2P7 guest receives propo-
sition and sends reply and (4) the time of host in P2P8 host-
receives acceptation or rejection -- please notice that this
is a summation because everything also happens sequentially in real
life). Figure 5 illustrates how this information is used after the
completion of the mechanism with an example of four interactions
named I1, I2, I3 and I4:
-- AnyLogic: Salesman 2 is the host of Interaction I1 (Figures 5a
and 5b only show CPLEX computations, thus P2P2 host invi-
tes guest is not shown) and the first CPLEX computation is
performed by his guest Salesman 2 in State P2P4 guest propo-
ses a city, which is represented by I1-P2P4 in Figure 5a.
AnyLogic carries out the computations one after the other:
I1-P2P4, then I1-P2P6, I1-P2P7 and I1-P2P8 for Interaction
1, next Interaction 2 with I2-P2P4, I2-P2P6, I2-P2P7 and I2-
18
P2P8, then Interaction 3, etc.
-- Reality : Figure 5b shows that Interactions I1 and I2 will start
at the same time in reality since they involve two different pairs
of salesmen. Hence, the CPLEX calls in {I1-P2P4, I1-P2P6, I1-
P2P7, I1-P2P8} would be in parallel with those in {I2-P2P4,
I2-P2P6, I2-P2P7, I2-P2P8}. After that, I3 would start as soon
as its host Salesman 1 is available, i.e., just after I1-P2P7, then
this host would wait for the reply of Salesman 2 at the end of I3-
P2P3 because this guest would be taking part to I2. Similarly,
I4 starts just after its host Salesman 3 finished I3-P2P7, which
is not shown on Salesman 3 but with the effect on Salesman 4
who computes I4-P2P4.
Finally, both Figures 5a and 5b are incomplete because they show
interactions without the initialisation of the salesmen who first solve
the TSP in Equations 9-14 before t = 0, and the salesmen in Fig-
ures 5b would be ready for their first interaction at different times.
More technically, the computation time in P2P is calculated by up-
dating a vector clockk after each computation of Salesman k. clockk
represents the total computation time of Salesman k up to the con-
sidered interaction. We also call Ts the computation time of CPLEX
in state s:
-- Duration of initialisation: Every salesman k solves the TSP in
Equations 9-14, which takes a duration TP2P0k . Since these
computations are parallel, the duration of this initialisation is
maxk(TP2P0k ). Hence, at the end of this initialisation, clockk =
maxk(TP2P0k ) for all Salesmen k.
-- For every round of bilateral interactions:
∗ An interaction starts as soon as its host and guest are both
ready, thus an interaction starts at max(clockhost, clockguest).
Hence, clockhost = clockguest = max(clockhost, clockguest).
∗ The end dates of the current round is clockguest = clockhost+
TP2P4 guest proposes a city+TP2P6 host proposes city to guest+
TP2P7 guest receives proposition and sends reply and clockhost =
clockguest + TP2P8 host receives acceptation or rejection.
-- Total computation time: The searched duration of Mechanism
P2P is maxk(clockk) calculated when all interaction rounds are
completed.
5 Numerical experimentation
Instead of performing Monte Carlo simulations to assess the mechanisms,
we allow the reader to replicate our results by generating 130 instances
by circular permutations on problem "CH130" in TSPLIB.9 In order to
describe these circular permutations, let us call (xi, yi) the coordinates of
the ith city in our simulation and (Xi, Yi) the coordinates of the ith city
in TSPLIB. For a given number of cities n, our Instance zero uses the first
9http://comopt.ifi.uni-heidelberg.de/software/TSPLIB95/tsp/ch130.tsp.gz
19
n instances in TSPLIB such that City i has xi = Xi and yi = Yi (cities
i ≥ n in TSPLIB are ignored), i.e., Salesman 1 is at (334.5 . . . , 161.7 . . .),
2 at (397.6 . . . , 262.8 . . .), 3 at (503.8 . . . , 172.8 . . .), etc. Next, Instance
∆Y uses xi = Xi and yi = Yi + ∆Y , i.e., for Instance 1, Salesman 1 is at
(334.5 . . . , 262.8 . . .), 2 at (397.6 . . . , 172.8 . . .), 3 at (503.8 . . . , 384.6 . . .),
etc. (We noticed that Instance ∆Y = 122 is often very long to solve for
several mechanisms.)
This generation of instances allows us to present results in which the
mechanisms work on the same instances. For example, the ratios in Fig-
ures 7, 8, 9, 10 are obtained by (i) setting n and m, (ii) comparing all
mechanisms (i.e., computing the ratios of the total route length of two
mechanisms) on Instance ∆ = 0, (ii') repeating ii for ∆ varying between
1 and 129, and (iii) writting in these figures the fifth and ninth deciles of
these 130 ratios.
Our numerical experimentation have been performed on the 17 Per-
sonal Computers of a student laboratory in the department of Industrial
Engineering at INSA-Lyon, Lyon, France. These computers are all iden-
tical and run Windows 7 professionnel SP1 64 bits on Intel Core i5-3470
[email protected] with 8.00 Gb RAM. The softwares used were IBM ILOG
CPLEX 12.6.3.0 and AnyLogic 7.3.2.
5.1 Results with a time limit of 24 hours
We consider two metrics to assess our mechanisms, viz., total route length
(also referred to as quality of the solution) and computation time. In this
article, all graphs in a same figure use the same ranges on the y-axis. For
each mechanism, Figure 6 shows the box-plots of the computation time
of the 130 instances for various number of cities n when there are m = 9
salesmen. The main point to notice is the quick increase of the duration
of OptDecentr from n = 20, which corresponds (n − 1)/m ≈ 2.1 cities
per salesman ("minus one" prevents counting the depot). In this figure,
the number of salesmen m is increased until one of the 130 instances
cannot reach its end within 24 hours. As can be seen, this limit is set by
OptDecentr which cannot find the optimal solution of at least one of the
130 instances for m = 9 salesmen and n = 23 cities. We do not show the
equivalent of Figure 6 with the quality of the solution because it would be
difficult to see a difference between the mechanisms.
Instead, we show Figures 7 and 8 which show ratios of quality (com-
pared to OptDecentr in Figure 7 and to FullCentr in Figure 8) for m = 5
(left) and m = 9 salesmen (right). More precisely, Figure 7 compares the
total route length found by the mechanisms solving the MTSP constrained
by 1-1 exchanges and this comparison is carried out against the optimal
value found by OptDecentr. As said above, for given instance ∆Y and
values of m and n, the route length found by a mechanism is divided by
the route length found by OptDecentr for each of the 130 instances; Both
top graphs in 7 show the ninth decile of these 130 ratios and both bottom
graphs show their median. Figure 8 is computed the same way, but the
base of comparison is FullCentr instead of OptDecentr.
In other words,
Figure 7 compares mechanisms solving the same problem, while Figure 8
20
Computation time of FullCentr (m=9)
Computation time of OptDecentr (m=9)
)
s
m
(
e
m
i
t
n
o
i
t
a
t
u
p
m
o
c
l
a
t
o
T
)
s
m
(
e
m
i
t
n
o
i
t
a
t
u
p
m
o
c
l
a
t
o
T
)
s
m
(
e
m
i
t
n
o
i
t
a
t
u
p
m
o
c
l
a
t
o
T
6
0
+
e
1
4
0
+
e
1
2
0
+
e
1
0
0
+
e
1
6
0
+
e
1
4
0
+
e
1
2
0
+
e
1
0
0
+
e
1
6
0
+
e
1
4
0
+
e
1
2
0
+
e
1
0
0
+
e
1
)
s
m
(
e
m
i
t
n
o
i
t
a
t
u
p
m
o
c
l
a
t
o
T
6
0
+
e
1
4
0
+
e
1
2
0
+
e
1
0
0
+
e
1
10 11 12 13 14 15 16 17 18 19 20 21 22
10 11 12 13 14 15 16 17 18 19 20 21 22
Number of cities (n)
Number of cities (n)
Computation time of Cluster (m=9)
Computation time of Auction (m=9)
)
s
m
(
e
m
i
t
n
o
i
t
a
t
u
p
m
o
c
l
a
t
o
T
6
0
+
e
1
4
0
+
e
1
2
0
+
e
1
0
0
+
e
1
10 11 12 13 14 15 16 17 18 19 20 21 22
10 11 12 13 14 15 16 17 18 19 20 21 22
Number of cities (n)
Number of cities (n)
Computation time of CNP (m=9)
Computation time of P2P (m=9)
)
s
m
(
e
m
i
t
n
o
i
t
a
t
u
p
m
o
c
l
a
t
o
T
6
0
+
e
1
4
0
+
e
1
2
0
+
e
1
0
0
+
e
1
10 11 12 13 14 15 16 17 18 19 20 21 22
10 11 12 13 14 15 16 17 18 19 20 21 22
Number of cities (n)
Number of cities (n)
Computation time of NoRealloc (m=9)
)
s
m
(
e
m
i
t
n
o
i
t
a
t
u
p
m
o
c
l
a
t
o
T
6
0
+
e
1
4
0
+
e
1
2
0
+
e
1
0
0
+
e
1
10 11 12 13 14 15 16 17 18 19 20 21 22
Number of cities (n)
Figure 6: Box-plots of the computation time of the 130 instances for m = 9
salesmen and various number of cities n.
21
r
t
n
e
c
e
D
p
O
o
t
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
r
t
n
e
c
e
D
p
O
o
t
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
m=5 salesmen, quantile=0.9, time limit = 24h.
m=9 salesmen, quantile=0.9, time limit = 24h.
160
140
120
100
1
r
t
n
e
c
e
D
p
O
o
t
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
160
140
120
100
Number of cities per salesman [ (n−1)/m ]
Number of cities per salesman [ (n−1)/m ]
2
3
1
2
Mechanism NoRealloc
Auction
P2P CNP Cluster
Mechanism NoRealloc
Auction
P2P CNP Cluster
m=5 salesmen, quantile=0.5, time limit = 24h.
m=9 salesmen, quantile=0.5, time limit = 24h.
160
140
120
100
1
r
t
n
e
c
e
D
p
O
o
t
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
160
140
120
100
Number of cities per salesman [ (n−1)/m ]
Number of cities per salesman [ (n−1)/m ]
2
3
1
2
Mechanism NoRealloc
Auction
P2P CNP Cluster
22
Mechanism NoRealloc
Auction
P2P CNP Cluster
Figure 7: Ratios of quality compared to OptDecentr for m = 5 (left) and
m = 9 (right) salesmen with no time limit.
m=5 salesmen, quantile=0.9, time limit = 24h.
m=9 salesmen, quantile=0.9, time limit = 24h.
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
200
175
150
125
100
1
2
3
1
2
Number of cities per salesman [ (n−1)/m ]
Number of cities per salesman [ (n−1)/m ]
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
m=5 salesmen, quantile=0.5, time limit = 24h.
m=9 salesmen, quantile=0.5, time limit = 24h.
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
200
175
150
125
100
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
200
175
150
125
100
200
175
150
125
100
1
2
3
1
2
Number of cities per salesman [ (n−1)/m ]
Number of cities per salesman [ (n−1)/m ]
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
23
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
Figure 8: Ratios of quality compared to FullCentr for m = 5 (left) and
m = 9 (right) salesmen with no time limit.
compares DO mechanisms to the CO mechanism.
We think that the most interesting points are the presence of plateaus.
Some mechanisms seem to reach a plateau in Figure 7: Cluster seems to
be about 5% worse, CNP about 11% worse, P2P about 12% and Auction
about 20% worse than OptDecentr with the median for both m = 5
and m = 9, and the ninth decile also seems to stabilise on slightly higher
figures. This indicates that these decentralised mechanisms do not explore
the entire search space of the possible 1-1 exchanges since the CA in DO
is sometimes able to find a better allocation which satisfies the selfishness
of the salesmen. Unfortunately, there does not seem to be such plateaus
in Figure 8, because either they do not exist or n has not been increased
enough to reach them. We believe that the latter explanation is true. In
order to check that we are right, the next subsection reduces the time
limit and keeps increasing n even when the computation time reaches this
limit.
5.2 Results with a time limit of 30 minutes
In order to obtain figures with much larger numbers of cities n, we limit the
computation time to 30 minutes. (Hence, we only show the ratios of total
route lengths since the equivalent of Figure 6 would only show that this
time limit is respected.) In both Figures 7 and 8, the real-life duration of
the operation of the mechanisms inferred from sequential simulations, as
explained in Section 4, was computer after the end of the simulations (of-
fline). In order to obtain more data, we have modified our AnyLogic mod-
els such that this computation is done throughout the simulation (online)
by updating get Main().remainingComputationTime which is shared
by all salesmen, and added cplex.setParam(IloCplex.Param.TimeLi-
mit, get Main().remainingComputationTime/1000) in order to make
CPLEX stop before or at the time limit.
In Figures 9 and 10, this time
limit is set to 30 minutes in parallel simulations. That is, DO mechanisms
may run much longer sequential simulations in AnyLogic, but they cannot
last more than 30 minutes when we infer what they would last in reality.
As a consequence, OptDecentr and FullCentr find the optimal solution
of their respective version of MTSP in Figures 7 and 8 because we stopped
the experimentation as soon as the time limit is reached. Hence, it was
not possible to have a point below 100%. On the contrary, Figure 9 shows
points below 100% for high values of n when the simulation stops before
CPLEX has found the optimal solution of OptDecentr. (Figure 10 has no
points below 100% because FullCentr is much quicker to optimiser.)
The most salient points to observe in Figures 9 and 10 are as follows:
• The cost of selfishness is about 30% higher for m = 5 and 60%
higher for m = 9 than the cost in the traditional MTSP: In order
to see this, we compare FullCentr (MTSP without our constraint
modelling selfishness) and OptDecentr (benchmark showing the best
results that Cluster, CNP, P2P and Auction could find):
-- For the instances of small size (i.e., less than 6 cities per sales-
man for m = 5 in the lower left graph in Figure 10, and less
24
m=5 salesmen, quantile=0.9, time limit = 30 min.
m=9 salesmen, quantile=0.9, time limit = 30 min.
180
150
120
90
r
t
n
e
c
e
D
t
p
O
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
60
1
2
r
t
n
e
c
e
D
t
p
O
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
180
150
120
90
60
13
14
1
2
3
4
5
6
7
8
9
10
Number of cities per salesman [ (n−1)/m ]
4
5
3
12
Number of cities per salesman [ (n−1)/m ]
10
11
6
7
9
8
Mechanism NoRealloc
Auction
P2P CNP Cluster
Mechanism NoRealloc
Auction
P2P CNP Cluster
m=5 salesmen, quantile=0.5, time limit = 30 min.
m=9 salesmen, quantile=0.5, time limit = 30 min.
r
t
n
e
c
e
D
p
O
o
t
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
o
t
t
(
y
t
i
l
a
u
q
%
180
150
120
90
60
1
2
r
t
n
e
c
e
D
p
O
o
t
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
o
t
t
(
y
t
i
l
a
u
q
%
13
14
5
4
3
12
Number of cities per salesman [ (n−1)/m ]
10
11
9
8
7
6
180
150
120
90
60
1
2
3
4
5
6
7
8
9
10
Number of cities per salesman [ (n−1)/m ]
Mechanism NoRealloc
Auction
P2P CNP Cluster
Mechanism NoRealloc
Auction
P2P CNP Cluster
Figure 9: Ratios of quality compared to OptDecentr for m = 5 (left) and
m = 9 (right) salesmen when the time limit is 30 minutes.
25
300
250
200
150
100
300
250
200
150
100
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
o
t
t
(
y
t
i
l
a
u
q
%
m=5 salesmen, quantile=0.9, time limit = 30 min.
m=9 salesmen, quantile=0.9, time limit = 30 min.
300
250
200
150
100
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
t
o
t
(
y
t
i
l
a
u
q
%
13
14
1
2
3
4
5
6
7
8
9
10
Number of cities per salesman [ (n−1)/m ]
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
1
2
5
4
3
12
Number of cities per salesman [ (n−1)/m ]
10
11
8
9
7
6
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
m=5 salesmen, quantile=0.5, time limit = 30 min.
m=9 salesmen, quantile=0.5, time limit = 30 min.
300
250
200
150
100
r
t
n
e
C
l
l
u
F
o
t
d
e
r
a
p
m
o
c
)
h
t
g
n
e
l
e
t
u
o
r
l
a
o
t
t
(
y
t
i
l
a
u
q
%
13
14
1
2
3
4
5
6
7
8
9
10
Number of cities per salesman [ (n−1)/m ]
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
1
2
5
4
3
12
Number of cities per salesman [ (n−1)/m ]
10
11
6
7
8
9
Mechanism NoRealloc
Auction
P2P
CNP
Cluster
OptDecentr
Figure 10: Ratios of quality compared to FullCentr for m = 5 (left) and
m = 9 (right) salesmen when the time limit is 30 minutes.
26
than 4 cities per salesman for m = 9 in lower right), OptDe-
centr finds the best DO solution because the time limit of 30
minutes does not stop this mechanism too early.
-- For larger instances, OptDecentr does not have enough time to
find the optimum. Therefore, we look at the quality of Cluster
instead, because it is the best DO mechanism. In other words,
we use Cluster in order to infer the quality that OptDecentr
would obtain without the time limit for such larger instances.
In fact, OptDecentr would find the optimal solution of our mod-
ified MTSP if there were no time limit, hence we assume that
the quality of the solution found by Cluster is an upper bound
of a perfect DO mechanism.
Since the median route length of Auction reaches a plateau at about
130% (respectively, 160%) the length of FullCentr for m = 5 (re-
spectively, m = 9), we conclude that these figures are upper bounds
of the median route length of OptDecentr. As a conclusion, the
modelling of selfishness in our modified MTSP increases the total
route length by 30% (respectively, 60%) for m = 5 (respectively,
m = 9) in comparison with the traditional MTSP.
• (De-)centralisation seems to have a negligible impact on the quality
of the solution: CNP, Auction and P2P have very close results in
Figure 10 when n is large, while the second of these mechanisms
has a CA, i.e., an auctioneer. The next bullet point indicates that
this may due to the fact that this CA is not coercive.
• Coercion seems to improve the quality of the solution: Both Figures
9 and 10 suggest that the more coercive the CA in a mechanism,
the better the quality of the solution found by this mechanism:
-- Ranking of mechanisms by quality of the solution: If we write
> for "is more efficient than", then we can see in Figures 9 and
10 that FullCentr > OptDecentr > Cluster > Auction.
-- Ranking of mechanisms by coercion level of their CA: The
same order applies to the coercion level of the CA in these four
mechanisms:
1. FullCentr has a more coercive CA than OptDecentr because
she ignores the selfishness of the salesmen.
2. The CA in OptDecentr is more coercive in Cluster because
she controls both allocation and routing.
3. The CA in Cluster requires to know of all cities while, as
said in the previous bullet point, she is just a mediator in
Auction.
Shortly, Figures 9 and 10 for high value of n suggest the following
ranking (from most to least efficient): FullCentr > OptDecentr > Cluster
> (Auction ≈ CNP ≈ P2P) > NoRealloc.
27
6 Discussion
This discussion puts into perspective this article with regard to the general
question of the price of the selfishness in DO. This presentation is carried
out according to our contributions:
6.1 Conceptual contributions
This article focuses on one way to include DO features in human organisa-
tions -- namely, the selfishness of the salesmen -- into the traditional MTSP
addressed by CO. However, please notice that other pairs of CO/DO prob-
lems are possible. These other possibilities may be summarised as follows:
• Relax Assumption Hyp. 3: As aforementioned, Hyp. 3 may be re-
laxed by replacing the constraint of 1-1 exchanges by n-n exchanges.
Clearly, the cases with n > 1 may find better exchanges but a com-
binatorial number of possible exchanges would have to be considered
by salesmen.
• Modify the objective function in MTSP: As shown in Subsection
2.2, we choose to keep the same social welfare as the objective
function in the traditional MTSP, which eventually result in adding
the constraint of 1-1 exchanges with an initial endowment of cities.
Instead of such a modification of the constraints, we could have mod-
ified the objective function. For example, we could have i) given a
value vik to each City i for each Salesman k (for instance, Sales-
man 1 earns v11=e3 for visiting City 1 and v21=e4 for City 2 while
Salesman 2 receives v12=e6 and v22=e5 respectively) and ii) mod-
ified the objective function to make a trade-off between the distance
travelled and the value earned for visiting cities (for example, this
distance is transformed into a cost of fuel and this cost is subtracted
from the money earned in the cities). With such a utility function,
the salesmen would agree to increase the number of their cities when
their value is high enough.
Other examples of modifications rely on the fact that our modified
MTSP relies on the utilitarian social welfare (i.e., sum of individual
utilities), but other mappings of individual utilities to a social wel-
fare have been proposed (e.g., maximum, minimum or product of
individual utilities).
• Derive a CO problem from a DO one:
Instead of adding the self-
ishness of the decision makers to a CO problem, other work in the
literature do the contrary. For instance, Sallez et al. (2010) compare
the dynamic allocation and routing in a real flexible manufacturing
system managed by a DO mechanism to a CO benchmark which
does not take all the constraints into account because of the com-
binatorial explosion.
• Change who make decisions: We assume that salesmen fight for
cities, but the opposite is also possible. It is even possible that both
salesmen and cities make decisions.
28
Finally, we observe that CO can estimate the performance of DO. In
fact, OptDecentr implements CO in order to find the best solution of our
modified MTSP, and this solution is a benchmark for Cluster, CNP, P2P
and Auction.
6.2 Technical contributions
Our main technical contribution is the implementation of various mecha-
nisms solving our modified MTSP. It is interesting to notice that we have
implemented one mechanism per organisation, but other mechanisms are
possible for all the organisations in Figure 1. For example, Cluster uses
the MILP formulation proposed by Rao (1971), but others exist.10
We have chosen to measure the computation time of CPLEX only. On
the one hand, we first started to program our mechanisms with a MILP
solver written in Java, namely ojAlgo v40 (http://www.ojalgo.org in
order to have only pure Java in AnyLogic. We stopped this and turned to
CPLEX because it is a recognised benchmark while we know little about
the performance of ojAlgo. On the other hand, we also first thought
about using various tools and environments (Concorde, k-means, etc.),
next use benchmarks to compare their computation times. Unfortunately,
no recognised benchmarks exist and contradicting information may even
be found, such as "C runs faster than Java because it operates on a lower
level" and "Java runs faster than C because its virtual machine adapts the
program to the computer".
6.3 Numerical contributions
Besides the data shown in Section 5, especially the bullet points in Sub-
section 5.2, our results are robust because each point in Figures 7, 8, 9
and 10 represent a decile calculated on 130 instances. Of course, our
conclusions at the end of Subsection 5.2 may turn out to be wrong with
other instances, as well as with other hypotheses about how to modify
MTSP in order to take the selfishness of the salesmen into account.
7 Conclusion
This article compares more or less centralised organisations in order to
quantify the cost of having selfish decision makers. For that purpose, our
first contribution is to introduce a same problem with features for both
Centralised Organisation (CO) and Decentralised Organisation (DO). We
address this issue by constraining the Multiple Travelling Salesmen Prob-
lem (MTSP) with both 1-1 exchanges of cities an an initial endowment.
Our second contribution is to be the first article comparing five decision
organisations to solve a same joint allocation and routing problem, while
10We have also tested Mechanism Cluster with the formulation by Saglam et al. (2006) to
which we added our constraint for 1-1 exchanges. Our experimentation (not presented in this
article) shows similar performance than the formulation by Rao (1971) described in Paragraph
3.3.1, even though the obtained clusters sometimes differ.
29
the few other similar comparisons only address two organisations. Our
third contribution is the quantification of the cost of decentralising the
making of decisions. We think that the most interesting result is the fact
that DO (i.e., our modified MTSP) has a median total route length which
reaches a plateau ≈30% (respectively, ≈60%) longer than CO (i.e., the
traditional MTSP) when there are five (respectively, nine) salesmen and
many cities. This stabilisation was hoped but unpredictable without exper-
imentation. We also notice that the coercion level of CA seems to impact
much more on the quality of the solution than the level of centralisation
of a mechanism.
As future work, we plan to study how our model of selfishness im-
pacts on the efficiency of the mechanisms. For that purpose, we will use
the model of preferences detailed in the discussion section in which the
salesmen make a trade-off between the value of cities and the distance
travelled, and then adapt our mechanisms to this other variant of MTSP.
Acknowledgement
We would like to thank the department of Industrial Engineering of INSA-
Lyon, France for the use of the computers in one of its student laboratories
in order to obtain all the results in this article.
References
Caballero, A., Bot´ıa, J., and G´omez-Skarmeta, A. (2011). Using cognitive
agents in social simulations. Engin. Appl. of Artif. Intel., 24(7):1098 --
1109.
Davidsson, P., Henesey, L., Ramstedt, L., Tornquist, J., and Wernstedt, F.
(2005). Agent-based approaches to transport logistics. Transportation
Research - Part C Emerging Technologies, 13(4):255 -- 271.
Davidsson, P., Persson, J. A., and Holmgren, J. (2007). On the inte-
gration of agent-based and mathematical optimization techniques.
In
Carbonell, J. G. and Siekmann, J., editors, Proc. 1st KES Int. Sympo-
sium, Agent and Multi-Agent Systems: Technologies and Applications,
Lecture Notes in Computer Science 4496 (Springer), pages 1 -- 10, Wro-
claw, Poland.
Ellman, M. (1989). Socialist Planning, 2d edition. Cambridge University
Press.
Fisher, K., Muller, J. P., Pischel, M., and Schier, D. (1995). A model for
cooperative transportation scheduling. In Proc. 1st Int. Conf. MultiA-
gent Systems, San Francisco, CA, USA.
Fisher, K., Muller, J. P., Pischel, M., and Schier, D. (1996). Cooperative
transportation scheduling: An application domain for DAI. J. of Applied
Artificial Intelligence, 10(1):1 -- 33.
30
Frayret, J.-M. (2002). A conceptual framework to operate collaborative
manufacturing networks. Ph. D. thesis, Univ. Laval, Quebec City, PQ,
Canada.
Frey, D., Nimis, J., Worn, H., and Lockemann, P. (2003). Benchmarking
and robust multi-agent-based production planning and control. Engi-
neering Applications of Artificial Intelligence, 16(4):307 -- 302.
Glaschenko, A., Ivaschenko, A., Rzevski, G., and Skobelev, P. (2009).
Multi-agent real time scheduling system for taxi companies. In Proc. 8th
Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS
2009), Budapest, Hungary.
Gunady, M. K., Walid, Gomaaa, and Takeuchi, I. (2014). Aggregate
Reinforcement Learning for multi-agent territory division: The Hide-
and-Seek game. Engin. Applic. of Artif. Intel., 34:122 -- 136.
Hanna, L. and Cagan, J. (2009). Evolutionary multi-agent systems: An
adaptative and dynamic approach to optimization. J. of Mechanical
Design, 131:011010 -- 8 -- 011010 -- 1.
Karmani, R. K., Latvala, T., and Agha, G. (2007). On scaling multi-agent
task reallocation using market-based approach. In Proc. 1st Int. Conf.
on Self-Adaptive and Self-Organizing Systems (SASO'07), Boston, MA,
USA.
Kivelevitch, E., Cohen, K., and Kumar, M. (2013). A market-based so-
lution to the multiple traveling salesmen problem. J. Intel. & Robotic
Sys., 72:21 -- 40.
M´ahr, T., Srour, J., de Weerdt, M., and Zuidwijk, R. (2010). Can agents
measure up? A comparative study of an agent-based and on-line opti-
mization approach for a drayage problem with uncertainty. Transporta-
tion Research - Part C, 18:99 -- 119.
Mes, M., van der Heijden, M., and van Harten, A. (2007). Comparison
of agent-based scheduling to look-ahead heuristics for real-time trans-
portation problems. Eur. J. of Operational Research, 181(0):59 -- 75.
Miller, C. E., Tucker, A. W., and Zemlin, R. A. (1960).
Interger pro-
gramming formulation of traveling salesmen problems. J. Association
of Computing Machinery, 7:326 -- 9.
Mintzberg, H. (1978). The Structuring of Organizations: A Synthesis of
the Research. Englewood Cliffs, N.J.: Prentice-Hall.
Moyaux, T. and McBurney, P. (2012). Centralised vs. market-based
and decentralised decision-making: A review. Cybernetics & Systems,
43(7):567 -- 622.
Rao, M. R. (1971). Cluster analysis and mathematical programming. J.
of the American Statistical Association, 66(335):622 -- 626.
31
Sallez, Y., Berger, T., Raileanu, S., Chaabane, S., and Trentesaux, D.
(2010). Semi-heterarchical control of FMS: From theory to application.
Eng. Applic. Artif. Intell., 23:1314 -- 1326.
Sarraj, R., Ballot, E., Pan, S., Hakimi, D., and Montreuil, B. (2014). Inter-
connected logistic networks and protocols: Simulation-based efficiency
assessment. Int. J. Production Research, 52(11):3185 -- 3208.
Saglam, B., Salman, F. S., Sayn, S., and Turkay, M. (2006). A mixed-
integer programming approach to the clustering problem with an ap-
plication in customer segrmentation. Eur. J. of Operational Research,
173:866 -- 879.
Smith, R. G. (1980). The contract net protocol: High level communication
and control in distributed problem solver. IEEE Trans. on Computers,
C-29(12):1104 -- 1113.
Talbi, E.-G. (2006). Parallel Combinatorial Optimization. Wiley.
van Lon, R. R. S. and Holvoet, T. (2015). Towards systematic evalu-
ation of multi-agent systems in large scale and dynamic logistics.
In
Proc. 18th Inter. Conf. Principles and Practice of Multi-Agent Systems
(PRIMA 2015), Bertinoro, Italy.
Xie, X.-F. and Liu, J. (2009). Multiagent optimization system for solving
IEEE Trans. Syst., Man, and
the traveling saleman problem (TSP).
Cybernetics -- Part B: Cybernetics, 39(2):489 -- 502.
32
|
1711.07510 | 2 | 1711 | 2018-03-20T14:38:08 | Robust Environmental Mapping by Mobile Sensor Networks | [
"cs.MA"
] | Constructing a spatial map of environmental parameters is a crucial step to preventing hazardous chemical leakages, forest fires, or while estimating a spatially distributed physical quantities such as terrain elevation. Although prior methods can do such mapping tasks efficiently via dispatching a group of autonomous agents, they are unable to ensure satisfactory convergence to the underlying ground truth distribution in a decentralized manner when any of the agents fail. Since the types of agents utilized to perform such mapping are typically inexpensive and prone to failure, this results in poor overall mapping performance in real-world applications, which can in certain cases endanger human safety. This paper presents a Bayesian approach for robust spatial mapping of environmental parameters by deploying a group of mobile robots capable of ad-hoc communication equipped with short-range sensors in the presence of hardware failures. Our approach first utilizes a variant of the Voronoi diagram to partition the region to be mapped into disjoint regions that are each associated with at least one robot. These robots are then deployed in a decentralized manner to maximize the likelihood that at least one robot detects every target in their associated region despite a non-zero probability of failure. A suite of simulation results is presented to demonstrate the effectiveness and robustness of the proposed method when compared to existing techniques. | cs.MA | cs | Robust Environmental Mapping by Mobile Sensor Networks
Hyongju Park, Jinsun Liu, Matthew Johnson-Roberson and Ram Vasudevan
8
1
0
2
r
a
M
0
2
]
A
M
.
s
c
[
2
v
0
1
5
7
0
.
1
1
7
1
:
v
i
X
r
a
Abstract- Constructing a spatial map of environmental pa-
rameters is a crucial step to preventing hazardous chemical
leakages, forest fires, or while estimating a spatially distributed
physical quantities such as terrain elevation. Although prior
methods can do such mapping tasks efficiently via dispatching
a group of autonomous agents, they are unable to ensure satis-
factory convergence to the underlying ground truth distribution
in a decentralized manner when any of the agents fail. Since the
types of agents utilized to perform such mapping are typically
inexpensive and prone to failure, this results in poor overall
mapping performance in real-world applications, which can
in certain cases endanger human safety. This paper presents a
Bayesian approach for robust spatial mapping of environmental
parameters by deploying a group of mobile robots capable of
ad-hoc communication equipped with short-range sensors in
the presence of hardware failures. Our approach first utilizes
a variant of the Voronoi diagram to partition the region
to be mapped into disjoint regions that are each associated
with at least one robot. These robots are then deployed in a
decentralized manner to maximize the likelihood that at least
one robot detects every target in their associated region despite
a non-zero probability of failure. A suite of simulation results
is presented to demonstrate the effectiveness and robustness of
the proposed method when compared to existing techniques.
I. INTRODUCTION
This paper studies environmental mapping via a team
of mobile robots equipped with ad-hoc communication and
sensing devices which we refer to as a Mobile Sensor
Network (MSN). In particular, this paper focuses on the
challenge of trying to estimate some unknown, spatially
distributed target of interest given some a priori measure-
ments under the assumption that each robot in this net-
work has limited sensing/processing capabilities. MSNs have
been an especially popular tool to perform environmental
mapping due to their inexpensiveness which enables large-
scale deployments [1]–[6]; however, this economical price-
point betrays their susceptibility to hardware failures such
as erroneous sensor readings. This paper aims to develop
a class of cooperative detection and deployment strategies
that enable MSNs to autonomously and collectively obtain
an accurate representation of an arbitrary environmental map
efficiently while certifying robustness to a bounded number
of sensor failures.
Few methods have been proposed to accurately perform
environmental mapping using a large number of mobile
robots that can guarantee robustness to hardware failures
while making realistic assumptions about a MSN. For ex-
ample, one of the most popular methods for addressing
*This work was supported by Ford Motor Company
Hyongju Park, Jinsun Liu, Matthew Johnson-Roberson, and Ram Va-
sudevan are at the University of Michigan, Ann Arbor, MI, 48109 USA
{hjcpark,jinsunl,mattjr,ramv}@umich.edu.
Fig. 1: An illustration of the application of the robust, mobile sensor network
deployment and reconstruction algorithm developed in this paper (top right,
robots are shown in stars, robots with failed sensors are shown in red, sensor
footprints are drawn in dotted lines, and the partition is drawn as polygons)
when applied to 100 robots that are trying to build an elevation map of a
mountainous region in Oregon USA (top left) when 20 sensors have failed
(red stars). Despite the sensor failures, the root mean square error of the
reconstructed map when compared to the ground truth using the method
presented in this paper (bottom right) is significantly better than existing
methods (bottom left).
environmental mapping via MSNs has utilized the notion
of mutual information to design controllers that follow an
information gradient [2]–[5]. These approaches focus on
linear dynamics and Gaussian noise models. Recently this
technique was utilized to enable MSNs to estimate a map of
finite events in the environments while avoiding probabilistic
failures that arose due to nearby encounters with unknown
hazards [2]. The computational complexity for computing
this information gradient is exponential in the number of
robots, sensor measurements, and environmental discretiza-
tion cells [2], [5]. More problematically, the computation
of the gradient requires that every robot be omniscient, i.e.,
have current knowledge of every other robots position and
sensor measurements. For this reason, mutual information-
based methods are generally restricted to small groups of
robots with fully connected communication networks which
has limited their potential real-world application.
To overcome this computational complexity related prob-
lem, others have focused on devising relaxed techniques
to perform information gathering. For instance, some have
proposed a fully decentralized strategy where the gradient
of mutual information is used to drive a network of robots
to perform environmental mapping [5]. To improve com-
putational efficiency they relied on a sampling technique;
however this restricted their ability to perform mapping of a
general complex environment instead they focus on cell en-
vironments. Others have tried to develop particle filter based
techniques to enable the application of nonlinear and non-
Gaussian target state and sensor models while approximating
the mutual information [7]. This method is shown to localize
a target efficiently. However this approach still assumes the
existence of a centralized algorithm to fuse together the
information from multiple sensors.
In addition, this paper presents a novel combined sensor
model that assigns different weights to robots by taking into
account the spatial relationship between robots and a target
state. This detection model is based on a classical binary
Rather than rely on the information gradient, others have
employed algorithms that use information diffusion through
communication network for environmental modeling [6]. By
utilizing the Average Consensus filter to share information
among the robots in the network, this approach is scalable
to large numbers of agents, is fully decentralized, and can
even work under a switching network topology as long
as the network is connected; however the approach is not
spatially distributed and requires an additional connectivity
maintenance algorithm [8] to ensure its convergence.
This paper presents a class of computationally efficient,
scalable, decentralized deployment strategy that is robust to
sensor failures. We employ classical higher order Voronoi
tessellation [9] to achieve a spatially distributed allocation
of MSNs for efficient environmental mapping. In particular
each region from the partition is assigned to multiple robots
to provide robustness to sensor failures. Although others
have employed ordinary Voronoi tessellation for robot-target
assignment towards efficient information gathering [3], [10]–
[12], these approaches are not guaranteed to converge to an
underlying distribution in the case of even a single sensor
failure [13]. To best of our knowledge, almost all studies
about environmental mapping by MSNs have not take into
account such adversarial scenarios, nor presented perfor-
mance guarantees in terms of convergence to some ground
truth value. In addition, we consider a broad class of sensor
failures which are not restricted to just failures associated
with proximity to a hazard. Our cost function is the likeli-
hood that the MSN will fail to make reliable measurement
of the spatially distributed environmental parameters. We
use gradient descent on the cost to design a decentralized
deployment strategy for the MSN. By doing so, each robot
can compute its gradient using merely local
information
without requiring communication with a central server. In
this paper, a central entity is only required to fuse and update
the information gathered from MSNs, but not to generate
control policies for robots as in typical mutual information
gathering approaches [2], [5]. To generate an estimate for the
underlying target distribution of the environment, this paper
employs a particle filter with low discrepancy sampling.
model that depends on the configuration of robots [14], [15].
To connect the detection model to the measurement model
we rely on a nonrestrictive assumption that if a robot fails to
discern one target from another, it may not provide the cor-
rect sensor reading for the target. This assumption is similar
to one used in a previous approach that also built a combined
sensor model that was experimentally verified with the laser
range finder and a panoramic camera measurement [16].
This sensor model enables one to decouple the information
state from the detection task, which can make computing
the gradient computationally sound with a complexity that
is linear with respect to the number of sensors.
The main contributions of this paper are three-fold: First,
we adopt a higher order Voronoi tessellation for optimal
robots-to-target assignment to provide robustness under a
general class of sensor failures whose number is bounded.
Second, we present a novel sensor model, to remove the
computational burden of maintaining mutual information in
MSNs by decoupling information gathering and detection,
while ensuring satisfactory mapping performance. Finally,
we propose a scalable, spatially distributed, computationally
efficient, decentralized controller for MSNs which can per-
form environmental mapping task rapidly.
Organization: The rest of the paper is organized as fol-
lows. Section II presents notation used in the remainder of
the paper, formally defines the problem of interest. Section
III presents our combined probabilistic sensor model, and
the deployment strategy is formally presented in Section IV.
Section V discusses an approximate belief update method
via particle filters. The robustness of our deployment and
effectiveness of the belief update approach is evaluated via
numerical simulations in Sections VI. Finally, Section VII
concludes the paper.
II. PROBLEM DESCRIPTION
This section presents the notation used throughout the
paper, an illustrative example, and the problem of interest.
A. Notations and Our System Definition
The italic bold font is used to describe random quantities,
a subscript t indicates that the value is measured at time
step t, and Z≥0 denotes non-negative integers. Given a
continuous random variable x, if it is distributed according
to a Probability Density Function (PDF), we denote it by
fx. Given a discrete random variable y, if it is distributed
according to a Probability Mass Function (PMF), we denote
it by py. Consider a group of m mobile robots deployed in
a workspace, i.e., ambient space, Q ⊆ Rd where d = 2, 3.
This paper assumes d = 2 though the presented framework
generalizes to d = 3. Let Sd−1 = {s ∈ Rd (cid:107)s(cid:107) = 1} be
a unit circle/sphere, then the state of m robots is the set of
locations and orientations at time t, and it is represented as
t ∈ Q × Sd−1. The
an m-tuple xt = (x1
state of robots are assumed completely known. We denote
by the set x0:t := {x0, . . . , xt} the robot states up to time t.
We assume that subsequent states satisfy some controlled
dynamical system where ut ∈ U ⊆ Rd is the control that
t ), where xi
t , . . . , xm
to xt+1. We define a target
takes a system from xt
to
be a physical object or some measurable quantity that is
spatially distributed over a bounded domain. Let z be the
random vector representing target state which consists of
locations, q ∈ Q, and an information state (i.e., quantitative
information about the target), I ∈ I ⊆ R where we let
I = [Imin, Imax]. We define Z = Q × I as the target state
space. Finally, we let F (cid:40) {1, . . . , m} be the index set of
robots whose sensors have failed.
Example 1 (Airborne LIDARs for DEM generation):
Consider a group of autonomous aerial vehicles trying to
acquire an accurate Digital Elevation Model (DEM)1 of
some bounded region using airborne LIDAR measurements.
Suppose the state of the robot is some 2D location at some
fixed height above the terrain. In this instance, the target
state space would be made up of a longitude and latitude,
q ∈ Q and an elevation at that point which belongs to the
set I ⊂ R. This paper explores how to determine the best
way to deploy a finite number of agents to minimize the
probability that they fail to detect a set of targets dispersed
over a region. Unfortunately,
the LIDAR measurements
from a part of the fleet may be corrupt or unreliable. To
ensure that we can guarantee the optimal target detection
performance in adversarial scenarios, we develop a robust
deployment strategy. Subsequently, this paper explores how
to efficiently reconstruct the terrain map (i.e. the distribution
over the target state space) from a set of deployed robots.
B. Robust Deployment Strategy
D,txt, q, . . . , ym
Suppose we are given z ∈ Z,
t z, . . . , ym
then we let ytz =
t z) be a binary random m-tuple which indi-
(y1
cates whether an observation is made by m robots at time
tz ∈ {0, 1} for
step t at a given target state z, where yi
each i. Let the set y1:tz := {y1z, . . . , ytz} denote the
observations made by robots up to time t. For a given
q ∈ Q and robot state xt ∈ Q × S1, let yD,txt, q :=
D,txt, q) be a binary random m-tuple
(y1
which indicates whether m robots with state xt are able to
D,txt, q ∈ {0, 1} for
detect a target located at q. We let yi
each i. We let p(yD,t = 0 xt, q = q) be the probability
of a joint event that a group of m robots with location and
orientation given by xt fail to detect a target at time t if it
is located at q, where 0 is an m-tuple of zeros. For the case
when each sensor belonging to the index set F has failed
at time t, our aim is to find an optimal configuration that
solves:
p(yD,t = 0 xt)
min
xt∈Qm
s.t. p(yD,t = 0 xt, q = q,F) < 1,
(1)
where a given F and a target, there must be at least one robot
that is able to make a reliable measurement. Unfortunately,
obtaining the global solution to this problem is proven to be
NP-Hard by reduction from the simpler static "locational"
∀q ∈ Q,
1A digital elevation model (DEM) is a digital 3D model of a terrain's
surface created from terrain elevation data.
optimization problem, the m-median problem2. To overcome
the computational complexity, we apply a gradient descent
approach where the control policy at each time step mini-
mizes the missed-detection probability of targets by robots
at their future locations (one-step look-ahead). We utilize the
higher order Voronoi tessellation for robot target assignment,
which guarantees that the solution to (1) is found under such
an assignment [9].
C. Combined Sensor Model
We assume that a sensor can correctly measure a given
the target a priori.
target only if the sensor can detect
We further assume that, if a sensor can detect a target, a
measurement of the target by the sensor may be corrupted by
noise. These assumptions have been experimentally validated
for example on a mobile robot that uses a laser range finder
and a panoramic camera measurement [16].
D. Evaluation of Mapping Performance
We derive a particle filter to recursively update approx-
imate beliefs on a particular unknown environment. Let bt
represent the approximate posterior probability distribution
of the target state at time t ∈ Z≥0, the initial belief b0 is
assumed to be a uniform density if no prior information on
the target is available. We let b(cid:63) be the PMF estimate of the
true posterior belief 3. To this end, we quantify the difference
between the true posterior belief, b(cid:63) and our method via
the Kullback-Leibler (K-L) divergence. We demonstrate via
a suite of numerical simulations in Section VI that for a
given > 0 and F (cid:54)= ∅, there is a T > 0 such that if
robots use the proposed deployment strategy, t > T implies
DKL(btb(cid:63)) < .
III. PROBABILISTIC RANGE-LIMITED SENSOR MODEL
This sections present our combined sensor model. Each
mobile robot is equipped with a range-limited sensor that
can measure quantitative information from afar and a radio to
communicate with other nodes to share its belief. We assume
that a sensor can correctly measure a given target only if
the sensor can detect the target a priori, and if a sensor can
detect a target, a measurement of the target by the sensor may
be corrupted. The combined sensor model joins the generic
noisy sensor model with the binary detection model which
generalizes existing methods [14]–[16] to large-scale MSNs.
In fact, this combined sensor model has been experimentally
validated during an object mapping and detection task using
a laser scanner [16]. We postulate that this model is general
enough to model other range-limited sensors as long as
the sensor is capable of distinguishing the target from the
environment and has uniform sensing range, i.e. 360-degree
camera, wireless antenna, Gaussmeter, heat sensor, olfactory
2The m-median problem is one of the popular locational optimization
problems where the objective is to locate m facilities to minimize the
distance between demands and the facilities given some uniform prior. The
problem is NP-Hard for a general graph (not necessarily a tree).
3We shall assume, for the sake of discussion, that the true posterior target
distribution can be obtained, e.g., via exhaustive search and measurements
made by a MSN.
receptor, etc. While performing the detection task, we assume
that each sensor returns a 1 if a target is detected or 0
otherwise. The ability to detect a target for each ith robot at
time t is a binary random variable yi
D,t with a distribution
that depends on the relative distance between the target
and robot. This binary detection model, however, does not
account for false positive or negatives. For example, the
probability of the event that all m sensors with configuration
xt fail to detect the target located at q ∈ Q is:
p (yD,t = 0 xt, z = (q, I)) =
p(cid:0)yi
D,t = 0 xt, q = q(cid:1) .
m(cid:89)
i=1
For measuring a quantity of interest from a given environ-
ment, we consider a generic, noisy sensor model, where each
sensor reports binary output given a target state consisting
of information and location. The likelihood function at time
t is:
p(yt = 1 xt, z = (q, I)),
(2)
which is the probability that ith robot measured the target
with intensity value of I at location q, i.e., positive mea-
surement. A general example of the likelihood function is a
Gaussian, ωN (I (cid:63), σ2
I ) where I (cid:63) the ground truth intensity
I is the variance of the intensity at the target
value at q, σ2
located at q, and ω is a normalization constant. Note that
since the observations made by m robots are independent,
p(yt = 1 xt, z = (q, I)) =
t = 1 xt, z = (q, I)),
m(cid:89)
p(yi
i=1
or (2) can also be obtained via other distributed sensor fusion
techniques (see e.g., [17]). In our sensor model, we assume
that at each t, the random vector yt depends on yD,t, so that
the conditional PDF can be computed as:
p(yt = 1 xt, z)
=p(yt = 1 xt, yD,t (cid:54)= 0, z) p(yD,t (cid:54)= 0 xt, z)
+p(yt = 1 xt, yD,t = 0, z) p(yD,t = 0 xt, z),
D,t = 1 and yD,t = 0 means yj
(cid:54)= 0 means there is j ∈ {1, . . . , m} such
where yD,t
that yj
D,t = 0 for all
j ∈ {1, . . . , m}. If the target cannot be detected,
i.e.,
yD,t = 0, the measurement is taken as random and the
likelihood function is modeled by uniform distribution, i.e.,
p(yt = 1 z, xt, yD,t = 0) = U(I) supported on an interval
I = [Imin, Imax]. By the law of total probability,
p(yt = 1 xt, z) = (1 − p(yD,t = 0 xt, z)
)
(cid:124)
(cid:123)(cid:122)
× p(yt = 1 xt, yD,t (cid:54)= 0, z)
+U(I) p(yD,t = 0 z, xt)
.
likelihood of reliable measurements
For the given target z ∈ Z, by minimizing ((cid:63)), the prob-
ability of missed-detection, one can ensure that the reliable
measurements on the target state has been given more weight
than the unreliable ones.
(cid:124)
(cid:125)
(cid:123)(cid:122)
((cid:63))
(cid:124)
(cid:125)
(cid:123)(cid:122)
((cid:63))
(cid:125)
IV. DEPLOYMENT STRATEGY
This section presents a class of deployment strategies
for target detection capable of providing relative robustness.
At each time, m robots move to new locations so as to
minimize the missed-detection probability to promote the
next observations. Since the set of robots with faulty sensors
is unknown, we chose not to pose our problem to deal
with the worst-case sensor failure scenarios which could be
too conservative (e.g., the probability that multiple sensors
fail at the same time is low). Instead, we adopt a provably
optimal robot–target assignment method which can ensure
that every target will be detected by at least one robot. This
so called partitioned-based deployment is common to multi-
robot coverage problems [13], [18], [19]. The most popular
one is based on the Voronoi tessellations (see e.g., [18],
which we call a non-robust deployment). There are, in fact
more general methods, which partition the workspace into
l regions and assign k ∈ {1, . . . , m} robots at each region
(note that if k = m, the method becomes centralized) [13].
By doing so, one can ensure that each target has a chance to
be detected by at least one of the k sensors. This approach,
which we call the robust deployment, can provide relative
robustness by varying the value of k from 2 to m.
A. The Higher-Order Voronoi Partition for Robust Deploy-
ment
Recall
that given F, we want
to ensure that at
least
one robot is detecting each target. One possible way of
handling such robot–target assignment problem is the k-
coverage method [20] which will guarantee that every target
is covered by at least k sensors. Another way is to use
the higher order Voronoi partition, under which, for a given
number of sensors (generators), exactly k number of sensors
are assigned to every region from the partition. As long as
k ≥ f +1, if either of the two methods is used for the robot–
target assignment, the constraint from (1) will be satisfied.
Due to the bounded availability of sensor nodes, we will
adopt the second approach in this study.
Consider m sensors and a workspace partition of Q into
l disjoint regions W = (W 1, . . . , W l), where ∪iW i = Q,
and W i ∩ W j = ∅ for all i (cid:54)= j. Suppose the target location
is a random variable q with a PDF, fq : Q → R≥0. For
a given target at q ∈ Q, we define the probability that a
sensor located at xi ∈ Q can detect target, by using a real-
valued function h((cid:13)(cid:13)q − xi(cid:13)(cid:13)) as a probability measure, which
is assumed to decrease monotonically as a function of the
distance between the target and the ith sensor. Consider a
bijection kG that maps a region to a set of k-points where the
pre-superscript k explicitly states that the region is mapped
to exactly k points. Additionally we make the following
definitions:
Definition 1 (An Order−k Voronoi Partition [9]): Let x
be a set of m distinct points in Q ⊆ Rd. The order-k Voronoi
partition of Q based on x, namely kV , is the collection of
regions that partitions Q where each region is associated with
the k nearest points in x.
(cid:90)
Note that there is an O(k2n log n) algorithm [21] to construct
the order-k Voronoi diagram for a set of n points in R2.
We define another bijection kG(cid:63) that maps a region to a
set of k nearest points (out of x) to the region. The total
probability that all m sensors fail to detect a target drawn
by a distribution fq from Q is:
Q
pyDx,q (yD = 0 x, q = q) fq(q) dq.
(3)
By substituting Q with the workspace partition W , and
pyDx,q (yD = 0 x, q = q) with h, we have
l(cid:88)
H(x, W, kG) :=
(cid:0)1 − h(cid:0)(cid:13)(cid:13)q − xi(cid:13)(cid:13)(cid:1)(cid:1) fq(q) dq
(cid:89)
(cid:90)
(4)
j=1
W j
xi∈kG(W j )
where we note again that the joint missed-detection events
are conditionally independent, if conditioned on x. In fact,
the order-k Voronoi tessellation is the optimal workspace
partition which minimizes H for each choice of x and k:
x
H(x, kV, kG(cid:63)) ≤ H(x, W, kG) for all W , kG.
Note that the order-k Voronoi partition Vk, along with the
map kG(cid:63) are uniquely determined given x, fq, and Q.
Theorem 1 ( [19]): For
given
and
k,
a
In addition, we introduce an additional constraint for the
model, the effective sensing radius, reff > 0, to take into
account the fact that each sensor has its own maximum
sensing range. For a given k, x, i, and the target at z = (q, I),
our range-limited binary detection model in its final form
becomes:
(cid:0)yi
D = 1 x, q = q(cid:1)
(cid:40)
h(cid:0)(cid:13)(cid:13)q − xi(cid:13)(cid:13)(cid:1) ,
Dq,x
pyi
=
0,
if q ∈ kG(cid:63)(xi) ∩ B(xi, reff),
otherwise,
where B(p, r) is an open ball with radius r centered at p.
B. Gradient Algorithm for Deployment
This section will present gradient descent-based deploy-
ment strategy. Given the current configurations, robots solve
decentralized counterpart of the original problem (1), move
towards the solution, and the posterior belief is updated at
robots' new locations given the information collected from
their sensors. By using fq, and (4), for a given xt, we want
to obtain the next way-point x(cid:63)
t by
where L(xt) takes the identical form as (4) by adding
subscript t to xis and W is. If h is differentiable, our
deployment strategy can use the gradient ∇L(xt) =
(cid:105)
, . . . , ∂L(xt)
∂xt
m
where for each i,
(cid:104) ∂L(xt)
∂xt
1
(cid:40)
t ← arg min
(cid:90)
x(cid:63)
(cid:89)
l(cid:88)
xt
j=1
W j
t
t∈kG(cid:63)(W j
xi
t )
L(xt) :=
(cid:0)1 − h(cid:0)(cid:13)(cid:13)q − xi
t
(cid:41)
(cid:13)(cid:13)(cid:1)(cid:1) fq(q) dq
.
(5)
∂L(xt)
∂xi
t
= − (cid:88)
× (cid:89)
W
j∈{1,...,l}:
t ∈k G(cid:63)−1(xi
j
t)
(cid:13)(cid:13))
∂h((cid:13)(cid:13)q − xi
(cid:90)
(cid:13)(cid:13)(cid:1)(cid:1) fq(q) dq,
(cid:0)1 − h(cid:0)(cid:13)(cid:13)q − xi
∂xi
t
W j
t
t
t
l∈{1,...,m}:
t∈k G(cid:63) (W
xl
t ),l(cid:54)=i
j
to find the desirable way-points of the robots as described
in Algorithm 1. For each t, Algorithm 1 uses coordinate
gradient descent in cyclic fashion4 to converge to a sub-
optimal solution, namely, x(cid:63)
t .
Algorithm 1: Gradient Algorithm
Input: Lk, xt, > 0
Output: x(cid:63)
k ← 0, ∆ ←
t
while ∆ > do
foreach i ∈ {1, . . . , m} do
∆ ← Lk(xt,k) − Lk(xt,k+1)
k ← k + 1
t ← xt,k, return x(cid:63)
x(cid:63)
t
t,k+1 ← xi
xi
t,k is a step-size obtained using a line search method
// αi
t,k∇iLk(xt,k)
t,k − αi
V. IMPLEMENTATION: ENVIRONMENTAL MAPPING
In this section, we first introduce Bayesian filtering equa-
tions for our particular target distribution, and then present a
particle filter to reduce the complexity of the map construc-
tion process.
A. Recursive Bayesian Filter
We present a brief overview of the Bayesian filter, and
the derivation of the filtering equations for our primary
goal: environmental mapping by m robots. Recall that bt(z)
represent a belief on target state-the posterior probability
distribution of the target state described by a random vector
z ∈ Z-at time t ∈ Z≥0. In a similar manner, the belief of
target information state I given the target located at q is
bt(I q = q) = fIb0,x0:ty1:t,q (I b0, x0:t, y1:t, q = q) (6)
where we denote the initial belief on target state by b0. The
belief on the complete target state z is:
bt(z) = fzb0,x0:t,y1:t (z b0, x0:t, y1:t) = bt(I q = q)fq(q).
(7)
In our problem, the observation yt is conditionally indepen-
dent of b0, y1:t−1, and x0:t−2 when it is conditioned on z
and xt. Applying Bayes' Theorem, (6) becomes:
bt(I q = q) =
ηt fytz,xt (yt = 1 z = (I, q), xt) bt−1(I q = q)
(8)
4A general version of Algorithm 1, which uses block coordinate descent,
has been shown to be convergent using the Invariance Principle [19].
:= (cid:0)fytq,b0,xt (yt = 1 q = q, b0, xt)(cid:1)−1 is a
(cid:32) t(cid:89)
where ηt
normalization constant. By joining the (7) and (8), one can
obtain a simplified form of the filtering equation:
(cid:33)
bt(z) = ηt fytz,xt (yt = 1 z, xt) bt−1(z)
ηifyiz,xi (yi = 1 z, xi)
b0(z).
=
i=1
B. Belief Approximation via SIR Particle Filter
For our numerical simulations, we consider a low dis-
crepancy sampling method, namely, Halton-Hammersley se-
to sample continuously distributed targets in Z.
quence,
This approach has been used for sampling-based algorithms
for robot motion planning [22]. We consider Sequential
Importance Resampling (SIR) for the particle filtering pro-
cess. For a given distribution on target locations, fq(q), at
each time t, based on the observations, the locations belief
hypothesis is populated for N1 samples initially generated
with Halton-Hammersley sequence. In a similar manner,
for each sample qi
the information belief hypothesis is
populated for N2 samples from I initially generated by the
Halton-Hammersley sequence. q1, . . . , qN1 Thus, for each
i ∈ {1, . . . , N1}, j ∈ {1, . . . , N2},
(cid:101)wij
t ∝ fytzt,xt(yt = 1 xt, z = (qi, I ij)).
:= (qi, I ij
{{(zi1,(cid:101)wi1
t ), then the collection of N := N1×N2
t ), . . . , (ziN2,(cid:101)wiN2
If we let zij
t
tuples-where each tuple is a particle-weight pair-is:
where for each t and i = 1, . . . , N1, (cid:80)N2
)}i∈{1,...,N1}}
j=1 (cid:101)wij
t = 1. After
resampling and normalizing, the approximate belief becomes
t
N(cid:88)
bt(z) =
t δ(z − zk)
wk
where the w1
such that(cid:80)N
t , . . . , wN
t
k=1 wk
k=1
are resampled, normalized weight
t = 1, and δ(z−zk) is Dirac-delta function
evaluated at zk. The whole filtering process is depicted in
Algorithm 2. Note that as discussed in previous studies [23],
our particle filter uses a standard re-sampling scheme to
ensure the convergence of the mean square error toward zero
with a convergence rate of 1/N2 for all q ∈ Q.
VI. NUMERICAL SIMULATIONS
a
rectangular
This section presents a suite of numerical simulations
to validate both our sensor model and deployment strategy
under sensor failures.
Simulation Settings: Let Q be
space
[42.00, 41.51] × [−73.49,−72.83] in R2 which corresponds
to a mountainous region in Connecticut, U.S.A, where each
coordinate corresponds to latitude and longitude, respec-
tively. We let I = [−1000, 4000] be a range of elevations
in feet. Targets are uniformly distributed over Q, and the
ground truth target information over Q is depicted in Fig.
4 (right). The robots have no prior knowledge of the target
information. A number of particles used for the SIR filter
Algorithm 2: Filtering Algorithm
Input: bt−1 = {zl, wl
Output: bt
// SIR Particle Filter
// 1) Update using the observation model
foreach i ∈ {1, . . . , N1} do
t−1}N
l=1, yt, xt, Irange
foreach j ∈ {1, . . . , N2} do
(cid:101)wij
t ← pyD,tq,xt (yD,t = 0 q = qi, xt)(I−1
t−1fytz,xt,yD,t (yt = 1 z = zij
wij
0)) + wij
t−1fytz,xt,yD,t (yt = 1 z, xt, yD,t (cid:54)= 0)
range −
t , xt, yD,t (cid:54)=
l=1)
l=1
wi
l=1)
t}N
t}N
t−1}N
t−1}N
t}N
l=1, {wl
t}N
l=1, {wl
// 2) Resample and Normalize
{wl
return bt ← {zl, wl
// Low Variance Resampling [24]
forall i ∈ {1, . . . , N} do
l=1 ← Resample({(cid:101)wl
function Resample({(cid:101)wl
t ← (cid:101)wi
(cid:80)N
i=1 (cid:101)wi
t·wi
t−1
t·wi
δ ← rand((0; N
cdf ← 0, k ← 0, cj ← [] for all j
for j = 0, j < N2 do
u ← δ + j · N2
−1
while u > cdf do
k ← k + 1
cdf ← cdf + wik
foreach i ∈ {1, . . . , N1} do
−1
2 ))
t−1
t
for j = 1; j ≤ N2 do
cj+1 ← k
t ← cj
wij
N2
return bt = {zl, wl
t}N
l=1
TABLE I: Summary of deployment methods considered in current section.
algorithm type:
non-robust
robust (k = 2)
max. information gain
gradient computation
fully decentralized
decentralized
centralized
related studies
[3], [10], [11]
current paper
[1], [2], [4]–[6]
is N = N1 × N2 = 5000 × 100. We consider Gaussian
distribution to for both the perception and the detection
model. Each sensor's measurement noise covariance matrix
is ΣI = 0.5I, and the binary detector's noise covariance
matrix is ΣB = 0.04I where I ∈ Rd×d is an identity
matrix. In our simulation, we compare the three methods
summarized in Table I.
Convergence of Our Deployment Strategy: First, the behavior
of the deployment strategy is discussed. Given a uniform
initial prior belief and an initial configuration at t = 0
(Fig. 2 (top-left)), three algorithms, summarized in Table
I, were tested. Fig. 2 shows positions of robots after the
T number of iterations with (a) the non-robust method
and (b) robust method (k = 2). Fig. 3(a) compares the
convergence speeds between the three methods. The cost on
the y-axis corresponds to the probability of missed detection.
Notice that the maximum information algorithm has a lower
cost, but it relies on a centralized scheme that is typically
impossible to realize in practice.
Environmental Mapping/Filtering Performance Without Sen-
randomly chosen initial configuration, with different fault
compositions well. Fig. 7 shows a distribution of K-L di-
vergence values at t = 10 for 100 test examples consisting
of random initial configurations with uniformly sampled
number of faults between 1 and 5 with 10 robots.
Scalability of our Method: Fig. 3 shows an example with 100
robots (with 20 sensors failures) where the robust method
outperforms the non-robust method. This is due to the
presence of central information fusion server which requires
a full communication throughout the MSN. This is typically
infeasible in real-world applications.
VII. CONCLUSIONS AND FUTURE WORK
This paper presents a deployment strategy for a mobile
sensor network to enable the recovery of an environmental
map over a bounded space in a manner that is robust to sensor
failures. We plan to employ multi-agent patrolling [12], [25]
or sweep coverage [26] to resolve problems associated with
not having enough sensors to fully cover a target space. Also,
as reported in the literature [16], our combined sensor model
has been adopted to emulate the real-world laser scanner's
behavior; nevertheless, we plan to conduct extensive real
world multi-robot experiments for further validation of our
range sensor model.
Fig. 2: An illustration of the convergence of two different deployment
strategies, top: non-robust, bottom: robust (k = 2) (stars: positions of robots,
polygons: partition).
(a)
(b)
Fig. 3: (a) convergence test for one-time deployment with different methods,
(b) comparison of K-L divergence values between different methods.
REFERENCES
sor Failure: Next, we present the evolution of the belief to
build an estimate of the elevation map after the deployment
strategy has been completed. Fig. 3(b) compares the K-L
divergence values between the different strategies during the
filtering process. While the maximum information gain ap-
proach shows the best result, the robust deployment strategy
has competitive mapping performance relative to the ground
truth despite being a decentralized approach.
Robustness to Sensor Failure: We next present several ex-
amples with varying numbers of sensor failures wherein the
robust method clearly illustrates appealing behavior when
compared to its less robust counterparts. In this experi-
ment, the number of sensor failures was varied by F ∈
{{1}, {1, 2}, {1, 2, 3}}. Results for robots configuration and
target distributions after the 10th step with the non-robust,
robust, and maximum information methods in the case
when F = {1} are shown in Fig. 5. Fig. 4 shows the
time evolutions of root-mean-square error (RMSE) between
constructed map and the ground truth map for the non-robust
(top) and robust (bottom) methods when F = {1, 2, 3}. Fig.
6 compares the K-L divergence between different methods
when F was varied between 1 and 3. As can be seen from
Fig 5–6, the map retrieved by the proposed method when
k = 2 is consistently more robust to sensor failure when
compared to existing methods. Note in Fig 5 (middle and
right) the unmapped area is due to the limited sensing range.
Statistical Results with Varying Initial Conditions and Fault
Compositions: Statistical results shows that our method can
be used to estimate an arbitrary target distribution given a
[1] D. Connor, P. Martin, and T. Scott, "Airborne radiation mapping:
overview and application of current and future aerial systems," Inter-
national Journal of Remote Sensing, vol. 37, no. 24, pp. 5953–5987,
2016.
[2] M. Schwager, P. Dames, D. Rus, and V. Kumar, "A multi-robot control
policy for information gathering in the presence of unknown hazards,"
in Robotics Research. Springer, 2017, pp. 455–472.
[3] R. A. Cortez, H. G. Tanner, R. Lumia, and C. T. Abdallah, "Infor-
mation surfing for radiation map building," International Journal of
Robotics and Automation, vol. 26, no. 1, p. 4, 2011.
[4] C. D. Pahlajani, I. Poulakakis, and H. G. Tanner, "Networked decision
making for poisson processes with applications to nuclear detection,"
IEEE Transactions on Automatic Control, vol. 59, no. 1, pp. 193–198,
2014.
[5] B. J. Julian, M. Angermann, M. Schwager, and D. Rus, "Distributed
robotic sensor networks: An information-theoretic approach," The
International Journal of Robotics Research, vol. 31, no. 10, pp. 1134–
1154, 2012.
[6] K. M. Lynch, I. B. Schwartz, P. Yang, and R. A. Freeman, "Decen-
tralized environmental modeling by mobile sensor networks," IEEE
Transactions on Robotics, vol. 24, no. 3, pp. 710–724, 2008.
[7] J. A. Hoffman, J. R. Cunningham, A. J. Suleh, A. Sundsmo, D. Dekker,
F. Vago, K. Munly, E. K. Igonya, and J. Hunt-Glassman, "Mobile
direct observation treatment for tuberculosis patients: a technical
feasibility pilot using mobile phones in nairobi, kenya," American
journal of preventive medicine, vol. 39, no. 1, pp. 78–80, 2010.
[8] P. Yang, R. A. Freeman, G. J. Gordon, K. M. Lynch, S. S. Srinivasa,
and R. Sukthankar, "Decentralized estimation and control of graph
connectivity for mobile sensor networks," Automatica, vol. 46, no. 2,
pp. 390–396, 2010.
[9] M. I. Shamos and D. Hoey, "Closest-point problems," in Foundations
IEEE, 1975,
of Computer Science, 1975., 16th Annual Symposium on.
pp. 151–162.
[10] S. Bandyopadhyay and E. J. Coyle, "An energy efficient hierarchical
clustering algorithm for wireless sensor networks," in INFOCOM
2003. 23nd Annual Joint Conference of
the IEEE Computer and
Communications., vol. 3.
IEEE, 2003, pp. 1713–1723.
[11] T. Patten, R. Fitch, and S. Sukkarieh, "Large-scale near-optimal
decentralised information gathering with multiple mobile robots," in
Proceedings of Australasian Conference on Robotics and Automation,
2013.
020406080100iteration (k)00.050.10.150.2costnon-robustrobustmax. info.0246810time step (t)00.020.040.060.080.1K-L divergencenon-robustrobustmax. info.Fig. 4: An illustration of the time evolution of the root-mean-square error (RMSE) (in ft) between the constructed map and the ground truth map for
non-robust method (top) and robust method (bottom) where 3 nodes have randomly failed (left 4 images). An illustration of the robot deployment (depicted
with stars, where the red stars are failed sensors) sensor footprint (dashed lines), and partition (polygons) for the non-robust (top) and robust method
(bottom) is also shown (5th column). The computed expected belief is also depicted from the non-robust (top) and robust (bottom) methods (6th column)
and the ground truth image is depicted (right). The colormap is using MATLAB's jet colormap.
[12] S. Kemna, J. G. Rogers, C. Nieto-Granda, S. Young, and G. S.
Sukhatme, "Multi-robot coordination through dynamic voronoi par-
titioning for
informative adaptive sampling in communication-
constrained environments," in Robotics and Automation (ICRA), 2017
IEEE International Conference on.
IEEE, 2017, pp. 2124–2130.
[13] S. Hutchinson and T. Bretl, "Robust optimal deployment of mobile
sensor networks," in Robotics and Automation (ICRA), 2012 IEEE
International Conference on, 2012, p. 671676.
[14] R. Viswanathan and P. K. Varshney, "Distributed detection with
the IEEE,
i. fundamentals," Proceedings of
multiple sensors part
vol. 85, no. 1, pp. 54–63, 1997.
[15] P. M. Djuric, M. Vemula, and M. F. Bugallo, "Target tracking by
particle filtering in binary sensor networks," IEEE Transactions on
Signal Processing, vol. 56, no. 6, pp. 2229–2238, 2008.
[16] D. Anguelov, D. Koller, E. Parker, and S. Thrun, "Detecting and
modeling doors with mobile robots," in Robotics and Automation,
2004. Proceedings. ICRA'04. 2004 IEEE International Conference on,
vol. 4.
IEEE, 2004, pp. 3777–3784.
[17] A. W. Stroupe, M. C. Martin, and T. Balch, "Distributed sensor fusion
for object position estimation by multi-robot systems," in Robotics
and Automation, 2001. Proceedings 2001 ICRA. IEEE International
Conference on, vol. 2.
IEEE, 2001, pp. 1092–1098.
[18] J. Cort´es, S. Mart´ınez, T. Karatas, and F. Bullo, "Coverage control for
mobile sensing networks," Robotics and Automation, IEEE Transac-
tions on, vol. 20, no. 2, p. 243255, 2004.
[19] H. Park and S. Hutchinson, "Robust optimal deployment in mobile
sensor networks with peer-to-peer communication," in Robotics and
Automation (ICRA), 2014 IEEE International Conference on.
IEEE,
2014, pp. 2144–2149.
[20] S. Kumar, T. H. Lai, and J. Balogh, "On k-coverage in a mostly sleep-
ing sensor network," in Proceedings of the 10th annual international
conference on Mobile computing and networking. ACM, 2004, pp.
144–158.
[21] D.-T. Lee, "On k-nearest neighbor voronoi diagrams in the plane,"
IEEE Trans. Computers, vol. 31, no. 6, pp. 478–487, 1982.
[22] S. M. LaValle, Planning algorithms.
Cambridge university press,
2006.
[23] D. Crisan and A. Doucet, "A survey of convergence results on particle
filtering methods for practitioners," IEEE Transactions on signal
processing, vol. 50, no. 3, pp. 736–746, 2002.
[24] H. M. Choset, Principles of robot motion: theory, algorithms, and
implementation. MIT press, 2005.
[25] D. Portugal and R. Rocha, "A survey on multi-robot patrolling
algorithms," in Doctoral Conference on Computing, Electrical and
Industrial Systems. Springer, 2011, pp. 139–146.
[26] I. Rekleitis, V. Lee-Shue, A. P. New, and H. Choset, "Limited
communication, multi-robot team based coverage," in Robotics and
Automation, 2004. Proceedings. ICRA'04. 2004 IEEE International
Conference on, vol. 4.
IEEE, 2004, pp. 3462–3468.
Fig. 5: The expected beliefs at t = 10 from the non-robust method (left),
robust method (middle), and max. information gain method (right) along
with robot configurations (stars are robot locations and red stars are robots
whose sensors have failed), footprints (dashed line), and partition (polygons)
is depicted. The ground truth elevation map is on the right of Fig. 4. The
colormap is using MATLAB's jet colormap.
Fig. 6: Comparison of K-L divergence of the ground truth distribution
between different methods during belief propagation when a component
of the nodes have failed.
Fig. 7: Comparison of robustness between different methods on 100
randomly generated tests at t = 10.
012345678910time step (t)00.050.10.150.2K-L divergencenon-robust F=1non-robust F=1,2non-robust F=1,2,3robust F=1robust F=1,2robust F=1,2,3max. info. F=1max. info. F=1,2max. info. F=1,2,300.020.040.060.080.10.12KL divergence (t=10)0510152025303540frequencynon-robustrobustmax. Info. |
1601.04952 | 1 | 1601 | 2016-01-19T15:29:52 | Emergence of Consensus in a Multi-Robot Network: from Abstract Models to Empirical Validation | [
"cs.MA",
"cs.RO",
"cs.SI",
"physics.soc-ph"
] | Consensus dynamics in decentralised multiagent systems are subject to intense studies, and several different models have been proposed and analysed. Among these, the naming game stands out for its simplicity and applicability to a wide range of phenomena and applications, from semiotics to engineering. Despite the wide range of studies available, the implementation of theoretical models in real distributed systems is not always straightforward, as the physical platform imposes several constraints that may have a bearing on the consensus dynamics. In this paper, we investigate the effects of an implementation of the naming game for the kilobot robotic platform, in which we consider concurrent execution of games and physical interferences. Consensus dynamics are analysed in the light of the continuously evolving communication network created by the robots, highlighting how the different regimes crucially depend on the robot density and on their ability to spread widely in the experimental arena. We find that physical interferences reduce the benefits resulting from robot mobility in terms of consensus time, but also result in lower cognitive load for individual agents. | cs.MA | cs |
Emergence of Consensus in a Multi-Robot Network:
from Abstract Models to Empirical Validation
Vito Trianni1, Daniele De Simone2, Andreagiovanni Reina3 and Andrea Baronchelli4
1ISTC, National Research Council, 00185 Rome, Italy
[email protected]
2DIAG, Sapienza University of Rome, 00185 Rome, Italy
[email protected]
3University of Sheffield, Sheffield S1 4DP, UK
[email protected]
4City University London, London EC1V 0HB, UK
[email protected]
Abstract
Consensus dynamics in decentralised multiagent systems are subject to intense studies, and several different models have
been proposed and analysed. Among these, the naming game stands out for its simplicity and applicability to a wide range of
phenomena and applications, from semiotics to engineering. Despite the wide range of studies available, the implementation of
theoretical models in real distributed systems is not always straightforward, as the physical platform imposes several constraints
that may have a bearing on the consensus dynamics. In this paper, we investigate the effects of an implementation of the naming
game for the kilobot robotic platform, in which we consider concurrent execution of games and physical interferences. Consensus
dynamics are analysed in the light of the continuously evolving communication network created by the robots, highlighting how
the different regimes crucially depend on the robot density and on their ability to spread widely in the experimental arena. We
find that physical interferences reduce the benefits resulting from robot mobility in terms of consensus time, but also result in
lower cognitive load for individual agents.
1
Introduction
Collective decision-making is an essential capability of large-scale decentralised systems like robot swarms, and is often key
to achieve the desired goal. In swarm robotics, a large number of robots coordinate and cooperate to solve a problem, and
often consensus among the robots is necessary to maximise the system performance [12, 18, 15]. The design of controllers for
consensus decision is often inspired by models of collective behaviour derived from studies in the ethology of social systems
[19, 14], as well as from studies about the emergence of social conventions and cultural traits [21, 6, 5]. Theoretical models
represent idealised instances of collective decentralised systems in which consensus can be somehow attained. Among the
different available models, a particularly interesting case is the one of the naming game (NG), which represents the emergence
of conventions in social systems, such as linguistic, cultural, or economic conventions [23, 4, 7]. The appeal of this model
consists in the ability to describe the emergence of consensus out of a virtually infinite set of equivalent alternatives, yet requiring
minimal cognitive load from the agents composing the system [4, 2]. Moreover, the NG has been successfully demonstrated on
a network of mobile point-size agents [3]. Such a collective decision-making behaviour can be very useful in swarm robotics in
case consensus is required with respect to a possibly large number of alternatives (e.g., the location and structure for cooperative
construction [24, 20], or the most functional shape for self-assembly [11, 17]).
When dealing with the implementation of physical systems starting from theoretical models, however, several constraints
may arise which may have a bearing on the collective dynamics. Indeed, small implementation details at the microscopic scale
may have a large impact at the macroscopic level. Hence, it is important to study the effects of such constraints in relation to
the dynamics predicted by the theoretical models. In this paper, we propose an implementation of the NG for the kilobot robotic
platform [16]. Kilobots are low-cost autonomous robots designed for experimentation with large groups [17]. They can move on
a flat surface and interact with close neighbours by exchanging short messages sent on an infrared channel. The collective be-
haviour of a kilobot swarm results solely from the individual decisions and inter-individual interactions, without any central unit
directing the group dynamics. As a consequence, the implementation of the NG for the kilobots needs to be fully decentralised
with games autonomously triggered by any robot at any time. Additionally, within a decentralised system, the concurrent exe-
cution of games by neighbouring robots becomes possible, in opposition to the rigorously sequential scheme typically adopted
in theoretical studies. Hence, the interaction pattern among robots may be significantly altered, and the corresponding dynam-
ics need to be carefully characterised. Finally, the embodiment of the robots determines physical interferences (i.e., collisions)
that strongly influence the overall mobility pattern. It follows that abstract models of agent mobility must be contrasted with
experimentation with robots, in which all the details of the physical platform can be taken into account.
1
procedure NG(nm, ns)
nt ← nt + 1
if nt mod nm = 0 then
RandomTurn()
end if
MoveStraight()
W ←ReceiveWords()
Randomise(W)
for w ∈ W do
UpdateInventory(w)
end for
if nt mod ns = 0 then
w ← SelectWord()
Broadcast(w)
end if
end procedure
(cid:46) Implementation of the NG
(cid:46) Change motion direction
(cid:46) Play the hearer role
(cid:46) Play the speaker role
Figure 1: The NG algorithm exploited in multi-agent simulations.
In this paper, we study the effects of the motion and interaction patterns on the consensus dynamics, and we pay particular
attention to both concurrent executions of games and physical interferences. First, we provide an abstract model of mobile
agents playing the NG, in which physical interferences are ignored. Following previous studies [3], we analyse this model in the
light of the communication network established by the agents, we show how the consensus dynamics are determined by agent
density, mobility and interaction frequency, and we link our empirical findings with theoretical studies [2, 10]. Then, we contrast
abstract models with large-scale simulations of the kilobots, as well as with real-world experiments. Here, physical interferences
impact on the consensus dynamics by limiting the free diffusion of robots in the experimental arena, hence increasing consensus
times. Still, the cognitive load for the individual agents is reduced for physical implementations, due to the lower number of
alternatives that each agent must consider in average. Our adapted implementation of the NG is presented in Section 2, while the
corresponding consensus dynamics are discussed in Section 3. Conclusions and future directions are presented in Section 4.
2 Model and Implementations
The naming game in its basic form [4] models pairwise interactions in which two players—the speaker and the hearer—interact
by exchanging a single word chosen by the speaker, and updating their inventory on the basis of the game success. Previous
extensions of the model take into account different inventory updating and communication schemes [1] and also consider mobile
agents [3]. In this work, we adopt a broadcasting scheme for the speaker agent, while inventory updating is performed only by
the hearer agent, as detailed in the following (for details, see [1]).
When engaging in a NG, the speaker agent as selects a word w either randomly from its inventory, or inventing it anew should
the inventory be empty (i.e., the set of possible choices for a new word w is virtually infinite). Then, it broadcasts w to all agents
in its neighbourhood. Upon reception of w, the hearer agent ah updates its inventory by either storing w if it was not found in
ah’s inventory, or by removing all words but w if the latter was already known to ah. By iterating the game multiple times, the
entire system converges toward the selection of a single word shared by all agents [4, 1].
2.1 Multiagent simulations
We implement a decentralised version of the NG by letting each agent a autonomously take the role of speaker every τs s. Given
that agents update their state at discrete steps of δt = 0.1s, they communicate every ns steps so that a word is broadcast every
τs = nsδt s to all neighbours within the range di = 10cm. In this way, concurrent execution of games becomes possible, hence
introducing an important difference from previous theoretical studies in which at any time only one game is executed by a
randomly chosen agent and one of its neighbours [3, 4, 1, 10]. At the hearer side, multiple interactions are possible within any
time interval δt, depending on the local density of agents. Hence, all words received in a single δt period are used sequentially
to update the inventory. The list of received words is randomised before usage to account for the asynchronous reception of
messages by the physical platform (see Section 2.3). The algorithm for the multiagent implementation is shown in Fig. 1.
At the beginning of each simulation run, N agents are deployed uniformly random within a squared box of side L with periodic
boundary conditions (e.g., a torus). This allows to focus on the effects of agent mobility and density without constraints from a
bounded space [3]. Agents are dimensionless particles and therefore do not collide with each other. The agents neighbourhood
is determined by all the agents within the interaction range di. By moving in space, the agent neighbourhood varies so that a
dynamic communication network is formed. Agent mobility follows an uncorrelated random walk scheme, with constant speed
v = 1cm/s and fixed step length vτm, where τm represents the constant time interval between two consecutive uncorrelated
changes of motion direction. This leads to a diffusive motion with coefficient D ∼ v2τm [3]. In practice, agents change direction
every nm steps, so that τm = nmδt (see Fig. 1).
2
2.2 Robot simulations
We have developed a custom plugin for simulating kilobots within the ARGoS framework [13], paying particular attention to
match the real robot features in terms of body size, motion speed and communication range. Communication is implemented by
allowing the exchange of messages between neighbours within the range di. No failures in communication have been simulated,
assuming that the channel can support communication even with high densities. We will discuss this choice in the light of the
obtained results in Section 4.
Concerning the motion pattern, kilobots are limited to three modes of motion: forward motion when both left and right motors
are activated, and left or right turns when only one motor is activated. Turning is performed while pivoting on one of the kilobot
legs. We have therefore implemented a differential drive motion scheme centred between the two backward legs of the kilobot,
with speed v = 1cm/s for forward motion and angular speed ω = π/5s−1 for turning. A multiplicative gaussian noise applied at
every simulation cycle (standard deviation σ = 0.4) simulates the imprecise motion of kilobots. With such an implementation,
the individual motion is still diffusive, but with a lower coefficient due to the delay introduced by turning. Additionally, collision
avoidance is not possible with the kilobot onboard sensors, and robots are let free to crash into walls and each other. The ARGoS
framework provides a 2D dynamics physics engine that handles collisions between robots and with walls with an integration
step size δt = 0.1s, which proves sufficient for our purposes. Collisions determine a further reduction in the diffusion speed, as
we will discuss in Section 3.2. Robots are deployed randomly within a squared box of side L surrounded by walls. To avoid
overlapping of robots, the initial positions are determined by dividing the arena in cells wide enough to contain a single kilobot,
and randomly placing kilobots into free cells.
2.3 Kilobot implementation
The implementation of the NG for kilobots requires handling transmission and reception of messages, and implementing the
random walk. We use the kilobot API from Kilobotics [22], which provides two callback functions for transmission and reception
of 10-byte messages, functions for distance estimation of the message source, and a counter that is updated approximately 32
times per second (i.e., δt (cid:39) 1/32). Broadcast is allowed every τs seconds by opportunely activating the transmission callback.
Communication interferences among robots are treated through the CSMA-CD protocol (carrier-sensing multiple access with
collision detection) with exponential back-off, meaning that upon detection of the occupied channel, message sending is delayed
within an exponentially increasing range of time slots. This introduces an additional level of asynchrony that must be tolerated by
the collective decision-making process, as the exact timing of communication cannot be completely controlled. Upon reception
of any message, the corresponding callback function is activated, and the NG is immediately played exploiting the content of the
received message. Given that the maximum communication distance may vary across different robots, we capped the maximum
distance to di by software, estimating the source distance and ignoring messages from sources farther than di.
The motion pattern implements the random walk exactly as performed in simulation, exploiting the internal random number
generator for uniformly distributed turning angles. Forward motion v and angular speed ω of each kilobot have been calibrated
to obtain a roughly constant behaviour across different robots and to match the parameter values used in simulation. The code
for the controller is written in a C-like language (AVR C) and fits in about 200 lines. In experimental runs, kilobots are initially
positioned randomly following indications from the ARGoS simulator in equivalent conditions. This provides an unbiased
initialisation and supports comparison with simulations in Section 3.3.
3 Consensus Dynamics
The most important quantity to evaluate the consensus dynamics following the NG process is the time of convergence tc, i.e.,
the time required for the entire group to achieve consensus. Previous studies demonstrated that consensus is the only possible
outcome, even though in particular cases it can be reached only asymptotically [4]. Another relevant metric for the NG in
multiagent systems is the maximum memory M required for the agents, in average, until convergence: given that each agent
needs to store a possibly large number of words, it is important to study how the memory requirements scale with the system
size, especially in the perspective of the implementation for real robots that entail limited memory and minimal processing power
to search large inventories.
Following previous studies, it is useful to look at the (static) interaction network resulting by linking all agents that are within
interaction range. Given N agents confined in a L× L space and interacting over a range di, the resulting network has average
degree (cid:104)k(cid:105) = πNd2
i /L2 [8, 3]. Given that in our case all parameters are constant but the agent density (as determined by N), two
values are critical:
1. N1 = N(cid:104)k(cid:105)=1 is the group size at which the average degree is around 1, meaning that each agent has in average one other
agent to interact with. Below this value, interactions are sporadic and determined by the agent mobility, while above this
value interactions are frequent as small clusters of agents appear.
2. Nc = N(cid:104)k(cid:105)(cid:39)4.51 corresponds to the critical group size for a percolation transition [8]. Above Nc, the network is characterised
by a giant component of size N.
Given the broadcasting rule employed for the NG in this paper, it is clear that the characteristics of the interaction network are
fundamental. If there exists a giant component, information can spread quickly. If otherwise robots are mostly isolated, they will
not be able to interact and convergence would be slower, as discussed in the following.
3
Figure 2: Results from multiagent simulations. Each panel shows the dependence of the convergence time tc on the system size
N for different parameterisation. Statistical error bars are not visible on the scale of the graphs. Vertical dotted lines indicate the
thresholds for N1 = 32 and Nc = 143. The insets show the memory requirements M plotted against the system size N for the
same parameterisations.
Influence of density, mobility and interaction frequency
3.1
To determine the consensus dynamics and the effects of the different parameters of the system, we run multiagent simulations
with small and large groups in a squared arena of size L = 1m. In this condition, we have N1 (cid:39) 32 and Nc (cid:39) 143. Figure 2 reports
the consensus time tc for different parameterisations varying N ∈ [10,500] and τm,τs ∈ [10,50 ]s.
Looking at the results, we note that tc is a decreasing function of N. Indeed, a higher density corresponds to a higher number
of concurrently executed games, and results in a faster convergence. For N > Nc and small τs, the consensus time collapses to the
same value for varying τm (see for instance the top-left panel in Fig. 2). Above the percolation threshold, agent mobility plays
a minor role and the consensus dynamics can be related to the characteristics of the static network of interactions. Especially
for low values of τm, the dynamics closely correspond to those of static agents interacting on a random geometric network [10].
Here, the agreement process proceeds through the formation of clusters of agents with local consensus separated by an interface
of “undecided” agents, and consensus dynamics recall the coarsening on regular lattices [2]. This is confirmed by the left panel
in Fig. 3, which shows how the convergence time tc scales with τs ∈ [1,500 ]s for N = 300. It is possible to appreciate a kind
s , with γ (cid:39) 0.5. This indicates that the convergence dynamics are mostly determined by τs, while
of power-law scaling tc (cid:39) τγ
τm plays a relatively minor role, hence confirming the above mentioned resemblance with coarsening on lattices or random
geometric networks. Similarly to fully-connected networks [4], log-periodic oscillations are visible in the power law scaling, so
that for some values of τs, mobility happens to be more relevant, with large τm determining a lower convergence time (see also
Fig. 2 top-right).
Below the percolation threshold Nc, agents form temporary clusters that dissolve due to the agent mobility. If the density is
still high enough to ensure frequent interactions (N > N1), the dynamics are determined more by the mobility of agents than by
the broadcasting period τs. This is visible in the bottom-left and bottom-right panels of Fig. 2, where convergence times tend to
coalesce for different values of τs and N ∈ [N1,Nc]. Instead, for very low densities (N < N1), agent-agent contacts are infrequent
and last for short periods of time, so that many broadcasts go unnoticed. In this condition, high mobility is important as much as
short broadcasting periods to ensure faster convergence (see Fig. 2).
To evaluate the effects of the broadcasting period more thoroughly, it is useful to look at the rescaled time tc/τs indicating the
average number of broadcasts each agent transmitted (see Fig. 3 right). We note lower values of the rescaled agreement time for
larger values of τs, meaning that the number of broadcasts required for convergence diminishes for longer broadcasting periods,
recalling the slower-is-faster effect observed in many complex systems [9].
A look at the memory requirements reveals that M is generally constrained to low values, which makes the NG implemen-
tation affordable for physical systems (see the insets in Fig. 2). For N1 < N < Nc, mobility plays a significant role, with larger
4
101102103102103tcτs=10sτm1020304050101102103102103τs=50sτm1020304050101102103N102103tcτm=10sτs1020304050101102103N102103τm=50sτs1020304050N1Nc101102103N2345MN1Nc101102103N2345MN1Nc101102103N2345MN1Nc101102103N2345MFigure 3: (Left) Scaling of convergence time as a funciton of τs. The black solid line tc (cid:39) τ0.5
serves as a guide for the eye to
appreciate the power law scaling of the convergence time tc. (Right) Rescaling convergence time by τs, representing the average
number of broadcasts before convergence. Statistical error bars are not visible on the scale of the graphs.
s
values of τm corresponding to larger M. The transient formation of small clusters enhances the requirements of memory the more
the agents are able to travel between clusters that agree on different words. Similarly, if we look at the bottom panels, we notice
that higher values of τs determine higher values for M. Here, slow convergence leads to agents diffusing in the arena and being
exposed to multiple options, hence increasing the memory requirements. For N > Nc, instead, mobility is less important and the
memory requirements are bound to the interaction period. The scaling analysis presented in the left panel of Fig. 3 shows that the
memory requirements increase drastically with τs, confirming that slower convergence implies also larger memory requirements.
On the other hand, frequent interactions lead to the quick formation of few clusters, so that the individual memory requirements
are limited to few words, especially for those agents at the interface between clusters. As τs decreases further, the effect of con-
current executions of games starts to be visible with an increase in the memory requirements as a result of the higher probability
of agents to simultaneously exchange different words.
Influence of physical interferences
3.2
The consensus dynamics described above refer to an ideal system that neglects the physical embodiment of robots. Embodiment
leads to collisions with walls and among robots that constrain mobility. We study the influence of embodiment by comparing
multiagent with robotics simulations performed in similar conditions to what described above (see Fig. 4 for selected param-
eterisations). We first note that the convergence time tc is in general higher for robotic simulations, as a consequence of the
slower diffusion in space resulting from the turning time, which introduces a stochastic delay in the random walk pattern, and
due to the physical boundaries that prevent robots to freely move. For instance, in the top-left panel of Fig. 4 we show the case
for τm = 50s: here, collisions lead to an approximately constant tc for N1 < N < Nc, no matter what is the broadcasting time
τs. Indeed, the slower diffusion and the formation of small clusters determine the convergence time more than the interaction
frequency. Collisions with walls and with other robots lead to the formation of stable clusters in which consensus can be quickly
achieved. Such clusters dissolve at a slower pace for larger values of τm, due to robots turning away less often. Hence, the effects
of mobility are diluted especially when it is supposed to play an important role, i.e., when N < Nc. Collisions influence the
convergence dynamics also for N > Nc, although to a lesser extent, as can be seen in the top-right panel in Fig. 4: for large τm,
convergence is slower due to the formation of clusters that do not interact frequently, as collisions prevent robots to mix as much
as in the ideal multiagent case.
The low ability to mix due to collisions has an effect also on the required memory M, which is in general lower for robot
simulations (see bottom panels of Fig. 4). The slower diffusion of robots in space and the existence of boundaries limit the
spreading of different words into the robot network, hence resulting in lower memory requirements.
3.3 Experiments with real robots
To validate our results with respect to the real robotic platform, we performed comparative experiments in a smaller arena
(L = 45cm). In this condition, we have N1 (cid:39) 6 and Nc (cid:39) 29, which led us to use smaller groups of robots (N ∈ {5,20,35}) to
explore the system behaviour as the characteristics of the static interaction network vary. Given the smaller dimensions, we also
explored smaller values for the latencies τs and τm, and we decided to set both to the same value τa ∈ {2.5,5,7.5}s. We have
performed 20 runs with real robots for each of the 9 experimental conditions (3 group sizes × 3 latencies), for a total of 180 runs.
Figure 5 shows a sequence of frames from one run performed with 20 kilobots. It is possible to note that initially multiple small
clusters are present in which robots have the same word (here represented by the color of the onboard LED). As time goes by,
clusters disappear and eventually one single word is chosen.
For each experimental run, we have recorded the convergence time tc, and the obtained results have been contrasted with
5
100101102τs102103tcN=300τm1020304050101102103N101102tc/τsτm=30sτs1020304050N1Nc100101102τs2345MFigure 4: Comparison between multiagent and robot simulations. Average values from multiagent simulations are shown with
transparent colours, and serve as reference to appreciate the results from robotic simulations. Statistical error bars are not visible
on the scale of the graphs. (Top) Convergence time tc. (Bottom) Required memory M. (Left) Results for τm = 50s, and varying
τs. (Right) Results for τs = 10s, and varying τm.
simulations in comparable conditions—same arena dimensions L and same latencies as determined by τa—with multiagent and
robotic simulations. Figure 6 shows that the statistics are aligned between kilobot simulations and real kilobots, and both present
a slightly larger convergence time with respect to multiagent simulations. We also note that in general, the convergence time for
τa = 2.5s is lower in case of real robots than in simulation, while this is not always true for larger latencies. This is an effect
of interferences in communication due to simultaneous broadcasts, which leads to the loss of some communication messages.
When messages get lost, the convergence dynamics are actually faster because the exchanging of different words by robots
broadcasting at the same time gets reduced. This is in line with the observations made in Section 3 about the influence of the
broadcasting period, indicating that convergence is faster when there are less broadcasts. With kilobots, a reduction of the number
of broadcasts due to interference results from small τs and large N (see Fig. 6).
4 Conclusions
This study finds itself at the interface between theoretical investigations and robotics implementation. The results observed in the
multiagent simulations can be of interest for complex systems studies as they highlight the effects of concurrency and of different
latencies in the motion and interaction patterns, as determined by implementation constraints. Concurrency is customary in
t = 10s
t = 23s
t = 45s
t = 60s
t = 80s
Figure 5: Different shots of an experiment with 20 kilobots, with τs = τm = 2.5s. Robots lighting their LED have only one word
in their inventory, while no color signal indicates more than one word or an empty inventory. Different words correspond to
different colours.
6
101102103N102103tcτm=50sτs1020304050101102103102103τs=10sτm1020304050101102103N2.02.53.03.54.04.55.0M101102103N2.02.53.03.54.04.55.0N1NcN1NcN1NcN1NcFigure 6: Comparison between multiagent simulations, kilobot simulations and real kilobots. For each condition, 200 runs were
performed in simulation, while 20 runs were performed with physical robots. Boxes represent the interquartile range, horizontal
lines mark the median, whiskers extend to 1.5 times the first quartiles, and dots represent outliers.
multi-robot systems and artificial decentralised systems in general. Hence, accounting for it into abstract models is important
to provide usable predictions. We have found here that concurrent executions of games are particularly important for aspects
like the maximum memory M, and future studies should better characterise such effects in terms of the probability of observing
concurrent executions at any time.
Robotics simulations and experiments with kilobots showed how embodiment influences the consensus dynamics by limiting
the diffusion of information into the system: on the one hand, collisions lead to the formation of clusters that dissolve slower for
larger τm, leading to slower convergence times. On the other hand, the memory requirements of robots is reduced as only few
robots at the interface between clusters experience more than two words at the same time. Future studies should attempt a more
precise description of the diffusive motion of agents under physical constraints, in order to obtain better predictions in terms of
the expected interaction network. Additionally, the communication protocol employed by kilobots and the observed interferences
need to be better characterised. Simulations should account for uncertain reception of messages, as well as for the exponential
back-off used during transmission when the channel is busy. By including such features, we expect to deliver precise estimations
of the system behaviour even for very large group sizes and short broadcasting periods.
References
[1] A. Baronchelli. Role of feedback and broadcasting in the naming game. Physical Review E, 83(4):046103, 2011.
[2] A. Baronchelli, L. Dall’Asta, A. Barrat, and V. Loreto. Topology-induced coarsening in language games. Physical Review
E, 73(1):015102, 2006.
[3] A. Baronchelli and A. D´ıaz-Guilera. Consensus in networks of mobile communicating agents. Physical Review E,
85(1):016113, 2012.
[4] A. Baronchelli, M. Felici, V. Loreto, E. Caglioti, and L. Steels. Sharp transition towards shared vocabularies in multi-agent
systems. Journal of Statistical Mechanics: Theory and Experiment, 2006(06):P06014, 2006.
[5] D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science,
342(6164):1337–1342, 2013.
[6] C. Castellano, S. Fortunato, and V. Loreto. Statistical physics of social dynamics. Reviews of Modern Physics, 81(2):591–
646, 2009.
[7] D. Centola and A. Baronchelli. The spontaneous emergence of conventions: An experimental study of cultural evolution.
Proceedings of the National Academy of Sciences, 112(7):1989–1994, 2015.
[8] N. Fujiwara, J. Kurths, and A. D´ıaz-Guilera. Synchronization in networks of mobile oscillators. Physical Review E,
83(2):025101, 2011.
[9] C. Gershenson and D. Helbing. When slower is faster. Complexity, 21(2):9–15, 2015.
[10] Q. Lu, G. Korniss, and B. K. Szymanski. Naming games in two-dimensional and small-world-connected random geometric
networks. Physical Review E, 77(1):016111, 2008.
[11] R. O’Grady, A. L. Christensen, and M. Dorigo. SWARMORPH: Multirobot morphogenesis using directional self-assembly.
IEEE Transactions on Robotics, 25(3):738–743, 2009.
[12] C. A. C. Parker and H. Zhang. Cooperative decision-making in decentralized multiple-robot systems: the best-of-n problem.
IEEE Transactions on Mechatronics, 14(2):240–251, 2009.
[13] C. Pinciroli, V. Trianni, R. O’Grady, G. Pini, A. Brutschy, M. Brambilla, N. Mathews, E. Ferrante, G. A. Di Caro,
F. Ducatelle, M. Birattari, L. M. Gambardella, and M. Dorigo. ARGoS: a modular, parallel, multi-engine simulator for
multi-robot systems. Swarm Intelligence, 6(4):271–295, 2012.
7
tc110102103lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllta=2.5ta=5ta=7.5ta=2.5ta=5ta=7.5ta=2.5ta=5ta=7.5N=5N=20N=35multiagentkilobot sim.kilobot real[14] C. R. Reid, S. Garnier, M. Beekman, and T. Latty.
Information integration and multiattribute decision making in non-
neuronal organisms. Animal Behaviour, 100(C):44–50, 2015.
[15] A. Reina, G. Valentini, C. Fern´andez-Oto, M. Dorigo, and V. Trianni. A design pattern for decentralised decision making.
PLoS ONE, 10(10):e0140950–18, 2015.
[16] M. Rubenstein, C. Ahler, N. Hoff, A. Cabrera, and R. Nagpal. Kilobot: A low cost robot with scalable operations designed
for collective behaviors. Robotics and Autonomous Systems, 62(7):966–975, 2014.
[17] M. Rubenstein, A. Cornejo, and R. Nagpal.
345(6198):795–799, 2014.
Programmable self-assembly in a thousand-robot swarm.
Science,
[18] G. Sartoretti, M.-O. Hongler, M. E. de Oliveira, and F. Mondada. Decentralized self-selection of swarm trajectories: from
dynamical systems theory to robotic implementation. Swarm Intelligence, 8(4):329–351, 2014.
[19] T. D. Seeley, P. K. Visscher, T. Schlegel, P. M. Hogan, N. R. Franks, and J. A. R. Marshall. Stop signals provide cross
inhibition in collective decision-making by honeybee swarms. Science, 335(6064):108–11, 2012.
[20] T. Soleymani, V. Trianni, M. Bonani, F. Mondada, and M. Dorigo. Bio-inspired construction with mobile robots and
compliant pockets. Robotics and Autonomous Systems, 74:340–350, 2015.
[21] V. Sood and S. Redner. Voter model on heterogeneous graphs. Physical Review Letters, 94(17):178701–4, 2005.
[22] SSR Lab, Harvard University, Cambridge, MA. Kilobotics. all the resources needed to get started with the kilobots.
https://www.kilobotics.com, 2013. [Online; accessed 12 January 2016].
[23] L. Steels. A self-organizing spatial vocabulary. Artificial life, 2(3):319–332, 1995.
[24] J. Werfel, K. Petersen, and R. Nagpal. Designing Collective Behavior in a Termite-Inspired Robot Construction Team.
Science, 343(6172):754–758, 2014.
8
|
1304.4051 | 1 | 1304 | 2013-04-15T11:09:41 | Coordinating metaheuristic agents with swarm intelligence | [
"cs.MA",
"cs.NE"
] | Coordination of multi agent systems remains as a problem since there is no prominent method to completely solve this problem. Metaheuristic agents are specific implementations of multi-agent systems, which imposes working together to solve optimisation problems with metaheuristic algorithms. The idea borrowed from swarm intelligence seems working much better than those implementations suggested before. This paper reports the performance of swarms of simulated annealing agents collaborating with particle swarm optimization algorithm. The proposed approach is implemented for multidimensional knapsack problem and has resulted much better than some other works published before. | cs.MA | cs | Journal of Intelligent Manufacturing manuscript No.
(will be inserted by the editor)
Coordinating metaheuristic agents with swarm intelligence
Mehmet E. Aydin
3
1
0
2
r
p
A
5
1
]
A
M
.
s
c
[
1
v
1
5
0
4
.
4
0
3
1
:
v
i
X
r
a
the date of receipt and acceptance should be inserted later
Abstract Coordination of multi agent systems remains as a problem since there is
no prominent method to completely solve this problem. Metaheuristic agents are
specific implementations of multi-agent systems, which imposes working together
to solve optimisation problems with metaheuristic algorithms. The idea borrowed
from swarm intelligence seems working much better than those implementations
suggested before. This paper reports the performance of swarms of simulated an-
nealing agents collaborating with particle swarm optimization algorithm. The pro-
posed approach is implemented for multidimensional knapsack problem and has
resulted much better than some other works published before.
Keywords metaheuristic agents, · swarm intelligence, · particle swarm optimiza-
tion, · simulated annealing
1 Introduction
Metaheuristic agents are collaborating agents to solve large scale optimisation
problems in the manner of multi agent systems in which metaheuristic algorithms
are adopted by the agents as the problem solvers. They are multi-agent systems
identified to describe teams of search agents to operate for optimisation. This
type of multi-agent systems is specific to implementations of metaheuristics to
solve large scale optimisation problems (Aydin 2007). Coordination of multi agent
systems remains as a problem since there is no prominent method to completely
solve this problem. The-state-of-the-art of coordinating multi agents via machine
learning has been extensively discussed in Panait and Luke (2005) while Vazquez-
Salcada et al (2005) and Kolp et al (2006) bring forward organizational and archi-
tectural issues of multi-agent systems. Since metaheuristic agents are more spe-
cific and heavily loaded in duty, their coordination is more than those are used in
M. E. Aydin
University of Bedfordshire,
Dept. of Computer Science and Technologies,
Luton, UK
E-mail: [email protected]
2
Mehmet E. Aydin
modelling social problems. The coordination problem with metaheuristic agents
constitutes of the eminent problem with metaheuristics, which is that there is no
guarantee provided to find optimum solutions within a reasonable time with any
metaheuristic algorithm. Instead, they usually provide with local optimum, which
may not be satisfactory sometimes. One way to overcome this problem is to di-
versify the search conducted with the heuristics. On the other hand, distributed
problem solving is mainly expected to bring more simplicity and reduction in
computational time and complexity, which leads to more diversity, and more rea-
sonable solutions. A well studied multi agent system can tackle multiple regions
of the search space simultaneously. Multiple independent runs of the algorithms,
which offer distributing the systems over the particular metaheuristic agents, have
capabilities to carry out concurrent search within search spaces.
In this paper, the coordination problem of multi-agent systems has been tack-
led once again, but, with swarm intelligence algorithms this time. It is observed
as expected that swarm intelligence algorithms help for better interactions and
information/experience exchange. We illustrated the idea in coordinating simu-
lated annealing agents with particle swarm optimisation algorithms implemented
to solve multidimensional knapsack problem. Although there are various hybrid
implementations of particle swarm optimisation and simulated annealing to solve
combinatorial problems (Chan et al 2006;Dong and Qui 2006;Wang et al 2007), we
have not come across with implementation of particle swarm optimisation algo-
rithms to coordinate any metaheuristic agent such as simulated annealing agents
neither any distributed versions of such hybrid algorithms. In addition, multidi-
mensional knapsack problem has not been tackled with such hybrid algorithm
either.
Previously, a couple of multi agent coordination approaches applied to meta-
heuristic agent teams to examine their performance in coordinating them (Aydin
2007; Hammami and Ghediera 2005). Obviously, each one provides with different
benefits in tackling search and problem solving. However, swarm intelligence has
not been considered for this coordination problems, whereas the notion of swarm
intelligence is to substantiate artificial societies inspiring of the natural life. That
is that the individuals form up a swarm are to be considered as particular agents.
In contrary, the individuals remain as ordinary solutions not agents enabled with
various artificial skills. In this paper, we try to prove the concept of coordinating
agents with swarm intelligence algorithms.
Multidimensional knapsack problem is one of the most tackled combinatorial
optimisation problems due to its flexibility in convertibility into the real world
problems. The problem briefly is to maximise the total weighted p index subject
to the constraints where x is a binary variable and r is a matrix of coefficients that
is imposed to limit the capacities and b is the vector of upper limits.
Subject to:
M aximise
n
X
j=1
pj xj
n
X
j=1
rij xj ≤ bii = (1, ..., m)
xj ∈ [0, 1]j = (1, ..., n)
(1)
(2)
(3)
Coordinating metaheuristic agents with swarm intelligence
3
Equation (1) is the objective function which measures the overall capacity of the
knapsacks used while Equation (2) and (3) provide the hard constraints where (2)
declares the upper limit of each knapsack and (3) makes sure that the decision
variable, x, can only take binary integer values. The knapsack problem has been
inspired by many application areas such as networking problems, supply chain
modeling problems etc. Wilbaut et al (2008) introduce a survey on the variety of
knapsack problems and the ways to solve them.
The rest of the paper is organised as follows. The second section is to briefly
introduce the notions of metaheuristic agents and swarm intelligence with short
presentation of considered metaheuristics within the study; they are particle swarm
optimisation (PSO), bee colony optimisation (BCO), and simulated annealing
(SA) algorithms. The third section is to describe how to deliver the coordination
of a swarm of simulated annealing agents using BCO and PSO. The experimental
results are provided in section four following by the conclusions in section five.
2 Metaheuristic Agents and Swarm Intelligence
The concept of metaheuristic agents is identified to describe multi agent systems
equipped with metaheuristics to tackle hard optimisation problems. The idea of
multi agency is to build up intelligent autonomous entities whose form up teams
and solve problems in harmony. The agents equipped with metaheuristics aim to
solve hard and large-scale problems with their own intelligent search skills. Since
standalone heuristic search usually face with local minima, ideas such as memetic
algorithms, hybrid algorithms etc. have received intensive attention to overcome
such shortcomings. On the other hand, the idea of multi agency eases building
collaboration among various methods and approaches in a form of collaborating
independent computational entities (Panait and Luke 2005;Vazquez-Salcada et al
2005;Kolp et al 2006).
Metaheuristic applications have been implemented as mostly standalone sys-
tems in an ordinary sense and examined under the circumstances of their own
standalone systems. Few multi agent implementations in which metaheuristics
have been exploited are examined in the literature. Various implementations of
metaheuristic agents have been overviewed with respect to topologies and achieve-
ments in Aydin (2007) and Hammami and Ghediera (2005).
Swarm intelligence is referred to artificial intelligence (AI) systems where an
intelligent behaviour can emerge as the outcome of the self-organisation of a col-
lection of simple agents, organisms or individuals. Simple organisms that live in
colonies; such as ants, bees, bird flocks etc. have long fascinated many people for
their collective intelligence that is manifested in many of the things that they do.
A population of simple units can interact with each other as well as their envi-
ronment without using any set of instruction(s) to proceed, and compose a swarm
intelligence system.
The swarm intelligence approaches are to reveal the collective behaviour of
social insects in performing specific duties; it is about modelling the behaviour
of those social insects and use these models as a basis upon which varieties of
artificial entities can be developed. In such a way, the problems can be solved by
models that exploit the problem solving capabilities of social insects. The moti-
vation is to model the simple behaviours of individuals and the local interactions
4
Mehmet E. Aydin
with the environment and neighbouring individuals, in order to obtain more com-
plex behaviours that can be used to solve complex problems, mostly optimisation
problems (Colorno et al 1994; Kennedy and Eberhart 1995; Tasgetiren et al 2007).
2.1 Bee colonies
Bee colonies are rather recently developed sort of swarm intelligence algorithms,
which are inspired of the social behaviour of bee colonies. This family of algo-
rithms has been successfully used for various applications such as modelling oh
communication networks (Farooq 2008), manufacturing cell formation (Pham et
al 2007), training artificial neural networks (Pham et al 2006). There is a rather
common opinion on that bee colony algorithms are more successful in continuous
problems than combinatorial problems. The main idea behind a simple bee colony
optimisation algorithm is to follow the most successful member of the colony in
conducting the search. The scenario followed is that once a bee found a fruitful
region, then it performs the waggle dance to communicate to the rest of the colony.
Once any member of the colony realises that there is a waggle dance performance
by a peer fellow, then it moves to that member's neighbourhood to collect more
food. Inspiring of this natural process, bee colony optimisation algorithms are
implemented for efficient search methodologies borrowing this idea to direct the
search to a more fruitful region of the search space. That would result a quicker
search for an appropriate solution to be considered as a neat near-optimum. For
further information Pham et al (2006), (2007) and Farooq (2008) can be seen.
2.2 Particle swarm optimisation (PSO)
PSO is a population-based optimization technique inspired of social behaviour of
bird flocking and fish schooling. PSO inventors were implementing such scenarios
based on natural processes explained below to solve the optimization problems.
Suppose the following scenario: a group of birds are randomly searching for food
in an area, where there is only one piece of food available and none of them knows
where it is, but they can estimate how far it would be. The problem here is "what
is the best way to find and get that food". Obviously, the simplest strategy is to
follow the bird known as the nearest one to the food. In PSO, each single solution,
called a particle, is considered as a bird, the group becomes a swarm (population)
and the search space is the area to explore. Each particle has a fitness value
calculated by a fitness function, and a velocity of flying towards the optimum,
food. All particles search across the problem space following the particle nearest
to the optimum. PSO starts with initial population of solutions, which is updated
iteration-by-iteration.
The pure PSO algorithm builds each particle based on, mainly, two key vectors;
position xi, and velocity vi. Here, xi = {xi1, ..., xin}, denotes the ith position vector
in the swarm, where xik, is the position value of the ith particle with respect to
the kth dimension (k = 1, 2, 3, , n), while vi = {vi,1, ..., vi,n} denotes the ith velocity
vector in the swarm, where vik is the velocity value of the ith particle with respect
to the kth dimension. Initially, the position and velocity vectors are generated as
continuous sets of values randomly uniformly. Personal best and global best of the
Coordinating metaheuristic agents with swarm intelligence
5
swarm are determined at each iteration following by updating the velocity and
position vectors using :
vik(t + 1) = δ(wtvik(t) + c1r1(yik(t) − xik(t)) + c2r2(gk(t) − xik(t)))
(4)
where w is the inertia weight used to control the impact of the previous velocities
on the current one, which is decremented by β, decrement factor, via wt+1 = wt ×β,
δ is constriction factor which keeps the effects of the randomized weight within
the certain range. In addition, r1 and r2 are random numbers in [0,1] and c1 and
c2 are the learning factors, which are also called social and cognitive parameters.
The next step is to update the positions in the following way.
xik(t + 1) = xik(t) + vik(t).
(5)
After getting position values updated for all particles, the corresponding solu-
tions with their fitness values are calculated so as to start a new iteration if the
predetermined stopping criterion is not satisfied. For further information, Kennedy
and Eberhart (1995) and Tasgetiren et al (2007) can be seen.
PSO has initially been developed for continuous problems not for discrete ones.
As MKP is a discrete problem, we use one of discrete PSO, which is proposed by
Kennedy and Eberhart (1997). The idea is to create a binary position vector based
on velocities as follows:
xik(t + 1) =
.
(6)
1
evik (t+1)
where equation (5) is replaced with (6) so as to produce binary values for
position vectors.
2.3 Simulated annealing
Simulated annealing (SA) is one of the most powerful metaheuristics used in op-
timisation of many combinatorial problems, which relies on a stochastic decision
making process in which a control parameter called temperature is employed to
evaluate the probability of moving within the neighbourhood of a particular so-
lution. The algorithm explores across the whole search space of the problem un-
dertaken throughout a simulated cooling process, which gradually cools a given
initial hot temperature to a predefined frozen level. Given a search space S, and a
particular state in search space, x ∈ S, a neighbourhood function, N(x), conducts
a move from x, to ´x ∈ S, where the decision to promote the state is made subject
to the following stochastic rule:-
xi+1 =
−∆x
´xi ∆x > 0
´xi e
ti ≥ ρ
xi otherwise
(7)
where ∆x = ´xi − xi, i is the iteration index, ρ is the random number gen-
erated for making a stochastic decision for the new solution and ti is the level
of temperature (at the ith iteration), which is controlled by a particular cooling
schedule, f(ti). This means that, in order to make the new solution, ´xi, qualified
for the next iteration, either the arithmetic difference, ∆x, needs to be negative or
the probability determined with e−∆x/ti is required to be higher than the random
6
Mehmet E. Aydin
number generated, ρ, where the probability is decayed by cooling the temperature.
Every state qualified to the next iteration as the consequence of the abovemen-
tioned stochastic rule gives away to a perturbation in which the solution state
can be refreshed and diversified to prevent the possible local optima. A prede-
fined number of moves attempted in this stage are repeated per iteration so as
to stabilise cooling the temperature. Obviously, the stochastic rule does not allow
only promoting the better solutions, but also the worse ones. However, since the
probability of promoting a worse state exponentially decays towards zero, it is get-
ting harder to exploit the perturbation facility in advanced stages of this process.
That is because the temperature approaches zero as the number of iterations goes
higher. More details can be found in literature such as Kolonko (1999), Aydin and
Fogarty (2004) and Hammami and Ghediera (2005).
3 SA agents collaborating with swarm intelligence
As explained above, simulated annealing (SA) is one of the most commonly used
metaheuristic approaches that offer a stochastic problem solving procedure. It
is used for numerous and various successful applications (Kolonko 1999; Aydin
and Fogarty 2004) in combinatorial and real optimisation domains. However, it
is realised that the performance of implementations significantly depend on the
neighbourhood structure as well as the hardness of the problem. In order to avoid
poor performance due to such reasons, SA has been either hybridised with other
peer metaheuristic algorithms such as genetic algorithm or parallelised. The main
problem remains as the diversification of the search in one way or another. In this
study, agents enabled with simulated annealing algorithm are used and named as
SA agents.
The original idea of swarm intelligence is to form up populations of enabled
individuals for collaboratively problem solving spurposes. However, due to com-
putational complexity and the hardship in furnishing the enabled individuals with
multiple advanced functionalities, swarms are usually designed as population of
individual static solutions evolved with various genetic and/or heuristic opera-
tors/algorithms. In this study, individuals forming up the swarms are agentified
with various advance functionalities such as problem solving and communicating
independently.The idea is cultivated as follows: a population of agents is created
and developed with a search skill operating in the way of simulated annealing
algorithm. Then, the population is organised to team up a swarm to solve the
problems with their search functionalities and interaction abilities. Previously, SA
agents have been organised in a variety of fashions such as with hill climbing al-
gorithm or metropolis rule (Aydin and Fogarty 2004; Aydin 2007). The idea was
to build a way of collaboration through system architecture, and gained a slight
improvement in performance.
This study has aimed to find out a better way of organising agents in a more
proactive collaboration so that the agents are to be enabled with contributing
problem solving whilst coordinating. For this purposes, few algorithms have been
examined; evolutionary simulated annealing, bee colony optimization and particle
swarm optimization algorithms. Evolutionary simulated annealing is the one ex-
amined earlier for a similar purpose, to solve some other combinatorial problems
(Aydin and Fogarty 2004; Yigit et al 2006; Kwan et al 2009) in which a population
Coordinating metaheuristic agents with swarm intelligence
7
Fig. 1 The progress of evolving solutions through a typical swarm of SA agents
of solutions is created and then evolved with a fast-track simulated annealing oper-
ator on generation basis. It imposes that once an individual solution is operated by
an SA, the resulting new solution is replaced with the old one. On the other hand,
bee colony optimisation algorithm applies waggle dance principle of bee colonies
in which the best found solution is given to every agent to kick-off a fresh search
around the most promising neighbourhood. The resulted solutions are counted
and sorted accordingly, and the best of them is chosen for the next generation.
Ultimately, the third examined algorithm , which is found as the most promising
method, is particle swarm optimization algorithm. It considers a swarm of SA
agents interacting in the way of particle swarm optimisation algorithm operating.
Figure 1 sketches the progress of searching for optimum solution through gener-
ations reflecting how each agent plays its role and how the collaboration algorithm
merges the intelligence produced by each agent. First of all, a swarm of SA agents
is created, where each agent starts searching with a randomly generated prob-
lem state, xi(0). Once they finish a single run, the improved solutions, x′
i(0), are
collected into a pool and applied with a particular collaboration algorithm for ex-
changing information purpose. This step puts very significant impact on the speed
of approximation with which the collected solutions are operated with a second
algorithm to exchange information for further steps, which helps the search with
diversification. There, whichever algorithm is operating will shake up and reshuffle
the set of solutions, and as a result the diversifications will be re-cultivated each
time. This brings an easy way of switching to different neighbourhoods within the
search space. This procedure continues until a pre-defined criterion is satisfied,
which is indicated in Figure 1 as the termination state of the process. The final
set of results, x′
i(t), are merged into the final pool, and a near optimum is finally
determined.
The interaction of the SA agents in this way reminds the idea of variable neigh-
bourhood search (Hansen et al 2004; Sevkli and Aydin 2006) where a systematic
switch-off between search algorithms is organised in order to diversify the solu-
tions. In an overall point of view, the swarm of SA agents sounds borrowing this
idea to implement it in a wider context of exploration.
8
Mehmet E. Aydin
The multidimensional knapsack problem is represented in a binary way to
be inline with the integer programming model in which a decision variable of
x = {x1, ..., xK } plays the main role in process of optimisation, where x is a vector
of K binary variables. This is also the way how to present a problem state. Here,
once a corresponding amount is decided to be included in knapsack k, then xk
becomes 1 otherwise 0. The heuristic search for optimum value is conducted via use
of neighbourhood structure of inverter function, which simply inverts the value of
a randomly selected variable at a time. The main search is conducted by a so-called
fast-track SA algorithm embedded in each agent with inverting values of up to 3
variables at a time. A complete search operation by a SA agent is measured based
a cost/fitness function, which relates each state of the problem to a corresponding
real value.
fi : xi(t) −→ ℜ
(8)
where xi is the ith vector of decision variables within the swarm, which corre-
sponds to the ith SA agent. In the case of multidimensional knapsack problem,
the fitness/cost function, fi, corresponds to the objective function (Equation (1)).
An agent embedded with fast-track SA explores for better state of the problem
taking xh
i(t) following the main procedure of SA
algorithm,
i = xi(t) and producing xf
i = x′
xf
i = SAi(xh
i )
(9)
where i is the index for agents, h and f represent "hot" and "frozen" keywords 1
and SAi(.) is the problem solving process of the ith agent. There, the improvement
towards the optimum value is measured as fhot to ff rozen. As expected, the overall
search by the whole swarm of SA agents is conducted generation-by-generation as
is done in other evolutionary methodologies. Hence, implementing these multiple
SA agents, there will be N number of initial states of the problem considered by
N agents and N number of improved results produced per generation. The whole
swarm will include a set of fitness values representing the state of the swarm with
respect to the solution quality. F(t) = {f0, ..., fK } is the fitness vector of genera-
tion t through the overall problem solving process. The swarm of SA agents will
find the best of the generation, xb(t), based on the fitness vector, which provides
fbest. Moving to the next generation is subject to the level of satisfaction with the
solution quality. If it is not sufficiently optimised, yet, the next generation will be
gone through the determination of new set of hot solutions, where a coordination
algorithm is needed to combine all the experiences of the agents, and let them
select their new hot states. As explained before, the coordination algorithms con-
sidered in this research are evolutionary simulated annealing (ESA), bee colony
optimisation (BCO) and particle swarm optimisation (PSO). ESA imposes each
agent to take up x
i (t+1), where t is the index for generations, while BCO
imposes xb(t) to every agents to kick off search for next generation. PSO runs the
usual interaction procedure, which explained above, to determine the new hot so-
lutions. Therefore, a new hot solution will be produced as the result of xh
i (t + 1)
= psot(xf
i and xb are personal and global best solutions. The
whole procedure of coordination by PSO lasts between pso0(.) and psoT (.), where
T is the final generation through the whole process.
i , xb), where xpb
f
i (t) as xh
i , xpb
1 "Hot" and "frozen" are two preferred keywords to express the "initial" and "final", re-
spectively, in order to be inline with the jargon used in simulated annealing studies.
Coordinating metaheuristic agents with swarm intelligence
9
4 Experimental Study
This experimental study is not especially to solve multidimensional knapsack prob-
lem (MKP), but to test the performance of various approaches including swarm
intelligence to coordinate metaheuristic agents. The abovementioned swarm in-
telligence model for SA agents has been examined with solving multidimensional
knapsack problem, which is one of well-known NP-Hard combinatorial optimiza-
tion problems. For this purpose, a swarm of SA agents, each was configured with
a fast-track SA procedure, was created. Three approaches are examined for the
purpose of an efficient coordination: an evolutionary simulated annealing (ESA)
algorithm (Aydin and Fogarty 2004), a bee colony optimisation (BCO) algorithm
(Pham et al; 2006;2007), and a binary represented PSO algorithm (Kennedy and
Eberhart 1997), were implemented to work as a coordinator algorithm. The mul-
tidimensional knapsack problem was represented with a binary coding scheme.
SA procedure to be run by each agent was investigated for whether to be a 100
iteration long SA to run through 300 generations or a 200 iteration long SA to run
300 generations. The preliminary results confirmed that a 200 iteration long SA
algorithm with varying number of generations (Aydin 2008). That was inline with
previous researches. In addition, the size of swarm was investigated in a range of
5 to 50. The experimentation is conducted with only two moderately hard MKP
benchmarks, namely MKP6 and MKP7 collected from OR library (Beasley 1990).
The results are summarised in Table 1, 2 and 3 with the solution quality and com-
putational time, where the solution quality is measured with relative percentage
of error (RPE).
RP E =
fopt − favrg
fopt
(10)
where fopt and favrg are the optimum and the average values of experimented
results. The average value, favrg , is the mean calculated over 50 replications. The
second performance measure is the averaged CPU time, which is the mean of the
50 replications. The performance with respect to the solution quality is primarily
considered and the one with respect to CPU is secondarily considered in case of
any tight comparisons.
The implementation of the systems has been done using POP C++, which
is a GRID programming language developed by Nguyan and Kuonen (2007). It
is such a unique distributed programming language that uses object distribution
over the targeted infrastructure, and arrange automatic communications among
the distributed entities. This property of POP C++ eases its use in development
of multi agent systems. All experiments were conducted on GRID infrastructure
in Computer Science department of Applied University of Western Switzerland in
Fribourg.
Table 1 presents experimental results with the most fast-track SA agents coor-
dinated with all three approaches against various swarm sizes. The SA algorithm
is configured to run 200 iterations without any inner replications, which means
that the cooling schedule allows operating once per level of temperature. All three
algorithms, ESA, BCO and PSO, are separately applied to the same swarm of SA
agents under the same circumstances. The swarm size varies between 5 and 50
agents. The multidimensional knapsack benchmark problems tackled are MKP6
and MKP7 in all cases. All experiments are replicated for 50 times. The worst
level of achievement with respect to quality of solution is delivered by BCO while
10
Mehmet E. Aydin
Table 1 Experimental results of the swarm of fast-track SA agents with single inner iteration
and coordinated with various approaches
Swarm Size
ESA
BCO
PSO
MKP6
MKP7
RPE
CPU
RPE
CPU
RPE
CPU
0.03495
0.01183
0.00899
0.01052
0.00762
0.00768
0.00633
0.03748
0.02170
0.01528
0.01407
0.00961
0.00821
0.00865
0.11
0.43
0.86
1.08
1.80
1.86
2.56
0.14
0.52
1.01
1.17
2.34
2.20
2.66
0.02808
0.02021
0.01694
0.01530
0.01344
0.01226
0.01093
0.04077
0.03270
0.02782
0.01906
0.01516
0.01736
0.01979
0.73
1.29
1.73
2.25
2.79
4.34
5.28
0.59
1.18
1.57
2.10
2.95
4.35
5.38
0.00257
0.00214
0.00170
0.00203
0.00098
0.00122
0.00061
0.00307
0.00175
0.00112
0.00064
0.00014
0.00030
0.00028
0.84
1.38
2.31
2.40
2.56
3.67
4.09
0.78
1.30
1.31
1.31
0.93
1.21
1.15
5
10
15
20
30
40
50
5
10
15
20
30
40
50
PSO has the best and ESA has an intermediate level of achievement. On the other
hand, the shortest computational time achieved by ESA while the longest one is
done by BCO and PSO is in the middle. The overall gain by PSO over BCO, which
is the worst case, remain between 90-95% and 25-33% by ESA. The time-wise gain
is 49% and 31% by ESA and PSO, respectively. The swarm-size-wise performance
is a significant too. For both benchmarks, the size of the swarm indicates a gradual
increase in performance in all cases; the solution quality index linearly decreases.
Another most interesting fact is that the error level indicated by PSO is nearly
about 10% of both ESA's and BCO's levels.
Table 2 presents the results of experimentations sets which considered 5 inner
iterations per SA cycle. These results are much better ones comparing to the single
inner iteration case. All three algorithms that coordinate fast-track SA agents, with
5 inner iterations per cycle this time, and improve their performance gradually
through the growing size of the swarm. ESA hits 100% achievement with 30 and
40-agent swarms, while PSO hits about 99% in both cases. BCO remains improving
in comparison with the single inner case, but outperformed by both ESA and PSO.
The overall gain by PSO over BCO, which is the worst case remain between 65-
95% and 84-95% by ESA. The gain with respect to CPU times is 82% and 39%
by ESA and PSO, respectively.
Table 3 shows the experimental results of more focused SA agents, which are
replicating 10 times per step of cooling schedule. Since this way of search is more
focused, the results of both ESA and PSO hit the optimum 100% with swarm
size of 20. Therefore, the experimentation has not proceeded further. As the table
manifests, PSO and ESA compete each other, but outperform BCO with respect
to both quality of solution and computational time, where the gain over BCO in
terms of solution quality is 82-89% and 82-92% by ESA and PSO, respectively.
The achievement via CPU time is 64% and 22% by ESA and PSO, respectively.
Fig. 2 indicates the averaged-RPE results of each coordinating approach per
benchmark per level of inner iterations in fast-track SA agents. The averaged
results are tabulated across horizontal axis pointing out the overall achievement
Coordinating metaheuristic agents with swarm intelligence
11
Table 2 Experimental results of swarm of fast-track SA agents with 5 inner iterations and
coordinated with various approaches
Swarm Size
ESA
BCO
PSO
RPE
CPU
RPE
CPU
RPE
CPU
0.00069
0.00031
0.00013
0.00005
0.00000
0.00000
0.00031
0.00009
0.00006
0.00003
0.00000
0.00000
0.03
0.34
0.32
0.29
0.27
0.20
0.08
0.30
0.32
0.28
0.25
0.28
0.00182
0.00139
0.00143
0.00100
0.00090
0.00121
0.00190
0.00128
0.00118
0.00120
0.00078
0.00082
0.64
1.21
1.65
1.64
1.91
2.73
0.56
0.92
1.15
1.27
1.37
1.59
0.00076
0.00066
0.00068
0.00042
0.00021
0.00011
0.00013
0.00004
0.00009
0.00009
0.00002
0.00002
0.70
1.07
1.81
1.33
1.08
1.42
0.24
0.26
0.51
0.65
0.57
0.44
5
10
15
20
30
40
5
10
15
20
30
40
MKP6
MKP7
Table 3 Experimental results of ESA agents with 10 inner iterations and coordinated with
various approaches
Swarm Size
ESA
BCO
PSO
RPE
CPU
RPE
CPU
RPE
CPU
0.00027
0.00002
0.00000
0.00000
0.00072
0.00000
0.00000
0.00000
0.09
0.17
0.14
0.14
0.16
0.13
0.13
0.14
0.00086
0.00063
0.00066
0.00060
0.00141
0.00130
0.00070
0.00073
0.44
0.66
0.80
0.97
0.45
0.62
0.64
0.75
0.00029
0.00013
0.00008
0.00000
0.00019
0.00013
0.00002
0.00000
0.48
0.66
0.49
0.33
0.35
0.55
0.44
0.48
5
10
15
20
5
10
15
20
MKP6
MKP7
of each approach, where the benchmark problems are indicated as MPK6 and
MPK7 with each inner iteration case. INN 1, INN 5 and INN 10 indicate the inner
iteration level of 1, 5 and 10. As both the graph and the tabulated values reveal, the
performance of ESA and PSO comparable beyond the inner iterations of 5 onward.
However, their achievements remain significantly different in the case of inner
iteration 1, which is the simplest form of cooling process in SA procedure. PSO
clearly and significantly outperform both ESA and BCO approaches, while ESA
does better than BCO. Depending on their level of difficulty, simulated annealing
algorithms are configured with the level of inner iterations, whereas some problems
favour of higher level of inner iterations, but some do not do at all, especially those
are time sensitive such as resource scheduling problem of radio access networks
(Kwan et al 2009), where the speed of the algorithms are measured in nano-
second level. Therefore, more focused and intensified search will not help solving
such problems at all.
12
Mehmet E. Aydin
Fig. 2 Average performance of agent swarms in various sizes operating with all three algo-
rithms and all three inner-iteration levels
5 Conclusions
Metaheuristic agent swarms need collaboration in one way or another to deliver
an efficient problem solving services. In this paper, three collaboration algorithms
have been examined with respect to efficiency in solution quality. The agents form
up the swarms, which are configured as simulated annealing agents to solve mul-
tidimensional knapsack problem. Evolutionary simulated annealing, bee colony
optimisation and particle swarm optimisation algorithms are used for collabora-
tion purposes. The algorithm found best to be paired with SA agents is PSO,
which is a relatively newer swarm intelligence approach that has good record for
continuous problems, but usually needs a local search embedded in for combina-
torial problems. On the other hand SA needs to incorporate with other search
methods for diversification. It is significantly concluded that collaborating meta-
heuristic agents with swarm intelligence algorithm adds up value into the quality
of solution. This incorporation works in the form of a variable search algorithm in
an overall point of view. It also keeps the properties of ESA (Yigit et al 2006) as
it reheats the temperature, and works with a population.
Acknowledgements A part of this study has been carried out in Engineering College of
Fribourg in Applied University of Western Switzerland, Fribourg, Switzerland, while the author
was visiting GRID research group there. The author is particularly grateful to Prof Pierre
Kuonen, the head of GRID research group and Mr. Jean-Francois Roche, senior technician
of the group for their sincere and kind support in both use of POP C++ and making use of
their GRID infrastructure. The author is also grateful to Prof. Jie Zhang from University of
Bedfordshire, Luton, UK, for his sponsorship to the author during his visit to GRID research
group.
Coordinating metaheuristic agents with swarm intelligence
13
References
1. Aydin, M. E., Fogarty, T. C., (2004). A distributed evolutionary simulated annealing algo-
rithm for combinatorial optimisation problems". Journal of Heuristics, 10(3), 269-292.
2. Aydin, M.E., Yigit, V., (2005). Parallel simulated annealing, In: E. Alba (Ed): Parallel
Meta-Heuristics, pp. 267-288, Wiley.
3. Aydin, M. E., (2007). Meta-heuristic agent teams for job shop scheduling problems. Lecture
Notes in Artificial Intelligence 4659, 185-194.
4. Aydin, M. E., (2008). Swarm Intelligence to coordinate metaheuristic agents. In: Proc. of
IMS 2008, 14-16 October 2008, Adapazari, Turkey.
5. Beasley, J.E. (990). Obtaining test problems via Internet. Journal of Global Optimisation
8, 429-433, http://people.brunel.ac.uk/∼mastjjb/jeb/info.html.
6. Colorni, A., Dorigo, M., Maniezzo, V., Trubian, M. , (1994). Ant system for job-shop
scheduling. Belgian Journal of Operations Research, Statistics and Computer Science (JOR-
BEL), 34(1), 39-53.
7. Chen, A., Yang, G., Wu, Z., (2006). Hybrid discrete particle swarm optimization algorithm
for capacitated vehicle routing problem. Journal of Zhejiang University SCIENCE A, 7(4),
607-614.
8. DONG, C., QIU, Z., (2006). Particle Swarm Optimization Algorithm Based on the Idea
of Simulated Annealing. International Journal of Computer Science and Network Security,
6(10), 152-157.
9. Farooq, M., Bee-Inspired Protocol Engineering: From Nature to Networks. Springer, 2008,
Berlin, Heidelberg, Germany.
10. Hammami, M., Ghediera K., (2005). COSATS, X-COSATS: Two multi-agent systems co-
operating simulated annealing, tabu search and X-over operator for the K-Graph Partitioning
problem. Lecture Notes in Computer Science, 3684, 647-653.
11. Hansen, P., Mladenovic, N., Dragan, U., (2004). Variable neighborhood search for the
maximum clique Discrete Applied Mathematics, 145(1), 117-125.
12. Kennedy, J. and Eberhart, R. C., (1995). Particle swarm optimization. Proceedings of
IEEE International Conference on Neural Networks, Perth, Austrailia. pp. 1942-1948.
13. Kennedy, J. and Eberhart, R. C., (1997). A discrete binary version of the particle swarm
optimization. Proceedings of IEEE Conference on Systems Man and Cybernetics, Pisctaway,
NY, USA, pp. 4104-4108.
14. Kolonko, M. (1999). Some new results on simulated annealing applied to the job shop
scheduling problem. European Journal of Operational Research 113, 123-136.
15. Kolp, M., Giorgini, P., Mylopoulos, J., (2006). Multi-agent architectures as organizational
structures. Autonomous Agents and Multi-Agent Systems, 13, 3-25.
16. Kwan, R. Aydin, M. E., Luang, C. and Zhang, J., (2009). Multiuser scheduling in high
speed downlink packet access. IET Communications, 3(8), 1363-1370.
17. Nguyen, T.-A., Kuonen, P., (2007). Programming the Grid with POP C++. Future Gen-
eration Computer Science, 23(1), 23-30.
18. Panait, L., Luke, S., (2005). Cooperative multi-agent learning: The state of the art. Au-
tonomous Agents and Multi-Agent Systems, 11, 387-434.
19. Pham, D. T., Otri, S., Ghanbarzadeh, A. , Koc, E., (2006). Application of the Bees Al-
gorithm to the training of learning vector quantisation networks for control chart pattern
recognition. In: Proc Information and Communication Technologies (ICTTA'06), p. 1624-
1629, Syria.
20. Pham, D.T., Afify A., Koc, E., (2007). Manufacturing cell formation using the Bees Al-
gorithm. In: Pham et al (Ed): IPROMS'2007 Innovative Production Machines and Systems
Virtual Conference, pp: Cardiff, UK.
21. Sevkli, M., Aydin, M. E. (2006). A variable neighbourhood search algorithm for job shop
scheduling problems. Lecture Notes in Computer Science, 3906, 261-271.
22. Tasgetiren, M.F., Liang, Y.C., Sevkli, M. Gencyilmaz, G, (2007). Particle swarm opti-
mization algorithm for makespan and total flowtime minimization in permutation flowshop
sequencing problem. European Journal of Operational Research, 177( 3), 1930-1947
23. Vazquez-Salceda, J., Dignum, V., Dignum, F., (2005). Organizing Multiagent Systems.
Autonomous Agents and Multi-Agent Systems, 11, 307-360.
24. Wang, X., Ma, J.-J., Wang, S., Bi, D.-W., (2007). Distributed particle swarm optimization
and simulated annealing for energy-efficent coverage in wireless sensor networks. Sensor, 7,
628-648.
14
Mehmet E. Aydin
25. Wilbaut, C., Hanafi, S., Salhi, S., (2008). A survey of effective heuristics and their ap-
plications to a variety of knapsack problems. IMA Journal of Managment Mathematics, 19,
227-244.
26. Yigit, V., Aydin, M. E., Turkbey, O., (2006). Solving large-scale uncapacitated facility lo-
cation problems with evolutionary simulated annealing. International Journal of Production
Research. 44 (22), 4773-4791.
|
1912.06860 | 1 | 1912 | 2019-12-14T15:06:35 | Resolving Congestions in the Air Traffic Management Domain via Multiagent Reinforcement Learning Methods | [
"cs.MA",
"cs.AI"
] | In this article, we report on the efficiency and effectiveness of multiagent reinforcement learning methods (MARL) for the computation of flight delays to resolve congestion problems in the Air Traffic Management (ATM) domain. Specifically, we aim to resolve cases where demand of airspace use exceeds capacity (demand-capacity problems), via imposing ground delays to flights at the pre-tactical stage of operations (i.e. few days to few hours before operation). Casting this into the multiagent domain, agents, representing flights, need to decide on own delays w.r.t. own preferences, having no information about others' payoffs, preferences and constraints, while they plan to execute their trajectories jointly with others, adhering to operational constraints. Specifically, we formalize the problem as a multiagent Markov Decision Process (MA-MDP) and we show that it can be considered as a Markov game in which interacting agents need to reach an equilibrium: What makes the problem more interesting is the dynamic setting in which agents operate, which is also due to the unforeseen, emergent effects of their decisions in the whole system. We propose collaborative multiagent reinforcement learning methods to resolve demand-capacity imbalances: Extensive experimental study on real-world cases, shows the potential of the proposed approaches in resolving problems, while advanced visualizations provide detailed views towards understanding the quality of solutions provided. | cs.MA | cs | Resolving Congestions in the Air Traffic Management Domain via Multiagent
Reinforcement Learning Methods
Theocharis Kravarisa, Christos Spatharisb, Alevizos Bastasa, George A. Vourosa, Konstantinos Blekasb, Gennady
Andrienkoc, Natalia Andrienkoc, and Jose Manuel Cordero Garciad
bDept. of Computer Science & Engineering, University of Ioannina, Ioannina, Greece e-mail: [email protected]
cFrauhofer Institute IAIS, Sankt Augustin, Germany e-mail: {gennady.andrienko, natalia.andrienko}@iais.frauhofer.de
aUniversity of Piraeus, Piraeus, Greece e-mail: [email protected]
dCRIDA, Spain e-mail: [email protected]
9
1
0
2
c
e
D
4
1
]
A
M
.
s
c
[
1
v
0
6
8
6
0
.
2
1
9
1
:
v
i
X
r
a
Abstract
In this article, we report on the efficiency and effectiveness of multiagent reinforcement learning methods (MARL) for the
computation of flight delays to resolve congestion problems in the Air Traffic Management (ATM) domain. Specifically,
we aim to resolve cases where demand of airspace use exceeds capacity (demand-capacity problems), via imposing ground
delays to flights at the pre-tactical stage of operations (i.e. few days to few hours before operation). Casting this into
the multiagent domain, agents, representing flights, need to decide on own delays w.r.t. own preferences, having no
information about others' payoffs, preferences and constraints, while they plan to execute their trajectories jointly with
others, adhering to operational constraints. Specifically, we formalize the problem as a multiagent Markov Decision
Process (MA-MDP) and we show that it can be considered as a Markov game in which interacting agents need to reach
an equilibrium: What makes the problem more interesting is the dynamic setting in which agents operate, which is also
due to the unforeseen, emergent effects of their decisions in the whole system. We propose collaborative multiagent
reinforcement learning methods to resolve demand-capacity imbalances: Extensive experimental study on real-world
cases, shows the potential of the proposed approaches in resolving problems, while advanced visualizations provide
detailed views towards understanding the quality of solutions provided.
Keywords:
congestion problems, air traffic management, multi agents reinforcement learning, coordination graph
1. Introduction
Congestion problems, modelling situations where mul-
tiple agents demand to use resources of a specific capac-
ity simultaneously, exceeding resources capacity, are ever
present in the modern world. Most notably, congestion
problems are typically very complex and large-scale and
appear regularly in various real-life domains (urban traffic
congestion, air traffic management and network routing).
Consequently, it is of no surprise that they have drawn
much attention in the AI and autonomous agents research
(e.g. [2],[6],[23],[35],[37]) for at least two decades [13] and
have been the focus of game theoretic models for much
longer [27][24].
In the air-traffic management (ATM) domain, conges-
tion problems arise naturally whenever demand of airspace
use exceeds capacity, resulting to hotspots. This is known
as the Demand - Capacity Balance (DCB) problem. Hotspots
are resolved via airspace management or flow management
solutions, including regulations that generate delays and
unforeseen effects for the entire system, increasing the fac-
tors of uncertainty regarding the scheduling of operations.
For instance, they cause the introduction/increase of time
buffers in operations schedules and may accumulate de-
mand for resources within specific periods per day. These
effects present further multiple negative effects to ATM
stakeholders and are also translated into costs and loss of
reliability, including customers satisfaction and environ-
mental effects. Today, delays are imposed to flights with-
out considering the propagated effects to the entire ATM
system (e.g. to other flights and airspaces), which is in-
herently highly complex and dynamic. While delays may
be due to several reasons, the high share is allocated to
the increased demand for airspace use (over 90% in some
airspaces) [14]. It got significantly worse in 2018 [17] when
delays across Europe more than doubled, due to the in-
crease in traffic among other factors. In general, all per-
formance analysis and studies lead to the idea that the
ATM system is very close to, or already at, a saturation
level. These issues, in conjunction to the forecasted in-
crease in air traffic (e.g. Eurocontrol as Network Manager
forecasts increases in traffic of +50% in 2035 compared
to 2017, meaning 16 million flights across Europe [15][16])
impose the need for the assessment and minimization of
delays at the pre-tactical phase of operations (i.e.
from
several days to few hours before operations), also consid-
ering the effects of delays to the overall ATM system and
the highly dynamic environment in which airspace users
Preprint submitted to Expert Systems with Applications
December 17, 2019
operate.
Indeed, resolving hotspots at the pre-tactical phase of
operations and assessing delays early enough, support in-
creasing the predictability of the overall system, alleviat-
ing many of the negative effects. One of the major ob-
jectives here is to minimize ground delays while ensuring
efficient utilisation of airspace and fair distribution of de-
lays among flights. The reduction of the average ground
delay per flight for 1 minute, means vast cost savings for
all ATM stakeholders. Therefore, in this paper we con-
sider only ground delays and subsequently we succinctly
call these delays.
To resolve the DCB problem, this article formalises the
problem as a multiagent Markov Decision Process (MA-
MDP), where agents, representing flights, aim to decide
on own ground delays, jointly with others, with respect to
own preferences and operational constraints on the use of
airspace, while possessing no information about the prefer-
ences and payoffs of others: As said, the goal is to detect
and resolve all hotspots at the pre-tactical phase of op-
erations, considering the joint and propagated effects of
agents ground delays to the evolution of airspace demand,
so as to minimise delay costs, while ensuring efficient util-
isation of airspace and fair distribution of ground delays
among flights, i.e. without penalizing a small number of
them.
We show that this problem can be considered as a
Markov game, in which interacting agents need to reach
an equilibrium to conflicting delay preferences, while re-
solving hotspots in which they participate. As part of the
formulation, we devise a reward function that considers
agents' contribution to hotspots and implied cost when
agents deviate from their schedule. To solve the problem,
we propose multiagent Reinforcement Learning (MARL)
methods, whose efficiency and efficacy is evaluated in real-
world DCB problem cases, each one comprising flight plans
for a specific day (i.e. 24 hours) above Spain. The data
sources include real-world operational data regarding flight
plans submitted just before take-off per day of operation,
data regarding changing sector configurations per day of
operation, and reference values for the cost of strategic de-
lay to European airlines, currently used by SESAR 2020
Industrial Research [9]. Details are provided in Section 2.
The agent-based paradigm introduced in this paper
is in contrast to regulating flights in a first-come-first-
regulated basis - as it is the case today in ATM: Reg-
ulations are imposed to airspaces, resulting to delays for
flights entering that airspace using a first-come-first-delayed
rule, without considering the implications of these delays
to other flights operating in different airspaces and/or time
periods.
A major conclusion of this article is that collaborative
MARL methods reduce the average delay per flight quite
effectively, managing to provide solutions to DCB prob-
lems, thus, imposing delays that result to zero hotspots.
Indeed, results are quite significant, since in most of the
cases the average delay per flight (i.e. the ratio of summing
2
all delays to the total number of flights) is reduced consid-
erably compared to the solutions provided by the Network
Management organization (NM), while a small percentage
of flights have been imposed delay more than half an hour,
and only a small percentage of flights get delay.
We envisage the work laid out in this paper to be seen
as a first step towards devising multiagent methods for de-
ciding on delay policies for correlated aircraft trajectories,
answering the call of ATM domain for a transition to a
Trajectory Based Operations (TBO) paradigm (SESAR1
in Europe and Next Gen in the US2).
The contributions made in this paper are as follows:
• The Demand-Capacity Balance problem is formu-
lated as a multiagent Markov Decision Process (MA-
MDP). We also show that equivalently, it can be
considered as a Markov game in which interacting
agents need to reach an equilibrium. The problem
formulation takes into account the dynamics of the
real-world setting.
• All methods are evaluated in real-world cases com-
prising large number of flights in busy days above
Spain.
• We show the effectiveness of multiagent reinforce-
ment learning (MARL) methods to provide solutions
to the DCB problem.
• We show how visualizations of solutions allow to
understand the merits and limitations of methods,
proving a first level of explaining solutions and the
rationale behind these.
Our previous works [22, 31, 30], reported on the po-
tential of alternative multi-agent reinforcement learning
methods, providing initial results. The differences between
this article and our previous publications are as follows:
• In this article we provide a problem formulation as
a Markov game,
• We focus on the efficacy of a collaborative multi-
agent reinforcement learning method, in comparison
to independent reinforcement learning agents, show-
ing also the tolerance of the method to incorporate
preferences of agents, without reducing the quality
of solutions,
• The properties of the reward function proposed are
discussed in comparison to those of other rewards
used in resolving congestion problems,
• An extensive literature review is provided, showing
the exact contributions of our work,
1https://ec.europa.eu/transport/modes/air/sesar_en
2https://www.faa.gov/nextgen/
• Results from extensive number of experiments are
reported in a more systematic way, providing results'
statistical analysis,
• We show how visualisations can advise on the qual-
ity of solutions, delving into the details of methods'
strengths and limitations.
The structure of this paper is as follows: Section 2
provides a specification for the DCB problem and intro-
duces terminology from the ATM domain. In section 3 we
give the related work on reinforcement learning techniques
in resolving congestion problems. Section 4 presents the
problem formulation within an MA-MDP framework and
shows that the problem can be considered as a Markov
Game. Section 5 then presents the reinforcement learn-
ing methods proposed for solving the problem. Section 6
presents the formulation of the reward function and dis-
cusses desired properties from that function. Section 7
presents evaluation cases and results. Finally, section 8
concludes the article outlining future research directions.
The article is complemented by two Appendices: The first
presents the methodology for exploiting data sources to-
wards the construction of evaluation cases, and the sec-
ond explores the capacity of the multiagent reinforcement
learning methods to incorporate into their solutions airspace
users constraints on delays.
2. Problem Specification
The current Air Traffic Management (ATM) system
leads to congestion problems, casted as demand-capacity
balance (DCB) problems, i.e. cases where imbalances re-
garding the demand of airspace use and the provided airspace
capacity do occur. With the aim of overcoming ATM sys-
tem drawbacks, different initiatives, notably SESAR in
Europe and Next Gen in the US have promoted the trans-
formation of the current ATM paradigm towards a new,
trajectory-based operations (TBO) one: The trajectory be-
comes the cornerstone upon which all the ATM capabilities
will rely on.
Flight trajectories cannot be considered in isolation
from the overall ATM system: Intertwined operational as-
pects and factors of uncertainty introduced, lead to in-
efficiencies to trajectory planning and huge inaccuracies
to assessing trajectory execution. Accounting for network
effects and their implications on the joint execution of in-
dividual flights, requires considering interactions among
trajectories, in conjunction to considering dynamic opera-
tional conditions that influence any flight.
Being able to devise methods that capture aspects of
that complexity and take the relevant information into
account, would greatly improve planning and decision-
making abilities in the ATM domain.
Towards this goal, our specific aim is to assess ground
delays that need to be imposed to planned flight trajecto-
ries before the actual operations, towards resolving DCB
3
problems well-in-advance, considering ATM system dy-
namics and network effects due to interactions among tra-
jectories.
More specifically, the DCB problem (or DCB process)
considers two important types of objects in the ATM sys-
tem: aircraft trajectories and airspace sectors. Sectors are
air volumes segregating the airspace, each defined as a
group of airblocks. Airblocks are specified by a geome-
try (the perimeter of their projection on earth) and their
lowest and highest altitudes. Airspace sectorization may
be done in different ways, depending on sectors config-
uration determining the active (open) sectors, as Fig.1
shows. Only one sector configuration can be active at a
time. Airspace sectorization changes frequently during the
day, given different operational conditions and needs. This
happens transparently for flights.
The capacity of sectors is of utmost importance: this
quantity determines the maximum number of flights flying
within a sector during any time period of specific duration
(typically, in 60' periods).
The demand for each sector is the quantity that speci-
fies the number of flights that co-occur during a time pe-
riod within a sector. The duration of any such period is
equal to the duration of the period used for defining ca-
pacity.
There are different types of measures to monitor the
demand evolution, with the most common ones being the
Hourly Entry Count and the Occupancy Count.
In this
work we consider Hourly Entry Count, as this is the one
used by the Network Manager (NM) at the pre-tactical
phase.
The Hourly Entry Count (HEC) for a given sector is
defined as the number of flights entering the sector during
a time period, referred to as an Entry Counting Period (or
simply, counting period). HEC is defined to give a picture
of the entry traffic, taken at every time step value along a
period of fixed duration: The step value defines the time
difference between two consecutive counting periods. For
example, for a 20 minutes step value and a 60 minutes
duration value, entry counts correspond to pictures taken
every 20 minutes, over a total duration of 60 minutes.
Aircraft trajectories are series of spatio-temporal points
of the generic form (longi, lati, alti, ti), denoting the lon-
gitude, latitude and altitude, respectively, of the aircraft
at a specific time point ti. Casting them into a DCB res-
olution setting, trajectories may be seen as time series of
events specifying the entry and exit 3D points, and the
entry and exit times for the sectors crossed, or the time
that the flight will fly over specific sectors. Thus, given
that each trajectory is a sequence of timed positions in
airspace, this sequence can be exploited to compute the
series of sectors that each flight crosses, together with the
entry and exit time for each of these sectors.
Specifically, let us consider a finite set of discrete air
sectors R={R1, R2, ...} segregating the airspace. As al-
ready pointed out, sectors are related to operational con-
straints associated to their capacity, whose violation re-
Figure 1: Two of the configurations of sectors in the Spanish airspace. Colours are for distinguishing between sectors. Illustrations have been
created using the V-Analytics platform [5].
sults to demand-capacity imbalances: These are cases where
DR,p > CR, where p is a counting period of pre-defined du-
ration d, DR,p is the demand for sector R during counting
period p, and CR is the capacity of the sector for any pe-
riod of duration d (equal to the counting period duration),
in which the sector is open.
Thus, a trajectory T in T is a time series of elements
of the form:
T = {(R1, entry1, exit1)....(Rm, entrym, exitm)},
(1)
where Rl, l = 1, ..., m, is a sector in the airspace and en-
try/exit are time points of entering/exiting that sector.
This information per trajectory suffices to measure the de-
mand for each of the sectors R ∈ R in the airspace, in any
counting period p. Specifically, the demand in sector R in
period p is DR,p = TR,p, i.e. the number of trajectories
in TR,p, where:
temporal interval
TR,p = {T ∈ TT = (, (R, entryt, exitt), ), and the
[entryt, exitt] overlaps with period p }.
Trajectories requiring the use of a sector R at the same
period p causing a congestion, i.e. trajectories in TR,p s.t.
DR,p > CR, are defined to be interacting trajectories for p
and R.
We assume a trajectory-based operations environment,
with an enhanced accuracy of pre-tactical flight informa-
tion provided by airlines flight plans. Pre-tactical flow
management is applied prior to the day of operations and
consists of planning and coordination activities. This oper-
ational environment is close to the one existing today, but
it requires airlines to specify their flight plans during the
pre-tactical phase, allowing the detection of hotspots based
on planned trajectories and airspace operational constraints.
While today the resolution of hotspots is done either by
the Network Manager at the pre-tactical phase, or by the
Air Traffic Controller at the tactical phase of operations,
we aim towards their resolution at the pre-tactical phase.
Resolving DCB problems at the pre-tactical phase of op-
erations implies an iterative, collaborative process among
4
stakeholders, during which flight plans submitted may change
even just before take-off: The methods presented here pave
the way to such a collaboration, through automation, but
this is not within the scope of this work.
In addition, our efforts complement research on trajec-
tory planning and accurate prediction of trajectories, as
well as efforts towards enhanced information sharing abil-
ities between stakeholders. Results from these orthogonal
to our domain areas would further enhance the DCB pro-
cess at the pre-tactical phase of operations and are out of
the scope of our current work.
In this operational context we consider an agent Ai to
be the aircraft performing a planned flight trajectory, in a
specific date and time. Thus, we consider that agents and
trajectories coincide, and we may interchangeably speak
of agents Ai, trajectories Ti, flights, or agents Ai execut-
ing trajectories Ti. Agents, as it will be specified, have
own interests and preferences, and take autonomous deci-
sions on resolving hotspots: It must be noted that agents
do not have communication and monitoring restrictions,
given that hotspots are resolved at the pre-tactical phase,
rather than during operation.
To resolve hotspots, agents have several degrees of free-
dom: They may either change their trajectory to cross sec-
tors other than the congested ones, or change the schedule
of crossing sectors in terms of changing the entry and exit
time for each of the crossed sectors.
In this paper we
consider only changing the schedule of crossing sectors by
imposing ground delays: i.e., shifting the whole trajectory
by a specific amount of time.
Now, the problem is about agents to decide on their
delays so as to execute their trajectories jointly, in an ef-
ficient and safe way, w.r.t. sectors capacities. Specifically,
in the DCB problem the goal is to:
• Resolve all demand-capacity imbalances, providing a
solution with zero hotspots, in conjunction to
• minimizing the average delay per flight (ratio of total
delay to the number of flights); so as to
• distribute delays among flights without penalising a
small number of them, and
• utilise efficiently the airspace so as to have an even
distribution of demand to sectors in all counting pe-
riods within a total period of trajectories execution
H.
To resolve a hotspot occurring in period p and sector
R, a subset of interacting trajectories in TR,p must be
delayed.
It must be noted that agents have conflicting
preferences towards resolving hotspots, since they prefer
to impose the smallest delay possible (preferably none) to
their own trajectory (i.e. at least one of them should have
a greater delay than others, else the hotspot occurs later
in time), or they may have different requirements on the
maximum delay to be imposed to their flights. In any case
they do need to execute their planned trajectories safely
and efficiently.
Clearly, imposing delays to trajectories may cause the
emergence of hotspots to another time period for the same
and/or other sectors crossed. This is due to the fact that
the sets of interacting trajectories in different periods and
sectors may change. This can be done in many differ-
ent ways when imposing delays to flights, resulting to a
dynamic setting for any of the agents. Thus, the sets of
interacting trajectories do change unpredictably for the
individual agents, according to agents' decisions and ac-
cording to the changes in sectors configurations.
Agents executing interacting trajectories and contribut-
ing to hotspots are considered to be interdependent, given
that the decision of one of them directly affects the oth-
ers. These dependencies provide a way to take advantage
of the spatial and temporal sparsity of the problem: For
instance, a flight crossing the northwest part of Spain in
the morning, will never interact in any direct manner with
a flight crossing the southeast part of the Iberian Penin-
sula at any time, or with an evening flight that crosses the
northwest part of Spain. However, a flight may indirectly
affect any other flight, due to ATM network effects.
In
addition, as mentioned above, dependencies between tra-
jectories must be dynamically updated when delays are
imposed to flights, given that trajectories that did not in-
teract prior to any delay may result to be interacting when
delays are imposed, and vice-versa.
The dynamic society of agents (A, Et) is modelled as a
dynamic coordination graph [20] with one vertex per agent
Ai in A and any edge (Ai, Aj) in Et connecting agents
with interacting trajectories in T, at time t. The set of
edges are dynamically updated when the set of interacting
pairs of trajectories changes.
Nt(Ai) denotes the neighbourhood of agent Ai in the
society, i.e. the set of agents interacting with agent Ai at
time instant t and in sector R, including also itself.
The ground delay options available in the inventory of
any agent Ai for contributing to the resolution of hotspots
may differ between agents: These, for agent Ai are in Di =
{0, 1, 2, ..., M axDelayi}. We consider that these options
may be ordered by the preference of agent Ai to any of
: Di → (cid:60). We do
them, according to the function pi
not assume that agents in A − {Ai} have any information
about pi. This represents the situation where airlines set
own options and preferences for delays, even in different
own flights, depending on operational circumstances, goals
and constraints. We expect that the order of preferences
should be decreasing from 0 to M axDelayi, although, with
a different pace/degree for different agents.
2.1. Problem statement (Multiagent DCB problem resolu-
tion
Considering any pair of interacting agents Ai and Aj
in the society (A, Et), with Aj in Nt(Ai) − {Ai}, they
must select among the sets of available options Di and Dj
respectively, so as to increase their expected payoff w.r.t.
their preferences pi and pj (thus, minimizing flights de-
lays): A solution consists of assignment of delays to flights,
such that all imbalances are resolved, resulting to zero
hotspots.
This problem specification emphasises on the following
problem aspects:
• Agents (i.e.
individual flights) need to coordinate
their strategies (i.e. chosen options to delays) to ex-
ecute their trajectories jointly with others, consid-
ering traffic and network effects, w.r.t. their prefer-
ences and operational constraints;
• Agents need to jointly explore and discover how dif-
ferent combinations of delays affect the joint perfor-
mance of their trajectories, given that the way dif-
ferent trajectories do interact is not known before-
hand: This is true, given that agents do not know in
advance (a) the interacting trajectories that emerge
due to own decisions and decisions of others, (b) the
emergence of sectors open configurations, and (c)
they do not know whether trajectories crossing sec-
tors in new/emerging airspace configurations result
to new hotspots;
• Agents' preferences and constraints on the options
available may vary depending on the trajectory per-
formed, and are kept private;
• There are multiple and interdependent hotspots that
occur in the total period H and agents have to re-
solve them jointly;
• The setting is highly dynamic given that the agents
society, the occurring hotspots and the sector config-
urations change unpredictably for individual agents.
3. Related Work
In this section we consider prior work related to (a) the
resolution of the DCB problem, (b) the use of reinforce-
ment learning techniques in resolving congestion problems
5
and computing equilibria in coordination games, and (c)
reward functions and their properties.
A comprehensive review of mathematical modelling and
various formulations of demand-capacity imbalance prob-
lem is presented in [3]. This work reviews methods ad-
dressing congestions due to excess of the airport arrival
and departure capacities, or of the airspace sector capac-
ity. While most of early work refers to the simplest models,
which do not consider airspace sectors, a category of meth-
ods addressing the Air Traffic Flow Management Prob-
lem attempts to solve real situations, also considering the
airspace sector capacity. Additionally, while ground and
en-route delays are important measures studied towards
resolving congestions, methods addressing the Air Traffic
Flow Management Rerouting Problem consider also the
case where the flights can be diverted to alternative routes.
As the authors point out, the problem becomes more re-
alistic when changes in capacity are considered, which has
led to incorporating stochastic methodologies for possible
unforeseen changes. These methods focus mostly on the
tactical phase of operations, rather on the pre-tactical.
More recent work has shown the importance and po-
tential of multiagent reinforcement learning methods to
address congestion problems in Air Traffic Management
at the tactical level [2][1][10][11][35]. This provides a shift
from the current ATM paradigm, which rely on a cen-
tralized, hierarchical process, where decisions are based
on flow projections ranging from one to six hours, result-
ing to slow reactions to developing conditions, potentially
causing minor local delays to cascade into large regional
congestion.
The potential of reinforcement learning methods (ei-
ther centralized or multiagent methods) to congestion prob-
lems, other than those in the aviation domain (e.g.
to
urban traffic) has received much attention in the recent
years, with the most challenging issue being the coor-
dination among agents, so as the solutions to increase
agents individual payoff, in conjunction to increasing the
whole system utility. Towards this target there are several
proposals, among which the use of coordination graphs
[23], where agents coordinate their actions only with those
whose tasks somehow interact.
The use of coordination graphs, where agents connected
in pairs have to decide on joint policies, connects the com-
putation of joint policies to computing equilibria in Markov
games between interacting agents. Towards this goal, stud-
ies (e.g.[25][32][38]), have shown that Q-learners are com-
petent to learners using for instance WoLF [8], Fictitious
Play [18], Highest Cumulative Reward -based [29] models.
Based on these conclusions, going beyond the state of the
art and providing evidence on the potential of collabora-
tive reinforcement learning methods to compute social con-
ventions in complex settings, the work in [36] proposes so-
cial Q-learning methods, according to which agents inter-
act with all of their acquaintances, considering their tasks
in their social contexts, w.r.t.
operational constraints.
This happens in contrast to other approaches where agents
learn by iteratively interacting with a single opponent from
the population [32][28], or by playing repeatedly with ran-
domly chosen neighbours [4].
Our work goes beyond state of the art methods in re-
solving congestion problems in any domain, where either
a centralized agent learns a global policy, or multiple inde-
pendent (i.e. non-interacting) Q-learners learn their poli-
cies, considering the other agents as part of their envi-
ronment. Exceptions to this is the method proposed in
[23], where instead of collaborative reinforcement learning
methods, the max-plus algorithm has been used, and the
method proposed in [34], where a model for incorporat-
ing multiple deep reinforcement learns is proposed. The
multiagent reinforcement learning methods that this pa-
per proposes, can be seen as a continuation of the effort
reported in [36]: Indeed, we propose multiagent Q-learning
methods in which each agent interacts with all its neigh-
bours in the coordination graph, towards computing joint
policies to resolve DCB problems. We show through exper-
imentation that these methods are efficient to converging
into agents joint policies, even when the structure of the
coordination graph changes, due to the emergence of new
pairs of interacting agents. Also, experiments with col-
laborative methods provide evidence, in agreement with
the results in [36], that agents through collaboration pro-
vide solutions of better quality than methods where agents
learn in isolation from others.
It is true that the choice of the reward function is crit-
ical to the efficiency and effectiveness of the multiagent
reinforcement learning method used: Indeed, previous ef-
forts study the use of reward functions (e.g. [1][10][11][12][26])
and argue on desirable properties of these functions (i.e.
factoredness and learnability), using a specific type of re-
inforcement learners: Independent learners. Difference re-
wards have been utilized in multiagent congestion prob-
lems [12] and have repeatedly demonstrated to help with
credit assignment by shaping the global reward, to reward
agents contributing to the system's performance and pun-
ish agents that do not. Difference rewards have also been
used in the Air Traffic Management domain [2]. While
these have been shown to satisfy desirable properties when
independent learners are used, these are computationally
demanding, thus only approximations are used, while their
suitability in collaborative settings, is a research aspect
that should be thoroughly investigated: This is deemed
important in settings where phenomena emerge due to
agents joined action. In this work we propose a local re-
ward function that is shaped to estimate the cost incurred
to an agent due to its participation in hotspots and due to
its own delay. The properties of this reward function are
thoroughly discussed in section 6.
Finally, and in contrast to the rich literature and var-
ious formulations of demand-capacity balance problem in
the context of the Air Traffic Flow Management prob-
lem (among which those mentioned above) at the tactical
phase (i.e. during operation), we consider the DCB prob-
lem at the pre-tactical phase. Thus, conflicts resolved by
6
air traffic controllers (ATC) during the tactical phase are
not within the scope of our work. This, in conjunction
to considering trajectories as the main objects regulated,
supports moving to collaborative decision making for the
planning of trajectories, resolving Air Traffic Flow Man-
agement problems at the pre-tactical phase, also consider-
ing real-world phenomena due to dynamic effects emerging
by means of trajectory interactions, and dynamic changes
in the airspace sectors configurations, including changes in
sectors capacities.
4. Multiagent DCB Policy Search Problem Formu-
lation
According to the problem specification stated above,
and using the model of multiagent MDP framework [19],
we formulate the multiagent DCB policy search problem
as an MDP comprising the following constituents:
• A time horizon H and a time step t = t0, t1, t2, t3, ..., tmax,
where tmax − t0 = H.
• The dynamic society of agents (A, Et) at time t, as
described above.
• A set of agent states: A local state per agent Ai at
time t, comprises state variables that correspond to
(a) the delay imposed to the trajectory Ti executed
by Ai, ranging to Di = 0, , M axDelayi, and (b) the
number of hotspots in which Ai is involved in. Such
a local state is denoted by st
Ag
of a set of agents Ag at time t is the tuple of all
agents in Ag local states. A global (joint) state st
at time t is the tuple of all agents' local states. The
set of all joint states for any subset Ag of agents is
denoted StateAg, and the set of joint society states
is denoted by State.
i. The joint state st
• The set of agent strategies: A local strategy for agent
Ai at time t, denoted by strt
is the delay for Ai
i
at that specific time point. This delay results from
agents decisions (actions) at any time point: At each
time point until take-off the agent has to take a bi-
nary decision. It may either add to its total delay
a unit of time, or not. The joint strategy of a sub-
set of agents Ag of A at time t (e.g. of Nt(Ai)),
is a tuple of local strategies, denoted by strt
Ag (e.g.
strt
Nt(Ai)). The joint strategy for all agents A at
any time instant t is denoted strt. The set of all
joint strategies for any subset Ag of A is denoted
StrategyAg, and the set of joint society strategies is
denoted by Strategy.
• The state transition function Tr gives the transition
to the joint state st+1 based on the joint strategy
strt taken in joint state st. Formally:
T r : State × Strategy → State,
(2)
(a)
(b)
Figure 2: Payoff matrices for 2X2 games.
It must be noticed that the state transition per agent
is stochastic, given that no agent has a global view
of the society, of the decisions of others, and/or of
changing sector configurations, while its neighbour-
hood gets updated. Thus, no agent can predict how
the joint state can be affected in the next time step.
Thus, from the point of view of agent Ai this tran-
sition function is actually:
T r : StateAi × StrategyAi × StateAi → [0, 1],
st
denoting the transition probability p(st+1
i, strt
i).
• The local reward of an agent Ai, denoted Rwdi, is the
reward that the agent gets in a specific state at time
t. The joint reward, denoted by RwdAg for a set of
agents Ag specifies the reward received by agents in
Ag by executing their trajectories according to their
joint strategy, in a joint state. Further details on the
reward function are provided in section 6.
(3)
i
• A (local) policy of an agent Ai is a function πi
:
StateAi → StrategyAi that returns local strategies
for any given local state, for agent Ai to execute its
trajectory.
The objective for any agent in the society is to find an
i that maximizes the expected discounted
optimal policy π∗
future return:
V ∗
i (s) = maxπ∗
i
E[
∞(cid:88)
t=1
γt−1Rwdi(st
i, π∗
i))s = s1
i ]
i (st
(4)
for each state st
i for Ai, given the initial state s1
i . The
discount factor γ ranges in [0,1].
This model assumes the Markov property, assuming
also that rewards and transition probabilities are indepen-
dent of time. Thus, the state next to state s given a (joint)
strategy is denoted by s' and it is independent of time.
Subsequently, subscripts and superscripts are avoided in
cases where it is clear where a state or strategy refers to.
The problem is a specific instance of the problem spec-
ified in [36], where each agent has several options (minutes
of delay in our case) to execute a single task (trajectory in
this case), and tasks interact among themselves given some
operational constraints. As proposed there, the problem
can be formulated as a Markov game: Let us consider a
7
coordination graph with two agents executing interacting
trajectories (i.e. trajectories crossing the same sector) and
causing a hotspot. Let us also assume that each agent
has two delay options: a low-delay (Ld) and a high-delay
(Hd). Assuming, without loss of generality, that one of
the agents should have a Hd strategy to resolve the DCB
problem (otherwise either there would be no hotspot, or
the hotspot occurs later in time), agents are assumed to
play a game of the form shown in Fig.2(a): All entries in
this matrix are different than zero; x, x, y, y can be con-
sidered positive integers (in case the hotspot is resolved);
u, v, u, v can be negative integers (in case agents do par-
ticipate in the hotspot). As it can be noticed, this can be a
coordination game, with two Nash equilibria, namely the
joint options providing payoffs (x, y) or (x, y). However,
this is not necessarily a symmetric game, considering that
the payoff incorporates agents preferences and delay costs.
The game can be extended to multiple strategies and/or
agents executing interacting trajectories.
Given that the information concerning the effects of
agents joint decision is not known to any agent in the so-
ciety, and given that agents do not know about the pay-
offs of other agents when choosing specific delay strategies,
agents need to learn about the structure of the game to be
played, and they have to coordinate with others, as well.
The information that an agent has about a 2 × 2 game is
as shown in Fig.2(b). Question marks indicate the missing
information: For instance, none of the two agents knows
whether a strategy is effective in resolving hotspots, nor
the payoffs from joint strategies. Our goal is any pair of
interacting agents Ak, Al in the society to converge to a
joint delay strategy, so as to resolve hotspots that occur,
jointly with all society members.
5. MARL Algorithms
We now describe the proposed MARL methods to deal
with the multiagent DCB policy search problem. Q-functions,
or action-value functions, represent the future discounted
reward for a state s when acting with a specific strategy str
for that state and behaving optimally from then on [33].
The optimal policy for any agent Ai in state s is the one
maximizing the expected future discounted reward, i.e.
π∗(s) = argmaxstrQ(s, str).
(5)
In the next paragraphs we describe multiagent rein-
forcement learning approaches, considering that agents do
not know the transition model, and interact concurrently
with all their neighbours in the society.
learning agents in the literature for resolving congestion
problems.
The independent Q-learning variant proposed in [20]
decomposes the global Q-function into a linear combination
of local agent-dependent Q-functions:
A(cid:88)
Q(s, str) =
Qi(si, stri)
(6)
i=1
Each local value, Qi, for agent Ai is calculated according
to the local state, si, and the local strategy, stri. The local
value Qi is updated according to the temporal-difference
error, as follows:
Qi(si, stri) = Qi(si, stri) + α[Rwdi(si, stri) +
i, str) − Qi(si, stri)]
+γmaxstrQi(s(cid:48)
(7)
It must be noted that instead of the global reward Rwd(s, str)
used in [20], we use the reward Rwdi received by the agent
Ai, taking into account only the local state and local strat-
egy of that agent. Thus, this method is in contrast to the
approach of Coordinated Reinforcement Learning model
proposed in [20], since that model needs agents to know
the maximizing joint action in the next state, the associ-
ated maximal expected future return, and needs to esti-
mate the Q-value in the global state.
5.2. Edge Based Collaborative Reinforcement Learners (Ed-
MARL)
The Edge Based Collaborative Reinforcement Learn-
ing (Ed-MARL) is a variant of the Edge Based update
sparse cooperative Q-learning method proposed in [21].
Given two neighbour agents Ai and Aj connected by an
edge in the coordination graph (i.e. representing interact-
ing flights), the Q-function for these agents is denoted as
Qij(sij, strij), where sij, with abuse of notation, denotes
the joint state related to the agents Ai and Aj, and strij
denotes the joint strategy for these two agents.
Half the sum of all edge-specific Q-functions defines the
global Q-function, i.e.
Q(s, str) =
1
2
(cid:88)
i,j∈E
Qij(sij, strij)
(8)
The Q-learning update rule in this case is given by the
following equation:
(cid:20)
Qij(sij, strij) = (1 − α)Qij(sij, strij) +
+α
ri
N (Ai) +
rj
N (Aj) + γQij(s(cid:48)
ij, str∗
ij)
(9)
(cid:21)
5.1. Independent Reinforcement Learners (IRL)
In the Independent Reinforcement Learners (IRL) frame-
work, each agent learns its own policy independently from
the others and treats other agents as part of the envi-
ronment. This is the main paradigm for reinforcement
where t is the time instant that the agents reach the joint
state sij, and str∗
ij in [21] is the best joint strategy for
agents Ai and Aj for the joint state s(cid:48)
ij.
In our method, the strategy str∗
ij comprises the best
strategy known by agents for the occurring state and it is
depicted directly from the agent's value function, Qi(s, str),
8
which is calculated as the summation of local Qij values
in its neighbourhood:
For an agent Ai, the degree of factoredness between the
rewards Rwdi, and Rwd, at joint state s is defined as:
((cid:80)
(10)
(11)
FRwdi =
s(cid:48) u[(Rwdi(s) − Rwdi(s(cid:48)))(Rwd(s) − Rwd(s(cid:48)))])
((cid:80)
s(cid:48) 1)
str∗ = argmaxstrQi(s, str)
(cid:88)
Aj∈N (Ai)
Qi(s, stri) =
Qij(sij, strij)
where, sij is the agents joined state having s as one of
its components. This approximates the best strategy in
each state, which is improved as the agents learn. We ex-
perimentally found out that this approximation method
offers comparable quality and considerable improvement
in methods computational efficiency than using compu-
tationally/communication intensive approximation meth-
ods, such as the max-sum method used in [21]. Succinctly,
according to the Ed-MARL approach agents update Q-
values by propagating edge-specific temporal differences to
their neighbouring agents, and only along the correspond-
ing edges, sharing their local rewards with their neigh-
bours.
The main difference between the collaborative Ed-MARL
and the IRL method, is that while IRL agents consider
own states and strategies without sharing any information
with others (i.e. treating others as noise), the collabora-
tive approach assumes interacting agents, supporting them
to explore joint policies, by means of computing joint Q-
values.
6. Reward Function
In many multiagent reinforcement learning problems,
the task of determining the reward function in order to
produce good performance is quite demanding. The re-
ward function can be approximated in cases where training
examples provide ground truth, e.g. via inverse reinforce-
ment learning methods, which is not the case for the DCB
problem considered in this work (although it happens in
other instances of the problem, as in [7]). The utilization
of a reward that facilitates coordination is crucial to the
majority of multiagent problems, especially to learning in
dynamic and complex environments where the actions of
individual agents affect the local and global agents payoff.
6.1. Properties of reward functions
Considering a multiagent system where (a) each agent
Ai is taking actions to maximize its local reward Rwdi,
and (b) the performance of the full system is measured
by the global reward Rwd; and assuming that the system
joint state s is decomposed into a component that depends
on the state of agent Ai, denoted by si, and a component
that does not depend on the state of agent Ai, denoted
by s−i, we aim to produce rewards that facilitate learning
joint strategies efficiently. In doing so, we may consider
two properties of the reward function, already proposed in
[1]:
The first property, called factoredness, concerns align-
ing the individual agent rewards with the global reward.
9
(12)
where the states s and s only differ in the states of agent
Ai, and u[x] is the unit step function, equal to 1 if x > 0.
Intuitively, the degree of factoredness gives the percentage
of states in which the action of agent Ai has the same
impact on Rwdi and Rwd.
The second property, called learnability, measures the
dependence of the reward on the actions of a particular
agent as opposed to all the other agents. The point learn-
ability of reward Rwdi between state s and s is defined as
the ratio of the change in Rwdi due to a change in the
state of agent Ai over the change in Rwdi due to a change
in the states of other agents:
L(Rwdi, s, s(cid:48)) =
(cid:107) Rwdi(s) − Rwdi(s − si + s(cid:48)
(cid:107) Rwdi(s) − Rwdi(s(cid:48) − s(cid:48)
i + si) (cid:107) (13)
where, addition and subtraction operators remove or
i) (cid:107)
add components into states.
The learnability of a reward Rwdi is then given by:
(cid:80)
s(cid:48) L(Rwdi, s, s(cid:48))
((cid:80)
s(cid:48) 1)
L(Rwdi, s) =
(14)
Intuitively, the higher the learnability, the more Rwdi de-
pends on the move of agent Ai, i.e., the better the associ-
ated signal-to-noise ratio for Ai.
6.2. The proposed reward function
For the DCB problem we have formulated the individ-
ual delay reward Rwdi: For an agent Ai in A this reward
depends on the participation (contribution) of that agent
in hotspots occurring while executing its trajectory, ac-
cording to its strategy strt
i, i.e. according to its
decided delay. Formally:
i in state st
Rwdi(st
i, strt
i) = C(st
i, strt
i) − λ ∗ DC(strt
i)
(15)
where,
• C(st
i, and
• DC(strt
i, strt
i) is a cost function that depends on the
participation of Ai in hotspots, given the strategy
strt
i) is a function of agents ground delay cost
given by that strategy.
The (user-defined) parameter λ balances between the cost
the participation in hotspots implies, and the cost of the
ground delay imposed towards. The goal is for any agent
to participate in zero hotspots with the minimum possible
delay.
Actually, both functions C(st
i) rep-
resent delay costs at the pre-tactical phase of operations.
i) and DC(strt
i, strt
i, strt
We have chosen C(st
i) to depend on the total duration
of the period in which agents fly over congested sectors:
This gives a measure of the severity of the imbalances in
which agent Ai contributes, and it is equal to the maxi-
mum delay that it may get if it is the sole agent causing
the congestion. This is multiplied by 81 which is the aver-
age strategic delay cost per minute (in Euros) in Europe
when 92% of the flights do not have delays [9]. If there is
not any congestion, then this is a positive constant that
represents the reward agents get by not participating in
any hotspot. Overall, the actual form of C(st
i) is as
follows:
i, strt
(cid:26) −T DC × 81
,
P ositiveReward ,
C(st
i, strt
i) =
if T DC > 0
if T DC = 0
(16)
where, TDC is the total duration for agent Ai in congested
sectors. The first case holds when there are hotspots in
which the agent participates (thus, the total duration in
hotspots, TDC, is greater than 0), while the second case
holds when agents do not participate in hotspots.
The DC(strt
i) component of the reward function cor-
responds to the strategic delay cost when flights delay at
gate. In our implementation, this depends solely on the
minutes of delay and the aircraft type, as specified in [9].
As such, the actual form of this function is as follows:
DC(strt
i) = StrategicDelayCost(strt
i, Aircraf t(Ai))
(17)
where strt
i is the delay imposed to the agent Ai and Strate-
gicDelayCost is a function that returns the strategic delay
cost given the aircraft type of agent Ai and its delay. In the
general case the function DC(strt
i) could be taking into ac-
count additional airline-specific strategic policies and con-
siderations regarding flight delays.
Coming to the properties of the individual delay reward
function, and specifically to its factoredness, the impact
Rwdi has on the global reward Rwd, given as the summa-
tion of individual agents rewards, depends on the effect
that the strategy of Ai has on the states of other agents.
Specifically, we may distinguish the following cases: (a)
For agents that do not interact with Ai, i.e.
for agents
with which Ai does not co-occur in hotspots, the action
of Ai has not any direct effect to their reward (it may af-
fect their reward, but only indirectly via the strategy of
other agents). Specifically, for these agents, neither the
C nor the DC part of their reward changes due to the
action of Ai. (b) For agents in N (Ai) − Ai with whom
Ai interacts, and in case these agents do not change their
strategy, their reward changes only by changing Ai's strat-
egy. In this case, the C part of their reward may change
due to a possible change in occurring hotspots, and the
DC part changes due to the change of Ai delay, only. (c)
For agents in N (Ai) − Ai with whom Ai interacts, and in
case these agents do change their strategy synchronously
to Ai, then the strategy of Ai impacts the rewards of these
agents, given that rewards consider the hotspots occurring
due to agents joint action (C part of the reward). On the
10
other hand, while each agent considers the cost incurred
due to its own strategy (DC part of the reward) only, the
total reward is aligned with individual agents rewards.
As a conclusion, the individual delay reward has a high
degree of factoredness given that rewards of agents in the
society are affected by the strategies of others, and the
global reward is aligned with individual agents rewards.
As far as learnability is concerned, in the DCB domain, as
in other domains where the joint strategy of agents is of
importance, the reward received by the agent Ai depends
on the joint strategy of all agents: The resulting hotspots
emerge as an effect of agents joint strategy, even if agents
did not interact directly with Ai. Thus, the ratio of the
change in Rwdi due to a change in the state of agent Ai,
over the change in Rwdi due to a change in the states of
other agents, may not be always proportional to the effec-
tiveness of agents strategy, as it depends on the strategies
of the other agents.
7. Experimental Results
7.1. Description of evaluation cases
To evaluate the proposed MARL methods, we have
constructed evaluation cases of varying difficulty. Ap-
pendix A describes the general procedure we follow for
constructing an evaluation case. Although the difficulty
of DCB problems cannot be determined in a rigorous way,
we did this empirically, by inspecting problem parame-
ters (explained subsequently) in conjunction to the aver-
age delay per flight according to the delays imposed by the
Network Management organization (NM). While the NM
specifies the delay to be imposed to each flight towards
resolving demand-capacity imbalances, this is not always
a DCB problem solution: Hotspots do occur even if de-
lays are imposed to flights. This shows the tolerance of
the system, as well its reliance to resolving imbalances in
the tactical phase of operations, as opposed to resolving
hotspots in the pre-tactical phase, according to our aim.
Having said that, it is important to point out that delays
imposed by the NM cannot be compared in a direct way
to solutions provided by the proposed methods, given that
in the former case many decisions are to be taken at the
tactical phase. However, comparison shows the merits of
MARL methods to solve DCB problems.
Each evaluation case corresponds to a specific day in
2016, above Spain, and its difficulty has been determined
by means of the number of flights involved, the average
number of interacting flights per flight (which is translated
to the average degree for each agent in the coordination
graph, at starting time t0), the maximum delay imposed
to flights for that day to resolve DCB problems according
to the NM, the average delay per flight for all flights ac-
cording to NM, and the number of hotspots in relation to
the number of flights participating in these hotspots, at
starting time t0.
Table 1 presents the different cases, named by the day
to which they correspond. Columns specify the following:
Evaluation # flights
Case ID
Aug4
Aug13
Jul2
Jul12
Sep3
5544
6000
5572
5408
5788
6.41(17-20)
10.89(22-105)
6.39(29-107)
5.84(21-95)
5.24(18-77)
66
147
80
95
61
0.383
1.152
1.663
0.95
0.732
Table 1: Description of the evaluation cases used in our experimental study.
Average Degree in MaxDelay Average # flights
Coordination Graph
(non-zero min/max)
Delay
with
delay
146
415
498
254
280
# hotspots
(participating)
(flights)
33 (853)
53 (1460)
29 (778)
28 (820)
26 (783)
• Number of flights: The number of flights for that
particular day above Spain.
• Average Degree in Coordination Graph (min/max):
This indicates in average the traffic (i.e. the num-
ber of interacting flights) experienced by each of the
agents (flights) in each evaluation case at starting
time t0. This number changes while agents decide
on their strategies. It is expected that as the coordi-
nation graph becomes denser, i.e. as the average de-
gree of nodes in the coordination graph increases, the
problem becomes more computationally demanding.
Min/Max indicates the minimum and the maximum
degree reported in the coordination graph per eval-
uation case at starting time t0, ignoring zeros.
• MaxDelay: This is the maximum delay imposed to
any flight according to the NM for that particular
day, and we use this in our experiments as the maxi-
mum delay that can be imposed to any flight for the
corresponding case.
• Average Delay: This is the average delay per flight
reported by the NM for that particular day, ignoring
all delays with less than 4 min (considered as no
delay, according to experts advise).
• Number of flights with delay: This is the number of
flights with delays more than 4 min, due to demand-
capacity imbalances, as reported by NM for that
particular day. Delays due to other reasons (e.g.
weather conditions) are ignored.
• Max number of hotspots (number of flights): It indi-
cates the number of hotspots of each individual case
at starting time t0, together (in parenthesis) with the
number of flights that participate in these hotspots
(each flight may participate in multiple hotspots).
As far as the difficulty of cases is concerned, it turns out
that there are many other crucial features that determine
the difficulty of each case, such as the duration of flights in
hotspots, the specific excess on capacity for these hotspots,
the number of consecutive counting periods in which the
demand exceeds the capacity of a sector etc. We have
not determined the exact features (this is out of scope of
this work), but after extensive experimentation, we can
11
Figure 3: NM solution for July 2: (Left) Flight delays are repre-
sented by circles positioned at the sector centroids. The sizes are
proportional to the delay durations. (Right) The space-time cubes
show the spatio-temporal distribution of the delays. The time axis
is oriented upwards, towards the end of the day.
conclude that the degree of difficulty is proportional to
the average delay per flight that should be imposed, and
to the ratio of flights with delay to the flights participating
in hotspots at time t0. Specifically, it can be assessed as
follows:
DegreeOf Dif f iculty =
AverageDelayP erF light ∗ N umberOf F lightsW ithDelay
F lightsP artcipatingInHotspots
(18)
Based on this rule the most difficult case among our
cases in Table 1 is the case Jul2. To understand the dif-
ficulty of the Jul2 case we need to delve into the visu-
alizations shown in Fig.3. Visual exploration of to DCB
cases and solutions, provide insights about the situations
occurring and the rationale behind imposed delays. We
have used the V-Analytics tool [5] to produce maps and
space-time cubes that show the spatio-temporal distribu-
tions of the delays. Delays are represented by circles and
the sizes are proportional to the delay duration. The spa-
tial positions of the cycles are the positions of the sector
centroids, depicting delays per sector. The temporal axis
in the cubes goes from the bottom to the top.
The maps show that the NM imposes increased de-
lays on the east (areas of Barcelona, Canary Islands, and
Valencia) and on the south (Seville and Granada), while
delays on the northwest of Spain, compared to the others,
are not that many or large. Space-time cubes show that
delays are distributed during the day, except in the north-
• Learning curves: the progress of the average delay
per flight as agents learn. As algorithms converge to
solutions, the number of hotspots should be reduced
and eventually reach to zero, signifying the computa-
tion of a solution, while the average delay should be
reduced. Therefore, the speed of reaching that point
(zero hotspots) and the round at which methods sta-
bilize3 the agents joint policy, signify the computa-
tional efficiency of the method to reach solutions. It
must be noted that, in case that a method cannot
reach a solution for a specific case, it may converge
to a joint policy that do not resolve all hotspots.
• Distribution of delays to flights: histograms showing
the number of flights in discrete time intervals, such
as 5-9 minutes of delay, 10-29 minutes of delay, 30-59
minutes of delay, etc., up to the M axDelay specified
per case.
Results reported are averages of results computed by
20 independent experiments per case and method. Specif-
ically, we report results from two methods: Independent
(IRL), and Collaborative (Ed-MARL) Reinforcement Learn-
ing. Finally, and in order to show the tolerance of the
methods in specific delay preferences per flight, we ex-
plore their potential to resolve DCB problems by consid-
ering constraints on the M axDelay imposed to specific
flights. In other words, these are cases where some of the
flights impose a constraint to their maximum delay, much
less than the M axDelay imposed to the other flights (Ap-
pendix B).
The proposed MARL methods have been executed for
15000 rounds (episodes) following an -greedy exploration-
exploitation strategy starting from probability 0.9, which
every 120 rounds is diminished by the value of 0.01. At
episode 10800 the probability becomes 0.001 and is hence-
forth considered zero. Then, a pure exploitation phase
starts. In addition to the above, and in order to enhance
the efficiency of the proposed methods, we have considered
a deterministic rule for the flights that do not participate
in any hotspot (i.e. agents with no neighbours): These
are set to have delay equal to 0. It must be pointed out
that any of these flights may participate in hotspots in
any past/future state, due to the joint strategies of the
other agents. In any such case the corresponding agents
participate in the multiagent RL process.
Fig.5 illustrates the learning curves obtained by the
training procedure in terms of the average delay, where we
show the mean delay and its standard deviation at every
episode of the learning process. Both methods converge
effectively after a period of exploration. In most case their
performance is remarkable since they reach (almost) al-
ways the same solution with a low variability. However,
3I.e. remaining to zero hotspots and to a specific value for flights
average delay -without oscillating between non-solutions and/or so-
lutions, and/or different average delay values.
12
Figure 4: (upper) A 3D view shows the 3D shapes of the sectors
whose capacities were exceeded with the NM solution provided for
Jul2. The colouring from yellow to red represents the maximal ca-
pacity excess.
(lower) Demand evolution for the most demanded
sector in northwest Spain for Jul2, prior to applying any delay. The
capacity of this highly-demanded sector is 34 (indicated with the
horizontal red line).
west of Spain where they increase slightly by the end of
the day.
Concerning the details of the problem, we have ex-
tracted the sectors capacity excess events from the time
series of the sector demand differences to the capacities.
Fig.4 shows the 3D shapes of the sectors whose capaci-
ties were exceeded with the NM solution provided. The
red colour of the north-west sector shows the large de-
mand compared to the capacity for this sector. This is
further shown in the histogram in Fig.4 The histogram
shows the demand evolution per counting period for the
highly-congested sector in the initial problem state (i.e.
prior to imposing any delay).
Therefore, while there is an excess of capacity for many
sectors, this happens at a large degree in the northwest
part of Spain for Jul2: As the evolution of demand shows
for this highly-demanded sector (Fig.4), the excess of ca-
pacity is high, especially in consecutive periods at the
second-half of the day. This means that while delays may
resolve demand-capacity imbalances for specific periods,
imbalances in adjacent periods may become more severe.
7.2. Evaluation Results
In our experimental study we have evaluated our meth-
ods using the following metrics:
• Number of flights with delay: also mentioned as reg-
ulated flights.
• Average delay per flight: the ratio of total delay to
the number of flights ignoring delays less than 4 min-
utes.
Figure 5: The learning curves of the proposed methods per evaluation case, showing how agents manage to learn joint policies to resolve
DCB problems, resulting to 0 hotspots, while reducing the average delay per flight. The x-axis corresponds to the learning episodes, while
the y-axis to the average delay per flight.
13
the Ed-MARL approach offers more qualitative solutions
with less average delay per flight. The IRL method man-
ages to converge much faster (earlier than episode 10000)
since it is simpler, without any overhead due to the col-
laboration among agents. However, it should be noticed
that convergence does not imply solving the problem. A
method may converge to a joint policy, imposing delays to
flights, which may not resolve all hotspots. This is not the
case for the methods, which resolve all imbalances, in all
evaluation cases.
Delving into the quality of results, Fig.6 shows the aver-
age delay per flight (Fig.6(a)) and the number of regulated
flights (Fig.6(b)) reported by each method. In particular,
Fig.6(a) provides the average delay (y-axis) per flight on
every evaluation case (x-axis). For comparative purposes,
we show also the average delay reported by the NM. Eval-
uation cases are ordered according to the average delay
per flight reported by NM in increasing order (green bar).
As it can be observed, the average delay per flight re-
ported by MARL methods does not increase consistently
to the average delay per flight reported by NM. This dif-
ference with the NM reflects the shift of paradigm MARL
methods provide. While the NM imposes delays to flights
in a first come first regulated basis, MARL methods reg-
ulate flights jointly, so as to reach a solution that is of
best interest to all agents. Among the MARL methods,
the Ed-MARL (blue bar) is consistently better than the
IRL method except for the Sep3 case where both meth-
ods achieve similar results in terms of average delay. We
can also notice that the NM solution provides lower av-
erage delay per flight in every evaluation case except for
Jul12. However, as already pointed out, delays imposed
by the NM do not resolve all the demand-capacity imbal-
ances. For instance, the NM delays resolve only 2 hotspot
occurrences out of 33 in Aug4 scenario. Regarding the
number of flights to which our methods impose delays
(regulated), as shown in Fig.6(b), the Ed-MARL method
manages to provide solutions with consistently less regu-
lated flights than the IRL approach. Again, the number
of regulated flights reported by the NM is lower than the
flights regulated by the proposed methods (except for the
Jul2 and Jul12 cases), but they do not manage to resolve
all the imbalances. Looking at the results, we can con-
clude that the Ed-MARL collaborative method provides
the most promising results. Visualizations of their solu-
tions provide more evidence on their quality and on the
rationale behind agents strategies.
We further present in Fig.7 the results of both MARL
methods using box plots as calculated by executing 20 in-
dependent experiments at every evaluation case. The left
diagram Fig.7(a) shows the average delay per flight and
the right diagram Fig.7(b) the number of regulated flights.
Moreover, in an attempt to gain a clearer picture of the
performance of our methods, we provide in Tables 2, 3
several statistical measures calculated by 20 experiments:
mean value (Avg), standard deviation (Std), median and
the p-value of test analysis, respectively. The last statis-
tic, p-value, refers to the Kolmogorov-Smirnov (K-S) test
that performs a test for normal distribution of data. The
greater this value, the most evidence to accept the null
hypothesis, i.e.
that data follow a normal distribution,
and to consider the obtained experimental results more
statistically significant and representative. From these re-
sults we can see the small variability of two evaluation
measurements, as well as the high p-values. Only in one
case (Jul12) the obtained average delays of the Ed-MARL
method gave a small p-value (0.016). However, looking
carefully in Table 2, its standard deviation (Std) is very
small (0.009) that indicates almost constant behavior.
Results can be further explained by the conjunction of
the following facts:
• The collaborative Ed-MARL method guide agents to
form joint policies within their neighbours by shar-
ing their local rewards via edges in the coordination
graph.
• Any agent using the IRL method does not have the
capability to shape joint strategies with peers via
sharing rewards, and does not affect in any direct
way the Q-values learnt by other agents.
Furthermore, Fig.8 provides the distribution of delays
to flights reported by both MARL methods and the NM,
in all evaluation cases. Although it seems that the NM
avoids imposing large delays on flights, we need to recall
that the NM delays do not provide solutions to the DCB
problems. The Ed-MARL method ends up in giving de-
lays to fewer flights, while both methods reduce drastically
the number of regulated flights as moving from small to
large delay intervals. A last remark is about the increased
number of flights with large delays in three of the cases
(Aug4, Sep3, Jul2). Using appropriate visualizations that
show distribution of delays in space and time we can delve
into the details of each case and offer further advise to
choosing solutions, explaining the rationale behind meth-
ods solutions. We discuss the solution for the most difficult
case: Jul2.
Figs. 9 and 10 present spatial and spatio-temporal dis-
tribution of delays imposed by MARL methods, superim-
posed to NM delays. In particular, Fig.9 presents the so-
lution from the Ed-MARL method, while Fig.10 presents
the solution from the IRL method. The maps show that,
compared to the NM, the methods reduce the delays on
the east (areas of Barcelona, Canary Islands, and Valencia)
and on the south (Seville and Granada) but increase the
delays on the northwest of Spain. Space-time cubes also
show that MARL methods perform notably better in the
first half of the day. In all areas except the northwest of
Spain they also perform well in the second half of the day.
The delays in the northwest area significantly increase by
the end of the day according to both MARL methods.
We need to recall that extracting the sectors capacity
excess events from the time series of the sector demand,
we observed an excess of capacity for many sectors, which
14
Figure 6: Comparative results in bar charts: (a) Average delays per flight and (b) Number of flights with delays from: Ed-MARL (blue bar),
IRL (red bar), NM (green bar). The x-axis shows evaluation cases that have been sorted according to NM solutions average delay per flight.
Figure 7: Comparative results of (a) average delays and (b) number of regulated flights, presented in box plots for Ed-MARL and IRL
methods per evaluation case.
Table 2: Statistical measurements of average delays obtained by 20 intependent experiments.
Evaluation Case ID
Aug4
Sep3
Jul12
Aug13
Jul2
Avg
0.868
0.895
0.112
1.266
1.729
Ed-MARL
IRL
Std Median P-Value Avg
0.049
1.074
0.905
0.063
0.369
0.006
1.516
0.049
0.050
1.802
0.875
0.890
0.110
1.275
1.730
0.443
0.794
0.018
0.952
0.556
Std Median P-Value
0.042
0.042
0.017
0.062
0.037
1.070
0.890
0.370
1.515
1.805
0.691
0.222
0.726
0.996
0.480
Table 3: Statistical measurements of number of regulated flights obtained by 20 intependent experiments.
Evaluation Case ID
Aug4
Sep3
Jul12
Aug13
Jul2
Avg
219.4
202.7
70.42
482.1
454.2
Ed-MARL
IRL
Std Median P-Value Avg
374.7
20.1
350.0
18.2
4.0
221.1
639.9
15.8
9.8
463.4
216.5
195.0
71.0
481.0
452.0
0.723
0.275
0.739
1.000
0.694
Std Median P-Value
14.3
12.4
6.3
13.1
9.4
0.722
0.582
0.787
0.963
0.645
376.5
351.0
223.0
640.5
466.0
15
Figure 8: The distribution of delays to flights per evaluation case. The x-axis indicates the delay imposed while the y-axis corresponds to the
number of flights with delay. Notice that the maximum delay (and thus x-axis values) differs among evaluation cases.
16
Figure 9: Ed-MARL solutions (in orange) for Jul2 compared to NM
solutions (in blue).
Figure 10: IRL solutions (in orange) for Jul2 compared to NM solu-
tions (in blue).
happens at a large degree in the northwest part of Spain
for Jul2, especially in consecutive periods at the second-
half of the day. MARL methods, thus, to resolve these
hotspots, increase the delays imposed to flights, especially
for flights crossing the parts of the airspace in the periods
of high demand.
8. Conclusions
In this paper we formulate the problem of resolving
demand-capacity imbalances (DCB) in ATM as a coor-
dination problem of agents that operate to a multiagent
MDP framework. We propose the use of MARL tech-
niques to solve this problem, as a new paradigm for resolv-
ing demand-capacity imbalances at the pre-tactical phase
of operations. A novel, generic reward function was con-
structed that takes into account the agents' participation
in hotspots, and also the strategic cost of delay. The pro-
posed methods were evaluated on real-world cases encom-
passing thousands of agents in complex / dynamic set-
tings, where we measure their efficiency (speed of conver-
gence) and effectiveness (quality of solutions). The re-
sults were very promising as our collaborative MARL ap-
proaches were able to successfully resolve complex DCB
problems in ATM.
More than that, we envisage the work laid out in this
paper to be seen as a first step towards devising multia-
gent methods for prescribing the effect of traffic to corre-
lated aircraft trajectories, contributing to the transition to
a trajectory-based air-traffic management paradigm. This
will hopefully help overcome the shortcomings of the cur-
rently used ATM paradigm, and as such, could in time
allow commercial aircrafts to fly their preferred trajecto-
ries without being constrained by airspace configurations.
It is our intention to further pursue and develop the
proposed scheme, mainly on the following directions:
• Extend our work in deep reinforcement learning schemes
by considering continues state spaces and value func-
tion approximation models.
• Validate the proposed framework on other real-world
evaluation cases in a more systematically way.
• Study the effectiveness alternative reward functions
that may contain richer discriminating features.
Acknowledgment This work has been supported by the
DART project, which has received funding from the SESAR
Joint Undertaking under grant agreement No 699299 un-
der European Union Horizon 2020 research and innova-
tion programme; It has been partially funded by National
Matching Funds 2017-2018 of the Greek Government, and
more specifically by the General Secretariat for Research
and Technology (GSRT), related to DART and datAcron
project. For more details, please see the DART project's
website, http://www.dart-research.eu.
References
References
[1] Agogino, A.K., Field, M., 2005. Multiagent reward analysis
for learning in noisy domains. International Conference on Au-
tonomous Agents and Multiagent Systems (AAMAS 05) , 81 --
88.
[2] Agogino, A.K., Tumer, K., 2012. A multiagent approach to
managing air traffic flow. Autonomous Agents and Multiagent
Systems 24, 1 -- 25.
[3] Agustn, A., Alonso-Ayuso, A., Escudero, L., Pizarro-Romero,
C., 2010. Mathematical optimizationg models for air traffic flow
management: A review. Stud. Inform. Univ. 8, 141 -- 184.
[4] Airiau, S., Sen, S., Villatoro, D., 2014. Emergence of conven-
tions through social learning. Autonomous Agents and Multi-
Agent Systems 28, 779 -- 804.
[5] Andrienko, G., Andrienko, N., Bak, P., Keim, D., Wrobel, S.,
2013. Visual analytics of movement. Springer .
[6] Bazzan, A.L.C., 2009. Opportunities for multiagent systems
and multiagent reinforcement learning in traffic control. Au-
tonomous Agents and Multi-Agent Systems 18, 342 -- 375.
[7] Bloem, M., Bambos, N., 2015. Ground delay program analyt-
ics with behavioral cloning and inverse reinforcement learning.
Journal of Aerospace Information Systems 12, 299 -- 313.
[8] Bowling, M., Veloso, M., 2002. Multiagent learning using a
variable learning rate. Artificial Intelligence 136, 215 -- 250.
A.J.,
delay
[9] Cook,
airline
http://www.eurocontrol.int/publications/
european-airline-delaycost-reference-values.
Tanner,
cost
reference
values.
G.,
2015.
European
URL:
[10] Crespo, A., Weigang, L., Barros, A.D., 2012. Reinforcement
learning agents to tactical air traffic flow management. Inter-
national Journal of Aviation Management 1, 145 -- 161.
17
Cooperative deep reinforcement learning for large-scale traffic
grid signal control. IEEE Transactions on Cybernetics , 1 -- 14.
[35] Tumer, K., Agogino, A., 2007. Distributed agent-based air traf-
fic flow management. International Conference on Autonomous
Agents and Multiagent Systems (AAMAS 07) .
[36] Vouros, G.A., 2017. Learning conventions via social reinforce-
ment learning in complex and open settings. Proceedings of
the 16th Conference on Autonomous Agents and MultiAgent
Systems , 455 -- 463.
[37] Walraven, E., Spaan, M.T.J., B.Bakker, 2016. Traffic flow op-
timization: A reinforcement learning approach. Engineering
Applications of Artificial Intelligence 52, 203 -- 212.
[38] Yu, C., Zhang, M., Ren, F., Luo, X., 2013. Emergence of so-
cial norms through collective learning in networked agent so-
cieties. Proceedings of the 2013 International Conference on
Autonomous Agents and Multi-agent Systems , 475 -- 482.
[11] Cruciol, L.B.V., de Arruda, A., Weigang, L., Li, L., Crespo,
A., 2013. Reward functions for learning to control in air traffic
flow management. Transportation Research Part C: Emerging
Technologies 35, 141 -- 155.
[12] Devlin, S., Yliniemi, L., Kudenko, D., Tumer, K., 2014.
Potential-based difference rewards for multiagent. International
Conference on Autonomous Agents and Multiagent Systems
(AAMAS 14) , 165 -- 172.
[13] Dresner, K., Stone, P., 2004. Multiagent traffic management:
A reservation-based intersection control mechanism.
Interna-
tional Conference on Autonomous Agents and Multiagent Sys-
tems (AAMAS 04) .
[14] Eurocontrol, 2017. Performance review 2017.
[15] Eurocontrol, 2018a. European aviation 2040: Challenges of
growth.
[16] Eurocontrol, 2018b. European aviation in 2040 challenges of
growth annex 1 flight forecast to 2040.
[17] Eurocontrol, 2018c. Performance review 2018.
[18] Fudenberg, D., Levine, D., 1998. The theory in learning in
games.
[19] Guestrin, C., 2003. Planning Under Uncertainty in Complex
Structured Environments. Ph.D. thesis. Stanford University.
[20] Guestrin, C., Lagoudakis, M., Parr, R., 2002. Coordinated
International Conference on Machine
reinforcement learning.
Learning (ICML 02) , 227 -- 234.
[21] Kok, J.R., Vlassis, N., 2006. Collaborative multiagent reinforce-
ment learning by payoff propagation. The Journal of Machine
Learning Research 7, 1789 -- 1828.
[22] Kravaris, T., Vouros, G., Spatharis, C., Blekas, K., Chalki-
adakis, G., 2017. Learning policies for resolving demand-
capacity imbalances during pre-tactical air traffic management.
Multiagent System Technologies - 15th German Conference
(MATES 17) , 238 -- 255.
[23] Kuyer, L., Whiteson, S., Bakker, B., Vlassis, N., 2008. Multia-
gent reinforcement learning for urban traffic control using coor-
dination graphs. Machine Learning and Knowledge Discovery
in Databases , 656 -- 671.
[24] Milchtaich, I., 2004.
Social optimality and cooperation in
nonatomic congestion games. Journal of Economic Theory 114,
56 -- 87.
[25] Mukherjee, P., Sen, S., Airiau, S., 2008. Norm emergence under
constrained interactions in diverse societies. Proceedings of the
7th International Joint Conference on Autonomous Agents and
Multiagent Systems - Volume 2 , 779 -- 786.
[26] Proper, S., Tumer, K., 2013. Multiagent learning with a noisy
global reward signal. AAAI'13 Proceedings of the Twenty-
Seventh AAAI Conference on Artificial Intelligence , 826 -- 832.
[27] Rosenthal, R.W., 1973. A class of games processing pure-
strategy nash equilibria. International Journal of Game Theory
2, 65 -- 67.
[28] Sen, S., Airiau, S., 2007. Emergence of norms through social
learning. Proceedings of the 20th International Joint Conference
on Artifical Intelligence , 1507 -- 1512.
[29] Shoham, Y., Tennenholtz, M., 1997. On the emergence of so-
cial conventions: modeling, analysis, and simulations. Artificial
Intelligence 94, 139 -- 166.
[30] Spatharis, C., Kravaris, T., Vouros, G.A., Blekas, K., Chalka-
diakis, G., Garcia, J.M.C., Fernndez, E.C., 2018a. Multiagent
reinforcement learning methods to resolve demand capacity bal-
ance problems. Hellenic A.I. Conference(SETN 2018) .
[31] Spatharis, C., Kravaris, T., Vouros, G.A., Blekas, K., Cordero,
J.M.G., 2018b. Multiagent reinforcement learning methods for
resolving demand - capacity imbalances. Digital Avionics Sys-
tems Conference (DASC18) .
[32] Sugawara, T., 2014. Emergence of conventions for efficiently
resolving conflicts in complex networks. 2014 IEEE/WIC/ACM
International Joint Conferences on Web Intelligence (WI) and
Intelligent Agent Technologies (IAT) , 222 -- 229.
[33] Sutton, R.S., Barto, A.G., 2014. Reinforcement learning: An
introduction. MIT Press, Cambridge .
[34] Tan, T., Bao, F., Deng, Y., Jin, A., Dai, Q., Wang, J., 2019.
18
• The counting step for computing demand evolution
(set to 30);
• The maximum possible delay (derived from the cor-
responding maximum delay imposed by the NM, as
indicated in Table 1);
• The time horizon H (here 24 hours);
• The learning rate α (set to 0.01 for all methods, as
a default value although no such default exits);
• The discount factor γ (set to 0.99 for all methods,
as a default value although no such default exits);
• The reward parameter λ (set to 20 for all methods,
after experimentation made).
Appendix B. Incorporating preferences on delays
We have explored the capabilities of the MARL meth-
ods to solve DCB problems by incorporating strict con-
ditions and preferences to the M axDelay for some of the
flights. We denote the strict M axDelay imposed to a sub-
set of flights with Local MaxDelay, while for the rest of the
flights the M axDelay is as specified in Table 1.
In doing so, we simulate situations where constraints
of airlines to ground delays are specified and incorporated
into the problem. In these evaluation cases, the subset of
flights is chosen according to the arrival airport: All flights
arriving to one of the five biggest airports in Spain have
a Local MaxDelay constraint, representing the need of less
delay in airports that are hubs and with high traffic.
In these cases, roughly 30% of the flights have a con-
straint on Local MaxDelay,. These flights are also respon-
sible to roughly the 30% of the occurring hotspots. We
considered sub-cases with Local MaxDelay, varying in {5,
10, 15, 25, 35, 45, 55}.
We present results for the most difficult case, among
the cases considered: Jul2. Tables B.4 and B.5 show that
MARL methods manage to solve DCB problems using the
individual delay reward, even if very strict constraints on
Local MaxDelay are set to a subset of the flights. However,
for Local MaxDelay = 5, both methods could not provide
a solution and for Local MaxDelay = 10 only IRL could
resolve all hotspots.
In the cases were both methods succeed to provide solu-
tions, the Ed-MARL approach provides the lower average
delay per flight, and the lower number of regulated flights,
consistently with the results already provided in previous
sections. It must be noticed, that the results of all MARL
methods are close to the results obtained when all flights
adhere to the same M axDelay.
Appendix A. Construction of evaluation cases
The following procedure describes how we have created
evaluation cases:
The first step is to collect all planned flight trajectories
(Flight Plans) for that day as provided by the Spanish Op-
erational Data. According to the domain experts, we con-
struct evaluation cases using the Flight Plans specified just
before take-off. This makes solutions provided by MARL
methods comparable to the delays imposed by the NM.
Some Flight Plans span in two consecutive days. These
Flight Plans are considered to be part of the problem for
both days. Finally, all flights participating to the evalua-
tion case are distinguished between commercial and non-
commercial. Delays cannot be imposed to non-commercial
flights (e.g. military). In addition, the model of each air-
craft executing a trajectory is stored for the calculation of
strategic delay costs.
After identifying the Flight Plans, we cross-check them
with the flights considered by the NM. In doing so, Flight
Plans that do not correspond to an NM entry are dropped,
and delays imposed by the NM to resolve hotspots occur-
ring inside the Spanish Airspace are identified.
While Flight Plans specify trajectories crossing air vol-
umes, this sequence is exploited to compute the series of
active sectors that each flight crosses - depending on the
open sector configurations in different periods during the
day - together with the entry and exit time per crossed
sector. For the first (last) sector of the flight, where the
departure (resp. arrival) airport resides, the entry (resp.
exit) time is the departure (resp. arrival) time. However,
there may exist flights that cross the airspace but do not
depart and/or arrive in any of the sectors of our airspace:
In that case we consider the entry and exit time from sec-
tors within the airspace of our interest. Since airspace
sectorization changes frequently during the day, we need
to exploit the mappings from air volumes to open sectors,
translating air volumes crossed by trajectories to open sec-
tors. It must be noticed that:
• Given any delay imposed to a trajectory, sectors
crossed may vary due to the changing sector con-
figurations.
• This may result in alternative representations of a
single trajectory; one for each possible delay (each
crossing a different set of open sectors).
The trajectories specifying the Flight Plans, in con-
junction to the list of all the necessary sectors with their
capacities, comprise an evaluation case.
In addition to the above, each evaluation case contains
the following parameters:
• The number of flights (i.e. participating agents);
• The duration of the counting period for computing
demand evolution (set to 60);
19
Local MaxDelay Average Delay(NM) Average Delay(Ed-MARL) Average Delay(IRL)
Table B.4: Average delay for the Jul2 case with various preferences on the local max delay.
5
10
15
25
35
45
55
1.66
1.66
1.66
1.66
1.66
1.66
1.66
1.66
1.67
1.78
1.74
1.70
1.69
1.71
1.76
1.77
1.81
1.78
1.80
1.79
1.81
Table B.5: Remaining hotspots and number of regulated flights for the Jul2 case with various preferences on the local max delay.
Number of Resulting Hotspots Number of Regulated Flights
Ed-MARL
Ed-MARL
IRL
430.4
461.7
461.7
460.2
462.2
465
466.5
Local MaxDelay
IRL
5
10
15
25
35
45
55
3
1
0
0
0
0
0
2
0
0
0
0
0
0
402.2
408.7
432.4
448.2
442.6
438.2
439.1
20
|
1609.07845 | 2 | 1609 | 2016-09-28T14:20:05 | Decentralized Non-communicating Multiagent Collision Avoidance with Deep Reinforcement Learning | [
"cs.MA"
] | Finding feasible, collision-free paths for multiagent systems can be challenging, particularly in non-communicating scenarios where each agent's intent (e.g. goal) is unobservable to the others. In particular, finding time efficient paths often requires anticipating interaction with neighboring agents, the process of which can be computationally prohibitive. This work presents a decentralized multiagent collision avoidance algorithm based on a novel application of deep reinforcement learning, which effectively offloads the online computation (for predicting interaction patterns) to an offline learning procedure. Specifically, the proposed approach develops a value network that encodes the estimated time to the goal given an agent's joint configuration (positions and velocities) with its neighbors. Use of the value network not only admits efficient (i.e., real-time implementable) queries for finding a collision-free velocity vector, but also considers the uncertainty in the other agents' motion. Simulation results show more than 26 percent improvement in paths quality (i.e., time to reach the goal) when compared with optimal reciprocal collision avoidance (ORCA), a state-of-the-art collision avoidance strategy. | cs.MA | cs | Decentralized Non-communicating Multiagent Collision Avoidance
with Deep Reinforcement Learning
Yu Fan Chen, Miao Liu, Michael Everett, and Jonathan P. How
6
1
0
2
p
e
S
8
2
]
A
M
.
s
c
[
2
v
5
4
8
7
0
.
9
0
6
1
:
v
i
X
r
a
Abstract- Finding feasible, collision-free paths for mul-
tiagent
systems can be challenging, particularly in non-
communicating scenarios where each agent's intent (e.g. goal) is
unobservable to the others. In particular, finding time efficient
paths often requires anticipating interaction with neighboring
agents, the process of which can be computationally prohibitive.
This work presents a decentralized multiagent collision avoid-
ance algorithm based on a novel application of deep reinforce-
ment learning, which effectively offloads the online computation
(for predicting interaction patterns)
to an offline learning
procedure. Specifically, the proposed approach develops a value
network that encodes the estimated time to the goal given an
agent's joint configuration (positions and velocities) with its
neighbors. Use of the value network not only admits efficient
(i.e., real-time implementable) queries for finding a collision-
free velocity vector, but also considers the uncertainty in the
other agents' motion. Simulation results show more than 26%
improvement in paths quality (i.e., time to reach the goal) when
compared with optimal reciprocal collision avoidance (ORCA),
a state-of-the-art collision avoidance strategy.
I. INTRODUCTION
Collision avoidance is central to many robotics applications,
such as multiagent coordination [1], autonomous navigation
through human crowds [2], pedestrian motion prediction [3],
and computer crowd simulation [4]. Yet, finding collision-free,
time efficient paths around other agents remains challenging,
because it may require predicting other agents' motion and
anticipating interaction patterns, through a process that needs
to be computationally tractable for real-time implementation.
If there is a reliable communication network for agents
to broadcast their intents (e.g. goals, planned paths), then
collision avoidance can be enforced through a centralized
planner. For instance, collision avoidance requirements can
be formulated as separation constraints in an optimization
framework for finding a set of jointly feasible and collision-
free paths [1], [5], [6]. However, centralized path plan-
ning methods can be computationally prohibitive for large
teams [1]. To attain better scalability, researchers have also
proposed distributed algorithms based on message-passing
schemes [7], [8], which resolve local (e.g. pairwise) conflicts
without needing to form a joint optimization problem between
all members of the team.
This work focuses on scenarios where communication
cannot be reliably established, which naturally arises when
considering human-robot interactions and can also be caused
by hardware constraints or failures. This limitation poses
additional challenges for collision avoidance, because mobile
Laboratory of Information and Decision Systems, Massachusetts Institute
of Technology, 77 Massachusetts Ave., Cambridge, MA, USA
{chenyuf2, miaoliu, mfe, jhow}@mit.edu
Fig. 1: Autonomous ground vehicles navigating alongside pedes-
trians. Collision avoidance is essential for coordinating multiagent
systems and modeling interactions between mobile agents.
agents would need to cooperate without necessarily hav-
ing knowledge of the other agent's intents. Existing work
on non-communicating collision avoidance can be broadly
classified into two categories, reaction-based and trajectory-
based. Reaction-based methods [9]–[11] specify one-step
interaction rules for the current geometric configuration. For
example, reciprocal velocity obstacle (RVO) [12] is a reaction-
based method that adjusts each agent's velocity vector to
ensure collision-free navigation. However, since reaction-
based methods do not consider evolution of the neighboring
agents' future states, they are short-sighted in time and have
been found to create oscillatory and unnatural behaviors in
certain situations [10], [13].
In contrast, trajectory-based methods explicitly account
for evolution of the joint (agent and neighbors) future states
by anticipating other agents' motion. A subclass of non-
cooperative approaches [14], [15] propagates the other agents'
dynamics forward in time, and then plans a collision-free path
with respect to the other agents' predicted paths. However,
in crowded environments, the set of predicted paths often
marks a large portion of the space untraversable/unsafe, which
leads to the freezing robot problem [13]. A key to resolving
this issue is to account for interactions, such that each
agent's motion can affect one another. Thereby, a subclass of
cooperative approaches [16]–[18] has been proposed, which
first infers the other agents' intents (e.g. goals), then plans
a set of jointly feasible paths for all neighboring agents
in the environment. Cooperative trajectory-based methods
often produce paths with better quality (e.g. shorter time for
all agents to reach their goal) than that of reaction-based
methods [16]. However, planning paths for all other agents
is computationally expensive, and such cooperative approach
typically requires more information than is readily available
(e.g. other agent's intended goal). Moreover, due to model
and measurement uncertainty, the other agents' actual paths
might not conform to the planned/predicted paths, particularly
beyond a few seconds into the future. Thus, trajectory-based
methods also need to be run at a high (sensor update) rate,
which exacerbates the computational problem.
The major difficulty in multiagent collision avoidance is
that anticipating evolution of joint states (paths) is desirable
but computationally prohibitive. This work seeks to address
this issue through reinforcement learning – to offload the
expensive online computation to an offline training procedure.
Specifically, this work develops a computationally efficient
(i.e., real-time implementable) interaction rule by learning a
value function that implicitly encodes cooperative behaviors.
The main contributions of this work are (i) a two-agent
collision avoidance algorithm based on a novel application of
deep reinforcement learning, (ii) a principled way for general-
izing to more (n > 2) agents, (iii) an extended formulation to
capture kinematic constraints, and (iv) simulation results that
show significant improvement in solution quality compared
with existing reaction-based methods.
II. PROBLEM FORMULATION
A. Sequential Decision Making
t , sh
A non-communicating multiagent collision avoidance prob-
lem can be formulated as a partially-observable sequential
decision making problem. Let st, at denote an agent's
state and action at time t. The agent's state vector can
be divided into two parts, that is st = [so
t ], where so
t
denotes the observable part that can be measured by all
other agents, and sh
t denotes the hidden part that is only
known to the agent itself. In this work, let position and
velocity vectors in 2D be denoted by p and v, respectively;
let action be the agent's velocity, a = v; let the observable
states be the agent's position, velocity, and radius (size),
so = [px, py, vx, vy, r] ∈ R5; and let the hidden states
be the agent's intended goal position, preferred speed, and
heading angle, sh = [pgx, pgy, vpref , θ] ∈ R4.
The following presents a two-agent1 collision avoidance
problem formulation, where an agent's own state and the
other agent's state are denoted by s and s, respectively. The
objective is to minimize the expected time, E[tg], of an agent
0:t) (cid:55)→ at,
to reach its goal by developing a policy, π : (s0:t, so
that selects an action given the observed state trajectories,
argmin
π(s, so)
s.t.
0, π, π]
E [tgs0, so
pt − pt2 ≥ r + r
ptg = pg
pt = pt−1 + ∆t · π(s0:t, so
pt = pt−1 + ∆t · π(s0:t, so
∀t
0:t)
0:t),
(1)
(2)
(3)
(4)
where (2) is the collision avoidance constraint, (3) is the goal
constraint, (4) is the agents' kinematics, and the expectation
in (1) is with respect to the other agent's policy and hidden
1This formulation can be generalized to multiagent (n > 2) scenarios
t =
n,t], and expand (2) to include all pairwise collision constraints.
by replacing the other agent's state so
[ so
t with all other agents' states So
1,t, . . . , so
states (intents). Note that static obstacles can be modeled as
stationary agents, which will be discussed in more details in
Section IV-D.
0:t) = π(st, so
Although it is difficult to solve for the optimal solution of
(1)-(4), this problem formulation can be useful for understand-
ing the limitations of the existing methods. In particular, it
provides insights into the approximations/assumptions made
by existing works. A common assumption is reciprocity,
that is π = π, such that each agent would follow the same
policy [11], [16]. Thereby, the main difficulty is in handling
the uncertainty in the other agent's hidden intents (e.g. goals).
Reaction-based methods [10], [11] often specify a Marko-
vian policy, π(s0:t, so
t ), that optimizes a one-
step cost while satisfying collision avoidance constraints.
For instance, in velocity obstacle approaches [11], an agent
chooses a collision-free velocity that is closest to its preferred
velocity (i.e., directed toward its goal). Given this one-
step nature, reaction-based methods do not anticipate the
other agent's hidden intent, but rather rely on a fast update
rate to react quickly to the other agent's motion. Although
computationally efficient given these simplifications, reaction-
based methods are myopic in time, which can sometimes
lead to generating unnatural trajectories [17] (e.g., Fig. 4a).
Trajectory-based methods [16]–[18] solve (1)-(4) in two
steps. First, the other agent's hidden state is inferred from its
0:t), where f (·) is a inference
observed trajectory, sh
function. Second, a centralized path planning algorithm,
t , sh
t ),
is employed to find
π(s0:t, so
jointly feasible paths. By planning/anticipating complete paths,
trajectory-based methods are no longer myopic. However,
both the inference and the planning steps are computationally
expensive, and need to be carried out online at each new
observation (sensor update so
t ).
0:t) = πcentral(st, so
t = f (so
Our approach uses a reinforcement learning framework
to solve (1)-(4) by pre-computing a value function V (s, so)
that estimates the expected time to the goal. As a result,
the proposed method offloads computation from the online
planning step (as in trajectory-based methods) to an offline
learning procedure. The learned value function enables the use
of a computationally efficient one-step lookahead operation,
which will be defined in (11) and explained in Section III.
Repeating this one-step lookahead operation at each sensor
update leads to generating better paths, as shown later in
Fig. 4d.
B. Reinforcement Learning
Reinforcement learning (RL) [19] is a class of machine
learning methods for solving sequential decision making
problems with unknown state-transition dynamics. Typically,
a sequential decision making problem can be formulated as a
Markov decision process (MDP), which is defined by a tuple
M = (cid:104)S, A, P, R, γ(cid:105), where S is the state space, A is the
action space, P is the state-transition model, R is the reward
function, and γ is a discount factor. By detailing each of these
elements and relating to (1)-(4), the following provides a RL
formulation of the two-agent collision avoidance problem.
could be very small. The optimal policy can be retrieved
from the value function, that is
π∗(sjn
R(s0, a)+
0 ) = argmax
(cid:90)
a
γ∆t·vpref
P (sjn
0 , sjn
1 a)V ∗(sjn
1 )dsjn
1 .
(7)
sjn
1
This work chooses to optimize V (sjn) rather than the more
common choice Q(sjn, a), because unlike previous works
that focus on discrete, finite action spaces [20], [21], the
action space here is continuous and the set of permissible
velocity vectors depends on the agent's state (preferred speed).
III. APPROACH
The following presents an algorithm for solving the two-
agent RL problem formulated in Section II-B, and then gen-
eralizes its solution (policy) to multiagent collision avoidance.
While applications of RL are typically limited to discrete,
low-dimensional domains, recent advances in Deep RL [20]–
[22] have demonstrated human-level performance in complex,
high-dimensional spaces. Since the joined state vector sjn is
in a continuous 14 dimensional space, and because a large
amount of training data can be easily generated in a simulator,
this work employs a fully connected deep neural network
with ReLU nonlinearities to parametrize the value function, as
shown in Fig. 3a. This value network is denoted by V (·; w),
where w is the set of weights in the neural network.
A. Parametrization
From a geometric perspective, there is some redundancy in
the parameterization of the system's joint state sjn, because
the optimal policy should be invariant to any coordinate
transformation (rotation and translation). To remove this
ambiguity, an agent-centric frame is defined, with the origin
at the agent's position, and the x-axis pointing toward the
agent's goal, that is,
s(cid:48) = rotate(cid:0)sjn(cid:1)
x, v(cid:48)
y, p(cid:48)
x, p(cid:48)
y, r,
= [dg, vpref , v(cid:48)
y, r, θ(cid:48), v(cid:48)
r + r, cos(θ(cid:48)), sin(θ(cid:48)), da],
x, v(cid:48)
(8)
where dg = pg − p2 is the agent's distance to goal,
and da = p − p2 is the distance to the other agent. An
illustration of this parametrization is shown in Fig. 2a. Note
that this agent-centric parametrization is only used when
querying the neural network.
B. Generating Paths Using a Value Network
Given a value network V , an RL agent can generate a path
to its goal by repeatedly maximizing an one-step lookahead
value (7), as outlined in Algorithm 1. This corresponds to
choosing the action that on average, leads to the joint state
with the highest value. However, the integral in (7) is difficult
to evaluate, because the other agent's next state so
t+1 has an
unknown distribution (depends on its unobservable intent).
We approximate this integral by assuming that the other agent
would be traveling at a filtered velocity for a short duration
(a) Input joint state
(b) Value function
Fig. 2: RL policy. (a) shows a joint state of the system (geometric
configuration) in the red agent's reference frame, with its goal
aligned with the x-axis and marked as a star. (b) shows the red
agent's value function at taking each possible action (velocity vector).
Given the presence of the blue agent, ORCA [11] would choose an
action close to the current heading angle (black vector), whereas
the RL policy chooses to cut behind (green vector) the blue agent,
leading to generating better paths similar to that in Fig. 4.
State space: The system's state is constructed by concatenat-
ing the two agents' individual states, sjn = [s, so] ∈ R14.
Action space: The action space is the set of permissible
velocity vectors. Here, it is assumed that an agent can travel in
any direction at any time, that is a(s) = v for v2 < vpref .
It is also straightforward to impose kinematic constraints,
which will be explored in Section III-D.
Reward function: A reward function is specified to award
the agent for reaching its goal (3), and penalize the agent for
getting too close or colliding with the other agent (2),
R(sjn, a) =
−0.25
−0.1 − dmin/2
1
0
if dmin < 0
else if dmin < 0.2
else if p = pg
o.w.
, (5)
t
t+1, sjn
where dmin is the minimum separation distance between
the two agents within a duration of ∆t, assuming the agent
travels at velocity v = a, and the other agent continues to
travel at its observed velocity v. Note that the separation
dmin can be calculated analytically through simple geometry.
State transition model: A probabilistic state transition model,
at), is determined by the agents' kinematics as
P (sjn
defined in (4). Since the other agent's choice of action also
depends on its policy and hidden intents (e.g. goal), the
system's state transition model is unknown. As in existing
work [11], this work also assumes reciprocity π = π, which
leads to the interesting observation that the state transition
model depends on the agent's learned policy.
Value function: The objective is to find the optimal value
function
V ∗(sjn
0 ) =
γt·vpref R(sjn
t
, π∗(sjn
t )),
(6)
t=0
where γ ∈ [0, 1) is a discount factor. Recall vpref is an
agent's preferred speed and is typically time invariant. It is
used here as a normalization factor for numerical reasons,
because otherwise the value function of a slow moving agent
T(cid:88)
Algorithm 1: CADRL (Coll. Avoidance with Deep RL)
1 Input: value network V(·; w)
2 Output: trajectory s0:tf
3 while not reached goal do
4
5
6
7
8
update t, receive new measurements st, so
t
vt ← filter(v0:t)
t+1 ← propagate(so
so
A ← sampleActions()
at ← argmaxat∈A R(sjn
where ¯γ ← γ∆t·vpref , st+1 ← propagate(st, ∆t· at)
, at) + ¯γV (st+1, so
t , ∆t · vt)
t+1)
t
9 return s0:tf
(a) Value network
(b) Convergence
Fig. 3: Convergence of a Deep RL policy. (a) shows a neural network
used to parameterize the value function. (b) shows the values of three
distinct test cases converge as a function of RL training episodes.
For example, the blue line corresponds to the test case shown in
the bottom row of Fig. 4.
∆t (line 5-6)2. The use of a filtered velocity addresses a subtle
oscillation problem as discussed in [12]. This propagation
step amounts to predicting the other agent's motion with
a simple linear model, which has been shown to produce
good accuracy over small time scales [23]. It is important
to point out that this approximation is not assuming a linear
motion model for t > ∆t; uncertainty in the other agent's
future motion is captured in the projected next state's value,
V (st+1, so
t+1). Furthermore, the best action is chosen from
a set of permissible3 velocity vectors (line 8). An example
of this one-step lookahead operation is visualized in Fig. 2a,
in which the red agent chooses the green velocity vector to
cut behind the blue agent, because this action maximizes the
value of the projected state shown in Fig. 2b.
C. Training a Value Network
The training procedure, outlined in Algorithm 2, consists
of two major steps. First, the value network is initialized by
supervised training on a set of trajectories generated by a
baseline policy (line 3).
Specifically, each training trajectory is processed to gen-
erate a set of state-value pairs, {(sjn, y)k}N
k=1, where y =
γtg·vpref and tg is the time to reach goal. The value network
is trained by back-propagation to minimize a quadratic
2This work calculates the average velocity of the past 0.5 seconds and
sets ∆t to 1.0 second.
3This work uses 25 pre-computed actions (e.g. directed toward an agent's
goal or current heading) and 10 randomly sampled actions.
//step 1: initialization
//step 2: RL
← CADRL(V )
(cid:16)
← findValues(V (cid:48), s0:tf , s0:tf )
E, (y, sjn)0:tf , (y, sjn)0:tf
(cid:17)
for m times do
Algorithm 2: Deep V-learning
1 Input: trajectory training set D
2 Output: value network V (·; w)
3 V (·; w) ← train nn(D)
4 duplicate value net V (cid:48) ← V
5 initialize experience set E ← D
6 for episode=1, . . . , Neps do
7
8
9
10
s0, s0 ← randomTestcase()
s0:tf ← CADRL(V ), s0:tf
y0:T , y0:tf
E ← assimilate
e ← randSubset(E)
w ← backprop(e)
for every C episodes do
Evaluate(V ), V (cid:48) ← V
11
12
13
14
15
16 return V
(cid:80)N
(cid:16)
(cid:17)2
yk − V (sjn
regression error, argminw
. This
work uses optimal reciprocal collision avoidance (ORCA) [11]
to generate a training set of 500 trajectories, which contains
approximately 20,000 state-value pairs.
k ; w)
k=1
We make a few remarks about this initialization step. First,
the training trajectories do not have to be optimal. For instance,
two of the training trajectories generated by ORCA [11] are
shown in Fig. 4a. The red agent was pushed away by the
blue agent and followed a large arc before reaching its goal.
Second, the initialization training step is not simply emulating
the ORCA policy. Rather, it learns a time to goal estimate
(value function), which can then be used to generate new
trajectories following Algorithm 1. Evidently, this learned
value function sometimes generates better (i.e. shorter time to
goal) trajectories than ORCA, as shown in Fig. 4b. Third, this
learned value function is likely to be suboptimal. For instance,
the minimum separation dmin between the two agents should
be around 0.2m by (5), but dmin is greater than 0.4m (too
much slack) in Fig. 4b.
The second training step refines the policy through rein-
forcement learning. Specifically, a few random test cases
are generated in each episode (line 8), and two agents are
simulated to navigate around each other using an -greedy
policy, which selects a random action with probability
and follows the value network greedily otherwise (line 9).
The simulated trajectories are then processed to generate a
set of state-value pairs (line 10). For convergence reasons,
as explained in [20], rather than being used to update the
value network immediately, the newly generated state-value
pairs are assimilated (replacing older entries) into a large
experience set E (line 11). Then, a set of training points is
randomly sampled from the experience set, which contains
state-value pairs from many different simulated trajectories
(line 12). The value network is finally updated by stochastic
gradient descent (back-propagation) on the sampled subset.
To monitor convergence of the training process, the value
network is tested regularly on a few pre-defined evaluation
test cases (line 15), two of which are shown in Fig. 4. Note
that the generated paths become tighter as a function of
the number of training episodes (i.e. dmin reduces from
0.4m to 0.2m). A plot of the test cases' values V (sjn
0 )
shows that the value network has converged in approximately
800 episodes (Fig. 3b). It is important to point out that
training/learning is performed on randomly generated test
cases (line 8), but not on the evaluation test cases.
In addition to the standard Q-learning update [19], an
important modification is introduced when calculating the
state-value pairs (line 10). In particular, cooperation is encour-
aged by adding a penalty term based on a comparison of the
two agents' extra time to reach the goal, te = tg − dg/vpref .
4, which corresponds to a scenario
If te < el and te > eu
where the agent reached its goal quickly but the other agent
took a long time, an penalty of 0.1 would be subtracted from
the training value. Albeit simple, this modification is crucial
for discouraging aggressive behaviors such as exhibited by
the blue agent in Fig. 4a. Without this modification, an agent
would frequently travel straight toward its goal, expecting the
other agent to yield.
D. Incorporating Kinematic Constraints
Kinematics constraints need to be considered for operating
physical robots. Yet, in many existing works, such constraints
can be difficult to encode and might lead to a substantial
increase in computational complexity [5], [12]. In contrast,
it is straightforward to incorporate kinematic constraints in
the RL framework. We impose rotational constraints,
vs < vpref , φ − θ < π/6
for
a(s) = [vs, φ]
θt+1 − θt < ∆t · vpref ,
(9)
(10)
where (9) limits the direction that an agent can travel, and
(10) specifies a maximum turning rate that corresponds to
a minimum turning radius of 1.0m. Figure 5a illustrates the
application of these rotational constraints to the same test
case in Fig. 2a. Here, the red agent chooses to slow down
given the set of more constrained actions. Notice the agent
is allowed to spin on the spot, which leads to an interesting
optimal control problem when an agent's current heading
angle is not perfectly aligned with its goal. In this case, an
agent can either travel at its full speed while turning toward
its goal, or first spin on the spot before traveling in a straight
line. Figure 5b shows that CADRL has learned a policy that
balances between these two options to minimize the time
to goal. With the thin lines showing its heading angle, the
red agent chooses to initially turn on the spot, and then start
moving before its heading angle is perfectly aligned with its
goal.
E. Multiagent Collision Avoidance
The two-agent value network can also be used for multia-
i denote the observable part
gent collision avoidance. Let so
4This work uses el = 1.0 and eu = 2.0.
(a) Constrained action
(b) Sample trajectories
Fig. 5: Rotational kinematic constraint. Top left shows the same
test case as in Fig. 2a, but here the red agent chooses to slow down
due to a rotational kinematic constraint (9). Bottom left shows the
set of permissible velocity vectors for the red agent. Right shows
a pair of sample trajectories generated by CADRL with rotational
constraints, where the thin lines show the agents' heading angles.
To minimize the time to goal, the red agent initially turns on the
spot, and then starts moving (while continuing to turn) before its
heading angle is aligned with its goal.
i = [s, so
of the ith neighbor's state, and sjn
i ] denote the joint
state with the ith neighbor. CADRL (Algorithm 1) can be
extended to n > 2 agents by propagating every neighbor's
state one step forward (line 5-6), and then selecting the action
that has the highest value with respect to any neighbor's
projected state; that is, replace line 8 with
argmax
at∈A
R(sjn
i,t, at) + γ∆t·vpref V (st+1, so
i,t+1).
min
i
(11)
Note that the agent's projected next state st+1 also depends
on the selected action at. Although using a two-agent value
network, CADRL can produce multiagent trajectories that
exhibit complex interaction patterns. Figure 6a shows six
agents each moving to the opposite side of a circle. The
agents veer more than the two-agent case (bottom row of
Fig. 4), which makes more room in the center to allow
every agent to pass smoothly. Figure 6b shows three pairs of
agents swapping position horizontally. The pair in the center
slows down near the origin so the outer agents can pass first.
Both cases demonstrate that CADRL can produce smooth,
natural looking trajectories for multiagent systems, which
will be explored in further detail in Section IV. However,
we acknowledge that (11) is only an approximation to a true
multiagent RL value function – an n-agent value network by
simulating n agents navigating around each other – which
will be studied for future work.
A. Computational Complexity
IV. RESULTS
This work uses a neural network with three hidden layers
of width (150, 100, 100), which is the size chosen to achieve
real-time performance.5 In particular, on a computer with
an i7-5820K CPU, a Python implementation of CADRL
5We also experimented with other network structures. For example, a
network with three hidden layers of width (300, 200, 200) produced similar
results (paths) but was twice as slow.
(a) ORCA
(b) Episode 0
(c) Episode 50
(d) Episode 1000
Fig. 4: Training the value network. Circles show each agent's position at the labeled time, and stars mark the goals. (a) illustrates trajectories
generated by the two agents each following ORCA [11], and (b-d) illustrate trajectories generated by following the value network at
various training episodes. Top (a) shows a test case which ORCA results in unnatural trajectories, where the red agent has traversed a large
arc before reaching its goal. Top (b-d) show CADRL has learned to produce cooperative behaviors, as the blue agent slows down and cuts
behind the red agent. Bottom (b-d) show the trajectories become more tight (better performing) during the training process, since the
minimum separation dmin reduces from 0.4m to 0.2m, as specified in (5).
remains 0.1 thereafter. The RL step took approximately 2.5
hours to complete 1,000 training episodes. The entire training
process was repeated on three sets of training trajectories
generated by ORCA, and the value network converged in
all three trials. The paths generated by the value networks
from the three trials were very similar, as indicated by a less
than 5% difference in time to reach goal on all test cases in
the evaluation set.
B. Performance Comparison on a Crossing Scenario
To evaluate the performance of CADRL over a variety of
test cases, we compute the average extra time spent to reach
goals, that is
(cid:20)
ti,g − pi,0 − pi,g2
(cid:21)
vi,pref
n(cid:88)
i=1
¯te =
1
n
,
(12)
where ti,g is the ith agent's time to reach its goal, and the
second term is a lower bound of ti,g (to go straight toward
goal at the preferred speed). This metric removes the effects
due to variability in the number of agents and the nominal
distance to goals.
A crossing scenario is shown in Fig. 7a, where two identical
agents with goals along collision courses are run into each
other at different angles. Thus, cooperation is required for
avoiding collision at the origin. Figure 7a shows that over a
wide range of angles (α ∈ [90, 150] deg), agents following
CADRL reached their goals much faster than that of ORCA.
Recall a minimum separation of 0.2m is specified for CADRL
in the reward function (5). For this reason, similar to the
bottom row of Fig. 4, CADRL finds paths that are slightly
slower than ORCA around α = 0. It is also interesting to
note that CADRL with rotational constraints (CADRL w/
cstr) performs slightly better than the unconstrained. This is
(a)
(b)
Fig. 6: Multiagent trajectories produced by CADRL. Circles show
each agent's position at the labeled time, and stars mark the goals.
Although CADRL uses a two-agent value network for multiagent
scenarios (11), more complex interaction patterns have emerged.
In particular, although both test cases involve three pairs of agents
swapping position, each agent follows a path much different from
the two agent case shown in the bottom row of Fig. 4.
(Algorithm 1), on average, takes 5.7ms per iteration on two-
agent collision avoidance problems. By inspection of (11),
computational time scales linearly in the number of neigh-
boring agents for a decentralized implementation where each
agent runs CADRL individually; and scales quadratically in a
centralized implementation where one computer controls all
agents. For decentralized control on ten agents, each iteration
of CADRL is observed to take 62ms. Moreover, CADRL
is parallelizable because it consists of a large number of
independent queries of the value network (11).
Furthermore, offline training (Algorithm 2) took less than
three hours and is found to be quite robust. In particular, using
mini-batches of size 500, the initialization step (line 3) took
9.6 minutes to complete 10,000 iterations of back-propagation.
The RL step used an -greedy policy, where decays linearly
from 0.5 to 0.1 in the first 400 training episodes, and
(a) Crossing configuration
(b) Time to reach goal
(a) ORCA
(b) CADRL
Fig. 7: Performance comparison on a crossing scenario. (a) shows
the crossing configuration, where a red agent travels from left to
right, and a blue agent travels at a diagonal angled at α. Both
agents have a radius of 0.3m and a preferred speed of 1.0m/s, and
they would collide at the origin if both travel in a straight line. (b)
compares the extra time spent to reach goal (12) using different
collision avoidance strategies. CADRL performs significantly better
than ORCA on a wide range of angles α ∈ [90, 150] deg.
because CADRL w/ cstr is more conservative (yielding) early
on, which is coincidentally good for the crossing scenario.
More specifically, if the other agent has stopped (reached
goal) or turned before it reached the origin, unconstrained
CADRL would have performed better. In short, as will be
shown later in Fig. 9, unconstrained CADRL is better on
average (randomized test cases), but can be slightly worse
than CADRL w/ cstr on particular test cases.
C. Performance Comparison on Random Test Cases
In addition to showing that CADRL can handle some
difficult test cases that fared poorly for ORCA (Figs. 4
and 7), a more thorough evaluation is performed on randomly
generated test cases. In particular, within square shaped
domains specified in Table I, agents are generated with
randomly sampled speed, radius, initial positions and goal
positions. This work chooses vpref ∈ [0.5, 1.5]m/s, r ∈
[0.3, 0.5]m, which are parameters similar to that of typical
pedestrian motion. Also, the agents' goals are projected to
the boundary of the room to avoid accidentally creating a
trap formed by multiple stationary agents. A sample four-
agent test case is illustrated in Fig. 8, where agents following
CADRL were able to reach their goal much faster than that
of ORCA. For each configuration in Table I, one hundred
test cases are generated as described above. ORCA, CADRL,
and CADRL w/cstr are employed to solve for these test cases.
The average extra time to reach goal, ¯te, is computed for
each set of generated trajectories and plotted in Fig. 9. Key
statistics are computed and listed in Table I, and it can be seen
that CADRL performs similarly (slightly better) than ORCA
on the easier test cases (median), and more than 26% better
on the hard test cases (>75 percentile). Also, performance
difference is more clear on test cases with more agents, which
could be a result of more frequent interactions.
D. Navigating around Non-cooperative Agents
Recall CADRL's value network is trained with both agents
following the same collision avoidance strategy, which is the
reciprocity assumption common to many existing works [11],
Fig. 8: Four-agent test case. (a) shows agents following ORCA
traversed long arcs before reaching their goals, which reflects the
similar two-agent problem shown in Fig. 4a. (b) shows agents
following CADRL were able to reach their goal much faster.
(a) 2 agents
(b) 4 agents
(c) Box-and-whisker plot
Fig. 9: Performance comparison on randomly generated test cases.
The extra time to goal te is computed on one hundred random
test cases for each configuration listed in Table I. (a) and (b) show
scatter plots of the raw data, and (c) shows a box whisker plot.
CADRL is seen to perform similarly (slightly better) to ORCA on
the easier test cases (median), and significantly better on the more
difficult test cases (>75 percentile).
[12]. Figure 10 shows that the proposed method can also
navigate efficiently around non-CADRL agents. Figure 10a
shows a CADRL agent navigating static obstacles modeled
as stationary agents (vi = 0). We acknowledge that CADRL
could get stuck in a dense obstacle field, where traps/dead-
ends could form due to positioning of multiple obstacles.
Recall CADRL is a collision avoidance (not path planning)
algorithm not designed for such scenarios. Figure 10b shows
a CADRL agent navigating around a non-cooperative agent
(black), who traveled in a straight line from right to left. In
comparison with the cooperative case shown in Fig. 4d, here
the red CADRL agent chooses to veer more to its left to
avoid collision.
V. CONCLUSION
This work developed a decentralized multiagent collision
avoidance algorithm based on a novel application of deep
α(-2,0)(2,0)TABLE I: Extra time to reach goal (¯te) statistics on the random test cases shown in Fig. 9. CADRL finds paths that on average, reach
goals much faster than that of ORCA. The improvement is more clear on hard test cases (>75 percentile) and in multiagent (n > 2)
scenarios that require more interactions.
Test case configuration
Extra time to goal ¯te (s) [Avg / 75th / 90th percentile]
Average min separation dist. (m)
num agents
2
4
6
8
domain size (m)
4.0 × 4.0
5.0 × 5.0
6.0 × 6.0
7.0 × 7.0
ORCA
0.46 / 0.45 / 0.73
0.69 / 0.85 / 1.85
0.65 / 0.83 / 1.50
0.96 / 1.33 / 1.84
CADRL
0.27 / 0.33 / 0.56
0.31 / 0.40 / 0.76
0.44 / 0.56 / 0.87
0.54 / 0.70 / 1.01
CADRL w/ cstr
0.31 / 0.42 / 0.60
0.39 / 0.53 / 0.86
0.48 / 0.63 / 1.02
0.59 / 0.77 / 1.09
OCRA
0.122
0.120
0.118
0.110
CADRL
0.199
0.192
0.117
0.171
CADRL w/ cstr
0.198
0.191
0.180
0.170
[7] O. Purwin, R. D'Andrea, and J.-W. Lee, "Theory and implementation
of path planning by negotiation for decentralized agents," Robotics
and Autonomous Systems, vol. 56, no. 5, pp. 422–436, May 2008.
[8] V. R. Desaraju and J. P. How, "Decentralized path planning for
multi-agent teams in complex environments using rapidly-exploring
random trees," in 2011 IEEE International Conference on Robotics
and Automation (ICRA), May 2011, pp. 4956–4961.
[9] J. Snape, J. Van den Berg, S. J. Guy, and D. Manocha, "The hybrid
reciprocal velocity obstacle," IEEE Transactions on Robotics, vol. 27,
no. 4, pp. 696–706, Aug. 2011.
[10] G. Ferrer, A. Garrell, and A. Sanfeliu, "Social-aware robot navigation in
urban environments," in 2013 European Conference on Mobile Robots
(ECMR), Sept. 2013, pp. 331–336.
[11] J. Van den Berg, S. J. Guy, M. Lin, and D. Manocha, "Reciprocal
n-body collision avoidance," in Robotics Research, ser. Springer Tracts
in Advanced Robotics. Springer Berlin Heidelberg, 2011, no. 70, pp.
3–19.
[12] J. Van den Berg, M. Lin, and D. Manocha, "Reciprocal velocity
obstacles for real-time multi-agent navigation," in Proceedings of the
2008 IEEE International Conference on Robotics and Automation
(ICRA), 2008, pp. 1928–1935.
[13] P. Trautman and A. Krause, "Unfreezing the robot: Navigation in dense,
interacting crowds," in 2010 IEEE/RSJ International Conference on
Intelligent Robots and Systems (IROS), Oct. 2010, pp. 797–803.
[14] M. Phillips and M. Likhachev, "SIPP: Safe interval path planning for
dynamic environments," in 2011 IEEE International Conference on
Robotics and Automation (ICRA), May 2011, pp. 5628–5635.
[15] G. S. Aoude, B. D. Luders, J. M. Joseph, N. Roy, and J. P. How,
"Probabilistically safe motion planning to avoid dynamic obstacles with
uncertain motion patterns," Autonomous Robots, vol. 35, no. 1, pp.
51–76, May 2013.
[16] H. Kretzschmar, M. Spies, C. Sprunk, and W. Burgard, "Socially
compliant mobile robot navigation via inverse reinforcement learning,"
The International Journal of Robotics Research, Jan. 2016.
[17] P. Trautman, J. Ma, R. M. Murray, and A. Krause, "Robot navigation
in dense human crowds: the case for cooperation," in Proceedings of
the 2013 IEEE International Conference on Robotics and Automation
(ICRA), May 2013, pp. 2153–2160.
[18] M. Kuderer, H. Kretzschmar, C. Sprunk, and W. Burgard, "Feature-
based prediction of trajectories for socially compliant navigation," in
Robotics:Science and Systems, 2012.
[19] R. S. Sutton and A. G. Barto, Introduction to Reinforcement Learning,
1st ed. Cambridge, MA, USA: MIT Press, 1998.
[20] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski,
S. Petersen, C. Beattie, A. Sadik, I. Antonoglou, H. King, D. Kumaran,
D. Wierstra, S. Legg, and D. Hassabis, "Human-level control through
deep reinforcement learning," Nature, vol. 518, no. 7540, pp. 529–533,
Feb. 2015.
[21] D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. van
den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam,
M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner,
I. Sutskever, T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel, and
D. Hassabis, "Mastering the game of Go with deep neural networks
and tree search," Nature, vol. 529, no. 7587, pp. 484–489, Jan. 2016.
[22] M. Zhang, Z. McCarthy, C. Finn, S. Levine, and P. Abbeel, "Learning
deep neural network policies with continuous memory states," in 2016
IEEE International Conference on Robotics and Automation (ICRA),
May 2016, pp. 520–527.
[23] A. Bera and D. Manocha, "Realtime multilevel crowd tracking using
reciprocal velocity obstacles," in 2014 22nd International Conference
on Pattern Recognition (ICPR), Aug. 2014, pp. 4164–4169.
(a) Static obstacles
(b) Non-cooperative agent
Fig. 10: Navigating around non-CADRL agents. (a) shows a red
agent navigating around a series of static obstacles. (b) shows a red
CADRL agent avoids collision with a non-cooperative black agent,
who traveled in a straight line from right to left.
reinforcement learning. In particular, a pair of agents were
simulated to navigate around each other to learn a value
network that encodes the expected time to goal. The solution
(value network) to the two-agent collision avoidance RL
problem was generalized in a principled way to handle
multiagent (n > 2) scenarios. The proposed method was
shown to be real-time implementable for a decentralized
ten-agent system. Simulation results show more than 26%
improvement in paths quality when compared with ORCA.
ACKNOWLEDGMENT
This work is supported by Ford Motor Company.
REFERENCES
[1] D. Mellinger, A. Kushleyev, and V. Kumar, "Mixed-integer quadratic
program trajectory generation for heterogeneous quadrotor teams," in
2012 IEEE International Conference on Robotics and Automation
(ICRA), May 2012, pp. 477–483.
[2] S. Choi, E. Kim, and S. Oh, "Real-time navigation in crowded dynamic
environments using Gaussian process motion control," in 2014 IEEE
International Conference on Robotics and Automation (ICRA), May
2014, pp. 3221–3226.
[3] S. Kim, S. J. Guy, W. Liu, D. Wilkie, R. W. Lau, M. C. Lin, and
D. Manocha, "BRVO: predicting pedestrian trajectories using velocity-
space reasoning," The International Journal of Robotics Research,
vol. 34, no. 2, pp. 201–217, Feb. 2015.
[4] S. J. Guy, J. Chhugani, C. Kim, N. Satish, M. Lin, D. Manocha,
and P. Dubey, "ClearPath: Highly parallel collision avoidance for
multi-agent simulation," in Proceedings of
the 2009 ACM SIG-
GRAPH/Eurographics Symposium on Computer Animation, ser. SCA
'09. New York, NY, USA: ACM, 2009, pp. 177–187.
[5] F. Augugliaro, A. P. Schoellig, and R. D'Andrea, "Generation of
collision-free trajectories for a quadrocopter fleet: A sequential convex
programming approach," in 2012 IEEE/RSJ International Conference
on Intelligent Robots and Systems, Oct. 2012, pp. 1917–1922.
[6] Y. Chen, M. Cutler, and J. P. How, "Decoupled multiagent path planning
via incremental sequential convex programming," in proceedings of
the 2015 IEEE International Conference on Robotics and Automation
(ICRA), May 2015, pp. 5954–5961.
|
1808.01878 | 1 | 1808 | 2018-08-03T09:22:33 | From traffic conflict simulation to traffic crash simulation: introducing traffic safety indicators based on the explicit simulation of potential driver errors | [
"cs.MA"
] | This paper introduces a general simulation framework that can allow the simulation of crashes and the evaluation of consequences on existing microsimulation packages. A specific family of simple and reproducible conflict indicators is proposed and applied to many case studies. In this approach driver failures are simulated by assuming that a driver stops reacting to an external stimulus and keeps driving at the current speed for a given time. The trajectory of the distracted driver vehicle is thus evaluated and projected, for the given time steps, for the established distraction time, over the actual trajectories of other vehicles. Every occurring crash is then evaluated in terms of energy involved in the crash, or with any other severity index (which can be easily calculated since the accident dynamics can be accurately simulated). The simulation of a driver error allows not only the typology of crashes to be included, normally accounted for with surrogate safety measures, but also many other type of typical crashes that it is impossible to simulate with microsimulation and traditional methodologies being caused by vehicles who are driving on non-conflicting trajectories such as drivers speeding at a red light, drivers taking the wrong lane or side of the street or just driving off the road in isolated accidents against external obstacles or traffic barriers. The total crash energy of all crashes is proposed as an indicator of risk and adopted in the case studies. Moreover, the concepts introduced in this paper allow scientists to define other relevant variables that can be used as surrogate safety indicators that consider driving errors. Preliminary results on different case studies have shown a great accordance of safety evaluations with statistical data and empirical expectations and also with other traditional safety indicators that are commonly used in microsimulation. | cs.MA | cs | From traffic conflict simulation to traffic crash simulation:
introducing traffic safety indicators based on
the explicit simulation of potential driver errors
Vittorio Astarita* and Vincenzo Pasquale Giofré
Università della Calabria, Rende (CS) 87040, Italy
Electronic preprint
This electronic preprint is a draft version still not published and currently under revision.
Please quote and give reference only to published version when available.
If published version is not yet available just give reference to :
Vittorio Astarita and Vincenzo Pasquale Giofré. (2019) "From traffic conflict simulation to
traffic crash simulation: introducing traffic safety indicators based on the explicit
simulation of potential driver errors".
Many thanks for your interest in this paper.
Please feel free to add comment on Research Gate or write me at: [email protected]
Thanking for your interest and help in any case!
Best Regards
Vittorio
* Corresponding author. Tel.: +39-0984-49-6780; fax: +39-0984-49-6787.
E-mail address: [email protected]
From traffic conflict simulation to traffic crash simulation:
introducing traffic safety indicators based on
the explicit simulation of potential driver errors
Vittorio Astarita* and Vincenzo Pasquale Giofré
Università della Calabria, Rende (CS) 87040, Italy
Abstract
Traffic safety conflict indicators have been used to assess the level of safety in different traffic conditions. Traffic safety
indicators can be evaluated by numerical elaboration given vehicles trajectories. Real vehicle trajectories are not always easy to
obtain and often microsimulation has been used to generate vehicular trajectories on which to apply numerical elaboration to
evaluate surrogate safety measures for different scenarios.
However, commonly used traffic conflict indicators do not consider the severity of a potential resulting crash. Only recent
works propose to correct common indicators to take into account the amount of energy involved in near-crashes events. The use
of conflict-energy-based indicators in simulation has not been yet well explored and could offer interesting results promoting the
use of microsimulation for road safety evaluations.
Moreover, commonly used traffic conflict indicators do not consider roadside obstacles or barriers and vehicles which are
travelling on non-conflicting trajectories.
This paper presents a complete new approach for microscopic evaluation of traffic safety. The proposed safety indicators
are based on the explicit simulation of possible driver errors and possible crashes.
Drivers can be distracted in many different ways such as by being occupied in some other tasks (for example a mobile
call) or by a momentary breakdown in attention and/or awareness to external changes due to some psychological or physical
failure.
This paper originated from the following consideration: in the real world, most accidents involving human drivers occur
because one (or more than one) driver has a temporary failure and nowadays modern computers are able to simulate rather
complex systems (including human behaviors and errors).
This paper, thus, introduces a general simulation framework that can allow the simulation of crashes and the evaluation of
consequences on existing microsimulation packages. A specific family of simple and reproducible conflict indicators is proposed
and applied to many case studies. In this approach driver failures are simulated by assuming that a driver stops reacting to an
external stimulus and keeps driving at the current speed for a given time. The trajectory of the distracted driver vehicle is thus
evaluated and projected, for the given time steps, for the established distraction time, over the actual trajectories of other
vehicles. Every occurring crash is then evaluated in terms of energy involved in the crash, or with any other severity index
(which can be easily calculated since the accident dynamics can be accurately simulated). The simulation of a driver error allows
not only the typology of crashes to be included, normally accounted for with surrogate safety measures, but also many other type
of typical crashes that it is impossible to simulate with microsimulation and traditional methodologies being caused by vehicles
who are driving on non-conflicting trajectories such as drivers speeding at a red light, drivers taking the wrong lane or side of the
street or just driving off the road in isolated accidents against external obstacles or traffic barriers. The total crash energy of all
crashes is proposed as an indicator of risk and adopted in the case studies. Moreover, the concepts introduced in this paper allow
scientists to define other relevant variables that can be used as surrogate safety indicators that consider driving errors.
Preliminary results on different case studies have shown a great accordance of safety evaluations with statistical data and
empirical expectations and also with other traditional safety indicators that are commonly used in microsimulation.
Keywords: Traffic simulation; traffic safety; traffic theory.
"You progress not through improving what has been done, but reaching toward what has yet to be done."
Kahlil Gibran
* Corresponding author. Tel.: +39-0984-49-6780; fax: +39-0984-49-6787.
E-mail address: [email protected]
1. Introduction
Vittorio Astarita and Vincenzo Pasquale. Giofré
1.1. State of the art in safety evaluation: from traffic conflicts to more elaborated surrogate safety measures
and the need for a methodological breakthrough
The classical methodology to estimate road safety levels is based on applying inferential statistics to
crashes databases (Hauer 1986, Jovanis and Chang 1986, Miaou and Lum 1993, Miaou 1994, Shankar et al.
1995, Hauer 1997, Abdel-Aty and Radwan 2000, Yan et al. 2005). With this methodology it is possible to
link the causes (infrastructural layouts) to effects (crashes) and apply countermeasures to increase road
safety.
In traffic safety (luckily) crashes are a very rare event and sometime new infrastructures black spots could
go undetected for years until some very unfortunate event happens. Moreover, a good knowledge of the
dynamics of the events that could potentially lead to the actual realization of a crash may provide a more
useful base to prevent crashes from happening in the first place, supporting the implementation of
appropriate preventive countermeasures.
Surrogate safety performance indicators that provide a causal or mechanistic basis for explaining complex
time-dependent vehicle interactions that can compromise safety have been proposed (Hayward 1971;
Minderhoud and Bovy 2001; Huguenin et al. 2005; Tarko et al. 2009).
The first instance of the concept of traffic conflicts was in Perkins and Harris in 1968 that considered the
analysis of the use of evasive actions by drivers as an effective method to assess road safety. The
observation of traffic conflicts as temporal and/or spatial proximity started in Sweden with the work of
Amundsen and Hyden (1977) and other researchers. Different situations that can arise in traffic streams
have been represented by Hyden (1987) in terms of a "safety performance pyramid" (Fig. 1) which
characterizes the Swedish traffic conflicts technique.
Figure 1: Hyden "safety pyramid".
Moreover, traffic conflict analysis originates from a richer data set than statistical analysis based only on
crash data since crash occurrences arise from a very small subset of the total set of traffic trajectories data
(Fig.2).
Hyden's pyramid represents all possible interactions, ranging from more frequent undisturbed events at the
base of the pyramid to less frequent higher risk events nearer the peak (i.e. traffic conflicts and crashes). It
is logical to assume that a comprehensive assessment of safety at a given location must reflect the full
spectrum of these vehicle interactions since in some "unlucky" cases crashes can generate near the base of
the pyramid where conditions are "potentially" safer. Also conventional crash prediction models focus on
reported crashes (the very top part of the pyramid), and do not consider unsafe interactions that have not
"yet" resulted in reportable crashes.
Filtering
All traffic data ( From camera view )
Too much
Filtering
Trajectories in time
Filtering
Severity of crashes
1
2
3
4
Time (one year )
Crash data
Time (one year ) Time (one year ) Time (one year )
Time (one year ) Time (one year ) Time (one year )
Surrogate safety performances
Figure 2: Both kinematic crash data and safety performances can be obtained from vehicle trajectories:
vehicle trajectories data, at a specific site for a given period of time, include also all the trajectories of
vehicles involved in a crash (Astarita et al. 2011).
Unfortunately it is not very straightforward how to make an estimate of the probability of crash events
given the frequency and severity of conflicts.
The Swedish traffic conflict observer's manual (Laureshyn and Varhelyi, 2018) says: "If the form of the
relation between the severity and frequency of the events is known, it is theoretically possible to calculate
the frequency of the very severe but infrequent events (accidents) based on known frequency of the less
severe, but more easily observable events (conflicts)". They though acknowledge the fact that the injury
risk cannot be easily estimated: "However, it is not obvious how the injury risk in situations where the
collision was actually avoided can be estimated."
Many recent works have been directed to establish a relationship between the two different parts of the
Hyden "safety pyramid": the white part (where only conflicts occur) and the dark part where crashes occur.
Practical problems, posed by the availability of crash data and the methodological challenges caused by the
extremely random nature of accidents, have led to the development of simpler approaches to improve road
safety assessment, such as the use of microscopic traffic simulation to evaluate traffic conflicts in planned
traffic networks.
Vittorio Astarita and Vincenzo Pasquale. Giofré
Traffic computer simulation was introduced in the 50's by Gerlough (1955) and Webster (1958) in 1958
validated his traffic signal delay formula with computer microsimulation. It has been used since then in
research to assess the performance of traffic networks and also the introduction of new technologies such as
connected vehicles (Astarita et al., 2017).
Current microsimulation models, however sophisticated, do not simulate crashes, the higher dark part of the
Hyden "safety pyramid" in Fig. 1 can only be inferred from simulated traffic conflicts (the white part).
Microscopic simulation, applied to establish road traffic safety levels, with the use of traffic conflicts
and/or other surrogate safety measures that can be calculated on vehicle trajectories, has been a growing
topic of research initially investigated by Darzentas et al. (1980) with many following contributions (Cunto
and Saccomanno, 2007; Cunto and Saccomanno, 2008; Saccomanno et al, 2008; Yang et al., 2010; Cheol
and Taejin, 2010; Wang and Stamatiadis,2014). According to the Federal Highway Administration
(Gettman et al., 2008), when properly simulated surrogate safety performance measures show the potential
to provide a useful platform from which to identify high risk situations in the traffic stream and guide cost-
effective intervention strategies. The concept is that the actual risk of crashes can be investigated using
traffic simulation sampling of safety performance indicators instead of real traffic data.
Real data of crashes and measured and simulated conflicts have been compared obtaining acceptable results
in many papers (Dijkstra et al.,2010; Caliendo and Guida,2012; El-Basyouny et al. 2013; Huang et al.2013;
Zhou et al. 2013; Ambros et al. 2014; Shahdah et al.,2014,2015). Microsimulation and surrogate safety
performances have also been used to assess the impact on safety of the introduction of connected and
autonomous vehicles (Zha et al., 2014; Morando et al. 2018, Astarita et al. 2018 )
The analysis of conflicts and the use of traffic simulation for the evaluation of road traffic safety levels has
accelerated research efforts into establishing when two vehicles trajectories constitute a "traffic conflict".
Many "surrogate safety measures" have been proposed such as: time to collision (TTC), post encroachment
time (PET), initial deceleration rate (DR), maximum of the speeds of the two vehicles involved in the
conflict event (MaxS), maximum relative speed of the two vehicles involved in the conflict event (DeltaS),
deceleration rate to avoid the crash (DRAC), and proportion of stopping distance (PSD).
Almost all of the proposed "surrogate safety measures" works on trajectories of vehicles (that will not crash
into each other) to establish a number of potential conflicts arising from temporal or spatial proximity under
the assumption that the closer vehicles are to each other, the nearer they are to a collision (Mahmud et al.,
2017). The proximity is established (mainly with thresholds) on the basis of quantitative measurements that
are obtained from vehicle trajectories.
The interested reader on this subject can refer to three thoroughly redacted (and relatively recent) papers
that give a state of the art respectively on traffic conflicts, road safety simulation modeling and on the use
of proximity surrogate safety measures (Mahmud et al., 2017; Young et al. 2014; Zheng et al. 2014)
All the three above-cited "state of the art" papers evidence advantages and also some limitations of using
microsimulation and surrogate safety measures.
Zheng et al.(2014) raise two conceptual issues: process model validity and severity inconsistency. Process
model validity originates from the fact that some researchers believe that traffic conflicts and crashes are
two mutually exclusive events while others believe that traffic conflicts could lead to traffic crashes where
no evasive driving countermeasure is taken. Severity inconsistency is an issue that originates from the fact
that the severity of traffic conflicts is identified either by the intensity of evasive actions to avoid a crash or
by the proximity in time (or space) between vehicles while severities of crash events cannot be measured in
the same way. In fact, severity of crash events is usually expressed in terms of severity of consequences.
Zheng et al.(2014) say about crashes that: "proximity measure can only reflect the risk of collision but not
the severity of crashes, which is typically differentiated based on consequences of the crash not proximity."
Young et al.(2014) conclude their work by recognizing that simulation will become a useful tool for road
traffic analysis, yet they write that there are a number of areas where further research is needed:
- "The crash as the measure of performance": They recognize that models needs "theoretical and numerical
improvements" to specify the factors that originate them. The relationship between traffic conflicts and the
real crash dynamic has not been adequately investigated.
-"The theory behind driver behavior in crashes": Driver behaviors that results in a crash have not been
taken into account holistically in simulated environments.
-"A more detailed representation of the vehicle and conflict situations": Surrogate safety measures are
based on trajectories of a point that represents the barycenter of a vehicle, real vehicle dimensions and
physical interactions at crashes are not commonly considered.
-"A generalization of the models to look at more crash and vehicle types": Different type of vehicles such
as heavy vehicles have not been specifically considered.
Laureshyn et al. (2017) clarify that commonly used conflict indicators are able to express "proximity" to a
crash and neglects the potential severity of the consequences of a crash. The consequences need to be taken
into account in some way (Laureshyn et al., 2010).
Moreover, the mechanism that generates a crash has not been clarified. In traditional approaches there is no
clear explanation of how a near-crash situation can become a real crash. It is often assumed that
"proximity" of vehicles that are in a near-crash event means also a higher probability of crash.
What are the causes of a real crash? What needs to happen to make a near-crash event turn into a crash?
What are the causes of random deviations from a safe trajectory that make vehicles crash into other nearby
vehicles? What is the mechanism that creates a jump from one region to another region of the Hyden
"safety pyramid" (see figure 3)?
Figure 3: Unexplained discontinuity between near-crashes and real crashes.
Davis et al. (2011) outline a general causal model of traffic conflicts and crashes based on a probabilistic
approach, we believe that it is important to take into account the human factor and this has been seldom
taken into account in preceding works.
Bevrani and Chung (2012) recognize the importance of human error since according to Stutts et al. (2003)
30 % of police reported crashes in the USA are due to human distractions. Stutts et al. (2003) found that
some types of distracting behavior that people undertake while driving include talking on a cell phone,
shaving, putting on eye makeup, eating or drinking, changing a radio station or compact disc and looking at
the back seat to talk to an infant in a car seat.
We conclude this brief state of the art with the reflection that, possibly, the two main factors that have not
been thoroughly investigated in traffic conflict simulation are the potential consequences of crashes and the
human factor.
Vittorio Astarita and Vincenzo Pasquale. Giofré
This paper is a first attempt to evaluate traffic safety with microsimulation introducing possible driver
errors. The paper shows that introducing driver error is a feasible task by using common microsimulation
packages and some of the above-indicated issues could possibly be addressed given a breakthrough in
research that could properly introduce driver error in the simulation and shift the focus from traffic conflict
simulation directly to traffic crash simulation (raising awareness of potential consequences).
1.2. Specific problems in the simulation of conflict indicators
Microsimulation of conflict indicators (instead of measuring them on the field) is more controversial since
microsimulation, instead of direct observation, could exacerbate some of the issues indicated above.
Specific problems are listed in the following:
- Process model validity. Commonly used safety indicators in microsimulation are numerically based on
variables which, in most cases, have nothing to do with the real dynamics of real accidents. As an example,
at the present state of the art, there is no way to simulate or take into account accidents that are originated
by specific careless driver behaviours such as vehicles speeding at the red light of a traffic signal or in the
general case of vehicles which are travelling on non-conflicting trajectories. Many real crashes are
generated by obvious driver mistakes and current microsimulation models have no way to simulate this.
-Traffic simulation packages do not explicitly simulate safety indicators. SSAM software was
developed to be applied as an add-on on to main traffic simulation packages (Pu et al., 2008). Some of the
problems with the use of SSAM software that are evidenced in Souleyrette and Hochstein (2012) are the
lack of severity classification of conflicts and the lack of ability to map risk and selected conflicts.
Souleyrette and Hochstein (2012) suggest many possible modification to SSAM software.
-Traffic safety indicators have been developed to be used with real trajectories and traffic
microsimulation is specifically designed to avoid crashes. Surrogate safety measures have been
developed to be used with real trajectories. The use of microsimulation to evaluate surrogate safety
measures is questionable since traffic microscopic models tend to move vehicles around the network
avoiding any interaction that could lead to a crash. Crashes detected by SSAM software are, in fact, caused
by graphical inaccuracies of microscopic simulation packages. Gettman et al., (2008): "All of the
simulation systems exhibit modelling inaccuracies that lead SSAM to identify conflict events with TTC = 0
("crashes")".
-Traffic microsimulators need calibration. The use of traffic microsimulation to obtain trajectories on
which surrogate safety measures are calculated is subject to a correct determination of input parameters.
Microsimulation calibration is a delicate matter and it is not guaranteed that even after performing a perfect
rigorous calibration of a microsimulation model (on traffic dynamic parameters) the trajectories will
produce estimates of safety performance that can be matched with real world observations. For this reason
calibration based on safety performance measures has been proposed (Cunto and Saccomanno, 2008)
though, there is no guarantee that it will lead to a calibration which is consistent with traffic dynamics.
-Traffic Safety Indicators based on conflicts (TSI) are numerous and there is no consensus on which
one to use. Some of them are specifically designed for some specific manoeuvres, moreover, the
commonly used TSI do not consider crash severities. It is not easy to choose among safety indicators since,
as stated above, the complexity involved in the relationship between potential conflicts and real crashes is
not straightforward. In Tarko et al. 2009 it is said: "Consider excessive braking maneuvers. One might
presume that observing these - may serve as a reliable predictor of crashes. However, some drivers who
apply brakes aggressively are avoiding crashes, while others who fail to apply brakes are involved in
crashes. These two simple examples illustrate in a simple and perhaps naïve way the potential complexities
involved in selecting reliable safety surrogates."
Most Traffic Safety Indicators (TSI) do not consider real crash dynamics and potential consequences.
Most surrogate safety measures commonly used are able to establish conflicts and potential crash yet they
are not able to make a differentiation between different severity of crashes. Crash severity is an extremely
important measure (Ivan et al., 2018) yet the commonly used conflict safety indicators consider all possible
collisions incidents as having the same severity and this does not allow accounting for the fact that
accidents occurring at a higher relative speed between vehicles have more severe consequences. Only
recent research efforts have been directed to addressing this issue (Laureshyn et al.,2017).
Friction and shear forces effects on safety are not considered in traffic flow theory or in any conflict
indicator.
Conflicts between vehicles travelling on trajectories that are not intersecting are never considered in
common conflict indicators. Drivers drive all the time very close to roadside obstacles or barriers and also
very close and often to vehicles coming from the opposite direction. In all these very common situations a
very temporary and small deviation from the right trajectory would cause a crash. These types of conflict
are not at all considered in common conflict indicators and this is a serious inadequacy that has not been
explored in science. This point is addressed in the following presented microsimulation case study (second
case).
The proposed methodology can take into account isolated vehicle crashes with lateral barriers or objects
(these events cannot be taken into account with commonly used TSI) and also give a solution to some of
the above-listed problems.
Especially crash dynamics can be reproduced accurately with microsimulation and this potential has not
been explored. Inelastic and elastic collision hypothesis could be applied to obtain a better estimate of the
consequences of a crash. For this reason, in the next section, simple crash dynamics (dating back to Newton
laws) in vector form is presented. It also serves as a base for the proposed methodology.
1.3. Crash severity in simulated surrogate safety measures and inelastic collision hypothesis
It is possible to correct or extend commonly used safety indicators to take into account the amount of
energy involved in near-crashes events. In fact, the severity problem in simulated surrogate safety measures
was addressed in Shelby (2011,with the introduction of Delta-V as a measure of traffic conflict severity),
Sobhani et al. (2011,2013, with the use of kinetic energy) and in Laureshyn et al. (2017, with the
introduction of the use of extended Delta-V). The values that are involved in estimating crash severity are
the speeds and the masses of colliding vehicles.
The dynamic of a crash involving two vehicles can be studied with a fundamental law of physics. The laws
of physics that are applied are conservation of energy and momentum.
For a monodimensional impact, the relative velocity of the bodies after the impact is proportional to that
preceding the impact through a restitution coefficient linked to the elasticity of the two bodies (Newton):
with:
where v1a and v2a are the speeds of objects 1 and 2 before the collision, if ε = 0 the impact is called totally
inelastic; if ε = 1 the impact is called elastic.
The difference between a perfectly elastic or perfectly inelastic collision is in terms of how much kinetic
energy is adsorbed in the collision by the two body colliding. A perfect conservation of energy (almost
impossible) corresponds to an elastic collision while the maximum adsorption of energy corresponds to a
collision where the maximum possible energy is absorbed and where both objects will stick together and
move at the same speed after collision. Real car crash collisions as noted in Shelby (2011) are somewhere
𝑣1𝑎−𝑣2𝑎=−𝜀(𝑣1𝑏−𝑣2𝑏)
0≤𝜀≤1
(1)
(2)
Vittorio Astarita and Vincenzo Pasquale. Giofré
between elastic collisions and inelastic collisions. A purely elastic collision would be when two cars after
touching each other bounce back without deformation (and without kinetic energy loss) while a perfectly
inelastic collision would be when there would be no bouncing and the car would form, after the collision, a
single body where a part of kinetic energy has been absorbed into the crash and the rest would be still
present in the motion after collision. Shelby (2011) citing Nordhoff (2005) affirms that car collisions tend
to have a coefficient ε of restitution of about 0.4 at low-speed for bumper-to-bumper collisions, reducing to
around 0.1 for higher speed collisions where the vehicle bodies would deform substantially. It is very
convenient for approximate calculations such as those used in surrogate safety measures to consider car
crashes as inelastic. Shelby (2011) notes how the original CRASH program commissioned by the National
Highway Traffic Safety Administration NHTSA to estimate initial impact speeds assumed an inelastic
collision and that this his was later identified as a reason for underestimating speed values by 10% to 30%
(McHenry and McHenry,1997). A subsequent version of the CRASH software was updated taking into
account elastic behavior and initial impact speeds were estimated as close as about 1% of their true value.
We will shortly synthesize two vehicles crash dynamic laws in vector notation under the assumption of
inelastic collision since, in the remaining part of the paper, we will develop crash severity indexes that are
based on this assumption. It must be noted that the proposed methodology in future developments could
take into account partially elastic collisions as we believe that elastic conditions can play an important role
in crash dynamic situations where multiple impacts are involved and where the first low energy impact
could cause more severe secondary collisions (for example: a car which hits laterally another car running in
the same direction could cause the second car to hit a lateral obstacle or invade opposite traffic lanes or in
crashes that involve more than two vehicles).
principle (both elastic and inelastic collisions).
Figure 41: Calculation of the resulting speeds: 𝑽 ,��� 𝜟𝒗1����� and 𝜟𝒗2����� based on momentum conservation
The law of conservation of momentum states that the momentum 𝑷� (a two dimensional vector in our case)
since the momentum 𝑷� before the collisions is: 𝑷�=𝑚1∙𝒗1���+𝑚2∙𝒗2���
where m1 and m2 represent the masses of the two vehicles and 𝒗1��� and 𝒗2��� are the velocities (vectors) before
the impact, the velocity 𝑽 � of the entire system after the collision can then be calculated as :
expressed as the product of mass and velocity keeps constant after a collision (both elastic and inelastic),
(3)
1 This image corrects some minor typographical inaccuracies in the images presented in Shelby (2011), Jurewicz et al.(2016) and
in Laureshyn et al. (2017).
𝑽�=𝑚1∙𝒗1����+𝑚2∙𝒗2����
𝑚1+𝑚2
(4)
(5)
(6)
Delta-V is a notation often used to denote a vehicle change of velocity experienced during a crash. Delta-V
has been statistically connected with the level of injuries passengers can suffer (Gabauer and Gabler 2006;
Tolouei et al. 2013) and in our two dimensional example is given by:
𝚫𝒗1�����=𝐕�−𝒗1��� and 𝚫𝒗2�����=𝐕�−𝒗2���
for the two vehicles involved in a crash.
By definition we have that:
ΔV����12=𝒗2���−𝒗1���=𝐕�−𝚫𝒗2�����−𝐕�+𝚫𝒗1�����=𝚫𝒗1�����−𝚫𝒗2�����
(7)
The Kinetic energy of the two vehicles before the impact is:
the impact under the hypothesis of inelastic collision is (vehicles stick together and keep same speed):
𝐾a=12𝑚1𝑣12+12𝑚2𝑣22
𝐾𝑏=12(𝑚1+𝑚2)𝑉2
Moreover as shown in figure 4 𝚫𝒗1����� and 𝚫𝒗2����� are always parallel and opposite vectors, 𝑽 � being a linear
combination of 𝒗1��� and 𝒗2��� .
where 𝑣1 and 𝑣2 are the modules of the two velocity vectors. The Kinetic energy of the two vehicles after
where 𝑉 is the module of the common speed vector after the crash. By developing the difference in Kinetic
where ΔV12 is the module of the difference vector between the two impact velocities 𝒗1���−𝒗2��� , 𝐾𝑎 and
𝐾𝑏 are the kinetic energies before and after the crash and :
𝑚𝑟= 𝑚1𝑚2𝑚1+𝑚2
is used is the total energy of a scenario which is evaluated as the sum of ΔK for all simulated crashes.
Δ𝐾=𝐾𝑎−𝐾𝑏=12𝑚1𝑣12+12𝑚2𝑣22−12(𝑚1+𝑚2)𝑉2=12𝑚𝑟(ΔV12)2
is called the reduced mass of the system.
In all calculations that are presented in the following, one of the simpler and synthetic safety indicators that
energy before the crash and after the crash, it is possible to calculate the energy that is absorbed by the two
vehicles in the impact that can be expressed as:
Since the proposed methodology is applied as an add on over traffic simulation a more detailed analysis
can also be performed in which the energy absorbed by every vehicle and the exact vehicle type is
considered.
In that case, it would be useful to use the formula proposed by Joksch (1993), as already done in Evans
(1994), that directly establishes a probability of death or injury as a function of Delta-V:
(10)
(9)
(8)
𝑃=�∆𝑉𝛼��𝑘
(11)
In the general case, we have:
(13)
(14)
Vittorio Astarita and Vincenzo Pasquale. Giofré
For this more detailed calculation involving the probability of death or injury the quantity of energy
absorbed by each vehicle can be calculated as:
It must be noted that it is easy to demonstrate that the total energy absorbed by the vehicles Δ𝐾 can be
assigned in equal parts to the two vehicles when they have equal masses:
(12)
Δ𝐾1=12𝑚1𝚫𝒗1�����2 ,Δ𝐾2=12𝑚2𝚫𝒗2�����2
Δ𝐾1= Δ𝐾2= Δ𝐾2
𝚫𝒗2������=m2m1
𝚫𝒗1������
This latter equation explains why when the vehicles have different masses the lighter vehicle will suffer
greater damage and its occupants face a higher probability of death or injuries according to (11).
1.4. Contribution of the paper as a breakthrough in traffic simulation: introducing driver error and
"potential crashes" instead of looking for "potential conflicts" in existing simulations
In this paper, a completely new approach to microscopic evaluation of surrogate safety measures is
proposed. The proposed safety indicator is based on the explicit simulation of possible driver errors. The
idea originates from the consideration that, in the real world, most accidents involving human drivers occur
because one (or more than one) driver has a temporarily distraction.
A driver for example can be distracted by being occupied in some other tasks (for example a mobile call) or
because he has a momentary breakdown in attention and/or awareness of external changes due to a
psychological or physical failure. There are many driver distractions that could cause human failure as
revealed by Stutts et al. (2003). In Ueyama (1997) on the base of police records it is shown that in many
right-angle collisions at an intersection in Tokyo drivers did not attempt to avoid the crash.
Bevrani and Chung (2012) propose a framework for car-following microsimulation models (Figure 5) to
include human errors. They identify three stages in which a human error can take place: perception and
recognition, decision making, dynamic formulas.
Figure 5: Bevrani and Chung (2012) framework to introduce human errors in microsimulation models.
The simulation and study of crashes and consequences has been carried out in many works (Mak et al.
1998; Archer and Kosonen,2000;Erbsmehl,2009) although it has never been carried out in a complete
simulated traffic scenario such as one that is produced by microsimulation.
In this paper, a first methodology to shift from "potential conflicts" simulation to "potential crashes"
simulation is proposed, by introducing human failure in terms of potential driver errors, and described in
the next section.
A complete microsimulation application has been developed that is able to explicitly simulate potential
driver errors. The microsimulation model that has been developed in this work has been implemented as an
add-on to the existing Tritone microsimulation model (Astarita et al., 2011; Astarita et al. 2012) and can
be applied also to other existing microsimulation models such as Vissim (PTV,2005) or Aimsun (Barcelo
et al., 1994).
In the following case studies, driver failures are simulated by assuming that a driver stops reacting to
external stimulus and keeps driving at the current speed for a given time (we have called this driver a
"Zombie" driver and the vehicle which is driven by a "Zombie" driver a "bullet" vehicle). No decision
making and dynamic formulas that would account for an evasive maneuver (such as an emergency braking)
are taken into consideration in the case studies presented in this paper. Moreover, in our simple approach
also other drivers are not able to perceive and react to the conflict that a "Zombie" driver could be
generating.
2. The proposed methodology
One of the criticisms that is often raised to the application of microsimulation for the simulation of crashes
is the fact that crashes are very random and rare events and thus it is not possible to reproduce them. In our
methodology, we assume that crashes are originated by human errors. Driver errors happen more often than
crashes and not all driver errors have as an outcome a crash.
The first problem to deal with is the rate of distraction and how a specific distraction turns into a specific
driving error. Let us assume that a distraction turns out into a specific erroneous driving pattern. The rate of
distraction (or erroneous driving patterns) λ can be assumed as a variable which measures the number of
distractions that a driver can have while driving for a given amount of time. The rate λ is not enough to
characterize the distraction phenomenon. A distribution ψ of the typology of erroneous driving pattern (or
severity of the distraction) must also be assumed. In theory, knowing the rate λ and the distribution of ψ a
Monte Carlo method could be applied to generate randomly the instant of distraction and the consequent
erroneous driving pattern.
An underlying assumption for this rate-of-distraction-based model could be that crash frequency is
connected to the distraction frequency, which can be assumed to occur randomly and uniformly along any
travelled distance. In other words, a driver has an equal probability of making an error at any point of his
trip. However, crash data have shown that crash frequencies are higher at certain locations and in certain
traffic flow conditions. How to deal with these complications?
A very similar methodology, to what is proposed in the following, has been applied into the Roadside
Safety Analysis Program (RSAP) developed in the National Cooperative Highway Research Program
(NCHRP) and presented in report 492 that is the Engineer's manual for RSAP (Mak and Sicking 2003).
The NCHRP report 492 is more than a software manual and describes the basis of a research project to
develop an improved cost effective analysis procedure for assessing roadside safety improvements. The
project objective has been accomplished with the development of a software that can help roadside safety
Vittorio Astarita and Vincenzo Pasquale. Giofré
engineers to evaluate impacts of roadside safety improvements. The RSAP software consists of four basic
modules: the Encroachment Module, the Crash Prediction Module, the Severity Prediction Module, and the
Benefit/Cost Analysis Module. Using the Monte Carlo technique, RSAP generates the following
conditions: encroachment location, encroachment speed and angle, vehicle type and vehicle orientation on
impact. RSAP assumes a straight encroachment vehicle path justified by "the lack of quantitative
information on vehicle and driver behavior after encroaching into the roadside" and also due to the
difficulty of simulating a curvilinear vehicle path. In other words, RSAP generates randomly (in a random
location) a vehicle and its roadside encroachment trajectory (starting from a random location on the road)
and assesses the consequent damage of a "potential" crash by evaluating the consequences of simulated
impacts.
The proposed methodology differs from the RSAP software approach since RSAP considers only isolated
driver crashes against roadside obstacles and barriers without considering complete traffic scenarios and
interactions among vehicles. Moreover, RSAP is not built upon traffic microsimulation software.
The proposed methodology is instead built upon classical microsimulation packages. Knowing the vehicle
involved in a distraction and the consequent severity of the distraction that leads to an erroneous driving
pattern it is possible to create an "add-on" simulation inside a classic simulation scenario. The "bullet"
vehicle kinematics can then be studied along with that of other surrounding vehicles. A similar procedure
has been applied in the paper of Wang et al. (2017) where three anomalous driving patterns are considered:
vehicles which are moving at an excessive low or high speed and vehicles that operate an emergency
braking maneuver that makes them abruptly stop. In that work, an "add-on" simulation is performed only
on the chosen anomalous vehicle and on neighboring vehicles.
Our methodology is different from the method proposed in Wang et al. (2017) since we introduce explicitly
driver distractions as a possible anomalous behavior that turns into an anomalous driving pattern.
Moreover, we propose a detailed analysis of crash dynamics that considers also isolated crashes with
roadside obstacles and barriers. Apart from that, the general approach is very similar. And the third case of
sudden stops analyzed in the paper of Wang et al. (2017) can be seen as a subcase of road failure in our
general methodology.
In our methodology, we assume that the outcome of a given specific erroneous driving pattern can be easily
studied by applying vehicle kinematic in a microsimulation program and that this "add-on" simulation can
be performed with a post-processing procedure that is performed on the trajectories that are the output of a
classical microsimulation.
This "add-on" simulation in general could be as simple as projecting the "bullet" vehicle along a straight
trajectory line as in RSAP or as complicated as a full microsimulation model. The general framework, that
we believe is applicable to every kind of traffic anomaly, is such as depicted in Figure 6. In Fig. 6 we
introduce also the term "road anomaly" since a vehicle which operates an abrupt stop most of the time is
forced to do so because of some kind of road anomaly (an obstacle on the roadway).
Driving behaviors (or road) anomalies can be simulated by using a random Monte Carlo approach or a
deterministic approach. In the first case, parameters affecting perception, decision making and vehicle
dynamics (in the case of failing vehicle) are randomly generated. In the deterministic approach instead sets
of parameters are fixed and the calculation must be repeated for every set of parameters. It must be noted
that road failures such as a dog crossing the road or exceptionally slippery road pavement (due for example
to an oil spill) can also be simulated with this approach. The start of the procedure in Fig.6 is the choice of
a vehicle (driver) who performs an anomalous driving pattern. This pattern is simulated together with the
potential evasive movements of other surroundings vehicles. The output of this simulation, if a crash
occurs, is considered in terms of severity. We propose to use general simple energy-based indicators for
severity of a crash, although every detailed analysis of the crash dynamics can be performed.
In this paper, we apply a simple methodology that can be considered a first simple implementation of the
general framework of Fig. 6 based on a deterministic technique. A Monte Carlo or mixed deterministic-
Monte Carlo approach could also be used, though, since this is the first implementation of this
methodology, we have kept this first implementation simple and reproducible by applying a deterministic
approach instead of a stochastic approach.
Classic traffic Microsimulation
Post-processing
evaluation framework
Trajectories of all vehicles xi(t),vi(t),ai(t)
Choice of a bullet or failing vehicle z:
xz(t),vz(t),az(t)
or
Choice of a road failure
Random Monte Carlo
or deterministic
If vehicle (driver) failure:
random Monte Carlo
or deterministic
alteration
of normal behaviour
Perception
Decision making
Vehicle dynamics
Traffic dynamics for the next Δt
including potential evasive manoeuvres
of other vehicles
Crash severity evaluation (if any)
Figure 6: General proposed framework for the simulation of driver, vehicle and/or road failures.
In general terms, the proposed first implementation of our methodology develops in a very similar way to
RSAP, applying the same procedure of projecting the trajectory of a vehicle in a straight line. Yet we
propose to apply this over the simulated trajectories of other vehicles in a microsimulation environment
scenario. In other words, the trajectory of the distracted driver vehicle is evaluated and projected, for the
given time steps, for the established distraction time, over the actual trajectories of other vehicles. Every
occurring crash is then evaluated in terms of energy involved in the crash. The simulation of a driver
distraction is performed every time step on every vehicle. With this methodology a great number of
"potential" crashes are then generated. The total crash energy (sum of all energy involved in all potential
crashes) or other relevant variables can then be used as safety indicators.
In detail, the framework we applied in our case studies is depicted in Figure 7. There are just three main
parameters of our first implementations: the simulation time step, the distraction time and the angle of the
possible "Zombie" vehicle trajectory. Each single vehicle that is moved on the network is considered as
candidate for a driver distraction each time step of the microsimulation. The time step, so, is the first
parameter of the proposed methodology and in this first implementation was set equal to one second. In the
Vittorio Astarita and Vincenzo Pasquale. Giofré
following case studies, microsimulation of traffic scenarios is used as a basis for calculations, and in each
microsimulation, each vehicle on the road is considered every second for a "potential crash" production. A
"potential crash" is generated by moving the vehicle (starting at time t0 ) for a given distraction time ΔT
(until the time t0 + ΔT) at a constant speed equal to the simulated speed of the vehicle at time t0. This
second parameter, ΔT in this paper, has been set as an integer value from one to seven seconds. In this
preliminary work, to make our work reproducible we have used fixed values instead of a random
distribution with a Monte Carlo technique.
Classic traffic Microsimulation
Post-processing
evaluation framework
Trajectories of all vehicles xi(t),vi(t),ai(t)
First parameter: Time step
Choice of a bullet or failing vehicle z:
xz(t),vz(t),az(t)
Deterministic
(all vehicles
every time step)
Deterministic
alteration
of normal behaviour
("Zombie" drivers that
keep driving
at constant speed)
Perception
Decision making
Vehicle dynamics
-Second parameter: Δt=duration time of distraction
-Third parameter: fixed altered trajectory angle (at
constant speed)
Traffic dynamics for the next Δt of the
"Zombie" driven "bullet" vehicle.
(potential evasive manoeuvres
of other vehicles are not simulated)
Crash severity evaluation (if any)
Figure 7: Proposed specific framework for the simulation of driver errors following the "zombie" driver
("bullet" vehicle) approach. This framework has been used in the following microsimulated case studies
and is a subset of the general framework in Figure 6.
Also the trajectory of the vehicle could be simulated at a random angle generated with a Monte Carlo
technique according to a given distribution. In this first implementation instead we used 3 different angles:
a straight line, according to the given direction of the vehicle at time t0, and a 15 degrees deviation on the
left and on the right.
In other words, as an example, for a parameter ΔT of 5 seconds for each vehicle we calculate 15 vehicle
positions as depicted in Figure 8.
Figure 8: Possible positions of vehicle trajectories (as they are investigated in the following case studies)
with a time distraction of 5 seconds.
In the following simulation case studies, collisions between vehicles and roadside objects or barriers have
not been considered so the crash depicted in Figure 9 is possible (with DT=7 sec., it must be noted that a
lower DT would not have caused a collision).
Figure 9: A rare but possible collision at a 15 degrees angle trajectory after 7 seconds of distractions.
The detail algorithm of the microsimulation add-on examines all vehicle trajectories every second of the
simulation, performing a "distraction" simulation inside the main simulation. Each vehicle, which is
moving at the considered time, is advanced at a constant speed, for an imposed period of time on a
deviation angle that is imposed for the direction. During this subsimulation it is possible to have two
results: the vehicle does not impact with any other vehicle (barrier or side obstacle) or the vehicle is
involved in a crash. The collision between two vehicles is detected by evaluating the points of intersection
between two vehicles as in Figure 10. The algorithm evaluates whether the sides of a vehicle intersect with
the sides of another vehicle (or barrier).
Figure 10: Collision detection.
If there is a collision the subsimulation is interrupted and the extent of the collision is evaluated as a
function of the energy produced. In the end, the algorithm returns detailed information on individual events
and aggregate statistics, which allow a rapid evaluation of the analyzed network. Aggregated information
(averages, variances, sums, minimums and maximums) can be calculated on the basis of the number of
collisions, the effective duration of the distraction, the overall energy developed during the collision, and
the amount of energy for each of the two vehicles involved.
Vittorio Astarita and Vincenzo Pasquale. Giofré
An accurate analysis of road side barriers safety performances is beyond the scope of this paper so only an
analytical example is presented in the following section. All the presented simulation-based case studies
(similarly as in all preceding papers based on the evaluation or microsimulation of surrogate safety
measures) do not consider isolated vehicle crashes or road side crashes. It must be noted though that the
proposed methodology allows researchers also to assess easily the real impacts of roadside safety
improvements basing analysis on the real prevalent time varying o/d matrix in every traffic scenario that
can be reproduced by microsimulation.
3. How the three parameters affect results, under the proposed specific framework, in the case of
isolated vehicles: two simple examples analytically evaluated
In the following, a special notation will be used to indicate parameters of a surrogate safety indicator such
as that proposed in the previous section. The parameters are the distraction time duration, the angle of the
deviated trajectory and the percentage of energy considered for a straight deviation. As an example, for a
distraction time of 3 seconds, a trajectory deviated on the left and on the right at an angle of 15° and an
energy calculated by summing up 80% of the energy due to crashes that are originated by a straight
trajectory (10 % for the energy of the left and right deviated trajectories) would be indicated by the
indicator: Z3-15-0.80. This means that Z3-15-0.80 of a given traffic scenario would be the sum of 80% of all the
energy relative to all crashes that are generated by straight trajectories (of 3 seconds) and 10% of the sum
of all energy of crashes that are generated by trajectories that deviate left and right at an angle of 15°.
3.1 Example 1 isolated vehicle and linear road side barrier.
The first proposed example (see Fig.11) is a single vehicle travelling along a road segment of one km at a
constant speed of 90 km/h, the road side barrier is a concrete linear wall.
If we make the case that diver failures are generated every second (first parameter time step = 1 sec.), that
the driver distraction time is 5 seconds and we consider equally the energy coming from the three possible
angular trajectories above indicated (deviation angle +-15° which means that the energy calculated is : Z5-
15-1/3). Then two crashes are generated by each one of the 40 considered positions of the vehicle. The two
crashes at a speed of 90 km/h against the vertical walls on both sides of the road happen as a consequence
of the 15 degrees deviation to the left and to the right. For the crash severity evaluation, we can consider the
component of kinetic energy in the direction perpendicular to the wall:
Δ𝐾=12𝑚(𝑣𝑥)2
(15)
where vx is equal to 90*sin(15°)=23.3 (km/h)=6.47 (m/s) which, if we make the case of a vehicle of 1000
kg, brings a result of ΔK= 20 933 (Joule) for the lateral crash. Considering the 40 positions of the vehicle
in one km of road and two crashes for every position this brings a total crash energy of 1 674 682 (Joule)
(which must be divided by three according to the above-described indicator). This example clearly shows
that the total crash energy would be inversely proportional to the chosen time step.
Changing the trajectory angle by increments would also increase the energy value. The general formula for
the total crash energy, in example one, as a function of lateral angle deviation and time step is :
Total crash Energy= Z5-θ-1/3 = 𝐿𝑣∙𝛿𝑡∙2∙ 12𝑚(𝑣∙sinθ)2 *1/3
where 𝛿𝑡 is the time step (s), v is the vehicle speed (m/s), m the vehicle mass (kg), θ the deviation angle
and L the road segment length. An increase in the distraction interval ΔT would not affect results of road
side crashes, since in this example only one vehicle is on the road, while instead it would obviously affect
total crash energy in all scenarios where different vehicles are simulated in a microsimulation scenario. A
(16)
decrease in ΔT could affect results, since a small ΔT would generate crashes only against barriers or objects
that can be reached by the "bullet" trajectory.
Figure 11: Example 1.
3.3 Example 2 isolated vehicle with trees at the road side and no safety barrier.
The second proposed example (see Fig.12) is a single vehicle traveling along a road segment of one km at a
constant speed of 90 km/h, there is no roadside barrier and there are trees spaced every 5 meters on both
sides of the road. For comparison, we can make the same assumptions as in example 1: diver failures are
generated every second, driver distraction time is 5 seconds and 15 degrees deviations. Two crashes against
trees, on both sides of the road, are generated by each one of the 40 considered positions of the vehicle. For
the crashes at a speed of 90 km/h against the trees we have to consider the total kinetic energy of the
vehicle (not only the 𝑣𝑥 component perpendicular to road direction):
(17)
The total crash energy is: 25 000 000 (Joule), this energy value which is around 15 times that of example 1
and clearly shows how the proposed methodology would allow researchers to take into account also
roadside barrier effects. The formula for total crash energy for example 2 is:
Total crash Energy= Z5-θ-1/3 = 𝐿𝑣∙𝛿𝑡∙2∙ 12𝑚(𝑣)2∗1/3
(18)
The deviation angle here again has practically no role (except for when the trajectory becomes so angulated
that the vehicle could move through two trees without crashing).
Δ𝐾=12𝑚(𝑣)2 = 312 500 (Joule)
Figure 12: Example 2.
Vittorio Astarita and Vincenzo Pasquale. Giofré
4. Microsimulation case studies
A general analysis of how the parameters affect results, in more complicated traffic scenarios, can only be
done in microsimulation, given the practical difficulties of performing analytical calculation when more
than one moving vehicle is present on a network. Three scenarios are presented in the following:
4.1 Friction effects on safety in traffic flow theory. Is it true that significant speed differences do not affect
traffic safety when a white (or yellow) line is drawn on the road pavement?
The ancient Greeks were aware of causes and mitigation of friction. Fluid friction occurs
between fluid layers that are moving relative to each other. This can cause viscosity and other friction
forces in fluids. Friction can cause fluids to become unstable and can cause a transition to a turbulent
flow regime. Traffic flow is the only case where it is possible to draw a white (or yellow) continuous line
on the road pavement between two different flow speed regimes and supposedly avoid any friction and
unwanted interactions. According to current surrogate safety indicators based on traffic conflicts a road
design such as in Figure 13 is as safe as a road design with a central barrier since trajectories of opposing
directions do not intersect. This is against common knowledge. Knapp et al.(2014) in the Road diet FHWA
guide state that: "Four-lane undivided highways have a history of relatively high crash rates as traffic
volumes increase".
Figure: 13 undivided four-lane highway.
Many papers have been presented on the evaluation of surrogate safety measures based on microscopic or
macroscopic traffic flow modeling that consider speed differential as a factor or as an indicator for crash
risk (Kachroo and Sharma,2018). There is no published paper on surrogate safety indicators that can be
applied to the speed differential between opposing traffic in undivided two (or four)-lane highways. In the
seminal paper by Gettman and Head (2003) there is no mention of potential conflicts arising from this kind
of traffic scenarios. In Laureshyn et al.(2010) it is introduced a classification of encounter states and the
state where road users' paths do not overlap is considered to be safe unless the situation turns into a
"collision course" possibly via a "crossing course" state. It is a fact that this transition from one state to
another is not reproducible in current microsimulation unless driver error is introduced such as in the
proposed approach. Moreover, it is debatable whether this weakness deserves a better investigation for all
(numerous) applications that are based on real trajectories.
The conclusion is that the evaluation of undivided highway safety it is not possible in simulation with
current surrogate safety measures based on conflicts and at the moment it has been explored only with
inferential statistics based on crash data. Some examples are in: Council and Stewart (1999), Hauer at al.
(2004); Dinu and Veeraragavan (2011), Park and Abdel-Aty (2015).
The following example will show how the proposed methodology can asses safety in these kinds of
scenario. A simulation case study was created based on the situation depicted in Figure 14 relative to the
road that runs alongside the sea in the city of Paola in south Italy.
Figure 14: Sea-side road in Paola, Italy 2018.
A simulation was performed using VISSIM microsimulation package coupled with the SSAM package on
the two networks depicted in Figures 15 and 16.
Figure 15: Linear road.
Figure 16: Deviated Road.
Simulated traffic conditions were the same in both scenarios: total length of the road 200 meters and traffic
flow 500 veh./h. per direction. For both scenarios 20 simulation repetitions were carried out. Results of
SSAM package with a TTC threshold of 1,5 sec. were equal for both scenarios: zero conflicts as can be
seen in Figure 17.
Vittorio Astarita and Vincenzo Pasquale. Giofré
Total collision energy [J]
Deviated
Trajectory
road
angle
Front
378141
Left 1948400
Right
715
Total
Straight
road
16336
1770168
48
Difference
361805
178231
668
%
Difference
2214,8
10,1
1394,9
540704 1.1.1. 30,3
Table 1: Total collision energy in VISSIM simulation.
1786552
2327256
Figure 17: SSAM Analysis on VISSIM simulation for first case study.
The underling hypothesis in all current conflict techniques is that for a conflict between two vehicles to
exist the trajectories must intersect. The case of Figures 14 and 16 is instead obviously dangerous since
vehicles can potentially get involved in a high energy head on collision with traffic coming from the
opposite direction. The proposed methodology instead, introducing driving errors in vehicles trajectories is
able to evaluate the increased risk. Results, in fact, leads to a 30% worsening of safety, in terms of overall
impact energy (Table T1), when the deviation is considered.
From the numerical results we can see how the incidents due to front and right trajectories have an
important role in this proposed scenario since a distraction trajectory on the left of the travelling direction
would bring vehicles away from a potential head on collision. In Figure 18 the collision points, in which the
collisions start, are plotted and it is clearly possible to see an increase in point density near the deviated
road section.
Figure 18: Collision points.
4.2 Toll plaza layouts.
The second simulated scenario concerns the analysis of two different toll plaza layouts. This scenario is
based on the crash analysis carried out by Abuzwidaha and Abdel-Aty (2018) on different designs of
hybrid toll plazas (HTP). In HTP express automated Open Road Tolling (ORT) lanes coexist with
traditional toll collection lanes. The paper of Abuzwidah and Abdel-Aty (2018) compares the two different
implemented solutions in Florida expressways: ORT deployed on the mainline and separate traditional toll
collection to the side or traditional toll collection deployed on the mainline and separate ORT lanes to the
side. The two main reported results are: that the first design (where ORT are deployed on the mainline) is
safer and that the crash risk is approximately 23% higher in diverge areas than in merge areas.
An attempt to perform a risk estimation with our methodology has been carried on, replicating a similar
scenario with the Tritone microsimulation package. Different total traffic flows values have been simulated
on the networks depicted in Figure 19 and 20 considering 19% of the traffic on the traditional manual
collection lanes.
Figure 19: First design (D1) of hybrid toll plaza layout (manual lanes on the mainline).
Figure 20: Second design (D2) of hybrid toll plaza layout (automatic lanes on the mainline).
Results in terms of total energy resulting from the application of our methodology, with a Z3-15-1/3 indicator,
are depicted in table 2 and, in accordance with traffic crash data of Abuzwidah and Abdel-Aty (2018),
show an increased risk when the manual toll collection is deployed on the mainline.
Traffic flow [v/h]
Automatic
toll collection
486
972
1458
1782
1944
Total
600
1200
1800
2200
2400
Manual
toll collection
114
228
342
418
456
Safety
%
9,55
15,40
11,93
12,73
19,53
Manual
collection on the
mainline (D1)
Total energy [J]
Automatic
collection on the
mainline (D2)
61304576
218669984
1021998016
1162934272
1941774336
Difference
67775472 6470896
258487232 39817248
1160492288 138494272
1332596992 169662720
2412963072 471188736
Table 2: Total collision energies in different flow scenarios.
In Figures 21 and 22 it is possible to see the points in which the collisions take place and a visual
(qualitative) confirmation of the second main finding of Abuzwidah and Abdel-Aty (2018) that the diverge
areas are more critical as opposed to the merge areas.
Vittorio Astarita and Vincenzo Pasquale. Giofré
Figure 21. Collision points in D1 design.
Figure 22. Collision points in D2 design
With the proposed methodology a map of the transportation network can be drawn by dividing the network
into areas and by coloring each area according to the total energy of potential crashes that happen inside a
given area. This visualization allows engineers to spot dangerous locations easily. In Figure 23 this
diagram is presented for the two designs D1 and D2.
Figure 23: Map of danger for D1 and D2 designs.
Saad et al. (2018) present a study on the analysis of driving behavior at expressway toll plazas and it
confirms previous results that the main problem at hybrid toll plazas is that drivers have to take the right
lane and may perform sudden lane changing before the toll. The simulated scenario in our methodology,
introducing driver errors, seems to be able to reveal these kinds of traffic flow turbulence and the connected
risk.
Another example of the application of our methodology and the resulting danger map is in Figure 24 where
an intersection is immediately spotted as a dangerous point on the traffic network.
Figure 24: Map of danger as potential crashes energy level.
The small road network in Figure 24 has been simulated with 720 veh./h. on the main road and 360 veh./h.
on the secondary road. It was modeled using the TRITONE software and elaborated using the methodology
proposed in this article with a Z3-15-1/3 indicator.
4.3 three different intersection layouts
Many papers have been presented for the evaluation of traffic safety at intersections with surrogate safety
measures, among them: Stevanovic et al.,2013;Killi and Vedagiri,2014; Shahdah et al. 2015; Zhang et al.,
2017. Some papers have been also presented to establish the safest design for given traffic volumes
(Astarita et al. 2019) using simulation.
Following a similar approach, we introduce a three intersection layouts scenario, depicted in the following
Figure 25. The simulations have been calibrated by sampling data from a single real intersection. The
sampled intersection is located in an urban area and is an unsignalized intersection (case A). The
intersection has also been studied altering the layout into a signalized intersection (case B) and a
roundabout (case C) (keeping the same traffic flows).
O/D
1
2
3
4
1
0
465
76
121
Cars
2
1073
0
75
215
3
183
74
0
148
4
124
133
95
0
Heavy Vehicles
O/D
1
2
3
4
1
0
13
5
8
2
48
0
8
8
3
14
3
0
7
4
13
0
3
0
Table 3: O/D Matrices.
Figure 25: Case studies
The general expectation is that from case A to C, safety would increase in average conditions. The flows
that were detected by manual counting and simulated are from 8.30 to 9.30 such as depicted in table I.
From table I it is clear that in simulations also heavy vehicles were taken into account, in order to obtain a
simulation closer to reality. The networks were modeled through the car-following models Wiedemann 99
(Wiedemann, 1991) and Gipps (1981) in both VISSIM and Tritone simulators. While the resulting
trajectories were analyzed through a specific microsimulation add on software created ad hoc and based on
the algorithm described in the previous sections.
Vittorio Astarita and Vincenzo Pasquale. Giofré
4.3.1 Results of simulations
Simulations were carried out with different distraction time parameter: 3, 5, and 7 seconds and with a time
step parameter of one second. This means that a simulated crash can happen at any instant between 1
second and the established distraction time.
The following two figures show results for Vissim and Tritone Microsimulation packages in terms of total
energy of simulated crashes.
A higher energy can be associated with a greater risk of injuries or deaths. Absolute values of energy in the
two different simulators are different (this reflects slightly different vehicle to vehicle interactions between
different simulators), yet results in terms of relative values between different scenarios are very similar for
the two simulators. Also results are not very sensible to a change in distraction time parameter (max
distraction time in Figures 26 and 27). For all the selected distraction time parameters and for both
simulators the intersections rank in this order of safety from the safest to the least safe: traffic light
regulated, roundabout and unregulated intersection. In all scenarios, the unregulated intersection is the least
safe while the traffic light is the safest. It must be noted that results are also a function of the given traffic
flows. As can be seen in Figures 28 and 29, conditions of flow are very congested, in the traffic light
scenario, and this increases safety since vehicles are always travelling at a very low speed.
Figure 26: Total collision energy in VISSIM for three scenarios and for different distraction times.
Figure 27: Total collision energy in Tritone for three scenarios and for different distraction times.
Figure 28: The three simulated scenarios in VISSIM
Figure 29: The three simulated scenarios in TRITONE
Results on the average time at which a crash occurs in the simulations are also similar between Tritone and
VISSIM as can be seen in Figures 30 and 31:
Figure 30:Average distraction time before a crash occurs in VISSIM.
Vittorio Astarita and Vincenzo Pasquale. Giofré
Figure 31:Average distraction time before a crash occurs in Tritone.
The total energy of simulated crash has been calculated, with a distraction time of 3 seconds, also by
applying a threshold on the severity of crashes. In other words, only the crashes that have an energy value
over threshold are considered and summed to calculate total energy. In Figure 32 and 33 are the total
collision energies for VISSIM and Tritone:
Figure 32:Total collision energy in VISSIM removing all crashes below a given threshold.
Figure 33:Total collision energy in TRITONE removing all crashes below a given threshold.
The graphs of Figures 32 and 33 show clearly how the ranking of the three scenarios are always the same in
any case with both microsimulation packages.
When considering instead the average collision energy VISSIM and Tritone show different results as can
be seen in the following Figures 34 and 35 depicting the average collision energy applying a threshold on
the severity of crashes.
Figure 34:Average collision energy in VISSIM removing all crashes below a given threshold.
Figure 35:Average collision energy in Tritone removing all crashes below a given threshold.
4.3.2 Confrontation between the number of simulated crashes and SSAM conflicts
A confrontation was also performed between the proposed methodology and classic methodologies of
estimation based on SSAM safety analysis. SSAM was applied to both Tritone and VISSIM in the three
scenarios obtaining similar results in terms of number of conflicts. Conflicts were calculated on the basis of
TTC indicator with a threshold of 1,5 sec.
The following Figure 36 shows again the same ranking in terms of safety levels for the three scenarios. In
Figure 36 the percentage of the total number of conflicts (with classical methodology according to SSAM)
and the total number of simulated crashes (among different scenarios) are shown for each scenario.
Vittorio Astarita and Vincenzo Pasquale. Giofré
Percentage of conflicts (crashes)
60,0
50,0
40,0
30,0
20,0
10,0
0,0
Tritone (SSAM Conflicts)
Tritone (Crashes)
Vissim (SSAM Conflicts)
Vissim (Crashes)
Unregulated
intersection
Traffic light
regulated
intersection
Roundabout
Figure 36: Percentage of total conflicts(or crashes) for each intersection and for both microsimulation
models.
5 Discussion and conclusions
In this paper, a general methodology for introducing the driver error in simulation and for evaluating
resulting potential crashes is presented. The proposed methodology is quite primitive in both the simulation
of driver errors and in crash dynamics simulation, yet it presents very innovative features introducing the
possibility of simulating driving errors in a microscopic environment.
The simplicity of the proposed approach makes it easily reproducible and applicable on top of any
microsimulation package that can produce trajectories of vehicles.
Moreover, the proposed approach generates surrogate safety indicators that can be applied legitimately on
both simulated and real trajectories as alternative surrogate safety measures and compared with existing
indicators that are not able to consider conflicts between vehicles moving on nonconflicting trajectories and
with roadside obstacles and barriers.
The results of this paper indicate that the safety level of very common traffic scenarios, which cannot be
assessed with traditional surrogate safety measures, based on conflict indicators, can instead be easily
captured with the proposed methodology.
The proposed indicators are, in fact, more comprehensive than traditionally used conflict indicators since
they are able to capture a wider range of conflicts that those commonly evaluated in traditional indicators.
The assessment of roadside barriers safety becomes possible in the proposed framework with common
microsimulation packages.
A more detailed analysis of potential crash consequences is also possible by exploiting the richness of crash
dynamics simulation.
A different and new insight into an important issue such as traffic safety evaluation with microscopic
simulation becomes possible when the introduction of driver errors (or sudden road anomalies) allows road
crashes in a microscopic setting to be simulated.
Common simulation techniques do not allow representation of a wide range of erroneous driver behaviors
that can lead to a crash. Even common shunting crashes that are caused by any internal or external cause
that can force a leading driver to stop the car, with an abrupt extreme braking maneuver, are not properly
represented with common simulation techniques.
More common erroneous driver behaviors that can be simulated by the proposed approach are:
-Drivers speeding at a red light or in general approaching an intersection without taking into proper
consideration other incoming vehicles.
-Drivers taking the wrong lane, driving on the wrong side of the road or (worst) in one way streets against
the correct traffic direction.
-Drivers driving off road in isolated accidents against external obstacles or traffic barriers.
-Accidents where a vehicle hits first a barrier or an obstacle and then bouncing back on the road hitting or
getting hit by another car.
-Accidents that involve more than one vehicle and the connected real crash dynamic.
-Accidents caused by overtaking maneuvers where there is not enough time leeway.
The proposed first implementations of the methodology in the presented case studies show accordance with
empirical expectations, with crash data and with commonly used conflicts indicators techniques (in the
situations where conflict indicators can be applied).
Crash severity is finally taken into account explicitly shedding some light on the real consequences and on
the safety of traffic scenarios that it was not possible to simulate properly.
The total impact energy proposed in the case studies is only one of the possible surrogate measures of risk
that it is possible to calculate once driver errors are introduced. By simulating (or knowing) the vehicle
mass distribution it would be an easy step to calculate the exact Delta-V of every potential crash bringing
an estimate of the casualties or injuries using (11).
Moreover, the methodology presented can be easily applied to evaluate the safety impact of autonomous
vehicles in a mixed environment. Autonomous vehicles of the future will be able to drive without
committing human errors yet they will have to face the possibility of human errors. A safety assessment
using microsimulation of different mixed road scenarios would be realistic only properly introducing
human error as the main differentiating factor between human driven and autonomous vehicles.
The presented methodology will allow important safety and economic evaluations of new mixed traffic
interventions and policies such as: new traffic rules in a mixed traffic reality, roadside barriers design, new
connected traffic signals and many other innovative systems that will have to deal with a mixed circulation
of old vehicles and connected and autonomous vehicles.
This evaluation, of course, would have to be scaled relative to the simulated scenario as a function of the
traffic flow distribution over a period of time. The indicators proposed in the case studies examine a driving
error rate of one error per second for each driver. In a real scenario, the driving error rate for second is a
very low number though the number of seconds travelled by all drivers are very high. A scaling of the
proposed procedure on experimental data and a calibration of the indicators parameters its outside the scope
of this first methodological paper.
The implementations of the proposed methodology in the proposed case studies should be only considered
as illustrative examples of the potentiality of introducing driver errors into a microsimulation environment
so that the concepts presented in this seminal paper may stimulate new questions and give new insights that
hopefully will lead to further investigations and better infrastructure designs.
6 Acknowledgements
We wish to thank Giuseppe Guido and Alessandro Vitale for the useful discussions, and Giovanna
Imbrogno for suggesting the Paola sea-side road case.
on road safety. 1997.
M. A. Abdel-Aty, A.E. Radwan, "Modeling
Prevention,Volume 32, Issue 5, 2000,Pages 633-642,
traffic accident occurrence and
involvement",Accident Analysis &
Vittorio Astarita and Vincenzo Pasquale. Giofré
7 References
Hauer, Ezra. "On the estimation of the expected number of accidents." Accident Analysis & Prevention 18.1 (1986): 1-12.
Jovanis, P., Chang, H., 1986. "Modeling the relationship of accidents to miles traveled." Transportation Research Record 1068.
S. Miaou, H. Lum (1993) "Modeling vehicle, accidents and highway geometric design relationships"
Accident Analysis and Prevention, 25 (6) (1993), pp. 689-709
Miaou, S., (1994). "The relationship between truck accidents and geometric design of road section: Poisson versus Negative
Binomial regression." Accident Analysis and Prevention 26(4).
Shankar, V., Mannering, F., Barfield, W. 1995. Effect of roadway geometric and environment factors on rural freeway accident
frequencies. Accident Analysis and Prevention 27(30).
Hauer, Ezra. Observational before/after studies in road safety. Estimating the effect of highway and traffic engineering measures
Yan, Xuedong, Essam Radwan, and Mohamed Abdel-Aty. "Characteristics of rear-end accidents at signalized intersections using
multiple logistic regression model." Accident Analysis & Prevention 37.6 (2005): 983-995.
Hayward, J. (1971) Near misses as a measure of safety at urban intersections, PhD Thesis, Department of Civil Engineering, The
Pennsylvania State University, Pennsylvania.
Minderhoud, M. and Bovy, P. (2001) "Extended time to collision measures for road traffic safety assessment", Accident
Analysis and Prevention 33: 89 -- 97.
Huguenin, F., Torday, A. and Dumont, A. (2005) "Evaluation of traffic safety using microsimulation", Proceedings of the 5th
Swiss Transport Research Conference -- STRC, Ascona, Switzerland.
Tarko, A., Davis, G., Saunier, N., Sayed, T., and Washington, S. (2009). "Surrogate measures of safety".
Perkins, Stuart R., and Joseph L. Harris. (1967) "Traffic conflict characteristics: accident potential at intersections". Highway
Research Record, Vol. 225. pp. 35-43.
Amundsen, F.H., and Hyden, C. 1977. Proceedings of the 1st Workshop on Traffic Conflicts, Oslo, Norway.
Hydén, C. (1987) The development of a method for traffic safety evaluation: the Swedish traffic conflicts technique, Lund
Institute of Technology, Lund, Sweden.
Astarita, V., Giofré, V., Guido, G. and Vitale, A. (2011). Investigating road safety issues through a microsimulation model.
Procedia-Social and Behavioral Sciences, 20, 226-235.
Laureshyn, A. and Varhelyi A. (2018). The Swedish traffic conflict technique: Observer's manual. Department of Technology
and Society Traffic Engineering, Lund University.
Gerlough, D. L. (1955). Simulation of freeway traffic on a general-purpose discrete variable computer (Doctoral dissertation,
University of California, Los Angeles).
Webster, F. V. (1958). Traffic signal settings (No. 39).
Astarita, V., Giofrè, V. P., Guido, G., and Vitale, A. (2017). The use of adaptive traffic signal systems based on floating car
data. Wireless Communications and Mobile Computing, 2017.
Darzentas, J., Cooper, D., Storr, P. and McDowell M. (1980) "Simulation of road traffic conflicts at t-junctions", Simulation 34:
155 -- 164.
Cunto, F. and Saccomanno, F.F. (2007) "Microlevel traffic simulation method for assessing crash potential at intersections",
Proceedings of the 86th Annual Meeting of the Transportation Research Board, Washington, D.C..
Cunto, F. and Saccomanno, F. F. (2008) "Calibration and validation of simulated vehicle safety performance at signalized
intersections", Accident Analysis and Prevention 40: 1171 -- 1179.
Saccomanno F., Cunto F., Guido G. and Vitale A. (2008) "Comparing safety at signalized intersections and roundabouts using
simulated rear-end conflicts", Transportation Research Record 2078: 90 -- 95.
Yang, H., Ozbay, K. and Bartin, B. (2010) "Application of simulation-based traffic conflict analysis for highway safety
evaluation", Proceedings of the 12th WCTR, Lisbon, Portugal.
Cheol, O. and Taejin, K. (2010) "Estimation of rear-end crash potential using vehicle trajectory data", Accident Analysis and
Wang, C., and Stamatiadis, N. (2014). Evaluation of a simulation-based surrogate safety metric. Accident Analysis &
Prevention 42: 1888 -- 1893.
Prevention, 71, 82-92.
Gettman, D., Pu, L., Sayed, T. and Shelby, S. G., 2008. Surrogate safety assessment model and validation (No. FHWA-HRT-08-
051), Federal Highway Administration, Washington, DC, USA. FHWA, 2008.
Dijkstra, A., Marchesini, P., Bijleveld, F., Kars, V., Drolenga, H., and van Maarseveen, M. (2010). Do calculated conflicts in
microsimulation model predict number of crashes?. Transportation Research Record: Journal of the Transportation Research
Board, (2147), 105-112.
Caliendo, C., and Guida, M. (2012). Microsimulation approach for predicting crashes at unsignalized intersections using traffic
conflicts. Journal of transportation engineering, 138(12), 1453-1467.
El-Basyouny, K., and Sayed, T. (2013). Safety performance functions using traffic conflicts. Safety Science, 51(1), 160-164.
Huang, F., Liu, P., Yu, H., and Wang, W. (2013). Identifying if VISSIM simulation model and SSAM provide reasonable
estimates for field measured traffic conflicts at signalized intersections. Accident Analysis & Prevention, 50, 1014-1024.
Zhou, H., and Huang, F. (2013). Development of traffic safety evaluation method based on simulated conflicts at signalized
intersections. Procedia-Social and Behavioral Sciences, 96, 881-885.
Ambros, J., Turek, R., and Paukrt, J. (2014, November). Road safety evaluation using traffic conflicts: pilot comparison of
micro-simulation and observation. In International Conference on Traffic and Transport Engineering-Belgrade.
Shahdah, U., Saccomanno, F., and Persaud, B. (2014). Integrated traffic conflict model for estimating crash modification
factors. Accident Analysis & Prevention, 71, 228-235.
Shahdah, U., Saccomanno, F., and Persaud, B. (2015). Application of traffic microsimulation for evaluating safety performance
of urban signalized intersections. Transportation Research Part C: Emerging Technologies, 60, 96-104.
Zha, L. (2014). Next Generation Safety Performance Monitoring at Signalized Intersections Using Connected Vehicle
Technology(Doctoral dissertation).
Morando, M. M., Tian, Q., Truong, L. T., & Vu, H. L. (2018). Studying the Safety Impact of Autonomous Vehicles Using
Simulation-Based Surrogate Safety Measures. Journal of Advanced Transportation, 2018.
Astarita V., Festa D.C., Giofrè V.P., Guido G. and Vitale A. (2018) "The use of Smartphones to assess the Feasibility of a
Cooperative Intelligent Transportation Safety System based on Surrogate Measures of Safety" Procedia of Computer Science.
Elsevier.
Mahmud, S. S., Ferreira, L., Hoque, M. S., and Tavassoli, A. (2017). Application of proximal surrogate indicators for safety
evaluation: A review of recent developments and research needs. IATSS research.
Young, W., Sobhani, A., Lenné, M. G., and Sarvi, M. (2014). Simulation of safety: A review of the state of the art in road safety
simulation modelling. Accident Analysis & Prevention, 66, 89-103.
Zheng, L., Ismail, K., & Meng, X. (2014). Traffic conflict techniques for road safety analysis: open questions and some
insights. Canadian journal of civil engineering, 41(7), 633-641.
Laureshyn, A., De Ceunynck, T., Karlsson, C., Svensson, Å., & Daniels, S. (2017). In search of the severity dimension of traffic
events: Extended Delta-V as a traffic conflict indicator. Accident Analysis & Prevention, 98, 46-56.
Vittorio Astarita and Vincenzo Pasquale. Giofré
Laureshyn, A., Svensson, Å., Hydén, C., 2010. Evaluation of traffic safety, based on micro-level behavioural data: theoretical
framework and first implementation.Accid. Anal. Prevent. 42, 1637 -- 1646, http://dx.doi.org/10.1016/j.aap.2010.03.021.
Davis, G. A., Hourdos, J., Xiong, H., and Chatterjee, I. (2011). Outline for a causal model of traffic conflicts and
crashes. Accident Analysis & Prevention, 43(6), 1907-1919.
Bevrani, K., and Chung, E. (2012). An examination of the microscopic simulation models to identify traffic safety
indicators. International Journal of Intelligent Transportation Systems Research, 10(2), 66-81.
Stutts, J., Feaganes, J., Rodgman, E., Hamlett, C., Meadows, T., Reinfurt, D., ...& Staplin, L. (2003). Distractions in everyday
driving (No. HS-043 573).
Pu, Lili, Rahul Joshi, and Siemens Energy. Surrogate Safety Assessment Model (SSAM)--software user manual. No. FHWA-
HRT-08-050. Turner-Fairbank Highway Research Center, 2008.
Souleyrette, Reginald, and Josh Hochstein. Development of a conflict analysis methodology using SSAM. No. InTrans Project
10-376. 2012.
Cunto, F. and Saccomanno, F. F. (2008) "Calibration and validation of simulated vehicle safety performance at signalized
intersections", Accident Analysis and Prevention 40: 1171 -- 1179.
Ivan, J. N. and Konduri, K. C. (2018). Crash Severity Methods. In Safe Mobility: Challenges, Methodology and Solutions (pp.
325-350). Emerald Publishing Limited.
Shelby, S. G. (2011, January). Delta-V as a measure of traffic conflict severity. In 90th Annual Meeting of the Transportation
Research Board, Washington, DC (pp. 1-19).
Sobhani, A., Young, W., Logan, D., and Bahrololoom, S. (2011). A kinetic energy model of two-vehicle crash injury
severity. Accident Analysis & Prevention, 43(3), 741-754.
Sobhani, A., Young, W., & Sarvi, M. (2013). A simulation based approach to assess the safety performance of road
locations. Transportation research part C: emerging technologies, 32, 144-158.
Nordoff, L.S., Motor vehicle collision injuries: biomechanics, diagnosis, and management. Jones and Bartless Publishers, Inc.,
McHenry, R. R., and McHenry, B. G. (1997). Effects of restitution in the application of crush coefficients (No. 970960). SAE
2005.
Technical Paper.
Gabauer, D. J., and Gabler, H. C. (2006). Comparison of delta-v and occupant impact velocity crash severity metrics using event
data recorders. In Annual Proceedings/Association for the Advancement of Automotive Medicine (Vol. 50, p. 57). Association
for the Advancement of Automotive Medicine.
Tolouei, R., Maher, M., and Titheridge, H. (2013). Vehicle mass and injury risk in two-car crashes: a novel methodology.
Accident Analysis & Prevention, 50, 155-166.
Joksch, H. C. (1993). Velocity change and fatality risk in a crash--a rule of thumb. Accident Analysis & Prevention, 25(HS-042
059).
Evans, L. (1994). Driver injury and fatality risk in two-car crashes versus mass ratio inferred using Newtonian
mechanics. Accident Analysis & Prevention, 26(5), 609-616.
Jurewicz, C., Sobhani, A., Woolley, J., Dutschke, J., and Corben, B. (2016). Exploration of vehicle impact speed -- injury severity
relationships for application in safer road design. Transportation research procedia, 14, 4247-4256.
Ueyama, M. (1997). Effects of vehicular behavior at the pre-accident stage on decision-making at intersections without signals.
In Proceedings of the third international symposium on intersections without traffic signals, Portland, OR, July 21 -- 23, 303 --
309.
Mak, K., Sicking, D., and Zimmerman, K. (1998). Roadside safety analysis program: A cost-effectiveness analysis
procedure. Transportation Research Record: Journal of the Transportation Research Board, (1647), 67-74.
Archer, J., and Kosonen, I. (2000, September). The potential of micro-simulation modelling in relation to traffic safety
assessment. In Proceedings of the ESS Conference (pp. 427-443).
Erbsmehl, C. (2009). Simulation of real crashes as a method for estimating the potential benefits of advanced safety technologies.
In 21st International Technical Conference on the Enhanced Safety of Vehicles (ESV) National Highway Traffic Safety
AdministrationBundesministerium fuer Verkehr, Bau und Stadtentwicklung-BMVBS-(Federal Ministry of Transport, Building
and Urban Affairs) Bundesanstalt fuer Strassenwesen (BASt) (No. 09-0162).
Astarita, V., Guido, G., Vitale, A. and Giofré, V. (2012). A new microsimulation model for the evaluation of traffic safety
performances.
J. Barceló, J.L. Ferrer, and R. Grau, (1994) "AIMSUN2 and the GETRAM Simulation Environment", Internal Report,
Departamento de Estadistica e Investigacion Operativa. Universitad Politecnica de Catalunya.
PTV Planung Transport Verkehr AG, (2005) "VISSIM User Manual Version 4.10", PTV AG, Karlsruhe, Germany.
Mak, K. K., and Sicking, D. (2003). Roadside safety analysis program (RSAP): engineer's manual (Vol. 492). Transportation
Research Board.
Wang, J., Kong, Y., Fu, T., and Stipancic, J. (2017). The impact of vehicle moving violations and freeway traffic flow on crash
risk: An application of plugin development for microsimulation. PLoS one, 12(9), e0184564.
Knapp, K., Chandler, B., Atkinson, J., Welch, T., Rigdon, H., Retting, R., and Porter, R. J. (2014). Road Diet Informational
Guide (No. FHWA-SA-14-028).
Kachroo, P., and Sharma, A. (2018). Theory of safety surrogates using vehicle trajectories in macroscopic and microscopic
settings: application to dynamic message signs controlled traffic at work zones. Transportation research part C: emerging
technologies, 91, 62-76.
Gettman, D., and Head, L. (2003). Surrogate safety measures from traffic simulation models. Transportation Research Record:
Journal of the Transportation Research Board, (1840), 104-115.
Council, F., & Stewart, J. (1999). Safety effects of the conversion of rural two-lane to four-lane roadways based on cross-
sectional models. Transportation Research Record: Journal of the Transportation Research Board, (1665), 35-43.
Hauer, E., Council, F., & Mohammedshah, Y.
segments. Transportation Research Record: Journal of the Transportation Research Board, (1897), 96-105.
Dinu, R. R., & Veeraragavan, A. (2011). Random parameter models for accident prediction on two-lane undivided highways in
(2004). Safety models
for urban
four-lane undivided
road
India. Journal of safety research, 42(1), 39-42.
Park, J., & Abdel-Aty, M. (2015). Development of adjustment functions to assess combined safety effects of multiple treatments
on rural two-lane roadways. Accident Analysis & Prevention, 75, 310-319.
Abuzwidah, M., & Abdel-Aty, M. (2018). Crash risk analysis of different designs of toll plazas. Safety science, 107, 77-84.
Saad, M., Abdel-Aty, M., & Lee, J. (2018). Analysis of driving behavior at expressway toll plazas. Transportation Research Part
F: Traffic Psychology and Behaviour.
Stevanovic, A., Stevanovic, J., and Kergaye, C. (2013). Optimization of traffic signal timings based on surrogate measures of
safety. Transportation research part C: emerging technologies, 32, 159-178.
Killi, D. V. and Vedagiri, P. (2014). Proactive evaluation of traffic safety at an unsignalized intersection using micro-simulation.
Journal of Traffic and Logistics Engineering Vol, 2(2).
Shahdah, U., Saccomanno, F. and Persaud, B. (2015). Application of traffic microsimulation for evaluating safety performance
of urban signalized intersections. Transportation Research Part C: Emerging Technologies, 60, 96-104.
Zhang, G., Chen, J. and Zhao, J. (2017). Safety Performance Evaluation of a Three-Leg Unsignalized Intersection Using Traffic
Conflict Analysis. Mathematical Problems in Engineering, 2017.
Astarita et al. (2019). Surrogate Safety Measures from Traffic Simulation Models: a Comparison of different Models for
Intersection Safety Evaluation. Transportation Research Procedia.
Vittorio Astarita and Vincenzo Pasquale. Giofré
Wiedemann, R., (1991). Modelling of RTI-Elements on multi-lane roads. In Drive Conference (1991: Brussels, Belgium) (Vol.
Gipps, P. G., (1981). A behavioural car-following model for computer simulation. Transportation Research Part B:
Methodological, 15(2), 105-111.
2).
|
cs/9905005 | 1 | 9905 | 1999-05-10T22:20:40 | General Principles of Learning-Based Multi-Agent Systems | [
"cs.MA",
"nlin.AO",
"cond-mat.stat-mech",
"cs.DC",
"cs.LG",
"nlin.AO"
] | We consider the problem of how to design large decentralized multi-agent systems (MAS's) in an automated fashion, with little or no hand-tuning. Our approach has each agent run a reinforcement learning algorithm. This converts the problem into one of how to automatically set/update the reward functions for each of the agents so that the global goal is achieved. In particular we do not want the agents to ``work at cross-purposes'' as far as the global goal is concerned. We use the term artificial COllective INtelligence (COIN) to refer to systems that embody solutions to this problem. In this paper we present a summary of a mathematical framework for COINs. We then investigate the real-world applicability of the core concepts of that framework via two computer experiments: we show that our COINs perform near optimally in a difficult variant of Arthur's bar problem (and in particular avoid the tragedy of the commons for that problem), and we also illustrate optimal performance for our COINs in the leader-follower problem. | cs.MA | cs | GENERAL PRINCIPLES OF LEARNING-BASED MULTI-AGENT
SYSTEMS
David H. Wolpert
NASA Ames Research Center
Moffett Field, CA 94035
[email protected]
Kevin R. Wheeler
NASA Ames Research Center
Caelum Research
Moffett Field, CA 94035
[email protected]
Kagan Tumer
NASA Ames Research Center
Caelum Research
Moffett Field, CA 94035
[email protected]
August 13, 2011
ABSTRACT
4. Control of a large, distributed chemical plant.
We consider the problem of how to design large decentralized
multi-agent systems (MAS’s) in an automated fashion, with
little or no hand-tuning. Our approach has each agent run
a reinforcement learning algorithm. This converts the prob-
lem into one of how to automatically set/update the reward
functions for each of the agents so that the global goal is
achieved. In particular we do not want the agents to “work
at cross-purposes” as far as the global goal is concerned. We
use the term artificial COllective INtelligence (COIN) to re-
fer to systems that embody solutions to this problem. In this
paper we present a summary of a mathematical framework
for COINs. We then investigate the real-world applicability
of the core concepts of that framework via two computer ex-
periments: we show that our COINs perform near optimally
in a difficult variant of Arthur’s bar problem [1] (and in par-
ticular avoid the tragedy of the commons for that problem),
and we also illustrate optimal performance for our COINs in
the leader-follower problem.
1 INTRODUCTION
In this paper we are interested in computational problems
having the following characteristics:
• the agents each run reinforcement learning (RL) algo-
rithms;
• there is little to no centralized communication or control;
• there is a provided world utility function that rates the
possible histories of the full system.
There are many examples of such problems, some of the
more prominent being:
1. Designing a control system for constellations of com-
munication satellites or of constellations of planetary
exploration vehicles (world utility in the latter case
being some measure of quality of scientific data col-
lected);
2. Designing a control system for routing over a commu-
nication network (world utility being some aggregate
quality of service measure);
3. Construction of parallel algorithms for solving numer-
ical optimization problems (the optimization problem
itself constituting the world utility);
These kinds of problems may well be most readily ad-
dressed by using a large Multi-Agent System (MAS) [19],
where each agent is restricted to communicate with only a
few neighbors, and where each agent runs a Reinforcement
Learning (RL) algorithm. In such systems, a crucial problem
is ensuring that the agents’ RL algorithms do not “work at
cross-purposes”, so that their collective behavior maximizes
a provided global utility function. The difficulty in achiev-
ing this is that these systems have no centralized control, so
the dynamics is governed by the collective effects of the indi-
vidual agents each modifying their behavior via their (local)
RL algorithms.
We are interested in such systems where the agents are
“greedy” (i.e., there is no external structure forcing cooper-
ation). However, both the agents reward functions and the
overall system structure are automatically set and then up-
dated in a machine learning-like fashion, so as to facilitate
the achievement of the global ob jective.
As opposed to hand-tailored MAS design, these alter-
native approaches potentially have the following benefits:
one does not have to laboriously model the entire system;
global performance is “robust”; one can scale up to very
large systems; and one can maximally exploit the power of
machine learning. We use the term COllective INtelligence
(COIN) [21, 22, 23] to refer to either MAS’s designed in this
way, or (in the case of naturally occurring MAS’s) to MAS’s
investigated from this perspective.
The COIN framework is related to many other fields.
(See [21] for a detailed discussion of these relations, involv-
ing several hundred references.) Some of them are:
• multi-agent systems;
• computational economics;
• reinforcement learning for adaptive control;
• statistical mechanics;
• computational ecologies;
• game theory , in particular, evolutionary game theory.
Previous MAS’s most similar to a COIN include those where
agents use reinforcement learning [8, 13], and/or where
agents actively attempt to model the behavior of other
agents [14].
In this paper we introduce some of the concepts from
the COIN framework, and then present experiments test-
ing those concepts. The restricted version of the framework
presented here is not sufficient to formally guarantee opti-
mal global performance for all multi-agent systems. Rather
the experiments recounted below are designed to empirically
investigate the usefulness of these concepts in some illustra-
tive domains. In Section 2 we present general background
on COINs and the experiments we conducted. In Section 3,
we present the portion of the COIN framework investigated
in this paper. In Sections 4 and 5, we describe the bar and
leader-follower experiments, respectively, and how our ap-
proach deals with the many pitfalls encountered in each.
2 MOTIVATION AND BACKGROUND
A naturally occurring example of a system that can be
viewed as COIN is a human economy. For example, one
can take the agents to be the individuals trying to maximize
their personal rewards. One might then declare that the
world utility is a time average of the gross domestic prod-
uct. (“World utility” per se is not a construction internal
to a human economy, but rather something defined from
the outside.) To achieve high global utility it is necessary to
avoid having the agents work at cross-purposes lest phenom-
ena like the Tragedy of the Commons (TOC) occur, in which
individual avarice works to lower global utility [12]. One way
to avoid such phenomena is by modifying the agents’ util-
ity functions via punitive legislation. A real world example
of an attempt to make such a modification was the cration
of anti-trust regulations designed to prevent monopolistic
practices.
In designing a COIN we have more freedom than anti-
trust regulators though, in that there is no base-line “or-
ganic” local utility function over which we must superimpose
legislation-like incentives. Rather, the entire “psychology”
of the individual agents is at our disposal when designing a
COIN. This freedom is a ma jor strength of the COIN ap-
proach, in that it obviates the need for honesty-elicitation
mechanisms, like auctions, which form a central component
of conventional economics.
We recently investigated the use of the COIN approach
for distributed control of network packet routing [22]. Con-
ventional approaches to packet routing have each router run
a shortest path algorithm (SPA), i.e., each router routes its
packets in the way that it expects will get those packets to
their destinations most quickly. Unlike with a COIN, with
SPA-based routing the routers have no concern for the pos-
sible deleterious side-effects of their routing decisions on the
global goal (e.g., they have no concern for whether they in-
duce bottlenecks). We ran simulations that demonstrated
that a COIN-based routing system has better throughputs
than does an SPA-based system [22].
In this paper we present a more fine-grained investiga-
tion of our COIN methodology, in which we disentangle two
of the ma jor components of that methodology and exam-
ine the real-world usefulness of them separately. In the first
set of experiments we investigate how one might initialize
a COIN (i.e., initialize each agents’ local reward function)
to ensure that the agents do not work at cross purposes.
The problem we chose for this purpose is a more challenging
variant of Arthur’s bar attendance problem [1, 7, 17].
In
this problem, agents have to determine which night in the
week to attend a bar. The problem is set up so that if either
too few people attend (boring evening) or too many people
attend (crowded evening), the total enjoyment of the atten-
dees drops. Our goal is to design the reward functions of
the attendees so that the total enjoyment across all nights
is maximized. (This problem is similar to a number of prob-
lems arising in electronic commerce, where agents need to
select the “best” markets to trade their wares.)
In the second set of experiments we investigate how run-
time modification of agent utility functions and/or inter-
agent interactions can improve performance beyond that of
the initialized COIN. For this set of experiments we chose a
problem where certain “follower” agents mimic the activities
of other “leader” agents. The idea is to investigate a scenario
where actions that are beneficial to a particular agent have
deleterious global effects when copied by other agents.
3 COIN FRAMEWORK
As applied here, the COIN framework has three main com-
ponents:
1. The first component investigates various formaliza-
tions of the desideratum that whenever the local utility
functions increase, then so must the value of the world
utility. It implicitly defines equivalence classes of lo-
cal utility functions that meet those formalizations, for
allowed agent interactions of various types.
2. There is little explicit concern for the dynamical nature
of the COIN in this first component of the framework;
that dynamics is subsumed under the assumption that
the agents can achieve large values of their local utility
functions, via their RL learning. However due to that
dynamics it may be that the agents are all inadver-
tently “frustrating” each other, so that none of them
can achieve large values of their local utility functions.
The second component of the COIN framework ad-
dresses this problem by means of further restrictions
(beyond those of the first component) on the allowed
set of local utility functions. We call the design of a
system’s local utility functions using the two compo-
nents of the COIN framework the COIN initialization
of that system.
3. Successful COIN initialization ensures that if the
agents in the system achieve large values of their local
utility functions, then the world utility is also large.
However due to uncertainties in the type of the agent
interactions, in the real world the local utility func-
tions set in the COIN initialization are usually only a
good first guess. The third component of the COIN
framework addresses this issue by modifying the local
utility functions at run-time based on localized sta-
tistical information. We call this modifying process
macrolearning. In contrast, we call the reinforcement
learning that agents perform to optimize their local
reward microlearning.
In this paper we consider the state of the system across
a set of discrete, consecutive time steps, t ∈ {0, 1, ...}. With-
out loss of generality, we let all relevant characteristics of an
agent at time t — including its internal parameters at that
time as well as its externally visible actions — be encapsu-
. We call this the “state” of
lated by a Euclidean vector ζ
η ,t
agent η at time t, and let ζ be the state of all agents across
all time. World utility, G(ζ ), is a function of the state of
all agents across all time. Our goal as COIN designers is to
maximize world utility.
The following concepts and definitions form the core of
the COIN framework:
Subworlds: Subworlds are the sets making up an exhaus-
tive partition of all agents. For each subworld, ω , all agents
in that subworld have the same subworld utility function
gω (ζ ) as their local utility functions. Accordingly, consider
having each subworld be a set of agents that collectively have
the most effect on each other. In this situation, by and large,
agents cannot work at cross-purposes, since all agents that
affect each other substantially share the same local utility.
Constraint-alignment: Associated with subworlds is the
concept of a (perfectly) constraint-aligned system. That is a
system in which any change to the state of the agents in sub-
world ω at time 0 will have no effect on the states of agents
outside of ω at times later than 0.
Intuitively, a system
is constraint-aligned if no two agents in separate subworlds
affect each other, so that the rationale behind the use of
subworlds holds. (In the real world of course, systems are
rarely exactly constraint-aligned.)
Subworld-factored: A subworld-factored system is one
where for each subworld ω considered by itself, a change
at time 0 to the states of the agents in that subworld results
in an increased value for gω (ζ ) if and only if it results in an
increased value for G(ζ ). For a subworld-factored system,
the side effects on the rest of the system of ω ’s increasing its
own utility do not end up decreasing world utility. For these
systems, the separate agents successfully pursuing their sep-
arate goals do not frustrate each other as far as world utility
is concerned.
The definition of subworld-factored is carefully crafted.
In particular, it does not concern changes in the value of the
utility of subworlds other than the one changing its state.
It also does not concern changes to the states of agents in
more than one subworld at once. Indeed consider the fol-
lowing property: any change at time 0 to the entire system
that improves all subworld utilities simultaneously also im-
proves world utility. This might seem an appealing alter-
native desideratum to subworld-factoredness. However one
can construct examples of systems that obey this property
and yet quickly evolve to a minimum of world utility (for
example this is the case in the TOC).
It can be proven that for a subworld-factored system,
when each of the agents’ reinforcement learning algorithms
are performing as well as they can, given each others’ be-
havior, world utility is at a critical point. Correct global
behavior corresponds to learners reaching a Nash equilib-
rium [21]. There can be no tragedy of the commons for a
subworld-factored system.
Wonderful life utility: Let CLω (ζ ) be defined as the vec-
tor ζ modified by clamping the states of all agents in sub-
world ω , across all time, to an arbitrary fixed value, here
taken to be 0. The wonderful life subworld utility (WL) is:
gω (ζ ) ≡ G(ζ ) − G(CLω (ζ )) .
(1)
When the system is constraint-aligned, so that, loosely
speaking, subworld ω ’s “absence” would not affect the rest of
the system, we can view the WL utility as analogous to the
change in world utility that would have arisen if subworld
ω “had never existed”.
(Hence the name of this utility -
cf. the Frank Capra movie.) Note however, that CL is a
purely mathematical operation.
Indeed, no assumption is
even being made that CLω (ζ ) is consistent with the dynam-
ics of the system. The succession of states the agents in ω
are clamped to in the definition of the WL utility need not
obey the dynamical laws of the system.
This dynamics-independence is a crucial strength of the
WL utility. It means that to evaluate the WL utility we do
not try to infer how the system would have evolved if all
agents in ω were set to 0 at time 0 and the system evolved
from there. So long as we know ζ extending over all time,
and so long as we know G, we know the value of WL utility.
This is true even if we know nothing of the dynamics of the
system.
Another crucial advantage of the WL utility arises from
the fact that in a COIN, each agent, by itself, is operating
in a large system of other agents, and therefore may expe-
rience difficulty discerning the effects of its actions on its
utility. Very often this problem is obviated by using the WL
utility; the subtraction of the clamped term in the WL util-
ity removes some of the “noise” of the activity of agents in
other subworlds, leaving only the underlying “signal” of how
the agents in the subworld at hand affect the utility. This
makes it easier for the microlearning to improve the utility
of the agents in that subworld. When the system is subworld
factored, this property facilitates the improvement of world
utility. In many circumstances, this cancelling characteris-
tic of WL also ensures that the utility functions obey the
applicable a priori locality restrictions on communications
among agents.
The experiments in this paper revolve around the follow-
ing fact: a constraint-aligned system with wonderful life sub-
world utilities is subworld-factored. Combining this with our
previous result that subworld-factored systems are at equi-
librium at critical points of world utility, this result leads us
to expect that a constraint-aligned system using WL utili-
ties in the microlearning will approach near-optimal values
of the world utility.
No such assurances accrue to WL utilities if the system is
not constraint-aligned however. Accordingly our first set of
experiments investigates how well a particular system per-
forms when WL utilities are used but little attention is paid
to ensuring that the system is constraint-aligned. Our sec-
ond set of experiments then focus on a macrolearning algo-
rithm that modifies subworld memberships dynamically, so
as to increase the degree of constraint-alignment, all while
using WL local utility functions.
4 BAR PROBLEM
4.1 EXPERIMENTAL METHOD
We conducted two sets of experiments to investigate the
COIN framework. The first set is a variant of Brian Arthur’s
bar-attendance model [1]. Since we are not interested here
in directly comparing our results to those in [1, 13], we use a
more conventional (and arguably “dumber”) reinforcement
learning algorithm than the ones investigated in [1, 13].
There are N agents, each of whom picks one of seven
nights to attend a bar the following week, a process that
is then repeated.
In each week, each agent uses its own
reinforcement learning (RL) algorithm to decide which night
to attend to maximize its utility.
The world utility is of the form:
G(ζ ) = X
t
7
X
k=1
γk (xk (ζ , t))
where “xj (ζ , t)” means the j ’th component of x(ζ , t)
which is
the
attendance
on night
j
at week t;
γk (y ) ≡ αk y exp (−y/c); c and each of the {αk } are real-
valued parameters. Intuitively, this world utility is the sum
of the world “rewards” for each night in each week.
This G is chosen to reflect the effects in the bar as the
attendance profile of agents changes. In the case when there
are too few agents, the bar suffers from lack of activity and
therefore the world utility should be low. Conversely, when
there are too many agents the bar becomes overcrowded and
the rewards should also be low. Note that γk (·) reaches its
maximum when its argument equals c.
The α’s are used to weight the importance of differ-
ent nights. Two different choices of the {αk } are investi-
gated. One treated attendance on all of the nights equally,
e
c
n
a
m
r
o
f
r
e
P
e
g
a
r
e
v
A
16
14
12
10
8
6
4
2
0
0
250
500
Weeks
750
1000
e
c
n
a
m
r
o
f
r
e
P
e
g
a
r
e
v
A
16
14
12
10
8
6
4
2
0
0
250
500
Weeks
750
1000
Figure 1: Average performance when α = [0 0 0 7 0 0 0] (left) and when α = [1 1 1 1 1 1 1] (right). In both the top curve
is WL, middle is GR, and bottom is UD.
α = [1 1 1 1 1 1 1]. The other is only concerned with the
attendance on one night of the week, α = [0 0 0 7 0 0 0]. In
our experiments, c was 6 and N is chosen to be significantly
larger (4 times) than the number of agents necessary to have
c agents attend the bar on each of the seven nights, resulting
in 168 agents.
As explicated below, our microlearning algorithms
worked by providing a real-valued “reward” signal to each
agent at each week t. Each agent’s reward function is a sur-
rogate for an associated utility function for that agent. The
difference between the two functions is that the reward func-
tion only reflects the state of the system at one moment in
time (and therefore is potentially observable), whereas the
utility function reflects the agent’s ultimate goal, and there-
fore can depend on the full history of that agent across time.
We investigated the following functions specifying the re-
wards at time t for each of the agents:
• Uniform Division Reward:
U D(dω (t), ζ , t) ≡ γdω (xdω (ζ , t))/xdω (ζ , t)
• Global Reward:
GR(dω (t), ζ , t) ≡
7
X
k=1
γk (xk (ζ , t))
• Wonderful Life Reward:
W L( dω (t), ζ , t) ≡
γk (xk (ζ , t)) −
7
7
X
X
k=1
k=1
γdω (xdω (ζ , t)) − γdω (xdω (CLω (ζ ), t))
γk (xk (CLω (ζ ), t)) =
where dω is the night selected by subworld ω . Note the dis-
tinction between utilities and rewards. For example, world
utility is the sum over all time of global reward.
The UD reward is considered a natural “naive” choice
of an agent’s reward function; the total reward on each
night gets uniformly divided among the agents attending
that night.
Providing the GR reward at time t to each agent is con-
sidered a reasonable way to provide that agent an approx-
imation to the value of world utility that would ensue if
the current policies of all the agents were henceforth frozen
to their current polices. This reward function results in all
agents receiving the same feedback information. For this re-
ward, the system is automatically subworld-factored. How-
ever, evaluation of this function requires centralized commu-
nication.
Similarly, the WL reward at time t is considered a reason-
able approximation to the WL utility. However, in contrast
to the GR reward, to evaluate its WL reward each agent only
needs to know the total attendance on the night it attended.
In addition, as indicated above, one would expect that with
the WL reward the microlearners can readily discern the
effects of their rewards on their utilities — something not
necessarily true if they use the GR reward.
Each agent is its own subworld. Each agent’s microlearn-
ing algorithm uses a seven dimensional Euclidean vector to
represent the expected reward for each night of the week.
At the end of each week, the component of this vector cor-
responding to the night attended is proportionally adjusted
towards the actual subworld reward just received. At the
beginning of each week, the agent picks the night to attend
using a Boltzmann distribution with energies given by the
components of the vector of expected rewards. A decaying
temperature is used to aid exploration in the early stage of
the process. The microlearning algorithms are set to use
the same parameters (i.e.
learning rate, Boltzmann tem-
perature, decay rates) for all three reward functions. This
learning algorithm is equivalent to Claus and Boutilier’s [8]
independent learner algorithm for multi-agent reinforcement
learning.
4.2 RESULTS
Figure 1 presents world reward values as a function of time
for the bar problem, averaged over 50 separate runs. Note
that world utility is the sum over time of world reward. We
present the performance for all three subworld reward func-
tions for both α = [1 1 1 1 1 1 1] and α = [0 0 0 7 0 0 0].
Systems using the WL reward converged to optimal per-
formance. This indicates that the bar problem is sufficiently
constraint-aligned so that interactions between subworlds
does not diminish performance. Presumably this is true
because the only interactions between subworlds occurred
indirectly, via the microlearning.
Moreover, since the WL reward is easier for the mi-
crolearners to exploit (see above), one would expect the con-
vergence using the WL reward to be far quicker than that
using the GR reward. The GR reward does eventually con-
verge to the global optimum. This is in agreement with the
results obtained by Crites [9] for the bank of elevators control
problem. However, when α = [0 0 0 7 0 0 0] the GR reward
converged in 1250 weeks. This is more than 4 times the con-
vergence time for the WL reward. When α = [1 1 1 1 1 1 1]
the GR reward took 6500 weeks to converge, which was more
than 30 times the time WL reward took to converge. This
slow convergence is a result of the reward signal being di-
luted by the large number of agents in the system.
In contrast to the behavior for reward functions based
on the COIN framework, use of the UD subworld reward
function results in very poor world reward values that dete-
riorated as the microlearning progressed. For the case where
world reward only depends on a single night, this is essen-
tially an instance of the tragedy of the commons; it is in
every agent’s interest to attend the same night, and their
doing this shrinks the world reward “pie” that must be di-
vided among all agents.
Taken together, these experiments demonstrate that the
initialization prescriptions of the COIN framework can result
in excellent global performance.
5 LEADER-FOLLOWER PROBLEM
5.1 EXPERIMENTAL METHOD
In the experiments recounted in the previous section the sys-
tem was sufficiently constraint-aligned for the WL reward
to result in optimal performance. The second set of ex-
periments involving leaders and followers also used WL re-
ward. These experiments investigated the use of macrolearn-
ing to make an initially non-aligned system more constraint-
aligned, and thereby improve the world utility. In this ex-
periment, macrolearning consists of changing the subworld
memberships of the agents.
In these experiments the bar problem is modified to in-
corporate constraints designed to frustrate WL subworld re-
ward. This is done by forcing the nights picked by some
agents (followers) to agree with those picked by other agents
(leaders). Each leader has two followers. The world utility is
the sum, over all leaders, of the values of a triply-indexed re-
ward matrix whose indices are the the nights that the leader
and his two followers attend:
G(ζ ) = X
X
i
t
Rli (t),f 1i (t),f 2i (t)
where li (t) is the night the ith leader attends, and f 1i (t)
and f 2i (t) are the nights attended by the followers of leader
i, in week t. The system’s dynamics is what restricts all
the members of each triple (li (t), f 1i (t), f 2i (t)) to equal the
night picked by leader i for week t. However, G and R are
defined for all possible triples, li (t), f 1i (t) and f 2i (t).
So in particular, R is defined for dynamically unrealiz-
able triples that arise in the clamping operation. Because
of this, for certain R’s there exists subworld memberships
such that the dynamics assures poor world utility when WL
rewards are used. This is precisely the type of problem that
macrolearning is designed to correct.
To investigate the efficacy of the macrolearning, two sets
of separate experiments were conducted. In the first one the
reward matrix R is chosen so that when leader and follower
agents are placed in separate subworlds, leaders maximiz-
ing their WL reward results in minimal world reward.
In
contrast to the bar problem experiments, in these experi-
ments, due to the coupling between leaders and followers,
having each agent be its own subworld would mean badly
violating constraint-alignment. (The idea is that by chang-
ing subworld memberships macrolearning can correct this
and thereby induce constraint-alignment.) In the second set
of experiments, rather than hand-crafting the worst-case re-
ward matrix, we investigate the efficacy of macrolearning for
a broader spectrum of reward matrices generated randomly.
For the worst-case reward matrix, the subworld mem-
bership that results in the most constraint-aligned system is
when a leader and associated followers belong to the same
subworld. The least constraint-alignment occurs when the
leader and associated followers are all in separate subworlds.
In addition to these two cases we also investigate random
subworld membership. We investigate all these cases both
with and without macrolearning, and with both worst case
and a full spectrum of random reward matrices. The mi-
crolearning in these experiments is the same as in the bar
problem. All leader-follower experiments use the WL sub-
world reward.
When macrolearning is used, it is implemented after the
microlearning has run for a specified number of weeks. The
macrolearning works by estimating the correlations between
the nights picked by the agents. This is done by examining
the attendances of the agents over the preceding weeks. The
agents estimated to be the most correlated with one another
are grouped into the same subworld, with the restriction that
the number of agents per subworld is always three.
5.2 RESULTS
Figure 2 presents performance averaged over 50 runs for
world reward as a function of weeks using the worst case re-
ward matrix. For comparison purposes, the top curve repre-
sents the case where the leaders and their followers are placed
in the same subworld so that there is perfect constraint-
alignment. The bottom curve represents the other extreme
where the leaders and their followers are placed in differ-
ent subworlds resulting in minimal constraint-alignment. In
both plots, the middle curve shows the performance of ran-
domly initialized subworlds with (right) and without (left)
macrolearning.
The performance for randomly assigned subworlds dif-
fers only slightly from that of having each agent be its own
subworld; both start with poor values of world reward that
deteriorates with time. However, when macrolearning is
performed on systems with initially random subworld as-
signments, the system quickly rectifies itself and converges
to optimal performance. This is reflected by the sudden
vertical jump through the middle of the right plot at 500
weeks, the point at which macrolearning changes the sub-
world memberships. This demonstrates that by changing
the subworld memberships macrolearning results in perfect
constraint-alignment, so that the WL subworld reward func-
tion quickly induces the maximal value of the world reward.
Figure 3 presents performance averaged over 50 runs for
world reward as a function of weeks using a spectrum of re-
ward matrices selected at random. The ordering of the plots
is exactly as in Figure 2. Macrolearning is applied at 2000
weeks, in the right plot. The simulations in Figure 3 were
lengthened from those in Figure 2 because the convergence
time are longer.
The macrolearning algorithm results in a transient degra-
dation in performance at 2000 weeks followed by convergence
to the optimal. Without macrolearning the system’s perfor-
mance no longer varies after 2000 weeks. Combined with
the results presented in Figure 2, these experiments demon-
strate that the COIN construction of macrolearning works
quite well.
e
c
n
a
m
r
o
f
r
e
P
e
g
a
r
e
v
A
0
-5
-10
-15
-20
-25
0
e
c
n
a
m
r
o
f
r
e
P
e
g
a
r
e
v
A
0
-5
-10
-15
-20
-25
0
250
500
Weeks
750
1000
250
500
Weeks
750
1000
Figure 2: Leader-follower problem with worst case reward matrix. In both plots the top curve represents perfect constraint-
alignment, the bottom curve represents minimal constraint-alignment, and the middle curves represent random subworlds
without (left) and with (right) macrolearning at 500 weeks.
e
c
n
a
m
r
o
f
r
e
P
e
g
a
r
e
v
A
0
-5
-10
-15
-20
-25
0
e
c
n
a
m
r
o
f
r
e
P
e
g
a
r
e
v
A
0
-5
-10
-15
-20
-25
0
1000
2000
Weeks
3000
4000
1000
2000
Weeks
3000
4000
Figure 3: Leader-follower problem for full spectrum reward matrices. The ordering of the plots is exactly as in Figure 3.
Macrolearning is applied at 2000 weeks, in the right plot.
6 CONCLUSION
For MAS’s to fulfill their full potential, even when used in
large systems having strong limitations on inter-agent inter-
actions and communication, a way is needed to automati-
cally configure/update the system to achieve the provided
global goal. One approach to this problem is to have each
agent run a reinforcement learning algorithm and then con-
figure/update the associated reward functions (and other
characteristics) of the agents so as to facilitate achievement
of the global goal. This is the central concept embodied in
COINs.
In this paper we presented a summary of (a portion of )
the mathematical framework of COINs. We then presented
two sets of experiments empirically validating the predic-
tions of that framework. The first set of experiments con-
sidered difficult variants of Arthur’s famous El Farol Bar
problem. These experiments showed that even when the
conditions required by the theorems of how to initialize a
COIN do not hold exactly, they often hold well enough so
that they can be applied with confidence. In those exper-
iments, the COINs quickly achieved optimal performance
despite the local nature of the information available to each
agent, and in particular the COINs automatically avoided
the tragedy of the commons that was designed into those
experiments. This was not true when the reward functions
were either set in a “naive” manner or were all set to equal
the global reward.
The second set of experiments considered leader-follower
problems that were hand-designed to cause maximal diffi-
culty for those COIN initialization theorems. These experi-
ments explicitly tested the run-time updating procedures of
the COIN framework for overcoming such initialization prob-
lems. Here, as expected, the initial performance of the COIN
was quite poor. However once the updating procedures were
brought online, performance quickly rose to optimal. Again,
this was in contrast to the case where the reward functions
were either set in a “naive” manner or were all set to equal
the global reward.
The conclusion of these experiments is that the prescrip-
tions of the COIN framework for how to configure a large
MAS often apply even when the exact conditions required
by the associated theorems do not hold. Moreover, in those
relatively unusual circumstances when the initialization pre-
scriptions of the COIN theorems do not result in optimal
global performance, the run-time updating component of the
framework can rectify the situation, so that optimal perfor-
mance is achieved.
Acknowledgments: The authors would like to thank Ann
Bell, Hal Duncan and Jeremy Frank for helpful discussions.
[19] S. Sen. Multi-Agent Learning: Papers from the 1997
AAAI Workshop (Technical Report WS-97-03. AAAI
Press, Menlo Park, CA, 1997.
[20] K. Sycara. Multiagent systems. AI Magazine, 19(2):79–
92, 1998.
[21] D. Wolpert and K. Tumer. An overview of collective
intelligence.
In J. M. Bradshaw, editor, Handbook of
Agent Technology. AAAI Press/MIT Press, 1999.
[22] D. Wolpert, K. Tumer, and J. Frank. Using collective in-
telligence to route internet traffic. In Advances in Neu-
ral Information Processing Systems - 11. MIT Press,
1999.
[23] D. Wolpert, K. Wheeler, and K. Tumer. Collective in-
telligence for distributed control. 1999. (pre-print).
REFERENCES
[1] W. B. Arthur. Complexity in economic theory: Induc-
tive reasoning and bounded rationality. The American
Economic Review, 84(2):406–411, May 1994.
[2] E. Baum. Manifesto for an evolutionary economics of
intelligence. In C. M. Bishop, editor, Neural Networks
and Machine Learning. Springer-Verlag, 1998.
[3] J. Berg and A. Engel. Matrix games, mixed strategies,
and statistical mechanics. preprint cond-mat/9809265,
1998.
[4] C. Boutilier, Y. Shoham, and M. P. Wellman. Editorial:
Economic principles of multi-agent systems. Artificial
Intel ligence Journal, 94:1–6, 1997.
[5] J. M. Bradshaw, editor. Software Agents. MIT Press,
1997.
[6] G. Caldarelli, M. Marsili, and Y. C. Zhang. A prototype
model of stock exchange. Europhys. Letters, 40:479–484,
1997.
[7] D. Challet and Y. C. Zhang. Emergence of cooperation
and organization in an evolutionary game. Physica A,
246(3-4):407, 1997.
[8] C. Claus and C. Boutilier. The dynamics of reinforce-
ment learning cooperative multiagent systems. In Pro-
ceedings of the Fifteenth National Conference on Arti-
ficial Intel ligence, pages 746–752, June 1998.
[9] R. H. Crites and A. G. Barto. Improving elevator per-
formance using reinforcement learning. In D. S. Touret-
zky, M. C. Mozer, and M. E. Hasselmo, editors, Ad-
vances in Neural Information Processing Systems - 8,
pages 1017–1023. MIT Press, 1996.
[10] D. Fudenberg and D. K. Levine. The Theory of Learning
in Games. MIT Press, Cambridge, MA, 1998.
[11] D. Fudenberg and J. Tirole. Game Theory. MIT Press,
Cambridge, MA, 1991.
[12] G. Hardin. The tragedy of the commons. Science,
162:1243–1248, 1968.
[13] J. Hu and M. P. Wellman. Multiagent reinforcement
learning: Theoretical framework and an algorithm. In
Proceedings of the Fifteenth International Conference
on Machine Learning, pages 242–250, June 1998.
[14] J. Hu and M. P. Wellman. Online learning about other
agents in a dynamic multiagent system. In Proceedings
of the Second International Conference on Autonomous
Agents, pages 239–246, May 1998.
[15] B. A. Hubermann and T. Hogg. The behavior of com-
putational ecologies.
In The Ecology of Computation,
pages 77–115. North-Holland, 1988.
[16] N. R. Jennigs, K. Sycara, and M. Wooldridge. A
roadmap of agent research and development. Au-
tonomous Agents and Multi-Agent Systems, 1:7–38,
1998.
[17] N. F. Johnson, S. Jarvis, R. Jonson, P. Cheung, Y. R.
Kwong, and P. M. Hui. Volatility and agent adaptability
in a self-organizing market. preprint cond-mat/9802177,
February 1998.
[18] T. Sandholm, K. Larson, M. Anderson, O. Shehory,
and F. Tohme. Anytime coalition structure genera-
tion with worst case guarantees. In Proceedings of the
Fifteenth National Conference on Artificial Intel ligence,
pages 46–53, 1998.
|
1902.07860 | 1 | 1902 | 2019-02-21T03:51:54 | Survivable Networks via UAV Swarms Guided by Decentralized Real-Time Evolutionary Computation | [
"cs.MA"
] | The survivable network concept refers to contexts where the wireless communication between ground agents needs to be maintained as much as possible at all times, regardless of any adverse conditions that may arise. In this paper we propose a nature-inspired approach to survivable networks, in which we bring together swarm intelligence and evolutionary computation. We use an on-line real-time Genetic Algorithm to optimize the movements of an UAV swarm towards maintaining communication between the ground agents. The proposed approach models the ground agents and the UAVs as boids-based swarms, and optimizes the movement of the UAVs using different instances of the GA running independently on each UAV. The UAV coordination mechanism is an implicit one, embedded in the fitness function of the Genetic Algorithm instances. The behaviors of the individual UAVs emerge into an aggregated optimization of the overall network survivability. The results show that the proposed approach is able to maintain satisfactory network survivability levels regardless of the ground agents' movements, including for cases as complex as random walks. | cs.MA | cs | Survivable Networks via UAV Swarms Guided by Decentralized
Real-Time Evolutionary Computation
School of Engineering and Information Technology
School of Engineering and Information Technology
George Leu
Jiangjun Tang
UNSW Canberra
Canberra, Australia
[email protected]
UNSW Canberra
Canberra, Australia
[email protected]
9
1
0
2
b
e
F
1
2
]
A
M
.
s
c
[
1
v
0
6
8
7
0
.
2
0
9
1
:
v
i
X
r
a
Abstract -- The survivable network concept refers to contexts
where the wireless communication between ground agents needs
to be maintained as much as possible at all times, regardless
of any adverse conditions that may arise. In this paper we
propose a nature-inspired approach to survivable networks, in
which we bring together swarm intelligence and evolutionary
computation. We use an on-line real-time Genetic Algorithm to
optimize the movements of an UAV swarm towards maintain-
ing communication between the ground agents. The proposed
approach models the ground agents and the UAVs as boids-
based swarms, and optimizes the movement of the UAVs using
different instances of the GA running independently on each UAV.
The UAV coordination mechanism is an implicit one, embedded
in the fitness function of the Genetic Algorithm instances. The
behaviors of the individual UAVs emerge into an aggregated
optimization of the overall network survivability. The results
show that the proposed approach is able to maintain satisfactory
network survivability levels regardless of the ground agents'
movements, including for cases as complex as random walks.
I. INTRODUCTION
In survivable networks domain there is currently a growing
interest to employ swarms of UAVs that act as relays for
maintaining wireless communication between the agents of
a ground swarm. Network survivability refers to the extent
to which the group of ground agents remains connected or
recovers from connectivity loss, when obstructions for the
wireless communication occur [1], [2]. These obstructions can
be actual physical obstacles (i.e. mountains, forests, buildings),
or, simply, the distance between the ground agents, which
naturally attenuates the radio signals. The use of UAVs,
especially rotary wing UAVs, as relays for the ground agents is
gaining great popularity at both theoretical and practical levels,
in application fields like search and rescue in disaster areas,
large scale farming operations, military operations, internet of
things, autonomous cars and transportation, and many others.
In such contexts, the UAVs continuously adjust their positions
to the movement pattern of the ground agents, so that the
ground communication is maintained as much as possible at
all times. The main challenges associated to the above are
related to the mobility models employed for implementing the
movement of the individual UAVs, and to the coordination
mechanisms available for the individual UAVs to perform well
collectively as a relay swarm [3].
In this paper, we use a nature-inspired approach that
combines swarm intelligence and evolutionary computation
to provide ground network survivability regardless of the
ground agents' movements. To address the challenges men-
tioned above, we propose an implementation of the UAVs'
mobility which is inspired from the classic boids model of
Reynolds [4]. The proposed model uses modified versions
of the two key concepts of the classic boids: the interaction
based on the concept of neighborhood, and the position update
rule based on the weighted sum of a set of primitive forces.
The modifications we propose are that the neighborhood is
network-based [5] instead of the classic vision-based [4], and
the update rule includes forces from outside the swarm, not
only from within. The influence from outside comes from
the ground agents, whose movements have to be tracked by
the UAVs. Further, to couple the proposed mobility model
to the survivable networks problem, we propose an on-line
real-time genetic algorithm that optimizes the weights in the
update rule towards maximizing the network survivability. The
genetic algorithm runs in multiple independent instances in
parallel (i.e. one instance on each UAV), and embeds in its
fitness function a network coverage metric. The way the fitness
function is defined contributes to addressing the coordination
challenge too. By attempting to maximize their individual
coverages,
the UAVs take individual quasi-greedy actions
which aggregate to form an implicit coordination mechanism
that maximizes the ground network connectivity (which is the
metric we use to evaluate the network survivability).
In addition to the main contributions mentioned above, we
also contribute to the mobility model of the ground agents,
which we implement using Reynold's classic boids, with no
modification of the key concepts. This leads to a dual boids-
based swarm with evolution view on survivable networks,
where the ground swarm operates independently to simulate a
certain mission in the field, and the airborne swarm operates
as a networked boids-based swarm with inputs from both air
and ground agents. This view offers two other benefits, which
are typically not found in the evolutionary swarm applications
related to survivable networks. The first benefit of considering
the dual swarm is that the number of parameters used to
model the system is overall very low, facilitating evolutionary
optimization approaches in general, and our proposed GA
in particular, to run in real-time. Thus, very complex non-
deterministic behaviors can be obtained by optimizing only a
very small number of weights, associated with the boids forces
that implement the swarm behavior. The second benefit, which
flows from the first one, is the scalability of the system. Due
to the small number of primitive forces typically involved by
boids-based swarms, the number of agents used in experiments
(both airborne and ground) is virtually irrelevant. Thus, very
large systems, with very complex behaviors can be investigated
with fairly low computational power required.
With the proposed approach, we perform experiments using
the swarm of ground agents in two contexts. First, the ground
agents operate as pure classic boids, and then as random
walkers. The former case implements a very general movement
pattern, while the latter implements no movement pattern
at all. Arguably, the less pattern exists in the movement of
the ground agents, the more difficult it is for the UAVs to
track them and provide network survivability. Thus, ideally,
it would be desired that the UAVs provide ground network
survivability regardless of the ground agents' movements (i.e.
with or without a coherent pattern). While that is not the
case in practice, we demonstrate in our experiments that the
proposed real-time GA, in conjunction with the boids-based
UAV mobility model, is able to provide very good results
for the boids-based ground movement and also satisfactory
results for the random walks. In summary, the results we obtain
offer convincing evidence that the methods employed ensure
network survivability for complex ground activity, including
good responsiveness to activities that have no pattern at all,
such as random walks.
II. BACKGROUND
Historically, the network survivability problems have been
first approached using ground relays, either fixed or mobile.
Later, high-altitude airborne relays like satellites and fixed-
wing aircraft have been used. However, both the ground and
the high-altitude approaches have substantial limitations in nu-
merous respects. The very first issue is their limited ability to
reach (or follow) the ground agents in difficult locations, such
as densely forested areas, densely built urban areas, indoors,
or underground; that is, a significant mobility issue. Other
limitations, which are equally important, are the difficulties in
scaling the systems, and also the technological complexity of
the hardware and communication technologies employed. This
has led to studies that involved very low number of agents,
where the very concept of swarms is not really applicable.
Typical scenarios in these studies implement very low scale
systems with 1 relay agent and 2 ground agents [6], [2],
few relay agents to support communication between a single
mobile ground agent and a fixed base station [7], or few relay
agents and few ground agents [8], [9], [10], [1].
More recently, the advances in drone technology allowed
the use in these contexts of miniaturized rotary-wing UAVs
(i.e. multicopter drones), which provide high mobility and
versatility at relatively low cost. This allowed for a wider
range of mobility models to be employed for the UAVs, which
in turn facilitated the investigation of a wider range of air-
ground systems. The mobility models employed by the UAVs
refer to the individual control and the group-level cooperation
mechanisms that allow the UAVs to find, either individually
or collectively, the optimal air trajectories/positions for maxi-
mizing the communication capabilities of the ground agents.
Early studies on mobility discussed models as simple as
random mobility [11], which later generated the more complex
concept of chaos enhanced mobility [12], [13], [14]. Other
studies proposed analytic and/or parametric approaches with
fixed pre-tuned parameters
[15], [8], [9], [16], [17], [10],
[18]. However, both these directions of research suffered from
limitations related to scalability.
More recently, various nature-inspired algorithms have been
used in the mobility models, such as ant colony pheromone-
based mobility [11], bat algorithms [19], or boids-based finite
state machines [8]. Evolutionary computation, which is of
particular interest for this paper, has been also employed in
various forms in UAV path planning and coordination. One
class of studies used evolution as standalone method for the
mobility, where evolutionary algorithms evolve parameters
of the controllers used in the individual UAVs [7]. These
studies do not account for the collective behavior of the
UAVs, that is, they apply only to individual agents, with no
coordination mechanisms in place. Another class of studies
employs evolutionary algorithms that contribute to both the
individual and group mobility of the UAVs [20], [21], [22].
One important issue of the evolutionary algorithms in these
contexts is their limited ability to operate on-line, in real-
time, due to the relatively slow convergence [23]. Thus, most
of the studies report off-line and/or centralised algorithms in
relation to the survivable networks domain. In [20] the authors
use a centralised Genetic Algorithm to evolve parameters
for the behavior of UAVs, where the behavior of the UAVs
is based on a small set of primitive individual actions and
transitions (5 possible actions and 11 transitions), however,
the coordination mechanism requires global knowledge, or
at least a persistent trace left in the environment by each
UAV. Lamont et. al [21] use a multi-objective evolutionary
algorithm that operates quasi locally, based on the pinning
concept from control theory. The objectives are related to the
cost of operation (distance distance traveled and amount of
climbing), and to the risk resulting from flying through difficult
areas. The solution set offers paths that provide the lowest cost
associated with a particular level of risk.
To alleviate the real-time operation issue, Particle Swarm
Optimization (PSO) methods have been proposed, or hybrid
methods that combine GAs and PSO. In [22], a comparison
between the two directions is discussed, where the authors
show that the speed of PSOs and GAs can vary greatly de-
pending on the type scenario they are employed for, however,
in most of the scenarios the PSO is faster, and therefore more
appropriate for real-time use. PSO's speed gain over GAs is
also reported by Tang et. al [23], who use a PSO method for
UAV coordination, and also by Duan et. al [24], who use a
hybrid PSO-GA for multi-UAV formation control.
In spite of the issue discussed above, the GA we propose
in this paper is fast enough to operate in real-time for the
scenarios considered, which include 4 UAVs and 100 ground
agents. While the GA itself is designed to operate in real-
time, and therefore is fast,
there is also the boids-based
mobility model we propose, which contributes to its speed
via the low number of parameters to be optimized. Another
contribution to the speed of the GA, and also to the scalability
of the system, is the level of integration we adopt for the
UAVs' and ground agents' behaviors. As far as we know,
there is no attempt in the current research to implement both
the ground agents and the UAVs using the same conceptual
model. The existing studies consider the airborne and ground
agents as separate groups, and as a result, their operation and
mobility are implemented using different conceptual models.
By considering the ground agents as a boids-based swarm
too, we integrate seamlessly the air-ground operation (i.e.
two boids-based swarms with slightly different settings of the
parameters). Thus, the parameters in the GA that come as
inputs from the ground swarm are only a few (i.e. 2), and
of exactly the same type as those corresponding to the UAV
swarm. The details of the proposed methodology are provided
below, in Section III.
connected network; there are two sub-networks where each
UAV acts as a relay for its own current local ground network.
The coverage is defined very straightforward, as the number
of ground agents covered by all UAVs.
(cid:90)
(cid:90)
III. METHDOLOGY
(a) A full coverage network
In this paper, we consider that the UAVs fly at a constant
low altitude that does not affect their communication with the
ground. Thus, the vertical distance between the UAVs and
ground level can be neglected from a networking perspective,
as there is no variation in communication conditions due to
altitude changes. For the ground agents, we consider that they
operate on a flat field with no obstacles. This means they can
move freely across the field, with the only restriction being
to avoid collisions with each-other. This type of environment
has been successfully used as a test-bed in other studies on
survivable networks [8], [20].
We model the swarming behaviours of the two types of
agents, airborne and ground, based on the classic boids model
of Reynolds [25], which means, all agents, airborne and
ground, are flocking boids. We use the two key concepts of
the original boids model, i.e. the neighborhood-based inter-
action and the three boids forces: cohesion, alignment, and
separation. However, we propose an enhanced version of these
concepts, and we enrich these concepts to suit our approach
to the survivable networks context.
In the following sections, we describe in detail the method-
ology used for implementing the ground and UAVs, with the
subsequent optimization algorithm, and the metrics used for
evaluating the network survivability.
A. Measuring Survivability
The ground network survivability can be measured using
to major concepts: coverage and connectivity. The coverage
refers to the number of ground agents situated within the
aggregated area that contains the communication range of
all UAVs, as shown in Figure 1a. In this case, the ground
agents covered by one of the UAVs can communicate between
them, but cannot communicate with those covered by the other
UAV. As a result, the ground agents do not form a complete
(cid:90)
(b) A full connected network
Fig. 1: Full coverage v.s. full connectivity, via two UAVs with
communication range R.
The connectivity refers to the situation when the agents are
able to communicate regardless of which UAVs' coverage they
belong to. Figure 1b illustrates a full connectivity case, where
a fully connected network is established when all UAVs are
close enough to be able to communicate between them, and
thus relay the communication between any ground agent. If the
ground swarm is fully connected, then it is also fully covered,
but not the vice-versa. The connectivity is typically modeled
based on the graph theoretical concept of connected network
component [26]. A connected component is a sub-graph where
any two nodes are connected to each other. Therefore, we
define the connectivity metric as the number of connected
components that exist at a moment in time within the swarm
of ground agents. Ideally, the connectivity should have the
value 1, which means there is only one sub-graph which is
equal to the entire network. In this case, the ground swarm is
fully connected via the UAVs (i.e it operates as an equivalent
full connected graph from a graph theory perspective). In
practice, less perfect cases are still acceptable, where there
are more than one connected components, but among them
one or several giant connected components [27] exist.
In this paper we use the connectivity as the main metric for
evaluating the ground network survivability, and we use the
coverage in the fitness function of the optimization algorithm.
While this may appear as an inconsistency, we demonstrate
that it is possible to use the coverage as the objective for
the optimization engine of each individual UAV, and obtain
a maximization of the connectivity at the swarm level. This
process actually implements an implicit coordination mecha-
nism embedded in the individual goals of the UAVs (this is
explained in detail in Section III-D).
B. Modelling the Ground Agents
The ground agents implement entirely the classic boids
model. They follow the three boids rules, which are applied as
a result of the influence received from their ground neighbors,
where the neighborhood is defined by agents' vision distance
vd and a vision angle vα. We recall that in survivable networks
contexts the ground agents operate in the field to accomplish
a certain task, and are not aware or concerned about the
existence of the airborne support. Thus, the movement of the
ground agents is not influenced by the UAVs. The three boids
forces (i.e vectors with magnitude and heading) applied to the
ground agents are described below.
a) Cohesion Force (C): describes the tendency of an
agent to move towards its neighbors' location, and is calculated
based on the centre of mass (average position) of all agents
in its neighborhood.
b) Alignment Force (A): shows the tendency of the agent
to align with the direction of movement of its neighbors, and is
calculated based on the average heading of all the neighbors.
c) Separation Force (S): expresses the tendency of
agents to steer away from their neighbours in order to avoid
crowding them or colliding with them. The agents need to keep
a minimum ground safe distance (SDG) from their neighbors.
Once the forces are calculated based on the neighbours
influence, the velocity V of a ground agent at time step t
is updated using the following equation:
V (t) = V (t − 1) + WC · C(t) + WA · A(t) + WS · S(t) (1)
where WC , WA, and WS are weights corresponding to the
cohesion, alignment, and separation forces. The weights are
constant for the ground agents, since their behavior is fixed
(i.e. they perform a certain task). Based on the velocity update,
the position P of a ground agent at time step t can be updated
as follows:
approach in the most general case, when the ground agents
have no movement pattern at all. In the context of boids-
based swarming, a random walk movement equates with a
swarm in which the cohesion and alignment forces do not
exist. However, the agents still need to keep the safe distance
from neighbours; hence, the separation force is still applied.
C. Modelling the UAVs
The UAVs form another boid-based swarm, which embeds
the three classic boids forces showing the influence from
the neighboring UAVs, and two other additional forces that
represent the influence from the neighboring ground agents.
Unlike the classic boids model, for the UAVs the neighborhood
is not defined by vision, instead we use an omnidirectional
communication range R. We recall that the purpose in surviv-
able networks is for the UAVs to move according to the ground
agents' movement, so that they facilitate communication. This
means, they tend to follow/track the ground agents in order
to provide the network relay service. Thus, we consider
that an UAV is influenced by the movement of the ground
agents situated in its neighborhood (i.e. communication range)
through the cohesion and alignment forces. The separation
force is not applied, since there is never a risk of collision
between a ground and an UAV.
The three classic forces applied between UAVs are defined
just like the ones for the ground agents, that is, according to
the original study of Reynolds [4]. The other two forces, cor-
responding to the influence from ground agents, are described
below.
a) Air-Ground Cohesion Force(CAG): All ground agents
situated within the communication range R of an UAV Ai form
the set of ground neighbors NG of that UAV. Each ground
neighbor gj ∈ NG satisfies dist(Ai, Gj) < R. Then, the air-
ground cohesion force CAGi applied to UAV Ai at time t can
be derived from the position of its ground neighbours as in
Equation 3.
CAGi = PNG
j=0 PGj
NG
− PAi for each Gi ∈ NG
(3)
where, NG is the cardinality of NG, P is the position of an
agent.
b) Air-Ground Alignment Force (AAG): The air
to
ground alignment force (AAGi ) of an UAV Ai at time t is
derived from the velocities of all its ground neighbors NG as
in Equation 4.
AGAi = PNG
j=0 VGj
NG
− VAi with i 6= j
(4)
where NG is the cardinality of NG, and V is the velocity of
an agent.
Once all five forces are calculated, the velocity VAi (t) of
P (t) = P (t − 1) + V (t)
(2)
each UAV Ai is updated as follows:
In addition to the boids-based swarming behaviour, we also
consider the case when the ground agents move at random.
This allows us to investigate the performance of our proposed
VAi (t) =VAi (t − 1)+
+ WCA CAi (t) + WAA AAi(t) + WSA SAi(t)
+ WCAG CAGi (t) + WAAG AAGi(t)
(5)
where W s denote the weights of the forces in the update rule.
Then, the position PAi at time t of each UAV Ai can be
updated as in Equation 6.
PAi(t) = PAi(t − 1) + VAi (t)
(6)
The rules considered above for the UAVs allow them to
move according to a boids-based swarming behavior, where
the behavior is guided by the interaction with both airborne
and ground agents. However, the swarm behavior alone does
not guarantee optimal connectivity services for the ground
agents. Unlike the ground agents, the force weights of the
UAVs are not constant, since their movement need to adapt
comtinuously to the ground activity. Therefore, an optimiza-
tion of the force weights at each time step is needed in order
to achieve the best connectivity for the ground agents. The
optimization algorithm is described in detail in Section III-D.
D. A Decentralized Real-Time Genetic Algorithm
In this paper, we propose an decentralized real-time genetic
algorithm as optimization method for the UAVs' movement.
We mentioned above that
the force weights need to be
optimized. This can be done in two ways. One way is to
optimize the weights in the same way for all UAVs. This
means that at each time step, the current optimal set of weights
is used by all agents. This is similar to employing a centralized
optimization for the whole swarm. We are interested to make
the UAVs individually adaptive, therefore each UAV runs its
own optimization engine to obtain its own set of optimal
weights at each time step. Thus, each UAV attempts to
optimize independently its own five force weights plus the
speed, with the purpose of providing better connectivity to
the ground agents. In this case, a coordination mechanism is
also required. Our approach is that an explicit coordination
mechanism is not needed, instead, the way we define the
fitness function of each individual agent leads to an implicit
coordination capability.
Figure 2 illustrates how each UAV has its own optimization
engine, which relies on a population of chromosomes. At each
time step, only one chromosome is active, representing a valid
decision in the simulation; all other chromosomes represent
shadow agents, which are evolved in the GA but do not take
effect in simulation. The structure of the chromosomes is
the same for all UAVs, i.e. they are vectors with 6 compo-
nents s, WGA, WGC , WAA, WAC , WAS, where W s are force
weights and s is the speed. The value ranges for the genes in
the chromososes are as follows. The speed of an UAV can vary
from 0 (hovering) to 5. The separation weight needs to be high
in order to maintain safety. Hence, it can take values between
0.5 and 2. All other weights (i.e. WGA, WGC , WAA, WAC )
can take values from 0 to 0.5.
Ideally, each UAV would run the GA at each time step;
however, a certain time is needed for the evolution to reach
meaningful results. For this reason the agents run the GA
every t′ time steps instead of every time step. This means
that the GAs run in time windows of duration t′, where the
duration is the stopping condition. This affects the quality
of the optimal solution at each run, but ensures that overall
throughout the swarm simulation, the aggregated optimization
process runs virtually real-time. The use of GAs in time
windows also allows a past/historical period of duration t′,
as well as a future/prediction period of duration t′ to be used
for optimization as part of the fitness function. This will be
explained below.
Consider an arbitrary agent and an arbitrary time window
within the swarm simulation timeline. The agent starts running
a GA. In the beginning of the GA, a population of chro-
mosomes is randomly generated within the ranges discussed
earlier. One chromosome is selected randomly (illustrated in
Figure 2 as coloured rows) to be an active chromosome.
The active chromosome will be used in the actual swarm
simulation, and the speed and force weights will be applied
in simulation to produce actual position updates. All other
chromosomes represent shadow agents, which update their
virtual positions accordingly, but
these positions will not
reflect in the actual simulation. The shadow chromosomes have
their fitness evaluated, a tournament selection with elitism is
performed, and one point crossover and mutation are applied
for producing the next generation. Then, the best solution
among the current population is chosen to become the active
agent, and its updates take effect in simulation, while the rest
of the chromosomes continue to operate as shadows. The pro-
cess ends when the time window ends, and the current active
chromosome takes effect in the simulation; i.e. it represents
the decision of the agent.
The fitness function used in our GA is built upon the
number of ground agents covered by an aerial agent and
its neighbouring aerial agents (i.e. one hop airborne network
links), with the consideration of both historic and predicted
states.
F =
t
X
k=t−t′
NG(k) + NG(t + t′)
(7)
where NG is the total number of ground agents covered by an
UAV and its neighbouring UAVs, calculated as below:
NG(t) = N (t) +
NA
X
i=1
Ni(t)
(8)
This fitness function considers the local coverage and the
intermediate connected UAVs' coverage. It does not consider
any indirectly connected UAVs' coverage, in order to save
network bandwidth and computation cost. The GA aims to
maximize the fitness; this means, to increase the local cov-
erage as well as the number of neighbouring connections for
establishing better connectivity.
IV. EXPERIMENTS AND RESULTS
A. Experimental Setup
The size of the environment is 1000 × 1000 units. In the
environment operate 100 ground agents and 4 UAVs for a
duration of 22000 time steps. The ground agents are initialized
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:857)(cid:857)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:857)(cid:857)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:857)(cid:857)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:1845) (cid:1849)(cid:2163)(cid:2157) (cid:1849)(cid:2163)(cid:2159) (cid:1849)(cid:2157)(cid:2157) (cid:1849)(cid:2157)(cid:2159) (cid:1849)(cid:2157)(cid:2175)
(cid:857)(cid:857)
Fig. 2: Chromosomes of each UAV in the Decentralized GA. Triangles are UAVs; squares are ground agents
with random positions. The UAVs are initialized to form a
300 × 300 units square situated in the center of the environ-
ment, which means, a fully connected airborne network. There
are a total of 30 random number generator seeds for initialing
the ground agents in our experiments. Along with each ground
agents initialization, each UAV initializes 50 chromosomes
randomly (the size of the population in the GA) and then runs
the GA repeatedly in t′ time windows. Therefore, there are
total 30 runs for each scenario, to ensure statistical validity of
the algorithm.
As mentioned earlier in the paper, two scenarios are used
for the ground agents behavior to evaluate the proposed
decentralized approach: classic boids and random walk. The
parameter setting for each of the scenarios is listed in Table I.
TABLE I: Two ground movement patterns, implemented via
various force weights applied to ground agents.
Scenarios
Classic Boids (CB)
Random Walk (RW)
Cohesion
0.01
N/A
Alignment
0.125
N/A
Separation
1
1
The neighborhood for the ground agents is defined by vd =
30 units, and vα = 360 degrees. The neigborhood for the
UAVs is defined by the radius of coverage, which has the
constant value R = 300.
B. Discussion of Results
The first set of results, illustrated in Figure 3, shows the
connectivity of the ground agents over time in the best cases,
from both scenarios. It can be seen that, by using the proposed
optimization algorithm, the swarm of UAVs is able to maintain
high connectivity, i.e. there are very few disconnected network
components. This results in very good survivability, with the
number of connected components equal or close to equal to
1 most of the time in the boids case, and lower than 20 for
the random walks case. Another aspect that can be observed
in the boids case, is that from time to time there are spikes
that show lower survivability. This is due to a bounce-back
boundary condition, where agents reflect from the boundary
Boids
Boids Avg.
Random Walk
Random Walk Avg.
50
40
30
20
10
s
t
n
e
n
o
p
m
o
c
d
e
t
c
e
n
n
o
c
0
0
0.5
1
time step
1.5
2
104
Fig. 3: Connectivity comparison between boids and random
walk
of the environment. The bounce-back movement breaks the
swarm behavior for a short period of time until the ground
agents regroup in a new swarm formation. This shows that the
proposed algorithm is able to recover from a large connectivity
loss, and quickly provide high survivability for the newly
formed swarm. The bounce-back movement has no visible
effect in the case of random walks, since there is no movement
pattern anyway.
Further, we are interested to see what is the amount of time
a certain level of survivability is ensured, since the previous
set of results did not show this very clearly. For the same sim-
ulation, i.e. the one with the best survivability results, we show
in Figure 4 the percentage of time a certain connectivity was
achieved. This is a remapping of the information presented in
Figure 3, to show a time summary of the connectivity measure.
It can be seen that in the boids scenario the connectivity value
is 1 for more than 50% of the time, which means the ground
network is fully connected. For the random walk scenario, the
graph shows lower, but still acceptable level of performance.
The previous results showed the connectivity, which is
measured as the number of connected components. However,
Sub net 1
Sub net 2
Sub net 3
Individual Agents
100
80
60
40
20
s
t
n
e
g
a
f
o
m
u
n
(a) Boids
0
0
0.5
1
time step
1.5
2
104
(a) Boids
Sub net 1
Sub net 2
Sub net 3
Individual Agents
100
80
60
40
20
s
t
n
e
g
a
f
o
m
u
n
(b) Random walk
Fig. 4: The frequency of connect components from the best
runs of boids and random walk
0
0
0.5
1
time step
1.5
2
104
(b) Random walk
they do not show the size of the connected components. Thus,
for example, if a connectivity of 2 has been achieved, the two
connected components may consist of 50-50 nodes, or they
may consist of 95-5 nodes. The two examples are significantly
different, with an obvious advantage of the latter case. Thus,
the strength of the proposed approach may be overshadowed
by this aspect, and the results shown in the previous figures
may lead to the conclusion that the results are not a substantial
achievement. We investigate this aspect by calculating the size
of the largest three connected components, for the best runs.
The results shown in Figure 5 are convincing. It can be seen
that the largest component contains over 70 nodes even in the
random walk scenario, while in the boids scenario it contains
most of the time over 90 nodes.
To further clarify what "most of the time" means, we show
in Figure 6a the amount of time (as percentage of the total
simulation time) certain numbers of nodes are part of the
largest connected component, in the best simulation run. This
is in essence the same information presented in Figure 6 for
the largest component, remapped as a time summary. It can
be seen, especially in the boids scenario, that over 40% of
the simulation time the largest component contains all the
nodes, i.e. all the ground agents. However, the results are
acceptable even in the random walk scenario, where the largest
component contains over 70 nodes for more than 50% of the
time.
Fig. 5: The number of agents in TOP 3 largest sub-networks
- from the best simulation run
V. CONCLUSIONS
In this paper, we presented a nature-inspired approach to
network survivability, which combines swarm intelligence and
evolutionary computation. The proposed approach models the
ground agents and the UAVs as a dual air-ground swarm
that uses boids-like rules, and optimizes the movement of the
UAVs using a decentralized real-time genetic algorithm. The
proposed approach provides seamless integration of the ground
and air swarms of agents, while also facilitating scalability and
airborne responsivity to complex general ground behaviors.
The results obtained in simulations demonstrate that the
mobility model used for the UAVs, and the associated evolu-
tionary optimization algorithm are able to provide good levels
of network survivability for complex ground movements,
including the case of no movement pattern.
We believe that
the conceptual approach presented in
this work can be successfully extended to a large variety
of scenarios. In this paper we only used the three classic
forces (cohesion, alignment and separation) that govern the
emergence of swarming. However, numerous other behaviors
(with their subsequent forces) can be investigated, such as
leader following, flow field following, path following, obstacle
avoidance, and many others. To the proposed approach more
forces can be easily added, since the mobility model and the
[9] K. Hui, P. Pourbeik, P. George, D. Phillips, S. Magrath, and
M. Kwiatkowski, "Opal - a survivability-oriented approach to manage-
ment of tactical military networks," in 2011 - MILCOM 2011 Military
Communications Conference, Nov 2011, pp. 1127 -- 1132.
[10] Y. Zhou, N. Cheng, N. Lu, and X. S. Shen, "Multi-uav-aided networks:
Aerial-ground cooperative vehicular networking architecture," IEEE
Vehicular Technology Magazine, vol. 10, no. 4, pp. 36 -- 44, Dec 2015.
[11] E. Kuiper and S. Nadjm-Tehrani, "Mobility models for uav group recon-
naissance applications," in 2006 International Conference on Wireless
and Mobile Communications (ICWMC'06), July 2006, pp. 33 -- 33.
[12] M. Rosalie, G. Danoy, S. Chaumette, and P. Bouvry, "From random
in swarms of uavs," in Proceedings
process to chaotic behavior
of
the 6th ACM Symposium on Development and Analysis of
Intelligent Vehicular Networks and Applications, ser. DIVANet '16.
New York, NY, USA: ACM, 2016, pp. 9 -- 15. [Online]. Available:
http://doi.acm.org/10.1145/2989275.2989281
[13] M. Rosalie, M. Brust, G. Danoy, S. Chaumette, and P. Bouvry., "Cover-
age optimization with connectivity preservation for uav swarms applying
chaotic dynamics." in IEEE International Conference on Autonomic
Computing (ICAC2017), July 2017, pp. 113 -- 118.
[14] M. Rosalie, G. Danoy, S. Chaumette, and P. Bouvry, "Chaos-enhanced
mobility models for multilevel swarms of uavs," Swarm and Evolution-
ary Computation, vol. 41, pp. 36 -- 48, 2018.
[15] K. Kar and S. Banerjee, "Node Placement for Connected Coverage in
Sensor Networks," WiOpt'03: Modeling and Optimization in Mobile,
Ad Hoc and Wireless Networks, p. 2 pages, Mar. 2003, poster.
[Online]. Available: https://hal.inria.fr/inria-00466114
[16] O. Cetin and I. Zagli, "Continuous airborne communication relay
approach using unmanned aerial vehicles," Journal of Intelligent &
Robotic Systems, vol. 65, no. 1, pp. 549 -- 562, Jan 2012.
[17] N. Goddemeier, K. Daniel, and C. Wietfeld, "Role-based connectivity
management with realistic air-to-ground channels for cooperative uavs,"
IEEE Journal on Selected Areas in Communications, vol. 30, no. 5, pp.
951 -- 963, June 2012.
[18] S. Zhang, H. Zhang, Q. He, K. Bian, and L. Song, "Joint trajectory
and power optimization for uav relay networks," IEEE Communications
Letters, vol. 22, no. 1, pp. 161 -- 164, Jan 2018.
[19] P. Suarez, A. Iglesias, and A. Galvez, "Make robots be bats: special-
izing robotic swarms to the bat algorithm," Swarm and Evolutionary
Computation, 2018.
[20] P. Gaudiano, E. Bonabeau, and B. Shargel, "Evolving behaviors for a
swarm of unmanned air vehicles," in Proceedings 2005 IEEE Swarm
Intelligence Symposium, 2005. SIS 2005., June 2005, pp. 317 -- 324.
[21] G. B. Lamont, J. N. Slear, and K. Melendez, "Uav swarm mission
planning and routing using multi-objective evolutionary algorithms," in
2007 IEEE Symposium on Computational Intelligence in Multi-Criteria
Decision-Making, April 2007, pp. 10 -- 20.
[22] V. Roberge, M. Tarbouchi, and G. Labonte, "Comparison of parallel
genetic algorithm and particle swarm optimization for real-time uav path
planning," IEEE Transactions on Industrial Informatics, vol. 9, no. 1,
pp. 132 -- 141, Feb 2013.
[23] Y. Tang, H. Gao, J. Kurths, and J. Fang, "Evolutionary pinning control
and its application in uav coordination," IEEE Transactions on Industrial
Informatics, vol. 8, no. 4, pp. 828 -- 838, Nov 2012.
[24] H. Duan, Q. Luo, Y. Shi, and G. Ma, "?hybrid particle swarm opti-
mization and genetic algorithm for multi-uav formation reconfiguration,"
IEEE Computational Intelligence Magazine, vol. 8, no. 3, pp. 16 -- 27,
Aug 2013.
[25] C. W. Reynolds, "Flocks, herds and schools: A distributed behavioral
model," SIGGRAPH Comput. Graph., vol. 21, no. 4, pp. 25 -- 34, Aug.
1987.
[26] R. Albert and A.-L. Barab´asi, "Statistical mechanics of complex net-
works," Rev. Mod. Phys., vol. 74, pp. 47 -- 97, Jan 2002.
[27] M. E. J. Newman, "Assortative mixing in networks," Phys. Rev. Lett.,
vol. 89, p. 208701, Oct 2002.
(a) Boids
(b) Random walk
Fig. 6: The number of agents over time (percentage) in the
largest sub-network - from the best simulation run
optimization algorithm depend mainly on the weights of these
forces. Therefore, the approach is both size-wise and context-
wise scalable.
REFERENCES
[1] R. Hunjet, T. Stevens, M. Elliot, B. Fraser, and P. George, "Survivable
communications and autonomous delivery service a generic swarming
framework enabling communications in contested environments," in
MILCOM 2017 - 2017 IEEE Military Communications Conference
(MILCOM), Oct 2017, pp. 788 -- 793.
[2] K. Hui, D. Phillips, and A. Kekirigoda, "Beyond line-of-sight range
extension with opal using autonomous unmanned aerial vehicles," in
MILCOM 2017 - 2017 IEEE Military Communications Conference
(MILCOM), Oct 2017, pp. 279 -- 284.
[3] Y. Zeng, R. Zhang, and T. J. Lim, "Wireless communications with
unmanned aerial vehicles: opportunities and challenges," IEEE Com-
munications Magazine, vol. 54, no. 5, pp. 36 -- 42, May 2016.
[4] C. W. Reynolds, "Flocks, herds and schools: A distributed behavioral
model," in ACM SIGGRAPH computer graphics, vol. 21, no. 4. ACM,
1987, pp. 25 -- 34.
[5] J. Tang, G. Leu, and H. A. Abbass, "Networking the boids is more robust
against adversarial learning," IEEE Transactions on Network Science and
Engineering, vol. 5, no. 2, pp. 141 -- 155, April 2018.
[6] M. Elliot and T. Stevens, "Dynamic range extension using harlequin
and hail," in MILCOM 2016 - 2016 IEEE Military Communications
Conference, Nov 2016, pp. 835 -- 841.
[7] S. Hauert, J.-C. Zufferey, and D. Floreano, "Evolved swarming without
positioning information: an application in aerial communication relay,"
Autonomous Robots, vol. 26, no. 1, pp. 21 -- 32, Jan 2009.
[8] P. Basu, J. Redi, and V. Shurbanov, "Coordinated flocking of uavs for
improved connectivity of mobile ground nodes," in IEEE MILCOM
2004. Military Communications Conference, 2004., vol. 3, Oct 2004,
pp. 1628 -- 1634 Vol. 3.
|
1903.09658 | 2 | 1903 | 2019-08-05T22:38:56 | A Hybrid Approach to Persistent Coverage in Stochastic Environments | [
"cs.MA"
] | This paper considers the persistent coverage of a 2-D manifold that has been embedded in 3-D space. The manifold is subject to continual impact by intruders which travel at constant velocities along arbitrarily oriented straight-line trajectories. The trajectories of intruders are estimated online with an extended Kalman filter and their predicted impact points contribute normally distributed decay terms to the coverage level. A formal hybrid control strategy is presented that allows for power-constrained 3-D free-flyer agents to persistently monitor the domain, track and intercept intruders, and periodically deploy from and return to a single charging station on the manifold. Guarantees on intruder interception with respect to agent power lifespans are formally proven. The efficacy of the algorithm is demonstrated through simulation. | cs.MA | cs |
A Hybrid Approach to Persistent Coverage in Stochastic
Environments (cid:63)
William Bentz a, Dimitra Panagou a
aDepartment of Aerospace Engineering, University of Michigan, 1320 Beal Ave, Ann Arbor, MI, 48109, USA
Abstract
This paper considers the persistent coverage of a 2-D manifold that has been embedded in 3-D space. The manifold is subject
to continual impact by intruders which travel at constant velocities along arbitrarily oriented straight-line trajectories. The
trajectories of intruders are estimated online with an extended Kalman filter and their predicted impact points contribute
normally distributed decay terms to the coverage level. A formal hybrid control strategy is presented that allows for power-
constrained 3-D free-flyer agents to persistently monitor the domain, track and intercept intruders, and periodically deploy
from and return to a single charging station on the manifold. Guarantees on intruder interception with respect to agent power
lifespans are formally proven. The efficacy of the algorithm is demonstrated through simulation.
Key words: Coverage Control; Collision avoidance; Autonomous mobile robots; Cooperative control; Multi-agent systems .
1 Introduction
1.1 Background
The advent of inexpensive autonomous research plat-
forms has spurred recent interest in teams of mobile
sensors collaborating on complex surveillance and mon-
itoring tasks. Coverage control problems have been par-
ticularly popular due to their numerous applications:
e.g., environmental monitoring (Smith et al. 2011), bat-
tlefield surveillance (Bokareva et al. 2006), lawn mow-
ing and vacuuming, search and rescue (Murphy et al.
2008), and hull inspections (Choset & Kortenkamp 1999,
Hollinger et al. 2013). The latter application is actively
supported by NASA whose work on the Mini AER-
Cam paves the way for a future of extravehicular robotic
(EVR) free flyers performing independent visual inspec-
tions of spacecraft exterior areas of interest (Fredrickson
(cid:63) The authors would like to acknowledge the support of
the Automotive Research Center (ARC) in accordance
with Cooperative Agreement W56HZV-14-2-0001 U.S. Army
TARDEC in Warren, MI and the support by an Early Ca-
reer Faculty grant from NASAs Space Technology Research
Grants Program. The material in this paper was partially
presented at the 56th IEEE Conference on Decision and Con-
trol, December 12-15, 2017, Melbourne, Australia and the
2018 American Control Conference, June 27-29, 2018, Mil-
waukee, Wisconsin. See Section 1.2 for a comparison between
the present work and the conference versions.
Email addresses: [email protected] (William Bentz),
[email protected] (Dimitra Panagou).
et al. 2004). Free flyer visual inspection is the primary
motivating example for our work.
Coverage is often partitioned into three classes of prob-
lems: static, dynamic, and persistent. Static coverage
problems (e.g., area coverage, k-coverage and point cov-
erage) often explore the optimal arrangement of sensor
nodes in a network and the agents tend to immobilize
after this arrangement has been achieved (Cortes et al.
2004). Dynamic coverage problems involve the active
exploration of a domain. Agents typically must sweep
their sensors over all points of a domain until some de-
sired level of coverage has been achieved (Hussein & Sti-
panovi´c 2007, Liu et al. 2013, Stipanovi´c et al. 2013).
Persistent coverage is often similar to dynamic coverage
with the addition of information decay within the envi-
ronment: i.e., agents are required to continually return
to areas of interest in order to restore a deteriorating
coverage level.
The term "persistent coverage" appears as early as
Hokayem et al. (2007) where agents must cover all
points in a 2-D convex polygonal domain every T (cid:63) time
units. This was accomplished with the design of concen-
tric polygonal trajectories with agents following closed
paths in steady state. The work in Song et al. (2013)
is similar but also introduces a linear coverage decay
rate for specific points of interest. In this paper, as
well as Smith et al. (2012), controller design is akin to
regulating the velocity along paths generated offline to
increase observation time at select points of interest. As
Preprint submitted to Automatica
7 August 2019
the decay rates are known and time invariant, optimal
speed control is computed via linear programming.
Palacios-Gas´os et. al have published multiple works
recently on persistent coverage (Palacios-Gas´os et al.
2016a,b, 2017) which build specifically upon Smith
et al. (2012). While the earlier work assumed both the
existence and knowledge of an optimal path to cover
all points of interest, Palacios-Gas´os et al. (2016b) uses
techniques from discrete optimization and linear pro-
gramming to iteratively compute this path. The effect
is that if the coverage decay rate of a specific point of
interest is found to be insufficient to justify the transit
time required to service it, then the point may be re-
moved online from the path of the robot. Prior works,
i.e., Smith et al. (2012), Song et al. (2013), would have
instead driven the robot to quickly pass through the
point. Similar techniques are used in Mitchell et al.
(2015) which also considers that agents must periodi-
cally return to refueling depots.
In Hubel et al. (2008) and Song et al. (2011), the de-
sired coverage level of the domain is maintained with
density maps that yield additional observation time at
select areas of interest. In Song et al. (2011) the maps
are time-invariant while Hubel et al. (2008) considers
time-varying density maps that may be designed around
moving points of interest (e.g., aerial surveillance tar-
gets). However, the latter work only uses density maps
in the derivation of control laws and not in the differen-
tial equations governing coverage level evolution.
Common themes through all of these persistent cover-
age works are convex 2-D domains, predictable environ-
ments, and simplified sensing and dynamic models for
agents. Coverage surfaces embedded in R3 are consid-
ered in Cheng et al. (2008); however, this work is closer
to that of Hokayem et al. (2007) in that agents also follow
preplanned trajectories without considering spatially-
dependent coverage decay maps.
Monitoring of stochastic environments is presented in
Pasqualetti et al. (2014), Yu et al. (2015), outside of
the strict persistent coverage formulation. In Yu et al.
(2015), the authors consider that agents must observe
events at multiple points of interest and the precise ar-
rival times of events are unknown a priori. Arrival time
statistics are used to inform a multi-objective schedul-
ing protocol that results in fixed cyclic servicing policies.
In Pasqualetti et al. (2014), the environment contains
smart intruders which actively attempt to evade a cam-
era surveillance network. Camera motion is restricted to
a single pan axis and thus the the system model is es-
sentially that of a 1-D pursuit evasion problem.
1.2 Contribution
agent dynamic and sensing models, (ii) guarantees on
agent interception of stochastic intruders, and (iii) an
energy-aware agent deployment and scheduling proto-
col. To the best of our knowledge, we are the first to
present a formal hybrid approach to persistent coverage.
Although many of the cited works use density functions
to encode points of interest, the difference in our ap-
proach is both subtle and powerful. The density function
in Hubel et al. (2008) evolves subject to the motion of
an intruder and informs the control laws; however, it has
no effect upon the dynamics of the coverage level. Thus,
only the intruder's current location has any influence on
the motion of the agents, and the time-history of the
intruder's trajectory is forgotten. This necessitates that
agents must travel faster than targets in order to cover
points associated with peaks in the density function be-
fore they vanish. Works that do include a density func-
tion in the coverage level evolution, e.g Palacios-Gas´os
et al. (2016a,b, 2017), tend to have fixed decay rates that
cannot respond or adapt to a changing environment. In
contrast, our algorithm utilizes a time-varying density
function, which is estimated online via extended Kalman
Filter, to directly encode coverage decay over the surface
around the predicted impact points of intruders. This
encodes a memory effect which drives some agents to
follow coverage gradients towards areas that have previ-
ously been or will soon be impacted by intruders.
Our agents operate with finite resources and are required
to periodically return to a refueling station while ob-
serving stochastic events at locations and times that are
not known a priori. This approach is different from re-
lated works, such as Yu et al. (2015) and Mitchell et al.
(2015), where the locations of events are fixed and the
authors are concerned with optimal servicing routes be-
tween these known stations.
This hybrid system is a successor to our previous works
in Bentz & Panagou (2017, 2018). In Bentz & Panagou
(2017), we derived the first of our hybrid modes (i.e.,
local coverage mode) and our intruder state estimator.
However, the agents had no power constraints and the
approach was unable to provide any formal guarantees
on intruder interception without additional operating
modes. In Bentz & Panagou (2018), we derived these
additional modes to present a hybrid approach to per-
sistent coverage. Agents were now scheduled to inter-
cept intruders and followed path-length optimal trajec-
tories. However, formal guarantees on intruder intercep-
tion were still limited to cases in which no collision-
avoidance deadlocks had occurred. Furthermore, agents
did not make effective use of local coverage mode as they
would often travel to the predicted impact points of in-
truders and then remain stationary until the moment of
impact thus contributing to a rising coverage error.
In this paper, we present (i) a formal hybrid control
strategy for multi-agent persistent coverage of non-
planar convex surfaces embedded in R3 that does not
make overly simplifying assumptions with respect to
This work extends the interception guarantee of Bentz
& Panagou (2018) to an arbitrary number of collision
avoidance maneuvers and presents an entirely new
method of collision avoidance over the prior works. It
2
also reformulates numerous guard conditions within the
automaton to allow agents to explore actively around
the predicted impact points of intruders. Furthermore,
this contribution revises our sensing function defini-
tion utilized in the prior works which suffered from a
singularity at the sensing cone vertex.
This paper is organized as follows: Section 2 describes
the agents sensing and kinematic models and provides
an overview of our hybrid control strategy, Section 2.2
presents the trajectory estimator for particle intruders
and defines our coverage decay rate map, Sections 3-6
describe each hybrid mode in detail, Section 7 verifies
the algorithm in simulation, Section 8 summarizes our
contributions and Section 9 is an appendix containing
the formal definition of our hybrid automaton.
2 Problem Formulation
2.1 Agent Modeling
Consider a network of spherical autonomous agents in-
dexed i ∈ {1, ..., N}, of radius ri, whose motion is sub-
ject to 3-D rigid body kinematics (Beard 2008):
Si. This model, though intended to be generic, is sim-
ilar to conical camera models presented in other works
on dynamic coverage (see Xie & Zhang (2013)). Our
model differs in terms of its heterogeneity, i.e. Si provides
anisotropic sensing data that degrade in quality towards
the periphery of the footprint and changes with respect
to distance from the sensor. Degradation over distance
is not monotonically decreasing but instead contains a
peak located near the vertex of Si as in Hexsel et al.
(2013). This is motivated by the fact that the probabil-
ity of event detection by a camera decreases when ei-
ther very far from or very close to the lens. Anisotropic
sensing is encoded through the definition of the sensing
constraint functions for each agent i:
(cid:16)
(3a)
(3b)
c1i = βiR2 − (x − xi)2 − (y − yi)2 − (z − zi)2,
c2i = αi − φi,
(x − xi)2 + (y − yi)2 − (z − zi)2(cid:17)}
in G: φi = arccos(cid:0)r pi/pi · xBiG(cid:1). Note that: r pi/pi =
for βi = min{1, ηi
with real constant ηi >> 1. R is the sensing range,
pi = [x y z]T is the position of a point within Si with
respect to G, αi is the angle between the periphery and
centerline of the spherical sector (the xBi axis), and
φi is the angle between r pi/pi = pi − pi (resolved in G
by construction) and the xBi axis given as the inverse
cosine of the dot product of r pi/pi and xBi resolved
√
[(x − xi) (y − yi) (z − zi)]T ,
and xBiG is determined by multiplying R1 by [1 0 0]T :
xBiG =
. Agent
i is thus capable of detecting objects that lie within
an angle of 2αi > 0 about the xBi axis and a range of
R > 0. The model for agent i is depicted in Fig. 1.
cos Ψi cos Θi sin Ψi cos Θi − sin Θi
(x−xi)2+(y−yi)2+(z−zi)2
(cid:105)T
(cid:104)
1
(1)
(2)
xi
yi
=
zi
Φi
Θi
Ψi
− sin Θi
cos Θi sin Ψi sin Φi sin Θi sin Ψi + cos Φi cos Ψi
cos Θi cos Ψi sin Φi sin Θi cos Ψi − cos Φi sin Ψi
,
ui
,
qi
1 sin Φi tan Θi cos Φi tan Θi
cos Φi sin Θi cos Ψi + sin Φi sin Ψi
cos Φi sin Θi sin Ψi − sin Φi cos Ψi
=
− sin Φi
cos Φi cos Θi
sin Φi cos Θi
cos Φi
wi
vi
ri
0
0 sin Φi sec Θi cos Φi sec Θi
si
i ΩT
where pi = [xi yi zi]T is the position vector and Ωi =
[Φi Θi Ψi]T is the vector of 3-2-1 Euler angles taken
with respect to a global Cartesian coordinate frame G
with origin O. The linear velocities [ui vi wi]T and an-
gular velocities [qi ri si]T are both presented in the
body fixed frame Bi with origin pi. The state vector of
agent i is defined as qi = [pT
i ]T . In the sequel, the ro-
tation matrices of (1) and (2) shall be denoted R1 and R2
respectively. The agents travel within a stationary do-
main, D ⊂ R3. Their task is to survey a two-dimensional
manifold, C ⊂ D, known as our surface of interest. For
the purpose of this work we assume that the surface is
an ellipsoid of revolution; however, it should be noted
that the coverage laws, as well as the collision avoidance
strategy, can be easily adapted for any convex surface.
The ellipsoid has semi-major axis xC,r and semi-minor
axis zC,r aligned with the global coordinate axes xG and
zG respectively with center at O. The circumflex (i.e.,
hat) symbols denote unit vectors.
Each agent, i, is equipped with a forward facing sensor
whose spherical sector footprint shall be referred to as
Fig. 1. Agent i is modeled as a sphere of radius ri and has a
forward facing sensor footprint, Si. Sensing constraint func-
tions cki, ∀k ∈ {1, 2}, encode a decay in sensing quality along
the depth and towards the periphery of Si.
Let us denote max{0, cki} = Cki. One can define the
sensing function that represents the quality of informa-
tion available at each point over the sensing domain as:
3
(cid:40) C1iC2i
C1i+C2i
,
if card(cid:0) ¯Ci
(cid:1) < 2 ∧ r pi/pi > 0;
0,
otherwise,
Si(qi, p) =
(4)
where ¯Ci is the set of zero elements in Cki. Si(qi, p) takes
a value of zero outside of Si. Note that Si(qi, p) is de-
fined over all of D and thus has static bounds. Si(qi, p)
is continuous in p while taking a value of zero along ∂Si.
In verifying this continuity, it is important to note that
Si(qi, p) approaches zero from within Si in the limit that
(cid:1) = 2 or r pi/pi = 0 are satisfied. The for-
either card(cid:0) ¯Ci
mer condition may be verified by taking a limit of the
first piecewise definition of (4) as C1i and C2i tend to
zero. The latter condition results from our definitions of
βi and ηi which encode that Si(qi, p) drops off rapidly
when in very close proximity to the vertex of Si. Increas-
ing ηi >> 1 has the effect of shifting the sensing drop
off point closer to pi. Define the coverage level provided
by agent i at time t as:
(cid:90) t
Qi(t, p) =
Si (qi(τ ), p) C (p) dτ,
0
where C is defined as: C (p) =
(cid:26)1,
∀p ∈ C;
0, ∀p /∈ C,
(5)
and en-
codes that the accumulation of sensing information only
occurs along our surface of interest, C.
As the agents cover C, a set of Np high-speed particle
intruders denoted k ∈ {1, ..., Np}, each of which trav-
els in an arbitrary direction at constant velocity, pass
through the domain. The particles are assumed to be
uncontrolled and cannot deviate from their initial tra-
jectories. No assumptions are made with respect to the
source of the particles or whether they are intelligently
generated. Each particle shall have an associated map
decay term, Λk (τ, p), which is defined later in Section
2.3. We may now define the global coverage level:
N(cid:88)
(cid:90) t
Np(cid:88)
Q(t, p) =
Qi(t, p) −
Λk (τ, p) C (p) dτ.
(6)
i=1
k=1
0
In this work, coverage refers to the accumulation of sens-
ing data over time. Points, p, are said to be sufficiently
covered when Q (t, p) ≥ C (cid:63). The goal is to derive a hy-
brid control strategy which persistently sweeps Si across
C while emphasizing surveillance within some bound of
the predicted impact points of particles k ∈ {1, ..., Np}
on C. More specifically, we establish theoretical guaran-
tees on the worst case path length from any agent to
any arbitrary impact point thus guaranteeing intercep-
tion for prescribed bounds on intruder speed, detection
range, and agent velocity. This must be done while avoid-
ing collisions. Let us define collision and interception.
Definition 1 Agent i is said to have intercepted particle
k if i is within a ε1 bound of the estimated impact point
of k for a finite interval of time leading up to the impact.
4
Agent i shall spend this duration of time sweeping the
area in local coverage thus gathering information.
Note that intruders are unaffected by agents and shall
always impact the surface and then disappear. This does
not damage the agent which is free to resume other tasks
upon conclusion of interception.
Definition 2 Agent i avoids collision so long as (cid:107)pi(t)−
pj(t)(cid:107) > ri +rj, ∀t ≥ 0, ∀j (cid:54)= i ∈ {1, ..., N} and (cid:107)ni(cid:107) >
ri where the vector ni has direction normal to C and
length equal to the Euclidean distance of its intersection
point on C to pi.
Agents operate with finite power resources and are
required to return every T (cid:63) time units to a fueling sta-
tion denoted F. Thus, a scheduling protocol is derived
whereby agents periodically deploy from F to cover
within assigned partitions of C. These partitions are
bounded by latitude lines and are sorted by geodesic
distance from F with agents deploying to the partition
furthest from F and then transferring between adjacent
partitions every T (cid:63)
N time units as their power resource
dwindles requiring a return to F within T (cid:63) time units
after deployment. This partitioning scheme also has the
benefit of ensuring that the network of agents is well
distributed across C with agents nominally assigned to
intercept intruders with predicted impact points within
their own partition.
Agent i is capable of localizing itself in G and detecting
whether there exists j such that (cid:107)pi(t) − pj(t)(cid:107) ≤ R.
Furthermore, agents i and j can communicate their de-
ployment times to one another. A centralized network is
required to publish the current coverage level Q(t, p) 1
to all agents and to estimate the trajectories of intruders
using an omnidirectional range sensor whose measure-
ments are fed through an extended Kalman filter. Com-
putation of Q(t, p) is contingent upon continuous trans-
mission of agent state qi to the centralized network. The
centralized network assigns each intruder to an unas-
signed agent at closest latitude to the predicted impact
point. It also transmits detection time as well as esti-
mated location and time of impact to the agent.
2.2 Intruder Modeling
We assume that the omnidirectional range sensor (e.g.,
LiDAR) is co-located with O and provides measure-
ments of each particle's position in spherical coordinates.
We also assume that particle detection and state esti-
mate initialization occur while the distance of the parti-
cle from O is greater than or equal to Rdet + xC,r where
Rdet is a lower bound on distance from detection to im-
pact. We define the model for the motion of particle k:
1 In practice, it is not necessary to publish Q(t, p),∀p ∈ D to
every agent. For agent i to compute its local coverage control
signal, it need only values for Q(t, p) within a closed ball of
radius R due to the fact that Si(qi, p) = 0,∀p /∈ ¯BRpi(t).
This substantially reduces the communication overhead.
(cid:34)
(cid:35)
qk (t) ,
03×3 I3×3
03×3 03×3
(cid:112)x2
(cid:18)
k + y2
k + z2
k
atan2 (yk, xk)
arccos
zk√
x2
k+y2
k+z2
k
qk (t) =
zk (t) =
+ ,
(cid:19)
(7)
(8)
the surface geometry. With this design, Q(t, p) decays
along the predicted trajectory of k with tapering omni-
directional decay rates spreading out from the predicted
path. This design lends itself naturally to our local cov-
erage formulation, which is gradient following in nature,
in that the agents may follow these tapered decay paths
towards the predicted impact points on our surface of
interest.
2.4 Algorithmic Overview
k + y2
k + z2
k ≤ U int
(cid:112) x2
where qk = [xk, yk, zk, xk, yk, zk]T and zk = [ρk, θk, ψk]T
are the Cartesian state and spherical coordinate mea-
surement vectors of particle k resolved in G. We as-
sume that particle speed is upper bounded such that
max. ρk, θk, and ψk are the range,
azimuthal angle, and polar angle of k respectively. In the
sequel, the matrix in (8) shall be denoted h (xk, yk, zk).
Assume that the measurement noise, , is zero-mean
Gaussian and has covariance R = diag
.
This system models high-speed particles incident upon
a surface with negligible drag (e.g., micrometeoroids
impacting a spacecraft hull); thus, it is reasonable to
omit the process noise. The state and covariance esti-
mates, q and Pk, are computed with a continuous-time
extended Kalman filter which is initialized upon particle
k's detection at time tdk.
σ2
ρ, σ2
θ , σ2
ψ
(cid:17)
(cid:16)
2.3 Information Decay
At any time t, we define our decay rate map for parti-
cle k in terms of its predicted position and covariance
evolution over a horizon TH,k(t). As the particles are as-
sumed to travel at fixed velocities 2 , the predicted values
for Cartesian position p(cid:48)
k (t + τ ) and associated covari-
ance Pk (t + τ ) are defined as p(cid:48)
k (t + τ ) = G (τ ) qk (t),
and P(cid:48)
k (t + τ ) = G (τ ) Pk (t) G (τ )T respectively where
G (τ ) = [I3×3 τI3×3] and qk (t) is our current estimate
for qk (t). We define the decay rate map associated with
particle k as the integral of our predicted normal distri-
bution N (p(cid:48)
k (t + τ )) through horizon TH,k:
k (t + τ )(cid:1) dτ,
(9)
(cid:48)
k (t + τ ) , P
(cid:48)
(cid:90) TH,k(t)
k (t + τ ) , P(cid:48)
λkN(cid:0)p
Λk (t, p) =
0
where λk > 0 is a tuning parameter for the decay rate.
We recommend choosing λk < 1 as this typically allows
for the rate of coverage to exceed the decay rate over
points intersecting Si. For t < tdk, define Λk (t, p) =
0, ∀p ∈ D. Our formulation for (9) essentially takes a
normal distribution for the position of particle k at time
t and cumulatively propagates it forward in time up to
our horizon TH,k(t). The horizon is lower-bounded by an
estimate of the remaining time until impact of particle
k on C. This may be computed using qk (t) along with
2 The guarantee of intruder interception presented in this
work can be extended to intruders with time-varying veloc-
ities that are bounded by U int
max. However, it is still required
that intruders follow straight line trajectories such that the
network may estimate fixed impact points.
Fig. 2. Agent i operates in accordance with this automaton.
For clarity, elements of the reset map and brief descriptions
of transitions are included.
The coverage strategy for agent i is represented by the
hybrid automaton in Fig. 2. Rigorous definitions of all
entities of the automaton, including the guard conditions
and reset maps, are included in the appendix. Note that
each agent operates in accordance with its own automa-
ton and thus an arbitrary number of agents may be in
any operating mode at any given time. Before proceed-
ing, we provide a brief overview of each mode.
• Local Coverage: This mode governs the active ex-
ploration of our surface of interest C. When active,
the agent continuously seeks to orient and trans-
late Si such that Si intersects portions of C with
5
a lower coverage level. This is conceptually similar
to following the gradient of the coverage error. An
agent currently assigned to an intruder may operate
in Local Coverage while within an ε1 bound of the
the intruder's predicted impact point. Any agent
not currently assigned to an intruder shall operate
in Local Coverage assuming that it is within its as-
signed latitude partition. Operation in Local Cov-
erage is always concurrent with agent assignment to
the lowest concentric surface (see Surface Transfer
below) and transition to Local Coverage can occur
from any mode aside from Return to Base Mode.
• Particle Intercept: In this mode, an intruder is as-
signed to agent i and i is guided along its assigned
surface to the predicted impact point of the in-
truder. After intruder assignment occurs, the agent
will nominally remain in Particle Intercept Mode
until after the intruder impacts C; however, the
agent may temporarily leave the mode before im-
pact to avoid collision through Surface Transfer
Mode or to explore in Local Coverage within a ε1
bound of the the intruder's predicted impact point.
• Partition Transfer: This mode is defined for agents
that are not currently assigned to an intruder and
its purpose is to ensure that the agents are spa-
tially distributed across the entire surface area of C.
Activation of this mode will guide agent i along a
longitudinally-oriented geodesic trajectory until its
position satisfies a set of latitude constraints, i.e.,
agents travel to the southernmost latitude partition
upon deployment and transition through progres-
sively northern partitions as their fuel is depleted.
Transition to this mode can occur from any other
mode. The partitioning scheme is shown in Fig. 6.
• Surface Transfer: This mode's primary purpose is to
ensure that agents avoid collision with two distinct
cases resulting in its activation. In the first case,
two or more agents have violated a safe-proximity
condition. The mode removes select agents from the
deadlock by guiding them along vectors normal to
C to a higher-altitude ellipsoidal surface concentric
with C. An agent trajectory is then temporarily con-
fined to this newly assigned surface until it reaches
the surface projection of its destination. The sec-
ond case occurs under the condition that the agent
has arrived at the projection of its destination on
a higher-altitude surface. The mode is activated to
return the agent to the innermost surface. Transi-
tion to this mode can occur from any other mode
aside from Return to Base as agents in the latter
mode always take priority in a deadlock. The sur-
face transfer geometry is illustrated in Fig. 4.
• Return to Base: The final mode is activated when
the time since an agent's deployment has surpassed
some threshold. It guides the power-critical agent
along the optimal trajectory to the refueling sta-
tion. After charging, the agent is redeployed. Agent
deployments occur one at a time with a fixed period.
A power critical agent in Particle Intercept Mode or
6
Surface Transfer Mode shall first complete its task
of intercepting the assigned intruder or transfer-
ring surfaces before transitioning to Return to Base
Mode. If an agent is designated as power-critical
while in Partition Transfer Mode it shall immedi-
ately abandon its task and transition to Local Cov-
erage which shall result in instantaneous transition
to Return to Base Mode. Theoretical guarantees
on successful return to base with respect to agent
power lifespan in accordance with our automaton
is presented in Theorem 2 of Section 5.
3 Local Coverage Mode
Local coverage constitutes the first of five hybrid modes
in our automaton. This mode is gradient following in
nature and commands agent i to always seek to orient
and translate Si such that the volume of uncovered space
intersecting Si is increased. In this way, it emphasizes
active exploration of the domain by agents that are not
currently assigned to either monitor intruders or relocate
within the domain. The control laws are designed such
that agent motion in local coverage shall tend to reduce
the rate of growth of the global coverage error. Define
the global coverage error with respect to C (cid:63) as:
h (C (cid:63)C (p) − Q(t, p)) dp,
E(t) =
(cid:90)
(10)
D
dh
where h(w) = (max{0, w})3 with first derivative h(cid:48) =
dw = 3(max{0, w})2 and second derivative h(cid:48)(cid:48) = d2h
dw2 =
6(max{0, w}). Our local coverage control laws are de-
rived via differentiation of (10). This is included in the
Appendix in the interest of space. The result is the se-
lection of the following control strategy:
uloc
i = ku
vloc
i = kv
(cid:112)a2
(cid:112)a2
(cid:112)a2
i1 + a2
ai1(t, Q(t, p))
i2 + a2
i3
ai2(t, Q(t, p))
i2 + a2
i1 + a2
i3
ai3(t, Q(t, p))
i2 + a2
i3
wloc
i1 + a2
i = kw
i = ¯risat(cid:0) krai4(t, Q(t, p))
i = ¯sisat(cid:0) ksai5(t, Q(t, p))
¯ri
sloc
rloc
¯si
where:
ρl,i = − ln
(cid:18)
+ xBi · ρl,i,
+ yBi · ρl,i,
+ zBi · ρl,i,
(cid:1) + yBi · ρa,i,
(cid:1) + zBi · ρa,i,
(cid:19)
R−1
1 ni,
(11a)
(11b)
(11c)
(11d)
(11e)
.
(12)
(13)
1
γR −ri
((cid:107)ni(cid:107) −ri)
ρa,i = ξR−1
2
0
arcsin (ni · zG) − Θi
atan2 (−ni · yG,−ni · xG) − Ψi
ρl,i is a collision avoidance term with respect to the sur-
face of interest. It takes a value of zero when agent i's
normalized distance from C is γR for γ ∈ (0, 1] and is
logarithmically repulsive and attractive from the surface
when the distance is decreased or increased respectively.
Small values for γ tend to direct the agent to travel closer
to the surface. This coincides with a smaller cross section
of Si intersecting the surface but is also typically associ-
ated with a higher quality of sensing. A larger choice for
γ will direct the agent to fly at a higher altitude with re-
spect to the surface and thus the area covered by Si will
tend to be broader with a decreased quality of sensing.
ρa,i, for ξ << 1, encodes that the agents should tend
to align xBi with −ni if the coverage terms associated
with ri and si have become sufficiently small. The phys-
ical meaning of ρa,i is to direct Si back onto C if it has
reached a configuration in which it no longer intersects
C. See Fig. 3 for further details.
k(tck) is the z component of ¯p(cid:48)
k(tck) and fi ∈ {0, 1}
that ¯z(cid:48)
is a particle assignment flag for agent i defined as 0
when the agent is free (i.e., not currently assigned a
particle). ip ∈ {1, ..., N}, the power index of agent i,
shall be fully described in Section 5; however, it should
be noted that the definition of ik implies that there are
at most N − 1 agents available for particle interception
at any given time.
As with our local coverage strategy, it is assumed that
agents shall maintain a distance γR normal to C in the
nominal case that they are not maneuvering to avoid
collision. We define an ellipsoid of revolution, C0, which
is concentric with C and has the property that each semi-
principal axis is γR longer than its associated counter-
part in C, i.e., xC0,r = xC,r + γR, and zC0,r = zC,r + γR.
The nominal trajectories of i are attractive to C0.
Agents maneuvering to avoid collision shall transfer
to additional concentric ellipsoidal surfaces each sepa-
rated by a distance of R. These surfaces are denoted
C1,C2, ...,CN−1 with associated semi-principal axes
xC1,r = xC,r + (γ + 1) R and zC1,r = zC,r + (γ + 1) R,
xC2,r = xC,r + (γ + 2) R and zC2,r = zC,r + (γ + 2) R,
etc. Surface assignment and transfer scheduling in colli-
sion avoidance mode is described in full detail in Section
6 and the geometry is illustrated in Fig. 4.
Fig. 3. As agent i explores C, ρl,i
for
(cid:107)ni(cid:107) < γR, antiparallel to ni for (cid:107)ni(cid:107) > γR, and the zero
vector otherwise. This term prevents collision of i with C and
prevents i from flying away from C. ρa,i tends to direct Si
onto C.
is parallel to ni
ing gains which are chosen to satisfy(cid:112)k2
¯ri and ¯si are saturation limits for the coverage angular
velocity inputs to the system. ku, kv and kw are tun-
w ≤
U agt
max. As ρ(cid:96),i is normal to the surface, it can be shown
that U agt
max is an upper bound to agent velocity tangen-
tial to C.
u + k2
v + k2
4 Particle Intercept Mode
+
+
(zk+ zkt)2
z2C,r
= 1
x2C,r
(cid:18)
(yk+ ykt)2
t ∈ R+ (xk+ xkt)2
Assuming that particle k is embedded within the surface
upon impact, its position shall intersect C at most one
(cid:19)
time. We define particle k's estimated impact time as
,
tck = min
k (tck) = G (tck − t) qk (t).
with estimated impact point p(cid:48)
Upon detection, particle k is assigned to a free agent
i with the minimum distance from the estimated
impact along the zG direction. We define
point of
a new index, ik, as the index of the agent assigned
to intercept particle k at destination pid = p(cid:48)
k (tck):
ik = argmini∈{1,...,N}ip(cid:54)=1,fi(cid:54)=1(cid:107)¯z(cid:48)
k(tck) − zi(tdk)(cid:107). Note
x2C,r
Fig. 4. Three agents enter a deadlock in (a). The green agent,
which has the greatest time since deployment, is prioritized
to continue on C0 and the red and blue agents are each trans-
ferred to C1 before entering a second deadlock in (b). The blue
agent, which has the second greatest time since deployment,
is prioritized to continue on C1 and the red agent is trans-
ferred to C2 before continuing along geodesic to projC2
p(cid:48)
k (tck )
in (c). Red agent transfers back to C0 directly above predicted
impact point of particle k in (d). Note that surface transfer
trajectories are always normal to Cµi , ∀µi ∈ {0, ..., N − 1}.
When agent i has been assigned to intercept particle k,
fi is set to 1 and it is said to have transitioned into par-
ticle intercept mode. In this mode, agent i shall nomi-
nally follow the optimal trajectory along C0 to within a
k(tck) onto C0 (de-
ε1 bound of the projection of point p(cid:48)
noted projC0 p(cid:48)
k (tck )). The agent shall then transition to
7
local coverage to actively explore within this ε1 bound
until t > tck at which time fi is set to 0. If local coverage
guides the agent out of the ε1 bound, particle intercept
mode will again guide the agent back inside the bound.
The optimal trajectory is referred to as a geodesic and
its computation may be executed in an iterative man-
ner. Specifically, we use Vincenty's formulae as presented
in Vincenty (1975a). For cases involving nearly antipo-
dal points in which the standard inverse method does
not converge, we use Vincenty's supplemental algorithm
presented in Vincenty (1975b).
As an input, Vincenty's algorithm requires an ellipsoid of
revolution along with two points, current and desired po-
sition, on that surface. The algorithm returns a heading
angle measured clockwise from North. This heading an-
gle shall be referred to as χi. We now define the heading
unit vector νi which lies in a plane tangent to the surface
at pi. It may be computed by rotating the North-pointing
vector at pi clockwise by an angle of χi within the tan-
gent plane. For our implementation of Vincenty's algo-
rithm, we input the following: Cµi for surface assignment
index µi ∈ {0, ..., N − 1}, pi, and projCµi
p(cid:48)
k (tck ). The po-
p(cid:48)
sition controller used to guide agent i to projCµi
k (tck )
is composed of two terms: one which commands veloc-
ity tangential to Cµi along νi and one logarithmic term
which commands velocity normal to Cµi in order to con-
strain the geodesic trajectory of i to Cµi. The particle
intercept mode position control law is:
= U agt
upim
i
vpim
i
wpim
i
(cid:16)
(cid:16)
maxR−1
1
νi − ln
(cid:107)νi − ln
1
(γ+µi)R−ri
(γ+µi)R−ri
1
((cid:107)ni(cid:107) −ri)
((cid:107)ni(cid:107) −ri)
As agent i travels along the geodesic, it is desirable that
it should point Si towards C. Therefore, the orientation
controller for particle intercept mode is similar to that
of Section 3:
= R−1
2
qpim
i
rpim
i
spim
i
0
arcsin (ni · zG) − Θi
atan2 (−ni · yG,−ni · xG) − Ψi
Lemma 1 Let us assume that agent i has been assigned
to particle k with fi
:= 1. Given an arbitrary agent
position pi(tdk) and an arbitrary predicted impact point
for the intruder p(cid:48)
k(tck), there exists an upper bound to
the maximum path length until interception: Pmax ≤
πxCN−1,r + π
2
(cid:1) gCN−1 + 2 (N − 1) R.
(cid:0)xCN−1,r + zCN−1,r
PROOF. At the moment that fi := 1 we have that
agent i transitions to Particle Intercept Mode. Un-
der the condition that the agent has not yet come
within proximity of the predicted impact point, i.e.,
k (tck )(cid:107) > ε1, we have that only G (ζi2, ζi4)
(cid:107)pi − projCµi
p(cid:48)
and G (ζi4, ζi2) are defined (see Appendix). These two
transitions occur sequentially for each deadlock event
p(cid:48)
that agent i encounters as it approaches projCµi
k (tck ).
In any given deadlock arrangement, one agent remains
on its current surface without ascending to a higher one.
This implies that µi = 1 for at most N − 1 agents as
the remaining agent would be unable to encounter a
deadlock on C0. Furthermore, this implies that µi = 2
for at most N − 2 agents etc. until we have µi = N
for at most zero agents. The worst cast surface assign-
ment that can be incurred during sequential cycles of
((ζi2, ζi4) , (ζi4, i2)) would be µi = N − 1.
As the geodesic path length between any two points
projected onto surface Cµi shall always be less than the
geodesic path length between the same two points pro-
jected onto surface Cµi+1, we may bound the geodesic
portion of the trajectory by one that is constrained en-
tirely to CN−1. We denote this term Pgeo. As any two
points on Cµi can be connected by a path of constant
latitude Plat followed by a path of constant longitude
Plong, we have that:
Pgeo ≤ Plat + Plong.
For two generic points on CN−1, we have that:
Plat ≤ πxCN−1,r,
Plong ≤ π
2
(cid:0)xCN−1,r + zCN−1,r
(cid:1) gCN−1 .
where the bound on Plat is half of the circumference
of the ellipsoid of revolution CN−1 about its equa-
tor and the bound on Plong is half of the perime-
ter of the revolved ellipse. The infinite series expres-
sion term, denoted gCN−1 in (19),
is first presented
in Ivory (1798). The remaining portion of the path
length is simply the straight line segments connecting
C0 to CN−1 and back again. This length is precisely
2 (N − 1) R. Thus, Pmax = Pgeo + 2 (N − 1) R as illus-
trated in Fig. 5. Invoking (18) and (19) gives us Pmax ≤
πxCN−1,r + π
2
This concludes the proof.
(cid:1) gCN−1 + 2 (N − 1) R.
(cid:0)xCN−1,r + zCN−1,r
(17)
(18)
(19)
(cid:17)
(cid:17)
ni
ni(cid:107) .
(14)
,
(15)
which is essentially a proportional controller that tends
to align xBi with −ni. As (14) commands the vehi-
length path along Cµi to
cle to follow the optimal
p(cid:48)
(cid:17)2n
projCµi
k (tck ), we can establish a few guarantees on
(cid:19)2
system performance. To simplify notation, define:
(cid:16) xCN−1,r−zCN−1,r
(cid:18) (2n − 1)!!
∞(cid:88)
1 +
xCN−1,r+zCN−1,r
(2n − 1)2
gCN−1 =
n=1
2nn!
,
(16)
and gC0 is defined similarly in terms of the semi-principal
axes of C0.
Theorem 1 Assuming that the bounds on intruder ve-
locity and range from detection to impact satisfy Rdet
>
U int
max
8
Fig. 5. The longest possible path from pi(tdk) to p(cid:48)
k(tck),
taken by agent i assigned to intercept particle k, is illustrated
above. We denote this path as Pmax and it may be upper
bounded as established in Lemma 1.
Pmax
U agt
i shall reach projC0 p(cid:48)
max
, where Pmax may be bounded via Lemma 1, agent
k (tck ) before tck.
k (tck ) must satisfy: tik ≤ Pmax
PROOF. Given the fact that agents in the particle in-
tercept and surface transfer modes travel at speed U agt
max,
we have that the time tik required to travel from pi (tdk)
to projC0 p(cid:48)
. Given that
tck − tdk ≥ Rdet
k (tck ) be-
fore tck implies that Rdet
> tik. This is guaranteed if
U int
max
Rdet
U int
max
, agent i reaching projC0 p(cid:48)
This concludes the proof.
> Pmax
U agt
max
U agt
max
U int
max
Remark 1 At any given time, there are at most N − 1
agents available to intercept particles. Thus, satisfaction
of Theorem 1 implies that the network is capable of in-
tercepting all particles so long as a maximum of N − 1
particle impacts occur in any moving time window of
πxCN−1,r+ π
2 (xCN−1,r+zCN−1,r)gCN−1 +2(N−1)R
.
U agt
max
5 Energy-aware Scheduling Protocol
5.1 Domain Partitioning
As this is a persistent coverage protocol, which operates
indefinitely, it is necessary to establish an agent deploy-
ment and scheduling protocol that realistically consid-
ers the agents' finite power and/or propulsive resources.
Our strategy is to periodically deploy agents from a fu-
eling station F which we assume to be located at the
North pole of C0, i.e., at the point [0 0 zC0,r]T . Define
T (cid:63) as the power lifespan of each agent in the network.
Given T (cid:63) and N , we define our deployment and schedul-
ing protocol such that one agent is deployed from F ev-
ery T (cid:63)
N seconds. The initial deployment is that of agent
i = 1 at t = 0 seconds with agent i = 2 following at
t = T (cid:63)
N . This continues indefinitely with the second de-
ployment of agent i = 1 occurring at t = T (cid:63) seconds.
In order to adequately distribute agents across C, it is
desirable to partition the domain and assign agents to
monitor separate regions. Specifically, partitioning the
domain by latitude, rather than longitude, ensures that
agents are poised to intercept particles without the need
T (cid:63)
for frequent crossings of the equator which tend to be as-
sociated with larger values of Pgeo on an oblate spheroid.
Define the power index of agent i as ip(t) = 1 +
(cid:5) , N(cid:1) where the first argument of
mod (cid:0)i − 2 −(cid:4) tN
our modulo operation is the dividend and the second
argument is the divisor. The lower-bracketed delimiters
represent the floored division operation. Upon deploy-
ment from F, agent i has power index ip = N and this
index is reduced by one every T (cid:63)
N seconds until ip = 1,
i.e., agent i is the power critical agent. Note that no two
agents may share the same power index as a result of
our periodic deployment and scheduling protocol.
Latitude partitions are characterized by a static upper
bound in zG denoted ¯zip−2 and a static lower bound
¯zip−1. Rather than dynamically sizing partitions relative
to agent power resources, we divide partitions such that
N − 1 agents are assigned equal surface areas of C to
explore. This choice maximizes the coverage of any indi-
vidual partition as the allocation of a larger partition to
a recently deployed agent would result in less effective
coverage of that partition. Agents are sorted by their re-
maining power and transfer between partitions that are
progressively closer to F as their power resource expires.
Define the surface area of our ellipsoid of revolution C as:
AC = 2πx2C,r
1 +
(cid:18)
(cid:18)(cid:114)
1 +
1 − z2C,r
x2C,r
1 − z2C,r
x2C,r
(cid:19)
(cid:19) artanh
(cid:32)(cid:115)
(cid:33) .
1 − z2C,r
x2C,r
(20)
The agent with ip = 2 is assigned to monitor the par-
tition characterized by upper bound at north pole of C,
i.e., ¯z0 = zC,r. The lower bound ¯z1 may be computed by
dividing (20) by (N − 1), equating with the integral of
ellipse cross sectional circumferences parametrized by z,
dz.
and then numerically solving for ¯z1:
x2C,r − x2C,r z2
1 +
(cid:90) ¯z1
(cid:118)(cid:117)(cid:117)(cid:117)(cid:116)
2π
(cid:16)
z2x4C,r
z4C,r − z2C,r z2(cid:17)
AC
N − 1
x2C,r
z2C,r
=
zC,r
(21)
One may then iteratively solve for the remaining bounds
for increasing values of ip up to ip = N − 1:
(cid:90) ¯zip−1
¯zip−2
(cid:118)(cid:117)(cid:117)(cid:117)(cid:116)
x2C,r − x2C,r z2
1 +
2π
z2C,r
AC
N − 1
=
z2x4C,r
(cid:16)
z4C,r − z2C,r z2(cid:17)
x2C,r
dz.
(22)
The final computation of (22) for ip = N is not neces-
sary as ¯zN−1 is the south pole of C, i.e., ¯zN−1 = −zC,r,
although this may be shown through numerical com-
putation as well. Our partitioning strategy for the case
where N = 4 is presented in Fig. 6.
Note that no partition has been assigned to the agent
for which ip = 1. This is the power critical agent and
it shall have flag fi := 1 at the instant ip := 1. The
power critical agent cannot be assigned a new particle to
intercept after ip := 1 as this opens the possibility that
9
surveillance system is to first ensure that the time from
detection to impact of any arbitrary particle, tck − tdk,
as governed by the omnidirectional range sensor sat-
isfies Theorem 1. One must subsequently ensure that
power lifespan T (cid:63), for all agents, satisfies Theorem 2.
5.2 Partition Transfer and Return to Base
If an agent with ip ∈ {2, ..., N} lies outside of its pre-
scribed partition, and we have if = 0, then the agent
shall enter partition transfer mode. This mode uses the
same geodesic position and orientation controllers (14)
and (15) with the destination position set to the point:
pid = [xid yid zid]T =
(cid:16)
(cid:16)
xC,r cos
arcsin
yC,r cos
arcsin
(cid:17)(cid:17)
(cid:17)(cid:17)
(cid:16) zid
(cid:16) zid
zC,r
zC,r
(cid:18)
atan2(cid:0)yi(t), xi(t)(cid:1)(cid:19)
(cid:18)
atan2(cid:0)yi(t), xi(t)(cid:1)(cid:19)
cos
sin
,
(cid:17)
(cid:17)
((cid:107)ni(cid:107) −ri)
((cid:107)ni(cid:107) −ri)
ni
ni(cid:107) .
(23)
¯zip−1, if zi < ¯zip−1; or ¯zip−2, if zi > ¯zip−2
i.e., the closest point along the agent's current longitude
which lies on the boundary of its assigned partition.
The return to base mode is similar to partition transfer
mode but is defined for the agent with ip = 1. This mode
is activated when the time since agent i's last deployment
from F, denoted tiF ≥ T (cid:63) − π
(xC0,r + zC0,r) gC0 as
established in Theorem 2. The control strategy is the
same as partition transfer mode with the desired position
set to F. Control laws for partition transfer mode and
return to base shall be denoted with superscripts ptm
and rtb respectively.
2U agt
max
6 Surface Transfer Mode
(cid:16)
(cid:17)
The primary purpose of surface transfer mode is to en-
code collision avoidance and it can be transitioned into
from any other mode aside from the return to base mode.
This mode is triggered for agent i, assigned to surface
Cµi, when we have the condition that (cid:107)pi − pj(cid:107) ≤ R
for i (cid:54)= j. Denote j = i ∪ j as the set of agents satisfy-
ing this condition. Agents in j are ranked by tjF . One
agent, denoted ipr, whose value for tjF is highest, i.e.,
is permitted to proceed. The re-
ipr = argmaxj
maining agents increment their surface assignment in-
dices, µi, by one and transition to surface transfer mode.
This mode controls the agents to follow ni until they
have transferred to their newly assigned concentric sur-
face at a height R above the previous. Note that in gen-
eral, convexity of surface C is required to ensure that
intersections of ni and nj, ∀i (cid:54)= j, lie within the interior
space that is bounded by the surface. The surface trans-
fer position control strategy is:
tjF
= U agt
ustm
i
vstm
i
wstm
i
(cid:16)
(cid:16)
maxR−1
1
ln
(cid:107)ln
1
(γ+µi)R−ri
(γ+µi)R−ri
1
Fig. 6. Our domain partitioning scheme for C is illustrated
above. Agents with ip ∈ {2, 3, 4} are indicated with blue,
green and black Si respectively. Their partitions are sepa-
rated by latitude lines upper bounded at ¯zip−2 and lower
bounded at ¯zip−1. The power critical has Si indicated in red.
particle assignment could occur near the end of the T (cid:63)
N
time window during which time the agent with ip = 1
should be transitioning back to F to exchange its power
source. The power critical agent will instead spend the
majority of this time window in local coverage mode
assisting the other agents in gathering information. It
can only be tasked with intercepting a particle if this
assignment had occurred previously when ip = 2. In
this scenario, the agent should be capable of intercepting
particle k and then transitioning back to F so long as
a bound is established on the length of our deployment
scheduling window T (cid:63)
N .
N ≥
Theorem 2 If agent power lifespan T (cid:63) satisfies T (cid:63)
tck − tdk + π
(xC0,r + zC0,r) gC0, ∀k then the agent
with ip = 1 shall always be capable of reaching F within
T (cid:63)
N of the time at which ip := 1.
2U agt
max
PROOF. Consider the worst-case scenario in which
the agent with ip = 2 is assigned to intercept par-
ticle k at the instant before ip := 1. It's remaining
flight time is currently T (cid:63)
N . The time required to in-
tercept the particle is tck − tdk, after which our con-
trol strategy dictates that the agent will
follow a
geodesic trajectory to F. As F lies at the north pole
of C0, this will be a trajectory of constant longitude
which may be upper bounded by a length half the
perimeter of our revolved ellipsoid: π
2 (xC0,r + zC0,r) gC0
by definition. As the agent is controlled by (14)
with a North-pointing νi, it will proceed along this
geodesic at speed U agt
max. Thus the time required to
(xC0,r + zC0,r) gC0
complete this trajectory is
N ≥
and we may bound our deployment window: T (cid:63)
(xC0,r + zC0,r) gC0, ∀k. This concludes
tck − tdk + π
the proof.
2U agt
max
2U agt
max
π
Remark 2 The appropriate design method for this
10
As the agents ascend to a point at which R does not in-
tersect C, sensing information is not gathered in avoid-
ance mode and thus the avoidance orientation control is
simply [qstm
]T = [0 0 0]T .
rstm
i
sstm
i
i
Agents are said to have converged upon their newly as-
signed surface when ln
< ε2. At this point,
each agent shall transition back to its prior mode as de-
scribed in the following two scenarios.
(cid:107)ni(cid:107)−ri
(γ+µi)R−ri
(1) If agent i had been in either particle intercept or
partition transfer mode before the deadlock, it shall
resume that mode and continue along a geodesic
trajectory on the newly assigned surface until it
reaches the projection of its destination. At this
pid(cid:107) ≤ ε1
point, the condition that (cid:107)pi − projCµi
triggers a reset µi := 0 concurrent with a transi-
tion back to surface transfer mode thus allowing
the agent to transfer back to C0. The agent then
resumes coverage of C0 in its prior mode. For addi-
tional details on flag conditions in these transitions,
see guards G (ζi2, ζi4) , G (ζi4, ζi2) , G (ζi3, ζi4), and
G (ζi4, ζi3) of our hybrid automaton as presented in
the appendix.
(2) If agent i had been in local coverage mode before
the deadlock, it shall then transition back to local
coverage mode concurrent with reset µi := 0. This
transition is dependent upon the conditions that
fi = 0 and that the agent is operating within its as-
signed partition. The agent shall oscillate between
local coverage and surface transfer at an altitude of
R above C0 until ipr has moved along C0 to resolve
the deadlock. At this point, the local coverage con-
troller shall attract agent i back to the surface.
While similar work on multi-agent systems often invoke
avoidance barrier functions to encode collision avoid-
ance, such as in Panagou et al. (2016), it may be impos-
sible to bound the time that agents spend avoiding one
another in these maneuvers -- especially when the algo-
rithm is scaled to many agents. In contrast, our tech-
nique results in an explicit bound on path length to an
intruder as was proven in Lemma 1. With an additional
assumption on the size of agents, we can establish a guar-
antee on collision avoidance for agents in surface transfer
mode.
Theorem 3 For agents {i, j} ∈ j, the condition that
min(Rj) > 2ri + 2rj implies that i does not collide with
j.
PROOF. Consider the case in which i (cid:54)= ipr and j (cid:54)=
ipr. Both agents operate in accordance with (23) and
follow trajectories along ni and nj respectively. Both
unit vectors are normal to surface Cµi, an ellipsoid of
revolution, and thus diverge from one another away from
Cµi. Agents i and j shall enter surface transfer mode at
an instant when (cid:107)pi−pj(cid:107) ≥ min
and their distance
(cid:16)
(cid:17)
Rj
Rj
(cid:17)
(cid:16)
shall tend to increase under (23). Thus min(Rj) > ri+rj
and subsequently min(Rj) > 2ri + 2rj imply that they
avoid collision.
Consider the case in which i = ipr and thus j (cid:54)= ipr. In
the instant that j transitions to surface transfer mode
we have that (cid:107)pi − pj(cid:107) ≥ min
. Thus the distance
for i to travel until collision is greater than or equal to
min
conservative estimate as the true path is curved. Colli-
sion will be avoided if agent j, whose path is normal to
(cid:17) − ri − rj. This straight line path for i is a
(cid:16)
(cid:17) − ri − rj. As j moves at speed U agt
(cid:16)
the surface, may cover a distance ri +rj before i covers
(cid:17) −ri −rj > ri +rj. This
(cid:17)
> 2ri + 2rj.
min
tangential speed is upper bounded by U agt
dition is satisfied if min
may equivalently be written as min
Rj
These arguments apply to the case in which j = ipr and
i (cid:54)= ipr as well. This concludes the proof.
7 Simulations
max and i's
max, this con-
(cid:16)
(cid:16)
Rj
Rj
Rj
4 , t = 2T (cid:63)
4 , and t = T (cid:63)
A simulation was performed in MATLAB to verify the
efficacy of the algorithm. Four agents are deployed to
monitor the surface of an ellipsoid of revolution, C, whose
plane is 20. For each agent, R = 10, ri = 1, αi = 30◦,
radius in the xy-plane is 80 and whose radius in the z-
ku = 1, kv = 5, kw = 1, kr = 0.1, ks = 0.1, ¯ri = 0.4,
¯si = 0.4, U agt
max = 6, and T (cid:63) = 792. Upon initialization
of the simulation, C was set to a fully covered level of
C (cid:63) = 20 which would begin decaying upon detection of
the first intruder k ∈ {1, ..., 4} at t = 600 seconds. The
four agents were deployed from F sequentially at times
t = 0, t = T (cid:63)
4 seconds respectively.
Upon deployment, each agent was initialized in local cov-
erage mode with Φi = 0, Θi = π
2 , and Ψi = 0. Intruders
traveled in random directions with U int
max = 0.7, though
were still constrained to always impact the surface, and
were generated every 35 seconds beginning at t = 3T (cid:63)
4
seconds. The detection system had a lower bound on
range Rdet = 80, decay rate parameter λk = 0.05, and
θ = 0.25 deg2,
measurement variances σ2
ψ = 0.25 deg2 respectively Agents were able to suc-
and σ2
cessfully intercept all particles along their geodesic tra-
jectories while actively avoiding collision over the entire
duration of the attack (see Fig. 7 and Fig. 8); however,
it should be noted that one avoidance anomaly occurred
before the initial intruder was generated during the in-
terval of t = 418 − 420. As our sensing range for agents
was R = 10 and our simulation time step size was 1, it
is clear that this anomaly occurred due to a selection
of U agt
max that was too large relative to the time step. In
a continuous time implementation, a transition to sur-
face transfer mode would have occurred between t = 418
and t = 419 thus preventing collision. Aside from this
anomaly, the simulation parameters adequately approx-
imated the continuous time agent kinematics.
ρ = 0.0625, σ2
11
Fig. 7. Agent i = 3, indicated with green Si, is on a collision course with agent i = 1, indicated with blue Si, during the
interval from t = 2125 to t = 2130. At t = 2135, agent i = 1 has transitioned to surface transfer mode and is following a
trajectory normal to the surface while agent i = 4, indicated with black Si, follows a collision course through t = 2160. Agent
i = 4 transitions to surface transfer mode as well leading to the conditions that µ1 = 2 and µ4 = 1, i.e., agent i = 1 is assigned
to the second tier of avoidance surfaces at a higher altitude than i = 4 as illustrated at t = 2180. Both agents proceed along
their respective Cµi towards their destination with i = 1 having arrived and transferred back to C0 before t = 2195. Note that
agent trajectories for t ≥ 2125 are plotted.
intersect C thus delaying an agent assignment. In both
cases, the estimated trajectory did eventually intersect
C with enough time to allow for agent interception. How-
ever, this delay in assignment significantly reduced the
time the agent spent exploring in the vicinity of the pre-
dicted impact point thus contributing to a noticeable
rise in the coverage error. One potential solution to this
problem would be to prescribe some boundary tolerance
to our surface C thus loosening our definition of an im-
pacting particle for the sake of measurement uncertainty.
Fig. 8. Agent i = 2 follows its geodesic trajectory to the
predicted impact point of particle k over time lapse (a)-(d).
The true trajectory of the particle is indicated in red and
the estimated trajectory in green.
The coverage error on C, normalized with respect to the
maximum error in which all of C takes a value of zero
for Q (t, p), as well as the minimum inter-agent distance
over time are presented in Fig. 9. The error tends to spike
upon particle detections with agents effectively curtail-
ing these spikes as they cover around the vicinity of pre-
dicted impact points in local coverage mode. Two par-
ticularly large spikes occur at t = 3225 and t = 5180
respectively. These anomalies are each associated with
particle impacts occurring close to the equator of the el-
lipsoid where even small values of σ2
ψ result in
an estimated particle trajectory that does not initially
θ and σ2
Fig. 9. The coverage error, normalized to the maximum pos-
sible value, is presented. Anomalies are observed at t = 3225
and t = 5180 respectively. The minimum distance between
any two agents at any given time is also presented with an
anomaly observed at t = 419.
12
(cid:82)
∂t dV + (cid:82)
∂f
f v(s) · n dA, where f is any scalar-,
S(s)
R(s)
vector-, or tensor-valued function of position and time,
S(s) is the boundary of the volume R(s) over which f is
integrated, n is the unit vector normal to the boundary,
and v(s) is the velocity of the boundary. V and A refer
to volume and area respectively. Invoking GTT allows
for differentiation of (10) with respect to time:
(cid:90)
D
+
h(cid:48)(C (cid:63)C (p) − Q(t, p))
(cid:18)−∂Q(t, p)
(cid:19)
(cid:0)h(C (cid:63)C (p) − Q(t, p))(cid:1)v(s) · n dA,
∂t
(cid:90)
E(t) =
dp
(24)
where ∂D is the boundary of D. D is time invariant and
h(cid:48)(C (cid:63)C (p) −
thus v(s) = 0. (24) reduces to E(t) = (cid:82)
(cid:18) N(cid:88)
D
dp, which expands to:
Q(t, p))
(cid:17)
h(cid:48)(C(cid:63)C (p) − Q(t, p))
E(t) = −
Si(qi(t), p)C (p)
(cid:19)
i=1
dp
Λk (t, p) C (p)
−h(cid:48)(C(cid:63)C (p) − Q(t, p))Si(qi(t), p)C (p) dp
(cid:125)
(cid:123)(cid:122)
=ei(t)
(25)
−h(cid:48)(C(cid:63)C (p) − Q(t, p))Λk (t, p) C (p) dp
(cid:125)
Np(cid:88)
(cid:123)(cid:122)
=ek(t)
ei(t) −
ek(t).
k=1
∂D
∂t
(cid:16)−∂Q(t, p)
(cid:90)
Np(cid:88)
N(cid:88)
k=1
D
−
=
−
=
D
(cid:90)
(cid:124)
(cid:90)
(cid:124)
D
i=1
Np(cid:88)
k=1
N(cid:88)
i=1
Fig. 10. A typical agent's hybrid modes are presented over
time. Abbreviations from top to bottom refer to surface
transfer mode, partition transfer mode, particle intercept
mode, return to base, and local coverage mode respectively.
Agent i = 1's operating modes with respect to time are
presented in Fig. 10. It should be noted that the most
frequent transition out of particle intercept mode is to
local coverage mode. This corresponds to an agent ar-
riving at the estimated impact point of a particle and
then surveying the local area up until the moment of im-
pact. As the agent surveys it tends to hit the ε1 proxim-
ity boundary to the impact point thus requiring a short
operation in particle intercept mode to direct the agent
back within the ε1 boundary.
To demonstrate scalability, we have made an additional
simulation with 100 agents available online at: https:
//1drv.ms/f/s!AsiVOlIEkwNEgX2o1eV2hJ_bbaQU.
8 Conclusions
In this paper, we presented a hybrid formulation for
the persistent coverage problem in an environment sub-
ject to stochastic intruders. This formulation was moti-
vated in part by extravehicular applications of the NASA
Mini AERCam. Agents operated with finite power re-
sources and were required to periodically return to a re-
fueling station while patrolling assigned latitude parti-
tions along the surface of an ellipsoid. Formal guaran-
tees were established on the ability of agents to inter-
cept all intruders and the efficacy of the algorithm was
demonstrated in simulation. This approach succeeds our
previous work in Bentz & Panagou (2017) and Bentz
& Panagou (2018) by extending the guarantees on in-
truder interception to an arbitrary number of collision
avoidance maneuvers. It also removes singularities in the
sensing function definition and redefines the guard con-
ditions in a manner that supports a more effective use
of local coverage around the vicinity of intruder impact
points.
9 Appendix
9.1 Additional Derivations for Local Coverage Strategy
Our local coverage control laws are derived via differ-
entiation of (10) of which we seek to reduce the rate
of growth. It is a volume integral, so a few mathemat-
ical preliminaries are required. Recall the generalized
transport theorem (GTT) (Slattery 1999): d
f dV =
dt
(cid:82)
R(s)
ei(t) is the rate of change of the coverage error due to
the motion of the agents while ek(t) is the rate of change
of the coverage error due to a contrived information de-
cay surrounding the predicted impact point of particle
k on C. Our strategy is to control the agents' kinemat-
ics, recovered in the derivative of ei(t), to decrease (25).
Note that we do not presume that our local coverage
strategy provides any additional bounds on (10). Nor do
we provide guarantees on the rate of growth of this con-
trived quantity. Curtailing the growth of the coverage
error simply imparts the desired effect of active explo-
ration in the vicinity of impact points into our system.
Using this strategy, the agents actively seek to increase
their rate of coverage by rotating and/or translating Si
to be encompass the most uncovered space in the local
vicinity.
Taking the derivative of ei(t) with respect to time yields:
13
Expand d
dt (Si(qi(t), p)):
(Si(qi(t), p)) =
∂Si
∂xi
xi(t) +
∂Si
∂yi
yi(t) +
(sin Φ sin Θ cos Ψ − cos Φ sin Ψ) +
zi(t) +
∂Si
∂Ψi
Ψi(t) +
∂Si
∂Θi
Θi(t) =
(cid:18) ∂Si
∂xi
∂Si
∂yi
cos Θ sin Ψ − ∂Si
∂zi
sin Θ
(cid:19)
ui(t)
(sin Φ sin Θ sin Ψ + cos Φ cos Ψ) +
sin Φ cos Θ
(cos Φ sin Θ cos Ψ + sin Φ sin Ψ) +
(cos Φ sin Θ sin Ψ − sin Φ cos Ψ) +
cos Φ cos Θ
sin Φ sec Θ +
∂Si
∂Θi
cos Φ
ri(t) +
cos Φ sec Θ − ∂Si
∂Θi
sin Φ
si(t).
(cid:19)
cos Θ cos Ψ +
(cid:19)
(cid:19)
vi(t)
wi(t)
∂Si
∂zi
∂Si
∂zi
(cid:19)
Now introduce the following definitions:
(cid:48)(cid:48)
h
(C(cid:63)C ( p) − Q(t, p))Si(qi(t), p)C ( p)
∂Q(t, p)
∂t
d p,
(cid:48)
h
(cid:48)
h
(cid:48)
h
(cid:48)
h
(cid:48)
h
(C(cid:63)C ( p) − Q(t, p))C ( p)
(C(cid:63)C ( p) − Q(t, p))C ( p)
(C(cid:63)C ( p) − Q(t, p))C ( p)
(C(cid:63)C ( p) − Q(t, p))C ( p)
(C(cid:63)C ( p) − Q(t, p))C ( p)
cos Θ cos Ψ +
∂Si
∂yi
cos Θ sin Ψ − ∂Si
∂zi
(sin Φ sin Θ cos Ψ − cos Φ sin Ψ) +
(cos Φ sin Θ cos Ψ + sin Φ sin Ψ) +
(cid:19)
(cid:19)
sin Φ sec Θ +
∂Si
∂Θi
cos Φ sec Θ − ∂Si
∂Θi
cos Φ
sin Φ
d p,
d p.
(cid:19)
sin Θ
d p,
∂Si
∂yi
∂Si
∂yi
(sin Φ sin Θ sin Ψ + cos Φ cos Ψ) +
∂Si
∂zi
(cos Φ sin Θ sin Ψ − sin Φ cos Ψ) +
∂Si
∂zi
d
dt
+
+
+
(cid:18) ∂Si
(cid:18) ∂Si
(cid:18) ∂Si
∂xi
∂xi
∂Ψi
(cid:90)
(cid:90)
(cid:90)
(cid:90)
(cid:90)
(cid:90)
Di
Di
Di
Di
Di
ai0(t, Q(t, p)) =
ai1(t, Q(t, p)) =
ai2(t, Q(t, p)) =
ai3(t, Q(t, p)) =
ai4(t, Q(t, p)) =
ai5(t, Q(t, p)) =
Di
One can then rewrite (26) as:
∂Si
∂zi
∂Si
∂yi
∂Si
∂yi
(cid:18) ∂Si
∂Ψi
∂xi
∂xi
(cid:18) ∂Si
(cid:18) ∂Si
(cid:18) ∂Si
(cid:18) ∂Si
(cid:18) ∂Si
∂xi
∂Ψi
∂Ψi
(27)
(28)
(29)
d p,
(30)
d p,
(31)
(32)
(33)
(cid:19)
(cid:19)
sin Φ cos Θ
cos Φ cos Θ
ei(t) = ai0(t, Q(t, p)) − ui(t)ai1(t, Q(t, p)) − vi(t)ai2(t, Q(t, p)) − wi(t)ai3(t, Q(t, p)) − ri(t)ai4(t, Q(t, p)) − si(t)ai5(t, Q(t, p)).
(34)
(cid:90)
(cid:18)
(cid:48)(cid:48)
h
Di
ei(t) =
(C (cid:63)C (p)−Q(t, p))Si(qi(t), p)C (p)
∂Q(t, p)
∂t
(cid:19)
− h
(cid:48)
(C (cid:63)C (p) − Q(t, p))
d
dt
(Si(qi(t), p))C (p)
dp.
(26)
The sensing footprint is independent of Φi assuming that
the centerline of the spherical sector is aligned with the
xBi axis. d
dt (Si(qi(t), p)) is expanded in (27) and through
the definitions in (28-33) one may restate (26) as (34). If
one were to command zero inputs to this system, it be-
comes clear that ai0(t, Q(t, p)) may be physically inter-
preted as the rate at which the coverage rate is reducing
due to information saturation at any particular position
and orientation of the sensing footprint, Si. As the foot-
print remains stationary, there are diminishing returns
on the value of newly acquired information. Thus, the
additional terms in (34) allow for the coverage rate to be
increased by mobilizing the sensor. One strategy is that
of (11).
9.2 Formal Hybrid Formulation
x2
i
To provide a compact notation in this section, define ´fi =
(zC,r+ri)2 . The coverage strategy
(xC,r+ri)2 +
for agent i is represented by the hybrid automaton in Fig.
2, described by the following entities (Lygeros 2004):
(yC,r+ri)2 +
y2
i
z2
i
14
i
i
,
,
i
i
i
i
i
(cid:35)
(cid:3)T
(cid:3)T
,
0 R2
i
upim
i
(cid:105)T
(cid:3)T
wptm
wstm
f (ζi4, qi) = R [ustm
0 rloc
i
qrtb
i
i
wpim
sloc
i
rrtb
i
qpim
i
qptm
,
i
0 0 0 ]T where R =
srtb
i
rpim
i
rptm
i
,
spim
i
sptm
i
• A set of discrete states: Zi = {ζi0, ζi1, ζi2, ζi3, ζi4},
• A set of continuous states: qi = {xi, yi, zi, Φi, Θi, Ψi},
• A vector field:
vloc
i wloc
vrtb
i wrtb
vpim
i
vptm
i
vstm
i
f (ζi0, qi) = R(cid:2)uloc
f (ζi1, qi) = R(cid:2)urtb
f (ζi2, qi) = R(cid:104)
f (ζi3, qi) = R(cid:2)uptm
(cid:34)R1 0
(cid:3) ∧ Ψi ∈
∧ Φi ∈ [−π, +π] ∧ Θi ∈ (cid:2)−π
(cid:1)},
(cid:0)ip ∈ {2, ..., N} =⇒ ¯zip−1 ≤ zi ≤ ¯zip−2
(cid:0)ip ∈ {2, ..., N} =⇒ zi < ¯zip−1 ∨ zi > ¯zip−2
Dom (ζi1) = {qi ∈ R6 ´fi ≥ 1},
Dom (ζi2) = {qi ∈ R6 ´fi ≥ 1},
Dom (ζi3) = {qi ∈ R6 ´fi ≥ 1 ∧
Dom (ζi4) = {qi ∈ R6 ´fi ≥ 1},
• A set of initial states: {ζi3} × {qi ∈ R6 pi = F
• A domain: Dom (ζi0) = {qi ∈ R6 ´fi ≥ 1 ∧
• A set of edges: E = {(ζi0, ζi1) , (ζi0, ζi2) , (ζi0, ζi3) ,
(ζi0, ζi4) , (ζi1, ζi3) , (ζi2, ζi0) , (ζi2, ζi1) , (ζi2, ζi3) ,
(ζi2, ζi4) , (ζi3, ζi0) , (ζi3, ζi2) , (ζi3, ζi4) , (ζi4, ζi0) ,
(ζi4, ζi2) , (ζi4, ζi3) ,},
• A set of guard conditions:
[−π, +π]},
(cid:1)},
2 , +π
2
tjF
pid(cid:107) > ε1
pid(cid:107) ≤ ε1 ∧ µi = 0 ∧ t ≥
G (ζi0, ζi1) = {ip = 1∧ tiF ≥ T (cid:63) − πgC0
2U agt
max
(cid:0)xC0,r + zC0,r
(cid:1)},
(cid:17)},
G (ζi0, ζi2) = {(∃k i = ik) ∧(cid:16)(cid:107)pi − projCµi
G (ζi0, ζi3) = {ip (cid:54)= 1 ∧(cid:0)zi < ¯zip−1 ∨ zi > ¯zip−2
(cid:1)},
(cid:16)
(cid:17)},
G (ζi0, ζi4) = {(cid:107)pi − pj(cid:107) ≤ R ∧ ipr (cid:54)= argmaxj
G (ζi2, ζi0) = {(cid:0)t ≥ tck ∧
G (ζi1, ζi3) = {(cid:107)pi − F(cid:107) ≤ ε1 ∧ tiF = T (cid:63)},
(cid:0)(cid:0)ip ∈ {2, ..., N} ∧ ¯zip−1 ≤ zi ≤ ¯zip−2
(cid:1) ∨
(cid:1)(cid:17)(cid:17)(cid:17) ∨
(cid:16)
(cid:0)xC0,r + zC0,r
(cid:17)},
(cid:16)
ip = 1 ∧ tiF < T (cid:63) − πgC0
2U agt
max
t < tck ∧ (cid:107)pi − projCµi
pid(cid:107) ≤ ε1 ∧ µi = 0
(cid:0)xC0,r + zC0,r
(cid:1)}
G (ζi2, ζi1) = {(cid:107)pi − projCµi
tck ∧ ip = 1 ∧ tiF ≥ T (cid:63) − πgC0
tck ∧ ip ∈ {2, ..., N} ∧(cid:0)zi < ¯zip−1 ∨ zi > ¯zip−2
(cid:1)},
2U agt
G (ζi2, ζi3) = {(cid:107)pi − projCµi
max
(cid:17)(cid:17) ∧ µi > 0},
(cid:16)
(cid:16)(cid:107)pi − pj(cid:107) > R, ∀j ∨ ipr = argmaxj
G (ζi2, ζi4) = G (ζi0, ζi4) ∨ {(cid:107)pi − projCµi
G (ζi3, ζi0) = {ip = 1 ∨(cid:0)ip (cid:54)= 1 ∧ ¯zip−1 ≤ zi ≤ ¯zip−2
(cid:1)},
(cid:17)(cid:17) ∧ µi > 0},
(cid:16)
(cid:16)(cid:107)pi − pj(cid:107) > R, ∀j ∨ ipr = argmaxj
G (ζi3, ζi4) = G (ζi0, ζi4) ∨ {(cid:107)pi − projCµi
(cid:17) < ε2 ∧
(cid:16) (cid:107)ni(cid:107)−ri
(cid:1)(cid:1)},
(cid:0)ip = 1 ∨ (cid:0)ip ∈ {2, ..., N} ∧ ¯zip−1 ≤ zi ≤ ¯zip−2
(cid:16) (cid:107)ni(cid:107)−ri
(cid:17) < ε2},
(cid:17) < ε2 ∧
(cid:16) (cid:107)ni(cid:107)−ri
(cid:1)(cid:1)}.
(cid:0)ip (cid:54)= 1 ∧(cid:0)zi < ¯zip−1 ∨ zi > ¯zip−2
pid(cid:107) ≤ ε1 ∧ µi = 0 ∧ t ≥
pid(cid:107) ≤ ε1 ∧
G (ζi4, ζi2) = {fi = 1 ∧ ln
G (ζi4, ζi3) = {fi = 0 ∧ ln
G (ζi4, ζi0) = {fi = 0 ∧ ln
G (ζi3, ζi2) = G (ζi0, ζi2) ,
pid(cid:107) ≤ ε1 ∧
(γ+µi)R−ri
(γ+µi)R−ri
(γ+µi)R−ri
tjF
tjF
• A reset map: R (ζi0, ζi2, fi) = {1}, R (ζi0, ζi4, µi) =
• Additional parameters include a clock set: C = {tiF}, a
flag: fi ∈ {0, 1}, an assignment index µi = {0, ..., N − 1}
and,
{µi + 1}, R (ζi1, ζi3, tiF ) = {0}, R (ζi2, ζi0, fi) =
{0 if t ≥ tck; 1 otherwise}, R (ζi2, ζi1, fi) = {0},
R (ζi2, ζi3, fi) = {0}, R (ζi2, ζi4, µi) = {0 if (cid:107)pi−projCµi
≤ ε1 ∧(cid:16)(cid:107)pi − pj(cid:107) > R, ∀j ∨ ipr = argmaxj
(cid:16)(cid:107)pi − pj(cid:107) > R, ∀j ∨ ipr = argmaxj
0; µi + 1 otherwise}, R (ζi3, ζi2, fi) = {1},
R (ζi3, ζi4, µi) = {0 if (cid:107)pi − projCµi
(cid:16)
(cid:17)(cid:17) ∧ µi > 0;
tjF
pid(cid:107) ≤ ε1 ∧
(cid:17)(cid:17) ∧ µi >
µi + 1 otherwise}, R (ζi4, ζi0, µi) = {0}, and continuous
states do not reset between transitions.
(cid:16)
tjF
pid(cid:107)
References
Beard, R. W. (2008), Quadrotor dynamics and control.
lecture notes. http://scholarsarchive.byu.edu/
cgi/viewcontent.cgi?article=2324&context=
facpub.
Bentz, W. & Panagou, D. (2017), Persistent coverage of
a two-dimensional manifold subject to time-varying
disturbances, in 'Proc. of the 56th IEEE Conference
on Decision and Control', Melbourne, Australia.
Bentz, W. & Panagou, D. (2018), Energy-aware persis-
tent coverage and intruder interception in 3D dynamic
environments, in 'Proc. of the 2018 American Control
Conference', Milwaukee, WI.
Bokareva, T., Hu, W., Kanhere, S., Ristic, B., Gordon,
N., Bessell, T., Rutten, M. & Jha, S. (2006), Wireless
sensor networks for battlefield surveillance, in 'Pro-
ceedings of the land warfare conference', pp. 1 -- 8.
Cheng, P., Keller, J. & Kumar, V. (2008), Time-optimal
UAV trajectory planning for 3D urban structure cov-
erage, in 'Proc. of the 2008 IEEE/RSJ International
Conference on Intelligent Robots and Systems', Nice,
France, pp. 2750 -- 2757.
Choset, H. & Kortenkamp, D. (1999), 'Path planning
and control for free-flying inspection robot in space',
Journal of Aerospace Engineering 12(2), 74 -- 81.
Cortes, J., Mart´ınez, S., Karatas, T. & Bullo, F. (2004),
'Coverage control for mobile sensing networks', IEEE
Trans. on Robotics and Automation 20(2), 243 -- 255.
Fredrickson, S. E., Duran, S., Howard, N. & Wa-
genknecht, J. D. (2004), Application of the mini AER-
cam free flyer for orbital inspection, in 'Defense and
Security', International Society for Optics and Pho-
tonics, pp. 26 -- 35.
Hexsel, B., Chakraborty, N. & Sycara, K. (2013), Dis-
tributed coverage control for mobile anisotropic sen-
sor networks, Technical Report CMU-RI-TR-13-01,
Robotics Institute, Pittsburgh, PA.
Hokayem, P., Stipanov´ıc, D. & Spong, M. (2007), On
persistent coverage control, in 'Proc. of the 46th IEEE
Conference on Decision and Control', New Orleans,
LA, USA, pp. 6130 -- 6135.
Hollinger, G. A., Englot, B., Hover, F. S., Mitra, U. &
Sukhatme, G. S. (2013), 'Active planning for under-
water inspection and the benefit of adaptivity', The
International Journal of Robotics Research 32(1), 3 --
18.
Hubel, N., Hirche, S., Gusrialdi, A., Hatanaka, T., Fu-
jita, M. & Sawodny, O. (2008), Coverage control with
information decay in dynamic environments, in 'Proc.
of the 17th IFAC World Congress', Seoul, South Ko-
rea, pp. 4180 -- 4185.
Hussein, I. I. & Stipanovi´c, D. M. (2007), 'Effective cov-
erage control for mobile sensor networks with guar-
anteed collision avoidance', IEEE Trans. on Control
Systems Technology 15(4), 642 -- 657.
Ivory, J. (1798), 'VIII. A new series for the rectification
of the ellipsis; together with some observations on the
evolution of the formula (a2 + b2− 2ab cos θ)n', Trans-
actions of the Royal Society of Edinburgh 4(2), 177190.
Liu, B., Dousse, O., Nain, P. & Towsley, D. (2013),
'Dynamic coverage of mobile sensor networks', IEEE
Transactions on Parallel and Distributed systems
24(2), 301 -- 311.
Lygeros, J. (2004), Lecture notes on hybrid sys-
https://robotics.eecs.berkeley.edu/
tems.
~sastry/ee291e/lygeros.pdf.
Mitchell, D., Corah, M., Chakraborty, N., Sycara, K. &
Michael, N. (2015), Multi-robot long-term persistent
coverage with fuel constrained robots, in 'Proc. of the
2015 IEEE International Conference on Robotics and
Automation', IEEE, pp. 1093 -- 1099.
Murphy, R. R., Tadokoro, S., Nardi, D., Jacoff, A., Fior-
ini, P., Choset, H. & Erkmen, A. M. (2008), Search and
rescue robotics, in 'Springer Handbook of Robotics',
15
stations', IEEE Transactions on Robotics 31(3), 521 --
535.
Springer Berlin Heidelberg, pp. 1151 -- 1173.
Palacios-Gas´os, J. M., Montijano, E., Sagues, C. &
Llorente, S. (2016a), Multi-robot persistent coverage
using branch and bound, in 'Proc. of the 2016 Amer-
ican Control Conference', pp. 5697 -- 5702.
Palacios-Gas´os, J. M., Montijano, E., Sagu´es, C. &
Llorente, S. (2016b), Multi-robot persistent coverage
with optimal times, in 'Proc. of the 55th IEEE Confer-
ence on Decision and Control', IEEE, pp. 3511 -- 3517.
Palacios-Gas´os, J. M., Talebpour, Z., Montijano, E.,
Sagu´es, C. & Martinoli, A. (2017), Optimal path plan-
ning and coverage control for multi-robot persistent
coverage in environments with obstacles, in 'Proc. of
the 2017 IEEE International Conference on Robotics
and Automation', pp. 1321 -- 1327.
Panagou, D., Stipanovi´c, D. M. & Voulgaris, P. G.
(2016), 'Distributed coordination control for multi-
robot networks using lyapunov-like barrier functions',
IEEE Transactions on Automatic Control, to appear
61(3), 617 -- 632.
Pasqualetti, F., Zanella, F., Peters, J. R., Spindler, M.,
Carli, R. & Bullo, F. (2014), 'Camera network coordi-
nation for intruder detection', IEEE Transactions on
Control Systems Technology 22(5), 1669 -- 1683.
Slattery, J. C. (1999), Advanced Transport Phenomena,
Cambridge UP.
Smith, R. N., Schwager, M., Smith, S. L., Jones, B. H.,
Rus, D. & Sukhatme, G. S. (2011), 'Persistent ocean
monitoring with underwater gliders: Adapting sam-
pling resolution', Journal of Field Robotics 28(5), 714 --
741.
Smith, S. L., Schwager, M. & Rus, D. (2012), 'Persis-
tent robotic tasks: Monitoring and sweeping in chang-
ing environments', IEEE Transactions on Robotics
28(2), 410 -- 426.
Song, C., Feng, G., Fan, Y. & Wang, Y. (2011), 'Decen-
tralized adaptive awareness coverage control for multi-
agent networks', Automatica 47(12), 2749 -- 2756.
Song, C., Liu, L., Feng, G., Wang, Y. & Gao, Q. (2013),
'Persistent awareness coverage control for mobile sen-
sor networks', Automatica 49(6), 1867 -- 1873.
Stipanovi´c, D. M., Valicka, C., Tomlin, C. J. & Bewley,
T. R. (2013), 'Safe and reliable coverage control', Nu-
merical Algebra, Control and Optimization 3, 31 -- 48.
Vincenty, T. (1975a), 'Direct and inverse solutions of
geodesics on the ellipsoid with application of nested
equations', Survey review 23(176), 88 -- 93.
Vincenty, T. (1975b), Geodetic inverse solution between
antipodal points. Scanned by Charles Karney from the
copy in R.H. Rapp's library at Ohio State University.
The report is a work of the U.S. Government and so
is in the public domain.
Xie, L. & Zhang, X. (2013), 3D clustering-based cam-
era wireless sensor networks for maximizing lifespan
with minimum coverage rate constraint, in 'Proc. of
the 2013 IEEE Global Communications Conference
(GLOBECOM)', pp. 298 -- 303.
Yu, J., Karaman, S. & Rus, D. (2015), 'Persistent mon-
itoring of events with stochastic arrivals at multiple
16
|
1806.10460 | 2 | 1806 | 2019-08-14T13:59:36 | On Coalitional Manipulation for Multiwinner Elections: Shortlisting | [
"cs.MA",
"cs.CC",
"cs.DS",
"cs.GT"
] | Shortlisting of candidates--selecting a group of "best" candidates--is a special case of multiwinner elections. We provide the first in-depth study of the computational complexity of strategic voting for shortlisting based on the perhaps most basic voting rule in this scenario, l-Bloc (every voter approves l candidates). In particular, we investigate the influence of several tie-breaking mechanisms (e.g., pessimistic versus optimistic) and group evaluation functions (e.g., egalitarian versus utilitarian). Among other things, conclude that in an egalitarian setting strategic voting may indeed be computationally intractable regardless of the tie-breaking rule. Altogether, we provide a fairly comprehensive picture of the computational complexity landscape so far in the literature of this neglected scenario. | cs.MA | cs |
On Coalitional Manipulation for Multiwinner
Elections: Shortlisting∗
Robert Bredereck, Andrzej Kaczmarczyk, and Rolf Niedermeier
TU Berlin, Faculty IV, Algorithmics and Computational Complexity,
Ernst-Reuter-Platz 7, D-10587 Berlin, Germany
August 15, 2019
Abstract
Shortlisting of candidates -- selecting a group of "best" candidates -- is a special case of
multiwinner elections. We provide the first in-depth study of the computational com-
plexity of strategic voting for shortlisting based on the perhaps most basic voting rule in
this scenario, ℓ-Bloc (every voter approves ℓ candidates). In particular, we investigate
the influence of several tie-breaking mechanisms (e.g., pessimistic versus optimistic)
and group evaluation functions (e.g., egalitarian versus utilitarian). Among other things,
conclude that in an egalitarian setting strategic voting may indeed be computationally
intractable regardless of the tie-breaking rule. Altogether, we provide a fairly compre-
hensive picture of the computational complexity landscape of this scenario.
Keywords: computational social choice; utility aggregation; strategic voting;
parameterized computational complexity; tie-breaking; SNTV; Bloc
1
Introduction
A university wants to select the two favorite pieces in classical style to be played
during the next graduation ceremony. The students were asked to submit their fa-
vorite pieces. Then a jury consisting of seven members (three juniors and four
seniors) from the university staff selects from the six most frequently submitted
pieces as follows: Each jury member approves two pieces and the two winners are
those obtaining most of the approvals. The six options provided by the students
∗A preliminary version of this article appeared in the Proceedings of the Twenty-Sixth Interna-
tional Joint Conference on Artificial Intelligence (IJCAI '17) (Bredereck et al., 2017).
1
are "Beethoven: Piano Concerto No. 5 (b1)", "Beethoven: Symphony No. 6 (b2)",
"Mozart: Clarinet Concerto (m1)", "Mozart: Jeunehomme Piano Concerto (m2)",
"Uematsu: Final Fantasy (o1)", and "Badelt: Pirates of the Caribbean (o2)." The
three junior jury members are excited about recent audio-visual presentation arts
(both interactive and passive) and approve o1 and o2. Two of the senior jury mem-
bers are Mozart enthusiasts, and the other two senior jury members are Beethoven
enthusiasts. Hence, when voting truthfully, two of them would approve the two
Mozart pieces and the other two would approve the two Beethoven pieces. The
winners of the selection process would be o1 and o2, both receiving three approvals
whereas every other piece receives only two approvals.
The senior jury members meet every Friday evening and discuss important
academic issues including the graduation ceremony music selection processes, why
"movie background noise" recently counts as classical music,1 and the influence of
video games on the ability of making important decisions. During such a meeting
they agreed that a graduation ceremony should always be accompanied by pieces
of traditional, first-class composers. Thus, finally all four senior jury members
decide to approve b1 and m1 so these two pieces are played during the graduation
ceremony.
Already this toy example above (which will be the basis of our running ex-
ample throughout the paper) illustrates important aspects of strategic voting in
multiwinner elections. In case of coalitional manipulation for single-winner elec-
tions (where a coalition of voters casts untruthful votes in order to influence the
outcome of an election; a topic which has been intensively studied in the liter-
ature (Brandt et al., 2016; Rothe, 2015)) one can always assume that a coalition
of manipulators agrees on trying to make a distinguished alternative win the elec-
tion. In case of multiwinner elections, however, already determining concrete pos-
sible goals of a coalition seems to be a non-trivial task: There may be exponen-
tially many different outcomes which can be reached through strategic votes of the
coalition members and each member could have its individual evaluation of these
outcomes.
Multiwinner voting rules come up very naturally whenever one has to select
from a large set of candidates a smaller set of "the best" candidates. Surpris-
ingly, although at least as practically relevant as single-winner voting rules, the
multiwinner literature is much less developed than the single-winner literature. In
recent years (see a survey of Faliszewski et al. (2017a)), however, research into
multiwinner voting rules, their properties, and algorithmic complexity grew signif-
icantly (Aziz et al., 2015, 2017a,b; Barber`a and Coelho, 2008, 2010; Barrot et al.,
2013; Betzler et al., 2013; Elkind et al., 2017; Faliszewski et al., 2016, 2017b;
1http://www.classicfm.com/radio/hall-of-fame/
2
Lackner and Skowron, 2018; Meir et al., 2008; Obraztsova et al., 2013; Skowron,
2015; Skowron et al., 2015). When selecting a group of winning candidates, var-
ious criteria can be interesting; namely, proportional representation, diversity, or
excellence (see Elkind et al. (2017)). We focus on the last scenario. Here the goal
is to select the best (say highest-scoring) group of candidates obtaining a so-called
short list.
Shortlisting comes very naturally in the context of selection committees; for
instance, for human resources departments that need to select, for a fixed number
of positions, the best qualified applicants. A standard way of candidate selection
in the context of shortlisting is to use scoring-based voting rules. We focus on the
two most natural ones: SNTV (single non-transferable vote -- each voter gives one
point to one candidate) and ℓ-Bloc (each voter gives one point to each of ℓ different
candidates, so SNTV is the same as 1-Bloc).2 Obviously, for such voting rules it
is trivial to determine the score of each individual candidate. The main goal of
our work is to model and understand coalitional manipulation in a computational
sense -- that is, to introduce a formal description of how a group of manipulators
can influence the election outcome by casting strategic votes and whether it is pos-
sible to find an effective strategy for the manipulators to change the outcome in
some desired way. In this fashion, we complement well-known work: manipu-
lation for single-winner rules initiated by Bartholdi III et al.
(1989), coalitional
manipulation for single-winner rules initiated by Conitzer et al. (2007), and (non-
coalitional) manipulation for multiwinner rules initiated by Meir et al. (2008). In
coalitional manipulation scenarios, given full knowledge about other voters' pref-
erences, one has a set of manipulative voters who want to influence the election
outcome in a favorable way by casting their votes strategically.
To come up with a useful framework for coalitional manipulation for multiwin-
ner elections, we first have to identify the exact mathematical model and questions
to be asked. A couple of straightforward extensions of coalitional manipulation
for single-winner elections or (non-coalitional) manipulation for multiwinner elec-
tions do not fit. Extending the single-winner variant directly, one would probably
assume that the coalition agrees on making a distinguished candidate part of the
winners or that the coalition agrees on making a distinguished candidate group
part of the winners. The former is unrealistic because in multiwinner settings one
typically cares about more than just one candidate -- especially in shortlisting it is
natural that one wants rather some group of "similarly good" candidates to be win-
ning instead of only one representative of such a group. The latter, that is, agreeing
2Although, in general, ℓ-Bloc does not satisfy committee monotonicity which is considered as
a necessary condition for shortlisting (Faliszewski et al., 2017a), this rule seems quite frequent in
practice -- for example The Board of Research Excellence in Poland was elected using a variant
of ℓ-Bloc (Ministry of Science and Higher Education of the Republic of Poland, 2019).
3
on a distinguished candidate group to be part of the winners is also problematic
since there may be exponentially many "equally good" candidate groups for the
coalition. Notably, this was not a problem in the single-winner case; there, one
can test for a successful manipulation towards each possible candidate avoiding an
exponential increase of the running time (compared to the running time of such a
test for a single candidate).
(2008).
We address the aforementioned issue of modeling coalitional manipulation for
multiwinner election by extending a single-manipulator model for multiwinner
rules of Meir et al.
In their work, the manipulator specifies the utility
of each candidate and the utility for a candidate group is obtained by adding up the
utilities of each group member. We build on their idea and let each manipulator
report the utility of each candidate. However, aggregating utilities for a coalition
of manipulators (in other words, computing a collective utility of manipulators) be-
comes nontrivial -- especially for a coalition of manipulators who have diversified
utilities for single candidates but still have strong incentives to work together (e.g.,
as we have seen in our introductory example).
Our Contributions. We devise a formal description of coalitional manipula-
tion in multiwinner elections arriving at a new, nontrivial model capturing two types
of manipulators' attitudes and a few natural ways of utility aggregation. To this
end, in our model, we distinguish between optimistic and pessimistic manipulators
and we formalize aggregation of utilities in a utilitarian and an egalitarian way.
Using our model, we analyzed the computational complexity of finding a suc-
cessful manipulation for a coalition of voters, assuming elections under rules from
the family of ℓ-Bloc voting rules. We show that, even for these fairly simple rules,
the computational complexity of coalitional manipulation is diverse. In particu-
lar, we observed that finding a manipulation maximizing the utility of a worst-off
manipulator (egalitarian aggregation) is NP-hard (regardless of the manipulators'
attitude). This result stands in sharp contrast to the polynomial-time algorithms
that we give for finding a manipulation maximizing the sum of manipulators' util-
ities (utilitarian aggregation). Additionally, we show how to circumvent the cum-
bersome NP-hardness for the egalitarian aggregation providing an (FPT) algorithm
that is efficient for scenarios with few manipulators and few different values of util-
ity that manipulators assign to agents. We survey all our computational complexity
results in Table 1 (Section 6).
Related Work. To the best of our knowledge, there is no previous work on
coalitional manipulation in the context of multiwinner elections. We refer to re-
cent textbooks for an overview of the huge literature on single-winner (coalitional)
manipulation (Brandt et al., 2016; Rothe, 2015). Most relevant to our work, Lin
(2011) showed that coalitional manipulation in single-winner elections under ℓ-
4
Approval is solvable in linear time by a greedy algorithm. Meir et al. (2008) intro-
duced (non-coalitional) manipulation for multiwinner elections. While pinpointing
manipulation for several voting rules as NP-hard, they showed that manipulation
remains polynomial-time solvable for Bloc (which can be interpreted as a mul-
tiwinner equivalent of 1-Approval). Obraztsova et al. (2013) extended the latter
result for different tie-breaking strategies and identified further tractable special
cases of multiwinner scoring rules but conjectured manipulation to be hard in gen-
eral for (other) scoring rules. Summarizing, Bloc is simple but comparably well-
studied, and hence we selected it as a showcase for our study of the presumably
computationally harder coalitional manipulation.
Organization. Section 2 introduces basic notation and formal concepts. In
Section 3, we develop our model for coalitional manipulation in multiwinner elec-
tions. Its variants respect different ways of evaluating candidate groups (utilitarian
vs. egalitarian) and two kinds of manipulators behavior (optimistic vs. pessimistic).
In Section 4, we present algorithms and complexity results for computing the out-
put of several tie-breaking rules that allow to model optimistic and pessimistic ma-
nipulators. In Section 5, we formally define the coalitional manipulation problem
and explore its computational complexity using ℓ-Bloc as a showcase. We refer to
our conclusion and Table 1 (Section 6) for a detailed overview of our findings.
2 Preliminaries
For a positive integer n, let [n] := {1, 2, . . . , n}. We use the toolbox of parameter-
ized complexity (Cygan et al., 2015; Downey and Fellows, 2013; Flum and Grohe,
2006; Niedermeier, 2006) to analyze the computational complexity of our prob-
lems in a fine-grained way. To this end, we always identify a parameter ρ that is
typically a positive integer. We call a problem parameterized by ρ fixed-parameter
tractable (in FPT) if it is solvable in f (ρ) · IO(1) time, where I is the size of
a given instance encoding, ρ is the value of the parameter, and f is an arbitrary
computable (typically super-polynomial) function. To preclude fixed-parameter
tractability, we use an established complexity hierarchy of classes of parameterized
problems, FPT ⊆ W[1] ⊆ W[2] ⊆ · · · ⊆ XP. It is widely believed that all in-
clusions are proper. The notions of hardness for parameterized classes are defined
through parameterized reductions similar to classical polynomial-time many-one
reductions -- in this work, it suffices to ensure that the value of the parameter in the
problem we reduce to depends only on the value of the parameter of the problem
we reduce from. Occasionally, we use a combined parameter ρ′ + ρ′′ which is a
more explicit way of expressing a parameter ρ = ρ′ + ρ′′.
An election (C, V ) consists of a set C of m candidates and a multiset V of
5
n votes. Votes are linear orders over C -- for example, for C = {c1, c2, c3} we write
c1 ≻v c2 ≻v c3 to express that candidate c1 is the most preferred and candidate c3
is the least preferred according to vote v. We write ≻ if the corresponding vote is
clear from the context.
A multiwinner voting rule3 is a function that, given an election (C, V ) and an
integer k ∈ [C], outputs a family of co-winning size-k subsets of C representing
the co-winning k-excellence-groups. We use k-egroup as an abbreviation for k-
excellence-group; we also use egroup if the size of an excellence-group is either not
relevant or clear from the context. The reason we do not use the established term
"committee" is that in shortlisting applications "committee" traditionally rather
refers to voters and not to candidates.
We consider scoring rules -- multiwinner voting rules that assign points to can-
didates based on their positions in the votes. By score(c), we denote the total
number of points that candidate c obtains, and we use scoreV ′(c) when restricting
the election to a subset V ′ ⊂ V of voters. A (multiwinner) scoring rule selects a
family X of co-winning k-egroups with the maximum total sum of scores. It holds
that X ∈ X if and only if ∀c ∈ X, c′ ∈ C \ X : score(c) ≥ score(c′). We focus
on the family of ℓ-Bloc multiwinner voting rules, that is a family of scoring rules
that assign, for each vote, one point to each of the top ℓ < C candidates.4
Example 1. Referring back to our introductory example, we have a set C = {b1,
b2, m1, m2, o1, o2} of candidates and a set V = {vy1, vy2, vy3, vb1, vb2, vm1, vm2}
of voters. The voters vy1, vy2 , and vy3 represent the three junior jury members,
whereas vb1 , vb2 and vm1 , vm2 represent, respectively, the Beethoven and Mozart
enthusiasts among the senior jury members. In the example, we described a way
of manipulating the election by the senior jury members which leads to selecting
two music pieces. There are several ways to illustrate this manipulation using our
model. Below we present one of the possible sets of casted votes that represents
the manipulated election:
vy1, vy2, vy3 :
vb1, vb2, vm1, vm2 :
o1 ≻ o2 ≻ b1 ≻ b2 ≻ m1 ≻ m2,
b1 ≻ m1 ≻ b2 ≻ m2 ≻ o1 ≻ o2.
Following the introductory example, we are choosing an egroup of size k = 2.
Using the Bloc multiwinner voting rules (which coincides with our introductory
3Some literature use the name multiwinner voting correspondence for what we called multiwinner
voting rule. In that case, a multiwinner voting rule is required to return exactly one set of the desired
size. This is usually achieved by combining a multiwinner voting correspondence with a tie-breaking
rule.
4The case where ℓ coincides with the size k of the egroup is typically referred to as Bloc; 1-Bloc
corresponds to SNTV (Meir et al., 2008). The case where 1 < ℓ < k is also referred to as Limited
Vote (or Limited Voting).
6
example), the winning 2-egroup consist of candidates b1 and m1. However, under
the SNTV voting rule the situation would change, and the winners would be o1 and
b1. SNTV and Bloc alike output a single winning egroup in this example, and thus
tie-breaking is ineffective.
To select a single k-egroup from the set of co-winning k-egroups one has to
consider tie-breaking rules. A multiwinner tie-breaking rule is a mapping that,
given an election and a family of co-winning k-egroups, outputs a single k-egroup.
Among them, there is a set of natural rules that is of particular interest in order
to model the behavior of manipulative voters. Indeed, in case of a single manip-
ulator both pessimistic tie-breaking as well as optimistic tie-breaking have been
considered in addition to lexicographic and randomized tie-breaking (Meir et al.,
2008; Obraztsova et al., 2013). To model optimistic and pessimistic tie-breaking
in a meaningful manner5, we use the model introduced by Obraztsova et al. (2013)
in which a manipulative voter v is described not only by the preference order ≻v
of the candidates but also by a utility function u : C → N. To cover this in the tie-
breaking process, coalition-specific tie-breaking rules get -- in addition to the orig-
inal election, the manipulators' votes, and the co-winning excellence-groups -- the
manipulators' utility functions in the input. The formal implementations of these
rules and their properties are discussed in Subsection 3.2.
3 Model for Coalitional Manipulation
In this section, we formally define and explain our model and the respective vari-
ants. To this end, we discuss how we evaluate a k-egroup in terms of utility for a
coalition of manipulators and introduce tie-breaking rules that model optimistic or
pessimistic viewpoints of the manipulators.
3.1 Evaluating k-egroups
As already discussed in the introduction, one should not extend the model of coali-
tional manipulation for single-winner elections to multiwinner elections in the sim-
plest way (e.g., by assuming that the manipulators agree on some distinguished
5We cannot simply use ordinal preferences: Obraztsova et al. (2013) observed that already in
case of a single manipulator one cannot simply set the fixed lexicographic order of the manipu-
lators' preferences (resp. the reverse of it) over candidates to model optimistic (resp. pessimistic)
tie-breaking. For example, it is a strong restriction to assume that a manipulator would always prefer
its first choice together with its fourth choice towards its second choice together with its third choice.
It might be that only its first choice is really acceptable (in which case the assumption is reasonable)
or that the first three choices are comparably good but the fourth choice is absolutely unacceptable
(in which case the assumption is wrong).
7
candidate or on some distinguished egroup). Instead, we follow Meir et al. (2008)
and assume that we are given a utility function over the candidates for each manip-
ulator and a utility level which, if achieved, indicates a successful manipulation.
Meir et al. (2008) compute the utility of an egroup by summing up the utility val-
ues the manipulator assigns to each member of the egroup.
At first glance, summing up the utility values assigned by each manipulator
to each member of an egroup seems to be the most natural extension for a coali-
tion of manipulators. However, this utilitarian variant does not guarantee single
manipulators to gain non-zero utility. In extreme cases it could even happen that
some manipulator is worse off compared to voting sincerely, as demonstrated in
Example 2.
Example 2. Consider the election E = (C, V ) where C = {b1, b2, m1, m2, o1,
o2} is a set of candidates and V = {v1, v2, v3} is the following multiset of three
votes:
v1, v2 :
o1 ≻ o2 ≻ m1 ≻ m2 ≻ b1 ≻ b2,
v3 : m2 ≻ m1 ≻ b2 ≻ b1 ≻ o1 ≻ o2.
Additionally, consider two manipulators, u1 and u2, that report utilities to the can-
didates as depicted in the table below.
u(·)
u1
u2
b1
10
1
b2 m1 m2
5
0
7
2
4
5
o1
0
0
o2
0
0
Let us analyze the winning 2-egroup under the SNTV voting rule. Observe that
if the manipulators vote sincerely, then together they give one point to b1 and one
to m2 (one point from each manipulator). Combining the manipulators' votes with
the non-manipulative ones, the winning 2-egroup consists of candidates o1 and m2
that both have score two; no other candidate has greater or equal score, so tie-
breaking is unnecessary. The value of such a group is equal to seven according to
the utilitarian evaluation variant. Manipulator u2's utility is seven. However, both
manipulators can do better by giving their points to candidate b1. Then, the winners
are candidates o1 and b1, giving the total utility of 11 (according to the utilitarian
variant). Observe that in spite of growth of the total utility, the utility value gained
by u2, which is one, is lower than in the case of sincere voting.
In Example 2 manipulator u2 devotes its satisfaction to the utilitarian satisfac-
tion of the group of the manipulators; that is, u2 is worse off voting strategically
compared to voting sincerely. Despite this issue, however, the utilitarian viewpoint
can be justified if the manipulators are able to compensate such losses of utility
8
of some manipulators, for example, by paying money to each other. For cases
where manipulators cannot do that, we introduce two egalitarian evaluation vari-
ants. The (egroup-wise) egalitarian variant aims at maximizing the minimum sat-
isfaction of the manipulators with the whole k-egroup. Thus, intuitively, in the
egalitarian variant one is looking for an egroup that is maximizing satisfaction of
the least satisfied manipulator. The candidate-wise egalitarian variant aims at max-
imizing the manipulators' satisfaction resulting from the summation of the mini-
mum satisfactions every single candidate contributes. This variant is motivated,
for instance, by the following scenario. We associate candidates with investments,
manipulators with financial experts and utilities with a measure of a benefit the
experts predict for each investment. The candidate-wise egalitarian is then mod-
elling a "guaranteed" benefit of a selection of investments. The computed benefit is
"guaranteed" in a sense that, for each investment, one counts the benefit predicted
by the most pessimistic expertWe do not distinguish "candidate-wise utilitarian"
variant since this variant would be equivalent to the (regular) utilitarian variant.
We formalize the described variants of k-egroup evaluation (for r manipula-
tors) with Definition 1.
Definition 1. Given a set of candidates C, a k-egroup S ⊆ C, S = k, and a
family of manipulators' utility functions U = {u1, u2, . . . , ur} where ui : C → N,
we consider the following functions:
• utilU (S) := Pu∈U Pc∈S u(c),
• egalU (S) := minu∈U Pc∈S u(c),
• candegalU (S) := Pc∈S minu∈U u(c).
Intuitively, these functions determine the utility of a k-egroup S according to,
respectively, the utilitarian and the egalitarian variants of evaluating S by a group
of r manipulators (identifying manipulators with their utility functions). We omit
subscript U when U is clear from the context. To illustrate Definition 1 we apply
it in Example 3.
Example 3. Consider our example set of candidates C = {b1, b2, m1, m2, o1, o2}
and two manipulators u1, u2 whose utility functions over the candidates are de-
picted in the table below.
u(·)
u1
u2
b1
10
1
b2 m1 m2
0
5
2
7
4
5
o1
0
0
o2
0
0
Then, evaluating the utility of 2-egroup S = {b1, m1} applying the three different
evaluation variants gives:
9
• util(S) = (10 + 4) + (1 + 5) = 20,
• egal(S) = min{(10 + 4); (1 + 5)} = 6,
• candegal(S) = min{10, 1} + min{4, 5} = 5.
Analyzing Example 3, we observe that we can compute the utilitarian value
of egroup S by summing up the overall utilities that each candidate in S con-
tributes to all manipulators; for instance candidate b1 always contributes the utility
of 11 = 10+1 to the manipulators, independently of other candidates in the egroup.
Following this observation, instead of coping with a collection of utility function,
we can "contract" all manipulator's functions to a single function. The new func-
tion assigns each candidate a utility value equal to the sum of utilities that the
contracted functions assign to this candidate. Analogously, we can deal with the
candidate-wise egalitarian variant by taking the minimum utility associated to each
candidate as the the utility of this candidate in a new function. Thus, in both vari-
ants, we can consider a single utility function instead of a family of functions. The
conclusion from the above discussion is summarized in the following observation.
Observation 1. Without loss of generality, one can assume that there is a sin-
gle non-zero valued utility function over the candidates under the utilitarian or
candidate-wise egalitarian evaluation.
Proof. Consider a multiset of manipulators' utility functions U = {u1, u2, . . . , ur}
and a k-egroup S = {c1, c2, . . . , ck}. For the utilitarian variant, create a new utility
function u′ that assigns to each candidate the sum of utilities given to this candi-
date by all manipulators; that is, u′(c) := Pr
i=1 ur(c) for all c ∈ C. Technically,
we need also a special utility function u0 that assigns to each candidate the utility
of zero. We construct a new family U ′ consisting of function u′ and r − 1 copies
of function u0. Since function u′ is the only one which gives non-zero utility in
family U ′ and for each candidate this function returns the sum of utilities given to
a candidate by all functions from family U , it holds that utilU (S) = utilU ′(S).
We follow a similar strategy proving Observation 1 for the candidate-wise vari-
ant. We introduce a function u′ defined as u′(c) := minu∈U u(c) for each candi-
date c ∈ C. Then we create a new family of utility functions U ′ with function u′
and r − 1 zero-valued function u0. Naturally, egalU ′(S) = egalU (S) because
the values of function u′ for each candidate exactly follow the definition of the
candidate-wise egalitarian evaluation (see Definition 1) and u′ is the only non-zero
valued function in U ′.
10
3.2 Breaking Ties
Before formally defining our tie-breaking rules, we briefly discuss some necessary
notation and central concepts. Consider an election (C, V ), a size k for the egroup
to be chosen, and a scoring-based multiwinner voting rule R. We can partition the
set of candidates C into three sets C +, P , and C − as follows: The set C + contains
the confirmed candidates, that is, candidates that are in all co-winning k-egroups.
The set P contains the pending candidates, that is, candidates that are only in
some co-winning k-egroups. The set C − contains the rejected candidates, that is,
candidates that are in no co-winning k-egroup. Observe that C + ≤ k, C +∪P ≥
k, and that every candidate from P ∪C − receives fewer points than every candidate
from C +. Additionally, all candidates in P receive the same number of points.
We define the following families of tie-breaking rules which are considered in
this work. In order to define optimistic and pessimistic rules, we assume that in
addition to C +, P , and k, we are given a family of utility functions which are used
to evaluate the k-egroups as discussed in Subsection 3.1.
Lexicographic Flex. A tie-breaking F belongs to Flex if and only if ties are
broken lexicographically with respect to some predefined order >F of the candi-
dates from C. That is, F selects all candidates from C + and the top k − C +
candidates from P with respect to >F .
Optimistic F eval
opt , eval ∈ {util, egal, candegal}. A tie-breaking belongs to
if and only if it always selects some k-egroup S such that C + ⊆ S ⊆
F eval
opt
(C + ∪ P ) and there is no other k-egroup S′ with C + ⊆ S′ ⊆ (C + ∪ P ) and
eval(S′) > eval(S).
Pessimistic F eval
pess, eval ∈ {util, egal, candegal}. A tie-breaking belongs to
F eval
pess if and only if it always selects some k-egroup S such that C + ⊆ S ⊆
(C + ∪ P ) and there is no other k-egroup S′ with C + ⊆ S′ ⊆ (C + ∪ P ) and
eval(S′) < eval(S).
We remark that the definitions above come in two, substantially different vari-
ants. For each lexicographic tie-breaking rule, there is always exactly one egroup
that will be selected by the rule for a particular set of pending set candidates. How-
ever, it is not the case for the families of pessimistic and optimistic families of
rules. In fact, there might be many possible egroups whose value, computed in
terms of a respective evaluation variant, is exactly the same. Such a feature seems
to contradict the idea of a tie-breaking rule that should not, by itself, introduce ties
again. However, we argue that choosing arbitrary equally-valued ("tied") egroup is
a proper way to circumvent this problem. Indeed, according to a particular evalua-
tion all egroups with the same value are indistinguishable from each other.
11
3.3 Limits of Lexicographic Tie-Breaking
From the above discussion, we can conclude that lexicographic tie-breaking is
straightforward in the case of scoring-based multiwinner voting rules. Basically
any subset of the desired cardinality from the set of pending candidates can be
chosen. In particular, the best pending candidates with respect to the given order
can be chosen. We remark that applying lexicographic tie-breaking may be more
complicated for general multiwinner voting rules.
It remains to be clarified whether one can find a reasonable order of the pending
candidates in order to model optimistic or pessimistic tie-breaking rules in a sim-
ple way. We show that this is possible for every F eval
bhav, eval ∈ {util, candegal},
bhav ∈ {opt, pess}, using the fact that in these cases we can safely assume that
there is only one non-zero valued utility function (see Observation 1). On the con-
trary, there is a counterexample for eval = egal and bhav ∈ {opt, pess}. On the
way to prove these claims we need to formally define what it means that one family
of tie-breaking rules can be used to simulate another family of tie-breaking rules.
Definition 2. We call a triplet consisting of an election with candidate set C, a size
of an egroup, and a family of utility functions a tie-breaking perspective over C.
Let EC(C +), EC(P ), EC(U ), and EC(k) be all possible tie-breaking perspectives
over C admitting, respectively, a set C + of confirmed candidates, a set P of pend-
ing candidates, a family U of utility functions, and a size k of an egroup. For some
non-empty subset P of the set {C +, P , U, k}, let EC(P) := Tx∈P
Then, for two families F and F ′ of tie-breaking rules we say that F can P-
simulate F ′ if there exists a rule F ∈ F such that for each tie-breaking perspective
in EC(P) there exists a rule F ′ ∈ F ′ such that F and F ′ yield the same output for
this perspective. We call rule F a P-simulator.
EC(x).
At first glance, Definition 2 might seem overcomplicated. However, it is tai-
lored to grasp different degrees of simulation possibilities. On the one hand, one
can always find a lexicographic order and use it for breaking ties if all: confirmed
candidates, pending candidates, utility functions, and the size of an egroup are
known. Thus, one needs some flexibility in the definition of simulation for it to
be non-trivial. On the other hand, it is somewhat obvious that without fixing the
utility functions, one cannot simulate optimistic or pessimistic tie-breaking rules.
In other words, we have:
Observation 2. Let C be a fixed set of candidates, C + be a set of confirmed can-
didates, P be a set of pending candidates, and k be a size of an egroup. Let
bhav ∈ {opt, pess} and eval ∈ {util, candegal, egal}. The family of lexico-
graphic tie-breaking rules does not {C +, P, k}-simulate F eval
bhav.
12
Proof. Suppose k = 1, C + = ∅, and P = {b1, b2}; that is, we are going to select
either b1 or b2 who are tied. Let us fix a family U = {u1} of utility functions such
that u1(b1) = 1 and u1(b2) = 0. For the family U of utility functions clearly F eval
opt
selects candidate b1. Now, consider a family U ′ = {u′
1} of utility functions where
1 assigns utility one to candidate b2 and zero otherwise. For this family, F eval
u′
opt
selects candidate b2. This means that we cannot find a {C +, P, k}-simulator F
from family Flex of tie-breaking rules because in the first case F would have to
choose b1 and in the second case b2 would have to be chosen. This is impossible
using a single preference order over {b1, b2}. Similar families of functions (ob-
tained by exchanging each one with zero and vice versa) yield a proof for F eval
pess as
well.
Next, we show that for some cases it is sufficient to fix just the utility functions
in order to simulate optimistic or pessimistic tie-breaking rules (see Proposition 1).
For other cases, however, one has to fix all: confirmed candidates, pending candi-
dates, utility functions, and the size of an egroup (see Proposition 2).
Proposition 1. Let C be a set of candidates, U be a family of utility functions,
bhav ∈ {opt, pess}, and eval ∈ {util, candegal}. Let C = m and U = r.
Then the family of lexicographic tie-breaking rules Flex can {U }-simulate F eval
bhav,
and a {U }-simulator F ∈ Flex can be found in O(m · (r + log m)) time.
Proof. Recall from Observation 1 that if eval ∈ {util, candegal}, then there is
always a set of utility functions with just one non-zero valued utility function u′
that is equivalent to U . Hence, we compute such a function u′ in O(m · r) time
as follows: In the utilitarian case, function u′ assigns every candidate the sum of
utilities the manipulators give to the candidate. Considering the candidate-wise
egalitarian evaluation, function u′ assigns every candidate the minimum utility
value among utilities given to the candidate over all manipulators. We say an
order >F of the candidates is consistent with some utility function u if c >F c′
implies u(c) ≥ u(c′) for optimistic tie-breaking and c >F c′ implies u(c) ≤ u(c′)
for pessimistic tie-breaking. Any lexicographic tie-breaking rule defined by an
order >F that is consistent with the utility function u′ simulates F eval
bhav. We com-
pute a consistent order by sorting the candidates according to u′ in O(m · log m)
time.
Proposition 1 describes a strong feature of optimistic utilitarian and candidate-
wise egalitarian tie-breaking and their pessimistic variants. Intuitively, the propo-
sition says that for these tie-breaking mechanisms one can compute a respective
linear order of candidates. Then one can forget all the details of the initial tie-
breaking mechanism and use the order to determine winners. The order can be
13
computed even without knowing the details of an election. Unfortunately, the sim-
ulation of pessimistic and optimistic egalitarian tie-breaking turns out to be more
complicated.
Proposition 2. Let C be a set of candidates, U be a family of utility functions, C +
be a set of confirmed candidates, P be a set of pending candidates, and k be a size
of an egroup. For each P ⊆ {C +, P, U, k}, 0 < P < 4, the lexicographic tie-
breaking family of rules does not P-simulate F egal
bhav assuming bhav ∈ {opt, pess}.
Proof. From Observation 2 we already know that the family of lexicographic tie-
breaking rules cannot {C +, P, k}-simulate the family of egalitarian pessimistic
tie-breaking rules or the family of egalitarian optimistic tie-breaking rules.
Next, we build one counterexample for each of the remaining size-three sub-
sets of {C +, P, U, k} to show our theorem. To this end, let us fix a set of candi-
dates C = {b1, b2, m1, m2, o1, o2} (compatible with our running example) and a
family U = {u1, u2} of utility functions as depicted in the table below.
u(·)
u1
u2
b1
10
1
b2 m1 m2
0
5
2
7
4
5
o1
0
0
o2
0
0
First, we prove that the family Flex cannot {C +, P, U }-simulate F egal
bhav for
bhav ∈ {opt, pess}. Let us fix C + = ∅, P = C \ {o1, o2}. We consider the
optimistic variant of egalitarian tie-breaking for k = 1, so we are searching for
a 1-egroup. Looking at the values of U , we see that candidate m1 gives the best
possible egalitarian evaluation value which is four. This means that a {C +, P, U }-
simulator F ∈ Flex has to use an order where m1 precedes both b1 and m2. How-
ever, it turns out that if we set k = 2, then the best 2-egroup consists exactly of
candidates b1 and m2. This leads to a contradiction because now candidates b1
and m2 should precede m1 in F 's lexicographic order. Consequently, family Flex
does not {C +, P, U }-simulate F egal
opt . Using the same values of utility functions
and the same sequence of the values of k we get a proof for the pessimistic variant
of egalitarian evaluation.
Second, we prove that the family Flex cannot {P, k, U }-simulate F egal
bhav for
bhav ∈ {opt, pess}. This time, we fix P = C \ {o1, o2}, k = 2. We construct
the first case by setting C + = {o1}. Using the fact that in both functions can-
didate o1 has utility zero, we choose exactly the same candidate as in the proof
of {C +, P, U }-simulation for the case k = 1; that is, for the optimistic variant,
the winning 2-egroup is m1 and o1. Consequently, m1 precedes b1 and m2 in the
potential {P, k, U }-simulator's lexicographic order. Towards a contradiction, we
set C + = ∅. The situation is exactly the same as in the proof of the {C +, P, U }-
simulation case. Now, the winning 2-egroup consists of b1 and m2 which ends the
14
proof for the optimistic case. By almost the same argument, the result holds for the
pessimistic variant.
Finally, we prove that the family Flex cannot {C +, k, U }-simulate F egal
bhav for
bhav ∈ {opt, pess}. We fix C + = ∅, k = 2. For the first case we pick
P = {b2, m1, m2}. The best egalitarian evaluation happens for the 2-egroup con-
sisting of b2 and m1. This imposes that, in the potential {C +, k, U }-simulator's
order, b2 and m1 precede the remaining candidates (in particular, m1 precedes
m2). However, for P = C the best 2-egroup changes to that consisting of b1 and
m2 which gives a contradiction (m2 precedes m1). As in the previous cases, the
same argument provides a proof for the pessimistic variant.
Proposition 2 implies that pessimistic and optimistic egalitarian tie-breaking
cannot be simulated without having full knowledge about an election.
In terms
of computational complexity, however, finding winners for pessimistic egalitarian
tie-breaking remains tractable whereas the same task for optimistic egalitarian tie-
breaking is intractable. We devote the next section to show this dichotomy as
well as to establish computational hardness of computing winners for the other
introduced tie-breaking rules.
4 Complexity of Tie-Breaking
It is natural to ask whether the tie-breaking rules proposed in Subsection 3.2 are
practical in terms of their computational complexity. If not, then there is little hope
for coalitional manipulation because tie-breaking might be an inevitable subtask
to be solved by the manipulators. Indeed, manipulators might not be "powerful"
enough to secure victory of their desired egroup completely avoding tie-breaking.
Clearly, we can apply every lexicographic tie-breaking rule that is defined
through some predefined order of the candidates in linear time. Hence, we fo-
cus on the rules that model optimistic or pessimistic manipulators. To this end, we
analyze the following computational problem.
15
F eval
bhav-TIE-BREAKING (F eval
bhav -TB)
eval ∈ {util, egal, candegal}, bhav ∈ {opt, pess}
Input:
A set of candidates C partitioned into a set P of pending can-
didates and a set C + of confirmed candidates, the size k of the
excellence-group such that C + < k < C, a family of manipu-
lators' utility functions U = {u1, u2, . . . , ur} where ui : C → N,
and a non-negative, integral evaluation threshold q.
Question: Is there a size-k set S ⊆ C such that S is selected according to
F eval
bhav, C + ⊆ S, and eval(S) ≥ q?
Naturally, we may assume that the number of candidates and the number of
utility functions are polynomially bounded in the size of the input. However, both
the evaluation threshold and the utility function values are encoded in binary.
Note that an analogous problem has not been considered for single-winner
elections. The reason behind this is that, for single-winner elections, optimistic
and pessimistic tie-breaking rules can be easily simulated by lexicographic tie-
breaking rules. To obtain them, it is sufficient to order the candidates with respect
to their value to manipulators, computed separately for every candidate. However,
one cannot simply apply this approach for egroups, because there might be ex-
ponentially many different egroups to consider. Even if this exponential blow-up
were acceptable, it would be unclear how to derive an order of candidates from the
computed values of egroups. Yet, using a different technique, we can simulate tie-
breaking in multiwinner elections with a lexicographic tie-breaking rule for several
variants of evaluation.
4.1 Utilitarian and Candidate-Wise Egalitarian: Tie-Breaking Is Easy
As a warm-up, we observe that tie-breaking can be applied and evaluated efficiently
if the k-egroups are evaluated according to the utilitarian or candidate-wise egali-
tarian variant. The corresponding result follows almost directly from Proposition 1.
Corollary 1. Let m denote the number of candidates and r denote the number of
manipulators. Then one can solve F eval
bhav -TIE-BREAKING in O(m · (r + log m))
time for eval ∈ {util, candegal}, bhav ∈ {opt, pess}.
Proof. The algorithm works in two steps. First, compute a lexicographic tie-
breaking rule Flex that simulates F eval
bhav in O(m · (r + log m)) time as described in
Proposition 1. Second, apply tie-breaking rule Flex, and evaluate the resulting k-
egroup in O(k · r) time. The running time of applying a lexicographic tie-breaking
rule is linear with respect to the input length (see Subsection 3.3).
16
4.2 Egalitarian: Being Optimistic Is Hard
In this subsection, we consider the optimistic and pessimistic tie-breaking rules
when applied for searching a k-egroup evaluated according to the egalitarian vari-
ant. First, we show that applying and evaluating egalitarian tie-breaking is com-
putationally easy for pessimistic manipulators but computationally intractable for
optimistic manipulators even if the size of the egroup is small. Being pessimistic,
the main idea is to "guess" the manipulator that is least satisfied and select the
candidates appropriately. We show the computational worst-case hardness of the
optimistic case via a reduction from the W[2]-complete SET COVER problem pa-
rameterized by solution size (Downey and Fellows, 2013).
Theorem 1. Let m denote the number of candidates, r denote the number of ma-
nipulators, q denote the evaluation threshold, and k denote the size of an egroup.
Then one can solve F egal
opt -TIE-
BREAKING is NP-hard and W[2]-hard when parameterized by k even if q = 1 and
every manipulator only gives either utility one or zero to each candidate.
pess -TIE-BREAKING in O(r · m log m) time, but F egal
Proof. For the pessimistic case, it is sufficient to "guess" the least satisfied ma-
nipulator x by iterating through r possibilities. Then, select k − C + pending
candidates with the smallest total utility for this manipulator in O(m log m) time.
Finally, comparing the k-egroup with the worst minimum satisfaction over all ma-
nipulators to the lower bound q on satisfaction level given in the input solves the
problem.
We prove the hardness for the optimistic case reducing from the W[2]-hard
SET COVER problem which, given a collection S = {S1, S2, . . . , Sm} of subsets
of universe X = {x1, x2, . . . , xn} and an integer h, asks whether there exists a
family S ′ ⊆ S of size at most h such that SS∈S ′ S = X. Let us fix an instance
I = (X, S, h) of SET COVER. To construct an F egal
opt -TIE-BREAKING instance,
we introduce pending candidates P = {c1, c2, . . . , cm} representing subsets in S
and manipulators u1, u2, . . . , un representing elements of the universe. Note that
there are no confirmed and rejected candidates. Each manipulator ui gives utility
one to candidate cj if set Sj contains element xi and zero otherwise. We set the
excellence-group size k := h and the threshold q to be 1.
Observe that if there is a size-k subset S ⊆ P such that mini∈[n] Ps∈S ui(s) ≥ 1,
then there exists a family S ′ -- consisting of the sets represented by candidates
in S -- such that each element of the universe belongs to the set SS∈S ′ S. On the
contrary, if we cannot pick a group of candidates of size k for which every manip-
ulator's utility is at least one, then instance I is a 'no' instance. This follows from
the fact that for each size-k subset S ⊆ P there exists at least one manipulator u∗
17
for whom Ps∈S u∗(s) = 0. This translates to the claim that there exists no size-h
subset S ′ ⊆ S such that all elements in X belong to the union of the sets in S ′.
Since SET COVER is NP-hard and W[2]-hard with respect to parameter h, we
obtain that our problem is also NP-hard and W[2]-hard when parameterized by the
size k of an excellence-group.
Inspecting the W[2]-hardness proof of Theorem 1, we learn that a small egroup
size (alone) does not make F egal
opt -TIE-BREAKING computationally tractable even
for very simple utility functions. Next, using a parameterized reduction from
the W[1]-complete MULTICOLORED CLIQUE problem (Fellows et al., 2009), we
show that there is still no hope for fixed-parameter tractability (under standard as-
sumptions) even for the combined parameter "number of manipulators and egroup
size"; intuitively, this parameter covers situations where few manipulators are go-
ing to influence an election for a small egroup.
Theorem 2. Let k denote the size of an egroup and r denote the number of manip-
ulators. Then, parameterized by r + k, F egal
opt -TIE-BREAKING is W[1]-hard.
Proof. We describe a parameterized reduction from the W[1]-hard MULTICOL-
ORED CLIQUE problem (Fellows et al., 2009).
In this problem, given an undi-
rected graph G = (V, E), a non-negative integer h, and a vertex coloring φ : V →
{1, 2, . . . , h}, we ask whether graph G admits a colorful h-clique, that is, a size-h
vertex subset Q ⊆ V such that the vertices in Q are pairwise adjacent and have
pairwise distinct colors. Without loss of generality, we assume that the num-
ber of vertices of each color is the same; to be referred as y in the following.
Let (G, φ), G = (V, E), be a MULTICOLORED CLIQUE instance. Let V (i) =
{vi
y} denote the set of vertices of color i ∈ [h], and let E(i, j) =
{ei,j
E(i,j)}, defined for i, j ∈ [h], i < j, denote the set of edges that
connect a vertex of color i to a vertex of color j.
2, . . . , vi
2 , . . . , ei,j
1, vi
1 , ei,j
Candidates. We create one confirmed candidate c∗ and V + E pending
ℓ for
ℓ ∈ V (i), i ∈ [h] and for each i, j ∈ [h] such that i < j we create one
for each edge ei,j
t ∈ E(i, j), t ∈ [E(i, j)]. We set the size k
2(cid:1) + 1 and set the evaluation threshold q := y + 1. Next, we
candidates. More precisely: for each ℓ ∈ [y], we create one vertex candidate ai
each vertex vi
edge candidate bi,j
t
of the egroup to h + (cid:0)h
describe the manipulators and explain the high-level idea of the construction.
Manipulators and main idea. Our construction will ensure that there is a
k-egroup X with c∗ ∈ X and egal(X) ≥ q if and only if X contains h vertex
candidates and (cid:0)h
2(cid:1) edge candidates that encode a colorful h-clique. To this end,
we introduce the following manipulators.
18
1. For each color i ∈ [h], there is a color manipulator µi ensuring that the k-
egroup contains a vertex candidate ai
corresponding to a vertex of color i.
zi
Herein, variable zi denotes the id of the vertex candidate (resp. vertex) that
is selected for color i.
2. For each i, j ∈ [h] such that i < j, there is one color pair manipulator µi,j
ensuring that the k-egroup contains an edge candidate bi,j
zi,j corresponding to
an edge connecting vertices of colors i and j. Herein, variable zi,j denotes
the id of the edge candidate (resp. edge) that is selected for color pair {i, j},
i < j.
3. For each i, j ∈ [h] such that i 6= j, there are two verification manipula-
zi,j if i < j or
is incident to edge ei,j
i,j ensuring that vertex vi
zi
tors νi,j, ν′
incident to edge ej,i
zj,i otherwise.
If there exists a k-egroup in agreement with the description in the previous
three points, then this k-egroup must encode a colorful h-clique.
Utility functions. Let us now describe how we can guarantee correct roles of
the manipulators introduced in points 1 to 3 above using utility functions.
1. Color manipulator µi, i ∈ [h], has utility y for the confirmed candidate c∗,
utility one for each candidate corresponding to a vertex of color i, and utility
zero for the remaining candidates.
2. Color pair manipulator µi,j, i, j ∈ [h], i < j, has utility y for the con-
firmed candidate c∗, utility one for each candidate corresponding to an edge
connecting a vertices of colors i and j, and utility zero for the remaining
candidates.
3. Verification manipulator νi,j, i, j ∈ [h], i 6= j, has utility ℓ for candidate ai
ℓ,
ℓ ∈ [y], utility q−ℓ for each candidate corresponding to an edge that connects
vertex vi
ℓ to a vertex of color j, and utility zero for the remaining candidates.
4. Verification manipulator ν′
i,j, i, j ∈ [h], i 6= j, has utility q − ℓ for candi-
ℓ, ℓ ∈ [y], utility ℓ for each candidate corresponding to an edge that
ℓ, to a vertex of color j, and utility zero for the remaining
date ai
connects vertex vi
candidates.
Correctness. We argue that the graph G admits a colorful clique of size h if
and only if there is a k-egroup X with c∗ ∈ X and egal(X) ≥ q.
Suppose that there exists a colorful clique H of size h. Create the k-egroup X
as follows. Start with {c∗} and add every vertex candidate that corresponds to some
19
vertex of H and every edge candidate that corresponds to some edge of H. Each
color manipulator and color pair manipulator receives total utility y + 1, because
H contains, by definition, one vertex of each color and one edge connecting two
vertices for each color pair. It is easy to verify that the verification manipulator νi,j
must receive utility ℓ from a vertex candidate and utility q − ℓ from an edge can-
didate and that the verification manipulator ν′
i,j must receive utility q − ℓ from a
vertex candidate and utility ℓ from an edge candidate. Thus, egal(X) = q = y + 1.
Suppose that there exists a k-egroup X ⊆ C such that egal(X) ≥ q. Since
each color manipulator cannot achieve utility y+1 unless c∗ belongs to the winning
k-egroup, it follows that c∗ ∈ X. Because each color manipulator µi receives total
utility at least y + 1, X must contain some vertex candidate ai
corresponding to
zi
a vertex of color i for some zi ∈ [y]. We say that X selects vertex vi
. Since each
zi
color pair manipulator µi,j receives total utility at least y + 1, X must contain some
edge candidate bi,j
zi,j corresponding to an edge connecting a vertex of color i and
a vertex of color j for some zi,j . We say that X selects edge ei,j
zi,j . We implicitly
assumed that each color manipulator and color pair manipulator contributes exactly
one selected candidate to X. This assumption is true because there are exactly
k − 1 such manipulators and each needs to select at least one candidate; hence,
X is exactly of the desired size. In order to show that the corresponding vertices
and edges encode a colorful h-clique, it remains to show that no selected edge
is incident to a vertex that is not selected. Assume towards a contradiction that
X selects an edge ei,j
zi,j . However, either verification
manipulator νi,j or verification manipulator ν′
i,j receives the total utility at most q −
1; a contradiction.
zi,j and some vertex vi
zi /∈ ei,j
Finally, devising an ILP formulation, we show that F egal
opt -TIE-BREAKING be-
comes fixed-parameter tractable when parameterized by the combined parameter
"number of manipulators and number of different utility values." This parame-
ter covers situations with few manipulators that have simple utility functions; in
particular, when few voters have 0/1 utility functions. Together with Theorem 1
and Theorem 2, following Theorem 3 shows that neither few manipulators nor few
utility functions make F egal
opt -TB fixed-parameter tractable, but only combining
these two parameters allows us to deal with the problem in FPT time.
Theorem 3. Let udiff denote the number of different utility values and r denote the
number of manipulators. Then, parameterized by r + udiff , F egal
opt -TIE-BREAKING
is fixed-parameter tractable.
Proof. We define the type of any candidate ci to be the size-r vector t = (u1(ci),
u2(ci), . . . , ur(ci)). Let T = {t1, t2, . . . , tT } be the set of all possible types. Nat-
urally, the size of T is upper-bounded by ur
diff . We denote the set of candidates of
20
type ti ∈ T by Ti. Now, the ILP formulation of the problem using exactly T + 1
variables reads as follows. For each type ti ∈ T , we introduce variable xi indi-
cating the number of candidates of type ti in an optimal k-egroup. We use variable
s to represent the minimal value of the total utility achieved by manipulators. We
define the following ILP with the goal to maximize s (indicating the utility gained
by the least satisfied manipulator) subject to:
∀ti ∈ T : xi ≤ Ti,
xi = k,
X
ti∈T
∀ℓ ∈ [r] : X
ti∈T
xi · ti[ℓ] ≥ s.
(1)
(2)
(3)
Constraint set (1) ensures that the solution is achievable with given candidates.
Constraint (2) guarantees a choice of an egroup of size k. The last set of constraints
imposes that s holds at most the minimal value of the total utility gained by manip-
ulators. By a famous result of Lenstra (1983), this ILP formulation with the num-
ber of variables bounded by ur
opt -TIE-BREAKING is fixed-
parameter tractable when parameterized by the combined parameter r + udiff .
diff + 1 yields that F egal
5 Complexity of Coalitional Manipulation
In the previous section, we have seen that breaking ties optimistically or pessimisti-
cally -- an essential subtask to be solved by the manipulators in general -- can be
computationally challenging; in most cases, however, this problem turned out to
be computationally easy. In this section, we move on to our full framework and
analyze the computational difficulty of voting strategically for a coalition of ma-
nipulators. To this end, we formalize our central computational problem. Let R be
a multiwinner voting rule and let F be a multiwinner tie-breaking rule.
21
R-F -eval-COALITIONAL MANIPULATION (R-F -eval-CM)
eval ∈ {util, egal, candegal}
Input:
An election (C, V ), a searched egroup size k < C, r manipu-
lators represented by their utility functions U = {u1, u2, . . . , ur}
such that ∀i∈[r] ui : C → N, and a non-negative, integral evalua-
tion threshold q.
Question: Is there a size-r multiset W of manipulative votes over C such
that k-egroup S ⊂ C wins the election (C, V ∪ W ) under R and
F , and eval(S) ≥ q?
The R-F -eval-CM problem is defined very generally; namely, one can con-
sider any multiwinner voting rule R (in particular, any single-winner voting rule
is a multiwinner voting rule with k = 1). In our paper, however, we focus on
ℓ-Bloc; hence, from now on, we narrow down our analysis of R-F -eval-CM to the
ℓ-Bloc-F -eval-CM problem.
In line with our intention to model optimistic and pessimistic attitudes of ma-
nipulators, we require that the evaluation of an optimistic/pessimistic tie-breaking
rule F matches the manipulator's evaluation. More formally, for every eval ∈
{util, egal, candegal}, we focus on variants of ℓ-Bloc−F−eval−CM where F ∈
{Flex, F eval
pess}.6 We always allow lexicographic tie-breaking because it mod-
els cases where a tie-breaking rule is fixed, known to all voters and, more impor-
tantly, irrelevant of manipulators' utility functions.
opt , F eval
On the way to show our results, we also use a restricted version of ℓ-Bloc-F -
eval-COALITIONAL MANIPULATION that we call ℓ-Bloc-F -eval-COALITIONAL
MANIPULATION with consistent manipulators. In this variant, the input stays the
same, but all manipulators cast exactly the same vote to achieve the objective.
To increase readability, we decided to represent manipulators by their utility
functions. As a consequence, we frequently use, for example, u1 referring to the
manipulator itself, even if we do not care about the values of utility function u1 at
the moment of usage. In the paper, we also stick to the term "voters" meaning the
set V of voters of an input election. We never call manipulators "voters"; however,
we speak about the manipulative votes they cast.
As for the encoding of the input of R-F -eval-CM, we use a standard assump-
6The excluded problem variants might indeed be relevant for situations where a tie-breaking
goal is different to manipulators' goal while utility values represent a somehow "objective" measure
(e.g., utility values represent monetary costs and, although manipulators evaluate egroups in the egal-
itarian way, tie-breaking goal is to minimize the total cost); however such cases are beyond the scope
of this work.
22
tion; namely, that the number of candidates, the number of voters, and the number
of manipulators are polynomially upper-bounded in the size of the input. Anal-
ogously to F eval
bhav-TIE-BREAKING, both the evaluation threshold and the utility
function values are encoded in binary.
5.1 Utilitarian & Candidate-Wise Egalitarian: Manipulation is Tractable
We show that ℓ-Bloc-F -eval-COALITIONAL MANIPULATION can be solved in
polynomial time for any constant ℓ ∈ N, any eval ∈ {util, candegal}, and any
F ∈ {Flex, F eval
pess}. Whereas in general, for n being the input size, our
algorithm requires O(n5) steps, for Bloc (i.e., ℓ = k), we give a better, quadratic-
time algorithm (with respect to n).
opt , F eval
In several proofs in Subsection 5.1 we use the value of a candidate for ma-
nipulators (coalition) and say that a candidate is more valuable or less valuable
than another candidate. Although we cannot directly measure the value of a candi-
date for the whole manipulators' coalition in general, thanks to Observation 1, we
can assume a single non-zero utility function when discussing the utilitarian and
candidate-wise egalitarian variants. Thus, assigning a single value to each candi-
date is justified.
We start with an algorithm solving the general case of ℓ-Bloc-F -eval-COA-
LITIONAL MANIPULATION, eval ∈ {util, candegal}, F ∈ {Flex, F eval
pess}.
The basic idea is to "guess" the lowest final score of a member of a k-egroup
and (assuming some lexicographic order over the candidates) the least preferred
candidate of the k-egroup that obtains the lowest final score. Then, the algorithm
finds an optimal manipulation leading to a k-egroup represented by the guessed
pair. Since there are at most polynomially-many (with respect to the input size)
pairs to be guessed, the described recipe gives a polynomial-time algorithm.
opt , F eval
Theorem 4. Let m denote the number of candidates, n the number of voters, k
the size of a searched egroup, and r the number of manipulators. One can solve
ℓ-Bloc-F -eval-COALITIONAL MANIPULATION in O(k2m2(n + r)) time for any
eval ∈ {util, candegal} and F ∈ {Flex, F eval
opt , F eval
pess}.
Proof. We prove the theorem for the lexicographic tie-breaking rule Flex. This is
sufficient since, using Proposition 1, one can generalize the proof for the cases of
utilitarian and candidate-wise egalitarian variants. The basic idea of our algorithm
is to fix certain parameters of a solution and then to reduce the resulting subprob-
lem to a variant of the KNAPSACK problem with polynomial-sized weights. The
algorithm iterates through all possible value combinations of the following two
parameters:
• the lowest final score z < V ∪ W of any member of the k-egroup and
23
• the candidate c that is the least preferred member of the k-egroup with final
score z with respect to tie-breaking rule Flex.
Having fixed z and c, let C + denote the set of candidates who get at least z + 1
approvals from the non-manipulative voters or who are preferred to c according
to Flex and get exactly z approvals from the non-manipulative voters. Assuming
that the combination of parameter values is correct, all candidates from C + ∪ {c}
must belong to the k-egroup. Let k+ := C +. For sanity, we check whether k+ <
k, that is, whether candidate c can belong to the k-egroup if the candidate obtains
final score z. We discard the corresponding combination of solution parameter
values if the check fails. Next, we ensure that c obtains the final score exactly z. If
c receives less than z − r or more than z approvals from non-manipulative voters,
then we discard this combination of solution parameter values. Otherwise, let s :=
z − scoreV (c) denote number of additional approvals candidate c needs in order to
get final score z. Let k∗ := k − k+ − 1 be the number of remaining (not yet fixed)
members of the k-egroup. Let s∗ := r · ℓ − s be the number of approvals to be
distributed to candidates in C \ {c}.
Now, the manipulators have to influence further k∗ candidates to join the k-
egroup (so far only consisting of C + ∪ {c}) and distribute exactly s∗ approvals in
total to candidates in C \ {c} but at most r approvals per candidate. To this end,
let C ∗ denote the set of candidates which can possibly join the k-egroup. For each
candidate c ∈ C \ (C + ∪ {c}) it holds that c ∈ C ∗ if and only if
1. z − r ≤ scoreV (c) ≤ z − 1 if c is preferred to c with respect to Flex, or
2. z − r + 1 ≤ scoreV (c) ≤ z if c is preferred to c with respect to Flex.
A straightforward idea is to select the k∗ elements from C ∗ which have the highest
values (that is, utility) for the coalition. However, there can be two issues: First, s∗
might be too small; that is, there are too few approvals to ensure that each of the
k∗ best-valued candidates gets the final score at least z (resp. at least z+1). Second,
s∗ might be too large; that is, there are too many approvals to be distributed so that
there is no way to do this without causing unwanted candidates to get a final score
of at least z (resp. at least z + 1).
Fortunately, we can easily detect these cases and deal with them efficiently. In
the former scenario we reduce the remaining problem to an instance of EXACT k-
ITEM KNAPSACK -- the problem in which, for a given set of items, their values and
weights, and a knapsack capacity, we search for k items that maximize the overall
value and do not exceed the knapsack capacity. In the latter case, we show that we
can discard the corresponding combination of solution parameters.
First, if s∗ ≤ r · k∗, then one can certainly distribute all s∗ approvals (e.g., to
the k∗ candidates that will finally join the k-egroup). Of course, it could still be the
24
case that there are too few approvals available to push the desired candidates into
the k-egroup in a greedy manner. To solve this problem, we build an EXACT k-
ITEM KNAPSACK instance where each candidate in C ∗ is mapped to an item. We
set the weight of each c∗ ∈ C ∗ to z − scoreV (c∗) if c∗ is preferred to c with respect
to Flex and otherwise to (z + 1) − scoreV (c∗). We set the value of each c∗ ∈ C ∗
to be equal to the utility that candidate c∗ contributes to the manipulators. Now,
an optimal solution (given the combinations of parameter values is correct) must
select exactly k∗ elements from C ∗ such that the total weight is at most s∗. This
corresponds to EXACT k-ITEM KNAPSACK if we set our knapsack capacity to s∗.
Furthermore, finding any such set with maximum total value leads to an optimal
solution. Even if the final total weight s′ of the chosen elements is smaller than s∗,
we can transfer the EXACT k-ITEM KNAPSACK solution to the correct solution of
our problem. The total weight corresponds to the number of approvals used. Thus,
with the EXACT k-ITEM KNAPSACK solution we spend s′ approvals and, because
of the monotonicity of ℓ-Bloc together with the assumption that s∗ ≤ r · k∗, we use
s∗ − s′ approvals to approve the chosen candidates even more.
Second, if s∗ > r·k∗, then one can certainly ensure for any set of k∗ candidates
from C ∗ the final score at least z (resp. at least z + 1). In many cases, it will not
be a problem to distribute the approvals; for example, one can safely spend up
to r approvals for each candidate from C \ C ∗, that is, to candidates that have no
chance to get enough points to join the k-egroup or to candidates which are already
fixed to be in the k-egroup. Furthermore, each candidate from C ∗ can be safely
approved z − scoreV (c∗) − 1 times (resp. z − scoreV (c∗) times) without reaching
final score z (resp. z+1). We denote by s+ the total number of approvals which can
be safely distributed to candidates in C \ {c} without causing one of the candidates
from C ∗ to reach score at least z (resp. at least z+1). If s∗ ≤ s++r·k∗ (note that we
also assume s∗ > r · k∗), then we can greedily push the k∗ most-valued candidates
from C ∗ into the k-egroup (spending r · k∗ approvals) and then safely distribute the
remaining approvals within C \ {c} as discussed. If s∗ > s+ + r · k∗, then there
is no possibility of distributing approvals in a way that c is part of the k-egroup.
Towards a contradiction let us assume that c is part of the k-egroup obtained after
distributing s+ + r · k∗ + 1 approvals. This means that we spend all possible
s+ approvals so that c is not beaten and r · k∗ approvals to push k∗ candidates to
the winning k-egroup. Giving one more approval to some candidate c′ from C ∗
that is not yet in the k-egroup, by definition of C ∗ and s+, means that the score
of c′ is enough to push c out of the final k-egroup; a contradiction. Consequently,
for the case of s∗ > s+ + r · k∗, we discard the corresponding combination of
solution parameters.
As for the running time, the first step is sorting the candidates according to their
values in O(m(r + log(m))) time. Then let us consider the running time of two
25
cases s∗ ≤ r · k∗ and s∗ > r · k∗ separately. In the former case, we solve EXACT
k-ITEM KNAPSACK in O(k2mr) time by using dynamic programming based on
analyzing all possible total weights of the selected items until the final value is
reached (Kellerer et al., 2004, Chapter 9.7.3)7 (note that the maximum possible
total weight is upper-bounded by kr). If s∗ > r · k∗, then we approve at most
m candidates which gives the running time O(m). Thus, we can conclude that the
running time of the discussed cases is O(k2mr). Additionally, there are at most
n + r values of z and at most m values of c. Summarizing, we get the running time
O(k2m2(n + r)).
Next, we show that, actually, Bloc-F -eval-CM (i.e., a special case of ℓ-Bloc-
F -eval-CM where ℓ = k) can be solved in quadratic-time, that is, in practice, much
faster than the general variant of the problem. On our way to present this results,
we first give an algorithm for ℓ-Bloc-F -eval-CM with consistent manipulators.
Then, we argue that it also solves Bloc-F -eval-CM. The algorithm "guesses" the
minimum score among all members of the winning egroup and then carefully (with
respect to the tie-breaking method) selects the best candidates that can reach this
score.
Proposition 3. Let m denote the number of candidates, n denote the number of
voters, and r denote the number of manipulators. Then one can solve ℓ-Bloc-F -
eval-COALITIONAL MANIPULATION with consistent manipulators in O(m(m +
r + n)) time for any eval ∈ {util, candegal} and F ∈ {Flex, F eval
opt , F eval
pess}.
Proof. Consider an instance of ℓ-Bloc-Flex-eval-CM with consistent manipulators
with an election E = (C, V ) where C is a candidate set and V is a multiset of non-
manipulative votes, r manipulators, an egroup size k, and a lexicographic order >F
used by Flex to break ties. In essence, we introduce a constrained solution form
called a canonical solution and argue that it is sufficient to analyze only this type
of solutions. Then we provide an algorithm that efficiently seeks for an optimal
canonical solution.
At the beginning, we observe that when manipulators vote consistently, then
we can arrange the top ℓ candidates of a manipulative vote in any order. Hence, the
solution to our problem is a size-ℓ subset (instead of an order) of candidates which
we call a set of supported candidates; we call each member of this set a supported
candidate.
Strength order of the candidates. Additionally, we introduce a new order >S
of the candidates. It sorts them descendingly with respect to the score they receive
7In fact, Kellerer et al.
(2004) use dynamic programming based on all possible total values
of items. However, one can exchange all possible total values of items with all possible total weights
of items and thus obtain an algorithm with running time polynomial in the maximum weight of items.
26
from voters and, as a second criterion, according to the position in >F . Intuitively,
the easier it is for some candidate to be a part of a winning k-egroup, the higher is
the candidate's position in >S . As a consequence, we state Claim 1.
Claim 1. Let us fix an instance of ℓ-Bloc-Flex-eval-CM with consistent manipu-
lators and a solution X which leads to a winning k-egroup S. For every supported
(resp. unsupported) candidate c, the following holds:
1. If c is part of the winning k-egroup, then every supported (resp. unsupported)
predecessor of c, according to >S , belongs to S.
2. If c is not part of the winning k-egroup, then every supported (resp. unsup-
ported) successor of c, according to >S , does not belong to S.
Proof. Fix an instance of ℓ-Bloc-Flex-eval-CM with consistent manipulators, a
solution X, and a winning k-egroup S. Let us consider the respective order >S
over the candidates in the instance.
We first show that statement 1 regarding supported candidates holds. Accord-
ing to the statement, fix some supported candidate c ∈ S and let p be a predecessor
of c (according to >S ). Towards a contradiction, let us assume that p /∈ S. This
implies that either (i) the score of p is smaller than the score of c or (ii) their scores
are the same but c >F p. Let us focus on case (i). Both considered candidates
are supported by all manipulators (note that manipulators vote consistently). Thus,
as a consequence of p >S c, we have that the score of p is at least as high as the
score of c; a contradiction. Next, consider case (ii), where p and c have the same
scores. Consequently, the mutual order of c and p in >S is the same as their order
in >F (in other words, the order of c and p in >S does not depend on scores of c
and p because those must be the same prior to any manipulation). Since c >F p, it
follows that, by definition of >S , it must hold that c >S p; a contradiction again.
Eventually, we obtain that p has to be part of S which completes the argument.
An analogous approach leads to proofs for the remaining three cases stated in
the theorem.
Claim 1 justifies thinking about >S as a "strength order"; hence, in the proof
we use the terms stronger and weaker candidate. Using Claim 1, we can fix some
candidate c as the weakest in the winning k-egroup and then infer candidates that
have to be and that cannot be part of this k-egroup. To formalize this idea, we
introduce the concept of a canonical solution.
Canonical solutions. Assuming the case where k ≤ ℓ, we call a solution X
leading to a winning k-egroup S canonical if all candidates of the winning egroup
are supported; that is, S ⊆ X. In the opposite case, k > ℓ, solution X is canonical
27
if X ⊂ S and X is a set of the ℓ weakest candidates in S. For the latter case, the
formulation describes the solution which favors supporting weaker candidates first
and ensures that no approval is given to a candidate outside the winning k-egroup.
Canonical solutions are achievable from every solution without changing the
outcome. Observe that one cannot prevent a candidate from winning by support-
ing the candidate more because this only increases the candidate's score. Con-
sequently, we can always transfer approvals to all candidates from the winning
k-egroup. For the case of k > ℓ, we then have to rearrange the approvals in such a
way that only the weakest members of the k-egroup are supported. However, such
a rearrangement cannot change the outcome because, according to Claim 1, we can
transfer an approval from some stronger candidate c to weaker c′ keeping both of
them in the winning k-egroup.
Dropped and kept candidates. Observe that for every solution (including
canonical solutions), we can always find the strongest candidate who is not part of
the winning egroup. We call this candidate the dropped candidate. Note that we
use the strength order in the definition of the dropped candidate; this order does not
take manipulative votes into account. Moreover, without loss of generality, we can
assume that the dropped candidate is not a supported candidate. This is because if
the dropped candidate is not in the winning k-egroup even if supported, then we
can support any other candidate outside of the winning k-egroup without changing
the winning k-egroup (see Claim 1). There always exists some candidate to whom
we can transfer our support because ℓ < m. Naturally, by definition of the dropped
candidate, all candidates stronger than the dropped candidate are members of the
winning k-egroup. We call these candidates kept candidates.
High-level description of the algorithm. The algorithm solving ℓ-Bloc-Flex-
eval-CM with consistent manipulators iteratively looks for an optimal canonical
solution for every possible (non-negative) number t of kept candidates (alterna-
tively the algorithm checks all feasible possibilities of choosing the dropped can-
didate). Then, the algorithm compares all solutions and picks one that is resulting
in an egroup liked the most by the manipulators. Observe that k − ℓ ≤ t ≤ k.
The upper bound k is the consequence of the fact that each kept candidate is (by
definition) in the winning k-egroup. Since all candidates except for kept candidates
have to be supported to be part of the winning egroup, we need at least k − ℓ kept
candidates, in order to be able to complete the k-egroup.
Running time. To analyze the running time of the algorithm described in the
previous paragraph, several steps need to be considered. At the beginning we have
to compute values of candidates and then sort the candidates with respect to their
value. This step runs in O(rm + m log m) time. Similarly, computing >S takes
O(ℓn + m log m) time. Having both orders, Procedure 1 (described in detail later
28
in this proof) needs O(m) to find an optimal canonical solution for some fixed
number t of kept candidates. Finally, we have at most ℓ + 1 possible values of t.
Summing the times up, together with the fact that ℓ < m, we obtain a running time
O(m(m + r + n)).
What remains to be done. Procedure 1 describes how to look for an optimal
canonical solution for a fixed number t of kept candidates. First, partition the
candidate set in the following way. By C* we denote the kept candidates (which
are the top t candidates according to >S ). Consequently, the (t + 1)-st strongest
candidate is the dropped candidate; say c∗. For every value of t, the corresponding
dropped candidate, by definition, is not allowed to be part of the winning egroup.
Let
D = {C* ∪{c∗} 6∋ c (scoreV (c) + r > scoreV (c∗))∨
(scoreV (c) + r = scoreV (c∗) ∧ c >F c∗)}
be the set of distinguished candidates. Each distinguished candidate, if supported,
is preferred over c∗ to be selected into the winning k-egroup. Consequently, the
distinguished candidates are all candidates who can potentially be part of the win-
ning k-egroup. We remark that to fulfill our assumption that the dropped candidate
is not part of a winning egroup, it is obligatory to support at least k − t distin-
guished candidates. Note that C* ∪ {c∗} ∪ D is not necessarily equal to C. The
remaining candidates cannot be part of the winning k-egroup under any circum-
stances assuming t kept candidates. Also, set D might consist of less than k − t
required candidates (which is the case when there are too few candidates that, af-
ter supported, would outperform c∗).
If such a situation emerges, we skip the
respective value of t. Making use of the described division into c∗, D, and C*,
Procedure 1 incrementally builds set X of supported candidates associated with an
optimal solution until all possible approvals are used. Observe, that since k < C
and ℓ < C, it is guaranteed that for t = k Procedure 1 will return a feasible solu-
tion for t; in fact, this solution will always result in a winning egroup consisting of
all t kept candidates (irrespective of D).
Detailed description of the algorithm. Before studying Procedure 1 in detail,
consider Figure 1 illustrating the procedure on example data. In line 1, the proce-
dure builds set X of supported candidates using the k − t best valued distinguished
candidates. Since only the distinguished candidates might be a part of the winning
k-egroup besides the kept candidates, there is no better outcome achievable. Then,
in line 2, the remaining approvals, if they exist, are used to support kept candidates.
This operation does not change the resulting k-egroup. Then Procedure 1 checks
whether all ℓ approvals were used; that is, whether ℓ = X. If not, then there are
29
Procedure 1: A procedure of finding an optimal set of supported candidates.
Input: Election E = (C, V ); number ℓ of approvals in ℓ-Bloc rule; size k of
the winning k-egroup; a partition of C into kept candidates C* (such
that C* = t and k − ℓ ≤ t ≤ k), a dropped candidate c∗, and
distinguished candidates D (such that D ≥ k − t).
Output: Optimal supported candidates set X
1 X ←− {the k − t most valuable candidates from D}
2 X ←− X∪ {min{t, ℓ − X} arbitrary candidates from C*}
3 if ℓ 6= X then
4
A ←− {the ℓ − X weakest candidates from C \ X}
B ←− {top k strongest candidates from X ∪ A}
p ←− B \ X
X ←− X ∪ {the ℓ − X − p weakest candidates from C \ X}
X ←− X ∪ {the p most valuable candidates from D \ X}
5
6
7
8
9 end
10 return X
exactly ℓ − X remaining approvals to use. Note that at this stage set X contains
k supported candidates who correspond to the best possible k-egroup, however,
without spending all approvals. Let us call this k-egroup S. It is possible that there
is no way to spend the remaining ℓ − X approvals without changing the winning
k-egroup S. Then substitutions of candidates occur. The new candidates in the
k-egroup can be only those that are distinguished and so far unsupported whereas
the exchanged ones can be only so far supported distinguished candidates. This
means that each substitution lowers the overall value of the winning k-egroup. So,
the best what can be achieved is to find the minimal number of substitutions and
then pick the most valuable remaining candidates from D to be substituted. The
minimal number of substitutions can be found by analyzing how many candidates
would be exchanged in the winning k-egroup if the weakest ℓ − X previously
unsupported candidates were supported. The procedure makes such a simulation
and computes the number p of necessary substitutions, in lines 4-6. Supporting the
ℓ − X − p weakest unsupported candidates and then the p most valuable so far
unsupported distinguished candidates gives the optimal k-egroup for t kept candi-
dates (when all approvals are spent). Note that the number ℓ of approvals is strictly
lower than the number of candidates, so one always avoids supporting c∗.
The algorithm we presented can be applied also for pessimistic and optimistic
evaluation because of the possibility of simulating these evaluations by a lexico-
30
e
u
l
a
v
⋆
⋆
e
u
l
a
v
⋆
⋆
strength
strength
(a) The division of the candidates into the
kept candidates (dotted), the dropped can-
didate (filled), the distinguished candidates
(vertical lines), and the others who cannot
be a part of the winning egroup.
(b) An illustration of lines 1-2 of Proce-
dure 1. The double-edged candidates form
set X. The starred candidates would form
the winning k-egroup if the double-edged
candidates were supported.
⋆
⋆
⋆
e
u
l
a
v
⋆
⋆
⋆
⋆
e
u
l
a
v
⋆
⋆
strength
strength
(c) Supporting the weakest possible candi-
dates to use all approvals. The winning
egroup changes. The winners are marked
with stars while the candidate who is no
more in the winning egroup is crossed out.
Such a simulation is done in lines 4-6. As
a result, the minimum number of substitu-
tions in the k-egroup is computed.
(d) An illustration of the solution of the
considered case computed by Procedure 1
in lines 7 to 8. One candidate from the
k-egroup presented in Figure 1b has to be
substituted; naturally, it is optimal to pick
the most valuable possible candidate as a
replacement for the substituted one. Sup-
ported candidates are double-edged and the
winning k-egroup is starred.
Figure 1: An illustrative example of a run of Procedure 1 for t = 2, nine candi-
dates, 7-Bloc, and 4-egroup. The horizontal position indicates the strength of a
candidate and the vertical position indicates the value of a candidate. Since the
number r of manipulators determines only the set of distinguished candidates, we
do not specify r explicitly. We indicate the set of distinguished candidates instead.
Subfigures 1a to 1d step by step present the execution of Procedure 1 on the way
to find an optimal 4-egroup.
31
graphic order in time O(m(r + log(m))) (see Proposition 1).
For Bloc, we will show that manipulators can always vote identically to achieve
an optimal k-egroup. In a nutshell, for every egroup the manipulators can only
increase the scores of its members by voting exactly for them. This fact leads to
the next corollary.
Corollary 2. Let m denote the number of candidates, n denote the number of vot-
ers, and r denote the number of manipulators. One can solve Bloc-F -eval-COALI-
TIONAL MANIPULATION in O(m(m+r+n)) time for any eval ∈ {util, candegal}
and F ∈ {Flex, F eval
opt , F eval
pess}.
Proof. We show that for Bloc-F -eval-COALITIONAL MANIPULATION the ma-
nipulators have no incentive to deviate from one optimal profile (i.e., they vote in
the same manner). Let us fix an optimal k-egroup S. If there exists a candidate
c ∈ S which is not approved by some manipulator u∗, then there exists also some
candidate c′ /∈ S which is approved by u∗ (u∗ approves at most k − 1 candidates
from S). Observe that in the Bloc voting rule by shifting a candidate up in a pref-
erence order we only increase the candidate's score; as a result, we cannot prevent
the candidate from winning by doing such a shift. Using this observation, we can
exchange candidate c with candidate c′ in the preference order of u∗ without pre-
venting c from winning. We repeat exchanging candidates until all manipulators
approve only candidates from S. Then we obtain an optimal vote by fixing a prefer-
ence order over those candidates arbitrarily (there might be more than one optimal
vote but all of them place only candidates from set S at the first k places). Con-
cluding, we can use the algorithm from Proposition 3 which works in the given
time.
5.2 Egalitarian: Hard Even for Simple Tie-Breaking
In Subsection 4.2, we showed that already breaking ties might be computationally
intractable. These intractability results only hold with respect to the egalitarian
evaluation and optimistic manipulators. We now show that this intractability trans-
fers to coalitional manipulation for any tie-breaking rule and the egalitarian evalua-
tion. This includes the pessimistic egalitarian case which we consider to be highly
relevant as it naturally models searching for a "safe" voting strategy.
Proposition 4. For any tie-breaking rule F , there is a polynomial-time many-one
reduction from F egal
opt -TIE-BREAKING to ℓ-Bloc-F -egal-COALITIONAL MANIPU-
LATION.
32
Proof. We reduce an instance of F egal
opt -TIE-BREAKING to ℓ-Bloc-F -egal-COALI-
TIONAL MANIPULATION; however, before we describe the actual reduction, we
present a useful observation concerning F egal
opt -TIE-BREAKING in the next para-
graph.
Let us fix an instance I of F egal
opt -TIE-BREAKING with a confirmed set C +,
a pending set P , a size k of an egroup, a threshold q, and a set of manipulators
represented by a family U of utility functions. We can construct a new equivalent
instance I ′ of F egal
opt -TIE-BREAKING with a larger set of manipulators' utility func-
tions U ′ ⊇ U . The construction is a polynomial-time many-one reduction which
proves that we can "pump" the number of manipulators arbitrarily for instance I.
To add a manipulator, it is enough to set to q the utility that the manipulator gives to
every candidate. Naturally, such a manipulator cannot have the total utility smaller
than q, so the correct solution for I is also correct for I ′. Contrarily, when there
is no solution for I, it means that for every possible k-egroup S′ there is some
manipulator ¯u such that egal¯u(S′) < q. Consequently, one cannot find a solution
for I ′ as well, because the set of possible k-egroups and their values of egalitarian
utility do not change.
Now we can phrase our reduction from F egal
opt -TIE-BREAKING to ℓ-Bloc-F -
egal-COALITIONAL MANIPULATION. Let us fix an instance I of F egal
opt -TIE-
BREAKING with a confirmed set C +, a pending set P , a size k of an egroup, a
threshold q, and a set U of r utility functions. Because of the observation about
"pumping" instances of F egal
opt -TIE-BREAKING, we can assume, without loss of
generality, that ℓ · r ≥ k − C + holds. In the constructed instance of ℓ-Bloc-F -
egal-CM equivalent to I, we build an election that yields sets P and C + and aim
at an egroup of size k. However, it is likely that we need to add a set of dummy
candidates that we denote by D. It is important to ensure that the dummy candi-
dates cannot be the winners of the constructed election. To do so, we keep the score
of each dummy candidate to be at most 1, the score of each pending candidate to
be r + 2, and the score of each confirmed candidate to be at least 2r + 3. The
construction starts from ensuring the scores of the confirmed candidates. Observe,
that in this step we add at most (2r + 3) · C + voters (in case ℓ = 1). If ℓ > C +,
then we have to add some dummy candidates in this step. We can upper-bound the
number of the added dummy candidates by ((2r + 3) · C +)(ℓ − 1) (this bound
is not tight). Analogously, we add new voters such that each pending candidate
has score exactly r + 2. At this step we have the election where we are able to
spend ℓ · r ≥ k − C + approvals. We can select every possible subset of pending
candidates to form the winning k-egroup by approving candidates in this subset
exactly once. However, to be sure that we are able to distribute all approvals such
that there is no tie, we ensure that the remaining (ℓ · r) − (k − C +) approvals can
33
be distributed to some candidates without changing the outcome. To achieve this
goal we add exactly (ℓ · r) − (k − C +) dummy candidates with score 0. We set
the evaluation threshold of the newly constructed instance to q.
By our construction, we are always able to approve enough pending candidates
to form a k-egroup without considering ties, and we cannot make a dummy can-
didate a winner under any circumstances. Thus, if F egal
opt -TIE-BREAKING has a
solution S, then we approve every candidate c ∈ S such that c was in the pend-
ing set P before, and we obtain a solution to the reduced instance. In the oppo-
site case, if there is no such a k-egroup whose egalitarian utility value is at least
q, then the corresponding instance of ℓ-Bloc-F -egal-COALITIONAL MANIPULA-
TION also has no solution since the possible k-egroups are exactly the same. The
reduction runs in polynomial time.
Observe that the reduction proving Proposition 4 does not change the egroup
size k. Additionally, the increase of the number of manipulators in resulting in-
stances is polynomially bounded in the egroup size k of input instances. This is
due to the fact that even if we need to "pump" an initial instance to achieve ℓ · r ≥
m ≤ k manipulators. Thus, together with
k − C +, then we add at most l k−C +
Theorem 1 and Theorem 2, Proposition 4 leads to the following corollary.
ℓ
Corollary 3. Let F be an arbitrary tie-breaking rule. Then, ℓ-Bloc-F -egal-CO-
ALITIONAL MANIPULATION is NP-hard. Let r denote the number of manipula-
tors, q denote the evaluation threshold and k denote the size of an egroup. Then,
parameterized by r + k, ℓ-Bloc-F -egal-CM is W[1]-hard. Parameterized by k,
ℓ-Bloc-F -egal-CM is W[2]-hard even if q = 1 and every manipulator only gives
either utility one or zero to each candidate.
Finally, by using ideas from Theorem 4 and an adaptation of the ILP from
Theorem 3 as a subroutine, we show that, for the combined parameter "the num-
ber of manipulators and the number of different utility values", fixed-parameter
tractability of F egal
opt -TIE-BREAKING transfers to coalitional manipulation for both
optimistic and pessimistic tie-breaking.
Theorem 5. Let r denote the number of manipulators and udiff denote the number
of different utility values. Parameterized by r + udiff , ℓ-Bloc-F -egal-COALITIO-
NAL MANIPULATION with F ∈ {F egal
opt } is fixed-parameter tractable.
pess, F egal
Proof. In a nutshell, we divide ℓ-Bloc-F egal
opt -egal-CM
into subproblems solvable in FPT time with respect to the combined parameter
"number of manipulators and number of different utility values." We show that
solving polynomially many subproblems is enough to solve the problems.
pess-egal-CM and ℓ-Bloc-F egal
34
The main idea. We split the proof into two parts. In the first part, we define
subproblems and show how to find a solution assuming that the subproblems are
solvable in FPT time with respect to the parameter. In the second part, we show
that, indeed, the subproblems are fixed-parameter tractable using their ILP formu-
lations. The inputs for ℓ-Bloc-F egal
opt -egal-CM are the
same, so let us consider an arbitrary input with an election E = (C, V ) where
V = n, C = m, a size k of an excellence-group, and r manipulators repre-
sented by a set U = {u1, u2, . . . , ur} of their utility functions. Let udiff be the
number of different utility values.
pess-egal-CM and ℓ-Bloc-F egal
An election resulting from a manipulation and a corresponding k-egroup emerg-
ing from the manipulation can be described by three non-negative integer parame-
ters:
1. the lowest final score z of any member of the k-egroup;
2. the number p of promoted candidates from the k-egroup with a score higher
than z that, at the same time, have score at most z without taking manipula-
tive votes into consideration;
3. the number b of border candidates with score z.
Observe that if as a result of a manipulation the lowest final score of members
in a final k-egroup is z, then the promoted candidates are part of the k-egroup
regardless of the tie-breaking method used. For border candidates, however, it
might be necessary to run the tie-breaking rule to determine the k-egroup. In other
words, border candidates become pending candidates unless all of them are part of
the k-egroup. By definition, no candidate scoring lower than the border candidates
is a member of the k-egroup; thus, the term border candidates. From now on, we
refer to the election situation characterized by parameters z, p, b as a (input) state.
Additionally, we call a set of manipulators' votes a manipulation.
Part 1: High-level description of the algorithm. For now, we assume that
there is a procedure P which runs in FPT time with respect to the combined pa-
rameter "number of manipulators and number of different utility values." Proce-
dure P, takes values z, p, b and an instance of the problem, and finds a manip-
ulation which leads to a k-egroup maximizing the egalitarian utility under either
egalitarian optimistic or egalitarian pessimistic tie-breaking with respect to the in-
put state. If such a manipulation does not exist, then procedure P returns "no."
The algorithm solving ℓ-Bloc-F egal
opt -egal-CM runs P
for all possible combinations of values z, p, and b. Eventually, it chooses the best
manipulation returned by P or returns "no" if P always returned so. Since the
value of z is at most V + W and b together with p are both upper-bounded by the
pess-egal-CM and ℓ-Bloc-F egal
35
number of candidates, we run P at most (n + r)m2 times. Because the input size
grows polynomially with respect to the growth of values r, m, and n, the overall
algorithm runs in FPT time with respect to the combined parameter "number of
manipulators and number of different utility values."
Part 2: Basics and preprocessing for the ILP. To complete the proof we
describe procedure P used by the above algorithm. In short, the procedure builds
and solves an ILP program that finds a manipulation leading to the state described
by the input values. Before we describe the procedure in details, we start with
some notation. Fix some values of z, b, p and some election E = (C, V ) that
altogether form the input of P. For each candidate c ∈ C, let a size-r vector t =
(u1(c), u2(c), . . . , ur(c)), referred to as a type vector, define the type of c. We
denote the set of all possible type vectors by T = {t1, t2, . . . , tT }. Observe that
T ≤ ur
diff . With each type vector ti, i ∈ [T ], we associate a set Ti containing
only candidates of type ti. We also distinguish the candidates with respect to their
initial score compared to z. A candidate of type ti ∈ T , i ∈ T , with score
z − j, j ∈ [r] ∪ {0}, belongs to group Gj
i . We denote all candidates with a score
(excluding manipulative votes) higher than z by C +, whereas by C − we denote the
candidates with a score (excluding manipulative votes) strictly lower than z − r.
For each type ti ∈ T of a candidate, we define function obl(ti) = C + ∩ Ti, which
gives the number of candidates of type ti that are obligatory part of the winning
k-egroup.
At the beginning, procedure P tests whether the input values z, b, and p repre-
sent a correct state. From the fact that there has to be at least one candidate with
score z, we get the upper bound k − C + − 1 for value p. To have enough can-
didates to complete the k-egroup, we need at least k − C + − p candidates with
score z after the manipulation which gives b ≥ k − C + − p. Finally, the state is
incorrect if the corresponding set C + contains k or more candidates. If the input
values are incorrect, then P returns "no." Otherwise, P continues with building
a corresponding ILP program. We give two separate ILP programs -- one for the
optimistic egalitarian tie-breaking and the other one for the pessimistic egalitarian
tie-breaking. Both programs consist of two parts. The first part models all possible
manipulations leading to the state described by values z, p, and b. The second one
is responsible for selecting the best k-egroup assuming the particular tie-breaking
and considering all possible manipulations according to the first part. Although the
whole programs are different from each other, the first parts stay the same. Thus,
we postpone distinguishing between the programs until we describe the second
parts. For the sake of readability, we present the ILP programs step by step.
ILP: Common part. For each group Gj
i , i ∈ [T ], j ∈ [r] ∪ {0}, we in-
indicating the numbers of, respectively, border and
troduce variables xj
i and xj+
i
36
promoted candidates from group Gj
i . Additionally, we introduce variables o and ¯o.
The former represents the number of approvals used to get the obligatory numbers
of border and promoted candidates. The latter indicates the number of approvals
which are to be spent without changing the final k-egroup (thus, in some sense
a complement of the obligatory approvals) resulting from the manipulation (e.g.,
approving candidates in C +, who are part of the winning k-egroup anyway, cannot
change the outcome). We begin our ILP program with ensuring that the values of
i and xj+
xj
are feasible:
i
∀ti ∈ T , j ∈ [r] ∪ {0} : xj+
i + xj
xj+
i = p,
X
i ≤ Gj
i ,
ti∈T ,j∈[r]∪{0}
X
ti∈T ,j∈[r]∪{0}
xj
i = b,
∀ti ∈ T : x0+
∀ti ∈ T : xr+
i + x0
i = 0.
i = G0
i ,
(4)
(5)
(6)
(7)
(8)
The expressions ensure that exactly p candidates are selected to be promoted (5),
exactly b candidates are selected to be border ones (6), and that, for every group,
the sum of border and promoted candidates is not greater that the cardinality of
the group (4). The last two formulae ensure that candidates who have score z are
either promoted or border candidates (7) and that candidates with initial score z − r
cannot be promoted (i.e., get a score higher than z) (8). Next, we add the constraints
concerning the number of approvals we need to use to perform the manipulation
described by all variables xj
. We start with ensuring that the manipulation
does not exceed the number of possible approvals. As mentioned earlier, we store
the number of required approvals using variable o.
i and xj+
i
(cid:16)xj
i · j + xj+
i
· (j + 1)(cid:17) ,
o = X
ti∈T , j∈[r]∪{0}
o ≤ ℓr.
Then, we model spending the ¯o remaining votes (if any) to use all approvals.
¯o ≤ r(C − ∪ C +) + X
ti∈T
X
j∈[r]
(cid:16)Gj
i − xj
i − xj+
i (cid:17) (j − 1)
(cid:16)xj+
i
· (r − j − 1)(cid:17) ,
+ X
ti∈T ,j∈[r]
¯o + o = ℓr.
37
(9)
(10)
(11)
(12)
The upper bound on the number of votes one can spend without changing the out-
come presented in equation (11) consists of three summands. The first one indi-
cates the number of approvals which can be spent for candidates whose initial score
was either too high or too low to make a difference in the outcome of the election
resulting from the manipulation. The second summand counts the approvals we
can spend for potential promoted and border candidates that eventually are not part
of the winning k-egroup; we can give them less approvals than are needed to make
them border candidates. The last summand represents the number of additional ap-
provals that we can spend on the promoted candidates to reach the maximum of r
approvals per candidate. This completes the first part of the ILP program in which
we modeled the possible variants of promoted and border candidates for the fixed
state (z, b, p).
ILP extension for optimistic egalitarian tie-breaking. In the second part, we
find the final k-egroup by completing it with the border candidates according to the
particular tie-breaking mechanism. Let us first focus on the case of the optimistic
egalitarian tie-breaking. We introduce constraints allowing us to maximize the total
egalitarian utility value of the final egroup; namely, for each group Gj
i , i ∈ [T ],
j ∈ [r] ∪ {0}, we add a non-negative, integral variable xj•
indicating the number
i
of border candidates of the given group chosen to be in the final k-egroup. The
following constraints ensure that we select exactly k − C + − p border candidates
to complete the winning egroup and that, for each group Gj
i , we do not select more
candidates than available.
X
ti∈T , j∈[r]∪{0}
xj•
i = k − C + − p,
∀ti ∈ T , j ∈ [r] ∪ {0} : xj•
i ≤ xj
i .
(13)
(14)
To complete the description of the ILP, we add the final expression defining the
egalitarian utility s of the final k-excellence-group. The goal of the ILP program is
to maximize s.
∀q ∈ [r] : X
ti∈T , j∈[r]∪{0}
ti[q] · (xj+
i + xj•
i ) + X
ti∈T
ti[q] · obl(ti) ≥ s.
(15)
Since the goal is to maximize s, our program simulates the egalitarian optimistic
tie-breaking.
ILP extension for pessimistic egalitarian tie-breaking.
To solve a sub-
problem for the case of pessimistic egalitarian tie-breaking, we need a different ap-
proach. We start with an additional notation. For each type of candidate ti ∈ T , let
bi = Pj∈[r]∪{0} xj
i denote the number of border candidates of this type. For each
38
i , we define a binary variable used[dq
type ti ∈ T and manipulator uq, q ∈ [r], we introduce a new integer variable dq
i .
Its value corresponds to the number of border candidates of type ti who are part
of the worst possible winning k-egroup according to manipulator's uq preferences;
we call these candidates the designated candidates of type ti of manipulator uq.
For each variable dq
i ] which has value one
if at least one candidate of type ti is a designated candidate of manipulator uq.
Similarly, we define fullyused[dq
i ] to indicate that all candidates of type ti are des-
ignated by manipulator uq. To give a program which solves the case of pessimistic
egalitarian tie-breaking, we copy the first part of the previous ILP program (ex-
pressions from (4) to (12)) and add new constraints. First of all, we ensure that
each manipulator designates not more than the number of available border candi-
dates from each type and that every manipulator designates exactly k − p − C +
candidates.
∀ti ∈ T , q ∈ [r] : 0 ≤ dq
i ≤ bi,
dq
i = k − p − C +.
∀q ∈ [r] : X
ti∈T
(16)
(17)
The following forces the semantics of the variables used; that is, a variable used[dq
i ],
i ∈ [T ], q ∈ [r], has value one if and only if variable dq
i is at least one.
∀ti ∈ T , q ∈ [r] : used[dq
∀ti ∈ T , q ∈ [r] : used[dq
i ] ≤ dq
i ,
i ]n ≥ dq
i .
(18)
(19)
Similarly, for the variables fullyused, we ensure that fullyused[dq
i ], i ∈ [T ],
q ∈ [r], is one if and only if manipulator uq designates all available candidates of
type ti.
∀ti ∈ T , q ∈ [r] : fullyused[dq
∀ti ∈ T , q ∈ [r] : bi − dq
i ] ≥ 1 − (bi − dq
i ),
i ≤ n(1 − fullyused[dq
i ]).
(20)
(21)
Since our task is to perform pessimistic tie-breaking, we have to ensure that the des-
ignated candidates for each manipulator are the candidates whom the manipulator
gives the least utility. We impose it by forcing that the more valuable candidates
(for a particular manipulator) are used only when all candidates of all less valuable
types (for the manipulator) are used (i.e., they are fully used). To achieve this we
make use of the used and fullyused variables in the following constraint.
∀q ∈ [r] ∪ {0}∀ti, ti′ ∈ T : ti[q] > ti′[q] : used[dq
i ] ≤ fullyused[dq
i′].
(22)
Finally, we give the last expression where s represents the pessimistic egalitarian
k-egroup's utility which our ILP program wants to maximize:
39
∀q ∈ [r] : X
ti∈T
(dq
i + obl(ti)) · ti[q] ≥ s.
(23)
The ILP programs, for both tie-breaking variants, use at most O(rt) variables
so, according to Lenstra (1983), are in FPT with respect to the combined param-
eter r + udiff . Consequently, procedure P is in FPT with respect to the same
parameter.
After presenting the FPT result for egalitarian coalitional manipulation with
optimistic or pessimistic egalitarian tie-breaking in Theorem 5, we proceed with
an analogous result for egalitarian coalitional manipulation with one of the four
remaining tie-breaking rules (that is, {optimistic, pessimistic} × {utilitiarian, can-
didate-wise utilitarian}) in Theorem 6.
Theorem 6. Let r denote the number of manipulators and udiff denote the number
of different utility values. Parameterized by r + udiff , ℓ-Bloc-Flex-egal-COALITIO-
NAL MANIPULATION is fixed-parameter tractable.
Proof. The general proof idea is to show an algorithm which solves problem ℓ-Bloc-
Flex-egal-COALITIONAL MANIPULATION.
To solve ℓ-Bloc-Flex-egal-COALITIONAL MANIPULATION we create an ILP
program for all possible value combinations of the following parameters:
• the lowest final score z < V ∪ W of any member of the k-egroup and
• the candidate c which is the least preferred member of the k-egroup with
final score z with respect to the tie-breaking rule Flex.
Having z fixed, let C + denote the set of candidates which get at least z + 1 ap-
provals from the non-manipulative voters or which are preferred to c with respect
to F and get exactly z approvals from the non-manipulative voters. Assuming that
the combination of parameter values is correct, all candidates from C + ∪ {c} must
belong to the k-egroup. We check whether C + < k, that is, whether there is
space for candidate c in the k-egroup. If the check fails, then we skip the corre-
sponding combination of solution parameter values. Next, we ensure that c obtains
final score exactly z. If c receives less than z − r or more than z approvals from
non-manipulative voters, then we discard this combination of solution parameter
values. Otherwise, let s := z − scoreV (c) denote number of additional approvals
candidate c needs in order to get final score z.
40
We define the type of some candidate ci to be the size-r vector tj = (u1(ci),
u2(ci), . . . , ur(ci)). We denote by T = {t1, t2, . . . , tT } the set of all possible
types. Observe that T ≤ ur
diff . With each type vector ti, i ∈ [T ], we associate
a set Ti containing only the candidates of type ti. Having c (and z) fixed, we
distinguish candidates according to types further. For j ∈ [r] ∪ {0}, all candidates
with score z − j that are preferred (resp. not preferred) to candidate c according to
F , fall into group Gj+
). For each type ti ∈ T of a candidate, we define
function obl(ti) = C + ∩ Ti which gives the number of candidates of type ti who
are obligatory part of the winning k-egroup. We denote by Cr candidates which do
not fall to any of such groups.
(resp. Gj−
i
i
i
i
and xj−
and Gj−
We give the following ILP formulation of the problem using 2rT + 2 vari-
ables. For all groups Gj+
, i ∈ T , j ∈ [r] ∪ {0}, we introduce variables
xj+
respectively. The variables indicate, respectively, the number of can-
i
didates from groups Gj+
i whom we push to the winning k-egroup. Also,
we introduce two additional variables s and u. The former one represents the mini-
mal value of the total utility achieved by manipulators. The latter one indicates the
number of votes which were spent without changing the outcome. To shorten the
ILP we define
and Gj−
i
i
Mfulc
z := X
ti∈T ,j∈[r]
xj+
i
· j + X
ti∈T ,j∈[r−1]∪{0}
xj−
i
· (j + 1).
Intuitively, Mfulc
winners. Also, we define
z is the number of approvals used to make potential winners the
Fbidc
z := X
ti∈T ,j∈[r]∪{0}
h(r − j + 1)(Gj+
i
− xj+
i ) + (r − j)(Gj−
i
− xj−
i )i .
Fbidc
z represents the number of approvals which cannot be used if one wants to
avoid pushing candidates outside of the solution (given by values of the variables
x) to the winning k-egroup; for example, if some candidate c needs j approvals
to be part of the winning committee, then we subtract r − j + 1 approvals from
the whole pool of r approvals for this candidate because we can use only j − 1
approvals not to push c into the k-egroup. We define the following constraints to
41
construct our program the goal of which is to maximize s:
∀ti ∈ T , j ∈ [r] ∪ {0}, • ∈ {+, −} : xj•
∀ti ∈ T : xz−
∀ti ∈ T : x0+
(24)
(25)
(26)
(27)
(28)
i ≤ Gj•
i ,
i = 0,
i = G0+
Mfulc
u ≤ (C − 1)r − Mfulc
u + Mfulc
z ≤ r · ℓ − s,
,
i
z − Fbidc
z,
z = r · ℓ − s,
X
(29)
xj•
i = k − C + − 1,
ti∈T ,j∈[r]∪{0},•∈{+,−}
∀q ∈ [r] :
X
ti∈T ,j∈[r]∪{0},•∈{+,−}
xj•
i
· ti[q]+
ti[q] · obl(ti) ≥ s.
X
ti∈T
(30)
(31)
i
i
Constraint (24) ensures that the candidates picked into a solution are available
and can be part of the solution. Observe that candidates in G0+
have to be part of
the solution and candidates in Gz−
cannot be part of the solution. These two facts
are ensured by Constraints (25) and (26). Constraint (27) forbids spending more
votes than possible to push some candidates to the k-egroup. The same role for
"wasted" approvals plays Constraint (28). The upper bound of wasted approvals
is counted in the following way: From the number of all "places" of putting ap-
provals (we subtract one from the number of candidates because we cannot put any
approvals except for s to candidate c), we first subtract the approvals already given
to candidates in the k-egroup (i.e., Mfulc
z). Next, we subtract all "places" of ap-
provals that will cause the unchosen potential candidates to be chosen (i.e., Fbidc
z).
Constraint (29) ensures that, altogether, we spend exactly as many approvals as re-
quired, and Constraint (30) holds only when a proper number of candidates are
pushed to be part of k-egroup. The last equation forces maximization of the egali-
tarian utility of the winning k-egroup when s is maximized.
Using our technique we can obtain a solution by making O(nm) ILPs with at
most 2rur
diff + 2 variables. According to Lenstra's famous result (Lenstra, 1983),
the constructed ILPs yield fixed-parameter tractability with respect to the combined
parameter r + udiff .
42
Table 1: Computational complexity of tie-breaking and coalitional manipulation.
Our results for ℓ-Bloc hold for any ℓ ≥ 1, and thus cover SNTV. The parameters
are the size k of the egroup, the number r of manipulators, and the number udiff
of different utility values. Furthermore, m is the number of candidates and n is
the number of voters. The result marked with † holds for all possible combinations
of the respective evaluation and behavior variants. The results marked with ⋄ hold
also for F = Flex.
F eval
bhav-TIE-BREAKING, easy cases:
settings (evaluation, behavior)
complexity
reference
utilitarian or cand.wise egalitarian,
optimistic or pessimistic
O(m · (r + log m)) Cor. 1 †
egalitarian, pessimistic
O(r · m log m)
Thm. 1
F egal
opt -TIE-BREAKING (egalitarian, optimistic):
parameters, restrictions
complexity
reference
NP-hard
general
k, 0/1 utilities and q = 1 W[2]-hard
r + k
W[1]-hard
r + udiff
FPT
Thm. 1
Thm. 1
Thm. 2
Thm. 3
ℓ-Bloc-F -eval-COALITIONAL MANIPULATION
utilitarian/cand.wise egalitarian, optimistic/pessimistic:
restrictions
complexity
reference
Thm. 4 ⋄
general
consistent manipulators O(m(m + r + n)) Prop. 3 ⋄
O(m(m + r + n)) Cor. 2 ⋄
ℓ = k
O(k2m2(n + r))
ℓ-Bloc-F -eval-COALITIONAL MANIPULATION
egalitarian, optimistic/pessimistic:
parameters, restrictions
complexity
reference
NP-hard
Cor. 3 ⋄
general
k, 0/1 utilities and q = 1 W[2]-hard Cor. 3 ⋄
W[1]-hard Cor. 3 ⋄
r + k
r + udiff
FPT
Thm. 5 and Thm. 6 ⋄
43
6 Conclusion
We developed a new model for and started the first systematic study of coali-
tional manipulation for multiwinner elections. Our analysis revealed that mul-
tiwinner coalitional manipulation requires models which are significantly more
complex than those for single-winner coalitional manipulation or multiwinner non-
coalitional manipulation. Our model assumes a given, fixed coalition of manipu-
lators can compensate their (potential) utility loss after a manipulation in some
way. Thus, in particular, our model does not account for questions like whether
a particular coalition can be stable, how coalitions are forming, or what to do to
avoid a coalition's split. Yet, we think that there are two important reasons why
the model is, in fact, useful. First, there are situation where manipulators will not
leave the coalition despite of being worse off after some manipulation. Such a sit-
uation might naturally occur if manipulators share a common goal and they agree
either on losing their individual utility for the good of the whole group or on com-
pensating their utility losses internally among themselves. Second, assessing the
quality of possible manipulations for a given coalition is essential to answer more
general questions about coalitions (e.g., what is the most profitable coalition) that
lead to a new research direction (see the last paragraph of this section for a broader
discussion on this direction).
In our work, on the one hand, we generalized tractability results for coali-
tional manipulation of ℓ-Approval by Conitzer et al. (2007) and Lin (2011) and for
non-coalitional manipulation of Bloc by Meir et al. (2008) and Obraztsova et al.
(2013) to tractability of coalitional manipulation of ℓ-Bloc in case of utilitarian or
candidate-wise egalitarian evaluation of egroups. On the other hand, we showed
that coalitional manipulation becomes intractable in case of egalitarian evaluation
of egroups.
Let us discuss a few findings in more detail (Table 1 surveys all our results).
We studied lexicographic, optimistic, and pessimistic tie-breaking and showed that,
with the exception of egalitarian group evaluation, winner groups can be deter-
mined very efficiently. The intractability (NP-hardness, parameterized hardness in
form of W[1]- and W[2]-hardness) for the egalitarian case, however, turns out to
hold even for quite restricted scenarios. We also demonstrated that numerous tie-
breaking rules can be "simulated" by (carefully chosen) lexicographic tie-breaking,
again except for the egalitarian case. Interestingly, the hardness of egalitarian tie-
breaking holds only for the optimistic case while for the pessimistic case it is effi-
ciently solvable. Hardness for the egalitarian optimistic scenario, however, trans-
lates into hardness results for coalitional manipulation regardless of the specific
tie-breaking rule. On the contrary, coalitional manipulation becomes tractable for
the other two evaluation strategies -- "candidate-wise" egalitarian and utilitarian.
44
Additionally, for few candidates and few different utility values the voters assign
to the candidates, manipulation becomes tractable also for the egalitarian optimistic
scenario.
In our study, we entirely focused on shortlisting as one of the simplest tasks
for multiwinner elections to analyze our evaluation functions. It is interesting and
non-trivial to develop models for multiwinner rules that aim for proportional repre-
sentation or diversity. For shortlisting, extending our studies to non-approval-like
scoring-based voting correspondences would be a natural next step. In this context,
already seeing what happens if one extends the set of individual scores from being
only 0 or 1 to more (but few) numbers is of interest. Moreover, we focused on de-
terministic tie-breaking mechanisms, ignoring randomized tie-breaking -- another
issue for future research.
An analysis of the manipulators' behavior, briefly mentioned at the beginning
of this section, directing towards game theory seems promising as well.
(Even
more so since we identified polynomial-time algorithms for a few variants of coali-
tional manipulation.) One very interesting question about coalitions is, for exam-
ple, whether a particular coalition is stable. Intuitively, the utility for every voter
that is a part of the manipulating coalition should not be below the utility the voter
receives when voting sincerely. This is of course only a necessary condition to en-
sure the stability of a coalition. A more sophisticated analysis of stability needs to
consider game-theoretic aspects such as Nash or core stability (Nisan et al., 2007).
Acknowledgments
We thank the anonymous IJCAI '17 reviewers for their constructive and valuable
feedback. Robert Bredereck was from mid-September 2016 to mid-September
2017 on postdoctoral leave at the University of Oxford, supported by the DFG
fellowship BR 5207/2. Andrzej Kaczmarczyk was supported by the DFG project
AFFA (BR 5207/1 and NI 369/15).
References
Haris Aziz, Serge Gaspers, Joachim Gudmundsson, Simon Mackenzie, Nicholas
Mattei, and Toby Walsh. Computational aspects of multi-winner approval vot-
ing. In Proceedings of the 14th International Conference on Autonomous Agents
and Multiagent Systems, AAMAS '15, pages 107 -- 115, 2015. 2
Haris Aziz, Markus Brill, Vincent Conitzer, Edith Elkind, Rupert Freeman, and
Toby Walsh. Justified representation in approval-based committee voting. Social
Choice and Welfare, 48(2):461 -- 485, 2017a. 2
45
Haris Aziz, Edith Elkind, Piotr Faliszewski, Martin Lackner, and Piotr Skowron.
The Condorcet Principle for Multiwinner Elections: From Shortlisting to Pro-
portionality. In Proceedings of the 26th International Conference on Artificial
Intelligence, IJCAI '17, pages 84 -- 90, 2017b. 2
Salvador Barber`a and Danilo Coelho. How to choose a non-controversial list with
k names. Social Choice and Welfare, 31(1):79 -- 96, 2008. 2
Salvador Barber`a and Danilo Coelho. On the rule of k names. Games and Eco-
nomic Behavior, 70(1):44 -- 61, 2010. 2
Nathanael Barrot, Laurent Gourv`es, J´erome Lang, J´erome Monnot, and Bernard
Ries. Possible winners in approval voting.
In Proceedings of the 3rd Inter-
national Conference on Algorithmic Decision Theory, ADT '13, pages 57 -- 70,
2013. 2
John J. Bartholdi III, Craig A. Tovey, and Michael A. Trick. The computational
difficulty of manipulating an election. Social Choice and Welfare, 6(3):227 -- 241,
1989. 3
Nadja Betzler, Arkadii Slinko, and Johannes Uhlmann. On the computation of
fully proportional representation. Journal of Artificial Intelligence Research,
47:475 -- 519, 2013. 2
Felix Brandt, Vincent Conitzer, Ulle Endriss, J´erome Lang, and Ariel D. Procac-
cia, editors. Handbook of Computational Social Choice. Cambridge University
Press, 2016. 2, 4
Robert Bredereck, Andrzej Kaczmarczyk, and Rolf Niedermeier. On coalitional
manipulation for multiwinner elections: Shortlisting. In Proceedings of the 26th
International Joint Conference on Artificial Intelligence, IJCAI '17, pages 887 --
893, 2017. 1
Vincent Conitzer, Tuomas Sandholm, and J´erome Lang. When are elections with
few candidates hard to manipulate? Journal of the ACM, 54(3):1 -- 33, 2007. 3,
44
Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, D´aniel Marx,
Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algo-
rithms. Springer, 2015. 5
Rodney G. Downey and Michael R. Fellows. Fundamentals of Parameterized
Complexity. Springer, 2013. 5, 17
46
Edith Elkind, Piotr Faliszewski, Piotr Skowron, and Arkadii M. Slinko. Properties
of multiwinner voting rules. Social Choice and Welfare, 48(3):599 -- 632, 2017.
2, 3
Piotr Faliszewski, Piotr Skowron, Arkadii M. Slinko, and Nimrod Talmon. Multi-
winner analogues of the plurality rule: Axiomatic and algorithmic perspectives.
In Proceedings of the 30th AAAI Conference on Artificial Intelligence, AAAI
'16, pages 482 -- 488, 2016. 2
Piotr Faliszewski, Piotr Skowron, Arkadii M. Slinko, and Nimrod Talmon. Multi-
winner voting: A new challenge for social choice theory. In U. Endriss, editor,
Trends in Computational Social Choice, chapter 2, pages 27 -- 47. AI Access,
2017a. 2, 3
Piotr Faliszewski, Piotr Skowron, and Nimrod Talmon. Bribery as a measure of
candidate success: Complexity results for approval-based multiwinner rules. In
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Sys-
tems, AAMAS '17, pages 6 -- 14, 2017b. 2
Michael R. Fellows, Danny Hermelin, Frances Rosamond, and Stphane Vialette.
On the parameterized complexity of multiple-interval graph problems. Theoret-
ical Computer Science, 410(1):53 -- 61, 2009. 18
Jorg Flum and Martin Grohe. Parameterized Complexity Theory. Springer, 2006.
5
Hans Kellerer, Ulrich Pferschy, and David Pisinger. Knapsack Problems. Springer,
2004. 26
Martin Lackner and Piotr Skowron. Approval-based multi-winner rules and strate-
gic voting. In Proceedings of the 27th International Joint Conference on Artifi-
cial Intelligence, IJCAI '18, pages 340 -- 346, 2018. 3
Hendrik W. Lenstra. Integer programming with a fixed number of variables. Math-
ematics of Operations Research, 8(4):538 -- 548, 1983. 21, 40, 42
Andrew Lin. The complexity of manipulating k-approval elections. In Proceed-
ings of the 3rd International Conference on Agents and Artificial Intelligence,
ICAART '11, pages 212 -- 218, 2011. 4, 44
Reshef Meir, Ariel D. Procaccia, Jeffrey S. Rosenschein, and Aviv Zohar. Com-
plexity of strategic behavior in multi-winner elections. Journal of Artificial In-
telligence Research, 33(1):149 -- 178, 2008. 3, 4, 5, 6, 7, 8, 44
47
Ministry of Science and Higher Education of the Republic of Poland.
In-
formations on the election of The Board of Research Excellence (in Pol-
ish).
http://www.bip.nauka.gov.pl/g2/oryginal/2019_03/
c435c5061f0aab7158eba2716553f240.pdf, 2019. Online; accessed
July 30, 2019. 3
Rolf Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University
Press, 2006. 5
Noam Nisan, Tim Roughgarden, ´Eva Tardos, and Vijay V. Vazirani. Algorithmic
Game Theory. Cambridge University Press, 2007. 45
Svetlana Obraztsova, Yair Zick, and Edith Elkind. On manipulation in multi-
winner elections based on scoring rules.
In Proceedings of the 12th Interna-
tional Conference on Autonomous Agents and Multi-agent Systems, AAMAS
'13, pages 359 -- 366, 2013. 3, 5, 7, 44
Jorg Rothe, editor. Economics and Computation. Springer, 2015. 2, 4
Piotr Skowron. What do we elect committees for? A voting committee model
for multi-winner rules. In Proceedings of the 24th International Conference on
Artificial Intelligence, IJCAI '15, pages 1141 -- 1147, 2015. 3
Piotr Skowron, Piotr Faliszewski, and Arkadii M. Slinko. Achieving fully pro-
portional representation: Approximability results. Artificial Intelligence, 222:
67 -- 103, 2015. 3
48
|
1703.09087 | 2 | 1703 | 2017-04-03T11:46:45 | Automating decision making to help establish norm-based regulations | [
"cs.MA"
] | Norms have been extensively proposed as coordination mechanisms for both agent and human societies. Nevertheless, choosing the norms to regulate a society is by no means straightforward. The reasons are twofold. First, the norms to choose from may not be independent (i.e, they can be related to each other). Second, different preference criteria may be applied when choosing the norms to enact. This paper advances the state of the art by modeling a series of decision-making problems that regulation authorities confront when choosing the policies to establish. In order to do so, we first identify three different norm relationships -namely, generalisation, exclusivity, and substitutability- and we then consider norm representation power, cost, and associated moral values as alternative preference criteria. Thereafter, we show that the decision-making problems faced by policy makers can be encoded as linear programs, and hence solved with the aid of state-of-the-art solvers. | cs.MA | cs | Automating decision making to help establish norm-based
regulations
Maite Lopez-Sanchez
Marc Serramia
Math & Comp Science dept.
Universitat de Barcelona
[email protected]
Juan A. Rodriguez-Aguilar
Artificial Intelligence
Research Institute (IIIA-CSIC)
Campus UAB. Bellaterra, Spain
[email protected]
Javier Morales and
Michael Wooldridge
Dept. of Computer Science
University of Oxford, UK
[email protected]
[email protected]
7
1
0
2
r
p
A
3
]
A
M
.
s
c
[
2
v
7
8
0
9
0
.
3
0
7
1
:
v
i
X
r
a
ABSTRACT
Norms have been extensively proposed as coordination mechanisms
for both agent and human societies. Nevertheless, choosing the
norms to regulate a society is by no means straightforward. The
reasons are twofold. First, the norms to choose from may not be
independent (i.e, they can be related to each other). Second, dif-
ferent preference criteria may be applied when choosing the norms
to enact. This paper advances the state of the art by modeling a
series of decision-making problems that regulation authorities con-
front when choosing the policies to establish. In order to do so,
we first identify three different norm relationships -- namely, gen-
eralisation, exclusivity, and substitutability -- and we then consider
norm representation power, cost, and associated moral values as al-
ternative preference criteria. Thereafter, we show that the decision-
making problems faced by policy makers can be encoded as linear
programs, and hence solved with the aid of state-of-the-art solvers.
CCS Concepts
•Computing methodologies → Multi-agent systems; Coopera-
tion and coordination;
Keywords
Normative systems, value-based reasoning, norm decision making,
policy making, optimisation.
1.
INTRODUCTION
Norms have been extensively studied as coordination mecha-
nisms within both agent and human societies[10, 26]. Within agent
societies, problems such as norm synthesis [27, 7], norm emer-
gence [14, 29], or norm learning [25, 11, 24] have been widely
studied. As for human societies, e-participation and e-governance
ICT systems are currently attracting a lot of attention [30, 12, 2].
Thus, for example, some regulatory authorities in European cities
-- such as Reykjavik[6] or Barcelona[4] municipalities -- are open-
ing their policy making to citizens. This is also the case for some
countries: New Zealand authorities are opening consultations about
legislations related to different topics such as family violence[1] or
pensions[3]. However, the number of regulations to discuss and
enact could be large -- consider, for example, Madrid's participation
portal [5], which is currently hosting more than two thousand lo-
cal proposals open to citizens -- so that managing them becomes a
complex task.
Beyond the intrinsic complexity due to the number of norms to
manage -- either if they are proposed by humans or automatically
generated -- , by no means we can state that choosing the norms to
regulate a society constitutes a straightforward process. The rea-
sons are twofold.
On the one hand, norms can be related. Norm relationships have
been previously studied in the literature. Thus, for example, Grossi
and Dignum [15] study the relation between abstract and concrete
norms, whereas Kollingbaum, Vasconcelos et al.
[19, 28] focus
on norm conflicts -- and solve them based on first-order unification
and constraint solving techniques. In this paper we borrow some
of the relationships identified in Morales et al. [23]1 and charac-
terise three different binary norm relationships, namely, generali-
sation, exclusivity, and substitutability. Thus, we can consider a set
of norms and the fact that some norms in this set generalise some
specific norms; that some other norms are pair-wise incompatible
(i.e., mutually exclusive); or interchangeable (that is, substitutable).
When this is the case, a regulatory authority should not select these
norms to be simultaneously established in the society. This paper
proposes to encode these relationships in terms of restrictions in
linear programs that allows to find those norm subsets (subsets of
the given set of norms) that are compliant with the constraints im-
posed by the associated norm relations.
On the other hand, this paper also characterises the problems that
regulation authorities confront when considering different prefer-
ence criteria over the norms to impose. In this manner, we specify
the optimisation problem of finding the subset of norms that, in
addition to comply with the relation constraints, maximizes rep-
resented norms. This problem can be specified as a single objec-
tive function in a binary linear program. Moreover, since norms
have associated costs, it may also be of convenience to specify a
multi-objective decision function that maximizes norm representa-
tion while minimizing associated norm costs. Our final contribu-
tion is the consideration of moral values associated to norms as an
additional criterion. Values have been studied in argumentation --
some representative examples being Bench-Capon et al.[9] or Mod-
gil [20] -- and they have also been introduced by Kohler et al. [18]
in multi-agent institutions. However, to the best of our knowledge,
no one has considered the values that norms support. Instead, the
normative multi-agent systems research area has focused in differ-
ent normative concepts such as minimality and simplicity [13, 22],
liberality [23], compactness [21], or stability [26].
1Morales et al.
complementarity relations.
[23] identify substitutability, generalisation and
In this paper we assume that a regulatory authority has available
a collection of norms to impose together with an specification of
the particular relationships that hold for these norms and that pre-
vents all norms to be simultaneously deployed. Then, we model
alternative problems that pursue to maximize the set of norms to
establish under (a combination of) those previously mentioned cri-
teria, namely, norm representation, associated costs, and supported
moral values. Subsequently, despite the computation complexity
of these problems, state-of-the-art linear programming solvers are
used to automatically compute their solution.
The paper is structured as follows. First, next section provides
some basic definitions and an illustrative example. Then, subse-
quent sections characterise our different optimisation problems. Ini-
tially, Section 3 considers optimisation problems with a single ob-
jective: maximising norm representation. Then, Section 4 consid-
ers a multi-objective decision function that combines norm repre-
sentation and cost criteria. Finally, Section 5 introduces moral val-
ues into this multi-objective optimisation problem. The paper con-
cludes with additional discussion about dealing with norms in force
in Section 6, and conclusions and future work in Section 7.
2. BASIC DEFINITIONS
Before introducing the decision problems involving norms that
we face in this paper, next we introduce the fundamental building
blocks to build such problems. Thus, we formally introduce the
notion of norm, the relationships that we consider between norms,
and the characteristic of the norm systems that we will aim at to
establish norm-based regulations.
Our notion of norm is based on a simplification of the one in
[31]. Thus, here we formally consider a norm ni as a pair θ(ρ, ac),
where: θ is a deontic operator (prohibition, permission, or obliga-
tion) ; ρ is a description of the addressee entity, namely, the agent
required to comply with the norm; and ac is an action -- from a set
of actions -- that entities can perform in a specific domain.
Now we consider the relations that may hold between norms be-
cause they will determine the way norms are selected as a part of
a norm system. With this aim, we borrow two of the relations em-
pirically identified in [23] during on-line norm synthesis and define
three norm relations (namely generalisation, exclusivity, and sub-
stitutability). Informally, it is considered that: (i) a norm is more
general than another one when it subsumes its regulation (its regu-
lation scope is wider); (ii) two norms are mutually exclusive when
they are incompatible; and (iii) two norms are substitutable if they
are interchangeable.
Let N be a non-empty set of norms for a specific domain. For-
mally, we will capture the above norm relations as follows:
i) The direct generalisation relation is a binary relation Rg ⊆
N × N.
If (ni, nj) ∈ Rg, we say that ni is more gen-
eral than nj, or directly, it generalises nj. Notice also that
if (ni, nj) ∈ Rg, (cid:64)nk ∈ N s.t (ni, nk), (nk, nj) ∈ Rg.
The notion of direct generalisation allows us to capture the no-
tion of indirect generalisation through the so-called ancestors.
Given two norms, nk,ni ∈ N, we say that nk is an ancestor
of ni if there is a subset of norms {n1, . . . , np} ⊆ N such
that (n1, n2), . . . , (np−1, np) ∈ Rg, n1 = nk, and np = ni.
Henceforth, given a norm ni ∈ N, we will note its ancestors
as A(ni). Notice that Rg is irreflexive, anti-symmetric, and
intransitive.
iii) The substitutability relation is a binary relation Rs ⊆ N × N.
If (ni, nj) ∈ Rs, we say that norms ni, nj are interchange-
able or substitutable. Based on substitutability relationships,
we introduce the notion of substitution chain as follows. Given
two norms, ni,nk ∈ N, we say that nk is connected by sub-
stitutabilities to ni if there is a non-empty subset of norms
{n1, . . . , np} ⊆ N such that (n1, n2), . . . , (np−1, np)∈ Rs,
n1 = ni, and np = nk. Henceforth, a new relationship
S ⊆ N × N will contain the pairs of norms that are connected
by substitutabilities. In particular, notice that if (ni, nj) ∈ Rs,
then (ni, nj) ∈ S. Rs is an irreflexive, symmetric, and transi-
tive relation.
Next, we put together norms and their relationships in a structure
on which reasoning about norms will take place, the so-called norm
net.
DEF. 1. A norm net is a pair NN= (cid:104)N, R(cid:105), where N stands
for a set of norms and R = {Rg, Rx, Rs} contains generalisation,
exclusivity and substitutability relationships over the norms in N.
The relationships in R are mutually exclusive, namely Rg ∩ Rx =
∅, Rg ∩ Rs = ∅, and Rx ∩ Rs = ∅.
As observed in [23], generalisation and substitutability are mu-
tually exclusive relationships. Furthermore, here we also assume
that the exclusivity relationship is mutually exclusive with the gen-
eralisation and substitutability relationships.
Given a norm net NN= (cid:104)N, R(cid:105), we will refer to any subset of
the norms in N as a norm system. The challenge for a decision
maker is to select a norm system out of a norm net. In general, she
will be interested in norm systems that: (i) do not contain conflict-
ing norms; (ii) do not contain overlapping regulations; and (iii) do
incorporate as many norms as possible. In what follows, we shall
characterise these types of norm systems.
First, if we consider that exclusivity relationships capture con-
flicts between norms, the following characterisation of conflict-free
norm systems naturally follows.
DEF. 2. Given a norm net NN= (cid:104)N, R(cid:105), we say that a norm
system Ω ⊆ N is conflict-free iff for each ni, nj ∈ Ω, (ni, nj) /∈
Rx.
Second, notice that both generalisation and substitutability rela-
tionships capture redundancy. Indeed, selecting two substitutable
norms in a norm system would involve including overlapping reg-
ulations. The same applies to two norms such that one generalises
the other, namely the regulation of the more general one subsumes
that of the more specific. Hence, we characterise non-redundant
norm systems as follows.
DEF. 3. Given a norm net NN= (cid:104)N, R(cid:105), we say that a norm
system Ω ⊆ N is non-redundant iff for each ni, nj ∈ Ω: (i)
(ni, nj) /∈ Rg and nj /∈ A(ni); and (ii) (ni, nj) /∈ S
From the concepts above, we are ready to characterise the type
of norm systems a decision maker will be interested in.
DEF. 4. Given a norm net NN= (cid:104)N, R(cid:105), we say that a norm
system Ω ⊆ N is sound iff it is both conflict-free and non-redundant.
ii) The exclusivity relation is a binary relation Rx ⊆ N × N. If
(ni, nj) ∈ Rx we say that ni, nj are incompatible or mutually
exclusive. Rx is an irreflexive, symmetric, and intransitive
relation.
EXAMPLE 1. Figure 1 illustrates an example of a Norm Net
that includes some norms (rules) of border control at an interna-
tional airport. Norms are depicted as circles labeled as n1, . . . , n5
respectively. In particular, they are defined as follows:
programming solvers. Finally, in section 3.2 we discuss on several
ways of computing the representativeness of a norm system.
3.1 The maximum norm system problem
We first focus on defining how to obtain the representation power
of a normative system. This is based on the representation power
of each of its norms. Since we can think of several ways of com-
puting a norm's representation power (e.g. a norm can represent
itself, or all the norms it generalises), as discussed in section 3.2,
for now we just consider that we will count on a linear function,
the so-called representation power function, r : N → R that yields
such value. Besides linearity, the only condition that we will im-
pose on r is that r(ni) ≤ r(nj) for each nj ∈ A(ni). Hence,
the representation power of a normative system Ω can be readily
obtained by adding the representation power of its norms, namely
ρ(Ω) =(cid:80)
Now we are ready to formalise our optimisation problem.
PROBLEM 1. Given a norm net NN= (cid:104)N, R(cid:105) and a representa-
tion power function r, the maximum norm system problem (MNSP)
is that of finding a sound norm system Ω with the maximum rep-
resentation power, namely such that there is no other norm system
Ω(cid:48) ⊆ N such that ρ(Ω(cid:48)) > ρ(Ω).
n∈Ω r(n).
LEMMA 1. The complexity of the maximum norm system prob-
lem is at least NP-Hard.
PROOF. 1. The proof goes trivially by reduction of the maxi-
mum independent set problem, which is known to be an NP-Hard
optimisation problem [17], to the maximum norm system problem.
Consider that we want to find the maximum independent set of a
graph G = (V, E). Now say that each vertex in V stands for a
norm and each edge in E stands for an exclusivity relationship in
Rx. From this follows, that finding the maximum independent set of
G amounts to solving the maximum norm set problem on the norm
net (cid:104)V,{Rx}(cid:105), where the representation power function is defined
as r(v) = 1 for each v ∈ V .
Next we show how to solve the MNSP by encoding the optimisa-
tion problem as a linear program. Thus, consider a norm net NN=
(cid:104)N, R(cid:105), and a set of binary decision variables {x1, . . . , xN}, where
each xi encodes the decision of whether norm ni is selected (taking
value 1) for a norm system or not (taking value 0). Thus, solving
the MNSP amounts to solving the following linear program:
max
r(ni) · xi
(1)
N(cid:88)
i=1
subject to the constraints that capture the generalisation, exclusiv-
ity, and substitutatibility relationships in the norm net, which we
specify as follows:
• A family of generalisation constraints to avoid redundancy.
Such constraints impose that:
-- A norm cannot be selected together with any of the
norms that it directly generalises. Given a norm ni, the
norms generalised by ni is defined as Children(ni) =
{nj(ni, nj) ∈ Rg}. Then, formally the following
constraints must hold:
xi + xj ≤ 1 nj ∈ Children(ni) 1 ≤ i ≤ N (2)
-- All the children of a norm cannot be simultaneously
xj < Children(ni) 1 ≤ i ≤ N
(3)
selected. Formally:
(cid:88)
nj∈Children(ni)
Figure 1: Norm Net example: rules of border control at an interna-
tional airport.
n1 : P ermission(all_passengers, cross_border)
n2 : Obligation(all_passengers, register_passport)
n3 : Obligation(all_passengers, fulfil_form)
n4 : Obligation(locals, fulfil_form)
n5 : Obligation(visitors, fulfil_form)
Norm n1 rules free movement of passengers, allowing all pas-
sengers to cross the border without any additional action. On the
other hand, norm n2 requires all passengers to register their pass-
port, and there is still a third rule n3 that requires them to fulfil
a form asking for passport information such as passport number,
holder's name or address.
Regarding exclusivity relationships, first and second norms are
exclusive ((n1, n2) ∈ Rx) because it is not possible to ask pas-
sengers to perform an action (in this case, register their passport)
and allow them to go ahead and simply cross the border. The same
reasoning applies for first and third norms, and thus, n1 and n3 are
also exclusive ((n1, n3) ∈ Rx). Figure 1 depicts such exclusivity
relationships with an "x dotted" line.
Additionally, there is a substitutability relationship between sec-
ond and third norms ((n2, n3) ∈ Rx), since it is possible to "mon-
itor" which passengers are actually crossing the border by register-
ing their password or by asking them to fulfil a form. Passengers
may even have to abide by both norms, since they could actually do
both things despite of its redundancy. Figure 1 shows this substi-
tutability relationship with an "o dotted" line.
Having a closer look to norm n3, we can see that asking all pas-
sengers to fulfill a form is a generalisation of two other norms: n4,
which requires local passengers to fulfill a form; and n5, which
requires foreign passengers (visitors) to fulfill a form. Formally,
we have ((n3, n4) ∈ Rg) and ((n3, n5) ∈ Rg). Figure 1 draws
this generalisation relationship with an arrow line. Since gener-
alisation is an anti-symmetric relationship, the arrowhead points
towards the general norm.
3. FINDING A MAXIMUM NORM SYSTEM
The purpose of this section is to design the optimisation machin-
ery required to help a regulation authority find a particular type of
sound norm system. Since the regulation authority's purpose is to
incorporate as many norms as possible out of those proposed in a
norm net, informally we will aim at the norm system that repre-
sents the largest number of norms in the norm net. With this goal
in mind, we first start in section 3.1 by formally casting our prob-
lem as an optimisation problem, and by characterising its hardness.
Thereafter, we show how to encode our problem as a linear pro-
gram so that it can be solved with the aid of state-of-the-art linear
n2=Obl(all, register-passport)n3=Obl(all, fulfil-form)n5=Obl(visitors, fulfil_form)n4=Obl(locals, fulfil_form)n1=Perm(all, cross_border) xx x xxx xxxxxxxxxxxxxxxGeneralisationx xxxExclusivityo oooSubstitutability -- A norm cannot be simultaneously selected together with
any of its ancestors, namely:
xi + xk ≤ 1 nk ∈ A(ni) 1 ≤ i ≤ N
(4)
• Exclusivity constraints preventing that two mutually exclu-
sive (incompatible) norms are jointly selected to be part of a
norm system. Thus, the following constraints must hold:
xi + xj ≤ 1 for each (ni, nj) ∈ Rx
(5)
• Substitutability constraints avoiding that interchangeable norms
are simultaneously selected. This amounts to enforcing that
any pair of norms that are connected by substitutabilities can-
not be simultaneously selected, namely:
xi + xj ≤ 1 for each (ni, nj) ∈ S
(6)
Notice that this constraint ensures that two norms in Rs are
not jointly selected.
In this paper we propose two different variations of the represen-
tation power function. First, the inclusion power function considers
as representation power the number of norms directly generalised
or indirectly generalised (by being an ancestor) of a norm. Thus,
it provides a local measure of representation power. Second, the
generalisation power function measures the representation power
of a norm based on its position in a generalisation hierarchy: the
deeper a norm is in the generalisation hierarchy (the farther from
the most general norm), the lower its representation power. The
next subsections detail both functions.
3.2.1
The inclusion power representation function is a function rI :
N → N that maps each norm to the number of norms it generalises.
Given a norm, its generalisation power is obtained by combining
the norms that it directly generalises together with the norms that its
children generalise. If a norm does not generalise any other norm,
we will set its inclusion power to 1. This leads to the following
recursive definition of inclusion power:
Inclusion power
Furthermore, we must also consider the binary constraints corre-
sponding to the norm decision variables, namely:
xi ∈ {0, 1} 1 ≤ i ≤ N
(7)
rI (ni) =
Notice also that the cost of encoding the MNSP as a linear pro-
), where m = Rg + Rx,
) is the cost of encoding the substitutability con-
N N(N N−2)
2
gram is O(m · N +
and N N(N N−2)
straints.
2
The specification above corresponds to a maximization problem
whose constraints are all inequalities. Hence, it is in standard form
and it can be solved with state-of-the-art linear program solvers
such as CPLEX or Gurobi.
EXAMPLE 2. Following our previous example in Figure 1, we
need five binary variables (x1, . . . , x5) to decide which norms to
select to solve the MSNP. If we consider r(ni) = 1 for 1 ≤ i ≤
5, then there are four norm systems that maximise the objective
function in equation 1 and satisfy constraints 2 to 7, namely: Ω1 =
{n1, n4}, Ω2 = {n1, n5}, Ω3 = {n2, n4}, and Ω4 = {n2, n5}.
These alternative norm systems are listed along the first column of
Table 1.
Finally, it may be worth mentioning that prior to determining the
maximum sound norm system, one may wonder if there always is
a sound norm system. This leads us to pose next problem that, de-
spite its simplicity, provides us with further insights into the prob-
lem under study.
PROBLEM 2. Given a Norm Net NN= (cid:104)N, R(cid:105) composed by set
of norms N and their relationships R, we aim at assessing if there
is some sound (non-empty) Ω ⊆ N.
Given the binary nature of the norm relationships, norm systems
composed by any single norm from N will always comply with
constraints, and thus, there will always exist at least N alternative
sound norm systems.
3.2 Computing representation power
As previously mentioned, we aim at computing the norm sys-
tem that represents the largest number of norms in the norm net,
which may not be the same as taking the largest number of norms
because we must consider generalisation relations. Hence, we in-
troduce alternative definitions of the representation power function
r to compute the representation power of norms.
1
(cid:88)
if (cid:54) ∃rj ∈ N, (ri, rj) ∈ Rg
rI (nj) otherwise
1 +
nj∈Children(ni)
In our example in figure 1, the inclusion power of n3 is 3, whereas
it is 1 for the rest of norms because none generalises other norms.
3.2.2 Generalisation power
The generalisation power representation function is a function
rg : N → (0, 1] that maps each norm to its generalisation power.
Informally, the less ancestors a norm has, the higher its generalisa-
tion power. Thus, a norm that has no ancestors takes on the max-
imum generalisation power (1). The generalisation power lowers
as norms are deeper in the generalisation hierarchy (i.e., are more
and more specific, and hence have more ancestors). If the gener-
alisation power of norm ni is larger than that of norm nj, we will
prefer to include ni in our norm system. This is because their gen-
eralisation powers tell us that ni is further up in the generalisation
hierarchy than nj, and hence closer to more general norms.
Algoritm 1 describes how generalisation power is computed for
a Norm Net NN= (cid:104)N, R(cid:105). Initially, lines 2-3 create two initial data
structures: g[], a unidimensional array storing the representation
powers for the norms in N; and P, a set of the norms for which the
generalisation power needs to be computed (initially N). Next, line
4 computes, by invoking function getNonGeneralised(), the subset
G ⊆ N of norms not being generalised by any other norm (i.e.,
G ← {ni ∈ S (cid:64)nj s.t. (nj, ni) ∈ Rg}). Lines 5-7 assign a
value of 1 for all the norms in G and remove them from P. The
rest of the algorithm is devoted to repeat, while there are still norms
in S, the computation of the generalisation powers for subsequent
levels in the generalisation hierarchy. Method SiblingGroups(P,
NN) in line 9 selects those norms that are generalised by norms
that do not belong to P (i.e., ni s.t. (nj, ni) ∈ Rg and nj ∈
N \ P) and groups them by siblings so that it returns SibList[],
a list of sets of siblings Ps = {ns1, . . . , nsk} s.t. (nj, ns1) ∈
Rg, . . . , (nj, nsk) ∈ Rg for each common parent nj. Then, line
12 assigns, for each sibling norm ni ∈ Ps, a generalisation value
g[i] = g[j]
Ps , which corresponds to the generalisation power of its
2 over the number of siblings. Once it is computed for
parent nj
all norms in Ps, the entire subset is subtracted from P (see line
2Notice that by construction, all norms in N \ P do have a com-
puted generalisation power.
13). Finally, the algorithm returns the g[] array that is used for
the implementation of function gi(ni) =g[i]. Thus for example,
if we have a norm ng generalising two other norms ns1 and ns2,
and ns1 in turn generalises two additional norms ns11 and ns12,
we would have the following generalisation powers: rg(n1) = 1;
rg(ns1) = rg(ns2) = 1/2; and rg(ns11) = ng(ns12) = 1/4.
Notice that this algorithm assigns a value to all norms in N and
traverses in subsequent generalisation levels all the norms in a gen-
eralisation tree hierarchy, and thus, its complexity is O(l · Rg +
N) being l the maximum generalisation level (i.e., the depth of
the deeper generalisation hierarchy).
(cid:46) generalisation power array
(cid:46) set of pending norms
(cid:46) general norms
g[1..N]
P ← N
G ← getNonGeneralised(P, NN)
for each norm ni ∈ G do
Algorithm 1 Generalisation power computation
1: procedure GENERALISATIONCOMP(NN)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
g[i] ← 1
P ← P \ {ni}
SibList[] ← getSiblingGroups(P, NN)
for each Ps in SibList[] do
end while
return g[1..N]
for each sibling ni ∈ Ps do
P ← P \ Ps
g[i] ← g[j]/Ps
while P (cid:54)= ∅ do
EXAMPLE 3. Following our example in Figure 1, we can com-
pare the two alternative representation power functions described
above. On the one hand, if we employ inclusion power as repre-
sentation function, the maximum norm system is Ω = {n3}. Natu-
rally, Ω = {n3} (see second column in Table 1) has been preferred
over the rest of sound norm systems, since its representation power
is 3, whereas the representation power for norm systems with two
norms (e.g., Ω = {n1, n4}) is 2. On the other hand, if we con-
sider generalisation power instead, there are four equally-valued
maximum norm systems, namely Ω1 = {n1, n4}, Ω2 = {n1, n5},
Ω3 = {n2, n4}, and Ω4 = {n2, n5}, as shown along the third
column of Table 1.
Overall, using alternative representation power functions results
in different maximum norm systems. The one to use is a deci-
sion left to the decision maker. In any event, representing as many
norms as possible may not always be the only criterion to enact a
norm system. This is the case if the decision maker considers fur-
ther criteria -- such as, for instance, the costs associated to norms.
Next section tackles this issue.
4. MULTI-OBJECTIVE OPTIMISATION FOR
NORM DECISION MAKING
max
In addition to pursuing norm representation maximisation when
choosing the norms to enact in a society, most often, regulation au-
thorities cannot ignore the fact hat norm deployment has associated
costs. This section deals with the combination of both criteria -- i.e.,
representation power and associated costs -- to decide the norm sys-
tem to enact.
Norm costs may represent monetary expenses derived from regu-
latory processes -- such as norm establishment or norm enforcement --
as well as non-monetary aspects -- such as social implications or
(cid:46) all values being defined
subject to constraints 2 to 7, namely the constraints that guarantee
the soundness of the norm system, and a further constraint:
cost(Ω) =(cid:80)
political correctness -- that can be somehow quantified. Given a
norm system, here we will consider that the cost of a norm sys-
tem can be obtained by adding the value of its norms, namely
ni∈Ω c(ni), where c(ni) stands for the cost of norm
ni. Furthermore, we make the (reasonable) assumption that costs
are bounded by a maximum budget b (i.e., the price regulatory au-
thorities are willing to pay) that is available to cover the expenses
of imposing those norms in the resulting Norm System. Then, we
can cast the decision problem faced by the decision maker as the
following multi-objective optimisation problem.
PROBLEM 3. Given a Norm Net NN= (cid:104)N, R(cid:105), a representa-
tion power function r, and a fixed budget b, the maximum norm
system problem with limited budget (MNSPLB) is the problem of
finding a sound norm system Ω ⊆ N with maximum representation
power and minimum cost limited by some non-negative budget b.
In order to solve the MNSPLB, we will try to cast it as a linear
program, likewise we did for the MNSP in section 3.1. Notice
though that solving the MNSPLB amounts to solving the following
optimisation problem:
(8)
N(cid:88)
N(cid:88)
i=1
i=1
max
r(ni) · xi
min
c(ni) · xi
N(cid:88)
i=1
c(ni) · xi ≤ b,
(9)
where b ≥ 0, to ensure that the cost of the norm system does
to go beyond the limited budget. The multi-objetive optimisation
problem represented by expression 8 above can be formulated as
a single-objective problem by aggregating the two objectives by
means of scalarisation [16]. This is achieved by: (i) normalising
the representation and cost values; and (ii) prioritising representa-
tion and cost values by means of weight values. On the one hand,
we can readily normalise representation values by considering a
maximum representation power. We can safely set this value to
r(nj), where recall that GN stands for the
set of norms that are not directly generalised by any other norm.
On the other hand, cost values can be normalied by means of the
maximum budget. As to how to prioritise representation costs and
values, we can simply employ a weight wr to weigh the importance
of maximising norm representation power, and another weight wc
to weigh the importance of minimising norm costs.
be Rmax =(cid:80)
nj∈GN
Putting all this together, the MNSPLB can be cast as a single-
objective optimisation problem that can be solved by the following
linear program:
(cid:104) wrRmax
N(cid:88)
i=1
·
xi · r(ni) + wc · (y − 1
b
xi · c(ni)
(10)
(cid:105)
N(cid:88)
i=1
subject to the constraints in equations 2-7, the budget constraint in
equation 9, plus the following additional constraints:
• The auxiliary indicator variable y must be assigned as fol-
lows:
1 if
N(cid:88)
i=1
0 Otherwise
y =
xi > 0
the following non-linear constraint:(cid:80)N
Notice that the assignment above captures the satisfaction of
i=1 xi > 0 =⇒ y =
1. Thus, the indicator variable will take on value 1 the deci-
sion variables indicate that at least one norm is selected as
part of the norm system, and value 0 when the selected norm
system is empty (namely xi = 0 for all 1 ≤ i ≤ N).
In other words, the indicator variable y is binary, and hence
must satisfy that:
y ∈ {0, 1}
(11)
Thus, the indicator variable guarantees that nothing is added
to the objective function if no norm is chosen. Furthermore,
(cid:80)N
this indicator variable allows us to turn the minimisation prob-
(cid:80)N
lem in equation 8 into a maximisation problem, since finding
i=1 xi·
the norm system with minimum (normalised) cost ( 1
b
c(ni)) amounts to maximising expression y − 1
i=1 xi ·
c(ni).
However, notice that the addition of indicator variable y re-
quires the satisfaction of a non-linear constraint (i.e., an im-
plication). Hence, in order to keep the problem linear, we
will linearise such constraint as follows:
b
N(cid:88)
y ≤
xi ≤ M · y
(12)
where M is a very large number. 3
i=1
• The weights to measure the importance of maximising rep-
resentation power and minimising cost must satisfy:
wr + wc = 1
wr, wc ∈ [0, 1]
(13)
The next example helps us illustrate how different elements in
our multi-objective decision function influence the norms that are
finally chosen to establish in a society. Specifically, we focus on the
influence of: using our different representation power functions;
changing norm costs; and variations in the total budget limit.
EXAMPLE 4. In our example, we could initially assume a max-
imum budget of 5 and consider the following costs: n1 has no as-
sociated cost because it requires no additional actions; n2 has an
associated cost of 2 since it requires passengers to interact with
passport registration machines and a few staff members; the cost of
n3 is 5 due to the fact that it requires form fulfilling, gathering, and
post-processing; and n4 and n5, which are more specific than n3,
just cost 2. Hence: b=5, c1=0, c2=c4=c5=2, c3=5. Moreover, in
this example we will equally value the importance of norm repre-
sentation and deployment cost, and thus, we set wr = wc = 0.5,
and, finally, the maximum representation power is computed as
Rmax = 5 when considering rI whereas Rmax = 3 if rg is used
instead.
Now, considering rg -- the generalization power function -- in equa-
tion 10, with restrictions from equations 2-7, 9, and 11-13, the lin-
ear program solver returns Ω = {n1} as the optimally sound norm
system (see first Ω in fifth column in Table 1). Nevertheless, if cost
of norm n1 is increased up to c1 = 6, since not checking passports
at the border may cause political problems with the neighbouring
countries, the solver will then choose Ω = {n2} to be the optimally
sound norm system (see second Ω in fifth column in Table 1).
Alternatively, if we consider the inclusion power function rI in-
stead, but keep initial costs assumptions (i.e.,c1 = 0) Ω = {n1}
remains as the optimally sound norm system (as shown in first Ω
3In our problem M can be defined to be strictly larger than N.
Table 1: Proposed problems formulation and results for the exam-
ple in Figure 1.
MNSP MNSP
Max.
Max.
max.
max.
gen.
incl.
1
1
inclus.
rI
2-7
generl.
rg
2-7
Criteria
Objective
function
Represent.
power r
Constraints
Example
solutions
Ω ={n3}
Ω ={n1, n4},
{n1, n5},
{n2, n4},
{n2, n5}
MNSPLB
Multi-objt.
max. incl.
min. cost
10
inclusion
rI
2-7,9,11-13
Ω = {n1}
Ω = {n1, n4},
{n1, n5}
Ω = {n2},
{n4},{n5}
Ω = {n4},{n5}
Ω = {n3}
MNSPLB
Multi-objt.
max. gen.
min. cost
10
generalisat.
rg
2-7,9,11-13
Ω = {n1}
Ω = {n2}
in fourth column in Table 1). In fact, this result does not change
if we decrease the maximum budget to b = 4. However, if we fur-
ther increase it to b = 10, this optimally sound norm system is
enlarged to include one of the specific norms so that Ω = {n1, n4}
or Ω = {n1, n5} in second Ω in Table 1's fourth column. Fur-
thermore, the solver also computes different results for c1 = 6 and
maximum budgets: b = 4 produces three possible optimally sound
norm systems: Ω = {n2}, Ω = {n4}, and Ω = {n5} (see third
Ω in fourth column); b = 5 implies two possible optimally sound
norm systems Ω = {n4} and Ω = {n5}; and finally, b = 10 re-
sults in Ω = {n3}, since the inclusion power of n3 can compensate
its high cost (c3 = 5) when normalised by 10.
Previous example has briefly illustrated how several factors in our
multi-objective decision function influence the computed result.
Nevertheless, as previously mentioned, we assume the regulatory
authorities' particular needs will naturally determine these factors.
It is important to have in mind that our aim here is limited to model
alternative problems, and thus, we summarise them in subsequent
columns in Table 1. Specifically, first raw describes in plain (ab-
breviated) language the criteria that has been applied for the for-
malisation of each problem. Then, second row references the equa-
tion that describes the objective function. Third row specifies the
actual representation power function in use. Fourth row lists the
constraints to which the objective function is subject to. And fi-
nally, last row compiles the different norm systems that have been
computed for our running example.
5. MORAL VALUES IN NORM DECISION
MAKING
So far we have considered quantitative criteria that regulation
authorities can take into account when choosing the norms to enact
in a society. However, decision makers may also require to assess
the moral values promoted by the norms in a given norm network
under analysis. Here we understand that a norm supports a given
moral value when the norm is meant to accomplish a goal that is
aligned with (or promotes) the moral value. In this case, we will
assume that the society has moral/social preferences over values.
Thus, bringing in values into the norm decision making of regula-
tory authorities can be regarded as a qualitative criterion.
Based on the moral/social preferences over values, to reason
about norm systems we must be able to compare them in terms
of the values that they support. The principle that we adhere to
the more preferred the values supported by a norm system,
is:
the more preferred that norm system. Thus, ideally, the decision
maker would like to opt for the norm system that supports the most
preferred values out of all the sound norm systems. Nonetheless,
we cannot forget that further criteria such as representation power
and cost, as dicussed in sections 3 and 4, must be part of the deci-
sion making. This section is devoted to extend the multi-objective
decision-making problem introduced in section 4 to account for the
moral values supported by norms.
Our first goal is to be able to quantitatively reason about norm
systems based on the qualitative preferences over the moral values
that they support. First, in order to connect moral values and norms,
we adapt some value-related definitions by Bench-Capon et al.[9].
Thus, we shall consider V as a non-empty set of moral values in
a society. We will assume that values are not connected objects,
namely there are no relationships between them, like e.g. comple-
mentarity. Moreover, we will assume that there is a total order (no
ties) (cid:31) over the moral values in V that reflects the moral/social
preferences over them. Without loss of generality, we can assume
that v1 (cid:31) v2 (cid:31) . . . (cid:31) vV . Now, we can obtain the value(s) sup-
ported by each norm by means of a function val : N → 2V \ ∅.
Thus, val(ni) stands for the set of values promoted by norm ni.
Now we introduce a utility function that will allow us to cap-
ture the total ordering over values. The utility of a value can be
calculated as:
u(vi) = 1 +
u(vk)
(14)
where 1 ≤ i ≤ V . From this definition, it is clear that u(vi) >
u(vj) ⇔ vi (cid:31) vj From this, we can readily calculate the value
support of a norm ni by adding the utility of the values supported
by the norm as follows:
un(ni) =
u(v)
(15)
And from this, we can compute the value support for a given
norm system Ω ⊆ N by adding the utility of the values supported
by each one of its norms as:
V (cid:88)
k=i+1
(cid:88)
v∈val(ni)
(cid:88)
n∈Ω
uN (Ω) =
un(n)
(16)
Notice that utility function uN allows us to lift the preferences
defined as a linear order over single moral/social values to a pref-
erence relation over bundles of norms. Thus, we will say that
Ω (cid:31) Ω(cid:48) ⇔ uN (Ω) > uN (Ω(cid:48)). Interestingly, the lifting of pref-
erences provided by the uN utility function satisfies two interest-
ing properties: (i) responsiveness [8]; and (ii) monotonicity. Infor-
mally, responsiveness (also called pairwise-dominance), states that
if in a norm system {n2, n3}, n3 is replaced by a better (supporting
more preferred values) norm, e.g. n1, then {n2, n1} makes a better
norm system. Monotonicity states that if Ω ⊃ Ω(cid:48), then Ω (cid:31) Ω(cid:48).
These observations are fomally captured in the folllowing lemma.
LEMMA 2. The utility function uN guarantees responsiveness
and monotonicity.
PROOF. 2. To prove responsiveness it suffices to show that given
a norm system Ω such that ni ∈ Ω, nj (cid:54)∈ Ω, and nj (cid:31) ni, then
Ω\{ni}∪{nj} (cid:31) Ω. Let us note Ω−i = Ω\{ni}. Since uN (Ω) =
uN (Ω−i) + un(ni) < uN (Ω−i) + un(nj) = uN (Ω−i ∪ {nj}),
Figure 2: Example of rules of border control (n1, . . . , n5) together
with the values they support (v1, v2).
then Ω\{ni}∪{nj} (cid:31) Ω holds. As for monotonicity, this immedi-
ately follows from the definition of utility of a value in 14. Given two
norm systems such that Ω ⊃ Ω(cid:48), it is clear that uN (Ω) > uN (Ω(cid:48))
since the value support for each norm in Ω \ Ω(cid:48) is greater or equal
than 1, and hence Ω (cid:31) Ω(cid:48).
At this point, we can quantitatively compare norm systems based
on the values that they support. Hence, we are ready to define a
new multi-objective optimisation problem involving values as an
extension of problem 3.
PROBLEM 4. Given a Norm Net NN= (cid:104)N, R(cid:105), a representa-
tion power function r, a fixed budget b, a set of values V and a lin-
ear order (cid:31) over its values, the value-based maximum norm system
problem with limited budget (VMNSPLB) is the problem of finding
a sound norm system Ω ⊆ N with maximum representation power,
minimum cost limited by some non-negative budget b, and maxi-
mum value support.
This problem can be encoded as a linear program by extend-
ing the one in section 4. In order to embed the maximisation of
the value support of normative systems in the objective function of
expression 8, we require: (i) a normalisation constant for the val-
ues of uN ; and (ii) some prioritisation weight wv that measures
the relative importance of maximising value support. Notice that
we can safely normalise moral values by considering Vmax =
i=1 un(ni) as the normalisation constant. Then, solving the
VMNSPLB amounts to solving the following linear program, which
combines the maximisation of representation power, the minimisa-
tion of cost, and the maximisation of value support:
(cid:80)N
(cid:104) wrRmax
·
N(cid:88)
i=1
max
xi · r(ni) + wc · (y − 1
b
xi · c(ni))+
(cid:105)
+
wvVmax
·
xi · un(ni)
N(cid:88)
N(cid:88)
i=1
i=1
(17)
subject to constraints from equations 2 to 7, 9, 11, and 12, together
with a reformulation of the weight constraints (in eq. 13) as:
wr + wc + wv = 1 wr, wc, wv ∈ [0, 1]
(18)
n2=Obl(all, register-passport)n3=Obl(all, fulfil-form)n5=Obl(visitors, fulfil_form)n4=Obl(locals, fulfil_form)n1=Perm(all, cross_border) xx x xxx xxxxxxxxxxxxxxxGeneralisationx xxxExclusivityo oooSubstitutability+ + + + valuesupportv1="free movement of persons" v2="safety" + ++++ ++++ ++++++++++++++++++ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ++++ + + + + + + +EXAMPLE 5. In our example, as Figure 2 shows, we can con-
sider that n1 supports the "free movement of persons" value (v1),
whereas n2, . . . , n5 support the "safety" value (v2). Let us con-
sider that the society prefers "free movement" to "safety" (namely
"free movement" (cid:31) "safety"), then, u(v1) = 2 and u(v2) = 1
and that moral values are the only criterion to consider (i.e., wr =
wc = 0 and wv = 1). Therefore, our problem amounts to finding
the sound norm system that has maximum value support. Then, if
we encode the problem, a linear program solver results in two al-
ternative solutions Ω = {n1, n4}, Ω = {n1, n5}. In other words,
they constitute two different value-optimal sound norm systems.
6. DISCUSSION: DEALING WITH NORMS
IN FORCE
So far we have considered that a norm net does contain all the
norms and relationships a decision maker is to reason about. How-
ever, this many not be typically the case. Instead, she may already
count on a collection of norms currently in force. If this is the case,
the decision making process must consider such norms as part of
the norm reasoning together with the norm net containing a new
collection of candidate norms. Here we identify two main strategies
to tackle this type of reasoning: (1) to consider that norms in force
must be preserved; and (2) to consider that norms in force must
not be necessarily preserved. The first strategy will have to con-
sider that norms in force translate into hard constraints in the norm
decision making process, whereas the second strategy adds more
flexibility to the decision maker. In what follows, we discuss how
these strategies can be readily accommodated in our optimisation-
based framework.
Henceforth, we shall consider that N0 stands for a set of norms in
force and NN= (cid:104)N, R(cid:105) stands for a norm net containing candidate
norms to reason about together with their relationships. Whatever
the strategy we adopt, we must build an extended norm net that
merges the norms in force with the norm net. This will result in
a new norm net NN(cid:48) = (cid:104)N0 ∪ N, R ∪ R0(cid:105), where R(cid:48) stands for
generalisation, exclusivity and substitutability relationships hold-
ing between the norms in force in N0 and the norm candidates in
the norm net, namely in N.
EXAMPLE 6. Figure 3 shows an extension of the example in
figure 1. The norms in force in N0 are the following norms:
n6 : P rohibition(all_passengers, unattend_luggage)
n7 : Obligation(all_passengers, passport_control)
Norm n6 prohibits all passengers to leave their luggage unattended
and norm n7 forces all passengers to go through passport control.
Notice that there is a new exclusivity relation between n7 and n1,
so that (n7, n1) ∈ R0 will be added to the new norm net NN'.
Now we are ready to consider how to preserve the norms in force
within our optimisation framework. This can be readily achieved
by encoding the optimisation problem of choice for the extended
norm net. However, imposing that the norms in force (i.e., in N0)
are always selected as part of the norm system requires to add fur-
ther constraints to our optimisation problem. Thus, we add the fol-
lowing constraints:
xn = 1 for all n ∈ N0
(19)
EXAMPLE 7. Consider again our example in Figure 3. Obvi-
ously, the norms to append to N0 = {n6, n7} will depend on the
prioritising criteria. However, norm n1 in first Ω in Table 1's last
Figure 3: Example of N0, a Norm Net NN', and an exclusivity
relation between norms in N0 and N.
column cannot be part of the resulting norm system because of its
incompatibility with n7. Hence, n2, n3, n4, n5 would constitute the
norm candidates to be added to N0.
Finally, consider that not all norms in force must be preserved.
This adds more flexibility to the decision maker, who may discover
a norm system that is actually better (according to the decision cri-
teria of choice) than the norm system resulting of the preservation
of the norms in force. Notice that, in this case, we just need to en-
code our optimisation problem of choice for the extended norm net
NN' without adding any further constraints like 19.
EXAMPLE 8. Going back to our running example, if maximum
budget is b=5, norms n6 and n7 have cost 1, n1 has 0 cost, and
we use rg, then new norm net becomes NN'=(cid:104){n1, n6},∅(cid:105). As a
consequence, n7 would be replaced by n1 in N(cid:48). Alternatively, in
case we consider again c1=6, no actual changes would take place
in N0 so that NN'=(cid:104){n6, n7},∅(cid:105).
7. CONCLUSIONS AND FUTURE WORK
The contribution of this paper is the modelling of a variety of
norm decision-making problems faced by policy makers when choos-
ing the norms to enact in a society. Our modeling assumes that a
policy maker has knowledge about candidate norms to enact and
the relationships between such norms. In particular, our work char-
acterises generalisation, exclusivity, and substitutability as norm re-
lationships. Furthermore, we show that the decision-making prob-
lems faced by policy makers can be cast as optimisation problems
with multiple decision criteria (representation power, cost, and as-
sociated moral values). To the best of our knowledge, using moral
values as a norm selection criterion is a particularly relevant contri-
bution to the Normative Multi-Agent Systems research community.
Furthermore, the complexity of the resulting optimisation problems
makes their solving non trivial. And yet, we managed to encode
them as linear programs so that they can be solved with the aid of
state-of-the-art linear programming solvers.
However, our work opens many interesting paths to future re-
search. First, it is worth to conduct an empirical evaluation investi-
gating the empirical hardness of different norm decision scenarios
depending on the density of norm relationships. Second, reasoning
about norms and values could be taken a step further by consider-
ing that norms support positively or negatively values. Moreover,
from a pragmatic perspective: we could deal with a partial order
(instead of a total order) over values, perform automated discovery
of norm relationships, and embed our decision-making solvers into
a decision support tool for policy makers.
n2=Obl(all, register passport)n3=Obl(all, fulfil form)n5=Obl(visitors, fulfil form)n4=Obl(locals, fulfil form)n1=Perm(all, cross border) xx x xxx xxxxxxxxxGeneralisationx xxxExclusivityo oooSubstitutabilityn6=Proh(all, unatt.luggage)n7=Obl(all, passport ctrl) NNN0D. Sleeman. Norm Conflicts and Inconsistencies in Virtual
Organisations, pages 245 -- 258. Springer Berlin Heidelberg,
Berlin, Heidelberg, 2007.
[20] S. Modgil. Value based argumentation in hierarchical
argumentation frameworks. In Proceedings of the 2006
Conference on Computational Models of Argument:
Proceedings of COMMA 2006, pages 297 -- 308, Amsterdam,
The Netherlands, The Netherlands, 2006. IOS Press.
[21] J. Morales, M. Lopez-Sanchez, J. A. Rodriguez-Aguilar,
W. Vasconcelos, and M. Wooldridge. On-line automated
synthesis of compact normative systems. ACM Transactions
on Autonomous and Adaptive Systems (TAAS),
10(1):2:1 -- 2:33, Mar. 2015.
[22] J. Morales, M. Lopez-Sanchez, J. A. Rodriguez-Aguilar,
M. Wooldridge, and W. Vasconcelos. Minimality and
simplicity in the on-line automated synthesis of normative
systems. In AAMAS 2014, pages 109 -- 116, Richland, SC,
2014. IFAAMAS.
[23] J. Morales, M. L'opez-S'anchez, J. A. Rodr'iguez-Aguilar,
M. Wooldridge, and W. Vasconcelos. Synthesising liberal
normative systems. In Proceedings of the 2015 International
Conference on Autonomous Agents and Multiagent Systems,
AAMAS '15, pages 433 -- 441, Richland, SC, 2015.
International Foundation for Autonomous Agents and
Multiagent Systems.
[24] R. Riveret, E. Nepomuceno, J. Pitt, and A. Artikis.
Self-governance by transfiguration: From learning to
prescription changes. pages 70 -- 79. IEEE, 2014.
[25] B. Savarimuthu, S. Cranefield, M. Purvis, and M. Purvis.
Identifying prohibition norms in agent societies. Artificial
Intelligence and Law, 21(1):1 -- 46, 2013.
[26] R. Sethi and E. Somanathan. The evolution of social norms
in common property resource use. The American Economic
Review, pages 766 -- 788, 1996.
[27] Y. Shoham and M. Tennenholtz. On social laws for artificial
agent societies: off-line design. Artificial Intelligence,
73(1-2):231 -- 252, February 1995.
[28] W. W. Vasconcelos, M. J. Kollingbaum, and T. J. Norman.
Normative conflict resolution in multi-agent systems.
Autonomous Agents and Multi-Agent Systems,
19(2):124 -- 152, 2009.
[29] D. Villatoro, J. Sabater-Mir, and S. Sen. Social instruments
for robust convention emergence. In IJCAI, pages 420 -- 425,
2011.
[30] V. Weerakkody and C. G. Reddick. Public sector
transformation through e-government: experiences from
Europe and North America. Routledge, 2012.
[31] F. L. y López, M. Luck, and M. d'Inverno. Constraining
autonomy through norms. In AAMAS, pages 674 -- 681. ACM,
2002.
REFERENCES
[1] Citizen space in new zealand's ministry of justice: Better
family violence law.
https://consultations.justice.govt.nz/policy/family-violence-
law/.
[2] Loomio: software to assist collaborative decision-making
processes. https://www.loomio.org/.
[3] Pensions policy institute in new zealand: Citizen's pension:
Lessons from new zealand and state pension reform: The
consultation response.
http://www.pensionspolicyinstitute.org.uk/press/press-
releases/citizens-pension-lessons-from-new-zealand-and-
state-pension-reform-the-consultation-response.
[4] City of Barcelona participation portal.
https://decidim.barcelona, 2016.
[5] City of Madrid participation portal. https://decide.madrid.es/,
2016.
[6] City of Reykjavík participation portal.
http://reykjavik.is/en/participation, 2016.
[7] T. Agotnes and M. Wooldridge. Optimal Social Laws. In
Proceedings of the International Conference on Autonomous
Agents and Multi-Agent Systems (AAMAS), pages 667 -- 674,
2010.
[8] S. Barbera, P. Hammond, and C. Seidl, editors. Handbook of
utility theory. Kluwer, Boston, Mass. [u.a.], 2004.
[9] T. J. M. Bench-Capon and K. Atkinson. Abstract
argumentation and values. In Argumentation in Artificial
Intelligence, pages 45 -- 64. 2009.
[10] G. Boella, L. van der Torre, and H. Verhagen. Introduction to
normative multiagent systems. Computational &
Mathematical Organization Theory, 12(2-3):71 -- 79, 2006.
[11] J. Campos, M. López-Sánchez, M. Salamó, P. Avila, and
J. A. Rodríguez-Aguilar. Robust regulation adaptation in
multi-agent systems. ACM Transactions on Autonomous and
Adaptive Systems, 8:1 -- 27, 2013. IF 1.286, Q1 Computer
Science, Theory & Methods cat.
[12] C. DeTar. InterTwinkles: Online Tools for Non-Hierarchical,
Consensus-Oriented Decision Making. PhD thesis, Media
Arts and Sciences at the Massachusetts Institute of
Technology, 2013.
[13] D. Fitoussi and M. Tennenholtz. Choosing social laws for
multi-agent systems: Minimality and simplicity. Artificial
Intelligence, 119(1-2):61 -- 101, 2000.
[14] N. Griffiths and M. Luck. Norm Emergence in Tag-Based
Cooperation. In Proceedings of COIN, 2010.
[15] D. Grossi and F. Dignum. From abstract to concrete norms in
agent institutions. In Proceedings of the Third international
conference on Formal Approaches to Agent-Based Systems,
FAABS'04, pages 12 -- 29, Berlin, Heidelberg, 2005.
Springer-Verlag.
[16] C.-L. Hwang and A. S. M. Masud. Multiple objective
decision making methods and applications: a state-of-the-art
survey, volume 164. Springer Science & Business Media,
2012.
[17] R. M. Karp. Reducibility among combinatorial problems. In
Complexity of computer computations, pages 85 -- 103.
Springer, 1972.
[18] T. Kohler, J.-P. Steghoefer, D. Busquets, and J. Pitt. The
value of fairness: Trade-offs in repeated dynamic resource
allocation. pages 1 -- 10. IEEE, 2014.
[19] M. J. Kollingbaum, T. J. Norman, A. Preece, and
|
1906.10124 | 1 | 1906 | 2019-06-25T15:18:10 | On Multi-Agent Learning in Team Sports Games | [
"cs.MA",
"cs.AI",
"cs.HC",
"cs.LG"
] | In recent years, reinforcement learning has been successful in solving video games from Atari to Star Craft II. However, the end-to-end model-free reinforcement learning (RL) is not sample efficient and requires a significant amount of computational resources to achieve superhuman level performance. Model-free RL is also unlikely to produce human-like agents for playtesting and gameplaying AI in the development cycle of complex video games. In this paper, we present a hierarchical approach to training agents with the goal of achieving human-like style and high skill level in team sports games. While this is still work in progress, our preliminary results show that the presented approach holds promise for solving the posed multi-agent learning problem. | cs.MA | cs | On Multi-Agent Learning in Team Sports Games
Yunqi Zhao 1 Igor Borovikov 1 Jason Rupert 2 Caedmon Somers 2 Ahmad Bierami 1
9
1
0
2
n
u
J
5
2
]
A
M
.
s
c
[
1
v
4
2
1
0
1
.
6
0
9
1
:
v
i
X
r
a
Abstract
In recent years, reinforcement learning has been
successful in solving video games from Atari to
Star Craft II. However, the end-to-end model-free
reinforcement learning (RL) is not sample effi-
cient and requires a significant amount of com-
putational resources to achieve superhuman level
performance. Model-free RL is also unlikely to
produce human-like agents for playtesting and
gameplaying AI in the development cycle of com-
plex video games. In this paper, we present a
hierarchical approach to training agents with the
goal of achieving human-like style and high skill
level in team sports games. While this is still work
in progress, our preliminary results show that the
presented approach holds promise for solving the
posed multi-agent learning problem.
1. Introduction
Computer simulated environments, and particularly games,
have played a central role in advancing artificial intelligence
(AI). From the early days of machines playing checkers
to Deep Blue, and to the most recent accomplishments of
Atari bots, AlphaGo, OpenAI Dota 2 bots, and AlphaStar,
artificial game agents have achieved superhuman level per-
formance even in the most complex games. This progress is
mainly due to a combination of advancements in deep learn-
ing, tree search, and reinforcement learning (RL) techniques
in the past decade.
(Samuel, 1959) used a form of heuristic search combined
with RL ideas to solve checkers. IBM Deep Blue followed
the tree search path and was the first artificial game agent
who beat the chess world champion, Gary Kasparov (Deep
Blue, 1997). A decade later, Monte Carlo Tree Search
1EA Digital Platform Data & AI, Electronic Arts, Red-
wood City, CA 94065 USA 2EA Sports, Electronic Arts, 4330
Sanderson Way, Burnaby, BC V5G 4X1, Canada. Correspon-
dence to: Yunqi Zhao <[email protected]>, Igor Borovikov
<[email protected]>, Ahmad Beirami <[email protected]>.
Proceedings of the 36 th International Conference on Machine
Learning, Long Beach, California, PMLR 97, 2019. Copyright
2019 by the author(s).
(MCTS) (Coulom, 2006; Kocsis & Szepesv´ari, 2006) was
a big leap in AI to train game agents. MCTS agents for
playing Settlers of Catan were reported in (Szita et al., 2009;
Chaslot et al., 2008) and shown to beat previous heuristics.
(Heyden, 2009) compares multiple approaches of agents
to one another in the game Carcassonne on the two-player
variant of the game and discusses variations of MCTS and
Minimax search for playing the game. MCTS has also been
applied to the game of 7 Wonders (Robilliard et al., 2014)
and Ticket to Ride (Huchler, 2015).
(Tesauro, 1995), on the other hand, used TD-Lambda which
is a temporal difference RL algorithm to train Backgam-
mon agents at a superhuman level. More recently, deep Q
networks (DQNs) have emerged as a general representa-
tion learning framework from the pixels in a frame buffer
combined with Q-Learning with function approximation
without need for task-specific feature engineering (Mnih
et al., 2015).1 The impressive recent progress on RL to
solve video games partly owes to the recent abundance of
processing power and AI computing technology.2
DeepMind researchers remarried the two approaches by
demonstrating that neural networks and their generalization
properties could significantly speed up and scale MCTS.
This led to AI agents that play Go at a superhuman level (Sil-
ver et al., 2016), and solely via self-play (Silver et al.,
2017b;a). Subsequently, OpenAI researchers showed that
a policy optimization approach with function approxima-
tion, called Proximal Policy Optimization (PPO) (Schulman
et al., 2017), would lead to training agents at a superhu-
man level in Dota 2 (OpenAI Five, 2018). The most recent
progress was reported by DeepMind on StarCraft II, where
AlphaStar was unveiled to play the game at a superhuman
level by combining a variety of techniques including the use
of attention networks (AlphaStar, 2019).
Despite the tremendous success stories of deep RL at solv-
ing games, we believe that winning isn't everything. We
consider the alternative problem of training human-like and
believable agents that would make the video game engag-
1While the original DQNs worked with pixels as state space,
the same idea could be applied to other cases by changing the
network structure appropriately.
2The amount of AI compute has been doubling every 3-4
months in the past few years (AI & Compute, 2018).
On Multi-Agent Learning in Team Sports Games
ing and fun for the human players. As video games have
evolved, so have the game graphics and the gameplaying
AI, also referred to as game AI. Considering games with a
limited state-action space, such as Atari games, the human-
likeness and believability of AI agents would be non-issues.
Today, we have reached a point where game worlds look
very realistic calling for more intelligent and realistic game-
playing agents.
While the traditional game AI solutions are already pro-
viding excellent experiences for players, it is becoming
increasingly more difficult to scale those handcrafted solu-
tions up as the game worlds are becoming larger, the content
is becoming more dynamic, and the number of interacting
agents is increasing. This calls for alternative approaches
to train human-like and believable game AI. We build on
a variety of planning methods and machine learning tech-
niques (including the state-of-the-art deep RL) and move
away from the recent trends at training superhuman agents
in solving the game AI problem (Zhao et al., 2019).
In this paper, we describe a work-in-progress hierarchical
solution to a team sports video game. At a low level, the
agents need to take actions that are believable and human-
like whereas at a high level the agents should appear to be
following a "game plan". While imitation learning seems
apt for solving the low level problem, we propose to rely on
reinforcement learning and planning to solve the high-level
game strategic plan.
The rest of the paper is organized as follows. In Section 2,
we provide the basic problem setup. In Section 3, we de-
scribe the solution techniques used to solve the problem.
In Section 4, we provide a more in-depth presentation of
the reinforcement learning techniques used for achieving
multi-agent strategic gameplay. Finally, concluding remarks
are presented in Section 5.
2. Problem Setup & Related Work
In this paper, we study a team sports video game, where
the designer's goal is to train agents that exhibit strategic
teamplay with a high skill level while the agents play like
human players. Hence, the solution would entail a variety
of techniques, which will be discussed in more detail in this
section.
2.1. Multi-agent learning
Our problem naturally lends itself to the multi-agent learn-
ing (MAL) framework. In such a framework, iteratively
optimizing for a policy could suffer from non-convergence
due to the breakdown of the stationarity of the decision pro-
cess and partial observability of the state space (Littman,
1994; Chang et al., 2004). This is because the environment
for each of the agents would change whenever any other
agent updates their policy, and hence independent reinforce-
ment learning agents do not work well in practice (Matignon
et al., 2012).
More recently, (Lowe et al., 2017) proposed an actor-critic
algorithm with a centralized critic during training and a
decentralized actor at training and inference. (Gupta et al.,
2017) compare policy gradient, temporal-difference error,
and actor-critic methods on cooperative deep multi-agent
reinforcement learning (MARL). See (Hernandez-Leal et al.,
2017; 2018) for recent surveys on MAL and deep MARL
advancements.
We emphasize that our problem is fundamentally simpler
than the MAL framework. In contrast to the robotics prob-
lems where each agent would need to execute their own
decentralized policy, in a video game all agents could be
trained centrally and executed centrally as well on a single
CPU. However, in the centralized treatment of the problem,
in addition to the action space growing exponentially with
the number of agents in the field, the chance of randomly
executing a strategic play is very low, which requires col-
lecting a huge number of state-action pairs for the agent to
be able to learn such strategies if they start from random
gameplay. We will discuss some of these challenges in
Section 4.
2.2. Learning from demonstrations
To ensure human-like behavior, we use human demonstra-
tions in the training loop. There are three general ways of
using the demonstrations to train agents. Inverse reinforce-
ment learning (IRL) (Ng & Russell, 2000; Abbeel & Ng,
2004) would infer reward functions that promote the ob-
served behavior in demonstrations, which can then be used
in model-free RL. However, IRL is by nature an ill-posed
inverse problem and tricky to solve, especially in a multi-
agent framework. (Ho & Ermon, 2016) proposed a direct
approach to distilling a policy from the demonstrations us-
ing adversarial training, which has recently been extended
to the multi-agent case (Yu et al., 2019).
It is also possible to use demonstrations to guide RL. (Levine
& Koltun, 2013) train off-policy RL using demonstrations.
(Mnih et al., 2015) use behavioral cloning to initialize value
and policy networks that would solve Go, and (AlphaStar,
2019) is built on the same thought process. (Vecer´ık et al.,
2017; Harmer et al., 2018) use demonstrations in the replay
buffer to guide the policy to a better local optimum. (Ra-
jeswaran et al., 2017; Peng et al., 2018) shape the reward
function to promote actions that mimic the demonstrator.
(Kartal et al., 2019) use demonstrations to teach the policy
to avoid catastrophic events in the game of Pommerman
where model-free RL fails.
On Multi-Agent Learning in Team Sports Games
2.3. Hierarchical learning
To manage the complexity of the posed problem (see Sec-
tion 3), our solution involves a hierarchical approach. (Le
et al., 2018) consider a hierarchical approach where the un-
derlying low level actions are learned via RL whereas the
high-level goals are picked up via IL from human demon-
strations. This is in contrast to the hierarchical approach that
we consider in this paper where we use IL at the low-level
to achieve human-like behavior. (Pang et al., 2018) break
down the complexity of the StarCraft learning environment
(Vinyals et al., 2017) by breaking down the problem to a
hierarchy of simpler learning tasks. (Bacon et al., 2017)
apply a planning layer on top of RL where they infer the ab-
stractions from the data as well. Finally, (Vezhnevets et al.,
2017) consider a bi-level neural network architecture where
at the top level the Manager sets goals at a low temporal
resolution, and at the low level the Worker produces prim-
itive actions conditioned on the high-level goals at a high
temporal resolution. More recently, (Zhan et al., 2018) pro-
vide a hierarchical generative model for achieving human
gameplay using weak supervision.
2.4. Human-Robot Interaction
The human-robot interaction problem shares many similari-
ties with the problem at hand (Sheridan, 2016). However,
training agents in video games is simpler in many ways.
First, the agents can execute their policies centrally and
there is no need for decentralized execution. Second, ex-
tracting semantic information from sensory signals such as
processing images/videos and text-to-speech conversion is
not needed as all of the semantic information is available
from the game engine. On the other hand, many of the
sample efficient learning techniques designed for training
robots are applicable to training agents in team sports video
games as well (Doering et al., 2019).
3. Solution Techniques
End-to-end model-free RL requires millions of state-action
pairs equivalent of many years of experience for the agent
to reach human-level performance.3 Applying these same
techniques to modern complex games for playtesting and
game AI requires obtaining and processing hundreds of
years of experience, which is only feasible using significant
cloud infrastructure costing millions of dollars (AlphaStar,
2019; Vinyals et al., 2017). Hence, we move away from the
end-to-end solutions in favor of hierarchical solutions by
breaking the complex problem into a hierarchy of simpler
learning tasks.
We assume multiple levels of the problem abstraction in a
3AlphaStar is trained using the equivalent of 60,000 years of
human experience.
team sports game. At the lowest level, the agent's actions
and movements should resemble that of actual human play-
ers. At the highest level, the agents should learn how to
follow a (learned) high-level game plan. In the mid-level,
the agents should learn to exhibit skill and to coordinate
their movements with each other, e.g., to complete success-
ful passes or to shoot toward the opponent's goal when they
have a good chance of scoring.
While making RL more sample efficient is an active area of
research (e.g., by curiosity-driven exploration (Pathak et al.,
2017)), to apply RL to modern team sport video games or
any part of the problem, we would have to shape rewards
that promote a certain style or human-like behavior given
human demonstrations. Reward shaping in this setup is
an extremely challenging problem. Additionally, we also
need to capture human-like cooperation/conflict in multi-
agent strategic gameplay. These make reward shaping ex-
tremely challenging with mathematically vague objectives.
Hence, we rely on imitation learning and behavior cloning
(such as DAGGER (Ross et al., 2011), learning from play
(LFP) (Lynch et al., 2019), or GAIL (Ho & Ermon, 2016))
to achieve human-like low-level actions while we rely on RL
to achieve high skill at the top level. In this paper, we leave
out the details of the imitation learning that has been used
to train the low-level tactics and only focus on the mid-level
strategic gameplay.
To achieve faster convergence, we rely on curriculum learn-
ing (Bengio et al., 2009) in our training. We start training the
agent to deal with easy situations more often and then make
the environment more difficult. For example, the agent can
learn to shoot when the opponent's net is undefended fairly
quickly while it is harder to learn when to shoot when the
opponent is actively defending the net. We also train the
agent against simpler existing game AI agents first and then
make the AI level harder once the agent has already learned
the basics. Similar approaches are reported in (Yang et al.,
2018) to achieve cooperation in simulating self-driving cars,
and in (Gao et al., 2019) to solve the game of Pommerman.
To deal with the MAL aspect of the problem, as the first
step we train agents one at a time within the team, and let
them blend into the overall strategic gameplay. Of course,
there is little control gained from this process and shaping
rewards is highly dependent on the status of the other agents
in the environment While we have not yet implemented the
centralized training of multiple agents, this is the immediate
problem we are tackling now. We will also have to solve
the credit assignment in MARL for each individual agent's
behavior (Devlin et al., 2014). We remind the reader that the
goal is to provide a viable approach to solving the problem
with reasonable amount of computational resources.
Last but not least, we also move away from using the raw
state space through the screen pixels. On the contrary, we
On Multi-Agent Learning in Team Sports Games
the coordinates of the players and their velocities as well
as an indicator for the possession of the ball. The action
space is discrete and is considered to be left, right, forward,
backward, pass, and shoot. Although the player can hit two
or more of the actions together we do not consider that pos-
sibility to keep the action space small for better scalability.
We currently use this mid-level simulator to inform passing
and shooting decisions in the low-level imitation learning.
In the rest of this section, we report our progress toward
applying deep RL in the STS2 environment to achieve multi-
agent gameplay. Future work will entail a better integration
between these levels of abstraction.
4.1. Single agent in a 1v1 game
As the simplest first experiment, we consider training an
agent that learns to play against the traditional game AI
in a 1v1 match. We start with a sparse reward function of
'+1' for scoring and '-1' for being scored against. We used
DQN (Mnih et al., 2015), Rainbow (Hessel et al., 2017),
and PPO (Schulman et al., 2017) to train agents that would
replace the home team (player). DQN shows the best sign
of learning useful policies after an equivalent of ∼5 years
of human gameplay experience. The gameplay statistics of
the DQN agent are reported in Table 1. As can be seen the
DQN agent was losing 1:4 to the traditional AI. Note that
we randomize the orientation of the agents at the beginning
of each episode, and hence, the agent encounters several
easy situations with an open net for scoring. On the other
hand, the agent does not learn how to play defensively when
the opponent is in possession of the ball. In fact, we believe
that a successful strategy for defense is more difficult to
learn than that of offensive gameplay.
Table 1. DQN agent in a 1v1 match against a traditional game AI
agent with a sparse '+/-1' reward for scoring.
Statistics
Score rate
Possession
DQN Agent
Trad. Game AI
22%
36%
78%
64%
Next, we shape the rewarding mechanism with the goal of
training agents that also learn how to play defensively. In
addition to the '+/-1' scoring reward, we reward the agent
with '+0.8' for gaining the possession of the ball and '-0.8'
for losing it. The statistics of the DQN agent are reported
in Table 2. In this case, we observe that the DQN agent
learns to play the game with an offensive style of chasing
the opponent down, gaining the ball, and attempting to shoot.
Its score rate as compared to the traditional game AI is 4:1,
and it dominates the game.
We repeated this experiment using PPO and Rainbow as
well. We observe that the PPO agent's policy converges
quickly to a simple one. When it is in possession of the
Figure 1. A screen shot of the simple team sports simulator (STS2).
The red agents are home agents attempting to score at the upper
end and the white agents are away agents attempting to score the
lower end. The highlighted player has the possession of the ball.
provide the agent with any additional form of information
that could ease training and might otherwise be hard to infer
from the screen pixels. Our ultimate goal is to train human-
like agents with believable behavior. Thus, so long as the
agents would pass the Turing test we are not alarmed by
the unfair extra information at their disposal while training.
Furthermore, in the game development stage, the game
itself is dynamic in the design and multiple parameters
and attributes (particularly related to graphics) may change
between different builds, hence it is desirable to train agents
on more stable features rather than screen pixels.
4. Strategic Gameplay via RL
Our training takes place on a mid-level simulator, which we
call simple team sports simulator (STS2).4 A screenshot of
STS2 gameplay is shown in Fig. 1. The simulator embeds
the rules of the game and the physics at a high level ab-
stracting away the low-level tactics. The simulator supports
kvk matches for any positive integer k. The two teams are
shown as red (home) and white (away). Each of the players
can be controlled by a human, traditional game AI, or any
other learned policy. The traditional game AI consists of a
handful of rules and constraints that govern the gameplay
strategy of the agents. The STS2 state space consists of the
4We intend to release the STS2 gameplay environment as an
open-source package.
On Multi-Agent Learning in Team Sports Games
Table 2. DQN agent in a 1v1 match against a traditional game AI
agent with a sparse '+/-1' reward for scoring and a '+/0.8' reward
for gaining/losing the possession of the ball.
Statistics
Score rate
Possession
DQN Agent
Trad. Game AI
80%
65%
20%
35%
ball, it wanders around in its own half without attempting to
cross the half-line or to shoot until the game times out. This
happens because the traditional game AI is programmed
not to chase the opponent in their half when the opponent
is in possession of the ball, and hence, the game goes on
as described until timeout with no scoring on either side.
PPO has clearly reached a local minimum in the space of
policies, which is not unexpected as it is optimizing the
policy directly. Finally, the Rainbow agent does not learn a
useful policy for either offense or defense.
As the last 1v1 experiment, we train a PPO agent against the
abovementioned DQN agent with exactly the same reward
function. The gameplay statistics is reported in Table 3. We
observe that the PPO agent is no longer stuck in a local
optimum policy, and it is dominating the DQN agent with a
score rate of 6:1. Notice that this is not a fair comparison as
the DQN agent was only trained against traditional game AI
agent and had not played against the PPO agent, whereas
the PPO agent is directly trained against the DQN agent.
While dominating the score rate, we also observe that the
game is much more even in terms of the possession of the
ball.
Table 3. PPO agent in a 1v1 match against a DQN agent, both
with a sparse '+/-1' reward for scoring and a '+/0.8' reward for
gaining/losing the possession of the ball.
Statistics
Score rate
Possession
PPO Agent DQN Agent
86%
55%
14%
45%
Note that in this experiment the DQN agent is fixed, i.e., not
learning, and PPO can overfit to exploit it because DQN is
deterministic, easier to overfit against as an opponent.
4.2. Single agent in a 2v2 game
Having gained some confidence with single agent training,
as the simplest multi-agent experiment, we consider training
a single agent in a 2v2 game. We let the traditional game AI
be in control of the opponent players as well as the teammate
player. The first experiment entails a '+/-0.8' team reward
for any player in the team gaining/losing the ball in addition
to the '+/-1' reward for scoring. The agent does not learn
a useful defensive or offensive policy and the team loses
overall.
In the second experiment, we change the rewarding mech-
anism to '+/-0.8' individual reward for the agent gain-
ing/losing the ball. This seems to turn the agent into an
offensive player that chases the opponent down, gains the
ball, and attempts to shoot. The team statistics for this agent
are shown in Table 4. We observe that the agent has learned
an offensive gameplay style where it scores most of the
time.
Table 4. Offensive DQN agent in a 2v2 match against two tradi-
tional game AI agents and playing with a traditional game AI agent
as teammate, with a sparse '+/-1' reward for scoring and a '+/0.8'
individual reward for gaining/losing the possession of the ball.
Opponent 2
DQN Agent
Teammate
Opponent 1
Statistics
Score rate
Possession
54%
30%
20%
18%
13%
26%
13%
26%
While the team is winning in the previous case, we observe
that the teammate is not participating much in the game
with even less possession of the ball than the opponent play-
ers. Next, we explore training an agent that can assist the
teammate score and possess the ball. We add another '-0.8'
teammate reward, which occurs whenever the teammate
loses the ball. The difference with a team reward (which re-
sulted in an agent that did not learn defense/offense policies)
here is that the agent is not getting a reward if the teammate
gains puck from the opponents. The gameplay statistics of
this team are reported in Table 5. In terms of gameplay,
we observe that the agent spends more time defending their
own goal and passes the ball to the teammate to score when
gains the possession of the ball.
Table 5. Defensive DQN agent in a 2v2 match against two tradi-
tional game AI agents and playing with a traditional game AI agent
as teammate, with a sparse '+/-1' reward for scoring and a '+/0.8'
individual reward for gaining/losing the possession of the ball and
a '-0.8' teammate reward when the teammate loses the possession
of the ball to the opponent team.
Statistics
Score rate
Possession
DQN Agent
Teammate
Opponent 1
Opponent 2
20%
36%
46%
22%
17%
21%
17%
21%
4.3. Two agents trained separately in a 2v2 game
After successful training of a single agent in a 2v2 game,
we train a second agent in the home team while reusing one
of the previously trained agents as the teammate. For this
experiment, we choose the DQN agent with an offensive
gameplay style from the previous set of experiments as
the teammate. This agent was described in the previous
experiment. We train another agent as the teammate using
exactly the same reward function as the offensive DQN
agent. The statistics of the gameplay for the two agents
On Multi-Agent Learning in Team Sports Games
playing together against the traditional game AI agents are
shown in Table 6. While the second agent is trained with
the same reward function as the first one, it is trained in a
different environment as the teammate is now the offensive
DQN agent trained in the previous experiment rather than
the traditional game AI agent. As can be seen, the second
agent now becomes defensive and is more interested in
protecting the net, gaining the possession of the ball back,
and passing it to the offensive teammate.
Table 6. Two DQN agents in a 2v2 match against two traditional
game AI agents, with a sparse '+/-1' reward for scoring and a
'+/0.8' individual reward for gaining/losing the possession of the
ball.
Opponent 1
Opponent 2
12%
25%
12%
25%
Statistics
Score rate
Possession
DQN 1
50%
28%
DQN 2
26%
22%
As the second 2v2 experiment, we train two PPO agents in
the exact same manner as we trained the DQN agents in the
previous experiment. We observe a similar trait in the role
of the agents as offensive and defensive. Then we let the
PPO team play against the DQN team. We observe that the
PPO team defeats the DQN team by a slight edge, 55:45.
While this experiment is a fair comparison between PPO
and DQN, we emphasize that these teams are both trained
against the traditional game AI agents and are now both
playing in a new environment. In a sense, this is measuring
how generalizable the learned policy is to environments that
it has not experienced before. The training would converge
using equivalent of ∼5 years of human experience using
DQN (Mnih et al., 2015). On the other hand, PPO (Schul-
man et al., 2017) was an order of magnitude faster on all
of the experiments reaching convergence in ∼6 months of
human experience.
We repeated all of these experiments using Rainbow (Hes-
sel et al., 2017) agents as well, and they failed all of the
experiments. We suspect that the default hyperparameters
in distributional RL (Bellemare et al., 2017) or prioritized
experience replay (Schaul et al., 2015) is not suited to this
problem, however, we are still investigating which addition
in Rainbow is resulting in the failure of the algorithm in the
described team sports environment.
4.4. Two agents trained simultaneously in a 2v2 game
Finally, we consider centralized training of the two home
agents where a single policy controls them at the same time.
We tried multiple reward functions including rewarding the
team by '+1' for scoring, '-1' for being scored against,
'+0.8' for gaining the possession of the ball, and '-0.8' for
losing the possession of the ball. We observed that neither
algorithm learned a useful policy in this case. We believe
with a higher level planner on top of the reinforcement
learning, we should be able to train the agents to exhibit
teamplay but that remains for future investigation. We are
currently looking into centralized training of actor-critic
methods on this environment.
5. Concluding Remarks & Future Work
In this paper, we consider a team sports game. The goal is
to train agents that play like humans, both in terms of tactics
and strategies. We presented a hierarchical approach to solv-
ing the problem, where the low-level problem is solved via
imitation learning and the high-level problem is addressed
via reinforcement learning. We focus on strategy using a
mid-level simulator, called simple team sports simulator
(STS2) which we intend to release as an open-source repos-
itory. Our main takeaways are summarized below:
• End-to-end model-free RL is unlikely to provide
human-like and believable agent behavior, and we re-
sort to a hierarchical approach using demonstrations to
solve the problem.
• Sparse rewards for scoring do not provide sufficient
signal for training agents, even a high level, which
required us to apply more refined reward shaping.
• Using proper reward shaping, we trained agents with a
variety of offensive and defensive styles. In particular,
we trained an agent that can assist the teammate player
to achieve better scoring and ball possession.
• PPO (Schulman et al., 2017) trained about one order of
magnitude faster than DQN (Mnih et al., 2015), while
in one occasion it got stuck in a bad local minimum.
• Rainbow (Hessel et al., 2017) failed at training agents
in this environment, and we are investigating the reason
this happens.
In future work, we will be working on better integrating
the mid-level simulation results with the low-level imitation
learned model. We also plan to better understand and ex-
plore multi-agent credit assignment in this environment (De-
vlin et al., 2014). We also plan to investigate transfer learn-
ing for translating the policies from this environment to the
actual HD game (Andrychowicz et al., 2018). We plan to
explore further on centralized training of the multi-agent
policy using QMIX (Rashid et al., 2018) and centralized
actor-critic methods (Foerster et al., 2018).
Acknowledgements
The authors would like to thank Bilal Kartal (Borealis AI)
and Jiachen Yang (Georgia Tech) for useful discussions and
feedback. The authors are also thankful to the anonymous
reviewers for their valuable feedback.
On Multi-Agent Learning in Team Sports Games
References
Abbeel, P. and Ng, A. Y. Apprenticeship learning via inverse
reinforcement learning. In Proceedings of the twenty-first
international conference on Machine learning, pp. 1.
ACM, 2004.
AI & Compute, 2018.
[Online, May 2018] https://
blog.openai.com/ai-and-compute.
AlphaStar, 2019.
[Online, January 2019] https://
tinyurl.com/yc2knerv.
Andrychowicz, M., Baker, B., Chociej, M., Jozefowicz,
R., McGrew, B., Pachocki, J., Petron, A., Plappert, M.,
Powell, G., Ray, A., et al. Learning dexterous in-hand
manipulation. arXiv preprint arXiv:1808.00177, 2018.
Bacon, P.-L., Harb, J., and Precup, D. The option-critic ar-
chitecture. In Thirty-First AAAI Conference on Artificial
Intelligence, 2017.
Bellemare, M. G., Dabney, W., and Munos, R. A distribu-
tional perspective on reinforcement learning. In Proceed-
ings of the 34th International Conference on Machine
Learning-Volume 70, pp. 449 -- 458. JMLR. org, 2017.
Bengio, Y., Louradour, J., Collobert, R., and Weston, J.
Curriculum learning. In Proceedings of the 26th annual
international conference on machine learning, pp. 41 -- 48.
ACM, 2009.
Chang, Y.-H., Ho, T., and Kaelbling, L. P. All learning is
local: Multi-agent learning in global reward games. In
Advances in neural information processing systems, pp.
807 -- 814, 2004.
Chaslot, G., Bakkes, S., Szita, I., and Spronck, P. Monte-
In
carlo tree search: A new framework for game ai.
AIIDE, 2008.
Coulom, R. Efficient selectivity and backup operators in
Monte-Carlo tree search. In International conference on
computers and games, pp. 72 -- 83. Springer, 2006.
Deep Blue, 1997.
[Online] http://www-03.ibm.
com/ibm/history/ibm100/us/en/icons/
deepblue.
Devlin, S., Yliniemi, L., Kudenko, D., and Tumer, K.
Potential-based difference rewards for multiagent rein-
forcement learning. In Proceedings of the 2014 interna-
tional conference on Autonomous agents and multi-agent
systems, pp. 165 -- 172. International Foundation for Au-
tonomous Agents and Multiagent Systems, 2014.
Foerster, J. N., Farquhar, G., Afouras, T., Nardelli, N., and
Whiteson, S. Counterfactual multi-agent policy gradi-
In Thirty-Second AAAI Conference on Artificial
ents.
Intelligence, 2018.
Gao, C., Hernandez-Leal, P., Kartal, B., and Taylor, M. E.
Skynet: A top deep rl agent in the inaugural pommerman
team competition. In 4th Multidisciplinary Conference
on Reinforcement Learning and Decision Making, 2019.
Gupta, J. K., Egorov, M., and Kochenderfer, M. Cooperative
multi-agent control using deep reinforcement learning.
In International Conference on Autonomous Agents and
Multiagent Systems, pp. 66 -- 83. Springer, 2017.
Harmer, J., Gisslen, L., del Val, J., Holst, H., Bergdahl, J.,
Olsson, T., Sjoo, K., and Nordin, M. Imitation learning
with concurrent actions in 3d games, 2018.
Hernandez-Leal, P., Kaisers, M., Baarslag, T., and de Cote,
E. M. A survey of learning in multiagent environ-
ments: Dealing with non-stationarity. arXiv preprint
arXiv:1707.09183, 2017.
Hernandez-Leal, P., Kartal, B., and Taylor, M. E. Is multia-
gent deep reinforcement learning the answer or the ques-
tion? a brief survey. arXiv preprint arXiv:1810.05587,
2018.
Hessel, M., Modayil, J., Van Hasselt, H., Schaul, T., Ostro-
vski, G., Dabney, W., Horgan, D., Piot, B., Azar, M., and
Silver, D. Rainbow: Combining improvements in deep
reinforcement learning. arXiv preprint arXiv:1710.02298,
2017.
Heyden, C. Implementing a computer player for Carcas-
sonne. PhD thesis, Maastricht University, 2009.
Ho, J. and Ermon, S. Generative adversarial imitation learn-
ing. In Advances in Neural Information Processing Sys-
tems, pp. 4565 -- 4573, 2016.
Huchler, C. An mcts agent for ticket to ride. Master's thesis,
Maastricht University, 2015.
Kartal, B., Hernandez-Leal, P., Gao, C., and Taylor, M. E.
Safer deep RL with shallow MCTS: A case study in
Pommerman. arXiv preprint arXiv:1904.05759, 2019.
Kocsis, L. and Szepesv´ari, C. Bandit based Monte-Carlo
planning. In European conference on machine learning,
pp. 282 -- 293. Springer, 2006.
Doering, M., Glas, D. F., and Ishiguro, H. Modeling in-
teraction structure for robot imitation learning of human
social behavior. IEEE Transactions on Human-Machine
Systems, 2019.
Le, H., Jiang, N., Agarwal, A., Dudik, M., Yue, Y., and
Daum´e, H. Hierarchical imitation and reinforcement
learning. In International Conference on Machine Learn-
ing, pp. 2923 -- 2932, 2018.
On Multi-Agent Learning in Team Sports Games
Levine, S. and Koltun, V. Guided policy search.
In In-
ternational Conference on Machine Learning, pp. 1 -- 9,
2013.
Littman, M. L. Markov games as a framework for multi-
agent reinforcement learning. In Machine learning pro-
ceedings 1994, pp. 157 -- 163. Elsevier, 1994.
Lowe, R., Wu, Y., Tamar, A., Harb, J., Abbeel, O. P.,
and Mordatch, I. Multi-agent actor-critic for mixed
cooperative-competitive environments. In Advances in
Neural Information Processing Systems, pp. 6379 -- 6390,
2017.
Lynch, C., Khansari, M., Xiao, T., Kumar, V., Tompson, J.,
Levine, S., and Sermanet, P. Learning latent plans from
play. arXiv preprint arXiv:1903.01973, 2019.
Matignon, L., Laurent, G. J., and Le Fort-Piat, N. Inde-
pendent reinforcement learners in cooperative markov
games: a survey regarding coordination problems. The
Knowledge Engineering Review, 27(1):1 -- 31, 2012.
Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness,
J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidje-
land, A. K., Ostrovski, G., et al. Human-level control
through deep reinforcement learning. Nature, 518(7540):
529, 2015.
Ng, A. Y. and Russell, S. Algorithms for inverse reinforce-
ment learning. In in Proc. 17th International Conf. on
Machine Learning, 2000.
OpenAI Five, 2018.
[Online, June 2018] https://
openai.com/five.
Pang, Z.-J., Liu, R.-Z., Meng, Z.-Y., Zhang, Y., Yu, Y., and
Lu, T. On reinforcement learning for full-length game of
starcraft. arXiv preprint arXiv:1809.09095, 2018.
Pathak, D., Agrawal, P., Efros, A. A., and Darrell, T.
Curiosity-driven exploration by self-supervised predic-
tion. In Proceedings of the 34th International Conference
on Machine Learning-Volume 70, pp. 2778 -- 2787. JMLR.
org, 2017.
Peng, X. B., Abbeel, P., Levine, S., and van de Panne, M.
Deepmimic: Example-guided deep reinforcement learn-
ing of physics-based character skills. ACM Transactions
on Graphics (TOG), 37(4):143, 2018.
Rajeswaran, A., Kumar, V., Gupta, A., Vezzani, G., Schul-
man, J., Todorov, E., and Levine, S. Learning complex
dexterous manipulation with deep reinforcement learning
and demonstrations. arXiv preprint arXiv:1709.10087,
2017.
Rashid, T., Samvelyan, M., Witt, C. S., Farquhar, G., Fo-
erster, J., and Whiteson, S. Qmix: Monotonic value
function factorisation for deep multi-agent reinforcement
learning. In International Conference on Machine Learn-
ing, pp. 4292 -- 4301, 2018.
Robilliard, D., Fonlupt, C., and Teytaud, F. Monte-carlo tree
search for the game of 7 wonders. In Computer Games,
pp. 64 -- 77. Springer, 2014.
Ross, S., Gordon, G., and Bagnell, D. A reduction of imita-
tion learning and structured prediction to no-regret online
learning. In Proceedings of the fourteenth international
conference on artificial intelligence and statistics, pp.
627 -- 635, 2011.
Samuel, A. Some studies in machine learning using the
game of checkers. IBM Journal of Research and Devel-
opment, 3(3):210 -- 29, July 1959.
Schaul, T., Quan, J., Antonoglou, I., and Silver, D. Priori-
tized experience replay. arXiv preprint arXiv:1511.05952,
2015.
Schulman, J., Wolski, F., Dhariwal, P., Radford, A., and
Klimov, O. Proximal policy optimization algorithms.
arXiv preprint arXiv:1707.06347, 2017.
Sheridan, T. B. Human -- robot interaction: status and chal-
lenges. Human factors, 58(4):525 -- 532, 2016.
Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L.,
Van Den Driessche, G., Schrittwieser, J., Antonoglou, I.,
Panneershelvam, V., Lanctot, M., et al. Mastering the
game of Go with deep neural networks and tree search.
Nature, 529(7587):484 -- 489, 2016.
Silver, D., Hubert, T., Schrittwieser, J., Antonoglou, I., Lai,
M., Guez, A., Lanctot, M., Sifre, L., Kumaran, D., Grae-
pel, T., et al. Mastering Chess and Shogi by self-play
with a general reinforcement learning algorithm. arXiv
preprint arXiv:1712.01815, 2017a.
Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou,
I., Huang, A., Guez, A., Hubert, T., Baker, L., Lai, M.,
Bolton, A., et al. Mastering the game of Go without
human knowledge. Nature, 550(7676):354, 2017b.
Szita, I., Chaslot, G., and Spronck, P. Monte-carlo tree
In Advances in Computer
search in settlers of catan.
Games, pp. 21 -- 32. Springer, 2009.
Tesauro, G. Temporal difference learning and td-gammon.
Communications of the ACM, 38(3):58 -- 69, 1995.
Vecer´ık, M., Hester, T., Scholz, J., Wang, F., Pietquin, O.,
Piot, B., Heess, N., Rothorl, T., Lampe, T., and Riedmiller,
M. Leveraging demonstrations for deep reinforcement
On Multi-Agent Learning in Team Sports Games
learning on robotics problems with sparse rewards. arXiv
preprint arXiv:1707.08817, 2017.
Vezhnevets, A. S., Osindero, S., Schaul, T., Heess, N.,
Jaderberg, M., Silver, D., and Kavukcuoglu, K. Feu-
dal networks for hierarchical reinforcement learning. In
Proceedings of the 34th International Conference on Ma-
chine Learning-Volume 70, pp. 3540 -- 3549. JMLR. org,
2017.
Vinyals, O., Ewalds, T., Bartunov, S., Georgiev, P., Vezhn-
evets, A. S., Yeo, M., Makhzani, A., Kuttler, H., Agapiou,
J., Schrittwieser, J., et al. StarCraft II: A new challenge for
reinforcement learning. arXiv preprint arXiv:1708.04782,
2017.
Yang, J., Nakhaei, A., Isele, D., Zha, H., and Fujimura,
K. CM3: Cooperative multi-goal multi-stage multi-agent
reinforcement learning. arXiv preprint arXiv:1809.05188,
2018.
Yu, L., Song, J., and Ermon, S. Multi-agent adversarial in-
verse reinforcement learning. In International Conference
on Machine Learning, pp. 7194 -- 7201, 2019.
Zhan, E., Zheng, S., Yue, Y., Sha, L., and Lucey, P. Gener-
ating multi-agent trajectories using programmatic weak
supervision. arXiv preprint arXiv:1803.07612, 2018.
Zhao, Y., Borovikov, I., Beirami, A., Rupert, J., Somers, C.,
Harder, J., Silva, F. d. M., Kolen, J., Pinto, J., Pourabol-
ghasem, R., et al. Winning Isn't Everything: Training
Human-Like Agents for Playtesting and Game AI. arXiv
preprint arXiv:1903.10545, 2019.
|
1607.02963 | 1 | 1607 | 2016-07-08T05:36:27 | Modelling movement for collective adaptive systems with CARMA | [
"cs.MA",
"cs.PL"
] | Space and movement through space play an important role in many collective adaptive systems (CAS). CAS consist of multiple components interacting to achieve some goal in a system or environment that can change over time. When these components operate in space, then their behaviour can be affected by where they are located in that space. Examples include the possibility of communication between two components located at different points, and rates of movement of a component that may be affected by location. The CARMA language and its associated software tools can be used to model such systems. In particular, a graphical editor for CARMA allows for the specification of spatial structure and generation of templates that can be used in a CARMA model with space. We demonstrate the use of this tool to experiment with a model of pedestrian movement over a network of paths. | cs.MA | cs | Modelling movement for collective adaptive systems with
CARMA
Natalia Zo´n
Vashti Galpin
Stephen Gilmore
Laboratory for Foundations of Computer Science
School of Informatics, University of Edinburgh
[email protected]
[email protected]
[email protected]
Space and movement through space play an important role in many collective adaptive systems
(CAS). CAS consist of multiple components interacting to achieve some goal in a system or en-
vironment that can change over time. When these components operate in space, then their behaviour
can be affected by where they are located in that space. Examples include the possibility of commu-
nication between two components located at different points, and rates of movement of a component
that may be affected by location. The CARMA language and its associated software tools can be used
to model such systems. In particular, a graphical editor for CARMA allows for the specification of
spatial structure and generation of templates that can be used in a CARMA model with space. We
demonstrate the use of this tool to experiment with a model of pedestrian movement over a network
of paths.
1 Introduction
Collective adaptive systems consist of multiple components or agents that interact collaboratively on
common goals, and compete to achieve individual goals. They are characterised by the fact that each
component does not have a global view of the whole system but rather has local information on which
to act. These systems are called collective because of the interaction of many components, and adaptive
because they respond to changes in the environment in which they operate. They are often characterised
as having emergent behaviour, that is behaviour which cannot be predicted in advance by considering the
individual components in isolation from each other. Modelling of CAS is crucial because it is difficult
to understand the behaviour of the overall system just by inspecting the behaviour of the components.
Modelling allows us to experiment with the system before implementation and deployment. This paper
considers the CARMA language which has been developed specifically for the modelling of CAS [12]
with a particular focus on smart city concerns such as smart transport and smart energy grids.
The use of local versus global above suggests that space may play an important role in CAS. While
this is not necessarily true of all CAS since the distinction between local and global may be logical or
virtual rather than physical, it is true for many CAS, and hence this is an important part of understanding
their behaviour. This paper focusses on a spatial example and illustrates how CARMA can be used to
model this example.
We consider the example of pedestrians moving over a network of paths. This could be a specific
part of a city, a pedestrianised network of lanes, or paths through a large park. The defining feature of our
example is that there are essentially two groups of pedestrians that start on opposite sides of the network
who wish to traverse the paths to get to the side opposite to where they started. This scenario could arise
in a city where there are two train stations on opposite sides of the central business district serving the
eastern and the western suburbs of the city, and a number of people who commute from the west work
close to the east station and vice versa. During rush hour in the morning and afternoon, people want to
M.H. ter Beek and M. Loreti (Eds.): Workshop on
FORmal methods for the quantitative Evaluation
of Collective Adaptive SysTems (FORECAST'16).
EPTCS 217, 2016, pp. 43–52, doi:10.4204/EPTCS.217.6
c(cid:13) N. Zo´n, V. Galpin and S. Gilmore
This work is licensed under the
Creative Commons Attribution License.
44
Modelling movement for collective adaptive systems
traverse the park or lanes as fast as possible so that they are not late, and we wish to investigate what
features enable these pedestrians to pass through the network efficiently. If there are multiple paths, it
would seem in advance that it makes sense to use some paths for one direction and other paths for the
other direction. This raises the question of what routing or information such as signs is sufficient for the
two groups of pedestrians to separate out onto different paths. This paper presents an initial investigation
into the modelling of this scenario, and we demonstrate how this can be achieved using CARMA, its
Eclipse Plug-In and its Graphical Eclipse Plug-in, considering different possibilities for the network.
The paper starts with a brief discussion of the CARMA language before describing the modelling
of the scenario in more detail and presentation of our experiments and results from various networks,
followed by conclusions and discussion of future work.
2 CARMA
The CARMA process calculus has been developed specifically for the modelling of collective adaptive
systems and a full description of the language can be found in [12]. Here, we give a brief outline. A
CARMA model consists of a collective N and the environment E in which it operates, using the syntax
N in E . A collective is either a component C or collectives in parallel N (cid:107) N. Each component is either
null, 0, or a combination of behaviour described by a process P and a store of attributes γ, denoted
by (P,γ). We use function notation to denote store access, thus if γ = {x (cid:55)→ v} then γ(x) = v.
Prefix, constants, choice and parallel composition can be expressed in the standard manner by defin-
ing P appropriately. Additionally, there is the nil process which does nothing, the kill process which
results in the component being removed from the collective, and the option of prefixing a process with a
predicate [π]P, in which case the process P can only proceed if the predicate π evaluates to true using the
values of the attributes in the component's store γ. To improve readability we sometimes parenthesise
the process expression P, writing this term as [π](P). The meaning is unchanged.
Process prefixes are rich and permit actions that provide value-passing unicast and broadcast com-
munication using predicates on the attributes in the store of the sending and receiving component. Com-
munication between components will only take place if the predicates evaluate to true. The value false
indicates that no communication partner is needed. Furthermore, attribute values can be updated (prob-
abilistically) on completion of an action.
Unicast communication is blocking; the sender cannot output values unless there is a matching input
action which can be performed by another component. In contrast, broadcast is not blocking, and we can
use a specific form with a constant false predicate (written as ⊥ here) to allow components to act without
interaction with other components, as seen in the example to follow.
The syntax of a non-blocking broadcast on name α is α (cid:63)[π](cid:104)(cid:126)v(cid:105)σ where π is a predicate which must
be satisfied by all processes wishing to receive this broadcast. The vector (cid:126)v is a vector of values to be
communicated; this vector may be empty. The suffix σ is an update of variables in the local store of a
component. A component refers to its local store with the prefix my (similar to this in Java) so an update
to store the value of x as the new value of my.x is written as {my.x ← x}. As an example, the prefix
i j[⊥](cid:104)(cid:105){my.x ← i, my.y ← j}.Ped broadcasts that it is performing a movei j activity,
process term move(cid:63)
updates its local x and y values, and continues as the process Ped.
The environment contains both the global store and an evolution rule which returns a tuple of four
functions (µp, µw, µr, µu) known as the evaluation context. Communication between sender s and re-
ceiver r on activity α has both an associated probability (determined by µp) and a weight (determined
by µw). These functions depend on activity α and both the attribute values of the sender (in the store γs)
N. Zo´n, V. Galpin and S. Gilmore
45
and the attribute values of the receiver (in the store γr). The activity rate however depends on only the
attribute values in the store of the sender (γs); the attribute values of the receiver do not affect the rate
at which a communication activity is performed. Thus the first three functions in the evaluation context
determine probabilities, weights and rates that supply quantitative information about the behaviour of
actions. The fourth function µu performs global updates, either of the attributes in the global store or
of the collective by adding new components. These updates include the usual initialisation of variables,
incrementing counters, or accumulating totals.
The operational semantics of CARMA are defined in FUTS style [3] and define for each model a
time-inhomogeneous continuous-time Markov chain (ICTMC). The behaviour of these ICTMCs can be
simulated and the CARMA Eclipse Plug-in provides this functionality. The software tools for processing
CARMA models are available from http://quanticol.sourceforge.net. More information about
the QUANTICOL project which created these tools is available from http://www.quanticol.eu.
3 Automatic code generation
The CARMA Graphical Editor allows the user to specify the structure of movement in a CAS model by
laying out graphical symbols on a plane [15]. The editor generates CARMA code from the graph which
the user has defined. In addition to normal attributes, CARMA components which are defined in this way
have a set of distinguished attributes to specify their current location in space.
Each CARMA component in the model may further have its mobility restricted to a given set of paths
through the graph defined by the user. Paths in this context are subgraphs of the user-defined graph
consisting of a set of uniform vertices connected by directed, coloured edges. At any given time in the
system's evolution, the location attributes of a component instance must be equal to the location of one
of the nodes belonging to the subgraph where that component is restricted. A component can change
its location attributes only if there exists a path from its current node to the new node, and if this path
belongs to the subgraph where the mobility of this component is restricted.
In CARMA, functions are used for storing the information about each subgraph's topology. Compo-
nent actions query these functions during the execution of their predicates, and can modify the compo-
nent's location attributes accordingly, in the update block. For each node which can be accessed by a
particular component type, a movement action must be included in the component's behaviour. If the
node can be accessed by a component in more than one state, the action must be specified separately for
each state. In systems with complex mobility restriction graphs, topology-defining functions, as well as
component behaviour blocks may require a large number of lines of code. This code is automatically
generated by the CARMA Graphical Editor, freeing the modeller from the task of manually producing
this CARMA model code.
4 Pedestrian model
The CARMA model is illustrated in Figures 1 and 2. It assumes that there are two types of pedestrians,
A and B, and that P and Q are variables of type pedestrian. The two Arrival components generate
pedestrians at two different locations (on opposite sides of the graph), and the pedestrians move from
their origin side to the opposite side. Once a pedestrian has reached its goal, the count for that type of
pedestrian is incremented and the time taken for traversal is added to the total time so that the average
traversal time can be calculated for each pedestrian type.
46
Modelling movement for collective adaptive systems
Store of Pedestrian component:
P
x
y
stime
pedestrian type - an enumeration with values A and B
current x coordinate
current y coordinate
time of arrival
Behaviour of Pedestrian component:
Ped
def= ∑(i, j)∈V
(cid:2)ExistsPath(P,x,y,i, j)(cid:3)(cid:0)move(cid:63)
+(cid:2)AtGoal(P,x,y)(cid:3)(cid:0)fin(cid:63)[⊥](cid:104)(cid:105).nil(cid:1)
i j[⊥](cid:104)(cid:105){my.x ← i, my.y ← j}.Ped(cid:1)
Initial state of Pedestrian component: Ped
Store of Arrival component:
P
pedestrian type
Behaviour of Arrival component:
Arr
def= arrive(cid:63)[⊥](cid:104)(cid:105).Arr
Initial state of Arrival component: Arr
Figure 1: The Pedestrian and Arrival components
The model is parameterised by a number of functions that capture the graph information and are
generated automatically as described above.
• ExistsPath(P,x,y,i, j) is a Boolean function that determines if an edge exists between a pedes-
i j action can only occur when
trian's current position and another node in the graph, hence a move(cid:63)
such an edge exists.
• AtGoal(P,x,y) is a Boolean function that checks if the pedestrian has reached its goal, hence fin(cid:63)
can only occur once the destination has been reached. After this the pedestrian does not move any
more.
• ArrivalRate(P) determines the arrival rate for each type of pedestrian.
• Startx(P) and Starty(P) define the initial location of a new pedestrian depending on its type.
A function that is not directly related to the graph structure is MoveRate(P,x,y,i, j, . . .) which determines
the rate of movement along a particular edge, and can take additional parameters that can affect this
rate such as the current count of other pedestrians of the same or different type. We use the following
definition that uses the numbers of pedestrians of the other type at the target node to reduce the movement
rate.
(cid:40)
MoveRate(P,x,y,i, j,Ai j,Bi j) =
moveA/(Bi j + 1)
moveB/(Ai j + 1)
if P = A
if P = B
where Ai j are the number of A pedestrians at the target node and Bi j are the number of B pedestrians at
the target node, and moveQ is a basic movement rate for each pedestrian type.
N. Zo´n, V. Galpin and S. Gilmore
47
Constants:
V
Measures:
averageP
Global store:
countP
totalP
set of coordinate pairs representing nodes in the graph
average time for traversal by pedestrians of type P
number of P pedestrians to complete traversal
total time for all completed P pedestrian traversals
Evolution rule functions:
µp(γs,γr,α)
µw(γs,γr,α)
=
=
1
1
λfast
µr(γs,α)
=
µu(γs,α)
=
ArrivalRate(cid:0)γs(P)(cid:1)
MoveRate(cid:0)γs(P),γs(x),γs(y),i, j, . . .(cid:1)
(cid:8)(cid:9),(cid:0)Pedestrian,{P ← γs(P),x ← Startx(γs(P)),y ← Starty(γs(P)),stime ← now}(cid:1)
(cid:8)countγs(P) ← countγs(P) + 1,totalγs(P) ← totalγs(P) + (now− γs(stime))(cid:9),0
(cid:8)(cid:9),0
if α = arrive(cid:63)
if α = move(cid:63)
i j
otherwise
if α = fin(cid:63)
otherwise
if α = arrive(cid:63)
Collective:
PedAB def= (cid:0)Arrival,{P (cid:55)→ A}(cid:1) (cid:107)(cid:0)Arrival,{P (cid:55)→ B}(cid:1)
Figure 2: Environment and collective
Figure 2 specifies the four functions (µp, µw, µr, µu) known as the evaluation context. Probabilities
and weights on activities are not used in this model so the µp and µw functions are trivially constant
functions.
5 Model instances
Four instances of this CARMA model are shown in Figure 3. These show instantiations of the general
CARMA model from the previous section with increasing size and shape complexity. The central repeat-
ing features of the path network are the cross-bars in the centre of the network. In the simplest instance
we have only one cross-bar and we describe this instance as having height 1 and width 1, representing
it as instance 1× 1. As the cross-bar structure is repeated we have instances 1× 2, 2× 1, and 2× 2,
depending where the additional structure is added into the network.
An increase in the width of the network has the obvious consequence that journeys across the network
take longer. An increase in the height of the network has the consequence that pedestrians are offered
an increased choice of routes, with the implicit consequence that individual paths are less congested
(because there are more of them on offer). The edges are equally long and thus the time to traverse them
is the same under comparable conditions.
In each instance of the network of paths there are two sub-networks which restrain the movement of
48
Modelling movement for collective adaptive systems
1× 1
2× 1
1× 2
2× 2
Figure 3: Four model instances of increasing size and complexity.
the pedestrians of type A and type B. Pedestrians of type A are restricted to the red sub-network and must
cross the network from left to right. Pedestrians of type B are restricted to the blue sub-network and must
cross the network from right to left. The networks illustrated in Figure 3 are symmetric but this is of no
particular significance and it would pose no difficulty to work with networks which were not symmetric.
These graphs were drawn in the CARMA Graphical Editor and CARMA code was generated from it,
including all necessary instances of the ExistsPath, AtGoal, and ArrivalRate functions and applications
of these in predicate guards on processes.
6 Analysis and results
We analysed our CARMA model using the CARMA Eclipse Plugin [12]. The CARMA Eclipse Plugin pro-
vides a helpful syntax-aware editor for the CARMA Specification Language, implemented in the XText
editor framework. The CARMA Specification Language provides a wrapper around the CARMA process
calculus adding non-essential (but useful) features such as data types and data structures, functions, and
the ability to specify real-valued measures of interest over the model. In some modelling languages
measures of interest or Markov reward structures are defined externally to the model but in CARMA and
languages such as CASPA [10], PRISM [11] and ProPPA [6], the specification of measures of interest
and reward structures is included in the modelling language itself.
Given a CARMA specification, the CARMA Eclipse Plug-in compiles the model into a set of Java
classes which are linked with the CARMA simulator classes to provide a custom simulator for this model.
The compiled Java code is executed to compute the measures of interest from an ensemble of simulation
runs. The CARMA simulator uses a kinetic Monte-Carlo algorithm to select the next simulation event to
fire and draws from the appropriate weighted random number distribution to determine the duration of
the event. The simulation state is updated as specified by the event which was fired and the simulation
proceeds forward until a pre-specified simulation stop time is reached.
N. Zo´n, V. Galpin and S. Gilmore
49
The measure functions defined by the modeller are passed into the simulation environment and pro-
vide a view onto the raw simulation results at intervals which are specified by the modeller. The Apache
Commons Math Library is used within the Plug-in to perform statistical analysis of the data. The Simula-
tion Laboratory View provided by the CARMA Eclipse Plug-in acts as an electronic laboratory notebook,
recording details of the simulation studies which have been performed.
The CARMA Eclipse Plugin and the CARMA Graphical Editor are available from the SourceForge
website at http://quanticol.sourceforge.net. After installation they can be kept up-to-date using
the standard mechanism in Eclipse to check for updates.
6.1 Design of experiments
We designed a suite of experiments to explore the behaviour of the model. To provide a baseline for
average travel time we investigated the travel time in the presence of only one type of pedestrian (thereby
giving a model which has no congestion). Thereafter we investigated the models with congestion in
the presence or absence of pedestrian routing. When routing is present, only one starting route has a
non-zero rate, and the non-zero rate is assigned in order to direct pedestrians away from each other.
We used the CARMA Graphical Editor to automatically create CARMA code models. Fig. 4 shows
how the number of lines of CARMA code grows with model structure complexity.
Model Nodes Connections LoC
208
1x1
1x2
248
288
1x3
258
2x1
328
2x2
2x3
398
308
3x1
408
3x2
3x3
508
6
8
10
8
11
14
10
14
18
8
12
16
13
20
27
18
28
38
Figure 4: The number of lines of CARMA code per model structure. Left, for small values of width and
height. Right, for larger values of width and height.
6.2 Analysis
The results from our experiments are presented in Figure 5. We have three results (no congestion, routing,
and no routing) for each of the four model instances considered (1 × 1, 1 × 2, 2 × 1, and 2 × 2). An
inspection of the results shows that, unsurprisingly, for any structure the best average travel times are
obtained when there is no congestion in the network. As anticipated, networks with greater height have
lower average travel times because they have greater capacity, due to the inclusion of additional routes
(thus 2× 1 results are better than 1× 1 results, and 2× 2 results are better than 1× 2 results).
where congestion in experienced most (i.e. in the 1× 1 structure and the 1× 2 structure).
Finally, we see that routing is always advantageous, especially so in the case of narrow networks
50
Modelling movement for collective adaptive systems
Figure 5: Average travel time results from the experiments on structure and network usage.
7 Related work
The CARMA language provides high-level language constructs for describing communicating processes.
The language has a stochastic semantics expressed in terms of continuous-time Markov chains. The
language contains some features which are familiar from languages such as Bio-PEPA [2], PRISM [11]
and the Attributed π-calculus [8]. In this section we compare CARMA to these established modelling
languages and highlight differences in approach between them.
Each of the languages considered here has the potential to be used to model stochastic systems with
mobile populations of individuals but language design decisions, the choice of language features, and
underlying analysis mechanisms can make one of the languages better-suited for a particular modelling
problem than the others. As examples of modelled systems, Bio-PEPA has been used to model scenarios
where safe movement of people is an important factor in systems including emergency egress [13] and
crowd formation and movement [1]. PRISM has been used to model dynamic power management con-
trollers [14] and human-in-the-loop UAV mission planning [4]. The Attributed π-calculus has been used
to model spatial movement in phototaxis [8], and cooperative protein binding in gene regulation [9].
CARMA has been used to model a number of spatial CAS including carpooling [15], taxi movement [7]
and ambulance deployment [5].
Inter-process communication in CARMA is attribute-based; communication partners are determined
dynamically as the model evolves through state-to-state transitions. Communication in the Attributed π-
calculus is similarly dynamic. In contrast, the communication partners of Bio-PEPA and PRISM com-
ponents are determined statically, and do not change as state-to-state transitions occur. Additionally,
CARMA and the Attributed π-calculus support value-passing communication whereas the Bio-PEPA and
PRISM languages do not.
The primary analysis method for CARMA models is simulation. This is also the case for Bio-
PEPA and the Attributed π-calculus whereas analysis of PRISM models is typically through probabilistic
model-checking.
The CARMA language and the PRISM language are explicitly-typed. Types such as boolean, integer
N. Zo´n, V. Galpin and S. Gilmore
51
and real are ascribed to variables in the language by the modeller, or inferred by the language type-
checker. In contrast, types in Bio-PEPA and the Attributed π calculus are implicit. Explicitly-typed
languages can make the modeller's intentions more obvious, when, for example, expecting to receive an
initial integer value instead of a real value.
CARMA provides guarded process definitions (used in a similar way to the guarded commands found
in the PRISM language; the Attributed π-calculus does not support these directly; Bio-PEPA has no
boolean expressions at all). Guarded process definitions allow declarative descriptions of the relation-
ships between locations in a network and we have used this description mechanism comprehensively
here.
In common with PRISM, CARMA provides strong support for encapsulation, with variable declara-
tions being local to an enclosing structure (in PRISM this is a module, whereas in CARMA it is a com-
ponent). A structuring mechanism such as this is not found in Bio-PEPA or the Attributed π-calculus
where declarations of rate functions, channel names, process definitions or species definitions have global
scope.
Differently from the other languages considered here, CARMA treats location and space as an aspect
of a model which can be described separately from the detailed model dynamics. Through the provision
of a graphical editor for CARMA, space, location, and connectivity can be treated separately from logic,
communication, and synchronisation. This separation of concerns may make it easier to maintain a
model of a system when the spatial structure of the system changes.
8 Conclusions and future work
We have demonstrated a simple model of pedestrian movement over a number of different graphs, to
illustrate the modelling of spatial aspects of CAS. The CARMA Graphical Editor allowed us to auto-
matically generate the CARMA code for different networks which simplified the task, and allowed our
pedestrian components to be generic in nature. Our initial experiments have considered situations with
and without congestion as well as with and without explicit routing of pedestrians as they enter the
network.
There are many directions for future work. For example, another group of pedestrians could also be
introduced, namely, tourists, and the focus would be on efficient traversal of the network during afternoon
rush hours when commuters want to get home quickly and tourists wish to sightsee, and hence move
slowly. We are also interested in identifying when the model shows emergent behaviour, in the sense that
different groups of pedestrian use different paths through the network in response to environmental cues
such as information about congestion or routing suggestions (rather than explicit routing).
Acknowledgements: This work is supported by the EU project QUANTICOL, 600708. We thank the
anonymous reviewers for many helpful comments which encouraged us to improve the paper.
References
[1] L. Bortolussi, D. Latella & M. Massink (2013): Stochastic Process Algebra and Stability Analysis of Collec-
tive Systems. In R. De Nicola & C. Julien, editors: Coordination Models and Languages, 15th International
Conference, COORDINATION 2013, Held as Part of the 8th International Federated Conference on Dis-
tributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings, Lecture Notes
in Computer Science 7890, Springer, pp. 1–15, doi:10.1007/978-3-642-38493-6 1.
52
Modelling movement for collective adaptive systems
[2] F. Ciocchetta & J. Hillston (2009): Bio-PEPA: A framework for the modelling and analysis of biological
systems. Theor. Comput. Sci. 410(33-34), pp. 3065–3084, doi:10.1016/j.tcs.2009.02.037.
[3] R. De Nicola, D. Latella, M. Loreti & M. Massink (2013): A uniform definition of stochastic process calculi.
ACM Computing Surveys 46, p. 5, doi:10.1145/2522968.2522973.
[4] L. Feng, C. Wiltsche, L. Humphrey & U. Topcu (2015): Controller Synthesis for Autonomous Systems Inter-
acting with Human Operators. In: Proceedings of the ACM/IEEE Sixth International Conference on Cyber-
Physical Systems, ICCPS '15, ACM, New York, NY, USA, pp. 70–79, doi:10.1145/2735960.2735973.
[5] V. Galpin (2016): Modelling Ambulance Deployment with CARMA.
In A. Lluch Lafuente & J. Proenc¸a,
editors: Coordination Models and Languages: 18th IFIP WG 6.1 International Conference, COORDINA-
TION 2016, Held as Part of the 11th International Federated Conference on Distributed Computing Tech-
niques, DisCoTec 2016, Heraklion, Crete, Greece, June 6-9, 2016, Proceedings, Springer, pp. 121–137,
doi:10.1007/978-3-319-39519-7 8.
[6] A. Georgoulas, J. Hillston, D. Milios & G. Sanguinetti (2014): Probabilistic Programming Process Al-
gebra.
In G. Norman & William Sanders, editors: Quantitative Evaluation of Systems: 11th Interna-
tional Conference, QEST 2014, Florence, Italy, September 8-10, 2014. Proceedings, Springer, pp. 249–264,
doi:10.1007/978-3-319-10696-0 21.
[7] J. Hillston & M. Loreti (2015): Specification and Analysis of Open-Ended Systems with CARMA. In: Fourth
International Workshop on Agent Environments for Multi-Agent Systems, Revised Selected and Invited Pa-
pers (E4MAS 2014), LNCS 9068, Springer, pp. 95–116, doi:10.1007/978-3-319-23850-0 7.
[8] M. John, C. Lhoussaine, J. Niehren & A.M. Uhrmacher (2008): The Attributed Pi Calculus. In M. Heiner &
A.M. Uhrmacher, editors: Computational Methods in Systems Biology: 6th International Conference CMSB
2008, Rostock, Germany, October 12-15, 2008. Proceedings, Springer Berlin Heidelberg, Berlin, Heidelberg,
pp. 83–102, doi:10.1007/978-3-540-88562-7 10.
[9] M. John, C. Lhoussaine, J. Niehren & A.M. Uhrmacher (2010): The Attributed Pi-calculus with Priorities.
In C. Priami, R. Breitling, D. Gilbert, M. Heiner & A.M. Uhrmacher, editors: Transactions on Computational
Systems Biology XII, Springer-Verlag, Berlin, Heidelberg, pp. 13–76, doi:10.1007/978-3-642-11712-1 2.
[10] M. Kuntz, M. Siegle & E. Werner (2004): Symbolic Performance and Dependability Evaluation with the Tool
CASPA. In M. N´unez, Z. Maamar, F.L. Pelayo, K. Pousttchi & F. Rubio, editors: Applying Formal Methods:
Testing, Performance and M/ECommerce, FORTE 2004 Workshops The FormEMC, EPEW, ITM, Toledo,
Spain, October 1-2, 2004, LNCS 3236, Springer, pp. 293–307, doi:10.1007/978-3-540-30233-9 22.
[11] M. Kwiatkowska, G. Norman & D. Parker (2011): PRISM 4.0: Verification of Probabilistic Real-time Sys-
tems. In G. Gopalakrishnan & S. Qadeer, editors: Proc. 23rd International Conference on Computer Aided
Verification (CAV'11), LNCS 6806, Springer, pp. 585–591, doi:10.1007/978-3-642-22110-1 47.
[12] M. Loreti & J. Hillston (2016): Modelling and Analysis of Collective Adaptive Systems with CARMA and its
Tools. In M. Bernardo, R. De Nicola & J. Hillston, editors: Formal Methods for the Quantitative Evaluation
of Collective Adaptive Systems: 16th International School on Formal Methods for the Design of Computer,
Communication, and Software Systems, SFM 2016, Bertinoro, Italy, June 20-24, 2016, Advanced Lectures,
Springer International Publishing, Cham, pp. 83–119, doi:10.1007/978-3-319-34096-8 4.
[13] M. Massink, D. Latella, A. Bracciali, M. D. Harrison & J. Hillston (2012): Scalable context-dependent
analysis of emergency egress models. Formal Asp. Comput. 24(2), pp. 267–302, doi:10.1007/s00165-011-
0188-1.
[14] G. Norman, D. Parker, M. Kwiatkowska, S. Shukla & R. Gupta (2002): Formal Analysis and Validation of
Continuous Time Markov Chain Based System Level Power Management Strategies. In W. Rosenstiel, editor:
Proc. 7th Annual IEEE International Workshop on High Level Design Validation and Test (HLDVT'02),
IEEE Computer Society Press, pp. 45–50.
[15] N. Zo´n, S. Gilmore & J. Hillston (2016): Rigorous graphical modelling of movement in Collective Adaptive
Systems. In Proceedings of ISoLA 2016. To appear.
|
1109.2132 | 1 | 1109 | 2011-09-09T20:23:28 | Hybrid BDI-POMDP Framework for Multiagent Teaming | [
"cs.MA"
] | Many current large-scale multiagent team implementations can be characterized as following the belief-desire-intention (BDI) paradigm, with explicit representation of team plans. Despite their promise, current BDI team approaches lack tools for quantitative performance analysis under uncertainty. Distributed partially observable Markov decision problems (POMDPs) are well suited for such analysis, but the complexity of finding optimal policies in such models is highly intractable. The key contribution of this article is a hybrid BDI-POMDP approach, where BDI team plans are exploited to improve POMDP tractability and POMDP analysis improves BDI team plan performance. Concretely, we focus on role allocation, a fundamental problem in BDI teams: which agents to allocate to the different roles in the team. The article provides three key contributions. First, we describe a role allocation technique that takes into account future uncertainties in the domain; prior work in multiagent role allocation has failed to address such uncertainties. To that end, we introduce RMTDP (Role-based Markov Team Decision Problem), a new distributed POMDP model for analysis of role allocations. Our technique gains in tractability by significantly curtailing RMTDP policy search; in particular, BDI team plans provide incomplete RMTDP policies, and the RMTDP policy search fills the gaps in such incomplete policies by searching for the best role allocation. Our second key contribution is a novel decomposition technique to further improve RMTDP policy search efficiency. Even though limited to searching role allocations, there are still combinatorially many role allocations, and evaluating each in RMTDP to identify the best is extremely difficult. Our decomposition technique exploits the structure in the BDI team plans to significantly prune the search space of role allocations. Our third key contribution is a significantly faster policy evaluation algorithm suited for our BDI-POMDP hybrid approach. Finally, we also present experimental results from two domains: mission rehearsal simulation and RoboCupRescue disaster rescue simulation. | cs.MA | cs | Journal of Artificial Intelligence Research 23 (2005) 367-420
Submitted 07/04; published 04/05
Hybrid BDI-POMDP Framework for Multiagent Teaming
Ranjit Nair
Automation and Control Solutions
Honeywell Laboratories, Minneapolis, MN 55416
Milind Tambe
Department of Computer Science
University of Southern California, Los Angeles, CA 90089
[email protected]
[email protected]
Abstract
Many current large-scale multiagent team implementations can be characterized as
following the "belief-desire-intention" (BDI) paradigm, with explicit representation of team
plans. Despite their promise, current BDI team approaches lack tools for quantitative
performance analysis under uncertainty. Distributed partially observable Markov decision
problems (POMDPs) are well suited for such analysis, but the complexity of finding optimal
policies in such models is highly intractable. The key contribution of this article is a
hybrid BDI-POMDP approach, where BDI team plans are exploited to improve POMDP
tractability and POMDP analysis improves BDI team plan performance.
Concretely, we focus on role allocation, a fundamental problem in BDI teams: which
agents to allocate to the different roles in the team. The article provides three key con-
tributions. First, we describe a role allocation technique that takes into account future
uncertainties in the domain; prior work in multiagent role allocation has failed to address
such uncertainties. To that end, we introduce RMTDP (Role-based Markov Team De-
cision Problem), a new distributed POMDP model for analysis of role allocations. Our
technique gains in tractability by significantly curtailing RMTDP policy search; in partic-
ular, BDI team plans provide incomplete RMTDP policies, and the RMTDP policy search
fills the gaps in such incomplete policies by searching for the best role allocation. Our
second key contribution is a novel decomposition technique to further improve RMTDP
policy search efficiency. Even though limited to searching role allocations, there are still
combinatorially many role allocations, and evaluating each in RMTDP to identify the best
is extremely difficult. Our decomposition technique exploits the structure in the BDI team
plans to significantly prune the search space of role allocations. Our third key contribution
is a significantly faster policy evaluation algorithm suited for our BDI-POMDP hybrid ap-
proach. Finally, we also present experimental results from two domains: mission rehearsal
simulation and RoboCupRescue disaster rescue simulation.
1. Introduction
Teamwork, whether among software agents, or robots (and people) is a critical capability
in a large number of multiagent domains ranging from mission rehearsal simulations, to
RoboCup soccer and disaster rescue, to personal assistant teams. Already a large num-
ber of multiagent teams have been developed for a range of domains (Pynadath & Tambe,
2003; Yen, Yin, Ioerger, Miller, Xu, & Volz, 2001; Stone & Veloso, 1999; Jennings, 1995;
Grosz, Hunsberger, & Kraus, 1999; Decker & Lesser, 1993; Tambe, Pynadath, & Chauvat,
2000; da Silva & Demazeau, 2002). These existing practical approaches can be character-
ized as situated within the general "belief-desire-intention" (BDI) approach, a paradigm
c(cid:13)2005 AI Access Foundation. All rights reserved.
Nair & Tambe
for designing multiagent systems, made increasingly popular due to programming frame-
works (Tambe et al., 2000; Decker & Lesser, 1993; Tidhar, 1993b) that facilitate the design
of large-scale teams. Within this approach, inspired explicitly or implicitly by BDI logics,
agents explicitly represent and reason with their team goals and plans (Wooldridge, 2002).
This article focuses on analysis of such BDI teams, to provide feedback to aid human
developers and possibly to agents participating in a team, on how the team performance
in complex dynamic domains can be improved.
In particular, it focuses on the critical
challenge of role allocation in building teams (Tidhar, Rao, & Sonenberg, 1996; Hunsberger
& Grosz, 2000), i.e. which agents to allocate to the various roles in the team. For instance,
in mission rehearsal simulations (Tambe et al., 2000), we need to select the numbers and
types of helicopter agents to allocate to different roles in the team. Similarly, in disaster
rescue (Kitano, Tadokoro, Noda, Matsubara, Takahashi, Shinjoh, & Shimada, 1999), role
allocation refers to allocating fire engines and ambulances to fires and it can greatly impact
team performance. In both these and other such domains, the performance of the team is
linked to important metrics such as loss of human life and property and thus it is critical
to analyze team performance and suggest improvements.
While BDI frameworks facilitate human design of large scale teams, the key difficulty
in analyzing role allocation in these teams is due to the uncertainty that arises in complex
domains. For example, actions may fail and the world state may be only partially observable
to the agents owing to physical properties of the environment or imperfect sensing. Role
allocation demands such future uncertainties be taken into account, e.g. the fact that an
agent may fail during execution and may or may not be replaced by another must be taken
into account when determining the role allocation. Yet most current role allocation algo-
rithms do not address such uncertainty (see Section 7.4). Indeed, such uncertainty requires
quantitative comparison of different role allocations. However, tools for such quantitative
evaluations of BDI teams are currently absent. Thus, given these uncertainties, we may be
required to experimentally recreate a large number of possible scenarios (in a real domain
or in simulations) to evaluate and compare different role allocations.
Fortunately, the emergence of distributed Partially Observable Markov Decision Prob-
lems (POMDPs) provides models (Bernstein, Zilberstein, & Immerman, 2000; Boutilier,
1996; Pynadath & Tambe, 2002; Xuan, Lesser, & Zilberstein, 2001) that can be used for
quantitative analysis of agent teams in uncertain domains. Distributed POMDPs repre-
sent a class of formal models that are powerful enough to express the uncertainty in these
dynamic domains arising as a result of non-determinism and partial observability and in
principle, can be used to generate and evaluate complete policies for the multiagent team.
However, there are two shortcomings in these models that prevents their application in
the analysis of role allocation. First, previous work on analysis has focused on communi-
cation (Pynadath & Tambe, 2002; Xuan et al., 2001), rather than role allocation or any
other coordination decisions. Second, as shown by Bernstein et al. (2000), the problem
of deriving the optimal policy is generally computationally intractable (the corresponding
decision problem is NEXP-complete). Thus, applying optimal policies for analysis is highly
intractable.
To address the first difficulty, we derive RMTDP (Role-based Multiagent Team Decision
Problem), a distributed POMDP framework for quantitatively analyzing role allocations.
Using this framework, we show that, in general, the problem of finding the optimal role
368
Hybrid BDI-POMDP Framework for Multiagent Teaming
completed policy =
additions to BDI team plan
RMTDP
Search Policy Space
Incomplete policy
BDI team plan
BDI Interpreter
Domain
RMTDP model
Figure 1: Integration of BDI and POMDP.
allocation policy is computationally intractable (the corresponding decision problem is still
NEXP-complete). This shows that improving the tractability of analysis techniques for role
allocation is a critically important issue.
Therefore, in order to make the quantitative analysis of multiagent teams using RMTDP
more tractable, our second contribution provides a hybrid BDI-POMDP approach that
combines the native strengths of the BDI and POMDP approaches, i.e., the ability in BDI
frameworks to encode large-scale team plans and the POMDP ability to quantitatively
evaluate such plans. This hybrid approach is based on three key interactions that improve
the tractability of RMTDP and the optimality of BDI agent teams. The first interaction is
shown in Figure 1. In particular, suppose we wish to analyze a BDI agent team (each agent
consisting of a BDI team plan and a domain independent interpreter that helps coordinate
such plans) acting in a domain. Then as shown in Figure 1, we model the domain via an
RMTDP, and rely on the BDI team plan and interpreter for providing an incomplete policy
for this RMTDP. The RMTDP model evaluates different completions of this incomplete
policy and provides an optimally completed policy as feedback to the BDI system. Thus,
the RMTDP fills in the gaps in an incompletely specified BDI team plan optimally. Here
the gaps we concentrate on are the role allocations, but the method can be applied to other
key coordination decisions. By restricting the optimization to only role allocation decisions
and fixing the policy at all other points, we are able to come up with a restricted policy
space. We then use RMTDPs to effectively search this restricted space in order to find the
optimal role allocation.
While the restricted policy search is one key positive interaction in our hybrid approach,
the second interaction consists of a more efficient policy representation used for converting
a BDI team plan and interpreter into a corresponding policy (see Figure 1) and a new
algorithm for policy evaluation. In general, each agent's policy in a distributed POMDP
is indexed by its observation history (Bernstein et al., 2000; Pynadath & Tambe, 2002).
369
Nair & Tambe
However, in a BDI system, each agent performs its action selection based on its set of
privately held beliefs which is obtained from the agent's observations after applying a belief
revision function. In order to evaluate the team's performance, it is sufficient in RMTDP to
index the agents' policies by their belief state (represented here by their privately held beliefs)
instead of their observation histories. This shift in representation results in considerable
savings in the amount of time needed to evaluate a policy and in the space required to
represent a policy.
The third key interaction in our hybrid approach further exploits BDI team plan struc-
ture for increasing the efficiency of our RMTDP-based analysis. Even though RMTDP
policy space is restricted to filling in gaps in incomplete policies, many policies may result
given the large number of possible role allocations. Thus enumerating and evaluating each
possible policy for a given domain is difficult. Instead, we provide a branch-and-bound al-
gorithm that exploits task decomposition among sub-teams of a team to significantly prune
the search space and provide a correctness proof and worst-case analysis of this algorithm.
In order to empirically validate our approach, we have applied RMTDP for allocation
in BDI teams in two concrete domains: mission rehearsal simulations (Tambe et al., 2000)
and RoboCupRescue (Kitano et al., 1999). We first present the (significant) speed-up
gained by our three interactions mentioned above. Next, in both domains, we compared
the role allocations found by our approach with state-of-the-art techniques that allocate
roles without uncertainty reasoning. This comparison shows the importance of reasoning
about uncertainty when determining the role allocation for complex multiagent domains. In
the RoboCupRescue domain, we also compared the allocations found with allocations chosen
by humans in the actual RoboCupRescue simulation environment. The results showed that
the role allocation technique presented in this article is capable of performing at human
expert levels in the RoboCupRescue domain.
The article is organized as follows: Section 2 presents background and motivation. In
Section 3, we introduce the RMTDP model and present key complexity results. Section
4 explains how a BDI team plan can be evaluated using RMTDP. Section 5 describes the
analysis methodology for finding the optimal role allocation, while Section 6 presents an
empirical evaluation of this methodology.
In Section 7, we present related work and in
Section 8, we list our conclusions.
2. Background
This section first describes the two domains that we consider in this article: an abstract
mission rehearsal domain (Tambe et al., 2000) and the RoboCupRescue domain (Kitano
et al., 1999). Each domain requires us to allocate roles to agents in a team. Next, team-
oriented programming (TOP), a framework for describing team plans is described in the
context of these two domains. While we focus on TOP, as discussed further in Section 7.1,
our techniques would be applicable in other frameworks for tasking teams (Stone & Veloso,
1999; Decker & Lesser, 1993).
2.1 Domains
The first domain that we consider is based on mission rehearsal simulations (Tambe et al.,
2000). For expository purposes, this has been intentionally simplified. The scenario is as
370
Hybrid BDI-POMDP Framework for Multiagent Teaming
follows: A helicopter team is executing a mission of transporting valuable cargo from point
X to point Y through enemy terrain (see Figure 2). There are three paths from X to Y of
different lengths and different risk due to enemy fire. One or more scouting sub-teams must
be sent out (one for each path from X to Y), and the larger the size of a scouting sub-team
the safer it is. When scouts clear up any one path from X to Y, the transports can then
move more safely along that path. However, the scouts may fail along a path, and may
need to be replaced by a transport at the cost of not transporting cargo. Owing to partial
observability, the transports may not receive an observation that a scout has failed or that
a route has been cleared. We wish to transport the most amount of cargo in the quickest
possible manner within the mission deadline.
The key role allocation decision here is given a fixed number of helicopters, how should
they be allocated to scouting and transport roles? Allocating more scouts means that the
scouting task is more likely to succeed, but there will be fewer helicopters left that can
be used to transport the cargo and consequently less reward. However, allocating too few
scouts could result in the mission failing altogether. Also, in allocating the scouts, which
routes should the scouts be sent on? The shortest route would be preferable but it is more
risky. Sending all the scouts on the same route decreases the likelihood of failure of an
individual scout; however, it might be more beneficial to send them on different routes, e.g.
some scouts on a risky but short route and others on a safe but longer route.
Thus there are many role allocations to consider. Evaluating each is difficult because
role allocation must look-ahead to consider future implications of uncertainty, e.g. scout
helicopters can fail during scouting and may need to be replaced by a transport. Further-
more, failure or success of a scout may not be visible to the transport helicopters and hence
a transport may not replace a scout or transports may never fly to the destination.
transports
scout
route 1
X
route 2
Y
enemy gun
route 3
Figure 2: Mission rehearsal domain.
The second example scenario (see Figure 3), set up in the RoboCupRescue disaster
simulation environment (Kitano et al., 1999), consists of five fire engines at three different
fire stations (two each at stations 1 & 3 and the last at station 2) and five ambulances
stationed at the ambulance center. Two fires (in top left and bottom right corners of the
map) start that need to be extinguished by the fire engines. After a fire is extinguished,
ambulance agents need to save the surviving civilians. The number of civilians at each
371
Nair & Tambe
location is not known ahead of time, although the total number of civilians in known. As
time passes, there is a high likelihood that the health of civilians will deteriorate and fires
will increase in intensity. Yet the agents need to rescue as many civilians as possible with
minimal damage to the buildings. The first part of the goal in this scenario is therefore to
first determine which fire engines to assign to each fire. Once the fire engines have gathered
information about the number of civilians at each fire, this is transmitted to the ambulances.
The next part of the goal is then to allocate the ambulances to a particular fire to rescue
the civilians trapped there. However, ambulances cannot rescue civilians until fires are fully
extinguished. Here, partial observability (each agent can only view objects within its visual
range), and uncertainty related to fire intensity, as well as location of civilians and their
health add significantly to the difficulty.
C1
F3
C2
F2
F1
A
Figure 3: RoboCupRescue Scenario: C1 and C2 denote the two fire locations, F1, F2 and
F3 denote fire stations 1, 2 and 3 respectively and A denotes the ambulance
center.
2.2 Team-Oriented Programming
The aim of the team-oriented programming (TOP) (Pynadath & Tambe, 2003; Tambe et al.,
2000; Tidhar, 1993b) framework is to provide human developers (or automated symbolic
planners) with a useful abstraction for tasking teams. For domains such as those described
in Section 2.1, it consists of three key aspects of a team: (i) a team organization hierarchy
consisting of roles; (ii) a team (reactive) plan hierarchy; and (iii) an assignment of roles
to sub-plans in the plan hierarchy. The developer need not specify low-level coordination
details. Instead, the TOP interpreter (the underlying coordination infrastructure) automat-
ically enables agents to decide when and with whom to communicate and how to reallocate
372
Hybrid BDI-POMDP Framework for Multiagent Teaming
roles upon failure. The TOP abstraction enables humans to rapidly provide team plans for
large-scale teams, but unfortunately, only a qualitative assessment of team performance is
feasible. Thus, a key TOP weakness is the inability to quantitatively evaluate and optimize
team performance, e.g., in allocating roles to agents only a qualitative matching of capa-
bilities may be feasible. As discussed later, our hybrid BDI-POMDP model addresses this
weakness by providing techniques for quantitative evaluation.
As a concrete example, consider the TOP for the mission rehearsal domain. We first
specify the team organization hierarchy (see Figure 4(a)). Task Force is the highest level
team in this organization and consists of two roles Scouting and Transport, where the
Scouting sub-team has roles for each of the three scouting sub-sub-teams. Next we specify
a hierarchy of reactive team plans (Figure 4(b)). Reactive team plans explicitly express
joint activities of the relevant team and consist of: (i) pre-conditions under which the plan
is to be proposed; (ii) termination conditions under which the plan is to be ended; and (iii)
team-level actions to be executed as part of the plan (an example plan will be discussed
shortly).
In Figure 4(b), the highest level plan Execute Mission has three sub-plans:
DoScouting to make one path from X to Y safe for the transports, DoTransport to
move the transports along a scouted path, and RemainingScouts for the scouts which
have not reached the destination yet to get there.
Execute Mission [Task Force]
DoScouting
[Task Force]
RemainingScouts
[Scouting Team]
DoTransport
[Transport Team]
Task Force
Scouting Team
Transport Team
WaitAtBase
ScoutRoutes
[Transport Team]
[Scouting Team]
SctTeamA SctTeamB SctTeamC
(a)
ScoutRoute1
[SctTeamA]
ScoutRoute2
[SctTeamB]
ScoutRoute3
[SctTeamC]
(b)
Figure 4: TOP for mission rehearsal domain a: Organization hierarchy; b: Plan hierarchy.
Figure 4(b) also shows coordination relationships: An AND relationship is indicated
with a solid arc, while an OR relationship is indicated with a dashed arc. Thus, Wai-
tAtBase and ScoutRoutes must both be done while at least one of ScoutRoute1,
ScoutRoute2 or ScoutRoute3 need be performed. There is also a temporal depen-
dence relationship among the sub-plans, which implies that sub-teams assigned to perform
DoTransport or RemainingScouts cannot do so until the DoScouting plan has com-
pleted. However, DoTransport and RemainingScouts execute in parallel. Finally, we
assign roles to plans – Figure 4(b) shows the assignment in brackets adjacent to the plans.
For instance, Task Force team is assigned to jointly perform Execute Mission while Sct-
TeamA is assigned to ScoutRoute1.
The team plan corresponding to Execute Mission is shown in Figure 5. As can be
seen, each team plan consists of a context, pre-conditions, post-conditions, body and con-
straints. The context describes the conditions that must be fulfilled in the parent plan while
the pre-conditions are the particular conditions that will cause this sub-plan to begin exe-
373
Nair & Tambe
cution. Thus, for Execute Mission, the pre-condition is that the team mutually believes
(MB)1 that they are the "start" location. The post-conditions are divided into Achieved,
Unachievable and Irrelevant conditions under which this sub-plan will be terminated. The
body consists of sub-plans that exist within this team plan. Lastly, constraints describe any
temporal constraints that exist between sub-plans in the body. The description of all the
plans in the plan hierarchy of Figure 4(b) is given in Appendix A.
ExecuteMission:
Context:∅
Pre-conditions: (MB <TaskForce> location(TaskForce) = START)
Achieved: (MB <TaskForce> (Achieved(DoScouting) ∧ Achieved(DoTransport))) ∧ (time
> T ∨ (MB <TaskForce>
Achieved(RemainingScouts) ∨ (∄ helo ∈ ScoutingTeam, alive(helo) ∧
location(helo) 6= END)))
Unachievable: (MB <TaskForce> Unachievable(DoScouting)) ∨ (MB <TaskForce>
Unachievable(DoTransport) ∧
(Achieved(RemainingScouts) ∨(∄ helo ∈ ScoutingTeam, alive(helo) ∧
location(helo) 6= END)))
Irrelevant: ∅
Body:
DoScouting
DoTransport
RemainingScouts
Constraints: DoScouting → DoTransport, DoScouting → RemainingScouts
Figure 5: Example team plan. MB refers to mutual belief.
Just as in HTN (Dix, Muoz-Avila, Nau, & Zhang, 2003; Erol, Hendler, & Nau, 1994), the
plan hierarchy of a TOP gives a decomposition of the task into smaller tasks. However, the
language of TOPs is richer than the language of early HTN planning (Erol et al., 1994) which
contained just simple ordering constraints. As seen in the above example, the plan hierarchy
in TOPs can also contain relationships like AND and OR. In addition, just like more recent
work in HTN planning (Dix et al., 2003), sub-plans in TOPs can contain pre-conditions and
post-conditions, thus allowing for conditional plan execution. The main differences between
TOPs and HTN planning are: (i) TOPs contain an organization hierarchy in addition to a
plan hierarchy, (ii) the TOP interpreter ensures that the team executes its plans coherently.
As seen later, TOPs will be analyzed with all of this expressiveness including conditional
execution; however, since our analysis will focus on a fixed time horizon, any loops in the
task description will be unrolled up to the time horizon.
1. Mutual Belief (Wooldridge, 2002), shown as (MB hteami x) in Figure 5, refers to a private belief held
by each agent in the team that they each believe that a fact x is true, and that each of the other agents
in the team believe that x is true, and that every agent believes that every other agent believes that x
is true and so on. Such infinite levels of nesting are difficult to realize in practice. Thus, as in practical
BDI implementations, for the purposes of this article, a mutual belief is approximated to be a private
belief held by an agent that all the agents in the team believe that x is true.
374
Hybrid BDI-POMDP Framework for Multiagent Teaming
new observation for
agent i
Belief Update
function
Private beliefs of
agent i
Figure 6: Mapping of observations to beliefs.
During execution, each agent has a copy of the TOP. The agent also maintains a set
of private beliefs, which are a set of propositions that the agent believes to be true (see
Figure 6). When an agent receives new beliefs, i.e. observations (including communication),
the belief update function is used to update its set of privately held beliefs. For instance,
upon seeing the last scout crashed, a transport may update its privately held beliefs to
In practical BDI systems, such belief
include the belief "CriticalFailure(DoScouting)".
update computation is of low complexity (e.g.
constant or linear time). Once beliefs
are updated, an agent selects which plan to execute by matching its beliefs with the pre-
conditions in the plans. The basic execution cycle is similar to standard reactive planning
systems such as PRS (Georgeff & Lansky, 1986).
During team plan execution, observations in the form of communications often arise
because of the coordination actions executed by the TOP interpreter. For instance, TOP
interpreters have exploited BDI theories of teamwork, such as Levesque et al.'s theory
of joint intentions (Levesque, Cohen, & Nunes, 1990) which require that when an agent
comes to privately believe a fact that terminates the current team plan (i.e. matches the
achievement or unachievability conditions of a team plan), then it communicates this fact
to the rest of the team. By performing such coordination actions automatically, the TOP
interpreter enables coherence at the initiation and termination of team plans within a TOP.
Some further details and examples of TOPs can be seen in the work of Pynadath and
Tambe (2003), Tambe et al. (2000) and Tidhar (1993b).
We can now more concretely illustrate the key challenges in role allocation mentioned
earlier. First, a human developer must allocate available agents to the organization hierar-
chy (Figure 4(a)), to find the best role allocation. However, there are combinatorially many
allocations to choose from (Hunsberger & Grosz, 2000; Tambe et al., 2000). For instance,
starting with just 6 homogeneous helicopters results in 84 different ways of deciding how
many agents to assign to each scouting and transport sub-team. This problem is exacer-
bated by the fact that the best allocation varies significantly based on domain variations.
For example, Figure 7 shows three different assignments of agents to the team organiza-
tion hierarchy, each found in our analysis to be the best for a given setting of failure and
observation probabilities (details in Section 6). For example, increasing the probability of
failures on all routes resulted in the number of transports in the best allocation changing
from four (see Figure 7(b)) to three (see Figure 7(a)), where an additional scout was added
to SctTeamB. If failures were not possible at all, the number of transports increased to
five (see Figure 7(c)). Our analysis takes a step towards selecting the best among such
allocations.
375
Nair & Tambe
Task Force
Task Force
Scouting Team Transport Team=3
Scouting Team Transport Team=4
SctTeamA=2 SctTeamB=1 SctTeamC=0
SctTeamA=2 SctTeamB=0 SctTeamC=0
(a) Medium probability
(b) Low probability
Task Force
Scouting Team Transport Team=5
SctTeamA=0 SctTeamB=0 SctTeamC=1
(c) Zero probability
Figure 7: Best role allocations for different probabilities of scout failure.
Figure 8 shows the TOP for the RoboCupRescue scenario. As can be seen, the plan hi-
erarchy for this scenario consists of a pair of ExtinguishFire and RescueCivilians plans
done in parallel, each of which further decompose into individual plans. (These individ-
ual plans get the fire engines and ambulances to move through the streets using specific
search algorithms, however, these individual plans are not relevant for our discussions in
this article; interested readers should refer to the description of our RoboCupRescue team
entered into the RoboCup competitions of 2001 (Nair, Ito, Tambe, & Marsella, 2002).) The
organizational hierarchy consists of Task Force comprising of two Engine sub-teams, one
for each fire and an Ambulance Team, where the engine teams are assigned to extinguishing
the fires while the ambulance team is assigned to rescuing civilians. In this particular TOP,
the assignment of ambulances to AmbulanceTeamA and AmbulanceTeamB is conditioned
on the communication "c", indicated by "AmbulanceTeamAc" and "AmbulanceTeamBc".
"c" is not described in detail in this figure, but it refers to the communication that is re-
ceived from the fire engines that describes the number of civilians present at each fire. The
problem is which engines to assign to each Engine Team and for each possible value of "c",
which ambulances to assign to each Ambulance Team. Note that engines have differing
capabilities owing to differing distances from fires while all the ambulances have identical
capabilities.
Task Force
EngineTeamA
EngineTeamB
AmbulanceTeam
AmbulanceTeamA c AmbulanceTeamB c
(a)
ExecuteMission
[Task Force]
ExtinguishFire1
[EngineTeamA]
RescueCivilians1
[AmbulanceTeamA]
ExtinguishFire2
[EngineTeamB]
RescueCivilians2
[AmbulanceTeamB]
(b)
Figure 8: TOP for RoboCupRescue scenario a: Organization hierarchy; b: Plan hierarchy.
376
Hybrid BDI-POMDP Framework for Multiagent Teaming
3. Role-based Multiagent Team Decision Problem
Multiagent Team Decision Problem (MTDP) (Pynadath & Tambe, 2002) is inspired by
the economic theory of teams (Marschak & Radner, 1972; Ho, 1980; Yoshikawa, 1978).
In order to do quantitative analysis of key coordination decisions in multiagent teams, we
extend MTDP for the analysis of the coordination actions of interest. For example, the
COM-MTDP (Pynadath & Tambe, 2002) is an extension of MTDP for the analysis of com-
munication. In this article, we illustrate a general methodology for analysis of other aspects
of coordination and present the RMTDP model for quantitative analysis of role allocation
and reallocation as a concrete example. In contrast to BDI systems introduced in the previ-
ous section, RMTDP enables explicit quantitative optimization of team performance. Note
that, while we use MTDP, other possible distributed POMDP models could potentially also
serve as a basis (Bernstein et al., 2000; Xuan et al., 2001).
3.1 Multiagent Team Decision Problem
Given a team of n agents, an MTDP (Pynadath & Tambe, 2002) is defined as a tuple:
hS, A, P, Ω, O, Ri. It consists of a finite set of states S = Ξ1 × · · · × Ξm where each Ξj,
1 ≤ j ≤ m, is a feature of the world state. Each agent i can perform an action from its
set of actions Ai, where ×1≤i≤nAi = A. P (s, < a1, . . . , an >, s′) gives the probability of
transitioning from state s to state s′ given that the agents perform the actions < a1, . . . , an >
jointly. Each agent i receives an observation ωi ∈ Ωi (×1≤i≤nΩi = Ω) based on the function
O(s, < a1, . . . , an >, ω1, . . . , ωn), which gives the probability that the agents receive the
observations, ω1, . . . , ωn given that the world state is s and they perform < a1, . . . , an >
jointly. The agents receive a single joint reward R(s, < a1, . . . , an >) based on the state s
and their joint action < a1, . . . , an >. This joint reward is shared equally by all members
and there is no other private reward that individual agents receive for their actions. Thus,
the agents are motivated to behave as a team, taking the actions that jointly yield the
maximum expected reward.
i , . . . , ωt
Each agent i in an MTDP chooses its actions based on its local policy, πi, which is a
mapping of its observation history to actions. Thus, at time t, agent i will perform action
πi(ω0
i). This contrasts with a single-agent POMDP, where we can index an agent's
policy by its belief state – a probability distribution over the world state (Kaelbling, Littman,
& Cassandra, 1998), which is shown to be a sufficient statistic in order to compute the
optimal policy (Sondik, 1971). Unfortunately, we cannot directly use single-agent POMDP
techniques (Kaelbling et al., 1998) for maintaining or updating belief states (Kaelbling et al.,
1998) in a MTDP – unlike in a single agent POMDP, in MTDP, an agent's observation
depends not only on its own actions, but also on unknown actions of other agents. Thus,
as with other distributed POMDP models (Bernstein et al., 2000; Xuan et al., 2001), in
MTDP, local policies πi are indexed by observation histories. π =< π1, . . . , πn > refers to
the joint policy of the team of agents.
3.2 Extension for Explicit Coordination
Beginning with MTDP, the next step in our methodology is to make an explicit separation
between domain-level actions and the coordination actions of interest. Earlier work intro-
377
Nair & Tambe
duced the COM-MTDP model (Pynadath & Tambe, 2002), where the coordination action
was fixed to be the communication action, and got separated out. However, other coordina-
tion actions could also be separated from domain-level actions in order to investigate their
impact. Thus, to investigate role allocation and reallocations, actions for allocating agents
to roles and to reallocate such roles are separated out. To that end, we define RMTDP
(Role-based Multiagent Team Decision Problem) as a tuple hS, A, P, Ω, O, R, RLi with a
new component, RL. In particular, RL = {r1, . . . , rs} is a set of all roles that the agents
can undertake. Each instance of role rj may be assigned some agent i to fulfill it. The
actions of each agent are now distinguishable into two types:
Role-Taking actions: Υi = {υirj } contains the role-taking actions for agent i. υirj ∈ Υi
means that agent i takes on the role rj ∈ RL.
Role-Execution Actions: Φi = Srj ∈RL Φirj contains the execution actions for agent i
where Φirj is the set of agent i's actions for executing role rj ∈ RL
In addition we define the set of states as S = Ξ1 × · · · × Ξm × Ξroles, where the fea-
ture Ξroles (a vector) gives the current role that each agent has taken on. The reason for
introducing this new feature is to assist us in the mapping from a BDI team plan to an
RMTDP. Thus each time an agent performs a new role-taking action successfully, the value
of the feature Ξroles will be updated to reflect this change. The key here is that we not only
model an agent's initial role-taking action but also subsequent role reallocation. Modeling
both allocation and reallocation is important for an accurate analysis of BDI teams. Note
that an agent can observe the part of this feature pertaining to its own current role but it
may not observe the parts pertaining to other agents' roles.
The introduction of roles allows us to represent the specialized behaviors associated
with each role, e.g. a transport vs. a scout role. While filling a particular role, rj, agent
i can perform only role-execution actions, φ ∈ Φirj , which may be different from the role-
execution actions Φirl for role rl. Thus, the feature Ξroles is used to filter actions such that
only those role-execution actions that correspond to the agent's current role are permitted.
In the worst case, this filtering does not affect the computational complexity (see Theorem 1
below) but in practice, it can significantly improve performance when trying to find the
optimal policy for the team, since the number of domain actions that each agent can choose
from is restricted by the role that the agent has taken on. Also, these different roles can
produce varied effects on the world state (modeled via transition probabilities, P ) and the
team's reward. Thus, the policies must ensure that agents for each role have the capabilities
that benefit the team the most.
Just as in MTDP, each agent chooses which action to perform by indexing its local policy
πi by its observation history. In the same epoch some agents could be doing role-taking
actions while others are doing role-execution actions. Thus, each agent's local policy πi can
be divided into local role-taking and role-execution policies such that for all observation
histories, ω0
i) = null. πΥ =<
π1Υ, . . . , πnΥ > refers to the joint role-taking policy of the team of agents while πΦ =<
π1Φ, . . . , πnΦ > refers to the joint role-execution policy.
i) = null or πiΦ(ω0
i , . . . , ωt
i , . . . , ωt
i, either πiΥ(ω0
i , . . . , ωt
378
Hybrid BDI-POMDP Framework for Multiagent Teaming
In this article we do not explicitly model communicative actions as a special action.
Thus communication is treated like any other role-execution action and the communication
received from other agents are treated as observations.2
3.3 Complexity Results with RMTDP
While Section 2.2 qualitatively emphasized the difficulty of role allocation, RMTDP helps
us in understanding the complexity more precisely. The goal in RMTDP is to come up with
joint policies πΥ and πΦ that will maximize the total expected reward over a finite horizon
T . Note that agents can change their roles according to their local role-taking policies. The
agent's role-execution policy subsequent to this change would contain actions pertaining to
this new role. The following theorem illustrates the complexity of finding such optimal joint
policies.
Theorem 1 The decision problem of determining if there exist policies, πΥ and πΦ, for an
RMTDP, that yield an expected reward of at least K over some finite horizon T is NEXP-
complete.
Proof sketch: Proof follows from the reduction of MTDP (Pynadath & Tambe, 2002)
to/from RMTDP. To reduce MTDP to RMTDP, we set RMTDP's role taking actions, Υ′,
to null and set the RMTDP's role-execution actions, Φ′, to the MTDP's set of actions, A.
To reduce RMTDP to MTDP, we generate a new MTDP such that its set of actions, A′
is equal to ΥS Φ. Finding the required policy in MTDP is NEXP-complete (Pynadath &
Tambe, 2002).(cid:3)
As this theorem shows us, solving the RMTDP for the optimal joint role-taking and role-
execution policies over even a finite horizon is highly intractable. Hence, we focus on the
complexity of just determining the optimal role-taking policy, given a fixed role-execution
policy. By fixed role-execution policy, we mean that the action selection of an agent is
predetermined by the role it is executing.
Theorem 2 The decision problem of determining if there exists a role-taking policy, πΥ, for
an RMTDP, that yields an expected reward of at least K together with a fixed role-execution
policy πΦ, over some finite horizon T is NEXP-complete.
Proof sketch: We reduce an MTDP to an RMTDP with a different role-taking and a
role-execution action corresponding to each action in the MTDP. Hence, in the RMTDP we
have a role-taking action υirj for agent i to take on role rj created for each action aj ∈ Ai in
the MTDP and each such role rj contains a single role-execution action, i.e. Φirj = 1. For
the RMTDP, construct the transition function to be such that a role-taking action always
succeeds and the only affected state feature is Ξroles. For the role-execution action φ ∈ Φirj ,
the transition probability is the same as that of the MTDP action, aj ∈ Ai corresponding
to the last role-taking action υirj . The fixed role-execution policy is to simply perform
the action, φ ∈ Φirj , corresponding to the last successful role-taking action, υirj . Thus,
the decision problem for an RMTDP with a fixed role-execution policy is at least as hard
2. For a more explicit analysis of communication please refer to work done by Pynadath and Tambe (2002)
and Goldman et al. (2003).
379
Nair & Tambe
as the decision problem for an MTDP. Furthermore, given Theorem 1, we can conclude
NEXP-Completeness.(cid:3)
This result suggests that even by fixing the role-execution policy, solving the RMTDP for
the optimal role-taking policy is still intractable. Note that Theorem 2 refers to a completely
general globally optimal role-taking policy, where any number of agents can change roles at
any point in time. Given the above result, in general the globally optimal role-taking policy
will likely be of doubly exponential complexity, and so we may be left no choice but to run
a brute-force policy search, i.e. to enumerate all the role-taking policies and then evaluate
them, which together determine the run-time of finding the globally optimal policy. The
number of policies is (cid:18)Υ
ΩT −1
Ω−1 (cid:19)n
, i.e. doubly exponential in the number of observation
histories and the number of agents. Thus, while RMTDP enables quantitative evaluation of
team's policies, computing optimal policies is intractable; furthermore, given its low level of
abstraction, in contrast to TOP, it is difficult for a human to understand the optimal policy.
This contrast between RMTDP and TOP is at the root of our hybrid model described in
the following section.
4. Hybrid BDI-POMDP Approach
Having explained TOP and RMTDP, we can now present a more detailed view of our
hybrid methodology to quantitatively evaluate a TOP. We first provide a more detailed
interpretation of Figure 1. BDI team plans are essentially TOP plans, while the BDI
interpreter is the TOP coordination layer. As shown in Figure 1, an RMTDP model is
constructed corresponding to the domain and the TOP and its interpreter are converted
into a corresponding (incomplete) RMTDP policy. We can then analyze the TOP using
analysis techniques that rely on evaluating the RMTDP policy using the RMTDP model
of the domain.
Thus, our hybrid approach combines the strengths of the TOPs (enabling humans to
specify TOPs to coordinate large-scale teams) with the strengths of RMTDP (enabling
quantitative evaluation of different role allocations). On the one hand, this synergistic
interaction enables RMTDPs to improve the performance of TOP-based BDI teams. On
the other hand, we have identified at least six specific ways in which TOPs make it easier
to build RMTDPs and to efficiently search RMTDP policies: two of which are discussed in
this section, and four in the next section. In particular, the six ways are:
1. TOPs are exploited in constructing RMTDP models of the domain (Section 4.1);
2. TOPs are exploited to present incomplete policies to RMTDPs, restricting the RMTDP
policy search (Section 5.1);
3. TOP belief representation is exploited in enabling faster RMTDP policy evaluation
(Section 4.2);
4. TOP organization hierarchy is exploited in hierarchically grouping RMTDP policies
(Section 5.1);
5. TOP plan hierarchy is exploited in decomposing RMTDPs (Section 5.3);
380
Hybrid BDI-POMDP Framework for Multiagent Teaming
6. TOP plan hierarchies are also exploited in cutting down the observation or belief
histories in RMTDPs (Section 5.3).
The end result of this efficient policy search is a completed RMTDP policy that improves
TOP performance. While we exploit the TOP framework, other frameworks for tasking
teams, e.g. Decker and Lesser (1993) and Stone and Veloso (1999) could benefit from a
similar synergistic interaction.
4.1 Guidelines for Constructing an RMTDP
As shown in Figure 1, our analysis approach uses as input an RMTDP model of the domain,
as well as an incomplete RMTDP policy. Fortunately, not only does the TOP serve as a
direct mapping to the RMTDP policy, but it can also be utilized in actually constructing
the RMTDP model of the domain. In particular, the TOP can be used to determine which
domain features are important to model.
In addition, the structure in the TOP can be
exploited in decomposing the construction of the RMTDP.
The elements of the RMTDP tuple, hS, A, P, Ω, O, R, RLi, can be defined using a pro-
cedure that relies on both the TOP as well as the underlying domain. While this procedure
is not automated, our key contribution is recognizing the exploitation of TOP structures
in constructing the RMTDP model. First, in order to determine the set of states, S, it
is critical to model the variables tested in the pre-conditions, termination conditions and
context of all the components (i.e. sub-plans) in the TOP. Note that a state only needs
to model the features tested in the TOP; if a TOP pre-condition expresses a complex test
on the feature, that test is not modeled in the state, but instead gets used in defining the
incomplete policy input to RMTDP. Next we define the set of roles, RL, as the leaf-level
roles in the organization hierarchy of the TOP. Furthermore, as specified in Section 3.2, we
define a state feature Ξroles as a vector containing the current role for each agent. Having
defined RL and Ξroles, we now define the actions, A as follows. For each role rj ∈ RL, we
define a corresponding role-taking action, υirj which will succeed or fail depending on the
agent i that performs the action and the state s that the action was performed in. The
role-execution actions, Φirj for agent i in role rj, are those allowed for that role according
to the TOP.
Thus, we have defined S, A and RL based on the TOP. To illustrate these steps, consider
the plans in Figure 4(b). The pre-conditions of the leaf-level plan ScoutRoute1 (See
Appendix A), for instance, tests start location of the helicopters to be at start location X,
while the termination conditions test that scouts are at end location Y. Thus, the locations
of the helicopters are modeled as features in the set of states in the RMTDP. Using the
organization hierarchy, we define the set of roles RL with a role corresponding to each of the
four different kinds of leaf-level roles, i.e. RL = {memberSctT eamA, memberSctT eamB,
memberSctT eamC, memberT ransportT eam}. The role-taking and role-execution actions
can be defined as follows:
• A role-taking action is defined corresponding to each of the four roles in RL, i.e.
becoming a member of one of the three scouting teams or of the transport team. The
domain specifies that only a transport can change to a scout and thus the role-taking
action, jointTransportTeam, will fail for agent i, if the current role of agent i is a scout.
381
Nair & Tambe
• Role-execution actions are obtained from the TOP plans corresponding to the agent's
role.
In the mission rehearsal scenario, an agent, fulfilling a scout role (members
of SctTeamA, SctTeamB or SctTeamC), always goes forward, making the current
position safe, until it reaches the destination and so the only execution action we will
consider is "move-making-safe". An agent in a transport role (members of Transport
Team) waits at X until it obtains observation of a signal that one scouting sub-team
has reached Y and hence the role-execution actions are "wait" and "move-forward".
We must now define Ω, P, O, R. We obtain the set of observations Ωi for each agent i
directly from the domain. For instance, the transport helos may observe the status of scout
helos (normal or destroyed), as well as a signal that a path is safe. Finally, determining
the functions, P, O, R requires some combination of human domain expertise and empirical
data on the domain behavior. However, as shown later in Section 6, even an approximate
model of transitional and observational uncertainty is sufficient to deliver significant ben-
efits. Defining the reward and transition function may sometimes require additional state
variables to be modeled, if they were only implicitly modeled in the TOP. In the mission
rehearsal domain, the time at which the scouting and transport mission were completed
determined the amount of reward. Thus, time was only implicitly modeled in the TOP and
needed to be explicitly modeled in the RMTDP.
Since we are interested in analyzing a particular TOP with respect to uncertainty, the
procedure for constructing an RMTDP model can be simplified by exploiting the hierar-
chical decomposition of the TOP in order to decompose the construction of the RMTDP
model. The high-level components of a TOP often represent plans executed by different
sub-teams, which may only loosely interact with each other. Within a component, the
sub-team members may exhibit a tight interaction, but our focus is on the "loose coupling"
across components, where only the end results of one component feed into another, or the
components independently contribute to the team goal. Thus, our procedure for construct-
ing an RMTDP exploits this loose coupling between components of the plan hierarchy in
order to build an RMTDP model represented as a combination of smaller RMTDPs (fac-
tors). Note that if such decomposition is infeasible, our approach still applies except that
the benefits of the hierarchical decomposition will be unavailable.
We classify sibling components as being either parallel or sequentially executed (con-
tains a temporal constraint). Components executed in parallel could be either independent
or dependent. For independent components, we can define RMTDPs for each of these
components such that the sub-team executing one component cannot affect the transi-
tions, observations and reward obtained by the sub-teams executing the other compo-
nents. The procedure for determining the elements of the RMTDP tuple for component k,
hSk, Ak, Pk, Ωk, Ok, Rk, RLki, is identical to the procedure described earlier for constructing
the overall RMTDP. However, each such component has a smaller set of relevant variables
and roles and hence specifying the elements of its corresponding RMTDP is easier.
We can now combine the RMTDPs of the independent components to obtain the
RMTDP corresponding to the higher-level component. For a higher level component l,
whose child components are independent, the set of states, Sl = ×∀Ξx∈FSl
Ξx such that
FSl = S∀k s.t. Child(k,l)=true FSk where FSl and FSk are the sets of features for the set
of states Sl and set of states Sk. A state sl ∈ Sl
sk ∈ Sk if ∀Ξx ∈ FSk , sl[Ξx] = sk[Ξx], i.e.
is said to correspond to the state
the state sl has the same value as state sk
382
Hybrid BDI-POMDP Framework for Multiagent Teaming
Q∀k s.t. Child(k,l)=true Pk(s′
k, ak, sk), where sl and s′
for all features of state sk. The transition function is defined as follows, Pl(s′
l, al, sl) =
l of component l corresponds to states
sk and s′
k of component k and ak is the joint action performed by the sub-team as-
signed to component k corresponding to the joint action al performed by the sub-team
assigned to component l. The observation function is defined similarly as Ol(sl, al, ωl) =
Q∀k s.t. Child(k,l)=true Ok(sk, ak, ωk). The reward function for component l is defined as
Rl(sl, al) = P∀k s.t. Child(k,l)=true Rk(sk, ak).
In the case of sequentially executed components (those connected by a temporal con-
straint), the components are loosely coupled since the end states of the preceding component
specify the start states of the succeeding component. Thus, since only one component is
active at a time, the transition function is defined as follows, Pl(s′
l, al, sl) = Pk(s′
k, ak, sk),
where component k is the only active child component, sk and s′
k represent the states of
component k corresponding to states sl and s′
l of component l and ak is the joint action
performed by the sub-team assigned to component k corresponding to the joint action
al performed by the sub-team corresponding to component l. Similarly, we can define
Ol(sl, al, ωl) = Ok(sk, ak, ωk) and Rl(sl, al) = Rk(sk, ak), where k is the only active child
component.
Consider the following example from the mission rehearsal domain where components
exhibit both sequential dependence and parallel independence. Concretely, the component
DoScouting is executed first followed by DoTransport and RemainingScouts, which
are parallel and independent and hence, either DoScouting is active or DoTransport and
RemainingScouts are active at any point in the execution. Hence, the transition, observa-
tion and reward functions of their parent Execute Mission is given by the corresponding
functions of either DoScouting or by the combination of the corresponding functions of
DoTransport and RemainingScouts.
We use a top-down approach in order to determine how to construct a factored RMTDP
from the plan hierarchy. As shown in Algorithm 1, we replace a particular sub-plan by its
constituent sub-plans if they are either independent or sequentially executed. If not, then
the RMTDP is defined using that particular sub-plan. This process is applied recursively
starting at the root component of the plan hierarchy. As a concrete example, consider
again our mission rehearsal simulation domain and the hierarchy illustrated in Figure 4(b).
Given the temporal constraints between DoScouting and DoTransport, and DoScout-
ing and RemainingScouts, we exploited sequential decomposition, while DoTransport
and RemainingScouts were parallel and independent components. Hence, we can replace
ExecuteMission by DoScouting, DoTransport and RemainingScouts. We then ap-
ply the same process to DoScouting. The constituent components of DoScouting are
neither independent nor sequentially executed and thus DoScouting cannot be replaced by
its constituent components. Thus, RMTDP for the mission rehearsal domain is comprised
of smaller RMTDPs for DoScouting, DoTransport and RemainingScouts.
Thus, using the TOP to identify relevant variables and building a factored RMTDP
utilizing the structure of TOP to decompose the construction procedure, reduce the load
on the domain expert for model construction. Furthermore, as shown in Section 5.3, this
factored model greatly improves the performance of the search for the best role allocation.
383
Nair & Tambe
Algorithm 1 Build-RMTDP(TOP top, Sub-plan subplan)
1: children ← subplan→children() {subplan→children() returns the sub-plans within sub-
plan}
2: if children = null or children are not (loosely coupled or independent) then
3:
rmtdp ← Define-RMTDP(subplan) {not automated}
return rmtdp
4:
5: else
6:
7:
for all child in children do
factors[child] ← Build-RMTDP(top,child)
8:
9:
rmtdp ← ConstructFromFactors(factors)
return rmtdp
4.2 Exploiting TOP Beliefs in Evaluation of RMTDP Policies
We now present a technique for exploiting TOPs in speeding up evaluation of RMTDP
policies. Before we explain our improvement, we first describe the original algorithm for
determining the expected reward of a joint policy, where the local policies of each agent
are indexed by its entire observation histories (Pynadath & Tambe, 2002; Nair, Pynadath,
Yokoo, Tambe, & Marsella, 2003a). Here, we obtain an RMTDP policy from a TOP as
follows. We obtain πi(~ωt
i), i.e. the action performed by agent i for each observation history
~ωt
i, as the action a performed by the agent i following the TOP when it has a set of privately
held beliefs corresponding to the observation history, ~ωt
i. We compute the expected reward
for the RMTDP policy by projecting the team's execution over all possible branches on
different world states and different observations. At each time step, we can compute the
expected value of a joint policy, π =< π1, . . . , πn >, for a team starting in a given state, st,
with a given set of past observations, ~ωt
n, as follows:
1, . . . , ~ωt
1, . . . , ~ωt
1), . . . , πn(~ωt
V t
π (st,(cid:10)~ωt
·Xωt+1∈Ω
n(cid:11)) = R(st,(cid:10)π1(~ωt
1(cid:1) , . . . , πn(cid:0)~ωt
O(cid:0)st+1,(cid:10)π1(cid:0)~ωt
n)(cid:11)) + Xst+1∈S
n (cid:11)(cid:1) · V t+1
P (cid:0)st,(cid:10)π1(cid:0)~ωt
(cid:0)st+1,(cid:10)~ωt+1
1(cid:1) , . . . , πn(cid:0)~ωt
n (cid:11)(cid:1)
, . . . , ~ωt+1
π
1
n(cid:1)(cid:11) , st+1(cid:1)
(1)
1 , . . . , ωt+1
n(cid:1)(cid:11) ,(cid:10)ωt+1
The expected reward of a joint policy π is given by V 0
π (s0, < null, . . . , null >) where s0
is the start state. At each time step t, the computation of V t
π performs a summation over all
possible world states and agent observations and so has a time complexity of O (S · Ω).
This computation is repeated for all states and all observation histories of length t, i.e.
O(cid:0)S · Ωt(cid:1) times. Therefore, given a time horizon T , the overall complexity of this algo-
rithm is O(cid:0)S2 · ΩT +1(cid:1).
As discussed in Section 2.2, in a team-oriented program, each agent's action selection
is based on just its currently held private beliefs (note that mutual beliefs are modeled
as privately held beliefs about all agents as per footnote 2). A similar technique can be
exploited when mapping TOP to an RMTDP policy. Indeed, the evaluation of a RMTDP
policy that corresponds to a TOP can be speeded up if each agent's local policy is indexed
by its private beliefs, ψ t
i , as the TOP-congruent belief state of agent i
i . We refer to ψ t
384
Hybrid BDI-POMDP Framework for Multiagent Teaming
in the RMTDP. Note that this belief state is not a probability distribution over the world
states as in a single agent POMDP, but rather the privately held beliefs (from the BDI
program) of agent i at time t. This is similar to the idea of representing a policy by a
finite-state controller (Hansen & Zhou, 2003; Poupart & Boutilier, 2003). In this case, the
private beliefs would map to the states of the finite-state controller.
Belief-based RMTDP policy evaluation leads to speedup because multiple observation
histories map to the same belief state, ψ t
i . This speedup is a key illustration of exploitation
of synergistic interactions of TOP and RMTDP. In this instance, belief representation tech-
niques used in TOP are reflected in RMTDP, and the resulting faster policy evaluation can
help us optimize TOP performance. A detailed example of belief state is presented later
after a brief explanation of how such belief-based RMTDP policies can be evaluated.
Just as with evaluation using observation histories, we compute the expected reward
of a belief-based policy by projecting the team's execution over all possible branches on
different world states and different observations. At each time step, we can compute the
expected value of a joint policy, π =< π1, . . . , πn >, for a team starting in a given state, st,
with a given team belief state, < ψ t
n > as follows:
1 , . . . , ψ t
1 . . . ψ t
V t
π (st,(cid:10)ψ t
·Xωt+1∈Ω
n(cid:11)) = R(st,(cid:10)π1(ψ t
1 (cid:1) , . . . , πn(cid:0)ψ t
O(cid:0)st+1,(cid:10)π1(cid:0)ψ t
1 ), . . . , πn(ψ t
n )(cid:11)) +Xst+1∈S
P (cid:0)st,(cid:10)π1(cid:0)ψ t
1 (cid:1) , . . . , πn(cid:0)ψ t
n(cid:1)(cid:11) , st+1(cid:1)
n(cid:1)(cid:11) ,(cid:10)ωt+1
1 , . . . , ωt+1
n (cid:11)(cid:1) · V t+1
π
(cid:0)st+1,(cid:10)ψ t+1
1
, . . . , ψ t+1
n
(cid:11)(cid:1)
(2)
where ψ t+1
i
= BeliefUpdateFunction(cid:0)ψ t
i , ωt+1
i
(cid:1)
The complexity of computing this function (expression 2) is O (S · Ω) · BF , where BF
represents the complexity of the belief update function, BeliefUpdateFunction. At each
time step the computation of the value function is done for every state and for all possible
reachable belief states. Let Ψi = max1≤t≤T (ψt
i ) represent the maximum number of
possible belief states that agent i can be in at any point in time, where ψt
i is the number
of belief states that agent i can be in at t. Therefore the complexity of this algorithm is
given by O(S2 · Ω · (Ψ1 · . . . · Ψn) · T ) · BF . Note that, in this algorithm T is not in
the exponent unlike in the algorithm in expression 1. Thus, this evaluation method will
give large time savings if: (i) the quantity (Ψ1 · . . . · Ψn) · T is much less than ΩT and
(ii) the belief update cost is low. In practical BDI systems, multiple observation histories
map often onto the same belief state, and thus usually, (Ψ1 · . . . · Ψn) · T is much less
than ΩT . Furthermore, since the belief update function mirrors practical BDI systems,
its complexity is also a low polynomial or a constant.
Indeed, our experimental results
show that significant speedups result from switching to our TOP-congruent belief states
ψ t
i . However, in the absolute worst case, the belief update function may simply append
the new observation to the history of past observations (i.e., TOP-congruent beliefs will
be equivalent to keeping entire observation histories) and thus belief-based evaluation will
have the same complexity as the observation history-based evaluation.
We now turn to an example of belief-based policy evaluation from the mission rehearsal
domain. At each time step, the transport helicopters may receive an observation about
385
Nair & Tambe
whether a scout has failed based on some observation function. If we use the observation-
history representation of the policy, then each transport agent would maintain a complete
history of the observations that it could receive at each time step. For example, in a setting
with two scout helicopters, one on route 1 and the other on route 2, a particular transport
helicopter may have several different observation histories of length two. At every time step,
the transports may receive an observation about each scout being alive or having failed.
Thus, at time t = 2, a transport helicopter might have one of the following observation his-
tories of length two, < {sct1OnRoute1Alive, sct2OnRoute2Alive}1, {sct1OnRoute1F ailed,
sct2OnRoute2F ailed}2 >, < {sct1OnRoute1Alive, sct2OnRoute2F ailed}1 , {sct1OnRoute1
F ailed}2 >, < {sct1OnRoute1F ailed, sct2OnRoute2Alive}1, {sct2OnRoute2F ailed}2 >,
etc. However, the action selection of the transport helicopters depends on only whether
a critical failure (i.e. the last remaining scout has crashed) has taken place to change its
role. Whether a failure is critical can be determined by passing each observation through
a belief-update function. The exact order in which the observations are received or the
precise times at which the failure or non-failure observations are received are not relevant
to determining if a critical failure has taken place and consequently whether a transport
should change its role to a scout. Thus, many observation histories map onto the same
belief states. For example, the above three observation histories all map to the same belief
CriticalF ailure(DoScouting) i.e. a critical failure has taken place. This results in signif-
icant speedups using belief-based evaluation, as Equation 2 needs to be executed over a
smaller number of belief states, linear in T in our domains, as opposed to the observation
history-based evaluation, where Equation 1 is executed over an exponential number of ob-
servation histories (ΩT ). The actual speedup obtained in the mission rehearsal domain is
demonstrated empirically in Section 6.
5. Optimizing Role Allocation
While Section 4 focused on mapping a domain of interest onto RMTDP and algorithms for
policy evaluation, this section focuses on efficient techniques for RMTDP policy search, in
service of improving BDI/TOP team plans. The TOP in essence provides an incomplete,
fixed policy, and the policy search optimizes decisions left open in the incomplete policy; the
policy thus completed optimizes the original TOP (see Figure 1). By enabling the RMTDP
to focus its search on incomplete policies, and by providing ready-made decompositions,
TOPs assist RMTDPs in quickly searching through the policy space, as illustrated in this
section. We focus, in particular, on the problem of role allocation (Hunsberger & Grosz,
2000; Modi, Shen, Tambe, & Yokoo, 2003; Tidhar et al., 1996; Fatima & Wooldridge, 2001),
a critical problem in teams. While the TOP provides an incomplete policy, keeping open
the role allocation decision for each agent, the RMTDP policy search provides the optimal
role-taking action at each of the role allocation decision points.
In contrast to previous
role allocation approaches, our approach determines the best role allocation, taking into
consideration the uncertainty in the domain and future costs. Although demonstrated for
solving the role allocation problem, the methodology is general enough to apply to other
coordination decisions.
386
Hybrid BDI-POMDP Framework for Multiagent Teaming
5.1 Hierarchical Grouping of RMTDP Policies
As mentioned earlier, to address role allocation, the TOP provides a policy that is complete,
except for the role allocation decisions. RMTDP policy search then optimally fills in the
role allocation decisions. To understand the RMTDP policy search, it is useful to gain an
understanding of the role allocation search space. First, note that role allocation focuses on
deciding how many and what types of agents to allocate to different roles in the organization
hierarchy. This role allocation decision may be made at time t = 0 or it may be made at a
later time conditioned on available observations. Figure 9 shows a partially expanded role
allocation space defined by the TOP organization hierarchy in Figure 4(a) for six helicopters.
Each node of the role allocation space completely specifies the allocation of agents to roles
at the corresponding level of the organization hierarchy (ignore for now, the number to the
right of each node). For instance, the root node of the role allocation space specifies that
six helicopters are assigned to the Task Force (level one) of the organization hierarchy while
the leftmost leaf node (at level three) in Figure 9 specifies that one helicopter is assigned
to SctTeamA, zero to SctTeamB, zero to SctTeamC and five helicopters to Transport Team.
Thus, as we can see, each leaf node in the role allocation space is a complete, valid role
allocation of agents to roles in the organization hierarchy.
In order to determine if one leaf node (role allocation) is superior to another we evaluate
each using the RMTDP by constructing an RMTDP policy for each.
In this particular
example, the role allocation specified by the leaf node corresponds to the role-taking actions
that each agent will execute at time t = 0. For example, in the case of the leftmost leaf in
Figure 9, at time t = 0, one agent (recall from Section 2.2 that this is a homogeneous team
and hence which specific agent does not matter) will become a member of SctTeamA while
all other agents will become members of Transport Team. Thus, for one agent i, the role-
taking policy will include πiΥ(null) = joinSctT eamA and for all other agents, j, j 6= i, it
will include πjΥ(null) = joinT ransportT eam. In this case, we assume that the rest of the
role-taking policy, i.e. how roles will be reallocated if a scout fails, is obtained from the role
reallocation algorithm in the BDI/TOP interpreter, such as the STEAM algorithm (Tambe
et al., 2000). Thus for example, if the role reallocation is indeed performed by the STEAM
algorithm, then STEAM's reallocation policy is included into the incomplete policy that
the RMTDP is initially provided. Thus, the best role allocation is computed keeping in
mind STEAM's reallocation policy. In STEAM, given a failure of an agent playing RoleF ,
an agent playing RoleR will replace it if:
Criticality (RoleF ) − Criticality (RoleR) > 0
Criticality (x) = 1 if x is critical; = 0 otherwise
Thus, if based on the agents' observations, a critical failure has taken place, then the
replacing agent's decision to replace or not will be computed using the above expression
and then included in the incomplete policy input to the RMTDP. Since such an incomplete
policy is completed by the role allocation at each leaf node using the technique above, we
have been able to construct a policy for the RMTDP that corresponds to the role allocation.
In some domains like RoboCupRescue, not all allocation decisions are made at time
t = 0. In such domains, it is possible for the role allocation to be conditioned on observations
(or communication) that are obtained during the course of the execution. For instance, as
shown in Figure 8(a), in the RoboCupRescue scenario, the ambulances are allocated to the
sub-team AmbulanceTeamA or AmbulanceTeamB only after information about the location
387
Nair & Tambe
6
[0]
6
6
0
6
5
1
[4167]
6
2
4
[3420]
6
3
3
[2773]
6
4
2
[1926]
6
5
1
[1179]
6
6
0
[432]
6
1
5
001
613.81
1500.12
6
5
1
100
6
4
2
011
1359.57
6
4
2
200
2926.08
Figure 9: Partially expanded role allocation space for mission rehearsal domain(six helos).
of civilians is conveyed to them by the fire engines. The allocation of the ambulances is
then conditioned on this communication, i.e. on the number of civilians at each location.
Figure 10 shows the partially expanded role allocation for a scaled-down rescue scenario
with three civilians, two ambulances and two fire engines (one at station 1 and the other at
station 2). In the Figure, 1;1;2 depicts the fact that there are two ambulances, while there
is one fire engine at each station. As shown, there is a level for the allocation of fire engines
to EngineTeamA and EngineTeamB which gives the number of engines assigned to each
EngineTeam from each station. The next level (leaf level) has different leaf nodes for each
possible assignment of ambulances to AmbulanceTeamA and AmbulanceTeamB depending
upon the value of communication "c". Since there are three civilians and we exclude the
case where no civilians are present at a particular fire, there are two possible messages i.e.
one civilian at fire 1 or two civilians at fire 1 (c = 1 or 2).
TaskForce=1;1;2
1;1;2
1;1;2
EngineTeamA=0;1 EngineTeamB=1;0 AmbTeam=2
EngineTeamA=1;0 EngineTeamB=0;1 AmbTeam=2
1;1;2
0;1 1;0 2
c=1
c=2
1;1;2
0;1 1;0 2
c=1
c=2
AmbTeamA=2 AmbTeamB=0
AmbTeamA=1 AmbTeamB=1
AmbTeamA=1 AmbTeamB=1
AmbTeamA=1 AmbTeamB=1
Figure 10: Partially expanded role allocation space for Rescue domain (one fire engine at
station 1, one fire engine at station 2, two ambulances, three civilians).
We are thus able to exploit the TOP organization hierarchy to create a hierarchical
grouping of RMTDP policies.
In particular, while the leaf node represents a complete
RMTDP policy (with the role allocation as specified by the leaf node), a parent node
represents a group of policies. Evaluating a policy specified by a leaf node is equivalent to
evaluating a specific role allocation while taking future uncertainties into account. We could
388
Hybrid BDI-POMDP Framework for Multiagent Teaming
do a brute force search through all role allocations, evaluating each in order to determine
the best role allocation. However, the number of possible role allocations is exponential in
the leaf roles in the organization hierarchy. Thus, we must prune the search space.
5.2 Pruning the Role Allocation Space
We prune the space of valid role allocations using upper bounds (MaxEstimates) for the
parents of the leaves of the role allocation space as admissible heuristics (Section 5.3). Each
leaf in the role allocation space represents a completely specified policy and the MaxEsti-
mate is an upper bound of maximum value of all the policies under the same parent node
evaluated using the RMTDP. Once we obtain MaxEstimates for all the parent nodes (shown
in brackets to the right of each parent node in Figure 9), we use branch-and-bound style
pruning (see Algorithm 2). While we discuss Algorithm 2 below, we note that in essence
it performs branch-and-bound style pruning; the key novelty is step 2 which we discuss in
Section 5.3.
The branch-and-bound algorithm works as follows: First, we sort the parent nodes by
their estimates and then start evaluating children of the parent with the highest MaxEsti-
mate (Algorithm 2: steps 3-13). Evaluate(RMTDP, child) refers to the evaluation of the
leaf-level policy, child, using the RMTDP model. This evaluation of leaf-level policies (step
13) can be done using either of the methods described in Section 4.
In the case of the
role allocation space in Figure 9, we would start with evaluating the leaves of the parent
node that has one helicopter in Scouting Team and five in Transport Team. The value of
evaluating each leaf node is shown to the right of the leaf node. Once we have obtained
the value of the best leaf node (Algorithm 2: steps 14,15), in this case 1500.12, we compare
this with the MaxEstimates of the other parents of the role allocation space (Algorithm 2:
steps 16-18). As we can see from Figure 9 this would result in pruning of three parent nodes
(leftmost parent and right two parents) and avoid the evaluation of 65 of the 84 leaf-level
policies. Next, we would then proceed to evaluate all the leaf nodes under the parent with
two helos in Scouting Team and four in Transport Team. This would result in pruning of all
the remaining unexpanded parent nodes and we will return the leaf with the highest value,
which in this case is the node corresponding to two helos allocated to SctTeamA and four
to Transport Team. Although demonstrated for a 3-level hierarchy, the methodology for
applying to deeper hierarchies is straightforward.
5.3 Exploiting TOP to Calculate Upper Bounds for Parents
We will now discuss how the upper bounds of parents, called MaxEstimates, can be calcu-
lated for each parent. The MaxEstimate of a parent is defined as a strict upper bound of
the maximum of the expected reward of all the leaf nodes under it. It is necessary that the
MaxEstimate be an upper bound or else we might end up pruning potentially useful role
allocations. In order to calculate the MaxEstimate of each parent we could evaluate each of
the leaf nodes below it using the RMTDP, but this would nullify the benefit of any subse-
quent pruning. We, therefore, turn to the TOP plan hierarchy (see Figure 4(b)) to break up
this evaluation of the parent node into components, which can be evaluated separately thus
decomposing the problem. In other words, our approach exploits the structure of the BDI
program to construct small-scale RMTDPs unlike other decomposition techniques which
389
Nair & Tambe
Algorithm 2 Branch-and-bound algorithm for policy search.
1: Parents ← list of parent nodes
2: Compute MAXEXP(Parents) {Algorithm 3}
3: Sort Parents in decreasing order of MAXEXP
4: bestVal ← −∞
5: for all parent ∈ Parents do
6:
7: for all parent ∈ Parents do
8:
done[parent] ← false; pruned[parent] ← false
if done[parent] = false and pruned[parent] = false then
9:
10:
11:
12:
13:
14:
15:
16:
17:
child ← parent→nextChild() {child is a leaf-level policy under parent}
if child = null then
done[parent] ← true
else
childVal ← Evaluate(RMTDP,child)
if childVal > bestVal then
bestVal ← childVal;best ← child
for all parent1 in Parents do
if MAXEXP[parent1] < bestVal then
18:
19: return best
pruned[parent1] ← true
just assume decomposition or ultimately rely on domain experts to identify interactions in
the agents' reward and transition functions (Dean & Lin, 1995; Guestrin, Venkataraman,
& Koller, 2002).
For each parent in the role allocation space, we use these small-scale RMTDPs to eval-
uate the values for each TOP component. Fortunately, as discussed in Section 4.1, we
exploited small-scale RMTDPs corresponding to TOP components in constructing larger
scale RMTDPs. We put these small-scale RMTDPs to use again, evaluating policies within
each component to obtain upper bounds. Note that just like in evaluation of leaf-level
policies, the evaluation of components for the parent node can be done using either the
observation histories (see Equation 1) or belief states (see Equation 2). We will describe
this section using the observation history-based evaluation method for computing the values
of the components of each parent, which can be summed up to obtain its MaxEstimate (an
upper bound on its children's values). Thus, whereas a parent in the role allocation space
represents a group of policies, the TOP components (sub-plans) allow a component-wise
evaluation of such a group to obtain an upper bound on the expected reward of any policy
within this group.
Algorithm 3 exploits the smaller-scale RMTDP components, discussed in Section 4.1,
to obtain upper bounds of parents. First, in order to evaluate the MaxEstimate for each
parent node in the role allocation space, we identify the start states for each component from
which to evaluate the RMTDPs. We explain this step using a parent node from Figure 9 –
Scouting Team = two helos, Transport Team = four helos (see Figure 11). For the very first
component which does not have any preceding components, the start states corresponds
to the start states of the policy that the TOP was mapped onto. For each of the next
390
Hybrid BDI-POMDP Framework for Multiagent Teaming
components – where the next component is one linked by a sequential dependence – the
start states are the end states of the preceding component. However, as explained later in
this section, we can significantly reduce this list of start states from which each component
can be evaluated.
Algorithm 3 MAXEXP method for calculating upper bounds for parents in the role allo-
cation space.
1: for all parent in search space do
2: MAXEXP[parent] ← 0
3:
for all component i corresponding to factors in the RMTDP from Section 4.1 do
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
if component i has a preceding component j then
Obtain start states, states[i] ← endStates[j]
states[i] ← removeIrrelevantFeatures(states[i]) {discard features not present
in Si}
Obtain corresponding observation histories at
endOHistories[j]
OHistories[i] ← removeIrrelevantObservations(OHistories[i])
start OHistories[i] ←
else
Obtain start states, states[i]
Observation histories at start OHistories[i] ← null
maxEval[i] ← 0
for all leaf-level policies π under parent do
maxEval[i] ← max(maxEval[i], maxsi∈states[i],ohi∈OHistories[i](Evaluate(RM T DPi,
si, ohi, π)))
15: MAXEXP[parent]
+← maxEval[i]
Similarly, the starting observation histories for a component are the observation his-
tories on completing the preceding component (no observation history for the very first
component). BDI plans do not normally refer to entire observation histories but rely only
on key beliefs which are typically referred to in the pre-conditions of the component. Each
starting observation history can be shortened to include only these relevant observations,
thus obtaining a reduced list of starting observation sequences. Divergence of private ob-
servations is not problematic, e.g. will not cause agents to trigger different team plans.
This is because as indicated earlier in Section 2.2, TOP interpreters guarantee coherence
in key aspects of observation histories. For instance, as discussed earlier, TOP interpreter
ensures coherence in key beliefs when initiating and terminating team plans in a TOP; thus
avoiding such divergence of observation histories.
In order to compute the maximum value for a particular component, we evaluate all
possible leaf-level policies within that component over all possible start states and observa-
tion histories and obtain the maximum (Algorithm 3:steps 13-14). During this evaluation,
we store all the end states and ending observation histories so that they can be used in
the evaluation of subsequent components. As shown in Figure 11, for the evaluation of
DoScouting component for the parent node where there are two helicopters assigned to
Scouting Team and four helos to Transport Team, the leaf-level policies correspond to all
possible ways these helicopters could be assigned to the teams SctTeamA, SctTeamB, Sct-
391
Nair & Tambe
TeamC and Transport Team, e.g. one helo to SctTeamB, one helo to SctTeamC and four
helos to Transport Team, or two helos to SctTeamA and four helos to Transport Team, etc.
The role allocation tells the agents what role to take in the first step. The remainder of the
role-taking policy is specified by the role replacement policy in the TOP infrastructure and
role-execution policy is specified by the DoScouting component of the TOP.
To obtain the MaxEstimate for a parent node of the role allocation space, we simply
sum up the maximum values obtained for each component (Algorithm 3:steps 15), e.g.
the maximum values of each component (see right of each component in Figure 11) were
summed to obtain the MaxEstimate (84 + 3330 + 36 = 3420). As seen in Figure 9, third
node from the left indeed has an upper bound of 3420.
The calculation of the MaxEstimate for a parent nodes should be much faster than
evaluating the leaf nodes below it in most cases for two reasons. Firstly, parent nodes are
evaluated component-wise. Thus, if multiple leaf-level policies within one component result
in the same end state, we can remove duplicates to get the start states of the next compo-
nent. Since each component only contains the state features relevant to it, the number of
duplicates is greatly increased. Such duplication of the evaluation effort cannot be avoided
for leaf nodes, where each policy is evaluated independently from start to finish. For in-
stance, in the DoScouting component, the role allocations, SctTeamA=1, SctTeamB=1,
SctTeamC=0, TransportTeam=4 and SctTeamA=1, SctTeamB=0, SctTeamC=1, Trans-
portTeam=4, will have end states in common after eliminating irrelevant features when the
scout in SctTeamB for the former allocation and the scout in SctTeamC for the latter al-
location fail. This is because through feature elimination (Algorithm 3:steps 6), the only
state features retained for DoTransport are the scouted route and number of transports
(some transports may have replaced failed scouts) as shown in Figure 11.
The second reason computation of MaxEstimates for parents is much faster is that the
number of starting observation sequences will be much less than the number of ending ob-
servation histories of the preceding components. This is because not all the observations in
the observation histories of a component are relevant to its succeeding components (Algo-
rithm 3:steps 8). Thus, the function removeIrrelevantObservations reduces the number
of starting observation histories from the observation histories of the preceding component.
We refer to this methodology of obtaining the MaxEstimates of each parent as MAX-
EXP. A variation of this, the maximum expected reward with no failures (NOFAIL), is
obtained in a similar fashion except that we assume that the probability of any agent fail-
ing is 0. We are able to make such an assumption in evaluating the parent node, since we
focus on obtaining upper bounds of parents, and not on obtaining their exact value. This
will result in less branching and hence evaluation of each component will proceed much
quicker. The NOFAIL heuristic only works if the evaluation of any policy without failures
occurring is higher than the evaluation of the same policy with failures possible. This should
normally be the case in most domains. The evaluation of the NOFAIL heuristics for the
role allocation space for six helicopters is shown in square brackets in Figure 9.
The following theorem shows that the MAXEXP method for finding the upper bounds
indeed finds an upper bound and thus yields an admissible search heuristic for the branch-
and-bound search of the role allocation space.
Theorem 3 The MAXEXP method will always yield an upper bound.
392
Hybrid BDI-POMDP Framework for Multiagent Teaming
DoScouting
DoTransport
[ScoutingTeam=2,TransportTeam=4]
[TransportTeam=4]
RemainingScouts
[ScoutTeam=2]
[84]
[3300]
[36]
Alloc:
SctTeamA=2
SctTeamB=0
SctTeamC=0
Alloc:
SctTeamA=0
SctTeamB=1
SctTeamC=1
TransportTeam=4
TransportTeam=4
StartState:
StartState:
RouteScouted=1
RouteScouted=1
Transports=4
Transports=3
StartState:
RouteScouted=1
Transports=0
Figure 11: Component-wise decomposition of a parent by exploiting TOP.
Proof: See Appendix C.
From Theorem 3, we can conclude that our branch-and-bound policy search algorithm
will always find the best role allocation, since the MaxEstimates of the parents are true
upper bounds. Also, with the help of Theorem 4, we show that in the worst case, our
branch-and-bound policy search has the same complexity as doing a brute force search.
Theorem 4 Worst-case complexity for evaluating a single parent node using MAXEXP is
the same as that of evaluating every leaf node below it within a constant factor.
Proof sketch:
• The worst case complexity for MAXEXP arises when:
1. Let ESjπ be the end states of component j executing policy π after removing
features that are irrelevant to the succeeding component k. Similarly, let ESjπ′
be the end states of component j executing policy π′ after removing features that
are irrelevant to the succeeding component k. If ESjπT ESjπ′ = null then no
duplication in the end states will occur.
2. Let OHjπ be the ending observation histories of component j executing policy
π after removing observations that are irrelevant to the succeeding component
k. Similarly, let OHjπ′ be the ending observation histories of component j ex-
ecuting policy π′ after removing observation histories that are irrelevant to the
succeeding component k. If OHjπT OHjπ′ = null then no duplication in the
observation histories will occur. Note that if the belief-based evaluation was used
then we would replace observation histories by the TOP congruent belief states
(see Sect 4).
• In such a case, there is no computational advantage to evaluating each component's
MaxEstimate separately. Thus, it is equivalent to evaluating each child node of the
parent. Thus, in the worst case, MAXEXP computation for the parent is the same as
the evaluating all its children within a constant factor. (cid:3)
In addition, in the worst case, no pruning will result using MAXEXP and each and every
leaf node will need to be evaluated. This is equivalent to evaluating each leaf node twice.
393
Nair & Tambe
Thus, the worst case complexity of doing the branch-and-bound search using MAXEXP is
the same as that of finding the best role allocation by evaluating every leaf node. We refer
to this brute-force approach as NOPRUNE. Thus, the worst case complexity of MAXEXP
is the same as NOPRUNE. However, owing to pruning and the savings through decom-
position in the computation of MaxEstimates, significant savings are likely in the average
case. Section 6 highlights these savings for the mission rehearsal and the RoboCupRescue
domains.
6. Experimental Results
This section presents four sets of results in the context of the two domains introduced
in Section 2.1, viz. mission rehearsal and RoboCupRescue (Kitano et al., 1999). First,
we investigated empirically the speedups that result from using the TOP-congruent belief
states ψi (belief-based evaluation) over observation history-based evaluation and from using
the algorithm from Section 5 over a brute-force search. Here we focus on determining
the best assignment of agents to roles; but assume a fixed TOP and TOP infrastructure.
Second, we conducted experiments to investigate the benefits of considering uncertainty in
determining role allocations. For this, we compared the allocations found by the RMTDP
role allocation algorithm with (i) allocations which do not consider any kind of uncertainty,
and (ii) allocations which do not consider observational uncertainty but consider action
uncertainty. Third, we conducted experiments in both domains to determine the sensitivity
of the results to changes in the model. Fourth, we compare the performance of allocations
found by the RMTDP role allocation algorithm with allocations of human subjects in the
more complex of our domains – RoboCupRescue simulations.
6.1 Results in Mission Rehearsal Domain
For the mission rehearsal domain, the TOP is the one discussed in Section 2.2. As can be
seen in Figure 4(a), the organization hierarchy requires determining the number of agents
to be allocated to the three scouting sub-teams and the remaining helos must be allocated
to the transport sub-team. Different numbers of initial helicopters were attempted, varying
from three to ten. The details on how the RMTDP is constructed for this domain are given
Appendix B. The probability of failure of a scout at each time step on routes 1, 2 and 3
are 0.1, 0.15 and 0.2, respectively. The probability of a transport observing an alive scout
on routes 1, 2 and 3 are 0.95, 0.94 and 0.93, respectively. False positives are not possible,
i.e. a transport will not observe a scout as being alive if it has failed. The probability of a
transport observing a scout failure on routes 1, 2 and 3 are 0.98, 0.97 and 0.96, respectively.
Here too, false positives are not possible and hence a transport will not observe a failure
unless it has actually taken place.
Figure 12 shows the results of comparing the different methods for searching the role
allocation space. We show four methods. Each method adds new speedup techniques to
the previous:
1. NOPRUNE-OBS: A brute force evaluation of every role allocation to determine the
best. Here, each agent maintains its complete observation history and the evaluation
algorithm in Equation 1 is used. For ten agents, the RMTDP is projected to have in
394
Hybrid BDI-POMDP Framework for Multiagent Teaming
the order of 10,000 reachable states and in the order of 100,000 observation histories
per role allocation evaluated (thus the largest experiment in this category was limited
to seven agents).
2. NOPRUNE-BEL: A brute force evaluation of every role allocation. The only difference
between this method and NOPRUNE-OBS is the use of the belief-based evaluation
algorithm (see Equation 2).
3. MAXEXP: The branch-and-bound search algorithm described in Section 5.2 that
uses upper bounds of the evaluation of the parent nodes to find the best allocation.
Evaluation of the parent and leaf nodes uses the belief-based evaluation.
4. NOFAIL: The modification to branch-and-bound heuristic mentioned in Section 5.3.
In essence it is same as MAXEXP, except that the upper bounds are computed making
the assumption that agents do not fail. This heuristic is correct in those domains where
the total expected reward with failures is always less than if no failures were present
and will give significant speedups if agent failures is one of the primary sources of
stochasticity. In this method, too, the evaluation of the parent and leaf nodes uses
the belief-based evaluation. (Note that only upper bounds are computed using the
no-failure assumption – no changes are assumed in the actual domains.)
In Figure 12(a), the Y-axis is the number of nodes in the role allocation space evaluated
(includes leaf nodes as well as parent nodes), while in Figure 12(b) the Y-axis represents
the runtime in seconds on a logarithmic scale. In both figures, we vary the number of agents
on the X-axis. Experimental results in previous work using distributed POMDPs are often
restricted to just two agents; by exploiting hybrid models, we are able to vary the number of
agents from three to ten as shown in Figure 12(a). As clearly seen in Figure 12(a), because
of pruning, significant reductions are obtained by MAXEXP and NOFAIL over NOPRUNE-
BEL in terms of the numbers of nodes evaluated. This reduction grows quadratically to
about 10-fold at ten agents.3 NOPRUNE-OBS is identical to NOPRUNE-BEL in terms of
number of nodes evaluated, since in both methods all the leaf-level policies are evaluated,
only the method of evaluation differs. It is important to note that although NOFAIL and
MAXEXP result in the same number of nodes being evaluated for this domains, this is
not necessarily true always. In general, NOFAIL will evaluate at least as many nodes as
MAXEXP since its estimate is at least as high as the MAXEXP estimate. However, the
upper bounds are computed quicker for NOFAIL.
Figure 12(b) shows that the NOPRUNE-BEL method provides a significant speedup
over NOPRUNE-OBS in actual run-time. For instance, there was a 12-fold speedup using
NOPRUNE-BEL instead of NOPRUNE-OBS for the seven agent case (NOPRUNE-OBS
could not be executed within a day for problem settings with greater than seven agents).
This empirically demonstrates the computational savings possible using belief-based eval-
uation instead of observation history-based evaluation (see Section 4). For this reason, we
use only belief-based evaluation for the MAXEXP and NOFAIL approaches and also for all
3. The number of nodes for NOPRUNE up to eight agents were obtained from experiments, the rest can
be calculated using the formula [m]n/n! = (m + n − 1) · . . . · m/n!, where m represents the number of
[m]n = (m + n − 1) · . . . · m is
heterogeneous role types and n is the number of homogeneous agents.
referred to as a rising factorial.
395
Nair & Tambe
the remaining experiments in this paper. MAXEXP heuristic results in a 16-fold speedup
over NOPRUNE-BEL in the eight agent case.
The NOFAIL heuristic which is very quick to compute the upper bounds far outperforms
the MAXEXP heuristic (47-fold speedup over MAXEXP for ten agents). Speedups of
MAXEXP and NOFAIL continually increase with increasing number of agents. The speedup
of the NOFAIL method over MAXEXP is so marked because, in this domain, ignoring
failures results in much less branching.
350
300
250
200
150
100
50
s
e
d
o
n
f
o
r
e
b
m
u
N
0
3
4
100000
10000
1000
100
10
1
0.1
)
e
l
a
c
s
g
o
l
(
s
c
e
s
n
i
e
m
T
i
0.01
3
4
6
5
8
Number of agents
7
6
5
8
Number of agents
7
NOFAIL, MAXEXP
NOPRUNE-OBS,
NOPRUNE-BEL
MAXEXP
NOFAIL
NOPRUNE-BEL
NOPRUNE-OBS
9
10
9
10
Figure 12: Performance of role allocation space search in mission rehearsal domain, a) (left)
Number of nodes evaluated, b) (right)Run-time in seconds on a log scale.
Next, we conducted experiments illustrating the importance of RMTDP's reasoning
about action and observation uncertainties on role allocations. For this, we compared the
allocations found by the RMTDP role allocation algorithm with allocations found using two
different methods (see Figure 13):
1. Role allocation via constraint optimization (COP) (Modi et al., 2003; Mailler & Lesser,
2004) allocation approach: In the COP approach4, leaf-level sub-teams from the or-
4. Modi et al.'s work (2003) focused on decentralized COP, but in this investigation our emphasis is on the
resulting role allocation generated by the COP, and not on the decentralization per se.
396
Hybrid BDI-POMDP Framework for Multiagent Teaming
ganization hierarchy are treated as variables and the number of helicopters as the
domain of each such variable (thus, the domain may be 1, 2, 3,..helicopters). The
reward for allocating agents to sub-teams is expressed in terms of constraints:
• Allocating a helicopter to scout a route was assigned a reward corresponding to
the route's distance but ignoring the possibility of failure (i.e. ignoring transition
probability). Allocating more helicopters to this subteam obtained proportion-
ally higher reward.
• Allocating a helicopter a transport role was assigned a large reward for trans-
porting cargo to the destination. Allocating more helicopters to this subteam
obtained proportionally higher reward.
• Not allocating at least one scout role was assigned a reward of negative infinity
• Exceeding the total number of agents was assigned a reward of negative infinity
2. RMTDP with complete observability: In this approach, we consider the transition
probability, but ignore partial observability; achieved by assuming complete observ-
ability in the RMTDP. An MTDP with complete observability is equivalent to a
Markov Decision Problem (MDP) (Pynadath & Tambe, 2002) where the actions are
joint actions. We, thus, refer to this allocation method as the MDP method.
Figure 13(a) shows a comparison of the RMTDP-based allocation with the MDP allo-
cation and the COP allocation for increasing number of helicopters (X-axis). We compare
using the expected number of transports that get to the destination (Y-axis) as the metric
for comparison since this was the primary objective of this domain. As can be seen, consid-
ering both forms of uncertainty (RMTDP) performs better than just considering transition
uncertainty (MDP) which in turn performs better than not considering uncertainty (COP).
Figure 13(b) shows the actual allocations found by the three methods with four helicopters
and with six helicopters. In the case of four helicopters (first three bars), RMTDP and MDP
are identical, two helicopters scouting route 2 and two helicopters taking on transport role.
The COP allocation however consists of one scout on route 3 and three transports. This
allocation proves to be too myopic and results in fewer transports getting to the destination
safely.
In the case of six helicopters, COP chooses just one scout helicopter on route 3,
the shortest route. The MDP approach results in two scouts both on route 1, which was
longest route albeit the safest. The RMTDP approach, which also considers observational
uncertainty chooses an additional scout on route 2, in order to take care of the cases where
failures of scouts go undetected by the transports.
It should be noted that the performance of the RMTDP-based allocation will depend
on the values of the elements of the RMTDP model. However, as our next experiment
revealed, getting the values exactly correct is not necessary. In order to test the sensitivity
of the performance of the allocations to the actual model values, we introduced error in the
various parameters of the model to see how the allocations found using the incorrect model
would perform in the original model (without any errors). This emulates the situation where
the model does not correctly represent the domain. Figure 14 shows the expected number
of transports that reach the destination (Y-axis) in the mission rehearsal scenario with six
helicopters as error (X-axis) is introduced to various parameters in the model. For instance,
397
Nair & Tambe
RMTDP
COP
MDP
5
6
7
8
Number of agents
4 helos
6 helos
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
M T D P
R
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxxxxxx
xxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
D P
M
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
xxxxxxxxx
O P
C
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
M T D P
R
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
D P
M
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
xxxxxxxxxx
O P
C
xxxx
xxxx
xxxx
xxxx
Rt3
xxxx Rt2
xxxRt1
xxxx Transports
xxx
xxx
xxxx
xxxx
xxxx
xxxx
s
t
r
o
p
s
n
a
r
t
f
o
r
e
b
m
u
N
7
6
5
4
3
2
1
0
l
s
o
e
h
f
o
r
e
b
m
u
N
4
7
6
5
4
3
2
1
0
Figure 13: a) Comparison of performance of different allocation methods, b)Allocations
found using different allocation methods.
398
Hybrid BDI-POMDP Framework for Multiagent Teaming
when the percentage error in failure rate on route 1 (route1-failure-rate) was between -15%
(i.e. erroneous failure rate is 85% of actual failure rate) and 10%, there was no difference
in the number of transports that reached their destination (3.498). However when the
percentage error was greater than 10%, the allocation found was too conservative resulting
in fewer transports getting to the destination. Similarly, when the percentage error was less
than -15%, the allocation found was too risky, with too few scouts assigned, resulting in
more failures. In general, Figure 14 shows that the model is insensitive to errors of 5 to 10%
in the model parameters for the mission rehearsal domain, but if the model parameters were
outside this range, non-optimal allocations would result. In comparing these non-optimal
allocations with COP, we find that they always perform better than COP for the range of
errors tested (+/-25%) for both failure rate as well as observability of routes. For instance,
at an error of 25% in failure rate on route 1, RMTDP managed to have 2.554 transports
safely reach the destination, and COP only managed to get 1.997 transports reach safely. In
comparing the non-optimal allocations with MDP, we also find that they performed better
than MDP within the range of +/- 25% for error in the observability of the routes. Thus,
although the allocations found using an incorrect model were non-optimal they performed
better than COP and MDP for large ranges of errors in the model. This shows that getting
the model exactly correct is not necessary to find good allocations. We are thus able to
obtain benefits from RMTDP even without insisting on an accurate model.
route1-failure-rate
route-2-failure-rate
route3-failure-rate
route1-observability
4
3.5
3
2.5
2
1.5
1
0.5
0
s
t
r
o
p
s
n
a
r
T
f
o
r
e
b
m
u
N
-25 -20 -15 -10 -5
0
5
10 15 20 25
Percentage error
Figure 14: Model sensitivity in mission rehearsal domain.
6.2 Results in RoboCupRescue Domain
6.2.1 Speedups in RoboCupRescue Domain
In our next set of experiments, we highlight the computational savings obtained in the
RoboCupRescue domain. The scenario for this experiment consisted of two fires at different
locations in the city. Each of these fires has a different initially unknown number of civilians
in it, however the total number of civilians and the distribution from which the locations
of the civilians is chosen is known ahead of time. For this experiment, we fix the number of
civilians at five and set the distribution used to choose the civilians' locations to be uniform.
The number of fire engines is set at five, located in three different fire stations as described
399
Nair & Tambe
in Section 2.1 and vary the number of ambulances, all co-located at an ambulance center,
from two to seven. The reason we chose to change only the number of ambulances is because
small number of fire engines are unable to extinguish fires, changing the problem completely.
The goal is to determine which fire engines to allocate to which fire and once information
about civilians is transmitted, how many ambulances to send to each fire location.
Figure 15 highlights the savings in terms of the number of nodes evaluated and the actual
runtime as we increase the number of agents. We show results only from NOPRUNE-BEL
and MAXEXP. NOPRUNE-OBS could not be run because of slowness. Here the NOFAIL
heuristic is identical to MAXEXP since agents cannot fail in this scenario. The RMTDP
in this case had about 30,000 reachable states.
In both Figures 15(a) and 15(b), we increase the number of ambulances along the X-
axis. In Figure 15(a), we show the number of nodes evaluated (parent nodes + leaf nodes)5
on a logarithmic scale. As can be seen, the MAXEXP method results in about a 89-fold
decrease in the number of nodes evaluated when compared to NOPRUNE-BEL for seven
ambulances, and this decrease becomes more pronounced as the number of ambulances is
increased. Figure 15(b) shows the time in seconds on a logarithmic scale on the Y-axis and
compares the run-times of the MAXEXP and NOPRUNE-BEL methods for finding the best
role allocation. The NOPRUNE-BEL method could not find the best allocation within a
day when the number of ambulances was increased beyond four. For four ambulances (and
five fire engines), MAXEXP resulted in about a 29-fold speedup over NOPRUNE-BEL.
6.2.2 Allocation in RoboCupRescue
Our next set of experiments shows the practical utility of our role allocation analysis in
complex domains. We are able to show significant performance improvements in the actual
RoboCupRescue domain using the role allocations generated by our analysis. First, we
construct an RMTDP for the rescue scenario, described in Section 2.1, by taking guidance
from the TOP and the underlying domain (as described in Section 4.1). We then use
the MAXEXP heuristic to determine the best role allocation. We compared the RMTDP
allocation with the allocations chosen by human subjects. Our goal in comparing RMTDP
allocations with human subjects was mainly to show that RMTDP is capable at performing
at or near human expert levels for this domain. In addition, in order to determine that
reasoning about uncertainty actually impacts the allocations, we compared the RMTDP
allocations with allocations determined by two additional allocation methods:
1. RescueISI: Allocations used by the our RoboCupRescue agents that were entered in
the RoboCupRescue competitions of 2001(RescueISI) (Nair et al., 2002), where they
finished in third place. These agents used local reasoning for their decision making,
ignoring transitional as well and observational uncertainty.
2. RMTDP with complete observability: As discussed earlier, complete observability in
RMTDP leads to an MDP, and we refer to this method as the MDP method.
5. The number of nodes evaluated using NOPRUNE-BEL can be computed as (f1 + 1) · (f2 + 1) · (f3 + 1) ·
(a + 1)c+1, where f1, f2 and f3 are the number of fire engines are station 1, 2 and 3, respectively, a is
the number of ambulances and c is the number of civilians. Each node provides a complete conditional
role allocation, assuming different numbers of civilians at each fire station.
400
Hybrid BDI-POMDP Framework for Multiagent Teaming
)
e
l
a
c
s
g
o
l
(
s
e
d
o
n
f
o
r
e
b
m
u
N
10000000
1000000
100000
10000
1000
100
10
1
2
100000
10000
1000
100
10
)
e
l
a
c
s
g
o
l
(
s
c
e
s
n
i
e
m
i
t
n
u
R
1
2
3
MAXEXP
NOPRUNE
7
MAXEXP
NOPRUNE
4
3
6
Number of ambulances
5
4
Number of ambulances
5
6
7
Figure 15: Performance of role allocation space search in RoboCupRescue, a: (left) Number
of nodes evaluated on a log scale, and b: (right) Run-time in seconds on a log
scale.
401
Nair & Tambe
Note that these comparisons were performed using the RoboCupRescue simulator with
multiple runs to deal with stochasticity6. The scenario is as described in Section 6.2.1. We
fix the number of fire engines, ambulances and civilians at five each. For this experiment,
we consider two settings, where the location of civilians is drawn from:
• Uniform distribution – 25% of the cases have four civilians at fire 1 and one civilian
at fire 2, 25% with three civilians at fire 1 and two at fire 2, 25% with two civilians
at fire 1 and three at fire 2 and the remaining 25% with one civilian at fire 1 and
four civilians at fire 2. The speedup results of Section 6.2.1 were obtained using this
distribution.
• Skewed distribution – 80% of the cases have four civilians at fire 1 and one civilian at
fire 2 and the remaining 20% with one civilian at fire 1 and four civilians at fire 2.
Note that we do not consider the case where all civilians are located at the same fire as
the optimal ambulance allocation is simply to assign all ambulances to the fire where the
civilians are located. A skewed distribution was chosen to highlight the cases where it
becomes difficult for humans to reason about what allocation to choose.
The three human subjects used in this experiment were researchers at USC. All three
were familiar with RoboCupRescue. They were given time to study the setup and were not
given any time limit to provide their allocations. Each subject was told that the allocations
were going to be judged first on the basis of the number of civilian lives lost and next on the
damage sustained due to fire. These are exactly the criteria used in RoboCupRescue (Kitano
et al., 1999).
We then compared "RMTDP" allocation with those of the human subjects in the
RoboCupRescue simulator and with RescueISI and MDP. In Figure 16, we compared the
performance of the allocations on the basis of the number of civilians who died and the
average damage to the two buildings (lower values are better for both criteria). These two
criteria are the main two criteria used in RoboCupRescue (Kitano et al., 1999). The val-
ues shown in Figure 16 were obtained by averaging forty simulator runs for the uniform
distribution and twenty runs for the skewed distribution for each allocation. The average
values were plotted to account for the stochasticity in the domain. Error bars are provided
to show the standard error for each allocation method.
As can be seen in Figure 16(a), the RMTDP allocation did better than the other five
allocations in terms of a lower number of civilians dead (although human3 was quite close).
For example, averaging forty runs, the RMTDP allocation resulted in 1.95 civilian deaths
while human2's allocation resulted in 2.55 civilian deaths. In terms of the average building
damage, the six allocations were almost indifferentiable, with the humans actually perform-
ing marginally better. Using the skewed distribution, the difference between the allocations
was much more perceptible (see Figure 16(b)). In particular, we notice how the RMTDP
allocation does much better than the humans in terms of the number of civilians dead. Here,
human3 did particularly badly because of a bad allocation for fire engines. This resulted in
more damage to the buildings and consequently to the number of civilians dead.
6. For the mission rehearsal domain, we could run on the actual mission rehearsal simulator since that
simulator is not public domain and no longer accessible, and hence the difference in how we tested role
allocations in the mission rehearsal and the RoboCupRescue domains.
402
Hybrid BDI-POMDP Framework for Multiagent Teaming
Comparing RMTDP with RescueISI and the MDP approach showed that reasoning
about transitional uncertainty (MDP) does better than a static reactive allocation method
(RescueISI) but not as well as reasoning about both transitional and observational uncer-
tainty. In the uniform distribution case, we found that RMTDP does better than both MDP
and RescueISI, with the MDP method performing better than RescueISI. In the skewed dis-
tribution case, the improvement in allocations using RMTDP is greater. Averaging twenty
simulation runs, RMTDP allocations resulted in 1.54 civilians deaths while MDP resulted
in 1.98 and RescueISI in 3.52. The allocation method used by RescueISI often resulted
in one of the fires being allocated too few fire engines. The allocations determined by the
MDP approach turned out to be the same as human1.
A two-tailed t-test was performed in order to test the statistical significance of the means
for the allocations in Figure 16. The means of number of civilians dead for the RMTDP
allocation and the human allocations were found to be statistically different (confidence
> 96%) for both the uniform as well as the skewed distributions. The difference in the fire
damage was not statistically significant in the uniform case, however, the difference between
the RMTDP allocation and human3 for fire damage was statistically significant (> 96%) in
the skewed case.
Civilians casualties
Building damage
M T D P
R
hu m an1
hu m an2
hu m an3
R escueISI
D P
M
Civilians casualties
Building damage
6
5
4
3
2
1
0
6
5
4
3
2
1
0
M T D P
R
hu m an1
hu m an2
hu m an3
R escueISI
D P
M
Figure 16: Comparison of performance in RoboCupRescue, a: (left) uniform, and b: (right)
skewed.
403
Nair & Tambe
Considering just the average performance of these different allocations does not highlight
the individual cases where marked differences were seen in the performance. In Figure 17, we
present the comparison of particular settings where the other allocation methods showed a
bigger difference from RMTDP in terms of their allocations. The standard error is shown in
error bars for each allocation. Figures 17(a) and 17(b) compare the allocations for uniform
civilian distributions in the setting where there was one civilian at fire 1 and four civilians at
fire 2 (1-4 civilian setting) and four civilians at fire 1 and one at fire 2 (4-1 civilian setting)
respectively. As can be seen in these figure, the RMTDP allocation results in fewer civilian
casualties but in slightly more damage to the buildings due to fire (difference in fire damage
was not statistically significant because the damage values were very close). Figures 17(c)
and 17(d) compare the allocations for the skewed civilian distribution. The key difference
arises for human3. As can be seen, human3 results in more damage due to fire. This is
because human3 allocated too few fire engines to one of the buildings, which in turn resulted
in that building being burnt down completely. Consequently, civilians located at this fire
location could not be rescued by the ambulances. Thus, we see specific instances where
the allocation done using the RMTDP-based allocation algorithm is superior to allocations
that a human comes up with.
3.5
3
2.5
2
1.5
1
0.5
0
3.5
3
2.5
2
1.5
1
0.5
0
Civilians casualties
Building damage
M T D P
R
hu m an1
hu m an2
hu m an3
D P
M
R escueISI
Civilians casualties
Building damage
M T D P
R
hu m an1
hu m an2
hu m an3
D P
M
R escueISI
Civilians casualties
Building damage
Civilians casualties
Building damage
4.5
4
3.5
3
2.5
2
1.5
1
0.5
0
4.5
4
3.5
3
2.5
2
1.5
1
0.5
0
M T D P
R
hu m an1
hu m an2
hu m an3
D P
M
R escueISI
M T D P
R
hu m an1
hu m an2
hu m an3
D P
M
R escueISI
Figure 17: Comparison of performance in RoboCupRescue for particular settings, a: (top-
left) uniform 1-4 civilian setting b:(top-right) uniform 4-1 civilian setting, c:
(bottom-left) skewed 1-4 civilian setting d:(bottom-right) skewed 4-1 civilian
setting.
404
Hybrid BDI-POMDP Framework for Multiagent Teaming
Table 1 shows the allocations to fire 1 (agents not assigned to fire 1 are allocated to fire
2) found by the RMTDP role allocation algorithm and those used by the human subjects for
the skewed 4-1 civilian setting (we consider this case since it shows the most difference). In
particular, this table highlights the differences between the various allocators for the skewed
4-1 civilian setting and helps account for the differences seen in their performance in the
actual simulator. As can be seen from Figure 17(d), the main difference in performance
was in terms of the number of civilians saved. Recall that in this scenario, there are four
civilians at fire 1, and one at fire 2. Here all the human subjects and MDP chose to
send only one ambulance to fire 2 (number of ambulances allocated to f ire 2 = 5 −
number of ambulances allocated to f ire 1). This lone ambulance was unable to rescue the
civilian at fire 1, resulting in the humans and MDP saving fewer civilians. RescueISI chose to
send all the ambulances to fire 2 using a greedy selection method based on proximity to the
civilians resulting in all the civilians at fire 1 dying7. In terms of the fire engine allocation,
human3 sent in four fire engines to fire 1 where more civilians were likely to be located
(number of engines allocated to f ire 2 = 5 − number of engines allocated to f ire 1).
Unfortunately, this backfired since the lone fire engine at fire 2 was not able to extinguish
the fire there, causing the fire to spread to other parts of the city.
Distribution
Skewed 4-1
RMTDP human1
human2
human3 RescueISI MDP
Engines from station 1
Engines from station 2
Engines from station 3
Ambulances
0
1
1
3
2
1
0
4
2
1
0
4
1
1
2
4
2
1
0
0
2
1
0
4
Table 1: Allocations of ambulances and fire engines to fire 1.
These experiments show that the allocations found by the RMTDP role allocation algo-
rithm performs significantly better than allocations chosen by human subjects and RescueISI
and MDP in most cases (and does not do significantly worse in any case). In particular
when the distribution of civilians is not uniform, it is more difficult for humans to come up
with an allocation and the difference between human allocations and the RMTDP allocation
becomes more significant. From this we can conclude that the RMTDP allocation performs
at near-human expertise.
In our last experiment done using the RoboCupRescue simulator, we introduced error
in the RMTDP model in order to determine how sensitive the model was to errors in the
parameters of the model. Figure 18 compares the allocations found, when there were five
ambulances, 5 fire engines and 5 civilians, in terms of the number of civilian casualties (Y-
axis) when error (X-axis) was introduced to the probability of fire spread and the probability
of civilian health deterioration. As can be seen increasing the error in the probability of fire
spread to 20% and higher results in allocations that save fewer civilians as the fire brigades
choose to concentrate their effort on only one of the fires. The resulting allocation was
found to have the same value in terms of the number of civilians casualties as that used by
RescueISI, which did not consider any uncertainty. Reducing the error in the probability of
fire did not have an impact on the allocations found. Increasing the error in probability of
7. This strategy of ambulances going to the closest civilian worked fairly well because the ambulances were
usually well spread out
405
Nair & Tambe
civilian health deterioration to 15% and higher caused some civilians to be sacrificed. This
allocation was found to have the same value in terms of the number of civilians casualties as
that used by RescueISI. Decreasing the error in probability of civilian health deterioration
-5% and lower (more negative) caused the number of ambulances to be allocated to a fire
to be the same as the number of civilians at that fire (same as human1).
s
e
i
t
l
a
u
s
a
c
n
a
i
l
i
v
i
C
3
2.5
2
1.5
1
0.5
0
fire-rate
civilian-health
-25 -20 -15 -10 -5
0
5
10 15 20 25
Percentage error
Figure 18: Model sensitivity in the RoboCupRescue scenario.
7. Related Work
There are four related areas of research, that we wish to highlight. First, there has been
a considerable amount of work done in the field of multiagent teamwork (Section 7.1).
The second related area of research is the use of decision theoretic models, in particular
distributed POMDPs (Section 7.2). The third area of related work we describe (Section 7.3)
are hybrid systems that used Markov Decision Process and BDI approaches. Finally, in
Section 7.4, the related work in role allocation and reallocation in multiagent teams is
described.
7.1 BDI-based Teamwork
Several formal teamwork theories such as Joint Intentions (Cohen & Levesque, 1991),
SharedPlans (Grosz & Kraus, 1996) were proposed that tried to capture the essence of
multiagent teamwork in the logic of Beliefs-Desires-Intentions. Next, practical models
of teamwork such as COLLAGEN (Rich & Sidner, 1997), GRATE* (Jennings, 1995),
STEAM (Tambe, 1997) built on these teamwork theories (Cohen & Levesque, 1991; Grosz
& Kraus, 1996) and attempted to capture the aspects of teamwork that were reusable
across domains.
In addition, to complement the practical teamwork models, the team-
oriented programming approach (Pynadath & Tambe, 2003; Tidhar, 1993a, 1993b) was
introduced to allow large number of agents to be programmed as teams. This approach
was then expanded on and applied to a variety of domains (Pynadath & Tambe, 2003; Yen
et al., 2001; da Silva & Demazeau, 2002). Other approaches for building practical multia-
406
Hybrid BDI-POMDP Framework for Multiagent Teaming
gent systems (Stone & Veloso, 1999; Decker & Lesser, 1993), while not explicitly based on
team-oriented programming, could be considered in the same family.
The research reported in this article complements this research on teamwork by intro-
ducing hybrid BDI-POMDP models that exploit the synergy between BDI and POMDP
approaches.
In particular, TOP and teamwork models have traditionally not addressed
uncertainty and cost. Our hybrid model provides this capability, and we have illustrated
the benefits of this reasoning via detailed experiments.
While this article uses team-oriented programming (Tambe et al., 2000; da Silva &
Demazeau, 2002; Tidhar, 1993a, 1993b) as an example BDI approach, it is relevant to
other similar techniques of modeling and tasking collectives of agents, such as Decker and
Lesser's (1993) TAEMS approach.
In particular, the TAEMS language provides an ab-
straction for tasking collaborative groups of agents similar to TOP, while the GPGP in-
frastructure used in executing TAEMS-based tasks is analogous to the "TOP interpreter"
infrastructure shown in Figure 1. While Lesser et al. have explored the use of distributed
MDPs in analyses of GPGP coordination (Xuan & Lesser, 2002), they have not exploited
the use of TAEMS structures in decomposition or abstraction for searching optimal policies
in distributed MDPs, as suggested in this article. Thus, this article complements Lesser
et al.'s work in illustrating a significant avenue for further efficiency improvements in such
analyses.
7.2 Distributed POMDP Models
Distributed POMDP models represent a collection of formal models that are expressive
enough to capture the uncertainty in the domain and the costs and rewards associated
with states and actions. Given a group of agents, the problem of deriving separate poli-
cies for them that maximize some joint reward can be modeled using distributed POMDP
models. In particular, the DEC-POMDP (Decentralized POMDP) (Bernstein et al., 2000)
and MTDP (Multiagent Team Decision Problem) (Pynadath & Tambe, 2002) are gen-
eralizations of POMDPs to the case where there are multiple, distributed agents, basing
their actions on their separate observations. These frameworks allow us to formulate what
constitutes an optimal policy for a multiagent team and in principle derive that policy.
However, with a few exceptions, effective algorithms for deriving policies for distributed
POMDPs have not been developed. Significant progress has been achieved in efficient
single-agent POMDP policy generation algorithms (Monahan, 1982; Cassandra, Littman,
& Zhang, 1997; Kaelbling et al., 1998). However, it is unlikely such research can be directly
carried over to the distributed case. Finding optimal policies for distributed POMDPs is
NEXP-complete (Bernstein et al., 2000). In contrast, finding an optimal policy for a single
agent POMDP is PSPACE-complete (Papadimitriou & Tsitsiklis, 1987). As Bernstein et
al. note (Bernstein et al., 2000), this suggests a fundamental difference in the nature of the
problems. The distributed problem cannot be treated as one of separate POMDPs in which
individual policies can be generated for individual agents because of possible cross-agent
interactions in the reward, transition or observation functions. (For any one action of one
agent, there may be many different rewards possible, based on the actions that other agents
may take.)
407
Nair & Tambe
Three approaches have been used to solve distributed POMDPs. One approach that
is typically taken is to make simplifying assumptions about the domain. For instance, in
Guestrin et al. (2002), it is assumed that each agent can completely observe the world state.
In addition, it is assumed that the reward function (and transition function) for the team
can be expressed as the sum (product) of the reward (transition) functions of the agents
in the team. Becker et al. (2003) assume that the domain is factored such that each agent
has a completely observable local state and also that the domain is transition-independent
(one agent cannot affect another agent's local state).
The second approach taken is to simplify the nature of the policies considered for each
of the agents. For example, Chad`es et al. (2002) restrict the agent policies to be memoryless
(reactive) policies, thereby simplifying the problem to solving multiple MDPs. Peshkin et
al. (2000) take a different approach by using gradient descent search to find local optimum
finite-controllers with bounded memory. Nair et al. (2003a) present an algorithm for finding
a locally optimal policy from a space of unrestricted finite-horizon policies. The third
approach, taken by Hansen et al. (2004), involves trying to determine the globally optimal
solution without making any simplifying assumptions about the domain. In this approach,
they attempt to prune the space of possible complete policies by eliminating dominated
policies. Although a brave frontal assault on the problem, this method is expected to
face significant difficulties in scaling up due to the fundamental complexity of obtaining a
globally optimal solution.
The key difference with our work is that our research is focused on hybrid systems where
we leverage the advantages of BDI team plans, which are used in practical systems, and
distributed POMDPs that quantitatively reason about uncertainty and cost. In particular,
we use TOPs to specify large-scale team plans in complex domains and use RMTDPs for
finding the best role allocation for these teams.
7.3 Hybrid BDI-POMDP Approaches
POMDP models have been used in the context of analysis of both single agent (Schut,
Wooldridge, & Parsons, 2001) and multiagent (Pynadath & Tambe, 2002; Xuan et al., 2001)
behavior. Schut et al. compare various strategies for intention reconsideration (deciding
when to deliberate about its intentions) by modeling a BDI system using a POMDP. The
key differences with this work and our approach are that they apply their analysis to a single
agent case and do not consider the issues of exploiting BDI system structure in improving
POMDP efficiency.
Xuan and Lesser (2001) and Pynadath and Tambe (2002), both analyze multiagent
communication. While Xuan and Lesser dealt with finding and evaluating various commu-
nication policies, Pynadath and Tambe used the COM-MTDP model to deal with the prob-
lem of comparing various communication strategies both empirically and analytically. Our
approach is more general in that we explain an approach for analyzing any coordination ac-
tions including communication. We concretely demonstrate our approach for analysis of role
allocation. Additional key differences from the earlier work by Pynadath and Tambe (2002)
are as follows: (i) In RMTDP, we illustrate techniques to exploit team plan decomposition
in speeding up policy search, absent in COM-MTDP, (ii) We also introduce techniques for
belief-based evaluation absent from previous work. Nonetheless, combining RMTDP with
408
Hybrid BDI-POMDP Framework for Multiagent Teaming
COM-MTDP is an interesting avenue for further research and some preliminary steps in
this direction are presented in Nair, Tambe and Marsella (2003b).
Among other hybrid systems not focused on analysis, Scerri et al. (2002) employ Markov
Decision Processes within team-oriented programs for adjustable autonomy. The key dif-
ference between that work and ours is that the MDPs were used to execute a particular
sub-plan within the TOP's plan hierarchy and not for making improvements to the TOP.
DTGolog (Boutilier, Reiter, Soutchanski, & Thrun, 2000) provides a first-order language
that limits MDP policy search via logical constraints on actions. Although it shares with
our work the key idea of synergistic interactions in MDPs and Golog, it differs from our
work in that it focuses on single agent MDPs in fully observable domains, and does not
exploit plan structure in improving MDP performance. ISAAC (Nair, Tambe, Marsella,
& Raines, 2004), a system for analyzing multiagent teams, also employs decision theoretic
methods for analyzing multiagent teams.
In that work, a probabilistic finite automaton
(PFA) that represents the probability distribution of key patterns in the team's behavior
are learned from logs of the team's behaviors. The key difference with that work is that the
analysis is performed without having access to the actual team plans that the agents are
executing and hence the advice provided cannot directly be applied to improving the team,
but will need a human developer to change the team behavior as per the advice generated.
7.4 Role Allocation and Reallocation
There are several different approaches to the problem of role allocation and reallocation.
For example, Tidhar et al. (1996) and Tambe et al. (2000) performed role allocation based
on matching of capabilities, while Hunsberger and Grosz (2000) proposed the use of com-
binatorial auctions to decide on how roles should be assigned. Modi et al. (2003) showed
how role allocation can be modeled as a distributed constraint optimization problem and
applied it to the problem of tracking multiple moving targets using distributed sensors.
Shehory and Kraus (1998) suggested the use of coalition formation algorithms for deciding
quickly which agent took on which role. Fatima and Wooldridge (2001) use auctions to
decide on task allocation. It is important to note that these competing techniques are not
free of the problem of how to model the problem, even though they do not have to model
transition probabilities. Other approaches to reforming a team are reconfiguration meth-
ods due to Dunin-Keplicz and Verbrugge (2001), self-adapting organizations by Horling
and Lesser (2001) and dynamic re-organizing groups (Barber & Martin, 2001). Scerri et
al. (2003) present a role (re)allocation algorithm that allows autonomy of role reallocation
to shift between a human supervisor and the agents.
The key difference with all this prior work is our use of stochastic models (RMTDPs)
to evaluate allocations: this enables us to compute the benefits of role allocation, taking
into account uncertainty and costs of reallocation upon failure. For example, in the mission
rehearsal domain, if uncertainties were not considered, just one scout would have been
allocated, leading to costly future reallocations or even in mission failure. Instead, with
lookahead, depending on the probability of failure, multiple scouts were sent out on one or
more routes, resulting in fewer future reallocations and higher expected reward.
409
Nair & Tambe
8. Conclusion
While the BDI approach to agent teamwork has provided successful applications, tools and
techniques that provide quantitative analyses of team coordination and other team behav-
iors under uncertainty are lacking. The emerging field of distributed POMDPs provides
a decision theoretic method for quantitatively obtaining the optimal policy for a team of
agents, but faces a serious intractability challenge. Therefore, this article leverages the
benefits of both the BDI and POMDP approaches to analyze and improve key coordination
decisions within BDI-based team plans using POMDP-based methods. In order to demon-
strate these analysis methods, we concentrated on role allocation – a fundamental aspect
of agent teamwork – and provided three key contributions. First, we introduced RMTDP,
a distributed POMDP based framework, for analysis of role allocation. Second, this article
presented an RMTDP-based methodology for optimizing key coordination decisions within
a BDI team plan for a given domain. Concretely, the article described a methodology for
finding the best role allocation for a fixed team plan. Given the combinatorially many
role allocations, we introduced methods to exploit task decompositions among sub-teams
to significantly prune the search space of role allocations.
Third, our hybrid BDI-POMDP approach uncovered several synergistic interactions
between BDI team plans and distributed POMDPs:
1. TOPs were useful in constructing the RMTDP model for the domain, in identifying
the features that need to be modeled as well as in decomposing the model construction
according to the structure of the TOP. The RMTDP model could then be used to
evaluate the TOP.
2. TOPs restricted the policy search by providing RMTDPs with incomplete policies
with a limited number of open decisions.
3. The BDI approach helped in coming up with a novel efficient "belief-based" represen-
tation of policies suited for this hybrid BDI-POMDP approach and a corresponding
algorithm for evaluating such policies. This resulted in faster evaluation and also a
more compact policy representation.
4. The structure in the TOP was exploited to decompose the problem of evaluating
abstract policies, resulting in significant pruning in the search for the optimal role
allocations.
We constructed RMTDPs for two domains – RoboCupRescue and mission rehearsal
simulation – and determined the best role allocation in these domains. Furthermore, we
illustrated significant speedups in RMTDP policy search due to the techniques introduced
in this article. Detailed experiments revealed the advantages of our approach over state-of-
the-art role allocation approaches that failed to reason with uncertainty.
Our key agenda for future work is to continue scale-up of RMTDPs to even larger
scale agent teams. Such scale-up will require further efficiency improvements. We propose
to continue to exploit the interaction in the BDI and POMDP approaches in achieving
such scale-up. For instance, besides disaster rescue, distributed sensor nets and large area
monitoring applications could benefit from such a scale-up.
410
Hybrid BDI-POMDP Framework for Multiagent Teaming
Acknowledgments
This research was supported by NSF grant #0208580. We would like to thank Jim Blythe,
Anthony Cassandra, Hyuckchul Jung, Spiros Kapetanakis, Sven Koenig, Michael Littman,
Stacy Marsella, David Pynadath and Paul Scerri for discussions related to this article.
We would also like to thank the reviewers of this article whose comments have helped in
significantly improving this article.
Appendix A. TOP details
In this section, we will describe the TOP for the helicopter scenario. The details of each
subplan in Figure 4(b) are shown below:
ExecuteMission:
Context:∅
Pre-conditions: (MB <TaskForce> location(TaskForce) = START)
Achieved: (MB <TaskForce> (Achieved(DoScouting) ∧ Achieved(DoTransport)))
∧ (time > T ∨ (MB <TaskForce> Achieved(RemainingScouts) ∨
(∄ helo ∈ ScoutingTeam, alive(helo) ∧ location(helo) 6= END)))
Unachievable: (MB <TaskForce> Unachievable(DoScouting))
∨ (MB <TaskForce> (Unachievable(DoTransport)
∧ (Achieved(RemainingScouts)
∨(∄ helo ∈ ScoutingTeam, alive(helo) ∧ location(helo) 6= END))))
Irrelevant: ∅
Body:
DoScouting
DoTransport
RemainingScouts
Constraints:
DoScouting → DoTransport
DoScouting → RemainingScouts
DoScouting:
Context:ExecuteMission <TaskForce>
Pre-conditions: ∅
Achieved: ∅
Unachievable: ∅
Irrelevant:∅
Body:
WaitAtBase
ScoutRoutes
Constraints:
WaitAtBase AND ScoutRoutes
WaitAtBase:
Context: DoScouting <TaskForce>
Pre-conditions: ∅
Achieved: ∅
Unachievable: (MB <TransportTeam> ∄ helo ∈ TransportTeam, alive(helo))
411
Nair & Tambe
Irrelevant: ∅
Body:
no-op
ScoutRoutes:
Context: DoScouting <TaskForce>
Achieved: ∅
Unachievable: ∅
Irrelevant:(MB <ScoutingTeam> ∄ helo ∈ TransportTeam, alive(helo))
Body:
ScoutRoute1
ScoutRoute2
ScoutRoute3
Constraints:
ScoutRoute1 OR ScoutRoute2 OR ScoutRoute3
ScoutRoute1:
Context: ScoutRoutes <ScoutingTeam>
Pre-conditions: ∅
Achieved: (MB <SctTeamA> ∃ helo ∈ SctTeamA, location(helo) = END)
Unachievable: time > T ∨ (MB <SctTeamA> ∄ helo ∈ SctTeamA, alive(helo))
Irrelevant: ∅
Body:
if (location(SctTeamA) = START) then route(SctTeamA) ← 1
if (location(SctTeamA) 6= END) then move-forward
ScoutRoute2:
Context: ScoutRoutes <ScoutingTeam>
Pre-conditions: ∅
Achieved: (MB <SctTeamB> ∃ helo ∈ SctTeamB, location(helo) = END)
Unachievable: time > T ∨ (MB <SctTeamB> ∄ helo ∈ SctTeamB, alive(helo))
Irrelevant: ∅
Body:
if (location(SctTeamB) = START) then route(SctTeamB) ← 2
if (location(SctTeamB) 6= END) then move-forward
ScoutRoute2:
Context: ScoutRoutes <ScoutingTeam>
Pre-conditions: ∅
Achieved: (MB <SctTeamA> ∃ helo ∈ SctTeamA, location(helo) = END)
Unachievable: time > T ∨ (MB <SctTeamA> ∄ helo ∈ SctTeamA, alive(helo))
Irrelevant: ∅
Body:
if (location(SctTeamA) = START) then route(SctTeamA) ← 1
if (location(SctTeamA) 6= END) then move-forward
DoTransport:
Context: ExecuteMission <TaskForce>
Pre-conditions: ∅
412
Hybrid BDI-POMDP Framework for Multiagent Teaming
Achieved: (MB <TransportTeam> location(TransportTeam) = END)
Unachievable: time > T ∨ (MB <TransportTeam> ∄ helo ∈ TransportTeam, alive(helo))
Irrelevant: ∅
Body:
if (location(TransportTeam) = start) then
if (MB <TransportTeam> Achieved(ScoutRoute1)) then
route(TransportTeam) ← 1
elseif (MB <TransportTeam> Achieved(ScoutRoute2)) then
route(TransportTeam) ← 2
elseif (MB <TransportTeam> Achieved(ScoutRoute3)) then
route(TransportTeam) ← 3
if (route(TransportTeam) 6= null) and (location(TransportTeam) 6= END) then
move-forward
RemainingScouts:
Context: ExecuteMission <TaskForce>
Pre-conditions: ∅
Achieved: (MB <ScoutingTeam> location(ScoutingTeam) = END)
Unachievable: time > T ∨ (MB <ScoutingTeam> (∄ helo ∈ ScoutingTeam
alive(helo) ∧ location(helo) 6= END))
Irrelevant: ∅
Body:
if (location(ScoutingTeam) 6= END) then move-forward
The predicate Achieved(tplan) is true if the Achieved conditions of tplan are true. Simi-
larly, the predicates Unachievable(tplan) and Irrelevant(tplan) are true if the the Unachiev-
able conditions and the Irrelevant conditions of tplan are true, respectively. The predicate
(location(team) = END) is true if all members of team are at END.
Figure 4(b) also shows coordination relationships: An AND relationship is indicated
with a solid arc, while an OR relationship is indicated with a dotted arc. These coordi-
nation relationships indicate unachievability, achievability and irrelevance conditions that
are enforced by the TOP infrastructure. An AND relationship between team sub-plans
means that if any of the team sub-plans fail, then the parent team plan will fail. Also, for
the parent team plan to be achieved, all the child sub-plans must be achieved. Thus, for
DoScouting, WaitAtBase and ScoutRoutes must both be done:
Achieved: (MB <TaskForce> Achieved(WaitAtBase) ∧ Achieved(ScoutRoutes))
Unachievable: (MB <TaskForce> Unachievable(WaitAtBase)
∨ Unachievable(ScoutRoutes))
An OR relationship means that all the subplans must fail for the parent to fail and success of
any of the subplans means that the parent plan has succeeded. Thus, for ScoutingRoutes,
at least one of ScoutRoute1, ScoutRoute2 or ScoutRoute3 need be performed:
Achieved: (MB <ScoutingTeam> Achieved(ScoutRoute1) ∨
Achieved(ScoutRoute2)∨ Achieved(ScoutRoute3))
Unachievable: (MB <TaskForce> Unachievable(ScoutRoute1) ∧
Unachievable(ScoutRoute2) ∧ Unachievable(ScoutRoute3))
413
Nair & Tambe
Also an AND relationship affects the irrelevance conditions of the subplans that it joins. If
the parent is unachievable then all its subplans that are still executing become irrelevant.
Thus, for WaitAtBase:
Irrelevant: (MB <TaskForce> Unachievable(ScoutRoutes))
Similarly for ScoutingRoutes:
Irrelevant: (MB <TaskForce> Unachievable(ScoutRoutes))
.
Finally, we assign roles to plans - Figure 4(b) shows the assignment in brackets adja-
cent to the plans. For instance, Task Force team is assigned to jointly perform Execute
Mission.
Appendix B. RMTDP details
In this section, we present details of the RMTDP constructed for the TOP in Figure 4.
• S: We get the features of the state from the attributes tested in the preconditions
and achieved, unachievable and irrelevant conditions and the body of the team plans
and individual agent plans. Thus the relevant state variables are:location of each
helicopter, role of each helicopter,route of each helicopter, status of each helicopter
(alive or not) and time. For a team of n helicopters, the state is given by the tuple
< time, role1, . . . , rolen, loc1, . . . , locn, route1, . . . , routen, status1, . . . , statusn >.
• A: We consider actions to be the primitive actions that each agent can perform
within its individual plans. The TOP infrastructure enforces mutual belief through
communication actions. Since analyzing the cost of these is not the focus of this
research we consider communication to be implicit and we model the effect of this
communication directly in the observation function.
We consider 2 kinds of actions role-taking and role-execution actions. We assume
that the initial allocation will specify roles for all agents. This specifies whether the
agent is a scout or a transport and if a scout which scout team it is assigned to. A
scout cannot become a transport or change its team after its initial allocation while a
transport can change its role by taking one of the role-taking actions.The role-taking
and role-execution actions for each agent i are given by:
Υi,memberT ransportT eam = {joinSctT eamA, joinSctT eamB, joinSctT eamC}
Υi,memberSctT eamA = Υi,memberSctT eamB = Υi,memberSctT eamCx = ∅
Φi,memberT ransportT eam = {chooseRoute, moveF orward}
Φi,memberSctT eamA = Φi,memberSctT eamB = Φi,memberSctT eamC = {moveF orward}
• P : We obtain the transition function with the help of a human expert or through
simulations if a simulator is available. In this domain, helicopters can crash (be shot
down) if they are not at START, END or an already scouted location. The probability
that scouts will get shot down depends on which route they are on, i.e. probability
of crash on route1 is p1, probability of crash on route2 is p2 and probability of crash
on route3 is p3 and how many scouts are on the same spot. We assume that the
414
Hybrid BDI-POMDP Framework for Multiagent Teaming
probability of a transport being shot down in an unscouted location to be 1 and in
a scouted location to be 0. The probability of multiple crashes can be obtained by
multiplying the probabilities of individual crashes.
The action, moveForward, will have no effect if routei = null or loci = END or if
statusi = dead. In all other cases, the location of the agent gets incremented. We
assume that the role-taking actions scoutRoutex will always succeed if the role of the
performing agent is transport and it has not been assigned a route already.
• Ω: Each transport at START can observe the status of the other agents with some
probability depending on their positions. Each helicopter on a particular route can
observe all the helicopters on that route completely and cannot observe helicopters
on other routes.
• O: The observation function gives the probability for a group of agents to receive a
particular joint observation. In this domain we assume that observations of one agent
are independent of the observations of other agents, given the current state and the
previous joint action. Thus the probability of a joint observation can be computed by
multiplying the probabilities of each individual agent's observations.
The probability of a transport at START observing the status of an alive scout on
route 1 is 0.95. The probability of a transport at START observing nothing about
that alive scout is 0.05 since we don't have false negatives. Similarly if a scout on
route 1 crashes, the probability that this is visible to a transport at START is 0.98
and the probability that the transport doesn't see this failure is 0.02. Similarly the
probabilities for observing an alive scout on route 2 and route 3 and 0.94 and 0.93
respectively and the probabilities for observing a crash on route 2 and route 3 and
0.97 and 0.96 respectively.
• R: The reward function is obtained with the help of a human expert who helps
assign value to the various states and the cost of performing various actions. For
this analysis, we assume that actions moveForward and chooseRoute have no cost.
We consider the negative reward (cost) for the replacement action, scoutRoutex, to
be RΥ, the negative reward for a failure of a helicopter to be RF , the reward for a
scout reaching END to be Rscout and the reward for a transport reaching END to be
Rtransport. E.g. RΥ = −10, RF = −50, Rscout = 5, Rtransport = 75.
• RL: These are the roles that individual agents can take in TOP organization hierarchy.
RL = {transport, scoutOnRoute1, scoutOnRoute2, scoutOnRoute3}.
Appendix C. Theorems
Theorem 3 The MAXEXP method will always yield an upper bound.
Proof sketch:
• Let policy π∗ be the leaf-level policy with the highest expected reward under a par-
ticular parent node, i, in the restricted policy space.
Vπ∗ = maxπ∈Children(i)Vπ
(3)
415
Nair & Tambe
• Since the reward function is specified separately for each component, we can sepa-
rate the expected reward V into the rewards from the constituent components given
the starting states and starting observation histories of these components. Let the
team plan be divided into m components such that the components are parallel and
independent or sequentially executed.
Vπ∗ ≤ X1≤j≤m
maxstates[j],oHistories[j]Vjπ∗
• The expected value obtained for any component j, 1 ≤ j ≤ m for π∗ cannot be greater
than that of the highest value obtained for j using any policy.
maxstates[j],oHistories[j]Vjπ∗ ≤ maxπ∈Children(i)maxstates[j],oHistories[j](Vjπ)
(4)
Vπ∗ ≤ X1≤j≤m
maxπ∈Children(i)maxstates[j],oHistories[j](Vjπ)
Vπ∗ ≤ MaxEstimate(i)
(5)
• Hence,
(cid:3)
References
Barber, S., & Martin, C. (2001). Dynamic reorganization of decision-making groups. In
Proceedings of the Fifth International Conference on Autonomous Agents (Agents-01),
pp. 513–520.
Becker, R., Zilberstein, S., Lesser, V., & Goldman, C. V. (2003). Transition-independent
decentralized Markov decision processes. In Proceedings of the Second International
Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS-03), pp.
41–48.
Bernstein, D. S., Zilberstein, S., & Immerman, N. (2000). The complexity of decentral-
ized control of MDPs. In Proceedings of the Sixteenth Conference on Uncertainty in
Artificial Intelligence(UAI-00), pp. 32–37.
Boutilier, C. (1996). Planning, learning & coordination in multiagent decision processes. In
Proceedings of the Sixth Conference on Theoretical Aspects of Rationality and Knowl-
edge (TARK-96), pp. 195–210.
Boutilier, C., Reiter, R., Soutchanski, M., & Thrun, S. (2000). Decision-theoretic, high-
level agent programming in the situation calculus. In Proceedings of the Seventeenth
National Conference on Artificial Intelligence (AAAI-00), pp. 355–362.
Cassandra, A., Littman, M., & Zhang, N. (1997).
Incremental pruning: A simple, fast,
exact method for partially observable Markov decision processes. In Proceedings of
the Thirteenth Annual Conference on Uncertainty in Artificial Intelligence (UAI-97),
pp. 54–61.
416
Hybrid BDI-POMDP Framework for Multiagent Teaming
Chad`es, I., Scherrer, B., & Charpillet, F. (2002). A heuristic approach for solving
decentralized-pomdp: Assessment on the pursuit problem. In Proceedings of the 2002
ACM Symposium on Applied Computing (SAC-02), pp. 57–62.
Cohen, P. R., & Levesque, H. J. (1991). Teamwork. Nous, 25 (4), 487–512.
da Silva, J. L. T., & Demazeau, Y. (2002). Vowels co-ordination model. In Proceedings
of the First International Joint Conference on Autonomous Agents and Multiagent
Systems (AAMAS-2002), pp. 1129–1136.
Dean, T., & Lin, S. H. (1995). Decomposition techniques for planning in stochastic do-
mains. In Proceedings of the Fourteenth International Joint Conference on Artificial
Intelligence (IJCAI-95), pp. 1121–1129.
Decker, K., & Lesser, V. (1993). Quantitative modeling of complex computational task
environments. In Proceedings of the Eleventh National Conference on Artificial Intel-
ligence (AAAI-93), pp. 217–224.
Dix, J., Muoz-Avila, H., Nau, D. S., & Zhang, L. (2003).
Impacting shop: Putting an
ai planner into a multi-agent environment. Annals of Mathematics and Artificial
Intelligence, 37 (4), 381–407.
Dunin-Keplicz, B., & Verbrugge, R. (2001). A reconfiguration algorithm for distributed
problem solving. Engineering Simulation, 18, 227–246.
Erol, K., Hendler, J., & Nau, D. S. (1994). HTN planning: Complexity and expressivity. In
Proceedings of the Twelfth National Conference on Artificial Intelligence (AAAI-94),
pp. 1123–1128.
Fatima, S. S., & Wooldridge, M. (2001). Adaptive task and resource allocation in multi-
agent systems. In Proceedings of the Fifth International Conference on Autonomous
Agents (Agents-01), pp. 537–544.
Georgeff, M. P., & Lansky, A. L. (1986). Procedural knowledge. Proceedings of the IEEE
special issue on knowledge representation, 74, 1383–1398.
Goldman, C. V., & Zilberstein, S. (2003). Optimizing information exchange in cooperative
multi-agent systems. In Proceedings of the Second International Joint Conference on
Autonomous Agents and Multi Agent Systems (AAMAS-03), pp. 137–144.
Grosz, B., Hunsberger, L., & Kraus, S. (1999). Planning and acting together. AI Magazine,
20 (4), 23–34.
Grosz, B., & Kraus, S. (1996). Collaborative plans for complex group action. Artificial
Intelligence, 86 (2), 269–357.
Guestrin, C., Venkataraman, S., & Koller, D. (2002). Context specific multiagent coordi-
nation and planning with factored MDPs. In Proceedings of the Eighteenth National
Conference on Artificial Intelligence (AAAI-02), pp. 253–259.
Hansen, E., & Zhou, R. (2003). Synthesis of hierarchical finite-state controllers for pomdps.
In Proceedings of the Thirteenth International Conference on Automated Planning and
Scheduling (ICAPS-03), pp. 113–122.
417
Nair & Tambe
Hansen, E. A., Bernstein, D. S., & Zilberstein, S. (2004). Dynamic programming for partially
observable stochastic games. In Proceedings of the Nineteenth National Conference
on Artificial Intelligence (AAAI-04), pp. 709–715.
Ho, Y.-C. (1980). Team decision theory and information structures. Proceedings of the
IEEE, 68 (6), 644–654.
Horling, B., Benyo, B., & Lesser, V. (2001). Using self-diagnosis to adapt organizational
In Proceedings of the Fifth International Conference on Autonomous
structures.
Agents (Agents-01), pp. 529–536.
Hunsberger, L., & Grosz, B. (2000). A combinatorial auction for collaborative planning. In
Proceedings of the Fourth International Conference on Multiagent Systems (ICMAS-
2000), pp. 151–158.
Jennings, N. (1995). Controlling cooperative problem solving in industrial multi-agent
systems using joint intentions. Artificial Intelligence, 75 (2), 195–240.
Kaelbling, L., Littman, M., & Cassandra, A. (1998). Planning and acting in partially
observable stochastic domains. Artificial Intelligence, 101 (2), 99–134.
Kitano, H., Tadokoro, S., Noda, I., Matsubara, H., Takahashi, T., Shinjoh, A., & Shimada,
S. (1999). RoboCup-Rescue: Search and rescue for large scale disasters as a domain
for multiagent research. In Proceedings of IEEE Conference on Systems, Men, and
Cybernetics (SMC-99), pp. 739–743.
Levesque, H. J., Cohen, P. R., & Nunes, J. (1990). On acting together. In Proceedings of the
National Conference on Artificial Intelligence, pp. 94–99. Menlo Park, Calif.: AAAI
press.
Mailler, R. T., & Lesser, V. (2004). Solving distributed constraint optimization problems us-
ing cooperative mediation. In Proceedings of the Third International Joint Conference
on Agents and Multiagent Systems (AAMAS-04), pp. 438–445.
Marschak, J., & Radner, R. (1972). The Economic Theory of Teams. Cowles Foundation
and Yale University Press, New Haven, CT.
Modi, P. J., Shen, W.-M., Tambe, M., & Yokoo, M. (2003). An asynchronous complete
method for distributed constraint optimization.
In Proceedings of the Second In-
ternational Joint Conference on Agents and Multiagent Systems (AAMAS-03), pp.
161–168.
Monahan, G. (1982). A survey of partially observable Markov decision processes: Theory,
models and algorithms. Management Science, 101 (1), 1–16.
Nair, R., Ito, T., Tambe, M., & Marsella, S. (2002). Task allocation in the rescue simulation
domain. In RoboCup 2001: Robot Soccer World Cup V, Vol. 2377 of Lecture Notes in
Computer Science, pp. 751–754. Springer-Verlag, Heidelberg, Germany.
Nair, R., Pynadath, D., Yokoo, M., Tambe, M., & Marsella, S. (2003a). Taming decentralized
POMDPs: Towards efficient policy computation for multiagent settings. In Proceedings
of the Eighteenth International Joint Conference on Artificial Intelligence (IJCAI-03),
pp. 705–711.
418
Hybrid BDI-POMDP Framework for Multiagent Teaming
Nair, R., Tambe, M., & Marsella, S. (2003b). Team formation for reformation in multi-
agent domains like RoboCupRescue. In Kaminka, G., Lima, P., & Roja, R. (Eds.),
Proceedings of RoboCup-2002 International Symposium, pp. 150–161. Lecture Notes
in Computer Science, Springer Verlag.
Nair, R., Tambe, M., Marsella, S., & Raines, T. (2004). Automated assistants to analyze
team behavior. Journal of Autonomous Agents and Multi-Agent Systems, 8 (1), 69–
111.
Papadimitriou, C., & Tsitsiklis, J. (1987). Complexity of Markov decision processes. Math-
ematics of Operations Research, 12 (3), 441–450.
Peshkin, L., Meuleau, N., Kim, K.-E., & Kaelbling, L. (2000). Learning to cooperate via
policy search. In Proceedings of the Sixteenth Conference in Uncertainty in Artificial
Intelligence (UAI-00), pp. 489–496.
Poupart, P., & Boutilier, C. (2003). Bounded finite state controllers.
In Proceedings of
Advances in Neural Information Processing Systems 16 (NIPS).
Pynadath, D. V., & Tambe, M. (2002). The communicative multiagent team decision
problem: Analyzing teamwork theories and models. Journal of Artificial Intelligence
Research, 16, 389–423.
Pynadath, D. V., & Tambe, M. (2003). Automated teamwork among heterogeneous soft-
ware agents and humans. Journal of Autonomous Agents and Multi-Agent Systems
(JAAMAS), 7, 71–100.
Rich, C., & Sidner, C. (1997). COLLAGEN: When agents collaborate with people.
In
Proceedings of the First International Conference on Autonomous Agents (Agents-
97), pp. 284–291.
Scerri, P., Johnson, L., Pynadath, D., Rosenbloom, P., Si, M., Schurr, N., & Tambe, M.
(2003). A prototype infrastructure for distributed robot, agent, person teams.
In
Proceedings of the Second International Joint Conference on Agents and Multiagent
Systems (AAMAS-03), pp. 433–440.
Scerri, P., Pynadath, D. V., & Tambe, M. (2002). Towards adjustable autonomy for the
real-world. Journal of Artificial Intelligence (JAIR), 17, 171–228.
Schut, M. C., Wooldridge, M., & Parsons, S. (2001). Reasoning about intentions in un-
certain domains. In Proceedings of the Sixth European Conference on Symbolic and
Quantitative Approaches to Reasoning with Uncertainty (ECSQARU-2001), pp. 84–
95.
Shehory, O., & Kraus, S. (1998). Methods for task allocation via agent coalition formation.
Artificial Intelligence, 101 (1-2), 165–200.
Sondik, E. J. (1971). The optimal control of partially observable Markov processes. Ph.D.
Thesis, Stanford.
Stone, P., & Veloso, M. (1999). Task decomposition, dynamic role assignment, and low-
bandwidth communication for real-time strategic teamwork. Artificial Intelligence,
110 (2), 241–273.
419
Nair & Tambe
Tambe, M. (1997). Towards flexible teamwork. Journal of Artificial Intelligence Research,
7, 83–124.
Tambe, M., Pynadath, D., & Chauvat, N. (2000). Building dynamic agent organizations in
cyberspace. IEEE Internet Computing, 4 (2), 65–73.
Tidhar, G. (1993a). Team-oriented programming: Preliminary report. Tech. rep. 41, Aus-
tralian Artificial Intelligence Institute.
Tidhar, G. (1993b). Team-oriented programming: Social structures. Tech. rep. 47, Aus-
tralian Artificial Intelligence Institute.
Tidhar, G., Rao, A., & Sonenberg, E. (1996). Guided team selection. In Proceedings of the
Second International Conference on Multi-agent Systems (ICMAS-96), pp. 369–376.
Wooldridge, M. (2002). An Introduction to Multiagent Systems. John Wiley & Sons.
Xuan, P., & Lesser, V. (2002). Multi-agent policies: from centralized ones to decentral-
ized ones. In Proceedings of the First International Joint Conference on Agents and
Multiagent Systems (AAMAS-02), pp. 1098–1105.
Xuan, P., Lesser, V., & Zilberstein, S. (2001). Communication decisions in multiagent
In Proceedings of the Fifth International Conference on Autonomous
cooperation.
Agents (Agents-01), pp. 616–623.
Yen, J., Yin, J., Ioerger, T. R., Miller, M. S., Xu, D., & Volz, R. A. (2001). Cast: Collabora-
tive agents for simulating teamwork. In Proceedings of the Seventeenth International
Joint Conference on Artificial Intelligence (IJCAI-01), pp. 1135–1144.
Yoshikawa, T. (1978). Decomposition of dynamic team decision problems. IEEE Transac-
tions on Automatic Control, AC-23 (4), 627–632.
420
|
1809.10007 | 2 | 1809 | 2018-12-22T13:49:32 | Learning through Probing: a decentralized reinforcement learning architecture for social dilemmas | [
"cs.MA",
"cs.AI",
"cs.GT",
"cs.LG"
] | Multi-agent reinforcement learning has received significant interest in recent years notably due to the advancements made in deep reinforcement learning which have allowed for the developments of new architectures and learning algorithms. Using social dilemmas as the training ground, we present a novel learning architecture, Learning through Probing (LTP), where agents utilize a probing mechanism to incorporate how their opponent's behavior changes when an agent takes an action. We use distinct training phases and adjust rewards according to the overall outcome of the experiences accounting for changes to the opponents behavior. We introduce a parameter eta to determine the significance of these future changes to opponent behavior. When applied to the Iterated Prisoner's Dilemma (IPD), LTP agents demonstrate that they can learn to cooperate with each other, achieving higher average cumulative rewards than other reinforcement learning methods while also maintaining good performance in playing against static agents that are present in Axelrod tournaments. We compare this method with traditional reinforcement learning algorithms and agent-tracking techniques to highlight key differences and potential applications. We also draw attention to the differences between solving games and societal-like interactions and analyze the training of Q-learning agents in makeshift societies. This is to emphasize how cooperation may emerge in societies and demonstrate this using environments where interactions with opponents are determined through a random encounter format of the IPD. | cs.MA | cs | Learning through probing: a decentralized reinforcement
learning architecture for social dilemmas
Mirco Musolesi
Nicolas Anastassacos
The Alan Turing Institute
University College London
The Alan Turing Institute
University College London
8
1
0
2
c
e
D
2
2
]
A
M
.
s
c
[
2
v
7
0
0
0
1
.
9
0
8
1
:
v
i
X
r
a
ABSTRACT
Multi-agent reinforcement learning has received significant inter-
est in recent years notably due to the advancements made in deep
reinforcement learning which have allowed for the developments
of new architectures and learning algorithms. However, while they
have been successful at solving stationary games, there has been
less development in cooperation-type games due to the nature
of these algorithms to optimize their play against the opponent's
current strategy and don't consider how that strategy can change.
Using social dilemmas, notably the Iterated Prisoner's Dilemma
(IPD) as the training ground, we present a novel learning archi-
tecture, Learning through Probing (LTP), where Q-learning agents
utilize a probing mechanism to determine how an opponent's strat-
egy changes when an agent takes an action. We use distinct train-
ing phases and adjust rewards according to the overall outcome
of the experiences accounting for changes to the opponents be-
havior. We introduce a parameter η to determine the significance
of these future changes to opponent behavior. When applied to
the IPD, LTP agents demonstrate that they can learn to cooperate
with each other, achieving higher average cumulative rewards than
other reinforcement learning methods while also maintaining good
performance in playing against static agents that are present in
Axelrod tournaments. We compare this method with traditional re-
inforcement learning algorithms and agent-tracking techniques to
highlight key differences and potential applications. We also draw
attention to the differences between solving games and studying be-
haviour using societal-like interactions and analyze the training of
Q-learning agents in makeshift societies. This is to emphasize how
cooperation may emerge in societies and demonstrate this using
environments where interactions with opponents are determined
through a random encounter format of the IPD.
KEYWORDS
Reinforcement Learning, Cooperation, Social Dilemmas, Multi-
Agent Learning
INTRODUCTION
Multi-agent reinforcement learning (RL) has garnered a significant
amount of interest in recent years also due to the advancements
in deep RL which has allowed for extensive study on agent behav-
iors. There has been emphasis on designing cooperative agents for
decades [12, 31] yet extending this success to multi-agent environ-
ments has proven difficult as the Markov property is not satisfied
since agent behaviors are continuously changing [30] and the use
of experience replay does little to inhibit unstable learning in pres-
ence of multiple learners. Indeed, there are still challenges to be
tackled in order to enable broader applications, e.g., in automated
decision-making such as self-driving cars, personalized assistants,
and the eventuality of artificial agents operating in society. A cen-
tral aspect of this evolution lies in understanding the competitive
and collaborative nature of environments and the emergence of
such behaviors [2, 21].
Humans have cooperated and maintained cooperation to great
effect, which has been paramount for the development of civiliza-
tion [2, 3, 8]. Many plants and animals have also demonstrated
the tendency to cooperate with relatives and have even been ob-
served cooperating with members of a different species even in
highly competitive environments, likely to take advantage of long-
term rewards [6, 29]. The evolution of cooperation in competitive
environments has therefore been relevant to studies in econom-
ics, game-theory, psychology, social science, and now computer
science as the future will certainly demand interaction between
artificial agents in human and artificial societies. The emergence of
cooperative and competitive strategies has been studied in Social
Dilemmas [14, 15, 23, 34]. These are games where an individual
profits from selfishness unless everyone chooses to behave self-
ishly, in which case the group as a whole achieves an undesirable
outcome. In other words, problems arise when too many group
members choose to pursue individual profit and immediate satis-
faction rather than behave in the group's best long-term interests.
From a game-theoretic perspective, the dominant strategy in social
dilemmas is often to behave selfishly, which results in arriving at a
Nash Equilibria that can be described as socially deficient [15] and
is an undesirable result. One of the first and most studied examples
of social dilemmas is the Prisoner's Dilemma (PD), a two-player
social dilemma that is formalized by a payoff matrix and a dominant
strategy to defect despite a collaborative effort from both players
leading to a higher reward. The Iterated Prisoner's Dilemma (IPD)
is an extended, sequential version of the PD that has often been
the focus for multi-agent RL. In order to succeed in these types of
games, it is important for each agent to distinguish between how
to play against the current strategy of their opponent and how
their opponent's strategy might change to be either more or less
cooperative as a result of their own actions as time goes on.
Most RL algorithms are designed for single-agent case scenarios.
Qualitatively, the Q-value describes how much reward an agent is
expected to receive when taking a particular action at a particu-
lar state [30]. As the environment changes, the learned Q-values
become increasingly irrelevant and this is exemplified as the num-
ber of agents who are learning increases. Other research projects
have aimed to address the issue of non-stationarity in multi-agent
environments in a variety of ways ranging from refreshing the
experience replay buffer [15] using importance sampling [10, 33] to
stabilize learning, using defined policy-types [16], agent-tracking
techniques to predict the policy of an opposing agent [10, 17, 32, 35],
and centralized functions to share information across to all par-
ticipating agents [17]. To tackle this, we instead propose a train-
ing mechanism, Learning through Probing, which allows agents
to gather experiences that have been adjusted to reflect behav-
ioral changes in a sequence of events over a period of time via
an adjusted reward signal and, therefore, enables them to learn
cooperative strategies. Experimentally, we demonstrate that two
agents trained with this approach learn to cooperate in the IPD
as each agent accounts for the opposing agent's learning while
also revealing how their own behavior will change as a result of an
opposing agent's chosen actions. Furthermore, we also demonstrate
how this type of training mechanism results in a RL agent learning
optimal policies for the IPD when matched with other stationary
and quasi-stationary strategies from Axelrod tournaments. Finally,
we contrast this with current methodologies in multi-agent RL to
highlight potential difficulties and we discuss how probing and
using experiences through updates might help established methods
achieve better performance in dynamic environments.
Alongside this architecture, we also demonstrate that adjusting
the training environment can lead to cooperative behaviors using
a standard Q-learning algorithm to take into account the effect of
external factors beyond each individual agent's decision-making
in determining what behaviors can emerge when introducing ar-
tificial agents into open environments like societies. The focus in
multi-agent RL is predominantly based around stationarizing the
environment in order for agents to learn how to achieve optimal
outcomes in closed environments. This typically requires the same
agents to be used in training and testing. However, an overlooked
aspect of agent behavior is how to design environments to nurture
certain types of behavior. We present experimental results on how
untrained agents can learn to cooperate with other untrained agents
using standard Q-learning when interacting with static agents at
the same time.
RELATED WORK AND MOTIVATION
Modeling multi-agent systems and designing learning algorithms
for dynamic settings is hard and the majority of work in this area
focuses on competitive, zero-sum games. A common approach is
to simply have each agent treat all other agents as part of the envi-
ronment and learn independently, however, this generally leads to
less than optimal performance [12, 28]. Firstly, a naive implementa-
tion of experience replay is not suitable for dynamically changing
environments [1, 27]. Others have employed importance sampling
in order to stabilize the application of replay buffers where ex-
periences that are collected from "old" environments can still be
used to update Q-values [10, 33]. Secondly, agents have to account
for actions taken by other agents in their Q-value approximations
[4]. Finally, learning to play optimally against just an opponent's
current behavior may trap players in undesirable states, as can be
the case in social dilemmas, as there is no consistent and suitable
method of exploration.
However, while Q-learning and other reinforcement learning
algorithms have shown to perform well in zero-sum games for
single player, there has been less work in analyzing their resulting
behavior when trained in general-sum games. While in zero-sum
games, the rewards between two opposing agents are negatively
correlated, in general-sum games, the rewards between two oppos-
ing agents can be correlated arbitrarily as the resulting outcome for
one individual doesn't necessarily directly impact the outcome for
others. This case is generally more representative of interactions in
the real-world. The accepted baseline solution for such games is the
Nash equilibrium. In a Nash equilibrium, each player has chosen a
strategy and neither player can benefit by changing their strategy
unilaterally and it is proven to exist for every finite game. Inspired
by this approach, several game-theoretic reinforcement learning
algorithms have been proposed to solve general-sum games such
as Nash Q-learning. This algorithm modifies its update such that
its update is based on the expectation that agents would take their
equilibrium actions [11].
There is a parallel here between the goal of agent-tracking
methods and Nash Equilibrium as agent-tracking methods look
to identify the opponent's strategy and update assuming only small
changes in the opponent's behavior. However, while they may
account for the opponent's strategy, they both look to perform
updates conditioned on the opponent's current behavior. This is
a flawed approach for cooperation games as a key aspect of the
game involves adapting to your opponent's behavior and therefore
doesn't consider how an agent's learning influences how its oppo-
nent's behavior will change.
The study of sequential social dilemmas, notably the IPD, has
been prevalent across numerous disciplines such as game theory,
economics, and across social sciences as a way of analyzing complex
behaviors such as altruism, reciprocity and cooperation [18, 22, 25].
A strategy known as Tit-For-Tat (TFT) where an agent cooperates
on the first move and then replicates an opponent's previous action,
known as equivalent retaliation, is a simple strategy yet has shown
to be one of the most effective strategies in the IPD and has served
as a basis for the modeling of many real-world behaviors [2]. So-
cial dilemmas like the IPD have proven to be an effective training
ground for multi-agent RL as they might involve cooperation as
a viable method of achieving optimal performance against fixed
policies as well as learning agents [16, 26, 35]. In order to perform
well in social dilemmas, agents must learn to forgo their desire
for early rewards and "agree" on strategies that will benefit those
involved. Many agents designed for Axelrod tournaments utilize
reciprocating behavior which is the general philosophy behind the
Tit-For-Tat strategy whereas others employ more grudging tech-
niques to manoeuvre opponents into cooperating.
Leibo et al. have attempted to train Q-learning agents for se-
quential social dilemmas so as to analyze how conflict, competition,
and cooperation can emerge via a multiplayer Wolfpack hunting
game and a Gathering game [15]. Replay buffers of a fixed capacity
were used to try and accommodate for the multiple learners; once
filled, they were refreshed so that the agent emphasized training
on more recent experiences. A more recently popular approach
to multi-agent reinforcement learning involves policy prediction
which, alongside Q-learning (independent learners), we will con-
trast our approach with. We emphasize this approach because we
think that it closely captures a necessary element of multi-agent
learning: understanding opponent behavior and incorporating it
directly into learning. It expands on methods like fictitious play
[7] and joint action learning (JAL) to more accurately represent
an opponent's policy [5, 19] and enables coordinations (in coop-
erative games). Tesauro presents Hyper-Q learning, which learns
the value of mixed strategies instead of base actions by estimating
opponent actions using observed data and evaluates it using Rock-
Paper-Scissors [32]. He further argues that Hyper-Q learning may
be effective against agents even if they are persistently dynamic.
This has been corroborated by other research employing similar
philosophy of policy prediction. Experiments on Starcraft and other
abstract games that require complex multi-agent coordination have
shown that this methodology significantly improves performance
compared to independent learners trained with Q-learning though
they are often combined with other techniques, e.g., sampling tech-
niques and a centralized value function [10, 17]. However, as we
will demonstrate in our experiments, these types of methods do not
perform adequately in social dilemmas as they aim to shape learn-
ing around what is happening currently rather than what could
happen in the future. In contrast, our approach focuses directly on
understanding the consequence of actions on opponent's behavior
and incorporates that knowledge directly into agent learning via
an adjusted reward function.
The use of social behavior metrics is another approach to tackle the
issue of describing what is really happening in a state at any mo-
ment in time in decentralized learning environments [24]. However,
it is difficult to determine how these metrics should be designed as
they are contextually dependent on the environment. Matignon et
al. achieve cooperative behavior in a decentralized RL system using
a modified update equation that is conditioned on the size of the
reward [20]. Another decentralized method by Yu et al. attempts to
embed emotional context into agents to drive them to learn cooper-
ative behaviors using various metrics to represent an agent's drive
and emotions relative to neighbouring agents [34]. However, these
approaches represent only the current standings that are available
without an indication of how things may or may not change which
we maintain is essential to developing cooperative behavior. An
approach that also emphasizes integrating future behavior of one's
opponents is LOLA which looks to consider opponent learning,
optimizing its return using a one-step look ahead which requires
direct access to the opposing agent's parameters [9]. Our approach
differs in a number of ways. Firstly, we identify two distinct phases.
The first phase is the probing phase where each agent can probe
the opponent agent in order to gather information about how their
opponent's strategy changes after an update and adjust any col-
lected experiences. We use a defined time horizon to determine the
number of updates to the opponent's strategy to consider. In the
second phase, the agent trains on the adjusted experiences only.
Secondly, with the addition of the probing phase, the agent's do not
need to have information about the parameters of the opponent
agent or need to track their strategy in advance.
PRELIMINARIES
Q-Learning
Q-learning is a popular off-policy reinforcement learning technique
to learn optimal behaviors. An agent trained with Q-learning looks
to take actions that maximize its expected cumulative reward. A
value function for a policy π is given by
γ i−1ris0 = s, π] ∀s ∈ S
(1)
V π(s) = E[ T
i =1
Among all possible value functions there exists a maximum
optimal value function V ∗ = maxπ V π(s) ∀s ∈ S and an opti-
mal policy that corresponds to the optimal value function π∗ =
arg maxπ V π(s) ∀s ∈ S. The Q-function, Q, is defined as the ex-
pected cumulative reward received by an agent starting in s, picking
action a and behaving optimally from that point onward. We can
therefore write the optimal Q-function as
Q
′)]
∗(s
∗(s, a) = r(s, a) + γ Ep(s′s,a)[V
(2)
From our definition of the optimal value function, we can derive that
V ∗ = maxa Q∗(s, a) and therefore, π∗ = arg maxπ Qπ(s, a). The
optimal policy is therefore the policy that chooses the action with
the highest Q-value at every state. However, we can see clearly in (2)
that the optimal Q-value is subject to state transition distribution
remaining the same. This is sensible in single-agent games but
not in multi-agent settings since we expect the state distribution
to change as agents change their behavior and therefore affect
the resulting state transitions as they are learning. Agent-tracking
methods expand on this, conditioning the transition to s′ on both
the agent's own action as well as any opponent's actions in order
to better approximate their Q-values, however, as we will see, they
fail to achieve the desired solution for cooperation-type games like
the IPD.
Hyper-Q-Learning
Hyper-Q-learning is an agent-tracking technique and an extension
of Q-learning for multi-agent systems. It estimates an opponent's
mixed strategy y and then evaluates the best response. In the single
agent case, the Hyper-Q function Qπ(s, y, a) is adjusted such that
Qπ(s, y, a) = r(s, y, a) + γ max
′
a′ Qπ(s
′
, y
, a
′)
where y′ is a new estimated opponent strategy in s′. Variations of
Hyper-Q have performed well using deep neural networks with
sampling modifications to the replay buffer. A similar approach in
multi-agent scenarios has been implemented with success using
actor critic techniques such that the target value of agent j is
Qπj(s, a1, ..., aN ) =
rj(s, a1, ..., aN ) + γ Es′ max
a′ Qπj(s
′
, a
′
1, ..., a
′
N )a−j =π−j
where −j denotes all agents except of agent j. In this paper, we
use a variation of Hyper-Q for simplicity in the IPD adopting a
separate neural network to estimate an opponent's next action
directly from an observation and optimize by taking recent sam-
ples of an agent from a replay buffer. While agent-tracking meth-
ods have performed better than independent learners, they still
suffer from a problem of non-stationarity, which is that the dis-
tribution of states changes as each agent updates their policy . If
the updates to π−j are small and the environment is less dynamic
then pi(s′s, a1, ..., aN )a−j =π−j ≈ pi +1(s′s, a1, ..., aN )a−j =π−j , and
is sufficient for calculating an optimal policy though this problem is
made more difficult with more learners. Furthermore, since agents
cannot anticipate how behavior will change in the future, they
cannot avoid getting trapped in socially deficient Nash Equilib-
ria (which are optimal and dominant strategies given knowledge
only of an opponent's current policy). We contrast this with our
approach that, instead, emphasizes an awareness of how an agent's
actions can influence an opponent's future response as we argue
that optimizing against the current policy of an opponent can trap
agents into policies that result in both parties receiving inadequate
rewards.
Forms of Iterated Prisoner's Dilemma
The Prisoner's Dilemma (PD) is a simple game that serves as the
basis for research on social dilemmas. The premise of the game
is that two partners in crime are imprisoned separately and each
are offered leniency if they provide evidence against the other.
Each player can choose between two actions: cooperation (C) or
defection (D), and the payoffs of the game are displayed in Figure 1.
The game is modeled so that T > R > P > S and 2R > T +S. Solving
this from a game-theoretic perspective, the dominant strategy is to
defect, however, if both players take this action then they arrive at
a Nash Equilibrium that is socially deficient. Originally, the PD is
a one round game, but the IPD is a sequential PD often studied to
understand the effects of previous outcomes and the emergence of
cooperative behaviors.
SD
C
D
C
R, R
T, S
D
S, T
P, P
IPD
C
D
C
3, 3
5, 0
D
0, 5
1, 1
Figure 1: Payoff Matrix for Social Dilemmas and Iterated
Prisoner's Dilemma. The motivation to defect comes from
fear of an opponent defecting or acting greedily to gain the
maximum reward when one anticipates the opponent might
cooperate.
LEARNING THROUGH PROBING
In this section, we present and summarize the architecture and
learning methodology of the probing technique that we apply to
RL agents. Each agent consists of two separate components that
we term the probe and the player. Each player i has a policy πpi
parameterized by θpi . Each probe, similarly, has a policy πbi param-
eterized by θbi . The role of the probe is to generate experiences
(st , at , rt +1, st +1) that account for opponent strategy changing due
to learning when performing action at after observing st . The even-
tual consequences of this action are measured by aggregating the
rewards of the total sequence of events τ over a finite time horizon
T . This is an adjusted experience to capture the affects of taking
that action on the opponent's policy which will eventually be used
to train the player component. To start, each probe must gauge
the consequences of a type of action. Paired with an opponent, the
probes explore the environment and store experiences in a replay
buffer. These experiences are then grouped according to the ac-
tions of the opponent. The probe then updates on the subset of
experiences and continues to play versus its opponent. Each probe
update is based on the set of opposing experiences stored. After
taking a one-step update based on these initial experiences, the
probes play against each other according to their learned policies
and repeat the process for T updates. Eventually, the sequence
τ = (s0, a0, r1, s1, ..., sT−1, aT−1, rT , sT ) is stored.
During the probing phase, the experiences are grouped by the
tuple (a1, a2), the agent's action and opponent's action similarly
to JAL and agent-tracking methods. Alternatively, actions could
grouped according to the reward outcome. In the context of the
PD, grouping actions according to the opponent's action or the
reward outcome is the same, however, in general, grouping while
considering the opponent's action is less ambiguous.
R(τ) =T
After the probes have interacted and generated experiences,
the rewards of the resulting sequences τ are adjusted such that
t =1 ηt−1rt and are used to train the player components
of the agents. η is an added discount through updates term to de-
termine how many future interactions the agent should consider.
By manipulating the value of η we can determine how each player
values the approximated long-term outcome and η = 0 indicates
an approach identical to Q-learning. The gradient of the player
updates according to
Qπi +1(s, a) ← Qπi(s, a) − R(τ) + γ max
a
Qπi(s
′
, a
′)
After training has concluded on the adjusted experiences, the
learned policy is transferred to the probe. When only one of the
participants is learning to maximize an RL objective function the
architecture is adjusted so that the probe interacts directly with the
opponent rather than establishing a probing phase for both agents.
IMPLEMENTATION AND EXPERIMENTS
In this section, we describe the methodology and experimental
setup. The first subsection describes how RL agents train against
Axelrod agents simultaneously, and compares and contrasts the
results of Q-learning and Hyper-Q-learning to examine how policy
prediction improves learning under certain conditions. The sec-
ond subsection describes how we tackle these difficulties using a
probing technique and Q-learning to account for behavior changes
through updates and investigating the influence of this new learning
methodology on the emergence of cooperation. The default neural
networks had two hidden layers with 40 hidden units and ReLU
activation functions. Agents were trained with gradient descent
with a buffer size of 1e5, learning rate of 1e-4 and a batch size of
300. Exploration, ϵ, was initially set to 1.0 and decreased linearly
with iterations, stopping at 0.1. The discount rate γ was set to 0.99.
Target networks were also used to further stabilize training. After
testing multiple values for the time horizon, T , we set it to 5. Us-
ing values greater than 5 produced results that were very similar
while using values smaller than 5 had a higher variance. Finally, the
Figure 2: Learning through Probing architecture diagram involving two RL agents. 1) After exploring the environment, the
probe component trains on subsets of experiences to learn consequences for actions. Actions are then selected according to a
learned policy. 2) Experiences are collected into a replay buffer and adjusted. 3) The player component trains on the adjusted
experiences. 4) The players are matched against each other after training. 5) In continuously adaptive games, probes could
adopt learned player policies and adapt their strategies over time.
b2
,
,
b2
i
, θ
b2
i
b1
i
b1
b2
b1
i
b2
i
b2
o
b1
i
b1
i ← Dilemma(aдent1, aдent2)
i ),(o
b1
o
i
i ← θ
a1
(o
b1
i +1, r
replay_buffer1.append(o
replay_buffer2.append(o
i ← θ
a2
b2
i +1, r
, a1
i , r1
i , o
i , r2
, a2
i , o
i +1)
i +1)
i ) ← Dilemma.play(a1
Algorithm 1 Learning through Probing
1: Input: ← θ
2: for i in ranдe(0, episode) do
3:
4:
5:
6:
7:
8: end for
9: group experiences according to joint actions(a1
10: and store in separate buffers
11: for buffer in replay_buffers do
12:
13:
14:
15:
16:
17:
18:
19:
20:
21: end for
b1
22: reset θ
i
23: Adjust overall sequences τ1, τ2
24: Train players, θ
b1
Update θ
t
t ← bu f f er
b2
b1
o
o
t ,
for t in ranдe(0,T) do
t ← θ
a2
i ),(o
b2
t +1, r
b2
i
b1
t
end for
τ1 ← (o
t , a1
t , r1
b1
t , o
τ2 ← (o
t , r2
t , a2
b2
t , o
b2
i
t ← θ
a1
b1
t
(o
b1
b1
t +1, r
Update θ
t +1, ..., a1
t +1, ..., a2
t +1, a1
b1
t +1, a2
b2
t +1, r1
t +1, r2
T , r1
T , r2
, θ
b2
t
b2
t
, θ
,
, θ
i )
i , a2
i )
i , a2
b1
b2
T +1)
T +1)
T , o
T , o
b2
t ) ← Dilemma.play(a1
t)
t , a2
p1
i
, θ
p2
i on adjusted experiences, τ1, τ2
third section describes the external aspects of learning in artificial
societies and the impact on agent behavior.
RL Agents versus Axelrod Agents
The Axelrod library [13] contains an extensive set of strategies that
have been used in previous Axelrod tournaments as well as those
that have been rigorously covered in scientific literature. We will
refer to the collection of these strategies as "Axelrod agents". All
strategies in the tournament follow a simple set of rules: players
are unaware of the number of turns in a match, players carry no
acquired state between matches, players cannot observe the out-
come of other matches and players cannot manipulate or inspect
their opponent in any way beyond what is required in a match. We
highlight a diverse set of strategies taken from the Axelrod library
that will be used as opponents.
Tit for Tat (TFT). The Tit for Tat strategy is a forgiving strategy
that will cooperate on the first move and then perform the same
action as the opponent's most recent move.
Punisher. The Punisher strategy is a grudging strategy that
starts by cooperating, however, if at any point its opponent defects,
it will defect for memory length where memory length is propor-
tional to the opponent's historical percentage of defecting.
Forgetful Grudger. The Forgetful Grudger strategy is a grudg-
ing strategy which defects for a fixed length of time if an opponent
defects at any point. If an opponent cooperates for long enough it
forgets its grudge and will cooperate until it sees another defection.
Prober. The Prober strategy plays an initial sequence of moves
to feel out an opponent's strategy. It keeps a count of defections
that are retaliating and defections that are unmerited. If the number
of justified defections and number of unjustified defections differs
by more than 2, cooperate for the next 5 turns and then play TFT's
strategy. Otherwise defect forever.
Sneaky. The Sneaky strategy is an original strategy that tracks
the three most recent actions of the opponent. If all three actions
are to cooperate, then it will defect. Also, if the total number of
opponent defections are greater than the total number of opponent
(a) Average cumulative rewards and standard deviation for various RL agents
over 20 encounters at numerous training iterations.
(b) Average rewards and standard deviation of LTP agents over 20 timesteps
trained with various η values.
Figure 3: (a) The blue line shows the results achieved by LTP agents trained with η = 0.99. These agents learn to cooperate
early and consistently with decreasing variance with more training iterations indicating stable performance. Trained with
η = 0.01, LTP agents are slower to converge than Deep-Q or Hyper-Q agents, however, achieve similar results with consistency.
Hyper-Q agents are the quickest in learning to defect. (b) Agents trained with higher η values learn cooperative policies with
little error rate. A threshold value specific to the used configuration of the IPD is noted at approximately η = 0.7.
cooperations then it will defect.
Some of these agents, like the Prober, are not stationary to begin
with but converge to stationary distributions given enough time.
We refer to these as quasi-stationary behaviors. Q-learning, Hyper-
Q-learning and LTP agents are each trained to play against the
above agents. Agents are able to observe the previous four actions
taken by themselves and their opponent. Each match lasts for 100
timesteps. Agents are paired using a round robin matchmaking
format. This was run for 10,000 episodes. For Q-learning and Hyper-
Q-learning agents, ϵ was set to 1.0 initially and decreased linearly
with iterations until it reached 0.1.
RL Agents versus RL Agents
We carry out experiments in order to see how Q-learning agents,
Hyper-Q-learning agents and LTP agents perform against their
counterparts in the IPD. Each state was characterized by the agent's
and its opponent's previous four interactions. Agents had no in-
formation about who they were playing with beyond what was
available in the observation data. While versus Axelrod agents,
though Q-learning and Hyper-Q learning agents keeping an explo-
ration rate at 1.0 is feasible when playing against static strategies,
Hyper-Q relies on developing accurate predictions of an opponent's
next move and so we ensure that the observed policies are non-
random. We train LTP agents against one another using η values
of 0.99, 0.7, 0.5, and 0.01 to demonstrate the effect of accounting for
behavioral adaptations. These agents play against each other for
1000 iterations. After each iteration agents would play the IPD for
20 timesteps and the cumulative reward was recorded.
External Factors Influencing Agent Learning
The emphasis in current multiagent RL is to stationarize the envi-
ronment using techniques that give the agent more information
about the dynamics of the environment. However, in the previous
section, we use an adaptation to training without changing the
RL objective function or using a centralized control function. In
this experiment we will also adapt training of Q-learning agents so
they develop cooperative tendencies by inserting other agents into
the environment that act as regulators. In open environments such
as artificial societies, agents are likely to come into contact with
unseen scenarios and their learning in these new environment is
hard to predict. We are interested in understanding what happens
when an agent is inserted in an unseen multi-agent environment
with given dynamics, like a society with established social norms
and how we can control for certain types of behavior without spec-
ifying changes to the agent's objective function. Evaluating these
developmental aspects may provide key insights to understanding
how types of behaviors are established in a society or how certain
behaviors might provide the basis for stable social norms while
others might not. We look to demonstrate in a simple, yet insightful,
way that agents' behaviors may change in society based on their
encounters with others and how this analysis can be useful for
understanding social interactions.
We start with an environment that features only two players,
both RL agents that train with a Q-learning update. TFT agents are
added one-by-one to the environment to observe the changes in
Q-values. Sneaky agents and Punisher agents are also added to see
how cumulative reward increases and decreases. The format was
(a) 0 TFT agents
(b) 1 TFT agents
(c) 2 TFT agents
(d) 1 Sneaky agent, 0 TFT agents
(e) 1 Sneaky agent, 1 TFT agents
(f) 1 Sneaky agent, 2 TFT agents
(g) 1 Punisher agent, 0 TFT agents
(h) 1 Punisher agent, 1 TFT agents
(i) 1 Punisher agent, 2 TFT agents
Figure 4: Adapting surroundings using TFT agents to get two independent Q-learning agents to cooperate in the IPD. (a) Q-
learning agents learn independently to play the IPD and both learn defecting policies to achieve the minimum cumulative
reward. As more TFT agents are introduced, cumulative reward rises. In (b) one TFT agent agents perform significantly better
and in (c) two TFT agents both Q-learning agents learn to cooperate consistently achieving the maximum cumulative reward
with less variance. We further display the changes in agent reward with a Sneaky agent and TFT agents, displayed in (d-f), and
a Punisher agent and TFT agents, displayed in (g-i).
modeled as a random encounters where each agent was matched
with a random opponent with equal probability. Each match lasted
for 20 timesteps, with each agent performing a total of 500 updates,
one after each match. RL agents implemented ϵ-greedy policies
with ϵ decreasing linearly.
RESULTS AND DISCUSSION
Optimal Policies under Stationary Distributions
Individually, Q-learning agents and Hyper-Q learning agents score
well against Axelrod agents due to their patterned behavior. The
strategies that Axelrod agents use can be considered stationary
and it is straightforward for the RL agents to learn an appropriate
policy to play when matched against these agents provided that
they have access to enough information to determine their strategy.
In the case of the Sneaky agent, it requires at least four previous
interactions at every time step in order to learn the optimal policy
as it can then determine what the pattern in its behavior is. Both Q-
learning and Hyper-Q-learning perform well against these agents.
However, against the Prober agent, Hyper-Q performs significantly
better and more consistently than either of the other two RL agents
demonstrating an advantage of agent-tracking techniques in quasi-
stationary environments. The average scores over 100 timesteps are
recorded in Table 1. Overall, when matched with the Axelrod agents,
LTP agents achieve desirable results versus all the opponents and
perform at least as well as Q-learning though Hyper-Q outperforms
both.
TFT Punisher
300
Hyper-Q 300
300
300
300
300
Q
LTP
Prober
166.7
305
154.5
Sneaky
391.6
400
384.9
FG
300
300
300
Table 1: Average scores vs. Static agents
Incorporating Information about Future
Behaviors
In the case of LTP versus LTP agents, we observe that the agents
are able to consistently achieve maximum cumulative reward when
playing in the IPD. A variety of learned policies can be observed by
setting η to different values. By setting the value of η to 0.99 (the
same for all the agents), LTP agents heavily favor cooperation and
consistently learn to cooperate with each other. In Figure 3 we see
the scores of LTP agents trained when η = [0.01, 0.5, 0.7, 0.99]. Be-
tween η = 0.01 and η = 0.5 there are no stark differences and both
result in defecting policies. When η = 0.7 there is a noticeable sep-
aration from a "defect only"-type policy. LTP agents with η values
of less than 0.7 learn to defect following a similar trajectory to that
of Q-learning and Hyper-Q-learning. With η greater than 0.7 both
agents learn cooperative policies to achieve the maximum cumu-
lative reward. When matching Q-learning agents with each other,
they learn defecting policies every time over the course of 10,000
iterations. The number of times they defect increases exponentially
until every action taken is to defect. While Hyper-Q-learning agents
outperformed the other algorithms versus stationary agents, they
performs poorly in this scenario. As the exploration rate decreases,
the predicted probability of the opponent defecting increases and
Hyper-Q agents learn to defect the quickest with negligible vari-
ance. We expect this will be further compounded using sampling
techniques and buffer refreshing for social dilemmas as the new
policies learned by its opponent will involve a higher likelihood
to defect than before. Since the optimal policy to play against an
opponent that is increasingly likely to defect is to defect oneself,
predicting what the opponent might do next is not a viable strategy
to maximize cumulative reward in the IPD. However, as LTP agents
demonstrated, it is beneficial to take actions that maximize reward
conditioned on changes in an opponent's behavior.
Cooperative Behavior in Presence of Stable
Norms
This experiment demonstrates how we can adjust the learning of
our Q-learning agents by adapting the training procedure. We dis-
play the changes in the behavior of two Q-learning agents that
would normally learn defect under a regular training procedure af-
ter interacting with regulating TFT agents. As can be seen in Figure
3, neither Q-learning agents nor agent-tracking agents like Hyper-
Q learning learn to cooperate with one another when matched
together in the IPD. However, we can show that tailoring their
overall experience without explicitly changing the cost function
or reward function, they can learn to cooperate with other RL
agents which is an interesting find as it better represents how these
agents would act in societal-like contexts rather than closed envi-
ronments. By adding TFT agents to the environment and modeling
it as random-encounters, the Q-values associated with cooperative
behavior increase as the punishment for defecting is more likely
to be immediate. In this way, the strategy of defecting is regulated
by other existing agents. When facing other agents that are also
exploring the environment, a Q-learning agent may be able to reap
rewards from defecting behavior before other agents have adapted.
This would cause the rest of the agents to also learn defecting be-
havior as shown in Figure 3. However, in a more strict environment,
this behavior can be punished. By inserting more TFT agents into
the environment, this behavior can be eliminated altogether and
agents will learn to cooperate with one another consistently as
shown in Figure 4. In addition, we can see that with only additional
TFT agents in the environment, both agents achieve similar end
rewards with neither consistently exploiting the other. In contrast,
when a Sneaky agent is present, agent 1 barely manages to attain
any reward as it has learned some cooperative behavior while agent
2 has learned primarily to defect due to the Sneaky agent's presence.
When two TFT agents are introduced as shown in Figure 4 (f), de-
fecting behavior can be regulated. However, one agent still manages
to take advantage of the other and they do not achieve maximum
cumulative reward as consistently. Surprisingly, the addition of a
Punisher agent is not effective in producing cooperative behavior
between agents. Though agents are punished in a similar fashion to
TFT (immediate retaliation) this scenario lacks the consistency of
TFT and the involvement of another RL agent exploring simultane-
ously. From these experiments we see that TFT is most successful
out of the selected agents to regulate behavior and encourage RL
agents to be cooperative. Hyper-Q agents do not learn to coop-
erate with each other in this setting. When paired versus other
Hyper-Q learning agents, they continue to learn defecting policies
when matched together and are unable to achieve the same results.
In this regard, it is more difficult to regulate their strategies and
are therefore these agents are less suitable for cooperation games.
These initial experiments provide insights about the emergence of
cooperation (or other behaviors) in the presence of environments
or societies with stable pre-established dynamics, i.e., social norms.
CONCLUSION
In this paper we have presented a novel architecture for agents to
learn optimal strategies for the IPD where elements of cooperation
and competition are prevalent and important. Our LTP agents suc-
cessfully learn to cooperate with one another by demonstrating
changes to behavior via the use of probes and adjusting experiences
to reflect these changes. We also show that these agents are able
to learn optimal strategies when matched against stationary and
quasi-stationary agents that have been used in Axelrod tourna-
ments without adapting the objective function, focusing only on
variations to training. We plan to focus on scaling this research to
investigate more advanced social dilemmas and to incorporate the
useful aspects of agent-tracking techniques to broaden the applica-
bility of our approach. Building on this work, we also plan to study
further how different types of behaviors may emerge in agent so-
cieties and how they might develop according to their surroundings.
[31] Ming Tan. 1993. Multi-agent reinforcement learning: Independent vs. cooperative
[32] Gerald Tesauro. 2004. Extending Q-learning to general adaptive multi-agent
agents. In ICML, Vol. 10. 330 -- 337.
systems.. In NIPS. 871 -- 878.
[33] Eiji Uchibe and Kenji Doya. 2004. Competitive-Cooperative-Concurrent Rein-
forcement Learning with Importance Sampling. In Proceedings of International
Conference on Simulation of Adaptive Behavior: From Animals to Animats. 287 -- 296.
[34] Chao Yu, Minjie Zhang, Fenghui Ren, and Guozhen Tan. 2015. Emotional multi-
agent reinforcement learning in spatial social dilemmas. IEEE Transactions on
Neural Networks and Learning Systems (2015), 3083 -- 3096.
[35] Chonjie Zhang and Victor R Lesser. 2010. Multi-Agent Learning with Policy
Prediction. In AAAI.
REFERENCES
[1] Sander Adam, Lucian Buçoniu, and Robert Babuška. 2012. Experience replay for
real-time reinforcement learning control. IEEE Transactions on Systems, Man, and
Cybernetics, Part C (Applications and Reviews) 42, 2 (2012), 201 -- 212.
[2] Robert Axelrod and William Donald Hamilton. 1981. The evolution of cooperation.
Science 221, 4489 (1981), 1390 -- 1396.
[3] Robert Boyd and Peter J Richerson. 2009. Culture and the evolution of human
cooperation. Philosophical Transactions of the Royal Society of London B: Biological
Sciences 364, 1533 (2009), 3281 -- 3288.
[4] Lucian Buçoniu, Robert Babuška, and Bart De Schutter. 2010. Multi-agent re-
Innovations in Multi-agent Systems and
inforcement learning: An overview.
Applications 1, 310 (2010), 183 -- 221.
[5] Caroline Claus and Craig Boutilier. 1998. The dynamics of reinforcement learning
in cooperative multiagent systems. AAAI/IAAI (1998), 746 -- 752.
[6] Tim Clutton-Brock. 2004. Cooperation between non-kin in animal societies.
Nature 462, 7269 (2004), 51.
[7] Ido Erev and Alvin E Roth. 1998. Predicting how people play games: Reinforce-
ment learning in experimental games with unique, mixed strategy equilibria.
American Economic Review (1998), 848 -- 881.
[8] Ernst Fehr and Urs Fischbacher. 2004. Social norms and human cooperation.
Trends in Cognitive Sciences 8, 4 (2004), 185 -- 190.
[9] Jakob Foerster, Richard Y Chen, Maruan Al-Shedivat, Shimon Whiteson, Pieter
Abbeel, and Igor Mordatch. 2018. Learning with Opponent-Learning Awareness.
In AAMAS.
[10] Jakob Foerster, Nantas Nardelli, Gregory Farquhar, Triantafyllos Afouras,
Philip HS Torr, Pushmeet Kohli, and Shimon Whiteson. 2017. Stabilising ex-
perience replay for deep multi-agent reinforcement learning. In ICML.
[11] Junling Hu and Michael P. Wellman. 2003. Nash Q-learning for general-sum
stochastic games. Journal of Machine Learning Research 4, 1 (2003).
[12] Spiros Kapetanakis and Daniel Kudenko. 2002. Reinforcement learning of coor-
dination in cooperative multi-agent systems. In AAAI/IAAI. 326 -- 331.
[13] Vincent A. Knight, Owen Campbell, Marc Harper, and Karol M. Langner et al.
2016. An open reproducible framework for the study of the Iterated Prisoner's
Dilemma. Journal of Open Research Software 4, 1 (2016).
[14] Paul AM Van Lange, Jeff Joireman, Craig D Parks, and Eric Van Dijk. 2013. The
psychology of social dilemmas: A review. Organizational Behavior and Human
Decision Processes 120, 2 (2013), 125 -- 141.
[15] Joel Z Leibo, Vinicius Zambaldi, Mac Lanctot, Janusz Marecki, and Thore Graepel.
2017. Multi-agent reinforcement learning in sequential social dilemmas. In
AAMAS. 464 -- 473.
[16] Adam Lerer and Alexander Peysakhovich. 2017. Maintaining cooperation in
complex social dilemmas using deep reinforcement learning. arXiv preprint
arXiv:1707.01068 (2017).
[17] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, Pieter Abbeel, and Igor Mordatch.
2017. Multi-agent actor-critic for mixed cooperative-competitive environments.
In NIPS. 6379 -- 6390.
[18] Michael W Macy and Andreas Flache. 2002. Learning dynamics in social dilemmas.
Proceedings of the National Academy of Sciences 99, suppl 3 (2002), 7229 -- 7236.
[19] Jason R Marden, Gürdal Arslan, and Jeff S Shamma. 2009. Joint strategy fictitious
play with inertia for potential games. In IEEE Transactions on Automatic Control,
Vol. 54. 208 -- 220.
[20] Laëtitia Matignon, Guillaume Laurent, and Nadine le Fort-Piat. 2007. Hysteric
Q-Learning: an algorithm for decentralized reinforcement learning in cooperative
multi-agent teams. In IEEE/RSJ International Conference on Intelligent Robots and
Systems. 64 -- 69.
[21] Martin Nowak. 2006. Five rules for the evolution of cooperation. Science 314,
5805 (2006), 1560 -- 1563.
Nature 437, 7063 (2005), 1291.
[22] Martin A Nowak and Karl Sigmund. 2005. Evolution of indirect reciprocity.
[23] Elinor Ostrum, Roy Gardner, and James Walker. 1994. Rules, games, and common-
pool resources. University of Michigan Press.
[24] Julien Perolat, Joel Z Leibo, Vinicius Zambaldi, Charles Beattie, Karl Tuyls, and
Thore Graepel. 2017. A multi-agent reinforcement learning model of common-
pool resource appropriation. In NIPS. 3643 -- 3652.
[25] Anatol Rapoport. 1974. Prisoner's Dilemma -- Recollections and observations.
Game Theory as a Theory of a Conflict Resolution (1974), 17 -- 34.
[26] Tuomas W Sandholm and Robert H Crites. 1996. Multiagent reinforcement
learning in the Iterated Prisoner's Dilemma. Biosystems 37, 1-2 (1996).
[27] Tom Schaul, John Quan, Ioannis Antonoglou, and David Silver. 2016. Prioritized
experience replay. In ICLR.
[28] Yoav Shoham, Rob Powers, and Trond Grenager. 2003. Multi-agent reinforcement
learning: a critical survey. Technical report, Stanford University (2003), 1 -- 13.
[29] Jeffrey R Stevens and Marc D Hauser. 2004. Why be nice? Psychological con-
straints on the evolution of cooperations. Trends in Cognitive Sciences 8, 2 (2004),
60 -- 65.
[30] Richard S Sutton and Andrew G Barto. 1998. Reinforcement Learning: An Intro-
duction. MIT Press.
|
1804.08667 | 1 | 1804 | 2018-04-23T18:55:05 | Influencing Flock Formation in Low-Density Settings | [
"cs.MA",
"cs.AI"
] | Flocking is a coordinated collective behavior that results from local sensing between individual agents that have a tendency to orient towards each other. Flocking is common among animal groups and might also be useful in robotic swarms. In the interest of learning how to control flocking behavior, recent work in the multiagent systems literature has explored the use of influencing agents for guiding flocking agents to face a target direction. The existing work in this domain has focused on simulation settings of small areas with toroidal shapes. In such settings, agent density is high, so interactions are common, and flock formation occurs easily. In our work, we study new environments with lower agent density, wherein interactions are more rare. We study the efficacy of placement strategies and influencing agent behaviors drawn from the literature, and find that the behaviors that have been shown to work well in high-density conditions tend to be much less effective in lower density environments. The source of this ineffectiveness is that the influencing agents explored in prior work tended to face directions optimized for maximal influence, but which actually separate the influencing agents from the flock. We find that in low-density conditions maintaining a connection to the flock is more important than rushing to orient towards the desired direction. We use these insights to propose new influencing agent behaviors, which we dub "follow-then-influence"; agents act like normal members of the flock to achieve positions that allow for control and then exert their influence. This strategy overcomes the difficulties posed by low density environments. | cs.MA | cs | Influencing Flock Formation in Low-Density Settings
Daniel Y. Fu
Harvard University
Cambridge, MA, USA
[email protected]
Peter M. Krafft
Massachusetts Institute of Technology
Cambridge, MA, USA
[email protected]
ABSTRACT
Flocking is a coordinated collective behavior that results from local
sensing between individual agents that have a tendency to orient
towards each other. Flocking is common among animal groups and
might also be useful in robotic swarms. In the interest of learning
how to control flocking behavior, recent work in the multiagent
systems literature has explored the use of influencing agents for
guiding flocking agents to face a target direction. The existing
work in this domain has focused on simulation settings of small
areas with toroidal shapes. In such settings, agent density is high,
so interactions are common, and flock formation occurs easily. In
our work, we study new environments with lower agent density,
wherein interactions are more rare. We study the efficacy of place-
ment strategies and influencing agent behaviors drawn from the
literature, and find that the behaviors that have been shown to
work well in high-density conditions tend to be much less effective
in lower density environments. The source of this ineffectiveness
is that the influencing agents explored in prior work tended to
face directions optimized for maximal influence, but which actu-
ally separate the influencing agents from the flock. We find that
in low-density conditions maintaining a connection to the flock
is more important than rushing to orient towards the desired di-
rection. We use these insights to propose new influencing agent
behaviors, which we dub "follow-then-influence"; agents act like
normal members of the flock to achieve positions that allow for
control and then exert their influence. This strategy overcomes the
difficulties posed by low density environments.
KEYWORDS
Ad hoc teamwork; flocking; influence maximization; collective be-
havior; algorithms; simulation studies
ACM Reference Format:
Daniel Y. Fu, Emily S. Wang, Peter M. Krafft, and Barbara J. Grosz. 2018.
Influencing Flock Formation in Low-Density Settings. In Proc. of the 17th
International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2018), Stockholm, Sweden, July 10–15, 2018, IFAAMAS, 9 pages.
8
1
0
2
r
p
A
3
2
]
A
M
.
s
c
[
1
v
7
6
6
8
0
.
4
0
8
1
:
v
i
X
r
a
Emily S. Wang
Harvard University
Cambridge, MA, USA
[email protected]
Barbara J. Grosz
Harvard University
Cambridge, MA, USA
[email protected]
1 INTRODUCTION
Flocking behavior can be found in a variety of species across na-
ture, from flocks of birds to herds of quadrupeds, schools of fish,
and swarms of insects. Researchers have argued that flocking as
a collective behavior emerges from simple, local rules [22]. It is
therefore natural to imagine placing externally-controlled artificial
agents into flocks to influence them. Yet it remains an open ques-
tion whether such techniques are actually effective. Previous work
[3–9] has explored the use of influencing agents to guide flocking
agents to face a target direction in small and toroidal1 settings, but
in such settings, agent density is high, so interactions are common,
and flock formation is rapid.
In the present work, we focus on lower-density settings where
interactions are rarer and flock formation is more difficult. We study
how influencing agent priorities must change in these settings to be
successful and propose new influencing agent strategies to adapt to
the challenges posed by these settings. Low-density settings are im-
portant to study because they capture dynamics in situations where
flocking may not occur naturally, but where we might want to in-
stigate flocking behavior; imagine a herd of buffalo that is currently
grazing, or a spooked flock of birds where individual agents fail to
coordinate. Our work may also have implications for coordination
in low-density swarms of robotic multi-agent systems, where con-
trol may be imperfect, such as RoboBees [1]. More broadly, flocking
has implications for consensus in animal groups [2, 23, 27] and in
human social networks [13]. Flocking algorithms have also been
used to simulate multivariate timeseries and human movement
[18, 20]. In all these cases, agent density may vary greatly, so it is
important to understand influencing agent dynamics in both low
density and high density settings.
To study flocking in lower density environments, we introduce
two new test settings. In one setting, we keep the simulation space
toroidal but increase the size of the space by several factors, greatly
decreasing agent density. Flock formation is still provably guaran-
teed [12] in this setting, but is much less rapid, so we study whether
influencing agents can speed up flock formation. In the second
setting, similar to existing "sheep herding" tasks [15], we use a
non-toroidal simulation space and start the flocking agents inside
a circle in the center. Since this space is non-toroidal, flock forma-
tion is not guaranteed, so we study whether influencing agents
Proc. of the 17th International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2018), M. Dastani, G. Sukthankar, E. André, S. Koenig (eds.), July 10–15, 2018,
Stockholm, Sweden. © 2018 International Foundation for Autonomous Agents and
Multiagent Systems (www.ifaamas.org). All rights reserved.
1In a toroidal environment, agents that exit the simulation space from one side imme-
diately re-appear on the other side.
can instigate flocking behavior by keeping the flocking agents in a
pre-defined area, or by moving them all in a certain direction.
We find that results from the existing literature are not robust in
these environments with low agent density, since agent interactions
are more rare. In particular, with less frequent local interactions
between agents, maintaining a connection to the flock becomes a
key factor in the efficacy of influencing agent behaviors. Simple be-
haviors such as "face the goal direction" are often superior to more
complex behaviors that try to optimize for speed of convergence.
We experiment with a number of new strategies and find that a
multi-stage approach of "follow-then-influence" is most effective
in low-density environments. In this approach, influencing agents
start out by participating as normal members of the group, embed-
ding themselves inside small, naturally-forming flocks. After some
time, the influencing agents start pushing their neighbors to face a
given goal direction.
The main contributions of this work are:
• An investigation of two new low-density flocking settings,
where flock formation is more difficult.
• The introduction of new influencing agent behaviors to adapt
• Analysis of the major differences in influencing agent priori-
to the difficulties presented by these new settings.
ties in low-density vs. high-density settings.
The rest of this paper is organized as follows: §2 describes the
flocking model we use and the new test settings. §3 describes the
role of influencing agents and formalizes agent behaviors. §4 de-
scribes our experimental setup and the experiments we run to
evaluate agent behaviors in the new test settings, and §5 presents
the results. Finally, we conclude and discuss future work in §7.
2 PROBLEM DESCRIPTION
2.1 Flocking Model
Like other studies in the literature, we use a simplified version of
Reynold's Boid algorithm [17] to model the flock. In this simplified
model, also proposed independently by Vicsek and collaborators
[25], agents change their alignment at every step to be similar to
the average alignment of other agents in their neighborhood. At
each time step, each agent i moves with constant speed s = 0.7
and has orientation θi(t) with position pi(t) = (xi(t), yi(t)). At
timestep t, agent i updates its position based on its alignment:
xi(t) = xi(t − 1) + s cos(θi(t)) and yi(t) = yi(t − 1) + s sin(θi(t)).
At the same time, the agents change their orientation based on
the alignments of neighboring agents. Let the neighbors Ni(t) be
the set of agents at time t that are within neighborhood radius r
of agent i, not including agent i itself. At timestep t, each agent
updates its orientation to turn towards the average of its neighbors'
orientations:
Ni(t) Σj∈Ni(t)(cid:0)θj(t) − θi(t)(cid:1)
1
θi(t + 1) = θi(t) + 1
2
The factor of 1
2 in the second term reflects a "momentum" factor.
2.2 New Settings
Previous work has studied influencing agents in a small toroidal
150 × 150 grid, with neighborhood radius r = 20 [7, 8]. In this work,
we study low-density dynamics by introducing two new settings
that are more adverse to flock formation; we call these new settings
the large setting and the herd setting. In these settings, we set the
neighborhood radius to r = 10.
In the large setting, non-influencing agents are randomly placed
in a toroidal 1,000 × 1,000 grid with random initial orientations. The
larger grid size results in lower agent density; as a result, agents
start out much farther away from other agents' neighborhoods,
and interactions are much rarer. However, since the simulation
space remains toroidal, convergence to a single direction is still
provably guaranteed, so we are primarily interested in studying the
length of time to convergence in this case [12]. In the herd setting,
non-influencing agents are placed randomly in a circle of radius
500 whose origin lies at the center of a 5,000 × 5,000 non-toroidal
grid. When agents reach the edge of the grid, they move off-world;
in this way, agents can get "lost" from the rest of the flock. As a
result, convergence to a single flock is not guaranteed. Therefore,
we are interested in studying how well influencing agents can keep
the non-influencing agents from getting lost.
3 INFLUENCING AGENTS
We can change flock dynamics by introducing influencing agents
that we control. We refer to non-influencing agents as Reynolds-
Vicsek agents. We do not give the influencing agents any special
control over the Reynolds-Vicsek agents; we simply let them inter-
act with influencing agents using the same local sensing rules as
with any other agent. We also limit the influencing agents to have
the same speed as Reynolds-Vicsek agents, both to help the influenc-
ing agents "blend in" in real applications and to be consistent with
the related prior work. We let the influencing agents have a sensing
radius of twice the normal neighborhood radius. This allows the
influencing agents to see their neighbors' neighbors, allowing for
more complex algorithms. In some cases, the influencing agents
can communicate with each other, but they do not need a global
view.
3.1 Placement
Each influencing agent algorithm we use is decomposed into two
parts: a placement strategy and an agent behavior. Except for slight
modifications to make some of these strategies work in a circular
environment, the placement strategies we use are drawn from the
literature [3, 9]. The placement strategies we use in this work are
shown in Figure 1. We note that the question of how to maneuver
influencing agents to reach the positions given by these placement
strategies is important, but out of scope for this paper. For a dis-
cussion of this question, we refer the reader to Genter and Stone
[3, 8].
We use three placement strategies for the large setting: random,
grid, and k-means. The random placement strategy, as its name
suggests, places influencing agents randomly throughout the grid.
The grid placement strategy computes a square lattice on the grid
and places influencing agents on the lattice points. This strategy
ensures regular placement of influencing agents throughout the
grid. The k-means placement strategy uses a k-means clustering
algorithm on the positions of Reynolds-Vicsek agents in the simula-
tion space. This strategy finds a cluster for each influencing agent
Table 1: Summary of the behaviors we investigate
Setting Goal Type Name
Large
Herd
Traveling
Stationary
Face
Offset Momentum
One-Step Lookahead
Coordinated
Multistep
Face
Offset Momentum
One-Step Lookahead
Coordinated
Circle
Polygon
Multicircle
Description
Always face goal direction
Offset last average velocity
Simulate one step, choose best
Pair off and coordinate
Follow-then-influence
(As above)
(As above)
(As above)
(As above)
Trace circle around agents
Trace polygon around agents
Follow-then-influence
Figure 1: The different placement strategies we explore in
this paper. Red agents are influencing agents, and white
agents are Reynolds-Vicsek agents. Note that k-means is the
only placement strategy where the placement of influencing
agents depends on placement of Reynolds-Vicsek agents.
by setting k equal to the number of influencing agents, and then
places an influencing agent at the center of each cluster.
We develop similar placement strategies for the herd setting,
with some slight modifications. To adapt the strategies to a circular
arrangement of agents, we define each strategy in terms of some
radius r about an origin O, except for the k-means strategy, which
remains the same. We modify the random placement strategy to
randomly distribute agents within the circle of radius r about the
origin O, instead of the entire simulation space. We adapt the grid
placement strategy to a circular setting using a sunflower spiral
[19]. In polar coordinates relative to O, the position of the n-th in-
fluencing agent in a sunflower spiral is given by (c
ϕ2 n), where
ϕ is the golden ratio, and c is a normalizing constant such that the
last influencing agent has distance r from O. We also introduce
a circular placement strategy, inspired from the border strategies
used in prior work [9]. This strategy places agents on the circum-
ference of the circle of radius r around the origin O. We refer to
the circular strategies as circle-random, circle-grid, and circle-border,
respectively.
√
n, 2π
3.2 Behaviors
Once we have placed the influencing agents, we still need to design
how they will work together to influence the flock. We call this
aspect of the design "agent behaviors." In the present work we focus
on decentralized "ad-hoc" algorithms for the influencing agents,
since this class of algorithms has been the focus of the existing
multiagent systems literature on this topic [3, 6, 7]. A summary of
the behaviors we investigate is shown in Table 1.
3.3 Large Setting
For the large setting, we study four behaviors drawn from prior
work [7–9], and one new multistep behavior.
In previous work, Genter and Stone have introduced baselines
face and offset momentum behaviors, as well as more sophisticated
one-step lookahead and coordinated behaviors. Each of these behav-
iors aims to turn Reynolds-Vicsek agents to a pre-set goal angle θ∗
Influencing agents using the face behavior always face the angle θ∗.
With the offset momentum behavior, influencing agents calculate
the average velocity vector of the agents in their neighborhood,
and align to a velocity vector that, when added to the average ve-
locity vector, sums to the vector pointing in direction θ∗. We note
that such a vector always exists; if the average velocity vector is
(x, y), and θ∗ is represented by vector (x′, y′), then the agents align
to vector (x′ − x, y′ − y). A one-step lookahead influencing agent
cycles through different angles and simulates one step of each of its
neighbors if it were to move in that angle. It adopts the angle that
results in the smallest average difference in angle from θ∗ among
all its neighbors. Finally, with the coordinated behavior, each agent
pairs with another and runs a one-step lookahead to minimize the
average difference in angle from θ∗ among both their neighbors.
For a more detailed explanation of these behaviors, especially the
coordinated behavior, we direct the reader to Genter and Stone [7].
The multistep behavior is a novel contribution and adopts what
we call a "follow-then-influence" behavior. In the initial stage, influ-
encing agents simply behave like normal Reynolds-Vicsek agents;
as a result, they easily join flocks and become distributed through-
out the grid. At the same time, each influencing agent estimates how
many Reynolds-Vicsek agents are path-connected to it; here, we de-
fine two agents as being path-connected if there is a path between
them, where edges are created by two agents being in each other's
neighborhood. An accurate calculation of path-connectedness re-
quires a global view from every influencing agent, since paths may
extend arbitrarily far away from the influencing agent. In our algo-
rithm, we only consider Reynolds-Vicsek agents that are within the
sensing radius of the influencing agents. Given their local estimates,
the influencing agents compute a global sum of all their estimates;
once that sum passes over some threshold T , the influencing agents
calculate the average angle θ among all the agents that are locally
connected to influencing agents, and from there adopt the face
behavior with goal direction θ.
We also explore some variations of the multistep behavior by
noticing that once the sum of connected agents passes the thresh-
old T , any of the other behaviors studied can be used to turn the
Reynolds-Vicsek agents towards the final goal direction θ. In other
words, the multistep behavior can be paired with any other behavior.
We study these pairings to see how effective they are.
3.4 Herd Setting
For the herd setting, we divide the behaviors into two categories:
traveling behaviors and stationary behaviors. As a reminder, in
the herd setting, the simulation space is non-toroidal, and all the
Reynolds-Vicsek agents start in a circle in the center. In this set-
ting, flock formation is not guaranteed, so we are interested in
using influencing agents to instigate flocking behavior. There are
two different choices we can make; we can either try to force the
Reynolds-Vicsek agents to stay in the center (stationary behaviors),
or we can let the influencing agents direct the Reynolds-Vicsek
agents away from their initial starting position (traveling behav-
iors). Since all the agents have a constant speed, the former is much
more difficult than the latter, so we must evaluate them separately.
For the traveling behaviors, we can use all the behaviors used in
the large setting, except for the multistep behavior. Since the world
is non-toroidal, it is not guaranteed that the number of connected
agents will ever pass the threshold T ; in this case, the influencing
agents would simply wander forever.
We study three stationary behaviors: circle, polygon, and multi-
circle. The circle and polygon behaviors have each influencing agent
trace a circle or polygon around the origin. For placement strategies
where influencing agents have different distances to the origin, the
influencing agents simply trace circles and polygons of different
radii.
The multicircle behavior is analogous to the multistep behavior
from large. The influencing agents start out by circling around the
origin and wait for Reynolds-Vicsek agents to enter their neigh-
borhood. Once they detect Reynolds-Vicsek agents in their neigh-
borhood, they adopt a "following" behavior where they act like
Reynolds-Vicsek agents to integrate into a small flock. They con-
tinue this following stage until reaching a final radius rF , at which
point they again adopt a circling behavior. In addition to building
influence by following before influencing, this behavior also makes
maintaining influence easier; since the final radius is larger than
the original radius, the final path turns less sharply than if the
influencing agents had stayed at their original radius. To the best of
our knowledge, this is the first presentation of such a multi-stage
behavior to induce circling behavior under the Reynolds-Vicsek
model in the literature.
4 EXPERIMENTAL SETUP
We extended the MASON simulator to run the experiments [14].
We used the default parameters for the Flocking simulation that is
included with the MASON simulator, except without any random-
ness, cohesion, avoidance, or dead agents. We sampled all metrics
every 100 time steps and ran all experiments for 100 trials.
4.1 No Influencing Agents
Previous literature compared new influencing agent behaviors with
baseline influencing agent behaviors, but did not compare to set-
tings with no influencing agents. In order to observe the marginal
contribution of influencing agents in future experiments, we start
our investigation of the large and herd settings by studying flock
formation in those environments without any influencing agents.
We use two metrics to understand flock formation: average number
of flocks formed and average proportion of lone agents at each time
step.
In the large setting, we test on a 1,000 × 1,000 grid and vary the
number N of Reynolds-Vicsek agents from 50 to 300 in increments
of 50. We run these simulations for 6,000 time steps. In the herd
setting, we use a 5,000 × 5,000 grid, position the herd in the center
of the grid with radius 500, and vary N from 50 to 300 in increments
of 50. We run these simulations for 6,000 time steps.
4.2 Influencing Agents
To evaluate the contributions of influencing agents in the large
setting, we measure time to convergence. We define convergence
as having half the Reynolds-Vicsek agents face the same direction,
since full convergence takes much longer.
We test the random, grid, and k-means placement strategies,
along with the full suite of behaviors in the large setting. We place
300 Reynolds-Vicsek agents on the grid and vary the number of
influencing agents from 10 to 100 in intervals of 10.
To evaluate the contributions of influencing agents in the herd
setting, we measure a slightly different metric. Since we have two
qualitatively different categories of behaviors (traveling behaviors
vs. stationary behaviors), the number of agents facing the same
direction is irrelevant. The stationary behaviors rotate the agents
around the origin (in fact, if the Reynolds-Vicsek agents are all
facing the same goal direction, the stationary behavior has failed).
Instead, we measure the number of Reynolds-Vicsek agents that are
connected to influencing agents at 15,000 time steps; at this point
in time, all the agents have travelled out of the grid, and no new
interactions occur. As a result, this quantity measures sustained
influence over the Reynolds-Vicsek agents over time.
In the herd setting, we examine the three circular placement
strategies-circle-border, circle-random, and circle-grid-with two
placement radii, 500 and 750, along with the k-means placement
strategy. We split our examination of behaviors between the travel-
ing behaviors (the same behaviors as used in the large setting, minus
the multistep behavior) and three stationary behaviors-circle, poly-
gon, and multicircle. We use a polygon with ten sides (a decagon)
for the polygon behavior, and we vary the final radius for the mul-
ticircle behavior based on the initial placement radius. When the
placement radius is 500, we set the final radius to 900; when the
placement radius is 750, we set the final radius to 1,100. We place
300 Reynolds-Vicsek agents on the grid and again vary the number
of influencing agents from 10 to 100 in intervals of 10.
5 RESULTS
5.1 No Influencing Agents
First, we briefly characterize the flocking behavior of a group of
Reynolds-Vicsek agents without influencing agents in the large and
herd settings. We measure the number of clusters of agents that
are path-connected and facing the same direction; each of these
clusters forms a small flock. We also measure the number of lone
agents (the number of agents with no neighbors). Figure 2 shows
graphs of these values over time for the two settings.
In the large setting, there are two qualitative stages of conver-
gence: initial flock formation and flock unification. In the first stage,
individual agents collide with each other and form small flocks, so
the number of flocks increases. In the second stage, these small
flocks that formed collide with one another and join together to
form larger flocks, so the number of flocks decreases. In Figure 2,
the first stage is represented by the initial increase in the average
number of flocks, and the second stage is represented by the fol-
lowing decrease in the average number of flocks. This behavior
is reflected in the continually decreasing number of lone agents;
since the number of lone agents continues to decrease over time,
we know that the decrease in the total number of flocks is due
to flock convergence. Note that when there are more total agents,
the absolute number of lone agents decreases faster and reaches
a similar value to the other cases by the end of the simulation. In
other words, the ratio of lone agents to total agents hits a lower
value when there are more agents, but the final absolute number of
total lone agents is still similar to the other cases.
The two stages of convergence also occur somewhat in the herd
setting, but the second stage is cut off by the non-toroidal nature of
the setup. As flocks leave the starting area, the chances of interact-
ing with other flocks vastly decreases, so most of the flocks formed
from the first stage never end up merging with other flocks. This
is reflected in the plateaus of both the total number of flocks and
the total number of lone agents. One small artifact in the metric
is worth mentioning; since the agents start off in a much smaller
area than in the large setting, many of the agents start out with a
non-zero number of neighbors. This causes the initial value of the
average number of flocks to be non-zero, and the average number
of lone agents to be less than the total number of agents.
5.2 Influencing Agents in the Large Setting
Next, we report on the efficacy of the behaviors in the large setting.
The average times for 50% convergence with different placement
strategies and the five behaviors are shown in Figure 3. We show
graphs for 300 Reynolds-Vicsek agents and 50 influencing agents
only, since the trends for the other numbers of influencing agents
were similar (the major difference being that when there are more
influencing agents, convergence happens faster, and when there
are fewer influencing agents, convergence happens slower). Note
that smaller is better in these graphs.
The most immediately striking finding is that, in less dense set-
tings, the one-step lookahead and coordinated behaviors significantly
underperform the "baseline" face and offset momentum behaviors,
irrespective of placement strategy. This is an opposite result from
Genter and Stone's findings on smaller simulation spaces [3, 7],
which found that the one-step lookahead and coordinated behaviors
outperform the face and offset momentum behaviors. This finding
is also rather counterintuitive; why should the "smarter" behaviors
underperform the simpler behaviors?
The answer is that, when agent interactions are rare, it is more
important for influencing agents to maintain influence than it is
for them to quickly change the direction of neighboring Reynolds-
Vicsek agents. The one-step lookahead and coordinated behaviors
underperform here because they tend to send influencing agents
away from neighboring agents. An example of this phenomenon is
shown in Figure 4. The influencing agent, shown in red, adopts an
orientation that turns neighboring Reynolds-Vicsek agents towards
the goal direction. Even though this action does turn Reynolds-
Vicsek agents towards the goal direction, the influencer cannot
successfully turn all the agents in a single step; as a result, the
influencing agent must maintain that orientation for future steps.
However, as long as the neighboring agents are not facing the goal
direction, the influencing agent's chosen orientation takes it away
from the center of the flock of Reynolds-Vicsek agents, causing
the agent to lose influence. Once the influencing agent has lost
influence, the agent has difficulty catching up with the same flock,
since influencing agents travel at the same speed2 as Reynolds-
Vicsek agents. As a result, the influencing agent is not actively
influencing the direction of any Reynolds-Vicsek agents until it
encounters another group of Reynolds-Vicsek agents.
Note that this effect also happens on a smaller simulation space,
but it is not nearly as pronounced; when interactions are very fre-
quent, influencing agents that have lost influence can find another
group of Reynolds-Vicsek agents very quickly. As a result, the gains
from the smarter local algorithm still outweigh the negative effects
from losing influence.
The multistep behavior does not suffer from the same problem;
it can both maintain influence and effectively turn Reynolds-Vicsek
agents and so outperforms all the other behaviors by a couple
hundred steps. When the multistep behavior is paired with the other
behaviors, though, it magnifies their inability to maintain influence.
The bottom graph of Figure 3 shows variations on the multistep
behavior, wherein influencing agents adopt different behaviors
after the number of Reynolds-Vicsek agents under control passes T .
Note that the variations that pair the multistep behavior with the
offset momentum, one-step lookahead, and coordinated behaviors
perform almost an order of magnitude worse than the multistep-face
behavior. What is the root cause of this difference? The multistep
behavior starts out by creating many local flocks, some of which
have influencing agents in them. When interactions are rare, the
offset momentum, one-step lookahead, and coordinated behaviors
have difficulty changing the orientation of existing flocks quickly
before losing influence. As a result, the multistep behavior takes an
order of magnitude longer to reach convergence when paired with
the other behaviors.
Finally, we note that the effect of placement behaviors on con-
vergence time are almost non-existent. When the density is lower,
2There are some approaches which remove this speed constraint from influencing
agents [11]. However, this choice allows for unrealistic behaviors wherein influencing
agents travel to one Reynolds-Vicsek agent at a time and change the direction of the
individual Reynolds-Vicsek agent before moving on to the next one. This behavior
results in Reynolds-Vicsek agents that are all facing the same direction, but that are
often not path-connected.
Figure 2: Average flock counts and lone agent counts over time for the large and herd settings with no influencing agents,
varying the number of Reynolds-Vicsek agents.
Figure 3: Average times to 50% convergence for 300 Reynolds-Vicsek agents with 50 influencing agents in the large setting
under different placement strategies and behaviors. Top: The five main behaviors for the large setting. Bottom: Variations on
the multistep behavior, in log scale. Smaller is better. Error bars show standard error of the mean.
there is a much smaller chance that any influencing agent will
start out with more than one Reynolds-Vicsek agent in its neigh-
borhood, even with the k-means placement behavior. As a result,
even the best clustering approach is almost the same as starting
out randomly or in a grid.
5.3 Influencing Agents in the Herd Setting
Next, we evaluate results for our experiments in the herd setting. In
many cases, measuring the number of agents facing the same direc-
tion is not interesting here, since it is impossible to keep Reynolds-
Vicsek agents in one place if they are facing the same direction.
Instead, we exclusively measure the number of Reynolds-Vicsek
agents that are path-connected to influencing agents and facing
the same direction as the influencing agent. This is a measure of
"control" of the Reynolds-Vicsek agents. The average number of
agents in such local flocks after 15,000 time steps is given in Figure
5 for both the traveling and stationary behaviors. We find that the
traveling behaviors vastly outperform any of the stationary behav-
iors. However, there may be environments in reality for which the
traveling behaviors are not applicable (suppose it is strictly neces-
sary to keep a flock in one place, for instance). Thus, we analyze
the traveling behaviors separately from the stationary behaviors.
5.3.1 Traveling. Again, we find that the face behavior tends
to outperform the offset momentum, one-step lookahead, and coor-
dinated behaviors; we attribute this to the tendency of the offset
momentum, one-step lookahead, and coordinated behaviors to lose
Figure 4: An example of an influencing agent losing influ-
ence under the one-step lookahead behavior. The influencing
agent is shown in red, and the Reynolds-Vicsek agents are
shown in white. In A, the influencing agent first encounters
the flock of Reynolds-Vicsek agents. In B-D, the influenc-
ing agent takes on directions that are oriented away from
the goal direction to try to rapidly influence the Reynolds-
Vicsek agents. This changes the orientation of the Reynolds-
Vicsek agents, but the influencing agent has started to travel
away from the flock by D.
influence over time. We note that the effect is not as pronounced
here as in the large experiments, since each influencing agent has
to control fewer agents.
In contrast to the large experiments, we find that here the place-
ment strategy has a major impact on the efficacy of the traveling
behaviors. Again, this has to do with density of influencing agents.
For example, notice that Border 750 (place the influencing agents
in a circle about the origin with radius 750) vastly underperforms
the other placement strategies. The larger radius results in a lower
density of influencing agents, so a greater number of Reynolds-
Vicsek agents slip through the "holes." Furthermore, by the time
the Reynolds-Vicsek agents reach the border, they have already
formed flocks, and it is more difficult for the influencing agents to
point them in the right direction. This effect is less pronounced
for Grid 750 and almost non-existant for Random 750, since these
strategies place influencing agents within the circle, and not simply
along its circumference. As a result, the Reynolds-Vicsek agents still
encounter influencing agents before reaching the circumference of
the circle.
Finally, we note that k-means outperforms all other placement
strategies by a few agents. Again, the main driving factor behind
this is agent density. When an influencing agent starts out in a
clustered area, it has at least one other Reynolds-Vicsek agent in its
neighborhood. As a result, its effective area of influence is slightly
larger than with the other placement strategies. This helps it pick
up more Reynolds-Vicsek agents.
5.3.2
Stationary. Among the stationary behaviors, the multi-
circle behavior achieves the best outcomes, but its performance
depends on its paired placement strategy. The multicircle behavior
slightly underperforms the circle behavior when paired with the
Border placement strategies; slightly overperforms when paired
with the k-means, Random, and Grid 500 placement strategies; and
performs the same as circle in the Grid 750 strategy. What drives
these trends? Once the multicircle behavior reaches the final stage,
it is tracing a larger circle than the circle behavior traces on its
own. As a result, it is easier to maintain influence and turn the
Reynolds-Vicsek agents over time in the final stage. Before that,
however, the influencing agents are in a following stage. When the
influencing agents start out inside the circle, they have more time
to infiltrate small flocks of Reynolds-Vicsek agents and induce a
circling behavior in the final stage.
Finally, we note that Border 750 is the worst placement strategy,
similar to when it is used in the traveling behaviors. Also, the
polygon behavior tends to underperform or match the performance
of circle, which tells us that adopting occasional sharper turns can
sometimes be detrimental.
6 RELATED WORK
Our work builds upon a series of papers by Genter and Stone ex-
amining ways to use external agents to influence flocking [4–9].
This prior work studied a number of placement strategies and influ-
encing agent behaviors, including questions of how best to join or
leave a flock in real scenarios. Genter also presented results from
simulations with different implementations of Reynold's flocking
model, as well as physical experiments with these algorithms in
a small RoboCup setting [3]. This prior work almost exclusively
studied small environments, where density of agents is high, and
quick flock formation was virtually guaranteed. We study two new
low-density environments and introduce behaviors to adapt to the
difficulties presented by these new environments.
Jadbadbaie et al. [12] studied Reynolds-Vicsek agents from an
analytical perspective. Two strong results from this work were
that a group of Reynolds-Vicsek agents in a toroidal setting will
eventually converge regardless of initial conditions, and that in the
presence of a single agent with fixed orientation (analogous to a
single influencing agent), all the agents will converge to that fixed
agent's orientation. This theory provides important context for
Genter and Stone's work and the work that we present here: when
the setting is toroidal, convergence is guaranteed, so the interesting
question is how fast we can reach convergence.
Couzin et al. [2] studied the design of influencing agents for
flocking as well, albeit with a slightly different flocking model.
They proposed an influencing behavior wherein influencing agents
adopt orientations "in between" their desired goal orientation and
the orientations of their neighbors, in order to still influence their
neighbors while not adopting orientations so extreme that they
have no chance of being effective in the long term. This is similar
in spirit to the motivation behind the multistep algorithm. We
adapted Couzin's algorithm to the new settings, but do not present
the results in this text for space reasons. The adaptation did not
perform as well as the new multistep behavior or the face behavior,
but it did outperform the one-step lookahead behavior.
Han et al. [11] published a series of papers showing how to align
a group of agents in the same direction. This work assumed a single
influencing agent with infinite speed, and used this property to
construct a behavior that has the influencing agent fly around and
correct the orientation of agents one at a time. The result is that
the Reynolds-Vicsek agents all eventually converge to the target
direction, but are not connected to each other. In our work, we limit
the speed of influencing agents to be the same as the Reynolds-
Vicsek agents to prevent the use of behaviors like this, in hopes that
our results will be more relevant to real applications; we suspect
that influencing agents that act similarly to real agents will be more
successful in real applications.
Figure 5: Average number of agents under influencing agent control after 15,000 steps with 300 Reynolds-Vicsek agents and
50 influencing agents in the herd setting under various placement strategies and influencing agent behaviors. The traveling
behaviors attempt to control the direction of the Reynolds-Vicsek agents, while the stationary behaviors keep the influencing
agents near the goal area using circling techniques. Larger is better. Error bars represent standard error of the mean.
Su et al. [21] studied the question of flock formation and conver-
gence, but in the context of the Olfati-Saber flocking model [16].
This model assumes the existence of a single virtual leader that
non-influencing agents know about. The virtual leader plays the
role of an influencer, but has special control over the other agents
based on its status. In our work, we assume that influencing agents
do not have any special interaction rules with Reynolds-Vicsek
agents.
Researchers of collective animal behavior have begun using
replica conspecifics in order to influence animal groups across
a range of species, from fish to ducks to cockroaches [10, 24, 26].
Halloy et. al. used robotic influencing agents to control groups of
cockroaches; they exploited the cockroaches' inability to differ-
entiate between real cockroaches and robotic influencing agents.
Vaugahn et. al. used robotic influencing agents to herd a flock of
ducks (on the ground) to a goal position in a small caged area; their
approach used robot agents to "push" the ducks from a distance,
like a dog herding sheep.
7 CONCLUSION
We have studied the problem of controlling flocks using influencing
agents under two new, more adversarial environments with lower
agent density, and have introduced novel control behaviors for these
settings. In addition to these new algorithms, we have found that
in low-density environments it is more important for influencing
agents to maintain influence than it is for them to rapidly turn
their neighbors towards the correct destination. As a result, earlier
results from smaller simulation environments often do not hold
in the environments we introduce. We found that a multi-stage
approach that first embeds influencing agents in small flocks before
attempting to steer these flocks to the goal direction can be effective
in addressing some of these shortcomings.
Although we did not present results from using the multi-stage
approach in the smaller simulation environments from previous
work, preliminary experiments suggest that, in the smaller envi-
ronments, it is not as effective as algorithms that optimize for rapid
convergence. Future work could try to find an algorithm that works
well in all settings.
It could also explore how to aggregate small flocks into one
larger flock. Many behaviors result in multiple small flocks clustered
around influencing agents that have converged in the sense that
they are all facing the same direction, but remain disconnected
from each other. A successful algorithm would have to change the
direction of the flock without losing individual Reynolds-Vicsek
agents on the edges of the flock.
ACKNOWLEDGMENTS
The research reported in this paper evolved from a Harvard course
project done by the first two authors and taught by the last two.
We are grateful to Katie Genter for her advice and willingness to
share her flocking code.
REFERENCES
[1] Yufeng Chen, Hongqiang Wang, E. Farrell Helbling, Noah T. Jafferis, Raphael
Zufferey, Aaron Ong, Kevin Ma, Nicholas Gravish, Pakpong Chirarattananon,
Mirko Kovac, and Robert J. Wood. 2017. A biologically inspired, flapping-wing,
hybrid aerial-aquatic microrobot. Science Robotics 2, 11 (2017).
[2] Iain D Couzin, Jens Krause, Nigel R Franks, and Simon A Levin. 2005. Effective
leadership and decision-making in animal groups on the move. Nature 433 (Feb
2005).
[3] Katie Genter. 2017. Fly with Me: Algorithms and Methods for Influencing a Flock.
Ph.D. Dissertation. The University of Texas at Austin.
2010).
[4] Katie Genter, Noa Agmon, and Peter Stone. 2013. Ad Hoc Teamwork for Leading
a Flock. In Proc. of the 12th International Conference on Autonomous Agents and
Multiagent Systems (AAMAS 2013).
[5] Katie Genter, Noa Agmon, and Peter Stone. 2013. Improving Efficiency of Lead-
ing a Flock in Ad Hoc Teamwork Settings. In AAMAS Autonomous Robots and
Multirobot Systems (ARMS) Workshop.
[6] Katie Genter and Peter Stone. 2014. Influencing a Flock via Ad Hoc Teamwork.
In Proc. of the 9th International Conference on Swarm Intelligence (ANTS 2014).
[7] Katie Genter and Peter Stone. 2016. Ad Hoc Teamwork Behaviors for Influencing
a Flock. Acta Polytechnica 56, 1 (2016). https://doi.org/10.14311/APP.2016.56.0018
[8] Katie Genter and Peter Stone. 2016. Adding Influencing Agents to a Flock. In
Proc. of the 15th International Conference on Autonomous Agents and Multiagent
Systems (AAMAS-16).
[9] Katie Genter, Shun Zhang, and Peter Stone. 2015. Determining Placements of
Influencing Agents in a Flock. In Proc. of the 14th International Conference on
Autonomous Agents and Multiagent Systems (AAMAS 2015).
[10] José Halloy, Grégory Sempo, Gilles Caprari, Colette Rivault, Masoud Asadpour,
Fabien Tâche, Imen Saïd, Virginie Durier, Stephane Canonge, J. M. Amé, Claire
Detrain, Nikolaus Correll, A. Martinoli, Francesco Mondada, Roland Siegwart,
and Jean-Louis Deneubourg. 2007. Social Integration of Robots into Groups
of Cockroaches to Control Self-Organized Choices. Science 318, 5853 (2007),
1155–1158.
[11] Jing Han, Ming Li, and Lei Guo. 2010. Soft Control on Collective Behavior of a
Group of Autonomous Agents By a Shill Agent. 19 (07 2010).
[12] Ali Jadbabaie, Jie Lin, and A. Stephen Morse. 2003. Coordination of groups of
mobile autonomous agents using nearest neighbor rules. IEEE Trans. Automat.
Control 48, 6 (June 2003), 988–1001.
[13] Haili Liang, Yiping Yang, and Xiaofan Wang. 2013. Opinion dynamics in networks
with heterogeneous confidence and influence. Physica A 392 (2013).
[14] Sean Luke, Claudio Cioffi-Revilla, Liviu Panait, Keith Sullivan, and Gabriel Balan.
2005. MASON: A Multi-Agent Simulation Environment. In Simulation: Transac-
tions of the society for Modeling and Simulation International.
[15] Patrick Nalepka, Rachel W. Kallen, Anthony Chemero, Elliot Saltzman, and
Michael J. Richardson. 2017. Herd Those Sheep: Emergent Multiagent Coor-
dination and Behavioral-Mode Switching. Psychological science 28, 5 (2017),
630–650.
[16] Reza Olfati-Saber. 2006. Flocking for multi-agent dynamic systems: algorithms
and theory. IEEE Trans. Automat. Control 51, 3 (March 2006), 401–420.
[17] Craig W. Reynolds. 1987. Flocks, Herds and Schools: A Distributed Behavioral
Model. In Proc. of the 14th Annual Conference on Computer Graphics and Interactive
Techniques (SIGGRAPH '87).
[18] Lee W. Schruben and Dashi I. Singham. 2010. Simulating Multivariate Time
Series Using Flocking. In Proc. of the 2010 Winter Simulation Conference.
[19] Henry Segerman. 2010. The Sunflower Spiral and the Fibonacci Metric. (December
[20] Dashi Singham, Meredith Therkildsen, and Lee Schruben. 2011. Applications of
Flocking Algorithms to Input Modeling for Agent Movement. In Proc. of the 2011
Winter Simulation Conference.
[21] Housheng Su, Xiaofan Wang, and Zongli Lin. 2009. Flocking of Multi-Agents
With a Virtual Leader. IEEE Trans. Automat. Control 54, 2 (Feb 2009), 293–307.
[22] David J.T. Sumpter. 2010. Collective animal behavior. Princeton University Press.
[23] David J.T. Sumpter, Jens Krause, Richard James, Iain D. Couzin, and Ashley J.W.
Ward. 2008. Consensus Decision Making by Fish. Current Biology 18 (2008).
[24] Richard Vaughan, Neil Sumpter, Andy Frost, and Stephen Cameron. 1998. Robot
Sheepdog Project achieves automatic flock control. In From Animals to Animats 5:
Proc. of the Fifth International Conference on the Simulation of Adaptive Behaviour.
MIT Press, 489–493.
[25] Tamás Vicsek, András Czirók, Eshel Ben-Jacob, Inon Cohen, and Ofer Shochet.
1995. Novel Type of Phase Transition in a System of Self-Driven Particles. Phys.
Rev. Lett. 75 (Aug 1995), 1226–1229. Issue 6.
[26] Ashley J.W. Ward, David J.T. Sumpter, Iain D. Couzin, Paul J.B. Hart, and Jens
Krause. 2008. Quorum decision-making facilitates information transfer in fish
shoals. Proceedings of the National Academy of Sciences 105 (2008).
[27] Wen Yang, Lang Cao, Xiaofan Wang, and Xiang Li. 2006. Consensus in a hetero-
geneous influence network. Physical Review E 74 (2006).
|
1809.00564 | 1 | 1809 | 2018-09-03T11:51:13 | ViewpointS: towards a Collective Brain | [
"cs.MA",
"cs.AI",
"cs.SI",
"q-bio.QM"
] | Tracing knowledge acquisition and linking learning events to interaction between peers is a major challenge of our times. We have conceived, designed and evaluated a new paradigm for constructing and using collective knowledge by Web interactions that we called ViewpointS. By exploiting the similarity with Edelman's Theory of Neuronal Group Selection (TNGS), we conjecture that it may be metaphorically considered a Collective Brain, especially effective in the case of trans-disciplinary representations. Far from being without doubts, in the paper we present the reasons (and the limits) of our proposal that aims to become a useful integrating tool for future quantitative explorations of individual as well as collective learning at different degrees of granu-larity. We are therefore challenging each of the current approaches: the logical one in the semantic Web, the statistical one in mining and deep learning, the social one in recommender systems based on authority and trust; not in each of their own preferred field of operation, rather in their integration weaknesses far from the holistic and dynamic behavior of the human brain. | cs.MA | cs | ViewpointS: towards a Collective Brain
Philippe Lemoisson1, 2 and Stefano A. Cerri3
1 CIRAD, UMR TETIS, F-34398 Montpellier, France
2 TETIS, Univ Montpellier, AgroParisTech, CIRAD, CNRS, IRSTEA, Montpellier, France
3 LIRMM, Univ Montpellier, CNRS, 161 Rue Ada, 34095 Montpellier, France
[email protected];[email protected]
Abstract. Tracing knowledge acquisition and linking learning events to interac-
tion between peers is a major challenge of our times. We have conceived, de-
signed and evaluated a new paradigm for constructing and using collective
knowledge by Web interactions that we called ViewpointS. By exploiting the
similarity with Edelman's Theory of Neuronal Group Selection (TNGS), we
conjecture that it may be metaphorically considered a Collective Brain, espe-
cially effective in the case of trans-disciplinary representations. Far from being
without doubts, in the paper we present the reasons (and the limits) of our pro-
posal that aims to become a useful integrating tool for future quantitative explo-
rations of individual as well as collective learning at different degrees of granu-
larity. We are therefore challenging each of the current approaches: the logical
one in the semantic Web, the statistical one in mining and deep learning, the so-
cial one in recommender systems based on authority and trust; not in each of
their own preferred field of operation, rather in their integration weaknesses far
from the holistic and dynamic behavior of the human brain.
Keywords: collective brain, collective intelligence, knowledge graph, human
learning, knowledge acquisition, semantic web, social web.
1
Introduction
On one side, today's research on the human brain allows us to visualize and trace the
activity along the beams connecting the neural maps. When publishing the Theory of
Neuronal Group Selection (TNGS) more than thirty years ago, G. M. Edelman em-
phasized the observation/action loop and the social interactions loop. Both loops con-
tinuously evolve the beams connecting the neural maps under the supervision of our
homeostatic internal systems also called system of values, and generate learning. On
the other side, we live a digital revolution where the Web plays an increasing role in
the collective construction of knowledge; this happens through the semantic Web and
its ontologies, via the indexing and mining techniques of the search engines and via
the social Web and its recommender systems based on authority and trust.
The goal of our approach is twofold: i) to exploit the metaphor of the brain for im-
proving the collective construction of knowledge and ii) to better exploit our digital
traces in order to refine the understanding of our learning processes. We have de-
2
signed and prototyped a Knowledge Graph where resources (human or artificial
agents, documents and descriptors) are dynamically interlinked by beams of digital
connections called viewpoints (human viewpoints or artificial viewpoints issued from
algorithms). We-as-agents endlessly exploit and update this graph, so that by similari-
ty with the TNGS, we conjecture that it may be metaphorically considered a Collec-
tive Brain evolving under the supervision of all our individual systems of values.
In section 2, we present a schematic view of the biological bases of cognition,
starting by the "three worlds" of K. Popper (1978) where the interaction between
minds can be studied. We then re-visit the TNGS and the role played by our system of
values (internal drives, instinct, intentionality…). We finally illustrate "learning
through interaction" as exposed by D. Laurillard and J. Piaget.
In section 3, we explore the collective construction of knowledge in the Web para-
digm, assuming that a large proportion of the traces we produce and consume today
are digital ones. We distinguish three paradigms, respectively governed by logics, by
statistics and by authority and trust. Thus our challenge is to integrate these paradigms
and describe how individual systems of values participate to learning events.
Section 4 is dedicated to the ViewpointS approach, as a candidate for answering
the challenge. The metaphor of "neural maps interconnected by beams of neurons"
led to the design of a graph of "knowledge resources interconnected by beams of
viewpoints", where each agent can exploit the traces of others and react to them by
adding new traces. As a result, the combination of all individual "system of values"
regulates the evolution of knowledge. We conjecture that it may be metaphorically
considered a Collective Brain.
We conclude by recapitulating our proposal which has the limits inherent to any in-
tegrator: we are not yet sure if the collective knowledge emerging from our proposed
Collective Brain will perform competitively with the existing separate paradigms
respectively governed by logics, by statistics and by authority and trust. Nevertheless,
if our proposal does not ensure scientific discovery about learning, we hope it repre-
sents a progress toward its comprehension.
2
A Schematic View of the Biological Bases of Cognition
In this section, we start by adopting a well-known philosophical position where the
questions of cognition and interaction can be addressed. Then we draft a schematic
view of the lessons learned from Edelman about the biological mechanisms support-
ing cognition, and finally we use this representation within D. Laurillard's conversa-
tional learning scenario in order to test it against the question of knowledge acquisi-
tion through interaction.
2.1 The Three Worlds
To start with our analysis about minds in interaction, we need some philosophical
default position; "the three worlds" of K. Popper [1] provides a relevant framework.
Such a framework had already found an expression in the semantic triangle of Odgen
and Richards [2]. The strong interconnection of the three worlds is developed in [3]
3
where J. Searle explains how the interpretation of repeated collective experiences by
individuals bears the emergence of an institutional reality founded on the use of lan-
guage. In the following, we shall refer to the three worlds as W1, W2 and W3, with the
following definitions:
W1 is the bio-physical world where objects and events exist independently from us,
from our perceptions, our thoughts and our languages. Causal relations, insofar we are
not directly implied by some event, are also considered independent from us.
W2 is the internal world of subjectivity, where the perception of objects and events
of W1 leave traces in memory that are combined in order to participate to the con-
struction of our own knowledge, our consciousness about the world, where intentions
appear and the emotions that will be the trigger for our actions.
W3 is the world of the cultures and languages, made of interpretable traces: signs,
symbols, rules of behavior and rules for representing objects and events of W1. W3 is
the support of communication among individuals. Within W3, we find all specialized
languages of the scientific disciplines, as well as the language of emotions and feel-
ings, for instance represented by smileys. Digital images such as satellite images or
scanned documents are also part of W3.
W1 is where it happens, W3 is where we can communicate about what happens, and
W2 is where the links and the learning events are. For this reason, we are going to pay
special attention to the internal world W2.
2.2 The Internal World of the Mind
This section pays a heavy tribute to the work of G. M. Edelman [4], [5], founder of
the Theory of Neuronal Group Selection (TNGS), and one the firsts to emphasize that
the brain is not a computer, but a highly dynamic, distributed and complex system,
maybe the most complex "object" of the known universe. There is neither correlation
between our personality and the shape of our skull (despite the teachings of phrenolo-
gy), nor localized coding of information; no autopsy will ever reveal any single chunk
of knowledge available in the brain.
According to the TNGS, every brain is twice unique: first because its cellular or-
ganization results from the laws of morphogenesis. Most important, however, is
Edelman's second reason for the brain uniqueness: the brain is a set of "neural maps"
continuously selected according to the individual's experiences. These cards, or adap-
tive functional units, are bi-directionally linked one-another by a fundamental inte-
grating mechanism: the "re-entry". This crucial hypothesis allows a functional inte-
gration requiring neither any "super-card" nor any "supervising program": the neural
maps are like "musicians of an orchestra linked one-another by wires in the absence
of a unique conductor". The bi-directional re-entry links are the result of a selective
synaptic reinforcement among groups of neurons; similarly: the cards result from a
synaptic reinforcement internal to each group of neurons composing them. These
reinforcements are triggered and managed by the homeostatic internal systems, also
called "system of values" of each individual.
Fig. 1 (/left part of the figure) shows an observation-action loop that highlights
several brain cards re-entering when grasping an apple. This type of loops originates
4
the perceptual categorization event, common to all highly evolved organisms, deci-
sive for adapting the behavior to the likelihood of benefits or dangers.
In humans as well as in some higher mammals, there is a second level of categori-
zation, supported by cards situated in the temporal, frontal and parietal areas. Beyond
the immediate cartography of the world, humans may shape some durable concepts
(conceptual categorization) that consider the past and/or the future.
Finally, the human brain parts specialized in language (the Wernicke and Broca ar-
eas) play a major role in the emergence of a consciousness of a higher level, enabling
the human subject to "map" his-her own experience and study him-herself.
The basic principles of the TNGS (selective reinforcement and re-entry according
to the advantages offered to the subject) potentially explain any learning process,
from simple memorization to skill acquisition and knowledge acquisition. All these
processes are regulated by our system of values.
Fig. 1. The brain according to the TNGS of G.M. Edelman: a complex network of re-entrant
maps in interaction loops with the world
A kernel element of the TNGS is quite relevant for us: knowledge is supported by
a "physiological complex and adaptive network of neural maps"; the metaphor of
"knowledge graph" is therefore justified. It induces to search for a topology allowing
to define distances and proximity, like it was conjectured by the "zone of proximal
development" of Vygotsky [6], [7]; such a topology will be presented in chapter 4.
2.3 Minds in Social Interaction
According to the two loops at the right of Fig. 1, we always learn through interaction:
observation/action versus social interaction. These two loops clearly appear in D.
Laurillard's work [8] when analyzing the acquisition of knowledge in higher educa-
tion. In her scenario, a student and his teacher simultaneously experiment and discuss.
SensorysamplingMovementsSamplingupdatedbymovementsUpdatedoutputAn observation / action loopA schematicviewof the brainLocal primaryreentrantmapsCerebellumParietaland frontal areasReentrantmapsof the secondarycortexMotorCortexValue systemHippocampusSensorylayersMuscles and jointsSystemof valuesPrimaryconsciousnessLanguagemapsSystemof valuesSocialinteractionsObservation/ action5
In [9] we extended this scenario to interactions within a group of peers co-
constructing a representation of a shared territory.
In this multi-peers scenario, interactions occur at two levels: i) peers act in the
shared territory (in W1/ objects and events) and ii) peers exchange personal views of
the shared territory (in W3/ language). Doing so, the assimilation / adaptation process-
es described by J. Piaget in [10] are activated (in W2/ mind), which can be interpreted
in terms of series of re-entry loops according to the TNGS. In [11] we proposed a
roadmap for understanding and forecasting cognitive and emotional events linked to
serendipitous learning.
As a consequence of all above processes, inner views tend to synchronize and yield
a shared representation. We propose that what happens on the Web is a generalization
of this prototypical scenario, and can be called collective knowledge acquisition. Our
approach aims at tracing it; this will be exemplified in chapter 4.
3
Humans in Web Interaction
The change in our lives that we have been experiencing since when Internet has
gained a significant place, often called the digital revolution, has been theoretically
addressed by several authors, among which S. Vial [12] and D. Cardon [13] who re-
spectively provide a philosophical and a sociological approach. This revolution has
suggested a significant hope: Internet as a space of shared knowledge able to bring in
new levels of understanding in the sense given by Gruber in [14]. Internet is a support
for a huge set of digital traces interpretable by humans but also by machines; if we
refer to the conceptual framework above, it is part of W3/language.
This space is far from being homogeneous however, and the approaches to co-
build shared knowledge are multiples; hereafter, we consider three paradigms.
The first paradigm is governed by the logical evidence: we usually call semantic
Web this logically structured part of Internet where humans interact with databases
encoding the knowledge of experts according to consensual conceptual schemes such
as ontologies. This allows logical responses (provided by reliable algorithms) to cor-
rectly formulated questions (and only to questions with such a property). But there are
problems and limits. Firstly, ontologies only represent a fragment of the reality, and
the consensus they reflect is necessarily local and temporary. Secondly, formal query
languages assume a closed world -- what is rarely the case. Thirdly, formal query
languages require a learning effort in order to be used properly. Finally, interconnect-
ing ontologies and supporting their evolution with time in a rapidly changing world
are very heavy and costly processes. Various approaches based on automatic align-
ment [15] or machine learning [16] exist, but the task is endless since each ontology's
evolution is domain-dependent.
The second paradigm is governed by the statistical evidence. The issue is to exploit
techniques of data mining, i.e.: scan without too many assumptions a corpus, also
called data set, of tweets, sequences, clicks, documents, … and detect regularities,
frequencies, co-occurrences of items or terms. In other words: to feed suitable algo-
rithms with the big data in order to reveal regularities. By reducing the complexity of
6
the digital world W3, the mining algorithms make it readable for humans. However,
the simplicity of these descriptions must pay a price to the expressiveness or even to
the effectiveness: we are just shown the surface and not the depth, the "meaning".
Today, a simple question with three independent keywords on Google may give very
disappointing results. What is even worse, inferential statistics -- the only one allow-
ing us to take significant decisions - require selecting the data according to a prede-
fined goal, and this remains hidden from the user. Interpreting the results in order to
build chunks of science is therefore heavily biased.
The third paradigm is based on authority and trust, which rely on emotions and
feelings. The algorithms of the social Web provide information search and recom-
mendations by graph analysis of the various personal, subjective and spontaneous
light traces such as 'likes', 'bookmarks' and 'tweets'. They clearly operate in an open
world; the limits are firstly the impossibility to logically assess the quality of respons-
es and secondly the absence of guarantee concerning their stability along time.
Coming back to the dream of Gruber and many others to fuse the three paradigms,
a first attempt is the semantic Web project [17] which somehow aims at subsuming
them within the logical one; after a first wave of enthusiasm it seems that the limits
listed above resist, even if they are daily pushed forward. The ViewpointS approach
discussed in chapter 4 aims to offer a potential step forward in the direction of sub-
suming the three paradigms within the third one i.e., building up upon trust towards
'peers', would they be humans, databases or mining algorithms.
4
The ViewpointS Approach Discussed and Exemplified
This section first briefly recalls the ViewpointS framework and formalism for build-
ing collective knowledge in the metaphor of the brain - a detailed description can be
found in [18], [19] - and then illustrates them through an imaginary case.
In the ViewpointS approach, the "neural maps interconnected by beams of neu-
rons" are transposed into a graph of "knowledge resources (agents, documents, topics)
interconnected by beams of viewpoints". The "systems of values" of the agents influ-
ence not only the viewpoints they emit, but also the way they interpret the graph.
We call knowledge resources all the resources contributing to knowledge: agents,
documents and topics. We call viewpoints the links between knowledge resources.
Each viewpoint is a subjective connection established by an agent (Human or Artifi-
cial) between two knowledge resources; the viewpoint (a1, {r2, r3},, τ) stands for: the
agent a1 believes at time τ that r2 and r3 are related according to the emotion carried by
. We call Knowledge Graph the bipartite graph consisting of knowledge resources
and viewpoints. Given two knowledge resources, the aggregation of the beam of all
connections (viewpoints) linking them can be quantified and interpreted as a proximi-
ty. We call perspective the set of rules implementing this quantification by evaluating
each viewpoint and then aggregating all these evaluations into a single value. The
perspective is tuned by the "consumer" of the information, not by third a part "pro-
ducer" such as Google or Amazon algorithms; each time an agent wishes to exploit
7
the knowledge of the community, he does so through his own subjective perspective
which acts as an interpreter.
Tuning a perspective may for instance consist in giving priority to trustworthy
agents, or to the most recent viewpoints, or to the viewpoints issued from the logical
paradigm. This clear separation between the storing of the traces (the viewpoints) and
their subjective interpretation (through a perspective) protects the human agents in-
volved in sharing knowledge against the intrusion of third-part algorithms reifying
external system of values, such as those aiming at invading our psyche, influencing
our actions [20], or even computing bankable profiles exploitable by brands or opin-
ion-makers [21]. Adopting a perspective yields a tailored knowledge map where dis-
tances can be computed between knowledge resources, i.e. where the semantics
emerge both from the topology of the knowledge graph and from our own system of
values expressed by the tuned perspective.
The shared semantics emerge from the dynamics of the observation/action loops.
Agents browse the shared knowledge through the perspectives they adopt (observa-
tion), and reversely update the graph by adding new viewpoints expressing their feed-
back (action). Along these exploitation/feedback cycles, shared knowledge is contin-
uously elicited against the systems of values of the agents in a selection process.
To illustrate this, we develop below an imaginary case where learners have to se-
lect resources inside an Intelligent Tutoring System (ITS) to which a Knowledge
Graph is associated. They wish to learn about the topic 'apple' and from step1 to
step4 the learners adopt a 'neutral' perspective which puts in balance all types of
viewpoints (issued from the logical or mining paradigms, or from the emotions and
feelings of the learners). However at step5 where B chooses a perspective discarding
his own viewpoints in order to discover new sources of knowledge.
Step1 illustrates the initial state of the knowledge. A, B and C are co-learners in the
ITS (linked as such within the logical paradigm); the big arrows within the icons rep-
resent their respective systems of values, which play a key role both in the choice of
perspectives and in the emission of viewpoints. D1, D2 and D3 are documents that a
mining algorithm has indexed by the topic/tag 'apple'.
Step2: A is a calm person who has time; she browses through D1, D2 and D3 and
has a positive feeling about D1 and D2 (she likes both and finds them relevant with
respect to 'apple'); the capture of her feedbacks results in linking D1 and D2 to her and
reinforcing the links between the documents and the topic 'apple'. B is always in a
hurry; he asks the Knowledge Graph the question "which is the shortest path between
me and the topic 'apple'?" According to the paths in the diagram, he gets a double
answer: B-A-D1-'apple'and B-A-D2-'apple'.
Step3: B's feedback to D1 is positive; this results in reinforcing the path B-A-D1-
'apple'. If he would re-ask his question, he would now get only D1.
Step4: C likes to explore; rather than taking a short path she browses through D1,
D2 and D3 and has a positive emotion about D3 (she likes it and finds it relevant with
respect to 'apple'); this results in linking D3 to her and reinforcing the linking between
D3 and the topic 'apple'. At this stage, if A, B and C would ask for the shortest path to
'apple', they would respectively get D1, D1 and D3.
8
Step5: B is not fully satisfied by D1. He asks for a novel short path between him
and the topic 'apple' using a new perspective: he discards the viewpoints expressing
his own feelings in order to discover new sources of knowledge. According to this
new perspective, B-A-D1-'apple', B-A-D2-'apple'and B-C-D3-'apple' have the same
length i.e., D1, D2 and D3 are equidistant from him. B may now discard D1 (already
visited) and D2 (already rejected) and read D3.
Fig. 2. The network of interlinked resources evolves along the attempts of the learners A, B and
C to "catch" the topic 'apple' through performing the modules D1, D2 or D. What is figured in
the schemas is not the Knowledge Graph itself, but the views (also called Knowledge Maps)
resulting from the perspectives; in these maps, the more links between two resources, the closer
they are.
Along the five steps of this imaginary case, the evolution of "knowledge paths"
follows the metaphor of the selective reinforcement of neural beams, except that this
reinforcement is not regulated by a single system of values, rather by a collabora-
tion/competition between the three systems of values of A, B and C. The three co-
learners learn as a whole, in a trans-disciplinary way: the dynamics are governed by a
topology mixing information and emotions, not by pure logics.
5
Conclusion
Starting from the three worlds proposed by K. Popper (the external world of ob-
jects and events, the internal world of mind and the world of language), we have
browsed through the TNGS of G. M. Edelman and learnt how the learning events are
supported by an adaptive neural network, are regulated by our systems of values and
occur mainly through social interactions. We have then focused on Web interactions
D1D2D3applestep1D3step2AgentTopicDocumentLogicalparadigmMining paradigmEmotions and FeelingsD1appleD2D3applestep3D1D2D3applestep4D1D2D3applestep5D1D2D1apple9
and reformulated the question of the emergence of collective knowledge partially
supported by algorithms.
The ViewpointS approach and formalism offer to integrate most if not all these el-
ements in the metaphor of a collective brain; we illustrate through an imaginary case
how to trace and enhance collective knowledge acquisition. Within ViewpointS, the
three paradigms for knowledge acquisition (logical inferences of the semantic Web,
statistical recommendations of the mining community, authority and trust of the social
Web) are merged into a knowledge graph of digital traces interpretable by human and
artificial agents. Within this graph, the beams of connections are regulated by the
individual systems of values that support affect i.e., culture, personality traits, as de-
fined in [22].
What we gain in the integration may be lost with respect to the advantages of each
of the three knowledge acquisition paradigms taken individually. For this reason, we
are not yet sure if the collective knowledge emerging from ViewpointS graphs and
maps (our proposed Collective Brain) will perform competitively with a similar wis-
dom emerging from each of the three crowds.
Nevertheless: as it has been always the case in the synergies between technological
developments and scientific progress, the developments do not ensure scientific dis-
covery, rather may facilitate the process. For instance: Galileo's telescopes did not
directly produce the results of modern astronomy, but enabled a significant progress.
We hope and believe that our proposed Collective Brain will have a positive impact in
understanding and enhancing some aspects of human cognition.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
K. Popper, "The Tanner Lectures on Human Values," Michigan, USA:
University of Michigan, 1978, pp. 143 -- 167.
J. A. Hampton, "Concepts in the Semantic Triangle," in The Conceptual
Mind : New Directions in the Study of Concepts, 2016.
J. Searle, Speech acts: an essay in the philosophy of language. Cambridge,
UK: Cambridge University Press, 1969.
G. M. Edelman, Neural Darwinism: The theory of neuronal group selection.
Basic Books, 1989.
G. M. Edelman and G. Tononi, Comment la matière devient conscience
Éditions Odile Jacob, Sciences. Paris, 2000.
L. Vygotski, "Apprentissage et développement: tensions dans la zone
proximale," Paris La Disput. (2ème éd. Augment., vol. 233, 1933.
L. S. Vygotsky, Mind in Society: The Development of Higher Psychological
Processes, vol. 1978. 1978.
D. Laurillard, "A conversational framework for individual learning applied to
the 'learning organisation' and the 'learning society,'" Syst. Res. Behav. Sci.,
vol. 16, no. 2, pp. 113 -- 122, 1999.
P. Lemoisson and M. Passouant, "Un cadre pour la construction collaborative
de connaissances lors de la conception d'un observatoire des pratiques
territoriales," Cah. Agric., vol. 21, no. n°1, pp. 11 -- 17, 2012.
10
[10]
[11]
[12]
J. Piaget, "La construction du réel chez l'enfant," in La construction du réel
chez l'enfant, Fondation Jean Piaget, Ed. Lonay, Suisse: Delachaux et Niestlé,
1937, pp. 307 -- 339.
S. A. Cerri and P. Lemoisson, "Tracing and enhancing serendipitous learning
with viewpointS," in Brain Function Assessment in Learning, 2017, pp. 24 --
25.
S. Vial, L'être et l'écran - Comment le numérique change la perception.
2013.
[13] D. Cardon and M.-C. Smyrnelis, "La démocratie Internet," Transversalités,
[14]
[15]
[16]
[17]
[18]
[19]
vol. N° 123, no. 3. Institut Catholique de Paris, pp. 65 -- 73, 13-Sep-2012.
T. Gruber, "Collective knowledge systems: Where the Social Web meets the
Semantic Web," Web Semant. Sci. Serv. Agents World Wide Web, vol. 6, no.
1, pp. 4 -- 13, Feb. 2008.
P. Jain, P. Z. Yeh, K. Verma, R. G. Vasquez, M. Damova, P. Hitzler, and A.
P. Sheth, "Contextual Ontology Alignment of LOD with an Upper Ontology:
A Case Study with Proton," Springer Berlin Heidelberg, 2011, pp. 80 -- 92.
L. Zhao and R. Ichise, "Ontology Integration for Linked Data," J. Data
Semant., vol. 3, no. 4, pp. 237 -- 254, Dec. 2014.
T. Berners-Lee, J. Hendler, and O. Lassila, "The Semantic Web," Sci. Am.,
2001.
P. Lemoisson, G. Surroca, C. Jonquet, and S. A. Cerri, "ViewpointS: When
Social Ranking Meets the Semantic Web," in AAAI Publications, The
Thirtieth International Flairs Conference, Special Track on Artificial
Intelligence for Big Social Data Analysis, Florida Artificial Intelligence
Research Society Conference, North America, 2017.
P. Lemoisson, G. Surroca, C. Jonquet, and S. A. Cerri, "ViewPointS :
capturing formal data and informal contributions into an evolutionary
knowledge graph," Int. J. Knowl. Learn., vol. 12, no. 2, pp. 119 -- 145, 2018.
[20] V. Duchatelle, "Hacker son auto-prophétie," Paris, 2017.
[21] M. Kosinski, Y. Bachrach, P. Kohli, D. Stillwell, and T. Graepel,
"Manifestations of user personality in website choice and behaviour on online
social networks," Mach. Learn., vol. 95, no. 3, pp. 357 -- 380, Jun. 2014.
P. D. Bamidis, "Affective Learning: Principles, Technologies, Practice," in
Brain Function Assessment in Learning, 2017, pp. 1 -- 13.
[22]
|
1907.10491 | 1 | 1907 | 2019-07-22T01:41:28 | Alternative Intersection Designs with Connected and Automated Vehicle | [
"cs.MA",
"eess.SP"
] | Alternative intersection designs (AIDs) can improve the performance of an intersection by not only reducing the number of signal phases but also change the configuration of the conflicting points by re-routing traffic. However the AID studies have rarely been extended to Connected and Automated Vehicle (CAV) which is expected to revolutionize our transportation system. In this study, we investigate the potential benefits of CAV to two AIDs: the diverging diamond interchange (DDI) and the restricted crossing U-turn intersection. The potential enhancements of AID, CAV, and the combination of both are quantified via microscopic traffic simulation. We found that CAV is able to positively contribute to the performance of an intersection. However, converting an existing conventional diamond interchange (CDI) to a diverging one is a more effective way according to the simulation results. DDI improves the throughput of a CDI by 950 vehicles per hour, a near 20% improvement; whereas with full penetration of CAV, the throughput of a CDI is increased only by 300 vehicles per hour. A similar trend is observed in the average delay per vehicle as well. Furthermore, we assess the impact for the driver's confusion, a concern for deploying AIDs, on the traffic flow. According to the ANOVA test, the negative impacts of driver's confusion are of statistical significance. | cs.MA | cs | Alternative Intersection Designs with Connected
and Automated Vehicle
Department of Civil and Environmental Engineering
Department of Civil and Environmental Engineering
Zijia Zhong
Earl E. Lee II
University of Delaware
Newark, DE, USA
[email protected]
University of Delaware
Newark, DE, USA
[email protected]
9
1
0
2
l
u
J
2
2
]
A
M
.
s
c
[
1
v
1
9
4
0
1
.
7
0
9
1
:
v
i
X
r
a
Abstract -- Alternative intersection designs (AIDs) can improve
the performance of an intersection by not only reducing the
number of signal phases but also change the configuration of the
conflicting points by re-routing traffic. However the AID studies
have rarely been extended to Connected and Automated Vehicle
(CAV) which is expected to revolutionize our transportation
system. In this study, we investigate the potential benefits of
CAV to two AIDs: the diverging diamond interchange (DDI)
and the restricted crossing U-turn intersection. The potential
enhancements of AID, CAV, and the combination of both are
quantified via microscopic traffic simulation. We found that CAV
is able to positively contribute to the performance of an inter-
section. However, converting an existing conventional diamond
interchange (CDI) to a diverging one is a more effective way
according to the simulation results. DDI improves the throughput
of a CDI by 950 vehicles per hour, a near 20% improvement;
whereas with full penetration of CAV, the throughput of a CDI
is increased only by 300 vehicles per hour. A similar trend is
observed in the average delay per vehicle as well. Furthermore,
we assess the impact for the driver's confusion, a concern for
deploying AIDs, on the traffic flow. According to the ANOVA
test, the negative impacts of driver's confusion are of statistical
significance.
Index Terms -- Connected and Automated Vehicle, Alternative
Intersection Design, Diverging Diamond Interchange, Restricted
Crossing U-turn Intersection, Mixed Traffic Condition
I. INTRODUCTION
Signalized intersections are major sources of traffic delay
and collision within modern transportation systems. The mea-
sures to improve the operational efficiency of a signalized
intersection can be grouped in to four categories: 1) Opti-
mization of Signal Timing and Phase, 2) Conversion to a
grade-separated interchange, 3) Reconfiguration to alternative
intersection designs (AIDs), and 4) Adaptation of connected
and automated vehicle (CAV) technology.
The traditional approach via signal optimization is no longer
able to considerably alleviate congestion at signalized inter-
sections in saturated condition [1]. Grade-separation tends to
incur a significant amount of infrastructure investment, which
is difficult to economically justify under most circumstances.
AIDs have the potential in improving the efficiency and safety
of an intersection by strategically eliminating or changing the
nature of the intersection conflict points.
While the adoption of AIDs exhibits an increasing trend
in the U.S. as displayed in Fig. 1, additional research for
AID is still needed. The most common AIDs include the
diverging diamond interchange (DDI),
the median U-turn
intersection (MUT), the displaced left-turn intersection (DLT),
and roundabout (RDT).
Fig. 1: AID locations in contiguous U.S. (data source [2])
the same time,
The evolutionary role of the CAV technology to mobility,
safety, and driver convenience has been discussed extensively
in the past decades. At
the adaptation of
AIDs has been growing steadily and their benefits have gained
recognition. However, the joint benefits of implementing CAV
and AID have been seldom discussed. The Volpe National
Transportation Systems Center estimated that it may take 25-
30 for CAVs to reach 95% of market penetration (MPR), even
with a federal mandatory installation of DSRC devices on new
light vehicles in the U.S. [3].
In light of the aforementioned lead time, hybrid solutions
may be a logical step for solving the pressing transportation
issues. In this paper, we evaluate the potential benefits brought
by CAV, AID, and the combination of both. We also quantify
the influence of the driver's confusion on a restricted crossing
U-turn intersection (RCUT). Such driver's confusion that is
caused by the unconventional geometry deign is expected to
be eliminated by CAV.
II. RELATED WORK
1) Effectiveness of AIDs: The majority of the research
demonstrated the superior performance of AIDs to their con-
ventional counterparts under various volume scenarios, for
instance, heavy left-turn traffic, unbalanced split among inter-
section approaches, high overall volume, etc. Such scenarios
can reveal the inadequacy of a conventional intersection. A
diverging diamond interchange (DDI) outperform a conven-
tional diamond interchange (CDI) under high traffic volume
with left-turn demand exceeding 50% of the total demand [1].
When designed properly, the DDI can reduce 60% of total
intersection delay and 50% of the total number of stops [4].
A signal optimization model for DDI was developed in [5],
in which the common cycle length and green split for the two
up-stream crossover intersections were determined by taking
into account the adjacent conventional intersections.
The displaced left-turn (DLT) intersection is able to poten-
tially reduce average intersection delays in most traffic demand
scenarios. A before-and-after study for the DLT at Baton
Rouge, LA showed that the reduction in total crashes and
fatality were 24% and 19%, respectively. The simulation also
demonstrated 20% to 50% increase in throughput compared
to a conventional intersection [6]. The reduction for a median
u-turn (MUT) intersection in total crashes ranges from 20%
to 50%, as shown in the study conducted in [7], [8].
2) Effectiveness of CAV: A CAV-based application on real-
world signalized intersection was studied using Vissim in
[9]. The start-up lost time was assumed to be zero owing
to V2X communication. Addtionally, all the CAVs within a
platoon operated synchronously upon the commencement of a
green phase. Without changing the existing signal plan, the
average stop delay was reduced by 17% when the market
penetration rate (MPR) of CAV reached 70%. Le Vine et al.
[10] studied the queue discharging operation of CAVs with the
assured-clear-distance-ahead principle by using a deterministic
simulation model. On the contrary to [9], they observed only
marginal improvement to intersection throughput due to the
synchronous start-up movement. However, they found that the
processing time for a 10-vehicle queue did reduce by 25% with
full CAVs, compared to that for the human-driven vehicles
(HVs) with the same amount of vehicles.
Realizing the potential long path to full vehicle automation,
researchers also emphasized the possible cooperative scheme
between CAVs and HVs by strategically consider the following
HVs for intersection management [10]. A bi-level optimal
intersection control algorithm was proposed in [11]. The
algorithm performed trajectory design for CAVs as well as
the prediction for HVs based on real-time CAV data. The
prediction of the trajectory of HVs was based on Newells car
following model and the positional information of CAVs. The
baseline used for comparison was an actuated signal control
algorithm under a range of traffic demand between 1,000 and
2,000 vehicles per hour (vph).
3) Driver's Confusion: Unfamiliar urban intersections pose
high cognitive demand on drivers who are prone to make
unexpected maneuvers, which include hesitation, abrupt stop,
deviation from the planned path, suddent aggressive maneu-
vers [12], [13]. The drivers confusion was mentioned in most
of the AID studies as a potential drawback. As we observed
from practices, the off-ramp right tuning movements from
the freeway in DDIs are often signalized due to the safety
concern for unfamiliar drivers who may misidentify traffic
on the opposite side of the roadway passing through a DDI
interchange [14]. Some believe that the reduction in delay and
travel time would be discounted after accounting for drivers
confusion [15].
A driving simulator provides a safe virtual environment for
human subjects to experience a wide verity of scenario, in-
cluding investigating the driver's confusion for AIDs. In [16],
74 drivers within the Washington D.C. area were recruited
for the experiment which aimed to investigate the wrong way
violation, navigation errors, red-light violations, and driving
speed through the DDI. In [17], Park found that wrong way
crashes inside the crossroad between ramp terminals accounted
for 4.8% of the fatal and injury crashes occurring at the DDI.
The CAV technology could be an excellent complement for
the AIDs. The V2X connectivity is able to provide geometry
information to help unfamiliar drivers to navigate through
AIDs. Increasingly, the Automated Driver Assistant System
could, when necessary, intervene with the erroneous movement
as a result of the driver's confusion. Hence, the potential aid
gained from CAV technology could improve the performance
of AID by abating or even eliminating the concerns for the
drivers confusion.
III. EXPERIMENT
The primary benefits for the introduction of CAV to AIDs
are the enhanced driving performance due to automation and
the connectivity with the signal controller. In other words,
CAVs can closely follow their predecessors and have no
driver's confusion for AIDs nor start-up lost time. We first
demonstrate the improvement of AIDs with various penetra-
tion of CAVs for a diverging diamond interchange (DDI) and a
restricted crossing U-turn intersection (RCUT). Then a proof-
of-concept simulation for the impact of drivers confusion is
conducted.
Each CAV is assumed with SAE level 3 automation. The
Enhanced Intelligent Driver Model (EIDM), developed by
Kesting el al. [18] and expressed in (1), (2), and (3),
is
adapted for longitudinal control), whereas the human drivers
are responsible for the lateral control which is based on the
Weidemann model [19], [20].
x
xdes
s0
)δ − ( s∗( x, xlead)
a[1 − (
if x = xIDM ≥ xCAH
(1 − c)xIDM + c[xCAH + b · tanh( xIDM −xCAH
)]
b
x =
otherwise
)]
(1)
s∗( x, xlead) = s0 + xT +
x( x − xlead)
2√ab
x2
·min(xlead,x)
−2x·min(xlead,x)
x2
lead
xlead( x − xlead) ≤ −2x min(xlead, x)
min(xlead, x) −
otherwise
( x− xlead)2Θ( x− xlead)
2x
xCAH =
(2)
(3)
where a is the maximum acceleration; b is the desired
deceleration; c is the coolness factor; δ is the free acceleration
exponent; x is the current speed of the subject vehicle; xdes
is the desired speed, xlead is the speed of the lead vehicle; s0
is the minimal distance; x is the acceleration of the subject
vehicle; xlead is the acceleration of the lead vehicle; xIDM is
the acceleration calculated by the original IDM model [21];
T is the desired time gap; and xCAH is the acceleration
calculated by the CAH component; Θ is the Heaviside step
function. The IDM parameters used are listed in TABLE I.
TABLE I: CACC Vehicle Control Parameters
Parameter
value
T
0.9 s
s0
1 m 2 m/s2
a
b
2m/s2
c
0.99
θ
4
xdes
105 km/h
The benefits of AIDs and CAV are of complementary nature
as exhibited in TABLE II. The primary benefit for CAV is
the short following headway, which plays a crucial role in
improving roadway capacity. Additionally, the elimination of
start-up lost time (the time drivers takes to react and accelerate
when a signal turns green from red) is also feasible owing to
the vehicle-to-infrastructure (V2I) communication. The start-
up lost
time for HVs is set as 2 s. The effectiveness of
the synchronized start has not been substantiated by previous
research: some reserach found significant benefits [9], while
other did not [10]. Therefore, the first two benefits for CAV
(close following headway and no start-up lost time) are im-
plemented in the simulation. The simulation is conducted in
two settings. First, we will evaluate the overall intersection
performance. Then we shift the study focus on the region
where driver's confusion could occur in order to assess its
impact.
TABLE II: Benefits of CAV and AID
AID
Benefit
Intersection conflict point reduction X
X
Signal phase reduction
Traffic movement streamlining
Close following headway
Start-up lost time elimination
Synchronously discharge
Driver's confusion intervention
X
CAV
X
X
X
X
The PTV Vissim, a microscopic traffic simulation, and
its external driver model application programming interface
(API) are used to develop the simulation network. We have
constructed two AIDs: a real-world DDI (Fig. 2(a)) and a
1.61-mile, three-lane RCUT intersection Fig. 2(b). The DDI
is located at the intersection of the State Highway 72 (DE-
72) and US Highway 13 (US-13). It was converted from a
(a) DDI Network
(b) RCUT Netowrk
Fig. 2: Configurations of selected DDI and RCUT
convetional diamond interchange in early 2016 and open to
trafic in late 2016 [22]. Four settings for DDI are simulated
as shown in TABLE III.
TABLE III: Simulation Cases for DDI
CDI
Case
Base-CDI X
Base-DDI
CAV-CDI
CAV-DDI
X
DDI
AV MPR
X
X
X
X
0%
0%
10-100%
10-100%
The arterial demand is assumed to be 3,000 vph for both
westbound and eastbound direction. The traffic volume for
either of the on-ramp is 400 vph. A CDI network is built
for the comparison between a CDI and a DDI. Signalization
is only implemented at the two cross-over locations in the
DDI. Each through movements has a 55-s green phase in each
signal cycle which is 120 s. For the CDI, the phase timings
are set as 73 s, 17 s, and 18 s for through, left-turn to the
on-ramp, and left-turn from the off-ramp, respectively. The
speed limit is 50 mph for both of the networks. For the RCUT,
only the westbound direction of the RCUT is analyzed. The
distance between the minor street and the diverging point of
the median U-turn is approximately 1,300 ft., larger than the
600-ft. minimal design requirement set forth by ASSHTO [23]
for RCUT. The mainline demand from the westbound direction
is 5,000 vph and the demand from the southbound minor street
is 400 vph.
For each level of MPR, ten replications of simulation is
conducted to factor in the variability of the simulation. Each
replication runs for 3,900 s with 300 s as the warm-up time to
load the network with traffic. The simulation resolution is set
as 10 Hz. For studying the driver' confusion, 30 replications
for each level of the confused drivers are conducted to obtain
additional samples for the ANOVA test. The data collection is
performed every 5 min.
IV. RESULTS & DISCUSSION
A. Impact of CAV
The network throughput of both the DDI and the CDI
is shown in Fig. 3. The vertical bar associated with each
marker represents the size of the 90% confidence interval with
bootstrapping [24], a statistical technique. The throughput of
the network increased to 5,350 vph in DDI from 4,400 vph
that is observed in the CDI case. The standard deviation of the
throughput in the CDI case is greater than that of the DDI.
With CAVs in the network, the overall trend for throughput
for either DDI and CDI is increasing, given there are cases
of slight deceases (i.e. 50% and 60% in the CDI case).
Furthermore, with the same level of MPR, the observations in
DDI exhibits a narrower 90% confidence interval, an indication
of less standard deviation.
improving the efficiency of a signalized intersection than CAV
in terms of mobility.
Fig. 4: Average delay
When it comes to RCUT, the flow-speed observations in
three locations (diverging, upstream, and downstream) are
shown in Fig. 5. In all three locations, the flow-speed curve
of CAV systematically shifts to the higher flow rate region at
the right side of the chart. The carrying capacity for the CAV
case reaches 2,100 vph per lane.
Fig. 3: Network throughput
The average delay for each vehicle is plotted in Fig. 4.
Similar to the throughput, the geometry configuration of the
interchange greatly contributed to the reduction of the average
delay. There is a clear separation (i.e. 40 s delay per vehicle)
between the observations of DDI and those of the CDI. Again,
the delay observed in DDI not only has a lower mean value,
but also less standard deviation, compared to the CDI case.
However, the delay only marginally decreases as the MPR
increases.
Both Fig. 3 and Fig. 4 jointly indicate that only with the
short-following distance and the zero start-up lost time do not
significantly increase the performance of the signalized inter-
change. The start-up lost time is dedicated by the likelihood
of a CAV being in the first vehicle at the stop line during a
red phase. Even though zero start-up lost time are to be taken
advantage of, the benefits from it would still be limited. For
example for 120-s signal cycle within an hour, only 30 times
per lane of such advantage is possible at best. On the other
hand, by reducing the signal phase and separating conflict, the
network performance can be improved at a significant level.
Therefore, AIDs could instead play more significant roles in
Fig. 5: Flow-speed curve observed at the diverging area for
RCUT with full CAV penetration
B. Impact of Driver's Confusion
The corridor impact of the driver's confusion has not yet
been taken into account in the previous studies. We consider
the behaviors of drivers due to the confusion are: 1) sudden
slowdown due to confusion prior to the AID ramp and 2)
making an abrupt lane change at the last minute. The area for
each AID that could most likely create confusion for drivers
is identified in red in Fig. 2 based on the geometric design of
the networks. In the RCUT, it is the U-turn pocket lane in the
diverging area, which accommodates U- and left-turn traffic.
The route decision point is set closer to the U-turn pocket lane
to induce aggressive lane change that is likely observed from
the unfamiliar drivers in order to make it to the U-turn lane.
For the DDI, it is the signalized crossover intersections on the
arterial. A reduction in desired speed is set for the unfamiliar
drivers to mimic the slowdown behavior due to confusion.
The percentage of unfamiliar drivers is set from 0% to
20% with a 5% increment. For each scenario, 30 replications
are run. Point (road section) and network-wide performance
data are collected every 5 min. The shockwave created by
the drivers confusion is illustrated in Fig. 6, where each line
represents the trajectory of one vehicle from the simulation
with 10% unfamiliar drivers for RCUT. Red trajectory lines are
unfamiliar drivers, whereas the cyan lines represent commuter
drivers who are familiar and have gotten used to the RCUT.
As seen, the sudden slowdown due to the drivers confusion
creates a shockwave and it propagates upstream, affecting
the following vehicles. On the right side of Fig. 6,
the
traffic trajectories indicate a free-flow condition in the absence
of slowdown or abrupt lane change induced by the drivers
confusion. As demonstrated, too much drivers confusion could
easily disrupt the progression of the traffic, not to mention the
safety hazard it may create.
Fig. 6: Impact of driver's confusion
Fig. 7: Flow-speed curve observed at the diverging area for
RCUT for drivers confusion
TABLE IV: ANOVA Test for Average Vehicle Delay in RCUT
Confused
Driver Rate
0%
5%
10%
15%
20%
N
360
360
360
360
360
Delay, s/veh Grouping
A
B
C
12.2
28.65
39.36
43.45
48.79
D
E
TABLE V: ANOVA Test for Average Vehicle Delay in DDI
Confused
Driver Rate
0%
5%
10%
15%
20%
N
360
360
360
360
360
Delay, s/veh Grouping
A
B
C
81.42
82.44
83.54
84.41
85.78
D
E
scenarios at 95% confidence level. The ANOVA test result
(TABLE IV) shows that the pairwise differences among five
levels of confused drivers are statistically different. Similarly,
the ANOVA test for average vehicle delay for DDI exhibits
an increasing pattern that
the average vehicle delays are
statistically different at 95% confidence level as shown in
TABLE V.
The speed-flow diagram of the diverging area of the RCUT
network is shown in Fig. 7. The overall speed of the traffic
flow with confused drivers is lower than the base case. This
is due to the temporary traffic obstruction of the unexpected
behaviors of the confused drivers. The impacted vehicles at the
end of the diverging area where the data are collected have
not regained the prevailing speed of the roadway. As a result,
the data sample points shift downward to the range of 30 mph
and 40 mph with the presence of confused drivers.
The average vehicle delay for the entire network is collected.
ANOVA test with post-hoc Tukeys method [25] is conducted
to assess the statistical difference among the five tested
V. CONCLUSION
The alternative intersection designs have attracted an in-
creasing amount of attention as a promising measure to
improve the performance of an intersection, as evidenced by
field deployments and simulation study. The joint deployment
of alternative intersection designs and CAV is studied in
this paper via microscopic traffic simulation. According to
the results on mobility, only 7% increase in throughput is
observed under full CAV market penetration, compared to
the 20% gain in throughput with only the conversion from
a conventional diamond interchange to a diverging diamond
interchange. Note that the benefits of the CAV could be further
[8] S. Castronovo, P. W. Dorothy, M. C. Scheuer, T. L. Maleck, and
Others, "The Operational and Safety Aspects of the Michigan Design
for Divided Highways," Volume I, Michigan State University College of
Engineering, 1995.
[9] Z. Zhong, L. Joyoung, and L. Zhao, "Evaluations of Managed Lane
Strategies for Arterial Deployment of Cooperative Adaptive Cruise
Control," in 96th Transportation Research Board Annual Meeting,
Washington DC, USA, 2017.
[10] S. Le Vine, X. Liu, F. Zheng, and J. Polak, "Automated cars: Queue
discharge at signalized intersections with Assured-Clear-Distance-
Ahead'driving strategies," Transportation Research Part C: Emerging
Technologies, vol. 62, pp. 35 -- 54, 2016.
[11] K. Yang, S. I. Guler, and M. Menendez, "Isolated intersection control
for various levels of vehicle technology: Conventional, connected, and
automated vehicles," Transportation Research Part C: Emerging Tech-
nologies, vol. 72, pp. 109 -- 129, 2016.
[12] J. Autey, T. Sayed, and M. El Esawey, "Operational performance
comparison of four unconventional intersection designs using micro-
simulation," Journal of Advanced Transportation, vol. 47, no. 5, pp.
536 -- 552, 2013.
[13] T. Sayed, P. Storer, and G. Wong, "Upstream signalized crossover inter-
section: optimization and performance issues," Transportation Research
Record: Journal of the Transportation Research Board, no. 1961, pp.
44 -- 54, 2006.
[14] V. Chilukuri, S. Siromaskul, M. Trueblood, T. Ryan, and Others, "Di-
verging diamond interchange performance evaluation (I-44 and Route
13)," Missouri. Dept. of Transportation, Tech. Rep., 2011.
[15] J. Reid and J. Hummer, "Travel
time comparisons between seven
unconventional arterial intersection designs," Transportation Research
Record: Journal of the Transportation Research Board, no. 1751, pp.
56 -- 66, 2001.
[16] J. Bared, T. Granda, and A. Zineddin, "FHWA tech brief: Drivers'
evaluation of the diverging diamond interchange," Washington DC:
Turner-Fairbank Highway Research Center. Tech Brief. FHWA-HRT-07-
048, 2007.
[17] B. Claros, "Transportation safety modeling and evaluation: alternative
geometric designs, enforcement, and airfield applications," 2017.
[18] A. Kesting, M. Treiber, and D. Helbing, "Enhanced intelligent driver
model
to access the impact of driving strategies on traffic capac-
ity," Philosophical Transactions of the Royal Society A: Mathemati-
cal,Physical and Engineering Sciences, vol. 368, no. 1928, pp. 4585 --
4605, 2010.
[19] R. Wiedemann, "Simulation des Straenverkehrsflusses," Ph.D. disserta-
tion, Karlsruhe, 1974.
[20] -- -- , "Modelling of rti-elements on multi-lane roads," in Drive Confer-
ence (1991: Brussels, Belgium), vol. 2, 1991.
[21] M. Treiber, A. Hennecke, and D. Helbing, "Congested Traffic States in
Empirical Observations and Microscopic Simulations," pp. 1805 -- 1824,
2000.
[22] "Sr 72/sr 1 diverging diamond interchange," https://www.deldot.gov/
information/projects/SR72-SR1/index.shtml, accessed: 2019-05-01.
[23] M. W. Hancock and B. Wright, "A policy on geometric design of
highways and streets," 2013.
[24] J. S. Haukoos and R. J. Lewis, "Advanced statistics: bootstrapping
confidence intervals for statistics with difficult distributions," Academic
emergency medicine, vol. 12, no. 4, pp. 360 -- 365, 2005.
[25] "Pairwise comparisons for one-way anova," https://support.minitab.
com/en-us/minitab/18/help-and-how-to/modeling-statistics/anova/
how-to/one-way-anova/interpret-the-results/ all-statistics-and-graphs/
pairwise-comparisons/, accessed: 2018-09-30.
optimized in operation, such as using eco-driving approaching
control, adaptive signal control, or ultimately with signal-free
autonomous intersection management. They will be part of the
future study.
The impact of the potential the driver's confusion is quan-
tified by analyzing the traffic flow and vehicle trajectory
data. It is found that the influence is more localized. Hence
limited impact on performance at network level is observed.
Future study should focus on the safety aspect at a more
granular level (e.g., individual vehicle level). Additionally,
explicit consideration for the increased safety brought by
CAV should be integrated into the subsequent study. Lastly,
more sophisticated scenarios, including signal plans, demand
composition, CAV applications, etc., should be included to
expand the comparison.
APPENDIX A
LIST OF ABBREVIATIONS
Abbreviation Definition
AID
ANOVA
API
DDI
CDI
RDT
CAV
MUT
MPR
DLT
RCUT
V2X
V2I
SAE
HV
MPR
ASSHTO
alternative intersection design
analysis of variance
application programming interface
diverging diamond interchange
conventional diamond interchange
roundabout
connected and automated vehicle
median U-turn intersection
market penetration rate
displaced left-turn intersection
restricted crossing U-turn intersection
vehicle-to-anything
vehicle-to-infrastructure
Society of Automotive Engineers
human-driven vehicle
market penetration rate
American Association of State High-
way and Transportation Official
REFERENCES
[1] A. Dhatrak, P. Edara, and J. Bared, "Performance analysis of parallel
flow intersection and displaced left-turn intersection designs," Trans-
portation Research Record: Journal of
the Transportation Research
Board, no. 2171, pp. 33 -- 43, 2010.
[2] Institue for Transportation Research and Education, "Alternative
Intersections and Interchange." [Online]. Available: https://www.google.
com/maps/d/u/0/viewer?mid=1MMZKi0RdQqjZjtBxmSTznUVnurY
[3] Volpe National Transportation Systems Center, "Vehicle-infrastructure
integration (VII) initiative benefit-cost analysis version 2.3 (draft),"
2008.
[4] G. Chlewicki, "Should the diverging diamond interchange always be
considered a diamond interchange form?" Transportation Research
Record, vol. 2223, no. 1, pp. 88 -- 95, 2011.
[5] X. Yang, G.-L. Chang, and S. Rahwanji, "Development of a signal
optimization model for diverging diamond interchange," Journal of
Transportation Engineering, vol. 140, no. 5, p. 4014010, 2014.
[6] W. Hughes, R. Jagannathan, D. Sengupta, and J. E. Hummer, "Alterna-
tive intersections/interchanges: informational report (AIIR)," Tech. Rep.,
2010.
[7] M. Scheuer and K. L. Kunde, "Evaluation of Grand River Avenue
(M-5/M-102) Safety Improvement Project Before and After Study,"
Michigan Department of Transportation, Lansing, 1996.
|
1912.06019 | 1 | 1912 | 2019-12-12T15:14:17 | Leader Selection in Multi-Agent Networks with Switching Topologies via Submodular Optimization | [
"cs.MA",
"math.OC"
] | In leader-follower multi-agent networks with switching topologies, choosing a subset of agents as leaders is a critical step to achieve desired performances. In this paper, we concentrate on the problem of selecting a minimum-size set of leaders that ensure the tracking of a reference signal in a highorder linear multi-agent network with a set of given topology dependent dwell time (TDDT). First, we derive a sufficient condition that guarantees the states of all agents converging to an expected state trajectory. Second, by exploiting submodular optimization method, we formulate the problem of identifying a minimal leader set which satisfies the proposed sufficient condition. Third, we present an algorithm with the provable optimality bound to solve the formulated problem. Finally, several numerical examples are provided to verify the effectiveness of the designed selection scheme. | cs.MA | cs | Leader Selection in Multi-Agent Networks with
Switching Topologies via Submodular Optimization
Kaile Chen, Wangli He, Senior Member, IEEE, Yang Tang, Senior Member, IEEE, and Wenle Zhang
1
9
1
0
2
c
e
D
2
1
]
A
M
.
s
c
[
1
v
9
1
0
6
0
.
2
1
9
1
:
v
i
X
r
a
Abstract -- In leader-follower multi-agent networks with switch-
ing topologies, choosing a subset of agents as leaders is a
critical step to achieve desired performances. In this paper, we
concentrate on the problem of selecting a minimum-size set of
leaders that ensure the tracking of a reference signal in a high-
order linear multi-agent network with a set of given topology-
dependent dwell time (TDDT). First, we derive a sufficient
condition that guarantees the states of all agents converging to
an expected state trajectory. Second, by exploiting submodular
optimization method, we formulate the problem of identifying
leader set which satisfies the proposed sufficient
a minimal
condition. Third, we present an algorithm with the provable
optimality bound to solve the formulated problem. Finally, several
numerical examples are provided to verify the effectiveness of the
designed selection scheme.
Index Terms -- Leader selection, multi-agent networks, switch-
ing topologies, submoular optimization.
I. INTRODUCTION
R Ecent decades have witnessed an explosion of research
in multi-agent networks (MAN) [1]-[5], where the MAN
framework is applied to analyze dynamical systems in a
rich body of applications, containing the cooperative flight
of multiple manned/unmanned combat aerial vehicles [6] and
wireless sensor networks [7]. The leader-follower configura-
tion [8] is an important approach in MAN. This technique has
emerged due to its contribution to the design of practicable
strategies for formation control [9], and is applied to the study
of consensus tracking widely [10]-[11]. Specifically, a subset
of agents selected as leaders drive a multi-agent network
towards the desired objective [12]. In recent years, several
works have unveiled a fact that the suitable placement for
leaders would have a major impact on the effectiveness of
applying state-of-the-art control techniques [13]-[16]. There-
fore, the research interest of exploring systematic approaches
to leaders deployment grows gradually. In addition, the study
of such mechanisms parallels with controllability research. The
significance of leader selection lies in ensuring the desired
target with specified leaders as few as possible to impel the
feasibility of control.
The early related results are summarized into [17], where
several criteria are presented to show that for control system
design input selection plays an important role in realizing
expected objectives. Actually, in a leader-follower multi-agent
network, leaders act as the role of control inputs. Recent
progress on the problem of choosing a minimal set of leaders
K. Chen, W. He, Y. Tang and W. Zhang are with the Key Laboratory
of Advanced Control and Optimization for Chemical Processes, Ministry
of Education, East China University of Science and Technology, Shanghai
200237, China (e-mail: [email protected]).
mainly focuses on optimizing expected performances [15]. In
what follows, three existing frameworks are listed briefly. First,
several works study the leader selection problem from a graph-
theoretic perspective in [18] and references therein. Especially,
in the pioneering work [19], an applicable selection method
based on the maximum matching algorithm is presented in the
exploration of large-scale complex networks. Second, the au-
thors in [14] and [20] solve the leader selection problem with
a specific objective function, by relaxing the binary constraints
into the convex hull. Then, the convex relaxation problem can
be solved efficiently via a standard technique, such as the
customized interior point method. Third, the submodular opti-
mization technique is an another emerging focus [21]-[25]. For
instance, with such a tool, the leader selection problem for the
realization of synchronization within a desired level is studied
in [22]. The strength of the submodular optimization scheme
lies in the contribution to the establishment of polynomial-time
approximation algorithms with the provable optimality bound
for computationally prohibitive tasks [23], while the above-
mentioned convex relaxation algorithms cannot render such a
bound. In addition, an overview of submodularity in leader
selection is shown in [24].
In the study of dynamical networks, the situation where
the communication topology changes over time is widely
considered [26]-[28]. In practice, there are quite a few reasons
that cause the switching behavior of the interaction topology,
such as external disturbances and limitations of sensors [29].
The current literature on leader selection, including the above-
mentioned works and references therein, mainly considers that
the network topology is fixed, while we are interested in
the switching case. In [13] where robustness to link noise
could be optimized by selecting a leader set, the realization
of consensus that acts as the requirement of leader selection
only depends on connectivity [2] in the scenario of switching
topologies, due to the first-order agent model. However, except
for connectivity, the condition of the dwell time (the time
internal between two consecutive switchings [30]) is also
required to guarantee consensus in the case of the second-order
or high-order agent model [31]. Hence, we incorporate the
connectivity and the dwell time jointly into the consideration
so as to ensure consensus by leader selection. In addition,
we relax the condition that each agent is reachable in any
predefined graph in [32] where the authors investigate leader
selection in high-order linear MAS with switching graphs.
In this paper, we study the minimal leader selection problem
in the high-order linear multi-agent network with a set of given
TDDT. More specifically, we propose a heuristic algorithm
to obtain an eligible leader set which makes the states of
remaining followers converge to the state of leaders,
i.e.,
achieving consensus tracking. The main challenge of our work
lies in how to reduce the computational complexity, since the
solution to a desired leader set is a prohibitive task with an
exhaustive search if the number of agents is large. In this
paper, by leveraging submodularity-ratio [33], we present an
efficient approximation method with the provable optimality
bound to overcome the difficulty.
The main contributions in this paper are listed below.
• We derive a sufficient condition to determine the conver-
gence of each follower's state to the states of leaders
in the high-order multi-agent network with switching
topologies. Furthermore, this condition is based on the
case that each system mode corresponding to the prede-
fined topology is considered to be unstable, so that the
derived condition could be also applied to the scenario
where several or all of the modes are required to be stable.
• We formulate the optimization problem of determining
a minimum-cardinality set of leaders that ensure the
tracking with a set of given TDDT. Besides, the metric
of leader selection is constructed based on the proposed
sufficient condition, and is then utilized for evaluating
whether an agent could be selected as a leader.
• By submodularity ratio, we present an efficient algorithm
with the provable optimality bound to solve the formu-
lated problem. To reduce the conservativeness, we present
another heuristic selection algorithm.
The remaining content of this paper is organized as follows.
In Section II, preliminaries are presented. In Section III, the
concise problem description is given. In Section IV, a heuristic
algorithm is shown to determine adequate leaders with a set of
given TDDT. In Section IV, the effectiveness of the proposed
framework is validated by numerical examples. Section V
concludes the paper.
II. PRELIMINARIES
In this section, we provide notations throughout this paper,
and necessary concepts on algebraic graph theory. In addition,
two definitions related to submodularity are presented, which
are crucial points to describe main results.
A. Notations
Rn is the n-dimensional Euclidean space and 1n is a n-
dimensional vector with all components being 1. In represents
the identity matrix of dimension n. When a matrix P is
positive definite (positive semi-definite), then it is denoted as
P ≻ 0 (P (cid:23) 0). diag(A1, A2, ... , An) represents a block-
diagonal matrix with matrices or scalars Ai on its diagonal,
i = 1, 2, ... , n. ⊗ denotes Kronecker product, satisfying
A ⊗ B = (A ⊗ Ip)(In ⊗ B), where A ∈ Rm×n, and
B ∈ Rp×q.
S means the cardinality of a set S. λi(A)
represents the ith eigenvalue of the matrix A. Re(γ) is the
real part of the complex number γ. dist(x, y) represents the
Euclidean distance between vectors x and y. λmax(A) and
λmin(A) denote the largest and smallest eigenvalues of the
matrix A respectively. λr(A) represents the eigenvalue with
the largest real part of the matrix A. The superscript T means
transpose for real matrices.
2
B. Algebraic Graph theory
We define the digraph structure of a multi-agent network
as G = {Ω, E}, where the index set of N agents is denoted
as Ω = {1, 2, ... , N }, while the index set of directed links is
shown as E ∈ Ω × Ω. The N agents are divided into leaders
and followers. The former, whose set are denoted by S ⊆
Ω, act as external control inputs. They are available to the
reference signal as well as the state values of their neighbors.
The latter are only accessible to the information of adjacent
agents. In addition, the neighbors index set of the agent i is
defined as N (i) , {j : (j, i) ∈ E}. L = [lij] ∈ RN ×N means
the Laplacian matrix of G, i, j = 1, 2, ... , N , i 6= j, lij = −1
if (j, i) ∈ E and lij = 0 otherwise, where (j, i) is a directed
link from agent j to agent i, satisfying
N
Xj=1,j6=i
lij = −lii.
Moreover, in this paper, we focus on simple graph only, i.e.,
without multiple links.
C. Submodularity
Definition 1 ([13]). Set V as a finite set. A function f : 2V →
R, is submodular if for any subset of V , i.e., S ⊆ T ⊆ V ,
and any v ∈ V \T , such that:
f (S ∪ v) − f (S) ≥ f (T ∪ v) − f (T ).
This inequality characterizes the submodularity, which is the
quantitative measure of the diminishing-return property [34].
It is analogous to concavity of continuous functions, wherein
the increment of adding a new component v ∈ V \T to the set
S, is larger than or equal to the set T . Moreover, a function f
is submodular, if (-f ) is supermodular and vice versa.
Definition 2 ([33]). f : 2Ω → R is a non-negative set function.
With respect to a subset U ⊆ Ω as well as a given constant
k ≥ 1, the submodularity-ratio of f is given by
γU,k = min
W ⊆U
W ∩S=∅
S≤k
Pl∈S(f (W ∪ {l}) − f (W ))
f (W ∪ S) − f (W )
.
For a general set function f , the submodularity-ratio cap-
tures its "distance" to submodularity. f is submodular if and
only if γU,k ≥ 1, ∀U, k, and f is a nondecreasing function,
when γU,k ∈ [0, 1). Furthermore, this concept contributes
to extending derivation of the provable optimality bound for
algorithms, even though f is not exactly submodular. Actually,
it is straightforward to see that this definition is applicable to
depict the "distance" of a set function f to supermodularity.
III. PROBLEM DESCRIPTION
In this section, we present the dynamics of the multi-agent
network and then state the research problem briefly.
A. Dynamics
The dynamics of individual agent in the high-order linear
multi-agent network with switching topologies is described as
follows:
xi(t) = Axi(t) + Bui(t),
(1)
of the modes are required to be stable, then it would be better
to consider multiple leader sets so as to reduce the number of
unnecessary leaders in each predefined graph. This implies that
there are several leader sets switching as the communication
topology changes over time, and this direction is considered
as our future work.
3
where
ui(t) = Xj∈Nσ(t) (i)
[xj (t) − xi(t)] − diKσ(t)[xi(t) − x∗(t)],
and xi(t) ∈ Rn is the state of the agent i. A ∈ Rn×n
is the individual self-dynamics matrix. B is the individual
control input matrix and we consider it as IN for brevity.
For the sake of concise statement, we denote σ(t) as the
switching signal : [0, ∞) → P, a right continuous and piece-
wise constant mapping. σ(t) depicts the time dependence of
underlying graphs. P represents an index set for predefined
topologies, i.e., P = {G1, G2, ... , Gm}, where m is the number
of predefined topologies. The time internal between any two
consecutive switchings is called as the dwell time τ [30].
For reducing conservation, we consider that the dwell time
is not identical but topology-dependent, which is denoted as
τGi , Gi ∈ P, i = 1, 2, ..., m. di is defined to be 1 when the
agent i is selected as a leader and 0 otherwise. The calculation
for Kσ(t) is shown in Section IV. Besides, x∗(t) ∈ Rn is the
state of the given reference signal, where x∗(t) = Ax∗(t).
For the convenience of analysis, we define the tracking
error state between the agent i and the reference signal as
ǫi(t) = xi(t) − x∗(t). By collecting total tracking error states,
we introduce following mathematical expression:
ǫ(t) = (ǫT
1 (t), ǫT
2 (t), ... , ǫT
D = diag(d1, d2, ... , dN ).
N (t))T ,
Thus, the tracking error dynamics of the multi-agent network
is written as the compact form:
ǫ(t) = (IN ⊗ A − Lσ(t) ⊗ In − D ⊗ Kσ(t))ǫ(t).
(2)
Subsequently, the tracking problem is transformed into the
stabilization form, where we consider the (2) as the error
system. For brevity, we rewrite the system (2):
ǫ(t) = Aσ(t)ǫ(t),
(3)
where Aσ(t) = IN ⊗ A − Lσ(t) ⊗ In − D ⊗ Kσ(t). Besides, we
consider Ap as a system mode for the pth topology, p ∈ P. In
this paper, the interaction topology changes over time, which
leads to the mode switching.
Remark 1. Actually, it is permissible for any system mode
to be stable or unstable. If a system mode is considered as
the stable case, i.e., λr(Ap) ≤ 0, it is demanding for the
corresponding topology where each agent should be reachable.
However, this topology condition is not necessary if there
exists no specific constraint, since the topology requirement to
ensure the tracking is that each agent is reachable in the union
of the directed interaction graphs [2]. Therefore, generally, we
consider that each mode is unstable, i.e., λr(Ap) > 0, ∀p ∈ P,
which signifies that it is possible that there exist unreachable
agents in any predefined topology. Furthermore, if some or all
B. Minimal Leader Selection for Tracking
The problem that we focus on is to select a minimum-
size leader set S with a set of given TDDT, where the set S
determines the configuration matrix D = diag(d1, d2, ... , dn),
such that the asymptotic stability of the system (3) can be
guaranteed. Then, we further give the description for the
problem in terms of optimization form as follows:
¯P1
min
S⊆Ω
S
s.t. The system (3) is asymptotically stable,
(4)
S ≤ k,
where k is a given positive integer, as the upper bound for
the desired number of leaders. ¯P1 is combinatorial in nature,
so that acquiring the solution is a computationally prohibitive
task if the number of agents is large. In the next section, we
leverage submodularity-ratio to solve ¯P1 efficiently.
IV. THE LEADER SELECTION METHOD
In this section, we mainly propose the method of choosing
a minimal set of leaders with a set of given TDDT in
order to realize asymptotic stability of the system (3). In the
first subsection, a sufficient condition is derived to guarantee
the stability performance, which is equivalent to ensure the
convergence of each follower' state to that of leaders. In the
next subsection, based on the application of the submodular
optimization scheme, we formulate the minimal leader prob-
lem. In the remaining subsection, an efficient algorithm is
designed with the greedy rule, used for solving the formulated
combinatorial optimization problem, and then we prove the
optimality bound of the proposed method.
A. The Sufficient Condition for Tracking
We draw on an existing result, which is regarded as the
preparation for our sufficient condition that ensures the system
(3) asymptotically stable.
Lemma 1 ([35]). Given scalars η ≥ η∗ ≥ 0, µ ∈ (0, 1),
τ max ≥ τ min > 0, consider the system (3). If there exists a set
of matrices Pp,i ≻ 0, i = 0, 1, ..., l, p ∈ P, such that ∀i = 0,
1, ..., l − 1, ∀p, q ∈ P, p 6= q ,
AT
p Pp,i + Pp,iAp + ψ(i)
AT
p Pp,i+1 + Pp,i+1Ap + ψ(i)
AT
p − ηPp,i ≺ 0,
p − ηPp,i+1 ≺ 0,
p Pp,l + Pp,lAp − ηPp,l ≺ 0,
Pq,0 − µPp,l (cid:22) 0,
logµ + ητ max < 0,
(5)
(6)
(7)
(8)
(9)
where ψ(i)
2 η∗IN n) is
Hurwitz stable, ∀p ∈ P, then the system (3) is globally
p = l(Pp,i+1 − Pp,i)/τ min and (Ap − 1
uniformly asymptotically stable (GUAS) under any switching
law σ(t) ∈ D[τ min,τ max], where D[τ min,τ max] represents the set
of all feasible switching policies with the dwell time τz ∈
[τ min,τ max], ∀z = 0, 1, 2, ....
Remark 2. If we regard Lemma 1 as a sufficient condition
directly to ensure the performance of tracking, it is problematic
to formulate the minimal leader selection problem, since it is
not intuitive to evaluate whether an agent could be selected
as a leader by those linear matrix inequalities. In order to
solve such a matter, we derive a sufficient condition so as
to assure the asymptotic stability of the system (3), and then
we can formulate the leader selection problem via submodular
optimization method with a scalar metric. Then, we can design
an efficient algorithm to deal with the minimal leader selection
problem. Thus, the following result plays a basic role in the
construction of the proposed selection scheme.
Theorem 1. Given scalars ηp > 0, τ min
p > 0 and µp ∈ (0,1),
consider the system (3) with all unstable modes. If the follow-
ing conditions hold,
Re(λr(A(1)
p +
IN n)) < 0,
Re(λr(Ap +
1
2
(
− ηp)IN n)) < 0,
lp + ϕ
2βτ min
p
lp
τ min
p
(10)
(11)
∀p ∈ P, where ϕ > 0 is a constant with the sufficient small
value,
β =
λmax((A(1)
p )T + A(1)
p )
2Re(λr(A(1)
p ))
,
A(1)
p = Ap −
1
2
(
lp
τ min
p
+ ηp)IN n,
(12)
(13)
then there exist matrices IN n ≻ Pp,i ≻ 0, i = 0, 1, ..., lp,
such that ∀i = 0, 1, ..., lp − 1, ∀p ∈ P, satisfying
AT
p Pp,i + Pp,iAp + φp,i − ηpPp,i ≺ 0,
p Pp,i+1 + Pp,i+1Ap + φp,i − ηpPp,i+1 ≺ 0,
AT
(14)
(15)
where φp,i = lp(Pp,i+1−Pp,i)/τ min
matrices Pp,0 and Pp,lp , ∀p ∈ P, p 6= q, such that
p
. Furthermore, if there exist
Proof of Theorem 1. Considering Lemma 2 and the fact that
β ∈ (0, 1] [36], it is explicit to see
4
(lp + ϕ)/τ min
−2βRe(λr(A(1)
p
p ))
< 1.
(19)
According to [37], since ((A(1)
Px ≻ 0 of the following Lyapunov function
p )T + A(1)
p ) ≺ 0, the solution
(A(1)
p )T Px + PxA(1)
p +
lp + ϕ
τ min
p
IN n = 0,
is bounded by
λmax(Px) ≤
Thus, due to (19), one has
(lp + ϕ)/τ min
−2βRe(λr(A(1)
p
p ))
.
λmax(Px) < 1.
which implies 0 ≺ Px ≺ IN n. Then, we derive
(A(1)
p )T Px + PxA(1)
p = −
lp + ϕ
τ min
p
IN n ≺ −
lp
τ min
p
IN n,
Furthermore, combining with Pp,i ≺ IN n, ∀i = 0, 1, ... , lp,
then, it is intuitive to derive
AT
p Pp,i + Pp,iAp − (
lp
τ min
p
+ ηp)Pp,i ≺ −
lp
τ min
p
Pp,i+1.
which makes (14) hold. Similarly, in light of (11) as well as
Lemma 2, we have
Re(λr(Ap +
1
2
λmax((A(2)
βx =
− ηp)) < −
(
lp
τ min
p
p )T + A(2)
p )
ϕ
2βx
,
,
2Re(λr(A(2)
p ))
where A(2)
IN n ≻ P
′
p = Ap + (lp/τ min
x ≻ 0 of the following Lyapunov function exists,
p − ηp)/2. Hence, the solution
(A(2)
p )T P
x + P
xA(2)
p + ϕIN n = 0.
′
′
Then, ∀i = 0, 1, ... , lp − 1, one has
Pq,0 − µqPp,lp (cid:22) 0,
(16)
AT
p Pp,i+1 + Pp,i+1Ap +
lp
τ min
p
Pp,i+1 − ηpPp,i+1 ≺ 0.
(20)
then the total tracking error states of the system (3) can con-
verge to zero when the TDDT satisfies τp ∈ [τ min
], p ∈
P, where
, τ max
p
p
logµp + ηpτ max
p < 0.
(17)
Prior to showing the proof, a lemma is needed as follows.
Lemma 2. (10) holds, ∀p ∈ P, and then we have
Re(λr(A(1)
p )) < −
lp + ϕ
2βτ min
p
,
(18)
Since Pp,i ≻ 0, ∀i = 0, 1, ... , lp, we see
AT
p Pp,i+1 + Pp,i+1Ap +
lp
τ min
p
Pp,i+1 − ηpPp,i+1 ≺
lp
τ min
p
Pp,i.
which satisfies (15). Due to (20), it is obvious to see
AT
p Pp,i+1 + Pp,i+1Ap − ηpPp,i+1 ≺ −
lp
τ min
p
Pp,i+1 ≺ 0.
With i = lp − 1, we derive
AT
p Pp,lp + Pp,lpAp − ηpPp,lp+1 ≺ 0.
where ϕ > 0 is a constant with the sufficient small value.
Proof. We refer the readers to Appendix A for the proof in
details.
Here, it is ready to present the proof of our first result.
Thereby, based on Lemma 1, (14)-(17) make (5)-(9) hold. The
proof is complete.
Remark 3. There are three differences between Lemma 1 and
Theorem 1. First, the latter limits the solution range of the
matrices by IN n ≻ Pp,i ≻ 0, i = 0, 1, ... , lp, p ∈ P, which is
helpful to determine the existence of all qualified Pp,i. Second,
Theorem 1 utilizes the TDDT, which is less conservative [30]
compared to the dwell time. In addition, the utilization of
TDDT is beneficial to reduce the conservativeness for the
leader selection. Third, the proposed condition transforms the
existence of (5)-(7) into the determination of (10)-(11), which
is prepared for the construction of a scalar metric in the
leader selection algorithm. Furthermore, the exact value of
ηp > 0 is not arbitrary, but it has a specific lower bound
with ηp > lp/τ min
. Actually, if ηp is without such a bound,
then it is impossible to make (11) hold when λr(Ap) > 0.
Specially, it is accessible to extend this sufficient condition to
considering some or all of stable modes.
p
Subsequently, we present a straightforward corollary to deal
with the situation, where the system (3) is composed of stable
modes and unstable modes. In addition, S and U denote the
set of stable modes and unstable modes, respectively, where
S ∪ U = P and S ∩ U = ∅.
Corollary 1. Given scalars τ min
p > 0, p ∈ P, µp ∈ (1, + ∞),
ηp < 0, p ∈ S, µp(0,1), ηp > 0, p ∈ U , consider the system
(3) with stable modes and unstable modes. If the following
inequalities hold
then there exist matrices IN n ≻ Pp,i ≻ 0, i = 0, 1, ..., lp,
such that ∀i = 0, 1, ..., lp − 1, satisfying
AT
p Pp,i + Pp,iAp − ηpPp,i ≺ 0, p ∈ S,
(21)
and (14)-(15), p ∈ U . Thus,
if there exist matrices Pp,0
and Pp,lp , ∀p ∈ P, p 6= q, such that (16) holds, then the
total tracking error states of the system (3) can converge
to zero when the TDDT satisfies τp > − logµp
, p ∈ S,
ηp
τp ∈ [τ min
satisfies (17).
], p ∈ U , where τ max
, τ max
p
p
p
In what follows, we show another corollary, which aims at
the system (3) composed of stable modes. Hence, in the next
corollary, it is intuitive that S = P.
Corollary 2. Given scalars µp ∈ (1, + ∞), ηp < 0, consider
the system (3) with all stable modes. If the condition is fulfilled
as follows,
Re(λr(Ap)) <
1
2
ηp,
then there exist matrices IN n ≻ Pp,i ≻ 0, i = 0, 1, ..., lp, such
that ∀i = 0, 1, ..., lp − 1, satisfying (21), ∀p ∈ P. Hence, if
there exist matrices Pp,0 and Pp,lp , ∀p ∈ P, p 6= q, such that
(16) holds, then the total tracking error states of the system (3)
can converge to zero when the TDDT satisfies τp > − logµp
.
ηp
The proof of two corollaries can be obtained based on
Theorem 1 as well as [35], and then they are omitted here.
5
Thereby, the proposed sufficient condition characterizes the
situation that even if each mode of the system (3) is unstable,
it is still possible to realize tracking under an appropriate σ(t).
It is required to point out that the feasibility of (10)-(11) poses
the possibility of satisfaction for (16)-(17), so that the system
(3) is GUAS with the TDDT τp ∈ [τ min
], p ∈ P. As a
result, we consider (10)-(11) as decisive factors. Actually, they
serve as preconditions to the existence of an eligible leader
set in the proposed algorithm.
, τ max
p
p
For the convenience of the leader selection metric construc-
tion, we present following proposition to combine (10)-(11)
into one constraint.
Proposition 1. Due to β ∈ (0, 1] [36], we set β = 1. Then,
considering (10), we obtain
Re(λr(A(1)
p )) < −
lp + ϕ
2τ min
p
.
(22)
Thus, if (11) holds, then (22) is satisfied.
Proof. Based on Lemma 2, for (11), it is obvious to see
Re(λr(Ap)) <
1
2
(ηp −
lp
τmin
).
Similarly, for (22), we have
Re(λr(Ap)) <
1
2
(ηp +
lp
τmin
) −
lp + ϕ
2τ min
p
=
1
2
(ηp −
ϕ
τ min
p
).
Remark 4. Naturally, whatever the value of β is, we still can
obtain one condition that satisfies (10)-(11) simultaneously
based on Proposition 1. It is obvious to see that (10) is
almost equal to (11) when β = 0.5. In fact, based on the
proposed algorithm in the last subsection, after acquiring the
configuration matrix D as well as Kp, ∀p ∈ P, the value of β
could be obtained by calculations, and β should be verified. If
the computed value of β is less than 0.5, then we reduce the
setting value such as β = 0.4 to operate the selection method
all over again until the calculated value of β is more than or
equal to the setting value, and without any operation when the
computed value of β is more than 0.5.
B. A Metric for Leader Selection
In this subsection, we establish the metric for the leader
selection method with the form of the γ-submodular function.
Besides, the γ-submodular means the function with respect to
γ submodularity-ratio. Then, we finish the metric construction
by introducing the lemma below:
Lemma 3 ([23]). For a linear system such as
( x(t) = Ax(t) + B u(t),
y(t) = C x(t),
(23)
it is determined as a fully observable control system, where
x(t) ∈ Rn is the system state. There exists a feedback control
matrix K, if all eigenvectors vi of A with eigenvalues λi
satisfying Re(λi) ≥ λ, lie in the span of the controllability
Re(λr(Ap)) <
1
2
Re(λr(A(1)
p )) < −
Re(λr(Ap)) < −
1
2
(
ηp, p ∈ S,
lp + ϕ
2βτ min
p
lp
τ min
p
− ηp), p ∈ U ,
, p ∈ U ,
The ϕ > 0 is a constant with the sufficient small value, and
then Proposition 1 holds intuitively. The proof is complete.
matrix C( A, B). It ensures Re(λi( A − B K)) < λ for the
closed-loop system (23), where λ is a given constant. More-
over, span(C( A, B)) = span(W ( A, B)) [38], where
where
C( A, B) = [ B A B ... An−1 B] ,
W ( A, B) =Z t1
t0
for some t1 > t0.
A(t−t0) B BT e
AT (t−t0)dt,
e
Thus, due to Lemma 3, we rewrite the parameter matrices
in (11), p ∈ P:
Ap = IN ⊗ A − Lp ⊗ In +
1
2
B = D ⊗ In, Kp = IN ⊗ Kp.
(
lp
τ min
p
− ηp)IN n,
Thus, the metric is constructed as
f , Xp∈P Xi:Ref
dist2(vi, span(W ( Ap, B))),
where Ref = Re(λi( Ap)) ≥ 0, p ∈ P. Ref is an eigenvalue
of Ap with the condition of Re(λi( Ap)) ≥ 0, and vi is the
corresponding eigenvector.
Remark 5. In light of Lemma 3 and Proposition 1, it is
inferred that if f = 0 then there exists a set of Kp, which
makes (10)-(11) hold. Thus, if (16)-(17) are also satisfied,
then the tracking of a reference signal can be guaranteed if
τp ∈ [τ min
], ∀p ∈ P. The strength of such transformation
is that we can assure the existence of Kp by (11) after leader
selection, instead of designing the exact values of Kp before
the selection algorithm, p ∈ P.
, τ max
p
p
6
gv,p = N nvT ¯C−1
S,pv,
′
v = ¯C
¯CS,p = ¯C
S,pv/N n,
′T
S,p
¯C
′
S,p/N n.
Then, due to [33], the submodularity-ratio γ′
bounded by
U ,k,p of gv,p is
U ,k,p ≥ λmin( ¯Cp, k + U ) ≥ λmin( ¯Cp) .
γ′
Here, we are ready to show our further result, which
is helpful to acquire the provable optimality bound of the
proposed algorithm. Concisely, the submodularity-ratio of f
is bounded by γ′
U ,k.
Theorem 2. The submodularity-ratio γU ,k of f is bounded by
γU ,k ≥ min
p
p∈P λmin( ¯Cp, k + U ) ≥ min
p
p∈P λmin( ¯Cp) .
Proof. By definition,
γ′
U ,k,p = min
W ⊆U
W ∩S=∅
S≤k
= min
W ⊆U
W ∩S=∅
S≤k
gv,p(W ∪ S) − gv,p(W )
Pl∈S(gv,p(W ∪ {l}) − gv,p(W ))
Pl∈S(fv,p(W ∪ {l}) − fv,p(W ))
fv,p(W ∪ S) − fv,p(W )
.
Then, we derive the submodularity-ratio γU ,k of f bounded
by γ′
U ,k. It is explicit that
f = Xp∈P Xi:Re(λi( Ap))≥0
fvi,p .
Thus, we rewrite ¯P1 as follows.
Then, we obtain
P1
min
S⊆Ω
S
s.t. f = 0 ,
(16) − (17) ,
S ≤ k.
(24)
Here,
the metric f construction is completed. Prior to
showing our further result, some notations are listed below:
CΩ,p( Ap, BΩ) = [BΩ, ApBΩ, ..., AN n−1
Cp( Ap, BS) = [ BS , Ap BS, ..., AN n−1
p
BΩ],
BS],
p
BΩ = IN n, BS = D ⊗ In, p ∈ P,
¯Cp = (CΩ,pPt)T (CΩ,pPt)/(N n),
λmin( ¯Cp, k + U ) =
min
S:S=k+U
λmin( ¯CS,p),
where D is the diagonal matrix determined by leader set S,
where the ith diagonal element of D is 1 if ith agent is
selected as leader and 0 otherwise. Pt ∈ R(N n)2×(N n)2
is a
nonsingular matrix, leading to each column of (CΩ,pP ) have
norm 1. ¯CS, p is derived from ¯Cp by removing all zeroes rows
and columns. A vector v with kvk2 = 1, by referring to [23],
we have
fv,p = dist2(v, span(Cp( Ap, BS)) = 1 − gv,p , p ∈ P,
γU ,k = min
W ⊆U
W ∩S=∅
S≤k
≥ min
W ⊆U
W ∩S=∅
S≤k
≥ min
W ⊆U
W ∩S=∅
S≤k
min
vi,p
f (W ∪ S) − f (W )
Pl∈S(f (W ∪ {l})) − f (W )
p Pi:Ref Pl∈S f ▽
Pi:Ref Pl∈S f ▽
i:Ref Pl∈S f ▽
Pl∈S f ▽
Pl∈S(fv,p(W ∪ {l}) − fv,p(W ))
fv,p(W ∪ S) − fv,p(W )
min
vi,p,S
vi,p,S
vi,p
p
min
≥ min
p
≥ min
p
≥ min
p
where
min
W ⊆U
W ∩S=∅
S≤k
λmin( ¯Cp, k + U )
λmin( ¯Cp),
Ref = λi( Ap)) ≥ 0, p ∈ P ,
f ▽
vi,p = fvi,p(W ∪ {l}) − fvi,p(W ) ,
f ▽
vi,p,S = fvi,p(W ∪ {S}) − fvi,p(W ) .
The proof is complete.
Here, we finish total preparation for our algorithm, which is
utilized for figuring out the solution to P1 with the provable
optimality bound.
C. The Leader Selection Algorithm
In this subsection, we propose a heuristic algorithm with the
greedy rule to select a minimum-size leader set S, which leads
to f = 0 as well as ensures (16)-(17) in Theorem 1. Thereby,
the tracking of a reference signal can be guaranteed with a set
of given TDDT. Specially, in order to ensure the tracking, it is
a necessary condition that each agent is reachable in the union
of the directed interaction graphs [2]. Therefore, we take S0
as the index set of agents, which are unreachable in the union
of the directed interaction graphs. Then, we consider S0 as
the initial leader set in the algorithm, Tmin-max = {τ min
,τ max
p }
as the set of given TDDT, and Q = {lp, µp, ηp} as the set of
parameters in Theorem 1, ∀p ∈ P.
p
Algorithm 1 Algorithm for selection of a minimum-size
leader set S with a set of given TDDT to assure the tracking
of a reference signal
Input: The agents index set Ω, the metric f , a constant k,
Tmin-max and Q
Output: The leader set S
1: procedure MINSET (S, f )
2:
Initialization:
while f > 0 do
S ← S0 , z ← 0
for vx ∈ Ω\S do
Fvx ← f (S) − f (S ∪ {vx})
end for
v∗ ← arg maxvx Fvx
S ← S ∪ {v∗}
end while
if S ≤ k and (16)-(17) hold with a set of Kp
return S
else
z = z + 1
switch to next step
if f = 0 with a new set Q
switch to step 10
else
switch to next step
if z reaches a specified maximum number zmax
return "None with such a Tmax-min"
else
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23: end procedure
switch to step 3 with S = S0
Remark 6. From the pseudo-code of Algorithm 1, a candidate
leader set S is obtained after step 9, and then Kp can be
acquired via (11) with the configuration matrix D. It is not
accessible to acquire a feasible leader set with the arbitrarily
given Tmax-min. In accordance with [35], by switching be-
haviors, the ability of the tracking error state compensation
is limited, and then the solution returned by the algorithm
may be none. Besides, the lower bound kmin of the integer
k depends on the number of unreachable agents in the union
7
of the directed interaction graphs before leader selection and
kmin = 1 otherwise. There is a predefined condition that is
λr( Ap) ≥ 0, which captures the
required to be satisfied: max
p∈P
rationality of the selection scheme. If this condition does not
hold, then it causes f = 0 when D = ∅, and it is impossible
to ensure the tracking obviously.
On the consideration of Theorem 2, the provable optimality
bound of Algorithm 1 is given as follows, which is served as
measuring the optimality of resulting leader set.
Proposition 2. Let the optimal solution of P1 be represented
by S∗, where S∗ ≥ kmin. Consider S = {s1, s2, ... , sS}
as the solution returned by the Algorithm 1 in the first S
iterations. Then, we have
k γ∆ f (∅) ≥ f (St−1) ,
e− kmin
p∈P λmin( ¯Cp, 2S) and St−1 denotes the
where γ∆ = min
result of Algorithm 1 at the second-to-last iteration.
p
Proof. By referring to [23] as well as the definition of the
submodularity-ratio, we obtain
Pl∈S f (∅) − f ({l})
f (∅) − f (S)
≥ γS,S ≥ γ∆.
Combining with the greedy rule of Algorithm 1, we have
S(f (∅) − f (s1)) ≥ γ∆(f (∅) − f (S)) ,
meaning that
(1 −
γ∆
S
)(f (∅) − f (S)) ≥ f (s1) − f (S) .
(25)
Subsequently, we derive that
S(f (s1) − f (s1, s2)) ≥ γ∆(f (s1) − f (S ∪ {s1}))
≥ γ∆(f (s1) − f (S)) .
(26)
Furthermore, (26) is equivalent to
(1 −
γ∆
S
)(f (s1) − f (S)) ≥ f (s1, s2) − f (S).
Considering the (25) jointly, we obtain
(1 −
γ∆
S
)2(f (∅) − f (S)) ≥ f (s1, s2) − f (S).
Thus, by induction method, it is explicit that
(1 −
γ∆
S
)S∗(f (∅) − f (S)) ≥ f (s1, s2, ... , sS∗) − f (S) ,
signifying further,
(1 −
γ∆
S
)S∗(f (∅) − f (S)) ≥ f (St−1) − f (S) .
It is noted that f (S) = 0, and then we obtain
S∗log(1 −
γ∆
S
) ≥ log
f (St−1)
f (∅)
.
Based on the fact that log(x) ≥ 1 − 1/x, ∀x ≥ 1, we derive
log
f (∅)
f (St−1)
≥ S∗log(1 −
γ∆
S
)−1 ≥ S∗
γ∆
S
,
implying that
γ0 =
1
γ∆
log
f (∅)
f (St−1)
≥
S∗
S
.
Furthermore, due to S∗ ≥ kmin and S ≤ k, we have
are shown, composing of the tracking error evolution curve
of followers, comparison with two selection methods and the
relation between number of leaders needed and the dwell time.
Finally, we describe the conservativeness analysis.
8
e− kmin
k γ∆ f (∅) ≥ e− S∗
S γ∆ f (∅) ≥ f (St−1).
(27)
A. Cases Statement
The proof is complete.
It is noticeable that the optimality bound γ0 ∈ (0, 1) can
be calculated after leader selection. Besides, this bound can
be as small as possible under certain parameter matrices,
which implies that
the solution approximates the optimal
one nearly. In (27), when γ∆ is larger, which points out
that the submodularity of f appears significantly, the value
of f (St−1)/f (∅) is smaller. Thus,
the
increment of adding a leader is larger, which is beneficial to
satisfy f = 0 with less leaders.
is inferred that
it
We consider a high-order linear multi-agent network with
six agents and three predefined topologies, shown in Fig. 1.
The individual self-dynamical matrix A [31] is
A =
0.4147 −0.4087 −0.1287
0.3802 −0.3380 −0.3305
0.1313 −0.7076
0.0233
,
where it is not Hurwitz stable, λ1(A) = −0.50, λ2(A) =
0.30 + 0.10i, λ3(A) = 0.30 − 0.10i. The initial state of every
agent is generated randomly within the range (−100, 100).
Furthermore, the switching law σ(t) is aperiod.
Actually,
there exists conservativeness for Algorithm 1,
which is analyzed in the next section. Here, we present another
one to reduce the conservativeness.
Algorithm 2 Algorithm for selection of a minimum-size
leader set S with a set of given TDDT to assure the tracking
of a reference signal
Input: The agents index set Ω, the metric f , a constant k,
(cid:24)
(cid:27)
Tmin-max and Q
Output: The leader set S
1: procedure MINSET ( S, f )
2:
Initialization:
while S ≤ k do
S ← S0 , z ← 0
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
while z < zmax do
If (14)-(17) hold with a set of Kp
return S
else
z = z + 1 with a new set Q
end while
If f = 0
return "None with such a Tmax-min"
else
for vx ∈ Ω\ S do
Fvx ← f ( S) − f ( S ∪ {vx})
end for
v∗ ← arg maxvx Fvx
S ← S ∪ {v∗}
z = 0
(cid:23)
(cid:25)
11
(cid:26)
(cid:24)
(cid:23)
(cid:25)
(cid:26)
(cid:24)
(cid:23)
(cid:25)
(cid:26)
(cid:28)
(cid:27)
(cid:28)
(cid:27)
(cid:28)
22
33
Fig. 1: Three predefined interaction topologies. It is intuitive that there exist
agents (agent 1 and agent 6) unreachable in the union of the directed interac-
tion topologies before leader selection. After Algorithm 1, every mode satisfies
λr(Ap) > 0 based on the parameters in our simulation, where S = {1, 5, 6}.
Specifically, λr(AG1 ) ≈ 0.05, λr(AG2 ) ≈ 0.30, λr(AG3 ) ≈ 0.30, it
signifies that each mode is unstable.
B. Leader Selection Numerical Examples
In this subsection, we depict
the results of numerical
examples for Algorithm 1. In the first place, we set
the
initial range of a set of given TDDT as τG1 ∈ [1.00, 2.00],
τG2 ∈ [0.50, 1.50], τG3 ∈ [0.50, 1.50]. k = 3. In view of
Algorithm 1, we acquire parameters as follows:
lG1 = 3, µG1 = 0.03, ηG1 = 2.0,
lG2 = 2, µG2 = 0.02, ηG2 = 4.2,
lG3 = 2, µG3 = 0.04, ηG3 = 2.8,
a leader set S = {1, 5, 6}, and the practical range of TDDT:
end while
19:
20: end procedure
The complexity of Algorithm 2 is O(ξzmaxn3), where ξ =
S − S0 + 1 ≥ 1, while the complexity of Algorithm 1 is
O(zmaxn3), which shows Algorithm 1 requires less running
time when ξ > 1.
V. EXAMPLES
In this section, numerical examples are provided to verify
the effectiveness for Algorithm 1. Firstly, we give the descrip-
tion for cases, including parameters settings. Then, the results
τ ∗
G1 ∈ [1.60, 1.74],
τ ∗
G2 ∈ [0.83, 0.92],
τ ∗
G3 ∈ [0.94, 1.13],
where the unit of time is second. Due to (11), we acquire the
input gain matrices:
KG1 =
KG2 =
0.0002
0.1399 −0.0604
0.2275 −0.0017
−00017
0.0002 −0.0604
0.1819
,
0.0013 −0.5190 0.8743
,
1.2657 −0.0143 0.0013
−0.0143
0.5130 −5190
The second agent tracking error evolution curve
5
10
15
20
25
The third agent tracking error evolution curve
Time/sec
5
10
15
20
25
The forth agent tracking error evolution curve
Time/sec
5
10
15
20
25
Time/sec
The topology evolution
200
100
0
3
,
2
,
1
=
i
,
i
2
)
t
(
-100
0
200
100
0
-100
-200
0
3
,
2
,
1
=
i
,
i
3
)
t
(
100
3
,
2
,
1
=
i
,
i
4
)
t
(
50
0
-50
0
r
e
b
m
u
N
y
g
o
o
p
o
T
l
3
2
1
0
5
10
15
20
25
Time/sec
Fig. 2: Followers tracking error evolution. In view of the leader set S =
{1, 5, 6},
the tracking error evolution
process of agent 2, 3, and 4 respectively. It is obvious to see that the switching
law is aperiod.
the former three subgraphs depict
1.2763 −0.0003
−0.0003
0.0000 −0.0104
0.0000
1.2612 −0.0104
1.2685
.
KG3 =
In what follows, the tracking error evolution curves of follow-
ers are shown in Fig. 2. Although we set no requirement on
connectivity, based on Algorithm 1, after a number of trails,
we find that each agent is reachable in one topology at least.
This signifies that each agent is reachable in the union of the
directed interaction graphs, which is the necessary topology
condition for the realization of the tracking.
index of fmax = Pp∈P λr(A(2)
In the second place, we show the comparison with other two
selection methods, where parameters are based on those that
are mentioned above. We direct at greedy selection with the
p ), as well as random selection
with f . To be precise, we construct the metric fmax which is
anticipated to be minimized, since it is an intuitive measure
to fulfill the decisive factor (11). For greedy selection with
fmax, we still draw on the proposed method, but the metric
f is replaced with fmax. For random selection, we refer to
Algorithm 1, but we select a new leader from Ω\S randomly
9
-submodular function evolution curve
Random
-submodular
maximum
e
u
l
a
v
n
o
i
t
c
n
u
f
r
a
l
u
d
o
m
b
u
s
-
5
4
3
2
1
0
1
2
3
4
5
6
Number of leaders
Fig. 3: Comparison of three methods. Random corresponds to random selec-
tion with the metric f , selecting a new leader randomly for each iteration.
γ-submodular represents our method. Maximum denotes greedy selection,
with the metric fmax, adding a leader to minimize the index. It is shown
our algorithm is optimal comparatively, Especially, it is of interest to mention
that curves of γ-submodular and maximum almost coincide with each other,
with a certain set of Kp, p ∈ P. For instance, KG1 = 0.45 · IN n,
KG2 = 3.15 · IN n, KG2 = 2.75 · IN n.
Number of leaders needed as TDDT addition
s
r
e
d
a
e
l
f
o
r
e
b
m
u
N
7
6
5
4
3
2
0
0.2 0.4 0.6 0.8
1.2 1.4 1.6 1.8
1
2
Increment of TDDT/sec
2.2 2.4 2.6 2.8
3
Fig. 4: Relation between leader selection and TDDT. For brevity, we set the
lateral axis as the increment of TDDT, which implies that the lateral axis
value of each point represents the augmentation for the TDDT based on the
parameters in the first numerical case.
rather than with the greedy rule. For the persuasiveness of this
scheme, we take the expected value of 100 trails. The signifi-
cance of this simulation between diverse three methods, lies in
the comparison of optimization performance when we add an
agent to S. Concretely, we explore fmax from the perspective
of the maximal real eigenvalue, while γ-submodular function
f from the Euclidean distance of controllability. The better
performance implies f = 0 with less leaders. Then, the result
is shown in Fig. 3. As is shown, the optimization performance
of the proposed method is optimal comparatively.
In the third place, we investigate the relation between the
number of leaders needed and the TDDT. As the basis of the
above-mentioned parameters configuration, we adjust the ηp
to alter the TDDT. Specifically, we operate Algorithm 1 at
every turn adding 0.2 second. Thereby, we obtain the result
shown in Fig. 4. This result shows the relationship between
leader selection and the dwell time. It is straightforward to
see that all the agents are required to be accessible to the
reference signal, when the increment of the TDDT is over 2.2
second. In addition, through a number of trails, it is interesting
to point out that there exists a proportion relation between the
eligible TDDT. This means that each TDDT is not allowed to
differ one other greatly. We consider that it is mainly due to
the connectivity between predefined topologies as well as the
feedback gains matrices.
TABLE I: COMPARISON AS NUMBER OF STABLE MODES ADDITION
λr(AG1 ) < 0, λr(AG2 ) > 0, λr(AG3 ) > 0,
λr(AG1 ) < 0, λr(AG2 ) < 0, λr(AG3 ) > 0,
λr(AG1 ) < 0, λr(AG2 ) < 0, λr(AG3 ) < 0,
S = {1, 5, 6}
S = {1, 2, 3, 5, 6}
S = {1, 2, 3, 4, 5, 6}
τ ′
G1
> 1.77, τ ′
G2
= 0.65, τ ′
G3
= 0.85,
τ ′
G1
> 1.56, τ ′
G2
> 0.54, τ ′
G3
= 0.62,
τ ′
G1
> 1.51, τ ′
G2
> 0.51, τ ′
G3
> 0.51,
10
In the last place, based on Algorithm 1, we investigate the
comparison between different number of stable modes, includ-
ing the result of leader set and corresponding TDDT. The
result is shown in the Table I. As is shown, when the number of
stable modes increases, the number of leaders needed grows.
However, when we consider each mode unstable, we require
leaders with the minimum number to ensure the tracking.
C. Conservativeness Analysis
In this subsection, we illustrate the conservativeness analysis
of Algorithm 1. In Fig. 1, there are two unreachable agents in
the union of the directed interaction graphs, agent 1 and agent
6 respectively. We set {1, 6} as the leader set, by virtue of
Lemma 1, and then we can acquire a set of feasible TDDT to
ensure the tracking. However, if we take the same parameters
to execute Algorithm 1, we can not acquire the leader set
{1, 6}, but {1, 5, 6}. Thus, we consider the conservativeness is
due to without considering the impact of union of the directed
interaction topologies in Theorem 1 and Lemma 3. Then, it
causes that each part fp of the leader selection metric f has
to be satisfied separately, where
VI. CONCLUSION
In this paper, we investigate the problem of choosing a
minimum-size leader set to achieve the tracking of a reference
signal with a set of given TDDT. We show the problem
description as ¯P1. Then, we present Theorem 1 to assure the
desired tracking. Subsequently, we establish a metric based on
the proposed sufficient condition, and then we formulate the
combinatorial optimization problem as P2. We design Algo-
rithm 1 with the provable optimality bound to deal with P2.
Then, we propose Algorithm 2 to reduce the conservativeness
but the complexity may be higher than Algorithm 1. Finally,
we show the numerical cases to evaluate effectiveness of the
proposed method, and the conservativeness analysis for the
algorithm is provided. The switching leader set is considered
as our future work, while the leader set is fixed in this paper.
APPENDIX A
Proof of Lemma 2. It is intuitive to see
f = Xp∈P
fp, fp = Xi:Ref
dist2(vi, span(W ( Ap, B))).
Re(λi(A(1)
p − αIN n)) < 0, where α = −
lp + ϕ
2βτ min
p
, ∀p ∈ P.
For instance, for the first consequence in Leader Selection
Simulation:
G1 : λr( AG1 ) ≈ 0.2414,
G2 : λr( AG2 ) ≈ −0.5826,
G3 : λr( AG3 ) ≈ −0.0357.
Prior to leader selection, S = ∅, then fG1 = 3.2936, fG2 = 0,
fG3 = 0. In order to decease f = fG1 to zero, we operate
Algorithm 1 to obtain the result as {1, 5, 6}. Obviously, this
leader set satisfies the condition that with least leaders, each
agent is reachable in G1 instead of the union of the directed
interaction graphs. In addition, the conservativeness analysis
does not mean that it is enough to select the unreachable agents
as leaders in the union of the directed interaction topologies.
Actually, the system (3) requires more leaders to guarantee
the tracking when the TDDT increases, such as the result in
Fig. 4. To reduce the conservativeness, we propose an heuristic
method as Algorithm 2. By such a scheme, with parameters
in the Case Statement, we obtain the result S = {1, 6}, as
well as the corresponding TDDT:τG1 = 1.54, τG1 = 0.76,
τG3 = 1.18. In this example, ξ = S − S0 + 1 = 1. Besides,
because of the conservativeness in the condition f = 0, when
this requirement is removed, then it is definite that the S
returned by Algorithm 2 is less than or equal to S returned
by Algorithm 1.
Thus, we derive that
Re(vT
i (A(1)
p − αIN n)vi) < 0,
p − αIN n)), and vT
where vi is the ith eigenvector of (A(1)
p −αIN n) corresponding
to λi((A(1)
is
straightforward to see that vi is also the ith eigenvector of A(1)
p vi = λi(A(1)
i A(1)
corresponding to λi(A(1)
p ).
Then, based on the analysis above, we obtain
i vi = 1. In addition,
p ), and then vT
it
p
Re(λi(A(1)
i (A(1)
= Re(vT
i A(1)
= Re(vT
i A(1)
= Re(vT
= Re(λi(A(1)
< 0,
p − αIN n))
p − αIN n)vi)
p vi) − Re(vT
p vi) − α
p )) − α
i αIN nvi)
Thereby, we have
Re(λr(A(1)
p )) < α.
The proof is complete.
11
[24] A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, "Submodularity
in input node selection for networked linear systems efficient algorithms
for performance and controllability," IEEE Control Systems Magazine,
vol. 37, no. 6, pp. 52-74, 2017.
[25] B. Guo, O. Karaka, T. H. Summers, and M. Kamgarpour, "Actuator
placement for optimizing network performance under controllability
constraints," arXiv preprint arXiv:1903.08120, 2019.
[26] K. Oh, M. Park, and H. Ahn, "A survey of multi-agent formation
control," Automatica, vol. 53, pp. 424-440, 2015.
[27] P. Wang, G. Wen, X. Yu, W. Yu, and T. Huang, "Synchronization of
multi-layer networks: from node-to-node synchronization to complete
synchronization," IEEE Transaction on Circuits and Systems-I: Regular
Papers, vol. 66, no. 3, pp. 1141-1152, 2019.
[28] G. Wen, P. Wang, X. Yu, W. Yu, and J. Cao, "Pinning synchronization
of complex switching networks with a leader of nonzero control inputs,"
IEEE Transaction on Circuits and Systems-I: Regular Papers, vol. 66,
no. 8, pp. 3100-3112, 2019.
[29] G. Wen, W. Yu, G. Hu, J. Cao, and X. Yu, "Pinning synchronization of
directed networks with switching topologies: a multiple Lyapunov func-
tions approach," IEEE Transactions on Neural Networks and Learning
Systems, vol. 26, no. 12, pp. 3239-3250, 2015.
[30] H. Lin and P. J. Antsaklis, "Stability and stabilizability of switched linear
systems: a survey of recent results", IEEE Transactions on Automatic
Control, vol. 54, no. 2, pp. 308-322, 2009.
[31] W. Ni, X. L. Wang, and C. Xiong, "Consensus controllability, observabil-
ity and robust design for leader-following linear multi-agent systems",
Automatica, vol. 49, no. 7, pp. 2199-2205, 2013.
[32] A. Tsiamis, S. Pequito, and G. J. Pappas, "Distributed leader selection in
switching networks of high-order integrators," in 55th Annual Allerton
Conference on Communication, Control, and Computing. USA, 2017,
pp. 413-420.
[33] A. Das and D. Kempe, "Submodular meets spectral: greedy algorithms
for subset selection, sparse approximation and dictionary selection", in
28th International Conference on International Confernce on Machine
Learning. Omnipress, 2011, pp. 1057-1064.
[34] Z. Zhang, Y. Wang, E. K. P. Chong, and A. Pezeshki, "Subspace
selection for projection maximization with matroid constraints," IEEE
Transactions on Signal Processing, vol. 65, no. 5, pp. 1339-1351, 2017.
[35] W. Xiang and J. Xiao, "Stabilization of switched continuous-time
systems with all modes unstable via dwell time switching," Automatica,
vol. 50, no. 3, pp. 940-945, 2014.
[36] F. Zhang, Matrix Theory: basic Results and Techniques. Springer Sci-
ence & Business Media, 2011.
[37] C. Lee, "Solution bounds of the continuous and discrete Lyapunov
matrix equations," Journal of Optimization Theory and Applications,
vol. 120, no. 3, pp. 559-578, 2004.
[38] "https://stanford.edu/class/ee363/lectures/contr.pdf" 2009.
REFERENCES
[1] R. Olfati-Saber and R. M. Murray,"Consensus problems in networks of
agents with switching topology and time-delays," IEEE Transactions on
Automatic Control, vol. 49, no. 9, pp. 1520-1533, 2004.
[2] W. Ren and R. W. Beard, "Consensus seeking in multi-agent systems
under dynamically changing interaction topologies," IEEE Transactions
on Automatic Control, vol. 50, no. 5, pp.655-661, 2005.
[3] Y. Cao, W. Yu, W. Ren, and G. Chen, "An overview of recent progress
in the study of distributed multi-agent coordination," IEEE Transactions
on Industrial Informatics, vol. 9, no. 1, 427-438, 2013.
[4] X. Jin, S. Wang, J. Qin, W. Zheng, and Yu Kang, "Adaptive fault-tolerant
consensus for a class of uncertain nonlinear second-order multi-agent
systems with circuit implementation," IEEE Transaction on Circuits and
Systems-I: Regular Papers, vol. 65, no. 7, pp. 2243-2255, 2018.
[5] J. Fu, G. Wen, W. Yu, T. Huang, and J. Cao, "Exponential consensus
of multi-agent systems with Lipschitz nonlinearities using sampled-
data information," IEEE Transaction on Circuits and Systems-I: Regular
Papers, vol. 65, no. 12, pp. 4363-4375, 2018.
[6] X. Dong and G. Hu, "Time-varying formation tracking for linear multi-
agent systems with multiple leaders," IEEE Transactions on Automatic
Control, vol. 62, no. 7, pp. 3658-3664, 2017.
[7] W. Yang, Y. Zhang, C. Yang, Z. Zuo, and X. Wang, "Online power
scheduling for distributed filtering over an energy-limited sensor net-
work," IEEE Transactions on Industrial Electronics, vol. 65, no. 5,
pp.4216-4226, 2018.
[8] Q. Song, F. Liu, J. Cao, and W. Yu, "M-matrix strategies for pinning-
controlled leader-following consensus in multi-agent systems with non-
linear dynamics," IEEE Transactions on Cybernetics, vol. 43, no. 6, pp.
1688-1697, 2013.
[9] M. Mesbahi and M. Egerstedt, "Graph theoretic methods in multi-agent
networks," Princeton University Press, 2010.
[10] G. Wen, Z. Duan, G. Chen, and W. Yu, "Consensus tracking of multi-
agent systems with Lipschitz-type node dynamics and switching topolo-
gies," IEEE Transaction on Circuits and Systems-I: Regular Papers, vol.
61, no. 2, pp. 499-511, 2014.
[11] K. Liu, P. Duan, Z. Duan, H. Cai, and J. Lu, "Leader-following
consensus of multi-agent systems with switching networks and event-
triggered control," IEEE Transaction on Circuits and Systems-I: Regular
Papers, vol. 65, no. 5, pp. 1696-1706, 2018.
[12] W. Ren and R. W. Beard, "Distributed consensus in multi-vehicle
cooperative control: Theory and applications," New York: Springer,
2007.
[13] A. Clark, L. Bushnell, and R. Poovendran, "A supermodular optimization
framework for leader selection under link noise in linear multi-agent
systems," IEEE Transactions on Automatic Control, vol. 59, no. 2, pp.
283-296, 2014.
[14] W. Yang, Z. Wang, Z. Zuo, C. Yang, and H. Shi, "Nodes selection
strategy in cooperative tracking problem," Automatica, vol. 74, pp. 118-
125, 2016.
[15] A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, "Input selection
for performance and controllability of structured linear descriptor sys-
tems," SIAM Journal on Control and Optimization, vol. 55, no. 1, pp.
457-485, 2017.
[16] E. Mackin and S. Patterson, "Submodularity in systems with higher
order consensus with absolute information," arXiv:1905.09156v1, 2019.
[17] M. Van De Wal and B. De Jager, "A review of methods for input
input/output selection," Automatica, vol. 37, no. 4, pp. 487-510, 2001.
[18] S. Pequito, G. Ramos, S. Kar, A. P. Aguiar, and J. Ramos, "The robust
minimal controllability problem," Automatica, vol. 82, pp. 261-268,
2017.
[19] Y. Liu, J. Slotine, and A. L. Barab´asi, "Controllability of complex
networks," Nature, vol. 473, no. 7346, pp. 167-173, 2011.
[20] F. Lin, M. Fardad, and M. R. Jovanovi´c, "Algorithms for leader selection
in stochastically forced consensus networks," IEEE Transactions on
Automatic Control, vol. 59, no. 7, pp.1789-1802, 2014.
[21] V. Tzoumas, M. A. Rahimian, G. J. Pappas, and A. Jadbabaie, "Minimal
actuator placement with bounds on control effort," IEEE Transactions
on Control of Network Systems, vol. 3, no. 1, pp. 67-78, 2016.
[22] A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, "Toward
synchronization in networks with nonlinear dynamics: a submodular
optimization framework," IEEE Transactions on Automatic Control, vol.
62, no. 10, pp. 5055-5068, 2017.
[23] Z. Liu, Y. Long, A. Clark, L. Bushnell, D. Kirschen, and R. Poovendran,
"Minimal
input and output selection for stability of systems with
uncertainties," IEEE Transactions on Automatic Control, vol. 64, no.
4, pp. 1456-1471, 2019.
|
1709.09451 | 2 | 1709 | 2017-11-18T23:24:09 | Combining Prediction of Human Decisions with ISMCTS in Imperfect Information Games | [
"cs.MA",
"cs.GT"
] | Monte Carlo Tree Search (MCTS) has been extended to many imperfect information games. However, due to the added complexity that uncertainty introduces, these adaptations have not reached the same level of practical success as their perfect information counterparts. In this paper we consider the development of agents that perform well against humans in imperfect information games with partially observable actions. We introduce the Semi-Determinized-MCTS (SDMCTS), a variant of the Information Set MCTS algorithm (ISMCTS). More specifically, SDMCTS generates a predictive model of the unobservable portion of the opponent's actions from historical behavioral data. Next, SDMCTS performs simulations on an instance of the game where the unobservable portion of the opponent's actions are determined. Thereby, it facilitates the use of the predictive model in order to decrease uncertainty. We present an implementation of the SDMCTS applied to the Cheat Game, a well-known card game, with partially observable (and often deceptive) actions. Results from experiments with 120 subjects playing a head-to-head Cheat Game against our SDMCTS agents suggest that SDMCTS performs well against humans, and its performance improves as the predictive model's accuracy increases. | cs.MA | cs | Combining Prediction of Human Decisions with ISMCTS in
Imperfect Information Games*
Moshe Bitan
Department of Computer Science
Bar-Ilan University, Israel
[email protected]
Sarit Kraus
Department of Computer Science
Bar-Ilan University, Israel
[email protected]
7
1
0
2
v
o
N
8
1
]
A
M
.
s
c
[
2
v
1
5
4
9
0
.
9
0
7
1
:
v
i
X
r
a
ABSTRACT
Monte Carlo Tree Search (MCTS) has been extended to many imper-
fect information games. However, due to the added complexity that
uncertainty introduces, these adaptations have not reached the same
level of practical success as their perfect information counterparts.
In this paper we consider the development of agents that perform
well against humans in imperfect information games with partially
observable actions. We introduce the Semi-Determinized-MCTS
(SDMCTS), a variant of the Information Set MCTS algorithm (ISM-
CTS). More specifically, SDMCTS generates a predictive model of
the unobservable portion of the opponent's actions from historical be-
havioral data. Next, SDMCTS performs simulations on an instance
of the game where the unobservable portion of the opponent's ac-
tions are determined. Thereby, it facilitates the use of the predictive
model in order to decrease uncertainty. We present an implemen-
tation of the SDMCTS applied to the Cheat Game, a well-known
card game, with partially observable (and often deceptive) actions.
Results from experiments with 120 subjects playing a head-to-head
Cheat Game against our SDMCTS agents suggest that SDMCTS
performs well against humans, and its performance improves as the
predictive model's accuracy increases.
INTRODUCTION
1
Monte Carlo Tree Search (MCTS) has had significant success in
perfect information games such as Scrabble and Hex [1, 31] and
most noticeably in computer Go [13, 14, 32]. In recent years, MCTS
was adapted by researchers [3] to solve imperfect information games.
However, due to the added complexity that uncertainty introduces,
these adaptations have not reached the same level of practical suc-
cess as their perfect information counterparts. This paper focuses on
developing agents that can play well against humans in imperfect in-
formation games by applying learning models to reduce uncertainty.
More specifically, we focus on predicting the unobservable portion
of the human opponent's actions and combining the prediction into
our novel MCTS adaptation.
One of the first popular extensions of MCTS to imperfect informa-
tion games is a MCTS variation where a perfect information search
is performed on a determinized instance of the game [2, 16, 31, 33].
That is, the search is performed on an instance of the game where
hidden information is revealed to the players, thereby transforming
the imperfect information game to a perfect information game. This
approach allows the deployment of a predictive model. However,
*This work was supported in part by the LAW-TRAIN project that has received funding
from the European Union Horizon 2020 research and innovation program under grant
agreement 653587 and by MAAFAT. In addition, a grant from the Ministry of Science
& Technology, Israel & the Japan Scienceand Technology Agency (jst), Japan
several problems have been reported when applying determiniza-
tion which prevent the convergence to an optimal strategy such as
Strategy Fusion as discussed later in section "Determinization" [26].
To address these problems, Information set MCTS, a new family
of MCTS adaptations, were developed [6, 18, 22]. ISMCTS and its
variants perform MCTS simulations directly on information sets. An
information set is a set of game states that are indistinguishable by
the player at a given stage of the game. However, ISMCTS assumes
that every game state in the information set has the same probability
of being the game state which is not always the case. Thus, it prevents
the use of a predictive model.
This paper proposes a method for the development of agents play-
ing against humans in imperfect information games and partially
observable actions. We introduce the Semi-Determinized-MCTS
(SDMCTS), a variant of the Information Set MCTS algorithm (ISM-
CTS) combined with a determinization technique to take advantage
of the benefits of both approaches. SDMCTS is designed to re-
duce uncertainty by utilizing a predictive model of the unobservable
portion of the opponent's actions. Similar to ISMCTS, SDMCTS
performs simulations directly on information sets with one important
distinction. The SDMCTS performs simulations on an instance of
the game where the unobservable portion of the opponent's actions
are determined. The opponent's actions are determined while keep-
ing the remaining unobservable information hidden (e.g. opponent's
cards). Thereby, it preserves the advantages of ISMCTS (i.e. reduce
Strategy Fusion) while facilitating the use of the predictive model
for decreasing uncertainty with regards to hidden actions.
We evaluate the SDMCTS in Cheat Game, a well-known card
game. The players' goal in Cheat Game (also known as Bullshit and
I Doubt It) is to discard the initially dealt cards. At each turn, a player
may discard several cards and declare their rank. However, the cards
are placed facedown and the player is allowed to lie about their rank.
Thereby, the action is only partially observable by the opponents.
For the development of the SDMCTS agents, a behavioural-based
predictive model of human player actions in the Cheat Game was
used. The predictive model was trained on data collected from 60
players playing human-vs-human games reaching 0.821 Area Un-
der the Curve (AUC). In the evaluation experiments, the SDMCTS
agents played head-to-head cheat games against 120 human sub-
jects. The results suggest that the SDMCTS agent performs well
against humans, reaching a win ratio of 88.97%. Furthermore, its
performances improve as the predictive model's accuracy increases.
To conclude, the main novelties of this paper are: First, we present
SDMCTS, an algorithm for combining prediction of human deci-
sions with ISMCTS. Second, we introduce the Cheat Game as a
test-bed for imperfect information games with partially observable
actions. In addition, we present a highly efficient SDMCTS agent
that performs well against humans and can run on a standard PC.
Furthermore, we present a behavioral based prediction model of hu-
man decisions in the Cheat Game with 0.821 AUC accuracy. Lastly,
experimental results demonstrate the skillful performance of the
SDMCTS approach.
2 BACKGROUND AND RELATED WORK
2.1 Extensive-Form Games
In this section a brief overview of the game tree representation and
its formal notation are presented. An extensive-form game is a tree-
based representation of a sequential interaction of multiple fully
rational players. The set of players is denoted by N = {1, ..., n}. In
addition, a special player commonly called Chance is denoted by
c which has a probability distribution over its actions. The set of
all possible game states is denoted by S. Each s ∈ S corresponds
to a tree node in the game tree representation. A reward function
R : S → ℜn maps the terminal states to the corresponding payoff
vector where R(s)i is player i's payoff. Each player's goal is to
maximize his payoff in the game. The function P : S → N ∪ {c}
returns the player that is allowed to act in that state. The set of all
available actions to player P(s) is denoted by A(s). Each action
a ∈ A(s) corresponds to an edge from the current state s to a
successor state. As mentioned above, in imperfect information games
the game state is not fully observable by the players. The Information
State ui ∈ Ui is the observable portion of a game state s for player
i. Thereby, the Information Function is defined as Ii
: S → Ui .
It is important to note that in cases where multiple game states are
indistinguishable by the player, the game states will be mapped to
the same information state. Therefore, the set of indistinguishable
game states that corresponds to an information state ui is denoted
by I−1(ui) = {s I(s) = ui}.
The behavioural strategy of player i, denoted by
π i(u) ∈ ∆(A(u)),∀u ∈ U i
, is a probability distribution over the set of available action A(ui).
Πi denotes the set set of all behavioural strategies of player i. Fur-
thermore, a strategy profile π = (π 1, ..., π n) is the set of all players'
strategies. π−i denotes all strategies in π except π i . The expected
payoff of player i where all players follow strategy profile π is de-
noted by Ri(π). A strategy π i is said to be best response if for a
given fixed strategy profile π−i , Ri(π−i ∪ π i) is optimal. A Nash
equilibrium is a strategy profile π such that for each player i ∈ N,
the strategy π i ∈ π is best response to π−i .
2.2 Monte Carlo Tree Search
MCTS [5] is a simulation-based search algorithm for finding opti-
mal strategies. The algorithm was designed for a high-dimensional
search space. Each simulated path through the game tree is selected
to optimize exploration in more auspicious regions of the search
space. One of the more interesting properties of MCTS is that it
guarantees to converge to optimal strategies for perfect-information
two-player zero-sum games [20]. MCTS is comprised of four main
components. The first component is a method for advancing the
game and is denoted by st +1 ← G(st , at). The second is a mecha-
nism for updating statistics for each visited node (i.e. game state).
The third component is an action selection method that is based on
statistics stored for visited tree nodes. The last component is the
rollout policy. The rollout policy is used to select actions when the
simulation encounters game states that are out of the scope of the
game tree. That is, a default strategy for selecting actions when there
is no tree node that corresponds to the game state in the search tree.
A detailed explanation of the Cheat Game MCTS representation is
presented later in the section The Cheat Game Agent.
For a given computational budget, MCTS performs multiple sim-
ulations. Each simulation starts at the initial game state and traverses
the game tree using the above action selection mechanisms. When a
simulation reaches a terminal state, the leaf node's payoff is prop-
agated back to all visited nodes and the algorithm updates their
statistics. For each game state st the algorithm stores the following
statistics: N(s) denotes the number of times node s has been visited.
N(s, a) denotes the number of times action a was chosen when visit-
ing node s. Lastly, Q(s, a) denotes the aggregated discounted payoff
for performing action a at state s.
2.3 Determinization
Many MCTS variations were extended to imperfect information
games [3]. One of the more popular approaches performs the search
on a determinized instance of the game [2, 16, 31, 33]. An imperfect
information game can be converted into a perfect information game
(i.e. a deterministic game) by making the game states fully observ-
able by all players and fixing the outcomes of stochastic events. A
determinized MCTS algorithm performs simulations on the deter-
ministic game with perfect information. In order to obtain a strategy
for the full imperfect information game, the algorithm samples mul-
tiple determinized states that correspond to the current information
state, and for each action uniformly averages its discounted reward
(i.e. Q(s, a)). However, determinization techniques are susceptible to
several problems which prevent its convergence to Nash-Equilibrium
[23]. One of the more commonly reported problems is strategy fu-
sion [10]. Strategy fusion occurs when performing simulations of a
determinized perfect information game which relies on the assump-
tion that a player can perform distinct actions on multiple game
states. However, due to imperfect information, these game states
may be indistinguishable by the player and the error will be propa-
gated and distort the discounted reward estimations in earlier rounds.
Information set MCTS [6] is a MCTS variation that was developed
to address this problem.
Information Set MCTS
2.4
Information set MCTS (ISMCTS) [6] is a MCTS variation that per-
forms simulations directly on trees of information sets. Each node in
the tree represents an information set from the point of view of the
player and the statistics stored accordingly. However, when perform-
ing an online search, the algorithm is vulnerable to Non-Locality.
Non-locality occurs due to optimal payoffs not being recursively
defined over subgames as in perfect information games. As a result,
guarantees normally provided by search algorithms built on subgame
decomposition no longer hold. Online Outcome Sampling (OOS)
[22] is a variant of Monte Carlo counterfactual regret minimization
(MCCFR) [21]. It is the first MCTS approach that addresses these
problems by performing each simulation from the root state. While
OOS guarantees convergence to Nash equilibrium over time in all
two-player zero-sum games, other MCTS variations may yield better
performance in certain situations. Smooth-UCT [18] is a variant of
the established Upper Confidence Bounds Applied to Trees (UCT)
algorithm [20]. Similar to fictitious play, Smooth-UCT's action selec-
tion mechanism is designed to mix a player's average policy during
self-play. Smooth-UCT requires the same information as UCT (i.e.
node statistics). However, Smooth-UCT uses the average strategy by
utilizing the N(u, a) value. More specifically, Smooth-UCT chooses
the average strategy with probability ηk and the standard UCT ac-
tion with probability 1 − ηk , where ηk is an iteration sequence with
lim
k→∞ ηk = γ > 0. Smooth-UCT converges much faster than OOS
to a sub-optimal strategy and was only outperformed by OOS after
a significant number of simulated episodes [18]. This suggests that
for games with time constraints, Smooth-UCT outperforms better
than OOS . For this reason, Smooth-UCT was selected as the online
MCTS algorithm in the experiments. It is important to note that
the present technique is independent of the online MCTS variation
and can be extended to any Online Information set MCTS variation.
The section Smooth-UCT Calibration explores in detail the method
for calibrating the Smooth-UCT parameters that were used for the
experiments.
2.5 Related Work on Predicting Human Decisions
While many games have an optimal strategy for playing against
fully rational opponents, empirical studies suggest that people rarely
converge to the sub-game perfect equilibrium [9, 11]. However,
in many settings, it is still possible to develop a general human
decision-making model for predicting human decisions using data
collected from other people [27–29]. On the other hand, generalizing
computational agents' decision-making without prior knowledge of
their computational model is significantly harder [8]. Therefore, an
integrative approach that incorporates prediction of a human oppo-
nent's decision-making may yield better game performance when
interacting with an opponent for the first time, especially when deal-
ing with uncertainty and deceptiveness. By applying prediction of
human decision-making the agent adapts its actions to the human
player and can better plan its future actions [7, 12, 24, 29]. Facial
expressions were used for predicting people's strategic decisions
in the Centipede-Game [25]. Key facial points were extracted from
video snippets of the players' faces and were used to train a classifier
to predict participants' decisions. [28] presented the Predictive and
Relevance based Heuristic agent (PRH), which can assist people in
argumentative discussions. The agent utilized a predictive model
with 76% accuracy of people's top three arguments in conjunction
with a heuristic model. [17] introduced neural-based models that
learn a policy and the behavior of the opponents. An encoded obser-
vation of the opponent's action is integrated into a deep Q-Network
(DQN). The presented methods outperform DQN in both a simulated
soccer game and a trivia game.
3 SEMI-DETERMINIZED MCTS
We introduce the Semi-Determinized MCTS (SDMCTS), a variant
of the Information Set MCTS algorithm (ISMCTS). SDMCTS uti-
lizes a predictive model of the unobservable portion of the human
opponent's actions. First, SDMCTS searches for an optimal strategy
as a response to the opponent's possible strategies in an instance of
the game where hidden actions are revealed to all players. Second,
SDMCTS uses the predictive model to estimate the expected reward
for each response action. More specifically, for a given computa-
tional budget, SDMCTS performs Monte Carlo simulations directly
on the information set of an instance of the game where only the
unobservable portion of the opponent's actions are determined. That
is, during the simulations, SDMCTS considers all actions to be pub-
lic information and are revealed to all players while the remaining
private information is kept hidden. Formally, let ui
k be the informa-
tion state for player i at round k of the game. We denote by ao
k−1 the
action performed by an opponent in the previous round k − 1 which
led to the information state ui
k−1 is not fully observable
by player i. Therefore, we define an alternative semi-determinized
k(ao
k−1) where the opponent's previous action is
information state ui
determined to be ao
k−1. During the search phase, SDMCTS performs
simulations on the semi-determinized information states, resulting
in estimates of Q( ui
k(ao
k−1), a) for performing response action a at
the information state ui
k where the opponent's previous action is
1.
determined to be ao
k . Note that ao
Once the search phase has been completed, the predictive model
is used for calculating the expected payoff for each of the current
player's response actions. The predictive model provides a prob-
ability distribution over the opponent's possible previous actions.
Formally, for a given information state ui , the predictive model esti-
mates P(ao ui), the probability that the opponent has performed
action ao in the previous round. The expected payoff Eu[ui , a] for
performing action a at information state ui is calculated by:
k−1
Eu[ui , a] =
(cid:16)P(ao ui) · Q(cid:0) ui(ao), a(cid:1)(cid:17)
ao
where Q( ui(ao), a) is the estimated payoff for performing re-
sponse action a at the semi-determinized information state ui(ao).
Lastly, the algorithm chooses the response action that maximizes
the expected payoff. Algorithm 1 presents a pseudo code of the pro-
posed method. In the algorithm, we denote by Qtr ee the estimated
payoff function that results from the SDMCTS simulations on the
semi-determinized instance of the game.
During the SEARCH, SDMCTS performs multiple ISMCTS sim-
ulations on the semi-determinized instance of the game. Algorithm 2
describes the standard ISMCTS simulation function. As described in
section 2.2, ISMCTS is comprised of the game simulator G and the
reward function R. In addition, OUT-OF-TREE keeps track of play-
ers who have left the scope of their search tree in the current iteration
(episode), i.e. the simulation has reached Information Set nodes that
were not explored before. When the simulation encounters a new
Information Set, one that was not visited in a/the previous episode,
the OUT-OF-TREE indicator is set to true and a new tree node is
created for the newly encountered Information Set. This operation is
performed by the EXPANDTREE function. The action selection and
node updating functions (i.e. SELECT and UPDATE) determine the
specific ISMCTS variant. The action selection function samples the
tree policy and chooses an action for the specified information set.
The update function is responsible for updating the tree nodes, i.e.
updating the information set statistics. The specific implementation
1The k and k − 1 notation are omitted in places where they can be deduced from the
context
Algorithm 1 Semi-Determinized ISMCTS
1: function SEARCH(ui )
2:
3:
4:
5:
s0 ∼ I−1( ui(ao))
SIMULATE(s0)
for each opponent's action ao do
while Within Computational Budget do
6:
7:
8:
end for
end while
return Qtr ee
end function
9: function GET BEST RESPONSE(ui )
10:
11:
12:
Qtr ee ← SEARCH(ui)
for each a ∈ A(ui) do
Eu[ui , a] =
(cid:16)P(ao ui) · Q(cid:0) ui(ao), a(cid:1)(cid:17)
ao
13:
return arg maxa∈A(ui) Eu[ui , a]
end function
of these functions is derived from the choice of the ISMCTS variant.
For the Cheat Game agent implementation which was used in the
experiments, the Smooth-UCT was used. The implementation of
the UPDATE and SELECT functions as well as the exact parame-
ters' values that were used for the experiments are presented later in
section 4.6.
Algorithm 2 ISMCTS Simulation
1: function ROLLOUT(s)
2:
3:
4:
a ∼ πr(s)
s′ ∼ G(s, a)
return SIMULATE(s′)
end function
5: function SIMULATE(s)
6:
return r ∼ R(s)
7:
if ISTERMINAL(s) then
end if
i = PLAY ER(s)
if OUT-OF-TREE(i) then
return ROLLOUT(s)
end if
ui = Ii(s)
if ui (cid:60) T i then
EXPANDTREE(T i , ui )
a ∼ πr(s)
OUT-OF-TREE(i) ← true
a = SELECT(ui)
else
end if
s′ ∼ G(s, a)
r ← SIMU LAT E(s′)
UPDATE(ui , a, r)
return r
end function
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
4 THE CHEAT GAME
The Cheat Game is an Imperfect Information Game with partially
unobservable actions. We use it for demonstration of our SDMCTS.
In addition, we believe it is an excellent game for studying Imperfect
Information scenarios and it is fun for people to play. We slightly
adapted the Cheat Game to fit playing online. In our version of the
Cheat Game, eight cards are dealt to each player at the onset of
the game. The first player is chosen randomly. Play proceeds in the
order of the deal. The objective of the game is to be the first player
to get rid of all of his cards. A turn consists of a player placing a
specific number (between one and four) of face-down cards in the
middle of the table and making a claim as to what those cards' rank
is. However, a player is permitted to deceive his opponent and lie
about the cards' rank; we call this claim a false claim. The first
claim of the game is chosen as the top card of the deck; subsequent
calls must be exactly one rank higher or one rank lower, with kings
being followed by aces. Lastly, if a player wishes to avoid making a
claim, he may Take a Card from the deck. Once a player has made a
claim, the opponent can challenge it by performing the Call-Cheat
action. If a claim is challenged, the entire stack of cards that were
placed onto the table are revealed and the claim is examined. If the
challenge was correct, the player who made the false claim must
take the entire stack of cards. However, if the challenger was wrong,
he must take the stack. The first player to empty their hand is the
winner. To further decrease the size of the search space, if the game
does not conclude after 100 rounds, the games ends and the winner
is the player who holds the lowest number of cards.
The Cheat Game is an imperfect information game where a player
cannot see his opponents' cards. In addition, as described above, the
actual rank of a claim is not revealed to the other participants. In
other words, the actions of a player are hidden and often deceptive.
This property of the game adds a level of uncertainty and increases
the complexity of finding a suitable strategy.
4.1 The Cheat Game Agent
The Predictive MCTS Cheat Game Agent (PMCA) is an instantiation
of the proposed method presented in the Section Semi-Determinized
MCTS. More specifically, the PMCA combines a variation of the
MCTS algorithm with a predictive model of human decisions. As
mentioned above, the chosen MCTS adaptation is the well-established
Smooth-UCT [18]. The predictive model was developed based on
a human behavioral data-set. Prior to developing the agent, a pre-
liminary experiment was conducted. 60 participants were asked to
play the Cheat Game in a two-player repeated human-vs-human
experiment.
4.2 The Cheat Game - Information State
As defined above, an information state ui is the visible portion of
the game state s to player i. In the Cheat Game, the player is granted
access to the following attributes of the game state. Clearly, the
player can view his own cards and his own actions. In addition,
the player can view the number of cards in the opponent's hand,
the facedown table cards, and the remaining cards in the shuffled
deck. Once a Call-Cheat action is performed, the last claim that
was made is examined. During the examination, all of the cards that
were placed facedown on the table are revealed to all of the players.
Therefore, a player can track cards that each player has collected
from the table.
4.3 The Cheat Game - Information State
Abstraction
An information state abstraction is a technique for significantly low-
ering the size of the state space. More specifically, an abstraction
aggregates similar information states, resulting in an alternative in-
formation space with a considerably smaller size [15, 19]. Formally,
an abstraction F = { f i
A : Ui → Uii ∈ N} is a set of functions
that maps the information state space Ui onto an information state
space Ui , where Ui ≫ Ui. While an abstraction is extremely
important for reducing the search space, it is not without flaws.
Aggregating similar information states prevents the players from dis-
tinguishing between the aggregated states and thus they may choose
a sub-optimal action. Therefore, it is important to choose a suitable
abstraction that both reduces state space and partially preserves its
strategic structure.
The abstraction calibration was planned carefully to balance be-
tween state space size and preserving the strategic structure of the
aggregated states. There is an inherent trade-off: as the search space
decreases, the probability of aggregating information states with
different strategies increases. Therefore, crucial attributes from the
full information state ui were selected based on their importance
when considering a strategy. Multiple sub-sets of attributes were
hand-picked by an experienced player and were tested extensively
against human players. The sub-set of attributes that performed best
was selected for the Cheat Game information state abstraction. It
is important to note that, as discussed above, during the search the
proposed method regards hidden actions as public information. That
is, the search is performed on the alternative information state where
claim actions are determinized, i.e. claims are considered as public
information and are revealed to all players. Therefore, the alterna-
tive information state contains public information about the nature
of the claim, i.e. whether the previous claim is a true claim or a
false claim. The information state abstraction is comprised of the
following attributes:
Description
The opponent's previous action.
Values
TrueClaim,
FalseClaim,
TakeCard,
CallCheat
True / False
ψ{1, ..., 52}
ψ{1, ..., 52}
ψ{1, ..., 52}
{1, ..., 100}
The remaining attributes require some additional explanation.
For the duration of the game, the agents keep track of which cards
were collected by the opponent when Call-Cheat was performed. In
#
1
2&
3
4
5
6
7
Can the player make a one card
higher/lower true claim?
The player's card count.
The opponent's card count.
Placed on table card count.
The round index.
Where ψ(x) =
x,
5,
6,
x ≤ 4
5 ≤ x ≤ 8
otherwise
this way, the agent can estimate which cards are currently held by
the opponent. In addition, the agents keep track of the opponent's
claims. Some of the abstraction's attributes are derived from these
estimations.
8 &
9
10
&
11
12
&
13
14
&
15
16
The estimated number of cards the
opponent has that are one rank
higher/lower from the last valid
claim.
A value indicating whether the cur-
rent player has made the same
higher/lower claim since the last
Call-Cheat move.
A value indicating whether the
opponent has made the same
higher/lower claim since the last
Call-Cheat move.
A value indicating whether the cur-
rent player was caught cheating on
a claim with one rank higher/lower
than the last claimed rank.
Did the opponent catch the player
cheating on any rank?
Where φ(x) =
(cid:40)
if x ≤ 2
otherwise
x,
3,
φ{1, ..., 4}
True / False
True / False
True / False
True / False
4.3.1 Satisfying Time Restrictions. The time duration for
producing an action for the agents was determined from the average
time it took the participants to respond when they played head-to-
head human vs human. This value was determined to be 25 seconds.
In order to create an agent that can produce a response in reasonable
time, the MCTS tree nodes were optimized. While a naive represen-
tation of the described attributes takes 15 bytes in size, we were able
to encode all of the attributes into a 32-bit uint structure without data
loss (see Figure 1). This encoding was done for two reasons. First,
the encoding ensures a low memory footprint. Second, the use of a
32-bit uint is extremely suitable for hash-mapping structures. For a
large enough heap, it can significantly reduce the conflict when hash
retrieval is called and thereby improves CPU usage. In particular,
for the same amount of time, we were able to achieve a 12 fold
improvement in the number of simulations that can be performed.
Figure 1: Optimization - 32-bit Encoding
4.4 The Cheat Game - Action Abstraction
For a given game state s, a player may perform the following actions.
If the opponent made a claim during the previous state, the player
may choose to accuse the opponent of "cheating", i.e. perform the
Call-Cheat action. Alternatively, a player may make his own claim.
As mentioned above, a claim can be either true or false. The player
may place up to four cards facedown on the table and make a claim
as to their rank. Lastly, if a player wishes to avoid making a claim,
he may Take a Card from the deck. Therefore, for a given game state
s, the number of actions a player may perform is:
4
(cid:19)
(cid:18)h
k
k =1
A(s) = 2 +
where h is the number of cards in the player's hand and k is the
number of cards he wishes to declare. The additional two actions
are for the Call-Cheat and Take a Card moves. Consequently, for
an average hand of eight cards, the branching factor will result in
164 unique actions. Combined with the 100 turn limit, the estimated
game tree may contain up to 10222 ≈ 164100 nodes. For this reason,
an action abstraction is introduced. A claim action is represented by
a tuple (γ , δ, k), where γ ∈ {hiдher , lower} denotes the direction of
the claim, δ ∈ {True, False} is a value indicating whether the claim
is true, and k is the number of cards that was declared. In return, the
branching factor is significantly reduced to a more computationally
manageable size, that is: A(s) = 2 + {(γ , δ, k)} = 18.
4.5 The Cheat Game - Rollout Policy
A range of unique heuristic based rollout policies were tested against
experienced human players. The rollout policy that performed best
against these experienced players was selected for the MCTS simu-
lations. The rollout policy, denoted by πr , was designed to mimic
the average strategic behavior of human players. To that end, the
human-vs-human data-set was used to extract a probability distri-
bution function (PDF) over the available actions. The probability
distribution function was combined with a set of heuristic rules
which were designed to handle special cases. The probabilities over
the set of action abstraction are presented in Figure 2. In cases
when one or more of the actions were inapplicable, the inapplicable
actions' probability values were distributed uniformly among the
remaining actions. For example, if the previous action was not a
claim then the player was not allowed to perform the Call-Cheat
action. As a result, the remaining valid actions' probabilities would
have increased by 0.006 = 0.105/17 each. Formally, let ui be an
information state and let Pr(a) be the fixed rollout probability for
choosing action a ∈ A(ui), the normalized rollout probability for
choosing a in information state ui is calculated by:
πr(a ui) ∼
Pr(a)
ai ∈A(ui) Pr(ai)
The special case heuristic was developed based on the expertise
of the human player. It is important to note that the heuristic rules
take precedence over the PDF. Therefore, if the current game state
satisfies any of the special case's conditions, the heuristic action
is performed and the PDF action is ignored. The set of rules was
designed to reduce the chance that the rollout policy would perform
a dominated strategy. If the opponent made a false claim, the rollout
policy would choose the Call-Cheat action for the following cases:
a) If the opponent has no more cards in his hand; b) If there are
more than eight cards on the table; c) If the opponent was caught
cheating more than eight times; d) If the opponent made the same
claim since the last time Call-Cheat was performed; e) If the current
player's cards contain a card with the same rank as the claim. f)
If the opponent was caught cheating on the same rank in previous
rounds.
Figure 2: Rollout Policy PDF over the action abstraction
4.6 Smooth-UCT Calibration
The Smooth-UCT mixes the average strategy with the Upper-Confidence
Bound (UCB) action selection mechanism. More specifically, Smooth-
UCT chooses with probability ηk the UCB action:
loдN(ui)
N(ui , a)
a = arдmaxaQ(ui , a) + c ·
(cid:115)
where c is the balancing factor between exploration and exploitation.
Alternatively, Smooth-UCT chooses with a probability of 1 − ηk the
average strategy:
.
a ∼ p, where ∀a ∈ A(ui) : p(a) ← N(ui , a)
N(ui)
(cid:17)−1(cid:19)
1 + d ·(cid:112)Nk
(cid:18)
γ , η ·(cid:16)
ηk = max
The ηk is an iteration k-adapted sequence defined as:
where γ , η and d are constants and Nk is the total visits to the corre-
sponding ui node. (The interested reader is referred to [18] for an
in-depth explanation of the parameters and their importance).
The η and γ parameters were manually calibrated and set to
η = 0.9, γ = 0.1. The d, c and payoff discount-factor parameters
were calibrated using a grid-search self-play tournament. Different
combinations of the parameters were competing in a head-to-head
tournament. Each game was comprised of 100 matches, the set of
parameters who won the majority of matches continued through
to the next level, while the loser was eliminated. The parameters'
settings were c = 17 + k, d = 0.001 + 0.005l and the discount-factor
= 0.97 + 0.005m where k, l, m ∈ {1, ..., 10}. The winning parameters
set, c = 0.0025, d = 0.0025 and Discount Factor = 0.995, was used
in the experiment.
Algorithm 3 describes the action selection mechanism and update
functions used in Smooth-UCT. It is important to note that Smooth-
UCT uses the same UPDATE function as standard UCT.
4.7 Predictive Model
The predictive model was devised to classify the opponent's ac-
tion type, i.e. true or f alse claim. As mentioned in Section The
Cheat Game Agent, a data-set of human-vs-human play of 60 par-
ticipants was collected in the preliminary experiment. The genders
Algorithm 3 Smooth-UCT - Select & Update
1: function SELECT(ui )
z ∼ U[0, 1]
2:
if z < ηk(ui) then
3:
(cid:114)
4:
5:
6:
7:
else
return arдmaxaQ(ui , a) + c ·
∀a ∈ A(ui) : p(a) ← N(ui,a)
N(ui)
return a ∼ p
loдN(ui)
N(ui,a)
end if
end function
8: function UPDATE(ui , a, r)
N(ui) ← N(ui) + 1
9:
N(ui , a) ← N(ui , a) + 1
10:
Q(ui , a) ← Q(ui , a) + r−Q(ui,a)
N(ui),a)
11:
end function
were distributed evenly with 51% males and 49% females with ages
varying between 18-42. In total, the data-set contains 1,275 true
claim samples and 1,157 f alse claim samples. The data-set was used
to manually extract a collection of features. Customarily, different
subsets of features were tested on a wide range of binary classi-
fiers ranging from Decision Trees through Support Vector Machine
(SVM) [4] to Deep Neural Network (DNN) [30]. The evaluation of
the model was based on a â AIJleave-one-sample-outâ AI cross valida-
tion. For each sample for player i, round t and match m, the classifier
was allowed to train on samples from all players excluding player i
and his opponent, as well as samples of player i and his opponent
that precede match m and round t. In order to avoid class imbal-
ance, oversampling was used in cases where the number of true and
f alse claim samples were significantly imbalanced. We were able to
achieve a good prediction rate with an Area Under the Curve (AUC)
of 0.821, T PR = 75.3%, T N R = 74.0% and G − Mean = 74.6% using
the Random Forest algorithm. The Deep Neural Network (DNN)
classifier received similar but slightly lower accuracy, however with
no significant difference. Figure 3a presents the Receiver Operat-
ing Characteristic (ROC) curves of the most accurate classifiers.
The final features collection contained 21 mostly statistical features.
The human player' behavioural changes were modeled using these
predictive model's features. The features contains information that
correspond to the number of rounds played. One of the more signifi-
cant features is the response duration. Another feature is the number
of times a player was caught cheating with respect to the number
of times he made a false claim until the last call cheat (i.e. #caught
/ #cheat). One more interesting feature is the number of times the
player took cards from the deck with respect to the number of rounds
played.
It is important to note that features2 were derived strictly from
data that is contained within the Information State.
5 EXPERIMENTS
Experiment were conducted in order to evaluate the effectiveness of
the proposed method. 120 participants from the US, aged 20-50 (46%
females and 54% males), were recruited using Amazon Mechanical
2For the complete feature list visit: https://goo.gl/VLy7NH
Turk. The participants were asked to play a two-player Cheat Game
for at least three matches but for no more than five matches. Prior
to the game, participants were presented with instructions followed
by a quiz which ensured that the rules were explained properly. The
participants received payment on a per match basis and an additional
payment for every match they won.
The objective of the experiment is to evaluate the effectiveness of
combining MCTS with a predictive model. To that end, participants
were randomly divided into three groups. Each group played against
a different instantiation of the proposed method (see Section Semi-
Determinized MCTS). As described above, the Smooth-UCT was
chosen as the MCTS algorithm. In the first group, the participants
played against a Smooth-UCT Cheat Game Agent (MGA) without a
predictive model. The agent gives equal probability to true and false
claims, i.e. P(ao = true claim ui) = P(ao = false claim ui) = 0.5
where ui is an information state for player i where the previous
opponent's action, ao, is a claim action. Naturally, in information
states where the opponent's previous action is not a claim (i.e. Take-
Card or CallCheat) these probabilities are set to zero. The second
group played against the Predictive Smooth-UCT Cheat Game Agent
(PMGA) that incorporates the predictive model from the Predictive
Model section. As described above, the predictive model was trained
on data collected from a preliminary experiment were the partici-
pants played human-vs-human cheat game. It is important to note the
preliminary experiment's subjects did not participate in the agents'
evaluation experiments. In order to further demonstrate the effec-
tiveness of combining a predictive model with MCTS, participants
in the third group played against the FPMGA agent, which had an
unfair advantage. The FPMGA agent was allowed to peek into his
opponent's real claim. Therefore, participants in the third group were
compensated due to this unfair advantage. While the FPMGA agent
was able to predicate the opponent's claim with perfect precision
(i.e. 100% prediction rate), it was restricted to a prediction rate of
85%. The 85% prediction rate was chosen as a plausible prediction
rate that can be achieved when predicting human decisions. A higher
prediction rate (above 85%) is extremely difficult to obtain when in-
teracting with people. This is in part because of the inherent noise in
the human decision-making process. For example, the same person
may choose a different strategy in the same exact game state. For the
experiments, we hypothesize that the FPMGA agent will outperform
the PMGA agent and that both predictive agents will outperform the
non-predictive agent, MGA.
5.1 Experimental Results
To analyze the results, one-way ANOVA was conducted to compare
the three conditions (p < .05). The exact p-value and f -ratio can
be observed in the figures. As can be seen in Figure 3, both the
predictive agent (PMGA) and the pseudo predictive agent (FPMGA)
performed significantly better than the non-predictive agent (MGA).
Furthermore, FPMGA performed significantly better than PMGA.
Figure 3b presents the percentage of won matches by the agents (i.e.
won/played). This can be explained by the successful call cheat ratio
that can be viewed in Figure 3c. The results suggest that by com-
bining the predictive model with the Smooth-UCT, the agents were
able to reduce the uncertainty that was derived from hidden action.
Thereby, the predictive agents were able to choose better response
(a) ROC Curves
(b) Agents' matches win ratio
(c) Call Cheat Success Rate
(d) Matches' Avg. Rounds
Figure 3: Predictive Model & Experimental results.
6 CONCLUSION
We have presented an algorithm for the development of agents that
performs well against human in Imperfect Information Games with
Partially Observable Actions. More specifically, we have introduced
Semi-Determinized MCTS (SDMCTS), an ISMCTS algorithm that
combines a predictive model of the opponent's actions and an infor-
mation set MCTS variant. The method builds on existing ISMCTS
adaptations and determinization techniques, and takes advantage
of the benefits of both approaches. We have presented the Cheat
Game as an indicative example of the effectiveness of the presented
techniques. In addition, a predictive model was conferred and pro-
duced good accuracy for predicting human strategic decision-making
in the Cheat Game. We have presented the MGA, PMGA and FP-
MGA agents which applied the SDMCTS algorithm to the Cheat
Game. The SDMCTS agents combined the predictive model with
the Smooth-UCT, a ISMCTS variation, to yield skillful performance
when used in a head-to-head game with human opponents. The
results of an extensive experiment with 120 participants were pre-
sented. The participants played repeated head-to-head games against
the MGA, PMGA and FPMGA agents. The results suggest that the
combination of a predictive model with MCTS can be used to im-
prove game performance against humans. Furthermore, the agents'
performance improved as the predictive model's accuracy increases.
For future work, we intend to combine an additional predictive
model of the opponent's response strategy in the Cheat Game. More
specifically, we will develop a predictive model that estimates the
probability that the opponent will Call Cheat at a claim. In addition,
we intend to implement the SDMCTS algorithm for two-player poker
and develop a predictive model that estimates the strength of the
opponent's hand compared to ours. Lastly, we intend to implement
our method on Phantom games.
actions to deceptive claims. Figure 3d can further demonstrate the
improvement of game performance. The average number of rounds it
took the predictive agents to conclude a match is significantly lower
than the non-predictive agent. Interestingly, the average number of
rounds it took the FPMGA to conclude a match is higher than the
PMGA, despite FPMGA having a more accurate prediction rate. We
hypothesize that this is due to fact that the FPMGA performs the
call cheat action more than the PMGA and MGA. This prolongs the
number of rounds needed to reach a terminal state. However, the
MCTS's discount factor can be calibrated in order to incentivize the
agents to conclude the games faster.
Another measure for play-dominance is the average difference be-
tween the cards held by the agent and the humans. The PMGA's and
FPMGA's average card difference (−3.51 and −4.56, respectively)
was significantly lower than MGA's (−2.89), with an f -ratio of 6.06
and a p-value of .002. The importance of the statistically significant
results is enhanced when considering the low number of matches in
the experiments.
In addition to the statistically significant results, we offer as a
discussion the human participants' behavioral statistics. It seems
that people played differently against the different agents. Unfortu-
nately, statistical significance of such behaviour was not obtained.
We hypothesize that this is because of the inherent noise in human
behavior. For example, people who played against the predictive
agents demonstrate a reduction in performing false claims. More
specifically, 40.4% and 42.4% of all people's claims were false when
played against FPMGA and PMGA, respectively, while people who
played against MGA lied more with a 44.8% false claim ratio. This
can be explained by the fact that people tend to lie less when there
is a high chance of being caught. On the other hand, people who
played against MGA took less cards from the deck, i.e. chose to
Take-Card for 23.9% of the moves, while people who played against
the FPMGA and PMGA performed the Take-Card action in 19.6%
and 20.8% of moves, respectively. This is unexpected, as one would
expect people to take a card from the deck in order to avoid making
a false claim. Another important observation is that people who
played against MGA perform better in later matches, that is, people
won 13% of the first two matches and 28% of the last two matches.
However, people who played against PMGA and FPMGA performed
in a similar fashion across all matches, contributing to the overall
success of the prediction-based methods.
[29] A Rosenfeld, I Zuckerman, A Azaria, and S Kraus. 2012. Combining psychologi-
cal models with machine learning to better predict peopleâ A ´Zs decisions. Synthese
189, 1 (2012), 81–93.
[30] J Schmidhuber. 2015. Deep learning in neural networks: An overview. Neural
[31] B Sheppard. 2002. World-championship-caliber Scrabble. Artificial Intelligence
networks 61 (2015), 85–117.
134, 1-2 (2002), 241–275.
[32] D Silver, A Huang, C J Maddison, A Guez, L Sifre, G Van Den Driessche, J
Schrittwieser, I Antonoglou, V Panneershelvam, M Lanctot, et al. 2016. Mastering
the game of Go with deep neural networks and tree search. Nature 529, 7587
(2016), 484–489.
[33] N R Sturtevant. 2008. An analysis of UCT in multi-player games. In International
Conference on Computers and Games. Springer, 37–49.
REFERENCES
[1] B Arneson, R B Hayward, and P Henderson. 2010. Monte Carlo tree search in
Hex. IEEE Transactions on Computational Intelligence and AI in Games 2, 4
(2010), 251–258.
[2] Y Bjornsson and H Finnsson. 2009. Cadiaplayer: A simulation-based general
game player. IEEE Transactions on Computational Intelligence and AI in Games
1, 1 (2009), 4–15.
[3] C. B Browne, E. Powley, D. Whitehouse, S. M. Lucas, P. I. Cowling, P. Rohlfsha-
gen, S. Tavener, D. Perez, S. Samothrakis, and S. Colton. 2012. A survey of monte
carlo tree search methods. IEEE Transactions on Computational Intelligence and
AI in games 4, 1 (2012), 1–43.
[4] C Cortes and V Vapnik. 1995. Support vector machine. Machine learning 20, 3
(1995), 273–297.
[5] R Coulom. 2006. Efficient selectivity and backup operators in Monte-Carlo tree
search. In International Conference on Computers and Games. Springer, 72–83.
[6] Peter I Cowling, Edward J Powley, and Daniel Whitehouse. 2012. Information set
monte carlo tree search. IEEE Transactions on Computational Intelligence and AI
in Games 4, 2 (2012), 120–143.
[7] A Davidson, D Billings, J Schaeffer, and D Szafron. 2000.
Improved oppo-
nent modeling in poker. In International Conference on Artificial Intelligence,
ICAIâ A ´Z00. 1467–1473.
[8] Yiannis Demiris. 2007. Prediction of intent in robotics and multi-agent systems.
Cognitive processing 8, 3 (2007), 151–158.
[9] Ido Erev and Alvin E Roth. 1998. Predicting how people play games: Rein-
forcement learning in experimental games with unique, mixed strategy equilibria.
American economic review (1998), 848–881.
[10] I Frank, D Basin, and H Matsubara. 1998. Finding optimal strategies for imperfect
information games. In AAAI/IAAI. 500–507.
[11] Yaâ A ´Zakov Gal, Sarit Kraus, Michele Gelfand, Hilal Khashan, and Elizabeth
Salmon. 2011. An adaptive agent for negotiating with people in different cultures.
ACM Transactions on Intelligent Systems and Technology (TIST) 3, 1 (2011), 8.
[12] Yaâ A ´Zakov Gal, Avi Pfeffer, Francesca Marzo, and Barbara J Grosz. 2004. Learn-
ing social preferences in games. In Proceedings of the National Conference on
Artificial Intelligence. Menlo Park, CA; Cambridge, MA; London; AAAI Press;
MIT Press; 1999, 226–231.
[13] S Gelly, L Kocsis, M Schoenauer, M Sebag, D Silver, C Szepesvári, and O
Teytaud. 2012. The grand challenge of computer Go: Monte Carlo tree search and
extensions. Commun. ACM 55, 3 (2012), 106–113.
[14] S Gelly, Y Wang, O Teytaud, M Uct Patterns, and P Tao. 2006. Modification of
UCT with patterns in Monte-Carlo Go. (2006).
[15] A. Gilpin. 2009. Algorithms for abstracting and solving imperfect information
games. Carnegie Mellon University.
[16] M L Ginsberg. 2001. GIB: Imperfect information in a computationally challenging
game. Journal of Artificial Intelligence Research 14 (2001), 303–358.
[17] H He, J Boyd-Graber, K Kwok, and H Daumé III. 2016. Opponent Modeling in
Deep Reinforcement Learning. In Proceedings of The 33rd International Confer-
ence on Machine Learning. 1804–1813.
[18] J Heinrich and D Silver. 2015. Smooth UCT Search in Computer Poker.. In IJCAI.
554–560.
[19] M B Johanson. 2016. Robust Strategies and Counter-Strategies: From Superhuman
to Optimal Play. Ph.D. Dissertation. University of Alberta.
[20] L Kocsis and C Szepesvári. 2006. Bandit based monte-carlo planning. In European
conference on machine learning. Springer, 282–293.
[21] M Lanctot, K Waugh, M Zinkevich, and M Bowling. 2009. Monte Carlo sampling
for regret minimization in extensive games. In Advances in neural information
processing systems. 1078–1086.
[22] V. Lis`y, M. Lanctot, and M. Bowling. 2015. Online monte carlo counterfactual
regret minimization for search in imperfect information games. In Proceedings of
the 2015 International Conference on Autonomous Agents and Multiagent Systems.
International Foundation for Autonomous Agents and Multiagent Systems, 27–36.
[23] J R Long, N R Sturtevant, M Buro, and T Furtak. 2010. Understanding the Success
of Perfect Information Monte Carlo Sampling in Game Tree Search.. In AAAI.
[24] S Markovitch and R Reger. 2005. Learning and exploiting relative weaknesses
of opponent agents. Autonomous Agents and Multi-Agent Systems 10, 2 (2005),
103–130.
[25] N. Peled, M. Bitan, J. Keshet, and S. Kraus. 2013. Predicting Human Strategic
Decisions Using Facial Expressions.. In IJCAI.
[26] M Ponsen, S De Jong, and M Lanctot. 2011. Computing approximate nash equi-
libria and robust best-responses using sampling. Journal of Artificial Intelligence
Research 42 (2011), 575–605.
[27] Avi Rosenfeld, Zevi Bareket, Claudia V Goldman, David J LeBlanc, and Omer
Tsimhoni. 2015. Learning driversâ A ´Z behavior to improve adaptive cruise control.
Journal of Intelligent Transportation Systems 19, 1 (2015), 18–31.
[28] Ariel Rosenfeld and Sarit Kraus. 2016. Providing arguments in discussions on the
basis of the prediction of human argumentative behavior. ACM Transactions on
Interactive Intelligent Systems (TiiS) 6, 4 (2016), 30.
|
0801.1630 | 3 | 0801 | 2008-04-08T21:39:09 | Computational Solutions for Today's Navy | [
"cs.MA",
"cs.GL"
] | New methods are being employed to meet the Navy's changing software-development environment. | cs.MA | cs | 30 ScientificComputing.com March 2008
Computational Solutions for
Today's Navy
New methods are being employed to meet the Navy's changing software-
development environment.
▶ Frank W. Bentrem, Ph.D., John T.
Sample, Ph.D., and Michael M.
Harris
T
he Naval Research Labor-
atory (NRL) is the corpor-
ate laboratory for the
United States Navy. Part of the
mission of NRL is to provide
“broadly based applied research
and advanced technology develop-
ment programs in response to
identified and anticipated Navy
and Marine Corps needs”. Advan-
cing the state-of-the-art in sci-
entific computation is important in
both applied research and techno-
logy development. In this article,
we relate current computational
trends in naval technologies as
well as the trends we anticipate
over the next few years. We also
present solutions for some of the
current and coming challenges we
face.
Naval operations can benefit
greatly from a highly accurate and
timely knowledge of the environ-
ment. Specifically, mine-hunting
operations require knowledge of
the seafloor composition and
oceanographic conditions which
include the temperature, density,
water clarity, and depth of the wa-
ter, the speed of ocean currents,
and wave heights. Naval person-
nel use a combination of historic-
al, real-time, and predicted data
about these conditions.
Sea-based computing
Sea basing refers to a major
thrust in future naval capabilit-
ies from the Office of Naval Re-
search where “logistics, ship-
ping, and at-sea transfer tech-
nologies support joint opera-
tional independence”. This ap-
plies equally well to environ-
tions as opposed to collecting and
processing data at centralized fa-
cilities. Contributing to this shift
is the development and manufac-
turing of affordable and compact
(yet powerful) workstations. Since
computers meeting both budget
and space constraints are now
widely available, these machines
may be installed in the ship or
other vehicle along with the ne-
OLD WAY of doing business: Computing power is located at shore-based
production facilities that determine and distribute the "best" environment.
mental data processing. Indeed,
in recent years, we have no-
ticed an increasing shift to-
wards computationally intensive
data processing in the field,
fleet, and during survey opera-
cessary software. In this way,
rather than depending on the reli-
ability and data-transfer rates of
the communication links, operat-
ors can use onboard data pro-
cessing to make real-time de-
31 ScientificComputing.com March 2008
cisions. While not exactly a new
method, defense organizations are
increasingly processing data in
the field or at sea.
The most important demands
on computing systems resulting
from the sea-based computing
model are twofold--portability and
efficiency. While software devel-
opment targets usability in the
field, expert analysts must also be
able to use the same software in
their office spaces, either for fur-
ther analysis or to process
archived data, often with a differ-
ent platform. Cross-platform com-
puter languages such as C++ with
sea requires large amounts of
data to be analyzed efficiently,
in fact, in real-time. Modern
compiled languages (e.g. C, C+
+, Fortran 95) are well suited
for speedy computations,
however, good software design
is the most important factor in
program efficiency.
Through-the-Sensor techno-
logy
In addition to sea-based com-
puting, there is a definite trend
towards techniques that allow
environmental data to be ex-
tracted from tactical fleet
for scientific purposes.
Software aids are used to help
make tactical decisions by military
operators. These decision aids
use environmental inputs, and
then output optimal methods for
finding targets. Actual
environmental (not historical)
data is needed to yield accurate
answers.
Through-the-Sensor (TTS)
techniques use tactical sensors to
acquire environmental informa-
tion in situ. This new information
is used to refresh historical hold-
ings. Using TTS data, decision
aids can provide answers based
NEW WAY of doing business: Computing power is located at sea and ashore. "Best" environment is determined on-scene
using new in situ data to refresh historical data.
Qt (Trolltech) or Java (Sun Mi-
crosystems) are especially useful
for these applications. Not only
must computing solutions be port-
able, processing in the field or at
sensors1. This requires com-
puter systems to have the flex-
ibility to acquire and process
data from combat sensors
rather than sensors designed
on actual versus historical condi-
tions. The challenge is to collect,
process, fuse, and disseminate
TTS data in near real-time. The
benefit is lowered operational risk
32 ScientificComputing.com March 2008
and accurate time lines based on
actual conditions.
Recent technological solutions
NRL and the Naval Oceano-
graphic Office have recently de-
veloped the Environmental Post
Mission Analysis (EPMA) system
to manage the integration of these
types of data. The EPMA collects
data from tactical sidescan sonars
(Through-the-Sensor technology),
supercomputer generated numer-
ical models, and historical/clima-
tological databases. It uses a vari-
ety of fusion algorithms to merge
those sources into a single best
view of the naval environment.
The EPMA is developed in C++
with Qt and is used on Windows,
Linux, and UNIX platforms; all of
which appear both at various
Navy installations and on Naval
ships (sea-based technology).
Another recent example of the
need for sea-based technology is
the requirement for sediment
identification at the ocean floor
during naval oceanographic sur-
veys. In the past, locations for nu-
merous sediment core samples
were chosen prior to embarking
on a survey. NRL has since de-
veloped SediMap®2,3 to enable the
mapping of sediments during the
survey itself. SediMap® uses the
Java Runtime Environment for
the capability of executing on a
number of different platforms.
To maximize efficiency, a num-
ber of tests were conducted to
determine the optimal conver-
gence rate for sediment-size es-
timates without sacrificing ac-
curacy. The software runs in
real-time as data is collected
and may either be installed on
the onboard computer or simply
run off the CD.
Further examples of
Through-the-Sensor data ac-
quisition are the extraction of
bathymetry and surficial sea-
floor sediment types from the
UQN-4 fathometer on mine
counter-measures (MCM) ships,
the BQN-17 submarine fatho-
meter, and the AN/AQS-20A
mine-hunting system (which
also yields multibeam bathy-
metry). These data are needed
in anti-submarine and mine-
hunting decision aids to determ-
ine tactics.
Conclusions
To better utilize large quant-
ities of environmental data, the
Navy is moving towards sea-
based computing, which allows
decisions to be made in real-
time at sea. Also, Through-the-
Sensor technology is being de-
veloped for existing/future fleet
combat sensors to be used in tac-
tical decision aids. These ad-
vances will help the US Navy
maintain sea supremacy in today's
fast-paced war-fighting environ-
ment.
References
1.Avera WE, Harris MM, Walter DJ, Bibee
LD, Lambert DN. Through-the-sensors
concepts to refresh the environmental
picture. NRL Review 2003;91-92.
2.Bentrem FW, Sample J, Kalcic MT,
Duncan ME. High-Frequency Acoustic
Sediment Classification in Shallow Water.
Proceedings of MTS/IEEE Oceans 2002
Conference 2002 Oct;1:7-11.
3.Bentrem FW, Avera WE, Sample J. Estim-
ating surface sediments using multibeam
sonar. Sea Technology 2006 Jun;47(6):
37-40.
Frank W. Bentrem, Ph.D. is a
research physicist, John T.
Sample, Ph.D. is a computer sci-
entist, and Michael M. Harris is
the branch head for Mapping,
Charting, and Geodesy, all three
authors with the Marine
Geosciences Division at the Naval
Research Laboratory. They may
be reached at frank.bentrem@n-
rlssc.navy.mil.
|
1201.6322 | 1 | 1201 | 2012-01-30T19:02:36 | The Cooperative Cleaners Problem in Stochastic Dynamic Environments | [
"cs.MA"
] | In this paper we study the strengths and limitations of collaborative teams of simple agents. In particular, we discuss the efficient use of "ant robots" for covering a connected region on the $Z^{2}$ grid, whose area is unknown in advance and which expands stochastically. Specifically, we discuss the problem where an initial connected region of $S_0$ boundary tiles expand outward with probability $p$ at every time step. On this grid region a group of $k$ limited and simple agents operate, in order to clean the unmapped and dynamically expanding region. A preliminary version of this problem was discussed in [1],[2] involving a deterministic expansion of a region in the grid.In this work we extend the model and examine cases where the spread of the region is done stochastically, where each tile has some probability $p$ to expand, at every time step. For this extended model we obtain an analytic probabilistic lower bounds for the minimal number of agents and minimal time required to enable a collaborative coverage of the expanding region, regardless of the algorithm used and the robots' hardware and software specifications. In addition, we present an impossibility result, for a variety of regions that would be impossible to completely clean, regardless of the algorithm used. Finally, we validate the analytic bounds using extensive empirical computer simulation results. | cs.MA | cs |
The Cooperative Cleaners Problem in Stochastic Dynamic Environments
Eyal Regev [1], Yaniv Altshuler [2], Alfred M.Bruckstein [1]
[1]
Technion -- IIT
{regeve,freddy}@cs.technion.ac.il
[2]
MIT Media Lab
[email protected]
In this paper we study the strengths and limitations of collaborative teams of simple agents. In
particular, we discuss the efficient use of "ant robots" for covering a connected region on the Z2
grid, whose area is unknown in advance and which expands stochastically. Specifically, we discuss
the problem where an initial connected region of S0 boundary tiles expand outward with probability
p at every time step. On this grid region a group of k limited and simple agents operate, in order
to clean the unmapped and dynamically expanding region. A preliminary version of this problem
was discussed in [1, 2], involving a deterministic expansion of a region in the grid.In this work we
extend the model and examine cases where the spread of the region is done stochastically, where
each tile has some probability p to expand, at every time step. For this extended model we obtain
an analytic probabilistic lower bounds for the minimal number of agents and minimal time required
to enable a collaborative coverage of the expanding region, regardless of the algorithm used and the
robots hardware and software specifications. In addition, we present an impossibility result, for a
variety of regions that would be impossible to completely clean, regardless of the algorithm used.
Finally, we validate the analytic bounds using extensive empirical computer simulation results.
I.
INTRODUCTION
In this work we discuss in this work is the Cooperative Cleaners problem -- a problem assuming a regular grid
of connected rooms (pixels), some of which are 'dirty' and the 'dirty' pixels forming a connected region of the grid.
On this dirty grid region several agents operate, each having the ability to 'clean' the place (the 'room', 'tile', 'pixel'
or 'square') it is located in. We examine problems in which the agents work in stochastic dynamic environments --
where probabilistic changes in the environment may take place and are independent of, and certainly not caused
by, the agents' activity.
In the spirit of [3] we consider simple robots with only a bounded amount of memory
(i.e. finite-state-machines).
The static variant of this problem was introduced in [4], where a cleaning protocol ensuring that a decentralized
group of agents will jointly clean any given (and a-priori unknown) dirty region. The protocol's performance, in terms
of cleaning time was fully analyzed and also demonstrated experimentally.
A dynamic generalization of the problem was later presented in [2], in which a deterministic expansion of the
environment is assumed, simulating the spreading of a contamination (or a spreading "danger" zone or fire). Once
again, the goal of the agents is to clean the spreading contamination in as efficiently as possible.
In this work we modify the 'dirty' region expansion model and add stochastic features to the spreadings of the
region's cells. We formally define and analyze the Cooperative Cleaning problem, this time under this stochastic
generalization.
We focus on a variant of the Cooperative Cleaning problem, where the tiles have some probability to be contaminated
by their neighbors' contamination. This version of the problem has applications in the "real" world and in the computer
network environments as well. For instance, one of the applications can be a distributed anti-virus software trying to
overcome an epidemic malicious software attacking a network of computers. In this case, each infected computer has
some probability to infect computers connected to it.
A more general paradigm of the cleaning problem is when the transformation of the contaminated area from one
state to another is described in the form of some pre-defined function. For instance, following the previous example,
we can say that the sub-network affected by the virus, is spreading by a certain rule. We can say that a computer
will be infected by a virus with a certain probability, which depends on the number of the neighboring computers
already infected. By defining rules for the contamination's spreading and cleaning, we can think of to this problem
as a kind of Conway's "Game of Life", where each cell in the game's grid spreads its "seed" to neighboring cells (or
alternatively, "dies") according to some basic rules.
While the problem posed in [2], as well as the analysis methods used and the correctness proofs, were all deter-
ministic, it is interesting to examine the stochastic variant of such algorithms. In this work we analyze and derive a
lower bound on the expected cleaning time for k agents running a cleaning protocol under a model, where every tile
2
in the neighborhood of the affected region may become contaminated at every time step with some probability, the
contamination coming from its dirty neighbors.
II. ORGANIZATION
The main contributions of this paper are a bound on the contaminated region's size and a bound on the cleaning
time which is presented in Section V. We also present a method which bounds the cleaning time for a given desired
probability. We then provide an impossibility result for the problem raised in Section VI. The rest of paper is organized
as followed: In Section III we survey some of the related works. In Section IV we formalize the problem, giving the
basic definitions needed for the later analysis, in Section VII we present some of the experimental results and compare
them to the analytic bounds and concluding in Section VIII.
III. RELATED WORK
Significant research effort is invested in the design and simulation of multi-agent robotics and intelligent swarm
systems (see e.g. [5 -- 10]).
In general, most of the techniques used for the distributed coverage of some region are based on some sort of
cellular decomposition. For example, in [11] the area to be covered is divided between the agents based on their
relative locations. In [12] a different decomposition method is being used, which is analytically shown to guarantee a
complete coverage of the area. [13] discusses two methods for cooperative coverage (one probabilistic and the other
based on an exact cellular decomposition).
While some existing works concerning distributed (and decentralized) coverage present analytic proofs for the ability
of the system to complete the task (for example, in [12 -- 14]), most of them lack analytic bounds for the coverage time
(and often extensive amounts of empirical results on this are made available by extensive simulations). Although a
proof for the coverage completion is an essential element in the design of a multi-agent system, analytic indicators for
its efficiency are in our opinion of great importance. We provide such results, as bounds for the cleaning time of the
agents, in Section V.
An interesting work to mention in this context is that of Koenig and his collaborators [15, 16], where a swarm of
ant-like robots is used for repeatedly covering an unknown area, using a real time search method called node counting.
By using this method, the robots are shown to be able to efficiently perform a coverage mission, and analytic bounds
for the coverage time are discussed.
Another work discussing a decentralized coverage of terrains is presented in [17]. This work examines domains with
non-uniform traversability. Completion times are given for the proposed algorithm, which is a generalization of the
forest search algorithm. In this work, though, the region to be searched is assumed to be known in advance - a crucial
assumption for the search algorithm, which relies on a cell-decomposition procedure.
Vertex-Ant-Walk, a variation of the node counting algorithm is presented in [8] and is shown to achieve a coverage
time of O(nδG), where δG is the graph's diameter, which is based on a previous work in which a cover time of
O(n2δG) was demonstrated [18]. Another work called Exploration as Graph Construction, provides a coverage of
degree bounded graphs in O(n2) time, is described in [19]. Here a group of ant robots with a limited capability
explores an unknown graph using special "markers".
Similar works concerning multi agents systems may be found in [11 -- 14, 20 -- 25]).
The Cooperative Cleaning problem is also strongly related to the problem of distributed search after mobile and
evading target(s) [26 -- 29] or the problems discussed under the names of "Cops and Robbers" or "Lions and Men"
pursuits [30 -- 35].
IV. DEFINITIONS
In our work we will use some of the basic notations and definitions, that were used in [2], which we shell briefly
review. As in the above mentioned previous works on this problem, we shall assume that the time is discrete.
Definition 1. Let an undirected graph G(V, E) describe the two dimensional integer grid Z2, whose vertices (or
" tiles") have a binary property called " contamination". Let contt(v) denote the contamination state of the tile v at
time t, taking either the value " on" (for "dirty" or "contaminated") or " off" (for "clean").
3
For two vertices v, u ∈ V , the edge (v, u) may belong to E at time t only if both of the following hold : a) v and u
are 4−N eighbors in G. b) contt(v) = contt(u) = on. This however is a necessary but not a sufficient condition as we
elaborate below.
The edges of E represent the connectivity of the contaminated region. At t = 0 all the contaminated tiles are
connected, namely :
(v, u) ∈ E0 ⇐⇒ (v, u are 4−N eighbors in G) ∧ (cont0(v) = cont0(u) = on)
Edges may be added to E only as a result of a contamination spread and can be removed only while contaminated
tiles are cleaned by the agents.
Definition 2. Let Ft(VFt , Et) be the contaminated sub-graph of G at time t, i.e. :
VFt = {v ∈ G contt(v) = on}
We assume that F0 is a single simply-connected component (the actions of the agents will be so designed that this
property will be preserved).
Definition 3. Let ∂F denote the boundary of F . A tile is on the boundary if and only if at least one of its 8−N eighbors
is not in F , meaning :
∂F = {v v ∈ F ∧ 8−N eighbors(v) ∩ (G \ F ) 6= ∅}
Definition 4. Let St denote the size of the dirty region F at time t, namely the number of grid points (or tiles) in
Ft.
Let a group of k agents that can move on the grid G (moving from a tile to its neighbor in one time step) be placed
at time t0 on F0, at some point p0 ∈ VFt .
Definition 5. Let us denote by ∆Ft the potential boundary, which is the maximal number of tiles which might be
added to Ft by spreading all the tiles of ∂Ft.
∆Ft ≡ {v : ∃u ∈ ∂Ft and v ∈ 4−N eighbors(u) and v /∈ Ft}
As we are interested in the stochastic generalization of the dynamic cooperative cleaners model, we will assume
that each tile in ∆Ft might be contaminated with some probability p. In the model we will analyze later, we assume
that the status variables of the tiles of ∆Ft are independent from one another, and between time steps.
Definition 6. Let us denote by Φn (v) the surrounding neighborhood of a tile v, as the set of all the reachable tiles
u from v within n steps on the grid (namely, the "digital sphere" or radius n around v). In this work we assume 4-
connectivity among the region cells -- namely, two tiles are considered as neighbors within one step iff the Manhattan
distance between them is exactly 1.
The spreading policy, Ξ (v, φ, t), controls the contamination status of v at time t + 1, as a function of the contami-
nation status of its neighbors in its n-th digital sphere, at time t. Notice the Ξ (v, φ, t) can be also non deterministic.
Definition 7. Let us denote by Ξ (v, φ, t) the spreading policy of v as follows:
Ξ (v, φ, t) : (V, {On, Off}α , N) → {On, Off}
Where α ≡ Φn (v), V denotes the vertices of the grid, {On, Off}α denotes the contamination status of the members
of Φn (v), at time t (for t ∈ N ).
A basic example of using the previous definition of Ξ () is the case of the deterministic model, where at every d
time-steps the contamination spreads from all tiles in ∂Ft to all the tiles in δFt. This model can be defined using the
Ξ function, as follows:
For every tile v we first define Φn (v) where n equals to 1 and assuming 4-connectivity. Then Ξ (v, φ, t) , for any
time-step t will be defined as follows:
Ξ (v, φ, t) =(cid:26) On
Off
if t mod d = 0 and v ∈ ∆Ft
Otherwise
Notice that due to the fact that we are assuming that v is in ∆Ft, its surrounding neighborhood contains at least one
tile with contamination status of On.
4
An interesting particular case of the general Ξ() function is the simple uniform probabilistic spread. In this scenario,
a tile in V ∈ ∆Ft becomes contaminated with some predefined probability p, if and only if at least one of its n-th
neighbors are contaminated at time step t. Using the Ξ() function and the probability p, this can be formalized as
follows :
For every tile v we first define Φn (v) where n equals to 1 and assuming 4-connectivity.
Ξ (v, φ, t) =(cid:26) On
Off
with probability of p if v ∈ ∆Ft
Otherwise
This model can naturally also be defined simply as :
In our work we will focus on this model, while deriving the analytic bounds for the cleaning time.
∀t ∈ N, ∀v ∈ ∆Ft, P rob (contt+1(v) = On) = p
V. LOWER BOUND
A. Direct Bound
In this section we form a lower bound on the cleaning time of any cleaning protocol preformed by k agents. We
start by setting a bound on the contaminated region's size at each time step, St. As we are interested in minimizing
the cleaning time we should also minimize the contaminated region's area. Therefore we are interested in the minimal
size of it, which achieved when the region's shape is sphere [2]. In our model each tile in the potential boundary, ∆Ft,
has the same probability p to be contaminated in the next time step. The whole probabilistic process in each time
step is Binomial Distributed, under the assumption that the spreading of each tile at any time step is independent
from the spreadings of other tiles or from the spreadings of the same tile at different time steps.
As we are interested in the lower bound of the contaminated region's size we will assume that the expected number
of newly added tiles to the contaminated region is minimal, which occurs when the region's shape forms a digital
sphere (as presented in [36]). Then we can compute the expectation of this process for a specific time step t. Therefore,
the size of the potential boundary is ∆Ft = 2√2 · St − 1 as shown in [36, 37].
Definition 8. Let us denote by Xt the random variable of the actual number of added tiles to the contaminated region
at time step t.
Assuming the independence of tiles' contamination spreadings and given St, Xt is Binomial Distributed, XtSt ∼
B (∆Ft, p), where each tile in the potential boundary has the same probability p to be contaminated. Therefore, we
can say that the expectation of Xt given St is µ = E (XtSt) = p · ∆Ft.
Notice that occasionally the number of new tiles added to the contaminated region may be below µ. As we are
interested in a lower bound, we should take some µ′ < µ such that: P r[Xt < µ′St] < ǫ, meaning that the probability
that the number of the newly added tiles to the contaminated region is smaller than µ′ is extremely small (tends to
0).
In order to bound Xt by some µ′ we shall use the Chernoff Bound , where δ is the desired distance from the
expectation, as follows :
P r [Xt < (1 − δ)µSt] < e−
δ2µ
2
Definition 9. Let us denote by qt the probability that at time step t, the size of the added tiles to the contaminated
region is not lower than µ′ = (1 − δ)µ and it can be written as follows :
qt = (1 − P r [Xt < (1 − δ)µSt])
Theorem 1. Using any cleaning protocol, the area of the contaminated region at time step t can be recursively lower
bounded, as follows :
P rhSt+1 ≥ St − k +j2 · (1 − δ) p ·p2 · (St − k) − 1kSti ≥ qt
Proof. Notice that a lower bound for the contaminated region's size can be obtained by assuming that the agents are
working with maximal efficiency, meaning that each time step every agent cleans exactly one tile.
In each step, the agents clean another portion of k tiles, but the remaining contaminated tiles spread their contam-
ination to their 4−N eighbors and cause new tiles to be contaminated.
Definition 8 we can express St+1 as follows :
Lets us denote by the random variable St+1 the number of contaminated tiles in the next time step. Using
St+1 = St − k + Xt
5
Lets first bound the number of the added tiles using the Chernoff Bound . As Xt given St is Binomial Distributed,
XtSt ∼ B (∆Ft, p) and µ = E (XtSt) = p · ∆Ft. Using Chernoff Bound we know that:
2 ⇒ P r [Xt < (1 − δ)p · ∆FtSt] < e−
P r [Xt < (1 − δ)µSt] < e−
δ2 ·p·∆Ft
δ2 µ
2
Assigning Xt = St+1 − St + k from former definition of St+1, we get:
P r [St+1 − St + k < (1 − δ)p · ∆FtSt] < e−
δ2 ·p·∆Ft
2
As we are interested in the minimal number of tiles which can become contaminated at this stage. The minimal
number of 4− N eighbors of any number of tiles is achieved when the tiles are organized in the shape of a "digital
sphere" (see [36, 37]) - i.e. the potential boundary is ∆Ft = 2p2 · (St − k) − 1. Assigning ∆Ft value:
δ2 ·p·2√2·(St −k)−1
P rhSt+1 < St − k + (1 − δ)p · 2p2 · (St − k) − 1Sti < e−
2
As we are interested in the complementary event and using Definition 9
P rhSt+1 ≥ St − k + (1 − δ)p · 2p2 · (St − k) − 1Sti ≥ 1 − e−
As the number of tiles must be an integer value, we use (cid:4)(1 − δ) · p · 2√2 · St − 1(cid:5) to be on the safe side. Using
inequality 1 we get :
δ2 ·p·2√2·(St −k)−1
2
= qt
(1)
P rhSt+1 ≥ St − k +j2 · (1 − δ) p ·p2 · (St − k) − 1kSti ≥ qt
Notice that as illustrated in Figure 1(a), which demonstrates the bound presented in Theorem 1, as δ decreases the
produced bound for the stochastic model is closer to the bound of the deterministic model, for d = 1
p .
Definition 10. Let us denote by Qt the bound probability that the contaminated region's size at time step t will be
[at least] St. Qt can be expressed as follows :
Qt =
qi
t
Yi=0
Notice that for bounding the area of the region at time step t using Theorem 1 and Definition 10, the bound, which
will be achieved, will be in probability Qt. We want to have Qt sufficiently high.
We shall assume, for the sake of analysis, that the dynamic value of the area, St, is always kept not less than some
holds :
S < S0 − k +j2 · (1 − δ) p ·p2 · (S0 − k) − 1k (as we want S1 to be bigger or equal to S). Then the next Lemma
Lemma 1. For any T ≥ 1, if for all 1 ≤ t ≤ T the contaminated region's size St is always kept not less than some
S < S0 − k +j2 · (1 − δ) p ·p2 · (S0 − k) − 1k then :
Proof. We will prove this Lemma by induction on T.
QT ≥ QT = qT =(cid:16)1 − e−δ2
T
·p·2√2·( S−k)−1(cid:17)
6
δ = 0.01
δ = 0.1
δ = 0.2
δ = 0.3
δ = 0.5
d = 3
Qt ≈ 0.0001
Qt = 0.0058
Qt = 0.9167
Qt = 1
Qt ≈ 0
50
100
150
200
250
300
350
400
450
t
x 104
2
1.8
1.6
1.4
1.2
t
S
1
0.8
0.6
0.4
0.2
0
0
(a)A lower bound for the contaminated region St, the area at time t,
for various values of δ
x 104
2
1.8
1.6
1.4
1.2
t
S
1
0.8
0.6
0.4
0.2
0
0
k=150
k=160
k=170
k=180
k=190
Qt = 0.9958
Qt = 0.9952
Qt = 0.9960
Qt = 0.9963
Qt = 0.9967
100
200
300
t
400
500
600
(b)A lower bound for the contaminated region St, the area at time t,
for various number of agents k
FIG. 1: An illustration of the bound presented in Theorem 1. In (a) we can see the deterministic model (the Zig-Zag line)
with spread each 3 time steps (d = 3) compare to the stochastic model with p = 1/3 and δ ∈ [0.01, 0.1, 0.2, 0.3, 0.5] where both
models have k = 150 and start with S0 = 20000. In (b) we have the lower bound for S0 = 20000, p = 0.5 and δ = 0.3 for
different number of agents k ∈ [150, 160, 170, 180, 190].
• Base step: For T = 1, we can write the probabilities Q1 and Q1 as follows :
Q1 = q1 ≥ 1 − e−δ2
·p·2√2·(S1−k)−1
As we assume that St ≥ S than it is not hard to see that Q1 ≥ Q1.
Q1 = q ≥ 1 − e−δ2
·p·2√2·( S−k)−1
• Induction hypothesis: We assume that for all T ≤ T ′ holds QT ≥ QT .
• Induction step: We will prove that for T = T ′ + 1 holds QT ≥ QT . From definition 10 we can write the
probability QT as follows :
By the induction hypothesis we know that for all T ≤ T ′ holds QT ≥ QT than we can rewrite QT ′+1 and also
writing QT for T = T ′ + 1 we get that :
QT = QT ′+1 = QT ′ · qT ′+1
7
QT = QT ′+1 ≥ QT ′ · qT ′+1
QT = QT ′+1 = QT ′ · q
As we want to compare these probabilities and to prove that QT ≥ QT all we need to show is that qT ′+1 ≥ q.
As we assume that for all 1 ≤ t ≤ T ′ + 1 holds that St ≥ S and particularly for t = T ′ + 1, than it is not hard
to see that qT ′+1 ≥ q and therefore QT ≥ QT .
Theorem 2. For any contaminated region of size S0, using any cleaning protocol, the probability that S τδ , the
contaminated area at time step t = τδ, is greater or equal to some S < S0 − k +j2 · (1 − δ) p ·p2 · (S0 − k) − 1k can
be lower bounded, as follows :
P rhS τδ ≥ Si ≥(cid:16)1 − e−δ2
τδ , r ·(cid:16) S − k − 1
2(cid:17) −q ·(cid:0)S0 − k − 1
τδ
·p·2√2·( S−k)−1(cid:17)
2(cid:1) + ln q·( S−k− 1
q·(S0−k− 1
k
2
2
2 )− k
2 )− k
2!
where :
and
, 2(1 − δ)2 · p2
Proof. Observe that by denoting yt , St Theorem 1 can be written as :
Searching for the minimal area we can look at the equation :
yt+1 − yt ≥j2 · (1 − δ) · pp2 · (yt − k) − 1k − k
yt+1 − yt =j2 · (1 − δ) · pp2 · (yt − k) − 1k − k
By dividing both sides by ∆t = 1 we obtain :
yt+1 − yt , y′ =$s(1 − δ)2 · p2 · 8(cid:20)y −(cid:18)k +
1
2(cid:19)(cid:21)% − k
(2)
Notice that the values of y′, the derivative of the change in the region's size, might be positive (stating an increase
in the area), negative (stating a decrease in the area), or complex numbers (stating that the area is smaller than k,
and will therefore be cleaned before the next time step).
Let us denote x2 , (1 − δ)2 · p2 · 8(cid:2)y −(cid:0)k + 1
we see that :
2(cid:1)(cid:3). After calculating the derivative of both sides of this expression
2x · x′ = (1 − δ)2 · p2 · 8y′
and after using the definition of y′ of Equation 2 we see that :
dx
dt
2x ·
= 2x · x′ = (1 − δ)2 · p2 · 8 $s(1 − δ)2 · p2 · 8(cid:20)y −(cid:18)k +
1
2(cid:19)(cid:21)% − k!
From Equation 3 a definition of dt can be extracted :
≤ (1 − δ)2 · p2 · 8 (x − k)
8
(3)
dt ≥
≥
1
8 · (1 − δ)2 · p2 ·
4(1 − δ)2 · p2 ·
1
dx
2x
x − k
x − k + k
x − k
dx ≥
1
4(1 − δ)2 · p2 (cid:18)1 +
k
x − k(cid:19) dx
The value of x can be achieved by integrating the previous expression as follows (notice that we are interested in
the equality of the two expressions) :
After the integration we can see that :
Z t
t0
dt =Z x
and after assigning t0 = 0 :
=
t
t0
i(cid:12)(cid:12)(cid:12)(cid:12)
1
k
x0
x − k(cid:19) dx
4(1 − δ)2 · p2 (cid:18)1 +
4(1 − δ)2 · p2 (x + k ln (x − k))(cid:12)(cid:12)(cid:12)(cid:12)
x0
1
x
4(1 − δ)2 · p2 · t = x − x0 + k ln
x − k
x0 − k
Returning back to y and using definition we get :
· t =s(cid:18)y − k −
1
2(cid:19) −s(cid:18)y0 − k −
Returning to the original size variable St, we see that :
1
2(cid:19) + ln
q(cid:0)y − k − 1
q(cid:0)y0 − k − 1
2(cid:1) − k
2(cid:1) − k
2
2
k
2
· t =s(cid:18)St − k −
1
2(cid:19) −s(cid:18)S0 − k −
1
2(cid:19) + ln
q(cid:0)St − k − 1
q(cid:0)S0 − k − 1
2(cid:1) − k
2(cid:1) − k
2
2
k
2
(4)
Defining that τδ = t and combining EQ. 4 with Lemma 1 knowing that St′ ≥ S for all 1 ≤ t′ ≤ τδ we get the
following inequality:
where :
and
P rhS τδ ≥ Si ≥(cid:16)1 − e−δ2
τδ , r ·(cid:16) S − k − 1
2(cid:17) −q ·(cid:0)S0 − k − 1
τδ
·p·2√2·( S−k)−1(cid:17)
2(cid:1) + ln q·( S−k−
q·(S0−k− 1
1
k
2
k
2
2 )−
2 )− k
2!
, 2(1 − δ)2 · p2
800
700
600
500
t
400
300
200
100
0
0
9
± = 0.27
± = 0.3
± = 0.4
± = 0.5
± = 0.6
± = 0.7
0.5
1
S
1.5
2
x 104
(a)The bound on t for various values of δ as a function of S
600
500
400
t
300
200
100
0
0
k = 150
k = 160
k = 170
k = 180
k = 190
0.5
1
S
1.5
2
x 104
(b)The bound on t for various number of agents k as a function of S
FIG. 2: An illustration of the bound presented in Theorem 2 of the cleaning time t in order to reach S. In (a) we can see
the bound on the cleaning time where p = 0.5 and δ ∈ [0.27, 0.3, 0.4, 0.5, 0.6, 0.7] where the cleaning done by k = 150 agents
and starting with S0 = 20000. In (b) we have the lower bound on the cleaning time for S0 = 20000, p = 0.5 and δ = 0.3 for
different number of agents k ∈ [150, 160, 170, 180, 190].
In Theorem 2 we can guarantee with high probability of Qτδ that the contamination region's size will not be lower
than S - namely for any time step t > τδ the probability P r[St ≥ S] is getting lower and therefore the probability
that the agents will succeed in cleaning the contaminated area is increasing. We are showing that by choosing small
enough S so we know that the agents will succeed in cleaning the rest of the 'dirty' region, we will be able to guarantee
with high probability the whole cleaning of the 'dirty' region. For example, choosing S to be in o(k) will assure that
for St ≤ S ≤ c · k for some small constant c, the rest of the contaminated region will be cleaned in at most c time
steps by the k cleaning agents.
An illustration of the bound on the cleaning time, as presented in Theorem 2, is shown in Figure 2 and the
10
1
0.9
0.8
0.7
0.6
t
Q
0.5
0.4
0.3
0.2
0.1
0
0
δ = 0.4
δ = 0.3
δ = 0.25
δ = 0.2
0.5
1
S
1.5
2
x 104
(a)The bound probability Qt as a function of S for various δ values
1
0.9
0.8
0.7
0.6
t
Q
0.5
0.4
0.3
0.2
0.1
0
0
p = 0.6
p = 0.5
p = 0.4
p = 0.3
p = 0.2
0.2
0.4
0.6
0.8
1
S
1.2
1.4
1.6
1.8
2
x 104
(b)The bound probability Qt as a function of S for various p values
FIG. 3: An illustration of the probability produced by the bound presented in Theorem 2.
In (a) we can see the bound
probability Qt for initial region's size S0 = 20000, spreading probability p = 0.5 and number of agents k = 150 for the following
of values of δ ∈ [0.4, 0.3, 0.25, 0.2]. In (b) we can see Qt for S0 = 20000, δ = 0.3 and k = 150 for the following of values of
p ∈ [0.6, 0.5, 0.4, 0.3]
corresponding bound probability in Figure 3. Notice that as S and δ increase the cleaning time decreases.
B. Using The Bound
In Theorem 2 we presented a bound which guarantees that the contaminated region's size will not be smaller than
some predefined size S with the bound probability, Qt. We suggest a method which make this bound useful when
one willing to be guaranteed of successfully cleaning of the contaminated area with some desired probability Qt in a
11
certain model, where the initial contaminated region's size is S0, each one of the tiles in the surrounding neighborhood
of the contaminated area has a probability p to be contaminated by each one of its neighbors's contamination spreads
and with k cleaning agents.
Notice that the only free variables left in the bound are the analysis parameters δ and S. We should also notice
the fact that as δ decreases the "usefulness" of the bound decreases (see Figure 3) because when δ is closer to 0, the
model tern to the deterministic variant of the cooperative cleaning problem. In this variant of the problem the bound,
as presented in Theorem 2, will "predict" that the contamination will spread exactly by the potential boundary mean
in every step (as shown in V A). Furthermore, as δ increases, although the "usefulness" of the bound increases, the
predicted bound is the naive one, where at each step there are no spreads and all the k agents clean perfectly - i.e.
the size of the contaminated region at time step t will be exactly St = S0 − t · k (which can be guaranteed in high
probability).
We suggest the following method, in order to eliminate the need to identify the analysis parameters. Once someone
willing to use this bound he should provide the desired bound probability - Qt and the parameter of the model. Then
for each value of δ in the range of [0, 1] he should find the corresponding value of the minimal S which satisfies the
inequality P rhSt ≥ Si ≥ Qt as illustrated in Figure 4. As δ ∈ R - i.e. a real number, once using this method we
should choose the granularity of δ for which calculate the appropriate S.
Notice that there can be exists some minimal value of δ = δM IN , where for any value of δ < δM IN there is no
solution for the bound inequality. Also notice that there can be exists some maximal value of δ = δM AX , where for
any value of δ > δM IN the corresponding S is the same as for δM AX .
Furthermore, for each pair of values of δ and S there exists its corresponding cleaning precess of k agents with initial
region's size S0 as demonstrated in Figure 4(b). Each curve bounds the cleaning process from S0 to the applicable S.
As we are interested in finding the tightest bound, looking at the frontier of the bounds, as shown in Figure 4(b), we
can combine the relevant curves to one comprehensive bound. This bounds integrates the bound for a specific range
of j values of δ ∈(cid:2)δi1 , δi2 , ..., δij(cid:3), where for each time step t we choose the maximal St as illustrated in Figure 5(a).
Notice that the combined bound is independent of the selection of values for analysis parameters δ and s. Also we
can notice that this bound limits the contaminated region's size to some minimal SM IN where we almost certain that
the agents will succeed in terminating the cleaning process successfully.
Notice that the inequality in Theorem 2 bounds the probability that the contaminated region's size at time step t
will not be smaller than S , therefore, an increase in the spreadings probability causes to an increase in the expected
contaminated region's size and thus increases the probability (q)t (as demonstrated in Figure 3(b)).
Notice that as illustrated in Figure 5(b), as the number of agents increases the probabilistic and the deterministic
bounds are more similar. This result is not surprising considering the method we presented. In our method, in order
to make the bound tighter, we favor the lower values of δ. As the number of agents increases the bound can be
guaranteed in the desired probability with lower values of δ and as δ decreases the model becomes more similar to
the deterministic one.
C. Parameters Selection
One of the problems of the bound as brought in Section V A is the nature of the probabilistic bounds to decay
to 0 (as shown in Figure 3), which caused due to the fact that the bound probability Qt is a product of each step's
probability, qt, and because as t increase Qt decreases. One of the reasons which explains this problem is a bad
in the bound for the cleaning time (Eq. 4 a selection of too small S will lead to fast
selection of parameters - e.g.
decay in the probability. Furthermore, there exist trade-offs, when selecting the parameters' values, between the
bound results and the the probability which guarantees its likelihood (e.g. see Figure 7).
One way to avoid this problem is by selecting S as big as possible, as in Figures 3and 7. As S increases the
probability of each time step, qt, increases and so the total probability Qt. Another technique for eliminating this
problem is by "wrapping" number of time steps into one, thus artificially decreasing the time and therefore decreasing
the power of qt in Qt (in Lemma 1).
Another example of the trade-off in choosing the parameters can be shown in Figure 3(b) where Qt is illustrated
for various values of the probability p. Interestingly, as p decreases our confidence in the bound result is decreasing
although we know that the the agents preforming the cleaning protocol have a better chance to successfully complete
their work.
12
Qt = 0.95
Qt = 0.90
Qt = 0.85
18000
16000
14000
12000
10000
8000
6000
4000
2000
S
0
0.2
0.3
0.4
0.5
0.7
0.8
0.9
1
0.6
δ
(a) S as a function of δ for various bound probability Qt values
x 104
2
1.8
1.6
1.4
1.2
t
S
1
0.8
0.6
0.4
0.2
0
0
100
200
300
t
400
500
600
(b)The region's size St for various values of < Qt, S > pairs
FIG. 4: Figure (a) is an illustration of S as a function of δ using the bound presented in Theorem 2 for the following model
parameters -- S0 = 20000, p = 0.1 and k = 50 for various values of Qt. Figure (b) is an illustration of the cleaning process for
various pairs of values of S and δ as shown in Figure (a) for the same model parameters with Qt = 0.95.
VI.
IMPOSSIBILITY RESULT
While the theoretical lower bound presented in Section V can decrease the uncertainty whether a solution for the
cleaning problem with certain number of agents exists, one might be interested in the opposite question, namely -- how
can we guarantee that a group of agents will not be able to successfully accomplish the cleaning work (regardless of
the cleaning protocol being used or the contaminated region's properties e.g. its shape and spreading probability). A
first impossibility result for the deterministic case of the Cooperative Cleaners problem was published in [24]), where
an initial size that is impossible to clean (using any protocol) was demonstrated. In this paper, we extend this result
in order to be applicable for stochastically expending domains as well. Consequently, we will set the impossibility
13
x 104
2
1.8
1.6
1.4
1.2
t
S
1
S0/k
Qt = 0.85
Qt = 0.90
Qt = 0.95
Deterministic(d = 10)
0.8
0.6
0.4
0.2
0
0
100
200
300
400
500
t
600
700
800
900
1000
(a)The combined bounds for various values of the bound probability
Qt
b
o
r
p
t
t
s
d
t
1.15
1.1
1.05
1
0.95
0.9
0.85
0.8
0.75
0.7
0.65
50
100
150
200
250
300
350
400
450
500
k
(b)The ratio between the bounds as function of the number of agents k
FIG. 5: Figure (a) An illustration of the combined bound for the bounds as shown in Figures 4(a) and 4(b) for the same model
parameters -- S0 = 20000, p = 0.1 and k = 50 for various values of Qt compared to the deterministic model with d = 10 and
to the naive bound S0/k. Figure (b) compare the deterministic bound and the probabilistic bound as a function of the desired
guaranteeing probability - Qt for various contaminated region's sizes and number of cleaning agents.
result with probabilistic restrictions as follows :
Theorem 3. Using any cleaning protocol, k agents cleaning a contaminated region , where each tile in the potential
boundary may be contaminate by already contaminated neighboring tiles with some probability p in each time step,
will not be able to cleat this contaminated region if :
S0 >(cid:22) k2
8 · p2 + k +
1
2(cid:23)
14
k = 50
k = 70
k = 90
k = 110
k = 130
k = 150
k = 170
k = 190
0.2
0.4
0.6
0.8
1
Qt
b
o
r
p
t
t
e
d
t
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
(a)The ratio between the bounds as function of the bound probability
Qt for various number of agents k
b
o
r
p
t
t
s
d
t
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
s0 = 5000
s0 = 8000
s0 = 11000
s0 = 14000
s0 = 17000
s0 = 20000
0.2
0.4
0.6
0.8
1
Qt
(b)The ratio between the bounds as function of the bound probability
Qt for various values of initial region's size S0
FIG. 6:
guaranteeing probability - Qt for various contaminated region's sizes and number of cleaning agents.
Figures (b) and (a) compare the deterministic bound and the probabilistic bound as a function of the desired
with the probability Qt for any time step t - i.e. :
∀tP r [St ≥ S0] = Qt
Proof. Firstly, we shell require that the contaminated region's size increases between each time step, guaranteeing us
that the contaminated region's size will keep on growing, and thus impossible to be cleaned. Therefore we want that
in each time step t the size of the contaminated region will be bigger than the previous one - i.e. :
St+1 − St > 0
15
p = 0.4
p = 0.3
p = 0.2
p = 0.1
0.2
0.4
0.6
0.8
1
δ
1
0.9
0.8
0.7
0.6
t
Q
0.5
0.4
0.3
0.2
0.1
0
0
(a)The bound probability Qt as a function of δ for various p values
1
0.9
0.8
0.7
0.6
t
Q
0.5
0.4
0.3
0.2
0.1
0
0
k = 150
k = 250
k = 350
k = 450
k = 550
k = 650
0.2
0.4
0.6
0.8
1
δ
(b)The bound probability Qt as a function of δ for various numbers of
agents
FIG. 7: Parameters selection. In (a) we can see Qt for S0 = 20000 and k = 150 for the following of values of p ∈ [0.4, 0.3, 0.2, 0.1].
In (b) we can see Qt for S0 = 20000 and p = 0.4 for the following of values of k ∈ [150, 250, 350, 450, 550, 650]
Using Theorem 1 we know that :
and therefore we shell require that :
St+1 ≥ St − k +j2 · (1 − δ) p ·p2 · (St − k) − 1k
j2 · (1 − δ) p ·p2 · (St − k) − 1k − k > 0
16
Choosing, without loss of generality, t = 0 and after some arithmetics, we see that :
S0 >$
k2
8 (1 − δ)2 p2
+ k +
1
2%
As S0 as a function of δ is monotonically increasing and tends to infinity as δ tends to 1, we can lower bound S0 with
δ = 0, therefore :
We would like this process to continue for t time steps, thus applying the same method for all time steps and using
Def. 10, we get that :
S0 >(cid:22) k2
8 · p2 + k +
1
2(cid:23)
(5)
.
∀tP r [St ≥ S0] = Qt
Notice that Theorem 3 produces two results - the first one is the minimal initial region's size S0 which guarantees
that the cleaning agents will not be able to successfully accomplish the cleaning process and second one is the
corresponding probability Qt in which this S0 can be guaranteed. Also notice that in order to evaluate Qt, one should
use the appropriate S0 and δ.
Interestingly, the results demonstrated in Figure. 8 of the impossibility result as presented in Theorem 3, as the
number of cleaning agents increases the probability which we can guarantee the minimal initial region's size S0 also
increases - in other words, although as the number of agents increases, the corresponding minimal initial region's size
also increases and the probability in which we can guarantee that the agents will not be able to successfully clean the
region increases as well.
VII. EXPERIMENTAL RESULTS
In previous work [2] a cleaning protocol for a group of K agents collaboratively cleaning an expending region was
developed, called SWEEP . The performance of the algorithm was analyzed in [2], both analytically and experimen-
tally. We had implemented the algorithm for a revised environment - where stochastic changes take place, as defined
throughout this paper. We have conducted an extensive observational analysis of the performance of this algorithm.
Exhaustive simulations were carried out, examining the cleaning activity of the protocol for various combinations of
parameters -- namely, number of agents, spreading probability (or spreading time in the deterministic model) and
geometric features of the contaminated region. All the results were averaged over at least 1000 deferent runnings
in order to get a statistical significance. In the deterministic model we average the results over the all the possible
starting positions of the agents. Notice that, in order to minimize the running time, all running were stopped after
some significant time and we consider these runnings as failure -- i.e. these results are not included in the average
calculation and not counted in the success percentage.
Some of the experimental results are presented in Figure 9 comparing the probabilistic model and the deterministic
model over three deferent shapes (circle, square and cross) with range of number of agents. Notice the interesting
phenomenon, where adding more agents may cause to an increase in the cleaning time due to the delay caused by the
agents synchronization in the SWEEP protocol.
VIII. CONCLUSIONS
In this work we set the foundations of the stochastic model for the Cooperative Cleaning problem and introduce, for
the first time, the basic definitions describe this problem. We present two lower bounds on the contaminated region's
size and on the cleaning time under the limitation of this probabilistic model and demonstrate an impossibility result
on the number of agents which are essential for a successful completion cleaning a contaminated region.
One of the ways these results could be further enhanced would involve analyzing the transition process between
several possible "states" of the system, as a Markov process. Once analyzing the process as a Markov's Chain, we
can get the stationary distribution of the process i.e. the probability to get to each one of the ending states (totally
clean or impossible to clean).
x 105
4
3.5
3
2.5
0
S
2
1.5
1
0.5
0
0
17
p = 0.1
p = 0.2
p = 0.3
p = 0.4
10
20
30
k
40
50
60
(a)The minimal initial region's size S0 as a function of the number of
agents k for various probabilities.
1
0.9
0.8
0.7
0.6
t
Q
0.5
0.4
0.3
0.2
0.1
0
0
p = 0.1
p = 0.2
p = 0.3
p = 0.4
10
20
30
k
40
50
60
(b)The guaranteed probability Qt as a function of the number of
agents k for various probabilities.
FIG. 8: An illustration of the impossibility result as presented in Theorem 3. In (a) we can see the minimal initial region's
size S0 for number of agents k = [1..60] and spreading probability p = [0.1, 0.2, 0.3, 0.4]. In (b) we can see the corresponding
probability Qt.
It is also interesting to mention the similarity of this work to recent works done in the field of influence models in
social networks. For example, in [38] the authors demonstrate that a probabilistic local rule can efficiently simulate
the spread of ideas in a social network. Combining this result with our work can generate a unique approach for
18
p = 0.02
p = 0.02
p = 0.02
d = 50
d = 50
d = 50
1800
1600
1400
1200
1000
800
600
400
200
S
S
E
C
C
U
S
t
0
10
20
30
50
60
70
40
k
(a)Average TSU CCESS as a function of the number of agents k
100
90
80
70
60
50
40
30
20
10
)
%
(
e
g
a
t
n
e
c
r
e
P
p = 0.02
p = 0.02
p = 0.02
0
10
20
30
50
60
70
40
k
(b)Success percentage as a function of the number of agents k
FIG. 9: Experimental results for various number of agents for spheric and squared contaminated region with starting size
S0 = 500 and with spreading probability of p = 0.02 (notice that all the running were stopped after 3000 time steps). In (a)
can see the results compared to the deterministic model results (with d = 1
p and in (b) the success percentage
analyzing dynamics of information flow in social networks.
[1] Y. Altshuler, A. Bruckstein, and I. Wagner, in IEEE Swarm Intelligence Symposium (2005), pp. 209 -- 216.
[2] Y. Altshuler, I. Wagner, V. Yanovski, and A. Bruckstein, International Journal of Robotics Research (2010).
[3] V. Braitenberg, Vehicles (MIT Press, 1984).
[4] I. A. Wagner, Y. Altshuler, V. Yanovski, and A. M. Bruckstein, Int. J. Rob. Res. 27, 127 (2008), ISSN 0278-3649.
[5] S. Mastellone, D. Stipanovi, C. Graunke, K. Intlekofer, and M. Spong, The International Journal of Robotics Research 27,
19
107 (2008).
[6] S. DeLoach and M. Kumar, Intelligence Integration in Distributed Knowledge Management (Idea Group Inc (IGI), 2008),
chap. Multi-Agent Systems Engineering: An Overview and Case Study, pp. 207 -- 224.
[7] G. Chalkiadakis, E. Markakis, and C. Boutilier, in AAMAS '07: Proceedings of the 6th international joint conference on
Autonomous agents and multiagent systems (ACM, New York, NY, USA, 2007), pp. 1 -- 8.
[8] I. Wagner, M. Lindenbaum, and A. Bruckstein, Annals of Mathematics and Artificial Intelligence 24, 211 (1998).
[9] R. Arkin and T. Balch, AI and Mobile Robots (1998).
[10] I. Wagner and A. Bruckstein, Annals of Mathematics and Artificial Intelligence, Special Issue on Ant Robotics 31, 1
(2001).
[11] I. Rekleitisy, V. Lee-Shuey, A. P. Newz, and H. Choset, in IEEE Intl. Conf. on Robotics and Automation (2004).
[12] Z. Butler, A. Rizzi, and R. Hollis, in Proceedings of the Workshop on the Algorithmic Foundations of Robotics (2001).
[13] E. Acar, Y. Zhang, H. Choset, M. Schervish, A. Costa, R. Melamud, D. Lean, and A. Gravelin, in International Conference
on Field and Service Robotics (2001), pp. 161 -- 168.
[14] M. Batalin and G. Sukhatme, in 6th International Symposium on Distributed Autonomous Robotics Systems (2002).
[15] J. Svennebring and S. Koenig, Autonomous Robots 16, 313 (2004).
[16] S. Koenig and Y. Liu, in AGENTS'01 (2001).
[17] X. Zheng and S. Koenig, in In Proc. of the IEEE Intl. Conf. on Intelligent Robots and Sys. (IROS) (2007), pp. 3757 -- 3764.
[18] S. B. Thrun., Technical Report, Carnegie Mellon University (1992).
[19] G. Dudek, M. Jenkin, E. Milios, and D. Wilkes, IEEE Transactions on Robotics and Automation 7, 859 (1991).
[20] W. Kerr and D. Spears, in Intelligent Robots and Systems (IROS 2005) (2005), pp. 2905 -- 2910.
[21] M. Polycarpou, Y. Yang, and K. Passino, in IEEE International Symposium on Intelligent Control (2001), pp. 1 -- 6.
[22] K. Passino, M. Polycarpou, D. Jacques, M. Pachter, Y. Liu, Y. Yang, M. Flint, and M. Baum, Cooperative Control for
Autonomous Air Vehicles (Kluwer Academic, Boston, 2002), chap. Cooperative Control and Optimization.
[23] R. Bejar, B. Krishnamachari, C. Gomes, and B. Selman, in Proceedings of the IJCAI-01 Workshop on Distributed Constraint
Reasoning (2001).
[24] Y. Altshuler and A. Bruckstein, Theor. Comput. Sci. 412, 4661 (2011).
[25] T. Min and H. Yin, in IEEE/RSJ International Conference on Intelligent Robots and Systems (1998), pp. 380 -- 385.
[26] S. Koenig, M. Likhachev, and X. Sun, in AAMAS '07: Proceedings of the 6th international joint conference on Autonomous
agents and multiagent systems (ACM, New York, NY, USA, 2007), pp. 1 -- 8, ISBN 978-81-904262-7-5.
[27] R. Borie, C. Tovey, and S. Koenig, In Proc. of the Intl. Joint Conf. on AI (IJCAI) pp. 59 -- 66 (2009).
[28] Y. Altshuler, V. Yanovsky, A. Bruckstein, and I. Wagner, ROBOTICA 26, 551 (2008).
[29] Y. Altshuler, V. Yanovski, I. Wagner, and A. Bruckstein, in Second International Conference on Informatics in Control,
Automation and Robotics (ICINCO), the First International Workshop on Multi-Agent Robotic Systems (MARS) (2005),
pp. 165 -- 170.
[30] R. Isaacs, Differential Games: A Mathematical Theory with Applications to Warfare and Pursuit, Control and Optimization
(John Wiley and Sons, Reprinted by Dover Publications 1999, 1965).
[31] L. Alonso, A. S. Goldstein, and E. M. Reingold, Research Report RR-1700, INRIA (1992), Projet PSYCHO ERGO.
[32] V. Isler, S. Kannan, and S. Khanna, SIAM Journal of Discrete Mathematics 20, 26 (2006).
[33] A. Goldstein and E. Reingold, Theoretical Computer Science 143, 93 (1995).
[34] J. Flynn, SIAM Journal of Control 12, 581 (1974).
[35] F. Berger, A. Gilbers, A. Grne,
and R. Klein, Algorithms 2,
ISSN 1999-4893, URL
1069
(2009),
http://www.mdpi.com/1999-4893/2/3/1069.
[36] Y. Altshuler, V. Yanovski, D. Vainsencher, I. Wagner, and A. Bruckstein, in The 13th International Conference on Discrete
Geometry for Computer Imagery (DGCI2006) (2006), pp. 17 -- 28.
[37] D. Vainsencher and A. Bruckstein, Theor. Comput. Sci. 406, 146 (2008), ISSN 0304-3975.
[38] W. Pan, N. Aharony, and A. Pentland, in Proceedings of the 25th Conference on Artificial Intelligence (AAAI) (2011), pp.
821 -- 827.
|
1708.03080 | 2 | 1708 | 2017-08-13T23:52:53 | A Simple and Realistic Pedestrian Model for Crowd Simulation and Application | [
"cs.MA",
"cs.AI",
"nlin.CG"
] | The simulation of pedestrian crowd that reflects reality is a major challenge for researches. Several crowd simulation models have been proposed such as cellular automata model, agent-based model, fluid dynamic model, etc. It is important to note that agent-based model is able, over others approaches, to provide a natural description of the system and then to capture complex human behaviors. In this paper, we propose a multi-agent simulation model in which pedestrian positions are updated at discrete time intervals. It takes into account the major normal conditions of a simple pedestrian situated in a crowd such as preferences, realistic perception of environment, etc. Our objective is to simulate the pedestrian crowd realistically towards a simulation of believable pedestrian behaviors. Typical pedestrian phenomena, including the unidirectional and bidirectional movement in a corridor as well as the flow through bottleneck, are simulated. The conducted simulations show that our model is able to produce realistic pedestrian behaviors. The obtained fundamental diagram and flow rate at bottleneck agree very well with classic conclusions and empirical study results. It is hoped that the idea of this study may be helpful in promoting the modeling and simulation of pedestrian crowd in a simple way. | cs.MA | cs |
1
A Simple and Realistic Pedestrian Model
for Crowd Simulation and Application
Wonho Kang and Youngnam Han
Abstract-The simulation of pedestrian crowd that reflects reality is a major challenge for researches. Several crowd simulation
models have been proposed such as cellular automata model, agent-based model, fluid dynamic model, etc. It is important to note that
agent-based model is able, over others approaches, to provide a natural description of the system and then to capture complex human
behaviors.
In this paper, we propose a multi-agent simulation model in which pedestrian positions are updated at discrete time intervals. It takes
into account the major normal conditions of a simple pedestrian situated in a crowd such as preferences, realistic perception of
environment, etc. Our objective is to simulate the pedestrian crowd realistically towards a simulation of believable pedestrian behaviors.
Typical pedestrian phenomena, including the unidirectional and bidirectional movement in a corridor as well as the flow through
bottleneck, are simulated. The conducted simulations show that our model is able to produce realistic pedestrian behaviors. The
obtained fundamental diagram and flow rate at bottleneck agree very well with classic conclusions and empirical study results. It is
hoped that the idea of this study may be helpful in promoting the modeling and simulation of pedestrian crowd in a simple way.
Keywords-Microscopic multi-agent model, pedestrian crowd simulation, semicontinuous pedestrian model.
✦
1 INTRODUCTION
P EDESTRIAN crowd is a phenomenon that can be ob-
served in several situations such as in the street, in-
tersection, square, etc. A number of researchers have been
interested in studying this phenomenon. In fact, when the
density of the crowd is high, several accidents and dis-
asters could occur. More the crowd becomes dense, more
the situation is dangerous. Therefore, researchers face an
increasing challenge to find solutions that seriously improve
pedestrian management and safety during crowd. In such a
context, simulation is an appropriate tool. It could be really
interesting to be able to simulate pedestrian movements in
such environments.
For this purpose, several crowd simulation models have
been proposed. These models are generally classified into
two categories [1]: macroscopic models that include regres-
sion models and flow dynamic models, and microscopic
models including cellular automata models and agent-based
models. Each model can be specifically categorized into
continuous, discrete, and semicontinuous according to the
space and time of the system. The macroscopic approaches
simulate the behavior of the crowd as a whole and do
not consider individual features. However, the microscopic
approaches are interested in the behaviors, actions, and
decisions of each pedestrian as well as interactions with
others [2]. Therefore, the microscopic models allow us to
obtain more realistic results of simulation. This is why we
will focus only on microscopic models and more specifically
on agent-based models. In fact, the agent-based models are
able, over others approaches, to be flexible, to provide a
natural description of the system, and to capture complex
• W. Kang and Y. Han are with the Department of Electrical Engineering,
Korea Advanced Institute of Science and Technology (KAIST), Daejeon,
Korea, e-mail: {wonhoz, ynhan}@kaist.ac.kr.
Manuscript written August 9, 2014; released August 9, 2017.
human behaviors [3].
In this paper, a semicontinuous pedestrian model is
developed in which the space occupied by pedestrians is
continuously evolving, but time is measured by intervals.
It is worth noting that each pedestrian in the proposed
model is regarded as a self-adapted agent, and the move-
ment is implemented in a utility maximization approach
by considering various human factors. The model is able
to calculate normal pedestrian distributions in space and
pedestrian movements at normal step frequencies over time.
The goal of our work is to model realistic pedestrian crowd
by simulating realistic pedestrian behaviors. Face this chal-
lenge; we need to carefully study human nature such as
preferences, realistic perception of environment, etc. Rules
governing the selection of step size and moving direction
guarantee that the model can be used to accurately compute
the distance and speed of pedestrian movement. In the
model, pedestrians are not treated as particles, and the sizes
of their bodies are considered. The model is thus suitable
for simulating the movements of dense crowds.
The rest of our paper is as follows: section 2 describes
related works. In section 3, we propose our system model
which takes into account the various human nature factors.
Section 4 presents our simulations and a discussion of the
work. Finally, we conclude the paper and give perspectives
in section 5.
2 RELATED WORKS
There are several crowd simulation models which can be
classified into two categories: macroscopic models and mi-
croscopic models. Macroscopic approaches include regres-
sion models [4] and flow dynamic models [5], [6]. Micro-
scopic approaches include cellular automata models [7],
[8], [9] and agent-based models [3], [10], [11], [12], [13],
(cid:818) Environment Description
(cid:818) Agent Properties
Pedestrian Movement
Step Size
Direction
Walking
Probablity
(cid:818) Position Update
- Collision Avoidance
- Pedestrian Preference
2
probability, which are used to update the position of a
pedestrian. In the model, a rule of determining step size
and movement direction has been used to avoid pedestrian
overlapping each other, and the design of the pedestrian
behavior is based on the perception of the environment. This
combination has allowed us to obtain a simple and realistic
pedestrian model for crowd simulation. In our model, each
pedestrian is represented by an agent, who is required to
move step by step toward the goal while adjusting the step
size and moving direction according to the environment and
avoiding collisions with other pedestrians and obstacles.
The ith pedestrian agent at time t is characterized by:
Fig. 1. Architecture of system model in overview.
•
Step size: The actual step size of an agent is defined
as αli,t with step scale factor α and desired step size
[14]. The macroscopic approaches simulate the behavior
of the crowd as a whole. In fact, macroscopic models do
not consider individual features such as physical abilities,
direction of movement, and individual positioning [15]. This
causes a lack of realism. On the other hand, the microscopic
approaches are interested in the behaviors, actions, and
decisions of each pedestrian as well as interactions with
others [2]. Therefore, the microscopic models allow us to
obtain more realistic outputs of simulation. For this reason,
in our work, we adopt a microscopic approach. Among
the specific categories of the microscopic systems, we focus
on semicontinuous multi-agent model in which pedestrian
space is continuous, and pedestrian positions are updated
at discrete time intervals. In the following, we describe the
major microscopic models.
2.1 Cellular Automata Model
A cellular automaton [7], [8], [9] is a collection of cells on
a grid. Each cell contains a state chosen among a finite set
and can change over time. The pedestrian transitions from
one state to another consist firstly on the awareness of the
environment and secondly on the possibility to move to
the state of its neighboring cells. Finally, the transitions of
states are executed. The change of cell state is based on a
set of rules that are applied simultaneously to all grid cells,
producing a new generation of cells which depends entirely
on the previous generation.
Cellular automata model is a simple and fast implemen-
tation, but criticized for lacking realism. In fact, this model
limits the pedestrian spatial movement like a checkerboard.
Another limitation of cellular automata is the difficulty
to model changing pedestrian velocities and to simulate
heterogeneous pedestrian behaviors.
3 SYSTEM MODEL
Our system is based on a semicontinuous microscopic ap-
proach and particularly in a multi-agent architecture, in
which each pedestrian moves a certain step size in the
moving direction at each discrete time instant. The overview
of system architecture is displayed in Fig. 1. The description
on the environment and the properties of the agents are
required as inputs for the system. The pedestrian move-
ment is represented as step size, direction, and walking
• Direction: The possible moving direction is described
by θi,t + φ with direction shift factor φ and desired
of li,t ∼ N (cid:16)µl,i, σ2
l,i(cid:17).
direction of θi,t ∼ N (cid:16)µθ,i, σ2
θ,i(cid:17).
• Position: The environment of our system is indexed
by a Cartesian coordinate system as s = (x, y) , x, y ∈
R. Thus, a position is defined as the pair of coor-
dinates si,t = (xi,t, yi,t) in the Cartesian coordinate
system.
Each agent has its own autonomous behavior. Indeed, the
behavior of a pedestrian agent is divided into three phases:
strategic phase, tactical phase, and operational phase.
3.1 Strategic Phase
At each time step t, we consider that a pedestrian agent
moves through a given environment, which represents for
street, intersection, square, etc. Being in the environment,
the agent has to follow a well defined direction. The agent
objective is to move away by minimizing interactions with
other pedestrians and maximizing its utility. In other words,
the aim of each agent is to walk at the desired step size and
direction, minimizing time travel.
Strategic phase defines the global plan of a pedestrian
agent. In fact, the global plan is the set of step size and
moving direction that the pedestrian has to take in each time
interval. This set of step size and moving direction allows
the pedestrian agent to reach its final goal. At the present,
the strategic plan is given to each pedestrian agent in the
beginning of a simulation. In our work, we focus more on
the tactical and the operational phases as follows.
3.2 Tactical Phase
The tactical phase represents searches for possible positions
to move. These searches are taken at each instant t after the
global plan is set up. The searches taken are based on the
position update function, which is detailed in the following.
If the ith pedestrian determines moving direction θi,t, it
will try to move a step size li,t in that direction. Due to
other pedestrians or obstacles, there could be the case that
movement to the desired position seems to be difficult. For
this kind of cases, step scale factor α and direction shift
factor φ are needed to be considered. Here, the position
update function is formulated as
f (α, φ) = αli,t (sin (θi,t + φ) , cos (θi,t + φ)) wi,t
(1)
Candidate
Position
Desired
Position
Others /
Obstacles
ts ¢
,j
i ts +i t, 1, 1
s , 1, 1
, 1
i ts +
, 1
ijb>
,j ts
f
i tla
,
Wall
,i tq
i tS +
, 1
Next
Position
Current
Position
3
Next
Position
Others /
Obstacles
i ts (cid:14)
, 1
Candidate
Position
,j ts
ij(cid:92)
ijb
ij(cid:92)(cid:39)ijd
i tS (cid:14)
, 1
body
tS
rear
tS
Current
Position
,i ts
,i tl
,i ts
,i tl
Fig. 2. Pedestrian movement dynamics.
Fig. 3. Collision avoidance with other members in the crowd.
where the walking state factor wi,t is defined as
wi,t =(1, with pwalk
0, with 1 − pwalk
i,t
i,t
(2)
with the walking probability of 0 ≤ pwalk
i,t ≤ 1. Through this
position update function, the position update process from
time t to t + 1 can be derived as
si,t+1 = si,t + f (α, φ)
(3)
where si,t and si,t+1 are the current and the next positions
of the ith pedestrian. The corresponding set of candidate
movement position Si,t+1 can be expressed as
Si,t+1 = {si,t+1 : α ∈ A, φ ∈ Φ}
(4)
where A = {α : 0 ≤ α ≤ 1} and Φ = {φ : −φτ ≤ φ ≤ φτ }.
Here we set the constraint φτ < π
2 since pedestrians do
not choose to move in the opposite direction to the main
crowd flow, even if the direct way subsequently chosen is
crowded [16]. The current position and candidate position
set of a pedestrian are shown in Fig. 2, for example. In the
figure, the ith pedestrian, which is denoted by the blue
circle, is moving in the desired position si,t+1 from the
current position si,t. The candidate position set is depicted
as shaded area with sky-blue, in which pedestrian can move
or remain stationary. The pedestrians in our system are
represented by circles because circles will greatly benefit
from geometrical calculation in programming.
3.3 Operational Phase
The operational phase describes decisions taken by pedes-
trian agent to reach the goal at each time t after tactical
phase. In the operational phase, the pedestrian agent deter-
mines the step size and moving direction suited to avoid
people and obstacles. The decisions taken are based on the
perception of the environment where the pedestrian agent
is situated. These criteria of decisions are detailed in the
following.
3.3.1 Collision Avoidance
In reality, each pedestrian occupies a certain space area.
Thus, avoiding pedestrian overlapping is needed to be
considered in microscopic pedestrian models. By the over-
lapping, we mean pedestrians are not allowed to either walk
through each other or share the same space. This assumes
that the movement of a pedestrian is affected by other
pedestrians and obstacles in the surrounding environment.
Here, one rule of collision avoidance, which is used to
avoid pedestrian overlapping, is proposed. In order to avoid
collisions, the positions of other members in the crowd and
those of obstacles should be excluded from the candidate
position set. The positions of other people in the collision
with the ith pedestrian at time t can be expressed as
Speople
t
= {sj,t : si,t − sj,t < li,t + bij, ∀j 6= i}
(5)
2
where bij = bi+bj
from the ith and j th pedestrians' body
sizes of bi and bj, respectively. The body size means the
diameter of a pedestrian, which makes certain distances
among pedestrians and obstacles. The collision positions by
other members in the crowd can be specifically divided into
the two parts: body and rear. The positions in collision with
the bodies can be described by
Sbody
t
=ns : s − sj,t ≤ bij, sj,t ∈ Speople
t
o ,
and the positions in the rear of bodies can be explained by
Srear
t
=ns : s − si,t > dij cos ∆ψij ,
ψij − ∆ψij ≤ atan2 (∆xi, ∆yi) ≤ ψij + ∆ψij ,
∆xi = x − xi, ∆yi = y − yi,
(6)
(7)
dij ∈ D, ψij ∈ Ψ, ∆ψij ∈ ∆Ψo
where the corresponding sets of distances, directions, and
angular differences are
D =ndij : dij = sj,t − si,t , sj,t ∈ Speople
Ψ =nψij : ψij = atan2 (∆xji, ∆yji),
t
o ,
∆xji = xj − xi, ∆yji = yj − yi, sj,t ∈ Speople
t
and
∆Ψ =(cid:26)∆ψij : ∆ψij = sin−1 bij
dij
, dij ∈ D(cid:27) ,
(8)
o , (9)
(10)
respectively. The function atan2 (x, y) is defined in mathe-
matical term as
atan2 (x, y) = 2tan−1
x
px2 + y2 + y! .
(11)
The resultant collision positions by other people can be
defined as the union of two sets as Sother
. The
process of above collision avoidance with other members in
the crowd is elaborated in Fig. 3. The collision positions by
obstacles and walls can be derived in a similar manner.
=Sbody
∪Srear
t
t
t
t
]
r
e
e
m
[
As a result, the positions incurring collisions can be
represented by
h
t
r
o
N
Scol
t = Sother
t
∪ Sobstacle ∪ Swall,
(12)
and the candidate position set with collision avoidance is
accomplished through the set difference as
4
Position
Direction
Body Space
ROI
(cid:237)8
(cid:237)6
(cid:237)4
(cid:237)2
0
2
4
6
8
10
East [meter]
5
0
(cid:237)5
(cid:237)10
Si,t+1 = Si,t+1 \ Scol
=ns ∈ Si,t+1(cid:12)(cid:12)(cid:12)
s /∈ Scolo
=nsi,t+1 : α ∈ A, φ ∈ Φo
(12a)
(12b)
(12c)
where A and Φ are corresponding modified sets of α and
φ, respectively. In this way, the overlapping positions with
other pedestrians and obstacles can be eliminated in the
candidate position set.
3.3.2 Pedestrian Preference
To have a realistic simulation of a crowd, we must under-
stand the behavior of a pedestrian which has preferences
for choosing the way of walking. A pedestrian normally
chooses the fastest way to achieve its goal. In other words,
if there are many possibilities, the pedestrian chooses the
straightest way, with the minimum of changing direction,
the most attractive and the less noisy. This is called "law of
minimal change" [17]. Besides, a pedestrian typically prefers
not to take detours.
Generally, individuals move according to the principle
of "least effort" [2]. They choose the most familiar and the
easiest one to achieve their goals. They aim to minimize
time and costs by avoiding congestion and by maximizing
their step size. If there is enough time to achieve the goal, a
pedestrian chooses to walk at individually desired step size,
corresponding to its most comfortable walking speed which
is called "least energy-consuming" [2].
Here, one rule of determining pedestrian step size and
moving direction is proposed, which is used to maximize
pedestrian utility. At each time step t, the positions of
all pedestrians are updated synchronously. The process of
selecting the position to move in the candidate position set
avoiding collision is formulated as
si,t+1 = si,t + f(cid:16) α, φ(cid:17)
(13)
where α and φ are the step scale factor and direction shift
factor maximizing following utility function,
Fig. 4. Corridor scenario setup.
when a pedestrian closes to other ones or obstacles very
much in movement direction.
Through the collision avoidance and pedestrian pref-
erence, pedestrians do not overlap each other after the
position update at each time interval, although they could
move a very small step size, even close to zero. In other
words, their further close at the next time step is prevented,
and the overlapping among them could be avoided.
In our model, the maximum movement range of a
pedestrian in each time instant is limited, and hence the
other pedestrians and obstacles in the range only affect the
movement position of the pedestrian. It is very essential to
say that in a crowd situation, generally, the pedestrian is not
spontaneous regarding his behavioral strategy. This is why,
the pedestrian tries to have the optimal behaviors avoiding
the collision with the people around and follows the person
in front [2].
4 SIMULATION RESULTS AND DISCUSSION
We perform Matlab simulations using the proposed model
under two scenarios, i.e., corridor and bottleneck. In the last
decades, by means of experiment or modeling, researchers
have carried out a large number of studies that focus on
pedestrian behavior and movement characteristic, and they
have obtained many landmark achievements. For example,
the fundamental diagram and the flow rate at bottleneck are
considered as the main microscopic observables that char-
acterize pedestrian dynamics in normal state [18], [19], [20],
[21], [22], [23], [24], [25], [26], [27]. To validate the proposed
model in this paper, several simulations are conducted, and
then simulation results will be compared with some classic
conclusions and published empirical data provided by other
literature.
4.1 Fundamental Diagram
(cid:16) α, φ(cid:17) = argmax
α∈ A,φ∈ Φ(cid:20)wαα + wφ(cid:18)1 −
φ
φτ (cid:19)(cid:21)
(14)
with the weighting factors 0 ≤ wα ≤ 1 and 0 ≤ wφ ≤ 1 on step
scale and direction shift, respectively. The weighting factors,
wα + wφ = 1, describe the rate of pedestrian preference on
maximizing step size and minimizing direction change. The
resultant next position to move is shown as a circle with
dark blue in Fig. 2 and Fig. 3, for example. In this way, the
repulsive actions imposed by surroundings will be strong
As shown in Fig. 4, we conduct a simulation in a corridor
(20m × 5m) where each unidirectional pedestrian moves
according to the proposed system. Several studies have
investigated the fundamental diagram [18], [19], [20], [21],
[22], [23] and suggest that the density-speed relation and the
density-flow relation are two of the most important bench-
mark tests for crowd simulation. Hence, we validate our
model from the viewpoint of the density-speed relation. In
general, different density and velocity calculation methods
can be used for pedestrian model [28]. These methods are
Time = 0 [sec]
Time = 20 [sec]
5
Position
Direction
Body Space
Door
(cid:237)3
(cid:237)2
(cid:237)1
0
1
2
3
East [meter]
Trajectory
Walking Trace
Start Point
End Point
Door
Weidmann
Mori and Tsukaguchi
Hakin and Wright
Proposed
1.8
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
]
s
/
m
[
v
y
t
i
c
o
e
V
l
0
0
1
2
3
Density ρ[1/m2]
4
5
6
7
Position
Direction
Body Space
Door
(cid:237)3
(cid:237)2
(cid:237)1
0
1
2
3
East [meter]
Time = 40 [sec]
Position
Direction
Body Space
Door
t
]
r
e
e
m
[
h
t
r
o
N
]
r
e
t
e
m
[
h
t
r
o
N
3
2
1
0
(cid:237)1
(cid:237)2
(cid:237)3
3
2
1
0
(cid:237)1
(cid:237)2
(cid:237)3
t
]
r
e
e
m
[
h
t
r
o
N
]
r
e
t
e
m
[
h
t
r
o
N
3
2
1
0
(cid:237)1
(cid:237)2
(cid:237)3
3
2
1
0
(cid:237)1
(cid:237)2
(cid:237)3
(cid:237)3
(cid:237)2
(cid:237)1
0
1
2
3
(cid:237)3
(cid:237)2
(cid:237)1
0
1
2
3
East [meter]
East [meter]
Fig. 5. Fundamental diagram that shows the density-velocity relation-
ship.
Fig. 6. Room with door scenario setup.
basically consistent with on another. In this paper, a square
area (2m × 2m) is selected as the region of interest (ROI)
to extract the data as in Fig. 4. In other words, only the
data on pedestrian movement in the ROI are considered.
When a pedestrian on one of the two walkways moves in
the desired direction and arrives at the exit boundary, then
that pedestrian is removed from the walkway. At each time
instant, the velocity of a pedestrian is calculated by dividing
the step size by the incremental time interval. We iterate
simulations ten times at each density and obtain the density-
speed relation within ROI, as shown in Fig. 5 (the red dots).
Compared with other experimental data of unidirec-
tional flow [18], [19], [20] it is clear that the simulation result
has the same tendency with other density-speed relations.
Moreover, the fundamental diagram obtained from our
model is very close to that given by Weidmann [18]. It is in-
deed difficult to choose a standard fundamental diagram to
evaluate our fundamental diagram. Many researchers have
provided the fundamental diagrams deriving from their
own experiments where the underlying data of Weidmann's
fundamental diagram are based on the literature research
of 25 publications, including field studies and experiment
research. Compared with other researchers' fundamental
diagram, Weidmann's fundamental diagram may be more
comprehensive, and therefore, we compared our diagram
with Weidmann's diagram rather than with other diagrams.
4.2 Flow Rate at Bottleneck
]
s
/
1
[
J
t
e
a
R
w
o
F
l
Kretz et al.
Seyfried et al.
Mueller et al.
Proposed
4.5
4
3.5
3
2.5
2
1.5
1
0.5
0.4
0.6
0.8
1
1.4
Bottleneck Width d[m]
1.2
1.6
1.8
2
Fig. 7. Flow rate at bottleneck.
pedestrian density is set to full capacity to guarantee that
the maximum flow rate can be reached at the door.
The maximum flow rates at bottleneck under different
door widths are compared with field observation results
in Fig. 7 (the red circles). Three different research results
are cited here for this purpose, including the laboratory
observation data collected by Kretz et al. [24], Seyfried et
al. [25], [26], and Muller et al. [27]. The simulation results
show consistency with many empirical data provided by
other literature, which verifies that the proposed model is
applicable to study unidirectional pedestrian model.
Flow rate in persons per second or the specific flow rate in
persons per second per meter at the position of bottleneck
is one of the most important parameters for planning and
designing facilities, such as a door. Various published field
survey results on flow rate were collected from different
scenarios. Most of these results suggest that flow rate is
nearly in a linear relationship with the width of the bot-
tleneck. In this paper, the pedestrian movement from the
room through the door with changeable width at the right
boundary is studied as in Fig. 6. The width of the door
is tested with different values from 0.5m to 2.0m, and the
5 CONCLUSION
Pedestrian crowd is a complex phenomena in which several
dangerous accident can occur, especially in dense situa-
tions. An appropriate solution to this problem is to test
the phenomena through the simulation of pedestrian crowd.
This solution could be useful only if the simulation model
produces realistic pedestrian crowd situations.
For this reason, we present a simple and realistic pedes-
trian simulation model which is based on multi-agent sys-
tems and that includes the major human factors. Agents
move a step toward the direction calculated by a utility
maximization approach in which various factors that in-
fluence pedestrian movement are considered. The system
was validated by modeling several basic pedestrian crowd
phenomena and comparing the simulation results with pub-
lished empirical data. The conducted simulations show that
the model is consistent with the classic conclusions and
published empirical data provided by other literature, and
thus it provides realistic simulated pedestrian behaviors.
Here, we have concentrated our work only in the behavior
of normative personality. We can improve our model by
considering different individual personalities.
ACKNOWLEDGMENT
This research was done in 2014, but has not been yet pub-
lished due to some personal reasons. We decided to release
this research to be opened to public accesss now in 2017.
REFERENCES
[1] O. Beltaief, S. El Hadouaj, and K. Ghedira, "Multi-agent simula-
tion model of pedestrians crowd based on psychological theories,"
in Logistics (LOGISTIQUA), 2011 4th International Conference on.
IEEE, 2011, pp. 150–156.
[2] R. Challenger, C. Clegg, and M. Robinson, "Understanding crowd
behaviours," UK Cabinet office. Crown, 2009.
[3] E. Bonabeau, "Agent-based modeling: Methods and techniques for
simulating human systems," Proceedings of the National Academy of
Sciences of the United States of America, vol. 99, no. Suppl 3, pp.
7280–7287, 2002.
J. S. Milazzo, N. M. Rouphail, J. E. Hummer, and D. P. Allen,
"Effect of pedestrians on capacity of signalized intersections,"
Transportation Research Record: Journal of the Transportation Research
Board, vol. 1646, no. 1, pp. 37–46, 1998.
[4]
[5] D. Helbing, "A fluid dynamic model for the movement of pedes-
trians," arXiv preprint cond-mat/9805213, 1998.
[6] R. L. Hughes, "The flow of human crowds," Annual review of fluid
[7]
mechanics, vol. 35, no. 1, pp. 169–182, 2003.
S. Wolfram, "Cellular automata as models of complexity," Nature,
vol. 311, no. 5985, pp. 419–424, 1984.
[8] K. Nagel and M. Schreckenberg, "A cellular automaton model for
freeway traffic," Journal de physique I, vol. 2, no. 12, pp. 2221–2229,
1992.
[9] C. Burstedde, K. Klauck, A. Schadschneider, and J. Zittartz, "Sim-
ulation of pedestrian dynamics using a two-dimensional cellular
automaton," Physica A: Statistical Mechanics and its Applications,
vol. 295, no. 3, pp. 507–525, 2001.
[10] N. Gilbert, Agent-based models. Sage, 2008, no. 153.
6
[11] X. Pan, C. S. Han, K. Dauber, and K. H. Law, "A multi-agent based
framework for the simulation of human and social behaviors
during emergency evacuations," Ai & Society, vol. 22, no. 2, pp.
113–132, 2007.
[12] G. Antonini, M. Bierlaire, and M. Weber, "Discrete choice models
of pedestrian walking behavior," Transportation Research Part B:
Methodological, vol. 40, no. 8, pp. 667–687, 2006.
[13] N. Pelechano, J. M. Allbeck, and N. I. Badler, "Controlling indi-
vidual agents in high-density crowd simulation," in Proceedings
of the 2007 ACM SIGGRAPH/Eurographics symposium on Computer
animation. Eurographics Association, 2007, pp. 99–108.
[14] C. M. Macal and M. J. North, "Agent-based modeling and sim-
ulation," in Winter Simulation Conference. Winter Simulation
Conference, 2009, pp. 86–98.
[15] G. K. Still, "Crowd dynamics," Ph.D. dissertation, University of
Warwick, 2000.
[16] D. Helbing, P. Molnar, I. J. Farkas, and K. Bolay, "Self-organizing
pedestrian movement," Environment and planning B, vol. 28, no. 3,
pp. 361–384, 2001.
[17] K. Nishinari, K. Sugawara, T. Kazama, A. Schadschneider, and
D. Chowdhury, "Modelling of self-driven particles: Foraging ants
and pedestrians," Physica A: Statistical Mechanics and its Applica-
tions, vol. 372, no. 1, pp. 132–141, 2006.
[18] U. Weidmann, "Transporttechnik der fussganger," 1992.
[19] M. M ¯ori and H. Tsukaguchi, "A new method for evaluation of
level of service in pedestrian facilities," Transportation Research Part
A: General, vol. 21, no. 3, pp. 223–234, 1987.
[20] B. Hankin and R. Wright, "Passenger flow in subways," OR, pp.
81–88, 1958.
[21] A. Seyfried, B. Steffen, W. Klingsch, and M. Boltes, "The fun-
damental diagram of pedestrian movement revisited," Journal of
Statistical Mechanics: Theory and Experiment, vol. 2005, no. 10, p.
P10002, 2005.
[22] D. Helbing, A. Johansson, and H. Z. Al-Abideen, "Dynamics of
crowd disasters: An empirical study," Physical review E, vol. 75,
no. 4, p. 046109, 2007.
[23] H. E. Nelson and F. W. Mowrer, "Emergency movement," The
SFPE Handbook of Fire Protection Engineering, vol. 3, pp. 367–80,
2002.
[24] T. Kretz, A. Gr unebohm, and M. Schreckenberg, "Experimental
study of pedestrian flow through a bottleneck," Journal of Statistical
Mechanics: Theory and Experiment, vol. 2006, no. 10, p. P10014, 2006.
[25] A. Seyfried, O. Passon, B. Steffen, M. Boltes, T. Rupprecht, and
W. Klingsch, "New insights into pedestrian flow through bottle-
necks," Transportation Science, vol. 43, no. 3, pp. 395–406, 2009.
[26] A. Seyfried, M. Boltes, J. Kahler, W. Klingsch, A. Portz, T. Rup-
precht, A. Schadschneider, B. Steffen, and A. Winkens, "Enhanced
empirical data for the fundamental diagram and the flow through
bottlenecks," in Pedestrian and Evacuation Dynamics 2008. Springer,
2010, pp. 145–156.
[27] K. M uller, "Zur gestaltung und bemessung von fluchtwegen f ur
die evakuierung von personen aus bauwerken auf der grundlage
von modellversuchen," 1981.
[28] J. Zhang, W. Klingsch, A. Schadschneider, and A. Seyfried, "Tran-
sitions in pedestrian fundamental diagrams of straight corridors
and t-junctions," Journal of Statistical Mechanics: Theory and Experi-
ment, vol. 2011, no. 06, p. P06004, 2011.
|
0912.4637 | 1 | 0912 | 2009-12-23T13:23:58 | Local and Global Trust Based on the Concept of Promises | [
"cs.MA"
] | We use the notion of a promise to define local trust between agents possessing autonomous decision-making. An agent is trustworthy if it is expected that it will keep a promise. This definition satisfies most commonplace meanings of trust. Reputation is then an estimation of this expectation value that is passed on from agent to agent.
Our definition distinguishes types of trust, for different behaviours, and decouples the concept of agent reliability from the behaviour on which the judgement is based. We show, however, that trust is fundamentally heuristic, as it provides insufficient information for agents to make a rational judgement. A global trustworthiness, or community trust can be defined by a proportional, self-consistent voting process, as a weighted eigenvector-centrality function of the promise theoretical graph. | cs.MA | cs |
Local and Global Trust Based on the Concept of Promises
Jan Bergstra1, Mark Burgess2
1 Informatics Institute, Science park 904, 1098 XH, the Netherlands, Email: [email protected]
2 Department of Computing, Oslo University College, Norway, Email: [email protected]
20th September 2006, minor edits 23 December 2009
Abstract We use the notion of a promise to define local trust between agents possessing
autonomous decision-making. An agent is trustworthy if it is expected that it will keep a
promise. This definition satisfies most commonplace meanings of trust. Reputation is then
an estimation of this expectation value that is passed on from agent to agent.
Our definition distinguishes types of trust, for different behaviours, and decouples the
concept of agent reliability from the behaviour on which the judgement is based. We show,
however, that trust is fundamentally heuristic, as it provides insufficient information for
agents to make a rational judgement. A global trustworthiness, or community trust can
be defined by a proportional, self-consistent voting process, as a weighted eigenvector-
centrality function of the promise theoretical graph.
1 Introduction
I don’t trust him. We’re friends.
–Bertolt Brecht
The decision to trust someone is a policy decision. Although the decision can be made
ad hoc, our common understanding of trust is that it is based on a gathering of experience,
i.e. a process of learning about the behaviour and reputation of someone in a variety of
scenarios. Our particular policy might weight certain sources and behaviours more heavily
than others and no one can tell us what is the right thing to do. Hence trust is intimately
connected with personal autonomy.
In this paper, we define trust in the spirit of this personal autonomy, by basing it directly
on the concept of how reliably a promise is kept. A promise is also an autonomously made
declaration of behaviour, that is highly individual, moreover it carries with it the notion of a
theme (what the promise is about)[1]. By combining promises with reliability, we thus have
a natural definition of trust that satisfies well-understood rules for revising both the logical
aspects of policy and the statistical observations made about agents’ behaviours. We show
that this viewpoint satisfies the desirable properties for use in computer security schemes.
Note that our aim in this work is not to design a technology for building trust, but rather to
analyse the precepts for what trust actually means to users.
The plan for this paper is as follows (see fig. 1), We discuss the notion of trust from
a pragmatic and philosophical point of view in order to settle on what properties trust
should have. We show that common expressions of trust are often ambiguous, but that we
can resolve this ambiguity by defining agent trust as the expectation of keeping a given
2
Jan Bergstra, Mark Burgess
promise. Using the graphical notions of promises, we can then establish a notion of global
trust in certain cases.
1.1 Trust
The concept of trust is both well known and widely used in all kinds of human interactions.
Trust is something that humans hold both for one another or sometimes for inanimate ob-
jects (“I trust my computer to give the right answer”). In computer systems, the concept of
trust is especially used in connection with security. In risk analysis one considers a secure
system to be one in which every possible risk has either been eliminated or accepted as a
matter of policy. Trust is therefore linked to the concept of policy in a fundamental way.
Trust is also discussed in the case of network security protocols, for instance, in the case
where keys are exchanged. The classic dilemma of key distribution is that there is often a
high level of uncertainty in knowing the true originator of a secure identifier (cryptographic
key). One therefore hopes for the best and, beyond a certain threshold of evidence “trusts”
the assumption of ownership. Several protocols claim to manage such trust issues, but what
does this really mean?
In spite of the reverence in which the concept is held, there is no widely accepted tech-
nical definition of trust. This has long be a hindrance to the discussion and understanding of
the concept. The Wikepedia defines: “Trust is the belief in the good character of one party,
they are believed to seek to fulfil policies, ethical codes, law and their previous promises.”
In this paper, we would like to address the deficiencies of discussions of trust by introduc-
ing a meta-model for understanding trust. Our model can be used to explain and describe
common trust models like “trusted third parties” and the “web of trust”.
1.2 Promises – autonomous claims
Trust is an evaluation that can only be made by an individual. No one can force someone to
trust someone else in a given situation. This basic fact tells us something important about
how trust should be defined.
Recently, one of us has introduced a description of autonomous behaviour in which
individual agents are entirely responsible for their own decisions[2,3,4,5]. Promise theory
is a graphical model of policy. The basic responsibility of an agent to be true to its own
assertions is an important step towards a way of describing trust.
Promise theory is useful in this regard because all agents are automatically responsible
for their own behaviour and only their own behaviour. Responsibility is not automatically
transitive between autonomous agents: it has to be arranged through explicit agreement be-
tween agents in a controlled way; hence one avoids problems such as hidden responsibility
that make the question of whether to trust an individual agent complex.
In this paper, we argue that the concept of trust can be defined straightforwardly as a
valuation of a promise – specifically the expectation of autonomous behaviour. When we
say that we trust something, we are directing this towards the instigator of some promise,
whether implicit or explicit. Moreover reputation is simply what happens to trust as it is
communicated about a network, i.e. it is a ‘rumour’ that spreads epidemically throughout
a network along different paths, and hence develops into a path-dependent estimate of
trustworthiness.
The matter of evidence-gathering, in order to justify the expectation value of keeping
a promise is subtle, and so we shall discuss this in some detail. We argue that there is in-
sufficient information in the notions of trust or reputation to make a reliable estimate of
trustworthiness. Thus trust is an inherently ambiguous concept; each valuation of trustwor-
thiness is, in essence, an essentially ad hoc policy.
Local and Global Trust Based on the Concept of Promises
3
Underlying promises
Evidence
Belief
Frequentist
Expectation
Bayesian
Decision
Local trust
Eigenvector centrality
Global trust
Fig. 1 The chain of trust from verifiable promises to local trust by an agent, to global or community
trust which we interpret as reputation.
2 Prior work
There is an extensive literature on trust in computer science[6,7,8,9,10,11]. Much of it is
concerned with generating protocols for the purpose of determining the validity of public
keys and other identity tokens, or criticizing these mechanistic views in a wider security
perspective. Here we are mainly concerned with general ideas about trust and reputation.
We find the recent work of Kluwer and Waaler to be of interest from the viewpoint of
logic[12,13]. These authors present a natural reasoning system about trust which includes
the notion of ordering by levels of trustworthiness.
The work that seems closest to ours may be found in ref. [14] and ref. [15]. Here the
authors distinguish between trust and reputation and provide an epidemic-like procedure
for valuating the trust based on some inference rules and numerical measures that are es-
sentially reliabilities. The calculation is hence mainly appropriate for a frequentist interpre-
tation of probability. The authors in ref. [14] are unable to distinguish trust about different
issues, or relate these in their model. In ref. [15], an attempt is made at motivating trust
types but the underlying properties of these types is not completely clear.
In our proposal:
1. We allow for multiple sources (types) for which trust and reputation are valuated.
2. Our combinatorics are based on logic and on Bayesian probability estimates, which are
more appropriate estimators for the small amounts of experience involved.
4
Jan Bergstra, Mark Burgess
Other work which we find valuable includes social viewpoints of trust (see ref. [16] for
a review). This work brings in the matter of human value judgements, which we feel is an
important issue in any definition of trust, since it is humans who make the final decisions
in practice. From a sociological viewpoint, there are many forms of currency on which to
build trust. Some of these are based on the outcomes of stand-offs such as economic games,
bargaining situations and so on[17]. Promises have already been shown to incorporate these
considerations neatly within their framework[4].
3 Common usage of trust and reputation
As with most words, the English word ‘trust’ has a number of related meanings which are
worth documenting for reference and comparison.
– Trust implies a confidence or faith character: e.g. one “trusts in friends and family”.
– It might be based on an assessment of reliability: e.g. “A trustworthy employee”
– A related, but not identical meaning has to do with presumed safety. It also means to
permit something without fear. “I trust the user to access the system without stealing.”
Such trust can be betrayed.
This is different because the feeling of safety is not a rationally determined quantity,
whereas reliability is observable and measurable. Thus there is both a rational and an
irrational aspect to trust.
– A final meaning of trust is the expression of hope, i.e. and expectation or wish: ”I trust
you will behave better from now on”;
Trust is therefore about the suspension of disbelief. It involves a feeling of benevolence,
or competence on the part of the trustee.
Trust of this kind expresses an acceptance of risk, e.g. a jewelry store trusts that passers-
by will not smash a plate glass window very often to steal displayed goods, but rather
trusts that the windows will improve sales. There could therefore be an economic deci-
sion involved in risk-taking.
Reputation is a related notion to trust. We understand this to mean a received judge-
ment, i.e. an evaluation of an agent’s reliability based on hearsay. Reputation spreads like
an epidemic process, but it is potentially modified on each transmission. Thus, from a
given source, several reputations might emerge by following different pathways (histories)
through a network.
4 A typed definition of trust
An agent that is known to keep its promises is considered trustworthy by any normal defi-
nition of trust i.e. the agent would be reliable and predictable such that one could put aside
one’s doubts about whether it might fail to live up to its assertions.
It seems natural then to associate trust with one agent’s expectation of the performance
of another agent in implementing its promises. This could seem like an unnecessarily nar-
row definition, but it turns out to be more general than one might expect. What about trust in
matters that have not yet occurred? Clearly, trust could be formulated about a future poten-
tial promise. i.e. a promise does not have been made for us to evaluate its likely reliability.
The usefulness of promises is that they encapsulate the relevant information to categorise
intentions and actions.
Proposal 1 (Trust) Trust can be defined as an agent’s expectation that a promise will be
kept. It is thus a probability lying between 0 and 1.
We shall define “an agent’s expectation” in detail below, and we shall additionally give
meaning to the concepts of when an agent is deemed to be trustworthy or trusting which
Local and Global Trust Based on the Concept of Promises
5
are global concepts, different from merely trusted. This proposal has a number of posi-
tive qualities. To begin with it separates the experiential aspect of trust from the nature
of the actions on which it is based. Thus in terms of philosophy of science, it makes a
clean distinction between empirical knowledge (expectation) and theoretical knowledge (a
promise).
Our definition is specific. The concept of trust, as normally applied in computer science
is rather universal and non-specific: either one trusts another agent or one does not; how-
ever, it is seldom that we trust or distrust anyone or anything so completely. Our definition
is a typed definition, i.e. we gauge trust separately for each individual kind of promise –
and this is where promises provide a convenient notation and conceptual stepping stone.
We assume that promises are a more fundamental notion than trust.
According to our definition, trust is a reliability rating made by some agent that is able
to observe two agents involved in a promise. We hesitate to call this a reliability measure:
for reasons that we shall make clear, there is normally insufficient evidence on which to
base a proper reliability estimate, in the sense of reliability theory[18].
A reputation is little more than a rumour that spreads epidemically throughout a net-
work. Common ideas about reputation include.
– “A general opinion of someone.”
– “A measure of someone’s standing in the community.”
Reputation is not necessarily related to trustworthiness. One could have a reputation based
on how much money an agent spends, or how much fuel it uses. What characterizes a
reputation, as opposed to a personal observation or evaluation, is that it is passed on. One
does not observe the characteristic first hand.
Proposal 2 (Reputation) Reputation can be defined as a valuation of some agent’s past
or expected behaviour that is communicated to another agent.
We clarify and develop these basic proposals in the remainder of the paper. In particular
trust will be revisited in more detail in section 8.
4.1 Promises
To base our notion of trust on promises, we review the basic concepts from promise theory.
Promises are closely linked to the idea of policy, or declarations of autonomous decision-
making. Indeed, we define policy to be simply a set of promises, since one can always
phrase decisions about how to respond to future events and scenarios as promises about
what one will do.
Consider a general set of N agents Ai, where i = 1, . . . , N. We denote agents by
capital Roman letters, and shall often use nicknames S for promise-sender or giver, R for
promise receiver and T for third parties, to assist the discussion.
Definition 1 (Promise) A promise is an autonomous specification of unobserved or in-
tended behaviour. It involves a promiser and one or more promisees to whom the promise
is directed. The scope of the promise is the set of agents who have knowledge of the promise
that has been made. Each promise contains a promise body b that describes the content of
the promise. We denote a promise from agent S to an agent R, with body b by:
S π:b−→ R
(1)
The body b of every promise contains a type t(b) and often an additional constraint. Promise
types distinguish the qualitative differences between promises, and additional constraint
attributes distinguish the quantitative differences. For each promise body b, there is another
promise body ¬b which represents the negation of b. We shall assume that t(¬b) = t(b)
6
Jan Bergstra, Mark Burgess
and that ¬¬b = b. The negation of b refers to the deliberate act of not performing b, or what
ever is the complementary action of type t(b).
Promises fall into two basic complementary kinds, which we can think of as promises
for giving and taking, or service and usage. A promised exchange of some service s requires
one of each kind:
A1
π:s−→ A2 or A1
A2
π:U(s)
−→ A1 or A2
π:+s−→ A2
π:−s−→ A1
(2)
Exclusive promises are those which cannot physically be realized at the same time. This
does not mean that incompatible promises cannot be made, it means that they are meaning-
less and could lead to problems for the agent.
Definition 2 (Incompatible promises #) When two promises originating from an agent
are incompatible, they cannot be realized physically at the same time. We write
A1
π:b1−→ A2 # A1
π:b2−→ A3
(3)
If A2 = A3, we may omit the agents and write b1#b2.
It would probably be unwise for an agent to trust another agent that made simultaneous,
incompatible promises. Of course this is a policy decision for each individual agent to
make.
Breaking a promise is not the same as not keeping a promise. It is an explicit contra-
diction. Again, confidence in an agent’s promise-keeping ability is reduced when it makes
contradictory promises.
Definition 3 (Promise conflict) Two or more promises to an agent are in conflict if at least
one promise is contradicted by another. We define a conflict as the promising of exclusive
promises
A1
π:b1−→ A2, A1
π:b2−→ A2 with b1#b2
(4)
Clearly promising b and ¬b would be excluded.
4.2 Composition of parallel promises
We can compose trivial bundles of promises between a single pair of agents by union. Using
proof notation:
π:b1−→ b, a
a
π:b2−→ b, . . . a
π:b1∪b2∪...bN
−→ b
a
π:bN−→ b,
(5)
where the non-overlap of independent type regions is not necessarily assumed, but helps to
make sense of this (the definition should still work even if the types overlap). The compo-
sition of promises in a serial fashion is non-trivial and only has meaning in a minority of
cases, where autonomy is relinquished.
A promise made conditionally on a Boolean condition C, known to the promising agent
is written:
Definition 4 (Conditional promise) A conditional promise is written:
A1
π:bC
−→ A2
(6)
i.e. A1 promises b to A2 if the condition C is true.
Local and Global Trust Based on the Concept of Promises
7
Note that a condition can also be the subject of a promise. We write
(7)
for the promise from A1 to A2 to ensure that the condition C holds. Now the combination
of a conditional promise and the promise of the condition holding leads to an unconditional
promise as follows:
A1
π:T(C)
−→ A2
A1
π:bC
−→ A2, A1
π:T(C)
−→ A2
A1
π:b−→ A2
(8)
A promise is not truly a promise unless the truth of the condition is also promised.
4.3 General notation for promises
The following notation for promises has been designed to be clear and pragmatic, avoiding
potential recursion difficulties of promises about promises. We begin with the kind of basic
promise from one agent to another and then generalize this:
1. The preferred form of a promise (first kind) is written.
This is a local and autonomously made promise. This is equivalent to the more general
notation:
S π:b−→ R
(9)
S[S] π:b−→ R[R].
i.e. S promises b to R.
2. A promise of the second kind allows obligation:
S[T ] π:b−→ R
(10)
(11)
i.e. S promises R that it will oblige T to act as if it had promised b to R. If T is
autonomous, this is forbidden and has no influence on T .
3. A promise of the third kind allows indirection.
S π:b−→ R[T ]
(12)
i.e. S promises to R that S will do b for T .
4. The most general form of a promise:
(13)
i.e. S promises D that b will act as if it had promised b to U . If T is autonomous, this
is forbidden and has no influence of T .
S[T ] π:b−→ D[U ]
We have potentially a need for all of these variants.
Example 1 Promises about policy in which one does not inform the promise recipient (e.g.
the Border Gateway Protocol (BGP) policy) may be written:
S π:b−→ S[R]
(14)
i.e. S makes a promise only to itself to honour b toward R (e.g. suppose b is a promise to
use packet-data received). This is the case, for instance, in the processing of Access Control
Lists by most network devices: the sender of data has no a priori idea of whether the device
will accept it.
Most of the promises we shall consider in the definition of trust will be of the form
i.e. a neighbouring agent promises us that it will do something for some third party (where
the third party might also be us).
A2
π:b−→ A1[A3]
(15)
8
Jan Bergstra, Mark Burgess
4.4 A general expression for trust
Trust is somehow complementary to the idea of a service promise. This is suggested by
the intuition that a promise to use a service implies a measure of trust on the part of the
receiver. We consider trust a directed relationship from a truster to a trustee. Moreover, it
is a judgement or valuation of a promise performed entirely by the truster.
We need a notation to represent this, similar to that for promises. In the spirit of the
promise notation, we write the general case as:
S[T ] τ :b−→ R[U ]
(16)
meaning that S trusts R to ensure that T keeps a promise of b to U .
In most cases, this is too much generality. In a world of autonomous agents, no agent
would expect agent S to be able to ensure anything about agent T ’s behaviour. The more
common case is therefore with only three parties
A1[A2] τ :b−→ A2[A3]
(17)
i.e. agent A1 trusts agent A2 to keep its promise towards some third-party agent A3. Indeed,
in most cases A3 might also be identified with A1:
A1[A2] τ :b−→ A2[A1]
which, in turn, can be simplified to
A1
τ :b−→ A2.
(18)
(19)
In this case, trust is seen to be a dual concept to that of a promise. If we use the notation
of ref. [4], then we can write trust as one possible valuation v : π → [0, 1] by A1 of the
promise made by A2 to it:
A1[A2] τ :b−→ A2[A1] ↔ v1(A2
π:b−→ A1)
(20)
This is then a valuation on a par with economic valuations of how much a promise is worth
to an agent[4]. The recipient of a promise can only make such a valuation if it knows that
the promise has been made.
Proposal 3 Trust of an agent S by another agent R can exist if agent R is informed that
agent S has made a promise to it in the past, or if the recipient of the promise R is able to
infer by indirect means that S has made such a promise.
Thus any agent can formulate a trust policy towards any other agent. The only remaining
question is, on what basis should such a judgement be made?
Our contention is that the most natural valuation to attach to trust is an agent’s estimate
of the expectation value that the promise will be kept, i.e. an estimate of the reliability of
the agent’s promise.
A1[A2] τ :b−→ A2[A1]
P
≡ E1(A2
π:b−→ A1)
(21)
where P
≡ means ‘is defined by policy as’, and the expectation value ER(·), for agent R
has yet to be defined (see Appendix A for these details). We note the essential difficulty:
that such valuations of reliability are not unique. They are, in fact, entirely subjective and
cannot be evaluated without ad hoc choices of a number of free parameters. We return to
this point below.
Local and Global Trust Based on the Concept of Promises
9
5 Cases: The underlying promises for trust idioms
To ensure that our definition of trust is both intuitive and general, we present a number of
‘use-cases’ below and use these to reveal, in each case, the expectation of a promise that
underlies the trust. In each case, we write the declarations of trust, in notation, in words, and
as an expectation value of an underlying promise. In some cases, the expressions of trust
are ambiguous and support several interpretations which can only be resolved by going to
a deeper explanation in terms of promises.
– I trust my computer to give the right answer. This could literally mean that one trusts
the computer, as a potentially unreliable piece of hardware:
Me τ :answer−→ Computer
P
≡ EMe(Computer π:answer−→ Me)
(22)
i.e. I expect that the computer will keep its (implicit) promise to furnish me with the
correct answer.
However, there is another interpretation. We might actually (even subconsciously) mean
that we trust the company that produces the software (the vendor) to make the computer
deliver the right answer when asked, i.e. I expect the promise by the vendor to me, to
make the computer give me the right answer, will be kept.
[Me][Computer] τ :answer−→ [Vendor][Me]
P
≡ EMe(cid:16)[Vendor][Computer] π:Answer−→ [Me][Me](cid:17)
(23)
In either case, the relationship between the promise, the expectation and the trust is the
same.
– I trust the identity of a person (e.g. by presence, public key or signature).
This is one of the classic problems of security systems, and we find that the simple
statement hides a muddle of possibilities. It has many possible interpretations; however,
in each case we obtain clarity by expressing these in terms of promises.
Me τ :Authentic
−→ Signature
P
≡ EMe(Signature π:Authentic
−→ Me)
(24)
In this version, we place trust in the implicit promise that a credential makes of being
an authentic mark of identity. This is a simple statement, but we can be sceptical of the
ability of a signature to make any kind of promise.
Me[Signature] τ :Authentic
−→ Certifier[Me]
P
≡ EMe(Certifier[Signature] π:Authentic
−→ Me)
(25)
i.e. I trust a Certifying Agency to ensure that the implicit promise made by the credential
to represent someone is kept. Or I expect the certifying agency (possibly the originator
of the signature himself) to keep a promise to me to ensure that the signature’s promise
to me is kept (e.g. the technology is tamper-proof).
Yet a third interpretation is that the trust of the key is based on the promise to verify its
authenticity, on demand. This is the common understanding of the “trusted third party”.
Me
τ :verify key
−→ Certifier
i.e. I trust that the key has been authorized and is verifiable by the named Certifica-
tion Agency. This last case avoids the problem of why one should trust the Certifying
Agency, since it refers only to the verification service itself.
P
≡ EMe(cid:16)Certifier
π:verify key
−→ Me(cid:17)
(26)
10
Jan Bergstra, Mark Burgess
– A similar problem is encountered with currency denominations, e.g. pound notes, dol-
lars, or Euros. These tokens are clearly not valuable in and of themselves; rather they
represent value. Indeed, on British Pound notes, the words “I promise to pay the bearer
on demand the sum of ... X pounds” is still found, with the printed signature of the
Chief Cashier. Indeed, the treasury will, if pressed, redeem the value of these paper
notes in gold. Thus trust in a ten pound note may be expressed in a number of ways.
We trust the note to be legal tender: i.e.
Me
τ :legal
−→ Note
P
≡ EMe(cid:18)Cashier
π:goldnote
−→ Me(cid:19)
(27)
we expect that the chief cashier will remunerate us in gold on presenting the note.
Alternatively, we assume that others will promise to accept the note as money in the
United Kingdom (UK):
Me
τ :legal
−→ Note
P
≡ EMe(cid:18)S
π:U(note)
−→ Me(cid:19) , S ∈ U K
(28)
Interestingly neither dollars nor Euros make any much promise. Rather, the dollar bill
merely claims “In God we trust”.
– Trust in family and friends.
This case is interesting, since it is so unspecific that it could be assigned almost any
meaning. Indeed, each agent is free to define its meaning autonomously. For some set
of one or more promises P ∗,
Me τ :P ∗
−→ {Family}
P
≡ EMe [i∈∗
{Family}
π:Pi−→ Ai!
(29)
i.e. for some arbitrary set of promises, we form an expectation about the likelihood that
family and friends would keep their respective promises to the respective promisees.
These promises might, in fact, be hypothetical and the evaluations mere beliefs. On
the other hand, we might possess actual knowledge of these transactions, and base
judgement on the word of one of these family/friend members to keep their promises
to the third parties:
Me τ :P ∗
−→ {Family}
P
≡ EMe [i∈∗
{Family}
π:Pi−→ Me[Ai]!
(30)
– A trustworthy employee.
In this case, one bases trustworthiness is based more on a history of delivering on
promises made in the context of work, e.g.:
Boss τ :Deliver−→ Employee
P
≡ EBoss(Employee π:Deliver−→ Boss)
(31)
– I trust the user to access the system without stealing.
Here the promise is not to steal. The promise does not have to have been made explicitly.
Indeed, in civil society this is codified into law, and hence all agents implicitly promise
this by participating in that society.
– “I trust you will behave better from now on!”
This can be understood in two ways. In the first interpretation, this is not so much
an evaluation of trust as it is a challenge (or even warning) to the agent to do better.
Alternatively, it can be taken literally as an expression of belief that the agent really
will do better. In the latter case, it is:
Me τ :Do better
−→ You
P
≡ EMe(cid:16)You π:Do better
−→ Me(cid:17)
(32)
Local and Global Trust Based on the Concept of Promises
11
6 Expectations of ensembles and compositions of promises
We are not done with policy’s intrusion into the definition of expectation. Since promises
can be composed according to straightforward rules, we must be able to compute two dis-
tinct things:
1. The expectation of a composition of promises that coexist.
2. The composition of expectations from different ensembles.
The difference between these is analogous to the difference between the combinations of
experimental data into ensembles for computing probabilities, and the composition of dif-
ferent probable inputs in fault trees (with AN D, OR, XOR, etc).
We have already discussed the composition of data sets into ensembles, the effect this
has on probabilities, and how this is expressed in terms of the basic expectation values in
section A.1
We shall have need to define the meaning of the following in order to determine the
trust deriving from compound promises:
1. The expectation of incompatible promises.
2. The expectation of a composition of parallel promises between a pair of agents.
3. The expectation of a composition of serial promises between a chain of agents.
6.1 Parallel promise (bundle) expectation
When promises are made in parallel, the question arises as to how much to trust them as
a bundle. Should one ever base one’s trust on a complete package or bundle of promises?
This is a subjective judgement based on whether certain promises are related in the view of
the promisee. If one makes an expectation valuation for each promise individually, does it
make sense to combine them as probabilities, e.g. in the manner of a fault tree[19,18]. One
is used to the probability composition rules for binary logic of independent events.
– (AN D): If the promisee is dependent on several mutually reinforcing promises, then
AN D semantics are a reasonable assumption. In a security situation, this might be
reasonable. The multiplicative combination rule means that each additional promise
that must be in place reduces the total trust that the promiser will keep all of its promises
proportionally.
– (OR) Here one says that if one or more promises are kept, then trustworthiness is
reinforced. This is an optimistic policy which seems to suggest that the promisee is
understanding about the promiser’s potential difficulties in keeping a promise. This
cannot be applied to incompatible promises.
– (XOR): An alternative scenario is to have a number of promises that are alternatives
for one another. For instance, mutually exclusive conditional promises that behave like
a switch: e.g.
π:xy
−→ R
π:x′¬y
−→ R,
S
S
(33)
i.e. S promises x to R, iff y, else it promises x′.
– (RANKED) If the promises are ranked in their importance to the recipient, then the
measure of trust associated with the package is best judged by weighting the importance
appropriately. Referring to the discussion in section A.1, this admits a general convex
combination of contributions for ranking an OR (see below).
Let us consider how these are represented as functions.
π:bi−→ R(cid:17)(cid:17)
π:bi−→ R(cid:17) ± O(E2)
π:bi−→ R(cid:17)(cid:17)
π:bi−→ R(cid:17) ± O(E2).
≃Xi
ER(cid:16)S
≃Xi
ER(cid:16)S
F XOR
R
(cid:16)S
π:b∗
−→ R(cid:17) ≃ 1 −Yi (cid:16)1 − ER(cid:16)S
(36)
(37)
(38)
12
Jan Bergstra, Mark Burgess
Definition 5 (Expectation of a promise bundle) Let S (sender) and R (recipient) be agents
that make a number of promises in parallel, the composition of a bundle of parallel promises
S π:b∗
−→ R is a function FR of the expectations of the individual promises:
ER(cid:16)S π:b∗
−→ R(cid:17) P
≡ FR(cid:16)ER(cid:16)S
π:b1−→ R(cid:17) , ER(cid:16)S
π:b2−→ R(cid:17) , . . .(cid:17)
The function FR is a mapping from N promise expectations to a new expectation value:
(34)
FR : [0, 1]N → [0, 1]
(35)
Several such functions are known from reliability theory, e.g. in fault tree analysis (see for
instance ref. [18]). Examples include,
F AND
R
ER(cid:16)S
π:bi−→ R(cid:17)
(cid:16)S π:b∗
−→ R(cid:17) =Yi
−→ R(cid:17) = 1 −Yi (cid:16)1 − ER(cid:16)S
R (cid:16)S π:b∗
F OR
where O(E2) denotes terms or the order of the probability squared, which are small. A
further possibility is to take a weighted mean of the promise estimates. This better supports
the view in section A.1 about different sizes ensembles and their relative weights. There
might be additional (irrational) reasons for giving priority to certain promises, e.g. leniency
with respect to a difficult promise.
To combine the different possibilities (analogously to fault trees) one could first re-
duce products of AN D promises into sub-bundles, then recombine these using a weighted
estimate.
F RAN KED
R
P
≡Xi
αiER(cid:16)S
π:bi−→ R(cid:17)
(39)
αi = 1
Xi
Note that, due to the reasoning of probability theory, the expectation of something AND
something else is less than the probability of either. This might be seen as pessimistic as
far as trust is concerned. We have to make a policy decision about whether or not to place
any weight on the combined expectation of a bundle of promises, or whether to decide to
only allow individual expectations.
For example, suppose an agent makes two contradictory promises about services levels,
e.g. promise to respond in 4ms and promise to respond in 5ms.
S π:4−→ R
S π:5−→ R
(40)
Formally, this is a conflict, since both promises cannot be true at the same time. The trust
in each individual promise can be estimated independently for the two promises. The agent
reliability expectations of delivering “4” or “5” units of service are:
R τ :4−→ S = ER(4) = p(4) = 0.1
R
τ :5
−→ S = ER(5) = p(5) = 0.2
(41)
(42)
Local and Global Trust Based on the Concept of Promises
13
Then we can consider what the expectation of the combination of promises is. If the agent
S makes both promises simultaneously, the expectation of the combined promises will be:
ER(4 XOR 5) ≃
(e4 ER(4) + e5 ER(5))
(e4 + e5)
(43)
where e4 is our estimate of likelihood the agent can deliver “4” and e5 is the estimate
of likelihood of delivering “5”. These beliefs can be based on many potential sources of
information, chosen as a matter of policy; one possibility is to simply identify e4
and e5
P
≡ ER(5). Thus a simple policy solution could be to take
P
≡ ER(4)
ER(4 OR 5)
P
≡
ER(4)2 + ER(5)5
ER(4) + ER(5)
= 0.17
(44)
i.e. in general a sum of squares.
6.2 Incompatible promise expectation
For incompatible promises we must have at least complementary behaviour (NOT):
EA(S π:¬b−→ R) = 1 − EA(S π:b−→ R)
FR(ER(S π:¬b−→ R)) = 1 − FR(ER(S π:b−→ R))
(45)
Ideally incompatible promises would not be made, without conditionals to select only one
of the alternatives.
In the case of AN D it is necessary already to resolve the ambiguity in the meaning
of the combination of incompatible promises. It is by definition a logical impossibility for
incompatible promises to be kept. Thus, while we cannot prevent an agent from promising
such nonsense, our expectation of the combination ought to be zero.
Definition 6 (Expectation of incompatible promises with AN D) The expectation of in-
compatible promises,
π:b1−→ A2 AN D A1
FR(cid:16)A1
is defined to be zero for any rational agent.
π:b2−→ A2(cid:17) ≡ 0 when b1#b2
Hence, in the example above,
ER(4 AN D 5) = 0.
6.3 Serial promise expectation and transitivity of trust
(46)
(47)
Several systems base their operation on the idea that trust is to some extent transitive. “The
Web of Trust” notion in public key management idea proposes that trust can be conferred
transitively. This is not a property of promises, so it is of interest to consider how this
works. In other words, if A1 trusts A2 to do b, and A2 trusts A3 to do b, then A1 will often
trust A3 to do b. Here b is generally taken to be “reveal one’s true identity”. This notion
does not fit well with a promise theory interpretation of trust because it is type-unspecific.
This is easy to see by noting that
A1
π:b−→ A2, A2
π:b−→ A3 6⇒ A1
π:b−→ A3
(48)
i.e. if A1 makes a promise of b to A2 and A2 makes the same promise to A3, it does not
follow that A1 has made any promise to A3.
14
Jan Bergstra, Mark Burgess
An unspecific trust model might conform to the following property:
(i) (A1 Trusts A2), (A2 Trusts A3) ⇒ A1 Trusts A3
(49)
In terms of promises, we would interpret this to mean that, if A1 trusts A2 (to keep promises
to A1) and A2 trusts A3 (to keep promises to A2) then A1 should trust A3 to keep promises
to A1. This is far from being a rational policy, since there is no evidence passed on about
the reliability of agents. A less problematic alternative is:
(ii) (A1
τ :inform−→ A2), (A2
(50)
If A1 trusts A2 (to inform it about its relations with A3) and A2 trusts A3 (to keep its
promise of b to A2), then A1 trusts that A3 is trustworthy in its promise of b to A2.
τ :b−→ A3) ⇒ A1[A3] τ :b−→ A3[A2]
The matter of serial promises is one of diverging complication. We make some brief
notes about the problems associated with serial promises, and leave the potentially exten-
sive details for elsewhere. The problems with trusting a distributed collection of promises
are
1. Promises are not common knowledge, so we do not have all the information.
2. Promises are not transitive.
Knowledge about the promises and the local evaluations by the agents can only be
guaranteed by making chains of promises between the agents to share this knowledge.
A1
A1
π:tell rep
−→ A2
π:tell rep
−→
π:U(tell rep)
←−
A2
π:U(tell rep)
←−
A3
A3
(51)
In order to pass on the necessary information about trust to a third party, it must be re-
layed. Expectation of a chain of promises depends on a chain of such trust and Use(trust)
promises. However, each agent in the chain agrees only to trust the previous agent. There
is no automatic agreement to trust the previous members. If one were to make an explicit
promise to trust each agent’s information about trust, this would require a promise graph
like the one in fig. 2. In order to remove the ambiguity of the trust promises, we must use a
A
B
C
D
Fig. 2 A chain of trust promises to transfer some valuation of trust in one direction (only), from node
a to each agent up to node d. This method is unreliable because nodes b and c are under no obligation
to pass on the correct value. Note that these are promise arrows, not trust arrows.
This is clearly a fragile and somewhat complicated structure. An alternative approach is to avoid
chains of greater length than one, and also eliminate the extraneous and essentially impotent promises
from the chain, as in fig. 3. However, this leads us merely back to the notion of a centralization, either
in the form of a trusted party for all agents, or as a complete peer-to-peer graph.
different promise type for trust about each agent in the graph. i.e. the trust passed on from
agent a must retain this label in being transferred. However, here one has a paradox: if
an agent is potentially unreliable, then it can easily lie about this information. Such serial
chains are, in general fraught with uncertainty, thus agents might well choose, as a matter
of policy, to disregard reputations.
Local and Global Trust Based on the Concept of Promises
15
A
D
C
B
Fig. 3 A more reliable approach of passing on the trust node a holds on to nodes b, c and d.
7 Reputation
We have defined a reputation to be simply a valuation of something (not necessarily a
promise) received by an agent about some other agent. A natural basis for reputation (and
one that is used on ‘reputation systems’ in computing) is the valuation of trustworthiness.
Here we consider the effect that such transmission of information has on the local trust
within a network of agents.
7.1 Borrowed trust
Suppose that and agent T trusts an agent S to keep its promise to R with probability
ET (cid:16)S π:b−→ R(cid:17), and suppose that this agent T promises to transmit this as S’s reputation
to another agent U . U ’s estimate of the trustworthiness of T ’s communication is
τ :reputation
−→ T
U
P
≡ EU(cid:16)T
π:reputation
−→ U(cid:17)
(52)
Can we say what U ’s expectation for the reliability of the original promise a π:b−→ c should
be? In spite of the fact that probabilities for independent events combine by multiplication,
it would be presumptuous to claim that
EU(cid:16)S π:b−→ R(cid:17) = EU(cid:16)T
π:reputation
−→ U(cid:17) ET (cid:16)S π:b−→ R(cid:17) ,
(53)
worthiness and reliability of the source.
since U does not have any direct knowledge of ET (cid:16)S π:b−→ R(cid:17), he must evaluate the trust-
−→ R(cid:17),
Suppose we denote the communicated value of ET (cid:16)S
then one could conceivably (and as a matter of rational policy) choose to define
π:b
−→ R(cid:17) by EU←T (cid:16)S
π:b
EU(cid:16)S π:b−→ R(cid:17) P
≡ EU(cid:16)T
π:reputation
−→ U(cid:17) EU←T (cid:16)S π:b−→ R(cid:17) .
(54)
With this notation, we can conceivably follow historical paths through a network of promises.
However, it is important to see that no agent is obliged to make such a policy. Thus
trust and reputation do not propagate in a faithfully recursive manner. There is, moreover,
in the absence of complete and accurate common knowledge by all agents, an impossibility
of eliminating the unknowns in defining the expectation values.
16
7.2 Promised trust
Jan Bergstra, Mark Burgess
Trust is an evaluation that is private to an agent. This evaluation can be passed on in the
form of a communication (leading to reputation), or it can be passed on as a promise to
trust.
– S promises R that S will trust R: S π:τ =0.6−→ R.
– S promises R that S will trust T : S π:τ =0.6−→ R[T ].
Why would anyone promise a party (R) to trust T without telling R? One reason is that
there might be strategic bargaining advantages to doing this[20].
7.3 Updating trust with reputation
An agent can use the reputation of another agent as a sample of evidence by which to judge
its trustworthiness. It can then attach a certain weight to this information according to its
belief, in order to update its own trust. The weighted addition modifies the old trust value
T with the new reputation data R.
E 7→
wnewR + woldT
wnew + wold
(55)
This is indistinguishable from a Bayesian update.
8 Global Measures of Trust
Which are the most trusted agents in a network? Trust has so far been measured at the
location of each individual agent. The valuation is private. A trust valuation becomes an
agent’s reputation when the valuation is passed on to others. The passing-on includes a
revisional belief process too; this is also a Bayesian posterior probability update process,
just like the case of basing trust on different ensembles in section A.1.
Let us postulate the existence of a vector of received trusts that is available to any
particular agent. The agent is then able to combine this information to work out a global
measure, which we can call community trust. This is analogous to the graphical security
model in [21].
The trust matrix T is defined as follows. The (A, B)-th element of the matrix
TAB(b) ≡ EA(B
π:b
−→ ∗)
(56)
is A’s trust in B with respect to all promises of type b.
Definition 7 (Community trust (Trustworthiness and trustingness)) The global or com-
munity trust is defined by the principal eigenvectors of T and T T. Since this is a transmitted
quantity by definition it is a reputation.
The global reputations for being trustworthy W are defined by the normalized compo-
nents of the principal eigenvector of the transpose matrix:
TBAWB = λWA.
(57)
The global reputations for being most trusting S are defined by the normalized compo-
nents of the principal eigenvector
TABSB = λSA.
(58)
Local and Global Trust Based on the Concept of Promises
17
An agent is said to be trusting if it assigns a high probability of keeping its promises to
those agents that it trusts. An agent is said to be trustworthy if other agents assign it a high
probability of keeping promises to it.
Observe that, in the absence of labels about specific agent relationships, the concepts of
trustworthiness and trustingness for an agent A are properties of the global trust graph that
has A as a source, and not of an individual agent, since they are derived from relationships
and by voting.
We can easily show that this has the property of a proportional vote. Let vi denote a
vector for the trust ranking, or connectedness of the trust graph, of each node i. Then, the
trustworthiness of node i is proportional to the sum of the votes from all of i’s nearest
neighbours, weighted according to their trustworthiness (i.e. it is just the sum of their trust
valuations):
vi ∝ Xj=neighbours of i
vj .
This may be more compactly written as
vi = (const) ×Xj
Tijvj ,
(59)
(60)
where T is the trust graph adjacency matrix, whose entries Tij are 1 if i is a neighbour of
j, and 0 otherwise. We can rewrite eqn. (60) as
T v = λv .
(61)
Now one sees that the vector is actually an eigenvector of the trust matrix T . If T is an
N × N matrix, it has N eigenvectors (one for each node in the network), and correspond-
ingly many eigenvalues. The eigenvalue of interest is the principal eigenvector, i.e. that
with highest eigenvalue, since this is the only one that results from summing all of the pos-
sible pathways with a positive sign. The components of the principal eigenvector rank how
self-consistently ‘central’ a node is in the graph. Note that only ratios vi/vj of the com-
ponents are meaningfully determined. This is because the lengths v = pPi vivi of the
eigenvectors are not determined by the eigenvector equation. We normalize them here by
setting the highest component to 1. This form of well-connectedness is termed ’eigenvec-
tor centrality’ [22] in the field of social network analysis, where several other definitions of
centrality exist.
8
6
5
7
4
3
1
2
Fig. 4 An example trust graph. For simplicity all trust arrows are assumed of the same type, e.g. trust
in the promise to pay bills. Dashed lines are lines which will be removed in the second example.
18
Jan Bergstra, Mark Burgess
Note this does not assume any transitivity of trust, it says simply: each agent’s trust
worthiness is equal the sum of all the other agents’ trust measures (as if they are voting),
weighted so that the most trustworthy agents’ opinions are weighted proportionally highest.
It is a proportional representation vote by the agents about one another.
8.1 Example of global trust
Consider a number of promises of a single type, e.g. agents promise to pay their bills in
various service interactions. Each payee then rates its expectation of the payer and makes
this information globally available as a public measure of its local trust. Referring to fig. 4,
we assume the following local trusts:
τ :pay
−→ 6 = 0.2
τ :pay
−→ 6 = 0.3
τ :pay
−→ 7 = 0.1
τ :pay
−→ 7 = 0.1
τ :pay
−→ 7 = 0.1
τ :pay
−→ 7 = 0.6
τ :pay
−→ 6 = 0.5
τ :pay
−→ 8 = 0.8
τ :pay
−→ 6 = 0.2
τ :pay
−→ 8 = 0.8
τ :pay
−→ 7 = 0.3
1
2
3
4
5
6
7
6
8
7
8
0.0 0.0 0.0 0.0 0.0 0.2 0.0 0.0
0.0 0.0 0.0 0.0 0.0 0.3 0.0 0.0
0.0 0.0 0.0 0.0 0.0 0.0 0.1 0.0
0.0 0.0 0.0 0.0 0.0 0.0 0.1 0.0
0.0 0.0 0.0 0.0 0.0 0.0 0.1 0.0
0.0 0.0 0.0 0.0 0.0 0.0 0.6 0.8
0.0 0.0 0.0 0.0 0.0 0.5 0.0 0.8
0.0 0.0 0.0 0.0 0.0 0.2 0.3 0.0
The trust matrix is thus
T =
Note that the bars delineate the dashed lines which will be removed in the second exam-
ple. The normalized right eigenvector S8 represents how trusting the agents are. The left
eigenvector W8 (or the eigenvector of the transpose matrix) represents the global trustwor-
thiness:
(62)
(63)
(64)
S8 =
, W8 =
0.21
0.31
0.10
0.10
0.10
1.00
0.94
0.50
0
0
0
0
0
0.55
0.65
1.00
Thus, agent 8 is the most trustworthy. Agents 1 to 5 are not trustworthy at all in this sce-
nario, since we have not rated any promises made by them. Agent 6 is the most trusting
of all, since it gives a large amount of trust to agent 8. Thus, these two agents colour the
global picture of trust significantly through their behaviours.
Local and Global Trust Based on the Concept of Promises
19
We note that the agents with zero trust ratings are all recipients of promises; they do not
make any promises of their own. These are suppliers of whatever service or good is being
sold; they do not promise payments to anyone, hence no one needs to trust them to pay
their bills. The reader might find this artificial: these agents might make it their policy to
trust the agents even though they have made no promise. In this case, we must ask whether
the trust would be of the same type or not: i.e. would the buyers trust the suppliers to pay
their bills, or would their trust be based on a different promise, e.g. the promise to provide
quality goods.
By contrast, the agents who are not trusted are somewhat trusting by virtue of receiving
such promises of payment.
Suppose we eliminate agent number 8 (by removing the dashed lines in the figure), let
us see how the ranking changes when we delete this important agent. Now agent 6 still
remains the most trusting, but agent 7 becomes the most trusted, once again mainly due to
agent 6’s contribution.
S7 =
, W7 =
(65)
0.37
0.55
0.17
0.17
0.17
1.00
0.92
0
0
0
0
0
0.91
1.00
We can note that the symmetries of the graph are represented in the eigenvector in a natural
way.
8.2 Boundaries and allegiances
Canright and Monsen have defined regions of a graph, based on the structures that arise nat-
urally from eigenvector centrality[23]. This has been further developed for directed graphs
in ref. [24]. Trust is sometimes associated with maintaining certain boundaries or alle-
giances. The global trust model proposed above falls into a natural landscape based on the
graph, that is characterized by local maxima. Agents cluster naturally into distinct hills of
mutual trust, separated by valleys of more tenuous trust, in the centrality function.
This characterization is a useful way of identifying a community structure. Humans
are not very good at understanding boundaries: they understand identities. e.g. a company
name, but where is the real boundary of the company or computer system? Its tendrils
of influence might be farther or closer than one imagines. The topology of underlying
promises offers a quantifiable answer to this question. Such allegiances can be compared
to the notion of a coalition in game theory[25,26].
9 Trust architectures
Trust is closely associated with information dissemination. There are essentially only two
distinct models for achieving information distribution: centralization and ad hoc epidemic
flooding. Alternatively one might call them, central-server versus peer-to-peer.
Two so-called trust models are used in contemporary technologies today, reflecting
these approaches: the Trusted Third Party model (e.g. X.509 certificates, TLS, or Kerberos)
and the Web of Trust (as made famous by the Pretty Good Privacy (PGP) system due to Phil
Zimmerman and its subsequent clones). Let us consider how these models are represented
in terms of our promise model.
20
Jan Bergstra, Mark Burgess
9.1 Trusted Third Parties
The centralized solution to “trust management” is the certificate authority model, intro-
duced as part of the X.509 standard and modified for a variety of other systems (See fig.
5)[27,28,29]. In this model, a central authority has the final word on identity confirmation
and often acts as a broker between parties, verifying identities for both sides.
The authority promises (often implicitly) to all agents the legitimacy of each agent’s
identity (hopefully implying that it verifies this somehow). Moreover, for each consulta-
tion the authority promises that it will truthfully verify an identity credential (public key)
that is presented to it. The clients and users of this service promise that they will use this
confirmation. Thus, in the basic interaction, the promises being made here are:
π:Legitimate
−→
Authority
Authority π:Verification
π:U(Verification)
−→
User
−→
User
User
Authority
(66)
(67)
(68)
To make sense of trust, we look for expectations of the promises being kept.
1. The users expect that the authority is legitimate, hence they trust its promise of legiti-
macy.
2. The users expect that the authority verifies identity correctly, hence they trust its promise
of verification and therefore use it.
Users do not necessarily have to be registered themselves with the authority in order to use
its services, so it is not strictly necessary for the authority to trust the user. However, in
registering as a client a user also promises its correct identity, and the authority promises
to use this.
User
π:Identity
−→ Authority
Authority
π:U(Identity)
−→ User
(69)
(70)
One can always discuss the evidence by which users would trust the authority (or third
party). Since information is simply brokered by the authority, the only right it has to legit-
imacy is by virtue of a reputation. Thus expectation 1. above is based, in general, on the
rumours that an agent has heard.
CERT AUTH
Users/clients
Fig. 5 The Trusted Third Party, e.g. TLS or Kerberos. A special agent is appointed in the network
as the custodian of identity. All other agents are expected to trust this. The special agent promises to
verify the authenticity of an object that is shared by the agents. In return for this service, the agents
pay the special agent.
Most of the trust is from users to the authority, thus there is a clear subordination of
agents in this model. This is the nature or centralization.
Local and Global Trust Based on the Concept of Promises
21
9.2 Web of Trust
Scepticism in centralized solutions (distrust perhaps) led to the invention of the epidemic
trust model, known as the Web of Trust (see fig. 6)[30]. In this model, each individual agent
is responsible for its own decisions about trust. Agents confirm their belief in credentials
by signing one another’s credentials. Hence if I trust A and A has signed B’s key then I am
more likely to trust B.
As a management approximation, users are asked to make a judgement about a key
from one of four categories: i) definitely trustworthy, ii) somewhat trustworthy, iii) un-
trustworthy, iv) don’t know.
An agent then compares these received valuations to a threshold value to decide whether
or not a credential is trustworthy to it.
The promises are between the owner of the credential and a random agent:
Owner
π:Identity
−→
Agent
Agent
π:U(Identity)
−→
Owner
Agent
π:Signature
−→
Owner
Owner
π:U(Signature)
−→
Agent
(71)
(72)
(73)
(74)
The owner must first promise its identity to an agent it meets. The agent must promise to
believe and use this identity credential. The agent then promises to support the credential
by signing it, which implies a promise (petition) to all subsequent agents. Finally, the owner
can promise to use the signature or reject it. Trust enters here in the following ways:
1. The agent expects that the identity of the owner is correct and trusts it. This leads to a
Use promise.
2. The Owner expects that the promise of support is legitimate and trusts it. This leads to
a Use promise.
What is interesting about this model is that it is much more symmetrical than the central-
ized scheme. It has certain qualities that remind us of our definition of global trust in section
8. However, it is not equivalent to our model, since the very nature of the web of trust is
dictated by the transactions in the model, which are automatically bilateral (ours need not
be). Moreover, the information is passed on in a peer to peer way, where as our global ide-
alization makes trust valuations common knowledge (global reputations). In some respects,
the web of trust is a pragmatic approximation to the idealized notion of trust in section 8.
The main differences are:
– In the Web of trust, a limited number of expectation values is allowed and the user does
not control these, i.e. there are few policy choices for agent expectation allowed.
– An agent does not see a complete trust or promise graph. It sees only the local cluster
to which it is connected. This is sufficient to compute a global trust for that component
of the graph.
– The Web of Trust graph is always bilateral, with arrows moving in both directions, thus
no one is untrusted, or un-trusting.
– The information to construct a fully self-consistent measure of trust is not available in
the system. Hence there is no clear measure of who is more trustworthy in the web of
trust.
Some of these limitations could no doubt be removed. A Bayesian approach could
naturally lead to a better approximation. However, a basic flaw in these implementation
mechanisms is the need to trust of the mediating software itself. Since, as we have shown,
trust is not necessarily transitive, one ends up in most cases trusting the software that is
supposed to implement the trust management rather than the parties themselves.
22
Jan Bergstra, Mark Burgess
sign
sign
Fig. 6 In a web of trust an agent signals a promise to all other agents that it has trusted the authen-
ticity of the originator’s identity. As a key is passed around (second figure) agents can promise its
authenticity by signing it or not.
10 Conclusions
The concept of promises provides a foundation that has been unclear in discussions of trust.
It allows us to decouple the probabilistic aspect from the network aspect of policy relation-
ships, without introducing instantaneous events. It provides (we claim) a natural language
for specific policies, extended over time. Promises have types and denote information flow
which in turn allows us to discuss what is trusted and by whom. We believe the use of
promises to be superor to a definition based on actions, since the localization of actions as
space-time events makes trust ill-defined if the action has either not yet been executed or
after it has been executed.
Promises allow us to relate trust and trust-reputation in a generic way, and suggest an
algorithm from which to derive global network properties, based on social network theory.
This is a significant improvement over previous models. Reputation is not uniquely coupled
to trust, of course – it can be related to many different valuations of promised behaviour,
including wealth, kindness etc.
We show how bundles of promises can be combined using the rules for probabilistic
events (similar to fault tree analysis) and we model the two main trust architectures easily.
The PGP Web of Trust as well as the Trusted Third Party can be explained as a special case
the global trust models derived here; however standard tools do not permit users to see the
entire web, or measure relative trust-worthiness in a community using these implementa-
tions.
In future work there is the possibility to use this notion of trust in explicit systems.
The Unix configuration system cfengine[31] uses the notion of promises and agent auton-
omy to implement a policy based management system. The trustworthiness of hosts with
respect to certain different behaviours can be measured directly by neighbouring agents to
whom promises are made. More generally, if one has a monitoring system that one believes
trustworthy to begin with, it is possible to observe whether an agent stops keeping its own
promises about security issues. This might be a signal to reevaluate one’s expectation that
the system is trustworthy. These tests have been partially imeplemented in cfengine and are
presently being tested.
Trust is merely an expression of policy and it is therefore fundamentally ad hoc. Promises
reveal the underlying motives for trust and whether they are rationally or irrationally formed.
Local and Global Trust Based on the Concept of Promises
23
Acknowledgement. We are grateful to Jurgen Schonwalder for his hospitality at the
International University of Bremen in the summer of 2006, where most of this work was
done. This work is supported in part by the EC IST-EMANICS Network of Excellence
(#26854).
References
1. J. Bergstra and M. Burgess. A static theory of promises. Technical report, arXiv:0810.3294v1,
2008.
2. Mark Burgess. An approach to understanding policy based on autonomy and voluntary co-
In IFIP/IEEE 16th international workshop on distributed systems operations and
operation.
management (DSOM), in LNCS 3775, pages 97–108, 2005.
3. M. Burgess and S. Fagernes. Pervasive computing management: A model of network policy with
local autonomy. IEEE Transactions on Software Engineering, page (submitted).
4. M. Burgess and S. Fagernes. Voluntary economic cooperation in policy based management.
IEEE Transactions on Network and Service Management, page (submitted).
5. M. Burgess and S. Fagernes. Autonomic pervasive computing: A smart mall scenario using
promise theory. Proceedings of the 1st IEEE International Workshop on Modelling Autonomic
Communications Environments (MACE); Multicon verlag 2006. ISBN 3-930736-05-5, pages
133–160, 2006.
6. L. LaPadula. A rule-set approach to formal modelling of a trusted computer system. Computing
systems (University of California Press: Berkeley, CA), 7:113, 1994.
7. M.D. McIlroy. Virology 101. Computing systems (University of California Press: Berkeley, CA),
2:173, 1989.
8. I.S. Winkler. The non-technical threat to computing systems. Computing systems (MIT Press:
Cambridge MA), 9:3, 1996.
9. M. Patton and A. Jøsang. Technologies for trust in electronic commerce. Electronic Commerce
Research Journal, 4:9–21, 2004.
10. Audun Jøsang, Claudia Keser, and Theo Dimitrakos. Can we manage trust? In Proceedings of
the Third International Conference on Trust Management (iTrust), Versailes, 2005.
11. T. Dong Huynh, Nicholas R. Jennings, and Nigel R. Shadbolt. Developing an integrated trust and
reputation model for open multi-agent systems. In Rino Falcone, Suzanne Barber, Jordi Sabater,
and Munindar Singh, editors, AAMAS-04 Workshop on Trust in Agent Societies, 2004.
12. J. Kluwer and A. Waaler. Trustworthiness by default, 2005.
13. J. Kluwer and A. Waaler. Relative trustworthiness. In Formal Aspects in Security and Trust:
Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised
Selected Papers, Springer Lecture Notes in Computer Science 3866, pages 158–170, 2006.
14. T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In Proceedings
of the European Symposium on Research in Computer Security (ESORICS), LNCS, volume 875,
pages 3–18. Springer, 1994.
15. Audun Jøsang and Simon Pope. Semantic constraints for trust transitivity.
In APCCM ’05:
Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, pages 59–68, Dar-
linghurst, Australia, Australia, 2005. Australian Computer Society, Inc.
16. D. Fahrenholtz and A. Bartelt. Towards a sociological view of trust in computer science.
In
Proceedings of the Eighth Research Symposium on Emerging Electronic Markets (RSEEM 01),
page 10, 2001.
17. R. Axelrod. The Evolution of Co-operation. Penguin Books, 1990 (1984).
18. A. Høyland and M. Rausand. System Reliability Theory: Models and Statistical Methods. J.
Wiley & Sons, New York, 1994.
19. M. Burgess. Analytical Network and System Administration — Managing Human-Computer
Systems. J. Wiley & Sons, Chichester, 2004.
20. The Strategy of Conflict. Harvard Univesity Press, Cambridge, Mass., 1960.
21. M. Burgess, G. Canright, and K. Engø. A graph theoretical model of computer security: from
file access to social engineering. International Journal of Information Security, 3:70–85, 2004.
22. P. Bonacich. Power and centrality: a family of measures. American Journal of Sociology,
92:1170–1182, 1987.
23. G. Canright and K. Engø-Monsen. A natural definition of clusters and roles in undirected graphs.
Science of Computer Programming, 53:195, 2004.
24
Jan Bergstra, Mark Burgess
24. M. Burgess, G. Canright, and K. Engø. Inportance-ranking functions from the eigenvectors of
directed graphs. Journal of the ACM (Submitted), 2004.
25. J.V. Neumann and O. Morgenstern. Theory of games and economic behaviour. Princeton Uni-
versity Press, Princeton, 1944.
26. A. Rapoport. N-Person Game Theory: Concepts and Applications. Dover, New York, 1970.
27. ITU-T. Open Systems Interconnection - The Directory: Overview of Concepts, models and ser-
vice. Recommendation X.500. International Telecommunications Union, Geneva, 1993.
28. ITU-T Recommendation. X.509 (1997 e): Information technology - open systems interconnec-
tion - the directory: Authentication framework. Technical report, 1997.
29. R. Housley, W. Polk, W. Ford, and D. Solo. Internet x.509 public key infrastructure: Certificate
and certificate revocation list (crl) profile. http://tools.ietf.org/html/rfc3280, 2002.
30. A. Abdul-Rahman. The pgp trust model. EDI-Forum: the Journal of Electronic Commerce,
1997.
31. M. Burgess. Cfengine www site. http://www.cfengine.org, 1993.
32. G.R. Grimmett and D.R. Stirzaker. Probability and random processes (3rd edition). Oxford
scientific publications, Oxford, 2001.
33. J. Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Mor-
gen Kaufmann, San Francisco, 1988.
A Expectation
Here we expand on our notion of an expectation function for completeness. These details
are not essential to the arguments in the rest of the paper.
An expectation function is a statistical concept that relies either on a body of evidence,
or alternatively on a belief informed by limited observation. Such evidences or beliefs are
summarized by a probability distribution over the different possible outcomes. We shall
consider mainly the outcomes “promise kept” and “promise not kept”, though varying de-
grees are possible.
The notion of an expectation value is well known from the theory of probability and
can be based on either classical frequentist-probability or Bayesian belief-probability[32].
There is, for this reason, no unique expectation operator.
Why dabble in intangibles such as beliefs? Computer systems are frequently asked to
trust one another without ever having met (for example when they automatically download
patches and updates from their operating system provider, virus update from third-parties
or even accept the word of trusted third parties in identification) – thus they have little or no
empirical evidence to go on. Each time they interact however, they are able to revise their
initial estimates on the basis of experience. In this regard, a Bayesian view of probability
is a natural interpretation, see e.g. [33]. This is a subjective view of probability that works
well with our subjective agents.
Definition 8 (Expectation function E(X)) Given random variables X, Y , an expectation
operator or function has the properties:
1. If X ≥ 0, E(X) ≥ 0.
2. If a, b ∈ R, then E(aX + bY ) = aE(X) + bE(Y ).
3. E(1) = 1.
For a probability distribution over discrete classes c = 1 . . . C, it is the convex sum
C
Xc=1
pcXx (cid:12)(cid:12)(cid:12)
C
Xc=1
E(X) =
pc = 1.
(75)
The expectation value of a Bernoulli variable (with value 0 or 1) is clearly just equal to the
probability of obtaining 1 p1 = P r(X = 1). In general, a promise might lead to more than
one outcome, several of which might be acceptable ways of keeping the promise, however
this possibility only complicates the story for now, hence we choose to consider only the
simplest case of
Local and Global Trust Based on the Concept of Promises
25
Definition 9 (Agent expectation EA(a π:b−→ c)) The agent expectation EA(X) is defined
to be the agent A’s estimation of the probability that a promise a π:b−→ c will be kept.
This can be realized in any number of different ways, e.g. as a mapping from an ensemble
of evidence of size N (with the binary outcomes 0 and 1) into the open interval:
EA : {0, 1}N → [0, 1]
(76)
or it could could be an ad hoc value selected from a table of pre-decided values.
A.1 Ensembles and samples of evidence
An ensemble is a collection of experiments that test the value of a random variable. In one
experiment, we might evaluate the agent expectation to be p1. In another, we might evaluate
it to be P1. What then is the probability we should understand from the ensemble of both?
We expect that the appropriate answer is an average of these two values, but what if we
attach more importance to one value than to the other? Probabilities discard an essential
piece of information: the size of the body of evidence on which they are based. Let us
consider this important point for a moment.
In the frequentist interpretation of probability, all esti-
A.1.1 Frequentistic interpretation
mates are based on past hard evidence. Probabilities are considered reliable as estimators of
future behaviour if they are based on a sufficiently large body of evidence. Let lower-case
p1 = n1/n, the probability of keeping a promise, be based on a total of n measurements,
of which the frequencies n1 were positive and n0 were negative, with n1 + n0 = n. Also,
let upper-case P1 = N1/N be an analogous set of measurements for which N 6= n. How
should we now combine these two independent trials into a single value for their ensemble?
In the frequentist interpretation of probability, the answer is clear: we simply com-
bine all the original data into one trial and see what this means for the probabilities.
Rationally, the combined probability E for the ensemble must end up having the value
E = (n1 + N1)/(n + N ). If we express this result in terms of the probabilities, rather than
the frequencies, we have
E =(cid:18) n
n + N(cid:19) p1 +(cid:18) N
n + N(cid:19) P1 =
n1 + N1
n + N
(77)
This leads us to the intuitive conclusion that the probabilities should be combined according
to a weighted average, in which the weights are chosen to attach proportionally greater
importance to the larger trial:
E = α1p1 + α2P1, α1 + α2 = 1.
(78)
In general, then, with T trials of different sizes, the result would be a convex combination
of the expectations from each trial:
T
T
E =
αipi,
αi = 1.
(79)
Xi=1
Xi=1
In the case that there are more possible outcomes than simply 0 and 1, the same argument
applies for each outcome.
The problem occurs when we do not have complete knowledge of the sample sizes
n, N, . . . etc., for, in this case, we can only guess the relative importances αi, and choose
them as a matter of policy. If, for example, we could choose to make all the αi equally
important, in which case we have no control over the importance of the expectations.
This so-called frequentist interpretation of expectation or probability generally requires
a significant body of evidence in the form of independent events to generate a plausible
26
Jan Bergstra, Mark Burgess
estimate. However, in most ad hoc encounters, we do not have such a body of evidence.
Trust is usually based on just a handful of encounters, and one’s opinion of the current
evidence is biased by prior expectations. Hence, we turn to the alternative interpretation or
Bayesian probability.
A.1.2 Bayesian interpretation The policy formula in eqn. (79) is essentially a Bayesian
belief formula, which can be derived from the classic Bayes interpretation for a posteriori
belief.
Suppose we devise an experimental test e to determine whether a hypothesis H of ex-
pected trustworthiness is true. We repeat this test, or borrow other agent’s observations, thus
collecting n of these e1 . . . en. The result for P (Hen, e), our belief in the trustworthiness-
hypothesis given the available evidence, changes by iteration according to:
P (Hen, e) =
P (Hen) × P (een, H)
P (een, H)P (Hen) + P (een, ¬H)P (¬Hen)
(80)
where we feed back one value P (Hen−1, e) from the previous iteration as P (Hen), and
we must revise potentially two estimates on each iteration:
– P (een, H) is our estimate that the test e will show positive as a direct result of the
Hypothesis being true, i.e. because the host was trustworthy.
– P (een, ¬H) is our estimate of how often e is true due to other causes than the hypoth-
esis H of trustworthiness, e.g. due to trickery.
Note that P (¬Hen) = 1 − P (Hen). This gives us a definite iterative procedure based on
well-accepted Bayesian belief networks for updating our policy on trust[33]. It can easily
be seen that eqn. (79) has this form, but lacks a methodology for rational policy-making.
The advantage of a Bayesian interpretation of policy then, is that it fits well with the
notion of trust as a policy decision.
A.2 Policy and rationality
What kind of policy should be employed in defining the expectation of future behaviour?
Probability theory is built on the assumption that past evidence can motivate a prediction of
the future. At the heart of this is an assumption that the world is basically constant. How-
ever, future prediction is the essence of gambling: there are scenarios in which evidence of
the past is not an adequate guide to future behaviour. An agent might also look elsewhere
for guidance.
– Initialization: An agent of which we have initially no experience might be assigned an
2 , or 0 if we are respectively trusting, neutral or un-trusting by
initial trust value of 1, 1
nature.
– Experience: One’s own direct experience of a service or promise has primacy as a basis
for trusting an agent in a network. However, an optimistic agent might choose not to
allow the past to rule the future, believing that agents can change their behaviour, e.g.
“the agent was having a bad day”.
– Advice: An agent might feel that it is not the best judge and seek the advice of a rep-
utable or trustworthy agent. “Let’s see what X thinks”. We shall use this idea in section
8 to define a global trustworthiness.
– Reputation: Someone else’s experience with a promise can serve as an initial value for
our own trust.
– Damnation: Some agents believe that, if an agent fails even once to fulfil a promise,
then it is completely un-trustworthy. This extreme policy seems excessive, since there
might be reasons beyond the control of the agent that prevent it from delivering on its
promise.
Local and Global Trust Based on the Concept of Promises
27
If we lack any evidence at all about the trustworthiness of an agent with respect to a
given promise, we might adopt a policy of using the agent’s record of keeping other kinds
of promises.
Proposal 4 (Transference of evidence) In the absence of direct evidence of type t(b), in a
promise body b, one may use a policy determined mixture of values from other types as an
initial estimate.
The rationality of such a procedure can easily be questioned, but there is no way to rule out
the ad hoc decision as a matter of policy.
|
1502.01253 | 2 | 1502 | 2016-11-27T13:26:39 | Prices Matter for the Parameterized Complexity of Shift Bribery | [
"cs.MA"
] | In the Shift Bribery problem, we are given an election (based on preference orders), a preferred candidate $p$, and a budget. The goal is to ensure that $p$ wins by shifting $p$ higher in some voters' preference orders. However, each such shift request comes at a price (depending on the voter and on the extent of the shift) and we must not exceed the given budget. We study the parameterized computational complexity of Shift Bribery with respect to a number of parameters (pertaining to the nature of the solution sought and the size of the election) and several classes of price functions. When we parameterize Shift Bribery by the number of affected voters, then for each of our voting rules (Borda, Maximin, Copeland) the problem is W[2]-hard. If, instead, we parameterize by the number of positions by which $p$ is shifted in total,then the problem is fixed-parameter tractable for Borda and Maximin,and is W[1]-hard for Copeland. If we parameterize by the budget, then the results depend on the price function class. We also show that Shift Bribery tends to be tractable when parameterized by the number of voters, but that the results for the number of candidates are more enigmatic. | cs.MA | cs |
Prices Matter for the Parameterized Complexity of
Shift Bribery
Robert Bredereck1, Jiehua Chen1, Piotr Faliszewski2, Andr´e Nichterlein1, and
Rolf Niedermeier1
1Institut fur Softwaretechnik und Theoretische Informatik, TU Berlin, Berlin, Germany
{robert.bredereck, jiehua.chen, andre.nichterlein, rolf.niedermeier}@tu-berlin.de
2AGH University of Science and Technology, Krakow, Poland [email protected]
Abstract
In the Shift Bribery problem, we are given an election (based on preference orders), a
preferred candidate p, and a budget. The goal is to ensure p's victory by shifting p higher in
some voters' preference orders. However, each such shift request comes at a price (depending
on the voter and on the extent of the shift) and we must not exceed the given budget. We
study the parameterized computational complexity of Shift Bribery with respect to a
number of parameters (pertaining to the nature of the solution sought and the size of the
election) and several classes of price functions. When we parameterize Shift Bribery by
the number of affected voters, then for each of our voting rules (Borda, Maximin, Copeland)
the problem is W[2]-hard. If, instead, we parameterize by the number of positions by which
p is shifted in total, then the problem is fixed-parameter tractable for Borda and Maximin,
and is W[1]-hard for Copeland. If we parameterize by the budget, then the results depend
on the price function class. We also show that Shift Bribery tends to be tractable when
parameterized by the number of voters, but that the results for the number of candidates
are more enigmatic.
1
Introduction
Rank aggregation and election-winner determination are of key importance in various economical
and political settings. For instance, there are product rankings based on comparing their prices,
their features, and different tests (performed by various institutions such as foundations, journals,
etc.); universities are judged based on multiple different criteria (e.g., the number of students per
faculty member, availability of particular facilities, the number of Nobel prize winners employed
etc.); sport competitions involve multiple rankings (for example, a Formula 1 season consists of
about twenty races, each resulting in a ranking of the drivers); and political elections require
members of the society to express preferences regarding the participating candidates. In each of
these cases the provided rankings are aggregated into the final one, often of significant importance
(for example, customers decide on their purchases based on product rankings, students pick the
best-ranked universities, the Formula 1 world champion is the driver who comes out first in the
aggregated ranking, and the most appreciated candidate becomes the country's president). A
1
sophisticated way of dealing with rankings based on multiple different criteria is to compute
a consensus ranking using preference-based rank aggregation methods.1 In order to affect the
outcome of the rank aggregation one has to influence the component rankings obtained from
different sources (different product tests, different judgment criteria, different races, different
voters). Clearly, the cost of influencing may differ from source to source and, indeed, can
sometimes be quite high. Nonetheless, the effect of improved position in the final ranking can
be very beneficial.
In this work, we study the computational complexity of affecting the outcome of the rank
aggregation by "bribing" specific agents to change their rankings. Moreover, replacing "bribery"
with "product development," or "university expansion," or "training," or "political campaign-
ing" we see that our work is relevant to all the settings mentioned above; the particular entities
(companies offering their products, universities, drivers, politicians) can find out how much effort
they need to invest in order to achieve a better position in the aggregated ranking (or maybe
even become the winner). A natural and simple model in this context, using the formalisms of
voting theory, is Shift Bribery as introduced by Elkind et al. [32]. We extend their studies
in terms of charting the border of computational worst-case tractability, herein putting partic-
ular emphasis on the voter-specific "shifting prices" (how expensive it is to shift a candidate by
x positions "up").
Informally (see Section 3 for a formal definition), Shift Bribery is the following decision
problem:
Shift Bribery
Input: An election, that is, a set of candidates and a set of voters, each with a linear
preference order over the candidate set, some preferred candidate p, and some budget.
Question: Can we make p win by bribing voters to shift p higher in their preference
orders by "paying" no more than the given budget?
We assume that we have the knowledge of the voters' preference orders (for example, from
preelection polls). Further, in our example settings often the full rankings are known. For
example, a driver preparing for a new Formula 1 season has full knowledge of the results from
the previous one. Our Shift Bribery problem models the situation where we approach each
of the voters, one-on-one, and try to convince2 him or her to rank p higher. Naturally, the effect
(the number of positions by which p is shifted in each voter's preference order) depends on the
voter's character and situation, and on the amount of effort we invest into convincing the voter.
This "effort" could, for example, mean the amount of time spent, the cost of implementing a
particular change, or, in the bribery view of the problem, the payment to the voter. Thus, the
computational complexity of the problem depends on the voting rule used in the election, on
various election parameters such as the numbers of candidates and voters, and on the type of
1For example, the German website idealo.de aggregates different product tests by first translating the test
results into a unified rating system and then taking the "average" of all the ratings. Various university rankings
are prepared in a similar way. It would be very interesting, however, to utilize the rankings themselves, instead
of the ratings, for the aggregation. Moreover, Formula 1 racing (and numerous similar competitions) use pure
ranking information (e.g., Formula 1 uses a very slightly modified variant of the Borda election rule).
2What "to convince" means can vary a lot depending on the application scenario. On the evil side we have
bribery, but it can also mean things such as product development, hiring more faculty members, training on a
particular racing circuit, or explaining the details of one's political platform. Clearly, different ranking providers
may appreciate different efforts, which is modeled by the individual price functions.
2
price functions describing the efforts needed to shift p up by a given number of positions in the
voters' preference orders. Our goal is to unravel the nature of these dependencies.
Related Work. The computational complexity of bribery in elections was first studied by
Faliszewski et al. [35]. They considered the Bribery problem, where one asks if it is possible to
ensure that a given candidate is an election winner by changing at most a given number of votes.
Its priced variant, $Bribery, is the same except that each voter has a possibly different price
for which we can change his or her vote. These problems were studied for various election rules,
including Borda [35, 22], Maximin [38], and Copeland [36] (see Section 2 for exact definitions of
these rules). Recently, Gertler et al. [42] studied the bribery problem for linear ranking systems.
Notably, the destructive variant of the Bribery problem (known under the name Margin of
Victory), where the goal is to ensure that a despised candidate does not win (and which was
studied, e.g., by Magrino et al. [50] and Xia [60]) has a surprisingly positive motivation-it can
be used to detect fraud in elections.
The above problems, however, do not take into account that the price of bribing a voter
may depend on what vote we wish the "bribed" voter to cast. For example, a voter might
be perfectly happy to swap the two least preferred candidates but not the two most preferred
ones. To model such situations, Elkind et al. [32] introduced the Swap Bribery problem. They
assumed that each voter has a swap-bribery price function which gives the cost of swapping each
two candidates (provided they are adjacent in the voter's preference order; one can perform a
series of swaps to transform the voter's preference order in an arbitrary way). They found that
Swap Bribery is both NP-hard and hard to approximate for most well-known voting rules
(essentially, because the Possible Winner problem [47, 61, 6, 4], which is NP-hard for almost
all natural voting rules, is a special case of Swap Bribery with each swap costing either zero or
infinity). Motivated by this, Dorn and Schlotter [28] considered the parameterized complexity
of Swap Bribery for the case of k-Approval (where each voter gives a point to his or her top k
candidates). In addition, Elkind et al. [32] also considered Shift Bribery, a variant of Swap
Bribery where all the swaps have to involve the preferred candidate p. They have shown that
Shift Bribery remains NP-hard for Borda, Maximin, and Copeland but that there is a 2-
approximation algorithm for Borda and a polynomial-time algorithm for the k-Approval voting
rule. Shift Bribery was further studied by Elkind and Faliszewski [31], who viewed it as a
political campaign management problem (and whose view we adopt in this paper), and who gave
a 2-approximation algorithm for all scoring rules (generalizing the result for Borda) and other
approximation algorithms for Maximin and Copeland. Then, Schlotter et al. [59] have shown
that Shift Bribery is polynomial-time solvable for the case of Bucklin and Fallback voting
rules.
Based on the idea of modeling campaign management as bribery problems, other researchers
introduced several variants of bribery problems. For example, Schlotter et al. [59] introduced
Support Bribery and Baumeister et al. [5] introduced Extension Bribery (both problems
model the setting where voters cast partial votes that rank some of their top candidates only,
and the briber extends these votes; they differ in that the former assumes that the voters know
their full preference orders but do not report them completely and the latter assumes that the
voters have no preferences regarding the not-reported candidates).
There is quite a lot of research on various other algorithmic aspects of elections. Reviewing
this literature is beyond the scope of this paper, but we point the readers to some of the recent
3
surveys [10, 25, 37, 33, 11] and to recent textbooks [13, 57].
Our Contributions. For the Borda, the Maximin, and the Copeland rules, Elkind et al. [31,
32] have shown that Shift Bribery has high worst-case complexity, but that one can deal
with it using polynomial-time approximation algorithms. To better understand where the in-
tractability of Shift Bribery really lies in different special cases, we use another approach of
dealing with computationally hard problems, namely parameterized complexity analysis and,
more specifically, the notion of fixed-parameter tractability and the correspondingly developed
exact algorithms. For instance, almost tied elections are tempting targets for Shift Bribery.
An exact algorithm which is efficient for this special case may be more attractive than a general
approximation algorithm. In close-to-tied elections it might suffice, for example, to contact only
a few voters or, perhaps, to shift the preferred candidate by only a few positions in total. Simi-
larly, it is important to solve the problem exactly if one has only a small budget at one's disposal.
This is captured by using various problem parameterizations and performing a parameterized
complexity analysis.
Furthermore, it is natural to expect that the computational complexity of Shift Bribery
depends on the nature of the voters' price functions and, indeed, there is some evidence for this
fact: For example, if we assume that shifting p by each single position in each voter's preference
order has a fixed unit price or, at the very least, if functions describing the prices are convex,
then one can verify that the 2-approximation algorithm of Elkind and Faliszewski [31] boils down
to a greedy procedure that picks the cheapest available single-position shifts until it ensures the
designated candidate's victory (such an implementation would be much faster than the expensive
dynamic programming algorithm that they use, but would guarantee a 2-approximate solution
for convex price functions only). On the contrary, the hardness proofs of Elkind et al. [32] all use
a very specific form of price functions which we call all-or-nothing prices, where if one decides
to shift the preferred candidate p in some vote, then the cost of this shift is independent of how
far one shifts p. In effect, one might as well shift p to the top of the vote. See Section 3 for the
definitions of the different price functions that we study.
We combine the above two sets of observations and we study the parameterized complexity
of Shift Bribery for Borda, Maximin, and Copelandα, for parameters describing the number
of affected voters, the number of unit shifts, the budget, the number of candidates, and the
number of voters, under price functions that are either all-or-nothing, sortable, arbitrary, convex,
or have a unit price for each single shift. The three voting rules that we select are popular
in different kinds of elections apart from political ones. For instance, Borda is used by the
X.Org Foundation to elect its board of directors, its modified variant is used for the Formula 1
World Championship (and numerous other competitions including, e.g., ski-jumping, and song
contests). A slightly modified version of Copeland is used to elect the Board of Trustees for the
Wikimedia Foundation.
We summarize our results in Table 1, and we discuss them throughout the paper. In short, it
turns out that indeed both the particular parameters used and the nature of the price functions
have strong impact on the computational complexity of Shift Bribery. Three key technical
contributions of our work are:
1. novel FPT approximation schemes exploiting the parameters "number of voters" and
"number of candidates" (such schemes are rare in the literature and of significant practical
interest),
4
parameter
R
#shifts (t)
B/M [Thm 1 & 3]
C
[Thm 4]
#affected voters (na)
Shift Bribery
unit
prices
convex
prices
arbitrary sortable all-or-nothing
prices
prices
prices
FPT
FPT
W[1]-h W[1]-h W[1]-h W[1]-h W[1]-h
FPT
FPT
FPT
B/M/C [Thm 5]
W[2]-h W[2]-h W[2]-h W[2]-h W[2]-h
budget (B)
B/M [Cor 2]
[Cor 3]
C
#voters (n)
FPT
W[2]-h W[2]-h W[2]-h
FPT
W[1]-h W[1]-h W[2]-h W[2]-h W[2]-h
B/M [Pro 2]
C
[Thm 7 & Pro 2] W[1]-h W[1]-h W[1]-h W[1]-h
W[1]-h⋆ W[1]-h⋆ W[1]-h⋆ W[1]-h⋆ FPT
FPT
#candidates (m)
B/M/C [Thm 9]
#voters (n)
B/M/C [Thm 7]
#candidates (m)
B/M/C [Thm 8]
FPT♠
XP
XP
FPT♦
FPT♦
Shift Bribery(O)
FPT-AS for all considered price function families
FPT-AS for sortable prices
Table 1: The parameterized complexity of R Shift Bribery and R Shift Bribery(O) for
Borda (B), Maximin (M), and Copelandα (C) (for each rational number α, 0 ≤ α ≤ 1). Note that
Shift Bribery(O) is the optimization variant of Shift Bribery, which seeks to minimize the
budget spent. "W[1]-h" (resp. "W[2]-h") stands for W[1]-hard (resp. W[2]-hard). Definitions for
FPT, W[1], W[2], XP are provided in Section 2.3. The W[1]-hardness results marked with "⋆"
follow from the work of Bredereck et al. [21]. The FPT result marked with "♠" follows from
the work of Dorn and Schlotter [28]. The FPT results marked with "♦" follow from the work of
Bredereck et al. [20].
2. a surprising W[1]-hardness result for the parameter "number of voters" when using Copelandα
voting (contrasting fixed-parameter tractability results when using Borda and Maximin),
and
3. a partial kernelization (polynomial-time data reduction) result for the parameter "number
of unit shifts".
5
Article Outline. The paper is organized as follows.
In Section 2 we present preliminary
notions regarding elections and parameterized complexity theory. In Section 3 we formally de-
fine the Shift Bribery problem, together with its parameterizations and definitions of price
functions. Our results are in Section 4 (parameterization by solution cost) and Section 5 (pa-
rameterization by solution election size). We discuss an outlook of our research in Section 6.
In the appendix we provide those proofs that were omitted from the main part for the sake of
readability.
2 Preliminaries
Below we provide a brief overview of the notions regarding elections and parameterized com-
plexity theory.
2.1 Elections and Voting Rules
We use the standard, ordinal model of elections where an election E = (C, V ) consists of a set
C = {c1, . . . , cm} of candidates and a set V = {v1, . . . , vn} of voters. Each voter v provides a
preference order over C, i. e., a linear order ranking the candidates from the most preferred one
(position 1) to the least preferred one (position m). For example, if C = {c1, c2, c3}, then writing
v : c1 ≻ c2 ≻ c3 indicates that voter v likes c1 best, then c2, and then c3. For two candidates
ci, cj and voter v we write v : ci ≻ cj to indicate that v prefers ci to cj. Further, we write ≻v
to denote voter v's preference order. Given an election E, for each two candidates c and d, we
define NE(c, d) to be the number of voters in E who prefer c over d.
A voting rule R is a function that given an election E outputs a non-empty set ∅ 6= R(E) ⊆ C
of the tied winners of the election. Note that we use the nonunique-winner model, where each
of the tied winners is considered a winner and we disregard tie-breaking. This is a standard
assumption in papers on bribery in elections [35, 32, 31, 59, 28, 5]. However, we mention that
various types of tie-breaking can sometimes affect the complexity of election-related problems
quite significantly [55, 56, 34, 26]. Furthermore, we implicitly assume that all voting rules that
we consider are anonymous, i.e., their outcomes depend only on the numbers of voters with
particular preference orders and not on the identities of the particular voters that cast them.
We consider Borda, Maximin, and the Copelandα family of rules. These rules assign points
to every candidate and pick as winners those who get most; we write scoreE(c) to denote the
number of points candidate c ∈ C receives in election E-the particular voting rule used to
compute the score will always be clear from the context.
Let E := (C, V ) be an election. Under Borda, each candidate c ∈ C receives from each
voter v ∈ V as many points as there are candidates that v ranks lower than c. Formally, the
Borda score of candidate c is scoreE(c) :=Pd∈C\{c} NE(c, d). Similarly, the Maximin score of a
candidate c is the number of voters who prefer c to his or her "strongest competitor." Formally,
for Maximin we have scoreE(c) := mind∈C\{c} NE(c, d).
2.2 Conventions for Describing Preference Orders
Under Copelandα with α being a rational number, α ∈ [0, 1], we organize a head-to-head contest
between each two candidates c and d; if c wins (i.e., if NE(c, d) > NE(d, c)) then c receives one
6
point, if d wins then d receives one point, and if they tie (i.e., NE(c, d) = NE(d, c)) then they
both receive α points. Formally, Copelandα assigns to each candidate c ∈ C score:
{d ∈ C \ {c} : NE(c, d)>NE(d, c)} + α {d ∈ C \ {c} : NE(c, d)=NE(d, c)} .
Typical values of α are 0, 1/2, and 1, but there are cases where other values are used. All our
results that regard Shift Bribery for Copelandα hold for each rational value of α. For brevity's
sake, we write "Copeland" instead of "Copelandα for arbitrary rational number α" throughout
this paper.
Given a subset A of candidates, unless specified otherwise, we write hAi to denote an arbitrary
←−
hAi to denote the reverse of hAi. If A is empty,
but fixed preference order over A. We write
then hAi means an empty preference order.
Let A and B be two disjoint subsets of candidates which do not contain our preferred
candidate p (i.e., p /∈ A ∪ B). Let d, g, z /∈ A ∪ B be three distinct candidates. We write
point-pair(p, A, d, g, B, z) to denote the following two preference orders:
p ≻ hAi ≻ d ≻ g ≻ hBi ≻ z
and
z ≻
←−−
hBi ≻ d ≻ g ≻
←−
hAi ≻ p.
With these two preference orders, under the Borda rule we achieve the effect that candidate d
gains one point more than every other candidate in A ∪ B ∪ {p, z} and two points more than
candidate g. Observe that p is ranked first in the first preference order and in order to let d's
score decrease (by shifting p forward), one has to shift p by A + 1 positions in the second vote.
This is crucial for some of our reductions.
Consider a set A = {a1, . . . , a2x+1} of candidates. For each i, 1 ≤ i ≤ 2x, set Ai
:=
{a(i+1) mod (2x+1), . . . , a(i+x) mod (2x+1)}. For each candidate ai, we write half-seq1(A, ai) and
half-seq2(A, ai) to denote the following two preference orders, respectively:
ai ≻ hAii ≻ hA \ Aii
and
←−−−−−
hA \ Aii ≻ ai ≻
←−−
hAii.
Under these two preference orders, we achieve the effect that candidate ai wins head-to-head
contests against exactly half of the other candidates (namely, those in Ai) and ties with all the
remaining ones. All the other pairs of candidates tie in their head-to-head contests.
2.3 Parameterized Complexity
We point the reader to standard text books for general information on parameterized com-
plexity and algorithms [27, 29, 40, 54]. There are also general accounts on the applications of
parameterized complexity analysis to computational social choice [10, 14].
To speak of parameterized complexity of a given problem, we declare a part of the input as a
parameter (here we consider numerical parameters only, e.g., for Shift Bribery it could be the
number of candidates or the budget; see the next section). We say that a problem parameterized
by k is fixed-parameter tractable, that is, is in FPT, if there exists an algorithm that given input
I with parameter k gives a correct solution in time f (k) · IO(1), where f (k) is an arbitrary
computable function of k, and I is the length of the encoding of I. To describe the running
times of our algorithms, we often use the O∗(·) notation. It is a variant of the standard O(·)
notation where polynomial factors are omitted. For example, if the algorithm's running time is
f (k) · IO(1), where f is superpolynomial, then we would say that it is O∗(f (k)).
7
Parameterized complexity theory also provides a hierarchy of hardness classes, starting
with W[1], such that FPT ⊆ W[1] ⊆ W[2] ⊆ . . . ⊆ XP. For our purposes, it suffices to de-
fine the W-classes through their complete problems and an appropriate reducibility notion.
Definition 1. Let A and B be two decision problems. We say that A reduces to B (in a
parameterized way) if there are two functions g1 and g2 such that, given instance IA of A with
parameter kA, it holds that:
i) IA is a yes-instance of A if and only if g1(IA) is a yes-instance of B with parameter g2(kA),
and
ii) g1 is computable in FPT time (for parameter kA).
W[1] is the class of problems that reduce (in a parameterized way) to Clique, and W[2] is
the class of problems that reduce to Set Cover-in both problems we take solution size k as
the parameter. In effect, these two problems are complete for these two classes.
Clique
Input: An undirected graph G = (V (G), E(G)) and a non-negative integer k ≥ 0.
Question: Does G contain a clique of size k, that is, a subset Q ⊆ V (G) of k vertices
such that for each two distinct vertices u, w ∈ Q one has {u, w} ∈ E(G)?
Note that even though we use letters V and E to denote, respectively, voter sets and elections,
when we speak of a graph G, we write V (G) to denote its set of vertices and E(G) to denote its
set of edges.
Set Cover
Input: A family S = (S1, . . . , Sm) of sets over a universe U = {u1, . . . , un} of elements
and a non-negative integer k ≥ 0.
Question: Is there a size-k set cover, that is, a collection Q of k sets in S whose union
is U?
For problems where an FPT algorithm and a hardness proof are elusive, one can at least try
to show an XP algorithm whose running time is polynomial if one treats the parameter as a
constant. As opposed to FPT, the degree of the polynomial describing the "XP" running time
can depend on the parameter.
Below we provide a brief overview of the notions regarding elections and parameterized
complexity theory.
2.4 Elections and Voting Rules
We use the standard, ordinal model of elections where an election E = (C, V ) consists of a set
C = {c1, . . . , cm} of candidates and a set V = {v1, . . . , vn} of voters. Each voter v provides a
preference order over C, i. e., a linear order ranking the candidates from the most preferred one
(position 1) to the least preferred one (position m). For example, if C = {c1, c2, c3}, then writing
v : c1 ≻ c2 ≻ c3 indicates that voter v likes c1 best, then c2, and then c3. For two candidates
ci, cj and voter v we write v : ci ≻ cj to indicate that v prefers ci to cj. Further, we write ≻v
to denote voter v's preference order. Given an election E, for each two candidates c and d, we
define NE(c, d) to be the number of voters in E who prefer c over d.
8
A voting rule R is a function that given an election E outputs a non-empty set ∅ 6= R(E) ⊆ C
of the tied winners of the election. Note that we use the nonunique-winner model, where each
of the tied winners is considered a winner and we disregard tie-breaking. This is a standard
assumption in papers on bribery in elections [35, 32, 31, 58, 28, 5]. However, we mention that
various types of tie-breaking can sometimes affect the complexity of election-related problems
quite significantly [55, 56, 34, 26]. Furthermore, we implicitly assume that all voting rules that
we consider are anonymous, i.e., their outcomes depend only on the numbers of voters with
particular preference orders and not on the identities of the particular voters that cast them.
We consider Borda, Maximin, and the Copelandα family of rules. These rules assign points
to every candidate and pick as winners those who get most; we write scoreE(c) to denote the
number of points candidate c ∈ C receives in election E-the particular voting rule used to
compute the score will always be clear from the context.
Let E := (C, V ) be an election. Under Borda, each candidate c ∈ C receives from each
voter v ∈ V as many points as there are candidates that v ranks lower than c. Formally, the
Borda score of candidate c is scoreE(c) :=Pd∈C\{c} NE(c, d). Similarly, the Maximin score of a
candidate c is the number of voters who prefer c to his or her "strongest competitor." Formally,
for Maximin we have scoreE(c) := mind∈C\{c} NE(c, d).
Under Copelandα with α being a rational number, α ∈ [0, 1], we organize a head-to-head
contest between each two candidates c and d; if c wins (i.e., if NE(c, d) > NE(d, c)) then c
receives one point, if d wins then d receives one point, and if they tie (i.e., NE(c, d) = NE(d, c))
then they both receive α points. Formally, Copelandα assigns to each candidate c ∈ C score:
{d ∈ C \ {c} : NE(c, d)>NE(d, c)} + α {d ∈ C \ {c} : NE(c, d)=NE(d, c)} .
Typical values of α are 0, 1/2, and 1, but there are cases where other values are used. All our
results that regard Shift Bribery for Copelandα hold for each rational value of α. For brevity's
sake, we write "Copeland" instead of "Copelandα for arbitrary rational number α" throughout
this paper.
3 Shift Bribery
Given a voting rule R, in R Shift Bribery the goal is to ensure that a certain candidate p (the
preferred candidate) is an R-winner of the election. To achieve this effect, we can shift p forward
in some of the voters' preference orders. Each shift may have a different price, depending on the
voter and on the length of the shift. The problem was defined by Elkind et al. [32]. Here we
follow the notation of Elkind and Faliszewski [31]; see the introduction for other related work.
3.1 The Problem
Let E = (C, V ) be some election, where C = {p, c1, . . . , cm} and V = {v1, . . . , vn}; p is the
preferred candidate. A Shift Bribery price function πi for voter vi ∈ V , πi : N → N, gives
the price of shifting p forward in vi's preference order a given number of positions. We require
that πi(0) = 0 and that πi(ℓ) ≤ πi(ℓ + 1) for each ℓ ∈ N. We also assume that if p is ranked on
a position r in the preference order, then πi(ℓ) = πi(ℓ − 1) whenever ℓ ≥ r. In other words, it
costs nothing to keep a voter's preference order as is, it never costs less to shift p farther, and
we cannot shift p beyond the top position in the preference order. For instance, let vi be a voter
9
with preference order vi : c1 ≻ c2 ≻ p ≻ c3 and let πi be vi's Shift Bribery price function.
Then, by paying πi(1) we can change vi's preference order to c1 ≻ p ≻ c2 ≻ c3, and by paying
πi(2) we can change it to p ≻ c1 ≻ c2 ≻ c3.
It is clear that we need at most C − 1 values to completely describe each Shift Bribery
price function. We write Π = (π1, . . . , πn) to denote the list of Shift Bribery price functions
for the voters in V .
A shift action #»s is a vector (s1, . . . , sn) of natural numbers, describing how far p should
be shifted in each of the n voters' preference orders. We define shift(E, #»s ) to be the election
E′ = (C, V ′) identical to E except that p has been shifted forward in each voter vi's preference
order by si positions. If that would mean moving p beyond the top position in some preference
i=1 πi(si) to denote the price
of a given shift action. A shift action s is successful if p is a winner in the election shift(E, #»s ).
The term unit shift refers to shifting p by one position in one preference order.
order, we shift p up to the top position only. We write Π( #»s ) =Pn
Given the above notation, the decision variant of R Shift Bribery is defined as follows.
R Shift Bribery
Input: An election E = (C, V ) with voter set V = {v1, . . . , vn}, a list Π = (π1, . . . , πn)
of Shift Bribery price functions for V , a candidate p ∈ C, and an integer B ∈ N.
Question: Is there a shift action #»s = (s1, . . . , sn) such that Π( #»s ) ≤ B and p is an
R-winner in shift(E, #»s )?
The optimization variant is defined analogously, but we do not include the budget B in the
input and we ask for a shift action #»s that ensures p's victory while minimizing Π( #»s ). For an
input instance I of the optimization variant of R Shift Bribery, we write OPT(I) to denote
the cost of the cheapest successful shift action for I (and we omit I if it is clear from the context).
We sometimes also write "R Shift Bribery" when we refer to the optimization variant (and
this is clear from the context).
Typically, approximation algorithms are asked to run in polynomial time. It is, however, not
always possible to approximate the optimal solution to an arbitrary given factor in polynomial
time. Relaxing the polynomial running time to FPT time, we can obtain the following notion
(also see Marx [51] for more information).
Definition 2 (FPT-approximation scheme (FPT-AS)). An FPT-approximation scheme (FPT-AS)
with parameter k for R Shift Bribery is an algorithm that, given an instance I = (C, V, Π, p)
and a number ε > 0, returns a successful shift action #»s such that Π( #»s ) ≤ (1 + ε) · OPT(I). This
algorithm must run in f (k, ε) · IO(1) time, where f is a computable function depending on k
and ε.
When describing the running time of an approximation scheme, we treat ε as a fixed con-
stant. Thus, a polynomial-time approximation scheme may, for example, include exponential
dependence on 1/ε.
3.2 Parameters for Shift Bribery
So far, Shift Bribery has not been studied from the parameterized complexity theory point
of view. Dorn and Schlotter [28] and Schlotter et al. [59] have, however, provided parameterized
complexity results for Swap Bribery and for Support Bribery.
10
We consider two families of parameters, those referring to the properties of the successful
shift action that we seek and those describing the input election. Regarding the first group, we
study:
1. the total number t of unit shifts in the solution (#shifts),
2. the total number na of voters whose preference orders are changed (#voters-affected), and
3. the budget B.
Regarding the second group, we consider:
1. the number m of candidates (#candidates) and
2. the number n of voters (#voters).
As we can test every possible value of a parameter in increasing order, we assume that the values
of these parameters are passed explicitly as part of the input. Note that pairs of parameters such
as m and n clearly are incomparable, whereas n, as well as #shifts, clearly upper-bound #voters-
affected, making #voters-affected "stronger" [46] than the two other parameters. Similarly, B
upper-bounds both #shifts and #voters-affected, provided that each shift has price at least one.
3.3 Price Functions
One of the conclusions from our work is that the price functions used in Shift Bribery instances
may strongly affect the complexity of the problem. In this section we present the families of
price functions that we focus on.
All-or-nothing prices A Shift Bribery price function π is all-or-nothing if there is a value
c such that π(0) = 0 and for each ℓ > 0, π(ℓ) = c (this value c can be different for each
Interestingly, the NP-hardness proofs of Elkind et al. [32] use exactly this family of
voter).
price functions (without referring to them directly, though). All-or-nothing price functions are
a special case of what we would intuitively call concave functions.
Convex prices We are also interested in convex price functions; π is convex if for each ℓ,
π(ℓ + 1) − π(ℓ) ≤ π(ℓ + 2) − π(ℓ + 1) (provided that it is possible to shift the preferred candidate
by up to ℓ + 2 positions in the given preference order).
Unit prices To capture the setting where each unit shift has the same cost for each voter, we
define the price functions by setting π(ℓ) := ℓ for each ℓ such that p can be shifted by ℓ positions.
Unit prices are an extreme example of convex price functions.
Sortable prices Finally, we consider sortable price functions. A list Π = (π1, π2, . . .) of price
functions is called sortable if for each two voters vi, vj ∈ V with the same preference order (that
is, for each two voters vi and vj such that ≺i = ≺j) it holds that ∀1 ≤ ℓ ≤ m − 2 : πi(ℓ) >
Informally, this means that one can sort each set V ′ of
πj (ℓ) =⇒ πi(ℓ + 1) > πj(ℓ + 1).
voters having the same preference order so that the prices of shifting the preferred candidate
by each ℓ positions are nondecreasing along the corresponding sorted order of V ′. Thus, for a
11
Πconvex
Πall
Πunit
Πsort
Π0/1
Figure 1: The Hasse diagram of the inclusion relationship among the price function families (for
a given election) that we study.
given number of shifts, bribing the voters according to the sorted order is always optimal. Many
natural price function families are sortable. For example, a list of exponential functions of the
form πi(ℓ) = aℓ
i (where each voter vi may have an individual base ai) is sortable. A list of
polynomials of the form πi(ℓ) = ai · ℓb (where the exponent b is the same for the voters having
the same preference order but each voter vi may have an individual coefficient ai) is sortable as
well.
Given an election E = (C, V ), we write Πall to mean the set of all possible price functions
for this election, Πconvex to mean the set of the lists of convex price functions, Πunit to mean
the set of the lists of unit price functions, Π0/1 to mean the set of the lists of all-or-nothing
price functions, and Πsort to mean the set of all sortable lists of price functions. We observe the
following straightforward relations between these sets (also see the Hasse diagram in Figure 1).
Proposition 1. For each given election, the following relations hold between the families of
price functions:
1. Πunit ⊂ Πconvex ⊂ Πall,
2. Π0/1 ⊂ Πsort ⊂ Πall,
3. Πunit ⊂ Πsort.
4 Parameterizations by Solution Cost Measures
In this section we present our results for parameters measuring the solution cost, i.e., for the
number of unit shifts, for the number of voters affected by at least one shift, and for the budget.
It turns out that parameterization by the number of unit shifts tends to lower complexity (FPT
algorithms for Borda and Maximin and W[1]-hardness for Copeland) than parameterization by
the number of affected voters (W[2]-hardness). The case of parameterization by the budget lies
in between, and the complexity depends on each particular price function family.
4.1 Unit Shifts
Borda Shift Bribery and Maximin Shift Bribery parameterized by the number t of unit
shifts in the solution are in FPT for arbitrary price functions. The reason is that in these cases it
is easy to isolate a small number of candidates on which one needs to focus. More precisely, we
can shrink the number of candidates as well as the number of voters to be bounded by functions
in t (in effect, achieving a partial kernelization [9]).
12
Theorem 1. Borda Shift Bribery parameterized by the number t of unit shifts is in FPT
for arbitrary price functions. The running time of the algorithm is O∗((2t · (t + 1) · t)t).
Proof. Let I = (E = (C, V ), Π, p, B) be an input instance of Borda Shift Bribery for which
we seek a shift action that uses at most t unit shifts. Our algorithm iterates over all possible
number t′ with 0 ≤ t′ ≤ t, which we interpret as the exact number of shifts used in the solution.
Under the Borda rule, applying a shift action that uses t′ unit shifts increases the score of p
to exactly scoreE(p) + t′. This means that irrespective of which shift action with t′ unit shifts
we use, if some candidate c has score at most scoreE(p) + t′ in election E, then after applying
the shift action, p will certainly have score at least as high as c. On the contrary, if in election E
some candidate c has score greater than scoreE(p) + t′, then a successful shift action must ensure
that c loses at least scoreE(c) − (scoreE(p) + t′) points. Since every unit shift decreases the score
of exactly one candidate, it follows that if there is a successful shift action that uses exactly t′
shifts, then the set C(t′) := {c ∈ C \ {p} scoreE(c) > scoreE(p) + t′} has at most t′ elements.
Our algorithm first computes the set C(t′). If C(t′) > t′, then the algorithm skips the current
iteration and continues with t′ ← t′ + 1.
By the above argument, we can focus on a small group of candidates, namely on C(t′).
Obviously, this set has at most t′ elements and can be found in linear time. Now if we only
need to brute-force search all possible shift actions among a small group of voters, whose size is
upper-bounded by a function in t′, then we obtain our desired FPT result. Indeed, the remainder
of this proof is devoted to show that only a small subset of voters (whose size is upper-bounded
by a function in t′) are relevant to search for a successful shift action and this subset can be
found in polynomial time.
We first define a subset of "relevant" voters and then show why it is enough to focus on
them. For each candidate subset C′ of C(t′) and for each number j, 0 ≤ j ≤ t′, we compute a
subset V j
C ′ of t′ voters v such that:
i) if we shift p by j positions in v's preference order, then p passes each candidate from C′
and j − C′ other candidates from C \ C(t′), and
If there are several subsets of voters that satisfy these conditions, then we pick one arbitrarily.
V j
C ′.
πv(j) is minimal.
C′
ii) Pv∈V j
We set V (t′) :=S C′ ⊆C(t′ )
0≤j≤t′
#»
If there is a shift action #»s that uses exactly t′ unit shifts and has price at most B, then
s′ that uses exactly t′ shifts, has price at most B, and affects only the
there is a shift action
voters in V (t′). To see this, assume that there is a voter vi 6∈ V (t′) and a number j such that #»s
shifts p by j positions in vi. Let C′ be the set of candidates from C(t′) that p passes if shifted j
positions in vi. By definition of V j
C ′ and by simple counting arguments, there is a voter vk ∈ V j
C ′
for which #»s does not shift p. Again, by definition of V j
C ′ , πvk (j) ≤ πvi (j). Thus, if in #»s we
replace the shift by j positions in vi by a shift of j positions in vk, then we still get a successful
shift action using exactly t′ shifts and with price no greater than that of #»s . We can repeat this
process until we obtain a successful shift action of cost at most B that affects the voters in V (t′)
only.
In effect, to find a successful shift action that uses at most t′ unit shifts, it suffices to focus on
t′ ≤
the voters from V (t′). The cardinality of V (t′) can be upper-bounded by V (t′) ≤P C′⊆C(t′ )
0≤j≤t′
13
2t′
· (t′ + 1) · t′. Since in the preference order of each voter in V (t′) we can shift p by at most
t′ positions and we can do so for at most t′ voters, there are at most V (t′)t′
shift actions that
we need to try. Moreover, V (t′) can be found in polynomial time. We can consider them all in
FPT time O∗((2t′
· (t′ + 1) · t′)t′
).
Using the ideas of the previous proof, we can transform a given election into one that includes
only f (t) candidates and g(t) voters, where f and g are two computable functions. In this way,
we obtain a so-called partial problem kernel [9, 45]. It is a partial problem kernel only since the
prices defined by the price function Π and the budget are not necessarily upper-bounded by a
function of t.
Theorem 2. An instance of Borda Shift Bribery parameterized by the number t of unit
shifts can be reduced to an equivalent instance with the same budget, and with O(t4 ·2t) candidates
and O(t3 · 2t) voters.
Proof. By the proof of Theorem 1, we know that we only need to focus on a subset Ccrit of
candidates whose size is upper-bounded by a function of the parameter t. This set Ccrit is
defined as follows:
t
Ccrit :=
C(t′),
[t′=0
where C(t′) := {c ∈ C \ {p} scoreE(c) > scoreE(p) + t′} if the number of candidates whose
scores are greater than scoreE(p) + t′ is at most t′; otherwise it will not be possible to decrease
the score of every of those candidates by at least one within t′ unit shifts, thus, C(t′) := ∅.
If n ≤ t3 · 2t, then we simply set Vcrit := V to be the set of all voters. Otherwise, from the
previous proof it follows that we only need to focus on a small group of voters from the following
set
t
Vcrit :=
V (t′),
[t′=0
where V (t′) is defined as in the proof of Theorem 1. Briefly put, V (t′) consists of the voters such
that if we shift p in some of their preference orders by a total of t′ positions, then we may make
t′=0 V (t′) when n ≥ t3 · 2t, it follows that Vcrit can
be computed in polynomial time using the straightforward algorithm in the previous proof.
p a winner. Since we only need to compute St
Clearly, Ccrit ≤ t · (t − 1)/2 and Vcrit ≤ min{n,Pt
The remaining task now is to construct an election containing all the candidates from Ccrit
and the voters from Vcrit along with their price functions such that the election size is still
upper-bounded by a function in t.
· (t′ + 1) · t′} ≤ min{n, t3 · 2t}.
t′=0 2t′
We construct the candidate set Cnew of the new election as follows: We introduce a dummy
candidate di for every candidate ci ∈ Ccrit. This dummy candidate will be used to realize the
original score difference between p and every candidate from Ccrit. We denote the set of all these
dummy candidates as D.
For each voter vi ∈ Vcrit, we need to "replace" the candidates in his or her original preference
order that do not belong to Ccrit but that are still "relevant" for the shift action. Let Ci be the set
of candidates from Ccrit that are ranked ahead of p by voter vi, that is, Ci := {c′ ∈ Ccrit c′ ≻i p}.
We introduce a new set Fj of dummy candidates whose size equals the number of irrelevant
14
candidates that rank ahead of p by no more than t positions. That is,
Fi := {c ∈ C \ Ccrit c is ranked at most t positions ahead of p by vi}.
Now, the new candidate set Cnew is set to
Cnew := Ccrit ∪ D ∪ [vi∈Vcrit
Fi.
Clearly, Cnew ≤ 2Ccrit + t · Vcrit ≤ t · (t − 1) + min{t4 · 2t, t · n}.
The new voter set V consists of two blocks:
1. The first block is constructed to maintain the score difference between p and any candi-
date cj ∈ Ccrit in the original election. To this end, let sj be this score difference. We intro-
duce sj pairs of voters with the preference orders point-pair(p, ∅, cj, dj, Cnew \ {p, cj, dj }, ·)
(see Section 2.2 for the definitions). Note that the two preference orders that are specified
by point-pair() will cause cj to have two points more than dj and one point more than any
other candidate, including p. We set their price for the first unit shift to B + 1.
2. The second part is constructed to "maintain" the important part of the voters from Vcrit.
That is, for each voter vi ∈ Vcrit, we set his or her new preference order to be
vi : hCi ∪ Fii ≻ p ≻ hCnew \ (Ci ∪ Fi ∪ {p})i,
where hCi ∪ Fii corresponds to the order of the candidates in vi's original preference order
and the price function remains unchanged. We also add a dummy voter v′
i with the reverse
preference order of vi and we set his or her price for shifting p by the first position to B + 1.
The size of the newly constructed voter set Vnew is (Pcj∈Ccrit
2sj) + 2Vcrit ≤ t · (t − 1) + t3 · 2t+1.
The equivalence of the two instances can be verified as follows: The newly added dummy
candidates, either from D or from Fi have at most the same score as p. Each candidate cj ∈ Ccrit
has exactly sj points more than p. Since it will be too expensive to bribe the voters from the
first block or the dummy voters v′
i (B + 1 budget for one unit shift), the only possibility of
shifting p within the budget B is to bribe the voters who come from the original election and
who have the "same" preference orders up to renaming of the candidates that do not belong to
Ccrit.
The fixed-parameter tractability result for Maximin Shift Bribery follows by using a
similar approach as in Theorem 1.
Theorem 3. Maximin Shift Bribery parameterized by the number t of unit shifts is in FPT
for arbitrary price functions. The running time of the algorithm is O∗((2t · (t + 1) · t)t).
Proof. Let I = (E = (C, V ), Π, p, B) be an input instance of Maximin Shift Bribery. Suppose
that, altogether, we are allowed to shift p by at most t positions. Under Maximin, such a shift
can make p gain at most t points. Just similar to the case of Borda in Theorem 1, our algorithm
iterates over all possible numbers t′ with 0 ≤ t′ ≤ t, which we interpret as the exact number of
points that p gains after a successful shift action with t unit shifts and then, in each iteration,
executes the following algorithm.
15
For each candidate c ∈ C \ {p}, if NE(p, c) < scoreE(p) + t′, then we have to shift p to pass
c in some preference orders. Since in every unit shift p passes exactly one candidate, a counting
argument shows that if there are more than t − t′ + 1 candidates c with NE(p, c) < scoreE(p) + t′,
then there is no successful shift action that uses at most t′ unit shifts. Thus the set C(t′) = {c ∈
C \ {p} NE(p, c) < scoreE(p) + t′} has at most t − t′ + 1 candidates. Hence, if C(t′) > t − t′ + 1,
then the algorithm skips the current iteration and continues with t′ ← t′ + 1.
By the above argument, it suffices to focus on a small set of candidates: the set C(t′). Using
the same reasoning as in Theorem 1 for Borda voting, it also suffices to focus on a subset V (t′)
of at most 2t · (t + 1) · t voters (we can compute this set in a way analogous to that for Borda
voting). Since we can use at most t unit shifts and, thus, we can affect at most t voters, there
are at most O∗(V (t′)t) = O∗((2t · (t + 1) · t)t) shift actions that we have to try. We can do so
in FPT time.
Using an analogous approach to construct an equivalent election as for Theorem 2, we obtain
the following.
Corollary 1. An instance of Maximin Shift Bribery parameterized by the number t of unit
shifts can be reduced to an equivalent instance with the same budget, and with O(t4 ·2t) candidates
and O(t3 · 2t) voters.
For Copeland, we do not get FPT membership, but we show W[1]-hardness even for unit prices
and for all-or-nothing prices, which implies hardness for each of our price function families.
Theorem 4. Copeland Shift Bribery parameterized by the number of unit shifts is W[1]-
hard for each price function family that we consider.
Proof. We first show the result for all-or-nothing prices which, by Proposition 1, also covers the
case of convex prices, sortable prices, and arbitrary price functions. In the second part, we deal
with unit prices.
All-or-nothing prices For the sake of completeness, fix some rational number α, 0 ≤ α ≤ 1,
for the Copeland "tie breaking"; we will see later that we will not use α since the number of
voters in the constructed instance is odd.
We give a reduction from Clique parameterized by the clique size. Let G = (V (G), E(G)) be
our input graph and let k be the clique size that we seek (we assume k > 1). Let n = V (G) and
m = E(G). Without loss of generality, assume that n is odd and that n > 6 (both assumptions
can be realized by adding several isolated vertices to the graph).
We construct an election E = (C, V ) as follows. First, we set the available budget B to be
k · (k − 1)/2. We let C = V (G) ∪ {p, d} ∪ D, where p is our preferred candidate, d is the unique
winner in E, and D is a set of 2n dummy candidates. Note that we use V (G) to denote both
the vertex set and a subset of the candidates. However, given an element in V (G) we will always
make it clear whether we mean a vertex or a candidate.
We form V so that V is odd and the following holds:
i) For each edge e = {x, y} in E(G), there are two voters ve with preference order
x ≻ y ≻ p ≻ hC \ {x, y, p}i
16
e with the reversed ordering of ve. They have all-or-nothing price functions πe, π′
e
e(j) = B + 1 for each j ≥ 0. We
and v′
such that πe(0) = 0 and πe(j) = 1 for each j > 0 and π′
set Vedges := {ve e ∈ E(G)}.
ii) There is a set Vstruct of polynomially many voters who implement the following results of
head-to-head contests (this indeed can be done by applying the classic McGarvey's theo-
rem [53]): Each candidate in V (G) wins head-to-head contests against p (by 2k − 3 voters'
preference orders) and against d (by one voter's preference order). Candidate d wins head-
to-head contests against all candidates in D (by one voters' preference order). Candidate p
wins head-to-head contests against 2n − k − 1 candidates in D and loses the remaining ones
(by one preference order); p also wins the head-to-head contest against d (by one preference
order). Each candidate in V (G) ∪ D wins exactly half of the head-to-head contests against
the other members of V (G) ∪ D (i.e., each member of V (G) ∪ D wins head-to-head contests
against exactly ⌊3n/2⌋ other members of V (G) ∪ D; recall that n is odd).
A formal definition of the preference orders of voters in Vstruct reads as follows. Let D1 ⊆ D
be a subset of k + 1 (arbitrary) candidates.
a) There is one voter with preference order hV (G) ∪ Di ≻ p ≻ d.
b) There are (k − 2) pairs of voters with preference orders
hV (G)i ≻ p ≻ d ≻ hDi and
←−−
hDi ≻ d ≻
←−−−−
hV (G)i ≻ p.
c) There are two voters with preference orders
d ≻ hDi ≻ p ≻ hV (G)i
and
←−−−−
hV (G)i ≻ p ≻ d ≻
←−−
hDi.
d) There are two voters with preference orders
p ≻ hD \ D1i ≻ hD1i ≻ hV (G)i ≻ d and
←−−−−
hV (G)i ≻
←−−
hD1i ≻ p ≻
←−−−−−−
hD \ D1i.
d ≻
e) For each candidate x ∈ V (G) ∪ D, there are two voters with preference orders
half-seq1(V (G) ∪ D, x) ≻ p ≻ d and
d ≻ p ≻ half-seq2(V (G) ∪ D, x).
(See Section 2.2 for the construction of preference orders half-seq1 and half-seq2.)
Finally, each voter in Vstruct has all-or-nothing price function π such that π(0) = 0 and
π(j) = B + 1 for each j > 0.
Note that due to the budget, we can only afford to bribe the voters in Vedges.
Prior to any bribery, p has 2n − k points, d has 2n points, and each other candidate has at
most ⌊3n/2⌋ + 2 points. This means that d is the unique winner of E. We claim that there is a
shift action #»s such that Π( #»s ) ≤ B and p is a winner of shift(E, #»s ) if and only if G has a clique
of order k.
17
Assume that there is a successful shift action that ensures p's victory. Given our price
functions, we can bribe up to k(k − 1)/2 voters in Vedges, in each case to shift p by two positions
to the top. Further, it is clear that a successful shift action must ensure that p obtains k
additional points (it is impossible to decrease the score of d). This means that there is some set
Q ⊆ V (G) with at least k candidates such that p passes each candidate from Q at least k − 1
times (if x ∈ Q and p passes x in k − 1 preference orders, then the value NE(x, p) − NE(p, x)
changes from 2k − 3 to −1 and p wins the head-to-head contest against x). Given our budget,
we can altogether shift p by t = k(k − 1) positions (each two positions correspond to an edge
in G; t is the value of our parameter). Thus Q contains exactly k candidates, in each unit shift
p passes one of them, and p passes each candidate from Q exactly k − 1 times. This is possible
if and only if candidates in Q correspond to a clique in G.
On the contrary, if Q is a set of k vertices from V (G) that form a clique, then shifting p
forward in B preference orders from Vedges that correspond to the edges of the graph induced
by Q ensures p's victory.
Unit prices The above argument can be adapted to the case of unit prices. The key trick
is to insert sufficiently many "filler" candidates directly in front of p in the preference orders
of some voters who are not intended to be affected. This simulates the effect of all-or-nothing
prices.
We again reduce from Clique parameterized by the order of the clique. The budget B
is set to 3k · (k − 1)/2. We use the same notation for the input instance (G, k) of Clique.
Without loss of generality, we assume that (n + m) is odd. We set the candidate set C to be
V (G) ∪ {p, d} ∪ D1 ∪ D2 ∪ F ∪ R where:
1. p is our preferred candidate,
2. d will be the unique winner in the constructed election E,
3. D1 is a set of 4(m + n) − (k · (k − 1)/2 + k + 1) dummy candidates,
4. D2 is a set of k · (k − 1)/2 + k + 1 dummy candidates,
5. F := F1 ∪ F2 consists of two sets of B "filler candidates" each, and
6. R := {qe e ∈ E(G)} is a set of E(G) "edge candidates".
The filler candidates are used to simulate the affect of prices higher than the budget B by
forming a "wall" of B candidates in front of p against which p wins anyway. The edge candidates
together with a budget blow-up of k · (k − 1)/2 in the score difference between d and p are used
to enforce that one has to shift p to the top position whenever one bribes a voter.
We form the voter set V as follows:
i) For each edge e = {x, y} in E(G), add two voters ve, v′
e with preference orders
ve : qe ≻ x ≻ y ≻ p ≻ hF i ≻ hC \ ({x, y, p, qe} ∪ F )i and
←−−−−−−−−−−−−−−−−−
hC \ ({x, y, p, qe} ∪ F )i ≻
←−−
hF i ≻ p ≻ y ≻ x ≻ qe,
v′
e :
that is, v′
e has the reversed preference order of ve. Let Vedges be the set of all voters ve.
18
ii) Add one voter with preference order
hRi ≻ hV (G)i ≻ d ≻ hD2i ≻ hF i ≻ p ≻ hD1i.
iii) Add two voters with preference orders (the boldfaced parts highlight the parts in the two
voters that do not occur reversed.)
p ≻ d ≻ hF i ≻ hC \ ({p, d} ∪ F )i
←−−−−−−−−−−−−
hC \ ({p, d} ∪ F )i ≻
←−−
hF i ≻ p ≻ d.
and
iv) Add k − 2 pairs of voters with preference orders
hV (G)i ≻ hF i ≻ p ≻ hC \ ({p} ∪ F ∪ V (G))i
←−−−−−−−−−−−−−−−−−
hC \ ({p} ∪ F ∪ V (G))i ≻
←−−−−
hV (G)i ≻
←−
hF i ≻ p.
and
v) Add k − 1 four tuples of voters with preference orders
p ≻ hD1i ≻ hF1i ≻ hF2i ≻ hC \ ({p} ∪ F ∪ D1)i,
←−−−−−−−−−−−−−−−
←−−
hC \ ({p} ∪ F ∪ D1)i ≻
hF1i,
p ≻ hD1i ≻ hF2i ≻ hF1i ≻ hC \ ({p} ∪ F ∪ D1)i, and
←−−−−−−−−−−−−−−−
hC \ ({p} ∪ F ∪ D1)i ≻
←−−
hF1i ≻ p ≻
←−−
hF2i ≻ p ≻
←−−
hD1i ≻
←−−
hD1i ≻
←−−
hF2i.
vi) Set A = V (G) ∪ D1 ∪ D2 ∪ R. For each candidate x ∈ A, add one pair of voters with
preference orders (see Section 2.2 for the definitions of half-seq1 and half-seq2)
half-seq1(hAi, x) ≻ hF i ≻ p ≻ d
and
d ≻ p ≻
←−−
hF i ≻ half-seq2(hAi, x).
One can check that the score difference between p and the unique winner d is k + k · (k − 1)/2,
see Table 2 for details.
Now, observe that with budget B, p can only gain any additional points by defeating can-
didates from V (G) ∪ R and by passing candidates in the preference orders of the voters in
Vedges(the candidates from F block all other possibilities). Since in the election E, each vertex
candidate ci ∈ V (G) wins against p by 2k − 3 voters and each edge candidate qe wins against
p by 1 voter, the only possibility for p to gain at least k · (k − 1)/2 additional points (within
budget B) is to win against k · (k − 1)/2 candidates from R. This means that for every successful
shift action there is some set E′ ⊆ E(G), E′ = k · (k − 1)/2 such that p was shifted to the top
position in the preference order of each the voter ve, e ∈ E′. To achieve this, the whole budget
must be used. To gain the additional k points (not from contests against candidates from R), p
must have been shifted in front of k vertex candidates k − 1 times each. This is only possible if
G[E′] induces a clique of size k.
19
candidate
d
p
∈ D1
∈ D2
∈ V (G)
∈ F
∈ R
2 + k + 1)
head-to-head contests won
4(m + n)
+ 2B
4(m + n) − ( k·(k−1)
+ 2B
+ 1
2(m + n) + ⌊(n + m)/2⌋
+ 2B
2(m + n) + ⌊(n + m)/2⌋
+ 2B
+ 1
2(m + n) + ⌊(n + m)/2⌋
+ 2B
+ 2
≤ 2B
2(m + n) + ⌊(n + m)/2⌋
+ 2B
+ 2
against
(D1 ∪ D2)
(F )
(D1)
(F )
(d)
(half of V (G) ∪ D1 ∪ D2 ∪ R)
(F )
(half of V (G) ∪ D1 ∪ D2 ∪ R)
(F )
(p)
(half of V (G) ∪ D1 ∪ D2 ∪ R)
(F )
(p and d)
(F )
(half of V (G) ∪ D1 ∪ D2 ∪ R)
(F )
(p and d)
Table 2: Head-to-head contests won in the construction. Except for the candidate d, every other
candidate wins less than 4(m + n) + 2B head-to-head contests.
4.2 Number of Affected Voters and Budget
For the number of affected voters, Shift Bribery is W[2]-hard for each of Borda, Maximin, and
Copelandα, and this is true for each family of price functions that we consider: The result for all-
or-nothing prices follows almost directly from the NP-hardness proofs due to Elkind et al. [32].
Their reductions have to be adapted to work for Set Cover (see below for the definition) rather
than its restricted variant, Exact Cover by 3-Sets [41], but this can be done quite easily.
To obtain the result for unit prices, with some effort, it is still possible to carefully modify their
proofs, maintaining their main ideas. Our proofs are included in A.
Theorem 5. Borda, Maximin, and Copeland Shift Bribery parameterized by the number
of affected voters are W[2]-hard for each price function family that we consider.
When we parameterize Shift Bribery by the available budget, the results fall between
those from Section 4.1 and Theorem 5. In essence, the hardness proofs for all-or-nothing prices
carry over from the number of affected voters case to the budget case (and this implies hardness
for arbitrary prices and sortable prices), while the results for the number of unit shifts carry
over to the setting with convex/unit prices.
The hardness results translate because in the construction for all-or-nothing prices behind
Theorem 5 the budget equals the parameter value "solution size" of the Set Cover instance
from which we reduce. The FPT results parameterized by the number of unit shifts translate
because for convex/unit prices the budget is an upper bound on the number of possible unit
shifts.
20
Corollary 2. Borda and Maximin Shift Bribery parameterized by the budget B are W[2]-
hard for arbitrary, sortable, and all-or-nothing prices, and are in FPT for convex and unit prices
with running time O∗((2B · (B + 1) · B)B).
For Copeland Shift Bribery with unit prices, the budget equals the number of unit shifts
in the reduction behind Theorem 4. This implies the following corollary.
Corollary 3. Copeland Shift Bribery parameterized by the budget is W[2]-hard for arbi-
trary, sortable, and all-or-nothing prices, and is W[1]-hard for convex and unit prices.
5 Parameterizations by Election-Size Measures
In this section we consider Shift Bribery parameterized by either the number of candidates or
the number of voters. Elections with few candidates are natural in politics (for example, there
is typically only a handful of candidates in presidential elections) and elections with few voters
arise naturally in multiagent systems
(for example, Dwork et al. [30] suggested election-based methods for aggregating results from
several web search engines; see also the work of Brandt et al. [12] and of Chen et al. [24] for
further results and motivation regarding elections with few voters). For example, Dwork et al.
[30] suggested voting-based methods for aggregating results from several web search engines.
Betzler et al. [8], Brandt et al. [12], Fellows et al. [39] considered winner determination problems
with few voters, while Chen et al. [24] considered voting control by adding alternatives with few
voters.
5.1 Number of Voters
Let us now consider Shift Bribery parameterized by the number of voters. We have not
found FPT algorithms for our rules in this setting, but we did find a general FPT-approximation
scheme. The idea of our algorithm is to use a scaling technique combined with a brute-force
search through the solution space. The scaling part of the algorithm reduces the range of prices
and then the brute-force search finds a near-optimal solution.
Theorem 6. Let R be a voting rule for which winner determination parameterized by the num-
ber n of voters is in FPT. There is a factor-(1 + ε) approximation algorithm solving R Shift
Bribery in time O∗(⌈n/ε + 1⌉n) times the cost of R's winner determination.
Proof. Let R be our voting rule and let I = (C, V, Π, p) be an instance of the optimization
version of R Shift Bribery. Further, let ε > 0 be the desired approximation parameter. We
will show how to compute a (1 + ε)-approximate solution for I.
#»
#»
We will need the following notation. For a vector
b = (b1, . . . , bn) ∈ Nn, shift action
b ) = (Π-shift1(b1), . . . , Π-shiftn(bn)) is such that for each i, 1 ≤ i ≤ n, value Π-shifti(bi)
Π-shift(
is the largest number ti such that πi(ti) ≤ bi. In other words, Π-shift(
b ) is the shift action that
shifts p in each voter vi's preference order as much as possible, without exceeding the per-voter
budget limit bi.
#»
Let m = C and n = V . The algorithm works as follows. First, we guess a voter vi ∈ V and
a number j ∈ [m]. We set πmax = πi(j). We interpret πmax as the cost of the most expensive
21
shift within the optimal solution. (Note that there are only n · m choices of vi and j). We
set K = ε · πmax/n and define a list Π′ of n price functions as follows. For each vi ∈ V and
j ∈ {0, . . . , m}, we set
π′
i(j) =(l πi(j)
K m
n·(n+1)
ε
if πi(j) ≤ πmax
+ 1 otherwise.
We form an instance I ′ = (C, V, Π′, p). Note that for each i, 1 ≤ i ≤ n, and each j, 0 ≤ j ≤ m,
we have that if πi(j) ≤ πmax then π′
i(j) ≤ n/ε + 1.
We compute (if there exists one) a lowest-cost shift action
s′ for I ′ that ensures p's victory
and does not use shifts that cost n · (n + 1)/ε + 1. We can do so by considering all vectors
b = (b1, . . . , bn) where each bi is in {0, . . . , ⌈n/ε⌉}: For each
b we check if p is an R-winner of
shift(E, Π′-shift(
b ). We take s′ to denote the cheapest stored
shift action (we make an arbitrary choice if there are several stored shift actions of the same
cost; if there is no stored shift action then it means that our guess of πmax was incorrect). This
process requires considering O(⌈n/ε + 1⌉n) shift actions.
b )) and, if so, we store Π′-shift(
#»
#»
#»
#»
#»
After trying each guess for πmax, we return the cheapest successful shift action s′ that we
obtained. We claim that this shift action has cost at most (1 + ε) · OPT(I).
Consider an iteration where the guess of πmax is correct. Let K, Π′, and s′ be as in that
iteration and let s be a lowest-cost successful shift action for I (i.e., p is an R-winner of shift(E, s)
and Π(s) = OPT(I)). We have the following inequalities:
Π(s′) ≤ K · Π′(s′) ≤ K · Π′(s) ≤ Π(s) + K · n ≤ Π(s) + ε · πmax.
The first inequality follows because of the rounding in Π′, the second inequality follows because
s′ is optimal for I ′, the third inequality follows because for each i, 1 ≤ i ≤ n, and each j,
0 ≤ j ≤ m, K · ⌈πi(j)/K⌉ ≤ πi(j) + K, and the final equality follows by the definition of K.
Since πmax ≤ OPT(I) and by the above inequalities, we have:
Π(s′) ≤ Π(s) + ε · πmax ≤ (1 + ε) · OPT(I).
Thus the algorithm returns a (1 + ε)-approximate solution. Our estimates of the running time
given throughout the analysis justify that the algorithm runs in FPT time.
Is it possible to obtain full-fledged FPT algorithms for the parameterization by the number
of voters? For the case of all-or-nothing price functions, we do provide a very simple FPT
algorithm, but for the other price-function classes this is impossible (under the assumption that
FPT 6= W[1]).
Proposition 2. Let R be a voting rule for which winner determination parameterized by the
number of voters is in FPT. R Shift Bribery parameterized by the number of voters is in FPT
for all-or-nothing prices.
Proof. Note that with all-or-nothing prices, it suffices to consider shift actions where for each
voter's preference order we either shift the preferred candidate to the top or do not shift him or
her at all. Thus, given an election with n voters it suffices to try each of the 2n shift actions of
this form.
22
For Copeland we show W[1]-hardness already for the case of unit prices, via a somewhat
involved reduction from a variant of the Clique problem. For Borda the same result holds
due to a very recent argument of Bredereck et al. [21] (and one can verify that their technique
generalizes to the case of Maximin).
Theorem 7. Copeland Shift Bribery parameterized by the number of voters is W[1]-hard
for unit prices.
Proof. We give a reduction from Multicolored Clique-a variant of Clique which, given an
undirected graph G = (V (G), E(G)), a non-negative integer k ≥ 0, and a coloring col : V (G) →
[k], asks whether G contains a size-k multicolored clique Q ⊆ V (G), that is size-k vertex sub-
set Q ⊆ V (G) such that the vertices in Q are pairwise adjacent and have pairwise distinct colors.
We assume in the following that G is regular, that is, all vertices have the same degree, and
the coloring is proper, that is, there are no edges between vertices of the same color. Note that
even this restricted variant of Multicolored Clique parameterized by the clique size k is
W[1]-hard [52].
Observe that in the given Multicolored Clique instance (G, k, col), a multicolored clique
contains exactly one vertex of color i for each i ∈ [k]. We exploit this fact in our reduction which
we now describe at high level: For each color i ∈ [k] there is a color-gadget consisting of two
voters v2i−1 and v2i. Each possible combination of shifting p in the preference orders of these
two voters will refer to a selection of one vertex of color i. Each edge in E(G) is represented
by one candidate; we call all candidates representing edges edge candidates. In the constructed
election, our preferred candidate p loses all head-to-head contests against the edge candidates
and has a score difference of (cid:0)k
order to make p a winner, p has to win head-to-head contests against at least(cid:0)k
2(cid:1) with the original winner d. With some technical gadget, in
2(cid:1) edge candidates
after the shifting. Furthermore, to win in a head-to-head contest against the edge candidate
representing edge {x, y}, one has to "select" x and y in the respective color-gadgets. Thus,
if p can be made a winner, then the corresponding selected vertices in the color-gadgets form a
multicolored clique. We now describe the construction in detail.
First, set nG = V (G) and mG = E(G), and let ∆ be the vertex degree in the regular
graph G, implying mG = ∆ · nG/2. Furthermore, for each i ∈ [k], let ℓi denote the number of
vertices with color i. We start with initially empty sets V of voters and C of candidates. First,
add to C the preferred candidate p and the candidate d. Candidate d will be the unique winner
in the original election. Then, we extend the set C of candidates by adding
i) for each color i ∈ [k] and each index j ∈ [ℓi + 1], add a set S(i)
j
of 2n3
j
G filler candidates; we say that S(i)
and a set F (i)
colored i if j ≤ ℓi.
Let S be the set of all selection candidates and let F be the set of all filler candidates.
For each color i ∈ [k], define S(i)
· ; equivalently,
·
define F (i)
·
and define S(−i)
j=1 S(i)
:= F \ F (i)
· ;
and define F (−i)
:= Sℓi
:= S \ S(i)
·
of n3
G selection candidates
corresponds to the jth vertex with
j
j=1 F (i)
j
:=Sℓi
ii) for each edge e ∈ E(G), add an edge candidate ce; we say that ce corresponds to edge e.
Denote by Redges the set of all edge candidates. For each color i ∈ [k] and each index j ∈ [ℓi],
we denote by R(i)
the set of edge candidates corresponding to the edges that are incident to
j
j
·
23
the jth vertex with color i. Accordingly, we define R(i)
·
:= Sj∈[ℓi] R(i)
j and define R(−i)
:=
·
Si′∈[k]\{i} R(i′)
·
;
iii) add three sets of dummy candidates, denoted by D1, D2, D3, each of size n5
G.
Define D := D1 ∪ D2 ∪ D3. Accordingly, for each i ∈ [3], we define D−i := D \ Di.
G ·Pk
i=1(ℓi + 1) + mG + 3n5
Note that C = 3n3
Next, we specify the voters. The voter set V consists of 2k + 3 voters: v2i−1, v2i for all i ∈ [k]
and v2k+1, v2k+2, v2k+3. The first 2k voters form the k color-gadgets as mentioned above. The
last three voters are necessary to obtain the desired scores. We begin with the color-gadgets. For
each color i ∈ [k], we first specify the "interesting" part of the preference orders of voters v2i−1
and v2i by setting
G = 3(k + nG + n2
G + mG.
G) · n3
hP2i−1i := hS(i)
hP2ii := hS(i)
ℓi
2 i ≻ hR(i)
i ≻ hR(i)
ℓi
1 i ≻ hF (i)
i ≻ hF (i)
ℓi
2 i ≻ . . . ≻ hS(i)
i ≻ . . . ≻ hS(i)
ℓi+1i ≻ hR(i)
1 i ≻ hR(i)
i ≻ hF (i)
1 i ≻ hF (i)
ℓi
1 i ≻ p.
ℓi+1i ≻ p,
Note that both hP2i−1i as well as hP2ii have exactly ℓi · (3n3
"interesting" parts, we specify the preference orders of voters v2i−1 and v2i as
G + ∆) + 1 candidates. Having these
1 i ≻ hD1i ≻ hP2i−1i ≻ hD−1i ≻ hS(−i)
·
∪ R(−i)
·
←−−
hD1i ≻ d ≻
i ≻ hF (−i)
i,
←−−−−
hF (−i)
i.
·
1 i ≻ hF (i)
d ≻ hS(i)
←−−−−−−−−−−
hS(−i)
∪ R(−i)
i ≻ hS(i)
·
·
Let R ⊆ Redges be a set of (cid:0)k
←−−−−
hD−1i ≻ hP2ii ≻
ℓi+1i ≻
ℓi+1i ≻ hF (i)
2(cid:1) arbitrary edge candidates and let R′ := Redges \ R be the set
·
consisting of the remaining edge candidates. To complete V , we set the preference orders of
voters v2k+1, v2k+2, and v2k+3 as
d ≻ hRedgesi ≻ hD1i ≻ p ≻ hD−1i ≻ hS ∪ F i,
hR′i ≻ d ≻ hRi ≻ hD2i ≻ p ≻ hD−2i ≻ hS ∪ F i,
hS ∪ F i ≻ hRedgesi ≻ hD3i ≻ p ≻ hD−3i ≻ d.
Finally, set the budget B := (nG + k) · (3n3
the construction (recall that we consider unit prices).
G + ∆) and the election E := (C, V ). This completes
Before showing the correctness of the construction we determine the score of each candidate.
Recall that the score of candidate d in Copeland for odd number of voters is equal to the
number of candidates against whom d wins the head-to-head contests. To this end, let cd ∈ D,
let cu ∈ S ∪ F , and let ce ∈ Redges with e being an edge incident to the rth vertex of color i and
24
the sth vertex of color j. The scores are:
scoreE(d) = C \ R′ − 1 = C −
∆ · nG
2
+(cid:18)k
2(cid:19) − 1,
∆ · nG
2
∆ · nG
2
s ∪ S(j)
s+1) − 1
scoreE(p) = C \ (Redges ∪ S) − 1 = C −
− n3
G · (nG + k) − 1,
scoreE(cd) < C \ Redges − 1 = C −
− 1 < scoreE(c),
scoreE(ce) ≤ C \ (S(i)
= C − 4n4
r+1 ∪ S(j)
r ∪ S(i)
G − 1 < scoreE(c),
scoreE(cu) ≤ C \ (D1 ∪ {d}) − 1 < C − n5
G < scoreE(c).
G +(cid:0)k
Hence, candidate d is the unique winner with score C − ∆ · nG/2 +(cid:0)k
2(cid:1) − 1 and p needs (nG +
2(cid:1) additional points to become a winner. Observe that in each preference order, when
k) · n3
d beats p, it is at least n5
G > B positions ahead of p. Hence, during the shifting of p the score
of d cannot be decreased, implying that p can only win by increasing its score. This can only
happen if p wins against candidates in Redges ∪ S. Furthermore, note that for all cu ∈ S and
all ce ∈ Redges, it holds that
NE(ce, p) = NE(p, ce) + 7,
NE(cu, p) = NE(p, cu) + 1.
In particular, this means that p has to pass cu in just one voter's preference order in order to
win against cu. To win the contest against ce, however, p has to pass ce in at least four voters'
preference orders. Furthermore, the number of selection candidates is much higher than the
number of edge candidates. Hence, p has to be shifted over basically all selection candidates to
obtain the necessary points. Because of the distribution of the selection candidates, it follows
that the only way of winning against all selection candidates is to spend (ℓi+1)·(3n3
G+∆) shifts in
each pair of voters v2i−1, v2i. This means that for each color i, we can select exactly one vertex of
index j ∈ [ℓi] such that p passes in v2i−1's and in v2i's preference orders all candidates from R(i)
j ,
implying that p wins against all edge candidates with the corresponding edges incident to the
jth vertex of color i. Thus, if p wins against (cid:0)k
describe a multicolored clique in G.
2(cid:1) edge candidates, then the corresponding edges
We now formalize this idea when proving the correctness of our construction: (G, k, col) is a
yes-instance of Multicolored Clique if and only if (E, p, B) is a yes-instance of Copeland
Shift Bribery with unit prices.
"⇒:" Let Q ⊆ V (G) be a size-k multicolored clique. We construct a shift-action mak-
ing p a winner in shift(E, #»s ) with at most B shifts. To this end let Q = {u(1)
} be
the multicolored clique such that for each i ∈ [k], ui
ji is the jith vertex of color i. For each
color i ∈ [k], perform the following shifts in v2i−1's and v2i's preference orders: Shift p in v2i−1's
preference order directly in front of the first candidate in hS(i)
ji+1i and shift p in v2i's preference
order directly in front of the first candidate in hS(i)
ji i. We perform no shifts in the last three
preference orders. This completes the description of #»s . First, observe that altogether these
are (nG + k) · (3n3
G + ∆) = B shifts. Next, observe that p passes in v2i−1's preference order all
j1 , . . . , u(k)
jk
25
ji, uh
ji , uh
jh } with ui
r=ji
r . Recall that for all cu ∈ S(i)
Altogether p gains (nG + k) · n3
winner in shift(E, #»s ).
selection candidates from Sℓi
tion candidates fromSr∈[ji] S(i)
S(i)
r+1. Furthermore, p passes in v2i's preference order all selec-
· , we have NE(cu, p) = NE(p, cu)+1.
This implies that p wins in shift(E, #»s ) against all selection candidates. Furthermore, note that
for each edge e = {ui
jh ∈ Q, p also passes ce in the preference orders of
ji and ce ∈ R(h)
voters v2i−1, v2i, v2j−1, and v2j as ce ∈ R(i)
. As NE(ce, p) = NE(p, ce) + 7 for
each ce ∈ C(E(G)), p wins against the (cid:0)k
2(cid:1) edge candidates corresponding to the edges in G[Q].
G +(cid:0)k
2(cid:1) additional points after the shifting and, hence, p is a
G + (cid:0)k
2(cid:1) points through the shifting. As p already wins in
that p gains at least (nG + k) · n3
the original election E against all dummy candidates in D and as D1 = D2 = D3 > B,
by the construction of the preference orders, we can assume that p is shifted in no preference
order from the last three voters, and that p is shifted at most ℓi · (3n3
G + ∆) positions in v2i−1's
or v2i's preference order, that is, s2k+1 = s2k+2 = s2k+3 = 0, s2i−1 ≤ ℓi · (3n3
G + ∆), and s2i ≤
ℓi · (3n3
"⇐:" Let #»s = (s1, . . . , s2k+3) be a shift action making p a winner in shift(E, #»s ). This means
jh
G + ∆).
We next show that, for each color i there is at most one vertex of color i such that p is
shifted in v2i−1's and in v2i's preference orders over some edge candidates corresponding to this
vertex's incident edges. In other words, if p wins in shift(E, #»s ) against the edge candidates ce1
and ce2 with e1 = {x1, y1} and e2 = {x2, y2} such that x1 and x2 are both colored with i,
then x1 = x2. Suppose for the sake of contradiction that p wins in shift(E, #»s ) against the
edge candidates ce1 and ce2 such that e1 = {x1, y1}, e2 = {x2, y2}, x1 and x2 are both colored
with i, and x1 6= x2. A lower bound for s2i−1 + s2i under this assumption can be seen as
follows. Recall that in order to make p a winner one must shift p over each selection candidate
from S(i)
· . This can only be done by shifting p at least once (in v2i−1 or v2i) over each of
altogether ℓi · (3n3
· . Furthermore, at least two
sets of filler candidates (each containing 2n3
G candidates and corresponding either to x1 or to
x2) and the two edge candidates ce1 and ce2 have to be passed by p a second time. Hence,
s2i−1 + s2i ≥ ℓi · (3n3
G − ∆ + 2. Thus, the remaining
budget B′ is:
G + ∆) candidates from X (i) := S(i)
G + 2 = (ℓi + 1) · (3n3
G + ∆) + 4n3
· ∪ R(i)
· ∪ F (i)
G + ∆) + n3
B′ = Xj∈[k]\{i}
s2j−1 + s2j
= B − (s2i−1 + s2i)
≤ (nG + k) · (3n3
= − (n3
G − ∆ + 2) + (3n3
G + ∆) − (ℓi + 1) · (3n3
G + ∆) − n3
G + ∆ − 2
G + ∆) · Xj∈[k]\{i}
(ℓj + 1)
The first equation holds since s2k+1 = s2k+2 = s2k+3 = 0, To see the second equation and the
inequality apply the definitions of B′ and B and the above discussed lower bound for s2i−1 + s2i.
Next, observe that in order to win in shift(E, #»s ), p has to win head-to-head contests against
at least S − mG selection candidates. This implies that for each j ∈ [k], at least (ℓj + 1) ·
(3n3
G + ∆) − mG unit shifts in the color-gadget for color j are needed. The number of required
26
unit shifts sum up to:
Xj∈[k]\{i}
((ℓj + 1) · (3n3
G + ∆) − mG)
G + ∆) · Xj∈[k]\{i}
G + ∆) · Xj∈[k]\{i}
= − (k − 1) · mG + (3n3
(ℓj + 1)
> − (n3
G − ∆ + 2) + (3n3
(ℓj + 1).
G/2 <
G/2 − ∆ + 2. Finally, it follows that the number of additional shifts needed to make p a
To see the last inequality recall that mG = ∆ · nG/2 and k < nG and observe that ∆ · n2
∆ · n3
winner exceeds the remaining budget B′; a contradiction.
Next, we show how to construct a multicolored clique given the shift-action #»s that makes p
a winner. Denote by X the set of edge candidates against whom p wins already in shift(E, #»s ),
let E(X) be the corresponding set of edges, and let V (X) be the vertices incident to these edges,
that is, V (X) =Se∈E(X) e. We now prove that V (X) forms a multicolored clique of size k. We
already showed above that for each pair e1 = {x1, y1} ∈ E(X) and e2 = {x2, y2} ∈ E(X) such
that x1 and x2 are both colored with i it follows that x1 = x2. Hence, V (X) contains at most
one vertex of each color, implying that V (X) ≤ k. Even though we assume that p wins against
all selection candidates in shift(E, #»s ), p has to further win against at least (cid:0)k
2(cid:1) edge candidates
in shift(E, #»s ) in order to have the same score as d and win the election. Hence, E(X) ≥(cid:0)k
2(cid:1).
Thus, V (X) forms a clique of size exactly k in G. Since for each color there is at most one vertex
in V (X) and there are k colors and thus V (X) is multicolored.
Since determining the winner under the Copeland rule can be done in polynomial-time, the
above W[1]-hardness result shows that unless unlikely complexity class collapses occur, it is
impossible to improve Theorem 6 to provide an exact FPT algorithm. Since the publication
of our conference paper [15], Bredereck et al. [21] complemented our W[1]-hardness result by
showing that for the Borda and maximin rules, Shift Bribery parameterized by the number
of voters is W[1]-hard.
5.2 Number of Candidates
As opposed to almost all other (unweighted) election problems ever studied in computational
social choice, for Shift Bribery (and for bribery problems in general) the parameterization
by the number of candidates is one of the most notorious ones. In other election problems, the
natural, standard attack is to give integer linear program (ILP) formulations and use Lenstra's
algorithm [49]. For instance, this has been applied to winner determination [2], control [36],
possible winner [7, 17], and lobbying [16] problems. This works because with m candidates
there are at most m! different preference orders and we can have a variable for each of them in
the ILP. However, in our setting this approach fails. The reason is that in bribery problems the
voters are not only described by their preference orders, but also by their prices. This means that
we cannot easily lump together a group of voters with the same preference orders anymore, and
we have to treat each of them individually (however, for the case of sortable and all-or-noting
price function families, Bredereck et al. [18] found a novel way of employing the ILP approach
to obtain FPT algorithms).
27
Dorn and Schlotter [28] have already considered the complexity of Swap Bribery parame-
terized by the number of candidates. However, their proof implicitly assumes that each voter has
the same price function and, thus, it implies that Shift Bribery (parameterized by the num-
ber m of candidates) is in FPT for unit prices, but not necessarily for the other families of price
functions. Whenever the number of different prices or different price functions is upper-bounded
by some constant or, at least, by some function only depending on m, Dorn and Schlotter's
approach can be adapted.
For the more general price function families (i.e., for convex and arbitrary price functions),
we were neither able to find alternative FPT attacks nor to find hardness proofs (which, due to
the limited number of candidates one can use and the fact that the voters are unweighted, seem
particularly difficult to design). However, as in the case of parameterization by the number of
voters (Theorem 6), we can show that there is an FPT-approximation scheme for the number of
candidates when the prices are sortable.
Theorem 8. Let R be a voting rule for which winner determination parameterized by the num-
ber m of candidates is in FPT. There is a factor-(1 + 2ε + ε2) approximation algorithm solving
R Shift Bribery for sortable prices in time O∗(M M·⌈ln(M/ε)⌉+1) (where M = m · m!) times
the cost of R's winner determination.
Proof. Let I = (C, V, Π, p) be an instance of (the optimization variant of) R Shift Bribery
with Π being sortable, and let ε > 0 be a rational number. We show how to compute a successful
shift action #»s for I such that Π(s) ≤ (1 + ε) · OPT. Our algorithm will have FPT running time
for the combined parameter number of candidates and ε.
Before we start with the algorithm, we describe a helpful interpretation of solutions for
R Shift Bribery with sortable prices. We call a set of voters all having the same preference
order a voter block. Let m′ ≤ m! denote the number of voter blocks in our election. We assume
that the voters from each voter block appear consecutively and are ordered according to the
price of shifting p to the top position (if they did not, then we could sort them in this way).
Using the fact that the price function list Π in I is sortable, simple exchange arguments show
that there is a successful minimum-cost shift action #»s such that for each two voters vi and vj
from the same block, it holds that i < j implies si ≥ sj. Informally, this means that for each
two voters with the same preference order, one never shifts p farther in the preference order of
the more expensive voter.
Based on the above observation, we can conveniently express shift actions for our election
m−1,
1, . . . , µ1
1 , . . . , µm′
m−1, µ2
m−1) is a vector of natural numbers, such that for each x ∈ [m′], µx
in an alternative way. We say that a stepwise shift action #»µ = (µ1
. . . , µm′
m−1
describe the shifts p makes in the block x in the following way: for each y ∈ [m − 1], µx
y is the
number of voters in the x'th block for whom we shift p by at least y positions. More precisely,
we define s-shift(E, #»µ ) to be the election E′ = (C, V ′) identical to E, except that p has been
shifted forward in µx
y voters of block x by at least y positions. Moreover, a stepwise shift action
#»µ is valid if for each x ∈ [m′], y ∈ [m − 2] it holds that µx
y . Informally, a stepwise shift
action is valid if one never shifts p by at least y + 1 positions without first having it shifted by
at least y positions. A stepwise shift action is successful if p is an R-winner in s-shift(E, #»µ ).
Every valid stepwise shift action can be translated into a shift action.
1, . . . , µ2
0 , . . . , µx
y+1 ≤ µx
The above notion is crucial for understanding our algorithm. Thus, let us give a concrete
example (see Figure 2). Assume that we have four voters, all in the same voter block. The first
28
v1 1 1 1 p 3
v2 4 2 1 p 7
v3 3 3 3 p 3
v4 6 4 6 p 0
5 3 5
shift action: (3, 3, 1, 0)
stepwise shift action: (3, 2, 2)
budget distribution: (3, 7, 3, 0)
stepwise budget distribution: (5, 3, 5)
Figure 2: Illustration of the shift action (3, 3, 1, 0) restricted to a specific voter block, where p
ranks fourth in the common preference order. The price functions are π1(j) = j, π2(j) = 2j − 1,
π3(j) = 3j, and π4(j) = j2 + j + 4 with j < 4. The voters are sorted descending with respect to
their price functions, that is, for any 1 ≤ j ≤ 4 and 1 ≤ i < i′ ≤ 4 it holds that πi(j) ≤ πi′ (j).
Each row in the matrix represents one voter. The entry j cells left of p contains the price for
moving p from position 4 − j + 1 to position 4 − j. The cell in row i and column 4 − j is
marked gray if we shift p by j positions in voter i's preference order. Counting the number of
marked cells row-wise gives the shift action. Summing up the costs row-wise gives the budget
distribution. Summing up the costs column-wise gives the stepwise budget distribution.
#»
#»
one has price function π1(j) = j, the second one has price function π2(j) = 2j − 1, the third
one has price function π3(j) = 3j, and the fourth one has price function π4(j) = j2 + j + 4. For
b = (6, 4, 9, 0), Π-s-shift(
b ) is a stepwise shift action (3, 2, 2, 0, . . .): We can spend the 6 units
of budget on shifting p forward by at least one position and this suffices to shift p forward for
the first, second, and third voter. Note that, the cost is actually 5 units. For these three voters,
we have 4 units of budget to shift p further. This is enough to shift p one position up in the
preference orders of the first and the second voter (the actual cost of this operation is 3). Finally,
for these two voters, we have 9 units of budget to shift p forward by one more position. This
costs 3 for both voters and so we, again, shift p forward by one more position in the preference
orders of the first and second voter. Even though we have 6 units of budget left, we do not use
them on anything (in particular, we do not try to spend them on the third voter). The stepwise
budget distribution corresponding to the stepwise shift action is (5, 3, 5).
#»
Let
b = (b1
1, . . . , b1
m−1, b2
1, . . . , b2
#»
m−1, . . . , bm′
1 , . . . , bm′
m−1) be a vector (intuitively, the entries
in this vector should sum up to the amount of money that we wish to spend). We define
the stepwise shift action Π-s-shift(
1), . . . ,
m−1), . . . , Π-s-shift(bm′
Π-s-shift(b2
m−1)) such that for each x ∈ [m′], y ∈ [m−1]
it holds that Π-s-shift(bx
y such that the cost of shifting p in the preference
orders of tx
y voters of block x by y positions (provided that they have already been shifted by
y − 1 positions) is at most bx
y′ , for all y′ ∈ [m − 2]). Note that the last condition
ensures that Π-s-shift(
b ) can be computed in
polynomial time.
b ) = (Π-s-shift(b1
1 ), . . . , Π-s-shift(bm′
b ) is valid. It is not hard to verify that Π-s-shift(
y ) is the largest number tx
1), . . . , Π-s-shift(b1
m−1), Π-s-shift(b2
y (and tx
y′+1 ≤ tx
#»
#»
We are now ready to sketch the idea behind the main component of our algorithm (we present
the formal proof later), namely behind Algorithm 1. Given an ǫ > 0 and a budget B, if it is
possible to ensure p's victory by spending at most B units of budget, the algorithm computes a
shift-action with cost at most ≤ (1 + ε) · B. The algorithm consists of two parts: an FPT time
exhaustive search part (realized by the function Search), and an approximation and verification
part (realized by the bottom loop of the algorithm). If there is a successful stepwise shift action
29
Algorithm 1: FPT approximation scheme for Shift Bribery parameterized by the number of
candidates.
Parameters:
(C, V, Π, p, B) - input Shift Bribery instance
R - voting rule
m′ - the number of voter blocks
m - the number of candidates
ε - approximation parameter
Search( #»q = (q1, . . . , qM ), Q, t):
if t = 0 then
return { #»q } ;
R ← {} ;
foreach i ∈ [M ] do
#»
q′ ← (q1, . . . , qi−1, qi + Q
M
q′, Q − Q
R ← R ∪ Search(
M
#»
, qi+1, . . . , qM ) ;
, t − 1) ;
return R ;
M ← m′ · (m − 1);
R ← Search((0, . . . , 0), B, M · ⌈ln( M
foreach
#»
ε )⌉ + 1) ;
b′ ∈ R do
b′ + ( ε
#»
# »
b′′ ←
M · B, . . . , ε
M · B) ;
if p is R-winner in s-shift(E, Π-s-shift(
b′′)) then
return shift action corresponding to Π-s-shift(
# »
b′′);
# »
return "no";
#»
#»
#»
#»
b . Observe that at least one entry in
b whose entries sum up to B
of cost B = OPT(I), then there is a stepwise budget distribution
b ) is a successful stepwise shift action. The algorithm tries to find this
and such that Π-s-shift(
b must be greater than or equal to B/(m′ · (m − 1))
vector
(that is, to the average value of the entries). Search simply guesses the correct entry and repeats
this procedure recursively with the remaining budget. Doing this, it guesses the entries to which
it allocates smaller and smaller chunks of the budget (perhaps adding funds to the entries that
already received some part of the budget), until it distributes a "major part" of the budget
(never in any entry exceeding the corresponding value from
b ). Then, the algorithm turns to
the approximation part: It simply increases every entry in the vector by whatever was left of
the budget. In effect, we find a vector such that every entry matches or exceeds that of
b but
the total price is not much greater than B. The only problem with this approach is that we do
not know OPT(I). However, we will see that trying a certain small number of different budget
values B suffices.
#»
#»
We now move on to the formal proof. We will first show that for each integer B, if I(B) =
(C, V, Π, p, B) is a yes-instance of R Shift Bribery with sortable prices, m candidates, and
m′ different voter blocks, then Algorithm 1 computes in O∗((m′ · m)m′·m·⌈ln(m′·m/ε)⌉+1 · w(m))
time (where w(m) is the exponential part of the running time needed for winner determination)
a successful shift action #»s for I such that Π( #»s ) ≤ (1 + ε)B.
Let M = m′ · (m − 1). It is easy to verify the running time of Algorithm 1 which comes from
the exhaustive search of depth M ·⌈ln(M/ε)⌉+1 in Search. To see that it indeed gives the desired
answer, assume that I(B) is a yes-instance and let
m−1) be
m−1, . . . , bm′
1, . . . , b2
1, . . . , b1
m−1, b2
b = (b1
#»
30
a vector such that Px∈[m′],y∈[m−1] bx
y = B, and Π-s-shift(b) is a successful stepwise shift action.
We observe that, by the pigeonhole principle, there are x ∈ [m′], y ∈ [m−1], such that bx
y ≥ B/M .
Search tries each choice of x and y and then repeats this process recursively for M ·⌈ln(M/ε)⌉+1
m−1)
steps. This means that there is a vector
among those in R such that:
m−1, . . . , b′m′
1 , . . . , b′m′
1, . . . , b′1
1, . . . , b′2
m−1, b′2
b′ = (b′1
#»
(a) for each x ∈ [m′], y ∈ [m − 1] it holds that b′x
y ≤ bx
y , and
(b) B −Px∈[m′],y∈[m−1] b′x
y < B(1 − 1
M )M·ln M
ε < B · e− ln M
ε = ε
M · B.
Thus, for each x ∈ [m′], y ∈ [m − 1] it holds that b′′x
is a vector computed by Search. Now, Π-s-shift(
ensuring that Π-s-shift(
value in Π-s-shift(
b′′
b′′) is a successful stepwise shift action. Even
b′′) is valid will not decrease any component below the corresponding
b′′) is at most (1 + ε) · B.
b ). The cost of Π-s-shift(
y + B · ε/M ≥ bx
y . Recall that
y = b′x
#»
#»
#»
#»
#»
Now we can compute an approximate solution for I as follows. We start by considering shift
action Π-shift(0, . . . , 0) and output it if it is successful. Otherwise, we run Algorithm 1 for each
budget (1 + ε)i, for i = 0, 1, 2, . . . and output the first successful shift action that it outputs.
Note that if the cost of some cheapest successful shift action for I is B, then after O(ln B)
iterations the procedure above will find a budget B′ such that B ≤ B′ < (1 + ε) · B. For this B′,
Algorithm 1 will output a successful shift action with cost at most (1 + ε) · B′ ≤ (1 + ε)2 · B =
(1 + 2ε + ε2) · B. This shows that our algorithm is indeed an approximation scheme. It remains
to show that it runs in FPT time (parameterized by the number of candidates). To see this, it
suffices to note that O(ln B) = O(ln(Π(m, . . . , m))) = O(I) and that Algorithm 1 runs in FPT
time.
Since the publication of our original findings [15], Bredereck et al. [18] have improved upon
our FPT-AS result stated in Theorem 8, using mixed integer linear programs to show membership
in FPT. Their approach relies on the fact that the fixed-parameter tractability result of ILP
Feasibility parameterized by the number of variables [48] also holds for mixed integer linear
programs, where the number of integer-valued variables is upper-bounded by a function in the
parameter but the number of real-valued variables is not restricted (i.e., the number of real-
valued variables is polynomial in the size of the input). Nonetheless, they also use a number of
insights from the above algorithm.
Adopting some of the ideas of the above proof, we obtain the following XP algorithm for Shift
Bribery with arbitrary price functions. The corresponding algorithm relies on the fact that for
a set of voters with the same preference orders, finding a subset of q voters who shift p higher
by exactly the same number j of positions and who have the minimum price is polynomial-time
solvable.
Theorem 9. Let R be a voting rule whose winner determination procedure is in XP when
parameterized by the number m of candidates. R Shift Bribery parameterized by m is in XP
for each price function family that we consider. The algorithm runs in time O∗((nm)m!) times
the cost of R's winner determination.
Proof. Let R be a voting rule whose winner determination procedure is in XP when parameter-
ized by the number of candidates. We give an XP algorithm for R Shift Bribery.
31
Let I = (C, V, Π, p) be an input instance of R Shift Bribery. Let n be the number of
voters and let m be the number of candidates in E = (C, V ). Each voter has one of m! possible
preference orders and we partition V into vectors V 1, . . . , V m! of voters with the same preference
orders. Our algorithm works as follows:
1. For each ℓ, 1 ≤ ℓ ≤ m!, guess a vector
#»
qℓ = (qℓ
0, . . . , qℓ
m) of nonnegative integers that sum
up to (cid:12)(cid:12)V ℓ(cid:12)(cid:12). For each guessed list of vectors do the following:
(a) Compute the cheapest shift action #»s such that for each ℓ, 1 ≤ ℓ ≤ m!, and for each
j, 0 ≤ j ≤ m, there are exactly qℓ
j voters in V ℓ for whom we shift p by exactly j
positions. If such a shift action does not exist then move on to another guess in the
preceding step of the algorithm. (Below we describe precisely how to implement this
step.)
(b) If p is an R-winner of shift(E, #»s ) then store #»s as a successful shift action.
2. Return the cheapest stored successful shift action.
Since, in essence, the algorithm tries all interesting shift actions, it is clear that it is correct.
We now show that it is possible to implement it to run in XP time with respect to the number
of voters.
In the first step, the algorithm has O((nm)m!) possible guesses so we can try them all.
qm! in step (1a). Let ℓ be some
However, it is not clear how to implement given vectors
integer, 1 ≤ ℓ ≤ m!. We will show how to compute the part of #»s that implements
q1, . . . ,
#»
qℓ.
#»
# »
We solve the problem by reducing it to an instance of a variant of Min Cost/Max Flow
problem where, in addition to the standard formulation, we are also allowed to put lower bounds
on the amount of flow traveling through some edges (we call these values demands; this problem
is well-known to be polynomial-time solvable [1]).
Let us rename the voters in V ℓ so that V ℓ = (v1, . . . , vr) for some r ∈ N. We form the
following flow network for Min Cost/Max Flow. We let the set N of vertices be {s, t} ∪
{v1, . . . , vr} ∪ {0, . . . , m}. Vertices s and t are, respectively, the source and the sink. Vertices
v1, . . . , vr form the first layer in the flow network and correspond to the voters in V ℓ. Vertices
0, . . . , m form the second layer in the network and correspond to the extent to which p should
be shifted (in a given group of voters). We have the following edges:
1. For each i, 1 ≤ i ≤ r, there is an edge with unit capacity and zero cost from s to vi.
2. For each i, 1 ≤ i ≤ r and each j, 0 ≤ j ≤ m, there is an edge with unit capacity and cost
πi(j) from vi to j (πi is vi's price function).
3. For each j, 0 ≤ j ≤ m, there is an edge from j to t with capacity and demand qℓ
j and
zero cost (the setting of capacity and demand means that we are interested in flows where
there are exactly qℓ
j units of flow traveling from j to t).
There is a polynomial-time algorithm that finds a lowest-cost flow from s to t that satisfies
the capacity and demand constraints of all the edges [1]. The constructed flow network is of
polynomial size with respect to our input instance, so our algorithm indeed runs in XP time.
Further, the flow from vertices {v1, . . . , vr} to vertices {0, . . . , j} defines the desired shift action
in a natural way: If a unit of flow travels from some vi, 1 ≤ i ≤ r, to some j, 0 ≤ j ≤ m, then
we shift p by j positions in vi. This completes the argument.
32
6 Conclusion
We have studied the parameterized complexity of Shift Bribery under the voting rules Borda,
Maximin, and Copeland, for several natural parameters (either describing the nature of the
solution or the size of the election) and for several families of price functions (arbitrary, convex,
unit, sortable, and all-or-nothing). Our results confirmed the belief that the computational
complexity depends on all three factors: the voting rule, the parameter, and the type of price
function used.
Our work leads to some natural follow-up questions. First, it would be interesting to resolve
the complexity of Shift Bribery parameterized by the number of candidates for arbitrary price
functions (see Table 1); at the moment we only know that it is W[1]-hard and in XP. For both
Borda and Maximin, and for the parameter "number t of unit shifts", we obtain a partial problem
kernel, that is, using polynomial time, we can shrink a given instance to one whose numbers of
alternatives and voters are upper-bounded by a function in t (Theorem 2 and Corollary 1). This
function, however, is an exponential function. Thus, it would be interesting to know whether it is
possible to design an efficient kernelization algorithm [9] that replaces this exponential function
with a polynomial. A similar concept to the kernelization lower bound would be to show a lower
bound on the size of only part of the problem kernel
Further, one could study the problem for other voting rules. Going in the direction of the
Margin of Victory type of problems, it would be interesting to study Destructive Shift
Bribery, where we can push back the despised candidate to prevent him or her from being a
winner (initial results in this direction are due to Kaczmarczyk and Faliszewski [44]).
Finally, recently Bulteau et al. [23] introduced a model of affecting election outcomes by
adding groups of voters to the election (this is an extension of a well-studied problem known
as Control by Adding Voters [3, 43]). Bredereck et al. [19] considered Shift Bribery in
a similar setting where one can affect multiple voters at the same time (for example, airing an
advertisement on TV could affect several voters at the same time). Unfortunately, most of their
results are quite negative and it would be interesting to investigate the combinatorial variant of
Shift Bribery from the point of view of heuristic algorithms.
Acknowledgments
We are grateful to the anonymous referees of AAAI 2014 and of Information and Computation
that helped us to significantly improve the paper.
Robert Bredereck was supported by the DFG project PAWS (NI 369/10). Jiehua Chen was
partially supported by the Studienstiftung des Deutschen Volkes. Piotr Faliszewski was partially
supported by the DFG project PAWS (NI 369/10) while staying at TU Berlin, and by AGH
University grant 11.11.230.124 (statutory research) during the rest of the project.
References
33
Bibliography
[1] R. Ahuja, T. Magnanti, and J. Orlin. Network Flows: Theory, Algorithms, and Applications.
Prentice-Hall, 1993. 32
[2] J. Bartholdi, III, C. Tovey, and M. Trick. Voting schemes for which it can be difficult to
tell who won the election. Social Choice and Welfare, 6(2):157–165, 1989. 27
[3] J. Bartholdi, III, C. Tovey, and M. Trick. How hard is it to control an election? Mathematical
and Computer Modeling, 16(8/9):27–40, 1992. 33
[4] D. Baumeister and J. Rothe. Taking the final step to a full dichotomy of the possible winner
problem in pure scoring rules. Information Processing Letters, 112(5):186–190, 2012. 3
[5] D. Baumeister, P. Faliszewski, J. Lang, and J. Rothe. Campaigns for lazy voters: Truncated
ballots. In Proceedings of the 11th International Conference on Autonomous Agents and
Multiagent Systems (AAMAS '12), pages 577–584. IFAAMAS, 2012. 3, 6, 9
[6] N. Betzler and B. Dorn. Towards a dichotomy of finding possible winners in elections based
on scoring rules. Journal of Computer and System Sciences, 76(8):812–836, 2010. 3
[7] N. Betzler, S. Hemmann, and R. Niedermeier. A multivariate complexity analysis of de-
termining possible winners given incomplete votes. In Proceedings of the 21st International
Joint Conference on Artificial Intelligence (IJCAI '09), pages 53–58. AAAI Press, 2009. 27
[8] N. Betzler, J. Guo, and R. Niedermeier. Parameterized computational complexity of Dodg-
son and Young elections. Information and Computation, 208(2):165–177, 2010. 21
[9] N. Betzler, J. Guo, C. Komusiewicz, and R. Niedermeier. Average parameterization and
partial kernelization for computing medians. Journal of Computer and System Sciences, 77
(4):774–789, 2011. 12, 14, 33
[10] N. Betzler, R. Bredereck, J. Chen, and R. Niedermeier. Studies in computational aspects
of voting-a parameterized complexity perspective. In The Multivariate Algorithmic Rev-
olution and Beyond, volume 7370 of LNCS, pages 318–363. Springer-Verlag, 2012. 4, 7
[11] F. Brandt, V. Conitzer, and U. Endriss. Computational social choice. In G. Weiss, editor,
Multiagent Systems, pages 213–283. MIT Press, 2013. 4
[12] F. Brandt, P. Harrenstein, K. Kardel, and H. Seedig. It only takes a few: On the hardness of
voting with a constant number of agents. In Proceedings of the 12th International Conference
on Autonomous Agents and Multiagent Systems (AAMAS '13), pages 375–382. IFAAMAS,
2013. 21
[13] F. Brandt, V. Conitzer, U. Endriss, J. Lang, and A. Procaccia, editors. Handbook of
Computational Social Choice. Cambridge University Press, 2016. 4
[14] R. Bredereck, J. Chen, P. Faliszewski, J. Guo, R. Niedermeier, and G. J. Woeginger. Param-
eterized algorithmics for computational social choice: Nine research challenges. Tsinghua
Science and Technology, 19(4):358–373, 2014. 7
34
[15] R. Bredereck, J. Chen, P. Faliszewski, A. Nichterlein, and R. Niedermeier. Prices matter for
the parameterized complexity of shift bribery. In Proceedings of the 28th AAAI Conference
on Artificial Intelligence (AAAI '14), pages 1398–1404. AAAI Press, 2014. 27, 31
[16] R. Bredereck, J. Chen, S. Hartung, S. Kratsch, R. Niedermeier, O. Such´y, and G. J. Woeg-
inger. A multivariate complexity analysis of lobbying in multiple referenda. Journal of
Artificial Intelligence Research, 50:409–446, 2014. 27
[17] R. Bredereck, J. Chen, R. Niedermeier, and T. Walsh. Parliamentary voting procedures:
Agenda control, manipulation, and uncertainty. In Proceedings of the 25th International
Joint Conference on Artificial Intelligence (IJCAI '15), pages 164–170. AAAI Press, 2015.
27
[18] R. Bredereck, P. Faliszewski, R. Niedermeier, P. Skowron, and N. Talmon. Elections with
few candidates: Prices, weights, and covering problems. In Proceedings of the 4th Interna-
tional Conference on Algorithmic Decision Theory, volume 9346 of LNCS, pages 414–431.
Springer-Verlag, 2015. 27, 31
[19] R. Bredereck, P. Faliszewski, R. Niedermeier, and N. Talmon. Large-scale election cam-
paigns: Combinatorial shift bribery. In Proceedings of the 14th International Conference
on Autonomous Agents and Multiagent Systems (AAMAS '15), pages 67–75. IFAAMAS,
2015. 33
[20] R. Bredereck, P. Faliszewski, R. Niedermeier, and N. Talmon. Large-scale election cam-
paigns: Combinatorial shift bribery. Journal of Artificial Intelligence Research, 55:603–652,
2016. 5
[21] R. Bredereck, P. Faliszewski, R. Niedermeier, and N. Talmon. Complexity of shift bribery in
committee elections. In Proceedings of the 30th AAAI Conference on Artificial Intelligence
(AAAI '16), pages 2452–2458. AAAI Press, 2016. 5, 23, 27
[22] E. Brelsford, P. Faliszewski, E. Hemaspaandra, H. Schnoor, and I. Schnoor. Approxima-
bility of manipulating elections. In Proceedings of the 23rd AAAI Conference on Artificial
Intelligence (AAAI '08), pages 44–49. AAAI Press, 2008. 3
[23] L. Bulteau, J. Chen, P. Faliszewski, R. Niedermeier, and N. Talmon. Combinatorial voter
control in elections. Theoretical Computer Science, 589:99–120, 2015. 33
[24] J. Chen, P. Faliszewski, R. Niedermeier, and N. Talmon. Elections with few voters: Can-
In Proceedings of the 29th AAAI Conference on Artificial
didate control can be easy.
Intelligence (AAAI '15), pages 2045–2051. AAAI Press, 2015. 21
[25] Y. Chevaleyre, U. Endriss, J. Lang, and N. Maudet. A short introduction to computational
social choice. In Proceedings of the 33rd International Conference on Current Trends in
Theory and Practice of Computer Science, volume 4362 of LNCS, pages 51–69. Springer-
Verlag, 2007. 4
[26] V. Conitzer, M. Rognlie, and L. Xia. Preference functions that score rankings and maximum
likelihood estimation. In Proceedings of the 21st International Joint Conference on Artificial
Intelligence (IJCAI '09), pages 109–115. AAAI Press, 2009. 6, 9
35
[27] M. Cygan, F. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk,
and S. Saurabh. Parameterized Algorithms. Springer-Verlag, 2015. 7
[28] B. Dorn and I. Schlotter. Multivariate complexity analysis of swap bribery. Algorithmica,
64(1):126–151, 2012. 3, 5, 6, 9, 10, 28
[29] R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Springer-
Verlag, 2013. 7
[30] C. Dwork, R. Kumar, M. Naor, and D. Sivakumar. Rank aggregation methods for the web.
In Proceedings of the 10th International World Wide Web Conference, pages 613–622. ACM
Press, 2001. 21
[31] E. Elkind and P. Faliszewski. Approximation algorithms for campaign management.
In Proceedings of the 6th International Workshop On Internet And Network Economics
(WINE '10), volume 6484 of LNCS, pages 473–482. Springer, 2010. 3, 4, 6, 9
[32] E. Elkind, P. Faliszewski, and A. Slinko. Swap bribery. In Proceedings of the 2nd Interna-
tional Symposium on Algorithmic Game Theory (SAGT '09), volume 5814 of LNCS, pages
299–310. Springer-Verlag, 2009. 2, 3, 4, 6, 9, 11, 20, 38
[33] P. Faliszewski and A. Procaccia. AI's war on manipulation: Are we winning? AI Magazine,
31(4):52–64, 2010. 4
[34] P. Faliszewski, E. Hemaspaandra, and H. Schnoor. Copeland voting: Ties matter.
In
Proceedings of the 7th International Conference on Autonomous Agents and Multiagent
Systems (AAMAS '08), pages 983–990. IFAAMAS, 2008. 6, 9, 42
[35] P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. How hard is bribery in elections?
Journal of Artificial Intelligence Research, 35:485–532, 2009. 3, 6, 9
[36] P. Faliszewski, E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Llull and Copeland
voting computationally resist bribery and constructive control. Journal of Artificial Intel-
ligence Research, 35:275–341, 2009. 3, 27
[37] P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. Using complexity to protect
elections. Communications of the ACM, 53(11):74–82, 2010. 4
[38] P. Faliszewski, E. Hemaspaandra, and L. Hemaspaandra. Multimode control attacks on
elections. Journal of Artificial Intelligence Research, 40:305–351, 2011. 3
[39] M. R. Fellows, B. M. P. Jansen, D. Lokshtanov, F. A. Rosamond, and S. Saurabh. Deter-
mining the winner of a Dodgson election is hard. In Proceedings of the 30th Conference
on Foundations of Software Technology and Theoretical Computer Science (FSTTCS '10),
pages 459–468. Internationales Begegnungs- und Forschungszentrum fur Informatik (IBFI),
Schloss Dagstuhl, 2010. 21
[40] J. Flum and M. Grohe. Parameterized Complexity Theory. Springer-Verlag, 2006. 7
[41] M. Garey and D. Johnson. Computers and Intractability: A Guide to the Theory of NP-
Completeness. W. H. Freeman and Company, 1979. 20
36
[42] E. Gertler, E. Mackin, M. Magdon-Ismail, L. Xia, and Y. Yi. Computing manipulations
of ranking systems. In Proceedings of the 14th International Conference on Autonomous
Agents and Multiagent Systems (AAMAS '15), pages 685–693. IFAAMAS, 2015. 3
[43] E. Hemaspaandra, L. Hemaspaandra, and J. Rothe. Anyone but him: The complexity of
precluding an alternative. Artificial Intelligence, 171(5–6):255–285, 2007. 33
[44] A. Kaczmarczyk and P. Faliszewski. Destructive shift bribery. In Proceedings of the 15th
International Conference on Autonomous Agents and Multiagent Systems (AAMAS '16),
pages 305–313. IFAAMAS, 2016. 33
[45] C. Komusiewicz. Kernelization, partially polynomial kernels. In M. Kao, editor, Encyclo-
pedia of Algorithms. Springer-Verlag, 2015. 14
[46] C. Komusiewicz and R. Niedermeier. New races in parameterized algorithmics. In Pro-
ceedings of the 37th International Symposium on Mathematical Foundations of Computer
Science (MFCS '12), volume 7464 of LNCS, pages 19–30. Springer-Verlag, 2012. 11
[47] K. Konczak and J. Lang. Voting procedures with incomplete preferences. In Proceedins
of the Multidisciplinary IJCAI-05 Worshop on Advances in Preference Handling, pages
124–129, 2005. 3
[48] H. W. Lenstra. Integer programming with a fixed number of variables. Mathematics of
Operations Research, 8(4):538–548, 1983. 31
[49] H. Lenstra, Jr. Integer programming with a fixed number of variables. Mathematics of
Operations Research, 8(4):538–548, 1983. 27
[50] T. Magrino, R. Rivest, E. Shen, and D. Wagner. Computing the margin of victory in
IRV elections. Presented at 2011 Electronic Voting Technology Workshop/Workshop on
Trustworthy Elections, 2011. 3
[51] D. Marx. Parameterized complexity and approximation algorithms. The Computer Journal,
51(1):60–78, 2008. 10
[52] L. Mathieson and S. Szeider. Editing graphs to satisfy degree constraints: A parameterized
approach. Journal of Computer and System Sciences, 78(1):179–191, 2012. 23
[53] D. McGarvey. A theorem on the construction of voting paradoxes. Econometrica, 21(4):
608–610, 1953. 17, 42
[54] R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University Press, 2006.
7
[55] S. Obraztsova and E. Elkind. On the complexity of voting manipulation under random-
ized tie-breaking. In Proceedings of the 22nd International Joint Conference on Artificial
Intelligence (IJCAI '11), pages 319–324. AAAI Press, 2011. 6, 9
[56] S. Obraztsova, E. Elkind, and N. Hazon. Ties matter: Complexity of voting manipulation
revisited. In Proceedings of the 10th International Conference on Autonomous Agents and
Multiagent Systems (AAMAS '11), pages 71–78. IFAAMAS, 2011. 6, 9
37
[57] J. Rothe, editor. Economics and Computation. Springer, 2015. 4
[58] I. Schlotter, P. Faliszewski, and E. Elkind. Campaign management under approval-
driven voting rules. In Proceedings of the 25th AAAI Conference on Artificial Intelligence
(AAAI '11), pages 726–731. AAAI Press, 2011. 9
[59] I. Schlotter, P. Faliszewski, and E. Elkind. Campaign management under approval-driven
voting rules. Algorithmica, pages 1–32, 2015. 3, 6, 10
[60] L. Xia. Computing the margin of victory for various voting rules. In Proceedings of the
13th ACM Conference on Electronic Commerce (EC '12), pages 982–999, 2012. 3
[61] L. Xia and V. Conitzer. Determining possible and necessary winners given partial orders.
Journal of Artificial Intelligence Research, 41:25–67, 2011. 3
A Proof of Theorem 5
In this appendix we present the omitted proof of Theorem 5. To this end, we split the proof in
three propositions, each proposition covering one of the considered voting rules. In most cases
the proofs of the propositions base on an idea already present in the literature (mostly in the
paper of Elkind et al. [32]), but they do include some additional insights.
Proposition 3. Borda Shift Bribery parameterized by the number of affected voters is
W[2]-hard for each price function family that we consider.
Proof. We consider Borda Shift Bribery for unit prices first. We give a parameterized
reduction from Set Cover parameterized by the set cover size k. Let I = (U, S, k) be our
input instance, where U = {u1, . . . , un} and S = {S1, . . . , Sm} is a collection of subsets of U,
and k is a positive integer. We set the budget B = k · (n + 1) and form a set of candidates
C = {p, d, g} ∪ U ∪ F , where F is a set of "filler" candidates, F = {f1, . . . , f2k·(n+1)+2}. We form
a set V of voters as follows:
i) We form a subset Vsets of voters as follows (note that this subset will be useful in the proof
for the case of Copeland). For each set Si in S we create two voters, v2i−1 and v2i. Voter
v2i−1 has preference order
d ≻ hSii ≻ hFii ≻ p ≻ hC \ (Si ∪ Fi ∪ {p, d})i,
where Fi is an arbitrarily chosen set of n − Si candidates from F . Voter v2i has the
reversed preference order of v2i−1. Note that each pair of voters v2i−1, v2i, gives each
candidate C − 1 points.
ii) For each i, 1 ≤ i ≤ n, we add B+1 pairs of voters with preference orders from point-pair(p, ∅, ui, g, C\
{ui, g, p, d}, d) (see Section 2.2 for the definition) to the voter set V . Note that, with two
preference orders from point-pair(p, ∅, ui, g, C \ {ui, g, p, d}, d), ui receives C points, g re-
ceives C − 2 points, and each remaining candidate in C \ {ui, g} receives C − 1 points.
In both preference orders, there are C − 2 candidates between p and d.
38
iii) Let F ′ be an arbitrary size-(B + 1) subset of F and let z ∈ F \ F ′ be an arbitrary candidate.
We add B + k pairs of voters with preference orders of point-pair(p, F ′, d, g, C \ ({p, g, d, z} ∪
F ′), z) to the voter set V .
Since we are dealing with unit price functions, each voter has price function π(j) = j. By
routine calculation, it is easy to verify that there is a value L such that the candidates in election
E = (C, V ) have the following scores:
• scoreE(p) = L,
• scoreE(d) = L + B + k,
• for each i, 1 ≤ i ≤ n, scoreE(ui) = L + B + 1, and
• for each f ∈ F ∪ {g}, scoreE(f ) ≤ L.
We set the maximal number na of affected voters to k. We claim that I is a yes-instance of
Set Cover if and only if the formed instance of Borda Shift Bribery is a yes-instance.
"⇒": Assume that there is a collection Q of k sets from S such that their union gives U.
Without loss generality, let Q := {S1, . . . , Sk}. Bribing the voters v2i−1, . . . , v2k−1 to shift p to
the top position has price k · (n + 1) = B and ensures p's victory: Such shifts ensure that p gains
k · (n + 1) points, each ui ∈ U loses at least one point (because S1, . . . Sk is a cover of U), and
d loses k points (because p passes d in each of these k voters' preference orders). In effect, p, d,
and each ui ∈ U, have L + k · (n + 1) points each and tie for victory.
"⇐": For the reverse direction, assume that there is a successful shift action #»s that ensures
p's victory and affects na = k voters only. Since the budget is k · (n + 1) and we use unit price
functions, the score of p can increase to at most L + k · (n + 1). Since d has score L + k · (n + 1) + k
and we can affect k voters only, for each voter where we shift p, p must pass d.
Thus #»s involves only the voters from the set V ′ = {v2i+1 1 ≤ i ≤ m}. The reason for this
is that each voter in V \ V ′ either already prefers p to d or ranks d more than B positions ahead
of p (so p would not be able to pass d within the budget). Consequently, in the preference order
of each voter from V ′ affected by #»s , p must be shifted to the top position (because in these
preference orders, d is ranked first).
Further, since the score of p can increase to at most L + k · (n + 1) and each candidate ui ∈ U,
prior the shifts, has score L + k · (n + 1) + 1, it must be the case that p passes each ui at least
once. This means that the voters affected under #»s correspond to a cover of U by at most k sets
from S.
To complete the proof, it is easy to verify that the reduction works in polynomial time.
The above argument applies to unit prices but, by Proposition 1, it also immediately covers
the case of convex price functions, sortable price functions, and of arbitrary price functions. To
deal with all-or-nothing price functions, it suffices to use the same construction as above and set
the budget B to k, but with the following prices:
i) For each i, 1 ≤ i ≤ n, we set the price function of voter v2i+1 to be π(j) = 1 for each j > 0
(and, of course, π(0) = 0).
ii) For all the remaining voters, we use price function π′, such that π′(j) = B + 1 for each
j > 0 (and π′(0) = 0).
39
It is easy to see that the construction remains correct with these price functions.
Proposition 4. Maximin Shift Bribery parameterized by the number of affected voters is
W[2]-hard for each price function family that we consider.
Proof. We reduce from Set Cover parameterized by the set cover size to Maximin Shift
Bribery parameterized by the number of affected voters. Let I = (U, S, k) be our input instance
of Set Cover, where U = {u1, . . . , un}, S = {S1, . . . , Sm} is a collection of subsets of U, and k is
a positive integer (and the value of the parameter). We form a candidate set C = {p, d, g}∪U ∪F ,
where d is the unique winner in the original election and F = {f1, . . . , f2n·k+2k} is a set of "filler"
candidates (we partition F into two disjoint sets X1 and X2 of cardinality n · k + k each). We
form a set V of voters as follows:
i) We create a set Vsets of voters as follows. For each Si ∈ S, we include in Vsets two voters,
v2i−1 and v2i, such that v2i−1 has preference order
g ≻ hSii ≻ hFii ≻ p ≻ hF \ Fii ≻ hU \ Sii, ≻ d
where each Fi contains an arbitrarily fixed subset of n − Si candidates from F , and v2i
has preference order which is the revers of v2i−1's.
ii) We create a set Vstruct of voters by including the following group of voters:
a) we include k voters with preference order
p ≻ d ≻ g ≻ hUi ≻ hX1i ≻ hX2i,
b) we include k − 1 voters with the same preference order
g ≻ hX1i ≻ p ≻ hX2i ≻ d ≻ hUi,
c) we include a single voter with preference order
g ≻ hUi ≻ hX1i ≻ p ≻ hX2i ≻ d, and
d) we include 2k voters with preference order
d ≻ g ≻ hUi ≻ hX2i ≻ p ≻ hX1i.
We set V = Vsets ∪ Vstruct, and E = (C, V ). Each voter has a unit price function and we set the
budget B to be k · (n + 1). We claim that the constructed Maximin Shift Bribery instance
is a yes-instance if and only if I is a yes-instance of Set Cover. However, before we prove this
fact, let us calculate the scores of the candidates in the election E.
In Table 3 we give the values of the function NE(·, ·) for the just constructed election (for
the values of the function among candidates from the set U ∪ F we use the trivial upper bound,
m + 4k). Note that for each x, y ∈ C, the voters from Vsets contribute value m to NE(x, y) and
the remaining value comes from the voters in V2. Based on the function NE, we calculate the
scores of the candidates in our election:
• scoreE(p) = m + k,
40
p
–
g
d
U
F
m + k m + 2k m + 2k − 1 ≥ m + 2k
p
g
m + 3k
–
m + k
d m + 2k m + 3k
U m + 2k + 1
F ≤ m + 2k
m
m
m + 4k
m + 4k
m + 4k − 1 m + 3k
–
m + 1 ≤ m + 4k m + 3k + 1
m + k m + k − 1 ≤ m + 4k
Table 3: Table of the values of the NE(·, ·) function for the election constructed for the Maximin
part of the proof of Proposition 4.
• scoreE(g) = m + k,
• scoreE(d) = m + 2k,
• for each ui ∈ U, scoreE(ui) = m, and
• for each fj ∈ F , scoreE(fj) = m.
Thus, prior to any bribery, d is the unique winner.
We show that (U, S, k) is a yes-instance for Set Cover if and only if the constructed
Maximin Shift Bribery instance is a yes-instance.
"⇒": Suppose without loss of generality that S1, . . . , Sk cover the universe U. Then, it
suffices for each voter in the set V ′ = {v2i−1 1 ≤ i ≤ k} to shift p to the top position. This
leads to p passing g for k times and to p passing each candidate from U at least once. In effect,
the score of p increases to m + 2k, and p and d are tied winners. Further, doing so costs at
most n · k + k: In each of the at most k preference orders where we shift p, we shift p by n + 1
positions.
"⇐": Assume that there is a shift-action #»s such that applying #»s ensures that p is a
(co)winner. We can assume that #»s shifts p only in some preference orders of the voters in
the set V ′ = {v2i−1 1 ≤ i ≤ n}. This is so because in all the other preference orders, p is
ranked just below a group of at least B candidates from F and for each candidate fi ∈ F , we
have NE(p, fi) = m + 2k; fi is not blocking p from gaining additional k points and, since we
can affect at most k voters, p can get at most k additional points. Further, voters in the set V ′
rank p ahead of d, and so by applying #»s we certainly cannot lower the score of d. This means
that #»s must ensure that p's score increases to at least m + 2k. This is possible only if #»s affects
exactly k voters, in each vote affected by #»s candidate p passes g, and p passes each candidate
from U at least once. This means that #»s shifts p to the first position in the preference orders
of k voters from V ′, this costs exactly B (shifting p to the top position in the preference order
of a single voter from V ′ has price n + 1), and the voters for which #»s shifts p correspond to the
sets from S that cover U.
The above construction covers the case of unit price functions. By Proposition 1, this also
applies to convex price functions, sortable price functions, and arbitrary price functions. For the
all-or-nothing price functions, we can adapt the above proof in the same way in which we have
adapted the proof for the case of Borda, see proof of Proposition 3.
41
Proposition 5. Copeland Shift Bribery parameterized by the number of affected voters is
W[2]-hard for each price function family that we consider.
Proof. We reduce from Set Cover parameterized by the set cover size. Our reduction is similar
to that for the case of Borda and, in particular, we use the same notation for the input instance I
of Set Cover, we form the same candidate set C = {p, d, g}∪U (see the proof for Proposition 3),
and we use the subset Vsets of voters. However, we extend Vsets to a complete set of voters in a
different way, described below. Let r = 2k · (n + 1) + 3 be the number of candidates in the set
F ′ := F ∪ {g}.
i) We introduce a single voter p ≻ d ≻ hU i ≻ hF ′i (the reason for doing so is to have an odd
number of voters, so the proof will work for all values of α).
ii) Using a modified McGarvey's construction (see below), we introduce voters to ensure the
following results of head-to-head contests among the candidates:
a) Candidate d defeats each candidate in U by one preference order; d defeats p by 2k −
1 preference orders, and d defeats by one preference order r − n (arbitrarily chosen)
candidates from F ′ (the remaining candidates from F ′ defeat d by one preference order).
b) Candidate p defeats by one preference order r − n arbitrarily chosen candidates from F ′
and loses to the remaining n of them by 2k + 1 preference orders. Candidate p loses by
one preference order to each candidate from U.
c) For each i, 1 ≤ i ≤ n, ui defeats by one preference order all candidates uj such that i > j.
Candidate ui defeats by one preference order r − (i − 1) arbitrarily chosen candidates
from F ′, and loses to the remaining i − 1 candidates from F ′.
d) Each candidate in F ′ defeats by one preference order at most ⌊F ′/2⌋ candidates from
F ′ (an easy way of constructing a set of results of head-to-head contests that achieves
this effect and a proof that this way we can set the results of all head-to-head contests
among the candidates from F ′ is given in the work of Faliszewski et al. [34, discussion
after their Lemma 2.3]).
Before we explain what we mean by modified McGarvey's construction, let us first calculate
the scores that the candidates would have if we formed election E = (C, V ) according to the
above description. We would have:
• scoreE(p) = r − n,
• scoreE(d) = n + r − n + 1 = r + 1,
• each candidate ui in U would have scoreE(ui) = i − 1 + r − (i − 1) + 1 = r + 1, and
• each candidate f in F would have scoreE(f ) ≤ 1 + 1 + n + r/2 ≤ r (because k > 2).
Let us now describe what we mean by modified McGarvey's construction. McGarvey's
theorem [53] is as follows. Assume that we are given given a set of candidates and a set of results
of head-to-head contests (specified for each pair x, y of candidates by the number M (x, y) of
voters that prefer x over y minus the number of voters that prefer y over x; either all values
M (x, y) are odd or all are even). Then, we can compute in polynomial time (with respect to
42
the number of candidates, the number of given voters, and the sum of the values M (x, y)) an
election E such that for each two candidates x, y we have NE(x, y) − NE(y, x) = M (x, y).
It is standard to prove McGarvey's theorem using a construction that introduces pairs of
voters (for candidate set C) with preference orders of the form x ≻ y ≻ hC − {x, y}i, and
←−−−−−−−−
hC − {x, y}i ≻ x ≻ y. We use this construction with the modification that we ensure that
in each preference order p and d are always separated from each other by at least k · (n + 1)
candidates. (For example, it suffices to ensure that p and d are always ranked first, second, last,
or second to last, and that if p is ranked first or second then d is ranked last or second to last,
and the other way round).
We can now continue our proof. We set budget B := k ·(n+1) and we use unit price functions
for all the voters. We claim that there is a cover of U by at most k sets from S if and only if
our instance of Copeland Shift Bribery is a yes-instance.
"⇒": Assume without loss of generality that S1, . . . , Sk cover the universe U. Indeed, if we
shift p to the top position in those preference orders from {v2i−1 1 ≤ i ≤ k}, then p will pass d
k times (in effect winning the head-to-head contest against d), p will pass each candidate from
U at least once (in effect winning head-to-heat contests with all of them), and this shift action
will have price exactly B. In effect, the score of p will increase to r + 1, the scores of candidate
in U ∪ {d} will decrease to r, and p will be the unique winner.
"⇐": Now assume that our instance of Copeland Shift Bribery is a yes-instance and let
#»s be a shift-action that involves at most k voters, has price at most B, and ensures p's victory.
Note that by shifting p in at most k preference orders, p can win at most n + 1 additional
head-to-head contests (only those with the candidates in U ∪ {d}). If, after applying #»s , p does
not win the contest against d, then p's score is at most r and d's score remains r + 1 (so p is not a
winner). Thus we know that p must win the head-to-head contest against d and, so, p must pass
d in at least k preference orders. Since all the voters other than those in V ′ = {v2i−1 1 ≤ i ≤ n}
either already prefer p to d, or rank d ahead of more than B other candidates that themselves
are ranked ahead of p, #»s must involve exactly k voters from V ′, and for each preference order of
the voters from V ′ where p is shifted, p must be shifted to the top (because otherwise p would
not pass d). Since, in addition, p must pass each candidate ui from U at least once (to win the
head-to-head contest with ui, to obtain the final score of r + 1), it follows that the voters for
which #»s shifts p to the top position correspond to the sets from S that form a cover of U.
The above proof covers the case of unit price functions, convex price functions, sortable price
functions, and arbitrary price functions. It is easy to adapt it to work for all-or-nothing prices
in the same way in which the proof for Borda was adapted.
43
|
1611.07824 | 1 | 1611 | 2016-10-31T13:37:08 | SimAthens: A spatial microsimulation approach to the estimation and analysis of small-area income distributions and poverty rates in Athens, Greece | [
"cs.MA"
] | Published during a severe economic crisis, this study presents the first spatial microsimulation model for the analysis of income inequalities and poverty in Greece. First, we present a brief overview of the method and discuss its potential for the analysis of multidimensional poverty and income inequality in Greece. We then present the SimAthens model, based on a combination of small-area demographic and socioeconomic information available from the Greek census of population with data from the European Union Statistics on Income and Living Conditions (EU-SILC). The model is based on an iterative proportional fitting (IPF) algorithm, and is used to reweigh EU-SILC records to fit in small-area descriptions for Athens based on 2001 and 2011 censuses. This is achieved by using demographic and socioeconomic characteristics as constraint variables. Finally, synthesis of the labor market and occupations are chosen as the main variables for externally validating our results, in order to verify the integrity of the model. Results of this external validation process are found to be extremely satisfactory, indicating a high goodness of fit between simulated and real values. Finally, the study presents a number of model outputs, illustrating changes in social and economic geography, during a severe economic crisis, offering a great opportunity for discussing further potential of this model in policy analysis. | cs.MA | cs | SimAthens: A spatial microsimulation approach to the estimation and analysis
of small-area income distributions and poverty rates in Athens, Greece
Anastasia Panoria,*, Dimitris Ballasbc, Yannis Psycharisd
a Department of Economic and Regional Development, Panteion University of Social
and Political Sciences, 136 Syngrou Avenue, 17671 Athens, Greece
b Department of Geography, University of Sheffield, Winter Street, Sheffield S10 2TN,
UK
c Department of Geography, University of the Aegean, University Hill, 81100
Mytilene, Greece
d Department of Geography, Panteion University of Social and Political Sciences, 136
Syngrou Avenue, 17671 Athens, Greece
* Corresponding author, email: [email protected]
Preprint submitted to Computers, Environment and Urban Systems (accepted 2
August 2016).
Abstract
Published during a severe economic crisis, this study presents the first spatial
microsimulation model for the analysis of income inequalities and poverty in Greece.
First, we present a brief overview of the method and discuss its potential for the
analysis of multidimensional poverty and income inequality in Greece. We then
present the SimAthens model, based on a combination of small-area demographic
and socioeconomic information available from the Greek census of population with
data from the European Union Statistics on Income and Living Conditions (EU-SILC).
The model is based on an iterative proportional fitting (IPF) algorithm, and is used to
reweigh EU-SILC records to fit in small-area descriptions for Athens based on 2001
and 2011 censuses. This is achieved by using demographic and socioeconomic
characteristics as constraint variables. Finally, synthesis of the labor market and
occupations are chosen as the main variables for externally validating our results, in
order to verify the integrity of the model. Results of this external validation process
are found to be extremely satisfactory, indicating a high goodness of fit between
simulated and real values. Finally, the study presents a number of model outputs,
illustrating changes in social and economic geography, during a severe economic
crisis, offering a great opportunity for discussing further potential of this model in
policy analysis.
Keywords: spatial microsimulation; small-area microdata; small-area income data;
inequalities
1
1. Introduction
Over the past four decades, there have been a rapidly growing number of
multidisciplinary efforts to investigate the main aspects of poverty through a wider
perspective. In particular, since the 1980s, a new framework has been started to
develop, based on the theoretical work of Sen (1983, 1999, 1992), who investigated
poverty under the perspective of capability approach. According to this approach,
poverty is considered to be caused by not only economic factors but also various
components covering wider notions of development such as health, education, and
living conditions.
Moving away from conventional poverty measures that include purely income-based
indicators and examining poverty under a multidimensional perspective can be
challenging due to the paucity of suitable secondary data sets at the small-area level.
In order to develop new indicators that attempt to combine and interpret different
dimensions of poverty, there is a need for detailed socioeconomic micro-data sets to
be collected via social surveys. An example of a comprehensive survey of this type is
the census of population, which generates very useful socioeconomic and
demographic information for small areas and which has been typically the basis for
the development of widely used indexes of deprivation such as the Townsend
indicator (Townsend, 1979). Nevertheless, the census questionnaires cover a
relatively limited set of themes and in most cases, they do not include any
information on income, wealth, and other variables reflecting socioeconomic
circumstances in order to preserve confidentiality and minimize nonresponse (Marsh,
1993).
Spatial microsimulation has been gaining prominence as an appropriate method of
estimation of small-area microdata
that can be used
for
the analysis of
interdependencies between different household and individual characteristics. This
method is particularly suitable for bridging the gap between the innovative, human-
based theoretical frameworks to examine poverty and the difficulty of implementing it
at a small-area level, because of lack of data. Adding geographical information to
microlevel data with the use of spatial microsimulation analysis allows for a small-
area approach in policy analysis. By using this approach, the distributional impact of
implementing different socioeconomic policies could be estimated at a microlevel
(Ballas et al. 2005; Ballas et al. 2006; Callan 1991).
Microsimulation models have a long history and tradition in economics, originating in
the work of Orcutt (Orcutt 1957) who indicated the importance of determining the
2
relationship between parameters used in a socioeconomic model and the aggregate
results. During the 1970s, the first microanalytic models were built to simulate
socioeconomic systems and
investigate
their behavior under various policy
implication scenarios (Kain & Apgar 1985; Orcutt et al. 1976).
Although these initial efforts offered a whole new perspective on the way in which
aggregate data should be approached, they were aspatial, as they did not include
any geographical dimension or perspective. The necessity of incorporating the spatial
context was first highlighted by Hagerstrand (1957), who treated time and space as
inseparable notions that affect individual's decision making at daily, yearly, or lifetime
scales of observation (PRED 1977). The first implementation of such type of model is
the work of Wilson and Pownall (1976), which inspired a series of surveys focusing
on the field of regional development (Birkin & Clarke 1988, 2011). Other domains in
economics where spatial microsimulation has been implemented are labor market
(Campbell & Ballas 2013; Ballas et al. 2005; Ballas et al. 2006) and education
(Kavroudakis et al. 2012; Kavroudakis & Ballas 2013).
Of particular relevance to the work presented is this study is a comparative study of
the social geography of two major cities in Japan and Britain, which involved an
estimation of small-area microdata using spatial microsimulation (Ballas et al. 2012).
Also of relevance is the work of researchers who developed and implemented
statistical small-area estimation approaches involving complementing social survey
microdata, such as the European Union Statistics on Income and Living Conditions
(EU-SILC) with administrative sources, in order to calculate income and poverty
measures based on the idea of utilizing regression models (Fay & Herriot 1979;
Elbers et al. 2003; Nagle et al. 2011; Pereira & Coelho 2013; Fabrizi et al. 2014).
The EU-SILC database has proven to be an effective tool, which works as a basis
upon which various microsimulation models have been developed. In most cases,
the spatial level of analysis remains at a country level, and microdata are used to
assess the effect of policy changes, especially referring to national tax benefit
systems (Sutherland & Figari 2013; Betti et al. 2010; O'Donoghue et al. 2013).
This study describes the development of the first spatial microsimulation model in
Greece that combines census and social survey data, followed by an extensive
external validation process, using labor market and occupations structure data. This
model aims at estimating small-area poverty measures, including multidimensional
poverty index (MPI) within Athens, before and after the economic crisis. An indicative
3
analysis of the main poverty components, as long as the way in which they are
affected by recent ongoing economic crisis in Greece, is also performed. This
analysis highlights the necessity of using innovative techniques and methodologies
for simulating and assessing policy decisions at a microlevel.
2. Methodology and data
As mentioned in the previous section, there have only been a handful of studies that
attempted to investigate poverty under a multidimensional context at a geographical
scale lower than that of countries or NUTS1 regions (Alkire et al. 2014; Miranti et al.
2010; Harding et al. 2006; Tanton et al. 2009). In most cases, the results illustrate
that geography matters even at a high level of spatial analysis. There is also a
growing literature that refers especially to urban poverty and the importance of
structural clusters that are geographically defined within large spatial agglomerations
(Amis 1995; Glaeser 1998; Wratten 1995; Satterthwite 1997; Moser 1998). Thus, the
need to focus our research on smaller area levels becomes evident, highlighting the
necessity of implementing innovative techniques and methodologies.
2.1 Data, methods and scales of analysis
In order to build a static spatial microsimulation model, two main sources of data are
essential: aggregate data at the spatial level to be used for the analysis and
nonspatial microdata. The main idea is to use the existing high-quality aggregate
data that have a high degree of accuracy and reliability, such as those derived by
national censuses, based on which small-area microdata fitting is acquired, resulting
in resynthesized small-area populations.
In this study, the metropolitan area of Athens is used as the main case study.
Aggregate data for its 59 municipalities are derived from the last two national
censuses (2001 and 2011). The choice of municipalities as the main areal unit is
based on the fact that municipality is the lower administrative level at which
aggregate data can be found in national censuses. Their size is appropriate to
perform spatial analysis in most cases, as they are not too small, leading to a large
number of areal units and thus high complexity in calculations. On the contrary, using
larger areal units for the analysis could potentially gloss over spatial differentiations
within the metropolitan area, reducing its accuracy.
The EU-SILC database was the most appropriate main source of microdata, because
of the nature of this research, high quality of the database, and the relative paucity of
4
other relevant survey microdata in Greece. This database contains a large number of
parameters referring to economic and social conditions of EU countries. However,
although it offers an extremely rich variety of yearly variables that are suitable for
poverty analysis, it does not provide geographical information when descending to
lower spatial levels of analysis, limiting its use to a country or NUTS1 level.
In order to make a comparative analysis before and after the economic crisis
affecting Greece over the past six years, 2006 and 2011 were chosen as the two
reference years, and
thus
the corresponding EU-SILC waves were used.
Furthermore, an initial assumption that has to be mentioned is that the 2001 census
data were used as aggregate basis for 2006 microdata. It has long been argued
(e.g., see Rees, Martin, and Williamson 2002) that when it comes to accuracy and
geographical coverage, census data are considered to be the "gold standard." Thus,
in order to take advantage of this important strength of census data, it is assumed
that between 2001 and 2006, there would have been only small changes in
demographic characteristics of the areal units being used here, leaving aggregate
data almost unaffected.
The choice of variables being used to constrain a spatial microsimulation model is
one of the key factors that play an important role in the process of model building.
Different constraint variables may lead to considerable variation in the synthetic
populations being produced and thus different results (Edwards et al. 2010; Ballas et
al. 2007; Burden and Steel, 2013). The first step when making a decision regarding
which small-area variables (known as "small-area constraints") should be used as
constraints in spatial microsimulation is to examine the extent to which there is a
correlation between these variables with the so-called "target" variables of the
simulation (outputs – e.g., income).
Within the context of the research presented in this study, the main variables used for
constraining the spatial microsimulation model are age/sex, marital status, education,
and main economic activity status. All of them were selected in terms of creating a
comprehensive picture of spatial units' demographic characteristics and bec ause
they are widely accepted as good indicators of an individual's socioeconomic
condition.
2.2 Spatial microsimulation
Static spatial microsimulation methods generate simulated microdata for small-area
populations at a given time point. Depending on the reweighing method upon which
5
they are based, they can be categorized as either probabilistic or deterministic
approaches (Ballas et al., 2005). In the first case, a combinatorial optimization
approach (with the use of random number generators) is typically implemented, in
order to find the optimal combination of individuals from the micro-data set to
reproduce as closely as possible the small-area population (Tanton 2014). The use
of a random number generator increases computational intensity of the process
(Pritchard & Miller 2011) and a different result is produced in each model run,
because of its probabilistic nature.
We choose to follow Lovelace, Ballas, and Watson (2014) and use the so-called
deterministic reweighing approach, underpinned by the iterative proportional fitting
(IPF) technique as proposed by Ballas et al. (2005). This approach uses the IPF
method to give a weight to each individual, by adjusting for each constraint variable
the initial weight through a reweighting algorithm (Ballas et al., 2005; Tanton 2014).
As a result, individuals whose characteristics match in a higher extent the
demographic characteristics of each area are given higher weights. Some of the
main advantages of this method include the fact that results remain unchanged in
each run of the model, as well as low complexity and high speed of the model
(Pritchard & Miller 2011; Lovelace & Ballas 2013; Lovelace & Dumont 2016).
We have also considered alternative approaches for the integerization of the weights
derived from the reweighing algorithm. Following Lovelace and Ballas (2013), we
choose the TRS (truncate, replicate, sample) method to produce integer micro-data
set populations. The main advantage of this integerization method is the fact that the
populations it produces have exactly the same size as the census populations,
avoiding oversampling. Moreover, Lovelace and Ballas (2013) showed that TRS
outperforms the other three investigated methods in terms of accuracy, while at the
same time performs really well in terms of speed of calculations.
The original code, based on which the SimAthens model was developed, is written by
Lovelace and Ballas (2013) and is available as open source, including all the
essential documentation (Lovelace and Ballas 2013, Supplementary Information and
GitHub - https://github.com/Robinlovelace/IPF-performance-testing). More useful
information regarding spatial analysis and microsimulation modeling with R can also
be found in Lovelace & Dumont (2016). The new version of the code, used in our
case for the development of SimAthens model, is also available on line as a
supplementary material.
6
It must be pointed out that the intention of this study is to advance research on
census data by combining them with social survey data in new innovative ways, with
respect to the investigation of complex socioeconomic phenomena at a regional
level, which could not be examined to date. The results are particularly relevant and
timely, given the severe crisis and recession affecting Greece over the past 6 years.
The spatial microsimulation approach adopted here shows how census data can be
combined with social survey data to inform relevant debates about the geographical
dimension of income distribution and poverty within Athens.
2.3 Model validation
A key step in spatial microsimulation modeling is the verification of model integrity.
This is particularly important, in cases where model results are used as inputs for
policy-making issues in regional development (Clarke & Holm 1987; Chin & Harding
2007; Smith et al. 2009; Edwards et al. 2010; Ballas et al. 2013).
In order to compare simulation outputs with actual data, there are two main validation
methods: internal and external. In the first case, aggregate results of constraint
variables are used to calculate the degree of fitting between actual and simulated
data. However, because the IPF method is based on optimum fitting of the constraint
variables, it is expected that the quality of fitting between actual and simulated results
will be high in most cases. The latter method of validating a static spatial
microsimulation model consists of using external variables or data sets to compare
aggregate results at a regional level (Edwards and Tanton 2013). These external
sources of data may be real spatial microdata, external data sets, primary data
obtained from specific areas or aggregated data at higher geographies (Lovelace et
al. 2014).
The choice of measures of fitting and accuracy is another key decision that needs to
be made. We choose to use scatter plots for actual and simulated values, illustrating
a first descriptive representation of the model's goodness of fit. In order to calculate
the extent of dispersion from the equality line and obtain information about the
accuracy of the model, we choose to calculate the standard error about identity (SEI)
(Ballas et al. 2007; Tanton 2011). The coefficient of determination (R2) is also
estimated through linear regression analysis, as a measure of precision, giving us
information about the extent to which simulated values fit the actual data. Finally, an
equal variance two-tailed t-test is used to reveal any possible statistical significance
arising from the differences between simulated and actual data (Robert Tanton;
Kimberley L. Edwards 2013).
7
2.3.1 Internal validation
Results of the internal validation of the model, using scatter plots of simulated and
actual populations of constraint variables, are shown in Figure 1. As it is displayed in
the graphs, almost all points of the scatter plots are on the equality line (45° line),
showing that the goodness of fit of the SimAthens model is excellent for both
reference years.
Figure 1: Simulated versus census results at the aggregate level for constraint
variables.
Source: Authors' calculations
Table 1 indicates the values of measures used for internal validation referring to both
reference years. It shows that in terms of accuracy and precision, our static spatial
microsimulation model shows a very good behavior. Coefficients of determination
and SEI values are equal to unity in all cases. The equal-variance two-tailed t-test,
which was conducted to all subcategories of constraint variables, illustrates that
deviations between simulated and actual data are statistically significant in only two
cases: Females/20–29 and Females/70–79 for 2011. Thus, estimation results are in
general terms robust.
8
01000002000003000000100000200000300000010000020000030000020062011AgeMarital statusMain activityEducational levelSimulatedCensusConstraintTable 1: Measures of validation for constraint variables
2006
SEI
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
R2
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
T-test
(Prob.)
R2
0.548
0.515
0.087
0.500
0.528
0.705
0.283
0.442
0.379
0.626
0.851
0.870
0.627
0.538
0.192
0.810
0.080
0.541
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
2011
SEI
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
T-test
(Prob.)
0.113
0.043
0.126
0.379
0.099
0.017
0.081
0.008
0.010
0.189
0.206
0.053
0.004
0.068
0.055
0.065
0.060
0.596
1.000
1.000
0.149
1.000
1.000
0.573
1.000
1.000
0.317
1.000
1.000
0.625
1.000
1.000
0.828
1.000
1.000
0.436
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
0.801
0.130
0.784
0.881
0.818
0.422
0.204
0.115
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
1.000
0.174
0.657
0.630
0.930
0.781
0.116
0.104
0.057
Validation
measure
Sex/Age
Male/20–29
Male/30–39
Male/40–49
Male/50–59
Male/60–69
Male/70–79
Male/80+
Female/20–29
Female/30–39
Female/40–49
Female/50–59
Female/60–69
Female/70–79
Female/80+
Marital Status
Not married
Married
Widowed
Divorced
Main activity
Empl./Primary
Sect.
Empl./Second.
Sect.
Empl./Tertiary.
Sect.
Unemployed
Student
Retired
Housework
Other
Educational level
1.000
1.000
1.000
Source: Authors' calculations
Tertiary
Secondary
Primary
2.3.2 External validation
In order to externally validate our static spatial microsimulation model, we chose to
use the synthesis of the labor market and occupations. In particular, we used the
9
Statistical Classification of Economic Activities in the European Community (NACE)
and the International Standard Classification of Occupations (ISCO) as guidelines for
aggregating the actual and simulated data in all areal units. The choice of these
classification standards was made, as it was the closest match between the relevant
variables found in the EU-SILC and Greek census data.
Although for 2006 all the necessary data for calculating external validation measures
at the municipality level (intra-urban municipal units, within Athens) were available,
the same was not feasible for the 2011 data. As a result, external validation
measures were calculated at the municipality level only for 2006.
Labor market structure
Table 2 illustrates the proportions of aggregated simulated and actual data referring
to labor market structure of the metropolitan area of Athens. As it is shown, very
small deviations exist between real and estimated values, regarding the proportions
of labor market sections. SimAthens overestimates in both cases section G referring
to wholesale and retail trade: repair of motor vehicles and motorcycles. It also
overestimates sections from B to E for 2011 that represent mining and quarrying;
manufacturing; electricity, gas, steam, and air conditioning supply and water supply;
sewerage, waste management; and remediation activities. Finally, it underestimates
section H, transportation and storage, for the same year.
Table 2: Simulated versus actual census shares for labor market structure in Athens
metropolitan area
2006
2011
Census
SimAthens
(%)
(%)
Diff.
NACE
Rev. 2
Sections
Census
SimAthens
(%)
(%)
Diff.
0.54
15.29
7.99
18.40
4.98
9.35
4.63
9.15
9.80
6.60
5.94
7.32
0.53
14.56
7.61
21.41
4.09
9.22
3.21
10.64
10.42
6.32
5.53
6.46
−0.01 A
−0.73 B − E
−0.38 F
3.01 G
−0.89 H
−0.13
I
−1.42 K
1.49
0.62 O
−0.28 P
−0.41 Q
−0.86 R − U + J
L − N
0.66
11.27
6.51
19.04
7.01
5.84
4.30
10.74
10.32
7.17
7.02
10.12
0.53
14.88
7.28
21.96
4.71
4.44
5.52
9.92
8.69
7.42
5.50
9.15
−0.13
3.61
0.77
2.92
−2.3
−1.4
1.22
−0.82
−1.63
0.25
−1.52
−0.97
10
NACE
Rev 1.1
Sections
A + B
C + D + E
F
G
H
I
J
K
L
M
N
O + P + Q
Source: Authors' calculations
From the scatter plot for labor market structure at municipality level for 2006 in
Figure 3, we can observe that there is a high goodness of fit between the actual
census data and the simulated aggregate results, because of the distribution of
scatter plot points very close to equality line.
Figure 3: Scatter plot for labor market structure at municipality level (2006).
Source: Authors' calculations
We can observe from Table 3 that validation measures are in most cases extremely
satisfactory. Coefficients of determination and SEI values are very close to unity in all
sections. Moreover, the equal-variance two-tailed t-test, conducted in all NACE
sections shows that deviations between simulated and actual data are statistically
significant in only four sections of the labor market: G (Wholesale and retail trade;
repair of motor vehicles, motorcycles), J (Financial intermediation), K (Real estate,
renting and business activities) and L (Public administration and defence, compulsory
social security).
11
050001000015000Simulated050001000015000CensusA + BC + D + EFGHIJKLMNO + P + QNACE Rev 1.1 SectionsTable 3: Measures of validation for labor market structure
R2
0.999
0.990
0.974
0.995
0.988
0.950
0.992
0.993
0.992
0.993
0.982
0.963
2006
SEI
T-test (Prob.)
0.998
0.980
0.923
0.903
0.883
0.934
0.873
0.981
0.989
0.992
0.944
0.813
0.808
0.527
0.820
0.002
0.111
0.785
0.000
0.000
0.000
0.465
0.499
0.545
Validation measure
NACE Rev. 1.1 Sections
A + B
C + D + E
F
G
H
I
J
K
L
M
N
O + P + Q
Source: Authors' calculations
Occupational structure
The same analysis as before was also conducted in the case of occupations'
classification. Using ISCO-88 and ISCO-08 classification system for the two
reference years, respectively, we can see in Table 4 that in both cases there are
acceptable deviations between simulated and actual data. Their range varies from
0.02 (Skilled agricultural and fishery workers, 2006) up to 4.55 percentage units
(Legislators, senior officials and managers & Professionals. 2011).
12
Table 4: Simulated versus actual census shares for occupational structure in Athens
metropolitan area.
ISCO - 88
Legislators,
senior officials
and managers &
Professionals
Technicians and
associate
professionals
Clerks & Service
workers and
shop and
market sales
workers
Skilled
agricultural and
fishery workers
Craft and related
trade workers
Plant and
machine
operators and
assemblers
Elementary
occupations
2006
2011
Census
SimAthens
(%)
(%)
Diff.
Census
SimAthens
(%)
(%)
Diff.
26.76
26.97
0.21
28.00
23.45
−4.55
11.21
11.13
−0.08
11.63
9.29
−2.34
30.25
30.42
0.17
33.23
33.45
0.22
0.71
0.69
−0.02
0.93
1.74
0.81
15.61
16.87
1.26
11.46
14.46
3.00
6.96
6.25
−0.71
6.07
8.08
2.01
8.50
7.67
−0.83
8.68
9.53
0.85
Source: Authors' calculations
Figure 4 clearly shows the high goodness of fit between the static spatial
microsimulation model that we have constructed and the actual data for 2006 at a
municipality level. All scatter plot points are dispersed around the equality line,
indicating a very low level of deviation between the data.
13
Figure 4: Scatter plot for occupation categories at a municipality level (2006).
Source: Authors' calculations
The accuracy of the model can also be determined from the validation measures
calculated for the same year at a municipality level (Table 5). Both R2 and SEI
indicators have high values close to unity indicating a good behavior of the model, in
terms of accuracy and precision. The equal-variance two-tailed t-test was rejected in
almost all cases, with the exception of Craft and related trade workers and Plant and
machine operators and assemblers categories, where the deviations seem to be
statistically significant.
14
05000100001500020000Simulated05000100001500020000CensusLegislators, senior officials and managers & ProfessionalsTechnicians and associate professionalsClerks & Service workers and shop and market sales workersSkilled agricultural and fishery workersCraft and related trades workersPlant and machine operators and assemblersElementary occupationsOccupation categoriesTable 5: Measures of validation for labor market structure
Validation measure
ISCO – 88
R2
2006
SEI
T-test
(Prob.)
Legislators, senior officials and managers
& Professionals
0.997
0.995
0.762
Technicians and associate professionals
0.997
0.997
0.464
Clerks & Service workers and shop and
market sales workers
0.999
0.997
0.851
Skilled agricultural and fishery workers
0.981
0.979
0.461
Craft and related trade workers
0.998
0.995
0.000
Plant and machine operators and
assemblers
0.983
0.972
0.002
Elementary occupations
0.960
0.790
0.541
Source: Authors' calculations
3. Measures of poverty
Over
the past
four decades,
there have been significant efforts to better
conceptualize a broader concept of poverty (Townsend 1979; Atkinson 2003; Nolan
& Whelan 2011; Alkire et al. 2014). More recently, the European Commission has
been contributing to these efforts by adjusting multidimensional measurement of
poverty frameworks for advanced economies (Weziak-Bialowolska & Dijkstra 2014;
Atkinson & Marlier 2010). The work presented here builds upon these efforts and
aims to highlight the regional and local dimensions of the indicators being used to
date by the EU, by calculating them at small-area levels. The main measures
selected for our analysis are the so-called at-risk-of-poverty (AROP) rate, material
deprivation (MD) rate, and MPI. The first two measures consist of simple headcount
ratios referring to the proportion of people considered poor each time. However, MPI
is based on the Alkire Foster (AF) methodology using an adjusted headcount ratio
(Alkire & Foster 2011a; Alkire & Foster 2011b), which includes intensity.
Since 2001, the measure for income poverty in EU has been established by the
European Commission as the AROP rate, which is the proportion of people whose
income is <60% of the national (in our case municipality) household equivalized
median income. Moreover, an indicator concerning MD has been proposed and
formally agreed by the EU in 2009 (Guio, Fusco, and Marlier 2009; Fusco, Guio, and
15
Marlier 2010; Guio et. al., 2009). This indicator focuses mainly on some key aspects
of material living conditions, and is defined as the proportion of people living in
households, lacking at least three of a list of nine basic items. In our analysis, we
choose to examine the relationship between a relative measure of poverty, using
municipality-based thresholds to calculate poverty lines for the AROP rates, and an
absolute measure, using MD rates, where the same standard is applied to all
regions. Finally, for the calculation of MPI, we used as guideline the recent work of
Weziak-Bialowolska and Dijkstra (2014), where the main dimensions of MPI are
adjusted at a regional level for the EU regions.
4. SimAthens results
In this section, we present the results of our simulated small-area populations, where
metropolitan area of Athens was used as a case study. The EU-SILC data sets that
were used include 3375 (2006) and 2754 (2011) observations for the overall Attica
region. It must be indicated that only individuals living in the greater area of Attica
were chosen as inputs for the static spatial microsimulation model, instead of using
the total number of EU-SILC observations for Greece, in order to increase the
accuracy of the results, following a similar approach by Ballas et al. (2005), who us ed
regional subsamples of a national survey in their SimBritain model.
Table 7 shows the first example of SimAthens outputs: equivalized income. The table
shows maximum and minimum estimated values of its distribution within the
metropolitan area of Athens. In the last column, their proportional difference before
and after the economic crisis is also illustrated. All municipalities experienced a
decrease in their mean equivalized income during this period of approximately 9–
10%. In particular, for the case of metropolitan area of Athens as a whole, this
decrease had a mean value of 9.72%.
16
Table 7: Mean equivalized income per capita and its proportional difference for the
five richest and five poorest municipalities of metropolitan area of Athens.
Municipality
Mean equivalized
income 2006
(€ per capita)
Mean equivalized
income 2011
(€ per capita)
Difference
06/11
(%)
Met. Athens
14453.32
13047.03
−9.72
Top 5 by income (2011)
Psychik o
Filothei
Ek ali
Papagou
Neo Psychik o
Bottom 5 by income (2011)
Keratsini
Drapetsona
Agios Ioannis Rentis
Agia Varvara
Perama
Source: Authors' calculations
17408.58
17482.81
17334.02
17280.42
16293.64
13039.01
12921.85
12800.99
12803.30
12695.54
15766.14
15742.46
15482.58
15440.98
14798.05
11615.62
11563.58
11488.40
11452.38
11410.29
−9.43
−9.95
−10.68
−10.64
−9.18
−10.92
−10.51
−10.25
−10.55
−10.12
On the basis of these estimations, the AROP rates were also calculated for each
municipality, to obtain a first income-based estimation of poverty. Two ways of
calculating AROP rates were considered, aiming to highlight the difference between
spatially absolute and spatially relative ways of approaching this measure.
In the first case, the poverty line being used to calculate AROP rates is referring to
60% of the median equivalized income of the total metropolitan area of Athens. This
way of calculating the AROP rate is considered to measure poverty in a spatially
absolute way, because all individuals have a common reference line, despite living in
different areal units. The results of this measure are illustrated in Figure 5, where as
we move to more disadvantaged regions, the AROP rate is increasing in both years.
Moreover, it is important to note that the proportional difference before and after the
crisis also shows an inverse relationship with mean equivalized income. This means
that although the headcount ratio of poor people increased in all regions of Athens,
the rise was relatively higher in economically depressed municipalities.
17
Figure 5: At-risk-of-poverty rates (%) in absolute terms for municipalities in the
metropolitan area of Athens
Source: Authors' calculations
The previous picture changes radically when using as poverty line the 60% of each
municipality's median of equivalized income. In contrast to the previous case, this
time each individual is compared only with others living in the same region. As a
result, AROP rate in this case has a spatially relative character, exploring inequality
within municipal units and using the municipal average income as the point of
reference. The results of this measure are given in Figure 6. When looking more
carefully at the data, it is very interesting to note that in contrast to the previous
measure, their values decline while moving to economically depres sed areas for
2006. This behaviour could be explained by a possible continuation of the socio-
spatial polarization in Athens observed in the 1990s (Maloutas, 2007) underpinned
by the tendency of people moving from low income to more affluent areas when they
can afford to do so. These interregional movements lead to a more homogenous
regional formation, especially for low-income areas, resulting in minor intraregional
income inequalities.
Nonetheless, results for 2011 suggest that economic crisis affected primarily low-
income areas, where proportions of relatively poor people living in these areas were
substantially expanded. By observing the curves illustrated in Figure 6, it becomes
18
10152025AROP - Absolute (%)1000012000140001600018000Mean equivalised income20062011obvious that spatially relative AROP rates increased in all areas during this period.
This indicates that intraregional income inequality expanded, while at the same time
gaps in terms of spatially relative AROP rates between areas decreased.
Figure 6: At-risk-of-poverty rates (%) in relative terms for municipalities in the
metropolitan area of Athens
Source: Authors' calculations
As a second measure of absolute poverty we choose to use MD rates. An important
characteristic of this measure is the fact that MD criteria do not change over time. We
can observe in Figure 7 that MD rates increased during this period, while their values
also increased relatively to income levels. Considering the differences between the
reference years, it becomes clear that these are much higher than the absolute
AROP rates. This is probably due to the time-invariant character of MD rates.
Absolute AROP rates may be calculated using a common poverty line for all
municipalities, but which still differs between 2006 and 2011. By using MD rates, we
can correct this time-dependent inconsistency and this helps us have a clearer view
of the crisis effects. Moreover, MD rates offer a more comprehensive view of poverty,
by incorporating a diversified view of this phenomenon.
19
1618202224AROP - Relative (%)1000012000140001600018000Mean equivalised income20062011Figure 7: Material deprivation rates (%) for municipalities in the metropolitan area of
Athens
Source: Authors' calculations
We have also used the SimAthens model to calculate the MPI index at a municipality
level and some of these results are shown in Figure 8. As can be seen, there is clear
evidence that during this prolonged recession period, this measure of poverty
increased considerably in most areas.
This observation is of significant interest and relevance to current policy debates,
given that the MPI index constitutes a synthetic measure of poverty, not focusing on
income, and thus incorporating much information related to aspects of human
development and well-being. Another important advantage of this measure is the fact
that it is calculated by weighting a simple headcount ratio of multidimensional poor
people in each spatial unit, with the intensity of poverty in the same area. As a result,
municipalities which are placed at the lowest parts of the ranking in terms of
multidimensional poverty perform worse in both headcount ratio and intensity of
poverty.
20
510152025Deprivation ratio (%)1000012000140001600018000Mean equivalised income20062011Figure 8: Multidimensional poverty index for municipalities in the metropolitan area of
Athens
Source: Authors' calculations
The results obtained by SimAthens model can also help us map and explore the
spatial patterns in the distribution of poverty within Athens. Figure 9 shows the exact
location of the metropolitan area of Athens, investigated in this study. Moreover,
Figure 10 depicts the distribution of model aggregate outputs regarding mean
equivalized income, MD and AROP rates, within Athens for 2006. As it is illustrated,
the more affluent areas are generally located in northeast Athens (Fig. 10.a),
showing at the same time lower levels of MD and AROP rates in absolute terms (Fig.
10.b and 10.d).
21
.04.06.08.1.12MPI1000012000140001600018000Mean equivalised income20062011Figure 9: Location of the metropolitan area of Athens
Source: Authors' calculations
It is also important to indicate that lower levels of mean equivalized income and
poverty are not located in the center of Athens, but that they are generally found in
the western part of this large urban agglomeration. However, when concerning the
AROP rates in relative terms, these areas seem to have the lowest values, implying
low levels of income inequality within these areas. Furthermore, Figure 10 illustrates
that the central part of Athens consists of municipalities that are placed at the middle
of income and poverty distribution.
22
Figure 10: Distribution of income and poverty measures within the metropolitan area
of Athens (2006).
(a) Mean equivalized income
(b) Material Deprivation rate
(c) At-risk-of-poverty rate – Relative terms
(d) At-risk-of-poverty rate – Absolute terms
Source: Authors' calculations
5. Concluding remarks
In this study, we have constructed a static spatial microsimulation model that
combines small-area census data with social survey data, aiming to analyze income
distribution and poverty in Athens. The construction of the SimAthens model resulted
in the creation of a rich small-area micro-data set for Athens, which was then used
23
for small-area-level analysis of the socioeconomic changes that took place during the
period between 2006 and 2011.
After classifying areas based on their mean equivalized income for 2011, the results
for the top five and bottom five municipalities were illustrated for both reference
years, to investigate the patterns in the two tails of the income distribution. The
results indicate that during the period of economic crisis, there was a decrease in all
income levels and at the same time a large increase in poverty.
The SimAthens model outputs included different measures of poverty focusing on
alternative dimensions of poverty and attempting to track differentiations of this
phenomenon in space and time using diversified components. Looking at absolute
measures, such as the MD and AROP rates in absolute terms, it is interesting to note
that their spatial distribution seems to be the converse of the corresponding income
allocation. However, because MD rates are time independent (as they do not depend
on the average income at the time), there is a higher increase in their values between
2006 and 2011, indicating a relative increase of intermunicipality inequality.
AROP rates in spatially relative terms seem to follow income distribution before the
economic crisis, illustrating lower levels of income inequality in poorer regions.
However, this situation changed in 2011: relative AROP rates become more
homogenous between spatial units of Athens, showing a significant increase in
intramunicipality income inequalities for more deprived areas. Finally, looking at the
results referring to MPI, we can observe that the values of this measure increase as
we move to areas with lower mean equivalized incomes.
It can be argued that the findings presented in this study constitute an initial step of
understanding deeper aspects of the ways in which a large city reacts to an
economic shock, such as the economic crisis of 2008 and the ongoing recession
since then. If the city is assumed a continuously changing dynamic system, the
SimAthens model presented in this study offers a great opportunity to investigate the
underlying dynamics resulting from the individual spatial units composing it. By using
the simulated results, to construct either simple or more complex indices, such as the
MPI, it becomes obvious that we can expand the analysis to special social groups.
Therefore, SimAthens could be an appropriate tool to deepen this type of research
and investigate possible what-if scenarios for policy-making decisions at a local level.
24
The research presented in this study provides a glimpse of the potential of combining
small-area census data with social survey data, to estimate geographical distributions
of variables, for which there are no data available at low spatial levels. To the best of
the authors' knowledge, SimAthens represents the first effort to build a spatial
microsimulation model for Greece. This model could be treated as a platform, on
which alternative perspectives regarding the geographical dimension of fiscal
consolidation and social policies, as well as the social and spatial impacts of austerity
measures in Europe could be tested. For example, at the time of writing this study,
the Greek government announced a new round of budget cuts (worth €5.4bn; Smith,
2016) and austerity measures to be introduced in 2016 and 2017, ranging from
increases in income tax for particular groups in the labor market (such as the self-
employed) to increases in value-added tax and national pension contributions. At the
same time, and on a more positive note, there are investment possibilities such as
the European Commission Investment Plan for Europe (Michalopoulos, 2016), which
may offset the impact of austerity to some extent. The geographical as well as
socioeconomic impact of all these developments and proposed developments can be
analyzed with the use of SimAthens to inform debates and possible help with the
formulation of alternative policies and strategies. Overall, SimAthens has great
potential to be used as a tool for simulating small-area phenomena. Finally, it could
provide an effective solution to the analysis of the spatial and socioeconomic impacts
of alternative urban, regional, and national social policies, or, in other words, for
what-if scenario analysis.
25
References
Alkire, S., Apablaza, M. & Jung, E., 2014. Multidimensional poverty measurement for
EU-SILC countries. OPHI Research in Progress 36b.
Alkire, S. & Foster, J., 2011a. Counting and multidimensional poverty measurement.
Journal
of
Public
Economics,
95(7-8),
pp.476–487. Available
at:
http://www.sciencedirect.com/science/article/pii/S0047272710001660.
Alkire, S. & Foster, J., 2011b. Understandings and misunderstandings of
multidimensional poverty measurement. The Journal of Economic Inequality, 9(2),
pp.289–314. Available at: http://link.springer.com/10.1007/s10888-011-9181-4.
Amis, P., 1995. Making sense of urban poverty. Environment and Urbanization, 7(1),
pp.145–158. Available at: http://eau.sagepub.com/content/7/1/145.short.
Atkinson, A.B., 2003. Multidimensional Deprivation: Contrasting Social Welfare and
Counting Approaches. The Journal of Economic Inequality, 1(1), pp.51–65. Available
at: http://link.springer.com/article/10.1023/A%3A1023903525276.
Atkinson, B. & Marlier, E., 2010. Income and living conditions in Europe.
Ballas, D. et al., 2013. A Review of Microsimulation for Policy Analysis. In C.
O'Donoghue et al., eds. Spatial Microsimulation for Rural Policy Analysis SE - 3.
Advances in Spatial Science. Springer Berlin Heidelberg, pp. 35–54. Available at:
http://dx.doi.org/10.1007/978-3-642-30026-4_3.
Ballas, D. et al., 2012. A Spatial Microsimulation Approach to Small Area Income
Estimation in Britain and Japan. Studies in Regional Science, 42(1), pp.163–187.
Available
at:
http://japanlinkcenter.org/DN/JST.JSTAGE/srs/42.163?lang=en&from=CrossRef&typ
e=abstract.
Ballas, D., 2005. Geography matters: simulating the local impacts of national social
policies, Joseph Rowntree Foundation.
Ballas, D. et al., 2007. Using SimBritain to Model the Geographical Impact of
National Government Policies. Geographical Analysis, 39(1), pp.44–77. Available at:
http://doi.wiley.com/10.1111/j.1538-4632.2006.00695.x.
26
Ballas, D., Clarke, G. & Dewhurst, J., 2006. Modelling the Socio-economic Impacts of
Major Job Loss or Gain at the Local Level: a Spatial Microsimulation Framework.
Spatial
Economic
Analysis,
1(1),
pp.127–146.
Available
at:
http://econpapers.repec.org/RePEc:taf:specan:v:1:y:2006:i:1:p:127-146.
Ballas, D., Clarke, G.P. & Wiemers, E., 2005. Building a dynamic spatial
microsimulation model for Ireland. Population, Space and Place, 11(3), pp.157–172.
Available at: http://doi.wiley.com/10.1002/psp.359.
Betti, G., Donatiello, G. & Verma, V., 2010. The Siena Micro Simulation Model (SM2)
for netgross conversion of EU-SILC income variables. International Journal of
Microsimulation, 3(2), pp.35–53.
Birkin, M. & Clarke, M., 2011. Spatial microsimulation models: a review and a
glimpse into the future. In Population Dynamics and Projection Methods. Springer,
pp. 193–208.
Birkin, M. & Clarke, M., 1988. SYNTHESIS -- a synthetic spatial information system
for urban and regional analysis: methods and examples. Environment and Planning
A,
20(12),
pp.1645–1671.
Available
at:
http://www.envplan.com/abstract.cgi?id=a201645.
Callan, T., 1991. Income Tax and Welfare Reforms: Microsimulation Modelling and
Analysis, Economic and Social Research Institute (ESRI).
Campbell, M. & Ballas, D., 2013. A spatial microsimulation approach to economic
policy analysis in Scotland. Regional Science Policy & Practice, 5(3), pp.263–288.
Available at: http://doi.wiley.com/10.1111/rsp3.12009.
Chin, S.-F. & Harding, A., 2007. Model 22 SpatialMSM - NATSEM's Small Area
Household Model for Australia. In Modelling Our Future: Population Ageing, Health
and Aged Care. International Symposia in Economic Theory and Econometrics.
Emerald Group
Publishing
Limited,
pp.
567–569.
Available
at:
http://dx.doi.org/10.1016/S1571-0386(06)16041-X.
Clarke, M. & Holm, E., 1987. Microsimulation Methods in Spatial Analysis and
Planning. Geografiska Annaler. Series B, Human Geography, 69(2), pp.145–164.
Available at: http://www.jstor.org/stable/490448.
27
Dimitris Kavroudakis, Dimitris Ballas, M.B., 2013. SimEducation: A Dynamic Spatial
Microsimulation Model for Understanding Educational Inequalities. In R. Tanton & K.
Edwards, eds. Spatial Microsimulation: A Reference Guide for Users. Dordrecht:
Springer Netherlands. Available at: http://www.springerlink.com/index/10.1007/978-
94-007-4623-7.
Edwards, K.L. et al., 2010. Internal and External Validation of Spatial Microsimulation
Models: Small Area Estimates of Adult Obesity. Applied Spatial Analysis and Policy,
4(4), pp.281–300. Available at: http://link.springer.com/10.1007/s12061-010-9056-2.
Elbers, C., Lanjouw, J.O. & Lanjouw, P., 2003. Micro–level estimation of poverty and
inequality. Econometrica, 71(1), pp.355–364.
Fabrizi, E. et al., 2014. Mapping average equivalized income using robust small area
methods. Papers in Regional Science, 93(3), pp.685–701.
Fay, R.E. & Herriot, R.A., 1979. Estimates of income for small places: an application
of James-Stein procedures to census data. Journal of the American Statistical
Association, 74(366a), pp.269–277.
Fusco, A., Guio, A.-C. & Marlier, E., 2010. Characterising the income poor and the
materially deprived in European countries. Income and living conditions in Europe,
p.133.
Glaeser, E.L., 1998. Are Cities Dying? The Journal of Economic Perspectives, 12(2),
pp.139–160 CR
– Copyright © 1998 American Econo. Available at:
http://www.jstor.org/stable/2646967.
Guio, A.-C., Fusco, A. & Marlier, E., 2009. A European Union approach to material
deprivation using EU-SILC and Eurobarometer data.
Integrated Research
Infrastructure in the Socio-economic Sciences (IRISS) Working Paper Series, 19,
p.2009.
Hagerstrand, T., 1957. Migration in Sweden: A Symposium D. Hannerberg, ed.,
Available
at:
https://books.google.gr/books/about/Migration_in_Sweden.html?id=9zkiAAAAMAAJ&
pgis=1.
Harding, A. et al., 2006. Poverty and disadvantage among Australian children: a
spatial perspective,
28
Kain, J.F. & Apgar, W.C., 1985. Housing and Neighborhood Dynamics: A Simulation
Study,
Harvard
University
Press.
Available
at:
https://books.google.com/books?id=XdT8OncAQe0C&pgis=1.
Kavroudakis, D., Ballas, D. & Birkin, M., 2012. Using Spatial Microsimulation to
Model Social and Spatial Inequalities in Educational Attainment. Applied Spatial
Analysis
and
Policy,
6(1),
pp.1–23.
Available
at:
http://link.springer.com/10.1007/s12061-012-9075-2.
Lovelace, R. & Ballas, D., 2013. "Truncate, replicate, sample": A method for creating
integer weights for spatial microsimulation. Computers, Environment and Urban
Systems,
41,
pp.1–11.
Available
at:
http://www.sciencedirect.com/science/article/pii/S0198971513000240.
Lovelace, R., Ballas, D. & Watson, M., 2014. A spatial microsimulation approach for
the analysis of commuter patterns: from individual to regional levels. Journal of
Transport
Geography,
34,
pp.282–296.
Available
at:
http://www.sciencedirect.com/science/article/pii/S0966692313001361.
Lovelace, R., & Dumont, M. (2016). Spatial Microsimulation with R. CRC Press.
Maloutas, T (2007), Segregation, SOcial Polarization and imigration in Athens during
the 1990s: Theoretical Expectations and Contextual Difference, International Journal
of Urban and Regional Research, vo. 31, pp. 733-758
Marsh, C. (1993) Privacy, confidentiality and anonymity in the 1991 Census. In The
1991 Census User's Guide (eds. A Dale and C Marsh), London: Her Majesty's
Stationary Office, 111-128
Michalopoulos, S (2016), Schinas: Juncker Plan is 'good news' for Greece, Euractiv,
14
April
2016,
available
from:
http://www.euractiv.com/section/euro-
finance/interview/schinas-juncker-plan-is-good-news-for-greece-stay-tuned/
Miranti, R. et al., 2010. Poverty at the Local Level: National and Small Area Poverty
Estimates by Family Type for Australia in 2006. Applied Spatial Analysis and Policy,
4(3), pp.145–171. Available at: http://link.springer.com/10.1007/s12061-010-9049-1.
Moser, C.O.N., 1998. The asset vulnerability framework: Reassessing urban poverty
reduction strategies. World Development, 26(1), pp.1–19. Available at:
http://www.sciencedirect.com/science/article/pii/S0305750X97100158.
29
Nagle, N.N., Sweeney, S.H. & Kyriakidis, P.C., 2011. Geostatistical Linear
Regression Model for Small Area Data. Geographical analysis.
Nolan, B. & Whelan, C.T., 2011. Poverty and Deprivation in Europe, Oxford
University
Press.
Available
at:
http://ideas.repec.org/b/oxp/obooks/9780199588435.html.
O'Donoghue, C., Loughrey, J. & Morrissey, K., 2013. Using the EU-SILC to model
the impact of the economic crisis on inequality. IZA Journal of European Labor
Studies, 2(1), p.23. Available at: http://www.izajoels.com/content/2/1/23.
Orcutt, G.H., 1957. A New Type of Socio-Economic System. The Review of
Economics and Statistics, 39(2), pp.116–123.
Orcutt, G.H., Caldwell, S. & Wertheimer, R.F., 1976. Policy Exploration Through
Microanalytic
Simulation,
The
Urban
Insitute.
Available
at:
https://books.google.com/books?id=4g44Qr51NEwC&pgis=1.
Pereira, L.N. & Coelho, P.S., 2013. Estimation of house prices in regions with small
sample sizes. The Annals of Regional Science, 50(2), pp.603–621.
PRED, A., 1977. The choreography of existence: comments on Hagerstrand's time-
geography and its usefulness. Economic Geography, 53, pp.207–221.
Pritchard, D.R. & Miller, E.J., 2011. Advances in population synthesis: fitting many
attributes per agent and fitting to household and person margins simultaneously.
Transportation,
39(3),
pp.685–704.
Available
at:
http://link.springer.com/10.1007/s11116-011-9367-4.
Rees, P., Martin, D. & Williamson, P., 2002. Census data resources in the United
Kingdom. In P. Rees, D. J. Martin, & P. Williamson, eds. The Census Data System.
Wiley, pp. 1–24.
Robert Tanton; Kimberley L. Edwards, 2013. Introduction to Spatial Microsimulation:
History, Methods and Applications. In Spatial Microsimulation: A Reference Guide for
Users. Springer Netherlands, pp. 3–8.
Satterthwaite, D., 1997. Urban Poverty: Reconsidering its Scale and Nature. IDS
Bulletin,
28(2),
pp.9–23. Available
at:
http://doi.wiley.com/10.1111/j.1759-
5436.1997.mp28002002.x.
30
Sen,
A.,
1999.
Development
as
Freedom,
Available
at:
https://books.google.com/books?hl=el&lr=&id=NQs75PEa618C&pgis=1.
Sen,
A.,
1992.
Inequality
Reexamined,
Available
at:
https://books.google.com/books?hl=el&lr=&id=D6_eCtTK6-oC&pgis=1.
Sen, A., 1983. Poor, Relatively Speaking. Oxford Economic Papers, 35(2), pp.153–
169 CR
– Copyright ©
1983 Oxford Univers. Available
at:
http://www.jstor.org/stable/2662642.
Smith, D.M., Clarke, G.P. & Harland, K., 2009. Improving the synthetic data
generation process in spatial microsimulation models. Environment and Planning A,
41(5),
pp.1251–1268.
Available
at:
http://econpapers.repec.org/RePEc:pio:envira:v:41:y:2009:i:5:p:1251-1268.
Smith, H (2016), Greek MPs approve toughest austerity measures yet amid rioting,
The
Guardian,
8
May
2016,
available
from:
http://www.theguardian.com/world/2016/may/08/rioters-take-to-the-streets-ahead-of-
greek-austerity-vote#img-1
Sutherland, H. & Figari, F., 2013. EUROMOD: the European Union tax-benefit
microsimulation model, EUROMOD Working Paper.
Tanton, R., 2014. A Review of Spatial Microsimulation Methods. International Journal
of
Microsimulation,
7(1),
pp.4–25.
Available
at:
http://ideas.repec.org/a/ijm/journl/v7y2014i1p4-25.html.
Tanton, R. et al., 2009. Old, Single and Poor: Using Microsimulation and Microdata to
Analyse Poverty and the Impact of Policy Change among Older Australians.
Economic Papers: A journal of applied economics and policy, 28(2), pp.102–120.
Available at: http://doi.wiley.com/10.1111/j.1759-3441.2009.00022.x.
Tanton, R., 2011. Spatial microsimulation as a method for estimating different
poverty rates in Australia. Population, Space and Place, 17(3), pp.222–235. Available
at: http://doi.wiley.com/10.1002/psp.601.
Townsend, P., 1979. Poverty in the United Kingdom: A Survey of Household
Resources
and
Standards
of
Living,
Available
at:
https://books.google.com/books?hl=el&lr=&id=weGYy_-czvsC&pgis=1.
31
Weziak-Bialowolska, D. & Dijkstra, L., 2014. Monitoring multidimensional poverty in
the EU regions.
Wilson, A.G. & Pownall, C.E., 1976. A New Representation of the Urban System for
Modelling and for the Study of Micro-Level Interdependence. Area, 8(4), pp.246–254.
Wratten, E., 1995. Conceptualizing urban poverty. Environment and Urbanization,
7(1), pp.11–38. Available at: http://eau.sagepub.com/content/7/1/11.short.
32
|
1711.11068 | 2 | 1711 | 2017-12-09T04:44:59 | Happiness Pursuit: Personality Learning in a Society of Agents | [
"cs.MA",
"cs.AI"
] | Modeling personality is a challenging problem with applications spanning computer games, virtual assistants, online shopping and education. Many techniques have been tried, ranging from neural networks to computational cognitive architectures. However, most approaches rely on examples with hand-crafted features and scenarios. Here, we approach learning a personality by training agents using a Deep Q-Network (DQN) model on rewards based on psychoanalysis, against hand-coded AI in the game of Pong. As a result, we obtain 4 agents, each with its own personality. Then, we define happiness of an agent, which can be seen as a measure of alignment with agent's objective function, and study it when agents play both against hand-coded AI, and against each other. We find that the agents that achieve higher happiness during testing against hand-coded AI, have lower happiness when competing against each other. This suggests that higher happiness in testing is a sign of overfitting in learning to interact with hand-coded AI, and leads to worse performance against agents with different personalities. | cs.MA | cs |
Happiness Pursuit: Personality Learning
in a Society of Agents
Rafał Muszy´nski
University College London
[email protected]
Jun Wang
University College London
[email protected]
Abstract
Modeling personality is a challenging problem with applications spanning com-
puter games, virtual assistants, online shopping and education. Many techniques
have been tried, ranging from neural networks to computational cognitive archi-
tectures. However, most approaches rely on examples with hand-crafted features
and scenarios. Here, we approach learning a personality by training agents using
a Deep Q-Network (DQN) model on rewards based on psychoanalysis, against
hand-coded AI in the game of Pong. As a result, we obtain 4 agents, each with
its own personality. Then, we define happiness of an agent, which can be seen as
a measure of alignment with agent's objective function, and study it when agents
play both against hand-coded AI, and against each other. We find that the agents
that achieve higher happiness during testing against hand-coded AI, have lower
happiness when competing against each other. This suggests that higher happi-
ness in testing is a sign of overfitting in learning to interact with hand-coded AI,
and leads to worse performance against agents with different personalities.
1
Introduction
Personality is defined in [19] as the "unique, relatively enduring internal and external aspects of a
person's character that influence behavior in different situations." Theories of personality strive to
explain and describe different types of personalities among people. Freud [4, 3] was the first to
develop a modern theory of personality based mostly on clinical observations. In [19], Freudian
structure of personality is described as composing of three elements: id, ego, and superego. Id is
concentrated on following basic instincts. It is interested in instant gratification, knows no morality
and is selfish. On the opposite side, superego constitutes the moral aspect of personality. It wants
to act according to parental and societal values and standards. Ego is the rational element of the
Freudian model. Its role is to resolve the conflicts between the demands of id and the moralizing
superego by using defense mechanisms such as denial or repression. Many alternative approaches
describing personality have been proposed since (e.g., see [19]). Moreover, computational models of
personality have also been implemented (see section 2). Most of them concentrate on intrapersonal
aspects of personality and work with hand-crafted features, in relatively simple settings.
In the last few years, the advances in Deep Learning (DL) [7, 18] and the development of Deep Q-
Networks (DQN) [9] have made it possible to work with increasingly more complex environments,
e.g. Atari 2600 games [2], using only pixels as input.
In this work, we explore the applicability of DQN to computational psychology on the intrapersonal
level. We concentrate on id and superego components of personality. The key idea is to employ
DQN to learn a Freudian-inspired personality model from raw input in the game of Pong and use
the resulting agents with different personalities to study their performance both in training and in
a society of bots. Firstly, to achieve agents with different personalities, we formulate and train a
DQN-based model using Freudian-inspired reward functions (section 3). We let one DQN learn
NIPS 2017, Aligned Artificial Intelligence Workshop, Long Beach, CA, USA.
Figure 1: Possible RID and RSE values combinations at the end of the game and the actual average
values obtained by the agents during 1000 test games against hand-coded AI.
from a reward signal strengthening selfish behavior - in Pong this can be reflected by scoring a point
against an opponent - which is a typical characteristic of id [19]. Another DQN learns superego -
based on rewards corresponding to morality, cooperation. In the game, this can be represented by
trying to win, but without getting ahead of our opponent by more than one point. Secondly, we
define a "happiness" measure of a resulting id/superego agent based on its performance in relation
to its objective function (section 3). Finally, when the trained id and superego agents play against
each other, we find that the agents that are less happy after the training session - or less aligned with
their intended reward objective - are more happy when they compete against each other (section 4).
This suggests that less overfitting during training, leads to a more successful, resilient behavior of
an agent in a society.
2 Related work
To our knowledge, the first attempt to computationally describe the psychoanalytic theory of mind
was [11] (cf. [10]), and used basic probability. We did not find any extensions of the model to com-
puter simulations. A computational model of personality using some of the traits of the Big Five
theory of personality (the Five Factor Model, FFM; cf. [19]) and neural networks was presented in
[15]. Other studies using neural networks to learn a personality include [13, 14]. Another proba-
bilistic approach was given by [6], which used a Bayesian Belief Network with the FFM to build
a multilayer personality model in a chat application. The fact that you can replicate many of the
previous experiments used in computational models of personality, e.g. [15, 14], within a CLAR-
ION cognitive architecture was demonstrated in [20]. As far as other cognitive architectures are
concerned, [5] used one trait of the FFM in the ACT-R architecture and demonstrate the behavior of
their model, PIACT, in a soccer simulation environment. The BDI architecture was used to simulate
personality in [12], and more recently with the FFM in [1]. The biggest difference in our approach
to modeling personality is that it only involves specifying new reward signals for the id or superego
components of the personality model to achieve complex behavior in a challenging environment.
3 Problem description
Motivated by the Freudian theory of personality [4, 3], we formulate two types of rewards and agents
corresponding to the id and superego elements of personality.
Definition 1. ID reward (rID) is a predefined, scalar reward signal sent to the agent at each time
step, encouraging selfish behavior.
Definition 2. SE reward (rSE) is a predefined, scalar reward signal sent to the agent at each time
step, encouraging social behavior.
Definition 3. Cumulative ID reward (RID) is a total reward achieved by an agent in a Markov
Chain of length n, ending with a terminus event e:
RID = rID1 + ... + rIDn
(1)
2
Figure 2: Training IDL and SER agents against
hand-coded AI for 10 million frames.
Figure 3: Lower happiness score during testing
leads to higher happiness in a society.
Definition 4. Cumulative SE reward (RSE) is a total reward achieved by an agent in a Markov
Chain of length n, ending with a terminus event e:
RSE = rSE1 + ... + rSEn
(2)
Definition 5. ID is an agent with an objective of maximizing RID.
Definition 6. SUPEREGO (SE) is an agent with an objective of maximizing RSE.
Happiness of people can be measured through surveys, e.g. [8], and captured as a scalar value on
a scale. More recently, it has been described mathematically in computational neuroscience as a
relation between certain rewards, expected values of given gambles, and the difference between ex-
pected and actual rewards in individual [17], and more broadly in social context [16]. Our definition
of happiness is for artificial agents and takes into account maximum, and minimum values they can
obtain in an environment, and is independent of the happiness of other agents.
Definition 7. Happiness of Agent X (HX) is defined as the quotient:
HX = (RX − R∗
(3)
where the cumulative reward obtained by agent X in a Markov Chain, ending with a terminus event
e is denoted as RX, and its potential maximum and minimum values as R∗∗
X, respectively.
Using the above definitions, we train ID and SE agents in the game of Pong. We study their happiness
both when training against hand-coded AI, and when they play against each other in a society of bots.
X and R∗
X )/(R∗∗
X − R∗
X )
4 Experiment set-up and results
In order to demonstrate ID and SE agents in practice, we modified a simple Pong game. The game
has 2 players, each controlling one of the paddles on either side of the screen. The goal of the game
is to bounce the ball in such a way, so that it goes past the opponent's paddle - for which the player
is awarded 1 point. The game ends with one of the players scoring 11 points.
In terms of the terminology from section 3, scoring 11 points is the terminus event (e), after which
a new match begins. A subjective reward (rID) used to train ID relates to the id component of
the Freudian theory of personality that is selfish. Here, we set rID to +1, if the ball goes past the
opponent (ID scores a point), -1 if it goes past ID (ID loses a point), and 0 otherwise. As a
result, the minimum value of RID (i.e. R∗
ID) in one match is -11 (losing every single point), and
the maximum is +11 (R∗∗
ID). On the other hand, rSE captures the social aspect of the environment,
in line with the superego component of personality. Here, the rules for getting the reward are more
involved. In short, the goal of SE is still winning, ideally 11:10, and taking turns in scoring the
points with the opponent.1 Hence, R∗
SE is 10.5. Fig. 1 shows possible values of
RID and RSE that an agent can obtain at the end of each match (for clarity, the values of RSE are
rounded). Note the natural trade-off line between the optimal ID (pair RSE = 3, RID = 11, the
green diamond at the top) and SE values (pair RSE = 10.5, RID = 1, the rightmost blue diamond).
To train ID and SE agents, we use DQN [9] with rID and rSE as the reward signals. Both ID
and SE agents are first trained separately against a hand-coded AI, and strive to maximize RID and
SE is -6, and R∗∗
1To see the full code and the videos showing the performance of agents, go to https://git.io/vbT1v.
3
Table 1: Performance of agents during 1000
test games against hand-coded AI.
Table 2: Summary statistics of 100 matches be-
tween agents.
Agent
IDL
IDR
SEL
SER
Average
score
11.00
11.00
8.84
10.78
Average
% won RID
100% 9.99
100% 10.76
-1.69
16%
91%
4.08
RSE
2.48
3.03
5.09
4.41
Match
IDL vs. IDR
SEL vs. SER
IDL vs. SER
SEL vs. IDR
Average score
L
10.80
3.50
9.44
8.92
R
5.29
10.93
8.96
9.05
% won
R
L
91% 9%
3%
97%
51% 49%
40% 60%
RSE respectively. We train ID to control the paddle on the left and right on 10 million frames. We
do the same for the SE agent. As a result we obtain 4 models: ID trained to control the paddle on
the left (IDL), right (IDR), and the SE agents respectively (SEL and SER). Note that IDL did
not perform well when used to control the paddle on the opposite end of the screen (the same was
observed for other agents), hence the 2 agents per side. Fig. 2 shows a learning curve for the IDL
and SER agents during training. For clarity, the lines on the graph show the moving averages of
RID and RSE over the last 10 matches. The learning curves of IDR and SEL look similarly and
are therefore omitted. Note that performance of SER starts to deteriorate slightly around 4 million
frames. We observe a similar behavior when training SEL. Hence, in the following experiments we
froze the weights calculated at 4.2M frames for SEL, 4.15M for SER, and 10M for both ID agents.
In the test phase, we set the epsilon value to 0, and run each model for 1000 matches against the
hand-coded AI (see Table 1). One can note, that ID agents learned to win every single time (%
won column in Table 1), with IDR agent beating the hand-coded opponent by a larger number of
points than IDL, as can be seen by its higher average RID value. SEL agent did not learn to win
consistently, but it achieves the highest score among all the agents on its core objective - maximizing
the RSE value. The numbers indicate that rSE is a harder signal to learn, as both SE agents did not
get as close to their potential maximum (RSE = 10.5, RID = 1) as both ID agents. The visual
confirmation of this is presented in Fig. 1, where the average values of RSE and RID obtained by
the agents during testing are plotted against all the possible scenarios. Indeed, the averages of both
ID agents are closer to their respective maximum (the green diamond at the top), than those for the
SE agents (the rightmost blue diamond). We find that rID is easier to learn as the same actions lead
to the same rewards. The SE agent has a more difficult function to learn, as the same actions result
in different reward depending on the score. ID rewards are independent of the score.
Subsequently, the 4 trained agents played 100 matches against each other (see Table 2). The IDL
agent - which performed worse than IDR during testing - won 91% of the games against its oppo-
nent, and also beat SER by a small margin. SER also achieved lower RSE than SEL in testing,
yet it greatly outperformed SEL in a series of matches. Finally, happiness statistics (see Figure 3)
further indicate, that agents achieving lower happiness on their respective objective during testing,
show higher happiness when interacting with other agents during the matches. This suggests that
achieving high performance on the given reward objective against the hand-coded Pong AI is not
enough to generate a resilient strategy. Agents may need more variability during training to better
respond to the changing environment later on.
5 Conclusions
In this paper we describe the computational model of personality based on Freudian psychoanalysis
and DQN, and define "happiness" of an agent. Through the experiments, we show that the agents
that are less aligned with their intended objective after the training period, exhibit more alignment
when interacting with other agents. Here, we acknowledge the weaknesses of this work and mention
possible further improvements. Firstly, due to the nature of the DQN algorithm, it is impossible to
compare our work with other computational models of personality as was done in [20]. Secondly,
this study relies on the psychoanalytic theory of personality. However, it appears that extending
this work to the FFM could further improve the ability of the model to capture human personality.
Lastly, in order to calculate the happiness, one needs to know the minimum and maximum values of
RSE and RID, which may be impossible in more complex environments.
4
Acknowledgment
This work was supported by Microsoft Research through its PhD Scholarship Programme.
References
[1] Sebastian Ahrndt, Johannes Fahndrich, and Sahin Albayrak. Modelling of personality in
agents: from psychology to implementation. Proceedings of the HAIDM, pages 1–16, 2015.
[2] Marc G Bellemare, Yavar Naddaf, Joel Veness, and Michael Bowling. The arcade learning
environment: An evaluation platform for general agents. Journal of Artificial Intelligence
Research, 47:253–279, 2013.
[3] Sigmund Freud. The ego and the id. WW Norton & Company, 1962.
[4] Sigmund Freud. Inhibitions, symptoms and anxiety. WW Norton & Company, 1977.
[5] Sara Karimi and Mohammad Reza Kangavari. A computational model of personality.
Procedia-Social and Behavioral Sciences, 32:184–196, 2012.
[6] Sumedha Kshirsagar. A multilayer personality model. In Proceedings of the 2nd international
symposium on Smart graphics, pages 107–115. ACM, 2002.
[7] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436–
444, 2015.
[8] Sonja Lyubomirsky and Heidi S Lepper. A measure of subjective happiness: Preliminary
reliability and construct validation. Social indicators research, 46(2):137–155, 1999.
[9] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness, Marc G
Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg Ostrovski, et al.
Human-level control through deep reinforcement learning. Nature, 518(7540):529–533, 2015.
[10] Tohru Nitta. A computational model of personality. No Matter, Never Mind: Proceedings of
Toward a Science of Consciousness: Fundamental approaches, Tokyo 1999, 33:315, 2002.
[11] Tohru Nitta, Toshio Tanaka, Kenji Nishida, and Hiroaki Inayoshi. Modeling human mind.
In Systems, Man, and Cybernetics, 1999. IEEE SMC'99 Conference Proceedings. 1999 IEEE
International Conference on, volume 2, pages 342–347. IEEE, 1999.
[12] Lin Padgham and Guy Taylor. A system for modelling agents having emotion and personality.
In Intelligent Agent Systems Theoretical and Practical Issues, pages 59–71. Springer, 1997.
[13] Mike Poznanski and Paul Thagard. Changing personalities: towards realistic virtual characters.
Journal of Experimental & Theoretical Artificial Intelligence, 17(3):221–241, 2005.
[14] Michael Quek and DS Moskowitz. Testing neural network models of personality. Journal of
Research in Personality, 41(3):700–706, 2007.
[15] Stephen J Read, Brian M Monroe, Aaron L Brownstein, Yu Yang, Gurveen Chopra, and Lynn C
Miller. A neural network model of the structure and dynamics of human personality. Psycho-
logical review, 117(1):61, 2010.
[16] Robb B Rutledge, Archy O De Berker, Svenja Espenhahn, Peter Dayan, and Raymond J Dolan.
The social contingency of momentary subjective well-being. Nature communications, 7, 2016.
[17] Robb B Rutledge, Nikolina Skandali, Peter Dayan, and Raymond J Dolan. A computational
and neural model of momentary subjective well-being. Proceedings of the National Academy
of Sciences, 111(33):12252–12257, 2014.
[18] Jurgen Schmidhuber. Deep learning in neural networks: An overview. Neural networks, 61:85–
117, 2015.
[19] Duane P Schultz and Sydney Ellen Schultz. Theories of personality. Cengage Learning, 2016.
[20] Ron Sun and Nicholas Wilson. A model of personality should be a cognitive architecture itself.
Cognitive Systems Research, 29:1–30, 2014.
5
|
1312.7580 | 4 | 1312 | 2015-04-20T07:37:17 | On the Learning Behavior of Adaptive Networks - Part II: Performance Analysis | [
"cs.MA",
"eess.SY",
"math.OC"
] | Part I of this work examined the mean-square stability and convergence of the learning process of distributed strategies over graphs. The results identified conditions on the network topology, utilities, and data in order to ensure stability; the results also identified three distinct stages in the learning behavior of multi-agent networks related to transient phases I and II and the steady-state phase. This Part II examines the steady-state phase of distributed learning by networked agents. Apart from characterizing the performance of the individual agents, it is shown that the network induces a useful equalization effect across all agents. In this way, the performance of noisier agents is enhanced to the same level as the performance of agents with less noisy data. It is further shown that in the small step-size regime, each agent in the network is able to achieve the same performance level as that of a centralized strategy corresponding to a fully connected network. The results in this part reveal explicitly which aspects of the network topology and operation influence performance and provide important insights into the design of effective mechanisms for the processing and diffusion of information over networks. | cs.MA | cs | IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
1
On the Learning Behavior of Adaptive Networks --
Part II: Performance Analysis
Jianshu Chen, Member, IEEE, and Ali H. Sayed, Fellow, IEEE
5
1
0
2
r
p
A
0
2
]
A
M
.
s
c
[
4
v
0
8
5
7
.
2
1
3
1
:
v
i
X
r
a
Abstract -- Part I [2] of this work examined the mean-square
stability and convergence of the learning process of distributed
strategies over graphs. The results identified conditions on the
network topology, utilities, and data in order to ensure stability;
the results also identified three distinct stages in the learning
behavior of multi-agent networks related to transient phases I
and II and the steady-state phase. This Part II examines the
steady-state phase of distributed learning by networked agents.
Apart from characterizing the performance of the individual
agents, it is shown that the network induces a useful equalization
effect across all agents. In this way, the performance of noisier
agents is enhanced to the same level as the performance of agents
with less noisy data. It is further shown that in the small step-size
regime, each agent in the network is able to achieve the same
performance level as that of a centralized strategy corresponding
to a fully connected network. The results in this part reveal
explicitly which aspects of the network topology and operation
influence performance and provide important insights into the
design of effective mechanisms for the processing and diffusion
of information over networks.
Index Terms -- Multi-agent learning, diffusion of information,
steady-state performance, centralized solution, stochastic approx-
imation, mean-square-error.
I. INTRODUCTION
In Part I of this work [2], we carried out a detailed
transient analysis of the global learning behavior of multi-
agent networks. The analysis revealed interesting results about
the learning abilities of distributed strategies when constant
step-sizes are used to ensure continuous tracking of drifts
in the data. It was noted that when constant step-sizes are
employed to drive the learning process,
the dynamics of
the distributed strategies is modified in a critical manner.
Specifically, components that relate to gradient noise are not
annihilated any longer, as happens when diminishing step-sizes
are used. These noise components remain persistently active
throughout the adaptation process and it becomes necessary
to examine their impact on network performance, such as
Manuscript received December 28, 2013; revised November 21, 2014;
accepted March 29, 2015. This work was supported in part by NSF grants
CCF-1011918 and ECCS- 1407712. A short early version of limited parts of
this work appears in the conference publication [1] without proofs and under
more restrictive conditions.
J. Chen was with Department of Electrical Engineering, University of
California, Los Angeles, and is currently with Microsoft Research, Redmond,
WA 98052. This work was performed while he was a PhD student at UCLA.
Email: [email protected].
A. H. Sayed is with Department of Electrical Engineering, University of
California, Los Angeles, CA 90095. Email: [email protected].
Communicated by Prof. Nicol`o Cesa-Bianchi, Associate Editor for Pattern
Recognition, Statistical Learning, and Inference.
Copyright (c) 2014 IEEE. Personal use of this material
is permitted.
However, permission to use this material for any other purposes must be
obtained from the IEEE by sending a request to [email protected].
examining questions of the following nature: (a) can these
persistent noise components drive the network unstable? (b)
can the degradation in performance be controlled and mini-
mized? (c) what is the size of the degradation? Motivated by
these questions, we provided in Part I [2] detailed answers to
the following three inquiries: (i) where does the distributed
strategy converge to? (ii) under what conditions on the data
and network topology does it converge? (iii) and what are the
rates of convergence of the learning process? In particular, we
showed in Part I [2] that there always exist sufficiently small
constant step-sizes that ensure the mean-square convergence
of the learning process to a well-defined limit point even in
the presence of persistent gradient noise.
We characterized this limit point as the unique fixed
point solution of a nonlinear algebraic equation consisting of
the weighted sum of individual update vectors. The scaling
weights were shown to be given by the entries of the right-
eigenvector of the network combination policy corresponding
to the eigenvalue at one (also called the Perron eigenvector;
its entries are normalized to add up to one and are all
strictly positive for strongly-connected networks). The analysis
from Part I [2] further revealed that the learning curve of
the multi-agent network exhibits three distinct phases. In the
first phase (Transient Phase I), the convergence rate of the
network is determined by the second largest eigenvalue of
the combination policy in magnitude, which is related to the
degree of network connectivity. In the second phase (Transient
Phase II), the convergence rate is determined by the Perron
eigenvector. And, in the third phase (the steady-state phase)
the mean-square error (MSE) performance attains a bound on
the order of step-size parameters.
In this Part II of the work, we address in some detail two
additional questions related to network performance, namely,
iv) how close do the individual agents get to the limit point
of the distributed strategies over the network? and v) can the
system of networked agents be made to match the learning
performance of a centralized solution where all information
is collected and processed centrally by a fusion center? In
the process of answering these questions, we shall derive
a closed-form expression for the steady-state MSE of each
agent. This closed-form expression turns out to be a revealing
result; it amounts to a non-trivial extension of a classical
result for stand-alone adaptive agents [3] -- [6] to the more
demanding context of networked agents and for cost functions
that are not necessarily quadratic or of the mean-square-error
type. As we are going to explain in the sequel, the closed-
form expression of the steady-state MSE captures the effect
of the network topology (through the Perron vector of the
2
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
combination matrix), gradient noise, and data characteristics
in an integrated manner and shows how these various factors
influence performance. The derived results in this paper ap-
plies to connected networks under fairly general conditions
and for fairly general aggregate cost functions.
We shall also explain later in Sections V and VI of this
part that, as long as the network is strongly connected, a
left-stochastic combination matrix can always be constructed
to have any desired Perron-eigenvector. This observation has
an important ramification for the following reason. Starting
from any collection of N agents, there exists a finite number
of topologies that can link these agents together. And for
each possible topology, there are infinitely many combination
policies that can be used to train the network. Since the
performance of the network is dependent on the Perron-
eigenvector of its combination policy, one of the important
conclusions that will follow is that regardless of the network
topology, there will always exist choices for the respective
combination policies such that the steady-state performance
of all topologies can be made identical to each other to first-
order in µmax, which is the largest step-size across agents.
In other words, no matter how the agents are connected to
each other, there is always a way to select the combination
weights such that the performance of the network is invariant
to the topology. This will also mean that, for any connected
topology, there is always a way to select the combination
weights such that the performance of the network matches that
of the centralized stochastic-approximation (since a centralized
solution can be viewed as corresponding to a fully-connected
network).
Notation. We adopt the same notation from Part I [2]. All
vectors are column vectors. We use boldface letters to denote
random quantities (such as uk,i) and regular font to denote
their realizations or deterministic variables (such as uk,i). We
use diag{x1, . . . , xN} to denote a (block) diagonal matrix
consisting of diagonal entries (blocks) x1, . . . , xN , and use
col{x1, . . . , xN} to denote a column vector formed by stack-
ing x1, . . . , xN on top of each other. The notation x (cid:22) y
means each entry of the vector x is less than or equal to
the corresponding entry of the vector y, and the notation
X (cid:22) Y means each entry of the matrix X is less than or
equal to the corresponding entry of the matrix Y . The notation
x = vec(X) denotes the vectorization operation that stacks
the columns of a matrix X on top of each other to form a
vector x, and X = vec−1(x) is the inverse operation. The
operators ∇w and ∇wT denote the column and row gradient
vectors with respect to w. When ∇wT is applied to a column
vector s, it generates a matrix. The notation a(µ) ∼ b(µ)
means that limµ→0 a(µ)/b(µ) = 1, a(µ) = o(b(µ)) means
that limµ→0 a(µ)/b(µ) = 0, and a(µ) = O(b(µ)) means that
there exists a constant C > 0 such that a(µ) ≤ C · b(µ). The
notation a = Θ(b) means there exist constants C1 and C2
independent of a and b such that C1 · b ≤ a ≤ C2 · b.
II. FAMILY OF DISTRIBUTED STRATEGIES
A. Distributed Strategies: Consensus and Diffusion
We consider a connected network of N agents that are
linked together through a topology -- see Fig. 1. Each agent
Fig. 1. A network representing a multi-agent system. The set of all agents
that can communicate with node k is denoted by Nk.The edge linking any two
agents is represented by two directed arrows to emphasize that information
can flow in both directions.
k implements a distributed algorithm of the following form to
update its state vector from wk,i−1 to wk,i:
l=1
N(cid:88)
N(cid:88)
N(cid:88)
l=1
φk,i−1 =
ψk,i =
wk,i =
a1,lkwl,i−1
a0,lkφl,i−1 − µk sk,i(φk,i−1)
a2,lkψl,i
(1)
(2)
(3)
l=1
where wk,i ∈ RM is the state of agent k at time i, usually
an estimate for the solution of some optimization problem,
φk,i−1 ∈ RM and ψk,i ∈ RM are intermediate variables gen-
erated at node k before updating to wk,i, µk is a non-negative
constant step-size parameter used by node k, and sk,i(·) is an
M × 1 update vector function at node k. We explained in Part
I [2] that in deterministic optimization problems, the update
vectors sk,i(·) can be selected as the gradient or Newton steps
associated with the individual utility functions at the agents
[7]. On the other hand, in stocastic approximation problems,
such as adaptation, learning and estimation problems [8] --
[26], the update vectors sk,i(·) are usually computed from
realizations of data samples that arrive sequentially at the
nodes. In the stochastic setting, the quantities appearing in (1) --
(3) become random variables and we shall use boldface letters
to highlight their stochastic nature. In Example 1 of Part I [2],
we illustrated various choices for sk,i(w) in different contexts.
The combination coefficients a1,lk, a0,lk and a2,lk in (1) -- (3)
are nonnegative convex-combination weights that each node k
assigns to the information arriving from node l and will be zero
if agent l is not in the neighborhood of agent k. Therefore, each
summation in (1) -- (3) is actually confined to the neighborhood
of node k. We let A1, A0 and A2 denote the N × N matrices
that collect the coefficients {a1,lk}, {a0,lk} and {a2,lk}. Then,
the matrices A1, A0 and A2 satisfy
AT
1
1 = 1, AT
0
(4)
where 1 is the N × 1 vector with all its entries equal to one.
Condition (4) means that the matrices {A0, A1, A2} are left-
stochastic (i.e., the entries on each of their columns add up to
1 = 1, AT
2
1 = 1
Nkk123456789a1kak110CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
3
DIFFERENT CHOICES FOR A1, A0 AND A2 CORRESPOND TO DIFFERENT
DISTRIBUTED STRATEGIES.
TABLE I
Consensus
Distributed Strategeis A1 A0 A2
I
A
I
ATC diffusion
CTA diffusion
A
I
I
I
I
A
A1A0A2
A
A
A
one). We also explained in Part I [2] that different choices for
A1, A0 and A2 correspond to different distributed strategies,
such as the such as the traditional consensus [7], [8], [11] --
[14], [27] and diffusion (ATC and CTA) [17] -- [22], [25], [26]
algorithms -- see Table I. In our analysis, we will proceed
with the general form (1) -- (3) to study all three schemes, and
other possibilities, within a unifying framework.
B. Review of the Main Results from Part I [2]
Due the coupled nature of the social and self-learning steps
in (1) -- (3), information derived from local data at agent k
will be propagated to its neighbors and from there to their
neighbors in a diffusive learning process. It is expected that
some global performance pattern will emerge from these
localized interactions in the multi-agent system. As mentioned
in the introductory remarks, in Part I [2] and in this Part II,
we examine the following five questions:
• Limit point: where does each state wk,i converge to?
• Stability: under which condition does convergence occur?
• Learning rate: how fast does convergence occur?
• Performance: how close does wk,i get to the limit point?
• Generalization: can wk,i match the performance of a
centralized solution?
In Part I [2], we addressed the first three questions in detail and
derived expressions that fully characterize the answer in each
case. One of the main conclusions established in Part I [2]
is that for general left-stochastic matrices {A1, A0, A2}, the
agents in the network will have their iterates wk,i converge, in
the mean-square-error sense, to the same limit vector wo that
corresponds to the unique solution of the following algebraic
equation:
pksk(w) = 0
(5)
where the update functions sk(·) are defined further ahead in
(17) as the conditional means of the update directions sk,i(·)
used in (1) -- (3), and each positive coefficient pk is the kth
entry of the following vector:
(cid:27)
p = col
π1, . . . ,
µN
µmax
πN
µmax
(6)
Here, µmax is the largest step-size among all agents, πk is the
kth entry of the vector π (cid:44) A2θ, and θ is the right eigenvector
of A (cid:44) A1A0A2 corresponding to the eigenvalue at one with
its entries normalized to add up to one, i.e.,
Aθ = θ,
1T θ = 1
(7)
We refer to θ as the Perron eigenvector of A. The unique
solution wo of (5) has the interpretation of a Pareto optimal
N(cid:88)
k=1
(cid:26) µ1
Fig. 2. A typical mean-square-error (MSE) learning curve includes a transient
stage that consists of two phases and a steady-state phase. The plot shows
how the learning curve of a network of agents compares to the learning curve
of a centralized reference solution. The analysis in this work, and in the
accompanying Part I [2] characterizes in detail the parameters that determine
the behavior of the network (rate, stability, and performance) during each
phase of the learning process.
solution corresponding to the weights {pk} [2], [21], [28]. By
selecting different combination policies A, or even different
topologies, the entries {pk} can be made to change (since θ
will change) and the limit point wo resulting from (5) can be
steered towards different Pareto optimal solutions.
The second major conclusion from Part I [2] is that, during
the convergence process towards the limit point wo,
the
learning curve at each agent exhibits three distinct phases (see
Fig. 2): Transient Phase I, Transient Phase II, and Steady-State
Phase. These phases were shown in Part I [2] to have the
following features:
• Transient Phase I:
If the agents are initialized at different values, then the
iterates at the various agents will initially evolve in such
a way to make each wk,i get closer to the following
reference (centralized) recursion ¯wc,i:
N(cid:88)
which is initialized at
¯wc,i = ¯wc,i−1 − µmax
N(cid:88)
¯wc,0 =
pksk( ¯wc,i−1)
(8)
k=1
θkwk,0
(9)
k=1
where wk,0 is the initial value of the distributed strategy
at agent k. The rate at which the agents approach ¯wc,i
is geometric (linear) and is determined by λ2(A), the
second largest eigenvalue of A in magnitude. If the agents
are initialized at the same value, say, e.g., wk,0 = 0, then
the learning curves start at Transient Phase II directly.
• Transient Phase II:
In this phase, the trajectories of all agents are uniformly
close to the trajectory of the reference recursion; they
converge in a coordinated manner to steady-state
in
geometric (linear) rate. The learning curves at this phase
are well modeled by the same reference recursion (8)
Phase&I&Phase&II&Steady,State&MSE&(dB)&Number&of&Itera9ons&&Reference&(centralized)&strategy&&&&&Steady,state&MSE&&&&&&Distributed&strategies&4
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
since we showed in (145) from Part I [2] that:
E(cid:107) wk,i(cid:107)2 = (cid:107) wc,i(cid:107)2 + O(µ1/2
(10)
where the error vectors are defined by wk,i = wo − wk,i
and wc,i = wo − ¯wc,i. Furthermore, for small step-sizes
and during the later stages of this phase, ¯wc,i will be close
enough to wo and the convergence rate r was shown in
expression (114) from Part I [2] to be given by
max) · γi
c + O(µmax)
(11)
where ρ(·) denotes the spectral radius of its matrix
argument, is an arbitrarily small positive number, and
Hc is defined as the aggregate (Hessian-type) sum:
r =(cid:2)ρ(IM − µmaxHc)(cid:3)2
Hc (cid:44) N(cid:88)
+ O(cid:0)(µmax)
2(M−1)(cid:1)
1
pk∇wT sk(wo)
(12)
• Steady-State Phase:
k=1
The reference recursion (8) continues converging towards
wo so that (cid:107) wc,i(cid:107)2 will converge to zero (−∞ dB in
Fig. 2). However, for the distributed strategy (1) -- (3),
the mean-square-error E(cid:107) wk,i(cid:107)2 at each agent k will
converge to a finite steady-state value that is on the order
of O(µmax):
lim sup
i→∞
E(cid:107) wk,i(cid:107)2 ≤ O(µmax)
(13)
Note that
the bound (13) provides a partial answer to
the fourth question we are interested in, namely, how close
the wk,i get to the network limit point wo. Expression (13)
indicates that the mean-square error is on the order of µmax.
However, in this Part II, we will examine this mean-square
error more closely and provide a more accurate characteriza-
tion of the steady-state MSE value by deriving a closed-form
expression for it. In particular, we will be able to characterize
this MSE value in terms of the vector p as follows1:
E(cid:107) wk,i(cid:107)2 = µmax·Tr(cid:8)X(pT⊗IM ) · Rv · (p⊗IM )(cid:9)
lim
i→∞
+ o(µmax)
(14)
where X is the solution to a certain Lyapunov equation
described later in (41) (when Σ = I), Rv is a gradient noise
covariance matrix defined below in (27), and o(µmax) denotes
a strictly higher order term of µmax. Expression (14) is a most
revealing result; it captures the effect of the network topology
through the eigenvector p, and it captures the effects of
gradient noise and data characteristics through the matrices Rv
and X, respectively. Expression (14) is a non-trivial extension
of a classical and famous result pertaining to the mean-square-
error performance of stand-alone adaptive agents [3] -- [6] to the
more demanding context of networked agents. In particular,
it can be easily verified that (14) reduces to the well-known
v/2 expression for the mean-square deviation of single
µM σ2
LMS learners when the network size is set to N = 1 and
the topology is removed [3] -- [6]. However, expression (14)
is not limited to single agents or to mean-square-error costs.
It applies to rather general connected networks and to fairly
general cost functions.
1The interpretation of the limit in (14) is explained in more detail in Sec.
IV.
C. Relation to Prior Work
As pointed out in Part I [2] (see Sec. II-B), most prior works
in the literature [7] -- [14], [29] -- [33] focus on studying the
performance and convergence of their respective distributed
strategies under diminishing step-size conditions and for
doubly-stochastic combination policies. In contrast, we focus
on constant step-sizes in order to enable continuous adaptation
and learning under drifting conditions. We also focus on left-
stochastic combination matrices in order to induce flexibility
about the network limit point; this is because doubly-stochastic
policies force the network to converge to the same limit point,
while left-stochastic policies enable the networks to converge
to any of infinitely many Pareto optimal solutions. Moreover,
the value of the limit point can be controlled through the
selection of the Perron eigenvector.
Furthermore, the performance of distributed strategies has
usually been characterized in terms of bounds on their steady-
state mean-square-error performance -- see, e.g., [7] -- [10],
[27], [29], [31], [33]. In Part I [2] of the work, as a byproduct
of our study of the three stages of the learning process, we
were able to derive performance bounds for the steady-state
MSE of a fairly general class of distributed strategies under
broader (weaker) conditions than normally considered in the
literature. In this Part II, we push the analysis noticeably
further and derive a closed-form expression for the steady-state
MSE in the slow adaptation regime, such as expression (14),
which captures in an integrated manner how various network
parameters (topology, combination policy, utilities) influence
performance.
Other useful and related works in the literature appear in
[11] -- [13], [30]. These works, however, study the distribution
of the error vector in steady-state under diminishing step-size
conditions and using central limit theorem (CLT) arguments.
They established a Gaussian distribution for the error quan-
tities in steady-state and derived an expression for the error
variance but the expression tends to zero as i → ∞ since,
under the conditions assumed in these works, the error vector
wk,i approaches zero almost surely. Such results are possible
because, in the diminishing step-size case, the influence of
gradient noise is annihilated by the decaying step-size. How-
ever, in the constant step-size regime, the influence of gradient
noise is always present and seeps into the operation of the
algorithm. In this case, the error vector does not approach
zero any longer and its variance approaches instead a steady-
state positive-definite value. Our objective is to characterize
this steady-state value and to examine how it is influenced
by the network topology, by the persistent gradient noise
conditions, and by the data characteristics and utility functions.
In the constant step-size regime, CLT arguments cannot be
employed anymore because the Gaussianity result does not
hold any longer. Indeed, reference [34] illustrates this situation
clearly; it derived an expression for the characteristic function
of the limiting error distribution in the case of mean-square-
error estimation and it was shown that the distribution is not
Gaussian. For these reasons, the analysis in this work is based
on alternative techniques that do not pursue any specific form
for the steady-state distribution and that rely instead on the
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
5
N(cid:88)
use of energy conservation arguments [20], [22], [35]. As the
analysis and detailed derivations in the appendices show, this
is a formidable task to pursue due to the coupling among
the agents and the persistent noise conditions. Nevertheless,
under certain conditions that are generally weaker than similar
conditions used in related contexts in the literature, we will
be able to derive accurate expressions for the network MSE
performance and its convergence rate in small constant step-
size regime.
We finally remark that
the analysis in this paper and
its accompanying Part I [2] is not focused on the solution
of deterministic distributed optimization problems, although
algorithm (1) -- (3) can still be applied for that purpose (see
future Sec. VI-B). Instead, we consider a stochastic setting
where each individual cost Jk(w) is generally expressed as
the expectation of some loss function, say, as
Jk(w) = EQk(w; xk,i)
(15)
and the objective is to minimize the aggregate stochastic cost:
J glob(w) =
Jk(w)
(16)
k=1
In such problems, we usually do not know the exact form of
the cost function because we do not have prior knowledge
about the exact statistical distribution of the data xk,i. What
is generally available to each agent k is a stream of data
points xk,0, xk,1, . . . that arrives at agent k sequentially over
time. The agents in the network then use stochastic gradients
constructed as ∇Q(w; xk,i) (or from variations thereof), in
place of the the actual gradients, ∇Jk(w), to learn from the
streaming data. Because of the stochastic nature of the learning
algorithms, they will exhibit different convergence behavior
than deterministic optimization algorithms. For example, even
with a constant step-size, stochastic gradient distributed strate-
gies can still converge at a geometric rate towards a small
MSE in steady-state, whereas diminishing step-sizes of the
form µ(i) = µo/i, ensure a slower almost sure convergence
rate of O(1/i).
III. MODELING ASSUMPTIONS
In this section, we first recall the assumptions used in Part
I [2] and then introduce two conditions that are required to
carry out the MSE analysis in this part. We already explained
in Sec. III of Part I [2] how the assumptions listed below relate
to, and extend, similar conditions used in the literature.
Assumption 1 (Strongly-connected network): The N × N
matrix product A (cid:44) A1A0A2 is assumed to be a primitive
left-stochastic matrix, i.e., AT 1 = 1 and there exists a finite
integer jo such that all entries of Ajo are strictly positive.
Assumption 2 (Update vector: Randomness): There exists
an M × 1 deterministic vector function sk(w) such that, for
all M × 1 vectors w in the filtration Fi−1 generated by the
past history of iterates {wk,j} for j ≤ i− 1 and all k, it holds
that
E{sk,i(w)Fi−1} = sk(w)
(17)
for all i, k. Furthermore, there exist α ≥ 0 and σ2
that for all i, k and w ∈ Fi−1:
E(cid:110)
(cid:107)sk,i(w)−sk(w)(cid:107)2(cid:12)(cid:12)Fi−1
≤ α·(cid:107)w(cid:107)2 +σ2
v
(cid:111)
holds with probability one.
v ≥ 0 such
(18)
Assumption 3 (Update vector: Lipschitz): There exists a
nonnegative λU such that for all x, y ∈ RM and all k:
(cid:107)sk(x) − sk(y)(cid:107) ≤ λU · (cid:107)x − y(cid:107)
where the subscript "U" in λU means "upper bound".
(19)
(cid:104)
N(cid:88)
k=1
(cid:105)
Assumption 4 (Update vector: Strong monotonicity): Let
pk denote the kth entry of the vector p defined in (6). There
exists λL > 0 such that for all x, y ∈ RM :
(x − y)T ·
pk
sk(x) − sk(y)
≥ λL · (cid:107)x − y(cid:107)2
(20)
where the subscript "L" in λL means "lower bound", and λL
may depend on {pk}.
Assumption 5 (Jacobian matrix: Lipschitz): Let wo denote
the limit point of the distributed strategy (1) -- (3), which was
defined earlier as the unique solution to (5) and was character-
ized in Theorem 1 of Part I [2]. Then, in a small neighborhood
around wo, we assume that sk(w) is differentiable with respect
to w and satisfies
(cid:107)∇wT sk(wo + δw) − ∇wT sk(wo)(cid:107) ≤ λH · (cid:107)δw(cid:107)
(21)
for all (cid:107)δw(cid:107) ≤ rH for some small rH, and where λH is a
nonnegative number independent of δw.
The following lemma gives the equivalent forms of Assump-
tions 3 -- 4 when the {sk(w)} happen to be differentiable.
Lemma 1 (Equivalent conditions on update vectors):
Suppose {sk(w)} are differentiable in an open set S ⊆ RM .
Then, having conditions (19) and (20) hold on S is equivalent
to the following conditions, respectively,
(cid:107)∇wT sk(w)(cid:107) ≤ λU
(22)
[Hc(w) + H T
(23)
for any w ∈ S, where (cid:107)·(cid:107) denotes the 2-induced norm (largest
singular value) of its matrix argument and
c (w)] ≥ λL · IM
1
2
pk∇wT sk(w)
(24)
Proof: See Appendix B in Part I [2].
Next, we introduce two new assumptions on sk,i(w), which
are needed for the MSE analysis of this Part II. Assumption
6 below has been used before in the stochastic approximation
literature -- see, for example, [36] and Eq. (6.2) in Theorem
6.1 of [37, p.147]. Before we state the assumptions, we first
introduce some useful quantities. Let vi(x) denote the M N×1
global vector that collects the statistical fluctuations in the
stochastic update vectors across all agents:
vi(x) (cid:44) col{s1,i(x1) − s1(x1), . . . , sN,i(xN ) − sN (xN )}(25)
Hc(w) (cid:44) n(cid:88)
k=1
6
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
where we are using the vector x to denote a block vector
i.e., x (cid:44)
consisting of entries xk of size M × 1 each,
col{x1, . . . , xN}. For any xk ∈ Fi−1, 1 ≤ k ≤ N, we
(cid:9)
introduce the covariance matrix:
Rv,i(x) (cid:44) E(cid:8)vi(x)vT
(cid:12)(cid:12)Fi−1
i (x)
(26)
where, again, we are using the notation x to refer to the block
vector x = col{x1, . . . , xN} with stochastic entries of size
M × 1 each. Note that Rv,i(x) generally depends on time i.
This is because the distribution of sk,i(·) given Fi−1 usually
varies with time. The following assumption requires that, in
the limit, this second-order moment of the distribution tends
to a constant value.
Assumption 6 (Second-order moment of gradient noise):
We assume that, in the limit, Rv,i(x) becomes invariant and
tends to a deterministic constant value when evaluated at
x = 1 ⊗ wo with probability one (almost surely):
i→∞Rv,i(1 ⊗ wo) (cid:44) Rv
lim
(27)
Furthermore, in a small neighborhood around 1 ⊗ wo, we
assume that
there exists deterministic constants λv ≥ 0,
rV > 0, and κ ∈ (0, 4] such that for all i ≥ 0:
(cid:107)Rv,i(1 ⊗ wo + δx) − Rv,i(1 ⊗ wo)(cid:107) ≤ λv · (cid:107)δx(cid:107)κ
(28)
for all (cid:107)δx(cid:107) ≤ rV with probability one.
Example 1: We illustrate how Assumption 6 holds au-
tomatically in the context of distributed least-mean-squares
estimation. Suppose each agent k receives a stream of data
samples {uk,i, dk(i)} that are generated by the following
linear model:
dk(i) = uk,iwo + nk(i)
(29)
where the 1 × M regressors {uk,i} are zero mean and
independent over time and space with covariance matrix
Ru,k = E{uT
k,iuk,i} ≥ 0 and the noise sequence {nl(j)}
is also zero mean, white, with variance σ2
n,l, and independent
of the regressors {uk,i} for all l, k, i, j. The objective is to
estimate the M × 1 parameter vector wo by minimizing the
following global cost function
N(cid:88)
J glob(w) =
Jk(w)
where
k=1
Jk(w) = Edk(i) − uk,iw2
(30)
(31)
(32)
In this case, the actual gradient vector when evaluated at an
M × 1 vector xk is given by
sk(xk) = ∇wEdk(i) − uk,ixk2
and it can be replaced by the instantaneous approximation
sk,i(xk) = −2uT
l,i[dl(i) − ul,ixk]
(33)
(Recall from (2) that the stochastic gradient at each agent k is
evaluated at φk,i−1 and in this case xk = φk,i−1.) It follows
that the gradient noise vector vk,i(xk) evaluated at xk, at each
agent k is given by
vk,i(xk) = 2(Ru,k − uT
k,iuk,i)(wo − xk) − 2uT
k,ink(i)
(34)
and it is straightforward to verify that
Rv,i(1 ⊗ wo) = diag{4σ2
n,1Ru,1,··· , 4σ2
n,N Ru,N}
(35)
which is independent of i and, therefore, condition (27) holds
with Rv given by (35). Furthermore, condition (28) is also
satisfied. Indeed, let x = col{x1, . . . , xN} ∈ RM N , and from
(34) we find that
(cid:13)(cid:13)2
Note that
so that
Rv,i(x) = diag{G1, . . . , GN} + Rv,i(1 ⊗ wo)
k,iuk,i)(wo − xk)
k,iuk,i
· (cid:107)wo − xk(cid:107)2
(wo − xk)T (Ru,k − uT
k,iuk,i)T(cid:9)
where each Gk is a function of wo − xk and is given by
Gk (cid:44) 4 · E(cid:8)(Ru,k − uT
(cid:107)Gk(cid:107) ≤ 4 · E(cid:13)(cid:13)Ru,k − uT
(cid:13)(cid:13)Rv,i(x) − Rv,i(1 ⊗ wo)(cid:13)(cid:13)
(cid:8)4 · E(cid:107)Ru,k − uT
(cid:8)4 · E(cid:107)Ru,k − uT
(cid:8)4 · E(cid:107)Ru,k − uT
(cid:8)4 · E(cid:107)Ru,k−uT
1≤k≤N (cid:107)Gk(cid:107)
≤ max
1≤k≤N
≤ max
1≤k≤N
= max
k,iuk,i(cid:107)2 · (cid:107)wo − xk(cid:107)2(cid:9)
k,iuk,i(cid:107)2(cid:9)
k,iuk,i(cid:107)2(cid:9)
k,iuk,i(cid:107)2(cid:9)
N(cid:88)
1≤k≤N (cid:107)wo − xk(cid:107)2
· max
·
· (cid:107)1 ⊗ wo−x(cid:107)2 (36)
In other words, condition (28) holds for the least-mean-squares
estimation case with κ = 2.
≤ max
1≤k≤N
= max
1≤k≤N
(cid:107)wo − xk(cid:107)2
k=1
Assumption 7 (Fourth-order moment of gradient noise):
There exist nonnegative numbers α4 and σ2
any M × 1 random vector w ∈ Fi−1,
(cid:107)vk,i(w)(cid:107)4(cid:12)(cid:12)Fi−1
(cid:9)
E(cid:8)
≤ α4 · (cid:107)w(cid:107)4 + σ4
v4
(37)
v4 such that for
holds with probability one.
This assumption will be used in the analysis for constant
step-size adaptation to arrive at accurate expressions for the
steady-state MSE of the agents. By assuming that the fourth-
order moment of the gradient noise is bounded as in (37),
it becomes possible to derive MSE expressions that can be
shown to be at most O(cid:0)µmin(3/2,1+κ/2)
(cid:1) away from the actual
MSE performance. When the step-sizes are sufficiently small,
the size of the term O(µmin(3/2,1+κ/2)
) is even smaller and, for
all practical purposes, this term is negligible -- see expressions
(39) -- (40) in Theorem 1 (and also (43)).
max
max
Example 2: It turns out that condition (37) is automatically
satisfied in the context of distributed least-mean-squares es-
timation. We continue with the setting of Example 1. From
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
7
k,iuk,i)(wo − w) − uT
· (cid:107)wo − w(cid:107)4
expression (34), we have that for any M × 1 random vector
w ∈ Fi−1,
k,ink(i)(cid:13)(cid:13)4
(a)
≤ 16 × 8
(cid:107)vk,i(w)(cid:107)4 = 16(cid:13)(cid:13)(Ru,k − uT
(cid:16)(cid:13)(cid:13)Ru,k − uT
(cid:13)(cid:13)4
+ (cid:107)uk,i(cid:107)4 · (cid:107)nk(i)(cid:107)4(cid:17)
8(cid:13)(cid:13)Ru,k − uT
(cid:13)(cid:13)4
+ 8(cid:13)(cid:13)Ru,k − uT
(cid:13)(cid:13)4
+ (cid:107)uk,i(cid:107)4 · (cid:107)nk(i)(cid:107)4(cid:17)
≤ 128
k,iuk,i
k,iuk,i
k,iuk,i
(cid:16)
(b)
· (cid:107)w(cid:107)4
· (cid:107)wo(cid:107)4
(38)
where steps (a) and (b) use the inequality (cid:107)x+y(cid:107)4 ≤ 8(cid:107)x(cid:107)4 +
8(cid:107)y(cid:107)4, which can be obtained by applying Jensen's inequality
to the convex function (cid:107)·(cid:107)4. Applying the expectation operator
conditioned on Fi−1, we obtain
(a)
k,iuk,i
(cid:107)vk,i(w)(cid:107)4Fi−1
E(cid:8)
(cid:9)
≤ 1024 · E(cid:110)(cid:13)(cid:13)Ru,k − uT
1024 · E(cid:110)(cid:13)(cid:13)Ru,k − uT
128 · E(cid:110)
= 1024 · E(cid:110)(cid:13)(cid:13)Ru,k − uT
1024 · E(cid:110)(cid:13)(cid:13)Ru,k − uT
(cid:13)(cid:13)4
(cid:13)(cid:13)4
· E(cid:110)
(cid:13)(cid:13)4(cid:111)
(cid:13)(cid:13)4(cid:111)
k,iuk,i
128 · E(cid:107)uk,i(cid:107)4 · E(cid:107)nk(i)(cid:107)4
(cid:107)uk,i(cid:107)4 Fi−1
k,iuk,i
k,iuk,i
(cid:111)
(b)
(cid:44) α4 · (cid:107)w(cid:107)4 + σ4
v4
· (cid:107)w(cid:107)4+
(cid:111)
· (cid:107)wo(cid:107)4+
(cid:111)
(cid:111)
Fi−1
Fi−1
(cid:107)nk(i)(cid:107)4 Fi−1
· (cid:107)w(cid:107)4+
· (cid:107)wo(cid:107)4+
where step (a) uses the fact that w ∈ Fi−1 and is thus
determined given Fi−1, and step (b) uses the fact that uk,i
and vk,i(i) are independent of Fi−1.
IV. PERFORMANCE OF MULTI-AGENT LEARNING
STRATEGY
A. Main Results
In this section, we are interested in evaluating E(cid:107) wk,i(cid:107)2
Σ as
i → ∞ for arbitrary positive semi-definite weighting matrices
Σ. The main result is summarized in the following theorem.
Theorem 1 (Steady-state performance): When
Assumptions 1 -- 7 hold and the step-sizes are sufficiently
small so that the distributed strategy (1) -- (3) is mean-square
stable2,
the weighted mean-square-error of (1) -- (3) (which
includes diffusion and consensus algorithms as special cases)
satisfies
lim sup
i→∞
lim inf
i→∞
E(cid:107) wk,i(cid:107)2
E(cid:107) wk,i(cid:107)2
Σ ≤ µmax · Tr(cid:8)X(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
+ O(cid:0)µmin(3/2,1+κ/2)
Σ ≥ µmax · Tr(cid:8)X(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
− O(cid:0)µmin(3/2,1+κ/2)
(cid:1)
(cid:1)
(40)
(39)
max
max
2The explicit condition for mean-square stability is given by (129) in Part
I [2].
(cid:90) ∞
Fig. 3. Decomposition of the error quantity wk,i (best viewed in color).
The error quantity wk,i (solid red line) can be decomposed into three terms
(the solid back lines): (i) the offset of wk,i from the centroid of {wk,i},
denoted by (uL,k⊗IM )we,i, (ii) the offset of the centroid from the reference
recursion (8), denoted by wc,i, and (iii) the error between the reference
recursion and the optimal solution wo, denoted by wc,i.
where Σ is any positive semi-definite weighting matrix, and X
is the unique positive semi-definite solution to the following
Lyapunov equation:
H T
c X + XHc = Σ
(41)
where Hc was defined earlier in (12). The unique solution of
(41) can be represented by the integral expression [38, p.769]:
X =
0
−H T
e
c t · Σ · e
−Hctdt
(42)
Moreover, if Σ is strictly positive-definite, then X is also
strictly positive-definite.
Proof: The argument is nontrivial and involves several steps.
The details are provided in Appendix A. We briefly describe
the main steps of the proof here:
1) By following the network transformation introduced in
Part I [2], we decompose the error vector wk,i into three
terms, as illustrated in Fig. 3: (i) (uL,k ⊗ IM )we,i, the
offset of wk,i from the centroid of {wk,i}, defined as
N(cid:88)
wc,i =
θkwk,i
k=1
where θk is the kth entry of the Perron vector defined
in (7), (ii) wc,i, the offset of the centroid from the
reference recursion (8), and (iii) wc,i, the error between
the reference recursion and the optimal solution wo.
2) Only the second term, wk,i, contributes to the steady-
state MSE, which we already know from (13) (see also
(146) in Part I [2]) that it is O(µmax). For the other
two terms, wc,i converges to zero and (uL,k ⊗ IM )we,i
converges to a higher-order term in µmax. In Sections
A and B of Appendix A, we make this argument rig-
orous by deriving the gap between the error covariance
matrices of wk,i and wc,i and showing that it is indeed
a higher-order term.
3) Next, we show that the recursion for wc,i can be viewed
as a perturbed version of a linear dynamic system driven
by the gradient noise term. In Section C of Appendix
A, we bound the gap between these two recursions and
show that it is also a higher-order term. This would
Converges to 0 at agent k Centroid of Reference {wk,i}wowk,i¯wc,iwc,iwk,iwc,iwc,i(uL,k⌦IM)we,iwk,iO(µmax)Converges to O(µ2max)wk,i8
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
· Tr(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
+ O(cid:0)µmin(3/2,1+κ/2)
µmax
(cid:1)
4
max
=
(46)
require us to bound the fourth-order moments of the
error quantity wk,i, which are derived in Appendices
B -- E.
4) Then, in Section D of Appendix A, we examine the
covariance matrix of the linear dynamic model and find
a closed-form expression for it.
5) Finally, in Section E of Appendix A, we combine all
results together to obtain the closed-form expression for
the steady-state MSE of the network.
Strictly speaking, the limit of E(cid:107) wk,i(cid:107)2
Σ may not exist as
it requires the lim sup and the lim inf of E(cid:107) wk,i(cid:107)2
Σ to be
equal to each other. However, note from (39) and (40) that
the first-order terms of µmax in both lim sup and lim inf
expressions are the same. When the step-size µmax is small,
the lim sup and the lim inf bounds will be dominated by this
same first-order term, and the steady-state MSE will be tightly
sandwiched between (39) and (40).3 For this reason, with
some slight abuse in notation, we will use the traditional limit
notation for simplicity of presentation and will write instead:
Σ = µmax·Tr(cid:8)X(pT ⊗IM ) · Rv · (p⊗IM )(cid:9)
+O(cid:0)µmin(3/2,1+κ/2)
E(cid:107) wk,i(cid:107)2
lim
i→∞
(43)
(cid:1)
max
Remark: Note from (43) that the steady-state MSE consists of
two terms: a first-order term, and a higher-order term. We will
show in Sec. V that the first-order term is the same as that of
the centralized MSE.
B. Useful Special Cases
Example 3: (Distributed stochastic gradient-descent: Gen-
eral case) When stochastic gradients are used to define the
update directions sk,i(·) in (1) -- (3),
then we can simplify
the mean-square-error expression (43) as follows. We first
substitute sk(w) = ∇wJk(w) into (12) to obtain
N(cid:88)
k=1
Hc =
pk∇2
wJk(wo)
Now the matrix Hc is the weighted sum of the Hessian
matrices of the individual costs {Jk(w)} and is therefore
symmetric. Then, the Lyapunov equation (41) becomes
HcX + XHc = Σ
(44)
We have simple solutions to (44) for the following two choices
of Σ:
1) When Σ = IM , we have X = 1
2 H−1
c
and
lim
i→∞
· Tr(cid:8)H
E(cid:107) wk,i(cid:107)2
+ O(cid:0)µmin(3/2,1+κ/2)
(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
(cid:1)
µmax
−1
c
=
2
(45)
max
2) When Σ = 1
2 Hc, we have X = 1
4 IM and
lim
i→∞
E(cid:107) wk,i(cid:107)2
Hc
2
3Recall that we always have lim inf
i→∞
E(cid:107) wk,i(cid:107)2
Σ ≤ lim sup
i→∞
E(cid:107) wk,i(cid:107)2
Σ.
Example 4: (Distributed stochastic gradient descent: Un-
correlated noise) In the special case that the gradient noises
at the different agents are uncorrelated with each other, then
Rv is block diagonal and we write it as
Rv = diag{Rv,1, . . . , Rv,N}
where Rv,k is the M × M covariance matrix of the gradient
noise at agent k. Then, the MSE expression (45) at each agent
k can be written as
lim
i→∞
=
(cid:32) N(cid:88)
E(cid:107) wk,i(cid:107)2
+O(cid:0)µmin(3/2,1+κ/2)
· Tr
µmax
k=1
2
max
(cid:1)
pk∇2
(cid:33)−1
(cid:32) N(cid:88)
k=1
·
p2
kRv,k
(cid:33)
wJk(wo)
and expression (46) for the weighted MSE becomes
lim
i→∞
E(cid:107) wk,i(cid:107)2
Hc
2
=
(cid:41)
(cid:40) N(cid:88)
+ O(cid:0)µmin(3/2,1+κ/2)
· Tr
µmax
k=1
4
max
(cid:1)
p2
kRv,k
N(cid:88)
k=1
V. PERFORMANCE OF CENTRALIZED STOCHASTIC
APPROXIMATION SOLUTION
We conclude from (43) that the weighted mean-square-error
at each node k will be the same across all agents in the network
for small step-sizes. This is an important "equalization" effect.
Moreover, as we now verify, the performance level given by
(43) is close to the performance of a centralized strategy that
collects all the data from the agents and processes them using
the following recursion:
wcent,i = wcent,i−1 − µmax
pk sk,i(wcent,i−1)
(47)
To establish this fact, we first note that the performance of the
above centralized strategy can be analyzed in the same manner
as the distributed strategy. Indeed, let wcent,i (cid:44) wcent,i − ¯wc,i
denote the discrepancy between the above centralized recur-
sion and reference recursion (8). Then, we obtain from (8) and
(47) that
wcent,i = Tc(wcent,i−1) − Tc( ¯wc,i−1)
− µmax · (pT ⊗ IM )vi(wcent,i−1)
(48)
where the operator Tc(w) is defined as the following mapping
from RM to RM :
Tc(w) (cid:44) w − µmax
pksk(w)
N(cid:88)
k=1
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
9
N(cid:88)
interested in minimizing some aggregate cost function of the
form (16):
J glob(w) =
Jk(w)
(55)
k=1
Based on whether the individual costs {Jk(w)} share a com-
mon minimizer or not, we can classify problems of the form
(55) into two broad categories.
A. Category I: Distributed Learning
In this case, the data streams {xk,i} are assumed to be
generated by (possibly different) distributions that nevertheless
depend on the same parameter vector wo ∈ RM . The objective
is then to estimate this common parameter wo in a distributed
manner. To do so, we first need to associate with each agent k
a cost function Jk(w) that measures how well some arbitrary
parameter w approximates wo. The cost Jk(w) should be such
that wo is one of its minimizers. More formally, let W o
k denote
the set of vectors that minimize the selected Jk(w), then it is
expected that
(cid:111)
(cid:44)(cid:110)
(51)
wo ∈ W o
k
w : arg min
Jk(w)
w
(56)
for k = 1, . . . , N. Since J glob(w) is assumed to be strongly
k should contain
convex, then the intersection of the sets W o
the single element wo:
Comparing (48) with expression (103) from Part I [2]
peated below):
wc,i = Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM ) [zi−1 +vi]
(49)
(re-
we note that these two recursions take similar forms except
for an additional perturbation term zi−1 in (49). Therefore,
following the same line of transient analysis as in Part I [2]
and steady-state analysis as in the proof of Theorem 1 stated
earlier, we can conclude that, in the small step-size regime, the
transient behavior of the centralized strategy (47) is close to
the reference recursion (8), and the steady-state performance
is again given by (43).
Theorem 2 (Centralized performance): Suppose Assump-
tions 2 -- 7 hold and suppose the step-size parameter µmax in
the centralized recursion (47) satisfies the following condition
(cid:107)p(cid:107)2
1 ·
U
λL
(cid:16) λ2
+ O(cid:0)(µmax)
2 + 2α
(cid:17)
2(M−1)(cid:1)
1
Then, the MSE term E(cid:107) wcent,i(cid:107)2 converges at the rate of
r =(cid:2)ρ(IM − µmaxHc)(cid:3)2
where is an arbitrarily small positive number. Furthermore,
in the small step-size regime, the steady-state MSE of (47)
satisfies
0 < µmax <
(50)
lim sup
i→∞
lim inf
i→∞
E(cid:107) wcent,i(cid:107)2
E(cid:107) wcent,i(cid:107)2
Σ ≤ µmax·Tr(cid:8)X(pT ⊗IM ) · Rv · (p⊗IM )(cid:9)
+O(cid:0)µmin(3/2,1+κ/2)
Σ ≥ µmax·Tr(cid:8)X(pT ⊗IM ) · Rv · (p⊗IM )(cid:9)
−O(cid:0)µmin(3/2,1+κ/2)
(cid:1)
(cid:1)
(53)
(52)
max
max
Remark: Similar to our explanation following (39) -- (40), ex-
pressions (52) -- (53) also mean that, for small step-sizes, the
steady-state MSE of the centralized strategy will be tightly
sandwiched between two almost identical bounds. Therefore,
we will again use the traditional limit notation for the central-
ized steady-state MSE for simplicity, and will write instead:
Σ = µmax·Tr(cid:8)X(pT ⊗IM ) · Rv · (p⊗IM )(cid:9)
+O(cid:0)µmin(3/2,1+κ/2)
E(cid:107) wcent,i(cid:107)2
lim
i→∞
(54)
(cid:1)
max
which is the same as (43) up to the first-order of µmax.
VI. BENEFITS OF COOPERATION
In this section, we illustrate the implications of the main
results of this work in the context of distributed learning and
distributed optimization. Consider a network of N connected
agents, where each agent k receives a stream of data {xk,i}
arising from some underlying distribution. The networked
multi-agent system would like to extract from the distributed
data some useful information about the underlying process.
To measure the quality of the inference task, an individual
cost function Jk(w) is associated with each agent k, where w
denotes an M × 1 parameter vector. The agents are generally
N(cid:92)
k=1
wo ∈ W o =
W o
k
(57)
The main motivation for cooperation in this case is that the
data collected at each agent k may not be sufficient to uniquely
identify wo since wo is not necessarily the unique element
in W o
k; this happens, for example, when the individual costs
Jk(w) are not strictly convex. However, once the individual
costs are aggregated into (55) and the aggregate function is
strongly convex, then wo is the unique element in W o. In
this way, the cooperative minimization of J glob(w) allows the
agents to estimate wo.
1) Working under Partial Observation: Under the scenario
described by (57), the solution of (5) agrees with the unique
minimizer wo for J glob(w) given by (55) regardless of the
{pk} and, therefore, regardless of the combination policy A.
Therefore, the results from Sec. II-B (see also Sec. IV of Part
I [2]) show that the iterate wk,i at each agent k converges to
this unique wo at a centralized rate and the results from Sec.
IV of this Part II show that this iterate achieves the centralized
steady-state MSE performance. Note that Assumption 4 can
be satisfied without requiring each Jk(w) to be strongly
convex. Instead, we only require J glob(w) to be strongly
convex. In other words, we do not need each agent to have
complete information about wo; we only need the network to
have enough information to determine wo uniquely. Although
the individual agents in this case have partial information
about wo, the distributed strategies (1) -- (3) enable them to
attain the same performance level as a centralized solution.
The following example illustrates the idea in the context of
distributed least-mean-squares estimation over networks.
10
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
N(cid:88)
Example 5: Consider Example 1 again. When the covari-
ance matrix Ru,k (cid:44) E[uT
k,iuk,i] is rank deficient, then Jk(w)
in (31) would not be strongly convex and there would be
infinitely many minimizers to Jk(w). In this case, the informa-
tion provided to agent k via (29) is not sufficient to determine
wo uniquely. However, if the global cost function is strongly
convex, which can be verified to be equivalent to requiring:
pkRu,k > λLIM > 0
(58)
k=1
then the information collected over the entire network is rich
enough to learn the unique wo. As long as (58) holds for
one set of positive {pk}, it will hold for all other {pk}. A
"network observability" condition similar to (58) was used in
[11] to characterize the sufficiency of information over the
network in the context of distributed estimation over linear
models albeit with diminishing step-sizes.
2) Optimizing the MSE Performance: Since the distributed
strategies (1) -- (3) converge to the same unique minimizer wo
of (55) for any set of {pk}, we can then consider selecting
the {pk} to optimize the MSE performance. Consider the case
where Hk ≡ H and µk ≡ µ and assume the gradient noises
vk,i(w) are asymptotically uncorrelated across the agents so
that Rv from (27) is block diagonal with entries denoted by:
(59)
Rv = diag{Rv,1, . . . , Rv,N}
Then, we have βk = 1, pk = θk and
Hc = H = ∇2
wJ1(wo) = ··· = ∇2
wJN (wo)
in which case expression (45) becomes
(60)
(cid:1)
µmax
N(cid:88)
kTr(cid:0)H
+ O(cid:0)µmin(3/2,1+κ/2)
θ2
k=1
2
·
(cid:1)
−1Rv,k
lim
i→∞
E(cid:107) wk,i(cid:107)2 =
(61)
The optimal positive coefficients {θk} that minimize (61)
max
k=1 θk = 1 are given by
subject to(cid:80)N
N(cid:88)
θo
k =
−1
−1Rv,k)]
−1Rv,(cid:96))]
−1
[Tr(H
[Tr(H
(cid:96)=1
and, substituting into (61), the optimal MSE is then given by
,
k = 1, . . . , N
(62)
(cid:35)−1
+ O(cid:0)µmin(3/2,1+κ/2)
max
(cid:1)
MSEopt =
µmax
2 ·
1
Tr(H−1Rv,(cid:96))
(cid:34) N(cid:88)
(cid:96)=1
N} can be
The optimal Perron-eigenvector θo = col{θo
implemented by selecting the combination policy A as the
following Hasting's rule [19], [39], [40]:
1, . . . , θo
ao
(cid:96)k =
k)−1
(θo
k)−1,N(cid:96)·(θo
(cid:88)
max{Nk·(θo
ao
mk,
1 −
m∈Nk\{k}
(a)
=
max(cid:8)
Nk·Tr(H−1Rv,k), N(cid:96)·Tr(H−1Rv,(cid:96))(cid:9) ,
Tr(H−1Rv,k)
(cid:88)
1 −
m∈Nk\{k}
(cid:96)∈Nk\{k}
ao
mk,
(cid:96) = k
(63)
where Nk denotes the cardinality of the set Nk, and step
(a) substitutes (62). From (63), we note that the above com-
bination matrix can be constructed in a decentralized manner,
where each node only requires information from its own
neighbors. In practice, the noise covariance matrices {Rv,(cid:96)}
need to be estimated from the local data and an adaptive
estimation scheme is proposed in [19] to address this issue.
3) Matching Performance across Topologies: Note that the
steady-state mean-square error depends on the vector p, which
is determined by the Perron eigenvector θ of the matrix A. The
above result implies that, as long as the network is strongly
connected, i.e., Assumption 1 holds, a left-stochastic matrix
A can always be constructed to have any desired Perron
eigenvector θ with positive entries according to (63). Now,
starting from any collection of N agents, there exists a finite
number of topologies that can link these agents together. For
each possible topology, there are infinitely many combination
policies that can be used to train the network. One important
conclusion that follows from the above results is that regard-
less of the topology, there always exists a choice for A such
that the performance of all topologies are identical to each
other to first-order in µmax. In other words, no matter how
the agents are connected to each other, there is always a way
to select the combination weights such that the performance of
the network is invariant to the topology. This also means that,
for any connected topology, there is always a way to select the
combination weights such that the performance of the network
matches that of the centralized solution.
Example 6: We illustrate the result using the diffusion least-
mean-square estimation context discussed earlier in Example
1. Consider a network of 30 agents (N = 30), where each
agent has access to a stream of data samples {uk,i, dk(i)}
that are generated by the linear model (29). As assumed in
Example 1, the 1 × M regressors {uk,i} are zero mean and
independent over time and space with covariance matrix Ru,k,
and the noise sequence {nl(j)} is also zero mean, white,
n,l, and independent of the regressors {uk,i}
with variance σ2
for all l, k, i, j. In the simulation here, we consider the case
where M = 10, Ru,k = IM . In diffusion LMS estimation,
each agent k uses (31) as its cost function Jk(w) and (33)
as the stochastic gradient vector sk,i(·). Therefore, each agent
k adopts the following recursion to adaptively estimate the
model parameter wo, which is the minimizer of the global
cost function (16):
(cid:96) )−1}
, (cid:96)∈Nk\{k}
(cid:96) = k
wk,i =
alkψl,i
ψk,i = wk,i + 2µkuT
k,i[dk(i) − uk,iwk,i−1]
(cid:88)
l∈Nk
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
11
(a)
(c)
(b)
(d)
Fig. 4. Comparing the performance of a 30-node diffusion LMS network with that of the centralized strategy (47), where M = 10, µk = 0.0005 for all
agents, and Hasting's rule (63) is used as the combination policy. The result is obtained by averaging over 1000 Monte Carlo experiments. (a) A randomly
generated topology. (b) The noise profile across the network, and the steady-state MSE of diffusion LMS, centralized strategy, and the theoretical value (the
first-order term in (43)). (c) The learning curves for different agents in the diffusion LMS network, the centralized strategy, and the theoretical steady-state
MSE (the first-order term in (43)). (d) The centralized strategy, the steady-state MSE of diffusion strategy at all agents, and the theoretical value (the first-order
term in (43)) for different values of step-sizes.
We randomly generate a topology as shown in Fig. 4 (a) and
noise variance profile across agents as shown in Fig. 4 (b).
We choose µk ≡ µ = 0.0005 to be the step-size for all
agents and Hasting's rule (63) as the combination policy. In the
simulation, we assume the noise variances are known to the
agents. Alternatively, they can also be estimated in an adaptive
manner using approaches proposed in [19]. The results are
obtained by averaging over 1000 Monte Carlo experiments.
In Fig 4(b), we also show the steady-state MSE of all agents,
respectively, and compare them to the theoretical value (the
first-order term in (43)) and to the following centralized LMS
strategy:
N(cid:88)
k=1
wcent,i = wcent,i−1 + 2µ
k,i[dk(i) − uk,iwcent,i−1]
where pk = θo
k is given by (62). Fig. 4(b) illustrates the
equalization effect over the network; each agent in the network
pk · uT
achieves almost the same steady-state MSE that is close to the
centralized strategy although the noise variances in the data
are different across the agents. Furthermore, In Fig. 4 (c), we
illustrate the learning curves of all agents, and compare them
to the theoretical value and the centralized LMS strategy. We
observe from Fig. 4 (c) that the learning curves of all agents are
close to each other and to the centralized strategy. Finally, we
show in Fig. 4 the steady-state MSE of the diffusion strategy
at all agents for different values of the step-sizes, and compare
them to the MSE of the centralized strategy and against the
theoretical values (the first-order term in (43)). It is seen in the
figure that, for small step-sizes, the steady-state MSE values at
different agents approach that of the centralized strategy and
the first-order term in (43) since the higher-order term in (43)
decays faster than the first-order term.
Network topology 051015202530051015Index of the agentsNoise variance (dB)051015202530−20020Index of the agentsSteady−state MSE (dB) Diffusion strategyCentralized strategyTheory00.511.52x 104−30−20−100102030Number of iterationsMean square error (dB) Centralized strategySteady−state MSE (theory)Diffusion strategy1.31.41.51.61.7x 104−33−32.5−32−31.5−31−30.5−30−29.5−29−28.5 10−410−310−210−1−40−35−30−25−20−15−10−50Step−sizesSteady−state MSE (dB) Centralized strategySteady−state MSE (theory)Diffusion Strategy12
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
B. Category II: Distributed Optimization
In this case, we include situations where the individual costs
Jk(w) do not have a common minimizer, i.e., W o = ∅. The
optimization problem should then be viewed as one of solving
a multi-objective minimization problem
w {J1(w), . . . , JN (w)}
min
(64)
where Jk(w) is an individual convex cost associated with each
agent k. A vector wo is said to be a Pareto optimal solution
to (64) if there does not exist another vector w that is able to
improve (i.e., reduce) any individual cost without degrading
(increasing) some of the other costs. Pareto optimal solutions
are not unique. The question we would like to address now
is the following. Given individual costs {Jk(w)} and a com-
bination policy A, what is the limit point of the distributed
strategies (1) -- (3)? From Sec. II-B (see also Theorem 4 in Part
I [2]), the distributed strategy (1) -- (3) converges to the limit
point wo defined as the unique solution to (5). Substituting
sk(w) = ∇wJk(w) into (5), we obtain
pk∇wJk(wo) = 0
N(cid:88)
In other words, wo is the minimizer of the following global
cost function:
J glob(w) =
pkJk(w)
(65)
k=1
It is shown in [28, pp.178 -- 180] that the minimizer of (65) is
a Pareto-optimal solution for the multi-objective optimization
problem (64). And different choices for the vector p lead to
different Pareto-optimal points on the tradeoff curve.
Now, a useful question to consider is the reverse direction.
Suppose, we are given a set of {pk} (instead of A) and we
want the distributed strategy (1) -- (3) to converge to the limit
point wo that is the solution of:
N(cid:88)
k=1
N(cid:88)
k=1
VII. CONCLUSION
Along with Part I [2], this work examined in some detail
the mean-square performance, convergence, and stability of
distributed strategies for adaptation and learning over graphs
under constant step-size update rules. Keeping the step-size
fixed allows the network to track drifts in the underlying data
models, their statistical distributions, and even drifts in the
utility functions. Earlier work [41] has shown that constant
adaptation regimes endow networks with tracking abilities
and derived results that quantify how the performance of
adaptive networks is affected by the level of non-stationarity
in the data. Similar conclusions extend to the general scenario
studied in Parts I and II of the current work, which is the
reason why step-sizes have been set
to a constant value
throughout our treatment. When this is done, the dynamics
of the learning process is enriched in a nontrivial manner.
This is because the effect of gradient noise does not die out
anymore with time (in comparison, when diminishing step-
sizes are used, gradient noise is annihilated by the decaying
step-sizes). And since agents are coupled through their inter-
actions over the network, it follows that their gradient noises
will continually influence the performance of their neighbors.
As a result, the network mean-square performance does not
tend to zero anymore. Instead, it approaches a steady-state
level. One of the main objectives of this Part II has been
to quantify this level and to show explicitly how its value
is affected by three parameters: the network topology, the
gradient noise, and the data characteristics. As the analysis
and the detailed derivations in the appendices of the current
manuscript show, this is a formidable task to pursue due to
the coupling among the agents. Nevertheless, under certain
conditions that are generally weaker than similar conditions
used in related contexts in the literature, we were able to
derive accurate expressions for the network MSE performance
and its convergence rate. For example, the MSE expression
we derived is accurate in the first order term of µmax. Once
an MSE expression has been derived, we were then able to
optimize it over the network topology (for the important case
of uniform Hessian matrices across the network, as is common
for example in machine learning [42] and mean-square-error
estimation problems [35]). We were able to show that arbitrary
connected topologies for the same set of agents can always
be made to perform similarly. We were also able to show
that arbitrary connected topologies for the same set of agents
can be made to match the performance of a fully connected
network. These are useful insights and they follow from the
analytical results derived in this work.
pk∇wJk(wo) = 0
(66)
Note that once the topology of the network is given, the
positions of the nonzero entries in the matrix A are known
and we are free to select the values of these nonzero entries.
One possibility is to choose the same step-size for all agents
(i.e., µk ≡ µ), and to select the nonzero entries of A such that
its Perron vector θ equals this desired p. This construction can
be achieved by using the following Hasting's rule [19], [40]:
a(cid:96)k =
max(cid:8)
1 −
(cid:88)
−1
p
k
−1
Nk · p
k ,Nl · p
amk,
m∈Nk\{k}
(cid:9) ,
−1
l
l ∈ Nk\{k}
l = k
(67)
APPENDIX A
PROOF OF THEOREM 1
That is, as long as we substitute the desired set of {pk} into
(67) and use the obtained {a(cid:96)k} together with µk ≡ µ, the
distributed strategy will converge to the wo in (66) with the
desired {pk}.
The argument
labeled steps A
through E, and relies also on intermediate results that are
proven in this appendix. We start with step A.
involves several steps,
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
13
where wk,i (cid:44) wo − wk,i. Note that if we are able to evaluate
Πi as i → ∞, then we can obtain the steady-state weighted
mean-square-error for any individual agent via the following
relation:4
A. Relating the weighted MSE to the steady-state error co-
variance matrix Πi
Let Πi (cid:44) E(cid:8) wi wT
i
the global error vector
(cid:9) denote the error covariance matrix of
wi (cid:44) col{ w1,i, . . . , wN,i}
Σ = E(cid:110)
= E(cid:8) wT
= E(cid:0)Tr(cid:8) wi wT
= Tr(cid:8)E(cid:2) wi wT
col{ w1,i, . . . , wN,i}T
(cid:111)
· diag{0, . . . , Σ, . . . , 0}
(cid:9)
· col{ w1,i, . . . , wN,i}
i (Ekk ⊗ Σ)(cid:9)(cid:1)
(cid:3) (Ekk ⊗ Σ)(cid:9)
i (Ekk ⊗ Σ) wi
i
E(cid:107) wk,i(cid:107)2
= Tr{Πi(Ekk ⊗ Σ)}
(68)
where Ekk is an M × M matrix with (k, k)-entry equal to
one and all other entries equal to zero. We could proceed
with the analysis by deriving a recursion of wi from (1) -- (3)
and examining the corresponding error covariance matrix, Πi.
However, we will take an alternative approach here by calling
upon the following decomposition of the error quantity wk,i
from Part I [2] (see Eq. (74) therein):
(69)
wk,i = wc,i − wc,i − (uL,k ⊗ IM )we,i
where wc,i (cid:44) wo − wc,i denotes the error of the reference
recursion (8) relative to wo, the vectors wc,i and we,i are the
two transformed quantities introduced in Eqs. (77) and (67) in
Part I [2], and uL,k is the kth row of the matrix UL which is
a sub-matrix of the transform matrix introduced in Eq. (61) in
Part I [2]. In particular, wc,i represents the error of the centroid
of the iterates {wk,i} relative to the reference recursion:
wc,i (cid:44) wc,i − ¯wc,i
wc,i (cid:44) N(cid:88)
where the centroid wc,i is defined as
θkwk,i
k=1
and (uL,k ⊗ IM )we,i represents the error of the iterate wk,i at
agent k relative to the centroid wc,i. The details and derivation
of the decomposition (69) appear in Sec. V-A of Part I [2].
Relation (69) can also be written in the following equivalent
global form:
wi = 1 ⊗ wc,i − 1 ⊗ wc,i − (UL ⊗ IM )we,i
(70)
The major motivation to use (70) in our steady-state analysis is
that the convergence results and non-asymptotic MSE bounds
already derived in Part I [2] for each term in (70) will reveal
that some quantities will either disappear or become higher
4More formally, the limit of (68) may not exist. However, as we proceed
Σ are equal to each other
to show, the lim sup and the lim inf of E(cid:107) wk,i(cid:107)2
up to first-order in µmax.
(cid:13)(cid:13) ¯P1[AT
1 UL](cid:13)(cid:13)2
order terms in steady-state for small step-sizes. In particular,
we are going to show that the mean-square-error of wi is
dominated by the mean-square-error of wc,i. Therefore, it will
suffice to examine the mean-square-error of wc,i. We start by
recalling the related non-asymptotic and asymptotic bounds
from Part I [2]. We derived in expression (103) from Part I
[2] the following relation for wc,i:
wc,i = Tc(wc,i−1) − Tc( ¯wc,i−1)
− µmax · (pT ⊗ IM ) [zi−1 + vi]
where
Tc(x) (cid:44) x − µmax
N(cid:88)
k=1
pksk(x)
vi (cid:44) si (φi−1)−s (φi−1)
zi−1 (cid:44) s (φi−1)−s(1 ⊗ wc,i−1)
(71)
(72)
(73)
(74)
The two perturbation terms vi(φi−1) and zi−1 were further
shown to satisfy the following bounds in Appendix I in Part
I [2].
P [zi−1] (cid:22) λ2
U ·
P [s(1⊗wc,i−1)] (cid:22) 3λ2
U ·P [ wc,i−1]·1+3λ2
E{P [vi]Fi−1} (cid:22) 4α · 1 · P [ wc,i−1]
∞·11T ·P [we,i−1]
(75)
U(cid:107) wc,0(cid:107)2 · 1+3go
(76)
+ 4α · (cid:107) ¯P [AT
1 UL](cid:107)2∞ · 11T P [we,i−1]
+(cid:2)4α · ((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
+(cid:2)4α · ((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
· 1 (77)
1 UL](cid:107)2∞ · 11T EP [we,i−1]
· 1 (78)
where P [ wc,i−1] = (cid:107) wc,i−1(cid:107)2, and go (cid:44) P [s(1 ⊗ wo)]. We
EP [vi] (cid:22) 4α · 1 · EP [ wc,i−1]
further showed in Eqs. (130) and (131) from Part I [2] that
+ 4α · (cid:107) ¯P [AT
(cid:3)
(cid:3)
v
v
lim sup
i→∞
lim sup
i→∞
E(cid:107) wc,i(cid:107)2 ≤ O(µmax)
E(cid:107)we,i(cid:107)2 ≤ O(µ2
max)
(79)
(80)
B. Approximation of Πi by 11T ⊗ Πc,i
In order to examine Πi, which is needed for the limiting
value of (68), we first establish the result (85) further ahead
using (70): in steady-state, the error covariance matrix of
wi (i.e., Πi) is equal to the error covaraince matrix of the
component 1⊗ wc,i to the first order in µmax. Indeed, let Πc,i
denote the covariance matrix of wc,i, i.e., Πc,i (cid:44) E{ wc,i wT
c,i}.
Πi = E(cid:8) wi wT
By (70), we have
+ E(cid:8)[(UL ⊗ IM )we,i][(UL ⊗ IM )we,i]T(cid:9)
(cid:1)T
− (1 ⊗ wc,i)(cid:0)1 ⊗ E wc,i + (UL ⊗ IM )Ewe,i
(cid:1)(1 ⊗ wc,i)T
(cid:0)1 ⊗ E wc,i + (UL ⊗ IM )Ewe,i
+ E(cid:8)(1 ⊗ wc,i)[(UL ⊗ IM )we,i]T(cid:9)
(cid:9)
= 11T ⊗ [ wc,i wT
c,i] + 11T ⊗ Πc,i
−
i
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
where
= [IM − µmaxHc] wc,i−1 − µmax · (pT ⊗ IM )vi
− µmax · (pT ⊗ IM )zi−1
− µmax
(cid:0)sc(wc,i−1) − sc( ¯wc,i−1) − Hc wc,i−1
Hc (cid:44) N(cid:88)
sc(w) (cid:44) N(cid:88)
pk∇wT sk(wo)
pksk(w)
k=1
(cid:1) (86)
(87)
(88)
k=1
Next, we show that the mean-square-error between wc,i gener-
ated by (86) and the wa,i generated by the following auxiliary
recursion is small for small step-sizes:
wa,i = [IM − µmaxHc] wa,i−1 − µmax · (pT ⊗ IM )vi
Indeed, subtracting (89) from (86) leads to
wc,i − wa,i = [IM − µmaxHc] ( wc,i−1 − wa,i−1)
(cid:0)sc(wc,i−1) − sc( ¯wc,i−1) − Hc wc,i−1
(90)
We recall the definition of the scalar factor γc from Eq. (166)
in Part I [2]:
− µmax
− µmax · (pT ⊗ IM )zi−1
(89)
(cid:1)
γc (cid:44) 1 − µmaxλL +
1
2
µ2
max(cid:107)p(cid:107)2
1λ2
U
(91)
Now evaluating the squared Euclidean norm of both sides of
(90), we get
(cid:107) wc,i − wa,i(cid:107)2
14
(b)
(a)
≤
+
+ 2(cid:107)1 ⊗ wc,i(cid:107) ·
+ 2
+ E(cid:8)[(UL ⊗ IM )we,i](1 ⊗ wc,i)T(cid:9)
so that(cid:13)(cid:13)Πi − 11T ⊗ Πc,i
(cid:13)(cid:13)
(cid:13)(cid:13)11T ⊗ [ wc,i wT
c,i](cid:13)(cid:13)
(cid:13)(cid:13)E(cid:8)[(UL ⊗ IM )we,i][(UL ⊗ IM )we,i]T(cid:9)(cid:13)(cid:13)
(cid:13)(cid:13)1 ⊗ E wc,i + (UL ⊗ IM )Ewe,i
(cid:13)(cid:13)E(cid:8)(1 ⊗ wc,i)[(UL ⊗ IM )we,i]T(cid:9)(cid:13)(cid:13)
(cid:13)(cid:13)11T ⊗ [ wc,i wT
c,i](cid:13)(cid:13) + E(cid:107)(UL ⊗ IM )we,i](cid:107)2
(cid:13)(cid:13)1 ⊗ E wc,i + (UL ⊗ IM )Ewe,i
+ 2(cid:13)(cid:13)E(cid:8)(1 ⊗ wc,i)[(UL ⊗ IM )we,i]T(cid:9)(cid:13)(cid:13)
(cid:13)(cid:13)Πi − 11T ⊗ Πc,i
(cid:8)2(cid:13)(cid:13)E(cid:8)(1 ⊗ wc,i)[(UL ⊗ IM )we,i]T(cid:9)(cid:13)(cid:13)(cid:9) (81)
where step (a) uses triangular inequality, and step (b) applies
Jensen's inequality (cid:107)E[·](cid:107) ≤ E(cid:107)·(cid:107) to the convex function (cid:107)·(cid:107)
and the inequality (cid:107)xyT(cid:107) ≤ (cid:107)x(cid:107)·(cid:107)y(cid:107). Taking lim sup of both
sides as i → ∞, we obtain
lim sup
i→∞
≤ lim sup
i→∞
(cid:13)(cid:13)
E(cid:107)(UL ⊗ IM )we,i](cid:107)2
+ 2(cid:107)1 ⊗ wc,i(cid:107) ·
+ lim sup
i→∞
(cid:13)(cid:13)
(cid:13)(cid:13)
≤
since wc,i → 0 as i → ∞ according to Theorem 2 in Part I
[2]. We now bound the two terms on the right-hand side of
(81) using (79) -- (80) and show that they are higher order terms
of µmax. By (80), the first term on the right-hand side of (81)
is O(µ2
max) because
lim sup
i→∞
≤ lim sup
E(cid:107)(UL ⊗ IM )we,i](cid:107)2
i→∞ (cid:107)UL ⊗ IM(cid:107)2 · E(cid:107)we,i(cid:107)2 ≤ O(µ2
max)
(82)
Moreover, for any random variables x and y, we have
E{xy}2 ≤ E{x2} · E{y2}. Applying this result to the last
term in (81) we have
≤
(cid:13)(cid:13)E(cid:2)(1 ⊗ wc,i)[(UL ⊗ IM )we,i]T(cid:3)(cid:13)(cid:13)
(cid:113)E(cid:107)1 ⊗ wc,i(cid:107)2 · E(cid:107)(UL ⊗ IM )we,i(cid:107)2
(cid:13)(cid:13)E(cid:2)(1 ⊗ wc,i)[(UL ⊗ IM )we,i]T(cid:3)(cid:13)(cid:13) ≤ O(µ3/2
(cid:13)(cid:13) ≤ O(µ3/2
(cid:13)(cid:13)Πi − 11T ⊗ Πc,i
lim sup
i→∞
max)
(83)
max) (84)
(85)
Therefore, substituting (82) and (84) into (81), we conclude
that
Using (79) and (80), we conclude that
lim sup
i→∞
C. Approximation of Πc,i by Πa,i
Now we examine the expression for Πc,i at steady-state
(i → ∞) to arrive at further expression (109). To do this, we
rewrite expressions (71) -- (74) for wc,i as
N(cid:88)
k=1
(cid:2)sk(wc,i−1)−sk( ¯wc,i−1)(cid:3)
pk
wc,i = wc,i−1−µmax
− µmax · (pT ⊗ IM ) [zi−1 + vi]
=(cid:13)(cid:13)γc ·
1
γc
1 − γc
1 − γc
2
2
(cid:13)(cid:13) 1
γc
1−γc
·
2
1 − γc
2
+
+
(a)
≤ γc ·
+
+
≤
(cid:1)
(cid:13)(cid:13)2
(cid:0)sc(wc,i−1)−sc( ¯wc,i−1)−Hc wc,i−1
·
· (pT ⊗IM )zi−1
[IM − µmaxHc] ( wc,i−1 − wa,i−1)
· −2µmax
1 − γc
· −2µmax
[IM −µmaxHc] ( wc,i−1− wa,i−1)(cid:13)(cid:13)2
1 − γc
(cid:13)(cid:13)−2µmax
(cid:13)(cid:13)2
(cid:13)(cid:13)−2µmax
1 − γc ·
1 − γc
(cid:13)(cid:13)sc(wc,i−1) − sc( ¯wc,i−1) − Hc wc,i−1
(cid:0)sc(wc,i−1)−sc( ¯wc,i−1)−Hc wc,i−1
· (pT ⊗IM )zi−1
(cid:13)(cid:13)2
·
(cid:1)(cid:13)(cid:13)2
max
2µ2
1
γc · (cid:107)IM − µmaxHc(cid:107)2 · (cid:107) wc,i−1 − wa,i−1(cid:107)2
2µ2
1 − γc ·
+
1 − γc · (cid:107)(pT ⊗IM )(cid:107)2 · (cid:107)zi−1(cid:107)2
1
γc · (cid:107)Bc(cid:107)2 · (cid:107) wc,i−1 − wa,i−1(cid:107)2
+
max
+
(b)
=
(cid:13)(cid:13)sc(wc,i−1)−sc( ¯wc,i−1)−Hc wc,i−1
(cid:13)(cid:13)2
U ·
1λ2
U ·(cid:107)(pT ⊗IM )(cid:107)2·1T P [zi−1]
1λ2
(92)
2µmax
2 µmax(cid:107)p(cid:107)2
2µmax
2 µmax(cid:107)p(cid:107)2
λL− 1
λL− 1
+
where in step (a) we used the convexity of the squared norm
(cid:107)·(cid:107)2, and in step (b) we introduced Bc (cid:44) IM − µmaxHc. We
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
now proceed to bound the three terms on the right-hand side
of the above inequality. First note that
BT
c Bc = (I − µmaxHc)T (I − µmaxHc)
= I − µmax(Hc + H T
c ) + µ2
maxH T
c Hc
Under Assumption 5, conditions (22) and (23) hold in the ball
δw(cid:107) ≤ rH around wo. Recall from (87) that Hc is evaluated
at wo. Therefore, from (23) we have
(93)
(94)
Hc + H T
c ≥ 2λL · IM
and by (22), we have
(cid:107)Hc(cid:107) =
≤
≤
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
N(cid:88)
N(cid:88)
k=1
k=1
k=1
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
pk∇wT sk(wo)
pk(cid:107)∇wT sk(wo)(cid:107)
pk · λU = (cid:107)p(cid:107)1 · λU
c Hc), where λmax(·)
Note further that (cid:107)Hc(cid:107)2 ≡ λmax(H T
denotes the largest eigenvalue of the matrix argument. This
implies that
1λ2
U · IM
0 ≤ H T
c Hc ≤ (cid:107)p(cid:107)2
so that
BT
c Bc ≤
(cid:0)1 − 2µmaxλL + µ2
Substituting (94) and (95) into (93), we obtain
max(cid:107)p(cid:107)2
1λ2
U
(cid:19)2
(cid:107)Bc(cid:107)2 ≤ 1 − 2µmaxλL + µ2
max(cid:107)p(cid:107)2
1
µ2
max(cid:107)p(cid:107)2
2
1 − µmaxλL +
(cid:18)
1λ2
U
1λ2
U
≤
(95)
(cid:1)
· I
= γ2
c
(96)
2 x)2. Next,
where in the last inequality we used (1−x) ≤ (1− 1
we bound the second term on the right-hand side of (92). To
do this, we need to bound it in two separate cases:
1) Case 1: (cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107) ≤ rH
This condition implies that, for any 0 ≤ t ≤ 1, the vector
¯wc,i−1 + t wc,i−1 is inside a ball that is centered at wo
with radius rH since:
(cid:107)( ¯wc,i−1 + t wc,i−1) − wo(cid:107) = (cid:107) − wc,i−1 + t wc,i−1(cid:107)
≤ (cid:107) wc,i−1(cid:107) + t(cid:107) wc,i−1(cid:107)
≤ (cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107)
≤ rH
By Assumption 5, the function sk(w) is differentiable at
¯wc,i−1 +t wc,i−1 so that using the following mean-value
theorem [43, p.6]:
sk(wc,i−1) = sk( ¯wc,i−1)
(cid:19)
(cid:18)(cid:90) 1
0 ∇wT sk( ¯wc,i−1 + t wc,i−1)dt
+
Then, we have
(cid:13)(cid:13)sc(wc,i−1) − sc( ¯wc,i−1) − Hc wc,i−1
(cid:13)(cid:13)2
· wc,i−1
(97)
15
0
0
0
(a)
=
=
=
pk
k=1
k=1
k=1
k=1
k=1
k=1
≤
−
≤
pk ·
pk ·
pk ·
(cid:13)(cid:13)2
(cid:90) 1
∇wT sk( ¯wc,i−1 + t wc,i−1)
(cid:13)(cid:13) N(cid:88)
(cid:90) 1
pk[sk(wc,i−1) − sk( ¯wc,i−1)] − Hc wc,i−1
(cid:13)(cid:13) N(cid:88)
0 ∇wT sk( ¯wc,i−1 + t wc,i−1)dt · wc,i−1
N(cid:88)
(cid:13)(cid:13)2
(cid:90) 1
pk∇wT sk(wo) · wc,i−1
(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:2)
(cid:13)(cid:13)(cid:13)2
− ∇wT sk(wo)(cid:3)dt · wc,i−1
(cid:110) N(cid:88)
(cid:13)(cid:13)∇wT sk( ¯wc,i−1 + t wc,i−1)
(cid:111)2
− ∇wT sk(wo)(cid:13)(cid:13)dt · (cid:107) wc,i−1(cid:107)
(cid:90) 1
(cid:110) N(cid:88)
(cid:111)2
λH · (cid:107)( ¯wc,i−1 + t wc,i−1) − wo(cid:107)dt
(cid:90) 1
(cid:110) N(cid:88)
· (cid:107) wc,i−1(cid:107)
(cid:111)2
λH · ((cid:107) ¯wc,i−1 − wo(cid:107) + t(cid:107) wc,i−1(cid:107))dt
(cid:90) 1
(cid:110) N(cid:88)
· (cid:107) wc,i−1(cid:107)
(cid:111)2
λH · ((cid:107) ¯wc,i−1 − wo(cid:107) + (cid:107) wc,i−1(cid:107))dt
(cid:111)2
(cid:110) N(cid:88)
· (cid:107) wc,i−1(cid:107)
(cid:110)
(cid:111)2
pk · λH · ((cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107)) · (cid:107) wc,i−1(cid:107)
(cid:107)p(cid:107)1 · λH · ((cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107)) · (cid:107) wc,i−1(cid:107)
=
H · ((cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107))2 · (cid:107) wc,i−1(cid:107)2
1 · λ2
= (cid:107)p(cid:107)2
≤ 2(cid:107)p(cid:107)2
1 · λ2
H · ((cid:107) wc,i−1(cid:107)2 + (cid:107) wc,i−1(cid:107)2) · (cid:107) wc,i−1(cid:107)2
(98)
where step (a) uses Assumption 5 and the last inequality
uses (x + y)2 ≤ 2x2 + 2y2.
It holds that
pk ·
pk ·
≤
≤
k=1
k=1
k=1
=
0
0
pk
k=1
2) Case 2: (cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107) > rH
(cid:13)(cid:13)sc(wc,i−1) − sc( ¯wc,i−1) − Hc wc,i−1
(cid:13)(cid:13)2
=(cid:13)(cid:13) N(cid:88)
(cid:2)sk(wc,i−1) − sk( ¯wc,i−1)
(cid:3)(cid:13)(cid:13)2
(cid:110) N(cid:88)
(cid:13)(cid:13)sk(wc,i−1) − sk( ¯wc,i−1)
(cid:13)(cid:13)(cid:111)2
(cid:110) N(cid:88)
(cid:0)
− ∇wT sk(wo) · wc,i−1
− ∇wT sk(wo) · wc,i−1
≤
k=1
pk
pk
(cid:107)sk(wc,i−1) − sk( ¯wc,i−1)(cid:107)
≤
k=1
16
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
(cid:1)(cid:111)2
(b)
(a)
k=1
≤
(cid:111)2
pk · (λU · (cid:107) wc,i−1(cid:107) + λU · (cid:107) wc,i−1(cid:107))
(cid:19)2
(cid:110) N(cid:88)
+ (cid:107)∇wT sk(wo)(cid:107) · (cid:107) wc,i−1(cid:107)
(cid:110)
(cid:111)2
2(cid:107)p(cid:107)1 · λU · (cid:107) wc,i−1(cid:107)
=
(cid:18)
U · (cid:107) wc,i−1(cid:107)2
1 · λ2
≤ 4(cid:107)p(cid:107)2
· (cid:107) wc,i−1(cid:107)2
1 · λ2
≤ 4(cid:107)p(cid:107)2
U ·
4λ2
H · ((cid:107) wc,i−1(cid:107)2 + (cid:107) wc,i−1(cid:107)2) · (cid:107) wc,i−1(cid:107)2
≤ 2(cid:107)p(cid:107)2
U
1 ·
r2
(99)
where in step (a) we used (19) and (22), in step (b)
we used the fact that (cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107) > rH in
the current case, and in step (c) we used the relation
(cid:107)x + y(cid:107)2 ≤ 2(cid:107)x(cid:107)2 + 2(cid:107)y(cid:107)2.
(cid:107) wc,i−1(cid:107) + (cid:107) wc,i−1(cid:107)
rH
(c)
Based on (98) and (99) from both cases, we have
(cid:13)(cid:13)sc(wc,i−1) − sc( ¯wc,i−1) − Hc wc,i−1
≤ 2(cid:107)p(cid:107)2
1·λ2
HU ·((cid:107) wc,i−1(cid:107)2 +(cid:107) wc,i−1(cid:107)2) · (cid:107) wc,i−1(cid:107)2 (100)
where
(cid:13)(cid:13)2
(cid:27)
(cid:26)
λ2
HU
(cid:44) max
λ2
H ,
4λ2
U
r2
H
+
HU
1λ2
U
The third term on the right-hand side of (92) can be bounded
by (75). Therefore, substituting (96), (100) and (75) into (92)
and applying the expectation operator, we get
E(cid:107) wc,i − wa,i(cid:107)2
≤ γc · E(cid:107) wc,i−1 − wa,i−1(cid:107)2
1λ2
2 µmax(cid:107)p(cid:107)2
(cid:0)E(cid:107) wc,i−1(cid:107)2 · (cid:107) wc,i−1(cid:107)2 + E(cid:107) wc,i−1(cid:107)4(cid:1)
4µmax(cid:107)p(cid:107)2
λL − 1
·
2N µmax(cid:107)pT ⊗IM(cid:107)2
U ·λ2
λL− 1
1λ2
1 U1](cid:107)2∞·E(cid:107)we,i−1(cid:107)2
(101)
where in the last term on the right-hand side of (101) we used
1T P [x] = (cid:107)x(cid:107)2 from property (157) in Part I [2]. Recall from
Theorem 2 in Part I [2] that wc,i−1 → 0, and from (79) -- (80)
that E(cid:107) wc,i−1(cid:107)2 ≤ O(µmax) and E(cid:107)we,i−1(cid:107)2 ≤ O(µ2
max)
in steady-state. Moreover, we also have the following result
regarding E(cid:107) wc,i−1(cid:107)4 in steady-state.
Lemma 2 (Asymptotic bound on the 4th order moment):
Using Assumptions 1 -- 7, it holds that
2 µmax(cid:107)p(cid:107)2
U ·(cid:107) ¯P1[AT
+
lim sup
i→∞
lim sup
i→∞
E(cid:107) wc,i(cid:107)4 ≤ O(µ2
E(cid:107)we,i(cid:107)4 ≤ O(µ4
max)
max)
(102)
(103)
Proof: See Appendix B.
sion (101), we obtain
Therefore, taking lim sup of both sides of inequality recur-
lim sup
i→∞
E(cid:107) wc,i− wa,i(cid:107)2
≤ γc · lim sup
i→∞
E(cid:107) wc,i−1− wa,i−1(cid:107)2 + O(µ3
max)
= γc · lim sup
i→∞
E(cid:107) wc,i− wa,i(cid:107)2 + O(µ3
max)
(104)
As long as γc < 1, which is guaranteed by the stability
condition (129) from Part I [2], inequality (104) leads to
E(cid:107) wc,i − wa,i(cid:107)2
lim sup
i→∞
1
≤
=
max)
1 − γc · O(µ3
1
µmax − 1
max(cid:107)p(cid:107)2
2 µ2
U · O(µ3
1λ2
max) = O(µ2
max)
(105)
Based on (105), we can now show that
the steady-state
covariance matrix of wc,i is equal to the covariance matrix
of wa,i plus a high order perturbation term. First, we have
Πc,i = E[ wc,i wT
c,i]
a,i] + E[ wa,i( wc,i − wa,i)T ]
= E[( wa,i + wc,i − wa,i)( wa,i + wc,i − wa,i)T ]
= E[ wa,i wT
+E[( wc,i− wa,i) wT
a,i]+E[( wc,i− wa,i)( wc,i− wa,i)T ]
= Πa,i + E[ wc,i( wc,i − wa,i)T ] + E[( wc,i − wa,i) wT
c,i]
− E[( wc,i − wa,i)( wc,i − wa,i)T ]
(106)
The second to the fourth terms in (106) are asymptotically
high order terms of µmax. Indeed, for the second term, we
have as i → ∞:
(cid:13)(cid:13)E[ wc,i( wc,i − wa,i)T ](cid:13)(cid:13)
lim sup
i→∞
E(cid:13)(cid:13) wc,i( wc,i − wa,i)T(cid:13)(cid:13)
(cid:113)E(cid:107) wc,i(cid:107)2 · E(cid:107) wc,i − wa,i(cid:107)2
E[(cid:107) wc,i(cid:107) · (cid:107) wc,i − wa,i(cid:107)]
≤ lim sup
i→∞
≤ lim sup
i→∞
≤ lim sup
i→∞
≤ O(µ3/2
max)
(107)
(108)
Likewise, the third term in (106) is asymptotically O(µ3/2
For the fourth term in (106), we have as i → ∞:
(cid:13)(cid:13)E[( wc,i − wa,i)( wc,i − wa,i)T ](cid:13)(cid:13)
lim sup
i→∞
E(cid:13)(cid:13)( wc,i − wa,i)( wc,i − wa,i)T(cid:13)(cid:13)
(a)
≤ lim sup
i→∞
max).
E(cid:107) wc,i − wa,i(cid:107)2
(b)
≤ lim sup
i→∞
≤ O(µ2
(c)
max)
where step (a) applies Jensen's inequality to the convex
function (cid:107) · (cid:107), step (b) uses the relation (cid:107)xyT(cid:107) ≤ (cid:107)x(cid:107) · (cid:107)y(cid:107),
and step (c) uses (105). Substituting (107) -- (108) into (106),
we get,
(cid:13)(cid:13) Πc,i − Πa,i
(cid:13)(cid:13) ≤ O(µ3/2
max)
lim sup
i→∞
(109)
Combining (109) with (85) we therefore find that
i→∞ (cid:107)Πi − 11T ⊗ Πa,i(cid:107)
lim sup
= lim sup
i→∞ (cid:107)Πi − 11T ⊗ Πc,i + 11T ⊗ ( Πc,i − Πa,i)(cid:107)
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
17
≤ lim sup
(a)
= lim sup
i→∞ (cid:107)Πi−11T ⊗ Πc,i(cid:107)+lim sup
i→∞ (cid:107)11T ⊗ ( Πc,i− Πa,i)(cid:107)
i→∞ (cid:107)Πi−11T ⊗ Πc,i(cid:107)+lim sup
i→∞ (cid:107)11T(cid:107)·(cid:107) Πc,i− Πa,i(cid:107)
(110)
≤ O(µ3/2
max)
where step (a) uses the fact that the 2−induced matrix norm
is the largest singular value and that the singular values of
X ⊗ Y are equal to the products of the respective singular
values of X and Y .
D. Evaluation of Πa,∞
We now proceed to evaluate Πa,i from recursion (89):
+µ2
c + µ2
c +µ2
Πa,i = Bc Πa,i−1BT
= Bc Πa,i−1BT
max(pT ⊗IM )E(cid:2)
max(pT ⊗ IM )ERv,i(φi−1)(p ⊗ IM )
max(pT ⊗ IM )ERv,i(1⊗wo)(p⊗IM )
(111)
We will verify that the last perturbation term in (111) is also
a high-order term in µmax. First note that
Rv,i(φi−1)−Rv,i(1⊗wo)(cid:3)(p⊗IM)
Rv,i(φi−1) − Rv,i(1 ⊗ wo)(cid:3)(p ⊗ IM )(cid:13)(cid:13)
(cid:13)(cid:13)µ2
max(pT ⊗ IM )E(cid:2)
max · (cid:107)p(cid:107)2 · E(cid:13)(cid:13)Rv,i(φi−1) − Rv,i(1 ⊗ wo)(cid:13)(cid:13)
≤ µ2
(112)
Next, we bound the rightmost term inside the expectation of
(112). We also need to bound it in two separate cases before
arriving at a universal bound:
1) Case 1: (cid:107) φi−1(cid:107) ≤ rV
By (28) in Assumption 6, we have
(cid:13)(cid:13)Rv,i(φi−1) − Rv,i(1 ⊗ wo)
(cid:13)(cid:13)
(cid:13)(cid:13)Rv,i(φi−1) − Rv,i(1 ⊗ wo)(cid:13)(cid:13)
2) Case 2: (cid:107) φi−1(cid:107) > rV
In this case, we have
≤ (cid:107)Rv,i(φi−1)(cid:107) + (cid:107)Rv,i(1 ⊗ wo)(cid:107)
(114)
To proceed, we first bound (cid:107)Rv,i(w)(cid:107) as follows, where
w (cid:44) col{w1, . . . , wN}. From the definition of Rv,i(w)
in (26), we have
(cid:107)Rv,i(w)(cid:107)
(cid:3)
i (w)Fi−1}
i (w)]Fi−1}
(a)
(b)
=
= Tr(cid:2)E{vi(w)vT
≤ Tr[Rv,i(w)]
= E{Tr[vi(w)vT
N(cid:88)
= E{(cid:107)vi(w)(cid:107)2Fi−1}
N(cid:88)
N(cid:88)
N(cid:88)
{α · (cid:107)wk(cid:107)2 + σ2
≤
k=1
k=1
k=1
=
(c)
E{(cid:107)vk,i(wk)(cid:107)2Fi−1}
vFi−1}
{α · (cid:107)wk − wo + wo(cid:107)2 + σ2
vFi−1}
≤
k=1
{2α(cid:107)wk−wo(cid:107)2 +2α(cid:107)wo(cid:107)2 +σ2
vFi−1}
≤ λv · (cid:107)φi−1 − 1 ⊗ wo(cid:107)κ = λv · (cid:107) φi−1(cid:107)κ
(113)
4αN(cid:107)wo(cid:107)2 + 2N σ2
v
= 2α · (cid:107)w−1 ⊗ wo(cid:107)2 +2αN(cid:107)wo(cid:107)2 +N σ2
v
(115)
where in step (a) we used (cid:107)X(cid:107) ≤ Tr(X) for any
symmetric positive semi-definite matrix X, in step (b)
we used the definition of vi(w) in (25), and in step
(c) we used (18). Using (115) with w = φi−1 and
w = 1 ⊗ wo, respectively, for the two terms on the
right-hand side of (114), we get
(cid:13)(cid:13)Rv,i(φi−1) − Rv,i(1 ⊗ wo)(cid:13)(cid:13)
≤ 2α · (cid:107) φi−1(cid:107)2 +(cid:0)4αN(cid:107)wo(cid:107)2 + 2N σ2
=(cid:0)2α +
≤ 2α · (cid:107) φi−1(cid:107)2 + 4αN(cid:107)wo(cid:107)2 + 2N σ2
4αN(cid:107)wo(cid:107)2 + 2N σ2
(cid:1)
(a)
v
v
v
(cid:1)
· (cid:107) φi−1(cid:107)2
r2
V
(116)
· (cid:107) φi−1(cid:107)2
r2
V
where in step (a) we used the fact that (cid:107) φi−1(cid:107) > rV in
the current case.
In summary, from (113) and (116), we obtain the following
bound that holds in general:
4αN(cid:107)wo(cid:107)2 +2N σ2
v
r2
V
2α+
≤ max
≤ λV U · max
≤ λV U ·
where
(cid:13)(cid:13)Rv,i(φi−1) − Rv,i(1 ⊗ wo)(cid:13)(cid:13)
(cid:18)
(cid:26)
(cid:110)
(cid:107) φi−1(cid:107)2,(cid:107) φi−1(cid:107)κ(cid:111)
λv·(cid:107) φi−1(cid:107)κ,
(cid:107) φi−1(cid:107)2 + (cid:107) φi−1(cid:107)κ(cid:111)
(cid:110)
λV U (cid:44) max(cid:8)λv, 2α +
(cid:13)(cid:13)(cid:13)µ2
max(pT ⊗ IM )E(cid:2)
− Rv,i(1 ⊗ wo)(cid:3)(p ⊗ IM )
lim sup
i→∞
(cid:13)(cid:13)(cid:13)
r2
V
Substituting (117) into (112), we arrive at
Rv,i(φi−1)
1 wi−1(cid:107)2
max · (cid:107)p(cid:107)2 · λV U ·
1 (cid:107)2 · E(cid:107) wi−1(cid:107)2
(cid:104)E(cid:107) φi−1(cid:107)2 + E(cid:107) φi−1(cid:107)κ(cid:105)
(cid:2)E(cid:107)AT
max · (cid:107)p(cid:107)2 · λV U ·
1 wi−1(cid:107)κ(cid:3)
max · (cid:107)p(cid:107)2 · λV U ·
(cid:2)
1 (cid:107)κ · E(cid:107) wi−1(cid:107)κ(cid:3)
(cid:107)AT
(cid:104)
1 (cid:107)κ · E(cid:8)((cid:107) wi−1(cid:107)4)κ/4(cid:9)(cid:105)
(cid:107)AT
(cid:104)
1 (cid:107)κ · (E(cid:107) wi−1(cid:107)4)κ/4(cid:105)
i→∞ µ2
≤ lim sup
(a)
i→∞ µ2
= lim sup
+ E(cid:107)AT
i→∞ µ2
≤ lim sup
+ (cid:107)AT
i→∞ µ2
= lim sup
+ (cid:107)AT
i→∞ µ2
≤ lim sup
+ (cid:107)AT
≤ µ2
max · [O(µmax) + O(µκ/2
max)]
= O(µ3
1 (cid:107)2 · E(cid:107) wi−1(cid:107)2
1 (cid:107)2 · E(cid:107) wi−1(cid:107)2
max · (cid:107)p(cid:107)2 · λV U ·
max · (cid:107)p(cid:107)2 · λV U ·
max) + O(µκ/2+2
(cid:107)AT
max
(c)
(b)
)
(118)
(cid:19)
(cid:27)
·(cid:107) φi−1(cid:107)2
(117)
(cid:9)
18
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
max
(cid:1)
(120)
lim sup
c +µ2
a,i = Bc Πo
i→∞ (cid:107) Πa,i − Πo
Taking the 2-induced norm of both sides, we get
a,i = Bc( Πa,i−1 − Πo
+ µ2
where in step (a) we used the relation φi−1 = AT
1 wi−1 from
(88) in Part I [2], in step (b) we applied Jensen's inequality
E(xκ/4) ≤ (Ex)κ/4 since xκ/4 is a concave function when
0 < κ ≤ 4, and in step (c) we used the fact that the lim sup of
E(cid:107) wi−1(cid:107)2 is on the order of O(µmax)5 and that the lim sup
of E(cid:107) wi−1(cid:107)4 is on the order of O(µ2
max)6. The bound (118)
implies that recursion (111) is a perturbed version of the
following recursion
Πo
a,i−1BT
max(pT ⊗IM )ERv,i(1⊗wo)(p⊗IM )
(119)
We now show that the covariance matrices obtained from these
two recursions are close to each other in the sense that
Subtracting (119) from (111), we get
Πa,i− Πo
a,i−1)BT
c
a,i(cid:107) ≤ O(cid:0)µmin(2,1+κ/2)
Rv,i(φi−1)−Rv,i(1⊗wo)(cid:3)(p⊗IM)
(cid:13)(cid:13)
Rv,i(φi−1)−Rv,i(1⊗wo)(cid:3)(p⊗IM)(cid:13)(cid:13)
(cid:13)(cid:13)
Rv,i(φi−1)−Rv,i(1⊗wo)(cid:3)(p⊗IM)(cid:13)(cid:13)
max(pT ⊗IM )E(cid:2)
(cid:13)(cid:13) Πa,i − Πo
(cid:13)(cid:13)
(cid:13)(cid:13) Πa,i−1 − Πo
+(cid:13)(cid:13)µ2
max(pT ⊗IM )E(cid:2)
(cid:13)(cid:13) Πa,i−1 − Πo
+(cid:13)(cid:13)µ2
max(pT ⊗IM )E(cid:2)
(cid:13)(cid:13) Πa,i − Πo
(cid:13)(cid:13)
(cid:13)(cid:13)
(cid:13)(cid:13) Πa,i−1 − Πo
(cid:13)(cid:13)µ2
Rv,i(φi−1) − Rv,i(1⊗wo)(cid:3)
max(pT ⊗IM )E(cid:2)
· (p⊗IM)(cid:13)(cid:13)
(cid:13)(cid:13) + O(µ3
(cid:13)(cid:13) Πa,i−1 − Πo
(cid:13)(cid:13)+O(µ3
(cid:13)(cid:13) Πa,i− Πo
where in step (a) we are using (96). Taking lim sup of both
sides the above inequality, we obtain
lim sup
i→∞
≤ γ2
c · lim sup
i→∞
+ lim sup
i→∞
c · lim sup
i→∞
c · lim sup
i→∞
max) + O(µκ/2+2
max)+O(µκ/2+2
≤ (cid:107)Bc(cid:107)2 ·
≤ γ2
= γ2
≤ γ2
c ·
) (121)
a,i−1
a,i−1
a,i−1
a,i−1
max
max
(a)
(a)
a,i
a,i
a,i
)
where step (a) uses (118). Recalling that γc < 1, which is
already guaranteed by choosing µmax according to the stability
condition (129) in Part I [2], we can move the first term on
the right-hand side of (121) to the left, divide both sides by
1 − γ2
c and get
(cid:13)(cid:13) Πa,i − Πo
a,i
(cid:13)(cid:13) ≤
lim sup
i→∞
O(µ3
max) + O(µκ/2+2
max
1 − γ2
c
O(µ3
max) + O(µκ/2+2
max
)
)
1 − γc
max) + O(µκ/2+2
)
max(cid:107)p(cid:107)1λ2
O(µ3
µmaxλL − 1
2 µ2
max
U
≤
(a)
=
5This can be derived by using (70), (79), (80) along with the fact that
wc,i → 0 (Thm. 2 in Part I [2]) and (cid:107)x+y +z(cid:107)2 ≤ 3((cid:107)x(cid:107)2 +(cid:107)y(cid:107)2 +(cid:107)z(cid:107)2).
6This can be derived by using (70), (102), (103) along with the fact that
wc,i → 0 and (cid:107)x + y + z(cid:107)4 ≤ 27((cid:107)x(cid:107)4 + (cid:107)y(cid:107)4 + (cid:107)z(cid:107)4).
=
=
max
O(µ2
λL − 1
max) + O(µκ/2+1
2 µmax(cid:107)p(cid:107)1λ2
O(cid:0)µmin(2,1+κ/2)
(cid:1)
max
U
λL − 1
2 µmax(cid:107)p(cid:107)1λ2
U
where in step (a) we are substituting (91).
)
(122)
E. Final expression for Π∞
Therefore, by (110) and (120), we have
lim sup
i→∞ (cid:107)Πi − 11T ⊗ Πo
a,i(cid:107)
a,i)(cid:107)
= lim sup
≤ lim sup
+ lim sup
i→∞ (cid:107)Πi − 11T ⊗ Πa,i + 11T ⊗ ( Πa,i − Πo
i→∞ (cid:107)Πi − 11T ⊗ Πa,i(cid:107)
i→∞ (cid:107)11T ⊗ ( Πa,i − Πo
i→∞ (cid:107)Πi − 11T ⊗ Πa,i(cid:107)
i→∞ (cid:107)11T(cid:107) · (cid:107) Πa,i − Πo
max) + O(µmin(2,1+κ/2)
a,i(cid:107)
)
a,i)(cid:107)
+ lim sup
= lim sup
≤ O(µ3/2
= O(µmin(3/2,1+κ/2)
max
)
max
(123)
As i → ∞, the unperturbed recursion (119) converges to
a unique solution Πo
a,∞ that satisfies the following discrete
Lyapunov equation:
Πo
a,∞ = Bc Πo
a,∞BT
c + µ2
max(pT ⊗ IM ) · Rv · (p ⊗ IM )
(124)
where we used (27) from Assumption 6.7 In other words, as
i → ∞, Πo
lim sup
= lim sup
a,i converges to Πo
i→∞ (cid:107)Πi − 11T ⊗ Πo
a,∞ so that
a,∞(cid:107)
i→∞ (cid:107)Πi − 11T ⊗ Πo
i→∞ (cid:107)Πi − 11T ⊗ Πo
i→∞ (cid:107)11T ⊗ ( Πo
a,i + 11T ⊗ ( Πo
a,i(cid:107)
a,i − Πo
a,∞)(cid:107)
+ lim sup
≤ lim sup
a,i − Πo
a,∞)(cid:107)
(125)
≤ O(µmin(3/2,1+κ/2)
max
)
Furthermore, using (68) and (125), we also have
(cid:12)(cid:12)E(cid:107) wk,i(cid:107)2
Σ − Tr(cid:8)(11T ⊗ Πo
(cid:12)(cid:12)Tr(cid:8)Πi(Ekk ⊗ Σ)(cid:9)
− Tr(cid:8)(11T ⊗ Πo
(cid:12)(cid:12)Tr(cid:8)(Πi − 11T ⊗ Πo
(cid:12)(cid:12)[vec(Πi − 11T ⊗ Πo
(cid:13)(cid:13)vec(Πi − 11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:12)(cid:12)
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:12)(cid:12)
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:12)(cid:12)
a,∞)(cid:13)(cid:13) ·
(cid:12)(cid:12)
(cid:13)(cid:13)vec(Ekk ⊗ Σ)(cid:13)(cid:13)
a,∞)]T vec(Ekk ⊗ Σ)
lim sup
i→∞
= lim sup
i→∞
= lim sup
i→∞
= lim sup
i→∞
(a)
≤ lim sup
i→∞
7The almost sure convergence in (27) implies ERv,i(1 ⊗ wo) → Rv in
(119) and (124) because of the dominated convergence theorem [44, p.44].
The condition of dominated convergence theorem can be verified by showing
that (cid:107)Rv,i(1 ⊗ wo)(cid:107) is upper bounded almost surely by a deterministic
constant 2αN(cid:107)wo(cid:107)2 + N σ2
v, which can be proved by following a similar
line of argument in (115) using (18), (25), and (26).
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
19
)
max
(128)
a,∞)]T vec(Σ) − O(µmin(3/2,1+κ/2)
= [vec( Πo
where step (a) adds and subtracts the same term, step (b) uses
x ≥ −x, step (c) uses(126), and step (d) uses the property
Tr(X⊗Y ) = Tr(X)Tr(Y ) for Kronecker products. Note from
(127) and (128) that the first terms in the lim sup and lim inf
bounds are the same, and the second terms are high-order
terms of µmax. Therefore, once we find the expression for
Πo
a,∞, we will have a complete characterization of the steady-
state MSE.
Now we proceed to derive the expression for Πo
a,∞. Vec-
torizing both sides of (124), we obtain
vec( Πo
−1
= µ2
= µmax · (IM ⊗ Hc +Hc ⊗ IM −µmaxHc ⊗ Hc)
a,∞)
max · (IM 2 − Bc ⊗ Bc)
× vec(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
× vec(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
(cid:2)IM 2−µmax(Hc⊗Hc)(IM ⊗Hc +Hc⊗IM )
× vec(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
= µmax · (IM ⊗ Hc + Hc ⊗ IM )
×
−1
(a)
−1
−1(cid:3)−1
(129)
where step (a) uses the fact that (X + Y )−1 = X−1(I +
Y X−1)−1 given X is invertible. Note that the existence of
the inverse of IM ⊗ Hc + Hc ⊗ IM is guaranteed by (23)
for the following reason. First, condition (23) ensures that all
the eigenvalues of Hc have positive real parts. To see this, let
λ(Hc) and x0 (x0 (cid:54)= 0) denote an eigenvalue of Hc and the
corresponding eigenvector8. Then,
∗
(130)
∗
0Hcx0 = λ(Hc) · (cid:107)x0(cid:107)2
Hcx0 = λ(Hc) · x0 ⇒ x
∗
⇒ (x
0Hcx0)
∗
⇒ x
0H
∗
0H T
⇒ x
∗
= λ
∗
(Hc) · (cid:107)x0(cid:107)2
∗
(131)
(Hc) · (cid:107)x0(cid:107)2
where (·)∗ denotes the conjugate transpose operator, and the
last step uses the fact that Hc is real so that H∗
c .
c = H T
Summing (130) and (131) leads to
∗
c x0 = λ
c x0 = λ
(Hc) · (cid:107)x0(cid:107)2
∗
0(Hc + Hc)T x0 = 2Re{λ(Hc)} · (cid:107)x0(cid:107)2
x
x∗
0(Hc + Hc)T x0
⇒ Re{λ(Hc)} =
2(cid:107)x0(cid:107)2
≥ λL > 0
where the last step uses (23). Furthermore, the M 2 eigenvalues
of IM ⊗Hc +Hc⊗IM are λm1(Hc)+λm2 (Hc) for m1, m2 =
1, . . . , M, where λm(·) denotes the mth eigenvalue of a matrix
[45, p.143]. Therefore, the real parts of the eigenvalues of
IM ⊗ Hc + Hc ⊗ IM are Re{λm1(Hc)} + Re{λm2(Hc)} >
0 so that the matrix IM ⊗ Hc + Hc ⊗ IM is not singular
and is invertible. Observing that for any matrix X where the
necessary inverse holds, we have
(I − µmaxX)
⇔(I − µmaxX)
⇔(I − µmaxX)
−1(I − µmaxX) = I
−1 − µmax(I − µmaxX)
−1 = I + µmax(I − µmaxX)
−1X = I
−1X
8Note that the matrix Hc need not be symmetric and hence its eigenvalues
and eigenvectors need not be real.
(cid:13)(cid:13)F ·
(cid:13)(cid:13)Ekk ⊗ Σ(cid:13)(cid:13)F
(cid:13)(cid:13)Πi − 11T ⊗ Πo
(cid:13)(cid:13)
(cid:13)(cid:13)Πi − 11T ⊗ Πo
a,∞
a,∞
= lim sup
i→∞
(b)
≤ C · lim sup
i→∞
≤ O(µmin(3/2,1+κ/2)
max
)
(126)
Σ
where step (a) uses Cauchy-Schwartz inequality and step (b)
uses the equivalence of matrix norms. The bound (126) is use-
ful in that it has the following implications about the lim sup
and lim inf of the weighted mean-square-error E(cid:107) wk,i(cid:107)2
Σ:
(cid:110)
Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)
E(cid:107) wk,i(cid:107)2
lim sup
i→∞
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:111)
Σ − Tr(cid:8)(11T ⊗ Πo
(a)
= lim sup
i→∞
= Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)
+ E(cid:107) wk,i(cid:107)2
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:105)
(cid:104)E(cid:107) wk,i(cid:107)2
Σ − Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)
≤ Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)E(cid:107) wk,i(cid:107)2
Σ − Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9) + O(µmin(3/2,1+κ/2)
≤ Tr(cid:8)(11T ⊗ Πo
= Tr(cid:8)(11T Ekk) ⊗ ( Πo
a,∞Σ)(cid:9) + O(µmin(3/2,1+κ/2)
+ lim sup
i→∞
+ lim sup
i→∞
max
max
(c)
(b)
)
)
(d)
= Tr(11T Ekk) · Tr( Πo
= Tr( Πo
= [vec( Πo
a,∞Σ) + O(µmin(3/2,1+κ/2)
a,∞)]T vec(Σ) + O(µmin(3/2,1+κ/2)
a,∞Σ) + O(µmin(3/2,1+κ/2)
max
max
max
)
)
)
(127)
where step (a) adds and subtracts the same term, step (b)
uses x ≤ x, step (c) uses (126), and step (d) uses the
property Tr(X ⊗ Y ) = Tr(X)Tr(Y ) for Kronecker products
[45, p.142]. Likewise, the lim inf of the weighted MSE can
be derived as
Σ
(b)
+ lim inf
i→∞
(cid:110)
Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)
E(cid:107) wk,i(cid:107)2
lim inf
i→∞
Σ − Tr(cid:8)(11T ⊗ Πo
(a)
= lim inf
i→∞
a,∞)(Ekk ⊗ Σ)(cid:9)
= Tr(cid:8)(11T ⊗ Πo
+ E(cid:107) wk,i(cid:107)2
(cid:104)E(cid:107) wk,i(cid:107)2
Σ − Tr(cid:8)(11T ⊗ Πo
≥ Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)
(cid:12)(cid:12)(cid:12)E(cid:107) wk,i(cid:107)2
(cid:110)
Σ − Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)
≥ Tr(cid:8)(11T ⊗ Πo
(cid:12)(cid:12)(cid:12)E(cid:107) wk,i(cid:107)2
Σ − Tr(cid:8)(11T ⊗ Πo
a,∞)(Ekk ⊗ Σ)(cid:9)
≥ Tr(cid:8)(11T ⊗ Πo
= Tr(cid:8)(11T Ekk) ⊗ ( Πo
a,∞Σ)(cid:9)
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:111)
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:105)
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:12)(cid:12)(cid:12)(cid:111)
a,∞)(Ekk ⊗ Σ)(cid:9)(cid:12)(cid:12)(cid:12)
− O(µmin(3/2,1+κ/2)
− lim sup
i→∞
+ lim inf
i→∞
−
max
(c)
)
)
− O(µmin(3/2,1+κ/2)
a,∞Σ) − O(µmin(3/2,1+κ/2)
)
max
max
(d)
= Tr(11T Ekk) · Tr( Πo
= Tr( Πo
a,∞Σ) − O(µmin(3/2,1+κ/2)
max
)
20
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
lim sup
i→∞
E(cid:107) wk,i(cid:107)2
and lim inf expressions (134) -- (135) for the weighted MSE
become
Σ ≤ µmax · Tr(cid:8)X(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
+ O(cid:0)µmin(3/2,1+κ/2)
Σ ≥ µmax · Tr(cid:8)X(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)
− O(cid:0)µmin(3/2,1+κ/2)
(cid:1)
(cid:1)
(137)
(136)
max
max
(132)
lim inf
i→∞
E(cid:107) wk,i(cid:107)2
As a final remark, since condition (23) ensures that all the
eigenvalues of Hc have positive real parts, i.e., the matrix −Hc
is asymptotically stable, the following Lyapunov equation,
which is equivalent to (41),
(−H T
c )X + X(−Hc) = −Σ
will have a unique solution given by (42) [45, pp.145-146]
and is positive semi-definite (strictly positive definite) if Σ is
symmetric and positive semi-definite (strictly positive definite)
( see [43, p.39] and [38, p.769]).
APPENDIX B
PROOF OF LEMMA 2
The arguments in the previous appendix relied on results
(102) and (103) from Lemma 2. To establish these results, we
first need to introduce a fourth-order version of the energy
operator we dealt with in Appendices C and D in Part I [2],
and establish some of its properties.
Definition 1 (Fourth order moment operator): Let x =
col{x1, . . . , xN} with sub-vectors of size M × 1 each. We
define P (4)[x] to be an operator that maps from RM N to RN :
P (4)[x] (cid:44) col{(cid:107)x1(cid:107)4,(cid:107)x2(cid:107)4, . . . ,(cid:107)xN(cid:107)4}
By following the same line of reasoning as the one used for
the energy operator P [·] in Appendices C and D in Part I [2],
we can establish the following properties for P (4)[·].
Lemma 3 (Properties of the 4th order moment operator):
The operator P (4)[·] satisfies the following properties:
1) (Nonnegativity): P (4)[x] (cid:23) 0
2) (Scaling): P (4)[ax] = a4 · P (4)[x]
3) (Convexity): Suppose x(1), . . . , x(K) are N × 1 block
vectors formed in the same manner as x, and let
a1, . . . , aK be non-negative real scalars that add up to
one. Then,
P (4)(cid:2)a1x(1) + ··· + aKx(K)(cid:3)
(cid:22) a1P (4)(cid:2)x(1)(cid:3) + ··· + aKP (4)(cid:2)x(K)(cid:3)
and, hence,
(cid:2)IM 2 − µmax(Hc ⊗ Hc)(IM ⊗ Hc + Hc ⊗ IM )
−1(cid:3)−1
(cid:2)I−µmax(Hc⊗Hc)(IM ⊗Hc +Hc⊗IM )
= IM 2 +µmax
−1
−1(cid:3)−1
× (Hc ⊗ Hc)(IM ⊗ Hc + Hc ⊗ IM )
(a)
= IM 2 + O(µmax)
where step (a) is because
(cid:110)
1
lim
µmax→0
×
µmax
µmax
−1(cid:3)−1
(cid:2)I−µmax(Hc⊗Hc)(IM ⊗Hc +Hc⊗IM )
(cid:2)I − µmax(Hc ⊗ Hc)(IM ⊗ Hc + Hc ⊗ IM )
(Hc⊗Hc)(IM ⊗Hc +Hc⊗IM )
µmax→0
−1(cid:111)
= lim
−1(cid:3)−1
× (Hc ⊗ Hc)(IM ⊗ Hc + Hc ⊗ IM )
−1
= (Hc ⊗ Hc)(IM ⊗ Hc + Hc ⊗ IM )
= constant
−1
vec( Πo
a,∞) = µmax ·
Therefore, substituting (132) into (129) leads to
−1 + O(µmax)(cid:3)
(cid:2)(IM ⊗ Hc + Hc ⊗ IM )
× vec(cid:8)(pT ⊗ IM )Rv(p ⊗ IM )(cid:9)
× vec(cid:8)(pT ⊗ IM )Rv(p ⊗ IM )(cid:9) + O(µ2
= µmax · (IM ⊗ Hc + Hc ⊗ IM )
max)
−1
(133)
Substituting (133) into (127) and(128), we obtain
lim sup
i→∞
lim inf
i→∞
Σ
max
(cid:1)
(cid:1)
c +H T
c +H T
c ⊗ IM )
−1vec(Σ)
(cid:0)vec(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)(cid:1)T
max) + O(cid:0)µmin(3/2,1+κ/2)
(cid:0)vec(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)(cid:1)T
(cid:0)vec(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)(cid:1)T
max) − O(cid:0)µmin(3/2,1+κ/2)
(cid:0)vec(cid:8)(pT ⊗ IM ) · Rv · (p ⊗ IM )(cid:9)(cid:1)T
E(cid:107) wk,i(cid:107)2
≤ µmax ·
× (IM ⊗ H T
+ O(µ2
+ O(cid:0)µmin(3/2,1+κ/2)
= µmax ·
× (IM ⊗ H T
E(cid:107) wk,i(cid:107)2
≥ µmax ·
× (IM ⊗ H T
+ O(µ2
= µmax ·
× (IM ⊗ H T
−1vec(Σ)
−1vec(Σ)
−1vec(Σ)
c ⊗ IM )
c ⊗ IM )
c ⊗ IM )
c +H T
(cid:1)
max
max
Σ
c +H T
− O(cid:0)µmin(3/2,1+κ/2)
(cid:1)
the term (IM ⊗ H T
max
(134)
(135)
c ⊗ IM )−1vec(Σ)
Note that
c + H T
in (134) and (135) is in fact
the vectorized version of
the solution matrix X to the Lyapunov equation (41) for
any given positive semi-definite weighting matrix Σ. Us-
vec(Y ) =
= vec(Y )T vec(X T ), the lim sup
ing again the relation Tr(XY ) = (cid:0)vec(X T )(cid:1)T
(cid:16)(cid:0)vec(X T )(cid:1)T
(cid:17)T
vec(Y )
4) (Super-additivity):
P (4)[x + y] (cid:22) 8 · P (4)[x] + 8 · P (4)[y]
5) (Linear transformation):
P (4)[Qx] (cid:22) (cid:107) ¯P [Q](cid:107)3∞ · ¯P [Q] P (4)[x]
(cid:22) (cid:107) ¯P [Q](cid:107)4∞ · 11T · P (4)[x]
(138)
(139)
(140)
(141)
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
21
6) (Update operation): The global update vector s(x) (cid:44)
col{s1(x1), . . . , sN (xN )} satisfies the following relation
on P (4)[·]:
P (4)[s(x) − s(y)] (cid:22) λ4
U · P (4)[x − y]
7) (Centralizd operation):
P (4)[Tc(x) − Tc(y)] (cid:22) γ4
c · P (4)[x − y]
with the same factor
(142)
(143)
1
2
max(cid:107)p(cid:107)2
µ2
γc (cid:44) 1 − µmaxλL +
(144)
8) (Stable Kronecker Jordan operator): Suppose DL =
DL ⊗ IM , where DL is the L× L Jordan matrix defined
by (168) -- (169) in Part I [2]. Then, for any LM × 1
vectors xe and ye, we have
1λ2
U
P (4)[DLxe + ye] (cid:22) Γe,4·P (4)[xe]+
8
(1−d2)3 ·P (4)[ye]
(145)
where Γe,4 is the L × L matrix defined as
d2
Γe,4 (cid:44)
(146)
8
(1−d2)3
...
...
...
8
(1−d2)3
d2
To proceed, we recall the transformed recursions (103) -- (104)
from Part I [2], namely,
wc,i = Tc(wc,i−1) − Tc( ¯wc,i−1)
we,i = DN−1we,i−1−URAT
− µmax · (pT ⊗ IM ) [zi−1 + vi]
(147)
2 M [s(1 ⊗ wc,i−1)+zi−1 +vi]
(148)
If we now apply the operator P (4)[·] to recursions (147) --
(148), and follow arguments similar to the those employed in
Appendices H and I from Part I [2], we arrive at the following
result. The statement extends Lemma 4 in Part I [2] to 4th
order moments.
Lemma 4 (Recursion for the 4th order moments): The
satisfy the following inequality
fourth order moments
recursion
(cid:48)
W
4,i (cid:22) F4 W
where
(cid:48)
W
4,i
(cid:48)
W
i
F4 (cid:44)
max · bv,4
(cid:48)
4,i−1 + H4 W
(cid:48)
i−1 + µ4
(cid:44) col(cid:8)EP (4)[ wc,i], EP (4)[we,i](cid:9)
(cid:44) col(cid:8)EP [ wc,i], EP [we,i](cid:9)
(cid:34)
(cid:34)
fce(µmax) · 1T
(cid:35)
fcc(µmax)
fec(µmax) · 1
Fee(µmax)
hcc(µmax) hce(µmax) · 1T
(cid:35)
H4 (cid:44)
bv,4 (cid:44) col(cid:8)bv4,c, bv4,e · 1(cid:9)
0
0
(149)
(150)
(151)
(152)
(153)
(154)
where γc is defined in (91), and Γe,4 is defined in (146),
Moreover, the entries in (152) -- (153) are given by:
fcc(µmax) (cid:44) γc + µ4
= γc + O(µ2
fce(µmax) (cid:44) µmax · (cid:107)p(cid:107)4
(cid:17)
2 µmax(cid:107)p(cid:107)2
2 µmax(cid:107)p(cid:107)2
1λ2
U
1λ2
U
(155)
+ µ2
·
1
1
(cid:13)(cid:13)4
max · 432α4(cid:107)p(cid:107)4
1 UL](cid:107)2∞ ·
λL + 1
λL − 1
(cid:13)(cid:13) ¯P [AT
(cid:16)
max · 20α(cid:107)p(cid:107)2
2 + (cid:107) ¯P [AT
max)
1 · λ4
1 UL]
U ·
∞
(λL − 1
1λ2
2 µmax(cid:107)p(cid:107)2
U )3
1 · (cid:107) ¯P [AT
1 UL](cid:107)4∞
maxα4(cid:107)p(cid:107)4
1 · (cid:107) ¯P [AT
maxα(cid:107)p(cid:107)2
1 UL](cid:107)2∞
U · (cid:107) ¯P [AT
2(cid:107)p(cid:107)2
1 · λ2
(cid:17)
λL − 1
2 µmax(cid:107)p(cid:107)2
1λ2
2 µmax(cid:107)p(cid:107)2
U
1λ2
2 µmax(cid:107)p(cid:107)2
U
1 UL](cid:107)2∞
1λ2
U
+ 432µ4
+ 20µ2
(cid:16)
·
µmax ·
1
+
(cid:17)
hcc(µmax) (cid:44) 10µ2
(cid:13)(cid:13) ¯P [AT
λL + 1
(cid:16)
λL − 1
= O(µmax)
4α(cid:107)p(cid:107)2
max ·
+ 4α(cid:107)p(cid:107)2
1 · (cid:107)wo(cid:107)2 + σ2
= O(µ2
max)
(cid:16)
hce(µmax) (cid:44) 10(cid:107)p(cid:107)4
1 UL]
λL− 1
4α·(cid:107) wc,0(cid:107)2 +4α·(cid:107)wo(cid:107)2 +σ2
·
v·
1 · (cid:107) wc,0(cid:107)2
v · (cid:107)p(cid:107)2
(cid:13)(cid:13)2
(cid:17)
(cid:0)27α4 · ((cid:107) wc,0(cid:107)4 + (cid:107)wo(cid:107)4) + σ4
= O(µ3
max)
bv4,c (cid:44) 2(cid:107)p(cid:107)4
1 ·
= constant
Fee(µmax) (cid:44) Γe,4 + µ4
max ·
(1 − λ2(A))3
× (cid:107) ¯P [AT
1 UL](cid:107)4∞ · (cid:107) ¯P [URAT
= Γe,4 + O(µ4
max)
U · µ3
1λ2
2 µmax(cid:107)p(cid:107)2
216N · (λ4
U + 216α4)
max
U ·
1λ2
2 ](cid:107)4∞ · 11T
∞
v4
(156)
(157)
(cid:1)
(158)
(159)
(160)
fec(µmax) (cid:44) µ4
max ·
= O(µ4
U + 8α4)
5832N · (λ4
max)
2 ](cid:107)4∞
(1 − λ2(A))3
(cid:107) ¯P [URAT
(cid:110)
27(cid:2)(λ4
(cid:111)
4(cid:107)∞ + α4 · (cid:107)wo(cid:107)4(cid:3) + σ4
U + α4) · (cid:107) wc,0(cid:107)4
2 ](cid:107)4∞
(161)
v4
·
bv4,e (cid:44) 216N · (cid:107) ¯P [URAT
(1 − λ2(A))3
+ (cid:107)go
= constant
(162)
Proof: See Appendix C.
Observe from (149) that the recursion of the fourth order
moments are coupled with the second order moments con-
(cid:48)
tained in W
i−1. Therefore, we will augment recursion (149)
together with the following recursion for the second-order
moment developed in (115) of Part I [2]:
(cid:48)
i (cid:22) Γ W
W
(cid:48)
i−1 + µ2
maxbv
(163)
22
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
to form the following joint recursion:
(cid:34)
(cid:35)
(cid:34) W
W
(cid:48)
i
(cid:48)
4,i
Γ
0
H4 F4
(cid:22)
(cid:35)
(cid:35)(cid:34) W
W
(cid:48)
i−1
(cid:48)
4,i−1
(cid:35)
(cid:34)
µ2
max · bv
µ4
max · bv,4
(164)
+
The stability of the above recursion is guaranteed by the
stability of the matrices Γ and F4, i.e.,
ρ(Γ) < 1 and ρ(F4) < 1
The stability of Γ has already been established in Appendix
J of Part I [2]. Now, we discuss the stability of F4. Using
(155) -- (160) and the definition of γc in (96), we can express
F4 as
(cid:35)
γc + O(µ2
max)
O(µ4
max) O(µmax) · 1T
Γe,4 + O(µ4
max)
(cid:35)
1 − µmaxλL O(µmax)
0
Γe,4
+ O(µ2
max)
(166)
(165)
(cid:34)
(cid:34)
F4 =
=
which has a similar structure to Γ -- see expressions (116) --
(117) in Part I [2], and where in the last step we absorb
the factor 1T in the (1, 2)-th block into O(µmax). Therefore,
following the same line of argument from (278) to (295)
in Appendix J of Part I [2], we can show that F4 is also
stable when the step-size parameter µmax is sufficiently small.
Iterating (164), we get
(cid:34)
(cid:35)
(cid:34) W
W
(cid:48)
i
(cid:48)
4,i
(cid:35)
(cid:35)i(cid:34) W
W
(cid:48)
0
(cid:48)
4,0
(cid:34)
i−1(cid:88)
j=0
+
Γ
0
H4 F4
·
µ2
max·bv
µ4
max·bv,4
(167)
(cid:35)j
(cid:34)
When both Γ and F4 are stable, we have
Γ
0
H4 F4
(cid:22)
(cid:35)
(cid:48)
i
(cid:48)
4,i
(cid:34) W
(cid:34)
W
Γ
0
H4 F4
lim sup
i→∞
(cid:32)
(cid:34)
(cid:22)
=
I −
(cid:35)(cid:33)−1
(cid:34)
(cid:35)
µ2
max · bv
·
µ4
max · bv,4
max·(I−Γ)−1bv
µ2
max · (I−Γ)−1bv +µ4
(I−F4)−1H4·µ2
max·(I−F4)−1bv,4
which implies that, for the fourth-order moment, we get
−1bv
(cid:48)
4,i (cid:22) (I − F4)
lim sup
i→∞
W
−1H4 · µ2
max · (I − F4)
+ µ4
max · (I − Γ)
−1bv,4
(168)
To evaluate the right-hand side of the above expression, we
derive expressions for (I − F4)−1 and (I − Γ)−1 using the
following formula for inverting a 2×2 block matrix [45, p.48],
(cid:34)
[35, p.16]:
(cid:35)−1
(cid:34)
(cid:35)
A−1 + A−1BECA−1 −A−1BE
A B
(169)
=
C D
−ECA−1
E
where E = (D−CA−1B)−1. By (166), we have the following
expression for (I − F4)−1:
(I − F4)
−1
(cid:35)
(cid:34)
(cid:32)
(cid:34)
(cid:34)
=
=
=
0
I−
µmaxλL − O(µ2
max)
µmaxλL − O(µ2
max)
−O(µ2
O(µ2
1−µmaxλL O(µmax)
Γe,4
−O(µ2
max)
max)
max) −O(µmax)−O(µ2
I−Γe,4−O(µ2
max)
O(µmax)
I − Γe,4 − O(µ2
max)
max)
E4 =
Applying relation (169) to (170), we have
max) −
I − Γe,4 − O(µ2
(cid:18)
=(cid:0)I − Γe,4 + O(µ2
max)(cid:1)−1
(cid:34)
max) + O(µmax) − O(1)·E4
λL−O(µmax)
− E4·O(µmax)
λL−O(µmax)
O(µ2
µmaxλL − O(µ2
max)O(µmax)
max)
µmaxλL−O(µ2
−1
E4
=
1
(I − F4)
(cid:33)−1
(cid:35)−1
(cid:35)−1
(cid:19)−1
(170)
(cid:35)
(171)
(172)
Furthermore, recall from (116) -- (117) of Part I [2] for the
expression of Γ:
(cid:35)
(cid:34)
γc µmaxhc(µmax) · 1T
(cid:35)
(cid:34)
0
1 − µmaxλL O(µmax)
Γe
0
Γe
Γ =
=
+ µ2
maxψ0 · 11T
+ O(µ2
max)
1
−1 =
µmaxλL−O(µ2
Observing that Γ and F4 have a similar structure, we can
similarly get the expression for (I − Γ)−1 as
(I − Γ)
(cid:34)
max) + O(µmax) − O(1)·E2
λL−O(µmax)
− E2·O(µmax)
(cid:20)
λL−O(µmax)
max)(cid:1)−1
=(cid:0)I − Γe + O(µ2
I − Γe − O(µ2
O(µ2
µmaxλL − O(µ2
max)O(µmax)
max)
(cid:35)
(cid:21)−1
max) −
(173)
(174)
E2 =
E2
In addition, by substituting (157) -- (158) into (153), we note
that
(cid:34)
(cid:35)
H4 =
max) O(µ3
O(µ2
max)
0
0
(175)
Substituting (172), (173) and (175) into the right-hand side of
(168) and using we obtain
(cid:35)
(cid:35)
(cid:35)
lim sup
i→∞
(cid:48)
4,i
W
(cid:34)
(cid:22)
×
(cid:34)
µmaxλL−O(µ2
1
E4
(cid:35)
max) + O(µmax) − O(1)·E4
λL−O(µmax)
− E4·O(µmax)
λL−O(µmax)
max) O(µ3
O(µ2
max)
(cid:34)
0
0
(cid:34)
max) +O(µmax) − O(1)·E2
λL−O(µmax)
− E2·O(µmax)
λL−O(µmax)
max) +O(µmax) − O(1)·E4
λL−O(µmax)
− E4·O(µmax)
λL−O(µmax)
µmaxλL−O(µ2
µmaxλL−O(µ2
max·
E2
E4
1
1
+µ4
max·
×µ2
(cid:35)(cid:34)
(cid:35)
bv,c
(cid:35)(cid:34)
(cid:35)
bv,e·1
bv4,c
bv4,e·1
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
23
(a)
≤
+2µ2
−µmax(pT ⊗IM )zi−1
max·
(cid:3)(pT ⊗IM )vi
max(cid:107)(pT ⊗IM )vi(cid:107)2−2µmax
(cid:3)
Taking the conditional expectation of both sides of the above
expression given Fi−1 and recalling that E[viFi−1] = 0 based
on (17), we get
(cid:13)(cid:13)4(cid:12)(cid:12)(cid:12)Fi−1
(cid:111)
= E(cid:110)(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT⊗IM )zi−1
E[(cid:107) wc,i(cid:107)4Fi−1]
+E(cid:16)(cid:8)µ2
(cid:2)Tc(wc,i−1)−Tc( ¯wc,i−1)
(cid:17)
(cid:9)2(cid:12)(cid:12)Fi−1
(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )zi−1
(cid:13)(cid:13)2
(cid:107)(pT ⊗ IM )vi(cid:107)2(cid:12)(cid:12)Fi−1
· E(cid:2)
(cid:13)(cid:13)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
(cid:13)(cid:13)4
(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )zi−1
(cid:13)(cid:13)2
(cid:107)(pT ⊗ IM )vi(cid:107)2(cid:12)(cid:12)Fi−1
(cid:3)
· E(cid:2)
(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )zi−1
(cid:13)(cid:13)2
(cid:107)(pT ⊗ IM )vi(cid:107)2(cid:12)(cid:12)Fi−1
(cid:3)
· E(cid:2)
(cid:13)(cid:13)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
(cid:13)(cid:13)4
(cid:107)(pT ⊗ IM )vi(cid:107)4(cid:12)(cid:12)Fi−1
max · E(cid:2)
(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )zi−1
(cid:107)(pT ⊗IM )vi(cid:107)2(cid:12)(cid:12)Fi−1
(cid:3)
·E(cid:2)
(180)
where step (a) uses the inequality (x + y)2 ≤ 2x2 + 2y2. To
proceed, we call upon the following bounds.
Lemma 6 (Useful bounds): The following bounds hold for
max · E(cid:107)(pT ⊗ IM )vi(cid:107)4
max·
+ 2µ4
+10µ2
+ 2µ4
+8µ2
(cid:13)(cid:13)2
max·
max·
+2µ2
(cid:3)
=
arbitrary i:
∞
(181)
1 · λ4
U ·
U )3 · (cid:107)p(cid:107)4
1λ2
≤ γc · (cid:107) wc,i−1(cid:107)4
+
(cid:13)(cid:13)4
(cid:13)(cid:13)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
1 UL](cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [AT
E(cid:2)(cid:13)(cid:13)(pT ⊗ IM )vi
µmax
(λL − 1
2 µmax(cid:107)p(cid:107)2
· 1T P (4)[we,i−1]
(cid:13)(cid:13)4(cid:12)(cid:12)Fi−1
(cid:3)
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
≤ 216α4(cid:107)p(cid:107)4
1 · (cid:107) wc,i−1(cid:107)4
+ 216α4(cid:107)p(cid:107)4
1 ·
+ 27α4(cid:107)p(cid:107)4
1 · (cid:107) wc,0(cid:107)4 + 27α4 · (cid:107)p(cid:107)4
v4 · (cid:107)p(cid:107)4
+ σ4
(cid:13)(cid:13)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
(cid:13)(cid:13) ¯P [AT
E(cid:2)(cid:13)(cid:13)(pT ⊗ IM )vi
≤ γc · (cid:107) wc,i−1(cid:107)2
µmax
+
2 µmax(cid:107)p(cid:107)2
U · (cid:107)p(cid:107)2
1λ2
(cid:3)
λL − 1
· 1T P [we,i−1]
(cid:13)(cid:13)2(cid:12)(cid:12)Fi−1
∞ · 1T · P (4)[we,i−1]
(cid:13)(cid:13)2
(cid:13)(cid:13)2
1 · (cid:107)wo(cid:107)4
1 · λ2
U ·
1 UL]
∞
1
(182)
1 · P [ wc,i−1]
≤ 4α(cid:107)p(cid:107)2
+ 4α · (cid:107) ¯P [AT
+4α(cid:107) wc,0(cid:107)2·(cid:107)p(cid:107)2
Proof: See Appendix E.
1 UL](cid:107)2∞ · (cid:107)p(cid:107)2
1 +4α(cid:107)p(cid:107)2
1 · 1T P [we,i−1]
1·(cid:107)wo(cid:107)2 +σ2
v·(cid:107)p(cid:107)2
1
(183)
(184)
(cid:34)
(cid:35)
=
O(µ2
O(µ4
max)
max)
(176)
where the last step follows from basic matrix algebra. Recall-
(cid:48)
ing the definition of W
4,i in (150), we conclude (102) -- (103)
from (176).
APPENDIX C
PROOF OF LEMMA 4
A. Perturbation Bounds
Before pursuing the proof of Lemma 4, we first state a result
that bounds the fourth-order moments of the perturbation terms
that appear in (147), in a manner similar to the bounds we
already have for the second-order moments in (75) -- (78).
Lemma 5 (Fourth-order bounds on the perturbation terms):
Referring to (147), the following bounds hold for any i ≥ 0.
(177)
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
P (4)[zi−1] (cid:22) λ4
U ·
P (4)[s(1⊗wc,i−1)]
(cid:9)
(cid:22) 27λ4
U ·(cid:107) wc,i−1(cid:107)4·1+27λ4
U(cid:107) wc,0(cid:107)4·1+27·go
4
(178)
∞·11T ·P (4)[we,i−1]
(cid:12)(cid:12)Fi−1
E(cid:8)P (4)[vi]
(cid:13)(cid:13) ¯P [AT
(cid:13)(cid:13)4
(cid:22) 216α4 · 1 · P (4)[ wc,i−1]
+ 216α4 ·
+27α4·((cid:107) wc,0(cid:107)4 +(cid:107)wo(cid:107)4)·1+σ4
1 UL]
∞·11T ·P (4)[we,i−1]
(179)
v4·1
where go
4
Proof: See Appendix D.
(cid:44) P (4)[s(1 ⊗ wo)].
B. Recursion for the 4th order moment of wc,i
To begin with, note that by evaluating the squared Euclidean
norm of both sides of (147) we obtain:
(cid:107) wc,i(cid:107)2
=
(cid:13)(cid:13)2
(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )(zi−1 +vi)
(cid:13)(cid:13)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
(cid:13)(cid:13)2
(cid:13)(cid:13)(pT ⊗ IM )vi
(cid:2)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )zi−1
+ µ2
max ·
−2µmax·
(cid:13)(cid:13)2
=
(cid:3)T
· (pT ⊗ IM )vi
(cid:13)(cid:13)4
max·(cid:107)(pT ⊗IM )vi(cid:107)2−2µmax·
By further squaring both sides of the above expression, we get
(cid:107) wc,i(cid:107)4
=(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )zi−1
(cid:2)Tc(wc,i−1)−Tc( ¯wc,i−1)
+(cid:8)µ2
(cid:9)2
(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗IM )zi−1
(cid:13)(cid:13)2
(cid:2)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
(cid:3)T
(cid:13)(cid:13)2
(cid:13)(cid:13)Tc(wc,i−1)−Tc( ¯wc,i−1)−µmax·(pT ⊗ IM )zi−1
(cid:3)(pT ⊗IM )vi
−µmax·(pT ⊗IM )zi−1
·
· (pT ⊗ IM )vi
max·
· (cid:107)(pT ⊗ IM )vi(cid:107)2
−4µmax·
+2µ2
24
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
∞
(cid:111)
∞ · 1T · P (4)[we,i−1]
v4·(cid:107)p(cid:107)4
1·(cid:107)wo(cid:107)4 +σ4
1
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)2
∞
+ 2µ4
max ·
1 · λ4
U ·
1 · (cid:107) wc,i−1(cid:107)4
U )3 · (cid:107)p(cid:107)4
1λ2
Substituting (181) -- (184) into (180), we obtain
E[(cid:107) wc,i(cid:107)4Fi−1]
(cid:22) γc · (cid:107) wc,i−1(cid:107)4
µmax
+
(λL − 1
2 µmax(cid:107)p(cid:107)2
(cid:110)
· 1T P (4)[we,i−1]
216α4(cid:107)p(cid:107)4
+ 216α4(cid:107)p(cid:107)4
1 ·
(cid:110)
1·(cid:107) wc,0(cid:107)4 +27α4(cid:107)p(cid:107)4
+27α4(cid:107)p(cid:107)4
γc · (cid:107) wc,i−1(cid:107)2
(cid:111)
U · (cid:107)p(cid:107)2
1λ2
1·P [ wc,i−1]
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
max ·
λL − 1
(cid:110)
· 1T P [we,i−1]
4α(cid:107)p(cid:107)2
·
+4α·(cid:107) ¯P [AT
+4α(cid:107)p(cid:107)2
(cid:111)
1·1T P [we,i−1]
v·(cid:107)p(cid:107)2
1((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
µmax
2 µmax(cid:107)p(cid:107)2
1 UL](cid:107)2∞·(cid:107)p(cid:107)2
1 · λ2
U ·
+ 10µ2
+
1
We further call upon the following inequality to bound the last
term in (185):
(a · x + b · y)(c · x + d · y + e)
= ac · x2 + bd · y2 + (ad + bc)xy + ae · x + be · y
(cid:18)
(cid:18)
≤ ac·x2 +bd·y2 + (ad + bc)
bd+
=
1
(x2 + y2) + ae · x + be · y
2
ad+bc
y2 +ae·x+be·y
Applying the above inequality to the last term in (185) with
ad+bc
(cid:19)
(cid:19)
x2 +
ac+
2
2
1 UL](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [AT
∞
1 · (cid:107)wo(cid:107)2 + σ2
v · (cid:107)p(cid:107)2
1
a = γc
b =
U · (cid:107)p(cid:107)2
1λ2
1 · λ2
U ·
µmax
2 µmax(cid:107)p(cid:107)2
1
1 UL](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [AT
λL − 1
c = 4α(cid:107)p(cid:107)2
d = 4α(cid:107)p(cid:107)2
1 ·
e = 4α(cid:107)p(cid:107)2
1 · (cid:107) wc,0(cid:107)2 + 4α(cid:107)p(cid:107)2
x = (cid:107) wc,i−1(cid:107)2
y = 1T · P (4)[we,i−1] = (cid:107)we,i−1(cid:107)4
∞
(cid:111)
1 · λ2
U ·
U · (cid:107)p(cid:107)2
1λ2
µmax
2 µmax(cid:107)p(cid:107)2
(cid:110)
we get
(cid:13)(cid:13) ¯P [AT
γc · (cid:107) wc,i−1(cid:107)2
+
λL − 1
(cid:110)
· 1T P [we,i−1]
(cid:111)
1·P [ wc,i−1]+4α·(cid:107) ¯P [AT
4α(cid:107)p(cid:107)2
1 UL](cid:107)2∞·(cid:107)p(cid:107)2
(cid:19)
(cid:18)
(cid:18)
+4α(cid:107)p(cid:107)2
1((cid:107) wc,0(cid:107)2 +(cid:107)wo(cid:107)2)+σ2
v·(cid:107)p(cid:107)2
ac +
bd+
+ ae · (cid:107) wc,i−1(cid:107)2 + be · (cid:107)we,i−1(cid:107)2
·(cid:107) wc,i−1(cid:107)4 +
ad + bc
ad + bc
×
≤
2
2
1
(cid:13)(cid:13)2
∞
1 UL]
1·1T P [we,i−1]
(cid:19)
·(cid:107)we,i−1(cid:107)4
(a)
≤
=
2
2
c +
bd +
d + bc
d + bc
(cid:18)
(cid:19)
(cid:19)
λL− 1
2α(cid:107)p(cid:107)2
· (cid:107) wc,i−1(cid:107)4 +
(cid:18)
(cid:16)
+ e · (cid:107) wc,i−1(cid:107)2 + be · (cid:107)we,i−1(cid:107)2
1 · (cid:107) ¯P [AT
1 UL](cid:107)2∞
1 + 2α(cid:107)p(cid:107)2
4α(cid:107)p(cid:107)2
1 · µmax
(cid:16) 4α(cid:107)p(cid:107)4
U ·(cid:107) ¯P [AT
U (cid:107)p(cid:107)2
1·λ2
1 UL](cid:107)2∞
+
1λ2
2 µmax(cid:107)p(cid:107)2
U µmax
(cid:17)
U ·(cid:107) ¯P [AT
1 UL](cid:107)4∞ +2α(cid:107)p(cid:107)2
λL−1
1λ2
2 µmax(cid:107)p(cid:107)2
(cid:16)
1λ2
2α(cid:107)p(cid:107)4
U · µmax
U · (cid:107) ¯P [AT
1 UL](cid:107)2∞
+
λL − 1
1λ2
2 µmax(cid:107)p(cid:107)2
(cid:13)(cid:13)2
1·(cid:107)wo(cid:107)2 +σ2
4α(cid:107)p(cid:107)2
1·(cid:107) wc,0(cid:107)2 +4α(cid:107)p(cid:107)2
+
(cid:17)
(cid:16)
1λ2
+ (cid:107)p(cid:107)4
U · µmax
1 UL]
U ·
λL− 1
1λ2
2 µmax(cid:107)p(cid:107)2
4α·(cid:107) wc,0(cid:107)2 +4α·(cid:107)wo(cid:107)2 +σ2
·
v·
(cid:13)(cid:13) ¯P [AT
·(cid:107)we,i−1(cid:107)2
v·(cid:107)p(cid:107)2
1λ2
∞
+
1
· (cid:107)we,i−1(cid:107)4
(cid:17)
·(cid:107) wc,i−1(cid:107)4
1·(cid:107) ¯P [AT
(cid:17)
· (cid:107)we,i−1(cid:107)4
·(cid:107) wc,i−1(cid:107)2
1 UL](cid:107)2∞
(186)
(185)
where inequality (a) is using a = γc < 1, which is guaranteed
for sufficiently small step-sizes. Substituting (186) into (185),
we get
E[(cid:107) wc,i(cid:107)4Fi−1]
(cid:22) γc · (cid:107) wc,i−1(cid:107)4
+
1 UL](cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [AT
v4
+
∞
+ 2µ4
+ 10µ2
1 · λ4
U ·
U )3 · (cid:107)p(cid:107)4
1λ2
max ·
2α(cid:107)p(cid:107)4
λL − 1
µmax
(λL − 1
2 µmax(cid:107)p(cid:107)2
(cid:110)
· 1T P (4)[we,i−1]
(cid:13)(cid:13) ¯P [AT
(cid:13)(cid:13)4
216α4 · (cid:107) wc,i−1(cid:107)4
max(cid:107)p(cid:107)4
1 ·
(cid:111)
∞·1TP (4)[we,i−1]+27α4·(cid:107) wc,0(cid:107)4
1 UL]
+216α4·
(cid:110)(cid:16)
+ 27α4 · (cid:107)wo(cid:107)4 + σ4
4α(cid:107)p(cid:107)2
1 +2α(cid:107)p(cid:107)2
1λ2
U · µmax
(cid:16) 4α(cid:107)p(cid:107)4
U ·(cid:107) ¯P [AT
2 µmax(cid:107)p(cid:107)2
1λ2
1 · λ2
U · µmax
U · (cid:107) ¯P [AT
2 µmax(cid:107)p(cid:107)2
1λ2
1 · (cid:107) ¯P [AT
1 UL](cid:107)2∞
1λ2
U · µmax
U · (cid:107) ¯P [AT
2 µmax(cid:107)p(cid:107)2
1λ2
1 · (cid:107) wc,0(cid:107)2 + 4α(cid:107)p(cid:107)2
(cid:17)
1 · (cid:107) ¯P [AT
1 UL](cid:107)2∞
1 UL](cid:107)2∞
(cid:17)
· (cid:107)we,i−1(cid:107)4
v · (cid:107)p(cid:107)2
λL − 1
+ 2α(cid:107)p(cid:107)2
(cid:16)
2α(cid:107)p(cid:107)4
+
λL − 1
4α(cid:107)p(cid:107)2
· (cid:107) wc,i−1(cid:107)2
(cid:16)
1λ2
+ (cid:107)p(cid:107)4
U · µmax
U ·
λL− 1
1λ2
2 µmax(cid:107)p(cid:107)2
4α·(cid:107) wc,0(cid:107)2 +4α·(cid:107)wo(cid:107)2 +σ2
·
v·
1 · (cid:107)wo(cid:107)2 + σ2
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)2
(cid:17)
·(cid:107) wc,i−1(cid:107)4
1 UL](cid:107)4∞
1 UL](cid:107)2∞
(cid:17)
∞
+
+
1
·(cid:107)we,i−1(cid:107)2(cid:111)
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
∞
(a)
U )3 · (cid:107)p(cid:107)4
1λ2
= γc · P (4)[ wc,i−1]
µmax
+
(λL − 1
2 µmax(cid:107)p(cid:107)2
(cid:110)
· 1T P (4)[we,i−1]
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
216α4 · P (4)[ wc,i−1]
max(cid:107)p(cid:107)4
1 ·
+ 216α4 ·
+ 2µ4
1 · λ4
U ·
∞ · 1T P (4)[we,i−1]
=
v4
+
+
1 UL](cid:107)4∞
(cid:111)
+ 27α4 · (cid:107) wc,0(cid:107)4 + 27α4 · (cid:107)wo(cid:107)4 + σ4
(cid:17)
1 · (cid:107) ¯P [AT
1 UL](cid:107)2∞
1 UL](cid:107)2∞
1 +2α(cid:107)p(cid:107)2
+ 10µ2
max·
2α(cid:107)p(cid:107)4
λL − 1
(cid:110)(cid:16)
4α(cid:107)p(cid:107)2
1λ2
U · µmax
(cid:16) 4α(cid:107)p(cid:107)4
U ·(cid:107) ¯P [AT
2 µmax(cid:107)p(cid:107)2
1λ2
1 · λ2
U · µmax
U · (cid:107) ¯P [AT
1λ2
2 µmax(cid:107)p(cid:107)2
1 · (cid:107) ¯P [AT
1 UL](cid:107)2∞
1λ2
U · µmax
U · (cid:107) ¯P [AT
1λ2
2 µmax(cid:107)p(cid:107)2
λL − 1
+ 2α(cid:107)p(cid:107)2
2α(cid:107)p(cid:107)4
+
λL − 1
(cid:16)
· 1T P (4)[we,i−1]
4α(cid:107)p(cid:107)2
· P [ wc,i−1]
(cid:16)
+ (cid:107)p(cid:107)4
1λ2
U · µmax
U ·
λL− 1
1λ2
2 µmax(cid:107)p(cid:107)2
4α·(cid:107) wc,0(cid:107)2 +4α·(cid:107)wo(cid:107)2 +σ2
·
v·
γc + 432µ4
1 · (cid:107) wc,0(cid:107)2 + 4α(cid:107)p(cid:107)2
1 · (cid:107)wo(cid:107)2 + σ2
1 UL](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [AT
(cid:17)
v · (cid:107)p(cid:107)2
(cid:111)
·1T P [we,i−1]
1 UL](cid:107)2∞
(cid:26)
(cid:17)
∞
+
1
1
+
(cid:26)
+ 10µ2
+ 10µ2
(cid:13)(cid:13)4
+ 432µ4
(cid:17)(cid:27)
1 UL](cid:107)2∞
1 UL](cid:107)2∞
1 · (cid:107) ¯P [AT
1 UL](cid:107)2∞
max ·
2α(cid:107)p(cid:107)4
λL − 1
µmax · (cid:107)p(cid:107)4
λL − 1
1 · (cid:107) ¯P [AT
1λ2
U · µmax
U · (cid:107) ¯P [AT
1λ2
2 µmax(cid:107)p(cid:107)2
(cid:13)(cid:13) ¯P [AT
(cid:16) 4α(cid:107)p(cid:107)4
(cid:16)
maxα4(cid:107)p(cid:107)4
1 +2α(cid:107)p(cid:107)2
4α(cid:107)p(cid:107)2
1λ2
U · µmax
U ·(cid:107) ¯P [AT
1λ2
2 µmax(cid:107)p(cid:107)2
1 · λ4
U ·
1 UL]
∞
(λL − 1
1λ2
2 µmax(cid:107)p(cid:107)2
U )3
1 · (cid:107) ¯P [AT
1 UL](cid:107)4∞
maxα4(cid:107)p(cid:107)4
1 · λ2
U · µmax
U · (cid:107) ¯P [AT
max ·
2 µmax(cid:107)p(cid:107)2
1λ2
(cid:17)(cid:27)
+ 2α(cid:107)p(cid:107)2
1 UL](cid:107)2∞
2α(cid:107)p(cid:107)4
+
λL − 1
(cid:16)
· P [ wc,i−1]
(cid:16)
1λ2
U · µ3
10(cid:107)p(cid:107)4
1 UL]
λL− 1
2 µmax(cid:107)p(cid:107)2
4α·(cid:107) wc,0(cid:107)2 +4α·(cid:107)wo(cid:107)2 +σ2
·
v·
max · (cid:107)p(cid:107)4
1 ·
(cid:16)
max · 20α(cid:107)p(cid:107)2
2 + (cid:107) ¯P [AT
(cid:26)
· P (4)[ wc,i−1]
µmax · (cid:107)p(cid:107)4
(cid:0)27α4 · ((cid:107) wc,0(cid:107)4 + (cid:107)wo(cid:107)4) + σ4
(cid:17)(cid:27)
1·(cid:107) wc,0(cid:107)2 +4α(cid:107)p(cid:107)2
(cid:13)(cid:13)2
(cid:17)
· 1T · P (4)[we,i−1]
4α(cid:107)p(cid:107)2
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
(cid:1)
· 1T · P [we,i−1]
2 µmax(cid:107)p(cid:107)2
2 µmax(cid:107)p(cid:107)2
(cid:13)(cid:13) ¯P [AT
max · 432α4(cid:107)p(cid:107)4
1·(cid:107)wo(cid:107)2 +σ2
λL + 1
λL − 1
1 UL](cid:107)2∞ ·
1 · λ4
U ·
(λL − 1
2 µmax(cid:107)p(cid:107)2
1 · (cid:107) ¯P [AT
maxα4(cid:107)p(cid:107)4
∞
1λ2
U )3
1 UL](cid:107)4∞
max
U ·
1λ2
1λ2
U
1λ2
U
+ 432µ4
max ·
+ µ2
∞
v4
·
1
1
γc + µ4
+
(cid:26)
+10µ2
+ 2µ4
+
1 UL](cid:107)4∞
=
+
·P (4)[ wc,i−1]
v·(cid:107)p(cid:107)2
1
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
25
·P (4)[ wc,i−1]
1 UL](cid:107)2∞
U · (cid:107) ¯P [AT
2 µmax(cid:107)p(cid:107)2
1λ2
U
1λ2
U
(cid:17)(cid:27)
1 UL](cid:107)2∞
1λ2
U
·1T ·P (4)[we,i−1]
1 · (cid:107)wo(cid:107)2
+ 20µ2
(cid:16)
·
+
1 · (cid:107) ¯P [AT
maxα(cid:107)p(cid:107)2
1 · λ2
2(cid:107)p(cid:107)2
µmax ·
λL − 1
(cid:16)
λL + 1
2 µmax(cid:107)p(cid:107)2
λL− 1
2 µmax(cid:107)p(cid:107)2
(cid:17)
4α(cid:107)p(cid:107)2
max ·
v · (cid:107)p(cid:107)2
1
U · µ3
1λ2
2 µmax(cid:107)p(cid:107)2
· P [ wc,i−1]
+ 10µ2
1 · (cid:107) wc,0(cid:107)2 + 4α(cid:107)p(cid:107)2
1 UL](cid:13)(cid:13)2
(cid:13)(cid:13) ¯P [AT
(cid:17)
+ σ2
(cid:16)
10(cid:107)p(cid:107)4
λL− 1
4α·(cid:107) wc,0(cid:107)2 +4α·(cid:107)wo(cid:107)2 +σ2
·
v·
max·(cid:107)p(cid:107)4
1·
(cid:0)27α4·((cid:107) wc,0(cid:107)4 +(cid:107)wo(cid:107)4)+σ4
max
U ·
1λ2
∞
v4
· 1T · P [we,i−1]
(cid:1) (187)
+ 2µ4
+
(cid:17)
where step (a) is using the following relations:
(cid:107)we,i−1(cid:107)4 = 1T · P (4)[we,i−1]
(cid:107)we,i−1(cid:107)2 = 1T · P [we,i−1]
(cid:107) wc,i−1(cid:107)4 = P (4)[ wc,i−1]
(cid:107) wc,i−1(cid:107)2 = P [ wc,i−1]
Using the notation defined in (155) -- (159) and taking expec-
tations of both sides of (187) with respect to Fi−1, we obtain
EP (4)[ wc,i] (cid:22) fcc(µmax) · EP (4)[ wc,i−1]
+ fce(µmax) · 1T · EP (4)[we,i−1]
+ hcc(µmax) · EP [ wc,i−1]
+ hce(µmax) · 1T · EP [we,i−1]
+ µ4
max · bv4,c
(188)
8
(a)
2 M
DN−1we,i−1−URAT
(cid:22) Γe,4 · P (4)[we,i−1]
+
C. Recursion for the 4th order moment of we,i
We now derive an inequality recursion for E(cid:107)we,i(cid:107)4. First,
applying P (4)[·] operator to both sides of (148), we get
(cid:17)
(cid:1)(cid:105)
= P (4)(cid:104)
(cid:0)s(1⊗we,i−1)+zi−1 +vi
P (4)[we,i]
(cid:1)(cid:3)
(cid:0)s(1⊗wc,i−1)+zi−1 +vi
(1−λ2(A))3 ·P (4)(cid:2)
(cid:13)(cid:13) ¯P [URAT
2 M](cid:13)(cid:13)4
(cid:3)
·P (4)(cid:2)s(1 ⊗ wc,i−1)+zi−1 +vi
∞·11T
(cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [URAT
(cid:3)
·P (4)(cid:2)s(1 ⊗ wc,i−1)+zi−1 +vi
(cid:22) Γe,4·P (4)[we,i−1]
(1−λ2(A))3 ·
+
(cid:22) Γe,4·P (4)[we,i−1]
+µ4
∞·11T
URAT
max·
2 M
2 ]
(c)
(b)
8
8
(1−λ2(A))3 ·
(cid:13)(cid:13) ¯P [URAT
2 ](cid:13)(cid:13)4
∞
= Γe,4 · P (4)[we,i−1]
+
8µ4
max
(1 − λ2(A))3
·11T
26
(d)
(cid:22) Γe,4 · P (4)[we,i−1]
+
8µ4
∞
max
(cid:105)
· 11T
1
3 · 3vi
1
3 ·3zi−1 +
(1 − λ2(A))3
3 ·3s(1 ⊗ wc,i−1)+
· P (4)(cid:104) 1
(cid:12)(cid:12) ¯P [URAT
2 ](cid:13)(cid:13)4
(cid:110) 1
3 · P (4)(cid:2)3s(1 ⊗ wc,i−1)(cid:3) +
3 · P (4)(cid:2)3zi−1
(cid:3)(cid:111)
3 · P (4)(cid:2)3vi
(cid:13)(cid:13) ¯P [URAT
2 ](cid:13)(cid:13)4
(cid:8)27 · P (4)[s(1 ⊗ wc,i−1)] + 27 · P (4)[zi−1]
+ 27 · P (4)[vi](cid:9)
(1 − λ2(A))3 ·
max ·
×
∞ · 11T
×
+
1
1
(e)
= Γe,4 · P (4)[we,i−1]
8
+ µ4
(cid:3)
2 ] · ¯P [M]
2 M] (cid:22) ¯P [UR] · ¯P [AT
(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13) ¯P [URAT
(cid:13)(cid:13)∞ ≤
(cid:13)(cid:13) ¯P [UR]
2 M](cid:13)(cid:13)∞ ≤ µmax·
where step (a) uses (145), step (b) uses (141), step (c) uses
the sub-multiplicative property (152) from Part I [2] and the
sub-multiplicative property of matrix norms:
¯P [URAT
⇒
⇒
step (d) uses the convex property (138), and step (e) uses
the scaling property in Lemma 3. Applying the expectation
operator to both sides of the above inequality conditioned on
Fi−1, we obtain
(cid:13)(cid:13)∞·
(cid:13)(cid:13) ¯P [AT
(cid:13)(cid:13)∞·
(cid:13)(cid:13) ¯P [M]
2 ](cid:13)(cid:13)∞
(cid:13)(cid:13) ¯P [AT
(cid:13)(cid:13) ¯P [UR](cid:13)(cid:13)∞·
(cid:13)(cid:13)∞
2 M]
2 ]
E(cid:2)P (4)[we,i](cid:12)(cid:12)Fi−1
(cid:3)
2 ](cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [URAT
(cid:22) Γe,4 · P (4)[we,i−1]
+
8µ4
max
∞
(cid:111)
+27·P (4)[zi−1]+27·E{P (4)[vi]Fi−1}
(1 − λ2(A))3
·11T ·
(cid:110)
27·P (4)[s(1⊗wc,i−1)]
In the above expression, we are using the fact that wc,i−1 and
zi−1 are determined by the history up to time i−1. Therefore,
given Fi−1, these two quantities are deterministic and known
so that
(cid:9) = P (4)[s(1⊗wc,i−1)]
(cid:9) = P (4)[zi−1]
Substituting (177) -- (179) into the right-hand side of the above
inequality, we get
E(cid:8)P (4)[s(1⊗wc,i−1)](cid:12)(cid:12)Fi−1
E(cid:8)P (4)[zi−1](cid:12)(cid:12)Fi−1
(cid:12)(cid:12)Fi−1
E(cid:2)P (4)[we,i]
(cid:3)
(cid:22) Γe,4 · P (4)[we,i−1]
(cid:26)
(cid:104)
8
+ µ4
(1 − λ2(A))3 ·
(cid:104)
(cid:104)
(cid:13)(cid:13) ¯P [URAT
1 UL](cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [AT
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
U ·(cid:107) wc,i−1(cid:107)4·1+27λ4
λ4
U ·
216α4 · 1 · P (4)[ wc,i−1]
+ 216α4 ·
27·
+ 27 ·
+ 27 ·
max ·
27λ4
·
(cid:13)(cid:13)4
(cid:105)
2 ]
∞ · 11T
(cid:105)
U(cid:107) wc,0(cid:107)4·1+27·go
∞ · 11T · P (4)[we,i−1]
4
∞·11T ·P (4)[we,i−1]
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
(cid:105)(cid:27)
v4 · 1
1 UL](cid:107)4∞
(cid:104)
=
(cid:104)
(cid:22)
+ 27α4 · ((cid:107) wc,0(cid:107)4 + (cid:107)wo(cid:107)4) · 1 + σ4
Γe,4 + µ4
max ·
+µ4
max·
+µ4
max ·
+1T go
U + 216α4)
216N · (λ4
(1 − λ2(A))3
2 ](cid:107)4∞ · 11T(cid:105)
· (cid:107) ¯P [AT
· P (4)[we,i−1]
(cid:110)
27(cid:2)(λ4
(cid:107) ¯P [URAT
(cid:111)
· (cid:107) ¯P [URAT
5832N · (λ4
(1−λ2(A))3
216·(cid:107) ¯P [URAT
(1−λ2(A))3
2 ](cid:107)4∞
U+8α4)
4 +α4·N(cid:107)wo(cid:107)4(cid:3)+σ4
2 ](cid:107)4∞ · 11T(cid:105)
216N · (λ4
max ·
· (cid:107) ¯P [URAT
5832N · (λ4
U + 8α4)
(1 − λ2(A))3
1 UL](cid:107)4∞
·
v4 · N
2 ](cid:107)4∞·P (4)[wc,i−1]·1
U +α4)·(cid:107) wc,0(cid:107)4·N
· 1
U + 216α4)
· (cid:107) ¯P [AT
· P (4)[we,i−1]
(cid:107) ¯P [URAT
2 ](cid:107)4∞
(cid:110)
27(cid:2)(λ4
(cid:111)
U + α4)·(cid:107) wc,0(cid:107)4
(189)
2 ](cid:107)4∞
·
v4
+ µ4
(1−λ2(A))3
max ·
· P (4)[wc,i−1] · 1
max ·
+(cid:107)go
216N · (cid:107) ¯P [URAT
(1−λ2(A))3
4(cid:107)∞ +α4·(cid:107)wo(cid:107)4(cid:3) + σ4
+ µ4
Γe,4 + µ4
· 1
4 ≤ N(cid:107)go
where the last step uses 1T go
4(cid:107)∞. Using the
notation defined in (160) -- (161) and applying the expectation
operator to both sides of (189) with respect to Fi−1, we arrive
at
4 ≤ 1T go
EP (4)[we,i] (cid:22) Fee(µmax) · EP (4)[we,i−1]
+ fec(µmax) · 1 · EP (4)[ wc,i−1]
+ µ4
max · bv4,e · 1
(190)
APPENDIX D
PROOF OF LEMMA 5
First, we establish the bound for P [zi−1] in (177). To begin
with, recall the following two relations from (88) and (69) in
Part I [2]:
1 wi
φi = AT
wi = 1 ⊗ wc,,i + (UL ⊗ IM )we,i
(191)
(192)
By the definition of zi−1 in (74), we get:
P (4)[zi−1] = P (4)[s(φi−1) − s(1 ⊗ wc,i−1)]
(b)
(a)
= P (4)[s(AT
1 wi−1) − s(1 ⊗ wc,i−1)]
(cid:3)
= P (4)(cid:2)s(cid:0)1 ⊗ wc,i−1 +(AT
− s(1 ⊗ wc,i−1)(cid:3)
U · P (4)(cid:2)(AT
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
1 UL ⊗ IM )we,i−1
(cid:22) λ4
(cid:22) λ4
U ·
∞·11T ·P (4)[we,i−1]
(d)
(c)
1 UL ⊗ IM )we,i−1
(cid:1)
where step (a) substitutes (191), step (b) substitutes (192), step
(c) uses the variance relation (142), and step (d) uses property
(141).
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
Next, we prove the bound for P (4)[s(1⊗ wc,i−1)]. It holds
(cid:105)
1
3 ·3·s(1 ⊗ wo)
that
P (4)[s(1 ⊗ wc,i−1)]
1
1
1
(a)
+
(cid:22)
= P (4)(cid:104) 1
3 ·3(cid:0)s(1 ⊗ wc,i−1)−s(1 ⊗ ¯wc,i−1)(cid:1)
3 ·3(cid:0)s(1 ⊗ ¯wc,i−1)−s(1 ⊗ wo)(cid:1)+
3 · P (4)(cid:2)3(cid:0)s(1 ⊗ wc,i−1) − s(1 ⊗ ¯wc,i−1)(cid:1)(cid:3)
3 · P (4)(cid:2)3(cid:0)s(1 ⊗ ¯wc,i−1) − s(1 ⊗ wo)(cid:1)(cid:3)
3 · P (4)(cid:2)3 · s(1 ⊗ wo)(cid:3)
= 33 · P (4)(cid:2)s(1 ⊗ wc,i−1)−s(1 ⊗ ¯wc,i−1)(cid:3)
+ 33 · P (4)(cid:2)s(1 ⊗ ¯wc,i−1)−s(1 ⊗ wo)(cid:3)
+ 33 · P (4)(cid:2)s(1 ⊗ wo)(cid:3)
U · P (4)(cid:2)1 ⊗ (wc,i−1 − ¯wc,i−1)(cid:3)
+
+
(c)
(b)
1
(cid:22) 27λ4
+27λ4
U ·P (4)[1⊗( ¯wc,i−1−wo)]+27 · P (4)[s(1 ⊗ wo)]
U · (cid:107) wc,i−1(cid:107)4 · 1 + 27λ4
U · (cid:107) ¯wc,i−1 − wo(cid:107)4 · 1
U · (cid:107) wc,i−1(cid:107)4 · 1 + 27λ4
U · (cid:107) wc,i−1(cid:107)4 · 1
(d)
= 27λ4
+ 27 · P (4)[s(1 ⊗ wo)]
= 27λ4
+ 27 · P (4)[s(1 ⊗ wo)]
(cid:22) 27λ4
+27 · P (4)[s(1 ⊗ wo)]
(e)
U · (cid:107) wc,i−1(cid:107)4·1+27λ4
U(cid:107) wc,0(cid:107)4·1
27
(cid:1)
(cid:3)
1 ULwe,i−1−1⊗ ¯wc,i−1
1 ULwe,i−1−1⊗ ¯wc,i−1
1
1
(b)
(c)
(a)
+
1 ULwe,i−1
3 ·3·1⊗wo(cid:105)
= P (4)(cid:104) 1
3 ·3(cid:0)1⊗wc,i−1 +AT
3 ·3(cid:0)1⊗ ¯wc,i−1−1⊗wo(cid:1)+
(cid:22) 27 · P (4)(cid:2)1 ⊗ wc,i−1 +AT
+27 · P (4)(cid:2)1 ⊗ ¯wc,i−1−1 ⊗ wo(cid:3)
+ 27 · P (4)(cid:2)1 ⊗ wo(cid:3)
= 27 · P (4)(cid:2)1 ⊗ wc,i−1 + AT
(cid:3)
+ 27 · P (4)(cid:2)1 ⊗ wc,i−1
(cid:3) + 27 · P (4)(cid:2)1 ⊗ wo(cid:3)
(cid:16)
8·P (4)(cid:2)1⊗ wc,i−1
(cid:3)+8·P (4)(cid:2)
(cid:3)+27·P (4)(cid:2)1⊗wo(cid:3)
+27·P (4)(cid:2)1⊗ wc,i−1
AT
1 ULwe,i−1
= 216·(cid:107) wc,i−1(cid:107)4·1+216·P (4)(cid:2)
(cid:3)
+ 27 · (cid:107) wc,i−1(cid:107)4 · 1 + 27 · P (4)(cid:2)1 ⊗ wo(cid:3)
+27·(cid:107) wc,i−1(cid:107)4·1+27·P (4)(cid:2)1⊗wo(cid:3)
+27 · (cid:107) wc,0(cid:107)4·1+27·P (4)(cid:2)1⊗wo(cid:3)
(cid:22) 216·(cid:107) wc,i−1(cid:107)4·1
AT
1 UL
+216·
(cid:22) 216·(cid:107) wc,i−1(cid:107)4·1
AT
1 UL
+216·
∞·11T ·P (4)[we,i−1]
∞·11T ·P (4)[we,i−1]
AT
1 ULwe,i−1
(cid:22) 27·
(f )
(d)
(e)
(cid:3)(cid:17)
= 216·(cid:107) wc,i−1(cid:107)4·1
AT
1 UL
+216·
+27 · ((cid:107) wc,0(cid:107)4 +(cid:107)wo(cid:107)4) · 1
∞·11T ·P (4)[we,i−1]
(cid:13)(cid:13) ¯P(cid:2)
(cid:13)(cid:13) ¯P(cid:2)
(cid:13)(cid:13) ¯P(cid:2)
(cid:3)(cid:13)(cid:13)4
(cid:3)(cid:13)(cid:13)4
(cid:3)(cid:13)(cid:13)4
(194)
1 wi−1 = φi−1
where step (a) uses the convexity property (138), step (b) uses
the scaling property in Lemma 3, step (c) uses the variance
relation (142), step (d) uses the definition of the operator
P (4)[·], and step (e) uses the bound (cid:107) wc,i(cid:107)2 ≤ γ2i
c · (cid:107) wc,0(cid:107)2
from (110) of Part I [2] and the fact that γc < 1.
Finally, we establish the bound on P (4)[vi] in (179). Intro-
duce the M N × 1 vector x according to (191) -- (192):
We partition x into block form as x = col{x1, . . . , xN},
where each xk is M × 1. Then, by the definition of vi from
(73), we have
x (cid:44) 1 ⊗ wc,i−1 + AT
1 ULwe,i−1 ≡ AT
(cid:111)
E(cid:110)
P (4)[vi](cid:12)(cid:12)Fi−1
= E(cid:110)
P (4)(cid:2)si(x) − s(x)(cid:3)(cid:12)(cid:12)Fi−1
= col(cid:8)E(cid:2)
E(cid:2)
α4 · (cid:107)x1(cid:107)4 + σ4
(cid:111)
(cid:107)s1,i(x1) − s1(x1)(cid:107)4Fi−1
(cid:107)sN,i(xN ) − sN (xN )(cid:107)4Fi−1
(cid:22)
(a)
v4
...
(cid:3), . . . ,
(cid:3)(cid:9)
α4 · (cid:107)xN(cid:107)4 + σ4
= α4 · P (4)[x] + σ4
v4
(193)
where step (a) uses (37). Now we bound EP (4)[x] to complete
the proof:
v4 · 1
P (4)[x] = P (4)(cid:2)1 ⊗ wc,i−1 + AT
1 ULwe,i−1
(cid:3)
where step (a) uses the convexity property (138) and the
scaling property in Lemma 3, step (b) uses the variance
relation (142), step (c) uses the convexity property (138),
step (d) uses the definition of the operator P (4)[·], step (e)
uses the variance relation (140), and step (f) uses the bound
c · (cid:107) wc,0(cid:107)2 from (110) of Part I [2] and γc < 1.
(cid:107) wc,i(cid:107)2 ≤ γ2i
Substituting (194) into (193), we obtain (179).
(cid:3)
APPENDIX E
PROOF OF LEMMA 6
1
γc
γc ·
(cid:13)(cid:13)4
First, we prove (181). It holds that
(cid:13)(cid:13)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
= P (4)(cid:2)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
= P (4)(cid:104)
+ (1 − γc) · −µmax
(cid:22) γc · P (4)(cid:2) 1
+ (1 − γc) · P (4)(cid:2)−µmax
(cid:0)Tc(wc,i−1) − Tc( ¯wc,i−1)(cid:1)
(cid:105)
(cid:0)Tc(wc,i−1) − Tc( ¯wc,i−1)(cid:1)(cid:3)
1 − γc · (pT ⊗ IM )zi−1
(cid:3)
c · P (4)(cid:2)(cid:0)Tc(wc,i−1) − Tc( ¯wc,i−1)(cid:1)(cid:3)
1 − γc · (pT ⊗ IM )zi−1
(1 − γc)4 · P (4)(cid:2)(pT ⊗ IM )zi−1
+ (1 − γc) ·
(b)
= γc ·
1
γ4
(cid:3)
µ4
max
γc
(a)
28
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
= γc · P (4)[ wc,i−1]
(d)
= γc · P (4)[ wc,i−1]
(c)
(cid:22) γc · P (4)[wc,i−1 − ¯wc,i−1]
+
µ4
max
k=1
max
max
µ4
µ4
(cid:3)
pkzk,i−1
(cid:33)4
(1 − γc)3 ·
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:32) N(cid:88)
(cid:32) N(cid:88)
(1 − γc)3 · P (4)(cid:2)(pT ⊗ IM )zi−1
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)4
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
N(cid:88)
pk(cid:80)N
l=1 pl (cid:107)zk,i−1(cid:107)4
N(cid:88)
(1 − γc)3 ·(cid:107)p(cid:107)3
1·
µmax(cid:107)p(cid:107)3
(λL−1
2 µmax(cid:107)p(cid:107)2
(1 − γc)3 ·
(1 − γc)3 ·
pk(cid:80)N
(cid:33)4
zk,i−1
l=1 pl
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)4
µ4
µ4
max
max
k=1
k=1
k=1
l=1
l=1
pl
pl
·
·
pk(cid:107)zk,i−1(cid:107)4
(e)
(cid:22) γc · P (4)[ wc,i−1]
+
+
+
= γc·P (4)[ wc,i−1]+
(f )
= γc·P (4)[ wc,i−1]+
(g)
(cid:22) γc · P (4)[ wc,i−1]
µmax(cid:107)p(cid:107)3
+
(λL − 1
2 µmax(cid:107)p(cid:107)2
· 11T P (4)[we,i−1]
1
= γc · (cid:107) wc,i−1(cid:107)4
U ·(cid:107)p(cid:107)4
1·
+
µmaxλ4
U )3 · pT · λ4
U ·
1λ2
1 UL](cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [AT
∞
1
U )3 ·pT ·P (4)[zi−1]
1λ2
1 UL](cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [AT
∞
(λL−1
2 µmax(cid:107)p(cid:107)2
1λ2
U )3
·1T P (4)[we,i−1]
where step (a) uses property (138), step (b) uses the scaling
property in Lemma 3, step (c) uses property (143), step (d)
introduces zk,i−1 as the kth M × 1 sub-vector of z1−1 =
col{z1,i−1, . . . , zN,i−1}, step (e) applies Jensen's inequality
to the convex function (cid:107)·(cid:107)4, step (f) uses the definition of the
operator P (4)[·], and step (g) uses bound (177).
Second, we prove (182). Let vk,i denote the kth M × 1
sub-vector of vi = col{v1,i, . . . , vN,i}. Then,
=
pl
l=1
k=1
pkvk,i
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)4(cid:12)(cid:12)(cid:12)Fi−1
E(cid:2)(cid:13)(cid:13)(pT ⊗ IM )vi
(cid:13)(cid:13)4(cid:12)(cid:12)Fi−1
(cid:3)
= E(cid:104)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:13)(cid:13)(cid:13)4(cid:12)(cid:12)(cid:12)Fi−1
(cid:105)
· E(cid:104)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:33)4
(cid:32) N(cid:88)
pk(cid:80)N
(cid:33)4
(cid:32) N(cid:88)
E(cid:104)
N(cid:88)
pk(cid:80)N
1 · pT · E(cid:8)P (4)[vi](cid:12)(cid:12)Fi−1
(cid:9)
(cid:107)vk,i(cid:107)4 Fi−1
(cid:110)
1 UL](cid:13)(cid:13)4
(cid:13)(cid:13) ¯P [AT
216α4 · 1 · P (4)[ wc,i−1]
1 · pT ·
+ 216α4 ·
+ 27α4 · ((cid:107) wc,0(cid:107)4 + (cid:107)wo(cid:107)4) · 1 + σ4
(cid:111)
∞·11T ·P (4)[we,i−1]
v4 · 1
= (cid:107)p(cid:107)3
(cid:22) (cid:107)p(cid:107)3
(cid:105)
(cid:105)
l=1 pl
l=1 pl
vk,i
≤
k=1
k=1
l=1
pl
(a)
(c)
(b)
·
(cid:13)(cid:13) ¯P [AT
1 UL](cid:13)(cid:13)4
= 216α4(cid:107)p(cid:107)4
1 · (cid:107) wc,i−1(cid:107)4
+ 216α4(cid:107)p(cid:107)4
1 ·
+ 27α4(cid:107)p(cid:107)4
1 · (cid:107) wc,0(cid:107)4 + 27α4 · (cid:107)p(cid:107)4
+ σ4
v4 · (cid:107)p(cid:107)4
1
∞ · 1T · P (4)[we,i−1]
1 · (cid:107)wo(cid:107)4
(a)
=
γc
max
µ2
µ2
1
γc
1
γ2
(cid:13)(cid:13)2
= γc ·
= γc ·
≤ γc ·
+ (1 − γc) ·
+ (1 − γc) ·
(1 − γc)2 ·
Third, we prove (183):
+ (1 − γc) · −µmax
where step (a) applies Jensen's inequality to the convex
function (cid:107) · (cid:107)4, step (b) uses the definition of the operator
P (4)[·], and step (c) substitutes (179).
1
c · P [Tc(wc,i−1) − Tc( ¯wc,i−1)]
γ2
(cid:0)Tc(wc,i−1) − Tc( ¯wc,i−1)(cid:1)
(cid:0)Tc(wc,i−1) − Tc( ¯wc,i−1)(cid:1)(cid:13)(cid:13)(cid:13)(cid:13)2
1 − γc · (pT ⊗ IM )zi−1
(cid:13)(cid:13)(cid:13)(cid:13)−µmax
(cid:13)(cid:13)Tc(wc,i−1) − Tc( ¯wc,i−1) − µmax · (pT ⊗ IM )zi−1
(cid:13)(cid:13)(cid:13)γc ·
(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)(cid:13) 1
(cid:13)(cid:13)(cid:13)(cid:13)2
1 − γc · (pT ⊗ IM )zi−1
(cid:13)(cid:13)2
(cid:13)(cid:13)(pT ⊗ IM )zi−1
c · (cid:107)Tc(wc,i−1) − Tc( ¯wc,i−1)(cid:107)2
(cid:13)(cid:13)2
(cid:13)(cid:13)(pT ⊗ IM )zi−1
(cid:13)(cid:13)(pT ⊗ IM )zi−1
(cid:13)(cid:13)2
(cid:13)(cid:13)(pT ⊗ IM )zi−1
(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) N(cid:88)
pk(cid:80)N
N(cid:88)
pk(cid:80)N
l=1 pl (cid:107)zk,i−1(cid:107)2
·
U · (cid:107)p(cid:107)1 · pT · P [zi−1]
1λ2
= γc · (cid:107) wc,i−1(cid:107)2 +
= γc · (cid:107) wc,i−1(cid:107)2
µmax
U ·
+
2(cid:107)p(cid:107)2
1λ2
≤ γc · (cid:107) wc,i−1(cid:107)2
µmax
U ·
+
2(cid:107)p(cid:107)2
1λ2
= γc · (cid:107) wc,i−1(cid:107)2 +
≤ γc · (cid:107) wc,i−1(cid:107)2
µmax
U · (cid:107)p(cid:107)1 · pT · λ2
+
1λ2
2(cid:107)p(cid:107)2
+ (1 − γc) ·
(cid:22) γc · P [wc,i−1 − ¯wc,i−1] +
µmax
= γc · (cid:107) wc,i−1(cid:107)2 +
2(cid:107)p(cid:107)2
µmax
2(cid:107)p(cid:107)2
(cid:16) N(cid:88)
(cid:16) N(cid:88)
1 − γc ·
U ·
1λ2
l=1
µmax
2(cid:107)p(cid:107)2
(1 − γc)2 ·
U · (cid:107) ¯P [AT
1 UL](cid:107)2∞
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)2
λL − 1
λL − 1
λL − 1
λL − 1
λL − 1
U ·
1λ2
pkzk,i−1
(cid:17)2
(cid:17)2
zk,i−1
l=1 pl
µ2
max
max
k=1
k=1
k=1
l=1
pl
pl
(d)
(c)
(b)
·
λL − 1
· 11T · P [we,i−1]
= γc · (cid:107) wc,i−1(cid:107)2
µmax
U ·(cid:107)p(cid:107)2
+
1λ2
2(cid:107)p(cid:107)2
λL− 1
1 UL](cid:107)2∞·1T P [we,i−1]
where steps (a) and (c) apply Jensen's inequality to the convex
function (cid:107) · (cid:107)2, step (b) uses property P [Tc(x) − Tc(y)] (cid:22)
U ·(cid:107) ¯P [AT
1·λ2
CHEN AND SAYED: ON THE LEARNING BEHAVIOR OF ADAPTIVE NETWORKS -- PART II: PERFORMANCE ANALYSIS
29
c · P [x − y] from (164) in Part I [2], and step (d) substitutes
γ2
the bound in (75).
Finally, we prove (184). With the block structure vi =
col{v1,i, . . . , vN,i} defined previously, we have
(cid:105)
(cid:105)
(a)
=
pl
l=1
k=1
k=1
vk,i
pkvk,i
l=1 pl
(cid:13)(cid:13)2(cid:12)(cid:12)Fi−1
E(cid:2)(cid:13)(cid:13)(pT ⊗ IM )vi
(cid:3)
= E(cid:104)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:13)(cid:13)(cid:13)2(cid:12)(cid:12)(cid:12)Fi−1
(cid:105)
· E(cid:104)(cid:13)(cid:13)(cid:13) N(cid:88)
(cid:16) N(cid:88)
(cid:17)2
pk(cid:80)N
E(cid:104)(cid:13)(cid:13)(cid:13)vk,i
(cid:16) N(cid:88)
(cid:17)2
N(cid:88)
pk(cid:80)N
(cid:13)(cid:13)(cid:13)2
pkE(cid:104)(cid:13)(cid:13)(cid:13)vk,i
(cid:16) N(cid:88)
(cid:17)
N(cid:88)
(cid:12)(cid:12)Fi−1
= (cid:107)p(cid:107)1 · pT · E(cid:8)P [vi]
(cid:9)
(cid:110)
≤ (cid:107)p(cid:107)1 · pT ·
4α · 1 · P [ wc,i−1]
(cid:111)
+(cid:2)4α · ((cid:107) wc,0(cid:107)2 + (cid:107)wo(cid:107)2) + σ2
(cid:3)
+ 4α · (cid:107) ¯P [AT
1 UL](cid:107)2∞ · 11T P [we,i−1]
· 1
Fi−1
l=1 pl
(cid:13)(cid:13)(cid:13)2(cid:12)(cid:12)(cid:12)Fi−1
(cid:13)(cid:13)(cid:13)2
(cid:105)
Fi−1
≤
k=1
k=1
l=1
l=1
pl
pl
=
(b)
·
·
v
1 · P [ wc,i−1]
= 4α(cid:107)p(cid:107)2
+ 4α · (cid:107) ¯P [AT
+4α(cid:107) wc,0(cid:107)2·(cid:107)p(cid:107)2
1 UL](cid:107)2∞ · (cid:107)p(cid:107)2
1 +4α(cid:107)p(cid:107)2
1 · 1T P [we,i−1]
1·(cid:107)wo(cid:107)2 +σ2
v·(cid:107)p(cid:107)2
1
where step (a) applies Jensen's inequality to the convex
function (cid:107) · (cid:107)2, and step (b) substituting (77).
REFERENCES
[1] J. Chen and A. H. Sayed, "On the benefits of diffusion cooperation for
distributed optimization and learning," in Proc. European Signal Proc.
Conf. (EUSIPCO), Marakkech, Morocco, Sep. 2013, pp. 1 -- 5.
[2] J. Chen and A. H. Sayed, "On the learning behavior of adaptive networks
-- Part I: Transient analysis," to appear in IEEE Trans. Inf. Theory,
2015 [also available as arXiv:1312.7581, Dec. 2013].
[3] B. Widrow, J. M. McCool, M. G. Larimore, and C. R. Johnson Jr, "Sta-
tionary and nonstationary learning characterisitcs of the LMS adaptive
filter," Proc. IEEE, vol. 64, no. 8, pp. 1151 -- 1162, Aug. 1976.
[4] S. Jones, R. Cavin III, and W. Reed, "Analysis of error-gradient adaptive
linear estimators for a class of stationary dependent processes," IEEE
Trans. Inf. Theory, vol. 28, no. 2, pp. 318 -- 329, Mar. 1982.
[5] W. A. Gardner, "Learning characteristics of stochastic-gradient-descent
algorithms: A general study, analysis, and critique," Signal Process.,
vol. 6, no. 2, pp. 113 -- 133, Apr. 1984.
[6] A. Feuer and E. Weinstein,
"Convergence analysis of LMS filters
with uncorrelated gaussian data," IEEE Trans. Acoust., Speech, Signal
Process., vol. 33, no. 1, pp. 222 -- 230, Feb. 1985.
[7] A. Nedic and A. Ozdaglar, "Distributed subgradient methods for multi-
agent optimization," IEEE Trans. Autom. Control, vol. 54, no. 1, pp.
48 -- 61, 2009.
[8] J. N. Tsitsiklis, D. P. Bertsekas, and M. Athans, "Distributed asyn-
chronous deterministic and stochastic gradient optimization algorithms,"
IEEE Trans. Autom. Control, vol. 31, no. 9, pp. 803 -- 812, 1986.
[9] S. S. Ram, A. Nedic, and V. V. Veeravalli,
"Distributed stochastic
subgradient projection algorithms for convex optimization," J. Optim.
Theory Appl., vol. 147, no. 3, pp. 516 -- 545, 2010.
[10] K. Srivastava and A. Nedic,
"Distributed asynchronous constrained
stochastic optimization," IEEE J. Sel. Topics Signal Process., vol. 5,
no. 4, pp. 772 -- 790, Aug. 2011.
[11] S. Kar and J. M. F. Moura, "Convergence rate analysis of distributed
gossip (linear parameter) estimation: Fundamental limits and tradeoffs,"
IEEE J. Sel. Topics. Signal Process., vol. 5, no. 4, pp. 674 -- 690, Aug.
2011.
[12] S. Kar, J. M. F. Moura, and K. Ramanan, "Distributed parameter esti-
mation in sensor networks: Nonlinear observation models and imperfect
communication," IEEE Trans. Inf. Theory, vol. 58, no. 6, pp. 3575 -- 3605,
Jun. 2012.
[13] S. Kar, J. M. F. Moura, and H. V. Poor, "Distributed linear parameter
estimation: Asymptotically efficient adaptive strategies," SIAM Journal
on Control and Optimization, vol. 51, no. 3, pp. 2200 -- 2229, 2013.
[14] A. G. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and A. Scaglione,
"Gossip algorithms for distributed signal processing," Proc. IEEE, vol.
98, no. 11, pp. 1847 -- 1864, Nov. 2010.
[15] S. Theodoridis, K. Slavakis, and I. Yamada, "Adaptive learning in a
world of projections," IEEE Signal Process. Mag., vol. 28, no. 1, pp.
97 -- 123, Jan. 2011.
[16] D. H. Dini and D. P. Mandic,
"Cooperative adaptive estimation of
in Proc. Asilomar Conf.
distributed noncircular complex signals,"
Signals, Syst. and Comput., Pacific Grove, CA, Nov. 2012, pp. 1518 --
1522.
[17] C. G. Lopes and A. H. Sayed,
"Diffusion least-mean squares over
adaptive networks: Formulation and performance analysis," IEEE Trans.
Signal Process., vol. 56, no. 7, pp. 3122 -- 3136, Jul. 2008.
[18] F. S. Cattivelli and A. H. Sayed,
"Diffusion LMS strategies for
distributed estimation," IEEE Trans. Signal Process., vol. 58, no. 3,
pp. 1035 -- 1048, Mar. 2010.
[19] X. Zhao and A. H. Sayed, "Performance limits for distributed estimation
over LMS adaptive networks," IEEE Trans. Signal Process., vol. 60, no.
10, pp. 5107 -- 5124, Oct. 2012.
[20] J. Chen and A. H. Sayed, "Diffusion adaptation strategies for distributed
optimization and learning over networks," IEEE Trans. Signal Process.,
vol. 60, no. 8, pp. 4289 -- 4305, Aug. 2012.
[21] J. Chen and A. H. Sayed, "Distributed Pareto optimization via diffusion
adaptation," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2, pp. 205 --
220, Apr. 2013.
[22] A. H. Sayed, "Diffusion adaptation over networks," in Academic Press
Library in Signal Processing, vol. 3, R. Chellapa and S. Theodoridis,
editors, pp. 323 -- 454, Elsevier, 2014.
[23] S. Chouvardas, K. Slavakis, and S. Theodoridis,
"Adaptive robust
distributed learning in diffusion sensor networks," IEEE Trans. Signal
Process., vol. 59, no. 10, pp. 4692 -- 4707, Oct. 2011.
[24] O. N. Gharehshiran, V. Krishnamurthy, and G. Yin, "Distributed energy-
aware diffusion least mean squares: Game-theoretic learning," IEEE
Journal Sel. Topics Signal Process., vol. 7, no. 5, pp. 821 -- 836, Jun.
2013.
[25] A. H. Sayed, "Adaptation, learning, and optimization over networks,"
Foundations and Trends in Machine Learning, vol. 7, issue 4 -- 5, NOW
Publishers, Boston-Delft, Jul. 2014., pp. 311 -- 801.
[26] A. H. Sayed, "Adaptive networks," Proc. IEEE, vol. 102, no. 4, pp.
460 -- 497, Apr. 2014.
[27] A. Nedic and A. Ozdaglar, "Cooperative distributed multi-agent opti-
mization," Convex Optimization in Signal Processing and Communica-
tions, Y. Eldar and D. Palomar (Eds.), Cambridge University Press, pp.
340 -- 386, 2010.
[28] S. P. Boyd and L. Vandenberghe, Convex Optimization, Cambridge
University Press, 2004.
[29] S. Lee and A. Nedic,
"Distributed random projection algorithm for
convex optimization," IEEE Journal Sel. Topics Signal Process., vol. 7,
no. 2, pp. 221 -- 229, Apr. 2013.
[30] P. Bianchi, G. Fort, and W. Hachem, "Performance of a distributed
stochastic approximation algorithm," IEEE Trans. Inf. Theory, vol. 59,
no. 11, pp. 7405 -- 7418, Nov. 2013.
[31] B. Johansson, T. Keviczky, M. Johansson, and K.H. Johansson, "Subgra-
dient methods and consensus algorithms for solving convex optimization
problems," in Proc. IEEE Conf. Decision and Control (CDC), Cancun,
Mexico, Dec. 2008, IEEE, pp. 4185 -- 4190.
[32] P. Braca, S. Marano, and V. Matta, "Running consensus in wireless
sensor networks," in Proc. 11th IEEE Int. Conf. on Information Fusion,
Cologne, Germany, June 2008, pp. 1 -- 6.
[33] S. S. Stankovic, M. S. Stankovic, and D. M. Stipanovic, "Decentralized
parameter estimation by consensus based stochastic approximation,"
IEEE Trans. Autom. Control, vol. 56, no. 3, pp. 531 -- 543, Mar. 2011.
[34] X. Zhao and A. H. Sayed,
"Probability distribution of steady-state
errors and adaptation over networks," in Proc. IEEE Statistical Signal
Processing Workshop (SSP), Nice, France, Jun. 2011, pp. 253 -- 256.
[35] A. H. Sayed, Adaptive Filters, Wiley, NJ, 2008.
[36] J. Sacks, "Asymptotic distribution of stochastic approximation proce-
dures," The Annals of Mathematical Statistics, vol. 29, no. 2, pp. 373 --
405, Jun. 1958.
30
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. XX, NO. XX, MONTH 2015
[37] M. B. Nevelson and R. Z. Hasminskii, Stochastic Approximation and
Recursive Estimation, American Mathematical Society, 1976.
[38] T. Kailath, A. H. Sayed, and B. Hassibi, Linear Estimation, Prentice-
Hall, Inc., 2000.
[39] S. Boyd, P. Diaconis, and L. Xiao, "Fastest mixing Markov chain on a
graph," SIAM Rev., vol. 46, no. 4, pp. 667 -- 689, Dec. 2004.
[40] W. K. Hastings, "Monte Carlo sampling methods using Markov chains
and their applications," Biometrika, vol. 57, no. 1, pp. 97 -- 109, Apr.
1970.
[41] X. Zhao, S.-Y. Tu, and A. H. Sayed, "Diffusion adaptation over networks
under imperfect information exchange and non-stationary data," IEEE
Trans. Signal Process., vol. 60, no. 7, pp. 3460 -- 3475, July 2012.
[42] S. Theodoridis and K. Koutroumbas, Pattern Recognition, Academic
Press, 4th edition, 2008.
[43] B. Polyak, Introduction to Optimization, Optimization Software, NY,
[44] K. L. Chung, A Course in Probability Theory, Academic press, 2001.
[45] A. J. Laub, Matrix Analysis for Scientists and Engineers, SIAM, PA,
1987.
2005.
|
cs/0407025 | 1 | 0407 | 2004-07-10T11:16:45 | An agent framework for dynamic agent retraining: Agent academy | [
"cs.MA"
] | Agent Academy (AA) aims to develop a multi-agent society that can train new agents for specific or general tasks, while constantly retraining existing agents in a recursive mode. The system is based on collecting information both from the environment and the behaviors of the acting agents and their related successes/failures to generate a body of data, stored in the Agent Use Repository, which is mined by the Data Miner module, in order to generate useful knowledge about the application domain. Knowledge extracted by the Data Miner is used by the Agent Training Module as to train new agents or to enhance the behavior of agents already running. In this paper the Agent Academy framework is introduced, and its overall architecture and functionality are presented. Training issues as well as agent ontologies are discussed. Finally, a scenario, which aims to provide environmental alerts to both individuals and public authorities, is described an AA-based use case. | cs.MA | cs | In Challenges and Achievements in e-business and e-work,
B. Stanford-Smith, E. Chiozza, and M. Edin (eds.),
Prague, Czech Republic, IOS Press, October 2002, pp.757-764
An Agent Framework for Dynamic Agent
Retraining: Agent Academy
P. Mitkas1 , A. Symeonidis1 , D. Kechagias1 , I. Athanasiadis1 ,
G. Laleci2 , G. Kurt2 , Y. Kabak 2 , A. Acar2 , A. Dogac2
1 Intelligent Systems and Software Engineering Laboratory, ITI, CERTH, 1 s t km Thermi (cid:150) Panorama Road ,
P.O. Box 361, GR 570 01 Thermi Thessaloniki, Greece Tel: +30 310 996349 [email protected]
2 So f tware Research and Development Center, Middle East Technical University, Inonu Bulvari,
METU(ODTU) Campus, 06500, Ankara, Turkey Tel:+90 312 2105598 [email protected]
Abstract. Agent Academy (AA) aims to develop a multi-agent society that can train
new agents for specific or general tasks, while constantly retraining existing agents
in a recursive mode. The system is based on collecting information both from the
environment and
the behaviors of
the acting agents and
their
related
successes /fa i lures to generate a body of data, stored in the Agent Use Repository,
which is mined by the Data Miner module, in order to generate useful knowledge
about the application domain. Knowledge extracted by the Data Miner is used by the
Agent Training Module as to train new agents or to enhance the behavior of agents
already running.
In this paper the Agent Academy framework is introduced, and its overall
architecture and functionality are presented. Training issues as well as agent
ontologies are discussed. Finally, a scenario, which aims to provide environmental
alerts to both individuals and public authorities, is described an AA-based use case .
1. Introduction
In the recent years agent technology has found many interesting applications in e-
commerce, decision support systems and Internet applications. Several agent system
building tools and frameworks have been developed. The feature lacking so far, though, is
the ability to store, analyze and learn from the past activities of the agent society as a whole
in order to dynamically re- train individual agents at run- time. In this way functionally
unrelated agents within the society may benefit from each other(cid:146)s findings and be able to
collectively exploit the shared knowledge base thereby increasing the effectiveness of the
system. We claim that such a society-wide evaluation and constant learning approach is
essential for describing complex and ultimately useful scenarios involving agents with
different roles. In this paper, we provide the description of a framework capable of the said
functionality which
is being developed within
the scope of IST-2000-31050 Agent
Academy Project. The features of the proposed system are explained over a motivating
scenario.
Agents have proven to be particularly useful in a series of business applications. In
particular, agents have facilitated the procedure of buying and selling of goods and services
in electronic marketplaces, the handling of workflows and have assisted in personalization
by managing user profiles or by tackling production planning. As the benefits from using
agent societies in such applications become clear, so does the need for development of
high- level agent system-building tools.
There are numerous agent development platforms with various degrees of abstraction
and completeness ranging from bare bones API’s to full- fledged but less flexible building
packages. These frameworks all have their strong points and lacking features, the most
important factors being compliance to a specification (e.g. FIPA), support for the mobility
of the agents from host to host, ability to support AI oriented languages (e.g. Lisp, JESS,
etc.), support for
lightweight agents, support for advanced planning- scheduling and
combinations thereof. The feature lacking so far however is the ability to get feedback from
an agent society, which will be analyzed
in order
to dynamically
improve agents(cid:146)
intelligence at run- time. The Agent Academy Project aims to fill in this void.
2. The Agent Academy Framework
Agent Academy aims to develop a multi-agent system, which can train new agents for
specific or general tasks and re- train its own agents in a recursive mode. The main
components of the system are given in Figure 1. The system is based on collecting
information from both the environment and the behaviors of the acting agents and their
related successes/failures to generate a body of data. Then this body of data is mined
through the Data Miner in order to discover the important relationships between the
behaviors of the agents and their environment. These relationships discovered by the Data
Miner are used by the training module, in order to train new agents or to retrain (i.e.
enhance) the agents already running.
WEB
Agent
Tracking
Data
User
Profile
Agent
Request
n
o
i
t
i
s
i
u
q
c
A
a
t
a
D
Agent
Factory
Agent Academy
Agent
Use
Repository
Data
Miner
Agent
Training
Intelligent
Agent
Figure 1 Overall Architecture of the Agent Academy System
The four main components of the Agent Academy framework are described below.
Agent Factory (AF): The Agent Factory is assigned with the creation of new
(untrained) agents. User defines through an interface new agent(cid:146)s parameters, such as
functional characteristics, abilities to access entities or devices, etc. The AF initializes all
agents of the community according to user requests.
Agent Use Repository (AUR): The Agent Use Repository is a database holding all
necessary data for a specific application. This body of data consists of agent behaviors,
experience and decisions, as well as of information on the working environment and its
parameters. AUR is constantly updated and appended with information via the Data
Acquisition Module, which monitors and posts data from the operating agents.
Data Mining Module (DM): Through the data mining module a user can take
advantage of data mining techniques after applying them to the body of application data.
Results of the data mining process (in the form of decision trees, association rules and/or
artificial neural networks) are posted to the ATM in FIPA-SL format, to be transplanted
into active agents.
Agent Training Module (ATM): The Agent Training Module is charged with the task
of embedding behaviors and beliefs to working agents. In this manner it is the tool for
initially training new agents and for retraining AA produced active agents.
3. The Overall Architecture of the System
We decided
the Java Agent Development
the AA framework using
implement
to
Environment (JADE) [1], which is a FIPA compliant Agent Development Toolkit. Another
important step of the design concerning an agent based infrastructure is the setting of an
Agent Communication Language, to allow the community agents to exchange information
and services with one another, for negotiating, reasoning or co-operation. In the Agent
Academy Framework we use FIPA-ACL (FIPA Agent Communication Language). In order
to be fully FIPA compliant,
the Agent Communication Language
in
information
the
message should be represented as a consistent content expression with one of the content
languages in the FIPA Content Language Library [3], which are FIPA-SL (FIPA-Semantic
Language), FIPA-RDF
(FIPA-Resource Description Framework), FIPA-KIF
(FIPA-
Knowledge Interchange Format), and FIPA-CCL (FIPA-Constraint Choice Language).
Agent Academy uses FIPA-SL [5], which is supported by JADE, as a content language to
represent the information in ACL messages.
Another important issue about agent communication is the Ontology concept. The
model of agent communication in FIPA is based on the assumption that two agents, who
wish to converse, share a common ontology for the domain of discourse. It ensures that the
agents ascribe the same meaning to the symbols used in the message. Java Agent
Development Environment (JADE) provides a platform for easy exchange and parsing of
these messages into internal representations of the agent by supporting ontology definitions
consistent with the content language of the messages. Ontologies are defined as Java
objects representing the internal structure of the message, and provide methods to retrieve
the necessary parts of the message content. When an agent receives a Semantic Language
(SL) message, which is in string format, it is parsed in to Java objects, and then checked
with the previously defined ontologies. Then the agent extracts the components of the
message by using the methods of the ontology. When sending a message, the agent
constructs and initiates the necessary java objects and with the help of the content language
support of JADE, the Semantic Language (SL) message in string format is constructed
automatically.
In the following, the internal structure of the Agent Academy Framework is presented
with the message structures in SL between the components. The scenario begins with a
request to the Agent Factory (AF) for creating an agent. AF creates an untrained agent
(UA) with
the preliminary abilities
to communicate with other agents, adding new
behaviors to itself, being mobile if necessary. Then it sends a message to the Agent
Training Module (ATM) giving the name and the type of the agent as shown in Table 1.
Table 1 Agent Factory (AF) -Agent Training Module (ATM) interaction in SL format
(agentsToBeTrained
(agents (set (agent :name agent1
:type locationAgent))))
Upon receiving the message from Agent Factory, Agent Training Module discovers the
necessary agent behaviors, which comes from the preferences of the user who requests the
agent. ATM informs the Untrained Agent about these behaviors, which has the ability to
load itself with new behaviors, with the message format presented in Table 2.
Table 2 Agent Training Module - Untrained Agent interaction in Semantic Language (SL) Format
(loadClass
(behaviors (set (behavior :classname Class1)
(behavior :classname Class2))))
In the Agent Academy Framework, the Untrained Agent that is trained by the Agent
Training Module gains the ability to execute rules and perform reactive actions compatible
with scenario- specific roles, as a result of these rules. While the agent performs its goals
throughout its lifecycle, Data Acquisition Module collects statistical data, about the agent(cid:146)s
behavior, successes or failures and updates the Agent Use Repository accordingly (e.g.
some rules are retracted, some new ones are added). Data Miner periodically imports data
from the Agent Use Repository in order to generate associations, categorizations and
sequences by using well-known Data Mining techniques, and outputs Decision Trees,
Association Rules or Neural networks. These outputs are passed to the Agent Training
Module to be taught to the agents that are executing in their environment. To pass these
data structures, we defined SL representation formats for each of them.
The Agent Training Module re- inserts these enhanced rules to the both newly created
untrained agents and to the existing agents to train them.
To be able to execute the rules and perform reactive actions accordingly, a rule engine is
necessary. In our framework we are using Java Expert Systems Shell (JESS) [2] as the rule
engine. The beliefs of the agents are represented as JESS rules, and when a new fact
coming from the environment is asserted to the agent, these JESS rules are executed
automatically and the action that is defined to be the result of this condition is executed.
The agents created by Agent Factory gain the ability to execute JESS rules after an initial
training by the Agent Training Module. The ATM, after having received the refined rules
from the Data Mining Module as decision trees, neural networks, association rules etc,
converts them into to JESS rules and sends them to the agents to be trained, in the message
format presented in Table 3.
Table 3 Semantic Language (SL) representation for the message format between ATM and Agent
(addRule (jessRules (set (jessRule :rule (cid:147)(defrule rule_6 (and (ozone normal)) => (store ALARM_TYPE 3))(cid:148))
(jessRule :rule (cid:147)(defrule rule_5 (and (NO2NO3 normal)) => (store ALARM_TYPE 2))(cid:148)))))
Operating with the new rules sent by the Agent Training Module (ATM), behavior of
the agents would be enhanced in an iterative and recursive manner.
In
the Agent Academy Framework, different scenarios can be implemented with
different domain specific ontologies. For each ontology, there will be different databases in
the Agent Use Repository. The field names of the databases correspond to the ontology
term that the agent is internally using. Therefore the Data Miner needs to know on which
ontology term to data mine. For example, in the O3RTAA scenario (described in Section
4), the ontology terms are pressure, ozone, nitrogen, alarm type and location. The attributes
and the selection conditions that the Data Miner (DM) will consider and the attributes that
the Agent uses should match syntactically.
One solution for the ontology problem is to define the ontology among the agents, which
should be common as well as determined, prior to conducting the training protocol, while
the agents are being created. Then the exchanged messages carrying the artificial neural
network, the decision trees and other structures should also be constructed accordingly,
agreeing on the common ontology of the scenario. The input and output of the data
structures in the messages exchanged between the Artificial Neural Network and the Data
Miner Module should agree with
the
terms of
the ontology. Since both of
the
communicating agents use the same predefined ontology, the agents ascribe the same
meaning to the symbols used in the message.
Another solution is to enable the agents to manage explicit, declaratively represented
different ontologies. An ontology service for a community of agents can be specified for
this purpose. A dedicated agent, called Ontology Agent, can provide this service. The role
of the Ontology Agent can be summarized as follows [4]:
?? discovery of public ontologies in order to access them,
?? maintain a set of public ontologies (i.e. register with the Directory Facilitator of
FIPA, upload, download, and modify),
?? translate expressions between different ontologies and/or different content languages,
?? respond to query for relationships between terms or between ontologies, and,
?? facilitate the identification of a shared ontology for communication between two
agents.
With the help of the Ontology Agent, agents do not have to agree on a predefined
ontology, but mappings between different ontologies can be provided by the Ontology
Agent. Consider an agent getting the message that contains the term (cid:147)pressure(cid:148) and can not
understand it since it is using the DomainSpecificOntology (cid:147)O3RTAATurkish(cid:148), whereas
the sender agent is using the DomainSpecificOntology (cid:147)O3RTAAEnglish(cid:148). The agent can
contact the Ontology Agent, asking the meaning of (cid:147)pressure(cid:148) in (cid:147)O3RTAATurkish(cid:148). The
agent can achieve this by sending a Semantic Language (SL) message to the Ontology
agent in the following format:
(ontologyQuery (map :MessageOntology O3RTAAEnglish :MyOntology O3RTAATurkish
:term pressure))
Then the ontology agent should inform the agent with the following SL message:
(Mapping (From :term (cid:147)pressure(cid:148)) (To :term (cid:147)basinc(cid:148)))
As a summary, the Agent Academy platform creates, trains and re- trains its society of
agents in order to manage any given scenario. Such a scenario, which is the motivating
application for the development, is the O3RTAA system, which uses agents for the
collection and redistribution of environmental data.
4. The O3RTAA Scenario
The O3RTAA system aims to provide environmental alerts to both individuals (asthma
patients, allergic people etc.) and public authorities (hospitals, civil protection etc.)
depending on the levels of certain atmospheric variables, which are collected by the
Mediterranean Centre for Environmental Studies (CEAM). The system is supposed to
monitor the incoming data from the environmental sensors and make predictions as to the
effects a certain change may cause in the environment. Some changes will lead to certain
kind of alerts, which then need to be communicated effectively to parties interested in a
particular alert.
The general structure of the O3RTAA system is given in Figure 2. The agents in this
scenario are responsible for diagnosis, prediction and distribution. Each of these agent
subsystems work as follows:
Diagnosis Component: This component will be in charge of analyzing the raw data
coming in from the sensor data loggers. The main responsibility of the diagnosis agents is
to screen this raw data and to forward only the significant changes while discarding faulty
and redundant information. The human users may well input to the system through this
component. And also, all the sensed information should be logged for future learning
capability.
Prediction Component: When the diagnosis component decides that some change or
fluctuation in the monitored parameters is significant, this change is forwarded to the
prediction component. The predictor uses rule-bases and knowledge acquired from the
historical data up to that point and also the current sensor information retrieved from the
Diagnosis Component to determine what kind of hazard (i.e. alert) the change may be an
indication of.
Distribution Component: When an alarm is raised by the prediction component, this
event is sent to the distribution component which decides who will be affected by the alarm
raised based on the profiles of the users and their current locations. Once a list of users to
be informed is generated the alarm is sent to each user over the communication channel
preferred by the user (e-mail, html, voice, SMS etc.). An important thing to consider here is
that the following: According to the profile information and the urgency of the alarm, the
distribution component decides on sending or delaying an alarm. As an example, a human
authority may indicate in his profile that he wishes to receive the alarm through email and
during office hours. However if an alarm is important, this component can decide to send
an alarm at 4 A.M by a SMS (Short Message Service) to his phone number, and the email
message
later. Obviously
if
this decision
is
incorrect,
this agent will be working
inefficiently, but the importance of the alarm is decided by the Diagnosis component and
the failure in this case is of the Diagnosis Component so the diagnosis component have
have to be retrained through user feed back.
POLUTION DYNAMICS
OZONE ALARMS
(NO2NO3 , O3 , Pressure)
to Civil Protection Agencies,
from Environmental Sensors
Medical Services, Asthma Patients
Contribution Agents and
Data Management Agents
are renamed to Diagnosis
and Predictor Agents
respectively.
Automatic Network for Ambient Surveillance and Control,
once an hour checkings are provided from 25 Stations in Valencia region
Figure 2 Overall View of the O3RTAA Scenario
5. Realization of the O3RTAA scenario through the Agent Academy framework
How the Agent Academy framework handles the O3RTAA scenario can be explained
through the processing steps when a new change in the environment occurs as shown in
Figure 3.
Sensors collecting information on the environmental changes alert the Diagnosis Agent
(1) when a change occurs in the parameters of the environment (i.e. O3, NO2, pressure,
etc). The Diagnosis Agent, after validating the signal and deciding that it is significant,
records the location information of the sensor and informs the Predictor Agent (2).
The Predictor Agent in the system, after obtaining the necessary information from the
Diagnosis Agent, decides whether an alarm is to be raised and if so, what type of alarm is
necessary and gives this to the Distributor agent (13) together with the location information
to be distributed to the users.
Figure 3 Information Flow through the Agent Academy - O3RTAA Prototype
When a Predictor Agent decides it needs to update its prediction strategy, it requests a
new decision structure from the Agent Training Module as a set of Java Expert System
Shell (JESS) rules (3). Agent Training Module requests a prediction strategy from the Data
Miner. Data Miner requests previously inserted training examples related with a certain
location from the Agent Use Repository (4). This information, that is, the previously
inserted training examples related with a certain location is transferred from the Agent Use
Repository to the Data Miner (5,6).
Using data-mining algorithms, the Data Miner constructs a data structure and sends it to
the Agent Training Module (7). The content language and the ontology are predetermined
and known by both of the agents. Since the Data Miner returns the new decision strategy in
a standard language, and the Predictor Agent uses a JESS rule set, it is necessary to convert
one into the other. Therefore, the decision strategy obtained from the Data Miner is sent to
the JESS Rule converter (8,9). The Agent Training Module forwards these rules to the
Predictor Agent, which had requested them in step 3 (10).
The Predictor Agent sends these Java Expert System Shell (JESS) Rules and the current
values of environment parameters (obtained at step 2 from the Diagnosis agent and
represented as Assert statements of JESS) to its JESS Engine for execution (Steps 11,12). If
upon execution the expert system decides that there is a need to raise an alarm, the
Predictor agent sends this alarm, along with type and location information to the Distributor
Agent (13). It should be noted that the location of the change and alarm is obtained at step 2
from the Diagnosis Agent.
The User Agents hold user profile information for different subscribers. These profiles
include the types of alarms the user requires, the location of the user and the delivery
information and format such as HTML, CHTML, WML, or xHTML. If the user is mobile,
his location information is obtained from his user Agent (steps 14,15). The User agent then,
using
the Ericsson Mobile Positioning System Software Development Kit, finds
the
location of the user as latitude and longitude. The data in this specific format is converted
into a format compatible with the location information received from the Diagnosis agent
provided at step 1. Based on the location of the user and the specified alarm type in the user
profile, the users are alerted (step 16). The users provide feedback on the usefulness of the
alarm, which are collected by the Feedback Agent to be fed into Agent Use Repository
(steps 17, 18, 19). The feedback obtained from individual users affect the data in the Agent
Use Repository only when it exceeds a certain threshold. The feedback coming from the
public institutions, on the other hand, directly influences the Agent Use Repository.
6. Summary
In this paper we described the Agent Academy attempt to develop a framework through
which users can create an agent community having the ability to train and retrain its own
agents using Data Mining techniques. After presenting AA core components, we discussed
the ontology concept and the way it affects the training procedure. We described the
O3RTAA scenario, which fires environmental alarms and we realized it through the AA
perspective.
We have used a multi-agent system in realizing the O3RTAA scenario because the
components of the system are highly distributed, autonomous and communicate with each
other through messages. Furthermore the O3RTAA system components involve decision
making.
Acknowledgements
This work has been partially supported by the European Commission IST Programme,
under the contract IST-2000-31050. Authors would like to thank Mr. Miguel Alborg and
his associates in IDI-EIKON, Valencia, Spain, for their assistance on the O3RTAA scenario
and the Mediterranean Center for Environmental Studies Foundation (CEAM), Valencia,
Spain, for the provision of the environmental data.
References
[1] Java Agent Development Environment, http://jade.cselt.it/, WWW Site
[2] Java Expert System Shell, http://herzberg.ca.sandia.gov/jess/ , WWW Site
[3] Foundation for Intelligent Physical Agents, FIPA Content Language Library Specifications, Specification,
8 2001
[4] Foundation for Intelligent Physical Agents, FIPA Ontology Service Specifications, Specification, 8 2001
[5] Foundation for Intelligent Physical Agents, FIPA Semantic Language (SL) Content Language
Specifications, Specification, 8 2001
|
1711.06869 | 1 | 1711 | 2017-11-18T14:46:45 | Bio-Inspired Local Information-Based Control for Probabilistic Swarm Distribution Guidance | [
"cs.MA",
"math.OC",
"math.PR",
"math.ST",
"math.ST"
] | This paper addresses a task allocation problem for a large-scale robotic swarm, namely swarm distribution guidance problem. Unlike most of the existing frameworks handling this problem, the proposed framework suggests utilising local information available to generate its time-varying stochastic policies. As each agent requires only local consistency on information with neighbouring agents, rather than the global consistency, the proposed framework offers various advantages, e.g., a shorter timescale for using new information and potential to incorporate an asynchronous decision-making process. We perform theoretical analysis on the properties of the proposed framework. From the analysis, it is proved that the framework can guarantee the convergence to the desired density distribution even using local information while maintaining advantages of global-information-based approaches. The design requirements for these advantages are explicitly listed in this paper. This paper also provides specific examples of how to implement the framework developed. The results of numerical experiments confirm the effectiveness and comparability of the proposed framework, compared with the global-information-based framework. | cs.MA | cs | Bio-Inspired Local Information-Based Control for
Probabilistic Swarm Distribution Guidance
Inmo Jang, Hyo-Sang Shin, and Antonios Tsourdos
1
7
1
0
2
v
o
N
8
1
]
A
M
.
s
c
[
1
v
9
6
8
6
0
.
1
1
7
1
:
v
i
X
r
a
Abstract -- This paper addresses a task allocation problem for
a large-scale robotic swarm, namely swarm distribution guidance
problem. Unlike most of the existing frameworks handling this
problem, the proposed framework suggests utilising local infor-
mation available to generate its time-varying stochastic policies.
As each agent requires only local consistency on information
with neighbouring agents, rather than the global consistency, the
proposed framework offers various advantages, e.g., a shorter
timescale for using new information and potential to incorporate
an asynchronous decision-making process. We perform theoreti-
cal analysis on the properties of the proposed framework. From
the analysis, it is proved that the framework can guarantee the
convergence to the desired density distribution even using local
information while maintaining advantages of global-information-
based approaches. The design requirements for these advantages
are explicitly listed in this paper. This paper also provides specific
examples of how to implement the framework developed. The
results of numerical experiments confirm the effectiveness and
comparability of the proposed framework, compared with the
global-information-based framework.
Index Terms -- Swarm robotics, Distributed robot systems,
Networked robots, Markov chains.
I. INTRODUCTION
T HIS paper addresses a task allocation problem for a large-
scale multiple-robot system, called a robotic swarm.
Robotic swarms have attracted lots of attention because they
are regarded as promising solutions to handle complicated
missions that other systems may not be able to manage [1], [2].
Agents in a swarm are assumed to be homogeneous because
the swarm is usually realised through mass production [3]. In
this context, the task allocation problem can be reduced to a
problem of how to distribute a swarm of agents into given
tasks (or bins), satisfying the desired population fraction (or
swarm density) for each task. This problem is known as the
swarm distribution guidance problem [4] -- [6].
For a large number of agents, probabilistic approaches based
on Markov chains [4] -- [13] or differential equations [14] -- [18]
have been widely utilised. Since these approaches focus not on
individual agents but instead on the ensemble dynamics, they
are also called Eulerian [11] -- [13] or macroscopic frameworks
[18], [19]. In these approaches, swarm densities for each bin
are represented as system states, and a state-transition matrix
describes stochastic decision policies, i.e., the probabilities
that agents in a bin switch to another. Individual agents in
the swarm make decisions based on these policies, but in a
random, independent, and memoryless manner.
Inmo Jang, Hyo-Sang Shin, and Antonios Tsourdos are with the Centre for
Autonomous and Cyber-Physical Systems, Cranfield University, MK43 0AL,
United Kingdom (e-mail: [email protected]; [email protected];
[email protected]).
Initially, open-loop-type frameworks have been proposed
[4] -- [7], [16] -- [18]. Agents under these frameworks are con-
trolled by time-invariant stochastic decision policies. The poli-
cies, which make a swarm converge to a desired distribution,
are pre-determined by a central controller and broadcasted
to each agent before executing the mission. Communication
between agents is hardly required during the mission, so
that
it can reduce communication complexity under these
frameworks. However, the agents only have to follow the given
policies without incorporating any feedbacks, and thus there
still remain some agents who unnecessarily and continuously
switch bins even after the swarm reaches the desired distribu-
tion. This gives rise to a trade-off between convergence rate
and long-term system efficiency [17].
There have been also some other works, called closed-loop-
type frameworks [9] -- [15]. This type of frameworks allows
agents to adaptively construct their own stochastic decision
policies at
the expense of sensing the concurrent swarm
status through interactions with other agents. Based on such
information, agents can synthesise time-inhomogeneous tran-
sition matrices to achieve certain objectives and requirements:
for example, maximising convergence rates [10], minimising
travelling costs [13], and temporarily adjusting given policies
when bins are more overpopulated or underpopulated than
certain levels [14], [15]. In particular, Bandyopadhyay et. al.
[13] recently proposed a closed-loop-type algorithm that ex-
hibits faster convergence as well as less undesirable transition
behaviours, compared with an open-loop-type algorithm. This
algorithm is expected to mitigate the trade-off raised in open-
loop-type frameworks.
To the best of our knowledge, most of the existing closed-
loop-type algorithms are based on Global Information Consis-
tency Assumption (GICA) [20]. GICA implies that necessary
information is required to be consistently known by entire
agents. We refer to such information as global, because
achieving information consistency needs agents to somehow
interact with all the others through a multi-hop fashion and
thus it "happens on a global communication timescale" [20].
This paper proposes a framework that requires Local Infor-
mation Consistency Assumption (LICA) [20]. Unlike GICA-
based algorithms, the proposed framework require only local
consistency on information with neighbouring agents, not
the global consistency. LICA can provide various alternative
advantages to the proposed framework, compared with GICA.
Firstly, it "provides a much shorter timescale for using new
information because agents are not required to ensure that this
information has propagated to the entire team before using it"
[20]. Secondly, LICA enables a foundation on which an asyn-
chronous decentralised decision-making process can be devel-
oped. Note that the timescales for achieving the information
consistency between the agents can be different depending on
their local circumstances. Considering any possibly-extrinsic
heterogeneity of agents (e.g., different sensing frequency due
to local communication delays), an asynchronous algorithm is
regarded as more realistic in coordinating a robotic swarm,
so increasing its system efficiency [21] -- [23]. Finally, LICA
makes the proposed approach additionally robust against dy-
namical changes in bins and those in agents. Given that
inclusions or exclusions of bins are perceived by neighbour-
ing agents, the proposed approach works well even without
requiring other far-away agents to know the changes.
The LICA-based framework developed in this paper utilises
local information as its feedback gains, which is motivated
from the recent GICA-based work in [13]. This framework
is inspired by the mechanism of decision-making in a fish
swarm, in which each of them adjusts its individual behaviour
based on those of neighbours [24] -- [27]. Similarly, each agent
in the framework developed uses its local status, i.e. the current
density of its associated bin relative to those of its neighbour
bins, to generate its time-varying stochastic decision policies.
The agent is not required to know any global information,
and hence the aforementioned advantages of LICA can be
exploited.
We prove that, even using local information, the proposed
framework asymptotically converges to a desired swarm dis-
tribution and it retains the advantages of existing closed-
loop-type approaches. This paper explicitly presents the de-
sign requirements for a time-inhomogeneous Markov chain
to achieve these desired features. It
is thus expected that
the user can utilise the requirements in designing their own
algorithm. In addition, three specific examples are provided
to demonstrate how to implement the proposed framework:
1) minimising travelling cost; 2) maximising convergence rate
under upper flux bounds; and 3) generation of quorum-based
policies (similar to [14], [15]).
The rest of this paper are organised as follows. Section II in-
troduces the desired features of a swarm distribution guidance
framework along with relevant definitions and notations. Sec-
tion III proposes our framework with its design requirements,
the biological inspiration, and an analysis regarding whether
the desired features are satisfied. We provide examples of how
to implement the framework for specific problems in Section
IV, and an asynchronous implementation in Section V. The
results of numerical experiments are shown in Section VI,
followed by concluding remarks in Section VII.
Notations
∅, 0, I and 1 denote the empty set, the zero matrix of
appropriate sizes, the identity matrix of appropriate sizes, and
a row vector with all elements are equal to one, respectively.
v ∈ Pn is a stochastic (row) vector such that v ≥ 0 and
v·1(cid:62) = 1. v[i] indicates the i-th element of vector v. Prob(E)
denotes the probability that event E will happen.
2
TABLE I
NOMENCLATURE
k
Symbol
Bi
A
nA
nk[i]
aj
k
xj
k
M j
k
Θ
µ(cid:63)
k
Ak
Ck
Nk(i)
ANk(i)
¯µ(cid:63)
k[i]
¯µj
k[i]
¯Θ[i]
P j
k
Sj
k
¯ξj
k[i]
Gj
k[i]
Description
The i-th bin amongst a set of nbin bins (Definition 1);
A set of agents (Definition 1);
The number of total agents at time instant k (Definition 1);
The number of agents at the i-th bin (Eqn. (4));
The j-th agent's state indicator vector (Definition 2);
Stochastic state vector of the j-th agent (Definition 4);
Stochastic decision policy of the j-th agent (Definition 4);
Desired swarm distribution (Definition 5);
Current (global) swarm distribution (Definition 3);
Physical motion constraint matrix (Definition 6);
Communicational connectivity matrix (Definition 7);
A set of (communicationally-connected) neighbour bins of
the i-th bin (Definition 7);
A set of agents in Nk(i);
Current local swarm density at the i-th bin (Eqn. (4));
Estimate of ¯µ(cid:63)
Locally-desired swarm density at the i-th bin (Eqn. (5));
Primary guidance matrix (Eqn. (10));
Secondary guidance matrix (Eqn. (10));
Primary local-feedback gain (e.g., Eqn. (6));
Secondary local-feedback gain (Eqn. (9));
k[i] by the j-th agent;
II. PRELIMINARIES
A. Definitions
This section presents necessary definitions and assumptions
for our proposed framework, which will be shown in Section
III. Since most of them are embraced from the recent existing
literature [10], [13], we here briefly provide their essential
meanings.
Definition 1 (Agents and Bins). A set of agents A are
supposed to be distributed over a prescribed region in a state
space B. The entire space is partitioned into nbin disjoint bins
(subspaces) such that B = ∪nbin
i=1 Bi and Bi ∩ Bj = ∅, ∀i (cid:54)= j.
We also regard B = {B1, ...,Bnbin} as the set of all the bins.
Each bin Bi represents a predefined range of an agent's state,
e.g., position. The number of the entire agents is time-varying,
k = A. Note
and its value at time instant k is denoted by nA
that we do not assume that the agents keep track of nA
k .
k ∈ {0, 1}nbin be the state
Definition 2 (Agent's state). Let aj
indicator vector of agent j ∈ A at time instant k. If the agent's
state belongs to bin Bi, then aj
Definition 3 (Current (global) swarm distribution). The cur-
k ∈ Pnbin is a row-stochastic
rent (global) swarm distribution µ(cid:63)
vector such that each element µ(cid:63)
k[i] is the population fraction
(swarm density) of A in bin Bi at time instant k:
(cid:88)
k[i] = 1, otherwise 0.
(1)
µ(cid:63)
k :=
1
A
aj
k.
∀j∈A
Definition 4 (Agent's stochastic state and decision policy).
k ∈
Agent j's stochastic state is a row-stochastic vector xj
Pnbin in which each element xj
the agent's state belongs to bin Bi at time instant k:
k[i] gives the probability that
xj
k[i] := Prob(aj
(2)
The probability that agent j in bin Bi at time instant k will
transition to bin Bl before the next time instant is called its
stochastic decision policy, denoted as:
k[i] = 1).
M j
k+1[l] = 1aj
k ≥ 0 and M j
k · 1(cid:62)
k[i] = 1).
k [i, l] := Prob(aj
(3)
k ∈ Pnbin×nbin is a row-stochastic matrix such
= 1(cid:62), and will be referred as
Note that M j
that M j
Markov matrix.
Definition 5 (Desired swarm distribution). The desired swarm
distribution Θ ∈ Pnbin is a row-stochastic vector such that
each element Θ[i] indicates the desired swarm density for bin
Bi.
Assumption 1. For ease of description for this paper, we
assume that Θ[i] > 0, ∀i ∈ {1, ..., nbin}. Obviously, in prac-
tice, there may exist some bins whose desired swarm densities
are zero. These bins can be accommodated by adopting any
subroutines ensuring that all agents eventually move to and
remain in any of the positive-desired-density bins, for example,
an escaping algorithm in [13, Section III.C].
Assumption 2 (The number of agents [6], [10], [13], [15],
k (cid:29) nbin so that the time evolu-
[17]). It is assumed that nA
tion of the swarm distribution is governed by the stochastic
decision policy in Equation (3). Although the finite cardinality
of the agents normally cause a residual convergence error, a
lower bound on nA
k that probabilistically guarantees a desired
convergence error is analysed in [13, Theorem 6] by exploiting
Chebyshev's equality. Note that
this theorem is generally
appliable and thus is also valid for our work.
Definition 6 (Physical motion constraint [6], [10], [13]).
Motion constraints of agents are denoted by the matrix Ak ∈
{0, 1}nbin×nbin, where Ak[i, l] = 1 if agents in bin Bi at
time instant k are allowed to transition to bin Bl by the next
time instant; Ak[i, l] = 0, otherwise. It is assumed that Ak
is symmetric and irreducible (i.e., strongly-connected); and
Ak[i, i] = 1 for all agents, bins, and time instants.
Definition 7 (Communicationally-connected). Bins Bi and Bl
are said to be communicationally-connected, if there exists at
least one agent in bin Bi who can directly communicate with
some agents in bin Bl, and vice versa. This communicational
connectivity over all the bins at time instant k is defined by the
matrix Ck ∈ {0, 1}nbin×nbin, where Ck[i, l] = 1 indicates that
bins Bi and Bl are communicationally-connected. Note that
Ck is symmetric and all its diagonal entries are set to be one.
For each bin Bi, we define the set of its (communicationally-
connected) neighbour bins as Nk(i) = {∀Bl ∈ B Ck[i, l] =
1}. The set of agents in any of bins in Nk(i) is denoted by
ANk(i) = {∀j ∈ A aj
Assumption 3 (Communicational connectivity over bins). The
physical motion constraint of a robot is, in general, more
stringent than its communicational constraint. From this, it can
k[l] = 1, ∀l : Bl ∈ Nk(i)}.
3
be assumed that if the transition of agents between bin Bi and
Bl is allowed within a unit time instant, then the both bins
are communicationally-connected, i.e., if Ak[i, l] = 1 then
Ck[i, l] = 1. Note that we set Ck[i, l] = 0 if Ak[i, l] = 0.
This implies that
the matrix Ck is irreducible, as is Ak.
The communication network over the agents is assumed to
be strongly-connected [10], [13]. Using distributed consensus
algorithms [10], [11], [28], each agent can access necessary
local information in its neighbour bins.
Assumption 4 (Pre-known Information [13]). The desired
swarm distribution Θ, the motion constraint matrix Ak (also
Ck), and other pre-determined values such as variables regard-
ing objective functions and user-design parameters (which will
be introduced later) are known by all the agents before they
begin a mission.
Assumption 5 (Agent's capability [10], [13]). Each agent can
determine the bin to which it belongs, and know the locations
of neighbour bins so that it can navigate toward any of these
bins. The agent is capable of collision avoidance behaviours
against other agents or obstacles.
B. Problem Statement
The objective of the swarm distribution guidance problem
considered in this paper is to distribute a set of agents A over
a set of bins B by the Markov matrix M j
k in a manner that
holds the following desired features:
Desired Feature 1. The swarm distribution µ(cid:63)
k asymptotically
converges to the desired swarm distribution Θ as time instant
k goes to infinity.
Desired Feature 2. Transitions of the agents between the bins
are controlled in a way that M j
k becomes close to I as µ(cid:63)
k
converges to Θ. This implies that the agents are settled down
after Θ is achieved, and thus unnecessary transitions can be
reduced. Moreover, the agents identify and compensate any
partial loss or failure of the swarm distribution.
Desired Feature 3. For each agent
the infor-
mation required for generating time-varying stochastic deci-
sion policies is not global information (e.g., µ(cid:63)
k) but locally
available information within ANk(i). Thereby, the resultant
time-inhomogeneous Markov process is based on LICA, and
has benefits such as a shorter timescale for obtaining new
information (than GICA), the potential for an asynchronous
process, etc.
Remark 1. One of our main contributions is to provide
Desired Feature 3 as well as to retain Desired Features 1 and 2
by additionally adopting Assumption 3, which can be elicited
from other assumptions in the existing literature.
in bin Bi,
III. A CLOSED-LOOP-TYPE FRAMEWORK USING LOCAL
INFORMATION
This section proposes a LICA-based framework for the
swarm distribution guidance problem. The framework is differ-
ent from the recent closed-loop-type algorithms in [10], [13]
in the sense that they utilise the global information (e.g., the
4
current swarm distribution in Equation (1)) for constructing a
time-inhomogeneous Markov matrix, whereas ours uses the
local information in Equation (7). We present, in spite of
using such relatively insufficient information, how the desired
features described in the previous section can be achieved
in the proposed framework. Before that, we introduce the
biological idea, which is about decision-making mechanisms
of a fish swarm, that inspires this framework to particularly
attain Desired Feature 3. In addition, we explicitly provide
the design requirements for a Markov matrix in order for
prospective users to easily incorporate their own specific
objectives into this framework.
A. The Biological Inspiration
Fig. 1. Examples of how to calculate ¯µ(cid:63)
k[23] =
nk[23]/(nk[13] + nk[22] + nk[23] + nk[24] + nk[33]). In the proposed
framework, agents in the bin only need to obtain the local
information
from other agents in its neighbour bins (shaded). Note that each square
indicates each bin, and the red arrow between two bins Bi and Bl means
that Ak[i, l] = 1.
k[i]: for bin B23, ¯µ(cid:63)
For a swarm of fishes, it has commonly been assumed
that
their crowdedness limits their perception ranges over
other members, and their cardinality restricts the capacity for
individual recognition [25]. How fishes end up with collective
behaviours is different from the ways of other social species
such as bees and ants, which are known to use recruitment
signals for the guidance of the entire swarm [29], [30]. Thus,
in biology domain, a question naturally has arisen about
the mechanism of fishes' decision-making in an environment
where local
information is only available and information
transfer between members does not explicitly happen [24] --
[27], [31], [32].
It has been experimentally shown that fishes' swimming
activities vary depending on their perceivable neighbours.
According to [31], fishes have the tendency to maintain their
statuses (e.g., position, speed, and heading angle) relative to
those of other nearby fishes, which results in their organised
formation structures. In addition, it is presented in [32] that
spatial density of fishes has influences on both the minimum
distances between them and the primary orientation of the fish
school.
Based on this knowledge, the works in [24] -- [27] suggest
individual-based models to further understand the collective
behavioural mechanisms of fishes: for example, their repelling,
attracting, and orientating behaviours [24], [26]; how the den-
sity of informed fishes affects the elongation of the formation
structure [25]; and group-size choices [27]. The common and
fundamental characteristic of these models is that every agent
maintains or adjusts its personal status with consideration of
those of other individuals within its limited perception range.
As inspired by the understanding of fishes, we believe
that there must be an enhanced swarm distribution guidance
approach in which each agent only needs to keep its relative
status by using local information available from its nearby
neighbours. In this approach, a global
information is not
necessary to be known by agents, and thereby the correspond-
ing requirement of extensive information sharing over all the
agents can be alleviated.
B. Fundamental Idea of the Proposed Approach
Suppose that each agent in bin Bi is required to keep its
k[i], which we referred to as the current local
local status ¯µ(cid:63)
swarm density at bin Bi, at the value of the corresponding
locally-desired swarm density ¯Θ[i]. They are respectively
defined as follows:
¯µ(cid:63)
k[i] :=
,
(4)
nk[i]
(cid:80)∀l:Bl∈Nk(i) nk[l]
(cid:80)∀l:Bl∈Nk(i) Θ[l]
Θ[i]
.
where nk[i] is the number of agents such that aj
k[i] = 1; and
¯Θ[i] :=
(5)
k[i] as an estimate of ¯µ(cid:63)
We use the term ¯µj
k[i] by agent j, which
can be obtained through a distributed information consensus
algorithm [10], [11], [28].
each agent j in bin Bi:
(i) only need to estimate the difference of ¯µ(cid:63)
The fundamental idea of the proposed approach is to make
k[i] and
¯Θ[i], which are both locally-available information within
Nk(i); and
(ii) more reluctant to deviate from the current bin as the
k [i, i] → 1 and
difference becomes smaller (i.e., M j
k [i, l] → 0 ∀l as ¯µj
M j
k[i] → ¯Θ[i]).
Our proposed framework utilises the difference between
k[i] and ¯Θ[i] as a local-information-based feedback gain,
¯µj
denoted by ¯ξj
k[i], which is a scalar in (0, 1] that monotonically
k[i] converges to ¯Θ[i]. For instance, this paper
decreases as ¯µj
uses
¯ξj
k[i] :=
¯Θ[i]−¯µj
¯Θ[i]
k[i]
)α
if ¯Θ[i] − ¯µj
k[i] ≤ ¯Θ[i]
k[i]
¯Θ[i]−¯µj
if (
)α < ξ
¯Θ[i]
otherwise
(6)
(
ξ
1
where α > 0 and ξ > 0 are design parameters. We call
this gain primary local-feedback gain because it is utilised to
control the primary guidance matrix P j
k (shown in the next
subsection).
Remark 2. Equation (4) is equivalent to the i-th element of
the following vector:
¯µk(i) =
1
ANk(i)
aj
k.
(7)
(cid:88)
∀j∈ANk (i)
Namely, ¯µ(cid:63)
k[l] = ¯µk(i)[l] if l = i. Here, we intentionally
introduce Equation (7) for ease of comparison with the infor-
mation required for feedback gains in the existing literature
1 2 3 4 … 10 11 12 13 14 … 20 21 22 23 24 … 30 31 32 33 34 … 40 ... … … … … … 91 92 93 94 … 100 (cid:40)
(e.g., Equation (1)). From this, it is implied that, in order for
each agent in bin Bi to estimate ¯µk(i)[i] (i.e., the current
k[i]), the set of other agents whose
local swarm density ¯µ(cid:63)
information is necessary is restricted within ANk(i). That is,
each agent needs to have neither a large perception radius
nor an extensive information consensus process over the entire
agents.
C. A LICA-based Closed-loop-type Framework
This subsection presents our closed-loop-type framework
based on locally-available information feedbacks. The basic
form of the stochastic decision policy for agent j in bin Bi is
such that
M j
k [i, l] :=
(1 − ωj
(1 − ωj
k[i])P j
k[i])P j
k [i, l] + ωj
k [i, l]
k[i]Sj
k[i, l]
if l = i
∀l (cid:54)= i.
(8)
k[i] ∈ [0, 1) is the weighting factor to have different
k [i, l] ∈ P
Here, ωj
weights on the agent's primary decision policy P j
and secondary decision policy Sj
k[i, l] ∈ P. It is defined as
k[i]
k[i] := exp(−τ jk) · Gj
ωj
(9)
k[i] ∈ [0, 1] is secondary
where τ j is a design parameter; and Gj
local-feedback gain, which is based on the difference between
k[i] and ¯Θ[i]. Note that ωj
¯µj
k[i],
while diminishing as time instant k goes to infinity.
Equation (8) can be represented in matrix form as
k[i] is mainly affected by Gj
k = (I − W j
M j
k Sj
k,
k )P j
k ∈ Pnbin×nbin and Sj
k + W j
(10)
k ∈ Pnbin×nbin are row-
where P j
stochastic matrices, called primary guidance matrix and sec-
k ∈ Rnbin×nbin is a
ondary guidance matrix, respectively. W j
diagonal matrix such that diag(W j
k[nbin]).
The stochastic state vector of agent j is governed by the
Markov process:
k[1], ..., ωj
k ) = (ωj
xj
k+1 = xj
kM j
k .
(11)
For now, we claim that, in order for this Markov system to
k must satisfy the following
achieve Desired Features 1-3, P j
requirements.
Requirement 1. P j
i.e.,
nbin(cid:88)
k is a matrix with row sums equal to one,
k [i, l] = 1,∀i.
P j
(R1)
l=1
k needs to be row-stochastic, for which it should
k [i, l] ≥ 0, ∀i, l. Note that this constraint is
In fact, P j
further hold that P j
implied by (R4), which will be introduced later.
Requirement 2. All diagonal elements are positive, i.e.,
k [i, i] > 0,∀i.
P j
(R2)
Requirement 3. The stationary distribution of P j
desired swarm distribution Θ, i.e.,
k is the
Θ[i]P j
k [i, l] = Θ[l],∀l.
(R3)
nbin(cid:88)
i=1
5
k [i, l] = Θ[l]P j
With consideration of (R1), this requirement can be fulfilled
k [l, i], ∀i. A Markov process satisfying
by Θ[i]P j
this property is said to be reversible.
Requirement 4. P j
P j
P j
k is irreducible such that
if Ck[i, l] = 1.
k [i, l] > 0
otherwise.
k [i, l] = 0
(R4)
k converges to
k[i] → ¯Θ[i] (or ¯ξj
k becomes close to I as ¯µj
Note that Ck is already assumed to be irreducible in Assump-
tion 3.
Requirement 5. P j
¯Θ, i.e.,
k [i, i] → 1 as ¯µj
P j
(R5)
Depending on the objectives of a user, P j
k[i] and
Gj
k[i] can be designed differently under given specific con-
straints. As long as P j
k holds (R1)-(R5) for all time instant
k and all agent j ∈ A, the aforementioned desired features
are achieved. Note that (R1)-(R4) are associated with Desired
Feature 1, whereas (R5) is with Desired Feature 2. The detailed
analysis will be described in the next subsection.
k[i] → 0), ∀i.
k, ¯ξj
k , Sj
Every agent executes the following algorithm at every time
instant. The detail regarding Line 6-8 will be presented in
Section IV, which shows examples of how to implement this
framework.
Algorithm 1 Decision making of agent j at time instant k
1: Identify the current bin Bi;
2: Identify neighbour bins Nk(i) (and Ck[i, l] ∀l);
3: Compute ¯Θ[i] using (5);
4: Obtain ¯µj
// Obtain the local information
k[i];
// Generate the stochastic decision policy
k[i] (using (6));
k [i, l] ∀l;
k[i, l] ∀l;
k[i];
k[i] using (9);
k [i, l] ∀l using (8);
5: Compute ¯ξj
6: Compute P j
7: Compute Sj
8: Compute Gj
9: Compute ωj
10: Compute M j
// Individually behave based on the policy
11: Generate a random number z ∈ unif[0, 1];
12: Select bin Bq such that
k [i, l] ≤ z <(cid:80)q
(cid:80)q−1
l=1 M j
l=1 M j
13: Move to the selected bin;
k [i, l];
D. Analysis
We first show that the Markov process in Equation (11)
holds Desired Feature 1 under the assumption that P j
k sat-
isfies the requirements (R1)-(R4) for each time instant. The
stochastic state of agent j at time instant k ≥ k0, governed by
the Markov process from an arbitrary initial state xj
, can be
k0
written as:
xj
k = xj
k0
k0+1 ··· M j
M j
U j
k0,k := xj
M j
k0
k−1.
(12)
k0
For ease of analysis, we assume that every agent j knows any
necessary information correctly, i.e., ¯µj
k[i] = ¯µ(cid:63)
k[i].
Theorem 1. Provided that the requirements (R1)-(R4) are sat-
isfied for all time instants k ≥ k0, it holds that limk→∞ xj
k =
Θ pointwise for all agents, irrespective of the initial condition.
6
k0,k = xj
· limk→∞ U j
Proof. This claim can be proved by following similar steps in
proving [13, Theorem 4]. The claim is true if limk→∞ xj
k =
· 1(cid:62)Θ = Θ. In order for that,
xj
k0
the matrix product U j
k0,k should (i) be strongly ergodic and
(ii) have Θ as its unique limit vector, i.e., limk→∞ U j
k0,k =
1(cid:62)Θ. We will show that the two conditions are valid under
the assumption that (R1)-(R4) are satisfied.
k0
k, ∀k; and (c) M j
Lemma 5 in Appendix describes the characteristics of M j
k
and U j
k0,k, which will be used for the rest of this proof. From
this lemma, (a) U j
k0,k is primitive (thus, regular); (b) there
exists a positive lower bound γ for M j
k is
asymptotically homogeneous. Then, from [33, Theorem 4.15,
p.150] it follows that U j
k0,k is strongly ergodic, which fulfils
the condition (i).
Let ek ∈ Pnbin be the unique stationary distribution vector
k = ek). Due to the prior
corresponding to M j
condition (b) and the fact
k is irreducible for
∀k ≥ k0, it follows from [33, Theorem 4.12, p.149] that
the asymptotical homogeneity of M j
k with respect to Θ (i.e.,
k = Θ) is equivalent to limk→∞ ek = e and
limk→∞ ΘM j
Θ = e, where e is a limit vector. According to [33, Corollary,
p.150], under the prior conditions (b) and (d), if U j
k0,k is
strongly ergodic with its unique limit vector v, then v = e.
Hence, it turns out that the unique limit vector of U j
k0,k is Θ
k0,k = 1(cid:62)Θ). Thereby, the condition (ii) is also
(i.e, limk→∞ U j
fulfilled.
k (i.e., ekM j
that (d) M j
k, Gj
Theorem 1 implies that the stochastic state of any agent
eventually converges to the desired swarm distribution, regard-
less of Sj
k[i] and (R5). In other words, even if (R5) is not
satisfied, the Markov system can converge to Θ. However, the
system induces unnecessary transitions of agents even after
being close enough to the desired swarm distribution, which
means that Desired Feature 2 does not hold.
For now, we present that Desired Feature 2 can be obtained
by (R5) and Theorem 2, which will be described later. Suppose
that, for every bin Bi, ¯µ(cid:63)
k[i] converges to and eventually
reaches ¯Θ[i] at some time instant k. The following shows
that at this moment it also holds that µ(cid:63)
k reaches Θ. From
k[i] = ¯Θ[i] ∀i, it
Equations (4)-(5) and the supposition of ¯µ(cid:63)
follows that 1/ ¯Θ[i] · nk[i] =(cid:80)∀j:Bj∈Nk(i) nk[j] ∀i. This can
be rearranged as:
nk · B := nk · (Ck − X) = 0
(13)
where X ∈ Rnbin×nbin is a diagonal matrix such that
diag(X) = (1/ ¯Θ[1], 1/ ¯Θ[2], ..., 1/ ¯Θ[nbin]); Ck is the com-
municational connectivity matrix (in Definition 7); and nk ∈
Rnbin is a row vector such that the i-th element indicates nk[i],
i.e., the number of agents in bin Bi at time instant k.
Lemma 1. Given nbin bins communicationally-connected as
a tree-type topology, the rank of its corresponding matrix B
in Equation (13) is nbin − 1.
(a) Tree-type
(b) Strongly-connected
Fig. 2. Examples of simple bin topologies to help Lemma 1 & 2: (a) tree-
type; (b) strongly-connected. The red line in (b) indicates a newly-added route
between bin B1 and B4 based on the topology in (a).
Proof. The matrix B ∈ Rnbin×nbin can be linearly decom-
posed into ne of the same-sized matrices B(i,j), where ne is
the number of edges in the underlying graph of Ck. Here,
B(i,j) ∈ Rnbin×nbin is a matrix such that B(i,j)[i, i] =
−Θ[j]/Θ[i] and B(i,j)[j, j] = −Θ[i]/Θ[j]; B(i,j)[i, j] =
B(i,j)[j, i] = 1; and all the other entries are zero. For example,
consider that four bins are given and connected as shown in
Figure 2(a). Clearly, B = B(1,2) + B(2,3) + B(2,4), where
− Θ[2]
Θ[1]
1
B =
− Θ[1]+Θ[3]+Θ[4]
1
Θ[2]
1
0
1
− Θ[2]
Θ[3]
0
0
1
0
− Θ[2]
Θ[4]
,
0
0
B(1,2) =
B(2,3) =
B(2,4) =
1
− Θ[2]
Θ[1]
1
0
0
1
− Θ[1]
Θ[2]
0
0
0
0
0
0
0
0
0 − Θ[3]
0
0
Θ[2]
1
0
0
0
0 − Θ[4]
0
0
Θ[2]
0
1
0
1
− Θ[2]
Θ[3]
0
0
1
0
0
0
0
0 − Θ[2]
Θ[4]
0
0
0
0
0
0
0
0
,
,
.
1
1
It is trivial that the rank of every B(i,j) is one, and the matrix
has only one linearly independent column vector, denoted by
v(i,j). Without loss of generality, we consider v(i,j) ∈ Rnbin
as a column vector such that the i-th entry is − 1
Θ[i], the j-th
Θ[j], and the others are zero: for an instance, v(1,2) =
entry is
[− 1
Θ[2] , 0, 0](cid:62).
Θ[1] ,
It is obvious that v(i,j) and v(k,l) are linearly independent
when the bin pairs {i, j} and {k, l} are different. This implies
that the number of linearly independent column vectors of B
is the same as that of edges in the topology. Hence, for a tree-
type topology of nbin bins, since there exist nbin − 1 edges,
the rank of the corresponding matrix B is nbin − 1.
Lemma 2. Given a strongly-connected topology of bins, the
rank of its corresponding matrix B is not affected by adding
a new edge that directly connects any two existing bins.
1 2 3 4 1 2 3 4 Proof. We will show that this claim is valid even when a
tree-type topology is given, as it is a sufficient condition for
strong-connectivity. Given the tree-type topology in Figure
2(a), suppose that bin B1 and B4 are newly connected. Then,
the new topology becomes as shown in Figure 2(b), and it has
new corresponding matrix Bnew, where Bnew = B + B(1,4).
As explained in the proof of Lemma 1, the rank of B(1,4) is one
and it has only linearly independent vector v(1,4). However,
this vector can be produced as a linear combination of the
existing v vectors of B (i.e., v(1,4) = v(1,2) + v(2,4)). Thus,
the rank of Bnew retains that of B. Without loss of generality,
this implies that the rank of B of a given strongly-connected
topology is not affected by adding a new edge that directly
connects any two existing bins.
Thanks to Lemma 1 and 2, we end up with the following
k to Θ.
corollary and theorem:
Corollary 1. Given nbin bins that are communicationally
strongly-connected, the rank of its corresponding B is nbin−1.
Theorem 2. Given nbin bins that are communicationally
k to ¯Θ is equivalent to
strongly-connected, convergence of ¯µ(cid:63)
convergence of µ(cid:63)
Proof. From Equation (5), it can be said that Θ·B = 0. When
k[i] is assumed to converge to ¯Θ[i] at some time instant k for
¯µ(cid:63)
every bin Bi, Equation (13) is valid (i.e., nk · B = 0). Since
the nullity of B is one, due to Corollary 1, there is only one
linearly-independent row-vector a ∈ Rnbin such that a·B = 0.
Hence, it is obvious that nk = · Θ, where is an arbitrary
k = Θ[i], ∀i :
scalar value. This implies that µ(cid:63)
Bi ∈ B. Therefore, convergence of µ(cid:63)
k to Θ is equivalent to
convergence of ¯µ(cid:63)
k[i] = nk[i]/nA
k to ¯Θ.
From this theorem and (R5), Desired Feature 2 finally holds.
k satisfies (R5), it can be said from Theorem
k converges to Θ. And this is also
k, which satisfies Desired
Corollary 2. If P j
2 that P j
the case for the Markov process M j
Feature 2.
k becomes I as µ(cid:63)
In order for each agent j in bin Bi to generate the time-
varying stochastic decision policy M j
k [i, l] in Equation (8), the
agent only needs to obtain its local information within ANk(i).
Therefore, Desired Feature 3 is also achieved.
Remark 3 (Robustness against dynamic changes of agents
and those of bins). The proposed framework is robust with
against dynamic changes in the number of agents and bins.
Similarly to what is claimed in [13, Remark 8], as each agent
behaves based on its current bin location and local information
in a memoryless manner, Desired Features 1-3 in the proposed
framework won't be affected by inclusion or exclusion of
agents in a swarm. Furthermore, provided changes on bins
are perceived by at least nearby agents in the corresponding
neighbour bins, robustness against those changes can be hold
in the proposed framework. This is because agents in bin
Bi utilise only local
k[i],
and are not required to know any information from other
far-away bins. Moreover, the proposed framework does not
need to recalculate Θ, reflecting such changes on bins, so
information such as ¯Θ[i] and ¯µj
that (cid:80)∀i Θ[i] = 1 because computing ¯Θ[i] in (5) includes
7
normalisation of Θ.
IV. IMPLEMENTATION EXAMPLES
A. Example I: Minimising Travelling Expenses
This section provides examples on implementations of the
framework proposed. In particular, this subsection addresses
a problem of minimising travelling expenses of agents during
convergence to a desired swarm distribution.
This problem can be defined as: given a cost matrix
Ek ∈ Rnbin×nbin in which each element Ek[i, l] represents
the travelling expense of an agent from bin Bi to Bl, find P j
such that
k
nbin(cid:88)
nbin(cid:88)
min
Ek[i, l]P j
k [i, l]
i=1
subject to (R1)-(R5) and
l=1
M Θ[l]f ( ¯ξj
k[i], ¯ξj
k[l])f (Ek[i, l]) ≤ P j
k [i, l]
if Ck[i, l] = 1, ∀i (cid:54)= l
k[i], ¯ξj
where M ∈ (0, 1] is a design parameter. f ( ¯ξj
is set by
f ( ¯ξj
k[i], ¯ξj
k[l]) = max( ¯ξj
k[i], ¯ξj
k[l])
k[l]) ∈ (0, 1]
(15)
k[i] or ¯ξj
k[l] and diminishes as ¯ξj
the value monotonically increases with regard to
so that
increase of either ¯ξj
k[i] and
¯ξj
k[l] simultaneously reduces. This value controls the lower
bound of P j
k [i, l] in Equation (14). Θ[l] enables agents in bin
Bi to be distributed over its neighbour bins in proportion to the
desired swarm distribution. f (Ek[i, l]) ∈ (0, 1] is a scalar that
monotonically decreases as Ek[i, l] increases (see Equation
(29) for instances), encouraging agents in bin Bi to avoid
spending higher transition expenses. Note that we assume that
Ek is symmetric; Ek[i, l] > 0 if Ak[i, l] = 1; and its diagonal
entries are zero.
Corollary 3. The optimal matrix P j
given by: ∀i, l ∈ {1, ..., nbin} and i (cid:54)= l,
k of the problem (P1) is
(P1)
(14)
(cid:40)
P j
k [i, l] =
and ∀i = l,
M Θ[l]f ( ¯ξj
0
k[i], ¯ξj
k[l])f (Ek[i, l])
k [i, i] = 1 −(cid:88)
P j
∀l(cid:54)=i
if Ck[i, l] = 1
otherwise
(16)
P j
k [i, l].
(17)
Proof. We can prove this by following the proof of [13,
Corollary 1]. Suppose that the problem is only subject to (R4)
and (14), without (R1)-(R3) and (R5). Then, the off-diagonal
elements of an optimal matrix should be their corresponding
lower bounds in (14) if Ck[i, l] = 1. The diagonal elements of
the matrix do not affect the objective function due to the fact
that Ek[i, i] = 0,∀i. Accordingly, the matrix P j
k that holds
(16) and (17) is also an optimal matrix for the simplified
problem.
Let us now consider
k[i], ¯ξj
(cid:80)∀l(cid:54)=i Θ[l] < 1, P j
(R1)-(R3) and (R5). Since M ,
k[l]) and f (Ek[i, l]) are upper-bounded by 1 and
k [i, i] in (17) is always positive for all i,
which fulfils (R2). It is also obvious that (R1) is satisfied by
f ( ¯ξj
Equation (17). From Equation (16), it holds that Θ[i]P j
k [i, l] =
Θ[l]P j
k [l, i], complying with (R3). Since (R1)-(R4) are satis-
fied, the Markov process is converging to a desired distribution
due to Theorem 1. Noting that f ( ¯ξj
k[l]) diminishes as
k → ¯Θ), (R5) is also fulfilled
¯ξj
k gets close to zero (i.e., ¯µj
by Equation (17). Hence, P j
k is the optimal solution for the
problem (P1).
k[i], ¯ξj
For reducing unnecessary transitions of agents during this
process, it is favourable that agents in bin Bi such that ¯µj
k[i] ≤
¯Θ[i] (i.e., underpopulated) do not deviate. To this end, we set
Sj
k = I and Gj
k[i] as follows [13]:
Gj
k[i] :=
exp(β( ¯Θ[i] − ¯µj
exp(β ¯Θ[i] − ¯µj
k[i]))
k[i])
.
(18)
that (cid:80)∀l(cid:54)=i P j
k [i, l] ≤ (cid:80)∀l:Bl∈Nk(i)\Bi
The gain value is depicted in Figure 3(a) with regard to β.
Remark 4 (Increase of Convergence Rate). Due to the fact
Θ[l] from Equation
(16), the total outflux of agents from bin Bi becomes smaller as
the bin has fewer connections with other bins. This eventually
makes the convergence rate of the Markov process slower.
Adding an additional variable into P j
k [i, l] in (16) does not
affect the obtainment of Desired Features 1-3 as long as P j
k
satisfies (R1)-(R5). Thus, in order to enhance the convergence
rate under the requirements, one can add
Θ := min{
(cid:80)∀s:Bs∈Nk(l)\Bl
Θ[s]
Θ[s]
1
,
}
(19)
into P j
k [i, l], as follows:
1
(cid:80)∀s:Bs∈Nk(i)\Bi
ΘM Θ[l]f ( ¯ξj
0
k[i], ¯ξj
k[l])f (Ek[i, l])
P j
k [i, l] =
if Ck[i, l] = 1
otherwise,
(20)
which can be substituted for Equation (16).
Algorithm 2 Subroutine of Algorithm 1 (Line 6 -- 8) for P1
1: Compute P j
2: Set Sj
3: Compute Gj
k [i, l] ∀l using (16) (or (20)) and (17);
k[i, l] = 0,∀l (cid:54)= i
k[i, i] = 1 and Sj
k[i] using (18);
B. Example II: Maximising Convergence Rate within Upper
Flux Bounds
This subsection presents an example in which the specific
objective is to maximise the convergence rate under upper
bounds regarding transitions of agents between bins, denoted
by upper flux bounds. The bounds can be interpreted as safety
constraints in terms of collision avoidance and congestion:
higher congestions may induce higher collisions amongst
agents, which may bring unfavourable effects on system
performance. A similar problem is addressed by an open-loop-
type algorithm in [17], where transitions of agents are limited
only at a desired swarm distribution. This restriction is not for
considering the aforementioned safety constraints, but rather
8
for mitigating the trade-off between convergence rate and long-
term system efficiency.
For the sake of imposing upper flux bounds during the entire
process, we consider the following one-way flux constraint:
∀i,∀l (cid:54)= i.
k [i, l] ≤ c(i,l),
nk[i]P j
(21)
This means that the number of agents moving from bin Bi
to Bl is upper-bounded by c(i,l). The bound value is assumed
to be very small with consideration of mission environments
such as the number of agents, the number of bins, and their
topology. Otherwise, all the agents can be distributed over
the bins very soon so that the upper flux bounds become
meaningless, and thus the corresponding problem can be
trivial.
Regarding the convergence rate of a Markov chain, there
are respective analytical methods depending on whether it
is time-homogeneous or time-inhomogeneous. For a time-
homogeneous Markov chain, if the matrix is irreducible, the
second largest eigenvalue of the matrix is used as an index
indicating its asymptotic convergence rate [34, p.389]. In
contrast, for a time-inhomogeneous Markov chain, coefficients
of ergodicity can be utilised as a substitute for the second
largest eigenvalue, which is not useful for this case [35].
Particularly, this paper uses the following proper coefficient
of ergodicity, amongst others:
Definition 8. (Coefficient of Ergodicity [33, pp. 136 -- 137]).
Given a stochastic matrix M ∈ Pn×n, a (proper) coefficient
of ergodicity 0 ≤ τ (M) ≤ 1 can be defined as:
M[i, s] − M[l, s].
τ (M) := max∀s
max∀i,∀l
(22)
A coefficient of ergodicity is said to be proper if τ (M) = 0
if and only if M = 1(cid:62) · v, where v ∈ Pn is a row-stochastic
vector.
p.137]: τ (M1M2 ···Mr) ≤ (cid:81)r
The convergence rate of a time-inhomogeneous Markov
chain Mk ∈ Pn×n, ∀k > 1 can be maximised by minimising
τ (Mk) at each time instant k, thanks to [33, Theorem 4.8,
k=1 τ (Mk). Hence, the ob-
jective of the specific problem considered in this subsection
can be defined as: find P j
k such that
min τ (P j
k )
(23)
subject to (R1)-(R5) and (21).
Remark 5 (Advantages of the coefficient of ergodicity in (22)).
Other proper coefficients in [33, p. 137] such as
τ1(M) = 1 − min
min (M[i, s],M[l, s])
(cid:88)
τ2(M) = 1 −(cid:88)
∀s
i,l
or
(M[i, s]) .
min∀i
∀s
may have the trivial case such that τ1(P j
k ) = 1)
for some time instant k, when they are applied to this problem.
This is because, given a strongly-connected topology Ck, there
may exist a pair of bins Bi and Bl such that P j
k [i, s] = 0
k [l, s] = 0, ∀s. To avoid this trivial case, the work in
or P j
k ) = 1 (or τ2(P j
[13] instead utilises τ1((P j
k )dCk ) as the proper coefficient of
ergodicity, where dCk denotes the diameter of the underlying
graph of Ck. However, this implies that agents in bin Bi are
required to additionally access the information from other bins
beside Nk(i), causing additional communicational costs. The
coefficient of ergodicity in (22) does not suffer this issue. Note
that τ (M) ≤ τ1(M) ≤ τ2(M) [33, p. 137].
Finding the optimal solution for the problem (23) is another
challenging issue, which can be called fastest mixing Markov
chain problem. Since the purpose of this section is to show an
example of how to implement our proposed framework, we
heuristically address this problem at this moment.
k ) = max∀i,∀s(P j
Suppose that matrix P j
k satisfying (R1)-(R5) is given,
and the topology of bins is not fully-connected. Since the
matrix is non-negative and there exists at
least one zero-
the coefficient of ergodicity
value entry in each column,
can be said as τ (P j
k [i, s]). Assuming that
k [i, l] ≤ 1/Nk(i), which is generally true due
max∀l(cid:54)=i P j
that each diagonal
to the smallness of c(i,l),
element of P j
k is the largest value in each row. Thus, we can
say that τ (P j
k ) = max∀i P j
k [i, i]. The objective function of
this problem can be said as maxmin∀i
k [i, l] because
minimising the maximum diagonal element of a stochastic
matrix is equivalent to maximising the minimum row-sum of
its off-diagonal elements.
(cid:80)∀l(cid:54)=i P j
turns out
it
We turn now to the constraints (R1)-(R5) and (21). In order
to comply with (R3), we initially set P j
k[i, l],
where Qj
k is a symmetric matrix that we will design now.
The constraint (21), (R4), and the symmetricity of Qk are
integrated into the following constraint: ∀i, ∀l (cid:54)= i,
k [i, l] = Θ[l]Qj
min(
c(i,l)
nk[i]Θ[l]
,
c(l,i)
nk[l]Θ[i]
) ≥ Qj
k[i, l] > 0
if Ck[i, l] = 1
For (R2) and (R5), we set the diagonal entries of P j
k as
Qj
k[i, l] = 0
otherwise.
(24)
This can be rewritten, with consideration of
(R1)
(i.e.,
∀i.
k[i],
(cid:80)nbin
l=1 Θ[l]Qj
k [i, i] ≥ 1 − ¯ξj
P j
(cid:88)
k[i, l] = 1,∀i), as
Θ[l]Qj
∀l(cid:54)=i
9
Q[i], ¯(cid:48)
Q[l]} (Line 4). After curtailing Qj
possible, we temporarily take (cid:48)
Q[i, l] as the maximum value
of {¯(cid:48)
k[i, l] by applying
(cid:48)
Q[i, l], we obtain the corresponding lowering factor again
(Line 5 -- 6). The minimum value is taken for both maintaining
Qj
k symmetric and satisfying (25) (Line 7). Then, the corre-
sponding stochastic decision policy is generated based on the
resultant Qj
k[i] = 0 for all
time instants, all bins, and all agents, so M j
k (Line 9 -- 10). Note that we set Gj
k = P j
k .
Algorithm 3 Subroutine of Algorithm 1 (Line 6) for P1
nk[l]Θ[i] ), ∀Bl ∈ Nk(i) \ {Bi};
¯ξj
k[i]
, 1);
1: P j
2: Qj
nk[i]Θ[l] ,
k to satisfy (25)
3: ¯(cid:48)
4: (cid:48)
5: Qj
k satisfying (24)
c(l,i)
// Initialise P j
k [i, l] = 0, ∀l ∈ {1, 2, ..., nbin};
k
// Compute Qj
k[i, l] = min( c(i,l)
(cid:80)∀l(cid:54)=i Θ[l]Qj
Q[i], ¯(cid:48)
(cid:80)∀l(cid:54)=i Θ[l]Qj
k [i, i] = 1 −(cid:80)∀l(cid:54)=i P j
// Lower Qj
Q[i] = min(
Q[i, l] = max(¯(cid:48)
k[i, l] := (cid:48)
6: ¯Q[i] = min(
7: Q[i, l] = min(¯Q[i], ¯Q[l]), ∀Bl ∈ Nk(i) \ {Bi};
k[i, l], ∀Bl ∈ Nk(i) \ {Bi};
8: Qj
Q[l]), ∀Bl ∈ Nk(i) \ {Bi};
k[i, l], ∀Bl ∈ Nk(i) \ {Bi};
k[i, l], ∀Bl ∈ Nk(i) \ {Bi};
// Compute P j
k
k [i, l] = Θ[l]Qj
k[i, l] := Q[i, l]Qj
Q[i, l]Qj
¯ξj
k[i]
k [i, l];
, 1);
k[i,l]
k[i,l]
9: P j
10: P j
C. Example III: Local-information-based Quorum Model
This subsection shows that
the proposed framework is
able to incorporate a quorum model, which is introduced in
[14], [15]. In this model, if a bin is overpopulated above
a certain level of predefined threshold called quorum, the
probabilities that agents in the bin move to neighbour bins
are temporarily increased, rather than following given P j
k .
This feature eventually brings an advantage to the convergence
performance of the swarm.
follows: ∀i, l ∈ {1, ..., nbin} and ∀j ∈ A,
To this end, we set the secondary guidance matrix Sj
k as
k[i],
∀i.
(25)
Sj
k[i, l] :=
1/Nk(i)
0
if Ck[i, l] = 1
otherwise.
(26)
Then, the reduced problem can be defined as: find Qj
that
k such
maxmin∀i
Θ[l]Qj
k[i, l]
(P2)
This matrix makes agents in a bin equally disseminated over
its neighbour bins. In addition, the secondary feedback gain
Gj
k[i] is defined as
k[i, l] ≤ ¯ξj
(cid:88)
∀l(cid:54)=i
(cid:40)
(cid:32)
subject to (24) and (25).
The algorithm for this problem is shown in Algorithm 3.
If we neglect (25), an optimal solution can be obtained by
making Qj
k[i, l] equal to its upper bound of (24) (Line 2).
However, this solution may not hold (25). Thus, we lower the
entries of Qj
k to satisfy (25), while keeping them symmetric
and as higher as possible (Line 3 -- 9). In details, Line 3 (or
Line 6) ensures the constraint (25) for each bin Bi in a way
that, if this is not the case, obtains the necessary lowering
factor ¯(cid:48)
k as higher as
Q[i] (or ¯Q[i]). In order to keep Qj
(cid:16)
(cid:17)(cid:33)−1
Gj
k[i] :=
1 + exp
γ(qi − ¯µj
k[i]
¯Θ[i]
)
,
(27)
where γ > 0 is a design parameter, and qi > 1 is the quorum
for bin Bi. The value of the gain is shown in Figure 3(b),
k[i]/ ¯Θ[i] becomes higher
varying depending on γ and qi. As ¯µj
than the quorum, Gj
k[i, l] becomes
more dominant than P j
k [i, l]). The steepness of the function at
the quorum value is regulated by γ.
k[i] gets close to 1 (i.e., Sj
The existing quorum models in [14], [15] require each agent
k[i], which implies that the total number of agents
to know µ(cid:63)
10
k[i]) as R+
1. We refer to a set of bins where agents are ready to use
their respective local information (e.g., ¯µj
k , and a
set of the other bins as R−
k . It is assumed that each agent
j in bin Bi ∈ R+
k also knows the local information of its
neighbour bin Bl ∈ Nk(i) if Bl ∈ R+
k . As shown in Line 2, the
agent follows an existing procedure as long as all information
required to generate P j
k[l]
for Algorithm 2, and ¯(cid:48)
Q[l] for Algorithm 3). On the
contrary, if any local information of its neighbour bin Bl ∈
Nk(i) is not available, the probability to transition to the bin
is set as zero (Line 3). In the meantime, each agent for whom
necessary local information is not ready does not deviate but
remains at the bin it belonged to. Equivalently, it can be said
that P j
k [i, l] is available (e.g., ¯µj
Q[i] and ¯(cid:48)
k [i, l] = 0, ∀l (cid:54)= i (Line 6).
k [i, i] = 1 and P j
k[i] and ¯µj
Hereafter, for the sake of differentiation from the original
P j
k generated in a synchronous environment, let us refer to the
matrix resulted by Algorithm 5 as asynchronous primary guid-
ance matrix, denoted by ¯P j
k . Accordingly, the asynchronous
Markov matrix can be defined as:
k := (I − W j
¯M j
k + W j
k ) ¯P j
k Sj
k.
Here, we show that this asynchronous Markov process also
and (3)(cid:80)nbin
converges to the desired swarm distribution.
Lemma 3. The matrix ¯Pk, for every time instant k, satisfies
the following properties: (1) row-stochastic; (2) all diagonal
elements are positive, and all other elements are non-negative;
trivial that (cid:80)nbin
i=1 Θ[i] ¯P j
Proof. The matrix ¯P j
6 in Algorithm 5. Furthermore, given that P j
the property (2) is valid for ¯P j
∀i.
k [i, l] = Θ[l],∀l.
k is row-stochastic because of Line 4 and
k satisfies (R2),
k [i, i] for
k [i, i] ≥ P j
Let us now turn to the property (3). For ∀Bi ∈ R−
k , it is
k [l, i] = Θ[i] because of Line 6. For
k [i, l] =
k [i, l] for ∀Bl ∈
P j
k [i, l].
k [i, i] +(cid:80)∀l:Bl∈R−
l=1 Θ[l] ¯P j
∀Bi ∈ R+
k [l, i] = 0 for ∀Bl ∈ R−
¯P j
R+
k \ {Bi} and (iii) ¯P j
(cid:88)
nbin(cid:88)
We apply the findings into the following equation:
(cid:88)
k , it turns out from Algorithm 5 that (i) ¯P j
k ; (ii) ¯P j
k [i, i] = P j
k because ¯P j
k [i, l] = P j
∀l:Bl∈R−
k [l, i] =
Θ[l] ¯P j
Θ[l] ¯P j
k [l, i]
l=1
k
k
+
∀l:Bl∈R+
k \{Bi}
Θ[l] ¯P j
k [l, i] + Θ[i] ¯P j
k [i, i].
(28)
The first term of the right hand side becomes zero because of
(i). Due to (ii) and the fact that Θ[i]P j
k [i, l] = Θ[l]P j
k [l, i]
∀l,
k \{Bi} P j
k [i, l].
The last term becomes Θ[i]P j
P j
k [i, l]
because of (iii). Putting all of them together, Equation (28)
k [i, i] +
the second term becomes Θ[i](cid:80)∀l:Bl∈R+
is equivalent to Θ[i](cid:80)∀l:Bl∈R+
k [i, l] = Θ[i](cid:80)nbin
Θ[i](cid:80)∀l:Bl∈R−
k [i, i] + Θ[i](cid:80)∀l:Bl∈R−
k [i, l] + Θ[i]P j
k [i, l] = Θ[i].
k \{Bi} P j
l=1 P j
P j
k
k
Lemma 4. If the union of a set of underlying graphs of
{ ¯Pk1 , ¯Pk1+1, ..., ¯Pk2−1} is strongly-connected, then the matrix
product ¯Pk1,k2 := ¯Pk1
¯Pk1+1 ··· ¯Pk2−1 is irreducible.
(a) P1
(b) the Quorum Model
Fig. 3. The secondary feedback gains Gj
k[i] depending on the associated
design parameters: (1) for P1 (Eqn. (18)); (2) for the quorum model (Eqn.
(27))
nA
k should be tracked in real time. It could be possible that
some agents in a swarm unexpectedly become faulted by
internal or external effects during a mission, which hinders
for other alive agents from keeping track of nA
k in a timely
manner. On the contrary, this requirement is not the case for
the quorum model in this subsection, and it works by using
the local information available from ANk(i).
Algorithm 4 Subroutine of Algorithm 1 (Line 7-8) for the
quorum-based method
1: Compute Sj
2: Compute Gj
k[i, l] ∀l using (26);
k[i] using (27);
V. ASYNCHRONOUS IMPLEMENTATION
A synchronous process induces extra time delays and inter-
agent communications to make entire agents, who may have
different timescales for obtaining new information and make
decisions, remain in sync. Such unnecessary waiting time and
communications may cause unfavourable effects on mission
performance or even may not be realisable in practice [23].
In the previous sections, it was assumed that a swarm of
agents act synchronously at every time instant. Here we show
that the proposed framework allows agents to operate in an
asynchronous manner, assuming that the union of underlying
graphs of the corresponding Markov matrices across some time
intervals is frequently and infinitely strongly-connected.
Suppose that an algorithm to compute P j
k that satisfies (R1)-
(R5) in a synchronous environment is given (e.g., Algorithm 2
or 3). We propose an asynchronous implementation, as shown
in Algorithm 5, which substitutes for Line 6 in Algorithm
k [i, l] (Substi-
k & isnonempty(R+
Algorithm 5 Asynchronous Construction of P j
tute for Line 6 of Algorithm 1)
1: if Bi ∈ R+
k \ {Bi}) then
2:
3:
4:
5: else
P j
k [i, i] = 1; P j
6:
7: end if
Compute P j
k [i, l] = 0, ∀Bl ∈ R−
P j
k ;
P j
k [i, l];
k [i, i] = 1 −(cid:80)∀l(cid:54)=i P j
k [i, l] as usual, ∀Bl ∈ R+
k [i, l] = 0, ∀l (cid:54)= i;
k \ {Bi};
-2-1.5-1-0.500.511.5200.10.20.30.40.50.60.70.80.91 = 1 = 5 = 10 = 100(underpopulated) (overpopulated) 00.511.522.533.5400.10.20.30.40.50.60.70.80.91qi = 2, = 1qi = 2, = 10qi = 2, = 100qi = 1.5, = 10(underpopulated) (overpopulated) k=k1
k=k1
graph of (cid:80)k2−1
γ(cid:80)k2−1
Proof. Since the union of a set of underlying graphs of
{ ¯Pk1, ¯Pk1+1, ..., ¯Pk2−1} is strongly-connected, the underlying
¯Pk is also strongly-connected. Noting that
every ¯Pk, ∀k ∈ {k1, k1 + 1, ..., k2 − 1} is a nonnegative
nbin × nbin matrix and its diagonal elements are positive (by
Lemma 3), it follows from [36, Lemma 2] that ¯Pk1,k2 ≥
¯Pk, where γ > 0. This implies that the underlying
graph of ¯Pk1,k2 is strongly-connected, and thus the matrix
¯Pk1,k2 is irreducible.
Theorem 3. Suppose that
there exists an infinite se-
quence of non-overlapping time intervals [ki, ki+1), i =
the union of underlying graphs
0, 1, 2, ...,
of { ¯Pki, ¯Pki+1, ..., ¯Pki+1−1} in each interval
is strongly-
connected. Let the stochastic state of agent j at time in-
stant k ≥ k0, governed by the corresponding Markov pro-
cess from an arbitrary state xj
k0,k :=
k0
xj
k = Θ
k0
pointwise for all agents, irrespective of the initial condition.
Proof. Thanks to Lemma 3 and 4, the matrix product ¯Pki,ki+1
for each time interval [ki, ki+1) satisfies (R1)-(R4). Therefore,
one can prove this theorem by similarly following the proof
of Theorem 1.
¯U j
k−1. Then, it holds that limk→∞ xj
k0+1 ··· ¯M j
¯M j
, be xj
k = xj
k0
such that
¯M j
k0
VI. NUMERICAL EXPERIMENTS
A. Effects of Primary Local-feedback Gain ¯ξj
k[i]
Depending on the shape of primary feedback gain ¯ξj
k[i], the
performance of the proposed framework changes, especially
with respect
to convergence rate, fraction of transitioning
agents, and residual convergence error. Let us first investigate
the effect of changes in the feedback gain using Algorithm 2
with Equation (20).
We consider a scenario where a set of 2, 000 agents are
supposed to be distributed over an arena consisting of 10× 10
bins, as depicted in Figure 1. There are vertical and horizontal
paths between adjacent bins. Note that the agents are allowed
to move at most 3 paths away within a unit time instant. All
the agents start from a bin, which reflects the fact that they
are generally deployed from a base station at the beginning
of a mission. The desired swarm distribution Θ is uniform-
randomly generated at each scenario. The agents are assumed
to estimate necessary information correctly, e.g. ¯µj
k[i].
For the rigorous validation, the performance of the proposed
algorithm will be compared with that of the GICA-based
algorithm [13]. To this end, f (Ek[i, l]) is set to be the same
as the corresponding coefficient in [13, Corollary 1]:
k[i] = ¯µ(cid:63)
f (Ek[i, l]) := 1 −
Ek[i, l]
Ek,max + E
(29)
where Ek,max is the maximum element of the travelling
expense matrix Ek, and E is a user-design parameter. Ek[i, l]
is defined as a linear function based on the distance between
bin Bi and Bl:
Ek[i, l] := E1 · ∆s(i,l) + E0
(30)
where ∆s(i,l) is the minimum required number of paths from
Bi to Bl; E1 and E0 are user-design parameters. The agents
11
(a) Primary Local-feedback Gain
Fraction
(b)
Agents
of Transitioning
(c) Convergence Error
(d) Convergence Error (zoomed-in)
k[i] with different setting of α: (a) the value of ¯ξj
Fig. 4. Performance comparison depending on the primary local-feedback
gain ¯ξj
k[i]; (b) the fraction
of transitioning agents; (b) the convergence performance; (d) the convergence
performance (zoomed-in for time instant between 2000 and 4000)
are assumed to follow any shortest route when they transition
between two bins. The design parameters are set as follows:
E1 = 1 and E0 = 0.5 in (30); E = 0.1 in (29); ξ = 10−9
in (6); M = 1 in (20); β = 1.8× 105 in (18); and τ j = 10−6
in (9).
As a performance index for the closeness between the cur-
k and Θ, we use Hellinger Distance,
rent swarm distribution µ(cid:63)
i.e.,
(cid:19)2
µ(cid:63)
k[i]
,
(cid:118)(cid:117)(cid:117)(cid:116)nbin(cid:88)
i=1
(cid:18)(cid:112)Θ[i] −(cid:113)
DH (Θ, µ(cid:63)
k) :=
1√
2
Hellinger Distance is known as a "concept of measuring
similarity between two distributions" [37] and is utilised as
a feedback gain in the existing work [13].
More importantly, to examine the effects of the shape of
¯ξj
k[i], we set α in (6) as 0.2, 0.4, 0.6, 0.8, 1 and 1.2.
Figure 4 reveals that the convergence rate can be traded off
against the fraction of transitioning agents and the residual
convergence error. As ¯ξj
k[i] becomes more concave, i.e. the
value of α decreases, the summation of off-diagonal entries
of P j
k becomes higher, leading to more transitioning agents,
but a faster convergence rate. At the same time, a higher value
k[i] even at a low value of ¯Θ[i]−µj
k[i] gives rise to unnec-
of ¯ξj
essarily higher off-diagonal entries of P j
k . Hence, the swarm
tends to be prevented from converging to the desired swarm
distribution properly, resulting in higher residual convergence
error.
B. Comparison with a GICA-based Method
Let us now compare the LICA-based method for (P1) with
the GICA-based method in [13]. The scenario considered is the
same as the one in the previous subsection except for α = 0.6.
00.20.40.60.81Primary feedback gain when = 100.10.20.30.40.50.60.70.80.91Primary feedback gain with varying = 0.2 = 0.4 = 0.6 = 0.8 = 1.0 = 1.205001000150020002500300035004000Time Instant0510152025Fraction of Transitioning Agents (%) = 0.2 = 0.4 = 0.6 = 0.8 = 1.0 = 1.2Time Instant05001000150020002500300035004000Convergence Error ( DH(Θ, µk*) )00.10.20.30.40.50.60.70.80.91α = 0.2α = 0.4α = 0.6α = 0.8α = 1.0α = 1.2Time Instant350036003700380039004000Convergence Error ( DH(Θ, µk*) )00.010.020.030.040.050.060.070.08α = 0.2α = 0.4α = 0.6α = 0.8α = 1.0α = 1.212
(a) Convergence Error
(b) Fraction of Transitioning Agents
(c) Cumulative Travel Expenses
Fig. 5. Performance comparison between the proposed method (LICA) with the existing method (GICA): (a) the error between the current swarm status and
the desired status, shown as Hellinger Distance; (b) the fraction of agents who transitions between any two bins; (c) the cumulative travel expenses of all the
agents from the beginning.
method and those by the compared method are 1.72× 104 and
1.96 × 104, respectively, and their ratio is 0.878. This is also
confirmed by the statistical result in Figure 6(b). A possible
explanation is that when some of the bins do not meet their
desired swarm densities, the entire agents in the GICA-based
method would obtain higher feedback gains, which might lead
to unnecessary transitions. On the contrary, this is not the case
in the LICA-based method since agents are only affected by
their neighbour bins.
C. Robustness in Asynchronous Environments
This subsection investigates the effects of asynchronous
environments in the proposed LICA-based method for (P1)
and compares them with those in the GICA-based method
in [13]. Hence, a realistic scenario where an asynchronous
process is required is considered: in the scenario, it is assumed
that agents in some bins cannot communicate for some reason
(such bins are called blocked) and thus other agents in normal
bins have to perform their own process without waiting them.
The proportion of blocked bins to the entire bins is set to
be different values, i.e. 0%, 10%, 20% and 30%. At each time
instant, the corresponding proportion of bins are randomly
selected as blocked bins. For the proposed framework, the
asynchronous implementation in Section V is built upon
Algorithm 2. In the GICA-based method, for the comparison
purpose only, it is assumed that agents in normal bins obtain
µj
k without interacting with agents in the blocked bins.
k = µ(cid:63)
The rest of scenario setting are the same as those in Section
VI-B.
Figure 7 illustrates the performance of each method: con-
vergence rate, fraction of transitioning agents, and cumula-
tive travel expenses. As the proportion of the blocked bins
increases, the GICA-based method tends to have faster con-
vergence speed, whereas it loses Desired Feature 2 and thus
increases cumulative travelling expenses (as shown in Figure
7(a), 7(b), and 7(c), respectively). On the contrary, the LICA-
based method shows a graceful degradation in terms of Desired
Feature 2 (as shown in Figure 7(b)). A possible explanation
for these results could be that higher feedback gains due to the
communication disconnection induce faster convergence per-
formance in each method than the normal situation. This effect
(a) Converged Time Instants
(b) Cumulative Travel
Expenses
Fig. 6. Performance comparison (Monte-Carlo experiments) between the
proposed method (LICA) and the existing method (GICA): (a) the required
k) ∈ {0.30, 0.28, ..., 0.12, 0.10} (i.e.,
time instants to converge to DH (Θ, µ(cid:63)
convergence rate); (2) the ratio of the cumulative travel expenses by LICA to
those by GICA until converging to DH (Θ, µ(cid:63)
k) = 1.
Note that Θ in Remark 4 can control convergence rate, but is
not discussed in [13]. For the fair comparison, Θ is applied
to both the methods.
We conduct 100 runs of Monte Carlo experiments. Figure
5 presents the results of one representative scenario and the
statistical results of the Monte Carlo experiments are shown
in Figure 6. According to Figure 5(a), the convergence rate
of the proposed method is slower at the initial phase, but
similar to that of the the GICA-based method as reaching
k) = 0.10. This is confirmed by the statistical results
DH (Θ, µ(cid:63)
in Figure 6(a), where the ratio of the required time instants
k) ∈ {0.30, 0.28, ..., 0.12, 0.10} in
for converging to DH (Θ, µ(cid:63)
the LICA-based method to those of the GICA-based method
is presented. At this point, it is worth noting that these con-
vergence rate results are presented in respect to time instants
of each Markov process. As the LICA-based framework may
have a much shorter timescale, its convergence performance in
practice could be better than that of the GICA-based method.
Figure 5(c) shows that the cumulative travel expenses are
smaller in the proposed method. The expenses by the proposed
050100150200250300350400Time Instant00.10.20.30.40.50.60.70.80.91Convergence Error (DH(, k*))LICAGICA050100150200250300350400Time Instant0510152025Fraction of Transitioning Agents (%)LICAGICA050100150200250300350400Time Instant00.511.522.5Cumulative Travel Expenses104LICAGICA0.30.280.260.240.220.20.180.160.140.120.1Convergence Error (DH(, k*))0.70.80.911.11.21.31.4Ratio of Required Time Instants for Convergence (LICA/GICA)1LICA/GICA0.740.760.780.80.820.840.860.880.90.92Ratio of Cumulative Travel Expenses until DH = 0.113
(a) Convergence Error
(b) Fraction of Transitioning Agents
(c) Cumulative Travel Expenses
Fig. 7. Performance comparison in communication-disconnected situations: (a) the error between the current swarm status and the desired status, shown as
Hellinger Distance; (b) the fraction of agents who transitions between any two bins; (c) the cumulative travel expenses of all the agents from the beginning.
(a) Convergence Error
(b) Fraction of Transitioning Agents
(c) Maximum Number of Transitioning Agents via
Each Path (for P2)
Fig. 8. Comparison results between the method for P2 and the quorum-based model: (a) the error between the current swarm status and the desired status,
shown as Hellinger Distance, at each time instant; (b) the fraction of agents who transition between any two bins at each time instant. (c) The maximum
number of transitioning agents via each path in the method for P2 (Case 1: A = 10, 000 and c(i,l) = 20, ∀i (cid:54)= l; Case 2: A = 100, 000 and c(i,l) = 200,
∀i (cid:54)= l)
is dominant for the GICA-based method because it affects
the entire agents, who use global information. However, in
the LICA-based framework, the communication disconnection
only locally influences so that its effectiveness is relatively
modest.
D. Demonstration of Example II and III
This subsection demonstrates the LICA-based method for
(P2) (i.e., Algorithm 3) and the quorum model (i.e., Algorithm
4). For the former, we consider a scenario where 10, 000 agents
and an arena consisting of 10 × 10 bins are given. The arena
is as depicted in Figure 1, where the agents are allowed to
move only one path away within a unit time instant. For each
one-way path, the upper flux bound per time instant is set as
20 agents (i.e., c(i,l) = 20, ∀i (cid:54)= l). All the agents start from a
bin, and the desired swarm distribution is uniform-randomly
generated.
For the latter, we build the quorum model upon the LICA-
based method for (P2). This can be a good strategy for a user
who wants to achieve not only faster convergence rate but
also lower unnecessary transitions after equilibrium, which are
regulated by the upper flux bounds. Thus, in the same scenario
described above, we will demonstrate the combined algorithm
k and Gj
that computes Sj
k by Algorithm
3. We set qi = 1.3 and γ = 30 for (27); α = 1 and ξ = 10−9
for (6); and τ j = 10−6 for (9).
k by Algorithm 4 and P j
Figure 8(a) and 8(b) presents that the both approaches make
the swarm converge to the desired swarm distribution. It is
observed that the number of transitioning agents in the method
for (P2) are restricted because of the upper flux bound during
the entire process. Meanwhile, the quorum-based method very
quickly disseminates the agents, who are initially at one bin,
over other bins, and thus the fraction of transitioning agents
is very high at the initial phase. After that, the population
fraction by the quorum-based method drops and remains as
low as that by the method for (P2).
Figure 8(c) presents the maximum value amongst the num-
ber of transitioning agents via each (one-way) path. The
red line indicates the actual result by the method for (P2),
while the green line indicates the corresponding probabilistic
value (i.e., max∀i max∀l(cid:54)=i nk[i]P j
k [i, l]). It is shown that the
stochastic decision policies reflect the given upper bound,
meanwhile this bound is often violated in practice due to the
finite cardinality of the agents. However, the result in the same
scenario with setting A = 100, 000 and c(i,l) = 200, ∀i (cid:54)= l
(denoted by Case 2), depicted by the blue and magenta lines
in Figure 8(c), suggests that such violation can be mitigated
050100150200250300350400450Time Instant00.10.20.30.40.50.60.70.80.91Convergence Error (DH(, k*))LICA (Blocked 0%)LICA (Blocked 10%)LICA (Blocked 20%)LICA (Blocked 30%)GICA (Blocked 0%)GICA (Blocked 10%)GICA (Blocked 20%)GICA (Blocked 30%)050100150200250300350400450Time Instant051015202530Fraction of Transitioning Agents (%)LICA (Blocked 0%)LICA (Blocked 10%)LICA (Blocked 20%)LICA (Blocked 30%)GICA (Blocked 0%)GICA (Blocked 10%)GICA (Blocked 20%)GICA (Blocked 30%)050100150200250300350400450Time Instant02468101214Cumulative Travel Expenses104LICA (Blocked 0%)LICA (Blocked 10%)LICA (Blocked 20%)LICA (Blocked 30%)GICA (Blocked 0%)GICA (Blocked 10%)GICA (Blocked 20%)GICA (Blocked 30%)05001000150020002500300035004000Time Instant00.10.20.30.40.50.60.70.80.91 Swarm Distribution (DH(, k*))P2P2 + Quorum05001000150020002500300035004000Time Instant01020304050607080Fractions of Transitioning Agents (%)P2P2 + Quorum05001000150020002500300035004000Time Instant0510152025303540Max (# Transitions of Agents for Each Path) - Case 1050100150200250300350400Max (# Transitions of Agents for Each Path) - Case 2Actual (Case 1)Probabilistic (Case 1)Actual (Case 2)Probabilistic (Case 2)as the number of given agents increases.
VII. CONCLUSION
This paper poposed a LICA-based closed-loop-type frame-
work for probabilistic swarm distribution guidance. Since the
feedback gains can be generated based on local information,
agents have shorter and different timescales for using new
information, and can incorporate an asynchronous decision-
making process. Even using local information, the proposed
framework converges to a desired density distribution, while
maintaining scalability, robustness, and long-term system effi-
ciency. Furthermore, the numerical experiments have showed
that the proposed framework is suitable for a realistic envi-
ronment where communication between agents is partially and
temporarily disconnected. This paper has explicitly presented
the design requirements for the Markov matrix to hold all these
advantages, and has provided specific problem examples of
how to implement this framework.
Future works include optimisation of ¯ξj
k[i], which can miti-
gate the trade-off between convergence rate and residual error.
In addition, it is expected that the communication cost required
for the proposed framework can be reduced by incorporating
a vision-based local density estimation [38].
ACKNOWLEDGEMENT
The authors gratefully acknowledge that this research was
supported by International Joint Research Programme with
Chungnam National University (No. EFA3004Z). Thanks to
Sangjun Bae for supportive discussions.
APPENDIX
A. Regarding the Convergence Analysis in Theorem 1
Definition 9 (Irreducible). A matrix is reducible if and only
if its associated digraph is not strongly connected. A matrix
that is not reducible is irreducible.
Definition 10 (Primitive). A primitive matrix is a square
nonnegative matrix A such that for every i, j there exists k > 0
such that Ak[i, j] > 0.
Definition 11 (Regular). A regular matrix is a stochastic
matrix such that all the entries of some power of the matrix
are positive.
Definition 12.
[33, pp.92, 149] [13] (Asymptotic Homogene-
ity) "A sequence of stochastic matrices Mk ∈ Mn×n, k ≥ k0,
is said to be asymptotically homogeneous (with respect to
d) if there exists a row-stochastic vector d ∈ Pn such that
limk→∞ dMk = d."
Definition 13.
[33, pp.92, 149] [13] (Strong Ergodicity)
The matrix product Uk0,k := Mk0Mk0+1 ···Mk−1, formed
from a sequence of stochastic matrices Mr ∈ Pn×n, r ≥
is said to be strongly ergodic if for each i, l, r we
k0,
limr→∞ Uk0,r[i, l] = v[l], where v ∈ Pn is a row-
get
stochastic vector. Here, v is called its unique limit vector (i.e.,
limr→∞ Uk0,r = 1(cid:62)v).
Lemma 5. Given the requirements (R1)-(R4) are satisfied, M j
k
in Equation (11) has the following properties:
14
1) row-stochastic;
2) irreducible;
3) all diagonal elements are positive, and all other elements
4) there is a positive lower bound γ such that 0 < γ ≤
k [i, l] (Note that min+ refers to the minimum
are non-negative;
i,l M j
min+
of the positive elements);
5) asymptotically homogeneous with respect to Θ.
In addition, U j
k0,k in Equation (12) has the following
properties:
6) irreducible;
7) all diagonal elements are positive, and all other elements
are non-negative;
8) primitive [39, Lemma 8.5.4, p.541]
k ·1(cid:62) = (I − W j
k )P j
k · 1(cid:62) = 1(cid:62). P j
thus M j
k ≥ 0, and P j
Proof. This lemma can be proved by similarly following the
mathematical development for [13, Theorem 4]. M j
k is row-
k ·1(cid:62) + W j
k ·1(cid:62) =
stochastic because M j
k Sj
(I − W j
k ) · 1(cid:62) + W j
k is irreducible and
ωj
is always less than 1,
k is also irreducible
k[i]
(i.e., M j
k [i, l] > 0 if P j
k [i, l] > 0). The property 3) is true
because diag(I − W j
k is also a non-
negative matrix such that its diagonal elements are positive.
The property 4) is implied by either the property 2) or 3). From
k = 0 (because
the definition of W j
of exp(−τ jk)), and thereby limk→∞ M j
k = limk→∞ P j
k .
Hence, limk→∞ ΘM j
k = Θ, and the property
5) is valid.
k , it follows that limk→∞ W j
k = limk→∞ ΘP j
k ) > 0, W j
k0,k. It
Let us now turn to U j
is irreducible due to the
r [i, l] > 0 for some r ∈ {k0, ..., k − 1} and
fact that if M j
∀i, l ∈ {1, ..., nbin}, then the corresponding element U j
k0,k[i, l]
is greater or equal to the product of positive diagonal elements
r [i, l] and the property 2). The property 7) is true
and M j
because U j
k0,k is a product of nonnegative matrices where all
diagonal entries are positive. It follows from [39, Lemma 8.5.4,
p.541] that U j
k0,k is primitive: "if a square matrix is irreducible,
nonnegative and all its main diagonal entries are positive, then
the matrix is primitive".
REFERENCES
[1] M. Brambilla, E. Ferrante, M. Birattari, and M. Dorigo, "Swarm
Robotics: a Review from the Swarm Engineering Perspective," Swarm
Intelligence, vol. 7, no. 1, pp. 1 -- 41, 2013.
[2] A. Kolling, P. Walker, N. Chakraborty, K. Sycara, and M. Lewis,
"Human Interaction With Robot Swarms: A Survey," IEEE Transactions
on Human-Machine Systems, vol. 46, no. 1, pp. 9 -- 26, 2016.
[3] E. Sahin, "Swarm Robotics: From Sources of Inspiration to Domains of
Application," in Swarm Robotics. Berlin: Springer, 2005, pp. 10 -- 20.
[4] B. Acikmese and D. S. Bayard, "A Markov Chain Approach to Proba-
bilistic Swarm Guidance," in American Control Conference, Montreal,
Canada, 2012, pp. 6300 -- 6307.
[5] -- -- , "Probabilistic Swarm Guidance for Collaborative Autonomous
Agents," in American Control Conference, Portland, OR, USA, 2014,
pp. 477 -- 482.
[6] -- -- , "Markov Chain Approach to Probabilistic Guidance for Swarms
of Autonomous Agents," Asian Journal of Control, vol. 17, no. 4, pp.
1105 -- 1124, 2015.
[7] I. Chattopadhyay and A. Ray, "Supervised Self-Organization of Homo-
geneous Swarms Using Ergodic Projections of Markov Chains," IEEE
Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics),
vol. 39, no. 6, pp. 1505 -- 1515, 2009.
15
[32] C. Becco, N. Vandewalle, J. Delcourt, and P. Poncin, "Experimental
Evidences of a Structural and Dynamical Transition in Fish School,"
Physica A: Statistical Mechanics and its Applications, vol. 367, pp. 487 --
493, 2006.
[33] E. Seneta, Non-negative Matrices and Markov Chains, ser. Springer
Series in Statistics. New York, NY: Springer New York, 1981.
[34] Y. Bestaoui Sebbane, Planning and Decision Making for Aerial Robots,
ser. Intelligent Systems, Control and Automation: Science and Engineer-
ing. Cham: Springer International Publishing, 2014, vol. 71.
[35] I. C. F. Ipsen and T. M. Selee, "Ergodicity Coefficients Defined by Vector
Norms," SIAM Journal on Matrix Analysis and Applications, vol. 32,
no. 1, pp. 153 -- 200, jan 2011.
[36] A. Jadbabaie, Jie Lin, and A. Morse, "Coordination of Groups of Mobile
Autonomous Agents using Nearest Neighbor Rules," IEEE Transactions
on Automatic Control, vol. 48, no. 6, pp. 988 -- 1001, 2003.
[37] J. Chung, P. Kannappan, C. Ng, and P. Sahoo, "Measures of Distance
between Probability Distributions," Journal of Mathematical Analysis
and Applications, vol. 138, no. 1, pp. 280 -- 292, 1989.
[38] S. A. M. Saleh, S. A. Suandi, and H. Ibrahim, "Recent Survey on Crowd
Density Estimation and Counting for Visual Surveillance," Engineering
Applications of Artificial Intelligence, vol. 41, pp. 103 -- 114, 2015.
[39] R. A. Horn and C. R. Johnson, Matrix Analysis, 2nd ed. Cambridge:
Cambridge University Press, 2012.
[8] N. Demir and B. Acikmese, "Probabilistic Density Control for Swarm
of Decentralized ON-OFF Agents with Safety Constraints," in American
Control Conference, Chicago, IL, USA, 2015, pp. 5238 -- 5244.
[9] R. Luo, N. Chakraborty, and K. Sycara, "Supervisory Control for Cost-
Effective Redistribution of Robotic Swarms," in IEEE International
Conference on Systems, Man, and Cybernetics (SMC), San Diego, CA,
USA, 2014, pp. 596 -- 601.
[10] N. Demir, U. Eren, and B. Ac¸kmee, "Decentralized Probabilistic Density
Control of Autonomous Swarms with Safety Constraints," Autonomous
Robots, vol. 39, no. 4, pp. 537 -- 554, 2015.
[11] S. Bandyopadhyay, S.-J. Chung, and F. Y. Hadaegh, "Inhomogeneous
Markov Chain Approach To Probablistic Swarm Guidance Algorithms,"
in 5th Int. Conf. on Spacecraft Formation Flying Missions and Tech-
nologies (SFFMT), Munich, Germany, 2013.
[12] D. Morgan, G. P. Subramanian, S. Bandyopadhyay, S.-J. Chung, and
F. Y. Hadaegh, "Probabilistic Guidance of Distributed Systems using
Sequential Convex Programming," in IEEE/RSJ International Confer-
ence on Intelligent Robots and Systems, Chicago, IL, USA, 2014, pp.
3850 -- 3857.
[13] S. Bandyopadhyay, S.-J. Chung, and F. Y. Hadaegh, "Probabilistic and
Distributed Control of a Large-Scale Swarm of Autonomous Agents,"
IEEE Transactions on Robotics, vol. 33, no. 5, pp. 1103 -- 1123, 2017.
[14] A. Halasz, M. A. Hsieh, S. Berman, and V. Kumar, "Dynamic Redis-
tribution of a Swarm of Robots among Multiple Sites," in IEEE/RSJ
International Conference on Intelligent Robots and Systems, San Diego,
CA, USA, 2007, pp. 2320 -- 2325.
[15] M. A. Hsieh, A. Halasz, S. Berman, and V. Kumar, "Biologically
Inspired Redistribution of a Swarm of Robots among Multiple Sites,"
Swarm Intelligence, vol. 2, no. 2-4, pp. 121 -- 141, 2008.
[16] S. Berman, A. Halasz, M. Ani Hsieh, and V. Kumar, "Navigation-based
Optimization of Stochastic Strategies for Allocating a Robot Swarm
among Multiple Sites," in 47th IEEE Conference on Decision and
Control, Cancun, Mexico, 2008, pp. 4376 -- 4381.
[17] S. Berman, A. Halasz, M. A. Hsieh, and V. Kumar, "Optimized
Stochastic Policies for Task Allocation in Swarms of Robots," IEEE
Transactions on Robotics, vol. 25, no. 4, pp. 927 -- 937, 2009.
[18] T. W. Mather and M. A. Hsieh, "Macroscopic Modeling of Stochastic
Deployment Policies with Time Delays for Robot Ensembles," The
International Journal of Robotics Research, vol. 30, no. 5, pp. 590 --
600, 2011.
[19] K. Lerman, A. Martinoli, and A. Galstyan, "A Review of Probabilistic
Macroscopic Models for Swarm Robotic Systems," in Swarm Robotics.
Berlin: Springer, 2005, pp. 143 -- 152.
[20] L. B. Johnson, H.-L. Choi, and J. P. How, "The Role of Information As-
sumptions in Decentralized Task Allocation: A Tutorial," IEEE Control
Systems, vol. 36, no. 4, pp. 45 -- 58, 2016.
[21] S. Xue, C. Sun, J. Zeng, Y. Jin, and R. Cheng, "Effect of Communication
Modes to Swarm Robotic Search," The Open Electrical & Electronic
Engineering Journal, vol. 8, no. 1, pp. 240 -- 244, 2014.
[22] B. I. Koh, A. D. George, R. T. Haftka, and B. J. Fregly, "Parallel
Asynchronous Particle Swarm Optimization," International Journal for
Numerical Methods in Engineering, vol. 67, no. 4, pp. 578 -- 595, 2006.
[23] L. Johnson, S. Ponda, H.-L. Choi, and J. How, "Asynchronous
Decentralized Task Allocation for Dynamic Environments," in In-
fotech@Aerospace 2011, St.Louis, MO, USA, 2011.
[24] I. D. Couzin, J. Krause, R. James, G. D. Ruxton, and N. R. Franks,
"Collective Memory and Spatial Sorting in Animal Groups." Journal of
theoretical biology, vol. 218, no. 1, pp. 1 -- 11, 2002.
[25] I. D. Couzin, J. Krause, N. R. Franks, and S. A. Levin, "Effective
Leadership and Decision-making in Animal Groups on the Move,"
Nature, vol. 433, no. 7025, pp. 513 -- 516, 2005.
[26] J. Gautrais, C. Jost, and G. Theraulaz, "Key Behavioural Factors in a
Self-Organised Fish School Model," Annales Zoologici Fennici, vol. 45,
no. 5, pp. 415 -- 428, 2008.
[27] D. J. Hoare, I. D. Couzin, J. G. J. Godin, and J. Krause, "Context-
dependent Group Size Choice in Fish," Animal Behaviour, vol. 67, no. 1,
pp. 155 -- 164, 2004.
[28] S. Bandyopadhyay and S.-J. Chung, "Distributed Estimation using
Bayesian Consensus Filtering," American Control Conference, pp. 634 --
641, 2014.
[29] T. D. Seeley, The Wisdom of the Hive.
Cambridge, Massachusetts:
Havard University Press, 1995.
[30] L. Keller, M. J. B. Krieger, and J.-B. Billeter, "Ant-like Task Allocation
and Recruitment in Cooperative Robots," Nature, vol. 406, no. 6799,
pp. 992 -- 995, 2000.
[31] B. L. Partridge, "The Structure and Function of Fish Schools," Scientific
American, vol. 246, no. 6, pp. 114 -- 123, 1982.
|
1709.03297 | 1 | 1709 | 2017-09-11T08:48:19 | Cellular Automaton Based Simulation of Large Pedestrian Facilities - A Case Study on the Staten Island Ferry Terminals | [
"cs.MA",
"cs.AI"
] | Current metropolises largely depend on a functioning transport infrastructure and the increasing demand can only be satisfied by a well organized mass transit. One example for a crucial mass transit system is New York City's Staten Island Ferry, connecting the two boroughs of Staten Island and Manhattan with a regular passenger service. Today's demand already exceeds 2500 passengers for a single cycle during peek hours, and future projections suggest that it will further increase. One way to appraise how the system will cope with future demand is by simulation. This contribution proposes an integrated simulation approach to evaluate the system performance with respect to future demand. The simulation relies on a multiscale modeling approach where the terminal buildings are simulated by a microscopic and quantitatively valid cellular automata (CA) and the journeys of the ferries themselves are modeled by a mesoscopic queue simulation approach. Based on the simulation results recommendations with respect to the future demand are given. | cs.MA | cs |
CELLULAR AUTOMATON BASED SIMULATION OF LARGE PEDESTRIAN FACILITIES --
A CASE STUDY ON THE STATEN ISLAND FERRY TERMINALS
Luca Crociani
University of Milano-Bicocca
Complex Systems and Artificial Intelligence Research Center, University of Milano-Bicocca,
Milan, Italy
Telephone: +39 0264487857
FAX: +39 0264487839
[email protected]
https://www.researchgate.net/profile/Luca_Crociani
Gregor Lämmel (corresponding author)
German Aerospace Center (DLR)
Institute of Transportation Systems
Rutherfordstrasse 2, 12489 Berlin, Germany
Telephone: +49 30 67055-9141
FAX: +49 30 67055-291
[email protected]
http://www.dlr.de/ts
H. Joon Park
New York City Department of Transportation
55 Water Street, 6th Floor
New York, NY 10041
Telephone: +1 212-839-7757
FAX: +1 212-839-7777
[email protected]
http://nyc.gov/dot
Giuseppe Vizzari
University of Milano-Bicocca
Complex Systems and Artificial Intelligence Research Center, University of Milano-Bicocca,
Milan, Italy
Telephone: +39 0264487865
FAX: +39 0264487839
[email protected]
http://www.lintar.disco.unimib.it/GVizzari/
Submission date: October 15, 2018
5,985 words + 4 figures + 2 tables = 7,485 words
Abstract
Current metropolises largely depend on a functioning transport infrastructure and the increasing
demand can only be satisfied by a well organized mass transit. One example for a crucial mass
transit system is New York City's Staten Island Ferry, connecting the two boroughs of Staten Island
and Manhattan with a regular passenger service. Today's demand already exceeds 2500 passengers
for a single cycle during peek hours, and future projections suggest that it will further increase. One
way to appraise how the system will cope with future demand is by simulation.
This contribution proposes an integrated simulation approach to evaluate the system per-
formance with respect to future demand. The simulation relies on a multiscale modeling approach
where the terminal buildings are simulated by a microscopic and quantitatively valid cellular au-
tomata (CA) and the journeys of the ferries themselves are modeled by a mesoscopic queue simu-
lation approach.
Based on the simulation results recommendations with respect to the future demand are
given.
Crociani et al.
1
INTRODUCTION
The functioning of today's metropolises heavily depends on the performance of their transport
infrastructure. In recent decades the demand in public transit has increased enormously and this
demand is expected to increase even further.
One example of a public transit infrastructure that has to deal with a growing demand
is the Staten Island Ferry in New York City: it connects the two boroughs of Staten Island and
Manhattan with a regular passenger service. Currently, the fleet consists of five boats doing 109
trips and carrying 70 000 passengers on a typical weekday. During rush hours, it runs on a four-
boat schedule, with 15 minutes between departures. Various development on Staten Island's north
shore is projecting a significant increase in ridership on the Staten Island Ferry. To cope with
the projected future demand the New York City Department of Transportation needs to develop
effective strategies that allow for improved passenger flows aboard the ferries and in the terminals.
Those strategies include lower level boarding and the reconstruction of the waiting areas in both
terminals St. George (on Staten Island) and Whitehall (in Manhattan). In addition to an expert
evaluation of the potential interventions, the elaboration of what-if scenarios based on computer
simulation is also important to support decisions on this topic.
This work presents a computer simulation model for the Staten Island Ferry to: (i) repro-
duce the status quo (for validation) and (ii) appraise the terminal performance with the projected
future demand and give recommendations to improve the operation procedures of the terminals.
RELATED WORKS
There are some case studies simulating terminal buildings: Morrow (1) propose an approach where
individual persons (agents) choose their path through the environment based on a randomized cost
function, with an application on San Francisco's Transbay Terminal: results indicate locations
where high pedestrian densities might occur. In this approach the terminal layout is iteratively
adapted and after each modification a simulation is carried out to appraise the overall performance.
Lämmel et al. (2) introduce a model capable to simulate large scenarios in reasonable time frames
on a fictive scenario about New York City's Grand Central Terminal. The approach combines two
simulation models of different granularity (i.e. the surrounding area is simulated by fast but less
precise queuing model (3) and the terminal itself by the much more precise but more demanding
ORCA model (4, 5)). This multiscale approach has the advantage of being microscopic precise
where needed and computational fast for areas where possible.
This idea has been investigated since the early 2000s: first approaches combine macro-
scopic and microscopic models for vehicular traffic (6, 7, 8). Later models combine mesoscopic
and microscopic approaches (9, 10, 11). Works in pedestrian domain include (12, 13). Recently, a
multiscale approach for inter- and multi-model traffic has been demonstrated (14).
There is a variety of pedestrian simulation models, and they can be classified according to
their granularity. Macroscopic models consider pedestrians as streams of densities similar to the
flow of liquids or gas (15, 16). Those models are suitable for the simulation of high density situa-
tions, but individual trajectories are hard to reproduce and thus macroscopic models are unsuitable
for complex pedestrians scenarios where pedestrians following arbitrary paths. This kind of situa-
tion can be instead reproduced by microscopic models as they are constructed from the individual
traveler's point of view and thus each traveler follows his/her own path trough the environment.
Microscopic models can be distinguished by the way they represent space and time. Some micro-
scopic models rely on a continuous representation of space (e.g. force based models (17, 18) or
Crociani et al.
2
velocity based models (4, 19)). Others discretize time and space into a grid-based structure (e.g.
cellular automata (CA) (20, 21)). Most microscopic models have a step-based time representation,
where the step is a fixed amount of time, although works that propose an adaptive step-size to
speed up computation exist (22). A pseudo-continuous time representation can be achieved by an
events-based simulation approach. They only compute the movement of pedestrians for points in
time where needed and thus considerable speed ups in computing time are possible (23).
A basic requirement for any simulation model is that the flow-speed-density relation (often
depicted in a so-called fundamental diagram) is adequately reproduced. There is a large body
of empirical work that investigates the fundamental diagrams in the pedestrian context (see, e.g.
(24, 25, 26)). Theoretical foundations for the calibration of a simple CA model against arbitrary
empirical fundamental diagrams are given in (27). Implementations are given in (23, 28, 29).
In terminal operations a basic pedestrian activity involves waiting. There is only little
research that investigates methods to simulate the concept of waiting. Ongoing research suggests
that the concept of waiting can be adequately modeled by simple heuristics (30).
FERRY TERMINAL OPERATION AND FACILITIES
Staten Island Ferry operates with travel time of approximately 25 minutes along a route between
Whitehall Terminal in downtown Manhattan, New York and St. George Terminal in Staten Island,
New York. It carried weekday and weekend daily passengers of approximately 70,400 and 45,290,
respectively, at both terminals in 2015. There are three classes of ferry vessel: Barberi Class of
approximately 5,200-passenger capacity, Molinari Class of approximately 4,400-passenger capac-
ity, and Kennedy Class of approximately 3,000-passenger capacity. The larger ferries are used
during peak hours. During the weekday PM peak period, ferry service interval is increased from
30-minute service to 20-minute service and 15-minute service. The waiting areas have a capacity
of 3,530 passengers for the St. George Ferry Terminal and 10,771 passengers for the Whitehall
Ferry Terminal (31). Ferry ridership was increased during summer months (Jun, July, and August).
Based on 2015 average weekday peak hour ridership of summer period, a single landing cycle in
2015 showed hourly passenger volumes of approximately 2,256 to 2,727 during weekday PM peak
hour (4-5 PM). Previous Staten Island ferry terminal study indicated that nearly every landing cy-
cle with a throughput of more than 2,600 passengers had a duration in excess of eight minutes
and an adverse impact on the operating schedule. When throughput volumes were between 2,000
and 2,600, approximately half of the landing cycles were completed within eight minutes (31, 32).
Current ferry embarking and disembarking operation is different because of coast guard security
process. Ferry embarking process allows only main concourse level access from waiting areas
while its disembarking process operates with lower and main concourse level exits. It is more crit-
ical to improve embarking process when considering passenger entering and exiting process and
substantial future demand increase. Therefore, this study is focused on Staten Island ferry pas-
senger operation at Whitehall Terminal during weekday PM peak period. With the additional 880
passenger volume generated by redevelopment of adjacent areas such as St. George and Stapleton
Waterfront Developments, there would regularly be over 2,000 passengers on a single ferry and an
average throughput of over 3,600 passengers during a single landing cycle in 2017 (32). Passenger
volumes of this magnitude can be expected to consistently cause delays of over five minutes. These
delays will be compounded over the course of the peak period as these volumes are expected to
occur over multiple successive sailings.
Crociani et al.
3
FIGURE 1 2015 Existing PM Passengers During Landing Cycle at Whitehall Terminal
MODEL DESCRIPTION
The approach adopted for this work is characterized by the fact that a multi-scale representation of
the environment is adopted to try to preserve the good computational properties of an agent based
model adopting a coarse grained spatial representation, and employing a connected CA model for
simulating portions of the environment requiring a higher degree of fidelity.
The overall system is currently implemented in the MATSim1 framework and uses its model
and network representation of the environment for the part where the pedestrian interactions are
not enough significant to generate the need of a microscopic simulation. The CA model is then
used to model the inside of the two ferry terminals, where the particular layout of the scene affects
the space utilization of pedestrians and their traveling times. A technical explanation of the CA
model is provided in (29). Its usage with a multi-scale approach, with an example application, is
described more thoroughly here (33). In this paper we will provide a brief presentation allowing
to understand the functioning of the system, in order to focus more on the case study.
Microscopic Model
The model is a 2-dimensional Cellular Automaton with a square-cells grid representation of the
space. The 0.4 × 0.4 m2 size of the cells describes the average space occupation of a person (34)
and reproduces a maximum pedestrian density of 6.25 persons/m2, that covers the values usually
1www.matsim.org
Crociani et al.
4
observable in the real world. A cell of the environment can be basically of type walkable or of
type obstacle, meaning that it will never be occupied by any pedestrians during the simulation. By
means of three simple mechanisms, the model is able to reproduce validated pedestrian flows for
the case of 1-directional and 2-directional flows (see (29)).
Intermediate targets can also be introduced in the environment to mark the extremes of a
particular region (e.g. rooms or corridors), and so decision points for the route choice of agents.
Final goals of the discrete environment are its open edges, i.e., the entrances/exits of the discrete
space that will be linked to roads. Since the concept of region is fuzzy and the space decomposition
is a subjective task that can be tackled with different approaches, the configuration of their position
in the scenario is not automatic and it is left to the user.
Employing the floor field approach (21) and spreading one field from each target, either
intermediate or final, allows to build a network representing this portion of the simulated environ-
ment. In this graph, each node denotes one target and the edges identify the existence of a direct
way between two targets (i.e. passing through only one region). To allow this, the floor field dif-
fusion is limited by obstacles and cells of other targets. An example of such an environment with
the overlain network is shown in Fig. 2, which illustrates the implementation of the case study
scenario. The open borders of the microscopic environment are the nodes that will be connected
to the other network of the mesoscopic model and the overall network will be used for the path
planning by the agents.
To integrate the network with the one of the mesoscopic model and to allow the reasoning
at the strategic level, each edge a of the graph is firstly labeled with its length la, describing the
distance between two targets δi, δj in the discrete space. This value is computed using the floor
fields as:
la(δ1, δ2) = Avg (F Fδ1(Center(δ2)), F Fδ2(Center(δ1)))
(1)
where F Fδ(x, y) gives the value of the floor field associated to a destination δ in position
(x, y); Center(δ) describes the coordinates of the central cell of δ and Avg computes the average
between the two values and provides a unique distance. Together with the average speed of pedes-
.
trians in the discrete space, la is used to calculate the free speed travel time of the link T f ree
a = la
sa
Special targets
To allow the representation of the boarding/disembarking procedures, but also in general of auto-
matic doors or turnstiles that impose additional times to be crossed by people, a special instance
of intermediate target has been introduced in the microscopic model, that is denoted as delaying
target. When a pedestrian reaches a cell of this special object, it asks the respective quantity of
time that needs to wait before to continue. This quantity can be either static, to model the time an
automatic door needs to open, or generated according to a predefined distribution. This allows to
model, for example, observed average times needed by commuters to pass through turnstiles.
This type of target is used as well to implement the schedule of the ferries and the man-
agement of the disembarking and boarding process. In this case, a time schedule is associated
to the target and it describes the time windows in which the modeled gate is open or close. The
waiting time for pedestrians, thus, is calculated according to the configured time schedule, making
them wait in the area in front of the target until the next opening time. In addition, to qualitatively
improve the dynamics generated by the model in the waiting areas, once a pedestrian achieves
Crociani et al.
5
FIGURE 2 A simplified representation of the modeled scenario. Possible paths for pedestri-
ans are overimposed in the microscopic environments. Dashed blue links emphasizes paths
to Whitehall terminal, while dashed red the ones to St. George.
such a long waiting time from this target, it enters in a waiting state of behavior. In this state, the
pedestrian speed is lowered (i.e. they do not move all time steps) and the choice of movement is
a bit randomized, meaning that they are still attracted by the current target, but they also wander
inside the waiting area.
Flow in bottlenecks
As stated before, the model has been already calibrated to produce quantitatively valid fundamental
diagrams of 1-directional and 2-directional flows in corridor-like settings. For sake of space, this
validation is not discussed here and it is referred to (29, 33) for a detailed analysis. Nonetheless,
the dynamics simulated in the application scenario is affected by many bottlenecks and thus the
pedestrian flow in presence of physical restrictions must be discussed. This is empirically analyzed
by testing a benchmark scenario composed of a rectangular room divided by a wall at the middle of
WhitehallTerminalSt. GeorgeTerminalCrociani et al.
6
FIGURE 3 Average flow achieved in the bottleneck tests.
the y-axis, with a central opening configuring a bottleneck of width ω. A set of simulations is then
configured by varying ω in the discrete range [0.4,5.2] with ∆ω = 0.4m. Results are generated
with the same set of parameters used to reproduce fundamental diagrams (see (29)).
The scenario is configured with 350 agents generated at the same time from one extreme
of the scenario and having to reach the other part. At each second of the simulation, the outflow
from the bottleneck is gathered and all measurements are then averaged. Outflow data is stored
only once the simulation is in a steady state, i.e., all agents have reached the bottleneck and this
generates a stable outflow. In this case it has been observed that for all tested ω, the simulations
are in a steady state between 5 and 35 seconds of the simulation time. Average steady state flows
for simulations are shown in Fig. 3.
Mesoscopic Model
The MATSim model is used for this component of the system. The standard simulation approach
in MATSim employs a queuing model based on (35). Originally, the model was designed for the
simulation of vehicular traffic, but it has been adapted for pedestrians (36).
The basic network structure of the environment is modeled as a graph whose links describe
urban streets, while nodes describe their intersections. In our context "streets" also include side
walks, ramps, corridors, and so on. Links behave like FIFO queues controlled by the following
parameters:
• the length of the link l;
• the area of the link A;
• the free flow speed v;
• the free speed travel time tmin, given by l/v;
• the flow capacity F C;
Crociani et al.
• the storage capacity SC.
7
The overall dynamics follows therefore the rules defined with these parameters. An agent
is able to enter to a link l until the number of agents inside l is below its storage capacity. Once
the agent is inside, it travels at speed v and it cannot leave the link before tmin. The congestion
is managed with the flow capacity parameter F C, which is used to lock the agents inside the link
to not exceed it: this mechanism basically increases the actually experienced travel time whenever
the level of density in the link increases, incorporating in the model dynamics empirical evidences
(i.e. pedestrians' fundamental diagram).
Considering this representation of the environment, agents plan their paths through this
graph structure trying to reproduce a plausible real-world pedestrians' behavior. A reasonable
assumption is that pedestrians try to minimize the walking distance when planning their paths: the
shortest path among two nodes is straightforward to compute, but it is well known that this choice
neglects congestion. In other words, the shortest path is not necessarily the fastest one. Commuters
who repeatedly walk between two locations (e.g. from a particular track in a large train station to
a bus stop outside the train station) have reasonably all the opportunities to iteratively explore
alternative paths to identify the fastest, although not necessarily the shortest. If all commuters
display that same behavior, they might reach a state where it is no longer possible to find any faster
path.
If this is the case, then the system has reached a state of a Nash (37) equilibrium with respect
to individual travel times. This behavior can be emulated by applying an iterative best-response
dynamic(38) and has been widely applied in the context of vehicular transport simulations (see,
e.g, (39, 40, 41)). Albeit, in theory there are multiple Nash equilibria, moreover it is still unclear
how close real-world travel patterns are to a Nash equilibrium after all, the referenced approaches
have proved to reproduce real-world traffic flow fair enough. It must be noted that the Nash equi-
librium is not actually the system optimum: the latter does not minimize individual travel times but
the system (or average) travel time. Like the Nash equilibrium, the system optimum can also be
achieved by an iterative best response dynamic, but based on the marginal travel time instead of the
individual travel time. The marginal travel time of an individual traveler corresponds to the sum of
the travel time experienced by her/him (internal costs) and the delay that he/she impose to others
(external costs). While it is straightforward to determine the internal costs (i.e. travel time), the
external costs calculation is not so obvious. An approach for the marginal travel time estimation
and its application to a microscopic simulation model has been proposed in (29).
CONNECTING THE MODELS
Both the mesoscopic and the microscopic model are mapped on the same global network of links
and nodes; a link can either be in a congested or non congested state. Initially, all links are consid-
ered as non congested, and they switch from this state to congested once the observed travel time
along the link is longer than the free speed travel time. Vice versa, a link in the congested state
switches to non congested as soon as the first pedestrian is able to walk along the link in free speed
travel time. Every pedestrian that leaves a given link while it is in the congested state imposes
external costs to the others. The amount of the external costs corresponds to the time span from
the time when the pedestrian under consideration leaves the congested link till the time when the
link switches to the non congested state again.
In this work, the iterative search of equilibrium/optimum follows the logic of the iterative
Crociani et al.
8
best response dynamic and it is described by the following tasks:
1. Compute plans for all agents
2. Execute the multi-scale simulation
3. Evaluate executed plans of the agents
4. Select a portion of the agents population and re-compute their plans
5. Jump to step 2, if the stop criterion has not been reached
The stopping criterion is implemented as a predetermined number of iterations defined by
the user. This is due to the fact that the number of iterations needed for the system to reach a
relaxed state depends on the complexity of the scenario and is not known a-priori. In the described
scenario, one hundred iterations gives a good compromise between relaxation and runtime.
Initial plan computation is performed with a shortest path algorithm. In the subsequent
iterations the agents try to find better plans based on the experienced travel costs. Depending on
the cost function, the agents learn more convenient paths either for them individually (relaxation
towards a Nash equilibrium) or for the overall population (relaxation towards the system optimum).
SCENARIO SETUP
The scenario of the Staten Island Ferry has been modeled as illustrated in Fig. 2. According to the
object of the analysis presented in this paper, only floors used for the boarding process has been
modeled. The two terminals are connected with a long link (about 8km) simulated with the queue
model, which implements the ferry travel. The time needed for this is configured to be 25 minutes.
Configuration of the environment and population demand
The microscopic environments representing the terminals are shown in Fig. 4 and they were mod-
eled based on existing CAD drawings. Each building contains one waiting area that provide access
to the boat slips by means of multiple access point, which have been modeled as scheduled target.
Existing rules for the management of the terminals imposes that boarding and disembarking are
performed sequentially, so no cross-flows can arise in the setting. In addition, up to two gates
can be open simultaneously for the boarding process. Similarly, only one corridor among the two
available is used for the disembarking in both terminals. Each of these corridors terminates with a
set of doors that leads to the entrance side of the building. These set of doors have been designed
as delaying targets, imposing an average delay of 3s to pedestrians. Finally, the schedule of the
ferries also avoids a contemporary arrival of more boats.
With reference to Fig.4, the simulated case study has been configured to use the boat slip
n. 2 for Whitehall and n.4 for St. George terminal. Considering the current and forecast data about
Staten Island Ferry passengers, two demands of the scenario have been configured:
• observed peak from Whitehall: demand representing a current peak of passengers com-
ing from Manhattan during summer time, simulated with purpose of validation of the
simulation scenario. The population is configured using the existing average monthly
counting of passengers related to the observed process.
Crociani et al.
9
(a)
(b)
FIGURE 4 Screenshots illustrating the configuration of the microscopic environments rep-
resenting the ferry terminals. Blue circles represents pedestrians directed to Whitehall, while
red ones move to St. George. Arrows indicates their possible paths.
• projection 2017: demand representing the peak of 3,600 passengers forecast for the next
year. This demand is again divided in two equal groups among boarding and disembark-
ing passengers.
In order to reproduce the observed peak scenario, door n. 1 is used for the Whitehall access
to boarding ramps and door n. 3 for St. George. Since the projection scenario is much more
demanding, the boarding process is simulated with two doors per terminal, using n. 1 and 2 in
Whitehall and n. 3 and 4 for the other.
SIMULATION RUNS
The simulation runs investigate the boarding operations of both terminals St. George (SG) and
Whitehall (WH). The iterative algorithm explained earlier is used to achieve the Nash Equilibria
of each demand scenario, which in this case represents an optimal distribution of passengers flow
among the available doors of the waiting areas and among the boarding ramps connecting terminals
with the ferries. 30 iterations are run per each scenario, which were sufficient to reach a NE state.
The analysis of the terminal operations focuses only on traveling times of commuters inside the
boarding areas, either from the time when they cross gates of the waiting areas until the entrance
to the ferry -- for boarding -- or from the time they go out from the ferry until they cross the doors
leading out from the boarding area.
Observed Peak from Whitehall
The base case scenario has the aim to validate the simulation model, so it can be used to ap-
praise future projections. To this purpose, timing data of boarding/disembarking processes have
been gathered with an on-field observation during the peak hour in Whitehall in late afternoon.
In particular, two full processes have been observed starting from the Whitehall terminal, where
about 1400 passengers were embarking and 850 were disembarking. After that, the disembark-
ing/boarding process has been observed in St. George terminal, where the 1400 passengers dis-
Crociani et al.
10
WH debarking WH boarding
850
54s
Measure
Passengers
Min
Max ( = total) 232s (266s)
Avg
Var
SD
75th perc.
95th perc.
149s
2,331
48
191s
222s
1400
77s
375s (364s)
204s
6,737
82
274s
332s
SG debarking SG boarding
1400
33s
400s (262s)
214s
10,723
104
302s
378s
400
56s
119s (83s)
83s
293
17
97s
110s
TABLE 1 Travel time analysis inside the boarding areas for the first scenario. We use the
maximum travel time to describe the process total time. Real world observed total times are
in parenthesis.
WH debarking WH boarding
Measure
1800
Passengers
48s
Min
Max ( = total) 418s
244s
Avg
10,061
Var
SD
100
330s
75th perc.
95th perc.
398s
1800
62s
558s
181s
10,376
102
221s
440s
SG debarking SG boarding
1800
33s
499s
267s
17,460
132
381s
471s
1800
62s
279s
165s
4,107
65
220s
265s
TABLE 2 Travel time analysis inside boarding areas for the projection 2017 scenario
embarked and additional 400 have embarked. Simulated and observed results of this scenario are
shown in Table 1. It is shown that there are no big differences between simulated and observed
times. The less precise output of our simulation scenario is provided with the disembarking pro-
cess in St. George, but it is due to the fact that the observed disembarking was performed using
also the ground floor of the terminal, not considered in the simulation system. This information
already emphasizes that the total time for the land cycles in Whitehall is critical to ensure current
schedule of ferries to be respected (32).
Projection 2017
Projections indicate that the average throughput during a single landing cycle will exceed 3,600
passengers by 2017 (32). The second simulation run investigates the expected impact of the in-
creased demand on the ferry operations. For that reason the demand is set to 1,800 passengers for
each of the terminals and a similar analysis as for the previous case has been performed. Results
are given in Table 2. As expected the boarding time increases heavily, even if two doors are used
to manage the boarding in parallel in both terminals. The boarding time for St. George is still less
than 5 minutes, while for Whitehall it takes more than 9 minutes to board the ferry. The whole
landing cycle for Whitehall takes more than 16 minutes. This is a strong indication that the current
Crociani et al.
11
layout of terminal buildings is not suited to cope with projected future demand.
CONCLUSION
The paper has presented the application of a multiscale modeling approach, based on a microscopic
and quantitatively valid cellular automata (CA) and a mesoscopic queue simulation approach, to
simulate the terminals St. George (on Staten Island) and Whitehall (in Manhattan) of New York
City's Staten Island Ferry. The paper discussed related works and the application context, then the
model was introduced as well as the advancements proposed to better fit this scenario. Finally,
results of the simulations carried out in the current and planned demand scenario respectively to
validate the model and to evaluate the adequacy of the current layout and boarding procedure to
face the planned growth of the demand. Results show that the authorities will need perform some
modification, either in the terminal layout or in the boarding procedures, to assure an acceptable
boarding time and overall landing cycle. Future works are aimed at supporting this decision eval-
uating alternative what-if scenarios by means of the presented modeling approach.
References
[1] Morrow, E., Efficiently Using Micro-Simulation to Inform Facility Design -- A Case Study
in Managein Complexity. In Pedestrian and Evacuation Dynamics 2010 (R. Peacock,
E. Kuligowski, and J. Averill, eds.), Springer, Berlin, 2011, pp. 855 -- 863.
[2] Lämmel, G., A. Seyfried, and B. Steffen, Large-scale and microscopic: a fast simulation
approach for urban areas. Annual Meeting Preprint 14-3890, Transportation Research Board,
Washington, D.C., 2014.
[3] Lämmel, G., D. Grether, and K. Nagel, The representation and implementation of time-
dependent inundation in large-scale microscopic evacuation simulations. Transportation Re-
search Part C: Emerging Technologies, Vol. 18, No. 1, 2010, pp. 84 -- 98.
[4] van den Berg, J., S. Guy, M. Lin, and D. Manocha, Reciprocal n-body collision avoidance.
In Robotics Research: The 14th International Symposium ISRR, Springer, Vol. 70, 2011, pp.
3 -- 19.
[5] Curtis, S. and D. Manocha, Pedestrian Simulation using Geometric Reasoning in Veloc-
ity Space. In Pedestrian and Evacuation Dynamics 2012 (U. Weidmann, U. Kirsch, and
M. Schreckenberg, eds.), Springer, Cham, 2014, pp. 875 -- 890.
[6] Helbing, D., A. Hennecke, V. Shvetsov, and M. Treiber, Micro- and Macro-Simulation of
Freeway Traffic. Mathematical and Computational Modelling, Vol. 35, 2002, pp. 517 -- 547.
[7] Bourr, E. and J.-B. Lesort, Mixing Microscopic Representations of Traffic Flow: Hybrid
Model Based on Lighthill-Whitham-Richards Theory. Transportation Research Record, Vol.
1852, 2003, pp. 193 -- 200.
[8] Espié, S., D. Gattuso, and F. Galante, A HYBRID TRAFFIC MODEL COUPLING MACRO
AND BEHAVIOURAL MICRO SIMULATION. Annual Meeting Preprint 06-2013, Trans-
portation Research Board, Washington D.C., 2006.
Crociani et al.
12
[9] Burghout, W., H. Koutsopoulos, and I. Andréasson, Hybrid Mesoscopic-Microscopic Traffic
Simulation. Transportation Research Record, Vol. 1934, 2005, pp. 218 -- 225.
[10] Burghout, W. and J. Wahlstedt, Hybrid Traffic Simulation with Adaptive Signal Control.
Transportation Research Record, Vol. 1999, 2007, pp. 191 -- 197.
[11] Joueiai, M., L. Leclercq, J. van Lint, and S. Hoogendoorn, Multiscale traffic flow model
based on the mesoscopic Lighthill-Whitham and Richards models. Transportation Research
Record, Vol. 2591, 2015, pp. 98 -- 106.
[12] Chooramun, N., P. Lawrence, and E. Galea, Implementing a Hybrid Space Discretisation
within an Agent Based Evacuation Model. In Pedestrian and Evacuation Dynamics 2010
(R. Peacock, E. Kuligowski, and J. Averill, eds.), Springer, Berlin, Heidelberg, New York,
2011, pp. 449 -- 458.
[13] Anh, N., Z. Daniel, N. Du, A. Drogoul, and V. An, A Hybrid Macro-Micro Pedestrians
Evacuation Model to Speed Up Simulation in Road Networks. In AAMAS 2011 Workshops
(F. Dechesne, ed.), Springer, LNAI 7068, 2012, pp. 371 -- 383.
[14] Lämmel, G., M. Chraibi, A. Kemloh Wagoum, and B. Steffen, HYBRID MULTI- AND
INTER-MODAL TRANSPORT SIMULATION: A CASE STUDY ON LARGE-SCALE
EVACUATION PLANNING. Transportation Research Record, forthcoming.
[15] Henderson, L., The Statistics of Crowd Fluids. Nature, Vol. 229, No. 5284, 1971, pp. 381 --
383.
[16] Helbing, D., A fluid dynamic model for the movement of pedestrians. arXiv preprint cond-
mat/9805213, 1998.
[17] Helbing, D. and P. Molnár, Social force model for pedestrian dynamics. Physical review E,
1995.
[18] Chraibi, M., A. Seyfried, and A. Schadschneider, Generalized centrifugal-force model for
pedestrian dynamics. Phys. Rev. E, Vol. 82, No. 4, 2010, p. 46111.
[19] Tordeux, A., M. Chraibi, and A. Seyfried, Collision-free speed model for pedestrian dy-
namics. In Traffic and Granular Flow '15 (V. L. Knoop and W. Daamen, eds.), Springer
International Publishing, 2016.
[20] Blue, V. and J. Adler, Emergent Fundamental Pedestrian Flows from Cellular Automata
Microsimulation. Transportation Research Record: Journal of the Transportation Research
Board, Vol. 1644, 1998, pp. 29 -- 36.
[21] Burstedde, C., K. Klauck, A. Schadschneider, and J. Zittartz, Simulation of pedestrian dy-
namics using a two-dimensional cellular automaton. Physica A: Statistical Mechanics and its
Applications, Vol. 295, No. 3 - 4, 2001, pp. 507 -- 525.
[22] von Sivers, I. and G. Köster, Dynamic Stride Length Adaptation According to Utility And
Personal Space. Transportation Research Part B: Methodological, 2014, p. 30.
Crociani et al.
13
[23] Lämmel, G. and G. Flötteröd, A CA model for bidirectional pedestrian streams. Procedia
Computer Science, Vol. 52, 2015, pp. 950 -- 955.
[24] Older, S., Movement of pedestrians on footways in shopping streets. Traffic Engineering and
Control, Vol. 10, 1968, pp. 160 -- 163.
[25] Pushkarev, B. and J. M. Zupan, Capacity of walkways. Transportation Research Record, Vol.
538, 1975, pp. 1 -- 15.
[26] Zhang, J., W. Klingsch, A. Schadschneider, and A. Seyfried, Ordering in bidirectional pedes-
trian flows and its influence on the fundamental diagram. Journal of Statistical Mechanics:
Theory and Experiment, , No. 02, 2012, p. 9.
[27] Flötteröd, G. and G. Lämmer, Bidirectional pedestrian fundamental diagram. Transportation
Research Part B: Methodological, Vol. 71, No. 0, 2015, pp. 194 -- 212.
[28] Lämmel, G., J. Park, and J. Zhang, Pedestrian Modeling Using Cellular Automata Simulation
for Urban Street Segments with High Pedestrian Trip Generators. Annual Meeting Preprint
16-0698, Transportation Research Board, Washington, D.C., 2016.
[29] Crociani, L. and G. Lämmel, Multidestination Pedestrian Flows in Equilibrium: A Cellular
Automaton-Based Approach. Computer-Aided Civil and Infrastructure Engineering, Vol. 31,
No. 2016, 2016, pp. 432 -- 448.
[30] Seitz, M., S. Seer, S. Klettner, and G. Köster, How do we wait? Fundamentals, characteristics,
and modeling implications. In Traffic and Granular Flow '15, Springer, 2015.
[31] SBS, St. George Waterfront Redevelopment Final Environmental Impact Statement. New
York City Department of Small Business Services, August 2013.
[32] NYCDOT, St. George Redevelopment EIS- Staten Island Ferry Operational Impacts Analysis.
New York City Department of Transportation (NYCDOT), March 2013.
[33] Crociani, L., G. Lämmel, and G. Vizzari, Multi-Scale Simulation for Crowd Management: A
Case Study in an Urban Scenario. ABMUS 2016, 2016.
[34] Weidmann, U., Transporttechnik der Fussgänger - Transporttechnische Eigenschaftendes
Fussgängerverkehrs (Literaturstudie). Literature Research 90, Institut füer Verkehrsplanung,
Transporttechnik, Strassen- und Eisenbahnbau IVT an der ETH Zürich, 1993.
[35] Simon, P., J. Esser, and K. Nagel, Simple queueing model applied to the city of Portland.
International Journal of Modern Physics, Vol. 10, No. 5, 1999, pp. 941 -- 960.
[36] Lämmel, G., H. Klüpfel, and K. Nagel, The MATSim Network Flow Model for Traffic Simu-
lation Adapted to Large-Scale Emergency Egress and an Application to the Evacuation of the
Indonesian City of Padang in Case of a Tsunami Warning. In Pedestrian Behavior (H. Tim-
mermans, ed.), Emerald Group Publishing Limited, 2009, chap. 11, pp. 245 -- 265.
[37] Nash, J., Non-cooperative games. The Annals of Mathematics, Vol. 54, No. 2, 1951, pp. 286 --
295.
Crociani et al.
14
[38] Cascetta, E., A stochastic process approach to the analysis of temporal dynamics in trans-
portation networks. Transportation Research B, Vol. 23B, No. 1, 1989, pp. 1 -- 17.
[39] Gawron, C., An Iterative Algorithm to Determine the Dynamic User Equilibrium in a Traffic
Simulation Model. International Journal of Modern Physics C, Vol. 9, No. 3, 1998, pp. 393 --
407.
[40] Raney, B. and K. Nagel, Iterative Route Planning for Large-Scale Modular Transportation
Simulations. Future Generation Computer Systems, Vol. 20, No. 7, 2004, pp. 1101 -- 1118.
[41] Krajzewicz, D., J. Erdmann, M. Behrisch, and L. Bieker, Recent Development and Appli-
cations of SUMO - Simulation of Urban MObility. International Journal On Advances in
Systems and Measurements, Vol. 5, No. 3&4, 2012, pp. 128 -- 138.
|
1207.0852 | 1 | 1207 | 2012-07-03T22:30:34 | Counter-Factual Reinforcement Learning: How to Model Decision-Makers That Anticipate The Future | [
"cs.MA",
"cs.GT"
] | This paper introduces a novel framework for modeling interacting humans in a multi-stage game. This "iterated semi network-form game" framework has the following desirable characteristics: (1) Bounded rational players, (2) strategic players (i.e., players account for one another's reward functions when predicting one another's behavior), and (3) computational tractability even on real-world systems. We achieve these benefits by combining concepts from game theory and reinforcement learning. To be precise, we extend the bounded rational "level-K reasoning" model to apply to games over multiple stages. Our extension allows the decomposition of the overall modeling problem into a series of smaller ones, each of which can be solved by standard reinforcement learning algorithms. We call this hybrid approach "level-K reinforcement learning". We investigate these ideas in a cyber battle scenario over a smart power grid and discuss the relationship between the behavior predicted by our model and what one might expect of real human defenders and attackers. | cs.MA | cs |
Counter-Factual Reinforcement Learning: How
To Model Decision-Makers That Anticipate The
Future
Ritchie Lee, David H. Wolpert, James Bono, Scott Backhaus, Russell Bent, and
Brendan Tracey
Abstract This paper introduces a novel framework for modeling interacting hu-
mans in a multi-stage game. This “iterated semi network-form game” framework
has the following desirable characteristics: (1) Bounded rational players, (2) strate-
gic players (i.e., players account for one another’s reward functions when predict-
ing one another’s behavior), and (3) computational tractability even on real-world
systems. We achieve these benefits by combining concepts from game theory and
reinforcement learning. To be precise, we extend the bounded rational “level-K rea-
soning” model to apply to games over multiple stages. Our extension allows the
decomposition of the overall modeling problem into a series of smaller ones, each
of which can be solved by standard reinforcement learning algorithms. We call this
hybrid approach “level-K reinforcement learning”. We investigate these ideas in a
cyber battle scenario over a smart power grid and discuss the relationship between
Ritchie Lee
Carnegie Mellon University Silicon Valley, NASA Ames Research Park, Mail Stop 23-11, Moffett
Field, CA, 94035 e-mail: [email protected]
David H. Wolpert
Santa Fe Institute, 1399 Hyde Park Rd., Santa Fe, NM 87501
Los Alamos National Laboratory, MS B256, Los Alamos, NM, 87545
e-mail: [email protected]
James Bono
American University, 4400 Massachusetts Ave. NW, Washington DC 20016
e-mail: [email protected]
Scott Backhaus
Los Alamos National Laboratory, MS K764, Los Alamos, NM 87545
e-mail: [email protected]
Russell Bent
Los Alamos National Laboratory, MS C933, Los Alamos, NM 87545 e-mail: [email protected]
Brendan Tracey
Stanford University, 496 Lomita Mall, Stanford, CA 94305 e-mail: [email protected]
1
2
Lee, R. et al.
the behavior predicted by our model and what one might expect of real human de-
fenders and attackers.
1 Introduction
We are interested in modeling something that has never been modeled before: the
interaction of human players in a very complicated time-extended domain, such as a
cyber attack on a power grid, when the players have little or no previous experience
with that domain. Our approach combines concepts from game theory and computer
science in a novel way. In particular, we introduce the first time-extended level-K
game theory model [9, 31, 37]. We solve this model using reinforcement learning
(RL) algorithms [38] to learn each player’s policy against the level K − 1 policies
of the other players. The result is a non-equilibrium model of a complex and time-
extended scenario where bounded-rational players interact strategically. Our model
is computationally tractable even in real-world domains.
1.1 Overview and Related Work
The foundation of our approach is the use of a “semi-Bayes net” to capture the func-
tional structure of a strategic game. A semi-Bayes net is essentially a Bayes net [21]
where the conditional probability distributions for nodes representing player deci-
sions are left unspecified. Combining a semi-Bayes net with utility functions for the
players yields a “semi network-form game” (or semi net-form game) [24], which
takes the place of the extensive-form game [30] used in conventional game the-
ory.1 In this paper, we extend the semi net-form game framework to a repeated-time
structure by defining an “iterated semi net-form game”. The conditional probability
distributions at the player decision nodes are specified by combining the iterated
semi net-form game with a solution concept, e.g., the level-K RL policies used in
this paper. The result is a Bayes net model of strategic behavior.
Like all Bayes nets, our model describes the conditional dependence relation-
ships among a set of random variables. In the context of a strategic scenario, con-
ditional dependencies can be interpreted to describe, for example, the information
available to a player while making a strategic decision. In this way, semi net-form
games incorporate a notion similar to that of “information sets” found in extensive-
1 The “semi-” modifier refers to a restricted category of models within a broader class of models
called network-form games. A key difference between the semi-network form game used here
and the general formulation of network-form games is that the general formulation can handle
unawareness – situation where a player does not know of the possibility of some aspect of the
game [42]. Unawareness is a major stumbling block of conventional game theoretic approaches
in part because it forces a disequilibrium by presenting an extreme violation of the common prior
assumption [16].
Counter-Factual Reinforcement Learning
3
form games. However, information in semi net-form games takes on the nature of
information in statistics, thereby opening it to formal analysis by any number of
statistical tools [22, 33] as opposed to information sets which uses an informal no-
tion. Just as information sets are the key to capturing incomplete information in
extensive-form games, conditional dependence relationships are the key to captur-
ing incomplete information in semi net-form games.2 In our example of a cyber
battle, the cyber defender (power grid operator) has access to the full system state,
whereas the cyber attacker only has access to the part of the system that has been
compromised. Representing this in the semi net-form game diagram means the de-
fender’s decision node has the full system state as its parent, while the attacker’s
decision node only has a subset of the state as its parent. As a consequence, the
attacker cannot distinguish between some of the system states. In the language of
extensive-form games, we say that all states mapping to the same attacker’s obser-
vation belong to the same information set.
It is important to recognize that the semi net-form game model is independent
of a solution concept. Just as a researcher can apply a variety of equilibrium con-
cepts (Nash equilibrium, subgame perfect equilibrium, quantal response equilib-
rium [27, 28], etc.) to the same extensive-form game, so too can various solution
concepts apply to the same semi net-form game. In this paper we focus on the use
of level-K RL policies, however, there is no way in which the semi net-form games
model is dependent on that concept. One could, in principle, apply Nash equilib-
rium, subgame perfect equilibrium, quantal response equilibrium, etc. to a semi net-
form game, though doing so may not result in a computationally tractable model or
a good description of human behavior.
In the remainder of this introduction, we describe three characteristics whose
unique combination is the contribution of our paper. The first is that players in our
model are strategic; that their policy choices depend on the reward functions of
the other players. This is in contrast to learning-in-games and co-evolution mod-
els [14, 20] wherein players do not use information about their opponents’ reward
function to predict their opponents’ decisions and choose their own actions. On this
point, we are following experimental studies [5], which routinely demonstrate the
responsiveness of player behavior to changes in the rewards of other players.
Second, our approach is computationally feasible even on real-world problems.
This is in contrast to equilibrium models such as subgame perfect equilibrium
and quantal response equilibrium. We avoid the computational problems associ-
ated with solving for equilibria by using the level-K RL policy model, which is a
non-equilibrium solution concept. That is, since level-K players are not forced to
have correct beliefs about the actions of the other players, the level-K strategy of
2 Harsanyi’s Bayesian games [17] are a special case of extensive form games in which nature
first chooses the game, and this move by nature generally belongs to different information sets
for the different players. This structure converts the game of incomplete information to a game
of imperfect information, i.e. the players have imperfectly observed nature’s move. In addition to
the fact that Harsanyi’s used extensive form games in his work while we’re using semi network-
form games, our work also differs in what we are modeling. Harsanyi focused on incomplete
information, while our model incorporates incomplete information and any other uncertainty or
stochasticity in the strategic setting.
4
Lee, R. et al.
player i does not depend on the actual strategy of i’s opponents. As a result, this
means that the level-K RL policies of each of the players can be solved indepen-
dently. The computational tractability of our model is also in contrast to partially
observable Markov decision process- (POMDP-) based models (e.g. Interactive-
POMDPs [15]) in which players are required to maintain belief states over belief
states thus causing a quick explosion of the computational space. We circumvent
this explosion of belief states by formulating policies as mappings from a player’s
memory to actions, where memory refers to some subset of a player’s current and
past observations, past actions, and statistics derived from those variables. This for-
mulation puts our work more squarely in the literature of standard RL [18, 38]. As a
final point of computational tractability, our approach uses the policy representation
instead of the strategic representation of player decisions. The difference is that the
policy representation forces player behavior to be stationary – the time index is not
an argument of the policy – whereas in the strategic representation strategies are
non-stationary in general.
Third, since our goal is to predict the behavior of real human players, we
rely heavily on the experimental game theory literature to motivate our modeling
choices. Using the policy mapping from memories to actions, it is straightforward
to introduce experimentally motivated behavioral features such as noisy, sampled
or bounded memory. The result of the RL, then, is an optimal strategy given more
realistic assumptions about the limitations of human beings.3 This is in contrast to
the literature on coevolutionary RL [13, 29], where the goal is to find optimal strate-
gies. For example, the work in [8] uses RL to design expert checkers strategies. In
those models, behavioral features motivated by human experimental data are not
included due to the constraining effect they have on optimal strategies. Hence, RL
in our model is used as a description of how real humans behave. This use for RL
has a foundation in neurological research [12, 25], where it has provided a useful
framework for studying and predicting conditioning, habits, goal-directed actions,
incentive salience, motivation and vigor [26]. The level-K model is itself another
way in which we incorporate experimentally motivated themes. In particular, by
using the level-K model instead of an equilibrium solution concept, we avoid the
awkward assumption that players’ predictions about each other are always correct
[5, 19, 32].
We investigate all of this for modeling a cyber battle over a smart power grid. We
discuss the relationship between the behavior predicted by our model and what one
might expect of real human defenders and attackers.
3 One can imagine an extension where the RL training is modified to reflect bounded rationality,
satisfying [35], etc. For example, to capture satisficing, the RL may be stopped upon achieving the
satisficing level of utility. Note that we do not pursue such bounded rational RL here.
Counter-Factual Reinforcement Learning
1.2 Roadmap
5
This chapter is organized as follows. In Section 2, we provide a review of semi
network-form games and the level-K d-relaxed strategies solution concept [24].
This review is the starting point for the theoretical advances of this paper found
in Section 3. In Section 3 we extend the semi net-form games formalism to iterated
semi network-form games, which enables interactions over a time-repeated struc-
ture. This is also where we introduce the level-K RL solution concept. Section 3 is
the major theoretical contribution of this paper. In Section 4, we apply the iterated
semi net-form game framework to model a cyber battle on a smart power distribu-
tion network. The goal of Section 4 is to illustrate how an iterated semi net-form
game is realized and how the level-K RL policy solution concept is implemented.
In this section we describe the setting of the scenario and lay out the iterated semi
net-form game model, including observations, memories, moves and utility func-
tions for both players. We also describe the details of the level-K RL algorithm we
use to solve for players’ policies. This section concludes with simulation results and
a possible explanation for the resulting behaviors. Section 5 provides a concluding
discussion of the iterated semi net-form games framework and future work.
2 Semi Network-Form Games Review
In this section, we provide a brief review of semi net-form games. For a rigorous
treatment, please refer to Lee and Wolpert [24].
2.1 Framework Description
A “semi network-form game” (or semi net-form game) uses a Bayes net [21] to
serve as the underlying probabilistic framework, consequently representing all parts
of the system using random variables. Non-human components such as automation
and physical systems are described using “chance” nodes, while human components
are described using “decision” nodes. Formally, chance nodes differ from decision
nodes in that their conditional probability distributions are prespecified. In contrast,
each decision node is associated with a utility function which maps an instantiation
of the net to a real number quantifying the player’s utility. In addition to know-
ing the conditional distributions at the chance nodes, we must also determine the
conditional distributions at the decision nodes to fully specify the Bayes net. We
will discuss how to arrive at the players’ conditional distributions over possible ac-
tions, also called their “strategies”, later in Section 2.2. The discussion is in terms of
countable spaces, but much of the discussion carries over to the uncountable case.
We describe a semi net-form game as follows:
6
Lee, R. et al.
An (N -player) semi network-form game is described by a quintuple (G, X, u, R, π)
where
1. G is a finite directed acyclic graph represented by a set of vertices and a set of
edges. The graph G defines the topology of the Bayes network, thus specifying
the random variables as well as the relationships between them.
2. X is a Cartesian product of the variable space of all vertices. Thus X contains all
instantiations of the Bayes network.
3. u is a function that takes an instantiation of the Bayes network as input and out-
puts a vector in RN , where component i of the output vector represents player
i’s utility of the input instantiation. We will typically view it as a set of N utility
functions where each one maps an instantiation of the network to a real number.
4. R is a partition of the vertices into N + 1 subsets. The first N partitions contain
exactly one vertex, and are used to associate assignments of decision nodes to
players. In other words, each player controls a single decision node. The N + 1
partition contains the remainder of the vertices, which are the chance nodes.
5. π is a function that assigns to every chance node a conditional probability distri-
bution [21] of that node conditioned on the values of its parents.
Specifically, Xv is the set of all possible states at node v, ui is the utility function
of player i, R(i) is the decision node set by player i, and π is the fixed set of distri-
butions at chance nodes. Semi net-form game is a general framework that has broad
modeling capabilities. As an example, a normal-form game [30] is a semi net-form
game that has no edges. As another example, let v be a decision node of player i that
has one parent, v(cid:48) . Then the conditional distribution P(Xv Xv(cid:48) ) is a generalization
of an information set.
2.2 Solution Concept: Level-K D-Relaxed Strategies
In order to make meaningful predictions of the outcomes of the games, we must
solve for the strategies of the players by converting the utility function at each deci-
sion node into a conditional probability distribution over that node. This is accom-
plished using a set of formal rules and assumptions applied to the players called a
solution concept. A number of solution concepts have been proposed in the game
theory literature. Many of which show promise in modeling real human behavior in
game theory experiments, such as level-K thinking, quantal response equilibrium,
and cognitive hierarchy. Although this work uses level-K exclusively, we are by
no means wedded to this equilibrium concept. In fact, semi net-form games can
be adapted to use other models, such as Nash equilibrium, quantal response equi-
librium, quantal level-K, and cognitive hierarchy. Studies [5, 43] have found that
performance of an equilibrium concept varies a fair amount depending on the game.
Thus it may be wise to use different equilibrium concepts for different problems.
Level-K thinking [11] is a game theoretic solution concept used to predict the
outcome of human-human interactions. A number of studies [2, 4, 5, 10, 11, 43] have
Counter-Factual Reinforcement Learning
7
shown promising results predicting experimental data in games using this method.
The concept of level-K is defined recursively as follows. A level K player plays
(picks his action) as though all other players are playing at level K − 1, who, in
turn, play as though all other players are playing at level K − 2, etc. This process
continues until level 0 is reached, where the player plays according to a prespecified
prior distribution. Notice that running this process for a player at K ≥ 2 results in
ricocheting between players. For example, if player A is a level 2 player, he plays
as though player B is a level 1 player, who in turn plays as though player A is a
level 0 player. Note that player B in this example may not be a level 1 player in
reality – only that player A assumes him to be during his reasoning process. Since
this ricocheting process between levels takes place entirely in the player’s mind,
no wall clock time is counted (we do not consider the time it takes for a human
to run through his reasoning process). We do not claim that humans actually think
in this manner, but rather that this process serves as a good model for predicting
the outcome of interactions at the aggregate level. In most games, the player’s level
K is a fairly low number for humans; experimental studies [5] have found K to be
somewhere between 1 and 2.
In [24], the authors propose a novel solution concept called “level-K d-relaxed
strategies” that adapts the traditional level-K concept to semi network-form games.
The algorithm proceeds as follows. To form the best response of a decision node
v, the associated player i = R−1 (v) will want to calculate quantities of the form
argmax xv [E(ui xv , x pa(v) )], where ui is the player’s utility, xv is the variable set by
the player (i.e., his move), and x pa(v) is the realization of his parents that he observes.
We hypothesize that he (behaves as though he) approximates this calculation in sev-
eral steps. First, he samples M candidate moves from a “satisficing” distribution (a
prior distribution over his moves). Then, for each candidate move, he estimates the
expected utility resulting from playing that move by sampling M (cid:48) times the posterior
probability distribution over the entire Bayes net given his parents and his actions
(which accounts for what he knows and controls), and computing the sample ex-
pectation uK
i . Decision nodes of other players are assumed to be playing at a fixed
conditional probability distribution computed at level K − 1. Finally, the player picks
the move that has the highest estimated expected utility. In other words, the player
performs a finite-sample inference of his utility function using the information avail-
able to him, then picks (out of a subset of all his moves) the move that yields the
highest expected utility. For better computational performance, the algorithm reuses
certain sample sets by exploiting the d-separation property of Bayes nets [21]. The
solution concept was used to model pilot behavior in a mid-air encounter scenario,
and showed reasonable behavioral results.
3 Iterated Semi Network-Form Games
In the previous section, we described a method to model a single-shot scenario.
That is, a scenario in which each player makes a single decision. However, most
8
Lee, R. et al.
real-world scenarios are not single-shot. Rather, what is typically seen is that the
outcome is determined by a series of decisions made by each player over a time-
repeated structure. One way to model time extension is to ignore the structure, create
a large “rolled-out” net4 that explicitly enumerates the repeated nodes, then apply
level-K d-relaxed strategies described in Section 2.2. The problem with such an
approach is that the roll-out causes a linear explosion in the number of decision
nodes with the number of time steps. Since the computational complexity of level-
K d-relaxed strategies is polynomial (to the K th power) in the number of decision
nodes [24], the algorithm becomes prohibitively slow in solving scenarios with more
than a few time steps.
In this section, we extend the semi network-form game from Section 2 to an
“iterated semi network-form game” (or iterated semi net-form game) in order to ex-
plicitly model the repeated-time structure of the game. Then we introduce a novel
solution concept called “level-K reinforcement learning” that adapts level-K think-
ing to the iterated semi network-form game setting.
3.1 Construction of an Iterated Semi Network-Form Game
We describe the extended framework by building up the components incrementally.
A “semi Bayes net” is like a standard Bayes net, in that a semi Bayes net has a topol-
ogy specified by a set of vertices and directed edges, and variable spaces that define
the possible values each vertex can take on. However, unlike a standard Bayes net,
some nodes have conditional probability distributions (CPDs) specified, whereas
some do not. The nodes that do not have their CPDs specified are decision nodes
with one node assigned to each player. A pictorial example of a semi Bayes net is
shown in Figure 1(a). The dependencies between variables are represented by di-
rected edges. The oval nodes are chance nodes and have their CPDs specified; the
rectangular nodes are decision nodes and have their CPDs unspecified. In this paper,
the unspecified distributions will be set by the interacting players and are specified
by the solution concept.
We create two types of semi Bayes nets: a “base semi Bayes net” and a “kernel
semi Bayes net”. A “base semi Bayes net” specifies the information available to all
the players at the start of play, and is where the policy decisions of the game are
made. Note that even though the game is time-extended, players only ever make
one real decision. This decision concerns which policy to play, and it is made at
the beginning of the game in the base semi Bayes net. After the policy decision is
made, action decisions are merely the result of evaluating the policy at the current
state. In contrast, the “kernel semi Bayes net” specifies both how information from
the past proceeds to future instances of the players during play, and how the state of
nature evolves during play. In particular, it specifies not only what a player currently
4 Here we are violating the definition of a semi net-form game that each player can only control a
single decision node. One way to deal with this is to treat past and future selves as different players,
but having the same utility function.
Counter-Factual Reinforcement Learning
9
(a)
(b)
(c)
(d)
Fig. 1 Example construction of an iterated semi Bayes net with a base net and two kernels, i.e.
T = 2, by repeatedly applying the “gluing” procedure. (a) A base semi Bayes net. (b) A kernel
semi Bayes net being “glued” to a base semi Bayes net. (c) A second kernel semi Bayes net being
appended to the net. (d) The final semi iterated Bayes net with T = 2. The numeric subscript
indicates the time step to which each variable belongs.
observes, but also what they remember from their past observations and past actions.
For example, the kernel semi Bayes net describes how the policy chosen in the base
semi Bayes net is propagated to a player’s future decision nodes, where a player’s
action choices are merely the result of evaluating that policy. From these two, we
construct an “iterated semi Bayes net” by starting with the base semi Bayes net
D0 A0 S0 OA,0 OD,0 CPD specified CPD unspecified D1 S0 D0 A0 S1 OA,1 OD,1 A1 D0 A0 S0 OA,0 OD,0 Gluing Function D1 S0 D0 A0 S1 OA,1 OD,1 A1 OA,0 OD,0 D2 S1 D1 A1 S2 OA,2 OD,2 A2 Gluing Function D1 S0 D0 A0 S1 OA,1 OD,1 A1 S2 OA,2 OD,2 D2 A2 OA,0 OD,0 10
Lee, R. et al.
then repeatedly appending the kernel semi Bayes net to it T times. Each append
operation uses a “gluing” procedure that merges nodes from the first semi Bayes net
to root nodes with the same spaces in the second semi Bayes net. Figure 1 illustrates
how we build up an iterated semi Bayes net with a base net and two kernels, i.e.
T = 2. Finally, we create an “iterated semi net-form game” by endowing an iterated
semi Bayes net with a reward function, one for each player, defined at each time
instant. The reward function takes as input an instantiation of the net at a particular
(discrete) time and outputs a reward metric representing how happy the player is
with that instantiation.5
3.2 Solution Concept: Level-K Reinforcement Learning
We introduce a novel solution concept for iterated semi net-form games that com-
bines level-K thinking and reinforcement learning. Instead of considering all possi-
ble combinations of actions at individual decision nodes, we simplify the decision
space by assuming that the players make only a single decision – what policy to play
for the rest of the net. That is, the players pick a policy in the base semi Bayes net,
and then executes that policy over all repetitions of the kernel semi Bayes net. This
assumption allows us to convert the problem of computing a combination of actions
over all time steps to one where we calculate a player’s policy only once and reuse
it T times. By reusing the policy, the computational complexity becomes indepen-
dent of the total number of time steps. Formally, each unspecified node of a player
contains two parts: A policy and an action. The policy is chosen in the base stage
and is passed unchanged from the player’s node in the base semi Bayes net to the
player’s node in the kernel semi Bayes net for all time steps. At each time step, the
action component of the node is sampled from the policy based on the actual values
of the node’s parents. We point out that the utility of a particular policy depends on
the policy decisions of other players because the reward functions of both players
depend on the variables in the net.
The manner in which players make decisions given this coupling is specified
by the solution concept. In this work we handle the interaction between players by
extending standard level-K thinking from action space to policy space. That is, in-
stead of choosing the best level K action (assuming other players are choosing the
best level K − 1 action), players choose the best level K policy (assuming that other
players choose their best level K − 1 policy). Instead of prespecifying a level 0 distri-
bution over actions, we now specify a level 0 distribution over policies. Notice that
from the perspective of a level K player, the behavior of the level K − 1 opponents is
identical to a chance node. Thus, to the player deciding his policy, the other players
are just a part of his environment. Now what remains to be done is to calculate the
best response policy of the player. In level-K reinforcement learning, we choose the
5 We use the term reward function to conform to the language used in the RL literature. This is
identical to the game theoretic notion of instantaneous utility (as opposed to the total utility, i.e.
the present discounted value of instantaneous utilities).
Counter-Factual Reinforcement Learning
11
utility of a player to be the sum of his rewards from each time step. In other words,
the player selects the policy which leads to the highest expected infinite sum of dis-
counted rewards. Noting this together with the fact that the actions of other players
are identical to a stochastic environment, we see that the optimization is the same as
a single-agent reinforcement learning problem where an agent must maximize his
reward by observing his environment and choosing appropriate actions. There are
many standard reinforcement learning techniques that can be used to solve such a
problem [3, 18, 38]. The techniques we use in this paper are described in detail in
Section 4.4.2.
For example, in a two-player iterated semi network-form game, the level 1 policy
of player A is trained using reinforcement learning by assuming an environment that
includes a player B playing a level 0 policy. If A is instead at level 2, his environment
includes player B using a level 1 policy. Player A imagines this level 1 policy as
having been reinforcement learned against a level 0 player A. To save computation
time, it is assumed that how player B learns his level 1 distribution and how A
imagines B to learn his level 1 distribution are identical.
4 Application: Cyber-Physical Security of a Power Network
4.1 Introduction
We test our iterated semi net-form game modeling concept on a simplified model
of an electrical power grid controlled by a Supervisory Control and Data Acquisi-
tion (SCADA) system [39]. A SCADA system forms the cyber and communication
components of many critical cyber physical infrastructures, e.g., electrical power
grids, chemical and nuclear plants, transportation systems, and water systems. Hu-
man operators use SCADA systems to receive data from and send control signals to
physical devices such as circuit breakers and power generators in the electrical grid.
These signals cause physical changes in the infrastructure such as ramping elec-
trical power generation levels to maintain grid stability or modifying the electrical
grid’s topology to maintain the grid’s resilience to random component failures. If
a SCADA system is compromised by a cyber attack, the human attacker may alter
these control signals with the intention of degrading operations or causing perma-
nent, widespread damage to the physical infrastructure.
The increasing connection of SCADA to other cyber systems and the use of com-
puter systems for SCADA platforms is creating new vulnerabilities of SCADA to
cyber attack [7]. These vulnerabilities increase the likelihood that the SCADA sys-
tems can and will be penetrated. However, even when a human attacker has gained
some control over the physical components, the human operators still have some
SCADA observation and control capability. The operators can use this capability to
anticipate and counter the attacker moves to limit or deny the damage and maintain
continuity of the infrastructure’s operation. Traditional cyber security research on
12
Lee, R. et al.
cyber systems has focused on identifying vulnerabilities and how to mitigate those
vulnerabilities. Here, instead, we assume that an attacker has penetrated the system,
and we want to predict the outcome.
The SCADA attack and the defense by the SCADA operator can be modeled
as a machine-mediated, human-human adversarial game. In the remainder of this
section, we construct an iterated semi network-form game to model just such an
interaction taking place over a simplified model of a SCADA-controlled electrical
grid. The game is simulated using the level-K reinforcement learning solution con-
cept described earlier. We explore how the strategic thinking embodied in level-K
reinforcement learning affects the player performance and outcomes between play-
ers of different level K .
4.2 Scenario Model
Figure 2 shows a schematic of our simplified electrical grid infrastructure. It con-
sists of a single, radial distribution circuit [40] starting at the low-voltage side of a
transformer at a substation (node 1) and serving customers at nodes 2 and 3. Node 2
represents an aggregation of small consumer loads distributed along the circuit–such
load aggregation is often done to reduce model complexity when simulating electri-
cal distribution systems. Node 3 represents a relatively large, individually-modeled
distributed generator located near the end of the circuit.
Fig. 2 Schematic drawing of the three-node distribution circuit consisting of three nodes i. The
voltage at each node is Vi ; the real and reactive power injections are pi and qi , respectively; the
line reactance and resistance are xi and ri , respectively; and the real and reactive power flows in
the distribution lines are Pi and Qi , respectively.
In this figure, Vi , pi , and qi are the voltage and real and reactive power injec-
tions at node i. Pi , Qi , ri , and xi are the real power flow, reactive power flow, re-
sistance, and reactance of circuit segment i. These quasi-static power injections,
power flows, voltages, and line properties are related by the nonlinear AC power
flow equations [23]. Our focus in this work is on the game theoretic aspects of the
model, therefore, we use a linearized description of the electrical power flow, i.e.,
V1V3V2P1, Q1P2, Q2p2, q2p3, q3r1, x1r2, x2Counter-Factual Reinforcement Learning
13
(1)
(2)
the LinDistFlow equations [40]
P2 = − p3 , Q2 = −q3 , P1 = P2 + p2 , Q1 = Q2 + q2
V2 = V1 − (r1 P1 + x1 Q1 ), V3 = V2 − (r2 P2 + x2 Q2 ).
Here, all terms have been normalized by the nominal system voltage V0 [23].
In this model, we assume that the circuit configuration is constant with ri = 0.03
and xi = 0.03. To emulate the normal fluctuations of consumer real load, p2 is drawn
from a uniform distribution over the range [1.35, 1.5] at each time step of the game.
The consumer reactive power is assumed to scale with real power, and we take
q2 = 0.5 p2 at each step of the game. The node 3 real power injection p3 = 1 is
also taken as constant implying that, although the distributed generator at node 3 is
controllable (as opposed to a fluctuating renewable generator), its output has been
fixed. Node 3 is then a reasonable model of an internal combustion engine/generator
set burning diesel or perhaps methane derived from landfill gas. Such distributed
generation is becoming more common in electrical distribution systems.
In our simplified game, the SCADA operator (defender) has one objective, i.e.,
keeping the voltages V2 and V3 within appropriate operating bounds (described in
more detail below). To accomplish this the operator normally has two controls: 1)
he can change the voltage V1 at the head of the circuit, and 2) he can adjust the
reactive power output q3 of the distributed generator at node 3. However, we assume
that the system has been compromised, and the attacker has taken control of q3
while the defender retains control of V1 . In this circumstance, the attacker may
use the injection of reactive power q3 to modify all the Qi causing the voltage V2 to
deviate significantly from 1.0. Excessive deviation of V2 or V3 can damage customer
equipment [23] or perhaps initiate a cascading failure beyond the circuit in question.
In the language of an iterated semi network-form game, the change in V1 is the
decision variable of the defender, q3 is the decision variable of the attacker, and V2 ,
V3 , and the rest of the system state are determined by the LinDistFlow equations
and probability distribution described above.
4.2.1 Players’ Decision Spaces
In this scenario, the defender maintains control of V1 which he can adjust in dis-
crete steps via a variable-tap transformer [23], however, hardware-imposed limits
constrain the defender’s actions at time t to the following domain
DD,t = {min(vma x , V1,t + δv), V1,t , max(vmin , V1,t − δv)}
where δv is the voltage step size for the transformer, and vmin and vma x represent
the absolute min and max voltage the transformer can produce. In simple terms,
the defender may leave V1 unchanged or move it up or down by δv as long as V1
stays within the range [vmin , vma x ]. In our model, we take vmin = 0.90, vma x = 1.10,
and δv = 0.02. Similarly, hardware limitations of the generator at node 3 constrain
(3)
14
Lee, R. et al.
the attacker’s range of control of q3 . In reality, the maximum and minimum values
of q3 can be a complicated function [23] of the maximum real power generation
capability p3,ma x and the actual generation level p3 . To keep the focus on the game
theoretic aspects of the model, we simplify this dependence by taking the attacker’s
q3 control domain to be
DA,t = {−q3,ma x , . . . , 0, . . . , q3,ma x },
with q3,ma x = p3,ma x . To reduce the complexity of the reinforcement learning com-
putations, we also discretize the attacker’s move space to eleven equally-spaced set-
tings with −q3,ma x and +q3,ma x as the end points. Later, we study how the behavior
and performance of the attacker depends on the size of the assets under his control
by varying p3 from 0 to 1.8.
(4)
4.2.2 Players’ Observed Spaces
The defender and attacker make observations of the system state via the SCADA
system and the attacker’s compromise of node 3, respectively. Via the SCADA sys-
tem, the defender retains wide system visibility of the variables important to his
operation of the system, i.e., the defender’s observed space is given by
ΩD = [V1 , V2 , V3 , P1 , Q1 , MD ].
Because he does not have access to the full SCADA system, the attacker’s observed
space is somewhat more limited
ΩA = [V2 , V3 , p3 , q3 , MA ].
(6)
Here, MD and MA each denote real numbers that represent a handcrafted summary
metric of the respective player’s memory of the past events in the game. These are
described in Section 4.2.4.
(5)
4.2.3 Players’ Rewards
The defender desires to maintain a high quality of service by controlling the voltages
V2 and V3 near the desired normalized voltage of 1.0. In contrast, the attacker wishes
to damage equipment at node 2 by forcing V2 beyond normal operating limits. Both
the defender and attacker manipulate their controls in an attempt to maximize their
(cid:33)2
(cid:32) V3 − 1
(cid:33)2 −
(cid:32) V2 − 1
own average reward, expressed through the following reward functions
RD = −
,
RA = Θ(V2 − (1 + )) + Θ((1 − ) − V2 ).
(8)
(7)
Counter-Factual Reinforcement Learning
15
Here, represents the halfwidth of the nominally good range of normalized voltage.
For most distribution systems under consideration, ∼ 0.05. Θ(·) is the step function.
4.2.4 Players’ Memory Summary Metrics
(9)
MD,t =
1
m + 1
sign(V1,n − V1,n−1 ) sign(V3,n − V3,n−1 )
The defender and attacker use memory of the system evolution in an attempt to
estimate part of the state that is not directly observable. In principle, player memo-
ries should be constructed based on specific application domain knowledge or inter-
views with such experts. However, in this initial work, we simply propose a memory
summary metric for each player that potentially provides him with additional, yet
t(cid:88)
imperfect, system information. We define the defender memory summary metric to
be
n=t−m
If the attacker has very limited q3 capability, both p3 and q3 are relatively constant,
and changes in V3 should follow changes in V1 , which is directly controlled by the
defender. If all V3 changes are as expected, then MD = 1. The correlation between
V1 and V3 changes can be broken by an attacker with high q3 capability because
large changes in q3 can make V1 and V3 move in opposite directions. If attacker
actions always cause V1 and V3 to move in opposite directions, then MD = −1. This
correlation can also be broken by variability in the (unobserved) p2 and q2 . The
attacker could use this ( p2 , q2 ) variability, which is unobserved by the attacker, to
mask his actions at node 3. Such masking is more important in a setting where the
defender is uncertain of the presence of the attacker, which we will address in future
work.
As with the defender memory summary metric, the intent of MA is to estimate
some unobserved part of the state. Perhaps the most important unobserved state
variable for the attacker is V1 which reveals the vulnerability of the defender and
would be extremely valuable information for the attacker. If the attacker knows the
rules that the defender must follow, i.e., Equation (3), he can use his observations to
(cid:32) ∆V3,n − ∆q3,n x2 /V0
(cid:32)
(cid:33)(cid:33)
t(cid:88)
infer V1 . One mathematical construct that provides this inference is
floor
δv
n=t−m
If the attacker increases q3 by ∆q3,t = q3,t − q3,t−1 , he would expect a proportional
increase in V3 by ∆V3,t = V3,t − V3,t−1 ∼ ∆q3 x2 /V0 . If V3 changes according to this
reasoning, then the argument in MA is zero. However, if the defender adjusts V1 at
the same time step, the change in V3 would be modified. If ∆V3,t is greater or lower
than the value expected by the attacker by ∆V/N , the argument in MA is +1 or -1,
respectively. The sum then keeps track of the net change in V1 over the previous m
time steps. Note also that the stochastic load ( p2 , q2 ) will also cause changes in V3
and, if large enough, it can effectively mask the defender behavior from the attacker.
MA,t =
sign
.
(10)
16
4.3 Iterated Semi Network-Form Game Model
Lee, R. et al.
We model the scenario described in Section 4.2 as an iterated semi net-form game
set in the graph shown in Figure 3. The figure shows the net for 2 time steps with
the numeric subscript on each variable denoting the time step to which it belongs.
The system state S = [P2 , Q2 , P1 , V1 , V2 , V3 ] is a vector that represents the current
state of the power grid network. The vector comprises of key system variables
with their relationships defined in Equations (1) and (2). The observation nodes
OD = [V1 , V2 , V3 , P1 , Q1 ] and OA = [V2 , V3 , p3 , q3 ] are vectors representing the part
of the system state that is observed by the defender and attacker, respectively. We
compute these observation nodes by taking the system state S , and passing through
unchanged only the variables that the player observes. Each player’s observation is
incorporated into a memory node (MD and MA for the defender and attacker, respec-
tively) that summarizes information from the player’s past and present. The memory
nodes6 are given by MD,t = [OD , MD,t , DD,t−1 ] and MA,t = [OA,t , MA,t , DA,t−1 ]. Now,
the defender uses his memory MD to set the decision node DD , which adjusts the
setting of the voltage-tap transformer (up to one increment in either direction) and
sets the voltage V1 . On the other hand, the attacker uses his memory MA to set the
decision node DA , which sets q3 . Finally, the decisions of the players are propagated
to the following time step to evolve the system state. In our experiments we repeat
this process for T = 100 time steps.
4.4 Computing the Solution Concept
We compute the level-K policies of the players following the level-K reinforcement
learning solution concept described in Section 3.2. First, we form the base of the
level-K hierarchy by defining level 0 policies for the defender and attacker. Then,
we describe the details of how we apply reinforcement learning to bootstrap up to
levels K > 0. A level 0 policy represents a prior on the player’s policy, i.e., it defines
how a non-strategic player would play. In this work, we handcrafted level 0 policies
based on expert knowledge of the domain. In future work, we would like to devise
an automated and somewhat “principled” way of setting the level 0 policies.
4.4.1 Level 0 Policies
Often, level 0 players are assumed to choose their moves randomly from their move
spaces DD,t and DA,t . However, we do not believe this to be a good assumption, es-
pecially for SCADA operators. These operators have training which influences how
6 To be technically correct, we must also include the variables carried by the memory nodes MD
and MA for the sole purpose of calculating MD and MA , respectively. However, for simplicity, we
are not showing these variables explicitly.
Counter-Factual Reinforcement Learning
17
Fig. 3 The iterated semi net-form game graph of the cyber security of a smart power network
scenario. The graph shows 2 time steps explicitly. In our experiments we choose the number of
time steps T = 100. We use subscripts D and A to denote node association with the defender
and attacker, respectively, and the numeric subscript to denote the time step. The system state S
represents the current state of the power grid network. The players make partial observations O of
the system and use them to update their memories M . The memories are used to pick their action
D.
they control the system when no attacker is present, i.e., the “normal” state. In con-
trast, a random-move assumption may be a reasonable model for a level 0 attacker
that has more knowledge of cyber intrusion than of manipulation of the electrical
grid. However, we assume that our level 0 attacker also has some knowledge of the
electrical grid.
If there is no attacker present on the SCADA system, the defender can maximize
his reward by adjusting V1 to move the average of V2 and V3 closer to 1.0 without
any concern for what may happen in the future. We take this myopic behavior as
representative of the level 0 defender, i.e.,
πD (V2,t , V3,t ) = arg minDD,t
(V2,t + V3,t )
2
− 1
(11)
DD,1 S0 MA,0 MD,0 DD,0 DA,0 S1 OA,1 OD,1 MA MD MA,1 MD,1 DA,1 S2 OA,2 OD,2 MA,2 MD,2 DD,2 DA,2 OA,0 OD,0 18
Lee, R. et al.
For the level 0 attacker, we adopt a drift-and-strike policy which requires some
knowledge of the physical circuit and power flow equations. We propose that the
attacker “drifts” in one direction by steadily increasing (or decreasing) q3 by one
increment at each time step. The level 0 attacker decides the direction of the drift
based on V2 , i.e., the attacker drifts to larger q3 if V2 < 1. The choice of V2 to decide
the direction of the drift is somewhat arbitary. However, this is simply assumed level
0 attacker behavior. The drift in q3 causes a drift in Q1 and, without any compen-
sating move by the defender, a drift in V2 . However, a level 0 defender compensates
by drifting V1 in the opposite sense as V2 in order to keep the average of V2 and V3
close to 1.0. The level 0 attacker continues this slow drift until, based on his knowl-
edge of the power flow equations and the physical circuit, he detects that a sudden
large change in q3 in the opposite direction of the drift would push V2 outside the
range [1 − ε, 1 + ]. If the deviation of V2 is large enough, it will take the defender
a number of time steps to bring V2 back in range, and the attacker accumulates re-
ward during this recovery time. More formally this level 0 attacker policy can be
expressed as
Level0Attacker()
1 V ∗ = maxq∈DA,t V2 − 1;
if V ∗ > θA
2
then return arg maxq∈DA,t V2 − 1;
3
if V2 < 1
4
then return q3,t−1 + 1;
5
return q3,t−1 − 1;
6
Here, θA is the threshold parameter that triggers the strike. Throughout this work,
we have used θA = 0.07 > to indicate when an attacker strike will accumulate
reward.
4.4.2 Reinforcement Learning Details
The training environment of a level-K player consists of all nodes that he does not
control, including all chance nodes and the decision nodes of other players, which
are assumed to be playing with a level K − 1 policy. This leaves us with a standard
single-agent reinforcement learning problem, where given an observation, the player
must choose an action to maximize some notion of cumulative reward. We follow
loosely the SARSA reinforcement learning setup in [38]. First, we choose the opti-
mization objective to be his expected sum of discounted single-step rewards (given
by Equations 7 and 8). To reduce the output space of the player, we impose an ε-
greedy parameterization on the player’s policy space. That is, the player plays what
he thinks is the “best” action with probability 1 − ε, and plays uniformly randomly
over all his actions with probability ε. Playing all possible actions with nonzero
probability ensures sufficient exploration of the environment space for learning. At
the core of the SARSA algorithm is to learn the “Q-function”, which is a map-
ping from observations and actions to expected sum of discounted rewards (also
known as “Q-values”). Given an observation of the system, the Q-function gives the
Counter-Factual Reinforcement Learning
19
long-term reward for playing a certain action. To maximize the reward gathered, the
player simply plays the action with the highest Q-value at each step.
To learn the Q-function, we apply the one-step SARSA on-policy algorithm
in [38].7 However, since the players’ input spaces are continuous variables, we can-
not use a table to store the learned Q-values. For this reason, we approximate the
Q-function using a neural-network [3, 34]. Neural networks are a common choice
because of its advantages as a universal function approximator and being a compact
representation of the policy.
To improve stability and performance, we make the following popular modifi-
cations to the algorithm: First, we run the algorithm in semi-batch mode, where
training updates are gathered and updated at the end of the episode rather than fol-
lowing each time step. Second, we promote initial exploration using optimistic starts
(high initial Q-values) and by scheduling the exploration parameter ε to a high rate
of exploration at first, then slowly decreasing it as the training progresses.
4.5 Results and Discussion
Level-K reinforcement learning was performed for all sequential combinations of
attacker and defender pairings, i.e., D1/A0, D2/A1, A1/D0, and A2/D1. Here, we
refer to a level K player using a shorthand where the letter indicates attacker or
defender and the number indicates the player’s level. The pairing of two players
is indicated by a “/”. The training was performed for q3,ma x in the range 0.2 to
1.8. Subsequent to training, simulations were run to assess the performance of the
different player levels. The player’s average reward per step for the different pairs is
shown in Figure 4 as a function of q3,ma x . Figure 5 shows snapshots of the players’
behavior for the pairings D0/A0, D1/A0, and D0/A1 for q3,ma x =0.7, 1.2, and 1.6.
Figure 6 shows the same results but for one level higher, i.e., D1/A1, D2/A1, and
D1/A2.
D0/A0
Figures 5(b), (e), and (h) show the interaction between the two level 0 policies, and
Figures 4(a) and (d) show the average player performance. These initial simulations
set the stage for interpreting the subsequent reinforcement learning. For q3,ma x < 0.8,
the black circles in Figure 4(d) show that A0 is unable to push V2 outside of the
range [1 − , 1 + ]. The explanation is found in Figure 5(b). With V2 < 1 and say
q3,ma x = 0.7, A0’s drift will have saturated at q3 = q3,ma x = 0.7. However, with θA =
0.07, A0 will not strike by changing q3 = −q3,ma x = −0.7 unless he projects such
a strike could drive V2 below 0.93. A0’s limited q3 -strike capability is not enough
7 Singh et al. [36] describes the characteristics of SARSA when used in partially observable situa-
tions. SARSA will converge to a reasonable policy as long as the observed variables are reasonably
Markov.
20
Lee, R. et al.
overcome the threshold and the system becomes locked in a quasi-steady state. In
the midrange of A0’s capability (0.8 ≤ q3 ≤ 1.4), the drift-and-strike A0 policy is
effective (Figure 5(e)). However, A0 is only successful for strikes that force V2 <
0.95. In addition, there are periods of time when V2 ∼ 1.0 and A0 is unable to decide
on a drift direction. However, these become fewer (and A0’s average reward grows)
as q3,ma x approaches 1.4 (Figure 4(d)). For q3,ma x ≥ 1.6, A0 is able to successfully
strike for V2 < 0.93 and V2 > 1.07, and A0 drives the system into a nearly periodic
oscillation (Figure 5(h)) with a correspondingly large increase in A0’s discounted
average reward (Figure 4(d)). The reduction in D0’s performance closely mirrors
the increase in A0’s performance as q3 increases. However, it is important to note
that D0 enables much of A0’s success by changing V1 to chase the V2 and V3 . The
adjustments in V1 made by D0 in Figures 5(b), (e), and (h) bring the system closer
to the voltage limits just as A0 gains a large strike capability.
D1 Training Versus A0
The red triangles in Figure 4(a) and the black circles in Figure 4(e) show dramatic
improvement in the performance of D1 over D0 when faced with A0. In the mid-
dle range of A0’s capability (0.8 ≤ q3,ma x ≤ 1.4), Figure 5(d) shows that D1 stops
changing V1 to chase the immediate reward sought by D0. Instead, D1 maintains
a constant V1 = 1.02 keeping V2 ∼ 1.0 and A0 uncertain about which direction to
drift. By keeping V1 > 1.0, D1 also corrects the error of D0 whose lower values of
V1 helped A0 push V2 and V3 below 1 − . With V1 = 1.02, the average of V2 and V3
are significantly higher than 1.0, but D1 accepts the immediate decrement in average
reward to avoid a much bigger decrement he would suffer from an A0 strike. The
effect of this new strategy is also reflected in the poor A0 performance as seen from
the black circles in Figure 4(e). The behavior of D1 for q3,ma x ≥ 1.6 in Figure 5(g)
becomes complex. However, it appears that D1 has again limited the amount that he
chases V2 and V3 . In fact, D1 moves V1 in a way that decreases his immediate re-
ward, but this strategy appears to anticipate A0’s moves and effectively cuts off and
reverses A0 in the middle of his drift sequence. We note that this behavior of the
defender makes sense because he knows that the attacker is there waiting to strike.
In real life, a grid operator may not realize that a cyber attack is even taking place.
To capture this phenomenon motivates follow-on work in uncertainty modeling of
the attacker’s existence.
A1 Training Versus D0
A cursory inspection of Figures 5(c), (f), and (i) might lead one to believe that the
A1 training has resulted in A1 simply oscillating q3 back and forth from +q3,ma x to
−q3,ma x . However, the training has resulted in rather subtle behavior, which is most
easily seen in Figure 5(c). The largest change A1 (with q3,ma x = 0.7) can indepen-
dently make in V2 is ∼ 0.04. However, A1 gains an extra 0.02 of voltage change by
Counter-Factual Reinforcement Learning
21
leveraging (or perhaps convincing) D1 to create oscillations of V1 in-phase with his
own moves. For this strategy to be effective in pushing V2 below 1 − , the V1 oscil-
lations have to take place between 1.0 and 1.02, or lower. When the synchronization
of the V1 and A1 oscillations are disturbed such as at around step 50 in Figure 5(c),
A1 modifies his move in the short term to delay the move by D0 and re-establish the
synchronization. A1 also appears to have a strategy for “correcting” D0’s behavior
if the oscillations take place between levels V1 that are too high. Near step 40 in
Figure 5, A1 once again delays his move convincing D0 to make two consecutive
downward moves of V1 to re-establish the “correct” D0 oscillation level. Similar
behavior is observed out to q3,ma x = 1.4. At q3,ma x = 1.6, A1 has enough capability
that he can leverage in-phase D0 oscillations to exceed both the V2 lower and upper
voltage limits. This improved performance is reflected in the dramatic increase in
A1’s average reward (A1/D0; see red triangles in Figure 4(d)).
D1/A1
In the hierarchy of level-K reinforcement learning, D1/A1 is similar to D0/A0 in that
they do not train against one another, but this match up sets the stage for interpreting
the level-2 trainings. Figures 5(a), (d), and (g) show that the D1/A0 training results
in a D1 that does not chase V2 and V3 , keeps V2 near 1.0, and accepts a lower current
reward to avoid large A0 strikes. In Figures 6(b), (e), and (h), D1 continues to avoid
responding to the oscillatory behavior of A1, V2 generally does not cross beyond the
acceptable voltage limits. However, V3 is allowed to deviate significantly beyond the
bounds. The result is that D1’s average reward versus A1 does not show much if any
improvement over D0’s versus A1 (red triangles and black circles, respectively, in
Figure 4(b)). However, D1 is quite effective and reducing the performance of A1
(Figures 4(e) red triangles) relative to the performance of A1 in D0/A1, at least
for the intermediate values of q3,ma x (Figure 4(d) red triangles). The results for A1
are clearer. Figures 6(b), (e), and (h) show the oscillatory behavior of A1 while
Figures 4(a), (b), (d), and (e) show that the switch from A0 to A1 when facing D1
improves the attacker’s performance while degrading the performance of D1.
D2 Training Versus A1
The results of this training start out similar to the training for D1. Figure 6(a) shows
that, at q3,ma x = 0.7, D2 performs better if he does not make many changes of V1
thereby denying A1 the opportunity to leverage his moves to amplify the swings of
V2 . For the higher values of q3,ma x in Figures 6(d) and (g), D2 learns to anticipate the
move pattern of A1 and moves in an oscillatory fashion, but one that is out of phase
with the moves of A1. Instead of amplifying the swings of V2 , D2’s moves attenuate
these swings. This new behavior results in across-the-board improvement in D2’s
average discounted reward over D1 (blue squares versus red triangles in Figure 4(b)
22
Lee, R. et al.
and a significant reduction in A1 performance (red triangles in Figure 4(e) versus
Figure 4(f)).
A2 Training Versus D1
A2 shows no perceptible increase in performance over A1 when matched against
D1 (blue squares versus red triangles in Figure 4(e)). The same general observation
can be made for A2 and A1 when matched against any of D0, D1, or D2. Fig-
ures. 4(b) and (c) show that the defenders perform nearly the same against A1 or
A2, and Figures 4(e) and (f) show no significant change in attacker performance
when switching from A1 to A2. This may indicate that policies embodied in A2 (or
A1) may be approaching a fixed point in performance.
D2/A2
The similarities in the performance of A1 and A2 make the analysis of this interac-
tion nearly the same as that of D2/A1.
5 Conclusions and Future Work
In this paper, we introduced a strategic, computationally-tractable, experimentally-
motivated model for predicting human behavior in novel and complex time-extended
scenarios. This model consists of an iterated semi net-form game combined with a
level-K RL solution concept. We applied this model to predict behavior on a cyber
battle on a smart power grid. As discussed in the results section, the predictions of
this model are promising in that they match expectations for how a “real world”
cyber battle would unfold.
We can vary parameters of the model that both concern the kind of cyber battle
taking place (e.g., degree of compromise) and that describe the players (e.g., level
0 distributions, their level K ). We can also vary the control algorithm. We can then
evaluate the expected “social welfare” (i.e., the happiness metric of the system de-
signer) for all such variations. In this way our framework can be used to increase
our understanding of existing and proposed control algorithms to evaluate their ro-
bustness under different cyber attack scenarios and/or model mis-specification. In
the near future, with additional advances in our computational algorithms, we hope
to be able to solve the model in real-time as well. This raises the possibility of using
our framework to do real-time control rather than choose among some small set of
proposed control algorithms, i.e., to dynamically predict the attacker’s policy and
respond optimally as the cyber battle unfolds.
Despite the significant modeling advances presented here, there are several im-
portant ways in which the realism of this paper’s model can be improved. Some of
Counter-Factual Reinforcement Learning
23
these improvements have already been formalized, but they were left out of this doc-
ument for the purposes of space and clarity. For example, the iterated semi net-form
game framework easily models the situation where players have uncertainty about
the environment they are facing. This includes uncertainty about the utility func-
tions and the rationality (or levels) of the other players. This naturally corresponds
to the Bayesian games setting within the extensive form games formalism. This also
includes uncertainty about whether or not the other players exist. In fact, the semi
net-form game formalism is unique in that it can even be extended to handle “un-
awareness” – a situation where a player does not know of the possibility of some
aspect of the game. For example, it would be unawareness, rather than uncertainty,
if the defender did not know of the possibility that an attacker could take control of
a portion of the smart power grid. These types of uncertainty and unawareness will
be presented and explored in future work.
Another important modeling advance under development is related to the abil-
ity of players to adapt their policies as they interact with their opponents and make
observations of their opponents’ actual behavior. The level-K RL solution concept
is particularly well-suited to relatively short-term interactions, like the cyber battle
analyzed above. However, as interactions draw out over a longer time-frame, we
would expect the players to incorporate their opponent’s actual behavior into their
level-K model of their opponent. One possibility for achieving this type of adapta-
tion is based on a player using a Bayesian variant of fictitious play to set the level
0 distribution of their opponent. In other words, we use the past behavior to update
the level 0 distribution of the opponent.
This discussion raises an important question about what happens when the strate-
gic situation is not novel and/or the players have previously interacted. Is the level-
K RL model developed here still appropriate? The answer is probably no. In such
an interacted environment, we should expect the players to have fairly accurate
beliefs about each other. Furthermore, these accurate beliefs should lead to well-
coordinated play. For example, in the power grid this would mean that the attacker
and defender have beliefs that correspond to what the other is actually doing rather
than corresponding to some independent model of the other’s behavior. In the very
least, we should not expect the players to be systematically wrong about each other
as they are in the level-K model. Rather, in this interacted environment, player be-
havior should be somewhere between the completely non-interacted level-K models
and a full-on equilibrium, such as Nash equilibrium or quantal response equilibrium.
The analysis of interacted, one-shot games found in Bono and Wolpert [1, 41] should
provide a good starting point for developing a model of an interacted, time-extended
game.
Perhaps the most important next step for this work is the process of estimating
and validating our model using real data on human behavior. We specifically need
data to estimate the parameters of the utility functions and the level K of the play-
ers as well as any parameters of their level 0 strategies. After fitting our model to
data, we will validate our model against alternative models. The difficult part about
choosing alternative models with which to compare our model is that extensive-form
games and equilibrium concepts are computationally intractable in the types of do-
24
Lee, R. et al.
mains for which our model is designed. Therefore, feasible alternative models will
likely be limited to simplified versions of the corresponding extensive-form game
and agent-based simulations of our iterated semi net-form game.
For the smart grid cyber battle analyzed in this paper, there are several options
for gathering data. One is to conduct conventional game-theoretic experiments with
human subjects in a laboratory setting. Unfortunately, estimating our model, espe-
cially with the modeling advances discussed above, will require more data than is
practical to collect via such conventional experimental methods which involve ac-
tual power grid operators in realistic settings. An alternative method for collecting
the large amount of data required is via “crowd-sourcing”. In other words, it should
be possible to deploy an internet-application version of our smart grid cyber battle
to be played by a mixture of undergraduates, researchers, and power engineers. The
data from these experiments would then be used to estimate and validate our model.
The methodologies presented here, and the proposed future extensions, also ap-
ply to many other scenarios. Among these are several projects related to cyber secu-
rity as well as the Federal Aviation Administration’s NextGen plan for modernizing
the National Airspace System. To encompass this range of applications, we are de-
veloping libNFG as a code base for implementing and exploring NFGs [24]. The
development of this library is ongoing, and modeling advances, like those men-
tioned above, will be implemented as they become an accepted part of the modeling
framework. The libNFG library will ultimately be shared publicly and will enable
users to fully customize their own iterated semi net-form game model and choose
from a range of available solution concepts and computational approaches.
Acknowledgements This research was supported by the NASA Aviation Safety Program SSAT
project, and the Los Alamos National Laboratory LDRD project Optimization and Control Theory
for Smart Grid.
References
1. Bono, J., Wolpert, D.H.: Decision-theoretic prediction and policy design of gdp slot auctions.
Available at SSRN: http://ssrn.com/abstract=1815222. (2011)
2. Brunner, C., Camerer, C.F., Goeree, J.K.: A correction and re-examination of ’stationary con-
cepts for experimental 2x2 games’. American Economic Review (2010)
3. Busoniu, L., Babuska, R., De Schutter, B., Damien, E.: Reinforcement learning and dynamic
programming using function approximators. CRC Press (2010)
4. Camerer, C.F.: An experimental test of several generalized utility theories. Journal of Risk and
Uncertainty. 2(1), 61–104 (1989)
5. Camerer, C.F.: Behavioral game theory: experiments in strategic interaction. Princeton Uni-
versity Press (2003)
6. Camerer, C., Ho, T.H., Chong, J.K.: A cognitive hierarchy model of games. Quarterly Journal
of Economics. 119(3), 861–898 (2006)
7. C ´ardenas, A., Amin, A., Sastry, S.: Research challenges for the security of control systems.
Proceedings of the 3rd conference on Hot topics in security. pp. 6:1–6:6, Berkeley, CA, USA,
2008. USENIX Association.
Counter-Factual Reinforcement Learning
25
8. Chellapilla, K., Fogel, D.B.: Evolving an expert checkers playing program without using hu-
man expertise. IEEE Transactions on Evolutionary Computation. 5(4), 422–428 (2001)
9. Costa-Gomes, M., Crawford, V.: Cognition and behavior in two-person guessing games: An
experimental study. American Economic Review 96(5), 1737–1768 (2006)
10. Costa-Gomes, M.A., Crawford, V.P., Iriberri, N.: Comparing models of strategic thinking in
Van Huyck, Battalio, and Beil’s coordination games. Journal of the European Economic As-
sociation (2009)
11. Crawford, V.P.: Level-k thinking. Plenary lecture. 2007 North American Meeting of the Eco-
nomic Science Association. Tucson, Arizona (2007)
12. Dayan, P., Balleine, B.W.: Reward, motivation, and reinforcement learning. Neuron. 36(2),
285–298 (2002)
13. Fogel, D.B.: Evolutionary computation: Toward a new philosophy of machine intelligence.
IEEE Press, 3 edition (2006)
14. Fudenberg, D., Levine, D.K.: The theory of learning in games. MIT Press (1998).
15. Gmytrasiewicz, P. J., Doshi, P.: A framework for sequential planning in multi-agent settings.
Journal of Artificial Intelligence Research 24, 49–79 (2005)
16. Halpern, J.Y., Rego, L.C.: Extensive games with possibly unaware players. http://www.cs.
cornell.edu/home/halpern/papers/aamas06.pdf Working paper (2007)
17. Harsanyi, J.: Games with Incomplete Information Played by Bayesian Players, I-III. Part I.
The Basic Model. Management Science. 14(3) (1967)
18. Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: A survey. Journal of
Artificial Intelligence Research, 4, 237–285 (1996)
19. Kagel, J.H., Roth, A.E.: The handbook of experimental economics. Princeton University Press
(1995)
20. Kandori, M., Mailath, M., Rob, R.:Learning, mutation, and long run equilibria in games.
Econometrica. 61(1), 29–53 (1993)
21. Koller, D., Friedman, N.: Probabilistic graphical models: principles and techniques. MIT Press
(2009)
22. Kullback, S.:Information theory and statistics. John Wiley and Sons, New York (1959).
23. Kundur, P.: Power system stability and control. McGraw-Hill, New York (1993)
24. Lee, R., Wolpert, D.H.: Game theoretic modeling of pilot behavior during mid-air encounters.
Chapter in Decision making with multiple imperfect decision makers. Intelligent Systems
Reference Library Series. Springer (2011)
25. Maia, T.: Reinforcement learning, conditioning, and the brain: Successes and challenges. Cog-
nitive, Affective, & Behavioral Neuroscience. 1530-7026. 9(4), 343–364. Springer, New York
(2009)
26. Maia, T.V., Frank, M.J.: From reinforcement learning models to psychiatric and neurological.
Nature Neuroscience. 14, 154–162 (2011)
27. McKelvey, R., Palfrey, T.R.: Quantal response equilibria for normal form games. Games and
Economic Behavior. 10(1), 6–38 (1995)
28. McKelvey, R., Palfrey, T.R.: Quantal response equilibria for extensive form games. Experi-
mental Economics. 10.1023/A:1009905800005, 1, 9–41 (1998).
29. Moriarty, D.E., Schultz, A.C., Grefenstette, J.J.: Evolutionary algorithms for reinforcement
learning. The Journal of Artificial Intelligence Research. 11, 241–276 (1999)
30. Myerson, R.B.: Game theory: Analysis of conflict. Harvard University Press (1997)
31. Nagel, R.: Unraveling in guessing games: An experimental study. The American Economic
Review, 85(5), 1313–1326 (1995)
32. Plott, C.R., Smith, V.L.: The handbook of experimental economics. North-Holland, Oxford,
UK (2008)
33. Robert, C.P., Casella, G.: Monte Carlo statistical methods 2nd ed. Springer (2004)
34. Rummery, G.A., Niranja, M.: Online Q-learning using connectionist systems. Technical report
CUED/F-INFENG/TR 166. Engineering department, Cambridge University (1994)
35. Simon, H.A.: Rational choice and the structure of the environment. Psychological Review.
63(2), 129–138 (1956)
26
Lee, R. et al.
36. Singh, S.P., Jaakkola, T., Jordan, M.I.: Learning without state-estimation in partially observ-
able Markovian decision problems. Proceedings of the Eleventh International Conference on
Machine Learning, pp. 284-292, San Francisco (1994)
37. Stahl, D.O., Wilson, P.W.: On players’ models of other players: Theory and experimental
evidence. Games and Economic Behavior, 10(1), 218–254 (1995)
38. Sutton, R.S., Barto, A.G.: Reinforcement learning: An introduction. MIT Press (1998)
39. Tomsovic, K., Bakken, D.E., Venkatasubramanian, V., Bose, A.: Designing the next generation
of real-time control, communication, and computations for large power systems. Proceedings
of the IEEE 93(5), 965–979 (2005)
40. Turitsyn, K., Sulc, P., Backhaus, S., Chertkov, M.: Options for control of reactive power by
distributed photovoltaic generators. Proceedings of the IEEE. 99(6), 1063–1073 (2011)
41. Wolpert, D.H., Bono, J.W.: Distribution-valued solution concepts. Working paper (2011)
42. Wolpert, D.H.: Unawareness, information theory, and multiagent influence diagrams. Working
paper (2012)
43. Wright, J.R., Leyton-Brown, K.: Beyond equilibrium: Predicting human behavior in normal
form games. Twenty-Fourth Conference on Artificial Intelligence (AAAI-10) (2010)
Counter-Factual Reinforcement Learning
27
Fig. 4 Average reward per step averaged over 50 episodes as a function of q3,ma x for all pairings
of the defender (D) and attacker (A) through level 2. (a) Reward of D0, D1, and D2 when matched
against A0. (b) Same as (a) but for A1. (c) Same as (a) and (b) but for A2. (d) Reward of A0, A1,
and A2 when matched against D0. (e) Same as (d) but for D1. (f) Same as (d) and e) but for D2.
In general, we observe that as q3,ma x increases, the defender’s average reward decreases and the
attacker’s average reward increases.
0.00.20.40.60.81.01.21.41.61.82.00.00.10.20.30.40.50.60.70.80.9A0/D2 A1/D2 A2/D2 Q3,max0.00.20.40.60.81.01.21.41.61.82.00.00.10.20.30.40.50.60.70.80.9A0/D1 A1/D1 A2/D1 0.00.20.40.60.81.01.21.41.61.82.0A-Reward 0.00.10.20.30.40.50.60.70.80.9A0/D0 A1/D0 A2/D0 0.00.20.40.60.81.01.21.41.61.82.0D-Reward -8-7-6-5-4-3-2-10D0/A0 D1/A0 D2/A0 0.00.20.40.60.81.01.21.41.61.82.0-8-7-6-5-4-3-2-10D0/A1 D1/A1 D2/A1 0.00.20.40.60.81.01.21.41.61.82.0-8-7-6-5-4-3-2-10D0/A2 D1/A2 D2/A2 a)b)c)d)e)f)28
Lee, R. et al.
Fig. 5 Simulations of system voltages for level 0 and level 1 that show the evolution in level
1 attacker (A1) and level 1 defender (D1) policies after reinforcement learning training session
against their level 0 counterparts D0 and A0. (a) D1 versus A0, (b) D0 versus A0, and (c) D0 versus
A1 for q3,ma x = 0.7. (d) D1 versus A0, (e) D0 versus A0, and (f) D0 versus A1 for q3,ma x = 1.2. (g)
D1 versus A0, (h) D0 versus A0, and (i) D0 versus A1 for q3,ma x = 1.6. In the center column (D0
versus A0), the attacker becomes increasingly capable of scoring against the defender as q3,ma x is
increased. In the left column (D1 versus A0), the defender is successful at avoiding attacks by not
chasing small immediate rewards from voltage centering. In the right column (D0 versus A1), the
attacker successfully leverages the level 0 defender’s move to help him score.
01020304050607080901000.950.960.970.980.9911.011.021.031.041.05V1V2V3D0/A0--Q3,max=0.701020304050607080901000.940.960.9811.021.041.06V1V2V3D1/A0--Q3,max=0.701020304050607080901000.920.940.960.9811.021.041.061.081.1V1V2V3D0/A1--Q3,max=0.701020304050607080901000.90.920.940.960.9811.021.041.061.081.1V1V2V3D0/A0--Q3,max=1.201020304050607080901000.960.9811.021.041.061.081.1V1V2V3D1/A0--Q3,max=1.201020304050607080901000.90.9511.051.11.15V1V2V3D0/A1--Q3,max=1.201020304050607080901000.850.90.9511.051.11.151.21.25V1V2V3D0/A0--Q3,max=1.601020304050607080901000.850.90.9511.051.1V1V2V3D1/A0--Q3,max=1.601020304050607080901000.90.9511.051.11.151.21.25V1V2V3D0/A1--Q3,max=1.6a)b)c)d)e)f)g)h)i)Counter-Factual Reinforcement Learning
29
Fig. 6 Simulations of system voltages for level 1 and level 2 that show the evolution in level
2 attacker (A2) and level 2 defender (D2) policies after reinforcement learning training session
against their level 1 counterparts D1 and A1. (a) D2 versus A1, (b) D1 versus A1, and (c) D1 versus
A2 for q3,ma x = 0.7. (a) D2 versus A1, (b) D1 versus A1, and (c) D1 versus A2 for q3,ma x = 1.2. (g)
D2 versus A1, (h) D1 versus A1, and (i) D1 versus A2 for q3,ma x = 1.6.
01020304050607080901000.940.960.9811.021.041.061.081.1V1V2V301020304050607080901000.90.9511.051.11.15V1V2V301020304050607080901000.90.9511.051.11.151.21.25V1V2V301020304050607080901000.940.960.9811.021.041.061.08V1V2V301020304050607080901000.90.9511.051.11.15V1V2V301020304050607080901000.850.90.9511.051.11.151.2V1V2V301020304050607080901000.940.960.9811.021.041.061.081.11.121.14V1V2V301020304050607080901000.90.9511.051.11.15V1V2V301020304050607080901000.850.90.9511.051.11.151.21.25V1V2V3a)b)c)d)e)f)g)h)i)D1/A1--Q3,max=0.7D1/A1--Q3,max=1.2D1/A1--Q3,max=1.6D2/A1--Q3,max=0.7D2/A1--Q3,max=1.2D2/A1--Q3,max=1.6D1/A2--Q3,max=0.7D1/A2--Q3,max=1.2D1/A2--Q3,max=1.6 |
1806.06464 | 2 | 1806 | 2018-07-31T21:36:26 | Learning Policy Representations in Multiagent Systems | [
"cs.MA",
"cs.AI",
"cs.LG",
"cs.NE",
"stat.ML"
] | Modeling agent behavior is central to understanding the emergence of complex phenomena in multiagent systems. Prior work in agent modeling has largely been task-specific and driven by hand-engineering domain-specific prior knowledge. We propose a general learning framework for modeling agent behavior in any multiagent system using only a handful of interaction data. Our framework casts agent modeling as a representation learning problem. Consequently, we construct a novel objective inspired by imitation learning and agent identification and design an algorithm for unsupervised learning of representations of agent policies. We demonstrate empirically the utility of the proposed framework in (i) a challenging high-dimensional competitive environment for continuous control and (ii) a cooperative environment for communication, on supervised predictive tasks, unsupervised clustering, and policy optimization using deep reinforcement learning. | cs.MA | cs | Learning Policy Representations in Multiagent Systems
Aditya Grover 1 Maruan Al-Shedivat 2 Jayesh K. Gupta 1 Yura Burda 3 Harrison Edwards 3
8
1
0
2
l
u
J
1
3
]
A
M
.
s
c
[
2
v
4
6
4
6
0
.
6
0
8
1
:
v
i
X
r
a
Abstract
Modeling agent behavior is central to understand-
ing the emergence of complex phenomena in mul-
tiagent systems. Prior work in agent modeling
has largely been task-specific and driven by hand-
engineering domain-specific prior knowledge. We
propose a general learning framework for model-
ing agent behavior in any multiagent system using
only a handful of interaction data. Our framework
casts agent modeling as a representation learning
problem. Consequently, we construct a novel ob-
jective inspired by imitation learning and agent
identification and design an algorithm for unsu-
pervised learning of representations of agent poli-
cies. We demonstrate empirically the utility of
the proposed framework in (i) a challenging high-
dimensional competitive environment for continu-
ous control and (ii) a cooperative environment for
communication, on supervised predictive tasks,
unsupervised clustering, and policy optimization
using deep reinforcement learning.
1. Introduction
Intelligent agents rarely act in isolation in the real world and
often seek to achieve their goals through interaction with
other agents. Such interactions give rise to rich, complex
behaviors formalized as per-agent policies in a multiagent
system (Ferber, 1999; Wooldridge, 2009). Depending on the
underlying motivations of the agents, interactions could be
directed towards achieving a shared goal in a collaborative
setting, opposing another agent in a competitive setting, or
be a mixture of these in a setting where agents collaborate
in teams to compete against other teams. Learning useful
representations of the policies of agents based on their inter-
actions is an important step towards characterization of the
agent behavior and more generally inference and reasoning
in multiagent systems.
1Stanford University 2Carnegie Mellon University 3OpenAI.
Correspondence to: Aditya Grover <[email protected]>.
Proceedings of the 35 th International Conference on Machine
Learning, Stockholm, Sweden, PMLR 80, 2018. Copyright 2018
by the author(s).
In this work, we propose an unsupervised encoder-decoder
framework for learning continuous representations of agent
policies given access to only a few episodes of interaction.
For any given agent, the representation function is an en-
coder that learns a mapping from an interaction (i.e., one or
more episodes of observation and action pairs involving the
agent) to a continuous embedding vector. Using such em-
beddings, we condition a policy network (decoder) and train
it simultaneously with the encoder to imitate other interac-
tions involving the same (or a coupled) agent. Additionally,
we can explicitly discriminate between the embeddings cor-
responding to different agents using triplet losses.
For the embeddings to be useful, the representation function
should generalize to both unseen interactions and unseen
agents for novel downstream tasks. Generalization is well-
understood in the context of supervised learning where a
good model is expected to attain similar train and test per-
formance. For multiagent systems, we consider a notion of
generalization based on agent-interaction graphs. An agent-
interaction graph provides an abstraction for distinguishing
the agents (nodes) and interactions (edges) observed during
training, validation, and testing.
Our framework is agnostic to the nature of interactions in
multiagent systems, and hence broadly applicable to com-
petitive and cooperative environments. In particular, we
consider two multiagent environments: (i) a competitive
continuous control environment, RoboSumo (Al-Shedivat
et al., 2018), and (ii) a ParticleWorld environment
of cooperative communication where agents collaborate to
achieve a common goal (Mordatch & Abbeel, 2018). For
evaluation, we show how representations learned by our
framework are effective for downstream tasks that include
clustering of agent policies (unsupervised), classification
such as win or loss outcomes in competitive systems (super-
vised), and policy optimization (reinforcement). In the case
of policy optimization, we show how these representations
can serve as privileged information for better training of
agent policies. In RoboSumo, we train agent policies that
can condition on the opponent's representation and achieve
superior win rates much more quickly as compared to an
equally expressive baseline policy with the same number of
parameters. In ParticleWorld, we train speakers that
can communicate more effectively with a much wider range
of listeners given knowledge of their representations.
Learning Policy Representations in Multiagent Systems
i
2. Preliminaries
In this section, we present the necessary background and
notation relevant to the problem setting of this work.
Markov games. We use the classical framework of Markov
games (Littman, 1994) to represent multiagent systems.
A Markov game extends the general formulation of par-
tially observable Markov decision processes (POMDP) to
the multiagent setting. In a Markov game, we are given
a set of n agents on a state-space S with action spaces
A1,A2,··· ,An and observation spaces O1,O2,··· ,On
respectively. At every time step t, an agent i receives an
i ∈ Ai
observation o(t)
: Oi × Ai → [0, 1].
based on a stochastic policy π(i)
Based on the executed action, the agent receives a reward
r(t)
. The
i
state dynamics are determined by a transition function
T : S ×A1 ×···×An → S. The agent policies are trained
t=1 r(t)
to maximize their own expected reward ¯ri = (cid:80)H
i ∈ Oi and executes an action a(t)
: S × Ai → R and the next observation o(t+1)
i
over a time horizon H.
Extended Markov games. In this work, we are interested
in interactions that involve not all but only a subset of agents.
For this purpose, we generalize Markov games as follows.
First, we augment the action space of each agent with a
NO-OP (i.e., no action). Then, we introduce a problem pa-
rameter, 2 ≤ k ≤ n, with the following semantics. During
every rollout of the Markov game, all but k agents deter-
ministically execute the NO-OP operator while the k agents
execute actions as per the policies defined on the original
observation and action spaces. Accordingly, we assume that
each agent receives rewards only in the interaction episode
it participates in. Informally, the extension allows for multi-
agent systems where all agents do not necessarily have to
participate simultaneously in an interaction. For instance,
this allows to consider one-vs-one multiagent tournaments
where only two players participate in any given match.
To further introduce the notation, consider a multiagent sys-
tem as a generalized Markov game. We denote the set of
agent policies with P = {π(i)}n
i=1, interaction episodes
with E = {EMj}m
j=1 where Mj ⊆ {1, 2,··· , n},Mj =
k is the set of k agents participating in episode EMj . To sim-
plify presentation for the rest of the paper, we assume k = 2
and, consequently, denote the set of interaction episodes
between agents i and j as Eij. A single episode, eij ∈ Eij,
consists of a sequence of observations and actions for the
specified time horizon, H.
Imitation learning. Our approach to learning policy repre-
sentations relies on behavioral cloning (Pomerleau, 1991) --
a type of imitation learning where we train a mapping from
observations to actions in a supervised manner. Although
there exist other imitation learning algorithms (e.g., inverse
reinforcement learning, Abbeel & Ng, 2004), our frame-
work is largely agnostic to the choice of the algorithm, and
we restrict our presentation to behavioral cloning, leaving
other imitation learning paradigms to future work.
3. Learning framework
The dominant paradigm for unsupervised representation
learning is to optimize the parameters of a representation
function that can best explain or generate the observed data.
For instance, the skip-gram objective used for language and
graph data learns representations of words and nodes pre-
dictive of representations of surrounding context (Mikolov
et al., 2013; Grover & Leskovec, 2016). Similarly, autoen-
coding objectives, often used for image data, learn represen-
tations that can reconstruct the input (Bengio et al., 2009).
In this work, we wish to learn a representation function
that maps episode(s) from an agent policy, π(i) ∈ Π to a
real-valued vector embedding where Π is a class of repre-
sentable policies. That is, we optimize for the parameters
θ for a function fθ : E → Rd where E denotes the space of
episodes corresponding to a policy and d is the dimension of
the embedding. Here, we have assumed the agent policies
are black-boxes, i.e., we can only access them based on
interaction episodes with other agents in a Markov game.
Hence, for every agent i, we wish to learn policies using
Ei = ∪jE(i)
ij refers the episode data for inter-
actions between agent i and j, but consisting of only the
observation and action pairs of agent i. For a multiagent sys-
tem, we propose the following auxiliary tasks for learning a
good representation of an agent's policy:
ij . Here, E(i)
1. Generative representations. The representation should
be useful for simulating the agent's policy.
2. Discriminative representations. The representation
should be able to distinguish the agent's policy with
the policies of other agents.
Accordingly, we now propose generative and discriminative
objectives for representation learning in multiagent systems.
3.1. Generative representations via imitation learning
Imitation learning does not require direct access to the re-
ward signal, making it an attractive task for unsupervised
representation learning. Formally, we are interested in learn-
φ : S×A → [0, 1] for an agent i given access
ing a policy π(i)
to observation and action pairs from interaction episode(s)
involving the agent. For behavioral cloning, we maximize
the following (negative) cross-entropy objective:
(cid:105)
(cid:88)
(cid:104)o,a(cid:105)∼e
(cid:104)
Ee∼Ei
log π(i)
φ (ao)
where the expectation is over interaction episodes of agent i
and the optimization is over the parameters φ.
Learning Policy Representations in Multiagent Systems
i=1 -- interaction episodes, λ -- hyperparameter.
Algorithm 1 Learn Policy Embedding Function (fθ)
input {Ei}n
1: Initialize θ and φ
2: for i = 1, 2, . . . , n do
3:
4:
5:
Sample a positive episode pe ← e+ ∼ Ei
Sample a reference episode re ← e∗ ∼ Ei\e+
Compute Im loss ← − (cid:80)
log πφ,θ(ao, e∗)
(cid:104)o,a(cid:105)∼e+
for j = 1, 2, . . . , n do
if j (cid:54)= i then
Sample a negative episode ne ← e− ∼ Ej
Compute Id loss ← dθ(e+, e−, e∗)
Set Loss ← Im loss + λ · Id loss
Update θ and φ to minimize Loss
6:
7:
8:
9:
10:
11:
12:
13:
14: end for
output θ
end if
end for
Learning individual policies for every agent can be compu-
tationally and statistically prohibitive for large-scale multi-
agent systems, especially when the number of interaction
episodes per agent is small. Moreover, it precludes gener-
alization across the behaviors of such agents. On the other
hand, learning a single policy for all agents increases sam-
ple efficiency but comes at the cost of reduced modeling
flexibility in simulating diverse agent behaviors. We offset
this dichotomy by learning a single conditional policy net-
work. To do so, we first specify a representation function,
fθ : E → Rd, with parameters θ, where E represents the
space of episodes. We use this embedding to condition the
policy network. Formally, the policy network is denoted by
πφ,θ : S × A × E → [0, 1] and φ are parameters for the
function mapping the agent observation and embedding to a
distribution over the agent's actions.
The parameters θ and φ for the conditional policy network
are learned jointly by maximizing the following objective:
n(cid:88)
i=1
1
n
Ee1∼Ei,
e2∼Ei\e1
(cid:88)
(cid:104)o,a(cid:105)∼e1
log πφ,θ(ao, e2)
(1)
For every agent, the objective function samples two distinct
episodes e1 and e2. The observation and action pairs from
e2 are used to learn an embedding fθ(e2) that conditions
the policy network trained on observation and action pairs
from e1. The conditional policy network shares statistical
strength through a common set of parameters for the policy
network and the representation function across all agents.
3.2. Discriminative representations via identification
An intuitive requirement for any representation function
learned for a multiagent system is that the embeddings
should reflect characteristics of an agent's behavior that dis-
tinguish it from other agents. To do so in an unsupervised
manner, we propose an objective for agent identification
based on the triplet loss directly in the space of embeddings.
To learn a representation for agent i based on interaction
episodes, we use the representation function fθ to com-
pute three sets of embeddings: (i) a positive embedding
for an episode e+ ∼ Ei involving agent i, (ii) a negative
embedding for an episode e− ∼ Ej involving a random
agent j (cid:54)= i, and (iii) a reference embedding for an episode
e∗ ∼ Ei again involving agent i, but different from e+.
Given these embeddings, we define the triplet loss:
dθ(e+, e−, e∗) =
(1 + exp{(cid:107)re − ne(cid:107)2 − (cid:107)re − pe(cid:107)2})
−2
(2)
where pe = fθ(e+), ne = fθ(e−), re = fθ(e∗). Intuitively,
the loss encourages the positive embedding to be closer
to the reference embedding than the negative embedding,
which makes the embeddings of the same agent tend to
cluster together and be further away from embeddings of
other agents. We note that various other notions of distance
can also be used. The one presented above corresponding
to a squared softmax objective (Hoffer & Ailon, 2015).
3.3. Hybrid generative-discriminative representations
Conditional imitation learning encourages fθ to learn repre-
sentations that can learn and simulate the entire policy of the
agents and agent identification incentivizes representations
that can distinguish between agent policies. Both objectives
are complementary, and we combine Eq. (1) and Eq. (2) to
get the final objective used for representation learning:
(cid:104)o,a(cid:105)∼e+
(cid:88)
(cid:88)
(cid:124)
j(cid:54)=i
(cid:124)
λ
log πφ,θ(ao, e∗)
−
(cid:123)(cid:122)
imitation
(cid:125)
Ee−∼Ej [dθ(e+, e−, e∗)]
(cid:123)(cid:122)
agent identification
(3)
(cid:125)
n(cid:88)
i=1
1
n
Ee+∼Ei,
e∗∼Ei\e+
where λ > 0 is a tunable hyperparameter that controls
the relative weights of the discriminative and generative
terms. The pseudocode for the proposed algorithm is given
in Algorithm 1. In experiments, we parameterize the condi-
tional policy πθ,φ using neural networks and use stochastic
gradient-based methods for optimization.
4. Generalization in MAS
Generalization is well-understood for supervised learning --
models that shows similar train and test performance exhibit
good generalization. To measure the quality of the learned
representations for a multiagent system (MAS), we intro-
duce a graphical formalism for reasoning about agents and
their interactions.
Learning Policy Representations in Multiagent Systems
E
F
G
A
B
C
D
(a) Agent-Interaction Graph
(b) The RoboSumo environment.
(c) The ParticleWorld environment.
Figure 1: An example of a graph used for evaluating generalization in a multiagent system (a). Illustrations for the
environments used in our experiments: competitive (b) and cooperative (c).
4.1. Generalization across agents & interactions
In many scenarios, we are interested in generalization of
the policy representation function fθ across novel agents
and interactions in a multiagent system. For instance, we
would like fθ to output useful embeddings for a downstream
task, even when evaluated with respect to unseen agents and
interactions. This notion of generalization is best understood
using agent-interaction graphs (Grover et al., 2018).
The agent-interaction graph describes interactions between
a set of agent policies P and a set of interaction episodes I
through a graph G = (P, I).1 An example graph is shown
in Figure 1a. The graph represents a multiagent system con-
sisting of interactions between pairs of agents, and we will
especially focus on the interactions involving Alice, Bob,
Charlie, and Davis. The interactions could be competitive
(e.g., a match between two agents) or cooperative (e.g., two
agents communicating for a navigation task).
We learn the representation function fθ on a subset of the
interactions, denoted by the solid black edges in Figure 1a.
At test time, fθ is evaluated on some downstream task of
interest. The agents and interactions observed at test time
can be different from those used for training. In particular,
we consider the following cases:
Weak generalization.2 Here, we are interested in the gen-
eralization performance of the representation function on
an unseen interaction between existing agents, all of which
are observed during training. This corresponds to the red
edge representing the interaction between Alice and Bob in
Figure 1a. From the context of an agent-interaction graph,
the test graph adds only edges to the train graph.
Strong generalization. Generalization can also be evalu-
ated with respect to unseen agents (and their interactions).
This corresponds to the addition of agents Charlie and Davis
in Figure 1a. Akin to a few shot learning setting, we observe
a few of their interactions with existing agents Alice and
1If we have more than two participating agents per interaction
episode, we could represent the interactions using a hypergraph.
2Also referred to as intermediate generalization by Grover et al.
(2018).
Bob (green edges) and generalization is evaluated on unseen
interactions involving Charlie and Davis (blue edges). The
test graph adds both nodes and edges to the train graph.
For brevity, we skip discussion of weaker forms of general-
ization that involves evaluation of the test performance on
unseen episodes of an existing training edge (black edge).
4.2. Generalization across tasks
Since the representation function is learned using an un-
supervised auxiliary objective, we test its generalization
performance by evaluating the usefulness of these embed-
dings for various kinds downstream tasks described below.
Unsupervised. These embeddings can be used for cluster-
ing, visualization, and interpretability of agent policies in
a low-dimensional space. Such semantic associations be-
tween the learned embeddings can be defined for a single
agent wherein we expect representations for the same agent
based on distinct episodes to be embedded close to each
other, or across agents wherein agents with similar policies
will have similar embeddings on average.
Supervised. Deep neural network representations are es-
pecially effective for predictive modeling. In a multiagent
setting, the embeddings serve as useful features for learning
agent properties and interactions, including assignment of
role categories to agents with different skills in a collab-
orative setting, or prediction of win or loss outcomes of
interaction matches between agents in a competitive setting.
Reinforcement. Finally, we can use the learned represen-
tation functions to improve generalization of the policies
learned from a reinforcement signal in competitive and coop-
erative settings. We design policy networks that, in addition
to observations, take embedding vectors of the opposing
agents as inputs. The embeddings are computed from the
past interactions of the opposing agent either with the agent
being trained or with other agents using the representation
function (Figure 2). Such embeddings play the role of privi-
leged information and allow us to train a policy network that
uses this information to learn faster and generalize better to
opponents or cooperators unseen at training time.
00101Speaker 1ListenerNEWStarget landmark110100Speaker 2Learning Policy Representations in Multiagent Systems
et
πA
previous
interactions
Table 1: Intra-inter clustering ratios (IICR) and accuracies
for outcome prediction (Acc) for weak (W) and strong (S)
generalization on RoboSumo.
et−1
et−1
et−1
et−1
πt−1
ψ
Emb-Im
Emb-Id
Emb-Hyb
IICR (W)
0.24
0.25
0.22
IICR (S) Acc (W) Acc(S)
0.60
0.56
0.56
0.23
0.27
0.21
0.71
0.67
0.73
πt
ψ
fθ
Figure 2: Illustration of the proposed model for optimizing a
policy πψ that conditions on an embedding of the opponent
policy πA. At time t, the pre-trained representation func-
tion fθ computes the opponent embedding based on a past
interaction et−1. We optimize πψ to maximize the expected
rewards in its current interactions et with the opponent.
5. Evaluation methodology & results
We evaluate the proposed framework for both compet-
itive and collaborative environments on various down-
stream machine learning tasks. In particular, we use the
RoboSumo and ParticleWorld environments for the
competitive and collaborative scenarios, respectively. We
consider the embedding objectives in Eq. (1), Eq. (2),
and Eq. (3) independently and refer to them as Emb-Im,
Emb-Id, and Emb-Hyb respectively. The hyperparam-
eter λ for Emb-Hyb is chosen by grid search over λ ∈
{0.01, 0.05, 0.1, 0.5} on a held-out set of interactions.
In all our experiments, the representation function fθ is spec-
ified through a multi-layer perceptron (MLP) that takes as
input an episode and outputs an embedding of that episode.
In particular, the MLP takes as input a single (observa-
tion, action) pair to output an intermediate embedding. We
average the intermediate embeddings for all (observation,
action) pairs in an episode to output an episode embedding.
To condition a policy network on the embedding, we sim-
ply concatenate the observation fed as input to the network
with the embedding. Experimental setup and other details
beyond what we state below are deferred to the Appendix.
5.1. The RoboSumo environment
For the competitive environment, we use RoboSumo (Al-
Shedivat et al., 2018) -- a 3D environment with simulated
physics (based on MuJoCo (Todorov et al., 2012)) that al-
lows agents to control multi-legged 3D robots and compete
against each other in continuous-time wrestling games (Fig-
ure 1b). For our analysis, we train a diverse collection of
25 agents, some of which are trained via self-play and oth-
ers are trained in pairs concurrently using Proximal Policy
Optimization (PPO) algorithm (Schulman et al., 2017).
We start with a fully connected agent-interaction graph
(clique) of 25 agents. Every edge in this graph corresponds
to 10 rollout episodes involving the corresponding agents.
The maximum length (or horizon) of any episode is 500
time steps, after which the episode is declared a draw. To
evaluate weak generalization, we sample a connected sub-
graph for training with approximately 60% of the edges
preserved for training, and remaining split equally for vali-
dation and testing. For strong generalization, we preserve
15 agents and their interactions with each other for training,
and similarly, 5 agents and their within-group interactions
each for validation and testing.
5.1.1. EMBEDDING ANALYSIS
To evaluate the robustness of the embeddings, we compute
multiple embeddings for each policy based on different
episodes of interaction at test time. Our evaluation metric
is based on the intra- and inter-cluster Euclidean distances
between embeddings. The intra-cluster distance for an agent
is the average pairwise distance between its embeddings
computed on the set of test interaction episodes involving
the agent. Similarly, the inter-cluster distance is the average
pairwise distance between the embeddings of an agent with
those of other agents. Let Ti = {t(i)
c=1 denote the set of
test interactions involving agent i. We define the intra-inter
cluster ratio (IICR) as:
c }ni
(cid:80)ni
n(cid:80)
1
1
n2
i
a=1
(cid:80)ni
b (cid:107)2
a − t(i)
b=1 (cid:107)t(i)
ni(cid:80)
nj(cid:80)
a − t(j)
b (cid:107)2
(cid:107)t(i)
.
i=1
j(cid:54)=i
ninj
a=1
b=1
(cid:80)n
i=1
n(cid:80)
1
n(n−1)
1
n
IICR =
The intra-inter clustering ratios are reported in Table 1. A
ratio less than 1 suggests that there is signal that identi-
fies the agent, and the signal is stronger for lower ratios.
Even though this task might seem especially suited for the
agent identification objective, we interestingly find that the
Emb-Im attains lower clustering ratios than Emb-Id for
both weak and strong generalization. Emb-Hyb outper-
forms both these methods. We qualitatively visualize the
embeddings learned using Emb-Hyb by projecting them on
the leading principal components, as shown in Figures 3a
and 3b for 10 test interaction episodes of 5 randomly se-
lected agents in the weak and strong generalization settings
respectively.
5.1.2. OUTCOME PREDICTION
We can use these embeddings directly for training a classi-
fier to predict the outcome of an episode (win/loss/draw).
For classification, we use an MLP with 3 hidden layers
Learning Policy Representations in Multiagent Systems
(a) RoboSumo: Weak
(b) RoboSumo: Strong
(c) ParticleWorld: Weak (d) ParticleWorld: Strong
Figure 3: Embeddings learned using Emb-Hyb for 10 test interaction episodes of 5 agents projected on the first three
principal components for RoboSumo and ParticleWorld. Color denotes agent policy.
Figure 4: Average win rates of the newly trained agents against 5 training agent and 5 testing agents. The left two charts
compare baseline with policies that make use of Emb-Im, Emb-Id, and Emb-Hyb (all computed online). The right two
charts compare different embeddings used at evaluation time (all embedding-conditioned policies use Emb-Hyb). At each
iteration, win rates were computed based on 50 1-on-1 games. Each agent was trained 3 times, each time from a different
random initialization. Shaded regions correspond to 95% CI.
of 100 units each and the learning objective minimizes the
cross entropy error. The input to the classifier are the embed-
dings of the two agents involved in the episode. The results
are reported in Table 1. Again, imitation based methods
seem more suited for this task with Emb-Hyb and Emb-Im
outperforming other methods for weak and strong general-
ization respectively.
5.1.3. POLICY OPTIMIZATION
Here we ask whether embeddings can be used to improve
learned policies in a reinforcement learning setting both in
terms of end performance and generalization. To this end,
we select 5 training, 5 validation, and 5 testing opponents
from the pool of 25 pre-trained agents. Next, we train a new
agent with reinforcement learning to compete against the
selected 5 training opponents; the agent is trained concur-
rently against all 5 opponents using a distributed version of
PPO algorithm, as described in Al-Shedivat et al. (2018).
Throughout training, we evaluate new agents on the 5 testing
opponents and record the average win and draw rates.
Using this setup, we compare a baseline agent with
MLP-based policy with an agent whose policy takes 100-
dimensional embeddings of the opponents as additional in-
puts at each time step and uses that information to condition
its behavior on the opponent's representation. The embed-
dings for each opponent are either computed online, i.e.,
based on an interaction episode rolled out during training at
a previous time step (Figure 2), or offline, i.e., pre-computed
before training the new agent using only interactions be-
tween the pre-trained opponents.
Figure 4 shows the average win rates against the set of train-
ing and testing opponents for the baseline and our agents
that use different types of embeddings. While every new
agent is able to achieve almost 100% win rate against the
training opponents, we see that the agents that condition
their policies on the opponent's embeddings perform better
on the held-out set of opponents, i.e., generalize better, with
the best performance achieved with Emb-Hyb. We also
note that embeddings computed offline turn out to lead to
better performance than if computed online3. As an ablation
test, we also evaluate our agents when they are provided
an incorrect embedding (either all zeros, Emb-zero, or
an embedding selected for a different random opponent,
Emb-rand) and observe that such embeddings lead to a
degradation in performance4.
3Perhaps, this is due to differences in the interactions of the
opponents between themselves and with the new agent that the
embedding network was not able to capture entirely.
4Performance decrease is most significant for Emb-zero,
which is an out-of-distribution all-zeros vector.
first eigenvectorsecond eigenvectorthird eigenvectorfirst eigenvectorsecond eigenvectorthird eigenvectorfirst eigenvectorsecond eigenvectorthird eigenvectorfirst eigenvectorsecond eigenvectorthird eigenvector010002000Iteration0.250.500.751.00WinrateTrainPPOPPO+Emb-ImPPO+Emb-IdPPO+Emb-Hyb0100020000.20.40.60.8Test010002000Iteration0.250.500.751.00WinrateTrainPPOPPO+Emb-onlinePPO+Emb-offlinePPO+Emb-zeroPPO+Emb-rand0100020000.250.500.751.00TestLearning Policy Representations in Multiagent Systems
Figure 5: Win, loss, and draw rates plotted for the first agent in each pair. Each pair of agents was evaluated after each
training iteration on 50 1-on-1 games; curves are based on 5 evaluation runs. Shaded regions correspond to 95% CI.
Table 2: Intra-inter clustering ratios (IICR) for weak (W)
and strong (S) generalization on ParticleWorld. Lower
is better.
IICR (W)
IICR (S)
Figure 6: Win rates for agents specified in each row at
computed at iteration 1000.
Finally, to evaluate strong generalization in the RL set-
ting, we pit the newly trained baseline and agents with
embedding-conditional policies against each other. Since
the embedding network has never seen the new agents, it
must exhibit strong generalization to be useful in such set-
ting. The results are give in Figures 5 and 6. Even though
the margin is not very large, the agents that use Emb-Hyb
perform the best on average.
5.2. The ParticleWorld environment
For the collaborative setting, we evaluate the framework on
the ParticleWorld environment for cooperative com-
munication (Mordatch & Abbeel, 2018; Lowe et al., 2017).
The environment consists of a continuous 2D grid with 3
landmarks and two kinds of agents collaborating to navigate
to a common landmark goal (Figure 1c). At the beginning
of every episode, the speaker agent is shown the RGB color
of a single target landmark on the grid. The speaker then
communicates a fixed length binary message to the listener
agent. Based on the received messages, the listener agent
the moves in a particular direction. The final reward, shared
across the speaker and listener agents, is the distance of the
listener to the target landmark after a fixed time horizon.
The agent-interaction graph for this environment is bipar-
tite with only cross edges between speaker and listener
agents. Every interaction edge in this graph corresponds
to 1000 rollout episodes where the maximum length of any
episode is 25 steps. We pretrain 28 MLP parameterized
speaker and listener agent policies. Every speaker learns
through communication with only two different listeners
Emb-Im
Emb-Id
Emb-Hyb
0.58
0.50
0.54
0.86
0.82
0.85
Table 3: Average train and test rewards for speaker policies
on ParticleWorld.
Train
Test
−11.66 −18.99
MADDPG
−11.68 −17.75
MADDPG + Emb-Im
−11.68 −17.68
MADDPG + Emb-Id
MADDPG + Emb-Hyb −11.77 −17.20
and vice-versa, giving an extremely sparse agent-interaction
graph. We explicitly encoded diversity in these speakers
and listener agents by masking bits in the communication
channel. In particular, we masked 1 or 2 randomly selected
bits for every speaker agent in the graph to give a total of
(cid:1) = 28 distinct speaker agents. Depending on the
(cid:0)7
(cid:1) +(cid:0)7
2
1
neighboring speaker agents in the agent-interaction graph,
the listener agents also show diversity in the learned policies.
The policies are learned using multiagent deep deterministic
policy gradients (MADDPG, Lowe et al., 2017).
In this environment, the speakers and listeners are tightly
coupled. Hence we vary the setup used previously in the
competitive scenario. We wish to learn embeddings of lis-
teners based on their interactions with speakers. Since the
agent-interaction graph is bipartite, we use the embeddings
of listener agents to condition a shared policy network for
the respective speaker agents.
5.2.1. EMBEDDING ANALYSIS
For the weak generalization setting, we remove an outgoing
edge from every listener agent in the original graph to obtain
the training graph. In the case of strong generalization, we
set aside 7 listener agents (and their outgoing edges) each
for validation and testing while the representation function
is learned on the remaining 14 listener agents and their
interactions. The intra-inter clustering ratios are shown
01000Iteration0.00.51.0RateEmb-Hybvs.PPOWinLossDraw01000Emb-Hybvs.Emb-Im01000Emb-Hybvs.Emb-Id01000Emb-Imvs.PPO01000Emb-Imvs.Emb-Id01000Emb-Idvs.PPO1234PPO+Emb-Hyb-4PPO+Emb-Id-3PPO+Emb-Im-2PPO-10.670.610.570.480.620.440.500.420.550.490.550.360.510.440.360.32Learning Policy Representations in Multiagent Systems
in Table 2, and the projections of the embeddings learned
using Emb-Hyb are visualized in Figure 3c and Figure 3d
for weak and strong generalization respectively. In spite of
the high degree of sparsity in the training graph, the intra-
inter clustering ratio for the test interaction embeddings is
less than unity suggesting an agent-specific signal. Emb-id
works particularly well in this environment, achieving best
results for both weak and strong generalization.
5.2.2. POLICY OPTIMIZATION
Here, we are interested in learning speaker agents that can
communicate more effectively with a much wider range of
listeners given knowledge of their embeddings. Referring
back to Figure 2, we learn a policy πψ for a speaker agent
that conditions on the representation function fθ for the
listener agents. For cooperative communication, we con-
sider interactions with 14 pre-trained listener agents split
as 6 training, 4 validation, and 4 test agents.5 Similar to
the competitive setting, we compare performance against
a baseline speaker agent that does not have access to any
privilege information about the listeners. We summarize
the results for the best validated models during training and
100 interaction episodes per test listener agent across 5 ini-
tializations in Table 3. From the results, we observe that
online embedding based methods can generalize better than
the baseline methods. The baseline MADDPG achieves the
lowest training error, but fails to generalize well enough and
incurs a low average reward for the test listener agents.
6. Discussion & Related Work
Agent modeling is a well-studied topic within multiagent
systems. See Albrecht & Stone (2017) for an excellent
recent survey on this subject. The vast majority of literature
concerns with learning models for a specific predictive task.
Predictive tasks are typically defined over actions, goals,
and beliefs of other agents (Stone & Veloso, 2000).
In
competitive domains such as Poker and Go, such tasks are
often integrated with domain-specific heuristics to model
opponents and learn superior policies (Rubin & Watson,
2011; Mnih et al., 2015). Similarly, intelligent tutoring
systems take into account pedagogical features of students
and teachers to accelerate learning of desired behaviors in a
collaborative environment (McCalla et al., 2000).
In this work, we proposed an approach for modeling agent
behavior in multiagent systems through unsupervised rep-
resentational learning of agent policies. Since we sidestep
any domain specific assumptions and learn in an unsuper-
vised manner, our framework learns representations that are
5None of the methods considered were able to learn a non-
trivial speaker agent when trained simultaneously with all 28 lis-
tener agents. Hence, we simplified the problem by considering the
14 listener agents that attained the best rewards during pretraining.
useful for several downstream tasks. This extends the use of
deep neural networks in multiagent systems to applications
beyond traditional reinforcement learning and predictive
modeling (Mnih et al., 2015; Hoshen, 2017).
Both the generative and discriminative components of our
framework have been explored independently in prior work.
Imitation learning has been extensively studied in the single-
agent setting and recent work by Le et al. (2017) proposes an
algorithm for imitation in a coordinated multiagent system.
Wang et al. (2017) proposed an imitation learning algorithm
for learning robust controllers with few expert demonstra-
tions in a single-agent setting that conditions the policy
network on an inference network, similar to the encoder
in our framework. In another recent work, Li et al. (2017)
propose an algorithm for learning interpretable representa-
tions using generative adversarial imitation learning. Agent
identification which represents the discriminative term in
the learning objective is inspired from triplet losses and
Siamese networks that are used for learning representations
of data using distance comparisons (Hoffer & Ailon, 2015).
A key contribution of this work is a principled methodology
for evaluating generalization of representations in multia-
gent systems based on the graphs of the agent interactions.
Graphs are a fundamental abstraction for modeling rela-
tional data, such as the interactions arising in multiagent
systems (Zhou et al., 2016a;b; Chen et al., 2017; Battaglia
et al., 2016; Hoshen, 2017) and concurrent work proposes
to learn such graphs directly from data (Kipf et al., 2018).
7. Conclusion & Future Work
In this work, we presented a framework for learning rep-
resentations of agent policies in multiagent systems. The
agent policies are accessed using a few interaction episodes
with other agents. Our learning objective is based on a novel
combination of a generative component based on imitation
learning and a discriminative component for distinguish-
ing the embeddings of different agent policies. Our overall
framework is unsupervised, sample-efficient, and domain-
agnostic, and hence can be readily extended to many en-
vironments and downstream tasks. Most importantly, we
showed the role of these embeddings as privileged infor-
mation for learning more adaptive agent policies in both
collaborative and competitive settings.
In the future, we would like to explore multiagent systems
with more than two agents participating in the interactions.
Semantic interpolation of policies directly in the embedded
space in order to obtain a policy with desired behaviors
quickly is another promising direction. Finally, it would be
interesting to extend and evaluate the proposed framework to
learn representations for history dependent policies such as
those parameterized by long short-term memory networks.
Learning Policy Representations in Multiagent Systems
Acknowledgements
We are thankful to Lisa Lee, Daniel Levy, Jiaming Song, and
everyone at OpenAI for helpful comments and discussion.
AG is supported by a Microsoft Research PhD Fellowship.
MA is partially supported by NIH R01GM114311. JKG
is partially supported by the Army Research Laboratory
through the Army High Performance Computing Research
Center under Cooperative Agreement W911NF-07-2-0027.
References
Abbeel, P. and Ng, A. Y. Apprenticeship learning via inverse
reinforcement learning. In International Conference on
Machine Learning, 2004.
Al-Shedivat, M., Bansal, T., Burda, Y., Sutskever, I., Mor-
datch, I., and Abbeel, P. Continuous adaptation via meta-
learning in nonstationary and competitive environments.
In International Conference on Learning Representations,
2018.
Albrecht, S. V. and Stone, P. Autonomous agents modeling
other agents: A comprehensive survey and open problems.
arXiv preprint arXiv: 1709.08071, 2017.
Battaglia, P., Pascanu, R., Lai, M., Rezende, D. J., et al.
Interaction networks for learning about objects, relations
and physics. In Advances in Neural Information Process-
ing Systems, 2016.
Bengio, Y. et al. Learning deep architectures for ai. Foun-
dations and trends R(cid:13) in Machine Learning, 2(1):1 -- 127,
2009.
Chen, M., Zhou, Z., and Tomlin, C. J. Multiplayer reach-
avoid games via pairwise outcomes. IEEE Transactions
on Automatic Control, 62(3):1451 -- 1457, 2017.
Ferber, J. Multi-agent systems: An introduction to dis-
tributed artificial intelligence, volume 1. Addison-Wesley
Reading, 1999.
Hoshen, Y. VAIN: Attentional multi-agent predictive mod-
In Advances in Neural Information Processing
eling.
Systems, 2017.
Kingma, D. P. and Ba, J. Adam: A method for stochastic
optimization. In International Conference on Learning
Representations, 2015.
Kipf, T., Fetaya, E., Wang, K.-C., Welling, M., and Zemel,
R. Neural relational inference for interacting systems. In
International Conference on Machine Learning, 2018.
Le, H. M., Yue, Y., and Carr, P. Coordinated multi-agent im-
itation learning. In International Conference on Machine
Learning, 2017.
Li, Y., Song, J., and Ermon, S. Inferring the latent struc-
ture of human decision-making from raw visual inputs.
In Advances in Neural Information Processing Systems,
2017.
Littman, M. L. Markov games as a framework for multi-
agent reinforcement learning. In International Confer-
ence on Machine Learning, 1994.
Lowe, R., Wu, Y., Tamar, A., Harb, J., Abbeel, P., and Mor-
datch, I. Multi-agent actor-critic for mixed cooperative-
competitive environments. In Advances in Neural Infor-
mation Processing Systems, 2017.
McCalla, G., Vassileva, J., Greer, J., and Bull, S. Active
In Intelligent tutoring systems, pp.
learner modelling.
53 -- 62. Springer, 2000.
Mikolov, T., Sutskever, I., Chen, K., Corrado, G. S., and
Dean, J. Distributed representations of words and phrases
and their compositionality. In Advances in Neural Infor-
mation Processing Systems, 2013.
Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness,
J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidje-
land, A. K., Ostrovski, G., et al. Human-level control
through deep reinforcement learning. Nature, 518(7540):
529 -- 533, 2015.
Grover, A. and Leskovec, J. node2vec: Scalable feature
learning for networks. In SIGKDD Conference on Knowl-
edge Discovery and Data Mining, 2016.
Mordatch, I. and Abbeel, P. Emergence of grounded com-
positional language in multi-agent populations. In AAAI
Conference on Artificial Intelligence, 2018.
Grover, A., Al-Shedivat, M., Gupta, J. K., Burda, Y., and
Edwards, H. Evaluating generalization in multiagent
systems using agent-interaction graphs. In International
Conference on Autonomous Agents and Multiagent Sys-
tems, 2018.
Pomerleau, D. A. Efficient training of artificial neural net-
works for autonomous navigation. Neural Computation,
3(1):88 -- 97, 1991.
Rubin, J. and Watson, I. Computer poker: A review. Artifi-
cial intelligence, 175(5-6):958 -- 987, 2011.
Hoffer, E. and Ailon, N. Deep metric learning using triplet
network. In International Workshop on Similarity-Based
Pattern Recognition, pp. 84 -- 92. Springer, 2015.
Schulman, J., Wolski, F., Dhariwal, P., Radford, A., and
Klimov, O. Proximal policy optimization algorithms.
arXiv preprint arXiv:1707.06347, 2017.
Learning Policy Representations in Multiagent Systems
Stone, P. and Veloso, M. Multiagent systems: A survey from
a machine learning perspective. Autonomous Robots, 8
(3):345 -- 383, 2000.
Todorov, E., Erez, T., and Tassa, Y. MuJoCo: A physics
engine for model-based control. In International Confer-
ence on Intelligent Robots and Systems, 2012.
Wang, Z., Merel, J., Reed, S., Wayne, G., de Freitas, N.,
and Heess, N. Robust imitation of diverse behaviors.
In Advances in Neural Information Processing Systems,
2017.
Wooldridge, M. An introduction to multiagent systems. John
Wiley & Sons, 2009.
Zhou, Z., Bambos, N., and Glynn, P. Dynamics on linear in-
fluence network games under stochastic environments. In
International Conference on Decision and Game Theory
for Security, 2016a.
Zhou, Z., Yolken, B., Miura-Ko, R. A., and Bambos, N. A
game-theoretical formulation of influence networks. In
American Control Conference, 2016b.
Learning Policy Representations in Multiagent Systems
A. Experimental Setup
RoboSumo Environment
To limit the scope of our study, we restrict agent morpholo-
gies to only 4-leg robots. During the game, observations of
each agent were represented by a 120-dimensional vector
comprised of positions and velocities of its own body and
positions of the opponent's body; agent's actions were 8-
dimensional vectors that represented torques applied to the
corresponding joints.
NETWORK ARCHITECTURE
Agent policies are parameterized as multi-layer perceptrons
(MLPs) with 2 hidden layers of 90 units each. For the
embedding network, we used another MLP network with 2
hidden layers of 100 units each to give an embedding of size
100. For the conditioned policy network we also reduce the
hidden layer size to 64 units each.
POLICY OPTIMIZATION
For learning the population of agents, we use the distributed
version of PPO algorithm as described in (Al-Shedivat et al.,
2018) with 2 × 10−3 learning rate, = 0.2, 16,000 time
steps per update with 6 epochs 4,000 time steps per batch.
TRAINING
For our analysis, we train a diverse collection of 25 agents,
some of which are trained via self-play and others are trained
in pairs concurrently, forming a clique agent-interaction
graph.
9
8
10
7
1
6
2
5
3
4
ParticleWorld Environment
The overall continuous observation and discrete action space
for the speaker agents are 3 and 7 dimensions respectively.
For the listener agents, the observation and action spaces
are 15 and 5 dimensions respectively.
NETWORK ARCHITECTURE
Agent policies and shared critic (i.e., a value function) are
parameterized as multi-layer perceptrons (MLPs) with 2
hidden layers of 64 units each. The observation space for
the speaker is small (3 dimensions), and a small embedding
of size 5 for the listener policy gives good performance.
For the embedding network, we again used an MLP with 2
hidden layers of 100 units each.
POLICY OPTIMIZATION
For learning the initial population of listener and agent poli-
cies, we use multiagent deep deterministic policy gradi-
ents (MADDPG) as the base algorithm (Lowe et al., 2017).
Adam optimizer (Kingma & Ba, 2015) with a learning rate
of 4 × 10−3 was used for optimization. Replay buffer size
was set to 106 timesteps.
TRAINING
We first train 28 speaker-listener pairs using the MADDPG
algorithm. From this collection of 28 speakers, we train
another set of 28 listeners, each trained to work with a
speaker pair, forming a bipartite agent-interaction graph.
We choose the best 14 listeners for later experiments.
Speaker
Listener
1
2
3
4
5
1
2
3
4
5
Figure 7: An example clique agent interaction graph with
10 agents.
Figure 8: An example bipartite agent interaction graph with
5 speakers and 5 listeners.
|
1610.08804 | 1 | 1610 | 2016-10-27T14:35:22 | The Composition and Formation of Effective Teams. Computer Science meets Psychology | [
"cs.MA"
] | Nowadays the composition and formation of effective teams is highly important for both companies to assure their competitiveness and for a wide range of emerging applications exploiting multiagent collaboration (e.g. crowdsourcing, human-agent collaborations). The aim of this article is to provide an integrative perspective on team composition, team formation and their relationship with team performance. Thus, we review the contributions in both the computer science literature and the organisational psychology literature dealing with these topics. Our purpose is twofold. First, we aim at identifying the strengths and weaknesses of the contributions made by these two diverse bodies of research. Second, we pursue to identify cross-fertilisation opportunities that help both disciplines benefit from one another. Given the volume of existing literature, our review is not intended to be exhaustive. Instead, we have preferred to focus on the most significant contributions in both fields together with recent contributions that break new ground to spur innovative research. | cs.MA | cs | The Composition and Formation of Effective Teams. Computer
Science meets Psychology
Ewa Andrejczuk1
V´ıctor Mar´ın-Puchades2
,
3, Rita Berger2, Juan A. Rodriguez-Aguilar1, Carles Sierra1 and
6
1
0
2
t
c
O
7
2
]
A
M
.
s
c
[
1
v
4
0
8
8
0
.
0
1
6
1
:
v
i
X
r
a
1IIIA-CSIC, Campus UAB, 08193 Bellaterra, Catalonia, Spain
E-mail: {ewa,jar,sierra}@iiia.csic.es,
2University of Barcelona, Barcelona, Spain
E-mail: [email protected], [email protected]
3Change Management Tool S.L., Barcelona, Spain
Abstract
Nowadays the composition and formation of effective teams is highly important for both
companies to assure their competitiveness and for a wide range of emerging applications exploiting
multiagent collaboration (e.g. crowdsourcing, human-agent collaborations). The aim of this
article is to provide an integrative perspective on team composition, team formation and their
relationship with team performance. Thus, we review the contributions in both the computer
science literature and the organisational psychology literature dealing with these topics. Our
purpose is twofold. First, we aim at identifying the strengths and weaknesses of the contributions
made by these two diverse bodies of research. Second, we pursue to identify cross-fertilisation
opportunities that help both disciplines benefit from one another. Given the volume of existing
literature, our review is not intended to be exhaustive. Instead, we have preferred to focus on the
most significant contributions in both fields together with recent contributions that break new
ground to spur innovative research.
1 Introduction
The latter part of the 20th and the beginning of the 21st centuries have witnessed a significant
transformation from work organized around individual jobs to team-based work structures
together with a focus on organisational efficiency (Kozlowski and Bell, 2013). This is due to the
increasing complexity of tasks, which in many cases cannot be performed by single individuals
(Ramezan, 2011). Additionally, changes in technology facilitate workers in distinct locations to
communicate and collaborate at low or no cost. On that account, team composition and formation
research is of interest to many fields of science, primarily to organisational psychology. Moreover, it
has also substantially pervaded the field of computer science, mainly within the area of multiagent
systems (MAS). Indeed, research in MAS has considered a variety of application domains (e.g.
Unmanned Aerial Vehicle (UAV) operations (Haque et al., 2013), teamwork in social networks
(Lappas et al., 2009) or RoboCup rescue teams (Ramchurn et al., 2010)) wherein agents face the
challenge of performing tasks that are either too complex for one single agent or limited in time,
thus requiring several agents to collaborate.
Nevertheless, research on team composition and team formation in computer science (CS) and
organisational psychology (OP) has evolved separately. On the one hand, MAS literature has
typically disregarded significant OP findings, with the exception of several recent, preliminary
attempts (such as Farhangian et al. (2015b), Hanna and Richards (2015), Andrejczuk et al.
2
ewa andrejczuk et al.
(2016)). Thus, this body of research has focused on algorithms that help automate team
formation and composition. On the other hand, the OP literature has mainly focused on
empirically investigating the factors that influence team performance to develop heuristics that
help organisations handcraft their teams. OP has disregarded the algorithmic results developed by
computer scientists to automate team composition and formation. Despite the common research
interests shared by MAS and OP, to the best of our knowledge there has been no effort in the
literature to bridge the knowledge produced by both research disciplines.
Against this background, the aim of this article is to survey both disciplines, to analyse and
compare the strengths and weaknesses of their contributions, and to identify research gaps and
opportunities by bringing together the knowledge of the two research strands on team composition
and formation. Our analysis also pursues to identify cross-fertilisation opportunities that help
both disciplines benefit from one another.
In order to structure our analysis, we have identified several dimensions that help us dissect
the contributions from both research fields:
1. WHO is concerned? The properties of the agents involved.
2. WHAT is the problem? The features of the task to complete by a team.
3. WHY do we do it? The objective function to optimise when composing/forming a team.
4. HOW do we do it? The organisation and/or coordination structure adopted by the team in
charge of performing a particular task.
5. WHEN do we do it? The dynamics of the stream of tasks to be completed by agent teams.
6. WHERE do we do it? The context wherein team composition/formation occurs.
Our analysis of the literature indicates that Computer Science (CS) and Organisational
Psychology (OP) exhibit some similarities. Indeed, one of the crucial findings in both OP and
CS is that team members have to be heterogeneous to maximize team performance. When
modeling agents, CS and OP agree on considering two main approaches: either there is complete
information about the properties of each agent; or agents are capable of learning about their
teammates through repeated interactions. Regarding tasks, both OP and CS research largely
focus on finding team members whose properties make them capable of performing a given task
based on its requirements. In other words, they are both concerned with matching agents (or
whole teams) with tasks.
However, there are important differences between the contributions made by OP and CS that
stem from the fact that OP does consider the whole complexity of: humans as team members,
tasks, the context where teams perform tasks (understood as the internal and external factors
influencing teamwork), and the dynamics of the actual-world scenarios where tasks appear to be
serviced. Thus, OP assumes that human capabilities are necessarily dynamic (evolve along time)
so that teams can successfully perform tasks in dynamic real-world scenarios and in a variety
of contexts. Furthermore, OP observes that the quality of human resources (e.g. motivation,
satisfaction, commitment), the ability of individuals to learn new capabilities, and the context
constraining team performance significantly influence team performance. Finally, OP research
also focused on identifying correlations between task types and team types to compose the best
team depending on the type of each particular task. All these findings contributed by OP research
offer interesting opportunities for cross-fertilisation.
The rest of the paper is organised as follows. Section 2 introduces some fundamental
terminology to make clear what we mean by team composition, team formation and teamwork.
Thereafter, the paper is organized around two main sections. Section 3 reviews the MAS
contributions to team composition and team formation. Next, section 4 surveys the contributions
in the organisational psychology literature. Rangapuram2015Finally, section 5 identifies the main
similarities and differences between the two bodies of research. Furthermore, it also discusses
cross-fertilisation opportunities between both fields that may spur future research.
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
3
2 Background
We introduce the fundamental terminology used in this survey. We refer to:
1. Team Composition as the process of deciding which agents will be part of a team,
2. Team Formation as the process of learning by agents to work together in a team and through
this learning decide the roles and internal organisation of a team,
3. Teamwork as the process of performing a task by a composed and formed team.
While there is a common understanding of teamwork within both OP and CS, the scientists
do not agree on the notion of team formation. In computer science it is mostly understood as
the process of deciding which agents will be a part of a team (here called team composition).
Our definition of team formation is in line with the organisational psychology literature
(Kozlowski and Bell, 2013, p.16).
Another discrepancy between the computer science and the organisational psychology liter-
ature is the notion of skill and competence. Typically in computer science all kinds of agents'
competences are called skills, while in OP the definition is more complex. In OP a prominent
conceptualization of competence was given by Roe (Roe, 2002, p.195). He defines competence as
"a learned ability to adequately perform a task, duty or role". Following his definition competences
"integrate knowledge, skills, personal values, and attitudes and are build on knowledge and skills
and are acquired through work experience and learning by doing" (Bartram and Roe, 2005).
Hence, competences include abilities and behaviours, as well as knowledge that is fundamental
to the use of a skill. An example may consist of a programming task. In order to effectively write
a script one needs good logical and analytical competences as well as the skill to write a program
in a specific language. Hence, Java is a skill. Although, underlying the ability to use that skill
effectively is a competence.
3 Team composition and formation from a computer science perspective
Team composition and formation are critical issues for co-operative multiagent systems. In this
section we survey the most recent and representative approaches in the MAS literature to the
team composition and formation problems along the dimensions identified in the introduction
above.
3.1 WHO is concerned?
The question behind team composition and formation is how to create a multiagent system as a
group of heterogeneous agents (such as humans, robots, software agents or even animals) and how
to organize their activities. Team members must observe the environment and interact with one
another in order to perform tasks or solve problems that are beyond their individual capabilities.
The algorithms to create these teams take inspiration from human teamwork. We observe people
working together on daily activities as well as on research and business projects. For instance,
there are sport teams (e.g. football, basketball), police squads, search and rescue teams formed
by dogs and humans, and we start to witness human-robot cooperation in houses, hospitals, or
even in space missions (Hoffman and Breazeal, 2004).
In general, MAS research focuses on the interaction among intelligent agents. In the team
formation literature, the focus is on the interaction of cooperative and heterogeneous agents.
That is, agents who share a common goal, and have different individual properties. Therefore,
in this section, we would like to account for the different ways previous research has dealt with
these questions. We will classify individual properties according to two dimensions:
1. Capacity: individual and social capabilities of agents; and
2. Personality: individual behaviour models.
4
ewa andrejczuk et al.
3.1.1 Capacity: individual and social capabilities of agents
In many domains, a capability is defined as a particular skill required to perform an action. The
capacity dimension has been exploited by numerous previous works, like Robust Team Formation
(Crawford et al., 2016; Okimoto et al., 2015) or Online Team Formation (Anagnostopoulos et al.,
2012). In these works, agents are assumed to have multiple binary skills (i.e., the agent either has a
required skill or not). This is a simplistic way to model an agent's capabilities since it ignores any
skill degree. In real life, capabilities are not binary since every individual (e.g. human or robot)
shows different action performance. This is why some works propose a more realistic approach by
defining graded agent capabilities, for instance by defining skill levels (Chalkiadakis and Boutilier,
2012).
On a different vein, Rangapuram et al. (2015) builds a weighted, undirected graph where the
weight between each pair of agents reflects their degree of compatibility to jointly solve tasks.
These weights are updated along multiple encounters between agents. In a somehow related
vein, Peleteiro et al. (2015) try to capture the quality of the solutions of team tasks via a model
that besides using skills and compatibility between agents (called the strength of collaboration
synergies within coalitions), calculates the reputation of teams (coalitions) as a whole and of
single agents. These reputation values are used by the team composition process.
Typically, the capabilities of agents are assumed to be known, though there exist models
that consider that an agent can learn the capability levels of other agents. For instance,
Liemhetcharat and Veloso (2014) had the insight that repeated interactions allow to discover
the capabilities of other agents. They call "synergy" to the degree of performance of a team.
Agents learn a model of synergy via repeated interactions. Such synergy values are then used by
individual agents to learn the capabilities of others, and hence to subsequently compose teams
with improved performance. However, in open environments (that is, when new agents and tasks
are dynamically introduced), agents need more sophisticated procedures to decide which team to
join. For instance, Chen et al. (2015) propose an ad-hoc team formation framework that considers
learning other agents' capabilities in the context of unknown tasks. In order to solve a new
task, agents would prefer to team up with unknown agents instead of with agents whose known
capabilities do not adjust to the task. They observe that learning the capabilities of others in the
context of agent and task openness improves team composition and task resolution.
3.1.2 Personality: Individual behaviour models
Personality is key to understand people's behaviour, cognition and emotion. The use of personality
models in agents helps to create more realistic complex scenarios. Indeed, autonomy is related to
how individuals behave and what makes them behave differently, even when facing the very same
situation. Personality provides a mechanism for behaviour selection that is independent of social
background (such as beliefs or morality). Very recently some MAS contributions have started
to consider the notion of personality, i.e. individual behaviour model, to compose heterogeneous
teams. For instance, Hanna and Richards (2015) study the influence of two agent personality
traits: extraversion and agreeableness, both expressed as verbal and non-verbal communication
skills. They construct pairs of human users and Intelligent Virtual Agents (IVAs) and analyse
how the personality traits influence the development and maintenance of a Shared Mental Model
(SMM). The results confirm the importance of providing IVAs with these personality traits to
succeed in jointly solving tasks. On a different vein, Andrejczuk et al. (2016) use personality traits
to partition a group of humans into psychologically-balanced and gender-balanced heterogeneous
teams with the purpose of increasing the overall performance of the resulting teams.
Marcolino et al. (Marcolino et al., 2013; Nagarajan et al., 2015; Marcolino et al., 2016) propose
a new approach for action selection. A task is a sequence of actions to be decided at execution
time. To choose which action to execute next, every heterogeneous agent within a team votes for
its preferred candidate action. Agents vote according to a probability distribution over actions
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
5
that varies for each agent. This can be understood as a way of modeling an agent's personality,
motivations and beliefs (causing him to behave in a certain way).
In a series of papers, Farhangian et al. (2015b,a) use the Myers-Briggs Type Indicator (MBTI)
Myers Briggs et al. scheme to model different agent personality types. Farhangian et al. (2015a)
is the only previous work to our knowledge that uses both individuals' skills and personality types
(measured by MBTI and Belbin (Belbin, 1993) personality tests) to compose teams. These two
dimensions are used to simulate human team composition in a business environment.
Another aspect covered by the existing literature is the individual agent knowledge about
the other team members' personalities, that is, about their behaviour models. These works go
beyond many "ad-hoc" team composition systems where information details about the behaviour
of individual agents is absent. Barrett et al. (2013) focus on how a new member in a team behaves
in order to cooperate well with the other team members whose behaviors are unknown. Each agent
is endowed with a learning mechanism for building models of the behaviours of many distinct types
of other agents via repeated interactions. A similar setting is presented by Agmon et al. (2014),
though they consider that there are only two types of agents: a best response agent (choosing
his action based on the current state of the world), and an ad-hoc agent (has a better awareness
of the teams possible actions and the resulting joint utility). There is no a-priori model, hence,
similarly to Barrett et al. (2013), an ad-hoc agent needs to decide his behaviour by observing his
peers.
In summary, team composition and formation research has focused so far on
Analysis.
cooperative, heterogeneous agents that have a set of properties. These properties can be
categorized into two groups: capacity and personality. To our knowledge, besides Farhangian et al.
(2015a), there has been no further attempts to combine capabilities and personality for team
composition and formation in the area of MAS. Besides that, we observe that the capabilities of
agents are always static, but the behaviour model may change with agents' interactions. While
the capabilities of humans change over time, the MAS literature typically does not consider
dynamic capabilities for software agents. Finally, when modeling agents' properties, many existing
approaches typically assume extensive a-priori information about teammates. This is a strong
limitation for real-life settings. Notice that in many companies there is no central and extensive
knowledge about all employees' capabilities.
3.2 WHAT is the problem? The notion of task
In its most general sense, a task is a course of action to achieve a goal. The execution of a
task is then usually equated to the execution of an action plan. Action plans can be rather
complex as they may take into account concurrency of actions, time constraints, action order,
or environment uncertainty. However, in the team formation literature it is often the case that
simplifying assumptions are made and tasks are assumed to be solved by simple action plans. For
instance, an action plan can be seen as a set of actions, or even as a set of competences. In this
latter case the idea behind is that the task can be successfully solved by a team of individuals
with expertise in a number of different fields. In this section, we review which concepts of task
have been proposed in team formation and team composition. We identify two main approaches:
•
Individual-based, i.e. capacity or personality (see section 3.1);
• Plan-based, e.g. the set of actions or subtasks.
Next we discuss each approach in detail.
Individual-based approaches
3.2.1
Sometimes teams work less effectively than initially expected due to several reasons: a bad balance
of their capacities, bad personal relations, or difficult social situations. Hence, in order to make
6
ewa andrejczuk et al.
sure a task is performed the most effectively, the large body of literature defines the action plan
of the task as a set of requirements for agent individual characteristics. It is assumed that the
task can be fulfilled if the task requirements are a subset of the capabilities of team members. We
categorise existing work on team composition with the purpose to solve a task into two categories
of individual properties: capacity and personality.
Capacity. The capabilities of team members are crucial while performing a task. For instance,
it is obvious that in order to develop an online Java application, the collective team knowledge
has to include Java, Java EE, front-end tools, and database and server knowledge. In the MAS
literature (as discussed in Subsection 3.1.1), the majority of research work expresses capabilities
as binary (they are present or they are not) (Anagnostopoulos et al., 2012; Chen et al., 2015;
Crawford et al., 2016; Okimoto et al., 2015). The main shortcoming of the binary approach is
the restrictive assumption that if an agent has a capability, his expertise level is sufficient to
perform a given task, which implies that the quality of the task performed is not relevant.
In many cases, the definition of a task is indirectly connected to the agents' capabilities.
Peleteiro et al. (2015) propose a model where a task is defined as a tuple that contains the
specification of the task (i.e. its subtasks) and the deadline by which the task has to be completed.
Each subtask is then matched with one capability. A contract net algorithm is used to compose
a team of agents that covers all the required capabilities while maximizing the reputation of
the team, thus leading to the best expected performance. In Chalkiadakis and Boutilier (2012),
a project is defined as a set of tasks, where each task has a complexity level (e.g. moderate
or ambitious). Agents' capabilities are graded (e.g. a good carpenter). Tasks are matched with
agents' capabilities. The probability of an agent succeeding at performing a task depends on the
capability degree of the agent performing the task and the complexity level of the task. These
probabilities are learned through repeated interactions between agents, and then used by them
to self-organise as teams. Finally, in Roles and Teams Hedonic Games (RTHG) (Spradling et al.,
2013) each agent expresses his preferences over both his own roles within a team and on the set of
roles needed in the team. This way, agents themselves jointly select a set of required capabilities
to perform a given task.
Personality Similarly, personalities of team members are crucial for performing tasks. Accord-
ing to Wilde (2009), different types of tasks require different personalities in a team. In detail,
people with different personalities approach tasks in a diverse way, resulting in better and faster
solutions. Along this line, Andrejczuk et al. (2016) propose a team composition algorithm that
groups agents into different teams so that the personalities in each team are as disparate as
possible and gender is balanced.
In (Farhangian et al., 2015b), the nature (structure) of a task is quantitatively characterized:
from extremely structured to extremely open-ended. While structured tasks are straightforward
and do not require planning, open-ended tasks require creativity and imagination from team
members. In another article, Farhangian et al. (2015a) try to capture the dynamics of tasks by
matching the required levels of creativity, urgency, social interaction and complexity of a task to
personalities of agents. For instance, teams composed of differing attitude tendencies (associated
with different personalities) are believed to outperform teams composed of like-minded people
when tackling tasks requiring a high level of creativity.
Finally, Hanna and Richards (2015) show that when performing a task, the personality of
team members influences their success. They analyse the influence of an Intelligent Virtual Agent
(IVA) communication style (expressing its personality) on human-IVA cooperation. The task is
a collaborative game that involves dodging a sequence of obstacles to reach a target.
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
7
3.2.2 Plan-based approaches
The notion of task in plan-based approaches is normally understood either as a set of actions or
as a sequence of actions. Well organized teamwork can shorten the time required for completing
a particular task by distributing a set of actions across team members. Both Barrett et al. (2013)
and Agmon et al. (2014) employ an indirect planning method driven by the most informed agents
to solve a set of actions. Barrett et al. (2013) introduce an ad-hoc team agent that learns its
teammates' models (i.e. their predictable action selection) and chooses its own actions so that
they collectively maximize the likelihood of success. In detail, they use Monte Carlo sampling
to simulate the long term effects of collective actions. As an extension to the previous work, in
Agmon et al. (2014) the actions selected by ad-hoc agents influence the actions that the other
team members will choose. Each agent has a set of possible actions that it may choose in order to
solve each subtask. The ad-hoc agents need to predict the actions of its teammates (conditioned in
this case to its own actions) and behave based on these predictions with the purpose of influencing
the collective selection of actions in the team to reach a joint optimal solution.
Among the approaches considering a task as a sequence of actions, in Marcolino et al. (2013) a
team of agents jointly playing the computer game Go plan which action to take next by voting on
the possible alternatives from a discrete set of possible actions. Authors prove that under certain
conditions of opinion diversity, aggregating the decisions of a team of heterogeneous agents is a
better planning strategy than the decision of a team built with copies of the most competent
agent (called the strongest agent). This shows that diversity improves the planning capacity of
a team solving a complex task like Go. In Marcolino et al. (2016), the authors use the same
technique to suggest a user a number of optimal solutions for their next action decision. The
application domain of their algorithm is house design. Various design alternatives are proposed
to the user in order to select one for further study.
Finally, Rochlin et al. (2016) deal with self-interested agents in a team that select one agent
to accomplish the task of purchasing a jointly desired item with the lowest possible cost. By
doing so, the team assigns the execution of the plan to a single member of the team, becoming
the buyer. The buyer's strategy decides whether to maintain the search looking for better deals
(search for a further action), or stop looking and buy at the lowest price found so far, bearing
the incurred buyer's overhead. This strategy balances the expectation of finding a better price
(considering the price distribution built during the search) and the team policy to reimburse the
cost of the task solution finding to the buyer.
In conclusion, tasks are solved by the execution of action plans. How complex these
Analysis.
action plans are depends on the focus of the reviewed contributions. Individual-based approaches
understand action plans as sets of requirements on a team members' capacity and personality.
These approaches assume that the joint capabilities of agents in a team must be enough to solve
a given task. Contrarily, plan-based approaches regard tasks as sets of actions or sequences
of actions that are assigned to the individual members of a team. All these works propose
algorithms that determine which action will be executed and by whom. However, plan-based
approaches have a very simplistic notion of plan. The majority of models do not consider time
constraints, action dependencies, action failure, plan robustness, or dynamic changes in a task
requirements. Therefore, the vast literature on planning has not yet been integrated into team
formation methods.
3.3 WHY do we do it? The objective(s)
The motivation of individual efforts or actions is to attain or accomplish a certain state of affairs:
its goal. A necessary condition for a team to exist is that all team members are committed to
a joint goal. Therefore, in Computer Science an agent team is typically built of at least two
cooperative agents that share a common goal; by teaming up, these goals can be achieved in a
more effective way. This is the main motivation of team composition and formation. A large body
8
ewa andrejczuk et al.
of literature proposes team composition algorithms to attain at least one of the following team
objectives:
1. minimizing overall cost (e.g. cooperation cost, team cost);
2. maximizing social utility; or
3. maximizing the quality of an outcome.
In this section we describe the literature on team composition per objective.
3.3.1 Minimizing overall cost
Team cost efficiency has received some attention in the literature. There are various costs
associated with team composition and formation problems (e.g. communication costs or agent
service costs). For instance, some results balancing cost and quality were obtained by Kargar et al.
(2012). They propose algorithms for composing a competent team in a social network. When
composing a team, those algorithms minimize team members' costs and communication costs
within the team. Kargar et al. (2012) require that agents have the necessary competences to
perform a task, but do not require any specific motivation from them.
A similar approach is presented in Crawford et al. (2016) and Okimoto et al. (2015). These
works propose a model for robust team composition and go a step further with respect to
Kargar et al. (2012) since they minimize the overall cost among k-robust teams (see Section 3.4.1
for a definition of a k-robust team). That is, this model assumes that up to k agents within a team
may eventually fail without affecting the achievement of the task. Thus, it assumes more realistic
conditions than Kargar et al. (2012). However, likewise Kargar et al. (2012), agents' motivations
to work together in a team are not considered.
3.3.2 Maximizing social welfare
A second objective considered in the team composition and formation literature is maximizing
social welfare. That is, maximizing the utility function of a team, as a whole, while performing a
task. The utility obtained is then allocated to the individual members of the team. For instance,
Chalkiadakis and Boutilier (2012) propose a Bayesian Reinforcement Learning framework where
agents learn from iterated coalition compositions. Agents can choose between exploration (select
coalitions to learn more about new agent types) and exploitation (rely on known agents).
Exploitation enables agents to maximize their utility function by performing tasks with reliable
agents (discovered during the exploration phase).
Paradoxically, the agent motivation to maximize its individual welfare may reduce the overall
team cost and additionally increase the overall quality of the performed task. For instance, in
Rokicki et al. (2015) a human team competition mechanism improves cost efficiency and the
quality of a solution in a team-based crowdsourcing scenario. In conventional crowdsourcing
reward schemes, the payment of online workers is proportional to the number of accomplished
tasks (pay-per-task). Rokicki et al. examine the possibility of getting much higher rewards by
introducing strategies (e.g. random or self-organised) for team composition. Their mechanism
triggers the competition among human teams as the reward is only given to the top-5 performing
teams or individuals. Their evaluation shows substantial performance boosts (30% in the best
scenario) for team-based settings without decreasing the quality of the outcome.
The objective of maximizing social welfare is also considered in many ad-hoc settings, like
the one proposed by Agmon et al. (2014). Agmon et al. consider a framework with two types of
agents: best-response and ad-hoc agents forming teams. On the one hand, best-response agents
have limited knowledge and assume that the environment and their teammates will behave as
observed in the past. On the other hand, ad-hoc agents have a more complete view of a team
actions, agents' joint utilities and their action costs. Using such information, ad-hoc agents try
to influence joint decisions. In Agmon et al. (2014) the authors consider that ad-hoc agents know
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
9
with uncertainty their teammates' behaviour. The paper analyses the impact on optimal solutions
of ad-hoc agents misidentifying their teammates' types.
The study of self-interested agents that co-operate in a team has also attracted the interest
of researchers in MAS. An interesting example of this approach is presented in Farhangian et al.
(2015b), where self-interested agents need to maximize the welfare of all team members in order
to maximize their own benefit. Hence, they indirectly aim at maximizing the utility of the team.
Similarly, in Chen et al. (2015) agents repetitively decide which team to join by balancing both
rewards from completing tasks and learning opportunities from more qualified agents. That
is, each agent consider whether to sacrifice short-term rewards to acquire new knowledge that
benefits himself and the whole community in the long run.
3.3.3 Maximizing quality
The last range of models propose a number of methods where agents try to maximize the quality
of solutions whilst minimising the time to achieve them, namely to maximize team performance.
Recent organisational psychology studies prove that team members' diversity is a key factor to
increase team performance Wilde (2009). As mentioned in Section 3.1 Marcolino et al. (2013)
present a setting where agents in a team vote together to decide on the next joint action to
execute that maximises the team's solution quality. The authors prove that a diverse team can
overcome a stronger team (i.e. a team built of copies of the strongest agent) if at least one agent
has a higher probability of taking the best action in at least one world state than the probability
that the best agent has of taking that action in that state. The attempt of capturing heterogeneity
is also used in Andrejczuk et al. (2016). There, instead of looking for a single heterogeneous team,
Andrejczuk et al. partition a group of agents into psychologically-balanced and gender-balanced
heterogeneous teams with the purpose of increasing the overall performance of the resulting
teams.
Hanna and Richards (2015) also use personality to investigate the influence of Intelligent
Virtual Agents (IVA) on team collaboration. Their findings reveal that team performance boosts
when the human and the IVA in a team have a shared mental model. Building a shared mental
model is directly related to the psychological traits of IVA.
Peleteiro et al. (2015) introduce a decision making mechanism that on top of improving the
quality, aims at increasing the quantity of completed tasks. It uses reputation and adaptation
mechanisms to allow agents in a competitive environment to autonomously join and preserve
coalitions (teams). In terms of team performance, they show that coalitions keep a high percentage
of tasks serviced on time despite a high percentage of unreliable workers. Moreover, coalitions
and agents demonstrate that they successfully adapt to a varying distribution of incoming tasks.
Liemhetcharat and Veloso (2012) developed a model to learn and analyze capabilities of
agents and synergies among them to solve the team composition problem using previous joint
experiences. They define a synergy model as a graph where the distance between agents is an
indicator of how well they work together. Their main contribution is that their algorithm learns
from only a partial set of agent interactions in order to learn the complete synergy model. In a
subsequent article (Liemhetcharat and Veloso, 2014), the authors study the learning agent team
formation problem with the goal of maximizing the mean performance of a team after K learning
instances. There, learning agent pairs have heterogeneous rates of coordination improvement,
and hence the allocation of training instances has a larger impact on the performance of the final
team.
The notion of fairness is also considered in the context of team performance. An example of
this approach is given in Rochlin et al. (2016). Rochlin et al. analyze the correlation between
efficiency and fairness in teams consisting of self-interested agents. They prove that the more fair
the team the more efficient its members are.
10
ewa andrejczuk et al.
In summary, the computer science literature has focused on team co-operation with
Analysis.
various objectives that can be categorized as at least one of the following: minimizing overall cost,
maximizing social utility, or maximizing team(s) performance. The models minimizing overall cost
compose teams based on individual competences, though do not take into account individual
motivations to complete the assigned task. This is a rather strong assumption, especially when
it comes to mixed teams or human teams, making the existing approaches rather unrealistic.
The literature focusing on maximizing social welfare considers both agent competences and
motivation. The motivation increases by using competence mechanisms (like in crowdsourcing
teams), or by giving agents the freedom to select their collaborators (like in learning agent team
formation or in ad-hoc teams). To maximise team performance, one of the crucial findings in both
Organisational Psychology and Computer Science is that team members must be heterogeneous.
Further variables that have been used by computer scientists in the area of MAS to compose
teams are: agent reputation, personality of humans and agents, synergy between team members,
and feeling of fairness among team members.
3.4 HOW do we do it? The organisation
In the existing literature, the societal structure of teams is considered crucial for effective
teamwork. There are two aspects to be considered, one is which agents will be members of a
team and second, how teams will be organized to solve tasks. Thus, the different approaches in
the literature can be classified depending on the functionality that they tackle:
• Team Composition: the process of deciding which agents will be part of a team. It can be an
external decision or an autonomous decision by the agents themselves; and
• Team Formation: the process of learning to decide the roles and internal organisation of a
team. This organisation can be imposed or be the result of self organisation. In any case, the
resulting organisations can be categorized as hierarchical or egalitarian.
Next, we look into these two dimensions in detail.
3.4.1 Team Composition.
Although team composition in MAS has mainly focused on building teams of software agents,
that is agent teams, there is a growing number of works considering either mixed teams
(Hanna and Richards, 2015), where agents and humans cooperate to achieve common goals
(Ramchurn et al., 2016), or human environments, where people are supported by software
(Jennings et al., 2014). In MAS, we distinguish between two groups of methods (or processes) to
compose team(s), namely:
1. Exogenous Team Composition: there is an algorithm external to the agents that determines
the composition of teams.
2. Endogenous Team Composition: agents themselves decide in a distributed manner the
composition of a team.
Exogenous Team Composition. The team composition process uses the task requirements
(i.e. constraints on teams that can be formed, such as team size (Rahwan et al., 2011);
competences and personality as discussed in section 3.1) in order to build teams that are
capable of solving the task with particular properties. For instance, Crawford et al. (2016) and
Okimoto et al. (2015) consider a degree of fault-tolerance to build k-robust teams. A team is k-
robust if removing any k members from the team, does not affect the completion of the task. As
mentioned before, Liemhetcharat and Veloso (2012) propose a learning algorithm that constructs
a synergy graph from observations of the performance of pairs and triples of agent. A synergy
value represents how well a pair of agents work together. The authors use this learned synergy
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
11
graph as well as agent capabilities to solve the team composition problem. Their method selects
teams that are capable and that maximize their internal synergy.
Similarly, Rangapuram et al. (2015) consider the competences of agents and their compatibility
in order to identify a team that is both competent and compatible. Agent compatibility, expressed
as a social network, can be understood as a set of preferences on team composition, such as: the
inclusion of a certain team leader, or restrictions on team size, problem solving cost or agent
locality (in a social or geographical sense).
In many systems, capabilities of agents are not widely known. Chen et al. (2015) study an
ad-hoc setting where agents need to co-operate with to recognize their capabilities. Agents bid
for subtasks (parts of tasks) that they want to perform, though the final decision belongs to the
exogenous algorithm that assigns each subtask to the best qualified agent bidding on the task.
composition of multiple
teams. For
Some
approaches deal with the
instance,
Anagnostopoulos et al. (2012) use competences and communication cost in a context where tasks
sequentially arrive and teams have to be composed to perform them. Each task requires a specific
set of competences and the team composition algorithm is such that the workload per agent
is fair across teams. Furthermore, Andrejczuk et al. (2016) compose multiple teams according
to a balance of agents' personalities and genders. Their goal is to partition a set of agents into
multiple teams such that each team is internally balanced and the problem solving capabilities
of the teams in the partition are similar. Besides the use of personality traits, Farhangian et al.
(2015a) use competences and a task specification with the purpose of composing a single team.
Aside from competences and personality, team composition can also take into account
agents' preferences on teams. Indeed, hedonic coalition formation employs each agent's hedonic
preferences on its coalitions to yield a coalition structure, namely multiple teams. The defining
feature of a hedonic preference is that every agent only cares about which agents are in its own
team (coalition). Spradling et al. (2013) introduce a new model of hedonic coalition formation
game, the so called Roles and Teams Hedonic Games (RTHG). In this model, agents view
coalitions as a number of available roles and have two levels of preferences: on the set of roles
that are available in a coalition, and on their own role within each coalition.
Finally, there is recent, relevant work on mixed teams by Hanna and Richards (2015), which
composes a team as a pair consisting of a human and an Intelligent Virtual Agent (IVA). The
pair play a collaborative game that involves passing a sequence of obstacles to reach a target.
Endogenous Team Composition. The second group of methods for organizing teams has an
endogenous nature. They incorporate algorithms enabling agents to decide on team composition
by themselves. In detail, agents are equipped with negotiation and decision-making mechanisms
that they employ to agree among themselves on a team structure. Therefore, team composition
occurs without explicit external command.
Farhangian et al. (2015b) propose a model in which there are two types of agents: requesters
in charge of tasks that seek for contributors to compose teams, and contributors that vote
for the tasks they want to perform. Each requester runs an auction-based (first-price sealed-
bid) algorithm with the purpose of composing teams with the highest chance to increase social
wealth. Contributors issue bids pursuing to join the most useful requesters, namely the ones
that are most likely to reward them. Peleteiro et al. (2015) follow the similar approach but also
employ reputation and adaptation mechanisms to allow agents in a competitive environment to
autonomously join and preserve teams (as coalitions). Agents bid for tasks and each team is
constructed and led by a mediator agent.
Similarly, in Chalkiadakis and Boutilier (2012) each agent builds its beliefs about its peers
based on prior outcomes of interactions between them, and decides on coalitional actions (which
coalition to join and what task to perform). Then, agents negotiate between them to form teams
taking into account their own beliefs on the probability of success when being in a team.
12
ewa andrejczuk et al.
There exist also mixed approches, where researchers explore both, exogenous and endogenous
methods to compose teams. For instance, Rokicki et al. (2015) propose strategies for groupsourc-
ing (team-based crowdsourcing), ranging from team formation processes where individuals are
randomly assigned to teams, to strategies requiring self-organisation where individuals participate
in team building. Their results show that balanced teams (that is teams with the balanced number
or agents in each team) combined with individual rewards for most effective team members
outperforms the other strategies.
Analysis. The majority of researchers focuses on exogenous methods to compose teams.
However, there are many actual-world application domains (e.g. co-working, or crowdsourcing)
where endogenous team composition and formation are more appropriate for deployment.
Most of the literature on exogenous team composition assumes that there exists a centralized,
detailed knowledge about all agents. This knowledge is required in order to compose teams
based on agents' capabilities, personality, or even preferences. Endogenous methods are best
for dynamic environments, where team composition and formation processes are continuously
performed. Furthermore, it is a good setup for agents that learn other agents' capabilities through
repeated interactions.
3.4.2 Team Formation
We identify two main team organisation structures to build effective teams:
1. Hierarchical; and
2. Egalitarian.
We describe each team organisation structure in the following sub-sections.
Hierarchical. A hierarchical structure considers a team leader who is responsible for and makes
the decisions affecting the team. This structure is the traditional setting when it comes to business
units.
As mentioned in subsection 3.4.1, Farhangian et al. (2015b) consider two types of people within
teams: requesters and contributors. Requesters adopt a leading function, they start a project and
recruit the required people. Contributors perform the tasks assigned by requesters. The overall
team behaviour is determined by the personality of agents in teams.
In Peleteiro et al. (2015), each coalition is led by a mediator. This agent is responsible for
leading a coalition by selecting suitable agents to be part of a coalition (called worker agents)
and by evaluating the performance of workers while the coalition operates.
Agmon et al. (2014) consider ad-hoc settings with two types of agents: best-response agents
and ad-hoc agents. In such settings a task consists of a set of actions, and each team becomes
responsible for performing a task. Each best-response agent selects its next action based on its
own local world view. Each ad-hoc agent acts to bring out the best in its teammates by "leading"
them to the optimal joint action. This is an arresting example of a hierarchical structure, where
agents are not aware of each other's roles, and hence of a team's structure. Nonetheless, an ad-hoc
agent has more knowledge than a best-response agent, and thus it exploits such information to
lead its team. This may happen in a business setting, where both senior and junior staff form a
team. Even though there is no clear division of roles, the senior employee uses his experience to
make decisions that are best for the team in a long–term period (and may not look best from a
short–time perspective).
Egalitarian. An egalitarian structure assumes that all workers in a team are equally informed
and have the same rights. The leadership within a team is shared and existing team roles result
from the team's task requirements. An example of this structure in real-life scenario might be a
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
13
team of doctors that need to join their specialized knowledge to perform a complicated surgery
on a patient.
A large part of the MAS literature focuses on the egalitarian setting, trying to benefit from
leaderless teams that cooperate to complete tasks. We find this team structure in Groupsourcing
(Rokicki et al., 2015), Robust Teams (Okimoto et al., 2015; Crawford et al., 2016), Ad-hoc
teams (Chalkiadakis and Boutilier, 2012; Chen et al., 2015; Barrett et al., 2013), Mixed Teams
(Hanna and Richards, 2015), or Learning Teams (Liemhetcharat and Veloso, 2012, 2014).
A particular case of egalitarian structure involves members that decide collectively, usually
by voting, on the appropriate course of action while performing an assigned task. The real life
example for this organisation structure might be a start-up with few people that make all decisions
by discussion. Marcolino et al. (2013); Nagarajan et al. (2015) and Marcolino et al. (2016) study
egalitarian structures whose agents vote to decide at every step of a task in order to choose the
best course of action. They prove that teams consisting of heterogeneous agents that vote their
actions are more efficient than homogeneous teams built out of the copies of the strongest agent
in a team. This is because the spectrum of possible actions is wider for heterogeneous teams.
Finally, some team composition models can produce both types of team structures. For
instance,
in Roles and Teams Hedonic Games model (Spradling et al., 2013), the resulting
structure of the teams can be either hierarchical or egalitarian depending on the relationships
between roles. Typically teams in (Rangapuram et al., 2015) are egalitarian, though the presented
model includes many natural requirements that can lead to a hierarchical structure (such as
inclusion of a designated team leader and/or a group of given experts).
Analysis. The team organisation structures in the MAS literature can be grouped into
hierarchical and egalitarian. The majority of MAS research focuses on egalitarian structures
because of simplicity reasons. In particular, there is no need for defining a role structure together
with its relationship and agent-role assignments. Although structuring teams and organisations
largely helps reduce complexity of interactions, by separating responsibilities, most research in
team formation does not consider a clear role division. Moreover, notice that in most business
settings teams work following a hierarchical structure.
3.5 WHEN do we do it? The dynamics
The literature on team composition and formation mostly considers that tasks are static in the
sense that their requirements do not change during their execution. However, the dynamics of
task arrival is considered by many. That is, there could be multiple tasks to be solved concurrently
and new tasks may arrive in an asynchronous, localized manner. The different works consider
different issues in this dynamic process. For instance, the number of tasks to be serviced, task
and team members localization, team size per task or time limitations. Normally, if there is only
one task is to be completed, the focus will be on composing the best team for the task. On a
repeated task arrival setting, the use of a history of team work experiences is key to compose
new teams. Hence, the literature can be classified depending on two main aspects:
1. The succession of tasks,
2. The simultaneity of tasks.
The simplest case is a one-shot task. There is neither succession nor simultaneity, and hence
the problem of team composition is normally reduced to finding the best team for the only task.
When tasks come in sequence without simultaneity, then the problem can be reduced to finding
the best team for each task while using the learned experiences in the composition of each new
team. If tasks come in succession and can be simultaneous, the need to deal with multiple teams
acting at the same time becomes a key issue. The succession of possibly simultaneous tasks is the
most complex framework in which memory becomes again a key element.
We discuss each aspect in detail.
14
ewa andrejczuk et al.
3.5.1 Non Successive and non simultaneous tasks
In this case we face a one-shot task resolution. This is the simplest case for the team composition
and formation problems. There is no long-term strategy used to compose and form teams. Thus,
agents do not learn from past experiences and we cannot talk about the notion of community in
this setup.
Team Composition. As mentioned above, in the team composition problem, we are looking for
only one team, the best possible one to perform the task. The majority of models that consider
non successive and non simultaneous tasks are simplistic. They assume that once the team is
composed it has the needed properties and will perform the task well. For instance, Kargar et al.
(2012) use agents' capabilities and team coordination cost to compose the most effective team.
Similarly, Crawford et al. (2016) and Okimoto et al. (2015) use agents' capabilities to compose
k-robust teams (see Section 3.4.1 for a definition of a k-robust team). In Rangapuram et al.
(2015), besides agents' capabilities, the team composition model also introduces various types of
constraints (the inclusion of a specific group of agents in a team, team size, budget limitations,
and maximum geographical distance between agents and between agents and tasks). This last
model is more realistic, though it disregards past experiences.
In the teamwork phase, agents solve the task once and for all. Hence, one-shot
Teamwork.
tasks may cause self-interested behaviours, such as in Rochlin et al. (2016). There, as mentioned
in Section 3.2.2, one agent (called buyer) from the team is delegated to accomplish the task of
purchasing a jointly desired item with the lowest possible cost. This agent operates on a one-
time setting, that is, there is a single agent deciding on behalf of the team, and hence, there is
no need for that agent to behave in an altruistic manner. Authors study the notion of fairness
and its influence on effectiveness. They show that the selected buyer is less motivated to do the
task if the cost of the goods is to be divided equally among the team members. In this case,
the purchasing costs are fully assumed by the purchasing agent. Therefore, they study different
methods to reimburse the purchasing costs incurred by the buyer to improve its effectiveness.
Hanna and Richards (2015) study the co-operation between a human and an IVA (Intelligent
Virtual Agent) in a one-shot task setting. Given that past experiences cannot be used, they
experimentally show, by comparing many one-shot task instances, that the more informative
the communication between the two agents, the better the performance of the team. The
communication behavior of an IVA is directly related to its psychological traits.
On a different vein, many models assume that given a one-shot task, agents will behave
according to their knowledge and capabilities in order to benefit the whole team. In Barrett et al.
(2013) and in Agmon et al. (2014), team agents are pre-designed to co-operate when solving a
collective task. Then, one of the agents is replaced by an ad-hoc agent that shares the teams
goals, though does not know its teammates behaviours. The ad-hoc agent cannot control its
teammates, and yet it tries to improve the teams performance by learning to predict other
agents actions and thus selecting its own actions to achieve an overall optimal team behaviour.
Marcolino et al. (2013) and Nagarajan et al. (2015) perform a one-shot task study, where team
agents vote for a team action leading to the task resolution. The action voted for is sampled from
a fixed probability distribution over those actions appropriate in a particular world state (no
learning involved). The higher the probability of an action the more preferred it is by the agent.
A plurality voting mechanism is used to select the team action. Authors show that a diverse team
(with different probability distributions) can outperform a uniform team (made out of copies of
the best agent) and that breaking ties in favour of the best agent's opinion in a diverse team is
the optimal voting rule 1.
1Notice though that the authors make the strong assumption that there is a known rank of the best
actions to take at any time.
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
15
3.5.2 Non Successive and simultaneous tasks
In non successive and simultaneous tasks, the composition and formation problem becomes more
complex as it now considers a set of one-shot tasks. There is still no use of the past experiences
as the tasks are non successive.
Team Composition. Researchers in the area of MAS propose algorithms to compose the
best set of teams, one per simultaneous task, instead of looking for the best team for a task.
For instance, Andrejczuk et al. (2016) partition a set of agents into gender- and psychologically-
balanced problem-solving teams that have to solve different instances of the same task. The
authors use a greedy technique to balance the psychological traits of the members of teams so
that each team gets the full range of problem-solving capabilities.
In Roles and Teams Hedonic Games (RTHG) (Spradling et al., 2013) authors propose a
heuristic optimization method to partition a set of agents, again to solve different instances
of the same task. The method treats as votes agents' role preferences on team role structures.
Firstly, the role structures of the teams will be those receiving the highest social welfare (as the
summation of the agent individual utilities to play any of the roles in the structure). Secondly,
the algorithm selects the agent with the highest utility for a remaining role in the most voted
team role structure, recomputes the role structure preferences without that agent's preferences,
and keeps staffing teams until the partition is complete. For instance, an agent may prefer to be
a programmer in a two-agent team including a designer, but would not like to play any role in
a team without a designer. Hence, an agents role preference is not taken in isolation, but in the
context of the teams' composition. Authors define Nash stable and individually stable solutions
for RTHG in terms of possible local moves that agents could make within a given coalition
partition and prove that every instance of RTHG has an individually stable partition that can
be obtained with the use of local search movements (change of role within a coalition or coalition
swaps). In our literature search, we could not find approaches dealing with different simultaneous
non successive tasks.
Teamwork. Similarly to team composition, Rokicki et al. (2015) deal with the Teamwork
problem over different and simultaneous instances of the same task. Agents may change their
strategy during team formation in order to reach a better solution. They classify human behaviour
during team self-organisation in crowdsourcing tasks in two types. First, a number of users choose
to join one of the leading teams, instead of selecting a weaker one and compete for a lower award.
Second, small teams merge to form stronger teams and thus have a higher chance of achieving
an award.
3.5.3 Successive and non simultaneous tasks
When tasks are successive and non simultaneous, the algorithms for team composition and
formation deal with a task that has to be assigned to a team, and in many cases solved, before
new tasks arrive. A successive setting can discover phenomena which we believe are important,
but which are not captured when the attention is limited to static, non successive tasks. If in
the system of the same set of agents, teams are created and dismantled depending on the task,
the agents may behave very differently than in a non successive settings. For instance, a person
will behave in a different manner if she repeatedly borrows a car from her friends, than when she
simply rents a car. The successive setting has its advantages: it lets agents learn from the past
experiences and build their beliefs based on this knowledge.
In Anagnostopoulos et al. (2012), the first task arrives at the first time
Team Composition.
step and is assigned to a newly composed team of experts before the arrival of the second task.
This procedure repeats until all tasks are assigned. Authors propose an algorithm to compose
a set of teams to handle a set of these incoming tasks. The goal is to form a new competent
16
ewa andrejczuk et al.
team upon arrival of each task, so that the workload in the whole system is balanced. There is
no learning involved in this process. Contrarily, in Liemhetcharat and Veloso (2012) a learning
algorithm is proposed that constructs a synergy graph from observations of the performance of
pairs and triples of agent in solving previous tasks. The synergy tells how well a pair of agents
work together and they use this learned synergy graph as well as agents' capabilities to solve the
team composition problem for the next task. Their method selects teams that are capable and
maximize their internal synergy.
Teamwork. To the best of our knowledge, there are no contributions on teamwork that consider
successive and non simultaneous tasks.
3.5.4 Successive and simultaneous tasks
When tasks are successive and simultaneous, the algorithms for team composition and formation
deal with a set of tasks arriving, possibly overlapping in time that have to be assigned to newly
composed teams.
In Farhangian et al. (2015b), tasks arrive in any order, possibly over-
Team Composition.
lapping in time. A team is composed for each incoming task and after execution agents assign
performance values to each one of the other team members. These values are public and used
by the community to compose teams for future tasks. Chalkiadakis and Boutilier (2012) present
several learning algorithms to approximate the optimal Bayesian solution to the repeated team
composition. Similarly, Peleteiro et al. (2015) compute, after teamwork, both individual agent
and coalition (team) reputation values to be used in the composition of future teams.
Finally, in Chen et al. (2015), for each new task arriving agents decide which team to join
balancing exploitation (rewards from completing tasks learned from previous task solving) and
exploration (learning opportunities from more qualified agents leading to future rewards).
Teamwork. To our knowledge, there are no contributions considering successive and simulta-
neous teamwork.
Analysis. One time settings (i.e. non successive tasks) are usually simplified models that do not
take into consideration the history of agent interactions. One-shot tasks may cause self-interested
behaviours, where agents look for at least a fair split of costs associated with teamwork. However,
the majority of the literature on team composition and teamwork considering this setting assume
that the agents will always behave accordingly to their capabilities and knowledge. The successive
tasks provide us with more realistic and complex scenarios. The tasks arrive either in order, one
after another, or overlapping in time. The majority of the literature uses this setting to let
agents build their beliefs based on the past experiences and compose new teams according to
these beliefs. Regarding teamwork, there are no contributions that explore successive settings. In
other words, the state of the art does not acknowledge the memory of agents as important while
executing tasks.
3.6 WHERE do we do it? The context
The context is understood as the circumstances that form the setting for the team composition
and formation processes. We observe that the concept of context in the reviewed computer science
literature has not played a major role so far. Contrarily, according to the organisational psychology
literature (Guzzo and Dickson, 1996), it is one of the most important variables while composing
and forming teams (see Section 4.6). There are different categorizations of context. One of them
is proposed by Kozlowski and Bell (2013), which classifies contexts as follows:
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
17
• Organisational Context: technology used, organisation structure, leadership, culture, and
climate.
• Team Context: normative expectations, shared perceptions, and compatible knowledge
(generated by and emerge from individual interactions).
Individual Context: attributes, interactions, and responses.
•
In the MAS literature there are very few works that consider the social context while composing
teams. In Rangapuram et al. (2015), while composing teams, the context is exemplified as a social
network that encodes the previous collaborations among experts. The idea behind it is that the
teams that have worked together previously are expected to have less communication overhead
and work more effectively as a team. Similarly, Peleteiro et al. (2015) propose to express social
context by the reputation measure. There, upon task completion, the contractor rates the quality
of the service provided by a team and, also teams rate their own workers. Finally, this rating
information is maintained and aggregated by a reputation module. Liemhetcharat and Veloso
(2012) propose to model a social context by using the learned synergy graph (that measures
how well agents work with one another) and hence, solve the team composition problem.
Anagnostopoulos et al. (2012) include the coordination costs by means of a social network over
the set of agents and assume a metric distance function on the edges of the network. On top
of modeling preferences based on social context (such as past interactions, compatibility in
collaborating, distance in a companys hierarchy), the function may include any other kind of
context, (for instance geographical proximity between agents or between task and agents within
a team).
Analysis To the best of our knowledge, there are only few works in MAS literature that
recognize the context as an important variable. Besides Anagnostopoulos et al. (2012), which
considers both social and geographical contexts, the methods in the literature only consider the
social context (if analyzed at all).
4 Team composition and formation from an organisational psychology
perspective.
In this section we discuss all above aspects in detail answering the questions asked in the
introduction of this paper.
4.1 WHO is concerned?
In this section we are going to survey the literature on Organisational Psychology that deals with
the characteristics of humans composing teams.
We will use the structure as in section 3.1.
4.1.1 Capacity.
In OP, the most important capacity of team members that is related to team performance is
their cognitive ability. Hence, the main goal is to study how cognitive abilities influence team
performance. Cognitive ability refers to the 'capacity to understand complex ideas, learn from
experience, reason, solve problems, and adapt' (Devine and Philips, 2001, p.507). Hence, cognitive
ability in OP is a much wider concept than capacity in multiagent systems as on top of skills
widely used in MAS systems, it contains many other properties such as experience, competences,
age or even gender.
Moreover, in contrast to computer science, where capabilities are static, psychologists deal with
the dynamism of human capacity. Humans learn new capabilities and increase their level every
day for whole live (see more in (Laal and Salamati, 2012, p.399-403) for the concept of the lifelong
learning). There are diverse tests and methods to examine humans capacity, such as: intelligence
or cognitive competences tests, assessment centers or social and behavioural competence tests.
18
ewa andrejczuk et al.
Regarding team composition, on the one hand Bell and Devine and Philips (2001) found
that mean team values of cognitive ability are correlated with team performance. Moreover,
she also found that the lowest and the highest team members' cognitive abilities are correlated
with team performance in lab and field settings. In addition, Devine and Philips (2001) found
that the variance of team members' cognitive ability did not help predict team performance.
These authors also found that the mean value is twice more informative in predicting than the
lowest and the highest members scores. On the other hand, Devine and Philips (2001) found
that cognitive ability influences team performance differently depending on contextual variables
(such as working normative procedures or human resources policies). These findings suggest
that, when composing a team, organisations and managers should not only take into account
the members' cognitive ability, but also the context in which the team will operate. This will be
further discussed in Section 4.6. Other researched individual characteristics like the effect of age
and gender have produced some mixed results when analyzing their relation with performance
(Chmiel, 2008). Diversity is needed for innovation but can cause as well conflict and imbalance
(Unsworth and West, 2000).
Finally, similarly to computer science literature, the concept of team properties is understood
as a sum of humans' individual properties.
4.1.2 Personality
In addition to the before-mentioned individual properties, the literature has examined the role of
personality. The most prominent approaches have been the "Big Five" personality traits theory
(Mount et al., 1998), Schutz's theory of fundamental interpersonal relations orientation (FIRO)
(Schutz, 1958) and the Myers Briggs Type Indicator method (White, 1984). They have been used
to find the personality traits and types associated with team performance. Regarding the "Big
Five" theory, meta-analytic research has found that certain levels of conscientiousness, openness
to experience and agreeableness are good performance predictors (Mount et al., 1998).
Another approach is that of the theory of fundamental interpersonal relations orientations
(FIRO) (Schutz, 1958). The idea is that humans have several needs (i.e. need for inclusion, control
and affection) and that groups with team members that have compatible needs will perform better
than those with incompatible ones. Nevertheless, research has found mixed support for this theory
(West, 2012b).
Some companies have also tried to base their team formation on cognitive styles of
the members, by using the Myers-Briggs Type Indicator (MBTI) assessment instrument
-(Myers Briggs et al.), which is a questionnaire that measures cognitive styles along four dimen-
sions: Extraversion - Introversion, Sensing - Intuition, Thinking - Feeling, and Judging -
Perceiving. Nevertheless, there is not enough rigorous research evidence showing its relationship
with team performance (West, 2012b).
There are also novel approaches created with the purpose of team composition and formation.
For instance, the Post-Jungian Personality Theory, which is a modified version of (MBTI) (Wilde,
2013). It operates on the same dimensions as MBTI. The main novelty of this approach is its
use of the numerical data generated by the instrument (Wilde, 2011). The results of this method
seem promising as within a decade this novel approach tripled the fraction of Stanford teams
awarded national prizes by the Lincoln Foundation (Wilde, 2009). However, the method is not
properly validated and tested, which makes it disregarded by psychologists.
4.1.3 Analysis.
Several correlations have been found between cognitive ability and team performance. The
personality is also present while composing teams, although the correlation between personality
and team performance is not clearly explained. The most widely used test to measure personality
is the "Big Five". Organisational Psychology studies show that besides cognitive ability and
personality, experience and gender are further properties to consider for team composition (West,
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
19
2012a). Indeed, research findings on this topic suggest that diversity in those characteristics can
have an effect on team performance and innovation (West, 2012a). Additionally, some further
research has also paid attention to values and has found collectivism and teamwork preferences
2 to be additional good team performance predictors (Bell).
4.2 WHAT is the problem?
When it comes to team composition, the organisational psychology literature has focused on
defining task classifications. These classifications have been employed to study the relation
between task types and team performance. Hence, in this section we will review the most known
task classifications and its influence on team performance.
Two of the most widely discussed task classifications are those of McGrath (1984), Hackman
(1990); Hackman and Lawler (1971) and Hackman and Oldham (1975). While the classification
of McGrath (1984) is based on the cognitive requirements of tasks, the classification in Hackman
(1990); Hackman and Lawler (1971); Hackman and Oldham (1975) is based on the motivation
characteristics of tasks (i.e. autonomy, task variety, task significance, task identity and task
feedback). The research on team composition show that the classification based on the motivation
characteristics predicts more accurately the team performance (Podsakoff et al., 1997).
Hackman (1990) defines a task classification based on motivational requirements composed by
seven work task types:
top management;
task force;
1.
2.
3. professional support task;
4. performing task;
5. human service task;
6.
7. production task.
customer service task;
The classification of McGrath (1984) based on cognitive requirement proposes three dimensions
that characterize each task type:
1. Choose-Execute;
2. Conceptual-Behavioral;
3. Conflict-Cooperation.
Technically speaking each task type becomes a 3-tuple with qualitative values for each dimension.
For instance, a routine task would be very executive, medium behavioral and low conflicting.
After analyzing seventeen classifications in the literature Wildman et al. (2012) came out with
a different classification as follows:
1. Managing others;
2. Advising others;
3. Human service;
4. Negotiation;
5. Psychomotor action;
6. Defined problem solving;
7.
Ill-defined problem solving.
As an alternative perspective, Navarro et al. (2011) propose a task classification based on the task
context (namely task complexity, interdependencies between subtasks in a task, and uncertainty
about the dynamics of the environment where the task is executed and the lack of information).
Their results show that in order to achieve acceptable performance, the greater the complexity,
2Teamwork preferences refer to team members preferences on other team members to work with.
20
ewa andrejczuk et al.
interdependence and uncertainty, the stronger the requirements on the maturity of teams (e.g.
joint experience, cohesion) and on the diversity of team members' capabilities. For instance,
to carry out highly interdependent tasks, all team members should possess coordination skills
(maturity) and some of them the capacity to take decisions (diversity). Taking into account
other task context characteristic (i.e. uncertainty and interdependence) their study results show,
the greater the uncertainty and interdependence of task types, the more diverse the competences
for team members to cope with complexity. From the other hand, if the team is overqualified for
the task to perform, the motivation of team members decreases and the quality of the outcome
is lower or the task is not completed at all.
4.2.1 Analysis.
The OP literature provides many different classifications of task types, where the most important
are the classifications based on the motivation of individuals, the cognitive abilities and the task
context. Provided the amount of classifications and the apparent lack of consensus among them,
we believe that choosing among the several classifications previously presented in order to apply
them to the study of team composition is a hard decision. Nevertheless, such decision must
be made in order to move forward with the understanding of how a task type can influence
team composition. In an attempt to advice researchers, notice that the research show that the
classification based on the motivation characteristics predicts more accurately team performance.
From OP perspective team performance cannot be assessed by simply measuring how long
it takes for the group to finish a certain task or by counting the number of right answers to
predefined and clear questions, which is a common approach in computer science. OP rather
analyzes joint team objectives and the team composition and formation setting (such as not
realistic deadlines, a number of individuals in a team, the level of stress in a team or the quality
of the outcome).
The current research on organisational psychology focus has moved from task analysis so not
many results are present. Although task types are defined, different task instances constantly
appear because of technological development. That makes it very difficult to keep the pace. That
is why the focus on OP moved to competences (understood as cognitive ability, see Section
skills2). This is why not much work has appeared after defining task taxonomy. At the same time
task complexity increased and hence, teams are getting more and more important. Moreover,
a clear mapping between cognitive ability of individuals and task types is needed. As a major
benefit such mapping would ease team composition.
4.3 WHY do we do it?
In OP the main objective for team composition and formation is to maximize team performance.
When measuring it, the research on OP suggests that we should go beyond mere economic criteria,
the quality of decision-making processes or other traditional performance indicators (Komaki;
Hackman).
An important difference with respect to the computer science literature is that team
performance is considered from two perspectives: objective and subjective. On the one hand,
objective team performance refers to the features of the outcome of a team (e.g. quality,
delivery time, cost, sustainability). On the other hand, subjective team performance refers to
the quality of human resources in a team (e.g. motivation, satisfaction, commitment, illness
rate, stress) (Quijano et al., 2008). Therefore, while the first one refers to the delivered output
of a team (what customers obtain), the latest one focuses on the inner development of
team members. Objective and subjective team performance are significantly correlated (e.g.
Quijano et al. (2008)). Therefore, and not surprisingly, the organisational psychology literature
considers both types of performances when tackling team composition and team formation
(e.g. Meneses and Navarro (2015)). The subjective and objective performance of a team are
determined by the several aspects of the context (discussed in Section 4.6), together with
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
21
individual characteristics, the task and the team processes. Following Navarro et al. (2011) the
subjective and objective performance of a team are determined by the adjustment between the
maturity level of the team (e.g. in terms of group development, potential, etc.) and the groups
tasks characteristics.
Analysis. An important difference with respect to the computer science literature is that
team performance is considered from two perspectives: objective and subjective. Objective
and subjective team performance are significantly and directly correlated. Therefore, and not
surprisingly, the organisational psychology literature considers both types of performances when
tackling team composition and team formation. The computer science literature can benefit from
the concept of subjective team performance that currently disregarded. Therefore, current team
composition models, which mainly focus on the objective team performance, need to be extended.
4.4 HOW do we do it? The organisation
Similarly to Section 3.4 on computer science, we divide the organisation into two aspects: team
composition and team formation.
4.4.1 Team Composition.
The organisational psychology research on team composition has been very influenced by task
classification. For several authors, there is a relationship between task type and team type
(structure). For example, according to Hackman (1990), there are seven team types based on
the task type to perform:
top management;
task force;
1.
2.
3. professional support;
4. performing groups;
5. human service;
6.
customer service;
7. production teams.
Devine (2002) and Delgado Pina et al. (2008) highlighted that team performance depends on
a good matching between team type and task type.
On the other hand, there are multiple team type classifications in the literature based on
other criteria (Devine, 2002; Marks et al., 2001; Gibson and Kirkman, 1999): motivation-based,
cognitive-based or context-based (see section 4.2), though none of them has been widely used
or accepted. Also, there is agreement that team diversity must be exploited while composing
teams. Diversity refers to the degree or level to which the members of a group differ or
contrast in one or more properties. Diversity has been shown to have an impact on team
performance (Mathieu et al., 2008). In their review, Mathieu et al. (2008) point out the vastness
of the literature featuring team diversity and draw attention to four main diversity dimensions:
demographic, personality, functional background, and attitudes and values.
Horwitz and Horwitz (2007) conducted a meta-analysis to understand the relationships
between team diversity and team performance. For this, they differentiated between two classes of
diversity: bio-demographic and task-related. The former refers to diversity in individual properties
that are observable and not learned (e.g. personality, gender, age, ethnicity), whereas the latter
regards diversity in acquired capabilities, such as education or expertise. Using meta-analytic
techniques, they found task-related diversity to be positively correlated to both qualitative and
quantitative measures of team performance. However, they did not find a clear relationship
between bio-demographic diversity and team performance. Although pointing out the small
number of studies supporting these latest findings, their preliminary results seem to give more
22
ewa andrejczuk et al.
importance to the diversity of acquired team member properties, such as the type of education
or knowledge expertise.
Finally, another factor influencing team performance is team size. Among researchers the size
of a team is one of the most frequently studied parameter when analyzing team performance.
There is a disparity in the literature due to the fact that appropriate team size is dependent on
the task and the social context in which the team operates. Some studies have found team size to
be unrelated to performance Martz et al. (1992) or that increasing team size actually improves
performance without limit Campion et al. (1993). However, other studies show that there is an
inverse relationship between the size of the team and its performance (Oyster, 1999; Bartol, 1977).
Among others, Oyster (1999) and Bartol (1977) show that team size is important when
analyzing team performance. Yet, they have offered different recommendations concerning the
best size for various types of tasks to achieve acceptable performance. Oyster (1999) states that
the right number of people in a team depends on the kind of tasks team members need to perform.
They believe that for teams ranging from four to six, all the team members' competences can be
fully used, but for larger teams some members' competences are under-used and this provokes
that teams split up. According to the studies of Bartol (1977), the optimal number of members for
problem-solving tasks is five. He states that there is a limit to the team size, which, if exceeded,
causes a drop in the performance of the team. Bartol (1977) says that in the case of a team
containing more than six people there is a tendency to split the team into two, which brings
about negative effects. The cause is twofold: high coordination cost and loss of motivation by
team members Oyster (1999).
4.4.2 Team Formation.
Once a team has been composed, there are different processes that the team carries out to
execute the task and achieve the collective goal. Several classifications of team processes have
been proposed in the literature, from which, the most recent and overarching one is the one
proposed by Marks et al. (2001) and Salas et al. (2005); Goodwin et al. (2009). Typically the
research investigated the ways of implementing team processes and of measuring how well
teams perform. To begin with, Marks et al. (2001) distinguish between three broad types of
processes: action-orientated, transition-orientated and interpersonal. The first ones refer to
actions that team members undertake to accomplish goals, namely team monitoring, systems
monitoring, monitoring progress towards goals and coordinating activities. Regarding transition-
orientated processes, these are actions related to planning and/or evaluating in order to guide in
attaining team goals, that is goal specification, mission analysis, formulation and planning, and
strategy formulation. Finally, interpersonal processes are those intended to manage interpersonal
relationships. They comprise motivating/confidence building, conflict management and affect
management (Marks et al., 2001). On the other hand, Salas et al. (2005) built upon previous
research and narrowed down the main processes into "Big Five" team processes: team orientation,
backup behaviour, team leadership, adaptability and mutual performance monitoring.
Another important aspect is that team climate influences the effectiveness of processes. A
team climate is defined by the degree to which a team of persons possesses certain core properties
that are needed for the team to work effectively. These properties include the interrelationship
among team members, the identification of each person with the team and its social values, the
coordination of team resources, behaviours and technologies, as well as the desire of each team
member to achieve the objectives of the team (Meneses and Navarro, 2015). A good climate
assures the sharing of resources, mutual rewards and information exchange. It promotes a high
level of openness, safety, and a mix of upward, downward and horizontal communication processes
that help to increase team performance (Kozlowski and Ilgen; Mathieu et al., 2007; Rico et al.,
2010; Knapp, 2010).
A team climate that is conductive to learning requires shared perceptions of work settings
(James et al., 2008; Brodbeck, 2003; Ramirez-Heller et al., 2014). According to Brodbeck (2003)
Organisational Psychology
The composition and formation of Effective Teams. Computer Science meets
23
and Ramirez-Heller et al. (2014), a team climate conductive to learning is characterized as one
in which:
1. There is empathy, support, as well as a common understanding among its members, conveying
an atmosphere of mutual trust,
2. There is a regular contact as well as informal and formal communication processes among its
members,
3. There exists a common agreement with the goals and objectives to be achieved, and these
shared goals are clear, realistic and feasible,
4. There is a prevailing notion of democracy and equality among its members, with no one
having particular control over the others,
5. Members perceive a personal development as the team enhances their creativity and provides
general support in fulfilling their individual plans.
Analysis. Regarding team composition, there is a strong relationship between task type and
team type (structure). The type of the team depends on the features of the task to perform and
so very often team types are derived from task types. Besides task type, team diversity plays
an important role when composing teams. Regarding the "optimal" team size, it is a complex
question and future research is needed to determine the impact of team size on team performance,
such as the nature of the task, the internal motivations, and the context. Some preliminary results
show that the more complex the task, the larger the size of the team needs to be, but limited
to an optimal size of six members. Regarding team formation, several different team processes
classifications have been proposed, though no agreement has been reached. Finally, having a good
team climate seems key to achieve good performance.
4.5 WHEN do we do it? The dynamics
Humans learn with every interaction. Our memory recollection and capability improvement
cannot be removed or stopped. Hence, the organisational psychology research usually deals with
complex scenarios, those of simultaneous and successive tasks, see Section 4.5. In organisational
psychology, the dynamic properties of a team are referred to as emergent states. Emergent states
develop during teamwork and have an effect on the outcomes. Several examples of emergent
states (Mathieu et al., 2008) are team confidence, team empowerment, cohesion, team climate,
collective cognition or trust between team members.
The development of emergent states is closely connected to the process of team learning
behaviours. As members of a team interact with one another and perform tasks, they learn from
their experiences. That is, they learn by asking questions, seeking feedback, experimenting, reflect-
ing on results, and discussing errors or unexpected outcomes of previous actions (Edmondson,
1999). These complex tasks allow team members to acquire, share, combine and apply knowledge
(Olivera and Argote, 1999; Kozlowski and Ilgen). They also lead to the development of shared
understanding and meaning as well as to the acquisition of mutual knowledge, skills, and
performance capabilities (Garavan and McCarthy, 2008). All these developments enhance team
performance (Edmondson, 1999; Zellmer-Bruhn, 2006).
Analysis. Unlike computer science, the reviewed organisational psychology literature does
not study simple scenarios such as non successive and non simultaneous tasks. Typically,
organisational psychology analyzes complex and realistic scenarios as human learning capabilities
need to be considered. Moreover, on top of including the social network and memory about the
outcomes of past experiences, the researchers in organisational psychology deal with the dynamics
of individuals' capabilities (as humans learn new capabilities and forget not used ones).
24
ewa andrejczuk et al.
4.6 WHERE do we do it? The context
From a systemic perspective teams are part of the structure of an organisation and therefore they
operate within this organisation. In the same way, an organisation is part of the environment.
The environment creates demands and requirements for an organisation and influences the
organisation's system. In turn, the organisation tries to address these requirements by influencing
the operations of its teams and their performance in diverse ways.
Research results suggest that context plays an important role in the performance of teams
(Guzzo and Dickson, 1996; Hackman, 1990). Hackman (1990) between others propose and analyse
many contextual factors that have to be considered when composing a team:
• The uncertainty on the level of complexity of the tasks and the degree of dynamics of the
environment. Both aspects influence the uncertainty within the organisation and therefore
its teams need to operate with incomplete knowledge. The uncertainty about external
factors is determined by the available information about the customers, the suppliers, or
other competing organisations. The uncertainty about internal factors is determined by
the dynamics of tasks, organisational rules and objectives. In such an uncertain context,
teamwork is more challenging and paradoxically teams may perform better than in a stable
and predictable context.
• The vision and mission of an organisation that determine the main rules and norms to be
followed and what is to be considered as good performance.
• The set of values, policies and strategies of the organisation. For instance, organisations
supporting individual values will hinder teamwork and team performance will thus be
poor. This is because teamwork is based on shared values, mutual support, constructive
collaboration, mutual trust, coordination mechanisms and synergies, which are collective
values. On top of it, an organisation promoting internal competition will lead to individual
strategies of withholding information and self-interested behaviours.
• The organisational benefits such as the reward or the training systems. Diverse motivational
theories are available to explain the relevance of the reward systems for increased perfor-
mance. For example, teams will perform better with an appropriate reward system.
• The resources and assistance made available to the team. It is obviously easier for the team
to achieve good performance when operating in a context of resource abundance.
• The organisational climate. A context with a perceived climate of control and low level
of autonomy for the team will hinder successful teamwork and performance. As teamwork
requires an individual engagement with the team, a climate is needed that facilitates
information sharing or team skills development.
• The cultural context. The definition of a team changes across cultures: in cultures valuing
individualism teams are seen more as a set of people each contributing to a different subtask,
whereas in cultures valuing collectivism teams are seen as having shared goals, values and
responsibility for the whole task. Research results show that teams perform better in a
collective cultural context.
In contrast with computer science approaches, the context where teams solve tasks
Analysis.
plays an important role in the organisational psychology literature. The context is understood
as internal and external factors influencing teamwork. The internal context can be characterised
as dimensions of the organisation, such as vision and mission, values, policies and strategies, or
organisational benefit system. The external context can be characterized as dimensions of the
environment in which the organisation operates, that is the culture, the available resources, and
the uncertainty about other players behaviour.
5 Discussion
Computer Science (CS) and Organisational Psychology (OP) have followed rather disparate
approaches when it comes to team composition and team formation. However, some similarities
and differences can be drawn and several new research questions can be formulated from a cross
reading of the two literature corpus. In Table 1 a comparison of the main papers in CS can be
found.
Article Title
Team Process
Agmon et al. (2014)
Formation
Individual
Properties
Personality
Anagnostopoulos et al.
(2012)
Andrejczuk et al. (2016)
Composition
Capacity
Composition
Personality
Barrett et al. (2013)
Formation
Personality
Chalkiadakis and Boutilier
(2012)
Chen et al. (2015)
Composition
Capacity
Composition
Capacity
Crawford et al. (2016)
Composition
Capacity
Farhangian et al.
(2015b)
Farhangian et al. (2015a) Composition
Composition
Personality
Capacity and
Personality
Personality
Hanna and Richards
(2015)
Kargar et al. (2012)
Formation
Composition
Capacity
The task
Plan-based
Individual-
based
Individual-
based
Plan-based
Individual-
based
Individual-
based
Individual-
based
Individual-
based
Individual-
based
Individual-
based
Individual-
based
The Objec-
tive
Maximizing
social welfare
Maximizing
the quality
Maximizing
the quality
Maximizing
the quality
Maximizing
social welfare
Maximizing
social welfare
Minimizing
cost
Maximizing
social welfare
Minimizing
cost
Maximizing
the quality
Minimizing
cost
Team Com-
position
Exogenous
Team Organ-
isation
Hierarchy
Exogenous
Egalitarian
Exogenous
Egalitarian
Exogenous
Egalitarian
Endogenous
Egalitarian
Exogenous
Egalitarian
Exogenous
Egalitarian
Endogenous
Hierarchy
Exogenous
Egalitarian
Exogenous
Egalitarian
Exogenous
Egalitarian
The dynamics
The context
and
Non Successive and
Non Simultaneous
Successive and Non
Simultaneous
Non Successive and
Simultaneous
Non Successive and
Non Simultaneous
Successive
Simultaneous
Successive
Simultaneous
Non Successive and
Non Simultaneous
Successive
Simultaneous
Non Successive and
Non Simultaneous
Non Successive and
Non Simultaneous
Non Successive and
Non Simultaneous
and
and
N/A
and
Social
Geographical
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
Article Title
Team Process
Individual
Properties
Capacity
The task
Individual-
based
Plan-based
Liemhetcharat and Veloso
(2012)
Marcolino et al. (2013)
Composition
Formation
Personality
Nagarajan et al. (2015)
Formation
Personality
Plan-based
Marcolino et al. (2016)
Formation
Personality
Plan-based
Okimoto et al. (2015)
Composition
Capacity
Peleteiro et al. (2015)
Composition
Capacity
Rangapuram et al.
(2015)
Rochlin et al. (2016)
Rokicki et al. (2015)
Spradling et al. (2013)
Composition
Capacity
Formation
Composition
and Formation
Composition
and Formation
N/A
N/A
Capacity
Individual-
based
Individual-
based
Individual-
based
Plan-based
N/A
Individual-
based
Table 1 Comparison of the computer science contributions reviewed in this paper.
The Objec-
tive
Maximizing
the quality
Maximizing
the quality
Maximizing
the quality
Maximizing
the quality
Minimizing
cost
Maximizing
the quality
Maximizing
the quality
Maximizing
the quality
Maximizing
social welfare
N/A
Team Com-
position
Exogenous
Team Organ-
isation
Egalitarian
Exogenous
Egalitarian
Exogenous
Egalitarian
Exogenous
Egalitarian
Exogenous
Egalitarian
Endogenous
Hierarchy
Exogenous
N/A
/
Egalitarian
Hierarchy
Hierarchy
Exogenous,
Endogenous
Exogenous
Egalitarian
Egalitarian
The dynamics
The context
Successive and Non
Simultaneous
Non Successive and
Non Simultaneous
Non Successive and
Non Simultaneous
Successive and Non
Simultaneous
Non Successive and
Non Simultaneous
Successive
Simultaneous
Non Successive and
Non Simultaneous
Non Successive and
Non Simultaneous
Non Successive and
Simultaneous
Non Successive and
Simultaneous
and
Social
N/A
N/A
N/A
N/A
Social
Social
N/A
N/A
N/A
5.1 Similarities in both approaches
When modeling agents' properties in CS, there are two main approaches. There is either extensive
a-priori information about teammates given as input or ad-hoc scenarios where agents learn their
teammates' capabilities. In OP a number of tests are proposed to acquire a-priori information
about teammates, such as intelligence or cognitive competences tests, assessment centres or
social and behavioural competence tests. Also, similar to CS, OP studies allow to learn human
capabilities from their repeated interactions.
To maximize team performance, one of the crucial findings in both OP and CS is that team
members have to be heterogeneous.
Regarding the tasks that are executed by agent teams, both OP and CS focus rather on team
members' properties required to perform a task than on a detailed planning of the task execution.
5.2 Differences in both approaches
The first difference we find between CS and OP is with respect to the complexity of individual
team members. Organisational psychology focuses on humans with all their intrinsic complexity
while CS focuses on a limited set of human-like properties to build software agents. In CS the
agent properties have been categorized as personality and capacity. In OP, although human
properties can also be categorized as personality and capacity, capacity is a much wider concept.
It contains not only skills, but also other properties, such as competences, experience, gender
or age. Moreover, while in OP the human capabilities are assumed to be dynamic (i.e. lifelong
learning), software agents capabilities are assumed to be static and only the behaviour model
may change with agents' interactions.
In CS the majority of approaches assume that the joint capabilities of agents in a team are
enough to solve a given task. However, the researchers in OP recognize also other factors as
important when composing and forming a team, such as the motivation of individuals and the
task context. They also show that the motivation characteristics predict more accurately the
performance of a team than the other factors. Regarding OP research gaps, it lacks a mapping
between cognitive ability of individuals and task types (which is an input in CS models) which
complicates team composition.
The CS literature has focused on team co-operation with various objectives that can be
categorized as at least one of the following: minimizing overall cost, maximizing social utility,
or maximizing the quality of the outcome (understood as maximizing team performance). In OP,
the main objective for team composition and formation is just to maximize team performance.
Moreover, from an OP perspective team performance cannot be assessed by the time spent to
perform a task, by comparing costs or by counting the number of right answers as it would ignore
some important subjective reasons. Instead, OP analyzes possible causes of failure, such as an
excessive amount of work needed to execute the task given the size of the team or the lack of
motivation of team members. This is why the performance is assessed from two perspectives:
objective and subjective, while, CS only considers objective measures. In CS there are only early
attempts to include a subjective perspective while analyzing team performance. It is shown that
the motivation increases by introducing competition mechanisms (like in crowdsourcing teams)
or by giving agents freedom while selecting their collaborators (like in ad-hoc teams).
Since in CS agents can be modeled depending on the needs, researchers can study different
settings depending on the dynamics of task arrival (one task or many, one time or many). Many
MAS models are simplistic since they consider only one task arriving at a time. Unlike CS,
the reviewed OP literature does not study simple scenarios, since humans have memory and
improve their capabilities with every task. Hence, typically OP analyzes only complex and realistic
scenarios. The CS literature uses these complex scenarios to let agents build their beliefs based
on past experiences and compose new teams according to these learned beliefs. OP, on top of
including the social network and memory about the outcomes of past experiences, deals with
28
the dynamism of individuals' capabilities (as humans learn new capabilities and forget not used
ones).
5.3 Cross fertilization opportunities
Although some of the individual properties studied in OP (e.g. age or gender) may not make
sense in a CS context, some do. For instance, the dynamics of competences through learning and
experience and the cultural values could be used to program more sophisticated agents, specially
when interacting in mixed teams involving humans.
The majority of MAS literature on team composition and teamwork assumes that the agents
always behave according to their capabilities and knowledge. OP highlights the importance of
the motivation of individuals, when estimating performance. There is an opportunity to extend
current MAS models by adding agent motivation properties.
Additionally, although in both CS and OP the modeling of the individuals' properties has been
broadly studied, there is still a need in both fields of modeling the properties of agent teams,
other than a sum of agents' individual capabilities or a boolean representation of whether the
team can perform a task.
In both CS and OP literature, there are some preliminary attempts to include planning,
though they are very simplistic. The majority of methods do not consider time constraints, action
dependencies, action failure, plan robustness, task requirement dynamic changes and hence, the
vast literature on planning has not yet been integrated into team formation methods in both
fields.
According to OP having a good team climate seems key to achieve good performance. However,
only few CS works recognize team climate (expressed as a synergy or a compatibility graph) as
an important factor when composing teams. Further work is needed to investigate the relation
between good team climate and team performance in CS research.
In OP, context is considered one of the most important characteristics related to team
performance. To our best knowledge, there are only few works in CS that would recognize context
as an important factor besides the social and geographical context considered in a few papers.
There is a need to perform further research on context to build better performing agent teams.
According to OP there is a strong relationship between task type and team type (structure).
However, the majority of CS literature does not correlate team type with a task type apart from
the relationship between the number of agents in a team and the set of capacities defined by a
task. There is a need to further explore OP task types and their influence on teams' performance.
Finally, despite of a vast body of OP research over decades on team composition, the researchers
are not yet at the point of creating the algorithms that lead to the dream team. This survey
provides some guidelines on team composition and formation from the CS literature that can
help on this lack of formal models and algorithms in OP.
Acknowledgements
Work supported by projects Collectiveware TIN2015-66863-C2-1-R (MINECO/FEDER), SMA
(201550E040), and Gencat 2014 SGR 118. The first author is supported by an Industrial PhD
scholarship from the Generalitat de Catalunya.
References
N. Agmon, S. Barrett, and P. Stone. Modeling uncertainty in leading ad hoc teams.
In
Proceedings of the 13th International Conference on Autonomous Agents and Multiagent
Systems (AAMAS), May 2014.
A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. Online team formation
in social networks. In Proceedings of the 21st World Wide Web Conference 2012, WWW 2012,
Lyon, France, April 16-20, 2012, pages 839–848, 2012.
29
E. Andrejczuk, J.A. Rodr´ıguez-Aguilar, and Sierra C. Optimising congenial teams. 10/05/2016
2016.
S. Barrett, P. Stone, S. Kraus, and A. Rosenfeld. Teamwork with limited knowledge of teammates.
In Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, July 2013.
K.M. Bartol. Building synergistic edp teams. Proceedings of the fifteenth annual SIGCPR
conference, 1977.
D. Bartram and R.A. Roe. Definition and assessment of competences in the context of the
european diploma in psychology. European Psychologist, 10(2):93, 2005.
R.M. Belbin. Team Roles at Work: A Strategy for Human Resource Management. Butterworth-
Heinemann, Oxford, 1993.
S.T. Bell. Deep-level composition variables as predictors of team performance: A meta-analysis.
Journal of Applied Psychology, 92(3):595–615.
F.C. Brodbeck. Team climate for learning in higher education. Aston Network (Summer), pages
4–5, 2003.
M.A. Campion, G.J. Medsker, and A.C. Higgs. Relations between work group characteristics
and effectiveness: Implications for designing effective work groups. Personnel Psychology, (46):
823–850, 1993.
G. Chalkiadakis and C Boutilier. Sequentially optimal repeated coalition formation under
uncertainty. Autonomous Agents and Multi-Agent Systems, 24(3):441–484, 2012.
B. Chen, X. Chen, A. Timsina, and L. Soh. Considering agent and task openness in ad hoc team
formation. In Proceedings of the 2015 International Conference on Autonomous Agents and
Multiagent Systems, AAMAS 2015, Istanbul, Turkey, May 4-8, 2015, pages 1861–1862, 2015.
N. Chmiel. An introduction to work and organizational psychology: a European perspective. John
Wiley and Sons, 2008. Chapter Fourteen.
C. Crawford, Z. Rahaman, and Sen S. Evaluating the efficiency of robust team formation
algorithms. International Workshop on Optimisation in Multi-Agent Systems, 2016.
M.I. Delgado Pina, M.A. Romero Mart´ınez, and L. G´omez Mart´ınez. Teams in organizations: a
review on team effectiveness. Team Performance Management: An International Journal, 14
(1/2):7–21, 2008.
D.J. Devine. A review and integration of classification systems relevant to teams in organizations.
Group Dynamics: Theory, Research, and Practice, 6(4):291, 2002.
D.J. Devine and J.L. Philips. Do smarter teams do better a meta-analysis of cognitive ability
and team performance. Small Group Research, 32(5):507–532, 2001.
A. Edmondson. Psychological safety and learning behavior in work teams. Administrative Science
Quarterly, 44:350–383, 1999.
M. Farhangian, M.K. Purvis, M. Purvis, and B.T.R. Savarimuthu. Agent-based modeling of
resource allocation in software projects based on personality and skill. In Communications in
Computer and Information Science, pages 130–146, 2015a.
M. Farhangian, M.K. Purvis, M. Purvis, and B.T.R. Savarimuthu. Modeling the effects of
personality on team formation in self-assembly teams. In PRIMA 2015: Principles and Practice
of Multi-Agent Systems - 18th International Conference, Bertinoro, Italy, October 26-30, 2015,
Proceedings, pages 538–546, 2015b.
30
T.N. Garavan and A. McCarthy. Collective learning processes and human resource development.
Advances in Developing Human Resources, 10:451–471, 2008.
C.B. Gibson and B.L. Kirkman. Our past, present, and future in teams: The role of human
resource professionals in managing team performance, 1999.
G. F. Goodwin, C. S. Burke, J. L. Wildman, and E. Salas. Team effectiveness in complex orga-
nizations: An overview. In Team Effectiveness in Complex Organizations: Cross-Disciplinary
Perspectives and Approaches, chapter 1, pages 3–16. Routledge, Taylor and Francis Group,
New York,USA, 2009.
R.A. Guzzo and M.W. Dickson. Teams in organizations: Recent research on performance and
effectiveness. Annual review of psychology, 47(1):307–338, 1996.
J.R. Hackman. Harvard Business School Press.
J.R. Hackman. Groups that work (and those that don't): Creating conditions for effective
teamwork. Number 10–H123. Jossey-Bass, 1990.
J.R. Hackman and E.E. Lawler. Employee reactions to job characteristics. Journal of applied
psychology, 55(3):259–286, 1971.
J.R. Hackman and G.R. Oldham. Development of the job diagnostic survey. Journal of Applied
psychology, 60(2):159–170, 1975.
N. Hanna and D. Richards. Do birds of a feather work better together? the impact of virtual agent
personality on a shared mental model with humans during collaboration. In Proceedings of the
3rd International Workshop on Collaborative Online Organizations, COOS 2016, co-located
with the 14th International Conference on Autonomous Agents and Multi-Agent Systems,
AAMAS 2015, Istanbul, Turkey, May 4, 2015., pages 28–37, 2015.
M Haque, M Egerstedt, and A Rahmani. Multilevel coalition formation strategy for suppression
of enemy air defenses missions. Journal of Aerospace Information Systems, 10(6):287–296,
2013.
G. Hoffman and C. Breazeal. Collaboration in human-robot teams. In Proceedings of the 1st
AIAA04 Intelligent Systems Conference, 2004.
S.K. Horwitz and I.B. Horwitz. The effect of team diversity on team outcomes: A meta-analyitic
review of team demography. Journal of Management, 33(6):987–1015, 2007.
L.R. James, C. Choi, C.H.E. Ko, P. McNeil, M. Minton, and M.A. Wright. Collective learning
processes and human resource development. European Journal of Work and Organizational
Psychology, 17:5–32, 2008.
N.R. Jennings, L. Moreau, D. Nicholson, S. Ramchurn, S. Roberts, T. Rodden, and A. Rogers.
Human-agent collectives. Communications of the ACM, 57(12):80–88, 2014.
M. Kargar, A. An, and M. Zihayat. Efficient bi-objective team formation in social networks. In
Proceedings of the 2012 European Conference on Machine Learning and Knowledge Discovery
in Databases - Volume Part II, pages 483–498, Berlin, Heidelberg, 2012. Springer-Verlag.
R. Knapp. Collective (team) learning process models: A conceptual review. Human Resource
Development Review, 9:286–299, 2010.
L. Komaki. LEA.
S.W. Kozlowski and D.R. Ilgen.
31
S.W.J. Kozlowski and B.S Bell. Work groups and teams in organizations: Review update. 2013.
Marjan Laal and Peyman Salamati. Lifelong learning; why do we need it? Procedia-Social and
Behavioral Sciences, 31:399–403, 2012.
T. Lappas, K. Liu, and E. Terzi. Finding a team of experts in social networks. In Proceedings of
the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
pages 467–476, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-495-9.
S. Liemhetcharat and M. Veloso. Team formation with learning agents that improve coordination.
In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent
Systems, AAMAS '14, pages 1531–1532, Richland, SC, 2014. International Foundation for
Autonomous Agents and Multiagent Systems.
S. Liemhetcharat and M.M. Veloso. Modeling and learning synergy for team formation with
In International Conference on Autonomous Agents and Multiagent
heterogeneous agents.
Systems, AAMAS 2012, Valencia, Spain, June 4-8, 2012 (3 Volumes), pages 365–374, 2012.
L.S. Marcolino, A.X. Jiang, and A Tambe. Multi-agent team formation: Diversity beats
strength? In IJCAI 2013, Proceedings of the 23rd International Joint Conference on Artificial
Intelligence, Beijing, China, August 3-9, 2013, 2013.
L.S. Marcolino, H. Xu, D. Gerber, B. Kolev, S. Price, E. Pantazis, and M. Tambe. Multi-agent
team formation for design problems. In Coordination, Organizations, Institutions and Norms
in Agent Systems XI. Springer-Verlag Lecture Notes in AI, 2016.
M.A. Marks, J.E. Mathieu, and S.J. Zaccaro. A temporally based framework and taxonomy of
team processes. Academy of management review, 26(3):356–376, 2001.
Jr. Martz, W.B., R.R. Vogel, and Jr. Nunamaker, J.F. Electronic meeting systems: Results from
the field. Decision Support Systems, (8):141–158, 1992.
J. Mathieu, M .T. Maynard, T. Rapp, and L. Gilson. Team effectiveness 1997-2007: A review of
recent advancements and a glimpse into the future. Journal of Management, 34(3):410–476,
2008.
J.E. Mathieu, M.T. Maynard, S.R. Taylor, L.L. Gilson, and T.M. Rudy. An examination of
the effects of organizational district and team contexts on team processes and performance.
Journal of Organizational Behavior, 28:891–910, 2007.
J.E. McGrath. Groups: Interaction and performance, volume 14. Prentice-Hall Englewood Cliffs,
NJ, 1984.
R. Meneses and J. Navarro. How to improve team effectiveness through group processes: an
example in the automotive industry. Papeles del Psic´ologo, 36(3):224–229, 2015.
M.K. Mount, M.R. Barrick, and G.L. Stewart. Five-factor model of personality and performance
in jobs involving interpersonal interactions. (11):145–65, 1998.
I. Myers Briggs, M.H. McCaulley, N.L. Quenk, and A.L. Hammer. Consulting Psychologists
Press.
V. Nagarajan, L.S. Marcolino, and M. Tambe. Every team deserves a second chance: Identifying
when things go wrong (student abstract version). In Proceedings of the Twenty-Ninth AAAI
Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, USA., pages 4184–
4185, 2015.
32
J. Navarro, S. Quijano, R. Berger, and R. Meneses. Work-groups in organizations: A basic tool
to manage increasing complexity and ambiguity. Papeles del Psicologo, 32:17–28, 2011.
T. Okimoto, N. Schwind, M. Clement, T. Ribeiro, K. Inoue, and P. Marquis. How to form a task-
oriented robust team.
In Proceedings of the 2015 International Conference on Autonomous
Agents and Multiagent Systems, AAMAS '15, pages 395–403. International Foundation for
Autonomous Agents and Multiagent Systems, 2015.
F. Olivera and L. Argote. Organizational learning and new product development: Core processes.
Shared cognition in organizations: The management of knowledge, pages 297–326, 1999.
C.K. Oyster. Groups: A Users Guide. McGraw-Hill, Boston, 1999.
A. Peleteiro, J.C. Burguillo-Rial, M. Luck, J.L. Arcos, and J.A. Rodr´ıguez-Aguilar. Using
reputation and adaptive coalitions to support collaboration in competitive environments.
Engineering applications of artificial intelligence, 45:325–338, 2015.
Philip M Podsakoff, Scott B MacKenzie, and Michael Ahearne. Moderating effects of goal
acceptance on the relationship between group cohesiveness and productivity. Journal of Applied
Psychology, 82(6):974, 1997.
S Quijano, J Navarro, M Yepes, R Berger, and M Romeo. Human system audit (hsa) for the
analysis of human behaviour in organizations. Papeles del Psic´ologo, 29(1):92–106, 2008.
T. Rahwan, T.P. Michalak, E. Elkind, P. Faliszewski, J. Sroka, M. Wooldridge, and N.R. Jennings.
Constrained coalition formation. In Wolfram Burgard and Dan Roth, editors, AAAI. AAAI
Press, 2011.
S. D. Ramchurn, A. Farinelli, K. S. Macarthur, and N. R. Jennings. Decentralized coordination
in robocup rescue. Comput. J., 53(9):1447–1461, November 2010. ISSN 0010-4620. doi: 10.
1093/comjnl/bxq022. URL http://dx.doi.org/10.1093/comjnl/bxq022.
S.D. Ramchurn, F. Wu, J.E. Fischer, S. Reece, J. W, S.J. Roberts, T. Rodden, and N.R. Jennings.
Human-agent collaboration for disaster response. Journal of Autonomous Agents and Multi-
Agent Systems, pages 1–30, 2016.
M. Ramezan. Intellectual capital and organizational organic structure in knowledge society: How
are these concepts related? International Journal of Information Management, 31:88–95, 2011.
B. Ramirez-Heller, R. Berger, and F.C. Brodbeck. Does an adequate team climate for learning
predict team effectiveness and innovation potential? a psychometric validation of the team
climate questionnaire for learning in an organizational context. Procedia - Social and Behavioral
Sciences, 114:543–550, 2014.
S.S. Rangapuram, T. Buhler, and M. Hein. Towards realistic team formation in social networks
based on densest subgraphs. CoRR, abs/1505.06661, 2015.
R. Rico, C.M. Alcover, and C.D. Tabernero. Efectividad de los equipos de trabajo, una revision
de la ultima decada de investigacion (1999- 2009). Revista de Psicologia del Trabajo y de las
Organizaciones, 26:47–71, 2010.
I. Rochlin, Y. Aumann, D. Sarne, and L. Golosman. Efficiency and fairness in team search with
self-interested agents. Autonomous Agents and Multi-Agent Systems, 30(3):526–552, 2016.
R.A. Roe. What makes a competent psychologist? European Psychologist, 7(3):192, 2002.
M. Rokicki, S. Zerr, and S. Siersdorfer. Groupsourcing: Team competition designs for crowd-
sourcing. In Proceedings of the 24th International Conference on World Wide Web, WWW
2015, Florence, Italy, May 18-22, 2015, pages 906–915, 2015.
33
E. Salas, D.E. Sims, and C.S. Burke. Is there a big five in teamwork? Small group research, 36
(5):555–599, 2005.
W.C. Schutz. Firo: A three dimensional theory of interpersonal behavior. 1958.
M. Spradling, J. Goldsmith, X. Liu, C. Dadi, and Z. Li. Roles and teams hedonic game. In ADT,
volume 8176 of Lecture Notes in Computer Science, pages 351–362. Springer, 2013.
Kerrie Unsworth and Michael West. Teams: The challenges of cooperative work. Introduction to
Work and Organizational Psychology. Blackwell Publishing, Oxford, UK, pages 327–346, 2000.
M.A. West. Effective Teamwork: Practical Lessons Learned from Organizational Research. Wiley-
Blackwell, West Sussex, 2012a.
M.A. West. Effective teamwork: Practical lessons from organizational research. John Wiley and
Sons, 2012b.
K.B. White. Mis project teams: An investigation of cognitive style implications. (8(2)):95–101,
1984.
D.J. Wilde. Teamology: The Construction and Organization of Effective Teams. Springer-Verlag,
London, 2009.
D.J. Wilde.
Jungs Personality Theory Quantified.
Springer-Verlag London, 2011.
ISBN
0857290991,9780857290991.
D.J. Wilde. Post-Jungian Personality Theory for Individuals and Teams. SYDROSE LP, 2013.
ISBN 9780615944548. URL https://books.google.es/books?id=-hAjngEACAAJ.
J.L. Wildman, A.L. Thayer, M.A. Rosen, E. Salas, J.E. Mathieu, and S.R. Rayne. Task types and
team-level attributes: Synthesis of team classification literature. Human Resource Development
Review, 11:97–129, March 2012.
C. Zellmer-Bruhn, M.and Gibson. Multinational organization context: Implications for team
learning and performance. Academy of Management Journal, 494:501–518, 2006.
34
|
1706.04315 | 1 | 1706 | 2017-06-14T04:53:42 | RoboCup 2D Soccer Simulation League: Evaluation Challenges | [
"cs.MA"
] | We summarise the results of RoboCup 2D Soccer Simulation League in 2016 (Leipzig), including the main competition and the evaluation round. The evaluation round held in Leipzig confirmed the strength of RoboCup-2015 champion (WrightEagle, i.e. WE2015) in the League, with only eventual finalists of 2016 competition capable of defeating WE2015. An extended, post-Leipzig, round-robin tournament which included the top 8 teams of 2016, as well as WE2015, with over 1000 games played for each pair, placed WE2015 third behind the champion team (Gliders2016) and the runner-up (HELIOS2016). This establishes WE2015 as a stable benchmark for the 2D Simulation League. We then contrast two ranking methods and suggest two options for future evaluation challenges. The first one, "The Champions Simulation League", is proposed to include 6 previous champions, directly competing against each other in a round-robin tournament, with the view to systematically trace the advancements in the League. The second proposal, "The Global Challenge", is aimed to increase the realism of the environmental conditions during the simulated games, by simulating specific features of different participating countries. | cs.MA | cs |
RoboCup 2D Soccer Simulation League: Evaluation
Challenges
Mikhail Prokopenko1, Peter Wang2, Sebastian Marian3, Aijun Bai4, Xiao Li5 and
Xiaoping Chen5
1 Complex Systems Research Group, Faculty of Engineering and IT
The University of Sydney, NSW 2006, Australia
[email protected]
2 Data Mining, CSIRO Data61, PO Box 76, Epping, NSW 1710, Australia
3 Compa-IT, Romania
4 Department of Electrical Engineering and Computer Sciences
University of California Berkeley
5 Multi-Agent Systems Lab, School of Computer Science and Technology,
University of Science and Technology of China
Abstract. We summarise the results of RoboCup 2D Soccer Simulation League
in 2016 (Leipzig), including the main competition and the evaluation round.
The evaluation round held in Leipzig confirmed the strength of RoboCup-2015
champion (WrightEagle, i.e. WE2015) in the League, with only eventual finalists
of 2016 competition capable of defeating WE2015. An extended, post-Leipzig,
round-robin tournament which included the top 8 teams of 2016, as well as
WE2015, with over 1000 games played for each pair, placed WE2015 third be-
hind the champion team (Gliders2016) and the runner-up (HELIOS2016). This
establishes WE2015 as a stable benchmark for the 2D Simulation League. We
then contrast two ranking methods and suggest two options for future evaluation
challenges. The first one, "The Champions Simulation League", is proposed to
include 6 previous champions, directly competing against each other in a round-
robin tournament, with the view to systematically trace the advancements in the
League. The second proposal, "The Global Challenge", is aimed to increase the
realism of the environmental conditions during the simulated games, by simulat-
ing specific features of different participating countries.
1 Introduction
The International RoboCup Federation's Millennium challenge sets an inspirational tar-
get that by mid-21st century, a team of fully autonomous humanoid soccer players shall
win the soccer game, complying with the official rule of the FIFA, against the winner
of the most recent World Cup [1]. In pursuit of this goal, the RoboCup Federation has
introduced multiple leagues, with both physical robots and simulation agents, which
have developed different measures of their progress over the years. The main mode, of
course, is running competitions at the national, regional and world cup levels. In addi-
tion, however, various leagues have included specific evaluation challenges which not
only complement the competitions, but also advance the scientific and technological
2
Prokopenko et al.
base of RoboCup and Artificial Intelligence in general. Typically, a challenge intro-
duces some new features into the standard competition environment, and then evaluates
how the teams perform under the new circumstances.
For example, during an evaluation round of RoboCup 2001 the rules of the soccer
simulator were modified in such a way that "dashing on the upper half of the field
resulted in only half of normal speed for all the players" [2]. This modification was
not announced in advance, and while the changed conditions were obvious to human
spectators, none of the simulation agents could diagnose the problem [2].
A specific technical challenge was presented by the so-called Keepaway problem
[3], when one team (the "keepers") attempt to keep the ball away from the other team
(the "takers") for as long as possible.
Later on, the focus of evaluation in RoboCup 2D Soccer Simulation League shifted
from changing the physics of the simulation or the tactics of the game, to studying
the diverse "eco-system" of the League itself, which has grown to include multiple
teams. The Simulated Soccer Internet League (SSIL) was designed to allow a continual
evaluation of the participating teams during the time between annual RoboCup events:
pre-registered teams could upload their binaries to a server on which games were played
automatically [4]. The SSIL was used at some stage as a qualification pathway to the
annual RoboCup, but this practice was discontinued due to verification problems.
Several other challenges and technical innovations introduced in Soccer Simulation
Leagues (both 2D and 3D), including heterogeneous players, stamina capacity model,
and tackles, are described in [5]. This study further pointed out the importance of the
online game analysis and online adaptation.
More recently, a series of "drop-in player challenges" was introduced by [6] in or-
der to investigate how real or simulated robots from teams from around the world can
cooperate with a variety of unknown teammates. In each evaluation game, robots/agents
are drawn from the participating teams and combined to form a new team, in the hope
that the agents would be able to quickly adapt to meaningfully play together without
pre-coordination. The "drop-in" challenge was adopted by RoboCup Standard Platform
League (SPL) and both RoboCup Soccer Simulation Leagues, 2D and 3D. In all the con-
sidered leagues, the study observed "a trend for agents that perform better at standard
team soccer to also perform better at the drop-in player challenge" [6].
At RoboCup-2016 in Leipzig, several soccer and rescue leagues increased realism
of the competition by holding their competitions outdoors. In the SPL, a separate com-
petition was successfully held not on the customary green carpet but rather on an ar-
tificial turf, under diverse natural lighting conditions. Similarly, Middle Size Soccer
League also successfully implemented a Technical Challenge under these difficult con-
ditions, while the Humanoid League used artificial turf and real soccer balls6.
In this paper, we describe the latest evaluation challenge, introduced by RoboCup
2D Soccer Simulation League [7,8] in 2016, in order to trace the progress of the overall
League. Furthermore, we describe two possibilities for future challenges: one intended
to systematically trace the advancements in the League ("The Champions Simulation
League"), and the other aimed to increase the realism of the environmental conditions
during the simulated games ("The Global Challenge").
6 http://robocup2016.org/press-releases/leipzig-best-place-for-robots-and-friends/452749
RoboCup 2D Soccer Simulation League: Evaluation Challenges
3
2 Methodology and Results
2.1 Actual competition
The RoboCup-2016 Soccer Simulation 2D League included 18 teams from 9 countries:
Australia, Brazil, China, Egypt, Germany, Iran, Japan, Portugal and Romania. The last
group stage was a round-robin tournament for top 8 teams. It was followed by the
two-game semi-final round, a single-game final, and 3 more playoffs between third and
fourth, fifth and sixth, and seventh and eighth places.
In the two-game semi-final round, HELIOS2016 (Japan) [9] defeated team Ri-
one (Japan) [10], 3:0 and 4:0, while Gliders2016 (Australia) [11,12] defeated team
CSU Yunlu (China) [13], winning both games with the same score 2:1.
The single-game final between HELIOS2016 and Gliders2016 went into the extra
time, and ended with Gliders2016 winning 2:1.
The third place was taken by team Ri-one which won against CSU Yunlu 3:0.
Oxsy (Romania) [14] took the fifth place, winning 4:0 against Shiraz (Iran) [15]; and
MT2016 (China) [16] became seventh, winning against FURY (Iran) [17] on penalties
4:2. The final ranking of RoboCup-2016 (Leipzig, Germany) is shown in the left column
of Table 1.
2.2 Ranking Estimation
Using the ranking estimation methodology established by [18,19], we conducted an
8-team round-robin tournament for top 8 teams from RoboCup-2016. The estimation
process used the released binaries of top RoboCup-2016 teams7, where all 28 pairs
of teams play approximately 4000 games against one another. The following discrete
scheme was used for discrete point calculation:
-- Firstly, the average score between each pair of teams (across all 4000 games) is
rounded to the nearest integer (e.g. "1.2 : 0.5" is rounded to "1 : 1").
-- Next, points are allocated for each pairing based on these rounded results: 3 for a
win, 1 for a draw and 0 for a loss.
-- Teams are then ranked by the sum of the points received against each opponent.
The total goal difference of the rounded scores is used as a tie-breaker.
The final ranking r
d under this scheme is presented in Table 1.
In order to capture the overall difference between any two rankings r
a and r
b, the
L1 distance is utilised [18]:
d1(r
a, r
b) = kr
a − r
bk1 =
n
X
i=1
ra
i − rb
i ,
(1)
where i is the index of the i-th team in each ranking, 1 ≤ i ≤ 8.
The distance between the actual ranking r
a and the estimated ranking r
d is
d1(r
a, r
d) = 1 − 1+ 2 − 2+ 3 − 6+ 4 − 4+ 5 − 3+ 6 − 5+ 7 − 8+ 8 − 7 = 8.
7 https://chaosscripting.net/files/competitions/RoboCup/WorldCup/2016/2DSim/binaries/
4
Prokopenko et al.
Gliders HELIOS Ri-one CSU Yunlu Oxsy
Shiraz MT2016 FURY Goals Points rd
Gliders
0.3 : 0.4 2.8 : 0.3
1.9 : 0.3
0.7 : 0.8 3.8 : 0.4 5.0 : 0.0 2.5 : 0.2 18 : 1
HELIOS 0.4 : 0.3
1.8 : 0.1
3.0 : 0.2
1.2 : 0.5 4.3 : 0.3 3.6 : 0.0 2.5 : 0.0 17 : 1
Ri-one
0.3 : 2.8 0.1 : 1.8
1.1 : 1.1
0.2 : 1.8 0.6 : 0.5 0.4 : 0.0 0.6 : 0.5 3 : 10
CSU Yunlu 0.3 : 1.9 0.2 : 3.0 1.1 : 1.1
0.5 : 1.2 2.0 : 0.7 1.4 : 0.0 1.2 : 0.4 6 : 8
Oxsy
0.8 : 0.7 0.5 : 1.2 1.8 : 0.2
1.2 : 0.5
3.5 : 0.5 4.4 : 0.0 3.0 : 0.1 16 : 4
Shiraz
0.4 : 3.8 0.3 : 4.3 0.5 : 0.6
0.7 : 2.0
0.5 : 3.5
0.5 : 0.1 0.8 : 1.0 5 : 16
MT2016
0.0 : 5.0 0.0 : 3.6 0.0 : 0.4
0.0 : 1.4
0.0 : 4.4 0.1 : 0.5
0.0 : 0.0 0 : 15
FURY
0.2 : 2.5 0.0 : 2.5 0.5 : 0.6
0.4 : 1.2
0.1 : 3.0 1.0 : 0.8 0.0 : 0.0
2 : 12
17
17
4
11
15
5
2
3
1
2
6
4
3
5
8
7
Table 1. Round-robin results (average goals scored and points allocated with the discrete scheme)
for the top 8 teams from RoboCup 2016, ordered according to their final actual competition
a. The scores are determined by calculating the average number of goals scored over
rank, r
approximately 4000 games rounded to the nearest integer, then awarding 3 points for a win, 1
point for a draw and 0 points for a loss. The resultant ranking is marked with r
d.
The top two teams were fairly close in their performance (confirmed by the fi-
nal game, which needed extra time). Similarly the 7th and 8th teams were similar in
strength too (not surprisingly their playoff ended up with penalties). The main discrep-
ancy between the actual and estimated results is due to performances of two teams:
Oxsy (whose rank is estimated as third, while the actual rank was only fifth) and Ri-one
(which finished the competition as third, while its average rank is estimated to be sixth).
2.3 A critique of the continuous ranking scheme
There exists another ranking method: continuous scheme [18,19]:
-- Teams are ranked by the sum of average points obtained against each opponent
across all 4000 games.
-- The total goal difference of the non-rounded scores is used as a tie-breaker.
Both schemes, discrete and continuous, were introduced in order to evaluate dif-
ferent competition formats, using the top 8 teams of 2012 and 2013 [18,19]. However,
over the years it has become apparent that the continuous scheme suffers from two ma-
jor drawbacks, violating the balance of points (3 for a win, 1 for a draw and 0 for a loss)
and overestimating the points for draws and losses. Specifically, under the continuous
scheme:
1. there is a bias to attribute more points to draws with higher scores.
2. there is a bias to reduce the advantage of the three-points-for-a-win standard.
1. Let us consider two opposite scenarios: (i) two teams A and B of equal strengths,
denoted A ⇔ B, but with a stronger defensive capability, play N games resulting in
the average 0 : 0 score; and (ii) two teams X and Y of equal strengths X ⇔ Y , but
with a stronger attacking capability, play N games resulting in the average q : q score,
where q > 0 is sufficiently large, e.g., q = 3. In the first pair, the scores of individual
games, which may or may not be draws, do not diverge much from 0 : 0, as the teams
are defensive. And so the actual drawn scores 0 : 0 dominate among the results, with
RoboCup 2D Soccer Simulation League: Evaluation Challenges
5
large outliers k : 0 or 0 : k, for k > 0 being relatively rare. Thus, the continuous points
p attained by teams A and B stay close to 1.0, for example, pA ≈ pB ≈ 1.2.
In the second pair, the scores of individual games, which again may or may not be
draws, diverge more from the average q : q, due to a higher variability of possible high
scores. Consequently, the proportion of actual draws among N games is much smaller
in comparison to the first pair, and the large outliers k : 0 or 0 : k, even for k > q, are
more numerous. As a result, the teams X and Y exchange wins and losses more often
than teams A and B, acquiring more points for their respective wins. This yields the
continuous points pX and pY significantly higher than 1.0, for example, pX ≈ pY ≈
1.4, creating a general bias to attribute more points to the drawn contests with higher
scores: pA ≈ pB < pX ≈ pY . A typical sample of 10,000 scores q1 : q2, where
both q1 and q2 are normally distributed around the same mean q, with the standard
deviation σ = 1.0, results in the following continuous points p⇔(q) for different draws
around q: p⇔(0) = 1.23 for draws 0.38 : 0.38, p⇔(1) = 1.33 for draws 1.07 : 1.08,
p⇔(2) = 1.36 for draws 1.99 : 2.00, and p⇔(3) = 1.38 for draws 3.02 : 3.00.
While the higher scoring teams may be expected to get an advantage at a tie-breaker
stage, getting more continuous points for the same outcome is obviously an unfair bias.
The discrete scheme does not suffer from this drawback as the average scores are con-
verted into the identical discrete points immediately, i.e., pA = pB = pX = pY = 1.0.
It is easy to see that the lower bound for the continuous points shared by any two
teams of equal strength is inf ⇔ = 1.0 (attainable only if all N games are drawn),
while the upper bound is sup⇔ = 1.5 (attained in the extreme case when all N games
are non-draws, with wins and losses split equally). Consequently, under the continuous
scheme, the points attributed to equal teams drawing on average, are overestimated,
being somewhere between the lower and upper bounds: inf ⇔ < p < sup⇔, while the
expected result (one point) sits only at exactly the lower bound.
2. The "three-points-for-a-win" standard which was widely adopted since FIFA
1994 World Cup finals "places additional value on wins with respect to draws such
that teams with a higher number of wins may rank higher in tables than teams with a
lower number of wins but more draws"8. To illustrate the second drawback of the con-
tinuous scheme we will contrast two scenarios, comparing the combined points of two
drawn contests against the combination of one-won and one-lost contests.
Firstly, we consider a case when team Q is paired with teams U and Z, such that
Q ⇔ U and Q ⇔ Z. We do not expect transitivity, and so U ⇔ Z is not assumed. The
continuous points for team Q resulting from these two iterated match-ups, both drawn,
could vary between these lower bound (inf ⇔,⇔) and upper bound (sup⇔,⇔):
inf
⇔,⇔
= inf
⇔
+ inf
⇔
= 2.0
sup
⇔,⇔
= sup
+ sup
= 3.0
⇔
⇔
Typically the combined points vary around the level of pQ ≈ 2.6, which is an overesti-
mation of the ideal outcome by more than half-a-point.
Secondly, we consider a scenario with team R matched-up against teams V and W ,
with team V being weaker than R, denoted R ⇒ V , while the team W is stronger
8 https://en.wikipedia.org/wiki/Three points for a win
6
Prokopenko et al.
than R, denoted R ⇐ W . The relative strength of V and W is not important for our
comparison. The continuous points that team R attains from the first pair, against the
weaker opponent V , are bounded by inf ⇒ = 1.5 (just a slight over-performance) and
sup⇒ = 3.0 (the total dominance with all N games won):
1.5 = inf
⇒
< pR < sup
= 3.0 .
⇒
In practice, the stronger team rarely drops below pR ≈ 2.0 points. In the second pair,
team R is weaker, and its continuous points are bounded by inf ⇐ = 0.0 (the total
inferiority with all N games lost) and sup⇐ = 1.5 (getting almost to an equal standing):
0.0 = inf
⇐
< pR < sup
= 1.5 .
⇐
In practice, the weaker team rarely reaches beyond pR ≈ 1.0 points. A typical sample
of 10,000 scores q1 : q2, where q1 and q2 are normally distributed around the means
q and 0.0 respectively, with the standard deviation σ = 1.0, results in the following
continuous points p⇒(q) for different won contests around q: p⇒(1) = 2.31 for wins
1.07 : 0.38, p⇒(2) = 2.75 for wins 2.00 : 0.38, and p⇒(3) = 2.94 for wins 2.97 : 0.38.
Correspondingly, the continuous points p(q) for the respective lost contests sampled
under the same distribution are overestimated above 0.0 as follows: p⇐(1) = 0.32,
p⇐(2) = 0.13, and p⇐(3) = 0.04.
The combined continuous points for team R after these match-ups, one won and
one lost, could vary between the lower bound of and the upper bound of
inf
⇒,⇐
= inf
⇒
+ inf
⇐
= 1.5
sup
⇒,⇐
= sup
+ sup
= 4.5
⇒
⇐
In practice, 2.0 < pR < 4.0. That is, the combined continuous points of a win and a
loss typically vary around pR ≈ 3.0, which is an appropriate outcome.
Contrasting the possible bounded intervals and typical outcomes of two contests
(two draws versus one win and one loss) immediately highlights that the continuous
points do not differentiate these scenarios sufficiently well. The intention of the three-
points-for-a-win standard was precisely to preference the one-win-and-one-loss sce-
nario over the two-draws scenario, p⇒,⇐ = 3 > p⇔,⇔ = 2. In other words, team Q
with two drawn contests should achieve a lower rank than team R with a won and a
lost contest, with the difference being the cost of a single drawn game. The continuous
scheme fails in this regard, by producing, on average, less than half-a-point difference,
p⇒,⇐ ≈ 3.0 > p⇔,⇔ ≈ 2.6. In fact, it is quite conceivable that p⇒,⇐ could happen to
be less than p⇔,⇔ under the continuous scheme in some cases, as inf ⇒,⇐ < sup⇔,⇔.
In other words, one hard-won contest, e.g. p⇒(1) = 2.31, coupled with a serious loss,
e.g., p⇐(3) = 0.04 could earn less points (e.g., p⇒,⇐ ≈ 2.35) than two high-scoring
draws, e.g. p⇔(3) = 1.38 (resulting in p⇔,⇔ ≈ 2.76) -- definitely, something not
intended by the three-points-for-a-win standard.
Again, the discrete scheme easily overcomes this drawback as the average scores
are converted into the appropriate discrete points for each contest (3 for a win, 1 for a
draw and 0 for a loss), and combined only afterwards.
RoboCup 2D Soccer Simulation League: Evaluation Challenges
7
The two problems identified for the continuous scheme may amplify over many
match-ups in a 8-teams round-robin, especially when there are many teams of similar
strength (which is the case in the Simulation League in recent years). The biases become
even more pronounced in the absence of transitivity in teams' relative strengths. In
light of these concerns, we suggest that some recent works employing the continuous
scheme, e.g. [20], would benefit from re-evaluation.
2.4 Evaluation round
The 2016 competition also included an evaluation round, where all 18 participating
teams played one game each against the champion of RoboCup-2015, team WrightEa-
gle (China), i.e., WE2015 [21]. Only two teams, the eventual finalists Gliders2016 and
HELIOS2016, managed to win against the previous year champion, with Gliders de-
feating WrightEagle 1:0, and HELIOS2016 producing the top score 2:1.
We extended this evaluation over 1000 games, again playing WE2015 against the
top 8 teams from RoboCup-2016. Table 2 summarises the evaluation for RoboCup-
2016: both actual scores obtained in Leipzig and the averages over 1000 games.
Gliders2016 HELIOS2016 Ri-one CSU Yunlu Oxsy
Shiraz2016 MT2016 FURY
WE2015
0 : 1
1 : 2
7 : 1
2 : 0
4 : 1
3 : 2
4 : 0
11 : 2
WE2015
1.4 : 1.8
1.3 : 1.7
5.0 : 0.5
2.7 : 0.5
3.5 : 1.3
4.0 : 0.8
5.9 : 0.0 4.8 : 0.4
Table 2. Evaluation round results for the top 8 teams playing against WE2015. Top row: actual
scores obtained at RoboCup-2016 in Leipzig; bottom row: average scores over 1000 games.
The evaluation round confirmed the strength of RoboCup-2015 champion in the
League. It is evident that WE2015, if entered in 2016, would likely have achieved third
rank. To confirm this conjecture we combined the estimation results presented in Table
1 with the estimates of WE2015 scores from Table 2, summarised in Table 3.
Gliders HELIOS WE2015 Ri-one CSU Yunlu Oxsy
Shiraz MT2016 FURY Goals Points re
Gliders
0.3 : 0.4 1.8 : 1.4 2.8 : 0.3
1.9 : 0.3
0.7 : 0.8 3.8 : 0.4 5.0 : 0.0 2.5 : 0.2 20 : 2
HELIOS 0.4 : 0.3
1.7 : 1.3 1.8 : 0.1
3.0 : 0.2
1.2 : 0.5 4.3 : 0.3 3.6 : 0.0 2.5 : 0.0 19 : 2
WE2015
1.4 : 1.8 1.3 : 1.7
5.0 : 0.5
2.7 : 0.5
3.5 : 1.3 4.0 : 0.8 5.9 : 0.0 4.8 : 0.4 29 : 8
Ri-one
0.3 : 2.8 0.1 : 1.8 0.5 : 5.0
1.1 : 1.1
0.2 : 1.8 0.6 : 0.5 0.4 : 0.0 0.6 : 0.5 4 : 15
CSU Yunlu 0.3 : 1.9 0.2 : 3.0 0.5 : 2.7 1.1 : 1.1
0.5 : 1.2 2.0 : 0.7 1.4 : 0.0 1.2 : 0.4 7 : 11
Oxsy
0.8 : 0.7 0.5 : 1.2 1.3 : 3.5 1.8 : 0.2
1.2 : 0.5
3.5 : 0.5 4.4 : 0.0 3.0 : 0.1 17 : 8
Shiraz
0.4 : 3.8 0.3 : 4.3 0.8 : 4.0 0.5 : 0.6
0.7 : 2.0
0.5 : 3.5
0.5 : 0.1 0.8 : 1.0 6 : 20
MT2016
0.0 : 5.0 0.0 : 3.6 0.0 : 5.9 0.0 : 0.4
0.0 : 1.4
0.0 : 4.4 0.1 : 0.5
0.0 : 0.0 0 : 21
FURY
0.2 : 2.5 0.0 : 2.5 0.4 : 4.8 0.5 : 0.6
0.4 : 1.2
0.1 : 3.0 1.0 : 0.8 0.0 : 0.0
2 : 17
20
20
18
4
11
15
5
2
3
1
2
3
7
5
4
6
9
8
Table 3. Evaluation round-robin results (average goals scored and points allocated with discrete
scheme), combined for the top 8 teams from RoboCup 2016 and the RoboCup-2015 champion
(WE2015). The resultant evaluation ranking is marked with r
e.
8
Prokopenko et al.
Gliders2016 WE2015 WE2014 WE2013 HELIOS2012 WE2011 Goals Points rl
Gliders2016
1.8 : 1.4
1.8 : 1.3
1.7 : 0.9
1.2 : 0.1
2.0 : 1.0
9 : 4
15
WE2015
1.4 : 1.8
2.5 : 2.5
3.0 : 2.5
2.2 : 0.9
4.0 : 2.9
13 : 12
WE2014
1.3 : 1.8
2.5 : 2.5
2.8 : 2.6
2.3 : 0.8
3.9 : 3.0
13 : 12
WE2013
0.9 : 1.7
2.5 : 3.0
2.6 : 2.8
1.9 : 0.9
2.9 : 3.2
12 : 12
HELIOS2012
0.1 : 1.2
0.9 : 2.2
0.8 : 2.3
0.9 : 1.9
2.6 : 1.8
6 : 9
WE2011
1.0 : 2.0
2.9 : 4.0
3.0 : 3.9
3.2 : 2.9
1.8 : 2.6
12 : 16
8
8
6
3
1
1
2
3
4
5
6
Table 4. Champions Simulation League round-robin results (average goals scored and points
allocated with discrete scheme), for six champions of RoboCup 2011 to 2016. To distinguish
WE2015 and WE2014 results, non-rounded scores were used as a tie-breaker. The resultant
league ranking with discrete point allocation scheme is marked with r
l.
3 Proposed challenges
3.1 Champions Simulation League
In order to trace the progress of the League over time it is interesting to compare per-
formance of several previous champions, directly competing against each other in a
round-robin tournament. For example, we evaluated relative performance of six cham-
pions of RoboCup-2011 to RoboCup-2016: WrightEagle (WE2011 [22,23], WE2013
[24,25], WE2014 [26], WE2015 [21]), HELIOS2012 [27] and Gliders2016 [11,12].
The round-robin results over 1000 games, presented in Table 4, confirmed the progress
of the League over the last six years, with the resultant ranking r
with the chronological ranking r
t, i.e., d1(r
l completely concurring
l, r
t) = 0.
3.2 Global Challenge
Another proposal suggests to pit together the best teams from each of the top 6 or
8 participating countries (for example, in 2016 it would have been Australia, Brazil,
China, Egypt, Germany, Iran, Japan, Romania), with two "home-and-away" games be-
tween opponents. There can be 14 games for a home-and-away single-elimination round
with 8 teams; or 30 games for a home-and-away double round-robin with 6 teams.
The "Global Challenge" will be distinguished from the main competition by playing
the games with different parameters, for example, higher noise, or even with random
player(s) disconnecting. In other words, the Global Challenge will focus on resilience
of the teams in the face of unexpected conditions.
In each game, the home side would choose a hidden parameter to vary, in order to
represent some features of their country (like high altitude in Bolivia or long-distance
travel to Australia). These parameters will not be known to the opposition, but would
be the same for both teams in that game.
The full list of possible hidden server parameters may include a significant num-
ber (currently, the number of server parameters is 27) and the set of changeable pa-
rameters will be agreed in advance. The global challenge mode will be selected via
a new parameter, for example, server::global challenge mode, introduced in the sim-
ulation server (server.conf). When the global challenge mode parameter is set to true,
the server will permit the left side coach (the home side) to send a command like this:
(change player param (param 1 value) (param 2 value). . . (param N value)).
RoboCup 2D Soccer Simulation League: Evaluation Challenges
9
For example, if the home side chooses to simulate some bad weather conditions
or a soggy pitch, these server parameters can be changed: ball accel max, ball decay,
ball rand, ball speed max, catch probability, inertia moment, kick rand, player rand.
Exploiting their own strong points, and possibly trying to exploit some weak points
of the opponent, the home side could change some of the available parameters in a way
that creates an advantage. While the adjusted environment will be applied equally to
the both teams, the task of the left side coach (the home team) will be to optimise the
choice of the adjusted parameters to maximise the home side advantage.
4 Conclusion
We summarised the results of RoboCup-2016 competition in the 2D Soccer Simula-
tion League, including the main competition and the evaluation round. The evaluation
round confirmed the strength of RoboCup-2015 champion (WrightEagle, i.e. WE2015)
in the League, with only eventual finalists of 2016 (Gliders2016 and HELIOS2016)
capable of winning against WE2015. After the RoboCup-2016, we extended this eval-
uation, over 1000 games for each pair, in a multi-game round-robin tournament which
included the top 8 teams of 2016, as well as WE2015. The round-robin results con-
firmed that WE2015 would take third place, behind the champion team (Gliders2016)
and the runner-up (HELIOS2016). This establishes WE2015 as a stable benchmark for
the 2D Simulation League. In doing so we offered a critique of a particular ranking
method (the continuous scheme), arguing that the discrete scheme is more appropriate.
We then followed with proposing two options to develop the evaluation challenge
further. The first such possibility introduces "The Champions Simulation League",
comprising several previous champions, directly competing against each other in a
round-robin tournament. "The Champions Simulation League" can systematically trace
the advancements in the League, measuring the progress of each new champion over
its predecessors. We evaluated The Champions Simulation League with the champions
from 2011 to 2016, producing a ranking which completely concurs with the chronologi-
cal order, and confirming a steady progress in the League. Arguably, simulation leagues
are the only ones in RoboCup where such an evaluation is possible, given the obvious
constraints and difficulties with running such a tournament in robotic leagues.
Tracing such advances is especially important because different champion teams
usually employ different approaches, often achieving a high degree of specialisation in
a sub-field of AI, for example, automated hierarchical planning developed by WrightEa-
gle [23,24,26,21,28], opponent modelling studied by HELIOS [27], and human-based
evolutionary computation adopted by Gliders [11,12]. Many more research areas are
likely to contribute towards improving the League, and several general research direc-
tions are recognised as particularly promising: nature-inspired collective intelligence
[29,30,31], embodied intelligence [32,33,34,35], information theory of distributed cog-
nitive systems [36,37,38,39,40,41], guided self-organisation [42,43,44], and deep learn-
ing [45,46,47].
The other proposed evaluation challenge ("The Global Challenge") aims to model
environmental conditions during the games by simulating specific features of differ-
ent participating countries, such as climate, infrastructure, travel distance, etc. This,
10
Prokopenko et al.
arguably, may increase the realism of the simulated competition, making another small
step toward the ultimate Millennium challenge.
5 Acknowledgments
A majority of RoboCup 2D Soccer Simulation teams, including the 2016 champion
team, Gliders2016, are based on the well-developed code base agent2d [48], release
of which has greatly benefited the RoboCup 2D Simulation community. Several teams,
including WrightEagle and Oxsy, are independent of agent2d.
References
1. Burkhard, H.D., Duhaut, D., Fujita, M., Lima, P., Murphy, R., Rojas, R.: The road to
RoboCup 2050. IEEE Robotics Automation Magazine 9(2) (Jun 2002) 31 -- 38
2. Obst, O.: Using model-based diagnosis to build hypotheses about spatial environments: A
response to a technical challenge. In Polani, D., Bonarini, A., Browning, B., Yoshida, K.,
eds.: RoboCup 2003: Robot Soccer World Cup VII. Lecture Notes in Artificial Intelligence.
Springer, Berlin, Heidelberg, New York (2004) 518 -- 525
3. Stone, P., Kuhlmann, G., Taylor, M.E., Liu, Y.: Keepaway soccer: From machine learning
testbed to benchmark. In Noda, I., Jacoff, A., Bredenfeld, A., Takahashi, Y., eds.: RoboCup-
2005: Robot Soccer World Cup IX. Volume 4020. Springer Verlag, Berlin (2006) 93 -- 105
4. Obst, O.: Simulation league - league summary. In Kaminka, G.A., Lima, P.U., Rojas, R., eds.:
RoboCup 2002: Robot Soccer World Cup VI. Volume 2752 of Lecture Notes in Computer
Science., Springer (2002) 443 -- 452
5. Akiyama, H., Dorer, K., Lau, N.: On the progress of soccer simulation leagues. In Bianchi,
R.A.C., Akin, H.L., Ramamoorthy, S., Sugiura, K., eds.: RoboCup 2014: Robot World Cup
XVIII. Volume 8992 of Lecture Notes in Computer Science., Springer (2014) 599 -- 610
6. MacAlpine, P., Genter, K., Barrett, S., Stone, P.: The robocup 2013 drop-in player challenges:
A testbed for ad hoc teamwork. In: Proceedings of the 2014 International Conference on
Autonomous Agents and Multi-agent Systems. AAMAS'14, International Foundation for
Autonomous Agents and Multiagent Systems (2014) 1461 -- 1462
7. Kitano, H., Tambe, M., Stone, P., Veloso, M.M., Coradeschi, S., Osawa, E., Matsubara, H.,
Noda, I., Asada, M.: The RoboCup Synthetic Agent Challenge 97. In: RoboCup-97: Robot
Soccer World Cup I, London, UK, Springer (1998) 62 -- 73
8. Noda, I., Stone, P.: The RoboCup Soccer Server and CMUnited Clients: Implemented Infras-
tructure for MAS Research. Autonomous Agents and Multi-Agent Systems 7(1 -- 2) (July --
September 2003) 101 -- 120
9. Akiyama, H., Nakashima, T., Henrio, J., Henn, T., Tanaka, S., Nakade, T., Fukushima, T.:
HELIOS2016: Team Description Paper. In: RoboCup 2016 Symposium and Competitions:
Team Description Papers, Leipzig, Germany, July 2016. (2016)
10. Asai, K., Katsumata, Y., Shibayama, T., Nomura, H., Kondo, R., Tanaka, H., Uchinishi, K.,
Mizumoto, M., Fuzimitsu, T., Sei, M., Tani, Y., Kubo, S., Matsushita, Y.: RoboCup 2016 - 2D
Soccer Simulation League Team Description Ri-one (Japan). In: RoboCup 2016 Symposium
and Competitions: Team Description Papers, Leipzig, Germany, July 2016. (2016)
11. Prokopenko, M., Wang, P.and Obst, O., Jaurgeui, V.: Gliders2016: Integrating multi-agent
In: RoboCup 2016 Symposium and Competitions: Team
approaches to tactical diversity.
Description Papers, Leipzig, Germany, July 2016. (2016)
RoboCup 2D Soccer Simulation League: Evaluation Challenges
11
12. Prokopenko, M., Wang, P.: Disruptive innovations in RoboCup 2D Soccer Simulation
League: from Cyberoos'98 to Gliders2016. In Behnke, S., Lee, D.D., Sariel, S., Sheh, R.,
eds.: RoboCup 2016: Robot Soccer World Cup XX. Lecture Notes in Artificial Intelligence.
Springer, Berlin (2016)
13. Li, P., Ma, X., Jiang, F., Zhang, X., Peng, J.: CSU Yunlu 2D Soccer Simulation Team De-
scription Paper 2016. In: RoboCup 2016 Symposium and Competitions: Team Description
Papers, Leipzig, Germany, July 2016. (2016)
14. Marian, S., Luca, D., Sarac, B., Cotarlea, O.: OXSY 2016 Team Description. In: RoboCup
2016 Symposium and Competitions: Team Description Papers, Leipzig, Germany, July 2016.
(2016)
15. Asali, E., Valipour, M., Afshar, A., Asali, O., Katebzadeh, M., Tafazol, S., Moravej, A.,
Salehi, S., Karami, H., Mohammadi, M.: Shiraz Soccer 2D Simulation Team Description
Paper 2016. In: RoboCup 2016 Symposium and Competitions: Team Description Papers,
Leipzig, Germany, July 2016. (2016)
16. Zhang, L., Yao, B., Chen, S., Lv, G.: MT2016 Robocup Simulation 2D Team Description. In:
RoboCup 2016 Symposium and Competitions: Team Description Papers, Leipzig, Germany,
July 2016. (2016)
17. Darijani, A., Mostaejeran, A., Jamali, M.R., Sayareh, A., Salehi, M.J., Barahimi, B.: FURY
2D Simulation Team Description Paper 2016. In: RoboCup 2016 Symposium and Competi-
tions: Team Description Papers, Leipzig, Germany, July 2016. (2016)
18. Budden, D., Wang, P., Obst, O., Prokopenko, M.: Simulation leagues: Analysis of competi-
tion formats. In: RoboCup 2014: Robot Soccer World Cup XVIII, Springer (2014)
19. Budden, D.M., Wang, P., Obst, O., Prokopenko, M.: Robocup simulation leagues: Enabling
replicable and robust investigation of complex robotic systems. IEEE Robotics and Automa-
tion Magazine 22(3) (2015) 140 -- 146
20. Gabel, T., Falkenberg, E., Godehardt, E.: Progress in RoboCup Revisited: The State of
Soccer Simulation 2D. In Behnke, S., Lee, D.D., Sariel, S., Sheh, R., eds.: RoboCup 2016:
Robot Soccer World Cup XX. LNAI. Springer, Berlin (2016)
21. Li, X., Chen, R., Chen, X.: WrightEagle 2D Soccer Simulation Team Description 2015. In:
RoboCup 2015 Symposium and Competitions: Team Description Papers, Hefei, China, July
2015. (2015)
22. Bai, A., Lu, G., Zhang, H., Chen, X.: WrightEagle 2D Soccer Simulation Team Description
2011. In: RoboCup 2011 Symposium and Competitions: Team Description Papers, Istanbul,
Turkey, July 2011. (2011)
23. Bai, A., Chen, X., MacAlpine, P., Urieli, D., Barrett, S., Stone, P.: WrightEagle and UT
In: RoboCup 2011: Robot
Austin Villa: RoboCup 2011 Simulation League Champions.
Soccer World Cup XV. Lecture Notes in Artificial Intelligence. Springer (2012)
24. Zhang, H., Jiang, M., Dai, H., Bai, A., Chen, X.: WrightEagle 2D Soccer Simulation Team
Description 2013. In: RoboCup 2013 Symposium and Competitions: Team Description Pa-
pers, Eindhoven, The Netherlands, June 2013. (2013)
25. Zhang, H., Chen, X.: The decision-making framework of WrightEagle, the RoboCup 2013
soccer simulation 2D league champion team. In: Robot Soccer World Cup, Springer (2013)
114 -- 124
26. Zhang, H., Lu, G., Chen, R., Li, X., Chen, X.: WrightEagle 2D Soccer Simulation Team De-
scription 2014. In: RoboCup 2014 Symposium and Competitions: Team Description Papers,
Joao Pessoa, Brazil, July 2014. (2014)
27. Akiyama, H., Shimora, H., Nakashima, T., Narimoto, Y., Yamashita, K.: HELIOS2012:
Team Description Paper. In: RoboCup 2012 Symposium and Competitions: Team Descrip-
tion Papers, Mexico City, Mexico, June 2012. (2012)
12
Prokopenko et al.
28. Bai, A., Wu, F., Chen, X.: Online planning for large Markov decision processes with hierar-
chical decomposition. ACM Transactions on Intelligent Systems and Technology 6(4) (July
2015) 45:1 -- 45:28
29. Sayama, H.: Guiding designs of self-organizing swarms: Interactive and automated ap-
proaches. In Prokopenko, M., ed.: Guided Self-Organization: Inception. Volume 9 of Emer-
gence, Complexity and Computation. Springer Berlin Heidelberg (2014) 365 -- 387
30. Nallaperuma, S., Wagner, M., Neumann, F.: Analyzing the effects of instance features and al-
gorithm parameters for maxmin ant system and the traveling salesperson problem. Frontiers
in Robotics and AI 2 (2015) 18
31. Hamann, H., Khaluf, Y., Botev, J., Divband Soorati, M., Ferrante, E., Kosak, O., Montanier,
J.M., Mostaghim, S., Redpath, R., Timmis, J., Veenstra, F., Wahby, M., Zamuda, A.: Hybrid
societies: Challenges and perspectives in the design of collective behavior in self-organizing
systems. Frontiers in Robotics and AI 3 (2016) 14
32. Pfeifer, R., Bongard, J.C.: How the body shapes the way we think: A new view of intelli-
gence. The MIT Press (November 2006)
33. Polani, D., Sporns, O., Lungarella, M.: How information and embodiment shape intelligent
information processing. In Lungarella, M., Iida, F., Bongard, J., Pfeifer, R., eds.: Proceed-
ings of the 50th Anniversary Summit of Artificial Intelligence, New York. Volume 4850 of
Lecture Notes in Computer Science., Berlin / Heidelberg, Springer (2007) 99 -- 111
34. Der, R.: On the role of embodiment for Self-Organizing robots: Behavior as broken symme-
try. In Prokopenko, M., ed.: Guided Self-Organization: Inception. Volume 9 of Emergence,
Complexity and Computation. Springer Berlin Heidelberg (2014) 193 -- 221
35. Ghazi-Zahedi, K., Haeufle, D.F.B., Montfar, G., Schmitt, S., Ay, N.: Evaluating morpholog-
ical computation in muscle and dc-motor driven models of hopping movements. Frontiers in
Robotics and AI 3 (2016) 42
36. Ay, N., Bertschinger, N., Der, R., Guttler, F., Olbrich, E.: Predictive information and explo-
rative behavior of autonomous robots. The European Physical Journal B - Condensed Matter
63 (2008) 329 -- 339(11)
37. Tishby, N., Polani, D.: Information theory of decisions and actions. In Cutsuridis, V., Hus-
sain, A., Taylor, J.G., eds.: Perception-Action Cycle: Models, Architectures, and Hardware.
Springer New York, New York, NY (2011) 601 -- 636
38. Cliff, O.M., Lizier, J., Wang, R., Wang, P., Obst, O., Prokopenko, M.: Towards quantifying
interaction networks in a football match. In Behnke, S., Veloso, M., Visser, A., Xiong, R.,
eds.: RoboCup 2013: Robot Soccer World Cup XVII, Springer (2013) 1 -- 12
39. Lizier, J.T., Prokopenko, M., Zomaya, A.Y.: A framework for the local information dynam-
ics of distributed computation in complex systems. In Prokopenko, M., ed.: Guided Self-
Organization: Inception. Volume 9 of Emergence, Complexity and Computation. Springer
Berlin Heidelberg (2014) 115 -- 158
40. Cliff, O.M., Prokopenko, M., Fitch, R.: An information criterion for inferring coupling of
distributed dynamical systems. Frontiers in Robotics and AI 3 (2016) 71
41. Cliff, O.M., Lizier, J.T., Wang, P., Wang, X.R., Obst, O., Prokopenko, M.: Quantifying
long-range interactions and coherent structure in multi-agent dynamics. Artificial Life 23(1)
(2017) 34 -- 57
42. Prokopenko, M.: Guided self-organization. HFSP Journal 3(5) (2009) 287 -- 289
43. Der, R., Martius, G.: The Playful Machine -- Theoretical Foundation and Practical Realiza-
tion of Self-Organizing Robots. Springer (2012)
44. Prokopenko, M.: Guided Self-Organization: Inception. Springer, Berlin (2014)
45. Bengio, Y., Courville, A., Vincent, P.: Representation learning: A review and new perspec-
tives. IEEE Trans. Pattern Anal. Mach. Intell. 35(8) (August 2013) 1798 -- 1828
46. Schmidhuber, J.: Deep learning in neural networks: An overview. Neural Networks 61
(2015) 85 -- 117
RoboCup 2D Soccer Simulation League: Evaluation Challenges
13
47. Greenwald, H.S., Oertel, C.K.: Future directions in machine learning. Frontiers in Robotics
and AI 3 (2017) 79
48. Akiyama, H.: Agent2D Base Code. http://www.rctools.sourceforge.jp
(2010)
|
1207.6475 | 2 | 1207 | 2012-12-09T06:50:23 | Distributed team formation in multi-agent systems: stability and approximation | [
"cs.MA",
"cs.SI"
] | We consider a scenario in which leaders are required to recruit teams of followers. Each leader cannot recruit all followers, but interaction is constrained according to a bipartite network. The objective for each leader is to reach a state of local stability in which it controls a team whose size is equal to a given constraint. We focus on distributed strategies, in which agents have only local information of the network topology and propose a distributed algorithm in which leaders and followers act according to simple local rules. The performance of the algorithm is analyzed with respect to the convergence to a stable solution.
Our results are as follows. For any network, the proposed algorithm is shown to converge to an approximate stable solution in polynomial time, namely the leaders quickly form teams in which the total number of additional followers required to satisfy all team size constraints is an arbitrarily small fraction of the entire population. In contrast, for general graphs there can be an exponential time gap between convergence to an approximate solution and to a stable solution. | cs.MA | cs |
Distributed team formation in multi-agent systems:
1
stability and approximation
Lorenzo Coviello and Massimo Franceschetti
Abstract
We consider a scenario in which leaders are required to recruit teams of followers. Each leader
cannot recruit all followers, but interaction is constrained according to a bipartite network. The objective
for each leader is to reach a state of local stability in which it controls a team whose size is equal to a
given constraint. We focus on distributed strategies, in which agents have only local information of the
network topology and propose a distributed algorithm in which leaders and followers act according to
simple local rules. The performance of the algorithm is analyzed with respect to the convergence to a
stable solution.
Our results are as follows. For any network, the proposed algorithm is shown to converge to an
approximate stable solution in polynomial time, namely the leaders quickly form teams in which the
total number of additional followers required to satisfy all team size constraints is an arbitrarily small
fraction of the entire population. In contrast, for general graphs there can be an exponential time gap
between convergence to an approximate solution and to a stable solution.
I. Introduction
A multi-agent system (MAS) is composed of many interacting intelligent agents. Agents can
be software, robots, or humans, and the system is highly distributed, as agents do not have
a global view of the state and act autonomously of each other. These systems can be used
to collectively solve problems that are difficult to solve by a single entity. Their application
ranges from robotics, to disaster response, social structures, crowd-sourcing etc. A main feature
of MAS is that they can manifest self-organization as well as other complex control paradigms
This work was partially supported by the Army Research Office grant number W911NF-11-1-0363.
The authors are with the Department of Electrical and Computer Engineering, University of California San Diego, 9500
Gilman Dr., La Jolla CA, 92093. Emails: [email protected], [email protected]
DRAFT
2
even when the individual strategies of the agents are very simple. In short, simple local interaction
can conspire to determine complex global behaviors. Examples of such emerging behaviors are
in economics and game theory, where local preferences translate into global equilbria [35], in
social sciences, where local exposure governs the spread of innovation [41], and in control,
where local decision rules determine whether and how rapidly consensus is reached [4], [28],
[29], [30], [36], [37].
From a practical perspective, the performance of a MAS often depends on how quickly
convergence to a global, possibly approximate, solution is reached and it is in general influenced
by the network structure. For example, in the context of information diffusion in social networks,
the rate of convergence of the system's dynamics is affected by the underlaying network and the
local interaction rules [21], [26].
One of the critical issues in multi-agent systems is coordination. Due to the autonomous
behavior of the agents and to the absence of a central controller, coordination must be distributed.
In the case of human agents, it is also important that the distributed control algorithm is simple
enough to be suitable to model basic principles of human behavior [8]. Two prominent problems
related to consensus and coordination in multi-agent systems are leader election and group
formation. In the former case, multiple agents elect a leader that can then assign tasks [24],
while in the latter they divide themselves into teams in such a way that each agent knows to
what team it belongs [11]. In both cases agents are all equal and coordination occurs among
agents of a single class.
We consider a scenario in which there are agents of two classes, leaders and followers. Each
leader must recruit a team of followers whose size is equal to a given constraint, by sending
requests to the followers. Followers can only accept or reject incoming leaders' requests. While
multiple followers can be part of a leader's team, each follower can be part of a single team at any
time, but is allowed to change team over time. Moreover, a leader cannot recruit all followers, but
can only recruit the followers it is in direct communication with. The communication structure
between leaders and followers is captured by an arbitrary bipartite network, and we assume
that each agent has knowledge of and can interact with its neighbors only. That is, agents only
have local knowledge of the underlying network. In general, the communication constraints of
the population (and therefore the structure of the bipartite network) can be dictated by physical
constraints (as for example antenna visibility range or signal to noise ratio threshold), social
DRAFT
3
Leader
Follower
A
1
G
C
3
H
J
4
D
2
E
I
B
F
5
K
1
2
3
4
5
A
B
C
D
E
F
G
H
I
J
K
PSfrag replacements
Fig. 1.
Example of a bipartite network between leaders and followers determined by physical constraints. Left: each leader
can only recruit the followers in its visibility range (dotted circle), arrows represent team membership, and the set of arrows
defines a partition of the followers into teams.
Right: the resulting bipartite network. An edge between leader ℓ and follower f exists if and only if f is in ℓ's visibility range.
Matching edges define team membership and are highlighted.
context, and so on. A pictorial representation of a bipartite network arising from physical
constraints is given in Figure 1.
We consider a notion of stability in which each agent controls a team of adequate size. Each
leader has an incentive to reach local stability (that is, to build a team of followers of the
right size) by dynamically interacting with its neighbors. The question we aim to answer is:
can simple local rules lead to stable, or close to stable, team formation in reasonable time? By
"close to stable" we mean that the total number of additional followers required to satisfy all
team size constraints is an arbitrary small fraction of the entire population. We propose a simple,
distributed, memoryless algorithm in which leaders do not communicate between each other, and
we show that, in any network of size n, any constant approximation of a stable outcome (or of
a suitably defined best outcome if a stable one does not exist) is reached in time polynomial
in n with high probability. In contrast, for general graphs we show through a counterexample
that there can be an exponential gap between the time needed to reach stability and that needed
to reach approximate stability, that is, to find the best solution compared to a good solution.
We remark that, in its simplicity, the proposed algorithm is suitable to model human agents, it
can be programmed on simple robots with limited computation abilities, and it is amenable to
DRAFT
4
analysis.
The rest of the paper is organized as follows. After discussing how our work relates to the
existing literature, in Section II we formally define the problem and the notions of stability
and approximate stability, in Section III we present the distributed algorithm for leaders and
followers, in Sections IV and V we present our technical results on the algorithm's performance,
and in Section VI we further discuss the algorithm's performance by showing some simulations'
results. To prove our result on the convergence to approximate stability, we derive a technical
lemma (Lemma 1) that relates the quality of a matching to the existence of particular paths (that
we call deficit-decreasing paths) of given length. The lemma extends a known combinatorial
result by Hopcroft and Karp [15] to the setup of many-to-one matching, and can be considered
to be of independent interest.
A. Related work
The problem of team formation that we consider is an example of distributed many-to-
one matching in bipartite networks [2], [14], [34]. The one-to-one case has been previously
studied in the context of theoretical computer science [23] [32]. In the control literature, our
work is related to the distributed assignment problem and to group formation in MAS. In this
framework, Moore and Passino [27] proposed a variant of the distributed auction algorithm for
the assignment of mobile agents to tasks. Cenedese et al. [6] proposed a variant of the Stable
Marriage algorithm [12] to solve the distributed task assignment problem. Abdallah and Lesser [1]
proposed an "almost" distributed algorithm for coalition formation, allowing for a special agent
with the role of "manager". Gatson and den Jardins [13] studied a scenario of group formation
where agents can adapt to the network structure. Tosic and Agha [39] proposed an algorithm
for group formation based on the distributed computation of maximal cliques in the underlying
network. Further work studied team formation in multi-robot systems [40], in the case where
communication between agents is not allowed [3]. Other authors considered MAS composed by
leaders and followers. To cite a few, Tanner [38] derived a necessary and sufficient condition for
a group of interconnected agents to be controllable by one of them acting as a leader; Rahmani
et al. [33] studied the controlled agreement problem in networks in which certain agents have
leader roles, translating graph-theoretic properties into control-theoretic properties; Pasqualetti
et al. [31] analyzed the problem of driving a group of mobile agents, represented by a network
DRAFT
5
of leaders and followers, in which follower act according to a simple consensus rule.
We distinguish ourselves from all mentioned papers, as we propose a fully distributed algorithm
for group formation on arbitrary networks in which agents act according to simple local rules
and perform very limited computation, and we derive performance guarantees in the form of
theorems. For an exhaustive overview on distributed algorithms in multi-agent systems, the
interested reader is referred to the books by Lynch [24] and by Bullo et al. [5] and the references
therein, while the survey by Horling and Lesser [16] offers an overview on three decades of
research on organizational paradigms as team and coalition formation.
A more recent line of research aims to study how humans connected over a network solve tasks
in a distributed fashion [8], [10], [17], [19], [20], [25]. In the work of Kearns et al. [20], human
subjects positioned at the vertices of a virtual network were shown to be able to collectively
reach a coloring of the network, given only local information about their neighbors. Similar
papers further investigated human coordination in the case of coloring [10], [17], [25] and
consensus [17], [19], with the main goal of characterizing how performance is affected by the
network's structure. Using experimental data of maximum matching games performed by human
subjects in a laboratory setting, Coviello et al. [8] proposed a simple algorithmic model of human
coordination that allows complexity analysis and prediction.
Finally, related to our work is also the research on social exchange networks [7], [22], that
considers a networked scenario in which each edge is associated to an economic value, nodes
have to come to an agreement on how to share these values, and each agent can only finalize
a single mutual exchange with a single neighbor. Recently, Kanoria et al. [18] proposed a
distributed algorithm that reaches approximate stability in linear time. However, we consider a
different setup since we allow leaders to build teams of multiple followers.
II. Problem formulation
We consider a population composed of agents of two different classes: leaders and followers.
Each leader is required to recruit a team of followers whose size is equal to a given constraint,
by sending requests to the followers. Followers can only accept or reject leaders' requests. While
multiple followers can be in a leader's team, each follower can be part of a single team at a time,
but is allowed to change team over time. A leader is not allowed to recruit all followers, but can
only recruit the followers it is in direct communication with. The communication constraints of
DRAFT
6
the population are captured by a bipartite network G = (L ∪ F, E) whose nodes' partition is given
by the set L of leaders and the set F of followers, and where there exists an edge ( f , ℓ) ∈ E
between follower f and leader ℓ if and only if f and ℓ can communicate between each other
(see Figure 1). Let Nℓ = { f ∈ F : ( f , ℓ) ∈ E} be the neighborhood of ℓ ∈ L. For each ℓ ∈ L,
leader ℓ is required to recruit a team of cℓ followers, where cℓ ≥ 1.
Definition 1 (Matching): A subset M ⊆ E is a matching of G if for each f ∈ F there exists
at most a single ℓ ∈ L such that (ℓ, f ) ∈ M.
The definition of matching is consistent with the fact that multiple followers can be part of a
leader's team. There is a one-to-one correspondence between matchings M of G and tuples of
teams {Tℓ(M) : ℓ ∈ L}, where Tℓ(M) denotes the team of leader ℓ under the matching M. We
have that Tℓ(M) = { f ∈ F : (ℓ, f ) ∈ M} ⊆ Nℓ for every matching M. We consider the following
notion of stability.
Definition 2 (Stable matching): Given constraints cℓ for each ℓ ∈ L, a matching M of G is
stable if and only if Tℓ(M) = cℓ for all ℓ ∈ L.
Depending on the constraints cℓ, a network G might not admit a stable matching. Nonetheless,
given a matching of G, we are interested in assessing its quality. Our main result builds on the
following definitions of deficit of a leader and deficit of a matching.
Definition 3 (Deficit of a leader): Let ℓ be a leader with constraint cℓ ≥ 1, and M be a
matching of G. The deficit of ℓ under the matching M is
dℓ(M) = cℓ − Tℓ(M).
Definition 4 (Deficit of a matching): Given constraints cℓ ≥ 1 for each ℓ ∈ L, the deficit of a
matching M of G is
d(M) = Xℓ∈L
dℓ(M) = Xℓ∈L
(cℓ − Tℓ(M)) .
In words, dℓ(M) is the number of additional followers leader ℓ needs to satisfy its size
constraint. Similarly, d(M) sums the numbers of additional followers each leader needs to satisfy
its size constraint. Given a matching M, we say that a leader ℓ is poor if dℓ(M) > 0 (that is,
Tℓ(M) < cℓ) and stable if Tℓ(M) = cℓ. In this work, we do not consider the case of Tℓ(M) > cℓ
since we assume that each leader ℓ never recruits more than cℓ followers simultaneously. This
can be justified by the fact that recruiting additional followers might be costly.
DRAFT
7
Observe that only poor leaders contribute to d(M), and that M is stable if and only if d(M) = 0.
Given G, two matchings of G can be compared with respect to their deficit, and the best matching
of G can be defined as one minimizing the deficit.
Definition 5 (Best matching): A matching M of G is a best matching of G if d(M) ≤ d(M′)
for every matching M′ of G.
Observe that a stable matching is also a best matching. Moreover, if G admits a stable
matching, d(M) quantifies how much M differs from a stable matching of G. In general, if
M∗ is a best matching of G with d(M∗) = d∗, then, d(M) − d∗ tells how much M differs from a
best matching of G. Given a matching M of G, the following definition provides a measure of
how well M approximates a best matching of G.
Definition 6 (Approximate best matching): Fix ε ∈ [0, 1], and let m be the number of followers
in G. Let M∗ be a best matching of G. Then, a matching M is a (1−ε)-approximate best matching
of G if d(M) − d(M∗) < εm.
When G admits a stable matching, we are interested in the notion of approximate stable
matching.
Definition 7 (Approximate stable matching): Let G admit a stable matching. Fix ε ∈ [0, 1],
and let m be the number of followers in G. Then, a matching M is a (1 − ε)-approximate stable
matching of G if d(M) < εm.
III. The algorithm
We now present a distributed algorithm for team formation. Time is divided into rounds, and
each round is composed by two stages. In the first stage, each leader acts according to the
algorithm in Table 1, and in the second stage each follower acts according to the algorithm in
Table 2.
First consider a leader ℓ, and let M be the matching at the beginning of a given round. If ℓ is
poor (that is, Tℓ(M) < cℓ) and Tℓ(M) < Nℓ (that is, ℓ is not already matched with all followers
in Nℓ) then, with probability p (where p ∈ (0, 1] is a fixed constant), ℓ attempts to recruit an
additional follower, chosen as explained below, by sending a matching request. An unmatched
follower in Nℓ, if any, is chosen uniformly at random; otherwise, a follower in Nℓ\Tℓ(M) is
chosen uniformly at random. In other words, leaders always prefer to recruit followers that are
DRAFT
8
currently unmatched over matched ones. Note that a leader tries to recruit an additional follower
after checking if local stability holds (that is, after checking if its team size is equal to cℓ).
Consider now a follower f . During each round, if f has incoming requests then each request is
rejected independently of the others with probability 1 − q (where q ∈ (0, 1] is a fixed constant).
If all incoming requests are rejected, then f does not change team (if currently matched) or
it remains unmatched (if currently unmatched). Otherwise, one among the active requests is
chosen uniformly at random,
f
joins the corresponding leader, and all the other requests are
discarded. For ease of presentation, we assume that a follower is equally likely to join a team
when unmatched and to change team when currently matched, but all our results hold if we
consider different values of q for matched and unmatched followers (and even if we consider a
different value of q for each follower, as long as each value is a constant).
Table 1 Algorithm for leader ℓ ∈ L
if Tℓ(M) < min{cℓ, Nℓ} then
with probability p do the following
if ∃ unmatched f ∈ Nℓ then
choose an unmatched follower f ′ ∈ Nℓ u.a.r.
else
choose a follower f ′ ∈ Nℓ\Tℓ(M) u.a.r.
end if
send a matching request to f ′
end if
The proposed algorithm enjoys several properties. It is memoryless, the actions of each agent
only depend on local information, and the leaders do not communicate between each other. Also,
it is self-stabilizing, that is, once a stable matching is reached, leaders stop recruiting followers.
Moreover, it is a single-stage algorithm, that is, agents never change their behavior until stability
is reached. Finally, observe that the exchanged messages can be represented by a single bit.
IV. Convergence to approximate stable matchings
In this section, we only consider networks admitting stable matchings, and we show that, given
any network and any constant ε ∈ (0, 1), a (1 − ε)-approximate stable matching is reached in a
DRAFT
9
Table 2 Algorithm for follower f ∈ F
if f has incoming requests then
for each leader ℓ requesting f do
with probability 1 − q reject ℓ's request
end for
if there are active requests then
select one u.a.r. and join the corresponding team
reject all other requests
end if
end if
number of rounds that is polynomial in the network size with high probability. The assumption
that a stable matching exists is for ease of presentation, and all our results also hold for reaching
approximate best matchings, by replacing d(M) with d(M) −d(M∗), where M∗ is a best matching
of G.
Given a network G, for every t ≥ 0, let M(t) be the matching of G at the beginning of round
t, with deficit d(M(t)). The next property follows from the fact that leaders do not voluntarily
disengage from the followers in their teams (and therefore the deficit of a leader increases of a
unit only if the deficit of another leader decreases by one unit).
Property 1: For t ≥ 0, d(M(t)) is non-increasing in t.
The next property follows from the assumption cℓ ≥ 1, ∀ℓ.
Property 2: If G admits a stable matching, then d(M(t)) ≤ m for every t ≥ 0.
We are now ready to state our main result.
Theorem 1: Let G be a network with m followers and which admits a stable matching. Let
∆ = maxℓ∈L Nℓ be the maximum degree of the leaders. Fix 0 < ε < 1, and let c ≥ 1 + 1
m(1−ε).
Then, a (1 − ε)-approximate stable matching of G is reached within c⌊1/ε⌋(∆/pq)⌊1/ε⌋m rounds
of the algorithm with probability at least 1 − e−cmε2/2.
Example 1: If ∆ is constant in the network size, then one can choose ε = 1/ log m, and
Theorem 1 implies that a (1 − 1/ log m)-approximate stable matching is reached in at most
O(m2 log m) rounds with probability that goes to one as m → ∞.
To prove Theorem 1, we introduce the notion of deficit-decreasing path, that in our setup
DRAFT
10
PSfrag replacements
Fig. 2. A deficit-decreasing path of length 5 is represented at the top of the figure: ℓ0 is a poor leader, f3 is an unmatched
follower, and matching edges are highlighted. The path is "solved" by turning each matched edge into an unmatched edge and
vice versa, as show at the bottom of the figure: ℓ0 obtains an additional follower (and therefore its deficit decreases by a unit)
and both ℓ1 and ℓ2 do not change their numbers of followers.
plays the same role as the augmenting path in the context of one-to-one matching [9]. Since we
consider bipartite networks, a path alternates leaders and followers.
Definition 8 (Deficit-decreasing path): Given a matching M of G, a cycle-free path P =
ℓ0, f1, ℓ1, . . . , fk (of odd length 2k-1) is a deficit-decreasing path relative to M if (ℓi, fi) ∈ M
for all 1 ≤ i ≤ k − 1, ℓ0 is a poor leader, and fk is an unmatched follower.
In words, a deficit-decreasing path starts at a poor leader with an edge not in M, ends at
a follower that is not matched, and alternates edges in M and edges not in M. To justify the
nomenclature, observe that, if d(M) > 0 and P is a deficit-decreasing path relative to M, a new
matching M′ such that d(M′) = d(M) − 1 can be obtained by flipping each unmatched edge of
P into a matched edge, and vice versa. This is depicted in Fig. 2.
The proof of Theorem 1 builds on a technical lemma that, given a matching M with d(M) ≥ εm,
guarantees the existence of a deficit-decreasing path of length at most 2⌊1/ε⌋. The existence of
such a path allows us to bound the number of rounds needed for a one-unit reduction of the
deficit. Our technical lemma extends a known result by Hopcroft and Karp [15, Theorem 1]
given in the context of one-to-one matching, but our proof is more subtle because leaders can be
matched to multiple followers and can have different size constraints cℓ. The symmetric difference
of two sets A and B is defined as A ⊕ B = (A\B) ∪ (B\A). Two paths are follower-disjoint if they
do not share any follower (even though they might share some leader).
Lemma 1: Let G admit a stable matching N. Let M be a matching of G with deficit d(M) > 0.
Then, in M ⊕ N there are at least d(M) follower-disjoint deficit-decreasing paths relative to M.
DRAFT
11
Proof: See Appendix A.
We make use of Lemma 1 through the following corollary.
Corollary 1: Let G be a network with m followers, admitting a stable matching N. Let M
be a matching of G with deficit d(M) ≥ εm, for some ε > 0. Then, in M ⊕ N there exists a
deficit-decreasing path relative to M of length at most 2⌊1/ε⌋ − 1.
Proof: By Lemma 1, if d(M) ≥ εm and N is a stable matching of G, then in M ⊕ N we can
choose εm follower-disjoint deficit-decreasing paths relative to M, whose cumulative length is
at most 2m (since they do not share followers and G is bipartite). Necessarily, one of them has
length at most 2⌊1/ε⌋ − 1 (note that a deficit-decreasing path has odd length).
We are now ready to present the proof of Theorem 1.
A. Proof of Theorem 1
Let G be a network with m followers and which admits a stable matching. Fix 0 < ε < 1. For
t ≥ 0, M(t) denotes the matching at the beginning of round t. For every 0 < x ≤ 1, let
τ(x) = minnt ≥ 0 : d(M(t)) < xmo
be the first round at whose beginning the deficit is strictly smaller than xm. We are interested
in bounding τ(ε).
Consider any round t ≥ 0. By Property 2, d(M(t)) ≤ m, and therefore there exists 0 < ε′ ≤ 1
such that d(M(t)) = ε′m (we assume ε′ > 0, since the case of ε′ = 0 is trivial). The following
lemma bounds the number of rounds τ(ε′) − t needed for a one-unit reduction of the deficit. Let
∆ = maxℓ∈L Nℓ be the maximum degree of the leaders in G.
Lemma 2: Let d(M(t)) = ε′m for some 0 < ε′ ≤ 1. Then
Pr(cid:16)τ(ε′) − t ≤ ⌊1/ε′⌋(cid:17) ≥ (cid:18) pq
∆ (cid:19)⌊1/ε′⌋
.
Proof: Let h(t) ≥ 1 be the odd length of the shortest deficit-decreasing path relative to M(t).
By Corollary 1, h(t) ≤ 2⌊1/ε′⌋ − 1. We distinguish the cases of h(t) = 1 and h(t) ≥ 3.
First consider h(t) = 1. With probability at least pq/∆ the deficit decreases by at least one
unit during the next round of the algorithm. Too see this, consider a deficit-decreasing path ℓ, f .
With probability at least p/∆, ℓ attempts to recruit f and, conditional on this event, f considers
ℓ's proposal with probability q, resulting in the lower bound pq/∆.
DRAFT
12
Now consider h(t) ≥ 3, and let P be a shortest deficit-decreasing path of length h(t) ending
at an unmatched follower f . By the same argument as above, the length of P decreases by one
during the next round with probability at least pq/∆ (observe that, as long as h(t) > 1, f remains
unmatched during round t since P is a deficit decreasing path of shortest length).
By independence of successive rounds of the algorithm and the bound h(t) ≤ 2⌊1/ε′⌋ − 1, with
probability at least (pq/∆)⌊1/ε′⌋, a sequence of ⌊1/ε′⌋ − 1 rounds reduces the length of P to 1 and
then in one additional round P gets "solved" and the deficit decreases by one unit.
Consider consecutive phases of ⌊1/ε⌋ rounds each. For phases i = 0, 1, 2, . . ., let Xi be iid
Bernoulli random variables with Pr(Xi = 1) = (pq/∆)⌊1/ε⌋. By Lemma 2, after T phases (i.e., at
the beginning of round t∗ = T ⌊1/ε⌋), the deficit of the matching is upper bounded by
d(M(t∗)) < max
εm, m + 1 −
T
Xi=1
,
Xi
since by Property 2 the matching at the beginning of round 0 has deficit d(M(0)) ≤ m. By
independence of the phases, a Chernoff bound implies that for any 0 < δ ≤ 1
T
Pr(cid:16)
Xi=1
Xi < (1 − δ)T (pq/∆)⌊1/ε⌋(cid:17) < e−T (pq/∆)⌊1/ε⌋δ2/2.
Setting δ = ε and T = cm(∆/pq)⌊1/ε⌋ (where c is a constant to be specified later), the deficit
of the matching at the beginning of round t∗ = ⌊1/ε⌋cm(∆/pq)⌊1/ε⌋ is upper bounded by
d(M(t∗)) < max {εm, m + 1 − (1 − ε)cm}
with probability at least 1 − e−cmε2/2. To conclude the proof of the theorem we need that εm ≥
m + 1 − (1 − ε)cm, which is true for any c ≥ 1 + 1
m(1−ε).
V. Exponential convergence
Theorem 1 gives a polynomial bound for reaching a (1 − ε)-approximate stable matching for
any constant 0 < ǫ < 1 and any network. However, a similar guarantee cannot be derived for the
case of a stable matching, as shown in this section through a counterexample. In particular, we
define a sequence of networks of increasing size and maximum degree that diverges with the
network size, and show that the number of rounds required to converge from an approximate
matching M with d(M) = 1 to the stable matching (that is, to reduce the deficit of a single unit)
DRAFT
13
is exponentially large in the network's size with high probability from an overwhelming fraction
of the approximate matchings M such that d(M) = 1.
For n ≥ 1, let Gn = (Ln ∪ Fn, En) be the network with n leaders and n followers (i.e.,
Ln = {ℓ1, . . . , ℓn} and Fn = { f1, . . . , fn}), with edges En = {(ℓi, f j) : 1 ≤ i ≤ n, j ≤ i}, and team size
constraints cℓ = 1 for all ℓ ∈ Ln, see Figure 3. Gn has maximum degree n and a unique stable
matching given by M∗
n = {(ℓi, fi) : 1 ≤ i ≤ n}.
Fig. 3. The network Gn for n = 6. The matching M′
n is highlighted.
Theorem 2: For any matching M of Gn, let τ∗(M) denote the number of rounds to converge
to the perfect matching when starting from M. Then, for any fixed constant 0 < γ < 1, τ∗(M) is
exponentially large in γn with high probability for a 1 −O(n2−(1−γ)n) fraction of all the matchings
M such that d(M) = 1.
Here we only provide a sketch of the proof, whose details are presented in Appendix B. To
get an understanding of the algorithm's dynamics, consider the matching
M′
n = {(ℓi, fi−1) : 2 ≤ i ≤ n},
n) = 1 and, under M′
highlighted in Figure 3 for the case of n = 6. Observe that d(M′
n, ℓ1 is
poor, and the remaining leaders are stable. According to the algorithm, ℓ1 attempts to recruit
f1 (currently in ℓ2's team). If f1 accepts, then ℓ1 becomes stable and ℓ2 becomes poor (and can
in turn attempt to recruit either f1 or f2). After each round, there exists a unique poor leader
until the stable matching is reached. The stable matching is reached when ℓn−1 (ℓ5 in Figure 3)
becomes poor and then successfully recruits fn−1 ( f5 in Figure 3), and finally ℓn successfully
recruits fn (recall that leaders prefer unmatched followers).
DRAFT
14
In general, fix any matching M of Gn such that d(M) = 1. In M, there is a single poor
leader ℓi0 and a single unmatched follower fiK . M is associated to a unique deficit-decreasing
path ℓi0, fi0, . . . , ℓiK−1, fiK−1, ℓiK , fiK. We define the height h(M) of M as follows. If K ≥ 1 then
h(M) = iK−1, if K = 0 then h(M) = 0.
Starting from M, for every t < τ(M), the matching M(t) at the beginning of round t has deficit
d(M(t)) = 1 (by Property 1), a single poor leader denoted by ℓi(t), the single unmatched follower
fiK and height h(M(t)) = h(M) = iK−1. The stochastic process {i(t)} tracking the position of the
poor leader ℓi(t) is not a classical random walk on {ℓ1, . . . , ℓiK } and its transition probabilities at
each round depend on the current matching. The time to reach stability is upper bounded by
min{t : i(t) = h(M)}, that is, the first round in which ℓh(M) becomes poor (since ℓh(M) can then
match with fh(M) leaving ℓiK poor, who would in turn match with the unmatched follower fiK ,
thus reaching the stable matching).
We prove a one-to-one correspondence between the matchings M(t) reachable from M in
which i(t) ≤ h(M) (note that d(M(t)) = 1 for each of them) and the nodes of a tree whose
size is exponentially large in the height h(M). In particular, we can show that the process
{M(t) : t ≥ 0, M(0) = M} is equivalent to a classical random walk on the nodes of the tree,
and that reaching the matching with i(t) = h(M) corresponds to reaching the root of the tree.
A random walk starting at any node of the tree visits the root after a number of steps that is
exponentially large in the height h(M) with high probability. Finally, the proof of Theorem 2 is
completed by arguing that, for any constant 0 < γ < 1, a 1−O(n2−(1−γ)n) fraction of all matchings
M of Gn such that d(M) = 1 have height h(M) ≥ γn.
VI. Simulations
In this section, the performance of our algorithm is further evaluated through simulation. In
Figure 4, the algorithm's average convergence time on the sequence of networks Gn defined in
Section V is shown (in logarithmic scale). On the one hand, the thick solid line suggests that
the average number of rounds to reach a 0.9-approximate stable matching is upper bounded by
a polynomial of small degree, consistently with Theorem 1. On the other hand, convergence to
the stable matching requires an average number of rounds that grows exponentially in n (thin
solid line), as predicted by Theorem 2. Moreover, the dotted line represents the average time
after which all followers become matched, that grows slowly with n.
DRAFT
15
PSfrag replacements
n
Rounds (log-scale)
0.9-approximation
Stable matching
Followers matched
Fig. 4. Algorithm's convergence time on the sequence of networks Gn.
Figure 5 shows the algorithm's performance in reaching successively finer approximations of
the best matching on random networks G(n, m, ρ). Here, G(n, m, ρ) refers to a random bipartite
network with n leaders and m followers, in which each edge exists independently of the others
with probability ρ (we fixed ρ = 0.04), and with constraint cℓ = min{m/n, Nℓ} for each leader
ℓ . For each of the (n, m) pairs that we considered, 20 random G(n, m, ρ) were generated, and
the algorithm was run 20 times on each. We observe that, consistently with Theorem 1, τ(ε)
increases both when ε decreases (i.e., when a finer approximation is desired) and when the
number m of followers increases. The plot visually suggests that a good solution is reached
quickly, while most of the time is spent in the attempt of improving it to the best solution.
VII. Discussion
The distributed algorithm we proposed, in which leaders and followers act according to simple
local rules, is computationally tractable and allows us to derive performance guarantees in the
form of theorems. Despite its simplicity, the algorithm is shown to reach an arbitrarily close
approximation of a stable matching (or of a best matching) in polynomial time in any network.
However, in general there can be an exponential gap between reaching an approximate solution
and a stable solution.
In the proposed algorithm, leaders do not communicate between each other, and only act in
response to their own status and the status of their neighborhoods. The only collaboration between
DRAFT
16
PSfrag replacements
1 − ε
Rounds
n = 100, m = 200
n = 100, m = 300
n = 150, m = 450
n = 200, m = 600
Fig. 5. Algorithm's average time to reach a (1 − ε)-approximate best matching on random bipartite networks G(n, m, ρ), for
ρ = 0.04.
them consists in the fact that the leaders whose size constraints are satisfied do not attempt to
recruit additional matched followers, and this is justified since recruiting more followers might
be costly. How communication between leaders affects performance is an open question, as well
as determining what amounts of communication and complexity are necessary to remove the
exponential gap in the case of unbounded degree networks.
Finally, in Section V, we defined a sequence of networks in which the maximum degree of
the leaders scales linearly with the network size. It would be interesting to understand whether
a counterexample in which the maximum degree scales more slowly (e.g., logarithmically in the
network size) could be derived.
Appendix
A. Proof of Lemma 1
Given the matching M and the stable matching N, for brevity we write deficit-decreasing path
instead of deficit-decreasing path in M ⊕ N relative to M. Similarly, by telling that leader ℓ and
follower f are matched we mean that (ℓ, f ) ∈ M, unless otherwise specified.
We prove a stronger claim than the one stated in the lemma, proceeding as follows. First, we
show that for each leader ℓ with deficit dℓ(M) > 0 there are at least dℓ(M) follower-disjoint deficit-
DRAFT
17
PSfrag replacements
Fig. 6. A leader ℓ with constraint cℓ, degree Nℓ ≥ cℓ and deficit dℓ(M). Matched edges are highlighted. ℓ is matched to exactly
cℓ − dℓ(M) followers (depicted on the right). Among the other k ≥ dℓ(M) followers in Nℓ, h < k of them are the first followers
on h follower-disjoint deficit-decreasing paths starting at ℓ (these paths are denoted by P1, . . . , Ph), and none of the remaining
k − h (denoted by f1, . . . , fk−h ) is the first follower of a deficit-decreasing paths starting at ℓ.
decreasing paths starting at ℓ. Then, we argue that d(M) follower-disjoint deficit-decreasing paths
can be chosen, dℓ(M) of which start at each leader ℓ with deficit dℓ(M) > 0.
Consider a leader ℓ with dℓ(M) > 0. Assume by contradiction that there are strictly less then
dℓ(M) follower-disjoint deficit-decreasing paths starting at ℓ, and refer to Fig. 6 for a schematic
representation.
Since ℓ has a team size constraint cℓ > 0, there are exactly cℓ−dℓ(M) followers that are matched
to ℓ. Observe that no follower matched to ℓ can be the first follower of a deficit-decreasing path
starting at ℓ, since a deficit-decreasing path starts with an edge in N\M.
Since G admits a stable matching, the neighborhood Nℓ of ℓ has size Nℓ ≥ cℓ. Therefore,
there are are k ≥ dℓ(M) followers in Nℓ that are not matched to ℓ. Assume that h < dℓ(M) of the
followers in Nℓ are the first followers of h follower-disjoint deficit-decreasing paths starting at
ℓ (these paths are denoted by P1, . . . , Ph in Figure 6). Denote the remaining k − h > 0 followers
by f1, . . . , fk−h, and assume by contradiction that none among them is the first follower of a
deficit-decreasing path starting at ℓ (this is equivalent to assuming that there are strictly less
than dℓ(M) follower-disjoint deficit-decreasing paths starting at ℓ).
Observe that, in order to become stable, ℓ needs to match with at least one additional follower
among { f1, . . . , fk−h}. We show that, under the assumption above, a one-unit reduction in the deficit
of ℓ would eventually result in a one-unit increase of the deficit of another leader, implying that
DRAFT
18
PSfrag replacements
Fig. 7.
If f ′′ is not matched then ℓ, f ′, ℓ′, f ′′ would be a deficit-decreasing path (shown at the top of the figure, in which
matching edges are highlighted), contradicting the assumption that no follower in { f1, . . . , fk−h} can be the first follower of a
deficit-decreasing path starting at ℓ. Therefore, f ′′ is matched to a leader ℓ′′ (the bottom of the figure represents the case of
ℓ , ℓ′′).
G does not admit a stable matching, generating a contradiction.
Consider any follower f ′ ∈ { f1, . . . , fk−h}, and observe that f ′ is matched in M since otherwise
ℓ f ′ would be a deficit-decreasing path starting at ℓ. Let ℓ′ be the leader such that (ℓ′, f ′) ∈ M,
and observe that if ℓ′ is matched to all followers in Nℓ′ then ℓ cannot match to f ′ without causing
a one-unit increase of the deficit of ℓ′. Therefore assume that in Nℓ′ there is a follower f ′′ such
that (ℓ′′, f ′′) ∈ M for some leader ℓ′′ , ℓ′ ( f ′′ is matched in M since otherwise ℓ, f ′, ℓ′, f ′′ would
be a deficit-decreasing path starting at ℓ, see Fig. 7). In the following two cases ℓ cannot match
to f ′ without eventually increasing the deficit of another leader.
(i) ℓ′′ = ℓ. In this case ℓ, f ′, ℓ′, f ′′, ℓ is a cycle, and if ℓ matches to f ′ then the deficit of a
leader in the cycle must increase of one unit.
(ii) ℓ′′ , ℓ and ℓ′′ is matched to all followers in Nℓ′′ other than f ′. In this case if ℓ matches to
f ′ then the deficit of a leader on the path ℓ, f ′, ℓ′, f ′′, ℓ′′ must eventually increase by a unit.
Therefore assume that in Nℓ′′ there is a follower f ′′′ such that (ℓ′′′, f ′′′) ∈ M for some leader
f ′′′ is matched in M since otherwise ℓ, f ′, ℓ′, f ′′, ℓ′′, f ′′′ would be a deficit-
ℓ′′′ , ℓ′′ (again,
decreasing path). Again, ℓ cannot match to f ′ without eventually increasing the deficit of another
leader if either ℓ′′′ = ℓ or ℓ′′′ = ℓ′ (each similar to the case (i) above), or if ℓ′′′ is matched to all
followers in Nℓ′′ other than f ′, f ′′ (similar to the case (ii) above).
By iteration, it follows that ℓ cannot match to any follower f ′ ∈ { f1, . . . , fk−h} without eventually
increasing the deficit of another leader, in contradiction with the existence of the stable matching
N. Hence, there are at least dℓ(M) follower-disjoint deficit-decreasing paths starting at ℓ.
DRAFT
19
PSfrag replacements
Fig. 8. Given the matching at the top of the figure (matching edges are highlighted), assume that both ℓ0 and ℓ1 are poor, and
that f3 is unmatched. The deficit-decreasing paths P = ℓ0, f1, ℓ1, f2, ℓ2, f3 and P′ = ℓ0, f1, ℓ1, f2 are not follower-disjoint. If P′ is
solved (shown at the bottom of the figure), then P is not solved, and vice versa.
To complete the proof of the lemma, we show that we can choose d(M) follower-disjoint
deficit-decreasing paths, dℓ(M) of which start at each leader ℓ with dℓ(M) > 0.
We proceed by contradiction, and make the following assumption. Let P be any set of d(M)
deficit-decreasing paths, dℓ(M) of which start at each leader ℓ with dℓ(M) > 0 (denote by Pℓ
the elements of P starting at ℓ); then, there are two leaders ℓ, ℓ′ such that two paths P ∈ Pℓ,
P′ ∈ Pℓ′ are not follower-disjoint. In order to reach the stable matching N starting from M, a set
of d(M) deficit-decreasing paths must be solved. However, if P is solved (by "flipping" matched
edges into unmatched edges, and vice versa) then P′ is not solved, and if P′ is solved then P
is not solved (see Figures 8 and 9 for a schematic representation). If follows that N cannot be
reached from M by solving the d(M) deficit-decreasing paths in P.
The last argument holds for any choice of P, and this generates a contradiction on the
reachability of N starting from M (observe that N can be reached from M in finite time, e.g. by
a cat-and-mouse argument on the space of all the matchings of G). Hence, we can choose d(M)
follower-disjoint deficit-decreasing paths, dℓ(M) of which start at each leader ℓ with dℓ(M) > 0,
and the lemma is proven.
B. Proof of Theorem 2
Let Mn be the set of all the matchings of Gn such that d(M) = 1. We proceed as follows. First,
we show that each M ∈ Mn is uniquely identified by the set of the leaders that are not matched
with "horizontal" edges (that is, leaders ℓi such that (ℓi, fi) < M). Second, we define trees T ∗
m,
m starting at any node different than the root hits the root
m ≥ 1 such that a random walk on T ∗
DRAFT
20
PSfrag replacements
Fig. 9.
If, under the matching highlighted in the figure, both ℓ and ℓ′ are poor and f1 is unmatched then there are two
deficit-decreasing paths that are not follower-disjoint (one starting at ℓ ad ending at f1, the other starting at ℓ′ ad ending at f1).
If one of them is solved then the other is not solved, and vice versa.
after a number of steps that is exponentially large in m with high probability. Third, for each
matching M ∈ Mn we define a quantity h(M) that we call the height of M and we argue that,
when initialized at M, the algorithm's dynamics is equivalent to a random walk on the tree T ∗
h(M)
and reaching the stable matching of Gn corresponds to reaching the root of T ∗
h(M) (and therefore
it requires a number of rounds that is exponentially large in h(M) with high probability). Finally,
by a counting argument, we show that for any constant 0 < γ < 1 a 1 − O(n2−(1−γ)n) fraction of
all the matchings in Mn have height at least γn, completing the proof of the theorem.
A. Properties of the matchings in Mn.
Matchings in Mn enjoy the following structural properties.
Lemma 3: Let M ∈ Mn. The following properties hold.
(1) There are a single poor leader ℓi∗(M) and a single unmatched follower ℓ j∗(M) in M.
(2) 1 ≤ i∗(M) ≤ j∗(M) ≤ n.
(3) (ℓk, fk) ∈ M for all k < i∗(M) and all k > j∗(M).
(4) Let I(M) = { j0, j1, . . . , jK} be the sorted set of indexes j such that (ℓ j, f j) < M. Then
(a)
j1 = i∗(M) and jK = j∗(M).
(b) (ℓ jk+1, f jk) ∈ M for all k ∈ {0, . . . , K − 1}.
Proof: Property (1). Since d(M) = Pℓ∈L dℓ(M) = 1, there is a single poor leader ℓi∗(M) in M.
Since cℓ = 1 for all ℓ ∈ L, each leader ℓ , ℓi∗(M) is matched to a single follower. It follows that
there is a unique unmatched follower f j∗(M).
DRAFT
21
Property (2). Suppose by contradiction that i∗(M) > j∗(M). Since Nℓ j∗(M) = { f1, . . . , f j∗(M)} and
f j∗(M) is unmatched, leader ℓ j∗(M) is matched to one of the followers in { f1, . . . , f j∗(M)−1}. Hence,
the j∗(M)−1 leaders ℓ1, . . . , ℓ j∗(M)−1 are matched to at most j∗(M)−2 out of the j∗(M)−1 followers
f1, . . . , f j∗(M)−1, and one of them is necessarily poor, contradicting Property (1). Therefore, i∗(M) ≤
j∗(M).
Property (3). We proceed by induction. If i∗(M) > 1, then (ℓ1, f1) ∈ M since Nℓ1 = { f1} and ℓ1 is
matched with a follower. Assume that if i∗(M) > j then (ℓk, fk) ∈ M for all k ≤ j. If i∗(M) > j +1,
then, by the inductive assumption, ℓ j+1 can only be matched to f j+1 since Nℓ j+1 = { f1, . . . , f j+1}.
This shows that (ℓk, fk) ∈ M for all k < i∗(M). If j∗(M) < n then (ℓn, fn) ∈ M since fn is matched
and ℓn is the only leader connected to fn. Assume by induction that if j∗(M) < j then (ℓk, fk) ∈ M
for all k ≥ j. If j∗(M) < j − 1, then, by the inductive assumption, f j−1 can only be matched to
ℓ j−1 since f j−1 is adjacent to ℓ j−1, . . . , ℓn. This shows that (ℓk, fk) ∈ M for all k > j∗(M).
Property (4). If K = 0 then M = {(ℓi, fi) : i , i∗(M)}, j∗(M) = i∗(M), and properties (4a) and
(4b) trivially hold. Now consider K ≥ 1. Let I(M) = { j0, j1, . . . , jK} be the sorted set of indexes
j such that (ℓ j, f j) < M. By property (3), we have that j0 = i∗(M) and jK = j∗(M), therefore
property (4a) follows. Hence, (ℓ j2, f j1) ∈ M since (ℓk, fk) ∈ M for all k ∈ { j1 + 1, . . . , j2 − 1} by
definition of I(M), and Nℓ j2
= { f1, . . . , f j2}. Property (4b) follows by induction.
Lemma 3 states that non-horizontal matching edges do not intersect. In particular, given a
matching M ∈ Mn, the set I(M) represents the set of (the sorted indexes of) the leaders that are
not matched with horizontal edges (see Figure 10 for an example), ℓi∗(M) for i∗(M) = min I(M) is
the unique unmatched leader, and ℓ j∗(M) for j∗(M) = max I(M) is the unique unmatched follower.
Recall that M∗
n) = ∅.
Lemma 3 implies that every matching M ∈ Mn ∪ {M∗n} is uniquely identified by the set I(M).
In particular, the following result holds.
n = {(ℓk, fk) : 1 ≤ k ≤ n} is the unique stable matching of Gn, and let I(M∗
Lemma 4: Consider the mapping I(·) from Mn ∪ {M∗
M 7→ I(M). Then I(·) is a bijection.
n} to S = (cid:8)A : A ⊆ {1, . . . , n}(cid:9) defined by
Proof: The stable matching M∗
n) = ∅. The mapping I(·) is injective
since if M, M′ ∈ Mn and M , M′ then I(M) , I(M′). To see that I(·) is surjective, fix K ≤ n−1
and A = {i0, i1, . . . , iK} ∈ S such that 1 ≤ i0 < i1 < . . . < iK ≤ n. The matching M ∈ Mn such that
n is associated to I(M∗
DRAFT
22
Fig. 10. An example of a matching M of G6 with d(M) = 1. M is uniquely determined by the set I(M) = {2, 4, 6}, that
encodes the following: ℓ2 is not matched, ℓ4 is matched with f2, ℓ6 is matched with f4,
f6 is not matched. Also note that
P(M) = ℓ2, f2, ℓ4, f4, ℓ6, f6 is the unique deficit-decreasing path relative to M.
I(M) = A is given by
M = (cid:8)(ℓik+1, fik) : 0 ≤ k ≤ K − 1(cid:9) ∪(cid:8)(ℓk, fk) : k < A(cid:9) ∈ Mn.
Remark 1: Lemma 3 and Lemma 4 imply that every matching M ∈ Mn, I(M) = {i0, . . . , iK},
is associated to a unique deficit-decreasing path in M ⊕ M∗
n relative to M, given by
P(M) = ℓi0 , fi0, ℓi1, fi1, . . . , ℓiK , fiK .
Too see this, observe that M\M∗
n is given by the non-horizontal edges in M, while M∗
n\M is
given by the horizontal edges that are not in M. Therefore, by Lemma 3,
M\M∗
n = (cid:8)(ℓi1 , fi0), (ℓi2, fi1), . . . , (ℓiK , fiK−1)(cid:9),
n\M = (cid:8)(ℓi0 , fi0), (ℓi1, fi1), . . . , (ℓiK , fiK)(cid:9),
M∗
and the set of edges in P(M) is equal to M ⊕ M∗
n. The uniqueness of P(M) follows since
I(M) is unique by Lemma 4 and there is no other way to connect the poor leader ℓi0 and the
unmatched follower fiK with a path. This suggests that, given a matching M ∈ Mn, the unique
deficit-decreasing path P(M) must be "solved" in order to reach the stable matching of Gn.
B. The tree T ∗
m
Definition 9: Let T1 be a labeled rooted tree with a singleton node with label 1. Inductively,
for i ≤ 2, let Ti be the labeled rooted tree whose root is labeled with i and its i − 1 children
DRAFT
are the roots of copies of T1, . . . , Ti−1. We define T ∗
m to be the tree with a root with label m + 1
whose only child is the root of a copy of Tm (see Figure 11 for a visual representation). Let r∗
denote the root of T ∗
m.
23
Fig. 11. The three T ∗
m for m = 5.
We show that the hitting time of r∗ for a random walk on T ∗
m starting at any node u , r∗
is exponential in m with high probability. For a node u , r∗, we call the edge that connects u
to its parent u's exit edge. For any subtree Ti ⊂ T ∗
m, let Zi be the random variable denoting the
number of steps that it takes for a walk starting at the root of Ti to exit Ti (that is, to hit the
parent of the root of Ti). The following lemma provides an exponential lower bound on Zi.
Lemma 5: There exist positive constants α, γ > 0 such that, for all i ≥ 2,
Pr[Zi ≥ γ · 2i/(α log2 i)] ≥ 1 −
1
log i
.
Proof: We proceed by induction on i. For convenience, define g(i) = α log2 i and f (i) =
γ · 2i/g(i) for some α, γ > 0. For any α > 0 and i ≥ 2, we can choose γ > 0 such that f (i) ≤ 1;
therefore, as Zi ≥ 1 with probability 1, the claim holds trivially for any i ≤ i∗, where i∗ is a
suitably large constant.
Now consider any i ≥ i∗ and suppose the claim holds up to i − 1. Every time the walk is on
the root of Ti, it exits Ti with probability 1/i (since the root of Ti has i neighbors: one parent
and i − 1 children). Therefore, letting Et be the event that the first t times the walk is on the
root of Ti it does not exit Ti, we have Pr[Et] ≥ 1 − t/i. Let t = i/(2 log i), and let D j, 1 ≤ j ≤ t,
DRAFT
be the event that, when it is on the root of Ti for the j-th time, the walk moves to the root of
one of the subtrees Ti−g(i), . . . , Ti−1 and takes at least f (i − g(i)) steps to exit that subtree. For
1 ≤ j ≤ t, we have
24
Pr[D j Et] ≥
≥
g(i)
i
g(i)
i
· Pr[Zi−g(i) ≥ f (i − g(i))]
· 1 −
1
log(i − g(i))! ,
by the induction hypothesis on Zi−g(i). Letting χ j be the indicator function of the event D j for
1 ≤ j ≤ t, the probability that at least two of the events D j happen, given Et, is lower bounded
by:
χ j ≥ 1 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Et
.
t
2
χ j ≥ 1,
Xj=t/2+1
Et
χ j ≥ 1 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
t
Pr
Xj=1
χ j ≥ 2 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
By union bound, we can write
Et
t/2
t/2
≥ Pr
Xj=1
= Pr
Xj=1
Et
χ j ≥ 1 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Yi=1 (cid:16)1 − Pr[D jEt](cid:17)
t/2
t/2
Pr
Xj=1
≥ 1 −
where the last step holds for i sufficiently large so that log(i − g(i)) ≥ 2. This implies that
log(i − g(i))!# ≥ 1 −
1
iα/8 ,
Therefore, we conclude that
t
1
1
1
4
g(i)
1 −
i
α log i
log(i − g(i))!!t/2
≥ 1 − 1 −
1 −
≥ 1 − exp"−
iα/8!2
Et
Pr
χ j ≥ 2 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
≥ 1 −
Xj=1
Pr[Zi ≥ 2 · f (i − g(i))] ≥ Pr
χ j ≥ 2
Xj=1
≥ Pr
χ j ≥ 2 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Xj=1
iα/8!(cid:18)1 −
≥ 1 −
2
t
t
≥ 1 −
2
iα/8 .
Pr[Et]
Et
i(cid:19) ≥ 1 −
t
1
log i
,
DRAFT
25
where the last step holds by choosing α sufficiently large. The claim follows since 2 · f (i −g(i)) ≥
f (i).
Note that a random walk starting at any node u , r∗ has to exit Tm before hitting r∗. Therefore,
an application of Lemma 5 to Tm yields a lower bound to the hitting time of r∗ when starting
at any node u , r∗.
Corollary 2: The hitting time of r∗ of a random walk starting at any node u , r∗ is 2Ω(n/ log2 n)
with high probability.
C. The dynamics of the algorithm starting from M ∈ Mn
For ease of presentation, we set the probability parameters of the algorithms to p = q = 1.
Setting p = 1 means that a poor leader always proposes to a follower. Setting q = 1 means that
a follower always accepts an incoming request. Our result holds for any choice of p and q.
By Lemma 4, every matching M ∈ Mn ∪ {M∗
n} is uniquely identified by the set I(M) = {k :
(ℓk, fk) < M}.
Definition 10 (The height of a matching): Let M ∈ Mn, I(M) = {i0, . . . , iK}. The height h(M)
of M is defined as follows. If K = 0 then h(M) = 0. If K ≥ 1 then h(M) = iK−1 ∈ {1 . . . , n − 1}.
For a matching M ∈ Mn such that h(M) > 0 we can write I(M) = {i0, . . . , h(M), iK}. For each
t ≥ 0, let M(t) be the matching at the beginning of round t of the algorithm, and for ease of
notation let I(t) = I(M(t)). For a matching M ∈ Mn let
be the number of steps that the algorithm needs to reach the stable matching starting from M.
τ∗(M) = min(cid:8)t : M(t) = M∗
nM(0) = M(cid:9)
Note that, with p = q = 1, t∗(M) = 1 for every M ∈ Mn such that h(M) = 0 (that is, I(M) =
1), since according to the algorithm leaders prefer unmatched followers. We are interested in
relating τ∗(m) and h(M) for every matching M ∈ Mn such that h(M) > 0 (that is, I(M) > 1).
We study how the matching evolves over time through the Markov process {I(t) : 0 ≤ t ≤
n) = ∅, τ∗(M) = min{t : I(t) = ∅}. The state space of the Markov process
is given by the set S defined in Lemma 4. The transition probabilities are characterized by the
τ∗(M)}. Since I(M∗
following lemma.
DRAFT
Lemma 6: Conditional on I(t) = I ∈ S, I > 1, the transition probabilities at time t are given
by
26
Pr(cid:16)I(t + 1) = I′(cid:12)(cid:12)(cid:12)
I(t) = I(cid:17) =
1
min I
if
I′ ∈ nI ∪ {k} : k < min Io ∪nI\{min I}o,
and 0 otherwise. Moreover Pr(I(t + 1) = ∅I(t) = ∅) = 1, and Pr(I(t + 1) = ∅I(t) = I) = 1 for
every I sich that I = 1.
Proof: The case of I(t) = ∅ corresponds to the stable matching M∗
n, which is an absorbing
state for the Markov process. In the case of I(t) = 1, we have that h(M) = 0, and p = q = 1
implies that that I(t + 1) = ∅.
Consider now I > 1. Conditional on I(t) = I, the poor leader is ℓmin I and has degree min I
and neighborhood Nmin I = { f1, . . . , fmin I}, and chooses one of the followers in Nmin I uniformly at
random. If ℓmin I chooses follower fk for some k < min I then the leader ℓk becomes poor, since
by property (3) of Lemma 3 ℓk was matched to fk in M(t), and we have that I(t + 1) = I ∪ {k}. If
instead ℓmin I chooses follower fmin I (matched to ℓmin(I\ min I) in M(t) by property (4) of Lemma 3),
then I(t + 1) = I\{min I}.
For every matching M ∈ Mn such that h(M) > 0 and I(M) = {i0, . . . , iK}, define the matching
L(M) = {(ℓ j, f j) : j , iK} and τ(M) = min{t : M(t) = L(M)}, and observe that h(L(M)) = 0 and
τ∗(M) > τ(M) (in particular, τ∗(M) = 1 + τ(M) for p = q = 1).
For every matching M such that I(M) > 1, let R(M) be the set of the matchings in Mn that
can be reached from M (after one or multiple steps). According to the transition probabilities
defined by Lemma 6, it is easy to see that
R(M) = nL(M)o ∪nM′ ∈ Mn : I(M′) = A ∪ {h(M), iK}, A ⊆ {1, . . . , h(M) − 1}o.
Observe that every M′ ∈ R(M)\{L(M)} has height h(M′) = h(M). The following lemma charac-
h(M).
terizes the one-to-one correspondence between matchings in R(M) and nodes of the tree T ∗
r, where r is the root of T ∗
Lemma 7: Consider the mapping ω(·) from R(M) to T ∗
h(M) defined as follows. Let ω(L(M)) =
h(M). For M′ ∈ R(M)\{L(M)} and I(M′) = I, let ω(M′) be the node
h(M) with label min I and connected to the root with a path of nodes labeled by the sorted
of T ∗
indexes in I\{min I}. Then ω(·) is a bijection.
The proof is omitted since it directly follows from the construction of the tree T ∗
h(M) and the
mapping I(·).
DRAFT
27
Lemma 8: The stochastic process {I(t) : 0 ≤ t ≤ τ(M)M(0) = M} is equivalent to a random
walk on T ∗
h(M) starting at ω(M).
Proof: It suffices to show that the transition probabilities between two matchings M1, M2 ∈
R(M) are nonzero if and only if the nodes ω(M1) and ω(M2) are adjacent in T ∗
h(M). To prove
the "only if" direction, assume that M1, M2 ∈ R(M) are such that there is a nonzero transition
probability from M1 to M2 (and therefore from M2 to M1). Let I(M1) = I1 and I(M2) = I2.
According to the transition probabilities given above, there are two possible cases. In the first
case, I2 = I1 ∪ {k} for some k < min I1, and ω(M1) is a child of ω(M1). In the second case
I2 = I1\{min I1} and ω(M2) is the parent of ω(M1). The proof of the other direction is similar.
To summarize, the number of steps that the algorithm needs to reach the stable matching of Gn
starting from M ∈ Mn with h(M) > 0 is upper bounded by the time τ(M) to reach the matching
L(M), and reaching L(M) is equivalent to reaching the root of T ∗
h(M) starting from the node
ω(M). By Corollary 2, τ(M) is exponentially large in h(M) with high probability. To complete
the proof of the theorem, we show that, for any constant 0 < γ < 1, a 1 − O(n2−(1−γ)n) fraction
of the matchings M ∈ Mn have h(M) ≥ γn. This is done through a counting argument.
D. The fraction of the matchings M ∈ Mn such that h(M) ≥ γn
Let N be the number of matchings in Mn. Fixed a constant 0 < γ < 1, let Mγ = {M ∈ Mn :
h(M) < γn} and let Nγ = Mγ. For j = 0, . . . , n−1, let N( j) be the number of matchings M ∈ Mn
such that h(M) = j. It follows that
N =
n−1
Xj=0
N( j),
Nγ ≤
⌈γn⌉−1
Xj=0
N( j).
Lemma 9: N(0) = n and N( j) = (n − j)2 j−1 for all j = 1, . . . , n − 1.
Proof: N(0) = n since there are n matchings M with h(M) = 0, that is, the matchings
{(ℓ j, f j) : j , k} for 1 ≤ k ≤ n.
Fix j ∈ {1, . . . , n − 1}. By Lemma 4, a matching M ∈ Mn with h(M) = j is uniquely identified
by a set I(M) = {i0, . . . , iK−1, iK} for some 1 ≤ K ≤ n − 1 and iK−1 = j. Since I(·) is a bijection,
to determine N( j) we need to count all subsets of {1 . . . , n} of the form {i0, . . . , j, iK}. There are
2 j−1 subsets of {1, . . . , j − 1} and n − j ways to choose iK ∈ { j + 1, . . . , n}, thus N( j) = (n − j)2 j−1.
DRAFT
28
We now show that for any constant 0 < γ < 1, the fraction of matchings M ∈ Mn such that
h(M) < γn goes to zero exponentially fast in n
Lemma 10: Fix 0 < γ < 1. Then, Nγ/N = O(n2−(1−γ)n).
Proof: We first compute N.
N =
n−1
Xi=0
N(i) = n +
n−1
Xi=1
(n − i)2i−1 = n + n
n−2
Xi=0
2i −
n−1
Xi=1
i2i−1.
The second sum can be shown (e.g. by induction) to be equal to (n − 1) + (n − 2)(2n−1 − 1).
Therefore,
N = n + n(2n−1 − 1) − (n − 1) − (n − 2)(2n−1 − 1) = 2n − 1 = Ω(2n).
Similarly, letting k = ⌈γn⌉ we have that,
k−1
k−2
k−1
Nγ ≤
N(i) = n + n
Xi=0
= n + n(2k−1 − 1) − (k − 1) − (k − 2)(2k−1 − 1)
Xi=1
2i −
i2i−1
Xi=0
= 2k−1(n − k − 2) − 1 = O(n2⌈γn⌉).
Therefore, the fraction of matchings in Mn with height h(M) < γn is Nγ/N = O(n2−(1−γ)n).
References
[1] S. Abdallah and V. Lesser. Organization-based cooperative coalition formation. In IEEE Conference on Intelligent Agent
Technology, pages 162 -- 168, 2004.
[2]
I. Ashlagi, M. Braverman, and A. Hassidim. Matching with couples revisited. In ACM EC, pages 335 -- 336, 2011.
[3] S. Berman, A. Halasz, M.A. Hsieh, and V. Kumar. Optimized stochastic policies for task allocation in swarms of robots.
IEEE Trans. on Robotics, 25(4):927 -- 937, 2009.
[4] V.D. Blondel, J.M. Hendrickx, A. Olshevsky, and J.N. Tsitsiklis. Convergence in multiagent coordination, consensus, and
flocking. In IEEE CDC, pages 2996 -- 3000, 2005.
[5] F. Bullo, J. Cort´es, and S. Martinez. Distributed control of robotic networks: a mathematical approach to motion
coordination algorithms. Princeton Univ Pr, 2009.
[6] A. Cenedese, F. Cerruti, M. Fabbro, C. Masiero, and L. Schenato. Decentralized task assignment in camera networks. In
IEEE CDC, pages 126 -- 131, 2010.
[7] K.S. Cook, R.M. Emerson, M.R. Gillmore, and T. Yamagishi. The distribution of power in exchange networks: Theory
and experimental results. American Journal of Sociology, pages 275 -- 305, 1983.
[8] L. Coviello, M. Franceschetti, M.D. McCubbins, R. Paturi, and A. Vattani. Human matching behavior in social networks:
an algorithmic perspective. PLoS One, 2012.
DRAFT
29
[9] R. Diestel. Graph theory. Graduate texts in mathematics, pages 24 -- 26, 2005.
[10] D. Enemark, M. McCubbins, R. Paturi, and N. Weller. Does more connectivity help groups to solve social problems? In
ACM EC, 2011.
[11] M. Franceschetti and J. Bruck. A group membership algorithm with a practical specification. IEEE Trans. Parallel and
Distributed Systems, 12(11):1190 -- 1200, 2001.
[12] D. Gale and L.S. Shapley. College admissions and the stability of marriage. The American Mathematical Monthly,
69(1):9 -- 15, 1962.
[13] M.E. Gaston and M. desJardins. Agent-organized networks for dynamic team formation. In ACM AAMAS, pages 230 -- 237,
2005.
[14] J.W. Hatfield and S.D. Kominers. Multilateral matching. In ACM E-Commerce, pages 337 -- 338, 2011.
[15] J.E. Hopcroft and R.M. Karp. A n5/2 algorithm for maximum matchings in bipartite. In IEEE SSAT, pages 122 -- 125, 1971.
[16] B. Horling and V. Lesser. A survey of multi-agent organizational paradigms. The Knowledge Engineering Rev., 19(04):281 --
316, 2004.
[17] S. Judd, M. Kearns, and Y. Vorobeychik. Behavioral dynamics and influence in networked coloring and consensus. PNAS,
107(34):14978 -- 14982, 2010.
[18] Y. Kanoria, M. Bayati, C. Borgs, J. Chayes, and A. Montanari. Fast convergence of natural bargaining dynamics in
exchange networks. In ACM STOC, pages 1518 -- 1537, 2011.
[19] M. Kearns, S. Judd, J. Tan, and J. Wortman. Behavioral experiments on biased voting in networks. PNAS, 106(5):1347,
2009.
[20] M. Kearns, S. Suri, and N. Montfort. An experimental study of the coloring problem on human subject networks. Science,
313(5788):824, 2006.
[21] J. Kleinberg. Cascading behavior in networks: Algorithmic and economic issues. Algorithmic game theory, pages 613 -- 632,
2007.
[22] J. Kleinberg and ´E. Tardos. Balanced outcomes in social exchange networks. In ACM STOC, pages 295 -- 304, 2008.
[23] Z. Lotker, B. Patt-Shamir, and S. Pettie.
Improved distributed approximate matching.
In ACM SPAA, pages 129 -- 136,
2008.
[24] N.A. Lynch. Distributed algorithms. Morgan Kaufmann, 1996.
[25] M.D. McCubbins, R. Paturi, and N. Weller. Connected coordination: Network structure and group coordination. American
Politics Research, 37:899, 2009.
[26] A. Montanari and A. Saberi. The spread of innovations in social networks. PNAS, 107(47):20196, 2010.
[27] B.J. Moore and K.M. Passino. Distributed task assignment for mobile agents. IEEE Trans. on Aut. Control, 52(4):749 -- 753,
2007.
[28] A. Nedi´c and A. Ozdaglar. Convergence rate for consensus with delays. Journal of Global Optimization, 47(3):437 -- 456,
2010.
[29] A. Nedi´c, A. Ozdaglar, and P.A. Parrilo. Constrained consensus and optimization in multi-agent networks. IEEE Trans.
on Aut. Control, 55(4):922 -- 938, 2010.
[30] A. Olshevsky and J.N. Tsitsiklis. Convergence rates in distributed consensus and averaging. In IEEE CDC, pages 3387 --
3392, 2006.
[31] F. Pasqualetti, S. Martini, and A. Bicchi. Steering a leader-follower team via linear consensus. Hybrid Systems: Computation
and Control, pages 642 -- 645, 2008.
DRAFT
30
[32] S. Pettie and P. Sanders. A simpler linear time 2/3-approximation for maximum weight matching. Information Processing
Letters, 91(6):271 -- 276, 2004.
[33] A.R. Rahmani, M. Ji, M. Mesbahi, and M.B. Egerstedt. Controllability of multi-agent systems from a graph-theoretic
perspective. SIAM Journal on Control and Optimization, 48(1):162 -- 186, 2010.
[34] A.E. Roth. The evolution of the labor market for medical interns and residents: a case study in game theory. The Journal
of Political Economy, pages 991 -- 1016, 1984.
[35] A.E. Roth and M.A.O. Sotomayor. Two-sided matching: A study in game-theoretic modeling and analysis. Cambridge
Univ Pr, 1992.
[36] A. Tahbaz-Salehi and A. Jadbabaie. A necessary and sufficient condition for consensus over random networks.
IEEE
Trans. on Aut. Control, 53(3):791 -- 795, 2008.
[37] A. Tahbaz-Salehi and A. Jadbabaie. Consensus over ergodic stationary graph processes.
IEEE Trans. on Aut. Control,
55(1):225 -- 230, 2010.
[38] H.G. Tanner. On the controllability of nearest neighbor interconnections. In IEEE CDC, pages 2467 -- 2472, 2004.
[39] P. Tosic and G. Agha. Maximal clique based distributed group formation for autonomous agent coalitions. In Coalitions
and Teams Workshop, AAMAS, 2004.
[40] L. Vig and J.A. Adams. Multi-robot coalition formation. IEEE Transactions on Robotics, 22(4):637 -- 649, 2006.
[41] H.P. Young. The diffusion of innovations in social networks. The Economy As an Evolving Complex System III, page 267,
2006.
DRAFT
|
cs/0012004 | 1 | 0012 | 2000-12-11T10:17:36 | Improving Performance of heavily loaded agents | [
"cs.MA",
"cs.AI"
] | With the increase in agent-based applications, there are now agent systems that support \emph{concurrent} client accesses. The ability to process large volumes of simultaneous requests is critical in many such applications. In such a setting, the traditional approach of serving these requests one at a time via queues (e.g. \textsf{FIFO} queues, priority queues) is insufficient. Alternative models are essential to improve the performance of such \emph{heavily loaded} agents. In this paper, we propose a set of \emph{cost-based algorithms} to \emph{optimize} and \emph{merge} multiple requests submitted to an agent. In order to merge a set of requests, one first needs to identify commonalities among such requests. First, we provide an \emph{application independent framework} within which an agent developer may specify relationships (called \emph{invariants}) between requests. Second, we provide two algorithms (and various accompanying heuristics) which allow an agent to automatically rewrite requests so as to avoid redundant work---these algorithms take invariants associated with the agent into account. Our algorithms are independent of any specific agent framework. For an implementation, we implemented both these algorithms on top of the \impact agent development platform, and on top of a (non-\impact) geographic database agent. Based on these implementations, we conducted experiments and show that our algorithms are considerably more efficient than methods that use the $A^*$ algorithm. | cs.MA | cs |
Improving Performance of Heterogeneous Agents
Fatma Ozcan, V.S. Subrahmanian
University of Maryland, Dept. of CS
College Park, MD 20752, USA
{fatma,vs}@cs.umd.edu
and
Jurgen Dix
The University of Manchester, Dept. of CS
Oxford Road, Manchester, M13 9PL, UK
[email protected]
With the increase in agent-based applications, there are now agent systems that support concur-
rent client accesses. The ability to process large volumes of simultaneous requests is critical in
many such applications. In such a setting, the traditional approach of serving these requests one
at a time via queues (e.g. FIFO queues, priority queues) is insufficient. Alternative models are
essential to improve the performance of such heavily loaded agents. In this paper, we propose a set
of cost-based algorithms to optimize and merge multiple requests submitted to an agent. In order
to merge a set of requests, one first needs to identify commonalities among such requests. First,
we provide an application independent framework within which an agent developer may specify
relationships (called invariants) between requests. Second, we provide two algorithms (and var-
ious accompanying heuristics) which allow an agent to automatically rewrite requests so as to
avoid redundant work -- these algorithms take invariants associated with the agent into account.
Our algorithms are independent of any specific agent framework. For an implementation, we im-
plemented both these algorithms on top of the IMPACT agent development platform, and on top
of a (non-IMPACT) geographic database agent. Based on these implementations, we conducted
experiments and show that our algorithms are considerably more efficient than methods that use
the A∗ algorithm.
Categories and Subject Descriptors: I.2.12 [Artificial Intelligence]: Distributed AI -- Intelli-
gent Agents; I.2.3 [Artificial Intelligence]: Deduction and Theorem Proving; D.2.12 [Software
Engineering]: Interoperability; H.2.4 [Database Management]: Heterogenous Databases
General Terms: Multi-Agency, Logical Foundations, Programming
Additional Key Words and Phrases: Heterogenous Data Sources, Multi-Agent Reasoning
1. MOTIVATION AND INTRODUCTION
A heavily loaded agent is one that experiences a large volume of service requests
and/or has a large number of conditions to track on behalf of various users. The
traditional model for servicing requests is via one kind of queue or the other (e.g.
FIFO, LIFO, priority queue, etc.). For instance, a company may deploy a PowerPoint
agent ppt that automatically creates PowerPoint presentations for different users
The first and third authors gratefully acknowledge support from the Army Research Labora-
tory under contract number DAAL01-97-K0135, and by DARPA/AFRL under grant number
F306029910552.
2
·
F. Ozcan, V.S. Subrahmanian and J. Dix
based on criteria they have registered earlier. The finance director may get the latest
budget data presented to him, a shop worker may get information on the latest work
schedules for him, and the CEO may get information on stock upheavals.
If the ppt agent has thousands of such presentations to create for different users,
it may well choose to exploit "redundancies" among the various requests to enhance
its own performance. Hence, rather than sequentially creating a presentation for
the CEO, then one for the finance director, then one for the marketing manager,
then one for the shop manager, etc., it may notice that the finance director and
CEO both want some relevant financial data -- this data can be accessed and a
PowerPoint page created for it once, instead of twice. Likewise, a heterogeneous
database agent hdb tracking inventory information for thousands of users may well
wish to exploit the commonality between queries such as
Find all suppliers who can provide 1000 automobile engines by June
25, 2003 and Find all suppliers who can provide 1500 VX2 automobile
engines by June 21, 2003.
In this case, the latter query can be executed by using the answer returned by the
first query, rather than by executing the second query from scratch. This may be
particularly valuable when the hdb agent has to access multiple remote supplier
databases -- by leveraging the common aspects of such requests, the hdb agent can
greatly reduce load on the network and the time taken to jointly process these two
requests.
The same problem occurs in yet another context.
[Subrahmanian et al. 2000]
have described a framework called IMPACT within which software agents may be
built on top of arbitrary data structures and software packages. In their framework,
an agent manipulates a set of data structures (including a message box) via a set
of well defined functions. The state of the agent at a given point in time consists
of a set of objects in the agent's data structures. The agent also has a set of
integrity constraints. When the agent state changes (this may happen if a message
is received from another agent, a shared workspace is written by another agent or
entity, a clock tick occurs, etc.), the agent must take some actions that cause the
state to again be consistent with the integrity constraints. Hence, each agent has an
associated set of actions (with the usual preconditions and effects), and an agent
program which specifies under what conditions an agent is permitted to take an
action, under what conditions it is obliged to take an action, under what conditions
it is forbidden from taking an action, and under what conditions an action is in fact
taken. [Eiter et al. 2000] have shown how (under some restrictions) such an agent
program may be compiled into a set of conditions to be evaluated at run-time over
the agent's state. When the agent state changes, then for each action α, one such
condition needs to be evaluated over the state in order to determine which instances
of that action (if any) need to be performed. Hence, numerous such conditions need
to be simultaneously evaluated so that the agent can decide what actions to take
so as to restore consistency of the state with the integrity constraints.
Therefore, in this paper, we consider the following technical problem. Suppose
an agent is built on top of heterogeneous data structures (e.g. using methods
such as those described in various agent frameworks such as [Eiter et al. 1999;
Subrahmanian et al. 2000; Dix et al. 2000; Dix et al. 2001; Dix et al. 2000]).
Improving Performance of Heavily-Loaded Agents
·
3
Suppose the agent is confronted with a set S of requests. How should the
agent process these requests so as to reduce the overall load on itself ?
In the case of the ppt agent for example, this capability will allow the agent to
recognize the fact that many presentations requested by different clients require
common financial data to be computed and/or analyzed, and hence, performing
this once instead of many times will most certainly enhance performance. Likewise,
in the case of the hdb agent, merging the two queries about automobile engines
presented earlier allows the agent to reduce load on itself, thus allowing it to respond
to other queries faster than by queuing.
The paper is organized as follows: First, we provide the basic definitions and
some preliminary results that will be employed throughout the paper in Section 2.
Then, we present our architecture in Section 3. In Sections 4 and 5, we discuss
the development phase and the deployment phase components, respectively. The
experiments are discussed in Section 6. Finally, Section 7 presents related work and
Section 8 concludes the paper.
2. PRELIMINARIES
All agents manipulate some set T of data types and manipulate these types via
some set of functions (application program interface functions). The input/output
types of functions are known.
If d is the name of a data structure (or even a
software package), and f is an n-ary function defined in that package, then
is a code call. This code call says
d : f (a1, . . . , an)
Execute function f as defined in data structure/package d on the stated
list of arguments.
We assume this code call returns as output, a set of objects -- if an atomic ob-
ject is returned, it can be coerced into a set. For instance, if we consider a com-
monly used data structure called a quad-tree [Samet 1989] for geographic reasoning,
quadtree : range(h20, 30i, T, 40)) may be a code call that says find all objects in the
quadtree the root of which is pointed to by T which are within 40 units of location
h20, 30i -- this query returns a set of points.
An atomic code call condition is an expression of the form
in(t, d : f (a1, . . . , an))
which succeeds if t is in the set of answers returned by the code call in question.
For example, in(t, excel : chart (excelFile, rec, date)) is an atomic code call condition
that succeeds if t is a chart plotting rec with respect to date in the excelFile.
We assume that for each type τ manipulated by the agent, there is a set root (τ ) of
"root" variable symbols ranging over τ . In addition, suppose τ is a complex record
type having fields f1, . . . , fn. Then, for every variable X of type τ , we require that
X.fi be a variable of type τi where τi is the type of field fi. In the same vein, if
fi itself has a sub-field g of type γ, then X.fi.g is a variable of type γ, and so on.
The variables, X.fi, X.fi.g, etc. are called path variables. For any path variable Y of
the form X.path, where X is a root variable, we refer to X as the root of Y, denoted
4
·
F. Ozcan, V.S. Subrahmanian and J. Dix
by root (Y); for technical convenience, root (X), where X is a root variable, refers to
itself. If S is a set of variables, then root (S) = {root (X) X ∈ S}.
Convention 2.1. From now on, we use lower case letters (a, b, c, c1, . . . ) to denote
constants and upper case letters (X, Y, Z, X1, . . . ) to denote variables. When it is clear
from context, we will also use lower case letters like s, t as metavariables ranging
over constants, variables or terms.
A code call condition (ccc) may now be defined as follows:
(1) Every atomic code call condition is a code call condition.
(2) If s and t are either variables or objects, then s = t is an (equality) code call
condition.
(3) If s and t are either integers/real valued objects, or are variables over the
integers/reals, then s < t, s > t, s ≤ t, and s ≥ t are (inequality) code call
conditions.
(4) If χ1 and χ2 are code call conditions, then χ1 & χ2 is a code call condition.
Code call conditions provide a simple, but powerful language syntax to access het-
erogeneous data structures and legacy software code.
Example 2.1. [Sample ccc] The code call condition
in(FinanceRec, rel : select (financeRel, date, "=", "11/15/99")) &
FinanceRec.sales ≥ 10K &
in(C, excel : chart (excelFile, FinanceRec, day)) &
in(Slide, ppt : include(C, "presentation.ppt"))
is a complex condition that accesses and merges data across a relational database,
an Excel file, and a PowerPoint file. It first selects all financial records associated
with "11/15/99": this is done with the variable FinanceRec in the first line. It
then filters out those records having sales more than 10K (second line). Using the
remaining records, an Excel chart is created with day of sale on the x-axis and the
resulting chart is included in the PowerPoint file "presentation.ppt" (fourth line).
In the above example, it is very important that the first code call be evaluable. If,
for example the constant f inanceRel were a variable, then
rel : select (FinanceRel, date, "=", "11/15/99")
would not be evaluable, unless there were another condition instantiating this vari-
able.
In order to come up with a notion of evaluability, we need the following
notion.
Definition 2.2 (Dependent ccc's). For an atomic code call condition of the form
in(Xi, cci) we define root (cci) = {root (Y) Y occurs in cci} and root (Xi) = {root (Y))
Y occurs in Xi}. For an (in-)equality code call condition cccin/eq we define var(cccin/eq) =
{root (Y)) Y occurs in cccin/eq}.
A code call condition χj is said to be dependent on χi
iff the following holds:
(1) Case 1: χi is of the form in(Xi, cci).
(a) If χj is an atomic code call condition of the form in(Xj, ccj) then
root (Xi) ⊆ root (ccj).
Improving Performance of Heavily-Loaded Agents
·
5
(b) If χj is an equality or inequality code call condition of the form s1 op s2,
then either s1 is a variable and root (s1) ∈ root (Xi) or s2 is a variable and
root (s2) ∈ root (Xi) or both.
(2) Case 2: χi is an (in-)equality code call condition.
(a) If χj is an atomic code call condition of the form in(Xj, ccj) then
var(χi) ⊆ root (ccj).
(b) If χj is an equality or inequality code call condition of the form s1 op s2,
then either s1 is a variable and root (s1) ∈ var(χi) or s2 is a variable and
root (s2) ∈ var(χi) or both.
Example 2.3. [Dependency among ccc's] The ccc χ1 : FinanceRec.sales ≥ 10K
is dependent on the atomic code call condition
χ2 : in(FinanceRec, rel : select (financeRel, date, "=", "11/15/99")),
because root (FinanceRec.sales) ∈ root (FinanceRec). Similarly, the atomic code
call condition χ3 : in(C, excel : chart (excelFile, FinanceRec, day)) is dependent on
the atomic code call condition χ2, as the root variable FinanceRec which appears
as an argument in the code call of χ3 is instantiated in χ2.
Definition 2.4 (Code Call Evaluation Graph (cceg) of a ccc). A code call evalu-
ation graph for a code call condition χ = χ1&...&χn, n ≥ 1 where each χi is
either an atomic, equality or inequality code call condition, is a directed graph
cceg(χ) = (V, E) where:
(1) V =def {χi 1 ≤ i ≤ n},
(2) E =def {hχi, χji χj is dependent on χi and 1 ≤ i 6= j ≤ n}.
Example 2.5. Figure 1 shows an example code call evaluation graph for the code
call condition of Example 2.1.
If f inRel were a variable FinRel, then the ccc would depend on the equality ccc
FinRel = f inRel.
Using the dependency relation on the constituents of a code call condition, we
are now able to give a precise description of an evaluable ccc.
Definition 2.6 (Evaluability of a ccc, varbase(ccc)). A code call evaluation graph
is evaluable iff
(1) It is acyclic.
(2) For all nodes χi, with in-degree 0 the following holds:
(a) If χi is an atomic code call condition of the form in(Xi, d : f (d1, . . . , dn)),
then each di, 1 ≤ i ≤ n, is ground.
(b) If χi is an equality or inequality code call condition of the form s1 op s2,
then either s1 or s2 or both are constants.
A code call condition ccc is evaluable iff it has an evaluable code call evaluation
graph.
For an evaluable ccc, we denote by varbase(ccc) the set of all variables ocurring
in nodes having in-degree 0. The set var(ccc) of all variables ocurring in ccc may
be a superset of varbase(ccc).
6
·
F. Ozcan, V.S. Subrahmanian and J. Dix
in(FinanceRec, rel : select(finRel, date, "=", "11/15/99"))
FinancRec.sales ≥ 10K
in(C, excel : chart (excFile, FinanceRec, day))
in(Slide, ppt : include(C, "presnt.ppt"))
Fig. 1. The code call evaluation graph of Example 2.1
Example 2.7. The code call evaluation graph in Figure 1 is evaluable because the
atomic code call condition of the only node with in-degree 0 has ground arguments
in its code call and it contains no cycles.
In [Eiter et al. 2000] the notion of a safe code call was defined to provide the
necessary means to check if a given code call is evaluable. It defines a linear ordering
of atomic, equality and inequality code calls within a given code call condition
in such a way that when executed from left to right the code call condition is
executable. Before tying our new notion of graph-evaluability to the notion of
safety, we recapitulate the definition of safety from [Eiter et al. 2000].
Definition 2.8 (Safe Code Call (Condition)).
A code call d : f (arg1, . . . , argn) is safe iff each argi is ground. A code call con-
dition χ1 & . . . & χn, n ≥ 1, is safe iff there exists a permutation π of χ1, . . . , χn
such that for every i = 1, . . . , n the following holds:
(1) If χπ(i) is an equality/inequality s1 op s2, then
-- at least one of s1,s2 is a constant or a variable X such that root (X) belongs
to RVπ(i) = {root(Y) ∃j < i s.t. Y occurs in χπ(j)};
-- if si is neither a constant nor a variable X such that root (X) ∈ RVπ(i), then
si is a root variable.
(2) If χπ(i) is an atomic code call condition of the form in(Xπ(i), ccπ(i)), then
the root of each variable Y occurring in ccπ(i) belongs to RVπ(i), and either Xπ(i)
is a root variable, or root (Xπ(i)) is from RVπ(i).
We call the permutation π with the above properties a witness to the safety.
Intuitively, a code call is safe, if we can reorder the atomic code call conditions
occurring in it in a way such that we can evaluate these atoms left to right, assuming
that root variables are incrementally bound to objects.
Improving Performance of Heavily-Loaded Agents
·
7
Example 2.9. Consider the code call condition
in(FinanceRec, rel : select (financeRel, data, "=", "11/15/99")) &
in(C, excel : chart (excelFile, FinanceRec, day)).
This code call condition is safe as it meets both of the safety requirements. However,
the following code call condition is not safe:
in(FinanceRec, rel : select (financeRel, data, "=", "11/15/99")) &
in(C, excel : chart (ExcelFile, FinanceRec, day)).
This is because, there is no permutation of these two atomic code call conditions
which allows safety requirement 1 to be met for the variable ExcelFile.
As a cceg is acyclic for any evaluable graph, ccegs determine a partial ordering
(cid:22) on the χi's:
χi (cid:22) χj if and only if hχi, χji ∈ E.
Hence, we may abuse notation and talk about topological sorts [Knuth 1997] of
a graph to mean the topological sort of the associated partial ordering. Recall
that given a partially ordered set (S, ≤), a topological sorting of that set yields a
linearly ordered set (S, (cid:22)) such that (∀x, y ∈ S)x ≤ y → x (cid:22) y. In the same vein,
a topological sort of a directed acyclic graph (dag) is a linear ordering of nodes in
the graph, such that if there exists an edge hv1, v2i in the graph, then v1 precedes
v2 in the topological sort.
Theorem 2.10. π is a witness to the safety of χ if and only if π is a valid topo-
logical sort of the cceg of χ.
The algorithm Create-cceg (Figure 2) takes a code call condition χ and creates
an evaluable code call evaluation graph if χ is evaluable -- otherwise it returns NIL.
The following example demonstrates the working of this algorithm for the code
call condition of Example 2.1.
Example 2.11. Let
χ1 : in(FinanceRec, rel : select (financialRel, date, "=", "11/15/99")),
χ2 : FinanceRec.sales ≥ 10K,
χ3 : in(C, excel : chart (excelFile, FinanceRec, day)), and
χ4 : in(Slide, ppt : include(C, "presentation.ppt")).
First, L = {χ1, χ2, χ3, χ4}, L′ = V ar = E = ∅. We first create a node for each of
the four code call conditions. Ok = {χ1, χ2}, as all arguments in the code call of χ1
are ground, and 10K is a constant in χ2. Next, we create the edge (χ1, χ2). Because
χ2 depends on χ1. Then, L = {χ3, χ4}, L′ = {χ1, χ2} and V ar = {FinanceRec}.
In the first iteration of the while loop Ψ = {χ3} as χ3 depends on χ1, and all
variables in χ3 (FinanceRec) are in V ar. V ar becomes {FinanceRec, C} and we
create the edge (χ1, χ3). Now, L = {χ4}, L′ = {χ1, χ2, χ3}. In the second iteration
of the while loop Ψ = {χ4}, since χ4 depends on χ3 and all variables in χ4 (namely
{C}) are in V ar. This time, V ar becomes {FinanceRec, C, Slide}, and we add
the edge hχ3, χ4i to the graph. Now L becomes the empty set and the algorithm
returns the code call evaluation graph given in Figure 1.
8
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Create-cceg(χ)
/* Input: χ : χ1 & χ2 & ... & χn
/* Output:NIL, if χ is not evaluable
/*
*/
*/
a cceg CCEG = (V, E), if χ is evaluable*/
:= {χ1, χ2, .., χn};
L
:= ∅;
L′
V ar := ∅;
E := ∅;
V
Ok := {χi χi is either of the form in(X, d: f (args)) where args is ground or
1 ≤ i ≤ n};
:= {χi
of the form s1 op s2, where either s1 or s2 or both are constants };
for all pairs hχi, χj i, χi, χj ∈ Ok such that χj is dependent on χi
create an edge hχi, χji and add it to E;
V ar := V ar ∪ {root(Xi) in(Xi, d : f (args)) ∈ Ok};
L
L′
while (L is not empty) do
:= L − Ok;
:= L′ ∪ Ok;
Ψ := {χi χi ∈ L and all variables in χi are in V ar and
∃χj ∈ L' such that χi depends on χj};
if card (Ψ) = 0 then Return NIL;
else
V ar := V ar ∪ {root(Xi) in(Xi, d: f (args)) ∈ Ψ};
for all pairs hχi, χji, χj ∈ Ψ, such that χj is dependent on χi ∈ L′
create an edge hχi, χji and add it to E;
L := L − Ψ;
L′ := L′ ∪ Ψ;
Return (V, E);
End-Algorithm
Fig. 2. Create-cceg Algorithm
Convention 2.2. Throughout the rest of this paper, we assume that all code call
conditions considered are evaluable and that the graph associated with each code
call condition has been generated.
The Create-cceg algorithm runs in O(n3) time, where n is the number of con-
stituents χi of χ. The number of iterations of the while loop is bounded by n, and
the body of the while loop can be executed in quadratic time.
We have conducted experiments to evaluate the execution time of the Create-
cceg algorithm. Those experiments are described in detail in Section 6.1.
Definition 2.12 (State of an agent). The state of an agent is a set of ground code
call conditions.
When an agent developer builds an agent, she specifies several parameters. One of
these parameters must include some domain-specific information, explicitly laying
out what inclusion and equality relations are known to hold of code calls. Such
information is specified via invariants.
Definition 2.13 (Invariant Expression).
Improving Performance of Heavily-Loaded Agents
·
9
-- Every evaluable code call condition is an invariant expression. We call such
expressions atomic.
-- If ie1 and ie2 are invariant expressions, then (ie1 ∪ie2) and (ie1 ∩ie2) are invariant
expressions. (We will often omit the parentheses.)
Example 2.14. Two examples of invariant expressions are:
in(StudentRec, rel : select (courseRel, exam, "=", midterm1)) &
in(C, excel : chart (excelFile, StudentRec, grade))
in(X, spatial : horizontal (T, B, U)) ∪ (in(Y, spatial : horizontal (T′, B′, U′)) ∪
in(Z, spatial : horizontal (T′, B′, U))).
What is the meaning, i.e. the denotation of such expressions? The first invariant
represents the set of all objects c such that
in(StudentRec, rel : select (courseRel, exam, "=", midterm1)) &
in(c, excel : chart (excelFile, StudentRec, grade))
holds: we are looking for instantiations of C. Note that under this viewpoint,
the intermediate variable StudentRec which is needed in order to instantiate C to
an object c does not matter. There might just as well be situations where we are
interested in pairs hc, studentreci instead of just c. Therefore a notion of denotation
must be flexible enough to allow this.
Let us now consider the invariant
in(StudentRec, rel : select(courseRel, exam, "=", TypeofExam)) &
in(C, excel : chart (excelFile, StudentRec, grade))
where the object midterm1 has been replaced by the variable TypeofExam which
is now a base variable. Then we might be interested in all c's that result if an
instantiation of TypeofExam is given, i.e. for different instantiations of TypeofExam
we get different c's. Thus we have to distinguish carefully between various sorts
of variables: base variables (defined in Definition 2.17), auxiliary variables and the
main variables defining the set of objects of interest.
Definition 2.15 (Denotation of an Invariant Expression). Let ie be an invariant
expression with var(ie) = varbase(ie) ∪ {V1, . . . , Vn}. The denotation of ie with
respect to a state S, an assignment θ of the variables in varbase(ie) and a sequence
hVi1 , . . . , Vik i (where Vi1 , . . . , Vik } ⊆ {V1, . . . , Vn}) is defined as follows:
-- Let
[ie]S,θ := { hoπ(1), . . . , oπ(nk)i (ie θ)τ is ground and is true in state S,
π is a permutation on {1, . . . , n}, nk ≤ n,
τ is a grounding substitution,
τ is of the form [V1/o1, . . . , Vn/on] }
-- [ie1 ∩ ie2]S,θ := [ie1]S,θ ∩ [ie2]S,θ,
-- [ie1 ∪ ie2]S,θ := [ie1]S,θ ∪ [ie2]S,θ.
10
·
F. Ozcan, V.S. Subrahmanian and J. Dix
The variables in {Vπ(1), . . . , Vπ(nk)} are called main variables while all remain-
ing variables {Vπ(nk+1), . . . , Vπ(n)} are called auxiliary. The substitution τ is de-
fined on the set of main variables (in our example above it is the set {C}). The
set of auxiliary variables consists of {StudentRec} and the only base variable is
TypeofExam. Taking the first viewpoint in our example above, τ would be defined
on {C, StudentRec}.
As usual, we abuse notation and say that ie1 ⊆ ie2 if [ie1]S,θ ⊆ [ie2]S,θ for all S
and all assignments θ. Similarly, we say that ie1 = ie2 if [ie1]S,θ = [ie2]S,θ for all S
and all assignments θ. Now we are ready to define an invariant.
Definition 2.16 (Invariant Condition (ic)). An invariant condition atom is a state-
ment of the form t1 Op t2 where Op ∈ {≤, ≥, <, >, =} and each of t1, t2 is either a
variable or a constant. An invariant condition (IC) is defined inductively as follows:
(1) Every invariant condition atom is an ic.
(2) If C1 and C2 are ic's, then C1 ∧ C2 and C1 ∨ C2 are ic's.
Definition 2.17 (Invariant inv, varbase(inv), INVsimple, INVordinary, INV). An in-
variant, denoted by inv, is a statement of the form
ic =⇒ ie1 ℜ ie2
(1)
where
(1) ic is an invariant condition, all variables occuring in ic are among varbase(ie1)∪
varbase(ie2).
(2) ℜ ∈ {=, ⊆}, and
(3) ie1, ie2 are invariant expressions.
If ie1 and ie2 both contain solely atomic code call conditions, then we say that inv
is a simple invariant.
If ic is a conjunction of invariant condition atoms, then we say that inv is an
ordinary invariant.
We denote by varbase(inv) the set of all variables of inv that need to be instan-
tiated in order to evaluate inv in the current state: varbase(inv) := varbase(ie1) ∪
varbase(ie2).
The set of all invariants is denoted by INV. The set of all simple invariants is
denoted by INVsimple and the set of all ordinary invariants is denoted by INVordinary.
An invariant expresses semantic knowledge about a domain. Invariants used by
each of our two example agents -- ppt and hdb are given below.
Example 2.18. The following are valid invariant conditions: val1 ≤ val2, Rel1 =
Rel2. Note that such expressions can be evaluated over a given state S. Only the
two relations ≤ and ≥ require that the constants occurring on the right or left hand
sides must be of the appropriate type: these relations must be defined over each
state S.
The invariant
File = File′ ∧ Rec = Rec′ ∧ Col = Col′
=⇒
in(C, excel : chart one(File, Rec, Col)) = in(C′, excel : chart two(File′, Rec′, Col′))
Improving Performance of Heavily-Loaded Agents
·
11
says that these two code call conditions are equivalent if their arguments unify.
Note that the code calls involved are different. The invariant,
Rel = Rel′ ∧ Attr = Attr′ ∧ Op = Op′ = "≤" ∧ Val < Val′
=⇒
in(X, rel : select (Rel, Attr, Op, Val)) ⊆ in(Y, rel : select(Rel′, Attr′, Op′, Val′))
says that the code call condition in(X, rel : select (Rel, Attr, Op, Val)) can be evalu-
ated by using the results of the code call condition
in(Y, rel : select (Rel′, Attr′, Op′, Val′))
if the above conditions are satisfied. Note that this expresses semantic information
that is not available on the syntactic level: the operator "≤" is related to the
relation symbol "<".
Convention 2.3. Throughout the rest of this paper, we assume that we have the
code calls ag : addition (X, Y) and ag : subtraction(X, Y) available for all agents ag.
These code calls return the sum, (resp. the difference) of X and Y, where X and Y
range over the reals or the integers. We also assume we have code calls ag : ge0 (X)
(resp. ag : geq 0 (X)) available which returns 1 if X is strictly greater (resp. greater
or equal) than 0 and 0 otherwise.
By stating invariants, we focus interest on states where the invariants hold. This
is like in classical predicate logic, where we write down axioms and thereby constrain
the set of models -- we are only interested in the class of models satisfying the
axioms. We therefore have to define formally what it means for a state S to satisfy
an invariant inv.
Definition 2.19 (Satisfaction, S = inv, I = inv, Taut).
A state S satisfies the invariant inv having the form shown in Formula (1) above
with respect to an assignment θ iff for every ground instance (inv θ) τ of inv θ, it is
the case that either (ic θ) τ evaluates to false, or (ie1 θ) τ ℜ (ie2 θ) τ is true in S.
We say that a set of invariants I entails an invariant inv iff all states S and
assignments θ satisfying I also satisfy inv. We write I = inv. We call an invariant
inv a tautology, if inv is true in all states S for all assignments θ:
Taut =def {inv = inv}.
From now on we do not mention explicitly the assignment θ and we write simply
S = inv.
It is worth noting that there are indeed trivial invariants that are satisfied in all
states: such invariants are like tautologies in classical logic (therefore their name
in the last definition). For example the following invariant is true in all states
whatsoever (note the difference from the similar invariant above):
File =File′ ∧ Rec =Rec′ ∧ Col =Col′ =⇒
in(C, excel : chart (File, Rec, Col)) = in(C′, excel : chart (File′, Rec′, Col′))
12
·
F. Ozcan, V.S. Subrahmanian and J. Dix
The reason that this last invariant is a tautology, is that for the same set of instances
of Y for a code call d : f (Y), we always get the same set representing the atomic code
call condition in(X, d : f (Y)).
Theorem 2.20.
There is a translation Trans which associates with each conjunction ic of invariant
condition atoms, and invariant expression ie another invariant expression Trans(ic, ie1)
such that the following holds for all states S, assignments θ and invariants ic =⇒ ie1 ℜ ie2
(S, θ) = (ic =⇒ ie1 ℜ ie2)
if and only if
(S, θ) = true =⇒ Trans(ic, ie1) ℜ Trans(ic, ie2).
Corollary 2.21 (Eliminating Invariant Conditions, Trans). Let inv : ic =⇒ ie1 ℜ ie2
be an arbitrary invariant. Then, the following holds for all states S and assignments
θ
(S, θ) = (ic =⇒ ie1 ℜ ie2)
if and only if
(∀Ci, 1 ≤ i ≤ m) (S, θ) = true =⇒ Trans(Ci, ie1) ℜ Trans(Ci, ie2).
where the Ci, 1 ≤ i ≤ m, are the disjuncts in the DNF of ic.
3. ARCHITECTURE
Let us suppose now that we have a set I of invariants, and a set S of data struc-
tures that are manipulated by the agent. How exactly should a set C of code call
conditions be merged together? And what needs to be done to support this? Our
architecture contains two parts:
(i) a development time phase stating what the agent developer must specify when
building her agent, and what algorithms are used to operate on that specifica-
tion, and
(ii) a deployment time phase which specifies how the above development-time spec-
ifications are used when the agent is in fact running autonomously.
We describe each of these pieces below.
3.1 Development Time Phase
When the agent developer builds her agent, the following things need to be done.
(1) First, the agent developer specifies a set I of invariants.
(2) Suppose C is a set of CCCs to be evaluated by the agent. Each code call
condition χ ∈ C is represented via an evaluable cceg. Let INS(C) represent the
set of all nodes in ccegs of χs in C. That is,
INS(C) = {vi ∃χ ∈ C s.t. vi is in χ′s cceg}.
This can be done by a topological sort of the cceg for each χ ∈ C.
(3) Additional invariants can be derived from the initial set I of invariants. This
requires the ability to check whether a set I of invariants implies an inclusion
Improving Performance of Heavily-Loaded Agents
·
13
relationship between two invariant expressions. We will provide a generic test
called Chk Imp for implication checking between invariants. Although the set
of invariants entailed by I is defined by Definition 2.19, the set of invariants
actually derived by the Chk Imp test will depend on the set of axioms used
in the test. Hence, some Chk Imp tests will be sound, but not complete. On
the other hand, some tests will be "more complete" than others, because the
set of invariants derived by them will be a superset of the set of invariants
derived by others. "More complete" tests may use a larger set of axioms, hence
will be more expensive to compute. The agent developer can select a test
that is appropriate for her agent. Given an arbitrary (but fixed) Chk Imp
test, we will provide an algorithm called Compute-Derived-Invariants that
calculates the set of derivable invariants from the initial set I of invariants and
needs to be executed just once.
3.2 Deployment Time Phase
Once the agent has been "developed" and deployed and is running, it will need to
continuously determine how to merge a set C of code call conditions. This will be
done as follows:
(1) The system must identify three types of relationships between nodes in INS(C).
Identical ccc's: First, we'd like to identify nodes χ1, χ2 ∈ INS(C) which are
"equivalent" to one another, i.e. χ1 = χ2 is a logical consequence of the
set of invariants I. This requires a definition of equivalence of two code
call conditions w.r.t. a set of invariants. This strategy is useful because we
can replace the two nodes χ1, χ2 by a single node. This avoids redundant
computation of both χ1 and χ2.
Implied ccc's: Second, we'd like to identify nodes χ1, χ2 ∈ INS(C) which are
not equivalent in the above sense, but such that either χ1 ⊆ χ2 or χ2 ⊆ χ1
hold, but not both. Suppose χ1 ⊆ χ2. Then we can compute χ2 first, and
then compute χ1 from the answer returned by computing χ2. This way of
computing χ1, χ2 may be faster than computing them separately.
Overlapping ccc's: Third, we'd like to identify nodes χ1, χ2 ∈ INS(C) for
which the preceding two conditions do not hold, but χ1 & χ2 is consistent
with INS(C).
In this case, we might be able to compute the answer to
χ1 ∨ χ2. From the answer to this, we may compute the answer to χ1
and the answer to χ2. This way of computing χ1, χ2 may be faster than
computing them separately.
We will provide an algorithm, namely Improved-CSI, which will use the set of
derived invariants returned by the Compute-Derived-Invariants algorithm
above, to detect commonalities (equivalent, implied and overlapping code call
conditions) among members of C.
Example 3.1. The two code call conditions in(X, spatial : vertical (T, L, R))
and in(Y, spatial : vertical (T′, L′, R′)) are equivalent to one another if their ar-
guments are unifiable. The results of evaluating the code call condition
in(Z, spatial : range(T, 40, 50, 25))
14
·
F. Ozcan, V.S. Subrahmanian and J. Dix
is a subset of the results of evaluating the code call condition
in(W, spatial : range(T′, 40, 50, 50))
if T = T′. Note that spatial : range(T, X, Y, Z) returns all points in T that are Z
units away from the point hX, Yi. In this case, we can compute the results of the
former code call condition by executing a selection on the results of the latter
rather than executing the former from scratch. Finally, consider the following
two code call conditions:
in(X, spatial : horizontal (map, 100, 200)),
in(Y, spatial : horizontal (map, 150, 250)).
Here spatial : horizontal (map, a, b) returns all points (X, Y) in map such that
a ≤ Y ≤ b. Obviously, the results of neither of these two code call conditions
are subset of the results of the other. However, the results of these two code call
conditions overlap with one another. In this case, we can execute the code call
condition in(Z, spatial : horizontal (map, 100, 250)). Then, we can compute the
results of the two code call conditions by executing selections on the results of
this code call condition.
(2) We will then provide two procedures to merge sets of code call conditions,
BFMerge and DFMerge, that take as input, (i) the set C and (ii) the out-
put of the Improved-CSI algorithm above, and (iii) a cost model for agent
code call condition evaluations. Both these algorithms are parameterized by
heuristics and we propose three alternative heuristics. Then we evaluate our
six implementations (3 heuristics times 2 algorithms) and also compare it with
an A∗ based approach.
4. DEVELOPMENT PHASE
Prior to deployment of the agent, once the agent developer has defined a set of
invariants, we compute a set of derived invariants from it. These derived invariants
are stored. Once deployed, when the agent is confronted with a set of requests from
other agents, it can examine these stored derived invariants for a "pattern match"
which then enables it to classify invariants into one of the three categories listed
(equivalent, implied or overlapping invariants).
Consider the case when I contains the two invariants:
V1 ≤ V2 =⇒ in(X, d1 : f1 (V1)) = in(Y, d2 : f2 (V2)).
V3 ≤ V4 =⇒ in(Z, d2 : f2 (V3)) ⊆ in(W, d3 : f3 (V4)).
Clearly from these two invariants, we can infer the invariant
V1 ≤ V2 ∧ V2 ≤ V4 =⇒ in(X, d1 : f1 (V1)) ⊆ in(W, d3 : f3 (V4))
(2)
(3)
(4)
Algorithm Combine 1 (Figure 3) combines two invariants. The algorithm uses
a simplify routine which simplifies a conjunction of invariant conditions and checks
if the resulting invariant condition is inconsistent or not. If so, it returns NIL. The
Combine 1 algorithm makes use of two important algorithms: Chk Imp and
Chk Ent, which we will discuss in detail later. The Chk Imp algorithm checks
if one invariant expression implies another, while the Chk Ent algorithm checks
Improving Performance of Heavily-Loaded Agents
·
15
if some member of a set of invariants entails an other invariant. Let us first define
the table which is implemented by the Combine 1 algorithm.
Definition 4.1 (Combine1). Let inv1 : ic1 =⇒ ie1 ℜ1 ie′
1 and inv2 : ic2 =⇒ ie2 ℜ2 ie′
2.
Then, the following table provides the resulting derived relation of the form
simplify(ic1 ∧ ic2) =⇒ ie1 ℜ1 ie′
2
when inv1 and inv2 are combined. The "*" denotes a "don't care" condition in this
table. The simplify routine checks whether ic1 ∧ic2 is inconsistent. If so, it returns
ℜ1 ℜ2 Chk Imp(ie′
1, ie2) Chk Imp(ie2, ie′
1)
*
=
=
⊆
⊆
*
=
⊆
=
⊆
False
True
True
True
True
*
True
*
*
*
derived rel
NIL
=
⊆
⊆
⊆
Table 1. Summary of Combining Two Invariants
false, if not it returns an equivalent (perhaps simplified) formula for ic1 ∧ ic2 (the
precise realization of simplify is not important here and leaves enough freedom for
the actual implementation):
simplify(ic) =
if for all (S, θ) = ic,
true,
false, if for all (S, θ) = ¬ic,
φ1,
otherwise.
Figure 3 implements a slightly generalized version of the last definition. Namely,
we assume that there is given a set I of invariants and we are considering states
satisfying these invariants. This is an additional parameter. For simplicity, assume
that ℜ1 = ℜ2 = "⊆". The idea is that although the subset relation ie′
1 ⊆ ie2 might
not hold in general (i.e. in all states) it could be implied by the invariants in I
(i.e. holds in all states satisfying I). That is, if there is ic∗ =⇒ ie∗
2 ∈ I
2 ⊆ ie2 ∈ I, and (ic1 ∧
s.t.
ic2) → (ic∗ ∧ ic∗∗ ∧ ic∗∗∗)). Under these conditions, we can derive the invariant
simplify(ic1 ∧ ic2) =⇒ ie1 ⊆ ie′
2.
1 ∈ I, ic∗∗∗ =⇒ ie∗
(ic∗∗ =⇒ ie′
1 ⊆ ie∗
1 ⊆ ie∗
We introduce three notions, Chk Imp, Chk Taut and Chk Ent of increasing
complexity. The first notion, Chk Imp, is a relation between invariant expressions.
Definition 4.2 (Implication: Chk Imp, ie1 → ie2).
An invariant expression ie1 is said to imply another invariant expression ie2, de-
noted by ie1 → ie2,
iff it is the case that [ie1]S,θ ⊆ [ie2]S,θ for all S and all
assignments θ.
1where φ is any formula equivalent to ic, i.e. for all states (S, θ): (S, θ) = φ ↔ ic.
16
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Combine 1(inv1, inv2, I)
/* inv1 : ic1 =⇒ ie1 ℜ1 ie′
/* inv2 : ic2 =⇒ ie2 ℜ2 ie′
1 */
2 */
if
if
1 ⊆ ie∗
1, ie2) = false) and
(Chk Imp (ie′
(there is no ic∗ =⇒ ie∗
(ic∗∗ =⇒ ie′
(ic1 ∧ ic2) → (ic∗ ∧ ic∗∗ ∧ ic∗∗∗)), then
Return NIL;
(ℜ1 = ℜ2 = "=")
2 ∈ I s.t.
ic∗∗∗ =⇒ ie∗
1 ⊆ ie∗
1 ∈ I,
then
1) = true) or
2 ∈ I s.t.
(Chk Imp (ie2, ie′
if
(there is ic∗ =⇒ ie∗
(ic∗∗ =⇒ ie2 ⊆ ie∗
(ic1 ∧ ic2) → (ic∗ ∧ ic∗∗ ∧ ic∗∗∗))), then
relation := (ie1 = ie′
1 ⊆ ie∗
1 ∈ I,
ic∗∗∗ =⇒ ie∗
2);
2 ⊆ ie2 ∈ I,
2 ⊆ ie′
1 ∈ I,
else relation := (ie1 ⊆ ie′
2);
2);
else relation := (ie1 ⊆ ie′
derivedic := simplify(ic1 ∧ ic2);
if
derived inv := (derivedic =⇒ relation);
if (there is inv ∈ I with (Chk Ent (inv, derived inv) = true)
then Return NIL;
(derivedic = false)
then
Return NIL;
else Return derived inv;
End-Algorithm
Fig. 3. Combine 1 Algorithm
Chk Imp is said to be an implication check algorithm if it takes two invariant
expressions ie1, ie2 and returns a boolean output. We say that Chk Imp is sound
iff whenever Chk Imp(ie1, ie2)=true, then ie1 implies ie2. We say Chk Imp is
complete iff Chk Imp(ie1, ie2) = true if and only if ie1 implies ie2.
If Chk Imp1, Chk Imp2 are both sound, and for all ie1, ie2, Chk Imp1(ie1, ie2) =
true implies that Chk Imp2(ie1, ie2) = true, then we say that Chk Imp2 is more
complete than Chk Imp1.
Definition 4.3 (Chk Taut, Chk Ent as Relations between Invariants). Chk Taut
is said to be a tautology check algorithm if it takes a single invariant inv and re-
turns a boolean output. Chk Taut is sound iff whenever Chk Taut(inv)=true,
then inv ∈ Taut (see Definition 2.19). Chk Taut is complete iff Chk Taut(inv)
= true if and only if inv ∈ Taut.
Chk Ent is said to be an entailment check algorithm if it takes two invariants
inv1, inv2 and returns a boolean output. We say that Chk Ent is sound iff whenever
Chk Ent(inv1, inv2)=true, then inv1 entails inv2 (inv1 = inv2). We say Chk Ent
is complete iff Chk Ent(inv1, inv2) = true if and only if inv1 entails inv2.
Similarly to Definition 4.2, we use the notion of being more complete for tau-
tology as well as for entailment check algorithms.
Lemma 4.4 (Relation between Chk Imp, Chk Taut and Chk Ent).
Improving Performance of Heavily-Loaded Agents
·
17
(1) Chk Imp can be reduced to Chk Taut:
Chk Imp(ie1, ie2) if and only if Chk Taut(true =⇒ ie1 ⊆ ie2).
(2) Chk Taut can be reduced to Chk Imp:
Chk Taut((C1 ∨ C2 ∨ . . . ∨ Cm) =⇒ ie1 ⊆ ie2)
if and only if
∀Ci, 1 ≤ i ≤ m, Chk Imp(Trans(Ci, ie1), Trans(Ci, ie2)).
(3) Chk Taut is an instance of Chk Ent.
Thus in general, implication checking between invariant expressions is a special case
of tautology checking of invariants. Conversely, checking tautologies is an instance
of implication checking. Note that checking simple invariants is reduced to checking
implications of non-simple invariant expressions.
It is also obvious that checking for tautologies is a special case of the entailment
problem.
The following results tell us that the implementation of the Chk Imp routine
used in the Combine 1 algorithm is undecidable in general. Even if we restrict to
finite domains, it is still intractable.
Proposition 4.5 (Undecidability of Chk Imp, Chk Taut, Chk Ent).
Suppose we consider arbitrary datatypes. Then the problem of checking whether
an arbitrary invariant expression ie1 implies another invariant expression ie2 is
undecidable. The same holds for checking tautologies of invariants or entailment
between invariants.
Proposition 4.6 (co-NP Completeness of Checking Implication).
Suppose all datatypes have a finite domain (i.e. each datatype has only finitely
many values of that datatype). Then the problem of checking whether an arbitrary
invariant expression ie1 implies another invariant expression ie2 is co-NP complete.
The same holds for the problem of checking whether an invariant is a tautology.
As the problem of checking implication (and hence equivalence) between invariant
expressions is co-NP complete, in this paper, we decided to study the tradeoffs
involved in using sound, but perhaps incomplete implementations of implication
checking.
There are clearly many ways of implementing the algorithm Chk Imp that are
sound, but not complete. In this paper, we propose a generic algorithm to imple-
ment Chk Imp, where the complexity can be controlled by two input parameters --
an axiomatic inference system and a threshold.
-- The axiomatic inference system used by Chk Imp includes some axioms and
inference rules. By selecting the axioms and inference rules, the agent developer
is controlling the branching factor of the search space.
-- The second parameter called the threshold is either an integer or ∞, and de-
If it is ∞, then the generic
termines the maximum depth of the search tree.
algorithm does not have an upper bound on the number of rule applications,
and terminates either when it proves the implication or there is no further rule
that is applicable(i.e. failure). When it is an integer value, the algorithm reports
18
·
F. Ozcan, V.S. Subrahmanian and J. Dix
failure if it cannot prove the implication by using the threshold number of rule
applications.
We have conducted experiments with different instances of these two parameters.
Those experiments are discussed in detail in Section 6.2.
It is important to note that the set of all derived invariants obtained from I may
be very large because they contain "redundant" constraints. For instance, using
our example I above, every invariant of the form
V1 ≤ V2 ∧ V2 ≤ V4
=⇒
in(X, d1 : f1 (V1)) ⊆ in(W, d3 : f3 (V4)) ∪ in(T, d4 : f4 (V5)) . . .
would be entailed from I -- however, these invariants are redundant as they are
entailed by the single invariant (4).
As we have seen above (Propositions 4.5, 4.6), such an entailment test between
invariants is either undecidable or intractable. It would be much better if we had
a purely syntactical test (which must be necessarily incomplete) of checking such
implications.
The following lemma shows that entailment between two invariants can, under
certain assumptions, be reduced to a syntactical test.
Lemma 4.7. Let inv1 :
ic1 =⇒ ie1 ⊆ ie′
1 and inv2 :
ic2 =⇒ ie2 ⊆ ie′
two simple invariants, i.e. ie1 has the form in(X, d1 : f1 (. . . )), ie′
in(X, d′
2 has the form in(Y, d′
If inv1 = inv2 and inv2 is not a tautology (6= inv2), then the following holds:
1 (. . . )), ie2 has the form in(Y, d2 : f2 (. . . )) and ie′
1 : f ′
2 be
1 has the form
2 : f ′
2 (. . . )).
(1) d1=d2 and f1 = f2 ,
1 = f ′
(2) d′
2 ,
2 and f ′
1=d′
(3) In all states that do not satisfy inv2, it holds "ic2 → ic1". I.e. each coun-
terexample for inv2 is also a counterexample for inv1.
Corollary 4.8 (Sufficient Condition for Chk Ent).
There is a sufficient condition for Chk Ent(inv1, inv2) based on Chk Imp and
Chk Taut: First check whether inv2 ∈ Taut. If yes, Chk Ent(inv1, inv2) holds. If
not, check whether ic2 → ic1 holds in all states (i.e. Chk Imp(ic2, ic1)). If yes,
Chk Ent(inv1, inv2) holds.
In this paper, we use the following sound but incomplete Chk Ent algorithm.
Let inv1 : ic1 =⇒ ie1 ℜ1 ie′
true iff
1 and inv2 : ic2 =⇒ ie2 ℜ2 ie′
2. Then, Chk Ent(inv1, inv2) =
(1) For all states S: S = ic2 → ic1,
(2) (ℜ1 = "⊆" and ℜ2 = "⊆") or (ℜ1 = "=" and ℜ2 = "⊆"),
(3) ie2 → ie1,
1 → ie′
(4) ie′
2.
Improving Performance of Heavily-Loaded Agents
·
19
4.1 Computing All Derived Invariants
In this section, we define how given a set I, the set of all invariants that are entailed
by I may be computed using the selected Chk Imp and Chk Ent algorithms.
The Compute-Derived-Invariants algorithm presented in Figure 4 takes as
input a set of invariants I, and returns a set of invariants I ∗, such that every
invariant in I ∗ is entailed by I. Although the Compute-Derived-Invariants
algorithm has exponential running time, it is executed only once at registration-
time, and hence the worst case complexity of the algorithm is acceptable.
Compute-Derived-Invariants(I)
X := I;
change := true;
Done := ∅;
while change do
change := f alse
forall invi ∈ X do
forall invj ∈ X − {invi} s.t. (invi, invj ) /∈ Done do
derived inv1 := combine 1(invi, invj, X);
if derived inv1 != NIL then
X := X ∪ {derived inv1}; change := true;
derived inv2 := combine 1(invj , invi, X);
if derived inv2 != NIL then
X := X ∪ {derived inv2}; change := true;
derived inv3 := combine 2(invj , invi);
if derived inv3 != NIL then
X := X ∪ {derived inv3}; change := true;
derived inv4 := combine 3(invj , invi);
if derived inv4 != NIL then
X := X ∪ {derived inv4}; change := true;
Done := Done ∪ {(invi, invj), (invj , invi)};
Return X.
End-Algorithm
Fig. 4. Compute-Derived-Invariants Algorithm
Lemma 4.9. For all I: {inv1, inv2} ∪ I = Combine 1(inv1, inv2, I).
Combine 1 does not derive all invariants that are logically entailed by I. For
example from "true ⇒ ie1 ⊆ ie2" and "true ⇒ ie2 ⊆ ie1" we can infer "true ⇒ ie1 =
ie2". We call this procedure, slightly generalized, Combine 2. It is illustrated in
Figure 5. The unify routine takes two invariant expressions and returns the most
general unifier if the two are unifiable, and returns NIL if they are not unifiable.
Another set we need is the set of all invariant tautologies
Taut =def {true ⇒ ie1 ⊆ ie2 : Chk Imp(ie1, ie2)}.
Obviously, all tautologies are satisfied in all states and the invariant computed in
the Combine 2 Algorithm (if it exists) is entailed by the invariants it is computed
from.
Lemma 4.10. {inv1, inv2} = Combine 2(inv1, inv2).
20
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Combine 2(inv1, inv2)
/* inv1 : ic1 =⇒ ie1 ℜ1 ie′
/* inv2 : ic2 =⇒ ie2 ℜ2 ie′
1 */
2 */
if
then
(ℜ1 = ℜ2 = "⊆")
1);
2, ie1);
θ := unif y(ie2, ie′
γ := unif y(ie′
if (θ != NIL) and (γ != NIL) then
(derivedic = false)
derivedic := simplify((ic1 ∧ ic2)θγ);
if
derived inv := (derivedic =⇒ (ie1)θγ = (ie′
Return derived inv;
then Return NIL;
1)θγ);
else Return NIL.
else Return NIL.
End-Algorithm
Fig. 5. Combine 2 Algorithm
However, the above sets are still not sufficient. Consider the situation inv1 : x <
0 =⇒ ie1 ℜ1 ie′
1. Then, we can conclude
true =⇒ ie1 ℜ1 ie′
1. However, neither Combine 1 nor Combine 2 is able to
compute this invariant. As a result, we define the final routine, Combine 3, given
in Figure 6, to capture these cases.
1, and inv2 : x ≥ 0 =⇒ ie1 ℜ1 ie′
Combine 3(inv1, inv2)
/* inv1 : ic1 =⇒ ie1 ℜ1 ie′
/* inv2 : ic2 =⇒ ie2 ℜ2 ie′
1 */
2 */
if
(ℜ1 = ℜ2)
then
θ := unify(ie1, ie2);
γ := unify(ie′
2);
if (θ != NIL) and (γ != NIL) then
1, ie′
derivedic := simplify((ic1 ∨ ic2)θγ);
derived inv := derivedic =⇒ ((ie1)θγ ℜ1 (ie′
Return derived inv;
1)θγ);
Return NIL
End-Algorithm
Fig. 6. Combine 3 Algorithm
We emphasize in the Combine 3 Algorithm our use of the simplify routine
introduced just after Definition 4.1. Our example is captured because x < 0 ∨ x ≥ 0
is simplified to true. By recursively applying Combine 3, one can also handle more
complicated intervals like x < 0 ∨ (x ≥ 0 ∧ x < 1) ∨ x ≥ 1.
Lemma 4.11. {inv1, inv2} = Combine 3(inv1, inv2).
Definition 4.12 (Operator CI ). We associate with any set I of invariants, a
mapping CI : INV → INV which maps sets of invariants to sets of invariants,
Improving Performance of Heavily-Loaded Agents
·
21
as follows:
CI (X) =def {Combine 1(inv1, inv2, X ∪ I) inv1, inv2 ∈ X ∪ I} ∪
inv1, inv2 ∈ X ∪ I} ∪
inv1, inv2 ∈ X ∪ I} ∪
.
{Combine 2(inv1, inv2)
{Combine 3(inv1, inv2)
I ∪ X
Definition 4.13 (Powers of CI ). The powers of CI (X) are defined as follows:
:= Taut
CI ↑0
CI ↑(i+1) := CI (CI ↑i)
:= Si≥0(CI ↑i)
CI ↑ω
Proposition 4.14 (Monotonicity of CI). If X1 ⊆ X2, then CI (X1) ⊆ CI (X2).
Lemma 4.15. CI(CI ↑ω) ⊆ CI ↑ω.
Lemma 4.16. CI ↑ω⊆ {inv I = inv}.
What we are really interested in is a converse of the last lemma, namely that all
invariants that follow from I can be derived. Strictly speaking, this is not the case:
we already noticed that there are many redundant invariants that follow from I but
are subsumed by others. Such "redundant" invariants contribute little. We show
below that whenever an invariant is entailed from I as a whole, it is already entailed
by another variant in CI ↑ω. This is the statement of our main Corollary 4.18.
Theorem 4.17 (All Entailed "⊆"-Invariants are Subsumed in CI ↑ω).
Suppose I = inv. We assume further that all the invariants are simple and that
ℜ = "⊆" in all invariants. Then, there is inv′ ∈ CI ↑ω such that inv′ entails inv.
Corollary 4.18 (All Entailed Invariants are Subsumed in CI ↑ω). We are now con-
sidering arbitrary simple invariants, i.e. ℜ = {⊆, =}. If I = inv, then there exists
inv′ ∈ CI ↑ω such that inv′ entails inv.
The following corollary tells us that if the implementation of Chk Imp and
Chk Ent algorithms used are complete, then the Compute-Derived-Invariants
algorithm correctly computes all derived invariants.
Corollary 4.19 (Development-Time Check). Suppose Chk Imp is a complete im-
plication check, and Chk Ent is a complete subsumption check algorithm. Then,
the set of invariants returned by the Compute-Derived-Invariants has the fol-
lowing properties:
(1) Every invariant returned by it is implied by I and
(2) If an invariant is implied by I, then there is an invariant inv′ returned by
the Compute-Derived-Invariants algorithm that entails inv.
Our results above apply to simple invariants only. The reason is that in Table 1
only a subset of all possible derivable invariants are listed. For example even if the
Chk Imp tests do not hold, then there are still the following nontrivial invariants
entailed:
22
·
F. Ozcan, V.S. Subrahmanian and J. Dix
(1) derived-inv1 : ic1 ∧ ic2 =⇒ (ie1 ∩ ie2) ℜ (ie′
(2) derived-inv2 : ic1 ∧ ic2 =⇒ (ie1 ∪ ie2) ℜ (ie′
1 ∩ ie′
2)
1 ∪ ie′
2)
In fact, our framework can be easily extended as follows. Let iv1 : ic1 =⇒
ie1 ℜ1 ie′
2. In addition to the derived invariant returned
by the Combine 1 algorithm, the new extended XCombine 1 also returns the
derived invariants determined by Tables 2 and 4.1.
1 and iv2 : ic2 =⇒ ie2 ℜ2 ie′
ℜ1
ℜ2
simplify(ic1, ic2)
derived inv
*
⊆
*
⊆
NIL
ic′
⊆
=
=
⊆
=
=
ic′
ic′
ic′
NIL
1 ∩ ie′
ic′ =⇒ (ie1 ∩ ie2) ⊆ (ie′
2)
ic′ =⇒ (ie1 ∩ ie2) ⊆ (ie1 ∩ ie′
2)
1 ∩ ie′
ic′ =⇒ (ie′
1 ∩ ie2) ⊆ (ie′
2)
ic′ =⇒ (ie1 ∩ ie2) ⊆ (ie′
1 ∩ ie2)
ic′ =⇒ (ie1 ∩ ie′
2) ⊆ (ie′
1 ∩ ie′
2)
1 ∩ ie′
ic′ =⇒ (ie1 ∩ ie2) ⊆ (ie′
2)
ic′ =⇒ (ie1 ∩ ie2) = (ie1 ∩ ie′
2)
1 ∩ ie′
ic′ =⇒ (ie′
1 ∩ ie2) = (ie′
2)
1 ∩ ie2)
ic′ =⇒ (ie1 ∩ ie2) ⊆ (ie′
ic′ =⇒ (ie1 ∩ ie′
2) ⊆ (ie′
1 ∩ ie′
2)
ic′ =⇒ (ie1 ∩ ie2) ⊆ (ie′
1 ∩ ie′
2)
ic′ =⇒ (ie1 ∩ ie2) ⊆ (ie1 ∩ ie′
2)
1 ∩ ie′
ic′ =⇒ (ie′
1 ∩ ie2) ⊆ (ie′
2)
ic′ =⇒ (ie1 ∩ ie2) = (ie′
1 ∩ ie2)
ic′ =⇒ (ie1 ∩ ie′
2) = (ie′
1 ∩ ie′
2)
ic′ =⇒ (ie1 ∩ ie2) = (ie′
1 ∩ ie′
2)
ic′ =⇒ (ie1 ∩ ie2) = (ie1 ∩ ie′
2)
1 ∩ ie′
ic′ =⇒ (ie′
1 ∩ ie2) = (ie′
2)
1 ∩ ie2)
ic′ =⇒ (ie1 ∩ ie2) = (ie′
ic′ =⇒ (ie1 ∩ ie′
1 ∩ ie′
2) = (ie′
2)
Table 2. XCombine for Arbitrary Invariants
5. DEPLOYMENT PHASE
Once an agent is up and running, it is continuously confronted with requests for its
services. One crucial observation is that there might be enormous overlap among
these requests. These overlaps can be exploited if a given set C of code call con-
ditions are merged in a way that executes common portions only once. However,
in order to exploit commonalities, we must first determine the type of those com-
monalities, that is we must first identify code call conditions (1) that are equivalent
to other code call conditions, (2) that are implied by other code call conditions
and (3) that overlap with other code call conditions. Moreover, given two code
call conditions ccc1 and ccc2, it might be the case that they are neither equivalent,
nor implied, nor overlapped. On the other hand, parts of ccc1 and ccc2 maybe
equivalent, implied or overlapped. We also want to exploit such cases. This gives
rise to the following definition:
Definition 5.1 (Sub-Code Call Condition). Let ccc = χ1&χ2& . . . &χn be a code
call condition. cccj := χi1 &χi2 & . . . &χij , for 1 ≤ i1, . . . ij ≤ n and il 6= ik ∀1 ≤
l, k ≤ j is called a sub-code call condition of ccc.
Improving Performance of Heavily-Loaded Agents
·
23
ℜ1
ℜ2
simplify(ic1, ic2)
derived inv
*
⊆
*
⊆
NIL
ic′
⊆
=
=
⊆
=
=
ic′
ic′
ic′
NIL
ic′ =⇒ (ie1 ∪ ie2) ⊆ (ie′
1 ∪ ie′
2)
ic′ =⇒ (ie1 ∪ ie2) ⊆ (ie1 ∪ ie′
2)
1 ∪ ie′
ic′ =⇒ (ie′
1 ∪ ie2) ⊆ (ie′
2)
ic′ =⇒ (ie1 ∪ ie2) ⊆ (ie′
1 ∪ ie2)
ic′ =⇒ (ie1 ∪ ie′
2) ⊆ (ie′
1 ∪ ie′
2)
ic′ =⇒ (ie1 ∪ ie2) ⊆ (ie′
1 ∪ ie′
2)
ic′ =⇒ (ie1 ∪ ie2) = (ie1 ∪ ie′
2)
1 ∪ ie′
ic′ =⇒ (ie′
1 ∪ ie2) = (ie′
2)
1 ∪ ie2)
ic′ =⇒ (ie1 ∪ ie2) ⊆ (ie′
ic′ =⇒ (ie1 ∪ ie′
2) ⊆ (ie′
1 ∪ ie′
2)
ic′ =⇒ (ie1 ∪ ie2) ⊆ (ie′
1 ∪ ie′
2)
ic′ =⇒ (ie1 ∪ ie2) ⊆ (ie1 ∪ ie′
2)
1 ∪ ie′
ic′ =⇒ (ie′
1 ∪ ie2) ⊆ (ie′
2)
1 ∪ ie2)
ic′ =⇒ (ie1 ∪ ie2) = (ie′
ic′ =⇒ (ie1 ∪ ie′
1 ∪ ie′
2) = (ie′
2)
ic′ =⇒ (ie1 ∪ ie2) = (ie′
1 ∪ ie′
2)
ic′ =⇒ (ie1 ∪ ie2) = (ie1 ∪ ie′
2)
ic′ =⇒ (ie′
1 ∪ ie2) = (ie′
1 ∪ ie′
2)
ic′ =⇒ (ie1 ∪ ie2) = (ie′
1 ∪ ie2)
1 ∪ ie′
2) = (ie′
ic′ =⇒ (ie1 ∪ ie′
2)
Table 3. XCombine for Arbitrary Invariants
Example 5.2. Let ccc1 = χ1&χ2&χ3&χ4&χ5. Then, χ1&χ2&χ3, χ1&χ3&χ5 and
χ2&χ5 are some sub-code call conditions of ccc1.
Note that a code call condition with k atomic/(in)equality code call conditions
has 2k different sub-code call conditions. We are now ready to define equivalent,
implied and overlapping sub-code call conditions χ, χ
. To do so, we need to fix
the variable(s) in each ccc to which we want to project (see Definition 2.15: the
ik i
sequence hvi1 , . . . , vik i of variables occurring in χ1, and the sequence hv
of variables occurring in χ2 are important). Often the sequences consist just of one
single variable: this is the case when there is only one non-base variable occurring
in the ccc's. In that case we do not explicitly mention the sequences.
i1 , . . . , v
′
′
′
Definition 5.3 (Equivalent (Sub-) CCC). Two (sub-) code call conditions χ1 and
i,
χ2 are said to be equivalent w.r.t. the sequences hvi1 , . . . , vik i and hv
denoted by χ1 ≡ χ2, if and only if for all states S of the agent and all assignments
θ, it is the case that
i1 , . . . , v
ik
′
′
[χ1]S,θ,hvi1 ,... ,vik i = [χ2]S,θ,hv
′
i1
,... ,v
′
ik
i.
In the case of equivalent ccc's, we only need to execute one of the sub-code call
conditions. We can use the cached solutions for the other sub-code call condition.
Example 5.4. The ccc in(C, excel : chart (excelFile, FinanceRec, day)) is equiva-
i to the ccc in(C′, excel : chart (excelFile, Rec, day)),
lent wrt. the sequences hCi, hC
since the two code call conditions unify with the mgU γ = [FinanceRec/Rec].
′
Definition 5.5 (Implied (Sub-) CCC). A (sub-) code call condition χ1 is said to
imply another (sub-) code call condition χ2 wrt. the sequences hvi1 , . . . , vik i and
24
·
F. Ozcan, V.S. Subrahmanian and J. Dix
′
′
i1 , . . . , v
hv
all assignments θ, it is the case that
ik
i, denoted by χ1 → χ2, if and only if for all states S of the agent and
[χ1]S,θ,hvi1 ,... ,vik i ⊆ [χ2]S,θ,hv
′
i1
,... ,v
′
ik
i,
and it is not the case that χ1 ≡ χ2.
In the case of implied ccc's, we execute and cache the solutions of χ2. In order
to evaluate χ1, all we need to do is to use the cached results to restrict the solution
set of χ2.
Example 5.6. The code call condition in(T1, spatial : range(map1, 5, 5, 30)) im-
plies the code call condition in(T2, spatial : range(map1, 5, 5, 50)), because all the
points that are within 30 units of the point (5, 5) are also within 50 units of (5, 5).
As mentioned above, in this case, we suppress the sequences hT1i and hT2i.
Definition 5.7 (Overlapping (Sub-) CCC). Two (sub-) code call conditions χ1
i,
and χ2 are said to be overlapping wrt. the sequences hvi1 , . . . , vik i and hv
denoted by χ1 ⊥ χ2, if and only if for some states S of the agent and for some as-
signments θ, it is the case that
i1 , . . . , v
ik
′
′
[χ1]S,θ,hvi1 ,... ,vik i ∩ [χ2]S,θ,hv
′
i1
,... ,v
′
ik
i 6= ∅,
and neither χ1 → χ2 nor χ2 → χ1.
In the case of overlapping ccc's, we execute and cache the solutions of χ3, where
χ3 is a code call condition the solution of which is set equal to the union of the
solution sets of χ1 and χ2. In order to evaluate both χ1 and χ2, we need to access
the cache and restrict the solution set of χ3 to those of χ1's and χ2's solution sets.
Note that the definition of overlapping ccc's requires that the intersection of the
solution sets of χ1 and χ2 be non-empty for some state of the agent. This implies
there might be states of the agent, where the intersection is empty. However, the
solution set of χ3 in such a case still contains the solutions to χ1 and χ2.
Example 5.8. The code call condition in(T1, rel : rngselect (emp, age, 25, 35)) over-
laps with the code call condition in(T2, rel : rngselect (emp, age, 30, 40)), because all
employees between the ages 30 and 35 satisfy both code call conditions.
In order to identify various relationships between code call conditions, we use
the derived invariants that are computed at development phase. We are now faced
with the following problem:
Definition 5.9 (Common sub-ccc identification problem). Given a set of code call
conditions C={ccc1, ccc2, . . . , C = cccn}, and a set of derived invariants, I ∗, find
all sub-code call conditions of Vn
-- equivalent with respect to I ∗,
-- imply one another with respect to I ∗,
-- overlap with each other with respect to I ∗.
i=1 ccci that are
The brute-force solution to the above problem is to choose two code call con-
ditions, ccci and cccj from C, then traverse the list of invariants, I ∗, and apply
Improving Performance of Heavily-Loaded Agents
·
25
Brute-Force-CSI(C,I ∗)
/* Input:
/*
/* Output: Eq = {(χi, χj ) χi ≡ χj }
/*
/*
C = {ccc1, ccc2, . . . , cccn}
*/
I ∗ = {inv1, inv2, . . . , invm} */
*/
*/
I = {(χi, χj) χi → χj }
O = {(χi, χj, χk) χi ⊥ χj and χi → χk and χj → χk} /¿*/
i=1 Ci
SC := Vn
SC p := all sub-code call conditions of SC
for all χi ∈ SC p do
for all χj 6= χi ∈ SC p do
for all inv ∈ I ∗ do
ApplyInvariant(inv, χi, χj, Eq, I, O)
ApplyInvariant(inv, χj , χi, Eq, I, O)
Return (Eq, I, O)
End-Algorithm
Fig. 7. Brute-Force CSI Algorithm
each invariant to various sub-code call conditions of ccci and cccj. The algorithm
Brute-Force-CSI, given in Figure 7, implements this approach.
The Brute-Force-CSI algorithm makes use of an ApplyInvariant routine
which takes as input an invariant and two sub-code call conditions, as well as
the equivalent, implied and overlapped sub-code call conditions sets. It applies the
invariant to the sub-code call conditions, and inserts the relationship entailed by
the invariant into the respective set. This routine is given in Figure 8. Note that
we need to call ApplyInvariant twice with different relative orders for χi and χj.
ApplyInvariant(inv, χi, χj, Eq, I, O)
if (iv is of the form ic =⇒ ie1 = ie2) and
(∃θ, such that χi = (ie1)θ and χj = (ie2)θ and (ic)θ = true) then
Eq = Eq ∪{(χi, χj)} // χi ≡ χj
else if (inv is of the form ic =⇒ ie1 ⊆ ie2) and
(∃θ, such that χi = (ie1)θ and χj = (ie2)θ and (ic)θ = true) then
I = I ∪{(χi, χj)} // χi → χj
else if (inv is of the form ic =⇒ (ie1 ∪ ie2) = ie3) and
(∃θ, such that χi = (ie1)θ and χj = (ie2)θ and (ic)θ = true) then
χk = (ie3)θ
O = O ∪{(χi, χj, χk)} // χi ⊥ χj
Return
End-Algorithm
Fig. 8. ApplyInvariant Routine
Assuming ApplyInvariant takes constant time to execute, the complexity of the
Brute-Force-CSI algorithm is O(m ∗ 22k), where m is the number of invariants in
I ∗ and k is the number of atomic/(in)equality code call conditions in SC. However,
one important observation is that we do not have to apply each invariant to all
possible sub-code call conditions. An invariant expression can only unify with a
26
·
F. Ozcan, V.S. Subrahmanian and J. Dix
(sub-) code call condition if both contain "similar" (sub-) code call conditions. The
performance of the Brute-Force-CSI algorithm can be significantly improved by
making use of this observation. But, before describing this improved CSI algorithm,
let us first define similar (sub-) code call conditions.
Definition 5.10 (Similar (sub-) code call conditions). Two (sub-) code all condi-
tions χ1 and χ2 are said to be similar if one of the following holds:
-- Both χ1 and χ2 are atomic code call conditions of the form in(·, d : f (·)).
-- Both χ1 and χ2 are equality/inequality code call conditions.
-- χ1 is of the form χ11&χ12 and χ2 is of the form χ21&χ22, and χ11 is similar to
χ21 and χ12 is similar to χ22.
Improved-CSI(C,I ∗)
/* Input:
/*
/* Output: Eq = {(χi, χj ) χi ≡ χj}
/*
/*
C = {ccc1, ccc2, . . . , cccn}
I ∗ = {inv1, inv2, . . . , invm} */
*/
*/
I = {(χi, χj) χi → χj }
O = {(χi, χj , χk) χi ⊥ χjand χi → χk and χj → χk} */
{G1, G2, . . . , Gl} := Classify(C);
for all Gi for i = 1, . . . l do
I = {inv inv contains similar sub − code call conditions with Gi}
for all χj ∈ Gi do
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9) Return (Eq, I, O)
(10) End-Algorithm
for all χk 6= χj ∈ Gi do
for all inv ∈ I do
ApplyInvariant(inv, χj, χk, Eq, I, O)
ApplyInvariant(inv, χk, χj , Eq, I, O)
Fig. 9.
Improved CSI Algorithm
The Improved-CSI algorithm is given in Figure 9. Lines (1) and (3) of the
algorithm need further explanation. In order to facilitate fast unification of sub-
code call conditions with invariant expressions, the Classify(C) routine in the
Improved-CSI algorithm organizes sub-code call conditions into groups such that
each group contains similar sub-code call conditions. Example 5.11 demonstrates
how Classify(C) works.
Improving Performance of Heavily-Loaded Agents
·
27
χ
11
χ
12
χ
13
χ
21
χ
22
χ
23
χ
31
χ
32
χ
33
&χ
11
χ
12
χ
21
&
χ
22
χ
31
χ
32
&
χ
12
&
χ
13
χ
22
&
χ
23
χ
32
&
χ
33
χ
11
&
χ
13
χ
21
χ
23
&
χ
31
χ
33
&
χ
11
χ
12
&
χ
13
&
χ
21
χ
22
& χ
23
&
χ
31
& χ
32
χ
33
&
group-0:
rel : select ()
group-1:
eq/ineq
group-2:
excel : chart ()
group-3:
rel : select () &
eq/ineq
group-4:
eq/ineq &
excel : chart ()
group-5:
rel : select () &
excel : chart ()
group-6:
rel : select () &
eq/ineq &
excel : chart ()
Fig. 10. Organization of Sub-code Call Conditions of Example 5.11
Example 5.11. Consider the following code call conditions:
χ11 = in(FinanceRec, rel : select (financeRel, sales, "≥", 10K))
χ12 = FinanceRec.date ≥ "6/6/2000"
χ13 = in(C, excel : chart (excelFile, FinanceRec, day))
χ21 = in(FinanceRec, rel : select (financeRel, sales, "≥", 20K))
χ22 = FinanceRec.date = "7/7/2000"
χ23 = in(C, excel : chart (excelFile, FinanceRec, day))
χ31 = in(FinanceRec, rel : select (financeRel, sales, "≥", 30K))
χ32 = FinanceRec.date = "7/7/2000"
χ33 = in(C, excel : chart (excelFile, FinanceRec, month)).
Let ccc1 = χ11&χ12&χ13, ccc2 = χ21&χ22&χ23 and ccc3 = χ31&χ32&χ33. Figure
10 shows how sub-code call conditions of ccc1, ccc2 and ccc3 are grouped.
Line (3) of the algorithm identifies a subset I ⊆ I ∗ of invariants that are applica-
ble to a given group of sub-code call conditions. In order to speed up this task, the
invariants are stored in a hash table based on the in(·, d : f (·))'s they contain. Given
a group of sub-code call conditions, we apply only those invariants which contain
similar sub-code call conditions (lines (7) and (8)). The Improved-CSI algorithm
also uses ApplyInvariant to compute various relationships. However, the number
of times it is invoked is much smaller than the number of times it is invoked in
Brute-Force-CSI algorithm. Example 5.12 demonstrates how Improved-CSI
algorithm works.
28
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Example 5.12. The algorithm first processes group-0 (Figure 10). It identifies all
invariants containing in(·, rel : select (·)) code calls. Then, it tries to apply each of
those invariants to various combinations of this group. For example, the following
invariant will unify with pairs of code call conditions in this group:
Rel = Rel′ ∧ Attr = Attr′ ∧ Op = Op′ = "≥" ∧ Val > Val′
=⇒
in(X, rel : select (Rel, Attr, Op, V)) ⊆ in(Y, rel : select (Rel′, Attr′, Op′, V′)).
As a result of the application of this invariant the following relationships are found:
in(FinanceRec, rel : select (financeRel, sales, "≥"20K)) →
in(FinanceRec, rel : select (financeRel, sales, "≥", 10K))
in(FinanceRec, rel : select (financeRel, sales, "≥", 30K)) →
in(FinanceRec, rel : select (financeRel, sales, "≥", 10K))
in(FinanceRec, rel : select (financeRel, sales, "≥", 30K)) →
in(FinanceRec, rel : select (financeRel, sales, "≥"20K))
The same procedure is applied to group-1 resulting in the discovery of the fol-
lowing relationships:
FinanceRec.date = "7/7/2000" → FinanceRec.date ≥ "6/6/2000"
FinanceRec.date = "7/7/2000" ≡ FinanceRec.date = "7/7/2000"
As a result of processing group-2, the following relationship is found:
in(C, excel : chart (excelFile, FinanceRec, day))
≡
in(C, excel : chart (excelFile, FinanceRec, day)).
We process the other groups similarly. When processing group-5, we only apply
invariants containing both in(·, rel : select (·)) and in(·, excel : chart (·)) code calls.
Finally, the following relationships are found:
χ21 → χ11
χ22 ≡ χ32
χ13 ≡ χ23
χ21&χ22 → χ11&χ12
χ22&χ23 → χ12&χ13
χ21&χ23 → χ11&χ13
χ21&χ22&χ23 → χ11&χ12&χ13
χ31 → χ11
χ22 → χ12
χ31 → χ21
χ32 → χ12
χ31&χ32 → χ11&χ12 χ31&χ32 → χ21&χ22
.
It is important to note that in the above algorithms the derived invariants computed
during the development phase are used to match the sub-code call conditions. This
assumes that the derived invariants are complete, that is they contain all possible
relationships derivable from I. However, this may be too costly to compute. More-
over, we may end up storing a lot of invariants which never match with any of the
sub-code call conditions. One solution to this problem is to restrict the length of
invariant expressions in the derived invariants. However, in that case we need to
perform some inferencing at deployment to make sure that we compute all sub-code
call condition relationships.
Improving Performance of Heavily-Loaded Agents
·
29
Hence, in the case of incomplete derived invariants, we also need to perform a
second phase where we use the inference rules in Table 4 to deduce further rela-
tionships.
if χi ≡ χj and χk ≡ χl then (χi& χk) ≡ (χj & χl)
if χi ≡ χj and χk → χl then (χi& χk) → (χj & χl)
if χi → χj and χk → χl then (χi& χk) → (χj & χl)
Table 4.
Inference Rules Used in Improved-CSI Algorithm
Once the agent identifies equivalent, implied and overlapping sub-code call con-
ditions in C, it merges those sub-code call conditions to decrease execution costs.
In the next section we will describe how to merge a set of sub-code call conditions.
5.1 Merging Code Call Conditions
In this section, we first describe a technique for evaluating costs of code call con-
ditions. We then describe two algorithms -- the DFMerge and the BFMerge
algorithms -- which are used to process the set C = {ccc1, ccc2, ..., cccn} of code call
conditions. Both of these algorithms are parameterized by a selection strategy.
Later, in our experiments, we will try multiple alternative selection strategies in
order to determine which ones work the best. We will also compare the perfor-
mance of the DFMerge and BFMerge algorithms so as to assess the efficiency of
computation of these algorithms.
5.1.1 Cost Estimation for Code Call Conditions. In this section, we describe how
to estimate the cost of merged code call conditions for a set C = {ccc1, ccc2, ..., cccn}
of code call conditions. We assume that there is a cost model that can assess costs
of individual code call conditions. Such costing mechanisms have been already
developed for heterogeneous sources by [Du et al. 1992; Adali et al. 1996; Naacke
et al. 1998; Roth et al. 1999]. Using this, we may state the cost of a single code
call condition.
Definition 5.13 (Single Code Call Condition Cost). The cost of a code call con-
dition ccc is defined as: cost(ccc) = Pχi∈ccc cost(χi) where cost(χi) is the cost of
executing the atomic or equality/inequality code call condition χi. Note that the cost
of χi may include a variety of parameters such as disk/buffer read time, network
retrieval time, network delays, etc.
We may now extend this definition to describe the coalesced cost of executing
two code call conditions ccck and ccck+1.
Definition 5.14 (Coalesced cost). The coalesced cost of executing code call condi-
tions ccck and ccck+1 by exploiting equivalent, implied and overlapped sub-code call
conditions of ccck and ccck+1 is defined as:
coalesced cost(ccck, ccck+1) = cost(ccck) + cost(ccck+1) − gain(ccck, ccck+1)
where gain(ccck, ccck+1) is the cost of the savings obtained by sharing sub-code call
conditions between ccck and ccck+1.
We are now left with the problem of defining the concept of gain used above.
30
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Definition 5.15 (Gain of two sub-ccc's). Suppose χi and χj are sub-code call con-
ditions in ccck and ccck+1, respectively, and I is a set of invariants. Then, the gain
of executing χi, χj is defined as:
gain(χi, χj) =
if I = χi ≡ χj
cost(χi)
cost(χi) − cost(eval(χi, χj )) if I = χi → χj
expk
if I = χi ⊥ χj and I = χi → χk and
0
I = χj → χk
otherwise
where expk = cost(χi)+cost(χj)−cost(χk)−cost(eval(χi, χk))−cost(eval(χj, χk))
and eval(χi, χj) is the task of executing code call condition χi by using the results
of code call condition χj.
An explanation of the above definition is important.
If code call conditions
χi and χj are equivalent, then we only need to execute one of them, leading to
If χi → χj (i.e. χj's answers include those of χi) then
a saving of cost(χi).
we can first evaluate χj, and then select the answers of χi from the answers to
χj. A third possibility is that χi and χj overlap, and there exists a code call
condition χk such that χk is implied by both χi, χj. In this case, we can compute
χk first, and then use the result to select the answers of χi, χj. The cost of this is
cost(χk) + cost(eval(χi, χk)) + cost(eval(χj, χk)). As the cost of executing χi, χj
sequentially is cost(χi) + cost(χj ), the gain is computed by taking the difference,
leading to the third expression. We now define the gain for two code call conditions
in terms of the gains of their sub-code call conditions involved.
Definition 5.16 (Gain of two code call conditions). The gain for ccck and ccck+1
is defined as:
gain(ccck, ccck+1) =
X
χi∈ccck,χj ∈ccck+1
gain(χi, χj).
Example 5.17. Consider the following code call conditions:
χ1 : in(FinanceRec, rel : select (financeRel, sales, "≥", 20K)),
χ2 : in(C, excel : chart (C, FinanceRec, day)),
χ3 : in(FinanceRec, rel : select (financeRel, sales, "≥", 10K))
Let ccc1 = χ1 & χ2 and ccc2 = χ3. It is evident that ANS(χ1) ⊆ ANS(χ3). Suppose
further that the costs of these code call conditions are given as: cost (χ1) = 25,
cost (χ2) = 10, cost (χ3) = 15 and cost (eval (χ1, χ3))=10. Then, gain (ccc1, ccc2)
= Pχi∈ccc1,χj ∈ccc2
gain(χi, χj) = gain (χ1, χ3) because gain (χ2, χ3)=0, as there
is no relation between code call conditions χ2 and χ3. As χ1 → χ3, gain (χ1, χ3)
= cost (χ1)- cost (eval (χ1, χ3))= 25 - 10 =15. Then, the coalesced cost of
ccc1 and ccc2 is given by, coalesced cost(ccc1, ccc2) = cost(ccc1) + cost(ccc2) −
gain(ccc1, ccc2) = (25 + 10) + 15 - 15 = 35.
5.1.2 Merging Code Call Conditions. We now develop two algorithms that pro-
duce a global merged code call evaluation graph for a set, C = {ccc1, ccc2, ..., cccn}
of code call conditions. These algorithms use the cceg representation of each code
Improving Performance of Heavily-Loaded Agents
·
31
call condition ccci, and merge two graphs at a time until all graphs are merged into
a final global code call evaluation graph. They make use of a merge routine which
merges code call evaluation graphs by using the Eq, I and O sets generated by the
Improved-CSI algorithm.
While merging two code call evaluation graphs, the merge routine may need
to delete some nodes from the ccegs. Recall that in a cceg, a node represents
an atomic/(in)equality code call condition. The following procedure is applied
recursively to delete a node χi from a code call evaluation graph:
(1) First the node χi is removed.
(2) Then all incoming edges (χj, χi) and all outgoing edges (χi, χl) are deleted.
(3) If any of the nodes χj, encountered in the previous step, has no outgoing edges,
then node χj is also deleted recursively.
The merge routine uses a set of three transformations which we define now.
The first transformation takes a set of graphs of equivalent code call conditions and
creates a single graph.
Definition 5.18 (Equivalence Transformation, T1). Let C = {C1, C2, . . . , Cm} be
of code call conditions. Let CCEG = {cceg(C1), cceg(C2), . . . , cceg(Cm)} be their
code call evaluation graphs. Given a set Eq of equivalent code call conditions, which
are sub-cccs of the Ci's, the equivalence transformation T1 is defined as follows:
T1:cceg(C) = (S1≤i≤m Vi, S1≤i≤m Ei)
Eq′ := {(χi, χj) (χi, χj) ∈ Eq and ∄(χ′
j) ∈ Eq such that χi is a sub-ccc
i, χ′
of χ′
i and χj is a sub- ccc of χ′
j }
for all (χi, χj) ∈ Eq′ do
if gain(χi, χj) > 0 then
delete all the nodes corresponding to atomic cccs in χi
from cceg(C) recursively
delete all outgoing edges hχi, χki ∈ cceg(C)
create the edges hχj, χki ∈ cceg (C)
The second transformation (T2) below takes a set of graphs of code call condi-
tions, together with a set of known implications between sub-code call conditions of
these code call conditions. Using these known implications, it merges these graphs
into one.
Definition 5.19 (Implication Transformation, T2). Let C = {C1, C2, . . . , Cm} be
of code call conditions. Let CCEG = {cceg(C1), cceg(C2), . . . , cceg(Cm)} be their
code call evaluation graphs. Given a set I of implied code call conditions, which are
sub-cccs of the Ci's, the implication transformation T2 is defined as follows:
T2:cceg(C) = (S1≤i≤m Vi, S1≤i≤m Ei)
I ′ := {(χi, χj) (χi, χj) ∈ I and ∄(χ′
j) ∈ I such that χi is a sub-ccc
i, χ′
of χ′
i and χj is a sub- ccc of χ′
j }
for all (χi, χj) ∈ I ′ do
if gain(χi, χj) > 0 then
32
·
F. Ozcan, V.S. Subrahmanian and J. Dix
delete all incoming edges hχl, χii ∈ cceg(C) to χi recursively
create the edge hχj, χii ∈ cceg(C)
set cost (χi) to cost (eval (χi, χj))
The third transformation (T3) below takes a set of graphs of code call conditions,
together with a set of known overlaps between sub-code call conditions of these code
call conditions. Using these known overlaps, it merges these graphs into one.
Definition 5.20 (Overlap Transformation, T3). We consider the set C = {C1, C2, . . . , Cm}
of code call conditions. Let CCEG = {cceg(C1), cceg(C2), . . . , cceg(Cm)} be their
code call evaluation graphs. Given a set O of overlapping code call conditions, which
are sub-cccs of Ci's, the overlap transformation T3 is defined as follows:
T3:cceg(C) = (S1≤i≤m Vi, S1≤i≤m Ei)
O′ := {(χi, χj, χk) (χi, χj) ∈ O and ∄(χ′
k) ∈ O such that χi is a sub-ccc
i, χ′
j, χ′
of χ′
i and χj is a sub- ccc of χ′
j }
for all (χi, χj) ∈ O′ do
if gain(χi, χj) > 0 then
create a node χk ∈ cceg(C)
create edges hχk, χii ∈ cceg(C) and hχk, χji ∈ cceg(C)
delete all incoming edges hχl, χii ∈ cceg(C) to χi recursively
delete all incoming edges hχm, χji ∈ cceg(C) to χj recursively
create edges hχl, χki ∈ cceg(C) and hχm, χki ∈ cceg(C)
set cost (χi) to cost (eval (χi, χk))
set cost (χj) to cost (eval (χj, χk))
The merge routine merely applies the above three transformations sequentially
in the order T1),(T2),(T3).
Definition 5.21 (The Merge Routine). The merge routine takes as input a set
of code call evaluation graphs, and the sets of equivalent, implied and overlapped
sub-code call conditions, and uses T1, T2 and T3 to produce a single code call
evaluation graph. It is given by the following:
merge(CCEG, Eq, I, O) = T3(T2(T1(CCEG, Eq), I), O).
The merge routine works as follows: First, it gets the sets of equivalent, im-
plied and overlapped sub-code call conditions from the Improved-CSI algorithm.
Then, it applies the merge-transformations in the order: T1, T2, T3. The intu-
ition behind this order is the fact that the maximum gain is obtained by merging
equivalent code call conditions.
The merge routine can be utilized with any search paradigm (e.g. depth-first
search, dynamic programming, etc.) to obtain an algorithm which creates a "global"
code call evaluation graph. In Figures 11 and 12, we provide two algorithms that
use the merge routine to create a global code call evaluation graph. Both algo-
rithms merge two graphs at a time until a single graph is obtained. The DFMerge
algorithm starts with the empty graph, and chooses the next "best" code call eval-
uation graph to merge with the current global code call evaluation graph. This
process is iteratively executed. On the other hand, the BFMerge algorithm picks
Improving Performance of Heavily-Loaded Agents
·
33
the "best" pair of code call evaluation graphs to merge from the ToDo list, which
initially contains all code call evaluation graphs. Upon merging, the merged code
call evaluation graph replaces the two code call evaluation graphs being merged.
This process is executed iteratively till only one code call evaluation graph remains
in the ToDo list.
DFMerge(CCEG, Eq, I, O)
/* Input: CCEG = {cceg1, ..., ccegn} */
/* Output: a global cceg
*/
T oDo := CCEG;
currentGraph := selectNext(T oDo, NIL);
delete currentGraph from T oDo;
while (T oDo is not empty) do
nextGraph := selectNext(T oDo, currentGraph);
delete nextGraph from T oDo;
currentGraph := merge({currentGraph, nextGraph}, Eq, I, O);
Return currentGraph;
End-Algorithm
Fig. 11. DFMerge Algorithm
BFMerge(CCEG, Eq, I, O)
/* Input: CCEG = {cceg1, ..., ccegn} */
/* Output: a global cceg
*/
T oDo := CCEG;
while (card(T oDo) > 1 ) do
(ccegi, ccegj) := selectNextPair(T oDo);
delete ccegi, ccegj from T oDo;
newGraph := merge({ccegi, ccegj}, Eq, I, O);
insert newGraph into T oDo;
Return ccegi ∈ T oDo;
End-Algorithm
Fig. 12. BFMerge Algorithms
The success of both the DFMerge and BFMerge algorithms depends very
much on how the next "best" merge candidates) are selected. Below, we present
three alternative strategies for doing this which we have used in our experiments.
Strategy 1:
DFMerge: Choose the graph which has the largest number of equivalent code
call conditions with the currentGraph.
BFMerge: Choose a pair of graphs which have the largest number of equiva-
lent code call conditions.
Strategy 2:
34
·
F. Ozcan, V.S. Subrahmanian and J. Dix
DFMerge: Choose the graph which has the largest number of equivalent, im-
plied or overlapped code call conditions in common with the currentGraph.
BFMerge: Choose a pair of graphs which have the largest number of equiva-
lent, implied or overlapped code call conditions between the two of them.
Strategy 3:
DFMerge: Choose the graph which leads to the greatest gain with the the
currentGraph.
BFMerge: Choose the pair of graphs the associated gain of which is maximal.
5.1.3 Executing The Global CCEG. The final problem that needs to be addressed
is to find an execution order for the global code call evaluation graph. Any topo-
logical sort of the global cceg is a valid execution order. However, there might
be several topological sorts that can be obtained from the global cceg, and some
of them might be preferable to others. For example, a topological sort that gives
preferences to certain nodes, i.e. outputs them earlier in the sequence, might be de-
sirable. In order to find such an execution order, we compute weights for topological
sorts.
Definition 5.22 (Weight of a topological sort). Let π be a topological sort, and
weightπ(i) be the weight of the ith node in the topological sort. If we have n total
nodes, the weight of π, denoted by weight(π), is given by
weight(π) =
n
X
i=1
i ∗ weightπ(i)
Any topological sort that minimizes weight(π) gives a desirable execution order.
Besides, we can implement various strategies with this function simply by assigning
weights accordingly. For example, if we want to favor nodes that output results,
we can assign larger weights to such nodes. In order to find the topological sort
with the minimum weight(π), we use a modified topological sort algorithm which
is given in Figure 13.
FindExecutionOrder(cceg)
/* Input: global cceg
*/
/* Output: a topological sort π that minimizes weight(π) */
D := {v v has indegree 0}
while D is not empty do
v′ := node with the heighest weight in D,
output v′,
remove v′ from D,
delete all outgoing edges of v′,
D := D ∪ {v v has in-degree 0, v /∈ D}
End-Algorithm
Fig. 13. Modified Topological Sort Algorithm That Finds the Minimal weight(π)
Improving Performance of Heavily-Loaded Agents
·
35
6. EXPERIMENTS
We ran various sets of experiments on a Sun Ultra1 machine with 320 MB memory
running Solaris 2.6. In the first set of these experiments, we study the execution
time of the Create-cceg algorithm. Specifically, we evaluate the performance of
this algorithm with varying number of dependencies and conjunctions in the code
call conditions. In the second set of the experiments, we study the execution time of
the development phase component. In particular, we study the trade-offs involved
in the generic Chk Imp Algorithm. In the last set of experiments, we demonstrate
the efficiency of the Improved-CSI Algorithm, as well as the merging algorithms.
We compare the performance of the merging algorithms (with different strategies)
with the A∗ algorithm of [Sellis 1988]. Our implementation of the development
phase and deployment phase components involved over 9, 500 lines of C++ code.
6.1 Performance Evaluation of the Create-cceg Algorithm
To evaluate the performance of the Create-cceg algorithm, we generated several
code call conditions, with varying number of conjuncts and number of dependencies.
In the first set of experiments, we kept the number of dependencies constant and
varied the number of conjuncts from 5 to 40. We repeated the same experiments
when 10, 15, 20 and 25 dependencies are present. For each combination of number
of dependencies and conjuncts, we created 500 code call conditions and recorded
the average running time. Figure 14 shows the results. As seen from the figure, the
execution time increases linearly with the number of conjuncts. The Create-cceg
algorithm is extremely fast, taking only 14 milliseconds for code call conditions
involving 40 conjunctions and 25 dependencies.
Execution Time of Create-CCEG Algorithm (fixed no of dependencies)
no of dependencies = 10
no of dependencies = 15
no of dependencies = 20
no of dependencies = 25
14
12
10
8
6
4
2
)
s
c
e
s
i
l
l
i
m
(
e
m
i
t
0
5
10
15
20
25
number of conjuncts
30
35
40
Fig. 14. Execution Time of Create-cceg (constant number of dependencies)
In the second, set of experiments, we kept the number of conjuncts constant,
and varied the number of dependencies from 10 to 50. We ran four experiments
with 10, 20, 30 and 40 number of conjuncts. Again, we generated 500 code call
conditions for each combination and used the average running time. The results are
given in Figure 15. Again, the execution time increases linearly with the number
of dependencies.
36
·
F. Ozcan, V.S. Subrahmanian and J. Dix
)
s
c
e
s
i
l
l
i
m
(
e
m
i
t
35
30
25
20
15
10
5
0
10
Execution Time of Create-CCEG Algorithm (fixed no of conjuncts)
conjuncts = 10
conjuncts = 20
conjuncts = 30
conjuncts = 40
15
20
25
35
number of dependencies
30
40
45
50
Fig. 15. Execution Time of Create-cceg (constant number of conjuncts)
6.2 Performance Evaluation of the Development Phase Component
In order to evaluate the performance of the development phase component, we con-
ducted a set of experiments which use the Chk Ent algorithm described in Sec-
tion 4 and different instances of the Chk Imp Algorithm. We varied the threshold
and the Axiomatic Inference System used by Chk Imp. The instances we
used are described in Table 5. As the instance number increases, the complexity of
the Chk Imp Algorithm also increases.
Instance Threshold Axiomatic Inference System
Instance 0
∞
⊆ χ
χ
χ ∩ χ′ ⊆ χ
χ
⊆ χ ∪ χ′
Instance i
Instance ω
i
∞
All rules in Appendix B.
All rules in Appendix B.
Table 5.
Instances of the Chk Imp Algorithm
We ran a set of experiments with two different data sets, namely spatial domain
invariants and the relational domain invariants, which are given in Appendix C. For
each instance of the algorithm we ran the development phase component several
times until we get an accuracy of 3%, with 3% confidence interval. Figure 16 shows
the execution time of the Compute-Derived-Invariants algorithm for these two
data sets. As the only difference is the Chk Imp Algorithm instance employed,
the x-axis is labeled with those instances.
Note that the x-axis used a logarithmic-scale and hence, we may conclude that
execution time increases linearly with the instance number, until instance 4096, and
increases exponentially after that. However, we have observed that all instances
starting from instance 4, produced the same final set of Derived Invariants,
18 invariants for the spatial domain, and 15 invariants for the relational domain.
For the relational domain invariants, the execution-time increases more rapidly
Improving Performance of Heavily-Loaded Agents
·
37
than the spatial case. The observed time increase is due to the time spent in
detecting failure. Memory overflows prevented us from running experiments with
larger threshold values.
)
s
c
e
s
(
e
m
i
t
600
500
400
300
200
100
0
1
Execution Time of Development Phase
spatial
relational
4
16
64
256
CHK_IMP Instance
1024
4096
16384
65536
Fig. 16. Execution Time of Compute-Derived-Invariants
6.3 Performance Evaluation of the Deployment Phase Component
For the performance evaluation of the deployment phase component, we ran exper-
iments to evaluate both the execution times of the merging algorithms and the net
savings obtained by the algorithms. We will describe the experimental setting in
detail in the following:
In the experiments we assume a hdb agent that accesses relational and spatial
(PR-quadtree) data sources. We have built cost estimation modules for these two
sources where the cost calculations are similar to those of [Salzberg 1988]. We
also built an agent cost module which coordinates with the above two modules to
estimate the cost of a code call condition. The individual cost estimation modules
report the cost and the cardinality of their code call conditions to the agent cost
module. The agent cost model also includes network costs. For the experiments,
it is assumed that the data sources and the agent are on a fast Ethernet LAN. We
created a synthetic database schema given below, and used the cost estimates in
the experiments.
supplier(sname, pno, quantity)
product(pno, price, color)
map(name, x-location, y-location)
purchases(customer name, pno)
We used the ccc templates given in Table 6 in the experiments.
In Table 6,
Op = {≤, =, ≥}. Note that the last entry in Table 6 involves only relational data
sources.
By changing constants in these template code call conditions, we have created
various commonality relationships. We have constructed the following three types
of code call condition sets by using the above templates.
38
·
F. Ozcan, V.S. Subrahmanian and J. Dix
=(T1.sname, P.name)
Code Call Condition Template
in(T1, rdb1 : select2 (supplier, pno, "=", Val1, qty, Op1, Val2))
in(P, quadtree: range(map, X, Y, Rad))
in(T2, rdb2 : select(product, price, Op2, Val3)) & =(T1.pno, T2.pno)
in(T1, rdb1 : select2 (supplier, pno, "=", Val1, qty, Op1, Val2))
in(P, quadtree: range(map, X, Y, Rad))
=(T1.sname, P.name)
in(T2, rdb2 : rngselect(product, price, Val3, Val4)) & =(T1.pno, T2.pno)
in(T1, rdb1 : rngselect(supplier, qty, Val1, Val2))
&
&
in(T2, rdb2 : select(product, price, Op2, Val3)) & =(T1.pno, T2.pno)
in(T1, rdb1 : rngselect(supplier, qty, Val1, Val2))
in(T2, rdb2 : select(product, price, Op2, Val4))
in(T3, rdb3 : rngselect(purchases, pno, Val5, Val6)) & =(T1.pno, T3.pno)
in(P, quadtree: range(map, X, Y, Rad))
=(T1.pno, Val3)
=(T1.pno, T2.pno)
&
&
&
&
&
=(T1.sname, P.name)
=(T1.pno, Val3)
&
&
&
&
&
&
&
Table 6. Query Templates Used in the Experiments
Type 1: Such sets of code call conditions only contain equivalent code call con-
ditions.
Type 2: Such sets of code call conditions only contain both equivalent and implied
code call conditions.
Type 3: Such sets of code call conditions contain equivalent,implied and overlap-
ping code call conditions.
Before describing the experiments, let us first define the metrics we use in these
sets of experiments.
Definition 6.1 (Savings Percentage). Let C cost be the initial total cost of the set
of code call conditions, i. e., the sum of the individual code call condition costs,
fin cost be the cost of the global merged code call condition produced by the merg-
ing algorithm, IdCom cost be the execution time of the Improved-CSI algorithm
and Merge cost be the execution time of the merge algorithm employed. Then, the
savings percentage achieved by the merge algorithm is given by:
savings percentage =
C cost − fin cost − IdCom cost − Merge cost
C cost
We try to capture the net benefit of merging the code call conditions with the
savings percentage metric. Moreover, in order to remedy the difference between
high-cost code call conditions and low-cost code call conditions, we normalize the
savings percentage metric.
Definition 6.2 (Sharing factor). Let C = {C1, .., CN } be the set of given code call
conditions. Let [χ1], ..., [χm] be equivalence relations, where each [χi] contains a set
of equivalent code call conditions and card([χi]) ≥ 2, i = 1, .., m. Let I = {χi
such that χi /∈ [χj], j=1,..,m, and there exists at least one χk, such that χi → χk}.
And finally let 0 = {(χi, χj, χk) such that χi, χj /∈ [χk], k = 1, .., m, and χi, χj /∈
I, and χi ←→ χj, χk → χiand χk → χj}.
Then, the sharing factor of this set of code call conditions is given by:
Pm
i=1 card([χi]) ∗ card(χi) + Pχi∈I card(χi) + P(χi,χj ,χk)∈O card(χk)
PN
i=1 Pχj ∈Ci
card(χj )
Improving Performance of Heavily-Loaded Agents
·
39
The sharing factor basically gives the percentage of data objects shared among
code call conditions. The intuition behind this metric is that we expect to see
an increasing benefit from merging as the sharing among the code call conditions
increases. In this metric, we try to avoid counting the cardinality of any code call
condition more than once, so that the sharing factor is between 0% and 100%.
In order to compare our algorithms with a well known algorithm [Shim et al.
1994] for merging multiple relational database only queries using the A∗ algorithm,
we implemented an adapted version of the A∗ of [Shim et al. 1994]. We used
an improved version of their heuristic function. We adapted our Improved-CSI
algorithm to work with the A∗ algorithm. We enumerated the most promising 8
execution plans for each individual ccc and input those plans to the A∗ algorithm.
[Sellis and Ghosh 1990] also uses similar measures. In their case, they only have
equivalent relationships, hence the sharing factor metric is trivially calculated. In
their version of the savings percentage metric, they only measure the difference
between initial cost and the final cost obtained by merging, and fail to take into
account the cost of achieving that savings. Our experiments show that although
the A∗ algorithm finds better global results, the cost of obtaining those results is
so prohibitively high that the A∗ algorithm is often infeasible to use in practice.
In all of the experiments, the algorithms are run several times to obtain results
that are accurate within plus or minus 3%, with a 3% confidence interval.
)
s
c
e
s
i
l
l
i
m
(
e
m
i
t
n
o
i
t
u
c
e
x
e
6000
5000
4000
3000
2000
1000
0
2
Execution Time of IdentifyCommonCCCs Algorithm
Type 1 CCC sets
Type 2 CCC sets
Type 3 CCC sets
4
6
8
10
12
no of CCCs
14
16
18
20
Fig. 17. Execution Time of of Improved-CSI
6.3.1 The Execution Time of the Improved-CSI Algorithm. The Improved-
CSI algorithm has been ran with the three types of ccc sets. Figure 17 shows the
execution times of the algorithm as the number of ccc's in the set increases. As seen
from the figure, although the execution time is exponential with a small slope, it is
in the order of seconds. It takes only 6 seconds for the Improved-CSI algorithm
to find all relationships in a set containing 20 queries. Moreover, the execution
time increases as more types of relationships exist in the ccc sets. It has the highest
execution time for Type 3 ccc sets, and the lowest execution time for Type 1 ccc
sets.
40
·
F. Ozcan, V.S. Subrahmanian and J. Dix
6.3.2 Savings Achieved by the Merge Algorithms. In these experiments, we inves-
tigate the net savings the merge algorithms achieve for our three different types of
ccc sets, as well as for ccc sets involving only relational sources. We have 10 ccc's
in each set. The reason for this is that the A∗ algorithm exhausts memory for ccc
sets having more than 11-12 ccc's.
Figures 18, 19 and 20 show the savings percentage achieved for Type 1, 2 and
3 ccc sets, respectively. As seen from Figure 18, the A∗ algorithm performs as
well as our merge algorithms once the sharing factor exceeds approximately 30%.
We have not been able to run the A∗ algorithm for low sharing factors because
of the memory problem. The A∗ algorithm has an effective heuristic function for
equivalent ccc's, hence it is able to obtain high quality plans in a very short time.
However, as seen from the figure, our merge algorithms are also able to achieve the
same level of savings.
e
g
a
t
n
e
c
r
e
p
s
g
n
v
a
s
i
100
0
-100
-200
-300
-400
-500
0
Savings Percentage Achieved
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
20
40
sharing factor
60
80
100
Fig. 18. Net savings achieved with Type 1 ccc Sets
e
g
a
t
n
e
c
r
e
p
s
g
n
v
a
s
i
100
50
0
-50
-100
-150
-200
-250
0
Savings Percentage Achieved
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
20
40
sharing factor
60
80
100
Fig. 19. Net savings achieved with Type 2 ccc Sets
Improving Performance of Heavily-Loaded Agents
·
41
Figure 19 shows the results when there are both equivalent and implied ccc
relationships. This time the heuristic function of the A∗ algorithm is not as effective
as with Type 1 ccc sets, and the net savings it achieves are negative until very high
sharing factors. Although the A∗ algorithm finds low cost global execution plans,
the execution time of the algorithm is so high that the net savings are negative.
Our merge algorithms achieve very good net savings percentages. All the selection
strategies perform almost equally well, with BFMerge3 performing slightly better.
Figure 20 shows the net savings obtained when all three types of relationships
exist in the ccc sets. Note that the A∗ algorithm only considers equivalent and
implied relationships. The results are very similar to the previous experiment.
Again, our merge algorithms perform much better than the A∗ algorithm. Our
different select strategies have similar performances, with BFMerge3 performing
the best.
As the A∗ algorithm was devised only for relational data sources, we designed
another experiment involving only relational data sources. In this type of ccc sets,
we only allowed equivalent relationships, as the A∗ algorithm performed best with
equivalent ccc's. Figure 21 shows the net savings achieved in this case. As seen
from the figure, our algorithms perform as well as the A∗ algorithm for sharing
factor greater than 30%, and better for the rest.
e
g
a
t
n
e
c
r
e
p
s
g
n
v
a
s
i
100
0
-100
-200
-300
-400
-500
-600
0
Savings Percentage Achieved
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
20
40
sharing factor
60
80
100
Fig. 20. Net savings achieved with Type 3 ccc Sets
These results suggest that although our algorithms explore a smaller search space
with respect to the A∗ algorithm, the savings we obtain in practice are as good
as that of the A∗ algorithm, and the high execution cost of the A∗ algorithm is
prohibitive.
6.3.3 Execution Times of Merge Algorithms. In these experiments, we studied
the execution times of our Merge algorithms and the A∗ algorithm. Figures 22, 23
and 24 show the execution times for Type 1, Type 2 and Type 3 ccc sets as the
number of ccc's in the sets increases. Note that the y-axes in the figures
have logarithmic scale. As seen from the figures, the A∗ algorithm has double-
exponential execution time, and it cannot handle ccc sets having more than 10-11
ccc's, as it exhausts memory. The results show that our algorithms run (1) 1300
42
·
F. Ozcan, V.S. Subrahmanian and J. Dix
e
g
a
t
n
e
c
r
e
p
s
g
n
v
a
s
i
100
0
-100
-200
-300
-400
-500
-600
-700
-800
-900
0
Savings Percentage Achieved
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
20
40
sharing factor
60
80
100
Fig. 21. Net savings achieved with relational sources
)
s
c
e
s
i
l
l
i
m
(
e
m
i
t
n
o
i
t
u
c
e
x
e
1e+06
100000
10000
1000
100
10
1
0.1
2
Execution Time of the Algortihms with Type 1 CCC Sets
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
4
6
8
10
12
no of CCCs
14
16
18
20
Fig. 22. Execution Time of Merge Algorithms with Type 1 ccc Sets
to 5290 times faster than the A∗ algorithm for Type 1 ccc sets, (2) 1360 to 6280
times faster than the A∗ algorithm for Type 2 ccc sets, and (3) 100 to 350 times
faster than the A∗ algorithm for Type 3 ccc sets.
The execution times of our Merge algorithms are exponential, but in the order
of milliseconds, taking less than a second for even 20 ccc's. Among our algorithms,
BFMerge3 has the highest execution time, as it uses an expensive heuristic and ex-
plores a relatively larger search space than the DFMerge algorithms. DFMerge3
has the next highest execution time, and DFMerge1 has the lowest. One impor-
tant observation is that although BFMerge3 and DFMerge3 use a relatively
expensive and more informed heuristic, and therefore have higher execution times,
and find better global execution plans, they achieve the same level of net savings
with the other strategies. Hence, the increased cost induced by these two strategies
are not offset by the net savings they achieve.
6.3.4 Final Cost of Plans Generated by the Merge Algorithms. As the A∗ algo-
rithm examines an exhaustive search space, we studied the quality of plans gener-
Improving Performance of Heavily-Loaded Agents
·
43
Execution Time the Algortihms with Type 2 CCC Sets
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
4
6
8
10
12
no of CCCs
14
16
18
20
)
s
c
e
s
i
l
l
i
m
(
e
m
i
t
n
o
i
t
u
c
e
x
e
1e+06
100000
10000
1000
100
10
1
2
Fig. 23. Execution Time of Merge Algorithms with Type 2 ccc Sets
)
s
c
e
s
i
l
l
i
m
(
e
m
i
t
n
o
i
t
u
c
e
x
e
100000
10000
1000
100
10
1
0.1
2
Execution Time of the Algortihms with Type 3 CCC Sets
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
4
6
8
10
12
no of CCCs
14
16
18
20
Fig. 24. Execution Time of Merge Algorithms with Type 3 ccc Sets
ated by our Merge algorithms and the A∗ algorithm to determine how suboptimal
our final plans are. For this purpose, we examined the final costs of the plans for
our Type 3 ccc sets. Figure 25 shows the estimated execution costs of the final plans
generated by the Merge algorithms. As seen from the figure, the A∗ algorithm
almost always finds better plans than our algorithms. However, the time it spends
in finding those quality plans is not offset by the net savings it achieves. Although
our algorithms explore only a restricted search space, the results show that they are
able to compute plans whose costs are at most 10 % more than the plans produced
by the A∗ algorithm. From these results, we can conclude that our algorithms are
both feasible and practical.
7. RELATED WORK
Our work has been influenced by and is related to various areas of research. Over the
last decade, there has been increasing interest in building information agents that
can access a set of diverse data sources. These systems include HERMES [Adali
et al. 1996], SchemaSQL [Lakshmanan et al. 1996; Lakshmanan et al. 1999], TSIM-
44
·
F. Ozcan, V.S. Subrahmanian and J. Dix
)
s
c
e
s
(
s
t
s
o
c
l
a
n
i
f
200
180
160
140
120
100
80
60
40
20
0
20
Final Costs Obtained
DFMerge1
DFMerge2
DFMerge3
BFMerge1
BFMerge2
BFMerge3
ASTAR
30
40
50
60
sharing factor
70
80
90
100
Fig. 25. Final Plan Costs Generated for Type 3 ccc Sets
MIS [Chawathe et al. 1994; Garcia-Molina et al. 1997], SIMS [Arens et al. 1993],
Information Manifold [Levy et al. 1996b; Levy et al. 1996a], The Internet Softbot
[Etzioni and Weld 1994], InfoSleuth [Bayardo et al. 1997], Infomaster [Genesereth
et al. 1997], and ARIADNE [Ambite et al. 1998]. Although all these systems pro-
vide mechanisms to optimize individual requests, the only one which addresses the
problem of optimizing overall agent performance is ARIADNE.
In [Ashish 1998; Ashish et al. 1999], the authors propose techniques to selectively
materialize data to improve the performance of subsequent requests. They use the
LOOM [MacGregor 1990] knowledge representation language for modeling data and
maintain an ontology of classes of information sources in LOOM. They determine
what to materialize by examining previous user requests as follows. They first look
at the constraints imposed by user queries and create subclasses in the ontology
corresponding to these restrictions. They then try to merge subclasses whenever
possible. After all user queries have been examined, they sort these subclasses
according to the frequency of requests and materialize subclasses from this list
until the space reserved for materialization is exhausted. They repeat this process
in fixed intervals. Their idea is similar to previous semantic caching ideas [Adali
and Subrahmanian 1195; Adali et al. 1996; Dar et al. 1996]. In semantic caching,
the cache is organized into semantic regions instead of pages. When a new query
arrives, the contents of the cache is examined to determine what portion of the
data requested in the query is present in the cache. A query is then created to
retrieve the rest of the data from disk. The problem with semantic caching is that
containment checking is hard and having a large number of semantic regions creates
performance problems.
Both [Ashish et al. 1999] and [Dar et al. 1996] process one query at a time,
and try to reduce the execution time by using caches, whereas we examine a set of
requests (in our framework, agents can be built on top of legacy software code bases
such as PowerPoint, Excel, route planners, etc. which may not support a database
style query language) and try to optimize the overall execution time of this set of
requests by exploiting the commonalities between them. Since we process a set
of requests simultaneously, we cache the results of a code call condition evaluation
Improving Performance of Heavily-Loaded Agents
·
45
only if another code call condition in this set can make use of the cached results. On
the other hand, in [Ashish et al. 1999] caching decisions are based on user request
histories. The advantage of their approach is that they can make use of the cache
for a longer period of time, while in our case the cache contents are valid during
the execution of a particular set of code call conditions. When we process the next
batch of code call conditions, we discard the contents of the cache. On the other
hand, the disadvantage of history based caching is that it cannot rapidly adapt to
changes in interests. Nevertheless, we believe that incorporating more global level
caching techniques, like the ones in [Ashish et al. 1999], into our framework is a
promising research area that is worth pursuing. Another important difference is
that our results also include soundness and completeness theorems.
The problem of simultaneously optimizing and merging a set of queries has
been studied within the context of relational and deductive databases [Grant and
Minker 1980; Sellis 1988; Shim et al. 1994; Sellis and Ghosh 1990; Finkelstein 1982;
Chakravarthy and Minker 1985].
[Grant and Minker 1980; Sellis 1988; Sellis and
Ghosh 1990; Shim et al. 1994] address the problem of creating a globally opti-
mal access plan for a set of queries, provided that the common expressions among
the queries are given as input.
[Grant and Minker 1980] describe a branch-and-
bound algorithm which searches a state space in a depth-first manner to optimize
a set of relational expressions. Their algorithms are not cost-based, and hence they
may increase the total execution cost of the queries. Moreover, they only consider
equivalence relationships, but not containment relationships and they only deal
with relational sources. Furthermore, they do not deal with non database sources.
[Sellis 1988; Shim et al. 1994; Sellis and Ghosh 1990] propose exhaustive algo-
rithms to create a globally optimal execution plan for a set of relational database
queries. [Sellis and Ghosh 1990] show that the multiple-query optimization (MQO)
problem in relational databases is NP-hard even when only equivalence relationships
are considered. Hence, exact algorithms for MQO are not practical and therefore,
approximations or heuristic algorithms are worth pursuing.
[Sellis 1988] formulates the MQO problem as a state search problem and uses the
A∗ algorithm. In their approach, a state is defined as an n-tuple h P1j1 ,P2j2,..Pnjni,
where P1j1 ∈ {N U LL} ∪ Pi and Pi is the set of possible access plans for query
Qi. The initial state is the vector h NULL, . . . , NULL i, that is no access plan
is chosen for any query. A state transition chooses an access plan for the next
query whose corresponding access plan is NULL in the state vector. The heuristic
function proposed by [Sellis 1988] takes only equivalence relationships into account.
[Shim et al. 1994] improves and extends this heuristic function by incorporating
implication relationships and by modifying the estimated costs. This improved
heuristic function provides a tighter bound than the one proposed in [Sellis 1988].
However, their approach requires enumeration of all possible plans for each query,
leading to a (theoretically) very large search space. As a result, these algorithms
have an exponential worst case running time. Moreover, in a heterogeneous envi-
ronment, it may not be possible to assume that all query plans can be enumerated
since queries might have infinitely many access plans. Furthermore, application
program interfaces of individual data sources and/or software packages may not
enumerate all such plans for requests shipped to them. This may be because (i)
their internal code does not support it, or (ii) they are not willing to do so.
46
·
F. Ozcan, V.S. Subrahmanian and J. Dix
While [Sellis 1988; Shim et al. 1994; Sellis and Ghosh 1990] focus on only rela-
tional data sources, we address the problem of optimizing a set of code call condi-
tions in agents which are built on top of arbitrary data sources. For this purpose,
we provide a framework to define and identify common subexpressions for arbitrary
data sources. Moreover, we do not need to enumerate all possible plans of a single
query. We have implemented an adapted version of the A∗ algorithm of [Shim et al.
1994] and compared it with our merging algorithms. As the results in Section 6
show, our merging algorithms are much faster than the A∗-based algorithm. As the
A∗-based algorithm examines a larger search space, it may find low-cost plans that
our merging algorithms may miss. However, the time it takes to find such good
plans is usually not offset by the savings it achieves.
[Finkelstein 1982; Chakravarthy and Minker 1985], on the other hand, focus on
detecting common expressions among a set of queries in relational and deductive
databases. Since the notion of "common subexpression" varies for different data
sources, the common expression identification problem for agents is very different
from those of relational and deductive databases. Furthermore, they only consider
equivalence and containment relationships among queries when detecting common
subexpressions, whereas we also consider overlapping cases.
The only work that addresses heterogeneity and hence is most closely related
to ours is that of [Subramanian and Venkataraman 1998]. The authors propose
an architecture to process complex decision support queries that access to a set of
heterogeneous data sources. They introduce transient views, which are materialized
views that exist during the execution of a query. [Subramanian and Venkataraman
1998] describe algorithms which analyze the query plan generated by an optimizer
to identify similar sub-plans, combine them into transient views and insert filters
for compensation. Moreover, [Subramanian and Venkataraman 1998] presenst the
implementation of their algorithms within the context of DataJoiner's [Gupta and
Lin 1994; Venkataraman and Zhang 1998] query optimizer. They try to optimize
a complex decision support query by exploiting common subexpressions within
this single query, whereas we try to simultaneously optimize a given set of requests.
While they examine relational-style operators in detecting common subexpressions,
we process any code call condition defined over arbitrary data sources not just re-
lational sources. Moreover, they do not have a language to describe equivalence
and containment relationships for heterogeneous data sources and hence these re-
lationships are fixed apriori in the optimizer code. On the other hand, we provide
invariants to describe relationships for heterogeneous data sources. Our algorithms
for merging multiple code call conditions take such invariants and cost information
into account when performing the merge.
Another area of research that is related to ours is partial evaluation in logic
programs [Leuschel et al. 1998; Lloyd and Shepherdson 1991; De Schreye et al.
1999]. Partial evaluation takes a program and a goal and rewrites the program by
using a set of transformations to optimize its performance. The rewritten program
usually runs faster for the particular goal when SLD or SLD-NF resolution is used
for query processing. On the other hand, our framework takes an agent program
and a set of derived invariants, and tries to optimize the agent program apriori,
that is at development time, prior to occurence of state changes. An interesting
research problem in our framework may be the following: If a state change can be
Improving Performance of Heavily-Loaded Agents
·
47
encoded as a goal, then we can use partial evaluation techniques to further optimize
the rewritten agent program, as shown in Figure 26. We believe this problem needs
further attention and research.
Agent
Program P
common expression
detection and
merging
P ′
Partial
Evaluation
P ′′
derived
invariants
state
change
Fig. 26. Application of Partial Evaluation Techniques to Agent Programs
Another area of research that is very closely related to ours is query optimization
in relational and deductive databases [Graefe 1995; Haas et al. 1989; Ioannidis and
Kang 1990; Graefe 1993; Ibaraki and Kameda 1984; Kim 1982; Mumick et al. 1996],
and in mediators [Adali et al. 1996; Levy et al. 1996a; Haas et al. 1997; Ambite
and Knoblock 2000; Duschka et al. 2000]. It is worth noting that this list is not ex-
haustive since over the last decades, enormous effort has been devoted to the query
optimization problem. Our work is orthogonal to techniques for optimizing indi-
vidual queries, as they can be incorporated into our framework in numerous ways.
For example, individual requests might be first optimized by using the techniques
in [Levy et al. 1996a] or [Ambite and Knoblock 2000], then our techniques might
be applied to the results. However, our focus in this paper is on the simultaneous
optimization of a set of requests.
Finally, the problem of choosing appropriate materialized views to answer queries
is also related to our work and there exist several papers in this area [Qian 1996;
Levy et al. 1995; Chaudhuri et al. 1995].
[Levy et al. 1995] describes algorithms
to determine the portions of a query that can be expressed using the definitions of
materialized views. [Chaudhuri et al. 1995] identifies portions of a query that can
be answered using materialized views, and determine if it is efficient to answer the
query using the view. The focus of such techniques is to efficiently compute the
answers to a single query, whereas our focus is to optimize the overall cost of a set
of requests submitted to a heavily loaded agent.
8. CONCLUSION
There is now an incredible increase in the amount of research being conducted
on software agents. Software agents now provide a host of web based services,
ranging from creating personalized newspapers for people, to building multimedia
presentations. In addition, agents for corporate web sites often try to personalize
the web site for a given user by tracking histories of that user's interest. Agents
are also being increasingly used in the aerospace and defense industries.
When an agent gets lots of requests within a short time frame, the standard
mechanism that most agent frameworks use is to queue the requests in accordance
with some queueing policy (e.g. LIFO, FIFO, priority queue) and then service the
48
·
F. Ozcan, V.S. Subrahmanian and J. Dix
requests one after the other. This often leads to long wait times for requests that
occur later on in the queue.
In this paper, we have shown how to improve the
performance of an agent by merging a set of requests and servicing the requests
simultaneously. We proposed a generic and customizable framework for this pur-
pose. Our solution applies to agents that are built on top of legacy code, which is
certainly a practical assumption, as the success of the agent endeavor rests on the
ability to build on top of existing data and software sources. Our solution consists
of two parts:
(1) identifying "commonalities" among a set of code call conditions and
(2) computing a single global execution plan that simultaneously optimizes the
total expected cost of this set of code call conditions.
We first provided a formal framework within which an agent developer can specify
what constitutes a "common subexpression" for a data source via a set of structures,
called invariants. Invariants describe (1) code call conditions that are "equivalent"
to other code call conditions, (2) code call conditions that are "contained" in other
code call conditions, and (3) code call conditions that overlap with other code call
conditions. Moreover, such invariants may imply other invariants. We developed
provably sound and complete algorithms to take the initial set of invariants input
by the developer and compute all implied invariants.
Second, we provided an architecture to merge multiple requests in agents. We
provided algorithms to identify equivalent, implied and overlapped code call con-
ditions in any set C. We then proposed two heuristic based algorithms, BFMerge
and DFMerge, that take as input, the set of code call conditions, and produce as
output, a single execution plan. The merging decisions are based on costs, hence
the resulting global plan is guaranteed to have a reduced cost.
We have experimentally shown that our algorithms achieve significant savings.
We have compared our merging algorithms with Sellis' A∗-based algorithm (which
applied to merging multiple requests in the relational database case only) and
demonstrated that our algorithms almost always outperform theirs. We have shown
that our merging algorithms (1) can handle more than twice as many simultaneous
code call conditions as the A∗ algorithm and (2) run 100 to 6300 times faster than
the A∗ algorithm and (3) produce execution plans the cost of which is at most 10%
more than the plans generated by the A∗ algorithm.
We conclude with a brief remark on an important piece of future work. Eiter
et. al. [Eiter et al. 2000] have developed a class of agents called regular agents. In
their framework, the semantics of an agent is given by computing certain kinds of
semantic constructs called "status sets." When an agent experiences a state (which
may occur, for example, when it receives a message), the agent computes a new
"status set" having some properties decribed in [Eiter et al. 1999]. This "status
set" specifies what the agent is supposed to do in order to respond to the state
change. [Subrahmanian et al. 2000] shows that this framework is rich enough not
only to deal with reactive agent behavior [Kowalski and Sadri 1999], but also the so-
called autonomous agent behavior of the type described by Shoham [Shoham 1993;
Shoham 1999]. Eiter et. al. [Eiter et al. 2000]'s regular agent framework reduce the
problem of computing "status sets" of regular agents to that of evaluating a set of
code call conditions. The beauty of their result is that the syntactic restrictions on
Improving Performance of Heavily-Loaded Agents
·
49
regular agents makes it possible, to associate with each agent, prior to deployment
of the agent, a set of code call conditions. Whenever the agent needs to find a
new status set in response to a state change, it recomputes a new status set by
evaluating this set of code call conditions. Hence, all the techniques described in
this paper may be used to optimize, once and for all, this set of code call conditions,
so that once the agent is deployed, this optimized set of code call conditions is used
by the agent for "status set" computations. We are pursuing this research avenue.
REFERENCES
Adali, S., Candan, K., Papakonstantinou, Y., and Subrahmanian, V. S. 1996. Query
caching and optimization in distributed mediator systems. In Proc. of the ACM SIGMOD
Conf. on Management of Data (Montreal, Canada, June 1996), pp. 137 -- 148.
Adali, S. and Subrahmanian, V.
Intelligent caching in hybrid knowledge bases.
In N. Mars Ed., Proc. 1995 Intl. Conf. on Very Large Knowledge Bases (Twente, The
Netherlands, May 1195), pp. 247 -- 256. IOS Press.
1195.
Ambite, J. L. et al.
1998. Ariadne: A system for constructing mediators for internet
sources. In Proceedings of ACM SIGMOD Conference on Management of Data (Seattle,
Washington, USA, June 1998), pp. 561 -- 563.
Ambite, J. L. and Knoblock, C. A. 2000. Flexible and scalable cost-based query planning
in mediators: A transformational approach. Artificial Intelligence 118, 1-2, 115 -- 161.
Arens, Y., Chee, C. Y., Hsu, C.-N., and Knoblock, C.
1993. Retrieving and integrating
data from multiple information sources. International Journal of Intelligent Cooperative
Information Systems 2, 2, 127 -- 158.
Ashish, N.
1998. Optimizing information agents by selectively materializing data. In Pro-
ceedings of the 15th National Conference on Artificial Intelligence and 10th Innovative
Applications of Artificial Intelligence Conference (Madison, Wisconsin, USA, July 1998),
pp. 1168. Doctoral Consortium Abstract.
Ashish, N., Knoblock, C. A., and Shahabi, C.
Selectively materializing data in
mediators by analyzing user queries. In Proceedings of the 4th IFCIS International Con-
ference on Cooperative Information Systems, (CoopIS) (Edinburgh, Scotland, September
1999), pp. 256 -- 266.
1999.
Bayardo, R. et al.
Infosleuth: Agent-based semantic integration of information
in open and dynamic environments. In J. Peckham Ed., Proceedings of ACM SIGMOD
Conference on Management of Data (Tucson, Arizona, 1997), pp. 195 -- 206.
1997.
Calvanese, D., De Giacomo, G., and Lenzerini, M. 1998. On the decidability of query
containment under constraints. In Proc. of the 17th ACM SIGACT-SIGMOD-SIGART
Symp. on Principles of Database Systems (PODS) (Seattle, Washington, USA, June 1998),
pp. 214 -- 223.
Chakravarthy, U. S. and Minker, J. 1985. Multiple query processing in deductive
databases using query graphs. In Proc. of the Conf. on Very Large Data Bases (VLDB)
(Kyoto, Japan, 1985), pp. 384 -- 391.
Chaudhuri, S., Krishnamurthy, R., Potamianos, S., and Shim, K.
1995. Optimizing
queries with materialized views. In Proceedings of IEEE Conference on Data Engineering
(Taipei, Taiwan, March 1995), pp. 190 -- 200.
Chawathe, S. et al. 1994. The tsimmis project: Integration of heterogeneous information
sources. In Proceedings of the 10th Meeting of the Information Processing Society of Japan
(Tokyo, Japan, October 1994).
Dar, S., Franklin, M. J., Jonsson, B., Srivastava, D., and Tan, M.
Semantic
data caching and replacement. In Proc. of the Conf. on Very Large Data Bases (VLDB)
(Bombay, India, September 1996), pp. 330 -- 341.
1996.
De Schreye, D. et al. 1999. Conjunctive partial deduction:
foundations, control, algo-
rithms and experiments. Journal of Logic Programming 41, 2-3, 231 -- 277.
50
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Dix, J., Kraus, S., and Subrahmanian, V.
2001.
Temporal agent reasoning. Artificial
Intelligence to appear.
Dix, J., Nanni, M., and Subrahmanian, V. S. 2000. Probabilistic agent reasoning. Trans-
actions of Computational Logic 1, 2, 201 -- 245.
Dix, J., Subrahmanian, V. S., and Pick, G.
2000. Meta Agent Programs. Journal of
Logic Programming 46, 1-2, 1 -- 60.
Du, W., Krishnamurthy, R., and Shan, M.-C.
1992. Query optimization in heterogeneous
DBMS. In Proc. of the Conf. on Very Large Data Bases (VLDB) (Vancouver, Canada,
August 1992), pp. 277 -- 291.
Duschka, O. M., Genesereth, M. R., and Levy, A. Y.
2000. Recursive query plans for
data integration. Journal of Logic Programming 43, 1 (April), 49 -- 73.
Eiter, T., Subrahmanian, V., and Pick, G. 1999. Heterogeneous Active Agents, I: Se-
mantics. Artificial Intelligence 108, 1-2, 179 -- 255.
Eiter, T., Subrahmanian, V., and Rogers, T. J.
2000. Heterogeneous Active Agents,
III: Polynomially Implementable Agents. Artificial Intelligence 117, 1, 107 -- 167.
Etzioni, O. and Weld, D.
1994. A softbot-based interface to the internet. Communications
of the ACM 37, 7, 72 -- 76.
Finkelstein, S. 1982. Common expression analysis in database applications. In Proc. of
the ACM SIGMOD Conf. on Management of Data (Orlando, Florida, USA, 1982).
Garcia-Molina, H. et al.
1997. The tsimmis approach to mediation: Data models and
languages. Journal of Intelligent Information Systems 8, 2, 117 -- 132.
Genesereth, M. R., Keller, A. M., and Duschka, O. M.
Infomaster: An infor-
mation integration system. In Proceedings of ACM SIGMOD Conference on Management
of Data (Tucson, Arizona, USA, May 1997), pp. 539 -- 542.
1997.
Graefe, G. 1993. Query evaluation techniques for large databases. ACM Computing Sur-
veys 25, 2, 73 -- 170.
Graefe, G.
1995. The cascades framework for query optimization. Bulletin of the TC on
Data Engineering 18, 3 (September), 19 -- 29.
Grant, J. and Minker, J.
1980. On optimizing the evaluations of a set of expressions.
Technical Report TR-916 (July), Dept. of Computer Science, Univ. of Maryland, College
Park, MD, USA.
Gupta, P. and Lin, E. T.
1994. Datajoiner: A practical approach to multi-database ac-
cess. In Proceedings of the Third International Conference on Parallel and Distributed
Information Systems (Austin, Texas, September 1994). IEEE-CS Press.
Haas, L. M., Freytag, J. C., Lohman, G. M., and Pirahesh, H. 1989. Extensible query
processing in starburst. In Proceedings of ACM SIGMOD Conference on Management of
Data (Portland, OR, USA, 1989), pp. 377 -- 388.
Haas, L. M., Kossmann, D., Wimmers, E. L., and Yang, J.
1997. Optimizing queries
across diverse data sources. In Proceedings of the 23rd Int. Conference on Very Large
Databases (VLDB) (Athens, Greece, August 1997), pp. 276 -- 285.
Ibaraki, T. and Kameda, T.
1984. On the optimal nesting order of computing n-relational
joins. ACM Transactions on Database Systems 9, 3 (September), 482 -- 502.
Ioannidis, Y. E. and Kang, Y. C.
1990. Randomized algorithms for optimizing large join
queries. In Proceedings of ACM SIGMOD Conference on Management of Data (Atlantic
City, NJ, USA, May 1990), pp. 312 -- 321.
Kim, W.
1982. On optimizing an sql-like nested query. ACM Transactions on Database
Systems 7, 3 (September), 443 -- 469.
Knuth, D. E.
1997. The Art of Computer Programming, Volume I: Fundamental Algo-
rithms (3rd ed.). Addison-Wesley.
Kowalski, R. and Sadri, F.
1999. From logic programming to multi-agent systems. Annals
of Mathematics and Artificial Intelligence, Special issue edited by Jurgen Dix and Jorge
Lobo, 25, 3-4, 391 -- 419.
Lakshmanan, L. V. S., Sadri, F., and Subramanian, I. N.
Schemasql - a language
for interoperability in relational multi-database systems. In Proceedings of the 22nd Int.
1996.
Improving Performance of Heavily-Loaded Agents
·
51
Conference on Very Large Databases, (VLDB) (Bombay, India, September 1996), pp. 239 --
250.
Lakshmanan, L. V. S., Sadri, F., and Subramanian, S. N.
1999. On efficiently imple-
menting schemasql on a sql database system. In Proceedings of the 25th Int. Conference
on Very Large Databases, (VLDB) (Edinburgh, Scotland, September 1999), pp. 471 -- 482.
Some achievements and prospects
Leuschel, M., Martens, D., and De Schreye, D.
1998.
in partial deduction. ACM Computing Surveys 30, 3es (September).
Levy, A., Rajaraman, A., and Ordille, J. 1996a. Querying heterogeneous information
sources using source descriptions. In Proceeding of the 22nd Int. Conference on Very Large
Databases (VLDB) (Bombay, India, September 1996), pp. 251 -- 262.
Levy, A. Y., Mendelzon, A. O., Sagiv, Y., and Srivastava, D.
1995. Answering queries
using views. In Proceedings of the 14th ACM SIGACT-SIGMOD-SIGART Symp. on Prin-
ciples of Database Systems (PODS) (San Jose, CA, USA, May 1995), pp. 95 -- 104.
Levy, A. Y., Rajaraman, A., and Ordille, J. J. 1996b. The world wide web as a collec-
tion of views: Query processing in the information manifold. In Workshop on Materialized
Views: Techniques and Applications (VIEW 1996) (Montreal, Canada, 1996), pp. 43 -- 55.
Partial evaluation in logic programming.
Lloyd, J. W. and Shepherdson, J. C.
1991.
Journal of Logic Programming 11, 3-4, 217 -- 242.
MacGregor, R.
1990. The evolving technology of classification-based knowledge represen-
tation systems. In J. Sowa Ed., Principles of Semantic Networks: Explorations in the
Representation of Knowledge. San Mateo, CA: Morgan Kaufmann.
Mumick, I. S., Finkelstein, S. J., Pirahesh, H., and Ramakrishnan, R.
1996. Magic
conditions. ACM Transactions on Database Systems 21, 1 (March), 107 -- 155.
Naacke, H., Gardarin, G., and Tomasic, A.
Leveraging mediator cost models with
heterogeneous data sources. In Proc. IEEE Conf. on Data Engineering (Orlando, Florida,
USA, 1998), pp. 351 -- 360.
1998.
Qian, X. 1996. Query folding. In Proc. IEEE Conf. on Data Engineering (New Orleans,
LA, USA, 1996), pp. 48 -- 55.
Roth, M. T., Ozcan, F., and Haas, L.
Cost models do matter: Providing cost
information for diverse data sources in a federated system. In Proc. of the Conf. on Very
Large Data Bases (VLDB) (Edinburgh, Scotland, UK, September 1999).
1999.
Salzberg, B.
1988.
File Structures: An Analytical Approach. Prentice Hall.
Samet, H.
1989.
Reading, MA.
The Design and Analysis of Spatial Data Structures. Addison-Wesley,
Sellis, T. K.
1988. Multiple query optimization. ACM Transactions on Database Sys-
tems 13, 1 (March), 23 -- 52.
Sellis, T. K. and Ghosh, S.
1990. On the multiple-query optimization problem. IEEE
Transactions on Knowledge and Data Engineering 2, 2 (June), 262 -- 266.
Shim, K., Sellis, T. K., and Nau, D.
1994.
Improvements on a heuristic algorithm for
multiple-query optimization. Data and Knowledge Engineering 12, 2, 197 -- 222.
Shoham, Y. 1993. Agent Oriented Programming. Artificial Intelligence 60, 51 -- 92.
Shoham, Y.
1999. What we talk about when we talk about software agents. IEEE Intelli-
gent Systems 14, 28 -- 31.
Subrahmanian, V., Bonatti, P., Dix, J., Eiter, T., Kraus, S., Ozcan, F., and Ross, R.
2000. Heterogeneous Agent Systems. MIT Press, Cambridge, MA.
Subramanian, S. N. and Venkataraman, S. 1998.
Cost-based optimization of decision
support queries using transient views. In Proceedings of ACM SIGMOD Conference on
Management of Data (Seattle, WA, USA, June 1998), pp. 319 -- 330.
Ullman, J. D.
1989.
Principles of Database and Knowledge Base Systems, Volume 2.
Computer Science Press, New York, NY.
1998.
Venkataraman, S. and Zhang, T.
Heterogeneous database query optimization
in db2 universal datajoiner. In Proceedings of the 24th Int. Conference on Very Large
Databases, (VLDB) (New York City, USA, August 1998), pp. 685 -- 689.
52
·
F. Ozcan, V.S. Subrahmanian and J. Dix
APPENDIX
A. PROOFS OF THEOREMS
Proof of Theorem 2.10.
(⇒): Suppose π is a witness to the safety of χ. There are two cases:
Case 1: Let χπ(i) be an atomic code call condition of the form in(Xπ(i), ccπ(i)),
then by the definition of safety, root (ccπ(i)) ⊆ RVπ(i), where RVπ(i) =
{root (Y) ∃j < i s.t. Y occurs in χπ(j)}, and either Xπ(i) is a root variable
or root (Xπ(i)) ∈ RVπ(i). Then, there exist χπ(j1), χπ(j2), . . . , χπ(jk), jk <
i , such that root (Xπ(jk)) ⊆ RVπ(i), and root (Xπ(jk)) ⊆ root (ccπ(i)). But,
then χπ(i) is dependent on each of the χπ(j1), χπ(j2), . . . , χπ(jk), jk < i by
definition. Hence, there exist edges
(χπ(j1), χπ(i)), (χπ(j2), χπ(i)), . . . (χπ(jk), χπ(i)).
Therefore, χπ(j1), χπ(j2), . . . , χπ(jk), jk < i precede χπ(i), hence π is also a
topological sort of the cceg of χ.
Case 2: If χπ(i) is an equality/inequality of the form s1 op s2, then at least one
of s1, s2 is a constant or a variable S such that root (S) ∈ RVπ(i). Suppose
at least one of s1, s2 is a variable. Then, there exists a χπ(j), j < i, such
that root (S) ∈ root (Xπ(j)), as root(Xπ(j)) ⊆ RVπ(i). But, then χπ(i) is
dependent on χπ(j) by definition, and there exists an edge (χπ(j), χπ(i)) in
the cceg of χ. Hence, χπ(j) precedes χπ(i) in the topological sort of the cceg.
If both s1 and s2 are constants, then their nodes have in-degree 0 in the
cceg, and no code call condition needs to precede χπ(i) in the topological
sort order, i.e., they are unrestricted. Therefore, π is also a topological sort
of the cceg of χ.
(⇐): Suppose π is a topological sort of the cceg of χ. Let
χπ(i), χπ(j1), χπ(j2), . . . , χπ(jk), jk < i
be code call conditions such that there exist edges
(χπ(j1), χπ(i)), (χπ(j2), χπ(i)), . . . , (χπ(jk), χπ(i))
in the cceg of χ. Then, by definition each χπ(jm), m = 1, . . . , k, depends on
χπ(i).
If χπ(i) is an atomic code call condition of the form in(Xπ(i), ccπ(i)),
then root (Xπ(jm)) ⊆ root (ccπ(i)), m = 1, . . . , k. As ∀jm, m = 1, . . . , k, jm < i,
root (Xπ(jm)) ⊆ RVπ(i), by definition of RVπ(i), hence root (ccπ(i)) ⊆ RVπ(i). On
the other hand, if χπ(i) is an equality/inequality of the form s1 op s2, then either
s1 is a variable and root (s1) ∈ root (Xπ(jm)), where jm ∈ {j1, . . . , jk}, or s2 is
a variable and root (s1) ∈ root (Xπ(j′
m ∈ {j1, . . . , jk}, or both. But,
root (Xπ(jm)) ⊆ RVπ(i) ∀jm, m = 1, . . . , k, jm < i. Hence, root (s1), root (s2) ∈
root (Xπ(jm)). If both s1 and s2 are constants, then they are unrestricted in the
topological sort. Therefore, π is also a witness to the safety of χ.
m)), where j′
Proof of Theorem 2.20. The proof is by induction on the structure of con-
dition lists.
Improving Performance of Heavily-Loaded Agents
·
53
Base Cases: Base cases are when the condition list consists of t1 Op t2 where
Op ∈ {<, >, ≤, ≥, =} and each of t1, t2 is either a variable or a constant. We
suppress the cases when both t1, t2 are constants: the relation either holds (in
that case we an eliminate t1 Op t2) or it does not (in that case we can eliminate
the whole invariant).
Op = "≤, ≥": We have to consider terms of the form t1 ≤ t2 (resp. t1 ≥ t2) and
1, ie′
2
distinguish the following cases. For each case we define expressions ie′
such that true =⇒ ie′
2 is equivalent to t1 ≤ t2 =⇒ ie1 ℜ ie2.
(1) t2 is a constant a: Then t1 is a variable. We modify ie1, ie2 by intro-
ducing a new variable Xnew and adding the following ccc to all subex-
pressions of ie1, ie2 containing t1
1 ℜ ie′
in(t1, ag : subtraction(a, Xnew)) & in(1, ag : geq 0 (Xnew)).
We note that t1 now becomes an auxiliary variable and Xnew is a base
variable.
Trans(ic, iei) is defined to be the modified iei just described.
(2) t1 is a constant a: Then t2 is a variable. We modify ie1, ie2 by intro-
ducing a new variable Xnew and adding the following ccc to all subex-
pressions of ie1, ie2 containing t2
in(t2, ag : addition (a, Xnew)) & in(1, ag : geq 0 (Xnew)).
Again, t2 becomes an auxiliary variable and Xnew is a base variable.
Trans(ic, iei) is defined to be the modified iei just described.
(3) Both t1, t2 are variables: We modify ie1, ie2 by introducing a new vari-
able Xnew and adding the following ccc to all subexpressions of ie1, ie2
containing t2
in(t2, ag : addition (t1, Xnew)) & in(1, ag : geq 0 (Xnew)).
Again, t2 becomes an auxiliary variable and Xnew is a base variable.
Trans(ic, iei) is defined to be the modified iei just described.
The case ≥ is completely analogous: just switch t1 with t2. Note that the
above covers all possible cases, as any variable in the condition list must
be a base variable (see Definition 2.17).
Op = "¡,¿": Analogous to the previous case, just replace "ag : geq 0 (Xnew)" by
"ag : ge 0 (Xnew)"
Op = "=": If in t1 = t2 the term t1 is a variable, then we replace each occur-
rence of t1 in ie1, ie2 by t2. If t1 is a constant and t2 is a variable, replace
each occurrence of t2 in ie1, ie2 by t1.
Inductive Step: As the condition list is just a conjunction of the cases mentioned
above, we can apply our modifications of ie1, ie2 one after another. Once all
modifications have been performed, we arrive at an equivalent formula of the
form
true =⇒ Trans(ic, ie1) ℜ Trans(ic, ie2)
Proof of Corollary 2.21.
(⇒) : Let inv : ic =⇒ ie1 ℜ ie2 be an invariant. We can assume that ic is in
54
·
F. Ozcan, V.S. Subrahmanian and J. Dix
DNF: C1 ∨ C2 ∨ . . . ∨ Cm. Thus we can write inv as follows:
{Ci =⇒ ie1 ℜ ie2 1 ≤ i ≤ m}
Let invθ be any ground instance of inv. If (S, θ) = inv, then either (C1 ∨ C2 ∨ . . . ∨
Cm)θ evaluates to false in state S, or (ie1)θ ℜ (ie2)θ is true in S. Assume that
(C1 ∨ C2 ∨ . . . ∨ Cm)θ evaluates to false, then each (Ci)θ has to be false in S. Hence,
(S, θ) = (Ci =⇒ ie1 ℜ ie2)f or1 ≤ i ≤ m
Assume (C1 ∨ C2 ∨ . . . ∨ Cm)θ evaluates to true in S. Then there exists at least
one (Ci)θ that evaluates to true in state S. Let T = {(Cj)θ 1 ≤ j ≤ m} be the
set of conjunctions that are true in S. As all other (Ci)θ /∈ T evaluates to false,
(S, θ) = (Ci =⇒ ie1 ℜ ie2) f or 1 ≤ i ≤ m, and (Ci)θ /∈ T . But (S, θ) = inv, hence
(ie1)θ ℜ (ie2)θ is true in S. As a result, (S, θ) = (Cj =⇒ ie1 ℜ ie2) f or 1 ≤ j ≤
m and(Cj)θ ∈ T .
Since, each Ci =⇒ ie1 ℜ ie2 is an ordinary invariant the result follows from
Theorem 2.20.
(⇐) : Assume that (∀Ci, 1 ≤ i ≤ m) (S, θ) = true =⇒ Trans(Ci, ie1) ℜ Trans(Ci, ie2)
and suppose (S, θ) = (C1 ∨C2 ∨. . .∨Cm). Then by Theorem 2.20, (∀Ci, 1 ≤ i ≤ m)
(S, θ) = (Ci =⇒ ie1 ℜ ie2). There exists at least one (Cj)θ which evaluates to true
in S. But then, (ie1)θ ℜ (ie2)θ is true in state S. Hence, (S, θ) = inv.
Proof of Lemma 4.4.
Chk Imp(ie1, ie2)
if and only if
for all states S and all assignments θ: [ie1]S,θ ⊆ [ie2]S,θ
if and only if
for all states S and all assignments θ: true =⇒ ie1θ ⊆ ie2θ
if and only if
Chk Taut(true =⇒ ie1 ⊆ ie2).
(2) follows from Theorem 2.20 and Corollary 2.21. Note that it also holds for
invariants of the form ic ⇒ ie1 = ie2 because they can be written as two separate
invariants: "ic ⇒ ie1 ⊆ ie2" and "ic ⇒ ie1 ⊇ ie2". (3) is immediate by the very
definition.
Proof of Proposition 4.5. We show that the containment problem [Ullman
1989] in the relational model of data is an instance of the problem of checking
implication between invariant expressions. The results follow then from Lemma 4.4
and the fact, that the containment problem in relational databases is well known
to be undecidable.
To be more precise, we use the results in [Calvanese et al. 1998], where it has been
shown that in the relational model of data, the containment of conjunctive queries
containing inequalities is undecidable.
It remains to show that our implication
check problem between invariant expressions can be reduced to this problem.
Let relational : query(Q) be a code call that takes as input an arbitrary set of
subgoals corresponding to the conjunctive query Q and returns as output the result
of executing Q.
Improving Performance of Heavily-Loaded Agents
·
55
Let Q1 and Q2 be arbitrary conjunctive queries which may contain inequalities.
we define
ie1 = relational : query(Q1),
ie2 = relational : query(Q2).
Then, clearly
Chk Imp(ie1, ie2) = true if and only if Q1 ⊆ Q2.
Hence the implication check problem is also undecidable.
Proof of Proposition 4.6. Clearly, by Lemma 4.4, it suffices to prove the
proposition for Chk Imp.
For an invariant expression ie, the set of all substitutions θ such that ieθ is
ground, is finite (because of our assumption about finiteness of the domains of
all datatypes). Thus, our atomic code call conditions in(obj, ag : f (args)) can all
be seen as propositional variables. Therefore, using this restriction, we can view
our formulae as propositional formulae and a state corresponds to a propositional
valuation.
With this restriction, our problem is certainly in co-NP, because computing [ie]S,θ
is nothing but evaluating a propositional formula (the valuation corresponds to the
state S). Thus "[ie1]S,θ ⊆ [ie2]S,θ for all S and all assignments θ" translates to
checking whether a propositional formula is a tautology: a problem known to be in
co-NP.
To show completeness, we use the fact that checking whether C is a logical
consequence of {C2, . . . , Cn} (where C is an arbitrary clause and {C2, . . . , Cn} an
arbitrary consistent set of clauses) is well-known to be co-NP-complete.
We prove our proposition by a polynomial reduction of implication between
atomic invariant expressions to this problem.
Let ie be an atomic invariant expression, i.e. an atomic code call condition:
it
takes as input, a set of clauses, and returns as output, all valuations that satisfy
that set of clauses. Let ANS(ie({C})) denote the set of results of evaluating ie on
C with respect to a state S. Then
ANS(ie({C})) ⊆ ANS(ie({C2, . . . , Cn})) if and only if {C2, . . . , Cn} = C.
Hence, checking whether an arbitrary atomic invariant expression ie1 implies an-
other atomic invariant expression ie2 is co-NP hard.
Lemma A.1 (Translation into predicate logic). There is a translation Trans from
simple invariants INVsimple into predicate logic with equality such that the following
holds
I = inv if and only if Trans(I) ∪ Tord = Trans(inv),
where Tord is the theory of strict total orders < and a ≤ b, (resp. a ≥ b), is an
abbreviation for "a < b ∨ a = b", (resp. "a > b ∨ a = b").
Moreover, a simple invariant "ic1 =⇒ ie1 ⊆ ie′
1" is translated into a formula of
the form
∀ (ic1 → ∀x(predhd1,f1i(. . . , x) → (predhd2,f2i(. . . , x)))
56
·
F. Ozcan, V.S. Subrahmanian and J. Dix
where ∀ denotes the universal closure with respect to all remaining variables. This
is a universally quantified formula.
Proof. We translate each simple invariant to a predicate logic formula by in-
duction on the structure of the invariant.
Code Calls: For each n-ary code call d : f (. . . ) we introduce a (n+1)-ary predicate
predhd,f i(. . . , ·). Note that we interpret d : f (. . . ) as a set of elements. The
additional argument is used for containment in this set.
Atomic ccc's: We then replace each simple invariant expression
in(X, d1 : f1 (. . . )) ⊆ in(Y, d2 : f2 (. . . ))
by the universal closure (with respect to all base variables) of the formula
∀x(predhd1,f1i(. . . , x) → predhd2,f2i(. . . , x))
Simple Ordinary Invariants: A simple ordinary invariant of the form
is translated into
ic1 =⇒ ie1 ⊆ ie′
1
∀ (ic1 → ∀x(predhd1,f1i(. . . , x) → (predhd2,f2i(. . . , x)))
where ∀ denotes the universal closure with respect to all remaining variables.
Simple Invariants: A simple invariant of the form
(C1 ∨ C2 ∨ . . . Cm) =⇒ ie1 ⊆ ie′
1
is translated into the following m statements (1 ≤ i ≤ m)
∀ (Ci → ∀x(predhd1,f1i(. . . , x) → (predhd2,f2i(. . . , x)))
where ∀ denotes the universal closure with respect to all remaining variables.
Note that according to the definition of a simple ordinary invariant and according
to the definition of a code call condition (in front of Example 2.1), ic1 and the Ci
are conjunctions of equalities s = t and inequalities s ≤ t, s ≥ t, s < t, s > t where
s, t are real numbers or variables.
The statement
I = inv if and only if Trans(I) ∪ Tord = Trans(inv)
is easily proved by structural induction on simple invariants and condition lists.
Proof of Lemma 4.7. We use the translation of Lemma A.1.
The assumption 6= inv2 expresses that there is a state S0 and a substitution θ of
the base variables in inv2 such that S0 = ic2θ and there is an object a such that
S0 = predhd2,f2i(. . . , a)θ and S0 6= predhd′
2i(. . . , a)θ.
2,f ′
As inv1 entails inv2,
inv1 is not satisfied by S0. Thus there is θ′ such that
S0 = ic1θ′ and there is an object a′ with S0 = predhd1,f1i(. . . , a′)θ and S0 6=
predhd′
1i(. . . , a′)θ.
Now suppose hd′
is just a collection of ground code call conditions) so that S0 = predhd′
We do this for all θ′ that are counterexamples to the truth of inv1. Because hd′
2i. Then we simply modify the state S0 (note a state
1i(. . . , a′)θ.
1i 6=
1i 6= hd′
1, f ′
1,f ′
1,f ′
1, f ′
2, f ′
Improving Performance of Heavily-Loaded Agents
·
57
2, f ′
2i, this modification does not affect the truth of S0 = predhd2,f2i(. . . , a)θ and
2i(. . . , a)θ. But this is a contradiction to our assumption that inv1
hd′
S0 6= predhd′
entails inv2. Thus we have proved: hd′
2,f ′
1i = hd′
Similarly, we can also modify S0 by changing the extension of predhd1,f1i(. . . , a′)θ
and guarantuee that inv1 holds in S0. So we also get a contradiction as long as
hd1, f1i 6= hd2, f2i. Therefore we have proved that hd1, f1i = hd2, f2i.
1, f ′
2, f ′
2i.
Our second claim follows trivially from hd′
1, f ′
1i = hd′
2, f ′
2i, and hd1, f1i = hd2, f2i.
Proof of Lemma 4.9. Let inv1 : ic1 =⇒ ie1 ℜ1 ie′
1 and inv2 : ic2 =⇒ ie2 ℜ2 ie′
2.
Then by the computation performed by the Combine 1 algorithm, the derived
invariant has the following form
inv : simplify(ic1 ∧ ic2) =⇒ ie1 ℜ ie′
2,
where ℜ is determined by Table 1. If simplify(ic1 ∧ ic2) = false we are done. In
this case, there is no state S satisfying a ground instance of ic1 ∧ ic2.
We assume that we are given a state S of the agent that satisfies inv1, inv2 and I.
Let inv1Θ and inv2Θ be any ground instances of inv1 and inv2. Then, either ic1(Θ)
evaluates to false, or ie1(Θ) ℜ1 ie′
1(Θ) is true in S. Similarly, either ic2(Θ) is false
or ie2(Θ) ℜ2 ie′
2(Θ) is true in S.
If either ic1(Θ) or ic2(Θ) evaluates to false, then (ic1 ∧ ic2)(Θ) also evaluates to
false, and inv is also satisfied. Let's assume both ic1(Θ) and ic2(Θ) evaluate to true.
Then so does (ic1 ∧ ic2)(Θ), and both ie1(Θ) ℜ1 ie′
2(Θ) are
true in S, as S satisfies both inv1 and inv2. If ℜ = "=", then both ℜ1 = "=" and
ℜ2 = "=", ie′
1 (in all states satisfying I and inv1, inv2). Then,
we have ie1 = ie′
2, hence ie1(Θ) = ie2(Θ) is true in S, and Θ satisfies
inv. If ℜ = "⊆", then ie′
1 → ie2 (in all states satisfying I and inv1, inv2), and we
have ie1 ℜ1 ie′
2, and ie1(Θ) ⊆ ie2(Θ). As inv is satisfied by
any S that also satisfies both inv1, inv2 and I, we have {inv1, inv2} ∪ I = inv.
1(Θ) and ie2(Θ) ℜ2 ie′
1 → ie2 and ie2 → ie′
1 ⊆ ie2, ie2 ℜ2 ie′
1 = ie2 = ie′
1, ie′
Proof of Lemma 4.11. Let inv1 : ic1 =⇒ ie1 ℜ1 ie′
1 and inv2 : ic2 =⇒ ie2 ℜ2 ie′
2.
Then, either Combine 3 returns NIL or the derived invariant has the following
form
inv : simplify(ic1 ∨ ic2) =⇒ ie1 ℜ1 ie′
1.
In the latter case, ie1 = ie2, ℜ1 = ℜ2 and ie′
algorithm.
1 = ie′
2 as implied by the Combine 3
We assume that we are given a state S of the agent that satisfies both inv1 and
inv2. Let inv1Θ and inv2Θ be any ground instances of inv1 and inv2. Then, either
ic1(Θ) evaluates to false, or ie1(Θ) ℜ1 ie′
1(Θ) is true in S. Similarly, either ic2(Θ)
is false or ie1(Θ) ℜ1 ie′
1(Θ) is true in S. We have four possible cases.
Case 1: Both ic1(Θ) and ic2(Θ) evaluate to false. Then (ic1 ∨ ic2) also evaluates
to false, and inv is also satisfied.
Case 2: ic1(Θ) evaluates to false and ic2(Θ) evaluates to true. Since S = inv2,
ie1(Θ) ℜ1 ie′
Case 3:
ie1(Θ) ℜ1 ie′
ic1(Θ) evaluates to true and ic2(Θ) evaluates to false. In this case,
1(Θ) is true in S, since S satisfies inv1. Hence S also satisfies inv.
1(Θ) is true in S. Then S also satisfies inv.
58
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Case 4: Both ic1(Θ) and ic2(Θ) evaluate to true. Again, since S satisfies both
inv1 and inv2, ie1(Θ) ℜ1 ie′
1(Θ) is true in S and inv is also satisfied.
Proof of Proposition 4.14. Suppose X1 ⊆ X2 and inv ∈ CI (X1). We need
to show that inv ∈ CI(X2). By definition of CI , there are five possible cases:
inv = Combine 1(inv1, inv2, I) where inv1, inv2 ∈ I ∪ X1. But then
Case 1: inv ∈ I, hence inv ∈ CI(X2) by definition of CI.
Case 2: inv ∈ X1. As X1 ⊆ X2, inv ∈ X2. Hence, inv ∈ CI(X2) by definition
of CI .
Case 3:
inv1, inv2 ∈ I ∪ X2 as X1 ⊆ X2. Hence, inv ∈ CI (X2).
Case 4:
inv1, inv2 ∈ I ∪ X2 as X1 ⊆ X2. Hence, inv ∈ CI (X2).
Case 5:
inv1, inv2 ∈ I ∪ X2 as X1 ⊆ X2. Hence, inv ∈ CI (X2).
inv = Combine 2(inv1, inv2) where inv1, inv2 ∈ I ∪ X1. But then
inv = Combine 3(inv1, inv2) where inv1, inv2 ∈ I ∪ X1. But then
Proof of Lemma 4.15. Let inv ∈ CI (CI ↑ω). We need to show inv ∈ CI ↑ω.
By the definition of CI , there are three possible cases:
Case 1: inv ∈ I, then inv ∈ CI ↑ω by the definition of CI .
Case 2: inv ∈ CI ↑ω, which is trivial.
inv = Combine 1(inv1, inv2, I) (or inv = Combine 2(inv1, inv2) or
Case 3:
inv = Combine 3(inv1, inv2)) such that inv1, inv2 ∈ I ∪ (CI ↑ω). There exists a
smallest integer ki (i=1,2) such that invi ∈ I ∪ (CI ↑ki). Let k := max(k1, k2).
Then, inv1, inv2 ∈ I ∪ (CI ↑k). By definition of CI and as I ⊆ CI ↑k, inv ∈
CI ↑(k+1). Hence, inv ∈ CI ↑ω.
Proof of Lemma 4.16. Suppose inv ∈ CI ↑ω. Then, there exists a smallest
integer k, such that inv ∈ CI ↑k. The proof is by induction on k. Let the inductive
hypothesis be defined as ∀k′ : 1 ≤ k′ ≤ k, if inv ∈ CI ↑k, then I = inv.
Base Step: k = 1, inv ∈ CI ↑1, then there are four possible cases: (1) inv ∈
I, hence I = inv, (2) inv = Combine 1(inv1, inv2, I) where inv1, inv2 ∈ I.
As inv1, inv2 ∈ I, I = inv1, inv2. Then, by Lemma 4.9, {inv1, inv2} = inv.
Therefore, I = inv. (3) inv = Combine 2 (iv1, inv2) where inv1, inv2 ∈ I.
Since inv1, inv2 ∈ I, I = inv1, inv2. Then, by Lemma 4.10, {inv1, inv2} = inv.
Therefore, I = inv. (4) inv = Combine 3 (iv1, inv2) where inv1, inv2 ∈ I.
As inv1, inv2 ∈ I, I = inv1, inv2. Then, by Lemma 4.11, {inv1, inv2} = inv.
Therefore, I = inv.
Inductive Step: k > 1. Let inv ∈ CI ↑k. Then, there exist inv1, inv2 ∈ CI ↑(
k − 1), such that inv is derived by one of Combine 1, Combine 2 or Com-
bine 3 operators. That is, either inv = Combine 1(inv1, inv2, I), or inv =
Combine 2(inv1, inv2), or inv = Combine 3(inv1, inv2). Because this is the
only possibility, as inv /∈ CI ↑j, j < k, by definition of k. By the inductive
hypothesis I = inv1 and I = inv2. By Lemma 4.9, {inv1, inv2} = inv. Hence,
I = inv.
Improving Performance of Heavily-Loaded Agents
·
59
Lemma A.2. We consider predicate logic with equality and a binary predicate
symbol <. The language also contains arbitrary constants and parameters from the
reals.
We consider a special class of formulae, namely universally quantified formulae of
the form ic → Pi(t) → Pj(t′), where t, t′ are tuples consisting of variables, constants
and parameters, Pi are predicate symbols and ic is an invariant condition involving
equality, <, variables, constants and parameters. We call this class inv-formulae.
Let T be a set of inv-formulae.
The proof system consisting of (R0):
φ(x)
φ(x)θ , where θ is any substitution for
the variables in the tupel x and φ is an inv-formula, and the two inference rules
(R1) and (R2) below is complete for the class of inv-formulae: For each formula
ic → Pi(t) → Pj(t′) which follows from T , there is an instance of a derived formula
which is identical to it. And each derived formula also follows from T .
(R1)
→ P1(t1) → P ′
→ P2(t2) → P ′
simplify((ic1 ∧ ic2)θ) → P1(t1)θ → P ′
ic1
ic2
1(t′
1)
2(t′
2)
2(t′
2)θ
where θ is such that
P ′
1(t′
1)θ = P2(t2)θ
(R2)
→ P1(t1) → P ′
→ P2(t2) → P ′
simplify((ic1 ∨ ic2)θγ) → P1(t1)θγ → P ′
ic1
ic2
1(t′
1)
2(t′
2)
1(t′
1)θγ
where P1(t1)θ = P2(t2)θ,
1(t′
P ′
1)γ = P ′
2(t′
2)γ
The simplify routine simplifies invariant conditions (containing the binary symbol
<) wrt. the theory of real numbers in the signature <, =, and arbitrary constants
and parameters in the reals.
Proof. The correctness of the system is obvious, as all rules have this property.
The completeness follows by adapting the classical completeness proof of first-
order logic and taking into account the special form of the inv-formulae. Let
ϕ :
ic∗ → P ∗(t∗) → P ′∗(t′∗)
be a formula that follows from T . Then the set
T ∪ {∃ (ic∗ ∧ P ∗(t∗) ∧ ¬P ∗′(t∗′))}
is unsatisfiable (because T = ϕ). Therefore it suffices to show the following claim:
Given a set T ∪ {ϕ} of inv-formulae, whenever T 6⊢ ϕ, then T ∪ {¬ϕ}
is satisfiable.
Because then the assumption T 6⊢ ϕ′ leads to a contradiction. Therefore, taking
into account (R0), we can conclude that at least an inv-formula of the form
ϕ′ :
ic → P (t) → P ′(t′),
with ϕ = ϕ′θ must be derivable.
The claim can be shown by establishing that each consistent set T ∪{¬ϕ} contain-
ing inv-formulae and their negations, can be extended to a maximally consistent set
60
·
F. Ozcan, V.S. Subrahmanian and J. Dix
ΦT which contains witnesses.2 For such sets, the following holds: (1) φT ∪{¬ϕ} ⊢ γ
implies γϕ ∈ φT ∪{¬ϕ}, (2) for all γ: γ ∈ φT ∪{¬ϕ} or ¬γ 6∈ φT ∪{¬ϕ}, and (3)
∃xγ ∈ φT ∪{¬ϕ} implies that there is a term t with γ[ t
x ] ∈ φT ∪{¬ϕ}. These proper-
ties induce in a natural way an interpretation which is a model of φT ∪{¬ϕ}.
Proof of Theorem 4.17. The proof is by reducing the statement into pred-
icate logic using Lemma A.1. We are then in a situation to apply Lemma A.2.
Note that the inference rules of Lemma A.2 act on inv-formulae exactly as Com-
bine1 and Combine3 on invariants. Therefore there is a bijection between proofs
in the proof system described in Lemma A.2 and derivations of invariants using
Combine1 and Combine3.
Proof of Corollary 4.18. We are reducing the statement to Theorem 4.17.
We transform each invariant with ℜ = "=", into two separate invariants with
ℜ = "⊆".
If inv is of the form ic ⇒ ie1 ⊆ ie2, we are done, because
(1) the set of transformed invariants is equivalent to the original ones, and
(2) although deriving invariants with ℜ = "=" is possible (such invariants are
contained in the set Taut and new ones will be generated by Combine 13 and
by Combine 3), for all such invariants we have also both their ⊆ counterparts
(this can be easily shown by induction).
Let's suppose therefore that inv has the form ic ⇒ ie1 = ie2. We know that both
ic ⇒ ie1 ⊆ ie2 and ic ⇒ ie1 ⊇ ie2 are entailed by I and we apply Theorem 4.17 to
these cases. We can assume wlog that none of these two invariants is a tautology
(otherwise we are done).
Thus there are inv′ (for ⊆) and inv′′ (for ⊇). We apply Lemma 4.7 and get that
inv′ (resp. inv′′) has the form ic′ ⇒ ie1 ⊆ ie2 (resp. ic′′ ⇒ ie1 ⊇ ie2). By symmetry
ic′ is equivalent (in fact, by using a deterministic strategy it can be made identical)
to ic′′. Thus by our Combine 2, there is also a derived invariant of the form
ic′ ⇒ ie1 = ie2,
and this derived invariant clearly entails ic ⇒ ie1 = ie2 (because inv′ entails ic ⇒
ie1 ⊆ ie2 and inv′′ entails ic ⇒ ie1 ⊇ ie2).
Proof of Corollary 4.19.
(1): The proof is by induction on the iteration of the while loop in the Compute-
Derived-Invariants algorithm. Let the inductive hypothesis be ∀i ≥ 0 if inv
is inserted into X in iteration i, then I = inv.
Base Step: For i = 0, inv ∈ I, inv → inv, hence I = inv.
Inductive Step: Let inv be inserted into X in iteration i > 0, and inv =
Combine 1(inv1, inv2, I), where inv1 and inv2 are inserted into X at step
2This is analogous to the classical Henkin proof of the completeness of first-order logic. In our case
the theory T in question contains only finitely many free variables which simplifies the original
proof.
3see the first line in Table 1
Improving Performance of Heavily-Loaded Agents
·
61
(i−1) or earlier. Then, by the inductive hypothesis, I = inv1 and I = inv2.
By Lemma 4.9, {inv1, inv2} = inv, hence I = inv.
(2): First note that the Compute-Derived-Invariants algorithm computes and
returns CI ↑ω. The result follows from Theorem 4.17 and Corollary 4.18.
B. AXIOMATIC INFERENCE SYSTEM
Equivalence Rules
A ∪ A = A ∩ A = A
A ∪ ∅ = A and A ∩ ∅ = ∅
(A ∪ B) ∪ C = A ∪ (B ∪ C) and (A ∩ B) ∩ C = A ∩ (B ∩ C)
A ∪ B = B ∪ A and A ∩ B = B ∩ A
A ∪ (B ∩ C) = (A ∪ B) ∩ (A ∪ C)
A ∩ (B ∪ C) = (A ∩ B) ∪ (A ∩ C)
¬(¬(A)) = A
¬(A ∪ B) = ¬A ∩ ¬B and ¬(A ∩ B) = ¬A ∪ ¬B
A ∪ (A ∩ B) = A and A ∩ (A ∪ B) = A
Inference Rules
A ⊆ A
(A ∩ B) ⊆ A
A ⊆ (A ∪ B)
((A ∪ B) ∩ ¬B) ⊆ A
A ⊆ ((A ∩ B) ∪ ¬B)
if A ⊆ B and B ⊆ C
then A ⊆ C
if A ⊆ B and C ⊆ D
then (A ∩ C) ⊆ (B ∩ D)
if A ⊆ B and C ⊆ D
then (A ∩ C) ⊆ (B ∪ D)
C. INVARIANTS FOR THE SPATIAL AND RELATIONAL DOMAINS
T =T′ ∧ L =L′ ∧ R =R′ =⇒
in(Y, spatial : vertical (R, L, R)) = in(Y, spatial : vertical (T′, L′, R′))
in(Y, spatial : vertical (R, L, R)) ⊆ in(Y, spatial : vertical (T′, L′, R′))
T =T′ ∧ L =L′ ∧ R <R′ =⇒
T =T′ ∧ R =R′ ∧ L>L' =⇒
in(Y, spatial : vertical (R, L, R)) ⊆ in(Y, spatial : vertical (T′, L′, R′))
in(Y, spatial : vertical (T, L, R)) ⊆ in(Y, spatial : vertical (T′, L′, R′))
T =T′ ∧ R<R' ∧ L>L' =⇒
in(Y, spatial : vertical (T, B, U)) = in(Y, spatial : vertical (T′, B′, U′))
T =T′ ∧ B =B′ ∧ U =U′ =⇒
T =T′ ∧ B =B′ ∧ U <U′ =⇒
in(Y, spatial : vertical (T′, B′, U′)) ⊆ in(Y, spatial : vertical (T′, B′, U′))
in(Y, spatial : vertical (T, B, U)) ⊆ in(Y, spatial : vertical (T′, B′, U′))
T =T′ ∧ U =U′ ∧ B >B′ =⇒
T =T′ ∧ U <U′ ∧ B >B′ =⇒
in(Y, spatial : vertical (T, B, U)) ⊆ in(Y, spatial : vertical (T′, B′, U′))
T =T′ ∧ X =X′ ∧ Y =Y′ ∧ Rad =Rad′ =⇒
in(Z, spatial : range(T, X, Y, Rad)) = in(W, spatial : range(T′, X′, Y′, Rad′))
T =T′ ∧ X =X′ ∧ Y =Y′ ∧ Rad < Rad′ =⇒
in(Z, spatial : range(T, X, Y, Rad)) ⊆ in(W, spatial : range(T′, X′, Y′, Rad′))
Table 7.
Invariants for the spatial domain (1)
62
·
F. Ozcan, V.S. Subrahmanian and J. Dix
T =T′ ∧ R ≤R′ ∧ L ≤L′ ∧ L′ ≤R =⇒
in(Y, spatial : vertical (T, L, R)) ∪ in(Y, spatial : vertical (T′, L′, R′))
=
in(Y, spatial : vertical (T, L, R′))
T =T′ ∧ R ≥R′ ∧ L ≥L′ ∧ L ≤R′ =⇒
in(Y, spatial : vertical (R, L, R)) ∪ in(Y, spatial : vertical (T′, L′, R′))
=
in(Y, spatial : vertical (T, L′, R))
T =T′ ∧ U≤U' ∧ B≤B' ∧ B'≤U =⇒
in(Y, spatial : horizontal (T, B, U)) ∪ in(Y, spatial : horizontal (T′, B′, U′))
=
in(Y, spatial : horizontal (T′, B, U′))
T =T′ ∧ U ≥U′ ∧ B ≥B′ ∧ B ≤U′ =⇒
in(Y, spatial : horizontal (T, B, U)) ∪ in(Y, spatial : horizontal (T′, B′, U′))
=
in(Y, spatial : horizontal (T′, B′, U))
Table 8.
Invariants for the spatial domain (2)
Improving Performance of Heavily-Loaded Agents
·
63
Rel =Rel′ ∧ Attr =Attr′ ∧ Op =Op′ ∧ V =V′ =⇒
in(X, rel : select (Rel, Attr, Op, V)) = in(Y, rel : select (Rel′, Attr′, Op′, V′))
Rel =Rel′ ∧ Attr =Attr′ ∧ Op =Op′ ="≤" ∧ V<V' =⇒
in(X, rel : select (Rel, Attr, Op, V)) ⊆ in(Y, rel : select (Rel′, Attr′, Op′, V′))
Rel =Rel′ ∧ Attr =Attr′ ∧ Op =Op′ ="≥" ∧ V>V' =⇒
in(X, rel : select (Rel, Attr, Op, V)) ⊆ in(Y, rel : select (Rel′, Attr′, Op′, V′))
Rel =Rel′ ∧ Attr =Attr′ ∧ V1 =V1′ ∧ V2 =V2′ =⇒
in(X, rel : rngselect (Rel, Attr, V1, V2)) = in(Y, rel : rngselect (Rel′, Attr′, V1′, V2′))
Rel =Rel′ ∧ Attr =Attr′ ∧ V1≥V1′ ∧ V2 ≤V2′ =⇒
in(X, rel : rngselect (Rel, Attr, V1, V2)) ⊆ in(Y, rel : rngselect (Rel′, Attr′, V1′, V2′))
Rel =Rel′ ∧ Attr =Attr′ ∧ V1≤V1′ ∧ V2 ≤V2′ ∧ V1′ ≤ V2 =⇒
in(X, rel : rngselect (Rel, Attr, V1, V2)) ∪ in(Y, rel : rngselect (Rel′, Attr′, V1′, V2′))
in(Z, rel : rngselect (Rel, Attr, V1, V2′))
=
Rel =Rel′ ∧ Attr =Attr′ ∧ V1≥V1′ ∧ V2 ≥V2′ ∧ V1≤V2′ =⇒
in(X, rel : rngselect (Rel, Attr, V1, V2)) ∪ in(Y, rel : rngselect (Rel′, Attr′, V1′, V2′))
in(Z, rel : rngselect (Rel, Attr, V1′, V2))
=
Table 9.
Invariants for the relational domain (1)
64
·
F. Ozcan, V.S. Subrahmanian and J. Dix
Rel =Rel′ ∧ Attr1 =Attr1′ ∧ Attr2 =Attr2′ ∧ V1′ =V1 ∧
V2 =V2′ ∧ V3′ =V3 ∧ V4 =V4′ =⇒
in(X, rel : rngselect (Rel, Attr1, V1, V2)) ∩ in(Y, rel : rngselect (Rel, Attr2, V3, V4))
=
in(Z, rel : rngselect (Rel′, Attr1′, V1′, V2′)) ∩ in(W, rel : rngselect (Rel, Attr2, V3′, V4′))
Rel =Rel′ ∧ Attr1 =Attr1′ ∧ Attr2 =Attr2′ ∧ V1′ ≤V1
∧ V2 ≤V2′ ∧ V3′ ≤V3 ∧ V4 ≤V4′ =⇒
in(X, rel : rngselect (Rel, Attr1, V1, V2)) ∩ in(Y, rel : rngselect (Rel, Attr2, V3, V4))
⊆
in(Z, rel : rngselect (Rel′, Attr1′, V1′, V2′)) ∩ in(W, rel : rngselect (Rel, Attr2, V3′, V4′))
Rel =Rel′ ∧ Attr1 =Attr1′ ∧ Attr2 =Attr2′ ∧ V1′ ≤V1 ∧
V2′ ≤V2 ∧ V3 ≤V3′ ∧ V4 ≤V4′ ∧ V1 ≤V2′ ∧ V3′ ≤V4 =⇒
(in(X, rel : rngselect (Rel, Attr1, V1, V2)) ∩ in(X, rel : rngselect (Rel, Attr2, V3, V4))) ∪
(in(X, rel : rngselect (Rel′, Attr1′, V1′, V2′)) ∩ in(X, rel : rngselect (Rel, Attr2, V3′, V4′)))
⊆
in(X, rel : rngselect (Rel, Attr1, V1′, V2)) ∩ in(X, rel : rngselect (Rel, Attr2, V3, V4′))
Rel =Rel′ ∧ Attr1 =Attr1′ ∧ Attr2 =Attr2′ ∧ V1 ≤V1′
∧ V2 ≤V2′ ∧ V3 ≤V3′ ∧ V4 ≤V4′ ∧ V1′ ≤V2 ∧ V3′ ≤V4 =⇒
(in(X, rel : rngselect (Attr1, V1, V2)) ∩ in(Y, rel : rngselect (Rel, Attr2, V3, V4))) ∪
(in(Z, rel : rngselect (Rel′, Attr1′, V1′, V2′)) ∩ in(W, rel : rngselect (Rel, Attr2, V3′, V4′)))
⊆
in(X′, rel : rngselect (Rel, Attr1, V1, V2′)) ∩ in(Y′, rel : rngselect (Rel, Attr2, V3, V4′))
Rel =Rel′ ∧ Attr1 =Attr1′ ∧ Attr2 =Attr2′ ∧ V1≤V1′ ∧
V2 ≤V2′ ∧ V3′ ≤V3 ∧ V4′ ≤V4 ∧ V1′ ≤V2 ∧ V3 ≤V4′ =⇒
(in(X, rel : rngselect (Rel, Attr1, V1, V2)) ∩ in(Y, rel : rngselect (Rel, Attr2, V3, V4))) ∪
(in(Z, rel : rngselect (Rel′, Attr1′, V1′, V2′)) ∩ in(W, rel : rngselect (Rel, Attr2, V3′, V4′)))
⊆
in(X′, rel : rngselect (Rel, Attr1, V1, V2′)) ∩ in(Y′, rel : rngselect (Rel, Attr2, V3′, V4))
Rel =Rel′ ∧ Attr1 =Attr1′ ∧ Attr2 =Attr2′ ∧ V1′ ≤V1 ∧
V2′ ≤V2 ∧ V3′ ≤V3 ∧ V4′ ≤V4 ∧ V1 ≤V2′ ∧ V3 ≤V4′ =⇒
(in(X, rel : rngselect (Rel, Attr1, V1, V2)) ∩ in(Y, rel : rngselect (Rel, Attr2, V3, V4))) ∪
(in(Z, rel : rngselect (Rel′, Attr1′, V1′, V2′)) ∩ in(W, rel : rngselect (Rel, Attr2, V3′, V4′)))
in(X′, rel : rngselect (Rel, Attr1, V1′, V2)) ∩ in(Y′, rel : rngselect (Rel, Attr2, V3′, V4))
⊆
Table 10.
Invariants for the relational domain (2)
|
1509.08088 | 1 | 1509 | 2015-09-27T11:56:00 | Approximation and Heuristic Algorithms for Probabilistic Physical Search on General Graphs | [
"cs.MA",
"cs.AI"
] | We consider an agent seeking to obtain an item, potentially available at different locations in a physical environment. The traveling costs between locations are known in advance, but there is only probabilistic knowledge regarding the possible prices of the item at any given location. Given such a setting, the problem is to find a plan that maximizes the probability of acquiring the good while minimizing both travel and purchase costs. Sample applications include agents in search-and-rescue or exploration missions, e.g., a rover on Mars seeking to mine a specific mineral. These probabilistic physical search problems have been previously studied, but we present the first approximation and heuristic algorithms for solving such problems on general graphs. We establish an interesting connection between these problems and classical graph-search problems, which led us to provide the approximation algorithms and hardness of approximation results for our settings. We further suggest several heuristics for practical use, and demonstrate their effectiveness with simulation on real graph structure and synthetic graphs. | cs.MA | cs |
Approximation and Heuristic Algorithms for
Probabilistic Physical Search on General Graphs
Noam Hazon
[email protected]
Mira Gonen
[email protected]
Max Kleb
[email protected]
Department of Computer Science and Mathematics
Ariel University, Israel
July 2, 2021
Abstract
We consider an agent seeking to obtain an item, potentially available at differ-
ent locations in a physical environment. The traveling costs between locations are
known in advance, but there is only probabilistic knowledge regarding the possible
prices of the item at any given location. Given such a setting, the problem is to find
a plan that maximizes the probability of acquiring the good while minimizing both
travel and purchase costs. Sample applications include agents in search-and-rescue
or exploration missions, e.g., a rover on Mars seeking to mine a specific mineral.
These probabilistic physical search problems have been previously studied, but we
present the first approximation and heuristic algorithms for solving such problems
on general graphs. We establish an interesting connection between these problems
and classical graph-search problems, which led us to provide the approximation
algorithms and hardness of approximation results for our settings. We further sug-
gest several heuristics for practical use, and demonstrate their effectiveness with
simulation on real graph structure and synthetic graphs.
Introduction
An autonomous intelligent agent often needs to explore its environment and choose
among different available alternatives. In many physical environments the exploration
is costly, and the agent also faces uncertainty regarding the price of the possible al-
ternatives. For example, consider a traveling purchaser seeking to obtain an item [12].
While there may be prior knowledge regarding candidate stores (e.g., based on search
history), the actual price at any given site may only be determined upon reaching the
site. In another domain, consider a Rover robot seeking to mine a certain mineral on
the face of Mars. While there may be prior knowledge regarding candidate mining sites
1
(e.g., based on satellite images), the actual cost associated with the mining at any given
location, e.g., in terms of battery consumption, may depend on the exact conditions at
each site (e.g., soil type, terrain, etc.), and hence are fully known only upon reaching
the site.
These scenarios are referred to as probabilistic physical search problems, since
there is a prior probabilistic knowledge regarding the price of the possible alternatives
at each site, and traveling for the purpose of observing a price typically entails a cost.
Furthermore, exploration and obtaining the item results in the expenditure of the same
type of resource. The purchaser's money is used not only to obtain the item but also
for traveling from one potential store to another; the robot's battery is used not only for
mining the mineral but also for traveling from one potential location to another. Thus,
the agent needs to carefully plan its exploration and balance its use of the available
budget between the exploration cost and the purchasing cost.
This paper focuses on the development of efficient exploration strategies for prob-
abilistic physical search problems on graphs. The analysis of such problems was ini-
tiated by [1, 10], who showed that it is (computationally) hard to find the optimal
solution on general graphs. Accordingly, they provide a thorough analysis of physi-
cal search problems on one-dimensional path graphs, both for single and multi-agent
settings However, many real-world physical environments may only be represented by
two-dimensional graphs. For example, the Mars rover can freely move directly from
any possible mining location to another (with an associated travel cost), while in path
graphs the robot is restricted to move only to the two adjacent neighbors of its cur-
rent location. Our work thus handles probabilistic physical search problems on general
graphs. To the best of our knowledge, our is the first to do this.
We consider two variants of the problem. The first variant, coined Max-Probability,
considers an agent that is given an initial budget for the task (which it cannot exceed)
and needs to act in a way that maximizes the probability it will complete its task (e.g.,
reach at least one opportunity with a budget large enough to successfully buy the prod-
uct). In the second variant, coined Min-Budget, we are required to guarantee some pre-
determined success probability, and the goal is to minimize the initial budget necessary
in order to achieve the said success probability.
Since previous work showed that probabilistic physical search problems are hard
on general graphs, we either need to consider approximations with guaranteed bounds
or heuristics with practical running time. We do both. We first establish an interesting
connection between Max-Probability and the Deadline-TSP problems [4], and as a
result we are able to provide an Oplog nq approximation for the former, based on an
Oplog nq approximation for the latter, with the only requirement that the probabilities
are not too small. We then show a 5 ` approximation, for every ą 0, for the
special case of Min-Budget with equal purchasing costs, equal single probabilities, and
a hardness of approximation within a ratio of 1.003553 for the general Min-Budget
problem. We then consider heuristics for practical use. We suggest two families of
heuristics, linear-time and exponential-time heuristics. We evaluate the performance
of our heuristics through simulations on graphs extracted from a real network and on
synthetic graphs. We found that our no-backtrack branch-and-bound algorithm is able
to efficiently solve very large instances while producing solutions that are very close
to optimal, even though it has a theoretical exponential worst-case running time. Our
2
ant-colony based heuristic, which has a linear worst-case running time, does not lag
much behind.
Related Work
Models of search processes with prior probabilistic knowledge have been studied ex-
tensively in the economic literature [16, 11]. However, these economic-based search
models assume that the cost associated with observing a given opportunity is station-
ary, i.e., does not change along the search process. In our settings the agent is operated
in a physical environment. That is, the distances to other sites depends on the agent's
position, and thus when the agent travels to explore other sites the cost of traveling to
other sites changes.
Changing search costs has been considered in the computer science domain tradi-
tionally in the contexts of the Prize-Collecting Traveling Salesman problem [3] and its
variants. These problems, while related, fundamentally differ from our model in that
the traveling budget and the prizes in these models are distinct, with different curren-
cies. Thus, expending the travel budget does not, and cannot affect the prize collected
at a node. In our work, in contrast, traveling and buying use the same resource (e.g.
battery power). The Deadline-TSP [4] problem, which is a generalization of the Orien-
teering problem [15], is much more relevant to our settings, and in the next section we
establish a connection between the Max-Probability and the Deadline-TSP problems.
The work most related to ours is the work of [10], who introduced the probabilis-
tic physical search problems and provided a comprehensive analysis of the problems
on one-dimensional path graphs, both for single [1] and multi-agent settings [9]. Re-
cently, [6] presented an MILP formulation and a branch-and-bound optimal algorithm
for general graphs, which work only if the graph is complete. In a different paper, [7]
investigate the minimal number of agents required to solve Max-Probability and Min-
Budget problems on a path and in a 2-dimensional Euclidean space.
From a broader perspective, our search problems relate to planning, scheduling
and path planning with uncertainty. We refer the reader to [10] for a comprehensive
overview of relevant works and how they relate to probabilistic physical search.
Preliminaries
We are given a graph G " pV, Eq, whose vertices represent the sites where an item
is available (i.e. stores) and the edges represent the connections between the sites. We
are also given a weight function w on the edges w : E Ñ R`, which determines the
travel costs between any two sites. W.l.o.g. (without loss of generality) we assume that
the agent's initial location is at one of the sites, denoted by v1, and the item cannot
be obtained at this site. The cost of obtaining the item at each site v P V is a random
variable Cv with an associated probability mass function pvpciq for 1 ď i ď k, which
gives the probability that obtaining the item will cost ci at site v. For ease of notation,
we assume that all sites have k cost values (if a site v has fewer cost values then we
can add arbitrary cost values ci with pvpciq " 0). Hence, with a probability of 1 ´
3
ř
k
i"1 pvpciq the item cannot be obtained at a given site v. Note that the actual cost at
any site is only revealed once the agent reaches the site.
The total cost for the agent includes both the traveling cost and the cost of obtaining
the item. The agent travels along a path P " xv1, . . . , v(cid:96)y where pvi, vi`1q P E, which
is an ordered multiset of vertices. That is, vi P P represents the i-th vertex of the path,
and thus it is possible that for i ‰ j, vi " vj. Notice that we allow the agent to visit a
site v multiple times if needed. However, the probability pvpciq of obtaining the item
ř
at cost ci will be counted only once - specifically, the first time the agent reaches v
with a remaining budget of at least ci. The cost of traveling a path P " xv1, . . . , v(cid:96)y is
(cid:96)´1
i"1 wpvi, vi`1q, hereafter denoted wP. Given these inputs, the goal is to find a path
that maximizes the probability of obtaining the item, while minimizing the necessary
budget. The standard approach in such multi-criterion optimization problems is to op-
timize one of the objectives while bounding the other. In our case, we get two concrete
problem formulations (following [10]):
1. Max-Probability: given a total initial budget B, maximize the probability of ob-
taining the item.
2. Min-Budget: given a success probability psucc, minimize the budget needed to
guarantee the item will be obtained with a probability of at least psucc.
Max-Probability
In this section we provide an Oplog nq approximation algorithm for the Max-probability
problem, when the probabilities are not too small. We first consider a restricted case of
the Max-Probability problem, and then we show how to extend our analysis to the gen-
eral case. Our algorithm is built on the approximation algorithm of [4] for the Deadline-
TSP problem that they defined as follows:
Definition 1 Given a weighted graph G " pV, Eq on n nodes, with a start node r, a
prize function π : V Ñ Z`, deadlines D : V Ñ Z`, and a length function (cid:96) : E Ñ
Z`, find a path starting at r that maximizes the total prize, where a path starting at r
collects the prize πpvq at node v if it reaches v before Dpvq.
If P is a path found by an algorithm for the Deadline-TSP,let V pPq denote the set of
nodes visited by P before their deadline.
The case of single probabilities
We begin by providing an approximation algorithm for the case where k " 1. That is,
in each site either the item can be obtained at a given cost with a given probability, or
not available at all. We abuse the notation and use cv to denote the (single) cost of the
item at site v, and pv to denote the probability of obtaining the item there.
Our goal is to maximize the probability of success using a given budget. That is, the
probability that the agent will be able to succeed in at least one site, and that the total
cost is at most the given budget B. We may also phrase our objective as minimizing the
4
failure probability. Formally, we would like to find a path P " xv1, . . . , v(cid:96)y with a set
of vertices V pPq Ď P such that:
ř
• wP ď B.
• For all vj P Pztv1u, if vj P V pPq then B ´
j´1
vj R V pPq then B ´
i"1 wpvi, vi`1q ă cv.
ś
• For all vi " vj P P, if i ă j and vi P V pPq, it holds that vj R V pPq.
vPV pPqp1 ´ pvq is minimal.
•
ř
j´1
i"1 wpvi, vi`1q ě cv and if
However,
ź
arg minP t
vPV pPq
arg minP tlogp
ÿ
arg maxP t´ logp
arg maxP t
ź
p1 ´ pvqu "
ź
p1 ´ pvqqu "
vPV pPq
p1 ´ pvqqu "
(1)
vPV pPq
vPV pPq
´ logp1 ´ pvqu
ř
vPV pPq ´ logp1 ´ pvq is maximal. Since
Therefore it is suffice to find a path such that
we represent our objective as an optimization over summation we can convert every
instance of our problem into an instance of the Deadline-TSP problem and run the
approximation algorithm of [4]. This is not straightforward, since the Deadline-TSP is
defined over prizes from Z` but due to our conversion the prizes will not be necessarily
integers 1. Lemma 1 shows that we can overcome this challenge, if we bound the size
of the prizes by any small constant.
Lemma 1 If there is an r-approximation algorithm for the Deadline-TSP problem
where the prizes are integers, then there is an Oprq-approximation algorithm for the
Deadline-TSP problem where the prizes are not necessarily integers, but there is a
lower bound of 1{c on these prizes, for any constant c larger than 0.
Proof. Given an instance with prizes πpvq for every vertex v, that are not necessarily
integers, let π1pvq " tπpvqu if πpvq ě 1, and 1 otherwise. Let OP T be the value of
the optimal solution with the original prizes and POPT an optimal path. OP T 1 and
POPT 1 are similarly defined with the scaled prizes π1pvq. Then,
ÿ
ÿ
ÿ
vPV pPOPT 1q
vPV pPOPT q
OP T 1 "
ě
π1pvq ě
πpvq
2
vPV pPOPT q
" 1
2
OP T.
π1pvq
(2)
1Although the lengths of edges in the Deadline-TSP problem are integers, and in the Max-Probability
problem they are not necessarily so, we note that they do not play any role in the optimization process.
5
The last inequality is true since π1pvq ě 1, thus by rounding we lose at most a factor of
2. Now, suppose we have an r-approximation algorithm for the Deadline-TSP problem
that uses rounded integer prizes. Let Alg1 be the total prize collected by this algorithm
r OP T 1. If we use the
and PAlg1 the path returned by this algorithm. Clearly, Alg1 ě 1
path PAlg1 with the non-rounded prizes we will collect a different total prize, denoted
Alg. If c ď 1 then no prize has been rounded up, and according to Equation 2,
Alg ě Alg1 ě 1
r
OP T 1 ě 1
2r
(3)
If c ą 1 then in the rounding process each prize of a node in V pPAlg1q is increased by
at most 1 ´ 1{c, so it holds that
OP T.
Alg ě Alg1 ´ V pPAlg1q p1 ´ 1{cq
ě Alg1 ´ Alg1 p1 ´ 1{cq " Alg1 1{c
ě 1
r
OP T 1 ě 1
2r c
OP T.
1
c
Therefore, the lemma immediately follows.
(4)
l
We are now ready to present the details of our conversion and show how it guaran-
tees an approximation ratio of Oplog nq. The idea is that the probabilities correspond
to prizes and the costs correspond to deadlines, but the challenge here is to keep the
same approximation ratio.
Theorem 1 The Max-Probability problem for the case of single probabilities can be
approximated within a ratio of Oplog nq, for any instance of the problem for which it
holds that pv ě 1{c for each probability pv, where c is any constant larger than 1.
Proof. Given an instance of the Max-Probability in which p ě 1{c for every proba-
bility p, we construct an instance of Deadline-TSP as follows. Each site of the Max-
Probability is a node of Deadline-TSP, r " v1, and the weight function w becomes the
length function (cid:96). For each site v, we set the prize at the corresponding node, πpvq, to
´ logp1´ pvq and the deadline Dpvq to B´ cv. Note that in the Deadline-TSP problem
when starting at r the time is 0, and it increases when traveling the path. However, in
the Max-Probability problem the budget, B, is maximal when starting at v1, and it de-
creases when traveling the path. Therefore, by setting Dpvq to B ´ cv we can consider
the budget already spent instead of the remaining budget. The budget already spent is
0 when starting at v1, and increases when traveling the path. When reaching a node v
in which Dpvq " B ´ cv, if the budget already spent is at most Dpvq the item can be
bought at v since the remaining budget is at least cv.
Now, we apply the approximation algorithm of [4] to the Deadline-TSP problem
with the instance described above, and we use the path returned as a solution for Max-
Probability. Obviously, p ě 1{c implies that ´ logp1´ pq ě ´ logp1´ 1{cq. For every
constant c ą 1 a constant c1 ‰ 0 exists such that ´ logp1 ´ 1{cq ě 1{c1. (For instance
take c1 " ´
logp1´1{cq). Therefore, by Lemma 1 we can use the approximation algo-
rithm of [4] even for non-integer prizes and lose only a factor of c1 in the approximation
ratio.
1
6
It remains to show that the approximation ratio is Oplog nq. Let p be the opti-
mal probability of the instance of Max-Probability problem. Let T be the optimal
total prize of the Deadline-TSP problem on the converted instance, and let P be a
path returned by an optimal algorithm for the problem. Similarly, let T apx be the to-
tal prize collected by the approximate algorithm for the Deadline-TSP problem on
the converted instance, and let P apx be the path returned by the approximation al-
ś
ř
gorithm. Finally, let papx be the probability achieved by using P apx for solving Max-
ś
Probability. According to our conversion, T "
vPV pPq ´ logp1´ pvq, and T apx "
vPV pPqp1´ pvq,
vPV pP apxq ´ logp1´ pvq. By Equation (1) we find that p " 1´
and by our construction papx " 1´
vPV pP apxqp1´ pvq. According to [4], a constant
d exists such that T {pd log nq ď T apx. To simplify notations, let r " 1{pd log nq.
Therefore,
ř
ÿ
ÿ
ź
´ logp1 ´ pvq r ď
ź
p1 ´ pvqq r ě logp
vPV pPq
ź
logp
vPV pPq
p1 ´ pvqqr ě
p
vPV pPq
vPV pP apxq
vPV pP apxq
ź
´ logp1 ´ pvq ñ
p1 ´ pvqq ñ
vPV pP apxq
p1 ´ pvq
ź
Therefore we get:
papx " 1 ´
vPV pP apxq
p1 ´ pvq ě
1 ´ p
`
r
j
We use the generalization of Newton's binom, namely p1 ` xqr "
" 1. Thus,
real r, where
" rpr´1q...pr´j`1q
1 ´ p1 ´ pqr " 1 ´
for j ą 0, and
ppqj p´1qj
8ÿ
j"0
r
j
r
0
j!
ź
`
vPV pPq
8ÿ
j"1
"
r
j
p1 ´ pvqqr " 1 ´ p1 ´ pqr.
ř8
j"0
`
r
j
xj for any
ppqj p´1qj`1 ě r p.
The last inequality is valid since the sum of two consecutive terms the p2iqth term and
7
the p2i ` 1qth term is positive:
ppq2i`1 p´1q2i`1`1
r
2i
r
ppq2i p´1q2i`1 `
" ´ 1
p2iq!
r pr ´ 1q . . . pr ´ p2i ` 1q ` 1q ppq2i`1
1
2i ` 1
r pr ´ 1q . . . pr ´ 2i ` 1q ppq2i
looooooooooooooomooooooooooooooon
r pr ´ 1q . . . pr ´ 2i ` 1q
" ppq2i
p2i ` 1q!
`
1
p2iq!
Overall, we find that, papx ě r p, as required.
ă0
„
looooooooooooooooomooooooooooooooooon
´1 ` 1
pr ´ 2iq p
2i ` 1
ă0
ą 0
l
i
k
ř
General Case
We now show how to extend our results from the previous section to provide an ap-
proximation algorithm for the general case, i.e., where the number of probabilities in
each site is not bounded. W.l.o.g. assume that in each site c1 ď c2 ď . . . ď ck. Thus,
ř
an agent that reaches a site v with a reaming budget of b will acquire the item with a
j"1 pvpcjq for i for which ci ď b ă ci`1 if i ă k, and probability of
probability of
j"1 pvpcjq if b ě ck (namely, i " k if b ě ck).
We reduce the general case to the case of single probabilities as follows. Given an
instance graph G to the (general) Max-Probability problem, we define a new graph G1
that will have a single probability in each site. For every vertex v with a probability
pvpciq of obtaining the item at a cost ci, where 1 ď i ď k, we define new vertices
u1, . . . , uk, such that in each site ui, where 2 ď i ď k, either the item can be acquired
ř
pvpciq
at a cost of ci with a probability pui "
j"1 pvpcjq, or not available at all. In u1,
1´
i´1
either the item can be acquired at a cost of c1 with a probability pu1 " pvpc1q, or not
available at all. We replace the vertex v in G1 with u1, and create edges between ui and
ui`1, for all 1 ď i ď k ´ 1, with associated weights of 0.
Therefore, an agent that reaches u1 in G1 with a remaining budget of b can travel
without any cost from u1 to uk and back to u1. For i for which ci ď b ă ci`1, or for
i " k if b ě ck, the probability of failure from this travel is as follows:
¸
1 ´ pvpc2q
" 1 ´ iÿ
1 ´ pvpc1q
ř
pvpciq
i´1
j"1 pvpcjq
p1 ´ pu1q . . . p1 ´ puiq " p1 ´ pvpc1qq
1 ´
pvpcjq,
. . .
1 ´
j"1
which is the same probability of failure of an agent that reaches the corresponding site
v in G with a reaming budget of b. Therefore, the Max-Probability problem on G can
8
be approximated using the approximation algorithm from the previous section on G1.
Since G1 has k n nodes, we conclude:
Theorem 2 The Max-Probability problem can be approximated within a ratio of Oplog n`
ř
pvpciq
log kq, for any instance of the problem for which it holds that
j"1 pvpcjq ě 1{c
1´
i´1
for every vertex v and any cost ci P Cv, where c is any constant larger than 1.
For k " Opnq the Max-Probability problem can be approximated within a ratio of
Oplog nq, for the same instances.
Min-Budget
Although Min-Budget is the dual of Max-Probability and their decision versions are the
same, it seems that Min-Budget is much harder to approximate on general graphs. In-
deed, converting the Min-Budget problem to the dual of the Deadline-TSP is hopeless;
we have a proof that unlike the Deadline-TSP problem, the dual of the Deadline-TSP
problem is hard to approximate within a factor of c log n, for any constant c. We thus
consider restricted instances. We show that the Min-Budget problem with a specific in-
stance of equal vertex costs and equal single probabilities can be approximated within
a ratio of 5 ` for any ą 0. The idea is to run the 2 ` approximation algorithm
of [14] for the rooted k-MST problem and then travel along the tree. The rooted k-MST
problem, that was shown to be NP-hard [13], is as follows:
Definition 2 Given a graph G " pV, Eq on n nodes with a root node r, nonnegative
edge weights, and a specified number k, find a tree of minimum weight that includes r,
which spans at least k nodes other than r.
Theorem 3 The Min-Budget problem with a specific instance of equal vertex costs and
equal single probabilities can be approximated within a ratio of 5 ` for any ą 0.
Proof. Given an instance of Min-Budget, we define an instance for the rooted k-MST
problem, where r " v1 and,
R
V
k "
logp1 ´ psuccq
logp1 ´ pq
.
(5)
We then run the approximation algorithm of [14] and return the path received by trav-
eling along the tree of [14]. The initial budget is set to c plus twice the tree's cost.
Obviously, the path returned by the algorithm meets all the constraints of the minimum
budget problem: if the tree spans k vertices then since k ě logp1´psuccq
, it holds that
logp1´pq
logp1 ´ psuccq ě k logp1 ´ pq, thus the probability that the algorithm will succeed is
at least 1 ´ p1 ´ pqk ě psucc. Moreover, since we add c to the budget, the item can be
bought at every node in the returned path.
Now, let M apx be the value returned by the approximation algorithm of [14] for the
rooted k-MST problem and let M be the optimum value of the rooted k-MST problem.
Similarly, let Bapx be the budget required by the above approximation algorithm for
9
the Min-Budget problem, and let B be the minimal budget for the instance of the
Min-Budget problem. Thus
Bapx " 2 M apx ` c ď 2 p2 ` q M ` c
ď 2 p2 ` q B ` c ď p5 ` 2q B.
(6)
l
On the other hand, we show that the Min-Budget problem is hard to approximate
within a factor of α " 1.003553. We do so by using the hardness of approximation of
the Min-Excess-Path problem proven in [5]. The excess of a path is defines as follows:
Definition 3 Given a graph G " pV, Eq on n nodes with a root node s and an end
node t, nonnegative edge weights, nonnegative prizes for each vertex, and a quota Q,
the excess of a path is the difference between the length of an s ´ t path that collects
prizes of at least Q, and the length of the shortest path between s and t.
That is, any path must spend a minimum amount of time equal to the shortest distance
between s and t, only to reach the destination t; the excess of the path is the extra
time it spent to gather prizes along the way. The Min-Excess-Path problem is to find
a minimum-excess path from s to t collecting prizes of at least Q, and [5] show that
the Min-Excess-Path problem is NP-hard to approximate to within a factor of β "
220{219.
Theorem 4 The Min-Budget problem is hard to approximate within a ratio of α "
1.003553.
Proof. We reduce the Min-Excess-Path problem to the Min-Budget problem. To do so
we use the hard instance of the Min-Excess-Path problem described in [5] as follows.
Let G " pV, Eq be a complete graph on n nodes, with edge weights in the set t1, 2u,
let r be both the starting node and ending node. and let n be the desired quota. W.o.l.g.
assume that n ě 1000. Given the above instance of the Min-Excess-Path problem we
define an instance for the Min-Budget problem using the same graph, v1 " r, and
in each vertex there is a single cost of 1 with a constant probability p. In addition,
let psucc " 1 ´ p1 ´ pqn. Now, assume that there is an approximation algorithm for
the Min-Budget problem with an α ratio. We show that this implies an approximation
algorithm for the Min-Excess-Path problem with a β ratio, thus contradicting [5]. Let
AB be an α-approximation of the Min-Budget problem. Then run AB on the instance
defined above. Let s be the ending node of the path returned by this algorithm. Then
take the path returned by this algorithm, and add edge ps, rq to the path, and its weight
to the path's cost. The resulting cycle is a solution for the Min-Excess-Path problem.
We now analyze the approximation ratio of this algorithm. Let AEX be the value of the
path returned by the above algorithm to the Min-Excess-Path problem, OB the optimal
value of the Min-Budget problem for the defined instance, and OEXpu, tq the optimal
value of the Min-Excess-Path problem starting at u and ending at t. Let t be the ending
10
node of an optimal Min-Budget solution. Then,
AEXpr, rq
ď
AEXpr, sq ď AB ´ dpr, sq ´ 1
ď
α OB ´ dpr, sq ´ 1
ď
αpdpr, tq ` OEXpr, tq ` 1q ´ dpr, sq ´ 1
ďpq αpdpr, tq ` OEXpr, rq ` 1q ´ dpr, sq ´ 1
ď
α OEXpr, rq ` α 3 ´ 2.
(7)
Notice that OEXpr, rq ě n ´ 2. This is true since a path has to traverse all the nodes
in order to collect enough prizes, each edge is of a length of at least 1, and the shortest
path between the last vertex in which the quota is met and r is at most 2. Thus we get
that
3 α ´ 2 " 3 α ´ 2
n ´ 2
ď 3 α ´ 2
n ´ 2
pn ´ 2q
OEXpr, rq ď β OEXpr, rq.
(8)
(The last inequality is valid since n ě 1000, so 1 ă α ď βpn´2q`2
). This contradicts
the fact that the Min-Excess-Path problem cannot be approximated within a ratio of
β [5].
Proof of (*): Notice that OEX " minwtOEXpr, wqu, since there is a node on the
cycle going through r in which all the needed prizes were already collected. If node
w for which the minimal value is received is not t (=the last vertex on the path of the
above optimal value of the Min Budget) then we can take the path from r to w and get
n`1
AB " OEXpr, wq ` dpr, wq ` 1
ă OEXpr, tq ` dpr, wq ` 1
ď OEXpr, tq ` 3 " OB ´ dpr, tq ´ 1 ` 3
" OB ´ dpr, tq ` 2 ď QB ` 1.
(9)
This implies that AB ď OB, so we can attain an optimal solution of the Min-Budget
that returns a path for which w is the last vertex. Thus we can assume w.o.l.g. that
OEXpr, rq " OEXpr, tq.
l
Heuristics and Experimental Analysis
Our theoretical results in the previous section led us to consider heuristics for practi-
cal use. In this section we propose several heuristics and experimentally evaluate them
against the optimal solution. We concentrate on the Min-Budget problem, and the same
ideas can be used to build heuristics for the Max-Probability problem (the implemen-
tation is even simpler). Indeed, we tested the heuristics for Max-Probability, and even
the simplest greedy heuristic almost always achieved a probability that was very close
to the optimal probability.
11
We use the following notations. Let P be the path that the agent traversed hitherto,
P " xv1, . . . , v(cid:96)y. That is, v(cid:96) is the site where the agent is currently located. Let NP be
the set of all neighbors of sites in P, that is NP " tvu P P,pu, vq P Eu. If v P NP,
v be the total weight of the shortest path from v(cid:96) to v that uses only sites from P.
let wP
We tested the following methods:
i
• Optimal. In the cases where it was computationally feasible to do so, we ex-
haustively evaluated every possible path with several budgets, in order to find
the real optimal solution as a comparison. We implemented a branch-and-bound
algorithm, that is based on the algorithm of [6], to reduce the running time.
ř
• Greedy. Let the score of a site v P NP and a cost ci P Cv be SpP, v, ciq "
j"1 pvpcjq
. In each iteration, the heuristic locally chooses the next best site and
v ci
wP
the best cost there: arg maxvPNP arg maxciPCv SpP, v, ciq. That is, the heuristic
chooses the site that has the maximal success probability to cost ratio, over all
possible probabilities and costs. The heuristic then increases the initial budget
so that the agent will be able to travel to the chosen site and obtain the item at
v ci instead of
the chosen cost. Note that the heuristic calculates a cost of wP
v ` ci. Intuitively, it captures the "penalty" for exploring a distant site (with a
wP
high wP
v ) that will incur a high traveling cost for returning, if needed. In addition,
v `ci, and
we experimentally tested the greedy heuristic with a denominator of wP
it performed much worse.
• Ant Colony Optimization (ACO). Following the successful application of the ant
colony optimization technique for producing near-optimal solutions for the Trav-
eling Salesman problem [8] and Vehicle Routing with Time Windows problem
[2], we developed an ACO version for the Min-Budget problem, as follows. We
ran 50 iterations. In each iteration the ant chooses the next site v P NP and the
cost ci P Cv with a probability of
v is the aver-
age pheromone level of the edges in the shortest path from v(cid:96) to v that uses only
sites from P. That is, the ant randomly chooses the next site and cost, where the
probability of selection depends on the attractiveness of the site and the costs.
The pheromone level of each edge is initially set to 1, and after each iteration
it evaporates by 0.05. However, after finding a path P which is better than the
current best path, the ant updates the pheromone level of each edge pu, vq of the
path to wpu, vq V pPq{wpPq.
, where hP
SpP,v,ciqhP
vPNP ,ciPCv
ř
v
SpP,v,ciqhP
v
• Bounded-Length (BL). This heuristic is a restricted version of the optimal branch-
and-bound algorithm, which bounds the solution's length by two means. First,
the heuristic prunes any path that is longer than the length of the best solu-
tion found so far. In addition, the heuristic does not allow the agent to traverse
through an unvisited site without spending any budget there. Clearly, this re-
stricted branch-and-bound algorithm is no longer guaranteed to be optimal. How-
ever, it is expected to run faster than the optimal algorithm since the solution's
length has a major impact on the optimal algorithm's running time.
12
• No-Backtrack (NB). Another reason for the long running time of the optimal
algorithm is the backtracking phase that checks paths with repetitions, i.e., where
the agent visits the same sites more than once. This motivated us to consider a
restricted version of the optimal algorithm, where in addition to bounding the
length of solution (as in the BL heuristic) the algorithm does not backtrack and
thus only checks paths without repetitions. Unlike the other heuristic, the NB
heuristic does not necessarily find a solution for every instance.
Experimental Design and Results
For the empirical evaluation of our heuristics we used a real graph structure with the
traveling costs set as the real distance between the vertices, which we extracted from
GIS data of the highways network of the USA2. Since the original network is too large
we sampled 40 random sub-graphs, with an average number of 6325.5 vertices. An
illustration of the full graph and of one of the sampled subgraphs are depicted in Fig-
ures 1 and 2, respectively As for the costs, for each vertex we randomly generated
Figure 1: The full real graph, extracted from GIS data of the highways netowrk of the USA.
Figure 2: An example of one of the subgraphs (the yellow nodes) that we sampled from the full
netwrok.
between 1 and 5 costs to obtain the item with a non-zero probability. The costs were
2http://www.mapcruzin.com/download-mexico-canada-us-transportaton-shapefile.htm
13
generated using a normal distribution with an expectation of 2700 and a standard devi-
ation of 900 (the costs were bounded within two standard deviations from the expecta-
tion).
We began by testing the effect of the target success probability, psucc, on the per-
formance of our heuristics. We thus randomly generated probabilities for each vertex
using a normal distribution with an expectation of 0.24 and a standard deviation of
0.08. We then varied psucc between 0.7 and 0.975. The results are depicted in Figure 3,
where each point is the average over the 40 graphs. As expected, a higher target suc-
(a) Minimal required budegt.
(b) Runing time.
Figure 3: Varying the target success probability, psucc.
cess probability results in a higher minimal required budget and longer running time.
However, there was no statistically significant difference between the budget required
by the optimal and BL heuristic and NB was only a little behind. ACO was statistically
significantly better than Greedy, but ACO still required between 72-91% more budget
than NB. As for the running time, all of our heuristics were able to find solutions within
a reasonable time, but the optimal algorithm demonstrated its anticipated exponential
running time behavior in the early stages. Surprisingly, the NB heuristic was faster than
almost all the heuristics (only the greedy heuristic was faster) while still producing so-
lutions that are near-optimal. Our explanation is that the hard instances for the optimal
algorithm, when there is a need to backtrack in order to find a good solution, possibly
occur when the graph has many dead-ends, i.e., vertices with a degree of 1, or with
edges that are very costly. Since we use a real graph structure with real costs, such
vertices are rarely found.
We also wanted to test the performance of our heuristics when we decrease the
probabilities (for acquiring the item) in the vertices. We thus randomly generated prob-
abilities for each vertex using normal distributions, where we varied the expectation
between 0.3 and 0.09. The standard deviation was set to a third of the expectation, and
the target success probability was set to 0.90. As Figure 3 shows, when we decrease
the expectation, which results in smaller values of probabilities, the minimal required
budget increases. Again, BL and NB find near-optimal solutions that are statistically
significantly better than Greedy and ACO. The optimal algorithm required much longer
running time, and it is thus omitted from Figure 4b. However, BL demonstrated an ex-
ponential running time behavior when we decreased the expectation (for generating the
probabilities). We thus conclude that NB clearly is the winner, since it runs very fast
even with small probabilities and a high psucc, but still finds near-optimal solutions.
14
02000400060008000100000.70.7250.750.7750.80.8250.850.8750.90.9250.950.975Budget Target success probability GreedyACONBBLOptimal0200004000060000800001000001200000.70.7250.750.7750.80.8250.850.8750.90.9250.950.975Running Time (ms) Target success probability GreedyACONBBLOptimal(a) Minimal required budegt.
(b) Runing time.
Figure 4: Varying the expectation for generating probabilities.
Finally, we conducted experiments on synthetic, small-world graphs with 25, 000
vertices. Each vertex was connected to its 6 nearest neighbors and edges in the graphs
were randomly rewired to different vertices with a probability of 0.09. The traveling
cost on each edge was chosen uniformly between 40-1040 so that the average edge cost
will be the same as in the real graph structure setting, and the rest of the parameters
were set exactly as in the real graph structure setting. The results are depicted in Fig-
ure 5, where each point is the average over 40 randomly generated small-world graphs.
As Figure 5 shows, the performance of the heuristics is quite similar to the performance
with the real graph structure.
(a) Minimal required budegt.
Figure 5: Varying the target success probability, psucc, for small-world graphs.
(b) Runing time.
Conclusions and Future Work
This paper considers probabilistic physical search on graphs. We show a connection
between Max-Probability and the Deadline-Tsp problems, which enables the Oplog nq
approximation for Max-Probability with probabilities that are not too small. We believe
that this connection can lead to future cross-fertilization between probabilistic physi-
cal search problems and other variants of the Deadline-Tsp that have been extensively
studied. We then provide a 5 ` approximation, for every ą 0, for a special case
of Min-Budget, and a hardness of approximation within a ratio of 1.003553 for the
general Min-Budget problem. We further suggest several heuristics for practical use,
15
02000400060008000100000.30.270.240.210.180.150.120.09Budget Expectation (for generating probabilities) GreedyACONBBLOptimal01002003004005006007008000.30.270.240.210.180.150.120.09Running Time (ms) Expectation (for generating probabilities) GreedyACONBBL02000400060008000100000.70.7250.750.7750.80.8250.850.8750.90.9250.950.975Budget Target success probability GreedyACONBBLOptimal0200004000060000800001000001200000.70.7250.750.7750.80.8250.850.8750.90.9250.950.975Running Time (ms) Target success probability GreedyACONBBLOptimaland experimentally show that our no-backtrack branch-and-bound algorithm is able to
find near-optimal solutions and handles even very large instances. We conjuncture that
even NB will have an exponential running time when it will encounter specific graphs
with many dead-ends and very small probabilities. However, it is possible that there
are no such graphs that represent real problem instances. In addition, it is possible
that Greedy and ACO heuristics will be able to handle such settings adequately, due
to their almost constant running time. An important future direction is thus to explore
the hardness landscape of our problems, in order to derive better insights as to which
heuristic to use when. We also see great importance in extending the single-agent anal-
ysis to multi-agent settings. Finally, providing a tighter gap between the approximation
and hardness of approximation results for the Min-Budget problem remains an open
challenge.
References
[1] Y. Aumann, N. Hazon, S. Kraus, and D. Sarne. Physical search problems applying
economic search models. In Proceedings of the Twenty-Third AAAI Conference
on Artificial Intelligence (AAAI-2008), pages 9 -- 16, 2008. 2, 3
[2] A. Bachem, W. Hochstttler, and M. Malich. The simulated trading heuristic for
solving vehicle routing problems. Discrete Applied Mathematics, 65(1 -- 3):47 -- 72,
1996. 12
[3] E. Balas. The prize collecting traveling salesman problem. Networks, 19:621 --
636, 1989. 3
[4] N. Bansal, A. Blum, S. Chawla, and A. Meyerson. Approximation algorithms
for deadline-tsp and vehicle routing with time-windows. In Proceedings of the
Thirty-Sixth Annual ACM Symposium on Theory of Computing (STOC-2004),
pages 166 -- 174, 2004. 2, 3, 4, 5, 6, 7
[5] A. Blum, S. Chawla, D. R. Karger, T. Lane, A. Meyerson, and M. Minkoff. Ap-
proximation algorithms for orienteering and discounted-reward tsp. SIAM Jour-
nal on Computing, 37(2):653 -- 670, 2007. 10, 11
[6] D. Brown, J. Hudack, and B. Banerjee. Algorithms for stochastic physical search
on general graphs. In Workshops at the Twenty-Ninth AAAI Conference on Artifi-
cial Intelligence, 2015. 3, 12
[7] D. Brown, S. Loscalzo, and N. Gemelli.
k-agent sufficiency for multiagent
stochastic physical search problems. In Proceedings of the 4th International Con-
ference on Algorithmic Decision Theory (ADT-15), pages 171 -- 186, 2015. 3
[8] Marco Dorigo, Vittorio Maniezzo, and Alberto Colorni. Ant system: optimization
IEEE Transactions on Systems, Man, and
by a colony of cooperating agents.
Cybernetics, Part B, 26(1):29 -- 41, 1996. 12
16
[9] N. Hazon, Y. Aumann, and S. Kraus. Collaborative multi agent physical search
In Proceedings of the Twenty-first International
with probabilistic knowledge.
Joint Conference on Artificial Intelligence (IJCAI-2009), pages 164 -- 167, 2009. 3
[10] N. Hazon, Y. Aumann, S. Kraus, and D. Sarne. Physical search problems with
probabilistic knowledge. Artificial Intelligence, 196:26 -- 52, 2013. 2, 3, 4
[11] J. McMillan and M. Rothschild. Search. In R. Aumann and S. Amsterdam, edi-
tors, Handbook of Game Theory with Economic Applications, chapter 27, pages
905 -- 927. Elsevier, 1994. 3
[12] T. Ramesh. Traveling purchaser problem. Opsearch, 18:78 -- 91, 1981. 1
[13] R. Ravi, R. Sundaram, M. V. Marathe, D. J. Rosenkrantz, and S. S. Ravi. Span-
ning trees short or small. In Proceedings of the fifth annual ACM-SIAM sympo-
sium on Discrete algorithms SODA '94, pages 546 -- 555, 1994. 9
[14] S.Arora and G.Karakostas. A 2 ` approximation algorithm for the k-mst prob-
lem. In Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Al-
gorithms, pages 754 -- 759, 2000. 9
[15] T. Tsiligirides. Heuristic methods applied to orienteering. Journal of the Opera-
tional Research Society, 35(9):797 -- 809, 1984. 3
[16] Martin L Weitzman. Optimal search for the best alternative. Econometrica,
47(3):641 -- 54, May 1979. 3
17
|
1607.03340 | 1 | 1607 | 2016-07-12T13:01:12 | Real-time Rescheduling in Distributed Railway Network: An Agent-Based Approach | [
"cs.MA"
] | This paper addresses the issues concerning the rescheduling of a static timetable in case of a disaster encountered in a large and complex railway network system. The proposed approach tries to modify the schedule so as to minimise the overall delay of trains. This is achieved by representing the rescheduling problem in the form of a Petri-Net and the highly uncertain disaster recovery times in such a model is handled as Markov Decision Processes (MDP ). For solving the rescheduling problem, a istributed Constraint Optimisation (DCOP ) based strategy involving the use of autonomous agents is used to generate the desired schedule. The proposed approach is evaluated on the actual schedule of the Eastern Railways, India by constructing vari- ous disaster scenarios using the Java Agent DEvelopment Framework (JADE). When compared to the existing approaches, the proposed framework substantially reduces the delay of trains after rescheduling. | cs.MA | cs |
Real-time Rescheduling in Distributed Railway Network: An
Agent-Based Approach
Poulami Dalapati1,B, Piyush Agarwal1, Animesh Dutta1, Swapan Bhattacharya2
1Dept of Information Technology, National Institute of Technology Durgapur, India
2Dept of Computer Science and Engineering, Jadavpur University, Kolkata, India
BE-mail: [email protected]
Abstract: This paper addresses the issues concerning the rescheduling of a static timetable in case
of a disaster encountered in a large and complex railway network system. The proposed approach
tries to modify the schedule so as to minimise the overall delay of trains. This is achieved by
representing the rescheduling problem in the form of a Petri-Net and the highly uncertain dis-
aster recovery times in such a model is handled as Markov Decision Processes (M DP ). For
solving the rescheduling problem, a Distributed Constraint Optimisation (DCOP ) based strategy
involving the use of autonomous agents is used to generate the desired schedule. The proposed
approach is evaluated on the actual schedule of the Eastern Railways, India by constructing vari-
ous disaster scenarios using the Java Agent DEvelopment Framework (JADE). When compared
to the existing approaches, the proposed framework substantially reduces the delay of trains after
rescheduling.
1 Introduction
The railway system is a major mode of transport which is geographically distributed throughout the
country [1]. The construction of schedules for trains in such system [2 -- 6] in an efficient and opti-
mised manner is a challenging task with considerations like situational complexity of the network
and the enormous constraints that have to be handled. Some of these constraints are availability of
tracks between stations and availability of platforms on those stations, which influence the arrival
and departure time of trains. Moreover, any disruption in railway network [1, 7] due to natural
calamities, sabotage, temporary platform blockage and accident on track(s) or platform make the
offline schedule sub-optimal for use. Affected trains need to be rescheduled dynamically to min-
imise the impact of such disruptions. Where not only the objective function changes over time
but the constraints can also transform [8, 9]. This uncertainty and dynamic constraints make the
global optima less effective. Therefore, the entire scheduling problem is considered as an agent
based Distributed constraint optimization problem (DCOP) [10, 11], where all agents cooperate
with each other using commonly agreed protocols and constraints. The uncertainty of recovery
time and its probabilistic nature is represented mathematically in terms of Markov decision pro-
cesses (MDP) [12 -- 14]. Here, each node is considered as a possible state of disaster scenario in
railway network. The state transition functions are mapped to the constraints of DCOP, where each
agent chooses its action to minimise its expected delay based on its policy. The action of the set of
all agents in an MDP setting is to find the optimal solution which minimises the total delay of the
railway network with the constraints in place.
1
In this paper, a framework with multiple trains, stations and tracks is considered where some of
the trains are on tracks and some others are at stations, as shown in Figure 1a. In case of a disaster,
in and around a station, the station authorities inform the neighbouring stations, the incoming and
the outgoing trains. According to the proposed approach, each train and station agent checks for
disaster recovery time and resources available to reach the destination. If the disaster recovery
time does not affect the scheduled arrival or departure time of trains, then original schedule is
maintained. Otherwise, the proposed rescheduling method, as described in section 6, is used to
generate a new dynamic schedule and trains are informed.
The rest of the paper is organised as follows: In section 2 some previous works in related do-
main are discussed. Section 3 is devoted to the description of railway network and scheduling
topology. Section 4 models the system. DCOP and MDP representations of the system are de-
picted in section 5. Disaster handling and rescheduling approach is formulated in section 6. The
simulation results are evaluated in section 7. Finally section 8 concludes the propose work with
future scope.
2 Literature Reviews
The existing approaches mainly consider line topology and network topology while rescheduling
trains under disturbance [15 -- 18]. The disturbance scenarios are modelled as certain and uncer-
tain [19] based on its recovery time. Further decision scenarios for rescheduling are classified as
retiming, rerouting or reordering [20, 21] with respect to delay management of passenger railway
services [16, 22, 23].
A rescheduling system in tuberail trains dispatching problem is proposed in [24], which focuses
on freight gross transport [19] in time, but not the delay time of passengers in railway and subway.
Here, the operation is centralised and controlled by operation support system which communicates
with all trains, turnouts and handling equipment, so that all trains are operated in global information
condition. A track-backup rescheduling approach [2] is proposed to minimise the negative effects
arising from the disturbances, which optimally assigns a backup track to each affected train, based
on original timetable, estimated recovery time, and track changing cost in line topology. In [25], a
heuristic-based mixed-integer linear programming model is proposed to tackle delay propagation
in traffic disturbances. This model is robust to its configuration provided an appropriate selection of
boosting method is performed. A rescheduling model for last trains with the consideration of train
delays caused by incidents that occurred in train operations is also discussed in [26]. Here authors
aim to minimise running-time, dwell-time (as defined in [27]), and differences between resched-
uled and original timetable and maximise average transfer redundant time. Similarly in [20], a
proactive rerouting mechanism is proposed to minimise computational overhead and congestion
where links are affected by failures. An agent based game theoretic coalition formation model is
proposed in [28] to re-optimise a railway timetable. Train rerouting on an N-track railway net-
work [21] and robust railway station planning [29] as well as optimisation in multi-train operation
in subway system [30] are also proposed to improve the robustness of rescheduling process in the
complex scenario.
Although the train rescheduling problem has been widely studied, most of the previous work
consider either a centralised approach or line topology. However, a real time railway network is
distributed in nature with dynamic entities and disruption can happen anytime. Authorities have
to take decisions on the basis of real world scenario and concurrent decisions have to be made for
efficient handling of the problem. Moreover, recovery time of such disturbances is highly uncer-
2
tain [31]. The distributed nature of the system can be effectively represented as DCOPs [10, 11]
and probabilistic decision making can be mapped with MDP [12], where the outcomes are partly
random and partly under the control of decision maker. Again, the inherent dynamic nature and
concurrent decision making can be suitably modelled using Petri-Net [32 -- 36].
In light of the discussion above, our main contributions in this paper include:
• Modelling of real-time railway system as a Petri-Net along with mathematical representation
of the scenario with DCOP and MDP to enable formal analysis.
• An agent based disaster handling and rescheduling approach is also proposed considering
network topology, which is capable of providing sufficiently good solution.
• Situational complexity of scalability issues in terms of number of decision variables and con-
straints are also taken into consideration while optimising total journey time delay of trains.
3 Railway Network and Scheduling Topology
A railway network consists of Stations (S), Trains (T ) and Tracks as shown in Figure 1a. Multiple
trains are either at stations or running on tracks at time instant t. Railway scheduling and reschedul-
ing is performed in such a way that, the highest priority train is rescheduled first. Depending on
the scenario, the priority changes dynamically reducing total journey time delay.
3.1 Assumptions
• There can be multiple tracks between two stations.
• Each station may consist of multiple platforms.
• Stations can communicate with trains and neighbouring stations.
• Trains can communicate with stations only.
• Station conveys the recovery status of the blocked tracks or platform to trains and its neigh-
bouring stations.
• All the trains begin and end their journey at stations.
3.2 Classification of Railway Parameters
3.2.1 Stations (S)
• Stations where train T is scheduled to stop.
• Stations where train T does not stop, but station is a junction.
• Stations where train T neither stops nor the station is a junction, but in case of inconvenience,
train may stop, so that other trains can pass.
So, for generalisation, dwell-time [27] is taken as a parameter. If dwell-time of train T at any
stations S is greater than zero, then S is a stopping station for T .
3
S10
T3
T1
S11
S7
S1
S9
S8
S2
S12
T3
S3
Platform 1
Platform 2
T2
T5
T1
S3
T4
T2
S3
S4
T4
S5
S6
a
Figure 1. Railway Network.
a Graphical Representation of Railway Network.
b Station with Multiple Tracks.
3.2.2 Tracks (T )
As depicted in Figure 1b,
Main Track
UP/DOWN
Platform 1
Platform 2
Platform 3
UP line
UP/DOWN
Main Track
Down line
b
• Double-line tracks between two stations, U P and DOW N.
• Only a single line between two stations, used as either U P or DOW N as per schedule.
• Three or more tracks between two stations, U P , DOW N and general tracks, used as either
U P or DOW N as per need.
For simplicity, we consider different directions of same track as two or more different tracks, i.e.
U P as one resource and DOW N as another, and rescheduling of either UP or DOWN line trains
at a time.
3.2.3 Trains
In a railway network [1], depending upon various criteria, such as speed, facilities, distance cov-
ered, public demand, frequencies etc., train T can be classified as Long-distance Train (T L) and
Short-distance Train (T S). (T L) can again be categorised as Premium Train (T P r), Mail Trains
(T M ), and Freight Train (T F ), whereas (T S) can be categorised as Passenger Train (T P ) and Lo-
cal Train (T Lo). i.e., T = T L ∪ T S, T L = T P r ∪ T M ∪ T F , T S = T P ∪ T Lo.
Except T P r, during busy schedule (i.e. office hours), T S get higher priority than any T L. Oth-
erwise, during normal hours, T L get higher priority. Again, as railway system faces delay due to
many reasons, these priorities change dynamically over time. As an example, if any T L is delayed
by more than the permissible threshold delay, then other trains get higher priority which are on
time. Priorities are assigned like, y1 = P rio (T P r), y2 = P rio (T M ), y3 = P rio (T F ),
y4 = P rio (T P ), y5 = P rio (T Lo). This priority allocation policy is defined by the existing
railway system of the region, considered in the experiments as described in subsection 7.1. In gen-
eral, y1 > y2 > y4 > y5 > y3. However when t = tBusy (from 9 : 00 am to 11 : 00 am and 5 : 00
pm to 7 : 00 pm), y1 > y4 > y5 > y2 > y3. Again, in case of delayed trains, priority changes
dynamically like, y4 ≥ y1 ≥ y5 ≥ y2 > y3.
There are two kinds of inputs in our system, static input, which is pre-planned as per the sched-
ule and dynamic input, which is triggered by the changes due to disruption. At any time instant
4
t, each station has a fixed number of incoming and outgoing tracks. Station database is updated
with the information about incoming and outgoing trains in terms of their arrival and departure
time. When a disaster occurs, one or more tracks between stations get deleted from the databases
and platform counts decreases from station databases. As railway network is represented as a con-
nected multigraph, there may be other possible paths to reach to the destination. After disaster has
occurred, system checks for the trains which may reach a particular station within the calculated
buffer time τ B.
4 Railway Architecture Model
Given this background, a Multi-agent System (MAS) [12,37] is a natural choice for modelling such
distributed system. Here, we represent the railway network (RN) as a pair of multigraph (G) and
an agency (Ag). i.e., RN = < G, Ag >. Again, G = < V, E >, where V is set of vertices and
E is set of edges. From notations in Table 1, V = {vi i ∈ [1, n]} and vi = Si means vertex is
a station, E represents tracks between stations, T = {Tj j ∈ [1, m]}, indicates trains (see Figure
1a, and Ag = {Aga a ∈ [1, q]}, denotes agency. Each station and train is associated with an agent.
SA and T A denote the set of station agents and set of train agents respectively, where Si ∈ S with
Saa ∈ SA and Tj ∈ T with T aa ∈ T A.
Table 1 Notation
Indices and Parameters
Stations
Trains
Station index
Train index
Track index
Platform index
Number of stations
Number of trains
Maximum number of platforms at each station
Arrival time of train j at station i in original timetable
Departure time of train j from station i in original
timetable
Delay of train j at station i
Delay of train j on track l
Threshold value for delay of all trains
oJ
ji
od
ji
xJ
jl
a
q
t
tD
tR
tBusy
i′ ∈ [1, n]\i
j′ ∈ [1, m]\j
Journey time of train j in original timetable
Original dwell time of train j at station Si
Journey time of train j on track l
Agent index
Number of agents, where q = m + n
Time instant
Time of disaster
Time of recovery
Busy Time Period of the day
Index of station other than the ith station.
Index of train other than the jth train.
i′′ ∈ [1, n]\i, i′
j′′ ∈ [1, m]\j, j′
τ B
Index of station other than the ith and i′th sta-
tion.
Index of train other than the jth and j′th train.
Buffer Time, where tD + τ1 ≤ τ B ≤ tD + τ2
Decision Variables
S
T
i
j
l
k
n
m
p
oAT
ji
oDT
ji
δji
δjl
δT h
xAT
ji
Pjik
Arrival time of train j at station i due to disaster
Platform indicator, Pjik = 1 if train j occupies kth
platform of station i, otherwise 0
P rio(Tj) Priority of train Tj
τ1
Minimum time required to recover from the disaster
τR
Time to recover with the density function φ(x),
where, x ∈ [τ1, τ2]
Departure time of train j from station i due to
disaster
Track indicator, Ljil = 1 if train j occupies lth
track connecting to station i, otherwise 0 and
when Ljil = 1, Lj ′il = 0
Actual operation time of train j at station Si
Maximum time required to recover from the
disaster
xDT
ji
Ljil
xd
ji
τ2
5
4.1 Petri-Net Model of Railway System
Now we introduce the general concepts of Petri-Net [32, 33] describing a railway network. Major
use of various kinds of Petri-Net [34 -- 36] is modelling of static and dynamic properties of com-
plex systems, where concurrent occurrences of events are possible, but there are constraints on the
occurrences, precedence or frequency of these occurrences. Graphically a Petri-Net is a directed
bipartite graph where nodes represent places, transition and directed arcs which link places to tran-
sitions or transitions to places. The state of a Petri-Net is given by the marking, describing the
distribution of tokens in the places. Our proposed Petri-Net model deals with dynamism, uncer-
tainty, and conflict situations in decision making choices upon different conditions. To overcome
such conflicts the idea of colour token is introduced that enables a particular condition. Agents are
considered as a token which can move from one environmental state to other. In real time system
agents perform some action if it sense a particular environment; in contradiction some states are
just used as an intermediate one. The Petri-Net model for railway network is proposed as follows:
{P, T r, F, T ok, fC, M0}
P : {P1, P2, . . . , Pb}, where b > 0 is a finite set of Places.
P = PN ∪ Pfc, where PN is the set of places where no explicit function is executed on arrival of
resource token and Pfc is the set of places which executes a function or checks condition on arrival
of resource token.
T r : {T r1, T r2, . . . , T rz}, where z > 0 is a finite set of Transitions.
T r = T rI ∪ T rc, where T rI is the set of immediate transition which is fired as soon as the required
tokens are available at input place and an action is performed. T rc is the set of colour transition
which is fired when the colour token is available in the input place.
F : (P × T r) ∪ (T r × P ) is the set of Flow Function.
F = F+ ∪ F−, where F+ refers finite set of input flow and F− refers finite set of output flow.
T ok : Set of Token.
T ok = T okc ∪ T okAg and T okc ∩ T okAg = φ, where T okc is the set of colour token, c represents
colour and T okAg is the resource token (Agent token).
fc : {fc1, fc2, . . . , fcu}, where u ≥ 0 is the set of Functions that execute in Pfc when a resource
token arrived at the place. Function can generate colour token or perform some operations.
M0 : Initial Marking of Petri-Net.
β : F+(T okc × T okAg) → F−(T okAg) or (T okc × T okAg) → T okAg
β says that colour token is only used for taking a decision to resolve conflict. It won't propa-
gate to next state.
In our Petri-Net model, shown in Figure 2, place is represented by a circle, transition by a rect-
angle, and input and output flow by arrow and the corresponding description is given in Table 2.
6
Table 2 Description of P N 1
Description of Places of P N1
Places(P)
Description
P1
P2
P3
P4
P5
P6
P7
P8
P9
P10
P11
P12
P13
P14
Trains Tj is at station Si and count waiting time to leave.
Trains Tj ′ is at station Si′ and count waiting time to leave.
Tj starts running.
Tj ′ starts running.
Tj is on track.
Tj ′ is on track.
Tj and Tj ′ both sense junction station and checks whether it has free platform.
Tj senses simple station and checks whether it has free platform.
Tj ′ senses simple station and checks whether it has free platform.
Tj has completed its journey and ready for the next journey.
Tj entering into station.
No free platform for Tj ′.
No free platform for Tj.
Tj andor Tj ′ reached to the station.
Description of Transitions of P N1
Transitions(Tr)
Description
Tr1
Tr2
Tr3
Tr4
Tr5
Tr6
Tr7
Tr8
Tr9
Tr10
Tr11
Tr12
Tr13
Tr14
Tr15
Tr16
Tr17
Tr18
Tr19
It will fire when Tj finishes its waiting time at Si.
It will fire when Tj ′ finishes its waiting time at Si.
It will fire when Tj is on track.
It will fire when Tj ′ is on track.
It will fire if Tj senses a simple station.
It will fire if Tj senses a junction station.
It will fire if Tj ′ senses a junction station.
It will fire if Tj ′ senses a simple station.
It will fire if no platform is free for Tj.
It will fire when at least one platform is free for Tj.
It will fire when at least one platform is free for Tj ′.
It will fire if no platform is free for Tj ′.
It will fire when at least one platform is free for highest priority train.
It will fire if a platform gets free for Tj.
It will fire if a platform gets free for Tj ′.
It will fire when train entering into the station.
It will fire when train leaving a junction station.
It will fire when Tj reaches its destination.
It will fire when Tj is ready to leave for a new journey.
Description of colour tokens of P N1
Colour Token(ct) Description
ct1
ct2
ct3
ct4
ct5
ct6
ct7
ct8
ct9
P5 generates it if Tj senses a simple station in front of it and enables transition Tr5.
P5 generates it if Tj senses a junction station in front of it and enables transition Tr6.
P6 generates it if Tj ′ senses a junction station in front of it and enables transition Tr7.
P6 generates it if Tj ′ senses a simple station in front of it and enables transition Tr8.
P8 generates it if no free platform is available and enables transition Tr9.
P8 generates it if at least one platform is available and Tr10 is enabled and enables transition Tr10.
P7 generates it if at least one platform is available and enables transition Tr13.
P9 generates it if at least one platform is available and Tr11 is enabled and enables transition Tr11.
P9 generates it if no free platform is available and enables transition Tr12.
7
P 2
P 1
T r2
T r1
T r18
P 10
P 4
P 3
T r19
T r4
P 6
T r17
P 11
ct4
ct3
T r3
P 5
ct2
ct1
T r8
T r7
T r13
T r6
ct8
P 9
ct9
ct7
P 7
T r16
T r5
P 8
ct5
ct6
T r12
T r9
T r11
P 12
P 13
T r10
T r15
T r14
P 14
Figure 2. Petri-Net model P N1 of Railway Network.
5 DCOP and MDP Representation of the Proposed Rescheduling Approach
5.1 Representation as DCOP
The problem of train rescheduling is represented as DCOP with four tuples, hAg, X, D, Ci, where,
Ag : Set of agents
X : Set of variables, X = {xAT
D : Set of domains, D = tD + τR
C : Set of constraints
ji ∪ Pjik ∪ Ljil }
ji ∪ xDT
5.1.1 Constraints (C)
• Continuity Constraint:
ji ≥ xDT
xAT
ji′ + xJ
jl
(1)
the arrival time of any train at any station depends on its departure time from the previous
i.e.
station and the total journey time between these stations.
• Time Delay Constraint:
(2)
xAT
ji ≥ oAT
ji − oAT
xAT
ji
ji = δj (cid:27)
i.e.
the actual arrival time of Tj at Si must be greater or equal to its original arrival time at
that station. If both are equal then the train is on time, otherwise there is some delay δj. Delay is
calculated by the difference between the original journey time and the actual journey time.
• Index of platforms that trains occupy can not be greater than p.
and
∀j ∈ [1, m] ∃ Pjik ∈ [0, 1], where 1 ≤ k ≤ p, ∀ Si
Pjik ≤ p, where 1 ≤ k ≤ p
Xk
8
(3)
(4)
• If train Tj occupies lth. track, connecting to station Si, then train Tj ′ can not occupy the same
track at the same time.
if Ljil = 1, then Lj ′il = 0
(5)
• Required resources of Tj at time t, Re(Tj)t, is either a platform at a station or a track between
two stations.
• Route of the train Tj, Rou(Tj), is a series of P and L.
Re(Tj)t = Ljil or Re(Tj)t = Pjik
Rou(Tj) = (
n−1
^i=1
PjikLjil) ∪ Pjnk, where j ∈ [1, m]
(6)
(7)
5.2 Representation as MDP
In real world, agents inhabit an environment whose state changes either because of agent's action
or due to some external event. Agents sense the state of world and the choice of new state depends
only on agent's current state and agent's action.
• Set of World State (W )
Here, W represents the set of agent's state(s) in railway network under disturbance. Train
agents can sense three kind of states. If Si is assumed to be a station where disaster happens,
then Tj is either on track connecting Si or at a platform of Si or at a platform of stationSi′,
connected to Si.
i.e. W = {(Ljil = 1), (Pjik = 1), (Pj ′i′k = 1)}
• Transition Function (Ψ)
The state transition function is denoted as Ψ(ω, C, ω′). In our proposed approach, each action
C maps to constraint(s) of DCOP to satisfy to reach from state ω to the next state ω′, where
ω, ω′ ∈ W .
If the train Tj is on the lth track, connecting to station Si, where disaster happened, i.e.
Ljil = 1, but no platform is available, i.e. Pjik = 1, then Tj must wait on the current track.
So, there is no state change from the current state Ljil = 1. Now, if platform is free, i.e.
Pjik = 0, then Tj can reach to the next station. So, state transition from current state Ljil = 1
is possible.
If Tj is on pth platform of Si and the lth track is free but the platform at the next station Si′
is not free, i.e. Pji′k′ = 1, no state change is possible from current state Pjik = 1. Similarly,
even if there is free platform at Si′, if the lth track is not free or both the track and platform is
not available at time t, no state change is possible.
In Figure 3, every node represents a state and each arc represents an action which is indeed a
constraint. The transition from one state to another state happens iff the corresponding agent
satisfies the specific constraint(s).
9
[Ljil = 1 ∧ Pji′k′ = 0]∨
[Ljil = 0 ∧ Pji′k′ = 1]∨
[Ljil = 1 ∧ Pji′k′ = 1]
Pjik
[Pjik = 0]
[Ljil = 0 ∧ Pji′k′ = 0]
[Ljil = 1 ∧ Pjik = 0]
Ljil
Pji′k′
[Pjik = 1]
[Ljil = 1 ∧ Pjik = 1]∨
[Ljil = 0 ∧ Pjik = 1]∨
[Ljil = 1 ∧ Pjik = 0]∨
Figure 3. MDP representation with set of states and transition functions.
6 Disaster Handling and Rescheduling Model
According to real-time scenario, in case of platform blockage or track blockage, disaster handling
and rescheduling model of railway system refers three situations:
• Delay or Stop at the station or on track (Retiming).
• Change in Departure Sequence of trains at the station depending on priority of trains (Reordering).
• Reschedule to alternative path (Rerouting).
6.1 Case 1: Partial Node Deletion from the graph G
A station Si faces problem due to disaster and the train Tj is on track l, approaching to the station
Si,
i.e.
Ljil = 1
(8)
6.1.1 Case 1.1
If Si has a free platform at the time when Tj reaches to Si, then the system can allow Tj to reach Si,
iff the priority of the incoming train Tj has the highest priority amongst all trains T and the resource
(Re) required for any other high priority train Tj ′′ does not hamper the resource requirement of Tj.
PjikxAT
ji
= 1, if f [P rio(Tj) > P rio(Tj ′)j6=j ′, j∈[1, m]] ∧ [Re(Tj ′′)τ B
P rio(Tj′′ )>P rio(Tj) 6= Re(Tj)τ B
]
(9)
6.1.1.1 Case 1.1.1
After satisfying the condition described in case 1.1, if all the necessary resources are available
throughout its journey, selecting any alternative path, then reroute train Tj. Route of Tj after
departure from Si at time xDT
ji
i.e.
is [Rou(Tj)t≤xDT
].
n−1
+ Rou(Tj)xAT
ji >xDT
ji
ji
if Rou(Tj)xAT
ji >xDT
ji
=
then reschedule Tj.
^i′>i
10
(Pji′kLji′l) ∪ Pjnk = 0
(10)
6.1.1.2 Case 1.1.2
If case 1.1.1 is invalid, then stop Tj at Si until recovery is done or any other alternative path
becomes free. So, Tj occupies one of the platforms at Si.
i.e.
and
where,
Pjik = 1
xDT
ji = oDT
ji + δj
δj = tR − oDT
ji and tR = tD + τR
(11)
(12)
6.1.2 Case 1.2
If the scenario does not conform with case 1.1, then stop train Tj on the current track. So, now Tj
occupies lth track.
i.e.
Ljil = 1
(13)
and
(14)
The above described scenario depicted in equations (8)-(14) is now represented in Petri-Net model
in Figure 4a and the corresponding description of respective places, transitions and tokens are
described in Table 3.
xAT
ji = oAT
ji + δj
P 6
T r7
T r6
ct1
P 1
ct2
T r1
T r2
ct3
P 2
ct4
2
2
ct5
P 3
T r3
P 4
ct6
ct7
T r4
T r5
T r8
P 5
P 7
a
M0=[1 1 0 0 0 0 0]
M0=[1 1 0 0 0 0 0]
M0=[1 1 0 0 0 0 0]
T r2
T r1
T r2
M1=[0 0 2 0 0 0 0]
M1 = 'old′
M1=[0 0 2 0 0 0 0]
(b) Firing sequence 2
T r3
M2=[0 1 0 1 0 0 0]
T r4
M3=[0 1 0 0 1 0 0]
T r6
M4=[0 1 0 0 0 1 0]
T r7
M5 = 'old′
(a) Firing sequence 1
b
T r3
M2=[0 1 0 1 0 0 0]
T r5
M3=[0 1 0 1 0 0 1]
T r8
M2=[0 1 0 1 0 0 0]
T r4
M4=[0 1 0 0 1 0 0]
T r6
M5=[0 1 0 0 0 1 0]
T r7
M6 = 'old′
(c) Firing sequence 3
Figure 4. Petri-Net P N2
a Petri-Net model P N2 of Case 1.
b Reachability tree of P N2 for different firing sequences.
Analysis of P N2:
Table 3 presents the description of the places P = {P 1, P 2, P 3, P 4, P 5, P 6, P 7} and transitions
T r = {T r1, T r2, T r3, T r4, T r5, T r6, T r7, T r8} and the initial marking is M0 = [1, 1, 0, 0, 0, 0, 0].
11
Table 3 Description of P N 2
Description of Places of P N2
Places(P)
Description
P1
P2
P3
P4
P5
P6
P7
Tj is on track l and approaching to disastrous station Si.
Tj ′ is on track l′ and approaching to disastrous station Si.
Tj and Tj ′ both approaching to same station Si.
Tj reaches to Si and is at Si.
Tj reaches its destination.
Tj completed its previous journey and started the next.
Tj is waiting for availability of resources.
Transitions(Tr)
Description
Description of Transitions of P N2
Tr1
Tr2
Tr3
Tr4
Tr5
Tr6
Tr7
Tr8
It will fire if platform is not available at Si the time of Arrival.
It will fire if platform is available at Si the time of Arrival.
It will fire if Tj gets highest priority.
It will fire if all resources are available to Continue the journey.
It will fire if all resources are not available to Continue the journey.
It will fire when Tj reaches its destination.
It will fire when Tj is ready for its new journey.
It will fire when Tj is not allowed to start its journey.
Description of colour tokens of P N2
Colour Token(ct) Description
ct1
ct2
ct3
ct4
ct5
ct6
ct7
P1 generates it when equation (8) is satisfied but Tj senses no free platform is available and enables transition Tr1.
P1 generates it when equation (8) is satisfied but Tj senses free platform is available and enables transition Tr2.
P2 generates it when equation (8) is satisfied but Tj ′ senses no free platform is available and enables transition Tr1.
P2 generates it when equation (8) is satisfied but Tj ′ senses free platform is available and enables transition Tr2.
P3 generates it to denote Tj has highest priority and enables transition Tr3.
P4 generates it Tj senses all resources are available and enables transition Tr4.
P4 generates it Tj senses all resources are available and enables transition Tr5.
• Reachability graph analysis:
Reachability graph analysis is the simplest method to analyse the behaviour of a Petri-Net. It
decides whether the system is bounded and live or not. From our resultant tree in 4b it can
be proved that: a) the reachability set R(M0) is finite, b) maximum number of tokens that a
place can have is 2, so our P N2 is 2-bounded, c) all transitions can be fired, so there are no
dead transitions.
• State equation:
The structural behaviour of the Petri-Net can be measured by using the algebraic analysis
of the incidence matrix. If marking M is reachable from initial marking M0 through the
transition sequence σ, then the following state equation holds: M 0 + [A] × Xσ = M .
Incidence matrix is defined as A = [euv], it is a rA × cA matrix where (1 ≤ u ≤ rA), (1 ≤ v ≤
cA). The order of the places in the matrix is P = {P 1, P 2, P 3, P 4, P 5, P 6, P 7}, denoted
by rows and the order of the transitions is T r = {T r1, T r2, T r3, T r4, T r5, T r6, T r7, T r8},
denoted by columns.
Xσ is an m-dimensional vector with its jth entry denoting the number of times transition tj
12
occurs in σ.
A =
0 −1
0 −1
0
0
0
0
0
1
0
0
0
0
0
1
−1
1
0
0
0
0
0
0
0
0
0
−1 −1
1
0
0
0
0
1
0
0
0
0
−1
1
0
1
0
0
0
0
−1
0
0
0
0
1
0
0
−1
Thus, if we view a marking M 0 as a k-dimensional column vector in which the ith compo-
nent is M0(pi), each column of [A] is then a k-dimensional vector such that M 0
σ−→ M .
In our system, marking M = [1, 1, 0, 0, 0, 0, 0] is reachable from initial marking M 0 =
[1, 1, 0, 0, 0, 0, 0] through the firing sequence σ1 = T r2, T r3, T r4, T r6, T r7.
M0
T r7−−→ M5(= ′old′).
T r4−−→ M3
T r6−−→ M4
T r3−−→ M2
T r2−−→ M1
0 −1
0 −1
0
0
0
0
0
1
0
0
0
0
0
1
−1
1
0
0
0
0
0
0
0
0
0
−1 −1
1
0
0
0
0
1
0
0
0
0
−1
1
0
1
0
0
0
0
−1
0
0
0
0
1
0
0
−1
1
1
0
0
0
0
0
+
0
1
1
1
0
1
1
0
×
=
1
1
0
0
0
0
0
Similarly, marking M = [1, 1, 0, 0, 0, 0, 0] is reachable from initial marking M 0 = [1, 1, 0,
0, 0, 0, 0] through the firing sequence σ2 = T r1 and σ3 = T r2, T r3, T r5, T r8, T r4, T r6, T r7.
M0
M0
T r2−−→ M1(= ′old′).
T r2−−→ M1
T r3−−→ M2
T r7−−→ M6(= ′old′).
T r5−−→ M3
T r8−−→ M2
T r4−−→ M4
T r6−−→ M5
0 −1
0 −1
0
0
0
0
0
1
0
0
0
0
0 −1
0 −1
0
0
0
0
0
1
0
0
0
0
0
1
−1
1
0
0
0
0
1
−1
1
0
0
0
0
0
0
0
0
0
−1 −1
1
0
0
0
0
0
0
0
1
0
0
0
−1 −1
1
0
0
0
0
1
0
0
0
0
−1
1
0
0
0
0
0
−1
1
0
1
0
0
0
0
−1
0
1
0
0
0
0
−1
0
1
1
0
0
0
0
0
1
1
0
0
0
0
0
+
+
−1
−1
0
0
0
1
0
0
0
0
0
1
0
0
1
0
0
0
0
0
0
0
0
1
1
1
1
1
1
1
×
×
=
=
1
1
0
0
0
0
0
1
1
0
0
0
0
0
6.2 Case 2: Partial Node Deletion from the graph G with Deletion of an Edge
Currently multiple trains are on various platforms which follow a sequence according to their
departure time within the buffer time τ B. Here, τ B is related to the disaster recovery time tR of
that station. The track is free but more than one trains are yet to come.
i.e.
and
Ljil = 0
m
(15)
(16)
As the station Si faces disaster, a particular kth platform can not be used until the recovery time has
elapsed. If there is any incoming train Tj within buffer period τ B, the system allows Tj to reach Si
Pjik ≤ (p − 1)
Xj=1
13
if a platform is available, i.e. Pjik = 0. The system also checks for the priority of Tj to reorder the
departure schedule of all trains from Si introducing delay δji to Tj, if needed.
i.e. ∀j, if P rio(Tj ′) > P rio(Tj)
ji + δji
(17)
Otherwise, if all the resources are available for Tj and it has the highest priority among all the
trains currently waiting at Si, the scheduled departure of Tj is the original departure time as per
the original railway timetable.
i.e.
ji = oDT
xDT
iff P rio(Tj) > P rio(Tj ′)j6=j ′, j∈[1, m]
ji = oDT
xDT
ji
(18)
The scenario of Case 2 with equations (15)-(18) is represented in Petri-Net model in Figure 5a
and the corresponding description of respective places, transitions and tokens are described in
Table 4.
P 2
T r1
T r2
3
ct1
T r3
P 5
2
ct3
T r5
T r4
ct2
P 6
2
P 3
P 4
P 1
2
a
Figure 5. Petri-Net P N3
a Petri-Net model P N3 of Case 2.
b Reachability tree of P N3 for different firing sequences.
M0=[2 3 0 0 0 0]
T r1
M1=[0 2 3 0 0 0]
T r2
M2=[2 2 1 0 0 0]
T r3
M3=[1 2 0 0 2 0]
T r4
M4=[1 2 0 1 1 0]
b
14
Table 4 Description of P N 3
Description of Places of P N3
Places(P)
Description
P1
P2
P3
P4
P5
P6
Trains are at Si where disaster happens and only one platform is free.
Trains are at station connecting to Si.
More than one trains are requesting for a single platform.
Highest priority train reaches to Si.
All the trains are at Si waiting to depart.
Highest priority train departs from Si.
Description of Transitions of P N3
Transitions(Tr)
Description
Tr1
Tr2
Tr3
Tr4
Tr5
Only one platform is available at Si and more than one train are approaching to Si.
One platform is available and Tj has highest priority.
All the trains are at Si and requesting for same track to depart.
Reorder the scheduled trains as per priority.
Original departure schedule maintained as highest priority train is departing first as per original schedule.
Colour Token(ct) Description
Description of colour tokens of P N3
ct1
ct2
ct3
P3 generates it to indicate that train Tj has the highest priority and enables transition Tr2.
P5 generates it when reordering in train departure is decided and enables transition Tr4.
P5 generates it if original ordering in departure schedule of trains are maintained and enables transition Tr5.
Analysis of P N3:
Table 4 presents the description of the places P = {P 1, P 2, P 3, P 4, P 5, P 6} and transitions
T r = {T r1, T r2, T r3, T r4, T r5} and the initial marking is M 0 = [2, 3, 0, 0, 0, 0].
• Reachability graph analysis:
Similarly, as discussed in subsection 6.1.2, here initial marking M0 is the root node as shown
in Figure 5b. From our resultant tree it can be proved that : a) the reachability set is R(M0)
finite, b) maximum number of tokens that a place can have is 3, so our P N3 is 3-bounded, c)
all transitions can be fired, so there are no dead transitions.
• State equation:
The order of the places in the incidence matrix A is P = {P 1, P 2, P 3, P 4, P 5, P 6}, de-
noted by rows and the order of the transitions is T r = {T r1, T r2, T r3, T r4, T r5}, denoted
by columns.
A =
−1
−1
1
0
0
0
1
0
−1
1
0
0
−1
0
0
−1
1
0
0
0
0
0
0
1
0
0
0
0
0
1
Here, marking M = [1, 2, 0, 1, 1, 0] is reachable from initial marking M 0 = [2, 3, 0, 0, 0, 0]
through the firing sequence σ1 = T r1, T r2, T r3, T r4.
M0
T r4−−→ M4.
T r3−−→ M3
T r2−−→ M2
T r1−−→ M1
15
0
3
−1
"2
0# +"−1
0
0
0
0
0
1
1
0
−1
1
0
0
−1
0
0
−1
1
0
0
0
0
0
0
1
2
1
1
0
0
0
1# ×(cid:20)1
0(cid:21) ="1
0#
0
1
1
0
1
0
6.3 Case 3: Extended Impact of Edge and Node deletion
Train Tj is neither waiting at the station Si where disaster happened, i.e. Pjik = 0 nor on the
connecting track, i.e. Ljil = 0. But Tj reaches the station Si within τ B.
6.3.1 Case 3.1
Train Tj is at station Si′′, where Si′′ is in neighbourhood of Si.
i.e.
Pji′′k = 1, Si′′ ∈ S \ Si and i ∈ [1, n]
(19)
If any platform is available at the next station and the connecting track is also free, the system
checks for the priority of the train Tj. Tj maintains its original schedule iff it has the highest prior-
ity while reaching Si.
i.e. if
(Pjik′ = 0) ∧ (Ljil = 0) ∧ (P rio(Tj)t=xAT
ji
> P rio(Tj ′)j6=j ′, j∈[1, m])
then,
xAT
ji = oAT
ji
Ljil = 1 and Pjik′t=xAT
ji
= 0
Pjik′t=xAT
ji
= 1 and Ljil = 0
(20)
(21)
(22)
(23)
Here, damaged platform is k.
k′ = {1, 2, . . . , p} \ {k}
6.3.2 Case 3.2
Train Tj is at Si′, i.e. Pji′k = 1, where, i, i′ ∈ [1, n] and i 6= i′.
There are multiple tracks between two stations Si and Si′. i.e. 1 < l ≤ 4. If the track l breaks
down due to disaster, it is assumed that track l is not free. i.e.
Lji′l = 1, 1 ≤ l < 4
(24)
Then, the trains which are scheduled to use that track face problem. In that case, first Si′ checks
for other available tracks, one of which can be allotted to Tj, provided Tj has the highest priority
satisfying all the constraints and there is no resource conflict within τ B.
[Lji′l′ = 0] ∧ [P rio(Tj)t=xDT
ji′
> P rio(Tj ′)j6=j ′, j∈[1, m]] ∧ [Re(Tj)xAT
ji
6= Re(Tj ′)xAT
ji
]
(25)
Figure 6a represents Petri-Net model for the scenario of Case 3, described in equations (19)-(25)
and the corresponding description of respective places, transitions and tokens are described in
Table 5.
16
P 1
P 2
ct1
T r1
P 5
P 3
T r2
P 4
T r3
P 6
a
M0=[2 1 0 0 1 0]
T r1
M1=[1 0 1 0 1 0]
T r2
M2=[1 0 0 1 0 0]
T r3
M3=[1 1 0 0 0 1]
b
Figure 6. Petri-Net P N4
a Petri-Net model P N4 of Case 3.
b Reachability tree of P N4 for different firing sequences.
Table 5 Description of P N 4
Description of Places of P N4
Places(P)
Description
P1
P2
P3
P4
P5
P6
Tj and Tj ′ are at station Si′, connecting to station Si where disaster happens.
Any one of the connecting track is free.
Trains are ready to leave.
Highest priority train Tj is running on the track.
Platform is free at Si.
Highest priority train Tj reaches station Si.
Description of Transitions of P N4
Transitions(Tr)
Description
Tr1
Tr2
Tr3
It will fire if P1 has more than one tokens and generates ct1 and there is also a token available in P2.
It will fire if Tj has finished its waiting time at station Si′ and a token is available at P5.
It will fire if a token is available at P4 indicating Tj is moving forward to Si.
Colour Token(ct) Description
Description of colour tokens of P N4
ct1
P1 generates it to indicate Tj has the highest priority while at Si′ and enables transition Tr1.
Analysis of P N4:
Table 5 presents the description of the places P = {P 1, P 2, P 3, P 4, P 5, P 6} and transitions
T r = {T r1, T r2, T r3} and the initial marking is M 0 = [2, 1, 0, 0, 1, 0].
• Reachability graph analysis:
As discussed in subsection 6.1.2, initial marking M0 is the root node as shown in Figure 6b.
Again, a) the reachability set is R(M0) finite, b) maximum number of tokens that a place
17
can have is 2, so our P N4 is 2-bounded, c) all transitions can be fired, so there are no dead
transitions.
• State equation:
Here, in the incidence matrix A, P = {P 1, P 2, P 3, P 4, P 5, P 6}, denoted by rows. and the
order of the transitions is T r = {T r1, T r2, T r3}, denoted by columns.
A =
−1
−1
0
0
1 −1
0
1
0
0
1 −1
0 −1
0
0
0
1
In our system, marking M = [1, 1, 0, 0, 0, 1] is reachable from initial marking M 0 =
[2, 1, 0, 0, 1, 0] through the firing sequence σ1 = T r1, T r2, T r3.
M0
T r3−−→ M3.
T r2−−→ M2
T r1−−→ M1
2
1
0
0
1
0
+
−1
−1
0
0
1 −1
0
1
0
0
1 −1
0 −1
0
0
0
1
1
1# =
×"1
1
1
0
0
0
1
Table 6 Summary of Disaster Handling Cases Described in Section 6
Case No. Description
1
1.1
1.1.1
1.1.2
1.2
2
3
Station Si faces problem and train Tj is on track l
Station Si has free platforms when Tj reaches
Re(Tj) is available after Si
No alternative route found for Tj from Si
Station Si has no free platforms when Tj reaches
Number of trains are about to depart from Si within buffer
time τ B
Train Tj neither waits at affected station Si nor on track l
connected to Si, but reaches to Si within τ B
Decision Variable(s)
Ljil
Pjik, P rio(Tj), Re(Tj)
Pjik, Ljil, xDT
ji
xDT
ji
Pjik, xAT
ji
Ljil, Pjik, P rio(Tj), xDT
ji
, xAT
ji
Decision Taken
Reroute or Retime
Reroute or Retime from station
Reroute from Si
Delay at Si
Stop on track l, Retime
Reorder
Ljil, Pjik, P rio(Tj), xAT
ji
Retime
6.4 Delay Handling
Delay Minimisation can be formulated as:
).
• Delay minimisation at station Si (δmin
).
• Delay minimisation on the track l (δmin
ji
jl
: This aims to minimise the delay in such a way that even if the train Tj comes late, it should
δmin
ji
try to minimise the deviation from scheduled departure time,
i.e.
xAT
ji ≥ oAT
xDT
ji = oDT
ji
ji
(26)
(27)
So, it compromises dwell time of Tj at Si,
i.e.
(28)
: This aims to minimise the delay considering the journey time (from source to destination),
xd
ji < od
ji
δmin
jl
i. e.
xJ
jl = oJ
jl
18
(29)
6.4.1 Evaluating Optimised Objective Function
The proposed rescheduling approach aims to minimise the total delay of trains in case of any
disaster while rescheduling.
Objective Function:
min[Xj
δj] = min[ XRou(Tj )
(δmin
ji + δmin
jl
)] = min[XPjik
δmin
ji
] + min[XLjil
δmin
jl
]
(30)
7 Simulation Results
To evaluate the performance of the proposed approach, experiments are conducted in different
scenarios with different combination of tracks, trains and stations. Both the delay on track and at
station are considered in the experiments.
Figure 7. Major part of Howrah and Asansol Division, Eastern Railway, India.
19
Table 7 Parameter used in Experimental Studies with Station and Train details
Parameter used
Parameter
Total number of stations
Max number of platforms at station
Min number of tracks at station
Max number of tracks at station
Total number of trains
Threshold delay
Values
28
6
1
4
21
30 (in minute)
Station Details of Eastern Railway(Howrah and Asansol division)
Station
Code
HWH
BLY
SHE
DKAE
BDC
KQU
TAK
KWAE
SKG
BWN
KAN
SNT
RPH
DHN
Station Name
Howrah
Bally
Sheoraphuli Junction
Dankuni
Bandel Junction
Kamarkundu
Tarkeshwar
Katwa Junction
Saktigarh
Barddhaman
Khana Junction
Sainthia
Rampurhat
Dhanbad
Station
Code
BMGA
PAN
PAW
DGR
UDL
RNG
ASN
STN
CRJ
JMT
MDP
STL
JAJ
BRR
Station Name
Bhimgara
Panagarh
Pandabeswar
Durgapur
Andal
Raniganj
Asansol
Sitarampur
Chittaranjan
Jamtara
Madhupur
Simultala
Jhajha
Barakar
Train Details of Eastern Railway (Howrah and Asansol division)
Train No.
Train Name
Category
Priority
12313
12301
12273
12303
12019
22387
13051
12329
12339
12341
13009
37211
13017
37911
63541
53061
15662
63525
63523
53131
12359
Sealdah-New Delhi Rajdhani Express
Howrah - New Delhi Rajdhani Express
Howrah - New Delhi Duronto Express
Poorva Express
Howrah-Ranchi Shatabdi Express
Black Diamond Express
Hool Express
West Bengal Sampark Kranti Express
Coalfield Express
Agnibina Express
Doon Express
Howrah-Bandel Jn Local
Ganadevta Express
Howrah-Katwa Jn Local
Asansol-Gomoh MEMU
Barddhaman Jn-Hatia Passenger
Kamakhya - Ranchi Express
Barddhaman Jn-Asansol Jn MEMU
Barddhaman Jn-Asansol Jn MEMU
Sealdah-Muzaffarpur Fast Passenger
Kolkata - Patna Garib Rath Express
20
j
j
j
j
T P r
T P r
T P r
T M
T P r
j
T P
j
T P
j
T M
j
T P
j
T P
j
T M
T Lo
j
T P
j
T Lo
T Lo
T Lo
T M
T Lo
T Lo
j
T P
j
T P r
j
j
j
j
j
j
j
y1
y1
y1
y2
y1
y4
y4
y2
y4
y4
y2
y5
y4
y5
y5
y5
y2
y5
y5
y4
y1
7.1 Experimental Setup
The simulation is coded in Java in JADE [38] in UNIX platform of personal computer with 2.90
GHz processor speed and 4GB memory. The results and computations are evaluated under same
running environment. A part of Eastern Railway, India [39], shown in Figure 7, is taken for
experimental studies.
Table 7 describes the parameters with their values taken for the experiments, station details and
the train categorisation as discussed in subsection 3.2. Total 28 major stations and 21 different
types of trains are taken to generate the real-time scenarios.
First the database is set with all the station details and train details and the neighbourhood of
the stations in railway network. For both the Asansol and Howrah division, there are maximum 4
tracks in between two stations and for some part, stations are connected with 1 single track. Each
station is assumed to have max p = 6 number of platforms. The permissible threshold delay, as
discussed before, is taken as 30 min. For simplicity we assume, all stations are equidistant and
trains are running at a constant speed throughout its journey.
7.2 Illustration
To illustrate the proposed method 7 different scenarios are taken at different times of a day, based
upon the cases discussed in Section 6. Some scenarios describe affected stations, whereas some
describe the disruption on track as well as blocked stations. The first scenario Sc1 describes the
blocked station BLY , but no track is blocked. The disaster happened at 6 : 00 am. Based on
the proposed approach, train no. 12019, 13051, 12303 are delayed and rescheduled. Total delay
encountered here is 15 min. Similar incidents are described in Sc2, Sc3, and Sc5 in different
times, where only stations are blocked. Scenario Sc7 highlights a disaster, happened at 21 : 00,
where track no. 2, i.e., DOWN track between stations U DL and RN G is blocked. Train no.
12341, 13009, 12359 are rescheduled in this case with our proposed approach, facing a total delay
of 24 min. Similar scenarios are mentioned in Sc4, Sc6. The details of blocked stations, blocked
tracks, affected trains, and total delay observed in each scenario is described in Table 8.
Table 8 Scenarios taken in Experimental Studies
Scenario
Time of disaster Blocked Station Blocked Track
Sc1
Sc2
Sc3
Sc4
Sc5
Sc6
Sc7
6:00
7:00
7:30
13:00
17:40
20:00
21:00
BLY
KAN
UDL
BWN, KAN
KAN
ASN, STN
UDL, RNG
-
-
-
(BW N ←→ KAN)2
-
(ASN ←→ ST N)1
(U DL ←→ RN G)2
Affected Train No.
12019, 13051, 12303
12303, 12019, 13051, 53131
12019, 53061, 22387
12273
12339, 12313, 12301, 63523, 63525
12339, 12341, 12359, 63525
12341, 13009, 12359
Total Delay(in min)
15
34
29
0
15
10
24
Depending upon the impact of the occurred disaster, the scenario is distinguished in four dif-
ferent categories, such as: (a) More number of trains in circulation and high impact of disruption,
(b) More number of trains in circulation and low impact of disruption, (c) Less number of trains in
circulation and low impact of disruption, (d) Less number of trains in circulation and high impact
of disruption. In figure 8a, graphical representation of the expected delay of each train is shown
depending upon this categorisation.
In Figure 8b, the changes in delay of each train is shown when same disaster happens at normal
time and at busy time. Without any disaster, all trains maintain original schedule and no delay is
observed. So, the graph maintains a straight line with zero delay for all trains.
21
n
e
k
a
t
o
i
r
a
n
e
c
s
n
o
p
u
d
e
s
a
b
s
n
a
r
t
f
i
o
r
e
b
m
u
N
i
)
n
m
n
i
(
y
a
e
D
l
l
a
t
o
T
20
15
10
5
0
50
40
30
20
10
0
More number of trains in circulation and high impact of disruption
More number of trains in circulation and low impact of disruption
Less number of trains in circulation and low impact of disruption
Less number of trains in circulation and high impact of disruption
0
10
20
30
40
50
Expected delay of each train (in min)
a
Our proposed method
Threshold Delay
i
)
n
m
n
i
(
y
a
e
D
d
e
l
t
c
e
p
x
E
l
a
t
o
T
5
10
20
Time of Disaster (Clock Time)
15
25
600
500
400
300
200
100
0
5
b
Our proposed agent based distributed method
Existing centralized method
10
15
20
25
Time of Disaster (Clock Time)
c
d
Figure 8. Simulation Results
a Change of number of affected trains and their expected delay under disruption scenarios.
b Delay of trains with disaster at normal time and busy time.
c Delay Minimisation through our proposed method.
d Comparison between existing centralised approach and our proposed agent-based distributed
approach.
22
Figure 8c represents the delay minimisation, achieved through proposed approach. Threshold
delay is taken as 30 min. We vary the time of disaster in 24h time period to observe the total delay
of trains through the proposed method.
To exhibit the advantage of proposed approach, results are compared with the existing cen-
tralised decision making approach of Indian Railway. In this method, all the rescheduling deci-
sions are taken by the central authority. All the low level authorities pass the necessary messages
to the next higher level authority in the railway hierarchy and so on. The higher authority checks
for all feasible solutions and the best decision message for rescheduling is passed from central au-
thority to the lower authorities for necessary changes. This procedure is time consuming and may
face disadvantages of traditional centralised systems like, single-point failure, lesser autonomy,
under utilisation etc. The comparison between existing centralised and the proposed agent-based
distributed approach is shown in Figure 8d. In case of every disaster scenario, happened in dif-
ferent time of a day in the railway network, significant reduction in delay is observed through the
proposed approach.
8 Conclusion
This paper proposes a new train rescheduling approach to handle delay optimisation in case of
disruptions in a railway network. An agent based solution using the DCOP and MDP was designed
to address the distributed nature of the scenario and the uncertainty of disaster recovery time.
Experimental studies are conducted on Eastern Railway, India to evaluate the effectiveness of the
approach. In disastrous situation with noticeably large recovery time, the proposed approach is
shown to produce lower delay than existing approaches.
One of the future research directions will aim at extending this approach for rescheduling of
trains which follow a meet-pass sequence [40] using headway time [41]. This will increase the
number of constraints noticeably which need to be handled efficiently. Further, cross-over points
between any two stations will also be considered which can help in handling various collision
scenarios.
9 References
[1] Indian railways. https://en.wikipedia.org/wiki/Indian_Railways. Last modified on
10 May 2016.
[2] Xiang Li Biying Shou and Dan Ralescu. Train rescheduling with stochastic recovery time: A
new track-backup approach. IEEE Transactions on Systems, Man, and Cybernetics: Systems,
2014.
[3] J.T. Krasemann. Greedy algorithm for railway traffic re-scheduling during disturbances: a
swedish case. IET Intell. Transp. Syst., 4:375 -- 386, 2010.
[4] R.P Feynman and F.L Vernon Jr. A mip-based timetable rescheduling formulation and algo-
rithm minimizing further inconvenience to passengers. Journal of Rail Transport Planning &
Management, pages 38 -- 53, 2013.
[5] Bart Kersbergen, Ton van den Boom, and Bart De Schutter. Reducing the time needed to solve
the global rescheduling problem for railway networks. Proceedings of the 16th International
23
IEEE Annual Conference on Intelligent Transportation Systems (ITSC 2013), pages 791 -- 796,
2013.
[6] Poulami Dalapati, James Arambam Singh, Animesh Dutta, et al. Multiagent based railway
scheduling and optimization. IEEE TENCON, Bangkok, Thailand, 2014.
[7] Indian rail incidents. https://en.wikipedia.org/wiki/List_of_Indian_rail_incidents.
Last modified on 6 May 2016.
[8] Trung Thanh Nguyen and Xin Yao. Benchmarking and solving dynamic constrained prob-
lems. IEEE Congress on Evolutionary Computation, pages 690 -- 697, 2009.
[9] Fabien Leurent. Transport capacity constraints on the mass transit system: a systemic analy-
sis. Eur. Transp. Res. Rev., 3:11 -- 21, 2011.
[10] James Atlas and Keith Decker. A complete distributed constraint optimization method for
non-traditional pseudotree arrangements. AAMAS, 2007.
[11] Duc Thien Nguyen, William Yeoh, and Hoong Chuin Lau. Stochastic dominance in stochastic
dcops for risk-sensitive applications. AAMAS, 2012.
[12] Jose M Vidal. Fundamentals of multiagent systems. 2010.
[13] Daniel S. Bernstein, Robert Givan, Neil Immerman, et al. The complexity of decentralized
control of markov decision processes. UNCERTAINTY IN ARTIFICIAL INTELLIGENCE
PROCEEDINGS, 2000.
[14] Daniel S. Bernstein, Christopher Amato, Eric A. Hansen, et al. Policy iteration for decen-
tralized control of markov decision processes. Journal of Artificial Intelligence Research,
34:89 -- 132, 2009.
[15] L. Meng and X. S. Zhou. Robust single-track train dispatching model under a dynamic and
stochastic environment: A scenario-based rolling horizon solution approach. Transp. Res. B,
45:1080 -- 1102, 2011.
[16] Rodrigo Acuna-Agost, Philippe Michelon, Dominique Feillet c, et al. Sapi: Statistical analy-
sis of propagation of incidents. a new approach for rescheduling trains after disruptions. Eur.
J. Oper. Res., 215:227 -- 243, 2011.
[17] R. Acuna-Agost, D. Feillet, S. Gueye, et al. A mip-based local search method for the railway
rescheduling problem. Networks, 57:69 -- 86, 2011.
[18] Ravi Sekhar Chalumuri and Asakura Yasuo. Modelling travel time distribution under various
uncertainties on hanshin expressway of japan. Eur. Transp. Res. Rev., 6:85 -- 92, 2014.
[19] Lixing Yang, Ziyou Gao, and Keping Li. Railway freight transportation planning with mixed
uncertainty of randomness and fuzziness. Applied Soft Computing, 2010.
[20] Ibrahim Takouna and Roberto Rojas-Cessa. Routing schemes for network recovery under
link and node failures. IEEE, pages 69 -- 73, 2008.
[21] Lingyun Meng and Xuesong Zhou. Simultaneous train rerouting and rescheduling on an
n-track network: A model reformulation with network-based cumulative flow variables. EL-
SEVIER, Transportation Research Part B, 67:208 -- 234, 2014.
24
[22] Zuraida Alwadood, Adibah Shuib, and Norlida Abd. Hamid. A review on quantitative models
in railway rescheduling. International Journal of Scientific & Engineering Research, 3, 2012.
[23] Malik Muneeb Abid and Muhammad Babar Khan. Sensitivity analysis of train schedule of
a railway track network using an optimization modeling technique. Eur. Transp. Res. Rev.,
7:2 -- 7, 2015.
[24] Li Wang, Limin Jia, Yong Qin, Jie Xu, and Xuelei Meng. Method for tuberail train reschedul-
ing system. International Conference on Computer Application and System Modeling (IC-
CASM), pages 563 -- 567, 2010.
[25] Paola Pellegrini, GrÃl'gory Marliôlre, et al. Recife-milp: An effective milp-based heuristic
IEEE Transactions On Intelligent
for the real-time railway traffic management problem.
Transportation Systems, 2015.
[26] Liujiang Kang, Jianjun Wu, Huijun Sun, et al. A practical model for last train rescheduling
with train delay in urban railway transit networks. Elsevier, Omega 50, pages 29 -- 42, 2015.
[27] Terminal dwell time. https://en.wikipedia.org/wiki/Terminal_dwell_time. Last
modified on 4 February 2016.
[28] Vito Fragnelli and Simona Sanguineti. A game theoretic model for re-optimizing a railway
timetable. Eur. Transp. Res. Rev., 6:113 -- 125, 2014.
[29] Thijs Dewilde, Peter Sels, Dirk Cattrysse, et al. Robust railway station planning: An inter-
action between routing, timetabling and platforming. ELSEVIER, Journal of Rail Transport
Planning & Management, 3:68 -- 77, 2013.
[30] Shuai Su, Tao Tang, Xiang Li, and Ziyou Gao. Optimization of multitrain operations in a
subway system. IEEE Transactions On Intelligent Transportation Systems, 15, 2014.
[31] Mariagrazia Dotoli, Nicola Epicoco, Marco Falagario, et al. A real time traffic management
model for regional railway networks under disturbances. IEEE International Conference on
Automation Science and Engineering (CASE), 2013.
[32] Hsu-Chun Yen. Introduction to petri net theory. Studies in Computational Intelligence, 25,
2006.
[33] T. Murata. Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77:541 --
580, 1989.
[34] N. Chaki and S. Bhattacharya. Performance analysis of multistage interconnection networks
with a new high-level net model. Journal of Systems Architecture, ELSEVIER, 52:57 -- 70,
2006.
[35] Kurt Jensen and Lars M. Kristensen. Coloured petri nets, modelling and validation of con-
current systems. Springer, 2009.
[36] Pengling Wang, Lei Ma, Rob M. P. Goverde, et al. Rescheduling trains using petri nets and
heuristic search. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS,
17:726 -- 735, 2016.
[37] Michael Wooldridge. An Introduction to Multiagent Systems. 1966.
25
[38] Jade. http://jade.tilab.com/.
[39] Eastern railway zone. https://en.wikipedia.org/wiki/Eastern_Railway_zone. Last
modified on 4 May 2016.
[40] Lingyun Meng and Xuesong Zhou. Robust single-track train dispatching model under a
dynamic and stochastic environment: a scenario-based rolling horizon solution approach.
publication in Transportation Research Part B, pages 1 -- 33, 2011.
[41] Headway. https://en.wikipedia.org/wiki/Headway. Last modified on 29 February
2016.
26
|
1906.12250 | 1 | 1906 | 2019-06-01T10:05:57 | Adaptation and learning over networks under subspace constraints -- Part II: Performance Analysis | [
"cs.MA",
"eess.SP"
] | Part I of this paper considered optimization problems over networks where agents have individual objectives to meet, or individual parameter vectors to estimate, subject to subspace constraints that require the objectives across the network to lie in low-dimensional subspaces. Starting from the centralized projected gradient descent, an iterative and distributed solution was proposed that responds to streaming data and employs stochastic approximations in place of actual gradient vectors, which are generally unavailable. We examined the second-order stability of the learning algorithm and we showed that, for small step-sizes $\mu$, the proposed strategy leads to small estimation errors on the order of $\mu$. This Part II examines steady-state performance. The results reveal explicitly the influence of the gradient noise, data characteristics, and subspace constraints, on the network performance. The results also show that in the small step-size regime, the iterates generated by the distributed algorithm achieve the centralized steady-state performance. | cs.MA | cs | Adaptation and learning over networks under
subspace constraints -- Part II: Performance Analysis
1
Roula Nassif†, Member, IEEE, Stefan Vlaski†,‡, Student Member, IEEE,
Ali H. Sayed†, Fellow Member, IEEE
† Institute of Electrical Engineering, EPFL, Switzerland
‡ Electrical Engineering Department, UCLA, USA
[email protected]
[email protected]
[email protected]
Abstract
Part I of this paper considered optimization problems over networks where agents have individual objectives to
meet, or individual parameter vectors to estimate, subject to subspace constraints that require the objectives across
the network to lie in low-dimensional subspaces. Starting from the centralized projected gradient descent, an iterative
and distributed solution was proposed that responds to streaming data and employs stochastic approximations in
place of actual gradient vectors, which are generally unavailable. We examined the second-order stability of the
learning algorithm and we showed that, for small step-sizes µ, the proposed strategy leads to small estimation errors
on the order of µ. This Part II examines steady-state performance. The results reveal explicitly the influence of the
gradient noise, data characteristics, and subspace constraints, on the network performance. The results also show that
in the small step-size regime, the iterates generated by the distributed algorithm achieve the centralized steady-state
performance.
Distributed optimization, subspace projection, gradient noise, steady-state performance.
Index Terms
9
1
0
2
n
u
J
1
]
A
M
.
s
c
[
1
v
0
5
2
2
1
.
6
0
9
1
:
v
i
X
r
a
This work was supported in part by NSF grant CCF-1524250. A short conference version of this work appears in [1].
2
I. INTRODUCTION
As pointed out in Part I [2] of this work, most prior literature on distributed inference over networks focuses
on consensus problems, where agents with separate objective functions need to agree on a common parameter
vector corresponding to the minimizer of the aggregate sum of individual costs [3] -- [12]. In this paper, and its
accompanying Part I [2], we focus instead on multitask networks where the agents need to estimate and track
multiple objectives simultaneously [13] -- [20]. Based on the type of prior information that may be available about
how the tasks are related to each other, multitask algorithms can be derived by translating the prior information
into constraints on the parameter vectors to be inferred.
In this paper, and the accompanying Part I [2], we consider multitask inference problems where each agent seeks
to minimize an individual cost, and where the collection of parameter vectors to be estimated across the network
is required to lie in a low-dimensional subspace. That is, we let wk ∈ CMk denote some parameter vector at node
k and let W = col{w1, . . . , wN} denote the collection of parameter vectors from across the network (N is the
number of agents in the network). We associate with each agent k a differentiable convex cost Jk(wk) : CMk → R,
which is expressed as the expectation of some loss function Qk(·) and written as Jk(wk) = EQk(wk; xk), where
k=1 Mk.
xk denotes the random data. The expectation is computed over the distribution of the data. Let M =(cid:80)N
We consider constrained problems of the form:
Wo = arg min
W
J glob(W) (cid:44)
N(cid:88)
k=1
Jk(wk),
(1)
where R(·) denotes the range space operator, and U is an M × P full-column rank matrix with P (cid:28) M. Each
agent k is interested in estimating the k-th Mk × 1 subvector wo
k of Wo = col{wo
1, . . . , wo
N}.
In order to solve problem (1), we proposed in Part I [2] the following adaptive and distributed strategy:
subject to W ∈ R(U),
ψk,i = wk,i−1 − µ (cid:92)∇w∗
wk,i = (cid:80)
Ak(cid:96)ψ(cid:96),i,
k
(cid:96)∈Nk
Jk(wk,i−1),
(2)
k at agent
where µ > 0 is a small step-size parameter, ψk,i is an intermediate estimate, wk,i is the estimate of wo
Jk(·) is the (Wirtinger) complex gradient [4,
k and iteration i, Nk denotes the neighborhood of agent k, and ∇w∗
Jk(·)
Appendix A] of Jk(·) relative to w∗
are employed in (2) instead of true gradient vectors ∇w∗
Jk(·) since we are interested in solving (1) in the stochastic
setting when the distribution of the data xk is unknown. A common construction in stochastic approximation theory
is to employ the following approximation at iteration i:
k (complex conjugate of wk). Notice that approximate gradient vectors (cid:92)∇w∗
k
k
k
(cid:92)∇w∗
Jk(wk) = ∇w∗
k
k
Qk(wk; xk,i),
(3)
where xk,i represents the data observed at iteration i. The difference between the true gradient and its approximation
is called the gradient noise sk,i(·):
sk,i(w) (cid:44) ∇w∗
k
Jk(w) − (cid:92)∇w∗
k
Jk(w).
(4)
(cid:40) lim
i→∞Ai = PU,
Ak(cid:96) = [A]k(cid:96) = 0,
This noise will seep into the operation of the algorithm and one main challenge is to show that despite its presence,
k asymptotically. The matrix Ak(cid:96) appearing in (2) is of size Mk×M(cid:96). It multiplies
agent k is still able to approach wo
the intermediate estimate ψ(cid:96),i arriving from neighboring agent (cid:96) to agent k. Let A (cid:44) [Ak(cid:96)] ∈ CM×M denote the
matrix that collects all these blocks. This N × N block matrix is chosen by the designer to satisfy the following
two conditions:
if (cid:96) /∈ Nk and k (cid:54)= (cid:96),
(6)
where [A]k(cid:96) denotes the (k, (cid:96))-th block of A and PU is the projector onto the P -dimensional subspace of CM
spanned by the columns of U:
PU = U(U∗U)−1U∗.
(7)
The sparsity condition (6) characterizes the network topology and ensures local exchange of information at each
time instant i. It is shown in Part I [2] that the matrix equation (5) holds, if and only if, the following conditions
on the projector PU and the matrix A are satisfied:
AU = U,
U∗A = U∗.
ρ(A − PU) < 1,
3
(5)
(8)
(9)
(11)
(10)
where ρ(·) denotes the spectral radius of its matrix argument. Conditions (8) and (9) state that the P columns
of U are right and left eigenvectors of A associated with the eigenvalue 1. Together with these two conditions,
condition (10) means that A has P eigenvalues at one, and that all other eigenvalues are strictly less than one in
magnitude. Combining conditions (8) -- (10) with the sparsity condition (6), the design of a matrix A to run (2) can
be written as the following feasibility problem:
A
find
such that AU = U, U∗A = U∗,
ρ(A − PU) < 1,
[A]k(cid:96) = 0, if (cid:96) /∈ Nk and (cid:96) (cid:54)= k.
Not all network topologies satisfying (6) guarantee the existence of an A satisfying condition (5). The higher the
dimension of the signal subspace is, the greater the graph connectivity has to be. In the works [1], [20], it is
assumed that the sparsity constraints (6) and the signal subspace lead to a feasible problem. That is, it is assumed
that problem (11) admits at least one solution. As a remedy for the violation of such assumption, one may increase
the network connectivity by increasing the transmit power of each node, i.e., adding more links [20]. In Section III
of this part, we shall relax the feasibility assumption by considering the problem of finding an A that minimizes
the number of edges to be added to the original topology while satisfying the constraints (8), (9), and (10). In this
case, if the original topology leads to a feasible solution, then no links will be added. Otherwise, we assume that
the designer is able to add some links to make the problem feasible.
4
When studying the performance of algorithm (2) relative to Wo, we assume that a feasible A (topology) is
computed by the designer and that its blocks {Ak(cid:96)}(cid:96)∈Nk are provided to agent k in order to run (2). We carried out
in Part I [2] a detailed stability analysis of the proposed strategy (2). We showed that, despite the gradient noise,
the distributed strategy (2) is able to converge in the mean-square-error sense within O(µ) from the solution of the
constrained problem (1), for sufficiently small step-sizes µ. We particularly established that, for each agent k, the
k −
error variance relative to wo
wk,i(cid:107)2 = O(µ). In Section II of this Part II, we will assess the size of this mean-square-error by deriving closed-form
expression for the network mean-square-deviation (MSD) defined by [4]:
k enters a bounded region whose size is in the order of µ, namely, lim supi→∞ E(cid:107)wo
MSD (cid:44) µ lim
µ→0
(12)
where Wi (cid:44) col{wk,i}N
k=1. In other words, we will assess the size of the constant multiplying µ in the O(µ)−term.
This closed form expression will reveal explicitly the influence of the data characteristics (captured by the second-
lim sup
i→∞
N
,
order properties of the costs and second-order moments of the gradient noises) and subspace constraints (captured
by U), on the network performance. In this way, we will be able to conclude that distributed strategies of the
form (2) with small step-sizes are able to lead to reliable performance even in the presence of gradient noise. We
will be able also to conclude that the iterates generated by the distributed implementation achieve the centralized
steady-state performance. Particularly, we compare the performance of strategy (2) to the following centralized
(cid:18)
(cid:18) 1
E
1
µ
(cid:19)(cid:19)
(cid:107)Wo − Wi(cid:107)2
stochastic gradient projection algorithm [21]:
(cid:18)
(cid:110) (cid:92)∇w∗
k
(cid:111)N
(cid:19)
,
Wc
i = PU
(13)
N,i} is the estimate of Wo at iteration i. Observe that each agent at each iteration needs
where Wc
to send its data to a fusion center, which performs the projection in (13), and then sends the resulting estimates
i = col{wc
i−1 − µ col
1,i, . . . , wc
i ≥ 0,
Jk(wc
k,i−1)
Wc
k=1
wc
k,i back to the agents. Finally, simulations will be provided in Section IV to verify the theoretical findings.
II. STOCHASTIC PERFORMANCE ANALYSIS
In Part I [2], we carried out a detailed stability analysis of the proposed strategy (2). We showed, under some
Assumptions on the risks {Jk(·)} and on the gradient noise processes {sk,i(·)} defined by (4), that a network
running strategy (2) with a matrix A satisfying conditions (6), (8), (9), and (10) is mean-square-error stable for
sufficiently small step-sizes, namely, it holds that:
E(cid:107)wo
k − wk,i(cid:107)2 = O(µ),
k = 1, . . . , N,
lim sup
i→∞
(14)
for small enough µ -- see [2, Theorem 1]. Expression (14) indicates that the mean-square error E(cid:107)Wo − Wi(cid:107)2 is on
the order of µ. In this section, we are interested in characterizing how close the Wi gets to the network limit point
Wo. In particular, we will be able to characterize the network mean-square deviation (MSD) (defined by (12)) value
in terms of the step-size µ, the data-type variable h defined in Table I, the second-order properties of the costs
DEFINITION OF SOME VARIABLES USED THROUGHOUT THE ANALYSIS. I IS A PERMUTATION MATRIX DEFINED BY (16).
TABLE I
Variable
Real data case
Complex data case
5
Data-type variable h
Gradient vector
Error vector (cid:101)we
k,i
1
k
Jk(wk)
∇w(cid:62)
(cid:101)wk,i from (39)
Gradient noise se
k,i(w)
sk,i(w) from (4)
Bias vector be
k
bk from (40)
(k, (cid:96))-th block of Ae
Matrix U e
Matrix J e
Ak(cid:96)
U
J from (28)
Matrix V e
R,
VR, from (28)
Matrix (V e
L,)∗
V∗
L, from (28)
Noise covariance Ro
k
Rq,k from (51),(52)
2
0
Jk(wk)
∗
k,i)(cid:62)
∇w∗
k
(b∗
k)(cid:62)
(s∗
k,i(w))(cid:62)
0
(A∗
k(cid:96))(cid:62)
(cid:101)wk,i
((cid:101)w
sk,i(w)
bk
Ak(cid:96)
U
J
VR,
V∗
Rs,k Rq,k
I
0
(V∗
R,)(cid:62)
0
(J ∗
)(cid:62)
(U∗)(cid:62)
0
V(cid:62)
L,
q,k R(cid:62)
R∗
s,k
0
0
0
L,
0
I(cid:62)
0
I(cid:62)
(captured by Ho defined below in (45)), the second-order moments of the gradient noises (captured by S defined
below in (64)), and the subspace constraints (captured by U e defined in Table I) as follows:
(cid:16)
(cid:17)
MSD =
µ
2hN
Tr
((U e)∗HoU e)
−1 ((U e)∗SU e)
.
(15)
As explained in Part I [2], in the general complex data case, extended vectors and matrices need to be introduced
in order to analyze the network evolution. The arguments and results presented in this section are applicable to
both cases of real and complex data through the use of data-type variable h. Table I lists a couple of variables
and symbols that will be used in the sequel for both real and complex data cases. The matrix I in Table I is a
permutation matrix of 2N × 2N blocks with (m, n)-th block given by:
[I]mn (cid:44)
for m, n = 1, . . . , 2N and k = 1, . . . , N.
IMk,
IMk,
0,
if m = k, n = 2(k − 1) + 1
if m = k + N, n = 2k
otherwise
(16)
6
A. Modeling assumptions from Part I [2]
In this section, we recall the assumptions used in Part I [2] to establish the network mean-square error stabil-
ity (14). We first introduce the Hermitian Hessian matrix functions (see [2, Sec. II-A]):
Hk(wk) (cid:44) ∇2
H(W) (cid:44) diag{Hk(wk)}N
Jk(wk),
wk
(hMk × hMk)
(hM × hM ).
(18)
Assumption 1. (Conditions on aggregate and individual costs). The individual costs Jk(wk) ∈ R are assumed to
be twice differentiable and convex such that:
k=1 ,
(17)
where νk ≥ 0 for k = 1, . . . , N. It is further assumed that, for any W, H(W) satisfies:
νk
h
IhMk ≤ Hk(wk) ≤ δk
h
IhMk,
0 <
ν
h
IhP ≤ (U e)∗H(W)U e ≤ δ
h
IhP ,
(19)
(20)
for some positive parameters ν ≤ δ. The data-type variable h and the matrix U e are defined in Table I.
As explained in [2], condition (20) ensures that problem (1) has a unique minimizer Wo.
Assumption 2. (Conditions on gradient noise). The gradient noise process defined in (4) satisfies for any w ∈ F i−1
and for all k, (cid:96) = 1, . . . , N:
E[sk,i(w)F i−1] = 0,
(cid:96),i(w)F i−1] = 0,
(cid:96),i(w)F i−1] = 0,
E[sk,i(w)s∗
E[sk,i(w)s(cid:62)
k (cid:54)= (cid:96),
k (cid:54)= (cid:96),
(21)
(22)
(23)
k ≥ 0, σ2
E[(cid:107)sk,i(w)(cid:107)2F i−1] ≤ (βk/h)2(cid:107)w(cid:107)2 + σ2
s,k,
(24)
s,k ≥ 0, and where F i−1 denotes the filtration generated by the random processes {w(cid:96),j} for
for some β2
all (cid:96) = 1, . . . , N and j ≤ i − 1.
Assumption 3. (Condition on U). The full-column rank matrix U is assumed to be semi-unitary, i.e., its column
vectors are orthonormal and U∗U = IP .
Consider the N × N block matrix Ae whose (k, (cid:96))-th block is defined in Table I. This matrix will appear in our
subsequent study. In [2, Lemma 2], we showed that this hM × hM matrix Ae admits a Jordan decomposition of
the form:
with
IhP
0
0
J e
Λe
=
, V e
Ae (cid:44) V e
(V e
)−1,
Λe
= [U e V e
R,], (V e
)−1 =
(25)
(26)
(U e)∗
(V e
L,)∗
,V e
R,, and (V e
where U e,J e
L, originating from the
eigen-structure of A. Under Assumption 3, the M ×M combination matrix A satisfying conditions (8), (9), and (10)
admits a Jordan canonical decomposition of the form:
L,)∗ are defined in Table I with the matrices J, VR,, and V∗
7
with:
IP
0
0 J
Λ =
, V =
A (cid:44) VΛV,
(cid:104) U VR,
(cid:105)
, V−1
=
,
(27)
(28)
U∗
V∗
L,
where J is a Jordan matrix with the eigenvalues (which may be complex but have magnitude less than one) on
the diagonal and > 0 on the super-diagonal. The eigen-decomposition (25) will be useful for establishing the
mean-square performance.
The results in Part I [2] established that the iterates wk,i converge in the mean-square error sense to a small
O(µ)−neighborhood around the solution wo. In this part, we will be more precise and determine the size of this
neighborhood, i.e., assess the size of the constant multiplying µ in the O(µ)−term. To do so, we shall derive an
accurate first-order expression for the mean-square error (14); the expression will be accurate to first-order in µ.
To arrive at the desired expression, we start by motivating a long-term model for the evolution of the network
error vector after sufficient iterations have passed, i.e., for i (cid:29) 1. It turns out that the performance expressions
obtained from analyzing the long-term model provide accurate expressions for the performance of the original
network model to first order in µ. To derive the long-term model, we follow the approach developed in [4]. The
k−wk,i(cid:107)4. Under
first step is to establish the asymptotic stability of the fourth-order moment of the error vector, E(cid:107)wo
the same settings of Theorem 1 in [2] with the second-order moment condition (24) replaced by the fourth-order
(29)
s4,k ≥ 0, and using similar arguments as in [4, Theorem 9.2], we can show that the fourth-order
moments of the network error vectors are stable for sufficiently small µ, namely, it holds that (see Appendix F)
4,k ≥ 0, σ4
with β4
s4,k,
E(cid:107)wo
k − wk,i(cid:107)4 = O(µ2),
k = 1, . . . , N.
lim sup
i→∞
(30)
As explained in [4], condition (29) implies (24). We analyze the long-term model under the same settings of
Theorem 1 in [2] and the following smoothness assumption on the individual costs.
Assumption 4. (Smoothness condition on individual costs). It is assumed that each Jk(wk) satisfies the following
smoothness condition close to the limit point wo
k:
(cid:107)∇wkJk(wo
for small perturbations (cid:107)∆wk(cid:107) and κd ≥ 0.
k + ∆wk) − ∇wkJk(wo
k)(cid:107) ≤ κd(cid:107)∆wk(cid:107),
(31)
moment condition:
E(cid:2)(cid:107)sk,i(w)(cid:107)4F i−1
(cid:3) ≤ (β4,k/h)4(cid:107)w(cid:107)4 + σ4
8
B. Long-term-error model
To introduce the long-term model, we reconsider the network error recursion from Part I [2], namely,
i + µAebe
i−1 − µAese
1,i, . . . ,(cid:101)we
(cid:9) ,
N,i
i
(cid:101)We
i = Bi−1(cid:101)We
(cid:44) col(cid:8)(cid:101)we
(cid:101)We
(cid:44) col(cid:8)se
(cid:90) 1
se
i
be (cid:44) col{be
H k,i−1 (cid:44)
0
Hi−1 (cid:44) diag{H 1,i−1, . . . , H N,i−1} ,
Bi−1 (cid:44) Ae(IhM − µHi−1),
N,i(wN,i−1)(cid:9) ,
1,i(w1,i−1), . . . , se
1, . . . , be
N} ,
k − t(cid:101)wk,i−1)dt,
Jk(wo
∇2
wk
where:
where:
and (cid:101)we
(32)
(33)
(34)
(35)
(36)
(37)
(38)
(39)
(40)
(41)
(42)
(43)
(44)
(45)
(46)
(47)
k,i, se
k,i(wk,i−1), and be
k are defined in Table I with:
(cid:101)wk,i (cid:44) wo
bk (cid:44) ∇w∗
k − wk,i,
Jk(wo
k).
k
(cid:101)We
i = B(cid:101)We
We rewrite (32) as:
i + µAebe + µAeci−1,
in terms of the constant matrix B and the random perturbation sequence ci−1:
i−1 − µAese
where Ho and (cid:101)Hi−1 are given by:
B (cid:44) Ae(IhM − µHo),
i−1,
ci−1 (cid:44) (cid:101)Hi−1(cid:101)We
(cid:101)Hi−1 (cid:44) Ho − Hi−1,
Ho (cid:44) diag{H o
1 , . . . , H o
N},
with each H o
k given by the value of the Hessian matrix at the limit point, namely,
H o
k
(cid:44) ∇2
wk
Jk(wo
k).
By exploiting the smoothness condition (31), and following an argument similar to [4, pp. 554], we can show from
Theorem 1 in [2] that, for i (cid:29) 1, (cid:107)ci−1(cid:107) = O(µ) with high probability. Motivated by this observation, we introduce
the following approximate model, where the last term µAeci−1 that appears in (41), which is O(µ2), is removed:
(cid:101)We(cid:48)
i = B(cid:101)We(cid:48)
i−1 − µAese
i (Wi−1) + µAebe,
for i (cid:29) 1. Obviously, the iterates {(cid:101)We(cid:48)
We start by showing that the mean-square difference between {(cid:101)We(cid:48)
i , (cid:101)We
i } generated by (47) are generally different from the iterates generated by the
original recursion (32). To highlight this fact, we are using the prime notation for the state of the long-term model.
i (Wi−1) in (47) is the same gradient noise process from the original recursion (32).
i} is asymptotically bounded by O(µ2) and
2 ) from the one of the original recursion (32).
that the mean-square-error of the long term model (47) is within O(µ
Note that the driving process se
3
9
Working with (47) is much more tractable for performance analysis because its dynamics is driven by the constant
matrix B as opposed to the random matrix Bi−1 in (32). Therefore, we shall work with model (47) and evaluate
its performance, which will provide an accurate representation for the performance of (2) to first order in µ.
Theorem 1. (Size of approximation error). Consider a network of N agents running the distributed strategy (2)
with a matrix A satisfying conditions (8), (9), and (10) and U satisfying Assumption 3. Assume the individual costs,
Jk(wk), satisfy the conditions in Assumptions 1 and 4. Assume further that the gradient noise processes satisfy
the conditions in Assumption 2 with the second-order moment condition (24) replaced by the fourth-order moment
condition (29). Then, it holds that, for sufficiently small step-sizes:
lim sup
i→∞
E(cid:107)(cid:101)We
i − (cid:101)We(cid:48)
E(cid:107)(cid:101)We
lim sup
i→∞
i (cid:107)2 = O(µ2),
i(cid:107)2 = lim sup
i→∞
E(cid:107)(cid:101)We(cid:48)
i (cid:107)2 + O(µ3/2).
(48)
(49)
Proof. See Appendix A.
Using similar eigenvalue perturbation arguments as in [4, Theorem 9.3], we can show that, under the same settings
of Theorem 1, the constant matrix B defined by (42) is stable for sufficiently small step-sizes (see Appendix G).
C. Mean-square-error performance
We showed in Theorem 1 in Part I [2] that a network running the distributed strategy (2) is mean-square stable
k − wk,i(cid:107)2 = O(µ). In this section, we assess
for sufficiently small µ. Particularly, we showed that lim supi→∞ E(cid:107)wo
the size of the mean-square error by measuring the network MSD defined by (12).
We refer to the individual gradient noise process in (4) and denote its conditional covariance matrix by:
We assume that, in the limit, the following moment matrices tend to constant values when evaluated at wo
k:
Re
s,k,i(w) (cid:44) E(cid:2)se
E(cid:2)sk,i(wo
E(cid:104)
Rs,k (cid:44) lim
i→∞
Rq,k (cid:44) lim
i→∞
sk,i(wo
k,i(w)se∗
k,i(w)F i−1
k)s∗
k)s(cid:62)
k,i(wo
k,i(wo
k)F i−1
k)F i−1
(cid:3) .
(cid:3) ,
(cid:105)
.
(50)
(51)
(52)
Assumption 5. (Smoothness condition on noise covariance). It is assumed that the conditional second-order
moments of the individual noise processes satisfy the following smoothness condition,
(cid:107)Re
s,k,i(wo
k + ∆wk) − Re
s,k,i(wo
k)(cid:107) ≤ κd(cid:107)∆wk(cid:107)γ,
(53)
10
for small perturbations (cid:107)∆wk(cid:107), and for some constant κd ≥ 0 and exponent 0 < γ ≤ 4.
One useful conclusion that follows from (53) is that, for i (cid:29) 1 and for sufficiently small step-size, we can express the
covariance matrix of se
k defined in Table I as follows (see [4, Lemma 11.1]):
k,i(w) in terms of the limiting matrix Ro
Ese
k,i(wk,i−1)se∗
k,i(wk,i−1) = Ro
k + O(µmin{1, γ
2
}).
(54)
Before proceeding, we introduce the (hM )2 × (hM )2 matrix F that will play a critical role in characterizing
the performance:
F = B(cid:62) ⊗b B∗.
(55)
This matrix is defined in in terms of the block Kronecker operation. In the derivation that follows, we shall use
the block Kronecker product ⊗b operator [22] and the block vectorization operator bvec(·)1. As explained in [4],
these operations preserve the locality of the blocks in the original matrix arguments. The matrix F will sometimes
appear transformed under the similarity transformation:
F (cid:44)(cid:16)
)∗(cid:17)F(cid:16)
)∗(cid:17)−1
(V e
)(cid:62) ⊗b (V e
(V e
)(cid:62) ⊗b (V e
.
(56)
Lemma 1. (Low-rank approximation). Assume the matrix A satisfies conditions (8), (9), and (10) with U satisfying
Assumption 3. For sufficiently small step-sizes, it holds that F is stable and that:
(I − F)−1 = O(1/µ),
(I − F)−1 =
O(1) O(1)
O(1/µ) O(1)
Z−1(cid:16)
,
(U e)(cid:62) ⊗b (U e)∗(cid:17)
(cid:16)
[(U e)∗](cid:62) ⊗b U e(cid:17)
(I − F)−1 =
+ O(1),
where the leading (hP )2 × (hP )2 block in (I − F)−1 is O(1/µ). Moreover, we can also write:
in terms of the block Kronecker operation, where the matrix Z has dimension (hP )2 × (hP )2:
Z = (IhP ⊗ D∗
11) + (D(cid:62)
11 ⊗ IhP ) = O(µ),
(57)
(58)
(59)
(60)
with D11 = µ (U e)∗HoU e which is positive definite under Assumption 1.
Proof. See Appendix B.
1In our derivations, the block Kronecker product and the block vectorization operations are applied to 2× 2 block matrices C = [Ck(cid:96)] and
D = [Dk(cid:96)] with blocks {C11, D11} of size hP ×hP , blocks {C12, D12} of size hP ×h(M−P ), blocks {C21, D21} of size h(M−P )×hP ,
and blocks {C22, D22} of size h(M − P ) × h(M − P ).
Theorem 2. (Mean-square-error performance). Consider the same settings of Theorem 1. Assume further that
Assumption 5 holds. Let γm (cid:44) 1
2 min{1, γ} > 0 with γ ∈ (0, 4] from (53). Then, it holds that:
E(cid:107)(cid:101)We
i(cid:107)2
(cid:32) ∞(cid:88)
n=0
=
lim sup
i→∞
1
hN
1
hN
=
Tr
1
hN
(bvec(Y(cid:62)))(cid:62)(I − F)−1bvec(IhM ) + O(µ1+γm),
(cid:33)
BnY(B∗)n
+ O(µ1+γm),
where:
Y = µ2AeS(Ae)∗,
S = diag{Ro
1, Ro
2, . . . , Ro
N}.
((U e)∗HoU e)
−1 ((U e)∗SU e)
.
(cid:17)
Furthermore, it holds that:
Proof. See Appendix C.
MSD =
µ
2hN
Tr
(cid:16)
11
(61)
(62)
(63)
(64)
(65)
(66)
Since (I −F) is of size (hM )2 × (hM )2, the first term on the R.H.S. of expression (61) may be hard to evaluate
due to numerical reasons. In comparison, the first term in expression (62) only requires manipulations of matrices
of size hM × hM. In practice, a reasonable number of terms can be used instead of n → ∞ to obtain accurate
evaluation.
Note that the MSD of the centralized solution is equal to (65) since the centralized implementation can be
obtained from (2) by replacing PU by A and by assuming fully-connected network. We therefore conclude, for
sufficiently small step-sizes (i.e., in the slow adaptation regime), that the distributed strategy (2) is able to attain
the same MSD performance as the centralized solution.
III. FINDING A COMBINATION MATRIX A
In the following, we consider the problem of finding an A that minimizes the number of edges to be added to the
original topology while satisfying the constraints (10), (8), and (9). That is, we consider the following optimization
problem:
N(cid:80)
(cid:80)
f (A) =
minimizeA
subject to AU = U, A = A∗,
ρ(A − PU) ≤ 1 − ,
(cid:96) /∈Nk
k=1
Ak(cid:96)1 + γ
2(cid:107)A(cid:107)2
F,
(cid:44)(cid:80)Mk
n=1 [Ak(cid:96)]mn ∈ R, (cid:107)A(cid:107)F =(cid:112)Tr(A∗A) ∈ R is the Frobenius norm of A, γ ≥ 0 is a
(cid:80)M(cid:96)
where Ak(cid:96)1
regularization parameter, and ∈ (0, 1] is a small positive number. In general, the spectral radius of a matrix is not
convex over the matrix space. We therefore restrict our search to the class of Hermitian matrices, since their spectral
m=1
radius coincides with their spectral norm (maximum singular value), which is a convex function. Problem (66) is
12
to slow convergence and large gives fast convergence. The convex (cid:96)1-norm based function(cid:80)N
is used as a relaxation of the pseudo (cid:96)0-norm h(A) = (cid:80)N
convex since the objective is convex, the equality constraints are linear, and the inequality constraint function is
convex [23]. The parameter controls the convergence rate of Ai towards the projector PU. That is, small leads
Ak(cid:96)1
k=1 card{(cid:96)Ak(cid:96) (cid:54)= 0, (cid:96) /∈ Nk}, which is a non-convex
function that leads to computational challenges. Among the potentially multiple feasible solutions, the cardinality
(cid:80)M
function h(A) in the objective in (66) selects as optimum the one that minimizes the number of edges to be added
n=1 amn2 in (66)
to the network topology in order to satisfy constraint (5). The quadratic term (cid:107)A(cid:107)2
makes the objective strictly convex, and therefore problem (66) has a unique minimum. Problem (66) can be solved
F =(cid:80)M
(cid:80)
(cid:96) /∈Nk
k=1
m=1
using general convex optimization solvers such as CVX [24]. These solvers generally implement second-order
methods that require calculation of Hessian matrices. Therefore, problems with more than few thousand entries are
probably beyond the capabilities of these solvers. The Douglas-Rachford algorithm can also be employed to solve
problem (66). As we shall see in the following, the required proximal operators for implementing this algorithm
can be computed efficiently using closed form expressions.
In the following, we shall assume that U ∈ RM×P and, therefore, we shall solve (66) over real-valued matrices
A ∈ RM×M . In order to solve the constrained problem (66), we shall apply the Douglas-Rachford splitting
algorithm [25], which is used to solve problems of the form:
minimize
x∈RN
g1(x) + g2(x),
(67)
where g1(·) and g2(·) are functions in Γ0(RN ) such that (ri domg1) ∩ (ri domg2) (cid:54)= 0 and g1(x) + g2(x) → +∞
as (cid:107)x(cid:107) → +∞. By selecting g1(·) as f (·) in (66) and g2(·) as the indicator function IΩ(·) of the closed nonempty
convex set:
Ω = {AAU = U,A = A(cid:62),(cid:107)A − PU(cid:107) ≤ 1 − }
defined as:
(68)
(69)
(70)
the Douglas-Rachford algorithm to solve (66) has the following form:
IΩ(A) (cid:44)
0,
Ai = proxηf (Ci)
Ci+1 = Ci + proxηIΩ
+∞,
if A ∈ Ω,
if A /∈ Ω,
(2Ai − Ci) − Ai,
where η > 0 and proxηg : RM×M → RM×M is the proximal operator of ηg(·) (g : RM×M → R ∪ {+∞}) defined
as [25], [26]:
proxηg(C) = arg minA g(A) +
1
2η
(cid:107)A − C(cid:107)2
F.
(71)
Every sequence (Ai)i∈N generated by algorithm (70) converges to a solution of problem (66) [25, Proposition 4.3].
The Douglas-Rachford algorithm operates by splitting since it employs the functions f (·) and IΩ(·) separately. It
requires the implementation of two proximal steps at each iteration, which can be computed efficiently as explained
in the following.
13
The function f (A) is an entrywise matrix function that treats the matrix A ∈ RM×M as a vector in RM 2 and
then uses a corresponding vector function; the proximal operator is then the same as that of the vector function.
Let Ck(cid:96) denote the (k, (cid:96))-th block of an N × N block matrix C and let [Ck(cid:96)]mn denote the (m, n)-th entry of Ck(cid:96).
The (k, (cid:96))-th block of the proximal operator of ηf (·) is given by:
(cid:18) 1
1 + ηγ
(cid:19)
·
Ck(cid:96),
Cs
k(cid:96),
if (cid:96) ∈ Nk or k = (cid:96),
if (cid:96) /∈ Nk,
[proxηf (C)]k(cid:96) =
where the matrix Cs
k(cid:96) is of size Mk × M(cid:96) with (m, n)-th entry given by:
[Cs
k(cid:96)]mn =
[Ck(cid:96)]mn − η,
0,
[Ck(cid:96)]mn + η,
if [Ck(cid:96)]mn ≥ η,
if [Ck(cid:96)]mn ≤ η,
if [Ck(cid:96)]mn ≤ −η.
Since IΩ is the indicator function of the closed convex set Ω, its proximal operator reduces to the projection onto
Ω defined as:
proxηIΩ
(D) = ΠΩ(D) =
arg minA
subject to A ∈ Ω
1
2(cid:107)A − D(cid:107)2
F
(72)
(73)
(74)
(77)
(78)
(79)
(80)
where the parameter η does not appear since the proximal operator is a projection. The set Ω in (68) can be written
alternatively as Ω = Ω1 ∩ Ω2 where Ω1 and Ω2 are two closed convex sets defined as:
Ω1 = {AAU = U,A = A(cid:62)},
Ω2 = {A(cid:107)A − PU(cid:107) ≤ 1 − }.
(75)
(76)
As we shall explain in the following, the projection onto the intersection Ω can be obtained by properly projecting
onto the individual sets Ω1 and Ω2 according to:
The projection onto Ω1 is given by (see Appendix D):
ΠΩ1(D) = (I − PU)
(I − PU) + PU,
and the projection of the symmetric matrix ΠΩ1(D) onto Ω2 is given by (see Appendix D):
ΠΩ(D) = ΠΩ2(ΠΩ1(D)).
(cid:18)D + D(cid:62)
(cid:19)
M(cid:88)
2
ΠΩ2(ΠΩ1(D)) = PU +
βmvmv(cid:62)
m,
m=1
−1 + ,
λm,
1 − ,
if λm < −1 + ,
if λm < 1 − ,
if λm > 1 − .
where:
βm =
14
Fig. 1. Experimental setup. (Left) Network topology. (Right) Graph spectral content of W(cid:63) with w(cid:63)
m=1 are the eigenvalues and eigenvectors of the symmetric matrix (I − PU)
where {λm, vm}M
order to establish (77), we introduce the following lemma.
Lemma 2. (Characterization of the projection). If Ω1 is an affine set, Ω2 is a closed convex set, and ΠΩ2(ΠΩ1(C)) ∈
Ω1, then ΠΩ1∩Ω2(C) = ΠΩ2(ΠΩ1(C)).
(I − PU). In
2
m = (v(cid:62)
m ⊗ IL)W(cid:63).
(cid:16)D+D(cid:62)
(cid:17)
Proof. See Appendix E.
Since the projection onto Ω2 (given by (79)) changes only the eigenvalues of a matrix without affecting the
eigenvectors, we have ΠΩ2(ΠΩ1(C)) ∈ Ω1. We then conclude from Lemma 2 that (77) holds.
IV. SIMULATION RESULTS
We apply strategy (2) to solve distributed inference under smoothness (described in Remark 4 of Section II
in [2]). We consider a connected mean-square-error (MSE) network of N = 50 nodes and Mk = L = 5. The N
nodes are placed randomly in the [0, 1] × [0, 1] square, and the weighted graph is then constructed according to a
thresholded Gaussian kernel weighting function based on the distance between nodes. Particularly, the weight ck(cid:96)
of edge (k, (cid:96)) connecting nodes k and (cid:96) that are dk(cid:96) apart is:
exp(cid:0)−d2
0,
k(cid:96)/(2σ2)(cid:1),
ck(cid:96) =
if dk(cid:96) ≤ κ
otherwise
(81)
with σ = 0.12 and κ = 0.33. We assume real data case. Each agent is subjected to streaming data {dk(i), uk,i}
assumed to satisfy a linear regression model [4]:
dk(i) = u(cid:62)
k = 1, . . . , N,
(82)
k + vk(i),
k,iw(cid:63)
for some unknown L× 1 vector w(cid:63)
networks, the risk functions take the form of mean-square-error costs:
k to be estimated with vk(i) denoting a zero-mean measurement noise. For these
Jk(wk) =
Edk(i) − u(cid:62)
k,iwk2,
1
2
k = 1, . . . , N.
(83)
00.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.9100.10.20.30.40.50.60.70.80.900.020.040.060.080.040.060.080.10.120.140.160.180.215
u,k and σ2
(cid:96),i = Ru,k = σ2
Inference under smoothness. Performance of algorithm (2) for 5 different choices of the matrix U in (1) with U = U ⊗ IL, and
Fig. 2.
non-cooperative strategy. (Left) Performance w.r.t. W(cid:63). (Right) Performance w.r.t. Wo.
The processes {uk,i, vk(i)} are assumed to be zero-mean Gaussian with: i) Euk,iu(cid:62)
u,kIL if k = (cid:96)
and zero otherwise; ii) Evk(i)v(cid:96)(i) = σ2
v,k if k = (cid:96) and zero otherwise; and iii) uk,i and vk(i) are independent of
v,k are generated from the uniform distributions unif(0.5, 2) and unif(0.2, 0.8),
each other. The variances σ2
respectively. Let W(cid:63) = col{w(cid:63)
N}. The signal W(cid:63) is generated by smoothing a signal Wo by a diffusion
kernel. Particularly, we generate W(cid:63) according to W(cid:63) = [(V e−τ ΛV (cid:62))⊗IL]Wo with τ = 30, Wo a randomly generated
vector from the Gaussian distribution N (0.1 × 1N L, IN L), and {V = [v1, . . . , vN ], Λ = diag{λ1, . . . , λN}} are the
matrices of eigenvectors and eigenvalues of Lc = diag{C1N}− C with [C]k(cid:96) = ck(cid:96) given by (81). Figure 1 (right)
m ⊗ IL)W(cid:63). It can be observed
illustrates the normalized squared (cid:96)2-norm of the spectral component w(cid:63)
that the signal is mainly localized in [0, 0.1]. Note that, for MSE networks, it holds that Hk(wk) = Ru,k ∀wk.
Furthermore, the gradient noise process (4) is given by:
m = (v(cid:62)
1, . . . , w(cid:63)
sk,i(wk) = (u(cid:62)
k,iuk,i − Ru,k)(wo
k − wk) + u(cid:62)
k,ivk(i),
with covariance Ro
k given by:
k,iuk,i − Ru,k)] + σ2
k,iuk,i − Ru,k)Wk(u(cid:62)
k = E[(u(cid:62)
Ro
= Ru,kWkRu,k + Ru,kTr(Ru,kWk) + σ2
v,kRu,k
k)(cid:62), and where we used the fact that E[u(cid:62)
k − wo
v,kRu,k
(84)
(85)
where Wk = (w(cid:63)
Ru,kTr(Ru,kWk) since the regressors are zero-mean real Gaussian [27].
k)(w(cid:63)
k − wo
k,iuk,iWku(cid:62)
k,iuk,i] = 2Ru,kWkRu,k +
We run algorithm (2) for 5 different choices of matrix U in (1) with U = U ⊗ IL: i) matrix U chosen as the first
eigenvector of the Laplacian U = [v1] = 1√
1N ; ii) matrix U chosen as the first two eigenvectors of the Laplacian
U = [v1 v2]; iii) U = [v1 v2 v3]; iv) U = [v1 . . . v4]; v) U = [v1 . . . v5]. Since U = U ⊗ IL, the matrix A is of
the form A ⊗ IL with A = [ak(cid:96)] an N × N matrix. In each case, the combination matrix A is set as the solution
of the optimization problem (66) ( = 0.01, γ = 0, Ak(cid:96)1 = ak(cid:96)), which is solved by the Douglas-Rachford
algorithm (70) with η = 0.003. Note that, for the 5 different choices of U, the distributed implementation is feasible
N
010002000300040005000600070008000900010000-40-35-30-25-20-15-10-516
PERFORMANCE OF STRATEGY (2) W.R.T. Wo IN (1) FOR 2 DIFFERENT CHOICES OF µ.
TABLE II
Step-size µ
Solution
10−2
10−3
10−4
Centralized
Distributed
Centralized
Distributed
Centralized
Distributed
MSD
Exp. (62)
−27.6dB
Simulation
Exp. (65)
−29.66dB −29.74dB −29.603dB
−29.66dB
−27.298dB
−39.66dB −39.67dB −39.691dB
−39.66dB −39.26dB −39.196dB
−49.66dB −50.19dB −49.772dB
−49.66dB −50.14dB −49.335dB
and the steady-state value of the cost in (66) is zero. We set µ = 0.001. We report the network MSD(cid:63) learning
E(cid:107)W(cid:63) − Wi(cid:107)2 in Fig. 2 (left). The results are averaged over 200 Monte-Carlo runs. The learning curve
curves 1
N
of the non-cooperative solution, obtained from (2) by setting A = ILN , is also reported. The results show that the
best performance is obtained when U = [v1 v2 v3 v4]⊗ IL. This is due to the fact that the columns of U constitute
a basis spanning the useful signal subspace (see Fig. 1 (right)). As a consequence, a strong noise reduction may be
obtained by projecting onto this subspace compared with the non-cooperative strategy where each agent estimates
k without any cooperation. By forcing consensus (i.e., by choosing U = [v1]), the resulting estimate wk,i will be
w(cid:63)
biased with respect to w(cid:63)
k, which is not common across agents. The performance obtained when U = [v1 . . . v5]
is worse than the case where U = [v1 . . . v4] due to a smaller noise reduction.
Finally, we illustrate Theorem 2 in Table II by reporting the steady-state MSD = lim supi→∞ 1
N
E(cid:107)Wo − Wi(cid:107)2
when U = [v1 . . . v4] ⊗ IL for 3 different values of the step-size µ = {10−2, 10−3, 10−4}. A closed form solution
for Wo in (1) exists and is given by:
Wo = U(U(cid:62)H U)−1U(cid:62)HW(cid:63),
(86)
k=1. We observe that, in the small adaptation regime, i.e., when µ → 0, the network MSD
where H = diag{Ru,k}N
increases approximately 10dB per decade (when µ goes from µ1 to 10µ1). This means that the steady-state MSD is
on the order of µ. We also observe that, in the small adaptation regime, the distributed solution is able to attain the
same performance as the centralized one. Finally, note that, for relatively large step-size (µ = 10−2), expression (62)
provides better results than (65) in the distributed case. This is due to neglecting the O(1) term in (58) which is
multiplied by O(µ2) (since Y = O(µ2)) when replaced in (62).
V. CONCLUSION
In this paper, and its accompanying Part I [2], we considered inference problems over networks where agents
have individual parameter vectors to estimate subject to subspace constraints that require the parameters across
the network to lie in low-dimensional subspaces. Based on the gradient projection algorithm, we proposed an
iterative and distributed implementation of the projection step, which runs in parallel with the stochastic gradient
descent update. We showed that, for small step-size parameter, the network is able to approach the minimizer of
the constrained problem to arbitrarily good accuracy levels. Furthermore, we derived a closed-form expressions for
the steady-state mean-square-error (MSE) performance. These expressions revealed explicitly the influence of the
gradient noise, data characteristics, and subspace constraints, on the network performance. Finally, among many
possible convex formulations, we considered the design of feasible distributed solution that minimizes the number
of edges to be added to the original graph.
17
APPENDIX A
PROOF OF THEOREM 1
To simplify the notation, we introduce the difference vector zi (cid:44) (cid:101)We
Bi−1 = B + µAe(cid:101)Hi−1,
Bi−1 in (35), we can write:
i − (cid:101)We(cid:48)
i . Using (44) in the expression for
(87)
(88)
(89)
(90)
(91)
(92)
(93)
in terms of the constant coefficient matrix B in (42). Using (87) and (43), and subtracting (32) and (47), we then
get:
If we multiply both sides of (88) from the left by (V e
)−1 we obtain:
zi = Bzi−1 + µAeci−1.
+
ci−1
c(cid:86)i−1
z(cid:86)i−1
)−1ci−1 into:
z(cid:86)i
zi
zi−1
= B
zi
, µΛe
(V e
z(cid:86)i
ci−1
c(cid:86)i−1
where we partitioned the vectors (V e
)−1zi and µΛe
(V e
)−1zi (cid:44)
(V e
)−1ci−1 (cid:44)
with the leading vectors, {zi, ci−1}, having dimensions hP × 1 each. The matrix B is given by:
B (cid:44) (V e
(42),(25)
= Λe
(V e
)−1BV e
− µΛe
IhP − D11
−D21
)−1HoV e
−D12
J e
− D22
=
with the blocks {Dmn} given by:
D11 (cid:44) µ (U e)∗HoU e,
D21 (cid:44) µJ e
(V e
D12 (cid:44) µ (U e)∗HoV e
R,,
L,)∗HoV e
R,.
L,)∗HoU e, D22 (cid:44) µJ e
(V e
18
Recursion (89) has a form similar to the earlier recursion (66) in Part I [2] with three differences. First, the
matrices {Dmn} in (90) are constant matrices; nevertheless, they satisfy the same bounds as the matrices {Dmn,i−1}
in eq. (66) in Part I [2]. In particular, from (115), (116), and (122) in Part I [2], it continues to hold that:
(cid:107)IhP − D11(cid:107) ≤ 1 − µσ11,
(cid:107)D21(cid:107) ≤ µσ21,
(cid:107)D12(cid:107) ≤ µσ12,
(cid:107)D22(cid:107) ≤ µσ22,
(94)
(95)
for some positive constants σ11, σ12, σ21, σ22 that are independent of µ. Second, Third, the bias term b(cid:86)e in (66) in
Part I [2] is absent from (90). Third, the gradient noise terms that appeared in recursion (66) in Part I [2] are now
replaced by the perturbation sequences {ci−1, c(cid:86)i−1}. However, these sequences can be bounded as follows:
for some constant r that is independent of µ since:
(cid:107)ci−1(cid:107)2 ≤ µ2r2(cid:107)(cid:101)We
(cid:107)c(cid:86)i−1(cid:107)2 ≤ µ2r2(cid:107)(cid:101)We
i−1(cid:107)4,
i−1(cid:107)4,
)−1ci−1(cid:107)2 ≤ µ2r2(cid:107)(cid:101)We
(V e
(cid:107)µΛe
i−1(cid:107)4.
(97)
To establish the above inequality, we start by noting that any cost Jk(·) satisfying (19) and (31) will also satisfy [4,
Lemmas E.4, E.8]:
(96)
(98)
(99)
(100)
(101)
(102)
(103)
for any ∆wk and where κ(cid:48)
(cid:107)H o
d
Therefore,
wk
wk
(cid:107)∇2
(cid:107)∇2
Jk(wo
Jk(wo
k)(cid:107) ≤ κ(cid:48)
d(cid:107)∆wk(cid:107),
k − t(cid:101)wk,i−1)(cid:107)dt
k + ∆wk) − ∇2
(cid:90) 1
(cid:44) max{κd, (δk − νk)/(h)}. Then, for each agent k we have:
(cid:90) 1
k − H k,i−1(cid:107) (38),(46)≤
d(cid:107)t(cid:101)wk,i−1(cid:107)dt =
(cid:18)
(cid:107)(cid:101)Hi−1(cid:107) (44)
d(cid:107)(cid:101)wk,i−1(cid:107)
k) − ∇2
κ(cid:48)
Jk(wo
Jk(wo
(cid:107)H o
0
κ(cid:48)
(98)≤
1
2
wk
wk
0
(cid:19)
k − H k,i−1(cid:107)
(cid:107)(cid:101)wk,i−1(cid:107)
d(cid:107)(cid:101)We
i−1(cid:107).
κ(cid:48)
= max
1≤k≤N
κ(cid:48)
≤ 1
2
Now, replacing ci−1 in (97) by (43) and using (100) we conclude (97).
max
1≤k≤N
≤ 1
2
d
Repeating the argument that led to inequalities (129) and (130) in Part I [2] we obtain:
E(cid:107)(cid:101)We
i−1(cid:107)4
E(cid:107)zi(cid:107)2 ≤(1 − µσ11)E(cid:107)zi−1(cid:107)2 +
E(cid:107)z(cid:86)i−1(cid:107)2 +
2µσ2
12
σ11
2µr2
σ11
(cid:18)
and
E(cid:107)z(cid:86)i(cid:107)2 ≤
ρ(J) + +
3µ2σ2
22
1 − ρ(J) −
E(cid:107)z(cid:86)i−1(cid:107)2 +
3µ2σ2
21
1 − ρ(J) −
E(cid:107)zi−1(cid:107)2 +
3µ2r2
1 − ρ(J) −
E(cid:107)(cid:101)We
i−1(cid:107)4.
We can combine (101) and (102) into a single inequality recursion as follows:
E(cid:107)zi(cid:107)2
E(cid:107)z(cid:86)i(cid:107)2
(cid:22)
E(cid:107)zi−1(cid:107)2
E(cid:107)z(cid:86)i−1(cid:107)2
+
e
f
E(cid:107)(cid:101)We
i−1(cid:107)4.
(cid:19)
a b
(cid:124)
(cid:123)(cid:122)
c d
Γ
(cid:125)
where a = 1 − O(µ), b = O(µ), c = O(µ2), d = ρ(J) + + O(µ2), e = O(µ), and f = O(µ2). Using (30) and
eq. (134) in Part I [2] we conclude that:
19
E(cid:107)zi(cid:107)2 = O(µ2),
E(cid:107)z(cid:86)i(cid:107)2 = O(µ4),
lim sup
i→∞
lim sup
i→∞
lishes (48). Finally, note that:
(104)
i − (cid:101)We(cid:48)
and, hence, lim supi→∞ E(cid:107)zi(cid:107)2 = O(µ2). It follows that lim supi→∞ E(cid:107)(cid:101)We
i (cid:107)2 = O(µ2), which estab-
i )∗(cid:101)We
i − (cid:101)We
i(cid:107)2 + 2E((cid:101)We(cid:48)
(cid:113)
i
i − (cid:101)We
E(cid:107)(cid:101)We(cid:48)
i(cid:107)2E(cid:107)(cid:101)We
i(cid:107)2
i(cid:107)2 + 2
i(cid:107)2 ≤ E(cid:107)(cid:101)We(cid:48)
≤ E(cid:107)(cid:101)We(cid:48)
i(cid:107)2 + E(cid:107)(cid:101)We
i(cid:107)2 + E(cid:107)(cid:101)We
i (cid:107)2 = E(cid:107)(cid:101)We(cid:48)
i − (cid:101)We
i − (cid:101)We
i − (cid:101)We
i + (cid:101)We
E(cid:107)(cid:101)We(cid:48)
(105)
where we used Ex ≤ Ex from Jensen's inequality and where we applied Holder's inequality:
Ex∗y ≤ (Exp)
1
p (Eyq)
1
q , when 1/p + 1/q = 1.
Hence, from (14) and (48) we get:
(E(cid:107)(cid:101)We(cid:48)
i (cid:107)2 − E(cid:107)(cid:101)We
lim sup
i→∞
i(cid:107)2) ≤ O(µ2) + O(µ3/2) = O(µ3/2)
since µ2 < µ3/2 for small µ (cid:28) 1, which establishes (49).
From (14) and (107), it follows that:
E(cid:107)(cid:101)We(cid:48)
i (cid:107)2 = O(µ),
lim sup
i→∞
and, therefore, the long-term approximate model (47) is also mean-square stable.
APPENDIX B
LOW-RANK APPROXIMATION
From (91), we obtain:
(cid:16)
)(cid:62)(cid:17)−1
(V e
B(cid:62) =
B∗ = ((V e
)∗)
−1
IhP − D(cid:62)
IhP − D∗
−D(cid:62)
12
11
11
−D∗
12
(V e
(V e
)∗
)(cid:62)
(J e
22
21
−D(cid:62)
)(cid:62) − D(cid:62)
−D∗
)∗ − D∗
21
22
(J e
where the block matrices {D(cid:62)
mn,D∗
mn} are all on the order of µ with:
(106)
(107)
(108)
(109)
(110)
(111)
D(cid:62)
11 = µ (U e)(cid:62)(Ho)(cid:62)[(U e)∗](cid:62) = O(µ),
D∗
11 = D11 = µ (U e)∗HoU e = O(µ),
(112)
of dimensions hP ×hP . Substituting (109) and (110) into (55) and using property (A⊗b B)(C⊗b D) = AC⊗b BD,
for block Kronecker products, we obtain:
(V e
)∗(cid:17)−1 X(cid:16)
)∗(cid:17)
)(cid:62) ⊗b (V e
)(cid:62) ⊗b (V e
F =
(113)
(V e
(cid:16)
,
20
where we introduced:
X (cid:44)
IhP − D(cid:62)
11
−D(cid:62)
12
−D(cid:62)
)(cid:62) − D(cid:62)
21
22
(J e
We partition X into the following block structure:
where, for example, X11 is (hP )2 × (hP )2 and is given by:
Since
(I − F)−1=
(V e
)(cid:62) ⊗b (V e
we proceed to evaluate I − F. It follows that:
I − X =
−D∗
)∗ − D∗
21
22
(J e
)∗(cid:17)
(V e
)(cid:62) ⊗b (V e
.
(114)
(115)
(116)
(117)
(118)
X11 (cid:44)(cid:16)
(cid:16)
X =
IhP − D(cid:62)
12
11
−D∗
X21 X22
IhP − D∗
⊗b
X11 X12
(cid:17) ⊗ (IhP − D∗
−1(cid:16)
)∗(cid:17)−1
I(hP )2 − X11 −X12
(cid:17) ⊗ (IhP − D∗
I − X22
(I − X )
−X21
11) .
11
(119)
(120)
(121)
(122)
and, in a manner similar to the way we assessed the size of the block matrices {Dmn,i−1} in the proof of Theorem 1
in Part I [2], we can verify that:
I − X11 = I(hP )2 −(cid:16)
IhP − D(cid:62)
X12 = O(µ), X21 = O(µ),
11
11) = O(µ),
I − X22 = O(1).
The matrix I − X is invertible since I − F is invertible; this is because ρ(F) = [ρ(B)]2 < 1. Therefore, applying
the block matrix inversion formula to I − X we get:
(I(hP )2 − X11)−1 0
+
0
0
Y11 Y12
Y21 ∆−1
(I − X )
−1 =
where Y11 = (I − X11)−1X12∆−1X21(I − X11)−1, Y12 = (I − X11)−1X12∆−1, Y21 = ∆−1X21(I − X11)−1, and
∆ = (I − X22) − X21(I − X11)−1X12. The entries of (I(hP )2 − X11)−1 are O(1/µ), while the entries in the second
matrix on the right-hand side of the above equation are O(1) when the step-size is small. That is, we can write:
Moreover, since O(1/µ) dominates O(1) for sufficiently small µ, we can also write:
O(1) O(1)
.
O(1/µ) O(1)
+ O(1)
11 ⊗ I(hP ))(cid:1)−1 0
0
11) + (D(cid:62)
(I − X )
−1 =
0
(I(hP )2 − X11)−1 0
(cid:0)(I(hP ) ⊗ D∗
Z−1(cid:104)
I(hP )2
0
I(hP )2
0
0
(cid:105)
0
+ O(1).
(I − X )
−1 =
=
=
+ O(1)
where the term involving se
i (We
i−1) is eliminated because E[se
E[(cid:101)We(cid:48)
i F i−1] = B(cid:101)We(cid:48)
i−1 + µAebe,
(124)
(cid:17)
i = B(cid:16)E(cid:101)We(cid:48)
iF i−1] = 0. Taking expectations again we arrive at:
E(cid:101)We(cid:48)
+ µAebe.
i − E(cid:101)We(cid:48)
(cid:44) (cid:101)We(cid:48)
(125)
i−1
i .
21
Substituting (122) into (117) we arrive at (59). Since Z = O(µ), we conclude that (57) holds. We also conclude
that (58) holds since:
(I − F)−1 = (I − X )−1.
APPENDIX C
PROOF OF THEOREM 2
(123)
Consider the long-term model (47). Conditioning both sides of (47) on F i−1, invoking the conditions on the
gradient noise process from Assumption 2, and computing the conditional expectation, we obtain:
Since recursion (47) includes a constant driving term µAebe, we introduce the centered variable yi
Subtracting (125) from (47), we find that yi satisfies the following recursion:
i (Wi−1).
yi = Byi−1 − µAese
Although we are interested in evaluating lim supi→∞ E(cid:107)(cid:101)We(cid:48)
i (cid:107)2 − (cid:107)E(cid:101)We(cid:48)
E(cid:107)zi(cid:107)2 = E(cid:107)(cid:101)We(cid:48)
(127)
where we used the fact that lim supi→∞ (cid:107)E(cid:101)We(cid:48)
i (cid:107) = O(µ) (see Appendix H). Therefore, from (49) and (127), we
E(cid:107)(cid:101)We
(126)
i (cid:107)2, we can still rely on yi since it holds for i (cid:29) 1:
i (cid:107)2 = E(cid:107)(cid:101)We(cid:48)
E(cid:107)yi(cid:107)2 + O(µ3/2).
i (cid:107)2 + O(µ2),
obtain:
(128)
i(cid:107)2 = lim sup
i→∞
1
hN
lim sup
i→∞
1
hN
Let Σ denote an arbitrary Hermitian positive semi-definite matrix that we are free to choose. Equating the squared
weighted values of both sides of (126) and taking expectations conditioned on the past history gives:
E[(cid:107)yi(cid:107)2
ΣF i−1] = (cid:107)yi−1(cid:107)2B∗ΣB + µ2E[(cid:107)se
(Ae)∗ΣAeF i−1].
i(cid:107)2
Taking expectations again, we get:
E(cid:107)yi(cid:107)2
Σ = E(cid:107)yi−1(cid:107)2B∗ΣB + µ2E(cid:107)se
i(cid:107)2
(Ae)∗ΣAe.
(129)
(130)
From (54) and using same arguments as in [4, pp. 586], we can rewrite the second term on the R.H.S. of (130) as:
i(cid:107)2
µ2E(cid:107)se
(Ae)∗ΣAe = µ2Tr (ΣAeE[se
i ](Ae)∗)
i se∗
= Tr(ΣY) + Tr(Σ) · O(µ2+γm).
for i (cid:29) 1. Therefore, we obtain:
E(cid:107)yi(cid:107)2
Σ−B∗ΣB = Tr(ΣY) + Tr(Σ) · O(µ2+γm).
lim sup
i→∞
(131)
(132)
22
In order to reduce the weighting matrix on the mean-square value of zi in (132) to the identity, we need to select
Σ as the solution to the following Lyapunov equation:
(133)
This equation has a unique Hermitian non-negative definite solution Σ [4, pp. 772] since the matrix B is stable for
sufficiently small step-size. Now, by applying the block vectorization operation to both sides of (133) and by using
Σ − B∗ΣB = IhM .
the property that:
we find that:
bvec(ACB) = (B(cid:62) ⊗b A)bvec(C),
bvec(Σ) = (I − F)−1bvec(IhM )
(134)
(135)
in terms of the matrix F defined in (55).
Now, substituting Σ in (135) into (132), we obtain E(cid:107)yi(cid:107)2 on the left-hand side while the term Tr(ΣY) on the
right-hand side becomes:
Tr(ΣY) = (bvec(Y(cid:62)))(cid:62)(I − F)−1bvec(IhM ).
(136)
where we used the property that:
(137)
Using the fact that (I − F)−1 = O(1/µ) and following similar arguments as in [4, pp. 590], we can show that:
Tr(AB) = [bvec(B(cid:62))](cid:62)bvec(A),
Tr(Σ) · O(µ2+γm) = O(µ1+γm).
(138)
Replacing (136) and (138) into (132) gives (61). Observe that the first term on the R.H.S. of (61) is O(µ) since
(cid:107)Y(cid:107) = O(µ2) and (cid:107)(I − F)−1(cid:107) = O(1/µ). Therefore, this term dominates the factor O(µ1+γm).
Since F is a stable matrix for sufficiently small step-sizes, we can employ the expansion (I − F)−1 = I + F +
F 2 + F 3 + . . . , replace F by (55), and use properties (137) and (134) to write the first term on the R.H.S. of (61)
as(cid:80)∞
n=0 Tr(BnY(B∗)n).
Now, in order to establish (65), we shall use the low-rank approximation (59). Using definition (12) and (61),
we obtain:
MSD =
µ
hN
lim
µ→0
lim sup
i→∞
1
µ
From (59) we get:
(bvec(Y(cid:62)))(cid:62)(I − F)−1bvec(IhM ) = (bvec(Y(cid:62)))(cid:62)(cid:16)
(U e)(cid:62) ⊗b (U e)∗(cid:17)
(cid:16)
(bvec(Y(cid:62)))(cid:62)(I − F)−1bvec(IhM )
(139)
[(U e)∗](cid:62) ⊗b U e(cid:17)
Z−1(cid:16)
(U e)(cid:62) ⊗b (U e)∗(cid:17)
bvec(IhM ) + O(µ2).
(140)
Using property (134), it is straightforward to verify that the last three terms combine into the following result:
bvec(IhM ) = bvec(IhP ) = vec(IhP ),
(141)
Let us therefore evaluate the matrix vector product x (cid:44) Z−1vec(IhP ). Using the definition (60) for Z, the vector
x is therefore the unique solution to the linear system of equations:
23
(IhP ⊗ D∗
11)x + (D(cid:62)
11 ⊗ IhP )x = vec(IhP ).
(142)
Let X = unvec(x) denote the hP × hP matrix whose vector representation is x. Applying to each of the terms
appearing on the left-hand side of the above expression the Kronecker product property (134), albeit using vec
instead of bvec operation, we find that (IhP ⊗D∗
11 ⊗ IhP )x = vec(XD11). We conclude
from these equalities and from (142) that X is the unique solution to the (continuous-time) Lyapunov equation
D∗
11X + XD11 = IhP . Since D11 in (92) is Hermitian, we obtain:
11X), and (D(cid:62)
11)x = vec(D∗
X =
D−1
11 =
1
2
1
2µ
((U e)∗HoU e)
−1 .
(143)
Therefore, substituting into (140) gives:
(bvec(Y(cid:62)))(cid:62)(I − F)−1bvec(IhM ) = (bvec(Y(cid:62)))(cid:62)(cid:16)
[(U e)∗](cid:62) ⊗b U e(cid:17)
vec(X) + O(µ2)
(134)
(63)
(137)
= (bvec(Y(cid:62)))(cid:62)bvec(U eX(U e)∗) + O(µ2)
= Tr(U eX(U e)∗Y) + O(µ2) = Tr((U e)∗YU eX) + O(µ2)
= µ2Tr((U e)∗AeS(Ae)∗U eX) + O(µ2)
= µ2Tr((U e)∗SU eX) + O(µ2)
(cid:17)
(cid:16)
(143)
=
µ
2
Tr
((U e)∗HoU e)
−1 ((U e)∗SU e)
+ O(µ2).
(144)
where we used the fact that (U e)∗Ae = (U e)∗. Now substituting the above expression into the right-hand side
of (139) and computing the limit as µ → 0, we arrive at expression (65).
APPENDIX D
PROJECTION ONTO Ω1 IN (75) AND Ω2 IN (76)
The closed convex set Ω1 in (75) can be rewritten alternatively as:
Ω1 = {AAU = U,U(cid:62)A = U(cid:62),A = A(cid:62)},
and the projection onto it is given by:
arg minA
ΠΩ1(D) =
1
2(cid:107)A − D(cid:107)2
F
subject to AU = U,U(cid:62)A = U(cid:62),A = A(cid:62).
The Lagrangian of the convex optimization problem in (146) is defined as:
L(A; X, Y, W ) =
1
2
(cid:107)A − D(cid:107)2
F + Tr(X(cid:62)(AU − U))+
Tr(Y (cid:62)(U(cid:62)A − U(cid:62))) + Tr(Z(cid:62)(A − A(cid:62))),
(145)
(146)
(147)
24
where X ∈ RM×P , Y ∈ RP×M , and Z ∈ RM×M are the matrices of Lagrange multipliers. From the Karush-
Kuhn-Tucker (KKT) conditions, we obtain at the optimum (Ao; X o, Y o, Zo):
AoU = U,
U(cid:62)Ao = U(cid:62),
Ao = (Ao)(cid:62),
∇AL = Ao − D + X oU(cid:62) + UY o + Zo − (Zo)(cid:62) = 0.
From (151), we obtain:
Ao = D − X oU(cid:62) − UY o − Zo + (Zo)(cid:62).
Multiplying both sides of (152) by U and using the fact that U(cid:62)U = I from Assumption 3, we obtain:
AoU = DU − X o − UY oU − ZoU + (Zo)(cid:62)U.
Combining the previous expression with (148), we get:
X o = DU − UY oU − ZoU + (Zo)(cid:62)U − U.
Replacing (154) into (152) and using the fact that PU = UU(cid:62), we arrive at:
Ao =D − DPU + UY oPU + ZoPU − (Zo)(cid:62)PU + PU − UY o − Zo + (Zo)(cid:62).
Pre-multiplying both sides of the previous equation by U(cid:62) and using the fact that U(cid:62)U = I, we obtain:
(148)
(149)
(150)
(151)
(152)
(153)
(154)
(155)
U(cid:62)Ao = U(cid:62)D − U(cid:62)DPU + Y oPU + U(cid:62)ZoPU − U(cid:62)(Zo)(cid:62)PU + U(cid:62) − Y o − U(cid:62)Zo + U(cid:62)(Zo)(cid:62).
(156)
Combining the previous expression with (149), we arrive at:
U(cid:62)D − U(cid:62)DPU + Y oPU + U(cid:62)ZoPU − U(cid:62)(Zo)(cid:62)PU − Y o − U(cid:62)Zo + U(cid:62)(Zo)(cid:62) = 0.
(157)
Pre-multiplying both sides of the previous equation by U and using the fact that PU = UU(cid:62), we obtain:
UY oPU − UY o = − PUD + PUDPU − PUZoPU + PU(Zo)(cid:62)PU + PUZo − PU(Zo)(cid:62).
(158)
Replacing (158) into (155), we arrive at:
Ao =(I − PU)D(I − PU) − (I − PU)(Zo − (Zo)(cid:62))(I − PU) + PU,
and thus,
Ao(cid:62) = (I − PU)D(cid:62)(I − PU) + (I − PU)(Zo − (Zo)(cid:62))(I − PU) + PU
Combining (150) and the previous two equations, we obtain:
(cid:18)D − D(cid:62)
(cid:19)
(I − PU)
2
(I − PU)=(I − PU)(Zo − (Zo)(cid:62))(I − PU)
(159)
(160)
(161)
Replacing the previous equation into (159), we arrive at:
Now, projecting a symmetric matrix C onto Ω2 in (76) is given by:
2(cid:107)A − C(cid:107)2
F
ΠΩ2(C) =
subject to (cid:107)A − PU(cid:107) ≤ 1 −
(cid:19)
(I − PU) + PU
(I − PU) + PU.
ΠΩ1(D) = (I − PU)
= (I − PU)
2
2
(cid:18)
D − D − D(cid:62)
(cid:18)D + D(cid:62)
(cid:19)
arg minA
arg minY
1
= PU +
= PU + ΠΩ3(C − PU)
1
2(cid:107)Y − (C − PU)(cid:107)2
F
subject to (cid:107)Y(cid:107) ≤ 1 −
25
(162)
(163)
(164)
(165)
eigenvalue decomposition C −PU =(cid:80)M
where Ω3 (cid:44) {A(cid:107)A(cid:107) ≤ 1 − }. In order to project the symmetric matrix C − PU onto Ω3, we need to compute its
m=1 to have absolute
m and then threshold the eigenvalues {λm}M
m=1 λmvmv(cid:62)
magnitude at most 1 − [26, pp. 191 -- 194]. Thus we obtain:
where:
−1 + ,
λm,
1 − ,
Now, replacing the matrix C by (162), we obtain (79).
βm =
ΠΩ2(C) = PU +
βmvmv(cid:62)
m,
M(cid:88)
m=1
if λm < −1 + ,
if λm < 1 − ,
if λm > 1 − .
APPENDIX E
PROOF OF LEMMA 2
In order to establish Lemma 2, we first need to introduce Lemmas 3 and 4.
Lemma 3. Let Ω denote a closed convex set. For any C /∈ Ω, Ao = ΠΩ(C) if and only if (cid:104)C − Ao,A − Ao(cid:105) ≤ 0,
∀A ∈ Ω where (cid:104)X, Y (cid:105) = Tr(X(cid:62)Y ).
Proof. (⇒) Let Ao = ΠΩ(C) for any given C /∈ Ω, that is, suppose that Ao is the unique solution to the optimization
problem. Let A ∈ Ω be such that A (cid:54)= Ao. Let α ∈ (0, 1). Since Ω is convex, (1−α)Ao+αA = Ao+α(A−Ao) ∈ Ω.
By the assumed optimality of Ao, we must have:
(cid:107)C − Ao(cid:107)2
F ≤ (cid:107)C − [Ao + α(A − Ao)](cid:107)2
F + α2(cid:107)A − Ao(cid:107)2
= (cid:107)C − Ao(cid:107)2
F
F − 2α(cid:104)C − Ao,A − Ao(cid:105),
and we obtain:
(cid:104)C − Ao,A − Ao(cid:105) ≤ α
2
(cid:107)A − Ao(cid:107)2
F.
(166)
(167)
26
Now, note that (167) holds for any α ∈ (0, 1). Since the RHS of (167) can be made arbitrarily small for a given
A, the LHS can not be strictly positive. Thus, we conclude as desired:
(cid:104)C − Ao,A − Ao(cid:105) ≤ 0, ∀A ∈ Ω.
(168)
(⇐) Let Ao ∈ Ω be such that (cid:104)C − Ao,A − Ao(cid:105) ≤ 0,∀A ∈ Ω. We shall show that it must be the optimal solution.
Let A ∈ Ω and A (cid:54)= Ao. We have:
(cid:107)C − A(cid:107)2
F − (cid:107)C − Ao(cid:107)2
F = (cid:107)C − Ao + Ao − A(cid:107)2
= (cid:107)C − Ao(cid:107)2
F + (cid:107)Ao − A(cid:107)2
F − (cid:107)C − Ao(cid:107)2
F
F − 2(cid:104)C − Ao,A − Ao(cid:105) − (cid:107)C − Ao(cid:107)2
F > 0.
Hence, Ao is the optimal solution to the optimization problem, and thus Ao = ΠΩ(C) by definition.
Lemma 4. If Ω is further affine, then, for any C /∈ Ω, Ao = ΠΩ(C) if and only if (cid:104)C − Ao,A − Ao(cid:105) = 0, ∀A ∈ Ω.
Proof. (⇒) Let Ao = ΠΩ(C) for any given C /∈ Ω, that is, suppose that Ao is the unique solution to the optimization
problem. Let A ∈ Ω be such that A (cid:54)= Ao. Let α ∈ R. Since Ω is affine, (1− α)Ao + αA = Ao + α(A−Ao) ∈ Ω.
By the assumed optimality of Ao, we must have:
(169)
(cid:107)C − Ao(cid:107)2
F ≤ (cid:107)C − [Ao + α(A − Ao)](cid:107)2
= (cid:107)C − Ao(cid:107)2
F + α2(cid:107)A − Ao(cid:107)2
F
F − 2α(cid:104)C − Ao,A − Ao(cid:105),
and we obtain:
If α ≥ 0, we obtain:
2α(cid:104)C − Ao,A − Ao(cid:105) ≤ α2(cid:107)A − Ao(cid:107)2
F.
(cid:104)C − Ao,A − Ao(cid:105) ≤ α
2
(cid:107)A − Ao(cid:107)2
F.
(170)
(171)
(172)
Now, note that (172) holds for any α ≥ 0. Since the RHS of (172) can be made arbitrarily small for a given A,
the LHS can not be strictly positive. Thus, we conclude:
If α ≤ 0, we obtain:
(cid:104)C − Ao,A − Ao(cid:105) ≤ 0, ∀A ∈ Ω.
(cid:104)C − Ao,A − Ao(cid:105) ≥ α
2
(cid:107)A − Ao(cid:107)2
F.
(173)
(174)
Now, note that (174) holds for any α ≤ 0. Since the RHS of (174) can be made arbitrarily large for a given A,
the LHS can not be strictly negative. Thus, we conclude:
(cid:104)C − Ao,A − Ao(cid:105) ≥ 0, ∀A ∈ Ω.
Combining (173) and (175), we conclude as desired:
(cid:104)C − Ao,A − Ao(cid:105) = 0, ∀A ∈ Ω.
(175)
(176)
(⇐) Let Ao ∈ Ω be such that (cid:104)C − Ao,A − Ao(cid:105) = 0,∀A ∈ Ω. We shall show that it must be the optimal solution.
Let A ∈ Ω and A (cid:54)= Ao. We have:
27
(cid:107)C − A(cid:107)2
F − (cid:107)C − Ao(cid:107)2
F = (cid:107)C − Ao + Ao − A(cid:107)2
= (cid:107)C − Ao(cid:107)2
F + (cid:107)Ao − A(cid:107)2
F − (cid:107)C − Ao(cid:107)2
F
F > 0.
Hence, Ao is the optimal solution to the optimization problem, and thus Ao = ΠΩ(C) by definition.
F − 2(cid:104)C − Ao,A − Ao(cid:105) − (cid:107)C − Ao(cid:107)2
Now we prove Lemma 2. Let Y = ΠΩ1(C). From Lemma 4, we have:
(cid:104)C − Y,A − Y (cid:105) = 0,
∀A ∈ Ω1.
Let Z = ΠΩ2(Y ). From Lemma 3, we have:
(cid:104)Y − Z,A − Z(cid:105) ≤ 0,
∀A ∈ Ω2.
For Z = ΠΩ2(ΠΩ1(C)) to be the projection of C onto Ω1 ∩ Ω2, we need to show from Lemma 3 that:
(cid:104)C − Z,A − Z(cid:105) ≤ 0,
∀A ∈ Ω1 ∩ Ω2,
under the conditions in Lemma 2. For any A ∈ Ω1 ∩ Ω2, we have:
(cid:104)C − Z,A − Z(cid:105) = (cid:104)C − Y + Y − Z,A − Z(cid:105)
= (cid:104)C − Y,A − Z(cid:105) + (cid:104)Y − Z,A − Z(cid:105)
= (cid:104)C − Y,A − Y + Y − Z(cid:105) + (cid:104)Y − Z,A − Z(cid:105)
= (cid:104)C − Y,A − Y (cid:105)
− (cid:104)C − Y, Z − Y (cid:105)
=0 from (178) and Z∈Ω1
(cid:125)
(cid:124)
=0 from (178)
(cid:125)
(cid:124)
(cid:123)(cid:122)
(cid:124)
(cid:123)(cid:122)
(cid:123)(cid:122)
+(cid:104)Y − Z,A − Z(cid:105)
≤ 0
≤0 from (179)
(cid:125)
(177)
(178)
(179)
(180)
(181)
which concludes the proof.
APPENDIX F
STABILITY OF FOURTH-ORDER ERROR MOMENT
In this Appendix, we show that, under the same settings of Theorem 1 in [2] with the second-order moment
condition (24) replaced by the fourth-order moment condition (29), the fourth-order moment of the network error
vector is stable for sufficiently small µ, namely, (30) holds for small enough µ. We start by recalling that for any
two complex column vectors x and y, it holds that (cid:107)x + y(cid:107)4 ≤ (cid:107)x(cid:107)4 + 3(cid:107)y(cid:107)4 + 8(cid:107)x(cid:107)2(cid:107)y(cid:107)2 + 4(cid:107)x(cid:107)2Re(x∗y) [4,
28
pp. 523]. Applying this inequality to eq. (60) in [2], conditioning on F i−1, computing the expectations of both
sides, using Assumption 2, taking expectations again, and exploiting the convexity of (cid:107)x(cid:107)4, we conclude that:
i−1(cid:107)4 + 3E(cid:107)se
i(cid:107)4+
i−1(cid:107)2(cid:1)(cid:0)E(cid:107)se
i(cid:107)2(cid:1)
E(cid:107)We
i(cid:107)4 ≤ E(cid:107)(IhP − D11,i−1)We
8E
= E(cid:107)(1 − t)
i−1 − D12,i−1W(cid:86)e
8E(cid:0)(cid:107)(IhP − D11,i−1)We
(cid:18)
1
1 − t
(cid:107)(1 − t)
i−1 − D12,i−1W(cid:86)e
i−1 − t
1
t
(IhP − D11,i−1)We
(IhP − D11,i−1)We
1
1 − t
(1 − t)3
i−1(cid:107)4(cid:3) +
E(cid:2)(cid:107)IhP − D11,i−1(cid:107)2(cid:107)We
i−1 − t
1
t3
E(cid:2)(cid:107)IhP − D11,i−1(cid:107)4(cid:107)We
i(cid:107)2(cid:1)(cid:18) 1
8(cid:0)E(cid:107)se
≤ (1 − µσ11)4
i(cid:107)2(cid:1)(cid:18) (1 − µσ11)2
8(cid:0)E(cid:107)se
(1 − t)3
1 − t
i−1(cid:107)4 +
µ4σ4
12
t3
E(cid:107)We
E(cid:107)We
E(cid:107)W(cid:86)e
≤
1
1 − t
D12,i−1W(cid:86)e
1
t
i(cid:107)4+
i−1(cid:107)2
i−1(cid:107)4 + 3E(cid:107)se
(cid:19)(cid:0)E(cid:107)se
i(cid:107)2(cid:1)
i−1(cid:107)4(cid:3) + 3E(cid:107)se
i−1(cid:107)2(cid:3)(cid:19)
E(cid:2)(cid:107)D12,i−1(cid:107)2(cid:107)W(cid:86)e
D12,i−1W(cid:86)e
E(cid:2)(cid:107)D12,i−1(cid:107)4(cid:107)W(cid:86)e
i−1(cid:107)2(cid:3) +
i(cid:107)4+
1
t
i(cid:107)4+
i−1(cid:107)4 + 3E(cid:107)se
µ2σ2
i−1(cid:107)2 +
12
t
E(cid:107)W(cid:86)e
i−1(cid:107)2
(cid:19)
,
(182)
for any arbitrary positive number t ∈ (0, 1). In the last inequality we used the bounds (115) and (116) in [2]. By
selecting t = µσ11, we arrive at:
E(cid:107)We
i(cid:107)4 ≤ (1 − µσ11)E(cid:107)We
i−1(cid:107)4 +
i(cid:107)2(cid:1)(cid:18)
8(cid:0)E(cid:107)se
E(cid:107)W(cid:86)e
µσ4
12
σ3
11
(1 − µσ11)E(cid:107)We
i−1(cid:107)4 + 3E(cid:107)se
µσ2
i−1(cid:107)2 +
12
σ11
i(cid:107)4+
E(cid:107)W(cid:86)e
i−1(cid:107)2
(cid:19)
.
(183)
Applying similar arguments for relation (61) in [2] and using the relation (cid:107)a + b + c(cid:107)4 ≤ 27(cid:107)a(cid:107)4 + 27(cid:107)b(cid:107)4 + 27(cid:107)c(cid:107)4,
we obtain:
29
E(cid:107)W(cid:86)e
i(cid:107)4 ≤ E(cid:107)(J e
8
8
E
1
t
1
t
= E
J e
W(cid:86)e
(cid:107)4E(cid:107)W(cid:86)e
− D22,i−1)W(cid:86)e
− D22,i−1)W(cid:86)e
i−1 − (1 − t)
(cid:16)E(cid:107)(J e
(cid:13)(cid:13)(cid:13)(cid:13)t
(cid:32)
(cid:13)(cid:13)(cid:13)(cid:13)t
i(cid:107)2(cid:1)(cid:18) 1
t3(cid:107)J e
≤ 1
8(cid:0)E(cid:107)s(cid:86)e
i(cid:107)2(cid:1)(cid:18) 1
t3(cid:107)J e
≤ 1
8(cid:0)E(cid:107)s(cid:86)e
≤ (ρ(J) + )4
i(cid:107)2(cid:1)(cid:18) (ρ(J) + )2
8(cid:0)E(cid:107)s(cid:86)e
J e
W(cid:86)e
i−1(cid:107)4 +
(cid:107)J e
t
i−1(cid:107)4 +
(cid:107)J e
(cid:107)4E(cid:107)W(cid:86)e
t
E(cid:107)W(cid:86)e
i−1(cid:107)4 +
t3
1
t
(1 − t)3
(cid:107)2E(cid:107)W(cid:86)e
27
)
)
i(cid:107)4+
+ 3E(cid:107)s(cid:86)e
(cid:13)(cid:13)(cid:13)(cid:13)2(cid:33)(cid:0)E(cid:107)s(cid:86)e
i(cid:107)2(cid:1)
i−1 − b(cid:86)e
(cid:19)
i−1 − b(cid:86)e(cid:107)4 + 3E(cid:107)s(cid:86)e
i(cid:107)4+
i−1 − b(cid:86)e(cid:107)2
(cid:19)
i(cid:107)4+
i−1(cid:107)4 + (cid:107)b(cid:86)e(cid:107)4) + 3E(cid:107)s(cid:86)e
i−1(cid:107)2 + (cid:107)b(cid:86)e(cid:107)2)
(cid:19)
i(cid:107)4+
i−1(cid:107)2 + E(cid:107)D21,i−1(cid:107)2(cid:107)We
i−1(cid:107)4 +
3µ2σ2
21
1 − t
(1 − t)3(cid:107)b(cid:86)e(cid:107)4 + 3E(cid:107)s(cid:86)e
(cid:107)b(cid:86)e(cid:107)2
E(cid:107)We
i−1(cid:107)2 +
3
1 − t
27
i−1 + b(cid:86)e(cid:107)4 + 3E(cid:107)s(cid:86)e
i−1 + b(cid:86)e(cid:107)2(cid:17)(cid:0)E(cid:107)s(cid:86)e
i(cid:107)2(cid:1)
i(cid:107)4+
i−1 + D21,i−1We
i−1 − b(cid:86)e
(cid:13)(cid:13)(cid:13)(cid:13)4
i−1 − D21,i−1We
i−1 − D21,i−1We
(D22,i−1W(cid:86)e
1
1 − t
i−1 − (1 − t)
(D22,i−1W(cid:86)e
1
1 − t
E(cid:107)D22,i−1W(cid:86)e
i−1 + D21,i−1We
i−1 + D21,i−1We
E(cid:107)D22,i−1W(cid:86)e
i−1(cid:107)2 +
1
1 − t
i−1 + D21,i−1We
i−1(cid:107)4 + E(cid:107)D21,i−1(cid:107)4(cid:107)We
(cid:107)2E(cid:107)W(cid:86)e
i−1(cid:107)2 +
(E(cid:107)D22,i−1(cid:107)2(cid:107)W(cid:86)e
(1 − t)3 (E(cid:107)D22,i−1(cid:107)4(cid:107)W(cid:86)e
3
1 − t
i−1(cid:107)4 +
E(cid:107)W(cid:86)e
3µ2σ2
22
1 − t
i−1(cid:107)2 +
27µ4σ4
22
(1 − t)3
E(cid:107)W(cid:86)e
27µ4σ4
21
(1 − t)3
E(cid:107)W(cid:86)e
E(cid:107)We
i−1(cid:107)2 +
(184)
for any arbitrary positive number t ∈ (0, 1). In the last inequality we used relation (122) in [2]. Selecting t =
ρ(J) + < 1, we arrive at:
E(cid:107)W(cid:86)e
i(cid:107)4 ≤ (ρ(J) + )E(cid:107)W(cid:86)e
i(cid:107)2(cid:1)(cid:18)
8(cid:0)E(cid:107)s(cid:86)e
27µ4σ4
i−1(cid:107)4 +
22
(1 − t)3
(ρ(J) + )E(cid:107)W(cid:86)e
E(cid:107)W(cid:86)e
i−1(cid:107)2 +
E(cid:107)We
i−1(cid:107)4 +
3µ2σ2
22
1 − t
27µ4σ4
21
(1 − t)3
E(cid:107)W(cid:86)e
i−1(cid:107)2 +
i−1(cid:107)4 +
3µ2σ2
21
1 − t
27
(1 − t)3(cid:107)b(cid:86)e(cid:107)4 + 3E(cid:107)s(cid:86)e
E(cid:107)We
(cid:107)b(cid:86)e(cid:107)2
i−1(cid:107)2 +
3
1 − t
(cid:19)
i(cid:107)4+
where 1 − t = 1 − ρ(J) − .
(185)
In order to bound the fourth-order noise terms E(cid:107)se
i(cid:107)4 and E(cid:107)s(cid:86)e
i(cid:107)4 appearing in (183) and (185), we first note
from eq. (58) in [2] that:
Now, applying Jensen's inequality to the convex function f (x) = x2, we can write:
E(cid:107)se
i(cid:107)4 + E(cid:107)s(cid:86)i(cid:107)4 ≤ E((cid:107)se
(cid:33)2
(cid:32) N(cid:88)
i(cid:107)2 + (cid:107)s(cid:86)i(cid:107)2)2=E(cid:107)µ(V e
)−1Aese
(cid:33)2
(cid:32) N(cid:88)
(cid:107)sk,i(cid:107)2
= 4E
N(cid:107)sk,i(cid:107)2
1
N
≤ 4NE
k=1
k=1
(cid:32) N(cid:88)
k=1
i(cid:107)4 ≤ µ4v4
1
E(cid:107)se
i(cid:107)4.
(cid:33)
(cid:107)sk,i(cid:107)4
= 4N
E(cid:107)se
i(cid:107)4 = E((cid:107)se
i(cid:107)2)2 = 4E
(186)
N(cid:88)
k=1
E(cid:107)sk,i(cid:107)4,
(187)
30
in terms of the individual gradient noise processes, E(cid:107)sk,i(cid:107)4. For each term sk,i, we have from (29) and from the
Jensen's inequality applied to the convex norm (cid:107)x(cid:107)4:
E(cid:107)sk,i(wk,i−1)(cid:107)4 ≤ (β4,k/h)4E(cid:107)wk,i−1(cid:107)4 + σ4
= (β4,k/h)4E(cid:107)wk,i−1 − wo
s4,k
k(cid:107)4 + σ4
≤ 8(β4,k/h)4E(cid:107)(cid:101)wk,i−1(cid:107)4 + 8(β4,k/h)4(cid:107)wo
k + wo
s4,k
k(cid:107)4 + σ4
s4,k
≤ ¯β4
4,k
E(cid:107)(cid:101)wk,i−1(cid:107)4 + ¯σ4
k(cid:107)4 + σ4
s4,k
N(cid:88)
where ¯β4
4,k = 8(β4,k/h)4 and ¯σ4
s4,k = 8(β4,k/h)4(cid:107)wo
s4,k. Using the relations,
k=1
(cid:107)(cid:101)We
(cid:107)(cid:101)wk,i−1(cid:107)4 ≤ ((cid:107)(cid:101)w1,i−1(cid:107)2+(cid:107)(cid:101)w2,i−1(cid:107)2+. . .+(cid:107)(cid:101)wN,i−1(cid:107)2)2 = (cid:107)(cid:101)Wi−1(cid:107)4 =
i−1(cid:107)2
i(cid:107)2)2 ≤ 2(cid:107)We
i(cid:107)4 + 2(cid:107)W(cid:86)e
i(cid:107)4,
N(cid:88)
i−1(cid:107)4 = ((cid:107)We
N(cid:88)
the term E(cid:107)si(cid:107)4 in (187) can be bounded as follows:
)−1(cid:101)We
i(cid:107)2 + (cid:107)W(cid:86)e
(cid:107)(V e
2
(cid:18) 1
(188)
(cid:19)2
(cid:107)(cid:101)We
i−1(cid:107)4, (189)
=
1
4
(190)
E(cid:107)se
i(cid:107)4 ≤ 4N
k=1
≤ 4β4
4,max
¯σ4
s4,k
k=1
¯β4
4,k
N(cid:88)
E(cid:107)(cid:101)wk,i−1(cid:107)4 + 4N
E(cid:107)(cid:101)wk,i−1(cid:107)4 + σ4
)−1(cid:101)We
i−1(cid:107)4 + σ4
E(cid:107)V e
(V e
)−1(cid:101)We
(cid:107)4E(cid:107)(V e
i−1(cid:107)4 + σ4
i−1(cid:107)4 + E(cid:107)W(cid:86)e
2[E(cid:107)We
k=1
s4
s4
s4
i−1(cid:107)4] + σ4
s4
4,max
(189)≤ β4
≤ β4
(190)≤ 2β4
4,max(cid:107)V e
4,maxv4
(cid:44) 4N(cid:80)N
k=1 ¯σ4
2[E(cid:107)We
1v4
where β4
4,max
(cid:44) N max1≤k≤N
¯β4
4,k, and σ4
s4
s4,k. Substituting into (186), we get:
E(cid:107)se
i(cid:107)4 + E(cid:107)s(cid:86)i(cid:107)4 ≤ 2µ4β4
4,maxv4
i−1(cid:107)4 + E(cid:107)W(cid:86)e
i−1(cid:107)4] + µ4v4
1σ4
s4.
Returning to (183), and using the bounds (128) in [2] and (192), we find that:
E(cid:107)We
i(cid:107)4 ≤ (1 − µσ11)E(cid:107)We
i−1(cid:107)4 +
3µ4v4
1σ4
8µ2v2
1σ2
8µ3 σ2
12
σ11
1β2
maxv2
s4 + 8µ2v2
s (1 − µσ11)E(cid:107)We
2(E(cid:107)W(cid:86)e
maxv2
1β2
v2
E(cid:107)W(cid:86)e
µσ4
12
σ3
11
2(1 − µσ11)(E(cid:107)We
i−1(cid:107)2 + 8µ3 σ2
12
σ11
i−1(cid:107)2)2 + 8µ3 σ2
12
σ11
i−1(cid:107)4 + 6µ4β4
4,maxv4
2[E(cid:107)We
1v4
i−1(cid:107)2)2 + 8µ2v2
i−1(cid:107)4]+
i−1(cid:107)4 + E(cid:107)W(cid:86)e
2(1 − µσ11)E(cid:107)W(cid:86)e
i−1(cid:107)2+
1β2
maxv2
i−1(cid:107)2E(cid:107)W(cid:86)e
v2
1β2
maxv2
2
E(cid:107)W(cid:86)e
E(cid:107)We
i−1(cid:107)2.
1σ2
v2
s
i−1(cid:107)2E(cid:107)We
i−1(cid:107)2+
Using the properties that, for any two random variables a and c, it holds that [4, pp. 528]:
(Ea)2 ≤ Ea2,
2(Ea2)(Ec2) ≤ Ea4 + Ec4,
(191)
(192)
(193)
we can write:
so that:
where:
2(E(cid:107)We
i−1(cid:107)2)(E(cid:107)W(cid:86)e
(E(cid:107)We
(E(cid:107)W(cid:86)e
i−1(cid:107)2) ≤ E(cid:107)We
i−1(cid:107)2)2 ≤ E(cid:107)We
i−1(cid:107)2)2 ≤ E(cid:107)W(cid:86)e
i−1(cid:107)4 + E(cid:107)W(cid:86)e
i−1(cid:107)4,
i−1(cid:107)4,
i−1(cid:107)4,
E(cid:107)We
i(cid:107)4 ≤ aE(cid:107)We
i−1(cid:107)4 + bE(cid:107)W(cid:86)e
i−1(cid:107)4 + a(cid:48)E(cid:107)We
i−1(cid:107)2 + b(cid:48)E(cid:107)W(cid:86)e
i−1(cid:107)2 + e
a = 1 − µσ11 + O(µ2),
b = O(µ),
a(cid:48) = O(µ2),
b(cid:48) = O(µ3),
e = O(µ4).
Returning to (185) and using similar arguments, we can verify that:
31
(194)
(195)
(196)
(197)
(198)
E(cid:107)W(cid:86)e
i(cid:107)4 ≤ (ρ(J) + )E(cid:107)W(cid:86)e
27
27µ4σ4
22
27µ4σ4
21
1σ4
1β2
E(cid:107)We
i−1(cid:107)4 +
i−1(cid:107)4] + 3µ4v4
(1 − ρ(J) − )3
E(cid:107)W(cid:86)e
(1 − ρ(J) − )3
2[E(cid:107)We
1v4
4,maxv4
i−1(cid:107)4 + E(cid:107)W(cid:86)e
1β2
i−1(cid:107)4 +
i−1(cid:107)4 + E(cid:107)W(cid:86)e
i−1(cid:107)4] + 8(ρ(J) + )µ2v2
1β2
maxv2
2
12µ4v2
2σ2
maxv2
i−1(cid:107)4 + E(cid:107)W(cid:86)e
i−1(cid:107)4]+
22
1 − ρ(J) −
24µ4σ2
maxv2
1β2
21v2
2
1 − ρ(J) −
i−1(cid:107)2+
E(cid:107)We
[E(cid:107)We
E(cid:107)W(cid:86)e
maxv2
E(cid:107)W(cid:86)e
(1 − ρ(J) − )3(cid:107)b(cid:86)e(cid:107)4 + 6µ4β4
2[E(cid:107)We
4(ρ(J) + )µ2v2
i−1(cid:107)2 +
8(ρ(J) + )µ2v2
24µ4v2
2σ2
maxv2
i−1(cid:107)4 +
22
1 − ρ(J) −
maxv2
12µ4σ2
i−1(cid:107)4 + E(cid:107)W(cid:86)e
2
1 − ρ(J) −
maxv2
24µ2v2
i−1(cid:107)2 + E(cid:107)W(cid:86)e
2
1 − ρ(J) −
1σ2
s
E(cid:107)W(cid:86)e
(cid:107)b(cid:86)e(cid:107)2[E(cid:107)We
[E(cid:107)We
i−1(cid:107)2 +
1σ2
21v2
24µ4σ2
s
1 − ρ(J) −
24µ2v2
1σ2
s
1 − ρ(J) −
22v2
24µ4σ2
1σ2
s
1 − ρ(J) −
i−1(cid:107)4] +
i−1(cid:107)2] +
(cid:107)b(cid:86)e(cid:107)2,
21v2
1β2
1β2
1β2
i−1(cid:107)4+
s4+
E(cid:107)W(cid:86)e
i−1(cid:107)4+
E(cid:107)We
i−1(cid:107)4+
so that,
E(cid:107)W(cid:86)e
i(cid:107)4 ≤ cE(cid:107)We
i−1(cid:107)4 + dE(cid:107)W(cid:86)e
i−1(cid:107)4 + c(cid:48)E(cid:107)We
i−1(cid:107)2 + d(cid:48)E(cid:107)W(cid:86)e
i−1(cid:107)2 + f,
where the coefficients {c, d, c(cid:48), d(cid:48), f} have the following form:
c = O(µ2),
d = ρ(J) + + O(µ2),
c(cid:48) = O(µ4),
d(cid:48) = O(µ2),
f = O(µ4).
E(cid:107)We
Therefore, we can write
i(cid:107)4
i(cid:107)4
E(cid:107)W(cid:86)e
(cid:22)
E(cid:107)We
E(cid:107)W(cid:86)e
i−1(cid:107)4
i−1(cid:107)4
+
a(cid:48)
b(cid:48)
c(cid:48) d(cid:48)
E(cid:107)We
E(cid:107)W(cid:86)e
i−1(cid:107)2
i−1(cid:107)2
+
e
f
in terms of the 2 × 2 coefficient matrix Γ of the form (132) in [2] which is stable matrix for sufficiently small µ
and . Moreover, using relation (135) in [2], we have:
E(cid:107)We
E(cid:107)W(cid:86)e
i−1(cid:107)2
i−1(cid:107)2
=
O(µ3)
O(µ4)
.
(199)
(200)
(201)
(202)
(203)
a b
(cid:124)
(cid:123)(cid:122)
c d
Γ
(cid:125)
a(cid:48)
lim sup
i→∞
b(cid:48)
c(cid:48) d(cid:48)
32
In this case, we can iterate (202) and use relation (134) in [2] to conclude that:
E(cid:107)We
i(cid:107)4 = O(µ2),
lim sup
i→∞
E(cid:107)W(cid:86)e
i(cid:107)4 = O(µ4),
lim sup
i→∞
and, therefore,
E(cid:107)(cid:101)We
i(cid:107)4 = lim sup
i→∞
lim sup
i→∞
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)V
E
We
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)4
i
W(cid:86)e
i
i(cid:107)2)2
i(cid:107)2 + (cid:107)W(cid:86)e
i(cid:107)4 + E(cid:107)W(cid:86)e
≤ v4
2 lim sup
i→∞
≤ lim sup
i→∞
2v4
E((cid:107)We
2(E(cid:107)We
i(cid:107)4) = O(µ2).
(204)
(205)
APPENDIX G
STABILITY OF THE COEFFICIENT MATRIX B
In this Appendix, we show that, under the same settings of Theorem 1, the constant matrix B defined by (42) is
stable for sufficiently small step-sizes. To establish this, we use similar argument as in [4], [6]. We first note that
the matrix B in (42) is similar to the matrix B in (91), and therefore has the same eigenvalues as the block matrix
B written as:
IhP − D11
−D21
B ∼
,
−D12
− D22
J e
where the blocks entries {Dmn} are given by (92) -- (93). In a manner similar to the arguments used in the proof of
Theorem 1 in [2], we can verify that:
D11 = O(µ),
D21 = O(µ),
D12 = O(µ),
D22 = O(µ),
ρ(IhP − D11) = 1 − σ11µ = 1 − O(µ),
where σ11 is a positive scalar independent of µ. Thus, we obtain:
IhP − O(µ)
O(µ)
B ∼
.
O(µ)
J e
+ O(µ)
defined in Table I is h(M − P )× h(M − P ) and has a Jordan structure. We consider
Now recall that the matrix J e
here the complex data case since the real data case can be easily deduced from the complex case by removing the
(206)
(207)
(208)
(209)
(210)
block (J ∗
)(cid:62). It can be expressed in the following upper-triangular form:
J e
=
λa,2
...
K
λa,L
λ∗
a,2
...
K
λ∗
a,L
33
(211)
with scalars {λa,(cid:96), λ∗
the strictly upper-triangular matrix K are either or zero. It follows that:
a,(cid:96)} on the diagonal, all of which have norms strictly less than one, and where the entries of
J e
+ O(µ) =
λa,2 + O(µ)
K + O(µ)
...
O(µ)
λa,L + O(µ)
O(µ)
λ∗
a,2 + O(µ)
O(µ)
...
K + O(µ)
O(µ)
λ∗
a,L + O(µ)
(212)
We introduce the eigen-decomposition of the Hermitian positive-definite matrix D11 and denote it by [4], [6]:
D11 (cid:44) UdΛdU∗
d
(213)
where Ud is unitary and Λd has positive diagonal entries {λk}; the matrices Ud and Λd are hP × hP . Using Ud,
we further introduce the following block-diagonal similarity transformation:
T (cid:44) diag{µP/M Ud, µ(hP +1)/hM , . . . , µ(hM−1)/hM , µ}.
We now use (91) to get:
T −1BT =
B
O(µ(hM +1)/hM )
O(µP/M )
λa,2 + O(µ)
O(µ(hM−1)/hM )
...
O(µ1/hM )
λ∗
a,L + O(µ)
where we introduced the hP × hP diagonal matrix:
B (cid:44) IhP − Λd.
(214)
(215)
(216)
It follows that all off-diagonal entries of the above transformed matrix are at most O(µ1/hM ). Although the factor
µ1/hM decays slower than µ, it nevertheless becomes small for sufficiently small µ. Calling upon the Gershgorin's
34
theorem2, we conclude that the eigenvalues of B are either located in the Gershgorin circles that are centered at
the eigenvalues of B with radii O(µ(hM +1)/hM ) or in the Gershgorin circles that are centered at the {λa,(cid:96), λ∗
a,(cid:96)}
with radii O(µ1/M ), namely,
λ(B)−λ(B) ≤ O(µ(hM +1)/hM ) or
λ(B)−λa,(cid:96) +O(µ) ≤ O(µ1/hM ) or
λ(B)−λ∗
a,(cid:96) +O(µ) ≤ O(µ1/hM )
(217)
where λ(B) and λ(B) denote any of the eigenvalues of B and B, and (cid:96) = 1, . . . , L. It follows that:
ρ(B) ≤ ρ(B) + O(µ(hM +1)/hM ) or ρ(B) ≤ ρ(J) + O(µ) + O(µ1/hM ).
Now since J is a stable matrix, we know that ρ(J) < 1. We express this spectral radius as:
ρ(J) = 1 − δJ
where δJ is positive and independent of µ. We also know from (209) that:
since B = U∗
d (IhP − D11)Ud. We conclude from (218) that:
ρ(B) = 1 − σ11µ < 1,
ρ(B) ≤ 1 − σ11µ + O(µ(hM +1)/hM )
or ρ(B) ≤ 1 − δJ + O(µ) + O(µ1/hM ).
If we now select µ (cid:28) 1 small enough such that:
O(µ(hM +1)/hM ) < σ11µ,
and O(µ1/hM ) + O(µ) < δJ
(218)
(219)
(220)
(221)
(222)
then we would be able to conclude that ρ(B) < 1 so that B is stable for sufficiently small step-sizes, as claimed.
If we exploit the structure of B in (91) we can further show, for sufficiently small step-sizes, that:
(I − B)−1 = O(1/µ)
(I − B)−1 =
O(1/µ) O(1)
(223)
(224)
O(1) O(1)
where the leading (1, 1) block in (I − B)−1 has dimensions hP × hP .
at akk and with rk =(cid:80)N
2Consider an N × N matrix A with scalar entries {ak(cid:96)}. With each diagonal entry akk we associate a disc in the complex plane centered
(cid:96)=1,(cid:96)(cid:54)=k ak(cid:96). That is, rk is equal to the sum of the magnitudes of the non-diagonal entries on the same row as
akk. We denote the disc by Dk; it consists of all points that satisfy Dk = {z ∈ C such that z − akk ≤ rk}. Gershgorin's theorem states
that the spectrum of A (i.e., the set of all its eigenvalues, denoted by λ(A)) is contained in the union of all N Gershgorin discs
λ(A) ⊂ ∪N
k=1Dk.
A stronger statement of the Gershgorin theorem covers the situation in which some of the Gershgorin discs happen to be disjoint. Specifically,
if the union of the L discs is disjoint from the union of the remaining N − L discs, then the theorem further asserts that L eigenvalues of
A will lie in the first union of L discs and the remaining N − L eigenvalues of A will lie in the second union of N − L discs.
To establish this we first note that, by similarity, the matrix B is stable. Let
D11
D21
(cid:44)
X11 X12
X21 X22
D12
+ D22
I − J e
X = I − B =
where from (207) -- (208), we have:
X11 = O(µ),
X21 = O(µ),
X12 = O(µ),
X22 = O(1).
(227)
The matrix X is invertible since I − B is invertible. Moreover, X11 is invertible since D11 is Hermitian positive
definite. Using the block matrix inversion formula, we can write:
11 X12∆−1X21X −1
−∆−1X21X −1
X −1
11 X12∆−1
∆−1
11 −X −1
11 + X −1
X −1 =
(228)
11
where ∆ denotes the Schur complement of X relative to X11:
∆ = X22 − X21X −1
11 X12 = O(1).
We then use (226) -- (227) to conclude (224).
APPENDIX H
STABILITY OF FIRST-ORDER ERROR MOMENT OF (47)
In this Appendix, we show that, under the same settings of Theorem 1, the first-order moment of the long-term
model (47) is stable for sufficiently small step-sizes, namely, it holds that:
i (cid:107) = O(µ).
We first multiply both sides of recursion (125) from the left by (V e
lim sup
i→∞
(cid:107)E(cid:101)We(cid:48)
where the matrix B in (91) is stable as shown in Appendix G. Recursion (231) can be written more compactly as:
EWe(cid:48)
(cid:123)(cid:122)
(cid:124)
EW(cid:86)e(cid:48)
i
(cid:44)yi
i
(cid:125)
IhP − D11
(cid:123)(cid:122)
(cid:124)
−D21
=
yi = Byi−1 +
+
b(cid:86)e
(cid:44)B
(cid:125)
0
i−1
EW(cid:86)e(cid:48)
i−1
(cid:44)yi−1
−D12
− D22
J e
EWe(cid:48)
)−1 and use relation (59) in [2] to get:
(cid:123)(cid:122)
(cid:124)
(cid:125)
.
0
(224)
O(1/µ) O(1)
0
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) = O(µ),
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
EWe(cid:48)
= O(µ).
O(1) O(1)
EW(cid:86)e(cid:48)
O(µ)
b(cid:86)e
=
i
i
0
b(cid:86)e
lim sup
i→∞
Since B is stable and b(cid:86)e
= O(µ), we conclude from (232) and (224) that:
i→∞ yi = (I − B)−1
lim
It follows that
,
35
(225)
(226)
(229)
(230)
(231)
(232)
(233)
(234)
36
and, hence,
(cid:107)E(cid:101)We(cid:48)
i (cid:107) = lim sup
i→∞
lim sup
i→∞
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)V e
EWe(cid:48)
EW(cid:86)e(cid:48)
i
i
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) ≤ (cid:107)V e
(cid:107)
lim sup
i→∞
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
EWe(cid:48)
EW(cid:86)e(cid:48)
i
i
(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
= O(µ).
(235)
REFERENCES
[1] R. Nassif, S. Vlaski, and A. H. Sayed, "Distributed inference over networks under subspace constraints," in Proc. IEEE Int. Conf.
Acoust., Speech, and Signal Process., Brighton, UK, May 2019, pp. 1 -- 5.
[2] R. Nassif, S. Vlaski, and A. H. Sayed, "Adaptation and learning over networks under subspace constraints -- Part I: Stability analysis,"
Submitted for publication, May 2019.
[3] A. H. Sayed, S. Y. Tu, J. Chen, X. Zhao, and Z. J. Towfic, "Diffusion strategies for adaptation and learning over networks," IEEE
Signal Process. Mag., vol. 30, no. 3, pp. 155 -- 171, 2013.
[4] A. H. Sayed, "Adaptation, learning, and optimization over networks," Foundations and Trends in Machine Learning, vol. 7, no. 4-5,
pp. 311 -- 801, 2014.
[5] J. Chen and A. H. Sayed, "Distributed Pareto optimization via diffusion strategies," IEEE J. Sel. Topics Signal Process., vol. 7, no. 2,
pp. 205 -- 220, Apr. 2013.
[6] X. Zhao and A. H. Sayed, "Asynchronous adaptation and learning over networks -- Part I: Modeling and stability analysis," IEEE Trans.
Signal Process., vol. 63, no. 4, pp. 811 -- 826, Feb. 2015.
[7] S. Vlaski and A. H. Sayed, "Diffusion learning in non-convex environments," in Proc. IEEE Int. Conf. Acoust., Speech, and Signal
Process., Brighton, UK, May 2019.
[8] M. G. Rabbat and R. D. Nowak, "Quantized incremental algorithms for distributed optimization," IEEE J. Sel. Areas Commun., vol.
23, no. 4, pp. 798 -- 808, Apr. 2005.
[9] S. Kar and J. M. F. Moura, "Distributed consensus algorithms in sensor networks with imperfect communication: Link failures and
channel noise," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 355 -- 369, Jan. 2009.
[10] K. Srivastava and A. Nedic, "Distributed asynchronous constrained stochastic optimization," IEEE J. Sel. Topics Signal Process., vol.
5, no. 4, pp. 772 -- 790, Aug. 2011.
[11] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and cooperation in networked multi-agent systems," Proc. IEEE, vol. 95,
no. 1, pp. 215 -- 233, 2007.
[12] S. S. Ram, A. Nedi´c, and V. V. Veeravalli, "Distributed stochastic subgradient projection algorithms for convex optimization," J. Optim.
Theory Appl., vol. 147, no. 3, pp. 516 -- 545, 2010.
[13] J. Plata-Chaves, A. Bertrand, M. Moonen, S. Theodoridis, and A. M. Zoubir, "Heterogeneous and multitask wireless sensor networks
-- Algorithms, applications, and challenges," IEEE Journal of Selected Topics in Signal Processing, vol. 11, no. 3, pp. 450 -- 465, 2017.
[14] J. Chen, C. Richard, and A. H. Sayed, "Diffusion LMS over multitask networks," IEEE Trans. Signal Process., vol. 63, no. 11, pp.
2733 -- 2748, Jun. 2015.
[15] R. Nassif, C. Richard, A. Ferrari, and A. H. Sayed, "Proximal multitask learning over networks with sparsity-inducing coregularization,"
IEEE Trans. Signal Process., vol. 64, no. 23, pp. 6329 -- 6344, Dec. 2016.
[16] C. Eksin and A. Ribeiro, "Distributed network optimization with heuristic rational agents," IEEE Trans. Signal Process., vol. 60, no.
10, pp. 5396 -- 5411, Oct. 2012.
[17] A. Hassani, J. Plata-Chaves, M. H. Bahari, M. Moonen, and A. Bertrand, "Multi-task wireless sensor network for joint distributed
node-specific signal enhancement, LCMV beamforming and DOA estimation," IEEE J. Sel. Topics Signal Process., vol. 11, no. 3, pp.
518 -- 533, 2017.
[18] J. F. C. Mota, J. M. F. Xavier, P. M. Q. Aguiar, and M. Puschel, "Distributed optimization with local domains: Applications in MPC
and network flows," IEEE Trans. Autom. Control, vol. 60, no. 7, pp. 2004 -- 2009, Jul. 2015.
37
[19] X. Zhao and A. H. Sayed, "Distributed clustering and learning over networks," IEEE Trans. Signal Process., vol. 63, no. 13, pp.
3285 -- 3300, Jul. 2015.
[20] S. Barbarossa, G. Scutari, and T. Battisti, "Distributed signal subspace projection algorithms with maximum convergence rate for sensor
networks with topological constraints," in Proc. IEEE Int. Conf. Acoust., Speech, and Signal Process., Taipei, Taiwan, Apr. 2009, pp.
2893 -- 2896.
[21] D. P. Bertsekas, Nonlinear Programming, Athena Scientific, 1999.
[22] R. H. Koning, H. Neudecker, and T. Wansbeek, "Block Kronecker products and the vecb operator," Linear Algebra Appl., vol. 149,
pp. 165 -- 184, Apr. 1991.
[23] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, New York, NY, USA, 2004.
[24] M. Grant and S. Boyd, "CVX: Matlab software for disciplined convex programming, version 2.1," http://cvxr.com/cvx, Mar. 2014.
[25] P. L. Combettes and J.-C. Pesquet, "Proximal splitting methods in signal processing," in Fixed-Point Algorithms for Inverse Problems
in Science and Engineering, H. H. Bauschke et al., Ed., pp. 185 -- 212. Springer, New York, NY, USA, 2011.
[26] N. Parikh and S. Boyd, "Proximal algorithms," Foundations and Trends in Optimization, vol. 1, no. 3, pp. 127 -- 239, Jan. 2014.
[27] L. Isserlis, "On a formula for the product-moment coefficient of any order of a normal frequency distribution in any number of
variables," Biometrika, vol. 12, no. 1/2, pp. 134 -- 139, Nov. 1918.
|
1611.00518 | 1 | 1611 | 2016-11-02T09:31:07 | A Dynamic Multi Agent based scheduling for flexible flow line manufacturing system accompanied by dynamic customer demand | [
"cs.MA"
] | Dynamic rescheduling decision-making problem is an important issue in modern manufacturing system with the feature of combinational computation complexity. This paper introduces a multi-agent based approach using the detailed process, provided by Prometheus methodology, which used for the design of a simultaneous dynamic rescheduling decision making for flexible flow line manufacturing system that working under dynamic customer demand. The application has been completely modeled with the Prometheus Design Tool (PDT), which offers full support to Prometheus Methodology. The proposed dynamic scheduling decision making system is developed for Automated UPVC door and Windows Company and can be support both static and dynamic scheduling. | cs.MA | cs | A Dynamic Multi Agent based scheduling for flexible
flow line manufacturing system accompanied by dynamic
customer demand
Danial Roudi
Department of Mechanical Engineering, Eastern Mediterranean University, Famagusta, North Cyprus Via 10,
Mersin, Turkey
[email protected]
Ali Vatankhah Barenji
Department of Mechanical Engineering, Eastern Mediterranean University, Famagusta, North Cyprus Via 10,
Mersin, Turkey
[email protected]
Reza Vatankhah Barenji
Department of Industrial Engineering, Hacettepe University, Beytepe Campus 06800, Ankara, Turkey
[email protected]
Majid Hashemipour
Department of Mechanical Engineering, Eastern Mediterranean University, Famagusta, North Cyprus Via 10,
Mersin, Turkey
Abstract-Dynamic rescheduling decision-making problem is an important issue in modern manufacturing system with
the feature of combinational computation complexity. This paper introduces a multi-agent based approach using the
detailed process, provided by Prometheus methodology, which used for the design of a simultaneous dynamic
rescheduling decision making for flexible flow line manufacturing system that working under dynamic customer demand.
The application has been completely modeled with the Prometheus Design Tool (PDT), which offers full support to
Prometheus Methodology. The proposed dynamic scheduling decision making system is developed for Automated UPVC
door and Windows Company and can be support both static and dynamic scheduling.
Keywords-Multi Agent System; Dynamic Scheduling; Flow Line Manufacturing
I.
INTRODUCTION
An automated UPVC doors and windows fabrication is processing of cutting, welding and assembling UPVC
doors and windows. This fabrication is composed of several component with deferent shape and size, although
requires hundreds of operation with entrant flow although consists of some workstations and each contains one or
even more machines. This companies follow the flow line manufacturing system, therefore scheduling problem of this
system is called flow line manufacturing cell-scheduling problem (FMCSP) [1] , additionally dynamic costumer
demand (time based constraints) is added to problems of these companies so it can be consider that scheduling
problem of this companies is a real time system problems [2].
A manufacturing scheduling problem with time-based limitation can be considered as the scheduling problem of
a real-time system [3]. The real-time systems are defined as those systems in which the correctness of the systems
depends on both logical and time-based correctness [4]. The logical correctness refers to the satisfactions of resource
capacity constraints and precedence limitation of operations [5]. The time-based correctness, namely timeliness,
refers to the satisfactions of the time-based constraints such as interoperation time-based constraints and due dates.
According to the Hyun Joong Yoon et al [1] real time system can be divided into two kinds of deadline, hard
deadline and soft deadlines. The real time system with hard deadlines is the system in which time-based correctness
is critical, whereas the one with soft deadlines is the system in which time-based correctness is important, but not
critical. The scheduling techniques of real time systems are divided into static scheduling (offline scheduling) and
dynamic scheduling.
Static scheduling techniques are applicable to real time systems in which jobs are periodic. They perform offline
feasibility or schedule ability analyses. For instance hybrid harmony [6] search is used for solving the multi object
FMCSP or A rate monotonic scheduling algorithm is the best known static priority scheduling method, in which
higher priorities are assigned to the jobs with a shorter period and also NP hard method is used more to solving
FMCSP in the static scheduling problem [7].
Dynamic scheduling techniques are advantageous in a system that uncertainty such as aperiodic jobs and
machine failures can be taken into consideration [8]. Dynamic scheduling techniques are divided into dynamic
planning-based approaches and dynamic best effort approaches. In dynamic planning-based approaches, schedule
ability is checked at run time when a job arrives, and the job is accepted only if timeliness is guaranteed [9]. On the
other hand, dynamic best effort approaches do not check schedule ability at all. Hence, dynamic planning-based
approaches are adequate for the real-time systems with hard deadlines, whereas the dynamic best effort approaches
are adequate for those with soft deadlines. There are quite few studies which consider dynamic scheduling of
manufacturing system, especially dynamic scheduling of manufacturing system by considering dynamic customer
demand [10]. In the previous work by authors addressed a multi agent decision making system for flexible
manufacturing system [4,8, 11, 12]. The proposed architecture is design for handling machine breakdown and
optimizing machine utility in the FMS focus on reconfiguration of control system [13]. However, dynamic
scheduling and dynamic customer demand is not considered in their previous studies.
This paper present a multi agent based dynamic scheduling decision-making system for automated door and
Windows Company (is flexible assemble line) with considering dynamic customer demand. Dynamic behaviors in
this company such as diversification of production and reconfiguration are taken into consideration. The multi agent
dynamic scheduling system is developed based on Prometheus methodology TM. Prometheus methodology is a
general-purpose design methodology for the development of software agent systems in which it is not tied to any
specific model of agency in software platform [14]. The multi agent based dynamic scheduling system is
completely modeled by the Prometheus Design Tool (PDT), which offers full support to Prometheus Methodology.
The proposed scheduling method is designed mainly for the work cell with time-based constraints, although it is
applicable of keeping the work cell free from time-based constraints.
The rest of this paper is organized as follows: introduce multi agent system in dynamic scheduling in section 2;
in section 3 the definition of case study and illustration of existing lacks in FLMs is expressed; the design of
proposed multi agent system given in section 4; in section 5 decision making mechanism which is proposed the
rescheduling algorithm of the system for dynamic customer demand; section 6 consist of discussion and conclusion.
II.
Literature review
Multi agent system, a branch in artificial intelligence, provides a new way for solving distributed, dynamic
problems. Agent technology has been widely accepted and developed in implementation of the dynamic scheduling
and distributed control system [6,15, 16]. Multi agent-based software platforms are usually endowed with distributed
intelligent functions, and are becoming a key technology in new manufacturing systems built in a distributed
manner, such as intelligent manufacturing systems (IMSs). Many researchers have attempted to develop agent-based
architectures to support manufacturing activities [15]. Since the late 1980s, a number of researchers have applied
agent technology to perform production planning and control on the shop floor [17]. V Kaplanoğlu [18] proposed a
real time dynamic scheduling system based on the agent-based system, which has the advantages of less sensitive to
fluctuations in demand or available vehicles than more traditional transportation planning heuristics (Local Control,
Serial Scheduling) and provides a lot of flexibility by solving local problems . Kai-Ying Chen et al. [19] Applying
multi-agent technique in multi-section flexible manufacturing system. To set up the dynamic dispatching rules, a
distributed agent based system is implemented, which is assist the agents to choose suitable dispatching rule in
pertaining dispatching region and also the whole-hog dispatching of manufacturing system resolved through the
agents cooperation. Leitao [20] surveyed the literature in manufacturing control systems using distributed AI
techniques. Up to now there isn't practical implementation of this approach in the real factory cases due to lack of
standard way and there is a need for conducting more scientific research in this field.
The main aim of this paper is proposing approach for dynamic scheduling of flow line manufacturing system.
Our proposed approach not only works in the dynamic environment but also work in the static environment although
proposed approach could contribute to real manufacturing systems. Agent based systems have provided an excellent
opportunity for modeling and solving dynamic scheduling problems. Agent-based models consist of rule-based
agents which are dynamically interacting. The agents within the systems, in which they interact with, can create
real-world-like complexity. Based on that observation, the context of this study is to schedule the machine and
material handling system (MHs) by means of emphasizing flexibility in a flow line manufacturing system through
Multi-Agent System (MAS) approach. The proposed scheduling scheme is designed by means of Prometheus TM
methodology.
III.
Design of the proposed multi-agent system
Agent-based modeling and design differs from the conventional systems design. In the present study, multi-
agent based dynamic scheduling system is designed by using Prometheus TM methodology [21]. Prometheus
methodology is a general-purpose design methodology for the development of software agent systems in which it is
not tied to any specific model of agency of software platform. The Prometheus methodology defines a detailed
process for specifying, designing, implementing and testing/debugging agent-oriented software systems. In addition
to detailed processes (and many practical tips), it defines a range of artifacts that are produced along the way. The
Prometheus methodology consist of four steps, the first three steps of this methodology is in design of any agent
oriented software are same but the last step namely implementation step is different, In this study Jack will be
selected as platform for implementing proposed MAS in the future work.
A. Steps of Prometheus methodology are as follows:
a) The system specification phase focuses on identifying the goals and basic functionalities of the system,
along with inputs (percepts) and outputs (actions).
b) The architectural design phase uses the outputs from the previous phase to determine which agent types the
system will contain and how they will interact.
c) The detailed design phase looks at the internals of each agent and how it will accomplish its tasks within the
overall system.
IV.
Case study:
YBG (Yaran Bahar Golestan) is a small enterprise that produces make-to-order UPVC doors and windows by
automated machines. YBG is situated in the north of IRAN and provides doors and windows to representatives in all
over IRAN. The company is made up of two main departments: an administrative office, located in a downtown area
with major communication and commercial infrastructures that expedite relations with partners and clients and the
promotion of new products, and a production facility located a few kilometers away in the industrial area. The
production process involves the production of the frames of the windows/doors and several assemblies' phases, in
addition, test and quality control phases are performed.
The window components, such as fittings, profiles, and glasses, are ordered to partner companies that
manufacture them according to the windows/doors designs. The windows frames are manufactured in the YBG plant
from first substances (UPVC profiles). Nearly to fifteen models of doors and windows are manufactured: Tilt and
turn windows, slide hung, top light, sliding folding, center hinge/pivot and etc. Three profile qualities are available:
high quality with two different colors, medium with five different colors and economic one with two different
colors. First substance or all finished windows components are stored in four different warehouses. UPVC profiles
are standard lengths long enough to manufacture the largest frame size and undergo quality control according to a
defined protocol. Finished UPVC components arrive with quality control already certified.
The problems that exist in current scheduling and control architecture which can be potentially improved by multi
agent based dynamic decision making are as follows:
The manufacturing system is schedule by static scheduling which is located on an administrative office thus
all the decisions are issued by this unit.
The stations (machines) have no autonomous scheduling unit for their operations
The system lacks the real time scheduling and is not flexible in the case of dynamic customer demand.
The scheduling of this system in the dynamic environment is hard NP problem.
Development of a multi agent based dynamic decision system to address these problems is justified as follows:
When the dynamic customer demand accrues, the dynamic decision making system can be schedule the
system in the dynamic manner.
Development of multi agent based dynamic decision system can be fined optimal scheduling in the machine
fail disturbance.
The proposed system makes autonomous station level
proposed MAS create real time communication in the system
A. System Specification Design:
System specification phase is first part of Prometheus methodology, System specification design phase consist of
four sub phases namely: Analysis Overview, Scenario Overview, Goal Overview, System Role Overview.
Specification of system goals is design in the Goal Overview diagram, resulting in a list of goals and sub goals, with
associated descriptors. This phase responsible for identification of, system goals, development of set of scenarios
that have adequate coverage of the goals, functionalities that are linked to one or more goals, negotiations among the
types of agents and scenarios of the system are determined. Figure 2 shows Goal Overview diagram of the system.
Figure 1 Shows Goal Overview Diagram of the System.
Scenario Overview was developed by set of scenarios that have adequate coverage of the goals, and which
provide a process oriented view of the system to be developed. System Role Overview defined set of functionalities
that are linked to one or more goals, and capture a limited piece of system behavior. Figure 3 shows System Role
Overview of the System in which, there are four main roles in the system: Manger role, Shop Management role, cell
role, Negotiation Management role.
Figure 2 Shows System Role Overview of the System.
The sub goal is also designed in the system specification stage. For example four-sub goal of the Machine
Scheduling after unpredictable orders arrived goal is defined; "Machine is busy and has task", "Machine is free and
has a tack", "Machine is free and has no task", "Machine is loaded and has no tack".
B. Architecture Design:
This stage includes the identification of agent types according to Prometheus methodology in which the roles of
the agents in the system are determined. This phase consist of three parts namely; "Data Coupling Overview",
"Agent Role Grouping Overview" and "System Overview". The negotiation protocols between agent types are
designed in this phase. A system overview diagram is given in Figure 4. All agents are defined at this stage namely;
"Manger Agent", "Shop Manager Agent", "Cell Agent", "MHs agent", "Scheduler Machine Agent", "MHs
Resource Agent", "Machine Resource Agent". The last two agents are interface agents other five agents are software
agents that used for dynamic scheduling decision-making system. The proposed system follow top to down
approach but by considering real time negotiation between all types of agent. All negotiation protocols between
agents are defined at Figure 4 diagram by arrows. Protocols consist of "Order Protocol", "Shop Protocol", "Material
Handling System Negotiation Protocol", "Machine Negotiation Protocol", "Resource Protocol" and "Machine
Resource Protocol".
Figure 3 Shows System Overview Diagram in the Architectural Design Stage
C. Detailed Design:
Detailed design is done for each of the agent type one by one in this step. Types of agents at this stage take the
message from the event of their environment or other agents, which operate on their plans, and thus they act
according to the record in their data base.
For example Manager Agent (MA) is responsible to managing customer and updating new order to the system.
Manager Agent uses its belief sets, plans and message events so that it will accomplish this task. Manager Agent
architecture is shown in Figure 6 in the form of Prometheus TM design view.
Figure 4 Manager agent architecture.
Machine agent is responsible for managing and controlling the cell level of factory and this agent consist of
two sub agents namely MHs Agent and Scheduler Machine Agent. Detail design of this agent is in the Figure 7
having been showed.
Figure 7 Detail Design of Machine Agent
Other important agent is play important role to rescheduling and dynamic scheduling of cell level is
Scheduler Machine Agent. This agent consists of two data based Machine–status and Machine-Negotiation-Results.
The detailed design of this agent illustrated in Figure 8.
Figure 8 Detail Design of Scheduler Machine Agent
D. Decision making mechanism:
Algorithm for rescheduling of the system for dynamic customer demand is proposed at this section. Figure 9 is
sequence diagram of decision-making mechanism in the proposed multi agent system. The Manager Agent informs
the new or unpredictable order to the Shop Manager Agent. Shop Manager Agent send related question to the Cell
Agent and this agent ask from Scheduler Machine Agent and MHs agent. Scheduler Machine Agent by having real
time communication with Machine Resource Agent send related information to the Cell Agent and this agent by
considering the information of Scheduler Machine Agent answers the question asked by Shop Manager Agent. Shop
Manager Agent by considering information from cell level make a decision and send to Manager agent, if Manager
Agent conform this decision, it will send related information to Shop Manger Agent, and Shop Manager Agent
create new scheduling and new sub agent and send to the Cell Agent and MHs Agent. Cell Agent send new data to
the scheduler Machine Agent and this agent create update new scheduler to the machine.
Figure 9 Sequence Diagram of Decision-Making Mechanism
V.
Conclusion and future research
In the current study, the focus is on solving the scheduling problems of flow line manufacturing by proposing
multi agent based decision-making system. The proposed multi-agent based design is developed in order to solve
these complexities during the manufacturing process. The design uses the capabilities of multi-agent systems in
order to solve real-time scheduling complexities. Feasible and effective schedules are supposed to be emerged from
negotiation/bidding mechanisms between agents. In the present study, we try to make the problems of flow line
manufacturing more clearly and how multi agent based system can be helpful for these types of companies. The
other main of this study designing MAS based decision-making system for flow line manufacturing system by using
Prometheus methodology.
Future research directions include
• Implementing the proposed MASs by using programming language.
• Finding test-bed studies in order to compare the results of multi-agent systems with other approximations.
• Developing simulation models in order to test the effectiveness of the proposed mode.
References
H. J. Yoon and W. Shen, "A multiagent-based decision-making system for semiconductor wafer fabrication
[1]
with hard temporal constraints," Semiconductor Manufacturing, IEEE Transactions on, vol. 21, pp. 83-91, 2008.
R. W. Brennan and D. H. Norrie, "Agents, holons and function blocks: distributed intelligent control in
[2]
manufacturing," Journal of Applied Systems Studies, vol. 2, pp. 1-19, 2001.
S. H. Lu and P. Kumar, "Distributed scheduling based on due dates and buffer priorities," Automatic
[3]
Control, IEEE Transactions on, vol. 36, pp. 1406-1416, 1991.
[4]
A. Vatankhah Barenji, R. Vatankhah Barenji, and M. Hashemipour, "Structural modeling of a RFID-
enabled reconfigurable architecture for a flexible manufacturing system," in Smart Objects, Systems and
Technologies (SmartSysTech), Proceedings of 2013 European Conference on, 2013, pp. 1-10.
Barenji, Reza Vatankhah, et al. "Toward a framework for intra-enterprise competency modeling." 2012 2nd
[5]
International Conference on Advances in Computational Tools for Engineering Applications (ACTEA). 2012.
Y. Li, X. Li, and J. N. Gupta, "Solving the multi-objective flowline manufacturing cell scheduling problem
[6]
by hybrid harmony search," Expert Systems with Applications, vol. 42, pp. 1409-1417, 2015.
F. Zhao, J. Wang, J. Wang, and J. Jonrinaldi, "A dynamic rescheduling model with multi-agent system and
[7]
its solution method," Strojniški vestnik-Journal of Mechanical Engineering, vol. 58, pp. 81-92, 2012.
[8]
A. V. Barenji, R. V. Barenji, and M. Hashemipour, "A frameworks for structural modelling of an RFID-
enabled intelligent distributed manufacturing control system," South African Journal of Industrial Engineering, vol.
25, pp. 48-66, 2014.
[9]
R. Y. Zhong, G. Q. Huang, S. Lan, Q. Dai, T. Zhang, and C. Xu, "A two-level advanced production
planning and scheduling model for RFID-enabled ubiquitous manufacturing," Advanced Engineering Informatics,
2015.
A. V. Barenji, R. V. Barenji, and M. Hashemipour, "Flexible testing platform for employment of RFID-
[10]
enabled multi-agent system on flexible assembly line," Advances in Engineering Software, vol. 91, pp. 1-11, 2016.
A. V. Barenji, "An RFID-based distributed control system for flexible manufacturing system," Eastern
[11]
Mediterranean University (EMU)-Doğu Akdeniz Üniversitesi (DAÜ), 2013.
[12]
R. V. Barenji, A. V. Barenji, and M. Hashemipour, "A multi-agent RFID-enabled distributed control
system for a flexible manufacturing shop," The International Journal of Advanced Manufacturing Technology, vol.
71, pp. 1773-1791, 2014.
A. V. Barcnji, R. V. Barenji, and B. L. Sefidgari, "An RFID-enabled distributed control and monitoring
[13]
system for a manufacturing system," in Innovative Computing Technology (INTECH), 2013 Third International
Conference on, 2013, pp. 498-503.
[14]
L. Padgham, J. Thangarajah, and M. Winikoff, "Prometheus Design Tool," in AAAI, 2008, pp. 1882-1883.
[15]
R. Erol, C. Sahin, A. Baykasoglu, and V. Kaplanoglu, "A multi-agent based approach to dynamic
scheduling of machines and automated guided vehicles in manufacturing systems," Applied Soft Computing, vol.
12, pp. 1720-1732, 2012.
S. Kumari, A. Singh, N. Mishra, and J. A. Garza-Reyes, "A multi-agent architecture for outsourcing SMEs
[16]
manufacturing supply chain," Robotics and Computer-Integrated Manufacturing, 2015.
T. Wong, C. Leung, and H. Tang, "A multi-agent system framework for manufacturing planning and
[17]
control," in Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress on, 2008, pp. 410-415.
V. Kaplanoğlu, "Multi-agent based approach for single machine scheduling with sequence-dependent setup
[18]
times and machine maintenance," Applied Soft Computing, vol. 23, pp. 165-179, 2014.
K.-Y. Chen and C.-J. Chen, "Applying multi-agent technique in multi-section flexible manufacturing
[19]
system," Expert Systems with Applications, vol. 37, pp. 7310-7318, 2010.
[20]
Applications of Artificial Intelligence, vol. 22, pp. 979-991, 2009.
P. Leitão, "Agent-based distributed manufacturing control: A state-of-the-art survey," Engineering
L. Padgham and M. Winikoff, "Prometheus: A practical agent-oriented methodology," Agent-oriented
[21]
methodologies, pp. 107-135, 2005.
[22] Barenji, Ali Vatankhah, and Canberk Değirmenci. "Robot Control System based on Web Application and
RFID Technology." In MATEC Web of Conferences, vol. 28, p. 04001. EDP Sciences, 2015.
BIOGRAPHY
Danial Roudi is a Master of Engineering in Manufacturing Systems in the Department of Mechanical Engineering at the Eastern
Mediterranean University, Famagusta, North Cyprus via 10, Mersin, Turkey. His research interests include manufacturing,
simulation, optimization, reliability, and scheduling.
Ali Vatankhah Barenji has an MSc in mechanical engineering and is currently a PhD candidate at the University of Eastern
Mediterranean. He is research assistance at the EMU. He has more than 15 papers published at international journal and
proceedings of international conferences. His main research topics focus on reconfigurable production systems, intelligent
supervisory control, and multi agent based control system.
|
1211.1146 | 1 | 1211 | 2012-11-06T09:07:00 | Discrete modelling of bacterial conjugation dynamics | [
"cs.MA",
"physics.bio-ph",
"q-bio.CB"
] | In bacterial populations, cells are able to cooperate in order to yield complex collective functionalities. Interest in population-level cellular behaviour is increasing, due to both our expanding knowledge of the underlying biological principles, and the growing range of possible applications for engineered microbial consortia. Researchers in the field of synthetic biology - the application of engineering principles to living systems - have, for example, recently shown how useful decision-making circuits may be distributed across a bacterial population. The ability of cells to interact through small signalling molecules (a mechanism known as it quorum sensing) is the basis for the majority of existing engineered systems. However, horizontal gene transfer (or conjugation) offers the possibility of cells exchanging messages (using DNA) that are much more information-rich. The potential of engineering this conjugation mechanism to suit specific goals will guide future developments in this area. Motivated by a lack of computational models for examining the specific dynamics of conjugation, we present a simulation framework for its further study. We present an agent-based model for conjugation dynamics, with realistic handling of physical forces. Our framework combines the management of intercellular interactions together with simulation of intracellular genetic networks, to provide a general-purpose platform. We validate our simulations against existing experimental data, and then demonstrate how the emergent mixing patterns of multi-strain populations can affect conjugation dynamics. Our model of conjugation, based on a probability distribution, may be easily tuned to correspond to the behaviour of different cell types. Simulation code and movies are available at http://code.google.com/p/discus/. | cs.MA | cs |
Discrete modelling of bacterial conjugation dynamics
1
Angel Goni-Moreno1 and Martyn Amos1
1 School of Computing, Mathematics and Digital Technology, Manchester Metropolitan
University, Manchester M1 5GD, UK.
contact: Angel Goni-Moreno: [email protected]; Martyn Amos: [email protected]
Abstract
In bacterial populations, cells are able to cooperate in order to yield complex col lective func-
tionalities. Interest in population-level cellular behaviour is increasing, due to both our expanding
knowledge of the underlying biological principles, and the growing range of possible applications for
engineered microbial consortia. Researchers in the field of synthetic biology - the application of en-
gineering principles to living systems - have, for example, recently shown how useful decision-making
circuits may be distributed across a bacterial population. The ability of cells to interact through
small signalling molecules (a mechanism known as quorum sensing) is the basis for the ma jority of
existing engineered systems. However, horizontal gene transfer (or conjugation) offers the possibility
of cells exchanging messages (using DNA) that are much more information-rich. The potential of
engineering this conjugation mechanism to suit specific goals will guide future developments in this
area. Motivated by a lack of computational models for examining the specific dynamics of conju-
gation, we present a simulation framework for its further study. We present an agent-based model
for conjugation dynamics, with realistic handling of physical forces. Our framework combines the
management of intercellular interactions together with simulation of intracellular genetic networks,
to provide a general-purpose platform. We validate our simulations against existing experimental
data, and then demonstrate how the emergent mixing patterns of multi-strain populations can affect
conjugation dynamics. Our model of conjugation, based on a probability distribution, may be easily
tuned to correspond to the behaviour of different cell types. Simulation code and movies are available
at http://code.google.com/p/discus/.
1 Introduction
Researchers in the emerging field of synthetic biol-
ogy [1] have demonstrated the successful construc-
tion of devices based on populations of engineered
microbes [2, 3, 4]. Recent work has focussed atten-
tion on the combination of single-cell intracellular
devices [5, 6] with intercellular engineering, in order
to build increasingly complex systems.
To date, most work on engineered cell-cell com-
munication has focussed on quorum-sensing (QS)
[7], which may be thought of as a communication
protocol to facilitate inter-bacterial communication
via the generation and receiving of small signal
molecules. However, recent studies on DNA mes-
saging [8] highlight the importance and utility of
transferring whole sets of DNA molecules from one
cell (the so-called donor) to another (the recipient).
Bacterial conjugation is a cell-to-cell communica-
tion mechanism [9, 10] that enables such transfers
to occur.
In this paper we present a simulation platform
that realistically simulates (in a modular fashion)
both intracellular genetic networks and intercellu-
lar communication via conjugation. To our knowl-
edge, this is the first such platform to offer both of
these facilities. We first review previous work on
cell simulation, before presenting the details of our
model. We validate it against previous experimen-
tal work, and then discuss possible applications of
our method.
2 Previous work
The rapid development of bacterial-based devices
is accompanied by a need for computational sim-
ulations and mathematical modelling to facilitate
the characterisation and design of such systems. A
number of of platforms and methods are available
for this purpose. Agent-based models (AbMs) are
widely used [11], and were first used to study mi-
crobial growth in BacSim [12]. Continuous models
have also been proposed [13], and recent develop-
ments make use of hardware optimisation, by using
GPUs (Graphics Processing Units) in order to scale
up the number of cells simulated [14].
Because of the complexity of the system under
study, several computational platforms focus on
either specific cellular behaviours (e.g., bacterial
chemotaxis [15], morphogenesis of dense tissue like
systems [16]) , or on specific organisms (e.g., Myx-
ococcus xanthus [17]). Platforms that incorporate
cell-cell communication generally focus their atten-
tion on quorum-sensing. Simulations of conjugation
do exist, but these consider cells as abstracted cir-
cular objects [18, 19]. We demonstrate in this paper
how a consideration of the shape of cells is an es-
sential feature for understanding the conjugation
behaviour of the population. We now describe our
model for bacterial growth, in which conjugation is
handled explicitly.
3 Methods
We use an individual-based model ling approach [20]
to the study of conjugation dynamics. This mod-
els each cell as an individual, mobile entity, each
of which is sub ject to physical forces arising from
contact with other cells and the environment (e.g.,
surfaces). Each cell has a number of different at-
tributes,
listed in Table
1, which correspond to
various physiological states and characteristics.
Bacteria are modelled as rod-shaped cells with
a constant radius (parameter width in Table 2).
Elongation processes occur along the longitudinal
axis, which has a minimum dimension of length,
and division takes place whenever a the cell mea-
sures 2*length. The division of a cell into two new
daughter cells is also controlled by max overlap,
which monitors the physical pressure affecting each
cell; if the pressure exceeds this parameter value,
the cell delays its growth and division. Thus, a cell
with pressure grows slower than without it. In Fig-
ure 1A we see an snapshot of a population with dif-
ferent cell lengths, due to the pressure-dependent
behaviour. The global parameter growth speed
(Table 2) also helps us simulate cell flexibility in
a realistic fashion. This parameter defines a “cut
off” value for the number of iterations in which the
physics engine must resolve al l the current forces
and collisions. Thus, smaller values will cause the
solver to be effectively “overloaded”, and some colli-
2
sions may, as a result, be partially undetected. This
means that cells behave as flexible shapes, which
gives the simulation a more realistic performance.
In Figure 1C we show how changes in growth speed
affect the simulation, using bigger (left) to smaller
(right) values.
Horizontal genetic transfer (or conjugation) is
modelled using an elastic spring to connect donor
and recipient cells. Parameter c time defines the
duration of that linkage, which determines the time
in which the DNA is transferred. The springs are
constantly monitored to ensure that they physically
connect both cells during conjugation. Importantly,
during conjugation, the resolution of collisions in-
volving relevant cells considers the forces produced
by the spring connection, in order to calculate the
final movement of the bacteria. By coupling cells in
this way, we obtain realistic population-level phys-
ical patterns that emerge as a result of large num-
bers of conjugation events. Figure 1B shows this
process, with a donor cell (red) and a recipient cell
(grey) which becomes a transconjugant (yellow). A
transconjugant cell is one that was initially a re-
cipient, but which has been conjugated during its
lifetime. Thus, it already has the DNA information
transferred by the donor.
This agent-based algorithm has an iteration-
driven structure, where - after initialisation of the
main global parameters - it repeatedly performs the
following steps for each cell:
1. Update springs (position and timing).
2. Perform cell division (if cell is ready).
3. Elongate cell (every growth speed steps).
4. Handle conjugation.
5. Update physical position.
Conjugation decisions (step 4) made by cells are
driven by three sequential steps:
1. The cell decides, following a probability dis-
tribution, whether or not to conjugate (one
trial per iteration).
2. If conjugating, randomly select a mate from
surrounding bacteria (if present).
3
Table 1. Cell attributes.
type
Attribute
pymunk.Shape
shape
[m0 . . . mi ]
program
[int,int]
elongation
[x,y]
position
float
speed
conjugating Boolean
Boolean
plasmid
int
role
int
partner
Definition
Shape of the cell
List of the i regulatory network molecules (m)
Elongation values (one per cell pole)
Coordinates of centre point, x and y
Velocity
Conjugation state
Program state (present/not present)
Donor (0), recipient (1) or transconjugant (2)
Role of plasmid transfer cell
Figure 1. Cell behaviours at low scale. (A): Different cell length due to asynchronous growth (pressure
dependent). Two cells marked with red arrows. (B): A donor cell (red) starts the conjugation process
with a recipient (grey) which turns into transconjugant (yellow). The pilus (green) is an elastic spring
that links the two cells until the process is finished. (C): Different overlapping levels within the cells of
a population.
3. If valid mate is found, effect conjugation
transfer.
4
spring damping; these are three parameters to
model the material and behaviour of the bacterial
pilus (i.e.
the spring) during conjugation. Pa-
rameter cell infancy is a delay period, during
which a cell is considered to be too young to conju-
gate (as observed experimentally [21]). Parameters
pymunk steps and pymunk clock ticks are used
by the physics engine to update the world, and may
be adjusted by the user in order to alter the per-
formance of the simulation (machine dependent).
Parameters bac mass and bac friction play a role
in collision handling.
Our platform is writting in Python, and
makes
use
of
the
physics
engine
pymunk
(www.pymunk.org) as a wrapper
the 2D
for
physics library Chipmunk, which is written in C
(www.chipmunk-physics.net/). As cells are rep-
resented as semi-rigid bodies in a 2D lattice, py-
munk handles the physical environment on our be-
half. For monitoring purposes, parameters Gt and
real Gt allow us to stablise the relation between it-
erations and clock minutes: minute = Gt/real Gt
(units:
iterations). The platform, which we call
DiSCUS (Discrete Simulation of Conjugation Us-
ing Springs) is available at the pro ject repository
at http://code.google.com/p/discus/.
4 Results
We now describe the results of experiments to vali-
date our conjugation model, using four sets of sim-
ulations. As we aim to understand the behaviour
of cells in small-scale two-dimensional populations
(as occur in microfluidic environments), we avoid
the sorts of extreme overlapping situations shown
in Figure 1C(right). We first validate individual
conjugation dynamics; then we validate the biome-
chanical properties of the simulation; the third set
of experiments concerns the transfer of the two-
component oscillator, and the final set of experi-
ments study the effects of mixing on conjugation
dynamics. We now describe in detail the results of
each set of experiments.
4.1 Conjugation dynamics
The ob jective of the first set of experiments is to val-
idate the software in terms of conjugation dynam-
ics. For that purpose, we first focus on conjugation,
and
The discrete probability distribution used for
the conjugation process is C (N , p, c time), where
N is the number of trials in a cell lifetime (width
* length), p is the success probability in each trial
(with p ∈ [0. . .1]) and c time is the time interval
during p = 0.0 (i.e., when the cell is already con-
jugating). As stated in [21], p can vary, depending
on whether the cell is a donor (p d), a transconju-
gant that received the DNA message from a donor
(p t1), or a transconjugant that received the DNA
from another transconjugant (p t2).
Intracellular circuitry is modelled separately,
and then introduced into each cell by storing the
state of the circuit in an attribute of the cell
(program). Thus, there are effectively as many
copies of the circuit as cells in the simulation. This
circuit simulation is implemented in a modular fash-
ion, so that the internal cellular “program” may be
easily replaced with any other.
In this paper we
demonstrate the principle using a two-component
genetic oscillator as the DNA message that is ex-
changed through conjugation. The ordinary differ-
(cid:18)
(cid:19)
ential equations (ODEs) for this circuit are:
1 + αx2
1 + x2 + σy2 − x
1 + αx2
1 + x2 − y
which are detailed in [22], as well as the meaning
and value of the parameters (we use the same values
in the code provided). We have also recently used
our software platform to investigate the spatial be-
haviour of a reconfigurable genetic logic circuit [23],
which demonstrates how it may easily be modified
to accommodate different sets of equations. The ac-
tions controlling the growth rates of cells occur on
a longer time scale than the integration steps that
control molecular reactions (as equations 1 and 2).
In order to ensure synchronisation, the parameter
network steps defines the number of integration
steps of the ODEs that run per Gt. Thus, a number
of network steps/Gt integration steps will update
the attribute network of each cell every iteration.
Other important physical parameters listed in
Table 2 are
spring rest length,
spring stiffness
dx
dt
= ∆
β
(1)
(2)
dy
dt
= ∆γ
5
)
t
n
e
m
o
m
e
h
t
g
n
i
t
a
l
u
c
l
a
c
r
o
f
(
l
l
e
c
e
h
t
f
o
s
s
a
M
)
l
e
d
o
m
n
o
i
t
c
i
r
f
b
m
o
l
u
o
C
(
t
n
e
i
c
ffi
e
o
c
n
o
i
t
c
i
r
F
n
o
i
t
c
i
r
f
c
a
b
s
s
a
m
c
a
b
d
n
o
c
e
s
r
e
p
s
e
m
a
r
f
-
S
P
F
(
y
c
n
e
u
q
e
r
f
e
m
a
r
F
s
k
c
i
t
k
c
o
l
c
k
n
u
m
y
p
p
e
t
s
e
m
i
t
n
e
v
i
g
e
h
t
r
o
f
e
c
a
p
s
e
h
t
e
t
a
d
p
U
)
e
g
a
t
n
e
c
r
e
p
(
g
a
l
e
m
i
T
y
c
n
a
f
n
i
l
l
e
c
s
p
e
t
s
k
n
u
m
y
p
)
s
e
t
u
n
i
m
(
s
l
l
e
c
d
e
i
d
u
t
s
e
h
t
f
o
e
m
i
t
g
n
i
l
b
u
o
d
l
a
e
R
)
1
.
j
n
o
c
s
n
a
r
t
(
t
n
e
v
e
n
o
i
t
a
g
u
j
n
o
c
)
2
.
j
n
o
c
s
n
a
r
t
(
t
n
e
v
e
n
o
i
t
a
g
u
j
n
o
c
)
s
r
o
n
o
d
(
t
n
e
v
e
n
o
i
t
a
g
u
j
n
o
c
f
o
f
o
f
o
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
s
s
e
c
o
r
p
n
o
i
t
a
g
u
j
n
o
c
e
h
t
f
o
n
o
i
t
a
r
u
D
y
l
p
p
a
o
t
g
n
i
p
m
a
d
s
u
o
c
s
i
v
f
o
t
n
u
o
m
a
e
h
T
g
n
i
p
m
a
d
g
n
i
r
p
s
)
s
n
o
i
t
a
r
e
t
i
(
s
l
l
e
c
d
e
t
a
l
u
m
i
s
e
h
t
f
o
e
m
i
t
g
n
i
l
b
u
o
D
t
G
l
a
e
r
t
G
1
t
2
t
d
e
m
i
t
p
p
p
c
g
n
i
r
p
s
e
h
t
f
o
s
u
l
u
d
o
m
e
l
i
s
n
e
t
e
h
T
s
s
e
n
f
f
i
t
s
g
n
i
r
p
s
s
e
s
s
e
c
o
r
p
n
o
i
t
a
g
n
o
l
e
n
e
e
w
t
e
b
s
n
o
i
t
a
r
e
t
I
d
e
e
p
s
h
t
w
o
r
g
t
G
r
e
p
s
E
D
O
e
h
t
f
o
s
p
e
t
s
f
o
r
e
b
m
u
N
s
l
l
e
c
t
n
e
i
p
i
c
e
r
s
l
l
e
c
r
o
n
o
d
f
o
f
o
r
e
b
m
u
n
l
a
i
t
i
n
I
r
e
b
m
u
n
l
a
i
t
i
n
I
n
o
i
t
i
n
fi
e
D
s
t
n
e
i
p
i
c
e
r
r
e
b
m
u
n
s
p
e
t
s
k
r
o
w
t
e
n
s
r
o
n
o
d
r
e
b
m
u
n
r
e
t
e
m
a
r
a
P
n
o
i
t
c
a
r
t
n
o
c
/
n
o
i
s
n
a
p
x
e
t
n
i
r
p
s
l
a
r
u
t
a
N
h
t
g
n
e
l
t
s
e
r
g
n
i
r
p
s
)
s
e
r
a
u
q
s
e
c
i
t
t
a
l
(
l
l
e
c
h
c
a
e
f
o
h
t
d
i
W
)
s
e
r
a
u
q
s
e
c
i
t
t
a
l
(
l
l
e
c
h
c
a
e
f
o
h
t
g
n
e
L
h
t
g
n
e
l
h
t
d
i
w
d
l
r
o
w
d
e
t
a
l
u
m
i
s
e
h
t
f
o
e
z
i
S
s
l
l
e
c
f
o
e
c
n
a
r
e
l
o
t
e
r
u
s
s
e
r
P
w
e
i
v
n
e
e
r
c
s
p
a
l
r
e
v
o
x
a
m
n
o
i
t
i
n
fi
e
D
r
e
t
e
m
a
r
a
P
.
s
r
e
t
e
m
a
r
a
p
n
o
i
t
a
l
u
m
i
s
l
a
b
o
l
G
.
2
e
l
b
a
T
6
Figure 2. Validation of cell movement and conjugation dynamics using real data. (A): Figure
extracted from [21] where a colony of Pseudomonas putida is divided into dark red donor cells (DsRed),
yellow recipient cells (YFP) and transconjugants, expressing both yellow and green light (YFP and
GFP). The upper row shows the transconjugant signal, and the bottom row shows the whole
community. (B and C): Simulation results. Two simulations of similar colonies are recorded over
exactly the same time intervals (min). The colours of the cells match the colours observed in (A).
Graphs (D), (F) and( H) are extracted from [24], and show experimental results of Escherichia Coli
growth regarding density, velocity and ordering (respectively). Graphs (E), (G) and (I) correspond to
simulations in similar conditions to [24], for the same parameters (density, velocity and ordering
respectively). Tests 1, 2 and 3 in graphs correspond to different spatial distribution of cells inside the
microfluidic chanel (details in text).
7
Figure 3. Horizontal transfer of a two-component genetic oscillator. A: Transcriptional-level design.
The activator (green) acts on itself and on the repressor (red) by inducing the transcription of both.
The represor acts on the activator by repressing its transcription. As a result, molecule x (as well as y
oscillates in time. B: Cells growing in a cross-shaped channel. At 250 (minutes) we clearly see the
position of both donor (left hand, with the oscillator inside) and recipient (right hand, empty) strains.
The intensity of green colour denotes the amount of molecule x inside cells in that specific time.
Through conjugation, the oscillator is copied to the initial recipient strain (t = 1000 min). C: Using the
same experiment as in B, measurement over time of the maximum level of molecule x in a single cell.
Black arrow highlights the point in time when conjugation starts (t (cid:39) 550 min).
using images of a Pseudomonas putida population
(Figure 2A) extracted with permission from [21].
These show donor cells (dark red) growing in con-
tact with recipients (yellow). The DNA information
they share after conjugation makes the transconju-
gant cells display GFP (green fluorescent protein).
We adjusted the parameters of our simulations until
the behaviour matched the images of real cells (two
simulations shown: Figures 2B and 2C), in terms of
both time-series behaviour and the type of physical
pattern displayed. It is important to note that the
differential probabilities of conjugation of donors
and transconjugants (higher in the latter) causes di-
rectional spreading of the DNA information. After
the first transconjugant appears (160 minutes), the
newly-formed transconjugants appear -most prob-
ably - in the immediate neighbourhood. The final
parameter values used to reproduce this experiment
width=5, length=15, growth speed=30,
are:
p d=0.001, p t1=0.02, p t2=0.05 and c time=450
(the rest of the parameters are as defined in the
DiSCUS distribution). Movie DemoConjugation1
(found in the pro ject repository) shows a simulation
of a similar experiment where the transconjugants
do not act as new donors.
4.2 Biomechanical properties
The second set of validation experiments focuses on
biomechanical movement. We use data from [24],
which describe an Escherichia coli colony growing
in a microfluidic channel (30 * 50 * 1 µm3 ) (Fig-
ures 2D, 2F and 2H). Using the same parameter
setup (width=5, length=24, growth speed=30)
we highlight how different initial positioning of cells
inside the channel can affect the final result (test1,
with more cells observed in the centre than at the
edges; test2 with all cells initially in the centre; test3
with all cells homogeneously spread along the chan-
nel). Density graphs (Figures 2D and 2E) show the
increasing curve as the channel becomes more pop-
ulated (results vary depending on which area is con-
sidered for monitoring). Velocity gradients (Figures
2F and 2G) depict the differential velocity across
the longitudinal axis of the channel with respect to
the centre (we see negative values when the cells in
the centre move faster than the rest). The differ-
ence in the y axis is due to our considering different
spacial intervals in the velocity gradient calculation.
Ordering graphs (Figures 2H and 2I) are based on
8
calculating the cosine of a cell’s angle with respect
to the longitudinal axis of the channel (e.g. angle
0, cos(0)=1, completely aligned). As time increases,
we see that the cells tend to align themselves.
4.3 Internal cell “program”
Figure 3 shows the results of the next set of exper-
iments, aiming at studying the horizontal transfer
of a two-component oscil lator. The transcriptional-
level design of the circuit is shown in Figure 3(A),
which causes the molecular concentration of a re-
pressor (y) and an activator (x) to oscillate over
time. Each molecule is produced by a gene when
its upstream promoter is activated. The activator
can induce its own production at the same time as
inducing the production of the repressor, which in
turns inhibits the production of the activator.
In
Figure 3B we place (250 minutes) an initial donor
colony (with the two-component oscillator inside)
on the left-hand side of a cross-shaped channel,
while a recipient colony is placed on the right.
As the equations for the oscillator have no
stochasticity, every cell of the donor strain shows
exactly the same state of the circuit as every other
cell. At the beginning (250 minutes), these cells
show a green colour (corresponding to the molecular
concentration of x) which is switched off during the
time intervals in which the repressor is on (see time
profile of Figure 3C). When conjugation starts (at
around t (cid:39) 550), the newly formed transconjugant
cells are given the circuit but, importantly, they do
not share the state of the circuit of the cells from
which they receive the message. During the DNA
transfer, it is only the plasmid (circuit carrier) that
is copied into the recipient; therefore, both molec-
ular concentrations are null, and the circuit begins
its functioning from the initial stage. That is why
we clearly observe different green intensities within
the community. This asynchronous behaviour hap-
pens only in the transconjugants, while the circuits
inside the donors always run synchronously (due to
deterministic equations).
A time profile of the previous experiment is
shown in Figure 3C, where the maximum level of
activator (x) concentration in a single cell (com-
pared with the whole population) is recorded over
time. Before conjugation starts, all cells in the con-
sortia display perfect synchrony. After conjugation
(shown with an arrow on the graph) there is al-
ways a cell with the maximum level of activator,
which demonstrates high asynchrony. All param-
eter values regarding cell dimensions or conjuga-
tion probabilities are the same as in Figures 2B
and 2C. Parameters relevant to the oscillator are:
network steps=18 and Gt=450. Movie DemoCon-
jutagion2 (found in the pro ject repository) shows
this experiment and Movie DemoDynamics1 shows
donor cells growing with a stochastic version of the
oscillator.
4.4 Effects of mixing
Conjugation behaviour within a population may be
altered in different ways to achieve different be-
haviours, depending on the desired application. For
example, in the previous experiments described in
this paper, transconjugants are unable to act as re-
cipients (simulating a radical entry exclusion [25]).
That is to say, they will not receive more plasmids
(genetic circuits) from either donors or transcon-
jugants. Furthermore, we may also engineer the
transconjugants to stop acting as new donors [10],
so that only the original donors have the ability
to transfer the DNA message. Mixing of the cell
population becomes essential in this last scenario,
in order to ensure maximal contact between donors
and recipients. In Figure 3B we see how, at the end
of the experiment (1000 minutes), donors and the
transconjugants cover different areas of the channel
(left and right respectively), without being mixed.
We now study the autonomous mixing be-
haviour of cells under different environmental condi-
tions, with the third sets of experiments (Figure 4).
Firstly we investigate how morphological changes
in a longitudinal microfluidic channel can affect the
patterns being formed by the consortia and its mix-
ing. Figure 4A shows three bacterial strains (each
shown in a different colour) growing in a channel
from different starting points. As we can see, their
mixing is highly improbable. The main reason for
this is the velocity and directionality of the cells. As
the cells are washed out at the edges of the channel,
all of them travel (they only have passive movement
while being pushed) at variable speed from centre
to left or from centre to right. This causes the cells
to have the same direction (see vector field), which
in turn makes mixing more difficult. In Figures 4B
and 4C we show the result of altering the morphol-
ogy of the channels, by adding columns and zig-zag
9
walls, respectively. As a result, the cells show differ-
ent directionality (see vector fields) and the strains
have a higher probability of being mixed. In both
experiments (unlike 4(A)), the three strains are in
contact at some point. If the experimental applica-
tion relied on the conjugation of purple and yellow
cell pairs, for example, we can see that these phys-
ical changes in the channel would be essential.
Another way to intensify the mixing of strains
in a microfluidic trap is to change the main channel
flow strength, with the ob jective of creating turbu-
lence inside the trap. Figures 4D and 4E show a
three-strain population growing in a trap (identi-
cal initial positioning of cells in both) with the only
difference being that the strong flow in the main
channel (white arrows) of 4E creates turbulence (in
the direction of the circled arrow). Two different
colonies are simulated in each experiment, inside
both symmetrical and independent traps. We see
how turbulence helps the cells to get mixed, thanks
to the constant change of direction they display
(see vector field in Figure 4F). Furthermore, we can
avoid missing one strain, as happens with the yel-
low cells in 4D (see Movie DemoDynamics2 -found
in the pro ject repository-), where another run of
this experiment is shown).
Investigations of how manual mixing can affect
conjugation frequencies are described in in [10], us-
ing an Escherichia coli population. We now repro-
duce those results using our software, and give valu-
able insight into the reasons for that behaviour: the
isolation of the recipients. For that purpose (Figure
5) we grow a population of donors (D, red) and re-
cipients (R, yellow) in which the ratio D/R is 50%
and the transconjungants (T, green) are unable to
act as new donors. The frequency of conjugation,
Y, is measured as Y = T/(R + T). The graph in
Figure 5C shows the frequency after 560 minutes of
untouched populations (not mixed, blue bars) and
populations that have been manual ly mixed at 420
minutes (red bars). The difference that the mix-
ing produces is based on the isolation of the recip-
ients in untouched populations. Figure 5A shows
two different occasions in which clusters of recipi-
ents are formed, where the transconjugants do not
allow donors to reach new possible mates. After the
population is completely “shuffled” (5B), the clus-
ters are dissolved, and new pairs of donor-recipient
can arise in the new topology.
10
Figure 4. Dynamical mixing of bacterial strains under different conditions. (A): Three strains (purple,
yellow and blue) growing in a longitudinal pipe. Detail (on the right) shows the vector field
corresponding to the red square (on the left) where the arrows display both directionality and velocity
of every cell. (B): Similar to (A), but with four columns placed in the middle of the pipe. (C): Similar
to A, but with zig-zag borders along the pipe. In (A), (B) and (C), the speed in vector fields is
measured in arbitrary units (a.u.). (D): Six strains (three per trap) grow in two square traps on one
side of the main longitudinal channel. The flow in the channels follows the direction of the arrows. (E):
Similar to (D) but with a much stronger flow in channels, causing turbulence in traps (long circled
arrow). (F): Vector field of experiment (E).
Figure 5. Effects of manual mixing on conjugation frequency. (A): Recipient-trapping behaviour of a
population with donors (red), transconjugants (green) and recipients (yellow). Two snapshots depict
clearly-observed clusters. (B): Population after random mixing, where the clusters are automatically
dissolved. (C): Graph showing conjugation frequencies (Y = T/(R + T)) of 560-minute experiments
(ratio D/R = 50%). Blue bars represent Y on an untouched population, while red bars represent Y
when the population is mixed at 420 minutes. The two sets of bars correspond to experiments with
different cell dimensions (1x3 -left- and 1x2 -right). Error bars show variation across 15 experiments of
each class.
An interesting result from Figure 5C is the fact
that the smaller the size of the cell, the higher re-
sults we observe for conjugation frequencies. This
may be due to the fact that smaller cells are able to
slip through physical gaps, and the biomechanical
ordering of the population becomes more “fuzzy”.
This underlines the importance of considering the
physical shape of cells, since circle-shaped cells
would not give valid results.
5 Discussion
The conjugation model presented here is the first
agent-based model to explicitly simulates the con-
jugation process with growing rod-shaped cells. Full
validation against real data is performed, which
shows the capacity of the software to reproduce ob-
served behaviour. In addition, the mixing study of-
fers valuable insights into the design of multi-strain
populations. The software also allows for genetic
programs to be instal led inside cells; the potential
for horizontal gene transfer to recreate distributed
information processing within a microbial consor-
tium is of significant interest in synthetic biology,
and the software presented will aid the design and
testing of systems before their wet-lab implementa-
tion.
References
1. Heinemann M, Panke S (2006) Synthetic
biology–putting engineering into biology.
Bioinformatics 22: 2790–9.
2. Basu S, Gerchman Y, Collins CH, Arnold
FH, Weiss R (2005) A synthetic multicellular
system for programmed pattern formation.
Nature 434: 1130–4.
3. Mac´ıa J, Posas F, Sol´e RV (2012) Distributed
computation: the new wave of synthetic bi-
ology devices. Trends in Biotechnology 30:
342–9.
11
5. Gardner TS, Cantor CR, Collins JJ (2000)
Construction of a genetic toggle switch in Es-
cherichia coli. Nature 403: 339–42.
6. Auslander S, Auslander D, Muller M,
Wieland M, Fussenegger M (2012) Pro-
grammable single-cell mammalian biocom-
puters. Nature 487: 123–127.
7. Atkinson S, Williams P (2009) Quorum sens-
ing and social networking in the microbial
world. Journal of the Royal Society Interface
6: 959–78.
8. Ortiz ME, Endy D (2012) Engineered cell-cell
communication via DNA messaging. Journal
of Biological Engineering 6.
9. de la Cruz F, Frost LS, Meyer RJ, Zechner
EL (2010) Conjugative DNA metabolism in
Gram-negative bacteria. FEMS Microbiology
Reviews 34: 18–40.
10. del Campo I, Ruiz R, Cuevas A, Revilla C,
Vielva L, et al. (2012) Determination of con-
jugation rates on solid surfaces. Plasmid 67:
174–82.
11. Gorochowski TE, Matyjaszkiewicz A, Todd
T, Oak N, Kowalska K, et al. (2012) BSim:
an agent-based tool for modeling bacterial
populations in systems and synthetic biology.
PLOS ONE 7: e42790.
12. Kreft JU, Booth G, Wimpenny JW (1998)
BacSim, a simulator for individual-based
modelling of bacterial colony growth. Micro-
biology 144: 3275–87.
13. Melke P, Sahlin P, Levchenko A, Jo H (2010)
A cell-based model for quorum sensing in het-
erogeneous bacterial colonies. PLoS Compu-
tational Biology 6: e1000819.
14. Rudge TJ, Steiner PJ, Phillips A, Haseloff J
(2012) Computational modeling of synthetic
microbial biofilms. ACS Synthetic Biology 1:
345–352.
4. Tamsir A, Tabor JJ, Voigt Ca (2011) Robust
multicellular computing using genetically en-
coded NOR gates and chemical ’wires’. Na-
ture 469: 212–5.
15. Emonet T, Macal CM, North MJ, Wicker-
sham CE, Cluzel P (2005) AgentCell: a digi-
tal single-cell assay for bacterial chemotaxis.
Bioinformatics 21: 2714–21.
16. Izaguirre J, Chaturvedi R, Huang C, Cick-
ovski T, Coffland J, et al. (2004) CompuCell,
a multi-model framework for simulation of
morphogenesis. Bioinformatics 20: 1129–37.
17. Holmes AB, Kalvala S, Whitworth DE (2010)
Spatial simulations of myxobacterial devel-
opment. PLoS Computational Biology 6:
e1000686.
18. Krone SM, Lu R, Fox R, Suzuki H, Top
EM (2007) Modelling the spatial dynamics
of plasmid transfer and persistence. Microbi-
ology 153: 2803–16.
19. Merkey BV, Lardon LA, Seoane JM, Kreft
Ju, Smets BF (2011) Growth dependence of
conjugation explains limited plasmid invasion
in biofilms : an individual-based. Environ-
mental Microbiology 13: 2435–2452.
20. Lardon L, Merkey B, Martins S, Dotsch
A, Picioreanu C, et al. (2011) iDynoMiCS
: next-generation individual-based modelling
of biofilms. Environmental Microbiology 13:
2416–2434.
12
21. Seoane J, Yankelevich T, Dechesne A,
Merkey B, Sternberg C, et al. (2011) An
individual-based approach to explain plasmid
invasion in bacterial populations. FEMS Mi-
crobiology Ecology 75: 17–27.
22. Guantes R, Poyatos JF (2006) Dynamical
principles of two-component genetic oscilla-
tors. PLoS Computational Biology 2: e30.
23. Goni-Moreno A, Amos M (2012) A reconfig-
urable NAND/NOR genetic logic gate. BMC
Systems Biology 6.
24. Volfson D, Cookson S, Hasty J, Tsimring
LS (2008) Biomechanical ordering of dense
cell populations. Proceedings of the National
Academy of Sciences of the United States of
America 105: 15346–51.
25. Garcill´an-Barcia MP, Cruz FD (2008) Why
is entry exclusion an essential feature of con-
jugative plasmids? Plasmid 60: 1–18.
|
1804.05409 | 1 | 1804 | 2018-04-15T19:03:17 | Simon's Anthill: Mapping and Navigating Belief Spaces | [
"cs.MA",
"cs.CY"
] | In the parable of Simon's Ant, an ant follows a complex path along a beach on to reach its goal. The story shows how the interaction of simple rules and a complex environment result in complex behavior. But this relationship can be looked at in another way - given path and rules, we can infer the environment. With a large population of agents - human or animal - it should be possible to build a detailed map of a population's social and physical environment. In this abstract, we describe the development of a framework to create such maps of human belief space. These maps are built from the combined trajectories of a large number of agents. Currently, these maps are built using multidimensional agent-based simulation, but the framework is designed to work using data from computer-mediated human communication. Maps incorporating human data should support visualization and navigation of the "plains of research", "fashionable foothills" and "conspiracy cliffs" of human belief spaces. | cs.MA | cs | Simon's Anthill: Mapping and Navigating Belief Spaces
PHILIP FELDMAN AND AARON DANT, ASRC Federal
WAYNE LUTTERS, University of Maryland Baltimore County
8
1
0
2
r
p
A
5
1
]
A
M
.
s
c
[
1
v
9
0
4
5
0
.
4
0
8
1
:
v
i
X
r
a
Fig. 1. Flocking (green) and stampeding (red) agents
Fig. 2. Belief Map, using simulated lexical trajectories
INTRODUCTION
1.
In the parable of Simon's Ant [Simon 1968], an ant follows a complex path along a beach on to reach its goal. The story
shows how the interaction of simple rules and a complex environment result in complex behavior. But this relationship
can be looked at in another way – given path and rules, we can infer the environment. With a large population of agents
– human or animal – it should be possible to build a detailed map of a population's social and physical environment.
In this abstract, we describe the development of a framework to create such "maps" of human belief space. These
maps are built from the combined trajectories of a large number of agents. Currently, these maps are built using
multidimensional agent-based simulation, but the framework is designed to work using data from computer-mediated
human communication. Maps incorporating human data should support visualization and navigation of the "plains of
research" , "fashionable foothills" and "conspiracy cliffs" of human belief spaces.
2. PREVIOUS WORK
Coming to consensus is rarely an act of compromise. Imagine the passengers of a car, lost and stopped at an intersection
with no GPS. Each passenger has a different idea of where to go. If everyone compromises, then the car will stay at
the intersection. Instead, the passengers need to find a way to agree on a single direction. [Moscovici and Doise 1994]
studied how these kinds of groups first simplify a complex problem, and then align themselves for or against this
simplification. A neurological basis for this sense of "shared direction" has been uncovered by [Stephens et al. 2010],
who showed that fMRI patterns in the brains of storytellers and listeners aligned as a function of shared understanding.
Finding consensus has similarities to collective animal behavior in physical space. Flocking has been shown to
represent a form of group cognition [Petit and Bon 2010]. Schooling fish are better at sensing food in noisy environ-
ments [Grunbaum 1998]. Danchen et. al. showed that animals and humans both use inadvertent social information to
Collective Intelligence 2018.
1:2
•
P. Feldman, A. Dant, and W. Lutters
influence decisions about environmental quality and appropriateness [Danchin et al. 2004]. Agent-based simulation
has proven to be a particularly effective mechanism for modeling these animal patterns [Reynolds 1987], while also
proving effective at modeling cognitive actions such as culture dissemination [Sen and Chakrabarti 2013]. The com-
mon properties of these and other collective behaviors have been explored by [Olfati-Saber et al. 2007], who provides
a theoretical framework for analysis of consensus algorithms for multi-agent networked systems.
3. THE MODEL
Our model is based on two ideas: 1) that human navigation through belief space (a subset of information space that
contains items associated with opinions) is analogous to animal motion through physical space, and 2) that the digital
inadvertent social information provided by humans interacting with the belief environment can be used to characterize
the underlying belief space. To explore these concepts in depth, we built a standalone simulator (Fig.1), based on the
Reynolds model [Reynolds 1987], that represents belief space as a hypercube composed of labeled cells, that supports
manipulating the following elements:
(1) Dimension – Since the number of beliefs that a person may hold is not limited by physical space, the Reynolds
algorithm was modified to work with arbitrary numbers of dimensions.
(2) Velocity – Humans and animals dynamically interact with their physical and information environments. Although
they may have regions or territories that they prefer [Dosen and Ostwald 2013], movement in the physical and
political sense is a defining characteristic.
(3) Heading – There appears to be a rate-limited alignment component that is needed for a group to coalesce. This is
obvious in the physical patters of flocking or schooling, but also manifests in language (e.g. "political alignment")
[DeNicola 2017] and fashion [Curran 1999].
(4) Influence – Agents within a specified social influence horizon (SIH) are capable of influencing each other's ori-
entation and speed in that space, inversely proportional to distance. This interacts with heading, as more aligned
agents have more time to influence each other [Olfati-Saber et al. 2007].
The model produces distinct emergent patterns, by adjusting only the SIH. A zero radius has no interaction, while an
infinite radius interacts with the entire population equally. Additionally, these behaviors emerge more easily at lower
dimensions. We describe the patterns, shown here as agents on a heatmap, as:
Fig. 3. Nomadic Phase
Fig. 4. Flocking Phase
Fig. 5. Stampede Phase
Nomadic Phase (figure 3) - A low SIH means low influence by other agents, so each agent moves along its own
largely independent path.
Flocking Phase (figure 4) - An intermediate SIH results in an agent whose movement is affected by nearby individ-
uals. There is alignment with neighbors, but they do not converge.
Stampede Phase (figure 5) - At high SIH, all members are exposed equally to each other. Alignment converges and
supports runaway conditions [Lande 1981]. This is represented in other literature as "filter bubbles", "echo chambers"
[Flaxman et al. 2016], "group polarization", and "extremism" [Moscovici and Doise 1994].
Collective Intelligence 2018.
Simon's Anthill
•
1:3
4. RESULTS
We used Dynamic Time Warping (DTW) [Salvador and Chan
2007] to determine population membership with respect to SIH.
DTW attempts to find the lowest distance that one set of points
need to be moved to exactly match another sequence of points.
The distribution of DTW distance by agent SIH is shown in
Figure 6. The populations are distinctive and non-overlapping
in our datasets.
The simulator stores a trajectory for each agent that con-
tains the labels of each "belief cell" that they traversed at each
time sample, which serve as a proxy for word embeddings. Like
Yao's dynamic Word2Vec work [Yao et al. 2018], these sets of
terms describes the agent's semantic path. To construct maps
of the environmental and social features of the belief space, we
build a network of term-nodes, using all the agents' trajectories.
Each trajectory creates a string of nodes, one for each cell that
the agent passed through. Common nodes are shared. As trajec-
tories accumulate, identifiable characteristics emerge. Layout is
calculated using the F-R Force-directed algorithm [Fruchterman
and Reingold 1991]. Examples of these constructions are shown in Figures 7, 8, and 9.
Fig. 6. Nomad, Flock, and Stampede DTW
Fig. 7. Nomad map
Fig. 8. Flock map
Fig. 9. Stampede map
In these maps, node size represents the average time that an agent spent "over" the cell, while brightness represents
unique visitors. These maps reflect the characteristics of their respective populations. The nomadic group reproduces
the rectangular shape of the environment. With flocking social influence tends to pull agents towards denser areas away
from the borders. This results in a map with detailed popular areas where agents congregate and unexplored areas
that do not have a reliable relationship with the underlying terms. The stampeding group has the same environmental
awareness of a single agent, but the social inertia of a population. In the map produced by this behavior, the relationship
of the trajectories to the underlying coordinate frame is completely lost.
When we lay out the flocking and stampeding values on the nomadic network, we can see a belief map (Fig 2)
that shows the bounds of the explored environment and the populations. In the image, cylinder diameter is the average
agent dwell time and height is the number of unique visitors. The white nomad population establishes the environment.
The flocking population clusters towards the center, reflecting the mix of social and environmental influences. The red
cylinders reflect the socially dominated behavior of stampeding agents. The gray mesh is all nomad paths.
The next goal of this effort will be to validate our theoretical, simulated model against clean, annotated data of
computer-mediated human interaction. In success, this should lead to the automated production of maps that allow
users to contextualize the beliefs they hold and those they encounter.
Collective Intelligence 2018.
1:4
•
P. Feldman, A. Dant, and W. Lutters
REFERENCES
Louise Curran. 1999. An analysis of cycles in skirt lengths and widths in the UK and Germany, 1954-1990. Clothing and Textiles Research Journal
17, 2 (1999), 65–72.
Etienne Danchin, Luc-Alain Giraldeau, Thomas J Valone, and Richard H Wagner. 2004. Public information: from nosy neighbors to cultural
evolution. Science 305, 5683 (2004), 487–491.
Daniel R DeNicola. 2017. Understanding Ignorance: The Surprising Impact of What We Don't Know. MIT Press.
Annemarie S Dosen and Michael J Ostwald. 2013. Methodological characteristics of research testing prospect–refuge theory: a comparative
analysis. Architectural Science Review 56, 3 (2013), 232–241.
Seth Flaxman, Sharad Goel, and Justin M Rao. 2016. Filter bubbles, echo chambers, and online news consumption. Public Opinion Quarterly 80,
S1 (2016), 298–320.
Thomas M. J. Fruchterman and Edward M. Reingold. 1991. Graph drawing by force-directed placement. Software: Practice and Experience 21,
11 (1991), 1129–1164. DOI:http://dx.doi.org/10.1002/spe.4380211102
Daniel Grunbaum. 1998. Schooling as a strategy for taxis in a noisy environment. Evolutionary Ecology 12, 5 (1998), 503–522.
Russell Lande. 1981. Models of speciation by sexual selection on polygenic traits. Proceedings of the National Academy of Sciences 78, 6 (1981),
3721–3725.
Serge Moscovici and Willem Doise. 1994. Conflict and consensus: A general theory of collective decisions. Sage.
R. Olfati-Saber, J. A. Fax, and R. M. Murray. 2007. Consensus and Cooperation in Networked Multi-Agent Systems. Proc. IEEE 95, 1 (Jan 2007),
215–233. DOI:http://dx.doi.org/10.1109/JPROC.2006.887293
Odile Petit and Richard Bon. 2010. Decision-making processes: the case of collective movements. Behavioural Processes 84, 3 (2010), 635–647.
Craig W. Reynolds. 1987. Flocks, Herds and Schools: A Distributed Behavioral Model. In Proceedings of the 14th Annual Conference on Computer
Graphics and Interactive Techniques (SIGGRAPH '87). ACM, New York, NY, USA, 25–34. DOI:http://dx.doi.org/10.1145/37401.37406
Stan Salvador and Philip Chan. 2007. Toward accurate dynamic time warping in linear time and space. Intelligent Data Analysis 11, 5 (2007),
561–580.
Parongama Sen and Bikas K Chakrabarti. 2013. Sociophysics: an introduction. Oxford University Press.
Herbert A Simon. 1968. The sciences of the artificial. MIT press.
Greg J. Stephens, Lauren J. Silbert, and Uri Hasson. 2010. Speaker–listener neural coupling underlies successful communication. Proceedings of
the National Academy of Sciences 107, 32 (2010), 14425–14430. DOI:http://dx.doi.org/10.1073/pnas.1008662107
Zijun Yao, Yifan Sun, Weicong Ding, Nikhil Rao, and Hui Xiong. 2018. Dynamic Word Embeddings for Evolving Semantic Discovery. In Pro-
ceedings of the Eleventh ACM International Conference on Web Search and Data Mining (WSDM '18). ACM, New York, NY, USA, 673–681.
DOI:http://dx.doi.org/10.1145/3159652.3159703
Collective Intelligence 2018.
|
cs/0509050 | 1 | 0509 | 2005-09-16T17:15:46 | Effect of door delay on aircraft evacuation time | [
"cs.MA"
] | The recent commercial launch of twin-deck Very Large Transport Aircraft (VLTA) such as the Airbus A380 has raised questions concerning the speed at which they may be evacuated. The abnormal height of emergency exits on the upper deck has led to speculation that emotional factors such as fear may lead to door delay, and thus play a significant role in increasing overall evacuation time. Full-scale evacuation tests are financially expensive and potentially hazardous, and systematic studies of the evacuation of VLTA are rare. Here we present a computationally cheap agent-based framework for the general simulation of aircraft evacuation, and apply it to the particular case of the Airbus A380. In particular, we investigate the effect of door delay, and conclude that even a moderate average delay can lead to evacuation times that exceed the maximum for safety certification. The model suggests practical ways to minimise evacuation time, as well as providing a general framework for the simulation of evacuation. | cs.MA | cs | Effect of door delay on aircraft evacuation time
Martyn Amos and Andrew Wood
Department of Computer Science, University of Exeter, Harrison Building, North Park
Road, Exeter EX4 4QF, UK
The recent commercial launch of twin-deck Very Large Transport Aircraft
(VLTA) such as the Airbus A380 has raised questions concerning the speed at
which they may be evacuated 1. The abnormal height of emergency exits on the
upper deck has led to speculation that emotional factors such as fear may lead to
door delay, and thus play a significant role in increasing overall evacuation time 2.
Full-scale evacuation tests are financially expensive and potentially hazardous, and
systematic studies of the evacuation of VLTA are rare 3. Here we present a
computationally cheap agent-based framework 4 for the general simulation of
aircraft evacuation 5-7, and apply it to the particular case of the Airbus A380. In
particular, we investigate the effect of door delay, and conclude that even a
moderate average delay can lead to evacuation times that exceed the maximum for
safety certification. The model suggests practical ways to minimise evacuation
time, as well as providing a general framework for the simulation of evacuation.
The safe and rapid evacuation of passengers from aircraft during emergencies is
clearly of paramount importance. In order for an aircraft to meet national and
international regulations 8,9, and thus receive certification of its worthiness to fly, tests
must be carried out to ensure that certain evacuation conditions are met. The most
crucial of these conditions is that an aircraft must be capable of being fully evacuated of
passengers and crew within 90 seconds, with only half of the emergency exits available.
Full-scale live evacuation trials using volunteers are expensive to implement and
potentially dangerous for the participants 3. An aircraft's certification is therefore often
2
based on the results of a single trial, and these results are usually kept confidential for
commercial reasons. At the time of writing, no full evacuation test has been carried out
for the Airbus A380. This aircraft is unusual in that it has a “ double-decker ” design,
with two passenger decks stacked one on top of the other. This configuration raises
particular issues concerning evacuation; specifically, the height of the upper exit doors
from the ground. Fears have been raised that the abnormal height (7.9m) of the upper
exits may lead to some passengers delaying their exit from the aircraft 2. Door hesitation
may prove costly in terms of the overall evacuation time, but we are unaware of any
detailed and realistic studies examining the impact of this particular factor.
In order to augment live trials, several computer models have been developed to
simulate the effect on overall evacuation speed of varying factors such as seat
configuration 10, exit spacing 11 and passenger/crew behaviour 6, as well as events such
as fire 7. We propose, along similar lines, a model that may be used to quickly
investigate the particular effect of exit door hesitation on aircraft evacuation time. We
use an agent-based passenger modelling approach, combined with a grid-based
environmental representation. The model was implemented in the NetLogo
programming language 12, a standard multi-agent modelling environment. The internal
structure of the aircraft is represented as a two-dimensional grid of “ patches” , each of
which represents a real area of 0.25m2 (i.e., each patch is 0.5m by 0.5m). The front of
the aircraft is to the right, with the port side at the top, and the starboard side at the
bottom. The mechanism to implement realistic movement of passengers towards the
exits is inspired by a model of slime-mold 13, which uses simple pheromone-based cues
to facilitate cellular aggregation. Each patch is colour-coded according to its proximity
to an exit (coloured red, two patches wide). The brightness of a patch is directly
proportional to its proximity to an exit, and by defining the intensity of various patches
we may highlight one or more routes from any square to the nearest exit. In this way, we
may embed within the simulation signals corresponding to both the aircraft's floor-
3
situated guidance lights and directional instructions issued by the flight crew. In order to
conform to certification regulations, we choose three exits at random (the front and rear
port exits, and the central starboard exit) and block them off with dark patches. Black
patches represent either the gap between seat rows or the wall of the aircraft. An
example of the initial configuration, corresponding to the upper deck of the Airbus
A380, is depicted in Figure 1. We model only the upper deck, and assume no passenger
movement between decks (this is consistent with the planned evacuation test).
Passengers are represented as 199 individual entities (the small arrows in Figure 1) that
are initially placed in seat squares, and which move around the
grid in a probabilistic fashion. The figure of 199 represents full capacity for the A380
upper deck. Each passenger, Pi, has the following attributes defined: pi (current grid
position), hi (heading), mi (maximum speed), si (current speed), di (door delay). The
following global system variables are defined: D (mean passenger door delay, measured
in seconds), and O (exit opening time). The value for O represents the time taken for the
cabin crew to open the exit doors and for emergency slides to be fully deployed, and is
fixed at 14 seconds, based on previous studies 3. The origin of the coordinate system
used is at the centre of the aircraft, so internal grid positions run from -33 to 32 in the x-
dimension, and from 5 to -5 in the y-dimension. Headings range from 0 to 360
(degrees), with the default being 90 (i.e., pointing towards the front of the aircraft).
Door delay, di, is the time taken by an agent at an exit before leaving the aircraft, and is
initialised as a random Poisson-distributed real number with mean D. In order to
represent a full and realistic range of passenger ages and abilities, each agent is assigned
4
a minimum speed of 0 and a randomly-generated, Poisson-distributed maximum speed
between 0.3 m/s and 1.05 m/s, in line with previous studies 3.
A time variable, T, is set to 0, and incremented by 1 every 0.1s. During each
system “ tick” the following occurs: first, the exits are checked. If an agent Ai is on an
exit (and T*10 > O), then di is decremented by 0.1; if di reaches 0 (and T*10 >= O) then
the agent is considered to have exited the aircraft, and is removed from the simulation.
Each agent Pi is then instructed to move towards the nearest exit. This is achieved by Pi
adjusting its heading to try to move up the colour gradient defining the path to the
nearest exit (that is, if a patch adjacent to an agent has a higher colour intensity than the
one currently occupied, the agent will try to move to that patch). Adjacency is defined
by the Moore neighbourhood 14 (i.e., the 8 surrounding patches). All movement is
subject to the restriction that only one agent may occupy a given patch during a single
tick. If the patch ahead is occupied by another agent Pj, then Pi matches the speed of Pj
and decelerates (ensuring that si does not fall below 0); if the patch is empty, then Pi
accelerates (ensuring that si does not exceed mi) and then moves forward a distance
defined by si. This mechanism prevents agents from overtaking one another in the
corridor, leading to gradual group deceleration and the formation of “ traffic jams” , as
well as allowing agents to accelerate into available empty space.
The model was first calibrated with D=0. As data on actual evacuation tests are
commercially-sensitive and not freely available, we used the results obtained by a
previous study 3, which simulated a 90-second certification trial in an aircraft of similar
layout carrying 236 passengers on the upper deck. The average evacuation time in these
simulated trials was 64.1s (range 59.2 – 72.7 ). With a 16% smaller passenger capacity,
we would expect to obtain an average evacuation time in the vicinity of (0.84 * 64.1 =
54s). The average evacuation time for our model, over 100 trials, was 57.9s (std. dev.
1.50), suggesting that the base model is valid. We observed realistic traffic flow
5
patterns, with passengers making full use of alternative routes to the exit, where
available (movies illustrating this are supplied with the supplementary materials.)
We then investigated the effect of increasing average door delay, D. We carried
out 100 trials for each value 0.1 <= D <= 1.5 (in intervals of 0.1). Our findings are
plotted in Figure 2. Based on these results, we predict that the 90s certification threshold
for the Airbus A380 will be exceeded if average door delay, D, exceeds 1.1s. A small-
scale study 2, using a double-deck mock-up with 42 passengers and one exit, yielded an
average door delay of 1.53s. Increasing D to 1.5s within our model gives an average
evacuation time of 106.40s (118% of the certification threshold time.)
We now comment on generic aspects of our simulation framework. The model is
computationally cheap to run; in the worst case (i.e., where D = 1.5), 100 trials were
completed in 395 seconds (under 4 seconds per trial) on an NEC Versa laptop (140 GHz
Intel Pentium, 224 Mb of RAM) running Microsoft Windows XP. It is also
straightforward to add extra environmental or passenger-specific factors to the model,
with little additional computational cost (for example, we have included a “ general
6
uncertainty” variable in the model in order to study the effect of smoke or failure of
cabin warning systems, but this was unused in the current study).
Our agent-based evacuation model is based on plausible assumptions, and
generates realistic overall behaviour using a minimal set of variables. Having calibrated
the model according to available data, we are able to reproduce the findings of previous
studies of aircraft evacuation. We therefore conclude that it is suitable for drawing
conclusions about the effect of exit door hesitation on the evacuation of aircraft. In
addition, the use of environmental cues based on pheromones is a novel aspect of our
simulation which may well find broader application. The main implication of our
findings is that door delay must be minimised for effective evacuation, and this impacts
on airline policy on cabin crew training and passenger briefing. We now call for
complementary data from live evacuations in order to test our model quantitatively.
1. Muir, H. and Thomas, L. Passenger safety and very large transportation aircraft
Aircraft Engineering and Aerospace Technology 76(5), 479-486 (2004).
2. Jungermann, H. & Gohlert, C. Emergency evacuation from double-deck aircraft. In
Foresight and Precaution. Proceedings of ESREL 2000 (eds. Cottam, M.P., Harvey,
D.W., Pape, R.P. and Tait, J.) 989-982 (A.A. Balkema, Rotterdam, 2000).
3. Galea, E.R., Blake, S. & Gwynne, S. A methodology and procedure for the
introduction of aircraft evacuation simulation to the aircraft certification process.
European Commission VERRES project, available at
http://fseg.gre.ac.uk/fire/VERRES_Project.html
4. Wooldridge, M. An Introduction to Multiagent Systems (John Wiley & Sons, 2002).
5. Galea, E.R. & Perez Galparsoro,J.M. A computer-based simulation model for the
prediction of evacuation from mass-transport vehicles. Fire Safety Journal 22(4), 341-
366 (1994).
7
6. Muir, H.C., Bottomley, DM & Marrison, C. Effects of motivation and cabin
configuration on emergency aircraft evacuation behavior and rates of egress.
International Journal of Aviation Psychology 6(1), 57-77 (1996).
7. Galea, E.R., Owen, M. & Lawrence, P.J. Computer modelling of human behaviour in
aircraft fire accidents. Toxicology 115, 63-78 (1996).
8. Title 14, Code of Federal Regulations (14 CFR), Federal Aviation Regulations,
Washington, USA (1999).
9. JAR Section 1, Part 25.807. Large Aeroplanes: Subpart D Design and Construction,
as published in Joint Aviation Requirements (Change 15), 2001.
10. McLean, G.A., Chittum, C.B., Funkhouser, G.E., Fairlie, G.W. & Folk, E.W.
Effects of seating configuration and number of type III Exits on emergency aircraft
evacuation. FAA Office of Aerospace Medicine Report DOT/FAA/AM-92/27 (1992).
11. Blake, S.J., Galea, E.R., Gwynne, S., Lawrence, P.J. and Filippidis, L. Examining
the effect of exit separation on aircraft evacuation performance during 90-second
certification trials using evacuation modelling techniques. The Aeronautical Journal of
the Royal Aeronautical Society, 1-16 (2002).
12. Wilensky, U. NetLogo. http://ccl.northwestern.edu/netlogo/. Center for Connected
Learning and Computer-Based Modeling, Northwestern University. Evanston, IL.
(1999).
13. Resnick, M. Turtles, Termites and Traffic Jams: Explorations in Massively Parallel
Microworlds (MIT Press, Cambridge MA. 1994).
14. Tomassini, M., Sipper, M. & Perrenoud, M. On the generation of high-quality
random numbers by two-dimensional cellular automata. IEEE Transactions on
Computers 49(10), 1146–1151 ( 2000).
8
Authors declare they have no competing financial interests. A.W. contributed to model design and
implementation. M.A. contributed to model design and implementation, carried out experiments and
wrote the paper.
Correspondence and requests for materials should be addressed to M.A. ([email protected]).
Figure 1: Initial configuration of simulation. The internal layout of the aircraft is
defined by a grid of squares, with the port side at the top of the screen. Each
square is coloured according to its proximity to an exit, with the brightest
squares being closest. Passengers are represented by arrows. This example
depicts the situation where half of the exits are unavailable (rear and front port
side, middle starboard side).
Figure 2: Simulation results for different values of average door delay, D. Each
data point shows the average evacuation time over 100 trials for a particular
value of D. Error bars show standard deviation.
|
1503.08131 | 1 | 1503 | 2015-03-27T16:32:08 | Formation of Robust Multi-Agent Networks Through Self-Organizing Random Regular Graphs | [
"cs.MA",
"cs.SI",
"eess.SY",
"math.CO"
] | Multi-agent networks are often modeled as interaction graphs, where the nodes represent the agents and the edges denote some direct interactions. The robustness of a multi-agent network to perturbations such as failures, noise, or malicious attacks largely depends on the corresponding graph. In many applications, networks are desired to have well-connected interaction graphs with relatively small number of links. One family of such graphs is the random regular graphs. In this paper, we present a decentralized scheme for transforming any connected interaction graph with a possibly non-integer average degree of k into a connected random m-regular graph for some m in [k, k + 2]. Accordingly, the agents improve the robustness of the network with a minimal change in the overall sparsity by optimizing the graph connectivity through the proposed local operations. | cs.MA | cs | Formation of Robust Multi-Agent Networks Through Self-Organizing
Random Regular Graphs
A. Yasin Yazıcıoglu, Magnus Egerstedt, and Jeff S. Shamma
5
1
0
2
r
a
M
7
2
]
A
M
.
s
c
[
1
v
1
3
1
8
0
.
3
0
5
1
:
v
i
X
r
a
Abstract -- Multi-agent networks are often modeled as in-
teraction graphs, where the nodes represent the agents and
the edges denote some direct interactions. The robustness of a
multi-agent network to perturbations such as failures, noise,
or malicious attacks largely depends on the corresponding
graph. In many applications, networks are desired to have
well-connected interaction graphs with relatively small number
of links. One family of such graphs is the random regular
graphs. In this paper, we present a decentralized scheme for
transforming any connected interaction graph with a possibly
non-integer average degree of k into a connected random m-
regular graph for some m ∈ [k, k + 2]. Accordingly, the agents
improve the robustness of the network with a minimal change
in the overall sparsity by optimizing the graph connectivity
through the proposed local operations.
I. INTRODUCTION
Multi-agent networks have been used to characterize a
large number of natural and engineered systems such as
biological systems, financial networks, social networks, com-
munication systems, transportation systems, power grids, and
robotic swarms. Multi-agent networks are often represented
via their interaction graphs, where the nodes correspond to
the agents and the edges exist between the agents having
some direct interaction. Various system properties such as
the robustness, mixing time, or controllability of a network
greatly depend on the structure of the corresponding graph
(e.g., [1], [2], [3], [4], [5]). Therefore, graph theoretic analy-
sis of networked systems has received a considerable amount
of attention during the last decade (e.g., [6], [7]).
In many applications, multi-agent networks face various
perturbations such as component failures, noise, or malicious
attacks. One of the fundamental measures that capture the ro-
bustness of networks to such perturbations is the connectivity
of the corresponding graph. A graph is said to be k-node
(or -edge) connected if at least k nodes (or edges) should
be removed to render the graph disconnected. In general,
graphs with higher connectivity have higher robustness to
the targeted removal of their components [1], [2]. For many
networks, well-connected interaction graphs provide robust-
ness to not only the structural failures but also the functional
This work was supported by AFOSR/MURI #FA9550-10-1-0573 and
ONR Project #N00014-09-1-0751.
A. Yasin Yazıcıoglu is with the Laboratory for Information and Decision
Systems, Massachusetts Institute of Technology, [email protected].
Magnus Egerstedt is with the School of Electrical and Computer Engi-
neering, Georgia Institute of Technology, [email protected].
Jeff S. Shamma is with the School of Electrical and Computer En-
gineering, Georgia Institute of Technology, [email protected], and
with King Abdullah University of Science and Technology (KAUST),
[email protected].
perturbations such as noise (e.g., [8], [9]). Connectivity can
also be quantified via some spectral measures such as the
algebraic connectivity [10] or the Kirchhoff index [11]. An
arguably richer measure of connectivity is the edge (or
node) expansion ratio (e.g., [12], [13]). If the expansion
ratio of a graph is small, then it is possible to disconnect
a large set of nodes by removing only a small number of
edges (or nodes). Graphs with high expansion ratios are
called expanders. A detailed overview of expanders and
their numerous applications can be found in [14] and the
references therein.
The connectivity of a network can be improved by adding
more edges to the graph. However, each edge stands for
some communications, sensing, or a physical link between
the corresponding agents. Hence, more edges require more
resources. Moreover, too many edges may lead to higher
vulnerability to the cascading failures such as epidemics
(e.g., [15], [16]). Consequently, having a small number of
edges (i.e., sparsity) is desired in many applications. One
family of well-connected yet sparse graphs is the random
regular graphs. A graph is called an m-regular graph if the
number of edges incident to each node (the degree) is equal
to m. A random m-regular graph of order n is a graph that is
selected uniformly at random from the set of all m-regular
graphs with n nodes. As n goes to infinity, almost every
m-regular graph is an expander for any m ≥ 3 [13], [17].
In this paper, we present a decentralized scheme to
transform any connected interaction graph into a connected
random regular graph with a similar number of edges as the
initial graph. Some preliminary results of this work were
presented in [18] and [19], where any initial graph with
an integer average degree, k ∈ N, was transformed into a
random k-regular graph. In this paper, we extend our earlier
works to obtain a method that is applicable to the most
generic case, i.e. k ∈ R. The proposed method transforms
any graph with a possibly non-integer average degree of k
into a random m-regular graph for some m ∈ [k, k + 2]. As
such, the graph becomes well-connected, regardless of the
network size.
The organization of this paper is as follows: Section II
presents some related work. Section III provides some graph
theory preliminaries. Section IV formulates the problem
and presents the proposed solution. Section V provides a
distributed implementation and an analysis of the resulting
dynamics. Section VI provides some simulation results to
demonstrate the performance of the proposed solution. Fi-
nally, Section VII concludes the paper.
II. RELATED WORK
In some applications, the robustness of a graph is related
to the centrality measures such as the degree, betweenness,
closeness, and eigenvector centralities. Loosely speaking, the
centrality measures capture the relative importances of the
nodes in a graph. Detailed reviews on the centrality measures
and their applications can be found in [20], [21] and the
references therein. Typically, the perturbations applied to the
nodes with higher centrality scores have a stronger impact
on the overall system (e.g., [22], [23], [24], [25]). Hence,
graphs with unbalanced centrality distributions are usually
vulnerable to such worst-case perturbations.
In the literature,
there are many works related to the
interaction graphs. Some of these
construction of robust
works consider how a robustness measure can be improved
via some modifications to the graph topology. For instance,
such improvement can be achieved by rewiring a small
percentage of the existing edges (e.g., [26]) or adding a small
number of edges to the graph (e.g., [27], [9]).
Another group of studies consider the explicit construc-
tion of expanders. Expanders can be constructed via graph
operations such as zig-zag product (e.g., [28], [29]), or
derandomized graph squaring [30]. Furthermore, for any
m ∈ N such that m−1 is a prime power, an explicit algebraic
construction method for a family of m-regular expanders, i.e.
Ramanujan graphs, was presented in [31]. In [32], Watts-
Strogatz small-word networks are transformed into quasi
Ramanujan graphs by rewiring some of the edges.
Expanders can also be built as random m-regular graphs.
A detailed survey of the various models of random regular
graphs as well as their properties can be found in [33] and
the references therein. As n goes to infinity, almost every m-
regular graph has an algebraic connectivity arbitrarily close
to m − 2√m − 1 for m ≥ 3 [13], [17]. For regular graphs,
high algebraic connectivity implies high expansion ratios
(e.g., [34]). Hence, for any fixed m ≥ 3, a random m-
regular graph has the algebraic connectivity and expansion
ratios bounded away from zero, even if the network size is
arbitrarily large.
A random m-regular graph with n nodes can be con-
structed by generating m copies for each node, picking a
uniform random perfect matching on the nm copies, and
connecting any two nodes if the matching contains an edge
between their copies (e.g., [35], [36]). In [37], the authors
present a distributed scheme for incrementally building ran-
dom 2m-regular multi-graphs with m Hamiltonian cycles.
Alternatively, some graph processes may be designed to
transform an initial m-regular graph into a random m-regular
graph by inducing a Markov chain with a uniform limiting
distribution over the set of m-regular graphs (e.g., [38], [39]).
The method in this paper is also based on designing a graph
process with a uniform limiting distribution over the set of
m-regular graphs. Compared to the similar works in the
literature, the proposed scheme is applicable to the most
generic case, and it is decentralized. The initial graph is
not required to satisfy some strong properties such as being
regular or having an integer average degree. Furthermore, the
global transformation is achieved via only some local graph
operations.
III. PRELIMINARIES
An undirected graph, G = (V, E), consists of a set of
nodes, V , and a set of edges, E, given by unordered pairs of
nodes. A graph is connected if there exists a path between
any pair of nodes. A path is a sequence of nodes such that
an edge exists between any two consecutive nodes in the
sequence. Any two nodes are said to be adjacent if an edge
exists between them. We refer to the set of nodes adjacent
to any node, i ∈ V , as its neighborhood, Ni, defined as
Ni = {j (i, j) ∈ E}.
(1)
For any node i, the number of nodes in its neighborhood
is called its degree, di, i.e.,
di = Ni,
(2)
where Ni denotes the cardinality of Ni. For any graph G,
we use δ(G), ∆(G) and ¯d(G) to denote the minimum, the
maximum, and the average degrees, respectively. We refer
to the difference of the maximum and the minimum node
degrees in a graph as the degree range, f (G), i.e.
(3)
For any undirected graph, G = (V, E), the graph Lapla-
cian, L, is a symmetric matrix whose entries are given as
f (G) = ∆(G) − δ(G).
[L]ij =
di
−1
0
if i = j,
if (i, j) ∈ E,
otherwise.
(4)
The second-smallest eigenvalue of the graph Laplacian is
known as the algebraic connectivity of the graph, α(G).
Local graph transformations can be represented using the
framework of graph grammars (e.g., [40]). A grammar, Φ,
is a set of rules, where each rule is defined as a label-
dependent graph transformation. Each rule is represented as
an ordered pair of labeled graphs, r = (gl, gr), where the
labels represent the node states. Graph grammars operate
on labeled graphs. A labeled graph, G = (V, E, l), consists
of a node set, V , an edge set, E, and a labeling function,
l : V (cid:55)→ Σ, where Σ is the set of feasible node labels. A rule
is said to be applicable to a labeled graph, G = (V, E, l), if G
has a subgraph isomorphic to gl, i.e. if there is a bijection,
which preserves node labels and edges, between gl and a
subgraph of G. A rule, r = (gl, gr), transforms any graph
isomorphic to gl to a graph isomorphic to gr. A labeled
initial graph, G(0), along with a grammar, Φ, defines a non-
deterministic system represented as (G(0), Φ).
IV. DECENTRALIZED FORMATION OF RANDOM
REGULAR GRAPHS
A. Problem Formulation
Motivated by the connectivity properties of almost every
m-regular graph for m ≥ 3, this paper is focused on the
following problem: Assume that a multi-agent network is
initialized with an arbitrary connected interaction graph. How
can the agents reconfigure their links locally in a decentral-
ized fashion such that the resulting dynamics transform the
interaction graph into a connected random regular graph with
a similar sparsity as the initial graph? Such a transformation
is illustrated in Fig. 1.
(a)
(b)
Fig. 1. A fragile interaction graph (a) with an average degree 2.8 is trans-
formed into a random 3-regular graph (b). The graphs have similar sparsities,
whereas the structure in (b) has a significantly improved connectivity.
In order to transform the interaction graph into a random
regular graph, the agents need to pursue three global ob-
jectives: 1) balance the degree distribution, 2) randomize
the links, and 3) drive the average degree to an integer
close to its initial value. Furthermore, the agents should
ensure that the graph remains connected as they modify
their links. This paper presents a set of locally applicable
graph reconfiguration rules to pursue all of these global
objectives in parallel. In the remainder of this section, we
will
incrementally build the proposed scheme using the
framework of graph grammars.
B. Degree Balancing
As the first step towards building random regular graphs,
we present a local rule for balancing the degree distribution
in a network while maintaining the connectivity and the
total number of edges. The degree balancing task can be
considered as a quantized consensus problem (e.g., [41],
[42]), where each local update needs to be realized via some
local changes in the structure of the graph. In this part, we
design a single-rule grammar, ΦR, for balancing the degree
distribution. In ΦR, each node is labeled with its degree, i.e.
l(i) = di, ∀i ∈ V.
The proposed grammar, ΦR, is defined as
(5)
In accordance with ΦR, nodes behave as follows: Let i and
j be any pair of adjacent nodes. If dj < di, then a new link
is formed between j and an arbitrary neighbor of i, say h,
that is not currently linked with j. At the same time, the link
between i and h is terminated to maintain the overall sparsity.
Note that if dj < di, then i has at least one such exclusive
neighbor, h. Furthermore, if a connected graph is not regular
then there always exists at least one pair of adjacent nodes,
i and j, such that di > dj. Hence, any connected graph is
stationary (i.e., ΦR is not applicable anywhere on the graph)
if and only if it is a regular graph. Moreover, any concurrent
application of ΦR on a connected graph, G, maintains the
connectivity and the average degree of G.
A detailed analysis of the dynamics induced by ΦR can
be found in [18], where it is shown that the degree range,
f (G), monotonically decreases and converges to its minimum
feasible value under ΦR. As such, the graph converges to
a regular graph (i.e., f (G) = 0) if the average degree is
an integer. Otherwise, f (G) converges to 1. For the sake of
brevity, we skip the details of this analysis and only provide
its main result in Theorem 4.1.
Theorem 4.1 Let G(0) be a connected graph and let τ =
{G(0),G(1), . . .} be a feasible trajectory of (G(0), ΦR).
Then, τf = {f (G(0)), f (G(1)), . . .}, almost surely converges
to an integer, τ∗
if ¯d(G(0)) ∈ N
otherwise,
(6)
1
f , such that
∗
f =(cid:26) 0
τ
where ¯d(G(0)) denotes the average degree of G(0).
The grammar ΦR transforms any connected graph with
an integer average degree, k ∈ N,
into a connected k-
regular graph. Note that, although almost every k-regular
graph is an expander for k ≥ 3, ΦR may still result in a rare
configuration with an arbitrarily small expansion rate. For
instance, both of the 3-regular graphs in Fig. 2 are stationary
under ΦR whereas the graph in Fig. 2a can have half of the
network disconnected due the failure of a single edge or a
single node. The probability of converging to an undesired
equilibrium such as the graph in Fig. 2a depends on the initial
graph. In the next part, we will build on ΦR to avoid such
undesired outcomes.
where di, dj, and dh denote the degrees of the corresponding
nodes.
(a)
(b)
Fig. 2. A poorly-connected 3-regular graph (a) and a well-connected 3-
regular graph (b).
djdidhdj+1di−1dhifdi>djr1:,ΦR:C. Link Randomization
In order to ensure that the interaction graph does not
converge to a poorly-connected configuration, we extend ΦR
by adding a second rule for randomizing the links between
the agents. The purpose of this additional rule is to induce a
uniform limiting distribution over the set of all connected k-
regular graphs instead of having the network converge to
an element of that set. As such, the resulting graph will
be a random k-regular graph. A locally applicable method
was introduced in [39] for transforming regular graphs into
random regular graphs. We define an additional rule for ΦR
based on this method. The resulting grammar, ΦRR, uses the
same labels as ΦR, and it is defined as
where di, dj, dh, and df denote the degrees of the corre-
sponding nodes. In accordance with ΦRR, if a node has more
links than one of its neighbors has, then it rewires one of its
other neighbors to its less-connected neighbor (r1). Also,
adjacent nodes exchange their exclusive neighbors (r2).
Both rules in ΦRR maintain the number of edges and
the connectivity. Unlike ΦR, a connected graph is never
stationary under ΦRR (unless it is a complete graph). Once
a regular graph is reached, r1 is not applicable anymore, but
the agents keep randomizing their links via r2.
There may be many feasible concurrent applications of
ΦRR on an interaction graph. In such cases,
the agents
need to execute one of the alternatives randomly. These
randomizations do not have to be uniform, and assigning
each alternative a non-zero probability is sufficient for the
desired limiting behavior to emerge. We provide Algorithm
I as a such distributed implementation that leads to a uniform
limiting distribution over the set of connected k-regular
graphs.
Algorithm I is memoryless since each iteration only
depends on the current graph, and the probability of any
feasible transition is independent of the past. As such, it
induces a Markov chain, PRR, over the set of connected
graphs with the same average degree as the initial graph, i.e.
Gn,k = {G = (V, E) V = n,E =
(7)
n,k ⊆ Gn,k be the set of connected
where k = ¯d(G(0)). Let G0
k-regular graphs. Note that if k ∈ N, then G0
n,k (cid:54)= ∅. A
thorough analysis of the dynamics induced by Algorithm I
kn
2 },
along with the following result can be found in [19].
Theorem 4.2 Let Gn,k satisfy k ∈ N. Then, PRR has a
unique limiting distribution, µ∗, satisfying
if G ∈ G0
n,k,
otherwise.
(G) =(cid:26) 1/G0
n,k
∗
µ
(8)
0
Algorithm I: Distributed Implementation of ΦRR
1 : initialize: G = (V, E) connected, ∈ (0, 1)
2 : repeat
Each agent, i, is active with probability 1 − .
Each active i picks a random j ∈ Ni.
For each i, Ri = {i(cid:48) ∈ Ni i(cid:48) picked i}.
for (each (i, j) s.t. i ∈ Rj, j ∈ Ri, di ≥ dj)
3 :
4 :
5 :
9 :
13 :
12 :
11 :
10 :
6 :
7 : max{i, j} picks a random r ∈ ΦRR.
8 :
if (r = r1, di > dj, Ri ≥ 2)
i picks a random h ∈ Ri \ {j}.
if ((j, h) /∈ E)
E = (E \ {(i, h)}) ∪ {(j, h)}.
end if
else if (r = r2, Ri ≥ 2, Rj ≥ 2)
i picks a random h ∈ Ri \ {j}.
j picks a random f ∈ Rj \ {i}.
if ((i, f ) /∈ E, (j, h) /∈ E)
E = (E \ {(i, h), (j, f )}) ∪ {(i, f ), (j, h)}.
end if
end if
end for
20 :
21 : end repeat
17 :
16 :
14 :
15 :
18 :
19 :
In light of Theorem 4.2, any connected initial graph with
an integer average degree, k ∈ N, can be transformed into a
connected random k-regular graph via ΦRR. For any k ≥ 3,
such graphs have their algebraic connectivity and expansion
ratios bounded away from zero, even when the network size
is arbitrarily large. If k /∈ N, then the degree range converges
to 1 via r1, as given in Theorem 4.1. In that case, the limiting
graph can be loosely described as a random almost-regular
graph. While such graphs have many structural similarities to
random regular graphs, there is not an exact characterization
of their expansion properties. In the next part, we will build
on ΦRR to obtain a grammar that produces random regular
graphs, even when k /∈ N.
D. Average Degree Manipulation
Both ΦR and ΦRR were designed to maintain the overall
network sparsity. In order to obtain random regular graphs
even when the initial graph has a non-integer average degree,
k /∈ N, the agents need to manipulate the total number of
edges. To this end, the sparsity constraint should be relaxed
to allow for occasional increases and decreases in the number
of edges as long as the graph is not regular and the average
degree is within some proximity of its initial value. Also,
the feasible range of the number of edges should ensure that
the average degree can reach an integer value. Since an m-
regular graph with an odd number of nodes does not exist
djdidhdj+1di−1dhr1:djdidhr2:dfdjdidhdfΦRR:ifdi>djif m is odd, an even integer should always exist within the
feasible range of the average degree. In this part, we derive
such a grammar, Φ∗, by building on ΦRR.
In Φ∗, each node, i ∈ V , has a label, l(i), consisting of two
elements. The first entry of the label is equal to the degree
of the node, just as in ΦR and ΦRR. The second entry of
l(i) is a binary flag that denotes whether the corresponding
agent is allowed to locally increase or decrease the number
of edges in the network. A node, i, can add an extra edge to
the graph only if wi = 0, and it can remove an edge only if
wi = 1. As such, the node labels are defined as
where di denotes the degree of i, and wi ∈ {0, 1}. For any
graph, the degree of each node is already encoded through
the edge set, E. Hence, for the sake of simplicity, a labeled
graph will be denoted as G = (V, E, w) in the sequel. Using
the node labels given in (9), the proposed grammar, Φ∗ =
{r1, r2, r3, r4}, is defined as
l(i) =(cid:20) di
wi (cid:21) ,∀i ∈ V,
(9)
breaks one edge of a triangle if all of its nodes do not have the
same degree and one of the higher degree nodes has its binary
flag equal to 1. Note that the total number of edges decreases
in that case, and the binary flag of the corresponding higher
degree node becomes 0. The final rule, r4, is for exchanging
the binary flags among adjacent nodes. The purpose of r4
is to ensure that the edge additions and removals will be
applicable as long as they are needed to drive the average
degree to an integer. In the remainder of this section, the
dynamics induced by Φ∗ is analyzed.
Lemma 4.3 Graph connectivity is maintained under any
concurrent application of Φ∗.
Proof: Let a connected graph G(t) be transformed into
G(t+1) via some concurrent application of Φ∗. Since G(t) is
connected, for every pair of nodes, v, v(cid:48)
∈ V , G(t) contains
a finite path P between v and v(cid:48). If all the edges traversed
in P are maintained in G(t + 1), then P is also a valid path
on G(t + 1). Otherwise, any missing edge is removed due
to an execution of r1, r2, or r3. Accordingly, the following
procedure can be executed to transform P into a valid path
on G(t + 1) between the same terminal nodes as P :
For each edge that is traversed in P but missing in G(t+1),
1) If the edge was removed via r1 or r3, then replace the
2) If the edge was removed via r2,
corresponding part of the path, {i, h}, with {i, j, h}.
then replace the
corresponding part of the path, {i, h} (or {j, f}), with
{i, j, h} (or {j, i, f}).
Consequently, if G(t) is connected, then G(t + 1) is also
connected.
Note that, unlike ΦR and ΦRR, the the number of edges is
not maintained under Φ∗ due to the possible edge additions
and removals. However, the number of edges is bounded in
an interval through the binary labels, w.
Lemma 4.4 Let G = (V, E, w) be a graph, and let τ be any
feasible trajectory of (G, Φ∗). For any G
(cid:48) = (V, E(cid:48), w(cid:48)) ∈ τ,
(10)
(cid:48)
− E = 1T w
where 1 is the vector of all ones.
E
(cid:48)
− 1T w,
The rules in Φ∗ can be interpreted as follows: The first
rule, r1, is a variant of the degree balancing rule in ΦRR.
While r1 induces a transformation identical to the degree
balancing rule in ΦRR with a probability, 1 − β, there is
also a nonzero probability, β, that if the higher degree node
has its binary flag equal to 0, then it maintains its link with
the neighbor introduced to its lower degree neighbor. Note
that the total number of edges increases in that case, and the
binary flag of the corresponding higher degree node becomes
1. The second rule, r2, is the same link randomization rule
as in ΦRR. The third rule, r3, is the edge removal rule which
Proof:
Let G(t) = (V, E(t), w(t)) and G(t + 1) = (V, E(t +
1), w(t+1)) be a pair of consecutive graphs on any trajectory,
τ, of (G, Φ∗). Note that the number of edges is maintained
under r2 and r4, and it can increase by 1 only due to r1 or
decrease by 1 only due to r3. If an application of r1 adds an
extra edge to the network, then one of the nodes involved in
that transformation, i, satisfies wi(t+1)−wi(t) = 1, whereas
the other two participating nodes maintain their w entries. On
the other hand, for each application of r3, one of the nodes
involved in that transformation, i, satisfies wi(t+1)−wi(t) =
−1 while the other two participating nodes maintain their w
entries. Furthermore, any rule application that maintains the
number of edges also maintains the sum of w entries of the
djifdi>djr1:r3:Φ∗:wjdhwhdiwidj+1wjdidh+1whdj+1wjdi−1widhwhw.p.β,ifwi=0w.p.1−βr2:dfwfdjwjdiwidhwhr4:djwjdiwidjwidiwjdi1dhwhdjwjifdi>djdi−10dh−1whdjwjdfwfdhwhdjwjdiwi1participating nodes. In particular, any edge rewiring via r1
or any neighbor swapping via r2 maintain the w entries of
the participating nodes, whereas any label exchange via r4
maintains the sum of labels. Hence, E(t) and E(t+1) satisfy
(11)
E(t + 1) − E(t) = 1T w(t + 1) − 1T w(t).
(cid:48) = (V, E(cid:48), w(cid:48)) ∈ τ.
Using induction, it can be shown that (11) implies (10) for
any G
Corollary 4.5 Let G = (V, E, 0) be a graph, and let
τ be any feasible trajectory of (G, Φ∗). For any G
(cid:48) =
(V, E(cid:48), w(cid:48)) ∈ τ,
E ≤ E
≤ E + V .
(12)
Proof: Let G = (V, E, 0) be a graph, and let τ be any
feasible trajectory of (G, Φ∗). In light of Lemma 4.4, every
(cid:48) = (V, E(cid:48), w(cid:48)) ∈ τ satisfies
G
(13)
− E = 1T w
− 1T 0 = 1T w
E
(cid:48)
(cid:48)
(cid:48)
(cid:48)
.
Since each entry of w is either equal to 1 or equal 0,
(cid:48)
0 ≤ 1T w
≤ V .
(14)
Hence, (13) and (14) together imply (12).
Corollary 4.5 provides the upper and the lower bounds on
the of number of edges along any trajectory of (G, Φ∗) for
any G = (V, E, 0). Lemma 4.6 shows that the corresponding
implies an integer
interval always contains a value that
average degree.
Lemma 4.6 For any G = (V, E), a graph, G
satisfying ¯d(G
edges to G.
(cid:48) = (V, E(cid:48)),
(cid:48)) ∈ N can be formed by adding at most V
(cid:48) = (V, E(cid:48))
Proof: Let G = (V, E) be a graph, and let G
be a graph that is formed by adding η edges to G. Then,
(15)
2(E + η)
.
) =
(cid:48)
¯d(G
(16)
≤ V since 0 ≤ q < V .
V
For any G = (V, E), there exists unique pair of integers,
p, q ∈ N, such that 0 ≤ q < V and
E = pV + q.
Let η∗ = V − q. Note that η∗
Furthermore, by plugging η∗ into (15), we obtain
2(E + η∗)
(17)
Since p ∈ N, we have 2(p + 1) ∈ N. Hence, for any G =
(V, E), there exists 0 ≤ η ≤ η∗ such that a graph, G
(cid:48) =
(V, E(cid:48)), satisfying ¯d(G
(cid:48)) ∈ N can be obtained by adding η
edges to G.
In light of Lemma 4.6, the interval in (12) always has at
least one value implying an integer average degree. Next, it
is shown that (G, Φ∗) almost surely reaches a regular graph
for any connected G = (V, E, 0) such that ¯d(G) > 2.
+ 2 − 2
= 2(p + 1).
q
V
q
V
= 2p + 2
V
Proof:
(cid:48) = (V, E(cid:48), w(cid:48)), satisfying E(cid:48)
Lemma 4.7 Let G = (V, E, w) be a connected graph such
that ¯d(G) /∈ N. If 1T w < V , then G can be transformed via
Φ∗ into a graph, G
= E + 1.
If ¯d(G) /∈ N, then G has to be a non-regular
graph. Furthermore, since G is connected, then there has
to be at least a pair of neighboring nodes, i and j, with
different degrees. Without loss of generality let di > dj.
Then, i should have at least one neighbor that is not linked
to j. As such, r1 is applicable on G = (V, E). Furthermore,
since each entry of w is either 0 or 1, at least one entry of w
is equal to 0 if 1T w < V . If wi = 0, then an extra edge can
be added to the graph via r1 with probability β. If wi (cid:54)= 0,
then there exists another node, i(cid:48), such that wi(cid:48) = 0. Apply
r4 along the shortest path between i and i(cid:48) to obtain wi = 0.
Once wi = 0 is obtained, then with probability β an extra
edge can be added to the graph in accordance with r1 to
obtain a graph, G
= E + 1.
(cid:48) = (V, E(cid:48), w(cid:48)), satisfying E(cid:48)
Lemma 4.8 Let G = (V, E, w) be a connected triangle-free
graph. If ¯d(G) > 2, then G can be transformed via Φ∗ into
(cid:48) = (V, E(cid:48), w), containing at least one triangle.
a graph, G
Proof: Let G = (V, E, w) be a connected triangle-
free graph. Since ¯d(G) > 2, G has to be a cyclic graph.
Consider the shortest cycle on G, Cs. Note that Cs has to
contain at least 4 nodes, since G is triangle-free. Furthermore,
if ¯d(G) > 2, then Cs cannot contain all the nodes of G, as
otherwise G has to be a cycle graph with ¯d(G) = 2. Also,
since G is a connected graph, at least one node on Cs must
be linked to a node that is not contained in Cs. Without loss
of generality, let i be a node on Cs connected to an off-cycle
node, h. Furthermore, let j denote a neighbor of i on Cs.
Note that h can not be connected to j since G is triangle-free.
Furthermore, since the Cs contains at least 4 nodes, j has to
have another neighbor on Cs, f, which is not connected to
i. If i and j execute r2 by rewiring h and f to each other,
Cs becomes a shorter cycle. Note that w is invariant under
r2. Hence, by repeating this process until Cs consists of 3
(cid:48) = (V, E(cid:48), w),
nodes, G can be transformed into a graph, G
containing at least one triangle.
Lemma 4.9 Let G = (V, E, w) be a connected graph such
that ¯d(G) /∈ N. If 1T w > 0 and ¯d(G) > 3, then G can be
transformed via Φ∗ into a graph, G
(cid:48) = (V, E(cid:48), w(cid:48)), satisfying
E(cid:48)
= E − 1.
Proof: Let G = (V, E, w) be a connected graph such
that ¯d(G) /∈ N. Since ¯d(G) /∈ N, the degree range can be
reduced to 1 without changing ¯d and w via r1, as given
in Theorem 4.1. Furthermore, in light of Lemma 4.8, if the
resulting graph is triangle-free, then it can be transformed
via r2 into a graph, G+ = (V, E+, w), which contains at
least one triangle. Since ∆(G+) − δ(G+) = 1 and ¯d(G+) =
¯d(G) > 3, we have δ(G+) ≥ 3.
If 1T w > 0, then at least one entry of w is equal to
1. As such, wi = 1 can be reached for any i ∈ V via a
(cid:54)= d+
i > d+
i(cid:48) or d+
i < d+
1) If d+
i > d+
i(cid:48) , then d+
= E − 1.
i , and either d+
(cid:48) = (V, E(cid:48)), satisfying E(cid:48)
sequence of r4 applications. Hence, if any of the triangles in
G+ involves nodes with non-uniform degrees, then one edge
of the triangle can be broken in accordance with r3 to obtain
a graph, G
On the other hand, assume that all the triangles on G+
consist of nodes with uniform degrees. Let i, j, and h be the
nodes of such a triangle. Consider the shortest path from any
node of this triangle to a node whose degree is not equal to
the degrees of the triangle nodes. Without loss of generality,
let this path be between i and i(cid:48) such that d+
i . Note
i(cid:48)
that each node other than i(cid:48) on this path has its degree equal
to d+
i(cid:48) . Both cases are
inspected below:
i ≥ 4 given that δ(G+) ≥ 3.
Hence, the node next to i(cid:48) on the shortest path has at least
one neighbor outside the shortest path that is not connected
to i(cid:48). Applying r1 by rewiring such a neighbor to i(cid:48) results
in a shorter path from i to a smaller degree node. Applying
the same procedure eventually results in a smaller degree
node being adjacent to i. Since d+
i ≥ 4, i has at least
one neighbor other than j and h to rewire to its smaller
degree neighbor. After the corresponding application of r1,
we obtain a triangle of nodes with non-uniform degrees.
Hence, one edge of the triangle can be broken in accordance
(cid:48) = (V, E(cid:48), w(cid:48)), satisfying
with r3 to obtain a graph, G
E(cid:48)
= E − 1.
i(cid:48) , then i(cid:48) can apply r1 to rewire one of
2) If d+
its neighbors to the node on the shortest path next to itself.
This results in a shorter path from i to higher degree node is
obtained. Applying the same procedure eventually increases
the degree of i, and we obtain a triangle of nonuniform
degrees. Hence, one edge of the triangle can be broken in
(cid:48) = (V, E(cid:48), w(cid:48)),
accordance with r3 to obtain a graph, G
satisfying E(cid:48)
Lemma 4.10 Let G = (V, E, 0) be a connected graph. If
¯d(G) > 2, then (G, Φ∗) almost surely reaches an m-regular
graph such that ¯d(G) ≤ m ≤ ¯d(G) + 2.
= E − 1.
i < d+
Proof: Let G = (V, E, 0) be a connected graph such
that ¯d(G) > 2. Due to Corollary 4.5, the number of edges
stays in {E,E + 1, . . .E + V } along any trajectory
of (G, Φ∗). In light of Lemma 4.6, this interval contains at
least one value, E + η, such that the corresponding average
degree, m, is an integer satisfying
2(E + η)
V
≤ ¯d(G) + 2.
¯d(G) ≤ m =
(18)
(cid:48) = (V, E(cid:48), w(cid:48)) be
As such, m ≥ 3 since ¯d(G) > 2. Let G
(cid:48)) /∈ N. Then,
a graph reached from G via Φ∗ such that ¯d(G
either E(cid:48)
> E + η. Both cases are
inspected below:
1) If E(cid:48)
− E < V . As
(cid:48) can have its number of edges
such, in light of Lemma 4.7, G
increased by 1 via Φ∗. This process can be repeated unless
the average degree reaches an integer value.
< E + η or E(cid:48)
< E + η, then 1T w(cid:48) = E(cid:48)
> E + η, then 1T w(cid:48) = E(cid:48)
2) If E(cid:48)
− E > 0.
(cid:48)) > 3 since m ≥ 3. As such, in light
Furthermore, ¯d(G
(cid:48) can have its number of edges decreased
of Lemma 4.9, G
by 1 via Φ∗. This process can be repeated unless the average
degree reaches an integer value.
Hence, in either case it is possible to add or remove edges
to the network via Φ∗ until the number of edges implies
an integer average degree, m ∈ [ ¯d(G), ¯d(G) + 2]. Once an
average degree of m is obtained, then the graph can be
driven to a m-regular configuration through a sequence of
(cid:48) has a non-zero probability
r1 applications. As such, any G
of reaching an m-regular graph after a finite sequence of Φ∗
applications. Consequently, (G, Φ∗) almost surely reaches an
m-regular graph such that ¯d(G) ≤ m ≤ ¯d(G) + 2.
Unlike ΦR and ΦRR, the degree range does not monotoni-
cally decrease under Φ∗ due to the possible edge addition and
removals. For instance, increasing the total number of edges
via r1 would increases the degree range if dh = ∆(G) and
δ(G) < dj. However, if a regular graph is reached, then the
graph remains regular since neither r1 nor r3 are applicable
on a regular graph.
Lemma 4.11 Let G be an m-regular graph. Any feasible
trajectory of (G, Φ∗) consists of only m-regular graphs.
Proof: On an m-regular graph, r1 and r3 are not appli-
cable since di = dj for any pair of nodes, i, j. Furthermore,
since the node degrees are invariant to the applications of
r2 and r4, any feasible trajectory of (G, Φ∗) consists of only
m-regular graphs.
Once an m-regular graph is reached, the graph evolves
only under r2 and r4. As such, it keeps randomizing within
the corresponding set of m-regular graphs. The induced
limiting distribution depends on how the agents implement
Φ∗. In the next section, we present a distributed implemen-
tation that leads to a uniform limiting distribution over the
corresponding set of m-regular graphs.
V. DISTRIBUTED IMPLEMENTATION
In this section, we present Algorithm II as a distributed
implementation of Φ∗ and analyze the resulting dynamics.
In accordance with Algorithm II, the nodes behave as
follows: At each iteration, each node is inactive with a
probability, ∈ (0, 1). The inactivation probability, , ensures
that any feasible application of Φ∗ can be realized through
Algorithm II, as it will be shown in Lemma 5.1. Inactive
nodes do not participate in any rule execution in that time
step. Each active agent, i, picks one of its neighbors, j ∈ Ni,
uniformly at random, and it communicates its degree to that
neighbor. Through these communications, each active agent,
i, obtains the list of neighbors that picked itself, Ri ⊆ Ni,
and checks if it is matched, i.e. if j ∈ Ri. If that is not the
case, then i is a follower in that time step, i.e. it will not
initiate a rule execution but it will participate if j wants to
rewire i to some other node. If j ∈ Ri, then i and j are
matched. Each matched pair randomly pick a candidate rule,
r ∈ Φ∗, that they will potentially execute. In Algorithm II,
without loss of generality, the candidate rule is picked by the
agent with the larger node ID, i.e. max{i, j}. Depending on
the chosen rule, r ∈ Φ∗, the matched pair of nodes, i and j,
do one of the following:
1) r = r1: If di > dj and Ri ≥ 2, then i chooses a
neighbor, h (cid:54)= j ∈ Ri, uniformly at random. If h /∈
Nj, then, with probability 1 − β, h is rewired to j.
With the remaining probability β, if wi = 0, a link is
formed between h and j, the link between i and h is
maintained, and w(cid:48)
i = 1.
2) r = r2: If Ri,Rj ≥ 2, both i and j choose one
neighbor, h (cid:54)= j ∈ Ri and f (cid:54)= i ∈ Rj, uniformly at
random. If neither h nor f is linked to both i and j,
then r2 is executed by rewiring h to j and f to i.
3) r = r3: If di > dj, Ri ≥ 2), and wi = 1, then i
chooses a neighbor, h (cid:54)= j ∈ Ri, uniformly at random.
If h ∈ Nj, then the link between i and h is removed
and w(cid:48)
i = wj
and w(cid:48)
4) r = r4: i and j swap their binary flags, i.e. w(cid:48)
i = 0.
j = wi.
A feasible iteration of the algorithm on a network is illus-
trated in Fig. 3, where G = (V, E, w) is transformed into
(cid:48) = (V, E(cid:48), w(cid:48)) in one time step.
G
Algorithm II: Distributed Implementation of Φ∗
1 : initialize: G = (V, E, w = 0) connected, , β ∈ (0, 1)
2 : repeat
3 :
4 :
5 :
Each agent, i, is active with probability 1 − .
Each active i picks a random j ∈ Ni.
For each i ∈ V , Ri = {i(cid:48) ∈ Ni i(cid:48) picked i}.
for (each (i, j) s.t. i ∈ Rj, j ∈ Ri, di ≥ dj)
6 :
7 : max{i, j} picks a random r ∈ Φ∗.
8 :
if (r = r1, di > dj, Ri ≥ 2)
i picks a random h ∈ Ri \ {j}.
if ((j, h) /∈ E)
i picks a random β(cid:48) ∈ [0, 1].
if (β(cid:48) ≥ β)
E = (E \ {(i, h)}) ∪ {(j, h)}.
else if (wi = 0)
E = E ∪ {(j, h)}, wi = 1.
end if
end if
else if (r = r2, Ri ≥ 2,Rj ≥ 2)
i picks a random h ∈ Ri \ {j}.
j picks a random f ∈ Rj \ {i}.
if ((i, f ) /∈ E, (j, h) /∈ E)
E = (E \ {(i, h), (j, f )}) ∪ {(i, f ), (j, h)}.
9 :
10 :
11 :
12 :
13 :
14 :
15 :
16 :
17 :
18 :
19 :
20 :
21 :
22 :
24 :
25 :
26 :
27 :
23 :
else if (r = r3, di > dj, Ri ≥ 2, wi = 1)
i picks a random h ∈ Ri \ {j}.
if ((j, h) ∈ E)
E = E \ {(i, h)}, wi = 0.
end if
else if (r = r4)
Swap wi and wj.
end if
end for
31 :
32 : end repeat
28 :
29 :
30 :
Some steps of a feasible iteration of Algorithm II on G in (a)
Fig. 3.
resulting in G(cid:48) in (c) along with the probabilities of the corresponding events.
In this example, each node other than 8 is active and picks a neighbor as
illustrated in (b), where each arrow is pointed from a node to its chosen
neighbor. Accordingly, (1,3) and (4,6) are the matched pairs. With a joint
probability of 1/16, node 3 picks r1, and node 6 picks r2 as the candidate
rules for their respective matchings. Furthermore, since R3 \ {1} = {5},
R4 \ {6} = {2}, and R6 \ {4} = {7}; node 3 picks node 5; node 4 picks
node 2; and node 6 picks node 7 to rewire. Finally, the edge between node
3 and 5 is maintained with a probability β (w3 = 0). Hence, given (b), G(cid:48)
can emerge with a probability of β/16.
Note that Algorithm II maintains connectivity due to
Lemma 4.3. Let k = ¯d(G(0)) be the average degree of the
initial graph, G(0) = (V, E(0), 0). Then, the average degree
remains in [k, k + 2] due to Corollary 4.5. Furthermore,
Algorithm II is memoryless since each iteration only depends
on the current graph, and the probability of any feasible
transition is independent of the past. Hence, it induces a
Markov chain over the state space, Gn,[k,k+2], consisting of
connected labeled graphs with n nodes and average degrees
contained in [k, k + 2], i.e.
Gn,[k,k+2] = {G = (V, E, w) V = n,E = 0.5kn+1T w},
(19)
where wi ∈ {0, 1} for every i ∈ V .
space at time t. Then, µ(t) satisfies
Let µ(t) denote the probability distribution over the state
∗
µT (t + 1) = µT (t)P
(20)
where P ∗ is the corresponding probability transition matrix.
Accordingly, the probability of transition from any G to any
(cid:48) is denoted by P ∗(G,G
G
By following Algorithm II, the agents concurrently modify
(cid:48)).
,
1234567812345678w.p.ǫ(1−ǫ)7Yi6=81di12345678R1={3}R2=∅R4={2,6}R6={4,7}R3={1,5}R5=∅R7=∅R8=∅w.p.β16GG′(b)(a)(c)w1=0w2=0w4=0w6=0w8=0w3=0w5=0w7=0w′1=0w′2=0w′4=0w′6=0w′8=0w′3=1w′5=0w′7=0their neighborhoods in accordance with Φ∗ such that any
feasible transformation occurs with a non-zero probability.
∈ Gn,[k,k+2],
In other words, for any pair of graphs, G,G
the corresponding transition probability, P ∗(G,G
(cid:48)), is non-
(cid:48) in a single time
zero if it is possible to transform G into G
step via Φ∗.
(cid:48)
(cid:48)
(cid:48) can be reached from G in one step via Φ∗,
∈ Gn,[k,k+2] be any pair of graphs.
then
Lemma 5.1 Let G,G
If G
P ∗(G,G
(cid:48)) > 0 .
Proof:
(cid:48) be reachable from G in one step via Φ∗, and let
Let G
G = {g1, g2, . . .} denote the corresponding set of disjoint
(cid:48). Note that
subgraphs of G to be transformed to reach G
for each g ∈ G there is a r = (gl, gr) ∈ Φ∗ satisfying
g (cid:39) gl. In order to show that P ∗(G,G
(cid:48)) > 0, we present a
feasible flow of Algorithm II that transforms G by applying
the corresponding r ∈ Φ∗ to each g ∈ G. For each g ∈ G,
let each node in g be active and pick a neighbor as illustrated
in Fig. 4.
Fig. 4. An arrow is pointed from each agent to the neighbor it picked.
For each g ∈ G, the nodes in g have non-zero probability to pick their
neighbors as shown in (a) if r = r1, (b) if r = r2, (c) if r = r3, and (d)
if r = r4.
Furthermore, let any node that is not included in any g ∈ G
be inactive, which ensures that only the subgraphs in G will
be transformed. Finally, let each g pick the corresponding
r as the candidate ruler to execute. In that case, the agents
are guaranteed to only apply the corresponding r ∈ Φ∗ to
each g ∈ G. Hence, the corresponding transformation has a
non-zero probability in P ∗.
The state space, Gn,[k,k+2] can be represented as the
n,[k,k+2] (regular graphs) and
union of two disjoint sets, G0
G+
n,[k,k+2] (non-regular graphs), defined as
G0
n,[k,k+2] = {G ∈ Gn,[k,k+2] f (G) = 0},
G+
n,[k,k+2] = Gn,[k,k+2] \ G0
(21)
(22)
n,[k,k+2] (cid:54)= ∅ for k > 2. Let M
In light of Lemma 4.10, G0
n,[k,k+2].
denote the set of all such m, i.e.
M = {m ∈ N k ≤ m ≤ k + 2, 0.5mV ∈ N}.
The set of regular graphs, G0
the union of some disjoint sets as
(23)
n,[k,k+2], can be written as
G0
n,[k,k+2] = (cid:91)m∈M
G0
n,m,
(24)
(26)
where each G0
n,m is the set of m-regular graphs defined as
G0
n,m = {G ∈ G0
(25)
n,[k,k+2] ¯d(G) = m}.
In the remainder of this section, the limiting behavior of
P ∗ is analyzed. In light of Lemma 4.10, if k > 2, then any
connected G(0) = (V, E(0), 0) almost surely converges to
n,[k,k+2]. Next, we show that, for each m ∈ M, G0
G0
n,m is a
closed communicating class.
Lemma 5.2 If k > 2, then G0
class of P ∗ for each m ∈ M.
n,m is a closed communicating
Proof:
n,m. Hence, each G0
In Light of Lemma 4.11, only r2 and r4 is
applicable on any m-regular graph, and any resulting graph
is m-regular. Hence, once the system reaches any G0
n,m, it
stays in G0
n,m. Furthermore, in light of Theorem 4.2, any
m-regular structure can be reached from any other via r2.
Moreover, since all the graphs in G0
n,m are connected, any
permutation of the elements in w is also reachable via r4 for
each graph structure in G0
n,m is a closed
communicating class of P ∗.
The limiting behavior of Algorithm II depends on the
limiting behavior of P ∗ in each closed communicating
class. Note that for each G0
n,m, there is a unique stationary
distribution, µ∗
n,m. Next, it is
shown that each µ∗
m is a limiting distribution that is uniform
over G0
n,m. To this end, first it is shown that the transitions
between any two regular graphs are symmetric.
∈ G0
m, of P ∗ whose support is G0
n,m be any pair
(cid:48)
Lemma 5.3 For any m ∈ M, let G,G
of m-regular graphs. Then,
(cid:48)
(cid:48)
(G,G
(G
Proof: For any m ∈ M, let G,G
) = P
P
∗
∗
,G).
(cid:48)
∈ G0
(cid:48),G) > 0.
n,m be any pair
of m-regular graphs. Note that r1 and r3 are not applicable
on any graph in G0
n,m since all the nodes have equal degrees.
(cid:48) is only via r2 or r4. Since
Hence, any transition from G to G
(cid:48)) > 0 if and only if
both r2 and r4 are reversible, P ∗(G,G
P ∗(G
Let us consider an arbitrary execution of Algorithm II,
(cid:48). Let u be the corresponding
where G is transformed into G
vector of randomly picked neighbors in line 4 of Algorithm
II (let ui = null if i is inactive). For each node, i, let
Ri(u) be the set of nodes that picked i, and let M (u) =
{(i, j) i ∈ Rj(u), j ∈ Ri(u)} be the set of matched
pairs. In the remainder of the proof, it is shown that for
any such feasible execution there exists an equally likely
(cid:48) back to G. For
execution of Algorithm II that transforms G
(cid:48) = (V, E(cid:48), w(cid:48)), consider the vector, u(cid:48), whose entries are
G
djwjdhwhdiwidfwfdjwjdiwidhwhdjwjdiwidi1dhwhdjwj(a)(b)(c)(d)(cid:48)
u
uui
i =(cid:26) ui
if ui = null or (i, ui) ∈ E(cid:48),
otherwise.
(27)
Note that Pr[u] = Pr[u(cid:48)] since the inactive nodes will
remain inactive with the same probability, and each active
node picks a neighbor uniformly at random. Furthermore,
M (u) = M (u(cid:48)). Let each (i, j) ∈ M (u) randomly choose
the same candidate rule, r, they executed in the transition
(cid:48). As such, if r = r4, then i and j will swap
from G to G
wi and wj back. On the other hand, if r = r2, then i and j
will reverse the neighbor-swapping in the transition from G
(cid:48) with the same probability (lines 12-17 in Algorithm II)
to G
since Ri(u) = Ri(u(cid:48)) and Rj(u) = Rj(u(cid:48)) for every
(i, j) ∈ M (u). As such, all the local transformations from
(cid:48) can be reversed with the same probability under
G to G
Algorithm II. Consequently, P ∗(G,G
Lemma 5.4 For any m ∈ M, there is a unique limiting
distribution, µ∗
(cid:48)) = P ∗(G
(cid:48),G).
if G ∈ G0
otherwise.
n,m,
(28)
∗
µ
m, of P ∗ satisfying
m(G) =(cid:26) 1/G0
n,m
Proof: For any m ∈ M, G0
0
n,m by G0
m be the G0
n,m is a closed communicat-
ing class due to Lemma 5.2. As such, for each G0
n,m, there
exists a unique stationary distribution, µ∗
m, whose support is
n,m. Let P ∗
G0
n,m probability transition
matrix that only represents the transitions within G0
n,m. Due
to Lemma 5.2, P ∗
m is aperiodic
since P ∗(G,G) > 0 for every G (for instance, there is a
non-zero probability of all the nodes being inactive). As
is a
such,
limiting distribution. Furthermore, due to Lemma 5.3, P ∗
m
is symmetric, and it is consequently doubly stochastic. As a
result, µ∗
the corresponding stationary distribution, µ∗
m,
m is irreducible. Also P ∗
m is uniform over G0
n,m.
Theorem 5.5 For any connected G = (V, E, 0) satisfying
¯d(G) > 2, P ∗ leads to a limiting distribution, µ∗
G, given as
(29)
∗
µ
G = (cid:88)m∈M
∗
m,
n,m]µ
Pr[G → G0
is the probability that
where Pr[G → G0
the chain
initialized at G ever enters the set of m-regular graphs,
n,m, and each µ∗
G0
n,m]
m is uniform over its support, G0
n,m.
Proof: Due to Lemma 4.10, the Markov chain initial-
ized at any connected G = (V, E, 0) satisfying ¯d(G) > 2
almost surely enters a closed communicating class of m-
regular graphs, G0
n,m, such that m ∈ M. Furthermore, each
n,m has a uniform limiting distribution, µ∗
G0
m as given in
Lemma 5.4. Hence, P ∗ leads to the convex combination of
limiting distributions, µ∗
m is weighted by
the probability that the chain starting at G ever enters G0
n,m.
In light of Theorem 5.5, Algorithm II asymptotically trans-
forms any connected initial graph, G = (V, E, 0), satisfying
m, where each µ∗
¯d(G) > 2 into a random m-regular graph for some m ∈ M
as given in (23). When M is not a singleton, the probability
of reaching each G0
n,m depends on the initial graph as well as
the algorithm parameters , β ∈ (0, 1). However, the graphs
observed in the limit are guaranteed to be expanders since
¯d(G) > 2 implies m ≥ 3 for every m ∈ M.
VI. SIMULATION RESULTS
In this section, we present some simulation results for the
proposed scheme. An arbitrary connected graph, G(0) =
(V, E, 0), is generated with 100 nodes and 135 edges. As
the initial average degree is ¯d(G(0)) = 2.7. The
such,
interaction graph is evolved via Algorithm II with = β =
0.01 for a period of 100000 steps. Since ¯d(G(0)) = 2.7,
the average degree is guaranteed to remain in [2.7, 4.7] for
any feasible trajectory, as given in Corollary 4.5. Since the
number of nodes is even, both integers in this interval are
feasible values for the average degree, i.e. M = {3, 4}.
In light of Theorem 5.5, the graph is expected to become
either a random 3-regular graph or a random 4-regular graph.
In the presented simulation, the graph reaches a 3-regular
graph after 45123 time steps. Note that once the system
enters G0
100,3, both f (G(t)) and ¯d(G(t)) are stationary. Fig.
5 illustrates G(0) and G(100000), which have the algebraic
connectivities of 0.02 and 0.25, respectively. The values of
the degree range, f (G(t)), and the average degree, ¯d(G(t)),
for the first 50000 steps are illustrated in Fig. 6. Once a
3-regular graph is reached, the graph keeps randomizing
in G0
100,3 via r2 and r4. The evolution of the algebraic
connectivity throughout this simulation is shown in Fig. 7.
As expected from random 3-regular graphs, the algebraic
connectivity of the network is observed to be at least 3−2√2
with a very high probability after a sufficient amount of time.
VII. CONCLUSIONS
In this paper, we presented a decentralized graph reconfig-
uration scheme for building robust multi-agent networks. In
particular, we focused on the connectivity properties of the
interaction graph as the robustness measure. Accordingly, we
provided a decentralized method for transforming interaction
graphs into well-connected graphs with a similar sparsity as
the initial graph. More specifically, the proposed solution
produces random m-regular graphs in the limit. Such graphs
are expanders for any m ≥ 3, i.e. they have the algebraic
connectivity and expansion ratios bounded away from zero
regardless of the network size.
The proposed method was incrementally built in the paper.
First, a single-rule grammar, ΦR, was designed for balancing
the degree distribution in any connected network with an
initial average degree k. ΦR transforms the initial graph into
a connected k-regular graph if k ∈ N. If k /∈ N, then the
degree range converges to 1 via ΦR. Next, ΦR was extended
to ensure that the interaction graph does not convergence to
a poorly-connected k-regular graph. To this end, a local link
randomization rule was added to ΦR. The resulting grammar,
ΦRR, transforms the initial graph into a connected random
k-regular graph if k ∈ N. Finally, ΦRR was extended to
[24] P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han, "Attack vulnerability
of complex networks," Physical Review E, vol. 65, no. 5, p. 056109,
2002.
[25] Z. Wang, A. Scaglione, and R. J. Thomas, "Electrical centrality
measures for electric power grid vulnerability analysis," in IEEE
Conference on Decision and Control, pp. 5792 -- 5797, 2010.
[26] C. M. Schneider, A. A. Moreira, J. S. Andrade, S. Havlin, and H. J.
Herrmann, "Mitigation of malicious attacks on networks," Proceedings
of the National Academy of Sciences, vol. 108, no. 10, pp. 3838 -- 3841,
2011.
[27] A. Beygelzimer, G. Grinstein, R. Linsker, and I. Rish, "Improving
network robustness by edge modification," Physica A: Statistical
Mechanics and its Applications, vol. 357, no. 3, pp. 593 -- 612, 2005.
[28] O. Reingold, S. Vadhan, and A. Wigderson, "Entropy waves, the zig-
zag graph product, and new constant-degree expanders," Annals of
Mathematics, pp. 157 -- 187, 2002.
[29] M. Capalbo, O. Reingold, S. Vadhan, and A. Wigderson, "Randomness
conductors and constant-degree lossless expanders," in ACM Sympo-
sium on Theory of Computing, pp. 659 -- 668, 2002.
[30] E. Rozenman and S. Vadhan, "Derandomized squaring of graphs,"
in Approximation, Randomization and Combinatorial Optimization.
Algorithms and Techniques, pp. 436 -- 447, Springer, 2005.
[31] M. Morgenstern, "Existence and explicit constructions of q+1 regular
ramanujan graphs for every prime power q," Journal of Combinatorial
Theory, Series B, vol. 62, no. 1, pp. 44 -- 62, 1994.
[32] R. Olfati-Saber, "Algebraic connectivity ratio of ramanujan graphs,"
in American Control Conference, pp. 4619 -- 4624, 2007.
[33] N. C. Wormald, "Models of random regular graphs," London Mathe-
matical Society Lecture Note Series, pp. 239 -- 298, 1999.
[34] B. Mohar, "Isoperimetric numbers of graphs," Journal of Combinato-
rial Theory, Series B, vol. 47, no. 3, pp. 274 -- 291, 1989.
[35] B. Bollob´as, "A probabilistic proof of an asymptotic formula for the
number of labelled regular graphs," European Journal of Combina-
torics, vol. 1, no. 4, pp. 311 -- 316, 1980.
[36] A. Steger and N. C. Wormald, "Generating random regular graphs
quickly," Combinatorics Probability and Computing, vol. 8, no. 4,
pp. 377 -- 396, 1999.
[37] C. Law and K.-Y. Siu, "Distributed construction of random expander
networks," in IEEE International Conference on Computer Communi-
cations, pp. 2133 -- 2143, 2003.
[38] M. Jerrum and A. Sinclair, "Fast uniform generation of regular
graphs," Theoretical Computer Science, vol. 73, no. 1, pp. 91 -- 100,
1990.
[39] P. Mahlmann and C. Schindelhauer, "Peer-to-peer networks based
on random transformations of connected regular undirected graphs,"
in ACM Symposium on Parallelism in Algorithms and Architectures,
pp. 155 -- 164, 2005.
[40] E. Klavins, R. Ghrist, and D. Lipsky, "A grammatical approach to self-
organizing robotic systems," IEEE Transactions on Automatic Control,
vol. 51, no. 6, pp. 949 -- 962, 2006.
[41] A. Kashyap, T. Bas¸ar, and R. Srikant, "Quantized consensus," Auto-
matica, vol. 43, no. 7, pp. 1192 -- 1203, 2007.
[42] A. Nedic, A. Olshevsky, A. Ozdaglar, and J. N. Tsitsiklis, "On dis-
tributed averaging algorithms and quantization effects," IEEE Trans-
actions on Automatic Control,, vol. 54, no. 11, pp. 2506 -- 2517, 2009.
obtain random regular graphs in the most general case, i.e.
even when k /∈ N. For any k > 2, the resulting grammar,
Φ∗, leads to a connected random m-regular graph such that
m ∈ [k, k + 2]. Note that k > 2 implies m ≥ 3. Hence,
the corresponding random m-regular graphs are expanders
with a similar sparsity as the initial graph. Some simulation
results were also presented in the paper to demonstrate the
performance of the proposed method.
REFERENCES
[1] A. H. Dekker and B. D. Colbert, "Network robustness and graph
topology," in Australasian Conference on Computer Science, pp. 359 --
368, 2004.
[2] A. Jamakovic and S. Uhlig, "On the relationship between the algebraic
connectivity and graph's robustness to node and link failures," in
EuroNGI Conference on Next Generation Internet Networks, pp. 96 --
102, 2007.
[3] R. Olfati-Saber, "Ultrafast consensus in small-world networks," in
American Control Conference, pp. 2371 -- 2378, 2005.
[4] A. Rahmani, M. Ji, M. Mesbahi, and M. Egerstedt, "Controllability of
multi-agent systems from a graph-theoretic perspective," SIAM Journal
on Control and Optimization, vol. 48, no. 1, pp. 162 -- 186, 2009.
[5] A. Y. Yazıcıoglu, W. Abbas, and M. Egerstedt, "A tight lower bound
on the controllability of networks with multiple leaders," in IEEE
Conference on Decision and Control, pp. 1978 -- 1983, 2012.
[6] M. Mesbahi and M. Egerstedt, Graph theoretic methods in multiagent
networks. Princeton University Press, 2010.
[7] A. Barrat, M. Barthelemy, and A. Vespignani, Dynamical processes
on complex networks. Cambridge University Press Cambridge, 2008.
[8] G. F. Young, L. Scardovi, and N. E. Leonard, "Robustness of noisy
consensus dynamics with directed communication," in American Con-
trol Conference (ACC), pp. 6312 -- 6317, 2010.
[9] W. Abbas and M. Egerstedt, "Robust graph topologies for networked
systems," in IFAC Workshop on Distributed Estimation and Control
in Networked Systems, pp. 85 -- 90, 2012.
[10] M. Fiedler, "Algebraic connectivity of graphs," Czechoslovak Mathe-
matical Journal, vol. 23, no. 2, pp. 298 -- 305, 1973.
[11] D. J. Klein and M. Randi´c, "Resistance distance," Journal of Mathe-
matical Chemistry, vol. 12, no. 1, pp. 81 -- 95, 1993.
[12] M. S. Pinsker, "On the complexity of a concentrator," in 7th Interna-
tional Telegraffic Conference, vol. 4, pp. 318/1 -- 318/4, 1973.
[13] N. Alon, "Eigenvalues and expanders," Combinatorica, vol. 6, no. 2,
pp. 83 -- 96, 1986.
[14] S. Hoory, N. Linial, and A. Wigderson, "Expander graphs and their
applications," Bulletin of the American Mathematical Society, vol. 43,
no. 4, pp. 439 -- 561, 2006.
[15] L. Blume, D. Easley, J. Kleinberg, R. Kleinberg, and ´E. Tardos,
"Which networks are least susceptible to cascading failures?," in IEEE
Annual Symposium on Foundations of Computer Science, pp. 393 -- 402,
2011.
[16] A. Ganesh, L. Massouli´e, and D. Towsley, "The effect of network
topology on the spread of epidemics," in IEEE INFOCOM, vol. 2,
pp. 1455 -- 1466, 2005.
[17] J. Friedman, "A proof of alon's second eigenvalue conjecture," in ACM
Symposium on Theory of Computing, pp. 720 -- 724, 2003.
[18] A. Y. Yazıcıoglu, M. Egerstedt, and J. S. Shamma, "Decentralized
degree regularization for multi-agent networks," in IEEE Conference
on Decision and Control, pp. 7498 -- 7503, 2013.
[19] A. Y. Yazıcıoglu, M. Egerstedt, and J. S. Shamma, "Decentralized
formation of random regular graphs for robust multi-agent networks,"
in IEEE Conference on Decision and Control, pp. 595 -- 600, 2014.
[20] S. P. Borgatti, "Centrality and network flow," Social Networks, vol. 27,
no. 1, pp. 55 -- 71, 2005.
[21] D. Koschutzki, K. A. Lehmann, L. Peeters, S. Richter, D. Tenfelde-
Podehl, and O. Zlotowski, "Centrality indices," in Network Analysis,
pp. 16 -- 61, Springer, 2005.
[22] D. Acemoglu, V. M. Carvalho, A. Ozdaglar, and A. Tahbaz-
Salehi, "The network origins of aggregate fluctuations," Econometrica,
vol. 80, no. 5, pp. 1977 -- 2016, 2012.
[23] H. Jeong, S. P. Mason, A.-L. Barab´asi, and Z. N. Oltvai, "Lethality and
centrality in protein networks," Nature, vol. 411, no. 6833, pp. 41 -- 42,
2001.
Fig. 5. Agents transform the initial interaction graph in (a), which has an average degree of 2.7, into a random 3-regular graph such as the one in (b) by
following Algorithm II.
(a)
(b)
The average degree, ¯d(G(t)), and the degree range, f (G(t)), for the first 50000 time steps of the simulation. Once a regular graph (i.e.,
Fig. 6.
f (G(t)) = 0) is reached, both ¯d(G(t)) and f (G(t)) remain stationary under Algorithm II.
Fig. 7. The algebraic connectivity, α(G(t)), as the initial graph in Fig. 5a evolves via Algorithm II. After a sufficiently large amount of time, α(G(t))
rarely drops below 3 − 2
2 (marked with a horizontal solid line), as expected from random 3-regular graphs.
√
05,00010,00015,00020,00025,00030,00035,00040,00045,00050,0002.72.82.93time(t)¯d(G(t))05,00010,00015,00020,00025,00030,00035,00040,00045,00050,000012345time(t)f(G(t))010,00020,00030,00040,00050,00060,00070,00080,00090,000100,00000.050.10.150.20.250.30.35time(t)α(G(t)) |
1903.05766 | 1 | 1903 | 2019-03-14T00:02:03 | Simulating Emergent Properties of Human Driving Behavior Using Multi-Agent Reward Augmented Imitation Learning | [
"cs.MA",
"cs.AI",
"cs.LG"
] | Recent developments in multi-agent imitation learning have shown promising results for modeling the behavior of human drivers. However, it is challenging to capture emergent traffic behaviors that are observed in real-world datasets. Such behaviors arise due to the many local interactions between agents that are not commonly accounted for in imitation learning. This paper proposes Reward Augmented Imitation Learning (RAIL), which integrates reward augmentation into the multi-agent imitation learning framework and allows the designer to specify prior knowledge in a principled fashion. We prove that convergence guarantees for the imitation learning process are preserved under the application of reward augmentation. This method is validated in a driving scenario, where an entire traffic scene is controlled by driving policies learned using our proposed algorithm. Further, we demonstrate improved performance in comparison to traditional imitation learning algorithms both in terms of the local actions of a single agent and the behavior of emergent properties in complex, multi-agent settings. | cs.MA | cs | Simulating Emergent Properties of Human Driving Behavior
Using Multi-Agent Reward Augmented Imitation Learning
Raunak P. Bhattacharyya, Derek J. Phillips, Changliu Liu,
Jayesh K. Gupta, Katherine Driggs-Campbell, and Mykel J. Kochenderfer
in states can quickly compound into large differences in
the resulting vehicle behaviors and motion pattern. Reliable
human driver models must be capable of imitating these
emergent properties of traffic behavior.
9
1
0
2
r
a
M
4
1
]
A
M
.
s
c
[
1
v
6
6
7
5
0
.
3
0
9
1
:
v
i
X
r
a
in multi-agent
Abstract -- Recent developments
imitation
learning have shown promising results for modeling the behav-
ior of human drivers. However, it is challenging to capture
emergent traffic behaviors that are observed in real-world
datasets. Such behaviors arise due to the many local interac-
tions between agents that are not commonly accounted for in
imitation learning. This paper proposes Reward Augmented
Imitation Learning (RAIL), which integrates reward augmen-
tation into the multi-agent imitation learning framework and
allows the designer to specify prior knowledge in a principled
fashion. We prove that convergence guarantees for the imitation
learning process are preserved under the application of reward
augmentation. This method is validated in a driving scenario,
where an entire traffic scene is controlled by driving policies
learned using our proposed algorithm. Further, we demonstrate
improved performance in comparison to traditional imitation
learning algorithms both in terms of the local actions of a
single agent and the behavior of emergent properties in complex,
multi-agent settings.
I. INTRODUCTION
Robot learning from human demonstrations has been a
subject of significant interest in recent years [1]. Imitation
learning has been applied to vehicle navigation, humanoid
robots, and computer games [2]. This paper focuses on
imitation learning for building reliable human driver models.
The autonomous driving literature has established that it
is infeasible to build a statistically significant case for the
safety of a system solely through real-world testing [3], [4].
Validation through simulation is an alternative to real-world
testing, with the ability to evaluate vehicle performance in
large numbers of scenes quickly, safely, and economically [5].
This paper seeks to extend state of the art imitation learning
to improve our ability to accurately generate realistic driving
scenarios. In such safety critical settings, representative
models of human driving behavior are essential
in the
validation of autonomous driving systems.
Human driving situations are inherently multi-agent in
nature. Typical human driving scenes are composed of several
vehicles that interact to exhibit emergent patterns of traffic
behavior that cannot be easily predicted from the properties
of the individual vehicles alone. For example, given two very
similar initial scenes, the vehicles can reach very different
configurations after just a few seconds because small changes
R. Bhattacharyya, D. Phillips, C. Liu, J.K. Gupta, and M.J. Kochen-
derfer are with the Stanford Intelligent Systems Laboratory in the De-
partment of Aeronautics and Astronautics at Stanford University, Stan-
ford, CA 94305, USA (email: {raunakbh, djp42, changliuliu, jayeshkg,
mykel}@stanford.edu}). K. Driggs-Campbell is with the Department of
Electrical and Computer Engineering at the University of Illinois at Urbana-
Champaign, Urbana, IL 61801 (email: [email protected]).
Generative Adversarial Imitation Learning (GAIL) [7] has
recently been used to model human driving behavior. GAIL
performs well when imitating the driving behavior in single
agent settings [8], outperforming behavioral cloning and rule-
based driver models (e.g., IDM+MOBIL [9]). However, GAIL
does not scale to imitating the behavior of multiple human
driven vehicles because the multi-agent setting leads to the
problem of covariate-shift [10].
The PS-GAIL algorithm uses the framework provided by
recent work extending GAIL to the multi-agent setting [11],
borrowing ideas from the PS-TRPO algorithm [12]. PS-GAIL
outperforms GAIL in terms of imitation performance and
scalability in imitating multiple interacting human driven
vehicles [10]. However, PS-GAIL has significant room for
improvement in terms of imitation performance, specifically
in terms of reducing undesirable traffic phenomena arising
out of interactions between vehicles, such as off-road driving,
collisions, and hard braking.
This paper modifies the GAIL approach to enable the use
of external rewards in the multi-agent setting. The result-
ing algorithmic procedure improves imitation performance
compared to PS-GAIL in three ways. First, it performs
better at reproducing individual driving behaviors. Second,
resulting policies exhibit reductions in undesirable traffic
phenomena such as collisions and offroad driving. Third,
emergent properties of multi-agent driving, such as lane
changes and spacing between vehicles, are shown to approach
human driving behavior.
While using shaped rewards in the context of imitation
learning has been proposed previously [13], [14], [15], [16],
this paper differs from the existing literature in two aspects.
First, we propose directly considering the imitation learning
problem in the multi-agent setting using parameter sharing.
Second, this approach penalizes undesirable traffic phenomena
through reward augmentation, and assesses the resulting
impact on emergent properties of multi-agent driving behavior.
This paper makes the following contributions: (1) We
propose a mathematical formulation for incorporating metrics
of undesirable traffic phenomena as constraints in the problem
of finding policies through imitation learning; (2) We provide
a framework for the designer of the imitation learning agent to
provide prior knowledge in the form of reward augmentation
to help the learning process; and (3) We demonstrate the RAIL
The imitation learning pipeline: the demonstration data from the NGSIM dataset [6] (left panel) is fed into RAIL (middle panel)
Fig. 1.
to create driving policies that can be used for validation of autonomous vehicles in simulation (right panel).
algorithm in a case study of modeling human driving behavior
and compare the imitation performance against results from
existing algorithms.
The link to the github repository containing the source code
for the experiments can be found at https://github.
com/sisl/ngsim_env.
II. PROBLEM DEFINITION
We consider the problem of imitation learning in a multi-
agent setting. The objective is to improve imitation perfor-
mance by expanding the scope of the imitation algorithm
to include imitation of emergent properties. We hypothesize
that by imitating both the local and emergent behaviors, the
resulting policy will improve our ability to mimic human
behaviors in a multi-agent setting.
A. Formulation
We formulate highway driving as a sequential decision
making task, in which the driver obeys a stochastic policy that
maps observed road conditions to a probability distribution
over driving actions [17], [18]. Given a dataset consisting
of a sequence of state-action tuples (st, at) demonstrating
highway driving and a class of policies πθ parameterized by
θ, we adopt imitation learning to infer this policy.
We use the multi-agent extension of Markov decision
processes adapted to the imitation learning framework [11],
[19]. Suppose there are n agents. The state, action, and policy
of agent i are denoted si, ai, and πi, respectively. The state,
action, and policy of the multi-agent system are denoted
s = [s1, . . . , sn], a = [a1, . . . , an], and ¯π(s1, . . . , sn) =
(π1(s1), . . . , πn(sn)). The state space and the action space
of the multi-agent system are denoted S and A, respectively.
In the remainder of this paper, we use s and a without the
subscripts to refer to the single agent scenario. We make
some simplifying assumptions to the general Markov Games
framework, which include agents being homogeneous (every
agent has the same action and observation space), each agent
getting independent rewards (as opposed to there being a
joint reward function), and the reward function being the
same for all the agents, as motivated in [10].
of a policy ¯π by ρ¯π(s) = (cid:80)∞
We define the γ-discounted state occupancy measure
t=0 γtPp0,¯π [st = s], where
Pp0,¯π [st = s] is the probability of landing in state s at time
t, when following ¯π starting from s0 ∼ p0. When convenient,
we will overload notation for state-action occupancy measure:
ρ¯π(s, a) = P¯π [a s] ρ¯π(s), where P¯π [a s] is the probability
of executing action a in state s. We denote the support of
the occupancy measure as supp where supp(ρ¯π) := {(s, a) :
ρ¯π(s, a) > 0}.
Consider a multi-agent policy ¯π, which maps the multi-
agent system state in S to a distribution over the multi-agent
action space A. Given the demonstrated data ¯πE, we need
to ensure that the greatest difference between ¯π and ¯πE is
small. The difference is measured between the demonstrated
trajectory and the roll-out trajectory given ¯π in a finite time
horizon. Using the GAIL framework, our goal is to minimize
the distance between the occupancy measures ρ¯π and ρ¯πE .
Further, to ensure centralized training with decentralized
control, and to provide prior knowledge, we introduce
parameter sharing [12] and reward augmentation [20].
Mathematically, introducing parameter-sharing and reward
augmentation poses two constraints on the function space of
the policy ¯π. For parameter-sharing, we are enforcing that
πi = πj = π for any i and j, where π denotes the policy
for single agent. Hence, ¯π(s1, . . . , sn) = (π(s1), . . . , π(sn)).
For reward augmentation, we require that π belongs to a
certain set such that undesired actions are discouraged. For
example, the vehicle should not drive off road, collide with
others, or brake too hard. Such undesired state-action pairs
are denoted as belonging to the set U. The constraint on the
policy is denoted by Π:
Π = {¯π : π = πi,∀ i, and P¯π [a s] = 0,∀ (s, a) ∈ U} (1)
Considering Wasserstein distance [21], the following con-
strained minimax problem for imitation learning is formulated:
min
¯π∈Π
max
D
{E¯πE [D(s, a)] − E¯π[D(s, a)]}
(2)
Algorithm 1 RAIL
Input: Expert trajectories τE ∼ ¯πE, Shared policy param-
eters Θ0, Critic parameters ψ0, Trust region size ∆KL
for k ← 0, 1, . . . do
Rollout trajectories for all agents (cid:126)τ ∼ πθk
Score (cid:126)τ with critic, generating reward p(st, at; ψk) and
added penalty r
Batch trajectories obtained from all the agents
Calculate advantage values
Take a Trust Region Policy Optimization (TRPO) [23]
step to find πθk+1 using ∆KL
Update the critic parameters ψ
end for
C. Theoretical Analysis: Convergence and Optimality
This section shows the convergence and optimality of
the constrained minimax problem using non-parameterized
policy and critic. In the following discussion, the occupancy
measure refers to the state-action occupancy measure. Given
the occupancy measure ρ¯π, we have
E¯π[D(s, a)] =
=
γtD(st, at)
ρ¯π(s, a)D(s, a)dsda,
(5)
where the critic, D, learns to output a high score when en-
countering pairs from ¯πE, and a low score when encountering
pairs from ¯π. D should be optimized for all functions.
minρ¯π∈Σ maxD
∞(cid:88)
(cid:90)
(cid:90)
t=0
A
S
(cid:90)
(cid:90)
(cid:90)
S
(cid:90)
A
−
where st and at are rollout data from the policy ¯π. By
Proposition 3.1 of [7], there is a one-to-one correspondence
between the policy ¯π and the occupancy measure ρ¯π.
The minimax objective function (2) can be re-written as
ρ¯πE (s, a)D(s, a)dsda
ρ¯π(s, a)D(s, a)dsda (6)
A
S
where Σ is the constraint on the occupancy measure equivalent
to (1) with
Σ = {ρ¯π : ρπ(si, ai) = ρπ(sj, aj),∀i, j;
ρ¯π(s, a) = 0,∀(s, a) ∈ U},
(7)
and ρπ(si, ai) is a marginal occupancy measure by integrating
out (sj, aj) for j (cid:54)= i in ρ¯π(s, a).
Theorem 2.1: The solution converges in measure by iter-
atively solving the minimax problem (6) if the following
conditions hold:1
A
tions);
iteration;
1) D and ¯π have enough capacity (representing all func-
2) D(s, a) attains the optimal value D∗(s, a) at each
3) ρ¯π is updated so as
(cid:82)
to improve the criterion
S [ρ¯πE (s, a) − ρ¯π(s, a)] D∗(s, a)dsda.
Moreover, the solution converges in measure to the optimal
(cid:90)
solution of the following problem:
(cid:82)
(cid:90)
minρ¯π∈Σ
Proof:
min
ρ¯π∈Σ
(cid:107)ρ¯πE (s, a) − ρ¯π(s, a)(cid:107)2dsda.
(8)
If (6) is unconstrained, i.e., Σ is the whole
occupancy measure space, [24] and [21] have shown that the
solution converges by iteratively solving the unconstrained
minimax problem if the three conditions hold.
A
S
Consider the constrained version of the optimization. Since
both the objective function (6) and the constraint (7) are
convex in ρ¯π, the constraints will not affect convergence, as
long as the three conditions are satisfied.2 The solution of the
1In practice, these assumptions may not exactly hold.
2We are dealing with the function space which contains ρ¯π. The convexity
means: for any ρ1 and ρ2 satisfying (7), their linear interpolation (1−λ)ρ1 +
λρ2 also satisfy (7) for any λ ∈ [0, 1]. It is easy to verify that this condition
is true for any U, i.e., if ρ1 and ρ2 are 0 on U, then (1 − λ)ρ1 + λρ2
should also be 0 on U. Hence, the convexity of the constraint is not affected
by the shape of U.
B. Solution Approach
The constrained minimax is solved by transforming the
problem to an unconstrained form. The constraint for pa-
rameter sharing is naturally encoded by sharing the same
policy for all agents. The constraint for reward augmentation
is enforced by adding a reward augmentation regularizer in
the function. Thus, the unconstrained problem becomes:
min
π
max
D
E¯πE [D(s, a)] − Eπ[D(s, a)] + rEπ[1U ]
(3)
where r is the penalty, and 1U is an indicator function that
is non-zero if and only if (s, a) ∈ U. The penalty r can
either be a constant value or a barrier function. We have
binary penalty when r is constant, and smooth penalty when
r is a continuous function that reaches zero on the boundary
of the set U. Note that the term Eπ[D(s, a)] is different
from E¯π[D(s, a)], where the former notation requires that all
agents use the same policy π with shared parameters.
We are now ready to introduce an algorithm to solve
the problem as formulated above. This algorithm is called
Reward Augmented Imitation Learning (RAIL, cf. Risk
Averse Imitation Learning [22]). We parameterize the single
agent policy using θ and the critic using ψ. The parameterized
policy and critic are denoted by πθ and Dψ, respectively.
Under this parametrization, the objective function becomes:
E¯πE [Dψ(s, a)] − Eπθ [Dψ(s, a)] + rEπθ [1U ].
(4)
To solve for the desired πθ, the following two steps are
max
min
ψ
θ
performed iteratively:
STEP 1: maximize Dψ. Similar to single agent GAIL, this
step involves the rollout and the update of the critic Dψ.
STEP 2: minimize policy πθ. This step is where the
constraints are taken into account.
Algorithm 1 provides the pseudo code that enacts the above
two step procedure and incorporates the reward augmentation
by providing penalties.
A. Environment
We evaluate our algorithm using the same simulator as
is used in the development of PS-GAIL [10]. The simulator
allows us to sample initial scenes from real traffic data and
then simulate for 20 s at 10 Hz. The most important feature
of this simulator is that expert vehicles observed in the real
data can be replaced with policy controlled agents, crucial
to both learning a good policy and evaluating final policies.
We replace 100 vehicles from the initial scene with vehicles
driven by the learned policy. Another crucial component of the
simulator is the extraction of features from the environment
which are then fed into the policy controller as observations.
The agent's decisions are translated into actions, which the
simulator uses to determine the next state.
We run our experiments on data from the Next Generation
Simulation (NGSIM) project [6]. This dataset is split into
three consecutive 15 min sections of driving data for a fixed
section of highway 101 in California. We use the first section
as the training dataset, from which we learn our policies. The
remaining two sections are used for testing and evaluating
the quality of the resulting policies.
B. Reward Augmentation
Reward augmentation combines imitation learning with
reinforcement learning and helps improve state space explo-
ration of the learning agent. Part of the reinforcement learning
reward signal comes from the critic based on imitating the
expert, and another signal comes from the externally provided
reward specifying the prior knowledge of the expert [13].
The reward augmentation in our experiments is provided
in the form of penalties.
1) Binary Penalty: The first method of reward augmenta-
tion that we employ is to penalize states in a binary manner,
where the penalty is applied when a particular event is
triggered. To calculate the augmented reward, we take the
maximum of the individual penalty values. For example, if
a vehicle is driving off the road and colliding with another
vehicle, we only penalize the collision. This will also be
important when we discuss smoothed penalties.
We explore penalizing three different behaviors. First, we
give a large penalty R to each vehicle involved in a collision.
Next, we impose the same large penalty R for a vehicle
that drives off the road. Finally, performing a hard brake
(acceleration of less than −3 m/s2) is penalized by only R
2 .
The penalty formula is shown in Eq. (10). We denote the
smallest distance from the ego vehicle to any other vehicle
on the road as dc (meters), where dc ≥ 0. We also define
the closest distance from the ego vehicle to the edge of the
road (meters): droad = min{dleft, dright}. We allow droad to be
negative if the vehicle is off the road. Finally, let a be the
acceleration of the vehicle, in m/s2. A negative value of a
indicates that the vehicle is braking. Now, we can formally
define the binary penalty function:
R dc = 0
a ≤ −3
R
2
R droad ≤ −0.1
Penalty =
(10)
The effect of constraint Γ on convergence and the
Fig. 2.
learned policy. Shaded area represents the occupancy measure of
the demonstration ρ¯πE . Curves represent the learned occupancy
measure ρ¯π at different iterations (lighter colors indicate earlier
iterations). A uniform distribution over the constraint Γ initializes
ρ¯π. When supp(ρ¯πE ) ∈ Γ, the demonstrated occupancy measure
can be recovered by ρ¯π. When supp(ρ¯πE ) /∈ Γ, the demonstrated
occupancy measure outside Γ can not be recovered.
inner maximization in (6) is D∗(s, a) ∝ ρ¯πE (s, a)− ρ¯π(s, a).
Then, in the limit, the problem
[ρ¯πE (s, a) − ρ¯π(s, a)] D∗(s, a)dsda
(9)
(cid:90)
(cid:90)
min
ρ¯π∈Σ
A
S
converges to (8) in measure.
According to Theorem 2.1, if the demonstrated data satisfy
the constraint Σ, then ρ¯π → ρ¯πE in the limit. Consider
the case that the demonstrated data does not satisfy Σ.
The constraint for parameter sharing ρπ(si, ai) = ρπ(sj, aj)
introduces an averaging effect, i.e., the learned single agent
policy ρπ is an average of the demonstrated single agent policy
ρπEi (si, ai) for all i. The demonstrated single agent policy
ρπEi (si, ai) is a marginal occupancy measure by integrating
out (sj, aj) for j (cid:54)= i in ρ¯πE (s, a). The average effect
results from identity permutation during minimization of
the two norm in (8). The constraint for reward augmentation
ρ¯π(s, a) = 0,∀(s, a) ∈ U introduces a truncation effect,
which shrinks the support of ρπ such that supp(ρπ) ∈ Γ :=
U c. The truncation effect is illustrated in Fig. 2.
Normally, the constraint from reward augmentation is
satisfied in the demonstration data. For example, the vehicles
do not drive off the road. However, the constraint from
parameter sharing may not be satisfied by the demonstrated
data, i.e., the assumption that all vehicles are homogeneous
may not hold. Then, as discussed above, the learned policy
takes an average over different policies. Therefore, reward
augmentation improves the learning performance in practice,
since it encodes prior knowledge.
III. EXPERIMENTS AND RESULTS
We use the results from PS-GAIL as a baseline to
compare against the RAIL algorithm by learning policies
and calculating specific metrics, as described in Section III-
C. We train three policies for each set of parameters that
we want to compare, selecting the best performing policy
based on the results of 10 000 policy rollouts in the 100-agent
training environment. The results presented in Section III-D
are extracted by evaluating our policies in the same manner,
but on scenes sampled from the held-out testing dataset.
The relative values of the penalties indicate the preferences
of the designer of the imitation learning agent. For example,
in this case study, we penalize hard braking less than the
other undesirable traffic phenomena.
2) Smooth Penalty: In this case, we provide a smooth
penalty for off-road driving and hard braking, where the
penalty is linearly increased from a minimum threshold to
the previously defined event threshold for the binary penalty.
For off-road driving, we linearly increase the penalty from
0 to R when the vehicle is within 0.5 m of the edge of the
road. For hard braking, we linearly increase the penalty from
0 to R/2 for acceleration between −2 m/s2 and −3 m/s2.
C. Metrics
We assess the imitation performance of our driving policies
at three levels. These are imitation of local driving behavior,
reduction of undesirable traffic phenomena, and imitation of
emergent properties of multi-agent driving. First, to measure
imitation of local vehicle behaviors, we use a set of Root Mean
Square Error (RMSE) metrics that quantify the divergence
between the trajectories generated by our learned policies and
the real trajectories in the dataset. We calculate the RMSE
between the original human driven vehicle and its replacement
policy driven vehice in terms of the position, lane offset, and
speed. A perfect policy would have RMSE values close to 0
for the entire rollout duration.
Second, to assess the undesirable traffic phenomena that
arise out of vehicular interactions as compared to local,
single vehicle imitation, we extract metrics that quantify hard
braking, collisions, and offroad driving. It is important to
note that these undesirable traffic phenomena were explicitly
incorporated into the formulation of penalty based reward
augmentation provided to the RAIL algorithm. We also extract
these metrics of undesirable traffic phenomena for the NGSIM
driving data and compare them against the metrics obtained
from rollouts generated by our driving policies.
Third, to quantify imitation of driving properties that are
emergent in that they are not explicitly modeled in the RAIL
formulation, we assess metrics of emergent properties. These
are the average number of lane changes per vehicle, the
average timegap per vehicle, and the distribution of speed
over all vehicles. The timegap for a vehicle is defined as the
time spacing (in seconds) to the vehicle in front of it. These
metrics of emergent driving properties are calculated for the
NGSIM driving data and compared against metrics obtained
from rollouts generated by our driving policies.
D. Results
We compare our proposed algorithm, RAIL, against PS-
GAIL. For comparisons between PS-GAIL, traditional GAIL,
and rule-based models, we guide the reader to [8], [10]. The
policies generated using RAIL were obtained using R = 2000
for the binary penalty, and R = 1000 for the smoothed
penalties. These R values were determined to be the best
after performing a hyperparameter search on penalty values
ranging from 0 and 5000.
Fig. 3. Root mean square error with respect to NGSIM data with
increasing time horizon as a measure of local imitation performance.
Policies trained using RAIL demonstrate closer driving behavior to
human demonstration as compared to the PS-GAIL baseline.
Figure 3 shows the RMSE values for speed, lane offset and
position of the vehicle driven by imitation learned policies
varying with increasing time horizon of the simulation rollout.
Policies learned using RAIL show lower values of RMSE
as compared to PS-GAIL throughout the rollout duration.
Further, between the two RAIL policies, it is observed that
smoothing the penalties improves the RMSE performance.
Thus, RAIL outperforms PS-GAIL in imitating local driving
behavior of individual vehicles.
Figure 4 illustrates the number of undesirable traffic
phenomena through the metrics of collisions, hard braking,
and offroad driving in case of NGSIM data, and policies
trained using PS-GAIL and RAIL. The results show that
policies learned using RAIL are less likely to lead vehicles
into extreme decelerations, off-road driving, and collisions.
Fig. 4. Metrics of undesirable traffic phenomena. These are explicitly
penalized in the reward augmentation formulation. RAIL results in
policies with lower values of collisions, offroad driving and hard
braking as compared to the PS-GAIL baseline.
Fig. 5. Metrics of emergent driving behavior. Policies trained using
reward augmentation result in lane changing and timegap behavior
that is closer to human driving as compared to PS-GAIL.
Additionally, for the case where we provide smooth penal-
ties (off-road duration and hard brake), we see significant
reductions in the associated metrics as compared to PS-GAIL.
Figures 5 and 6 show the imitation performance of policies
in terms of emergent properties of driving behavior. Average
number of lane changes per agent, and average timegap per
agent are illustrated in Fig. 5. While it can be argued that
the results showing improvements in reducing undesirable
traffic phenomena in Fig. 4 can be attributed directly to
penalizing via reward augmentation, the properties of driving
reported in Fig. 5 are truly emergent in that they arise out
of vehicular interactions that are not explicitly accounted for
in the imitation learning formulation. Policies trained using
reward augmentation result in driving behavior that leads to
emergent properties that are closer to human demonstrations
as compared to the baseline policies trained using PS-GAIL.
The distribution of speeds over all the vehicles in the
trajectory is shown in Fig. 6. The speed values over the
trajectory have been normalized and presented as a probability
distribution. Policies trained using reward augmentation
provide speed distributions more closely matching the NGSIM
data. Further, the mode of the distribution is closer to human
demonstrations in case of RAIL.
IV. CONCLUSIONS
This paper discusses the problem of imitation learning in
multi-agent settings in the context of autonomous driving. The
goal of this paper is to create reliable models of human driving
behavior that can imitate emergent properties of driving be-
havior arising out of local vehicular interactions. Specifically,
we provide a framework for multi-agent imitation learning
in terms of policy optimization with added constraints using
GAIL. We demonstrate improved performance in learning
human driving behavior models as measured by both local and
emergent imitation performance. The main contribution of
this paper was including reward augmentation in the imitation
learning framework as an added reinforcement signal to
the learning agent. Using externally specified rewards, the
designer of the learning agent can provide prior knowledge to
guide the training process. This imitation learning procedure
was demonstrated using the RAIL algorithm.
Simulation experiments were performed on learned driving
policies from human driving demonstrations in the NGSIM
dataset. These experiments were performed in the multi-
agent setting where multiple cars in the NGSIM scenes
were replaced by the vehicles driven using polcies learned
using RAIL. Resulting metrics such as root mean square
error, off-road duration, collision rates and hard brake rate
were used to assess the imitation performance. The results
obtained showed better imitation performance using reward
augmentation as compared to previous multi-agent results,
especially in terms of imitating emergent properties of driving
behavior, as measured by lane changes, timegap and speed
distributions of the resulting driving behavior. Further, this
paper also provided theoretical convergence guarantees in the
reward augmented imitation learning framework.
A limitation of this approach is that it does not capture
different types of driving behavior. Future work will include
latent states to capture different driving styles and enable learn-
ing different policies for different agents. Another interesting
extension of this work would focus on populating driving
scenarios with these models trained using imitation learning.
Such scenarios will enable validation of autonomous cars
driven using planning algorithms by simulating interactive
driving behavior between autonomous vehicles and human
driven vehicles. Finally, policies trained using the RAIL
algorithm will be deployed in simulation with an autonomous
vehicle for validation testing.
Fig. 6. Distribution of speeds over all cars over all the simulation
trajectories for human demonstration, policies trained using PS-
GAIL, and policies trained using RAIL. RAIL driving policies
result in closer velocity distribution to the human demonstrations.
ACKNOWLEDGMENTS
We thank Blake Wulfe and Jeremy Morton for useful
discussions. Toyota Research Institute (TRI) provided funds
to assist the authors with their research, but this article solely
reflects the opinions and conclusions of its authors and not
TRI or any other Toyota entity.
REFERENCES
[1] B. D. Argall, S. Chernova, M. Veloso, and B. Browning, "A survey of
robot learning from demonstration," Robotics and Autonomous Systems,
vol. 57, no. 5, pp. 469 -- 483, 2009.
[2] A. Hussein, M. M. Gaber, E. Elyan, and C. Jayne, "Imitation learning:
A survey of learning methods," ACM Computing Surveys (CSUR),
vol. 50, no. 2, pp. 1 -- 35, 2017.
[3] ISO, "ISO 26262: Road vehicles-functional safety," International
Standard ISO/FDIS, 2011.
[4] P. Koopman and M. Wagner, "Challenges in autonomous vehicle testing
and validation," SAE International Journal of Transportation Safety,
vol. 4, no. 1, pp. 15 -- 24, 2016.
[5] J. Morton, T. Wheeler, and M. J. Kochenderfer, "Closed-loop policies
for operational tests of safety-critical systems," IEEE Transactions on
Intelligent Transportation Systems, pp. 317 -- 328, 2018.
[6] J. Colyar and J. Halkias, "US highway 101 dataset, Tech. Rep. FHWA-
HRT-07-030, Jan. 2007.
[7] J. Ho and S. Ermon, "Generative adversarial imitation learning," in
Advances in Neural Information Processing Systems (NIPS), 2016, pp.
4565 -- 4573.
[8] A. Kuefler, J. Morton, T. A. Wheeler, and M. J. Kochenderfer,
"Imitating driver behavior with generative adversarial networks," in
IEEE Intelligent Vehicles Symposium (IV), 2017, pp. 204 -- 211.
[9] M. Treiber, A. Hennecke, and D. Helbing, "Congested traffic states in
empirical observations and microscopic simulations," Physical Review
E, vol. 62, no. 2, pp. 1805 -- 1824, 2000.
[10] R. P. Bhattacharyya, D. J. Phillips, B. Wulfe, J. Morton, A. Kuefler,
and M. J. Kochenderfer, "Multi-agent imitation learning for driving
simulation," in IEEE/RSJ International Conference on Intelligent Robots
and Systems (IROS), 2018, pp. 1534 -- 1539.
[11] J. Song, H. Ren, D. Sadigh, and S. Ermon, "Multi-agent generative
adversarial imitation learning," in International Conference on Learning
Representations (ICLR), Workshop Track, 2018.
[12] J. K. Gupta, M. Egorov, and M. Kochenderfer, "Cooperative multi-agent
control using deep reinforcement learning," in International Conference
on Autonomous Agents and Multiagent Systems. Springer, 2017, pp.
66 -- 83.
[13] Y. Li, J. Song, and S. Ermon, "Infogail: Interpretable imitation learning
from visual demonstrations," in Advances in Neural Information
Processing Systems (NIPS), 2017, pp. 3815 -- 3825.
[14] K. Judah, A. P. Fern, P. Tadepalli, and R. Goetschalckx, "Imitation
learning with demonstrations and shaping rewards." in AAAI Conference
on Artificial Intelligence (AAAI), 2014, pp. 1890 -- 1896.
[15] U. Syed and R. E. Schapire, "Imitation learning with a value-based
prior," arXiv preprint arXiv:1206.5290, 2012.
[16] W. B. Knox and P. Stone, "Reinforcement learning from simultaneous
human and MDP reward," in International Conference on Autonomous
Agents and Multiagent Systems (AAMAS), 2012, pp. 475 -- 482.
[17] L. P. Kaelbling, M. L. Littman, and A. R. Cassandra, "Planning and
acting in partially observable stochastic domains," Artificial Intelligence,
vol. 101, no. 1-2, pp. 99 -- 134, 1998.
[18] M. J. Kochenderfer, Decision Making Under Uncertainty: Theory and
Application. MIT Press, 2015.
[19] M. L. Littman, "Markov games as a framework for multi-agent
reinforcement learning," in Machine Learning Proceedings. Elsevier,
1994, pp. 157 -- 163.
[20] A. Y. Ng, D. Harada, and S. Russell, "Policy invariance under
reward transformations: Theory and application to reward shaping,"
in International Conference on Machine Learning (ICML), 1999, pp.
278 -- 287.
[21] M. Arjovsky, S. Chintala, and L. Bottou, "Wasserstein Generative
Adversarial Networks," in International Conference on Machine
Learning (ICML), 2017, pp. 214 -- 223.
[22] A. Santara, A. Naik, B. Ravindran, D. Das, D. Mudigere, S. Avancha,
and B. Kaul, "Rail: Risk-averse imitation learning," arXiv preprint
arXiv:1707.06658, 2017.
[23] J. Schulman, S. Levine, P. Abbeel, M. Jordan, and P. Moritz, "Trust
region policy optimization," in International Conference on Machine
Learning (ICML), 2015, pp. 1889 -- 1897.
[24] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley,
S. Ozair, A. Courville, and Y. Bengio, "Generative adversarial nets,"
in Advances in Neural Information Processing Systems (NIPS), 2014,
pp. 2672 -- 2680.
|
1705.00107 | 1 | 1705 | 2017-04-29T01:09:18 | The Social Benefits of Balancing Creativity and Imitation: Evidence from an Agent-based Model | [
"cs.MA",
"cs.SI",
"q-bio.NC"
] | Although creativity is encouraged in the abstract it is often discouraged in educational and workplace settings. Using an agent-based model of cultural evolution, we investigated the idea that tempering the novelty-generating effects of creativity with the novelty-preserving effects of imitation is beneficial for society. In Experiment One we systematically introduced individual differences in creativity, and observed a trade-off between the ratio of creators to imitators, and how creative the creators were. Excess creativity was detrimental because creators invested in unproven ideas at the expense of propagating proven ones. Experiment Two tested the hypothesis that society as a whole benefits if individuals adjust how creative they are in accordance with their creative success. When effective creators created more, and ineffective creators created less (social regulation), the agents segregated into creators and imitators, and the mean fitness of outputs was temporarily higher. We hypothesized that the temporary nature of the effect was due to a ceiling on output fitness. In Experiment Three we made the space of possible outputs open-ended by giving agents the capacity to chain simple outputs into arbitrarily complex ones such that fitter outputs were always possible. With the capacity for chained outputs, the effect of social regulation could indeed be maintained indefinitely. The results are discussed in light of empirical data. | cs.MA | cs | Running head: SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
1
7
1
0
2
r
p
A
9
2
]
A
M
.
s
c
[
1
v
7
0
1
0
0
.
5
0
7
1
:
v
i
X
r
a
The Social Benefits of Balancing Creativity and Imitation: Evidence from an
Agent-based Model
Liane Gabora and Simon Tseng
University of British Columbia
Author Note
Accepted for publication in Psychology of Aesthetics, Creativity, and the Arts.
This article may not exactly replicate the final version published in the APA journal. It
is not the copy of record.
Correspondence concerning this manuscript may be addressed to: Liane Gabora,
Department of Psychology, University of British Columbia, Fipke Centre for Innovative
Research, 3247 University Way, Kelowna, British Columbia, Canada, V1V 1V7; Email:
[email protected]
This work was supported by a grant (62R06523) from the Natural Sciences and
Engineering Research Council of Canada. Thanks to Fabian Yáñez for assistance with
the manuscript, and to Tiha von Ghyczy for assistance with the analysis. Preliminary
reports on portions of this work were presented at the Annual Meeting of the Cognitive
Science Society and the International Conference on Computational Creativity.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
2
Abstract
Although creativity is encouraged in the abstract it is often discouraged in educational
and workplace settings. Using an agent-based model of cultural evolution, we
investigated the idea that tempering the novelty-generating effects of creativity with the
novelty-preserving effects of imitation is beneficial for society. In Experiment One we
systematically introduced individual differences in creativity, and observed a trade-off
between the ratio of creators to imitators, and how creative the creators were. Excess
creativity was detrimental because creators invested in unproven ideas at the expense of
propagating proven ones. Experiment Two tested the hypothesis that society as a whole
benefits if individuals adjust how creative they are in accordance with their creative
success. When effective creators created more, and ineffective creators created less
(social regulation), the agents segregated into creators and imitators, and the mean
fitness of outputs was temporarily higher. We hypothesized that the temporary nature
of the effect was due to a ceiling on output fitness. In Experiment Three we made the
space of possible outputs open-ended by giving agents the capacity to chain simple
outputs into arbitrarily complex ones such that fitter outputs were always possible.
With the capacity for chained outputs, the effect of social regulation could indeed be
maintained indefinitely. The results are discussed in light of empirical data.
Keywords: agent-based model, creativity, imitation, individual differences, social
regulation
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
3
The Social Benefits of Balancing Creativity and Imitation: Evidence from an
Agent-based Model
Introduction
Creativity is praised as the hallmark of our humanity, responsible for our greatest
achievements (Mithen, 1998). It is essential for maintaining a competitive edge in the
marketplace (Reiter-Palmon & Illies, 2004; Rule & Irwin, 1988), and has long been
associated with personal fulfillment (May, 1975; Rogers, 1959), self-actualization
(Maslow, 1959), and more recently with the positive psychology movement (Adams,
2012; Kaufman & Beghetto, 2014; Simonton, 2002). However, social norms, policies,
and institutions often stifle creativity (Ludwig, 1995; Sulloway, 1996), and educational
systems do not appear to prioritize the cultivation of creativity, and in some ways
discourage it (Snyder, Gregerson, & Kaufman, 2012; Robinson, 2001). Teachers often
have conscious or unconscious biases against creative students, leading them to act in
ways that suppress creativity (Aljughaiman & Mowrer-Reynolds, 2005; Beghetto, 2007;
Plucker, Beghetto, & Dow, 2004; Westby & Dawson, 1995). Workplaces often
discourage creativity by providing insufficient resources and support for the
development of new ideas, and inappropriate levels of challenge and autonomy
(Amabile, 1998), as well as levels of environmental distraction that are not conducive to
creativity (Stokols, Clitheroe, & Zmuidzinaz, 2002). Is there any rhyme or reason to
society's mixed messages about the desirability of creativity?
Balancing Novelty with Continuity
There are drawbacks to creativity (Cropley, Cropley, Kaufman, & Runco, 2010;
Ludwig, 1995), one being that generating creative ideas is difficult and time consuming.
Moreover, a creative solution to one problem often generates other problems, or has
unexpected negative side effects that only become apparent after much effort has been
invested (Tomlinson, 1980). Given the costs of creativity, it seems reasonable to
speculate that there may be an adaptive value to the seemingly mixed messages that
society sends about the desirability of creativity; perhaps society is well-served by the
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
4
tension between creative expression and the reinforcement of conventions and
established protocols.
This paper explores the possibility that mechanisms at work encouraging
individual differences in creativity could be beneficial, by ensuring that the society as a
whole both generates new variants and preserves the best of them. This would be
consistent with growing evidence that group behaviour does not always reduce to
individual behaviour (e.g., Anderson, Richardson, & Chemero, 2012; Goldstone &
Gureckis, 2009). It is also consistent with our everyday experience that an extended
social group can reap the rewards of the creative efforts of an individual, i.e., few of us
would be able to build a computer or write a symphony, but they are nonetheless ours
to use and enjoy. We all benefit from the exchange of knowledge, ideas, and artifacts, in
part because of our capacity for social learning, a phenomenon that Bandura (1995)
described as 'no-trial learning', which involves learning by observing and imitating
others.
In much of the cultural evolution literature, social learning is contrasted with
individual learning, which involves learning for oneself, and novelty is attributed to
things like copying error (e.g., Henrich & Boyd, 2002; Mesoudi, Whiten & Laland, 2006;
Rogers, 1988). Creativity, if mentioned at all, is equated with individual learning.
However, they are not the same thing. Individual learning deals with obtaining
pre-existing information from the environment through non-social means (e.g., reading
a book), whereas creativity involves generating ideas, behavior, or artifacts that did not
previously exist. In the first case the information comes from the external world; in the
second it is generated internally. Indeed there is increasing recognition of the extent to
which creative outcomes are contingent upon internally driven incremental/iterative
processing (Basadur, 1995; Chan & Schunn, 2015; Feinstein, 2006).
It is well known in theoretical biology that cumulative evolution entails a fusion of
variation generating processes, such as mutation, and processes that preserve fit
variants, such as heredity (Haldane, 1932). It has been suggested that in cultural
evolution the role of variation generation is played by creativity, and the role of
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
5
variation preservation is played by social learning processes such as imitation (Gabora,
1995). "In vivo" studies of scientific laboratories reveal that scientists benefit from
opportunities for distributed reasoning and scaffolding of ideas and interpretations
afforded by social networks (Dunbar, 2000). Similarly, through the interplay of
creativity and social learning, ideas in the arts, sciences, and technology, as well as
customs and folk knowledge, exhibit recombinant growth (Weitzman, 1998), and evolve
over time (Dasgupta, 1994; Jacobs, 2000). The pattern of cumulative cultural change
that results when new innovations draw from and build upon on existing products is
sometimes referred to as the ratchet effect (Tomasello, Kruger, & Ratner, 1993).
There is also evidence (reviewed in Hills, Todd, Lazer, Redish, & Couzin, 2015)
that firms as well as societies benefit by balancing exploration with exploitation. The
finding of successful solutions is made possible through exploration, while social
learning processes such as imitation assist in the perpetuation and exploitation of these
successful solutions, and continuity is provided by the maintenance and diffusion of
routines, which must evolve in response to changing markets. Organizational leaders
need to provide employee autonomy and be on the lookout for opportunities emerging
from employee efforts, yet balance this with the provision of sufficient constraints to
make goals seem within reach, and the pruning out of inferior ideas (Hunter,
Thoroughgood, Myer, & Ligon, 2011; Mumford & Hunter, 2005). Further evidence for
the notion that productivity involves a balancing of novelty and continuity comes from
a study of alliances between firms based on data for 116 companies in the chemicals,
automotive and pharmaceutical industries (Nooteboom, Van Haverbeke, Duysters,
Gilsing, & Van den Oord, 2007). The authors found an inverted U-shaped effect of
cognitive distance on innovation, where cognitive distance was operationalized in terms
of differences in technological knowledge between the two firms, and innovativeness was
assessed through an analysis of patent applications. They concluded that alliances
between firms with low cognitive distance introduces too little novelty to increase
productivity, while high cognitive distance means insufficient continuity for cumulative
knowledge growth.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
6
In short, it seems reasonable that the mixed messages society gives about the
desirability of creativity might stem from society's need to balance novelty generation
with novelty preservation, which can be understood in terms of theoretical
considerations of culture as an evolution process.
Agent-based Models
This interplay between 'exploration / generation of novelty' and 'exploitation /
perpetuation of novelty' can be examined with an agent-based model. An agent-based
model (ABM) is a computer program that simulates the actions and interactions of
autonomous agents (both individual or collective entities such as organizations or social
groups) in order to assess their effects on the system as a whole (for a review of ABMs
see Niazi & Hussain, 2011). Because ABMs enable us to manipulate variables and
observe the effects in a more controlled manner than in real life, they have proven useful
for investigating questions concerning the diffusion of creative novelty and its impact on
cultural evolution (e.g., Gabora, 2008a, 2008b; Guardiola, Diaz-Guilera, Perez, Arenas,
& Llas, 2002; Iribarren & Moro, 2011; Jackson & Yariv, 2005; Liu, Madhavan, &
Sudharshan, 2005; Sosa & Connor, 2015; Spencer, 2012; Watts & Gilbert, 2014). For
example, results obtained with ABMs suggest that agents in large, diverse populations
tend to be more creative (Gabora, 2008a; Spencer, 2012), the density of communication
links amongst agents produces diminishing returns in term of the benefits on the
invention rate (Bhattacharyya & Ohlsson, 2010), and diverse communities are better at
generating novelty while communities of specialized agents may be better at
communicating novelty Spencer, 2012).
Some computational models referred to as models of cultural evolution (e.g.,
Henrich & Boyd, 2002) allow for as few as only two alternative forms of a cultural trait,
i.e., there is no accumulative ratcheting of novelty. They are thus properly referred to as
models of cultural transmission, not models of cultural evolution. However, others do
allow for genuine accumulation of novelty. In MAV (for 'meme and variations'), an
ABM of cultural evolution (Gabora, 1995), and precedessor of the model used here,
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
7
novelty was injected into the artificial society through the invention of new actions, and
continuity was preserved through the imitation of existing actions. When agents never
invented, there was nothing to imitate, and there was no cultural evolution. Indeed, it
makes intuitive sense that if everyone relies on the strategy of copying others rather
than coming up with their own ideas, there are no new ideas around to imitate, and the
generation of cultural novelty grinds to a halt. If the ratio of invention to imitation in
MAV was even marginally greater than 0, not only was cumulative cultural evolution
possible, but eventually all agents converged on optimal outputs. When all agents
always invented and never imitated, the mean fitness of cultural outputs was also
sub-optimal because fit ideas were not dispersing through society. (In this cultural
context, fitness refers to value for the agent according to a fitness function, as discussed
at length below.) The society as a whole performed optimally when the ratio of creating
to imitating was approximately 2:1. 1 Extreme levels of creativity were detrimental at
the level of the society, suggesting that there could be an adaptive value to society's
ambivalent attitudes toward creativity.
Hypotheses and Approach
This paper provides a computational test of three hypotheses that have not
previously been explored in the ABM literature, hypotheses that challenge the common
assumption that more creativity is necessarily better. First, we tested the hypothesis
that society as a whole can suffer if either (1) the ratio of creators to imitators is too
high, or (2) creators are too creative. Although experiments with MAV had shown that
the mean fitness of cultural outputs decreased if agents were too creative, in those
experiment all agents were equally creative. Findings of pronounced individual
differences in creativity (Kaufman, 2003; Wolfradt & Pretz, 2001) suggested that a
1Note that this finding cannot be construed as support for Rogers' (1988) claim that cheap social learning
does not necessarily increase mean fitness, for several reasons, one being that in MAV, and in the current
work, the concern is the fitness of cultural outputs, not the biological fitness of individuals. These are
sometimes related, but not necessarily, and indeed sometimes at odds with one another (as when tasks
such as preparing food and caring for offspring are neglected due to immersion in a creative project).
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
8
logical next step was to investigate how varying the extent of such individual differences
impacts the society as a whole.
The second hypothesis tested here is that a society can perform better if
individuals are able to adjust how creative they are over time in accordance with their
perceived creative success. There is empirical evidence that children can adjust their
imitative fidelity and level of innovation (Legare, Wen, Herrmann, & Whitehouse,
2015), and that high imitative fidelity can be related to fear of ostracism
(Watson-Jones, Legare, Whitehouse, & Clegg, 2014). Thus, society may balance novelty
and continuity through mechanisms such as selective ostracization of deviant behaviour
unless it is accompanied by the generation of valuable creative output, and
encouragement or even adulation of those whose creations are successful. In this way
society might self-organize into a balanced mix of novelty generating creators and
continuity perpetuating imitators, both of which are necessary for cumulative cultural
evolution. In theory, if effective creators create more, and ineffective creators create less,
the society's outputs should collectively evolve faster.
A first step in investigating this was to determine whether it is algorithmically
possible to increase the mean fitness of ideas in a society by enabling agents to
self-regulate how creative they are. We refer to this regulatory mechanism as social
regulation (SR) because it could be mediated by social cues such as praise and/or
criticism from peers, family, or teachers, but it is also possible that it involves individual
differences in the ability to detect or respond to such cues, or individuals' own
assessments of the worth of their ideas, or some combination of these.
A third hypothesis investigated here is that in order for the benefit of this social
regulation mechanism to be ongoing (as opposed to temporary), the space of possible
creative outputs must be open-ended, such that it is always possible for superior
possibilities to be found. In other words, social regulation is advantageous only when it
is possible to obtain fitter outputs than those currently in use.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
9
The Computational Model
The ABM used here, referred to as "EVOlution of Culture", abbreviated EVOC,
is a model of cultural evolution that uses neural network based agents that (1) invent
new ideas, (2) imitate actions implemented by neighbors, (3) evaluate ideas, and (4)
implement successful ideas as actions (Gabora, 2008a).2 EVOC was used because it is
amenable to testing the above hypotheses concerning creativity; discussion of general
questions about how culture evolves including comparison with other approaches (e.g.,
Boyd & Richerson, 1985) can be found elsewhere (Gabora, 2008b, 2011, 2013; Gabora &
Kauffman, 2016). The approach is consistent with a growing effort in cognitive science
to leverage computer modeling techniques and knowledge of cognition to understand
aggregate social outcomes (Goldstone & Gureckis, 2009).
EVOC is an elaboration of the above-mentioned MAV (Gabora, 1995), the earliest
computer program to isolate culture as an evolutionary process in its own right so that
it can be compared and contrasted with biological evolution.3 The goal behind MAV,
and also behind EVOC, was to distill the underlying logic of cultural evolution, i.e., the
process by which ideas adapt and build on one another in the minds of interacting
individuals. Agents do not evolve in a biological sense, as they neither die nor have
offspring, but do in a cultural sense, by generating and sharing ideas for actions. The
cultural outputs in EVOC take the form of actions, since Donald (1991) and others
have provided substantial evidence that the earliest elements to evolve through culture,
before grammatical language, were physical actions such as gestures, and the
movements required to make tools.
EVOC has been used to address such questions as how does the presence of leaders
or barriers to the diffusion of ideas affect the fitness and diversity of cultural outputs
2The code is freely available; to gain access please contact the first author.
3The approach can thus be contrasted with computer models of cultural transmission, in which (unlike
models of cultural evolution) there may be as few as two possible outputs, and the outputs do not
become increasingly complex and adapted over time, and with computer models of how individual
learning affects biological evolution (Best, 1999; Higgs, 2000; Hinton & Nowlan, 1987; Hutchins &
Hazelhurst, 1991).
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
10
(Gabora, 2008b). Here, we use it to investigate the social impact of varying the ratio of
creators to imitators and enabling social regulation of individual creativity levels.
We now summarize the architecture of EVOC in sufficient detail to explain our
results.
Agents
Agents consist of (1) a neural network, which encodes ideas for actions and
detects trends in what constitutes a fit action, (2) a "perceptual system", which
observes and evaluates neighbors' actions, and (3) a body, consisting of six body parts
which implement actions.
The neural network is an auto-associator because this enables the agent to learn
and execute the action that a neighbor is executing, and thereby imitate successful
neighbors.4 The network is composed of six input nodes and six corresponding output
nodes that represent concepts of body parts (LEFT ARM, RIGHT ARM, LEFT LEG,
RIGHT LEG, HEAD, and HIPS), and seven hidden nodes that represent more abstract
concepts (LEFT, RIGHT, ARM, LEG, SYMMETRY, OPPOSITE, and MOVEMENT).
Input nodes and output nodes are connected to hidden nodes of which they are
instances (e.g., RIGHT ARM is connected to RIGHT). A schematic illustration of the
neural network is provided in Figure 1. Each body part can occupy one of three possible
positions: a neutral or default position, and two other positions, which are referred to as
active positions. Activation of any input node activates the MOVEMENT hidden node.
Same-direction activation of symmetrical input nodes (e.g., positive activation-which
represents upward motion-of both arms) activates the SYMMETRY node.
Insert Figure 1 here.
The neural network starts with small random weights between input/output
nodes. Weights between hidden nodes, and weights between hidden nodes and
input/output nodes, are fixed at +/- 1.0. Patterns that represent ideas for actions are
4Learning in auto-associative networks is unsupervised in the sense that they take in inputs, and try to
organize internal representations based on them.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
11
learned by training for 50 iterations using the generalized delta rule with a sigmoid
activation function (Rumelhart & McClelland, 1986). (See the Appendix for details.)
Training continues until it has learned the identity function between input and output
patterns.
The neural network enables agents to learn trends over time concerning what
general types of actions tend to be valuable (e.g., that symmetrical actions tend to be
fit), and use this learning to invent new actions more effectively (e.g., to increase the
frequency of symmetrical actions). When the ability to learn such trends is turned off,
agents invent at random and the fitness of their inventions increases much more slowly
(Gabora, 2008b).
Invention
An idea for a new action is a pattern consisting of six elements that dictate the
placement of the six body parts. Agents generate new actions by modifying their initial
action or an action that has been invented previously or acquired through imitation.
During invention, the pattern of activation on the output nodes is fed back to the input
nodes, and invention is biased according to the activations of the SYMMETRY and
MOVEMENT hidden nodes. (Note that, were this not the case, there would be little
point in using a neural network. Note also that while in the first iteration the agent is
simply guessing and learning, over the course of a run, invention becomes increasingly
more sophisticated.) To invent a new idea, for each node of the idea currently
represented on the input layer of the neural network, the agent makes a probabilistic
decision as to whether the position of that body part will change, and if it does, the
direction of change is stochastically biased according to the learning rate. If the new
idea has a higher fitness than the currently implemented idea, the agent learns and
implements the action specified by that idea. When "chaining" is turned on (as
discussed below), an agent can keep adding new sub-actions and thereby execute a
multi-step action, so long as the most recently-added sub-action is both an acceptable
sub-action and different from the previous sub-action of that action (Gabora, Chia, &
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
12
Firouzi, 2013).
Imitation
The process of finding a neighbor to imitate works through a form of lazy
(non-greedy) search. The imitating agent randomly scans its neighbors, and adopts the
first action that is fitter than the action it is currently implementing. If it does not find
a neighbor that is executing a fitter action than its own current action, it continues to
execute the current action.
Evaluation: The Fitness Function
Following (Holland, 1975), we refer to the success of an action in the artificial
world as its fitness, with the caveat that unlike its usage in biology, here the term is
unrelated to number of offspring (or number of ideas derived from a given idea). As
mentioned previously, the fitness function in EVOC involves bodily movement, on the
basis of evidence that the earliest elements to evolve through culture were physical
actions. The fitness function used in the first two experiments rewards activity of all
body parts except for the head, symmetrical limb movement, and positive limb
movement. The rationale for this is that many human actions require a stationary head
(to watch what you're doing), and symmetrical limb movement, i.e., these are relatively
common constraints on many real movements.5 The fitness function was also designed
to meet practical constraints, such as having multiple optima (e.g., an action can be
optimal if either both arms move up or both arms move down.) Multiple optima
enables us to better characterize the effect of a given manipulation on diversity (i.e.,
whether it finds all optima or just one).6
Total body movement, m, is calculated by adding the number of active body
parts, i.e., body parts not in the neutral position. mu is the number of body parts
5Of course, these constraints are not present for all human activities, such as holding a yoga posture.
6Another reason this fitness function was used is that it exhibits a cultural analog of epistasis which
makes it more difficult to solve. In biological epistasis, the fitness conferred by the allele at one gene
depends on which allele is present at another gene. In this cognitive context, epistasis is present when
the fitness contribution to the idea by movement of one limb depends on what other limbs are doing.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
13
moving upwards.
mh = 1if head is stationary;
sa = 1 if arms move symmetrically;
sl = 1 if legs move symmetrically;
pa = 1 if arms move upwards;
pl = 1 if legs move upwards;
0 otherwise
0 otherwise
0 otherwise
0 if arms move downwards
0 if legs move downwards
Fitness of a single-step action, Fn, is determined as follows:
Fn = m + 2mu + 10mh + 5(sa + sl) + 2(pa + pl)
(1)
The weights reflect intuitive notions about the relative importance of different
aspects of what makes for a fit action. For example, since (as mentioned previously)
almost all actions require that the head remain stationary so as to be able to focus on
stimuli of interest, the weight on mh is very high, and since (as also mentioned
previously) many actions require symmetrical movement, the weight on sa and sl are
moderately high.
Learning
Invention makes use of the ability to detect, learn, and respond adaptively to
trends. Since no action acquired through imitation or invention is implemented unless it
is fitter than the current action, new actions provide valuable information about what
constitutes an effective idea. Knowledge acquired through the evaluation of actions is
translated into educated guesses about what constitutes a successful action using weight
updating through feedback. For example, an agent may learn that more overall
movement tends to be either beneficial (as with the fitness function used here) or
detrimental, or that symmetrical movement tends to be either beneficial (as with the
fitness function used here) or detrimental, and bias the generation of new actions
accordingly.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
14
The Artificial World
These experiments used a default artificial world: a toroidal lattice with 1024 cells
each occupied by a single, stationary agent, and a von Neumann neighborhood
structure. Creators and imitators were randomly dispersed.7 Runs lasted 100 iterations,
and all data are averages across 100 runs.
A Typical Run
Fitness and diversity of actions are initially low because all agents are initially
immobile, implementing the same action, with all body parts in the neutral position.
Soon some agent invents an action that has a higher fitness than immobility, and this
action gets imitated, so fitness increases. Fitness increases further as other ideas get
invented, assessed, implemented as actions, and spread through imitation. The diversity
of actions increases as agents explore the space of possible actions, and then decreases
as agents hone in on the fittest actions. Thus, over successive rounds of invention and
imitation, the agents' actions improve. EVOC thereby models how adaptive change
accumulates over time in a purely cultural context.
Experiment One: Effect of Varying the Ratio of Creators to Imitators
The first experiment investigated how varying the level of creativity of individuals
affects the fitness of ideas in society as a whole. To incorporate individual differences in
degree of creativity we modified EVOC such that agents spanned the full range of
possibilities from always creating, to always imitating, to in-between strategies in which
agents created in some iterations and imitated in others. Those that could create at all
are referred to as creators. Those that only obtain new actions by imitating neighbors
are referred to as imitators. It was possible to vary the probability that creators create
versus imitate (i.e., they range from creating all the time to behaving almost like
imitators). Whereas any given agent is either a creator or an imitator throughout the
entire run, the proportion of creators creating or imitating in a given iteration
7In other experiments (Leijnen & Gabora, 2009a) we investigated the results of clustering creators.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
15
fluctuates stochastically.
Procedure
The proportion of creators relative to imitators in the society is referred to as C.
The creativity of the creators-that is, the probability that a creator invents a new
action instead of imitating a neighbor-is referred to as p. If a creator decides to create
on a particular iteration, there is a 1/6 probability of changing the position of any body
part involved in an action8 The society consists of three subgroups:
1. C × p × N creators attempting to create
2. C × (1 − p) × N creators attempting to imitate
3. (1 − C) × N imitators attempting to imitate
In previous investigations we measured the diversity of ideas over the course of a
run for different values of C and p. We found that the cultural diversity, i.e., the
number of different ideas implemented by one or more agent(s), was positively
correlated both with the proportion of creators to imitators, and with how creative the
creators were. We also obtained suggestive evidence that when creators are relatively
uncreative, the mean fitness of ideas increases as a function of the percentage of
creators in the society, but when creators are highly creative, the society appears to be
better off with fewer creators (Leijnen & Gabora, 2009b). However, this study had
shortcomings. First, the simulations were performed with small societies of only 100
agents. Second, since action fitness was obtained at only one time slice (the 50th
iteration) for all ratios of creators to imitators, these results did not reflect the
dynamics of the time series. Given a set of series of accumulating value over time, it is
unclear which series is most representative. The series cannot be unambiguously
ordered unless for each pair of series one strictly dominates the other, and that is not
the case here; the curves representing mean fitness at different values of {C, p} increase
monotonically but they may cross and re-cross as time progresses. Thus here we present
a more extensive investigation of the relationship between creativity and society as a
8This gave on average a probability of one change per newly created action, which previous experiments
(Gabora, 1995) showed to be optimal.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
16
whole that employs a sophisticated solution to the time series problem.
Analysis. We used time series discounting which associates a "present value"
with any future benefit such that the present value of any given benefit diminishes as a
function of elapsed time until the benefit is realized (McDonald & Siegel, 1986). The
standard approach in financial settings is exponential discounting. Given a series of
benefits bt, the Net Present Value (NPV) is defined as:
N P V (b) =
NX
t=1
rt−1bt with 0 < r ≤ 1
(2)
The discount rate r is normally set as r = ( 100+i
100 )−1 where i is the interest rate (in
percentage) for the unit period that an investor can obtain from a safe investment. This
basic idea was adapted to analyze the benefit accrued by attaining fit actions for
different values of C and p in EVOC. The first discounting method used was
Time-to-Threshold (TTT) discounting. Since all fitness trajectories were monotonically
increasing, those that reached a reasonably high threshold τ sooner should be valued
higher. We measured how many iterations (time to threshold) it took for fitness to
reach τ. For these runs, τ = 9 was used as a measure of optimal fitness to allow for a
realistic averaging over time.
Whereas imitators need creators, creators should ignore others if they could do
better on their own (p = 1). In other words, the fitness prospects of creators' ideas
when they work alone can be viewed in a manner analogous to the interest yield of
treasury bonds in investment decisions. This logic suggests another kind of modification
of the standard discounting method. The second adaptation to the basic notion of
discounting we refer to as Present Innovation Value (PIV) discounting. Let N be the
number of iterations and let F C,p
setting {C, p}. Thus F
We define the PIV for any fitness curve as:
be the mean action fitness at iteration t for parameter
is the fitness expectation with no interaction amongst agents.
t
1,1
t
P IV (F C,p) = −N +
NX
t=1
F C,p
F 1,1
(3)
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
17
Thus the PIV value gives us a measure of the extent to which the mean fitness of
outputs benefits or suffers as imitation becomes more prevalent (due to an increase in
either the proportion of imitators or the probability that creators imitate) compared to
a society composed solely of creators creating all the time with no imitation.
Results and Discussion
All results are averages across 100 runs. The 3D graph and contour plot for the
log10 TTT discounting analysis of the time series for different C, p settings are shown in
Figures 2 and 3, respectively. Note that by definition a low TTT value corresponds to
high mean fitness of actions across the society. The TTT method clearly demonstrates
a valley in the adaptive landscape. The line running along the bottom of the valley in
Figure 2 indicates, for any given value of p the optimal value for C, and vice versa.
When p = 1 the optimal value of C = 0.38. When C = 1 the optimal value of p is 0.19.
The global optimum is at approximately {C, p} = {0.4, 1.0}.
Insert Figure 2 here.
Insert Figure 3 here.
The 3D graph and contour plot for the PIV discounting analysis of the time series
for different C, p settings are shown in Figure 4 and Figure 5 respectively. The pattern
is very similar to that obtained with the log10 TTT discounting analysis.
Insert Figure 4 here.
Insert Figure 5 here.
These results show that the first hypothesis-that society as a whole can suffer if
either (1) the ratio of creators to imitators is too high, or (2) creators are too
creative-was supported. Both log10 TTT and PIV analysis of the time series showed
that, although some creativity is essential to get the fitness of cultural novelty
increasing over time, more creativity is not necessarily better. For optimal mean fitness
of agents' actions across the society there is a tradeoff between C, the proportion of
creators in the artificial society, and p, how creative these creators are.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
18
Experiment Two: The Effect of Social Regulation
The second experiment tested the hypothesis that society as a whole benefits
when individuals can vary how creative they are in response to the perceived
effectiveness of their ideas. In theory, if effective creators create more, and ineffective
creators create less, the ideas held by society should collectively evolve faster.
Procedure
Social regulation (SR) was implemented by increasing the invention-to-imitation
ratio for agents that generated superior ideas, and decreasing it for agents that
generated inferior ideas. To implement this the computer code was modified as follows.
Each iteration, for each agent, the fitness of its current action relative to the mean
fitness of actions for all agents at the previous iteration was assessed. Thus we obtained
the relative fitness, RF, of its cultural output. The agent's personal probability of
creating, p(C), was modified as a function of RF as follows:
p(C)n = p(C)n−1 × RFn−1
(4)
The probability of imitating, p(I), was 1 - p(C). Thus when SR was on, if the
relative fitness of an agent's ideas was high the agent invented more, and if it was low
the agent imitated more. p(C) was initialized at 0.5 for both SR and non-SR societies.
We compared runs with SR to runs without it. In this set of experiments only simple,
single-step actions were possible.
Results and Discussion
The mean fitness of the cultural outputs of societies with SR (the ability to
self-regulate inventiveness as a function of inventive success) was higher than that of
societies without SR, as shown in Figure 6. Thus, these results show that the second
hypothesis-that a society can perform better if individuals are able to adjust how
creative they are over time in accordance with their perceived creative success-was
also supported. However, the difference between SR and non-SR societies was
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
19
temporary; the gap between them closed once the space of possible ideas had been
explored. In both SR and non-SR societies mean fitness of actions plateaued when all
agents converged on optimally fit ideas. Thus, the value of segregating into creators and
imitators was short-lived.
Insert Figure 6 here.
The diversity, or number of different ideas, exhibited an increase as the space of
possibilities was explored followed by a decrease as agents converged on fit actions, as
shown in Figure 7. This diversity pattern is typical in evolutionary scenarios where
outputs vary in fitness. What is of particular interest here is that this pattern occurred
earlier, and was more pronounced, in societies with SR than in societies without it.
With SR, superior creators were diverging in multiple directions, so making them more
creative did increase diversity, while Inferior creators merely reinvent the wheel, so
decreasing their creativity had little effect on the total number of different outputs.
Insert Figure 7 here.
Although all agents initially invented and imitated with equal frequency, societies
with SR ended up separating into two distinct groups: one that almost exclusively
invented, and one that almost exclusively imitated, as illustrated in Figure 8. Thus, the
effect of SR on the fitness and diversity of outputs can indeed be attributed to
increasingly pronounced individual differences in their degree of creativity over the
course of a run. Agents that generated superior cultural outputs had more opportunity
to do so, while agents that generated inferior cultural outputs became more likely to
propagate proven effective ideas rather than reinvent the wheel.
Insert Figure 8 here.
Experiment Three: Social Regulation with Chaining
The short-lived but encouraging results of experiment two inspired experiment
three, which tested the hypothesis that benefit from this social regulation mechanism
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
20
could be longterm if the space of possible ideas were open-ended. The space of possible
ideas was made open-ended by allowing simple ideas to be combined or "chained"
together into more complex ideas. Thus, over iterations the complexity of inventions
could steadily increase.
Procedure
The fitness function used in the previous experiments was only useful for
single-step actions; once an agent found an optimal cultural output it continued to do
the same thing, so eventually the mean fitness of actions across the society reached a
plateau. In this next experiment, the chaining of simple actions into complex actions
allowed for a potentially infinite variety of actions and no limit on their fitness.
To implement chaining it was necessary to modify the fitness function. We needed
a fitness function that discouraged simply executing the same fit action again and again
(to capture that cultural evolution entails the learning of sequences of different actions),
that included a natural means of determining when a multi-part action would
terminate, and that was conducive to the cultural evolution of actions that build
cumulatively on previously learned or created actions. This was made possible using
templates to constrain the space of allowable sub-actions that together constitute a
complete action, using an adaptation of the Royal Roads fitness function (Forrest &
Mitchell, 1993). Definitions of terms used in the evaluation of the fitness of an action
are provided in Table One.
Insert Table 1 here.
The fitness function was determined by 45 templates. The templates can be
thought of as defining the cultural significance or utility of types of sub-actions (such as
dance steps). Each template T i consists of six components, one for each body part (i.e.,
T i = ti
j; j = 1..6). Each body part can be in a neutral position (0) , up (1), down (-1),
or an unspecified position (*). Six examples of templates are provided in Table Two.
For example, in template T i = ∗, 1,−1,∗,∗, 0, the left arm is up (LA:1), the right arm is
down (RA:-1), the hips are in the neutral position (HP:0), and the positions of other
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
21
body parts is unspecified (HD:*, LL:*, and RL:*). The templates provide constraints,
as well as flexibility with respect to what constitutes a fit action. For example, in an
optimally fit action, the head must be in the neutral position (in T 1 the first component
is 0) but the positions of other body parts can vary).
Insert Table 2 here.
Calculating the fitness of a template. Assume that D is a sub-action (i.e.,
D = dj; j = 1..6) and T i is the ith template (i.e., T i = ti
j; j = 1..6). Thus, dj represents
the position of the jth body part and the value of dj can be either 0 (neutral), 1 (up), or
j can be 0, 1, -1, or * (unspecified). Accordingly, the
-1 (down). Likewise, the value of ti
fitness of sub-action D is obtained as follows:
19X
i=1
F(D) =
Φ(T i, D) × Ω(T i)
(5)
As shown in this equation, fitness is a function of template weight (Φ(T i, D)) and
template order (Ω(T i)).
Φ(T i, D) is a function that determines the weight of sub-action D by comparing it
with template T i. This weight is set to one if each component of the sub-action (i.e.,
dj; j = 1..6) either matches the corresponding component of the template (i.e.,
j; j = 1..6) or if the corresponding components of the template is unspecified (i.e.,
ti
j = ∗), thus:
ti
(1 if ∀ti
j ∈ T i : ti
j = dj or ∗
0
otherwise
Φ(T i, D) =
Ω(T i) computes the order of the template T i by counting the number of
components that have a specified value (i.e., ti
j 6= ∗).
6X
ti
j
Ω(T i) =
j=1,ti
j6=∗
The acceptable sub-actions are {0, 1,−1, 1,−1, 1}, {0, 1,−1, 1,−1,−1},
(6)
(7)
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
22
{0,−1, 1,−1, 1, 1}, and {0,−1, 1,−1, 1,−1}.
The fitness function is difficult to solve because it is rugged; there are multiple
milestones, or fitness peaks, that agents must achieve before reaching a plateau. For
example, in Table 2 we see that the action 0,0,0,0,0,0 has a fitness of 6. An agent may
move on from this action to find an action that fits the third order templates with a
fitness of 31, e.g., F(D) : {1, 1, 1, 1, 1, 0} = 3 + 3 + 3 + 3 + 3 + 3 + 3 + 3 + 3 + 3 + 1 = 31.
Modeling chaining. The chaining algorithm is illustrated schematically in
Figure 9. Chaining gives agents the opportunity to execute multi-step actions, thereby
increasing the potential diversity of actions and making the space of possible actions
open-ended. An agent can keep adding a new sub-action to its current action so long as
the most recently-added sub-action is both novel and successful.
Insert Figure 9 here.
A sub-action D is considered novel if at least one of its components is different
from that of the previous sub-action. This ensures that a multi-part action actually
consisted of multiple parts (rather than a drawn-out execution of the same sub-action).
It is considered successful if there exists a template T i such that Φ(T i, D) is one:
successf ul(D) =
( true
if ∃ T i : Φ(T i, D) = 1
f alse
otherwise
(8)
The "successful" constraint was added to mimic the fact that real human actions such
as gesturing and tool-making are generally highly constrained.
The fitness Fc of a multi-step action with n chained single-step actions (each with
fitness Fn) is calculated as follows:
nX
k=1
Fn
Fc =
(9)
Thus agents could execute multistep actions, and the optimal way of going about any
particular step depended on how one went about the previous step. So long as the
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
23
agent continued to invent acceptable new sub-actions, an action could be arbitrarily
long. In general, the more sub-actions the fitter the action. This is admittedly a simple
way of simulating the capacity for chaining, but we were not interested in the impact of
these actions per se. The goal here was simply to enable create a world in which
improvement is always possible.
Note that since multi-step actions tended to be fitter than single-step actions
there was a bias towards multi-step actions. This was necessary to test the hypothesis
that SR is only advantageous so long as it is possible to obtain fitter outputs than those
currently in use. This aspect of the model seems fairly realistic; new ideas do tend to
build on old ones, and often involve increasingly more steps to achieve their final form,
and these new multi-step ideas are often (though not always) fitter than what came
before.
Results and Discussion
With chaining turned on, cultural outputs became increasingly fit over the course
of a run, as shown in Figure 10. This is because a fit action could always be made fitter
by adding another sub-action. Thus the third hypothesis-that in order for the benefit
of this social regulation mechanism to be ongoing (as opposed to temporary), the space
of possible creative outputs must be open-ended, such that it is always possible for
superior possibilities to be found-was supported.
Insert Figure 10 here.
As was the case without chaining, the diversity of ideas with chaining exhibited an
increase as the space of possibilities was explored, followed by a decrease as agents
converged on fit actions, and once again the peak in diversity is earlier and more
pronounced with SR than without it, as shown in Figure 11. However SR diversity
remains higher than non-SR diversity throughout the run because the agents did not
converge on a static set of actions; their actions changed continuously as they found
new, fitter actions. Moreover, SR runs contain creators that are executing highly
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
24
complex actions, and there are more ways of executing a complex action than a simple
one.
Insert Figure 11 here.
Once again we know that the effects of SR on mean fitness and diversity were due
to the segregation of agents over time into distinct groups: those who almost exclusively
invented and those who almost exclusively imitated, as illustrated in Figure 12. Since
with SR there were increasingly pronounced individual differences in degree of creativity
over the course of a run, the differences between SR and non-SR societies can indeed be
attributed to the fact that the best creators were not wasting iterations trying to
imitate inferior neighbors, they could reach relatively remote and complex ideas more
quickly. Agents that generated superior cultural outputs had more opportunity to do
so, while agents that generated inferior cultural outputs became more likely to
propagate proven effective ideas.
Insert Figure 12 here.
Figure 12 shows that when some agents start to specialize in creating, others start
to specialize in imitating, such that across the society as a whole the balance between
creating and imitating is maintained. Bear in mind that since in all the simulations
reported here the agents are stationary and can only imitate immediate neighbors, it is
not the case that imitators are just imitating themselves. In other words, creators and
imitators are not segregated spatially, and there is transmission between them. Thus
the imitators' efforts are, indirectly, playing a role in the generation of novelty.
Thus, as the balance between creating and imitating gets tilted one way or the
other within individual agents, a new kind of between agents balancing act starts to
unfold, such that both the generation and proliferation of novelty are preserved. These
results support the hypothesis that it is algorithmically possible for social regulation of
individual creativity levels to be a means by which a society balances novelty with
continuity. To our knowledge, this hypothesis has never before been put forward, let
alone tested. The results suggest that it would be fruitful to investigate whether in real
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
25
human societies local exchange of social cues regarding the desirability of creative
efforts has the global effect of balancing novelty with continuity.
General Discussion
The experiments reported here were inspired in part by early work in evolutionary
theory showing that evolution entails a synthesis of processes such as mutation that
generate variants, and processes such as heredity that preserve fit variants (Haldane,
1932). Our results suggest that the generation of cultural novelty through creative
processes is tempered by social learning processes that preserve fit ideas, and that
achieving a delicate balance between the two has benefits for society at large. Although
EVOC agents are highly rudimentary, the model incorporates a drawback of creating: it
incurs costs in terms of time and foregone alternatives. When creative agents invest in
new ideas at the expense of imitating proven ideas they effectively rupture the fabric of
the artificial society by impeding the diffusion of tried-and-true solutions. Imitators, in
contrast, serve as a "cultural memory" that ensure that valuable ideas are preserved.
Experiment One tested the hypothesis that society as a whole can suffer if either
(1) the proportion of creative individuals is too high, or (2) creative individuals are too
creative, by carrying out a set of runs in an ABM that systematically varied the ratio of
creators to imitators, and how creative the creators were. We observed a trade-off
between these two variables, i.e., if there were few creators they could afford to be more
creative, and vice versa, if there were many, their creativity had to be restrained to
exert the same global benefit for society as a whole.
Experiment One has intriguing though speculative implications for hiring
practices in which individuals are expected to work in groups. It suggests that it may
be productive to consider prospective employees in the context of existing team
members and specifically where they stand on the creativity-conformity spectrum. If
there are many creatives, or if they are extremely creative, it may be beneficial to
balance the team with imitators, and vice-versa, to achieve the balance needed to
hasten the cultural evolution of fit outputs.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
26
The results of Experiment One are consistent with a recent study of 155 ceramic
tile companies in Spain, which found preliminary evidence of a saturation point beyond
which excessive creativity interferes with proliferation of valuable designs, and thus
decreases productivity (Vallet-Bellmunt & Molina-Morales, 2015). This study also
found that companies tended to do better if they focused on one of two alternative
strategies: focus on creativity, or focus on centrality, the later of which entails accessing
knowledge from other, related companies. They write, "as both are resource and
time-costly strategies, not only is a combination of them not synergic, but may in fact
become negative for firms' innovation performance." (p. 14) This provides preliminary
evidence that a segregation into creator and imitator strategies need not necessarily
occur at the level of individuals; it may occur at the level of companies, with adaptive
consequences in the real world.
Experiments Two and Three investigated another way in which creativity may be
tempered with conformity: over time, those whose creative efforts are successful might
increase their creativity while those whose creative efforts are unsuccessful might
decrease their creativity, and rely instead on social learning. Experiment Two tested the
hypothesis that a society as a whole can perform better if individuals are able to adjust
how creative they are over time in accordance with their perceived creative success.
When agents that were successful creators created more, and those that were
unsuccessful creators created less (SR), the mean fitness of outputs was higher and the
increase in diversity was more pronounced. Moreover, these results were due to the
segregation of agents over time into two groups-creators and imitators. Thus we
showed that it is possible to increase the mean fitness of ideas in a society by enabling
them to regulate how creative they are.
In Experiment Two the effect of SR on the pace of cultural evolution was
short-lived. Since the space of possibilities was closed, all agents eventually converged
on optimal outputs, and they could not find even better actions through chaining; there
was a ceiling effect. At this point there was no longer any social benefit to having some
members of society be dedicated creators. We hypothesized that this was because the
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
27
agents were limited to a finite set of simple ideas.
In Experiment Three, where the space of possible outputs was open-ended, and
agents could execute multi-step outputs, agents once again segregated into creators and
imitators. However, comparing Figure 6 with Figure 10, we see that there is no longer a
ceiling effect; the difference in fitness between societies with SR and societies without it
now increases throughout the run. Thus, the results support our third hypothesis that
it is possible for the benefit of this social regulation mechanism to be ongoing rather
than temporary, if the space of possible creative outputs is open-ended, such that it
remains possible for fitter possibilities to be found. These findings suggest that it can
be beneficial for a social group if individuals follow different developmental trajectories
in accordance with their demonstrated successes, but only if the space of possible ideas
is such that there are always avenues to explore for new creative ideas.
Although the simplicity of the model must be kept in mind before jumping to
conclusions, the results of Experiments Two and Three are consistent with empirical
findings concerning the value of imitation in collaborative groups, e.g., when people
have access to their peers' solutions, imitation facilitates not just scrounging but the
propagation of good solutions for further cumulative exploration (Wisdom, Song, &
Goldstone, 2013). These results fit in well with evidence compiled by Florida (2002) that
a natural distinction emerges in societies between the conventional workforce and the
creative class. Our results further suggest that this division of labor is adaptive; when
social regulation was in place the society as a whole benefited. The society was able to
capitalize on both the creative abilities of the best creators and the dissemination of fit
cultural outputs by the rest. This is in line with current thinking on the adaptive value
of individual differences in personality across group members (Nettle, 2006).
These results do not prove that in real societies successful creators invent more
and unsuccessful creators invent less; they merely show this kind of regulation of
creativity at the individual level is a feasible means of increasing the mean fitness of
creative outputs of the group as a whole. However, the fact that strong individual
differences in creativity exist (Kaufman, 2003; Wolfradt & Pretz, 2001) suggests that
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
28
this does indeed occur in real societies. The question of whether, and how, social groups
balance creativity with conformity would appear to be a promising area for future
research. Based on the results obtained here, it seems reasonable to hypothesize
that-whether the regulation is prompted by individuals themselves or mediated by
way of social cues-families, organizations, or societies spontaneously self-organize to
achieve a balance between creative processes that generate innovations and the
imitative processes that disseminate these innovations. In other words, they evolve
faster by tempering novelty with continuity.
A more complex version of this scheme is that individuals find a task at which they
excel, such that for each task domain there exists some individual in the social group
who comes to be best equipped to explore that space of possibilities. To explore this in
EVOC would have required an individualized or dynamically changing fitness function.
Elsewhere we have investigated the effect of individualized and dynamically changing
fitness functions on the fitness and diversity of cultural outputs (Gabora, 2008a;
Gabora, Chia, & Firouzi, 2013). Although for the present initial explorations the results
were most easily interpretable with a static fitness function, in future research it would
be interesting to investigate how individualized or dynamic fitness functions affect SR.
In real life, people are faced with numerous different tasks on a daily basis that
are evaluated according to different criteria. Actions that are fit or appropriate for one
purpose (e.g., for making a specific tool) are not necessarily fit for another purpose
(e.g., for expressing agreement). Accordingly, if one examines only one creative task at
a time, a society may appear to perform optimally when the creating is left to a subset
of individuals. However, when one examines multiple creative tasks, the situation may
be more complex; in the extreme, everyone would find a different specialized niche for
their creative output, and be an imitator with respect to other specialized niches.
Experiments with a model that is related to but very different from EVOC suggest that
the capacity for hybrid learning-wherein agents acquire knowledge pertaining to one
environmental dimension through individual learning and knowledge pertaining to
another environmental dimension through imitation-can foster specialization that
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
29
benefits society as a whole (Kharratzadeh, Montrey, Metz, & Shultz, 2015). Since
creative problem solving is a form of individual learning, it seems reasonable to suggest
there may be social benefits when individuals limit creative exploration to one or a few
domains and for other domains rely on social learning. The value of this arrangement
hangs on the extent to which creativity is domain-specific. The evidence here is mixed;
although the capacity for expert-level creative achievement may be predominantly
limited to a single domain (Baer, 1996; Ruscio, Whitney, & Amabile, 1998; Tardif &
Sternberg, 1988), many if not most individuals may be able to experience personally
meaningful and fulfilling creative engagement and express their personal creative style
through multiple domains (Gabora, O'Connor, & Ranjan, 2012; Hocevar, 1976; Plucker,
1998; Ranjan, 2014; Runco, 1987). The optimal distribution of creators and imitators
across different tasks may be therefore be complex, with different individuals tending to
specialize for different tasks, but some individuals exhibiting a generalized tendency
toward creativity and others exhibiting a generalized tendency toward imitation.
It has been suggested that the capacity to merge thoughts and ideas into chains of
association or 'streams of thought' initially emerged approximately 1.7 million years ago
due to increased cranial capacity accompanying the transition from Homo habilis to
Homo erectus (Donald, 1991). The increase in cranial capacity could have allowed for
more fleshed out representations, which in turn allowed for more associative pathways
amongst representations, and greater potential for streams of abstract thought.
Mathematical (Gabora & Aerts, 2009; Gabora & Kitto, 2013) and computational
(Gabora & DiPaola, 2012; Gabora, Chia, & Firouzi, 2013) models support the
feasibility of this scenario. The fact that in the experiments reported here social
regulation of creativity was found to be of lasting value only in societies composed of
agents capable of chaining suggests that there may have been insufficient selective
pressure for social regulation of creativity prior to onset of this capacity. Thus,
individual differences in creativity would be expected to have emerged after this time.
The social practice of discouraging creativity until the individual has proven him-
or herself may serve to ensure that creative efforts are not squandered. Individual
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
30
differences in responsiveness to social cues may ensure that some percentage of society
consists of individuals whose affiliative needs are low, and who therefore feel relatively
free to deviate from social norms and be creative. Those individuals who are most
tuned to social norms and expectations may over time become increasingly concerned
with imitating and cooperating with others in a manner that promotes cultural
continuity. Thus, their thoughts travel more well-worn routes, and they become
increasingly less likely to innovate. Others might be tuned to the demands of creative
tasks, less tethered to social norms and expectations, and therefore more likely to see
things from unconventional perspectives. Thus, they become more likely to come up
with solutions to problems or unexpected challenges, find new avenues for
self-expression, and contribute to the generation of cultural novelty. What Cropley et
al. (2010) refer to as the "dark side of creativity" may to some degree reflect that the
creative individual is tuned to task needs at the expense of human needs; ideas, not
people, are the objects of their nurturing. Although in the long run this benefits the
group as a whole because it results in creative outputs, in the short run the creative
individual may be less likely to obey social norms and live up to social expectations,
and to experience stigmatization or discrimination as a result, particularly in his/her
early years (Craft, 2005; Scott, 1999; Torrance, 1963). Once the merits of such
individuals' creative efforts become known, they may be supported or even idolized.
A limitation of this work is that EVOC in its current implementation does not
accommodate selective or partial imitation. In other words, EVOC does not allow an
agent to imitate some features of an idea and not others. An agent either copies exactly
what a neighbor is doing or ignores that neighbor entirely for that iteration; it cannot
choose bits and pieces that would augment or complement its own current action. Nor
can an agent selectively combine elements of multiple different neighbors' actions at
once. Consequently, imitation, while essential to the rapid spread of superior outputs,
exacerbates convergence on a small set of solutions, i.e., it has a destructive effect on
diversity. We expect that this effect would be reduced in investigations that incorporate
partial imitation. Partial imitation would also be useful for dealing with what in
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
31
biology is referred to as epistasis, wherein what is optimal with respect to one
component depends on what is going on with respect to another. Once both
components have been optimized in a mutually beneficial way (in EVOC, for example,
symmetrical movement of both arms), excess creativity risks breaking up co-adapted
partial solutions. Note that the goal of this paper was not to develop a realistic model
of creativity per se but to investigate social factors in creativity. Nonetheless, in future
studies we plan to increase the sophistication of the mechanisms by which agents create
by incorporating ideas from the psychology of creativity (e.g., Gabora, 2017; Ward,
Smith, & Vaid, 1997) and formal models of individual creativity (e.g., Costello &
Keane, 2000; Dantzig, Raffone, & Hommel, 2011; Thagard & Stewart, 2011).
There are other avenues for future investigation suggested by this work. One is to
study more thoroughly the extent to which these findings are affected by the nature of
the task, or neighborhood network structure (cf. Jacobs, 2000; Liu, Madhavan, &
Sudharshan, 2005). Another avenue for future research is to investigate the impact of
varying the extent to which the generation of novelty is goal-directed versus random.
An early experiment on a predecessor to EVOC (Gabora, 1995) investigated (1) the
effect of turning on or off the ability to learn trends that bias the generation of
subsequent novelty, and (2) the effect of varying the extent to which new ideas deviate
from previous ideas. Both the ability to learn trends and the tendency to use successful
known ideas as a basis for generating new ideas decrease the extent to which generation
is random. The ability to learn trends increased the speed of convergence and decreased
the diversity of ideas. Performance was optimal when, on average, new ideas deviated
from old ones with respect to one component (i.e., movement of one body part
changed). Either increasing or decreasing the extent to which new ideas deviated from
old ones affected the speed of convergence but not the overall pattern of results.
Yet another avenue for future research is to investigate the relative impact of
nature versus nurture. In Experiment Three, the observed individual differences were
completely due to 'nurture' rather than 'nature'. It would be interesting to see how
initializing a run with individual differences in creative ability amongst agents affects
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
32
the pattern of results. It would also be interesting to investigate the impact of
individual differences in agents' responses to assessments of their creative efforts, such
as variation in their responses to positively versus negatively valence assessments. This
would enable us to, for example, model the impact of possible gender differences in the
tendency to decrease creative output in response to negative assessments of one's
creative work, or increase creative output in response to positive assessments. If this is
the case then even if the creative potential of boys and girls is initially equal they may
exhibit gender differences in creativity by the time they reach adulthood.
As mentioned in the introduction, many supposed models of cultural evolution are
actually models of cultural transmission. To demonstrate cultural transmission, as few
as two cultural variants with error-prone copying is sufficient, whereas cultural
evolution entails cumulative, creative, open-ended, adaptive cultural change. This
confusion has led to misleading claims and analyses. Some of these are discussed
elsewhere (Gabora, 2011, 2013); one that has not been discussed concerns Rogers'
(1988) paradox: the finding that when social learning and individual learning strategies
are at equilibrium, social learning does not enhance average individual fitness.
Although much as been made of Rogers' result (see Enquist, Eriksson, & Ghirlanda,
2007; Kameda & Nakanishi, 2003; Kharratzadeh, Montrey, Metz, & Shultz, 2015;
Rendell, Fogarty, & Laland, 2010), his conclusions hinge on the assumption of a
temporally varying environment, for without this there is no benefit in the model to
individual learning. The value of individual learning here lies solely in that it facilitates
the tracking of environmental change because the model does not incorporate creativity.
The supposed paradox yielded by Rogers' model reflects an underlying lack of
understanding of the central role of creativity in individual learning. In the real world,
even if the environment remains basically unchanged, we benefit from finding creative
new ways of conceptualizing and responding to this world. Moreover, the distinction
between social learning and individual learning may not be as fundamental as Rogers'
model assumes to be; for example, it isn't obvious that imitating a peer is
fundamentally different from imitating a cartoon character, or from a beatboxer
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
33
imitating the sounds of instruments, or a dancer imitating the wind. The approach
taken here speaks to the new and important questions and perspectives that can be
addressed when creativity is incorporated into a model of cultural evolution.
Conclusions
While society seems to value creativity in the abstract, social institutions are
often perceived as wielding excessive social pressure to conform, and placing obstacles
to creative self-expression in the paths of creative individuals until they have proven
themselves. The results of the experiments reported here suggest that there is a logic to
these seemingly contradictory messages. Since a proportion of individuals benefit from
creativity without being creative themselves by imitating creators, the rate of cultural
evolution increases when the novelty-generating effects of creativity are tempered with
the novelty-preserving effects of imitation. If there were few creators they could afford
to be more creative, and vice versa; if there were many their creativity had to be
restrained to exert the same global benefit for the society. Excess creativity was
detrimental because creators invested in unproven ideas at the expense of propagating
proven ones.
We also obtained evidence that society can benefit by rewarding and punishing
creativity on the basis of creative success. When each agent regulated its
invention-to-imitation ratio as a function of the fitness of its cultural outputs, they
segregated into creators and imitators, and the mean fitness of cultural outputs was
higher. When the space of possible outputs was fixed, the beneficial effect of social
regulation was temporary. However, making the space of possible outputs open-ended
by enabling agents to chain simple outputs into complex ones, caused the social
regulation induced increase in mean fitness of cultural outputs to be sustained.
Although the model used here is vastly simpler than real societies it enabled us to
manipulate the ratio of creators to imitators and the degree to which creators are
creative in a controlled manner and observe the result. This led to the hypothesis
concerning how creativity is regulated that was explored in experiment two.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
34
Experiment two in turn led to the hypothesis explored in experiment three concerning
the conditions under which the benefits of social regulation of creativity are long term.
The fact that each experiment yielded insights that led to a new hypothesis speaks to
the value of the approach. Although further investigation is needed to establish the
relevance of these results to real societies, we believe they constitute an important step
forward to understand the underlying mechanisms that enable societies to balance
novelty with continuity.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
35
References
Adams, N. (2012). Walden Two: An anticipation of positive psychology? Review of
General Psychology, 16, 1-9.
Aljughaiman, A., & Mowrer-Reynolds, E. (2005). Teachers' conceptions of creativity
and creative students. Journal of Creative Behavior, 39, 17-34.
Amabile, T. (1998). How to kill creativity. Harvard Business Review, Sept.- Oct.,
77-87.
Anderson, M. L., Richardson, M. J. & Chemero, J. (2012). Eroding the boundaries of
cognition: Implications of embodiment. Topics in Cognitive Science, 4, 717-730.
Baer, J. (1996). The effects of task-specific divergent-thinking training. Journal of
Creative Behavior, 30, 183-187.
Bandura, A. (1965). Behavioral modification through modeling procedures. In L.
Krasner & L. P. Ulmann (Eds.), Research in behavior modification: new
development and implications (pp. 310-340). New York: Rinehart and Winston.
Basadur, M. (1995). The power of innovation. New York: Pitman.
Beghetto, R. A. (2007). Ideational code-switching: Walking the talk about supporting
student creativity in the classroom. Roeper Review, 29, 265-270.
Best, M. (1999). How culture can guide evolution: An inquiry into gene/meme
enhancement and opposition. Adaptive Behavior, 132, 289-293.
Bhattacharyya, S., & Ohlsson, S. (2010). Social creativity as a function of agent
cognition and network properties: A computer model. Social Networks, 32,
263-278.
Boyd, R. & Richerson, P. J. (1985). Culture and the evolutionary process. Chicago:
The University of Chicago Press.
Chan, J., & Schunn, C. (2015). The impact of analogies on creative concept
generation: Lessons from an in vivo study in engineering design. Cognitive
Science, 39, 126-155.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
36
Costello, F. J., & Keane, M. T. (2000). Efficient creativity: Constraint guided
conceptual combination, Cognitive Science, 24, 299-4349.
Craft, A. (2005). Creativity in schools: Tensions and dilemmas. London: Routledge.
Cropley, D., Cropley, A., Kaufman, J., & Runco, M. (2010). The dark side of
creativity. Cambridge, UK: Cambridge University Press.
Dantzig, S. V., Raffone, A., & Hommel, B. (2011). Acquiring contextualized concepts:
A connectionist approach. Cognitive Science, 35, 1162-1189.
Dasgupta, S. (1994). Creativity in invention and design. New York: Cambridge
University Press.
Donald, M. (1991). Origins of the modern mind: Three stages in the evolution of
culture and cognition. Cambridge, MA: Harvard University Press.
Dunbar, K. (2000). How scientists think in the real world: Implications for science
education. Journal of Applied Developmental Psychology, 21, 49-58.
Enquist, M., Eriksson, K. & Ghirlanda, S. (2007). Critical social learning?: A solution
to Rogers' paradox of nonadaptive culture. American Anthropologist, 109,
727-734.
Feinstein, J. S. (2006). The nature of creative development. Stanford: Stanford
University Press.
Florida, R. (2002). The rise of the creative class. London: Basic Books.
Forrest, S. & Mitchell, M. (1993). Relative building block fitness and the building
block hypothesis. In L. Whitley (Ed.), Foundations of genetic algorithms. San
Mateo: Morgan Kaufman.
Gabora, L. (1995). Meme and variations: A computational model of cultural
evolution. In L. Nadel & D. Stein (Eds.), 1993 lectures in complex systems.
Reading MA: Addison-Wesley.
Gabora, L. (2008a). EVOC: A computer model of the evolution of culture. In V.
Sloutsky, B. Love & K. McRae (Eds.), Proceedings of the 30th Annual Meeting of
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
37
the Cognitive Science Society (pp. 1466-1471). North Salt Lake, UT: Sheridan
Publishing.
Gabora, L. (2008b). The cultural evolution of socially situated cognition. Cognitive
Systems Research, 9, 104-113.
Gabora, L. (2011). Five clarifications about cultural evolution. Journal of Cognition
and Culture, 11, 61-83.
Gabora, L. (2013). An evolutionary framework for culture: Selectionism versus
communal exchange. Physics of Life Reviews, 10, 117-145.
Gabora, L. (2017). Honing theory: A complex systems framework for creativity.
Nonlinear Dynamics, Psychology, and Life Sciences, 21, 35-88.
Gabora, L. & Aerts, D. (2009). A mathematical model of the emergence of an
integrated worldview. Journal of Mathematical Psychology, 53, 434-451.
Gabora, L., Chia, W., & Firouzi, H. (2013). A computational model of two cognitive
transitions underlying cultural evolution. In M. Knauff, N. Sebanz, Michael
Pauen, & I. Wachsmuth (Eds.), Proceedings of the 35th Annual Meeting of the
Cognitive Science Society (pp. 2344-2349). Austin TX: Cognitive Science Society.
Gabora, L., & DiPaola, S. (2012). How did humans become so creative? In M. L.
Maher, K. Hammond, A. Pease, R. Pèrez, D. Ventura & G. Wiggins (Eds.),
Proceedings of the 3rd International Conference on Computational Creativity (pp.
203-210). Palo Alto, CA: Association for the Advancement of Artificial
Intelligence.
Gabora, L. & Kauffman, S. (2016). Toward an evolutionary-predictive foundation for
creativity. Psychonomic Bulletin & Review, 23, 632-639..
Gabora, L., & Kitto, K. (2013). Concept combination and the origins of complex
cognition. In L. Swan (Ed.), Origins of mind (pp. 361-382). Berlin: Springer.
Gabora, L., O'Connor, B., & Ranjan, A. (2012). The recognizability of individual
creative styles within and across domains. Psychology of Aesthetics, Creativity,
and the Arts, 6, 351-360.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
38
Goldstone, R. L., & Gureckis, T. M. (2009). Collective behavior. Topics in Cognitive
Science, 1, 412-438.
Guardiola, X., Diaz-Guilera, A., Perez, C., Arenas, A., Llas, M. (2002). Modeling
diffusion of innovations in a social network. Physical Review E, 66, 026121.
Haldane, J. B. S. (1932/1990). The causes of evolution. Princeton NJ: Princeton
Science Library.
Henrich, J., & Boyd, R. (2002). On modeling cognition and culture: Why replicators
are not necessary for cultural evolution. Journal of Cognition and Culture, 2,
87-112.
Higgs, P. (2000). The mimetic transition: a simulation study of the evolution of
learning by imitation. Proceedings of the Royal Society B – Biological Sciences,
267, 1355-1361.
Hills, T., Todd, P. M., Lazer, D., Redish, A. D., Couzin, I. D., & the Cognitive Search
Research Group (2015). Exploration versus exploitation in space, mind, and
society. Trends in Cognitive Science, 19, 46-54.
Hinton, G., & Nowlan, S. (1987). How learning can guide evolution. Complex Systems,
267, 495-502.
Hocevar, D. (1976). Dimensionality of creativity. Psychological Reports, 39, 869-870.
Holland, J. (1975). Adaptation in natural and artificial systems. Ann Arbor:
University of Michigan Press.
Hunter, S. T., Thoroughgood, C. N., Myer, A. T., & Ligon, G. S. (2011). Paradoxes of
leading innovative endeavors: Summary, solutions, and future directions.
Psychology of Aesthetics, Creativity, and the Arts, 5, 54-66.
Hutchins, E., & Hazelhurst, B. (1991). Learning in the cultural process. In C.
Langton, J. Taylor, D. Farmer, & S. Rasmussen (Eds.), Artificial life II. Redwood
City: Addison-Wesley.
Iribarren J. L., & Moro, E. (2011). Affinity paths and information diffusion in social
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
39
networks. Social Networks 33, 134-142.
Jackson, M., Yariv, L., (2005). Diffusion on social networks. Economie Publique, 16,
3-16.
Jacobs, J. (2000). The nature of economies. New York: The Modern Library.
Kameda, T., & Nakanishi, D. (2003). Does social/cultural learning increase human
adaptability? Rogers' question revisited. Evolution and Human Behavior, 24,
242-260.
Kaufman, J. C. (2003). The cost of the muse: Poets die young. Death Studies, 27,
813-822.
Kaufman, J. C. & Beghetto, R. A. (2014). Creativity in schools: Renewed interest and
promising new directions. In Gilman, R., Huebner, E. S., & Furlong, M. J. (Eds.).
Handbook of positive psychology in schools (2nd Ed.) (pp. 165-175). New York:
Routledge.
Kharratzadeh, M., Montrey, M., Metz, A. & Shultz, T. (2015). Resolving Rogers'
paradox with specialized hybrid learners. In R. Dale, C. Jennings, P. Maglio, T.
Matlock, D. Noelle, A. Warlaumont & J. Yashimi (Eds.), Proceedings of the 37th
Annual Meeting of the Cognitive Science Society (pp. 1069-1074). Austin TX:
Cognitive Science Society.
Legare, C. H., Wen, N. J., Herrmann, P. A., & Whitehouse, H. (2015). Imitative
flexibility and the development of cultural learning. Cognition, 142, 351-361.
Leijnen, S., & Gabora, L. (2009a). The artist loft effect in the clustering of creative
types: A computer simulation. In N. Bryans-Kins (Ed.), Proceedings of 7th
Conference on Creativity and Cognition (pp. 389-390). New York: Association for
Computing Machinery Press.
Leijnen, S. & Gabora, L. (2009b). The tradeoff between degree of creativity and
number of creators in a computational model of society. In B. Cooper & V. Danos
(Eds.), Proceedings of the First International Conference on Developments in
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
40
Computational Models from Nature (pp. 108-119). Sydney: Electronic
Proceedings in Theoretical Computer Science.
Liu, B. S.C., Madhavan, R., & Sudharshan, D., (2005). Diffunet: The impact of
network structure on diffusion of innovation. European Journal of Innovation
Management 8, 240-262.
Ludwig, A. (1995). The price of greatness. New York: Guilford Press.
Maslow, A. (1959). Creativity in self-actualizing people. In H. Anderson (Ed.),
Creativity and its cultivation. New York: McGraw-Hill.
May, R. (1975). The courage to create. New York: Bantam.
McDonald, R., & Siegel, D. (1986). The value of waiting to invest. The Quarterly
Journal of Economics, 101, 707-727.
Mesoudi, A., Whiten, A. & Laland, K. N. (2006). Towards a unified science of cultural
evolution. Behavioral and Brain Sciences, 29, 329-383.
Mithen S. 1998. Creativity in human evolution and prehistory. Abingdon-on-Thames:
Routledge.
Mumford, M. D., & Hunter, S. T. (2005). Innovation in organizations: A multi-level
perspective on creativity. In F. J. Yammarino & F. Dansereau (Eds.), Research in
multi-level issues (Vol. IV, pp. 11-74). Oxford, UK: Elsevier.
Nettle, D. (2006). The evolution of personality variation in humans and other animals.
American Psychologist, 61, 622-631.
Niazi, M. & Hussain, A. (2011). Agent-based computing from multi-agent systems to
agent-based models: A visual survey. Scientometrics, 89, 479–499.
Nooteboom, B., W. Van Haverbeke, G. Duysters, V. Gilsing, & A. Van den Oord
(2007). Optimal cognitive distance and absorptive capacity. Research Policy, 36,
1016-1034.
Plucker, J. A. (1998). Beware of simple conclusions: The case for the content
generality of creativity. Creativity Research Journal, 11, 179-182.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
41
Plucker, J. A., Beghetto, R. A., & Dow, G. T. (2004). Why is not creativity more
important to educational psychologists? Potentials, pitfalls, and future directions
in creativity research.Educational Psychologist, 39, 83-96.
Ranjan, A. (2014).Understanding the creative process: Personal signatures and
cross-domain interpretations of ideas. (Doctoral dissertation). University of
British Columbia, Canada.
Reiter-Palmon, R., & Illies, J. J. (2004). Leadership and creativity: Understanding
leadership from a creative problem-solving perspective. Leadership Quarterly, 15,
55-77.
Rendell, L., Fogarty, L., & Laland, K. N. (2010). Rogers' paradox recast and resolved:
population structure and the evolution of social learning strategies. Evolution, 64,
534-48.
Robinson, K. (2001). Out of our minds: Learning to be creative. New York: Capstone.
Rogers, A. R. (1988). Does biology constrain culture? American Anthropologist, 90,
819-831.
Rogers, C. (1959). Toward a theory of creativity. In H. Anderson (Ed.) Creativity and
its cultivation. New York: Harper & Row.
Rule, E. G., & Irwin, D. W. (1988). Fostering intrapreneurship: The new competitive
edge. The Journal of Business Strategy 9, 44-47.
Runco, M. A. (1987). The generality of creative performance in gifted and nongifted
children. Gifted Child Quarterly, 331, 121-125.
Rumelhart, D.E., McClelland, J. L., and the PDP Research Group (Eds.). (1986).
Parallel distributed processing. Cambridge MA: Bradford/MIT Press.
Ruscio, J., Whitney, D. M., & Amabile, T. M (1998). The fishbowl of creativity.
Creativity Research Journal, 11, 243-263.
Scott, C. (1999). Teachers' biases toward creative children. Creativity Research
Journal, 12, 321-337.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
42
Simonton, D. K. (20002). Creativity. In D. R. Snyder & S. J. Lopez (Eds.) Handbook
of positive psychology (pp. 189-201). New York: Oxford University Press.
Snyder, H., Gregerson, M., & Kaufman, J. (Eds.). (2012). Teaching creatively. New
York: Springer.
Sosa, R., & Connor, A. M. (2015). A computational intuition pump to examine group
creativity: building on the ideas of others. Proceedings of the 2015 IASDR
Conference: Interplay 2015.
Spencer, G. M. (2012). Creative economies of scale: An agent-based model of
creativity and agglomeration. Journal of Economic Geography, 12(1), 247-271.
Stokols, D., Clitheroe, C., & Zmuidzinaz, M. (2002). Qualities of work environments
that promote perceived support for creativity. Creative Research Journal, 14(2),
137-147.
Sulloway, F. (1996). Born to rebel. New York: Pantheon.
Tardif, T. Z., & Sternberg, R. J. (1988). What do we know about creativity? In R. J.
Sternberg (Ed.), The nature of creativity: contemporary psychological perspectives
(pp. 429-440). Cambridge UK: Cambridge University Press.
Thagard, P., & Stewart, T. C. (2011). The AHA! experience: Creativity through
emergent binding in neural networks.Cognitive Science, 35(1), 1-33.
Tomasello, M., Kruger, A., & Ratner, H. (1993). Cultural learning. Behavioral and
Brain Sciences, 16(03), 495-552.
Tomlinson, R. (1980). A systems approach to planning in organizations: Developing a
collaborative research study. Cybernetics and Systems 11, 355-367.
Torrance, E. (1963). Guiding creative talent. Englewood Cliffs, NJ: Prentice-Hall.
Vallet-Bellmunt, T. & Molina-Morales, F. (2015). Be creative but not so much.
Decreasing benefits of creativity in clustered firms. Entrepreneurship & Regional
Development,27, 1-27.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
43
Ward, T. B., Smith, S. M., & Vaid, J., (Eds.). (1997). Creative thought: An
investigation of conceptual structures and processes. Washington, DC: APA Books.
Watson-Jones, R. E., Legare, C. H., Whitehouse, H., & Clegg, J. M. (2014).
Task-specific effects of ostracism on imitative fidelity in early childhood. Evolution
& Human Behavior, 35, 204-210.
Watts, C., & Gilbert, N. (2014). Simulating innovation: Computer-based tools for
rethinking innovation. Cheltenham UK: Edward Elgar Publishing.
Weitzman, M. L. (1998). Recombinant growth. Quarterly Journal of Economics, 113,
331-360.
Westby, E. L., & Dawson, V. L. (1995). Creativity: Asset of burden in the classroom?
Creativity Research Journal, 8, 1-11.
Wisdom, T. N., Song, X., & Goldstone, R. L. (2013). Social learning strategies in
networked groups. Cognitive Science, 37, 1383-1425.
Wolfradt, U., & Pretz, J. (2001). Individual differences in creativity: Personality, story
writing, and hobbies. European Journal of Personality, 15, 297-310.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
44
Appendix: Training the Network
To train the network, the activation of nodes is updated as follows. The relevant
variables are:
aj = activation of j
tj = jth component of input
wij = weight on link from i to j
β = 0.15
θ = 0.5
(1 + e−β[P wij ai+θ])
1
aj =
(10)
For the movement node, we use the absolute value of ai (since negative movement
is not possible; the least you can move is to not move at all). The comparison between
input and output involves computing an error term, which is used to modify the pattern
of connectivity in the network such that its responses become more correct. For
input/output units the error term is computed as follows:
δj = (tj − aj)aj(1 − aj)
For hidden units the error term is computed as follows:
δi = aj(1 − aj)X
δjwij
(11)
(12)
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
45
Table 1
Definitions used in the evaluation of chained actions.
Term
Body Part
Sub-action
Action
Template
Definition
Component of agent other
than neural network.
Set of six components that
indicates position of 6 body
parts. Each can be in a
neutral (0), up (1), or down
(-1) position.
One or more sequential
sub-actions.
Abstract or prototypical
format for a sub-action.
Position of a body part can
be unspecified (*).
Example
Left Arm (LA)
{HD:0, LA:1, RA:-1, LL:1,
RL:0, HP:-1; This
sub-action is abbreviated
01-110-1}
{{01001-1}, {-10-1-111}}
{HD:0, LA:*, RA:1, LL:*,
RL:1, HP:-1}
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
46
Table 2
A partial set of the templates used in the first fitness function
T 1 = {0,∗,∗,∗,∗,∗}
T 2 = {∗, 0,∗,∗,∗,∗}
T 3 = {∗,∗, 0,∗,∗,∗}
T 24 = {1,∗,∗, 1, 1,∗}
T 25 = {1,∗, 1,∗, 1,∗}
T 26 = {1,∗, 1, 1,∗,∗}
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
47
Figure 1. The core of an agent is an auto-associative neural network composed of six
input nodes and six corresponding output nodes that represent concepts of body parts
(LEFT ARM, RIGHT ARM, LEFT LEG, RIGHT LEG, HEAD, and HIPS), and seven
hidden nodes that represent more abstract concepts (LEFT, RIGHT, ARM, LEG,
SYMMETRY, MOVEMENT and OPPOSITE). Input nodes and output nodes are
connected to hidden nodes of which they are instances (e.g. RIGHT ARM is connected
to RIGHT.) The hidden nodes are used to bias invention using learned trends about
what constitutes a fit action.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
48
Figure 2. 3D graph of the log10 Time-to-Threshold (TTT) landscape of the average
mean fitness for different values of C and p, with τ = 9. The valley in the fitness
landscape indicates that the optimal values of C and p for the society as a whole are
less than their maximum values for most C, p settings.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
49
Figure 3. Top-view contour plot of the log10 Time-to-Threshold (TTT) landscape of the
average mean fitness for different values of C and p, with τ = 9. The line, obtained by
visually extrapolating over minimum values C and p, indicates the set of optima.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
50
Figure 4. 3D graph of the Present Innovation Value (PIV) landscape of the average
mean fitness for different values of C and p. Since the x axis has been inverted to aid
visibility of the adaptive landscape, the valley again indicates that the optimal values of
C and p for the society as a whole are less than their maximum values for most C, p
settings.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
51
Figure 5. Top-view contour plot of the Present Innovation Value (PIV) landscape of
average mean fitness for different values of C and p. The line, obtained by visually
extrapolating over maximum values C and p, indicates the set of optima.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
52
Figure 6. This graph plots the mean fitness of implemented actions across all agents
over the duration of the run, with and without social regulation.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
53
Figure 7. This graph plots the mean diversity of implemented actions across all agents
over the duration of the run, with and without social regulation.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
54
Figure 8. This graph plots the fitness of actions obtained through invention on the y
axis and through imitation on the x axis. Fitness values are given as a proportion of the
fitness of an optimally fit action. The curved line is a pareto frontier because it consists
of different optimal allocations of actions, ranging from always inventing optimally
(upper left end of curve), to always implementing an optimal action obtained through
imitation (bottom right end of curve), as well as strategies involving a mixture of
inventing and imitating (all other points along the curve). Points to the left of this
curve indicate strategies that involve the execution of suboptimal actions. Each small
red circle shows the mean fitness of an agent's actions obtained through invention and
imitation averaged across ten iterations: iterations 1 to 10 in the top graph, 25 to 35 in
the middle graph, and 90 to 100 in the bottom graph. Since by iteration 90 all values
were piled up in two spots-the upper left and the bottom right-they are indicated by
large red circles at these locations.
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
55
Figure 9. Schematic illustration of the process by which an agent determines what
action it will implement in the next iteration without chaining (above) and with
chaining (below).
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
56
Figure 10. This graph plots the mean fitness of actions across all agents over the course
of the run with chaining turned on, with and without social regulation (SR).
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
57
Figure 11. This graph plots the mean diversity of implemented actions across all agents
over the course of the run with chaining, with and without social regulation (SR).
SOCIAL BENEFITS BALANCING CREATIVITY IMITATION
58
Figure 12. At the beginning of the run (top) all agents created and imitated with equal
probability. Midway through the run their p(C) values were distributed along the range
of values from 0 to 1. By the end of the run (bottom) they had segregated into
imitators (with p(C) from 0 to 0.1) and creators (with p(C) from 0.9 to 1).
|
1211.6039 | 2 | 1211 | 2012-11-27T05:15:55 | Rendezvous of two robots with visible bits | [
"cs.MA",
"cs.CG",
"cs.RO"
] | We study the rendezvous problem for two robots moving in the plane (or on a line). Robots are autonomous, anonymous, oblivious, and carry colored lights that are visible to both. We consider deterministic distributed algorithms in which robots do not use distance information, but try to reduce (or increase) their distance by a constant factor, depending on their lights' colors.
We give a complete characterization of the number of colors that are necessary to solve the rendezvous problem in every possible model, ranging from fully synchronous to semi-synchronous to asynchronous, rigid and non-rigid, with preset or arbitrary initial configuration.
In particular, we show that three colors are sufficient in the non-rigid asynchronous model with arbitrary initial configuration. In contrast, two colors are insufficient in the rigid asynchronous model with arbitrary initial configuration and in the non-rigid asynchronous model with preset initial configuration.
Additionally, if the robots are able to distinguish between zero and non-zero distances, we show how they can solve rendezvous and detect termination using only three colors, even in the non-rigid asynchronous model with arbitrary initial configuration. | cs.MA | cs |
Rendezvous of two robots with visible bits
Giovanni Viglietta
[email protected]
November 7, 2018
Abstract
We study the rendezvous problem for two robots moving in the
plane (or on a line). Robots are autonomous, anonymous, oblivious,
and carry colored lights that are visible to both. We consider deter-
ministic distributed algorithms in which robots do not use distance
information, but try to reduce (or increase) their distance by a con-
stant factor, depending on their lights' colors.
We give a complete characterization of the number of colors that
are necessary to solve the rendezvous problem in every possible model,
ranging from fully synchronous to semi-synchronous to asynchronous,
rigid and non-rigid, with preset or arbitrary initial configuration.
In particular, we show that three colors are sufficient in the non-
rigid asynchronous model with arbitrary initial configuration. In con-
trast, two colors are insufficient in the rigid asynchronous model with
arbitrary initial configuration and in the non-rigid asynchronous model
with preset initial configuration.
Additionally, if the robots are able to distinguish between zero and
non-zero distances, we show how they can solve rendezvous and detect
termination using only three colors, even in the non-rigid asynchronous
model with arbitrary initial configuration.
1
Introduction
1.1 Models for mobile robots
The basic robot model we employ has been thoroughly described in [1, 2, 3,
4]. Robots are modeled as points freely moving in R2 (or R). Each robot
has its own coordinate system and its own unit distance, which may differ
from the others. Robots operate in cycles that consist of four phases: Wait,
Look, Compute, and Move.
In a Wait phase a robot is idle; in a Look phase it gets a snapshot of its
surroundings (including the positions of the other robots); in a Compute
phase it computes a destination point; in a Move phase it moves toward
the destination point it just computed, along a straight line. Then the cycle
repeats over and over.
1
Robots are anonymous and oblivious, meaning that they do not have
distinct identities, they all execute the same algorithm in each Compute
phase, and the only input to such algorithm is the snapshot coming from
the previous Look phase.
In a Move phase, a robot may actually reach its destination, or it may
be stopped before reaching it. If a robot always reaches its destination by
the end of each Move phase, then the model is said to be rigid. If a robot
can unpredictably be stopped before, the model is non-rigid. However, even
in non-rigid models, during a Move phase, a robot must always be found
on the line segment between its starting point and the destination point.
Moreover, there is a constant distance δ > 0 that a robot is guaranteed to
walk at each cycle. That is, if the destination point that a robot computes is
at most δ away (referred to some global coordinate system), then the robot
is guaranteed to reach it by the end of the next Move phase. On the other
hand, if the destination point is more than δ away, the robot is guaranteed
to approach it by at least δ.
In the basic model, robots cannot communicate in conventional ways or
store explicit information, but a later addition to this model allows each
robot to carry a "colored light" that is visible to every robot (refer to [2]).
There is a fixed amount of possible light colors, and a robot can compute
its destination and turn its own light to a different color during a Compute
phase, based on the light colors that it sees on other robots and on itself.
Usually, when robots start their execution, they have all their lights set to
a predetermined color. However, we are also interested in algorithms that
work regardless of the initial color configurations of the robots.
In the fully synchronous model (FSynch) all robots share a common
notion of time, and all their phases are executed synchronously. The semi-
synchronous model (SSynch) is similar, but not every robot may be active
at every cycle. That is, some robots are allowed to "skip" a cycle at unpre-
dictable times, by extending their Wait phase to the whole cycle. However,
the robots that are active at a certain cycle still execute it synchronously.
Also, no robot can remain inactive for infinitely many consecutive cycles.
Finally, in the asynchronous model (ASynch) there is no common notion of
time, and each robot's execution phase may last any amount of time, from
a minimum > 0 to an unboundedly long, but finite, time.
Figure 1 shows all the possible models arising from combining syn-
chronousness, rigidity, and arbitrarity of the initial light colors. The trivial
inclusions between models are also shown.
Without loss of generality, in this paper we will assume Look phases
in ASynch to be instantaneous, and we will assume that a robot's light's
color may change only at the very end of a Compute phase.
2
Figure 1: Robot models with their trivial inclusions. An asterisk means that
the initial color configuration may be arbitrary; no asterisk means that it is
fixed. The numbers indicate the minimum amounts of distinct colors that
are necessary to solve Rendezvous in each model (cf. Theorem 5.1).
1.2 Gathering mobile robots
Gathering is the problem of making a finite set of robots in the plane
reach the same location in a finite amount of time, and stay there forever,
regardless of their initial positions. Such location should not be given as
input to the robots, but they must implicitly determine it, agree on it, and
reach it, in a distribute manner. Note that this problem is different from
Convergence, in which robots only have to approach a common location,
but may never actually reach it.
For any set of more than two robots, Gathering has been solved in
non-rigid ASynch, without using colored lights (see [1]). The special case
with only two robots is also called Rendezvous, and it is easily seen to
be solvable in non-rigid FSynch but unsolvable in rigid SSynch, if colored
lights are not used (see [5]).
Proposition 1.1. If only one color is available, Rendezvous is solvable
in non-rigid FSynch and unsolvable in rigid SSynch.
Proof. In non-rigid FSynch, consider the algorithm that makes each robot
move to the midpoint of the current robots' positions. At each move, the
distance between the two robots is reduced by at least 2δ, until it becomes
less than 2δ, and the robots gather.
Suppose that an algorithm exists that solves Rendezvous in rigid SSynch
by using just one color. Let us assume that the two robots' axes are oriented
3
FSynchrigidSSynchrigidFSynchnon-rigidSSynchnon-rigidASynchrigidASynchnon-rigidFSynchrigidSSynchrigidFSynchnon-rigidSSynchnon-rigidASynchrigidASynchnon-rigid(1)(2)(2)(1)(2)(3)(1)(2)(3)(1)(2)(3)∗∗∗∗∗∗symmetrically, in opposite directions. This implies that, if we activate both
robots at each cycle, they obtain isometric snapshots, and thus they make
moves that are symmetric with respect to their current midpoint. Therefore,
by doing so, the robots can never meet unless they compute the midpoint.
If they do it, we just activate one robot for that cycle (and each time this
happens, we pick a different robot, alternating). As a result, the robots
♥
never meet, regardless of the algorithm.
However, in [2] it was shown how Rendezvous can be solved even in
non-rigid ASynch using lights of four different colors, and starting from a
preset configuration of colors. Optimizing the amount of colors was left as
an open problem.
1.3 Our contribution
In this paper, we will determine the minimum number of colors required to
solve Rendezvous in all models shown in Figure 1, with some restrictions
on the class of available algorithms.
Recall that robots do not necessarily share a global coordinate system,
but each robot has its own. If the coordinate system of a robot is not even
self-consistent (i.e., it can unpredictably change from one cycle to another),
then the only reliable reference for each robot is the position of the other
robot(s) around it. In this case, the only type of move that is consistent
will all possible coordinate systems is moving to a linear combination of the
robots' positions, whose coefficients may depend on the colored lights. In
particular, when the robots are only two, we assume that each robot may
only compute a destination point of the form
(1 − λ) · me.position + λ · other.position,
for some λ ∈ R. In turns, λ is a function of me.light and other.light only.
This class of algorithms will be denoted by L.
In Section 2, we will prove that two colors are sufficient to solve Ren-
dezvous in non-rigid SSynch with arbitrary initial configuration and in
rigid ASynch with preset initial configuration, whereas three colors are
sufficient in non-rigid ASynch with arbitrary initial configuration. All the
algorithms presented are of class L.
On the other hand, in Section 3 we show that even termination detection
can be achieved in non-rigid ASynch with arbitrary initial configuration
using only three colors, although our algorithm is not of class L (indeed, no
algorithm of class L can detect termination in Rendezvous).
In contrast, in Section 4 we prove that no algorithm of class L using only
two colors can solve Rendezvous in rigid ASynch with arbitrary initial
configuration or in non-rigid ASynch with preset initial configuration.
4
Finally, in Section 5 we put all these results together and we conclude
with a complete characterization of the minimum amount of colors that are
needed to solve Rendezvous in every model (see Theorem 5.1).
2 Algorithms for rendezvous
2.1 Two colors for the non-rigid semi-synchronous model
For non-rigid SSynch, we propose Algorithm 1, also represented in Figure 2.
Labels on arrows indicate the color that is seen on the other robot, and the
destination of the next Move with respect to the position of the other robot.
"0" stands for "do not move", "1/2" means "move to the midpoint", and "1"
means "move to the other robot". The colors used are only two, namely A
and B.
Algorithm 1: Rendezvous for non-rigid SSynch and rigid ASynch
me.destination ←− me.position
if me.light = A then
me.light ←− B
me.destination ←− (me.position + other.position)/2
if other.light = A then
else
me.destination ←− other.position
else if other.light = B then
me.light ←− A
Figure 2: Illustration of Algorithm 1
Lemma 2.1. If the two robots start a cycle with their lights set to opposite
colors, they eventually gather.
Proof. Both robots retain their colors at every cycle, and the A-robot keeps
computing the other robot's location, while the B-robot keeps waiting.
Hence, their distance decreases by at least δ for every cycle in which the
5
ABA, / B, 1B, 0A, 012A-robot is active, until the distance becomes smaller than δ, and the robots
♥
gather.
Theorem 2.2. Algorithm 1 solves Rendezvous in non-rigid SSynch, re-
gardless of the colors in the initial configuration.
Proof. If the robots start in opposite colors, they gather by Lemma 2.1. If
they start in the same color, they keep alternating colors until one robot is
active and one is not. If this happens, they gather by Lemma 2.1. Otherwise,
the two robots are either both active or both inactive at each cycle, and
they keep computing the midpoint every other active cycle. Their distance
decreases by at least 2δ each time they move, until it becomes smaller than
♥
2δ, and they finally gather.
2.2 Two colors for the rigid asynchronous model
We prove that Algorithm 1 solves Rendezvous in rigid ASynch as well,
provided that the initial color is A for both robots.
Lemma 2.3. If, at some time t, the two robots have opposite colors and
neither of them is in a Compute phase that will change its color, they will
eventually solve Rendezvous.
Proof. Each robot retains its color at every cycle after time t, because it
keeps seeing the other robot in the opposite color at every Look phase. As
soon as the A-robot performs its first Look after time t, it starts chasing
the other robot. On the other hand, as soon as the B-robot performs its first
Look after time t, it stops forever. Eventually, the two robots will gather
♥
and never move again.
Theorem 2.4. Algorithm 1 solves Rendezvous in rigid ASynch, provided
that both robots start with their lights set to A.
Proof. Let r be the first robot to perform a Look. Then r sees the other
robot s set to A, and hence it turns B and computes the midpoint m.
Then, as long as s does not perform its first Look, r stays B because it
keeps seeing s set to A. Hence, if s performs its first Look after r has turned
B, Lemma 2.3 applies, and the robots will solve Rendezvous.
On the other hand, if s performs its first Look when r is still set to A
(hence still in its starting location), s will turn B and compute the midpoint
m, as well. If some robot reaches m and performs a Look while the other
robot is still set to A, the first robot waits until the other turns B. Without
loss of generality, let r be the first robot to perform a Look while the other
robot is set to B. This must happen when r is in m and set to B, hence
it will turn A and stay in m. If r turns A before s has reached m, then
Lemma 2.3 applies. Otherwise, r turns A when s is already in m, and both
6
robots will stay in m forever, as they will see the other robot in m at every
♥
Look.
2.3 Three colors for the non-rigid asynchronous model
For non-rigid ASynch, we propose Algorithm 2, also represented in Fig-
ure 3. The colors used are three, namely A, B, and C.
Algorithm 2: Rendezvous for non-rigid ASynch
me.destination ←− me.position
if me.light = A then
me.light ←− B
me.destination ←− (me.position + other.position)/2
if other.light = A then
else if other.light = B then
me.destination ←− other.position
else if me.light = B then
if other.light = B then
me.light ←− C
else if other.light = C then
me.destination ←− other.position
else
if other.light = C then
me.light ←− A
else if other.light = A then
me.destination ←− other.position
Observation 2.5. A robot retains its color if and only if it sees the other
robot set to a different color.
Lemma 2.6. If, at some time t, the two robots are set to different colors,
and neither of them is in a Compute phase that will change its color, they
will eventually solve Rendezvous.
Proof. The two robots keep seeing each other set to different colors, and
hence they never change color, by Observation 2.5. One of the two robots
will eventually stay still, and the other robot will then approach it by at
least δ at every Move phase, until their distance is less than δ, and they
gather. As soon as they have gathered, they will stay in place forever. ♥
Theorem 2.7. Algorithm 2 solves Rendezvous in non-rigid ASynch,
regardless of the colors in the initial configuration.
7
Figure 3: Illustration of Algorithm 2
Proof. If the robots start the execution at different colors, they solve Ren-
dezvous by Lemma 2.6.
If they both start in A, then let r be the first robot to perform a Look.
r plans to turn B and move to the midpoint. If it turns B before the other
robot s has performed a Look, then Lemma 2.6 applies.
Otherwise, s plans to turn B and move to the midpoint, as well. If a
robot stops and sees the other robot still set to A, it waits. Without loss of
generality, let r be the first robot to perform a Look and see the other robot
set to B. r now plans to turn C, but if it does so before s has performed a
Look, Lemma 2.6 applies.
So, let us assume that both robots have seen each other in B and they
both plan to turn C. Once again, if a robot turns C and sees the other
robot still in B, it waits. Without loss of generality, let r be the first robot
to see the other robot in C. r plans to turn A, but if it does so before s has
performed a Look, Lemma 2.6 applies.
Assume that both robots see each other in C and they both plan to
turn A. If a robot turns A and sees the other robot still in C, it waits. At
some point, both robots are in A again, in a Wait phase, but they have
approached each other. They both moved toward the midpoint in their
first cycle, and then they just made null moves. As a consequence, if their
distance was smaller than 2δ, they have gathered. Otherwise, the distance
has decreased by at least 2δ. As the execution goes on and the same pattern
of transitions repeats, the distance keeps decreasing until the robots gather.
As soon as they have gathered, they never move again, hence Rendezvous
is solved.
The cases in which the robots start both in B or both in C are resolved
with the same reasoning. Note that all the states with both robots set to the
same color and in a Wait phase have been reached in the analysis above. ♥
8
ABCA, / B, 0B, 112C, 0C, 0A, 0C, 1B, 0A, 13 Termination detection
Suppose we wanted our robots to acknowledge that they have gathered, in
order to turn off, or "switch gears" and start performing a new task.
Observation 3.1. If the model is SSynch, termination detection is triv-
ially obtained by checking at each cycle if the robots' locations coincide.
Unfortunately, in ASynch, correct termination detection is harder to
obtain. Observe that both Algorithm 1 (for rigid ASynch) and Algorithm 2
(for non-rigid ASynch) fail to guarantee termination detection.
Indeed,
suppose that robot r is set to A and sees the other robot s set to B, and
that the two robots coincide. Then r cannot tell if s is still moving or not.
If s is not moving, it is safe for r to terminate, but if s is moving, then r
has still to "chase" s, and cannot terminate yet.
To guarantee correct termination detection in non-rigid ASynch, we
propose Algorithm 3, also represented in Figure 4. Note that different rules
may apply depending on the distance between the two robots, indicated by
d in the picture. However, robots need only distinguish between zero and
non-zero distances. The colors used are again three, namely A, B, and C.
Figure 4: Illustration of Algorithm 3
Observation 3.2. No robot can move while it is set to C.
Lemma 3.3. If some robot ever turns C from a different color, the two
robots will gather and their execution will terminate correctly.
Proof. A robot can turn C only if it performs a Look while the other robot
is in the same location. If robot r performs a Look at time t that makes it
turn C, then r stays C forever after, unless it sees the other robot s set to C
9
ABC(d>0) A, / B, 0(d>0) A, 0(d>0) C, 1B, 1(d>0) C, 1(d>0) C, 0(d=0) A, 0(d=0) C, 0(d=0) A, 0(d=0) C, 0A, 0B, 0(d=0) C, term.12Algorithm 3: Rendezvous for non-rigid ASynch with termination
me.destination ←− me.position
if me.light = A then
if other.position (cid:54)= me.position then
if other.light = A then
me.light ←− B
me.destination ←− (other.position + me.position)/2
else
me.light ←− C
else if other.light = B then
me.destination ←− other.position
else if other.position (cid:54)= me.position then
me.destination ←− other.position
else
me.light ←− C
else if me.light = B then
if other.light = A and other.position = me.position then
me.light ←− C
else if other.light = B then
me.light ←− A
else if other.position (cid:54)= me.position then
me.destination ←− other.position
else
me.light ←− C
else if other.light = C then
if other.position (cid:54)= me.position then
me.light ←− A
else
terminate
10
as well, in a different location. Let t(cid:48) > t be the first time this happens. Due
to Observation 3.2, r does not move between t and t(cid:48). On the other hand,
s coincides with r at time t. Then s must turn some other color and move
away from r, and then turn C at some time t(cid:48)(cid:48) such that t < t(cid:48)(cid:48) (cid:54) t(cid:48). But, in
order to turn C, s would have to coincide with r, which is a contradiction.
Hence r will stay C and never move after time t. As soon as s sees r
set to C, it starts moving toward it (after turning A, if s is also set to C
and not coincident with r), covering at least δ at each Move phase, until
their distance becomes less than δ and s finally reaches r. Then s will turn
C as well, and both robots will terminate correctly after seeing each other
♥
again.
Lemma 3.4. If, at some time t, the two robots are set to A and B respec-
tively, and neither of them is in a Compute phase that will change its color,
they will eventually gather and terminate correctly.
Proof. If some robot ever turns C after time t, gathering and termination
are ensured by Lemma 3.3. Otherwise, the two robots keep seeing each other
set to opposite colors, and hence they never change color. The B-robot will
eventually stay still, and the A-robot will then approach it by at least δ at
every Move phase, until their distance is less than δ, and they gather. The
♥
B-robot then turns C, and Lemma 3.3 applies again.
Let r(t) denote the position of robot r at time t (cid:62) 0.
Lemma 3.5. Let t be a time instant at which both robots are set to A, and
neither of them is in a Compute phase. Let us assume that robot r will
stay still until the end of its current phase (even if it is a Move phase),
and that robot s will either stay still until the end of its current phase, or
its destination point is r's current location. Then r and s will eventually
gather and terminate correctly.
Proof. If s is not directed toward r at time t, let d be the distance between
r(t) and s(t). Otherwise, let t(cid:48) be the time at which s performed its last
Look, and let d be the distance between s(t(cid:48)) and r(t). Furthermore, let
k = (cid:100)d/δ(cid:101). We will prove our claim by well-founded induction on k, so let
us assume our claim to hold for every k(cid:48) such that 0 (cid:54) k(cid:48) < k.
The first robot to perform a Look after time t sees the other robot set
to A. If they coincide (i.e., if s has reached r or if k = 0), the first robot
turns C, and Lemma 3.3 applies. If they do not coincide, the first robot
turns B. If it turns B before the other robot has performed a Look, then
Lemma 3.4 applies. Otherwise, when the second robot performs its first
Look after time t, it sees the first robot still set to A. Once again, if they
coincide, the second robot turns C and Lemma 3.3 applies. At this point, if
k = 1 and s was directed toward r at time t, the robots have gathered and
terminated correctly.
11
Hence, if r and s perform their first Look at times tr and ts respectively,
we may assume that both will turn B, r computes the midpoint mr of r(tr)
and s(tr), and s computes the midpoint ms of r(ts) and s(ts). Observe that,
if s's destination was not r at time t, then mr = ms.
Without loss of generality, let r be the first robot to perform the second
Look. r sees s set to B, hence it turns A. If s performs the second Look
after r has already turned A, then s necessarily sees r in A (because r keeps
seeing s in B), and Lemma 3.4 applies.
Otherwise, both robots see each other in B, and both eventually turn
A. Without loss of generality, let s be the first robot to perform the third
Look. If k = 1 and s was not directed toward r at time t, the robots have
indeed gathered in mr = ms, so s turns C and Lemma 3.3 applies.
At this point we may assume that k (cid:62) 2, hence δ (cid:54) (k − 1)δ < d (cid:54) kδ.
We claim that the distance d(cid:48) between r and s is now at most (k − 1)δ.
Indeed, if s was not directed toward r at time t, then each robot has either
reached mr = ms, or has approached it by at least δ. In any case, d(cid:48) (cid:54)
d − δ (cid:54) (k − 1)δ. Otherwise, if s was directed toward r at time t, then
observe that both mr and ms lie between r(t) and m = (r(t) + s(t))/2.
Moreover, s has performed its first Look while at distance at most d − δ
from r(t), and subsequently it has further approached r(t). On the other
hand, r is found between r(t) and m, thus at distance not greater than d/2
from r(t). Hence, d(cid:48) (cid:54) max{d − δ, d/2} (cid:54) (k − 1)δ.
Now, s is the first robot to perform the third Look, and sees r either
already in A or still in B. In the first case, the inductive hypothesis applies,
because r is not in a Compute phase, and its destination is r itself. In the
second case, s computes r's location, and it keeps doing so until r turns A.
♥
When this happens, the inductive hypothesis applies again.
Corollary 3.6. If, at some time t, both robots are set to B and are both
in a Wait or in a Look phase, they will eventually gather and terminate
correctly.
Proof. The reasoning in the proof of Lemma 3.5 also implicitly addresses
this case. Indeed, the configuration in which both robots are set to B and
in a Wait or a Look phase is reached during the analysis, and is incidentally
♥
resolved, as well.
Theorem 3.7. Algorithm 3 solves Rendezvous in non-rigid ASynch and
terminates correctly, regardless of the colors in the initial configuration.
Proof. If both robots start in A, Lemma 3.5 applies. If they both start in
B, Corollary 3.6 applies. If one robot starts in A and the other one starts
in B, then Lemma 3.4 applies.
If exactly one robot starts in C, it will stay still forever, and the other
robot will eventually reach it, turn C as well, and both will terminate.
12
If both robots start in C and they are coincident, they will terminate.
If they are not coincident, let r be the first robot to perform a Look. r
will then turn A and move toward the other robot s. If s performs its first
Look when r has already turned A, it will wait, r will eventually reach it,
turn C, and both will terminate. Otherwise, s performs its Look when r is
still set to C, hence s will turn A as well, and move toward r.
Then, one robot will keep staying A and moving toward the other one,
until both have turned A. Without loss of generality, let r be the first
robot to see the other one set to A. If they are coincident, r turns C and
Lemma 3.3 applies. Otherwise, r turns B. If this happens before s has seen
r in A, then Lemma 3.4 applies. Otherwise, both robots will turn B. As
long as only one robot has turned B, it stays B and does not move. At some
♥
point, one robot sees the other in B and Corollary 3.6 applies.
4
Impossibility of rendezvous with two colors
Observe that Algorithms 1, 2 and 3 only produce moves of three types: stay
still, move to the midpoint, and move to the other robot. It turns out that,
regardless of the number of available colors, any algorithm for Rendezvous
must use those three moves under some circumstances.
Proposition 4.1. For any algorithm solving Rendezvous in rigid FSynch,
there exist a color X and a distance d > 0 such that any robot set to X that
sees the other robot at distance d and set to X moves to the midpoint.
Proof. Assume both robots start with the same color and in distinct po-
sitions. We may assume that both robots get isometric snapshots at each
cycle, so they both turn the same colors, and compute destination points
that are symmetric with respect to their midpoint. If they never compute
the midpoint and their execution is rigid and fully synchronous, they never
♥
gather.
Proposition 4.2. For any algorithm solving Rendezvous in rigid SSynch,
there exist two colors X and Y and a distance d > 0 such that any robot set
to X that sees the other robot at distance d and set to Y moves to the other
robot's position.
Proof. We activate one robot on even cycles, and the other robot on odd
cycles. If no robot ever computes the other robot's position and they perform
♥
rigid movements, they never gather.
Proposition 4.3. For any algorithm solving Rendezvous in rigid SSynch,
there exist two colors X and Y and a distance d > 0 such that any robot set
to X that sees the other robot at distance d and set to Y does not move.
13
Proof. We keep activating only one robot at each cycle (alternately), except
when one robot computes the other robot's position. Whenever this hap-
pens, we activate both robots for that cycle. If no robot ever performs a
♥
null move, they never gather.
The above observations partly justify the choice to restrict our attention
to a specific class of algorithms: from now on, every algorithm we consider
computes only destinations of the form
(1 − λ) · me.position + λ · other.position,
where the parameter λ ∈ R depends only on me.light and other.light. Sim-
ilarly, a robot's next light color depends only on the current colors of the
two robots' lights, and not on their distance. Recall from Section 1 that this
class of algorithms is denoted by L. Notice that Algorithms 1 and 2 both
belong to L, but Algorithm 3 does not, because it may output a different
color depending if the two robots coincide or not.
A statement of the form X(Y ) = (Z, λ) is shorthand for "if a robot is
set to X and sees the other robot set to Y , it turns Z and makes a move
with parameter λ", where {X, Y, Z} ⊆ {A, B} and λ ∈ R. The negation of
X(Y ) = (Z, λ) will be written as X(Y ) (cid:54)= (Z, λ), wheres a transition with
an unspecified move parameter will be denoted by X(Y ) = (Z, (cid:63)).
4.1 Preliminary results
Here we assume that the model is rigid ASynch, that only two colors are
available, namely A and B, and that the initial configuration is with both
robots set to A. All our impossibility results for this very special model are
then applicable to both non-rigid ASynch with preset initial configuration
and rigid ASynch with arbitrary initial configuration.
the algorithm belongs to class L, then the following statements hold.
Lemma 4.4. A(A) = (B, (cid:63)).
So, let an algorithm that solves Rendezvous in this model be given. If
Proof. If the execution starts with both robots in A, and A(A) = (A, (cid:63)),
then no robot ever transitions to B, and Rendezvous is not solvable, due
♥
to Proposition 1.1.
Lemma 4.5. If A(A) = (B, 1/2), then B(A) = (B, (cid:63)).
Proof. Let us assume by contradiction that B(A) = (A, (cid:63)). If B(A) = (A, λ)
with λ (cid:54)= 1, we let the two robots execute two cycles each, alternately. As
a result, each robot keeps seeing the other robot in A, and their distance is
multiplied by 1 − λ/2 (cid:54)= 0 at every turn. Hence the robots never gather.
If B(A) = (A, 1), we let robot r perform a whole cycle and the Look
and Compute phases of the next cycle, while the other robot s waits. At
14
this point, their distance has halved, r is set to A, and is about to move to
s's position. Now s performs two whole cycles, reaching r's position with
its light set to A. Finally, we let r finish its cycle. As a result, the distance
between the two robots has halved, both robots have performed at least a
cycle, they are in a Wait phase, and they are both set to A. Hence, by
♥
repeating the same pattern of moves, they never gather.
Lemma 4.6. If A(A) = (B, 1/2) and B(B) = (A, (cid:63)), then B(B) = (A, 0).
Proof. Assume by contradiction that A(A) = (B, 1/2) and B(B) = (A, λ)
with λ (cid:54)= 0. We let both robots perform a Look and a Compute phase
simultaneously. Both turn B and compute the midpoint m. Then we let
robot r finish the current cycle and perform a new Look. As a result, r
will turn A and will move away from m. Now let the other robot s finish its
first cycle and perform a whole new cycle. s reaches m, sees r still set to B
and still in m, hence s turns A and stays in m. Finally, we let r finish the
current cycle. At this point, both robots are set to A, they are in a Wait
phase, both have performed at least one cycle, and their distance has been
multiplied by λ/2 (cid:54)= 0. Therefore, by repeating the same pattern of moves,
♥
they never gather.
Lemma 4.7. If A(A) = (B, 1/2) and B(B) = (A, 0), then B(A) = (B, 0).
Proof. By Lemma 4.5, B(A) = (B, (cid:63)). Assume by contradiction that B(A) =
(B, λ) with λ (cid:54)= 0. We let both robots perform a Look simultaneously, so
both plan to turn B and move to the midpoint m. We let robot r finish the
cycle, while the other robot s waits. Then we let r perform a whole other
cycle. So r sees s still in A, and moves away from m, while staying B. Now
we let s finish its first cycle and move to m. Finally, we let both robots
perform a new cycle simultaneously. As a result, both robots are set to A
and are in a Wait phase, both have performed at least one cycle, and their
distance has been multiplied by λ/2 (cid:54)= 0. By repeating the same pattern
♥
of moves, they never gather.
Lemma 4.8. If A(A) = (B, 1/2) and B(B) = (A, 0), then A(B) = (A, 1).
Proof. Let us first assume that A(B) = (B, λ) with λ (cid:54)= 1. We let one robot
perform a whole cycle, thus turning B and moving to the midpoint. Then
we let the other robot perform a cycle, at the end of which both robots are
set to B. Finally, we let both robots perform a cycle simultaneously, after
which they are back to A and in a Wait phase. Because their distance has
been multiplied by 1 − λ/2 (cid:54)= 0, by repeating the same pattern of moves
they never gather.
Assume now that A(B) = (B, 1). We let robot r perform a Look and
a Compute phase, thus turning B and computing the midpoint. Now we
let the other robot s perform a whole cycle, at the end of which it is set to
15
B and has reached r. Then we let r finish its cycle, moving away from s.
Finally, we let both robots perform a new cycle simultaneously, which takes
them back to A. Their distance has now halved, and by repeating the same
pattern of moves they never gather.
Assume that A(B) = (A, (cid:63)), and let robot r perform an entire cycle, thus
turning B and moving to the midpoint. Due to Lemma 4.7, B(A) = (B, 0),
which means that, from now on, both robots will retain colors. Hence, r
♥
will always stay still, and s will never reach r unless A(B) = (A, 1).
4.2 Rigid asynchronous model with arbitrary initial config-
uration
Lemma 4.9. Algorithm 1 does not solve Rendezvous in rigid ASynch,
if both robots are set to B in the initial configuration.
Proof. Let both robots perform a Look phase, so that both will turn A.
We let robot r finish the current cycle and perform a new Look, while the
other robot s waits. Hence, r will stay A and move to s's position. Now we
let s finish the current cycle and perform a new Look. So s will turn B and
move to the midpoint m. We let r finish the current cycle, thus reaching s,
and perform a whole new cycle, thus turning B. Finally, we let s finish the
current cycle, thus turning B and moving to m. As a result, both robots are
again set to B, they are in a Wait phase, both have executed at least one
cycle, and their distance has halved. Thus, by repeating the same pattern
♥
of moves, they never gather.
Theorem 4.10. There is no algorithm of class L that solves Rendezvous
using two colors in rigid ASynch from all possible initial configurations.
Proof. Because robots may start both in A or both in B, the statement of
Lemma 4.4, holds also with A and B exchanged. Hence A(A) = (B, (cid:63)), but
also B(B) = (A, (cid:63)). Moreover, by Proposition 4.1, either A(A) = (B, 1/2) or
B(B) = (A, 1/2). By symmetry, we may assume without loss of generality
that A(A) = (B, 1/2). Now, by Lemma 4.6, B(B) = (A, 0). Additionally, by
Lemma 4.7 and Lemma 4.8, B(A) = (B, 0) and A(B) = (A, 1). These rules
define exactly Algorithm 1, which is not a solution, due to Lemma 4.9. ♥
4.3 Non-rigid asynchronous model with preset initial config-
uration
Theorem 4.11. There is no algorithm of class L that solves Rendezvous
using two colors in non-rigid ASynch, even assuming that both robots are
set to a predetermined color in the initial configuration.
Proof. Let both robots be set to A in the initial configuration, and let d (cid:62) 0
be given. By Lemma 4.4, A(A) = (B, λ), for some λ ∈ R. If λ (cid:54)= 1/2, we
16
place the two robots at distance d/1− 2λ from each other, and we let them
perform a whole cycle simultaneously. If λ = 1/2, we place the robots at
distance d + 2δ, and we let them perform a cycle simultaneously, but we
stop them as soon as they have moved by δ. As a result, both robots are
now set to B, and at distance d from each other. This means that any
algorithm solving Rendezvous with both robots set to A must also solve
it with both robots set to B, as well.
Similarly, we can place the two robots at distance d/1 − λ or d + δ,
depending if λ (cid:54)= 1 or λ = 1. Then we let only one robot perform a full
cycle, and we let it finish or we stop it after δ, in such a way that it ends up
at distance exactly d from the other robot. At this point, one robot is set
to A and the other is set to B.
It follows that any algorithm for Rendezvous must effectively solve
it from all possible initial configurations. But this is impossible, due to
♥
Theorem 4.10.
5 Conclusions
We considered deterministic distributed algorithms for Rendezvous for
mobile robots that cannot use distance information, but can only reduce (or
increase) their distance by a constant factor, depending on the color of the
lights that both robots are carrying. We called this class of algorithms L.
We gave several upper and lower bounds on the number of different colors
that are necessary to solve Rendezvous in different robot models. Based
on these results, we can now give a complete characterization of the number
of necessary colors in every possible model, ranging from fully synchronous
to semi-synchronous to asynchronous, rigid and non-rigid, with preset or
arbitrary initial configuration.
Theorem 5.1. To solve Rendezvous with an algorithm of class L from a
preset starting configuration,
• one color is sufficient for rigid and non-rigid FSynch;
• two colors are necessary and sufficient for rigid SSynch, non-rigid
SSynch, and rigid ASynch;
• three colors are necessary and sufficient for non-rigid ASynch.
To solve Rendezvous with an algorithm of class L from an arbitrary start-
ing configuration,
• one color is sufficient for rigid and non-rigid FSynch;
• two colors are necessary and sufficient for rigid and non-rigid SSynch;
• three colors are necessary and sufficient for rigid and non-rigid ASynch.
17
Proof. All the optimal color values derive either from previous theorems or
from the model inclusions summarized in Figure 1.
That just one color is (necessary and) sufficient for all FSynch models
follows from Proposition 1.1.
Proposition 1.1 also implies that, for all the other models, at least two
colors are necessary. Therefore, by Theorem 2.2, two colors are necessary
and sufficient for all SSynch models.
Similarly, Theorem 2.4 states that two colors are necessary and sufficient
for rigid ASynch with preset initial configuration. On the other hand, by
Theorem 4.10 and Theorem 4.11, three colors are necessary in the three
remaining models, and by Theorem 2.7 three colors are also sufficient. ♥
In the three models in which three colors are necessary and sufficient, it
remains an open problem to determine whether using distance information
to its full extent would make it possible to use only two colors.
An interesting variation on this model is when the light on a robot can
be seen only by the other robot(s). In this case, algorithms of class L are
inadequate to solve Rendezvous even in rigid ASynch with preset initial
configuration, regardless of the number of available colors. In contrast, three
colors are necessary and sufficient for all SSynch models.
On the other hand, if the light is visible only to the robot that is carry-
ing it (i.e., internal memory), then no algorithm of class L can solve Ren-
dezvous, even in rigid SSynch with preset initial configuration, regardless
of the number of colors.
References
[1] M. Cieliebak, P. Flocchini, G. Prencipe, and N. Santoro. Distributed
computing for mobile robots: gathering. SIAM Journal on Computing,
to appear.
[2] S. Das, P. Flocchini, G. Prencipe, N. Santoro, and M. Yamashita. The
power of lights: synchronizing asynchronous robots using visible bits. In
Proceedings of the 32nd International Conference on Distributed Com-
puting Systems, pp. 506 -- 515, 2012.
[3] P. Flocchini, G. Prencipe, and N. Santoro. Distributed computing by
oblivious mobile robots. Morgan & Claypool, 2012.
[4] G. Prencipe and N. Santoro. Distributed algorithms for mobile robots.
In Proceedings of the 5th IFIP International Conference on Theoretical
Computer Science, pp. 47 -- 62, 2006.
[5] I. Suzuki and M. Yamashita. Distributed anonymous mobile robots: for-
mation of geometric patterns. SIAM Journal on Computing, vol. 28,
pp. 1347 -- 1363, 1999.
18
|
cs/0412106 | 1 | 0412 | 2004-12-23T15:21:40 | Online Learning of Aggregate Knowledge about Non-linear Preferences Applied to Negotiating Prices and Bundles | [
"cs.MA",
"cs.GT",
"cs.LG"
] | In this paper, we consider a form of multi-issue negotiation where a shop negotiates both the contents and the price of bundles of goods with his customers. We present some key insights about, as well as a procedure for, locating mutually beneficial alternatives to the bundle currently under negotiation. The essence of our approach lies in combining aggregate (anonymous) knowledge of customer preferences with current data about the ongoing negotiation process. The developed procedure either works with already obtained aggregate knowledge or, in the absence of such knowledge, learns the relevant information online. We conduct computer experiments with simulated customers that have_nonlinear_ preferences. We show how, for various types of customers, with distinct negotiation heuristics, our procedure (with and without the necessary aggregate knowledge) increases the speed with which deals are reached, as well as the number and the Pareto efficiency of the deals reached compared to a benchmark. | cs.MA | cs |
Online Learning of Aggregate Knowledge about Non-linear
Preferences Applied to Negotiating Prices and Bundles
D.J.A. Somefun
Center for Mathematics and
Computer Science (CWI)
P.O. Box 94079, 1090 GB
Amsterdam,The Netherlands
T.B. Klos
Center for Mathematics and
Computer Science (CWI)
P.O. Box 94079, 1090 GB
Amsterdam,The Netherlands
[email protected]
[email protected]
Center for Mathematics and
Computer Science (CWI)
and Technical Univ. Eindhoven
School of Techn. Management
J.A. La Poutr´e
P.O. Box 513, 5600 MB
Eindhoven, The Netherlands
ABSTRACT
In this paper, we consider a form of multi-issue negotiation
where a shop negotiates both the contents and the price
of bundles of goods with his customers. We present some
key insights about, as well as a procedure for, locating mu-
tually beneficial alternatives to the bundle currently under
negotiation. The essence of our approach lies in combining
aggregate (anonymous) knowledge of customer preferences
with current data about the ongoing negotiation process.
The developed procedure either works with already obtained
aggregate knowledge or, in the absence of such knowledge,
learns the relevant information online. We conduct com-
puter experiments with simulated customers that have non-
linear preferences. We show how, for various types of cus-
tomers, with distinct negotiation heuristics, our procedure
(with and without the necessary aggregate knowledge) in-
creases the speed with which deals are reached, as well as
the number and the Pareto efficiency of the deals reached
compared to a benchmark.
INTRODUCTION
1.
Combining two or more items and selling them as one good,
a practice called bundling, can be a very effective strategy
for reducing the costs of producing, marketing, and selling
products [4].
In addition, and maybe more importantly,
bundling can stimulate demand for (other) goods or ser-
vices [16, 3]. To stimulate demand by offering bundles of
goods, requires knowledge of customer preferences. Tradi-
tionally, firms first acquire such aggregate knowledge about
customer preferences, for example through market research
or sales data, and then use this knowledge to determine
which bundle-price combinations they should offer. Espe-
cially for online shops, an appealing alternative approach
[email protected]
would be to negotiate bundle-price combinations with cus-
tomers:
in that case, aggregate knowledge can be used to
facilitate an interactive search for the desired bundle and
price. Due to the inherently interactive characteristics of
negotiation, such an approach can very effectively adapt the
configuration of a bundle to the preferences of a customer. A
high degree of bundle customization can increase customer
satisfaction, which may lead to an increase in the demand
for future goods or services.
In this paper, we present an approach that allows a shop
to make use of aggregate knowledge about customer prefer-
ences. Our procedure uses aggregate knowledge about many
customers in bilateral negotiations of bundle-price combina-
tions with individual customers. Negotiation concerns the
selection of a subset from a collection of goods or services,
viz. the bundle, together with a price for that bundle. Thus,
the bundle configuration -- an array of bits, representing the
presence or absence of each of the shop's goods and services
in the bundle -- together with a price for the bundle, form
the negotiation issues. In theory, this is just an instance of
multi-issue negotiation. Like the work of [11, 8, 7, 17], our
approach tries to benefit from the so-called win-win oppor-
tunities offered by multi-issue negotiation, by finding mutu-
ally beneficial alternative bundles during negotiations. The
novelty of the approach, however, lies in the use of aggre-
gate knowledge of customer preferences. We show that the
bundle that represents the highest 'gains from trade' Pareto-
dominates all other bundles within a certain collection of
bundles.1, 2 Based on this important insight, we develop a
procedure for combining aggregate knowledge of customer
preferences with data about an ongoing negotiation process
with 1 customer, to find alternative bundles that are likely
to lead to high Pareto improvements. Note that due to the
use of aggregate data only, our approach does not necessitate
infringement of customers' privacy.
1The gains from trade for a bundle are equal to the cus-
tomer's 'valuation' of the bundle minus the shop's valuation
of the bundle, which is his (minimum) price (cf. [12]).
2An offer constitutes a Pareto improvement over another
offer whenever it makes one bargainer better off without
making the other worse off. A bundle b′ 'Pareto-dominates'
another bundle b whenever switching from b to b′ results in
a Pareto improvement (cf. [12]).
The procedure we developed requires a process in the fore-
ground and one in the background. The foreground pro-
cess uses aggregate knowledge about customer preferences
to recommend promising alternative bundles during ongo-
ing negotiations with customers.
Intuitively, the idea for
the process in the foreground is that, whenever the shop de-
cides to stop bargaining about a bundle b and to switch to
an alternative bundle, he will choose from a 'neighborhood'
of b, the bundle that looks promising in the sense that it has
the highest conditionally expected gains from trade. The
background process obtains the necessary aggregate knowl-
edge about customer preferences. Based on this knowledge
it estimates for each bundle the expected gains from trade,
conditional on what the ongoing negotiation process reveals
about the current customer.
With respect to the background process we consider two
cases.
In the first case, we do not explicitly consider the
background process: the shop already possesses the neces-
sary aggregate knowledge. The shop may have obtained this
aggregate knowledge by having access to expert knowledge
or by collecting historical sales data and mining this data of-
fline. The main purpose of this case is to highlight the value
of the foreground process given sufficient aggregate knowl-
edge, and to provide an upper bound for the second case.
In the second case, we explicitly consider the background
process:
the shop does not have any a priori knowledge
of customer preferences. Instead he learns about customer
preferences online by interpreting individual customers' re-
sponses to the shop's proposals for negotiating about alter-
native bundles. This allows the shop to make progressively
better estimations of the expected gains from trade.
To ensure that bundling can stimulate demand for (other)
goods or services we conduct computer experiments with
simulated customers that have nonlinear preferences: i.e., a
customer's valuation for a bundle of goods may be higher
(or lower) than the sum of the customer's valuations for
the individual goods. In our experiments, we consider the
foreground process both with and without the aggregate
knowledge already being available.
In the absence of ag-
gregate knowledge, the background process will learn the
relevant information online. We show how, for various types
of customers -- with distinct negotiation heuristics -- the fore-
ground process (both with and without the necessary ag-
gregate knowledge) increases the speed with which deals are
reached, as well as the number and the Pareto efficiency
of the deals reached compared to a benchmark. Moreover,
through time, the performance of the foreground process
without a priori information approaches the procedure that
already possesses the necessary aggregate knowledge.
The subproblem of just finding a good (or better) bundle
configuration can be seen as a form of recommending [14],
if we do not consider the negotiation and pricing aspects.
The general subject of bundling has received a lot of atten-
tion recently, especially in the context of online information
goods [10, 19, 1, 3, 5]. The issue of finding the appropri-
ate bundles is, however, not limited to information goods.
It also occurs outside of the realm of information goods,
where a number of aspects of a complex product can be
selected, such as for a PC [6], a trip [20], or photography
equipment [13]. Until now, this has not been considered as
part of a negotiation process, to the best of our knowledge.
For numerous real word applications -- like the above exam-
ples of selecting aspects of a complex product -- the number
of individual goods to be bundled, n, is relatively small. In
this paper we will also only consider small values of n (say
n ≤ 10), for which aggregate knowledge still greatly facil-
itates the process of finding attractive alternative bundles
during a negotiation process. For example, with n = 10
there are 2n − 1 = 1023 possible bundle configurations, so
facilitating the search process among all those bundles is
highly valuable.
This paper builds on and significantly extends the idea, de-
veloped in a preceding paper [18], to negotiate over bundles
and prices using aggregate knowledge. The scope of the
earlier paper is limited to the foreground process; the nec-
essary aggregate knowledge is assumed to be already avail-
able. This approach is warranted because the paper focuses
on additively separable preferences (i.e., a customer's valua-
tion for a bundle is always equal to the sum of her valuations
for the individual goods comprising the bundle). With addi-
tive separability it suffices to learn the conditional expected
gains from trade for the individual goods (cf.
[18]), which
greatly simplifies the problem of learning the required aggre-
gate knowledge. In this paper we consider non-linear cus-
tomer preferences, for which learning the desired aggregate
knowledge can be very difficult. For example, it may be very
difficult to determine the conditionally expected gains from
trade by collecting historical sales data and mining those
data offline. It requires that the sales data reveals the cor-
relation between customers' valuations for the various bun-
dles. Such high quality data may not be readily available,
especially when at the same time customers' privacy should
be respected, as we assume in this paper. By interpreting
customers' online responses to the shop's proposals for ne-
gotiating about alternative bundles, our background process
circumvents these difficulties.
The next section provides a high-level overview of the inter-
action model. In Section 3 we introduce relatively mild con-
ditions on the customers' and the shop's preferences. Based
on these conditions, Section 4 develops a procedure for find-
ing the most promising alternative bundles. In order to test
the performance of our system, we used it in interactions
with simulated customers. In Section 5 we discuss how the
necessary aggregate knowledge of customer preferences is
learned online. Section 6 presents our computer experiments
and discusses the results. Conclusions follow in Section 7.
2. OVERVIEW
This section gives an overview of the interaction between the
shop and the customer, as they try to negotiate an agree-
ment about the price and the composition of a bundle of
goods. The shop sells a total of n goods, each of which may
be either absent or present in a bundle, so that there are
2n − 1 distinct bundle-configurations containing at least 1
good. In the current paper, we use n = 10. A negotiation
concerns a bundle (configuration), together with a price for
that bundle, and it is conducted in an alternating exchange
of offers and counter offers [15], typically initiated by the
customer. An example of such a practice may involve the
sales of bundles of news items in categories like politics, fi-
nance, economy, sports, arts, etc.
We develop a procedure that a shop can use to find mutually
beneficial alternative bundles during the negotiation about
a given bundle, so that alternative bundles may be recom-
mended whenever the negotiation about the given bundle
stalls. Specifically, the procedure finds Pareto improvements
by changing the bundle content.2 It uses information spe-
cific to the current negotiation process as well as aggregate
knowledge (obtained from the analysis of sales data, (anony-
mous) data on previous and current negotiations, market
research, or expert knowledge). The ongoing negotiation is
analyzed to determine when an alternative bundle is needed,
and both the ongoing negotiation process and the aggregate
knowledge are used to assess which bundle to recommend.
A customer can explicitly reject a suggested bundle by spec-
ifying a counter offer with a different bundle content (e.g.,
the previous one), and she can implicitly reject a suggested
bundle by offering a low price for it. In the current paper,
only implicit rejection is allowed: customers only specify the
bundle content for the opening offer, and thereafter only the
shop can change the bundle content of an offer. This is to
ease the description of our model and solutions. The possi-
bility for customers to explicitly reject or change the bundle
content can be easily incorporated in our model and solu-
tions, however.
Figure 1 provides a high-level overview of the interaction
between a shop and a customer. The shaded elements are
part of the actual negotiation -- the exchange of offers. The
process starts with the customer indicating her interests, by
specifying the bundle they will initially negotiate about. Af-
ter that, they enter into a loop (indicated by the dotted line)
which ends only when a deal is made, or with a 2% exoge-
nous probability. (We do not model bargainers' impatience
explicitly; therefore we need an exogenous stopping condi-
tion, which specifies the chance of bargaining breakdown.)
In the loop, the customer makes an offer for the current bun-
dle b, indicating the price she wants to pay for it. The shop
responds to this offer either by accepting it, or by consid-
ering a recommendation. In any case, conditional upon the
98% continuation probability, the shop also makes an offer,
either for the current bundle b or for a recommended bundle
b′ (which then becomes the current bundle).
In the model, the valuations of the customers and the shop
are expressed as monetary values. The utilities of deals are
expressed as strictly monotonic one-dimensional transforma-
tions of valuations. In the simplest form, this would be the
difference between the valuation of the bundle and the ne-
gotiated price. The agents are interested in obtaining a deal
with optimal utility ("net monetary value"). See Section 3
for details.
3. PREFERENCE MODEL
3.1 Informal Discussion
The essence of our model of valuations and preferences lies
in the assumption that customers and the shop order bun-
dles based on their net monetary value; the bundle with the
highest net monetary value is the most preferred bundle. A
customer's net monetary value of a bundle is equal to the
customer's valuation of the bundle (expressed in money) mi-
nus the bundle price and the shop's net monetary value is
equal to the bundle price minus the shop's bundle valuation
(also expressed in money).
Given the above assumption and the assumption that a cus-
tomer wants to buy at most one bundle (within a given time
period), Section 3.2 shows that any deal involving the bundle
with the highest gains from trade is Pareto efficient. We can
now specify which is the best bundle for the shop to advise:
faced with the problem of recommending one bundle out of
a collection of bundles, the "best" bundle to recommend is
the bundle with the highest expected gains from trade; this
bundle Pareto dominates all other bundles. (Section 3.2 can
be skipped upon first reading.)
3.2 Formal Discussion
Before being able to more formally state the results, some
notation is necessary. Let N ⊂ N, with n = N , de-
note the collection of n individual goods and 2N denote the
power set of N (i.e., the collection of all subsets of n), then
B = 2N \ {∅} denotes the collection of all possible bundles.
Furthermore, let P = R denote the collection of all possi-
ble bundle prices.3 The customer and the shop attach the
monetary values of vc(b) and vs(b), respectively, to a bundle
b ∈ B (with vc(b), vs(b) ∈ P ). The function xj : B × P 7→ R
with j ∈ {c, s} denotes the net monetary value for bundle
b at price p: xc(b, p) = vc(b) − p and xs(b, p) = p − vs(b)
denote the customer's and the shop's net monetary values,
respectively.
We assume that the customer's and the shop's utility for
consuming bundle b at price p, denoted by uj (b, p) with j ∈
{c, s}, can be expressed as the composition function gj ◦
xj(b, p) with gj : R 7→ R. For gj we assume that dgj (x)
dx >
0 for all x ∈ R. Thus we have that uj(b, p) = gj (xj(b, p))
and since gj is a strictly increasing function, we can assume
without loss of generality that uj (b, p) = xj (b, p) (cf. [12]).
Given the customer's and shop's monetary values, we define
a useful subset B ∗ of B as follows: B ∗ ≡ arg maxb∈B(vc(b)−
vs(b)), that is, B ∗ represents the collection of bundles with
the highest possible gains from trade (across all possible
bundles). We are now ready to introduce the following
proposition.
Proposition 1. A deal (b, p) with b ∈ B and p ∈ P is
Pareto efficient if and only if b ∈ B ∗.
Remark 1. A deal (b, p) is Pareto efficient if there is no
(b′, p′) such that uj(b, p) ≤ uj (b′, p′) for all j ∈ {c, s} and
the inequality is strict for at least one j.
Proposition 1 means that a deal is Pareto efficient if and
only if it entails a bundle with the highest possible gains
from trade. For the proof of this proposition the following
lemma is very useful.
3Negative prices may not be realistic, but we want to make
as few behavioral assumptions as possible. For the results
the possibility of negative prices is not problematic (see
Footnote 4).
start
customer picks
bundle: b
customer
makes offer
for bundle b
shop
accepts?
yes
no
deal
end
shop
recommends
bundle b' b
yes
is it time to
recommend?
yes
no
customer
accepts?
no
shop makes
offer for
bundle b
continue?
(p = 99%)
yes
no
Figure 1: A flowchart describing the integration of recommendation in a shop and a customer's alternating
exchange of offers and counter offers.
Lemma 1. For any two deals (b∗, p∗) and (b, p) with p∗, p ∈
P , b∗ ∈ B ∗, and b ∈ B \ B ∗ we have xc(b, p) < xc(b∗, p∗) or
xs(b, p) < xs(b∗, p∗).
Proof. We prove the above lemma by contradiction. Sup-
pose that for any b∗ ∈ B ∗ and b ∈ B \ B ∗ we have xc(b, p) ≥
xc(b∗, p∗) and xs(b, p) ≥ xs(b∗, p∗). A necessary condition
for this to hold is that vc(b) − vs(b) ≥ vc(b∗) − vs(b∗). How-
ever, b∗ ∈ B ∗ and b ∈ B \ B ∗ means, by definition of B ∗,
that vc(b) − vs(b) < vc(b∗) − vs(b∗).
We are now ready to prove Proposition 1.
Proof.
1. (If) Pick any j ∈ {c, s}. Suppose that j's
position improves by moving from any deal (b, p) with
b ∈ B ∗ to (b′, p′), that is, uj (b, p) < uj (b′, p′). It then
suffices to show that the opponent denoted by j ′ will
always be made worse off, that is, uj ′ (b, p) > uj ′ (b′, p′).
From the properties of gj and gj ′ it follows that a bar-
gainer's position improves/worsens whenever the net
monetary value increases/decreases. Since j's position
improves, it follows from Lemma 1 that j ′ is made
worse off whenever b ∈ B \ B ∗. Moreover, if b, b′ ∈ B ∗
then the gains from trade remain unchanged, hence j ′
is made worse off.
2. (Only if) We will prove this part by contradiction.
Suppose that b /∈ B ∗ with the price being any p ∈ P .
Pick any b′ ∈ B ∗ and set the bundle price to p′ =
p + vs(b′) − vs(b), so that p′ − vs(b′) = p − vs(b). It
follows from p ∈ P that p′ ∈ P (recall that P = R)4
and the properties of gs that the shop is indifferent
between the deals (b, p) and (b′, p′). Also, it follows
from Lemma 1 and the properties of gc that the cus-
tomer is made better off. That is, any b′ ∈ B ∗ Pareto
dominates b /∈ B ∗. Thus b /∈ B ∗ cannot be a Pareto
efficient solution.
4If we choose to a priori rule out p < 0 and vj (b) < 0 (for
j ∈ {c, s} and all b ∈ B), then p ≥ vs(b) should hold because
otherwise the shop will not be willing to sell the bundle in
the first place. Consequently, p′ ∈ P still holds.
4. THE FOREGROUND PROCESS
The idea is to develop a mechanism for a shop to find Pareto
improvements by changing the bundle content during a ne-
gotiation. The mechanism we propose contains two subpro-
cedures. The first procedure monitors the negotiation pro-
cess and tells the shop when to recommend, at which time
the second procedure tells the shop what to recommend, by
generating recommendations based on aggregate knowledge
and the ongoing negotiation process. Figure 1 shows the in-
teraction between these two procedures; they are discussed
in more detail in Sections 4.1 and 4.2, respectively.
4.1 Deciding When to Recommend
The shop needs a procedure for deciding when he should
recommend negotiating about a different bundle. The ob-
vious input for this decision is the progress of the current
negotiation process, which can be described as a sequence of
offers and counteroffers. An offer O contains a bundle defi-
nition and a price: O = (b, p) with b ∈ B and p ∈ P . (B and
P denote the collections of all possible bundles and prices,
respectively.) Let h = (O(1), O(2), . . . , O(k)) denote a finite
history of offers (k is a natural number), where O(i + 1) is
the counter offer for O(i), for all i < k. Furthermore, let
H denote the universe of all possible finite offer sequences
(thus h ∈ H). The problem of when to advise can now be
specified as the mapping f : H 7→ {now, not now}, where
"(not) now" means: (don't) recommend a new bundle now.
We construct a heuristic for f based on the assumption that
there is a probability of not reaching a deal with a customer
(e.g., a break off, endless repetition, or deadline): the longer
the negotiation is expected to take, the less likely a deal is
expected to become. Furthermore, as a deal becomes less
likely, the incentive for the shop to recommend negotiation
about an alternative deal should increase. Given the shop's
bargaining strategy, our heuristic then extrapolates the time
the current negotiation process will need to reach a deal,
from the pace with which the customer is currently giving
in. More precisely, if we let O = (b, p) and O′ = (b, p′)
denote the customer's current and previous offers for bundle
b, then ∆t, the predicted remaining number of negotiation
rounds necessary to reach a deal, is defined as follows:
advantage of advising bundles within the neighborhood of b
is that the advice is less likely to appear haphazard.
∆t =
vs(b) − p
p − p′
,
(1)
where vs(b) denotes the shop's monetary value for bundle
b. The higher ∆t, the higher the likelihood of a recommen-
dation. Specifically, the probability of a recommendation
depends on ∆t as follows:
prrecommendation = 1 − exp(−0.25∆t),
which means that the probability that the shop recommends
an alternative bundle approaches 1 as ∆t increases.
4.2 Deciding What to Recommend
Our mechanism combines aggregate knowledge (obtained
from the analysis of sales data, (anonymous) data on pre-
vious and current negotiations, market research, or expert
knowledge) with data about the ongoing bargain process,
to recommend bundles to customers while negotiating with
them. Suppose, for example, that a customer offers to buy
a bundle b at a price p. Whenever a recommendation is
needed (see Section 4.1) the idea is to select from within the
"neighborhood" of bundle b, the bundle b′ that maximizes
E[vc(b′) − vs(b′)vc(b) ≥ p]: the expected gains from trade
for bundle b′, given that the customer is willing to pay at
least p for bundle b.
(To simplify notation we will write
E[·b] instead of E[·vc(b) ≥ p].) Since the shop knows its
own monetary value for bundle b′, vs(b′), the aim is really
to maximize E[vc(b′)b] − vs(b′). The difficulty here lies in
estimating the customer's expected valuation of bundle b′:
E[vc(b′)b] = Xi∈P
i · pr(vc(b′) = ib),
(2)
where pr(vc(b′) = ib) denotes the probability that the cus-
tomer's valuation for bundle b′ is equal to i, given that she
is willing to pay at least p for bundle b.
In Section 5 we
propose an online learning mechanism for determining this
estimation (the background process mentioned in Section 1.
It is, however, instructive to first discuss the recommenda-
tion mechanism in some more detail (i.e., assuming that the
expectations are already known).
A customer initiates the negotiation process by proposing an
initial bundle and offering an opening price: let O(0) = (b, p)
denote the customer's opening offer (with b ∈ B and p ∈ P ).
The shop stores the bundle proposed by the customer as
(his assessment or estimation of) the customer's "interest
bundle," in the neighborhood of which the shop searches
for promising alternative bundles to recommend if, at any
time, the shop decides he should make a recommendation
(see Section 4.1). This neighborhood of bundle b, Ng(b), is
defined as follows.
Ng(b) ≡ {b′ ∈ B : b′ ⊂ b and b′ + 1 = b
or b′ ⊃ b and b′ − 1 = b},
(3)
In other words, Ng(b) contains the bundles which, in binary
representation, have a Hamming distance to b of 1.5 The
5Remember that each bundle can be represented as a string
containing n bits indicating the presence or absence in the
bundle, of each of the shop's n goods.
Having defined a bundle's neighborhood, let the ordered set
A denote the so-called "recommendation set," obtained by
ordering the neighborhood Ng(b) on the basis of the esti-
mated expected gains from trade of all the bundles b′ in
bundle b's neighborhood, E[vc(b′)b] − vs(b′), where E de-
notes the estimation of E.
To recommend a bundle bk (the kth recommendation, with
k ≥ 1), our mechanism removes the first bundle from A,
adds a price to it and proposes it as part of the shop's next
offer. Depending on the customer's counter offer for bundle
bk, the current advice set may be replaced: if the customer's
response is very promising (to be defined below) A will be
emptied, bundle bk will be taken as the customer's new in-
terest bundle (in the neighborhood of which the search con-
tinues), and the bundles in the neighborhood of bk are added
to A.
To specify this in more detail, let Oc
t denote the sequence
of offers placed by the customer up until time t, and let
max (Oc
t ) specify the customer's past offer with the high-
est net monetary value from the shop's perspective. Then
the shop will determine the impact of the kth recommenda-
tion by comparing the net monetary value of the customer's
current offer O(t + 1) with that of offer max (Oc
t ). For this
purpose, the shop uses the function signb,b ′ : R×R 7→ {0, 1}.
If we let max (Oc
t ) = (b, p) and the customer's current offer
O(t + 1) = (b′, p′), then
sign b,b′ (p, p′) = (cid:26) 1 if p′ − vs(b′) > p − vs(b)
0 otherwise
.
(4)
If sign b,b′ (p, p′) = 1, then the shop's assessment of the cus-
tomer's interest bundle is updated to be bk: the customer's
response is promising enough to divert the search towards
the neighborhood of bk. That is, the first element of A be-
comes the bundle b′ ∈ Ng(bk) with the maximum difference
E[vc(b′)bk] − vs(b′), the second element of A becomes the
bundle b′′ with the second highest difference E[vc(b′′)bk] −
vs(b′′), and so on.
In case sign b,b′ (p, p′) = 0, the shop will make the next
recommendation. Before the shop makes the next recom-
mendation however, he checks if the negotiation is currently
about the interest bundle. If this is not the case he will first
make an offer containing the interest bundle. Whenever this
offer is not accepted by the customer the shop will make the
next recommendation in the following round. Consequently
we have the property that a recommendation is always pre-
ceded by an offer containing the interest bundle. (We will
see in Section 5.1 that this is a very useful property.)
5. THE BACKGROUND PROCESS
The ordering of all bundles in the neighborhood of an inter-
est bundle b constitutes a crucial aspect of the recommen-
dation mechanism described in Section 4.2. Ideally, given
an interest bundle b, the first bundle in the ordering has
the highest expected gains from trade, the second bundle
in the ordering has the second highest expected gain from
trade, and so on so forth. So, as explained in Section 4.2,
we are interested in knowing E[vc(b′)b] − vs(b′) for all bun-
dles b′ within the neighborhood of bundle b, where the dif-
ficulty lies in estimating the customer's expected valuation
E[vc(b′)b]. Expert knowledge may provide the shop with
these estimations, but unfortunately such knowledge is of-
ten not available. We will therefore introduce an effective
approach for online learning to "correctly" order the bundles
in the neighborhood of the interest bundle.
5.1 Using Bargaining Data
To order the bundles, the shop uses data on the current and
past bargaining processes. More precisely, suppose the shop
advises b′ given an interest bundle b with the most recent
customer offer of O = (b, p) and that the customer responds
with the counter offer O′ = (b′, p′). The shop then feeds the
triples < b, b′, p′ − p > and < b′, b, p − p′ > as new training
examples to an online learning mechanism.
The recommendation mechanism described in Section 4.2
ensures that the customer's offers O = (b, p) and O = (b′, p)
are placed directly after one another; thus, as long as the
customer's strategic misrepresentation of the underlying bun-
dle values do not jump around too much from one trading
period to the next, the misrepresentation in p and p′ will
roughly cancel each other out. Consequently, p − p′ will be
a good indication of the difference in a customer's valuations
of bundles b and b′, vc(b) − vc(b′). (Similarly, p′ − p will be
good estimation of vc(b′) − vc(b).)
Based on these training examples the learning mechanism,
when given < b, b′ > combined with the shop's valuations
for the two bundles, vs(b) and vs(b′), predicts ∆gt(b′, b) ≡
E[p′ − vs(b′) − (p − vs(b))b]: the expected difference in gains
from trade, resulting from changing from bargaining about
bundle b to bargaining about bundle b′ (given that a cus-
tomer expressed an interest in bundle b, as assumed above).
To sort bundles in the vicinity of an interest bundle b ac-
cording to their expected gains from trade, it suffices to sort
the bundles according to ∆gt(b′, b).
5.2 Complexity Issues
Knowledge of the correlation between the values of the vari-
ous bundle pairs is essential for correctly learning to order all
bundles in the vicinity of an "interest" bundle b. Given that
the shop sells n individual goods, there are 2n − 1 possible
bundles containing at least 1 good. Learning the correlation
between all bundle pairs requires -- worst case -- comparing
an order of (2n)2 bundle pairs. Clearly, for particular in-
stances of the problem the complexity may be reduced sig-
nificantly. Take for instance the situation, where the cus-
tomer's valuation for a bundle is always equal to the sum of
her valuations for the individual goods comprising the bun-
dle. In that case it suffices to compare n individual goods
with 2n bundles, reducing the complexity -- worst case -- to
an order of n · 2n. In this paper we focus on the more gen-
eral case, where a customer's bundle valuation may not be
equal to the sum of her valuations for the individual goods
comprising the bundle.
For this more general customer preference setting, search-
ing in the neighborhood of the interest bundle has two ad-
vantages: besides making an advice less likely to appear
haphazard, it significantly reduces the number of bundle
pairs that need to be considered. Recall that we defined the
neighborhood of a bundle b as consisting of all bundles at
a Hamming distance of 1 from bundle b (see Section 4.2).
It then requires comparing n · (n − 1) bundles when the
interest bundle has size 1, (n
2 ) · (n − 2) additional bundle
((n
pairs when the interest bundle size is 2, and so on.
k )
Denotes the binomial coefficient.) Thus -- worst case -- there
k )·(n−k) < (n·2n) bundle comparisons necessary,
k=1(n
which is significantly less than (2n)2.
are Pn
5.3 Online Learning Mechanism
In this paper we consider only the situation where the num-
ber of individual goods to be bundled is relatively small:
i.e., n ≤ 10. (With n = 10 there are 2n − 1 = 1023 possi-
ble bundle configurations, so facilitating the search process
among all those bundles is still highly valuable.) Since we
only consider bundles within the neighborhood of an inter-
est bundle, it is tractable, for relatively small values of n,
to explicitly estimate the required conditional expectations
online. Moreover, bargaining with one customer generally
creates numerous training examples which can be used twice
(i.e., < b, b′, p′ − p > and < b′, b, p − p′ > are both stored
as separate training examples, see Section 5.1). For small
values of n therefore, the learning mechanism can improve
its estimation of the conditional expectations, even given
relatively few customers who provide training examples.
Given the k training examples << b, b′, p1 − p′
1 >, . . . , <
b, b′, pk − p′
k >>, the online learning algorithm simply esti-
mates ∆gt(b′, b), the expected difference in gains from trade,
resulting from changing from bargaining about bundle b to
bargaining about bundle b′ (given that a customer expressed
an interest in bundle b), as the average of the training ex-
amples, i.e.,
∆ gt(b′, b) =
1
k
k
Xi=1
(pi − p′
i).
(5)
The danger of using ∆ gt(b′, b) directly to sort the bundles
in the neighborhood of the interest bundle b, is that the
diversity of the trading example remains limited. Conse-
quently, learning the correct ordering of the bundles is not
possible. To allow for sufficient exploration the shop chooses
with a probability p(b, b′, M 0) (with M 0 = N g(b)) a bundle
b′ ∈ M 0 to be first in the ordering of N g(b); once the first
bundle in the ordering is determined, say b∗, with a proba-
bility p(b, b′, M 1) (with M 1 = N g(b)\{b∗}) the shop chooses
a bundle b ∈ M 1 to be second in the ordering, and so on.
The probability p(b, b′, M ) (with M ⊆ N g(b)) is computed
according to the softmax action selection rule (cf. [21]), i.e.,
p(b, b′, M ) =
.
(6)
eλ·∆ gt(b′ ,b)
Pb′′ ∈M eλ·∆ gt(b′′ ,b)
where λ determines the exploratory behavior of the mecha-
nism. The greater λ, the less exploration will take place, i.e.,
the higher the probability that the bundle with the highest
expected gains from trade will be picked first, the second
highest second, and so on. Initially λ is very small; it in-
creases over time.
6. NUMERICAL EXPERIMENTS
In order to test the performance of our proposed mechanism,
we implemented it computationally, and tested it against
many simulated customers. Valuations for the shop and
the customers were drawn from random distributions. First
we describe customer preferences and how we implemented
negotiations in the simulation, and then we present our ex-
perimental design and simulation results.
6.1 Customer preferences
The goods may be complementary, in which case the valua-
tion of a bundle is higher than the sum of the valuations of
the individual goods in the bundle. We model the possibility
of complementarities by representing vc(b), the customer's
valuation for a bundle b, as a (cubic) polynomial. If we let
N denote the collection of n individual goods and the vector
x = (x(1), . . . , x(n)) the binary representation of a bundle b
(i.e., x(i) = 1 if and only if i ∈ b), then
vc(b) = a0 + Xi∈N
Xi,j,k∈N
ai · x(i) + Xi,j∈N
aij · x(i) · x(j) +
aijk · x(i) · x(j) · x(j),
(7)
where a0, ai, aij, and aijk (for i, j, k ∈ N ) denote the con-
stant, linear, quadratic, and cubic coefficients of the poly-
nomial, respectively. The quadratic and cubic coefficients
determine the extent to which complementarities exist be-
tween two and three goods. (Customers buy at most one
instance of an individual good, hence we can ignore the pos-
sibility of complementarities between identical goods:
i.e.,
aii = aiii = 0 for all i ∈ N .)
An individual customer's values for the various coefficients
are randomly distributed. If ~a denotes an arbitrary instance
of all these coefficients, then ~a gives rise to a multivari-
ate normal distribution, i.e., pr(~a) ∼ N [~µ, Σ], where the
vector ~µ and the matrix Σ = [σij ] denote the means and
(co)variances of the distribution.
From Equation 7 (and the fact that x(i) ∈ {0, 1}) it follows
that we can obtain all bundle valuations (vc(b1), . . . , vc(b2n−1))
by applying a linear transformation on ~a. Consequently, the
corresponding probabilities pr(vc(b1), . . . , vc(b2n−1)) also form
a multivariate normal distribution [9]. That is, we have
pr(vc(b1), . . . , vc(b2n−1)) ∼ N [T~µ, TΣT′],
(8)
where the matrix T specifies the linear transformation (the
jth element in the ith row of T specifies whether or not the
corresponding ith coefficient in ~a should contribute to the
valuation of the ith bundle).
6.2 Modeling Negotiations
6.2.1 Time-dependent Strategy
For the customer (shop), the time-dependent bidding strat-
egy is monotonically increasing (decreasing) in both the
number of bidding rounds (t) and her (his) valuation.
In
particular, a bidding strategy is characterized by the gap
the customer leaves between her initial offer and her valua-
tion, and by the speed with which she closes this gap. The
gap is specified as a fraction of the bundle valuation and it
decreases over time as gap(t) = gapinit · exp(−δt), so over
time, she approaches the valuation of the bundle she is cur-
rently negotiating about. Note that changes in the gap are
time-dependent, but not bundle-dependent! This strategy
is therefore called "time-dependent-fraction" (tdf). Almost
the same holds for the shop's bidding strategy, mutatis mu-
tandis. The initial gap, gapinit , is set at 0.5 for the customer
and at 1.5 for the shop, and we fix δ = 0.03 for the shop
as well as the customer, in order to reduce the number of
jointly fluctuating parameters somewhat. Summing up, the
customer (shop) starts her (his) bidding for a bundle at (one
and a) half her (his) valuation, and her (his) bids gradually
approach her (his) valuation.
6.2.2 Tit-for-Tat Strategy
The time-dependent strategy described above generates bids
irrespective of what the opponent does. As an example of
a strategy that responds to the opponent, we implemented
a variant of tit-for-tat (tft) [2]. The initial 'move' is al-
ready specified by gapinit like in the tdf-strategy. If in sub-
sequent moves the utility level of the opponent's offer im-
proves, then the same amount is conceded by the bargainer.
Note that it is the increment in the utility level perceived
by the bargainer (not the opponent). Furthermore, this per-
ceived utility improvement can also be negative. To make
the bidding behavior less chaotic, no negative concessions
are made. That is, we used a so-called monotone version
called tit-for-tat-monotone-fraction (tftm) which can never
generate a bid with a worse utility than the previous bid.
6.3 Experimental Setup
In the computer experiments reported in this paper, we
compare our new approach of having no a priori informa-
tion and learning customer preferences online (as discussed
in Section 5.1), to the one where -- for example because of
expert knowledge -- the shop already knows the underlying
joint probability distribution of all bundle valuations (see
Section 6.1). The latter approach is also the one discussed
and experimented with in more detail in [18]. In this ap-
proach, the shop directly derives the value of E[vc(b′)b] for
each bundle pair; based on these values the shop computes
the expected gains from trade and orders the bundles in the
neighborhood of b accordingly.
Besides comparing our new online procedure (referred to as
µ) with the previous method (called S), we also assess the
relative performance of the system by performing the same
series of experiments with a benchmark procedure (called
B), which simply recommends a random bundle from the
current bundle's neighborhood. That is, the benchmark
does not base the order in which it recommends the next
bundle on the estimated expected gains from trade like our
system does.
In the experiments, the shop's bundle valuations are de-
termined by applying a nonlinear bundle reduction. This
means that the bundle price is generally less than the sum
of the individual goods comprising the bundle. In order to
prevent the trivial problem of customers wanting to buy all
goods, the bundle reduction becomes 0 for bundles which
contain more than 3 goods.
There are 10 individual goods. We randomly generate the
underlying probability density function pr(~a). In order to
ensure sufficient difference in valuations between customers,
however, we fix the correlation matrix (but not the covari-
Table 1: Comparison of the different methods µ, S and the benchmark B. Figures are averages across 10 runs
with different random seeds, and 12000 customers per run. Standard deviations are given between brackets.
Performance
Indicator
max. gains
min. gains
gains binit
gains bint
gains bfinal
percentage
rel. percentage
rounds
deals
µ
Methods
S
B
tdf
tftm
tdf
tftm
tdf
tftm
1202.81(5.34)
−1023.61(54.77)
438.70(15.45)
763.55(15.75)
863.33(4.57)
0.85(0.00)
0.52(0.01)
8.24(0.60)
549.27(4.23)
797.45(4.40)
0.82(0.00)
0.43(0.01)
5.16(0.16)
826.18(16.30)
939.72(8.60)
0.88(0.00)
0.61(0.01)
8.01(0.65)
573.14(5.81)
875.98(7.57)
0.85(0.00)
0.54(0.01)
4.71(0.15)
10314.20(143)
11024.50(39)
10340.60(156)
11114.20(40)
697.74(14.19)
777.82(8.59)
0.81(0.00)
0.41(0.01)
13.71(0.93)
9171.80(181)
527.55(11.61)
727.81(5.96)
0.79(0.00)
0.34(0.01)
7.37(0.29)
10496.50(71)
e
c
n
a
m
r
o
f
r
e
p
e
v
i
t
a
l
e
r
0.6
0.55
0.5
0.45
0.4
0.35
0.3
TDF
TFTM
0
2000
4000
6000
8000
10000
12000
e
c
n
a
m
r
o
f
r
e
p
e
v
i
t
a
l
e
r
n
i
e
c
n
e
r
e
f
f
i
d
0
-0.05
-0.1
-0.15
-0.2
-0.25
TDF
TFTM
0
2000
4000
6000
8000
10000
12000
customer number
customer number
Figure 2: Relative performance of the µ-system (on the left), measured by calculating the difference in gains
from trade between the bundles bfinal and binit, as a percentage of the difference between the maximum and
the initial gains from trade. The shop uses the TDF strategy with δ = 0.03, and the customers use either the
TDF strategy (with δ = 0.03), or the TFTM strategy (with δ = 1), as described in section 6.2. The graph
on the right gives the difference in performance between µ and S. (Both graphs actually show the 100-step
moving averages.)
ance matrix). We randomly initialize the covariance matrix
such that we can partition N in 3 subsets (2 of size 3 and
1 of size 4). Selling a customer one of these 3 subsets will
often generate the highest gain from trade. (Roughly be-
tween 20 and 40% of the time this is the case, in the other
cases 1 or 2 and sometimes more goods need to be added or
removed.) To test the robustness of our procedure to quanti-
tative changes in the underlying distributions we conducted
a series of experiments with 10 different distributions. For
each of these settings we simulated negotiations between the
shop, with randomly drawn valuations, which were kept con-
stant across negotiations with 12, 000 customers, each with
her valuations drawn randomly from the particular distri-
bution used. To further test the robustness of our system,
each customer was simulated using 2 different negotiation
strategies, as described in Section 6.2.
(The shop always
uses the tdf strategy.)
To allow initiation of the negotiation process by the cus-
tomer, we assume that the customer starts negotiating about
an initial bundle binit . In order to give the shop some room
for improvement, we initialize the customer's initial bundle
by randomly selecting a bundle b which, in binary represen-
tation, has a Hamming distance of 3 to the bundle b∗ that
is associated with the highest gains from trade.
6.4 Results
The overall results of our experiments are listed in Table 1.
The numbers are averages over 12, 000 customers drawn
from each distribution of valuations, and over 10 differ-
ent randomly generated distributions; standard deviations
(across averages from the 10 distributions) are listed be-
tween brackets. The maximum and minimum attainable
gains from trade are determined by the current random
distribution of valuations; they do not depend on the cho-
sen strategy and method. Likewise, the bundle a customer
wants to start negotiating about does not depend on the
chosen strategy and method. Therefore, the average of these
figures represented in the first 3 rows are identical across all
experiments -- for each shop-customer interaction these fig-
ures are known even before the negotiation commences.
s
l
a
e
d
f
o
#
e
g
a
r
e
v
a
e
v
i
t
a
l
u
m
u
c
1
0.95
0.9
0.85
0.8
0.75
0.7
0.65
0.6
TDF
TFTM
0
2000
4000
6000
8000
10000
12000
l
a
e
d
a
h
c
a
e
r
o
t
s
d
n
u
o
r
f
o
r
e
b
m
u
n
14
13
12
11
10
9
8
7
6
5
4
TDF
TFTM
0
2000
4000
6000
8000
10000
12000
customer number
customer number
Figure 3: The cumulative average number of deals per customer, as attained by the µ-system (on the left)
and the 100-step moving average of the number of rounds required to reach those deals (on the right). As in
Figure 2, the shop uses the TDF strategy and the customers use either the TDF or the TFTM strategy. The
shop manages to reach deals with 11, 381 of the TDF-customers, and with 11, 554 of the TFTM-customers.
The remainder of the results is measured at the end of each
shop-customer interaction, and subsequently averaged over
all 10·12, 000 customers. The row for 'gains bint(erest)' shows
the gains from trade associated with the bundle of which
the shop, at the end of the negotiation with each customer,
thinks the customer is most interested in. This estimation
is most accurately performed by the S-system, which is not
surprising since it has direct access to the distribution un-
derlying the customer's preferences -- even though it does
not know each individual customer's actual preferences. But
the µ-system, that has to do without this a priori knowledge
altogether, and instead has to learn about its customers'
preferences online, does not do much worse, especially when
compared to the benchmark system, B, in the rightmost
columns.
The row labeled 'gains bfinal' gives the gains from trade as-
sociated with the bundle that the shop and the customer
were actually negotiating about at the end of the simula-
tion, irrespective of whether that end was caused by the
98% exogenous break-up probability, or by the fact that a
deal was reached in the negotiation. The rows for 'percent-
age' and 'rel(ative) percentage' present the same results in
a different way: 'percentage' shows the shop's performance
relative to the maximum attainable:
percentage =
(gains bfinal − min. gains)
(max. gains − min. gains)
,
whereas 'relative percentage' takes into account the starting
bundle binit:
relative percentage =
(gains bfinal − gains binit)
(max. gains − gains binit)
.
Again, in both these rows, as in all the rows more generally,
the S-system outperforms the µ-system, which beats the B-
system, but bear in mind the challenge for the µ-system,
as compared to the S-system, in terms of (dealing with the
lack of) available aggregate knowledge. The rows labeled
'rounds' and 'deals' give the average number of rounds it
took to reach a deal (whenever a deal was reached) and the
average number of deals reached. An observation that can
be made is that the shop seems to do better (in terms of
gains from trade) when the customers use the tdf-strategy
than when they use tftm, although in the former case the
shop requires a higher number of rounds to reach deals, and
reaches less deals, as compared to the latter case.
Figures 2 and 3 illustrate the shop's learning process when
using the µ-system. The graph on the left in Figure 2 shows
(the 100-step moving average of) the 'relative percentage'
from Table 1, measured at the end of the negotiation with
each of the 12, 000 customers, and averaged over the 10 dif-
ferent preference-distributions. The increase over time, of
the shop's aggregate knowledge of his customer's preferences
is clearly visible, for both strategies used by the customers.
The graph on the right in Figure 2 shows the difference
of these results between the µ- and the S-systems, respec-
tively; the S-system does better, but the µ-system closes the
gap as it learns more about its customers. Significantly, the
difference between the plots for tdf and tftm disappears,
indicating the robustness of the µ-system to changes in the
customers' negotiation strategies. So the µ-system is clearly
able to learn customers' preferences online, irrespective of
the negotiation strategy used by those customers. However,
the overall performance of the shop using the µ-system to-
gether with his own negotiation strategy, is dependent upon
the customer's negotiation strategy. More specifically there
is a trade-off in performance. Compared to tftm, interact-
ing with customers using tdf results in higher gains from
trade, less deals (see also Figure 3), and more rounds to
reach those deals. The explanation for these differences is
that with tftm customers will give in quicker; whenever
the shop suggests a good alternative the amount the cus-
tomer concedes equals the gains from trade plus the amount
conceded by the shop (perceived by the customer). Conse-
quently deals are reached more quickly. This also results
in more deals being reached but goes at the expense of the
gains from trade because the search process is shorter.
7. CONCLUSIONS AND FUTURE WORK
In this paper, we consider a form of multi-issue negotiation
where a shop negotiates both the contents and the price
of bundles of goods with his customers. To facilitate the
negotiations of a shop, we develop a procedure that uses
aggregate (anonymous) knowledge about many customers
in bilateral negotiations of bundle-price combinations with
individual customers. By online interpreting customers' re-
sponses to the shop's proposals for negotiating about alter-
native bundles, the procedure acquires the desired aggregate
knowledge online; it requires no a priori information while
respecting customers' privacy.
We conduct computer experiments with simulated customers
that have nonlinear preferences. We compare our new ap-
proach of having no a priori information and learning about
customer preferences online, to the one where -- for example
because of expert knowledge -- the shop already knows the
underlying joint probability distribution of all bundle valu-
ations. The latter approach is also the one discussed and
experimented with in more detail in [18]. Our experiments
show how, over time, the performance of our procedure ap-
proaches that of our previous procedure, which already pos-
sesses the necessary aggregate knowledge. Both procedures
significantly increase the speed with which deals are reached,
as well as the number and the Pareto efficiency of the deals
reached, as compared to a benchmark. Moreover, the ex-
periments show that the new procedure is able to learn the
necessary information online, irrespective of the negotiation
strategy used by the customers.
8. REFERENCES
[1] K. Altinkemer and J. Jaisingh. Pricing bundled
information goods. In Proceedings of
IEEE-WECWIS'02, 2002.
[2] R. Axelrod. The Evolution of Cooperation. Basic
Books, New York, 1984.
[3] Y. Bakos and E. Brynjolfsson. Bundling information
goods: Pricing, profits and efficiency. Management
Science, 45(12), December 1999.
[4] W. Baumol, R. Willig, and J. Panzar. Contestable
Markets and the Theory of Industry Structure. Dryden
Press, 1987.
[5] J. C.-I. Chuang and M. A. Sirbu. Optimal bundling
strategy for digital information goods. Information
Economics and Policy, 11(2):147 -- 176, 1999.
[6] R. Coster, A. Gustavsson, T. Olsson, and
A. Rudstrom. Enhancing web-based configuration
with recommendations and cluster-based help. In
Proceedings Workshop on Recommendation and
Personalization in eCommerce at AH2002, 2002.
[7] H. Ehtamo and R. Hamalainen. Interactive
multiple-criteria methods for reaching pareto optimal
agreements in negotiation. Group Decision and
Negotiation, 10:475 -- 491, 2001.
[8] P. Faratin, C. Sierra, and N. R. Jennings. Using
similarity criteria to make issue trade-offs. Journal of
Artificial Intelligence, 142(2):205 -- 237, 2003.
[9] W. H. Green. Econometric Analysis. Prentice Hall,
New Jersey, 1993.
[10] J. O. Kephart and S. A. Fay. Competitive bundling of
categorized information goods. In Proceedings of ACM
EC'00, 2000.
[11] M. Klein, P. Faratin, H. Sayama, and Y. Bar-Yam.
Negotiating complex contracts. Group Decision and
Negotiation, 12:111 -- 125, 2003.
[12] A. Mas-Collel, M. D. Whinston, and J. R. Green.
Mircoeconomic Theory. Oxford University Press, 1995.
[13] M. Molina. An intelligent sales assistant for
configurable products. In Zhong, N. (et al.), editor,
Proceedings Web Intelligence 2001, volume 2198 of
LNAI, pages 596 -- 600. Springer-Verlag, Berlin, 2001.
[14] P. Resnick and H. R. Varian. Recommender systems.
Communications of the ACM, 40(3):56 -- 58, 1997.
[15] A. Rubinstein. Perfect equilibrium in a bargaining
model. Econometrica, 50(1):97 -- 109, January 1982.
[16] R. L. Schmalensee. Gaussian demand and commodity
bundling. Journal of Business, 57(1):S211 -- S230,
January 1984.
[17] D. J. A. Somefun, E. Gerding, S. Bohte, and J. A.
La Poutr´e. Automated negotiation and bundling of
information goods. In J. A. Rodriguez-Aguilar (et al.),
editor, Proceedings of Agent Mediated Electronic
Commerce V, volume 3048 of LNAI. Springer-Verlag,
Berlin, 2004.
[18] D. J. A. Somefun, T. B. Klos, and J. A. La Poutr´e.
Negotiating over bundles and prices using aggregate
knowledge. In Proceedings 5th International
Conference on Electronic Commerce and Web
Technologies, volume (forthcoming) of LNCS.
Springer-Verlag, Berlin, 2004.
[19] D. J. A. Somefun and J. A. La Poutr´e. Bundling and
pricing for information brokerage: Customer
satisfaction as a means to profit optimization. In
Proceedings of Web Intelligence 2003, pages 182 -- 189.
IEEE Computer Society, 2003.
[20] V.-W. Soo and S.-H. Liang. Recommending a trip
plan by negotiating with a software travel agent. In
M. Klusch and F. Zambonelli, editors, Proceedings
CIA 2001, volume 2182 of LNAI, pages 32 -- 37.
Springer-Verlag, Berlin, 2001.
[21] R. S. Sutton and A. G. Barto. Reinforcement
Learning: An Introduction. Adaptive Computation
and Machine Learning. The MIT Press, Cambridge
Massachusetts, 1998.
|
1901.04585 | 1 | 1901 | 2019-01-09T13:19:14 | Agent-Based Modelling Approach for Distributed Decision Support in an IoT Network | [
"cs.MA"
] | An increasing number of emerging applications, e.g., internet of things, vehicular communications, augmented reality, and the growing complexity due to the interoperability requirements of these systems, lead to the need to change the tools used for the modeling and analysis of those networks. Agent-Based Modeling (ABM) as a bottom-up modeling approach considers a network of autonomous agents interacting with each other, and therefore represents an ideal framework to comprehend the interactions of heterogeneous nodes in a complex environment. Here, we investigate the suitability of ABM to model the communication aspects of a road traffic management system, as an example of an Internet of Things (IoT) network. We model, analyze and compare various Medium Access Control (MAC) layer protocols for two different scenarios, namely uncoordinated and coordinated. Besides, we model the scheduling mechanisms for the coordinated scenario as a high level MAC protocol by using three different approaches: Centralized Decision Maker, DESYNC and decentralized learning MAC (L-MAC). The results clearly show the importance of coordination between multiple decision makers in order to improve the accuracy of information and spectrum utilization of the system. | cs.MA | cs | Agent-Based Modelling Approach for Distributed
Decision Support in an IoT Network
Merim Dzaferagic, M. Majid Butt, Senior Member, IEEE, Maria Murphy, Nicholas Kaminski,
and Nicola Marchetti, Senior Member, IEEE
1
9
1
0
2
n
a
J
9
]
A
M
.
s
c
[
1
v
5
8
5
4
0
.
1
0
9
1
:
v
i
X
r
a
Abstract -- An increasing number of emerging applications,
e.g., internet of things, vehicular communications, augmented
reality, and the growing complexity due to the interoperability
requirements of these systems, lead to the need to change the
tools used for the modeling and analysis of those networks.
Agent-Based Modeling (ABM) as a bottom-up modeling approach
considers a network of autonomous agents interacting with
each other, and therefore represents an ideal framework to
comprehend the interactions of heterogeneous nodes in a complex
environment. Here, we investigate the suitability of ABM to model
the communication aspects of a road traffic management system,
as an example of an Internet of Things (IoT) network. We model,
analyze and compare various Medium Access Control (MAC)
layer protocols for two different scenarios, namely uncoordinated
and coordinated. Besides, we model the scheduling mechanisms
for the coordinated scenario as a high level MAC protocol by
using three different approaches: Centralized Decision Maker,
DESYNC and decentralized learning MAC (L-MAC). The results
clearly show the importance of coordination between multiple
decision makers in order to improve the accuracy of information
and spectrum utilization of the system.
Index Terms -- Agent-Based Modelling (ABM), Internet of
Things (IoT), Complex Communications Systems (CCS)
I. INTRODUCTION
In the context of this study, a complex system is defined
as any system featuring a large number of interacting com-
ponents (agents, processes, etc.) whose aggregate activity is
nonlinear (not derivable from the summations of the activity of
individual components) and typically exhibits hierarchical self-
organization under selective pressures [1]. Considering this
definition of complex systems, the next generation of com-
munication networks (e.g., Internet of Things (IoT), cellular
networks, vehicular networks) can be regarded as a complex
system due to growing number of technologies and connected
devices. Complexity in decision making (scheduling, routing)
for a large IoT system requires new modeling and decision
making tools and methodologies, which motivates the study
of complex systems science (CCS) [2], [3]. The tools used
to model and analyze these networks must evolve in order
to optimally utilize the available resources (e.g., spectrum,
processing power) at affordable complexity.
Merim Dzaferagic Maria Murphy, Nicholas Kaminski and Nicola Marchetti
are with CONNECT center for future networks, Trinity College Dublin,
Ireland. Email:{dzaferam, nicola.marchetti}@tcd.ie.
M. Majid Butt is with School of Engineering, University of Glasgow, UK.
Email: [email protected].
This publication has emanated from research conducted with the financial
support of Science Foundation Ireland (SFI) and is co-funded under the
European Regional Development Fund under Grant Number 13/RC/2077.
Agent-Based Modeling (ABM) is a bottom-up method of
modeling that considers a network of autonomous agents. Each
agent has its own set of attributes and behaviors. These be-
haviors describe how the agents interact with other agents and
their environment. If needed, the agents can exhibit learning
capabilities that allow them to adapt to changes in the system,
altering the internal attributes and the behaviors towards other
agents. Therefore, ABM is suitable to model complex systems
[4] -- [6] that would require large computational complexity to
be modeled otherwise.
ABM has previously been used to model a wide range of
applications in sectors such as ecology, biology, telecommu-
nications and traffic management. Some examples include:
[7] where ABM is used to model
intra-cellular chemical
interactions, and [?] to analyze the parking behaviors in a city.
Recently, ABM has been used to solve various complex
problems in telecommunication networks. The authors of
[9] show that a cognitive agent-based computing modeling
approach, such as ABM, is an effective approach to model
complex problems in the domain of IoT. Our work examines
the use of ABM to model an IoT network that requires dis-
tributed decisions. The IoT network in question is a road traffic
management system that adjusts the timing of traffic lights
based on the amount of vehicles waiting at an intersection. Our
focus is on the modeling of the communication aspects of the
system and in particular we want to analyze the impact of the
Medium Access Control (MAC) protocol on the application
itself, i.e., the timing of traffic lights.
Many applications of ABM in the telecommunications in-
dustry have focused on economic and social aspects, such
as consumer behavior. In [10], the authors model the cus-
tomer behavior in a telecommunication network. Also,
in
[11], ABM is used to analyze the wireless cellular services
market. There have been quite a few applications of ABM that
model the network itself. In [12], the authors describe how
ABM can be applied to model spectrum sharing techniques
in future 5G networks. The authors model a system that
considers economical, technical and regulatory considerations
when leasing spectrum. The agents are able to remember
what spectrum sharing conditions were beneficial for them
previously and learn/adapt based on their previous choices.
The authors of [13] analyze the spectrum frequency trading
mechanism by modeling the heterogeneous nodes as agents in
an ABM framework. The motivation for ABM came from the
emergence of structures, patterns and unexpected properties.
ABM allowed them to model and understand market models
with dynamics that are beyond the scope of familiar analytical
formulations, such as differential equations.
Other applications of ABM to communication networks are
presented in [14] -- [16]. The authors of [14] analyze the effec-
tiveness of ABM to model self-organization in peer-to-peer
and ad-hoc networks. They also outline the limitations of using
current modeling and simulation software. Their work shows
that tools such as OMNET++, Opnet and specialized tools
such as the Tiny OS Simulator are limited as they tend to focus
solely on computer networks. Interactions with humans and
mobility cannot be modeled with enough flexibility. Network
parameters can be easily modified but other conditions are
difficult to be considered. The authors highlight the flexibility
of an ABM approach, showing how easily the system can
be updated and allow for powerful result abstraction. In
[15], the authors analyze a decentralized spectrum resource
access model as a complex system, modeling the decentralized
decision making and cooperation of distributed agents in a way
that allows them to partially observe the state of the system,
meaning that each agent has only the information about its
own local environment. The authors of [16] introduce an ABM
framework to formally define all necessary elements to model
and simulate a Wireless Sensor Network (WSN). As a proof
of concept, they demonstrate the application of the framework
to a model of self-organized flocking of animals monitored by
a random deployment of proximity sensors. By proving the
applicability of ABM to WSNs, this paper provides further
motivation to the current study.
Many studies have been carried out to try to optimize traffic
flow (specifically in urban areas) using WSN. For example, in
[17], [18] and [19], sensor networks for monitoring traffic are
proposed. The authors of [20] -- [22] use ABM for traffic opti-
mization and simulation. Reference [20] describes an ABM
solution to generate personalized real-time data to present
route information to travelers. The authors in [21] model the
effect of an increasing population on traffic congestion. In [22]
a detailed traffic simulator using NetLogo was designed. It
analyzes the effect on traffic congestion when various different
lanes of traffic are introduced. Though, the work presented in
those papers provide motivation to our work, their focus lies in
the functionality and optimization of the traffic light systems
and not on the modeling and analysis of the communication
aspects of the related sensor network.
Due to the suitability of the ABM approach to model large
systems composed of autonomous decision making entities, we
believe that ABM is a perfect match to model and analyze the
problem addressed by this paper, i.e., road traffic management
system. ABM allows us to model individual agents and the
effect that those agents have on their local environment, and as
a result we can observe the cumulative/system level behavior
that results from the agents interacting with each other and
with the environment. The beauty of this approach is that
by modeling the interactions and their effects locally, we
actually model a complex decision making system which is
decentralized in nature. It may not be optimal as compared
to centralized decision making entities, but it provides a low
complexity decision making framework.
Building on the preliminary work in [23], we have proposed
a comprehensive analysis of an ABM approach to model
2
Fig. 1: Each agent can interact with the environment or other
neighbors in its neighborhood. Agents also have a set of
static and dynamic attributes storing the properties of the
agent and its knowledge about the surrounding agents and the
environment. The simple rules that an agent is following are
encoded in the methods.
a traffic intersection system. The main contributions of this
article are summarized as:
• We demonstrate the use of ABM to model the commu-
nication aspects of IoT networks;
• We investigate the impact of different MAC protocols
on the accuracy of information gathered by the sensor
network;
• Using ABM, we evaluate the spectrum utilization of
different MAC protocols (i.e., TDMA, slotted Aloha and
CSMA/CA) in a multi-layered network configuration;
The rest of the paper is organized as follows. Section
II presents the description of the model, and outlines the
algorithms and MAC protocols that are implemented in the
Mesa framework. In Section III, we present the methodology
used for the analysis and discuss the results gathered from the
simulations. In Section IV, we elaborate on the main findings,
and draw the overall conclusions on the work.
II. DESCRIPTION OF MODEL
A. Agent Based Modeling Framework
We first define the fundamental terms used in ABM.
Definition 1 (Agent). An autonomous computational object
with particular properties and capable of particular actions
is called an agent.
Agents are completely autonomous entities in their decision
making. As shown in Figure 1, every agent has a set of
attributes and methods that define how and with whom it can
interact. This defines the topology of an ABM system. Not
all the agents are connected with each other; instead an agent
is connected with a particular set of agents, called neighbors,
who influence its localized decision making.
Definition 2 (Environment). A set of entities that influence the
behavior of an agent constitute the environment for an agent.
AgentAttributes: §Static:name, initial state, …§Dynamic:memory, resources, neighbors, environment state, …Methods:•Behaviors•Rules to update the behavior•Rules to update dynamic attributes•…Other AgentsEnvironment3
Algorithm 1 Model
Tc ← Current Tick number
Tmax ← Tick number limit
repeat
Set tick number to 0
for each existing vehicle do
if no car in front and green light then
Move forward
if random number < probability of new vehicle then
Create new vehicle
while Tc < Tmax or Transmission not succ. do
Sensor attempt to transmit
Increment Tc
if Tc == Tmax then
DM make decision
do not focus on the optimization algorithms related to the
vehicle traveling time, we rather focus on the analysis of the
communication aspects of the sensor network that collects the
information about the traffic. In Figure 2, the traffic lights
appear red and green in colour. The red colour symbolises
that traffic should stop when it reaches the traffic light. The
green colour represents that the vehicles are free to move past
the traffic light.
The model description is outlined with the Algorithm 1.
The tick number limit (Tmax) is a user defined parameter,
that allows us to define the upper time limit for the sensor
transmission attempts and at
the same time the decision
making interval of the DM agent. One tick is equivalent to
a transmission time slot on the MAC layer. Since we dedicate
one tick to the movement and generation of the vehicles and
one additional tick for the DM decision making function, the
number of ticks that is dedicated for the transmission of the
measurements (Ttrans) is calculated as:
Ttrans = Tmax − 2
(1)
As shown in Algorithm 1, each car that is currently on the
grid will attempt to move one space forward in each simulation
iteration (one iteration takes Tmax ticks). For simplicity sake,
the vehicles will always travel in a straight line. If there is
already another vehicle in the space a certain car intends to
move to or the space in front of that, it will not be allowed
to move forward. This prevents vehicles from colliding with
each other or travelling too close to each other. Vehicles are
also prohibited from moving if they are close to a traffic light
in their trajectory and the traffic light is red.
Each simulation iteration involves the creation of new
vehicles on the grid. The number of vehicles added to the grid
depends on the user defined parameter (prob. of new vehicle).
Vehicles will only be initialized on the edges of the grid
either traveling north, south, east or west. The initial position
of the newly generated vehicles is chosen randomly (i.e.,
uniformly sampled from a list of all available positions). If
there is already a vehicle currently blocking the placement of
the newly generated vehicle, the newly generated vehicle will
be discarded. Once the vehicles are placed on the grid and
Fig. 2: The sensors are represented by the black dots surround-
ing the perimeter of the road. The green and red dots are traffic
lights. The vehicles are represented by yellow squares, and the
DM is represented by a blue square in the upper right section.
Figure 1 shows that agents interact not only with other
agents but also with the environment.
To model a problem using ABM, we have to define the
agents, the environment as well as associated methods and
interactions in a way that reflects the original problem. It
should be noted that the goal of our ABM approach is not
to optimize the system, but to model the system as accurately
as possible. The goal is to model the distributed optimization
mechanisms that would converge reasonably to optimized
solution by modeling the interactions of a decentralized system
such that the complexity remains manageable.
B. Road Traffic ABM Model
In order to explain the model (i.e.,
the agents and the
environment of the ABM model), we start with the single
intersection of roads. The visualization of this model is shown
in Figure 2. The environment of our model is represented by
the road. The agents in our model are:
• sensors
• traffic lights
• vehicles
• Decision Maker (DM)
This single intersection model contains 20 sensors. The sensors
are represented by the black dots surrounding the perimeter of
the roads. There are four traffic lights. These can be seen as the
red/green dots near the center of the image. The yellow squares
in Figure 2 symbolize vehicles traveling on the road.1 The
blue square in the upper right section of the image represents
a central DM that will be responsible for managing the timing
of the traffic lights in the model.
The interaction between the sensor agents and the envi-
ronment (the road) is modeled by the collection of traffic
measurements. Those measurements represent the number of
vehicles approaching the intersection. Once a sensor observes
a vehicle approaching the intersection it tries to transmit this
information to the DM.
The DM controls the timing of the four traffic lights with
the aim of optimizing the waiting time of the vehicles traveling
through the intersection. It is important to notice that we
1It should be noted that
the vehicles follow UK and Ireland driving
conventions and travel on the left-hand side of the road.
the existing vehicles move according to the above mentioned
rules, the sensors collect the vehicle position information and
attempt to convey those measurements to the DM. The sensors
detect stopped vehicles by remembering the grid space where
vehicles were detected in the previous cycle. If this grid space
is still occupied by the same vehicle in the current cycle, that
means that the vehicle has stopped moving. On the other hand,
if the grid space is no longer occupied, the vehicle has moved
on. We model the MAC layer protocols (i.e., TDMA, slotted
Aloha and CSMA/CA) for the communication between the
sensors and the DMs, and in the case of multiple intersections
we also model the communication between the DMs (TDMA
like scheduling). It is important to keep in mind that the
implemented model is discrete (the time is divided into slots of
equal duration). Each sensor can only transmit at the beginning
of a slot. The chosen MAC protocol defines how to deal
with potential collisions. A collision happens in case a sensor
attempts to transmit in the same slot as one of its neighbors.
A neighboring sensor is the one that is in the selected sensor's
Moore neighborhood. The Moore neighborhood represents the
8 grid spaces surrounding the selected sensor's grid space.
Hence, a sensor transmission is affected by the transmission
of sensors in all directions, including diagonals.
In our analysis we consider three MAC protocols for the
communication between the sensor nodes and the DMs, i.e.,
slotted Aloha, TDMA and CSMA/CA. Slotted Aloha deals
with collisions by introducing back-off time, meaning that
in case two neighboring sensors try to transmit at the same
time, both transmissions will be unsuccessful and the sensors
will choose a random back-off time to retry the transmission.
The Aloha protocol also introduces a timeout time, which in
case it is reached without a successful transmission implies
that the packet should be discarded. As opposed to the Aloha
protocol which does not involve any type of synchronization
between the nodes and therefore, potentially leads to packet
collisions, the TDMA protocol is implemented by allowing
the DM to assign each sensor a specific time slot for packet
transmissions. The centralized coordination, results in a colli-
sion free environment, if only one DM exists (i.e., the single
intersection of roads scenario). In case multiple DMs are
managing the communication of their sensors (i.e., Figure
4), we have to introduce some type of coordination between
the DMs to avoid potential packet collisions. The CSMA/CA
protocol, like Aloha, is an opportunistic approach. If a sensor
has information to send, it first checks if any of its neighbours
is currently using the spectrum resource. If the resource is
currently being used, a back-off time will be computed. If
the resource is not being used, the packet will be transmitted
collision free and the DM will send an acknowledgment packet
back to the sensor node to confirm the reception of the packet.
It should be noted that the model assumes that there are
no hidden nodes. Therefore, all potential collisions will be
successfully sensed before transmission.
As shown in Algorithm 1, the final time slot of each cycle
is reserved for the DM entity to make a decision. The DM
analyzes the information received from the sensors and based
on that controls the timing of the traffic lights. The traffic
lights follow a strict set of rules, that can be summarized with
4
T < 9
State 0
T < T1
State 1
State 2
T < T2
Fig. 3: Traffic Light Finite State Machine describes the tran-
sition of the traffic lights between the three predefined states.
the finite state machine shown in Figure 3. The traffic lights
can be configured to be in one of three different states - State
0, State 1 and State 2. Figure 2 shows the system in State
1, allowing cars traveling eastwards and westwards to pass.
In State 0, all traffic lights are red, and hence no vehicles
are allowed to pass through any traffic lights. State 2 allows
only vehicles traveling northbound or southbound to pass. The
DM determines how long the traffic lights stay in a certain
state, i.e., the DM based on the collected sensor information
calculates the values of T1 and T2 in Figure 3. Figure 3 also
shows that between each transition of State 1 and State 2, a
period of 9 cycles in State 0 takes place. This period allows
all traffic that has recently passed through the traffic lights to
safely clear the intersection, preventing collisions with vehicles
coming from other directions.
As previously mentioned, if we consider a more complex
scenario (i.e.,
the four neighboring intersections scenario),
we have to introduce coordination between the DMs. Again,
our focus is not
the coordination of the decision making
functionalities of the DMs in order to optimize the traffic
flow. Therefore, the states of the traffic lights are completely
independent from each other. We focus on the optimization of
the communication aspects of this scenario, meaning that the
DMs coordinate the transmission time slots for their sensors
in order to minimize the number of collisions. As shown in
Figure 4, each intersection has 20 sensors, 4 traffic lights and
one DM. The vehicles can now be generated in more locations
compared to the basic model (i.e., one intersection model).
We also define a neighbor radius set, that defines the distance
between two sensors within which their transmissions could
result in collisions.
In order to coordinate the transmissions for neighboring
intersections we introduce a higher MAC layer, that schedules
DMs in a TDMA like manner. Each DM gets its own dedicated
time slot for the communication with its own sensors. We also
introduce a relation between the higher and lower MAC layer
time slot lengths. One slot on the higher MAC layer is the
equivalent of 20 slots on the lower MAC layer. The lower
MAC layer protocols are described previously (i.e., slotted
Aloha, TDMA and CSMA/CA), whereas the higher MAC
layer uses one of the following three approaches to coordinate
the communication amongst multiple DMs: (1) Centralized
Decision Maker, (2) Decentralized L-MAC and (3) DESYNC.
equal to 10. However, using equation (2) it results in Tm = 5.
Therefore, if Tp or Tn is greater than the current firing slot
number, the following equation should be used:
(cid:106) Tp + Tn + Tr
(cid:107)
Tm =
2
5
(3)
Fig. 4: A four intersections model, showing all the sensors
(black), traffic lights (red and green), vehicles (yellow) and
decision makers (blue) that are part of our model.
C. Centralized Decision Maker
The approach that involves a Centralised Decision Maker
this centralized node has all
(CDM) entity assumes that
involved DMs. The
the information needed to control all
centralized node needs to know how many time slots should
be assigned to each DM and how to synchronize the activation
of all DMs. As mentioned previously, our approach schedules
20 time slots, using a selected protocol - either TDMA, slotted
Aloha or CSMA/CA, per DM in a round robin fashion.
D. Decentralized L-MAC
This approach allows us to coordinate the transmission
among multiple DMs by implementing a decentralized TDMA
schedule by using the L-MAC protocol outlined in [24]. Each
DM defines a probability vector of length C where C is the
available number of time slots in a round. Initially, each DM
chooses a transmission slot with equal probability. Based on
the success and failure rate of transmission for the chosen
transmission slot, the probability vector for each DM gets
updated to allow a more intelligent choice of slots in the next
round. The result of this is a collision-free schedule, provided
that the number of DMs is less than C.
E. DESYNC
The DESYNC algorithm is described in [25]. Each DM
initializes a slot for the communication with its sensor nodes.
Each DM also listens for messages that are transmitted by
other DMs and stores the timestamps of transmissions that
occurred before and after its own slot. This information is
used by the DMs to adjust their own slot, by computing the
midpoint between the previous and next slot. The method
described in [25] is concerned with a continuous model. We
had to adapt
this in order to fit our discrete model. The
midpoint (Tm) between the previous (Tp) and next (Tn) time
slot is computed as,
(cid:106) Tp + Tn
(cid:107)
2
Tm =
(2)
Equation (2) was further adapted to deal with the periodic
nature of our timestamps (i.e., time cycles). For example, let
us assume that the round time is Tr = 10, Tp = 8, and Tn = 2.
The midpoint slot (Tm) calculated for the next round should be
This ensures that each DM will position itself in the midpoint
slot between the DMs transmitting before and after it, resulting
in a collision free TDMA schedule.
III. SIMULATION STUDY
The model was built using the ABM Python library Mesa
[26]. Mesa is an open source framework that is built with
the functionality of popular ABM simulation software such as
NetLogo, Repast and Mason. Mesa's "DataCollector" module
allows us to easily collect data from the agents in the model
at specified intervals. Mesa enables us to visualize the entire
system at each simulation step, helping with the debugging
and verification of the traffic lights finite state machine.
In this section, we present the simulation results for both
scenarios: (1) uncoordinated and (2) coordinated. The results
are generated for a varying range of input parameters, such
as selection of MAC protocols, number of time slots available
for the DMs on the higher MAC layer and neighbor radius.
The results are evaluated using the accuracy of information
and the spectrum utilization as criteria.
The accuracy of the information received by the DMs is
important to the overall functionality of the system. The actual
number of vehicles waiting at a given moment at the traffic
lights is denoted by NW . The number of vehicles that has
been registered by the sensor nodes is denoted by NS, and
the number of vehicles that has been reported to the DM is
NDM . Since we focus on the communication aspects of the
system, we assume perfect sensing implying NS = NW . We
define accuracy of information as,
A = NDM − NS,
(4)
which implies that the accuracy of information is the difference
between the number of vehicles reported to the DM and
the actual number of vehicles waiting at the traffic lights.
A positive error (A > 0) means that the DM believes that
there are more vehicles waiting than the actual figure. A
negative error (A < 0) means that the DM believes that there
are less vehicles waiting than the actual ones. This data is
collected once every cycle before the DM action step outlined
in Algorithm 1. Since we assume perfect sensing (NS = NW ),
any discrepancies can be attributed to interference within the
system, i.e., collisions of packets transmitted from neighboring
nodes in the same tick.
The spectrum utilization is a metric that allows us to
understand what proportion of the available information in
the system is actually transferred to the DM in order to make
a more informed decision about the traffic light states. For
example, if there are 5 vehicles waiting, the total amount of
information/packets that should be available at the DM is 5.
If 2 sensors successfully utilize the spectrum, the utilization
is 40%. Therefore, if the number of successfully transmitted
6
Fig. 6: Spectrum Utilization - showing how much of the
available information in the system is actually transferred to
the DM in order to make a more informed decision about
traffic light system.
information about a significant number of vehicles waiting on
the lights (NDM << NS).
The model using the CSMA/CA protocol does not suffer
from any negative errors. As expected the number of positive
errors increases with the increasing level of traffic. The reason
for this stems from the increased number of sensors attempting
to transmit packets when there is a higher traffic level. When
the traffic lights change state, there is a sudden reduction in
the amount of packets competing for spectrum access as the
vehicles begin to move. This leads to an increased amount
of packets reaching the DM with inaccurate information
(NDM >> NS).
As previously mentioned, we also calculate the spectrum
utilization as shown in equation (5). The results in Figure 6
are obtained over 104 simulation steps on a two intersection
model. Considering the uncoordinated nature of the scenario
(2 DMs that are not aware of each others scheduling decisions)
40 ticks are assigned for the sensors to transmit the vehicle
detection information per cycle. We up-scaled the model (from
one to two intersections) in order to increase the range of
neighboring radii. We vary the neighbor radius from 5 to 25.
All the scenarios assume an intermediate traffic level, i.e., a
0.5 probability of a car being generated each cycle.
Figure 6, as expected, shows that TDMA exhibits the lowest
spectrum utilization. However, it is not affected as much by
neighbour radius. When the neighbour radius is large, there is
a low probability that two sensors from different intersections
within the same neighbour radius would be scheduled for
the same tick, both having vehicles waiting at them. Hence,
the spectrum utilisation for the TDMA protocol remains
fairly constant regardless of the neighbor radii. CSMA/CA
displays the greatest spectrum utilisation in all variations of
neighbor radii. This is due to the "sensing first - transmitting
if available" policy of the CSMA/CA protocol. This allows
sensors to avoid collisions of packets by sensing the collision
before it occurs and backing off for a random period of time.
In comparison to this, slotted Aloha demonstrates a relatively
high spectrum utilization when the neighbor radius is low. The
increase of the neighbor radius leads to the increasing number
of collisions (due to lack of coordination and sensing), which
Fig. 5: Accuracy of Information for the single intersection of
roads scenario. The neighbor radius is set to 15.
packets in a cycle is denoted with Nsucc and the actual number
of vehicles waiting at the traffic lights is NW , the spectrum
utilization is calculated as:
U =
Nsucc
NW
(5)
A. Uncoordinated Scenario
The uncoordinated scenario assumes that
the DMs are
not aware of each other's scheduling decision, meaning that
increasing the number of neighboring intersections will lead
to an increase in the number of collisions, due to the lack of
coordination between the neighboring DMs.
Figure 5 shows the average value of the accuracy of
information gathered over 104 simulation steps for the single
intersection of roads scenario. The neighbor radius is set to
15, meaning that sensors that are within 15 hops away can
potentially interfere with each other.
Figure 5 highlights that the choice of protocol and level
of traffic affect the accuracy of information received by the
DM. Regardless of traffic level, the model using the TDMA
protocol make transmissions with zero error, resulting in
highly accurate results. In a single intersection model, each
sensor is allocated its own time slot to send. Therefore, there
are no collisions of packets in a slot, resulting in highly
accurate data transmission to the DM. Thus, the DM is always
aware of exactly how many vehicles are currently waiting.
When there is low traffic,
the model using the slotted
Aloha protocol is seen to have a number of positive errors.
The positive errors are due to backed off sensor packets
being transmitted when they no longer reflect the state of
the system (i.e., a collision happens, all
involved sensors
decide to retransmit the packets and in the meantime, the
traffic lights change state and the number of vehicles waiting
changes). The DM is not aware that the received information
is stale and therefore continues to control the timing based
on inaccurate information. The accuracy of information for
the slotted Aloha protocol changes as the number of vehicles
waiting grows. This is due to the fact that with the increasing
number of waiting vehicles the number of sensors trying to
transmit their measurements increases. The increased number
of transmissions results in an increasing number of collisions,
leading to the case in which the DM does not have the
7
Fig. 8: DESYNC T=6
(a)
(b)
Fig. 9: L-MAC (a) C=4 (b) C=6
the DESYNC protocol. Initially, the DMs choose a random slot
in the schedule with equal probability. This is in contrast to the
DESYNC protocol where nodes are assigned a starting point.
If there is a collision in a slot, the DM will choose a slot
again in the next round with updated probabilities. If the DM
is successful in a slot, it will choose the same slot again in
the next round with a higher probability.
Figure 9a shows the convergence of the system to a colli-
sion free configuration. Each node that experiences collisions
continues to rearrange itself, until a collision free schedule is
reached. In Figure 9a, if we take a closer look at DM3, we
see that due to a collision free assignment in a previous slot,
the node decides to stick with the chosen slot even after it
experiences collisions.
As proven in [24], the system can converge with any round
time that is greater than the number of available DMs. For the
sake of comparison with the DESYNC protocol, in Figure 9b,
we show that the L-MAC protocol can converge with a round
time of 6. However, the L-MAC protocol does not consider
the spacing of the nodes around the ring.
Increasing the round time leads to an increasing number of
idle slots, which implies that the probability of a node initially
choosing slots without collisions increases as well. That results
in a shorter convergence time. Though very unlikely, it is
still possible that the DMs randomly choose a collision free
schedule on initial selection with any number of slots in a
round greater or equal to the number of DMs.
Similar to the approach adopted to analyze the uncoordi-
nated scenario, we will focus on the analysis of the accuracy
of information and the spectrum utilization for the coordinated
scenario. The coordinated scenario can be implemented by
using any of the abovementioned high layer MAC protocols.
The number of time slots available on the higher MAC layer
is set to four, meaning that all mentioned higher level MAC
protocols would converge to the same arrangement. We used
(a)
(b)
Fig. 7: DESYNC (a) T=4 (b) T=8
results in lower spectrum utilization.
B. Coordinated Scenario
The coordinated scenario assumes that the DMs are aware
of each other's scheduling. As previously explained, in order
to coordinate the scheduling mechanisms of the DMs, we
introduce a higher MAC layer. The coordination is achieved by
either a Centralised Decision Maker, DESYNC or the L-MAC
protocol. The operation of the Centralised Decision Maker
is obvious - manually configured time slots for each DM.
Therefore, we are going to explain in more detail how the
DESYNC and L-MAC protocols achieve the best time slot
assignment on the higher MAC layer.
1) Desync Algorithm: DESYNC algorithm relies on the fact
that each node in the system performs a task periodically.
Depending on the length of the cycle, the convergence of
the system can display different behavior. Figure 7a depicts a
simple scenario in which four DMs coordinate their commu-
nication periods. The ring represents the value of T , the total
time taken for a full round to be completed. A colored circle
with a number in the middle represents the DM, that assigned
a time slot. An empty circle represents a slot where no DM
is assigned and therefore remains idle. A round time of four
is chosen for this simulation. Each node is given a unique
starting point. The system executes the DESYNC algorithm.
However, since the nodes are already maximally spaced apart,
no further movement takes place.
A round time of 8 is chosen in the next example. Figure
7b shows that all the nodes representing the DMs start close
to each other in a round. The DESYNC algorithm allows the
nodes to rearrange themselves around the ring so that they are
maximally spaced apart, and that is when the system converges
(last image in Figure 7b).
The next example is configured with a round time of 6
(Figure 8). Theoretically, there is no possible configuration to
ensure maximal spacing between the DM time slots. There-
fore, the system never converges. Figure 8 shows that the
nodes continue to rearrange themselves in such a way that a
circular pattern emerges. The nodes rotate counter-clockwise
around the ring. This implies that a round time should be
chosen such that the number of DMs is a factor of the round
time.
2) L-MAC Protocol: The method used by the L-MAC pro-
tocol to implement a TDMA schedule is quite different from
8
Fig. 10: Absolute Error - the data is obtained from simulations
of the four intersection model; traffic level is set to medium;
the neighbor radius is set to 10.
L-MAC in our simulations. The higher-lower MAC level time
slot length has the ratio of 1:20, meaning that for every higher
level MAC time slot allocated to a DM, the equivalent of 20
lower MAC ticks for sensor transmissions is available. Figure
10 shows the absolute error (absolute value of the accuracy
of information). The data used in Figure 10 is obtained from
simulations of the four intersections model. The traffic level
is set to medium, i.e., a vehicle will be generated with the
probability 0.5 in each cycle. The neighbor radius is set to
10. Figure 10 depicts the average spread of the absolute error
observed over 10 simulations with 5000 simulation steps each.
The absolute error is used in this case as it is not our intention
to imply a median error close to zero. The TDMA results
are not shown in Figure 10, because TDMA results in an
average spread of zero for both uncoordinated and coordinated
scenarios. The data in Figure 10 is shown in the form of a box
plot. The upper extreme of the error bars show the average
maximum absolute error, the lower extreme of the error bar
shows the minimum average absolute error. The upper lines of
the boxes in the graph represent the upper quartiles, the lower
lines represents the lower quartiles. The lines in the centers of
each box represents the median values of the absolute error.
Figure 10 shows that the introduction of the higher MAC
layer can greatly reduce the average absolute error for both
CSMA/CA and slotted Aloha. The introduction of coordina-
tion reduced the average maximum absolute error from 3.9 to
1.1 for CSMA/CA and from 4 to 2.6 for slotted Aloha. The
average median absolute error was also reduced from 0.3 to 0
for CSMA/CA and from 0.5 to 0 for slotted Aloha. The reason
for the reduction in the absolute error lies in the influence of
the higher MAC layer scheduling procedures. Sensors can only
transmit data to the target DM when the target DM is selected
by the higher MAC layer. This decreases the problem of stale
data. Since the ABM approach allows us to analyze each time
step of the discrete simulation, the analysis of the log files
shows that the majority of stale data is received immediately
after a car moving step, mostly affecting the earliest ticks in
each cycle. When a higher MAC layer is introduced, stale data
primarily affects the first DM that is selected after a movement
step. Previously, all four DMs would be affected by this stale
information. The stale information will indeed only affect the
sensors' packets that are being sent to the first DM selected
Fig. 11: Spectrum Utilization - comparison between the co-
ordinated and uncoordinated scenario, showing how much of
the available information in the system is actually transferred
to the DM.
after a movement step, as the selected DM will reject all other
sensor packets being transmitted to other DMs. Because each
DM is allocated its own slot, the interference from sensors
transmitting to other DMs is decreased, and thus the accuracy
of information received by the DMs is improved.
Figure 11 shows the comparison between the spectrum
utilization for the coordinated and uncoordinated scenario.
The results are gathered from the simulations of the two
intersection model over 104 simulation steps. The traffic
level is again configured to be medium. This is the same
configuration that was used to obtain the spectrum utilization
of the uncoordinated model shown in Figure 6. The L-MAC
protocol is used with a round time of two, and a higher to
lower ratio of 1:20. Therefore, after convergence these should
be no idle slots in the higher MAC layer. This choice of
parameters ensures fairness between the uncoordinated and
coordinated scenarios. Two higher MAC layer ticks in the
coordinated scenario with the ratio of 1:20 results in a total
of 40 time slots for the communication between the sensors
and the DMs. In the uncoordinated scenario, 40 time slots are
assigned for sensor transmissions in each cycle.
The results obtained from these simulations are overlaid
with the results obtained from the uncoordinated model as
shown in Figure 11. It should be noted that Figure 11 is not a
stacked bar chart, meaning that the ratio between each scenario
and the total spectrum is being analyzed. As shown in Figure
11, the spectrum utilisation is reduced when coordination is
introduced. This is due to the limitation that only sensors
transmitting to the selected DM are able to send in each
slot. The neighbor radius has a similar effect on the slotted
ALOHA and CSMA/CA protocols in the uncoordinated and
coordinated scenarios (i.e., the spectrum utilization decreases
with increasing neighbor radius). Again TDMA is not af-
fected by the neighbor radius. As previously explained, in the
coordinated TDMA scenario, each DM is assigned its own
higher MAC TDMA slot to transmit where each sensor will
then be given its own lower level MAC tick to transmit. The
spectrum utilization of TDMA in the coordinated scenario is
approximately half the spectrum utilization achieved in the
uncoordinated scenario. This is due to the rejection of packets
00.511.522.533.544.5CSMA UncoordinatedCSMA CoordinatedAloha UncoordinatedAloha CoordinatedNumber of Steps with ErrorAbsolute Error over 10 Simulations0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Neighbour RadiusSpectrum Utilisation with Increasing Neighbour Radius5 10 15 2025attempting to transmit to DMs that are not selected by the
higher MAC layer.
IV. DISCUSSION AND CONCLUSION
The increasing complexity of the next generation of com-
munication networks leads to a need to change the tools we
use to model and analyze them. The primary purpose of our
work is to investigate the possibility of using ABM as a
method of modeling an IoT network. We show that ABM is an
effective way to model the complex behavior of heterogeneous
nodes (e.g., simple sensors, traffic lights, and more powerful
decision making nodes). One of the main advantages of ABM
is its flexibility in modeling networks that does not scale
up exponentially with the size (e.g., from the simple one
intersection model, to the more complex two and four inter-
sections model). Besides, it provides opportunity to add new
features for decision coordination (e.g., the higher MAC layer
protocol to ensure coordination between the decision makers).
Human interactions (e.g. vehicles) are as easily configurable
as the network agents in the model (e.g. sensors). This feature
allowed the level of traffic and behavior of the vehicles to
be modeled as well as the operation of the network. Another
appealing quality of the ABM modeling approach is its ability
to model and collect information on a more granular level
(i.e., from all agents within the system in any time step of the
simulation).
In the models where CSMA/CA is used as the selected
MAC protocol, we assume there are no hidden nodes. If
hidden nodes were introduced, the behavior and performance
of the models using the CSMA/CA protocol could change.
Moreover, we assumed that the only interference in the model
is generated from the agents within the IoT network itself.
Although the results in Section III suggest TDMA to be
an extremely effective MAC protocol, the limitations of our
present model do not highlight the areas where TDMA can
fail. For example, if a sensor fails to transmit successfully
due to external source of interference, it has to wait for its
slot in the next cycle to transmit. As explained in Section
II, the DM uses a method of polling for a certain amount
of time before making timing decisions. If this was more
of a continuous decision making process, TDMA could be
found to be slower than the other protocols as each sensor
must wait for its time slot and for the polling phase to be
over, before transmitting. Therefore, more investigations are
necessary before concluding in a definite way that TDMA is
the best MAC protocol for the kind of application considered
in this paper and a subject of future research.
The motivation for this paper is to investigate ABM as a
tool for modeling the complexity of future networks. Building
on this work, we envision the future research to be about
modeling of complex networks where ABM can help to reduce
overhead and complexity of distributed decision making.
REFERENCES
[1] J. Grady, System Synthesis: Product and Process Design. CRC Press,
2010.
9
[2] I. Macaluso, H. Cornean, N. Marchetti, and L. Doyle, "Complex com-
munication systems achieving interference-free frequency allocation," in
Communications (ICC), 2014 IEEE International Conference on, June
2014, pp. 1447 -- 1452.
[3] I. Macaluso, C. Galiotto, N. Marchetti, and L. Doyle, "A Complex
Systems Science Perspective on Wireless Networks," Journal of Systems
Science and Complexity, no. 10, pp. 1 -- 27, 2016.
[4] C. M. Macal and M. J. North, "Tutorial on agent-based modeling and
simulation," in Proceedings of Conference on Winter Simulation, ser.
WSC '05. Winter Simulation Conference, 2005, pp. 2 -- 15.
[5] -- -- , "Tutorial on agent-based modeling and simulation part 2: How
to model with agents," in Proceedings of the 2006 Winter Simulation
Conference, Dec 2006, pp. 73 -- 83.
[6] U. Wilensky and W. Rand, An introduction to agent-based modeling:
modeling natural, social, and engineered complex systems with NetLogo.
MIT Press, 2015.
[7] M. Pogson, R. Smallwood, E. Qwarnstrom, and M. Holcombe, "Formal
agent-based modelling of intracellular chemical interactions," Biosys-
tems, vol. 85, no. 1, pp. 37 -- 45, 2006.
[8] I. Benenson, K. Martens, and S. Birfir, "Parkagent: An agent-based
model of parking in the city," Computers, Environment and Urban
Systems, vol. 32, no. 6, pp. 431 -- 439, 2008, geoComputation: Modeling
with spatial agents.
[9] S. Laghari and M. A. Niazi, "Modeling the internet of things, self-
organizing and other complex adaptive communication networks: a
cognitive agent-based computing approach," PloS one, vol. 11, no. 1,
2016.
[10] P. Twomey and R. Cadman, "Agent-based modelling of customer be-
haviour in the telecoms and media markets," Digital Policy, Regulation
and Governance, vol. 4, no. 1, pp. 56 -- 63, 2002.
[11] C. Douglas, H. Lee, and W. Lee, "A computational agent-based model-
ing approach for competitive wireless service market," Piscataway, NJ,
USA, 2011, p. 6 pp.
[12] A. Tonmukayakul and M. B. Weiss, "An agent-based model for sec-
ondary use of radio spectrum," New Frontiers in Dynamic Spectrum
Access Networks (DySPAN), 2005.
[13] D. Horv´ath, V. Gazda, and J. Gazda, "Agent-based modeling of the
cooperative spectrum management with insurance in cognitive radio
networks," EURASIP Journal on Wireless Communications and Net-
working, vol. 2013, no. 1, p. 261, 2013.
[14] M. Niazi and A. Hussain, "Agent-based tools for modeling and simu-
lation of self-organization in peer-to-peer, ad hoc, and other complex
networks," Communications Magazine, IEEE, vol. 47, no. 3, pp. 166 --
173, 2009.
[15] M. Liu, Y. Xu, and A.-W. Mohammed, "Decentralized opportunistic
spectrum resources access model and algorithm toward cooperative ad-
hoc networks," PloS one, vol. 11, no. 1, 2016.
[16] M. A. Niazi and A. Hussain, "A novel agent-based simulation framework
for sensing in complex adaptive environments," IEEE Sensors Journal,
vol. 11, no. 2, pp. 404 -- 412, 2011.
[17] S. Coleri, S. Y. Cheung, and P. Varaiya, "Sensor networks for moni-
toring traffic," in Allerton conference on communication, control and
computing, 2004, pp. 32 -- 40.
[18] M. Tubaishat, Y. Shang, and H. Shi, "Adaptive traffic light control
with wireless sensor networks," in Proceedings of IEEE consumer
communications and networking conference, 2007, pp. 187 -- 191.
[19] S. Y. Cheung, S. C. Ergen, and P. Varaiya, "Traffic surveillance with
the 12th ITS world
wireless magnetic sensors," in Proceedings of
congress, vol. 1917, 2005, pp. 173 -- 181.
[20] J. Ma, B. L. Smith, and X. Zhou, "Personalized real-time traffic
information provision: Agent-based optimization model and solution
framework," Transportation Research Part C: Emerging Technologies,
vol. 64, pp. 164 -- 182, 2016.
[21] K. Hager, J. Rauh, and W. Rid, "Agent-based modeling of traffic behav-
ior in growing metropolitan areas," Transportation Research Procedia,
vol. 10, pp. 306 -- 315, 2015.
[22] A. Lansdowne, Traffic simulation using agent-based modelling. Uni-
versity of the West of England, 2006.
[23] N. J. Kaminski, M. Murphy, and N. Marchetti, "Agent-based modeling
of an iot network," in IEEE International Symposium on Systems
Engineering (ISSE), Oct 2016, pp. 1 -- 7.
[24] M. Fang, D. Malone, K. R. Duffy, and D. J. Leith, "Decentralised
learning MACs for collision-free access in WLANs," Wireless networks,
vol. 19, no. 1, pp. 83 -- 98, 2013.
[25] J. Degesys, I. Rose, A. Patel, and R. Nagpal, "DESYNC: self-organizing
desynchronization and tdma on wireless sensor networks," Proceedings
of international conference on Information processing in sensor net-
works, pp. 11 -- 20, 2007.
[26] D. Masad and J. Kazil, "Mesa: An agent-based modeling framework,"
14th PYTHON in Science Conference, 2015.
10
|
1311.3674 | 3 | 1311 | 2019-02-19T02:09:30 | Diversity and Social Network Structure in Collective Decision Making: Evolutionary Perspectives with Agent-Based Simulations | [
"cs.MA",
"cs.NE",
"cs.SI",
"physics.soc-ph"
] | Collective, especially group-based, managerial decision making is crucial in organizations. Using an evolutionary theoretic approach to collective decision making, agent-based simulations were conducted to investigate how human collective decision making would be affected by the agents' diversity in problem understanding and/or behavior in discussion, as well as by their social network structure. Simulation results indicated that groups with consistent problem understanding tended to produce higher utility values of ideas and displayed better decision convergence, but only if there was no group-level bias in collective problem understanding. Simulation results also indicated the importance of balance between selection-oriented (i.e., exploitative) and variation-oriented (i.e., explorative) behaviors in discussion to achieve quality final decisions. Expanding the group size and introducing non-trivial social network structure generally improved the quality of ideas at the cost of decision convergence. Simulations with different social network topologies revealed collective decision making on small-world networks with high local clustering tended to achieve highest decision quality more often than on random or scale-free networks. Implications of this evolutionary theory and simulation approach for future managerial research on collective, group, and multi-level decision making are discussed. | cs.MA | cs | Diversity and Social Network Structure in Collective Decision
Making: Evolutionary Perspectives with Agent-Based
Simulations
Shelley D. Dionne,1,2,3 Hiroki Sayama,1,2,4,5 and Francis J. Yammarino1,2,3
1 Bernard M. & Ruth R. Bass Center for Leadership Studies
2 Center for Collective Dynamics of Complex Systems
3 School of Management
4 Department of Systems Science and Industrial Engineering
Binghamton University, State University of New York, Binghamton, NY 13902-6000, USA.
5 School of Commerce, Waseda University, Shinjuku, Tokyo 169-8050, Japan.
Correspondence should be addressed to Hiroki Sayama; [email protected]
Abstract
Collective, especially group-based, managerial decision making is crucial in organizations.
Using an evolutionary theoretic approach to collective decision making, agent-based
simulations were conducted to investigate how human collective decision making would be
affected by the agents' diversity in problem understanding and/or behavior in discussion, as
well as by their social network structure. Simulation results indicated that groups with
consistent problem understanding tended to produce higher utility values of ideas and
displayed better decision convergence, but only if there was no group-level bias in collective
problem understanding. Simulation results also indicated the importance of balance between
selection-oriented (i.e., exploitative) and variation-oriented (i.e., explorative) behaviors in
discussion to achieve quality final decisions. Expanding the group size and introducing non-
trivial social network structure generally improved the quality of ideas at the cost of decision
convergence. Simulations with different social network topologies revealed collective
decision making on small-world networks with high local clustering tended to achieve
highest decision quality more often than on random or scale-free networks. Implications of
this evolutionary theory and simulation approach for future managerial research on
collective, group, and multi-level decision making are discussed.
Introduction
Collective decision making plays an increasingly important role in society and
organizations today (Mannes 2009, Kerr and Tindale 2004, Dionne et al. 2010, McHugh et al.
2016, Uitdewilligen and Waller 2018, Dionne et al. 2018). In high-tech industries, for
example, the number of engineers participating in the design of a single product can amount
to hundreds or even thousands due to the increase of the product's complexity far beyond
each individual engineer's capacity, which almost inevitably results in suboptimal outcomes
(Klein et al. 2003, Braha et al. 2006, ElMaraghy et al. 2012). Another example is the online
collective decision making among massive anonymous participants via large-scale computer
mediated communication networks, including collective website/product rating and common
knowledge base formation (O'Reilly 2005, Economist 2009). In these and related cases,
1
participants and their societal or organizational structure may influence the final outcome of
decision making processes. The complexity of the process is more pronounced when the
participants are heterogeneous and are embedded in a topologically non-uniform network
with differential distribution of power, as in most organizations and social systems (Dionne et
al. 2010). The dynamics of human collective decision making in such conditions are poorly
understood, and as such pose significant challenges for the social and organizational sciences.
Evidence of these challenges exist within the leadership, psychology and organizational
behavior/management disciplines where collective dynamics, using both experimental and
applied studies, generally emphasize linear statistical relationships between specific,
narrowly defined team- or individual-level variables (Kerr and Tindale 2004, Salas et al.
2004, Dionne et al. 2012, Humphrey and Aime 2014). Traditional studies seldom account for
nonlinear dynamical processes that take place in a high-dimensional problem space and/or
non-trivial social structure where interactions occur within a networked organizational
structure. Abbott (2001) highlights this problem within the social sciences by discussing a
"general linear reality," where mainstream social science theories and methods treat linear
models as actual representations of social systems.
Examples of recent research not necessarily following a "general linear reality" to model
inherent complexity in social systems are found within the complex systems research
community, where social processes are studied using a mathematical/computational modeling
approach (Bar-Yam 1997, 2004, Braha et al. 2006, Epstein 2006, Miller and Page 2007,
Castellano et al. 2009, Dionne et al. 2010, Couzin et al. 2011, Sayama et al. 2011, McHugh et
al. 2016, Giannoccaro et al. 2018, Page 2018). Because emphasis is on emergent dynamical
behavior of systems caused by nonlinear interactions among massive numbers of parts (a
pervasive phenomenon also found in fields such as physics, biology, sociology, psychology,
economics, engineering and computer science), advances in modeling complex systems may
be applied to benefit organizational research (Carroll and Burton 2000, Schneider and Somers
2006). However, many of these complex systems models were developed in non-human
contents such as physics and biology, and thus their model assumptions often would be too
simplistic to capture the complexity of collective human decision making.
The aim of this research is to reveal how we may be able to enhance performance of
groups and other entities involved in collective human decision making by expanding
computational models of social systems to complex problem domains and by applying them
to predict the effects of individual and collective variables upon decision making
performance. Collective decision making implies a larger clustering of individuals with
interdependency based on shared expectations or hierarchy. Collectives can be complicated
structures and include individuals, groups, and even much larger social networks (Dansereau
et al. 1984, Yammarino et al. 2005, McHugh et al. 2016, Yammarino and Dionne 2018). We
seek to improve our understanding of both the dynamic nature of the collective decision
process (Waller et al. 2016), as well as the influence of diversity and social connectivity
issues related to decision making among a number of participating group members. Our
unique contributions include employing evolutionary views in understanding decision
making (Sayama and Dionne 2015), which enables a straightforward, mechanistic
explanation of many empirical findings about the effects of group composition and dynamics
on group performance. Considering specific within-group level issues regarding the
collaborative process of decision making also may offer clarity regarding the influence of
group composition on performance.
2
We first explore how evolutionary theory can address complex changes over time by
providing an explanatory framework for collective decision processes, and then discuss how
specifying a targeted level of analysis can inform appropriate interpretation and limitations of
decision making in dynamic environments. Finally, a computational agent-based model
(Epstein 2006, Miller and Page 2007, Page 2018) with an evolutionary focus on collective
decision making in groups and social networks is developed and tested, with diversity of
problem understanding, behavioral patterns and social network structure manipulated as
experimental variables. This approach is similar to Kozlowski and colleagues' (2013)
recommendations for capturing multilevel dynamics of emergence through development of a
conceptual foundation and integration of agent-based modeling as part of a theory testing
process.
Specifically, this study adapts four recommendations from Meyer et al. (2005) to advance
our theoretical understanding of collective decision making in complex social systems: 1)
consider the impact of time by constructing a dynamical simulation model; 2) study situations
in flux by situating interacting agents in a continuously changing social environment; 3)
incorporate nonlinear concepts by utilizing evolutionary theory that naturally represents
nonlinearity in the exploration of a complex problem space; and 4) design multi-level
research by taking into account within- and between-group differences as well as complex
social network topologies. These guidelines provide a starting point for investigating the
complexity of collective decision making with an evolutionary and multi-level, network-
oriented framework. Prior dynamical modeling in organizational research may have
considered the impact of time and situations in flux; few if any, however, have included
specific evolutionary and multi-level, network-oriented concepts.
Backgrounds
Evolutionary Theory and Collective Decision Making
Evolutionary theory describes adaptive changes of populations primarily by combining
mechanisms of variation and selection (Futuyma 2005, Wilson 2005). The roles of these two
mechanisms are similar to "exploration" and "exploitation" in organizational learning
literature (Cheng and Van de Ven 1996, He and Wong 2004, March 1991). In biological
evolution, variation is caused primarily by internal genetic mechanisms (e.g., mutation and
recombination) and plays an exploratory role that could potentially lead to a novel possibility
of life form, but it usually reduces immediate competitiveness of a population. In contrast,
selection is caused primarily by external environment (e.g., natural and sexual selection) and
plays an exploitative role that enhances the presence of successful entities (genes,
individuals, or groups) and eliminates unsuccessful ones, reducing the number of possibilities
while potentially improving the overall competitiveness of the population. A dynamically
maintained balance of the two mechanisms is the key to a successful evolutionary adaptation
(Mitchell et al. 1991).
We propose human decision making processes within a collective (such as a group or an
organization) also may be viewed through a similar lens, by shifting the viewpoint from
individual members' personal properties (a more traditional psychological and decision
making approach) to dynamical changes of ideas being discussed within the collective, where
populations of potential ideas evolve via repetitive operations such as reproduction,
recombination, mutation, and selection of ideas, conducted by participating human individual
members acting as the environment for the ideas (Sayama and Dionne 2015). Table 1
3
provides a summary of the evolutionary framework we propose by illustrating how some key
evolutionary theoretic concepts can be linked to components of human decision making
processes. We take this approach because evolutionary theory provides a powerful theoretical
framework that can readily address complex changes of systems over time in extremely high-
dimensional problem space, while its explanatory mechanisms (heredity, variation, and
selection) are theoretically clean-cut and easily accessible (Wilson 2005). Moreover, by
shifting the viewpoint from individuals to ideas, a model could be liberated from the
commonly used but somewhat artificial assumption that each individual always has his/her
decision in mind. Rather, various ideas developed within and among participants are
collectively reflected in the idea population, to which diverse within-individual
cognitive/behavioral patterns can be easily applied as a set of multiple evolutionary operators
simultaneously acting on the same, shared idea population. Shifting a viewpoint away from
individuals has precedence in event-level literatures as well (Hoffman and Lord 2013,
Morgeson et al. 2015).
TABLE 1
Evolutionary Concepts Applied to Corresponding Decision Making Process
Components
Evolutionary Concept
Decision Making Component
Problem space (decision space)
Potential idea (a set of choices for all aspects of the problem)
Aspect of the problem
Genetic possibility space
Genome
Locus on a genome
Allele (specific gene) on a locus Specific choice made for an aspect
Population
Fitness
Adaptation
Selection
Replication
A set of potential ideas being discussed
Utility value of a potential idea (either perceived or real)
Increase of utility values achieved by an idea population
Narrowing of diversity of ideas based on their fitness
Increase of relative popularity of a potential idea in the
discussion
Production of a new potential idea by crossing multiple ideas
Point-like change in an idea (possibly coming up with a novel
idea); can be random (unpremeditated change) or intelligent
(premeditated change)
Recombination
Mutation
Note: Adapted from Sayama and Dionne (2015)
Evolutionary Operators and Collective Decision Processes
Various human behaviors in discussion and decision making processes may be mapped to
several evolutionary operators (Mitchell 1996, Sayama and Dionne 2015; also see Table 1).
For example, advocacy of a particular idea under discussion can be considered the replication
of an idea, a form of positive selection, where the popularity of an idea is increased within the
population of ideas. Another example is criticism against an idea. Giving a critical comment
on an idea can be considered a form of negative, subtractive selection, which reduces the
popularity of the criticized idea within the population of ideas. These positive and negative
forms of selection narrow decision possibilities based on utilities ("fitness") of ideas
perceived by participants. Other human behaviors can be understood as more variation-
oriented evolutionary operators. For example, asking "what if"-type random questions
4
corresponds to random point mutation in evolution, which makes random minor changes to
existing ideas. However, such mutations may occur in a non-random, more elaborate manner
in human decision making. Humans can mentally explore several different possibilities,
assessing different "what-if" scenarios, and then share the idea with the highest perceived
utility. This can be considered an intelligent, or hill-climbing, point mutation (Klein et al.
2003) in the evolutionary framework (which is not present in real biological evolution).
Finally, the creation of a new idea by crossing multiple existing ideas can be considered a
recombination of genomes in the evolutionary framework. These variation-oriented
evolutionary operators promote exploration of various possibilities, potentially at the cost of
the utilities (fitness) of ideas.
As summarized in Table 1, we define collective decision making as an evolution of
ecologies of ideas. Participating individuals in the collective decision process have
populations of ideas that evolve via continual applications of evolutionary operators such as
reproduction, recombination, mutation, selection, and migration of ideas. This definition can
naturally be extended to a social network setting (Sayama and Dionne, 2015), in which social
ties between humans are pathways through which ideas migrate. Thus, there appears to be an
intuitive parallel between an evolutionary framework and a collective decision process.
Applying an evolutionary theory to collective decision making seems consistent with the
spirit of the Meyer et al. (2005) suggestions regarding improvement of research techniques to
better reflect situations in flux and nonlinear concepts within an evolutionary framework.
Levels of Analysis and Evolution
Evolutionary biologists Wilson and Wilson (2008) reiterate the link between adaptation
and a specific regard for levels of analysis in reviewing the history of multi-level selection
theory. Their evolutionary perspective on multi-level selection challenges researchers to
evaluate the balance between levels of selection, specifically where within-group selection is
opposed by between-group selection. This deeper view of a multi-level evolutionary process
can be applied to organizational research as well (Yammarino and Dansereau 2011).
Research on both levels of analysis within organizational behavior (Dansereau et al. 1984,
Klein et al. 1994, Dionne et al. 2014) and on group collaborative processes (Chang and
Harrington 2005, 2007, van Ginkel and van Knippenberg 2008, Yammarino et al. 2012)
highlight the importance and value of explicitly viewing the heterogeneity and/or
homogeneity of the group and/or collective. This homogeneity and heterogeneity perspective
can be viewed as a within-level examination, where the entity of interest remains the group,
but there can be at least two valid views at the collective level: homogeneity or whole groups
(what evolutionary theory refers to as a between-group focus) and heterogeneity or group
parts (what evolutionary theory refers to as a within-group focus) (Dansereau et al. 1984,
Klein et al.1994, Yammarino et al. 2005, Yammarino and Dansereau 2011). Note that, in
both views, we consider the groups in a collective decision making context in which
individual participants collaborate toward a shared goal, there is a dependency among them,
and therefore, the heterogeneity or group parts view is quite different from studying a mere
collection of different individuals that do not form a collaborative group.
The concept of differing perspectives on an entity can provide more specific insights
regarding group processes, in that phenomena of interest may be more relevant when groups
are homogeneous regarding their membership, but differ in characteristics from other groups.
In this wholes condition, all members within a group possess the same (or at least very
similar) characteristic, while in the next group all members possess some other characteristics
5
that first group perhaps did not. Another view can be taken concerning amounts of a
characteristic present, where members of a group would possess the same amount of a
characteristic, while members of the next group also would possess the same characteristic,
but all members would have more of that characteristic, or all members would have less of
that characteristic.
From a contrasting perspective, phenomena of interest may be more relevant when groups
are heterogeneous regarding their memberships. In this case, members within a group would
have varying degrees of a characteristic, and the next group also would have members with
varying degrees of a characteristic, and the same applies for all groups.
Decision Research and Levels of Analysis
Precedent for a broadly applicable modeling approach has been established in the evolving
architecture of problem-solving networks (Chang and Harrington 2007). This research
enabled consideration of a generic problem-solving environment and assessment of
emergence regularity of connectors within the problem environment. Moreover, Chang and
Harrington's research related to the modeling of both homogenous agents (2005) and
heterogeneous agents (2007) is of interest to our work. Specifically, we use homogeneity and
heterogeneity of groups as means for examining levels of analysis issues related to collective
and/or group processes.
Although Chang and Harrington's (2005, 2007) modeling examines a more multi-level
relationship between agents (individuals) and the larger environment, we are concerned with
examining a within-group, collective or collaborative decision process, where individuals
would not be considered outside of the group. Our examination of a unique within-level
evolutionary process, employing both within-group and between-group perspectives, is a
novel view of collaborative decision making and advances the understanding of a collective
environment.
A critical distinction of our research is that we are interested in examining a type of
process occurring within the group over time, not necessarily the specific variables within the
process. Dansereau, Yammarino and Kholes (1999) highlighted the nature of such research
on differing perspectives of an entity and entity changes rather than on changes in specific
variables over time. Because we are interested in the type of process occurring within the
group during decision making, we agree with Dansereau and colleagues (1999) that the
variables that characterize the level may change or remain stable, but the level of interest
remains the same (in our case, the level of interest remains the group).
Related, diversity and/or homogeneity and heterogeneity of groups and information
sharing (Gigone and Hastie 1993, Grand et al. 2016, Stasser and Stewart 1992, Uitdewilligen
and Waller, 2018) present an additional layer to the decision process that requires
consideration. Nijstad and Kaps (2007) noted that homogeneity of preferences leads to a lack
of sharing of unique information within a group, whereas preference diversity prevented
premature consensus of the group and facilitated unbiased discussions of preferences.
Lightle, Kagel and Arkes (2009) indicated individual heterogeneity in information recall may
play a role in failure to identify hidden profiles within groups. Similarly, van Ginkel and van
Knippenberg (2008) found that groups in decision tasks performed better when task
representations emphasized information elaboration and the group acknowledged they shared
the view of the task representation. These findings reinforced that groups tend to focus on
6
finding common ground and reaching consensus, but highlighted the importance of
understanding, as a group, the task representation. This shared understanding could be critical
to group success and adaptation, and as such, we include an indicator of how well group
members share a view of what constitutes the problem.
Although advancements in decision research continue, many continue to focus on
individual-level aspects related to a decision maker, such as how they adopt practical
behavior rules (Maldonato 2007) or identification of performance moderator functions that
may affect individual behaviors in simulated environments (Silverman et al. 2006). While
multi-level implications exist in recent decision research (Kennedy and McComb 2014,
Nijstad and Kaps 2007, van Ginkel and van Knippenberg 2008), there is limited focus on
within-group level aspects of a decision process. Moreover, Maldonato (2007) notes there is
likely no best way to view the decision process. As such, there may be some benefit to
development of a preliminary model exploring the effect of membership similarity and
differences on group-based decision processes from evolutionary and levels of analysis-based
perspectives. Development of such a model advances understanding of collective decision
making in that it builds on prior key decision research (Chang and Harrington 2007, Kock
2004, Knudsen and Levinthal 2007, Nijstad and Kaps 2007), incorporates the suggestions of
improving organizational research offered by Meyer et al. (2005), and incrementally
increases the complexity yet fuller understanding of the phenomena represented in prior
collective decision models.
Modeling Dynamic Collective Decision Making
Building from the above notions, the application of computational modeling to dynamical
processes such as collective decision making may enable organizational researchers to more
appropriately represent the potential nonlinearity of a collective process. For example,
interdisciplinary exchange may have informed recent organizational research which includes
several dynamical models proposed for collective decision making over social networks that
consist of many interacting individuals (Battiston et al. 2003, Klein et al. 2003). These
models, primarily an extension of models developed in theoretical physics, provide a novel,
promising direction for research on group dynamics and collective decision making. A
limitation of this research and more specifically its ability to model complex social systems,
however, is the consideration of only simple problem spaces, typically made of binary or
continuous numerical choices between 0 and 1.
Increasingly complex nonlinear problem space has been modeled (Klein et al. 2003, Klein
et al. 2006, Rusmevichientong and Van Roy 2003) to consider interdependent networks of
multiple aspects of a complex problem. This research, however, was not modeled in a
collective, non-trivial societal context. This is not surprising because problems arise with
collective decision models in that they commonly assume every individual agent has or
makes his/her own decision. Following these assumptions, the collective decision making
dynamic is represented as a process of propagation, interaction and modification of individual
decisions. This is an over-simplified assumption compared to actual cognition processes and
behavior of individuals and collectives (Lipshitz et al. 2001, Salas and Klein 2001).
Individuals often keep multiple ideas in mind and may remain undecided during or even after
a collective-level decision emerges. The collective decision forms not just through the
interactions of individual decisions but also through the more active, dynamic exchanges of
incomplete ideas and mental models being developed by every individual (Dionne et al.
2010). Such within-individual mental and behavioral complexity has begun to be included in
7
computational models (c.f., Dionne and Dionne 2008, Knudsen and Levinthal 2007), and
should be taken into account to a greater extent in order to investigate the complexity of
collective human decision making.
Methods
In view of the contexts for computational models of social and organizational sciences
reviewed in the prior section, we had previously proposed a prototype agent-based model that
applied the evolutionary framework introduced above to model collective decision making
processes within a small-sized, well-connected social network structure (Sayama and Dionne
2015). This model was used to conduct a specific within-level analysis on how homogeneity
or heterogeneity of goals and decision utility functions among participants affect dynamics
and the final outcomes of their collective decision making, and the predictions made by this
model were also confirmed by human-subject experiments (Sayama and Dionne, 2015). This
model was still quite limited, however, since the size of the collective remained small, the
agents' evolutionary behaviors were designed in a rather unsystematic, ad hoc manner, and
the effect of social network structure was not taken into account. In this sense, it was not
developed enough to provide sufficient answers to key research questions on diversity and
network structure of the collective as discussed in the previous section.
In this paper, we present a new agent-based model that can directly address those key
research questions by implementing a systematic control of agents' behavioral balance
between selection-oriented and variation-oriented operators, together with much larger, non-
trivial social network structure on which agents exchange ideas locally. In our model, agents
collaboratively work on an abstract utility maximization task, without explicit knowledge of
the entire structure of their utility functions. Agents may have similar utility functions within
the group, but across groups there may exist different utility functions. Such a homogeneous
condition can represent a "group wholes" view, in which all members of each particular
group share a strong degree of similarity with their groups' unique utility function.
Conversely, agents may have different utility functions within the group. Such a
heterogeneous condition can represent a "group parts" view, in which unique and/or diverse
utility functions prevail within each group, but across groups, this pattern is not unique, as
group after group exhibits this same type of uniqueness among its members.
We believe that our approach to social dynamics research can move the social sciences
away from an oversimplified view in that it investigates nonlinear change in organizational
research (Meyer et al. 2005). Moreover, examining a new theoretical framework is consistent
with development of computational models, as Adner et al. (2009) recognize that simulation
is generally an exercise in theory building.
Model Assumptions
Groups or social networks. Our model assumes that N agents are connected to a finite
number of other agents via links through which ideas are exchanged. Each agent can
memorize or hold multiple ideas in its mind. Multiple copies of a single idea may be present,
which represents a form of relative popularity for that idea to the agent. Each agent is
initialized with a small number of randomly generated ideas in its mind at the beginning of a
simulation. The agents begin to perform a set of actions on the population of ideas in their
minds repeatedly for a fixed number of iterations. The order by which the agents take actions
is randomized every time, but it is guaranteed that every agent does take exactly one action
8
per iteration. This round-robin format is commonly used in idea sharing phases with decision
making techniques such as a nominal group technique and various brainstorm initiatives
(Paulus and Yang 2000, Van de Ven and Delbecq 1974). As such, the number of actions
performed in a simulation is a product of the number of agents N and the number of iterations
T.
While other group decision research has modeled hierarchical teams in decision models
(c.f., Dionne and Dionne 2008), we make no assumptions regarding predetermined leadership
and/or abilities within the team as several teams in organizations are self-led and share
leadership responsibilities (Salas and Klein 2001). We investigate the potential impact of
varying membership within the group (i.e., no assumption of identical abilities or uniform
connectivities in general) on the potential pool of ideas. Since no single person is powerful
enough to eliminate an idea from the group (i.e., shared leadership), we assumed that actions
were performed on single copies of an idea, not the equivalence set of all idea replicates
(described in detail below).
Utility functions. The use of utility functions in collective decision research is a natural
outgrowth of earlier research by Hollenbeck et al. (1995) noting team decision making theory
can be considered an adaptation of individual decision models and decision alternatives can
vary along a univariate continuum. This view supplies a multi-level (e.g., group parts and
group wholes) perspective and allows for adaptation of individual utility functions throughout
a collective decision process. Both factors can be represented and/or captured by collective
decision computer models (c.f., Dionne and Dionne 2008). As such, the use of utility
functions contributes to the development of this model as well.
We use a similar model setting for the problem space and the utility functions as proposed
by Sayama and Dionne (2015). The problem space is defined as an M-dimensional binary
space, within which there are a total of 2M possible ideas. For a simulation, each possible idea
has an inherent utility value given by a true utility function UT. None of the agents has direct
access to the true utility function. Instead, individual agents perceive idea utility values based
on their own individual utility functions Uj constructed by adding noise to the master utility
function UM. The master utility function UM may or may not be the same as UT, depending on
the possibility of group-level bias (explained below). This initialization reflects the notion
that today's organizational problems are too complex for a single individual to solve (i.e.,
true utility value not available to any of group members), and therefore groups or collectives
are assembled to solve problems and make decisions (Klein et al. 2003, Salas and Klein
2001). Ideally, collectives function by bringing unique information from members (i.e.,
individual utility functions) together in such a way as to produce ideas that exceed an
individual's idea development capability (Kerr and Tindale 2004).
Utility values are assigned to every point (idea) in the problem space as follows: First, n
random bit strings (zeros and ones) S = {vi} ( i = 1…n ) are generated as representative ideas,
where each vi represents one idea that consists of M bits. One of those generated ideas is
assigned the maximum utility value, 1, and another is assigned the minimum utility value, 0.
Each of the remaining n -- 2 ideas is assigned a random number sampled from a uniform
probability distribution between 0 and 1. This method guarantees that the entire range of
utility values is always from 0 to 1, which makes it easier to compare different simulation
results. The detailed shape of the distribution varies within this range for different simulation
runs.
9
The utility values of other possible ideas not included in the representative idea set S are
defined by interpolation. Specifically, the utility value of an idea v not present in S is
calculated as a weighted average of the utility values of the representative ideas as follows:
(1)
is the idea in question, UT(vi) is the utility of a representative idea vi in S, and
where
D(vi, v) is the Hamming distance between vi and v. The Hamming distance is a measure of
dissimilarity between two bit strings, which reflects the number of bits for which two strings
vary (Hamming 1950). The true utility function UT(v) obtained from Equation 1 has a
reasonably "smooth" structure in a high-dimensional problem space (i.e., similar ideas tend to
have similar utility values, in general). Such a smooth structure of the problem space is
necessary for intelligent decision making to outperform unintelligent random trial and error.
Note that the utility landscape construction method described above is different from that
of Kauffman's N-K fitness landscapes often used in management science (Kauffman 1993,
Levinthal 1997, Rivkin 2000). We chose this approach because our method makes it easier
and more straightforward to introduce group-level bias, i.e., discrepancy between the true and
master utility functions.
Group-level bias is simulated by adding random perturbation when the master utility
function UM is constructed from the true utility function UT, using a similar algorithm as
employed by Sayama and Dionne (2015). Specifically, with a bias parameter , each bit on
representative ideas in S is flipped with probability 0.25 per bit, and a random number
within the range [ -- , is added to the utility value of each representative idea. Their utility
values are then renormalized to the range [0, 1]. The master utility function UM is generated
from these perturbed representative ideas using Equation 1. In this setting, = 0 creates a
condition with perfect understanding of the problem (UM = UT) as a collective, while larger
values of represents the lack of understanding of the problem.
Moreover, each agent will unconsciously have a different individual utility function, Uj(v)
( j = 1…N ), which is generated by adding random noise to the master utility function UM so
that:
(2)
for all v, where is the parameter that determines the variations of utility functions among
agents. = 0 represents a perfectly homogeneous collective where every agent has exactly
the same utility function (Ui(v) = Uj(v) for all i and j), while larger values of represents a
heterogeneous collective made of diverse agents with very different individual utility
functions. Figure 1 shows an example of such individual utility functions in contrast to the
master utility function. Misunderstanding of the problem by the individual is evident in that
the perturbed individual utility function (gray dots) maintains some structures of the master
utility function (black dots), but they are not exactly the same. As bounded rational actors,
agents are not aware of the full set of alternatives available to them, nor can agents fully
specify potential action-potential outcome causal linkages (Gavetti and Levinthal 2000).
Therefore agents in our model are not aware of the entire structure of their own individual
10
=−=−=niiniiiTTvvDvvDvUvU1212),(),()()(Sv)]1,)(min(),0,)([max()(+−vUvUvUMMj
utility functions. They cannot tell what ideas would produce global maximum/minimum
utility values, though they can retrieve a utility value from the function when a specific idea
is given, which is a common assumption made in complex global optimization problems
(Horst et al. 2000).
FIGURE 1
Master and Individual Utility Functions
Note: The master utility function with M = 10, generated from a representative set of idea
utilities of size n = 10, is shown by black dots. An individual utility function by adding noise
with = 0.2 is shown by gray dots. The x-axis shows idea indices generated by interpreting
bit strings as binary notations of an integer, i.e., all of different ideas are lined up along the
horizontal axis and their utility values are plotted.
We recognize that a homogeneous group with no group-level bias would be unlikely in
actual groups and collectives. In reality, reduction of a group-level bias would be facilitated
by different perspectives, expertise and experiences (i.e., diversity). While varying diversity
on any number of dimensions (e.g., ethnic, gender, functional background, education, age)
within teams has been studied in the literature (c.f., Kooij-de Bode et al. 2008, O'Reilly et al.
1998, Pelled et al. 1999), research related to group performance has mixed reviews regarding
the benefit of diversity within teams. While some diversity is thought to produce a more
productive, functional conflict as opposed to an unproductive, relationship conflict (Jehn et
al. 1999), a meta-analysis on conflict (De Dreu and Weingart 2003) underscores that these
various forms of conflict are all negatively related to group performance. Thus, group-level
bias is included in our model to assess potential issues associated with homogeneity within
groups.
Evolutionary operators. Our model uses agent behaviors reflecting either selection or
variation as analogues for decision making behavior: replication, random point mutation,
intelligent point mutation, recombination, and subtractive selection. While these five
operators reflect common forms of action in evolution (except the intelligent point mutation
11
that does not exist in real biological evolution), they also align with actions commonly found
in brainstorming and normative decision making idea generation phases where the goal is to
build new ideas from individually generated suggestions (Paulus and Yang 2000) (i.e.
mutations and recombination) and idea evaluation phases where culling or supporting ideas
(i.e., replication and/or subtraction) leads to final group idea selection and decision. Among
those evolutionary operators, replication and subtractive selection use a preferential random
search algorithm (Solis and Wets 1981), by which an agent randomly samples rp ideas from
the idea population in its mind, and then the agent selects the best (or worst) idea among the
sampled ones for replication (or subtractive selection). Note that the designs of the
evolutionary operators used in this model are different from those used in earlier models
(Sayama and Dionne 2015), in order to make the variation and selection mechanisms more
clearly separable. They are also extended so that their outcomes affect not only the agent's
own idea population but also those of its local neighbors on a social network, which
represents the exchange of ideas through social ties. In other words, other agents can "hear"
the focal agent's opinion and update their own idea population according to it.
Of the five evolutionary operators, replication and subtractive selection are selection-
oriented operators, driving the exploitation in the discussion and decision making process.
The other three processes (random/intelligent point mutations and recombination) are
variation-oriented operators that increase the idea diversity and explore the problem space
further. To systematically control and sweep the balance between the two evolutionary
"forces" (selection/exploitation and variation/exploration), we introduced a global parameter
p, which determines the behavioral tendency of agents. Specifically, each agent chooses an
exploitative operator with probability p (or, an explorative operator with probability 1 - p; see
Table 2). Setting p = 1 makes the agents completely selection-oriented, while p = 0 makes
them fully exploratory.
Simulation settings. Table 2 summarizes the parameter values used in our computer
simulations. Most of those values were taken from earlier work (Sayama and Dionne 2015),
and were chosen so as to be reasonable in view of typical real collective decision making
settings. We tested several variations of parameter settings and confirmed that the results
were not substantially different from the ones reported below in this paper.
There are several experimental parameters that we varied in the three sets of
computational experiments presented below. The first set of computational experiments
manipulated group-level bias, and within-group noise. These two parameters were
varied to represent different levels of accuracy and consistency of individual utility functions
within a group. The second set of computational experiments varied p, the parameter that
determines the balance between selection-oriented and variation-oriented operators in agents'
behaviors. The third set of computational experiments varied the size and topology of the
group, by exponentially increasing the number of agents from N = 5, a small group whose
size is within the optimal range for decision making teams (Kerr and Tindale 2004, Salas et
al. 2004), to N = 640, which forms a non-trivial social network. In all cases, the average node
degree (i.e., average number of connections attached to a node) was always kept to four,
which is a typical number of people one could have meaningful conversations with
simultaneously. This assumption made the N = 5 case a fully connected network, while the
network became increasingly sparse as N increased. For each specific value of N, three
different network topologies were tested: random (RD), small-world (SW) (Watts and
Strogatz 1998) and scale-free (SF) (Barabási and Albert 1999). For small-world networks, the
link rewiring probability was set to 10%, which realizes the small-world property (Watts and
12
Strogatz 1998) for relatively small-sized networks like those used in this study. These
topological variations do not cause any effective differences for smaller N, but as N increases,
their influences on network topology and dynamics of idea evolution begin to differentiate.
TABLE 2
Parameters and Symbols
Parameter Value
Parameters Related to Evolutionary Decision Process
M
n
Meaning
10
10
rp
rm
pm
ps
p
5
5
0.2
0.4
0~1
p/2
p/2
(1-p)/3
(1-p)/3
(1-p)/3
Problem space dimensionality
Number of representative ideas to generate true/master utility
functions
Number of sample ideas in preferential search algorithm
Number of offspring generated in intelligent point mutation
Random mutation rate per bit
Probability of random switching in recombination
Probability for an agent to take selection-oriented actions
Probability of replication - advocacy
Probability of subtractive selection - criticism
Probability of random point mutation - minor modification of idea
Probability of intelligent point mutation - improvement of existing
idea
Probability of recombination - generating new ideas from crossing
multiple existing ideas
Parameters Related to Team Characteristics
N
Network
topology
d
k
T
Size of group/social network
RD: random network, SW: small-world network, SF: scale-free
network
Average degree (average number of links connected to each agent)
Number of initial randomly generated ideas in each agent's mind
Group-level bias
Within-group noise
Number of iterations
5~640
RD, SW,
SF
4
5
0~1
0~1
60
Note: Bold indicates experimental parameters varied
Metrics of group performance. Performance of a group is likely a multidimensional
construct, as different authors have tested differing dimensions of group-based adaptation
(c.f., LePine 2005, Kozlowski et al. 1999). For the purposes of collective decision making in
organizational settings, the ability to converge on a decision is critical, as a group that cannot
produce a decision likely fails in their task. In the meantime, convergence on a poor decision
may be equally detrimental to a group as well, as mistakes could be costly. As such, it would
seem that minimally the consideration of both convergence and decision quality would be
needed to assess group performance. As required by increasingly complex organizational
environments, groups and organizations need to converge quickly on decisions, and yet
ensure these decisions have high efficacy related to solving perceived problems.
13
We therefore used the two separate performance metrics originally proposed by Sayama
and Dionne (2015): one was the true utility value of the mode idea (the most supported idea)
in the final population of ideas collected from all the agents' minds, to measure the overall
quality of collective decisions. This was selected as it is most likely that the most supported
idea represents the group's preferred idea, and once selected, this supported idea will be
tested in the context of real-world problem solving.
The other performance metric was the diversity of ideas remaining in the final population
of ideas collected from all the agents' minds, to measure the failure of the group to converge.
This measurement is based on the classical definition of Shannon's information entropy
(Shannon 1948),
, (3)
where m represents the number of different types of ideas in the final idea population, and
p(xi) is the ratio of the number of the i-th type of idea to the total size of the final idea
population. The theoretical maximum of H would be M, which occurs when all of 2M possible
distinct ideas are equally represented. H decreases as the idea population becomes more
homogeneous, and it reaches the theoretical minimum 0 when the idea population is made of
only instances of the same idea (which would never occur in simulations). To rescale this
quantity to the range between 0 and 1, we used (M -- H) / M as a measurement of the
convergence of final collective decision.
Results
In this section, we describe our simulation results in three parts: (1) effects of within-group
noise and group-level bias (diversity of problem understanding), (2) effects of balance
between selection-oriented and variation-oriented behaviors (diversity of behaviors), and (3)
effects of group size and social network topology. The first part directly addresses the
knowledge/opinion diversity and multi-level issues of collective decision making. The second
part illustrates the implications of behavioral diversity of groups for their collective decision
performance. Finally, the third part extends our understanding to large-scale, networked
organizational settings.
Part 1: Effects of Within-group Noise and Group-level Bias
We first conducted a computational experiment to examine the effects of increasing (a)
within-group noise, i.e., heterogeneity of individual utility functions within a group, and
(b) group-level bias, i.e., discrepancy of the master utility function from the true utility
function at a group level, on the overall group performance. For this initial computational
experiment, the group was made of five agents with fully connected social network structure
(i.e., everyone could talk to everyone else; a small group setting). We assumed that the agents
were balanced in terms of their tendency between selection-oriented and variation-oriented
behaviors in the discussion (i.e., p = 1/2).
Figure 2 presents a summary of the results of simulations with within-group noise and
group-level bias systematically varied. Each of the two performance metrics (i.e., level of
convergence and utility of most supported idea, as described above) are visualized in a
14
=−=miiixpxpH12)(log)(
separate 3-D surface plot. We found that the level of convergence was affected significantly
by the within-group noise, while it was not affected at all by the group-level bias. On the
other hand, the true utility of collective decisions degraded significantly when either the
within-group noise or the group-level bias (or both) was increased. The true utility achieved
by the most heterogeneous groups ( ~ 1.0) or the most biased groups ( ~ 1.0) dropped to
about 0.5, which could be achieved just by random idea generation. This means that no net
improvement was achieved during the discussion by those groups.
FIGURE 2
Effects of Within-Group Noise and Group-Level Bias on Decision Convergence and
Quality
Note: Effects of within-group noise () and group-level bias () on the level of convergence
(left) and the true utility value of the most supported idea (right). Each dot represents an
average result of 500 independent simulation runs.
Part 2: Effects of Balance Between Selection-oriented and Variation-oriented Behaviors
The above computational experiment assumed that the agents' behaviors were well
balanced between selection-oriented and variation-oriented operators. We therefore ran
another computational experiment to investigate the effects of balance between selection-
oriented and variation-oriented behaviors patterns by systematically varying the parameter p.
Greater values of p represent groups with more selection-oriented behaviors (i.e., advocacy
and criticism), while smaller values of p represent groups with more variation-oriented
behaviors (i.e., mutations and recombination). The group-level bias, was also varied as
another experimental parameter, while the within-group noise, was fixed to 0.2 for this
experiment. The group size and their network topology were the same as those in the first
computational experiment.
Figure 3 shows a summary of the results of the second computational experiment
comparing group performances with different group behaviors, plotting two performance
metrics in separate 3-D plots as used for Figure 2 (note that one of the axes is now for p, not
for ) The effect of behavioral balance on the level of convergence is straightforward in that
greater p (more selection-oriented behaviors) tended to promote convergence more. The
15
effect of p on the utility of collective decisions, however, turned out not so trivial. While
purely variation-oriented behaviors (p ~ 0.0) did not help increase the decision quality,
neither did purely selection-oriented behaviors (p ~ 1.0). There was a range of optimal
balance (p = 0.7~0.9) where the groups achieved the highest decision quality. In the
meantime, the effect of group-level bias is similar to that seen in Figure 2, so that the utility
of collective decisions would be significantly lower if there was group-level bias.
FIGURE 3
Effects of Balance between Selection-Oriented and Variation-Oriented Behaviors and
Group-Level Bias on Decision Convergence and Decision Quality
Note: Effects of group-level balance between selection-oriented and variation-oriented
behaviors (p) and group-level bias () on the level of convergence (left) and the true utility
value of the most supported idea (right). Each dot represents an average result of 500
independent simulation runs.
Part 3: Effects of Group Size and Social Network Topology
The first computational experiment above assumed small, fully connected networks of
agents. While the results produced useful implications for collective decision making in small
group settings, they were not sufficient to generate insight into more general collective
decision making dynamics on a larger non-trivial social environment, such as in a complex
organization or on social media. We therefore conducted the third computational experiment
in which the size of groups was increased from 5 to 640 in an exponential manner. For each
size of the groups/networks, the average number of connections per agent (i.e., "degree" in
network science terminology) were always kept to four, which was the same value as in the
first two experiments above. The following values were used for other parameters: = 0.0,
= 0.2, p = 0.5.
In this computational experiment, larger groups were no longer considered a typical
"group", but rather they formed a more complex social/organizational network, perhaps more
indicative of a "collective" in the organizational sciences. For each network size, we used the
following three social network topologies. A new network topology was generated for each
independent simulation run:
16
• Random network (RD): A random network is a network in which connections are
randomly assigned, which can be used as a random control condition. For our
computational experiment, a total of 2N links were established between randomly
selected pairs of agents.
• Small-world network (SW) (Watts and Strogatz 1998): A small-world network is a
locally clustered (pseudo-)regular network, with a small number of global links
introduced to reduce the effective diameter of the network significantly (i.e., a "small-
world" effect). The small-world network may be considered a spatially extended
network made of mostly local connections but with a few global connections. For our
computational experiment, N agents were first arranged in a circle and each agent was
connected to its nearest and second nearest neighbors so that the degree would be four
for all. Then 10% of the links were randomly selected and either the origin or
destination of each of those links was rewired to a randomly selected agent.
• Scale-free network (SF) (Barabási and Albert 1999): A scale-free network is a
network in which the distribution of node degrees shows a power-law distribution. It
represents a heterogeneous network made of a large number of poorly connected
nodes and a few heavily connected "hubs". Many real-world networks, including
biological, engineered and social networks, were shown to be scale-free (Barabási
2009). While such networks show a small effective diameter like small-world
networks, they may not have high local clustering. For our experiment, a well-known
preferential attachment algorithm (Barabási and Albert 1999) was used, starting with
a fully connected network of five agents and then incrementally adding an agent by
connecting it with two links to two existing agents selected preferentially based on
their degrees, until the network size reached N.
Figure 4 shows the effects of size and topology of networks on the decision outcomes. The
larger the group (or network) becomes, the harder it achieves convergence. Apparently there
was no substantial difference between the three topological structures regarding their effects
on the level of convergence. On the other hand, increasing group size had positive effects on
the utility of the most supported idea within the group or on the social network.
FIGURE 4
Effects of Group Size and Social Network Topology on Decision Convergence and
Decision Quality
17
Note: Effects of group size (N) and social network topology (random, small-world or scale-
free) on the level of convergence (left) and the true utility value of the most supported idea
(right). Note the log scale for group size. Each dot represents an average result of 500
independent simulation runs.
One particularly interesting phenomenon seen in Figure 4 is the difference in the utility of
collective decisions between small-world networks and other two networks for larger N (N >
100). Figure 5 provides a more detailed view into this finding, showing the distributions of
utilities of most supported ideas for 500 independent simulation runs for N = 640 under each
of the three conditions. In each condition, the agents were able to find the best idea with
utility 1.0 most of the time, but small-world networks facilitated such optimal decision
making most frequently. The Mann-Whitney U test detected statistically significant
differences between small-world and random (p < 0.003) as well as small-world and scale-
free (p < 10-6) networks, while there was no significant difference between random and scale-
free (p = 0.107) networks. The key distinctive feature of small-world networks that are not
present in either random or scale-free networks is the local clustering.
FIGURE 5
Distributions of Utilities of Most Supported Ideas Between Different Social Network
Topologies
Note: Simulation results comparing the distributions of utilities of most supported ideas at the
end of simulation between the three social network topologies (random, small-world or scale-
free) for N = 640. The small-world network topology (middle) achieved the highest number
of the maximal utility value (1.0) compared to the other two topologies, random (left) and
scale-free (right).
Discussion
In this study, we developed an agent-based model and applied evolutionary operators as a
means of illustrating how individuals, groups and collectives may move through a decision
process based on ecologies of ideas over a social network habitat. We also considered various
compositions of group members ranging from homogeneity to heterogeneity and examined
the impact of group behaviors on the dynamic decision process as well. These explorations
move toward a more realistic view of collective decision making within complex social
systems, and answer calls (e.g., Meyer et al. 2005) for research that considers the impact of
time and situations in flux, along with nonlinear, multi-level concepts incorporating
evolutionary conceptual development. In what follows, we discuss our findings and their
implications for human collective decision making.
18
On Diversity of Problem Understanding and Multilevel Issues
Our exploration revealed that the composition of the team or group has implications for
decision making and likely considers the complex nature of asking several individuals to
come together and agree on a direction that is best suited for the group/collective, rather than
for each individual. Research on group diversity has found mixed results related to diversity
and group performance issues such as creativity and decision effectiveness (De Dreu and
West 2001, Harrison et al. 2002, Hoffman 1979, Jehn and Mannix 2001, Nemeth 1986, 1992,
O'Reilly et al. 1989, Wei et al. 2015). Our research, however, indicates an important trade-
off between reduction of within-group conflicts and mitigation of group-level bias, as they
are not independent from each other. Specifically, if a group is assembled by gathering
similar individuals with similar backgrounds, expertise and opinions, then the group tends to
have less within-group conflicts but may risk of having a greater group-level bias. On the
other hand, if a group is made of diverse individuals with different backgrounds, expertise
and opinions, the group may have greater within-group conflicts but it may successfully
reduce potential group-level bias and accomplish deeper discussion and better integration of
ideas, as the diverse perspectives may represent the actual nature of the problem more
correctly.
This means that what kind of strategies of group formation will be optimal to maximize
the true utility of collective decisions remains a non-trivial and problem-dependent question,
and the best team or group composition may depend greatly on specific problem settings. For
example, if a team is tasked to work on a time-critical mission, then the convergence speed is
key to their success and thus the emphasis should be placed more on the group homogeneity
to avoid within-group conflicts. Or, if a team is formed to seek a truly high-quality solution to
a problem, then minimizing the possibility of group-level bias is critical for the team's
success, which may require increasing within-group diversity.
On Diversity of Behaviors and Evolutionary Tendencies
Our results also imply that the balance between selection-oriented and variation-oriented
behaviors may play an important role in collective decision making. Exploration of such
behavioral balances was a meaningful step of research because, in realistic organizational
settings, some groups may be more prone to be critical, trying to purge bad ideas, while other
groups may tend to promote combinations of multiple ideas in discussion. Examples of such
behavioral patterns include organizational "cultures" shared by all group members, which is a
plausible view of a factor that may influence group dynamics (Salas et al. 2004).
Our results showed that selection-oriented behaviors greatly promoted convergence, yet
they were not sufficient to achieve the highest possible utility. To improve the decision
quality, the group needs a good mixture of exploratory (variation-oriented) and exploitative
(selection-oriented) behaviors. This also ties back to the diversity issue discussed above; a
group may not necessarily benefit from diversity of individual problem understanding, but it
can benefit from behavioral diversity of group members. In our simulations, the optimal
balance between selection and variation was attained at p ~ 0.8 (i.e., 80% selection, 20%
variation) but this particular balancing point may be problem dependent.
On Group Size and Social Network Structure
19
Finally, our results with social network structure illustrated intriguing effects of group size
and network topologies on decision quality, which were manifested particularly for larger
networks. Without surprise, the larger the group (or network) becomes, the more elusive
convergence on a decision becomes as well. However, group size did positively affect the
utility of the most supported idea because, in a large network, agents can conduct different
threads of discussions in parallel, which increases the chance for them to collectively find a
better idea in the complex problem space. It is important for the agents to remain connected
to each other so that the better ideas gradually spread over the network and are widely
accepted to become the more supported ideas. The same number of disconnected (non-
collaborative, non-interdependent) agents would not be able to achieve this kind of
information aggregation and selection task.
A more intriguing finding was obtained regarding the effects of non-trivial network
topology. While network topology did not seem to affect level of convergence, small-world
networks with spatially localized clusters tended to promote collective search of optimal
ideas more often than random or scale-free networks, despite that the network size and the
average degree were all identical. Such locally clustered social network structure helps agents
in different regions in a network maintain their respective focus areas and engage in different
local search, possibly enhancing the effective parallelism of collective decision making and
therefore resulting in a greater number of successful decisions. In contrast, random and scale-
free networks lack such local clustering, and the links in those networks are all "global",
mixing discussions prematurely and therefore reducing the effective parallelism of collective
decision making. These observations have an interesting contrast with the fact that random
and scale-free networks are highly efficient in information dissemination because of their
global connectedness. Our results indicate that such efficiency of information dissemination
may not necessarily imply the same for effective collective decision making.
This finding offers another implication for the diversity in collective decision making:
certain organizational structures may be more effective in generating and maintaining idea
diversity in discussion, while other structures would tend to reduce idea diversity and
promote premature convergence on suboptimal ideas more often. This is similar to the
biological fact that certain geographical habitat structures can maintain greater biodiversity in
evolutionary ecology. In the decision making context, this implies that not only within-group
diversity or behavioral balance but also social network topologies could influence the
dynamics of idea evolution in collective decision making processes.
Conclusions
In this work, we demonstrated that, using an evolutionary framework to model human
collective decision making processes, one can specifically examine the efficacy of a variety
of decision processes employed by groups and collectives. The framework we proposed
enables a means for direct comparison of various idea evolution paths within collective
decision making, and enables an exploration of how the make-up and structure of teams
could be critical depending on the overall requirements for decision making tasks.
Furthermore, the evolutionary framework and subsequent computational model enables
advancements in understanding collective decision making within a dynamic and complex
social system. By employing an evolutionary framework we can explore the impact of time
and situations in flux, and the modeling enables nonlinear exploration of processes. Finally,
the multi-level, network-oriented nature of this research more appropriately models the
potential differences in team composition and organizational topologies. It adds to our
20
understanding of the complex nature of collective decisions, and the potential pitfalls and
caveats of employing various decision processes and designing teams in a heterogeneous
and/or homogeneous manner.
Limitations and Future Directions
There are several limitations to our computational modeling study. For example, genetic
operators may not exist in groups as "cleanly" as modeled in our simulation. We used simple
parameterized settings to control the prevalence of operators, which may not be appropriate
to represent the real individual behavior in discussion. Also, our model considered only the
heterogeneity of the utility functions of agents. To conduct a more comprehensive, systematic
investigation of the homogeneity/heterogeneity issues, it would be critical to incorporate the
heterogeneity of the participants' domains of expertise, in addition to their utility functions.
Furthermore, we tested only three typical social network topologies, but they are by no means
an exhaustive list of possible organizational structures. Conducting computational and
human-subject experiments on more realistic social network topologies would add more
realistic dynamics to the results, which are among our future research plan.
Data Availability
The computational simulation data used to support the findings of this study are available
from the corresponding author upon request.
Conflicts of Interest
The authors declare that there is no conflict of interest regarding the publication of this paper.
Funding Statement
This material is based upon work supported by the National Science Foundation under Grant
No. 1734147.
References
Abbot A (2001) Time matters. Chicago, IL: University of Chicago Press.
Adner R, Polos L, Ryall M, Sorenson O (2009) Introduction to special topic forum: The case
for formal theory. Acad. of Manage. Rev. 34: 201-208.
Barabási AL, Albert R (1999) Emergence of scaling in random networks. Sci. 286: 509-512.
Barabási AL (2009) Scale-free networks: a decade and beyond. Sci. 325: 412-413.
Bar-Yam Y (1997) Dynamics of complex systems. Boulder, CO: Westview Press.
Bar-Yam Y (2004) Making things work: Solving complex problems in a complex world.
Cambridge, MA: NESCI Knowledge Press.
21
Battiston S, Bonabeau E, Weisbuch G (2003) Decision making dynamics in corporate boards.
Physica A 322: 567-582.
Braha D, Minai A, Bar-Yam Y, eds. (2006) Complex Engineered Systems: Science Meets
Technology. Springer.
Carroll T, Burton RM (2000) Organizations and complexity: Searching for the edge of chaos.
Comput. Math. Organ. Theory 6: 319-337.
Castellano C, Fortunato S, Loreto V (2009) Statistical physics of social dynamics. Reviews of
Modern Physics 81: 591.
Chang MH, Harrington JE (2005) Innovators, imitators and the evolving architecture of
problem-solving networks. Organ. Sci. 18(4): 648-666.
Chang MH, Harrington JE (2007) Discovery and diffusion of knowledge in an endogenous
social network. Amer. J. Sociol. 110(4): 937-976.
Cheng YT, Van de Ven AH (1996) Learning the innovation journey: Order out of chaos?
Organ. Sci. 7: 593 -- 614.
Couzin ID, Ioannou CC, Demirel G, Gross T, Torney CJ, Conradt L, Levin SA, Leonard NE
(2011) Uninformed individuals promote democratic consensus in animal groups. Science
334: 1578-1580.
Dansereau F, Alutto JA, Yammarino FJ (1984) Theory testing in organizational behavior:
The varient approach. Englewood Cliffs, NJ: Prentice-Hall.
Dansereau F, Yammarino FJ, Kohles JC (1999) Multiple levels of analysis from a
longitudinal perspective: Some implications for theory building. Acad. Manage. Rev. 24,
346-357.
De Dreu CKW, Weingart LR (2003) Task and relationship conflict, team performance, and
team member satisfaction: A meta-analysis. J. Appl. Psych. 88: 741 -- 749.
De Dreu CKW, West MA (2001) Minority dissent and team innovation: The importance of
participation in decision making. J. Appl. Psych. 86: 1191-1201.
Dionne SD, Akaishi J, Chen X, Gupta A, Sayama H, Yammarino FJ, Serban A, Hao C, Head
HJ, Bush BJ (2012) Retrospective Relatedness Reconstruction: Applications to Adaptive
Social Networks and Social Sentiment. Organ. Res. Methods 15(4): 663-692.
Dionne SD, Dionne PJ (2008) Levels-based leadership and hierarchical group decision
optimization: A simulation. Leadership Quart. 19: 212-234.
Dionne SD, Gooty J, Yammarino FJ, Sayama H (2018) Decision making in crisis: A
multilevel model of the interplay between cognitions and emotions. Organ. Psych. Rev. 8,
95-124.
22
Dionne SD, Gupta A, Sotak KL, Shirreffs K, Serban A, Hao C, Kim DH, Yammarino FJ
(2014) A 25-year perspective on levels of analysis in leadership research. Leadership
Quart. 25, 6-35. doi:10.1016/j.leaqua.2013.11.002
Dionne SD, Sayama H, Hao C, Bush BJ (2010) The role of leadership in shared mental
model convergence and team performance improvement: An agent-based computational
model. Leadership Quart. 21(6), 1035-1049.
Economist (September 17th 2009). InnoCentive: A market for ideas. The Economist.
Retrieved from http://www.economist.com/node/14460185.
ElMaraghy W, ElMaraghy H, Tomiyama T, Monostori L (2012) Complexity in engineering
design and manufacturing. CIRP Annals-Manufacturing Technology 61(2), 793-814.
Epstein JM (2006) Generative social science: Studies in agent-based computational
modeling. Princeton, NJ: Princeton University Press.
Futuyma DJ (2005) Evolution. Sunderland, MA: Sinauer Associates.
Gavetti G, Levinthal DA (2000) Looking Forward and Looking Backward: Cognitive and
Experiential Search. Admin. Sci. Quart. 45: 113 -- 137.
Giannoccaro I, Massari G, Carbone G (2018) Team resilience in complex and turbulent
environments: The effect of size and density of social interactions. Complexity, 1923216.
Gigone D, Hastie R (1993) The common knowledge effect: Information sharing and group
judgment. J. Personality Soc. Psych. 65: 959-974.
Grand JA, Braun MT, Kuljanin G, Kozlowski SJ, Chao GT (2016) The dynamics of team
cognition: A process-oriented theory of knowledge emergence in teams. J. Appl. Psych.,
101(10), 1353-1385. doi:10.1037/apl0000136
Hamming RW (1950) Error detecting and error correcting codes. Bell System Tech. J. 26:
147-160.
Harrison DA, Price KH, Gavin JH, Florey AT (2002) Time, teams, and task performance:
Changing effects of surface-level and deep-level diversity on group functioning. Acad.
Manage. J. 45: 1029-1045.
He Z, Wong P (2004) Exploration vs. exploitation: An empirical test of the ambidexterity
hypothesis. Organ. Sci. 15(4): 481-494.
Hoffman LR (1979) Applying experimental research on group problem solving to
organizations. J. Appl. Behav. Sci. 15: 375-391.
Hoffman EL, Lord RG (2013) A taxonomy of event-level dimensions: Implications for
understanding leadership processes, behavior, and performance. Leadership Quart. 24(4),
558-571.
23
Hollenbeck JR, Ilgen DR, Sego DJ, Hedlund J, Major DA, Phillips J (1995) Multilevel theory
of team decision making: Decision performance in teams incorporating distributed
expertise. J Appl. Psych. 80(2): 292-316.
Horst R, Pardalos PM, Thoai NV (2000) Introduction to global optimization (2nd ed.).
Dordrecht, Netherlands: Kluwer Academic Publishers.
Humphrey SE, Aime F (2014) Team microdynamics: Toward an organizing approach to
teamwork. Acad. Manage. Ann., 8(1), 443-503. doi: 10.1080/19416520.2014.904140
Jehn KA, Mannix EA (2001) The dynamic nature of conflict: A longitudinal study of
intragroup conflict and group performance. Acad. Manage. J. 44: 238-251.
Jehn KA, Northcraft GB, Neale MA (1999) Why differences make a difference: A field study
of diversity, conflict, and performance in workgroups. Admin. Sci. Quart. 44: 741 -- 763.
Kauffman SA (1993) The origin of order. New York, NY: Oxford University Press.
Kennedy DM, McComb, SA (2014) When teams shift among processes: Insights from
simulation and optimization. J. Appl. Psyc., 99: 784-815.
Kerr NL, Tindale RS (2004) Group performance and decision making. Ann. Rev. Psych. 55:
623-655.
Klein M, Faratin P, Sayama H, Bar-Yam Y (2003) Protocols for negotiating complex
contracts. IEEE Intelligent Systems 18(6): 32-38.
Klein M, Faratin P, Sayama H, Bar-Yam Y (2006) An annealing protocol for negotiating
complex contracts. Rennard J, ed. Handbook of research on nature inspired computing for
economics and management (vol. 2) (Chapter XCVIII). Hershey, PA: Idea Group
Publishing,
Klein KJ, Dansereau F, Hall RJ (1994) Levels issues in theory development, data collection,
and analysis. Acad. Manage. Rev. 19: 195-229.
Knudsen T, Levinthal DA (2007) Two faces of search: Alternative generation and alternative
evaluation. Organ. Sci. 18(1): 39-54.
Kock N (2004) The psychobiological model: Towards a new theory of computer-mediated
communication based on Darwinian evolution. Organ. Sci. 15(3): 327-348.
Kooij-de Bode HJM, van Knippenberg D, van Ginkel WP (2008) Ethnic diversity and
distributed information in group decision making: The importance of information
elaboration. Group Dyn.- Theor. Res. 12: 307 -- 320.
Kozlowski SWJ, Chao GT, Grand JA, Braun MT, Kuljanin G (2013) Advancing multi-level
research design: Capturing the dynamics of emergence. Organ. Res. Methods 16: 581-615.
Kozlowski SWJ, Gully SM, Nason ER, Smith EM (1999) Developing adaptive teams: A
theory of compilation and performance across levels and time. Ilgen D, Pulakos E, eds.
24
The changing nature of performance: Implications for staffing, motivation and
development (pp. 240-292). San Francisco, CA: Jossey-Bass.
LePine JA (2005) Adaptation of teams in response to unforeseen change: Effects of goal
difficulty and team composition in terms of cognitive ability and goal orientation. J. Appl.
Psych. 90: 1153-1167.
Levinthan DA (1997) Adaptation on rugged landscapes. Manage. Sci. 43(7): 934-950.
Lightle JP, Kagel JH, Arkes HR (2009) Information exchange in group decision making: The
hidden profile problem reconsidered. Manage. Sci. 55(4): 568-581.
Lipshitz R, Klein G, Orasanu J, Salas E (2001) Focus Article: Taking stock of naturalistic
decision making. J. Behav. Dec. Making 14: 331-352.
Maldonato M (2007) Undecidable decisions: Rationality limits and decision-making
heuristics. World Futures: J. Gen. Evolution 63(1): 28-37.
Mannes AE (2009) Are we wise about the wisdom of crowds? The use of group judgments in
belief revision. Manage. Sci. 55(8) 1267-1279.
March JG (1991) Exploration and exploitation in organizational learning. Organ. Sci. 2: 71-
87.
McHugh KA, Yammarino FJ, Dionne SD, Serban A, Sayama H, Chatterjee S (2016)
Collective decision making, leadership, and collective intelligence: Tests with agent-based
simulations and a field study. Leadership Quart., 27, 218-241.
Meyer AD, Gaba V, Colwell KA (2005) Organizing far from equilibrium: Nonlinear change
in organizational fields. Organ. Sci. 16(5): 456-473.
Miller JH, Page SE (2007) Complex adaptive systems. Princeton, NJ: Princeton University
Press.
Mitchell M (1996) An introduction to genetic algorithms. Cambridge, MA: MIT Press.
Mitchell M, Forrest S, Holland JH (1991) The royal road for genetic algorithms: Fitness
landscapes and GA performance. F. J. Varela, P. Bourgine, eds. Toward a practice of
autonomous systems: Proceeds of the first European conference on artificial life (pp. 245-
254). Paris, France.
Morgeson F, Mitchell T, Liu D (2015) Event system theory; An event-oriented approach to
the organizational sciences. Acad. Manage. Rev. 40: 515-537.
Nemeth CJ (1986) Differential contributions of majority and minority influence. Psych. Rev.
93: 23-32.
Nemeth CJ (1992) Minority dissent as a stimulant to group performance. Worchel S, Wood
W, Simpson JA, eds. Group process and productivity (pp. 95-111). Newbury Park, CA:
Sage.
25
Nijstad BA, Kaps SC (2007) Taking the easy way out: Preference diversity decision
strategies and decision refusals in groups. J. Personality Soc. Psych. 94(5): 860-870.
O'Reilly CA, Caldwell DF, Barnett WP (1989) Work group demography, social integration
and turnover. Admin. Sci. Quart. 34: 21-37.
O'Reilly CA, Williams KY, Barsade S, Gruenfeld DH (1998) Group demography and
innovation: Does diversity help? Neale MA, Mannix EA, Gruenfeld DH, eds. Research on
managing groups and teams (vol. 1) (pp. 183-207). Stamford, CT: JAI Press.
O'Reilly T (2005) What is Web 2.0: Design patterns and business models for the next
generation of software. IOP O'Reilly.
http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html.
Accessed October 8, 2012
Page, SE (2018) The model thinker. New York, NY: Basic Books.
Paulus PB, Yang H (2000) Idea generation in groups: A basis for creativity in organizations.
Organ. Behav. Hum. Dec. 82: 76-87
Pelled LH, Eisenhardt KM, Xin KR (1999) Exploring the black box: An analysis of work
group diversity, conflict and performance. Admin. Sci. Quart. 44:1-28.
Rivkin JW (2000) Imitation of complex strategies. Manage. Sci. 46(6): 824-844.
Rusmevichientong P, Van Roy B (2003) Decentralizing decision making in a large team with
local information. Games Econ. Behav. 43: 266-295.
Salas E, Klein G (2001) Expertise and naturalistic decision making: An overview. In E. Salas
E, Klein G, eds. Linking expertise and naturalistic decision making (pp. 3-33).
Philadelphia, PA: Lawrence Erlbaum Associates.
Salas E, Stagl KC, Burke CS (2004) 25 years of team effectiveness in organizations:
Research themes and emerging needs. In: Cooper CL, Robertson IT (eds) International
Review of Industrial and Organizational Psychology 19: 47-91
Sayama H, Dionne SD (2015) Studying collective human decision making and creativity with
evolutionary computation. Artif. Life 21(3): 379-393.
Sayama H, Farrell DL, Dionne SD (2011) The effects of mental model formation on group
decision making: An agent-based simulation. Complexity 16(3): 49-57.
Schneider M, Somers M (2006) Organizations as complex adaptive systems: Implications of
complexity theory for leadership research. Leadership Quart. 17(4), 351-365.
Shannon CE (1948) A mathematical theory of communication. Bell System Tech. J. 27: 379-
423.
Silverman BG, Johns M, Corwell J, O'Brien K (2006) Human behavior models for agents in
simulation games: Part 1: Enabling science with PMFserv. Presence 15(2): 139-162.
26
Solis FJ, Wets R. (1981) Minimization by random search techniques. Math. Oper. Res. 6: 19-
30.
Stasser G, Stewart D (1992) Discovery of hidden profiles by decision making groups:
Solving a problem versus making a judgment. J. Pers. Soc. Psych. 57: 67-78.
Uitdewilligen S, Waller MJ (2018) Information sharing and decision‐making in
multidisciplinary crisis management teams. J. Organ Behavior, 39, 731-748.
doi:10.1002/job.2301
Van de Ven A, Delbecq AL (1974) The effectiveness of nominal, delphi, and interacting
group decision making processes. Acad. Manage. J. 117: 605-621.
van Ginkel WP, van Knippenberg D (2008) Group information elaboration and decision
making: The role of shared task representations. Organ. Behav. Hum. Dec. 105(1): 89-97.
Waller MJ, Okhuysen GA, Saghafian M (2016) Conceptualizing emergent states: A strategy
to advance the study of group dynamics. Acad. Manage. Ann. 10: 561-598.
Watts DJ, Strogatz SH (1998) Collective dynamics of 'small-world' networks. Nature 393:
440-442.
Wei X, Liu Y, Chen S. (2015) A meta-analysis of the relationship between team demographic
diversity and team performance. Acta Psychologica Sinica, 47: 1172-1187.
Wilson DS (2005) Evolution for everyone: How to increase acceptance of interest in, and
knowledge about evolution. Public Lib. Sci. Biol. 3(12): e364.
Wilson DS, Wilson EO (2008) Evolution for the "good of the group." Am. Sci. 96: 380-389.
Yammarino FJ, Dansereau F (2011) Multi-level issues in evolutionary theory, organization
science, and leadership. Leadership Quart. 22: 1042-1057.
Yammarino FJ, Dionne SD (2018) Leadership and levels of analysis: Clarifications and fixes
for what's wrong. In Riggio RE (Ed.), What's wrong with leadership? (And how to fix it)
(pp. 41-57). New York, NY: Routledge (Taylor & Francis Group).
Yammarino FJ, Dionne SD, Chun JU, Dansereau F (2005) Leadership and levels of analysis:
A state-of-the-science review. Leadership Quart. 16: 879-919.
Yammarino FJ, Salas E, Serban A, Shirreffs K, Shuffler ML (2012) Collectivistic leadership
approaches: Putting the "we" in leadership science and practice. Ind. Organ. Psychol. 5(4),
382-402.
27
|
0712.1609 | 3 | 0712 | 2009-09-28T18:49:42 | Distributed Consensus Algorithms in Sensor Networks: Quantized Data and Random Link Failures | [
"cs.MA",
"cs.IT",
"cs.IT"
] | The paper studies the problem of distributed average consensus in sensor networks with quantized data and random link failures. To achieve consensus, dither (small noise) is added to the sensor states before quantization. When the quantizer range is unbounded (countable number of quantizer levels), stochastic approximation shows that consensus is asymptotically achieved with probability one and in mean square to a finite random variable. We show that the meansquared error (m.s.e.) can be made arbitrarily small by tuning the link weight sequence, at a cost of the convergence rate of the algorithm. To study dithered consensus with random links when the range of the quantizer is bounded, we establish uniform boundedness of the sample paths of the unbounded quantizer. This requires characterization of the statistical properties of the supremum taken over the sample paths of the state of the quantizer. This is accomplished by splitting the state vector of the quantizer in two components: one along the consensus subspace and the other along the subspace orthogonal to the consensus subspace. The proofs use maximal inequalities for submartingale and supermartingale sequences. From these, we derive probability bounds on the excursions of the two subsequences, from which probability bounds on the excursions of the quantizer state vector follow. The paper shows how to use these probability bounds to design the quantizer parameters and to explore tradeoffs among the number of quantizer levels, the size of the quantization steps, the desired probability of saturation, and the desired level of accuracy $\epsilon$ away from consensus. Finally, the paper illustrates the quantizer design with a numerical study. | cs.MA | cs | Distributed Consensus Algorithms in Sensor
Networks: Quantized Data and Random Link
Failures
Soummya Kar and Jos ´e M. F. Moura ∗
Abstract
The paper studies the problem of distributed average consensus in sensor networks with quantized data and random
link failures. To achieve consensus, dither (small noise) is added to the sensor states before quantization. When the
quantizer range is unbounded (countable number of quantizer levels), stochastic approximation shows that consensus is
asymptotically achieved with probability one and in mean square to a finite random variable. We show that the mean-
squared error (m.s.e.) can be made arbitrarily small by tuning the link weight sequence, at a cost of the convergence
rate of the algorithm. To study dithered consensus with random links when the range of the quantizer is bounded, we
establish uniform boundedness of the sample paths of the unbounded quantizer. This requires characterization of the
statistical properties of the supremum taken over the sample paths of the state of the quantizer. This is accomplished
by splitting the state vector of the quantizer in two components: one along the consensus subspace and the other
along the subspace orthogonal to the consensus subspace. The proofs use maximal inequalities for submartingale and
supermartingale sequences. From these, we derive probability bounds on the excursions of the two subsequences,
from which probability bounds on the excursions of the quantizer state vector follow. The paper shows how to use
these probability bounds to design the quantizer parameters and to explore tradeoffs among the number of quantizer
levels, the size of the quantization steps, the desired probability of saturation, and the desired level of accuracy ǫ
away from consensus. Finally, the paper illustrates the quantizer design with a numerical study.
Keywords: Consensus, quantized, random link failures, stochastic approximation, convergence, bounded quan-
tizer, sample path behavior, quantizer saturation
9
0
0
2
p
e
S
8
2
]
A
M
.
s
c
[
3
v
9
0
6
1
.
2
1
7
0
:
v
i
X
r
a
The authors are with the Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA 15213 (e-mail:
[email protected], [email protected], ph: (412)268-6341, fax: (412)268-3890.)
Work supported by NSF under grants # ECS-0225449 and # CNS-0428404, by an IBM Faculty Award, and by the Office of Naval Resea rch
under MURI N000140710747.
Manuscript initially submitted on December 10, 2007; last revised on July 19, 2009.
2
I . INTRODUCT ION
This paper is concerned with consensus in networks, e.g., a sensor network, when the data exchanges among
nodes in the network (sensors, agents) are quantized. Before detailing our work, we brie fly overview the literature.
Literature review. Consensus is broadly understood as individuals in a community achieving a consistent view
of the World by interchanging information regarding their current state with their neighbors. Considered in the early
work of Tsitsiklis et. al. ([1], [2]), it has received considerable attention in recent years and arises in numerous
applications including: load balancing, [3], alignment, fl ocking, and multi-agent collaboration, e.g., [4], [5], vehicle
formation, [6], gossip algorithms, [7], tracking, data fusion, [8], and distributed inference, [9]. We refer the reader
to the recent overviews on consensus, which include [10], [11].
Consensus is a distributed iterative algorithm where the sensor states evolve on the basis of local interactions.
Reference [5] used spectral graph concepts like graph Laplacian and algebraic connectivity to prove convergence
for consensus under several network operating conditions (e.g., delays and switching networks, i.e., time varying).
Our own prior work has been concerned with designing topologies that optimize consensus with respect to the
convergence rate, [12], [9]. Topology design is concerned with two issues: 1) the de finition of the graph that specifies
the neighbors of each sensor—i.e., with whom should each sen
sor exchange data; and 2) the weights used by the
sensors when combining the information received from their neighbors to update their state. Reference [13] considers
the problem of weight design, when the topology is specified,
in the framework of semi-de finite programming.
References [14], [15] considered the impact of different topologies on the convergence rate of consensus, in
particular, regular, random, and small-world graphs, [16]. Reference [17] relates the convergence properties of
consensus algorithms to the effective resistance of the network, thus obtaining convergence rate scaling laws for
networks in up to 3-dimensional space. Convergence results for general problems in multi-vehicle formation has been
considered in [18], where convergence rate is related to the topological dimension of the network and stabilizability
issues in higher dimensions are addressed. Robustness issues in consensus algorithms in the presence of analog
communication noise and random data packet dropouts have been considered in [19].
Review of literature on quantized consensus. Distributed consensus with quantized transmission has been studied
recently in [20], [21], [22], [23] with respect to time-invariant ( fixed) topologies. Reference [24] considers quantiz ed
consensus for a certain class of time-varying topologies. The algorithm in [20] is restricted to integer-valued initial
sensor states, where at each iteration the sensors exchange integer-valued data. It is shown there that the sensor states
are asymptotically close (in their appropriate sense) to the desired average, but may not reach absolute consensus.
In [21], the noise in the consensus algorithm studied in [25] is interpreted as quantization noise and shown there by
simulation with a small network that the variance of the quantization noise is reduced as the algorithm iterates and the
sensors converge to a consensus. References [22], [26] study probabilistic quantized consensus. Each sensor updates
its state at each iteration by probabilistically quantizing its current state (which [27] claims equivalent to dithering)
and linearly combining it with the quantized versions of the states of the neighbors. They show that the sensor
states reach consensus a.s. to a quantized level. In [23] a worst case analysis is presented on the error propagation
of consensus algorithms with quantized communication for various classes of time-invariant network topologies,
while [28] addresses the impact of more involved encoding/decoding strategies, beyond the uniform quantizer. The
effect of communication noise in the consensus process may lead to several interesting phase transition phenomena
3
in global network behavior, see, for example, [29] in the context of a network of mobile agents with a non-
linear interaction model and [30], which rigorously establishes a phase transition behavior in a network of bipolar
agents when the communication noise exceeds a given threshold. Consensus algorithms with general imperfect
communication (including quantization) in a certain class of time-varying topologies has been addressed in [24],
which assumes that there exists a window of fixed length, such
that the union of the network graphs formed
within that window is strongly connected. From a distributed detection viewpoint, binary consensus algorithms
over networks of additive white Gaussian noise channels were addressed in [31], which proposed soft information
processing techniques to improve consensus convergence properties over such noisy channels. The impact of fading
on consensus is studied in [32].
Contributions of this paper. We consider consensus with quantized data and random inter-sensor link failures.
This is useful in applications where limited bandwidth and power for inter-sensor communications preclude ex-
changes of high precision (analog) data as in wireless sensor networks. Further, randomness in the environment
results in random data packet dropouts. To handle quantization, we modify standard consensus by adding a small
amount of noise, dither, to the data before quantization and by letting the consensus weights to be time varying,
satisfying a persistence condition –their sum over time diverges, while their square sum is finite. We will show that
dithered quantized consensus in networks with random links converges.
The randomness of the network topology is captured by assuming that the time-varying Laplacian sequence,
{L(i)}i≥0 , which characterizes the communication graph, is independent with mean L; further, to prove convergence,
we will need the mean graph algebraic connectivity ( first non zero eigenvalue of L) λ2 (L) > 0, i.e., the network to
be connected on the average. Our proofs do not require any distributional assumptions on the link failure model (in
space). During the same iteration, the link failures can be spatially dependent, i.e., correlated across different edges
of the network. The model we work with in this paper subsumes the erasure network model, where link failures
are independent both over space and time. Wireless sensor networks motivate us since interference among the
sensors communication correlates the link failures over space, while over time, it is still reasonable to assume that
the channels are memoryless or independent. Note that the assumption λ2 (cid:0)L(cid:1) > 0 does not require the individual
random instantiations of L(i) to be connected; in fact, it is possible to have all the instantiations to be disconnected.
This captures a broad class of asynchronous communication models, for example, the random asynchronous gossip
protocol in [33] satisfies λ2 (cid:0)L(cid:1) > 0 and hence falls under this framework.
The main contribution of this paper is the study of the convergence and the detailed analysis of the sample path
of this dithered distributed quantized consensus algorithm with random link failures. This distinguishes our work
from [20] that considers fixed topologies (no random links) a nd integer valued initial sensor states, while our initial
states are arbitrarily real valued. To our knowledge, the convergence and sample path analysis of dithered quantized
consensus with random links has not been carried out before. The sample path analysis of quantized consensus
algorithms is needed because in practice quantizers work with bounded ( finite) ranges. The literature usually pays
thrift attention or simply ignores the boundary effects induced by the bounded range of the quantizers; in other
words, although assuming finite range quantizers, the analy sis in the literature ignores the boundary effects. Our
paper studies carefully the sample path behavior of quantized consensus when the range of the quantizer is bounded.
It computes, under appropriate conditions, the probability of large excursion of the sample paths and shows that
4
the quantizer can be designed so that with probability as close to 1 as desired the sample path excursions remain
bounded, within an ǫ-distance of the desired consensus average. Neither our previous work [19], which deals with
consensus with noisy analog communications in a random network, nor references [22], [26], [27], which introduce
a probabilistic quantized consensus algorithm in fixed netw orks, nor [34], which studies consensus with analog
noisy communication and fixed network, study the sample path behavior of quantized consensus. Also, while the
probabilistic consensus in [22], [26], [27] converges almost surely to a quantized level, in our work, we show that
dithered consensus converges a.s. to a random variable which can be made arbitrarily close to the desired average.
To study the a.s. convergence and m.s.s. convergence of the dithered distributed quantizers with random links
and unbounded range, the stochastic approximation method we use in [19] is sufficient. In simple terms, we
associate, like in [19], with the quantized distributed consensus a Lyapounov function and study the behavior of
this Lyapounov function along the trajectories of the noisy consensus algorithm with random links. To show almost
sure convergence, we show that a functional of this process is a nonnegative supermartingale; convergence follows
from convergence results on nonnegative supermartingales. We do this in Section III where we term the unbounded
dithered distributed quantized consensus algorithm with random links simply Quantized Consensus, for short, or
QC algorithm. Although the general principles of the approach are similar to the ones in [19], the details are different
and not trivial–we minimize the overlap and refer the reader
to [19] for details. A second reason to go over this
analysis in the paper for the QC algorithm is that we derive in this Section for QC several specific bounds that are
used and needed as intermediate results for the sample path analysis that is carried out in Section IV when studying
dithered quantized consensus when the quantizer is bounded, i.e., Quantized Consensus with Finite quantizer, the
QCF quantizer. The QCF is a very simple algorithm: it is QC till the QC state reaches the quantizer bound, otherwise
an error is declared and the algorithm terminated. To study QCF, we establish uniform boundedness of the sample
paths of the QC algorithm. This requires establishing the statistical properties of the supremum taken over the
sample paths of the QC. This is accomplished by splitting the state vector of the quantizer in two components:
one along the consensus subspace and the other along the subspace orthogonal to the consensus subspace. These
proofs use maximal inequalities for submartingale and supermartingale sequences. From these, we are able to derive
probability bounds on the excursions of the two subsequences, which we use to derive probability bounds on the
excursions of the QC. We see that to carry out this sample path study requires new methods of analysis that go
well beyond the stochastic approximation methodology that we used in our paper [19], and also used by [34] to
study consensus with noise but fixed networks. The detailed s ample path analysis leads to bounds on the probability
of the sample path excursions of the QC algorithm. We then use these bounds to design the quantizer parameters
and to explore tradeoffs among these parameters. In particular, we derive a probability of ǫ-consensus expressed
in terms of the ( finite) number of quantizer levels, the size o f the quantization steps, the desired probability of
saturation, and the desired level of accuracy ǫ away from consensus.
For the QC algorithm, there exists an interesting trade-off between the m.s.e. (between the limiting random
variable and the desired initial average) and the convergence: by tuning the link weight sequence appropriately,
it is possible to make the m.s.e. arbitrarily small (irrespective of the quantization step-size), though penalizing
the convergence rate. To tune the QC-algorithm, we introduce a scalar control parameter s (associated with the
time-varying link weight sequence), which can make the m.s.e. as small as we want, irrespective of how large
5
the step-size ∆ is. This is significant in applications that rely on accuracy and may call for very small m.s.e. for
being useful. More specifically, if a cost structure is impos ed on the consensus problem, where the objective is a
function of the m.s.e. and the convergence rate, one may obtain the optimal scaling s by minimizing the cost from
the Pareto-optimal curve generated by varying s. These tradeoffs and vanishingly small m.s.e. contrasts with the
algorithms in [20], [21], [22], [23], [24] where the m.s.e. is proportional to ∆2 , the quantization step-size –if the
step-size is large, these algorithms lead to a large m.s.e.
Organization of the paper. We comment brie fly on the organization of the main sections of
summarizes relevant background, including spectral graph theory and average consensus, and presents the dithered
the paper. Section II
quantized consensus problem with the dither satisfying the Schuchman conditions. Sections III considers the
convergence of the QC algorithm. It shows a.s. convergence to a random variable, whose m.s.e. is fully characterized.
Section IV studies the sample path behavior of the QC algorithm through the QCF. It uses the expressions we derive
for the probability of large excursions of the sample paths of the quantizer to consider the tradeoffs among different
quantizer parameters, e.g., number of bits and quantization step, and the network topology to achieve optimal
performance under a constraint on the number of levels of the quantizer. These tradeoffs are illustrated with a
numerical study. Finally, Section V concludes the paper.
I I . CON S EN SU S W ITH QUANT IZ ED DATA : PROBL EM STAT EMENT
We present preliminaries needed for the analysis of the consensus algorithm with quantized data. The set-up of
the average consensus problem is standard, see the introductory sections of relevant recent papers.
A. Preliminaries: Notation and Average Consensus
The sensor network at time index i is represented by an undirected, simple, connected graph G(i) = (V , E (i)).
The vertex and edge sets V and E (i), with cardinalities V = N and E (i) = M (i), collect the sensors and
communication channels or links among sensors in the network at time i. The network topology at time i, i.e., with
which sensors does each sensor communicate with, is described by the N × N discrete Laplacian L(i) = LT (i) =
D(i) − A(i) ≥ 0. The matrix A(i) is the adjacency matrix of the connectivity graph at time i, a (0, 1) matrix
where Ank (i) = 1 signifies that there is a link between sensors n and k at time i. The diagonal entries of A(i) are
zero. The diagonal matrix D(i) is the degree matrix, whose diagonal Dnn (i) = dn (i) where dn (i) is the degree
of sensor n, i.e., the number of links of sensor n at time i. The neighbors of a sensor or node n, collected in the
neighborhood set Ωn (i), are those sensors k for which entries Ank (i) 6= 0. The Laplacian is positive semide finite;
in case the network is connected at time i, the corresponding algebraic connectivity or Fiedler value is positive, i.e.,
the second eigenvalue of the Laplacian λ2 (L(i)) > 0, where the eigenvalues of L(i) are ordered in increasing order.
For detailed treatment of graphs and their spectral theory see, for example, [35], [36], [37]. Throughout the paper
the symbols P[·] and E[·] denote the probability and expectation operators w.r.t. the probability space of interest.
Distributed Average Consensus. The sensors measure the data xn (0), n = 1, · · · , N , collected in the vector
x(0) = [x1 (0) · · · xN (0)]T ∈ RN ×1 . Distributed average consensus computes the average r of the data
NXn=1
r = xavg (0) =
1
N
(1)
xn (0) =
x(0)T 1
1
N
6
by local data exchanges among neighboring sensors. In (1), the column vector 1 has all entries equal to 1. Consensus
is an iterative algorithm where at iteration i each sensor updates its current state xn (i) by a weighted average of
its current state and the states of its neighbors. Standard consensus assumes a fixed connected network topology,
i.e., the links stay online permanently, the communication is noiseless, and the data exchanges are analog. Under
mild conditions, the states of all sensors reach consensus, converging to the desired average r, see [5], [13],
lim
i→∞
x(i) = r1
(2)
where x(i) = [x1 (i) · · · xN (i)]T is the state vector that stacks the state of the N sensors at iteration i. We consider
consensus with quantized data exchanges and random topology (links fail or become alive at random times), which
models packet dropouts. In [19], we studied consensus with random topologies and (analog) noisy communications.
B. Dithered Quantization: Schuchman Conditions
We write the sensor updating equations for consensus with quantized data and random link failures as
xn (i + 1) = [1 − α(i)dn (i)] xn (i) + α(i) Xl∈Ωn (i)
where: α(i) is the weight at iteration i; and {fnl,i}1≤n,l≤N , i≥0 is a sequence of functions (possibly random)
modeling the quantization effects. Note that in (3), the weights α(i) are the same across all links—the equal
weights consensus, see [13] —but the weights may change with
time. Also, the degree dn (i) and the neighborhood
Ωn (i) of each sensor n, n = 1, · · · , N are dependent on i emphasizing the topology may be random time-varying.
Quantizer. Each inter-sensor communication channel uses a uniform quantizer with quantization step ∆. We
model the communication channel by introducing the quantizing function, q(·) : R → Q,
fnl,i [xl (i)] , 1 ≤ n ≤ N
(3)
q(y ) = k∆,
(k −
1
2
)∆ ≤ y < (k +
1
2
)∆
where y ∈ R is the channel input. Writing
q(y ) = y + e(y )
where e(y ) is the quantization error. Conditioned on the input, the quantization error e(y ) is deterministic, and
−
∆
2
≤ e(y ) <
∆
2
, ∀y
We first consider quantized consensus (QC) with unbounded ra nge, i.e., the quantization alphabet
Q = {k∆ k ∈ Z}
(4)
(5)
(6)
(7)
is countably in finite. In Section IV. we consider what happen s when the range of the quantizer is finite –quantized
consensus with finite (QCF) alphabet. This study requires th at we detail the sample path behavior of the QC-
algorithm.
We discuss brie fly why a naive approach to consensus will fail
(see [27] for a similar discussion.) If we use
directly the quantized state information, the functions fnl,i (·) in eqn. (3) are
fnl,i (xl (i)) = q(xl (i))
= xl (i) + e(xl (i))
7
(8)
(9)
Equations (3) take then the form
xl (i) + α(i) Xl∈Ωn (i)
xn (i + 1) = (1 − α(i)dn (i))xn (i) + α(i) Xl∈Ωn (i)
The non-stochastic errors (the most right terms in (10)) lead to error accumulation. If the network topology remains
fixed (deterministic topology,) the update in eqn. (10) repr esents a sequence of iterations that, as observed above,
conditioned on the initial state, which then determines the input, are deterministic. If we choose the weights α(i)’s
to decrease to zero very quickly, then (10) may terminate before reaching the consensus set. On the other hand, if
the α(i)’s decay slowly, the quantization errors may accumulate, thus making the states unbounded.
In either case, the naive approach to consensus with quantized data fails to lead to a reasonable solution. This
e(xl (i))
(10)
failure is due to the fact that the error terms are not stochastic. To overcome these problems, we introduce in
a controlled way noise (dither) to randomize the sensor states prior to quantizing the perturbed stochastic state.
Under appropriate conditions, the resulting quantization errors possess nice statistical properties, leading to the
quantized states reaching consensus (in an appropriate sense to be de fined below.) Dither places consensus with
quantized data in the framework of distributed consensus with noisy communication links; when the range of the
quantizer is unbounded, we apply stochastic approximation to study the limiting behavior of QC, as we did in [19]
to study consensus with (analog) noise and random topology. Note that if instead of adding dither, we assumed that
the quantization errors are independent, uniformly distributed random variables, we would not need to add dither,
and our analysis would still apply.
Schuchman conditions. The dither added to randomize the quantization effects satisfies a special condition,
namely, as in subtractively dithered systems, see [38], [39]. Let {y (i)}i≥0 and {ν (i)}i≥0 be arbitrary sequences
of random variables, and q(·) be the quantization function (4). When dither is added before quantization, the
quantization error sequence, {ε(i)}i≥0 , is
ε(i) = q(y (i) + ν (i)) − (y (i) + ν (i))
(11)
If the dither sequence, {ν (i)}i≥0 , satisfies the Schuchman conditions, [40], then the quantiz ation error sequence,
{ε(i)}i≥0 , in (11) is i.i.d. uniformly distributed on [−∆/2, ∆/2) and independent of the input sequence {y (i)}i≥0
(see [41], [42], [38]). A sufficient condition for {ν (i)} to satisfy the Schuchman conditions is for it to be a sequence
of i.i.d. random variables uniformly distributed on [−∆/2, ∆/2) and independent of the input sequence {y (i)}i≥0 .
In the sequel, the dither {ν (i)}i≥0 satisfies the Schuchman conditions. Hence, the quantizatio n error sequence,
{ǫ(i)}, is i.i.d. uniformly distributed on [−∆/2, ∆/2) and independent of the input sequence {y (i)}i≥0 .
C. Dithered Quantized Consensus With Random Link Failures: Problem Statement
8
q [xl (i) + νnl (i)] , 1 ≤ n ≤ N
We now return to the problem formulation of consensus with quantized data with dither added. Introducing the
sequence, {νnl (i)}i≥0,1≤n,l≤N , of i.i.d. random variables, uniformly distributed on [−∆/2, ∆/2), the state update
equation for quantized consensus is:
xn (i + 1) = (1 − α(i)dn (i)) xn (i) + α(i) Xl∈Ωn (i)
This equation shows that, before transmitting its state xl (i) to the n-th sensor, the sensor l adds the dither νnl (i),
then the channel between the sensors n and l quantizes this corrupted state, and, finally, sensor n receives this
quantized output. Using eqn. (11), the state update is
xn (i + 1) = (1 − α(i)dn ) xn (i) + α(i) Xl∈Ωn (i)
The random variables νnl (i) are independent of the state x(j ), i.e., the states of all sensors at iteration j , for j ≤ i.
Hence, the collection {εnl (i)} consists of i.i.d. random variables uniformly distributed on [−∆/2, ∆/2), and the
random variable εnl (i) is also independent of the state x(j ), j ≤ i.
We rewrite (13) in vector form. De fine the random vectors, Υ(i) and Ψ(i) ∈ RN ×1 with components
Υn (i) = − Xl∈Ωn (i)
Ψn (i) = − Xl∈Ωn (i)
The the N state update equations in (13) become in vector form
[xl (i) + νnl (i) + εnl (i)]
νnl (i)
εnl (i)
(14)
(15)
(12)
(13)
x(i + 1) = x(i) − α(i) [L(i)x(i) + Υ(i) + Ψ(i)]
(16)
where Υ(i) and Ψ(i) are zero mean vectors, independent of the state x(i), and have i.i.d. components. Also, if M
is the number of realizable network links, eqns. (14) and (15) lead to
E (cid:2)kΥ(i)k2 (cid:3) = E (cid:2)kΨ(i)k2 (cid:3) ≤
Random Link Failures: We now state the assumption about the link failure model to be adopted throughout
the paper. The graph Laplacians are
M∆2
6
, i ≥ 0
(17)
L(i) = L + eL(i), ∀i ≥ 0
(18)
where {L(i)}i≥0 is a sequence of i.i.d. Laplacian matrices with mean L = E [L(i)], such that λ2 (cid:0)L(cid:1) > 0 (we just
require the network to be connected on the average.) We do not make any distributional assumptions on the link
failure model. During the same iteration, the link failures can be spatially dependent, i.e., correlated across different
edges of the network. This model subsumes the erasure network model, where the link failures are independent
both over space and time. Wireless sensor networks motivate this model since interference among the sensors
communication correlates the link failures over space, while over time, it is still reasonable to assume that the
channels are memoryless or independent. We also note that the above assumption λ2 (cid:0)L(cid:1) > 0 does not require the
9
individual random instantiations of L(i) to be connected; in fact, it is possible to have all the instantiations to be
disconnected. This enables us to capture a broad class of asynchronous communication models, for example, the
random asynchronous gossip protocol analyzed in [33] satisfies λ2 (cid:0)L(cid:1) > 0 and hence falls under this framework.
More generally, in the asynchronous set up, if the sensors nodes are equipped with independent clocks whose ticks
follow a regular random point process (the ticking instants do not have an accumulation point, which is true for
all renewal processes, in particular, the Poisson clock in [33]), and at each tick a random network is realized with
λ2 (cid:0)L(cid:1) > 0 independent of the the networks realized in previous ticks (this is the case with the link formation
process assumed in [33]) our algorithm applies.1
We denote the number of network edges at time i as M (i), where M (i) is a random subset of the set of all
possible edges E with E = N (N − 1)/2. Let M denote the set of realizable edges. We then have the inclusion
M (i) ⊂ M ⊂ E , ∀i
(19)
It is important to note that the value of M (i) depends on the link usage protocol. For example, in the asynchronous
gossip protocol considered in [33], at each iteration only one link is active, and hence M (i) = 1.
Independence Assumptions: We assume that the Laplacian sequence {L(i)}i≥0 is independent of the dither
sequence {εnl (i)}.
Persistence condition: To obtain convergence, we assume that the gains α(i) satisfy the following.
α(i) > 0, Xi≥0
α(i) = ∞, Xi≥0
Condition (20) assures that the gains decay to zero, but not too fast. It is standard in stochastic adaptive signal
processing and control; it is also used in consensus with noisy communications in [34], [19].
i (cid:9)i≥0
Markov property. Denote the natural filtration of the process X = {x(i)}i≥0 by (cid:8)F X
. Because the dither
random variables νnl (i), 1 ≤ n, l ≤ N , are independent of F X
i at any time i ≥ 0, and, correspondingly, the noises
Υ(i) and Ψ(i) are independent of x(i), the process X is Markov.
α2 (i) < ∞
(20)
I I I . CON S EN SU S W ITH QUANT IZ ED DATA : UNBOUNDED QUANT IZ ED STAT E S
We consider that the dynamic range of the initial sensor data, whose average we wish to compute, is not known.
To avoid quantizer saturation, the quantizer output takes values in the countable alphabet (7), and so the channel
quantizer has unrestricted dynamic range. This is the quantizer consensus (QC) with unbounded range algorithm.
Section IV studies quantization with unbounded range, i.e., the quantized consensus finite-bit (QCF) algorithm
where the channel quantizers take only a finite number of outp ut values ( finite-bit quantizers).
We comment brie fly on the organization of the remaining of thi s section. Subsection III-A proves the a.s. con-
vergence of the QC algorithm. We characterize the performance of the QC algorithm and derive expressions
for the mean-squared error in Subsection III-B. The tradeoff between m.s.e. and convergence rate is studied in
Subsection III-C. Finally, we present generalizations to the approach in Subsection III-D.
1 In case the network is static, i.e., the connectivity graph is time-invariant, all the results in the paper apply with L(i) ≡ L, ∀i.
A. QC Algorithm: Convergence
We start with the de finition of the consensus subspace C given as
C = (cid:8)x ∈ RN ×1 (cid:12)(cid:12) x = a1, a ∈ R(cid:9)
We note that any vector x ∈ RN can be uniquely decomposed as
x = xC + xC⊥
and
kxk2 = kxC k2 + kxC⊥ k2
10
(21)
(22)
(23)
where xC ∈ C and xC⊥ belongs to C ⊥ , the orthogonal subspace of C . We show that (16), under the model in
Subsection II-C, converges a.s. to a finite point in C .
De fine the component-wise average as
xavg (i) =
1
N
1T x(i)
(24)
We prove the a.s. convergence of the QC algorithm in two stages. Theorem 2 proves that the state vector sequence
{x(i)}i≥0 converges a.s. to the consensus subspace C . Theorem 3 then completes the proof by showing that the
sequence of component-wise averages, {xavg (i)}i≥0 converges a.s. to a finite random variable
θ. The proof of
Theorem 3 needs a basic result on convergence of Markov processes and follows the same theme as in [19].
Stochastic approximation: Convergence of Markov processes. We state a slightly modified form , suitable to
our needs, of a result from [43]. We start by introducing notation, following [43], see also [19].
Let X = {x(i)}i≥0 be Markov in RN ×1 . The generating operator L is
LV (i, x) = E [V (i + 1, x(i + 1)) x(i) = x] − V (i, x) a.s.
(25)
for functions V (i, x), i ≥ 0, x ∈ RN ×1 , provided the conditional expectation exists. We say that V (i, x) ∈ DL
(i, x) ∈ A.
in a domain A, if LV (i, x) is finite for all
Let the Euclidean metric be ρ(·). De fine the
ǫ-neighborhood of B ⊂ RN ×1 and its complementary set
Uǫ (B ) = (cid:26)x (cid:12)(cid:12)(cid:12)(cid:12) inf
ρ(x, y ) < ǫ (cid:27)
y∈B
Vǫ (B ) = RN ×1\Uǫ (B )
Theorem 1 (Convergence of Markov Processes) Let: X be a Markov process with generating operator L; V (i, x) ∈
DL a non-negative function in the domain i ≥ 0, x ∈ RN ×1 , and B ⊂ RN ×1 . Assume:
(27)
(26)
1) Potential function:
inf
i≥0,x∈Vǫ (B )
V (i, x) > 0, ∀ǫ > 0
V (i, x) ≡ 0, x ∈ B
lim
x→B
sup
i≥0
V (i, x) = 0
2) Generating operator:
LV (i, x) ≤ g (i)(1 + V (i, x)) − α(i)ϕ(i, x)
(28)
(29)
(30)
(31)
where ϕ(i, x), i ≥ 0, x ∈ RN ×1 is a non-negative function such that
inf
i,x∈Vǫ (B )
ϕ(i, x) > 0, ∀ǫ > 0
α(i) > 0, Xi≥0
g (i) > 0, Xi≥0
Then, the Markov process X = {x(i)}i≥0 with arbitrary initial distribution converges a.s. to B as i → ∞
ρ (x(i), B ) = 0(cid:17) = 1
P (cid:16) lim
i→∞
Proof: For proof, see [43], [19].
α(i) = ∞
g (i) < ∞
11
(32)
(33)
(34)
(35)
Theorem 2 (a.s. convergence to consensus subspace) Consider the quantized distributed averaging algorithm given
in eqns. (16). Then, for arbitrary initial condition, x(0), we have
ρ(x(i), C ) = 0i = 1
P h lim
i→∞
Proof: The proof uses similar arguments as that of Theorem 3 in [19]. So we provide the main steps here
and only those details which are required for later development of the paper.
(36)
The key idea shows that the quantized iterations satisfy the assumptions of Theorem 1. De fine the potential
function, V (i, x), for the Markov process X as
Then, using the properties of L and the continuity of V (i, x),
V (i, x) = xT Lx
V (i, x) ≡ 0, x ∈ C and lim
x→C
sup
i≥0
V (i, x) = 0
For x ∈ RN ×1 , we clearly have ρ(x, C ) = kxC⊥ k. Using the fact that xT Lx ≥ λ2 (L)kxC⊥ k2 it then follows
λ2 (L)kxC⊥ k2 ≥ λ2 (cid:0)L(cid:1) ǫ2 > 0
inf
V (i, x) ≥
inf
i≥0,x∈Vǫ (C )
i≥0,x∈Vǫ (C )
since λ2 (cid:0)L(cid:1) > 0. This shows, together with (38), that V (i, x) satisfies (28) –(30).
Now consider LV (i, x). We have using the fact that eL(i)x = eL(i)xC⊥ and the independence assumptions
LV (i, x) = E (cid:20)(cid:16)x(i) − α(i)Lx(i) − α(i) eL(i)x(i) − α(i)Υ(i) − α(i)Ψ(i)(cid:17)T
L (cid:16)x(i) − α(i)Lx(i)
− α(i) eL(i)x(i) − α(i)Υ(i) − α(i)Ψ(i)(cid:17)(cid:12)(cid:12)(cid:12) x(i) = xi − xT Lx
max (cid:16) eL(i)(cid:17)i kxC⊥ k2
N (L)kxC⊥ k2 + α2 (i)λN (L)E hλ2
2
≤ −2α(i)xT L
x + α2 (i)λ3
+2α2 (i)λN (L)(cid:0)E (cid:2)kΥ(i)k2(cid:3)(cid:1)1/2 (cid:0)E (cid:2)kΨ(i)k2 (cid:3)(cid:1)1/2
+ α2 (i)λN (L)E (cid:2)kΥ(i)k2 (cid:3)
+α2 (i)λN (L)E (cid:2)kΨ(i)k2 (cid:3)
(37)
(38)
(39)
(40)
Since xT Lx ≥ λ2 (L)kxC⊥ k2 , the eigenvalues of eL(i) are not greater than 2N in magnitude, and from (17) get
(cid:19) xT Lx +
x + (cid:18) α2 (i)λ3
4α2 (i)N 2λN (L)
2α2 (i)M∆2λN (L)
N (L)
2
LV (i, x) ≤ −2α(i)xT L
+
3
λ2 (L)
λ2 (L)
(41)
≤ −α(i)ϕ(i, x) + g (i) [1 + V (i, x)]
12
where
+
,
2
ϕ(i, x) = 2xT L
x, g (i) = α2 (i) max (cid:18) λ3
(cid:19)
N (L)
λ2 (L)
Clearly, LV (i, x) and ϕ(i, x), g (i) satisfy the remaining assumptions (31) –(34) of Theorem 1; h ence,
ρ(x(i), C ) = 0i = 1
P h lim
i→∞
The convergence proof for QC will now be completed in the next Theorem.
2M∆2λN (L)
3
4N 2λN (L)
λ2 (L)
(42)
(43)
Theorem 3 (Consensus to finite random variable) Consider (16), with arbitrary initial condition x(0) ∈ RN ×1 and
the state sequence {x(i)}i≥0 . Then, there exists a finite random variable θ such that
P h lim
x(i) = θ1i = 1
i→∞
{Fi}i≥0 as
Proof: De fine the filtration
Fi = σ nx(0), {L(j )}0≤j<i , {Υ(j )}0≤j<i , {Ψ(j )}0≤j<io
We will now show that the sequence {xavg (i)}i≥0 is an L2 -bounded martingale w.r.t. {Fi}i≥0 . In fact,
(44)
(45)
xavg (i + 1) = xavg (i) − α(i)Υ(i) − α(i)Ψ(i)
where Υ(i) and Ψ(i) are the component-wise averages given by
Υ(i) =
1
N
1T Υ(i), Ψ(i) =
1
N
1T Ψ(i)
Then,
E [ xavg (i + 1) Fi ] = xavg (i) − α(i)E (cid:2) Υ(i)(cid:12)(cid:12) Fi (cid:3) − α(i)E (cid:2) Ψ(i)(cid:12)(cid:12) Fi (cid:3)
= xavg (i) − α(i)E (cid:2)Υ(i)(cid:3) − α(i)E (cid:2)Ψ(i)(cid:3)
= xavg (i)
where the last step follows from the fact that Υ(i) is independent of Fi , and
E (cid:2)Ψ(i) Fi (cid:3) = E (cid:2)Ψ(i) x(i)(cid:3)
= 0
because Ψ(i) is independent of x(i) as argued in Section II-B.
(46)
(47)
(48)
(49)
13
2
(50)
2
2
Thus, the sequence {xavg (i)}i≥0 is a martingale. For proving L2 boundedness, note
E (cid:2)x2
avg (i + 1)(cid:3) = E (cid:2)xavg (i) − α(i)Υ(i) − α(i)Ψ(i)(cid:3)2
avg (i)(cid:3) + α2 (i)E hΥ
(i)i + 2α2 (i)E (cid:2)Υ(i)Ψ(i)(cid:3)
(i)i + α2 (i)E hΨ
= E (cid:2)x2
2
avg (i)(cid:3) + α2 (i)E hΥ
(i)i
≤ E (cid:2)x2
2
+α2 (i)E hΨ
(i)i(cid:17)1/2
(i)i(cid:17)1/2 (cid:16)E hΨ
(i)i + 2α2 (i) (cid:16)E hΥ
2
2
2
Again, it can be shown by using the independence properties and (17) that
(i)i ≤
(i)i = E hΨ
E hΥ
where M is the number of realizable edges in the network (eqn. (19)). It then follows from eqn. (50) that
2α2 (i)M∆2
E (cid:2)x2
avg (i + 1)(cid:3) ≤ E (cid:2)x2
avg (i)(cid:3) +
3N 2
3N 2 Xj≥0
2M∆2
E (cid:2)x2
avg (i)(cid:3) ≤ x2
avg (0) +
Note that in this equation, x2
avg (0) is bounded since it is the average of the initial conditions, i.e., at time 0. Thus
{xavg (i)}i≥0 is an L2 -bounded martingale; hence, it converges a.s. and in L2 to a finite random variable θ ([44]).
In other words,
xavg (i) = θi = 1
P h lim
i→∞
Again, Theorem 2 implies that as i → ∞ we have x(i) → xavg (i)1 a.s. This and (54) prove the Theorem.
We extend Theorems 2,3 to derive the mean squared (m.s.s.) consensus of the sensor states to the random variable
θ under additional assumptions on the weight sequence {α(i)}i≥0 .
Finally, the recursion leads to
M∆2
6N 2
α2 (j )
(51)
(52)
(53)
(54)
Lemma 4 Let the weight sequence {α(i)}i≥0 be of the form:
α(i) =
a
(i + 1)τ
where a > 0 and .5 < τ ≤ 1. Then the a.s. convergence in Theorem 3 holds in m.s.s. also, i.e.,
E h(xn (i) − θ)2 i = 0,
Proof: The proof is provided in Appendix I.
lim
i→∞
∀n
(55)
(56)
B. QC Algorithm: Mean-Squared Error
Theorem 3 shows that the sensors reach consensus asymptotically and in fact converge a.s. to a finite random
variable θ. Viewing θ as an estimate of the initial average r (see eqn. (1)), we characterize its desirable statistical
properties in the following Lemma.
Lemma 5 Let θ be as given in Theorem 3 and r, the initial average, as given in eqn. (1). De fine
to be the m.s.e. Then, we have:
ζ = E [θ − r]2
14
(57)
1) Unbiasedness:
2) M.S.E. Bound:
E [θ] = r
3N 2 Pj≥0 α2 (j )
ζ ≤ 2M∆2
Proof: The proof follows from the arguments presented in the proof of Theorem 3 and is omitted.
We note that the m.s.e. bound in Lemma 5 is conservative. Recalling the de finition of M (i), as the number of
active links at time i (see eqn. (19)), we have (by revisiting the arguments in the proof of Theorem 3)
3N 2 Xj≥0
2∆2
α2 (j ) E (cid:2)M (i)2 (cid:3)
(58)
ζ ≤
(Note that the term Pj≥0 α2 (j ) E (cid:2)M (i)2 (cid:3) is well-de fined as E (cid:2)M (i)2 (cid:3) ≤ M2 , ∀i.) In case, we have a fixed
(non-random) topology, M (i) = M, ∀i and the bound in eqn. (58) reduces to the one in Lemma 5. For the
asynchronous gossip protocol in [33], M (i) = 1, ∀i, and hence
3N 2 Xj≥0
2∆2
Lemma 5 shows that, for a given ∆, ζ can be made arbitrarily small by properly scaling the weight sequence,
{α(i)}i≥0 . We formalize this. Given an arbitrary weight sequence, {α(i)}i≥0 , which satisfies the persistence
condition (20), de fine the scaled weight sequence, {αs (i)}i≥0 , as
ζgossip ≤
α2 (j )
(59)
αs (i) = sα(i), ∀i ≥ 0
(60)
where, s > 0, is a constant scaling factor. Clearly, such a scaled weight sequence satisfies the persistence condi-
tion (20), and the m.s.e. ζs obtained by using this scaled weight sequence is given by
3N 2 Xj≥0
2M∆2 s2
showing that, by proper scaling of the weight sequence, the m.s.e. can be made arbitrarily small.
However, reducing the m.s.e. by scaling the weights in this way will reduce the convergence rate of the algorithm.
α2 (j )
ζs ≤
(61)
This tradeoff is considered in the next subsection.
C. QC Algorithm: Convergence Rate
A detailed pathwise convergence rate analysis can be carried out for the QC algorithm using strong approximations
like laws of iterated logarithms etc., as is the case with a large class of stochastic approximation algorithms. More
generally, we can study formally some moderate deviations asymptotics ([45],[46]) or take recourse to concentration
inequalities ([47]) to characterize convergence rate. Due to space limitations we do not pursue such analysis in this
paper; rather, we present convergence rate analysis for the state sequence {x(i)}i≥0 in the m.s.s. and that of the
mean state vector sequence. We start by studying the convergence of the mean state vectors, which is simple, yet
15
illustrates an interesting trade-off between the achievable convergence rate and the mean-squared error ζ through
design of the weight sequence {α(i)}i≥0 .
From the asymptotic unbiasedness of θ we have
Our objective is to determine the rate at which the sequence {E [x(i)]}i≥0 converges to r1.
lim
i→∞
E [x(i)] = r1
(62)
, ∀i
α(i) ≤
Lemma 6 Without loss of generality, make the assumption
2
λ2 (cid:0)L(cid:1) + λN (L)
(We note that this holds eventually, as the α(i) decrease to zero.) Then,
kE [x(i)] − r1k ≤ (cid:16)e−λ2 (L)(P0≤j≤i−1 α(j))(cid:17) kE [x(0)] − r1k
Proof: We note that the mean state propagates as
E [x(i + 1)] = (cid:0)I − α(i)L(cid:1) E [x(i)] , ∀i
The proof then follows from [19] and is omitted.
It follows from Lemma 6 that the rate at which the sequence {E [x(i)]}i≥0 converges to r1 is closely related to
the rate at which the weight sequence, α(i), sums to in finity. On the other hand, to achieve a small bound ζ on the
m.s.e, see lemma 57 in Subsection III-B, we need to make the weights small, which reduces the convergence rate
of the algorithm. The parameter s introduced in eqn. (60) can then be viewed as a scalar control parameter, which
can be used to trade-off between precision (m.s.e.) and convergence rate. More specifically, if a cost structure is
(63)
(64)
(65)
imposed on the consensus problem, where the objective is a function of the m.s.e. and the convergence rate, one
may obtain the optimal scaling s minimizing the cost from the pareto-optimal curve generated by varying s. This
is significant, because the algorithm allows one to trade off m.s.e. vs. convergence rate, and in particular, if the
application requires precision (low m.s.e.), one can make the m.s.e. arbitrarily small irrespective of the quantization
step-size ∆. It is important to note in this context, that though the algorithms in [22], [20] lead to finite m.s.e., the
resulting m.s.e. is proportional to ∆2 , which may become large if the step-size ∆ is chosen to be large.
Note that this tradeoff is established between the convergence rate of the mean state vectors and the m.s.e. of
the limiting consensus variable θ. But, in general, even for more appropriate measures of the convergence rate, we
expect that, intuitively, the same tradeoff will be exhibited, in the sense that the rate of convergence will be closely
related to the rate at which the weight sequence, α(i), sums to in finity. We end this subsection by studying the
m.s.s. convergence rate of the state sequence {x(i)}i≥0 which is shown to exhibit a similar trade-off.
Lemma 7 Let the weight sequence {α(i)}i≥0 be of the form:
where a > 0 and .5 < τ ≤ 1. Then the m.s.s. error evolves as follows: For every 0 < ε < 2λ2
2 (L)
λN (L) , there exists
α(i) =
a
(i + 1)τ
(66)
−ε« Pi−1
j=iε
α(j)
iε ≥ 0, such that, for all i ≥ iε we have
E hkx(i) − r1k2 i ≤
+
1
λ2 (L)
λ2
−„2
2 (L)
λN (L)
e
i−1Xj=iε " e
i−1Xj=0
Proof: The proof is provided in Appendix I.
From the above we note that slowing up the sequence {α(i)}i≥0 decreases the polynomial terms on the R.H.S. of
eqn. (67), but increases the exponential terms and since the effect of exponentials dominate that of the polynomials
E hkxC⊥ (iε )k2 i
l=j+1 α(l)! g (j )# +
−ε« Pi−1
2M∆2
3
−„2
λ2
2 (L)
λN (L)
1
λ2 (L)
16
(67)
α2 (j )
we see a similar trade-off between m.s.e. and convergence rate (m.s.s.) as observed when studying the mean state
vector sequence above.
D. QC Algorithm: Generalizations
The QC algorithm can be extended to handle more complex situations of imperfect communication. For instance,
we may incorporate Markovian link failures (as in [19]) and time-varying quantization step-size with the same type
of analysis.
Markovian packet dropouts can be an issue in some practical wireless sensor network scenarios, where random
environmental phenomena like scattering may lead to temporal dependence in the link quality. Another situation
arises in networks of mobile agents, where physical aspects of the transmission like channel coherence time, channel
fading effects are related to the mobility of the dynamic network. A general analysis of all such scenarios is beyond
the scope of the current paper. However, when temporal dependence is manifested through a state dependent
Laplacian (this occurs in mobile networks, formation control problems in multi-vehicle systems), under fairly
general conditions, the link quality can be modeled as a temporal Markov process as in [19] (see Assumption 1.2
in [19].) Due to space limitations of the current paper, we do not present a detailed analysis in this context and
refer the interested reader to [19], where such temporally Markov link failures were addressed in detail, though in
the context of unquantized analog transmission.
The current paper focuses on quantized transmission of data and neglects the effect of additive analog noise.
Even in such a situation of digital transmission, the message decoding process at the receiver may lead to analog
noise. Our approach can take into account such generalized distortions and the main results will continue to hold.
For analysis purposes, temporally independent zero mean analog noise can be incorporated as an additional term
on the R.H.S. of eqn. (16) and subsequently absorbed into the zero mean vectors Ψ(i), Υ(i). Digital transmission
where bits can get flipped due to noise would be more challengi ng to address.
The case of time-varying quantization may be relevant in many practical communication networks, where because
of a bit-budget, as time progresses the quantization may become coarser (the step-size increases). It may also arise
if one considers a rate allocation protocol with vanishing rates as time progresses (see [48]). In that case, the
quantization step-size sequence, {∆(i)}i≥0 is time-varying with possibly
lim sup
i→∞
∆(i) = ∞
(68)
17
Also, as suggested in [27], one may consider a rate allocation scheme, in which the quantizer becomes finer as
time progresses. In that way, the quantization step-size sequence, {∆(i)}i≥0 may be a decreasing sequence.
Generally, in a situation like this to attain consensus the link weight sequence {α(i)}i≥0 needs to satisfy a
generalized persistence condition of the form
Xi≥0
α(i) = ∞, Xi≥0
Note, when the quantization step-size is bounded, this reduces to the persistence condition assumed earlier. We
state without proof the following result for time-varying quantization case.
α2 (i)∆2 (i) < ∞
(69)
Theorem 8 Consider the QC algorithm with time-varying quantization step size sequence {∆(i)}i≥0 and let the
link weight sequence {α(i)}i≥0 satisfy the generalized persistence condition in eqn. (69). Then the sensors reach
consensus to an a.s. finite random variable. In other words, t here exists an a.s. finite random variable θ, such that,
P h lim
xn (i) = θ, ∀ni = 1
i→∞
E h(θ − r)2 i ≤
3N 2 Xi≥0
2M
It is clear that in this case also, we can trade-off m.s.e. with convergence rate by tuning a scalar gain parameter s
associated with the link weight sequence.
Also, if r is the initial average, then
α2 (i)∆2 (i)
(70)
(71)
IV. CON S EN SU S W ITH QUANT IZ ED DATA : BOUNDED IN IT IAL SEN SOR STAT E
We consider consensus with quantized data and bounded range quantizers when the initial sensor states are
bounded, and this bound is known a priori. We show that finite bit quantizers (whose outputs take only a
finite
number of values) suffice. The algorithm QCF that we consider
is a simple modification of the QC algorithm
of Section III. The good performance of the QCF algorithm relies on the fact that, if the initial sensor states
are bounded, the state sequence, {x(i)}i≥0 generated by the QC algorithm remains uniformly bounded with high
probability, as we prove here. In this case, channel quantizers with finite dynamic range perform well with high
probability.
We brie fly state the QCF problem in Subsection IV-A. Then, Sub section IV-B shows that with high probability
the sample paths generated by the QC algorithm are uniformly bounded, when the initial sensor states are bounded.
Subsection IV-C proves that QCF achieves asymptotic consensus. Finally, Subsections IV-D and IV-E analyze its
statistical properties, performance, and tradeoffs.
A. QCF Algorithm: Statement
The QCF algorithm modifies the QC algorithm by restricting th e alphabet of the quantizer to be finite. It assumes
that the initial sensor state x(0), whose average we wish to compute, is known to be bounded. Of course, even if the
initial state is bounded, the states of QC can become unbounded. The good performance of QCF is a consequence
18
of the fact that, as our analysis will show, the states {x(i)}i≥0 generated by the QC algorithm when started with
a bounded initial state x(0) remain uniformly bounded with high probability.
The following are the assumptions underlying QCF. We let the the state sequence for QCF be represented by
{ex(i)}i≥0 .
1) Bounded initial state. Let b > 0. The QCF initial state ex(0) = xn (0) is bounded to the set B known `a priori
B = (cid:8)y ∈ RN ×1 yn ≤ b < +∞(cid:9)
(72)
2) Uniform quantizers and finite alphabet. Each inter-senso r communication channel in the network uses a uniform
⌈log2 (2p + 1)⌉ bit quantizer with step-size ∆, where p > 0 is an integer. In other words, the quantizer output
takes only 2p + 1 values, and the quantization alphabet is given by
eQ = {l∆ l = 0, ±1, · · · , ±p}
Clearly, such a quantizer will not saturate if the input falls in the range [(−p − 1/2)∆, (p + 1/2)∆); if the
input goes out of that range, the quantizer saturates.
3) Uniform i.i.d. noise. Like with QC, the {νnl (i)}i≥0,1≤n,l≤N are a sequence of i.i.d. random variables uniformly
distributed on [−∆/2, ∆/2).
4) The link failure model is the same as used in QC.
(73)
Given this setup, we present the distributed QCF algorithm, assuming that the sensor network is connected. The
state sequence, {ex(i)}i≥0 is given by the following Algorithm.
Algorithm 1: QCF
Initialize
exn (0) = xn (0), ∀n;
i = 0;
begin
while sup1≤n≤N supl∈Ωn (i) (exl (i) + νnl (i)) < (p + 1/2)∆ do
;
exn (i + 1) = (1 − α(i)dn (i))exn (i) + α(i) Pl∈Ωn (i) q(exl (i) + νnl (i)), ∀n;
i = i + 1;
end
Stop the algorithm and reset all the sensor states to zero
The last step of the algorithm can be distributed, since the network is connected.
B. Probability Bounds on Uniform Boundedness of Sample Paths of QC
The analysis of the QCF algorithm requires uniformity properties of the sample paths generated by the QC
algorithm. This is necessary, because the QCF algorithm follows the QC algorithm till one of the quantizers gets
overloaded. The uniformity properties require establishing statistical properties of the supremum taken over the
sample paths, which is carried out in this subsection. We show that the state vector sequence, {x(i)}i≥0 , generated
by the QC algorithm is uniformly bounded with high probability. The proof follows by splitting the sequence
19
{x(i)}i≥0 as the sum of the sequences {xavg (i)}i≥0 and {xC⊥ (i)}i≥0 for which we establish uniformity results.
The proof is lengthy and uses mainly maximal inequalities for submartingale and supermartingale sequences.
Recall that the state vector at any time i can be decomposed orthogonally as
x(i) = xavg (i)1 + xC⊥ (i)
(74)
where the consensus subspace, C , is given in eqn. (21). We provide probability bounds on the sequences {xavg (i)}i≥0
and {xC⊥ (i)}i≥0 and then use an union bound to get the final result.
The rest of the subsection concerns the proof of Theorem 12 which involves several intermediate lemmas as
stated below, whose proofs are provided in Appendix II.
We need the following result.
Lemma 9 Consider the QC algorithm stated in Section II and let {x(i)}i≥0 be the state it sequence generates.
De fine the function W (i, x), i ≥ 0, x ∈ RN ×1 , as
W (i, x) = (1 + V (i, x)) Yj≥i
where V (i, x) = xT Lx and {g (j )}j≥0 is de fined in eqn. (42). 2 Then, the process {W (i, x(i)}i≥0 is a non-negative
supermartingale with respect to the filtration {Fi}i≥0 de fined in eqn. (45).
[1 + g (j )]
(75)
The next Lemma bounds the sequence {xC⊥ (i)}i≥0 .
Lemma 10 Let {x(i)}i≥0 be the state vector sequence generated by the QC algorithm, with the initial state x(0) ∈
RN ×1 . Consider the orthogonal decomposition:
x(i) = xavg (i)1 + xC⊥ (i), ∀i
Then, for any a > 0, we have
kxC⊥ (j )k2 > a(cid:21) ≤ (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
P (cid:20)sup
1 + aλ2 (L)
j≥0
where {g (j )}j≥0 is de fined in eqn. (42).
Next, we provide probability bounds on the uniform boundedness of {xavg (i)}i≥0 .
(76)
(77)
Lemma 11 Let {xavg (i)}i≥0 be the average sequence generated by the QC algorithm, with an initial state x(0) ∈
RN ×1 . Then, for any a > 0,
3N 2 Pj≥0 α2 (j )i1/2
xavg (j ) > a(cid:21) ≤ hx2
avg (0) + 2M∆2
P (cid:20)sup
a
j≥0
(78)
2 The above function is well-defined because the term Qj≥i [1 + g(j )] is finite for any j , by the persistence condition on the weight sequence.
20
Theorem 12 Let {x(i)}i≥0 be the state vector sequence generated by the QC algorithm, with an initial state x(0) ∈
RN ×1 . Then, for any a > 0,
kx(j )k > a(cid:21) ≤ h2N x2
3N Pj≥0 α2 (j )i1/2
avg (0) + 4M∆2
P (cid:20)sup
a
j≥0
where {g (j )}j≥0 is de fined in eqn. (42).
+ (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
1 + a2
2 λ2 (L)
(79)
We now state as a Corollary the result on the boundedness of the sensor states, which will be used in analyzing
the performance of the QCF algorithm.
Corollary 13 Assume that the initial sensor state, x(0) ∈ B , where B is given in eqn. (72). Then, if {x(i)}i≥0 is
the state sequence generated by the QC algorithm starting from the initial state, x(0), we have, for any a > 0,
xn (j ) > a(cid:21) ≤ h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
P (cid:20)
1 + a2
a
2 λ2 (L)
where {g (j )}j≥0 is de fined in eqn. (42).
sup
1≤n≤N ,j≥0
(80)
C. Algorithm QCF: Asymptotic Consensus
We show that the QCF algorithm, given in Subsection IV-A, converges a.s. to a finite random variable and the
sensors reach consensus asymptotically.
Theorem 14 (QCF: a.s. asymptotic consensus) Let {ex(i)}i≥0 be the state vector sequence generated by the QCF
algorithm, starting from an initial state ex(0) = x(0) ∈ B . Then, the sensors reach consensus asymptotically a.s. In
other words, there exists an a.s. finite random variable eθ such that
i→∞ ex(i) = eθ1i = 1
P h lim
(81)
Proof: For the proof, consider the sequence {x(i)}i≥0 generated by the QC algorithm, with the same initial
state x(0). Let θ be the a.s. finite random variable (see eqn. 43) such that
P h lim
x(i) = θ1i = 1
i→∞
on nsupi≥0 sup1≤n≤N supl∈Ωn (i) xl (i) + νnl (i) < (p + 1
2 )∆o
0 otherwise
)∆!
eθ = θI sup
1
(84)
sup
sup
xl (i) + νnl (i) < (p +
2
i≥0
1≤n≤N
l∈Ωn (i)
where I(·) is the indicator function. Since nsupi≥0 sup1≤n≤N supl∈Ωn (i) xl (i) + νnl (i) < (p + 1/2)∆o is a mea-
surable set, it follows that eθ is a random variable.
eθ =
In other words, we have
It is clear that
θ
(82)
(83)
21
D. QCF: ǫ-Consensus
algorithm using finite bit quantizers with finite alphabet
Recall the QCF algorithm in Subsection IV-A and the assumptions 1) –4). A key step is that, if we run the QC
eQ as in eqn. (73), the only way for an error to occur is
for one of the quantizers to saturate. This is the intuition behind the design of the QCF algorithm.
Theorem 14 shows that the QCF sensor states asymptotically reach consensus, converging a.s. to a finite random
variable eθ . The next series of results address the question of how close is this consensus to the desired average r
in (1). Clearly, this depends on the QCF design: 1) the quantizer parameters (like the number of levels 2p + 1 or
the quantization step ∆); 2) the random network topology ; and 3) the gains α.
We de fine the following performance metrics which character ize the performance of the QCF algorithm.
De finition 15 (Probability of
ǫ-consensus and consensus-consistent) The probability of ǫ-consensus is de fined as
exn (i) − r < ǫ(cid:21)
T (G, b, α, ǫ, p, ∆) = P (cid:20) lim
i→∞
Note that the argument G in the de finition of T (·) emphasizes the in fluence of the network con figuration, where
b is given in eqn. (72).
The QCF algorithm is consensus-consistent3 iff for every G, b, ǫ > 0 and 0 < δ < 1, there exists quantizer
parameters p, ∆ and weights {α(i)}i≥0 , such that
sup
1≤n≤N
(85)
as
T (G, b, α, ǫ, p, ∆) > 1 − δ
(86)
Theorem 17 characterizes the probability of ǫ-consensus, while Proposition 18 considers several tradeoffs between
the probability of achieving consensus and the quantizer parameters and network topology, and, in particular, shows
that the QCF algorithm is consensus-consistent. We need the following Lemma to prove Theorem 17.
Lemma 16 Let eθ be de fined as in Theorem 14, with the initial state ex(0) = x(0) ∈ B . The desired average, r, is
given in (1). Then, for any ǫ > 0, we have
α2 (j ) + h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
P heθ − r ≥ ǫi ≤
3N 2 ǫ2 Xj≥0
2M∆2
(87)
p∆
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
1 + p2∆2
2 λ2 (L)
(88)
where {g (j )}j≥0 is de fined in eqn. (42).
Proof: The proof is provided in Appendix III.
We now state the main result of this Section, which provides a performance guarantee for QCF.
3Consensus-consistent means for arbitrary ǫ > 0, the QCF quantizers can be designed so that the QCF states get within an ǫ-ball of r with
arbitrary high probability. Thus, a consensus-consistent algorithm trades off accuracy with bit-rate.
22
Theorem 17 (QCF: Probability of ǫ-consensus) For any ǫ > 0, the probability of ǫ-consensus T (G, b, α, ǫ, p, ∆) is
bounded below
α2 (j ) − h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
exn (i) − r < ǫ(cid:21) > 1 −
P (cid:20) lim
3N 2ǫ2 Xj≥0
2M∆2
p∆
i→∞
− (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
1 + p2∆2
2 λ2 (L)
sup
1≤n≤N
(89)
where {g (j )}j≥0 is de fined in eqn. (42).
Proof:
It follows from Theorem 14 that
i→∞ exn (i) = eθ a.s., ∀1 ≤ n ≤ N
lim
The proof then follows from Lemma 16.
The lower bound on T (·), given by (89), is uniform, in the sense that it is applicable for all initial states x(0) ∈ B .
Recall the scaled weight sequence αs , given by eqn. (60). We introduce the zero-rate probability of ǫ-consensus,
T z (G, b, ǫ, p, ∆) by
(90)
T z (G, b, ǫ, p, ∆) = lim
s→0
T (G, b, αs , ǫ, p, ∆)
(91)
The next proposition studies the dependence of the ǫ-consensus probability T (·) and of the zero-rate probability
T z ((·) on the network and algorithm parameters.
Proposition 18 (QCF: Tradeoffs) 1) Limiting quantizer. For fixed G, b, α, ǫ, we have
lim
∆→0, p∆→∞
T (G, b, α, ǫ, p, ∆) = 1
(92)
Since, this holds for arbitrary ǫ > 0, we note that, as ∆ → 0, p∆ → ∞,
P (cid:20) lim
exn (i) − r < ǫ(cid:21)
i→∞ ex(i) = r1i = lim
P h lim
sup
ǫ→0
i→∞
1≤n≤N
T (G, b, α, ǫ, p, ∆)(cid:21) = 1
ǫ→0 (cid:20)
lim
= lim
∆→0, p∆→∞
In other words, the QCF algorithm leads to a.s. consensus to the desired average r, as ∆ → 0, p∆ → ∞. In
particular, it shows that the QCF algorithm is consensus-consistent.
2) zero-rate ǫ-consensus probability. Then, for fixed G, b, ǫ, p, ∆, we have
T z (G, b, ǫ, p, ∆) ≥ 1 − (cid:0)2N b2(cid:1)1/2
1 + N λN (L)b2
1 + p2∆2
p∆
2 λ2 (L)
3) Optimum quantization step-size ∆. For fixed G, b, ǫ, p, the optimum quantization step-size ∆, which maximizes
(93)
−
the probability of ǫ-consensus, T (G, b, α, ǫ, p, ∆), is given by
∆≥0
α2 (j ) + h2N b2 + 4M ∆2
3N Pj≥0 α2 (j )i1/2
3N 2 ǫ2 Xj≥0
2M∆2
∆∗ (G, b, α, ǫ, p) = arg inf
p∆
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
1 + p2∆2
2 λ2 (L)
where {g (j )}j≥0 is de fined in eqn. (42).
23
(94)
(1 + gs (j )) → 1
Proof: For item 2), we note that, as s → 0,
Xj≥0
s (j ) → 0, Yj≥0
α2
The rest follows by simple inspection of eqn. (89).
We comment on Proposition 18. Item 1) shows that the algorithm QCF is consensus-consistent, in the sense that
we can achieve arbitrarily good performance by decreasing the step-size ∆ and the number of quantization levels,
2p + 1, appropriately. Indeed, decreasing the step-size increases the precision of the quantized output and increasing
p increases the dynamic range of the quantizer. However, the fact that ∆ → 0 but p∆ → ∞ implies that the rate
of growth of the number of levels 2p + 1 should be higher than the rate of decay of ∆, guaranteeing that in the
limit we have asymptotic consensus with probability one.
For interpreting item 2), we recall the m.s.e. versus convergence rate tradeoff for the QC algorithm, studied in
Subsection III-B. There, we considered a quantizer with a countably in finite number of output levels (as opposed
to the finite number of output levels in the QCF) and observed t hat the m.s.e. can be made arbitrarily small by
rescaling the weight sequence. By Chebyshev’s inequality, this would imply, that, for arbitrary ǫ > 0, the probability
of ǫ-consensus, i.e., that we get within an ǫ-ball of the desired average, can be made as close to 1 as we want.
However, this occurs at a cost of the convergence rate, which decreases as the scaling factor s decreases. Thus,
for the QC algorithm, in the limiting case, as s → 0, the probability of ǫ-consensus (for arbitrary ǫ > 0) goes
to 1; we call “limiting probability ” the zero-rate probabil
ity of ǫ-consensus, justifying the m.s.e. vs convergence
rate tradeoff.4 Item 2) shows, that, similar to the QC algorithm, the QCF algorithm exhibits a tradeoff between
probability of ǫ-consensus vs. the convergence rate, in the sense that, by scaling (decreasing s), the probability of
ǫ-consensus can be increased. However, contrary to the QC case, scaling will not lead to probability of ǫ-consensus
arbitrarily close to 1, and, in fact, the zero-rate probability of ǫ-consensus is strictly less than one, as given by
eqn. (93). In other words, by scaling, we can make T (G, b, αs , ǫ, p, ∆) as high as T z (G, b, ǫ, p, ∆), but no higher.
We now interpret the lower bound on the zero-rate probability of ǫ-consensus, T z (G, b, ǫ, p, ∆), and show that
the network topology plays an important role in this context. We note, that, for a fixed number, N , of sensor nodes,
the only way the topology enters into the expression of the lower bound is through the third term on the R.H.S.
4Note that, for both the algorithms, QC and QCF, we can take the scaling factor, s, arbitrarily close to 0, but not zero, so that, these limiting
performance values are not achievable, but we may get arbitrarily close to them.
Then, assuming that,
24
(95)
N λN (L)b2 ≫ 1,
λ2 (L) ≫ 1
we may use the approximation
1 + N λN (L)b2
1 + p2∆2
2 λ2 (L)
p2∆2
2
p2∆2 (cid:19) λN (L)
≈ (cid:18) 2N b2
λ2 (L)
Let us interpret eqn. (95) in the case, where the topology is fi xed (non-random). Then for all i, L(i) = L = L.
Thus, for a fixed number, N , of sensor nodes, topologies with smaller λN (L)/λ2 (L), will lead to higher zero-rate
probability of ǫ-consensus and, hence, are preferable. We note that, in this context, for fixed N , the class of non-
bipartite Ramanujan graphs give the smallest λN (L)/λ2 (L) ratio, given a constraint on the number, M , of network
edges (see [9].)
Item 3) shows that, for given graph topology G, initial sensor data, b, the link weight sequence α, tolerance ǫ,
and the number of levels in the quantizer p, the step-size ∆ plays a significant role in determining the performance.
This gives insight into the design of quantizers to achieve optimal performance, given a constraint on the number
of quantization levels, or, equivalently, given a bit budget on the communication.
In the next Subsection, we present some numerical studies on the QCF algorithm, which demonstrate practical
implications of the results just discussed.
E. QCF: Numerical Studies
We present a set of numerical studies on the quantizer step-size optimization problem, considered in Item 3) of
Proposition 18. We consider a fixed (non-random) sensor netw ork of N = 230 nodes, with communication topology
given by an LPS-II Ramanujan graph (see [9]), of degree 6.5 We fix ǫ at .05, and take the initial sensor data bound,
b, to be 30. We numerically solve the step-size optimization problem given in (94) for varying number of levels,
2p + 1. Specifically, we consider two instances of the optimizatio n problem: In the first instance, we consider the
weight sequence, α(i) = .01/(i + 1), (s = .01), and numerically solve the optimization problem for varying number
of levels. In the second instance, we repeat the same experiment, with the weight sequence, α(i) = .001/(i + 1),
(s = .001). As in eqn. (94), ∆∗ (G, b, αs , ǫ, p) denotes the optimal step-size. Also, let T ∗(G, b, αs , ǫ, p) be the
corresponding optimum probability of ǫ-consensus. Fig. 1 on the left plots T ∗ (G, b, αs , ǫ, p) for varying 2p + 1 on
the vertical axis, while on the horizontal axis, we plot the corresponding quantizer bit-rate BR = log2 (2p + 1).
The two plots correspond to two different scalings, namely, s = .01 and s = .001 respectively. The result is in
strict agreement with Item 2) of Proposition 18, and shows that, as the scaling factor decreases, the probability of
ǫ-consensus increases, till it reaches the zero-rate probability of ǫ-consensus.
Fig. 1 on the right plots ∆∗ (G, b, αs , ǫ, p) for varying 2p + 1 on the vertical axis, while on the horizontal axis, we
plot the corresponding quantizer bit-rate BR = log2 (2p + 1). The two plots correspond to two different scalings,
namely, s = .01 and s = .001 respectively. The results are again in strict agreement to Proposition 18 and further
show that optimizing the step-size is an important quantizer design problem, because the optimal step-size value is
sensitive to the number of quantization levels, 2p + 1.
5 This is a 6-regular graph, i.e., all the nodes have degree 6.
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
)
p
,
ǫ
,
b
,
G
(
∗
T
0
5
10
15
BR
s = .01
s = .001
20
25
)
p
,
ǫ
,
b
,
G
(
∗
∆
20
18
16
14
12
10
8
6
4
2
0
5
25
s = .01
s = .001
10
15
BR
20
25
Fig. 1. Left: T ∗ (G, b, αs , ǫ, p) vs. 2p + 1 (BR = log2 (2p + 1).) Right: ∆∗ (G, b, αs , ǫ, p) vs. 2p + 1 (BR = log2 (2p + 1).)
V. CONCLU S ION
The paper considers distributed average consensus with quantized information exchange and random inter-sensor
link failures. We add dither to the sensor states before quantization. We show by stochastic approximation that,
when the range of the quantizer is unbounded, the QC-algorithm, the sensor states achieve a.s. and m.s.s. consensus
to a random variable whose mean is the desired average. The variance of this random variable can be made small
by tuning parameters of the algorithm (rate of decay of the gains), the network topology, and quantizers parameters.
When the range of the quantizer is bounded, the QCF-algorithm, a sample path analysis shows that the state vector of
the QC-algorithm can be made to remain uniformly bounded with probability arbitrarily close to 1. This means that
the QCF algorithm achieves ǫ-consensus. We use the bounds that we derive for the probability of large excursions of
the sample paths to formulate a quantizer design problem that trades between several quantizer parameters: number
of bits (or levels), step size, probability of saturation, and error margin to consensus. A numerical study illustrates
this design problem and several interesting tradeoffs among the design parameters.
A P P END IX I
PROO F S O F L EMMA S 4 AND 7
Before deriving Lemmas 4 and 7, we present a result from [49] on a property of real number sequences to be
used later, see proof in [49].
,
r2 (t) =
r1 (t) =
Lemma 19 (Lemma 18 in [49]) Let the sequences {r1 (t)}t≥0 and {r2 (t)}t≥0 be given by
a2
a1
(t + 1)δ1
(t + 1)δ2
where a1 , a2 , δ2 ≥ 0 and 0 ≤ δ1 ≤ 1. Then, if δ1 = δ2 there exists K > 0 such that, for non-negative integers, s < t,
t−1Xk=s " t−1Yl=k+1
(1 − r1 (l))# r2 (k) ≤ K
Moreover, the constant K can be chosen independently of s, t. Also, if δ1 < δ2 , then, for arbitrary fixed s,
t−1Xk=s " t−1Yl=k+1
(1 − r1 (l))# r2 (k) = 0
lim
t→∞
0 ≤
(96)
(97)
(98)
Proof: [Proof of Lemma 4] Taking expectations (unconditional) on both sides of eqn. (41) we have
E [V (i + 1, x(i + 1))] ≤ E [V (i, x(i))] − α(i)E [ϕ(i, x(i))]
+ g (i) [1 + E [V (i, x(i))]]
We also have the following inequalities for all i:
λ2 (L) kxC⊥ k2 ≤ V (i, x(i)) = xT
C⊥ LxC⊥ ≤ λN (L) kxC⊥ k2
2
2 (L) kxC⊥ k2 ≤ ϕ(i, x(i)) = xT
λ2
C⊥ L
N (L) kxC⊥ k2
xC⊥ ≤ λ2
26
(99)
(100)
E [V (i, x(i))] ≤
+
(101)
(103)
i ≥ iε
(102)
λ2
2 (L)
λN (L)
From eqns. (99,99,100) we have
+ g (i)(cid:19) E [V (i, x(i))] + g (i)
E [V (i + 1, x(i + 1))] ≤ (cid:18)1 − 2α(i)
Choose 0 < ε < 2λ2
2 (L)
λN (L) and note that, the form of g (i) in eqn. (42) and the fact that α(i) → 0 as i → ∞ suggests
that there exists iε ≥ 0, such that, εα(i) ≥ g (i),
i ≥ iε . We then have
E [V (i + 1, x(i + 1))] ≤ (cid:18)1 − (cid:18)2
− ε(cid:19) α(i)(cid:19) E [V (i, x(i))] + g (i),
λ2
2 (L)
λN (L)
Continuing the recursion we have for i > iε ,
− ε(cid:19) α(j )(cid:19) E [V (i, x(iε ))]
i−1Yj=iε (cid:18)1 − (cid:18)2
λ2
2 (L)
λN (L)
− ε(cid:19) α(l)(cid:19) g (j )
i−1Yl=j+1 (cid:18)1 − (cid:18)2
i−1Xj=iε
λ2
2 (L)
λN (L)
i−1Yl=j+1 (cid:18)1 − (cid:18)2
λ2
−ε« Pi−1
−„2
i−1Xj=iε
2 (L)
α(j)
j=iε
λN (L)
E [V (i, x(iε ))] +
≤ e
where we use 1 − a ≤ e−a for a ≥ 0. Since the α(i)s sum to in finity, we have
−ε« Pi−1
−„2
α(j)
j=iε
= 0
The second term on the R.H.S. of (103) falls under Lemma 19 whose second part (eqn. (98)) implies
− ε(cid:19) α(l)(cid:19) g (j ) = 0
i−1Yl=j+1 (cid:18)1 − (cid:18)2
i−1Xj=iε
λ2
2 (L)
(105)
lim
λN (L)
i→∞
We conclude from eqn. (103) that limi→∞ E [V (i, x(i))] = 0. This with (99) implies limi→∞ E hkxC⊥ (i)k2 i = 0.
From the orthogonality arguments we have for all i
E hkx(i) − θ1k2 i = E hkxC (i) − θ1k2 i + E hkxC⊥ (i)k2 i
(106)
The second term in eqn. (106) goes to zero by the above, whereas the first term goes to zero by the L2 convergence
of the sequence {xavg (i)}i≥0 to θ and the desired m.s.s. convergence follows.
− ε(cid:19) α(l)(cid:19) g (j )
(104)
λ2
2 (L)
λN (L)
λ2
2 (L)
λN (L)
lim
i→∞
e
1
λ2 (L)
E [V (i, x(i))] ≤
Proof: [Proof of Lemma 7] From (99,103), using repeatedly 1 − a ≤ e−a for a ≥ 0, we have for i > iε
E hkxC⊥ k2 i ≤
λ2
−„2
−ε« Pi−1
2 (L)
j=iε
λN (L)
e
i−1Xj=iε " e
From the development in the proof of Theorem 3 we note that
E hkxC (i) − r1k2 i = N 2E hkxavg (i) − rk2 i ≤
We then arrive at the result by using the equality
E [V (iε , x(iε ))] +
l=j+1 α(l)! g (j )#
−ε« Pi−1
2M∆2
3
−„2
λ2
2 (L)
λN (L)
1
λ2 (L)
1
λ2 (L)
α(j)
α2 (j )
i−1Xj=0
kx(i) − r1k2 = kxC⊥ (i)k2 + kxC (i) − r1k2 ,
A P P END IX I I
PROO F S O F RE SULT S IN SUB S ECT ION IV-B
∀i
Proof: [Proof of Lemma 9] From eqn. (41) we have
E [V (i + 1, x(i + 1))x(i)] ≤ −α(i)ϕ(i, x(i))
27
(107)
(108)
(109)
+ g (i) [1 + V (i, x(i))] + V (i, x(i))
We then have
[1 + g (j )](cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
E [ W (i + 1, x(i + 1)) Fi ] = E (1 + V (i + 1, x(i + 1))) Yj≥i+1
x(i)
[1 + g (j )] (cid:16)1 + E h V (i + 1, x(i + 1))(cid:12)(cid:12)(cid:12) x(i)i(cid:17)
= Yj≥i+1
[1 + g (j )] (cid:16)1 − α(i)ϕ(i, x(i)) + g (i) [1 + V (i, x(i))] + V (i, x(i))(cid:17)
≤ Yj≥i+1
= −α(i)ϕ(i, x(i)) Yj≥i+1
[1 + g (j )] + [1 + V (i, x(i))] Yj≥i
[1 + g (j )]
= −α(i)ϕ(i, x(i)) Yj≥i+1
[1 + g (j )] + W (i, x(i))
Hence E [W (i + 1, x(i + 1)) Fi ] ≤ W (i, x(i)) and the result follows.
Proof: [Proof of Lemma 10] For any a > 0 and i ≥ 0, we have
(110)
kxC⊥ (i)k2 > a =⇒ x(i)T Lx(i) ≥ aλ2 (L)
(111)
De fine the potential function V (i, x) as in Theorem 2 and eqn. (37) and the W (i, x) as in (75) in Lemma 9. It
then follows from eqn. (111) that
kxC⊥ (i)k2 > a =⇒ W (i, x(i)) > 1 + aλ2 (L)
(112)
By Lemma 9, the process (W (i, x(i)), Fi ) is a non-negative supermartingale. Then by a maximal inequality for
non-negative supermartingales (see [50]) we have for a > 0 and i ≥ 0,
W (j, x(j )) ≥ a(cid:21) ≤
P (cid:20) max
0≤j≤i
E [W (0, x(0))]
a
(113)
Also, we note that
(114)
≤ lim
i→∞
Thus, we have
W (j, x(j )) > a(cid:27) ⇐⇒ ∪i≥0 (cid:26) max
W (j, x(j )) > a(cid:27)
(cid:26)sup
0≤j≤i
j≥0
Since {max0≤j≤i W (j, x(j )) > a} is a non-decreasing sequence of sets in i, it follows from the continuity of
probability measures and eqn. (112)
P (cid:20) max
kxC⊥ (j )k2 > a(cid:21)
kxC⊥ (j )k2 > a(cid:21) = lim
P (cid:20)sup
i→∞
0≤j≤i
j≥0
P (cid:20) max
W (j, x(j )) > 1 + aλ2 (L)(cid:21)
≤ lim
i→∞
0≤j≤i
= (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
E [W (0, x(0))]
1 + aλ2 (L)
1 + aλ2 (L)
Proof: [Proof of Lemma 11] It was shown in Theorem 3 that the sequence {xavg (i)}i≥0 is a martingale. It
then follows that the sequence, {xavg (i)}i≥0 , is a non-negative submartingale (see [44]).
The submartingale inequality then states that for a > 0
xavg (j ) ≥ a(cid:21) ≤
P (cid:20) max
E [xavg (i)]
a
0≤j≤i
Clearly, from the continuity of probability measures,
xavg (j ) > a(cid:21)
P (cid:20) max
xavg (j ) > a(cid:21) = lim
P (cid:20)sup
i→∞
0≥j≥i
j≥0
xavg (j ) > a(cid:21) ≤ lim
P (cid:20)sup
E [xavg (i)]
a
i→∞
j≥0
(the limit on the right exists because xavg (i) converges in L1 .) Also, we have from eqn. (53), for all i,
≤ x2
α2 (j )
1/2
E [xavg (i)] ≤ ≤ hE hxavg (i)2 ii1/2
3N 2 Xj≥0
2M∆2
avg (0) +
Combining eqns. (118,119), we have
3N 2 Pj≥0 α2 (j )i1/2
xavg (j ) > a(cid:21) ≤ hx2
avg (0) + 2M∆2
P (cid:20)sup
a
j≥0
avg (i) + kxC⊥ (j )k2 , we have
Proof: [Proof of Theorem 12] Since, kx(j )k2 = N x2
kx(j )k2 > a(cid:21) ≤ P (cid:20)sup
P (cid:20)sup
2 (cid:21) + P (cid:20)sup
a
N xavg (j )2 >
kxC⊥ (j )k2 >
j≥0
j≥0
j≥0
= P (cid:20)sup
2 (cid:21)
2N (cid:17)1/2(cid:21) + P (cid:20)sup
xavg (j ) > (cid:16) a
a
j≥0
j≥0
We thus have from Lemmas 10 and 11,
3N 2 Pj≥0 α2 (j )i1/2
kx(j )k2 > a(cid:21) ≤ hx2
+ (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
avg (0) + 2M∆2
P (cid:20)sup
1 + (cid:0) a
2 (cid:1) λ2 (L)
(cid:0) a
2N (cid:1)1/2
j≥0
2 (cid:21)
a
kxC⊥ (i)k2 >
(121)
(116)
(117)
(118)
(119)
(120)
28
(115)
(122)
Proof: [Proof of Corollary 13] We note that, for x(0) ∈ B ,
x2
avg (0) ≤ b2 , x(0)T Lx(0) ≤ N λN (L)b2
29
(123)
sup
1≤n≤N ,j≥0
From Theorem 12, we then get,
xn (j ) > a(cid:21) ≤ P (cid:20)sup
P (cid:20)
kx(j )k > a(cid:21)
j≥0
3N Pj≥0 α2 (j )i1/2
≤ h2N x2
+ (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
avg(0) + 4M∆2
1 + a2
a
2 λ2 (L)
≤ h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
1 + a2
a
2 λ2 (L)
A P P END IX I I I
PROO F S O F L EMMA 1 6
We note that
Proof: [Proof of Lemma 16] For the proof, consider the sequence {x(i)}i≥0 generated by the QC algorithm,
with the same initial state x(0). Let θ be the a.s. finite random variable (see eqn. 43) such that
x(i) = θ1i = 1
P h lim
i→∞
P h(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫi = P h(cid:16)(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫ(cid:17) ∩ (cid:16)eθ = θ(cid:17)i + P h(cid:16)(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫ(cid:17) ∩ (cid:16)eθ 6= θ(cid:17)i
= P h(θ − r ≥ ǫ) ∩ (cid:16)eθ = θ(cid:17)i + P h(cid:16)(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫ(cid:17) ∩ (cid:16)eθ 6= θ(cid:17)i
≤ P [θ − r ≥ ǫ] + P h eθ 6= θi
From Chebyshev’s inequality, we have
E hθ − r2 i
≤
P [θ − r ≥ ǫ] ≤
ǫ2
Next, we bound P h eθ 6= θi. To this end, we note that
sup
sup
sup
xl (i) + νnl (i) ≤ sup
i≥0
1≤n≤N
i≥0
l∈Ωn (i)
≤ sup
i≥0
sup
l∈Ωn (i)
xn (i) + sup
i≥0
3N 2ǫ2 Xj≥0
2M∆2
xl (i) + sup
i≥0
sup
1≤n≤N
sup
l∈Ωn (i)
νnl (i)
sup
1≤n≤N
sup
1≤n≤N
(124)
(125)
α2 (j )
νnl (i)
sup
1≤n≤N
sup
l∈Ωn (i)
≤ sup
i≥0
sup
1≤n≤N
xn (i) +
∆
2
(126)
sup
1≤n≤N
sup
1≤n≤N
sup
l∈Ωn (i)
2 (cid:19) ∆#
1
Then, for any δ > 0,
P h eθ 6= θi = P "sup
xl (i) + νnl (i) ≥ (cid:18)p +
i≥0
2 (cid:19) ∆(cid:21)
≤ P (cid:20)sup
≥ (cid:18)p +
∆
1
xn (i) +
2
i≥0
= P (cid:20)sup
xn (i) > p∆ − δ(cid:21)
xn (i) ≥ p∆(cid:21) ≤ P (cid:20)sup
sup
sup
i≥0
1≤n≤N
1≤n≤N
i≥0
≤ h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
1 + (p∆−δ)2
p∆ − δ
λ2 (L)
2
where, in the last step, we use eqn. (124.) Since the above holds for arbitrary δ > 0, we have
δ↓0
3N Pj≥0 α2 (j )i1/2
h2N b2 + 4M∆2
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
P h eθ 6= θi ≤ lim
1 + (p∆−δ)2
p∆ − δ
λ2 (L)
2
= h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
1 + p2∆2
p∆
2 λ2 (L)
Combining eqns. (125,126,128), we get the result.
30
(127)
(128)
IEEE Trans.
IEEE Trans.
IEEE Transactions on Automatic Control,
IEEE Transactions on Information Theory, vol. 52, pp.
RE F ERENCE S
[1] J. N. Tsitsiklis, “Problems in decentralized decision m aking and computation,” Ph.D., Massachusetts Institute of Technology, Cambridge,
MA, 1984.
[2] J. N. Tsitsiklis, D. P. Bertsekas, and M. Athans, “Distri buted asynchronous deterministic and stochastic gradient optimization algorithms,”
IEEE Trans. Automat. Contr., vol. AC-31, no. 9, pp. 803–812, september 1986.
[3] G. V. Cybenko, “Dynamic load balancing for distributed m emory multiprocessors,” Journal on Parallel and Distributed Computing, vol. 7,
pp. 279–301, 1989.
[4] A. Jadbabaie, J. Lin, and A. S. Morse, “Coordination of gr oups of mobile autonomous agents using nearest neighbor rules,”
Automat. Contr., vol. AC-48, no. 6, pp. 988–1001, June 2003.
[5] R. Olfati-Saber and R. M. Murray, “Consensus problems in networks of agents with switching topology and time-delays,”
Automat. Contr., vol. 49, no. 9, pp. 1520–1533, Sept. 2004.
[6] J. A. Fax and R. M. Murray, “Information flow and cooperati ve control of vehicle formations,”
vol. 49, no. 9, pp. 1465–1476, Sep. 2004.
[7] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, “Randomized gossip algorithms,”
2508 – 2530, June 2006.
[8] V. Saligrama and D. Castanon, “Reliable distributed est imation with intermittent communications,” in 45th IEEE Conference on Decision
and Control, San Diego, CA, Dec. 2006, pp. 6763–6768.
[9] S. Kar, S. A. Aldosari, and J. M. F. Moura, “Topology for di stributed inference on graphs,”
vol. 56, no. 6, pp. 2609–2613, June 2008.
[10] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,”
no. 1, pp. 215–233, January 2007.
[11] W. Ren, R. W. Beard, and E. M. Atkins, “Information conse nsus in multivehicle cooperative control,”
vol. 27, no. 2, pp. 71–82, April 2007.
[12] S. Kar and J. M. F. Moura, “Ramanujan topologies for deci sion making in sensor networks,” in 44th Allerton Conference on Communication,
Control, and Computing, Monticello, IL, Sept. 2006.
[13] L. Xiao and S. Boyd, “Fast linear iterations for distrib uted averaging,” Syst. Contr. Lett., vol. 53, pp. 65–78, 2004.
[14] R. Olfati-Saber, “Ultrafast consensus in small-world networks,” in 2005 American Control Conference, vol. 4, June 2005, pp. 2371 – 2378.
[15] S. Aldosari and J. Moura, “Distributed detection in sen sor networks: Connectivity graph and small world networks,” in 39th Asilomar
Conference on Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2005, pp. 230–234.
[16] D. J. Watts and S. H. Strogatz, “Collective dynamics of s mall-world networks,” Nature, vol. 393, pp. 440–442, 1998.
[17] P. Barooah and J. P. Hespanha, “Graph effective resoist ance and distributed control: spectral properties and applications,” in 45th IEEE
Conference on Decision and Control, San Diego, CA, December 2006, pp. 3479–3485.
[18] B. Bamieh, M. Jovanovic, P. Mitra, and S. Patterson, “Ef fect of topological dimension on rigidity of vehicle formations: Fundamental
limitations of local feedback,” in 47th IEEE Conference on Decision and Control, Cancun, Mexico, December 2008, pp. 369–374.
[19] S. Kar and J. M. F. Moura, “Distributed consensus algori thms in sensor networks with imperfect communication: Link failures and channel
noise,”
IEEE Transactions on Signal Processing, vol. 57, no. 1, pp. 355–369, January 2009.
[20] A. Kashyap, T. Basar, and R. Srikant, “Quantized consen sus,” Automatica, vol. 43, pp. 1192–1203, July 2007.
[21] M. E. Yildiz and A. Scaglione, “Differential nested lat tice encoding for consensus problems,” in ACM/IEEE Information Processing in
Sensor Networks, Cambridge, MA, April 2007.
IEEE Transactions on Signal Processing,
IEEE Control Systems Magazine,
IEEE Proceedings, vol. 95,
31
[22] T. C. Aysal, M. Coates, and M. Rabbat, “Distributed aver age consensus using probabilistic quantization,” in IEEE/SP 14th Workshop on
Statistical Signal Processing Workshop, Maddison, Wisconsin, USA, August 2007, pp. 640–644.
[23] P. Frasca, R. Carli, F. Fagnani, and S. Zampieri, “Avera ge consensus on networks with quantized communication,” Submitted to the Int.
J. Robust and Nonlinear Control, 2008.
[24] A. Nedic, A. Olshevsky, A. Ozdaglar, and J. N. Tsitsiklis, “On distributed averaging algorithms and quantization e ffects,” Technical Report
2778, LIDS-MIT, Nov. 2007.
[25] L. Xiao, S. Boyd, and S.-J. Kim, “Distributed average co nsensus with least-mean-square deviation,” Journal of Parallel and Distributed
Computing, vol. 67, pp. 33–46, 2007.
[26] T. C. Aysal, M. J. Coates, and M. G. Rabbat, “Rates of conv ergence of distributed average consensus using probabilistic quantization,” in
Forty-Fifth Allerton Conference on Communication, Control, and Computing, Allerton, IL, USA, September 26-28 2007.
[27] —
IEEE Transactions on Signal Processing, vol. 56, no. 10, pp. 4905–4918,
tization,”
—, “Distributed average consensus with dithered quan
October 2008.
[28] R. Carli, F. Fagnani, P. Frasca, and S. Zampieri, “Effici
ent quantized techniques for consensus algorithms,” in NeCST07, Nancy, 2007.
[29] A. Czirok, A. L. Barabasi, and T. Vicsek, “Collective mo tion of self propelled particles: Kinetic phase transition in one dimension,”
Physical Review Letters, vol. 82, pp. 209–212, 1999.
[30] J. Liu, V. Yadav, H. Sehgal, J. Olson, H. Liu, and N. Elia, “Phase transitions on fixed connected graphs and random grap hs in the presence
of noise,” in 44th IEEE Conference on Decision and Control, Seville, Spain, 12-15 Dec. 2005, pp. 734–739.
[31] Y. Ruan and Y. Mostofi, “Binary consensus with soft infor mation processing in cooperative networks,” in 47th IEEE Conference on
Decision and Control, 2008. CDC 2008., 9-11 Dec. 2008, pp. 3613–3619.
[32] M. Malmirchegini, Y. Ruan, and Y. Mostofi,
“Binary conse nsus over fading channels: A best affine estimation approach ,” in IEEE
Globecom., 2008.
[33] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, “Randomize d gossip algorithms,”
2006.
[34] Y. Hatano, A. K. Das, and M. Mesbahi, “Agreement in prese nce of noise: pseudogradients on random geometric networks,” in 44th IEEE
Conference on Decision and Control, 2005 and 2005 European Control Conference. CDC-ECC ’05, Seville, Spain, December 2005.
[35] F. R. K. Chung, Spectral Graph Theory. Providence, RI : American Mathematical Society, 1997.
[36] B. Mohar, “The Laplacian spectrum of graphs,” in Graph theory, Combinatorics, and Applications, Y. Alavi, G. Chartrand, O. R. Oellermann,
and A. J. Schwenk, Eds. New York: J. Wiley & Sons, 1991, vol. 2, pp. 871–898.
[37] B. Bollob ´as, Modern Graph Theory. New York, NY: Springer Verlag, 1998.
[38] S. P. Lipshitz, R. A. Wannamaker, and J. Vanderkooy, “Qu antization and dither: A theoretical survey,” J. Audio Eng. Soc., vol. 40, pp.
355–375, May 1992.
[39] R. Wannamaker, S. Lipshitz, J. Vanderkooy, and J. Wright, “A theory of nonsubtractive dither,”
vol. 48, no. 2, pp. 499–516, February 2000.
[40] L. Schuchman, “Dither signals and their effect on quant ization noise,”
December 1964.
[41] A. B. Sripad and D. L. Snyder, “A necessary and sufficient
condition for quantization errors to be uniform and white,”
Speech, Signal Processing, vol. ASSP-25, pp. 442–448, October 1977.
[42] R. M. Gray and T. G. Stockham, “Dithered quantizers,”
IEEE Trans. Information Theory, vol. 39, pp. 805–811, May 1993.
[43] M. Nevel’son and R. Has’minskii, Stochastic Approximation and Recursive Estimation. Providence, Rhode Island: American Mathematical
Society, 1973.
[44] D. Williams, Probability with Martingales. Cambridge University Press, 1991.
[45] P. Dupuis and H. J. Kushner, “Stochastic approximation s via large deviations: Asymptotic properties,” SIAM J. Control Optim., vol. 23,
no. 5, pp. 675–696, September 1985.
[46] H. Kushner and G. Yin, Stochastic Approximation and Recursive Algorithms and Applications. Springer, 2003.
[47] V. S. Borkar, Stochastic Approximation: A Dynamical Systems Viewpoint. Cambridge, UK: Cambridge University Press, 2008.
[48] M. E. Yildiz and A. Scaglione,
“Limiting rate behavior a nd rate allocation strategies for average consensus problems with bounded
convergence,” in 33rd International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Las Vegas, Nevada, USA, March
31 - April 4 2008.
“Distributed para meter estimation in sensor networks: Nonlinear observation models and
[49] S. Kar, J. M. F. Moura, and K. Ramanan,
imperfect communication,” Aug. 2008, submitted for public ation. [Online]. Available: http://arxiv.org/abs/0809.0009
[50] H. Kushner, Introduction to Stochastic Control. Holt, Rinehart and Winston, Inc., 1971.
IEEE Trans. Commun. Technol., vol. COMM-12, pp. 162–165,
IEEE/ACM Trans. Netw., vol. 14, no. SI, pp. 2508–2530,
IEEE Transactions on Signal Processing,
IEEE Trans. Acoust.,
9
0
0
2
p
e
S
8
2
]
A
M
.
s
c
[
3
v
9
0
6
1
.
2
1
7
0
:
v
i
X
r
a
Distributed Consensus Algorithms in Sensor
Networks: Quantized Data and Random Link
Failures
Soummya Kar and Jos ´e M. F. Moura ∗
quantizer parameters and to explore tradeoffs among the
number of quantizer levels, the size of the quantization
steps, the desired probability of saturation, and the desired
level of accuracy ǫ away from consensus. Finally, the paper
illustrates the quantizer design with a numerical study.
Keywords: Consensus, quantized, random link
failures, stochastic approximation, convergence, bounded
quantizer, sample path behavior, quantizer saturation
Abstract — The paper studies the problem of distributed
average consensus in sensor networks with quantized
data and random link failures. To achieve consensus,
dither (small noise) is added to the sensor states before
quantization. When the quantizer range is unbounded
(countable number of quantizer levels), stochastic approx-
imation shows that consensus is asymptotically achieved
with probability one and in mean square to a finite
random variable. We show that the mean-squared error
(m.s.e.) can be made arbitrarily small by tuning the link
weight sequence, at a cost of the convergence rate of
the algorithm. To study dithered consensus with random
links when the range of the quantizer is bounded, we
establish uniform boundedness of the sample paths of
the unbounded quantizer. This requires characterization
of the statistical properties of the supremum taken over
the sample paths of the state of the quantizer. This is
accomplished by splitting the state vector of the quantizer
in two components: one along the consensus subspace and
the other along the subspace orthogonal to the consensus
subspace. The proofs use maximal
inequalities for sub-
martingale and supermartingale sequences. From these,
we derive probability bounds on the excursions of the
two subsequences, from which probability bounds on the
excursions of the quantizer state vector follow. The paper
shows how to use these probability bounds to design the
The authors are with the Department of Electrical and Com-
puter Engineering, Carnegie Mellon University, Pittsburgh, PA, USA
15213 (e-mail: [email protected], [email protected],
ph: (412)268-6341, fax: (412)268-3890.)
Work supported by NSF under grants # ECS-0225449 and # CNS-
0428404, by an IBM Faculty Award, and by the Office of Naval
Research under MURI N000140710747.
Manuscript initially submitted on December 10, 2007; last revised
on July 19, 2009.
2
I . INTRODUCT ION
the convergence properties of consensus algorithms to
This paper is concerned with consensus in networks,
e.g., a sensor network, when the data exchanges among
nodes in the network (sensors, agents) are quantized.
Before detailing our work, we brie fly overview the
literature.
the effective resistance of the network, thus obtaining
convergence rate scaling laws for networks in up to
3-dimensional space. Convergence results for general
problems in multi-vehicle formation has been consid-
ered in [?], where convergence rate is related to the
topological dimension of the network and stabilizability
Literature review. Consensus is broadly understood
as individuals in a community achieving a consistent
issues in higher dimensions are addressed. Robustness
issues in consensus algorithms in the presence of analog
view of the World by interchanging information regard-
ing their current state with their neighbors. Considered
in the early work of Tsitsiklis et. al. ([?], [?]), it has
received considerable attention in recent years and arises
in numerous applications including: load balancing, [?],
alignment, flocking, and multi-agent collaboration, e.g.,
[?], [?], vehicle formation, [?], gossip algorithms, [?],
tracking, data fusion, [?], and distributed inference, [?].
We refer the reader to the recent overviews on consensus,
which include [?], [?].
communication noise and random data packet dropouts
have been considered in [?].
literature on quantized consensus. Dis-
Review of
tributed consensus with quantized transmission has been
studied recently in [?], [?], [?], [?] with respect
to
time-invariant ( fixed) topologies. Reference [ ?] consid-
ers quantized consensus for a certain class of time-
varying topologies. The algorithm in [?] is restricted
to integer-valued initial sensor states, where at each
iteration the sensors exchange integer-valued data. It is
Consensus is a distributed iterative algorithm where
shown there that the sensor states are asymptotically
the sensor states evolve on the basis of local interactions.
Reference [?] used spectral graph concepts like graph
Laplacian and algebraic connectivity to prove conver-
gence for consensus under several network operating
close (in their appropriate sense) to the desired average,
but may not reach absolute consensus. In [?], the noise
in the consensus algorithm studied in [?] is interpreted as
quantization noise and shown there by simulation with
conditions (e.g., delays and switching networks,
i.e.,
a small network that the variance of the quantization
time varying). Our own prior work has been concerned
with designing topologies that optimize consensus with
respect to the convergence rate, [?], [?]. Topology design
is concerned with two issues: 1) the de finition of the
graph that specifies the neighbors of each sensor—
i.e., with whom should each sensor exchange data; and
2) the weights used by the sensors when combining the
information received from their neighbors to update their
state. Reference [?] considers the problem of weight
design, when the topology is specified, in the frame-
work of semi-de finite programming. References [ ?], [?]
considered the impact of different topologies on the
convergence rate of consensus, in particular, regular, ran-
dom, and small-world graphs, [?]. Reference [?] relates
noise is reduced as the algorithm iterates and the sen-
sors converge to a consensus. References [?], [?] study
probabilistic quantized consensus. Each sensor updates
its state at each iteration by probabilistically quantizing
its current state (which [?] claims equivalent to dithering)
and linearly combining it with the quantized versions of
the states of the neighbors. They show that the sensor
states reach consensus a.s. to a quantized level. In [?] a
worst case analysis is presented on the error propagation
of consensus algorithms with quantized communication
for various classes of time-invariant network topologies,
while [?] addresses the impact of more involved encod-
ing/decoding strategies, beyond the uniform quantizer.
The effect of communication noise in the consensus
3
process may lead to several interesting phase transition
proofs do not require any distributional assumptions
phenomena in global network behavior, see, for example,
[?] in the context of a network of mobile agents with a
non-linear interaction model and [?], which rigorously
establishes a phase transition behavior in a network of
on the link failure model (in space). During the same
iteration, the link failures can be spatially dependent,
i.e., correlated across different edges of the network. The
model we work with in this paper subsumes the erasure
bipolar agents when the communication noise exceeds
network model, where link failures are independent both
a given threshold. Consensus algorithms with general
over space and time. Wireless sensor networks motivate
imperfect communication (including quantization) in a
us since interference among the sensors communication
certain class of time-varying topologies has been ad-
dressed in [?], which assumes that there exists a window
of fixed length, such that the union of the network graphs
formed within that window is strongly connected. From
a distributed detection viewpoint, binary consensus algo-
rithms over networks of additive white Gaussian noise
channels were addressed in [?], which proposed soft
information processing techniques to improve consensus
convergence properties over such noisy channels. The
impact of fading on consensus is studied in [?].
Contributions of this paper. We consider consen-
sus with quantized data and random inter-sensor link
correlates the link failures over space, while over time,
it is still reasonable to assume that the channels are
memoryless or independent. Note that the assumption
λ2 (cid:0)L(cid:1) > 0 does not require the individual random in-
stantiations of L(i) to be connected; in fact, it is possible
to have all the instantiations to be disconnected. This
captures a broad class of asynchronous communication
models, for example, the random asynchronous gossip
protocol in [?] satisfies λ2 (cid:0)L(cid:1) > 0 and hence falls under
this framework.
The main contribution of this paper is the study of
the convergence and the detailed analysis of the sample
failures. This is useful in applications where limited
path of this dithered distributed quantized consensus
bandwidth and power for inter-sensor communications
preclude exchanges of high precision (analog) data as
in wireless sensor networks. Further, randomness in the
algorithm with random link failures. This distinguishes
our work from [?] that considers fixed topologies (no
random links) and integer valued initial sensor states,
environment results in random data packet dropouts. To
while our initial states are arbitrarily real valued. To our
handle quantization, we modify standard consensus by
knowledge, the convergence and sample path analysis
adding a small amount of noise, dither,
to the data
of dithered quantized consensus with random links has
before quantization and by letting the consensus weights
not been carried out before. The sample path analysis
to be time varying, satisfying a persistence condition –
of quantized consensus algorithms is needed because in
their sum over time diverges, while their square sum is
practice quantizers work with bounded ( finite) ranges.
finite. We will show that dithered quantized consensus
The literature usually pays thrift attention or simply
in networks with random links converges.
ignores the boundary effects induced by the bounded
The randomness of the network topology is cap-
range of the quantizers; in other words, although assum-
tured by assuming that the time-varying Laplacian se-
quence, {L(i)}i≥0 , which characterizes the communica-
tion graph, is independent with mean L; further, to prove
convergence, we will need the mean graph algebraic
connectivity ( first nonzero eigenvalue of L) λ2 (L) > 0,
i.e., the network to be connected on the average. Our
ing finite range quantizers, the analysis in the literature
ignores the boundary effects. Our paper studies carefully
the sample path behavior of quantized consensus when
the range of the quantizer is bounded. It computes, under
appropriate conditions, the probability of large excursion
of the sample paths and shows that the quantizer can be
4
designed so that with probability as close to 1 as desired
the sample path excursions remain bounded, within an
ǫ-distance of the desired consensus average. Neither our
previous work [?], which deals with consensus with
noisy analog communications in a random network, nor
references [?], [?], [?], which introduce a probabilistic
quantized consensus algorithm in fixed networks, nor [ ?],
which studies consensus with analog noisy communica-
QCF is a very simple algorithm: it is QC till the QC
state reaches the quantizer bound, otherwise an error is
declared and the algorithm terminated. To study QCF,
we establish uniform boundedness of the sample paths
of the QC algorithm. This requires establishing the sta-
tistical properties of the supremum taken over the sample
paths of the QC. This is accomplished by splitting the
state vector of the quantizer in two components: one
tion and fixed network, study the sample path behavior
along the consensus subspace and the other along the
of quantized consensus. Also, while the probabilistic
consensus in [?], [?], [?] converges almost surely to
a quantized level, in our work, we show that dithered
subspace orthogonal to the consensus subspace. These
proofs use maximal inequalities for submartingale and
supermartingale sequences. From these, we are able to
consensus converges a.s. to a random variable which can
derive probability bounds on the excursions of the two
be made arbitrarily close to the desired average.
subsequences, which we use to derive probability bounds
To study the a.s. convergence and m.s.s. conver-
on the excursions of the QC. We see that to carry out
gence of the dithered distributed quantizers with random
this sample path study requires new methods of anal-
links and unbounded range, the stochastic approximation
method we use in [?] is sufficient. In simple terms,
we associate, like in [?], with the quantized distributed
consensus a Lyapounov function and study the behavior
ysis that go well beyond the stochastic approximation
methodology that we used in our paper [?], and also
used by [?] to study consensus with noise but fixed
networks. The detailed sample path analysis leads to
of this Lyapounov function along the trajectories of the
bounds on the probability of the sample path excursions
noisy consensus algorithm with random links. To show
of the QC algorithm. We then use these bounds to design
almost sure convergence, we show that a functional of
the quantizer parameters and to explore tradeoffs among
this process is a nonnegative supermartingale; conver-
gence follows from convergence results on nonnegative
supermartingales. We do this in Section III where we
term the unbounded dithered distributed quantized con-
sensus algorithm with random links simply Quantized
Consensus, for short, or QC algorithm. Although the
general principles of the approach are similar to the ones
in [?], the details are different and not trivial–we mini-
mize the overlap and refer the reader to [?] for details.
A second reason to go over this analysis in the paper for
these parameters. In particular, we derive a probability
of ǫ-consensus expressed in terms of the ( finite) number
of quantizer levels, the size of the quantization steps, the
desired probability of saturation, and the desired level of
accuracy ǫ away from consensus.
For the QC algorithm, there exists an interesting trade-
off between the m.s.e. (between the limiting random
variable and the desired initial average) and the conver-
gence: by tuning the link weight sequence appropriately,
it is possible to make the m.s.e. arbitrarily small (irre-
the QC algorithm is that we derive in this Section for QC
spective of the quantization step-size), though penalizing
several specific bounds that are used and needed as inter-
mediate results for the sample path analysis that is car-
ried out in Section IV when studying dithered quantized
consensus when the quantizer is bounded, i.e., Quantized
Consensus with Finite quantizer, the QCF quantizer. The
the convergence rate. To tune the QC-algorithm, we
introduce a scalar control parameter s (associated with
the time-varying link weight sequence), which can make
the m.s.e. as small as we want, irrespective of how large
the step-size ∆ is. This is significant in applications
5
that rely on accuracy and may call for very small m.s.e.
A. Preliminaries: Notation and Average Consensus
for being useful. More specifically, if a cost structure is
imposed on the consensus problem, where the objective
is a function of the m.s.e. and the convergence rate, one
may obtain the optimal scaling s by minimizing the cost
from the Pareto-optimal curve generated by varying s.
These tradeoffs and vanishingly small m.s.e. contrasts
with the algorithms in [?], [?], [?], [?], [?] where the
m.s.e. is proportional to ∆2 , the quantization step-size –
if the step-size is large, these algorithms lead to a large
m.s.e.
Organization of the paper. We comment brie fly on
the organization of the main sections of the paper. Sec-
tion II summarizes relevant background, including spec-
tral graph theory and average consensus, and presents
the dithered quantized consensus problem with the dither
satisfying the Schuchman conditions. Sections III con-
siders the convergence of the QC algorithm. It shows
a.s. convergence to a random variable, whose m.s.e. is
fully characterized. Section IV studies the sample path
behavior of the QC algorithm through the QCF. It uses
the expressions we derive for the probability of large
excursions of the sample paths of the quantizer to con-
sider the tradeoffs among different quantizer parameters,
e.g., number of bits and quantization step, and the
network topology to achieve optimal performance under
a constraint on the number of levels of the quantizer.
These tradeoffs are illustrated with a numerical study.
Finally, Section V concludes the paper.
The sensor network at time index i is represented
by an undirected, simple, connected graph G(i) =
(V , E (i)). The vertex and edge sets V and E (i), with
cardinalities V = N and E (i) = M (i), collect the
sensors and communication channels or links among
sensors in the network at time i. The network topology
at time i, i.e., with which sensors does each sensor
communicate with, is described by the N × N discrete
Laplacian L(i) = LT (i) = D(i) − A(i) ≥ 0. The
matrix A(i) is the adjacency matrix of the connectivity
graph at time i, a (0, 1) matrix where Ank (i) = 1
signifies that
there is a link between sensors n and
k at
time i. The diagonal entries of A(i) are zero.
The diagonal matrix D(i) is the degree matrix, whose
diagonal Dnn (i) = dn (i) where dn (i) is the degree
of sensor n, i.e., the number of links of sensor n at
time i. The neighbors of a sensor or node n, collected
in the neighborhood set Ωn (i), are those sensors k for
which entries Ank (i) 6= 0. The Laplacian is positive
semide finite; in case the network is connected at time
i, the corresponding algebraic connectivity or Fiedler
value is positive,
i.e.,
the second eigenvalue of the
Laplacian λ2 (L(i)) > 0, where the eigenvalues of L(i)
are ordered in increasing order. For detailed treatment
of graphs and their spectral theory see, for example, [?],
[?], [?]. Throughout the paper the symbols P[·] and E[·]
denote the probability and expectation operators w.r.t.
the probability space of interest.
I I . CON S EN SU S W ITH QUANT IZ ED DATA : PROBL EM
STAT EMENT
We present preliminaries needed for the analysis of
the consensus algorithm with quantized data. The set-up
of the average consensus problem is standard, see the
introductory sections of relevant recent papers.
Distributed Average Consensus. The sensors mea-
sure the data xn (0), n = 1, · · · , N , collected in the
vector x(0) = [x1 (0) · · · xN (0)]T ∈ RN ×1 . Distributed
average consensus computes the average r of the data
NXn=1
by local data exchanges among neighboring sensors.
In (1), the column vector 1 has all entries equal to 1.
Consensus is an iterative algorithm where at iteration i
r = xavg (0) =
1
N
xn (0) =
x(0)T 1 (1)
1
N
each sensor updates its current state xn (i) by a weighted
average of its current state and the states of its neighbors.
Standard consensus assumes a fixed connected network
topology, i.e.,
the links stay online permanently, the
communication is noiseless, and the data exchanges are
analog. Under mild conditions, the states of all sensors
reach consensus, converging to the desired average r, see
[?], [?],
where y ∈ R is the channel input. Writing
q(y ) = y + e(y )
6
(5)
where e(y ) is the quantization error. Conditioned on the
input, the quantization error e(y ) is deterministic, and
−
∆
2
≤ e(y ) <
∆
2
, ∀y
(6)
We first consider quantized consensus (QC) with un-
lim
i→∞
x(i) = r1
(2)
bounded range, i.e., the quantization alphabet
where x(i) = [x1 (i) · · · xN (i)]T is the state vector that
stacks the state of the N sensors at iteration i. We
consider consensus with quantized data exchanges and
random topology (links fail or become alive at random
times), which models packet dropouts. In [?], we studied
consensus with random topologies and (analog) noisy
communications.
B. Dithered Quantization: Schuchman Conditions
We write the sensor updating equations for consensus
Q = {k∆ k ∈ Z}
(7)
is countably in finite. In Section IV. we consider what
happens when the range of the quantizer is finite –
quantized consensus with finite (QCF) alphabet. This
study requires that we detail the sample path behavior
of the QC-algorithm.
We discuss brie fly why a naive approach to consensus
will fail (see [?] for a similar discussion.) If we use
directly the quantized state information, the functions
fnl,i (·) in eqn. (3) are
fnl,i (xl (i)) = q(xl (i))
fnl,i [xl (i)] , 1 ≤ n ≤ N
= xl (i) + e(xl (i))
(8)
(9)
(3)
with quantized data and random link failures as
xn (i+1) = [1 − α(i)dn (i)] xn (i)+α(i) Xl∈Ωn (i)
where: α(i)
iteration i;
at
the weight
is
and
{fnl,i}1≤n,l≤N , i≥0 is a sequence of functions (possibly
random) modeling the quantization effects. Note that
in (3), the weights α(i) are the same across all links—
the equal weights consensus, see [?] —but the weights
may change with time. Also, the degree dn (i) and the
neighborhood Ωn (i) of each sensor n, n = 1, · · · , N
are dependent on i emphasizing the topology may be
random time-varying.
Quantizer. Each inter-sensor communication channel
uses a uniform quantizer with quantization step ∆. We
model the communication channel by introducing the
quantizing function, q(·) : R → Q,
Equations (3) take then the form
xl (i)+α(i) Xl∈Ωn (i)
xn (i+1) = (1 − α(i)dn (i))xn (i) + α(i) Xl∈Ωn (i)
(10)
The non-stochastic errors (the most right terms in (10))
lead to error accumulation. If the network topology
e(xl (
remains fixed (deterministic topology,) the update in
eqn. (10) represents a sequence of iterations that, as
observed above, conditioned on the initial state, which
then determines the input, are deterministic. If we choose
the weights α(i)’s to decrease to zero very quickly,
then (10) may terminate before reaching the consensus
set. On the other hand, if the α(i)’s decay slowly, the
quantization errors may accumulate, thus making the
q(y ) = k∆,
(k −
1
2
)∆ ≤ y < (k +
1
2
)∆
(4)
states unbounded.
In either case, the naive approach to consensus with
quantized data fails to lead to a reasonable solution. This
failure is due to the fact that the error terms are not
stochastic. To overcome these problems, we introduce
satisfies the Schuchman conditions. Hence, the quantiza-
tion error sequence, {ǫ(i)}, is i.i.d. uniformly distributed
on [−∆/2, ∆/2) and independent of the input sequence
{y (i)}i≥0 .
7
in
a controlled way noise (dither) to randomize the sensor
states prior to quantizing the perturbed stochastic state.
Under appropriate conditions, the resulting quantization
errors possess nice statistical properties, leading to the
quantized states reaching consensus (in an appropriate
sense to be de fined below.) Dither places consensus
with quantized data in the framework of distributed
consensus with noisy communication links; when the
range of the quantizer is unbounded, we apply stochastic
approximation to study the limiting behavior of QC, as
we did in [?] to study consensus with (analog) noise and
random topology. Note that if instead of adding dither,
we assumed that the quantization errors are independent,
uniformly distributed random variables, we would not
need to add dither, and our analysis would still apply.
Schuchman conditions. The dither added to random-
ize the quantization effects satisfies a special condition,
namely, as in subtractively dithered systems, see [?],
[?]. Let {y (i)}i≥0 and {ν (i)}i≥0 be arbitrary sequences
of random variables, and q(·) be the quantization func-
tion (4). When dither is added before quantization, the
quantization error sequence, {ε(i)}i≥0 , is
ε(i) = q(y (i) + ν (i)) − (y (i) + ν (i))
(11)
If the dither sequence, {ν (i)}i≥0 , satisfies the Schuch-
man conditions, [?],
then the quantization error se-
quence, {ε(i)}i≥0 , in (11) is i.i.d. uniformly distributed
on [−∆/2, ∆/2) and independent of the input sequence
{y (i)}i≥0 (see [?], [?], [?]). A sufficient condition for
{ν (i)} to satisfy the Schuchman conditions is for it
to be a sequence of i.i.d. random variables uniformly
distributed on [−∆/2, ∆/2) and independent of the input
sequence {y (i)}i≥0 . In the sequel, the dither {ν (i)}i≥0
C. Dithered Quantized Consensus With Random Link
Failures: Problem Statement
We now return to the problem formulation of consen-
sus with quantized data with dither added. Introducing
the sequence, {νnl (i)}i≥0,1≤n,l≤N , of i.i.d. random vari-
ables, uniformly distributed on [−∆/2, ∆/2), the state
update equation for quantized consensus is:
xn (i+1) = (1 − α(i)dn (i)) xn (i)+α(i) Xl∈Ωn (i)
This equation shows that, before transmitting its state
xl (i) to the n-th sensor, the sensor l adds the dither
νnl (i), then the channel between the sensors n and l
quantizes this corrupted state, and,
finally, sensor n
receives this quantized output. Using eqn. (11), the state
(12)
q [xl (i) + νnl (i)] , 1 ≤ n ≤
[xl (i) + νnl (i) + εnl (i)]
update is
xn (i+1) = (1 − α(i)dn ) xn (i)+α(i) Xl∈Ωn (i)
(13)
The random variables νnl (i) are independent of the state
x(j ), i.e., the states of all sensors at iteration j , for j ≤ i.
Hence, the collection {εnl (i)} consists of i.i.d. random
variables uniformly distributed on [−∆/2, ∆/2), and the
random variable εnl (i) is also independent of the state
x(j ), j ≤ i.
We rewrite (13) in vector form. De fine the random
vectors, Υ(i) and Ψ(i) ∈ RN ×1 with components
Υn (i) = − Xl∈Ωn (i)
Ψn (i) = − Xl∈Ωn (i)
The the N state update equations in (13) become in
νnl (i)
εnl (i)
(14)
(15)
vector form
x(i + 1) = x(i) − α(i) [L(i)x(i) + Υ(i) + Ψ(i)] (16)
where Υ(i) and Ψ(i) are zero mean vectors, independent
of the state x(i), and have i.i.d. components. Also, if M
is the number of realizable network links, eqns. (14) and
(15) lead to
E (cid:2)kΥ(i)k2 (cid:3) = E (cid:2)kΨ(i)k2(cid:3) ≤
Random Link Failures: We now state the assumption
about the link failure model to be adopted throughout the
M∆2
6
, i ≥ 0
(17)
paper. The graph Laplacians are
L(i) = L + eL(i), ∀i ≥ 0
where {L(i)}i≥0 is a sequence of i.i.d. Laplacian matri-
ces with mean L = E [L(i)], such that λ2 (cid:0)L(cid:1) > 0 (we
just require the network to be connected on the average.)
We do not make any distributional assumptions on the
(18)
link failure model. During the same iteration, the link
failures can be spatially dependent, i.e., correlated across
different edges of the network. This model subsumes
the erasure network model, where the link failures are
independent both over space and time. Wireless sensor
networks motivate this model since interference among
the sensors communication correlates the link failures
over space, while over time, it is still reasonable to
assume that the channels are memoryless or independent.
We also note that the above assumption λ2 (cid:0)L(cid:1) > 0
does not require the individual random instantiations of
L(i) to be connected; in fact, it is possible to have all
the instantiations to be disconnected. This enables us to
capture a broad class of asynchronous communication
models, for example, the random asynchronous gossip
λ2 (cid:0)L(cid:1) > 0 and
protocol analyzed in [?] satisfies
hence falls under this framework. More generally, in the
asynchronous set up, if the sensors nodes are equipped
with independent clocks whose ticks follow a regular
random point process (the ticking instants do not have
8
an accumulation point, which is true for all renewal
processes, in particular, the Poisson clock in [?]), and at
each tick a random network is realized with λ2 (cid:0)L(cid:1) > 0
independent of the the networks realized in previous
ticks (this is the case with the link formation process
assumed in [?]) our algorithm applies.1
We denote the number of network edges at time i as
M (i), where M (i) is a random subset of the set of all
possible edges E with E = N (N − 1)/2. Let M denote
the set of realizable edges. We then have the inclusion
M (i) ⊂ M ⊂ E , ∀i
(19)
It
is important
to note that
the value of M (i) de-
pends on the link usage protocol. For example, in the
asynchronous gossip protocol considered in [?], at each
iteration only one link is active, and hence M (i) = 1.
Independence Assumptions: We assume that
the
Laplacian sequence {L(i)}i≥0 is independent of the
dither sequence {εnl (i)}.
Persistence condition: To obtain convergence, we
assume that the gains α(i) satisfy the following.
α(i) > 0, Xi≥0
α(i) = ∞, Xi≥0
Condition (20) assures that the gains decay to zero, but
not too fast. It is standard in stochastic adaptive signal
α2 (i) < ∞ (20)
processing and control; it is also used in consensus with
noisy communications in [?], [?].
Markov property. Denote the natural filtration of the
i (cid:9)i≥0
process X = {x(i)}i≥0 by (cid:8)F X
. Because the dither
random variables νnl (i), 1 ≤ n, l ≤ N , are independent
of F X
at any time i ≥ 0, and, correspondingly, the
i
noises Υ(i) and Ψ(i) are independent of x(i),
the
process X is Markov.
1 In case the network is static, i.e., the connectivity graph is time-
invariant, all the results in the paper apply with L(i) ≡ L, ∀i.
I I I . CON S EN SU S W ITH QUANT IZ ED DATA :
We prove the a.s. convergence of the QC algorithm
9
UNBOUNDED QUANT IZ ED STAT E S
We consider that the dynamic range of the initial
sensor data, whose average we wish to compute,
is
not known. To avoid quantizer saturation, the quantizer
output takes values in the countable alphabet (7), and so
the channel quantizer has unrestricted dynamic range.
This is the quantizer consensus (QC) with unbounded
range algorithm. Section IV studies quantization with
unbounded range, i.e., the quantized consensus finite-
bit (QCF) algorithm where the channel quantizers take
only a finite number of output values ( finite-bit quantiz-
ers).
We comment brie fly on the organization of the re-
maining of this section. Subsection III-A proves the
a.s. convergence of the QC algorithm. We characterize
the performance of the QC algorithm and derive expres-
sions for the mean-squared error in Subsection III-B. The
tradeoff between m.s.e. and convergence rate is studied
in Subsection III-C. Finally, we present generalizations
to the approach in Subsection III-D.
A. QC Algorithm: Convergence
We start with the de finition of the consensus subspace
C given as
C = (cid:8)x ∈ RN ×1 (cid:12)(cid:12) x = a1, a ∈ R(cid:9)
We note that any vector x ∈ RN can be uniquely
decomposed as
(21)
x = xC + xC⊥
and
kxk2 = kxC k2 + kxC⊥ k2
(22)
(23)
where xC ∈ C and xC⊥ belongs to C ⊥ , the orthogonal
subspace of C . We show that (16), under the model in
Subsection II-C, converges a.s. to a finite point in C .
De fine the component-wise average as
in two stages. Theorem 2 proves that the state vector
sequence {x(i)}i≥0 converges a.s.
to the consensus
subspace C . Theorem 3 then completes the proof by
showing that the sequence of component-wise averages,
{xavg (i)}i≥0 converges a.s. to a finite random variable
θ. The proof of Theorem 3 needs a basic result on
convergence of Markov processes and follows the same
theme as in [?].
Stochastic approximation: Convergence of Markov
processes. We state a slightly modified form , suitable to
our needs, of a result from [?]. We start by introducing
notation, following [?], see also [?].
Let X = {x(i)}i≥0 be Markov in RN ×1 . The gener-
ating operator L is
LV (i, x) = E [V (i + 1, x(i + 1)) x(i) = x] − V (i, x) a.s.
(25)
for functions V (i, x), i ≥ 0, x ∈ RN ×1 , provided the
conditional expectation exists. We say that V (i, x) ∈ DL
in a domain A, if LV (i, x) is finite for all
(i, x) ∈ A.
Let
the Euclidean metric be ρ(·). De fine the
ǫ-
neighborhood of B ⊂ RN ×1 and its complementary set
Uǫ (B ) = (cid:26)x (cid:12)(cid:12)(cid:12)(cid:12) inf
ρ(x, y ) < ǫ (cid:27)
y∈B
Vǫ (B ) = RN ×1\Uǫ (B )
(27)
(26)
Theorem 1 (Convergence of Markov Processes) Let: X
be a Markov process with generating operator L;
V (i, x) ∈ DL a non-negative function in the domain
i ≥ 0, x ∈ RN ×1 , and B ⊂ RN ×1 . Assume:
1) Potential function:
2) Generating operator:
inf
i≥0,x∈Vǫ (B )
V (i, x) > 0, ∀ǫ > 0
V (i, x) ≡ 0, x ∈ B
lim
x→B
V (i, x) = 0
sup
i≥0
LV (i, x) ≤ g (i)(1 + V (i, x))
xavg (i) =
1
N
1T x(i)
(24)
where ϕ(i, x), i ≥ 0, x ∈ RN ×1 is a non-negative
function such that
(32)
inf
i,x∈Vǫ (B )
α(i) = ∞ (33)
ϕ(i, x) > 0, ∀ǫ > 0
α(i) > 0, Xi≥0
g (i) > 0, Xi≥0
Then, the Markov process X = {x(i)}i≥0 with arbitrary
initial distribution converges a.s. to B as i → ∞
ρ (x(i), B ) = 0(cid:17) = 1
P (cid:16) lim
i→∞
Proof: For proof, see [?], [?].
g (i) < ∞ (34)
(35)
Theorem 2 (a.s. convergence to consensus subspace)
Consider the quantized distributed averaging algorithm
given in eqns. (16). Then, for arbitrary initial condition,
x(0), we have
ρ(x(i), C ) = 0i = 1
P h lim
i→∞
Proof: The proof uses similar arguments as that
of Theorem 3 in [?]. So we provide the main steps
here and only those details which are required for later
(36)
development of the paper.
The key idea shows that the quantized iterations sat-
isfy the assumptions of Theorem 1. De fine the potential
function, V (i, x), for the Markov process X as
V (i, x) = xT Lx
(37)
10
Now consider LV (i, x). We have using the fact that
eL(i)x = eL(i)xC⊥ and the independence assumptions
LV (i, x) = E (cid:20)(cid:16)x(i) − α(i)Lx(i) − α(i) eL(i)x(i) − α(i)Υ(i) − α(i)Ψ
− α(i) eL(i)x(i) − α(i)Υ(i) − α(i)Ψ(i)(cid:17)(cid:12)(cid:12)(cid:12) x(i) =
N (L)kxC⊥ k2 + α2 (i)λN (L)E hλ2
2
≤ −2α(i)xT L
x + α2 (i)λ3
max
+2α2 (i)λN (L)(cid:0)E (cid:2)kΥ(i)k2 (cid:3)(cid:1)1/2 (cid:0)E (cid:2)kΨ(i)k2(cid:3)(cid:1)1/2
+ α2 (i
+α2 (i)λN (L)E (cid:2)kΨ(i)k2(cid:3)
Since xT Lx ≥ λ2 (L)kxC⊥ k2 , the eigenvalues of eL(i)
are not greater than 2N in magnitude, and from (17) get
x + (cid:18) α2 (i)λ3
4α2 (i)N 2λN (L)
N (L)
2
LV (i, x) ≤ −2α(i)xT L
+
λ2 (L)
λ2 (L)
≤ −α(i)ϕ(i, x) + g (i) [1 + V (i, x)]
(cid:19) xT
where
2
+
ϕ(i, x) = 2xT L
x, g (i) = α2 (i) max (cid:18) λ3
4N 2λN (L)
N (L)
λ2 (L)
λ2 (L)
(42)
Clearly, LV (i, x) and ϕ(i, x), g (i) satisfy the remaining
assumptions (31) –(34) of Theorem 1; hence,
ρ(x(i), C ) = 0i = 1
P h lim
i→∞
(43)
,
2M∆2λ
3
The convergence proof for QC will now be completed
in the next Theorem.
Theorem 3 (Consensus to finite random variable)
Then, using the properties of L and the continuity of
V (i, x),
(38)
sup
i≥0
V (i, x) = 0
V (i, x) ≡ 0, x ∈ C and lim
x→C
Consider
(16), with
arbitrary
initial
condition
x(0) ∈ RN ×1 and the state sequence {x(i)}i≥0 .
Then, there exists a finite random variable θ such that
x(i) = θ1i = 1
P h lim
For x ∈ RN ×1 , we clearly have ρ(x, C ) = kxC⊥ k. Using
i→∞
the fact that xT Lx ≥ λ2 (L)kxC⊥ k2 it then follows
Proof: De fine the filtration
{Fi }i≥0 as
λ2 (L)kxC⊥ k2 ≥ λ2 (cid:0)L(cid:1) ǫ2 > 0
inf
V (i, x) ≥
inf
Fi = σ nx(0), {L(j )}0≤j<i , {Υ(j )}0≤j<i , {Ψ(j )}0≤j<io
i≥0,x∈Vǫ (C )
i≥0,x∈Vǫ (C )
(39)
since λ2 (cid:0)L(cid:1) > 0. This shows, together with (38), that
(45)
We will now show that the sequence {xavg (i)}i≥0 is an
V (i, x) satisfies (28) –(30).
(44)
11
(53)
(46)
(47)
1
N
1
N
α2 (j )
Υ(i) =
1T Ψ(i)
1T Υ(i), Ψ(i) =
xavg (i + 1) = xavg (i) − α(i)Υ(i) − α(i)Ψ(i)
L2 -bounded martingale w.r.t. {Fi}i≥0 . In fact,
where Υ(i) and Ψ(i) are the component-wise averages
given by
Finally, the recursion leads to
3N 2 Xj≥0
2M∆2
E (cid:2)x2
avg (i)(cid:3) ≤ x2
avg (0) +
Note that in this equation, x2
avg (0) is bounded since it
is the average of the initial conditions, i.e., at time 0.
Thus {xavg (i)}i≥0 is an L2 -bounded martingale; hence,
it converges a.s. and in L2 to a finite random variable θ
Then,
([?]). In other words,
E [ xavg (i + 1) Fi ] = xavg (i) − α(i)E (cid:2) Υ(i)(cid:12)(cid:12) Fi (cid:3) − α(i)E (cid:2) Ψ(i)(cid:12)(cid:12) Fi (cid:3)(48)
xavg (i) = θi = 1
P h lim
= xavg (i) − α(i)E (cid:2)Υ(i)(cid:3) − α(i)E (cid:2)Ψ(i)(cid:3)
i→∞
Again, Theorem 2 implies that as i → ∞ we have
= xavg (i)
x(i) → xavg (i)1 a.s. This and (54) prove the Theorem.
where the last step follows from the fact that Υ(i) is
independent of Fi , and
E (cid:2)Ψ(i) Fi (cid:3) = E (cid:2)Ψ(i) x(i)(cid:3)
= 0
because Ψ(i) is independent of x(i) as argued in Sec-
tion II-B.
(m.s.s.) consensus of the sensor states to the random
variable θ under additional assumptions on the weight
sequence {α(i)}i≥0 .
Lemma 4 Let the weight sequence {α(i)}i≥0 be of the
form:
We extend Theorems 2,3 to derive the mean squared
(54)
(49)
α(i) =
a
(i + 1)τ
(55)
∀n
(56)
where a > 0 and .5 < τ ≤ 1. Then the a.s. convergence
in Theorem 3 holds in m.s.s. also, i.e.,
Thus, the sequence {xavg (i)}i≥0 is a martingale. For
E h(xn (i) − θ)2 i = 0,
proving L2 boundedness, note
lim
i→∞
avg (i + 1)(cid:3) = E (cid:2)xavg (i) − α(i)Υ(i) − α(i)Ψ(i)(cid:3)2
E (cid:2)x2
(50)
Proof: The proof is provided in Appendix I.
(i)i + α2 (i)E hΨ
(i)i + 2α2 (i)E (cid:2)Υ(i)Ψ(i)(cid:3)
avg (i)(cid:3) + α2 (i)E hΥ
= E (cid:2)x2
2
2
(i)i
avg (i)(cid:3) + α2 (i)E hΥ
≤ E (cid:2)x2
2
B. QC Algorithm: Mean-Squared Error
+α2 (i)E hΨ
(i)i(cid:17)1/2 (cid:16)E hΨ
(i)i(cid:17)1/2
(i)i + 2α2 (i) (cid:16)E hΥ
2
2
2
Theorem 3 shows that the sensors reach consensus
asymptotically and in fact converge a.s.
to a finite
it can be shown by using the independence
random variable θ. Viewing θ as an estimate of the initial
properties and (17) that
average r (see eqn. (1)), we characterize its desirable
(i)i = E hΨ
(i)i ≤
E hΥ
statistical properties in the following Lemma.
where M is the number of realizable edges in the
network (eqn. (19)). It then follows from eqn. (50) that
avg (i + 1)(cid:3) ≤ E (cid:2)x2
E (cid:2)x2
avg (i)(cid:3) +
Lemma 5 Let θ be as given in Theorem 3 and r, the
initial average, as given in eqn. (1). De fine
2α2 (i)M∆2
3N 2
M∆2
6N 2
ζ = E [θ − r]2
Again,
(57)
(51)
(52)
2
2
to be the m.s.e. Then, we have:
However, reducing the m.s.e. by scaling the weights
1) Unbiasedness:
E [θ] = r
in this way will reduce the convergence rate of the algo-
rithm. This tradeoff is considered in the next subsection.
12
2) M.S.E. Bound:
3N 2 Pj≥0 α2 (j )
2M∆2
Proof: The proof follows from the arguments
ζ ≤
presented in the proof of Theorem 3 and is omitted.
We note that the m.s.e. bound in Lemma 5 is conser-
vative. Recalling the de finition of M (i), as the number
of active links at time i (see eqn. (19)), we have (by
revisiting the arguments in the proof of Theorem 3)
3N 2 Xj≥0
2∆2
α2 (j ) E (cid:2)M (i)2 (cid:3)
(58)
ζ ≤
(Note that the term Pj≥0 α2 (j ) E (cid:2)M (i)2 (cid:3) is well-
de fined as E (cid:2)M (i)2 (cid:3) ≤ M2 , ∀i.) In case, we have
a fixed (non-random) topology, M (i) = M, ∀i and the
bound in eqn. (58) reduces to the one in Lemma 5. For
the asynchronous gossip protocol in [?], M (i) = 1, ∀i,
and hence
3N 2 Xj≥0
2∆2
Lemma 5 shows that, for a given ∆, ζ can be made
arbitrarily small by properly scaling the weight se-
quence, {α(i)}i≥0 . We formalize this. Given an arbitrary
weight sequence, {α(i)}i≥0 , which satisfies the persis-
tence condition (20), de fine the scaled weight sequence,
{αs (i)}i≥0 , as
ζgossip ≤
α2 (j )
(59)
αs (i) = sα(i), ∀i ≥ 0
(60)
is a constant scaling factor. Clearly,
where, s > 0,
such a scaled weight sequence satisfies the persistence
condition (20), and the m.s.e. ζs obtained by using this
scaled weight sequence is given by
3N 2 Xj≥0
2M∆2s2
showing that, by proper scaling of the weight sequence,
the m.s.e. can be made arbitrarily small.
α2 (j )
ζs ≤
(61)
C. QC Algorithm: Convergence Rate
A detailed pathwise convergence rate analysis can
be carried out for the QC algorithm using strong ap-
proximations like laws of iterated logarithms etc., as
is the case with a large class of stochastic approxima-
tion algorithms. More generally, we can study formally
some moderate deviations asymptotics ([?],[?]) or take
recourse to concentration inequalities ([?]) to charac-
terize convergence rate. Due to space limitations we
do not pursue such analysis in this paper; rather, we
present convergence rate analysis for the state sequence
{x(i)}i≥0 in the m.s.s. and that of the mean state vector
sequence. We start by studying the convergence of the
mean state vectors, which is simple, yet illustrates an
interesting trade-off between the achievable convergence
rate and the mean-squared error ζ through design of the
weight sequence {α(i)}i≥0 .
From the asymptotic unbiasedness of θ we have
lim
i→∞
E [x(i)] = r1
(62)
Our objective is to determine the rate at which the
sequence {E [x(i)]}i≥0 converges to r1.
Lemma 6 Without loss of generality, make the assump-
tion
, ∀i
(63)
α(i) ≤
2
λ2 (cid:0)L(cid:1) + λN (L)
(We note that this holds eventually, as the α(i) decrease
to zero.) Then,
kE [x(i)] − r1k ≤ (cid:16)e−λ2 (L)(P0≤j≤i−1 α(j)) (cid:17) kE [x(0)] − r1k
(64)
Proof: We note that the mean state propagates as
E [x(i + 1)] = (cid:0)I − α(i)L(cid:1) E [x(i)] , ∀i
(65)
The proof then follows from [?] and is omitted.
It follows from Lemma 6 that the rate at which the
sequence {E [x(i)]}i≥0 converges to r1 is closely related
to the rate at which the weight sequence, α(i), sums to
in finity. On the other hand, to achieve a small bound
ζ on the m.s.e, see lemma 57 in Subsection III-B,
we need to make the weights small, which reduces
the convergence rate of the algorithm. The parameter
s introduced in eqn. (60) can then be viewed as a
scalar control parameter, which can be used to trade-
off between precision (m.s.e.) and convergence rate.
More specifically, if a cost structure is imposed on the
consensus problem, where the objective is a function of
the m.s.e. and the convergence rate, one may obtain the
optimal scaling s minimizing the cost from the pareto-
optimal curve generated by varying s. This is significant,
because the algorithm allows one to trade off m.s.e. vs.
convergence rate, and in particular, if the application
13
α(j)
1
λ2 (L)
where a > 0 and .5 < τ ≤ 1. Then the m.s.s. error
evolves as follows: For every 0 < ε < 2λ2
2 (L)
λN (L) , there
exists iε ≥ 0, such that, for all i ≥ iε we have
E hkxC⊥ (iε )k2 i
E hkx(i) − r1k2 i ≤
λ2
−ε« Pi−1
−„2
2 (L)
j=iε
λN (L)
e
i−1Xj=iε " e
l=j+1 α(l)! g (j )# +
λ2
−„2
−ε« Pi−1
2 (L)
λN (L)
+
Proof: The proof is provided in Appendix I.
From the above we note that slowing up the sequence
{α(i)}i≥0 decreases the polynomial terms on the R.H.S.
of eqn. (67), but increases the exponential terms and
1
λ2 (L)
since the effect of exponentials dominate that of the
polynomials we see a similar trade-off between m.s.e.
and convergence rate (m.s.s.) as observed when studying
the mean state vector sequence above.
D. QC Algorithm: Generalizations
requires precision (low m.s.e.), one can make the m.s.e.
The QC algorithm can be extended to handle more
arbitrarily small irrespective of the quantization step-size
∆. It is important to note in this context, that though the
algorithms in [?], [?] lead to finite m.s.e., the resulting
m.s.e. is proportional to ∆2 , which may become large if
the step-size ∆ is chosen to be large.
Note that this tradeoff is established between the con-
vergence rate of the mean state vectors and the m.s.e. of
the limiting consensus variable θ. But, in general, even
for more appropriate measures of the convergence rate,
complex situations of imperfect communication. For
instance, we may incorporate Markovian link failures (as
in [?]) and time-varying quantization step-size with the
same type of analysis.
Markovian packet dropouts can be an issue in some
practical wireless sensor network scenarios, where ran-
dom environmental phenomena like scattering may lead
to temporal dependence in the link quality. Another situ-
ation arises in networks of mobile agents, where physical
we expect that, intuitively, the same tradeoff will be
aspects of the transmission like channel coherence time,
exhibited,
in the sense that
the rate of convergence
channel fading effects are related to the mobility of the
will be closely related to the rate at which the weight
sequence, α(i), sums to in finity. We end this subsection
by studying the m.s.s. convergence rate of the state
sequence {x(i)}i≥0 which is shown to exhibit a similar
trade-off.
Lemma 7 Let the weight sequence {α(i)}i≥0 be of the
form:
α(i) =
a
(i + 1)τ
(66)
dynamic network. A general analysis of all such scenar-
ios is beyond the scope of the current paper. However,
when temporal dependence is manifested through a state
dependent Laplacian (this occurs in mobile networks,
formation control problems in multi-vehicle systems),
under fairly general conditions, the link quality can be
modeled as a temporal Markov process as in [?] (see
Assumption 1.2 in [?].) Due to space limitations of the
current paper, we do not present a detailed analysis in
this context and refer the interested reader to [?], where
such temporally Markov link failures were addressed
in detail, though in the context of unquantized analog
transmission.
The current paper focuses on quantized transmission
of data and neglects the effect of additive analog noise.
Even in such a situation of digital transmission, the
message decoding process at the receiver may lead to
analog noise. Our approach can take into account such
generalized distortions and the main results will continue
to hold. For analysis purposes, temporally independent
zero mean analog noise can be incorporated as an addi-
tional term on the R.H.S. of eqn. (16) and subsequently
absorbed into the zero mean vectors Ψ(i), Υ(i). Digital
transmission where bits can get flipped due to noise
would be more challenging to address.
The case of time-varying quantization may be relevant
in many practical communication networks, where be-
cause of a bit-budget, as time progresses the quantization
may become coarser (the step-size increases). It may
also arise if one considers a rate allocation protocol with
vanishing rates as time progresses (see [?]). In that case,
the quantization step-size sequence, {∆(i)}i≥0 is time-
varying with possibly
14
quantization case.
Theorem 8 Consider
the QC algorithm with time-
varying quantization step size sequence {∆(i)}i≥0 and
let the link weight sequence {α(i)}i≥0 satisfy the gen-
eralized persistence condition in eqn. (69). Then the
sensors reach consensus to an a.s. finite random variable.
In other words, there exists an a.s. finite random variable
θ, such that,
P h lim
xn (i) = θ, ∀ni = 1
i→∞
Also, if r is the initial average, then
E h(θ − r)2 i ≤
3N 2 Xi≥0
2M
It is clear that in this case also, we can trade-off m.s.e.
α2 (i)∆2 (i)
(70)
(71)
with convergence rate by tuning a scalar gain parameter
s associated with the link weight sequence.
IV. CON S EN SU S W ITH QUANT IZ ED DATA : BOUNDED
IN IT IAL SEN SOR STAT E
We consider consensus with quantized data and
bounded range quantizers when the initial sensor states
are bounded, and this bound is known a priori. We show
that finite bit quantizers (whose outputs take only a finite
lim sup
i→∞
∆(i) = ∞
(68)
number of values) suffice. The algorithm QCF that we
Also, as suggested in [?], one may consider a rate
allocation scheme, in which the quantizer becomes finer
as time progresses. In that way, the quantization step-size
sequence, {∆(i)}i≥0 may be a decreasing sequence.
Generally, in a situation like this to attain consensus
the link weight sequence {α(i)}i≥0 needs to satisfy a
generalized persistence condition of the form
Xi≥0
α(i) = ∞, Xi≥0
Note, when the quantization step-size is bounded, this
reduces to the persistence condition assumed earlier. We
α2 (i)∆2 (i) < ∞ (69)
consider is a simple modification of the QC algorithm of
Section III. The good performance of the QCF algorithm
relies on the fact that, if the initial sensor states are
bounded, the state sequence, {x(i)}i≥0 generated by
the QC algorithm remains uniformly bounded with high
probability, as we prove here. In this case, channel
quantizers with finite dynamic range perform well with
high probability.
We brie fly state the QCF problem in Subsection IV-A.
Then, Subsection IV-B shows that with high probability
the sample paths generated by the QC algorithm are
uniformly bounded, when the initial sensor states are
state without proof the following result for time-varying
bounded. Subsection IV-C proves that QCF achieves
15
asymptotic consensus. Finally, Subsections IV-D and IV-
4) The link failure model is the same as used in QC.
E analyze its statistical properties, performance, and
Given this setup, we present the distributed QCF algo-
tradeoffs.
A. QCF Algorithm: Statement
The QCF algorithm modifies the QC algorithm by
restricting the alphabet of the quantizer to be finite. It
assumes that the initial sensor state x(0), whose average
we wish to compute, is known to be bounded. Of course,
even if the initial state is bounded, the states of QC can
become unbounded. The good performance of QCF is a
consequence of the fact that, as our analysis will show,
the states {x(i)}i≥0 generated by the QC algorithm
when started with a bounded initial state x(0) remain
uniformly bounded with high probability.
The following are the assumptions underlying QCF.
We let the the state sequence for QCF be represented by
{ex(i)}i≥0 .
1) Bounded initial state. Let b > 0. The QCF initial
state ex(0) = xn (0) is bounded to the set B known
`a priori
B = (cid:8)y ∈ RN ×1 yn ≤ b < +∞(cid:9)
(72)
2) Uniform quantizers and finite alphabet. Each inter-
sensor communication channel in the network uses
a uniform ⌈log2 (2p + 1)⌉ bit quantizer with step-
size ∆, where p > 0 is an integer. In other words,
the quantizer output takes only 2p + 1 values, and
the quantization alphabet is given by
eQ = {l∆ l = 0, ±1, · · · , ±p}
Clearly, such a quantizer will not saturate if the in-
put falls in the range [(−p − 1/2)∆, (p + 1/2)∆);
if the input goes out of that range, the quantizer
(73)
saturates.
3) Uniform i.i.d.
noise. Like with QC,
the
{νnl (i)}i≥0,1≤n,l≤N are a sequence of i.i.d. random
variables uniformly distributed on [−∆/2, ∆/2).
rithm, assuming that the sensor network is connected.
The state sequence, {ex(i)}i≥0 is given by the following
Algorithm.
Algorithm 1: QCF
Initialize
exn (0) = xn (0), ∀n;
i = 0;
begin
while sup1≤n≤N supl∈Ωn (i) (exl (i) + νnl (i)) <
(p + 1/2)∆ do
;
exn (i + 1) = (1 − α(i)dn (i))exn (i) +
α(i) Pl∈Ωn (i) q(exl (i) + νnl (i)), ∀n;
i = i + 1;
end
Stop the algorithm and reset all the sensor states to
zero
The last step of the algorithm can be distributed, since
the network is connected.
B. Probability Bounds on Uniform Boundedness of Sam-
ple Paths of QC
The analysis of the QCF algorithm requires uniformity
properties of the sample paths generated by the QC
algorithm. This is necessary, because the QCF algorithm
follows the QC algorithm till one of the quantizers gets
overloaded. The uniformity properties require establish-
ing statistical properties of the supremum taken over the
sample paths, which is carried out in this subsection. We
show that the state vector sequence, {x(i)}i≥0 , generated
by the QC algorithm is uniformly bounded with high
probability. The proof follows by splitting the sequence
{x(i)}i≥0 as the sum of the sequences {xavg (i)}i≥0 and
{xC⊥ (i)}i≥0 for which we establish uniformity results.
The proof is lengthy and uses mainly maximal inequal-
ities for submartingale and supermartingale sequences.
the state vector at any time i can be
that
Recall
decomposed orthogonally as
x(i) = xavg (i)1 + xC⊥ (i)
(74)
where the consensus subspace, C , is given in eqn. (21).
We provide probability bounds on the sequences
{xavg (i)}i≥0 and {xC⊥ (i)}i≥0 and then use an union
bound to get the final result.
The rest of the subsection concerns the proof of The-
orem 12 which involves several intermediate lemmas as
stated below, whose proofs are provided in Appendix II.
We need the following result.
Lemma 9 Consider the QC algorithm stated in Section II
and let {x(i)}i≥0 be the state it sequence generates.
De fine the function W (i, x), i ≥ 0, x ∈ RN ×1 , as
W (i, x) = (1 + V (i, x)) Yj≥i
where V (i, x) = xT Lx and {g (j )}j≥0 is de fined in
eqn. (42).2 Then, the process {W (i, x(i)}i≥0 is a non-
negative supermartingale with respect to the filtration
{Fi}i≥0 de fined in eqn. (45).
[1 + g (j )]
(75)
The next Lemma bounds the sequence {xC⊥ (i)}i≥0 .
Lemma 10 Let {x(i)}i≥0 be the state vector sequence
generated by the QC algorithm, with the initial state
x(0) ∈ RN ×1 . Consider the orthogonal decomposition:
x(i) = xavg (i)1 + xC⊥ (i), ∀i
(76)
16
x(0) ∈ RN ×1 . Then, for any a > 0,
xavg (j ) > a(cid:21) ≤ hx2
3N 2 Pj≥0 α2 (j )i1/2
avg (0) + 2M∆2
P (cid:20)sup
a
j≥0
(78)
Theorem 12 Let {x(i)}i≥0 be the state vector sequence
generated by the QC algorithm, with an initial state
x(0) ∈ RN ×1 . Then, for any a > 0,
kx(j )k > a(cid:21) ≤ h2N x2
3N Pj≥0 α2 (j )i1/2
avg (0) + 4M∆2
P (cid:20)sup
a
j≥0
(79)
where {g (j )}j≥0 is de fined in eqn. (42).
We now state as a Corollary the result on the bounded-
ness of the sensor states, which will be used in analyzing
the performance of the QCF algorithm.
+ (cid:0)1 + x(0)
Corollary 13 Assume that the initial sensor state, x(0) ∈
B , where B is given in eqn. (72). Then, if {x(i)}i≥0
is the state sequence generated by the QC algorithm
starting from the initial state, x(0), we have, for any
a > 0,
3N Pj≥0 α2 (j )i1/2
xn (j ) > a(cid:21) ≤ h2N b2 + 4M∆2
P (cid:20)
sup
a
1≤n≤N ,j≥0
(80)
where {g (j )}j≥0 is de fined in eqn. (42).
+ (cid:0)1 + N
Then, for any a > 0, we have
C. Algorithm QCF: Asymptotic Consensus
kxC⊥ (j )k2 > a(cid:21) ≤ (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
P (cid:20)sup
We show that the QCF algorithm, given in Subsec-
1 + aλ2 (L)
tion IV-A, converges a.s. to a finite random variable and
j≥0
(77)
the sensors reach consensus asymptotically.
where {g (j )}j≥0 is de fined in eqn. (42).
Next, we provide probability bounds on the uniform
boundedness of {xavg (i)}i≥0 .
Lemma 11 Let {xavg (i)}i≥0 be the average sequence
generated by the QC algorithm, with an initial state
2 The
term
the
because
is well-defined
function
above
Qj≥i [1 + g(j )] is finite for any j , by the persistence condition on
the weight sequence.
Theorem 14 (QCF: a.s. asymptotic consensus) Let
{ex(i)}i≥0 be the state vector sequence generated
by the QCF algorithm, starting from an initial state
ex(0) = x(0) ∈ B . Then, the sensors reach consensus
asymptotically a.s. In other words, there exists an a.s.
finite random variable eθ such that
i→∞ ex(i) = eθ1i = 1
P h lim
(81)
(82)
θ
0
sup
1≤n≤N
The probability of ǫ-consensus is de fined as
For
the proof, consider
the sequence
Proof:
exn (i) − r < ǫ(cid:21)(85)
T (G, b, α, ǫ, p, ∆) = P (cid:20) lim
{x(i)}i≥0 generated by the QC algorithm, with the same
initial state x(0). Let θ be the a.s. finite random variable
i→∞
(see eqn. 43) such that
the argument G in the de finition of T (·)
Note that
P h lim
x(i) = θ1i = 1
emphasizes the in fluence of the network con figuration,
i→∞
whereas b is given in eqn. (72).
It is clear that
The QCF algorithm is consensus-consistent3 iff for
eθ =
on nsupi≥0 sup1≤n≤N supl∈Ωn (i) xl (i) + νnl (i) < (p + 1
2 )∆o
every G, b, ǫ > 0 and 0 < δ < 1, there exists quantizer
otherwise
parameters p, ∆ and weights {α(i)}i≥0 , such that
(83)
In other words, we have
)∆!
eθ = θI sup
1
Theorem 17 characterizes the probability of ǫ-consensus,
2
i≥0
while Proposition 18 considers several tradeoffs between
(84)
the probability of achieving consensus and the quantizer
Since
function.
indicator
the
is
where
I(·)
nsupi≥0 sup1≤n≤N supl∈Ωn (i) xl (i) + νnl (i) < (p + 1/2)∆o
parameters and network topology, and,
shows that the QCF algorithm is consensus-consistent.
is a measurable set, it follows that eθ is a random variable.
We need the following Lemma to prove Theorem 17.
T (G, b, α, ǫ, p, ∆) > 1 − δ
xl (i) + νnl (i) < (p +
in particular,
sup
1≤n≤N
sup
l∈Ωn (i)
17
(86)
D. QCF: ǫ-Consensus
Recall the QCF algorithm in Subsection IV-A and the
assumptions 1) –4). A key step is that, if we run the QC
algorithm using finite bit quantizers with finite alphabet
eQ as in eqn. (73), the only way for an error to occur is
for one of the quantizers to saturate. This is the intuition
behind the design of the QCF algorithm.
Theorem 14 shows that the QCF sensor states asymp-
to a finite
totically reach consensus, converging a.s.
random variable eθ. The next series of results address the
question of how close is this consensus to the desired
average r in (1). Clearly,
this depends on the QCF
design: 1) the quantizer parameters (like the number of
levels 2p + 1 or the quantization step ∆); 2) the random
network topology ; and 3) the gains α.
We de fine the following performance metrics which
Lemma 16 Let eθ be de fined as in Theorem 14, with the
initial state ex(0) = x(0) ∈ B . The desired average, r, is
given in (1). Then, for any ǫ > 0, we have
α2 (j ) + h2N b2 + 4M∆2
3N Pj≥0 α2 (j )
P heθ − r ≥ ǫi ≤
3N 2ǫ2 Xj≥0
2M∆2
p∆
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
1 + p2∆2
2 λ2 (L)
where {g (j )}j≥0 is de fined in eqn. (42).
Proof: The proof is provided in Appendix III.
We now state the main result of this Section, which
provides a performance guarantee for QCF.
Theorem 17 (QCF: Probability of ǫ-consensus) For any
ǫ > 0, the probability of ǫ-consensus T (G, b, α, ǫ, p, ∆)
characterize the performance of the QCF algorithm.
De finition 15 (Probability of
3Consensus-consistent means for arbitrary ǫ > 0, the QCF quantiz-
ers can be designed so that the QCF states get within an ǫ-ball of r
with arbitrary high probability. Thus, a consensus-consistent algorithm
ǫ-consensus and consensus-consistent)
trades off accuracy with bit-rate.
18
sup
1≤n≤N
is bounded below
G, b, ǫ, p, ∆, we have
α2 (j ) − h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
T z (G, b, ǫ, p, ∆) ≥ 1 − (cid:0)2N b2(cid:1)1/2
exn (i) − r < ǫ(cid:21) > 1 −
P (cid:20) lim
1 + N λN (L)b2
3N 2ǫ2 Xj≥0
2M∆2
−
1 + p2∆2
p∆
2 λ2 (L)
p∆
i→∞
(93)
− (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
3) Optimum quantization step-size ∆. For
fixed
(89)
1 + p2∆2
2 λ2 (L)
G, b, ǫ, p,
the optimum quantization step-size ∆,
where {g (j )}j≥0 is de fined in eqn. (42).
which maximizes
the probability of ǫ-consensus,
T (G, b, α, ǫ, p, ∆), is given by
∆≥0
∆∗ (G, b, α, ǫ, p) = arg inf
3N 2ǫ2 Xj≥0
2M∆2
α2 (j ) + h2N b2 + 4M ∆2
3N Pp∆
+ (cid:0)1 + N λN (
1 +
(90)
It follows from Theorem 14 that
Proof:
i→∞ exn (i) = eθ a.s., ∀1 ≤ n ≤ N
lim
The proof then follows from Lemma 16.
The lower bound on T (·), given by (89), is uniform,
in the sense that it is applicable for all initial states
x(0) ∈ B . Recall the scaled weight sequence αs , given
by eqn. (60). We introduce the zero-rate probability of
ǫ-consensus, T z (G, b, ǫ, p, ∆) by
T z (G, b, ǫ, p, ∆) = lim
s→0
T (G, b, αs , ǫ, p, ∆)
(91)
The next proposition studies the dependence of the ǫ-
consensus probability T (·) and of the zero-rate proba-
bility T z ((·) on the network and algorithm parameters.
where {g (j )}j≥0 is de fined in eqn. (42).
Proof: For item 2), we note that, as s → 0,
Xj≥0
s (j ) → 0, Yj≥0
α2
The rest follows by simple inspection of eqn. (89).
We comment on Proposition 18. Item 1) shows that
the algorithm QCF is consensus-consistent, in the sense
(1 + gs (j )) → 1
T (G, b, α, ǫ, p, ∆) = 1
(92)
lim
∆→0, p∆→∞
Proposition 18 (QCF: Tradeoffs) 1) Limiting quan-
tizer. For fixed G, b, α, ǫ, we have
that we can achieve arbitrarily good performance by
decreasing the step-size ∆ and the number of quanti-
zation levels, 2p + 1, appropriately. Indeed, decreasing
the step-size increases the precision of the quantized
output and increasing p increases the dynamic range
of the quantizer. However, the fact that ∆ → 0 but
p∆ → ∞ implies that the rate of growth of the number
Since, this holds for arbitrary ǫ > 0, we note that, as
of levels 2p + 1 should be higher than the rate of decay
∆ → 0, p∆ → ∞,
exn (i) − r < ǫ(cid:21)
P (cid:20) lim
of ∆, guaranteeing that in the limit we have asymptotic
i→∞ ex(i) = r1i = lim
P h lim
sup
consensus with probability one.
ǫ→0
i→∞
1≤n≤N
T (G, b, α, ǫ, p, ∆)(cid:21) = 1
ǫ→0 (cid:20)
For interpreting item 2), we recall the m.s.e. versus
lim
= lim
∆→0, p∆→∞
convergence rate tradeoff for the QC algorithm, studied
In other words, the QCF algorithm leads to a.s. con-
in Subsection III-B. There, we considered a quantizer
sensus to the desired average r, as ∆ → 0, p∆ →
∞. In particular, it shows that the QCF algorithm is
consensus-consistent.
with a countably in finite number of output levels (as
opposed to the finite number of output levels in the QCF)
and observed that the m.s.e. can be made arbitrarily
2) zero-rate ǫ-consensus probability. Then, for fixed
small by rescaling the weight sequence. By Chebyshev’s
inequality, this would imply, that, for arbitrary ǫ > 0,
the probability of ǫ-consensus, i.e., that we get within
an ǫ-ball of the desired average, can be made as close
to 1 as we want. However, this occurs at a cost of the
convergence rate, which decreases as the scaling factor
s decreases. Thus, for the QC algorithm, in the limiting
case, as s → 0, the probability of ǫ-consensus (for
arbitrary ǫ > 0) goes to 1; we call “limiting probability ”
the zero-rate probability of ǫ-consensus, justifying the
m.s.e. vs convergence rate tradeoff.4 Item 2) shows,
that, similar to the QC algorithm, the QCF algorithm
exhibits a tradeoff between probability of ǫ-consensus
vs. the convergence rate, in the sense that, by scaling
(decreasing s), the probability of ǫ-consensus can be
increased. However, contrary to the QC case, scaling will
not lead to probability of ǫ-consensus arbitrarily close to
1, and, in fact, the zero-rate probability of ǫ-consensus
is strictly less than one, as given by eqn. (93). In other
words, by scaling, we can make T (G, b, αs , ǫ, p, ∆) as
high as T z (G, b, ǫ, p, ∆), but no higher.
We now interpret the lower bound on the zero-rate
probability of ǫ-consensus, T z (G, b, ǫ, p, ∆), and show
that the network topology plays an important role in
this context. We note, that, for a fixed number, N , of
sensor nodes, the only way the topology enters into the
expression of the lower bound is through the third term
on the R.H.S. Then, assuming that,
N λN (L)b2 ≫ 1,
p2∆2
2
λ2 (L) ≫ 1
we may use the approximation
p2∆2 (cid:19) λN (L)
≈ (cid:18) 2N b2
1 + N λN (L)b2
1 + p2∆2
λ2 (L)
2 λ2 (L)
Let us interpret eqn. (95) in the case, where the topology
is fixed (non-random). Then for all
i, L(i) = L = L.
Thus, for a fixed number, N , of sensor nodes, topologies
(95)
4Note that, for both the algorithms, QC and QCF, we can take
the scaling factor, s, arbitrarily close to 0, but not zero, so that,
these limiting performance values are not achievable, but we may get
arbitrarily close to them.
19
with smaller λN (L)/λ2 (L), will lead to higher zero-rate
probability of ǫ-consensus and, hence, are preferable.
We note that, in this context, for fixed N , the class
of non-bipartite Ramanujan graphs give the smallest
λN (L)/λ2 (L) ratio, given a constraint on the number,
M , of network edges (see [?].)
Item 3) shows that, for given graph topology G, initial
sensor data, b, the link weight sequence α, tolerance ǫ,
and the number of levels in the quantizer p, the step-
size ∆ plays a significant role in determining the perfor-
mance. This gives insight into the design of quantizers to
achieve optimal performance, given a constraint on the
number of quantization levels, or, equivalently, given a
bit budget on the communication.
In the next Subsection, we present some numerical
studies on the QCF algorithm, which demonstrate prac-
tical implications of the results just discussed.
E. QCF: Numerical Studies
We present a set of numerical studies on the quantizer
step-size optimization problem, considered in Item 3)
of Proposition 18. We consider a fixed (non-random)
sensor network of N = 230 nodes, with communi-
cation topology given by an LPS-II Ramanujan graph
(see [?]), of degree 6.5 We fix
ǫ at .05, and take the
initial sensor data bound, b, to be 30. We numerically
solve the step-size optimization problem given in (94)
for varying number of levels, 2p + 1. Specifically, we
consider two instances of the optimization problem: In
the first
instance, we consider the weight sequence,
α(i) = .01/(i + 1), (s = .01), and numerically solve the
optimization problem for varying number of levels. In
the second instance, we repeat the same experiment, with
the weight sequence, α(i) = .001/(i+1), (s = .001). As
in eqn. (94), ∆∗ (G, b, αs , ǫ, p) denotes the optimal step-
size. Also, let T ∗(G, b, αs , ǫ, p) be the corresponding op-
timum probability of ǫ-consensus. Fig. 1 on the left plots
T ∗(G, b, αs , ǫ, p) for varying 2p + 1 on the vertical axis,
5 This is a 6-regular graph, i.e., all the nodes have degree 6.
while on the horizontal axis, we plot the corresponding
quantizer bit-rate BR = log2 (2p + 1). The two plots
correspond to two different scalings, namely, s = .01 and
s = .001 respectively. The result is in strict agreement
with Item 2) of Proposition 18, and shows that, as the
scaling factor decreases, the probability of ǫ-consensus
increases, till it reaches the zero-rate probability of ǫ-
consensus.
Fig. 1 on the right plots ∆∗ (G, b, αs , ǫ, p) for varying
2p + 1 on the vertical axis, while on the horizontal
axis, we plot the corresponding quantizer bit-rate BR =
log2 (2p + 1). The two plots correspond to two different
scalings, namely, s = .01 and s = .001 respectively. The
results are again in strict agreement to Proposition 18 and
further show that optimizing the step-size is an important
quantizer design problem, because the optimal step-size
value is sensitive to the number of quantization levels,
2p + 1.
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
)
p
,
ǫ
,
b
,
G
(
∗
T
0
5
10
15
BR
20
25
s = .01
s = .001
s = .01
s = .001
20
V. CONCLU S ION
The paper considers distributed average consensus
with quantized information exchange and random inter-
sensor link failures. We add dither to the sensor states
before quantization. We show by stochastic approxima-
tion that, when the range of the quantizer is unbounded,
the QC-algorithm, the sensor states achieve a.s. and
m.s.s. consensus to a random variable whose mean is
the desired average. The variance of this random variable
can be made small by tuning parameters of the algorithm
(rate of decay of the gains), the network topology, and
quantizers parameters. When the range of the quantizer
is bounded, the QCF-algorithm, a sample path analysis
shows that the state vector of the QC-algorithm can
be made to remain uniformly bounded with probability
arbitrarily close to 1. This means that the QCF algorithm
achieves ǫ-consensus. We use the bounds that we derive
for the probability of large excursions of the sample
paths to formulate a quantizer design problem that trades
between several quantizer parameters: number of bits
(or levels), step size, probability of saturation, and error
margin to consensus. A numerical study illustrates this
design problem and several interesting tradeoffs among
the design parameters.
A P P END IX I
PROO F S O F L EMMA S 4 AND 7
Before deriving Lemmas 4 and 7, we present a result
from [?] on a property of real number sequences to be
used later, see proof in [?].
,
r2 (t) =
r1 (t) =
Lemma 19 (Lemma 18 in [?]) Let
the
quences {r1 (t)}t≥0 and {r2 (t)}t≥0 be given by
a1
a2
(t + 1)δ1
(t + 1)δ2
where a1 , a2 , δ2 ≥ 0 and 0 ≤ δ1 ≤ 1. Then, if δ1 =
δ2 there exists K > 0 such that, for non-negative
integers, s < t,
t−1Xk=s " t−1Yl=k+1
(1 − r1 (l))# r2 (k) ≤ K
Moreover, the constant K can be chosen independently
(96)
se-
(97)
)
p
,
ǫ
,
b
,
G
(
∗
∆
20
18
16
14
12
10
8
6
4
2
0
5
10
15
BR
20
25
0 ≤
Fig. 1. Left: T ∗ (G, b, αs , ǫ, p) vs. 2p + 1 (BR = log2 (2p + 1).)
Right: ∆∗ (G, b, αs , ǫ, p) vs. 2p + 1 (BR = log2 (2p + 1).)
21
α(j)
−ε« Pi−1
j=iε
λ2
−„2
−ε« P
2 (L)
λN (L)
α2 (j )
lim
i→∞
e
−ε« Pi−1
j=iε
α(j)
= 0
(104)
+ g (i) [1 + V (i, x(i))] + V (i, x(i))
lim
t→∞
λ2
2 (L)
λN (L)
(98)
lim
i→∞
+ g (i) [1 + E [V (i, x(i))]]
2 (L) kxC⊥ k2 ≤ ϕ(i, x(i)) = xT
λ2
C⊥ L
2
We also have the following inequalities for all i:
Proof: [Proof of Lemma 4] Taking expectations
(unconditional) on both sides of eqn. (41) we have
of s, t. Also, if δ1 < δ2 , then, for arbitrary fixed s,
t−1Xk=s " t−1Yl=k+1
(1 − r1 (l))# r2 (k) = 0
The second term on the R.H.S. of (103) falls under
Lemma 19 whose second part (eqn. (98)) implies
− ε(cid:19) α(l)(cid:19) g (j ) = 0
i−1Yl=j+1 (cid:18)1 − (cid:18)2
i−1Xj=iε
(105)
eqn.
from
conclude
(103)
that
We
limi→∞ E [V (i, x(i))] = 0. This with (99) implies
limi→∞ E hkxC⊥ (i)k2 i = 0. From the orthogonality
arguments we have for all i
E hkx(i) − θ1k2 i = E hkxC (i) − θ1k2 i+E hkxC⊥ (i)k2 i
E [V (i + 1, x(i + 1))] ≤ E [V (i, x(i))] − α(i)E [ϕ(i, x(i))]
(106)
The second term in eqn. (106) goes to zero by the above,
whereas the first term goes to zero by the L2 convergence
C⊥ LxC⊥ ≤ λN (L) kxC⊥ k2
λ2 (L) kxC⊥ k2 ≤ V (i, x(i)) = xT
of the sequence {xavg (i)}i≥0 to θ and the desired m.s.s.
(99)
convergence follows.
N (L) kxC⊥ k2
xC⊥ ≤ λ2
Proof: [Proof of Lemma 7] From (99,103), using
(100)
repeatedly 1 − a ≤ e−a for a ≥ 0, we have for i > iε
From eqns. (99,99,100) we have
E hkxC⊥ k2 i ≤
λ2
−„2
2 (L)
+ g (i)(cid:19) E [V (i, x(i))]+g (i)
E [V (i + 1, x(i + 1))] ≤ (cid:18)1 − 2α(i)
λN (L)
e
i−1Xj=iε " e
(101)
Choose 0 < ε < 2λ2
2 (L)
λN (L) and note that, the form of g (i) in
From the development in the proof of Theorem 3 we
eqn. (42) and the fact that α(i) → 0 as i → ∞ suggests
note that
that there exists iε ≥ 0, such that, εα(i) ≥ g (i),
i ≥ iε .
E hkxC (i) − r1k2 i = N 2E hkxavg (i) − rk2 i ≤
We then have
− ε(cid:19) α(i)(cid:19) E [V (i, x(i))]+g (i),
E [V (i + 1, x(i + 1))] ≤ (cid:18)1 − (cid:18)2
i ≥ iε
(102)
We then arrive at the result by using the equality
Continuing the recursion we have for i > iε ,
kx(i) − r1k2 = kxC⊥ (i)k2 + kxC (i) − r1k2 ,
i−1Yj=iε (cid:18)1 − (cid:18)2
− ε(cid:19) α(j )(cid:19) E [V (i, x(iε ))]
λ2
2 (L)
λN (L)
− ε(cid:19) α(l)(cid:19) g (j )
i−1Yl=j+1 (cid:18)1 − (cid:18)2
i−1Xj=iε
λ2
2 (L)
A P P END IX I I
λN (L)
PROO F S O F RE SULT S IN SUB S ECT ION IV-B
− ε(cid:19) α(l)(cid:19) g (j )
i−1Yl=j+1 (cid:18)1 − (cid:18)2
λ2
−ε« Pi−1
−„2
i−1Xj=iε
2 (L)
λ2
2 (L)
α(j)
j=iε
λN (L)
E [V (i, x(iε ))] +
≤ e
λN (L)
Proof: [Proof of Lemma 9] From eqn. (41) we
have
E [V (i + 1, x(i + 1))x(i)] ≤ −α(i)ϕ(i, x(i))
where we use 1 − a ≤ e−a for a ≥ 0. Since the α(i)s
sum to in finity, we have
−„2
λ2
2 (L)
λN (L)
1
λ2 (L)
1
λ2 (L)
2M∆2
3
(108)
i−1Xj=0
λ2
2 (L)
λN (L)
λ2
2 (L)
λN (L)
1
λ2 (L)
E [V (i, x(i))] ≤
E [V (i, x(i))] ≤
+
∀i
(103)
(109)
22
(116)
(118)
α2 (j )(119)
(111)
We then have
[1 + g (j )](cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
E [ W (i + 1, x(i + 1)) Fi ] = E (1 + V (i + 1, x(i + 1))) Yj≥i+1
x(i)
Proof: [Proof of Lemma 11] It was shown in The-
orem 3 that the sequence {xavg (i)}i≥0 is a martingale. It
[1 + g (j )] (cid:16)1 + E h V (i + 1, x(i + 1))(cid:12)(cid:12)(cid:12) x(i)i(cid:17)
= Yj≥i+1
then follows that the sequence, {xavg (i)}i≥0 , is a non-
negative submartingale (see [?]).
[1 + g (j )] (cid:16)1 − α(i)ϕ(i, x(i)) + g (i) [1 + V (i, x(i))] + V (i, x(i))(cid:17)
≤ Yj≥i+1
The submartingale inequality then states that for a > 0
P (cid:20) max
xavg (j ) ≥ a(cid:21) ≤
= −α(i)ϕ(i, x(i)) Yj≥i+1
[1 + g (j )] + [1 + V (i, x(i))] Yj≥i
E [xavg (i)]
[1 + g (j )]
a
0≤j≤i
= −α(i)ϕ(i, x(i)) Yj≥i+1
Clearly, from the continuity of probability measures,
(110)
[1 + g (j )] + W (i, x(i))
xavg (j ) > a(cid:21)(117)
P (cid:20) max
xavg (j ) > a(cid:21) = lim
P (cid:20)sup
Hence E [W (i + 1, x(i + 1)) Fi ] ≤ W (i, x(i)) and the
i→∞
0≥j≥i
j≥0
result follows.
Thus, we have
xavg (j ) > a(cid:21) ≤ lim
P (cid:20)sup
i→∞
j≥0
(the limit on the right exists because xavg (i) converges
in L1 .) Also, we have from eqn. (53), for all i,
≤ x2
E [xavg (i)] ≤ ≤ hE hxavg (i)2 ii1/2
3N 2 Xj≥0
2M∆2
avg (0) +
Combining eqns. (118,119), we have
xavg (j ) > a(cid:21) ≤ hx2
3N 2 Pj≥0 α2 (j )i1/2
avg (0) + 2M∆2
P (cid:20)sup
a
j≥0
(120)
De fine the potential function V (i, x) as in Theorem 2
and eqn. (37) and the W (i, x) as in (75) in Lemma 9.
It then follows from eqn. (111) that
Proof: [Proof of Lemma 10] For any a > 0 and
i ≥ 0, we have
kxC⊥ (i)k2 > a =⇒ W (i, x(i)) > 1 + aλ2 (L) (112)
kxC⊥ (i)k2 > a =⇒ x(i)T Lx(i) ≥ aλ2 (L)
E [xavg (i)]
a
(113)
By Lemma 9, the process (W (i, x(i)), Fi ) is a non-
negative supermartingale. Then by a maximal inequality
for non-negative supermartingales (see [?]) we have for
Proof: [Proof of Theorem 12] Since, kx(j )k2 =
a > 0 and i ≥ 0,
P (cid:20) max
W (j, x(j )) ≥ a(cid:21) ≤
avg (i) + kxC⊥ (j )k2 , we have
N x2
E [W (0, x(0))]
2 (cid:21) + P (cid:20)sup
kx(j )k2 > a(cid:21) ≤ P (cid:20)sup
P (cid:20)sup
a
0≤j≤i
a
kxC⊥ (j )k2
N xavg (j )2 >
Also, we note that
j≥0
j≥0
j≥0
W (j, x(j )) > a(cid:27)
W (j, x(j )) > a(cid:27) ⇐⇒ ∪i≥0 (cid:26) max
= P (cid:20)sup
(cid:26)sup
2N (cid:17)1/2 (cid:21) + P (cid:20)sup
xavg (j ) > (cid:16) a
0≤j≤i
j≥0
j≥0
j≥0
(114)
We thus have from Lemmas 10 and 11,
Since {max0≤j≤i W (j, x(j )) > a} is a non-decreasing
kx(j )k2 > a(cid:21) ≤ hx2
3N 2 Pj≥0 α2 (j )i1/2
+ (cid:0)1 + x(0)T
avg (0) + 2M∆2
P (cid:20)sup
sequence of sets in i, it follows from the continuity of
2N (cid:1)1/2
(cid:0) a
1
probability measures and eqn. (112)
j≥0
(122)
kxC⊥ (j )k2 > a(cid:21)
P (cid:20) max
kxC⊥ (j )k2 > a(cid:21) = lim
P (cid:20)sup
(115)
i→∞
0≤j≤i
j≥0
W (j, x(j )) > 1 + aλ2 (L)(cid:21)
P (cid:20) max
Proof: [Proof of Corollary 13] We note that, for
≤ lim
i→∞
0≤j≤i
x(0) ∈ B ,
= (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
E [W (0, x(0))]
x2
avg (0) ≤ b2 , x(0)T Lx(0) ≤ N λN (L)b2
1 + aλ2 (L)
1 + aλ2 (L)
≤ lim
i→∞
(123)
kxC⊥ (
23
2 (cid:19) ∆#
1
Then, for any δ > 0,
From Theorem 12, we then get,
P heθ 6= θi = P "sup
xn (j ) > a(cid:21) ≤ P (cid:20)sup
P (cid:20)
kx(j )k > a(cid:21)
xl (i) + νnl (i) ≥ (cid:18)p +
sup
sup
sup
1≤n≤N ,j≥0
j≥0
i≥0
1≤n≤N
l∈Ωn (i)
≤ h2N x2
3N Pj≥0 α2 (j )i1/2
2 (cid:19) ∆(cid:21)
≥ (cid:18)p +
≤ P (cid:20)sup
+ (cid:0)1 + x(0)T Lx(0)(cid:1) Qj≥0 (1 + g (j ))
avg (0) + 4M∆2
1
∆
sup
xn (i) +
2
i≥0
1≤n≤N
1 + a2
a
2 λ2 (L)
xn (i) ≥ p∆(cid:21) ≤ P (cid:20)sup
= P (cid:20)sup
≤ h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
sup
sup
xn (i) >
+ (cid:0)1 + N λN (L)b2 (cid:1) Qj≥0 (1 + g (j ))
i≥0
1≤n≤N
i≥0
1≤n≤N
≤ h2N b2 + 4M∆2
3N Pj≥0 α2 (j )i1/2
+ (cid:0)1 + N λN (L)b2 (cid:1) Q
1 + a2
a
2 λ2 (L)
1 + (p∆−δ)2
p∆ − δ
2
where, in the last step, we use eqn. (124.) Since the
above holds for arbitrary δ > 0, we have
δ↓0
3N Pj≥0 α2 (j )i1/2
h2N b2 + 4M∆2
+ (cid:0)1 + N λN (L)
P heθ 6= θi ≤ lim
p∆ − δ
1 + (p
3N Pj≥0 α2 (j )i1/2
= h2N b2 + 4M∆2
+ (cid:0)1 + N λN (L)b2 (cid:1) Q
1 + p2∆2
p∆
2 λ
Combining eqns. (125,126,128), we get the result.
A P P END IX I I I
PROO F S O F L EMMA 1 6
(124)
Proof: [Proof of Lemma 16] For the proof, con-
sider the sequence {x(i)}i≥0 generated by the QC
algorithm, with the same initial state x(0). Let θ be the
a.s. finite random variable (see eqn. 43) such that
x(i) = θ1i = 1
P h lim
i→∞
We note that
P h(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫi = P h(cid:16)(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫ(cid:17) ∩ (cid:16)eθ = θ(cid:17)i + P h(cid:16)(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫ(cid:17) ∩ (cid:16)eθ 6= θ(cid:17)i
= P h(θ − r ≥ ǫ) ∩ (cid:16) eθ = θ(cid:17)i + P h(cid:16)(cid:12)(cid:12)(cid:12)eθ − r(cid:12)(cid:12)(cid:12) ≥ ǫ(cid:17) ∩ (cid:16)eθ 6= θ(cid:17)i
≤ P [θ − r ≥ ǫ] + P heθ 6= θi
(125)
From Chebyshev’s inequality, we have
E hθ − r2 i
3N 2ǫ2 Xj≥0
2M∆2
α2 (j )
≤
P [θ − r ≥ ǫ] ≤
ǫ2
Next, we bound P h eθ 6= θi. To this end, we note that
sup
sup
sup
sup
xl (i) + νnl (i) ≤ sup
sup
i≥0
1≤n≤N
i≥0
1≤n≤N
l∈Ωn (i)
l∈Ωn (i)
xn (i) + sup
sup
≤ sup
i≥0
i≥0
1≤n≤N
∆
2
xl (i) + sup
i≥0
sup
1≤n≤N
sup
1≤n≤N
sup
l∈Ωn (i)
≤ sup
i≥0
sup
1≤n≤N
xn (i) +
νnl (i)
sup
l∈Ωn (i)
νnl (i)
(126)
|
1906.04656 | 1 | 1906 | 2019-06-11T15:36:18 | Deep learning control of artificial avatars in group coordination tasks | [
"cs.MA",
"cs.LG"
] | In many joint-action scenarios, humans and robots have to coordinate their movements to accomplish a given shared task. Lifting an object together, sawing a wood log, transferring objects from a point to another are all examples where motor coordination between humans and machines is a crucial requirement. While the dyadic coordination between a human and a robot has been studied in previous investigations, the multi-agent scenario in which a robot has to be integrated into a human group still remains a less explored field of research. In this paper we discuss how to synthesise an artificial agent able to coordinate its motion in human ensembles. Driven by a control architecture based on deep reinforcement learning, such an artificial agent will be able to autonomously move itself in order to synchronise its motion with that of the group while exhibiting human-like kinematic features. As a paradigmatic coordination task we take a group version of the so-called mirror-game which is highlighted as a good benchmark in the human movement literature. | cs.MA | cs |
Deep learning control of artificial avatars in group coordination tasks
Maria Lombardi1, Davide Liuzza2 and Mario di Bernardo3
Abstract -- In many joint-action scenarios, humans and robots
have to coordinate their movements to accomplish a given
shared task. Lifting an object together, sawing a wood log,
transferring objects from a point to another are all examples
where motor coordination between humans and machines is a
crucial requirement. While the dyadic coordination between a
human and a robot has been studied in previous investigations,
the multi-agent scenario in which a robot has to be integrated
into a human group still remains a less explored field of research.
In this paper we discuss how to synthesise an artificial agent
able to coordinate its motion in human ensembles. Driven by a
control architecture based on deep reinforcement learning, such
an artificial agent will be able to autonomously move itself in
order to synchronise its motion with that of the group while
exhibiting human-like kinematic features. As a paradigmatic
coordination task we take a group version of the so-called mirror-
game which is highlighted as a good benchmark in the human
movement literature.
I. INTRODUCTION
Interest in using robots and artificial avatars in joint tasks
with humans to reach a common goal is growing rapidly.
Indeed, it is possible to find numerous applications that span
from industrial
tasks to entertainment, from navigation to
orientation and so on, in which artificial agents are required
to interact cooperatively with people. Examples of human-
robot interaction include the problem of jointly handling an
object [1], sawing a log of wood [2], managing a common
work-piece in a production system [3], or performing a "pick
and place" coordination task [4]. While dyadic coordination
between humans and robots is the subject of much ongoing
research, the problem of having robots or avatars interacting
with a human team remains a seldom investigated field. This is
probably due to the complex mechanisms underlying interper-
sonal coordination, the different ways in which coordination
can emerge in human groups, and the potentially large amount
of data to be collected and processed in real-time.
From a control viewpoint, the emergence of multi-agent
synchronisation while performing a joint task is a phenomenon
characterised by non-linear dynamics in which an individual
has to predict what others are going to do and adjust his/her
movements in order to complement the movements of the
others in order to achieve precise and accurate temporal
correspondence [5].
In this context, an open question is to investigate whether it
is possible to influence the emergent group behaviour via the
introduction of artificial agents able be accepted in a natural
way by the group and help it achieving a collective control
goal. To reach such a goal, the artificial agent has to be able
to integrate its motion with that of the others exhibiting at the
same time typical human-like kinematic features. In this way,
the artificial agent can merge with the rest of the group and
enhance, rather disrupt, social attachment between its members
and group cohesiveness.
The problem is crucial in social robotics, where new ad-
vancements in human-robot
interaction can promote novel
diagnostic and rehabilitation strategies for patient suffering
from social and motor disorders [6].
In this work we define a "human-like" motion by using
the concept of "Individual Motor Signature" (IMS), proposed
in [7] as a valid biomarker able to capture the peculiarity of
the human motion. Specifically, the IMS has been defined in
terms of the probability density function (PDF) of the velocity
profiles characterising a specific joint task.
The aim of this paper is to present a control architecture
based on deep learning to drive an artificial agent able in
performing a joint task in a multi-agent scenario while ex-
hibiting a desired IMS. As a scenario of interest, we take a
multiplayer version of the mirror game proposed in [8] as
a paradigmatic task of interpersonal motor coordination. In
our version of the mirror game, first proposed in [7], a group
of players is asked to oscillate a finger sideways performing
some interesting motion and synchronising theirs with that of
the others (see [9] for further details).
The approach we follow is an extension to groups of the
strategy we presented in [10], [11], [12] in the case of dyadic
interactions. Specifically, in [12] we designed an autonomous
cyber player able to play dyadic leader-follower sessions of the
mirror game with different human players. Such a cyber player
was driven by a Q-learning algorithm aiming at exhibiting the
kinematic features of a target human player in order to emulate
hers/his way of moving when engaged in a dyadic interaction.
Extending the Q-learning approach to multi-agent systems is
cumbersome as the approach is unscalable with the growth of
the system state space due to the addition of other players. To
overcome this limitation, we use "deep reinforcement learn-
ing" [13], [14], [15], combining the reinforcement learning
strategy with the powerful generalization capabilities of neural
networks. To design the control architecture of the cyber
player, we collect motor measurements signals of four different
players involved in a joint oscillatory task and then train
the CP to mimic the way of moving of one of them. The
validation is done replacing the target player with the cyber
player and comparing the group performance in order to prove
the effectiveness of the proposed control approach.
II. PRELIMINARIES
A group of people interacting with each other can be de-
scribed as a complex network system in which each individual
is represented as a node (or agent) with its own dynamics
while the visual coupling with the other members of the
group as edges in a graph describing the network of their
interactions. The structure of the interconnections established
among the groups' members is formalised by the adjacency
matrix A := aij, in which the element aij = 1 only if the node
j is linked with the node i, or in other terms if the individual
j is visually coupled with the individual i.
Four different topologies are considered in this work as
shown in Fig. 1. As described in [9] these different topologies
can be implemented experimentally by changing the way in
which participants sit with respect to each other and by asking
them to wear appropriate goggles restricting their field-of-
view.
Fig. 1: Network topologies. (a) Complete graph. (b) Ring
graph. (c) Path graph. (d) Star graph.
(cid:80)N
Let θk (t) be the phase of the kth agent estimated by
taking the Hilbert transform of its position signal, say xk (t).
The cluster phase of N agents is defined as q(t)
:=
1
k=1 ejθk(t) , which represents the average phase of the
N
group at time t. The term φk (t) := θk(t)− q(t) is the relative
phase between the kth agent and the group phase at time t.
The level of coordination reached by a human group per-
forming an oscillatory task can be investigated by evaluating
the group synchronisation index ρg(t) introduced in [9], [16]
and defined as follows:
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∈ [0, 1] ,
(1)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) N(cid:88)
k=1
ρg(t) :=
1
N
ej(φk(t)− ¯φk)
where ¯φk is φk(t) averaged over time. Closer the synchroni-
sation index is to 1, higher is the level of synchronisation in
the group.
III. DEEP REINFORCEMENT LEARNING
APPROACH
A. Brief overview
Reinforcement learning is a machine learning technique in
which an agent tries to learn how to behave in an unknown
environment taking, in any situation, the best action that it can
perform. The problem is formalized by considering a set X
of all possible states in which the environment can be (state-
space), a set U of all possible actions that the agent can take
(action-space) and an auxiliary function, named action-value
function (or Q-function), that quantifies the expected return
(reward) starting from a specific state and taking a specific
action. Through the action-value function, the goal of the
learning agent is to iteratively refine its policy in order to
maximise the expected reward. Solving a problem with the
classical Q-learning approach [17] means to iteratively explore
all possible combinations between the set X and the set U in
order to evaluate them in terms of action-value functions in a
tabular form. As this is unfeasible in our group scenario, we
use the deep learning control approach shown in Fig. 2 where:
• the state space is x := [x, x, ¯x, ¯x] where [x, x] are
position and velocity of the CP, while [¯x, ¯x] are mean
position and mean velocity of the players connected to
the target players;
• the action space is made up of 9 different values of
acceleration in [−4, 4], empirically chosen looking at the
typical human accelerations while performing the same
joint tasks;
• the reward function is selected as ρ := − (x − xt)2 −
0.1 ( x − xt)2 − ηu2 where [xt, xt] are position and ve-
locity of the target player, while the constant parameter
η tunes the control effort. Maximising a reward function
so designed means to minimise the squared error both in
position and in velocity between the CP and the target
player;
• the policy π according to which the CP chooses the action
to take in a specific state is an -greedy policy [13].
Following that policy, the CP takes the best known action
with (1 − ) probability (exploitation), whereas with
probability it takes a random action (exploration). The
value follows a monotonic decreasing function, since
as time increases the exploration phase is replaced by
the exploitation phase.
In particular, we exploit the Deep Q-network (DQN) strat-
egy where an artificial neural network (ANN) is used to
approximate the optimal action-value function Q∗ defined as:
Q∗ (x, u) = max
π
(cid:34) ∞(cid:88)
m=0
E
(cid:35)
γmrk+m+1xk = x, u
,
(2)
which maximises the expected value of the sum of the rewards
r discounted by a positive factor γ < 1, obtained taking the
action u in the state x following the policy π at any time
instant k.
Training an ANN in order to approximate a desired function
(Q-function) means to find the vector of network weights θ
of the connections between the neurons, iteratively evaluated
by back-propagation algorithms in order to minimise a loss
function. The loss function is used to measure the error
between the actual and the predicted output of the neural
network (e.g. mean squared error) (see [18] for further details).
Contrary to what is done in traditional supervised learning
with ANN where the predicted output is well defined, in
the Deep Q-network approach the loss function is iteratively
changed because the predicted output itself depends on the
network parameters θk at every instant k. Namely, the loss
Fig. 2: Block scheme of the deep Q network algorithm. At each iteration, the RL controller chooses the control u according
to the current neural network and the system's state. The process evolves in a new state generating the reward r. The reward,
previous and current state are then used as a new sample to train the neural network.
(cid:34)(cid:32)
function is chosen as:
Lk (θk) = E
rk + γ max
uk+1
Q (xk+1, uk+1, θk−1)−
(cid:33)2(cid:35)
Q (xk, uk, θk)
,
(3)
which represents the mean squared error between the current
estimated Q function and the approximate optimal action-
value function.
It has been proved that an ANN with a single hidden
layer containing a large enough number of sigmoid units
can approximate any continuous function, while a second
layer is added to improve accuracy [19]. Relying on that, the
neural network we considered to approximate the action-value
function Q in (2) is designed as a feedforward network with
(Fig. 2):
• an input layer with 4 different nodes, one for each state
variable [x, x, ¯x, ¯x];
• two hidden layers, empirically found, made up of 64
and 32 nodes each implementing a sigmoidal activation
function;
• an output layer with 9 different nodes, one for each
action available in the set U. In the DQN, the network
output returns the estimated action-value qu for each
possible action u ∈ U in a single shot reducing in this
way the time needed for the training. Then, the action
corresponding to the maximum q-value (neuron's output)
is chosen as the next control input.
Reinforcement learning is known to be unstable or even
to diverge when a nonlinear function approximator, such
as an ANN, is used to estimate the Q-function [13], [14].
According to the existing literature, this instability is caused
by: (i) the presence of correlation in the sequence of observed
states and (ii) the presence of correlation between the current
estimated Q and the target network, resulting in the loss of the
Markov property. The correlation in the observation sequence
is removed by introducing the experience replay mechanism,
where the observed states used to train the ANN are not
taken sequentially but are sampled randomly from a circular
buffer. Also, the correlation between the current estimate of the
function Q and the target optimal one Q∗ is reduced updating
the latter at a slower rate.
B. CP Implementation
According to the reinforcement learning strategy with the
Deep Q-network described above, the CP refines its policy
according to the system states and the reward received so as
NN trainingProcessPolicyRewardrk+1=ρ(xk,uk,xk+1)xk+1rk+1z−1uk1234Hidden layer 1 x 64Hidden layer 2 x 32xkxk¯xk¯xkQk+1(θk+1)=g(Qk(θk),xk,uk,xk+1,rk+1)qu1k+1qu2k+1qu3k+1qu4k+1qu5k+1qu6k+1qu7k+1qu8k+1qu9k+1θ1,2kθ2,3kθ3,4kqkuk=π(qk,xk)qk+1:=!qu1k+1,qu2k+1,...,qu9k+1"Txk:=[xk,xk,¯xk,¯xk]to take the best action it can to mimic the target player(s).
To implement the DQN as a first step, a feedforward neural
network needs to be initialized with random values. The
experience replay mechanism is implemented instantiating an
empty circular buffer in order to store the system's state at
each iteration.
Then at each iteration we have (Fig. 2):
1) the CP observes the process's state xk at time instant
k and performs an action uk according to the policy π,
that is an -greedy policy;
2) the process evolves to a new state xk+1 and the CP
receives the reward rk+1 that measures how good taking
the action u in the state xk has been;
3) the new sample (cid:104)xk, uk, xk+1, rk+1(cid:105) is added to the
circular buffer and a random batch taken from it is
used to train the NN. The training is done through
the gradient descend back-propagation algorithm with
momentum [13] so as to tune the network's weights θ
in order to minimize the loss function (3). We denote
the network's weights between the layer n and n + 1 at
instant k as θn,n+1
.
k
The steps above are repeated until convergence is achieved
according to the "termination criterion":
(cid:107)RM ST P,¯x − RM SCP,¯x(cid:107) ≤
(4)
where RM Si,¯x is the root mean square error between the
position of the player i ∈ [T P, CP ] and the mean position
of the group, while is a non-negative parameter.
IV. TRAINING AND VALIDATION
A. Training
Ideally, data used to train the CP are extracted from real
human players playing the mirror game. In our case, due to
the lack of a large enough dataset, the data needed to feed
the CP during the training are generated synthetically making
artificial agents modelling human players perform sessions of
the mirror game against each other. We refer to these other
artificial agents as Virtual Players (VP) to distinguish them
from the CP since they are driven by a completely different
architecture which is not based on AI and was presented in
[10] and improved in [11]. The use of virtual players for
training AI based CPs was first proposed in [12] for dyadic
interaction and is applied here for the first time to the multi-
player version of the game.
Specifically, the motion of the virtual player used to generate
synthetic data is that of a controlled nonlinear HKB oscillator
[20] of the form:
x +(cid:0)αx2 + β x2 − γ(cid:1) x + ω2x = u,
(5)
where x, x and x are position, velocity and acceleration of the
VP end effector, respectively, α, β, γ are positive empirically
tuned damping parameters while ω is the oscillation frequency.
M(cid:88)
j=1
M(cid:88)
j=1
The control input u is chosen following an optimal control
strategy aiming at minimising the following cost function [21]:
min
u
J (tk) =
(cid:90) tk+1
tk
θv
2
θp
2
(cid:90) tk+1
(x (tk+1) − rp (tk+1))2 +
( x (τ ) − rσ (τ ))2 dτ +
θσ
2
( x (τ ) − rp (τ ))2 dτ +
tk
(cid:90) tk+1
η
2
tk
u (τ )2 dτ,
(6)
where rp, rp is the position and the velocity time series of
the partner player,
rσ is the reference signal modelling the
desired human motor signature, η tunes the control effort, tk
and tk+1 represent the current and the next optimization time
instant. θp, θs, θv are positive control parameters satisfying
the constraint θp + θs + θv = 1. By tuning appropriately
these parameters, it is possible to change the VP configuration
making it act as a leader, follower or joint improviser (more
details are in [10], [21]). In the case of a multi-player scenario,
rp and rp are taken as the mean value of the position and the
velocity of the target player's neighbours, that is:
rp :=
1
M
xj;
rp :=
1
M
xj,
(7)
where M is the number of neighbours and xj and xj are the
position and the velocity of the jth neighbour.
The reference signal rσ captures in some way the desired
human kinematic features that the VP has to exhibit during
the game. In [11] we developed a methodology based on the
theory of stochastic processes and observational learning to
generate human-like trajectories in real time. In particular,
a Markov Chain (MC) was derived to capture the peculiar
internal description model of the motion of a human player
simply observing him/her playing sessions of the mirror game
in isolation.
To train the CP to coordinate its movements in the group
like the virtual player target does, a group of 4 different virtual
players interconnected in a complete graph were used (Fig. 3).
In particular we selected four Markov models (one for each
player) of different human players which were parametrized in
[11]. Without loss of generality, VP 4 was taken as the target
player the Deep Learning driven CP has to mimic.
The parameters proposed for the control architecture of the
VPs were tuned experimentally as follows: α = 1, β = 2, γ =
−1, ω = 1 for the inner dynamics, θp = 0.8, θσ = 0.15, θv =
0.05, η = 10−4 and T = 0.03s for the control law. The
experience replay in the CP algorithm was implemented with a
buffer of 200, 000 elements, batches of 32 sampled states were
used to train the feedforward neural network at each iteration.
A target network updated every 150 time steps was considered
in the Q-function, with a discount factor γ = 0.95.
The training stage was carried out on a Desktop computer
having an Intel Core i7-6700 CPU, 16 GB of RAM and 64-
bit Windows operative system. It took 1, 500 trials of 500
observations each to converge (around 8.5 hours) according
to the criterion (4). In Fig. 4 the training curve is reported
graph, star graph (described in Sec. II) with node 3 as center.
For the sake of brevity, in Fig. 5 only the validation for the
complete and the path graph are reported. The performance of
the CP has been evaluated by comparing its behaviour with
that of the target virtual player it was trained to mimic. The
CP (in red) successfully tracks the mean position of the group
(dashed line in black) being able to mimic the target player it
has been trained to imitate (in blue) [panel (a)]. The relative
position error (RPE) defined as
(cid:0)¯x(t) − xV P/CP (t)(cid:1) sgn ( ¯x(t))
if sgn ( ¯x(t)) = sgn(cid:0)xV P/CP (t)(cid:1) (cid:54)= 0
(cid:12)(cid:12)¯x(t) − xV P/CP (t)(cid:12)(cid:12) ,
otherwise
RP E =
(8)
has been also evaluated between the VP target and the mean
position of the neighbours and compared with the relative
position error between the CP and the same mean position
[panel (c)]. Both the errors are very small and with comparable
mean values.
Similar considerations can be done for behaviour of the CP
when the group topology is a path graph as shown in panels
(b) and (d).
The key features of the motion of the CP and the VP it
has been trained upon are captured by the following metrics:
1) relative phase error defined as ∆Φ = Φ¯x − ΦCP/V P , 2)
the RMS error between the position of the CP (or VP) and
that of the group mean position, and 3) the time lag which
describes the amount of time shift that achieves the maximum
cross-covariance between the two position time series. This
can be interpreted as the average reaction time of the player
in the mirror game [9].
The metrics described above were evaluated performing 20
trials and reporting both the mean value and the standard
deviation for both the complete graph (Tab. Ia) and the path
graph (Tab. Ib). It is possible to notice that all indexes show
a remarkable degree of similarity between the motion of the
CP and that of the target VP.
TABLE I: Metrics are reported for 20 trials of the multiplayer
mirror game both in complete graph (a) and in path graph (b).
The relative phase, the RMS and the time lag are evaluated
between the mean of the neighbours with the CP (first column)
and with the VP target (second column).
Metric
Relative phase
RMS
Time lag
Metric
Relative phase
RMS
Time lag
CP
VP target
−0.1680 ± 0.0513 −0.0498 ± 0.0948
0.0556 ± 0.0037
0.0443 ± 0.0054
−0.1140 ± 0.0157 −0.0165 ± 0.0357
(a) Complete Graph
VP target
−0.2296 ± 0.0788 −0.1589 ± 0.0982
0.0597 ± 0.0035
0.0555 ± 0.0047
−0.1035 ± 0.0153 −0.0675 ± 0.0236
CP
(b) Path Graph
For further evidence, in Fig. 6 the group level synchro-
nization is reported for each tested topology. Despite the
Fig. 3: Architecture used to train the CP to mimic the target
player (ball in green). The group is simulated by 4 VPs playing
the mirror game in joint improvisation and driven by the
cognitive architecture based on optimal control and Markov
chains. The CP, driven by a deep reinforcement
learning
approach, receives in real time the data from the group and
learns how to interact in order to replace the player target.
Fig. 4: Training curve showing the convergence of the al-
gorithm. The root mean square error in position (y-axis) is
reported for each trial (x-axis) both for the VP (in blue) and
the CP (in red). ¯x represents the mean position of the target
player's neighbours.
showing for each trial the RMS between the VP and the
group (in blue), and between the CP and the group (in red).
Convergence is reached in about 1, 000 trials on.
B. Validation
To show that the CP is effectively able to emulate the VP
target when engaged in a group, training was carried out by
considering a group described by a complete graph, we then
validated the performance of the CP when interacting over
different topologies. Specifically we used the ring graph, path
Fig. 5: Position time series of group sessions. (a)-(b) The position trajectories of the VP target (in blue) and of the CP (in
red) are reported together with the mean position of the neighbours (in dashed back). (c)-(d) Relative position error evaluated
between the mean position and the position of the VP target (in blue) and the CP respectively. Two different topologies are
depicted: (a)-(c) the complete graph and (b)-(d) the path graph.
different topologies, the presence of the CP does not alter the
group dynamics when the CP is substituted to the VP it was
trained upon. We notice that the level of coordination varies
with the topology, confirming what found in [9]. Specifically,
in [9] as confirmed by Fig. 6, the complete and the star
graph were found to be associated with the highest level of
synchronization.
V. CONCLUSIONS
In this work we addressed the problem of synthesizing
an autonomous artificial agent able to coordinate its move-
ments and perform a joint motor task in a group setting.
In particular, a multiplayer version of the mirror game was
used as a paradigmatic task where different individuals have
to synchronize their oscillatory motion. To achieve our goal
and overcome the limitations of previous approaches, we
introduced a deep reinforcement learning control algorithm in
which a feedforward neural network is used to approximate
the nonlinear action-value function. The DQN allowed us to
overcome the limitations of the Q-learning approach presented
in [12] which is impractical when the state space becomes too
large, as in the case of multiplayer coordination tasks. The
effectiveness of the cyber player trained upon a target group
member was shown by comparing its performance when play-
ing in groups with different interconnection topologies. The
numerical validations show the effectiveness of our approach.
Ongoing work is being carried out to validate the behaviour of
the CP when interacting with a real group of people through
the experimental platform Chronos we presented in [22].
REFERENCES
[1] A. Edsinger and C. C. Kemp, "Human-Robot Interaction for Cooperative
Manipulation : Handing Objects to One Another," in IEEE International
Symposium on Robot and Human Interactive Communication, 2007, p.
e9825497.
[2] L. Peternel, T. Petric, E. Oztop, and J. Babic, "Teaching robots to
cooperate with humans in dynamic manipulation tasks based on multi-
modal human-in-the-loop approach," Autonomous Robots, vol. 36, no.
1-2, pp. 123 -- 136, 2014.
[3] M. Faber, J. Butzler, and C. M. Schlick, "Human-robot Cooperation in
Future Production Systems: Analysis of Requirements for Designing an
Ergonomic Work System," Procedia Manufacturing, vol. 3, pp. 510 -- 517,
2015.
[4] M. Lamb, T. Lorenz, S. J. Harrison, R. W. Kallen, A. Minai, and
M. J. Richardson, "PAPAc: A Pick and Place Agent Based on Human
Behavioral Dynamics," Proceedings of the 5th International Conference
on Human Agent Interaction - HAI '17, pp. 131 -- 141, 2017.
[5] C. Vesper, S. Butterfill, G. Knoblich, and N. Sebanz, "A minimal
architecture for joint action," Neural Networks, vol. 23, no. 8-9, pp.
998 -- 1003, 2010.
[6] I. Amado, L. Br´enugat-Hern´e, E. Orriols, C. Desombre, M. Dos Santos,
Z. Prost, M. O. Krebs, and P. Piolino, "A serious game to improve cog-
nitive functions in schizophrenia: A pilot study," Frontiers in Psychiatry,
vol. 7, pp. 1 -- 11, 2016.
(a)(b)Complete GraphPath Graph0102030405060-0.500.5Mean GroupVP target0102030405060-0.500.5Mean GroupCP0102030405060-0.500.5Mean GroupVP target0102030405060-0.500.5Mean GroupCP(c)(d)010203040506000.20.4010203040506000.20.4Cybernetics, vol. 48, no. 3, pp. 1018 -- 1029, 2018.
[11] M. Lombardi, D. Liuzza, and M. di Bernardo, "Generation and clas-
sification of individual behaviours for virtual players control in motor
coordination tasks," in European Control Conference (ECC), Limassol
(Cyprus), 2018, pp. 2374 -- 2379.
[12] -- -- , "Using learning to control artificial avatars in human motor
coordination tasks," pp. 1 -- 12, 2018.
[13] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction,
2nd ed. MIT press, 2018.
[14] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. Riedmiller, and A. K. Fidjeland, "Human-
level control through deep reinforcement learning," Nature Letter, vol.
518, pp. 529 -- 533, 2015.
[15] Y. Li, "Deep Reinforcement Learning," pp. 1 -- 150, 2018.
[16] M. J. Richardson, R. L. Garcia, T. D. Frank, M. Gergor, and K. L. Marsh,
"Measuring group synchrony: A cluster-phase method for analyzing
multivariate movement time-series," Frontiers in Physiology, vol. 3 OCT,
no. October, pp. 1 -- 10, 2012.
[17] C. J. C. H. Watkins and P. Dayan, "Q-learning," Machine Learning,
vol. 8, no. 3-4, pp. 279 -- 292, 1992.
[18] S. Russel and P. Norvig, Artificial Intelligence: A Modern Approach,
3rd ed. Prentice hall, 2003.
[19] G. Cybenko, "Approximation by superpositions of a sigmoidal function,"
Mathematics of Control, Signals and Systems, vol. 2, pp. 303 -- 314, 1989.
[20] H. Haken, J. A. S. Kelso, and H. Bunz, "A Theoretical Model of
Phase Transitions in Human Hand Movements," Biological Cybernetics,
vol. 51, pp. 347 -- 356, 1985.
[21] C. Zhai, F. Alderisio, P. Slowinski, K. Tsaneva-Atanasova, and
M. di Bernardo, "Design of a Virtual Player for Joint Improvisation with
Humans in the Mirror Game," PLoS ONE, vol. 11, no. 4, p. e0154361,
2016.
[22] F. Alderisio, M. Lombardi, G. Fiore, and M. di Bernardo, "A novel
computer-based set-up to study movement coordination in human en-
sembles," Frontiers in Psychology, vol. 8, p. 967, 2017.
Fig. 6: Histogram reporting the group synchronization level
reached by the group both with the VP target (blue bars) and
with the CP (red bars). Different topologies were implemented
during the validation: complete graph (CG), path graph (PG),
ring graph (RG) and star graph (SG) with player 3 as center
node.
[7] P. Słowi´nski, C. Zhai, F. Alderisio, R. Salesse, M. Gueugnon, L. Marin,
B. G. Bardy, M. di Bernardo, and K. Tsaneva-Atanasova, "Dynamic
similarity promotes interpersonal coordination in joint action," Journal
of The Royal Society Interface, vol. 13, no. 116, p. 20151093, 2016.
[8] L. Noy, E. Dekel, and U. Alon, "The mirror game as a paradigm for
studying the dynamics of two people improvising motion together,"
Proceedings of the National Academy of Sciences, vol. 108, no. 52,
pp. 20 947 -- 20 952, 2011.
[9] F. Alderisio, G. Fiore, R. N. Salesse, B. G. Bardy, and M. D. Bernardo,
"Interaction patterns and individual dynamics shape the way we move
in synchrony," Scientific Reports, vol. 7, no. 1, p. 6846, 2017.
[10] C. Zhai, F. Alderisio, P. Slowinski, K. Tsaneva-Atanasova, and M. Di
Bernardo, "Design and Validation of a Virtual Player for Studying
Interpersonal Coordination in the Mirror Game," IEEE Transactions on
00.10.20.30.40.50.60.70.80.91CPVP targetGroup SynchronizationCG PG RG SG |
1802.01207 | 2 | 1802 | 2018-12-28T17:34:19 | A Sharp Bound on the $s$-Energy and Its Applications to Averaging Systems | [
"cs.MA",
"math.OC"
] | The {\em $s$-energy} is a generating function of wide applicability in network-based dynamics. We derive an (essentially) optimal bound of $(3/\rho s)^{n-1}$ on the $s$-energy of an $n$-agent symmetric averaging system, for any positive real $s\leq 1$, where~$\rho$ is a lower bound on the nonzero weights. This is done by introducing the new dynamics of {\em twist systems}. We show how to use the new bound on the $s$-energy to tighten the convergence rate of systems in opinion dynamics, flocking, and synchronization. | cs.MA | cs |
A Sharp Bound on the s-Energy and Its Applications to
Averaging Systems ∗
Bernard Chazelle †
Abstract
The s-energy is a generating function of wide applicability in network-based dynam-
ics. We derive an (essentially) optimal bound of (3/ρs)n−1 on the s-energy of an n-agent
symmetric averaging system, for any positive real s ≤ 1, where ρ is a lower bound on the
nonzero weights. This is done by introducing the new dynamics of twist systems. We show
how to use the new bound on the s-energy to tighten the convergence rates of systems in
opinion dynamics, flocking, and synchronization.
1 Introduction
Averaging dynamics over time-varying networks is a process commonly observed in many well-
studied multiagent systems. It has been used to model swarming, polarization, synchronization,
gossip processes, and consensus formation in distributed systems [1, 8, 9]. Because of a dearth
of general convergence techniques, results in the area often rely on network connectivity as-
sumptions. The s-energy is a powerful analytical tool that allows us to overcome these restric-
tions [3]. It provides a global parametrized measure of the "footprint" of the system over an
infinite horizon. This stands in sharp contrast with the local arguments (spectral or Lyapunov-
based) typically used to prove fixed-point attraction.
The main result of this paper is an optimal bound on the s-energy of symmetric averaging
systems. The new bound is used to tighten the convergence rates of various multiagent systems
in opinion dynamics, flocking, and self-synchronization of coupled oscillators [1,3,7,10,11,13 --
15, 17, 19 -- 21].
∗The Research was sponsored by the Army Research Office and the Defense Advanced Research Projects Agency
and was accomplished under Grant Number W911NF-17-1-0078. The views and conclusions contained in this
document are those of the authors and should not be interpreted as representing the official policies, either expressed
or implied, of the Army Research Office, the Defense Advanced Research Projects Agency, or the U.S. Government.
The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding
any copyright notation herein.
†Department of Computer Science, Princeton University, [email protected]
1
Before moving to the technical discussion, we illustrate the role of the s-energy with a toy
system. Fix ρ ∈ (0, 1/2] and place n agents at x1, . . . , xn in [0, 1]. Given any ε > 0, for any
integer t > 0, pick two agents i, j such that x j − xi ≥ ε (if any) and move them anywhere in the
interval [xi + δ, x j − δ], where δ = ρ(x j − xi). Repeat this process as long as possible. Note the
high nondeterminism of the dynamics: not only can we choose the pair of agents at each step,
but we can move them anywhere we please within the specified interval. Despite this freedom,
(cid:1)n−1 steps, for any small enough ε > 0, and the
the process always terminates in O(cid:0) 1
ρn log 1
ε
bound is tight.1 This result is a direct consequence of our new bound on the s-energy. The proof
relies on a reduction to twist systems, a new type of multiagent dynamics that we define in the
next section.
t=1 be an infinite sequence of graphs over a fixed vertex set {1, . . . , n}.
The s-energy. Let (gt)∞
Each gt is embedded in [0, 1], meaning that its vertices (the "agents") are represented by n real
numbers between 0 and 1. Let µ1, . . . , µk denote the lengths of the intervals formed by the union
k, for real or complex s.2 The s-energy E(s)
of the embedded edges of gt, and put (cid:96)t = µs
1
t>0 (cid:96)t. Because the s-energy follows an obvious
of the system is defined as the infinite sum(cid:80)
+··· + µs
scaling law, we note that embedding the graphs in the unit interval is not restrictive.
Averaging systems.
In a (symmetric) averaging system, gt is undirected and supplied with
self-loops at the vertices. To simplify the notation, we fix t ∈ Z+ and denote by xi and yi the
positions of vertex i at times t and t + 1, respectively. Vertices are labeled so that x1 ≤ ··· ≤ xn.
For each i ∈ {1, . . . , n}, write r(i) = max{ j (i, j) ∈ gt} and l(i) = min{ j (i, j) ∈ gt}.3 Fix
ρ ∈ (0, 1/2]. The move of vertex i from xi to yi is subject to
xl(i) + δi ≤ yi ≤ xr(i) − δi,
(1)
where δi = ρ(xr(i) − xl(i)).
In other words, vertex i can move anywhere within the interval
covered by its incident edges, but not too close to the endpoints. If ρ = 0, convergence is clearly
impossible to ensure since i can easily oscillate periodically between two fixed vertices. We
emphasize the high nondeterminism of the process: gt is arbitrary and so is the motion of i
within its allotted interval.
The results. Although the 0-energy is typically unbounded, it may come as a surprise that
E(s) is always finite for any s > 0 [3]. In particular, the case s = 1 shows that it takes only a
finite amount of ink to draw the infinite sequence of graphs gt. We state the main result of this
article,4 and prove it in §3:
Theorem 1.1. The s-energy satisfies E(s) ≤ (3/ρs)n−1, for any 0 < ρ ≤ 1/2 and 0 < s ≤ 1.
then the union of the edges forms the three intervals [0, 0.3], [0.5, 0.5], [0.7, 0.9] and (cid:96)t = (0.3)s + (0.2)s.
1All logarithms are to the base 2.
2For example, if gt consists of three edges embedded as [0, 0.2], [0.1, 0.3], [0.7, 0.9], and one self-loop at 0.5,
3Because gt is undirected and has self-loops, l(i) ≤ i ≤ r(i), (l ◦ r)(i) ≤ i ≤ (r ◦ l)(i). The notation l, r should not
4We actually prove the slightly stronger bound of 2(2/ρs)n−1 for n > 2.
obscure the fact that both functions can be chosen differently for each graph gt and its embedding (xi)n
i=1.
2
We prove in §5.A that the bound O(1/ρs)n−1 is optimal for s = O(cid:0)1/ log 1
(cid:1) and ρ ≤ 1/3.
These are the conditions we encounter in practice, which is why we are able to provide tight
bounds for all the applications discussed in this work. For s = 1, a quasi-optimal lower
bound of Ω(1/ρ)(cid:98)n/2(cid:99) is already known [3]. Theorem 1.1 lowers the previous upper bound of
(1/s)n−1(1/ρ)n2+O(1) [3].
ρ
The s-energy helps us bound the convergence rates of averaging network systems in full
generality. To our knowledge, no other current technique can prove these results. The power
of the s-energy is that it makes no connectivity requirements about the underlying dynamic
networks. We use it typically to bound the communication count Cε, which is defined as the
maximum number of steps t such that gt has at least one edge of length ε > 0 or higher. From
the inequality Cε ≤ ε−sE(s), setting s = 1/ log 1
Theorem 1.2. The communication count satisfies Cε = O
and Cε = O
for any 2−n ≤ ε ≤ 1/2,
ε in Theorem 1.1 yields:
for 0 < ε < 2−n.
ε and s = n/ log 1
(cid:17)n−1
(cid:17)n−1
(cid:16) 1
ρ log 1
ε
(cid:16) 1
ρn log 1
ε
This lowers the previous upper bound of (1/ρ)n2+O(1)(log 1/ε)n−1 [3]. We prove in §5.B that
the new bound is optimal for any positive ε ≤ ρ2n and ρ ≤ 1/3. We close this introduction with
a few remarks about the results and their context:
1. The results extend to a large family of asymmetric averaging systems.
Indeed, Theo-
rems 1.1 and 1.2 hold for any infinite sequence of cut-balanced digraphs gt: recall that
a directed graph is said to be cut-balanced if its weakly connected components are also
strongly connected.
tinctive feature of time-varying network-based dynamics. Markov chains, for example,
have convergence rates proportional to log 1/ε.
2. The polylogarithmic factor(cid:0)log 1/ε(cid:1)n−1 in the convergence rate of Theorem 1.2 is a dis-
introduced the total s-energy as(cid:80)
3. Our definition of the s-energy differs slightly from the original formulation [3], which
(i, j)∈gt di j(t)s, where di j(t) is the distance between
, our bounds
the vertices i, j in the embedding of gt. Up to a correction factor of at most
apply to the total s-energy as well.
(cid:16)n
(cid:17)
(cid:80)
t>0
2
4. As noted in [6], the s-energy can be interpreted as a generalized Dirichlet series or, al-
ternatively, as a partition function with s as the inverse temperature. Both interpretations
have their own benefits, such as highlighting the lossless encoding properties of the s-
energy or the usefulness of Legendre-transform arguments with the relevant thermody-
namical quantities.
2 Twist Systems
We reduce averaging systems to a simpler kind of dynamics where agents keep the same order-
ing at all time. In a twist system, n points move within [0, 1] at discrete time steps. As before,
we fix t ∈ Z+ and describe the motion of each point xi at time t to its next position yi at time t +1.
3
Unlike the averaging kind, twist systems preserve order; that is, assuming that x1 ≤ ··· ≤ xn,
then y1 ≤ ··· ≤ yn. To describe the motion from t to t + 1, we choose two integers 1 ≤ u < v ≤ n
and, for any i (u ≤ i ≤ v), we define the twist of xi as the interval within [xu, xv] defined by
τi =(cid:2)xu + ρ(xmin{i+1,v} − xu), xv − ρ(xv − xmax{i−1,u})(cid:3).
(2)
Fixing ρ ∈ (0, 1/2] ensures that all the twists are well-defined.5 The only constraints on the
dynamics are: (i) y1 ≤ ··· ≤ yn; and (ii) yi ∈ τi for any u ≤ i ≤ v, and yi = xi otherwise.
Figure 1: The interval τi extends from a distance ρ(xi+1 − xu) to the right of xu to a distance ρ(xv − xi−1)
to the left of xv: it thus twists [xi−1, xi+1] into the allowed interval for yi.
Observe that conditions (i,ii) are always feasible: for example, we can choose yi to be the
leftmost point in τi; of course, there is no need to do so and the expressive power of twist systems
comes from the freedom they offer. Like their averaging counterparts, such systems are highly
nondeterministic: at each step t, both the choice of u, v and the motion of the points are entirely
arbitrary within the constraints (i,ii). Writing (cid:96)t = (xv − xu)s, we define the s-energy of the twist
system as E(s) =(cid:80)
t>0 (cid:96)t. The next result justifies the introduction of twist systems.
Theorem 2.1. Any averaging system can be viewed as a twist system with the same parameter
ρ and the same s-energy.
Proof. Referring to our previous notation, recall that µ1, . . . , µk denote the lengths of the intervals
I j formed by the union of the edge embeddings of gt. We subdivide the time interval from t to
t + 1 into k time windows and, for j = 1, . . . , k, we process the motion within I j during the j-th
window while keeping the other vertices fixed. All windows are treated similarly, so it suffices
to explain the case k = 1. Let xi (resp. x(cid:48)
i) be the position of vertex i at time t (resp. t + 1) and
let y1 ≤ ··· ≤ yn be the sequence of x(cid:48)
i sorted in nondecreasing order.6 Let xu, . . . , xv denote the
positions within I1; we may assume that u < v. The other vertices are kept fixed, so we have
yi = xi for i < u or i > v. To show that the transition from xi to yi meets the conditions of a
5Indeed, we can check that τi = [a, b], where a ≤ b. The terminology refers to the "twisting" of the interval
6We break ties by using the index i. Note that the yi's are sorted, so they are not the same as those used in the
[xi−1, xi+1] around xi into the interval τi around yi.
definition of averaging systems given above.
4
x1τiyixuxixvxnyuyvyny1twist system, we need to prove that yi ∈ τi for any i between u and v. By the symmetry of (2), it
suffices to show that, for u ≤ i ≤ v,
yi ≤ xv − ρ(xv − xmax{i−1,u}).
(3)
Assume that u < i ≤ v and let ¯x j be shorthand for ρx j +(1−ρ)xv. The entire interval I1 is covered
by edges of gt, so there must be at least one edge (a, b) that covers [xi−1, xi], ie, b < i ≤ a. By (1),
a ≤ ¯xi−1. It also follows from (1)
a ≤ ρxl(a) + (1− ρ)xr(a), with l(a) ≤ b < i and r(a) ≤ v; hence x(cid:48)
x(cid:48)
j ≤ ρxl( j) + (1 − ρ)xr( j) ≤ ¯xi−1 for any j (u ≤ j < i); also
and the presence of self-loops that x(cid:48)
= x j ≤ ¯xi−1 for j < u. Putting it all together, this proves the existence of at least i indices
x(cid:48)
l ≤ ¯xi−1. It follows that yi ≤ ¯xi−1; hence (3) for u < i ≤ v. To complete the
l ≤ v such that x(cid:48)
proof of (3), we note that the case i = u follows from yu ≤ yu+1. The case k > 1 is handled by
repeating the previous analysis for each interval I j. The s-energy contributed by one step of the
(cid:3)
averaging system matches the energetic contribution of the k substeps of the twist system.
j
3 Bounding the s-Energy
The proof of Theorem 1.1 is unusual in the context of dynamics because it is algorithmic: it
consists of a set of trading rules that allows money to be injected into the system and exchanged
among the vertices to meet their needs. As the transactions take place, money is spent to pay for
the s-energy expended along the way. If all of the energy can be accounted for in this manner,
then the amount of money injected in the system is an upper bound on E(s). In our earlier
work [3], we were able to pursue this approach only for the case s = 1. We show here how to
extend it to all s ∈ (0, 1]. The idea was to supply each vertex with its own credit account and
then let them trade credits to pay for the s-energy incrementally. This strategy does not work
here because of its inability to cope with all the scales present in the system.7 The remedy is
to supply each pair of vertices with their own account. Only then are we able to accommodate
all scales at once. By appealing to Theorem 2.1, we may substitute twist systems for averaging
systems. We focus the analysis on the transition at time t from x1 ≤ ··· ≤ xn to y1 ≤ ··· ≤ yn.
Our only assumption is that, for some u, v (1 ≤ u < v ≤ n), we have yi ∈ τi for any u ≤ i ≤ v,
and yi = xi otherwise.
For each pair (i, j) such that 1 ≤ i < j ≤ n, we maintain an account Bi, j consisting of
(x j − xi)sA j−i credits, where A:= 2/ρs and one credit is used to pay for a single unit of s-energy.
(Amounts paid need not be integers.) We show that updating each Bi, j at time t to B(cid:48)
i, j at time
t + 1 leaves us with enough unused money to pay for the s-energy (xv − xu)s released at that
step.8 No new money is needed past the initial injection at time 1, so the s-energy is at most the
7We illustrate the difficulty with a simple example. Set n = 3 and assign xs
i Ai credits to the account for vertex
i = 1, 2, 3. Initialize the system with x1 = 0, x2 = 1 − ε, and x3 = 1; set ρ = 1/2, with g1 consisting of the single
edge (2, 3). Assume now that y1 = 0 and y2 = y3 = 1 − ε/2. The account for vertex 3, the only one to release money,
gives out only (1 − (1 − ε/2)s)A3 ≈ 1
2 sεA3 credits. If s < 1 and ε > 0 is very small, this is not enough to cover the
s-energy of εs needed for the first step. The problem is that the credit accounts do not operate at all scales.
8We refer to Bi, j as both the account for (i, j) and its value.
5
i< j A j−i <(cid:0) A
A−1
For n = 2, E(s) ≤ A, hence Theorem 1.1. We begin with a few words of intuition:
sum of all the Bi, j's at the beginning: E(s) ≤(cid:80)
(cid:1)2An−1 < 2(2/ρs)n−1, for n > 2.
i, j by considering the pairs (i, j) in descending order of j − i, starting
with (1, n). In general, the update for (i, j) will rely on money released by the pairs (i−1, j)
and (i, j + 1), whose accounts will have already been updated. In turn, the pair (i, j) will
then be expected to provide money to both (i, j − 1) and (i + 1, j): the donation will be
made in two equal amounts.
• We update Bi, j to B(cid:48)
• How much money should (i, j) receive from its donors. For the sake of this informal
discussion, let us focus on the case u ≤ i < j ≤ v. The account Bi, j should receive enough
to grow to (xv − xu)sA j−i. This typically exceeds its balance of (x j − xi)sA j−i at time t, so
an infusion of money is required. Of course, the amount actually needed for B(cid:48)
i, j is only
passed on to (i, j − 1) and (i + 1, j).
(y j − yi)sA j−i, so this in turn frees(cid:0)(xv − xu)s − (y j − yi)s(cid:1)A j−i ≥ 0, which can be then
• We pay for the energetic contribution at time t by spending the leftover money from the
update for (u, u + 1), which we show to be at least (xv − xu)s, as required.
Figure 2: Updating B1,4 to its new value of B(cid:48)
the pairs (1, 3) and (2, 4). With this scheme in place, updating B2,3 to B(cid:48)
1
2(D1,3 + D2,4) credits.
1,4 releases D1,4 credits, which are passed on evenly to
2,3 can make use of C2,3 =
Proof of Theorem 1.1. We update Bi, j by using Ci, j credits supplied by the accounts Bi−1, j and
Bi, j+1. We show how this produces a leftover Di, j, which can then be donated to (i + 1, j) and
(i, j − 1) in equal amounts. Here are the details: for all 1 ≤ i < j ≤ n in descending order of
j − i = n − 1, . . . , 1, apply the following assignments (Fig.2):
Ci, j ← 1
2(Di−1, j + Di, j+1)
Di, j ← Bi, j + Ci, j − B(cid:48)
i, j,
6
(4)
B1,4→′B1,4B1,3→′B1,3B2,4→′B2,4B1,2→′B1,2B2,3→′B2,3B3,4→′B3,412D1,412D1,412D1,312D1,312D2,412D2,4 Bi, j + Ci, j ≥ (xv( j) − xu(i))sA j−i
i, j
where Bi, j = (x j − xi)sA j−i, B(cid:48)
= (y j − yi)sA j−i, and Di, j = 0 if i < 1 or j > n. The assign-
ments denote transfers of money. This explains the factor of 1/2, which keeps the money pool
conserved: for example, one half of Di, j goes to (i, j − 1) and the other half to (i + 1, j). The
soundness of the trading scheme rests entirely on the claimed nonnegativity of all the donations
Di, j. For any i ∈ {1, . . . , n}, define u(i) = u and v(i) = v if u ≤ i ≤ v; and set u(i) = v(i) = i
otherwise. We prove by induction on j − i > 0 that, for 1 ≤ i < j ≤ n,
(5)
(6)
The next inequality, which follows from dzs/dz ≥ s for s, z ∈ (0, 1], will prove useful in estab-
lishing (5, 6):
Di, j ≥ 0.
1 − (1 − x)s ≥ sx for any s, x ∈ [0, 1].
(7)
• Case u ≤ i < j ≤ v. By affine invariance, we can always assume that xu = xv − 1 = 0. We
begin with the case u < i < j ≤ v and observe that v( j) = v and u(i − 1) = u(i) = u. Because
yi−1 ∈ τi−1, we have yi−1 ≥ ρxi. Using (7), we find that
i−1, j ≥(cid:0)(xv( j) − xu(i−1))s − (y j − yi−1)s(cid:1)A j+1−i
2 ρs(cid:0)1−(x j− xi)(cid:1)A j+1−i ≥(cid:0)1−(x j− xi)s(cid:1)A j−i; therefore,
(8)
If i = u, we have xi = 0, hence (8) merely expresses nonnegativity, which holds inductively.
We conclude that (8) obtains for any u ≤ i < j ≤ v. Likewise, by symmetry, Di, j+1 ≥ ρs(1 −
x j)A j+1−i. It follows from (4) that Ci, j ≥ 1
Bi, j + Ci, j ≥ (x j − xi)sA j−i +(cid:0)1 − (x j − xi)s(cid:1)A j−i = A j−i = (xv( j) − xu(i))sA j−i,
Di−1, j = Bi−1, j + Ci−1, j − B(cid:48)
≥(cid:0)1 − (1 − ρxi)s(cid:1)A j+1−i ≥ ρsxiA j+1−i.
which establishes (5). Since xu(i) = xu ≤ yi ≤ y j ≤ xv = xv( j), this also proves that
Di, j = Bi, j + Ci, j − B(cid:48)
i, j ≥ A j−i − (y j − yi)sA j−i ≥ 0;
hence (6).
• Case i < u ≤ j ≤ v. This time, we set xi = 0 and xv = 1 and note that u(i) = i and v( j) = v.
We begin with the case j < v, which implies that v( j + 1) = v. Using (4, 5), yi = xi, y j+1 ∈ τ j+1,
and (7) in this order, we find that
Di, j+1 = Bi, j+1 + Ci, j+1 − B(cid:48)
i, j+1 ≥(cid:0)(xv( j+1) − xu(i))s − (y j+1 − xi)s(cid:1)A j+1−i
≥(cid:0)1 − (1 − ρ(1 − x j))s(cid:1)A j+1−i ≥ ρs(1 − x j)A j+1−i ≥ (1 − x j)A j−i.
+ (1 − x j)(cid:1)A j−i ≥ A j−i = (xv( j) − xu(i))sA j−i;
2 Di, j+1 ≥(cid:0)xs
j
Bi, j + Ci, j ≥ Bi, j + 1
Again, by induction, Di−1, j ≥ 0; therefore, by (4),
(9)
hence (5). For the case j = v, again note that the lower bounds on Di−1, j and Di, j+1 we just used
still hold, and thus so does (5) for all i < u ≤ j ≤ v. Finally, y j ≤ xv; hence xu(i) = xi = yi ≤ y j ≤
xv = xv( j), and (6) follows from (4, 5).
7
The case u ≤ i ≤ v < j is the mirror image of the last one while the remaining three cases are
trivial and require no account updates. We pay for the s-energy contribution at time t by tapping
into Du,u+1, which is unused. For this to work, it suffices to show that Du,u+1 ≥ (xv − xu)s. We
have yi ∈ τi (i = u, u + 1); hence
yu+1 − yu ≤ xv − ρ(xv − xu) − (xu + ρ(xu+1 − xu))
≤ ρ(xu − xu+1) + (1 − ρ)(xv − xu) ≤ (1 − ρ)(xv − xu).
Thus, it follows from (4, 5, 7), together with u(u) = u and v(u + 1) = v, that
Du,u+1 = Bu,u+1 + Cu,u+1 − B(cid:48)
≥(cid:0)1 − (1 − ρ)s(cid:1)A(xv − xu)s ≥ ρsA(xv − xu)s ≥ (xv − xu)s.
u,u+1 ≥ A(xv(u+1) − xu(u))s − A(yu+1 − yu)s
This completes the proof of Theorem 1.1 for twist systems. By Theorem 2.1, this also implies
(cid:3)
the same upper bound for averaging systems.
4 Applications
A number of known convergence rates for various averaging systems can be sharpened by ap-
pealing to Theorems 1.1 and 1.2. We give a few examples below.
4.1 Asymmetric averaging systems
Symmetric averaging systems have been widely used to model backward products of the form
(At ··· A1x)t>0, where each Ak is a type-symmetric stochastic matrix with positive diagonal and
nonzero entries at least ρ > 0 [2, 8, 11, 13, 15, 17].9 In other words, Ak is the matrix of a lazy
random walk in an undirected graph gk with a lower bound of ρ on the nonzero probabilities.
A close examination of the proof of Theorem 2.1 shows that the graphs gt may be directed
as long as the vertices still have self-loops, and, for each i = u + 1, . . . , v, there exist edges
"hovering" over i from both sides, ie, (a, b) and (b(cid:48), a(cid:48)), with a, a(cid:48) < i ≤ b, b(cid:48). We note that this
property holds if each directed graph gt is cut-balanced.10 This gives us a strict generalization of
Theorems 1.1 and 1.2 for asymmetric averaging systems whose sequences of digraphs are cut-
balanced. This goes beyond the convergence of these systems, which was established in [12].
4.2 Opinion dynamics
There has been considerable attention given to consensus formation in social dynamics [8 -- 10].
Given a set of agents in high-dimensional space, where coordinates model opinions, one imag-
ines that at each step a subset of them come into contact and, through a process of deliberation,
adjust their opinions toward agreement. Will such a process converge to consensus, polarization,
a mixture of both, or not at all? Mathematically, the agents are represented by their position in
9A matrix A is type-symmetrix if Ai j and A ji are both positive or both 0 for all i, j.
10A directed graph is cut-balanced if its weakly connected components are strongly connected.
8
d-dimensional space: x1, . . . , xn in [0, 1]d. We fix 0 < α ≤ 1 and iterate on the following process
forever: (1) choose an arbitrary nonempty subset of the agents and move them anywhere inside
the box (1 − α)B + αc, where B is the smallest (axis-parallel) box enclosing the chosen agents
and c is the center of B; (2) repeat. Intuitively, one "squeezes" the subset of agents together a
little.
Theorem 4.1. For any positive ε ≤ 2−dn, at all but O(cid:0) 1
(cid:1)n−1 time steps, the smallest box
dαn log 1
ε
enclosing the chosen agents has volume less than ε.
Proof. We set up a symmetric averaging system as follows: gt consists of n self-loops, together
with the complete graph joining the agents of the chosen subset; along each axis, the dynamics
obeys (1) with parameter ρ = α/2. Let (cid:96)t( j) be the length of the graph's projection onto the j-th
t>0 (cid:96)t( j)r ≤ (6/αr)n−1. Let Vt be the
volume of the smallest box enclosing the agents picked at time t. By the generalized Holder's
axis. By Theorem 1.1, we know that, for any 0 < r ≤ 1,(cid:80)
inequality, for 0 < s ≤ 1/d,(cid:88)
(cid:96)t( j)ds(cid:17)1/d ≤ (6/dαs)n−1.
(cid:96)t( j)s ≤ d(cid:89)
(cid:16)(cid:88)
d(cid:89)
(cid:88)
V s
t =
t>0
t>0
j=1
j=1
t>0
Set s = n/ log 1
ε and use Markov's inequality to complete the proof.
(cid:3)
4.3 Flocking
Many models of bird flocking have been developed over the years and used to great effect in CGI
for film and animation. Their mathematical analysis has lagged behind, however. In a simple,
popular model tracing its roots back to Cucker & Smale, Vicsek, and ultimately Reynolds, a
group of n birds is represented by two n-by-3 matrices x(t) and v(t), where the i-th rows encode
the location and velocity in R3 of the i-th bird, respectively [7, 13, 21]. The dynamics obeys the
relations
x(t) = x(t − 1) + v(t)
v(t + 1) = P(t) x(t),
where P(t) is an n-by-n stochastic matrix whose entry (i, j) is positive if and only if birds i
and j are within a fixed distance R of each other. All entries are rationals over O(log n) bits. A
tight bound on the convergence of the dynamical system was established in [4, 5]: it was shown
that steady state is always reached within a number of steps equal to a tower-of-twos of height
proportional to log n; even more amazing, this bound is optimal. The lead-up to steady-state
consists of two phases: fragmentation and aggregation. The latter can feature only the merging
of flocks while the (much shorter) fragmentation phase can witness the repeated formation and
breakup of flocks. Technically, a flock is defined as the birds in a given connected component of
the network joining any two birds within distance R. It has been shown that the total number of
network switches (ie, the number of steps where the communication network changes) is nO(n2).
We improve this bound to nO(n) by using the s-energy. It was demonstrated in [4] (page 21:7)
9
that the number of network switches is bounded by the communication count Cε, for ε ≥ n−bn2,
ρ ≥ n−c and constant b, c > 0. Our claim follows from Theorem 1.2.
(cid:3)
4.4 Self-synchronizing oscillators
The self-organized synchronization of coupled oscillators is a well-known phenomenon in physics
and biology: it is observed in circadian neurons, firing fireflies, yeast cell suspensions, cardiac
pacemaker cells, power plant grids, and even musical composition (eg, Ligeti's po`eme sym-
phonique). In the discrete Kuramoto model studied in [16 -- 18], all oscillators share the same
natural frequency and the phase of the i-th one obeys the recurrence:
θi(t + 1) = θi(t) +
K∆T
ni(t)
sin(cid:0)θ j(t) − θi(t)(cid:1),
(cid:88)
j∈ni(t)
where ni(t) is the set of vertices adjacent to i in gt (which includes i). Following [17], we assume
that all n phases start in the same open half-circle, which we can express as α−π/2 ≤ θi(0) ≤ π/2,
for some arbitrarily small positive constant α. We find that sin(θ j(0)− θi(0)) = ai j
where cα ≤ ai j ≤ 1, for constant c > 0. This condition holds for all t since averaging keeps
the phases in the same open half-circle. The dynamics is that of a symmetric averaging system
provided that we pick ρ small enough so that bρn/α ≤ K∆T ≤ 1, for a suitable constant b > 0.
By Theorem 1.2, for any ε ≤ 2−n, the number of steps where two oscillators are joined by an
edge while their phases are off by ε or more is O(cid:0)
(cid:1)n−1.
(cid:0)θ j(0)− θi(0)(cid:1),
1
αK∆T log 1
ε
5 The Lower Bound Proofs
(cid:1)
and ρ ≤ 1/3. A lower bound construction from [3] (page 1703) describes a system whose
n-agent s-energy satisfies the recurrence En ≥ ρsEn−1 + (1 − 2ρ)sEn + 1 for n > 1; hence,
for positive constant b, E2 ≥ b/ρs and En ≥ (bρs−1/s)En−1 for n > 2. This shows that
(cid:3)
A. We prove that the bound O(1/ρs)n−1 from Theorem 1.1 is optimal for s = O(cid:0)1/ log 1
En ≥ (b/ρs)n−1ρs(n−2) = Ω(1/ρs)n−1, for s = O(cid:0)1/ log 1
(cid:1), as claimed.
ρ
ρ
ε
ρn log 1
, for any positive ε ≤ ρ2n and ρ ≤ 1/3. Note that ρ must
B. We prove that Cε = Ω
be bounded away from 1/2 (we choose 1/3 for convenience): indeed, in the case of two vertices
at distance 1 joined by an edge, we have the trivial bound Cε = 1 for ρ = 1/2. The proof revisits
an earlier construction [3] and modify its analysis to fit our purposes. If n > 1, the n vertices
of g1 are positioned at 0, except for xn = 1. Besides the self-loops, the graph g1 has the single
edge (n − 1, n). At time 2, the vertices are all at 0 except for xn−1 = ρ and xn = 1 − ρ. The first
n − 1 vertices form a system that stays in place if n = 2 and, otherwise, proceeds recursively
within [0, ρ] until it converges to the fixed point ρ/(n− 1): this value is derived from the fact that
each step keeps the mass center invariant. After convergence11 of the vertices labeled 1 through
(cid:16) 1
(cid:17)n−1
11We can use a limiting argument to break out of the infinite loop.
10
C(n, ε) ≥ 1 + C
n − 1,
ε
ρ
+ C
n,
1 − ρn/(n − 1)
.
ε
(cid:18)
(cid:18)
(cid:19)
(cid:18)
(cid:19)
(cid:19)
(10)
(11)
(cid:25)
.
(cid:24)(log ε)/n − log ρ
2 log(1 − 2ρ)
n− 1, the n-vertex system repeats the previous construction within [ρ/(n− 1), 1− ρ]. Let C(n, ε)
denote the communication count for n agents: we have C(n, ε) = 0 if n = 1 or ε > 1; else
By expanding the recurrence and using monotonicity,
C(n, ε) ≥ k + k C
n − 1,
ε
ρ(1 − 2ρ)k−1
,
for k =
Assume now that ε ≤ ρ2n. From our choice of k, we easily verify that
The recurrence (11) requires that ε/(cid:0)ρ(1 − 2ρ)k−1(cid:1) < 1, which follows from (12). Since ε1/2n ≤
ρ(1 − 2ρ)k−1 ≥ ε1/n .
(12)
ρn log 1
ε, for constant b > 0. It follows that C(2, ε) = Ω( 1
ρ log 1
ε) and, for
ρ ≤ 1/3, we have k ≥ b
n > 2, by (12),
C(n, ε) ≥(cid:18) b
(cid:17)n−1
ρn
(cid:16) 1
(cid:19)
1
ε
log
C
(cid:16)
n − 1, ε1−1/n(cid:17)
.
We verify that the condition ε ≤ ρ2n holds recursively: ε1−1/n ≤ ρ2(n−1). By induction, it follows
that C(n, ε) ≥ Ω
(cid:3)
, as desired.
ρn log 1
ε
References
[1] Bullo, F., Cort´es, J., Martinez, S., Distributed Control of Robotic Networks, Applied Mathematics
Series, Princeton University Press, 2009.
[2] Cao, M., Spielman, D.A. Morse, A.S. A lower bound on convergence of a distributed network
consensus algorithm, 44th IEEE Conference on Decision and Control, and the European Control
Conference, Seville, Spain (2005), 2356 -- 2361.
[3] Chazelle, B. The total s-energy of a multiagent system, SIAM J. Control Optim. 49 (2011), 1680 --
1706.
[4] Chazelle, B. The convergence of bird flocking, Journal ACM 61 (2014), 21:1 -- 35.
[5] Chazelle, B. How many bits can a flock of birds compute?, Theory of Computing 10 (2014), 421 --
451.
[6] Chazelle, B. An algorithmic approach to collective behavior, Journal of Statistical Physics 158
(2015), 514 -- 548.
[7] Cucker, F., Smale, S. Emergent behavior in flocks, IEEE Transactions on Automatic Control 52
(2007), 852 -- 862.
11
[8] Fagnani, F., Frasca, P. Introduction to Averaging Dynamics over Networks, Lecture Notes in Con-
trol and Information Sciences 472, Springer, 2018.
[9] Fortunato S. On the consensus threshold for the opinion dynamics of Krause-Hegselmann, Interna-
tional Journal of Modern Physics C, 16, 2 (2005), 259 -- 270.
[10] Hegselmann, R., Krause, U. Opinion dynamics and bounded confidence models, analysis, and
simulation, J. Artificial Societies and Social Simulation 5, 3 (2002).
[11] Hendrickx, J.M., Blondel, V.D. Convergence of different linear and non-linear Vicsek models, Proc.
17th International Symposium on Mathematical Theory of Networks and Systems (MTNS2006),
Kyoto (Japan), July 2006, 1229 -- 1240.
[12] Hendrickx, J.M., Tsitsiklis, J. Convergence of type-symmetric and cut-balanced consensus seeking
systems, IEEE Transactions on Automatic Control 58 (2013), 214 -- 218.
[13] Jadbabaie, A., Lin, J., Morse, A.S. Coordination of groups of mobile autonomous agents using
nearest neighbor rules, IEEE Transactions on Automatic Control 48 (2003), 988 -- 1001.
[14] Jadbabaie, A., Motee, N., Barahona, M. On the stability of the Kuramoto model of coupled nonlin-
ear oscillators, Proc. American Control Conference 5 (2004), 4296 -- 4301.
[15] Lorenz, J. A stabilization theorem for dynamics of continuous opinions, Physica A: Statistical Me-
chanics and its Applications 355 (2005), 217 -- 223.
[16] Martinez, S. A convergence result for multiagent systems subject to noise, Proc. American Control
Conference (2009), St. Louis, Missouri.
[17] Moreau, L. Stability of multiagent systems with time-dependent communication links, IEEE Trans-
actions on Automatic Control 50 (2005), 169 -- 182.
[18] Scardovi, L., Sarlette, A., Sepulchre, R. Synchronization and balancing on the N-torus, Systems &
Control Letters 56 (2007), 335 -- 341.
[19] Strogatz, S.H. From Kuramoto to Crawford: exploring the onset of synchronization in populations
of coupled oscillators, Physica D 143 (2000), 1 -- 20.
[20] Tsitsiklis, J.N., Problems in decentralized decision making and computation, PhD thesis, MIT,
1984.
[21] Vicsek, T., Czir´ok, A., Ben-Jacob, E., Cohen, I., Shochet, O. Novel type of phase transition in a
system of self-driven particles, Physical Review Letters 75 (1995), 1226 -- 1229.
12
|
1707.06600 | 2 | 1707 | 2017-09-06T17:32:44 | A multi-agent reinforcement learning model of common-pool resource appropriation | [
"cs.MA",
"cs.NE",
"q-bio.PE"
] | Humanity faces numerous problems of common-pool resource appropriation. This class of multi-agent social dilemma includes the problems of ensuring sustainable use of fresh water, common fisheries, grazing pastures, and irrigation systems. Abstract models of common-pool resource appropriation based on non-cooperative game theory predict that self-interested agents will generally fail to find socially positive equilibria---a phenomenon called the tragedy of the commons. However, in reality, human societies are sometimes able to discover and implement stable cooperative solutions. Decades of behavioral game theory research have sought to uncover aspects of human behavior that make this possible. Most of that work was based on laboratory experiments where participants only make a single choice: how much to appropriate. Recognizing the importance of spatial and temporal resource dynamics, a recent trend has been toward experiments in more complex real-time video game-like environments. However, standard methods of non-cooperative game theory can no longer be used to generate predictions for this case. Here we show that deep reinforcement learning can be used instead. To that end, we study the emergent behavior of groups of independently learning agents in a partially observed Markov game modeling common-pool resource appropriation. Our experiments highlight the importance of trial-and-error learning in common-pool resource appropriation and shed light on the relationship between exclusion, sustainability, and inequality. | cs.MA | cs |
A multi-agent reinforcement learning model of
common-pool resource appropriation
Julien Perolat∗
DeepMind
London, UK
[email protected]
Joel Z. Leibo∗
DeepMind
London, UK
[email protected]
Vinicius Zambaldi
DeepMind
London, UK
[email protected]
Charles Beattie
DeepMind
London, UK
[email protected]
Karl Tuyls
University of Liverpool
Liverpool, UK
[email protected]
Thore Graepel
DeepMind
London, UK
[email protected]
Abstract
Humanity faces numerous problems of common-pool resource appropriation. This
class of multi-agent social dilemma includes the problems of ensuring sustainable
use of fresh water, common fisheries, grazing pastures, and irrigation systems.
Abstract models of common-pool resource appropriation based on non-cooperative
game theory predict that self-interested agents will generally fail to find socially
positive equilibria-a phenomenon called the tragedy of the commons. However,
in reality, human societies are sometimes able to discover and implement stable
cooperative solutions. Decades of behavioral game theory research have sought
to uncover aspects of human behavior that make this possible. Most of that work
was based on laboratory experiments where participants only make a single choice:
how much to appropriate. Recognizing the importance of spatial and temporal
resource dynamics, a recent trend has been toward experiments in more complex
real-time video game-like environments. However, standard methods of non-
cooperative game theory can no longer be used to generate predictions for this case.
Here we show that deep reinforcement learning can be used instead. To that end,
we study the emergent behavior of groups of independently learning agents in a
partially observed Markov game modeling common-pool resource appropriation.
Our experiments highlight the importance of trial-and-error learning in common-
pool resource appropriation and shed light on the relationship between exclusion,
sustainability, and inequality.
Introduction
1
Natural resources like fisheries, groundwater basins, and grazing pastures, as well as technological
resources like irrigation systems and access to geosynchronous orbit are all common-pool resources
(CPRs). It is difficult or impossible for agents to exclude one another from accessing them. But
whenever an agent obtains an individual benefit from such a resource, the remaining amount available
for appropriation by others is ever-so-slightly diminished. These two seemingly-innocent properties
of CPRs combine to yield numerous subtle problems of motivation in organizing collective action [12,
26, 27, 6]. The necessity of organizing groups of humans for effective CPR appropriation, combined
with its notorious difficulty, has shaped human history. It remains equally critical today.
∗indicates equal contribution
31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA.
Renewable natural resources† have a stock component and a flow component [10, 35, 7, 26]. Agents
may choose to appropriate resources from the flow. However, the magnitude of the flow depends
on the state of the stock‡. Over-appropriation negatively impacts the stock, and thus has a negative
impact on future flow. Agents secure individual rewards when they appropriate resource units from a
CPR. However, the cost of such appropriation, felt via its impact on the CPR stock, affects all agents
in the community equally. Economic theory predicts that as long as each individual's share of the
marginal social cost is less than their marginal gain from appropriating an additional resource unit,
agents will continue to appropriate from the CPR. If such over-appropriation continues unchecked for
too long then the CPR stock may become depleted, thus cutting off future resource flows. Even if an
especially clever agent were to realize the trap, they still could not unilaterally alter the outcome by
restraining their own behavior. In other words, CPR appropriation problems have socially-deficient
Nash equilibria. In fact, the choice to appropriate is typically dominant over the choice to show
restraint (e.g. [32]). No matter what the state of the CPR stock, agents prefer to appropriate additional
resources for themselves over the option of showing restraint, since in that case they receive no
individual benefit but still endure the cost of CPR exploitation by others.
Nevertheless, despite such pessimistic theoretical predictions,
human communities frequently are able to self-organize to solve
CPR appropriation problems [26, 28, 27, 6]. A major goal of
laboratory-based behavioral work in this area is to determine
what it is about human behavior that makes this possible. Be-
ing based on behavioral game theory [4], most experimental
work on human CPR appropriation behavior features highly
abstracted environments where the only decision to make is
how much to appropriate (e.g. [29]). The advantage of such
a setup is that the theoretical predictions of non-cooperative
game theory are clear. However, this is achieved by sacrificing
the opportunity to model spatial and temporal dynamics which
are important in real-world CPRs [26]. This approach also
downplays the role of trial-and-error learning.
One recent line of behavioral research on CPR appropriation
features significantly more complex environments than the ab-
stract matrix games that came before [16, 18, 17, 14, 15]. In
a typical experiment, a participant controls the movements of
an on-screen avatar in a real-time video game-like environment
that approximates a CPR with complex spatial and temporal
dynamics. They are compensated proportionally to the amount
of resources they collect. Interesting behavioral results have
been obtained with this setup. For example, [18] found that
participants often found cooperative solutions that relied on
dividing the CPR into separate territories. However, due to
the increased complexity of the environment model used in
this new generation of experiments, the standard tools of non-
cooperative game theory can no longer be used to generate
predictions.
(a) Open map
(b) Small map with agent's observation
Figure 1: (a) The initial state of the
commons game at the start of each
episode on the large open map used in
sections 3.2, 3.3, and 3.5. Apples are
green, walls are grey, and players are
red or blue. (b) The initial state of the
small map used for the single-agent ex-
periment (Section 3.1). The size of the
window of pixels a player receives as
an observation is also shown.
We propose a new model of common-pool resource appropriation in which learning takes the center
stage. It consists of two components: (1) a spatially and temporally dynamic CPR environment,
similar to [17], and (2) a multi-agent system consisting of N independent self-interested deep
reinforcement learning agents. On the collective level, the idea is that self-organization to solve
CPR appropriation problems works by smoothly adjusting over time the incentives felt by individual
agents through a process akin to trial and error. This collective adjustment process is the aggregate
result of all the many individual agents simultaneously learning how best to respond to their current
situation.
†Natural resources may or may not be renewable. However, this paper is only concerned with those that are.
‡CPR appropriation problems are concerned with the allocation of the flow. In contrast, CPR provision
problems concern the supply of the stock. This paper only addresses the appropriation problem and we will say
no more about CPR provision. See [7, 26] for more on the distinction between the two problems.
2
This model of CPR appropriation admits a diverse range of emergent social outcomes. Much of the
present paper is devoted to developing methodology for analyzing such emergence. For instance,
we show how behavior of groups may be characterized along four social outcome metrics called:
efficiency, equality, sustainability, and peace. We also develop an N-player empirical game-theoretic
analysis that allows one to connect our model back to standard non-cooperative game theory. It
allows one to determine classical game-theoretic properties like Nash equilibria for strategic games
that emerge from learning in our model.
Our point is not to argue that we have a more realistic model than standard non-cooperative game
theory. This is also a reductionist model. However, it emphasizes different aspects of real-world CPR
problems. It makes different assumptions and thus may be expected to produce new insights for the
general theory of CPR appropriation that were missed by the existing literature's focus on standard
game theory models. Our results are broadly compatible with previous theory while also raising a
new possibility, that trial-and-error learning may be a powerful mechanism for promoting sustainable
use of the commons.
2 Modeling and analysis methods
2.1 The commons game
The goal of the commons game is to collect "apples" (resources). The catch is that the apple regrowth
rate (i.e. CPR flow) depends on the spatial configuration of the uncollected apples (i.e the CPR stock):
the more nearby apples, the higher the regrowth rate. If all apples in a local area are harvested then
none ever grow back-until the end of the episode (1000 steps), at which point the game resets to
an initial state. The dilemma is as follows. The interests of the individual lead toward harvesting as
rapidly as possible. However, the interests of the group as a whole are advanced when individuals
refrain from doing so, especially in situations where many agents simultaneously harvest in the same
local region. Such situations are precarious because the more harvesting agents there are, the greater
the chance of bringing the local stock down to zero, at which point it cannot recover.
(a) Single agent return
(b) Optimal path
So far,
the proposed commons game is quite similar to
the dynamic game used in human behavioral experiments
[16, 18, 17, 14, 15]. However, it departs in one notable way. In
the behavioral work, especially [17], participants were given
the option of paying a fee in order to fine another participant,
reducing their score. In contrast, in our commons game, agents
can tag one another with a "time-out beam". Any agent caught
in the path of the beam is removed from the game for 25 steps.
Neither the tagging nor the tagged agent receive any direct
reward or punishment from this. However, the tagged agent
loses the chance to collect apples during its time-out period and
the tagging agent loses a bit of time chasing and aiming, thus
paying the opportunity cost of foregone apple consumption. We
argue that such a mechanism is more realistic because it has an
effect within the game itself, not just on the scores.
The commons game is a partially-observable general-sum
Markov Game [33, 22].
In each state of the game, agents
take actions based on a partial observation of the state space
and receive an individual reward. Agents must learn through
experience an appropriate behavior policy while interacting
with one another.
In technical terms, we consider an N-player partially observ-
able Markov game M defined on a finite set of states S.
The observation function O : S × {1, . . . , N} → Rd speci-
fies each player's d-dimensional view on the state space. In
any state, players are allowed to take actions from the set
A1, . . . ,AN (one for each player). As a result of their joint
action a1, . . . , aN ∈ A1, . . . ,AN the state changes following
the stochastic transition function T : S × A1 × ··· × AN → ∆(S) (where ∆(S) denotes the set of
discrete probability distributions over S) and every player receives an individual reward defined as
Figure 2: (a) Single-agent returns as
a function of training steps. (b) The
optimal resource appropriation policy
for a single agent on this map. At con-
vergence, the agent we study nearly
learns this policy: https://youtu.
be/NnghJgsMxAY.
3
01000020000300004000050000Episode050100150200250300350400Efficiency (U)ri : S × A1 × ··· × AN → R for player i. Finally, let us write Oi = {oi s ∈ S, oi = O(s, i)} be
the observation space of player i.
Each agent learns, independently through their own experience of the environment, a behavior policy
πi : Oi → ∆(Ai) (written π(aioi)) based on their own observation oi = O(s, i) and reward
ri(s, a1, . . . , aN ). For the sake of simplicity we will write (cid:126)a = (a1, . . . , aN ), (cid:126)o = (o1, . . . , oN )
and (cid:126)π(.(cid:126)o) = (π1(.o1), . . . , πN (.oN )). Each agent's goal is to maximize a long term γ-discounted
payoff defined as follow:
(cid:126)π(s0) = E
V i
γtri(st, (cid:126)at)(cid:126)at ∼ (cid:126)πt, st+1 ∼ T (st, (cid:126)at)
(cid:35)
(cid:34) ∞(cid:88)
t=0
2.2 Deep multi-agent reinforcement learning
Multi-agent learning in Markov games is the subject of a large literature [3], mostly concerned with
the aim of prescribing an optimal learning rule. To that end, many algorithms have been proposed
over the past decade to provide guarantees of convergence in specific settings. Some of them address
the zero-sum two-player case [22], or attempt to solve the general-sum case [13, 11]. Others study
the emergence of cooperation in partially observable Markov decision processes [9, 37, 38] but rely
on knowledge of the model which is unrealistic when studying independent interaction. Our goal, as
opposed to the prescriptive agenda, is to describe the behaviour that emerges when agents learn in the
presence of other learning agents. This agenda is called the descriptive agenda in the categorization
of Shoham & al. [34]. To that end, we simulated N independent agents, each simultaneously learning
via the deep reinforcement learning algorithm of Mnih et al. (2015) [24].
Reinforcement learning algorithms learn a policy through experience balancing exploration of the
environment and exploitation. These algorithms were developed for the single agent case and
are applied independently here [21, 3] even though this multi-agent context breaks the Markov
assumption [20]. The algorithm we use is Q-learning with function approximation (i.e. DQN) [24].
In Q-learning, the policy of agent i is implicitly represented through a state-action value function
Qi(O(s, i), a) (also written Qi(s, a) in the following). The policy of agent i is an -greedy policy
and is defined by πi(aO(s, i)) = (1 − )1a=arg max
Qi(s,a) + Ai. The parameter controls the
amount of exploration. The Q-function Qi is learned to minimize the bellman residual (cid:107)Qi(oi, ai) −
Qi(o(cid:48)i, b)(cid:107) on data collected through interaction with the environment (oi, ai, ri, o(cid:48)i) in
ri − max
b
{(oi
t, ri
t, oi
t, ai
t+1)} (where oi
2.3 Social outcome metrics
Unlike in single-agent reinforcement learning where the value function is the canonical metric of
agent performance, in multi-agent systems with mixed incentives like the commons game, there is no
scalar metric that can adequately track the state of the system (see e.g. [5]). Thus we introduce four
key social outcome metrics in order to summarize group behavior and facilitate its analysis.
Consider N independent agents. Let {ri
the i-th agent over an episode of duration T . Likewise, let {oi
t t = 1, . . . , T} be the sequence of rewards obtained by
t t = 1, . . . T} be the i-th agent's
observation sequence. Its return is given by Ri =(cid:80)T
t = O(st, i)).
a
t.
t=1 ri
The Utilitarian metric (U), also known as Efficiency, measures the sum total of all rewards obtained
by all agents. It is defined as the average over players of sum of rewards Ri. The Equality metric
(E) is defined using the Gini coefficient [8]. The Sustainability metric (S) is defined as the average
time at which the rewards are collected. The Peace metric (P ) is defined as the average number of
untagged agent steps.
(cid:35)
(cid:34)(cid:80)N
E(cid:104)
N T −(cid:80)N
i=1 Ri
T
U = E
P =
, E = 1 −
(cid:80)T
t=1 I(oi
t)
i=1
T
(cid:80)N
(cid:105)
(cid:80)N
2N(cid:80)N
j=1 Ri − Rj
(cid:40)
i=1 Ri
i=1
where I(o) =
4
(cid:34)
1
N
(cid:35)
ti
N(cid:88)
i=1
, S = E
where ti = E[t ri
t > 0].
1
0
if o = time-out observation
otherwise.
3 Results
3.1 Sustainable appropriation in the single-agent case
In principle, even a single agent, on its own, may learn a strategy that over-exploits and depletes its
own private resources. However, in the single-agent case, such a strategy could always be improved
by individually adopting a more sustainable strategy. We find that, in practice, agents are indeed able
to learn an efficient and sustainable appropriation policy in the single-agent case (Fig. 2).
3.2 Emergent social outcomes
Now we consider the multi-agent case. Unlike in the single agent case where learning steadily
improved returns (Fig. 2-a), in the multi-agent case, learning does not necessarily increase returns.
The returns of a single agent are also a poor indicator of the group's behavior. Thus we monitor how
the social outcome metrics that we defined in Section 2.3 evolve over the course of training (Fig. 3).
The system moves through 3 phases characterized by
qualitatively different behaviors and social outcomes.
Phase 1, which we may call naïvety, begins at the
start of training and extends until ≈ 900 episodes.
It is characterized by healthy CPR stocks (high ap-
ple density). Agents begin training by acting ran-
domly, diffusing through the space and collecting
apples whenever they happen upon them. Apples
density is high enough that the overall utilitarian ef-
ficiency (U ) is quite high, and in fact is close to the
max it will ever attain. As training progresses, agents
learn to move toward regions of greater apple density
in order to more efficiently harvest rewards. They de-
tect no benefit from their tagging action and quickly
learn not to use it. This can be seen as a steady in-
crease in the peace metric (P ) (Fig. 3). In a video§
of typical agent behavior in the naïvety phase, it can
be seen that apples remain plentiful (the CPR stock
remains healthy) throughout the entire episode.
Phase 2, which we may call tragedy, begins where
naïvety ends (≈ episode 900), it is characterized by
rapid and catastrophic depletion of CPR stock in each
episode. The sustainability metric (S), which had
already been decreasing steadily with learning in the
previous phase, now takes a sudden and drastic turn
downward. It happens because agents have learned
"too well" how to appropriate from the CPR. With
each agent harvesting as quickly as they possibly can,
no time is allowed for the CPR stock to recover. It
quickly becomes depleted. As a result, utilitarian
efficiency (U ) declines precipitously. At the low
point, agents are collecting less than half as many
apples per episode as they did at the very start of
training-when they were acting randomly (Fig. 3).
In a video¶ of agent play at the height of the tragedy
one can see that by ≈ 500 steps into the (1100-step)
episode, the stock has been completely depleted and
no more apples can grow.
Phase 3, which we may call maturity, begins when ef-
ficiency and sustainability turn the corner and start to
recover again after their low point (≈ episode 1500)
and continues indefinitely. Initially, conflict breaks
out when agents discover that, in situations of great
Figure 3: Evolution of the different social out-
come metrics (Sec.2.3) over the course of training
on the open map (Fig.1a) using a time-out beam
of length 10 and width 5. From top to bottom is
displayed, the utility metric (U), the sustainability
metric (S), the equality metric (E), and the peace
metric (P ).
§learned policy after 100 episodes https://youtu.be/ranlu_9ooDw.
¶learned policy after 1100 episodes https://youtu.be/1xF1DoLxqyQ.
5
010002000300040005000600070008000Episode050100150200250300350Efficiency (U)010002000300040005000600070008000Episode0100200300400500Sustainability (S)010002000300040005000600070008000Episode0.700.750.800.850.900.951.00Equality (E)010002000300040005000600070008000Episode5006007008009001000 Peacefulness (P)apple scarcity, it is possible to tag another agent to prevent them from taking apples that one could
otherwise take for themselves. As learning continues, this conflict expands in scope. Agents learn
to tag one another in situations of greater and greater abundance. The peace metric (P ) steadily
declines (Fig. 3). At the same time, efficiency (U ) and sustainability (S) increase, eventually
reaching and slightly surpassing their original level from before tragedy struck. How can efficiency
and sustainability increase while peace declines? When an agent is tagged by another agent's beam,
it gets removed from the game for 25 steps. Conflict between agents in the commons game has the
effect of lowering the effective population size and thus relieving pressure on the CPR stock. With
less agents harvesting at any given time, the survivors are free to collect with greater impunity and
less risk of resource depletion. This effect is evident in a video(cid:107) of agent play during the maturity
phase. Note that the CPR stock is maintained through the entire episode. By contrast, in an analogous
experiment with the tagging action disabled, the learned policies were much less sustainable (Supp.
Fig. 11).
(a) Territorial effect
(b) Histogram of the equality metric on the territory maps
Figure 4: (a) Scatter plot of return by range size (variance of position) for individual agents in experiments with
one tagging agent (red dots, one per random seed) and 11 non-tagging agents (blue dots, eleven per random
seed). The tagging players collect more apples per episode than the others and remain in a smaller part of the
map. This illustrates that the tagging players take over a territory and harvest sustainably within its boundary.
(b) represents the distribution of the equality metric (E) for different runs on four different maps with natural
regions from which it may be possible to exclude other. The first map is the standard map from which others will
be derived (Fig. 6c). In the second apples are more concentrated on the top left corner and will respawn faster
(Fig. 6d). the third is porous meaning it is harder for an agent to protect an area (Fig 6e). On the fourth map, the
interiors walls are removed (Fig. 6f). Figure 4b shows inequality rises in maps where players can exclude one
another from accessing the commons.
3.3 Sustainability and the emergence of exclusion
Suppose, by building a fence around the resource or some other means, access to it can be made
exclusive to just one agent. Then that agent is called the owner and the resource is called a private
good [30]. The owner is incentivized to avoid over-appropriation so as to safeguard the value of
future resource flows from which they and they alone will profit. In accord with this, we showed
above (Fig. 2) that sustainability can indeed be achieved in the single agent case. Next, we wanted to
see if such a strategy could emerge in the multi-agent case.
The key requirement is for agents to somehow be able to exclude one another from accessing part of
the CPR, i.e. a region of the map. To give an agent the chance to exclude others we had to provide it
with an advantage. Thus we ran an experiment where only one out of the twelve agents could use
the tagging action. In this experiment, the tagging agent learned a policy of controlling a specific
territory by using its time-out beam to exclude other agents from accessing it. The tagging agents
roam over a smaller part of the map than the non-tagging agents but achieve better returns (Fig. 4a).
This is because the non-tagging agents generally failed to organize a sustainable appropriation pattern
(cid:107)learned policy after 3900 episodes https://youtu.be/XZXJYgPuzEI.
6
taggersnon-taggers0.30.40.50.60.70.80.91.01.1Equality_E02468101214161. single entrance2. single entrance / unequal3. multiple entrances4. no walls(a) Early training (after 500 episodes) Schelling dia-
gram for L = taggers and R = non-taggers
Figure 5: Schelling diagram from early (5a) and late (5b) in training for the experiment where L = taggers and
R = non-taggers.
(b) Late training (after 3000 episodes) Schelling dia-
gram for L = taggers and R = non-taggers
and depleted the CPR stock in the area available to them (the majority of the map). The tagging agent,
on the other hand, was generally able to maintain a healthy stock within its "privatized" territory∗∗.
Interestingly, territorial solutions to CPR appropriation problems have emerged in real-world CPR
problems, especially fisheries [23, 1, 36]. Territories have also emerged spontaneously in laboratory
experiments with a spatially and temporally dynamic commons game similar to the one we study
here [18].
3.4 Emergence of inequality
To further investigate the emergence of exclusion strategies using agents that all have the same
abilities (all can tag), we created four new maps with natural regions enclosed by walls (see Supp.
Fig. 6). The idea is that it is much easier to exclude others from accessing a territory that has only a
single entrance than one with multiple entrances or one with no walls at all. This manipulation had a
large effect on the equality of outcomes. Easier exclusion led to greater inequality (Fig. 4b). The
lucky agent that was first to learn how to exclude others from "its territory" could then monopolize
the lion's share of the rewards for a long time (Supp. Figs. 7a and 7b). In one map with unequal
apple density between the four regions, the other agents were never able to catch up and achieve
returns comparable to the first-to-learn agent (Supp. Fig. 7b). On the other hand, on the maps where
exclusion was more difficult, there was no such advantage to being the first to learn (Supp. Figs. 7c
and 7d).
3.5 Empirical game-theoretic analysis of emergent strategic incentives
We use empirical game theoretic analysis to characterize the strategic incentives facing agents at
different points over the course of training. As in [21], we use simulation to estimate the payoffs of an
abstracted game in which agents choose their entire policy as a single decision with two alternatives.
However, the method of [21] cannot be applied directly to the case of N > 2 players that we study in
this paper. Instead, we look at Schelling diagrams [32]. They provide an intuitive way to summarize
the strategic structure of a symmetric N-player 2-action game where everyone's payoffs depend only
on the number of others choosing one way or the other. Following Schelling's terminology, we refer
to the two alternatives as L and R (left and right). We include in the appendix several examples of
Schelling diagrams produced from experiments using different ways of assigning policies to L and R
groups (Supp. Fig. 8).
∗∗A typical episode where the tagging agent has a policy of excluding others from a region in the lower left
corner of the map: https://youtu.be/3iGnpijQ8RM.
7
All playersL: taggersR: non-taggersnumber of non-taggersAll playersL: taggersR: non-taggersnumber of non-taggersIn this section we restrict our attention to an experiment where L is the choice of adopting a policy
that uses the tagging action and R the choice of a policy that does not tag. A Schelling diagram
is interpreted as follows. The green curve is the average return obtained by a player choosing L
(a tagger) as a function of the number of players choosing R (non-taggers). Likewise, the red
curve is the average return obtained by a player choosing R as a function of the number of other
players also choosing R. The average return of all players is shown in blue. At the leftmost point,
R = 0 =⇒ L = N, the blue curve must coincide with the green one. At the rightmost point,
R = N =⇒ L = 0, the blue curve coincides with the red curve.
Properties of the strategic game can be read off from the Schelling diagram. For example, in Fig. 5b
one can see that the choice of a tagging policy is dominant over the choice of a non-tagging policy
since, for any R, the expected return of the L group is always greater than that of the R group.
This implies that the Nash equilibrium is at R = 0 (all players tagging). The Schelling diagram
also shows that the collective maximum (blue curve's max) occurs when R = 7. So the Nash
equilibrium is socially-deficient in this case.
In addition to being able to describe the strategic game faced by agents at convergence, we can also
investigate how the strategic incentives agents evolve over the course of learning. Fig. 5a shows that
the strategic game after 500 training episodes is one with a uniform negative externality. That is, no
matter whether one is a tagger or a non-tagger, the effect of switching one additional other agent from
the tagging group to the non-tagging group is to decrease returns. After 3000 training episodes the
strategic situation is different (Fig. 5b). Now, for R > 5, there is a contingent externality. Switching
one additional agent from tagging to non-tagging has a positive effect on the remaining taggers and a
negative effect on the non-taggers (green and red curves have differently signed slopes).
4 Discussion
This paper describes how algorithms arising from reinforcement learning research may be applied
to build new kinds of models for phenomena drawn from the social sciences. As such, this paper
really has two audiences. For social scientists, the core conclusions are as follows. (1) Unlike most
game theory-based approaches where modelers typically "hand engineer" specific strategies like
tit-for-tat [2] or win-stay-lose-shift [25], here agents must learn how to implement their strategic
decisions. This means that the resulting behaviors are emergent. For example, in this case the tragedy
of the commons was "solved" by reducing the effective population size below the environment's
carrying capacity, but this outcome was not assumed. (2) This model endogenizes exclusion. That is,
it allows agents to learn strategies wherein they exclude others from a portion of the CPR. Then, in
accord with predictions from economics [26, 1, 18, 36], sustainable appropriation strategies emerge
more readily in the "privatized" zones than they do elsewhere. (3) Inequality emerges when exclusion
policies are easier to implement. In particular, natural boundaries in the environment make inequality
more likely to arise.
From the perspective of reinforcement learning research, the most interesting aspect of this model is
that-despite the fact that all agents learn only toward their individual objectives-tracking individual
rewards over the course of training is insufficient to characterize the state of the system. These results
illustrate how multiple simultaneously learning agents may continually improve in "competence"
without improving their expected discounted returns. Indeed, learning may even decrease returns in
cases where too-competent agents end up depleting the commons. Without the social outcome metrics
(efficiency, equality, sustainability, and peace) and other analyses employed here, such emergent
events could not have been detected. This insight is widely applicable to other general-sum Markov
games with mixed incentives (e.g. [19, 21]).
This is a reductionist approach. Notice what is conspicuously absent from the model we have
proposed. The process by which groups of humans self-organize to solve CPR problems is usually
conceptualized as one of rational negotiation (e.g. [26]). People do things like bargain with one
another, attempt to build consensus for collective decisions, think about each other's thoughts, and
make arbitration appeals to local officials. The agents in our model can't do anything like that.
Nevertheless, we still find it is sometimes possible for self-organization to resolve CPR appropriation
problems. Moreover, examining the pattern of success and failure across variants of our model
yields insights that appear readily applicable to understanding human CPR appropriation behavior.
The question then is raised: how much of human cognitive sophistication is really needed to find
adequate solutions to CPR appropriation problems? We note that nonhuman organisms also solve
them [31]. This suggests that trial-and-error learning alone, without advanced cognitive capabilities
may sometimes be sufficient for effective CPR appropriation.
8
References
[1] James M Acheson and Roy J Gardner. Spatial strategies and territoriality in the maine lobster industry.
Rationality and society, 17(3):309–341, 2005.
[2] Robert Axelrod. The Evolution of Cooperation. Basic Books, 1984.
[3] Lucian Busoniu, Robert Babuska, and Bart De Schutter. A comprehensive survey of multiagent reinforce-
ment learning. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews),
2(38):156–172, 2008.
[4] Colin F Camerer. Progress in behavioral game theory. The Journal of Economic Perspectives, 11(4):167–
188, 1997.
[5] Georgios Chalkiadakis and Craig Boutilier. Coordination in multiagent reinforcement learning: a bayesian
approach. In The Second International Joint Conference on Autonomous Agents & Multiagent Systems,
AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pages 709–716, 2003.
[6] Thomas Dietz, Elinor Ostrom, and Paul C Stern. The struggle to govern the commons.
302(5652):1907–1912, 2003.
science,
[7] Roy Gardner, Elinor Ostrom, and James M Walker. The nature of common-pool resource problems.
Rationality and Society, 2(3):335–358, 1990.
[8] C. Gini. Variabilità e mutabilità: contributo allo studio delle distribuzioni e delle relazioni statistiche.
[.]. Number pt. 1 in Studi economico-giuridici pubblicati per cura della facoltà di Giurisprudenza della R.
Università di Cagliari. Tipogr. di P. Cuppini, 1912.
[9] Piotr J Gmytrasiewicz and Prashant Doshi. A framework for sequential planning in multi-agent settings.
Journal of Artificial Intelligence Research, 24:49–79, 2005.
[10] H Scott Gordon. The economic theory of a common-property resource: the fishery. Journal of political
economy, 62(2):124–142, 1954.
[11] A. Greenwald and K. Hall. Correlated-Q learning. In Proceedings of the 20th International Conference on
Machine Learning (ICML), pages 242–249, 2003.
[12] Garrett Hardin. The tragedy of the commons. Science, 162(3859):1243–1248, 1968.
[13] J. Hu and M. P. Wellman. Multiagent reinforcement learning: Theoretical framework and an algorithm. In
Proceedings of the 15th International Conference on Machine Learning (ICML), pages 242–250, 1998.
[14] Marco Janssen. Introducing ecological dynamics into common-pool resource experiments. Ecology and
Society, 15(2), 2010.
[15] Marco Janssen. The role of information in governing the commons: experimental results. Ecology and
Society, 18(4), 2013.
[16] Marco Janssen, Robert Goldstone, Filippo Menczer, and Elinor Ostrom. Effect of rule choice in dynamic
interactive spatial commons. International Journal of the Commons, 2(2), 2008.
[17] Marco A Janssen, Robert Holahan, Allen Lee, and Elinor Ostrom. Lab experiments for the study of
social-ecological systems. Science, 328(5978):613–617, 2010.
[18] Marco A Janssen and Elinor Ostrom. Turfs in the lab: institutional innovation in real-time dynamic spatial
commons. Rationality and Society, 20(4):371–397, 2008.
[19] Max Kleiman-Weiner, M K Ho, J L Austerweil, Michael L Littman, and Josh B Tenenbaum. Coordinate to
cooperate or compete: abstract goals and joint intentions in social interaction. In Proceedings of the 38th
Annual Conference of the Cognitive Science Society, 2016.
[20] Guillaume J. Laurent, Laëtitia Matignon, and N. Le Fort-Piat. The world of independent learners is not
Markovian. Int. J. Know.-Based Intell. Eng. Syst., 15(1):55–64, 2011.
[21] Joel Z. Leibo, Vinicius Zambaldi, Marc Lanctot, Janusz Marecki, and Thore Graepel. Multi-agent Rein-
forcement Learning in Sequential Social Dilemmas. In Proceedings of the 16th International Conference
on Autonomous Agents and Multiagent Systems (AA-MAS 2017), Sao Paulo, Brazil, 2017.
[22] M. L. Littman. Markov games as a framework for multi-agent reinforcement learning. In Proceedings of
the 11th International Conference on Machine Learning (ICML), pages 157–163, 1994.
9
[23] Kent O Martin. Play by the rules or don't play at all: Space division and resource allocation in a rural
newfoundland fishing community. North Atlantic maritime cultures, pages 277–98, 1979.
[24] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller,
A. K. Fidjeland, G. Ostrovski, S. Petersen, C. Beattie, A. Sadik, I. Antonoglou, H. King, D. Kumaran,
D. Wierstra, S. Legg, and D. Hassabis. Human-level control through deep reinforcement learning. Nature,
518(7540):529–533, 2015.
[25] Martin Nowak, Karl Sigmund, et al. A strategy of win-stay, lose-shift that outperforms tit-for-tat in the
prisoner's dilemma game. Nature, 364(6432):56–58, 1993.
[26] Elinor Ostrom. Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge
University Press, 1990.
[27] Elinor Ostrom, Joanna Burger, Christopher B Field, Richard B Norgaard, and David Policansky. Revisiting
the commons: local lessons, global challenges. Science, 284(5412):278–282, 1999.
[28] Elinor Ostrom and Roy Gardner. Coping with asymmetries in the commons: self-governing irrigation
systems can work. The Journal of Economic Perspectives, 7(4):93–112, 1993.
[29] Elinor Ostrom, Roy Gardner, and James Walker. Rules, games, and common-pool resources. University of
Michigan Press, 1994.
[30] Vincent Ostrom and Elinor Ostrom. Public goods and public choices. In Alternatives for Delivering Public
Services: Toward Improved Performance, pages 7–49. Westview press, 1977.
[31] Daniel J Rankin, Katja Bargum, and Hanna Kokko. The tragedy of the commons in evolutionary biology.
Trends in ecology & evolution, 22(12):643–651, 2007.
[32] Thomas C Schelling. Hockey helmets, concealed weapons, and daylight saving: A study of binary choices
with externalities. Journal of Conflict resolution, 17(3):381–428, 1973.
[33] L. S. Shapley. Stochastic Games. In Proc. of the National Academy of Sciences of the United States of
America, 1953.
[34] Y. Shoham, R. Powers, and T. Grenager. If multi-agent learning is the answer, what is the question?
Artificial Intelligence, 171(7):365–377, 2007.
[35] Vernon L Smith. Economics of production from natural resources. The American Economic Review,
58(3):409–431, 1968.
[36] Rachel A Turner, Tim Gray, Nicholas VC Polunin, and Selina M Stead. Territoriality as a driver of fishers'
spatial behavior in the northumberland lobster fishery. Society & Natural Resources, 26(5):491–505, 2013.
[37] Pradeep Varakantham, Jun-young Kwak, Matthew E Taylor, Janusz Marecki, Paul Scerri, and Milind
Tambe. Exploiting coordination locales in distributed POMDPs via social model shaping. In Proceedings
of the 19th International Conference on Automated Planning and Scheduling, ICAPS, 2009.
[38] Chao Yu, Minjie Zhang, Fenghui Ren, and Guozhen Tan. Emotional multiagent reinforcement learning in
spatial social dilemmas. IEEE Transactions on Neural Networks and Learning Systems, 26(12):3083–3096,
2015.
10
Appendix
A Simulation methods
The partially-observed Markov game environment underlying our implementation of the commons game is a 2D
grid-world game engine. It works as follows. The state st and the joint action of all players (cid:126)a determine the
state at the next time-step st+1. Observations O(s, i) ∈ R3×20×21 (RGB) of the true state st depend on the i-th
player's current position and orientation. The observation window extends 20 grid squares ahead and 10 grid
squares from side to side (see Fig. 1). Actions a ∈ R8 were agent-centered: step forward, step backward, step
left, step right, rotate left, rotate right, tag, and stand still. The beam extends 20 grid squares in the direction
faced by the tagger. It is 5 squares wide. If another agent is in the path of the beam then it is tagged. A tagged
agent is removed from the game for 25 timesteps. Being tagged has no direct impact on rewards. However,
there is an indirect effect since a tagged agent cannot collect apples during its time-out period. Each player
appears blue in its own local view and red in its opponent's view. Each episode lasted for 1, 000 steps. The local
flow of apple respawning depends on local stock size. Specifically, the per-timestep respawn probability pt of a
potential apple at position c depends on the number of already-spawned apples in a ball of radius 2 centered
around its location, i.e. the local stock size L = {already-spawned apples ∈ B2(c)}. The per-timestep respawn
probability as a function of local stock size is given by:
0
0.01
0.05
0.1
pt(L) =
if L = 0
if L = 1 or 2
if L = 3 or 4
if L > 4
(1)
Default neural networks had two hidden layers with 32 units, interleaved with rectified linear layers which
projected to the output layer which had 8 units, one for each action. During training, players implemented
epsilon-greedy policies, with epsilon decaying linearly over time (from 1.0 to 0.1). The default per-time-step
discount rate γ was 0.99.
(a) Small map
(b) Open map
(c) Basic single-entrance region
map
(d) Unequal single-entrance region
map
(e) Multi-entrance region map
(f) Region map with no walls
Figure 6: We used six different maps in our experiments. Map 6a is a small environment where a single random
player will sometimes harvest all the apples. Map 6b is considerably larger. It was designed so that a single
agent, acting alone cannot remove all the apples but with several agents harvesting simultaneously it becomes
relatively easy to remove them all. Maps 6c, 6e, and 6f were constructed in order to manipulate the ease with
which agents can exclude one another from accessing territories defined by natural boundaries (walls). They
were designed to be compared to one another. Thus all three have the same number and spatial configuration
of apples. Map 6c has only one single entrance to each region. Map 6e has two additional entrances to each
region and in map 6f, all walls were removed. Map 6d was created to test the effects of territories with unequal
productivity. In its top left corner region, the apples are placed closer to one another than in the other regions.
Thus, since the growth rule is density dependent, apples respawn faster in this region (greater CPR flow).
11
(a) Basic single-entrance region map (6c)
(b) Unequal single-entrance region map (6d)
(c) Multi-entrance region map (6e)
(d) Region map with no walls (6f)
Figure 7: These figures shows how inequality emerges and persists on different maps. In this experiment, 12
players learns simultaneously on maps 6c, 6d, 6e, and 6f. In each plot, the red time series shows reward as a
function of training time for the agent that was most successful in the first 1000 episodes (before the vertical red
dashed line). The aim of this analysis was to determine whether an early advantage would persist over time.
That is, was the inequality persistent, with the same agent coming out on top in episode after episode? Or was it
more random, with different agents doing well in each episode? As expected from Fig. 4b, in the multi-entrance
and no-walls maps, this analysis shows no inequality. Interestingly, the two cases where inequality emerged are
different from one another. The advantage of the first-to-learn agent on the basic single-entrance map (6c) was
transient. However on the unequal single-entrance map (6d), its advantage was persistent.
12
010002000300040005000600070008000Episode050100150200250Individual return010002000300040005000600070008000Episode050100150200250Individual return010002000300040005000600070008000Episode050100150200250Individual return010002000300040005000600070008000Episode050100150200250Individual return(a) Schelling diagram for fast and slow players
where L = fast and R = slow
(b) Schelling diagram for players with small and
large γ where L = hight γ (γ = 0.99) and R =
low γ (γ = 0.9)
Schelling
small
(c)
players
with
networks where
L = small network (hidden layer = (5)) and
R = large network (hidden layer = (32, 32))
for
diagram
large
and
(d) Schelling diagram for tagging and non-tagging
players where L = taggers and R = non-taggers.
Figure 8: Schelling diagrams at convergence. Fig. 8a shows the interaction between fast and slow players,
Fig. 8b shows the interaction between players with large and small γ (γ = 0.9 or 0.99), Fig. 8c shows the
interaction between players with large and small neural network, and Fig. 8d shows the interaction between
players that have the ability to tag or not.
13
024681012R = number of slow players050100150200250300350400Expected returnAll playersL: fastR: slowEpisode 8000024681012R = number of players with small gamma0100200300400500Expected returnAll playersL: large gamma groupR: small gamma groupEpisode 8000024681012R = Number of players with a small network050100150200250300350400Expected returnAll playersL: large network groupR: small network groupEpisode 8000All playersL: taggersR: non-taggersnumber of non-taggersFigure 9: Schelling diagrams during training for the experiment where L = taggers and R = non-taggers.
Figure 10: Schelling diagrams during training for the experiment where L = fast and R = slow.
14
All playersL: taggersR: non-taggersnumber of non-taggersAll playersL: taggersR: non-taggersnumber of non-taggersAll playersL: taggersR: non-taggersnumber of non-taggersAll playersL: taggersR: non-taggersnumber of non-taggersAll playersL: taggersR: non-taggersnumber of non-taggersAll playersL: taggersR: non-taggersnumber of non-taggers024681012R = number of slow players050100150200250300350400Expected returnAll playersL: fastR: slowEpisode 500024681012R = number of slow players050100150200250300350400Expected returnAll playersL: fastR: slowEpisode 1000024681012R = number of slow players050100150200250300350400Expected returnAll playersL: fastR: slowEpisode 1500024681012R = number of slow players050100150200250300350400Expected returnAll playersL: fastR: slowEpisode 2000024681012R = number of slow players050100150200250300350400Expected returnAll playersL: fastR: slowEpisode 2500024681012R = number of slow players050100150200250300350400Expected returnAll playersL: fastR: slowEpisode 3000Figure 11: Left: Evolution of the different social outcome metrics (Sec.2.3) over the course of training on the
open map (Fig.1a) for the case without the time-out beam tagging action. Right: the same figure from the main
text is reproduced for comparison. From top to bottom is displayed, the utilitarian efficiency metric (U), the
sustainability metric (S), the equality metric (E), and the peace metric (P ). Notice that in the case without the
time-out beam, the final sustainability value is considerably lower than in the case with the time-out beam. This
means that agents frequently deplete their resources before the end of the episode in the conflict-free case.
15
010002000300040005000600070008000Episode050100150200250300350Efficiency (U)010002000300040005000600070008000Episode0100200300400500Sustainability (S)010002000300040005000600070008000Episode0.700.750.800.850.900.951.00Equality (E)010002000300040005000600070008000Episode5006007008009001000 Peacefulness (P)010002000300040005000600070008000Episode050100150200250300350Efficiency (U)010002000300040005000600070008000Episode0100200300400500Sustainability (S)010002000300040005000600070008000Episode0.700.750.800.850.900.951.00Equality (E)010002000300040005000600070008000Episode5006007008009001000 Peacefulness (P) |
1311.4894 | 1 | 1311 | 2013-11-02T10:29:50 | Multitask Diffusion Adaptation over Networks | [
"cs.MA",
"eess.SY"
] | Adaptive networks are suitable for decentralized inference tasks, e.g., to monitor complex natural phenomena. Recent research works have intensively studied distributed optimization problems in the case where the nodes have to estimate a single optimum parameter vector collaboratively. However, there are many important applications that are multitask-oriented in the sense that there are multiple optimum parameter vectors to be inferred simultaneously, in a collaborative manner, over the area covered by the network. In this paper, we employ diffusion strategies to develop distributed algorithms that address multitask problems by minimizing an appropriate mean-square error criterion with $\ell_2$-regularization. The stability and convergence of the algorithm in the mean and in the mean-square sense is analyzed. Simulations are conducted to verify the theoretical findings, and to illustrate how the distributed strategy can be used in several useful applications related to spectral sensing, target localization, and hyperspectral data unmixing. | cs.MA | cs | Multitask Diffusion Adaptation over Networks
Jie Chen† , Student Member, IEEE, C ´edric Richard† , Senior Member, IEEE
Ali H. Sayed‡ , Fellow Member, IEEE
1
† Universit ´e de Nice Sophia-Antipolis, UMR CNRS 7293, Observatoire de la C ote d’Azur
Laboratoire Lagrange, Parc Valrose, 06102 Nice - France
fax: (33) 492 076 321
phone: (33) 492 076 394
[email protected]
[email protected]
‡ Electrical Engineering Department
University of California, Los Angeles, USA
phone: (310) 267 2142
fax: (310) 206 8495
[email protected]
EDICS: NET-ADEG, NET-DISP, MLR-DIST, SSP-PERF
Abstract
Adaptive networks are suitable for decentralized inference tasks, e.g., to monitor complex natural phenomena.
Recent research works have intensively studied distributed optimization problems in the case where the nodes have
to estimate a single optimum parameter vector collaboratively. However, there are many important applications that
are multitask-oriented in the sense that there are multiple optimum parameter vectors to be inferred simultaneously,
in a collaborative manner, over the area covered by the network. In this paper, we employ diffusion strategies to
develop distributed algorithms that address multitask problems by minimizing an appropriate mean-square error
criterion with (cid:96)2 -regularization. The stability and convergence of the algorithm in the mean and in the mean-square
sense is analyzed. Simulations are conducted to verify the theoretical findings, and to illustrate how the distributed
strategy can be used in several useful applications related to spectral sensing, target localization, and hyperspectral
data unmixing.
Multitask learning, distributed optimization, diffusion strategy, collaborative processing, asymmetric regulariza-
tion, spectral sensing, target localization, data unmixing.
Index Terms
3
1
0
2
v
o
N
2
]
A
M
.
s
c
[
1
v
4
9
8
4
.
1
1
3
1
:
v
i
X
r
a
This work was partly supported by the Agence Nationale pour la Recherche, France, (Hypanema project, ANR-12-BS03-003), and the
Centre National de la Recherche Scientifique, France (Display project, Mastodons). The work of A. H. Sayed was supported in part by NSF
grant CCF-1011918.
2
I . IN TRODUC T ION
Distributed adaptation over networks has emerged as an attractive and challenging research area with the advent of multi-
agent (wireless or wireline) networks. Accessible overviews of recent results in the field can be found in [1], [2]. In adaptive
networks, the interconnected nodes have to continually learn and adapt, as well as perform preassigned tasks such as parameter
estimation from observations collected by the dispersed agents. Although centralized strategies with a fusion center can benefit
more fully from information collected throughout the network but stored at a single point, in most cases, distributed strategies
are more attractive to solve inference problems in a collaborative and autonomous manner. Scalability, robustness, and low-
power consumption are key characteristics of these strategies. Applications include environment monitoring, but also modeling
of self-organized behavior observed in nature such as bird flight in formation and fish schooling [1], [3].
There are several useful distributed strategies for sequential data processing over networks including consensus strategies [4]–
[9], incremental strategies [10]–[14], and diffusion strategies [1], [2], [15]–[18]. Incremental techniques require the determination
of a cyclic path that runs across the nodes, which is generally a challenging (NP-hard) task to perform. Besides, incremental
solutions can be problematic for adaptation over networks because they are sensitive to link failures. On the other hand,
diffusion strategies are attractive since they are scalable, robust, and enable continuous adaptation and learning. In addition,
for data processing over adaptive networks, diffusion strategies have been shown to have superior stability and performance
ranges [19] than consensus-based implementations. Consequently, we shall focus on diffusion-type implementations in the
sequel. The diffusion LMS strategy was proposed and studied in [15], [16]. Its performance in the presence of imperfect
information exchange and model non-stationarity was analyzed in [20]–[22]. Diffusion LMS with (cid:96)1 -norm regularization was
considered in [23]–[26] to promote sparsity in the model. In [27], the problem of distributed learning in diffusion networks
was addressed by deriving projection algorithms onto convex sets. Diffusion RLS over adaptive networks was studied in [28],
[29]. More recently, a distributed dictionary learning algorithm based on a diffusion strategy was derived in [30]–[32]. This
literature mainly considers quadratic cost functions and linear models where systems are characterized by a parameter vector
in the Euclidean space. Extensions to more general cost functions that are not necessarily quadratic and to more general data
models are studied in [17], [18] in the context of adaptation and learning over networks. Moreover, several other works explored
distributed estimation for nonlinear input-output relationships defined in a functional space, such as reproducing kernel Hilbert
spaces. For instance, in [33], inference is performed with a regularized kernel least-squares estimator, where the distributed
information-sharing strategy consisted of successive orthogonal projections. Distributed estimation based on adaptive kernel
regression [34], [35] is also studied in [36]–[39], with information passed from node to node in an incremental manner. In [40],
non-negative distributed regression is considered for nonlinear model inference subject to non-negativity constraints, where the
diffusion strategy is used to conduct information exchange.
An inspection of the existing literature on distributed algorithms shows that most works focus primarily, though not
exclusively [41]–[43], on the case where the nodes have to estimate a single optimum parameter vector collaboratively. We
shall refer to problems of this type as single-task problems. However, many problems of interest happen to be multitask-
oriented in the sense that there are multiple optimum parameter vectors to be inferred simultaneously and in a collaborative
manner. The multitask learning problem is relevant in several machine learning formulations and has been studied in the
machine learning community in several contexts. For example, the problem finds applications in web page categorization [44],
web-search ranking [45], and disease progression modeling [46], among other areas. Clearly, this concept is also relevant in
the context of distributed estimation and adaptation over networks. Initial investigations along these lines for the traditional
3
diffusion strategy appear in [42], [47]. In this article, we consider the general situation where there are connected clusters of
nodes, and each cluster has a parameter vector to estimate. The estimation still needs to be performed cooperatively across the
network because the data across the clusters may be correlated and, therefore, cooperation across clusters can be beneficial.
Obviously, a limit case of this problem is the situation where all clusters are of equal size one, that is, each node has its own
parameter vector to estimate but shares information with its neighbors. Another limit case is when the size of the cluster agrees
with the size of the network in which case all nodes have the same parameter vector to estimate. The aim of this paper is to
derive diffusion strategies that are able to solve this general multitask estimation problem, and to analyze their performance in
terms of mean-square error and convergence rate. Simulations are also conducted to illustrate the theoretical analysis, and to
apply the algorithms to three useful applications involving spectral sensing, target localization, and hyperspectral data unmixing.
This paper is organized as follows. Section II formulates the distributed estimation problem for multitask learning. Section
III presents a relaxation strategy for optimizing local cost functions over the network. Section IV derives a stochastic gradient
algorithm for distributed adaptive learning in a multitask-oriented environment. Section V analyzes the theoretical performance
of the proposed algorithm, in the mean and mean-square-error sense. In Section VI, experiments and applications are presented
to illustrate the performance of the approach. Section VII concludes this paper and gives perspectives on future work.
I I . N E TWORK MOD EL S AND MULT I TA SK LEARN ING
Before starting our presentation, we provide a summary of some of the main symbols used in the article. Other symbols
will be defined in the context where they are used:
x
x
R
(·)(cid:62)
I N
Nk
N −k
Ci
C (k)
J (·), J (·)
w(cid:63) , wo
Normal font denotes scalars.
Boldface small letters denote vectors. All vectors are column vectors.
Boldface capital letters denote matrices.
Matrix transpose.
Identity matrix of size N × N .
The index set of nodes that are in the neighborhood of node k , including k .
The index set of nodes that are in the neighborhood of node k , excluding k .
Cluster i, i.e., index set of nodes in the i-th cluster.
The cluster to which node k belongs, i.e., C (k) = {Ci : k ∈ Ci }.
Cost functions without/with regularization.
Optimum parameter vectors without/with regularization.
We consider a connected network consisting of N nodes. The problem is to estimate an L × 1 unknown vector at each node
k from collected measurements. Node k has access to temporal measurement sequences {dk (n), xk (n)}, with dk (n) denoting
a scalar zero-mean reference signal, and xk (n) denoting an L × 1 regression vector with a positive-definite covariance matrix,
Rx,k = E {xk (n)x(cid:62)k (n)} > 0. The data at node k are assumed to be related via the linear regression model:
dk (n) = x(cid:62)k (n) w(cid:63)
k + zk (n)
(1)
k is an unknown parameter vector at node k , and zk (n) is a zero-mean i.i.d. noise that is independent of any other
where w(cid:63)
signal and has variance σ2
z ,k . Considering the number of parameter vectors to estimate, which we shall refer to as the number of
tasks, the distributed learning problem can be single-task or multitask oriented. We therefore distinguish among the following
k across the nodes are related:
three types of networks, as illustrated by Figure 1, depending on how the parameter vectors w(cid:63)
4
• Single-task networks: All nodes have to estimate the same parameter vector w(cid:63) . That is, in this case we have that
∀k ∈ {1, . . . , N }
• Multitask networks: Each node k has to determine its own optimum parameter vector, w(cid:63)
k . However, it is assumed that
similarities and relationships exist among the parameters of neighboring nodes, which we denote by writing
w(cid:63)
k = w(cid:63) ,
(2)
(3)
if (cid:96) ∈ Nk
k ∼ w(cid:63)
w(cid:63)
(cid:96)
The sign ∼ represents a similarity relationship in some sense, and its meaning will become clear soon once we introduce
expressions (8) and (9) further ahead. Within the area of machine learning, the relation between tasks can be promoted
in several ways, e.g., through mean regularization [48], low rank regularization [49], or clustered regularization [50]. We
note that a number of application problems can be addressed using this model. For instance, consider an image sensor
array and the problem of image restoration. In this case, links in Figure 1(b) can represent neighboring relationships
between adjacent pixels. We will consider this application in greater detail in the simulation section.
• Clustered multitask networks: Nodes are grouped into Q clusters, and there is one task per cluster. The optimum parameter
vectors are only constrained to be equal within each cluster, but similarities between neighboring clusters are allowed to
exist, namely,
Cq , whenever k ∈ Cq
k = w(cid:63)
w(cid:63)
if Cp , Cq are connected
w(cid:63)
Cp ∼ w(cid:63)
Cq ,
where p and q denote two cluster indexes. We say that two clusters Cp and Cq are connected if there exists at least one
edge linking a node from one cluster to a node in the other cluster.
(4)
(5)
One can observe that the single-task and multitask networks are particular cases of the clustered multitask network. In the case
where all the nodes are clustered together, the clustered multitask network reduces to the single-task network. On the other
hand, in the case where each cluster only involves one node, the clustered multitask network becomes a multitask network.
Building on the literature on diffusion strategies for single-task networks, we shall now generalize its use and analysis for
distributed learning over clustered multitask networks. The results will be applicable to multitask networks by setting the
number of clusters equal to the number of nodes.
A. Global cost function and optimization
I I I . PROBL EM FORMU LAT ION
Clustered multitask networks require that nodes that are grouped in the same cluster estimate the same coefficient vector.
Thus, consider the cluster C (k) to which node k belongs. A local cost function, Jk (wC (k) ), is associated with node k and it is
assumed to be strongly convex and second-order differentiable, an example of which is the mean-square error criterion defined
(cid:110)(cid:12)(cid:12)dk (n) − x(cid:62)k (n) wC (k)
(cid:12)(cid:12)2(cid:111)
by
Jk (wC (k) ) = E
In order to promote similarities among adjacent clusters, appropriate regularization can be used. For this purpose, we introduce
the squared Euclidean distance as a possible regularizer, namely,
(6)
.
∆(wC (k) , wC ((cid:96)) ) = (cid:107)wC (k) − wC ((cid:96))(cid:107)2 .
(7)
5
(a) Single-task network
(b) Multitask network
(c) Clustered multitask network
E
+ η
(P1 )
Fig. 1. Three types of networks. The single-task and multitask networks can be viewed as special cases of the clustered multitask network.
(cid:110)(cid:12)(cid:12)dk (n) − x(cid:62)k (n) wC (k)
(cid:12)(cid:12)2(cid:111)
N(cid:88)
N(cid:88)
(cid:88)
Combining (6) and (7) yields the following regularized problem P1 at the level of the entire network:
J glob (wC1 , . . . , wCQ ) =
ρk(cid:96) (cid:107)wC (k) − wC ((cid:96))(cid:107)2 ,
k=1
k=1
(cid:96)∈Nk \C (k)
where wCi is the parameter vector associated with cluster Ci and η > 0. The second term on the right-hand-side of expression (8)
promotes similarities between the wCi of neighboring clusters, with strength parameter η .
Observe from the right-most term in (8) that the regularization strength between two clusters is directly related to the
number of edges that connect them. The non-negative coefficients ρk(cid:96) aim at adjusting the regularization strength but they do
not necessarily enforce symmetry. That is, we do not require ρk(cid:96) = ρ(cid:96)k even though the regularization term (cid:107)wC (k) − wC ((cid:96))(cid:107)2
is symmetric with respect to the weight vectors wC (k) and wC ((cid:96)) ; this term will be weighted by the sum ρk(cid:96) + ρ(cid:96)k due to the
summation over the N nodes. Consequently, problem formulation P1 inevitably leads to symmetric regularization despite the
fact that ρk(cid:96) (cid:54)= ρ(cid:96)k . However, we would like the design problem to benefit from the additional flexibility that is afforded by the
use of asymmetric regularization coefficients. This is because asymmetry allows clusters to scale their desire for closer similarity
with their neighbors differently. For example, asymmetric regularization would allow cluster Ck to promote similarities with
cluster C(cid:96) while cluster C(cid:96) may be less inclined towards promoting similarities with Ck . In order to exploit this flexibility more
fully, we consider an alternative problem formulation P2 defined in terms of Q Nash equilibrium problems as follows:
(cid:110)(cid:12)(cid:12)dk (n) − x(cid:62)k (n) wC (k)
(cid:12)(cid:12)2(cid:111)
(cid:88)
(cid:88)
(cid:88)
for i = 1, . . . , Q
min
JCi (wCi , w−Ci )
wCi
with JCi (wCi , w−Ci ) =
k∈Ci
k∈Ci
(cid:96)∈Nk \Ci
where each cluster Ci estimates wCi by minimizing JCi (wCi , w−Ci ). Note that we have kept the notation wC (k) to make the
role of the regularization term clearer, even though in formulation (9) we have wC (k) = wCi for all k in Ci . In (9), the notation
w−Ci denotes the collection of weight vectors estimated by the other clusters, i.e., w−Ci = {wCk : k = 1, . . . , Q} − {wCi }.
The Nash equilibrium of P2 satisfies the condition [51]:
wo
JCi (wCi , wo
Ci = arg min
−Ci )
wCi
denotes the collection of the Nash equilibria by the other clusters. Problem P2 has
ρk(cid:96) (cid:107)wC (k) − wC ((cid:96)) (cid:107)2
E
+ η
(P2 )
(8)
(9)
(10)
for i = 1, . . . , Q, where the notation wo
−Ci
the following properties:
13426859710w\x{FFFF}13426859710w\x{FFFF}1w\x{FFFF}2w\x{FFFF}3w\x{FFFF}4w\x{FFFF}5w\x{FFFF}6w\x{FFFF}7w\x{FFFF}8w\x{FFFF}9w\x{FFFF}1013426859710w\x{FFFF}C1w\x{FFFF}C2w\x{FFFF}C36
1) An equilibrium exists for P2 since JCi (wCi , w−Ci ) is convex with respect to wCi for all i.
i=1 satisfies the diagonal strict convexity property.1
2) The equilibrium for P2 is unique since {JCi (wCi , w−Ci )}Q
3) Problems P1 and P2 have the same solution by setting the value of ρk(cid:96) in P2 to that of ρk(cid:96) + ρ(cid:96)k from P1 .
Properties 1) and 2) can be checked via Theorems 1 and 2 in [52]. Property 3) can be verified by the optimality conditions
for the two problems.
Problem P1 can be solved either analytically in closed form or iteratively by using a steepest-descent algorithm. Unfortunately,
there is no analytical expression for general Nash equilibrium problems. We estimate the equilibrium of problem P2 iteratively
by the fixed point of the best response iteration [51], that is,
wCi (n + 1) = arg min
wCi
JCi (wCi , w−Ci (n))
(11)
for i = 1, . . . , Q, and leads to the solution of (9). Since the equilibrium is unique and the cost function for each cluster is
convex, the solution of (9) can also be approached by means of a steepest-descent iteration as follows:
∇wCi
JCi (wCi , w−Ci (n)) ∝
(Rx,kwCi − pxd,k ) + η
for i = 1, . . . , Q, with ∇wCi
wCi (n + 1) = wCi (n) − µ ∇wCi
JCi (wCi (n), w−Ci (n))
(cid:88)
(cid:88)
(cid:88)
(cid:0)wCi − wC ((cid:96)) (n)(cid:1).
denoting the gradient operation with respect to wCi , and µ a positive step-size. We have
k∈Ci
k∈Ci
(cid:96)∈Nk \Ci
where pxd,k = E {xk (n)dk (n)} is the input-output cross-correlation vector between xk (n) and dk (n) at node k . If some
additional constraints are imposed on the parameters to estimate, the gradient update relation can be modified using methods
such as projection [53] or fixed point iteration techniques [54]. In the body of the paper, we focus on the unconstrained case
during the algorithm derivation and its analysis. However, a constrained problem will be presented in the simulation section.
Since P1 is equivalent to P2 with proper setting of the weights ρk(cid:96) , we shall now derive a distributed algorithm for solving
N(cid:88)
problem P2 . In this paper, we shall consider normalized weights that satisfy
(cid:96)=1
and ρk(cid:96) = 0 if (cid:96) /∈ Nk \C (k).
ρk(cid:96) = 1,
ρk(cid:96)
(12)
(13)
(14)
B. Local cost decomposition and problem relaxation
The solution method (12) using (13) requires that every node in the network should have access to the statistical moments
Rx,k and pxd,k over its cluster. There are two problems with this scenario. First, nodes can only be assumed to have access
to information from their immediate neighborhood and the cluster of every node k may include nodes that are not direct
neighbors of k . Second, nodes rarely have access to the moments {Rx,d , pxd,k }; instead, they have access to data generated
from distributions with these moments. Therefore, more is needed to enable a distributed solution that relies solely on local
interactions within neighborhoods and that relies on measured data as opposed to statistical moments. To derive a distributed
algorithm, we follow the approach of [2], [16]. The first step in this approach is to show how to express the cost (9) in terms
of other local costs that only depend on data from neighborhoods.
1Let g(w, ζ ) = [ζi∇wCi
i=1 arranged as a row vector with ζi > 0. The cost functions {JCi (wCi , w−Ci )}Q
JCi (wCi , w−Ci )]Q
i=1 satisfy the
diagonal strict convexity property if g(w, ζ ) is strictly decreasing in w for some positive vector ζ , that is, (g( w, ζ )− g(w, ζ ))(cid:62) ( w −w) < 0
for all nonequal w , w .
.
(16)
(15)
c(cid:96)k E
J loc
k (wC (k) ) =
N(cid:88)
Thus, let us introduce an N × N right stochastic matrix C with nonnegative entries c(cid:96)k such that
and c(cid:96)k = 0 if k /∈ N(cid:96) ∩ C ((cid:96)).
c(cid:96)k = 1,
k=1
(cid:12)(cid:12)2(cid:111)
(cid:110)(cid:12)(cid:12)d(cid:96) (n) − x(cid:62)(cid:96) (n) wC (k)
(cid:88)
With these coefficients, we associate a local cost function of the following form with each node k [2]:
(cid:96)∈Nk ∩C (k)
One important distinction from the local cost defined in [2] is that in [2] the summation in (16) is defined over the entire
neighborhood of node k , i.e., for all (cid:96) ∈ Nk . Here we are excluding those neighbors of k that do not belong to its cluster. This
is because these particular neighbors will be pursuing a different parameter vector than node k . Furthermore, we note in (16)
that wC (k) = wC ((cid:96)) because (cid:96) ∈ C (k). To make the notation simpler, we shall write wk instead of wC (k) . A consequence of
this notation is that wk = w(cid:96) for all (cid:96) ∈ C (k). Incorporating the estimates of the neighboring clusters, we modify (16) to
(cid:12)(cid:12)2(cid:111)
(cid:110)(cid:12)(cid:12)d(cid:96) (n) − x(cid:62)(cid:96) (n) wk
(cid:88)
(cid:88)
associate a regularized local cost function with node k of the following form
(cid:96)∈Nk \C (k)
(cid:96)∈Nk ∩C (k)
Observe that this local cost is now solely defined in terms of information that is available to node k from its neighbors. Using
this regularized local cost function, it can be verified that the global cost function for cluster Ci in (9) can be now expressed
ρk(cid:96) (cid:107)wC (k) − wC ((cid:96))(cid:107)2(cid:17)
(cid:12)(cid:12)2(cid:111)
(cid:110)(cid:12)(cid:12)d(cid:96) (n) − x(cid:62)(cid:96) (n) wC (k)
(cid:16) (cid:88)
(cid:88)
(cid:88)
as
(cid:88)
k∈Ci
(cid:96)∈Nk \Ci
(cid:96)∈C (k)
J loc
k (wk )
k∈Ci
= J loc
k (wk ) +
c(cid:96)kE
(cid:88)
(cid:96)∈C (k)\k
Let wo
k denote the minimizer of the local cost function (17), given w(cid:96) for all (cid:96) ∈ Nk \C (k). A completion-of-squares argument
shows that each J loc
k (wk ) can be expressed as
ρk(cid:96) (cid:107)wk − w(cid:96)(cid:107)2 .
JCi (wCi , w−Ci ) =
J loc
k (wk ) =
J loc
(cid:96) (w(cid:96) )
c(cid:96)k E
(17)
+ η
+ η
7
(18)
=
(19)
Rk =
where
ρk(cid:96)I L .
c(cid:96)k Rx,(cid:96) + η
k (wk ) = J loc
J loc
k (cid:107)2
k ) + (cid:107)wk − wo
k (wo
Rk
(cid:88)
(cid:88)
(cid:96)∈Nk ∩C (k)
(cid:96)∈Nk \C (k)
Substituting equation (19) into the second term on the right-hand-side of (18), and discarding the terms {J loc
(cid:96) )}because
(cid:96) (wo
they are independent of the optimization variables in the cluster, we can consider the following equivalent cost function for
(cid:88)
cluster C (k) at node k :
(cid:96)∈C (k)\k
where it holds that wk = w(cid:96) because (cid:96) ∈ C (k). Note that we have omitted w−k in the notation for JC (k) (wk ) for the sake
of brevity. Therefore, minimizing (21) is equivalent to minimizing the original cost (18) or (9) over wk . However the second
term (21) still requires information from nodes (cid:96) that may not be in the direct neighborhood of node k even though they
belong to the same cluster. In order to avoid access to information via multi-hop, we can relax the cost function (21) at node
JC (k) (wk ) (cid:44) J loc
k (wk ) +
(cid:96) (cid:107)2
(cid:107)w(cid:96) − wo
R(cid:96)
(20)
(21)
8
k by considering only information originating from its neighbors. This can be achieved by replacing the range of the index
(cid:88)
over which the summation in (21) is computed as follows:
−
(cid:96)∈N
k ∩C (k)
Usually, especially in the context of adaptive learning in a non-stationary environment, the weighting matrices R(cid:96) are unavailable
since the covariance matrices Rx,(cid:96) at each node may not be known beforehand. Following an argument based on the Rayleigh-
Ritz characterization of eigenvalues, it was explained in [2] that a useful strategy is to replace each matrix R(cid:96) by a weighted
multiple of the identity matrix, say, as:
JC (k) (cid:48) (wk ) = J loc
k (wk ) +
(cid:96) (cid:107)2
(cid:107)wk − wo
R(cid:96)
(22)
.
(23)
(cid:96) (cid:107)2
(cid:107)wk − wo
R(cid:96) ≈ b(cid:96)k (cid:107)wk − wo
(cid:96) (cid:107)2
for some nonnegative coefficients b(cid:96)k that can possibly depend on the node k . As shown later, these coefficients will be
incorporated into a left stochastic matrix to be defined and, therefore, the designer does not need to worry about the selection
of the b(cid:96)k at this stage. Based on the arguments presented so far, and using (17), the global cost function (22) can then be
(cid:110)(cid:12)(cid:12)d(cid:96) (n) − x(cid:62)(cid:96) (n) wk
(cid:12)(cid:12)2(cid:111)
(cid:88)
relaxed to the following form:
JC (k) (cid:48)(cid:48) (wk ) =
(cid:88)
(cid:88)
(cid:96)∈Nk ∩C (k)
ρk(cid:96) (cid:107)wk − w(cid:96)(cid:107)2 +
+ η
−
(cid:96)∈Nk \C (k)
(cid:96)∈N
k ∩C (k)
Observe that the two last sums on the right-hand-side of (24) divide the neighbors of node k into two exclusive sets: those
that belong to its cluster (last sum) and those that do not belong to its cluster (second term). In summary, the argument so far
enabled us to replace the cost (9) by the alternative cost (24) that depends only on data within the neighborhood of node k . We
can now proceed to use (24) to derive distributed strategies. Subsequently, we study the stability and mean-square performance
of the resulting strategies and show that they are able to perform well despite the approximation introduced in steps.
b(cid:96)k (cid:107)wk − wo
(cid:96) (cid:107)2 .
c(cid:96)k E
(24)
IV. S TOCHA ST IC A P PROX IMAT ION A LGOR I THM S
To begin with, a steepest-descent iteration can be applied by each node k to minimize the cost function (24). Let wk (n)
denote the estimate for wk at iteration n. Using a constant step-size µ for each node, the update relation would take the
(cid:88)
(cid:88)
(cid:1)
(cid:0)Rx,(cid:96)wk (n) − pxd,k
following form:
(cid:88)
− µη
wk (n + 1) = wk (n) − µ
ρk(cid:96) (wk (n) − w(cid:96) (n))
c(cid:96)k
(cid:96)∈Nk \C (k)
(cid:96)∈Nk ∩C (k)
b(cid:96)k (wk (n) − wo
− µ
(cid:96) )
−
k ∩C (k)
(cid:96)∈N
(cid:88)
Among other possible forms, expression (25) can be evaluated in two successive update steps
(cid:88)
(cid:1) + η
(cid:0)Rx,(cid:96)wk (n) − pxd,k
(cid:88)
ρk(cid:96) (wk (n) − w(cid:96) (n))
c(cid:96)k
(cid:96)∈Nk \C (k)
(cid:96)∈Nk ∩C (k)
b(cid:96)k (wo
(cid:96) − wk (n))
wk (n + 1) = ψk (n + 1) + µ
−
k ∩C (k)
(cid:96)∈N
Following the same line of reasoning from [2] in the single-task case, and extending the argument to apply to clusters, we use
(cid:96) in (27) since the latter is unavailable and ψ (cid:96) (n + 1) is an intermediate estimate for it
ψ (cid:96) (n + 1) as a local estimate for wo
ψk (n + 1) = wk (n) − µ
(25)
(27)
(26)
9
(28)
(29)
(30)
(32)
b(cid:96)k
wk (n + 1) =
wk (n + 1) =
akk (cid:44) 1 − µ
a(cid:96)k (cid:44) µ b(cid:96)k ,
a(cid:96)k (cid:44) 0,
that is available at node (cid:96) at time n + 1. In addition, again in step (27), we replace wk (n) by ψk (n + 1) since it is a better
ψk (n + 1) + µ
1 − µ
estimate obtained by incorporating information from the neighbors according to (26). Step (27) then becomes
(cid:88)
(cid:88)
b(cid:96)k
b(cid:96)k ψ (cid:96) (n + 1).
−
−
k ∩C (k)
(cid:96)∈N
k ∩C (k)
(cid:96)∈N
(cid:88)
The coefficients in (28) can be redefined as:
−
(cid:96)∈N
k ∩C (k)
(cid:96) ∈ N −k ∩ C (k)
(cid:96) /∈ Nk ∩ C (k)
It can be observed that the entries {a(cid:96)k } are nonnegative for all (cid:96) and k (including akk ) for sufficiently small step-size.
Moreover, the matrix A with ((cid:96), k)-th entry a(cid:96)k is a left-stochastic matrix, which means that the sum of each of its columns is
equal to one. With this notation, we obtain the following adapt-then-combine (ATC) diffusion strategy for solving problem (9)
(cid:88)
in a distributed manner:
(cid:88)
(cid:1) + η
(cid:0)Rx,(cid:96)wk (n) − pxd,k
(cid:88)
ψk (n + 1) = wk (n) − µ
ρk(cid:96) (wk (n) − w(cid:96) (n))
c(cid:96)k
(cid:96)∈Nk ∩C (k)
(cid:96)∈Nk \C (k)
a(cid:96)k ψk (n + 1)
(cid:96)∈Nk ∩C (k)
At each instant n + 1, node k updates the intermediate value ψk (n + 1) with a local steepest descent iteration. This step
involves a regularization term in the case where the set of inter-cluster neighbors of node k is not empty. Next, an aggregation
step is performed where node k combines its intermediate value ψk (n + 1) with the intermediate values ψ (cid:96) (n + 1) from its
cluster neighbors. It is also possible to arrive at a combine-then-adapt (CTA) diffusion strategy where the aggregation step is
performed prior to the adaptation step [2]. In what follows, it is sufficient to focus on the ATC strategy to illustrate the main
results. Employing instantaneous approximations for the required signal moments in (30), we arrive at the desired diffusion
strategy for clustered multitask learning described in Algorithm 1 where the regularization factors ρk(cid:96) are chosen according
(cid:88)
to (14), and the coefficients {c(cid:96)k , a(cid:96)k } are nonnegative scalars chosen at will by the designer to satisfy the following conditions:
(31)
a(cid:96)k = 1, a(cid:96)k = 0 for (cid:96) /∈ Nk ∩ C (k)
(cid:88)
(cid:96)∈Nk ∩C (k)
c(cid:96)k = 1,
k∈N(cid:96)∩C ((cid:96))
There are several ways to select these coefficients such as using the averaging rule or the Metropolis rule (see [2] for a listing
of these and other choices).
In the case of a single-task network when there is a single cluster that consists of the entire set of nodes we get Nk ∩ C (k) =
Nk and Nk \C (k) = ∅ for all k , so that expression (33) reduces to the diffusion adaptation strategy [2], [16] described in
Algorithm 2.
In the case of a multitask network where the size of each cluster is one, we have Nk ∩ C (k) = {k} and Nk \C (k) = N −k
for all k , the algorithm and (34) degenerate into Algorithm 3. Interestingly, this is the instantaneous gradient counterpart of
equation (12) for each node.
c(cid:96)k = 0 for k /∈ N(cid:96) ∩ C ((cid:96))
a(cid:96)k ≥ 0,
c(cid:96)k ≥ 0,
10
(cid:62)
d(cid:96) (n) − x
(cid:96) (n)wk (n)
wk (n + 1) =
Algorithm 1: Diffusion LMS for clustered multitask networks
(cid:88)
(cid:16)
Start with wk (0) = 0 for all k , and repeat:
(cid:88)
c(cid:96)k
ψk (n + 1) = wk (n) + µ
(cid:96)∈Nk ∩C (k)
a(cid:96)k ψk (n + 1)
(cid:96)∈Nk ∩C (k)
Algorithm 2: Diffusion LMS for single-task networks [15], [16].
(cid:16)
(cid:88)
Start with wk (0) = 0 for all k , and repeat:
(cid:88)
c(cid:96)k
ψk (n + 1) = wk (n) + µ
(cid:96)∈Nk
(cid:96)∈Nk
Algorithm 3: Diffusion LMS for multitask networks
(cid:16)
Start with wk (0) = 0 for all k , and repeat:
a(cid:96)k ψk (n + 1)
wk (n + 1) =
(cid:17)
(cid:62)
k (n)wk (n)
wk (n + 1) = wk (n) + µ
dk (n) − x
(cid:17)
(cid:88)
ρk(cid:96) (w(cid:96) (n) − wk (n))
x(cid:96) (n) + η
(cid:96)∈Nk \C (k)
(33)
(34)
x(cid:96) (n)
(cid:17)
(cid:62)
d(cid:96) (n) − x
(cid:96) (n)wk (n)
(cid:88)
(cid:96)∈N −
k
ρk(cid:96) (w(cid:96) (n) − wk (n))
(35)
xk (n) + η µ
V. M EAN -SQUAR E ERROR P ER FORMANC E ANA LY S I S
w(n) =
We now examine the stochastic behavior of the adaptive diffusion strategy (33). In order to address this question, we collect
information from across the network into block vectors and matrices. In particular, let us denote by w(n), w(cid:63) and ψ the block
w1 (n)
,
ψ1 (n)
w(cid:63)
,
weight estimate vector, the block optimum weight vector and block intermediate weight estimate vector, all of size LN × 1,
i.e.,
1
...
...
...
w(cid:63) =
w(cid:63)
wN (n)
ψN (n)
N
with w(cid:63)
C (k) . The weight error vector for each node k at iteration n is defined by vk (n) = wk (n) − w(cid:63)
k . The weight
k = w(cid:63)
v1 (n)
error vectors vk (n) are also stacked on top of each other to get the block weight error vector defined as follows:
...
vN (n)
To perform the theoretical analysis, we introduce the following independence assumption.
ψ(n) =
v(n) =
(36)
(37)
Assumption 1: (Independent regressors) The regression vectors xk (n) arise from a stationary random process that is
temporally stationary, white and independent over space with Rx,k = E {xk (n)x(cid:62)k (n)} > 0.
11
A direct consequence is that xk (n) is independent of v (cid:96) (m) for all (cid:96) and m ≤ n. Although not true in general, this assumption
is commonly used for analyzing adaptive constructions because it allows to simplify the derivations without constraining the
conclusions. Moreover, various analyses in the literature have already shown that performance results obtained under this
assumption match well the actual performance of adaptive algorithms when the step-size is sufficiently small [55].
A. Mean error behavior analysis
The estimation error that appears in the first equation of (33) can be rewritten as
d(cid:96) (n) − x(cid:62)(cid:96) (n)wk (n) = x(cid:62)(cid:96) (n)w(cid:63)
k + z(cid:96) (n) − x(cid:62)(cid:96) (n)wk (n)
= z(cid:96) (n) − x(cid:62)(cid:96) (n)vk (n)
because w(cid:63)
k for all (cid:96) ∈ Nk ∩ C (k). Subtracting w(cid:63)
k from both sides of the first equation in (33), and using the above
(cid:96) = w(cid:63)
relation, the update equation for the block weight error vector of ψk (n + 1) can be expressed as
(38)
ψ(n + 1) − w(cid:63) = v(n) − µ H x (n) v(n) + µ pzx (n) − µ η Q (v(n) + w(cid:63) )
(39)
where
(40)
Q = I LN − P ⊗ I L ,
with ⊗ denoting the Kronecker product, and P the N × N matrix with (k , (cid:96))-th entry ρk(cid:96) . Moreover, the matrix H x (n) is
(cid:111)
(cid:110) (cid:88)
(cid:88)
block diagonal of size LN × LN defined as
H x (n) = diag
c(cid:96)N x(cid:96) (n)x(cid:62)(cid:96) (n)
c(cid:96)1 x(cid:96) (n)x(cid:62)(cid:96) (n), . . . ,
,
(cid:96)∈N1∩C (1)
(cid:96)∈NN ∩C (N )
(cid:17)(cid:62) .
(cid:16) (cid:88)
(cid:88)
and pzx (n) is the following vector of length LN × 1:
c(cid:96)N x(cid:62)(cid:96) (n)z(cid:96) (n)
c(cid:96)1 x(cid:62)(cid:96) (n)z(cid:96) (n), . . . ,
pzx (n) =
(cid:96)∈N1∩C (1)
(cid:96)∈NN ∩C (N )
Let AI = A ⊗ I L . The second equation in (33) then allows us to write
w(n + 1) = A(cid:62)I ψ(n + 1)
(43)
(41)
(42)
Subtracting w(cid:63) from both sides of the above expression, and using equation (39), the update relation can be written in a single
expression as follows
v(n + 1) = A(cid:62)I [I LN − µ (H x (n) + η Q)] v(n) + µ A(cid:62)I pzx (n) − µ η A(cid:62)I Q w(cid:63)
Taking the expectation of both sides, and using Assumption 1 we get
E {v(n + 1)} = A(cid:62)I [I LN − µ (H R + η Q)] E {v(n)} − µ η A(cid:62)I Q w(cid:63)
where
with
H R (cid:44) E {H x (n)} = diag {R1 , . . . , RN }
(cid:88)
(cid:96)∈Nk ∩C (k)
c(cid:96)k Rx,(cid:96) .
Rk =
(44)
(45)
(46)
(47)
12
ρ
< 1
(48)
0 < µ <
Theorem 1: (Stability in the mean) Assume data model (1) and Assumption 1 hold. Then, for any initial condition, the
(cid:17)
(cid:16)
diffusion multitask strategy (33) asymptotically converges in the mean if the step-size is chosen to satisfy
A(cid:62)I [I LN − µ (H R + η Q)]
where ρ(·) denotes the spectral radius of its matrix argument. A sufficient condition for (48) to hold is to choose µ such that
2
(49)
maxk {λmax (Rk )} + 2 η
where λmax (·) denotes the maximum eigenvalue of its matrix argument. In that case, it follows from (45) that the asymptotic
(cid:110)
(cid:111)−1
mean bias is given by
A(cid:62)I [I LN − µ (H R + η Q)] − I LN
E {v(n)} = µ η
lim
n→∞
Proof: Since any induced matrix norm is lower bounded by the spectral radius, we have the following relation in terms
(cid:17)
(cid:16)
of the block maximum norm (see [2] for definition and properties of the norm):
≤ (cid:107)A(cid:62)I (I LN − µ (H R + η Q)) (cid:107)b,∞
A(cid:62)I [I LN − µ (H R + η Q)]
Now using norm inequalities and the fact that A is a left-stochastic matrix (whose block maximum norm is equal to one), we
find that:
A(cid:62)I Q w(cid:63) .
(50)
(51)
ρ
(cid:107)A(cid:62)I [I LN − µ (H R + η Q)] (cid:107)b,∞ ≤ (cid:107)A(cid:62)I (cid:107)b,∞ · (cid:107)I LN − µ (H R + η Q)(cid:107)b,∞
= (cid:107)I LN − µ (H R + η Q)(cid:107)b,∞
≤ (cid:107)I LN − µ H R − µηI LN (cid:107)b,∞ + µη (cid:107)P ⊗ I L (cid:107)b,∞
using the definition Q = (I N − P ) ⊗ I L and the triangle inequality. Now, it holds that
(52)
(cid:107)P ⊗ I L (cid:107)b,∞ = (cid:107)P (cid:107)∞ = 1
because P is a right stochastic matrix according to condition (14). Furthermore, since (1 − µη) I LN − µ H R is a block diagonal
Hermitian matrix, its block maximum norm is equal to its spectral radius [2], namely,
(53)
(cid:107)(1 − µη) I LN − µ H R (cid:107)b,∞ = ρ ((1 − µη) I LN − µ H R ) .
Using (53)–(54) in (52) we conclude that a sufficient condition for mean stability is to require
ρ ((1 − µη) I LN − µ H R ) + µη ≤ 1,
(54)
(55)
which yields condition (49).
B. Mean-square error behavior analysis
In order to make the presentation clearer, we shall use the following notation for terms in the weight-error expression (44):
B (n) = A(cid:62)I [I LN − µ (H x (n) + η Q)]
g(n) = A(cid:62)I pzx (n)
r = A(cid:62)I Q w(cid:63)
(56)
so that
13
v(n + 1) = B (n) v(n) + µ g(n) − µ η r .
Using Assumption 1 and E {g(n)} = 0, the mean-square of the weight error vector v(n + 1), weighted by any positive
(cid:9) + µ2 η2 (cid:107)r(cid:107)2
Σ(cid:48) } + µ2 trace (cid:8)ΣE {g(n)g(cid:62) (n)}
semi-definite matrix Σ that we are free to choose, satisfies the following relation:
Σ} = E {(cid:107)v(n)(cid:107)2
E {(cid:107)v(n + 1)(cid:107)2
Σ
− 2µ η r(cid:62) ΣB E {v(n)}
(58)
(57)
where
B (cid:44) {B (n)} = A(cid:62)I [(I LN − µ (H R + η Q)]
Σ(cid:48) (cid:44) E {B(cid:62) (n) Σ B (n)}
In expression (58), the freedom in selecting Σ will allow us to derive several performance metrics. Let
(59)
(60)
G = E {g(n)g(cid:62) (n)}
= A(cid:62)I C (cid:62)I diag{σ2
z ,1Rx,1 , . . . , σ2
z ,N Rx,N } C I AI
where C I = C ⊗ I L . Then, relation (58) can be rewritten as
Σ(cid:48) } + µ2 trace {ΣG} + µ2 η2 (cid:107)r(cid:107)2
Σ − 2µ η r(cid:62) ΣB E {v(n)}
Σ} = E {(cid:107)v(n)(cid:107)2
E {(cid:107)v(n + 1)(cid:107)2
We would like to show that this variance relation converges for sufficiently small step-sizes and we would also like to evaluate
its steady-state value in order to determine the mean-square-error of the distributed strategy. However, note that the weighting
matrices Σ and Σ(cid:48) on both sides of (62) are different, which means that (62) is still not an actual recursion. To handle this
situation, we transform the weighting matrices into vector forms as follows. Let vec(·) denote the operator that stacks the
columns of a matrix on top of each other. Vectorizing the matrices Σ and Σ(cid:48) by σ = vec(Σ) and σ (cid:48) = vec(Σ(cid:48) ), it can be
verified that the relation between them can be expressed as the following linear transformation:
(61)
(62)
σ (cid:48) = K σ
where K is the (LN )2 × (LN )2 matrix given by
K = E {B(cid:62) (n) ⊗ B(cid:62) (n)}
= AI ⊗ AI − µ (H R + η Q)(cid:62)AI ⊗ AI − µ AI ⊗ (H R + η Q)(cid:62)AI
+ µ2 E {(H (n) + η Q)(cid:62)AI ⊗ (H (n) + η Q)(cid:62)AI }.
Neglecting the influence of second-order terms in µ, K can be approximated by
(63)
(64)
K ≈ B(cid:62) ⊗ B(cid:62) .
Finally, let us define f (σ , E {v(n)}) as the last two terms on the right hand side of (62), i.e.,
f (σ , E {v(n)}) (cid:44) µ2 η2 (cid:107)r(cid:107)2
σ − 2µ η (B E {v(n)} ⊗ r)(cid:62) σ .
For notational convenience, we are omitting the argument r of f since it is deterministic. Equation (62) can be expressed as
follows:
(66)
(65)
Kσ } + µ2 vec(G(cid:62) )(cid:62) σ + f (σ , E {v(n)})
σ } = E {(cid:107)v(n)(cid:107)2
E {(cid:107)v(n + 1)(cid:107)2
(67)
14
where we will be using the notations (cid:107) · (cid:107)Σ and (cid:107) · (cid:107)σ interchangeably.
Theorem 2: (Mean-square stability) Assume data model (1) and Assumption 1 hold. Assume further that the step-size µ
is sufficiently small such that approximation (49) is justified by neglecting higher-order powers of µ, and relation (67) can
be used as a reasonable representation for the evolution of the (weighted) mean-square-error. Then the diffusion multitask
strategy (33) is mean-square stable if the matrix K is stable. Under approximation (65), the stability of K is guaranteed by
sufficiently small step-sizes that also satisfy (49).
Proof: Iterating recursion (67) starting from n = 0, we find that
K n+1σ } + µ2 vec(G(cid:62) )(cid:62)
σ } = E {(cid:107)v(0)(cid:107)2
E {(cid:107)v(n + 1)(cid:107)2
n(cid:88)
i=0
K iσ +
n(cid:88)
i=0
f (K iσ , E {v(n − i)})
(68)
with initial condition v(0) = w(0) − w(cid:63) . Provided that K is stable, the first and the second term on the RHS of (68) converge
as n → ∞, to zero for the former, and to a finite value for the latter. Consider now the third term on the RHS of (68). We
know from (45) that E {v(n)} is uniformly bounded because (45) is a BIBO stable recursion with a bounded driving term
−µ η A(cid:62)I Q w(cid:63) . Moreover, from (66), the expression for f (K iσ , E {v(n − i)}) can be written as
f (K iσ , E {v(n − i)}) = µ2 η2 vec{rr(cid:62)}(cid:62)K iσ − 2µ η (B E {v(n − i)} ⊗ r)(cid:62) K iσ .
(69)
We further know that K is stable. Therefore, there exists a matrix norm [2], denoted by (cid:107) · (cid:107)ρ such that (cid:107)K (cid:107)ρ = cρ < 1.
Applying this norm to f and using the triangular inequality, we can deduce that
f (K iσ , E {v(n − i)}) < ν ci
ρ
(70)
for some positive finite constant ν . It follows that the sum appearing as the right-most term in (68) converges as n → ∞. We
σ } converges to a bounded value as n → ∞, and the algorithm is said to be mean-square stable.
conclude that E {(cid:107)v(n + 1)(cid:107)2
Theorem 3: (Transient MSD) Considering a sufficiently small step-size µ that ensures mean and mean-square stability, and
selecting Σ = 1
N I LN , then the network MSD learning curve, defined by ζ (n) = 1
N E {(cid:107)v(n)(cid:107)}2 evolves according to the
(cid:16)
following recursions for n ≥ 0:
(cid:17)
1
µ2 vec(G(cid:62) )(cid:62) K nvec(I LN ) − E {(cid:107)v(0)(cid:107)2
(I (N L)2 −K )K n vec(I LN )} + µ2 η2(cid:107)r(cid:107)2
ζ (n + 1) = ζ (n) +
K n vec(I LN )
N
− 2µη (Γ(n) + (B E {v(n)} ⊗ r)(cid:62) vec(I LN )
Γ(n + 1) = Γ(n) K + (B E {v(n)} ⊗ r)(cid:62) (K − I (LN )2 )
(71)
(72)
N (cid:107)v(0)(cid:107)2 and Γ(0) = 0(LN )2 .
with initial condition ζ (0) = 1
Proof: Comparing (68) at instants n + 1 and n, we can relate E {(cid:107)v(n + 1)(cid:107)2
σ } to E {(cid:107)v(n)(cid:107)2
σ } as follows:
n(cid:88)
n−1(cid:88)
σ } + µ2 vec(G(cid:62) )(cid:62) K nσ − E {(cid:107)v(0)(cid:107)2
σ } =E {(cid:107)v(n)(cid:107)2
E {(cid:107)v(n + 1)(cid:107)2
(I (N L)2 −K )K nσ }
f (K iσ , E {v(n − 1 − i)})
f (K iσ , E {v(n − i)}) −
i=0
i=0
+
(73)
(cid:111)
n(cid:88)
n−1(cid:88)
We can rewrite the last two terms on the RHS of (73) as follows:
(cid:110)
f (K iσ , E {v(n − 1 − i)})
n(cid:88)
i=0
i=0
2µ η (B E {v(n)} ⊗ r)(cid:62) K iσ
(cid:111)
i=0
f (K iσ , E {v(n − i)}) −
= µ2 η2 (cid:107)r(cid:107)2
(cid:110)
K nσ −
n−1(cid:88)
2µ η (B E {v(n)} ⊗ r)(cid:62) K iσ
i=0
(cid:110) n(cid:88)
n−1(cid:88)
K nσ − 2µ η (B E {v(n)} ⊗ r)(cid:62) σ
= µ2 η2 (cid:107)r(cid:107)2
(B E {v(n)} ⊗ r)(cid:62) K i +
− 2µ η
i=1
i=0
n(cid:88)
n−1(cid:88)
(B E {v(n)} ⊗ r)(cid:62) K i +
i=1
i=0
we can reformulate recursion (73) as follows:
σ } + µ2 vec(G(cid:62) )(cid:62) K nσ − E {(cid:107)v(0)(cid:107)2
(I (N L)2 −K )K nσ } + µ2 η2(cid:107)r(cid:107)2
σ } = E {(cid:107)v(n)(cid:107)2
E {(cid:107)v(n + 1)(cid:107)2
K nσ
− 2µη (Γ(n) + (B E {v(n)} ⊗ r)(cid:62) σ
Γ(n + 1) = Γ(n)K + (B E {v(n)} ⊗ r)(cid:62) (K − I (LN )2 )
N vec(I LN ).
with Γ(0) = 0(LN )2 . To derive the transient curve for the MSD, we replace σ by 1
(B E {v(n)} ⊗ r)(cid:62) K i(cid:111)
σ .
(B E {v(n)} ⊗ r)(cid:62) K i ,
Introducing the following notation
+
Γ(n) =
15
(74)
(75)
(76)
(77)
Theorem 4: (Steady-state MSD) If the step size is chosen sufficiently small to ensure mean and mean-square-error conver-
(cid:19)
(cid:18) 1
gence, then the value of the steady-state MSD for the diffusion network (33) is given by
N
(I (LN )2 − K )−1vec(I LN ), E {v(∞)}
ζ (cid:63) =
(78)
µ2
vec(G(cid:62) )(cid:62) (I (LN )2 − K )−1vec(I LN ) + f
N
where E {v(∞)} is determined by expression (50).
Proof: The steady-state MSD is the limiting value
1
ζ (cid:63) = lim
N
n→∞
From the recursive expression (67) we obtain as n → ∞ that
(I (N L)2 −K )σ } = µ2 vec(G(cid:62) )(cid:62) σ + f (σ , E {v(∞)}).
E {(cid:107)v(n)(cid:107)2
lim
n→∞
Comparing expressions (79) and (80), we observe that to arrive at the MSD requires us to choose σ to satisfy
E {(cid:107)v(n)(cid:107)}2 .
This leads to expression (78).
(I (N L)2 − K ) σMSD =
1
N
vec(I LN ).
V I . S IMU LAT ION EXAM PL E S
(79)
(80)
(81)
In this section, we first conduct simulations on a simple network to illustrate the proposed algorithm and the analytical
performance models. Then, we provide several application-oriented examples where the proposed distributed learning strategy
may find applications. These experiments will illustrate the behavior and the advantage of the proposed strategy.
16
Fig. 2. Experimental setup. Left: network studied in Section VI-A, with 10 nodes divided into 4 different clusters. Right: input signal and
noise variances for each node.
A. Illustrative numerical example
In this subsection we provide an illustrative example to show how the proposed distributed algorithm converges over clustered
multitask network. We consider a network consisting of 10 nodes with the topology depicted in Figure 2 (left). The nodes
were divided into 4 clusters: C1 = {1, 2, 3}, C2 = {4, 5, 6}, C3 = {7, 8} and C4 = {9, 10}. Two-dimensional coefficient vectors
of the form w(cid:63)
Ci = wo + δwCi were chosen as wo = [0.5, −0.4](cid:62) , δwC1 = [0.0287, −0.005](cid:62) , δwC2 = [0.0234, 0.005](cid:62) ,
δwC3 = [−0.0335, 0.0029](cid:62) , and δwC4 = [0.0224, 0.00347](cid:62) . The regression inputs xk (n) were zero-mean 2 × 1 random
x,k I L , and the σ2
vectors governed by a Gaussian distribution with covariance matrices Rx,k = σ2
x,k shown in the top right plot
of Figure 2. The background noises zk (n) were i.i.d. zero-mean Gaussian random variables, independent of any other signals.
The corresponding variances σ2
z ,k are depicted in the bottom right plot of Figure 2.
Regularization strength ρk(cid:96) was chosen as ρk(cid:96) = Nk \C (k)−1 for (cid:96) ∈ Nk \C (k), and ρk(cid:96) = 0 for any other (cid:96). This
setting usually leads to asymmetrical regularization weights. We considered the diffusion algorithm with measurement diffusion
governed by a uniform matrix C such that c(cid:96)k = N(cid:96) ∩ C ((cid:96))−1 for k ∈ N(cid:96) ∩ C ((cid:96)). Likewise, a uniform A was used such that
a(cid:96)k = Nk ∩ C (k)−1 for (cid:96) ∈ Nk ∩ C (k).
The algorithm was run with different step-size and regularization parameters (µ, η) such as (0.01, 0.1), (0.05, 0.1) and
(0.01, 1). Simulation results were obtained by averaging 100 Monte-Carlo runs. Transient MSD curves were obtained by (71)
and (72). Steady-state MSD values were obtained by expression (78). It can be observed in the left plot of Figure 3 that the
models accurately match the simulated results.
These models were used to illustrate the performance of several learning strategies: 1) the non-cooperative LMS algorithm,
2) the multitask algorithm and 3) the clustered multitask algorithm. The non-cooperative algorithm was obtained by assigning
a cluster to each node and setting η = 0. The multitask algorithm was obtained by assigning a cluster to each node and setting
η (cid:54)= 0. The right plot of Figure 3 shows that the noncooperative algorithm has the largest MSD as nodes do not collaborate
for additional benefit. If estimation is performed without cluster information, but only with regularization between nodes as in
the case of the multitask diffusion LMS, it can be observed that the performance is better than in the non-cooperative case.
Finally, providing prior information to the clustered multitask network via an appropriate definition of clusters leads to the
13265971048w\x{FFFF}C1w\x{FFFF}C2w\x{FFFF}C3w\x{FFFF}C4123456789100.80.911.11.21.3
123456789100.080.090.10.110.12
best performance. Clustering strategies are not discussed in this paper. This will be investigated in future work. One strategy
is proposed in [42].
17
Fig. 3. Network performance illustration. Left: transient and steady-state MSD (model vs. Monte Carlo) for different step-sizes and
regularization parameters. Right: performance comparison for different strategies using theoretical models.
B. Distributed spectrum estimation with multi-antenna devices
We now consider an example of distributed spectral sensing using the clustered multitask diffusion LMS. Cognitive radio
systems involve two types of users: primary users (PU) and secondary users (SU). Secondary users are allowed to detect
and temporarily occupy unused frequency bands provided that they do not cause harmful interference to primary users [56].
Therefore, secondary users need to sense spectral bands that are occupied by active primary users. In [2], [57], collaborative
spectral sensing was studied with single-antenna nodes via the diffusion strategy. In this subsection, we explore a distributed
spectral sensing method over the network with multi-antenna devices.
Consider a communication environment consisting of NP primary users and NS secondary users, each secondary user being
equipped with NR antennas. We assume that the power spectrum of the signal transmitted by each primary user q can be
NB(cid:88)
represented as a linear combination of NB basis functions weighted by the weights αqm , namely,
S q (f ) =
αqm φm (f )
(cid:33)
(cid:32) NB(cid:88)
m=1
NP(cid:88)
The power spectrum of the signal received at the (cid:96)-th antenna of device k is given by
αqm φm (f )
m=1
q=1
where pk(cid:96),q is the path loss factor between the primary user q and the (cid:96)-th antenna of node k , and σ2
k(cid:96) is the receiver noise
power.
At each time instant, the (cid:96)-th antenna of device k gets measurements of the power spectrum Rk(cid:96) (f ) over NF frequency
samples. Assume that the receiver noise power can be estimated with high accuracy using energy detection over an idle band.
(cid:33)
(cid:32) NB(cid:88)
NP(cid:88)
Then, at instant n, we can define the reference signal on this antenna element at the j -th frequency band by
αqm φm (fj )
m=1
q=1
j = 1, . . . , NF
+ zk(cid:96),j (n)
rk(cid:96),j (n) =
pk(cid:96),q
Rk(cid:96) (f ) =
pk(cid:96),q
+ σ2
k(cid:96)
(82)
(83)
(84)
for
02004006008001000−35−30−25−20−15−10−50IterationnMSD(dB) µ=0.01,η=0.1µ=0.1,η=0.1µ=0.1,η=1SimulatedMSDTheoreticalMSDSteadystateMSD02004006008001000−35−30−25−20−15−10−5 MSD(dB)IterationnNon-cooperativealgo.Multitaskalgo.(η=2)Clusteredmultitaskalgo.(η=0)Clusteredmultitaskalgo.(η=0.3)18
where zk(cid:96),j (n) is the sampling noise, assumed to be zero-mean Gaussian with variance σ2
zk(cid:96),j . We denote by Φ the NF × NB
matrix of basis functions with j -th row defined by [φ1 (fj ), . . . , φNB (fj )], and let
Φk(cid:96) = [pk(cid:96),1 , . . . , pk(cid:96),NP ] ⊗ Φ.
We collect coefficients αqm into the vectors αq = [αq1 , . . . , αqNB ](cid:62) and α = [α(cid:62)1 , . . . , α(cid:62)NP ](cid:62) , measurements rk(cid:96),j (n) into the
vector rk(cid:96) (n) = [rk(cid:96),1 (n), . . . , rk(cid:96),NF (n)](cid:62) , and noise samples zk(cid:96),j (n) into the vector zk(cid:96) (n) = [zk(cid:96),1 (n), . . . , zk(cid:96),NF (n)](cid:62) .
At time instant n, the model (84) can then be expressed in the following vector form
(85)
rk(cid:96) (n) = Φk(cid:96) α + zk(cid:96) (n)
(86)
for each antenna (cid:96) of each sensor node k , at each time instant n. Inverting the linear model (86) should allow each pair (k , (cid:96))
to estimate the solution α(n). However, in practice, the path loss factor pk(cid:96),q cannot be estimated accurately, or even estimated
due to failures of synchronization if the power of the received signal is lower than a certain threshold. Thus, Φk(cid:96) , depending
on the estimated path loss factors pk(cid:96),q , should be used instead of Φk(cid:96) in the model (86). In the experiment described hereafter,
we treat each multi-antenna device as a cluster of NR antennas because they are supposed to sense the same local spectrum. In
addition, we assume that each cluster is fully connected, i.e., with links between each pair of antennas. Existence of connections
between devices depends on their distance from one another. As a consequence, the number of intra-cluster neighbors for each
antenna element is NR , including itself, and the number of extra-cluster neighbors for each antenna element is NR times the
number of neighboring devices.
Estimating the spectrum in a noncooperative manner would lead to a local profile of the spectrum occupation, with hidden
node effects. We used our algorithm to circumvent this drawback. We considered a connected network composed of NP = 2
primary users and NS = 10 secondary users. Each secondary user was equipped with an antenna array of NR elements. The
topology of the network is shown in Figure 4. The secondary users sampled NF = 80 frequency bins. We used NB = 16
Gaussian basis functions defined as
φm (f ) = e−
(87)
(cid:107)2
(cid:107)f −fci
2σ2
b
with centers fci uniformly distributed along the frequency axis, and variance σ2
b = 0.0025. Vectors α1 and α2 were arbitrarily
set to α1 = [0(cid:62)10 0.4 0.38 0.4 0(cid:62)3 ](cid:62) and α2 = [0(cid:62)3 0.4 0.38 0.4 0(cid:62)10 ](cid:62) , where 0q is a q × 1 vector of zeros. The path loss factor
at instant n between the primary user q and the (cid:96)-th antenna of the secondary user k was set to pk(cid:96),q (n) = ¯pk,q + δpk(cid:96),q (n),
where ¯pk,q is the deterministic path loss factor determined by the distance between k and q via the free space propagation
model, i.e., the received signal power is inversely proportional to the squared distance to the transmitter, and δpk(cid:96),q (n) is a
zero-mean Gaussian variable with standard deviation 0.2 ¯pk,q , which served as the random fading among antenna elements.
In practice, the path loss factors have to be estimated. We considered that each antenna of the secondary user k was able to
estimate pk(cid:96),q (n) = ¯pk,q if ¯pk,q ≥ p0 , otherwise pk(cid:96),q (n) = 0 due to the loss of the synchronization. The noise zk(cid:96),j (n) was
assumed to be zero-mean Gaussian with the standard deviation 0.01. The antenna elements were considered as fully connected
on each device. The information exchange matrix C and the combination matrix A were arbitrarily set to uniform matrices,
as each multi-antenna device was considered as a cluster. Within each cluster, the regularization
with entries thus equal to 1
NR
parameter ρk(cid:96) was uniformly set to one over NR multiplied by the number of neighboring devices.
Our algorithm was run on the multi-antenna device network with different settings. In the left plot of Figure 5, a diffusion
strategy was applied within each device, without cooperation between devices (η = 0), for several numbers NR of antennas per
device. In the right plot of Figure 5, a diffusion strategy was applied within each device, and cooperation between devices was
19
Fig. 4. Cognitive radio network with multi-antenna devices.
promoted (η = 0.01). The step-sizes were adjusted so that the initial convergence rates were equivalent. It can be observed that
increasing the number of antennas, and promoting cooperation between the sets of antennas, allow to improve the performance
notably. Figure 6 provides the estimated power spectra for 4 of the 10 devices. Three learning strategies are considered: a non-
cooperative strategy (η = 0) with single-antenna devices (NR = 1), and a cooperative strategy (η = 0.01) with single-antenna
devices (NR = 1) and multi-antenna devices (NR = 4).
Red dashed curves represent ground-truth spectra transmitted by the primary users. An inspection of the device locations
in Figure 4 shows that the non-cooperative strategy is highly influenced by the local profile of power spectra. For instance,
device 8 was close to PU1 and far from PU2, and it poorly estimated the power spectra generated by PU2. Device 10 was not
able to estimate any spectrum because it was out of range for PU1 and PU2. Channel allocation relying on such local spectral
profile may have led to a hidden node effect. Cooperative strategies clearly provide more consistent results, and using multiple
antennas provides additional gain.
C. Distributed non-point target localization
The second application addresses the problem of target localization. Existing localization methods based on the diffusion
strategy assume point targets [2], [3]. However, in some situations, targets may not be reduced to a single point such as its
centroid. For instance, this includes the case where the target is a region of interest scanned by a laser light sheet. The algorithm
should be able to jointly estimate a series of coordinates that characterizes the target area.
The problem we considered is shown in Figure 7. The target was the arc of a circle with center wo . The angular resolution
of the nodes was denoted by δ . This means that arcs of the circle with solid angle δ were viewed as a single point wq by
the cluster Cq of nodes within the cone of axis (wo , wq ). Note that the distance between each node k ∈ Cq and wq can be
expressed in the inner product form
rkq = u(cid:62)kq (wq − pk )
(88)
1. . . .2. . . .3. . . .4. . . .5. . . .8. . . .9. . . .6. . . .7. . . .10. . . .PU2PU120
Fig. 5. MSD learning curves. Left: non-cooperating devices (η = 0). Right: cooperating devices (η = 0.01).
Fig. 6. PSD estimation. From top to bottom: estimate on nodes 3, 6, 8, and 10. From left to right: non-cooperative single-antenna system
(NR = 1, η = 0), cooperative single-antenna system (NR = 1, η = 0.01), cooperative multi-antenna system (NR = 4, η = 0.01).
where pk is the location of node k , and ukq is the unit-norm vector pointing from pk to wq . We assumed that sensors were
aware of their location pk . Let dkq = rkq + u(cid:62)kq pk , that is, dkq = u(cid:62)kq wq . The problem was thus to estimate w(cid:63)
q from noisy
input-output data (ukq (n), dkq (n)) collected by nodes k ∈ Cq . The model that was thus considered is given by [2]:
dkq (n) = u(cid:62)kq (n) w(cid:63)
q + vkq (n)
(89)
with ukq (n) = ukq + αk (n) u⊥kq + βk (n) ukq
with vkq (n) a zero-mean temporally and spatially i.i.d. Gaussian noise of variance σ2
v . Moreover, the measured direction vector
ukq (n) was assumed to be a noisy realization of the unit-norm vector pointing from pk to w(cid:63)
q , with αk (n) and βk (n) two
α and σ2
Gaussian random variables of variances σ2
β , respectively.
0100020003000400050006000−5−4.5−4−3.5−3−2.5−2−1.5−1−0.50IterationnMSD(dB) NR=4NR=2NR=10100020003000400050006000−25−20−15−10−50IterationnMSD(dB) NR=1NR=2NR=400.20.40.60.8100.20.4NormalizedfrequencyPSD(k=3)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=6)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=8)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=10)00.20.40.60.8100.20.4NormalizedfrequencyPSD(k=3)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=6)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=8)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=10)00.20.40.60.8100.20.4NormalizedfrequencyPSD(k=3)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=6)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=8)00.20.40.60.8100.20.40.6NormalizedfrequencyPSD(k=10)21
The multitask algorithm (33) was used to estimate the coordinates w(cid:63)
q for q ∈ {1, . . . , Q}, and to approximate the arc of
radius R. Each node was connected to its neighbors within its cluster and the adjacent clusters. We considered two network
topologies. In the first scenario, see the left-hand plot in Figure 8 (first row), 100 nodes ranging from 3R to 4R were grouped
into 10 clusters, with 10 nodes in each. The nodes were deployed uniformly with connections between neighbors. In the second
scenario, see the right-hand plot in Figure 8 (first row), 200 nodes ranging from 3R to 4R were grouped into 10 clusters, with
20 nodes in each cluster. The nodes were deployed randomly. For both experiments, the noise variances were set as follows:
v = 0.5, σ2
α = 0.1, and σ2
β = 0.01. We used an identity information exchange matrix C = I . The combination matrix A
σ2
was defined as a(cid:96)k = Nk ∩ C (k)−1 in order to average the estimates of within-cluster neighbors. The regularization strengths
ρk(cid:96) were set to ρk(cid:96) = Nk \C (k)−1 for (cid:96) ∈ Nk \C (k), with k (cid:54)= 1 and k (cid:54)= Q. Recall that C1 and CQ are boundary clusters,
and the specific regularization strengths ρ1(cid:96) = ρQ(cid:96) = 0 for all (cid:96) were used to preserve the configuration of the group.
We ran the non-cooperative algorithm, and the clustered multitask algorithm with η = 0.5 and η = 0.0005 for each scenario,
respectively. Figure 8 (second row) shows one realization of the estimated points wq for each arc. The cooperative algorithm
clearly outperformed the non-cooperative algorithm. Figure 8 (third row) compares the MSD of the two strategies mentioned
above, with the clustered multitask algorithm with η = 0. In this case, the diffusion strategy is applied independently in each
cluster, without inter-cluster interactions. This experiment clearly illustrates the advantage of fully cooperative strategies in this
problem.
Fig. 7. Target surface localization.
D. Distributed unmixing of hyperspectral data
Finally, we consider the problem of distributed unmixing of hyperspectral images using the multitask learning algorithm.
Hyperspectral imaging provides 2-dimensional spatial images over many contiguous bands. The high spectral resolution allows
to identify and quantify distinct materials from remotely observed data. In hyperspectral images, a pixel is usually a spectral
CqCq+2Cq+1Cq 1Cq 2w⇤q 1w⇤qw⇤q+1 w022
Fig. 8. Target surface localization. Left: uniform network. Right: randomly-distributed network. Row 1: network connectivity, with cluster
boundaries in green. Row 2: estimation results, red crosses for the non-cooperative algorithm, black circles for the cooperative algorithm.
Row 3: MSD learning curves.
−15−14−13−12−11−10−9−8−7−6−19−18−17−16−15−14−13−12−11−10−9XY−15−14−13−12−11−10−9−8−7−6−19−18−17−16−15−14−13−12−11−10−9XY−4−3.5−3−2.5−2−5−4.5−4−3.5−3XY−4−3.8−3.6−3.4−3.2−3−2.8−2.6−2.4−2.2−2−5−4.5−4−3.5−3XY050100150200250300350400−40−30−20−1001020IterationnMSD(dB) Non-cooperativealgo.Clusteredmultitaskalgo.(η=0)Clusteredmultitaskalgo.(η=0.5)050100150200250300350400−25−20−15−10−5051015IterationnMSD(dB) Non-cooperativealgo.Clusteredmultitaskalgo.(η=0)Clusteredmultitaskalgo.(η=5×10−4)23
mixture of several spectral signatures of pure materials, termed endmembers, due to limited spatial resolution of devices
and diversity of materials [58]. Although nonlinear mixture models have begun to support novel applications [59]–[61], the
linear mixture model is still widely used for determining and quantifying materials in sensed images due to its simpler physical
interpretation. With the linear mixture model, pixels can be decomposed as linear combinations of constituent spectra, weighted
by fractions of abundance.
To facilitate the presentation, we shall consider that the 3-dimensional hyperspectral image under study has been reshaped
into an L × N matrix Y = [y1 , . . . , yN ], with N the number of pixels and L the number of wavelengths. Let M be the
L × R matrix of endmember spectra, with R the number of endmembers, and W = [w1 , . . . , wN ] the R × N matrix of the
abundance vectors of the pixels in Y . The linear mixture model is expressed by
Y = M W + V
(90)
where V = [v1 , . . . , vn ] is the modeling error matrix. Suppose that the material signatures (matrix M ) in a scene have been
determined by some endmember extraction algorithm [62]–[64]. The unmixing problem boils down to estimating the abundance
vector associated with each pixel. Besides minimizing the modeling error, it is important to promote similarities of abundance
(cid:88)
N(cid:88)
vectors between neighboring pixels due to their possible correlations. Now we write the unmixing problem as follows:
W (cid:107)Y − M W (cid:107)2
min
F + η
j∈Nk
k=1
subject to wk (cid:60) 0
and 1(cid:62)wk = 1 with 1 ≤ k ≤ N ,
F is the matrix Frobenius norm, Nk is the set of neighbors of pixel k , η is the spatial regularization parameter
where (cid:107) · (cid:107)2
and ρkj is the regularization weights. In the above expression, the nonnegativity constraints and sum-to-one constraints are
imposed to ensure physical interpretability of the vectors of fractional abundances.
ρkj (cid:107)wk − wj (cid:107)1
(91)
wk (n + 1) = P(cid:96)+
1
(92)
wk (n) + µ M (cid:62) (yk − M wk (n)) − µ η
To conduct linear unmixing of large images in a distributed way, we considered each sensor of the camera as a node,
and we applied the diffusion LMS for multitask problems, that is, one node per cluster – see Figure 9. In order to exploit
the spatial correlations, we defined the regularization function ∆(wk , wj ) as the (cid:96)1 -norm of wk − wj to promote piecewise
constant transitions in the fractional abundance of each endmember among neighboring pixels. Similar regularization can be
(cid:17)
(cid:16)
(cid:88)
found in [65], [66]. This led us to the following algorithm:
j∈Nk
where we used that the subgradient ∂x (cid:107)x(cid:107)1 = sgn(x), with sgn(·) the component-wise sign function. In this expression,
(·) denotes the iterative operator defined in [67] that projects a vector onto the nonnegative phase of the (cid:96)1 -ball to satisfy
P(cid:96)+
1
the nonnegativity and sum-to-one constraint in (91). This algorithm clearly contrasts with existing batch approaches based on
FISTA [68] and ADMM [69], which cannot easily address large problems (90).
The algorithm (92) was run on a data cube containing 100 × 100 mixed pixels. Each pixel was generated by the linear
mixture model (91) using 9 endmember signatures randomly selected from the spectral library ASTER [70]. Each signature
of this library has reflectance values measured over 224 spectral bands, uniformly distributed in the interval 3 − 12 µm. The
abundance maps of the endmembers are the same as for the image DC2 in [69]. Among these 9 materials, only the 1st, 6th, 8th,
and 9th abundances are considered for pictorial illustration in Figure 11. The first row of this figure depicts the true distribution
of these 5 materials. Spatially homogeneous areas with sharp transitions can be clearly observed. The generated scene was
ρkj sgn(wk (n) − wj (n))
24
Fig. 9. Hyperspectral image unmixing problem with first-order connections between neighboring nodes.
corrupted by a zero-mean white Gaussian noise vn with an SNR level of 20 dB. In this experiment, the regularization weights
ρkj were set equal to the normalized spectral similarity:
(cid:80)
ρkj =
(93)
θ(yk , y j )
−
θ(yk , y (cid:96) )
k
(cid:96)∈N
y(cid:62)
k yj
where θ(yk , y j ) =
. These weights emphasize the regularization between similar pixels and de-emphasize it for less
(cid:107)yk (cid:107)(cid:107)yj (cid:107)
similar pixels. When one knows the ground truth map, a commonly used performance measure for evaluating the performance
(cid:118)(cid:117)(cid:117)(cid:116) 1
of an unmixing algorithm is the root mean-square error (RMSE), defined as
N(cid:88)
N R
n=1
The RMSE learning curves using algorithm (92), with spatial regularization (η = 0.05) and without spatial regularization
(η = 0), are depicted in Figure 10. The corresponding abundance distributions are shown in Figure 11. The spatial regularization
results in a lower estimation error, and more homogenous abundance distribution maps with less noise.
n(cid:107)2 .
(cid:107)wn − w(cid:63)
RMSE =
V I I . CONC LU S ION AND PER S PEC T IV E S
In this paper, we formulated multi-task problems where networks are able to handle situations beyond the case where the
nodes estimate a unique parameter vector over the network. Considering each parameter vector estimation as a task, and
possibly connecting these tasks in order that they can share information, we extended the distributed learning problem from
single-task learning to clustered multitask learning. An algorithm was derived. A mean behavior analysis of the proposed
algorithm was provided, in the case of the least-mean-square error criterion with (cid:96)2 -norm regularization. Several applications
that may benefit from this framework were investigated. Several open problems still have to be solved for specific applications.
For instance, it would be interesting to show which regularization can be advantageously used with our distributed multitask
algorithm, and how they can be efficiently implemented in an adaptive manner. It would also be interesting to investigate how
nodes can autonomously adjust regularization parameters to optimize the learning performance and how they can learn the
structure of the clusters in real-time.
wiwjwkwpw\x{FFFF}25
Fig. 10. RMSE curve comparison.
Fig. 11. Abundance maps. From left to right: 1st, 6th, 8th, and 9th abundances. From top to bottom: true abundances, estimated abundances
without and with spatial regularization.
[1] A. H. Sayed, S.-Y Tu, J. Chen, X. Zhao, and Z. Towfic, “Diffusion strategies for adaptation and learning over networks,” IEEE Signal
Processing Magazine, vol. 30, no. 3, pp. 155–171, May 2013.
R E F ER ENC E S
02004006008001000120014001600180020000.020.040.060.080.10.120.140.160.180.20.22IterationnRMSE WithoutspatialregularizationWithspatialregularization(λ=0.05)00.20.40.60.8100.20.40.60.8100.20.40.60.8126
[2] A. H. Sayed, “Diffusion adaptation over networks,” in Academic Press Libraray in Signal Processing, R. Chellapa and S. Theodoridis,
Eds., pp. 322–454. Elsevier, 2013. Also available as arXiv:1205.4220 [cs.MA], May 2012.
[3] S.-Y. Tu and A. H. Sayed, “Mobile adaptive networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 4, pp.
649–664, August 2011.
[4] J. Tsitsiklis and M. Athans, “Convergence and asymptotic agreement in distributed decision problems,” IEEE Transactions on Automatic
Control, vol. 29, no. 1, pp. 42–50, January 1984.
[5] L. Xiao and S. Boyd, “Fast linear iterations for distributed averaging,” System & Control letters, vol. 53, no. 9, pp. 65–78, September
2004.
[6] P. Braca, S. Marano, and V. Matta, “Running consensus in wireless sensor networks,” in Proc. International Conference on Information
Fusion (FUSION), Cologne, Germany, June-July 2008, pp. 1–6.
[7] A. Nedic and A. Ozdaglar, “Distributed subgradient methods for multi-agent optimization,” IEEE Transactions on Automatic Control,
vol. 54, no. 1, pp. 48–61, January 2009.
[8] S. Kar and J. M. F. Moura, “Distributed consensus algorithms in sensor networks: Link failures and channel noise,” IEEE Transactions
on Signal Processing, vol. 57, no. 1, pp. 355–369, January 2009.
[9] K. Srivastava and A. Nedic, “Distributed asynchronous constrained stochastic optimization,” IEEE Journal of Selected Topics in Signal
Processing, vol. 5, no. 4, pp. 772–790, August 2011.
[10] D. P. Bertsekas, “A new class of incremental gradient methods for least squares problems,” SIAM Journal on Optimization, vol. 7, no.
4, pp. 913–926, November 1997.
[11] A. Nedic and D. P. Bertsekas, “Incremental subgradient methods for nondifferentiable optimization,” SIAM Journal on Optimization,
vol. 12, no. 1, pp. 109–138, July 2001.
[12] M. G. Rabbat and R. D. Nowak, “Quantized incremental algorithms for distributed optimization,” IEEE Journal of Selected Topics in
Areas in Communications, vol. 23, no. 4, pp. 798–808, April 2005.
[13] D. Blatt, A. O. Hero, and H. Gauchman, “A convergent incremental gradient method with constant step size,” SIAM Journal on
Optimization, vol. 18, no. 1, pp. 29–51, February 2007.
[14] C. G. Lopes and A. H. Sayed, “Incremental adaptive strategies over distributed networks,” IEEE Transactions on Signal Processing,
vol. 55, no. 8, pp. 4064–4077, August 2007.
[15] C. G. Lopes and A. H. Sayed, “Diffusion least-mean squares over adaptive networks: Formulation and performance analysis,” IEEE
Transactions on Signal Processing, vol. 56, no. 7, pp. 3122–3136, July 2008.
[16] F. S. Cattivelli and A. H. Sayed, “Diffusion LMS strategies for distributed estimation,” IEEE Transactions on Signal Processing, vol.
58, no. 3, pp. 1035–1048, March 2010.
[17] J. Chen and A. H. Sayed, “Diffusion adaptation strategies for distributed optimization and learning over networks,” IEEE Transactions
on Signal Processing, vol. 60, no. 8, pp. 4289–4305, August 2012.
[18] J. Chen and A. H. Sayed, “Distributed Pareto optimization via diffusion strategies,” IEEE Journal of Selected Topics in Signal
Processing, vol. 7, no. 2, pp. 205–220, April 2013.
[19] S.-Y. Tu and A. H. Sayed, “Diffusion strategies outperform consensus strategies for distributed estimation over adaptive netowrks,”
IEEE Transactions on Signal Processing, vol. 60, no. 12, pp. 6217–6234, December 2012.
[20] S.-Y. Tu and A. H. Sayed, “Adaptive networks with noisy links,” in Proc. IEEE Global Telecommunications Conference (GLOBECOM),
Houston, TX, December 2011, pp. 1–5.
[21] A. Khalili, M. A. Tinati, A. Rastegarnia, and J. A. Chambers, “Steady-state analysis of diffusion LMS adaptive networks with noisy
links,” IEEE Transactions on Signal Processing, vol. 60, no. 2, pp. 974–979, February 2012.
[22] X. Zhao, S.-Y. Tu, and A. H. Sayed, “Diffusion adaptation over networks under imperfect information exchange and non-stationary
data,” IEEE Transactions on Signal Processing, vol. 60, no. 7, pp. 3460–3475, July 2012.
[23] P. Di Lorenzo, S. Barbarossa, and A. H. Sayed, “Sparse diffusion lms for distributed adaptive estimation,” in Proc. 37th IEEE
International Conference on Acoustics, Speech and Signal Processing (ICASSP), Kyoto, Japan, March 2012, pp. 3281–3284.
27
[24] Y. Liu, C. Li, and Z. Zhang, “Diffusion sparse least-mean squares over networks,” IEEE Transactions on Signal Processing, vol. 60,
no. 8, pp. 4480–4485, August 2012.
[25] S. Chouvardas, K. Slavakis, Y. Kopsinis, and S. Theodoridis, “A sparsity-promoting adaptive algorithm for distributed learning,” IEEE
Transactions on Signal Processing, vol. 60, no. 10, pp. 5412–5425, October 2012.
[26] P. Di Lorenzo and A. H. Sayed, “Sparse distributed learning based on diffusion adaptation,” IEEE Transactions on Signal Processing,
vol. 61, no. 6, pp. 1419–1433, March 2013.
[27] S. Chouvardas, K. Kalvakis, and S. Theodoridis, “Adaptive robust distributed learning in diffusion sensor networks,” IEEE Transactions
on Signal Processing, vol. 59, no. 10, pp. 4692–4707, October 2011.
[28] F. Cattivelli, C. G. Lopes, and A. H. Sayed, “Diffusion recursive least-squares for distributed estimation over adaptive networks,” IEEE
Transactions on Signal Processing, vol. 56, no. 5, pp. 1865–1877, May 2008.
[29] A. Bertrand, M. Moonen, and A. H. Sayed, “Diffusion bias-compensated RLS estimation over adaptive networks,” IEEE Transactions
on Signal Processing, vol. 59, no. 11, pp. 5212–5224, November 2011.
[30] P. Chainais and C. Richard,
“Distributed dictionary learning over a sensor network,”
Automatique (CAP), Lille, France, July 2013, pp. 1–6.
in Proc. Conf ´erence sur l’APprentissage
[31] P. Chainais and C. Richard, “Learning a common dictionary over a sensor network,” in Proc. IEEE International Workshop on
Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), Saint Martin, France, December 2013, pp. 1–4.
[32] W. Wee and I. Yamada, “A proximal splitting approach to regularized distributed adaptive estimation in difffusion network,” in
Proc. 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Vancouver, Canada, May 2013, pp.
5420–5424.
[33] J. Predd, S. Kulkarni, and H. Vincent Poor, “Distributed learning in wireless sensor networks,” IEEE Signal Processing Magazine,
vol. 23, no. 4, pp. 59–69, July 2006.
[34] C. Richard, J.-C. M. Bermudez, and P. Honeine, “Online prediction of time series data with kernels,” IEEE Transactions on Signal
Processing, vol. 57, no. 3, pp. 1058–1067, 2009.
[35] P. Honeine, C. Richard, and J.-C. M. Bermudez, “Online nonlinear sparse approximation of functions,” in Proc. IEEE International
Symposium on Information Theory (ISIT), Nice, France, June 2007, pp. 956–960.
[36] P. Honeine, C. Richard, H. Snoussi, J.-C. M. Bermudez, and J. Chen, “A decentralized approach for non-linear prediction of time series
data in sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2010, no. 1, pp. 6247372, April 2010.
[37] P. Honeine, C. Richard, J.-C. M. Bermudez, H. Snoussi, M. Essoloh, and F. Vincent, “Functional estimation in Hilbert space for
distributed learning in wireless sensor networks,” in Proc. IEEE International Conference on Acoustics, Speech and Signal Processing
(ICASSP), Taipei, Taiwan, April 2009, pp. 2861–2864.
[38] P. Honeine, M. Essoloh, C. Richard, and H. Snoussi, “Distributed regression in sensor networks with a reduced-order kernel model,”
in Proc. IEEE Global Telecommunications Conference (GLOBECOM), New Orleans, LO, USA, 2008, pp. 1–5.
[39] P. Honeine, C. Richard, J.-C. M. Bermudez, and H. Snoussi, “Distributed prediction of time series data with kernels and adaptive
filtering techniques in sensor networks,” in Proc. 44th Asilomar Conference on Signals, Systems and Computers (ASILOMAR), Pacific
Grove, CA, USA, 2008, pp. 246–250.
[40] J. Chen, C. Richard, P. Honeine, and J.-C. M Bermudez, “Non-negative distributed regression for data inference in wireless sensor
networks,” in Proc. 44th Asilomar Conference on Signals, Systems, and Computers (ASILOMAR), Pacific Grove, CA, USA, November
2010, pp. 451–455.
[41] S.-Y. Tu and A. H. Sayed, “Adaptive decision making over complex networks,” in Proc. 46th Asilomar Conference on Signals, Systems,
and Computers (ASILOMAR), Pacific Grove, CA, USA, November 2012, pp. 525–530.
[42] X. Zhao and A. H. Sayed, “Clustering via diffusion adaptation over networks,” in Proc. International Workshop on Cognitive Information
Processing (CIP), Parador de Baiona, Spain, May 2012, pp. 1–6.
28
[43] N. Bogdanovi ´c, J. Plata-Chaves, and K. Berberidis, “Distributed incremental-based LMS for node-specific parameter estimation over
adaptive networks,” in Proc. 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Vancouver,
Canada, May 2013, pp. 5425–5429.
[44] J. Chen, L. Tang, J. Liu, and J. Ye, “A convex formulation for leaning shared structures from muliple tasks,” in Proc. 26th Annual
International Conference on Machine Learning (ICML), Montreal, Canada, Juin 2009, pp. 137–144.
[45] O. Chapelle, P. Shivaswmy, K. Q. Vadrevu, S. Weinberger, Y. Zhang, and B. Tseng, “Multi-task learning for boosting with application
to web search ranking,” in Proc. 16th ACM SIGKDD international conference on Knowledge discovery and data mining, Washington
DC, USA, July 2010, pp. 1189–1198.
[46] J. Zhou, L. Yuan, J. Liu, and J. Ye, “A multi-task learning formulation for predicting disease progression,” in Proc. 17th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, San Diego, CA, USA, August 2011, pp. 814–822.
[47] J. Chen and C. Richard, “Performance analysis of diffusion LMS in multitask networks,” in Proc. IEEE International Workshop on
Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), Saint Martin, France, December 2013, pp. 1–4.
[48] T. Evgeniou and M. Pontil, “Regularized multi-task learning,” in Proc. 10th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, Seattle, WA, USA, August 2004.
[49] S. Ji and J. Ye, “An accelerated gradient method for trace norm minimization,” in Proc. 26th Annual International Conference on
Machine Learning (ICML), Prague, Czech Republic, August 2009, pp. 457–464.
[50] J. Zhou, J. Chen, and Ye, “Clustered multi-task learning via alternating structure optimization,” in Advances in Neural Information
Processing Systems 24, J. Shawe-Taylor, R. S. Zemel, P. Bartlett, F. C. N. Pereira, and K. Q. Weinberger, Eds., pp. 702–710. 2011.
[51] T. Basar and G. J. Olsder, Dynamic Noncooperative Game Theory, London : Academic press, 2nd edition, 1995.
[52] J. B. Rosen, “Existence and uniqueness of equilibrium points for concave n-person games,” Econometrica: Journal of the Econometric
Society, vol. 33, no. 3, pp. 520–534, 1965.
[53] S. Theodoridis, K. Slavakis, and I. Yamada, “Adaptive learning in a world of projections,” IEEE Signal Processing Magazine, vol. 28,
no. 1, pp. 97–123, January 2011.
[54] J. Chen, C. Richard, J.-C. M. Bermudez, and P. Honeine, “Nonnegative least-mean-square algorithm,” IEEE Transactions on Signal
Processing, vol. 59, no. 11, pp. 5225–5235, November 2011.
[55] A. H. Sayed, Adaptive Filters, John Wiley & Sons, 2008.
[56] M. Joseph and J. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communications, vol. 6, no.
4, pp. 13–18, August 1999.
[57] P. Di Lorenzo, S. Barbarossa, and A. H. Sayed, “Bio-inspired decentralized radio access based on swarming mechanisms over adaptive
networks,” IEEE Transactions on Signal Processing, vol. 61, no. 12, pp. 3183–3197, June 2013.
[58] N. Keshava and J. F. Mustard, “Spectral unmixing,” IEEE Signal Processing Magazine, vol. 19, no. 1, pp. 44–57, January 2002.
[59] J. M. Bioucas-Dias, A. Plaza, N. Dobigeon, M. Parente, Q. Du, P. Gader, and J. Chanussot, “Hyperspectral unmixing overview:
geometrical, statistical, and sparse regression-based approches,” IEEE Journal of Selected Topics in Applied Earth Observations and
Remote Sensing, vol. 5, no. 2, pp. 354–379, April 2012.
[60] J. Chen, C. Richard, and P. Honeine, “Nonlinear unmixing of hyperspectral data based on a linear-mixture/nonlinear-fluctuation model,”
IEEE Transactions on Signal Processing, vol. 61, no. 2, pp. 480–492, January 2013.
[61] J. Chen, C. Richard, and P. Honeine, “Estimating abundance fractions of materials in hyperspectral images by fitting a post-nonlinear
mixing model,” in Proc. 5th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing (WHISPERS),
Gainesville, F, USA, Juin 2013, pp. 1–4.
[62] M. E. Winter, “N-FINDR: an algorithm for fast autonomous spectral end-member determination in hyperspectral data,” in Proc. SPIE
3753, Imaging Spectrometry V, October 1999, vol. 266, pp. 266–275.
[63] J. M. P. Nascimento and J. M. Bioucas-Dias, “Vertex Component Analysis: A fast algorithm to unmix hyperspectral data,” IEEE
Transactions on Geoscience and Remote Sensing, vol. 43, no. 4, pp. 898–910, April 2005.
29
[64] P. Honeine and C. Richard, “Geometric unmixing of large hyperspectral images: A barycentric coordinate approach,” IEEE Transactions
on Geoscience and Remote Sensing, vol. 50, no. 6, pp. 2185–2195, June 2012.
[65] J. Chen, C. Richard, and P. Honeine, “Nonlinear estimation of material abundances in hyperspectral images with (cid:96)1 -norm spatial
regularization,” IEEE Transactions on Geoscience and Remote Sensing, 2013, (to appear).
[66] J. Chen, C. Richard, A. Ferrari, and P. Honeine, “Nonlinear unmixing of hyperspectral data with partially linear least-squares support
vector regression,” in Proc. 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Vancouver,
Canada, May 2013, pp. 2174–2178.
[67] J. Duchi, S. Shalev-Shwartz, Y. Singer, and T. Chandra, “Efficient projections onto the (cid:96)1 -ball for learning in high dimensions,” in
Proc. 25th International Conference on Machine Learning, Helsinki, Finland, July 2008, pp. 272–279.
[68] A. Beck and M. Teboulle, “A fast iterative shrinkage-thresholding algorithm for linear inverse problems,” SIAM Journal on Imaging
Sciences, vol. 2, no. 1, pp. 183–202, March 2009.
[69] M.-D. Iordache, J. Bioucas-Dias, and A. Plaza, “Total variation spatial regularization for sparse hyperspectral unmixing,” IEEE
Transactions on Geoscience and Remote Sensing, vol. 50, no. 11, pp. 4484–4502, November 2012.
[70] A. M. Baldridge, S. J. Hook, C. I. Grove, and G. Rivera, “The ASTER spectral library version 2.0,” Remote Sensing of Environment,
vol. 113, no. 4, pp. 711–715, April 2009.
|
1906.07588 | 2 | 1906 | 2019-07-08T08:31:24 | Shared Autonomous Vehicle Simulation and Service Design | [
"cs.MA"
] | Today, driverless cars, as a new technology that allows a more accessible, dynamic and intelligent form of Shared Mobility, are expected to revolutionize urban transportation. One of the conceivable mobility services based on driverless cars is shared autonomous vehicles (SAVs). This service could merge cabs, carsharing, and ridesharing systems into a singular transportation mode. However, the success and competitiveness of future SAV services depend on their operational models, which are linked intrinsically to the service configuration and fleet specification. In addition, any change in operational models will result in a different demand. Using a comprehensive framework of SAV simulation in a multi-modal dynamic demand system with integrated SAV user taste variation, this study evaluates the performance of various SAV fleets and vehicle capacities serving travelers across the Rouen Normandie metropolitan area in France. Also, the impact of ridesharing and rebalancing strategies on service performance is investigated.Research results suggest that the performance of SAV is strongly correlated with the fleet size and the strategy of individual or shared rides. Further analysis indicates that for the pricing scheme proposed in this study (i.e., 20% lower for ridesharing scenario), the standard 4-seats car with shared ride remains the best option among all scenarios. The results also underline that enabling vehicle-rebalancing strategies may have an important effect on both user and service-related metrics. The estimated SAV average and maximum driven distance prove the importance of vehicle range and charging station deployment. | cs.MA | cs | Shared Autonomous Vehicle Simulation and Service Design
Reza Vosooghia,b,*, Jakob Puchingera,b, Marija Jankovicb, Anthony Vouillonc
aInstitut de Recherche Technologique SystemX, Palaiseau 91120, France
bLaboratoire Génie Industriel, CentraleSupeléc, Université Paris-Saclay, Gif-sur-Yvette 91190, France
cDirection de la Recherche / Nouvelles Mobilité (DEA-IRM), Technocentre Renault, Guyancourt 78280, France
Abstract
Today, driverless cars, as a new technology that allows a more accessible, dynamic and intelligent form of Shared Mobility,
are expected to revolutionize urban transportation. One of the conceivable mobility services based on driverless cars is
shared autonomous vehicles (SAVs). This service could merge cabs, carsharing, and ridesharing systems into a singular
transportation mode. However, the success and competitiveness of future SAV services depend on their operational models,
which are linked intrinsically to the service configuration and fleet specification. In addition, any change in operational
models will result in a different demand. Using a comprehensive framework of SAV simulation in a multi-modal dynamic
demand system with integrated SAV user taste variation, this study evaluates the performance of various SAV fleets and
vehicle capacities serving travelers across the Rouen Normandie metropolitan area in France. Also, the impact of ridesharing
and rebalancing strategies on service performance is investigated.
Research results suggest that the performance of SAV is strongly correlated with the fleet size and the strategy of individual
or shared rides. Further analysis indicates that for the pricing scheme proposed in this study (i.e., 20% lower for ridesharing
scenario), the standard 4-seats car with shared ride remains the best option among all scenarios. The results also underline
that enabling vehicle-rebalancing strategies may have an important effect on both user and service-related metrics. The
estimated SAV average and maximum driven distance prove the importance of vehicle range and charging station
deployment.
Keywords: Shared autonomous vehicle; Multi-agent simulation; Demand modeling; Service performance
1. Introduction
Driverless cars or autonomous vehicles (AVs) represent a transformative technology that may have important
implications for society, urban mobility, economy, and environment (Fagnant and Kockelman, 2015, 2014;
Greenblatt and Shaheen, 2015). The fact that this technology is driverless and accordingly available every time
and every place makes us assume that they are rather shared and consequently easily accessible and affordable
for all (Fagnant et al., 2015; Harper et al., 2016; Meyer et al., 2017). After several years of growing interest in
AVs by car manufacturers investing millions of dollars to develop driverless cars, gaining expertise of operation
of future shared autonomous vehicles (SAVs) is a major concern. Their goal is to play the role of an operator of
vehicle sharing systems with new business models capturing profit per kilometer or per trip (Burns et al., 2013;
Firnkorn and Müller, 2012; Stocker and Shaheen, 2018). Although several SAV services are conceivable, it yet
is largely unclear which ones will prevail in term of efficiency and effectiveness.
Today's mostly experimental SAV services are modified versions of ordinary electric cars with four or five
seats inside. However, it is still uncertain how the most efficient design of these vehicles would look like. In
addition to the vehicle characteristics and features, operational aspects of this new service could intensely
influence its success. Some configurational characteristics such as fleet size, allocation and relocation strategies,
service area, and infrastructures have a direct impact on the parameters that are important for mode choice decision
of travelers. Although travel time and cost are the most important parameters in this regard, in the case of a shared
system, some other parameters such as wait times and detour times (in the ride share mode) are of great
significance. Moreover, the variation of individuals' attitude toward using this system may significantly affect
service performance. In particular, the absence of a driver in SAV may generate an important concern for travelers
and consequently result in lower demand. Thus, all of these parameters have to be considered in the upstream
planning for having an accurate estimation of service performance measures.
Thanks to recently developed approaches, especially multi-agent simulation, parameters important for mode
choice decision of travelers can be reflected at a fine-grained level. Potentially, earlier multi-agent activity-based
simulations are able to consider the complex supply-demand relationships of the multi-modal transportation
* Corresponding author. Tel.: +33-6-6597-4453.
E-mail address: [email protected]
2
system. Various aspects of operating future SAVs are the subject of current research efforts based upon this
approach. In particular, some in-depth investigations have been recently carried out on SAV fleet optimization,
rebalancing, and cost structures of operational models (Bösch et al., 2018; Hörl et al., 2019; Loeb and Kockelman,
2019). In several studies, the human-related side of driverless cars and their impacts on service demand have been
assessed (Kamel et al., 2018; Vosooghi et al., 2019). The impact of ridesharing on the operational efficiency of
SAV has also been the subject of few investigations (Farhan and Chen, 2018; Hörl, 2017). However, to the best
of our knowledge, none of these studies considers all affecting aspects of SAV operation at the same time. The
present research addresses this gap by conducting comprehensive dynamic demand simulations in a multimodal
network. The analysis of given simulation outputs allows investigating the effects of different operational
components and vehicle specifications (specifically vehicle capacity) on the efficiency of the offered service,
considering dynamic demand responsive to the network and the level-of-service (LoS) by integrating user taste
variations and value of travel time (VTT). The further contribution of the present research is designing an SAV
service upon a real-world case study and evaluating its performance using more relevant metrics. To respond to
the existing needs in the simulation and analysis, some features on traveler behavior and vehicle allocation and
relocation strategies are modified or developed beforehand. Simulation experiments are based upon the real data
for the transportation system of the Rouen Normandie metropolitan area in France using the multi-agent transport
simulation platform (MATSim).
The remainder of this paper is structured as follows. In Section 2, a review of the relevant literature on this
topic is presented. In Section 3, we present the model specification and setup process. In Section 4, overall results,
as well as detailed analysis categorized by each service aspect, are presented. Finally, in Section 5, insights gained
through this research are discussed and suggestions for further work are given.
2. Prior research
To date, numerous investigations have been conducted on SAV demand modeling and simulation particularly
in the last 5 years. Several approaches have been developed to anticipate the demand for future SAV services.
These approaches fall into two main categories: (i) survey and analysis, and (ii) agent-based simulation. The first
approach is mainly used to produce rough estimations of potential demand based on stated preferences surveys
(Bansal et al., 2016; Haboucha et al., 2017; Krueger et al., 2016). The second approach is widely employed for
various study purposes and particularly those related to the supply side of SAV services in the context of dynamic
demand simulation. The simulations based on the latter approach involve two different multidimensional decision
processes: (i) discrete choice modeling and (ii) co-evolutionary algorithm. Discrete choice modeling is based on
the assumption of random utility maximization, but co-evolutionary algorithm is more relied on finding
stochastically the maximized utility for various choice sets including not only travelers' route and mode choice
decisions, but also a set of activity decisions. The second group of simulations is known as activity-based multi-
agent simulation. Given the purpose of this study -- i.e., conducting comprehensive simulations considering all
factors affecting the designing of the SAV services -- we review multi-modal simulations incorporating dynamic
demand that are responsive to the network and traffic.
Several studies have integrated SAVs into the area where private cars are not allowed or they are all replaced
by the new service. Azevedo et al. (2016) proposed an integrated agent-based traffic simulator built on
disaggregated behavior models in both demand and supply (SimMobility) to study the potential impacts of
introducing autonomous mobility on demand (AMoD) service in a car-restricted zone of Singapore. In this work,
individual preferences to use autonomous vehicles were kept unchanged and only the cost of the service was
assumed as 40% less than the regular cab service of Singapore. The studied AMoD system employs autonomous
mid-size sedans without sharing rides. Their simulation is performed through some optimization processes in
terms of facility location, vehicle assignment and routing, and vehicle rebalancing. Their results suggest that
rebalancing results in higher demand. In addition, the passenger waiting time is strongly correlated with the fleet
size and number of parking stations. However, further growth of those variables has no more impacts once an
optimal demand is reached. Heilig et al. (2017) used an agent-based travel demand model with macroscopic traffic
simulation to evaluate the transportation system of the Stuttgart region where all the private cars are replaced by
an AMoD service. They performed simulation for more than one day (one week) and analyzed the changes in
overall transportation system performance. Furthermore, the fleet required to fulfill the demand is investigated.
In their simulation, the cost per mile of a proposed service is assumed 70% less compared to the private cars and
the user preferences are kept unchanged. The simulation encompasses the relocation strategy during nighttime,
and it is shown that total vehicle mileage decreases up to 20% after the introduction of a new AMoD service.
Martinez and Viegas (2017) tried to explore the potential outcomes of so-called radical change in urban mobility
configuration of Lisbon city after introducing Shared Mobility services based upon a spatially aggregated agent-
based simulation. In the simulated scenarios, all private mobility and conventional buses are replaced by
Autonomous Shared Taxis and Taxi-Buses. Their simulation incorporates several optimization models in order to
assign dynamically the vehicles or generate them if needed for a given day. Based on their results, it is inferred
that congestion and emissions would strongly decline by introducing those shared services. Chen and Kockelman
3
(2016) employed a multinomial logit mode choice model in an agent-based framework to asses various dynamic
pricing strategies on mode shares estimate of electric SAV in Austin, Texas. Due to the spatial aggregation, the
mentioned study ignores trips under one mile and non-motorized modes. Since SAV travelers can use their in-
vehicle time to do other activities, the value of travel time (VTT) for this mode in the mentioned study is
considered variable and dissimilar to transit. The simulation includes private cars, transit, and electric SAV.
According to the performed analysis, electric SAV modal share changes significantly by variations of VTT and
service fares. Besides, it is shown that some service operational metrics can be improved via targeted pricing
strategies. Wen et al. (2018) in a comprehensive study investigated the deployment of AV and SAV services as
the last-mile solution focusing on operation design. They employed a detailed nested logit structure for the mode
choice model. In their study, an agent-based simulation is used to estimate the LoSs. They showed that there exists
an important trade-off between fleet size, vehicle occupancy, and traveler experience in terms of service
availability and response time. Although the mentioned research incorporates SAV user preferences by varying
the alternative specific constant in the mode choice model, it includes only the unobserved (undetected)
parameters of mode choice decision and neglects user specific attributes.
All the above-mentioned studies incorporate discrete choice modeling as a traveler decision choice mechanism.
In some other studies, however, utility scoring is used instead. Hörl (2017) utilized MATSim to evaluate the
dynamic demand response of autonomous cab service. This researcher integrated two service operators into the
simulation and system performance and compared operational indicators. A fleet of 1000 AVs is introduced to
the transportation system of the city of Sioux Falls in all scenarios. The simulation results reveal that the service
with ridesharing attracts a larger number of travelers at off-peak hours. The user taste variation in the mentioned
study is kept unchanged. In our previous work, we used the same framework (MATSim) to explore the impact of
user trust and willingness-to-use on fleet sizing of SAV service integrating to the transportation system of Rouen
Normandie metropolitan area (Vosooghi et al., 2019). The simulation is performed using the categorized utility
scoring according to the individual sociodemographic attributes of users. Our previous work incorporates the first
dynamic demand simulation of SAV service considering the user taste variation. The mentioned study shows the
significant importance of traveler trust and willingness-to-use varying the SAV service use and the required fleet
size. This work benefits of several optimization models to assign the vehicles dynamically. However, the study
incorporates SAV services without ridesharing and rebalancing strategy.
Table 1 presents a summary of the mentioned studies stating their objectives and the main features.
Table 1
Summary of the selected literature on SAV demand modeling and service simulation.
Author(s), year
Demand estimation approach/
Mode choice mechanism
Vehicle
characteristics
SAV user
preferences
Assessment purposes
Azevedo et al.,
(2016)
Activity-based multi-agent
simulation/Hierarchical discrete choice
modeling
Mid-size sedans
w/o ridesharing
Unvaried
Impact assessment, determine the fleet
size and parking stations requirements
Chen and
Kockelman, (2016)
Activity-based multi-agent
simulation/Multinomial logit mode
choice modeling
NM
Variable
(willingness to pay,
the value of travel
time)
Heilig et al., (2017)
Activity-based multi-agent
simulation/Discrete choice modeling
Standard 4-seats
w/ ridesharing
Unvaried
Martinez and
Viegas, (2017)
Trip-based multi-agent
simulation/Discrete choice modeling
6-seats minivan
w/ ridesharing
Hörl, (2017)
Activity-based multi-agent
simulation/Utility scoring
Wen et al., (2018)
Trip-based multi-agent
simulation/Nested logit mode choice
modeling
Standard 4-seats
w/ and w/o
ridesharing
Standard 4-seats
w/ and w/o
ridesharing
Vosooghi et al.,
(2019)
Activity-based multi-agent
simulation/Categorized utility scoring
Standard 4-seats
w/o ridesharing
Sensitivity assessment of pricing
strategies E-SAVs mode shares
Impact assessment, determine the fleet
size
Impact assessment, impacts on car
fleet size, the volume of travel and
parking requirements, CO2 emissions
Dynamic demand response simulation
of AVs and SAVs
Variable (car
ownership, public
transport pass)
Unvaried
Variable (intrinsic
preference)
Design of last-mile AV and SAV
services integrated to public transit
Variable (age,
gender, and
household income)
Impact assessment of user preferences
on individual-ride SAV fleet sizing
Some other studies investigate the use of SAV services in a multi-modal system incorporating various
dispatching strategies or pricing schemes. However, the demand of the proposed services in these simulations is
not necessarily dynamic (Auld et al., 2017; Farhan and Chen, 2018; Hörl et al., 2019) or responsive to the traffic
states (Chen et al., 2016; Fagnant and Kockelman, 2018, 2014). Many other studies incorporate static or
predefined demands (Boesch et al., 2016; Fagnant and Kockelman, 2014; Levin et al., 2017) or simulate only one
mode (Bischoff and Maciejewski, 2016; Loeb and Kockelman, 2019; Zhang et al., 2015a). There are also large
in-depth investigations on AV dynamic assignment (Hyland and Mahmassani, 2018), ride-share matching
optimization problem (Agatz et al., 2011; Alonso-Mora et al., 2017), and SAV rebalancing and ridesharing
4
(Spieser et al., 2014; Zhang et al., 2015b). These studies focused rather on optimization problems and ignored
mode choice mechanism in a multi-modal context or time-dependency in travel time caused by congestion.
As shown in Table 1, most of earlier comprehensive simulations to investigate the operation of SAV service
are based on the homogeneous structure of behavior in terms of sociodemographic attributes, except our previous
work (Vosooghi et al., 2019) that incorporated only individual ride service. Hence, the vehicle characteristics and
specifically vehicle capacity and its impacts on SAV service performance have remained a missing component in
all prior studies. Service cost and the need for enabling rebalancing strategy have similarly received low attention.
Considering all mentioned SAV simulation features, to the best of our knowledge, the present study is the first
comprehensive investigation of a real-world scenario that could provide new insight into the design of such
service.
3. Model specification and set up
3.1. Simulation framework
In this work, the multi-agent transport simulation (MATSim) (Horni et al., 2016) and its Dynamic Vehicle
Routing Problem (DVRP) extension (including the Demand Responsive Transport (DRT) application) (Bischoff
et al., 2017; Maciejewski et al., 2017) are used. The main idea behind MATSim is the simulation of an artificial
population, represented by agents, who perform their respective plans including activities and movements between
activity locations throughout a day. The movements are simulated within a dynamic queue-based model in which
all agents interact dynamically with each other in a network (traffic simulation). At the end of the simulation day,
which usually exceeds 24 hours due to the longest activity chain, all agents evaluate the performance of the
executed plan by measuring and scoring the deviations from the initial plan and the utility of using a mode. This
process is called "utility scoring". In the next iterations, agents try to maximize their scores by modifying their
plans. This "re-planning" process is performed rather by using another mode and route or by ending an activity
sooner than at its planned end time. The more agents explore potential alternatives, the more they learn about their
optimal plans. Once the convergence on the total score is reached, agents stop to innovate their plans and try to
select one plan from their memorized set of plans and to find out the plan with the best score. This is repeated
until a systematic relaxation is reached.
Re-planning is usually done after the plan execution and traffic simulation. However, for the simulation of new
transportation systems and specifically those that need a cyclic re-computation of vehicle tasks and routes (e.g.
SAV, on-demand services with multiple requests), instant decisions must be made while the traffic simulation is
running. Such a decision making is possible is possible using dynamic agent module included in DVRP-DRT
extension (Maciejewski, 2016), which directly interacts with the traffic simulation of MATSim.
3.2. Ridesharing and rebalancing
In the present study, we used the dispatch algorithm of ridesharing developed by Bischoff et al. (2017) that
performs a centralized on-the-fly assignment of vehicles to on-demand requests. This optimizer returns a list of
requests and vehicle paths between pick-up and drop-off points. In order to route SAVs dynamically, an insertion
heuristic that aims to minimize the total SAVs workload is employed. The SAVs workload is measured as the
total time spent on handling requests. This leads to a lower detour for each user. The optimization process seeks
also to decrease vehicle usage for more requests, which results in more service availability and consequently
greater demand. During the simulation, when a new request is submitted, the algorithm searches the routes of all
vehicles for optimal insertions. An insertion is feasible when it satisfies the following conditions: (i) the overall
travel time constraints (including waiting and in-vehicle times) are satisfied for already inserted requests
(passenger(s) on board) and (ii) the expected boarding times for the awaiting and upcoming requests need to
remain within a defined time frame. All feasible insertions are then evaluated and the first insertion that offers the
smallest increase of vehicle work time will be selected. If no feasible insertion is found, the request is rejected. A
request can be rejected (e.g., due to constraints violation) only immediately after submission, and already accepted
requests cannot be rejected or re-scheduled.
We employed the rebalancing strategy that is included in the DRT extension of MATSim, which is based on
the Minimum Cost Flows problem. In this problem, one seeks to "optimize" the time-varying flows on each arc
between aggregated demand hubs and idle vehicles, taking into account congestion effects along arcs and at nodes.
Idle vehicles are relocated in regular intervals according to the estimated demand of the previous iteration. The
expected demand for the next 60 minutes is considered in the optimization process.
It is noteworthy that the selected dispatch and rebalancing algorithm may have a strong impact on service
performance indicators (Hörl et al., 2019; Hyland and Mahmassani, 2018). Particularly, when the demand for
SAV service is relatively high, applying simplified assignments (e.g. FIFO) can lead to the worst service
efficiency (Hyland and Mahmassani, 2018). However, we found that the employed strategies for vehicle
assignment and relocation are accurate enough for our purpose. Furthermore, it is of note that the multi-agent
5
simulation already adopts heuristic rules in feedback loops to achieve approximate convergence and consistency
between multidimensional decisions and network loading. Thus, it may require even more computational
resources to achieve equilibrium when very sophisticated heuristic rules are applied to find good assignment and
relocation of vehicles.
3.3. Inputs and model setup
As mentioned earlier, the main goal of the present study is to design an SAV service considering all affecting
operational and user-related aspects. For this purpose, the simulation inputs are based on real activity chains
replicating the traveler patterns and schedules derived from the transport survey and census. Fig. 1 illustrates the
overall framework. A synthetic population for the case study area is generated using an open source generator
developed in our work (Kamel et al., 2018) that applies fitness-based synthesizing with multilevel controls. Some
major attributes such as age, gender, household income range, and socio-professional category are used for
controls. These are the attributes with an important impact on SAV mode choice (Al-Maghraoui, 2019) or are the
joint attributes of synthetic population and activity models. The activity chains are then allocated to each synthetic
individual according to their socio-professional attributes. Based on transport survey analysis conducted for two
French case study areas (Paris and Rouen Metropolitan area), we found that the activity chains are significantly
correlated to those attributes (Kamel et al., 2019; Vosooghi et al., 2019). The socio-professional category consists
of six groups of persons: employed, unemployed, students, people under 14 years, retired, and homemakers. The
generated synthetic population is validated by comparing relative errors of the synthetic and real population in
each zone for estimated and given marginal data of each attribute.
For two main trip purposes (work and study), the fine-grained geographical zones of activity are given in the
census data. For other trip purposes, an origin-destination matrix based on the transport survey is estimated. Both
of these data are employed in the process of activity chain allocation. In the latter case, for each trip origin in each
zone, a destination zone according to the probability of trip purpose by socio-professional category is allocated.
Then, the activity's precise locations are randomly appointed along the zone in keeping with existing activity
types and land-use category.
Fig. 1. Synthetic population generation and activity chaining framework.
In MATSim, utility scoring is performed based on the Charypar-Nagel scoring method (Charypar and Nagel,
2005). The function includes both activity and leg scores. In conducted simulations, due to the lack of data only
legs' scoring utilities are set according to the utility functions estimated from the recent local transport survey
(EMD Métropole Rouen Normandie 2017) by employing a logit model. In addition to travel time (including
waiting time) and travel cost, user's car ownership, as well as parking availability at destination, were found to
be significant parameters in the mode choice model. Thus, they are incorporated into utility scoring. The detailed
list of parameters as well as the estimations is available in Vosooghi et al. (2019).
In the ridesharing algorithm, we set up the detours considering that the ride times can be extended up to 30%
of the direct distance. Bigger detour times for passengers are allowed only if their waiting times do not surpass
15 min. However, in that case, the SAV ride is more penalized in terms of utility (scoring). During the simulation,
the idle SAVs are rebalanced every 5 min. The size of square cells used for demand aggregation is assumed to be
1 km.
Activity Chain AnalysisPublic Use Microdata SampleTransport SurveySynthetic Population GenerationActivity Location AnalysisSynthetic Population with Allocated Located Daily Activity Chain (Plan)Facility DataJointed by socio-professional attributes and activity typesMissed attributes6
3.4. User taste variation
User taste variations were integrated into the model based on the methodology proposed in our previous work
(Vosooghi et al., 2019). In order to set up the model according to the travelers' perception and a tendency toward
using SAVs, an online survey was made in (Al-Maghraoui, 2019). Users' trust and subjective criteria behind their
willingness-to-use were identified. We found that the socio-professional and three other sociodemographic
attributes (i.e., income, age and gender) are significant to SAV taste variations among individuals. For instance,
the above-mentioned survey shows that in general men are more likely to use an SAV than women. Similarly,
younger persons are more likely to use SAVs compared to older ones. In order to integrate these variations into
the simulation, all the utility scoring and functions are estimated and set up separately for each group of users
within the same socio-professional category. The marginal time and cost-varying parameters in the scoring
function are then multiplied by the factors of user trust and willingness-to-use so that the score (utility) of SAV
for the similar trips varies according to the sociodemographic attributes of travelers including age, gender and
household income range.
3.5. Simulated scenarios
In order to apply our simulation to design an SAV service for a real-world scenario, we chose to consider the
Rouen Normandie metropolitan area (France) as the case study. Rouen was a fitting venue for at least three
reasons. First, we had access to the most recent transport survey (EMD Métropole Rouen Normandie 2017).
Second, the population (about 500,000 inhabitants) and the metropolitan area network sizes allow us to perform
the simulation with an acceptable downscaling rate (10%), which results in quite accurate outputs compared to
the full-scale model (Bischoff and Maciejewski, 2016). Actually, in some studies relying on agent-based
simulation and utility scoring, the population of case study areas is highly downscaled (1%) due to the high
computational time (Hörl et al., 2019; Kamel et al., 2019). This extensive downscaling may potentially affect the
service performance evaluations considering the spatiotemporal interaction of supply and demand in large study
areas. The third reason for choosing this area is that some experiments on self-driving cars are currently
undertaken; thus, it is possible to gain data on traveler behavior in a near future and to integrate them to the
extended simulations. Furthermore, Rouen Normandie metropolitan area is a promising candidate for replacing
existing private modes with an SAV service, especially in the Rouen old town.
To support the simulation of such a scenario, the synthetic population from the Public Use Microdata Sample
(INSEE 2014) was generated. Based on the local survey including 5,059 households and 11,107 individuals, 929
activity chains including eight trip purposes were found. As mentioned before, the activity chains and time profiles
were allocated to the synthetic individuals according to their socio-professional category.
The simulations were run for several fleet-size and fleet-capacity scenarios with and without considering
ridesharing or rebalancing strategies to appreciate system performance metrics. Regarding SAV, prices of 0.5
Euro per kilometer for the individual ride and 0.4 Euro per kilometer (direct distance) for ridesharing services are
assumed. These service prices are slightly more expensive than private car ride costs in France (0.3 Euro per
kilometer - DG Trésor (2018)). Moreover, they are almost similar to the values that have been estimated or
concluded in other investigations. For instance, Chen et al. (2016) estimated the price for electric SAV from $0.42
to $0.49 per person-trip-mile and Bösch et al. (2018) estimated it 0.43 CHF per passenger kilometer. In our study,
the SAV service waiting time is integrated to the utility scoring and the value of waiting time is considered 1.5
times larger than the value of in-vehicle travel time (Wardman et al., 2016). The SAV fleet is initially distributed
from four fixed points inside the city and out of old town. Therefore, no "warm-start" - as in Fagnant and
Kockelman (2014) - or random distribution are considered.
3.6. Performance metrics
Although a limited number of studies have simulated SAV service incorporating its dynamic demand, there are
several investigations on the performance evaluation of such a system. In this regard, a long list of performance
metrics has been used as well. These metrics do not necessarily have the same consequences. For instance, Fagnant
and Kockelman (2014) used traveler wait times in order to estimate required fleet sizes to serve various predefined
demands. Since the demand in their study is considered static, the wait times could be a relevant indicator to
evaluate the service performance. However, as shown in a more recent work of the same authors, the lower in-
vehicle and wait times in a simulation enabling dynamic ridesharing result in higher excess vehicle kilometer
traveled (VKT) (Fagnant and Kockelman, 2018) and therefore cannot be the only relevant indicators for the fleet
sizing. In this regard, traveler wait times have been used as a key indicator to define the optimum scenario in some
other dynamic demand simulations (e.g. in Azevedo et al. (2016) or Chen and Kockelman (2016)). However, in
the current research we use the term "fleet in-service rate" for the fleet sizing. This indicator is defined as the
number of occupied or in-service vehicles (including going to pick up a client) over all vehicles. The other metric
representing the proportion of extra VKT (due to the unoccupied or rebalancing mileage) over total VKT will be
7
used in parallel to evaluate empty vehicle traveling distances and to find the balanced trade-off between these two
indicators. The detour distance would be among the main traveler-related indicators representing extra travel
distances due to the shared rides. The traveler wait times here will be used as the LoS evaluation; the lower the
wait time, the higher the service level is. In fact, due to the dynamic decision mechanism between available
alternatives for each traveler, higher wait times result in lower SAV demand and consequently service usage.
Therefore, this parameter implicitly affects the main performance indicators. With the aim of comparing the
service revenues for different scenarios, the in-vehicle passenger kilometer traveled (PKT) is defined. This
indicator presents the sum of trip distances traveled by each individual on SAVs. In order to investigate the usage
pattern of SAV service in the case of ridesharing, the "on-board occupancy rates by a number of passengers" is
proposed. Other metrics used in the dynamic demand simulations to evaluate the performance of proposed service
are the number of persons or vehicle trips (Chen and Kockelman, 2016; Heilig et al., 2017) and average in-vehicle
times (Hörl, 2017; Martinez and Viegas, 2017). However, these performance indicators are descriptive rather than
consequential and thus will not be used for the fleet sizing and vehicle capacity determination.
To evaluate the overall performance of the transportation system, mode share indicator as in the majority of
other studies will be compared. Although this research does not incorporate environmental impact measurements,
the total distances driven by car and SAV are estimated and compared for all scenarios to illustrate how the
congestion would change after the introduction of different SAV services. It is of note that due to the high
uncertainty of future SAV service and infrastructure costs, in the present study only transport-related indicators
are evaluated and analyzed.
4. Case study results
4.1. Overview
A base-case scenario (S0) simulation run was conducted without integrating SAV and calibrated using the
actual modal shares of the case study area. Next, the SAV service was simulated for various fleet sizes (2.0 k to
6.0 k) with individual rides (S1) and for those with ridesharing strategy. In the case of ridesharing, three different
vehicle capacities were suggested for the simulation: a small car with two seats (S2), standard 4-seats car (S3),
and 6-seats minivan (S4). Table 2 illustrates the modal splits for all scenarios. It is noteworthy that given the low
modal share of the bike (less than 0.1%) and related changes, this mode was not simulated.
Table 2
Modal splits estimated for all scenarios and fleet sizes*.
Scenario
S1- non-ridesharing
S2- ridesharing
(2-seats small car)
S3- ridesharing
(standard 4-seats car)
S4- ridesharing
(6-seats minivan)
Fleet size
Mode
Car
Walk
SAV
PT
Car
Walk
SAV
PT
Car
Walk
SAV
PT
Car
Walk
SAV
PT
2000
2500
3000
3500
4000
4500
5000
5500
6000
59.3
28.3
3.1
9.2
59.1
28.3
3.8
8.8
58.9
28.3
4.0
8.7
59.1
28.2
4.1
8.6
58.8
28.3
4.4
8.4
58.8
28.3
4.6
8.3
58.7
28.3
4.6
8.3
58.8
28.3
4.6
8.3
58.5
28.2
5.3
8.0
58.5
28.3
5.2
8.0
58.3
28.3
5.3
8.0
58.4
28.3
5.4
7.9
58.3
28.2
6.0
7.6
58.3
28.2
5.9
7.6
58.1
28.3
5.9
7.7
58.2
28.3
5.9
7.6
58.0
28.2
6.5
7.3
58.1
28.2
6.3
7.5
58.0
28.3
6.0
7.6
58.0
28.3
6.1
7.5
57.7
28.2
6.9
7.1
57.8
28.3
6.5
7.3
57.9
28.3
6.4
7.4
57.9
28.3
6.4
7.4
57.6
28.2
7.2
7.1
57.7
28.3
6.7
7.2
57.8
28.3
6.6
7.3
57.8
28.3
6.8
7.3
57.4
28.1
7.5
6.9
57.8
28.2
6.9
7.1
57.7
28.3
6.8
7.2
57.8
28.2
6.7
7.2
57.5
28.1
7.6
6.8
57.7
28.2
7.0
7.1
57.7
28.3
6.8
7.2
57.7
28.2
6.9
7.1
* Due to the rounding process for each modal share, the sum could exceed or be less than 100%.
As shown in Table 2, the modal shifts toward an SAV service come from both public transport and car modes.
This shift is consistent with findings in the literature (Chen and Kockelman, 2016; Hörl, 2017; Martinez and
Viegas, 2017; Wen et al., 2018). However, in the case of big SAV fleet sizes, the public transport mode share
decreases significantly relative to the car. This reduction is due to the utility of the proposed service, which is
8
rather similar to the public transport mode. The service cost is also an important factor that encourages public
transport users to choose a service that costs a bit more but is more appealing due to the lower travel time. Table
2 illustrates an interesting result regarding SAV modal share evolution. As can be expected, by increasing the
fleet size, SAV modal shares increase accordingly. However, this growth does not follow the same trend for all
scenarios. While SAV modal share in scenario 1 (individual ride) is the lowest one among all scenarios in the case
of the smallest fleet size, this metric is conversely the highest for the fleet size of 6.0se k vehicles. This result can
be explained by the presence of a balanced trade-off between service cost, demand (which affects waiting time)
and extra in-vehicle time due to detour distances. In fact, when the waiting time is more important compared to
in-vehicle times, which is the case for small fleet sizes, the time-based cost of service could surpass the service
cost for users. Therefore, the SAV demand and consequently its modal share decreases. However, in the case of
big fleet sizes, as the waiting time is not as important as in the case of small fleet sizes, the in-vehicle time
(including detour time) becomes an important factor for the decision-making.
Table 3 presents the evolution of total driven distance including private cars and SAVs. By deploying SAV
services, this indicator increases in all scenarios. Clearly, having a bigger fleet size in each scenario results in
more use of vehicles. However, scenarios with ridesharing strategy have lower total driven distance compared to
individual ride (except for the scenario with 2.0 k SAVs). This difference is attributed to the higher SAVs'
occupancy rates in ridesharing scenarios. Comparison of vehicle capacities shows that in the scenarios with the
fleets of 4-seats and 6-seats SAVs, the total driven distance is slightly lower than when 2-seats small SAVs are
simulated (except for the scenario with 2.0 k SAVs). Meanwhile, for some fleet sizes, this indicator has the lowest
value when 4-seats standard cars are used. The shorter total driven distance of individual ride service and smaller
vehicles in ridesharing scenarios when 2.0 k SAVs are simulated is because of the relatively much lower service
demand, which is due to the low LoS provided in that fleet size.
Table 3
Total driven distance including car and SAV modes (million kilometers).
Fleet
size
-
2000
2500
3000
3500
4000
4500
5000
5500
6000
S0- base-case
scenario
S1- non-
ridesharing
S2- ridesharing
(2-seats small car)
S3- ridesharing
(standard 4-seats
car)
S4- ridesharing
(6-seats minivan)
8.88
-
-
-
-
-
-
-
-
-
-
10.05
10.50
10.77
10.95
11.12
11.20
11.26
11.31
11.32
-
10.06
10.33
10.43
10.61
10.62
10.66
10.60
10.73
10.69
-
10.14
10.31
10.43
10.50
10.48
10.55
10.53
10.60
10.58
-
10.17
10.30
10.45
10.53
10.53
10.53
10.56
10.59
10.63
Table 4 presents a summary of the average number of rides per SAV for all scenarios. As can be seen, in the
case of small fleet sizes, the SAVs with bigger capacity satisfy more requests because the expected waiting time
is relatively high enough to play a major role in the mechanism of SAV mode choice decision. In the scenarios of
SAVs with ridesharing and bigger vehicle capacity, the expected waiting time is shorter compared to the scenarios
of the individual ride, thus more rides are satisfied. However, by increasing the number of vehicles, the detour
distance becomes a more important parameter and therefore in the scenarios with more places in the vehicles,
slightly fewer requests are observed. It should be noted that the expected waiting and detour times are the
parameters that are estimated for each synthetic individual (agent) during the simulation. Agents learn about their
plans (including trips and activities) and final decisions are made in the last iteration when convergence is reached.
Thus, the real and expected waiting and detour times have different values. Since the number of expected values
is huge and we cannot visualize them all, we present only real values in this paper.
Table 4
Average number of rides per SAV.
9
Fleet size
S1- non-
ridesharing
S2- ridesharing
(2-seats small car)
S3- ridesharing
(standard 4-seats
car)
S4- ridesharing
(6-seats minivan)
2000
2500
3000
3500
4000
4500
5000
5500
6000
11
16
17
17
17
17
16
15
14
16
17
17
17
16
16
14
14
13
17
17
18
17
16
15
14
13
13
17
17
18
17
16
15
14
13
13
As shown in Fig. 2, the average detour time varies between 4 and 7 minutes in all scenarios. Likewise, the
average in-vehicle time varies from 37 to 48 minutes. However, the variation of waiting time (excluding the
smallest fleet size) for each fleet size remains very slight. It is noteworthy that since the simulations are dynamic-
demand, low average waiting times for small fleet sizes are due to the low SAV demand especially during peak
hours (particularly in S1 and S2). In fact, for fleet size below a certain size, the expected waiting time increases
considerably. Therefore, SAV mode becomes less competitive to other available alternatives in terms of
generalized cost, except in the morning peak hour when the LoS of other alternatives are as low as SAV (Fig. 3).
Thus, the demand for SAV service and consequently estimated waiting time decreases. By increasing the number
of vehicles, the expected waiting time declines. However, this time is shorter than a critical waiting time (a value
that makes SAV non-competitive in terms of utility), its impact on SAV mode choice becomes minor. As a result,
the estimated waiting time follows a very slight decreasing trend particularly in ridesharing scenarios. In the non-
ridesharing scenario, the estimated average waiting time falls faster for big fleet sizes. This faster decline by
increasing the number of vehicles is explained by the fact that for each request an available SAV can be found in
lower direct access distance; however, in the ridesharing scenario, this SAV may not necessarily be without
passenger and therefore a relatively higher waiting time is required. Thus, the decrease in average waiting time
by enlarging fleet size in ridesharing scenarios becomes slighter.
Fig. 2. SAV service time variables for all scenarios and fleet sizes.
4.2. Fleet size
The bigger fleet size and accordingly the higher SAV modal share do not necessarily lead to a better-optimized
operation. In fact, a trade-off between overall expenses and revenues has to be balanced. Service costs include
capital expenditure (CAPEX) and operating expenses (OPEX). Since this research does not incorporate
0.05.010.015.020.025.030.032.034.036.038.040.042.044.046.048.050.02.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kAverage waiting time (min)Average in-vehicle time (min)Fleet size (number of vehicles)S1 : non-ridesharing Average detour timeAverage in-vehicle time without detourAverage waiting time0.05.010.015.020.025.030.032.034.036.038.040.042.044.046.048.050.02.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kAverage waiting time (min)Average in-vehicle time (min)Fleet size (number of vehicles)S3 : ridesharing (standard 4-seats car)0.05.010.015.020.025.030.032.034.036.038.040.042.044.046.048.050.02.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kAverage waiting time (min)Average in-vehicle time (min)Fleet size (number of vehicles)S2 : ridesharing (2-seats small car 0.05.010.015.020.025.030.032.034.036.038.040.042.044.046.048.050.02.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kAverage waiting time (min)Average in-vehicle time (min)Fleet size (number of vehicles)S4 : ridesharing (6-seats minivan)
10
infrastructures of SAV service, CAPEX is assumed directly correlated with the fleet size. OPEX is however
associated with fleet usages and mileage. Fig. 3 illustrates the hourly fleet in-service rates for all scenarios and
various fleet sizes. As shown in this figure, consistent with daily trip patterns, two peak service usages occur for
morning and evening peak hours. However, unlike the SAV modal share, the service use is decreased for big fleet
sizes. In fact, by increasing the fleet size, once the fleet usage becomes no longer saturated in the morning peak
hour, the latter decreases quickly. This occurs by improving the LoS indicators (waiting time or accessibility in
this case) and leads to the demand growth. However, this demand is somehow limited to the number of people
who are already likely to choose this service compared to other alternatives that they have, even if the waiting
time is very low. Similarly, if the fleet size is small and the LoS is accordingly low, users try to find a more
appropriated mode. As a result, as shown in Fig. 3, for the small fleet sizes and especially in scenario 1 (individual
ride), the fleet usage decreases abruptly. Again, we emphasize that the simulation results present the indicators
when the interaction of service demand and supply is iteratively relaxed. In other words, the agents have already
experienced the SAV service for various level of demands. Agents also tried to slightly modify their activity end
time and to depart sooner in order to arrive to the next activity on time. However, the memorized expected waiting
time is supposed to be high for many travelers specifically in the case of small fleet sizes. Consequently, SAV is
not as used as in the case of medium and large fleet sizes.
As presented in Fig. 3, in individual ride scenario (S1), SAV service reaches the maximum fleet usage at least
for one hour in some fleet sizes. This maximum use, however, does not occur for ridesharing scenarios due to two
main reasons. First, in ridesharing scenarios in peak hours there are always SAVs with available seats in the
acceptable distance for any requests. Second, since there is no rebalancing strategy in those scenarios (SAVs stay
at the same place where the last passenger is dropped off), some SAVs that dropped off a passenger(s) far from
demand hubs remain in idle mode at that location and thus the fleet usage does not reach the maximum value.
This shows the importance of enabling rebalancing strategy especially when rides are shared among travelers.
Fig. 3. SAV fleet hourly in-service rates.
Empty traveling distance is also a part of fleet usage. High-performance fleet size is characterized by a greater
use and a lower empty distance. Fig. 4 compares average daily in-vehicle service rates (fleet usage ratio) and
empty distance ratio (empty VKT over total VKT) for all scenarios and fleet sizes. As can be seen from this figure,
the fleet usage fluctuates more than the empty distance ratio. In fact, by increasing fleet sizes, the empty distance
ratio changes only by a maximum of 3%, meanwhile, the fleet usage drops dramatically (up to 16%). This abrupt
decline may occur because there is no rebalancing strategy incorporated in those scenarios and the pick-up ride
distances remain approximately within the same range of values (with lower usage and consequently more
available vehicles, the pick-up ride distance becomes slightly shorter). In order to identify the best performing
fleet size, two aforementioned indicators are used. Actually, regardless of any estimations about service
operational cost and benefits, the fleet usage indicator can be used as the measure of effectiveness concerning
CAPEX. Similarly, the empty distance ratio may be sufficiently indicative for the changes on OPEX term. Since
the latter indicator stays rather constant for all fleet sizes, the best fleet sizes are identified according to the fleet
Total duration of in-service drive over total duration of all tasks0102030405060708090100(a) S1 : non-ridesharing(c) S3 : ridesharing (standard 4-seats car) 600000127285177868670596067676670757360543114460000012618376574665138353842434854595640191035500001393259829495746367767972757880756440185550000127214271746857443942464850566462432111350000013933647996977664718484818083827664371755000001382042697572574339424749525863674922124450001141037658610099796774838382868889817345205450000137264974818065494849515359687472532513540000014113966861009986708088918685909282764321740000023926497787846750485053586269757756271443500002412457389100998169818891868688928278492683500001410326087918468595961687076777776603117630000014154872921009878758592928582798680754826930000124123764869083686262636975747375766839195250001251553779298786170778082797566646574523010250000251439739187766465656670716867687376402282000012515516890813128445953525247382326353225720000125164777949274555963646468717264605937279123456789101112131415161718192021222324123456789101112131415161718192021222324(b) S2 : ridesharing (2-seats small car) (d) S4 : ridesharing (6-seats minivan) 6000001262040707669554139414345516067584220114600000127193867746553403839404348545960441910455000012722437479745844434549525665706544221235500001272141697468554440414446515965614320114500000137234673807760464447505459667266452412450000013723437176735944424446485464706747221144500001392754798984654950556061657178785627134450000138254977817863524748515459677268492515440000013102955849287675251586064707581796030165400000141028537984826655535459616471767255261443500001410336184898670615963697374808382653417635000114103461839187706259596669727577756331175300000151136618285806457606367717170747665362053000002410356789908369636365717172737881683820625000025134073918977636264666768717173736938216250001241341688582726158626264697067677368382172000012614426686845344576261615954494449594025820000136154675979467526268696869686659636342267123456789101112131415161718192021222324123456789101112131415161718192021222324Hour of dayFleet sizeHour of dayFleet sizeHour of dayFleet sizeHour of dayFleet size11
usage ratio. For individual ride service, the fleet of 3.5 k SAVs, in the case of small cars with two seats, 2.5 k
vehicles and for the other scenarios, approximately 3.0 k vehicles seem to be the best performing size of the fleet.
Fig. 4. Comparison of fleet usage and empty distance ratios for different scenarios and fleet sizes.
Another noteworthy point in Fig. 3 is the shift of the morning peak-hour service usage from 7-9 a.m. for small
fleet sizes to 8-10 a.m. for big fleet sizes. This shift is actually due to two main reasons. First, in small and big
fleet sizes the SAV users are dissimilar in terms of the socio-professional category to which they belong. These
users have a different trip pattern, consequently by varying fleet sizes the hourly usage of SAV service changes.
Second, the possibility of small changes in the activity end-time in the simulation allowed some users to leave the
previous activity slightly sooner in order to arrive to the next activity with lower delay. This happens when
departing earlier from an origin activity such as "Home" has not an important impact on the score of agent's whole
day plan. However, when the activity at origin is "Work" or "Study", shorten those activity durations results in a
much lower score and penalizes the use of SAV service. The possibility of slight changes on activity end time is
enabled for all modes in the simulation, however given the score of performing activities, these changes may not
surpass several minutes. Regarding different group of users, in the simulation, agents with different socio-
professional category have different utility scoring. In other words, for instance, for some groups of people, the
marginal utility of traveling or the value of travel time (VoT) is bigger than for other groups. Furthermore, user
taste variation among the different category of travelers affects SAV mode choice. As a result, by increasing fleet
sizes and improving the LoS (travel time, including wait time), the SAV service for some users with different
socio-professional categories and accordingly different trip purposes become more attractive (in terms of utility).
Since each activity at the destination has a dissimilar model of start-time and duration, hourly usage pattern of
SAV service changes when considering a different group of users. Fig. 5 illustrates the evolution of SAV service
users by their socio-professional categories for different fleet sizes. As can be seen, the ratio of employed people
in all scenarios decreases by increasing fleet sizes. For students and people under 14 years of age, a slight increase
in big fleet sizes is observed. Meanwhile, the changes in the ratio of unemployed people remain minor. However,
there is a relatively significant growth in the use of SAV service by retired people and homemakers when the fleet
size is large (especially in the case of the individual ride). By comparing scenarios of each fleet size, it can be
seen that the SAV service with the individual ride is less attractive for employed and unemployed users. This
occurs since the cost-related parameters of mode choice decision are more important than time-related parameters
for those groups of users. The above analysis shows the importance of considering users' profile in estimating
fleet hourly usage, which can potentially affect the fleet sizing.
4350484847454039361314141414141313122.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kFleet size (number of vehicles)4848514945423836351515161514131313132.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kFleet size (number of vehicles)3654595959575452481515151415151414132.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kFleet size (number of vehicles)4950504944423736331516151514141313132.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kFleet size (number of vehicles)Fleet usage ratio (%)Empty distance ratio (%)(a) S1 : non-ridesharing(c) S3 : ridesharing (standard 4-seats car) (d) S4 : ridesharing (6-seats minivan) (b) S2 : ridesharing (2-seats small car) 12
Fig. 5. SAV service users by socio-professional category.
4.3. The sharing strategy of ride
As shown in Fig. 3, in the scenarios with ridesharing, the fleets are never 100% in-service for 1-h time slices.
This may occur when rides are shared but empty vehicles are not rebalanced. When a request is registered, the
nearest occupied vehicle with an available seat and acceptable detour time is assigned. As a result, there are always
some vehicles quite far from the demand hubs that are not consequently used for a while. In fact, ridesharing
results in relatively lower fleet usage for almost all fleet sizes except for the fleet size of 2.0 k (Fig. 4). The more
rides are shared, the less the fleet is used. However, each user pays for the provided services and traveled
kilometers. In this case, the indicator of in-vehicle passenger kilometer traveled (PKT) may be more relevant.
This indicator presents the sum of distances traveled by each individual being on-board SAVs. Fig. 6 compares
SAV overall PKT for all scenarios and fleet sizes. As shown in this figure, the overall PKT of the individual ride
scenario is minimum for all fleet sizes. This indicator is however almost the same for all ridesharing scenarios in
the case of medium fleet sizes (i.e., 3.5 k to 4.5 k). By increasing the number of vehicles, the relative difference
of PKT between individual ride and ridesharing scenarios decreases. This decline can be attributed to the high
LoS provided in the case of large fleet sizes. In fact, the potential requests for the SAV service are limited. Thus,
when the fleet is accessible enough for a major part of potential users, the greater service availability (occurring
when the rides are shared) does not necessarily result in an important increase in demand and PKT accordingly.
As a result, the growth of PKT and its differences between individual ride and ridesharing scenarios decline.
Fig. 6. Comparison of SAV overall PKT for all scenarios and fleet sizes.
4.4. Vehicle capacity
As mentioned earlier, the best performing fleet size in the case of ridesharing scenarios according to the fleet
usage and empty ratios is between 2.5 k and 3.5 k vehicles. Comparing the PKT for those fleet sizes reveals that
the fleet of the standard 4-seats car may be the best performing option for ridesharing. As shown in Fig. 6, for
small fleet sizes, the overall PKT of the standard 4-seats car is greater. In fact, for those fleet sizes, the fleet usage
is almost saturated during peak hours (Fig. 3). As a result, services are less accessible especially when the vehicle
76.876.678.977.876.276.878.778.775.577.278.077.475.477.277.777.074.876.977.577.173.676.676.576.673.376.277.277.072.676.176.876.972.875.977.276.70.30.40.40.40.30.40.40.40.40.40.40.40.40.40.50.50.40.50.50.40.50.50.50.50.40.50.50.40.40.40.40.40.40.40.40.421.421.619.620.722.521.619.719.722.721.020.220.922.520.720.120.822.220.320.020.822.620.921.221.421.820.719.820.622.221.421.021.121.921.820.721.31.51.41.11.11.01.21.21.21.41.41.41.31.71.71.71.52.62.32.01.73.32.01.81.54.52.62.52.04.82.11.81.64.91.91.71.650%55%60%65%70%75%80%85%90%95%100%S1S2S3S4S1S2S3S4S1S2S3S4S1S2S3S4S1S2S3S4S1S2S3S4S1S2S3S4S1S2S3S4S1S2S3S42.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kSAV users by socio-professional category (%)Scenario and fleet size (number of vehicles)Retired and homemakersStudents and people under 14 y/oUnemployedEmployed0500000100000015000002000000250000030000002.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kSAV In-vehicle PKT (kilometers)Fleet size (number of vehicles)S1 : non-ridesharingS2 : ridesharing (2-seats small car)S3 : ridesharing (standard 4-seats car)S4 : ridesharing (6-seats minivan)
13
is smaller and the number of available seats is lower. It seems that the service with bigger capacity vehicles would
be more used by travelers in that case; however, due to extra detour time (expected), the PKT of 6-seats SAVs is
slightly less than 4-seats SAVs. In other words, for the same SAV service price, users prefer to choose a medium
capacity car that has relatively shorter waiting and in-vehicle times compared to a 6-seats minivan. By increasing
fleet size, as there is enough SAVs to satisfy the demand, the differences between PKTs for those scenarios
become relatively minor. However, since in that case more demand is satisfied, the probability of pooling rides
with an acceptable detour time becomes higher. Thus, a limited number of vehicles handle many requests in high
demand areas. Meanwhile, the idle vehicles that have already dropped off a passenger far from the demand hubs
stay at the same place for a while. This non-homogeneous spatial distribution of idle and high workload SAVs
results in a different PKT for ridesharing scenarios with big fleet sizes. This difference occurs when the
rebalancing strategy is not enabled. It is of note that in the small and medium fleet sizes, the fleet usage is relatively
high and thus, SAVs are somehow rebalanced across the high demand hubs and dispersed better within the region.
This shows again the importance of considering rebalancing strategy.
In order to explore the use of vehicle capacities, on-board occupancy rates by the number of passengers (PAX
occupancy ratio) are compared for ridesharing scenarios. As shown in Fig. 7, for all ridesharing scenarios, by
increasing the fleet size, the 1 PAX ratio decreases slightly while the other ones increase. In fact, when more
vehicles are available, the demand is greater; thus, the probability of finding further trip requests in an acceptable
time or distance buffer from the actual ride(s) becomes higher. Therefore, the rides are more shared in the big
fleet sizes and more seats are occupied. As illustrated in Fig. 7, 3 PAX ratio varies from 5 to 8% in the case of a
standard 4-seats car and 6-seats minivan. However, the ratio of 4 PAX is less than 1%. Furthermore, the sixth seat
of the minivan is almost never used. Actually, by comparing the other metrics one can observe that the differences
between standard 4-seats car and 6-seats minivan are very small. In fact, given the amount of initial investment
and operational costs of the bigger vehicles, the extra capacity may not necessarily be profitable. Therefore, it
seems that standard 4-seats car is more compatible to the proposed service rather than a 6-seats minivan.
Nevertheless, we have to keep in mind that the extra capacity could have an important impact on SAV's LoS.
Furthermore, the 6-seats minivan can also be used for special requirements such as larger groups and families.
Fig. 7. On-board occupancy rates by the number of passenger for ridesharing scenarios.
0%10%20%30%40%50%60%70%80%90%100%2.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kPAX occupancy ratio (%)Fleet size (number of vehicles)1 PAX2 PAX3 PAX4 PAX5 PAX6 PAX(c) S4 : ridesharing (6-seats minivan) 0%10%20%30%40%50%60%70%80%90%100%2.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kPAX occupancy ratio (%)Fleet size (number of vehicles)(b) S3 : ridesharing (standard 4-seats car) 0%10%20%30%40%50%60%70%80%90%100%2.0 k2.5 k3.0 k3.5 k4.0 k4.5 k5.0 k5.5 k6.0 kPAX occupancy ratio (%)Fleet size (number of vehicles)(a) S2 : ridesharing (2-seats small car) 14
The analysis on the origin and destination activities of trips performed by a fleet of 3.0 k standard 4-seats SAVs
(Fig. 8) illustrates that almost half of all trips start from or end at users' homes. For the total of 9% of trips, the
purpose at origin or destination is shopping or accompanying (escorting), indicating the importance of extra
vehicle capacities in terms of the number of seats or luggage space. Also, given an important share of work and
study activities at origin and destination (about 40%), it is likely that providing extra space and additional services
for business, entertainment, and education purposes may provide a better customer experience while using SAV
service.
Fig. 8. The share of activities in origin and destination of trips performed by a fleet of 3.0 k standard 4-seats SAVs (percentage).
4.5. Vehicle range
Future SAVs are likely to be electric. In electric vehicles, the range is limited according to the battery capacity
and specifications (e.g., weight and life cycle). In fact, given the important cost of battery among vehicles parts,
its capacity may strongly affect the capital expenditure and operational expenses. According to the analysis of the
SAV range for different scenarios and fleet sizes (Table 5), it is shown that the average driven distance of SAVs
may intensely vary from 361 to 647 km. Furthermore, the vehicles do not have the same driven distance and for
some vehicles, the average driven distance could be very long (even 975 km). This occurs when the demand is
saturated and the vehicles are occupied for a long time during the day. By comparing the outputs, one can observe
that the average driven distance correlates with the fleet usage ratio (Fig. 4) and the average number of rides per
SAV (Table 4). In all fleet sizes, except when 2.0 k vehicles are simulated, the average driven distance of non-
ridesharing SAVs is the largest compared to other scenarios. This result can be explained by the fact that SAV
driven distances are shorter for the case of sharing the ride than when the ride is dedicated just to one passenger.
However, in the case of the smallest fleet size, the fleet usage is dramatically lower compared to other fleet sizes
due to the high expected waiting time and lower service request (Fig. 3). Thus, the average driven distance of
non-ridesharing SAVs remains the lowest among all scenarios. The aforementioned distances could further
increase by considering vehicle rebalancing, suggesting that vehicle ranges and possibly charging infrastructure
need to be taken into account in future research.
45%8%29%2%3%7%1%6%Activities in origin and destination of trips performed by SAVs 15
Table 5
Summary of vehicle driven distances for all scenarios and fleet sizes.
Scenario
Fleet size
2000
2500
3000
3500
4000
4500
5000
5500
6000
S1- non-ridesharing
S2- ridesharing
(2-seats small car)
S3- ridesharing
(standard 4-seats car)
S4- ridesharing
(6-seats minivan)
Average driven distance (km)
Maximum driven distance (km)
Average driven distance (km)
Maximum driven distance (km)
Average driven distance (km)
Maximum driven distance (km)
Average driven distance (km)
Maximum driven distance (km)
414
652
469
779
546
820
541
861
610
975
549
880
553
919
528
847
645
907
528
923
546
866
552
888
647
894
543
869
524
900
526
870
631
895
503
820
463
825
479
779
606
866
477
817
445
866
444
883
566
925
422
791
392
799
408
761
543
822
408
778
386
797
383
841
495
884
377
807
354
691
361
714
4.6. Ridesharing service cost
The above-mentioned results are given when the cost of the ridesharing service is assumed to be 20% less than
individual rides (0.4 Euro per kilometer compared to 0.5 Euro per kilometer for the individual ride). This price is
encouraging enough for the travelers to prefer the ridesharing service to individual rides within the same fleet size
according to the PKTs (Fig. 6). Although reducing service price and sharing rides lead to a higher PKT, the former
may not be interesting for the operators as the service benefits for each kilometer of ride decrease, assuming that
by an increase in PKT, the fixed cost of operation per kilometer remains unchanged. Thus, it is important to
compare the benefit that an operator could gain due to the growth of PKT with the loss that occurs due to the
reduction of profit per kilometer. In order to explore the evolution of service performance indicators, two lower
prices for ridesharing services are assumed (i.e., 30% and 40% less than individual ride price) and the impacts on
PKT and empty vehicle traveling distance in kilometer (EVK) are compared. As shown in Fig. 9, reducing service
price results in 4-10% higher PKT compared to the initial ridesharing scenario, with the maximum value for 3.0
k SAVs in the second and third scenarios and 2.5 k SAVs in the fourth scenario. However, the EVK changes vary
between -4% and 18% with the maximum values at the same fleet sizes in each scenario. As can be noticed, the
reduction of service price does not cause proportionate improvements in the operational performance indicators
of the major scenarios and fleet sizes. In fact, the increase of PKT as the main indicator of service profits, which
is lower than 10% in the best case, is not enough to cover the loss of direct income occurred due to the lower
service price (30-40%). In fact, the latter is certainly higher than 10% since the operational costs are included in
the service price. Moreover, in the cases when an important growth of PKT occurs, the EVK increases and
therefore the cost of service for operator grows, as well. Hence, for the fleet of 2.5 k to 3.5 k SAVs, the scenarios
with initial service price remain more advantageous.
16
Fig. 9. The changes on PKT and EVK in the case of lower prices for ridesharing SAV services of 2.5 k to 3.5 k vehicles.
4.7. Rebalancing strategy
The fleet usage ratio and PKT may be improved by rebalancing SAVs. However, enabling this strategy can
result in higher EVK. In order to explore the impacts on SAV service performances, the optimum fleet size of
each scenario is re-simulated with rebalancing enabled. During these simulations, vehicles are reallocated to
different cells with an area of 1 km2 (used for demand aggregation) according to the cost flow minimization of
idle vehicles and scattered requests. Empty vehicles are considered idle when there is no request after 10 minutes
of stay. The reallocation process is done every 5 minutes. The costs of the single ride and ridesharing services are
assumed to be as initial values (0.5 €/km for a single ride and 0.4 €/km for ridesharing). Table 6 illustrates the
changes in performance metrics. As can be seen, modal share, fleet usage ratio, and in-vehicle PKT increase for
all scenarios when SAVs are rebalanced. However, the empty distance ratio increases significantly. In fact, the
growth of service benefits that is correlated with fleet usage and in-vehicle PKT occurs at the expense of extra
operational costs due to empty traveling distance. Consequently, the decision on using a rebalancing strategy has
to be made according to the cost and benefits that the operator of such services expects for each kilometer traveled
by empty vehicles and passengers. Some other important changes occur in terms of the SAV's LoS. As presented
in Table 6, the average waiting time has meaningfully decreased for the ridesharing scenarios after introducing
rebalancing. This decrease occurs when the empty vehicles, which are far from the demand hubs, are reallocated
to those zones. As a result, there are more vehicles available within lower wait times. Nevertheless, in-vehicle and
detour times remain almost unchanged. Regarding in-vehicle time, the changes before and after introducing
rebalancing strategy are minor since the trip patterns do not change significantly. Consequently, this indicator
varies in the same order observed for various fleet sizes of the same scenario (Fig. 2). However, given the greater
number of available vehicles and accordingly lower wait times, it seems that the detour time should similarly
decrease. This decrease did not occur due to the higher demand as well as lower 1 PAX and bigger 2 and 3 PAX
ratios. In fact, after enabling rebalancing, more rides are shared. Therefore, the average detour time remains almost
unchanged. In the case of the individual ride scenario, since the service is saturated during morning and evening
peak hours, the rebalancing strategy does not necessarily result in significant waiting time changes.
Similar to fleet usage and in-vehicle PKT, average and maximum driven distances increase for all scenarios.
In other words, by introducing a rebalancing strategy the vehicles need to have larger batteries or need to recharge
more frequently.
4814105-5051015202.5 k3.0 k3.5 kPKT changes (%)(a) S2 : ridesharing (2-seats small car) 524887-5051015202.5 k3.0 k3.5 kPKT changes (%)Fleet size (number of vehicles)(c) S4 : ridesharing (6-seats minivan) 141476-5051015202.5 k3.0 k3.5 kPKT changes (%)(b) S3 : ridesharing (standard 4-seats car) 1315-2121812-5051015202.5 k3.0 k3.5 kEVK changes (%)0.35 €(-30%)0.3 €(-40%)SAV service price €/km (diffrence with individual ride price%)-410691410-5051015202.5 k3.0 k3.5 kEVK changes (%)120716910-5051015202.5 k3.0 k3.5 kEVK changes (%)Fleet size (number of vehicles)17
Table 6
Performance metrics' changes before and after enabling the rebalancing strategy.
Scenario
Non-ridesharing (3.5 k)
no
rebalancing
with
rebalancing
Ridesharing 2-seats small
car (2.5 k)
no
rebalancing
with
rebalancing
Ridesharing standard 4-
seats car (3.0 k)
no
rebalancing
with
rebalancing
Ridesharing 6-seats
minivan (3.0 k)
no
rebalancing
with
rebalancing
SAV modal share (%)
Average waiting time (min)
Average in-vehicle time (min)
Average detour time (min)
Fleet usage ratio (%)
Empty distance ratio (%)
In-vehicle PKT (km)
1 PAX ratio (%)
2 PAX ratio (%)
3 PAX ratio (%)
4 PAX ratio (%)
5 PAX ratio (%)
6 PAX ratio (%)
Average driven distance (km)
Max. driven distance (km)
6.0
18.5
38.5
N/A
59
14
1.93 M
100
N/A
N/A
N/A
N/A
N/A
647
894
5. Discussion and conclusion
6.3
18.4
38.7
N/A
68
20
2.08 M
100
N/A
N/A
N/A
N/A
N/A
746
978
4.6
18.9
43.9
4.7
50
14
1.53 M
69
31
N/A
N/A
N/A
N/A
549
880
5.2
13.9
44.1
5.2
66
26
1.81 M
63
37
N/A
N/A
N/A
N/A
715
964
5.3
20.7
46.0
6.1
50
15
1.97 M
67
26
6
1
N/A
N/A
546
866
6.4
13.1
45.2
5.8
66
24
2.40 M
59
33
7
1
N/A
N/A
707
896
5.4
21.1
46.0
6.0
51
16
1.97 M
66
27
6
1
<1
0
552
888
6.4
14.8
44.8
5.9
67
24
2.41 M
61
31
7
1
<1
0
723
939
The rising popularity of carsharing and technological advancements on electric and autonomous vehicles has
led to the emergence of new shared mobility systems. Some car manufacturers and transportation network
companies (e.g., Uber and Lyft) have already announced their plans for deploying SAVs in the future.
Understanding dynamic tradeoffs between service configuration and demand is an important prerequisite for
delivering such services. This study sought to investigate the design of an SAV service considering its demands
responsive to the network, user taste variations, and traffic in a multi-modal context. Simulations of various SAV
fleet sizes and capacities considering ridesharing and rebalancing strategies across the Rouen Normandie
metropolitan area in France provide initial insights. As suggested by these simulations, the SAVs performance is
strongly correlated to the fleet size, specifically in the case of individual ride service. The results show that the
SAV modal shares vary from 3.1% to 7.6% for different fleet sizes of 2.0 k to 6.0 k vehicles. While the SAV
modal share of small fleet size for the individual ride is the minimum among all scenarios including ridesharing
with various vehicle capacities, this term is the greatest for the medium and big fleet sizes. The latter actually
occurs when the fleet of individual ride service exceeds a critical size (i.e., 2.5 k), from which the smaller fleet
size results in a significant decline of fleet usage (i.e., 34% compared to 8% that is observed from 3.0 k to 2.5 k
vehicles). In fact, for fleet sizes this small, the expected wait times increase meaningfully and lead to very low
service utility compared to other alternatives; and the demand decreases, accordingly. On the contrary, once the
peak hour demand is satisfied in acceptable wait times, the service performance decreases slightly by increasing
fleet size. This variation is not as significant as in ridesharing scenarios where the change of fleet size has less
important impacts on the LoS. The results also suggest that the average waiting time, which is estimated when the
interaction of demand and supply is relaxed (and therefore it is different from the aforementioned expected waiting
time), decreases meaningfully for the smallest fleet sizes. This decrease is actually contrary to what is usually
suggested when the SAV simulation with predefined or static demand is performed and shows the importance of
considering dynamic demand in the simulation of on-demand services.
Further analysis reveals that in the case of ridesharing services without vehicle rebalancing, the changes in
average waiting time remain insignificant for the medium and big fleet sizes. Nevertheless, this indicator decreases
in the individual ride service for the big fleet sizes. In fact, in ridesharing scenarios since the service is never
saturated in the case of medium and big fleet sizes, when an upcoming request is registered, the nearest vehicle
with available seats is allocated to it. However, in individual ride services, the nearest empty vehicle has to be
allocated to that request. Bigger fleet sizes result in a large number of vehicles available in individual ride services
and the waiting time decreases accordingly. The increase in fleet size similarly results in more available seats in
ridesharing scenarios (up to 5%). However, this change is not significant since the fleets are not as occupied as in
individual ride scenario and the increase in seat availability does not have an important impact on the availability
of service. It is also shown that average in-vehicle and detour times vary slightly according to the fleet size. These
changes are relatively minor (less than 4 minutes) and follow almost the same trend.
18
By comparing the fleet usages and empty distance ratios of different scenarios, we found that the optimum fleet
sizes for the individual ride and ridesharing cases are different. These results suggest that while the best fleet size
of individual rides is 3.5 k, in the case of a small car with two seats, 2.5 k vehicles and for standard 4-seats car
and 6-seats minivan, 3.0 k vehicles are the best performing fleet sizes. Based on the obtained results, considering
transport related service performance, there are no big differences between standard 4-seats car and 6-seats
minivan. Since the bigger capacity vehicle may be financially less efficient due to the higher vehicle and
operational costs, it seems that 6-seats minivan cannot be a performant alternative. Nevertheless, we have to bear
in mind that the extra capacity and seats may potentially affect the user comfort perception and consequently their
choice in the real world. Further comparison of four suggested fleet sizes illustrates that given the relatively high
in-vehicle PKT and low empty distance ratio of the 3.0 k vehicles with share rides, this scenario is the best option
among all the considered scenarios. Furthermore, taking into account the trade-off between waiting and detour
times and service cost, we consider that the proposed pricing scheme for SAV ridesharing service (20% less
compared to individual ride) is attractive enough for users. In addition, the results show that a decrease in
ridesharing service prices up to 40% of the individual ride does not cause proportionate improvements on the
operational performance indicators and is not beneficial for the operator.
Importantly, enabling vehicle rebalancing is found to have a profound effect on both user and service-related
metrics. For optimum fleet sizes of ridesharing scenarios, rebalancing leads to shorter average waiting times (i.e.,
25-35%). However, in individual ride scenario, this indicator remains unchanged since the service is already
saturated in peak hours without enabling rebalancing. Although in-vehicle PKT and empty distance ratio increase
for all scenarios, the change in the latter indicator is relatively more important (i.e., 42-85% against 7-17%).
Besides, the detour times remain almost unchanged. Given these indicators, the decision on enabling rebalancing
strategy should be made according to the financial analysis based on the cost and benefits that operator of such
services expects for each kilometer traveled by passengers and empty vehicles.
The average driven distances for optimum scenarios without rebalancing varies from 546 to 647 km. Given
the relatively lower range of today's electric vehicles, it will be necessary to recharge the majority of SAVs during
the day. Furthermore, enabling rebalancing leads to longer average traveled distance (i.e., 707 to 746 km).
Considering the maximum driven distance that exceeds even 900 km, these indicators suggest that future SAVs
will necessarily require some recharging infrastructure.
The employed agent-based simulations in this study incorporate users' trip pattern and taste variation developed
previously by the authors. The detailed service usage indicator estimated for 1-h time slices illustrates a shift of
the morning peak-hour service usage from 7-9 a.m. for the small fleet sizes to 8-10 a.m. for big fleet sizes. This
result indicates the effect that different SAV users with different trip patterns and taste variation may have on the
service usage and prove the importance of considering that user differentiations in SAV demand modeling and
simulation.
While these investigations and results offer a broad and new understanding of SAV service performance and
design, there are several opportunities for improvement. For example, rather than having the same pricing scheme
for all rides, future efforts should examine dynamic pricing (e.g., time-based or demand-based). In addition, an
improved rebalancing strategy may be proposed and evaluated within this simulation framework. The authors
further plan to integrate electric SAV (ESAV) into the simulation and investigate the evolution of service
performance indicators according to various charging station positioning and vehicle ranges.
Acknowledgments
This research work has been carried out in the framework of IRT SystemX, Paris-Saclay, France, and therefore
granted with public funds within the scope of the French Program "Investissements d'Avenir". The authors
would like to thank Groupe Renault for partially financing this work and Métropole Rouen-Normandie for
providing the data.
References
Agatz, N.A.H., Erera, A.L., Savelsbergh, M.W.P., Wang, X., 2011. Dynamic ride-sharing: A simulation study in metro Atlanta. Transp.
Res. Part B Methodol. 45, 1450 -- 1464. https://doi.org/10.1016/J.TRB.2011.05.017
Al-Maghraoui, O., 2019. Designing for Urban Mobility - Modeling the traveler experience. Interfaces, Université Paris Saclay.
Alonso-Mora, J., Samaranayake, S., Wallar, A., Frazzoli, E., Rus, D., 2017. On-demand high-capacity ride-sharing via dynamic trip-
vehicle assignment. Proc. Natl. Acad. Sci. 114, 462 -- 467. https://doi.org/10.1073/pnas.1611675114
Auld, J., Sokolov, V., Stephens, T.S., 2017. Analysis of the Effects of Connected -- Automated Vehicle Technologies on Travel Demand.
Transp. Res. Rec. J. Transp. Res. Board 2625, 1 -- 8. https://doi.org/10.3141/2625-01
Azevedo, C.L., Marczuk, K., Raveau, S., Soh, H., Adnan, M., Basak, K., Loganathan, H., Deshmunkh, N., Lee, D.-H., Frazzoli, E., Ben-
Akiva, M., 2016. Microsimulation of Demand and Supply of Autonomous Mobility On Demand. Transp. Res. Rec. J. Transp. Res.
Board 2564, 21 -- 30. https://doi.org/10.3141/2564-03
Bansal, P., Kockelman, K.M., Singh, A., 2016. Assessing public opinions of and interest in new vehicle technologies: An Austin
perspective. Transp. Res. Part C Emerg. Technol. 67, 1 -- 14. https://doi.org/10.1016/j.trc.2016.01.019
19
Bischoff, J., Maciejewski, M., 2016. Autonomous Taxicabs in Berlin -- A Spatiotemporal Analysis of Service Performance. Transp. Res.
Procedia 19, 176 -- 186. https://doi.org/10.1016/j.trpro.2016.12.078
Bischoff, J., Maciejewski, M., Nagel, K., 2017. City-wide shared taxis: A simulation study in Berlin, in: 2017 IEEE 20th International
Conference on Intelligent Transportation Systems (ITSC). IEEE, pp. 275 -- 280. https://doi.org/10.1109/ITSC.2017.8317926
Boesch, P.M., Ciari, F., Axhausen, K.W., 2016. Autonomous Vehicle Fleet Sizes Required to Serve Different Levels of Demand. Transp.
Res. Rec. J. Transp. Res. Board 2542, 111 -- 119. https://doi.org/10.3141/2542-13
Bösch, P.M., Becker, F., Becker, H., Axhausen, K.W., 2018. Cost-based analysis of autonomous mobility services. Transp. Policy 64,
76 -- 91. https://doi.org/10.1016/j.tranpol.2017.09.005
Burns, L.D., Jordan, W.C., Analytics, J., Scarborough, B.A., 2013. Transforming Personal Mobility, The Earth Institute -- Columbia
University. New York.
Charypar, D., Nagel, K., 2005. Generating complete all-day activity plans with genetic algorithms. Transportation (Amst). 32, 369 -- 397.
https://doi.org/10.1007/s11116-004-8287-y
Chen, T.D., Kockelman, K.M., 2016. Management of a Shared Autonomous Electric Vehicle Fleet: Implications of Pricing Schemes.
Transp. Res. Rec. J. Transp. Res. Board 2572, 37 -- 46. https://doi.org/10.3141/2572-05
Chen, T.D., Kockelman, K.M., Hanna, J.P., 2016. Operations of a shared, autonomous, electric vehicle fleet: Implications of vehicle
& charging infrastructure decisions. Transp. Res. Part A Policy Pract. 94, 243 -- 254.
https://doi.org/10.1016/J.TRA.2016.08.020
DG Trésor [WWW Document], 2018. URL https://www.tresor.economie.gouv.fr/
Fagnant, D.J., Kockelman, K., 2015. Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations.
Transp. Res. Part A Policy Pract. 77, 167 -- 181. https://doi.org/10.1016/j.tra.2015.04.003
Fagnant, D.J., Kockelman, K.M., 2018. Dynamic ride-sharing and fleet sizing for a system of shared autonomous vehicles in Austin,
Texas. Transportation (Amst). 45, 143 -- 158. https://doi.org/10.1007/s11116-016-9729-z
Fagnant, D.J., Kockelman, K.M., 2014. The travel and environmental implications of shared autonomous vehicles, using agent-based
model scenarios. Transp. Res. Part C Emerg. Technol. 40, 1 -- 13. https://doi.org/10.1016/j.trc.2013.12.001
Fagnant, D.J., Kockelman, K.M., Bansal, P., 2015. Operations of Shared Autonomous Vehicle Fleet for Austin, Texas, Market. Transp.
Res. Rec. J. Transp. Res. Board 2536, 98 -- 106. https://doi.org/10.3141/2536-12
Farhan, J., Chen, T.D., 2018. Impact of ridesharing on operational efficiency of shared autonomous electric vehicle fleet. Transp. Res.
Part C Emerg. Technol. 93, 310 -- 321. https://doi.org/10.1016/j.trc.2018.04.022
Firnkorn, J., Müller, M., 2012. Selling Mobility instead of Cars: New Business Strategies of Automakers and the Impact on Private
Vehicle Holding. Bus. Strateg. Environ. 21, 264 -- 280. https://doi.org/10.1002/bse.738
Greenblatt, J.B., Shaheen, S., 2015. Automated Vehicles, On-Demand Mobility, and Environmental Impacts. Curr. Sustain. Energy
Reports 2, 74 -- 81. https://doi.org/10.1007/s40518-015-0038-5
Haboucha, C.J., Ishaq, R., Shiftan, Y., 2017. User preferences regarding autonomous vehicles. Transp. Res. Part C Emerg. Technol. 78,
37 -- 49. https://doi.org/10.1016/j.trc.2017.01.010
Harper, C.D., Hendrickson, C.T., Mangones, S., Samaras, C., 2016. Estimating potential increases in travel with autonomous vehicles for
the non-driving, elderly and people with travel-restrictive medical conditions. Transp. Res. Part C Emerg. Technol. 72, 1 -- 9.
https://doi.org/10.1016/J.TRC.2016.09.003
Heilig, M., Hilgert, T., Mallig, N., Kagerbauer, M., Vortisch, P., 2017. Potentials of Autonomous Vehicles in a Changing Private
Transportation System -- a Case Study in the Stuttgart Region. Transp. Res. Procedia 26, 13 -- 21.
https://doi.org/10.1016/j.trpro.2017.07.004
Hörl, S., 2017. Agent-based simulation of autonomous taxi services with dynamic demand responses. Procedia Comput. Sci. 109, 899 --
904. https://doi.org/10.1016/j.procs.2017.05.418
Hörl, S., Ruch, C., Becker, F., Frazzoli, E., Axhausen, K.W., 2019. Fleet operational policies for automated mobility: A simulation
assessment for Zurich. Transp. Res. Part C Emerg. Technol. 102, 20 -- 31. https://doi.org/10.1016/J.TRC.2019.02.020
Horni, A., Nagel, K., Axhausen, K.W., 2016. The Multi-Agent Transport Simulation MATSim. Ubiquity Press, London.
https://doi.org/10.5334/baw
Hyland, M., Mahmassani, H.S., 2018. Dynamic autonomous vehicle fleet operations: Optimization-based strategies to assign AVs to
immediate traveler demand requests. Transp. Res. Part C Emerg. Technol. 92, 278 -- 297.
https://doi.org/10.1016/J.TRC.2018.05.003
Kamel, J., Vosooghi, R., Puchinger, J., 2018. Synthetic Population Generator for France. https://doi.org/10.13140/RG.2.2.19137.81763
Kamel, J., Vosooghi, R., Puchinger, J., Ksontini, F., Sirin, G., 2019. Exploring the Impact of User Preferences on Shared Autonomous
Vehicle Modal Split: A Multi-Agent Simulation Approach. Transp. Res. Procedia 37, 115 -- 122.
https://doi.org/10.1016/j.trpro.2018.12.173
Krueger, R., Rashidi, T.H., Rose, J.M., 2016. Preferences for shared autonomous vehicles. Transp. Res. Part C Emerg. Technol. 69, 343 --
355. https://doi.org/10.1016/j.trc.2016.06.015
Levin, M.W., Kockelman, K.M., Boyles, S.D., Li, T., 2017. A general framework for modeling shared autonomous vehicles with
dynamic network-loading and dynamic ride-sharing application. Comput. Environ. Urban Syst. 64, 373 -- 383.
https://doi.org/10.1016/j.compenvurbsys.2017.04.006
Loeb, B., Kockelman, K.M., 2019. Fleet performance and cost evaluation of a shared autonomous electric vehicle (SAEV) fleet: A case
study for Austin, Texas. Transp. Res. Part A Policy Pract. 121, 374 -- 385. https://doi.org/10.1016/j.tra.2019.01.025
Maciejewski, M., 2016. Dynamic Transport Services, in: Horni, A., Nagel, K., Axhausen, K.W. (Eds.), The Multi-Agent Transport
Simulation MATSim. Ubiquity Press, pp. 145 -- 152. https://doi.org/10.5334/baw.23
Maciejewski, M., Bischoff, J., Hörl, S., Nagel, K., 2017. Towards a Testbed for Dynamic Vehicle Routing Algorithms. Springer, Cham,
pp. 69 -- 79. https://doi.org/10.1007/978-3-319-60285-1_6
Martinez, L.M., Viegas, J.M., 2017. Assessing the impacts of deploying a shared self-driving urban mobility system: An agent-based
model applied to the city of Lisbon, Portugal. Int. J. Transp. Sci. Technol. 6, 13 -- 27. https://doi.org/10.1016/j.ijtst.2017.05.005
Meyer, J., Becker, H., Bösch, P.M., Axhausen, K.W., 2017. Autonomous vehicles: The next jump in accessibilities? Res. Transp. Econ.
62, 80 -- 91. https://doi.org/10.1016/J.RETREC.2017.03.005
Spieser, K., Treleaven, K., Zhang, R., Frazzoli, E., Morton, D., Pavone, M., 2014. Toward a Systematic Approach to the Design and
Evaluation of Automated Mobility-on-Demand Systems: A Case Study in Singapore, in: Road Vehicle Automation. Springer, pp.
229 -- 245. https://doi.org/10.1007/978-3-319-05990-7_20
20
Stocker, A., Shaheen, S., 2018. Shared Automated Mobility: Early Exploration and Potential Impacts, in: Road Vehicle Automation 4.
pp. 125 -- 139. https://doi.org/10.1007/978-3-319-60934-8_12
Vosooghi, R., Kamel, J., Puchinger, J., Leblond, V., Jankovic, M., 2019. Robo-Taxi service fleet sizing: assessing the impact of user trust
and willingness-to-use. Transportation (Amst). https://doi.org/10.1007/s11116-019-10013-x
Wardman, M., Chintakayala, V.P.K., de Jong, G., 2016. Values of travel time in Europe: Review and meta-analysis. Transp. Res. Part A
Policy Pract. 94, 93 -- 111. https://doi.org/10.1016/J.TRA.2016.08.019
Wen, J., Chen, Y.X., Nassir, N., Zhao, J., 2018. Transit-oriented autonomous vehicle operation with integrated demand-supply
interaction. Transp. Res. Part C Emerg. Technol. 97, 216 -- 234. https://doi.org/10.1016/J.TRC.2018.10.018
Zhang, W., Guhathakurta, S., Fang, J., Zhang, G., 2015a. The Performance and Benefits of a Shared Autonomous Vehicles Based
Dynamic Ridesharing System: An Agent-Based Simulation Approach, in: Transportation Research Board 95th Annual Meeting.
Washington DC, United States.
Zhang, W., Guhathakurta, S., Fang, J., Zhang, G., 2015b. Exploring the impact of shared autonomous vehicles on urban parking demand:
An agent-based simulation approach. Sustain. Cities Soc. 19, 34 -- 45. https://doi.org/10.1016/J.SCS.2015.07.006
|
1109.3948 | 2 | 1109 | 2012-02-06T09:21:16 | The Projection Method for Reaching Consensus and the Regularized Power Limit of a Stochastic Matrix | [
"cs.MA",
"cs.NI",
"eess.SY",
"math.OC",
"math.PR"
] | In the coordination/consensus problem for multi-agent systems, a well-known condition of achieving consensus is the presence of a spanning arborescence in the communication digraph. The paper deals with the discrete consensus problem in the case where this condition is not satisfied. A characterization of the subspace $T_P$ of initial opinions (where $P$ is the influence matrix) that \emph{ensure} consensus in the DeGroot model is given. We propose a method of coordination that consists of: (1) the transformation of the vector of initial opinions into a vector belonging to $T_P$ by orthogonal projection and (2) subsequent iterations of the transformation $P.$ The properties of this method are studied. It is shown that for any non-periodic stochastic matrix $P,$ the resulting matrix of the orthogonal projection method can be treated as a regularized power limit of $P.$ | cs.MA | cs |
ISSN 0005-1179, Automation and Remote Control, 2011, Vol. 72, No. 12, p. 2458. c(cid:13) Pleiades Publishing, Ltd., 2011.
Original Russian Text c(cid:13) R.P. Agaev and P.Yu. Chebotarev, 2011, published in Avtomatika i Telemekhanika, 2011, No. 12, pp. 38-59.
MULTI-AGENT SYSTEMS
The Projection Method for Reaching Consensus and
the Regularized Power Limit of a Stochastic Matrix1
R. P. Agaev and P. Yu. Chebotarev
Trapeznikov Institute of Control Sciences, Russian Academy of Sciences, Moscow, Russia
Received February 22, 2011
Abstract -- In the coordination/consensus problem for multi-agent systems, a well-known condition of
achieving consensus is the presence of a spanning arborescence in the communication digraph. The
paper deals with the discrete consensus problem in the case where this condition is not satisfied.
A characterization of the subspace TP of initial opinions (where P is the influence matrix) that ensure
consensus in the DeGroot model is given. We propose a method of coordination that consists of: (1) the
transformation of the vector of initial opinions into a vector belonging to TP by orthogonal projection
and (2) subsequent iterations of the transformation P. The properties of this method are studied. It is
shown that for any non-periodic stochastic matrix P, the resulting matrix of the orthogonal projection
method can be treated as a regularized power limit of P.
In the last decade, the problem of reaching consensus in multi-agent systems has been the subject of
many works. For the basic results in the field, we refer to the surveys and monographs [1 -- 11].
1. INTRODUCTION
1, . . . , s0
1, . . . , sk
n)T is the vector of initial opinions of the members of a group and s(k) = (sk
One of the first discrete models of reaching consensus was proposed by DeGroot [12]. Suppose that
n)T
s(0) = (s0
is the vector of their opinions after the kth step of coordination. In accordance with the DeGroot model,
s(k) = P s(k − 1), k = 1, 2, . . . , where P is a row stochastic influence matrix whose entry pij specifies the
degree of influence of agent j on the opinion1 of agent i. Thereby,
s(k) = P ks(0),
k = 1, 2, . . . .
(1)
Consensus is [asymptotically] achieved if limk→∞ sk
i = ¯s for some ¯s ∈ R and all i ∈ {1, . . . , n}.
It has been shown [12] that consensus is achieved for any initial opinions if and only if the matrix
P ∞ = limk→∞ P k exists and all rows of P ∞ are identical, which is equivalent to the regularity2 of P .
Thus, reaching consensus in the DeGroot model is determined by the asymptotic properties of the powers
of P and the initial opinions.
If P is not regular, then the opinions do not generally tend to agreement. Yet, consensus can be
achieved if the vector of initial opinions belongs to a certain subspace. Below we characterize this
subspace and consider the method of projection which ensures that consensus is achieved even if the
vector of initial opinions does not belong to the above-mentioned subspace. Furthermore, it is found that
1 This work was supported in part by the Russian Foundation for Basic Research, project no. 09-07-00371 and the program
of RAS Presidium "Mathematical Theory of Control."
1 Thus, row i of P determines an iterative adjustment process for agent i's opinion; since P is row stochastic, the degrees
of influence on each agent sum to 1.
2 A stochastic matrix is said to be regular [13] if it has no eigenvalues of modulus 1 except for the simple eigenvalue 1.
In the terminology of matrix
Regular stochastic matrices are also called SIA (stochastic, indecomposable, aperiodic).
analysis, we mainly follow [13, 14]; in the terminology of graph theory we follow [15 -- 17].
2458
THE PROJECTION METHOD FOR REACHING CONSENSUS
2459
the resulting matrix of the orthogonal projection procedure can be treated as a regularized power limit
of the initial stochastic matrix.
The paper is organized as follows. After introducing the terminology (Section 2) and listing a number
of well-known results used in the analysis of network dynamics (Section 3), in Section 4 we discuss the
conditions of reaching consensus in the DeGroot model. Section 5 characterizes the region of convergence
to consensus for the DeGroot model. Sections 6 -- 8 present the orthogonal projection procedure which
generalizes the DeGroot algorithm and can be applied when this algorithm does not ensure that consensus
is achieved. These sections also give the structure of the projection and the properties of the proposed
method. In Section 9, we consider some non-orthogonal projections onto the subspace of convergence to
consensus. In Section 8, we demonstrate that in the orthogonal projection procedure (as well as in the
DeGroot algorithm), the nonbasic agents do not affect the final result. In sections 10 and 12, the case of
the absence of nonbasic agents is studied and the main result is extended to the general case. Section 11
briefly discusses the interpretation of the orthogonal projection procedure, and the final Section 13 deals
with the concept of the regularized power limit of a stochastic matrix.
2. BASIC NOTATION
With a stochastic influence matrix P, we associate the communication digraph Γ with vertex set
V (Γ) = {1, . . . , n}. Γ has the (j, i) arc with weight wji = pij whenever pij > 0 (i.e., whenever agent j
influences agent i). Thus, arcs in Γ are oriented in the direction of influence; the weight of an arc is the
power of influence.
The Kirchhoff matrix (see [16, 18]) L = L(Γ) = (ℓij) of digraph Γ is defined as follows:
if j 6= i,
then ℓij = −wji whenever Γ has the (j, i) arc and ℓij = 0 otherwise; ℓii = −Pk6=i ℓik, i = 1, . . . , n. The
Kirchhoff matrix has zero row sums and nonpositive off-diagonal entries.
The matrices of this kind are sometimes referred to as directed Laplacians [19]. However, in a more
precise terminology [18, Section 2.2], the Laplacian matrix of a digraph is the matrix with zero row sums
whose non-diagonal entries are defined by ℓij = −wij, i.e., as distinct from the Kirchhoff matrix, the
entries in the ith row are determined by the weights of the arcs outgoing from3 i. Consequently, if all arcs
of Γ are reversed, then the Laplacian matrix of the resulting digraph coincides with the Kirchhoff matrix
of Γ and vice versa. Consequently, the Kirchhoff matrices and Laplacian matrices of digraphs form the
same class.
By virtue of the above definitions, for the digraph Γ associated with P we have
L(Γ) = I − P,
(2)
where I is the identity matrix.
Any maximal by inclusion strong (i.e., with mutually reachable vertices) subgraph of a digraph is
called a strong component (or a bicomponent) of this digraph. A basic bicomponent is a bicomponent
such that the digraph has no arcs coming into this bicomponent from outside. Vertices belonging and
not belonging to basic bicomponents can be called basic and nonbasic, respectively. Similarly, we call
an agent basic/nonbasic when the vertex representing this agent is basic/nonbasic. Let b and ν be the
number of basic vertices and the number of basic bicomponents in Γ, respectively.
We enumerate the basic bicomponents and after them the nonbasic bicomponents. Furthermore, we
enumerate the vertices in the first bicomponent, next the vertices in the second bicomponent, and so on.
We shall assume that agents are numbered correspondingly. In this case, the influence matrix P and the
3 Because of the similarity of these definitions, the Kirchhoff and Laplacian matrices are often confused. In the problems of
decentralized control, either formalism can be used. If the analysis is based on the construction of the influence digraph (as
in the present paper), it is convenient to use Kirchhoff matrices, while if the digraph of references (requests for information)
is constructed whose arcs are directed oppositely, it is more convenient to use Laplacian matrices.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2460
AGAEV, CHEBOTAREV
Kirchhoff matrix L have a lower block-triangular form called the Frobenius normal form. In the matrices
P and L represented in this form, the upper-left blocks of size b × b correspond to the basic vertices of
the communication digraph. These blocks will be denoted by PB and LB:
P = PB 0
∗ ! , L = LB 0
∗ ! .
∗
∗
(3)
PB and LB respectively coincide with the influence matrix and the Kirchhoff matrix of the communication
digraph restricted to the set of basic vertices/agents.
The vertex set of any bicomponents is called a class. We also speak of the corresponding classes of
agents. The vertex set of a basic bicomponent will be called a final class 4 [20].
If the DeGroot algorithm converges and vertex j is not basic, then, as noted in [12], column j in
the limiting matrix P ∞ is zero and the initial opinion of agent j does not affect the limiting vector of
opinions.
3. USEFUL RESULTS FROM ALGEBRAIC GRAPH THEORY
In this section, we present a number of results that are useful in the analysis of the DeGroot model
and other network control models. In particular, they are used to prove the subsequent theorems and
propositions (the proofs are given in the Appendix).
First, if the sequence of powers P k of a stochastic matrix P has a limit P ∞, then
P ∞ = J,
(4)
where J is the normalized matrix of maximum out-forests of the corresponding weighted digraph Γ (a
corollary of the matrix tree theorem for Markov chains [21]).
The matrix J is equal to the matrix Jn−ν defined recursively:
Jk = I − k
L Jk−1
tr(L Jk−1)
, where k = 1, . . . , n − ν, J0 = I, and L Jn−ν = 0
(see [23, Section 4] or [18, Section 5]) and can also be found by passage to the limit:
(Theorem 6 in [22]).
Furthermore, since L = I − P, we have
J = lim
τ →∞
(I + τ L)−1
P ∞L = LP ∞ = 0
and
N (P ∞) = R(L), R(P ∞) = N (L),
(5)
(6)
(7)
(8)
where N (A) and R(A) are the kernel (null space) and the range of A, respectively (see, e.g., [23, Sec-
tion 5]). Moreover, P ∞ is the eigenprojection5 (principal idempotent) of L [26, 27] and
rank P ∞ = ν;
rank L = n − ν,
(9)
4 In the above context, this definition may seem illogical, since a basic bicomponent does not allow arcs from outside.
However, it is justified by the fact that in the Markov chain determined by the influence matrix P, transitions occur not
in the direction of the arcs of influence, but rather in the direction of agents that influence. Thereby, "all roads lead to"
the basic bicomponents, and the union of final classes is exactly the set of essential states of the corresponding Markov
chain.
5 On the methods of computing eigenprojections, see, e.g., [24, 25].
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
THE PROJECTION METHOD FOR REACHING CONSENSUS
where ν is the number of basic bicomponents in Γ [22, Proposition 11]. It follows from (9) that
where dim N (L) is the dimension of the kernel (the nullity) of L. Finally, by [18, Proposition 12],
dim N (L) = ν,
N (L) ∩ R(L) = {0},
ind L = 1,
2461
(10)
(11)
(12)
where ind L (the index of L) is the order of the largest Jordan block of L corresponding to the zero
eigenvalue, and by (10) and (12),
mL(0) = ν,
(13)
where mL(0) is the multiplicity of 0 as an eigenvalue of L.
4. CONDITIONS FOR CONVERGENCE TO CONSENSUS IN THE DEGROOT MODEL
As noted in the Introduction, the DeGroot algorithm converges to consensus for any initial opinions
if and only if there exists a limiting matrix P ∞ = limk→∞ P k having all rows equal. According to the
ergodic theorem for Markov chains, a necessary and sufficient condition for this is, in turn, the regularity
(the SIA property) of P.
The equality of all rows of P ∞ amounts to
P ∞ = 1πT
(14)
with some probability vector (the components are non-negative and sum to 1) π, where 1 = (1, . . . , 1)T.
In this case, the consensus ¯s is expressed by the inner product of the vectors π and s(0):
s(∞) = P ∞s(0) = 1πTs(0) = 1¯s,
(15)
where s(∞) is the limiting vector of opinions, π is the limiting weight distribution of the DeGroot
algorithm, and ¯s = πTs(0) is the consensus.
A probability vector π is called a stationary vector of a stochastic matrix P if it is a left eigenvector
of P corresponding to the eigenvalue 1: πTP = πT. Obviously, this condition is satisfied for the vector
π in the representation P ∞ = 1πT of P ∞, provided that the convergence of the DeGroot algorithm to
consensus is guaranteed by the regularity of P.
By Theorem 3 in [12], if for any vector of initial opinions s(0), the DeGroot algorithm converges to
the consensus πTs(0), then6 π is a unique stationary vector of P .
Let us mention some sufficient conditions [12] of the convergence of P k (k → ∞) to a matrix with
identical rows. One of them is the presence of an entirely positive column (stochastic matrices with at
least one positive column are called Markov matrices) in P k for some k. Another sufficient condition is
that all states in the Markov chain corresponding to P are mutually accessible (in this case, Γ is strongly
connected and the agents belong to the same class) and P is proper [13] (which means that P has no
eigenvalues of modulus 1 that are not equal to 1); in this case, P is said to be primitive.
A criterion of convergence to consensus for the DeGroot algorithm can also be formulated in terms of
the communication digraph Γ. The equality of the rows of P ∞ is equivalent to rank P ∞ = 1. Therefore,
owing to (9), when the sequence {P k} converges, consensus is achieved for any initial opinions if and only
if the communication digraph Γ corresponding to P has a single basic bicomponent (ν = 1). Consequently,
6 In fact, already in [13] (§ 7 of Chapter 13) it was observed that if P is regular, then the vector π can be uniquely recovered
from the equation π = P Tπ and each row of P ∞ = limk→∞ P k is the transpose of π.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2462
AGAEV, CHEBOTAREV
provided that the sequence P k converges, ν = 1 is equivalent to the regularity of P . In turn, by (13),
this is the case if and only if 0 is a simple eigenvalue of L.
Finally, ν = 1 if and only if Γ has a spanning out-tree (also called arborescence and branching) [22,
ij ) = J = ( Jij) is the normalized matrix of spanning
In this case (see (4)), P ∞ = (p∞
Proposition 6].
out-trees [22]:
ij = πj = Jij =
p∞
tj
t
,
i, j = 1, . . . , n,
(16)
where tj is the total weight7 of Γ's spanning out-trees rooted at j and t is the total weight of all spanning
out-trees of Γ. It follows from (15) and (16) that in the case of guaranteed consensus,
¯s =(cid:18) t1
t
, . . . ,
tn
t (cid:19) s(0) = t−1
nXj=1
tj s0
j .
A survey of some results on the DeGroot model and its generalizations can be found in [4, 8]. Note
that one of the applications of the DeGroot model is information control in social networks [28].
5. THE REGION OF CONVERGENCE TO CONSENSUS OF THE DEGROOT ALGORITHM
Consider an influence matrix P whose powers converge to8 P ∞, but the rows of P ∞ are not necessarily
equal.
In the vector space of initial opinions s(0), let us find the subspace TP whose vectors are transformed
by P ∞ into vectors with equal components. Obviously, the DeGroot algorithm (1) with a proper matrix P
leads to a consensus if and only if s(0) ∈ TP . That is why TP will be referred to as the region of convergence
to consensus of the DeGroot algorithm (1). In Section 6, we will present a consensus procedure which
consists of two steps: on the first step, the vector of initial opinions s(0) 6∈ TP is replaced by the nearest
vector in TP ; on the second step, the algorithm (1) is applied to the result of the first step.
The following theorem characterizes the subspace TP .
Theorem 1. If the powers P k of the stochastic matrix P converge, then TP = R(L) ⊕ T1, where TP
is the region of convergence to consensus of the DeGroot algorithm (1), L = I − P, and T1 is the linear
span of the vector 1 = (1, . . . , 1)T.
Now we reformulate Theorem 1 in a different form.
ξ
Corollary 1. Suppose that the powers P k of the stochastic matrix P converge and L = I − P. Let L(i)
be the matrices resulting from L by substituting 1 for the ith column and adding ξ1, where
and M (i)
ξ ∈ R r {0}, to the ith column, respectively. Then TP = R(L(i)) = R(cid:0)M (i)
ξ (cid:1) for any i = 1, . . . , n.
To prove Corollary 1, it is sufficient observe that any column of L is equal to the sum of the remaining
columns taken with the minus sign. Consequently, its removal does not affect the linear span of the
columns. Thus, R(L(i)) = R(L) ⊕ T1 and so TP = R(L(i)) is equivalent to the assertion of Theorem 1.
Similarly, R(cid:0)M (i)
ξ (cid:1) = R(L) ⊕ T1, and TP = R(cid:0)M (i)
ξ (cid:1) is also equivalent to the assertion of Theorem 1.
Remark 1. Corollary 1 can also be formulated as follows: s(0) ∈ TP if and only if either system
Indeed, the consistency of these systems is
of equations L(i)x = s(0) or M (i)
ξ x = s(0) is consistent.
tantamount to s(0) ∈ R(L(i)) and s(0) ∈ R(cid:0)M (i)
ξ (cid:1), respectively.
7 The weight of an out-tree (and, more generally, of a digraph) is the product of the weights of all its arcs.
8 This assumption is not too restrictive. It is satisfied, e.g., if every final class has at least one agent taking into account its
own current opinion in the iterative adjustment of its opinion. More generally, the limit P ∞ exists [13] if and only if P is
proper, i.e., P has no eigenvalues (6= 1) of modulus 1.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
THE PROJECTION METHOD FOR REACHING CONSENSUS
2463
In what follows, we will need a matrix with independent columns whose range is TP .
Corollary 2. Let U be any matrix obtained from L by (1) deleting, for each final class, one column
corresponding to some vertex of this class and (2) adding 1 as the first column. Then the columns of U
are independent and TP = R(U ).
Remark 2. Owing to Corollary 2, the n − b columns of L corresponding to the nonbasic vertices are
linearly independent. Therefore, for U to remain a matrix of full column rank, they can be replaced
by any n − b independent columns with zeros in all "basic" rows (see also Proposition 1 and Corollary 4
below).
Using (8) and (4) the region TP of convergence to consensus can also be represented through the kernel
of P ∞ = J.
Corollary 3. Under the assumptions of Theorem 1, TP = N ( J ) ⊕ T1.
Remark 3. According to (9) rank J = ν. By virtue of [13, (102) in Chapter 13], P ∞ = J has a lower
block-triangular form. Moreover, its submatrix corresponding to the basic vertices is block-diagonal:
every basic bicomponent is represented by a diagonal block with equal rows. Therefore, N ( J ) is the
orthogonal complement of the linear span of ν columns of J T taken one from each diagonal block repre-
senting a basic bicomponent.
The following proposition enables one to "locate" the subspace TP .
Proposition 1. Let x ∈ Rn. Then x ∈ TP ⇔ xB ∈ TPB, where xB is x with the nonbasic components
removed.
By the definition of TP , to prove Proposition 1, it is sufficient establish that P ∞x = a1n ⇔ (PB)∞xB =
a1b, where a ∈ R, (PB)∞ = limk→∞(PB)k, and the vectors 1 are supplied with their dimensions as a
subscript. This equivalence can be easily deduced from the following properties of the matrix P ∞
(see [13, (102) in Chapter 13]): (1) the submatrix of P ∞ corresponding to the basic vertices coincides
with (PB)∞; (2) the last n − b columns of P ∞ consist of zeros; (3) the last n − b rows of P ∞ are convex
combinations of the first b rows.
Corollary 4 (of Proposition 1). The region of convergence to consensus of the DeGroot algorithm has
the form TP = TPB × Rn−b.
Example 1. Consider the multi-agent system whose communication digraph Γ is shown in Fig. 1.
For simplicity, Fig. 1 does not show loops (every vertex has a loop whose weight sums to 1 with the
weights of all arcs entering this vertex).
The basic bicomponents of Γ are the restrictions of Γ to the classes {1, 2, 3} and {4, 5}; the class {6, 7}
is nonbasic. Matrices P and L = I − P of the communication digraph Γ are as follows:
P =
0 0.3
0.7
0.1 0.9
0
0.4 0.2 0.4
0
0
0
0
0 0.1 0.3
0
0
0
0
0
0
0
0
0 0.7 0.3
0 0.2 0.8
0
0 0.2
0
0
0
0
0
0
0
0
0
0
0 0.3 0.3
0 0.2 0.6
, L =
0
0
0
0.3
−0.1
0.1
−0.4 −0.2
0
0
0 −0.3
0
0.6
0
0 −0.2
0
0 −0.2
0
0
0 −0.1 −0.3
0
0
0
0
0
0
0
0
0
0.3 −0.3
0.2
0
0 −0.2
0
0
0
0
0
0.7 −0.3
0.4
0
.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2464
AGAEV, CHEBOTAREV
Fig. 1. The communication digraph Γ of a multi-agent system.
We construct the matrix U (see Corollary 2) by removing the first and the fourth column of L and
adding 1 as the first column; also find the matrix P ∞ = J by using (5) or (6) or by computing limk→∞ P k :
U =
0 −0.3
0
0.6
0
1
0
1
0.1
1 −0.2
0
0 −0.3
0
1
0
0.2
1
0
1 −0.1 −0.3
0
0 −0.2
1
0
0
0
0
0
0
0.7 −0.3
0.4
0
0
0
0
0
0
, P ∞ ≈
0.2
0.2
0.2
0
0
0.4
0.4
0.4
0
0
0.4
0.4
0.4
0
0
0 0 0
0 0 0
0 0 0
0.6 0 0
0.6 0 0
0.291 0.291 0.146 0.109 0.164 0 0
0.146 0.146 0.073 0.255 0.382 0 0
0
0
0
0.4
0.4
(17)
(in P ∞, all entries, except for the decimal values in the last two rows, are exact).
According to Corollary 2, U has full column rank and the linear span of its columns coincides with
the region of convergence to consensus of the DeGroot algorithm: R(U ) = TP . Finally, according to
Corollary 3 and Remark 3, TP is the direct sum of T1 and the orthogonal complement of the linear span
of the vectors9
π1 =(cid:0)0.4 0.4 0.2 0 0 0 0(cid:1)T and π2 =(cid:0)0 0 0 0.4 0.6 0 0(cid:1)T,
obtained by transposing the rows of P ∞ corresponding to the different final classes.
(18)
6. THE ORTHOGONAL PROJECTION METHOD
If P is not regular, then TP 6= Rn, i.e., there are vectors of initial opinions not driven to consensus by
the DeGroot algorithm. Consider the case where consensus is still needed. How can it be reached? A
natural suggestion is to enrich the communication digraph with additional links that will ensure regularity
of the matrix P and to perform the iterative adjustment of opinions with the new matrix. However, one
can imagine a situation where communication between agents is their prerogative and the only thing the
"center" may suggest (or theoretically consider) is a certain correction of the initial conditions s(0). In
what follows, we consider mathematical and algorithmic aspects of this approach.
As shown above, to ensure reaching consensus by means of the DeGroot algorithm with matrix P,
it is necessary to transform the vector s(0) into some vector s′(0) ∈ TP . In doing so, it is desirable to
minimize ks′(0) − s(0)k, where k·k is the Euclidean norm.
The transformation mapping any vector s(0) into the closest vector in TP is the orthogonal projection
P ). According to Lemma 2.3 in [29] this projection is
of Rn onto TP (along the orthogonal subspace T ⊥
given by a symmetric idempotent matrix; we will denote it by S.
9 Here, the row vectors are represented in a "matrix" form, i.e., their components are separated by a space.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
THE PROJECTION METHOD FOR REACHING CONSENSUS
2465
If the initial conditions are adjusted by means of the orthogonal projection S, then the limiting vector
of opinions s(∞) can be represented as follows:10
s(∞) = P ∞Ss(0).
This method will be called the orthogonal projection procedure for reaching consensus. The matrix
∞
P :
P ∞S will be referred to as the resulting matrix of the orthogonal projection procedure and denoted by
∞
P = P ∞S.
(19)
By construction, the orthogonal projection procedure leads to a consensus for any vector of initial
opinions11 s(0) (recall that TP is the region of convergence to consensus of the DeGroot algorithm, while
∞
S projects Rn onto TP ). Consequently, all rows of the matrix
P are identical, i.e., there is a vector
α = (α1, . . . , αn)T such that
∞
P = 1αT.
(20)
Vector α will be referred to as the weight vector of the orthogonal projection procedure. Thus, the proposed
procedure can be written in the form
s(∞) = P ∞Ss(0) =
∞
P s(0) = 1αTs(0) = 1¯s,
(21)
where s(0) is an arbitrary vector of initial opinions, α is the weight vector of the orthogonal projection
procedure, and ¯s = αTs(0) is the consensus.
Is α a probability vector? S is the projection onto the subspace TP which by Theorem 1 contains 1.
Consequently, S leaves 1 fixed, i.e., S has all row sums equal to 1. Given the fact that P ∞ is stochastic,
i=1 αi = 1. Observe, however, that S may have
we obtain that
negative entries. Therefore, the answer to the question on the nonnegativity of the weight vector α is
not immediately obvious. This question will be answered in Section 10. This will enable one to interpret
the matrix
P = P ∞S also has row sums 1, i.e., Pn
∞
∞
P as the regularized power limit of the stochastic matrix P.
7. FINDING THE ORTHOGONAL PROJECTION
Consider the properties of the projection S. It is known [29] that for any rectangular matrix A, the
matrix AA+ where A+ is the Moore-Penrose generalized inverse of A, is the orthogonal projection with
range R(A).
Note that the matrix U defined in Corollary 2 has full column rank n − ν + 1 and R(U ) = TP . Hence,
owing to the above fact, the orthogonal projection S with range TP has the expression S = U U +. To
determine U +, we use the formula U + = (U TU )+U T (see, e.g., Problem 2.17(d) in [29]) which for the
matrix U of full column rank takes the form U + = (U TU )−1U T. Consequently,
S = U U + = U (U TU )−1U T.
(22)
The following proposition clarifies the structure of S.
10 Note that in finding s(∞), as well as in the DeGroot algorithm, there is no necessity to compute the powers of P : it is
sufficient to iterate the multiplication of P by vectors, starting with the vector Ss(0); the calculation of Ss(0) will be
discussed below.
11 Formally, this can be proved as follows: by the definition of S, Theorem 1, and Eq. (7), R(P ∞S) = {P ∞Ss(0) s(0) ∈
Rn} = {P ∞(Ly + a1) y ∈ Rn, a ∈ R} = {a1 a ∈ R}.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2466
AGAEV, CHEBOTAREV
Proposition 2. The orthogonal projection S onto the subspace TP has the form
S = SB 0
I ! ,
0
(23)
where SB is the orthogonal projection onto the region TPB of convergence to consensus of the DeGroot
algorithm with matrix PB.
Proposition 2 follows from Corollary 4. The nonbasic components of any vector do not alter when the
vector is projected onto TP , since any alteration would be contrary to the minimality of the distance to
the projection.
Computing, with the help of (22), the projection S for Example 1 we obtain
S =
1
22
18 −4 −2
−4
18 −2
−2 −2
21
2
4
3 −6
6
0
0
0
0
0
0
0
4
6
0
4
6
0
2
3
18 −6
0
13
0
0 22
0
0
0
0
0
0
0
0 22
4
6
0
0
≈
0.818 −0.182 −0.091
0.818 −0.091
0.955
0.091
0.136 −0.273
0
0
−0.182
−0.091 −0.091
0.182
0.273
0
0
0.273 0 0
0.182
0.273 0 0
0.182
0.091
0.136 0 0
0.818 −0.273 0 0
0.591 0 0
0 1 0
0 0 1
0.182
0.273
0
0
0
0
.
Substituting S and the matrix P ∞ = J (17) into (19) we find the resulting matrix of the orthogonal
projection procedure:
∞
P = P ∞S = 1· 1
Note the following properties of the vector α = 1
110(cid:0)26 26 13 18 27 0 0(cid:1) ≈ 1·(cid:0)0.2364 0.2364 0.1182 0.1636 0.2455 0 0(cid:1).
110(cid:0)26 26 13 18 27 0 0(cid:1)T representing the matrix
∞
P in
accordance with (20): (1) the components of α corresponding to the basic vertices are strictly positive;
i=1 αi = 1; (3) as the comparison
m, where
the components corresponding to the nonbasic vertices are zero; (2) Pn
of (24) and (18) suggests, if vertices k and m belong to the ith final class, then αk/αm = πi
πi is the stationary vector of the influence matrix of the ith basic bicomponent.
k/πi
(24)
The second property has already been proved in the general case (Section 6). Later in this paper we
will prove that the remaining properties hold true as well.
Generally speaking, the orthogonal projection procedure makes a transition from the matrix P ∞
bringing each final class to its separate consensus to the matrix
∞
P establishing a common consensus.
8. DO THE NONBASIC AGENTS AFFECT ANYTHING?
As noted in the Introduction, if the DeGroot algorithm leads to a consensus, then this consensus does
not depend on the initial opinions of the nonbasic agents. This property is inherited by the orthogonal
projection procedure with the difference that under this procedure with a proper (aperiodic) matrix P,
consensus is always achieved. This is stated by the following proposition.
Proposition 3. In the case of a proper matrix P, the resulting vector of opinions s(∞) of the orthogonal
projection procedure does not depend on the initial opinions of the nonbasic agents.
Note that according to (21), s(∞) = P ∞s′(0), where s′(0) = Ss(0). By Proposition 2, the components
of s′(0) corresponding to the nonbasic vertices are equal to the corresponding components of s(0): the
"preequalization" performed by the transformation S does not alter the opinions of the nonbasic agents.
Proposition 3 immediately follows from the equation s(∞) =
∞
P s(0) (21) and the following represen-
tation of the matrix
∞
P .
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
THE PROJECTION METHOD FOR REACHING CONSENSUS
2467
Theorem 2. For any proper matrix P, vector α determining the resulting matrix
∞
P = 1αT of the
orthogonal projection procedure has the form
where (α1, . . . , αb) is any row of the matrix (PB)∞SB (see (3) and (23)).
α = (α1, . . . , αb, 0, . . . , 0)T,
The answer to the more general question "Is the result of the orthogonal projection procedure affected
by the presence of nonbasic agents?" is also "No."
Proposition 4. In the case of a proper matrix P, consensus ¯s of the orthogonal projection procedure
does not alter with the exclusion of nonbasic agents, provided that the initial opinions of the basic agents,
as well as the weights of their influence on each other, are preserved.
Proposition 4, as well as Proposition 3, follows from Theorem 2 which implies that the vector (α1, . . . , αb)T
∞
P does not alter with the exclusion of nonbasic agents. The properties of this vector will be
determining
summarized in Theorem 3 (Section 10).
Thus, under the orthogonal projection procedure, the only result of the presence of nonbasic agents is
that finally their opinions come to the same consensus as the opinions of the basic ones. This consensus
does not depend on the initial opinions of the nonbasic agents or even their presence.
9. NONORTHOGONAL PROJECTION ON THE SUBSPACE OF CONVERGENCE TO
CONSENSUS
In the orthogonal projection procedure, iterative adjustment (1) is preceded by the projection of the
vector of initial opinions s(0) onto the subspace TP (preequalization). By virtue of Proposition 2, to
find the orthogonal projection matrix S, the communication digraph can be restricted to the set of basic
vertices.
An alternative to S is a stochastic matrix that transforms any vector of initial opinions into a vector
in TP and at the same time approximates P. It makes sense to additionally require that this matrix be
idempotent, since otherwise it would alter some vectors already in TP which do not need any preequal-
ization. The problem of finding such a matrix has much in common with the classical problem of matrix
approximation (see, e.g., [30] and [14, Section 7.4]).
corresponding rows of S and the remaining rows equal to the last n − b rows of P . More specifically, if
It can be shown that instead of S one can use the matrix eS that has the first b rows equal to the
P = PB 0
0
(25)
= kP − SkE,
B D ! and S = SB 0
I ! (see (3) and (23)), then
B D ! .
eS = SB 0
eS is not generally idempotent, however, since B 6= 0, we have
0 (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)E
<(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
kP − eSkE =(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)
PB − SB 0
PB − SB
B
0
0
D − I (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)E
a zero block corresponding to the nonbasic vertices (indeed, they correspond to the inessential states of
where kXkE is the Euclidean norm of X, i.e., eS is closer to P than S. On the other hand, since P ∞ has
the Markov chain determined by P ; see [13, (102) in Chapter 13]), we have P ∞S = P ∞eS, consequently,
the following proposition holds.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2468
AGAEV, CHEBOTAREV
leads to the same consensus as the orthogonal projection procedure.
Proposition 5. If P is proper and eS is given by (25), then the two-stage procedure of coordination
consisting of the preequalization s′(0) = eSs(0) and the iterative adjustment s(k) = P ks′(0), k = 1, 2, . . . ,
As a consequence, we obtain that R(eS) ⊆ TP . It can be shown that if the nonsingularity of the block
D is satisfied, then R(eS) = TP .
Remark 4. Let us mention other specific transformations of the space of initial opinions Rn into
the subspace TP . They do not require computing the orthogonal projection S. Owing to Corollary 1 of
Theorem 1, for the matrices L(i) and M (i)
ξ obtained from L by substituting 1 for the ith column and adding
to it ξ1, where ξ ∈ R r {0}, respectively, R(L(i)) = R(M (i)
ξ ) = TP holds. Thus, preequalization of the
initial vector s(0) by means of either L(i) or M (i)
ensures achieving consensus in the subsequent iterative
adjustment with P. However, it is easy to verify that this approach generates dictatorial procedures:
they lead to a consensus that is equal to the initial opinion of the ith agent if L(i) or M (i)
is used or is
1
proportional to it (i.e., distorts it) in the case of M (i)
ξ with ξ 6∈ {0, 1}. Thus, this method is only good for
the concealment of the dictatorial "coordination" of opinions.
ξ
In considering other possible mappings of the space Rn into TP , the main advantages of the projection
S should be taken into account, namely, that it guarantees the minimal difference between the initial
vector of opinions and the result of its preequalization.
The orthogonal projection S has the expression (22). In Section 10, we will obtain another explicit
expression for S which is useful for studying the properties of the orthogonal projection procedure and
its interpretation.
10. THE ORTHOGONAL PROJECTION METHOD WHEN ALL AGENTS ARE BASIC
According to Theorem 2 nonbasic agents do not affect the vector (α1, . . . , αb)T which determines the
consensus in the orthogonal projection procedure. Therefore, all essential problems can be seen in the
case where all agents are basic. This case is considered in the present section.
Suppose, as before, that P is proper, limk→∞ P k = P ∞, and the number of basic bicomponents is ν.
Since there are no connections between the basic bicomponents, in the absence of nonbasic agents the
DeGroot algorithm is divided into ν independent processes of coordination. It is interesting to see how
the orthogonal projection procedure integrates these processes.
Let mi be the number of vertices in the ith bicomponent. Its influence matrix, Kirchhoff matrix, and
, respectively. In the absence
the power limit of the influence matrix we denote by Pi, Li = (ℓi
of nonbasic agents, P, L, and P ∞ have the form:
uv), and P ∞
i
P =
, L =
, P ∞ =
(26)
where the diagonal blocks correspond to the final classes and the entries not in these blocks are zero.
The matrices P ∞
correspond to the strongly connected digraphs, so (see the sufficient conditions of
achieving consensus in Section 4) all the rows of each of them are identical, i.e., these matrices can be
represented in the form
i
where (πi)T is any row of P ∞
i
.
P ∞
i = 1(πi)T,
i = 1, . . . , ν,
(27)
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
P1
P2
. . .
Pν
L1
L2
. . .
Lν
P ∞
1
P ∞
2
. . .
P ∞
ν
,
THE PROJECTION METHOD FOR REACHING CONSENSUS
2469
Consider the following problem: How is the weight vector α of the orthogonal projection procedure
(21) related to the vectors πi?
Let qi = πi−1 − πi, i = 2, . . . , ν, where πi ∈ Rn is πi supplemented by zeros in the positions correspond-
ing to all bicomponents, except for the ith one. Define X as the matrix obtained from L by replacing
the first column by 1 and the first columns of the blocks corresponding to the other bicomponents by
the zero columns. Thus, X contains ν − 1 zero columns and all other columns of X are independent, so
rank X = n − ν + 1 (see Corollary 2 to Theorem 1).
Now define Z as the matrix obtained from X by replacing the zero columns in the blocks with numbers
i = 2, . . . , ν by the vectors qi. The form of Z with ν = 3 is presented in Eq. (28):
Z =
ℓ1
1m1
1
ℓ1
12
...
1
1 ℓ1
m12
1
0
. . .
. . .
. . . ℓ1
. . .
m1m1
1
1
1
1
1
0
0
0
0
0
. . .
. . .
. . .
. . .
. . .
0
π1
1
...
π1
m1
−π2
1
...
−π2
m2 ℓ2
m22
0
0
0
0
ℓ2
12
...
0
0
0
0
. . .
. . .
...
0
0
0
0
0
0
. . .
0
0
0
0
0
ℓ2
1m2
. . .
. . .
. . .
. . .
. . . ℓ2
. . .
m2m2
...
0
0
0
. . .
. . .
. . .
. . .
0
0
0
0
0
0
0
0
0
π2
1
...
π2
m2
−π3
1
...
−π2
m3 ℓ3
. . .
. . .
. . .
. . .
0
0
ℓ3
12
...
m32 . . . ℓ3
0
0
ℓ3
1m3
...
m3m3
.
(28)
Lemma 1. Z is nonsingular.
By virtue of Lemma 1 and the proof of Theorem 2.8 in [29], the orthogonal projection S with range
TP satisfies
S = XZ −1.
Substituting (29) into (19) and using (20) yield
1αT =
∞
P = P ∞S = P ∞XZ −1.
(29)
(30)
Equation (30) is used in Theorem 3 which summarizes some properties of the vector α, the weight
vector of the orthogonal projection procedure (see (21)). In particular, this theorem establishes a relation
between α and the vectors πi and matrix Z −1 (see (27) and (28)).
Theorem 3. If all agents are basic, then the following assertions hold:
1. The row vector αT coincides with the first row of Z −1;
2. All components of α are positive and Pn
except for the first row , is 0;
i=1 αi = 1. The sum of the entries in any row of Z −1,
3. Let c(g) be the number of the bicomponent containing vertex g. Then for g, h = 1, . . . , n,
αg
αh
=
g
βc(g) πc(g)
βc(h) πc(h)
h
,
of Γ and the total weight of those of them that are rooted at l, respectively.
l=1(ti
l)2; ti and ti
l are the total weight of all spanning out-trees in the ith bicomponent
where βi = (ti)2/Pmi
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2470
AGAEV, CHEBOTAREV
Fig. 2. The communication digraph ΓB.
Example 2. Restrict the communication digraph of Example 1 to the union of the final classes (Fig. 2).
In other words, consider the subsystem whose influence matrix and Kirchhoff matrix have the form:
PB =
0 0.3
0.7
0.1 0.9
0
0.4 0.2 0.4
0
0
0
0
0
0
0
0
0
0
0 0.7 0.3
0 0.2 0.8
, LB = I − PB =
0.3
−0.1
0.1
−0.4 −0.2
0
0
0 −0.3
0
0.6
0
0 −0.2
0
0
0
0.3 −0.3
0.2
0
0
0
0
0
.
The limiting matrix (PB)∞ = limk→∞(PB)k of this subsystem is the "basic" submatrix of P ∞ = J
which was found in Section 5 (see (17)):
Find the resulting matrix of the orthogonal projection procedure using (29). First, we construct the
matrices X and Z defined above:
X =
1
1
0.1
1 −0.2
0
1
1
0
0 −0.3 0
0 0
0.6 0
0
0
0
0 0 −0.3
0 0
0.2
, Z =
0 −0.3
0
0.6
1
1
0.1
1 −0.2
0
1
1
0
0.4
0.4
0.2
0
0
0
0 −0.4 −0.3
0 −0.6
0.2
.
Compute Z −1 and, using Eq. (29), the projection SB:
(PB)∞ = JB =
0.4 0.4 0.2
0.4 0.4 0.2
0.4 0.4 0.2
0
0
0
0
0
0
0
0
0
0
0 0.4 0.6
0 0.4 0.6
.
, SB ≈
Z −1 ≈
0.236 0.236
0.118
−4.182 5.818 −2.091
−1.939 1.394
0.455 0.455
0.182 0.182
0.245
0.273
0.697 −0.061 −0.091
0.227 −0.455 −0.682
0.091 −2.182
1.727
0.164
0.182
0.818 −0.182 −0.091
0.818 −0.091
0.955
0.091
0.136 −0.272
−0.182
−0.091 −0.091
0.182
0.273
0.182
0.273
0.182
0.273
0.091
0.136
0.818 −0.273
0.591
0.182
0.273
.
SB coincides (see Proposition 2) with the "basic" submatrix of the projection S found in Section 7.
The resulting matrix of the orthogonal projection procedure is given by (19):
In accordance with Theorem 2,
of Z −1 coincides with any row of
∞
P B = (PB)∞SB ≈ 1·(cid:0)0.2364 0.2364 0.1182 0.1636 0.2455(cid:1).
∞
P B coincides with the "basic" submatrix of
∞
P (see (24)). The first row
∞
P B, as stated in Theorem 3.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
THE PROJECTION METHOD FOR REACHING CONSENSUS
2471
Thus, in the case where all agents are basic, the orthogonal projection method makes a transition
from a series of local consensuses reached by applying the transformation (PB)∞ to a global consensus
P B with the vectors πi that determine
established by
(PB)∞ is given by item 3 of Theorem 3.
∞
P B. A relation between the vector α determining
∞
11. ON THE INTERPRETATION OF THE ORTHOGONAL PROJECTION METHOD
∞
An interpretation of the orthogonal projection method can be obtained using the following consequence
P = 1αT) is a probability
of Theorem 3: α (the weight vector of the orthogonal projection procedure:
vector; in other words, it determines an impact distribution on the set of agents. Indeed, the resulting
consensus is equal to the weighted mean of the initial opinions with weights taken from the distribution α.
By Theorem 3, the relative weight of the ith vertex of the kth bicomponent in the distribution α is
determined by (1) the fraction of the weight of out-trees starting from vertex i in the total weight of
out-trees of the kth bicomponent (this fraction is equal to πi
k) and (2) the relative uniformity of the kth
bicomponent w.r.t. the weight of the trees starting from its vertices: it can be shown that the higher the
uniformity, the grater βi. This leads to the conclusion that the resulting opinion is maximally influenced
by those leaders in the bicomponents who "broke away from their pursuers." Note that Eq. (A.6) gives
several expressions for αg/αh which provide a number of variations in interpretation of agents' weights
in the orthogonal projection procedure.
In fact, the two-stage method consisting of the preequalization and the subsequent averaging using
the influence matrix acts as if the basic bicomponents were combined into a single component by some
additional arcs. In a subsequent paper, we shall specify what additional arcs lead to a result equivalent
to the preequalization using the orthogonal projection.
Note that enriching connections and finding the stationary vector of the stochastic matrix correspond-
ing to the resulting digraph is the essence of the PageRank method [31]. In it, the links are added evenly,
between all vertices and with equal weights. The structure of additional connections that emulates the
orthogonal projection procedure is more complex.
12. MORE ON NONBASIC AGENTS
The projection S can be represented in the form (29) not only in the case where all agents are basic,
but in the general case as well. For this, it is sufficient to apply the definitions of X and Z given in
Section 10 to an arbitrary matrix L and use the proof of Theorem 2.8 in [29]. In this case, item 1 of
Theorem 3 remains true.
Below we "obtain a somewhat more general result. For the set of basic vertices, we define the matrix
XB using the definition of X given in Section 10. Now to define the matrix X for the whole set of vertices,
we supplement XB with a zero block on the right, the block LB that corresponds in L to the nonbasic
vertices, and an arbitrarily filled block12 G; let Z be the same extension of ZB:
X = XB 0
G LB ! , Z = ZB 0
G LB ! .
(31)
Due to Lemma 1 in Section 10, ZB is nonsingular. According to the proof of Proposition 11 in [22],
LB is also nonsingular. Therefore, Z is invertible. Using (31), the Frobenius formula for the inversion of
block matrices [13, (86) in Chapter 2], (29), and (23) we find
XZ −1 = XB 0
G LB !
B
Z −1
B GZ −1
0
B L−1
−L−1
B ! = XBZ −1
0
B 0
I ! = SB 0
I ! = S.
0
12 Both the block G and the zero block on the right can simply be copied from the Kirchhoff matrix L.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2472
AGAEV, CHEBOTAREV
Thus, the following result holds (the second assertion is proved as in Theorem 3).
Proposition 6.
1.
In the presence of nonbasic agents, the orthogonal projection onto the subspace of convergence
to consensus of the DeGroot algorithm has the representation S = XZ −1, where X and Z are defined
in (31).
2. The row vector αT such that
∞
P = 1αT coincides with the first row of Z −1.
13. THE REGULARIZED POWER LIMIT OF A STOCHASTIC MATRIX
The meaning of Eq. (30), Theorem 3, and Proposition 6 is beyond the scope of the consensus problem.
P = P ∞S is stochastic, has
In particular, they state that for any proper stochastic matrix P, the matrix
∞
rank 1 (and thus all its rows are identical) and in the case where P is regular,
∞
P = P ∞.
Moreover, item 3 of Theorem 3 states that the components of the vector α that determines
∞
P =
1αT) have a natural property, namely, within the same (ith) basic bicomponent, their ratio is equal to
the ratio of the corresponding components of the vector πi, the stationary vector of the bicomponent.
Otherwise, if two vertices belong to different bicomponents i and j, then to obtain their ratio, the ratio
of the corresponding elements of πi and πj is to be multiplied by the ratio of specific "weights" of the
bicomponents measuring their internal homogeneity.
∞
P (
On the other hand, studying the problem of consensus leads to the conclusion that there are cases
where it is useful to associate with a stochastic matrix P an adjusted power limit of rank 1, even though
P can be not regular.
These considerations allow us to call the matrix
∞
P associated with a proper stochastic matrix P the
regularized power limit of P . The meaningfulness of this concept is supported by the following properties.
Proposition 7. For any proper stochastic matrix P :
(1) vector α such that
∞
P =
∞
P P = P
P = P ∞
(2)
∞
∞
∞
P P ∞ =
∞
P .
P = 1αT is a stationary vector of the matrix P : αTP = αT;
Item 1 of Proposition 7 follows from the fact that by item 3 of Theorem 3, α is a linear combination
of the vectors π1, . . . , πν each of which is a stationary vector of P. Item 2 follows from item 1.
Note that using the Ces`aro limit limm→∞
k=1 P k, the concept of the regularized power limit of a
stochastic matrix can be extended to arbitrary (not necessarily proper) stochastic matrices.
1
m Pm
14. CONCLUSION
In this paper, we considered the problem of reaching consensus in the case where the influence matrix
appearing in the DeGroot model is proper, but not necessarily regular. To solve this problem, we
propose the orthogonal projection method. On the first stage, this method projects the space of initial
opinions onto the region TP of convergence to consensus of the DeGroot algorithm; this stage is called
preequalization. On the second stage, the result of the first stage is transformed into consensus by the
iterative adjustment with the initial influence matrix. The subspace TP is the direct sum of R(L), where
L = I − P, and the linear span of the vector 1 consisting of ones. We studied the properties of the method
and obtained an interpretation of the resulting weights of agents in terms of spanning out-trees in the
P = P ∞S of the orthogonal projection
communication digraph. It is shown that the resulting matrix
procedure, where S is the orthogonal projection onto TP and P ∞ = limk→∞ P k, can be considered as
the regularized power limit of the stochastic matrix P.
∞
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
THE PROJECTION METHOD FOR REACHING CONSENSUS
2473
APPENDIX
Proof of Theorem 1. From L1 = 0 it follows that 1 ∈ N (L), and by (11), 1 /∈ R(L). Therefore, the
sum of R(L) and T1 is direct. Suppose that a vector of initial opinions x belongs to R(L) ⊕ T1. Then
x = v + a1, where v ∈ R(L) and a ∈ R. By (7), P ∞x = P ∞(v + a1) = a1, i.e., consensus is achieved:
x ∈ TP .
Suppose now that for a vector of initial opinions x, a consensus is achieved: x ∈ TP . Then P ∞x = a1
for some a ∈ R. Since P ∞1 = 1, we have P ∞(x − a1) = 0, from which x − a1 ∈ N (P ∞). By (8)
N (P ∞) = R(L), therefore, x − a1 ∈ R(L). Consequently, for some v ∈ R(L) we have x = v + a1, and so
⊓⊔
x ∈ R(L) ⊕ T1.
Proof of Corollary 2. According to (9), rank L = n − ν. In the proof of Proposition 11 in [22], it is
shown that the diagonal block of L corresponding to the union of the nonbasic bicomponents of Γ has
full rank. On the other hand, each diagonal block Li corresponding to a basic bicomponent has rank
one less than its order and the sum of the columns of this block is 0. Therefore, constructing a maximal
set of linearly independent columns of L and having chosen all columns corresponding to the nonbasic
bicomponents, among the columns corresponding to any basic bicomponent, one can reject no more than
one, thus, exactly one column, since the number of rejected columns must be ν. In the representation of
the rejected column corresponding to the ith basic bicomponent by a linear combination of a maximal set
of independent columns, the coefficients of the columns that correspond to the ith bicomponent are −1.
Thus, removing from L a single arbitrary column for each basic bicomponent and adding all "nonbasic"
columns, we obtain a maximal set of linearly independent columns of L. Owing to Theorem 1, for matrix
U composed of a maximal set of linearly independent columns of L and the column 1, we have R(U ) = TP .
⊓⊔
Proof of Theorem 2. Since the nonbasic vertices correspond to the inessential states of the Markov
chain determined by P , P ∞ has the form (∗ 0), where block 0 consists of n − b columns [13, (102) in
∞
P = P ∞S, as well as P ∞, has the form (∗ 0).
Chapter 13]. According to (23), S = SB 0
0 I!, therefore,
Using (20) we obtain α = (α1, . . . , αb, 0, . . . , 0)T.
∞
respectively. Using (23) we obtain that the upper left block of order b of
completes the proof of Theorem 2.
By virtue of (3) the upper left blocks of order b of P 2, P 3, . . . and P ∞ are (PB)2, (PB)3, . . . and (PB)∞,
P = P ∞S is (PB)∞SB, which
⊓⊔
Proof of Lemma 1. We first prove that q2, . . . , qν are linearly independent. Indeed, in the opposite
i=2 αiqi = 0, where some coefficients αi are nonzero. Let j = min { i αi 6= 0}. Then by definition,
αjqj contains the nonzero components of αjπj−1, while the corresponding components of all vectors qi
i=2 αiqi 6= 0, which proves the linear independence of
case,Pν
with i > j are equal to zero. We obtain that Pν
Let q1 be 1, the column of n ones. Assume that q1, q2, . . . , qν are dependent. Then q1 =Pν
k=2 αkqk for
some α2, . . . , αν (as q2, . . . , qν are independent). Since the first m1 components of q2 are positive and the
corresponding components of qi are equal to zero for i > 2, we have α2 > 0. The next m2 components are
negative in q2, positive in q3, and equal to zero in the remaining vectors qi, therefore, α3 > 0. Proceeding
by induction we obtain αν > 0. On the other hand, the last mν components of qν are negative, which
q2, . . . , qν .
contradicts q1 =Pν
k=2 αkqk. Thus, q1, . . . , qν are linearly independent.
By definition, q2, . . . , qν ∈ R(P ∞). According to (8), R(P ∞) = N (L). Hence, q2, . . . , qν ∈ N (L).
Furthermore, q1 ∈ N (L) as L1 = 0. Thus, the whole set of columns of Z consists of the vectors q1, . . . , qν
forming a linearly independent subset in N (L) and a collection of linearly independent columns of L that
belong to R(L). Finally, by (11), N (L) ∩ R(L) = {0}. Therefore, the columns of Z are independent and
⊓⊔
Z is nonsingular.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2474
AGAEV, CHEBOTAREV
Proof of Theorem 3.
1. Consider Eq. (30).
It follows from the definition of X, stochasticity of P ∞, and the identity
P ∞L = 0 (7) that the first column of P ∞X consists of ones, while the remaining columns consist of
zeros. Therefore, each row of the resulting matrix P ∞XZ −1 = 1αT is equal to the first row of Z −1.
2. To prove this assertion, we use the following lemma.
Lemma A.1. If all the entries in the first column of A ∈ Cn×n are equal to 1 and A is invertible, then
A−11 = (1, 0, . . . , 0)T.
Proof of Lemma A.1. By Aij we denote the cofactor of the element aij of A. Let σk be the sum of
the entries in the kth row of A−1. Under the assumptions of Lemma A.1, the expansion of det A along
the first column yields
σ1 = Pn
i=1 Ai1
det A
= Pn
Pn
i=1 Ai1
i=1(1 · Ai1)
= 1.
By M ik and M ijkm we denote the minor of A obtained by removing row i and column k and the
minor obtained by removing rows i and j and columns k and m, respectively. Expanding the minors
M ik of order n − 1 along the first column, for k > 1 we obtain
σk det A =
nXi=1
(−1)i+kM ik =
nXi=1
(−1)i+k(cid:16)i−1Xj=1
(−1)1+jM ij1k +
nXj=i+1
(−1)jM ij1k(cid:17).
(A.1)
For any i, j ∈ {1, . . . , n} such that j < i, the minor M ij1k enters the sum (A.1) with the sign (−1)i+k+1+j,
while the minor M ji1k (having the same value) enters it with the sign (−1)j+k+i. Hence, these minors
⊓⊔
cancel out. Consequently, if det A 6= 0 and k > 1, then σk = 0 holds. The lemma is proved.
Corollary A.1 (of Lemma A.1). If all the entries in the kth column of A ∈ Cn×n are equal to y ∈ C
and A is invertible, then A−11 = (0, . . . , 0, y−1, 0, . . . , 0)T, where y−1 is the kth component of the vector.
Corollary A.1 is obvious.
Now we prove item 2 of Theorem 3. The identity Pn
i=1 αi = 1 was proved in the last paragraph of
Section 6. Since the first column of Z consists of ones, the row sums of Z −1, except for the sum of the
first row (which is equal to 1), are equal to zero by Lemma A.1.
It remains to prove the positivity of the elements of the first row of Z −1. Denote by ti and ti
k the
total weight of all spanning out-trees of the ith bicomponent of Γ and the total weight of those of them
that are rooted at the kth vertex of the ith bicomponent, respectively. According to the matrix tree
theorem (see, e.g., Theorem VI.27 in [16] or Theorem 16.9′ in [15], which is formulated for the matrix LT
and unweighted digraphs) ti
k is equal to the cofactor of any element in the kth row of Li (see (26)). Let
Wi be the determinant of the matrix obtained from Li by replacing the first column by the vector πi.
Expanding Wi along the first column and using (16) we obtain
Wi =
miXk=1
πi
k ti
k =
(πi
k)2 ti =
miXk=1
k)2
(ti
ti
.
miXk=1
Find the cofactors Z h1 (h = 1, . . . , n) of the elements in the first column of Z (see (28)). Here, we
u=1 mu + k(h), where c(h) is the number of the
basic bicomponent containing vertex h and k(h) is the number of this vertex in the bicomponent with
number c(h). Let Z hh1i be the matrix Z after deleting the hth row and the first column. To find
represent the number h of the row in the form h =Pc(h)−1
Z h1 = (−1)h+1 det Z hh1i,
(A.2)
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
THE PROJECTION METHOD FOR REACHING CONSENSUS
2475
in Z hh1i we sequentially move each column qu+1 (where u = 1, . . . , c(h) − 1) mu − 1 steps to the left (if
c(h) = 1, then no columns are moved). Denoting the resulting determinant by Z h1, we have
det Z hh1i = (−1)Pc(h)−1
u=1
(mu−1) Z h1 = (−1)h−k(h)−(c(h)−1) Z h1.
(A.3)
Furthermore, the determinant Z h1 is equal to the product of its diagonal subdeterminants of orders
m1, . . . , mc(h)−1, mc(h) − 1, mc(h)+1, . . . , mν , since the products containing other elements of the columns
qu (including the columns that were moved) are equal to zero. Consequently,
Z h1 =
Wu(−1)k(h)+1 tc(h)
k(h)(−1)ν−c(h)
Wu = (−1)ν−c(h)+k(h)+1 tc(h)
Wu,
(A.4)
νYu=c(h)+1
k(h) Yu6=c(h)
c(h)−1Yu=1
where the factor (−1)ν−c(h) appears due to the negativity of the first columns of the last ν − c(h) diagonal
subdeterminants. Substituting (A.4) into (A.3) and (A.3) into (A.2) we obtain
Z h1 = (−1)ν+1 tc(h)
k(h) Yu6=c(h)
Wu.
(A.5)
From (A.5) and item 1 of Theorem 3 it follows that the signs of all components of α are the same;
k(h) are nonzero. Since, as shown in Section 6, the sum of the components of α is equal to 1,
note that tc(h)
all these components are positive.
Prove item 3 of Theorem 3. For simplicity, we use the following notation: i = c(g), j = c(h), k = k(g),
and r = k(h). Due to item 1 of Theorem 3, (A.5) and (16), we have
αg
αh
=
=
ti
k/Wi
tj
r/Wj
Z g1
Z h1 =
k(ti)2/Pmi
πi
r(tj)2/Pmj
πj
l=1(ti
l=1(tj
=
k/Pmi
r/Pmj
l=1 πi
l=1 πj
βiπi
k
βjπj
r
=
l ti
l
l tj
ti
tj
=
ti
tj
l)2
l )2
l
l ti
l
l tj
l
=
πi
πj
k ti/Pmi
r tj/Pmj
l=1(ti
l=1(tj
l=1 πi
l=1 πj
l)2
l )2
,
k ti/Pmi
r tj/Pmj
from which, in particular, we obtain the desired statement. The theorem is proved.
(A.6)
⊓⊔
REFERENCES
1. Ren, W., Beard, R.W. and Atkins, E.M., Information Consensus in Multivehicle Cooperative Control, IEEE
Control Syst. Mag., 2007, vol. 27, no. 2, pp. 71 -- 82.
2. Olfati-Saber, R., Fax, J.A. and Murray, R.M., Consensus and Cooperation in Networked Multi-agent Systems,
Proc. IEEE, 2007, vol. 95, no. 1, pp. 215 -- 233.
3. Chebotarev, P.Yu. and Agaev, R.P., Coordination in Multiagent Systems and Laplacian Spectra of Digraphs,
Automat. Remote Control, 2009, vol. 70, no. 3, pp. 469 -- 483.
4. Agaev, R.P. and Chebotarev, P.Yu., Convergence and Stability in Consensus and Coordination Problems (A
Survey of Basic Results), UBS, 2010, vol. 30, no. 1, pp. 470 -- 505. In Russian.
5. Wu, C.W., Evolution and Dynamics of Complex Networks of Coupled Systems, IEEE Circuits Syst. Mag.,
2010, vol. 10, no. 3, pp. 55 -- 63.
6. Gubanov, D.A., Novikov, D.A. and Chkhartishvili, A.G., Sotsial'nie seti. Modeli informatsionnogo vliyaniya,
upravleniya i protivoborstva (Social Networks. Models of Information Impact, Control, and Confrontation).
Moscow: Fizmatlit, 2010.
7. Wu, C.W., Synchronization in Complex Networks of Nonlinear Dynamical Systems. Singapore: World Scien-
tific, 2007.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
2476
AGAEV, CHEBOTAREV
8. Jackson, M.O., Social and Economic Networks. Princeton, NJ: Princeton Univ. Press, 2008.
9. Ren, W. and Beard, R.W., Distributed Consensus in Multi-vehicle Cooperative Control: Theory and Applica-
tions. London: Springer, 2008.
10. Mesbahi, M. and Egerstedt, M., Graph Theoretic Methods in Multiagent Networks. Princeton, NJ: Princeton
Univ. Press, 2010, 413 pp.
11. Ren, W. and Cao, Y., Distributed Coordination of Multi-agent Networks: Emergent Problems, Models, and
Issues. London: Springer, 2011.
12. DeGroot, M.H., Reaching a Consensus, J. Amer. Statist. Associat., 1974, vol. 69, no. 345, pp. 118 -- 121.
13. Gantmacher, F.R., The Theory of Matrices. New York: Chelsea, 1959.
14. Horn, R.A. and Johnson, C.R., Matrix Analysis. Cambridge: Cambridge Univ. Press, 1986.
15. Harary, F., Graph Theory. Reading, Mass.: Addison-Wesley, 1969.
16. Tutte, W.T., Graph Theory. Reading, MA: Addison-Wesley, 1984.
17. Cvetkovi´c, D.M., Doob, M. and Sachs, H., Spectra of Graphs. New York: Academic Press, 1980.
18. Chebotarev, P. and Agaev, R., Forest Matrices Around the Laplacian Matrix, Linear Algebra Appl., 2002, vol.
356, pp. 253 -- 274.
19. Veerman, J.J.P., Lafferriere, G., Caughman, J. and Williams, A., Flocks and Formations, J. Statist. Physics,
2005, vol. 121, no. 5 -- 6, pp. 901 -- 936.
20. Berman, A. and Shaked-Monderer, N., Non-negative Matrices and Digraphs, in Encyclopedia of Complexity
and Systems Science. New York: Springer, 2009, pp. 6239 -- 6252.
21. Wentzell, A.D. and Freidlin, M.I., On Small Random Perturbations of Dynamical Systems, Russian Math.
Surveys, 1970, vol. 25, no. 1, pp. 1 -- 55.
22. Agaev, R.P. and Chebotarev, P.Yu., The Matrix of Maximum Out Forests of a Digraph and Its Applications,
Automat. Remote Control, 2000, vol. 61, no. 9, pp. 1424 -- 1450.
23. Agaev, R.P. and Chebotarev, P.Yu., Spanning Forests of a Digraph and Their Applications, Automat. Remote
Control, 2001, vol. 62, no. 3, pp. 443 -- 466.
24. Agaev, R.P. and Chebotarev, P.Yu., On Determining the Eigenprojection and Components of a Matrix, Au-
tomat. Remote Control, 2002, vol. 63, no. 10, pp. 1537 -- 1545.
25. Chebotarev, P.Yu. and Agaev, R.P., Addendum to the Paper "On Determining the Eigenprojection and Com-
ponents of a Matrix," Automat. Remote Control, 2011, vol. 72, no. 3, p. 626.
26. Meyer, Jr., C.D., The Role of the Group Generalized Inverse in the Theory of Finite Markov Chains, SIAM
Rev., 1975, vol. 17, no. 3, pp. 443 -- 464.
27. Rothblum, U.G., Computation of the Eigenprojection of a Nonnegative Matrix at Its Spectral Radius, in
Stochastic Systems: Modeling, Identification and Optimization II, ser. Mathematical Programming Study,
Wets, R.J.-B., ed. Amsterdam: North-Holland, 1976, vol. 6, pp. 188 -- 201.
28. Barabanov, I.N., Korgin, N.A., Novikov, D.A. and Chkhartishvili, A.G., Dynamic Models of Informational
Control in Social Networks, Automat. Remote Control, 2010, vol. 71, no. 11, pp. 2417 -- 2426.
29. Ben-Israel, A. and Greville, T.N.E., Generalized Inverses: Theory and Applications. New York: Wiley, 1974
(2nd Ed.: New York: Springer, 2003).
30. Eckart, C. and Young, G., The Approximation of One Matrix by Another of Lower Rank, Psychometrika, 1936,
vol. 1, no. 3, pp. 211 -- 218.
31. Langville, A.N. and Meyer, C.D., Google's PageRank and Beyond: The Science of Search Engine Rankings.
Princeton, NJ: Princeton Univ. Press, 2006.
AUTOMATION AND REMOTE CONTROL Vol. 72 No. 12
2011
|
1906.11362 | 2 | 1906 | 2019-06-30T04:04:59 | Interactive Physics-Inspired Traffic Congestion Management | [
"cs.MA"
] | This paper proposes a new physics-based approach to effectively control congestion in a network of interconnected roads (NOIR). The paper integrates mass flow conservation and diffusion-based dynamics to model traffic coordination in a NOIR. The mass conservation law is used to model the traffic density dynamics across the NOIR while the diffusion law is applied to include traffic speed and motion direction into planning. This paper offers an analogy between traffic coordination in a transportation system and heat flux in a thermal system to define a potential filed over the NOIR. The paper also develops an interactive light-based and boundary control to manage traffic congestion through optimizing the traffic signal operations and controlling traffic flows at the NOIR boundary nodes. More specifically, a model predictive boundary control optimizes the NOIR inflow traffic while a receding horizon optimizer assigns the optimal movement phases at the NOIR intersections. For simulation, the paper models traffic congestion in a heterogeneous NOIR with a large number of interior and boundary nodes where the proposed interactive control can successfully manage the congestion. | cs.MA | cs | 1
Interactive Physics-Inspired Traffic
Congestion Management
Hossein Rastgoftar
Abstract -- This paper proposes a new physics-based approach
to effectively control congestion in a network of interconnected
roads (NOIR). The paper integrates mass flow conservation and
diffusion-based dynamics to model traffic coordination in a NOIR.
The mass conservation law is used to model the traffic density
dynamics across the NOIR while the diffusion law is applied to
include traffic speed and motion direction into planning. This
paper offers an analogy between traffic coordination in a
transportation system and heat flux in a thermal system to define
a potential filed over the NOIR. The paper also develops an
interactive light-based and boundary control to manage traffic
congestion through optimizing the traffic signal operations and
controlling traffic flows at the NOIR boundary nodes. More
specifically, a model predictive boundary control optimizes the
NOIR inflow traffic while a receding horizon optimizer assigns the
optimal movement phases at the NOIR intersections. For
simulation, the paper models traffic congestion in a heterogeneous
NOIR with a large number of interior and boundary nodes where
the proposed interactive control can successfully manage the
congestion.
I. INTRODUCTION
T
is a complex phenomenon dealing with
RAFFIC
coordination of many vehicles
in a network of
interconnected roads (NOIR). While the number of
vehicles in an NOIR can change with time, the space contained
by the NOIR is fixed and limited. Traffic congestion is an
important issue that wastes time and fuel and can cause accident
in highways. Therefore,
congestion
management models are highly demanded as they can
positively impact several aspects of human life as well as the
environment. This paper will offer a new interactive physic-
based traffic control (IPBTC) approach to model and control
traffic congestion in a heterogeneous NOIR consisting of
unidirectional and bidirectional roads. The proposed IPBTC
can address the urban mobility key challenges by improving the
traffic speed which in turn results in reducing car emissions.
efficient
traffic
Researchers have suggested a variety of approaches to
manage traffic congestion. The traditional fixed-cycle control
[1], [2] has been applied by the traffic signals to manage vehicle
coordination at
is
commonly specified by the cycle time, split time, and offset
intersections. A fixed cycle control
time to characterize cycle completion, green light duration, and
delays, respectively. Traffic network study tool (TRANSYT)
[3], [4] is the existing software used for optimizing the signal
timing under the fixed-cycle assumption.
traffic
control
More recently, the traffic responsive control methods have
been proposed by the researchers due to advancement in
sensing, computing, and vision algorithms. The available
approaches can be classified as model-free and model-based
methods. Model-free methods suggested in [5] -- [12] use the
reinforcement learning (RL) to adaptively mange the traffic
signal operations and traffic coordination in a transportation
infrastructure. Model-based
approaches
commonly use the conservation law and model the traffic
dynamics by a linear system [13] -- [16]. In particular, cell
transition model (CTM) [17] -- [19] has been used to fill every
road by a finite number of serially-connected road elements and
develop a first-order conservation-based traffic dynamics by
discretizing the mass flow conservation PDE. Model-based
reinforcement learning using Markov decision process offered
in [20] -- [22] to manage traffic congestion. Particularly, single
agent RL [5] and multi-agent RL [8] have been previously
proposed to optimize the traffic signal movement phases. Refs.
[23] -- [26] apply MPC to assign optimal traffic speed in
highways. MPC have been also applied in Refs. [27] -- [29] to
optimize the traffic signal operations. Additionally, researchers
have suggested fuzzy logic [30] -- [33], neural network [34] --
[37], mixed nonlinear programming (MNLP) [38] approaches
for the model-based traffic management. Furthermore, traffic
congestion management is modeled as a boundary control
problem in Refs. [39], [40]. In Refs. [39], [40], a first-order
traffic dynamics inspired by mass flow conservation is
developed to the traffic coordination freeways.
This paper aims to advance the resilience and efficiency of
the traffic congestion control by incorporating the macroscopic
and microscopic traffic behavior into planning. To this end, the
paper effectively integrates conduction-based boundary control
and conservation-based light control to manage the traffic
congestion. Particularly, an interactive physics-based traffic
control (IPBTC) will be developed to optimize (i) discrete
actions commanded by the traffic lights at the NOIR
intersections, and (ii) traffic inflow rates at the NOIR boundary
H. Rastgoftar is with the Department of Aerospace Engineering, University
of Michigan, Ann Arbor, MI, 48109 USA e-mail: [email protected].
2
nodes. IPBTC models the traffic macroscopic coordination as a
conduction problem governed by a parabolic PDE with spatio-
temporal parameters. Conduction-based coordination
is
inspired by the following two facts:
1) Traffic must move at a certain direction assigned by an
authorized decision-maker (ADM) at every NOIR (See
Figure 1).
2) The traffic speed is a distributed non-negative quantity
assuming vehicles obey the prescribed motion direction at
any location of the NOIR.
These two features of traffic coordination are analogous to
conduction in a thermal system. More specifically, heat flux is
the gradient of the temperature distribution in a thermal system
where it is always conducted from high-temperature locations
toward low-temperature locations. Similarly, the paper defines
a scalar potential field over the NOIR which is analogous to
temperature distribution in a thermal system. By defining the
traffic speed as the gradient of the traffic potential function,
traffic flows from a high-potential location to a low-potential
location. Furthermore, IPBTC applies the mass conservation
law to model the microscopic traffic congestion. Particularly,
the microscopic traffic coordination is modeled by a stochastic
switching dynamics obtained by governing
the mass
conservation law at every road element across the NOIR.
1) This paper offers a novel interactive light-based and
boundary congestion control approach.
2) A new probabilistic traffic dynamics inspired by mass
flow conservation will be developed where both traffic inflow
and outflow rates are included to obtain the traffic dynamics at
every road element (This will be discussed more in Remark 2).
3) The proposed probabilistic dynamics ensures that the
traffic density is positive at any time t. Therefore, the MPC
boundary controller can control the traffic congestion with
minimum computation cost only by imposing the inequality
constraints on the boundary traffic inflow rates without
imposing state constraints.
4) An interface between conduction-based and conservation
dynamics will be defined in the papers. Therefore, parameters
of the conduction-based dynamics are uniquely related to the
parameters of the mass conservation-based dynamics.
This paper is organized as follows: Preliminary notions on
graph theory and discrete state transition are presented in
Section II. Problem statement in Section III is followed by the
proposed physics-based traffic coordination model given in
Section IV. Interactive boundary and light-based traffic control
model is developed in Section V. Simulation results presented
in Section VI are followed by concluding remarks in Section
VII.
(a)
(b)
Figure 2: (a) Example NOIR-Manhattan. NOIR boundary and
interior nodes are shown by red and green, respectively1. (b) Fixed
movement cycle at NOIR intersection 𝑖 ∈ 𝒱𝐶 modeled by a non-
deterministic finite automata.
II. PRELIMINARIES
This paper defines the following three graphs to model and
control the traffic congestion:
1. NOIR graph 𝒢NOIR( 𝒱NOIR, ℰNOIR) with node set
𝒱NOIR = {1, ⋯ , 𝑚} defining all NOIR intersections
and edge set ℰNOIR ⊂ 𝒱NOIR × 𝒱NOIR. 𝒱NOIR =
𝒱𝐵⋃𝒱𝐶 where 𝒱𝐵 = {1, ⋯ , 𝑚𝐵} and 𝒱𝐶 = {𝑚𝐵 +
Figure 1: Analogy between traffic coordination and heat diffusion.
Traffic coordinates from a high-potential location 𝑖 (with potential
value 𝜙𝑖) toward a low-potential location 𝑗 (with potential value 𝜙𝑗)
where traffic speed is always positive at every location across the
road element. Similarly, heat flux is directed from a high-
temperature location toward a low-temperature location in a
thermal system.
Compared to the existing literature, this papers offers the
following contributions:
1 The background image was downloaded from Google Map.
1, ⋯ , 𝑚}. An example NOIR defined over Manhattan
is shown in Figure 2.
2. BC traffic network 𝒢( 𝒱, ℰ) with node set 𝒱 and edge
set ℰ ⊂ 𝒱 × 𝒱. A node 𝑖 ∈ 𝒱 represent a road element
with specified motion direction. Graph G is used to
study the macroscopic traffic behavior.
3. Switching LBRC traffic network 𝒢LBRC,𝜆( 𝒱, ℰ𝜆)
with node set 𝒱 and edge set ℰ𝜆 ⊂ 𝒱 × 𝒱. Note that
𝜆 ∈ Λ and ℰ𝜆 ⊂ ℰ, Λ is a finite set defining traffic
network topologies commanded by traffic lights at the
NOIR intersections, i.e. Λ determines every possible
movement phase across the NOIR junctions.
Movement phases are defined by finite set
Λ = 𝜆𝑚𝐵+1 × · · · × 𝜆𝑚,
where 𝜆𝑖 specifies all possible movement phases at intersection
𝑖 ∈ 𝒱𝐶, and "×" is the Cartesian product symbol. In particular,
it is assumed that mi unique movements can be commanded at
𝑖 ∈ 𝒱NOIR, therefore,
𝜆𝑖 = {λ𝑖,1, ⋯ , λ𝑚𝑖,1}, i ∈ 𝒱𝐶 .
In this paper, we make the following assumptions:
1. A unique movement phase 𝜆𝑖,𝑗[𝑘] (𝑗 = 1, ⋯ , 𝑚𝑖) can
be commanded at node 𝑖 ∈ 𝒱𝐶 over the time interval
[𝑡𝑘−1, 𝑡𝑘 ].
2. Transition of movement phases across the NOIR is
defined by a non-deterministic finite state automaton
[41] at every intersection node 𝑖 ∈ 𝒱𝐶 (See Figure 2
(b)).
3. An upper bound time limit 𝑇𝐿,𝑖 is considered for the
duration of movement 𝜆𝑖,𝑗 at intersection 𝑖 ∈ 𝒱𝐶. A
local timer measures activation period 𝜏𝑖,𝑗 of the
movement phase 𝜆𝑖,𝑗 at NOIR intersection 𝑖 ∈ 𝒱𝐶.
Once 𝜏𝑖,𝑗 = 𝑇𝐿,𝑖,
is
overridden at 𝑖 ∈ 𝒱𝐶.
the movement phase 𝜆𝑖,𝑗
Given the time-limit threshold 𝑇𝐿,𝑖 at every node 𝑖 ∈ 𝒱𝐶,
Λ𝑛𝑒𝑥𝑡[k] = 𝜆𝑚𝐵+1
𝑛𝑒𝑥𝑡 [k] × ⋯ × 𝜆𝑚
𝑛𝑒𝑥𝑡 [k] ⊂ Λ
𝑛𝑒𝑥𝑡 ≤ 2 at any time 𝑘 (∀𝑖 ∈ 𝒱𝐶). 𝜆𝑖
specifies next allowable movement phases at time 𝑘 + 1 given
movement phases at current time 𝑘. This paper assumes that the
movement cycle is fixed at every NOIR intersection. Therefore,
𝑛𝑒𝑥𝑡 = 2 , if 𝜏𝑖,𝑗 < 𝑇𝐿,𝑖
𝜆𝑖
when 𝜆𝑖,𝑗 is active at NOIR intersection node 𝑖 ∈ 𝒱𝐶.
𝑛𝑒𝑥𝑡 drops to 1.
Otherwise, the ADM overrides 𝜆𝑖,𝑗 and 𝜆𝑖
Consequently, Λ𝑛𝑒𝑥𝑡 ≤ 2𝑚−𝑚𝐵. Figure 2 (b) shows an example
four-leg NOIR intersection node 𝑖 ∈ 𝒱𝐶 with eight possible
movements.
3
(a)
(b)
Figure 3: (a) Discretizing a road into a finite number of serially-
connected bar elements. It is assumed that the traffic potential
function 𝜙 is linearly decreasing across a road element. Therefore,
𝑉𝑖,𝑜𝑢𝑡 and 𝑉𝑖,𝑖𝑛are positive quantities at every node 𝑖 ∈ 𝒱. (b)
Schematic of regular and connection road elements.
III. PROBLEM STATEMENT
This paper studies the problem of traffic congestion control in
a large heterogeneous NOIR consisting of bidirectional and
unidirectional roads. This problem is splitted into the following
two problems:
1. Traffic Boundary Control through controlling the
traffic inflows at the NOIR boundary nodes.
2. Traffic Light-Based Responsive Control (LBRC)
through optimizing discrete actions commanded by
the traffic lights situated at the NOIR intersection
nodes.
For the traffic boundary control, traffic coordination is
modeled as a diffusion problem governed by a parabolic PDE.
A scalar potential field 𝜙(𝐫, 𝑡) is defined over the NOIR where
𝐫 and 𝑡 denote position and time, respectively. Potential
function 𝜙(𝐫, 𝑡) is similar to temperature distribution in a
thermal system and governed by the following PDE:
𝐶(𝐫, 𝑡)
𝜕𝜙(𝐫,𝑡)
𝜕𝑡
= ∇ ⋅ (𝐾(𝐫, 𝑡)∇𝜙(𝐫, 𝑡))
(1)
is
where 𝐶(𝐫, 𝑡) is the specific coordination capacity (SCC) and
𝐾(𝐫, 𝑡)
the distributed stiffness (conductivity). The
conduction-inspired macroscopic
is
managed through controlling traffic inflows at the NOIR
boundary nodes. The paper defines a distributed traffic rate
(speed) 𝑉: ℝ2 × ℝ → ℝ+ over the NOIR. 𝑉(𝐫, 𝑡), specifying
the number of vehicles passing from NOIR position 𝐫 at time
𝑡, has the following properties:
traffic coordination
1.
2.
It is a positive quantity everywhere across the NOIR
at any time 𝑡.
𝑉(𝐫, 𝑡) is related to 𝜙(𝐫, 𝑡) by 𝑉(𝐫, 𝑡)= − ∇𝜙(𝐫, 𝑡).
3. Because 𝑉(𝐫, 𝑡) is positive everywhere in the NOIR,
𝜙(𝐫, 𝑡) is decreasing, if we move along the motion
direction in a NOIR road (See Figure 3 (a)).
To model the traffic coordination, the governing Eq. (1) is
spatially discretized using the finite element method (FEM).
The BC traffic network 𝒢( 𝒱, ℰ) is defined over the NOIR,
where 𝒱 = {1, ⋯ , 𝑁} is the node set and ℰ ⊂ 𝒱 × 𝒱 defines
edges of 𝒢. It is assumed that NOIR roads are filled by serially-
connected road elements where 𝑖 ∈ 𝒱 represents a unique road
element. The node set 𝒱 can be expressed as
𝒱 = 𝒱𝑖𝑛⋃𝒱𝑜𝑢𝑡⋃𝒱𝐼
where 𝒱𝑖𝑛 = {1, ⋯ , 𝑁𝑖𝑛}, 𝒱𝑜𝑢𝑡 = {𝑁𝑖𝑛 + 1, ⋯ , 𝑁𝑜𝑢𝑡}, and
𝒱𝐼 = {𝑁𝑜𝑢𝑡 + 1, ⋯ , 𝑁} define index numbers of inlet, outlet,
and interior road elements, respectively. Every node 𝑖 ∈ 𝒱 has
a neighbor set ℐ𝑖 defined as follows:
ℐ𝑖 = {ℐ𝑖,𝑖𝑛, ℐ𝑖,𝑜𝑢𝑡},
(2)
where ℐ𝑖,𝑖𝑛 and ℐ𝑖,𝑜𝑢𝑡 specify node i's in-neighbor and out-
neighbor nodes. Traffic enters 𝑖 ∈ 𝒱 from an in-neighbor node
belonging to ℐ𝑖,𝑖𝑛 and it exits from 𝑖 ∈ 𝒱 towards an out-
neighbor node belonging to ℐ𝑖,𝑜𝑢𝑡. 𝑖 ∈ 𝒱 is a regular node, if
ℐ𝑖,𝑖𝑛 = ℐ𝑖,𝑜𝑢𝑡 = 1. Otherwise, 𝑖 ∈ 𝒱 is a connection node.
Schematic of regular and connection road elements are shown
in Figure 3 (b).
For the traffic LBRC, the microscopic traffic coordination is
treated as a mass conservation problem governed by the
continuity PDE. The switching LBRC graph 𝒢LBRC,𝜆( 𝒱, ℰ𝜆) is
used to spatially discretize continuity PDE when 𝜆 ∈ Λ defines
the
the
conservationbased traffic dynamics is modeled by a stochastic
linear system and the Receding Horizon Optimization (RHO)
[42] is used to optimize the discrete actions (movement phases)
commanded by the traffic lights.
topology. Consequently,
network
traffic
IV. TRAFFIC COORDINATION MODEL
A conduction-inspired traffic model will be developed in
Section IV-A and used to control the traffic coordination
through the NOIR boundary nodes. Section IV-B models traffic
coordination by a discrete-time dynamics inspired by the mass
conservation
law. The relation between parameters of
conduction-based and conservation-based dynamics is also
discussed in Section IV-B.
A. Macroscopic Traffic Coordination as a Conduction
Problem
Consider the schematic of road element 𝑖 ∈ 𝒱 shown in Fig.
4. Every road element i has a unique specific coordination
capacity (SCC) 𝑐𝑖 > 0. Let 𝜙𝑖 be the potential value of the
element 𝑖, 𝑉𝑖,𝑖𝑛 > 0 denote the weighted inflow traffic rate,
and 𝑉𝑖,𝑜𝑢𝑡 > 0 denote the weighted outflow traffic rate. The
inflow and outflow traffic rates are defined as the number of
vehicles entering and leaving the bar element in a certain
amount of time (See Figure 4). It is assumed that the
conduction-based traffic coordination satisfies the following
four rules:
Rule 1: 𝑐𝑖
𝑑𝜙𝑖
𝑑𝑡
= 𝑉𝑖,𝑖𝑛 − 𝑉𝑖,𝑜𝑢𝑡
Rule 2: 𝑉𝑖,𝑖𝑛 = {
∑
𝑗∈ℐ𝑖,𝑖𝑛
𝜅𝑖,𝑗(𝜙𝑗(𝑡) − 𝜙𝑖(𝑡))
𝑖 ∈ 𝒱 ∖ 𝒱𝑖𝑛
given
𝑖 ∈ 𝒱𝑖𝑛
4
(3)
Rule 3: 𝑉𝑖,𝑜𝑢𝑡 = {
∑
𝑖∈ℐ𝑖,𝑜𝑢𝑡
𝜅𝑖,ℎ(𝜙𝑖(𝑡) − 𝜙ℎ(𝑡))
𝑖 ∈ 𝒱 ∖ 𝒱𝑜𝑢𝑡
given
𝑖 ∈ 𝒱𝑜𝑢𝑡
Rule 4: 𝜙𝑖(𝑡) = 0, ∀𝑡, ∀𝑖 ∈ 𝒱𝑜𝑢𝑡,
where 𝜅𝑖,𝑗 > 0 is the stiffness between road elements 𝑖 ∈ 𝒱 and
𝑗 ∈ ℐ𝑖,𝑖𝑛. Rule 4 implies that the potential values of those road
elements defined by 𝒱𝑜𝑢𝑡 are all zero.
(a)
(b)
Figure 4: (a) Example road element 𝑖 ∈ 𝒱. Rules 1, 2, and 3 for
obtaining the conduction-inspired traffic coordination. (b) Traffic
flow inspired by mass conservation law.
Relation Between non-weighted Outflow and Potential
𝑇]𝑇 ∈ ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×1 define
Value: Let 𝚽(𝑡) = [𝚽𝑖𝑛
nodal potential values, where 𝚽𝑖𝑛 = [𝜙1 ⋯ 𝜙𝑁𝑖𝑛]𝑇 and 𝚽𝐼
= [𝜙𝑁𝑜𝑢𝑡+1 ⋯ 𝜙𝑁]𝑇. Defining non-weighted traffic outflow
inlet
𝑇 𝚽𝐼
𝑉𝑖,𝑜𝑢𝑡 = {
∑ (𝜙𝑖(𝑡) − 𝜙ℎ(𝑡))
𝑖 ∈ 𝒱 ∖ 𝒱𝑜𝑢𝑡
ℎ∈ℐ𝑖,𝑜𝑢𝑡
given
𝑖 ∈ 𝒱𝑜𝑢𝑡
,
𝐕(𝑡) = [𝑉1,𝑜𝑢𝑡 ⋯ 𝑉𝑁𝑖𝑛,𝑜𝑢𝑡 𝑉𝑁𝑜𝑢𝑡+1,𝑜𝑢𝑡 ⋯ 𝑉𝑁,𝑜𝑢𝑡] and
𝚽(𝑡) can be related by
𝐕(𝑡) = 𝐋𝚽(𝑡).
(4)
This paper assumes that 𝑉𝑖,𝑜𝑢𝑡 measurement is available at
every road element 𝑖 ∈ 𝒱 at all times 𝑡. Defining 𝜁𝑖 = 𝑖 +
𝑁𝑜𝑢𝑡 − 𝑁𝑖𝑛, 𝐋 = [𝐿𝑖𝑗] ∈ ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)
is
given by
𝐿𝑖𝑗 =
{
∑
1
𝑗∈ℐ𝑖,𝑜𝑢𝑡
(𝑖 ∈ 𝒱𝑖𝑛 ∧ 𝑗 = 𝑖) ∨ (𝜁𝑖 ∈ 𝒱𝐼 ∧ 𝑗 = 𝑖)
−1 𝑖 ∈ 𝒱𝑖𝑛 ∧ 𝑗 = ℐ𝑖,𝑜𝑢𝑡
−1 𝜁𝑖 ∈ 𝒱𝐼 ∧𝜁𝑗 ∈ ℐ𝜁𝑖,𝑜𝑢𝑡 ∖ (ℐ𝜁𝑗,𝑜𝑢𝑡⋂𝒱𝑜𝑢𝑡)
0 otherwise.
(5)
5
It is assumed that every inlet road element is connected to a
single interior node, therefore, 𝐿𝑖𝑗 = ℐ𝑖,𝑜𝑢𝑡 = 1, if 𝑖 ∈ 𝒱𝑖𝑛.
Proposition 1: Matrix 𝐋 is nonsingular with the eigenvalues
that are all located on the right-hand side of the 𝑠-plane.
Then, 𝐊𝑅 is negative definite. Define positive input vector
𝐮(𝑡) = [𝑉1,𝑜𝑢𝑡 ⋯ 𝑉𝑁𝑖𝑛,𝑜𝑢𝑡]𝑇,
] ∈
ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×𝑁𝑖𝑛. Assuming matrices 𝐂 and 𝐊𝑅 are piecewise
constant, the network traffic coordination dynamics is given by
𝐖 = [
and
𝐈
𝟎
to
1
𝐿𝑖𝑖
converted
𝐋 = 𝚪𝐋 where
Proof: Because 𝐋 is defined by Eq. (5), it is diagonally
dominant. Diagonal entries of 𝐋 are all positive, therefore, 𝐋 can
𝚪 = [𝛤𝑖𝑗] ∈
be
ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛) is positive definite and diagonal,
and 𝛤𝑖𝑖 =
(𝑖 = 1,· · · , 𝑁 + 𝑁𝑜𝑢𝑡 − 𝑁𝑖𝑛). While sum of the
row elements is 0 in N −Nout −Nin rows of 𝐋 , the remaining
rows of 𝐋 are negative sum rows. Therefore, Furthermore, 𝐋 =
𝐈 − 𝐃 is non-singular M-matrix where spectral radius of matrix
𝐃 is less than 1. Consequently, eigenvalues of 𝐋 are all placed
on the right-hand side of the 𝑠-plane which in turn implies that
the real part of all eigenvalues of matrix 𝐋 are positive.
Proposition 2: Matrix 𝐋−𝟏 is non-negative.
𝐋 𝑎 = [𝐈
Proof: While diagonal entries of matrix L are all positive,
off-diagonal entries of 𝐋 are either 0 or negative. Using the
Gauss-Jordan elimination method, the augmented matrix 𝐋𝑎 =
𝐈] ∈ ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×2(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛) can be converted to
[𝐋 ⋮
⋮ 𝐋−𝟏] ∈ ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×2(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)
matrix
only by performing row algebraic operations. Every entry of the
lower triangle of matrix 𝐋 can be converted to 0 if a top row is
multiplied by a positive scalar and the outcome is added to the
other rows. Elements of the upper triangle of matrix 𝐋 can be
similarly vanished, if a bottom row is multiplied by a positive
scalar and the outcome is added to the other rows. Therefore, 𝐋
−1 , obtained by performing these row operations on 𝐋, is non-
negative.
Remark 1: Because 𝐋−𝟏 is non-negative and nonsingular and
𝐕(𝑡) ≥ 𝟎 at any time 𝑡, nodal potential vector 𝚽 is nonnegative
which in turn implies that 𝜙𝑖(𝑡) ≥ 0 at any node 𝑖 ∈ 𝒱𝐼⋃𝒱𝑖𝑛 at
all times 𝑡.
Traffic Network Dynamics: Assuming SCC parameter 𝑐𝑖 is
known at every road element 𝑖 ∈ 𝒱, the SCC matrix
𝐂 = diag(𝑐1, ⋯ , 𝑐𝑁𝑖𝑛, 𝑐𝑁𝑜𝑢𝑡+1, ⋯ . 𝑐𝑁)
is positive-definite and diagonal. Furthermore, it is assumed
that stiffness 𝜅𝑖,𝑗 > 0 is known for every element 𝑖 ∈ 𝒱 with
in-neighbor element 𝑗 ∈ ℐ𝑖; stiffness matrix 𝐊 = [𝐾𝑖𝑗] ∈ ℝ𝑁×𝑁
is assigned as follows:
𝐾𝑖𝑗 =
𝜅𝑖,𝑗
− ∑ 𝜅𝑖,𝑗
{
𝑗∈ℐ𝑖
0
𝑗 ∈ ℐ𝑖 ∧ 𝑖 ∈ 𝒱
𝑗 = 𝑖 ∧ 𝑖 ∈ 𝒱
otherwise.
(6)
{𝚽 = 𝐀𝚽 + 𝐁𝐮
𝐕 = 𝐋𝚽
,
(7)
where 𝐀 = 𝐂−𝟏𝐊𝑅 and 𝐁 = 𝐂−𝟏𝐖.
B. Microscopic Traffic Coordination as a Mass Conservation
Problem
Let 𝜌𝑖(𝑡) denote the number of vehicles in road element 𝑖 ∈
𝒱 at time 𝑡. The switching LBRC network is defined by graph
𝒢LBRC,𝜆( 𝒱, ℰ𝜆), where 𝜆 ∈ Λ, and Λ is a finite set defining all
possible movement phases commanded by traffic lights at
NOIR intersections defined by 𝒱C = {mB + 1,· · · , m} ⊂
𝒱NOIR. As shown in Figure 4 (b), a road element 𝑖 ∈ 𝒱 can be
considered as a control volume. 𝑉𝑖,𝑖𝑛,𝜆 and 𝑉𝑖,𝑜𝑢𝑡,𝜆 are the
average traffic inflow and outflow, if 𝜆 ∈ Λ specifies the
topology of the traffic network. To develop the traffic
coordination dynamics, it is assumed that the traffic flow obeys
the following rules:
Rule 1: Traffic coordination satisfies the conservation law at
every road element 𝑖 ∈ 𝒱. Therefore
𝑖 ∈ 𝒱, 𝜆 ∈ Λ,
𝑑𝜌𝑖
𝑑𝑡
= 𝑉𝑖,𝑖𝑛,𝜆(𝑡) − 𝑉𝑖,𝑜𝑢𝑡,𝜆(𝑡).
(8)
Rule 2: 𝑝𝑖,𝜆 is the fraction of the existing vesicles leaving
NOIR road element 𝑖 ∈ 𝒱 at time 𝑡 when 𝜆 ∈ Λ specifies the
movement phases at time 𝑡. Therefore,
𝑖 ∈ 𝒱, 𝜆 ∈ Λ, 𝑉𝑖,𝑜𝑢𝑡,𝜆(𝑡) = 𝑝𝑖,𝜆𝜌𝑖(𝑡).
(9)
Rule 3: Let 𝑗 ∈ ℐ𝑖,𝑜𝑢𝑡,𝜆be an out-neighbor node of the road
𝑖 ∈ 𝒱 ∖ 𝒱𝑜𝑢𝑡 and 𝑞𝑗,𝑖,𝜆 be the fraction of traffic flow entering
𝑗 ∈ ℐ𝑖,𝑜𝑢𝑡,𝜆 from 𝑖 ∈ 𝒱 ∖ 𝒱𝑜𝑢𝑡 when 𝜆 ∈ Λ is active. Then,
∑ 𝑞𝑗,𝑖,𝜆 = 1
𝑗∈ℐ𝑖,𝑜𝑢𝑡
and the traffic inflow rate is given by
𝑖 ∈ 𝒱𝑖𝑛, 𝜆 ∈ Λ, 𝑉𝑖,𝑖𝑛,𝜆(𝑡) = given, (a)
𝑖 ∈ 𝒱 ∖ 𝒱𝑖𝑛, 𝜆 ∈ Λ, 𝑉𝑖,𝑖𝑛,𝜆(𝑡) =
𝑗∈ℐ𝑖,𝑖𝑛,𝜆
𝑞𝑖,𝑗,𝜆𝑉𝑗,𝑜𝑢𝑡,𝜆(𝑡)
𝑗∈ℐ𝑖,𝑖𝑛,𝜆
= ∑
𝑞𝑖,𝑗,𝜆𝑝𝑗,𝜆𝜌𝑗
∑
(b)
(10)
,
at road element 𝑖 ∈ 𝒱. Note that ∑
> 0 but it is not
necessarily equal to 1. By substituting (9), (10) into (8), the
traffic coordination dynamics is given by the following first-
order dynamics:
𝑗∈ℐ𝑖,𝑖𝑛,𝜆
𝑞𝑖,𝑗,𝜆
Matrix 𝐊 is negative semi-definite. The first eigenvalue of 𝐊 is
0 while the remaining 𝐊 eigenvalues are all negative. Let
𝑑𝜌𝑖
𝑑𝑡
= {
∑
𝑉𝑖,𝑖𝑛,𝜆 − 𝑝𝑖,𝜆𝜌𝑖
𝑞𝑖,𝑗,𝜆𝑝𝑗,𝜆𝜌𝑗
− 𝑝𝑖,𝜆𝜌𝑖
𝑗∈ℐ𝑖,𝑖𝑛,𝜆
𝑖 ∈ 𝒱𝑖𝑛
𝑖 ∈ 𝒱 ∖ 𝒱𝑖𝑛
.
(11)
𝐊 = [
𝐊𝑖𝑛,𝑜𝑢𝑡
𝐊𝑖𝑛,𝑖𝑛
𝐊𝑖𝑛,𝐼
𝐊𝑜𝑢𝑡,𝑖𝑛 𝐊𝑜𝑢𝑡,𝑜𝑢𝑡 𝐊𝑜𝑢𝑡,𝐼
𝐊𝐼,𝑖𝑛
𝐊𝐼,𝐼
𝐊𝐼,𝑜𝑢𝑡
] , 𝐊𝑅 = [
𝐊𝑖𝑛,𝑖𝑛 𝐊𝑖𝑛,𝐼
𝐊𝐼,𝑖𝑛
𝐊𝐼,𝐼
].
for 𝜆 ∈ Λ.
Theorem 1: Assume 𝑉𝑖,𝑖𝑛,𝜆 > 0 at every road element 𝑖 ∈ 𝒱𝑖𝑛,
𝜌𝑖 is updated by dynamics (11), 𝑝𝑖,𝜆 ≥ 0 at every road element
6
𝑖 ∈ 𝒱, and 𝜌𝑖(𝑡0) ≥ 0 at every road element 𝑖 ∈ 𝒱 at initial
time 𝑡0. Then, 𝜌𝑖(𝑡) ≥ 0 at any time 𝑡 ≥ 𝑡0.
− ) > 0, and (iii) 𝜌𝑖(𝑡𝑛,𝑖
Proof: The number of cars at road element 𝑖 ∈ 𝒱 can become
negative, if there exists a time 𝑡𝑛,𝑖 ≥ 𝑡0 such that (i) 𝜌𝑖(𝑡𝑛,𝑖) =
+ ) < 0. This situation never
0, (ii) 𝜌𝑖(𝑡𝑛,𝑖
happens if 𝝆𝒊 is updated by dynamics (11). If 𝑝𝑖,𝜆 = 0,
𝜌𝑖(𝑡) > 0 at any time 𝑡 ≥ 𝑡0 which in turn implies that
𝜌𝑖(𝑡) ≥ 0 assuming 𝜌𝑖(𝑡0) ≥ 0 at every road element 𝑖 ∈ 𝒱.
If 𝑝𝑖,𝜆 > 0 and 𝜌𝑖(𝑡0) ≥ 0, 𝑉𝑖,𝑜𝑢𝑡,𝜆(𝑡) = 𝑝𝑖,𝜆𝜌𝑖(𝑡), defined by
− ) ≥ 0 for
(9), vanishes, only if 𝜌𝑖(𝑡𝑛,𝑖
every other road element 𝑗 ∈ 𝒱 (𝑗 ≠ 𝑖), 𝑉𝑖,𝑖𝑛,𝜆(𝑡𝑛,𝑖) ≥ 0 for
+ ) = 𝑉𝑖,𝑖𝑛,𝜆(𝑡𝑛,𝑖
+ ) −
every road element 𝑖 ∈ 𝒱. Therefore, 𝜌𝑖(𝑡𝑛,𝑖
𝑉𝑖,𝑜𝑢𝑡,𝜆(𝑡𝑛,𝑖
turn implies that
𝜌𝑖(𝑡) ≥ 0 at any time 𝑡.
− ) = 0. Because 𝜌𝑗(𝑡𝑛,𝑖
+ ) ≥ 0 which in
+ )=𝑉𝑖,𝑖𝑛,𝜆(𝑡𝑛,𝑖
4.
specifies the percentage of the vehicles at node 𝑖 ∈ 𝒱 ∖
𝒱𝑜𝑢𝑡 moving towards 𝑗 ∈ ℐ𝑖,𝑜𝑢𝑡,𝜆.
If 𝑝𝑖,𝜆 = 1 for every "inlet" road element 𝑖 ∈ 𝒱𝑖𝑛,
𝜆 = 𝟎 ∈ ℝ𝑁𝑖𝑛×𝑁𝑖𝑛. This assumption
then, 𝐏𝑖𝑛,𝑖𝑛
implies that no vehicles are stored at the inlet road
= 𝟎 ∈ ℝ𝑁𝑜𝑢𝑡×𝑁𝑜𝑢𝑡, if
elements. Similarly, 𝐏𝑜𝑢𝑡,𝑜𝑢𝑡
𝑝𝑖,𝜆 = 1 for every outlet node 𝑖 ∈ 𝒱𝑜𝑢𝑡,. The latter
assumption implies that no vehicles are stored at the
outlet road elements.
𝜆
5. 𝐏𝑖𝑛,𝐼
𝜆 = 𝟎 ∈ ℝ𝑁𝑖𝑛×(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛) because no vehicle
moves from 𝑖 ∈ 𝒱𝐼 towards 𝑖 ∈ 𝒱𝑖𝑛, i.e. ℐ𝑖,𝑖𝑛,𝜆 = ∅, if
𝑖 ∈ 𝒱𝑖𝑛.
𝜆 = 𝟎 ∈ ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×𝑁𝑜𝑢𝑡 and 𝐏𝑖𝑛,𝑜𝑢𝑡
= 𝟎 ∈
ℝ𝑁𝑖𝑛×𝑁𝑜𝑢𝑡 because no vehicle moves for 𝑖 ∈ 𝒱𝑜𝑢𝑡
toward 𝑗 ∈ 𝒱𝑖𝑛⋃𝒱𝐼, i.e. ℐ𝑖,𝑜𝑢𝑡,𝜆 = ∅, if 𝑖 ∈ 𝒱𝑜𝑢𝑡.
𝜆
6. 𝐏𝐼,𝑜𝑢𝑡
Remark 2: A first-order traffic dynamic, inspired by mass
flow conservation was previously developed in [39], [40]. In
Refs. [39], [40], the traffic density is updated by
By admitting the above properties and assumptions, matrix 𝐏𝜆
simplifies to
𝑑𝜌𝑖
𝑑𝑡
= ∑ 𝑞𝑖,𝑗𝜌𝑗 − 𝜌𝑖
𝑗∈ℐ𝑖,𝑖𝑛
𝑗∈ℐ𝑖,𝑖𝑛
𝑞𝑖,𝑗 = 1
. This model does not include the traffic
where ∑
outflow rate to update the number of vehicles in road element
(cell) 𝑖 at a time 𝑡. The proposed IPBTC applies new rules to
determine the conservation-based traffic dynamics which in
turn yields the new traffic dynamics (11) with a different
structure. Note that Eq. (11) includes both traffic inflow and
outflow rates for modeling of the traffic coordination at every
road element 𝑖 ∈ 𝒱.
Defining 𝜌(𝑡) = [𝜌1 · · · 𝜌𝑁 ]𝑇 , the LBRC dynamics is given
by
𝜆 ∈ Λ, 𝐏𝜆 = [
𝜆
𝐏𝑖𝑛,𝑖𝑛
𝟎
𝜆
𝐏𝐼,𝑖𝑛
𝟎
𝜆
𝟎
𝟎 𝐏𝑜𝑢𝑡,𝐼
𝜆
𝟎
𝐏𝐼,𝐼
].
Proposition 3: Sum of the entries of column 𝑖 ∈ 𝒱𝑜𝑢𝑡of 𝐏𝜆 is
zero but sum of the entries is 1 in the remaining column of
matrix 𝐏𝜆.
Proof: As aforementioned, ∑
(∀𝜆 ∈ Λ), if
𝑖 ∈ 𝒱𝑖𝑛⋃𝒱𝐼 . Sum of the elements of every column 𝑖 ∈
{1, ⋯ , 𝑁𝑖𝑛, 𝑁𝑜𝑢𝑡 + 1, ⋯ , 𝑁} of matrix 𝐏𝜆 is 1 because
𝑞𝑗,𝑖,𝜆 = 1
𝑗∈ℐ𝑖,𝑜𝑢𝑡,𝜆
𝑁
𝜆
∑ 𝑃𝑖𝑗
𝑗=1
= (1 − 𝑝𝑖,𝜆) + 𝑝𝑖,𝜆 ∑ 𝑞𝑗,𝑖,𝜆
= 1.
𝑗∈ℐ𝑖,𝑜𝑢𝑡,𝜆
𝜆 ∈ Λ,
𝑑𝜌
𝑑𝑡
= (−𝐈 + 𝐏𝜆)𝜌 + 𝐖𝐮.
(12)
Defining
where 𝐖 and 𝐮 were previously introduced in Section IV.A and
𝐏𝜆 and be partitioned as follows:
𝜆 ∈ Λ, 𝐏𝜆 = [
𝜆
𝐏𝑖𝑛,𝑖𝑛
𝜆
𝐏𝑜𝑢𝑡,𝑖𝑛
𝐏𝐼,𝑖𝑛
𝜆
𝜆
𝐏𝑖𝑛,𝑜𝑢𝑡
𝜆
𝐏𝑜𝑢𝑡,𝑜𝑢𝑡
𝐏𝐼,𝑜𝑢𝑡
𝜆
𝜆
𝐏𝑖𝑛,𝐼
𝜆
𝐏𝑜𝑢𝑡,𝐼
𝜆
𝐏𝐼,𝐼
].
𝜆 of 𝐏𝜆 specifies the fraction of traffic flow
Then, partition 𝐏𝒳,𝒴
moving from 𝒱𝒴 towards 𝒱𝒳, where 𝒳, 𝒴 ∈ {"𝑖𝑛" , "𝑜𝑢𝑡" , "𝐼"}
are linguistic subscripts. For example, 𝐏𝑖𝑛,𝑜𝑢𝑡
(𝒳 ="in" and 𝒴
="out") specifies the percentage of traffic flow from 𝒱out
toward 𝒱in. 𝐏𝜆 = [𝑃𝑖𝑗
𝜆] ∈ ℝ𝑁×𝑁 has the following properties:
𝜆
1.
It is non-negative, i.e. every element of matrix 𝐏𝜆 is
non-negative.
2. Diagonal
𝑃𝑖𝑖
entry
𝜆 = 1 − 𝑝𝑖,𝜆 specifies
the
percentage of vehicles remaining at road element 𝑖 ∈
𝜆 = 1 − 𝑝𝑖,𝜆 ∈ [0,1], for
𝒱. Because 𝑝𝑖,𝜆 ∈ [0,1], 𝑃𝑖𝑖
𝑖 = 1,· · · , 𝑁.
3. Off-diagonal entry
𝑖 ∈ 𝒱 ∖ 𝒱𝑜𝑢𝑡, 𝑗 ≠ 𝑖 , 𝑃𝑖𝑗
𝜆 = {
𝑞𝑗,𝑖,𝜆𝑝𝑗,𝜆
0
𝐗(𝑡) = [𝜌1 ⋯ 𝜌𝑁𝑖𝑛 𝜌𝑁𝑜𝑢𝑡+1 ⋯ 𝜌𝑁]
𝑇
,
the traffic dynamics (12) simplifies to
𝐗 = 𝐐𝜆𝐗 + 𝐖𝐮,
(13)
where 𝐖 and 𝐮 were previously introduced in Section IV-A.
𝐐𝜆 = −𝐈 + 𝐏𝑟
𝜆 where
𝜆 = [
𝐏𝑟
𝜆
𝐏𝑖𝑛,𝑖𝑛
𝐏𝐼,𝑖𝑛
𝜆
𝟎
𝜆 ].
𝐏𝐼,𝐼
Matrix 𝐐𝜆 has the following properties:
1. Columns of 𝐐𝜆 either sum to 0 or sum to a negative
number.
2. Column 𝑗 of 𝐐𝜆 sums to a negative number, if 𝑗 ∈
ℐ𝑖,𝑖𝑛,𝜆 and 𝑖 ∈ 𝒱𝑜𝑢𝑡. Otherwise, column 𝑗 sums to 0.
Theorem 2: If graph 𝒢LBRC,𝜆( 𝒱, ℰ𝜆) contains a path from
every boundary node 𝑖 ∈ 𝒱𝑖𝑛 to each interior node j∈ 𝒱𝐼, then,
matrix 𝐐𝜆 is Hurwitz.
𝑗 ∈ ℐ𝑖,𝑜𝑢𝑡,𝜆
𝑗 ∉ ℐ𝑖,𝑜𝑢𝑡,𝜆
Proof: Because there exists a path from each boundary node
𝜆 is irreducible.
to every interior node of graph 𝒢LBRC,𝜆, matrix 𝐏𝑟
Sum of the column entries is negative in at least one column of
7
𝜆, denoted by 𝑟𝜆, is less than 1.
𝐐𝜆, the spectral radius of 𝐏𝑟
Therefore, eigenvalues of 𝐐𝜆 are all located inside a disk with
radius 𝑟𝜆 < 1 with a center positioned at −1 + 0𝑗 and 𝐐𝜆 is
Hurwitz [43], [44].
Remark 3: The outflow traffic rate (speed) vector
𝐕(𝑡) = [𝑉1,𝑜𝑢𝑡 ⋯ 𝑉𝑁𝑖𝑛,𝑜𝑢𝑡 𝑉𝑁𝑜𝑢𝑡+1,𝑜𝑢𝑡 ⋯ 𝑉𝑁,𝑜𝑢𝑡]
can be related to X (t) by
𝐕(𝑡) = 𝐃𝐗(t),
(14)
where 𝐃 = diag(𝑝1, ⋯ , 𝑝𝑁𝑖𝑛, 𝑝𝑁𝑜𝑢𝑡+1, ⋯ 𝑝𝑁) is a positive
definite and diagonal matrix. Note that
𝑝𝑖 =
∑
𝑝𝑖,𝜆
𝜆∈Λ
Λ
> 0
for every road element 𝑖 ∈ 𝒱𝑖𝑛⋃𝒱𝐼. Defining
𝐐 =
∑
𝐐𝜆
𝜆∈Λ
Λ
the average conservation-based dynamics is given by
𝐗 = 𝐐𝐗 + 𝐖𝐮,
(15)
Theorem 3: Let 𝑝𝑖 be known at every road element 𝑖 ∈ 𝒱𝑖𝑛.
Then, conservation dynamics matrices 𝐐 is related to the
conduction-based matrix 𝐀 using
𝐀 = 𝐋−𝟏𝐃𝐐𝐃−𝟏𝐋.
Furthermore, SCC parameter 𝑐𝑖 and 𝑝𝑖 are related by
𝑖 ∈ 𝒱𝑖𝑛, 𝑐𝑖 =
1
𝑝𝑖
(16)
(17)
V. TRAFFIC CONGESTION CONTROL
This paper offers an interactive physics-inspired control to
efficiently manage congestion through the NOIR boundary and
intersection nodes. A MPC-based boundary control will be
developed in Section V-A to manage the macroscopic traffic
coordination
inlet boundary nodes.
Furthermore, Section V-B formulates a receding horizon
optimization model for assigning optimal actions commanded
by the traffic lights at the NOIR intersections.
the NOIR
through
A. Macroscopic Boundary Control
Assuming the traffic coordination dynamics is given by (15),
the following difference equation is used to model the
macroscopic traffic dynamics
𝐗[𝑘 + 1] = 𝐐 𝐷𝐗[𝑘] + 𝐖 𝐷𝐮[𝑘],
where 𝐐 𝐷 = 𝐈 + ΔT𝐐, 𝐖 𝐷 = ΔT𝐖, and time increment ΔT is
fixed. The optimization cost is defined by
1
Cost[k] =
𝜏]𝐮[𝑘 + 𝜏]),
2
𝑛𝜏
𝜏=1
∑ (𝐗𝑇[𝑘 + 𝜏]𝐗[𝑘 + 𝜏] + 𝛽𝐮𝑇[𝑘 +
(19)
subject to equality constraint 𝐮[𝑘] = 𝑢0 and 𝐮[𝑘] > 0 at any
discrete time 𝑘, where 𝛽 > 0 is a scaling factor and 𝑛𝑡 is
constant. The first term in (19) is considered in order to penalize
non-uniform vehicle coordination across the NOIR. The second
term penalizes the non-uniform traffic inflow at the NOIR inlet
road
above
optimization problem can be formulated by the following
quadratic programming problem:
elements. Mathematically
speaking,
the
min (
1
2
𝐔𝑇𝚪1𝐔 + Γ2),
(20)
(21)
(22)
Proof: Considering Eq. (4), 𝚽 can be expressed as 𝚽 =
𝐋−𝟏𝐕 where 𝐕 = 𝐃𝐗 (See Remark 3). Substituting 𝚽 =
𝐋−𝟏𝐃𝐗 into dynamics (7) yields
subject to inequality constraint
𝐔 > 𝟎,
𝐗 = (𝐃−𝟏𝐋𝐂−𝟏𝐊𝐑𝐋−𝟏𝐃)
⏟
𝐗 + (𝐃−𝟏𝐋𝐂−𝟏𝐖)
⏟
𝐮
(18)
and equality constraint
𝐐
𝐖
‖𝐔‖1 = 𝑢0𝟏𝑛𝜏,
Consequently, 𝐀 can be uniquely specified based on the
traffic tendency probabilities defined in Section IV-B. Let 𝐖 =
𝐈
[
𝟎
𝐂𝑖𝑛,𝑖𝑛
𝐋𝑖𝑛,𝑖𝑛 𝐋𝑖𝑛,𝐼
𝐋𝐼,𝐼
𝐋𝐼,𝑖𝑛
and 𝐂 =
], 𝐃 = [
], 𝐋 = [
𝟎
𝐃𝐼,𝐼
𝐃𝑖𝑛,𝑖𝑛
],
𝟎
𝐃𝑖𝑛,𝑖𝑛 = diag(𝑝1, ⋯ , 𝑝𝑁𝑖𝑛),
𝐃𝐼,𝐼 =
[
𝟎
𝟎
𝐂𝐼,𝐼
],
diag(𝑝𝑁𝑜𝑢𝑡+1, ⋯ , 𝑝𝑁), 𝐂𝑖𝑛,𝑖𝑛 = diag(𝑐1, ⋯ , 𝑐𝑁𝑖𝑛), and 𝐂𝐼,𝐼 =
diag(𝑐𝑁𝑜𝑢𝑡+1, ⋯ , 𝑐𝑁) are positive definite and diagonal.
𝐃−𝟏𝐋𝐂−𝟏𝐖 = [
𝐃𝑖𝑛,𝑖𝑛
𝐃𝐼,𝐼
−𝟏𝐋𝑖𝑛,𝑖𝑛𝐂𝑖𝑛,𝑖𝑛
−𝟏𝐋𝐼,𝑖𝑛𝐂𝑖𝑛,𝑖𝑛
−𝟏
−𝟏 ].
−𝟏𝐋𝐼,𝑖𝑛𝐂𝑖𝑛,𝑖𝑛
Because traffic does not flow from any interior node toward an
inlet node, 𝐋𝐼,𝑖𝑛 = 𝟎 which
that
−𝟏 = 𝐈.
𝐃𝐼,𝐼
Because an inlet node is only connected to one interior node,
𝐋𝑖𝑛,𝑖𝑛 = 𝐈 and I and 𝑐𝑖 is related to 𝑝𝑖 using relation (17) for
every inlet node 𝑖 ∈ 𝒱𝑖𝑛.
turn
implies
−𝟏𝐋𝑖𝑛,𝑖𝑛𝐂𝑖𝑛,𝑖𝑛
−𝟏 = 𝟎. Therefore, 𝐃𝑖𝑛,𝑖𝑛
in
where 𝟏𝑛𝑡 ∈ ℝ𝑛𝜏 ×1 is the one vector, 𝑢0 > 0 is a constant
scalar, and
𝚪1 = 𝛽𝐈𝑛𝜏𝑁𝑖𝑛 + 𝐇𝑇𝐇, (a)
Γ2 = 𝐇𝑇(𝐆𝐗 + 𝐅𝐔) (b)
(23)
𝟎
𝐖
⋮
𝐇 = [
𝐐
𝑛𝜏−2𝐖 𝐐
𝐷
𝟎
𝟎
⋮
⋯ 𝟎
⋯ 𝟎
⋱
⋮
𝑛𝜏−3𝐖 ⋯ 𝟎
𝐷
], (c)
𝐖
𝐐𝐷𝐖
⋮
𝐅 = [
], (d)
𝐐
𝑛𝜏−1𝐖
𝐷
𝐐𝐷
𝐐𝐷
2
. (e)
⋮
𝑛𝜏]
𝐐
[
𝐷
𝐅 =
B. Microscopic Light-Based Responsive Control
The traffic responsive control is modeled as a receding
horizon optimization (RHO) defined by the following fourtuple
(𝐗, 𝒯, 𝒜, 𝒥 ), where state vector 𝐗 and transition function
𝒯 (𝐗, 𝜆) = 𝐐𝜆𝐗 + 𝐖𝐮 were previously defined in Section IV-
B, 𝒜 is a discrete action set, and 𝒥 defines the RHO cost
function. The movement cycle transition, defined by a
nondeterministic finite state automaton, is fixed at every NOIR
intersection 𝑖 ∈ 𝒱𝐶. However, the time interval of a movement
phases can be optimally planned by the traffic lights.
The traffic actions are defined by set
𝒜 = {(𝑎𝑚𝐵+1, ⋯ , 𝑎𝑚)𝑎𝑖 ∈ {S, C}, 𝑖 ∈ 𝒱𝐶},
(24)
where S and C are the abbreviations for "Switch" and
"Continue", respectively, if 𝑎𝑖 = C, the traffic light does not
update the current movement phase at intersection 𝑖 ∈ 𝒱𝐶.
Otherwise, 𝑎𝑖 = S selects the next movement phase which is
unique and defined by a deterministic movement cycle graph
(See the example movement cycle graph previously shown in
Figure 2 (b)). A constant threshold time 𝑇𝐿,𝑖 assigns an upper
limit for the duration of command C at NOIR node 𝑖, i.e. C is
overridden if the phase duration 𝜏𝑖,𝑗 exceeds 𝑇𝐿,𝑖 at NOIR node
𝑖 ∈ 𝒱𝐶 when 𝜆𝑖,𝑗 is active (See Figure 2 (b)).
The 𝑁𝜏-step expected cost is defined as follows:
𝑁𝜏
𝒥 = ∑(𝐗𝑇[𝑘 + 𝜏]𝚪𝐗[𝑘 + 𝜏])
,
𝜏=1
(25)
where 𝚪 ∈ ℝ(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛)×(𝑁−𝑁𝑜𝑢𝑡 +𝑁𝑖𝑛) is a positive definite
diagonal matrix. The matrix 𝚪 can encapsulate interaction of
pedestrians and environment with the traffic flow. In particular,
the ii entry of 𝚪 (𝛤𝑖𝑖 > 0) is a scaling factor incorporating
pedestrian tendency probabilities, as well as real-time traffic
information including construction condition, road enclosures,
traffic speed, special events, and incidents into planning.
Figure 5: The functionality of the interactive BC-LBRC traffic
control.
Remark 4: The functionality of the proposed IPBTC is
shown in Figure 5 where an interface layer has been specified
between the boundary and light-based controls. The interface
layer has two main responsibilities. The first responsibility is to
update the parameters of the conduction based dynamics using
relation (16) given the probability matrix 𝐐. Note that 𝐐 is
8
defined based on the tendency probabilities; 𝐐 is continuously
updated and
into planning. The second
responsibility is to specify the MPC constraints given in (20)
and (21) based on the outflow traffic rates.
incorporated
VI. SIMULATION RESULTS
This section presents the simulation results for the example
NOIR shown in Figure 6. The NOIR can be specified by
GNOIR with boundary node set 𝒱𝐵 = {1, ⋯ ,17} and
connection nodes defined by 𝒱𝐶 = {14, ⋯ ,30}. The NOIR is
heterogeneous consisting of unidirectional and bidirectional
roads. This heterogeneous NOIR can be represented by a
network with 53 unidirectional
roads, where every
unidirectional road is filled out by five serially-connected road
elements. Elements in road 𝑖 are identified by the unique
numbers 5(𝑖 − 1) + 𝑗 ∈ 𝒱 where 𝑗 = 1,· · · ,5. The BC
traffic graph is defined by 𝒢( 𝒱, ℰ) where 𝒱 = {1, ⋯ ,265} =
𝒱𝑖𝑛⋃𝒱𝑜𝑢𝑡⋃𝒱𝐼, 𝒱𝑖𝑛 = {1,· · · ,8}, 𝒱𝑜𝑢𝑡 = {45,50, ⋯ ,85}, and
𝒱𝐼 = 𝒱 \ (𝒱𝑖𝑛 ⋃ 𝒱𝑜𝑢𝑡).
Figure 6: Example NOIR with 53 unidirectional roads. Every road
is filled by five serially-connected road elements.
For the simulation, 𝑢0 = 54 is selected. Therefore, the
number of vehicles entering the NOIR is restricted to be 54 at
any time. It is assumed that the number of movement phases at
an intersection 𝑖 ∈ 𝒱𝐶 is the same as the number of incident
roads to the intersection. Therefore, 𝜆27 = 𝜆28 = 𝜆29 =
𝜆30 = 1, 𝜆15 = 𝜆20 = 𝜆21 = 𝜆22 = 2, 𝜆14 =
𝜆16 = 𝜆17 = 𝜆18 = 𝜆19 = 𝜆23 = 𝜆25 =
3, 𝜆24 = 𝜆26 = 4,
𝛬 = 𝜆1 × · · · 𝜆30 =
559872 is the total number of all movement phases defined by
set Λ. It is assumed that there is no traffic light located at
intersection node 𝑖 ∈ {27,28,29,30} ⊂ 𝒱𝐶 as only one road is
incident to these intersections.
and
Choosing 𝑇𝐿,𝑖 = 3, a road element cannot be active more
than three time-steps, if it is incident to an NOIR connection
node 𝑖 ∈ 𝒱𝐶 (Green light duration cannot exceed 𝑇𝐿,𝑖 = 3
time steps at every NOIR connection node). The optimal traffic
light actions at junctions 14 through 26 are given in Figure 7
for 𝑘 = 1,· · · ,30. Boundary control velocity inputs 𝑉1,𝑖𝑛
through 𝑉8,𝑖𝑛 are plotted versus discrete time 𝑘 for 𝑘 = 1,· · ·
,30 in Figure 8. Moreover, the potential values of all road
elements are illustrated in Figure 9 at sample time 𝑘 = 50. As
shown in Figure 9, the potential value of every upstream node
is greater than the potential value of its adjacent downstream
element. Furthermore, 𝜙𝑖[50] = 0 for outlet road elements
45, 50,· · ·, 85.
Figure 7: (a) Optimal movement phases at intersections 14 through
26 for 𝑘 = 1,· · · ,30. The number shown in the plot specifies the
active road element at time 𝑘.
Figure 8: Boundary control input 𝑉1,𝑖𝑛[𝑘] through 𝑉8,𝑖𝑛[𝑘] for 𝑘 =
1,· · · ,30.
Figure 9: Potential values of all NOIR road elements at discrete time
𝑘 = 50.
Figure 10 plots the potential value of the road element 162
versus time. It is seen that the average potential value stably
decreases as 𝑘 increases.
9
Figure 10: Traffic potential value of the road element 162 versus
discrete time 𝑘 for 𝑘 = 1,· · · ,200.
VII. CONCLUSION
This paper develops physics-inspired approaches to model
and control traffic congestion in a heterogeneous NOIR
consisting of unidirectional and bidirectional roads. By
developing an interactive physics-based traffic control, traffic
congestion can be managed with minimal computation cost
through controlling inflow rates at the NOIR boundary nodes as
well as the NOIR intersections. This paper proposes a novel
analogy between traffic coordination in a transportation system
and the heat diffusion in a thermal system. This analogy offers
several benefits that include but not limited to (i) consistent
model-based learning of the macroscopic traffic parameters, (ii)
developing a high-fidelity traffic coordination model, (iii)
incorporating microscopic properties of a traffic system into
planning, and (iv) enhancing the resilience of the traffic
congestion control. The proposed IPBTC is computationally-
efficient as it can successfully control the traffic congestion
only by imposing constraints on the boundary control input,
without imposing a constraint on the traffic state.
REFERENCES
[1] H. K. Lo and A. H. Chow, "Control strategies for oversaturated traffic,"
Journal of Transportation Engineering, vol. 130, no. 4, pp. 466 -- 478, 2004.
[2] M. J. Rosenblatt, "Multi-item inventory system with budgetary constraint:
A comparison between the lagrangian and the fixed cycle approach," The
International Journal Of Production Research, vol. 19, no. 4, pp. 331 -- 339,
1981.
[3] M. A. Penic and J. Upchurch, "Transyt-7f: enhancement for fuel
consumption, pollution emissions, and user costs," Transportation Research
Record, no. 1360, 1992.
[4] C. E. Wallace, K. Courage, D. Reaves, G. Schoene, and G. Euler, "Transyt-
7f user's manual," tech. rep., 1984.
[5] P. Mannion, J. Duggan, and E. Howley, "An experimental review of
reinforcement learning algorithms for adaptive traffic signal control," in
Autonomic Road Transport Support Systems, pp. 47 -- 66, Springer, 2016.
[6] L. Li, Y. Lv, and F.-Y. Wang, "Traffic signal timing via deep reinforcement
learning," IEEE/CAA Journal of Automatica Sinica, vol. 3, no. 3, pp. 247 -- 254,
2016.
[7] M. Abdoos, N. Mozayani, and A. L. Bazzan, "Traffic light control in non-
stationary environments based on multi agent q-learning," in 2011 14th
International IEEE conference on intelligent transportation systems (ITSC), pp.
1580 -- 1585, IEEE, 2011.
[8] I. Arel, C. Liu, T. Urbanik, and A. Kohls, "Reinforcement learningbased
multi-agent system for network traffic signal control," IET Intelligent Transport
Systems, vol. 4, no. 2, pp. 128 -- 135, 2010.
10
for bi-directional
traffic management
controllers," Expert Systems with Applications, vol. 42, no. 13, pp. 5403 -- 5415,
2015.
[32] G. Pau, T. Campisi, A. Canale, A. Severino, M. Collotta, and G. Tesoriere,
"Smart pedestrian crossing management at traffic light junctions through a
fuzzy-based approach," Future Internet, vol. 10, no. 2, p. 15, 2018.
[33] N. Yusupbekov, A. Marakhimov, H. Igamberdiev, and S. X. Umarov, "An
adaptive fuzzy-logic traffic control system in conditions of saturated transport
stream," The Scientific World Journal, vol. 2016, 2016.
[34] F. Moretti, S. Pizzuti, S. Panzieri, and M. Annunziato, "Urban traffic flow
forecasting through statistical and neural network bagging ensemble hybrid
modeling," Neurocomputing, vol. 167, pp. 3 -- 7, 2015.
[35] J. Tang, F. Liu, Y. Zou, W. Zhang, and Y. Wang, "An improved fuzzy
neural network for traffic speed prediction considering periodic characteristic,"
IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 9, pp.
2340 -- 2350, 2017.
[36] S. Akhter, R. Rahman, and A. Islam, "Neural network (nn) based route
weight computation
system,"
International Journal of Applied Evolutionary Computation (IJAEC), vol. 7, no.
4, pp. 45 -- 59, 2016.
[37] K. Kumar, M. Parida, and V. K. Katiyar, "Short term traffic flow prediction
in heterogeneous condition using artificial neural network," Transport, vol. 30,
no. 4, pp. 397 -- 405, 2015.
[38] E. Christofa, I. Papamichail, and A. Skabardonis, "Person-based traffic
responsive signal control optimization," IEEE Transactions on Intelligent
Transportation Systems, vol. 14, no. 3, pp. 1278 -- 1289, 2013.
[39] G. Como, E. Lovisari, and K. Savla, "Convexity and robustness of dynamic
traffic assignment and freeway network control," Transportation Research Part
B: Methodological, vol. 91, pp. 446 -- 465, 2016.
[40] S. Jafari and K. Savla, "On structural properties of feedback optimal
control of traffic flow under the cell transmission model," arXiv preprint
arXiv:1805.11271, 2018.
[41] M. V. Lawson, Finite automata. Chapman and Hall/CRC, 2003.
[42] H. Rastgoftar and E. M. Atkins, "Unmanned vehicle mission planning
given limited sensory information," in 2017 American Control Conference
(ACC), pp. 4473 -- 4479, IEEE, 2017.
[43] Z. Qu, Cooperative control of dynamical systems: applications to
autonomous vehicles. Springer Science & Business Media, 2009.
[44] H. Rastgoftar, Continuum deformation of multi-agent systems. Springer,
2016.
in
the B.Sc. degree
Dr. Hossein Rastgoftar is an Assistant Research
the Department of Aerospace
Scientist
Engineering at the University of Michigan. He
received
in mechanical
engineering-thermo-fluids from Shiraz University,
Shiraz, Iran, the M.S. degrees in mechanical systems
and solid mechanics from Shiraz University and the
University of Central Florida, Orlando, FL, USA,
and the Ph.D. degree in mechanical engineering
from Drexel University, Philadelphia, in 2015. His
current research interests include dynamics and control, multi-agent systems,
cyber-physical systems, and optimization and Markov decision processes.
[9] B. Abdulhai, R. Pringle, and G. J. Karakoulas, "Reinforcement learning for
true adaptive traffic signal control," Journal of Transportation Engineering, vol.
129, no. 3, pp. 278 -- 285, 2003.
[10] E. Bingham, "Reinforcement learning in neurofuzzy traffic signal control,"
European Journal of Operational Research, vol. 131, no. 2, pp. 232 -- 241, 2001.
[11] M. Wiering, "Multi-agent reinforcement learning for traffic light control,"
in Machine Learning: Proceedings of the Seventeenth International Conference
(ICML'2000), pp. 1151 -- 1158, 2000.
[12] T. Nishi, K. Otaki, K. Hayakawa, and T. Yoshimura, "Traffic signal
control based on reinforcement learning with graph convolutional neural nets,"
in 2018 21st International Conference on Intelligent Transportation Systems
(ITSC), pp. 877 -- 883, IEEE, 2018.
[13] Q. Ba and K. Savla, "On distributed computation of optimal control of
traffic flow over networks," in 2016 54th Annual Allerton Conference on
Communication, Control, and Computing (Allerton), pp. 1102 -- 1109, IEEE,
2016.
[14] G. Como, E. Lovisari, and K. Savla, "Convex formulations of dynamic
network traffic assignment for control of freeway networks," in 2015 53rd
Annual Allerton Conference on Communication, Control, and Computing
(Allerton), pp. 755 -- 762, IEEE, 2015.
[15] J. McCrea and S. Moutari, "A hybrid macroscopic-based model for traffic
flow in road networks," European Journal of Operational Research, vol. 207,
no. 2, pp. 676 -- 684, 2010.
[16] P. Zhang, C.-X. Wu, and S. Wong, "A semi-discrete model and its
approach to a solution for a wide moving jam in traffic flow," Physica A:
Statistical Mechanics and its Applications, vol. 391, no. 3, pp. 456 -- 463, 2012.
[17] C. F. Daganzo, "The cell transmission model, part ii: network traffic,
Transportation Research Part B: Methodological, vol. 29, no. 2, pp. 79 -- 93,
1995.
[18] C. F. Daganzo, "The cell transmission model: A dynamic representation of
highway traffic consistent with the hydrodynamic theory," Transportation
Research Part B: Methodological, vol. 28, no. 4, pp. 269 -- 287, 1994.
[19] L. Munoz, X. Sun, R. Horowitz, and L. Alvarez, "Traffic density
estimation with the cell transmission model," in Proceedings of the 2003
American Control Conference, 2003., vol. 5, pp. 3750 -- 3755, IEEE, 2003.
[20] L. Prashanth and S. Bhatnagar, "Reinforcement learning with function
approximation for traffic signal control," IEEE Transactions on Intelligent
Transportation Systems, vol. 12, no. 2, pp. 412 -- 421, 2010.
[21] H. Y. Ong and M. J. Kochenderfer, "Markov decision process-based
distributed conflict resolution for drone air traffic management," Journal of
Guidance, Control, and Dynamics, pp. 69 -- 80, 2016.
[22] R. Haijema and J. van der Wal, "An mdp decomposition approach for
traffic control at isolated signalized intersections," Probability in the
Engineering and Informational Sciences, vol. 22, no. 4, pp. 587 -- 602, 2008.
[23] L. D. Baskar, B. De Schutter, and H. Hellendoorn, "Traffic management
for automated highway systems using model-based predictive control," IEEE
Transactions on Intelligent Transportation Systems, vol. 13, no. 2, pp. 838 -- 847,
2012.
[24] T. Tettamanti, I. Varga, B. Kulcsar, and J. Bokor, "Model predictive ´
control in urban traffic network management," in 2008 16th Mediterranean
Conference on Control and Automation, pp. 1538 -- 1543, IEEE, 2008.
[25] L. D. Baskar, B. De Schutter, and H. Hellendoorn, "Model-based
predictive traffic control for intelligent vehicles: Dynamic speed limits and
dynamic lane allocation," in 2008 IEEE intelligent vehicles symposium, pp.
174 -- 179, IEEE, 2008.
[26] E. Kural, S. Jones, A. F. Parrilla, and A. Grauers, "Traffic light assistant
system for optimized energy consumption in an electric vehicle," in 2014
International Conference on Connected Vehicles and Expo (ICCVE), pp. 604 --
611, IEEE, 2014.
[27] T. Le, H. L. Vu, Y. Nazarathy, B. Vo, and S. Hoogendoorn,
"Linearquadratic model predictive control for urban traffic networks,"
ProcediaSocial and Behavioral Sciences, vol. 80, pp. 512 -- 530, 2013.
[28] C. R. Vazquez, H. Y. Sutarto, R. Boel, and M. Silva, "Hybrid petri ´ net
model of a traffic intersection in an urban network," in 2010 IEEE International
Conference on Control Applications, pp. 658 -- 664, IEEE, 2010.
[29] L. Riegger, M. Carlander, N. Lidander, N. Murgovski, and J. Sjoberg,
"Centralized mpc for autonomous intersection crossing," in 2016 IEEE 19th
international conference on intelligent transportation systems (ITSC), pp.
1372 -- 1377, IEEE, 2016.
[30] H. M. Kammoun, I. Kallel, J. Casillas, A. Abraham, and A. M. Alimi,
"Adapt-traf: An adaptive multiagent road traffic management system based on
hybrid ant-hierarchical fuzzy model," Transportation Research Part C:
Emerging Technologies, vol. 42, pp. 147 -- 167, 2014.
[31] M. Collotta, L. L. Bello, and G. Pau, "A novel approach for dynamic traffic
lights management based on wireless sensor networks and multiple fuzzy logic
|
1811.06206 | 1 | 1811 | 2018-11-15T06:54:41 | Time-Varying Formation Control of a Collaborative Multi-Agent System Using Negative-Imaginary Systems Theory | [
"cs.MA",
"cs.RO"
] | The movement of cooperative robots in a densely cluttered environment may not be possible if the formation type is invariant. Hence, we investigate a new method for time-varying formation control for a group of heterogeneous autonomous vehicles, which may include Unmanned Ground Vehicles (UGV) and Unmanned Aerial Vehicles (UAV). We have extended a Negative-Imaginary (NI) consensus control approach to switch the formation shape of the robots whilst only using the relative distance between agents and between agents and obstacles. All agents can automatically create a new safe formation to overcome obstacles based on a novel geometric method, then restore the prototype formation once the obstacles are cleared. Furthermore, we improve the position consensus at sharp corners by achieving yaw consensus between robots. Simulation and experimental results are then analyzed to validate the feasibility of our proposed approach. | cs.MA | cs | Time-Varying Formation Control of a Collaborative
Multi-Agent System Using Negative-Imaginary
Systems Theory
Vu Phi Tran, Matthew Garratt and Ian R.Petersen
8
1
0
2
v
o
N
5
1
]
A
M
.
s
c
[
1
v
6
0
2
6
0
.
1
1
8
1
:
v
i
X
r
a
Abstract -- The movement of cooperative robots in a densely
cluttered environment may not be possible if the formation type
is invariant. Hence, we investigate a new method for time-varying
formation control for a group of heterogeneous autonomous
vehicles, which may include Unmanned Ground Vehicles (UGV)
and Unmanned Aerial Vehicles (UAV). We have extended a
Negative-Imaginary (NI) consensus control approach to switch
the formation shape of the robots whilst only using the relative
distance between agents and between agents and obstacles. All
agents can automatically create a new safe formation to overcome
obstacles based on a novel geometric method, then restore the
prototype formation once the obstacles are cleared. Furthermore,
we improve the position consensus at sharp corners by achieving
yaw consensus between robots. Simulation and experimental
results are then analyzed to validate the feasibility of our
proposed approach.
Index Terms -- Time-Varying Formation Control, Consen-
sus Algorithm, UAV-UGV Coordination, Obstacle Avoidance,
Negative-Imaginary Theory.
I. INTRODUCTION
M ULTI-VEHICLE coordination has been attracting in-
creasing attention from researchers as it provides much
enhanced capability for applications such as search and rescue
or mapping. Cooperation between multiple vehicles can lead to
faster and more effective missions. For example, a cooperating
UAV can fly above obstacles and travel faster than a UGV,
whilst providing sensor coverage for a much wider area than
that accessible to the UGV. Meanwhile the UGV can inspect
the environment more closely and precisely than the UAV,
which flies at altitude and may have a partially blocked view.
Supporting ground transportation task is a potential application
of the UAV-UGV cooperation [7, 8]. In this task, a UAV can
be fitted with a camera to capture the visual pose of UGVs
moving on the ground, helping to localize the UGVs and guide
them along a safe path. In summary, the cooperation of UAVs-
UGVs is beneficial in many autonomous missions.
There are two control strategies for a multi-vehicle sys-
tem: centralized or decentralized. In the former approach,
a ground station (GS) collects all required data (posture,
velocity, acceleration) and transmits proper control signals to
each agent. However, centralized control depends on perfect
communication which can be an issue if data dropouts occur
Vu Phi Tran and Matthew Garratt are with the School of Engineer-
ing and Information Technology, University of New South Wales, Aus-
tralia and Ian R.Petersen is with the Research School of Engineer-
ing, Australian National University, Australia. [email protected],
[email protected] and [email protected]
due to overloaded networks or when communication range
constraints are challenged [1, 2]. With decentralized control,
a local controller is designed for each robot, and the control
signals are provided by only using local information about
agents and their neighbors [4, 5]. This approach significantly
reduces the amount of transmission data,
time delay and
is more robust against communication failures. Therefore,
we base our consensus control approach on a decentralized
strategy where the agents know only their own velocities,
accelerations, Euler angles, and their relative position from
other agents.
Within the application of multi-vehicle systems, forming
and maintaining a prescribed formation is a real challenge.
A large body of work related to multi-robot systems can be
found in the literature [12-14, 16]. More consensus results are
shown in [13, 14, 18, 19]. These papers pay much attention
to formation stabilization problems, but the internal stability
of each vehicle based on these cooperative methodologies is
not sufficiently addressed. Furthermore, as seen in [14, 20-22],
agents in a cooperative network are often treated as second-
order systems to solve the formation tracking problems. How-
ever, the position and velocity tracking loops of the UAV or
the UGV are actually represented by a higher order transfer
function. For example, the closed-loop velocity control of a
quadrotor leads to at least a fourth-order model [10, 11]. Using
an improvement in NI consensus theory, our method can solve
this problem by considering simultaneously the stability of the
formation control and dynamics of agents.
More and more researchers have realized that formation
control problems can be handled using consensus-based ap-
proaches. For example, the relevant works in [3, 30] proposed
time invariant formation controllers for multiple UAVs. How-
ever, in most practical tasks, multi-robot systems should also
be able to vary their formation over time so that they can make
progress towards the goal position while avoiding obstacles in
an unknown environment.
The shortcoming of using a fixed formation has been
overcome recently by a few researchers. In [13, 14], a time-
varying formation controller was tested and validated on five
quadrotors. For this method to work, each agent must be
able to sense the absolute position and orientation of its
neighbor. As a result, time delays or data drop during inter-
agent communication may occur as the number of agents
increases dramatically. Similarly, a time-varying formation
control approach for a UAV based on a virtual leader structure
is illustrated in [15], where the follower vehicles maintain a
relative position from a simulated leader represented by an
idealized trajectory. Compared to these methodologies [13-
15], our slave agents only utilize measurements of the relative
distances from their master and each other, such that no data
need to be exchanged during the concensus process.
One of the practical applications of time-varying formation
control approaches for avoiding unexpected obstacles, has
been considered in [15, 28, 29]. Once a potential collision
between the robots and an obstacle is predicted, the robots in
[15] will automatically produce a queuing formation for safely
avoiding the corresponding obstacle. However, this strategy
cannot be used to avoid multiple obstructions. This issue was
solved in [29]. Whenever an obstacle is detected inside the
repulsion zone, an escape angle is determined by the robot
orientation relative to the real target and the disposition of
ultrasonic sensors in the ring, in relation to the axis of robot
movement. It is pointed out from the simulation results that
the stability of the obstacle avoidance algorithm was not
examined. Besides, the control output command pairs based
on the behavioral control approach, including turn left/turn
right and forward/backward, coincide in some cases since the
working area of each control layer is not adaptive. A better
formation control strategy for obstacle avoidance was devel-
oped by Dai, Y., et al [28] in 2015. In this work, a safe path
for the leader was planned by a Geometric Obstacle Avoidance
Control Method (GOACM) where the slaves are moved into a
safe formation relative to the leader. Unfortunately, because of
sudden changes in the velocity setpoints and control saturation
while switching into a safe triangle formation, this method
suffers from oscillations in robot position. Moreover,
this
method is based on the real surface boundary of an obstacle
to formulate the rotation angle, making it not applicable
for practical situations where obstacles often have arbitrarily
complicated shapes.
This paper researches time-varying formation control ap-
proaches for multi-robot systems based on the Negative Imag-
inary (NI) consensus systems theory. Since it was first intro-
duced in 2010 [23], NI systems theory is becoming popular
in many high technology applications, especially in nano-
positioning control [24], vibration control of flexible structures
[26] and multi-DOF robotic arms. According to [20] and [21],
closed-loop multi-systems can achieve high robustness with
respect to external disturbances when certain conditions of
NI theory are met in the plant and controllers. However, in
practice,
the cooperative architecture of this theory shows
four disadvantages, which is proven by our simulation as
shown in Fig. 1: (1) the NI-consensus-based formation control
architecture is not developed in this literature, (2) all agents
are controlled to reach one unique rendezvous point, resulting
in position consensus at the same point which would lead to
collision, (3) the asymmetrical consensus equations between
master and slave can cause practical difficulties in tuning the
gain values of the SNI controllers, and (4) the input setpoints
of each agent such as position/velocity set points are not men-
tioned in the overall network plant of this theory. To handle
these problems, we have previously proposed and tested a new
NI architecture for multi-UAV operation [30]. Nevertheless,
our previous paper presented only the experimental results of
2
Fig. 1. The position consensus between two UAVs via the original NI
consensus protocol.
a homogeneous UAV system with an invariant formation and
did not mention any potential application for the NI formation
control protocol.
Therefore, the significant contributions of this paper com-
pared to our earlier results are four folds: (1) providing an
improved formation control protocol via a more effective
strategy using next-position prediction of the master and
relative distance between agents; (2) simultaneously guar-
anteeing both stability of distributed time-variant formation
and obstacle avoidance control, relative distance modification
and velocity control loops via the NI stability criteria; (3)
developing a distributed time-varying formation controller for
multi-vehicles system using NI systems theory; (4) presenting
a new obstacle avoidance approach by varying the formation
shape; and (5) considering necessary and sufficient conditions
for all obstacle avoidance situations and proposing effective
solutions. An additional contribution of our work is introduc-
ing a practical strategy for UAV-UGV coordination since not
many recent studies consider a consensus methodology for
these two different types of unmanned robots.
In order to test our new methodology, three indoor ex-
periments implementing our enhanced NI-systems cooperative
approach are conducted using both UAV and UGV platforms.
The first test is carried out using two UGVs and one UAV.
The autonomous vehicles must maintain a small
invariant
triangular pattern while the UGV (master) follows a pre-
defined rectangular trajectory. The purpose of this test
is
to prove the effectiveness and stabilization of our proposed
method when two types of robots coordinate to perform
an indoor exploration task. The second test, which is more
complicated than the first one, is used to show the obstacle
avoidance capability of our varying formation method in case
the master (UAV) predicts a collision with an obstacle and
the master (UGV) predicts a collision with multiple obstacles
on either side of its desired path. The final test involves three
UGVs with randomly located obstacles.
Moreover, in outdoor cooperative scenarios, where the UAV
and UGVs are tasked to explore uncertain environment, sit-
uations may occur when an absolute position sensor (like
GPS) is only available to one vehicle at a time. Because
the absolute position navigation may not be available to all
vehicles (e.g. GPS interference caused by urban canyon effect),
we assume the other vehicles are only able to measure their
relative distance using sensors such as machine vision sensors
or radio beacons. Therefore, the relative distances between the
autonomous robots are used as key components in our coop-
erative method during indoor experiments. This information is
simulated and measured by a Vicon Motion Capture system.
Finally, due to the sharp interior angle vertexes of a rectangle
(generally being 90 degree), yaw angle consensus among the
UGVs is also considered in this paper. This additional angle
consensus allows the UGVs to perform smoother movement
following a trajectory with sharp corners like a rectangle by
rotating simultaneously around the vertical (Z) axis, especially
when the master UGV reaches a vertex of the rectangle.
The rest of this paper is organized as follows: Section II in-
troduces the hardware/software configuration and architecture
design for the formation experiment. Preliminary graph theory
and the NI theory is reviewed in Section III. The dynamic
models of the UAV and UGV are analyzed in Section IV.
The formation tracking control architecture for an autonomous
team (UAVs and UGVs) is studied in Section V. Stability of the
whole system is verified in Section VI. Simulation results from
implementing the NI formation control architecture in a team
of multi-vehicles are shown in Section VII. The geometrical
approach for obstacle avoidance is illustrated in Section VIII.
Finally, experimental results are presented in Section IX,
followed by conclusions drawn in Section X.
Throughout this paper, for simplicity of notation, we let 1n
represent a column vector of size n with all elements being
1. Let ⊗ represent the Kronecker product and [P(s), Ps(s)]
denote the positive feedback interconnection between transfer
functions P(s) and Ps(s).
II. EXPERIMENTAL APPARATUS
A. Hardware/Software Configuration
One UAV (F450 quadrotor platform), three UGVs (Pioneer
P3-AT and P3-DX) and four obstacles (plastic packing boxes)
are used to conduct our experiments. The dimension of each
packing box is 36cmW×36cmD×36cmH. The size of each
UAV or UGV is approximately 30cmW×30cmD. The position
and orientation of each robot are broadcasted continuously
from a ground station (GS) where the movements of the UAV
and UGVs in three dimensions are analyzed by the Vicon
Motion Capture System software that is installed in the station
facilities. The master UAV/UGV utilizes this information to
correct its trajectory relative to the next waypoint while the
two slaves (UGVs or UAV) predict the next position of the
master from its estimated velocity and recalculate the relative
distance between the master and the slave before adjusting its
position to preserve the determined formation in real time. The
information exchange protocol between the GS and the robots
is achieved using a WiFi network and the Robot Operating
System (ROS) framework.
B. Overall Architecture
Our control architecture is separated into two layers (Fig.
2): UGV-Leader layer and Leader-Follower layer. The func-
tionality and the control design of each layer will be described
in the next sections.
III. PRELIMINARIES OF GRAPH THEORY AND
NEGATIVE-IMAGINARY THEORY
A. The Basics of Graph Theory
Graph theory can be used to effectively describe the inter-
agent communication including N unmanned robots. Each
3
Fig. 2. Overall architecture of the UAV-UGV and UGV-UGV formation.
is represented as a vertex. Let G = (ϑ,ε) denote a
robot
directed graph with N vertexes and L edges (N×L matrix),
such that ϑ = (v1, v2,..., vN ) and ε ⊆{(vi,vj): vi,vj ∈ ϑ, vi
(cid:54)= vj} mathematically describe the finite vertexes set and the
ordered edges set, respectively. Suppose that each edge of G
is assigned an orientation, which is arbitrary but fixed. The
(vertex-edge) incidence matrix of G, denoted by Q(i), is a
N×L matrix defined as follows:
qve = 1
qve = −1
qve = 0
Qi =
if vi is the head of edge evi,vj ,
if vi is the tail of edge evi,vj ,
if vi is not connected to evi,vj .
(1)
Note that the incidence matrix has a column sum equal to
zero, which is assumed from the fact that every edge must
have exactly one head and one tail. Extending this graph
theory, given an arbitrary oriented set of the edge ε, the graph
Laplacian, L(G), is defined as L(G)= Q(G)Q(G)T .
For convenience in interpreting further the UAV-UGV coop-
erative theory, some mathematical information graph matrices
are newly described.
1) The consensus matrix: Let the N×L matrix Qc represent
a consensus matrix which corresponds to a graph (ϑc,εc)
that has N vertexes and L is the number of communication
orientations. This N×L matrix indicates which robot at vertex
vi in ϑc will send its consensus information to the adjacent
vertexes vj in εc.
Qc =
Cij = 0
Cij = −1
Cij = 0
if Roboti is the head of evi,vj
for consensus,
if Roboti is the tail of evi,vj
for consensus,
otherwise.
(2)
2) The reference matrix: The (N×L) reference matrix Qr
i=1Ri describes which node or UAV in the group will
= diagn
directly follow to the reference trajectories:
Ri = 1 if Roboti directly follows the reference
Qr =
path,
Ri = 0 if Roboti does not directly follow the
reference path.
(3)
B. NI Systems Theory
The definition of an SNI system was firstly introduced in
[23]. According to Lemma 3.1, its Nyquist plot should start
from an arbitrary point on the real axis, curve below this axis
and end at the center point (0,0). Similarly, with a less strict
criteria as compared to an SNI system, the definition of an NI
system is presented in Lemma 3.2.
Lemma 3.1 (Petersen, I.R. and Lanzon, A.,2010): For a
single input/single output (SISO) case, a transfer function P(s)
is called strictly negative imaginary (SNI) if its Nyquist plot is
located strictly below the real axis for all positive frequencies
in s domain; i.e, P(s) ∈ SNI if j(P(jω)-P∗(jω))>0 for all ω>0.
Lemma 3.2 (Petersen, I.R. and Lanzon, A.,2010): P(s) is
negative imaginary (NI) if its Nyquist plot for ω (cid:62) 0 is
contained in the lower half of the complex plane. This Nyquist
plot can touch, but not cross the real axis; i.e, P(s) ∈ NI if
j(P(jω)-P∗(jω))(cid:62)0
when a SNI/NI plant system is achieved, the internal stabil-
ity of a positive feedback interconnection between this plant
and its NI/SNI controller is illustrated as in Lemma 3.3.
Lemma 3.3 (Petersen, I.R. and Lanzon, A.,2010): Con-
sidering the case in which an SNI/NI plant M(s) and an
NI/SNI controller N(s) such that M(∞)N(∞) = 0 and N(∞)
0 are interconnected by a positive feedback, it follows that
the corresponding loop transfer function L(s) = M(s)N(s) is
internally stable if the DC gain condition at zero frequency
M(0)N(0) < 1 is satisfied.
Remark 1: Since the (-1,0) critical point is never enclosed
by the Nyquist plot of a SNI or NI system, it is assumed that
any SNI/NI system has a robust stability.
The major concept of this theory can be extended further
to MIMO and cooperative control applications [20] and [21].
Given a group of SNI/NI systems or a multi-input multi-
output (MIMO) system, the collaboration of SNI/NI agents
is achieved when these systems are connected to their SNI
controllers via a cooperative information graph. The SNI/NI-
agents cooperation is formulated as follows:
¯y = ¯P (s)¯u = (QT
i=1Pi(s)(Qi ⊗ In)¯u
(4)
i ⊗ In)diagn
¯u = ¯Ps(s)¯y
(5)
where u ∈ Rln×1 and y ∈ Rln×1 are the input and output
of the overall network plant, respectively. ¯Ps(s) ∈ Rln×ln is
the group of SNI/NI consensus controllers for the multiple
NI/SNI systems, indicated as Pi(s) ∈ Rmi×1. Thus Pi(s)
is a column vector of size M which contains a set of mi
coordinated outputs.
Based on the consensus theory of Wang [20, 21], an NI-
systems consensus architecture for the multi-UAV systems was
proposed in [30]. A reference matrix, consensus matrix as
well as an offset distance between the UAVs are added to the
original structure to solve existing formation and consensus
problems as shown in Fig. 3. The overall formulas for the
whole cooperative structure are given as:
Xr = 1n ⊗ r,
(6)
4
(7)
(8)
(9)
Fig. 3. The origin NI-system consensus architecture.
Fig. 4. A PID controller structure for controlling the velocity of robots.
ei = yi + Xr,
¯y = ([Qi Qr] ⊗ Im)ei,
ef = ¯y + Xf ,
u = ([Qc Qr] ⊗ Im)diagn
i=1Ps(s)ef
(10)
where r ∈ R2×1 denotes the reference position on the plane
of the master, Xr ∈ R2n×1 is the reference matrix, and xf
corresponds to the relative position between the slave UAVs
and the master UAV in the configured formation. u ∈ Rm×1
is the velocity set point input of each UAV on x and y axes
while the output y ∈ Rm×1 is the current position of each UAV.
u ∈ Rlm×1 and y ∈ Rlm×1 are the input and output of overall
network plant. er is the error between the desired position of
the master and its current one, while ef is the error between
the desired relative position and the current one among the
UAVs. Ps(s) ∈ Rlm×lm is the group of SNI consensus and
tracking controllers for the group of UAVs.
The simple formation experiment conducted in this paper
shows that consensus based on NI-systems cooperative control
between UAVs is guaranteed, but the position response of the
remaining UAVs is somewhat slow. This small delay in the
position response causes an unsatisfactory formation shape
which is also discussed in the conclusion of the Section VII.
In an effort to improve the UAV-UGV formation perfor-
mance based on the consensus algorithm, we will outline an
innovative architecture in the next sections.
IV. DYNAMIC MODELING FOR VELOCITY CONTROL OF
THE UAV AND THE UGV
First, the linear velocities of the UAV/UGV in the x and y
axes are stabilized by using a PID controller, which is tuned to
satisfy the closed-loop SNI system requirement. The proposed
velocity control structure is illustrated in Fig. 4.
During experimental tests, all relevant data of the master and
the slaves (position, linear velocity, acceleration, Euler angles)
were automatically collected by the ground station to serve the
purpose of finding the closed-loop velocity transfer functions
in the lateral and longitudinal directions. In the next step, this
THE UGV TRANSFER FUNCTIONS BETWEEN VELOCITY X/VELOCITY Y
SET POINT AND ACTUAL POSITION X/ POSITION Y
TABLE I
Transfer function
−0.043s3+5.16s2−1860.11s+54489.05
velxsp/posx=
velysp/posy= −0.043s3+4.24s2−1494.74s+48347.83
s4+86.155s3+54490.53s2+29510.63s+1481.6
s4+88.9s3+54883.91s2+49242.03s+1266.25
Velx
Vely
THE UAV TRANSFER FUNCTIONS BETWEEN VELOCITY X/VELOCITY Y SET
POINT AND ACTUAL POSITION X/ POSITION Y
TABLE II
Transfer function
Velx
Vely
velxsp/posx=
velysp/posy=
−0.0426s3+6.76s2−153.90s+33206.86
−0.05s3+−0.52s2−1144.04s+29990.15
s4+86.15s3+54490.53s2+24730.20s+1161.87
s4+101.06s3+52978.06s2+23472.45s+2291.96
data was analyzed using MATLAB to determine the closed-
loop transfer functions between the velocity set point input
(velxsp/velysp) and the absolute position output (posx/posy)
for the UAV/UGV on the x and y axes (Table I, II). We use an
ARMAX model to represent the performance of these transfer
functions. The overall dynamic equations for the UAV and the
UGV in the z domain have a general form as follows:
A(z)y(k) = B(z)u(k − n) + e(k)
(11)
where u(k) is the system input, y(k) is the system output,
n is the system delay, k is the present time and e(k) is the
disturbance in the system.
Based on the transfer functions found, the Nyquist diagrams
of the UAV and UGVs are plotted to identify if the transfer
functions are SNI. As seen in Fig. 5, the linear velocity transfer
functions for both the UAV and the UGVs satisfy the SNI
conditions.
Similarly, the yaw rate transfer functions for UGVs are also
shown to be SNI systems using their Nyquist plots.
V. ARCHITECTURE DESIGN
In this section, an architecture for the NI-system formation
and consensus control is newly designed. Firstly, all of the
SNI velocity transfer functions for the x and y axes, found
5
Fig. 6. Multiple SNI plants.
Fig. 7. Overall network plant.
in the previous section, are combined to form an SNI plant.
The inputs of this plant are the velocity set points of the
SNI systems (Vxsp, Vysp) while its outputs correspond to the
current locations of the vehicles on the x and y axes as shown
in Fig. 6. In the next step, the network matrix ([Qi Qr]⊗Im)
is appended to the output of plant in order to calculate the
relative distances between the robots and the position error
between the master and the slaves (dx;dy;dx1r;dy1r). Similarly,
the matrix ([Qc Qr]⊗Im) is appended to the input of the plant
to determine the desired velocity values for each robot via the
NI consensus controller gains K, the desired relative distance
between robots (Xf , Yf ) and the next position prediction of
the master (pxf , pyf ). This control architecture is referred to
as the overall network plant for consensus (Fig. 7).
The distance between the current position of the master and
its next position (pxf , pyf ) in Fig. 8 is predicted from its
current velocity on the horizontal plane. The corresponding
equations are as follows:(cid:20)pxf
(cid:21)
(cid:20) Vxm(dt)
(cid:21)
Vym(dt)
=
pyf
(12)
where Vxm and Vym are the master horizontal and vertical
velocities, respectively. This data is sent continuously to every
slave agent. Here, dt represents the sample time for the whole
system.
Finally, the overall network plant is then combined with the
remaining parts of the consensus controller, including the NI
controllers, the relative positions and the future position pre-
diction, to create a new formation consensus control method
as shown in Fig. 8.
Based on the desired distance and traveling time between
the former and latter formation, the velocity setpoints sent to
Fig. 5. The Nyquist plots of the UGV and UAV velocity transfer functions
for the x and y axes.
Fig. 8. The consensus and formation control architecture for SNI multi-
vehicle systems with a corresponding communication graph.
6
Fig. 9. Time-varying formation of three robots
Fig. 10. SNI property of a positive connection between an SNI system and
an NI system
each robot can be formulated as shown in Equation 13 and
Fig. 9.
n(cid:88)
n(cid:88)
(V xspi, V yspi) =
(disx(t)
i /t, disy(t)
i /t)
(13)
i=1
i=1
where n is the number of agents participating in formation
transformation. (disx(t)
i ) are the relative distances
i
between the old and new formation on the x and y axes. t
is the desired time interval to reach a new formation.
, disy(t)
As a result, the consensus and reference gain should be
adaptive to obtain the given velocity.
Theorem 5.1: Multi-agent systems can obtain a time-varying
formation tracking on the x-y plane if for any given bounded
initial states, the following condition holds:
i − p(t)
i − dis(t)
´p(t)
i ) = 02×1
n(cid:88)
(14)
lim
(
t→dest
i=1
i
, ´p(t)
where dest is the expected traveling time to achieve a new
formation. p(t)
are expressed as the current and desired
i
position of each robot in the varying formation.
(cid:80)n
sumed from Eq. (14) that limt→dest((cid:80)n
i = 02×1, it is as-
i ) = 02×1.
this theorem becomes the definition of targets
Therefore,
pursuing problems intended for multi-agent systems.
In the case where limt→dest
i=1 dis(t)
i=1 ´p(t)
- p(t)
i
Based on this new strategy, the multi-vehicles under the
control of the adaptive NI controllers and the information
network topology will be guaranteed not only to maintain
a desired spatial pattern but also successfully modify their
formation over time.
Fig. 11. The stability result of the NI formation control protocol
Lemma 6.1 (Petersen, I.R. and Lanzon, A.,2010): A positive
connection between an NI plant and an SNI plant results in
an SNI structure.
Lemma 6.2 (Ghallab, et al., 2017): Lyapunov-based stability
proof verifies that the results given in Lemma 3.3 for the
internal stability of feedback interconnections of NI systems
is still correct.
Furthermore, it is mentioned in Lemma 3.3 that the con-
dition of internal stability for the whole structure with the
positive feedback interconnection is M(0)N(0) < 1. The DC
1161.872 ≈ 28.58 while that of N(s) is
gain of M(0) equals to 33206.861
a constant gain of -0.7 as presented in Test 2. It is seen that the
DC gain condition of M(s)N(s) is guaranteed to be less than
1 due to the negative constant gain value in N(s) controller.
As a result, M(s) under the control of N(s) is internally stable.
Moreover, a Nyquist plot of whole architecture is drawn, and
the result of stability is the same as in Lemma 3.3 since its
figure never encircles the critical point (1+j0) as shown in
Fig. 11.
Similarly, the stability of the Y axis SNI velocity transfer
function and its NI controller as well as that of whole NI
formation control structure are proved by the same approach.
VI. STABILITY PROOF OF THE ENHANCED NI FORMATION
VII. SIMULATION RESULTS
CONTROL ARCHITECTURE
We assume that M(s) and N(s) are the SNI velocity transfer
function and its NI controller for one slave UAV on the x axis
respectively. As presented in Table II and Fig. 5, the M(s)
transfer function (TF1) is an SNI system. Unfortunately, the
position prediction term is only an NI system (TF2) as shown
in Lemma 3.2. It is outlined in Lemma 6.1 that the whole
structure is still SNI if two systems are linked together by
a positive connection. As presented in the Fig. 7, we may
conclude that the complete plant (TF3) is SNI as shown in
Fig. 10.
To validate the effectiveness of the proposed architecture
and controllers, we simulated four consensus schemes. The
NI controller used for the master UAV will receive reference
points from the rectangular path planner and convert them into
linear velocity set points. During the time the master navigates
to each next waypoint, the slaves maintain its relative distance
from the predicted future position of the master. Case 1 shows
a complicated consensus and formation for the combination
of one UAV and two UGVs with the time-varying formation
while the yaw angle consensus is also presented in Case 2 to
solve the position consensus problem at each vertex of the
rectangular trajectory. Thanks to this approach, UGVs can
make the position consensus better, especially at the sharp
corner of two trajectories which has not been mentioned in
recent studies [13] [30]. The overall equations describing the
consensus and formation control for one master UAV and
two slave UGVs, using the enhanced NI systems theory are
summarized as follows:
1
−1
0
1
0
− 1
Qi =
([Qi Qr] ⊗ I2) =
([Qc Qr] ⊗ I2) =
; Qr =
1
0
−1
0
−1
−1
1
0
0
1
0
− 1
0
0
0
−1
−1
; Qc =
0
⊗
(cid:20)1
⊗
(cid:20)1
1
0
0
0
0
1
0
0
1
1
Vxsp(t)
Vysp(t)
Vxsp(t)
Vysp(t)
Vxsp(t)
Vysp(t)
2
3
2
3
u =
=
=
Krx(Xr + X1)
Kry(Yr + Y1)
Kcx1[Xf + X1 - X2 + (Vx1dt)]
Kcy1[Yf + Y1 - Y2 + (Vy1dt)]
Kcx2[Xf + X1 - X3 + (Vx1dt)]
Kcy2[Yf + Y1 - Y3 + (Vy1dt)]
Krx(Xr + X1)
Kry(Yr + Y1)
Kcx1[Xf + dx1]
Kcy1[Yf + dy1]
Kcx2[Xf + dx2]
Kcy2[Yf + dy2]
k =
=
Krx
Kry
Kcx1
Kcy1
Kcx2
Kcy2
disx(t)
disy(t)
disx(t)
disy(t)
disx(t)
disy(t)
1 /t*(Xr + X1)
1 /t*(Yr + Y1)
x2 /t*[Xf + dx1]
y2 /t*[Yf + dy1]
x3 /t*[Xf + dx2]
y3 /t*[Yf + dy2]
(15)
(cid:21)
(cid:21)
(16)
(17)
0
0
0
0
1
0
1
(18)
(19)
7
Fig. 12. Simulation results obtained for a varied formation of the UAV-UGVs
system on the plane for Case 1.
n(cid:88)
where Kr and Kc are the reference and consensus gain
values of the NI controllers for velocity control on the x and
y axes and the angular rate control around the z axis. Let ωsp1
and ωsp2 represent the angular rate set point of the UGVs. dx
and dy are the relative positions between the leader and the
follower on the x and y axes while Ωl is the relative angle
between the leader UGV and the follower UGVs.
The output equation of the SNI plant is:
y =
(Xi, Yi, ωi) = P (s)u
(23)
i=1
where P(s) is the SNI velocity transfer function matrix of
the two UAVs on the x and y axes. n is the number of agents.
Case 1: The distances between robots on the x and y
axes are varied at each vertex of the master's rectangular
trajectory. Xf = [Xf1, Xf2]. Xf1 is chosen as [100,50], [50,50],
[100,50], [100,0] and Xf2 is [-100,50], [-50,50], [-100,50],
[-100,0]. The communication topology is given in Fig. 13.
The Xr parameter will be assigned with the waypoints of the
rectangular trajectory. The four vertexes of this rectangle in the
x-y coordinate plane are [0, 100], [0, 0], [80, 0], [80, 100].
Desired time interval for formation variation is 2 seconds.
Therefore, the initial values for NI controllers are selected as
(-0.002, -0.5, -0.5, -0.5, -0.5, -0.5). As seen in Fig. 12, UAV1,
UGV2 and UGV3 well maintains the varied formation over
time under the control of NI controllers. The UGVs obtain the
newly desired relative distance in approximately 2 seconds.
Case 2: The communication topology is given in Fig. 13.
The NI controllers are the constant gains (-0.066, -0.02),
Xf =(0, 0) degree, Qi = [1; -1], Qc= [0; -1], Qr= [1; 0], the Xr
term is [90; 90] degree. These parameter settings are used to
synchronize the yaw angle for the UGVs. The corresponding
consensus result is depicted in Fig. 14.
The simulation results have verified that our proposed
algorithm can overcome the problem existing in time-varying
formation control. Once the expected relative distances on the
In order to generate a rotation at the sharp corner for UGVs,
the yaw angle of the follower is controlled to follow the
yaw angle of the leader (Eq. 20) instead of being determined
by the position vectors on the x and y axes during the
consensus, avoiding and returning processes (Eq. 21 and Eq.
22). Meanwhile, the position consensus is completely turned
off during the turns.
(cid:21)
(cid:20)ωsp1
ωsp2
(cid:20)
(cid:20)
=
=
u =
Kryaw(Ωr + Ω1)
Kcyaw[Ωf + Ω1 - Ω2 + (ω1dt)]
Kryaw(Ωr + Ω1)
Kcyaw[Ωf + Ωl + (ω1dt)]
(cid:21)
ωspm = atan2(Yspm − Ym, Xspm − Xm)
ωspl = atan2(disYsps − disYs, disXsps − disXs)
(cid:21)
(20)
(21)
(22)
Fig. 13. Communication Graph for Case1 and Case2.
Fig. 14. Simulation results for a yaw angle consensus involving the master
UGV and the slave UGV.
x and y axes are able to be altered at each vertex of the
rectangular trajectory, our robots will take approximately 2
seconds to reach the new distance offset and to stabilize around
this value. Additionally, the consensus of robots is performed
successfully at each vertex of rectangle owing to our yaw angle
consensus approach.
VIII. THE GEOMETRY METHOD TO AVOID OBSTACLES
After verifying the feasibility of our NI varying formation
control method in a simulation environment, it is necessary
to indicate a new obstacle avoidance algorithm for the two
avoiding cases: one obstacle alone and two obstacles in
opposite sides.
A. Identification of obstacles and robots
Each robot is assumed to be equipped with a sensor (e.g.
RGB-Depth camera) to determine the real obstacle boundaries.
In a cluttered environment, the shape of real obstructions is
intricate. Therefore, other studies, which compute the escape
angle via actual border of the obstructions, often show the
results within acceptable limits. Similarly, other approaches
are implemented in a simple environment in which only some
obstacles of simple shape exist. We solve this problem via two
steps: (1) finding the center point of the real boundary parts
within the Field of View (FOV) of the camera by using integral
formula and geometric decomposition, and (2) generating a
virtual circle that surrounds the recognized obstruction. The
radius of this circle is equal
to the distance between the
center point and the furthest point of the observed obstacle
boundary. By using the virtual circles to cover the obstacle
boundaries, any computation based on the circle border line is
more accurate. Each time the robot goes through the identified
area, the calculating process will be repeated.
In Fig. 15,
the light-green colored regions which have
polygon shapes are the overlapping ones between the camera's
FOV and the top sections of the obstacle. Moreover, OC1 and
OC2 are the geometric centers of the two polygons mentioned
above and are also the centers of virtual circles which represent
the viewable obstacle regions detected by the camera.
Occasionally, the obstacle boundary within the observation
view is a discontinuity, which results in small spaces being
created between the obstacles. It would be unacceptable if
the avoiding algorithm drives our robot to pass through these
8
Fig. 15. Generating the obstacle circles within the FOV of camera.
Fig. 16. Necessary and sufficient conditions to group or separate obstacles.
narrow gaps. To overcome this obstruction, we group or
separate these obstacles via the following conditions:
(cid:40)
group-obstacle
separate-obstacle
if dis12 < d+r1+r2,
if dis12 >= d+r1+r2.
(24)
where dis12 is the distance between the two obstacle
centers. r1 and r2 are the radii of the obstacle circle 1 and
2 respectively. d is the diameter of the robot circumscribed
circle.
As presented in Fig. 16, if the distance between the two
centers of OC1 and OC2 is less than the diameter of the
robot's virtual circle plus the two radii, a grouping is executed;
otherwise, the separation is applied. The center coordinate and
radius of the grouped circle OC12 is computed as shown in
Fig. 17.
These computations can be extended for multi-obstacles
situations if there are more than two obstacles whose locations
satisfy the grouping condition. However, in case of using
a laser rangefinder sensor; e.g., 3D LiDAR, which brings
powerful 360-degree and 6-meter distance sensing capabilities,
the obstacle circle radius and the number of grouped obstacles
must be limited. The primary reason is that the larger area of
the obstacle boundary this sensor can recognize, the smaller
the space between obstacles which the robots can bypass is.
Finally, by considering the size of each robot in our ob-
stacle avoidance approach, each robot is also geometrically
circumscribed by a virtual circle. Once the robot's virtual
Fig. 17. New obstacle circle design
circle intersects with the obstacle circle, a potential collision
is detected.
B. Avoiding one obstacle
9
We obtain the necessary and sufficient conditions of this
mode as follows:
1
if ob ∈ F OV, ob (cid:51) OB,
if SP1orSP2 ∈ SD1SD2,
if dis(OC1OC2) > F OV
,
2
0 Otherwise.
mode =
(25)
where SP1 and SP2 denote the coordinates of two projection
points projected from the center line of two opposite obstacles.
SD1 and SD2 illustrate the intersection points between the
robot virtual circles and the center lines of two opposite robots.
FOV is the Field of View of a camera. OC1 and OC2 present
the center location of each obstacle while SC1 and SC2 present
the center location of each robot.
After the requirements of the one-obstacle avoidance mode
are determined, two strategies to transform the robots' forma-
tion will be designed. When one of the slaves predicts a po-
tential collision with the obstacle (Strategy 1) via the distance
between the obstacle and the robot, this robot will calculate
the updated relative distance from the master position and
will execute the avoiding process with the following steps: (1)
calculating an intersection point A between the obstacle circle
and OA3; (2) finding a projected point SP1 on SC1-SC2 line
segment; (3) recomputing the relative distance dis SP1MC1
between the master and the corresponding slave; (4) the slave
travels into the safe place; and (5) after avoiding process, the
three robots reach the destination. Similarly, when the master
detects a potential collision with the obstacle (Strategy 2), the
methods for determining the projected point SP1 are the same
as those mentioned in Strategy 1. However, in the third step
(3), the SP1 coordinate is used as the position reference for
the master while the slaves attempt to maintain their former
orientation by storing its last position on the horizontal axis.
All processes for two strategies are depicted as in Fig. 18.
C. Avoiding two facing obstacles
Regarding the evasion for obstacles located at two opposite
there are three situations which are mathematically
sides,
illustrated as below:
(1),
if dis(SP1SP2) > dis(SC1SC2) + R2 + R3(1),
&dis(OC1OC2) < F OV
2
if D1 + R1 + R2 < dis(SP1SP2),
&dis(SP1SP2) < dis(SC1SC2) + R2 + R3(2),
&dis(OC1OC2) < F OV
2
if D1 < dis(SP1SP2)(3),
&dis(SP1SP2) < D1 + R2 + R3(3),
&dis(OC1OC2) < F OV
2
(2),
(3),
0 Otherwise.
(26)
2
mode =
Fig. 18. The two strategies for one obstacle-avoidance problem.
where D1 is the master robot's virtual circle diameter
In Case 1 (1), the three robots are able to maintain the
configured formation and move to the target without being
blocked by any obstruction due to a large clearance between
two obstacles. In Case 2 (2) and Case 3 (3), the three robots
are forced to alter their formation pattern while there are two
opposite obstacles blocking their path and the relative distance
between the master and the obstacles is 1 meter. The former
will modify the distance between robots while the latter will
shift from the original formation to the queuing formation. In
the scope of this paper, we will concentrate on solving the
problems arising from the first and second cases.
When the conditions of Case 1 are met, no action is required
by the robots. However, when the conditions of Case 2 are
satisfied, our robots will be guided following five steps as
shown in Fig. 19: (1) creating the centers line SC1-SC2
between the two slaves; (2) finding the two intersection points
A and B between the obstacle's boundary circles and the
connecting line OC1-OC2; (3) determining their two projected
points SP1 and SP2 on the SC1-SC2 line; (4) computing the
new desired relative distance that the two slaves must follow
while the master robot is driven to the middle point C of OC1-
OC2; and (5) the former formation pattern will be restored
right after the master robot moves out of FOV of the master's
camera.
IX. EXPERIMENTAL RESULTS
Three experiments have been presented to illustrate the main
results of this research. Test 1 introduces the ability of invariant
formation control via the NI consensus strategy applied to
multi-vehicle systems. In contrast, Test 2 demonstrates the
transformation of robots' time-variant formation pattern with
the main purpose of keeping away from obstacles in two
various situations: one obstacle and two group of obstacles
10
Fig. 20. Communication Graph for Test 2.
Fig. 21. Experimental results for the triangular formation control based on a
position consensus involving the two UGVs and the UAV.
In order to provide more clear proof of this improvement, the
formation experiments using our former NI architecture for
three UGVs [30] are conducted in a similar way as those in
Test 1. Fig. 24 and Fig. 25 show the performances of the
three UGVs over time. Compared with the old architecture in
stabilizing the desired distance of 100 cm between the UGVs,
the actual relative distance between the UGVs in Fig. 24 is up
to 95 cm while that in Fig. 25 is only 30 cm. This verifies that
the enhanced NI architecture for formation control is better
than the ordinary one.
Finally, the rectangular trajectory of the two UGVs in Fig.
21 is extremely smooth, especially at the four vertexes. Such
performance is achieved thanks to strong yaw angle consensus
as shown in Fig. 14 and Fig. 22.
Test 2: Two avoidance schemes mentioned in Section VIII
are implemented separately in an indoor environment using the
UAV-UGV/UGVs systems. These systems are integrated in our
NI time-varying formation control protocol. In experiment 1,
the master UAV attempts to evade the obstacle by changing
its waypoints. Meanwhile, the two slave UGVs maintain their
pre-defined formation. Different from the first test, experiment
2 concentrates on how the three UGVs can overcome the two
groups of obstacles located at two opposite sides.
All settings of two experiments are as per those of Test 1.
The radius of the robot circumscribed circles is 32 cm, and
that of the obstacle's boundary circles is 35 cm. The FOV of
the camera is roughly 2.2 m. The coordinate of the destination
point in the experiment 1 is [-100, 170] while it is [-100, 220]
in the experiment 2.
Test 3: In the final experiment, an uncertain environment,
containing two opposite-side obstacles and a single obstacle, is
Fig. 22. Experimental results for a yaw angle consensus involving two UGVs.
Fig. 19. The strategy for two-facing-obstacles avoidance problem.
in parallel. The final test is conducted for an overall situation
in which obstacles are placed randomly.
Test 1: Test 1 aims at validating the efficiency of both
consensus and formation control for multi-robot systems,
including two UGVs and one UAV. The master UGV (system
1 in Fig. 20) will receive the waypoints on the rectangular
trajectory path while the slaves, involving one UGV (system3)
and one UAV (system2), follow the master and maintain
a relative distance, determined by the pre-defined triangular
formation. The geometrical distance between the master and
each slave is 100 cm. This term is configured by the Xf
parameter in the enhanced NI formation control diagram. The
communication topology is given in Fig. 20. The NI controllers
are the constant gains (-0.0028, -0.0028, -0.7, -0.7, -0.0069, -
0.0069), Xf =(100, -100, 100, 100, 0, 0) cm. The Xr parameter
is the location matrix for the four vertexes of the rectangle.
The coordinates of four vertexes are [100, -150], [100, 10],
[-150, 10], [-150, -150]. Moreover, the yaw angles of the two
UGVs are also synchronized with each other using the same
approach. The NI controllers used for yaw angle consensus
are the constant gains (-0.0056, -0.0107). Similarly, Xf =(0, 0)
degrees. The Xr parameter is referred to as the desired angle
setpoints set and is calculated using the rotation matrix and
the next vertex location. All experimental results are shown in
Fig. 21 and Fig. 22.
For more details, Fig. 23 illustrates graphically a triangle
shape-shifting in space produced by virtual connections made
by the central poses of the two UGVs and the UAV (the
different line types and colors) based on the enhanced NI
formation control strategy with varying time steps.
As seen in Fig. 21 and Fig. 23, good formation and con-
sensus for a group of UAV and UGVs are guaranteed. Based
on the desired relative distance information with the master
position, the two slaves, including the UAV and the UGV,
together with the master UGV, have generated an inverted-V-
shaped formation (green-colored lines) and moved along the
rectangular paths (green, blue and black-colored lines). The
maximum error of position is approximately 15 cm for the
UAV and 7 cm for the UGVs.
Moreover, response time of systems under the control of the
enhanced NI formation architecture is improved dramatically.
11
Fig. 23. Formation control experimentation. The eight images represent the
linear displacement of the triangle pattern generated by the two UGVs and
the UAV. The robots preserve this pattern and travel along the rectangular
path simultaneously.
Fig. 26. Experimental results for the varying horizontal-line formation and
obstacle avoidance control based on the NI consensus architecture involving
the leader UAV and the two slaves UGV.
Fig. 24. Experimental results for the triangular formation control based on a
position consensus involving the three UGVs.
explored by a team of 3 UGVs. The target is assigned at the
coordinate [-100, 240]. The task of this team is to preserve
the triangle-formation as best as possible while avoiding
unexpected obstacles and moving to the target simultaneously.
Fig. 26 shows the significant results of the straight-line
shaped formation and the master-obstacle collision avoidance.
The initial objectives of this experiment are achieved. The
straight-line shaped formation is preserved perfectly by the
two UGVs even though the leader must avoid the obstacle.
Similarly, Fig. 27 indicates that the three UGVs are driven
appropriately according to the first strategy of avoiding two
groups of opposite obstacles (Section VIII) while maintaining
their triangular formation.
Following the success of Test 2, Test 3 is conducted without
any constraints. The three UGVs easily pass through any
obstacles on their path and reach the target despite the two
facing arrays of multiple obstacles and a single obstacle are
placed randomly in indoor environment.
Fig. 27. Experimental results for the triangle varying formation and obstacle
avoidance control based on the NI consensus architecture involving the three
UGVs.
In each test, the position consensus errors made by the
robots are approximately 10 cm on the x and y axes. Since
there are not any oscillations occurring in the real robot
trajectories, it is pointed out that our formation methodology
is better than that of authors in [28]. Besides, our approach
also pays attention to the size of each robot. It is noted that the
distance between the real avoiding path of all examined robots
and the obstacle circle OC12 is roughly 31 cm with respect
to the desired radius of 32 cm as shown in Fig. 26 to Fig. 28.
Moreover, the formation regrouping takes place smoothly via
the robots' steering behavior. The boundary of the restoration
trajectory is the total of the robot radius and the border line
of the obstacle's virtual circle. Finally, thanks to the relative
distance calculation via the boundary of the obstacle's virtual
circle, the safe path generated is better and smoother than that
of the traditional GOACM method which entirely depends on
the real boundary of the complex-shaped obstacle.
As seen in Fig. 21 and Fig. 26, there is no problem when
the master is either the UAV or the UGV although two systems
Fig. 25. Position response of the three UGVs to the original NI consensus
strategy.
Fig. 28. Experimental results for the triangle varying formation and obstacle
avoidance control based on the NI consensus architecture involving the three
UGVs in an uncertain environment.
have very different dynamics. The UAV's outer-loop velocity
controller sends attitude commands to the inner-loop attitude
controller which commands the motors driving the rotors. In
contrast, the UGV's velocity controller controls the velocity of
four wheels directly. This control is achieved by converting the
formation control into the velocity stabilization of each robot
on the x and y axes via the NI-systems control algorithm.
X. CONCLUSION
A time-varying formation control scheme based on the
enhanced NI systems consensus theory for two popular types
of mobile robots (UAVs-UGVs) has been introduced in this
paper. In this consensus problem, the master corrects its state
in space upon receiving waypoints from the path planner,
while the slaves predict the next position of the master and
will respond to its movement with an offset distance that is
determined by the formation planner. In the obstacle avoidance
problem, comprehensive situations are considered, and the
experiments in simulation and real tests present the positive
results of the proposed method compared to the recent studies.
Some position errors at the sharp corners are experienced
by the UAV as shown in Fig. 21. The distance reference with
the leader UGV when this leader rotates at a sharp corner
and the lack of a real velocity sensor are the major causes for
these errors. In future, to handle these problems, the measured
distance between the master UGV and the slave UAV should
be neglected during the rotational motion of the UGVs. To deal
with the second issue, the UAV platform should be equipped
with a velocity sensor (e.g. optical flow based sensor) to
measure the real velocities on the x and y axes.
In future work, other applications generated by formation
control architecture such as distributed consensus protocols,
leaderless formation or group control of UAVs-UGVs using
NI theory will also be studied; notably, the robot alignment,
the V-shape formation control problem or the actual formation
of cooperative groups.
REFERENCES
[1] Milutinovic, D., Lima, P. (2006). Modeling and optimal centralized
control of a large-size robotic population. IEEE Transactions on Robotics,
22(6), 1280-1285.
[2] Huang, M., Caines, P. E., Malham, R. P. (2012). Social optima in
mean field LQG control: centralized and decentralized strategies. IEEE
Transactions on Automatic Control, 57(7), 1736-1751.
[3] Turpin, M., Michael, N., Kumar, V. (2012, May). Decentralized formation
control with variable shapes for aerial robots. In Robotics and Automation
(ICRA), 2012 IEEE International Conference on (pp. 23-30). IEEE.
[4] Sahraei, B. R., Shabaninia, F. (2010, August). A robust H control design
for swarm formation control of multi-agent systems: A decentralized
adaptive fuzzy approach. In Resilient Control Systems (ISRCS), 2010
3rd International Symposium on (pp. 79-84). IEEE.
[5] de Lope, J., Maravall, D., Quionez, Y. (2013). Response threshold models
and stochastic learning automata for self-coordination of heterogeneous
multi-task distribution in multi-robot systems. Robotics and Autonomous
Systems, 61(7), 714-720.
[6] Parker, L. E. (2008). Multiple mobile robot systems. In Springer Hand-
book of Robotics (pp. 921-941). Springer Berlin Heidelberg.
[7] Forster, C., Pizzoli, M., Scaramuzza, D. (2013, November). Air-ground
localization and map augmentation using monocular dense reconstruction.
In Intelligent Robots and Systems (IROS), 2013 IEEE/RSJ International
Conference on (pp. 3971-3978). IEEE.
12
[8] Vidal, R., Shakernia, O., Kim, H. J., Shim, D. H.,Sastry, S. (2002). Prob-
abilistic pursuit-evasion games: theory, implementation, and experimental
evaluation. IEEE transactions on Robotics and Automation, 18(5), 662-
669.
[9] Michael, N., Shen, S., Mohta, K., Mulgaonkar, Y., Kumar, V., Nagatani,
K., Ohno, K. (2012). Collaborative mapping of an earth quakedamaged
building via ground and aerial robots. Journal of Field Robotics, 29(5),
832-841.
[10] Li, J., Li, Y. (2011, August). Dynamic analysis and PID control for a
quadrotor. In Mechatronics and Automation (ICMA), 2011 International
Conference on (pp. 573-578). IEEE.
[11] Zhang, X., Li, X., Wang, K., Lu, Y. (2014). A survey of modelling and
identification of quadrotor robot. In Abstract and Applied Analysis (Vol.
2014). Hindawi.
[12] Yan, Z., Jouandeau, N., Cherif, A. A. (2013). A survey and analysis
of multi-robot coordination. International Journal of Advanced Robotic
Systems, 10(12), 399.
[13] Dong, X., Zhou, Y., Ren, Z., Zhong, Y. (2017). Time-varying formation
tracking for second-order multi-agent systems subjected to switching
topologies with application to quadrotor formation flying. IEEE Transac-
tions on Industrial Electronics, 64(6), 5014-5024
[14] Dong, X., Yu, B., Shi, Z., Zhong, Y. (2015). Time-varying formation
control for unmanned aerial vehicles: Theories and applications. IEEE
Transactions on Control Systems Technology, 23(1), 340-348.
[15] Rahimi, R., Abdollahi, F., Naqshi, K. (2014). Time-varying formation
control of a collaborative heterogeneous multi agent system. Robotics and
autonomous systems, 62(12), 1799-1805.
[16] Su, Y., Hong, Y., Huang, J. (2013). A general result on the robust
cooperative output regulation for linear uncertain multi-agent systems.
IEEE Transactions on Automatic Control, 58(5), 1275-1279.
[17] Beard, R. W., Lawton, J., Hadaegh, F. Y. (2001). A coordination ar-
chitecture for spacecraft formation control. IEEE Transactions on control
systems technology, 9(6), 777-790.
[18] Seo, J., Kim, Y., Kim, S., Tsourdos, A. (2012). Consensus-based
reconfigurable controller design for unmanned aerial vehicle formation
flight. Proceedings of the Institution of Mechanical Engineers, Part G:
Journal of Aerospace Engineering, 226(7), 817-829.
[19] Qu, Y., Zhu, X., Zhang, Y. M. (2012, October). Cooperative control
for UAV formation flight based on decentralized consensus algorithm. In
International Conference on Intelligent Robotics and Applications (pp.
357-366). Springer, Berlin, Heidelberg.
[20] Wang, J., Lanzon, A., Petersen, I. R. (2015). Robust cooperative control
of multiple heterogeneous Negative-Imaginary systems. Automatica, 61,
64-72.
[21] Wang, J., Lanzon, A., Petersen, I. R. (2015). Robust output feedback
consensus for networked negative-imaginary systems. IEEE Transactions
on Automatic Control, 60(9), 2547-2552.
[22] Dong, X., Zhou, Y., Ren, Z., Zhong, Y. (2017). Time-varying formation
tracking for second-order multi-agent systems subjected to switching
topologies with application to quadrotor formation flying. IEEE Transac-
tions on Industrial Electronics, 64(6), 5014-5024.
[23] Petersen, I. R., Lanzon, A. (2010). Feedback control of negative-
imaginary systems. IEEE Control Systems, 30(5), 54-72.
[24] Mabrok, M. A., Kallapur, A. G., Petersen, I. R., Lanzon, A. (2014).
Spectral conditions for negative imaginary systems with applications to
nanopositioning. IEEE/ASME Transactions on Mechatronics, 19(3), 895-
903.
[25] Ghallab, A. G., Mabrok, M. A., Petersen, I. R. (2017). Lyapunov-based
Stability of Feedback Interconnections of Negative Imaginary Systems.
IFAC-PapersOnLine, 50(1), 3424-3428.
[26] Abdullahi, A. M., Mohamed, Z., Abidin, M. Z., Akmeliawati, R.,
Husain, A. R., Bature, A. A. (2015, May). LMI-based state feedback
controller design for vibration control of a negative imaginary system. In
Control Conference (ASCC), 2015 10th Asian (pp. 1-6). IEEE.
[27] Mercado, D. A., Castro, R., Lozano, R. (2013, July). Quadrotors
flight formation control using a leader-follower approach. In Control
Conference (ECC), 2013 European (pp. 3858-3863). IEEE.
[28] Dai, Y., Kim, Y., Wee, S., Lee, D., Lee, S. (2015). A switching formation
strategy for obstacle avoidance of a multi-robot system based on robot
priority model. ISA transactions, 56, 123-134.
[29] Lee, G., Chwa, D. (2018). Decentralized behavior-based formation
control of multiple robots considering obstacle avoidance. Intelligent
Service Robotics, 11(1), 127-138.
[30] Tran, V. P., Garratt, M., Petersen, I. R. (2017, December). Formation
control of multi-UAVs using negative-imaginary systems theory. In Con-
trol Conference (ASCC), 2017 11th Asian (pp. 2031-2036). IEEE.
|
1903.01373 | 4 | 1903 | 2019-10-04T15:22:09 | $\alpha$-Rank: Multi-Agent Evaluation by Evolution | [
"cs.MA",
"cs.GT"
] | We introduce $\alpha$-Rank, a principled evolutionary dynamics methodology for the evaluation and ranking of agents in large-scale multi-agent interactions, grounded in a novel dynamical game-theoretic solution concept called Markov-Conley chains (MCCs). The approach leverages continuous- and discrete-time evolutionary dynamical systems applied to empirical games, and scales tractably in the number of agents, the type of interactions, and the type of empirical games (symmetric and asymmetric). Current models are fundamentally limited in one or more of these dimensions and are not guaranteed to converge to the desired game-theoretic solution concept (typically the Nash equilibrium). $\alpha$-Rank provides a ranking over the set of agents under evaluation and provides insights into their strengths, weaknesses, and long-term dynamics. This is a consequence of the links we establish to the MCC solution concept when the underlying evolutionary model's ranking-intensity parameter, $\alpha$, is chosen to be large, which exactly forms the basis of $\alpha$-Rank. In contrast to the Nash equilibrium, which is a static concept based on fixed points, MCCs are a dynamical solution concept based on the Markov chain formalism, Conley's Fundamental Theorem of Dynamical Systems, and the core ingredients of dynamical systems: fixed points, recurrent sets, periodic orbits, and limit cycles. $\alpha$-Rank runs in polynomial time with respect to the total number of pure strategy profiles, whereas computing a Nash equilibrium for a general-sum game is known to be intractable. We introduce proofs that not only provide a unifying perspective of existing continuous- and discrete-time evolutionary evaluation models, but also reveal the formal underpinnings of the $\alpha$-Rank methodology. We empirically validate the method in several domains including AlphaGo, AlphaZero, MuJoCo Soccer, and Poker. | cs.MA | cs |
α-Rank: Multi-Agent Evaluation by Evolution
Shayegan Omidshafiei∗1, Christos Papadimitriou∗3, Georgios Piliouras∗2, Karl Tuyls∗1,
Mark Rowland1, Jean-Baptiste Lespiau1, Wojciech M. Czarnecki1, Marc Lanctot1, Julien
Perolat1, and Remi Munos1
1DeepMind, 6 Pancras Square, London, UK
2Singapore University of Technology and Design, Singapore
3Columbia University, New York, USA
*Equal contributors, ordered alphabetically. Corresponding author: Karl Tuyls <[email protected]>.
ABSTRACT
We introduce α-Rank, a principled evolutionary dynamics methodology, for the evaluation and ranking of agents in large-scale
multi-agent interactions, grounded in a novel dynamical game-theoretic solution concept called Markov-Conley chains (MCCs).
The approach leverages continuous-time and discrete-time evolutionary dynamical systems applied to empirical games, and
scales tractably in the number of agents, in the type of interactions (beyond dyadic), and the type of empirical games (symmetric
and asymmetric). Current models are fundamentally limited in one or more of these dimensions, and are not guaranteed to
converge to the desired game-theoretic solution concept (typically the Nash equilibrium). α-Rank automatically provides a
ranking over the set of agents under evaluation and provides insights into their strengths, weaknesses, and long-term dynamics
in terms of basins of attraction and sink components. This is a direct consequence of the correspondence we establish to the
dynamical MCC solution concept when the underlying evolutionary model's ranking-intensity parameter, α, is chosen to be
large, which exactly forms the basis of α-Rank. In contrast to the Nash equilibrium, which is a static solution concept based
solely on fixed points, MCCs are a dynamical solution concept based on the Markov chain formalism, Conley's Fundamental
Theorem of Dynamical Systems, and the core ingredients of dynamical systems: fixed points, recurrent sets, periodic orbits,
and limit cycles. Our α-Rank method runs in polynomial time with respect to the total number of pure strategy profiles, whereas
computing a Nash equilibrium for a general-sum game is known to be intractable. We introduce mathematical proofs that
not only provide an overarching and unifying perspective of existing continuous- and discrete-time evolutionary evaluation
models, but also reveal the formal underpinnings of the α-Rank methodology. We illustrate the method in canonical games and
empirically validate it in several domains, including AlphaGo, AlphaZero, MuJoCo Soccer, and Poker.
1 Introduction
This paper introduces a principled, practical, and descriptive methodology, which we call α-Rank. α-Rank enables evaluation
and ranking of agents in large-scale multi-agent settings, and is grounded in a new game-theoretic solution concept, called
Markov-Conley chains (MCCs), which captures the dynamics of multi-agent interactions. While much progress has been
made in learning for games such as Go [1, 2] and Chess [3], computational gains are now enabling algorithmic innovations in
domains of significantly higher complexity, such as Poker [4] and MuJoCo soccer [5] where ranking of agents is much more
intricate than in classical simple matrix games. With multi-agent learning domains of interest becoming increasingly more
complex, we need methods for evaluation and ranking that are both comprehensive and theoretically well-grounded.
Evaluation of agents in a multi-agent context is a hard problem due to several complexity factors: strategy and action spaces
of players quickly explode (e.g., multi-robot systems), models need to be able to deal with intransitive behaviors (e.g., cyclical
best-responses in Rock-Paper-Scissors, but at a much higher scale), the number of agents can be large in the most interesting
applications (e.g., Poker), types of interactions between agents may be complex (e.g., MuJoCo soccer), and payoffs for agents
may be asymmetric (e.g., a board-game such as Scotland Yard).
This evaluation problem has been studied in Empirical Game Theory using the concept of empirical games or meta-games,
and the convergence of their dynamics to Nash equilibria [6 -- 9]. A meta-game is an abstraction of the underlying game, which
considers meta-strategies rather than primitive actions [6, 8]. In the Go domain, for example, meta-strategies may correspond
to different AlphaGo agents (e.g., each meta-strategy is an agent using a set of specific training hyperparameters, policy
representations, and so on). The players of the meta-game now have a choice between these different agents (henceforth
synonymous with meta-strategies), and payoffs in the meta-game are calculated corresponding to the win/loss ratio of these
agents against each other over many rounds of the full game of Go. Meta-games, therefore, enable us to investigate the strengths
and weaknesses of these agents using game-theoretic evaluation techniques.
Figure 1. Paper at a glance. Numerical ordering of the concept boxes corresponds to the paper flow, with sections and/or
theorems indicated where applicable. The methods and ideas used herein may be classified broadly as either game-theoretic
solution concepts (namely, static or dynamic) and evolutionary dynamics concepts (namely, continuous- or discrete-time). The
insights gained by analyzing existing concepts and developing new theoretical results carves a pathway to the novel
combination of our general multi-agent evaluation method, α-Rank, and our game-theoretic solution concept, Markov-Conley
Chains.
Existing meta-game analysis techniques, however, are still limited in a number of ways: either a low number of players
or a low number of agents (i.e., meta-strategies) may be analyzed [6, 8 -- 10]. Specifically, on the one hand continuous-time
meta-game evaluation models, using replicator dynamics from Evolutionary Game Theory [11 -- 15], are deployed to capture the
micro-dynamics of interacting agents. These approaches study and visualize basins of attraction and equilibria of interacting
agents, but are limited as they can only be feasibly applied to games involving few agents, exploding in complexity in the case
of large and asymmetric games. On the other hand, existing discrete-time meta-game evaluation models (e.g., [16 -- 20]) capture
the macro-dynamics of interacting agents, but involve a large number of evolutionary parameters and are not yet grounded in a
game-theoretic solution concept.
To further compound these issues, using the Nash equilibrium as a solution concept for meta-game evaluation in these
dynamical models is in many ways problematic: first, computing a Nash equilibrium is computationally difficult [21, 22];
second, there are intractable equilibrium selection issues even if Nash equilibria can be computed [23 -- 25]; finally, there is an
inherent incompatibility in the sense that it is not guaranteed that dynamical systems will converge to a Nash equilibrium [26],
or, in fact, to any fixed point. However, instead of taking this as a disappointing flaw of dynamical systems models, we see it as
an opportunity to look for a novel solution concept that does not have the same limitations as Nash in relation to these dynamical
systems. Specifically, exactly as J. Nash used one of the most advanced topological results of his time, i.e., Kakutani's fixed
point theorem [27], as the basis for the Nash solution concept, in the present work, we employ Conley's Fundamental Theorem
of Dynamical Systems [28] and propose the solution concept of Markov-Conley chains (MCCs). Intuitively, Nash is a static
solution concept solely based on fixed points. MCCs, by contrast, are a dynamic solution concept based not only on fixed
points, but also on recurrent sets, periodic orbits, and limit cycles, which are fundamental ingredients of dynamical systems.
The key advantages are that MCCs comprehensively capture the long-term behaviors of our (inherently dynamical) evolutionary
2/45
Discrete-time𝛼-Rank: Multi-agent Evaluation by EvolutionStaticSolution ConceptsEvolutionary Dynamics34[Theorem 2.1.3] Single-population macro-model: special case of our generalized model, only applies to symmetric pairwise interaction gamesDynamic7896Conley's Theorem and Chain Components: capture the irreducible behaviors of a continuous-time dynamical system51[Sec 2.1.1] Nash equilibrium: a long-established yet static solution concept for gamesContinuous-time2[Sec 2.1.3]Micro-model (replicator dynamics): provides low-level insights into agent interactions, but effectively limited to 3 to 4 agents only[Sec. 3.1]𝛼-Rank: an efficient and general ranking method, which uses our generalized macro-model to resolve the MCC equilibrium selection problem[Sec 2.4.1] [Sec. 2.4.3] Markov-Conley Chain (MCC) solution concept: a discrete approximation of the chain components of a continuous dynamical system[Theorems 2.4.24, 2.5.1] Compatible with dynamics: MCCs theoretically linked with dynamical models, but cannot directly be used for ranking due to equilibrium selection problem[Sec. 2.3]Incompatibility of nash and dynamics: mathematical and complexity reasons prevent dynamics from converging to Nash equilibria[Sec. 2.1.4] Generalized macro-model: a generalization of previous discrete models that applies even to many-player games and asymmetric interactionssystems, and our associated α-Rank method runs in polynomial time with respect to the total number of pure strategy profiles
(whereas computing a Nash equilibrium for a general-sum game is PPAD-complete [22]).
Main contributions: α-Rank and MCCs While MCCs do not immediately address the equilibrium selection problem, we
show that by introducing a perturbed variant that corresponds to a generalized multi-population discrete-time dynamical model,
the underlying Markov chain containing them becomes irreducible and yields a unique stationary distribution. The ordering
of the strategies of agents in this distribution gives rise to our α-Rank methodology. α-Rank provides a summary of the
asymptotic evolutionary rankings of agents in the sense of the time spent by interacting populations playing them, yielding
insights into their evolutionary strengths. It both automatically produces a ranking over agents favored by the evolutionary
dynamics and filters out transient agents (i.e., agents that go extinct in the long-term evolutionary interactions).
Paper Overview Due to the interconnected nature of the concepts discussed herein, we provide in Fig. 1 an overview of the
paper that highlights the relationships between them. Specifically, the paper is structured as follows: we first provide a review
of preliminary game-theoretic concepts, including the Nash equilibrium (box 1 in Fig. 1), which is a long-standing yet static
solution concept. We then overview the replicator dynamics micro-model ( 2 ), which provides low-level insights into agent
interactions but is limited in the sense that it can only feasibly be used for evaluating three to four agents. We then introduce a
generalized evolutionary macro-model ( 3 ) that extends previous single-population discrete-time models ( 4 ) and (as later
shown) plays an integral role in our α-Rank method. We then narrow our focus on a particular evolutionary macro-model ( 3 )
that generalizes single-population discrete-time models ( 4 ) and (as later shown) plays an integral role in our α-Rank method.
Next, we highlight a fundamental incompatibility of the dynamical systems and the Nash solution concept ( 5 ), establishing
fundamental reasons that prevent dynamics from converging to Nash. This limitation motivates us to investigate a novel solution
concept, using Conley's Fundamental Theorem of Dynamical Systems as a foundation ( 6 ).
Conley's Theorem leads us to the topological concept of chain components, which do capture the irreducible long-term
behaviors of a continuous dynamical system, but are unfortunately difficult to analyze due to the lack of an exact characterization
of their geometry and the behavior of the dynamics inside them. We, therefore, introduce a discrete approximation of these
limiting dynamics that is more feasible to analyze: our so-called Markov-Conley chains solution concept ( 7 ). While we
show that Markov-Conley chains share a close theoretical relationship with both discrete-time and continuous-time dynamical
models ( 8 ), they unfortunately suffer from an equilibrium selection problem and thus cannot directly be used for computing
multi-agent rankings. To address this, we introduced a perturbed version of Markov-Conley chains that resolves the equilibrium
selection issues and yields our α-Rank evaluation method ( 9 ). α-Rank computes both a ranking and assigns scores to agents
using this perturbed model. We show that this perturbed model corresponds directly to the generalized macro-model under a
particular setting of the latter's so-called ranking-intensity parameter α. α-Rank not only captures the dynamic behaviors of
interacting agents, but is also more tractable to compute than Nash for general games. We validate our methodology empirically
by providing ranking analysis on datasets involving interactions of state-of-the-art agents including AlphaGo [1], AlphaZero [3],
MuJoCo Soccer [5], and Poker [29], and also provide scalability properties and theoretical guarantees for the overall ranking
methodology.
2 Preliminaries and Methods
In this section, we concisely outline the game-theoretic concepts and methods necessary to understand the remainder of the
paper. For a detailed discussion of the concepts we refer the reader to [8, 13, 30, 31]. We also introduce a novel game-theoretic
concept, Markov-Conley chains, which we use to theoretically ground our results in.
2.1 Game Theoretic Concepts
2.1.1 Normal Form Games
k=1 Mk), where each player k ∈ {1, . . . ,K}
A K-wise interaction Normal Form Game (NFG) G is defined as (K,∏K
k=1 Sk,∏K
i=1 Si → R. We henceforth denote the joint strategy
chooses a strategy sk from its strategy set Sk and receives a payoff Mk : ∏K
space and payoffs, respectively, as ∏k Sk and ∏k Mk. We denote the strategy profile of all players by s = (s1, . . . ,sK) ∈ ∏k Sk, the
strategy profile of all players except k by s−k, and the payoff profile by (M1(s1,s−1), . . . ,MK(sK,s−K)). An NFG is symmetric
if the following two conditions hold: first, all players have the same strategy sets (i.e., ∀k,l Sk = Sl); second, if a permutation
is applied to the strategy profile, the payoff profile is permuted accordingly. The game is asymmetric if one or both of these
conditions do not hold. Note that in a 2-player (K = 2) NFG the payoffs for both players (M above) are typically represented by
a bi-matrix (A,B), which gives the payoff for the row player in A, and the payoff for the column player in B. If S1 = S2 and
A = BT , then this 2-player game is symmetric.
Naturally the definitions of strategy and payoff can be extended in the usual multilinear fashion to allow for randomized
(mixed) strategies. In that case, we usually overload notation in the following manner: if xk is a mixed strategy for each
3/45
player k and x−k the mixed profile excluding that player, then we denote by Mk(xk,x−k) the expected payoff of player k,
Esk∼xk,s−k∼x−k [Mk(sk,s−k)]. Given these preliminaries, we are now ready to define the Nash equilibrium concept:
Definition 2.1.1 (Nash equilibrium). A mixed strategy profile x = (x1, . . . ,xK) is a Nash equilibrium if for all players k:
maxx(cid:48)k Mk(x(cid:48)k,x−k) = Mk(xk,x−k).
Intuitively, a strategy profile x is a Nash equilibrium of the NFG if no player has an incentive to unilaterally deviate from its
current strategy.
2.1.2 Meta-games
A meta-game (or an empirical game) is a simplified model of an underlying multi-agent system (e.g., an auction, a real-time
strategy game, or a robot football match), which considers meta-strategies or 'styles of play' of agents, rather than the full
set of primitive strategies available in the underlying game [6 -- 8]. In this paper, the meta-strategies considered are learning
agents (e.g., different variants of AlphaGo agents, as exemplified in Section 1). Thus, we henceforth refer to meta-games and
meta-strategies, respectively, as 'games' and 'agents' when the context is clear. For example, in AlphaGo, styles of play may be
characterized by a set of agents {AG(r),AG(v),AG(p)}, where AG stands for the algorithm and indexes r, v, and p stand for
rollouts, value networks, and policy networks, respectively, that lead to different play styles. The corresponding meta-payoffs
quantify the outcomes when players play profiles over the set of agents (e.g., the empirical win rates of the agents when played
against one another). These payoffs can be calculated from available data of the agents' interactions in the real multi-agent
systems (e.g., wins/losses in the game of Go), or they can be computed from simulations. The question of how many such
interactions are necessary to have a good approximation of the true underlying meta-game is discussed in [8]. A meta-game
itself is an NFG and can, thus, leverage the game-theoretic toolkit to evaluate agent interactions at a high level of abstraction.
2.1.3 Micro-model: Replicator Dynamics
Dynamical systems is a powerful mathematical framework for specifying the time dependence of the players' behavior (see the
Supplementary Material for a brief introduction).
For instance, in a two-player asymmetric meta-game represented as an NFG (2,S1 × S2,M = (A,B)), the evolution of
players' strategy profiles under the replicator dynamics [32, 33] is given by,
xi = xi((Ay)i − xT Ay)
y j = y j((xT B) j − xT By)
∀(i, j) ∈ S1 × S2,
(1)
where xi and y j are, respectively, the proportions of strategies i ∈ S1 and j ∈ S2 in two infinitely-sized populations, each
corresponding to a player. This system of coupled differential equations models the temporal dynamics of the populations'
strategy profiles when they interact, and can be extended readily to the general K-wise interaction case (see Supplementary
Material Section 5.2.2 for more details).
The replicator dynamics provide useful insights into the micro-dynamical characteristics of games, revealing strategy
flows, basins of attraction, and equilibria [34] when visualized on a trajectory plot over the strategy simplex (e.g, Fig. 4). The
accessibility of these insights, however, becomes limited for games involving large strategy spaces and many-player interactions.
For instance, trajectory plots may be visualized only for subsets of three or four strategies in a game, and are complex to analyze
for multi-population games due to the inherently-coupled nature of the trajectories. While methods for scalable empirical
game-theoretic analysis of games have been recently introduced, they are still limited to two-population games [8, 9].
2.1.4 Macro-model: Discrete-time Dynamics
This section presents our main evolutionary dynamics model, which extends previous single-population discrete-time models
and is later shown to play an integral role in our α-Rank method and can also be seen as an instantiation of the framework
introduced in [20].
A promising alternative to using the continuous-time replicator dynamics for evaluation is to consider discrete-time
finite-population dynamics. As later demonstrated, an important advantage of the discrete-time dynamics is that they are not
limited to only three or four strategies (i.e., the agents under evaluation) as in the continuous-time case. Even though we lose
the micro-dynamical details of the strategy simplex, this discrete-time macro-dynamical model, in which we observe the flows
over the edges of the high-dimensional simplex, still provides useful insights into the overall system dynamics.
To conduct this discrete-time analysis, we consider a selection-mutation process but with a very small mutation rate
(following the small mutation rate theorem, see [35]). Before elaborating on the details we specify a number of important
concepts used in the description below and clarify their respective meanings in Fig. 2a. Let a monomorphic population denote a
population wherein all individuals play identical strategies, and a monomorphic population profile is a set of monomorphic
populations, where each population may be playing a different strategy (see Fig. 2b). Our general idea is to capture the overall
dynamics by defining a Markov chain over states that correspond to monomorphic population profiles. We can then calculate the
transition probability matrix over these states, which captures the fixation probability of any mutation in any given population
4/45
Concept
K-wise meta-game
Strategy
Individual
Population
Player
Monomorphic Population
Monomorphic Population Profile A set of monomorphic populations.
Focal Population
Meaning
An NFG with K player slots.
The agents under evaluation (e.g., variants of AlphaGo agents) in the meta-game.
A population member, playing a strategy and assigned to a slot in the meta-game.
A finite set of individuals.
An individual that participates in the meta-game under consideration.
A finite set of individuals, playing the same strategy.
A previously-monomorphic population wherein a rare mutation has appeared.
(a)
(b)
(d)
(c)
(e)
Figure 2. Overview of the discrete-time macro-model. (a) Evolutionary concepts terminology. (b) We have a set of
individuals in each population k, each of which is programmed to play a strategy from set Sk. Under the mutation rate µ → 0
assumption, at most one population is not monomorphic at any time. Each individual in a K-wise interaction game has a
corresponding fitness f k(sk,s−k) dependent on its identity k, its strategy sk, and the strategy profile s−k of the other players. (c)
Let the focal population denote a population k wherein a rare mutant strategy appears. At each timestep, we randomly sample
two individuals in population k; the strategy of the first individual is updated by either probabilistically copying the strategy of
the second individual, mutating with a very small probability to a random strategy, or sticking with its own strategy. (d)
Individual in the focal population copies the mutant strategy. (e) The mutant propagates in the focal population, yielding a new
monomorphic population profile.
(i.e., the probability that the mutant will take over that population). By computing the stationary distribution over this matrix
we find the evolutionary population dynamics, which can be represented as a graph. The nodes of this graph correspond to the
states, with the stationary distribution quantifying the average time spent by the populations in each node [17, 36].
A large body of prior literature has conducted this discrete-time Markov chain analysis in the context of pair-wise interaction
5/45
...s1sKsk.........f(sK,s-K)f(sk,s-k).........s1sKsk.........f(s1,s-1)f(sK,s-K)f(sk,s-k)K-wise InteractionMonomorphic Population ProfileMonomorphic PopulationIndividualFitnessesf(s1,s-1)...s1sKsk.........f(sK,s-K)f(sk,s-k).........s1sKsk.........f(s1,s-1)f(sK,s-K)f(sk,s-k)f(s1,s-1)RareMutationFitness-based SelectionFocalPopulation............games with symmetric payoffs [17 -- 19, 36, 37]. Recent work applies the underlying assumption of small-mutation rates [35] to
propose a general framework for discrete-time multi-player interactions [20], which applies to games with asymmetric payoffs.
In our work, we formalize how such an evolutionary model, in the micro/macro dynamics spectrum, should be instantiated to
converge to our novel and dynamical solution concept of MCCs. Additionally, we show (in Theorem 2.1.3) that in the case of
identical per-population payoffs (i.e., ∀k,Mk = M) our generalization reduces to the single-population model used by prior
works. For completeness, we also detail the single population model in the Supplementary Material (see Section 5.3). We now
formally define the generalized discrete-time model.
Recall from Section 2.1.1 that each individual in a K-wise interaction game receives a local payoff Mk(sk,s−k) dependent
on its identity k, its strategy sk, and the strategy profile s−k of the other K − 1 individuals involved in the game. To account for
the identity-dependent payoffs of such individuals, we consider the interactions of K finite populations, each corresponding to a
specific identity k ∈ {1, . . . ,K}.
In each population k, we have a set of strategies Sk that we would like to evaluate for their evolutionary strength. We also
have a set of individuals A in each population k, each of which is programmed to play a strategy from the set Sk. Without loss
of generality, we assume all populations have m individuals.
Individuals interact K-wise through empirical games. At each timestep t, one individual from each population is sampled
uniformly, and the K resulting individuals play a game. Let pk
sk denote the number of individuals in population k playing
strategy sk and p denote the joint population state (i.e., vector of states of all populations). Under our sampling protocol, the
fitness of an individual that plays strategy sk is,
Mk(sk,s−k) ∏
(2)
f k(sk, p−k) = ∑
s−k∈S−k
pc
sc
m .
c∈{1,...,K}\k
We consider any two individuals from a population k, with respective strategies τ,σ ∈ Sk and respective fitnesses f k(τ, p−k)
and f k(σ , p−k) (dependent on the values of the meta-game table). We introduce here a discrete-time dynamics, where the
strategy of the first individual (playing τ) is then updated by either mutating with a very small probability to a random strategy
(Fig. 2c), probabilistically copying the strategy σ of the second individual (Fig. 2d), or sticking with its own strategy τ. The
idea is that strong individuals will replicate and spread throughout the population (Fig. 2e). While one could choose other
variants of discrete-time dynamics [38], we show that this particular choice both yields useful closed-form representations of
the limiting behaviors of the populations, and also coincides with the MCC solution concept we later introduce under specific
conditions.
As individuals from the same population never directly interact, the state of a population k has no bearing on the fitnesses of
its individuals. However, as evident in (2), each population's fitness may directly be affected by the competing populations'
states. The complexity of analyzing such a system can be significantly reduced by making the assumption of a small mutation
rate [35]. Let the 'focal population' denote a population k wherein a mutant strategy appears. We denote the probability
for a strategy to mutate randomly into another strategy sk ∈ Sk by µ and we will assume it to be infinitesimally small (i.e.,
we consider a small-mutation limit µ → 0). If we neglected mutations, the end state of this evolutionary process would be
monomorphic. If we introduce a very small mutation rate this means that either the mutant fixates and takes over the current
population, or the current population is capable of wiping out the mutant strategy [35]. Therefore, given a small mutation
rate, the mutant either fixates or disappears before a new mutant appears in the current population. This means that any given
population k will never contain more than two strategies at any point in time. We refer the interested reader to [20] for a more
extensive treatment of these arguments.
Applying the same line of reasoning, in the small-mutation rate regime, the mutant strategy in the focal population will
either fixate or go extinct much earlier than the appearance of a mutant in any other population [35]. Thus, at any given time,
there can maximally be only one population with a mutant, and the remaining populations will be monomorphic; i.e., in each
competing population c ∈ {1, . . . ,K}\ k, pc
sc
m = 1 for a single strategy and 0 for the rest. As such, given a small enough mutation
rate, analysis of any focal population k needs only consider the monomorphic states of all other populations. Overloading the
notation in (2), the fitness of an individual from population k that plays sk then considerably simplifies to
f k(sk,s−k) = Mk(sk,s−k),
(3)
where s−k denotes the strategy profile of the other populations.
Let pk
τ and pk
σ respectively denote the number of individuals playing τ and σ in focal population k, where pk
σ = m. Per
(3), the fitness of an individual playing τ in the focal population while the remaining populations play monomorphic strategies
s−k is given by f k(τ,s−k) = Mk(τ,s−k). Likewise, the fitness of any individual in k playing σ is, f k(σ ,s−k) = Mk(σ ,s−k).
We randomly sample two individuals in population k and consider the probability that the one playing τ copies the other
individual's strategy σ. The probability with which the individual playing strategy τ will copy the individual playing strategy σ
τ + pk
6/45
can be described by a selection function P(τ → σ ,s−k), which governs the dynamics of the finite-population model. For the
remainder of the paper, we focus on the logistic selection function (aka Fermi distribution),
P(τ → σ ,s−k) =
eα f k(σ ,s−k)
eα f k(τ,s−k) + eα f k(σ ,s−k)
=
(cid:16)
1 + eα( f k(τ,s−k)− f k(σ ,s−k))(cid:17)−1
,
(4)
with α determining the selection strength, which we call the ranking-intensity (the correspondence between α and our ranking
method will become clear later). There are alternative definitions of the selection function that may be used here, we merely
focus on the Fermi distribution due to its extensive use in the single-population literature [17 -- 19].
Based on this setup, we define a Markov chain over the set of strategy profiles ∏k Sk with ∏k Sk states. Each state
corresponds to one of the strategy profiles s ∈ ∏k Sk, representing a multi-population end-state where each population is
monomorphic. The transitions between these states are defined by the corresponding fixation probabilities (the probability of
overtaking the population) when a mutant strategy is introduced in any single monomorphic population k. We now define the
Markov chain, which has (∏k Sk)2 transition probabilities over all pairs of monomorphic multi-population states. Denote by
σ ,τ (s−k) the probability of mutant strategy τ fixating in a focal population k of individuals playing σ, while the remaining
ρk
K − 1 populations remain in their monomorphic states s−k. For any given monomorphic strategy profile, there are a total of
∑k(Sk− 1) valid transitions to a subsequent profile where only a single population has changed its strategy. Thus, letting
σ ,τ (s−k) is the probability that the joint population state transitions from (σ ,s−k) to state (τ,s−k) after
η =
the occurrence of a single mutation in population k. The stationary distribution over this Markov chain tells us how much time,
on average, the dynamics will spend in each of the monomorphic states.
∑k(Sk−1), then ηρk
The fixation probabilities (of a rare mutant playing τ overtaking the focal population k) can be calculated as follows. The
1
probability that the number of individuals playing τ decreases/increases by one in the focal population is given by,
T k(∓1)(pk,τ,σ ,s−k) =
pk
τ pk
σ
Then, the fixation probability ρk
(5)
m(m− 1)
σ ,τ (s−k) of a single mutant with strategy τ in a population k of m− 1 individuals playing σ is,
.
(cid:16)
1 + e±α( f k(τ,s−k)− f k(σ ,s−k))(cid:17)−1
−1
−1
(cid:33)−1
T k(−1)(pk,τ,σ ,s−k)
T k(+1)(pk,τ,σ ,s−k)
e−α( f k(τ,s−k)− f k(σ ,s−k))
∏
pk
τ =1
e−lα( f k(τ,s−k)− f k(σ ,s−k))
l
l
l=1
m−1
∑
m−1
∑
∏
pk
τ =1
1 +
1 +
(cid:32)
1−e−α( f k (τ,s−k )− f k (σ ,s−k ))
1−e−mα( f k (τ,s−k )− f k (σ ,s−k ))
1
m
l=1
m−1
∑
1 +
l=1
σ ,τ (s−k) =
ρk
=
=
=
if f k(τ,s−k) (cid:54)= f k(σ ,s−k)
if f k(τ,s−k) = f k(σ ,s−k)
(6)
(7)
(8)
(9)
This corresponds to the computation of an m-step transition in the Markov chain corresponding to P(τ → σ ,s−k) [39]. The
quotient T k(−1)(pk,τ,σ ,s−k)
expresses the likelihood (odds) that the mutation process in population k continues in either direction:
T k(+1)(pk,τ,σ ,s−k)
if it is close to zero then it is very likely that the number of mutants (individuals with strategy τ in population k) increases; if it
is very large it is very likely that the number of mutants will decrease; and if it close to one then the probabilities of increase
and decrease of the number of mutants are equally likely. This yields the following Markov transition matrix corresponding to
the jump from strategy profile si ∈ ∏k Sk to s j ∈ ∏k Sk,
Ci j =
(s−k
ηρk
i )
sk
i ,sk
j
1− ∑ j(cid:54)=iCi j
0
i (cid:54)= sk
j and s−k
i = s−k
j
if ∃k such that sk
if si = s j
otherwise
(10)
for all i, j ∈ {1, . . . ,S}, where S = ∏k Sk.
The following theorem formalizes the irreducibility of this finite-population Markov chain, a property that is well-known in
the literature (e.g., see [35, Theorem 2] and [20, Theorem 1]) but stated here for our specialized model for completeness.
7/45
Theorem 2.1.2. Given finite payoffs, the Markov chain with transition matrix C is irreducible (i.e., it is possible to get to any
state starting from any state). Thus a unique stationary distribution π (where πTC = πT and ∑i πi = 1) exists.
Proof. Refer to the Supplementary Material Section 5.4.1 for the proof.
This unique π provides the evolutionary ranking, or strength of each strategy profile in the set ∏k Sk, expressed as the
average time spent in each state in distribution π.
This generalized discrete-time evolutionary model, as later shown, will form the basis of our α-Rank method. We would
like to clarify the application of this general model to the single population case, which applies only to symmetric 2-player
games and is commonly used in the literature (see Section 5.1).
Application to Single-Population (Symmetric Two-Player) Games For completeness, we provide a detailed outline of the
single population model in Supplementary Material Section 5.3.
Theorem 2.1.3 (Multi-population model generalizes the symmetric single-population model). The general multi-population
model inherently captures the dynamics of the single population symmetric model.
Proof. (Sketch) In the pairwise symmetric game setting, we consider only a single population of interacting individuals (i.e.,
K = 1), where a maximum of two strategies may exist at any time in the population due to the small mutation rate assumption.
At each timestep, two individuals (with respective strategies τ,σ ∈ S1) are sampled from this population and play a game
using their respective strategies τ and σ. Their respective fitnesses then correspond directly to their payoffs, i.e., fτ = M(τ,σ )
and fσ = M(σ ,τ). With this change, all other derivations and results follow directly the generalized model. For example, the
probability of decrease/increase of a strategy of type sτ in the single-population case translates to,
T (∓1)(p,τ,σ ) =
pτ pσ
m(m− 1)
(cid:16)
1 + e±α( fτ− fσ )(cid:17)−1
,
(11)
and likewise for the remaining equations.
In other words, the generalized model is general in the sense that one can not only simulate symmetric pairwise interaction
dynamics, but also K-wise and asymmetric interactions.
Linking the Micro- and Macro-dynamics Models We have introduced, so far, a micro- and macro-dynamics model, each
with unique advantages in terms of analyzing the evolutionary strengths of agents. The formal relationship between these two
models remains of interest, and is established in the limit of a large population:
Theorem 2.1.4 (Discrete-Continuous Edge Dynamics Correspondence). In the large-population limit, the macro-dynamics
model is equivalent to the micro-dynamics model over the edges of the strategy simplex. Specifically, the limiting model is a
variant of the replicator dynamics with the caveat that the Fermi revision function takes the place of the usual fitness terms.
Proof. Refer to the Supplementary Material Section 5.4.2 for the proof.
Therefore, a correspondence exists between the two models on the 'skeleton' of the simplex, with the macro-dynamics
model useful for analyzing the global evolutionary behaviors over this skeleton, and the micro-model useful for 'zooming into'
the three- or four-faces of the simplex to analyze the interior dynamics.
In the next sections, we first give a few conceptual examples of the generalized discrete-time model, then discuss the need
for a new solution concept and the incompatibility between Nash equilibria and dynamical systems. We then directly link the
generalized model to our new game-theoretic solution concept, Markov-Conley chains (in Theorem 2.5.1).
2.2 Conceptual Examples
We present two canonical examples that visualize the discrete-time dynamics and build intuition regarding the macro-level
insights gained using this type of analysis.
8/45
Player 2
P
−1
0
1
S
1
−1
0
R
R
0
P
1
S −1
Player 1
Player 2
M
O
Player 1
O (3,2)
M (0,0)
(0,0)
(2,3)
(a) Payoffs (top) and single-population discrete-time dynamics
(bottom) for Rock-Paper-Scissors game. Graph nodes correspond to
monomorphic populations R, P, and S.
(b) Payoffs (top) and multi-population discrete-time dynamics
(bottom) for Battle of the Sexes game. Strategies O and M
respectively correspond to going to the Opera and Movies. Graph
nodes correspond to monomorphic population profiles (s1,s2). The
stationary distribution π has 0.5 mass on each of profiles (O,O) and
(M,O), and 0 mass elsewhere.
Figure 3. Conceptual examples of finite-population models, for population size m = 50 and ranking-intensity α = 0.1.
2.2.1 Rock-Paper-Scissors
We first consider the single-population (symmetric) discrete-time model in the Rock-Paper-Scissors (RPS) game, with the
payoff matrix shown in Fig. 3a (top). One can visualize the discrete-time dynamics using a graph that corresponds to the
Markov transition matrix C defined in (10), as shown in Fig. 3a (bottom).
Nodes in this graph correspond to the monomorphic population states. In this example, these are the states of the population
where all individuals play as agents Rock, Paper, or Scissors. To quantify the time the population spends as each agent, we
indicate the corresponding mass of the stationary distribution π within each node. As can be observed in the graph, the RPS
population spends exactly 1
3 of its time as each agent.
Edges in the graph correspond to the fixation probabilities for pairs of states. Edge directions corresponds to the flow of
individuals from one agent to another, with strong edges indicating rapid flows towards 'fitter' agents. We denote fixation
probabilities as a multiple of the neutral fixation probability baseline, ρm = 1
m, which corresponds to using the Fermi selection
function with α = 0. To improve readability of the graphs, we also do not visualize edges looping a node back to itself, or
edges with fixation probabilities lower than ρm. In this example, we observe a cycle (intransitivity) involving all three agents in
the graph. While for small games such cycles may be apparent directly from the structure of the payoff table, we later show that
the graph visualization can be used to automatically iterate through cycles even in K-player games involving many agents.
2.2.2 Battle of the Sexes
Next we illustrate the generalized multi-population (asymmetric) model in the Battle of the Sexes game, with the payoff matrix
shown in Fig. 3b (top). The graph now corresponds to the interaction of two populations, each representing a player type, with
each node corresponding to a monomorphic population profile (s1,s2). Edges, again, correspond to fixation probabilities, but
occur only when a single population changes its strategy to a different one (an artifact of our small mutation assumption). In
9/45
9.06ρm9.06ρm9.06ρm12.96ρm9.06ρm12.96ρm9.06ρms1=Os2=Os1=Os2=Ms1=Ms2=Os1=Ms2=Mthis example, it is evident from the stationary distribution that the populations spend an equal amount of time in profiles (O,O)
and (M,M), and a very small amount of time in states (O,M) and (M,O).
2.3 The Incompatibility of Nash Equilibrium and Dynamical Systems
Continuous- and discrete-time dynamical systems have been used extensively in Game Theory, Economics, and Algorithmic
Game Theory. In the particular case of multi-agent evaluation in meta-games, this type of analysis is relied upon for revealing
useful insights into the strengths and weaknesses of interacting agents [8]. Often, the goal of research in these areas is to
establish that, in some sense and manner, the investigated dynamics actually converge to a Nash equilibrium; there has been
limited success in this front, and there are some negative results [40 -- 42]. In fact, all known dynamics in games (the replicator
dynamics, the many continuous variants of the dynamics used in the proof of Nash's theorem, etc.) do cycle. To compound this
issue, meta-games are often large, extend beyond pair-wise interactions, and may not be zero-sum. While solving for a Nash
equilibrium can be done in polynomial time for zero-sum games, doing so in general-sum games is known to be PPAD-complete
[22], which severely limits the feasibility of using such a solution concept for evaluating our agents.
Of course, some dynamics are known to converge to relaxations of the Nash equilibrium, such as the correlated equilibrium
polytope or the coarse correlated equilibria [43]. But unfortunately, this "convergence" is typically considered in the sense of
time average; time averages can be useful for establishing performance bounds for games, but tell us little about actual system
behavior -- which is a core component of what we study through games. For certain games, dynamics may indeed converge to
a Nash equilibrium, but they may also cycle. For example, it is encouraging that in all 2× 2 matrix games these equilibria,
cycles, and slight generalizations thereof are the only possible limiting behaviors for continuous-time dynamics (i.e., flows).
But unfortunately this clean behavior (convergence to either a cycle or, as a special case, to a Nash equilibrium) is an artifact of
the two-dimensional nature of 2× 2 games, a consequence of the Poincar´e -- Bendixson theorem [44]. There is a wide range of
results in different disciplines arguing that learning dynamics in games tend to not equilibrate to any Nash equilibrium but
instead exhibit complex, unpredictable behavior (e.g., [45 -- 50]). The dynamics of even simple two-person games with three or
more strategies per player can be chaotic [51], that is, inherently difficult to predict and complex. Chaos goes against the core
of our project; there seems to be little hope for building a predictive theory of player behavior based on dynamics in terms of
Nash equilibrium.
2.4 Markov-Conley chains: A Dynamical Solution Concept
Recall our overall objective: we would like to understand and evaluate multi-agent interactions using a detailed and realistic
model of evolution, such as the replicator dynamics, in combination with a game-theoretic solution concept. We start by
acknowledging the fundamental incompatibility between dynamics and the Nash equilibrium: dynamics are often incapable of
reaching the Nash equilibrium. However, instead of taking this as a disappointing flaw of dynamics, we see it instead as an
opportunity to look for a novel solution concept that does not have the same limitations as Nash in relation to these dynamical
systems. We contemplate whether a plausible algorithmic solution concept can emerge by asking, what do these dynamics
converge to? Our goal is to identify the non-trivial, irreducible behaviors of a dynamical system (i.e., behaviors that cannot be
partitioned more finely in a way that respects the system dynamics) and thus provide a new solution concept -- an alternative to
Nash's -- that will enable evaluation of of multi-agent interactions using the underlying evolutionary dynamics. We carve a
pathway towards this alternate solution concept by first considering the topology of dynamical systems.
2.4.1 Topology of Dynamical Systems and Conley's Theorem
Dynamicists and topologists have been working hard throughout the past century to find a way to extend to higher dimensions
the benign yet complete limiting dynamical behaviors described in Section 2.3 that one sees in two dimensions: convergence
to cycles (or equilibria as a special case). That is, they have been trying to find an appropriate relaxation of the notion of a
cycle such that the two-dimensional picture is restored. After many decades of trial and error, new and intuitive conceptions of
"periodicity" and "cycles" were indeed discovered, in the form of chain recurrent sets and chain components, which we define
in this section. These key ingredients form the foundation of Conley's Fundamental Theorem of Dynamical Systems, which in
turn leads to the formulation of our Markov-Conley chain solution concept and associated multi-agent evaluation scheme.
Definitions To make our treatment formal, we require definitions of the following set of topological concepts, based primarily
on the work of Conley [28]. Our chain recurrence approach and the theorems in this section follow from [52]. We also provide
the interested reader a general background on dynamical systems in Supplementary Material 5.2 in an effort to make our work
self-contained.
Definition 2.4.1 (Flow). A flow on a topological space X is a continuous mapping φ : R× X → X such that:
(i) φ (t,·) : X → X is a homeomorphism for each t ∈ R.
(ii) φ (0,x) = x for all x ∈ X.
10/45
Player 2
H
H (1,−1)
(−1,1)
T
T
(−1,1)
(1,−1)
Player 1
Player 1
A
B
(1,1)
(−1,−1)
Player 2
A
B
(−1,−1)
(1,1)
(a) Matching Pennies game.
(b) Partnership, coordination game.
Figure 4. Canonical game payoffs and replicator dynamics trajectories. Each point encodes the probability assigned by the
players to their first strategy. The matching pennies replicator dynamics have one chain component, consisting of the whole
domain. The coordination game dynamics have five chain components (corresponding to the fixed points, four in the corners
and one mixed, which are recurrent by definition), as was formally shown by [26].
(iii) φ (s +t,x) = φ (s,φ (t,x)) for all s,t ∈ R and all x ∈ X.
Depending on the context, we sometimes write φ t (x) for φ (t,x) and denote a flow φ : R× X → X by φ t : X → X, where
t ∈ R.
Definition 2.4.2 ((ε,T )-chain). Let φ be a flow on a metric space (X,d). Given ε > 0, T > 0, and x,y ∈ X, an (ε,T )-chain from
x to y with respect to φ and d is a pair of finite sequences x = x0,x1, . . . ,xn−1,xn = y in X and t0, . . . ,tn−1 in [T,∞), denoted
together by (x0, . . . ,xn;t0, . . . ,tn−1) such that,
d(φ ti(xi),xi+1) < ε,
(12)
for i = 0,1,2, . . . ,n− 1.
Intuitively, an (ε,T ) chain corresponds to the forward dynamics under flow φ connecting points x,y ∈ X, with slight
perturbations allowed at each timestep (see Fig. 5 for an example). Note these deviations are allowed to occur at step-sizes T
bounded away from 0, as otherwise the accumulation of perturbations could yield trajectories completely dissimilar to those
induced by the original flow [53].
Definition 2.4.3 (Forward chain limit set). Let φ be a flow on a metric space (X,d). The forward chain limit set of x ∈ X with
respect to φ and d is the set,
(cid:92)
Ω+(φ ,x) =
{y ∈ X ∃ an (ε,T )-chain from x to y with respect to φ}.
(13)
ε,T >0
Definition 2.4.4 (Chain equivalent points). Let φ be a flow on a metric space (X,d). Two points x,y ∈ X are chain equivalent
with respect to φ and d if y ∈ Ω+(φ ,x) and x ∈ Ω+(φ ,y).
Definition 2.4.5 (Chain recurrent point). Let φ be a flow on a metric space (X,d). A point x ∈ X is chain recurrent with respect
to φ and d if x is chain equivalent to itself; i.e., there exists an (ε,T )-chain connecting x to itself for every ε > 0 and T > 0.
Chain recurrence can be understood as an orbit with slight perturbations allowed at each time step (see Fig. 5), which
constitutes a new conception of "periodicity" with a very intuitive explanation in Computer Science terms: Imagine Alice is
11/45
Figure 5. Topology of dynamical systems: an (ε,T )-chain from x0 to x4 with respect to flow φ is exemplified here by the
solid arrows and sequence of points x0,x1,x2,x3,x4. If the recurrent behavior associated with point x0 (indicated by the dashed
arrow) holds for all ε > 0 and T > 0, then it is a chain recurrent point.
using a computer to simulate the trajectory of a dynamical system that induces a flow φ. Every time she computes a single
iteration of the dynamical process with a minimum step-size T , there is a rounding error ε. Consider an adversary, Bob, who
can manipulate the result at each timestep within the ε-sphere of the actual result. If, regardless of ε or minimum step-size T ,
Bob can persuade Alice that her dynamical system starting from a point x returns back to this point in a finite number of steps,
then this point is chain recurrent.
This new notion of "periodicity" (i.e., chain recurrence) leads to a corresponding notion of a "cycle" captured in the concept
of chain components, defined below.
Definition 2.4.6 (Chain recurrent set). The chain recurrent set of flow φ, denoted R(φ ), is the set of all chain recurrent points
of φ .
Definition 2.4.7 (Chain equivalence relation ∼). Let the relation ∼ on R(φ ) be defined by x ∼ y if and only if x is chain
equivalent to y. This is an equivalence relation on the chain recurrent set R(φ ).
Definition 2.4.8 (Chain component). The equivalence classes in R(φ ) of the chain equivalence relation ∼ are called the chain
components of φ.
In the context of the Alice and Bob example, chain components are the maximal sets A such that for any two points x,y ∈ A,
Bob can similarly persuade Alice that the flow φ induced by her dynamical system can get her from x to y in a finite number
of steps. For example the matching pennies replicator dynamics (shown in Fig. 4a) have one chain component, consisting of
the entire domain; in the context of the Alice and Bob example, the cyclical nature of the dynamics throughout the domain
means that Bob can convince Alice that any two points may be connected using a series of finite perturbations ε, for all ε > 0
and T > 0. On the other hand, the coordination game replicator dynamics (shown in Fig. 4b) has five chain components
corresponding to the fixed points (which are recurrent by definition): four in the corners, and one mixed strategy fixed point in
the center. For a formal treatment of these examples, see [26].
Points in each chain component are transitive by definition. Naturally, the chain recurrent set R(φ ) can be partitioned into a
(possibly infinitely many) number of chain components. In other words, chain components cannot be partitioned more finely in
a way that respects the system dynamics; they constitute the fundamental topological concept needed to define the irreducible
behaviors we seek.
Conley's Theorem We now wish to characterize the role of chain components in the long-term dynamics of systems, such
that we can evaluate the limiting behaviors of multi-agent interactions using our evolutionary dynamical models. Conley's
Fundamental Theorem of Dynamical Systems leverages the above perspective on "periodicity" (i.e., chain recurrence) and
"cycles" (i.e., chain components) to decompose the domain of any dynamical system into two classes: 1) chain components, and
2) transient points. To introduce Conley's theorem, we first need to define the notion of a complete Lyapunov function. The
game-theoretic analogue of this idea is the notion of a potential function in potential games. In a potential game, as long as we
are not at an equilibrium, the potential is strictly decreasing and guiding the dynamics towards the standard game-theoretic
12/45
𝑥0𝑥1𝑥2𝑥3𝑥4𝜙(t0,𝑥0)𝜙(t1,𝑥1)𝜙(t3,𝑥3)𝜙(t2,𝑥2)ε𝜙(t4,𝑥4)solution concept, i.e., equilibria [54]. The notion of a complete Lyapunov function switches the target solution concept from
equilibria to chain recurrent sets. More formally:
Definition 2.4.9 (Complete Lyapunov function). Let φ be a flow on a metric space (X,d). A complete Lyapunov function for φ
is a continuous function γ : X → R such that,
1. γ(φ t (x)) is a strictly decreasing function of t for all x ∈ X \ R(φ ),
2. for all x,y ∈ R(φ ) the points x, y are in the same chain component if and only if γ(x) = γ(y),
3. γ(R(φ )) is nowhere dense.
Conley's Theorem, the important result in topology that will form the basis of our solution concept and ranking scheme, is as
follows:
Theorem 2.4.10 (Conley's Fundamental Theorem of Dynamical Systems [28], informal statement). The domain of any
dynamical system can be decomposed into its (possibly infinitely many) chain components; the remaining points are transient,
each led to the recurrent part by a Lyapunov function.
The powerful implication of Conley's Theorem is that complete Lyapunov functions always exist.
Theorem 2.4.11 ([28]). Every flow on a compact metric space has a complete Lyapunov function.
In other words, the space X is decomposed into points that are chain recurrent and points that are led to the chain recurrent
part in a gradient-like fashion with respect to a Lyapunov function that is guaranteed to exist. In game-theoretic terms, every
game is a "potential" game, if only we change our solution concept from equilibria to chain recurrent sets.
2.4.2 Asymptotically Stable Sink Chain Components
Our objective is to investigate the likelihood of an agent being played in a K-wise meta-game by using a detailed and realistic
model of multi-agent evolution, such as the replicator dynamics. While chain components capture the limiting behaviors
of dynamical systems (in particular, evolutionary dynamics that we seek to use for our multi-agent evaluations), they can
be infinite in number (as mentioned in Section 2.4.1); it may not be feasible to compute or use them in practice within our
evaluation scheme. To resolve this, we narrow our focus onto a particular class of chain components called asymptotically
stable sink chain components, which we define in this section. Asymptotically stable sink chain components are a natural
target for this investigation as they encode the possible "final" long term system; by contrast, we can escape out of other chain
components via infinitesimally small perturbations. We prove in the subsequent section (Theorem 2.4.24, specifically) that, in
the case of replicator dynamics and related variants, asymptotically stable sink chain components are finite in number; our
desired solution concept is obtained as an artifact of this proof.
We proceed by first showing that the chain components of a dynamical system can be partially ordered by reachability
through chains, and we focus on the sinks of this partial order. We start by defining a partial order on the set of chain components:
Definition 2.4.12. Let φ be a flow on a metric space and A1,A2 be chain components of the flow. Define the relation A1 ≤C A2
to hold if and only if there exists x ∈ A2 and y ∈ A1 such that y ∈ Ω+(φ ,x).
Intuitively, A1 ≤C A2, if we can reach A1 from A2 with (ε,T )-chains for arbitrarily small ε and T .
Theorem 2.4.13 (Partial order on chain components). Let φ be a flow on a metric space and A1,A2 be chain components of the
flow. Then the relation defined by A1 ≤C A2 is a partial order.
Proof. Refer to the Supplementary Material Section 5.4.3 for the proof.
We will be focusing on minimal elements of this partial order, i.e., chain components A such that there does not exist any
chain component B such that B ≤C A. We call such chain components sink chain components.
Definition 2.4.14 (Sink chain components). A chain component A is called a sink chain component if there does not exist any
chain component B (cid:54)= A such that B ≤C A.
We can now define the useful notion of asymptotically stable sink chain components, which relies on the notions of
Lyapunov stable, asymptotically stable, and attracting sets.
Definition 2.4.15 (Lyapunov stable set). Let φ be a flow on a metric space (X,d). A set A ⊂ X is Lyapunov stable if for every
neighborhood O of A there exists a neighborhood O(cid:48) of A such that every trajectory that starts in O(cid:48) is contained in O; i.e., if
x ∈ O(cid:48) then φ (t,x) ∈ O for all t ≥ 0.
13/45
Definition 2.4.16 (Attracting set). Set A is attracting if there exists a neighborhood O of A such that every trajectory starting in
O converges to A.
Definition 2.4.17 (Asymptotically stable set). A set is called asymptotically stable if it is both Lyapunov stable and attracting.
Definition 2.4.18 (Asymptotically stable sink chain component). Chain component A is called an asymptotically stable sink
chain component if it is both a sink chain component and an asymptotically stable set.
2.4.3 Markov-Conley chains
Although we wish to study asymptotically stable sink chain components, it is difficult to do so theoretically as we do not have
an exact characterization of their geometry and the behavior of the dynamics inside them. This is a rather difficult task to
accomplish even experimentally. Replicator dynamics can be chaotic both in small and large games [51, 55]. Even when their
behavior is convergent for all initial conditions, the resulting equilibrium can be hard to predict and can be highly sensitive
to initial conditions [56]. It is, therefore, not clear how to extract any meaningful information even from many trial runs of
the dynamics. These issues are exacerbated especially when games involve more than three or four strategies, where even
visualization of trajectories becomes difficult. While studies of these dynamics have been conducted for these low-dimensional
cases [57, 58], very little is known about the geometry and topology of the limit behavior of replicator dynamics for general
games, making it hard to even make informed guesses about whether the dynamics have, for practical reasons, converged to an
invariant subset (i.e., a sink chain component).
Instead of studying the actual dynamics, a computationally amenable alternative is to use a discrete-time discrete-space
approximation with similar limiting dynamics, but which can be directly and efficiently analyzed. We will start off by the most
crude (but still meaningful) such approximations: a set of Markov chains whose state-space is the set of pure strategy profiles
of the game. We refer to each of these Markov chains as a Markov-Conley chain, and prove in Theorem 2.4.24 that a finite
number of them exist in any game under the replicator dynamics (or variants thereof).
Let us now formally define the Markov-Conley chains of a game, which relies on the notions of the response graph of a
game and its sink strongly connected components.
Definition 2.4.19 (Strictly and weakly better response). Let si,s j ∈ ∏k Sk be any two pure strategy profiles of the game, which
differ in the strategy of a single player k. Strategy s j is a strictly (respectively, weakly) better response than si for player k if her
payoff at s j is larger than (respectively, at least as large as) her payoff at si.
Definition 2.4.20 (Response graph of a game). The response graph of a game G is a directed graph whose vertex set coincides
with the set of pure strategy profiles of the game, ∏k Sk. Let si,s j ∈ ∏k Sk be any two pure strategy profiles of the game. We
include a directed edge from si to s j if s j is a weakly better response for player k as compared to si.
Definition 2.4.21 (Strongly connected components). The strongly connected components of a directed graph are the maximal
subgraphs wherein there exists a path between each pair of vertices in the subgraph.
Definition 2.4.22 (Sink strongly connected components). The sink strongly connected components of a directed graph are the
strongly connected components with no out-going edges.
The response graph of a game has a finite number of sink strongly connected components. If such a component is a
singleton, it is a pure Nash equilibrium by definition.
Definition 2.4.23 (Markov-Conley chains (MCCs) of a game). A Markov-Conley chain of a game G is an irreducible Markov
chain, the state space of which is a sink strongly connected component of the response graph associated with G. Many MCCs
may exist for a given game G. In terms of the transition probabilities out of a node si of each MCC, a canonical way to define
them is as follows: with some probability, the node self-transitions. The rest of the probability mass is split between all strictly
and weakly improving responses of all players. Namely, the probability of strictly improving responses for all players are set
equal to each other, and transitions between strategies of equal payoff happen with a smaller probability also equal to each
other for all players.
When the context is clear, we sometimes overload notation and refer to the set of pure strategy profiles in a sink strongly
connected component (as opposed to the Markov chain over them) as an MCC. The structure of the transition probabilities
introduced in Definition 2.4.23 has the advantage that it renders the MCCs invariant under arbitrary positive affine transfor-
mations of the payoffs; i.e., the resulting theoretical and empirical insights are insensitive to such transformations, which is a
useful desideratum for a game-theoretic solution concept. There may be alternative definitions of the transition probabilities
that may warrant future exploration.
MCCs can be understood as a discrete approximation of the chain components of continuous-time dynamics (hence the
connection to Conley's Theorem). The following theorem formalizes this relationship, and establishes finiteness of MCCs:
Theorem 2.4.24. Let φ be the replicator flow when applied to a K-person game. The number of asymptotically stable sink
chain components is finite. Specifically, every asymptotically stable sink chain component contains at least one MCC; each
MCC is contained in exactly one chain component.
14/45
Proof. Refer to the Supplementary Material Section 5.4.4 for the proof.
The notion of MCCs is thus used as a stepping stone, a computational handle that aims to mimic the long term behavior of
replicator dynamics in general games. Similar results to Theorem 2.4.24 apply for several variants of replicator dynamics [13]
as long as the dynamics are volume preserving in the interior of the state space, preserve the support of mixed strategies, and
the dynamics act myopically in the presence of two strategies/options with fixed payoffs (i.e., if they have different payoffs
converge to the best, if they have the same payoffs remain invariant).
2.5 From Markov-Conley chains to the Discrete-time Macro-model
The key idea behind the ordering of agents we wish to compute is that the evolutionary fitness/performance of a specific strategy
should be reflected by how often it is being chosen by the system/evolution. We have established the solution concept of
Markov-Conley chains (MCCs) as a discrete-time sparse-discrete-space analogue of the continuous-time replicator dynamics,
which capture these long-term recurrent behaviors for general meta-games (see Theorem 2.4.24). MCCs are attractive from a
computational standpoint: they can be found efficiently in all games by computing the sink strongly connected components of
the response graph, addressing one of the key criticisms of Nash equilibria. However, similar to Nash equilibria, even simple
games may have many MCCs (e.g., five in the coordination game of Fig. 4b). The remaining challenge is, thus, to solve the
MCC selection problem.
One of the simplest ways to resolve the MCC selection issue is to introduce noise in our system and study a stochastically
perturbed version, such that the overall Markov chain is irreducible and therefore has a unique stationary distribution that can
be used for our rankings. Specifically, we consider the following stochastically perturbed model: we choose an agent k at
random, and, if it is currently playing strategy sk
j at random and set the new system state to
be ε(sk,s−k) + (1− ε)(sk
j,s−k). Remarkably, these perturbed dynamics correspond closely to the macro-model introduced in
Section 2.1.4 for a particularly large choice of ranking-intensity value α:
Theorem 2.5.1. In the limit of infinite ranking-intensity α, the Markov chain associated with the generalized multi-population
model introduced in Section 2.1.4 coincides with the MCC.
i , we choose one of its strategies sk
Proof. Refer to the Supplementary Material Section 5.4.5 for the proof.
A low ranking-intensity (α (cid:28) 1) corresponds to the case of weak selection, where a weak mutant strategy can overtake
a given population. A large ranking-intensity, on the other hand, ensures that the probability that a sub-optimal strategy
overtakes a given population is close to zero, which corresponds closely to the MCC solution concept. In practice, setting the
ranking-intensity to infinity may not be computationally feasible; in this case, the underlying Markov chain may be reducible
and the existence of a unique stationary distribution (which we use for our rankings) may not be guaranteed. To resolve the MCC
selection problem, we require a perturbed model, but one with a large enough ranking-intensity α such that it approximates an
MCC, but small enough such that the MCCs remain connected. By introducing this perturbed version of Markov-Conley chains,
the resulting Markov chain is now irreducible (per Theorem 2.1.2). The long-term behavior is thus captured by the unique
stationary distribution under the large-α limit. Our so-called α-Rank evaluation method then corresponds to the ordering of
the agents in this particular stationary distribution. The perturbations introduced here imply the need for a sweep over the
ranking-intensity parameter α -- a single hyperparameter -- which we find to be computationally feasible across all of the
large-scale games we analyze using α-Rank.
The combination of Theorem 2.4.24 and Theorem 2.5.1 yields a unifying perspective involving a chain of models of
increasing complexity: the continuous-time replicator dynamics is on one end, our generalized discrete-time concept is on the
other, and MCCs are the link in between.
3 Results
In the following we summarize our generalized ranking model and the main theoretical and empirical results. We start by
outlining how the α-Rank procedure exactly works. Then we continue with illustrating α-Rank in a number of canonical
examples. We continue with some deeper understanding of α-Rank's evolutionary dynamics model by introducing some further
intuitions and theoretical results, and we end with an empirical validation of α-Rank in various domains.
3.1 α-Rank: Evolutionary Ranking of Strategies
We first detail the α-Rank algorithm, then provide some insights and intuitions to further facilitate the understanding of our
ranking method and solution concept.
15/45
3.1.1 Algorithm
Based on the dynamical concepts of chain recurrence and MCCs established, we now detail a descriptive method, titled α-Rank,
for computing strategy rankings in a multi-agent interaction:
1. Construct the meta-game payoff table Mk for each population k from data of multi-agent interactions, or from running
game simulations.
2. Compute the transition matrix C as outlined in Section 2.1.4. Per the discussions in Section 2.5, one must use a
sufficiently large ranking-intensity value α in (4); this ensures that α-Rank preserves the ranking of strategies with closest
correspondence to the MCC solution concept. As a large enough value is dependent on the domain under study, a useful
heuristic is to conduct a sweep over α, starting from a small value and increasing it exponentially until convergence of
rankings.
3. Compute the unique stationary distribution, π, of transition matrix C. Each element of the stationary distribution
corresponds to the time the populations spend in a given strategy profile.
4. Compute the agent rankings, which correspond to the ordered masses of the stationary distribution π. The stationary
distribution mass for each agent constitutes a 'score' for it (as might be shown, e.g., on a leaderboard).
3.1.2 α-Rank and MCCs as a Solution Concept: A Paradigm Shift
The solution concept of MCCs is foundationally distinct from that of the Nash equilibrium. The Nash equilibrium is rooted in
classical game theory, which not only models the interactions in multi-agent systems, but is also normative in the sense that it
prescribes how a player should behave based on the assumption of individual rationality [13, 15, 59]. Besides classical game
theory making strong assumptions regarding the rationality of players involved in the interaction, there exist many fundamental
limitations with the concept of a Nash equilibrium: intractability (computing a Nash is PPAD-complete), equilibrium selection,
and the incompatibility of this static concept with the dynamic behaviors of agents in interacting systems. To compound these
issues, even methods that aim to compute an approximate Nash are problematic: a typical approach is to use exploitability to
measure deviation from Nash and as such use it as a method to closely approximate one; the problem with this is that it is also
intractable for large games (typically the ones we are interested in), and there even still remain issues with using exploitability
as a measure of strategy strength (e.g., see [60]). Overall, there seems little hope of deploying the Nash equilibrium as a solution
concept for the evaluation of agents in general large-scale (empirical) games.
The concept of an MCC, by contrast, embraces the dynamical systems perspective, in a manner similar to evolutionary
game theory. Rather than trying to capture the strategic behavior of players in an equilibrium, we deploy a dynamical system
based on the evolutionary interactions of agents that captures and describes the long-term behavior of the players involved in the
interaction. As such, our approach is descriptive rather than prescriptive, in the sense that it is not prescribing the strategies that
one should play; rather, our approach provides useful information regarding the strategies that are evolutionarily non-transient
(i.e., resistant to mutants), and highlights the remaining strategies that one might play in practice. To understand MCCs requires
a shift away from the classical models described above for games and multi-agent interactions. Our new paradigm is to allow
the dynamics to roll out and enable strong (i.e., non-transient) agents to emerge and weak (i.e, transient) agents to vanish
naturally through their long-term interactions. The resulting solution concept not only permits an automatic ranking of agents'
evolutionary strengths, but is powerful both in terms of computability and usability: our rankings are guaranteed to exist,
can be computed tractably for any game, and involve no equilibrium selection issues as the evolutionary process converges
to a unique stationary distribution. Nash tries to identify static single points in the simplex that capture simultaneous best
response behaviors of agents, but comes with the range of complications mentioned above. On the other hand, the support of
our stationary distribution captures the strongest non-transient agents, which may be interchangeably played by interacting
populations and therefore constitute a dynamic output of our approach.
Given that both Nash and MCCs share a common foundation in the notion of a best response (i.e., simultaneous best
responses for Nash, and the sink components of a best response graph for MCCs), it is interesting to consider the circumstances
under which the two concepts coincide. There do, indeed, exist such exceptional circumstances: for example, for a potential
game, every better response sequence converges to a (pure) Nash equilibrium, which coincides with an MCC. However,
even in relatively simple games, differences between the two solution concepts are expected to occur in general due to the
inherently dynamic nature of MCCs (as opposed to Nash). For example, in the Biased Rock-Paper-Scissors game detailed in
Section 3.2.2, the Nash equilibrium and stationary distribution are not equivalent due to the cyclical nature of the game; each
3 , 1
3 , 1
player's symmetric Nash is ( 1
16 ), whereas the stationary distribution is ( 1
3 ). The key difference here is that whereas
Nash is prescriptive and tells players which strategy mixture to use, namely ( 1
16 , 5
8 , 5
16 ), assuming rational opponents, α-Rank
is descriptive in the sense that it filters out evolutionary transient strategies and yields a ranking of the remaining strategies
in terms of their long-term survival. In the Biased Rock-Paper-Scissors example, α-Rank reveals that all three strategies are
16 , 5
8 , 5
16/45
equally likely to persist in the long-term as they are part of the same sink strongly connected component of the response graph.
In other words, the stationary distribution mass (i.e., the α-Rank score) on a particular strategy is indicative of its resistance to
being invaded by any other strategy, including those in the distribution support. In the case of the Biased Rock-Paper-Scissors
game, this means that the three strategies are equally likely to be invaded by a mutant, in the sense that their outgoing fixation
probabilities are equivalent. In contrast to our evolutionary ranking, Nash comes without any such stability properties (e.g.,
consider the interior mixed Nash in Fig. 4b). Even computing Evolutionary Stable Strategies (ESS) [13], a refinement of Nash
equilibria, is intractable [61, 62]. In larger games (e.g., AlphaZero in Section 3.4.2), the reduction in the number of agents that
are resistant to mutations is more dramatic (in the sense of the stationary distribution support size being much smaller than the
total number of agents) and less obvious (in the sense that more-resistant agents are not always the ones that have been trained
for longer). In summary, the strategies chosen by our approach are those favored by evolutionary selection, as opposed to the
Nash strategies, which are simultaneous best-responses.
3.2 Conceptual Examples
We revisit the earlier conceptual examples of Rock-Paper-Scissors and Battle of the Sexes from Section 2.2 to illustrate the
rankings provided by the α-Rank methodology. We use a population size of m = 50 in our evaluations.
3.2.1 Rock-Paper-Scissors
In the Rock-Paper-Scissors game, recall the cyclical nature of the discrete-time Markov chain (shown in Fig. 6a) for a fixed
value of ranking-intensity parameter, α. We first investigate the impact of the ranking-intensity on overall strategy rankings, by
plotting the stationary distribution as a function of α in Fig. 6b. The result is that the population spends 1
3 of its time playing
each strategy regardless of the value of α, which is in line with intuition due to the cyclical best-response structure of the
game's payoffs. The Nash equilibrium, for comparison, is also ( 1
3 ). The α-Rank output Fig. 6c, which corresponds to a
high value of α, thus indicates a tied ranking for all three strategies, also in line with intuition.
3 , 1
3 , 1
3.2.2 Biased Rock-Paper-Scissors
Consider now the game of Rock-Paper-Scissors, but with biased payoffs (shown in Fig. 7a). The introduction of the bias moves
the Nash from the center of the simplex towards one of the corners, specifically ( 1
16 ) in this case. It is worthwhile to
investigate the corresponding variation of the stationary distribution masses as a function of the ranking-intensity α (Fig. 7c) in
this case. As evident from the fixation probabilities (9) of the generalized discrete-time model, very small values of α cause
the raw values of payoff to have a very low impact on the dynamics captured by discrete-time Markov chain; in this case,
any mutant strategy has the same probability of taking over the population, regardless of the current strategy played by the
population. This corresponds well to Fig. 7c, where small α values yield stationary distributions close to π = ( 1
16 , 5
8 , 5
As α increases, payoff values play a correspondingly more critical role in dictating the long-term population state; in Fig. 7c,
the population tends to play Paper most often within this intermediate range of α. Most interesting to us, however, is the case
where α increases to the point that our discrete-time model bears a close correspondence to the MCC solution concept (per
Theorem 2.5.1). In this limit of large α, the striking outcome is that the stationary distribution once again converges to ( 1
3 , 1
3 ).
Thus, α-Rank yields the high-level conclusion that in the long term, a monomorphic population playing any of the 3 given
strategies can be completely and repeatedly displaced by a rare mutant, and as such assigns the same ranking to all strategies
(Fig. 7d). This simple example illustrates perhaps the most important trait of the MCC solution concept and resulting α-Rank
methodology: they capture the fundamental dynamical structure of games and long-term intransitivities that exist therein, with
the rankings produced corresponding to the dynamical strategy space consumption or basins of attraction of strategies.
3 , 1
3 , 1
3 , 1
3 ).
3.2.3 Battle of the Sexes
We consider next an example of α-Rank applied to an asymmetric game -- the Battle of the Sexes. Figure 8b plots the stationary
distribution against ranking-intensity α, where we again observe a uniform stationary distribution corresponding to very low
values of α. As α increases, we observe the emergence of two sink chain components corresponding to strategy profiles (O,O)
and (M,M), which thus attain the top α-Rank scores in Fig. 8c. Note the distinct convergence behaviors of strategy profiles
(O,M) and (M,O) in Fig. 8b, where the stationary distribution mass on the (M,O) converges to 0 faster than that of (O,M) for
an increasing value of α. This is directly due to the structure of the underlying payoffs and the resulting differences in fixation
probabilities. Namely, starting from profile (M,O), if either player deviates, that player increases their local payoff from 0 to 3.
Likewise, if either player deviates starting from profile (O,M), that player's payoff increases from 0 to 2. Correspondingly, the
fixation probabilities out of (M,O) are higher than those out of (O,M) (Fig. 8a), and thus the stationary distribution mass on
(M,O) converges to 0 faster than that of (O,M) as α increases. We note that these low-α behaviors, while interesting, have no
impact on the final rankings computed in the limit of large α (Fig. 8c). We refer the interested reader to [63] for a detailed
analysis of the non-coordination components of the stationary distribution in mutualistic interactions, such as the Battle of the
Sexes.
17/45
Domain
Results
Symmetric?
# of Populations
# of Strategies
Rock-Paper-Scissors
Biased Rock-Paper-Scissors
Battle of the Sexes
AlphaGo
AlphaZero Chess
MuJoCo Soccer
Kuhn Poker
Leduc Poker
Section 3.2.1
Section 3.2.2
Section 3.2.3
Section 3.4.1
Section 3.4.2
Section 3.4.3
Section 3.4.4
Section 3.4.4
Section 3.4.5
1
1
2
1
1
1
3
4
2
[3]
[3]
[2,2]
[7]
[56]
[10]
[4,4,4]
[4,4,4,4]
[3,3]
Table 1. Overview of multi-agent domains evaluated in this paper. These domains are extensive across multiple axes of
complexity, and include symmetric and asymmetric games with different numbers of populations and ranges of strategies.
We conclude this discussion by noting that despite the asymmetric nature of the payoffs in this example, the computational
techniques used by α-Rank to conduct the evaluation are essentially identical to the simpler (symmetric) Rock-Paper-Scissors
game. This key advantage is especially evident in contrast to recent evaluation approaches that involve decomposition of a
asymmetric game into multiple counterpart symmetric games, which must then be concurrently analyzed [9].
3.3 Theoretical Properties of α-Rank
This section presents key theoretical findings related to the structure of the underlying discrete-time model used in α-Rank, and
computational complexity of the ranking analysis. Proofs are presented in the Supplementary Material.
Property 3.3.1 (Structure of C). Given strategy profile si corresponding to row i of C, the number of valid profiles it can
transition to is 1 + ∑k(Sk− 1) (i.e., either si self-transitions, or one of the populations k switches to a different monomorphic
strategy). The sparsity of C is then,
.
S2
1− S(1 + ∑k(Sk− 1))
Therefore, for games involving many players and strategies, transition matrix C is large (in the sense that there exist S
states), but extremely sparse (in the sense that there exist only 1 + ∑k(Sk− 1) outgoing edges from each state). For example,
in a 6-wise interaction game where agents in each population have a choice over 4 strategies, C is 99.53% sparse.
Property 3.3.2 (Computational complexity of solving for π). The sparse structure of the Markov transition matrix C (as
identified in Property 3.3.1) can be exploited to solve for the stationary distribution π efficiently; specifically, computing the
stationary distribution can be formulated as an eigenvalue problem, which can be computed in cubic-time in the number of total
pure strategy profiles.
(14)
The α-Rank method is, therefore, tractable, in the sense that it runs in polynomial time with respect to the total number of
pure strategies. This yields a major computational advantage, in stark contrast to conducting rankings by solving for Nash
(which is PPAD-complete for general-sum games [22], which our meta-games may be).
3.4 Experimental Validation
In this section we provide a series of experimental illustrations of α-Rank in a varied set of domains, including AlphaGo,
AlphaZero Chess, MuJoCo Soccer, and both Kuhn and Leduc Poker. As evident in Table 1, the analysis conducted is extensive
across multiple axes of complexity, as the domains considered include symmetric and asymmetric games with different numbers
of populations and ranges of strategies.
3.4.1 AlphaGo
In this example we conduct an evolutionary ranking of AlphaGo agents based on the data reported in [1]. The meta-game
considered here corresponds to a 2-player symmetric NFG with 7 AlphaGo agents: AG(r), AG(p), AG(v), AG(rv), AG(rp),
AG(vp), and AG(rvp), where r, v, and p respectively denote the combination of rollouts, value networks, and/or policy networks
used by each variant. The corresponding payoffs are the win rates for each pair of agent match-ups, as reported in Table 9 of [1].
In Fig. 9c we summarize the rankings of these agents using the α-Rank method. α-Rank is quite conclusive in the sense
that the top agent, AG(rvp), attains all of the stationary distribution mass, dominating all other agents. Further insights into the
pairwise agent interactions are revealed by visualizing the underlying Markov chain, shown in Fig. 9a. Here the population
18/45
flows (corresponding to the graph edges) indicate which agents are more evolutionarily viable than others. For example,
the edge indicating flow from AG(r) to AG(rv) indicates that the latter agent is stronger in the short-term of evolutionary
interactions. Moreover, the stationary distribution (corresponding to high α values in Fig. 9b) reveals that all agents but
AG(rvp) are transient in terms of the long-term dynamics, as a monomorphic population starting from any other agent node
eventually reaches AG(rvp). In this sense, node AG(rvp) constitutes an evolutionary stable strategy. We also see in Fig. 9a that
no cyclic behaviors occur in these interactions. Finally, we remark that the recent work of [8] also conducted a meta-game
analysis on these particular AlphaGo agents and drew similar conclusions to ours. The key limitation of their approach is
that it can only directly analyze interactions between triplets of agents, as they rely on visualization of the continuous-time
evolutionary dynamics on a 2-simplex. Thus, to draw conclusive results regarding the interactions of the full set of agents, they
must concurrently conduct visual analysis of all possible 2-simplices (35 total in this case). This highlights a key benefit of
α-Rank as it can succinctly summarize agent evaluations with minimal intermediate human-in-the-loop analysis.
3.4.2 AlphaZero
AlphaZero is a generalized algorithm that has been demonstrated to master the games of Go, Chess, and Shogi without
reliance on human data [3]. Here we demonstrate the applicability of the α-Rank evaluation method to large-scale domains
by considering the interactions of a large number of AlphaZero agents playing the game of chess. In AlphaZero, training
commences by randomly initializing the parameters of a neural network used to play the game in conjunction with a general-
purpose tree search algorithm. To synthesize the corresponding meta-game, we take a 'snapshot' of the network at various
stages of training, each of which becomes an agent in our meta-game. For example, agent AZ(27.5) corresponds to a snapshot
taken at approximately 27.5% of the total number of training iterations, while AZ(98.7) corresponds to one taken approximately
at the conclusion of training. We take 56 of these snapshots in total. The meta-game considered here is then a symmetric
2-player NFG involving 56 agents, with payoffs again corresponding to the win-rates of every pair of agent match-ups. We note
that there exist 27720 total simplex 2-faces in this dataset, substantially larger than those investigated in [8], which quantifiably
justifies the computational feasibility of our evaluation scheme.
We first analyze the evolutionary strengths of agents over a sweep of ranking-intensity α (Fig. 10b). While the overall
rankings are quite invariant to the value of α, we note again that a large value of α dictates the final α-Rank evaluations attained
in Fig. 10c. To gain further insight into the inter-agent interactions, we consider the corresponding discrete-time evolutionary
dynamics shown in Fig. 10a. Note that these interactions are evaluated using the entire 56-agent dataset, though visualized only
for the top-ranked agents for readability. The majority of top-ranked agents indeed correspond to snapshots taken near the end
of AlphaZero training (i.e., the strongest agents in terms of training time). Specifically, AZ(99.4), which is the final snapshot in
our dataset and thus the most-trained agent, attains the top rank with a score of 0.39, in contrast to the second-ranked AZ(93.9)
agent's score of 0.22. This analysis does reveal some interesting outcomes, however: agent AZ(86.4) is not only ranked 5-th
overall, but also higher than several agents with longer training time, including AZ(88.8), AZ(90.3), and AZ(93.3).
We also investigate here the relationship between the α-Rank scores and Nash equilibria. A key point to recall is the
equilibrium selection problem associated with Nash, as multiple equilibria can exist even in the case of two-player zero-sum
meta-games. In the case of zero-sum meta-games, Balduzzi et al. show that there exists a unique maximum entropy (maxent)
Nash equilibrium [64], which constitutes a natural choice that we also use in the below comparisons. For general games,
unfortunately, this selection issue persists for Nash, whereas it does not for α-Rank due to the uniqueness of the associated
ranking (see Theorem 2.1.2).
We compare the α-Rank scores and maxent Nash by plotting each throughout AlphaZero training in Fig. 11a and Fig. 11b,
respectively; we also plot their difference in Fig. 11c. At a given training iteration, the corresponding horizontal slice in each
plot visualizes the associated evaluation metric (i.e., α-Rank, maxent Nash, or difference of the two) computed for all agent
snapshots up to that iteration. We first note that both evaluation methods reach a consensus that the strengths of AlphaZero
agents generally increase with training, in the sense that only the latest agent snapshots (i.e., the ones closest to the diagonal)
appear in the support of both α-Rank scores and Nash. An interesting observation is that less-trained agents sometimes reappear
in the support of the distributions as training progresses; this behavior may even occur multiple times for a particular agent.
We consider also the quantitative similarity of α-Rank and Nash in this domain. Figure 11c illustrates that differences do
exist in the sense that certain agents are ranked higher via one method compared to the other. More fundamentally, however,
we note a relationship exists between α-Rank and Nash in the sense that they share a common rooting in the concept of
best-response: by definition, each player's strategy in a Nash equilibrium is a best response to the other players' strategies;
in addition, α-Rank corresponds to the MCC solution concept, which itself is derived from the sink strongly-connected
components of the game's response graph. Despite the similarities, α-Rank is a more refined solution concept than Nash in
the sense that it is both rooted in dynamical systems and a best-response approach, which not only yields rankings, but also
the associated dynamics graph (Fig. 10a) that gives insights into the long-term evolutionary strengths of agents. Beyond this,
the critical advantage of α-Rank is its tractability for general-sum games (per Property 3.3.2), as well as lack of underlying
equilibrium selection issues; in combination, these features yield a powerful empirical methodology with little room for user
19/45
confusion or interpretability issues. This analysis reveals fundamental insights not only in terms of the benefits of using α-Rank
to evaluate agents in a particular domain, but also an avenue of future work in terms of embedding the evaluation methodology
into the training pipeline of agents involved in large and general games.
3.4.3 MuJoCo Soccer
We consider here a dataset consisting of complex agent interactions in the continuous-action domain of MuJoCo soccer [5].
Specifically, this domain involves a multi-agent soccer physics-simulator environment with teams of 2 vs. 2 agents in the
MuJoCo physics engine [65]. Each agent, specifically, uses a distinct variation of algorithmic and/or policy parameterization
component (see [5] for agent specifications). The underlying meta-game is a 2-player NFG consisting of 10 agents, with payoffs
corresponding to Figure 2 of [5].
We consider again the variation of the stationary distribution as a function of ranking-intensity α (Fig. 12b). Under the large
α limit, only 6 agent survive, with the remaining 4 agents considered transient in the long-term. Moreoever, the top 3 α-Ranked
agents (C, A, and B, as shown in Fig. 12c) correspond to the strongest agents highlighted in [5], though α-Rank highlights 3
additional agents (G, J, and F) that are not in the top-rank set outlined in their work. An additional key benefit of our approach
is that it can immediately highlight the presence of intransitive behaviors (cycles) in general games. Worthy of remark in this
dataset is the presence of a large number of cycles, several of which are identified in Fig. 13. Not only can we identify these
cycles visually, these intransitive behaviors are automatically taken into account in our rankings due to the fundamental role
that recurrence plays in our underlying solution concept. This is in contrast to the Elo rating (which is incapable of dealing with
intransitivities), the replicator dynamics (which are limited in terms of visualizing such intransitive behaviors for large games),
and Nash (which is a static solution concept that does not capture dynamic behavior).
3.4.4 Kuhn Poker
We next consider games wherein the inherent complexity is due to the number of players involved. Specifically, we consider
Kuhn poker with 3 and 4 players, extending beyond the reach of prior meta-game evaluation approaches that are limited to
pairwise asymmetric interactions [8]. Kuhn poker is a small poker game where each player starts with 2 chips, antes 1 chip
to play, and receives one card face down from a deck of size n + 1 (one card remains hidden). Players proceed by betting
(raise/call) by adding their remaining chip to the pot, or passing (check/fold) until all players are either in (contributed as all
other players to the pot) or out (folded, passed after a raise). The player with the highest-ranked card that has not folded wins the
pot. The two-player game is known to have a continuum of strategies, which could have fairly high support, that depends on a
single parameter: the probability that the first player raises with the highest card [66]. The three-player game has a significantly
more complex landscape [67]. The specific rules used for the three and four player variants can be found in [68, Section 4.1].
Here, our meta-game dataset consists of several (fixed) rounds of extensive-form fictitious play (specifically, XFP from [69]):
in round 0, the payoff corresponding to strategy profile (0,0,0) in each meta-game of 3-player Kuhn corresponds to the estimated
payoff of each player using uniform random strategies; in fictitious play round 1, the payoff entry (1,1,1) corresponds to each
player playing an approximate best response to the other players' uniform strategies; in fictitious play round 2, entry (2,2,2)
corresponds to each playing an approximate best response to the other players' uniform mixtures over their round 0 strategies
(uniform random) and round 1 oracle strategy (best response to random); and so on. Note, especially, that oracles at round 0 are
likely to be dominated (as they are uniform random). In our dataset, we consider two asymmetric meta-games, each involving 3
rounds of fictitious play with 3 and 4 players (Fig. 14 and Fig. 15, respectively).
Of particular note are the total number of strategy profiles involved in these meta-games, 64 and 256 respectively for the 3
and 4 player games -- the highest considered in any of our datasets. Conducting the evaluation using the replicator-dynamics
based analysis of [8] can be quite tedious as all possible 2-face simplices must be considered for each player. Instead, here the
α-Rankings follow the same methodology used for all other domains, and are summarized succinctly in Figs. 14c and 15c.
In both meta-games, the 3-round fictitious play strategies ((3,3,3) and (3,3,3,3), respectively) are ranked amongst the top-5
strategies.
3.4.5 Leduc Poker
The meta-game we consider next involves agents generated using the Policy Space Response Oracles (PSRO) algorithm [29].
Specifically, PSRO can be viewed as a generalization of fictitious play, which computes approximate responses ("oracles")
using deep reinforcement learning, along with arbitrary meta-strategy solvers; here, PSRO is applied to the game of Leduc
poker. Leduc poker involves a deck of 6 cards (jack, queen, and king in two suits). Players have a limitless number of chips.
Each player antes 1 chip to play and receives an initial private card; in the first round players can bet a fixed amount of 2 chips,
in the second round can bet 4 chips, with a maximum of two raises in each round. Before the second round starts, a public card
is revealed. The corresponding meta-game involves 2 players with 3 strategies each, which correspond to the first three epochs
of the PSRO algorithm. Leduc poker is a commonly used benchmark in the computer poker literature [70]: our implementation
contains 936 information states (approximately 50 times larger then 2-player Kuhn poker), and is non-zero sum due to penalties
imposed by selecting of illegal moves, see [29, Appendix D.1] for details.
20/45
We consider in Fig. 16a the Markov chain corresponding to the PSRO dataset, with the corresponding α-Rank yielding
profile (0,0) as the top-ranked strategy, which receives 1.0 of the stationary distribution mass and essentially consumes the
entire strategy space in the long-term of the evolutionary dynamics. This corresponds well to the result of [8], which also
concluded that this strategy profile consumes the entire strategy space under the replicator dynamics; in their approach, however,
an equilibrium selection problem had to be dealt with using human-in-the-loop intervention due to the population-wise dynamics
decomposition their approach relies on. Here, we need no such intervention as α-Rank directly yields the overall ranking of all
strategy profiles.
4 Discussion
We introduced a general descriptive multi-agent evaluation method, called α-Rank, which is practical and general in the sense
that it is easily applicable in complex game-theoretic settings, including K-player asymmetric games that existing meta-game
evaluation methods such as [8, 9] cannot feasibly be applied to. The techniques underlying α-Rank were motivated due to
the fundamental incompatibility identified between the dynamical processes typically used to model interactions of agents
in meta-games, and the Nash solution concept typically used to draw conclusions about these interactions. Using the Nash
equilibrium as a solution concept for meta-game evaluation in these dynamical models is in many ways problematic: computing
a Nash equilibrium is not only computationally difficult [21, 22], and there are also intractable equilibrium selection issues
even if Nash equilibria can be computed [23 -- 25]. α-Rank, instead, is theoretically-grounded in a novel solution concept called
Markov-Conley chains (MCCs), which are inherently dynamical in nature. A key feature of α-Rank is that it relies on only a
single hyperparameter, its ranking-intensity value α, with sufficiently high values of α (as determined via a parameter sweep)
yielding closest correspondence to MCCs.
The combination of MCCs and α-Rank yields a principled methodology with a strong evolutionary interpretation of
agent rankings, as outlined in Fig. 17; this overarching perspective considers a spectrum of evolutionary models of increasing
complexity. On one end of the spectrum, the continuous-time dynamics micro-model provides detailed insights into the simplex,
illustrating flows, attractors, and equilibria of agent interactions. On the other end, the discrete-time dynamics macro-model
provides high-level insights of the time limit behavior of the system as modeled by a Markov chain over interacting agents. The
unifying link between these models is the MCC solution concept, which builds on the dynamical theory foundations of Conley
[28] and the topological concept of chain components. We provided both scalability properties and theoretical guarantees for
our ranking method. Finally, we evaluated the approach on an extensive range of meta-game domains including AlphaGo [1],
AlphaZero [3], MuJoCo Soccer [5], and Poker [29], which exhibit a range of complexities in terms of payoff asymmetries,
number of players, and number of agents involved. We strongly believe that the generality of α-Rank will enable it to play an
important role in evaluation of AI agents, e.g., on leaderboards. More critically, we believe that the computational feasibility of
the approach, even when many agents are involved (e.g., AlphaZero), makes its integration into the agent training pipeline a
natural avenue for future work.
References
1. Silver, D. et al. Mastering the game of Go with deep neural networks and tree search. Nat. 529, 484 -- 489 (2016).
2. Silver, D. et al. Mastering the game of Go without human knowledge. Nat. 550, 354 -- 359 (2017).
3. Silver, D. et al. A general reinforcement learning algorithm that masters chess, shogi, and go through self-play. Sci. 362,
1140 -- 1144 (2018).
4. Moravc´ık, M. et al. DeepStack: Expert-level artificial intelligence in heads-up no-limit poker. Sci. 356, 508 -- 513 (2017).
5. Liu, S. et al. Emergent coordination through competition. In International Conference on Learning Representations
(2019). URL https://openreview.net/forum?id=BkG8sjR5Km.
6. Walsh, W. E., Das, R., Tesauro, G. & Kephart, J. Analyzing complex strategic interactions in multi-agent games. In
AAAI-02 Workshop on Game Theoretic and Decision Theoretic Agents, 2002. (2002).
7. Wellman, M. P. Methods for empirical game-theoretic analysis. In Proceedings, The Twenty-First National Conference
on Artificial Intelligence and the Eighteenth Innovative Applications of Artificial Intelligence Conference, July 16-20,
2006, Boston, Massachusetts, USA, 1552 -- 1556 (2006).
8. Tuyls, K., Perolat, J., Lanctot, M., Leibo, J. Z. & Graepel, T. A Generalised Method for Empirical Game Theoretic
Analysis. In AAMAS, Stockholm, Sweden (2018).
21/45
9. Tuyls, K. et al. Symmetric decomposition of asymmetric games. Sci. Reports 8, 1015 (2018).
10. Tuyls, K. & Parsons, S. What evolutionary game theory tells us about multiagent learning. Artif. Intell. 171, 406 -- 416
(2007).
11. Zeeman, E. Population dynamics from game theory. Lect. Notes Math. Glob. theory dynamical systems 819 (1980).
12. Zeeman, E. Dynamics of the evolution of animal conflicts. Theor. Biol. 89, 249 -- 270 (1981).
13. Weibull, J. Evolutionary game theory. MIT press (1997).
14. Hofbauer, J. Evolutionary dynamics for bimatrix games: A Hamiltonian system? J. Math. Biol. 34, 675 -- 688 (1996).
15. Gintis, H. Game theory evolving (2nd edition). Univ. Press. Princet. NJ (2009).
16. Traulsen, A., Claussen, J. C. & Hauert, C. Coevolutionary dynamics: from finite to infinite populations. Phys. review
letters 95, 238701 (2005).
17. Traulsen, A., Nowak, M. A. & Pacheco, J. M. Stochastic dynamics of invasion and fixation. Phys. Rev. E 74, 011909
(2006).
18. Santos, F. C., Pacheco, J. M. & Skyrms, B. Co-evolution of pre-play signaling and cooperation. J. Theor. Biol. 274,
30 -- 35 (2011).
19. Segbroeck, S. V., Pacheco, J. M., Lenaerts, T. & Santos, F. C. Emergence of fairness in repeated group interactions. Phys.
Rev. Lett. 108, 158104 (2012).
20. Veller, C. & Hayward, L. K. Finite-population evolution with rare mutations in asymmetric games. J. Econ. Theory 162,
93 -- 113 (2016).
21. von Stengel, B. Computing equilibria for two-person games. In Handbook of Game Theory with Economic Applications,
vol. 3, 1723 -- 1759 (Elsevier, 2002).
22. Daskalakis, C., Goldberg, P. W. & Papadimitriou, C. H. The complexity of computing a Nash equilibrium. In Proceedings
of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, 71 -- 78 (ACM Press,
2006).
23. Harsanyi, J. & Selten, R. A General Theory of Equilibrium Selection in Games, vol. 1 (The MIT Press, 1988), 1 edn.
24. Avis, D., Rosenberg, G., Savani, R. & von Stengel, B. Enumeration of nash equilibria for two-player games. Econ.
Theory 42, 9 -- 37 (2010).
25. Goldberg, P. W., Papadimitriou, C. H. & Savani, R. The complexity of the homotopy method, equilibrium selection, and
Lemke-Howson solutions. ACM Transactions on Econ. Comput. 1, 9 (2013).
26. Papadimitriou, C. & Piliouras, G. From Nash equilibria to chain recurrent sets: Solution concepts and topology. In
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, ITCS '16, 227 -- 235 (ACM,
New York, NY, USA, 2016).
27. Kakutani, S. A generalization of Brouwer's fixed point theorem. Duke Math. J. 8, 457 -- 459 (1941).
28. Conley, C. C. Isolated invariant sets and the Morse index. 38 (American Mathematical Soc., 1978).
29. Lanctot, M. et al. A unified game-theoretic approach to multiagent reinforcement learning. In Advances in Neural
Information Processing Systems 30, 4190 -- 4203 (2017).
30. J. Hofbauer, J. & Sigmund, K. Evolutionary games and population dynamics. Camb. Univ. Press. (1998).
31. Cressman, R. Evolutionary Dynamics and Extensive Form Games (The MIT Press, 2003).
32. Taylor, P. & Jonker, L. Evolutionarily stable strategies and game dynamics. Math. Biosci. 40, 145 -- 156 (1978).
33. Schuster, P. & Sigmund, K. Replicator dynamics. J. Theor. Biol. 100, 533 -- 538 (1983). URL http://www.
sciencedirect.com/science/article/pii/0022519383904459. DOI http://dx.doi.org/10.1016/0022-
5193(83)90445-9.
22/45
34. Bloembergen, D., Tuyls, K., Hennes, D. & Kaisers, M. Evolutionary dynamics of multi-agent learning: A survey. J. Artif.
Intell. Res. (JAIR) 53, 659 -- 697 (2015).
35. Fudenberg, D. & Imhof, L. A. Imitation processes with small mutations. J. Econ. Theory 131, 251 -- 262 (2006).
36. Nowak, M. A. & Sigmund, K. Evolutionary dynamics of biological games. Sci. 303, 793 -- 799 (2004).
37. Traulsen, A., Pacheco, J. M. & Imhof, L. A. Stochasticity and evolutionary stability. Phys. Rev. E 74, 021905 (2006).
38. Claussen, J. C. Discrete stochastic processes, replicator and Fokker-Planck equations of coevolutionary dynamics in finite
and infinite populations. arXiv preprint arXiv:0803.2443 (2008).
39. Taylor, H. M. & Karlin, S. An Introduction To Stochastic Modeling (Academic Press, 1998), third edition edn.
40. Daskalakis, C., Frongillo, R., Papadimitriou, C. H., Pierrakos, G. & Valiant, G. On learning algorithms for Nash equilibria.
In International Symposium on Algorithmic Game Theory, 114 -- 125 (Springer, 2010).
41. Hart, S. & Mas-Colell, A. Uncoupled dynamics do not lead to nash equilibrium. Am. Econ. Rev. 93, 1830 -- 1836 (2003).
42. Viossat, Y. The replicator dynamics does not lead to correlated equilibria. Games Econ. Behav. 59, 397 -- 407 (2007).
43. Piliouras, G. & Schulman, L. J. Learning dynamics and the co-evolution of competing sexual species. arXiv preprint
arXiv:1711.06879 (2017).
44. Sandholm, W. Population Games and Evolutionary Dynamics. Economic Learning and Social Evolution (MIT Press,
2010).
45. Gaunersdorfer, A. & Hofbauer, J. Fictitious play, shapley polygons, and the replicator equation. Games Econ. Behav. 11,
279 -- 303 (1995).
46. Daskalakis, C., Frongillo, R., Papadimitriou, C., Pierrakos, G. & Valiant, G. On learning algorithms for Nash equilibria.
Algorithmic Game Theory 114 -- 125 (2010).
47. Kleinberg, R., Ligett, K., Piliouras, G. & Tardos, ´E. Beyond the Nash equilibrium barrier. In Symposium on Innovations
in Computer Science (ICS) (2011).
48. Sandholm, W. H. Population games and evolutionary dynamics (MIT press, 2010).
49. Wagner, E. The explanatory relevance of nash equilibrium: One-dimensional chaos in boundedly rational learning. Philos.
Sci. 80, 783 -- 795 (2013).
50. Palaiopanos, G., Panageas, I. & Piliouras, G. Multiplicative weights update with constant step-size in congestion games:
Convergence, limit cycles and chaos. In NIPS (2017).
51. Sato, Y., Akiyama, E. & Farmer, J. D. Chaos in learning a simple two-person game. Proc. Natl. Acad. Sci. 99, 4748 -- 4751
(2002).
52. Alongi, J. M. & Nelson, G. S. Recurrence and Topology, vol. 85 (American Mathematical Soc., 2007).
53. Norton, D. E. The fundamental theorem of dynamical systems. Commentationes Math. Univ. Carol. 36, 585 -- 597 (1995).
54. Monderer, D. & Shapley, L. S. Potential Games. Games Econ. Behav. 14, 124 -- 143 (1996).
55. Galla, T. & Farmer, J. D. Complex dynamics in learning complicated games. Proc. Natl. Acad. Sci. 110, 1232 -- 1236
(2013).
56. Panageas, I. & Piliouras, G. Average case performance of replicator dynamics in potential games via computing regions
of attraction. In Proceedings of the 2016 ACM Conference on Economics and Computation, 703 -- 720 (ACM, 2016).
57. Bomze, I. M. Lotka-volterra equation and replicator dynamics: a two-dimensional classification. Biol. cybernetics 48,
201 -- 211 (1983).
58. Bomze, I. M. Lotka-volterra equation and replicator dynamics: new issues in classification. Biol. Cybern. 72, 447 -- 453
(1995).
23/45
59. Shoham, Y., Powers, R. & Grenager, T. If multi-agent learning is the answer, what is the question? Artif. Intell. 171,
365 -- 377 (2007).
60. Davis, T., Burch, N. & Bowling, M. Using response functions to measure strategy strength. In Proceedings of the
Twenty-Eighth AAAI Conference on Artificial Intelligence, July 27 -31, 2014, Qu´ebec City, Qu´ebec, Canada., 630 -- 636
(2014).
61. Conitzer, V. The exact computational complexity of evolutionarily stable strategies. CoRR abs/1805.02226 (2018).
62. Etessami, K. & Lochbihler, A. The computational complexity of evolutionarily stable strategies. Int. J. Game Theory
(2008).
63. Veller, C., Hayward, L. K., Hilbe, C. & Nowak, M. A. The red queen and king in finite populations. Proc. Natl. Acad. Sci.
114, E5396 -- E5405 (2017).
64. Balduzzi, D., Tuyls, K., Perolat, J. & Graepel, T. Re-evaluating Evaluation. arXiv (2018).
65. Todorov, E., Erez, T. & Tassa, Y. Mujoco: A physics engine for model-based control. In IROS (2012).
66. Southey, F., Hoehn, B. & Holte, R. C. Effective short-term opponent exploitation in simplified poker. Mach. Learn. 74,
159 -- 189 (2009).
67. Szafron, D., Gibson, R. & Sturtevant, N. A parameterized family of equilibrium profiles for three-player Kuhn poker. In
Proceedings of the Twelfth International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 247 -- 254
(2013).
68. Lanctot, M. Further developments of extensive-form replicator dynamics using the sequence-form representation. In
Proceedings of the Thirteenth International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS),
1257 -- 1264 (2014).
69. Heinrich, J., Lanctot, M. & Silver, D. Fictitious self-play in extensive-form games.
International Conference on Machine Learning (ICML 2015) (2015).
In Proceedings of the 32nd
70. Southey, F. et al. Bayes' bluff: Opponent modelling in poker.
Uncertainty in Artificial Intelligence (UAI 2005) (2005).
In Proceedings of the Twenty-First Conference on
71. Walsh, W. E., Parkes, D. C. & Das, R. Choosing samples to compute heuristic-strategy Nash equilibrium. In Proceedings
of the Fifth Workshop on Agent-Mediated Electronic Commerce (2003).
72. Vorobeychik, Y., Wellman, M. P. & Singh, S. Learning payoff functions in infinite games. Mach. Learn. 67, 145 -- 168
(2007).
73. Wah, E., Hurd, D. & Wellman, M. Strategic market choice: Frequent call markets vs. continuous double auctions for fast
and slow traders. In Proceedings of the Third EAI Conference on Auctions, Market Mechanisms, and Their Applications
(2015).
74. Brinkman, E. & Wellman, M. Shading and efficiency in limit-order markets. In Proceedings of the IJCAI-16 Workshop
on Algorithmic Game Theory (2016).
75. Wah, E., Wright, M. & Wellman, M. Welfare effects of market making in continuous double auctions. J. Artif. Intell. Res.
59, 613 -- 650 (2017).
76. Wang, X., Vorobeychik, Y. & Wellman, M. A cloaking mechanism to mitigate market manipulation. In Proceedings of
the 27th International Joint Conference on Artificial Intelligence, 541 -- 547 (2018).
77. Ponsen, M. J. V., Tuyls, K., Kaisers, M. & Ramon, J. An evolutionary game-theoretic analysis of poker strategies.
Entertain. Comput. 1, 39 -- 45 (2009).
78. Wellman, M., Kim, T. & Duong, Q. Analyzing incentives for protocol compliance in complex domains: A case study of
introduction-based routing. In Proceedings of the 12th Workshop on the Economics of Information Security (2013).
79. Hennes, D., Claes, D. & Tuyls, K. Evolutionary advantage of reciprocity in collision avoidance. In Proceedings of the
AAMAS 2013 Workshop on Autonomous Robots andMultirobot Systems (ARMS 2013) (2013).
24/45
80. Prakash, A. & Wellman, M. Empirical game-theoretic analysis for moving target defense. In Proceedings of the Second
ACM Workshop on Moving Target Defense (2015).
81. Wright, M., Venkatesan, S., Albenese, M. & Wellman, M. Moving target defense against DDoS attacks: An empirical
game-theoretic analysis. In Proceedings of the Third ACM Workshop on Moving Target Defense (2016).
82. Nguyen, T., Wright, M., Wellman, M. & Singh, S. Multi-stage attack graph security games: Heuristic strategies, with
empirical game-theoretic analysis. In Proceedings of the Fourth ACM Workshop on Moving Target Defense (2017).
83. Nowak, M. A. Evolutionary Dynamics: Exploring the Equations of Life (Harvard University Press, 2006).
84. Liu, L., Wang, S., Chen, X. & Perc, M. Evolutionary dynamics in the public goods games with switching between
punishment and exclusion. Chaos 28, 103105 (2018).
85. Szolnoki, A. & Perc, M. Evolutionary dynamics of cooperation in neutral populations. New J. Phys. 20, 013031 (2018).
86. Young, H. P. The evolution of conventions. Econom. J. Econom. Soc. 57 -- 84 (1993).
87. Basu, K. & Weibull, J. W. Strategy subsets closed under rational behavior. Econ. Lett. 36, 141 -- 146 (1991).
88. Goemans, M., Mirrokni, V. & Vetta, A. Sink equilibria and convergence. In Foundations of Computer Science, 2005.
FOCS 2005. 46th Annual IEEE Symposium on, 142 -- 151 (IEEE, 2005).
89. Candogan, O., Menache, I., Ozdaglar, A. & Parrilo, P. A. Flows and decompositions of games: Harmonic and potential
games. Math. Oper. Res. 36, 474 -- 503 (2011).
90. Japkowicz, N. & Shah, M. Evaluating learning algorithms: a classification perspective (Cambridge University Press,
2011).
91. Hern´andez-Orallo, J. Evaluation in artificial intelligence: from task-oriented to ability-oriented measurement. Artif. Intell.
Rev. 48, 397 -- 447 (2017).
92. Hern´andez-Orallo, J. The measure of all minds: evaluating natural and artificial intelligence (Cambridge University
Press, 2017).
93. Page, L., Brin, S., Motwani, R. & Winograd, T. The pagerank citation ranking: Bringing order to the web. Tech. Rep.,
Stanford InfoLab (1999).
94. Elo, A. E. The Rating of Chess players, Past and Present (Ishi Press International, 1978).
95. Hvattum, L. M. & Arntzen, H. Using ELO ratings for match result prediction in association football. Int. J. Forecast. 26,
460 -- 470 (2010). Sports Forecasting.
96. Manuela, C., Cristiano, V. & David, F. Dynamic Bradley -- Terry modelling of sports tournaments. J. Royal Stat. Soc. Ser.
C (Applied Stat. 62, 135 -- 150 (2013).
97. Aldous, D. Elo ratings and the sports model: A neglected topic in applied probability? Stat. Sci. 32, 616 -- 629 (2017).
DOI 10.1214/17-STS628.
98. Sullivan, C. & Cronin, C. Improving Elo rankings for sports experimenting on the english premier league. In Virginia
Tech CSx824/ECEx424 technical report (2016).
99. F, W. & D, M. The Betting Odds Rating System: Using soccer forecasts to forecast soccer. PLoS ONE 6, e0198668
(2018).
100. Mnih, V. et al. Human-level control through deep reinforcement learning. Nat. 518, 529 -- 533 (2015).
101. Poincar´e, H. Sur le probl`eme des trois corps et les ´equations de la dynamique. Acta Math 13 (1890).
102. Barreira, L. Poincare recurrence: old and new. In XIVth International Congress on Mathematical Physics. World
Scientific., 415 -- 422 (2006).
103. Bendixson, I. Sur les courbes d´efinies par des ´equations diff´erentielles. Acta Math. 24, 1 -- 88 (1901).
25/45
104. Teschl, G. Ordinary differential equations and dynamical systems, vol. 140 (American Mathematical Soc., 2012).
105. Meiss, J. Differential Dynamical Systems (SIAM, 2007).
106. Piliouras, G. & Shamma, J. S. Optimization despite chaos: Convex relaxations to complex limit sets via Poincar´e
recurrence. In Symposium of Discrete Algorithms (SODA) (2014).
107. Piliouras, G., Nieto-Granda, C., Christensen, H. I. & Shamma, J. S. Persistent patterns: Multi-agent learning beyond
equilibrium and utility. In AAMAS, 181 -- 188 (2014).
Acknowledgements
We are very grateful to G. Ostrovski, T. Graepel, E. Hughes, Y. Bachrach, K. Kavukcuoglu, D. Silver, T. Hubert, J. Schrittwieser,
S. Liu, G. Lever, and D. Bloembergen, for helpful comments, discussions, and for making available datasets used in this
document.
Christos Papadimitriou acknowledges NSF grant 1408635 "Algorithmic Explorations of Networks, Markets, Evolution, and
the Brain", and NSF grant 1763970 to Columbia University. Georgios Piliouras acknowledges SUTD grant SRG ESD 2015
097, MOE AcRF Tier 2 Grant 2016-T2-1-170, grant PIE-SGP-AI-2018-01 and NRF 2018 Fellowship NRF-NRFF2018-07.
26/45
(a) Discrete-time dynamics.
(b) Ranking-intensity sweep
Figure 6. Rock-Paper-Scissors game.
Agent Rank
Score
RR
PP
SS
11
11
11
0.330.33
0.330.33
0.330.33
(c) α-Rank results.
27/45
9.06ρm9.06ρm9.06ρm10-410-310-210-1100101102Ranking intensity α0.000.050.100.150.200.250.300.350.40Strategy mass in stationary distribution πRPSPlayer 1
Player 2
P
R
−0.5
R
0
P
0
0.5
S −1
0.1
(a) Payoff matrix.
S
1
−0.1
0
(b) Discrete-time dynamics.
(c) Ranking-intensity sweep.
Figure 7. Biased Rock-Paper-Scissors game.
Agent Rank
Score
RR
PP
SS
11
11
11
0.330.33
0.330.33
0.330.33
(d) α-Rank results.
28/45
50.0ρm50.0ρm50.0ρm10-410-310-210-1100101102Ranking intensity α0.00.10.20.30.40.50.60.70.8Strategy mass in stationary distribution πRPS(a) Discrete-time dynamics (see (c) for node-wise scores corresponding to stationary distribution masses).
(b) Ranking-intensity sweep.
Figure 8. Battle of the Sexes.
Agent
Rank
Score
(O,O)
(O,O)
(M,M)
(M,M)
(O,M)
(O,M)
(M,O)
(M,O)
11
11
22
22
0.50.5
0.50.5
0.00.0
0.00.0
(c) α-Rank results.
29/45
12.96ρm9.06ρm12.96ρm9.06ρms1=Os2=Os1=Os2=Ms1=Ms2=Os1=Ms2=M10-410-310-210-1Ranking-intensity α0.00.10.20.30.40.5Strategy mass in stationary distribution π(O,O)(O,M)(M,O)(M,M)(a) Discrete-time dynamics.
(b) Ranking-intensity sweep.
Figure 9. AlphaGo (Nature dataset).
Agent
Rank
Score
AG(rvp)
AG(rvp)
AG(vp)
AG(vp)
AG(rp)
AG(rp)
AG(rv)
AG(rv)
AG(r)
AG(r)
AG(v)
AG(v)
AG(p)
AG(p)
11
22
22
22
22
22
22
1.01.0
0.00.0
0.00.0
0.00.0
0.00.0
0.00.0
0.00.0
(c) α-Rank results.
30/45
50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.08ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm10-410-310-210-1100101102Ranking-intensity α0.00.20.40.60.81.0Strategy mass in stationary distribution πAG(rvp)AG(vp)AG(rp)AG(rv)AG(r)AG(v)AG(p)(a) Discrete-time dynamics.
(b) Ranking-intensity sweep.
Figure 10. AlphaZero dataset.
Agent
Rank
Score
AZ(99.4)
AZ(99.4)
AZ(93.9)
AZ(93.9)
AZ(98.7)
AZ(98.7)
AZ(94.7)
AZ(94.7)
AZ(86.4)
AZ(86.4)
AZ(88.8)
AZ(88.8)
AZ(90.3)
AZ(90.3)
AZ(93.3)
AZ(93.3)
···
11
22
33
44
55
66
77
88
···
0.390.39
0.220.22
0.190.19
0.140.14
0.050.05
0.010.01
0.00.0
0.00.0
···
(c) α-Rank results.
31/45
50.0ρm49.96ρm49.97ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm10-410-310-210-1100101102Ranking-intensity α0.00.10.20.30.40.50.6Strategy mass in stationary distribution πAZ(99.4)AZ(93.9)AZ(98.7)AZ(94.7)AZ(86.4)AZ(88.8)AZ(90.3)AZ(93.3)...(a) α-Score vs. Training Time.
(b) Maximum Entropy Nash vs. Training Time.
(c) α-Score - Maximum Entropy Nash difference.
Figure 11. AlphaZero (chess) agent evaluations throughout training.
32/45
01020304050Agent α-Rank Scores01020304050Training iteration0.00.10.20.30.40.50.60.70.80.91.001020304050Agent Maxent Nash Probabilities01020304050Training iteration0.00.10.20.30.40.50.60.70.80.91.001020304050Agent α-Rank Scores - Maxent Nash01020304050Training iteration0.240.180.120.060.000.060.120.180.24(a) Discrete-time dynamics.
(b) Ranking-intensity sweep.
Figure 12. MuJoCo soccer dataset.
Agent Rank
Score
CC
AA
BB
GG
JJ
FF
DD
EE
···
11
22
33
44
55
66
77
77
···
0.420.42
0.170.17
0.160.16
0.140.14
0.070.07
0.040.04
0.00.0
0.00.0
···
(c) α-Rank results.
33/45
50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.98ρm50.0ρm10-410-310-210-1100101102Ranking-intensity α0.00.10.20.30.40.5Strategy mass in stationary distribution πCABGJFDE...(a)
(b)
(c)
(d)
Figure 13. Example cycles in the MuJoCo soccer domain.
34/45
50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.98ρm50.0ρm1.00.50.00.51.01.00.50.00.51.050.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.98ρm50.0ρm1.00.50.00.51.01.00.50.00.51.050.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.98ρm50.0ρm1.00.50.00.51.01.00.50.00.51.050.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.98ρm50.0ρm1.00.50.00.51.01.00.50.00.51.0(a) Discrete-time dynamics.
Agent
Rank
Score
(2,3,3)
(2,3,3)
(3,3,3)
(3,3,3)
(3,2,3)
(3,2,3)
(2,2,3)
(2,2,3)
(3,1,3)
(3,1,3)
(2,1,3)
(2,1,3)
(1,2,3)
(1,2,3)
(2,3,1)
(2,3,1)
(2,3,2)
(2,3,2)
(3,1,1)
(3,1,1)
(3,3,2)
(3,3,2)
(3,3,1)
(3,3,1)
···
11
22
33
44
55
66
77
88
99
1010
1111
1212
···
0.220.22
0.140.14
0.120.12
0.090.09
0.080.08
0.050.05
0.040.04
0.020.02
0.020.02
0.020.02
0.020.02
0.020.02
···
(c) α-Rank results.
(b) Ranking-intensity sweep.
Figure 14. 3-player Kuhn poker (ranking conducted on all 64 pure strategy profiles).
35/45
50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.99ρm50.0ρm50.0ρm50.0ρms1=3s2=2s3=3s1=2s2=1s3=3s1=2s2=2s3=3s1=2s2=3s3=1s1=2s2=3s3=2s1=2s2=3s3=3s1=3s2=1s3=1s1=3s2=1s3=3s1=1s2=2s3=3s1=3s2=3s3=1s1=3s2=3s3=2s1=3s2=3s3=310-410-310-210-1100101102Ranking-intensity α0.00.10.20.30.40.50.6Strategy mass in stationary distribution π(2,3,3)(3,3,3)(3,2,3)(2,2,3)(3,1,3)(2,1,3)(1,2,3)(2,3,1)(2,3,2)(3,1,1)(3,3,2)(3,3,1)...(a) Discrete-time dynamics.
Agent
Rank
Score
(3,3,3,2)
(3,3,3,2)
(2,3,3,1)
(2,3,3,1)
(2,3,3,2)
(2,3,3,2)
(3,3,3,1)
(3,3,3,1)
(3,3,3,3)
(3,3,3,3)
(3,2,3,3)
(3,2,3,3)
(2,3,2,1)
(2,3,2,1)
(2,3,2,2)
(2,3,2,2)
(2,2,3,1)
(2,2,3,1)
(2,2,3,3)
(2,2,3,3)
(2,2,2,1)
(2,2,2,1)
(2,2,2,2)
(2,2,2,2)
···
11
22
33
44
55
66
77
88
99
1010
1111
1212
···
0.080.08
0.070.07
0.070.07
0.060.06
0.060.06
0.050.05
0.040.04
0.040.04
0.040.04
0.030.03
0.030.03
0.030.03
···
(c) α-Rank results.
(b) Ranking-intensity sweep.
Figure 15. 4-player Kuhn poker (ranking conducted on all 256 pure strategy profiles).
36/45
50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm49.95ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm43.23ρm50.0ρm50.0ρms1=2s2=2s3=2s4=1s1=2s2=2s3=2s4=2s1=2s2=2s3=3s4=1s1=2s2=2s3=3s4=3s1=3s2=3s3=3s4=1s1=3s2=3s3=3s4=2s1=2s2=3s3=2s4=1s1=2s2=3s3=2s4=2s1=3s2=2s3=3s4=3s1=2s2=3s3=3s4=1s1=2s2=3s3=3s4=2s1=3s2=3s3=3s4=310-410-310-210-1100101102Ranking-intensity α0.000.050.100.150.20Strategy mass in stationary distribution π(3,3,3,2)(2,3,3,1)(2,3,3,2)(3,3,3,1)(3,3,3,3)(3,2,3,3)(2,3,2,1)(2,3,2,2)(2,2,3,1)(2,2,3,3)(2,2,2,1)(2,2,2,2)...(a) Discrete-time dynamics (top 8 agents shown only).
Agent Rank
Score
(0,0)
(0,0)
(0,1)
(0,1)
(0,2)
(0,2)
(1,0)
(1,0)
(1,1)
(1,1)
(1,2)
(1,2)
(2,0)
(2,0)
(2,1)
(2,1)
(2,2)
(2,2)
11
22
22
22
22
22
22
22
22
1.01.0
0.00.0
0.00.0
0.00.0
0.00.0
0.00.0
0.00.0
0.00.0
0.00.0
(c) α-Rank strategy rankings and scores (top
8 agents shown only).
37/45
(b) Ranking-intensity sweep.
Figure 16. PSRO poker dataset.
50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρm50.0ρms1=0s2=0s1=0s2=1s1=0s2=2s1=1s2=0s1=1s2=1s1=1s2=2s1=2s2=0s1=2s2=1s1=2s2=210-410-310-210-1100101102Ranking-intensity α0.00.20.40.60.81.0Strategy mass in stationary distribution π(0,0)(0,1)(0,2)(1,0)(1,1)(1,2)(2,0)(2,1)(2,2)Figure 17. A retrospective look on the paper contributions. We introduced a general descriptive multi-agent evaluation
method, called α-Rank, which is practical in the sense that it is easily applicable in complex game-theoretic settings, and
theoretically-grounded in a solution concept called Markov-Conley chains (MCCs). α-Rank has a strong theoretical and
specifically evolutionary interpretation; the overarching perspective considers a chain of models of increasing complexity, with
a discrete-time macro-dynamics model on one end, continuous-time micro-dynamics on the other end, and MCCs as the link in
between. We provided both scalability properties and theoretical guarantees for the overall ranking methodology.
38/45
𝛼-Rank: Multi-agent Evaluation by EvolutionInfinite population modelPerturbed model[Sec. 2.4 & 3] Unifying ranking model: Markov Conley Chains & 𝛼-RankFoundations:●Conley's Fundamental Theorem●Chain recurrent sets and componentsAdvantages:●Captures dynamic behavior●More tractable to compute than Nash●Filters out transient agents●Involves only a single hyperparameter, 𝛼 Ranking-intensity parameter 𝛼AgentRanking𝛼-Rank[Sec. 2.1.3] Micro-model: Continuous-time Dynamics Analytical toolkit:●Flow diagrams sub-graph●Attractors, equilibriaApplicability:●3 to 4 agents max●Symmetric games and 2-population asymmetric games●Existence and uniqueness of ranking [Theorem 2.1.2]●AlphaRank correspondence to Markov Conley Chain solution concept [Theorem 2.5.1]●Practical applicability of ranking to large-scale interactions [Properties 3.3.1, 3.3.2]AlphaRank GuaranteesAnalytical toolkit:●Markov chain●Stationary distribution●Fixation probabilitiesApplicability:●K-wise interactions●Symmetric/asymmetric games[Sec. 2.1.4] Macro-model: Discrete-time Dynamics ●Correspondence of Markov Conley Chains & continuous dynamics [Theorem 2.4.24]●Correspondence of Markov Conley Chains & discrete dynamics [Theorem 2.5.1] ●Correspondence of discrete & continuous dynamics [Theorem 2.1.4]Unifying Model GuaranteesAnalyticalFormulationScalablePractical Formulation5 Supplementary Material
5.1 Most Closely Related Work
We describe related work revolving around Empirical Game Theory analysis (EGTA), discrete-time dynamics models and
multi-agent interactions in evolution of cooperation research, and precursors to our new solution concept of MCC.
The purpose of the first applications of EGTA was to reduce the complexity of large economic problems in electronic
commerce, such as continuous double auctions, supply chain management, market games, and automated trading [6, 7, 71, 72].
While these complex economic problems continue to be a primary application area of these methods [73 -- 76], the general
techniques have been applied in many different settings. These include analysis of interactions among heuristic meta-strategies
in poker [77], network protocol compliance [78], collision avoidance in robotics [79], and security games [80 -- 82].
Evolutionary dynamics have often been presented as a practical tool for analyzing interactions among meta-strategies
found in EGTA [6, 34, 79], and for studying the change in policies of multiple learning agents [34], as the EGTA approach is
largely based on the same assumptions as evolutionary game-theory, viz. repeated interactions among sub-groups sampled
independently at random from an arbitrarily-large population of agents.
From the theoretical biology perspective, researchers have additionally deployed discrete-time evolutionary dynamics
models [83]. These models typically provide insights in the macro-dynamics of the overall behavior of agents in strategy space,
corresponding to flow rates at the edges of a manifold [17 -- 19, 36, 37]. These studies usually focus on biological games, the
evolution of cooperation and fairness in social dilemma's like the iterated prisoner's dilemma or signalling games, deploying,
amongst others, imitation dynamics with low mutation rates [20, 35]. Similar efforts investigating evolutionary dynamics
inspired by statistical physics models have been taken as well [84, 85].
In the framework of the evolution of conventions [86], a repeated game is played by one-time players who learn from
past plays and are subject to noise and mistakes. Essentially algorithmic, and in the same line of thought as our formalism, it
solves the equilibrium selection problem of weakly acyclic games (in our terminology explained in Section 2.4.3: games whose
sink strongly connected components happen to be singletons), and in this special case it aligns very well with our proposed
solution concept. Another equilibrium selection concept related to MCC is the concept of closed under rational behavior
(CURB) set of strategies [87]. The notion of a sink equilibrium, defined by [88] for the purpose of exploring new variants of
the price of anarchy, is also similar to our MCC -- despite differences in mathematical detail, style, and use. A method for
decomposing games was introduced in [89], based on properties of game dynamics on the graph of pure strategy profiles by
exploiting conceptually similarities to the structure of continuous vector fields. Researchers have also carried out studies of
evaluation metrics in the fields of computer science, machine learning, and artificial intelligence [90 -- 92]. PageRank [93], an
algorithm used for ranking webpages, uses a Markov chain where states are webpages and transitions capture links between
these pages; though the Markov chain foundations are related to those used in our work, they are not rooted in an evolutionary
dynamical system nor in a game-theoretic solution concept, and as such are quite different to the method presented here which
also generalizes across several dimensions. The Elo rating system has ubiquitously been used for ranking and predicting
outcomes in board games [94], sports [95 -- 99], and artificial intelligence [3, 100]. This rating system, however, comes with two
key limitations [64]: first, it has no predictive power in games with intransitive (cyclic) relations in the set of evaluated agents
(e.g., in Rock-Paper-Scissors); second, the rating of a given agent can be artificially inflated by including duplicate copies of
weaker agents in the set.
5.2 Background in Dynamical Systems
Definition 5.2.1 (Flow). A flow on a topological space X is a continuous mapping φ : R× X → X such that
(i) φ(t,·): X → X is a homeomorphism for each t ∈ R.
(ii) φ (0,x) = x for all x ∈ X.
(iii) φ (s +t,x) = φ (s,φ (t,x)) for all s,t ∈ R and all x ∈ X.
The second property is known as the group property of the flows. The topological space X is called the phase (or state)
space of the flow.
Definition 5.2.2. Let X be a set. A map (or discrete dynamical system) is a function f : X → X.
Typically, we write φ t (x) for φ (t,x) and denote a flow φ : R× X → X by φ t : X → X, where the group property appears as
φ t+s(x) = φ s(φ t (x)) for all x ∈ X and s,t ∈ R. Sometimes, depending on context, we use the notation φ t to also signify the
map φ (t,·) for a fixed real number t. The map φ 1 is useful to relate the behavior of a flow to the behavior of a map.
Definition 5.2.3. If φ (t,·) is a flow on a topological space X, then the function φ 1 defines the time-one map of φ.
Since our state space is compact and the replicator vector field is Lipschitz-continuous, we can present the unique solution
of our ordinary differential equation by a flow φ : R× S → S . Fixing starting point x ∈ S defines a function of time which
39/45
captures the trajectory (orbit, solution path) of the system with the given starting point. This corresponds to the graph of
φ (·,x) : R → S , i.e., the set {(t,y) : y = φ (t,x) for some t ∈ R}.
If the starting point x does not correspond to an equilibrium then we wish to capture the asymptotic behavior of the system
(informally the limit of φ (t,x) when t goes to infinity). Typically, however, such functions do not exhibit a unique limit point
so instead we study the set of limits of all possible convergent subsequences. Formally, given a dynamical system (R, S ,φ )
with flow φ : S × R → S and a starting point x ∈ S , we call point y ∈ S an ω-limit point of the orbit through x if there
exists a sequence (tn)n∈N ∈ R such that limn→∞ tn = ∞, limn→∞ φ (tn,x) = y. Alternatively the ω-limit set can be defined as:
ωΦ(x) = ∩t∪τ≥tφ (τ,x).
We denote the boundary of a set S as bd(S) and the interior of S as int(S). In the case of the replicator dynamics where
the state space S corresponds to a product of agent (mixed) strategies we will denote by φi(x,t) the projection of the state
on the simplex of mixed strategies of agent i. In our replicator system we embed our state space with the standard topology
and the Euclidean distance metric. Since our state space is compact, we can present the solution of our system as a map
Φ : S × R → S called flow of the system. Fixing starting point x ∈ S defines function of time which captures the solution
path (orbit, trajectory) of the system with the given starting point. On the other hand, by fixing time t, we obtain a smooth
map of the state space to itself Φt : S → S . The resulting family of mappings exhibits the standard group properties such as
identity (Φ0) and existence of inverse (Φ−t ), and closure under composition Φt1 ◦ Φt2 = Φt1+t2.
Finally, the boundary of a subset S is the set of points in the closure of S, not belonging to the interior of S. An element of
the boundary of S is called a boundary point of S. We denote the boundary of a set S as bd(S) and the interior of S as int(S).
Liouville's Formula
Liouville's formula can be applied to any system of autonomous differential equations with a continuously differentiable vector
field ξ on an open domain of S ⊂ Rk. The divergence of ξ at x ∈ S is defined as the trace of the corresponding Jacobian at
x, i.e., div[ξ (x)] = ∑k
(x). Since divergence is a continuous function we can compute its integral over measurable sets
A ⊂ S . Given any such set A, let A(t) = {Φ(x0,t) : x0 ∈ A} be the image of A under map Φ at time t. A(t) is measurable and
A(t) dx. Liouville's formula states that the time derivative of the volume A(t) exists and is equal to the
is volume is vol[A(t)] =(cid:82)
∂ξi
∂ xi
i=1
integral of the divergence over A(t): d
A(t) div[ξ (x)]dx.
A vector field is called divergence free if its divergence is zero everywhere. Liouville's formula trivially implies that volume
dt [A(t)] =(cid:82)
is preserved in such flows.
Volume preservation is a useful property that allows us to argue about recurrent (i.e., cycle-like) behavior of the dynamics.
Poincar´e's recurrence theorem
Poincar´e [101] proved that in certain systems almost all trajectories return arbitrarily close to their initial position infinitely
often.
Theorem 5.2.4. [101, 102] If a flow preserves volume and has only bounded orbits then for each open set there exist orbits that
intersect the set infinitely often.
5.2.1 Poincar´e-Bendixson theorem
A periodic orbit is called a limit cycle if it is the ω-limit set of some point not on the periodic orbit. The Poincar´e-Bendixson
theorem allows us to prove the existence of limit cycles in two dimensional systems. The main idea is to find a trapping region,
i.e., a region from which trajectories cannot escape. If a trajectory enters and does not leave such a closed and bounded region
of the state space that contains no equilibria then this trajectory must approach a periodic orbit as time goes to infinity. Formally,
we have:
Theorem 5.2.5. [103, 104] Given a differentiable real dynamical system defined on an open subset of the plane, then every
non-empty compact ω-limit set of an orbit, which contains only finitely many fixed points, is either a fixed point, a periodic
orbit, or a connected set composed of a finite number of fixed points together with homoclinic and heteroclinic orbits connecting
these.
Homeomorphisms and conjugacy of flows
A function f between two topological spaces is called a homeomorphism if it has the following properties: f is a bijection, f is
continuous, and f has a continuous inverse. A function f between two topological spaces is called a diffeomorphism if it has
the following properties: f is a bijection, f is continuously differentiable, and f has a continuously differentiable inverse. Two
flows Φt : A → A and Ψt : B → B are conjugate if there exists a homeomorphism g : A → B such that for each x ∈ A and t ∈ R:
g(Φt (x)) = Ψt (g(x)). Furthermore, two flows Φt : A → A and Ψt : B → B are diffeomorhpic if there exists a diffeomorphism
g : A → B such that for each x ∈ A and t ∈ R g(Φt (x)) = Ψt (g(x)). If two flows are diffeomorphic then their vector fields are
related by the derivative of the conjugacy. That is, we get precisely the same result that we would have obtained if we simply
transformed the coordinates in their differential equations [105].
40/45
Stability of sets of states
Let A ⊂ X be a closed set. We define a set O ⊂ X a neighborhood of A if it is open relative to X and contains A. We say that A
is (Lyapunov) stable if for every neighborhood O of A there exists a neighborhood O(cid:48) of A such that every trajectory that starts
in O(cid:48) is contained in O, i.e., of x(0) ∈ O(cid:48) then x(t) ∈ O for all t ≥ 0. Set A is attracting if there exists a neighborhood S of A
such that every trajectory starting in S converges to A. A set is called asymptotically stable if it is both Lyapunov stable and
attracting.
Definition 5.2.6 (Sink chain recurrent points). Chain recurrent points that belong to a sink chain component are called sink
chain recurrent points.
Definition 5.2.7 (Lyapunov stable set). Let φ be a flow on a metric space (X,d). A set A ⊂ X is Lyapunov stable if for every
neighborhood O of A there exists a neighborhood O(cid:48) of A such that every trajectory that starts in O(cid:48) is contained in O; i.e., if
x ∈ O(cid:48) then φ (t,x) ∈ O for all t ≥ 0.
Definition 5.2.8 (Attracting set). Set A is attracting if there exists a neighborhood S of A such that every trajectory starting in S
converges to A.
Definition 5.2.9 (Asymptotically stable set). A set is called asymptotically stable if it is both Lyapunov stable and attracting.
5.2.2 Multi-population Replicator Dynamics
For a K-player NFG, one may use a set of K populations with Sk denoting the finite set of pure strategies available to each
agent in population k ∈ {1, . . . ,K}. The mass of players in a given population k that use strategy i ∈ Sk is denoted xk
i , where
∑i∈Sk xk
i = 1. Let S denote the set of all populations' pure strategy profiles, and x represent the joint population state. Let the
payoff matrix for a given population k be denoted Mk : S → R. The fitness of an agent in population k playing pure strategy i
given state x is then,
i (x) = ∑
f k
s−k∈S−k
Mk(i,s−k)∏
c(cid:54)=k
xc
sc.
(15)
Namely, the fitness is the expected payoff the agent playing strategy i receives given every competitor population's state xc. The
k-th population's average fitness given state x is then,
¯f k(x) = ∑
i
i (x)xk
f k
i ,
with the corresponding K-population replicator dynamics,
∀k ∈ {1, . . . ,K} ∀i ∈ sk.
i (x)− ¯f k(x))
xk
i = xk
i ( f k
(16)
(17)
5.3 Single-population discrete-time model
We have a set of strategies (or agents under evaluation) S = {s1, ..,sn}, with S = n, which we would like to evaluate for their
evolutionary strength. We also have a population of individuals A = {a1, ..,am}, with A = m, that are programmed to play a
strategy from the set S. Individuals interact pairwise through empirical games.
We start from a finite well-mixed population of m individuals, in which p individuals are playing τ. At each timestep t we
randomly choose two individuals τ and σ, with respective strategies sτ and sσ . The strategy of individual τ is then updated by
either probabilistically copying the strategy sσ of individual σ it is interacting with, mutating with a very small probability into
another strategy, or sticking with its own strategy sτ. The idea is that strong individuals will replicate and spread throughout the
population. The probability with which individual τ (playing sτ) will copy strategy sσ from individual σ can be described by a
selection function P(τ → σ ), which governs the dynamics of the finite-population model.
Individual τ will thus copy the behavior of individual σ with probability pτ→σ and stick to its own strategy with probability
1− P(τ → σ ). We denote the probability for a strategy to mutate randomly into another strategy s ∈ S by µ and we will
assume it to be infinitesimally small, (i.e., we consider a small-mutation limit µ → 0). If we neglected mutations, the end state
of this evolutionary process would be monomorphic. If we introduce a very small mutation rate this means that either the
mutant fixates and takes over the current population, or the current population is capable of wiping out the mutant strategy [35].
Therefore, given a small mutation rate, the mutant either fixates or disappears before a new mutant appears. This means that the
population will never contain more than two strategies at any point in time.
We now proceed as follows. At any moment in time when two strategies (sτ and ss) are present in the population, we can
calculate the fitness of an individual τ playing strategy sτ in a population of p individuals playing sτ and m− p individuals
playing ss. Fitnesses may be calculated using either knowledge of the global population state (i.e., where every individual is
aware of the number of other individuals playing each strategy, which may be a strong assumption) or local knowledge (i.e., only
41/45
the current opponent's strategy) [16]. The corresponding fitness for the local case, which we focus on here, is f (τ,σ ) = Mτ,σ ,
where Mτ,σ is obtained from the meta-game payoff matrix. Analogously, the simultaneous payoff of an individual σ playing sσ
against sτ is f (σ ,τ) = Mσ ,τ, For the remainder of the paper, we focus on the logistic selection function (aka Fermi distribution),
P(τ → σ ) =
eα f (σ ,τ)
eα f (τ,σ ) + eα f (σ ,τ)
= (1 + eα( f (τ,σ )− f (σ ,τ)))−1,
(18)
with α determining the selection intensity. While the subsequent empirical methodology extends to general selection functions,
the choice of Fermi selection function enables closed-form characterization of certain properties of the discrete-time model.
Based on this setup, we define a Markov chain over the set of strategies S with n states. Each state represents a monomorphic
population end-state, corresponding to one of the strategies sτ with τ ∈ {1, ..,n}. The transitions between these states are
defined by the corresponding fixation probabilities when a mutant strategy is introduced in a monomorphic population. The
stationary distribution over this Markov chain will tell us how much time on average the dynamics will spend in each of the
monomorphic states.
Considering our set S of n strategies, we define the Markov chain with n2 transition probabilities over the monomorphic
states. Let η = 1
n−1 and denote by ρσ ,τ the probability of mutant strategy sτ fixating (taking over) in a resident population of
individuals playing sσ . So ηρσ ,τ is the probability that a population which finds itself in state sσ will end up in state sτ after
the occurrence of a single mutation. This yields the following Markov transition matrix,
ηρ1,2
1− η(ρ2,1 + ρ2,3 + ... + ρ2,n)
...
...
...
... 1− η(ρn,1 + ρn,2 + ... + ρn,n−1)
ηρ1,n
ηρ2,n
...
(19)
C =
ηρ2,1
...
ηρn,1
1− η(ρ1,2 + ρ1,3 + ... + ρ1,n)
(cid:16)
1 + e±α( f (τ,σ )− f (σ ,τ))(cid:17)−1
...
...
p(m− p)
m(m− 1)
T (∓1)(p,τ,σ ) =
(cid:32)
(cid:32)
ρσ ,τ =
1 +
T (−1)(p,τ,σ )
T (+1)(p,τ,σ )
l
∏
p=1
=
1 +
e−α( f (τ,σ )− f (σ ,τ))
m−1
∑
l=1
m−1
∑
l=1
l
∏
p=1
(cid:33)−1
(cid:33)−1
The fixation probabilities ρσ ,τ can be calculated as follows. Assume we have a population of p individuals playing sτ and
m− p individuals playing sσ . The probability that the number of type sτ individuals decreases/increases by one is given by,
Now we can compute the fixation probability ρσ ,τ of a mutant with strategy sτ in a population of m− 1 individuals programmed
to playing sσ as follows,
.
(20)
(21)
(22)
This corresponds to the computation of an m-step transition in the Markov chain [39].The quotient T (−1)(p,τ,σ )
expresses the
T (+1)(p,τ,σ )
likelihood (odds) that the mutation process continues in either direction: if it is close to zero then it is very likely that the
number of mutants sτ increases; if it is very large it is very likely that the number of mutants will decrease; and if it close to one
then the probabilities of increase and decrease of the number of mutants are equally likely.
Property 5.3.1. Given finite payoffs, fixation probabilities ρσ ,τ under the Fermi imitative protocol (18) are positive for all σ
and τ; i.e., any single mutation can cause a transition from any state to another. Markov chain C is, therefore, irreducible, and a
unique stationary distribution π (where πTC = πT and ∑i πi = 1) exists.
This unique π provides the evolutionary ranking, or strength of each strategy in the set S, expressed as the time the population
spends in each state in distribution π. This single population model has been widely studied (see, e.g., [17 -- 19, 36, 37]), both
theoretically and empirically, but is limited to both pairwise interactions and symmetric games.
5.4 Proofs
5.4.1 Proof of Theorem 2.1.2
Theorem 2.1.2. Given finite payoffs, the Markov chain with transition matrix C is irreducible (i.e., it is possible to get to any
state starting from any state). Thus a unique stationary distribution π (where πTC = πT and ∑i πi = 1) exists.
42/45
Proof. Consider any two states (i.e., strategy profiles) si and s j of the K-population Markov chain with transition matrix (10).
Under finite payoffs f k(τ, p) and f k(σ , p), fixation probabilities ρk
σ ,τ under the Fermi imitative protocol (18) are positive.
Let R(s,k,sx) denote the operation of replacing the k-th strategy in a strategy profile s with a different pure strategy sx.
Thus, state s j is accessible from any state si (namely, consider the chain {s0 = si,s1 = R(s0,1,s1
j ) . . . ,sK−1 =
R(sK−2,K − 1,sK−1
j ) = s j} connecting strategies si to s j with non-zero probability). The Markov chain is,
therefore, irreducible and a unique stationary distribution exists.
),sK = R(sK−1,K,sK
j ),s2 = R(s1,2,s2
j
5.4.2 Proof for Theorem 2.1.4
Theorem 2.1.4 (Discrete-Continuous Edge Dynamics Correspondence). In the large-population limit, the macro-dynamics
model is equivalent to the micro-dynamics model over the edges of the strategy simplex. Specifically, the limiting model is a
variant of the replicator dynamics with the caveat that the Fermi revision function takes the place of the usual fitness terms.
Proof. To simplify notation, we prove the theorem for the single-population case without loss of generality. Let xi(t) represent
the fraction of individuals in the population that are playing strategy si at timestep t. Rather than consider the underlying
stochastic evolutionary equations directly, we consider the mean dynamics. An alternative proof path for the single population
case is presented in [16] and may be applied here as well. The mean dynamics constitute a deterministic process governing the
expected evolution of state xi(t), and provide a close approximation of the underlying system over finite time spans under a
large-population limit [44, Chapters 4 and 10]. For a general finite population game, the mean dynamics correspond to the
difference of the expected influx and outflux of individuals playing a strategy i against individuals playing any strategy j ∈ S
given the underlying selection function P(i → j)(x),
xi(t) = ∑
j∈S
x jxiP( j → i)(x)− xi ∑
j∈S
x jP(i → j)(x).
(23)
Under the low-mutation rate assumption, the finite population model considers only the transitions between pairs of monomor-
phic states sτ and sσ , where xτ + xσ = 1. This yields simplified mean dynamics,
xτ = xσ xτ P(σ → τ)− xτxσ P(τ → σ )(xτ )
= (1− xτ )xτ [P(σ → τ)− P(τ → σ )]
= xτ [P(σ → τ)− (xτ P(σ → τ) + (1− xτ )P(τ → σ ))]
= xτ [P(σ → τ)− ¯p]
where,
P(τ → σ ) = (1 + eα( f (τ,σ )− f (σ ,τ)))−1
P(σ → τ) = (1 + e−α( f (τ,σ )− f (σ ,τ)))−1
¯p = xτ P(σ → τ) + (1− xτ )P(τ → σ )
(24)
(25)
(26)
(27)
(28)
(29)
(30)
We, therefore, observe that the discrete large-population mean dynamics (27) correspond to the replicator equations (with the
caveat that Fermi revision protocol takes the place of the usual fitness terms).
Moreover, one can branch off after (25) to yield,
xτ = (1− xτ )xτ [P(σ → τ)− P(τ → σ )]
(cid:20)(cid:16)
1 + e−α( f (τ,σ )− f (σ ,τ))(cid:17)−1 −(cid:16)
1 + eα( f (τ,σ )− f (σ ,τ))(cid:17)−1(cid:21)
= xτ (1− xτ )
= xτ (1− xτ )tanh
α( f (τ,σ )− f (σ ,τ))
2
(31)
(32)
(33)
which matches the Ito calculus based derivation of [17] under the large-population limit.
5.4.3 Proof for Theorem 2.4.13
We start by introducing the notion of chain transitivity, which will be useful in the proof of the theorem.
Definition 5.4.1 (Chain transitive). Let φ be a flow on a metric space (X,d). A set A ⊂ X is chain transitive with respect to φ if
for any x,y ∈ A and any ε > 0 and T > 0 there exists an (ε,T )-chain from x to y.
Next we state the following properties of chain components,
43/45
Property 5.4.2 ([52]). Every chain component of a flow on a compact metric space is closed, connected, and invariant with
respect of the flow. Moreover,
• Every chain component of a flow on a metric space is chain transitive with respect to the flow.
• Every chain transitive set with respect to a flow on a metric space is a subset of a unique chain component of the flow.
• If A and B are chain transitive with respect to a flow on a metric space, A ⊂ B and C is the unique chain component containing
A, then B ⊂ C.
Theorem 2.4.13 (Partial order on chain components). Let φ be a flow on a metric space and A1,A2 be chain components of the
flow. Then the relation defined by A1 ≤C A2 is a partial order.
Proof. We will show that the binary relation ≤C is reflective, antisymmetric and transitive.
• A1 ≤C A1. Since any chain component is chain transitive then we have that for any x,y ∈ A1: x ∼ y.
• If A1 ≤C A2 and A2 ≤C A1 then A1 = A2. By chain transitivity of A1, A2 we have that for any x,x(cid:48) ∈ A1, x ∼ x(cid:48) and for any
y,y(cid:48) ∈ A2, y ∼ y(cid:48). Hence if x ∼ y then x(cid:48) ∼ y(cid:48) for any x(cid:48) ∈ A1 and any y(cid:48) ∈ A2. Hence, A1 ∪ A2 is a chain transitive set and thus
by Theorem 5.4.2 must be a subset of a unique chain component of the flow C such that A1 ∪ A2 ⊂ C. However, we assumed
that A1,A2 are chain components themselves. Thus, A1 = A1 ∪ A2 = A2.
• If A1 ≤C A2 and A2 ≤C A3 then A1 ≤C A3. If there exist x ∈ A1 and y ∈ A2 such that x ∈ Ω+(φ ,y), as well as y(cid:48) ∈ A2 and z ∈ A3
such that y(cid:48) ∈ Ω+(φ ,z) then by chain transitivity of A2 we have that y ∈ Ω+(φ ,y(cid:48)) and thus x ∈ Ω+(φ ,z), implying A1 ≤C A3.
5.4.4 Proof for Theorem 2.4.24
We first present several results necessary for the proof.
Lemma 5.4.3. A chain recurrent (CR) point x is a sink CR point if and only if for any CR point y if y ∈ Ω+(φ ,x) then
x ∈ Ω+(φ ,y), i.e., the two points are chain equivalent.
Proof. We will argue the forward direction by contradiction. Suppose not. That is, suppose that x is a sink CR point and there
exists a CR point y such that y ∈ Ω+(φ ,x) and x /∈ Ω+(φ ,y), then if Cx,Cy are the equivalence classes/chain components of x,y
respectively we have that Cy ≤C Cx and Cy,Cx are clearly distinct chain components since x /∈ Ω+(φ ,y). Thus, Cx is not a sink
chain component and x is not a sink chain recurrent point, contradiction.
For the reverse direction, once again by contradiction we have that for any CR point y with y ∈ Ω+(φ ,x), x ∈ Ω+(φ ,y) and
x is a non-sink CR point. Then there exists another chain component A with A ≤C Cx where Cx is the equivalence class/chain
component of x. Hence, there exists y ∈ A such that y ∈ Ω+(φ ,x). Since y is a CR point which does not belong to Cx, we have
x /∈ Ω+(φ ,y), contradiction.
Lemma 5.4.4. If a sink chain component contains a single vertex si then it contains any vertex s j which is reachable from si via
(weakly)-better response moves. Specifically, it contains an MCC.
Proof. Any state/vertex s j is a chain recurrent (CR) point because it is a fixed point of the replicator dynamics. If s j is
reachable by si via a weakly-better response path, then s j ∈ Ω+(φ ,si) for the replicator flow. In the case of edges that are
strictly improving it suffices to use the ε correction to introduce the improving strategy and replicator will converge to the better
outcome. In the case of edges between outcomes of equal payoff all convex combinations of these strategies are fixed points for
the replicator and we can traverse this edge with (cid:100)1/ε(cid:101) hops of size ε.
But if s j ∈ Ω+(φ ,si) and si is a sink CR point (since it belongs to a CR component) then by Lemma 5.4.3 si ∈ Ω+(φ ,s j).
Therefore, state/vertex s j also belongs to the same sink chain component. The set of reachable vertices includes a strongly
connected component with no outgoing edges and thus a MCC.
Theorem 2.4.24. Let φ be the replicator flow when applied to a K-person game. The number of asymptotically stable sink
chain components is finite. Specifically, every asymptotically stable sink chain component contains at least one MCC; each
MCC is contained in exactly one chain component.
44/45
Proof. Since solutions in the neighborhood of an asymptotically stable set, all approach the set, volume is contracted in
this neighborhood, however, replicator dynamics is volume preserving in the interior of the state space [44, 106, 107]; the
formal argument works by transforming the system induces by the replicator dynamics over the interior of the state space
into a conjugate dynamical system that is divergence-free. Any asymptotically stable set cannot lie in the interior of the
simplex, i.e., it cannot consist only of fully mixed strategies. Hence, there must exist some product of subsimplices with
a non-empty intersection with this set. The intersection of the original asymptotically stable set with this subspace is still
asymptotically stable for this invariant subspace and thus we can continue the argument inductively. The intersection of the
attracting neighborhood with this subspace is an attracting neighborhood for the dynamics on this invariant subspace. We
deduce that any asymptotically stable chain component must contain at least one vertex of the simplex (pure strategy profile).
Let si be this vertex. By Lemma 5.4.4, this sink chain component must also include all other vertices reachable from si via
weakly-better replies. Specifically, it must include at least one MCC. Finally, a MCC is a chain transitive set for the replicator
flow via the same argument of the ε hops as in Lemma 5.4.4. By Theorem 5.4.2, it is a subset of a unique chain component of
the flow.
5.4.5 Proof for Theorem 2.5.1
Theorem 2.5.1. In the limit of infinite ranking-intensity α, the Markov chain associated with the generalized multi-population
model introduced in Section 2.1.4 coincides with the MCC.
Proof. Recall from the MCC definition that the probability of strictly improving responses for all players are set equal to each
other, and transitions between strategies of equal payoff happen with a smaller probability also equal to each other for all
players. Let the ratio of the two probabilities be denoted ε for all players. The transition probabilities of the Markov chain of
the macro-model when taking taking the limit of α → ∞ are equal to the transitions probabilities of the Markov chain of the
Markov-Conley chains when setting ε equal to 1
m, where m is the size of the population in the macro-model. Let Asi(k) be the
number of strictly improving moves for player k in state/vertex si. Similarly, let Bsi(k) be the number of deviating moves for
player k in state/vertex si that do not affect her payoff. It suffices to set the probability of a node si self-transitioning equal to
1− ∑k Asi (k)+ε ∑k Bsi (k)
.
∑k(Sk−1)
45/45
|
1905.01365 | 1 | 1905 | 2019-05-02T13:12:13 | A multi-agent system approach in evaluating human spatio-temporal vulnerability to seismic risk using social attachment | [
"cs.MA",
"cs.AI"
] | Social attachment theory states that individuals seek the proximity of attachment figures (e.g. family members, friends, colleagues, familiar places or objects) when faced with threat. During disasters, this means that family members may seek each other before evacuating, gather personal property before heading to familiar exits and places, or follow groups/crowds, etc. This hard-wired human tendency should be considered in the assessment of risk and the creation of disaster management plans. Doing so may result in more realistic evacuation procedures and may minimise the number of casualties and injuries. In this context, a dynamic spatio-temporal analysis of seismic risk is presented using SOLACE, a multi-agent model of pedestrian behaviour based on social attachment theory implemented using the Belief-Desire-Intention approach. The model focuses on the influence of human, social, physical and temporal factors on successful evacuation. Human factors considered include perception and mobility defined by age. Social factors are defined by attachment bonds, social groups, population distribution, and cultural norms. Physical factors refer to the location of the epicentre of the earthquake, spatial distribution/layout and attributes of environmental objects such as buildings, roads, barriers (cars), placement of safe areas, evacuation routes, and the resulting debris/damage from the earthquake. Experiments tested the influence of time of the day, presence of disabled persons and earthquake intensity. Initial results show that factors that influence arrivals in safe areas include (a) human factors (age, disability, speed), (b) pre-evacuation behaviours, (c) perception distance (social attachment, time of day), (d) social interaction during evacuation, and (e) physical and spatial aspects, such as limitations imposed by debris (damage), and the distance to safe areas. To validate the results, scenarios will be designed with stakeholders, who will also take part in the definition of a serious game. The recommendation of this research is that both social and physical aspects should be considered when defining vulnerability in the analysis of risk. | cs.MA | cs | A MULTI-AGENT SYSTEM APPROACH IN EVALUATING
HUMAN SPATIO-TEMPORAL VULNERABILITY TO
SEISMIC RISK USING SOCIAL ATTACHMENT
JULIUS BAÑGATE1,2,3, JULIE DUGDALE1,3, ELISE BECK2,3 & CAROLE ADAM1,3
1Laboratoire d'Informatique de Grenoble (LIG)
2Politiques publiques, Action politique, Territoires (PACTE)
3University Grenoble-Alps, Grenoble, FRANCE
ABSTRACT
Social attachment theory states that individuals seek the proximity of attachment figures (e.g. family
members, friends, colleagues, familiar places or objects) when faced with threat. During disasters, this
means that family members may seek each other before evacuating, gather personal property before
heading to familiar exits and places, or follow groups/crowds, etc. This hard-wired human tendency
should be considered in the assessment of risk and the creation of disaster management plans. Doing
so may result in more realistic evacuation procedures and may minimise the number of casualties and
injuries. In this context, a dynamic spatio-temporal analysis of seismic risk is presented using
SOLACE, a multi-agent model of pedestrian behaviour based on social attachment theory
implemented using the Belief-Desire-Intention approach. The model focuses on the influence of
human, social, physical and temporal factors on successful evacuation. Human factors considered
include perception and mobility defined by age. Social factors are defined by attachment bonds, social
groups, population distribution, and cultural norms. Physical factors refer to the location of the
epicentre of the earthquake, spatial distribution/layout and attributes of environmental objects such as
buildings, roads, barriers (cars), placement of safe areas, evacuation routes, and the resulting
debris/damage from the earthquake. Experiments tested the influence of time of the day, presence of
disabled persons and earthquake intensity. Initial results show that factors that influence arrivals in
safe areas include (a) human factors (age, disability, speed), (b) pre-evacuation behaviours, (c)
perception distance (social attachment, time of day), (d) social interaction during evacuation, and (e)
physical and spatial aspects, such as limitations imposed by debris (damage), and the distance to safe
areas. To validate the results, scenarios will be designed with stakeholders, who will also take part in
the definition of a serious game. The recommendation of this research is that both social and physical
aspects should be considered when defining vulnerability in the analysis of risk.
Keywords: agent-based social simulation, seismic crisis, social attachment, belief-desire-intention
1 INTRODUCTION
Human vulnerability during disasters is subject to the complex confluence of dynamic
individual, social, spatial and temporal elements. The mobility of people in space and time
is influenced by societal structure, norms, and individual capacities (human factors). Social
attachment theory describes the social nature of human behaviour during disasters and
states that individuals will seek the proximity of attachment figures [1]. This influences the
choices and actions that individuals make during evacuations. This paper describes how
social attachment has been implemented in a multi-agent model using a belief-desire-
intention (BDI) approach. The model, called SOLACE for SOciaL Attachment & Crisis
Evacuations, was coded using the GAMA platform [2]. SOLACE aims to provide a
realistic model of human behaviour during seismic crisis. The novelty of the model is the
integration of social attachment and GIS data. This paper presents initial results evaluating
different spatial and temporal scenarios influencing human vulnerability to seismic risk
when applied to two districts of the city of Grenoble in the French Alps.
This paper is organised as follows: Section 2 presents related work. Section 3 provides a
brief description of the model. Section 4 details the experiments. Section 5 describes initial
results. Section 6 discusses the results, presents the conclusions and describes future work.
2 RELATED WORK
Research on seismic risk and vulnerability has largely focused on physical aspects such as
damage to structures and the prediction/forecasting of future events. Seismic crisis
management plans in general are top-down institutional responses (command and control)
and are geared towards logistics and supply chain. Evacuation plans for seismic events are
based on expected, rather than actual, human behaviours and lack realism.
The need for more research on human behaviour during crisis (moderate earthquakes in
particular) has been noted in several studies [3][4]. In order to prepare and respond to
largely unpredictable events it is essential that more is known about how people really
behave in a crisis situation. In addition existing earthquake models (maps, algorithms)
need calibration and robust testing. Furthermore the structural, geological, and geotechnical
data that are needed by models lack detail, completeness and coverage. These facts
illustrate the big gap in the required knowledge for developing preparedness and resilience.
Social theories on human behaviour during disasters are presented in [1], [5]. Mawson's
social attachment theory posits that when individuals are under threat they seek the
proximity of attachment figures. Attachment figures include family members, friends, pets,
colleagues, authorities and even strangers. Familiar objects, places, and information present
within the sphere of social interaction are also considered as attachment figures. During a
threat, affiliation to attachment figures is activated and can lead to pre-evacuation
behaviours such as seeking family members, milling, herding, protecting property, seeking
pets, helping others/strangers, etc. Such attachments can influence an individual's
decisions, destinations (goals), social interactions, and speed/direction of movement.
Humans fundamentally desire and maintain interpersonal attachments [6]. However the
strength of bonds varies depending on the attachment figure, e.g. a person may be more
strongly attached to their mother than their pet. The strength of emotional bonds for
different relationships (partner, parents, kin, friends, acquaintance, strangers) in a social
network in different European countries has been quantified in Suvilehto, et al [7]. Touch
(in different bodily areas) was used to quantify bond strength. Social situations that involve
touch include greeting, parting, giving attention, helping, consoling, calming, and giving
pleasure. It should be noted that variations in bond strength and in ordering/priority may be
due to cultural differences. Table 1 shows some results for France.
Table 1: Mean strength of emotional bonds for France derived from Suviletho et al, 2015
Partner
8.82
Parent
7.77
3.84
Sibling Kin
7.51
5.29
Relation
Bond
Familiarity and bond strength mean that we are more able to perceive and recognise
attachment figures from a distance, within a group or in a complex environment. The
perception distance refers to what one sees (facial expression, body language, posture,
gesture, actions, signals/signs), hears (voice, sound, calling by name, call for help, screams,
warnings) [8] [9] and cognitive representations (knowledge, memory). The perception
Friend Acquaintance
7.57
Stranger
2.17
distance can differ for each context and varies for each individual. This can be due to
psychosocial bias (due to attachment, cognitive capacity, emotions), sensory limitations
(due to age, disability), and/or environmental constraints such as location/proximity,
occlusion due to barriers, diminished signals due to physical laws (speed of light/sound), or
environmental conditions (foggy, night, blackout).
The perception of shaking intensity during an earthquake depends on the ground motion
and the building's response [10]. Also, [10] found that there is a relationship between peak
seismic intensities and human behaviour. Human responses to different earthquake shaking
intensities have been reported in [11] [12] [13]. Similar to the findings of [11], variations in
resulting behaviours in different intensities have also been observed in [14], [15], and [16].
The psychological and social responses to disasters in general are reported by [17].
Spatial configuration of the built environment limits movement, especially after a
disaster [16] [18] 19], and the visual perception range of pedestrians to open spaces (parks
or wide streets) that constitute safe areas following an earthquake. The urban morphology
channels pedestrian movement and facilitates social interaction. The volume of people in
public areas changes, depending on the economic and social activities during different
times of the day or week (urban pulse) [20]. Barriers to movement include fixed structures
(buildings or fences), natural features (rivers/streams or bodies of water), and dynamic
objects (cars or other people). Debris from damaged structures during disasters also block
normal passageways [21] [4]. The increasing population in cities presents a large design
challenge to planners and policy makers in building safe and disaster resilient cities.
Agent based modelling (ABM) provides the opportunity to develop models of crisis
situations at the micro-, meso- and macro- scale, and to test them using computer
simulation. A trend in ABM is the integration of psychological and social aspects of human
behaviour into agents in order to create more realistic models. The goal is to enhance
current models with agents that are social, have the capability to decide, can identify and
associate themselves with a group. Previous models have integrated some attachment
figures for crisis evacuations, e.g. EPES, ESCAPES and EXITUS. A complete review of
previous models is given in [5].
Finally, in the field of ABM, the BDI approach is useful to reproduce human behaviour
[22]. It attempts to capture how humans reason with beliefs (internal knowledge), desires
(what it likes to achieve), and intentions (actions, guided by a library of plans).
3 DESCRIPTION OF THE MODEL
3.1 Multi-disciplinary approach
The SOLACE model has been developed by drawing upon social, computer and geospatial
sciences (Fig. 1). Earthquake crisis evacuation behaviours are gathered from reports, video-
recordings and literature. Social concepts and theories on human behaviour during crises
are used as a lens for analysing the data, developing the conceptual model, validating the
results with stakeholders, and the use of serious games. Formalization of the agent-based
model using BDI with GAMA used a variety of computer science techniques. In particular
the realistic spatial context of the simulated environment includes integrating different
datasets concerning to urban layout, seismic risk and vulnerability, mobility, demography,
etc. This spatial context was developed using geospatial data processing workflows in GIS.
Figure 1: Multidisciplinary methodology
3.2 Social model
Social attachment is the social theory that has been implemented in SOLACE and which
drives an individual's goals and social behaviours. This is expressed as bond strength,
social distance, and perception distance. Following Fig. 2 a social distance from 1 to 10 is
used to set the priority in perceiving attachment figures from a reference adult/individual.
For example for an adult, a priority of 1 is given to their child; priority 2 to their partner,
and 3 to their parents (from the data in table 1). However these priorities may be changed in
the simulator interface. Since data from [7] did not include children it has been assumed
that they have a higher priority than a partner. Note that the social distance to oneself is 0.
Details of these priority rankings are discussed in [2]. Adopting usual social norms for
relationships, the attachment bond strength is strongest for the nearest social distance; as is
the case for an altruistic scenario. In an egoistic scenario, the social bond strength is 0 for
oneself and there is no social bond to other agents; there is no social interaction. Thus
egoistical agents will only perceive themselves, give themselves priority, and try to protect
and preserve only themselves.
3.3 Perception distance
Figure 2: Social attachment network
Social attachment is implemented in SOLACE by the affective perception distance
(PDBond). This acts as a spatial filter in sensing nearby agents. Familiarity with attachment
figures (strength of social distance bond, SDbond,,10 point rating scale) tends to facilitate
faster perception (detection and recognition), thereby effectively boosting the normal
perception distance (PDNormal) range (i.e. familiar persons can be recognized even when far
away). This is formalised below by equation 1.
∗ 1+ !!"∗𝑆𝐷!"#$ . (1)
𝑃𝐷!"#$=𝑃𝐷!"#$%&
!
A constant k defines the bias imposed by the environment (i.e. visibility, audibility).
For full visibility during daytime, k = 1; in low visibility during night time, k = 0.2 and in
reduced visibility due to fog/snow, k = 0.8.
Equation (1) produces the following graph for perception distance influenced by bond
strength (Fig. 3). Data used include 50 meters [23] as the reference perception distance
(PDNormal), and the emotional bond strength data of Suviletho et al, 2015 for the French
case. The calculated perception distance for a partner at night is 4.1 meters, which is
consistent with the findings in [24] for comfortable fixation distance during night time.
Figure 3: Perception distance influenced by social bond strength.
3.4 Physical model environment and UML diagram
The links between the main elements of the model are shown in Fig. 4. There are 5 types of
physical environment objects: (1) Buildings, which have different typologies defined by
their construction material, use, and height. When buildings are damaged they can produce
debris inside a danger zone, which is the area around the building. (2) Soil, the type of
which has a huge effect on the seismic intensity; (3) Safe areas, which can be designated
shelters, open areas or empty road sections, (4) The earthquake, which can occur at a
particular magnitude, duration and intensity, and (5) The individual human agents, with
different characteristics and different possible behaviours induced by the earthquake (e.g.
move to safe area, seek family members, follow a leader, etc.).
Figure 4: Reduced UML diagram of SOLACE
3.5 Decision, behaviours and BDI
A probabilistic approach is applied in choosing pre-evacuation behaviour. During
pedestrian evacuation, agent decision-making, behaviour and social interaction are
implemented using the BDI approach. Table 2 illustrates several examples of an individual
agent's beliefs, desires and possible actions in different contexts. Please note that desires
can be contradictory with each other, for instance seeking a family member involves
putting oneself in danger. The agent will select the highest priority desire to become its
intention, and choose a plan of action to achieve that selected intention.
Table 2: Examples of BDI implemented with social attachment
BELIEFS
CONTEXT
Normal situation None
During extreme
earthquake
I'm not safe
DESIRES
None
Be safe
None
ACTIONS
None
Seek attachment
figures/objects, protect
self, egress, evacuate
None
Stay safe
Stay
I'm safe, my
building is safe
I'm safe
During moderate
earthquake
At safe area with
family
At safe area but
missing family
member
I'm safe, my family
member is unsafe
Stay safe, family
member is safe
Seek family member,
call, return to danger
area
3.6 Simulation environment
The SOLACE 3D GIS simulation environment and graphical user interface (GUI),
developed using the GAMA platform, is shown in Fig. 5. Parameters can be changed in the
GUI. Spatial layers (attributes, shape) can be modified with a GIS tool and called directly
by the model. It is also possible to change the probability distributions for assigning
attributes to model elements. Fig. 5 displays a map of the crisis scenario showing how
social attachment drives social interaction and navigation of the synthetic human agents.
The chart on the right hand side of the figure shows the progress of evacuation at every
simulation time-step. Simulation outputs are saved directly to text (*.csv) files and may be
further analysed.
Figure 5: SOLACE interface showing agent social interaction in the crisis environment
4 EXPERIMENTS
The study area is Grenoble, French Alps, an area with moderate seismicity. Earthquakes are
rare, which may have led to the population having a low awareness of seismic risk [25]. A
large historic sector lies at city centre that contains many old structures. Two districts,
Grenette and Crequi-Victor Hugo, in the historic centre were chosen for the experiment.
The geographic data used include (a) buildings from IGN BDTOPO(c) [26], and (b) roads
and points of interests from OpenStreetMap [27]. Vulnerability and damage probabilities
assigned to buildings are from [28]. Population related data from the national census [30].
Table 3: Scenarios tested
Scenario 1
Scenario 2
Scenario 3
Scenario 4
Time
Day
Night
Day
Day
Intensity
6
6
6
8
Disabled agents included
No
No
Yes
No
Four earthquake scenarios were tested (Table 3). The parameters for the human agents in
the model are: (a) perception distance as in Fig. 3.; (b) agent evacuation speeds (maximum
velocity in m/sec) from [5]; (c) population of different age groups in the study area: child
(0-2 and 3-14), adult (15-29 and 30-59) and elderly (60+). Disabled agents are present in all
age categories, except for children since no data was available in [29]. The percentages in
Table 4 are used as probabilities. The distribution of agents (absolute numbers) at different
times and locations in Table 4 are derived from [30]. Depending on the scenario, agents are
initially generated indoors at home, work, school or outdoors. Parent and teacher roles are
assigned to adults in the 30-59 age group.
Table 4: Population distribution at initialization derived from national census statistics [30]
% disabled Speed (m/s) Home
0
0
Age group
Child (0-2)
Child (3-14)
1.2 - 2.8
Adult (15-29)
Adult (30-59)
1.3 - 12.3
Elderly (60+) 10.2 - 36.1
0
0 - 2.23
0 - 3.83
0 - 3.83
0 - 1.11
75/83
0/331
209/1842
0/1243
553/853
Public Outdoors
Number per Location (day/night)
Work
0/0
0/0
547/0
1119/0
215/0
School
0/0
298/0
902/0
0/0
0/0
0/0
0/0
0/0
0/0
0/0
8/0
33/0
184/0
124/0
85/0
5 RESULTS
The simulation results are shown in Figure 6. Graphs show arrivals (in % of the population
for each category) of the adult, elderly, child, and disabled agents over 1000 seconds
(16min 40sec). The short duration in observation time (in seconds) seeks to capture effects
of pre-evacuation behaviours, and evacuations just after a sudden earthquake. This is
analogous to the 90 second requirement for commercial aircraft evacuations [31] and
escape time (RSET) during building fires [32]. Graphs a and b in figure 6 show the trends
for scenarios 1, 2 and 4 respectively for able individuals. Overall arrivals in scenario 1 are
greater than scenario 2, followed by scenario 4. The night evacuation in scenario 2 with
agents having shorter perception distances may have caused this difference. The fewer
number of arrivals in scenario 4 can be attributed to the greater amount of debris from the
intensity 8 earthquake, trapping or delaying agents. In Figure 6-c, there are few child
arrivals because of the long distance to safe areas, and because of the long distance to safe
areas, and because of the extra time that it takes for pre-evacuation behaviours such as
teachers trying to search for, and group together the children. The terraced appearance of
the graphs indicates long delays in the arrivals of child agents. Figure 6-d, shows results for
scenario 3, where arrivals of able-bodied agents are greater than for disabled agents.
Figure 6: Simulation results
It can be seen that factors that influence arrivals in safe areas include (a) human factors
(age, disability, speed), (b) pre-evacuation behaviours, (c) perception distance (social
attachment, time of day), (d) social interaction during evacuation, and (e) physical and
spatial aspects, such as limitations imposed by debris, and the distance to safe areas.
6 DISCUSSION AND CONCLUSION
The complexity of crisis situations provides a big challenge for modellers to make
simulations realistic. It entails the recreation of time sensitive interactions of dynamic
physical and social aspects that define vulnerability in real geographic space. Data from
many sources (national, census, and building data) were useful in model development.
These include total population counts or descriptions, presented as percentages. Spatial data
on buildings was available with height information. Characterization of buildings used a
probabilistic approach to assign attributes, e.g. assigning typology, vulnerability and
damage probabilities from [28]. Although qualitative data were available, the challenge was
in scaling the data, in percentages, to the level of discrete individual units (e.g. human
agents, buildings). A weighted-probabilistic approach was used. Reported populations
defined limits and percentages were used as probabilities. This method is promising and
can be used to scale datasets (especially field data from surveys) for use in ABM. The
experiments showed that many factors must be accounted for to simulate crisis evacuations.
Human factors and behaviour are particularly important and the decision to evacuate is
critical. Delays in the initial evacuation of agents are governed by pre-evacuation
behaviours [33]. A probabilistic approach was used to generate the pre-evacuation
behaviour choices and establish an evacuation time delay for each agent. The choice and
number of actions undertaken by an agent can delay evacuation. The time of day influences
the distribution of people in the city, e.g. at night time most people will be at home. Social
attachment bonds typically mean more social interaction between agents, which may delay
evacuation, e.g. parents trying to find their children. Similar studies have also shown that
social attachment normally results in evacuation delays. The following limitations of the
work will be investigated in future: (a) using real mobility data to account for the increase
in day time working population, (b) using survey results to define attachment bonds and
probabilities for pre-evacuation behaviour, (c) increasing the spatial scale to cover the
entire city. However this would also increase the number of agent interactions and would
require the use of a high-performance computing (HPC) infrastructure (grid or cluster). To
conclude, the model integrates social attachment and spatial elements of evacuation
behaviour in simulating seismic crisis. Although numerous data are included in the model,
more calibration from survey data is needed. This research finds that integrating both social
and physical aspects lead to a more realistic representation of vulnerability in risk analysis.
ACKNOWLEDGEMENTS
This work acknowledges funding from ARC7 (Région Rhône-Alpes) and IXXI. Stéphane
Cartier, Philippe Guéguen, Christelle Salameh, Cecile Cornou, Sonia Chardonnel, Bertrand
Guillier and Mahfoud Boudis provided invaluable inputs.
[1] Mawson, A. (2005), Understanding mass panic and other collective responses to threat
REFERENCES
and disaster, Psychiatry, vol. 68, no. 2, 2005.
[2] Bañgate, J., Dugdale, J., Beck, E., & Adam, C., SOLACE a multi-agent model of
human behaviour driven by social attachment during seismic crisis. ICT-DM 2017.
[3] Bernardini, G., D'Orazio, M.D., Quagliarini, E., & Spalazzi, L., An agent-based model
for earthquake pedestrians' evacuation simulation in urban scenarios. Pedestrian and
Evacuation Dynamics Conf. Transportation Research Procedia 2 255-263, 2014.
[4] Rojo, M. B., Beck, E., & Lutoff, C., The street as an area of human exposure in an
earthquake aftermath: the case of Lorca, Spain, 2011. Natural Hazards and Earth
System Sciences, 17, 581-594, 2017.
[5] Bañgate, J., Dugdale, J., Beck, E., & Adam, C., A review on the influence of social
attachment on human mobility during crises. Proc. 14th ISCRAM Conf. 2017.
[6] Baumeister, R. F., & Leary, M. R., The need to belong: a desire for interpersonal
attachments as a fundamental human motivation. Psych. Bull. Vol 117 (3). 1995.
[7] Suvilehto, J. T., Glerean, E., Dunbar, R. I., Hari, R., & Nummenmaa, L. (2015).
Topography of social touching depends on emotional bonds between humans.
Proceedings of the National Academy of Sciences, 112(45), 13811-13816.
[8] Meeren, H. K. M., van Heijnsbergen, C. C. R. J., & de Gelder, B. Rapid perceptual
integration of facial expressions and emotional body language. PNAS, Vol. 102, No.
45, 16518 -- 16523, 2005.
[9] ven Stock, J. V., Righart, R., & de Gelder, B., Body expressions influence recognition
of emotions in the face and voice. Emotion, Vol. 7, No. 3, 487-494. 2007.
[10] Kuwata, Y. and Takada, S., Instantaneous instrumental seismic intensity and
evacuation. Journal of Natural Disaster Science, Vol. 24, No. 1, pp35-42, 2002.
[11] Ohta, Y., & Omote, S., An investigation into human psychology and behaviour during
an earthquake. Proc. of 6th World Conf. on Earthquake Engineering. 1977. 702 -- 708.
[12] Japan Meteorological Agency, Tables Explaining the JMA Seismic Intensity Scale.
http://www.jma.go.jp/jma/en/Activities/inttable.html, Accessed: 12 Feb. 2018.
[13] Grünthal, G. (Ed.), European Macroseismic Scale 1998. European Seismological
Commission, sub com. on Eng.Seismology, Work Group, Macroseismic Scales.
[14] Lambie, E. S., Human response to earthquake shaking, Analysis of video footage of
the 2010-2011 Canterbury earthquake sequence, MSc Thesis, Univ. Canterbury. 2014.
[15] Ohta, Y., & Ohashi, H., Field Survey on occupant behaviour in an earthquake.
International Journal of Mass Emergencies and Disasters, 1975.
[16] Srinurak, N., Mishima, N., Fuchikami, T., & Duangthima, W. (2016). Analysis of
urban morphology and accessibility character to provide evacuation route in historic
area. Procedia-Social and Behavioral Sciences, 216, 460-469.
[17] Mikami, S. and Ikeda, K., Human Response to Disasters. International Journal of Mass
Emergencies and Disasters, 1985.
[18] Beck, E., Dugdale, J., Truong, H. V., Adam, C., & Colbeau-Justin, L. Crisis mobility
of pedestrians: from survey to modelling, lessons from Lebanon and Argentina,
ISCRAM-MED, 2014
[19] Wang, Q., & Taylor, J. E..Patterns and limitations of urban human mobility resilience
under the influence of multiple types of natural disaster. PLoS ONE 11(1): e0147299.
[20] Yin, L. & Shaw, S.-L., Exploring space-time paths in physical and social closeness
spaces: a space-time GIS approach. Journal of Geographical Info. Sci. 29:5, 742-761.
[21] Dan, M. B., & Armas, I., Earthquake impact on settlements: the role of urban and
structural morphology. Nat. Hazards and Earth System Sciences, 15, 2283-2297, 2015.
[22] Adam C., and Gaudou, B. BDI agents in social simulations: a survey. Knowl. Eng.
Rev., vol. 31, no. 3, pp. 207 -- 238, 2016
[23] Fotios, S., Yang, B., & Uttley, J., Observing other pedestrians: Investigating the
typical distance and duration of fixation. Lighting Res. Tech., Vol. 47: 548-564, 2015.
[24] Fujiyama, T, Childs, C., Boampong, D., & Tyler N., Investigation of Lighting Levels
for Pedestrians. Proc.6th Int. Conf. of Walking in the 21st Century. Zurich.
[25] Beck, E., Andre-Poyaud, I., Davoine, P-A, Chardonnel, S., & Lutoff, C. Risk
perception and social vulnerability to earthquakes in Grenoble (French Alps), Journal
of Risk Research, Taylor & Francis (Routledge), 15 (10), pp.1245-1260. 2012
[26] IGN, "Bdtopo institut national de l'information geographique et forestiere," shapefile,
[28] Riedel, I., Gueguen, P., Mura, M. D., Pathier, E. Leduc, T. & Chanussot, J. Seismic
vulnerability assessment of urban environments in moderate-to-low seismic hazard
regions using association rule learning and support vector machine methods. Natural
Hazards, vol. 76, no. 2, pp. 1111 -- 1141, 2015.
[29] Drees, L'etat de
santé de
la population
en France, Rapport 2017,
http://www.santepubliquefrance.fr/Actualites/Etat-de-sante-de-la-population-en-
France-rapport-2017
[30] Insee. Recensement de
la Population 2013 -- Base
infra-communales.
https://www.insee.fr/fr/statistiques/2386737 (and…/2386631)
[31] NTSB. Safety Study, Emergency Evacuation of Commercial Airplanes. NTSB/SS-
00/01, PB2000-917002, Notation 7266, Adopted June 27, 2000.
[32] CFPA. European Guideline No 19. Fire safety engineering concerning evacuation
from buildings. 2009.
[33] van der Wal C.N., Formolo D., Robinson M.A., Minkov M., Bosse T., Simulating
Crowd Evacuation with Socio-Cultural, Cognitive, and Emotional Elements. Trans. on
Computational Collective Intelligence XXVII. 139-177. Springer, 2017.
2017. http://professionnels.ign.fr/bdtopo.
[27] OpenStreetMap.
Planet
dump
https://openstreetmap.org, shapefile, 2017.
retrieved
from
https://planet.osm.org
|
1104.2939 | 1 | 1104 | 2011-04-14T22:29:19 | Subexponential convergence for information aggregation on regular trees | [
"cs.MA",
"cs.IT",
"cs.IT",
"math.ST",
"math.ST"
] | We consider the decentralized binary hypothesis testing problem on trees of bounded degree and increasing depth. For a regular tree of depth t and branching factor k>=2, we assume that the leaves have access to independent and identically distributed noisy observations of the 'state of the world' s. Starting with the leaves, each node makes a decision in a finite alphabet M, that it sends to its parent in the tree. Finally, the root decides between the two possible states of the world based on the information it receives.
We prove that the error probability vanishes only subexponentially in the number of available observations, under quite general hypotheses. More precisely the case of binary messages, decay is subexponential for any decision rule. For general (finite) message alphabet M, decay is subexponential for 'node-oblivious' decision rules, that satisfy a mild irreducibility condition. In the latter case, we propose a family of decision rules with close-to-optimal asymptotic behavior. | cs.MA | cs | Subexponential convergence for information aggregation on regular trees
Yashodhan Kanoria and Andrea Montanari
1
1
0
2
r
p
A
4
1
]
A
M
.
s
c
[
1
v
9
3
9
2
.
4
0
1
1
:
v
i
X
r
a
Abstract -- We consider the decentralized binary hypothesis
testing problem on trees of bounded degree and increasing
depth. For a regular tree of depth t and branching factor
k ≥ 2, we assume that the leaves have access to independent
and identically distributed noisy observations of the 'state of the
world' s. Starting with the leaves, each node makes a decision
in a finite alphabet M, that it sends to its parent in the tree.
Finally, the root decides between the two possible states of the
world based on the information it receives.
We prove that the error probability vanishes only subexpo-
nentially in the number of available observations, under quite
general hypotheses. More precisely the case of binary messages,
decay is subexponential for any decision rule. For general
(finite) message alphabet M, decay is subexponential for 'node-
oblivious' decision rules,
that satisfy a mild irreducibility
condition. In the latter case, we propose a family of decision
rules with close-to-optimal asymptotic behavior.
I. INTRODUCTION
Let G = (V, E) be a (possibly infinite) network rooted at
node ø. Assume that independent and identically distributed
noisy observations of an hidden random variable s ∈ {0, 1}
are available at a subset U ⊆ V of the vertices. Explicitly,
each i ∈ U has access to a private signal xi ∈ X
where {xi}i∈U are independent and identically distributed,
conditional on s. The 'state of the world' s is drawn from
a prior probability distribution π = (π0, π1). The objective
is to aggregate information about s at the root node under
communication constraints encoded by the network structure,
while minimizing the error probability at ø.
We ask the following question:
How much does the error probability at the root
node ø increase due to these communication con-
straints?
In order to address this question, consider a sequence of
information aggregation problems indexed by t. Information
is revealed in a subset of the vertices Ut ⊆ V . There are
t rounds in which information aggregation occurs. In each
round, a subset of the nodes in V make 'decisions' that are
broadcasted to their neighbors. In the initial round, nodes i ∈
Ut with distance d(ø, i) = t (with d(· , · ) being the graph
distance) broadcast a decision σi ∈ M to their neighbors,
with M a finite alphabet. In the next round, nodes i ∈ V
with distance d(ø, i) = t− 1 broadcast a decision σi ∈ M to
their neighbors. And so on, until the neighbors of ø announce
their decisions in round t. Finally, the root makes its decision.
The decision of any node i is a function of decisions of i's
Department of Electrical Engineering and Department of Statistics,
Stanford University. Supported by 3Com Corporation Stanford Graduate
Fellowship, and NSF grants CCF-0743978 and CCF-0915145.
Clearly,
neighbors in earlier rounds, and, if i ∈ U , on the private
signal xi received by i.
the root can possibly access only the private
information available at nodes i ∈ V with d(ø, i) ≤ t
(with d(· , · ) the graph distance). We can therefore assume,
without loss of generality, that Ut ⊆ {i ∈ V : d(ø, i) ≤ t}.
It is convenient to think of Ut as the information horizon at
time t.
Consider first the case in which communication is un-
constrained. This can be modeled by considering the graph
with vertices V = {ø, 1, 2, 3, . . .} and edges E =
{(ø, 1), (ø, 2), (ø, 3), . . .}. In other words, this is a star net-
work, with the root at the center. Without loss of generality,
we take Ut = {1, . . . ,Ut}, with Ut ↑ ∞ as t → ∞.
A simple procedure for information aggregation would
work as follows. Each node i computes the log-likelihood
ratio (LLR) ℓ(xi) corresponding to the observed signal, and
quantizes it to a value σi. The root adds up the quantized
LLRs and decides on the basis of this sum. It follows from
basic large deviation theory [1] that, under mild regularity
assumptions, the error probability decreases exponentially in
the number of observations
P{σø 6= s} = exp(cid:8) − Θ(Ut)} .
(1)
This result is extremely robust:
(1) It holds for any non-trivial alphabet M ≥ 2;
(2) Using concentration-of-measure arguments [2], [3] it
is easy to generalize it to families of weakly dependent
observations [4];
(3) It can be generalized to network structures G with weak
communications constrains. For instance, [5] proved that
the error probability decays exponentially in the number
of observations for trees of bounded depth. The crucial
observation here is that such networks have large degree
diverging with the number of vertices. In particular, for a
tree of depth t, the maximum degree is at least n1/t.
At the other extreme, Hellmann and Cover [6] considered
the case of a line network. In our notations, we have V =
{ø, 1, 2, 3, . . .}, E = {(ø, 1), (1, 2), (2, 3), . . .}, and Ut =
{1, 2, . . . , t}. In [6] they proved that, as long as the LLRs
are bounded (namely ℓ(xi) ≤ C almost surely for some
constant C), and the decision rule is independent of the node,
the error probability remains bounded away from 0 as t →
∞.
If the decision rule is allowed to depend on the node, the
error probability can vanish as t → ∞ provided M ≥ 3
[7], [8]. Despite this, even if the probability of error decays
to 0, it does so much more slowly than for highly connected
networks. Namely, Tay, Tsitsiklis and Win [9] proved that
In the latter case, one expects that exponential convergence
is recovered as the message set gets large. Indeed we prove
that the optimal exponent in Eq. (2) obeys
(2)
P{σø 6= s} = exp(cid:8) − O(Utρ)(cid:9)
for some ρ < 1. In other words,
the communication
constraint is so severe that, after t steps, the amount of
information effectively used by the root is equivalent to a
vanishingly small fraction of the one within the 'information
horizon'.
These limit cases naturally lead to the general question:
Given a rooted network (G, ø), a sequence of information
horizons {Ut}t≥1 and a finite alphabet M, can information
the error
be aggregated at
probability decays exponentially in Ut? The question is
wide open, in particular for networks of with average degree
bounded or increasing slowly (e.g. logarithmically) with the
system size.
in such a way that
the root
Networks with moderate degree arise in a number of prac-
tical situations. Within decentralized detection applications,
moderate degree is a natural assumption for interference-
limited wireless networks. In particular, systems in which a
single root node communicates with a significant fraction of
the sensors are likely to scale poorly because of interference
at the root. Standard models for wireless ad hoc networks
[10] are indeed based on random geometric graphs whereby
each node is connected to a logarithmic number of neighbors.
A different domain of applications for models of decen-
tralized decision making is social learning [11]. In this case,
each node corresponds to an agent, and the underlying graph
is the social network across which information is exchanged.
Also in this case, it is reasonable to assume that each agent
has a number of neighbors which is bounded, or diverges
slowly as the total number of agents grows. In many graph-
theoretic models of social networks [12], although a small
number of nodes can have large degree, the average degree
is bounded or grows logarithmically with the network size.
Given the slow progress with extreme network structures
(line networks and highly-connected networks), the study
of general moderate degree networks appears extremely
challenging. In this paper we focus on regular trees. More
precisely, we let G be the (infinite) regular tree with branch-
ing factor k, rooted at ø (each node has k descendants and,
with the exception of the root, one parent). The information
horizon Ut is formed by all the nodes at distance t from the
root, hence Ut = kt. Under a broad set of assumptions, we
prove that the probability of error decays subexponentially
in the size of the information set, cf. Eq. (2), where ρ =
ρM < 1 depends on the size of the alphabet M = m.
in the following cases:
1) For binary messages M = 2 and any choice of the de-
cision rule. In fact, we obtain a precise characterization
of the smallest possible error probability in this case.
2) For general message alphabet 3 ≤ M < ∞ provided
the decision rule does not depend on the node, and
satisfies a mild 'irreducibility' condition (see Section
IV-B for a definition).
More precisely, we establish subexponential convergence
(3)
1 −
C1
M ≤ ρM ≤ 1 − exp(cid:8) − C2M(cid:9) .
The upper bound follows from our general proof for irre-
ducible decision rules, while the lower bound is obtained by
constructing an explicit decision rule that achieves it.
Our investigation leaves several interesting open problems.
First, it would be interesting to compute the optimal exponent
ρ = ρ(k,M) for given degree of the tree and size of
the alphabet. Even the behavior of the exponent for large
alphabet sizes is unknown at
the moment (cf. Eq. (3)).
Second, the question of characterizing the performance limits
of general, node-dependent decision rules remains open for
M ≥ 3. Third, it would be interesting to understand the
case where non-leaf nodes also get private signals, e.g.,
Ut = {i : i ∈ V, d(ø, i) ≤ t}. Finally, this paper focuses
on tree of bounded degree. It would be important to explore
generalization to other graph structures, namely trees with
slowly diverging degrees (which could be natural models for
the local structure of preferential attachment graphs [13]),
and loopy graphs. Our current results can be extended to trees
of diverging degree only in the case of binary signals. In this
case we obtain that the probability of error is subexponential
(4)
P{σø 6= s} = exp(cid:8) − o(Ut)}
as soon as the degree is sub-polynomial, i.e. k = o(na) for
all a > 0.
The rest of the paper is organized as follows: Section
II defines formally the model for information aggregation.
Section III presents our results for binary messages M = 2.
Section IV treats the case of decision rules that do not depend
on the node, with general M.
II. MODEL DEFINITION
As mentioned in the introduction, we assume the network
G = (V, E) to be an (infinite) rooted k-ary tree, i.e. a tree
whereby each node has k descendants and one parent (with
the exception of the root, that has no parent). Independent
noisy observations ('private signals') of the state of the world
s are provided to the nodes at all the nodes at t-th generation
Ut = {i ∈ V : d(ø, i) = t}. These will be also referred to
as the 'leaves'. Define n ≡ Ut = kt. Formally, the state of
the world s ∈ {0, 1} is drawn according to the prior π and
for each i ∈ Ut an independent observation xi ∈ X is drawn
with probability distribution p0(· ) (if s = 0) or p1(· ) (if
s = 1). For notational simplicity we assume that X is finite,
and that p0(x), p1(x) > 0 for all x ∈ X . Also, we exclude
degenerate cases by taking π0, π1 > 0. We refer to the refer
to the two events {s = 0} and {s = 1} as the hypotheses
H0 and H1.
In round 0, each leaf i sends a message σi ∈ M to its
parent at level 1. In round 1, the each node j at level 1
sends a message σj ∈ M to its parent at level 2. Similarly
up to round t. Finally, the root node ø makes a decision σø ∈
{0, 1} based on the k messages it receives. The objective is
to minimize Perr ≡ P(σø 6= s). We call a set of decision
rules optimal if it minimizes Perr.
We will denote by ∂i the set of children of node i. We
denote the probability of events under H0 by P0(·), and the
probability of events under H1 by P1(·). Finally, we denote
by fi the decision rule at node i in the tree. If i is not a
leaf node and i 6= ø, then fi : Mk → M. The root makes
a binary decision fø : Mk → {0, 1}. If i is a leaf node,
it maps its private signal to a message, fi : X → M. In
general, fi's can be randomized.
III. BINARY MESSAGES
case of binary messages.
In this section, we consider the case M = {0, 1}, i.e., the
Consider the case π0 = π1 = 1/2, X = {0, 1} and
ps(x) = (1 − δ)I(x = s) + δI(x 6= s) for s = 0, 1; where
δ ∈ (0, 1/2). Define the majority decision rule at non-leaf
node i as follows: σi takes the value of the majority of σ∂i
(ties are broken uniformly at random).
It is not hard to see that if we implement majority updates
at all non-leaf nodes, we achieve
Pmaj(σø 6= s) = exp(cid:8)−Ω(cid:0)⌊(k + 1)/2⌋t(cid:1)(cid:9)
Note that this is an upper bound on error probability under
majority updates.
(5)
Our main result shows that, in fact, this is essentially the
best that can be achieved.
Theorem 3.1: Fix the private signal distribution, i.e., fix
p0(·) and p1(·). There exists C < ∞ such that for all k ∈ N
and t ∈ N, for any combination of decision rules at the
nodes, we have
P(σø 6= s) ≥ exp(−C(cid:18) k + 1
2 (cid:19)t)
(6)
In particular, the error probability decays subexponentially
in the number of private signals n = kt, even with the
optimal protocol.
A. Proof of Theorem 3.1
We prove the theorem for the case π0 = π1 = 1/2, X =
{0, 1} and ps(x) = (1− δ)I(x = s)+ δI(x 6= s) for s = 0, 1;
where δ ∈ (0, 1/2). The proof easily generalizes to arbitrary
π,X , p0 and p1.
Also, without loss of generality we can assume that, for
every node i,
P(s = 1σi = 1)
P(s = 0σi = 1) ≥
P(s = 1σi = 0)
P(s = 0σi = 0)
(7)
(otherwise simply exchange the symbols and modify the
decision rules accordingly).
Denote by ηI
i the (negative) logarithm of the 'type I error'
i the
i ≡
The following is the key lemma in our proof of Theorem
i ≡ − log(P(s = 0, σi = 1)). Denote by ηII
in σi, i.e. ηI
(negative) logarithm of the 'type II error' in σi, i.e. ηII
− log(P(s = 1, σi = 0)).
3.1.
Lemma 3.2: Given δ > 0, there exists C ≡ C(δ) > 0
such that for any k we have the following: There exists an
optimal set of decision rules such that for any node i at level
τ ∈ N,
i ≤ C2((k + 1)/2)2τ .
ηI
iηII
the root ø, we see that min(ηI
result follows immediately.
(8)
Proof: [Proof of Theorem 3.1] Applying Lemma 3.2 to
ø) ≤ C((k + 1)/2)t. The
there is an
optimal set of decision rules that correspond to deterministic
likelihood ratio tests (LRTs) at the non-leaf nodes.
Lemma 3.2 is proved using the fact
ø, ηII
that
Definition 3.3: Choose a node i. Fix the decision
i. Define Li(σ∂i) =
functions of all descendants of
P(H1σ∂i)/P(H0σ∂i).
a) The decision function fi
likelihood ratio test if:
(i) It is deterministic.
(ii) There is a threshold θ such that
is a monotone deterministic
P(fi = 1, Li < θ) = 0
P(fi = 0, Li > θ) = 0
b) The decision function fi is a deterministic likelihood
is a monotone deterministic
is the Boolean complement
ratio test if either fi or f c
i
likelihood ratio test. Here f c
i
of fi.
Proof: Consider a set of decision rules that minimize
The next lemma is an easy consequence of a beautiful
result of Tsitsiklis [14]. Though we state it here only for
binary message alphabet, it easily generalizes to arbitrary
finite M.
Lemma 3.4: There is a set of monotone deterministic
likelihood ratio tests at the nodes that achieve the minimum
possible P(σø 6= s).
P(σø 6= s).
Fix the rule at every node except node i to the optimal
one. Now, the distributions P0(σ∂i) and P1(σ∂i) are fixed.
Moreover, P(σø 6= s) is a linear function of q(fi) ≡
(P0(σi), P1(σi)), where Ps(σi) denotes the distribution of
σi under hypothesis Hs. The set Q of achievable q's is
clearly convex, since randomized fi is allowed. From [14,
Proposition 3.1], we also know that Q is compact. Thus, there
exists an extreme point of Q that minimizes P(σø 6= s). Now
[14, Proposition 3.2] tells us that any extreme point of Q can
be achieved by a deterministic LRT. Thus, we can change
fi to a deterministic LRT without increasing P(σø 6= s). If
fi is not monotone (we know that i 6= ø in this case), then
i , σ∂j\i). Clearly,
we do fi ← f c
P(σø 6= s) is unaffected by this transformation, and fi is
now a monotone rule.
We do this at each of the nodes sequentially, starting at
level 0, then covering level 1 and so on until the root ø. Thus,
we change (if required) each decision rule to a monotone
deterministic LRT without increasing P(σø 6= s). The result
follows.
Clearly, if fi is a monotone LRT, Eq. (7) holds. In fact,
we argue that there is a set of deterministic monotone LRTs
i and fj(σi, σ∂j\i) ← fj(σc
with strict inequality in Eq. (7), i.e., such that
P(s = 1σi = 0)
P(s = 0σi = 0)
P(s = 1σi = 1)
P(s = 0σi = 1)
>
holds for all i, that are optimal.
(9)
Eq. (7) can only be written when P(σi = 0) > 0 and
P(σi = 1) > 0. Consider a leaf node i. Without loss of
generality we can take σi = xi for each leaf node i (since any
other rule can be 'simulated' by the concerned level 1 node).
So we have P(σi = 0) > 0 and P(σi = 1) > 0, Eq. (9) holds
and fi is a deterministic LRT. We can ensure these properties
inductively at all levels of the tree by moving from the leaves
towards the root. Consider any node i. If P(σi = 0) = 0, then
i 6= ø (else Perr = 1/2) and the parent of i is ignoring the
constant message received from i. We can do at least as well
by using any non-trivial monotone deterministic LRT at i.
Similarly, we can eliminate P(σi = 1) = 0. If P(σi = 0) > 0
and P(σi = 1) > 0, then Eq. (9) must hold for any monotone
deterministic LRT fi, using the inductive hypothesis.
Definition 3.5: Let α and β be binary vectors of the same
length τ. We say α (cid:23) β if αi ≥ βi for all i ∈ {1, 2, . . . , τ}.
We now prove Lemma 3.2.
Proof: [Proof of Lemma 3.2]
From Lemma 3.4 and Eq. (9), we can restrict attention to
monotone deterministic LRTs satisfying Eq. (9).
i = ηII
We proceed via induction on level τ. For any leaf node
i = − log(δ/2). Choosing C =
i, we know that ηI
− log(δ/2), Eq. (8) clearly holds for all nodes at level 0.
Suppose Eq. (8) holds for all nodes at level τ. Let i be a
node at level τ + 1. Let its children be ∂i = {c1, c2, . . . , ck}.
Without loss of generality, assume
c1 ≥ ηI
ηI
Claim: We can also assume
c2 ≥ . . . ≥ ηI
ck
(10)
c2
c2
ck
(11)
and ηII
c1 > ηII
c1 ≥ ηI
c1 ≥ ηII
c1 ≤ ηII
ηII
1) = Ps(σc2 = 1) for s = 1, 2. Thus, node i can use
c2 ≤ . . . ≤ ηII
c2 (so c1 is
Proof of Claim: Suppose, instead, ηII
doing better than c2 on both types of error). We can use
the protocol on the subtree of c1 also on the subtree of
c2. Call the message of c2 under this modified protocol
(both types of error
have only become less frequent), there exists a randomized
bσc2. Since, ηI
function F : {0, 1} → {0, 1}, such that Ps(F (bσc2 ) =
fi(σc1 , F (bσc2 ), σc3 , . . . , σck ) to achieve the original values
, where fi is decision rule being used at i
of ηI
c2
before. Clearly, the error probabilities at i, and hence at
the root, stay unchanged with this. Thus, we can safely
for
assume ηII
i = 2, 3, . . . , k − 1. Clearly, our transformations retained the
property that nodes at levels τ +1 and below use deterministic
LRTs satisfying Eq. (9). Similar to our argument for Eq. (9)
above, we can make appropriate changes in the decision rules
at levels above τ +1 so that they also use deterministic LRTs
satisfying Eq. (9), without increasing error probability. This
proves the claim.
. Similarly, we can assume ηII
c1 ≤ ηII
ci ≤ ηII
and ηII
c2
ci+1
c2
Recall that fi : {0, 1}k → {0, 1} is the decision rule at
node i. Assume the first bit in the input corresponds to σc1,
the second corresponds to σc2, and so on. Using Lemma 3.4,
we can assume that fi implements a deterministic likelihood
ratio test. Define the k-bit binary vectors ω0 = (111 . . . 1),
ω1 = (011 . . . 1), . . . , ωk = (00 . . . 0). From Lemma 3.4
and Eq. (9), it follows that fi(ωj) = I(j < j0) for some
j0 ∈ {0, 1, . . . , k, k + 1}.
Claim: Without loss of generality, we can assume that j0 6= 0
and j0 6= k + 1.
Proof of Claim: Suppose j0 = 0. It follows from Lemma
3.4 and Eq. (9) that fi(σ∂i) = 0 for every possible σ∂i. If
i = ø then we have Perr ≥ 1/2. Suppose i 6= ø. Then σi
is a constant and is ignored by the parent of i. We cannot
do worse by using an arbitrary non-trivial decision rule at i
instead. (The parent can always continue to ignorebσi.) The
case j0 = k + 1 can be similarly eliminated. This proves the
claim.
Thus, we can assume j0 ∈ {1, . . . , k} without loss of
generality. Now ω (cid:23) ωj0−1 contribute to type I error and
ω (cid:22) ωj0 contribute to type II error. It follows that
ηI
i ≤
ηII
i ≤
kXj=j0
j0Xj=1
cj ≤ (k − j0 + 1)ηI
ηI
cj0
,
cj ≤ j0ηII
ηII
cj0
,
(12)
(13)
(14)
where we have used the ordering on the error exponents
(Eqs. (10) and (11)). Eqs. (12) and (13) lead immediately to
ηI
i/ηI
cj0
+ ηII
i /ηII
cj0 ≤ (k + 1) .
Now, for any x, y ≥ 0, we have x + y ≥ 2√xy. Plugging
, we obtain from Eq. (14)
and y = ηII
x = ηI
i /ηII
cj0
i/ηI
cj0
ηI
iηII
2 (cid:19)2
i ≤(cid:18) k + 1
ηI
cj0
ηII
cj0
.
(15)
By our induction hypothesis ηI
Thus, ηI
completes the proof.
cj0 ≤ C2((k + 1)/2)2τ .
ηII
i ≤ C2((k + 1)/2)2(τ +1) as required. Induction
iηII
cj0
IV. 'NODE-OBLIVIOUS' RULES WITH NON-BINARY
MESSAGES
In this section we allow a general finite message alphabet
M that need not be binary. However, we restrict attention
to the case of node-oblivious rules: The decision rules fi at
all nodes in the tree, except the leafs and the root, must be
the same. We denote this 'internal node' decision rule by
f : Mk → M. Also, the decision rules used at each of the
leaf nodes should be same. We denote the leaf decision rule
by g : X → M. The decision rule at the root is denoted
by h = fø : Mk → {0, 1}. We call such (f, g, h) a node-
oblivious decision rule vector.
Define m ≡ M. In Section IV-A, we present a scheme
that achieves
P(σø 6= s) = expn−Ω(cid:16)(cid:8)k (1 − 1/m)(cid:9)t(cid:17)o ,
(16)
when the error probability in the private signals is sufficiently
small. Next, under appropriate assumptions, we show that
the decay of error probability must be sub-exponential in
the number of private signals kt.
A. An efficient scheme
For convenience, we label the messages as
M =(cid:26)−m + 1
2
, −m + 3
2
, . . . ,
m − 1
2 (cid:27)
(17)
The labels have been chosen so as to be suggestive (in a
quantitative sense, see below) of the inferred log-likelihood
ratio. Further, we allow the messages to be treated as real
numbers (corresponding to their respective labels) that can
well defined for a non-leaf node i.
The node-oblivious decision rule we employ at a non-leaf
be operated on. In particular, the quantity Si ≡Pc∈∂i σc is
node i 6= ø is
f (σ∂i) =
j Si/k+(m−1)/2
j Si/k−(m−1)/2
k − m−1
k + m−1
if Si ≤ 0
if Si > 0
Note that the rule is symmetric with respect to a inversion
of sign, except that Si = 0 is mapped to the message 1/2
when m is even.
(18)
1−1/m
1−1/m
2
2
The rule g(xi) used at the leafs is simply g(1) = (m−1)/2
and g(0) = −(m − 1)/2. The decision rule at the root is
,
,
h(σ∂ø) =(cid:26) 1 ,
if Sø ≥ 0
0 , otherwise.
(19)
If we associate H0 with negative quantities, and H1 with pos-
itive quantities, then again, the rule at the leafs is symmetric,
and the rule at the root is essentially symmetric (except for
the case Sø = 0).
Lemma 4.1: Consider the node-oblivious decision rule
vector (f, g, h) defined above. For k ≥ 2 and m ≥ 3, there
exists δ0 ≡ δ(m, k) > 0 such that the following is true for
all δ < δ0:
(i) Under H0, for node i at level τ ≥ 0, we have
− log P(cid:2)σi = −(m − 1)/2 + l(cid:3) ≥ (l/m)(cid:8)k (1 − 1/m)(cid:9)τ
for l = 1, 2, . . . , m − 1.
(ii) Under H1, for node i at level τ ≥ 0, we have
− log P(cid:2)σi = (m − 1)/2 − l(cid:3) ≥ (l/m)(cid:8)k (1 − 1/m)(cid:9)τ
for l = 1, 2, . . . , m − 1.
Proof: We prove (i) here. The proof of (ii) is analogous.
Assume H0. Define γ ≡ k (1 − 1/m) and C ≡
k log m/(k − 1). We show that, in fact, for suitable choice
of δ0 the following holds: If δ < δ0, then for any node i at
any level τ ≥ 0,
(21)
(20)
− log P(cid:2)σi = −(m − 1)/2 + l(cid:3) ≥
(l/m)γτ + C
(22)
We proceed by induction on τ. Consider i at level τ = 0.
We have P0(cid:2)σi = −(m−1)/2+l(cid:3) = 0 for l = 1, 2, . . . , m−2
and P0(cid:2)σi = (m − 1)/2] = δ. Choosing δ0 ≡ exp(−1− C),
we can ensure that Eq. (22) holds at level 0. Note that for
k ≫ 1, we have δ0 ≈ 1/(em).
Now suppose Eq. (22) holds at level τ. Consider node i
at level τ + 1. From Eq. (18), for σi = −(m − 1)/2 + l we
need
Si ≥ k[−(m − 1)/2 + l(1 − 1/m)]
(23)
For every σ∂i = (−(m − 1)/2 + l1,−(m − 1)/2 +
l2, . . . ,−(m − 1)/2 + lk) such that Eq. (23) holds, we have
Pk
j=1 lj ≥ kl(1 − 1/m). Thus,
(24)
Obviously, there are at most mk such σ∂i. Thus,
lj
P0(σ∂i) ≤ exp−kC − (1/m)γτ
kXj=1
≤ exp(cid:0)−kC − (1/m)lγτ +1(cid:1)
≤ mk exp(cid:0)−kC − (1/m)lγτ +1(cid:1)
= exp(cid:0)−C − (1/m)lγτ +1(cid:1)
P0[σi = −(m − 1)/2 + l]
Thus, Eq.(22) holds at level τ + 1. Induction completes the
proof.
Theorem 4.2: For k ≥ 2 and m ≥ 3, there exists δ0 ≡
δ0(m, k) > 0, and a node-oblivious decision rule vector, such
that the following is true: For any δ < δ0, we have
2m (cid:8)k (1 − 1/m)(cid:9)t(cid:27)
m − 1
P(cid:2)σø 6= s(cid:3) ≤ exp(cid:26)−
= exp(cid:26)−
m − 1
2m
with ρ ≡ 1 + log(1 − 1/m)/ log k.
root decision rule Eq. (19).
nρ(cid:27)
Proof: The theorem follows from Lemma 4.1 and the
(25)
Assume H0. For every σ∂ø = (−(m − 1)/2 + l1,−(m −
1)/2 + l2, . . . ,−(m − 1)/2 + lk) such that Sø ≥ 0, we have
Pk
j=1 lj ≥ k(1 − 1/m)(m − 1)/(2m). From Lemma 4.1(i),
P0(σ∂øH0) ≤ exp−kC − (1/m)γt−1
lj
kXj=1
≤ exp(cid:0)−kC − (m − 1)γt/(2m)(cid:1) ,
(26)
where γ ≡ k (1 − 1/m) and C ≡ k log m/(k − 1). Obvi-
ously, there are at most mk such σ∂ø. It follows that
P0(σø = 1H0) ≤ mk exp(cid:0)−kC − (m − 1)γt/(2m)(cid:1)
= exp(cid:0)−C − (m − 1)γt/(2m)(cid:1) .
P1(σø = 0H1) ≤ exp(cid:0)−C − (m − 1)γt/(2m)(cid:1)
P(σø 6= s) ≤ exp(cid:0)−C − (m − 1)γt/(2m)(cid:1)
Recall that C > 0. Thus, we have proved the result.
Combining, we arrive at
Similarly, we can show
B. Subexponential decay of error probability
Define n ≡ kt, i.e., n is the number of private signals
received, one at each leaf. The scheme presented in the
previous section allows us to achieve error probability that
decays like exp(−Ω({k (1 − 1/m)}t)) = exp(−Ω(nρ)),
where ρ = 1 + log(1 − 1/m)/ log k ≈ 1 − 1/(m log k)
for m ≫ 1. In this section we show that under appropriate
assumptions, error probability that decays exponentially in
n, i.e., exp(−Θ(n)), is not achievable with node-oblivious
rules.
In this section we call the letters of the message alphabet
M = {1, 2, . . . , m}. For simplicity, we consider only deter-
ministic node-oblivious rules, though our results and proofs
extend easily to randomized rules.
We define here a directed graph G with vertex set M
and edge set E that we define below. We emphasize that G
is distinct from the tree on which information aggregation
is occurring. There is a directed edge from node µi ∈ M
to node µj ∈ M in G if there exists α ∈ Mk such that
µj appears at least once in α and f (α) = µi. Informally,
(µi, µj) ∈ E if µi can be 'caused' by a message vector
received from children that
includes µj. We call G the
dependence graph.
We make the following irreducibility assumptions on the
node-oblivious decision rule vectors (f, g, h) under consid-
eration (along with leaf and root decision rules).
Assumption 1: The dependence graph G is strongly con-
nected. In other words, for any µi ∈ M and µj ∈ M such
that µj 6= µi, there is a directed path from µi to µj in G.
Assumption 2: There exists a level τp > 0 such that for
node i at level τp, we have P0(σi = µ) > 0 for all µ ∈ M.
Note that P0(σi = µ) > 0 implies P1(σi = µ) > 0 by
absolute continuity of P0(xi) w.r.t. P1(xi).
Assumption 3: There exists µ− ∈ M, µ+ ∈ M, η > 0
and τ∗ such that, for all τ > τd the following holds: For
node i at level τ, we have P0(σi = µ−) > η and P1(σi =
µ+) > η.
In other words, we assume there is one 'dominant' message
under each of the two possible hypothesis.
It is not hard to verify that for k ≥ 2, m ≥ 3 and δ <
δ0(m, k) (where δ0 is same as in Lemma 4.1 and Theorem
4.2), the scheme presented in the previous section satisfies
all four of our assumptions. In other words, the assumptions
are all satisfied in the regime where our scheme has provably
good performance.
Definition 4.3: Consider a directed graph G = (V,E) that
is strongly connected. For u, v ∈ V, let duv be the length
of the shortest path from u to v. Then the diameter of G is
defined as
diameter(G) ≡ max
u∈V
max
v∈V,v6=u
duv .
Theorem 4.4: Fix m and k. Consider any node-oblivious
decision rule vector (f, g, h) such that Assumptions 1, 2 and
3 are satisfied. Let d be the diameter of the dependence graph
G. Then, there exists C ≡ C(f, m, k) < ∞ such that we have
(27)
P(cid:2)σø 6= s(cid:3) ≥ exp(cid:8)−Cnρ(cid:9) ,
d log k < 1.
where ρ ≡ 1 + log(1−k−d)
Now G has m vertices, so clearly d ≤ m−1. The following
corollary is immediate.
Corollary 4.5: Fix m and k. Consider any node-oblivious
decision rule vector (f, g, h) such that Assumptions 1, 2 and
3 are satisfied. Then, there exists C ≡ C(f, m, k) < ∞ such
that we have
P(cid:2)σø 6= s(cid:3) ≥ exp{−Cnρ} ,
(28)
(m−1) log k < 1.
where ρ ≡ 1 + log(1−k−(m−1))
Thus, we prove that under the above irreducibility assump-
tions, the error must decay subexponentially in the number
of private signals available at the leaves.
Proof:
Remark 4.6: We have P0(σ∂ø = (µ−, µ−, . . . , µ−)) >
ηk. It follows that we must have fø(µ−, µ−, . . . , µ−) = 0
(else the probability of error is bounded below by ηk/2 for
any t). Similarly, we must have fø(µ+, µ+, . . . , µ+) = 1. In
particular, µ− 6= µ+.
Lemma 4.7: If Assumption 2 holds, then for a node i at
any level τ > τp, we have P0(σi = µ) > 0 for all µ ∈ M.
It follows from Assumption 2 that for any µ ∈
M, there is some α ∈ Mk such that f (αµ) = µ. We prove
the lemma by induction on the level τ. Let
Sτ ≡ For node i at level τ, P0(σi = µ) > 0 for all µ ∈ M.
By assumption, Sτp holds. Suppose Sτ holds. Consider node
i at
level τ + 1. Consider any µ ∈ M. By inductive
hypothesis, we have P0(σ∂i = αµ) > 0. It follows that
P0(σi = µ) > 0. Thus, Sτ +1 holds.
Lemma 4.8 can be thought of as a quantitative version of
Lemma 4.7, showing that the probability of the least frequent
message decays subexponentially.
Lemma 4.8: Suppose Assumptions 1, 2 and 3 are satisfied.
Fix s ∈ {0, 1}. Consider a node i at
level τ. Define
ζτ ≡ minµ∈M P(σi = µHs). Let τ∗ = max(τp, τd)
(cf. Assumptions 2, 3). Let d = diameter(G). There exists
C′ ≡ C′(f, m, k) < ∞ such that for any a ∈ N ∪ {0} and
b ∈ {0, 1, . . . , d − 1}, we have,
ζτ∗+ad+b ≥ exp(cid:8)−C′(kd − 1)a(cid:9)
(29)
Proof: Assume H0 holds, i.e. s = 0. The proof for
s = 1 is analogous.
We prove that, in fact, the following stronger bound holds:
− log(ζτ∗+ad+b) ≤ C′(kd − 1)a − log(1/η)/(kd − 2) .
(30)
We proceed via induction on a. First consider a = 0.
Consider a node i at level τ∗ + b for b ∈ {0, 1, . . . , d −
1}. Consider the descendants of node i at level τ∗. For any
µ ∈ M, we know from Lemma 4.7 that there must be some
assignment of messages to the descendants, such that σi = µ.
It follows that
ζτ∗+b ≥ ζkb
τ∗
(31)
Thus, choosing C′ = kd−1(− log ζτ∗ ) + log(1/η)/(kd − 2),
we can ensure that Eq. (30) holds for a = 0 and all b ∈
{0, 1, . . . , d − 1}.
Now suppose Eq. (30) holds for some a ∈ N ∪ {0}.
Consider a node i at level τ∗ + (a + 1)d + b. Let D be the
set of descendants of node i at level τ∗ + ad + b. Note that
D = kd. Consider any µ ∈ M. By Assumption 1, there is
a directed path in G of length at most d going from µ to µ−.
By Remark 4.6, we know that (µ−, µ−) ∈ E. It follows that
there is a directed path in G of length exactly d going from
µ to µ−. Thus, there must be an assignment of messages σD
to nodes in D, including at least one occurrence of µ−, such
that σi = µ. Using Assumption 3, we deduce that
ζτ∗+(a+1)d+b ≥ ηζkd−1
τ∗+ad+b
Rewriting as
− log ζτ∗+(a+1)d+b ≤
(kd − 1)(− log ζτ∗+ad+b) + log(1/η) ,
and combining with Eq. (30), we obtain
− log(ζτ∗+(a+1)d+b) ≤
C′(kd − 1)a+1 − log(1/η)/(kd − 2) .
Induction completes the proof.
Theorem 4.4 follows.
Proof: [Proof of Theorem 4.4] Assume H0. From
Lemma 4.8,
P0(σ∂ø = (µ+, µ+, . . . , µ+)) ≥ exp(cid:8)−C′kρad(cid:9)
≥ exp(cid:8)−Cnρ(cid:9)
for C ≡ C′kρ(τ∗+d−1). It follows that
(32)
(33)
Similarly,
P0(σø = 1) ≥ exp(cid:8)−Cnρ(cid:9) .
P1(σø = 0) ≥ exp(cid:8)−Cnρ(cid:9) .
The result follows.
Remark 4.9: For the scheme presented in Section IV-A,
we have d ≈ logk m, where d = diameter(G). For any ǫ > 0,
Theorem 4.4 provides a lower bound on error probability
with ρ ≤ 1 − C1/m1+ǫ for some C1 ≡ C1(k, ǫ) > 0. This
closely matches the m dependence of the upper bound on
error probability we proved in Theorem 4.2.
C. Discussion of the irreducibility assumptions
We already mentioned that the efficient node-oblivious
rule presented in Section IV-A satisfies all of Assumptions
1, 2 and 3. Moreover, it is natural to expect that similar
schemes based on propagation of quantized likelihood ratio
estimates should also satisfy our assumptions. In this section,
we further discuss our assumptions taking the cases of binary
and ternary messages as examples.
1) Binary messages: Binary messages are not the focus
of Section IV-B. However, we present here a short discussion
of Assumptions 1, 2 and 3 in the context of binary messages
for illustrative purposes.
Claim: If m = 2, each of the irreducibility assumptions
must be satisfied by any node-oblivious rule for which error
probability decays to 0 with t.
Proof of Claim: Call the messages M = {0, 1}. Consider a
node-oblivious decision rule vector (f, g, h) such that error
probability decays to 0 with t. Then g cannot be a constant
function (e.g., identically 0), since this leads to Perr ≥ 1/2.
Suppose Assumption 1 is violated. Without loss of gen-
erality, suppose (0, 1) /∈ E. Then f (α) = 1 for all α 6=
(0, 0, . . . , 0). It follows that for node i at level τ, we have
Ps(σi = 0) ≤ exp(−Θ(kτ )) t→∞−→ 0 ,
(34)
for both s = 0 and s = 1. In particular, Perr is bounded
away from 0. This is a contradiction.
Suppose Assumption 2 is violated. Then, wlog, all nodes
at level 1 transmit the message 1 almost surely, under either
hypothesis. Thus, all useful information is lost and Perr ≥
1/2. This is a contradiction.
Finally, we show that Assumption 3 must hold as well.
Define ξτ ≡ P0(σi = 0) for node i at level t. Wlog,
suppose ξτ ≥ 1/2 occurs infinitely often. Then we have
h(0, 0, . . . , 0) = 0, else Perr ≥ 2−k−1 for infinitely many
t. Define bξτ ≡ P1(σi = 0) for node i at level t. If bξτ ≥
1/2 occurs infinitely often, then it follows that P1(σ∂ø =
(0, 0, . . . , 0)) ≥ 2−k and hence P1(σø = 0) ≥ 2−k occur
for infinitely many t. So we can have bξτ ≥ 1/2 only
finitely many times. Also, h(1, 1, . . . , 1) = 1 must hold. It
follows that ξτ < 1/2 occurs only finitely many times. Thus,
Assumption 3 holds with η = 1/2.
2) Ternary messages: By Theorem 4.2, the scheme pre-
sented in Section IV-A achieves Perr = exp{−Ω({2k/3}t}
in the case of ternary messages.
We first show that if Assumption 2 is violated, then Perr =
exp{−O({(k + 1)/2}t)}. If Assumption 2 does not hold,
then only at most two letters are used at each level. It follows
that we can have a (possibly node-dependent) scheme with
binary messages that is equivalent to the original scheme at
levels 1 and higher. Our lower bound on Perr then follows
from Theorem 3.1. Thus, even in the best case, performance
is significantly worse than the scheme presented in Section
IV-A. So a good scheme for ternary messages must satisfy
Assumption 2.
Now consider Assumption 1. Let M = {−1, 0, 1}. Sup-
pose Assumption 1 is violated. Then wlog, there is no path
from letter 0 to one of the other letters. It follows that under
either hypothesis, we have Ps(σi = 0) = exp{−Ω(kτ )} for
node i at level τ. Thus, the letter 0 occurs with exponentially
small probability, irrespective of s. This should essentially
reduce, then, to the case of binary messages, and we expect
performance to be constrained as above.
Finally,
consider Assumption 3. We
cannot have
h(µ, µ, µ) = 0 for all µ ∈ M, since that will lead to
P1(σø 6= s) ≥ 1/9 for all t. Similarly, we can also exclude
the possibility h(µ, µ, µ) = 1 for all µ ∈ M. Wlog, suppose
h(−1,−1,−1) = 0 and h(1, 1, 1) = 1. Now consider the
problem of designing a good aggregation protocol. By the
above, we must have P1(σi = −1) and P0(σi = 1), for
node i at level τ, to each converge to 0 with increasing
τ. Further, it appears natural to use the message µ = 0
with an interpretation of 'not sure' in such a situation. We
would then like the probability of this intermediate symbol
to decay with τ, or at least be bounded in the limit, i.e.,
Ps(σi = 0) < 1 for each possible s. If this
lim supτ →∞
holds, we immediately have Assumption 3 (with µ− = −1
and µ+ = 1).
3) Need for assumptions: We argued above that our
irreducibility assumptions are quite reasonable in various cir-
cumstances. In fact, we expect the assumptions to be a proof
artifact, and conjecture that a subexponential convergence
bound holds for general node-oblivious rules. A possible
approach to eliminate our assumptions would be to prune the
message alphabet M, discarding letters that never appear, or
appear with probability bounded by exp(−Ω(kt)) (because
they require descendants from a strict subset of M).
REFERENCES
[1] A. Dembo and O. Zeitouni, Large Deviations Theory and Applications
Techniques and Applications, Springer 1998
[2] M. Ledoux, The Concentration of Measure Phenomenon, American
Mathematical Society, 2005
[3] D. P. Dubhashi and a. panconesi, Concentration of Measure for the
Analysis of Randomized Algorithms, Cambridge University Press,
2009
[4] Y. Kanoria and A. Montanari, unpublished (2011)
[5] W. P. Tay, J. N. Tsitsiklis, and M. Z. Win, Bayesian Detection
in Bounded Height Tree Networks, IEEE Transactions on Signal
Processing, vol. 57, no. 10, Oct. 2009.
[6] M. E. Hellman and T. M. Cover, Learning with Finite Memory, The
Annals of Mathematical Statistics, vol. 41, no. 3, Jun. 1970, 765-782
[7] T. M. Cover, Hypothesis testing with finite statistics, The Annals of
Mathematical Statistics, vol. 40, no. 3, Jun. 1969, 828-835
[8] J. Koplowitz, Necessary and sufficient memory size for m-hypothesis
testing, IEEE Trans. on Inform. Theory, vol. 21, no. 1, Jan. 1975,
44-46
[9] W. P. Tay, J. N. Tsitsiklis, and M. Z. Win, On the sub-exponential
decay of detection error probabilities in long tandems, IEEE Trans.
on Inform. Theory, vol. 54, no. 10, pp. 4767-4771, Oct. 2008.
[10] P. Gupta and P. R. Kumar, The capacity of wireless networks, IEEE
Trans. on Inform. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
[11] D. Acemoglu, M.A. Dahleh, I. Lobel, and A. Ozdaglar, Bayesian
Learning in Social Networks, LIDS report 2780, to appear in Review
of Economic Studies, 2010.
[12] M. E. J. Newman, D. J. Watts and S. H. S. Strogatz, Random graph
models of social networks, Proc. Natl. Acad. Sciences, vol. 99, 2566-
2572, 2002
[13] N. Berger, C. Borgs, J. T. Chayes, A. Saberi, A Weak Local Limit for
Preferential Attachment Graphs, 2009
[14] J.N. Tsitsiklis, Extremal Properties of Likelihood-Ratio Quantizers,
IEEE Transactions on Communications, Vol. 41, No. 4, 1993, pp.
550-558.
|
1505.03996 | 2 | 1505 | 2016-04-21T08:30:04 | Norm Monitoring under Partial Action Observability | [
"cs.MA",
"cs.AI"
] | In the context of using norms for controlling multi-agent systems, a vitally important question that has not yet been addressed in the literature is the development of mechanisms for monitoring norm compliance under partial action observability. This paper proposes the reconstruction of unobserved actions to tackle this problem. In particular, we formalise the problem of reconstructing unobserved actions, and propose an information model and algorithms for monitoring norms under partial action observability using two different processes for reconstructing unobserved actions. Our evaluation shows that reconstructing unobserved actions increases significantly the number of norm violations and fulfilments detected. | cs.MA | cs | Norm Monitoring under Partial Action Observability
Natalia Criado and Jose M. Such, Member, IEEE
1
6
1
0
2
r
p
A
1
2
]
A
M
.
s
c
[
2
v
6
9
9
3
0
.
5
0
5
1
:
v
i
X
r
a
Abstract -- In the context of using norms for controlling multi-
agent systems, a vitally important question that has not yet been
addressed in the literature is the development of mechanisms for
monitoring norm compliance under partial action observability.
This paper proposes the reconstruction of unobserved actions to
tackle this problem. In particular, we formalise the problem of
reconstructing unobserved actions, and propose an information
model and algorithms for monitoring norms under partial action
observability using two different processes for reconstructing
unobserved actions. Our evaluation shows that reconstructing
unobserved actions increases significantly the number of norm
violations and fulfilments detected.
Index Terms -- Norm Monitoring, Action Observability.
I. INTRODUCTION
Within the Multi-agent System (MAS) area, norms are
understood as means to coordinate and regulate the activity
of autonomous agents interacting in a given social context
[19]. The existence of autonomous agents that are capable
of violating norms entails the development of norm control
mechanisms that implement norms in agent societies.
In the existing literature, several authors have proposed
infrastructures to observe agent actions and detect norm viola-
tions upon them [1], [21]. The majority of these proposals have
focused on providing efficient and scalable methods to monitor
norms in dynamic agent societies, but they assume that all
actions of agents are observable. However, this assumption is
too strong because it is not necessarily true that all actions to
be controlled can always be observed. One reason for this is
that observing actions usually entails high costs. For example,
the costs of setting, maintaining, and managing traffics radars
to detect car speeds are very high, so traffic authorities usually
decide to install a few of them in specific and critical locations.
Another reason is that illegal actions may take place outside
the institution controlled by the monitor; however, the effects
of these actions can still be detected within the institution.
For example, black market transactions cannot be directly
observed by legal authorities, yet the corresponding money
laundering transactions can be detected and sanctioned by
these authorities.
Very recent work on norm monitoring under partial action
observability proposes solutions to ensure complete action
observability by increasing the actions that are observed, either
by adding more monitors [5] or by adapting the norms to
what can be observed [2]. However, these solutions are not
always appropriate or feasible. For instance, in e-markets, such
as eBAY1 or Amazon2, it is not possible to change trading
N. Criado is with the School of Computing and Mathematical Sciences,
Liverpool John Moores University, UK, e-mail: [email protected].
J. M. Such is with the School of Computing and Communications Info-
lab21, Lancaster University, UK, email:[email protected].
1http://www.ebay.com
2http://www.amazon.com
laws to what can be observed. This paper goes beyond these
approaches by also considering actions that were not observed
but that can be reconstructed from what was observed.
The main contributions of this paper are: (i) a formalisation
of the problem of reconstructing unobserved actions from
observed actions for the purpose of norm monitoring; (ii) an
exhaustive and an approximation solution to this problem; and
(iii) an information model and algorithms used to monitor
norms under partial action observability. Through an extensive
empirical evaluation, we show that reconstructing unobserved
actions increases noticeably the number of norm violations
and fulfilments detected.
This paper is organised as follows: Section II contains the
preliminary definitions used in this paper. Section III describes
the information model of norm monitor proposed in this
paper. Section IV contains the algorithms executed by norm
monitors. Our proposal is evaluated in SectionV. Related word
is discussed in Section VI. Finally, conclusions are contained
in Section VII.
II. PRELIMINARY DEFINITIONS
L is a first-order language containing a finite set of predicate
and constant symbols, the logical connective ¬, the equality
(inequality) symbol = ((cid:54)=), the true ((cid:62)) and false propositions
(⊥), and an infinite set of variables. The predicate and con-
stant symbols are written as any sequence of alphanumeric
characters beginning with a lower case letter. Variables are
written as any sequence of alphanumeric characters beginning
with a capital letter. We also assume the standard notion of
substitution of variables [13]; i.e., a substitution σ is a finite
and possibly empty set of pairs Y /y where Y is a variable
and y is a term.
The set of grounded atomic formulas of L is built of a finite
set of predicates and objects that characterise the properties
of the world relevant to norm monitoring. By a situation,
we mean the properties that are true at a particular moment.
Some of these properties are static and not altered by action
execution, whereas other properties are dynamic and changed
due to agent actions. Specifically, we represent static properties
as a set3 of atomic grounded formulas of L, denoted by g. A
state s is a set of grounded atomic formulas of L, describing
dynamic properties which hold on state s. Thus, a situation is
built on a "closed assumption" and defined by a set of static
properties g and a state s. Moreover, there is a set of inference
rules ((cid:79)) representing domain knowledge.
EXAMPLE.
In this paper we will use a running example
in which there are three robots that should attend requests at
six offices in a building. The goal of the robots is to attend
these requests as soon as possible. Figure 1a depicts our initial
3In this paper sets are to be interpreted as the conjunction of their elements.
(a) Initial State s0
(b) State s1
(c) State s2
Fig. 1: Example Scenario. Offices are represented by squares,
agents are represented by circles and the corridors are rep-
resented by arrows. Black arrows correspond to corridors ob-
served by the Norm Monitor (NM) and grey arrows correspond
to corridors not observed by the NM.
scenario. In our example, the language L contains: 4 pred-
icate symbols (robot, office, in, corridor), used to represent
the robots and offices, the positions of the robots and the
connections between offices in the building; 3 constant symbols
to represent the robots (r1, r2, r3); and 6 constant symbols
to represent the offices (a, b, c, d, e, f). The information about
the robots, offices and corridors between offices is static and
represented as follows:
g = {robot(r1), robot(r2), robot(r3), office(a), ..., office(f ),
corridor(a, b), corridor(b, a), ..., corridor(e, a)}
The information about the location of the robots is dynamic.
Specifically, the initial state s0 is defined as follows:
s0 = {in(r1, a), in(r2, d), in(r3, e)}
In this domain there is an inference rule ((cid:79)) representing that
a robot cannot be in two different offices at the same time:
(cid:79) = {{in(R1, OA), in(R1, OB), OA (cid:54)= OB} (cid:96) ⊥}
A. Action Definitions
D is a finite set of action descriptions that induce state
transitions. An action description d is represented using pre-
conditions and postconditions. If a situation does not satisfy
the preconditions, then the action cannot be applied in this
situation. In contrast, if the preconditions are satisfied, then
the action can be applied transforming the current state into
a new state in which all negative literals appearing in the
postconditions are deleted and all positive literals in the
postconditions are added. Moreover, actions are executed in a
MAS and, as a consequence, we need to be able to represent
concurrent actions with interacting effects. For the sake of
simplicity, we will represent concurrent actions without an ex-
plicit representation of time4 as proposed in [4]. The main idea
beyond this representation is that individual agent actions do
interact (i.e., one action might only achieve the intended effect
if another action is executed concurrently). Specifically, each
action is also represented by a (possibly empty) concurrent
4An explicit representation of time may play a role on other problems like
scheduling concurrent actions, but is not strictly necessary for monitoring the
effects of interaction.
2
condition that describes the actions that must (or cannot) be
executed concurrently5.
Definition 1. An action description d is a tuple (cid:104)name,
pre, con, post(cid:105) where:
• name is the action name;
• pre is the precondition, i.e., a set of positive and negative
literals of L (containing both dynamic and static prop-
erties) as well as equality and inequality constraints on
the variables;
• con is the concurrent condition; i.e., a set of positive and
negative action schemata6, some of which can be partially
instantiated or constrained;
• post is the postcondition; i.e., a set of positive and
negative literals of L (containing dynamic properties
only).
Given an action description d, we denote by pre(d), con(d),
post(d) the action precondition, concurrent condition and
postcondition.
EXAMPLE.
(cid:28) move,{robot(R), office(O1), office(O2), in(R, O1),
In our example, there is only one action that
can be executed by robots:
corridor(O1, O2)},{},{¬in(R, O1), in(R, O2)}
(cid:29)
This action represents the movement of a robot from one office
to another. The parameters of this action are the robot (R),
the source office (O1), the destination office (O2). To execute
this action, the robot should be located at the source office
and the two offices should be connected. Once the operation
has been applied, the robot is no longer at the source office
and it is at the destination office.
Definition 2. Given a situation represented by the state s and
a set of static properties g, and an action description d =
(cid:104)name, pre, con, post(cid:105); an action instance (or action) is a
tuple (cid:104)name, pre(cid:48), con(cid:48), post(cid:48)(cid:105) such that:
• There is a substitution σ of variables in pre, such that the
precondition is satisfied (i.e., entalied by) the situation;
i.e., s, g (cid:96) σ · pre;
dynamic properties only;
• σ · pre, σ · post are grounded;
• pre(cid:48) is a set of grounded literals in σ · pre containing
• post(cid:48) = σ · post and con(cid:48) = σ · con.
Given an action a, we denote by actor(a) the agent
performing the action, and by pre(a), con(a), post(a) the
precondition, concurrent condition and postcondition.
office b. This is formalised as follows:
EXAMPLE. In state s0, the robot r1 moves from office a to
(cid:28) move,{robot(r1), office(a), office(b), in(r1, a),
(cid:29)
corridor(a, b)},{},{¬in(r1, a), in(r1, b)}
5A more sophisticated definition of the concurrent condition would allow
actions to have conditional effects according to the actions that are executed
concurrently. Without loss of expressiveness, we will not consider conditional
effects in action descriptions (note that any action with conditional effects can
be represented by a set of actions with non conditional effects).
6An action schema contains an action name and the parameters of this
action. Note that positive action schemata are implicitly existentially quantified
-- i.e., one instance of each positive schema must occur concurrently -- and
negative schemata are implicitly universally quantified.
abcdefr1r2r3abcdefr1r2r3abcdefr1r2r3In a MAS, concurrent actions7 define state transitions. More
formally, a concurrent action A = {a1, ..., an} is a set of
individual actions. Given a set of actions A = {a1, ..., an},
we define pre(A) = (cid:83) pre(ai), post(A) = (cid:83) post(ai) and
actor(A) =(cid:83) actor(ai).
Given a concurrent action A = {a1, ..., an} we say that the
concurrent condition of an individual action ai of A is satisfied
when for all positive schema in the concurrent condition exists
an action aj (i (cid:54)= j) in A, such that aj is an instance of the
schema; and for all negative schema none of the elements in
A is an instance of the schema. For the sake of simplicity, we
assume that each agent performs one action at a time8.
Definition 3. (Consistency [4]) Given a concurrent action
A = {a1, ..., an} it is consistent if:
• pre(A) is consistent (i.e, pre(A) (cid:54)(cid:96) ⊥);
• post(A) is consistent (i.e, post(A) (cid:54)(cid:96) ⊥);
• the concurrent condition of each action is satisfied;
• the concurrent action is complete (i.e., each agent per-
forms one action in A).
move(r2, d, a), move(r3, e, a)}9 is consistent since:
EXAMPLE. The concurrent action A = {move(r1, a, b),
• pre(A) = {in(r1, a), in(r2, d), in(r3, e)} which is con-
• post(A) = {in(r1, b), in(r2, a), in(r3, a),¬in(r1, a),
sistent;
¬in(r2, d),¬in(r3, e)} which is consistent;
• the concurrent conditions of both actions are satisfied;
• each robot performs one action.
A concurrent action A = {a1, ..., an} is applicable in a
situation if A is consistent and each individual action ai ∈ A
is applicable in this situation.
Given a consistent action, we define its effects as the
postconditions of its individual actions and the preconditions
not invalidated by the postconditions. More formally, given
a concurrent action A = {a1, ..., an} its effects are a set of
grounded literals as follows:
(cid:91)
(cid:91)
(cid:91)
eff (A) = (
∀pre∈pre(A):
pre,post(A)(cid:54)(cid:96)⊥
pre)
(
∀post∈post(A)
post)
B. Norm Definitions
We consider norms as formal statements that define patterns
of behaviour by means of deontic modalities (i.e., obligations
and prohibitions). Specifically, our proposal is based on the
notion of norm as a conditional rule of behaviour that defines
under which circumstances a pattern of behaviour becomes
relevant and must be fulfilled [21], [29], [19], [11].
Definition 4. A norm is defined as a tuple (cid:104)deontic,
condition, action(cid:105), where:
• deontic ∈ {O,P} is the deontic modality of the norm,
determining if the norm is an obligation (O) or prohibi-
tion (P);
7Concurrent action means actions that occur at the same time and does not
necessarily imply agent cooperation or coordination.
8This limitation can be relaxed by decomposing agents into groups of agents
corresponding to agents' actuators [4].
9For simplicity, we represent actions by their schemata.
3
• condition is a set of literals of L as well as equality and
inequality constraints that represents the norm condition,
i.e., it denotes the situations in which the norm is relevant.
• action is a positive action schema that represents the
action controlled by the norm.
EXAMPLE.
In our example, there is a norm that avoids
collisions by forbidding any robot to move into an office when
the office is occupied by another robot:
(cid:104)P, in(R1, L2), move(R2, L1, L2)(cid:105)
This norm states that when a robot R1 is located in office O2
other robots are forbidden to move from any office L1 to L2.
In line with related literature [1], [20], [2], we consider a
closed legal system, where everything is considered permitted
by default, and obligation and prohibition norms define ex-
ceptions to this default permission rule. We also define that a
norm is relevant to a specific situation if the norm condition
is satisfied in the situation. Besides, we define that a norm
condition is satisfied in a given situation when there is a
substitution of the variables in the norm condition such that the
constraints in the norm condition are satisfied and the positive
(vs. negative) literals in the norm condition are true (vs. false)
in the situation.
Definition 5. Given a specific situation denoted by a state s
and a set of static properties g, and a norm (cid:104)deontic,
condition, action(cid:105);
a
(cid:104)deontic, action(cid:48)(cid:105) such as:
norm instance
tuple
is
a
satisfied in the situation; i.e., s, g (cid:96) σ · condition;
• There is a substitution σ such that
• action(cid:48) = σ · action.
EXAMPLE. In state s0 the norm that forbids robots to move
the condition is
into occupied offices is instantiated as follows:
(cid:104)P, move(R2, L1, d)(cid:105) where σ = {L2/d}
(cid:104)P, move(R2, L1, a)(cid:105) where σ = {L2/a}
(cid:104)P, move(R2, L1, e)(cid:105) where σ = {L2/e}
The semantics of instances (and norms in general) depends
on their deontic modality. An obligation instance is fulfilled
when the mandatory action is performed and violated other-
wise, while a prohibition instance is violated when the forbid-
den action is performed and fulfilled otherwise. We classify
detected violations (vs. fulfilments) into: identified violations
(vs. fulfilment), which refers to when the monitor knows the
specific action that an agent executed and violates (vs. fulfils)
an instance; and discovered violations (vs. fulfilment), which
refers to when the monitor knows that an agent violated (vs.
fulfilment) some instance but does not know the forbidden (vs.
mandatory) action executed by the agent.
III. NM INFORMATION MODEL
Let us assume a set of agents Ag to be monitored, a set
of norms N that regulate the actions of agents, and a set D
of action descriptions that represent the actions that can be
performed by agents. For the sake of simplicity, we assume
that there is a single Norm Monitor (NM) that observes the
actions performed by agents and monitors norm compliance10.
We also assume that actions are deterministic and that the
current state evolves due to action execution only11. The
goal of the NM is to analyse a partial sequence of action
observations to detect norm violations. The enforcement of
norms is out of the scope of this work and we assume that once
the NM detects a norm violation (vs. fulfilment), it applies the
corresponding sanction (vs. reward).
A. State Representation
As the NM only observes a subset of the actions performed
by agents, it has partial information about the state of the
world. The NM represents each partial state of the world,
denoted by p, using an "open world assumption" as a set
of grounded literals that are known in the state. Thus, a
partial state contains positive (vs. negative) grounded literals
representing dynamic properties known to be true (vs. false)
in the state. The rest of dynamic properties are unknown.
To begin with, assume that the NM monitor has complete
knowledge of the initial state (this will be relaxed later). Thus,
at t0 the NM knows which grounded atomic formulas are true
or false in the initial state (p0 ≡ s0). From that moment on,
the NM monitors the actions performed by agents at each
point in time. At time t0 the NM carries out a monitoring
activity and observes some of the actions performed by agents
(Act0). These actions have evolved s0 into a new state s1.
As previously mentioned, the NM has limited capabilities for
observing the actions performed by agents. Thus, it is possible
that
the NM observes a subset of the actions performed
by agents. Specifically,
if all actions have been observed
(Act0 = Ag), then the resulting partial state p1 can be
constructed by considering the effects of actions in Act0 on
p0 so p1 ≡ s1. A different case arises when the NM observes a
subset of the actions performed by the agents (Act0 < Ag).
In this case, the agent cannot be sure about the effects of un-
observed actions. Thus, the new partial state p1 is constructed
by assuming that the postconditions of the observed actions
must hold on state s1 (i.e., positive postconditions are positive
literals in p1 and negative postconditions are negative literals
in p1) and the rest of dynamic propositions are unknown. If
the NM takes into account the next sequence of actions that
it observes at time t1 (Act1), then the NM can also infer that
the preconditions of these actions must hold on state s1, and,
as a consequence, new propositions can be taken for sure in
the partial state p1, retrospectively. Partial states in the general
case are defined as:
Definition 6. Given a partial state description pt correspond-
ing to time t, and two consecutive sequences of observed
actions Actt and Actt+1 executed by agents at times t and
t + 1, respectively; the new partial state pt+1 resulting from
executing actions Actt in pt and actions Actt+1 in pt+1 is
obtained as follows:
(cid:26) post(Actt)(cid:83) pre(Actt+1)
(cid:83) eff (Actt)(cid:83) pre(Actt+1) otherwise
p∗
if Actt < Ag
pt+1 =
t
10However, our model can be used by a team of monitors as well.
11This assumption could be relaxed if NMs have capabilities for observing
both state changes and actions.
4
where p∗
t is the set of invariant literals; i.e., literals of pt that
have not been modified by the actions in Actt and it is defined
as follows:
(cid:91)
p∗
t =
l
∀l∈pt:
l,eff (Actt)(cid:54)(cid:96)⊥
EXAMPLE. In our example, the NM knows which grounded
atomic formulas are true or false in the initial state:
p0 = {in(r1, a),¬in(r1, b),¬in(r1, c),¬in(r1, d),¬in(r1, e),
¬in(r1, f ), in(r2, d),¬in(r2, a),¬in(r2, b),¬in(r2, c),
¬in(r2, e),¬in(r2, f ), in(r3, e),¬in(r3, a),¬in(r3, b),
¬in(r3, c),¬in(r3, d),¬in(r3, f )}
The NM has some surveillance cameras to monitor the move-
ment of robots in the building. Specifically, the corridors that
are monitored are the ones between offices: a and b; b and c;
and b and f. These corridors are represented by black arrows
in Figure 1, whereas non-monitored corridors are represented
by grey arrows. In the initial state (s0) depicted in Figure 1a,
the robots execute the actions move(r1, a, b), move(r2, d, a)
and move(r3, e, a) resulting in a new state (s1) depicted
in Figure 1b. However, the NM only observes the action of
robot r1, because this action takes place in a monitored
corridor; i.e., Act0 = {move(r1, a, b)}. In the next state
s1, the robots execute actions move(r1, b, c), move(r2, a, e)
and move(r3, a, b) resulting in a new state (s2) depicted in
Figure 1c. In this case the NM observes two actions; i.e.,
Act1 = {move(r1, b, c), move(r3, a, b)}. Considering these
two sets of observed actions the NM is able to infer the
dynamic propositions that are known in s1 as follows:
p1 = {in(r1, b),¬in(r1, a), in(r3, a)}
If the NM uses the information about the states and the
observed actions, then no violation of the norm is detected and
no robot is sanctioned. However, r2 and r3 have violated the
norm, since they have moved into an occupied office through
non-monitored corridors.
B. Action Reconstruction
NMs use Definition 6 to generate partial state descriptions
based on the observed actions. Additionally, we propose that
NMs reconstruct the actions that have not been observed. This
reconstruction process entails: (i) searching for the actions that
have been performed by unobserved agents; and (ii) using the
actions found to increase the knowledge about the state of
the world. The reconstruction process must be sound, e.g.,
it cannot indicate that a violation has occurred when it has
not in fact occurred. In the following, we introduce full and
approximate methods for reconstructing unobserved actions.
1) Full Reconstruction: Full reconstruction tries to find
exhaustively the actions performed by all
the agents that
have not been observed. To this aim, the full reconstruction
performs a search to identify all solutions to the reconstruction
problem.
Definition 7. Given a partial state description pt correspond-
ing to time t (named initial state), a set of observed actions
Actt at time t, and an partial resulting state pt+1 correspond-
ing to time t + 1 (named final state); we define search as a
function that computes sets of solutions S = {S1, ..., Sk} such
that each solution Si in S is a set of actions such that:
• the concurrent action Si ∪ Actt is consistent;
• the initial state induced by the concurrent action Si∪Actt
is consistent (i.e., g, pt, pre(Si ∪ Actt), (cid:79) (cid:54)(cid:96) ⊥);
• the final state induced by the concurrent action Si∪ Actt
is consistent (i.e., g, pt+1, post(Si ∪ Actt), (cid:79) (cid:54)(cid:96) ⊥).
Thus, a solution is a set of actions performed by the agents
that have not been observed12 that are consistent with the states
of the world before and after the execution of the actions.
Given that the NM has a partial knowledge of the states, we
do not require that the preconditions (vs. postconditions) of
actions in a solution are met in the initial (vs. final) state,
since it is possible that the preconditions (vs. postconditions)
are true, but the NM is unaware of it.
EXAMPLE. Given the partial state description p0,
the
set of observed actions Act0, and the partial resulting state
p1, the search function looks for actions of agents r2 and
r3 (since they are the agents that have not been observed).
According to the initial position of r2, the NM can infer that r2
may have performed two different actions move(r2, d, a) and
move(r2, d, e) -- these two actions are the only ones consistent
with p0. Similarly, the NM can infer that r3 may have per-
formed three different actions move(r3, e, a), move(r3, e, d)
and move(r3, e, f ) -- these three actions are the only ones
consistent with p0. However, the actions move(r3, e, d) and
move(r3, e, f ) are not consistent with the final state -- recall
that these two actions have as postcondition the fact that r3
is in offices d and f, respectively; that p1 defines that r3 is in
office a; and that (cid:79) defines as inconsistent states where any
robot is at two different locations. As a result, the solution set
for this problem is defined as:
S = {{move(r2, d, a), move(r3, e, a)},
{move(r2, d, e), move(r3, e, a)}}
Once all solutions are found, the NM uses this information
to extend the information about the actions performed by
unobserved agents and the state of the world. To ensure that
the reconstruction is sound, the NM calculates the intersection
of actions in the solutions to select actions it is completely sure
about (i.e., actions belonging to all solutions). Given a set of
search solutions S = {S1, ..., Sk} for some initial and final
states, we define the reconstruction action set as follows:
(cid:92)
R =
Si
∀Si∈S
If R (cid:54)= ∅, then the NM expands its knowledge about the
actions performed by agents and it uses this information to
increase the knowledge about the initial and final states. More
formally, the set of actions observed in t is updated as:
Actt = Actt ∪ R
12If all actions were observed, no reconstruction would be needed.
5
The initial state pt is updated as follows:
pt = pt
(cid:91)
(cid:83) post(R)(cid:83) p•
(cid:83) eff (Actt)
(cid:83) p∗
t
t
pre(R)
(cid:26) pt+1
Finally, the final state is updated as follows:
if Actt < Ag
otherwise
pt+1
t is defined as before and p•
pt+1 =
where p∗
t is the set of extended
invariant literals; i.e., literals in pt that have not been modified
since there is not a solution Si ∈ S such that the concurrent
action Si ∪ Actt changes any of these literals:
l
(cid:91)
p•
t =
∀l∈pt:
(cid:64)Si∈S:l,post(Actt∪Si)(cid:54)(cid:96)⊥
EXAMPLE. The reconstruction set for the example is:
R = {move(r3, e, a)}
This action belongs to all solutions, so the NM can be
absolutely sure about the performance of this action, even
when the NM has not observed it. As a consequence, the NM
extends its information as follows:
Act0 = {move(r1, a, b), move(r3, e, a)}
and p0 remains unchanged and p1 is updated as follows:
p1 = {in(r1, b),¬in(r1, a),¬in(r1, c),¬in(r1, d),¬in(r1, e),
¬in(r1, f ),¬in(r2, b),¬in(r2, c),¬in(r2, f ), in(r3, a),
¬in(r3, b),¬in(r3, c),¬in(r3, d),¬in(r3, e),¬in(r3, f )}
The main disadvantage of full reconstruction is that, for
many real-world problems, the number of candidate solutions
that needs to be explored is prohibitively large, as shown
later in Section IV. In response to this problem, we provide a
polynomial approximation below.
2) Approximate Reconstruction: Approximate reconstruc-
tion includes an approximate search that finds the actions
performed by unobserved agents that are consistent with
the states of the world before and after action execution.
Specifically, approximate reconstruction identifies actions that
do not necessarily include the specific actions performed by
unobserved agents but that allow the NM to control norms.
The main intuition beyond approximate reconstruction is as
follows: imagine that at a given initial state an agent can
perform just one action and that this action is forbidden (vs.
mandatory). In this case, the NM identifies that the agent
has violated (vs. fulfilled) a norm. Besides that, if an agent
can perform n different actions and all
these actions are
forbidden (vs. mandatory), the NM does not need to know
which action has been executed to conclude that a norm has
been violated (vs. fulfilled)13. Hence, we say that a violation
has been discovered (instead of identified). Given a set of
13Note that the propose of this paper is to monitor norms, not to determine
whether agents are responsible for norm violations/fulfilments. Monitoring
situations where agents can only execute forbidden/obligatory actions can
help to detect norm-design problems. Additionally, the fact that an agent can
only execute forbidden actions may be explained by the agent putting itself
into these illegal situations (e.g., I am allowed to overtake but overtaking may
put me in a situation where I can only exceed the speed limit).
prohibition instances P and an action a, we define that the
action a is forbidden (denoted by f orbidden(P, a)) when
∃p ∈ P : ∃σ : σ · action(p) = a. Similarly, given a set of
obligation instances O and an action a, we define that the
action a is mandatory (denoted by mandatory(O, a)) when
∃o ∈ O : ∃σ : σ · action(o) = a.
Definition 8. Given a partial state pt, a set of observed actions
Actt at time t, and a partial resulting state pt+1; we define
approximate search as a function that calculates the set of all
unobserved applicable actions (cid:101)S = {ai, ..., an} such that:
• the preconditions of each action in (cid:101)S are consistent with
the initial state (i.e., ∀ai ∈ (cid:101)S : g, pt, pre(ai), (cid:79) (cid:54)(cid:96) ⊥);
• the postconditions of each action in (cid:101)S are consistent with
the final state (i.e., ∀ai ∈ (cid:101)S : g, pt+1, post(ai), (cid:79) (cid:54)(cid:96) ⊥);
• actions in (cid:101)S are performed by unobserved agents (i.e.,
actor((cid:101)S) ∩ actor(Actt) = ∅);
• all unobserved agents perform at least one action in (cid:101)S .
EXAMPLE. Given the partial state description p0, the set
of observed actions Act0, and the partial resulting state p1,
the approximate search function looks for actions of agents r2
and r3 (since they are the agents that have not been observed).
According to the initial position of r2, the NM can infer that
r2 may have performed two different actions move(r2, d, a)
and move(r2, d, e). Again, r3 may have performed action
move(r3, e, a). The approximate solution for this problem is
defined as:
(cid:101)S = {move(r2, d, a), move(r2, d, e), move(r3, e, a)}
solutions ((cid:101)S) to expand its knowledge about the actions per-
As in full reconstruction, the NM uses approximate search
formed by unobserved agents and to increase the knowledge
about the initial and final states. When an unobserved agent
may have executed only one action,
then the NM knows
for sure that this action was executed. More formally, the
reconstruction action set is defined as follows:
(cid:91)
∀a∈(cid:101)S:(cid:54)∃a(cid:48)∈(cid:101)S:
R =
a
a(cid:54)=a(cid:48)∧actor(a)=actor(a(cid:48))
The set of actions observed in t is updated as:
Then the initial state pt is updated as follows:
Actt = Actt ∪ R
pt = pt
(cid:91)
(cid:83) post(R)(cid:83) p◦
(cid:83) eff (Actt)
(cid:83) p∗
t
pre(R)
(cid:26) pt+1
The final state is updated as follows:
if Actt < Ag
otherwise
t
pt+1
t is defined as before and p◦
pt+1 =
where p∗
t is the set of extended
invariant literals in pt; i.e., literals that have not been modified
since there is not an observed action or an applicable action
that changes them:
(cid:32)
p◦
t =
(cid:91)
∀l∈pt:
l,post(Actt)(cid:54)(cid:96)⊥
(cid:33)(cid:92)(cid:32) (cid:91)
l,post((cid:101)S)(cid:54)(cid:96)⊥
∀l∈pt:
l
(cid:33)
l
Finally, the set of discovered violations and fulfilments is a
set of actions defined as follows:
6
D = {a1, ..., aj}
performs ai (i.e., actor(ai) ) is:
where for each action ai in D: ai is in (cid:101)S and the agent that
• able to execute more than one action (i.e., ∃aj ∈ (cid:101)S :
ai (cid:54)= aj ∧ actor(ai) = actor(aj));
• only able to execute forbidden (vs. mandatory) actions
and ai is one of these forbidden (vs. mandatory) actions;
When an agent is only able to perform forbidden (vs. manda-
tory) actions, an action among these can be selected according
to various criteria. For example, in a normative system where
the presumption of innocence principle holds, the NM should
assume that the agent has violated (vs. fulfilled) the least (vs.
most) important norm and the action that violates (vs. fulfils)
this norm is selected. Note discovering violations is very useful
in many practical applications, in which it would allow the NM
to ban offender agents (e.g., Intrusion Detection/Prevention
Systems [3]), to stop the execution of any offender agent
(e.g., Business Process Compliance monitoring [27]), or to
put offender agents under close surveillance (e.g., Model-
Based Diagnosis Systems [22]), even when the specific action
performed ins not known.
EXAMPLE.
In case of the approximate reconstruction, r3
is only able to perform one action, which entails that the NM
can be absolute sure about the performance of this action and
the reconstruction set is defined as:
R = {move(r3, e, a)}
As a consequence, the NM extends its information as follows:
Act0 = {move(r1, a, b), move(r3, e, a)}
p0 remains unchanged and p1 is updated as follows:
p1 = {in(r1, b),¬in(r1, a),¬in(r1, c),¬in(r1, d),¬in(r1, e),
¬in(r1, f ),¬in(r2, b),¬in(r2, c),¬in(r2, f ), in(r3, a),
¬in(r3, b),¬in(r3, c),¬in(r3, d),¬in(r3, e),¬in(r3, f )}
In this situation, r2 is only able to execute forbidden ac-
tions -- recall that the instances (cid:104)P, move(R2, L1, a)(cid:105) and
(cid:104)P, move(R2, L1, e)(cid:105) forbid any robot to move into offices
a and e and that r2 may have been executed actions
move(r2, d, a) and move(r2, d, e). Thus, the set of discovered
violations and fulfilments is defined as follows:
D = {move(r2, d, e)}
note that the discovered violation does not correspond to the
action executed by r2, however, it allows the NM to determine
that r2 must have violated an instance.
C. Norm Monitoring
Once all the information about the actions performed by
the agents and the partial states has been reconstructed, the
NM checks the actions of agents to determine which instances
have been violated or fulfilled. Recall
that norms in our
model are defined as conditional rules that state which actions
the state of the world,
are obligatory or forbidden. Given that the NM has partial
knowledge about
the NM should
control norms only when it is completely sure that the norms
are relevant to ensure that the norm monitoring process is
sound. In particular, we define that a norm is relevant to a
partial situation when the norm condition is satisfied by the
partial situation -- i.e., a norm (cid:104)deontic, condition, action(cid:105) is
relevant to a partial situation represented by a partial state p,
the static properties g and the domain knowledge (cid:79) if ∃σ such
that p, g, (cid:79) (cid:96) σ · condition.
EXAMPLE. In state p0 the norm that forbids robots to move
into occupied offices is instantiated three times as follows:
(cid:104)P, move(R2, L1, d)(cid:105) where σ = {L2/d}
(cid:104)P, move(R2, L1, a)(cid:105) where σ = {L2/a}
(cid:104)P, move(R2, L1, a)(cid:105) where σ = {L2/e}
Once the NM has determined which norm instances hold
in a given situation, it has to check the actions of agents to
determine which instances have been violated and which ones
have been fulfilled.
Obligation Instance. In presence of partial knowledge about
the actions performed by agents, the NM can only determine
that an obligation instance has been fulfilled. If the NM knows
all the actions performed by agents, then it can determine
whether an obligation has been fulfilled or violated.
Definition 9. Given an obligation instance (cid:104)O, action(cid:48)(cid:105) and
a set of observed actions Act, then the obligation is defined
iff ∃σ : σ · action(cid:48) ∈ Act
iff ((cid:54) ∃σ : σ · action(cid:48) ∈ Act) ∧ Act = Ag
otherwise
Prohibition Instance. In presence of partial knowledge about
the actions performed by agents, the NM can only determine
that a prohibition instance has been violated. If the NM knows
all the actions performed by agents then it can determine
whether a prohibition has been fulfilled or violated.
Definition 10. Given a prohibition instance (cid:104)P, action(cid:48)(cid:105) and
a set of observed actions Act, then the prohibition is defined
iff ∃σ : σ · action(cid:48) ∈ Act
iff ((cid:54) ∃σ : σ · action(cid:48) ∈ Act) ∧ Act = Ag
otherwise
Finally, the set of discovered violations and fulfilments is
used to identify those agents that have violated or fulfilled an
instance.
EXAMPLE. Taking into account the set of actions Act0,
the NM can identify that robot r3 has violated the in-
stance (cid:104)P, move(R2, L1, a)(cid:105), even though this forbidden ac-
tion has not been observed by the NM. Specifically, there is
σ = {R2/r3, L1/e} such that σ(move(R2, L1, a)) ∈ Act0.
Besides that, the approximate reconstruction discovers that
robot r2 has violated a prohibition instance though it doe
that D =
snot know the exact action performed -- recall
as: f ulf illed
violated
unknown
as: violated
f ulf illed
unknown
7
{move(r2, d, e)}. Had the NM not performed the proposed
reconstruction processes, none of these violations would have
been detected.
IV. NM ALGORITHMS
Algorithm 1 contains the NM pseudocode. In each step, the
NM observes the actions of agents and uses this information
to update the current and the previous partial states (lines 4-
9). If all the actions have not been observed in the previous
state,
then the NM executes the reconstruction function
to reconstruct unobserved actions (lines 11-14). Then, the
checkN orms function is executed to determine which norms
have been violated and fulfilled in the previous state (line 15)
according to Definitions 9 and 10.
Note that the NM code can be executed while actions are
performed without delaying agents. Regarding the temporal
cost of the algorithm executed by NMs, it is determined by
the cost of the reconstruction function, the implementations
of which (full and approximate) are discussed below.
(cid:46) p0 is an empty conjunction of literals
Actt ← observeActions()
if Actt < Ag then
pt+1 ← post(Actt)
else
pt+1 ← p∗
pt ← pt
if t > 0 then
Algorithm 1 NM Algorithm
Require: Ag, N, D, (cid:79), g
1: p0 = ∅
2: t ← 0
3: while true do
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
(cid:86) pre(Actt)
(cid:86) eff (Actt)
if Actt−1 < Ag then
t ← t + 1
t
T A ← Ag \ actors(Actt−1)
D ← ∅
reconstruction(pt−1, pt, Actt−1, T A, D)
(cid:46) Target Agents
(cid:46) Discovered violations and fuflilments
checkN orms(pt−1, Actt−1)
Full Reconstruction (Algorithm 2). This pseudocode corre-
sponds to the full reconstruction function. This function calls
the function search to search the actions of target agents (line
2). Then, for all the solutions found, the NM checks if they
are consistent according to Definition 7 (lines 4-6). Finally,
consistent solutions are used to extend the set of observed
actions and the knowledge about the initial and final states
(lines 7-14). The temporal cost of this algorithm is given by
the cost of the search function discussed below.
Algorithm 3 contains the pseudocode of the recursive
search function that computes all the sequences of consistent
actions that may have been executed by the agents that have
not been observed. It starts by checking that
there is at
least one target agent (line 2). If so, it identifies all actions
that might have been executed by one target agent (lines 3-
4). An action might have been executed if it is consistent
according to the static properties,
the domain knowledge,
and the initial and final states. For each consistent action, it
reconstructs the actions of the remaining agents recursively
the temporal cost of this
(lines 5-13). In the worst case,
(cid:46) Candidate Solutions
(cid:46) Consistent Solutions
if checkSolutionConsistency(Act, Sj, i, f ) then
S(cid:48) ← search(i, f, Act, T A)
S ← ∅
for all Sj ∈ S(cid:48) do
S ← S ∪ Sj
∀Si∈S Si
Algorithm 2 Full Reconstruction Function
1: function FULLRECONSTRUCTION(i, f, Act, T A, D)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
R ←(cid:84)
i ← i(cid:86) pre(R)
f ← f(cid:86) post(R)(cid:86) i•
f ← i∗(cid:86) f(cid:86) eff (Act)
Act ← Act ∪ R
if Act < Ag then
if R (cid:54)= ∅ then
else
function is O(AgD×ID ), where Ag is the set of agents,
D is the set of action descriptions and ID is the maximum
number of instantiations per action. This situation arises when
no action is observed and all actions are applicable for all
agents.
Algorithm 3 Search Function
1: function SEARCH(i, f, Act, T A)
2:
3:
4:
if T A (cid:54)= ∅ then
if ∃σ :
for all d ∈ D do
actor(σ · d) ∈ T A then
(cid:46) Identify consistent actions
checkActionConsitency(σ · d, i, f ) ∧
α = actor(σ · d)
i(cid:48) ← i(cid:86) pre(σ · d)
f(cid:48) ← f(cid:86) post(σ · d)
Act(cid:48) ← Act ∪ σ · d
T A(cid:48) ← T A \ {α}
S ← search(i(cid:48), f(cid:48), Act(cid:48), T A(cid:48))
for all Si ∈ S do
Si ← Si ∪ σ · d
return S
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
else
return ∅
Approximate Reconstruction Function (Algorithm 4). This
function calls the function ApproximateSearch to search
the applicable actions per each target agent (line 2). Then,
the list of applicable actions per each agent is checked (lines
3-12). Specifically, if an agent may have executed one action
only, then the NM knows that this action was executed and
it updates the reconstructed action set (lines 3-5). Then, the
set of observed actions and the knowledge about the initial
and final states is updated (lines 6-12). Finally, discovered
violations and fulfilments are calculated (lines 14-19). The
temporal cost of this algorithm is given by the cost of the
ApproximateSearch function discussed below.
pseudocode
the
ApproximateSearch function.
starts by initialising
the list of applicable actions per agent (lines 3-4). Then it
calculates the set of instances that are relevant to the initial
state (line 7). The function calculates per each target agent
the list of applicable actions that it may have executed (lines
9-11). Then, the list of applicable actions per each agent
is checked (lines 12-18). Specifically, if an agent may have
executed one action only, then the NM knows that this action
Algorithm 5
contains
the
of
It
8
was executed and it updates the list of applicable actions,
the initial and final states, and retracts the agent from the
target agents (lines 14-17). This process is repeated until
there are no more target agents or the initial and final states
remain unchanged. Then the set of instances that are relevant
to the initial state is calculated (line 13). Finally, the list
of applicable actions per agent is updated with actions of
remaining target agents (lines 19-20). The temporal cost of
this function is O(Ag2 × D × ID).
Algorithm 4 Approximate Reconstruction Function
1: function APPROXIMATERECONSTRUCTION(i, f, Act, T A, D)
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
(cid:101)S ← approximateSearch(i, f, Act, T A)
if (cid:101)Sα = 1 then
i ← i(cid:86) pre(R)
f ← f(cid:86) post(R)(cid:86) i◦
f ← i∗(cid:86) f(cid:86) eff (Act)
if (cid:101)Sα > 1 then
if (cid:54) ∃a ∈ (cid:101)Sα : ¬f orbidden(P, a) then
else if (cid:54) ∃a ∈ (cid:101)Sα : ¬mandatory(O, a) then
for all α ∈ T A do
R ← R ∪ Sα
Act ← Act ∪ R
if Act < Ag then
(cid:46) a is an action from (cid:101)Sα
(cid:46) a is an action from (cid:101)Sα
O, P ← calculateInstances(i)
for all α ∈ T A do
D ← D ∪ a
D ← D ∪ a
if R (cid:54)= ∅ then
else
(cid:46) List of approximate actions per agent
checkActionConsitency(σ · d, i, f ) ∧
(cid:101)Sα ← ∅
continue ← true
for all α ∈ T A do
while continue ∧ T A (cid:54)= ∅ do
Algorithm 5 Approximate Search Function
1: function APPROXIMATESEARCH(i, f, Act, T A)
2:
3:
4:
5:
6:
7:
8:
9:
10:
continue ← f alse
for all α ∈ T A do
for all d ∈ D do
actor(σ · d) ∈ T A then
for all α ∈ T A do
if Lα = 1 then
Lactor(σ·d) ← Lactor(σ·d) ∪ σ · d
Lα ← ∅
if ∃σ :
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
(cid:101)Sα ← Lα
i ← i(cid:86) pre(Lα)
f ← f(cid:86) post(Lα)
T A ← T A \ {α}
continue ← true
for all α ∈ T A do
(cid:101)Sα ← Lα
return (cid:101)S
V. EVALUATION
This section compares the performance of a NM with full
reconstruction, a NM with approximate reconstruction and a
traditional norm monitor -- which is the method used in the
majority of previous proposals [6], [23], [14], [24], [8] -- that
only considers the observed actions to detect violations; with
respect to their capabilities to monitor norm compliance. We
have evaluated our proposal in a case study, which allows
us to contextualise the results and to give a meaningful
interpretation to them; and in a series of random experiments,
which allow us to evaluate our proposal under a wide range
of different situations and parameter values.
A. Case Study
We implemented in Java a simulator of the paper example
in which robots attend requests in offices connected through
corridors. Compliance with the collision avoidance norm is
controlled by a monitor that observes surveillance cameras.
In each simulation, we generate corridors and cameras ran-
domly. In each step of the simulation, each robot chooses
randomly one applicable action to be executed. The simulation
is executed 100 steps and repeated 100 times to support the
findings. We conducted experiments in which the number of
offices O took a random value within the (cid:74)3, 500(cid:75) interval
(cid:74)2, 250(cid:75) interval. Besides that, to be able to compare with the
number of offices O takes a random value within(cid:74)3, 10(cid:75) and
the number of robots R takes a random value within (cid:74)2, 5(cid:75),
full NM, we also considered small scenarios only, in which the
and the number of robots R took a random value within the
as the full reconstruction has an exponential cost and it is
intractable for most of the cases with the default intervals.
1) Action Observability: To analyse the performance and
scalability of monitors with respect to their capabilities to
observe actions, we defined the number of corridors C as
a random value within the (cid:74)O, O × (O − 1)(cid:75) interval and
varied the ratio of cameras to corridors (action observability).
Table I shows the percentage of violations detected per each
type of monitor. The higher the ratio of cameras, the more
actions are observed and the better the performance of all
monitors. Moreover, the approximate NM offers on average
a 39% performance improvement over a traditional monitor
(i.e., it identifies 16% more violations plus a further 24%
of discovered violations). That is, an approximate NM out-
performs a traditional monitor with the same capabilities to
observe actions. When compared to full NM in small scenarios
(O ∈(cid:74)3, 10(cid:75) and R ∈(cid:74)2, 5(cid:75)), approximate NM performs sim-
ilarly. This is explained by the fact that there is a single norm
in this scenario, actions have no concurrency conditions, and
the preconditions and postconditions of actions are disjoint.
In this circumstances, the approximate reconstruction process
reconstructs actions similarly to the full reconstruction14.
Cameras Traditional Approximate NM
Identify+Discover
Ratio Monitor
0%
20%
40%
60%
80%
100%
0%
11%
31%
55%
78%
100%
0+0%
14+9%
40+12%
71+10%
91+4%
100+0%
O ∈(cid:74)3, 500(cid:75) and R ∈(cid:74)2, 250(cid:75)
Cameras Traditional Full Approximate NM
Ratio Monitor NM Identify+Discover
0%
20%
40%
60%
80%
100%
0%
0%
32%
16%
68%
32%
88%
56%
76%
99%
100% 100%
0+0%
32+6%
67+5%
88+3%
99+0%
100+0%
O ∈(cid:74)3, 10(cid:75) and R ∈(cid:74)2, 5(cid:75)
TABLE I: Action Observability Experiment
14Note that full reconstruction does not guarantee completeness.
9
2) Action Instantiations: To analyse the performance and
scalability of monitors with respect to agent capabilities to
execute actions (i.e., the number of instantiations per action),
we varied the ratio of corridors15 (e.g., a ratio of 0% means
C = O) and defined the number of cameras as a random value
within the (cid:74)0, C(cid:75) interval. Table II shows the results of this
experiment. The approximate NM offers on average a 43%
performance improvement over a traditional monitor (i.e., it
identifies 29% more violations plus a further 14% of discov-
ered violations). That is, given the same number of possible
instantiations per action, an approximate NM outperforms a
traditional monitor. Besides, we can see that, as in the previous
experiment, the approximate NM performs similarly to the
full NM. In particular, when the ratio of corridors is higher
than 0%, agents are capable of executing different actions
and the reconstruction process becomes more complex, which
decreases the performance of full and approximate NMs.
However, full and approximate NMs noticeably outperform
the traditional monitor regardless of the ratio of corridors.
Corridors Traditional Approximate NM
Identify+Discover
Monitor
Corridors Traditional Full Approximate NM
Monitor NM Identify+Discover
Ratio
0%
20%
40%
60%
80%
100%
51%
48%
48%
41%
49%
42%
98+0%
55+6%
56+7%
47+6%
56+13%
49+7%
Ratio
0%
20%
40%
60%
80%
100%
52%
59%
55%
51%
55%
57%
99%
80%
74%
70%
68%
70%
99+0%
79+3%
74+3%
69+4%
68+5%
69+4%
O ∈(cid:74)3, 500(cid:75) and R ∈(cid:74)2, 250(cid:75)
O ∈(cid:74)3, 10(cid:75) and R ∈(cid:74)2., 5(cid:75)
TABLE II: Action Instantiations Experiment
B. Random Experiments
We implemented a simulator in Java in which there is a set
of agents that perform actions in a monitored environment as
defined below. In particular, our simulator does not model a
specific scenario; rather it creates a different scenario in each
simulation (i.e., generating randomly agent capabilities, the
environment properties, actions and norms). As in the previous
experiments, we have considered big and small scenarios. In
particular, the number of agents G in small scenarios took
a random value within the (cid:74)1, 5(cid:75) interval, whereas in big
scenarios G took a random value within the(cid:74)1, 500(cid:75) interval.
(cid:74)1, 50(cid:75) interval. Again, the simulation is executed 100 steps
The number of actions A took a random value within the
and repeated 1000 times to ensure that the values of the
simulation parameters range over possible values16.
Agent Definition. We modelled different types of agents
with different capabilities to perform actions. In particular,
the set of actions available to each agent depends on the
function/s assumed by each agent in a particular simulation.
To model these capabilities, a set of roles is created at the
beginning of each simulation. Specifically, the number of roles
created took a random value within the (cid:74)1, A(cid:75) interval. For
15Recall that C takes values within the(cid:74)O, O × (O − 1)(cid:75) interval.
each role a subset of the actions are randomly selected as the
role capabilities; i.e., all agents enacting this role are able to
16Note that in the random experiments there are more simulation parameters
than in the case-study simulator and a higher number of repetitions is required
to support the findings.
perform these actions17. To avoid that all roles have similar
capabilities, which would lead to simulations populated by
homogeneous agents, the number of actions selected as role
capabilities took a random value within the (cid:74)1,(cid:100)0.1 ∗ A(cid:101)(cid:75)
interval (i.e., at maximum each role is capable of performing a
10% of the actions). At the beginning of each simulation, each
agent is defined as enacting a random subset of the roles. In
each step of the simulation, each agent selects randomly one
action among the available actions that it can execute in the
current state.
Environment Definition. In the simulator, the environment
is described in terms of different situations or states of affairs
that can be true or false. Each one of these states of affairs is
represented by a grounded proposition. Thus, the state of the
environment is defined in terms of a set of propositions. For
simplicity, we assumed that these propositions are independent
(i.e, propositions are not logically related). In our simulations,
the number of propositions P took a random value within the
(cid:74)A, 2 ∗ A(cid:75) interval (i.e., there is at least one proposition per
each action18). Besides that, there is a set of grounded atomic
formulas describing the roles played by agents and the actions
that can be performed by each role. The relationship between
agents and roles is formally represented by a binary predicate
(play). Specifically, the expression play(g, r) describes the
fact that the agent identified by g enacts the role identified by
r. Similarly, relationship between roles and actions is formally
represented by a binary predicate (capable). Specifically, the
expression capable(a, r) describes the fact that agents enacting
role r are capable of performing the action identified by a. For
simplicity, we assume that the roles enacted by the agents and
the role capabilities are static properties of the environment.
Action Definition. Actions allow agents to change the state
of the environment. At
the beginning of each simulation,
a set of actions is randomly generated. For each action
(cid:104)name, pre, con, post(cid:105) the elements are defined as follows:
name is initialised with a sequential identifier a; pre is defined
as {play(A, R), capable(R, a), p1, ..., pn} where the elements
p1, ..., pn are randomly selected from the proposition set; con
is defined as {a1(A1, R1), ..., am(Am, Rm)}, where each ai
is an action randomly selected from the action set such that
ai (cid:54)= a and Ai, Ri are free variables representing the agent
performing the action and the role capable of performing this
action, respectively; and post is defined as {p1, ..., pk} where
each pi is a proposition randomly selected from the proposition
set. To avoid that actions have too many constraints, which
would be unrealistic and make actions to be only executed
on few situations, the number of propositions in pre and
post takes a random value within the(cid:74)1,(cid:100)0.1 ∗ P(cid:101)(cid:75) interval.
within the(cid:74)0,(cid:100)0.1 ∗ A(cid:101)(cid:75) interval.
Similalry, the number of actions in con takes a random value
Besides these actions, a NOP action, which has no effect
on the environment, was created. To maximise the number
of actions executed in the simulations, which may entail
more violations and fulfilments, we defined that the NOP
action can only be executed by agents when none of their
17This condition has been formulated in action preconditions as explained
below.
18Note that an action can change the truth value of several propositions.
10
available actions can be executed. However, similar results
would have been obtained if this condition was relaxed19. Our
simulator models scenarios where the NOP action can always
be observed. This is the case in many real domains such as
Intrusion Detection Systems or Autonomous Systems, where
it it not always possible to analyse the data (e.g., the packages)
sent by agents (e.g., hosts) to infer the actions performed, but
it is always possible to know which agents have performed an
action (i.e., which agents have sent packages).
norms took a random value within the (cid:74)1, A(cid:75) (i.e.,
Norm Definition. Agents' actions are regulated by a set
the beginning of each simulation, a set of
of norms. At
norms is randomly created. In particular the number of
there
is at maximum one norm per each action). For each ac-
tion (cid:104)deontic, condition, action(cid:105) the elements are defined
as follows: deontic is randomly initialised with a deontic
operator; condition is defined as {p1, ..., pk} where each pi is
a proposition randomly selected from the proposition set; and
action is randomly initialised with an action. To allow norms
to be instantiated, the number of propositions in condition
takes a random value within the(cid:74)0,(cid:100)P ∗ 0.1(cid:101)(cid:75) interval.
1) Action Observability: To analyse the performance and
scalability of monitors with respect to their capabilities to
observe actions, we varied the observation probability. Tables
III and IV show the percentage of detected fulfilments and
violations, respectively. Again, the approximate NM offers
a significant performance improvement over a traditional
monitor; i.e., the approximate NM offers on average a 74%
performance improvement over a traditional monitor. When
compared to full NM in small scenarios (A ∈ (cid:74)1, 50(cid:75) and
G ∈(cid:74)1, 5(cid:75)), the full NM offers on average a 21% performance
improvement over an approximate NM. This is explained by
the fact that this experiment is more complex than the case
study; i.e., there are several norms (both prohibition and obli-
gation norms), actions have concurrent conditions and actions
may have conflicting preconditions and postconditions (i.e.,
conditions that are defined over the same propositions). Note
that the traditional monitor detects violations and fulfilments
even when the observation probability is 0%. These detections
correspond to situations in which none of the agents can
execute any action (i.e., all agents execute the NOP action)
which leads to the fulfilment of prohibition instances and the
violation of obligation instances. This phenomenon is more
frequent in case of small scenarios since the lower the number
of agents, the higher the probability that all agents cannot
execute any action.
2) Action Possibilities: To analyse the performance and
scalability of monitors with respect to agent capabilities to
execute actions (i.e., the number of available actions), we
defined the observation probability as a random value within
the [0, 100%] interval and we varied the number of actions.
Tables V and VI show the percentage of detected fulfilments
and violations, respectively. In this experiment,
the more
actions, the more complex the reconstruction problem is. As
a consequence, the improvement offered by an approximate
19Note that the capabilities of monitors to detect violations and fulfilments
do not depend on the fact that agents are allowed to perform the NOP action
in any situation.
Observ. Traditional Approximate NM
Prob. Monitor
Identify+Discover
0%
20%
40%
60%
80%
100%
35+7%
47+6%
62+4%
72+3%
80+2%
100+0%
A ∈(cid:74)1, 50(cid:75) and G ∈(cid:74)1, 500(cid:75)
2%
18%
35%
50%
66%
100%
Observ. Traditional Full Approximate NM
Prob. Monitor NM Identify+Discover
0%
20%
40%
60%
80%
100%
46%
20%
51%
23%
57%
31%
69%
43%
79%
58%
100% 100%
34+1%
39+1%
45+1%
56+0%
70+0%
100+0%
A ∈(cid:74)1, 50(cid:75) and G ∈(cid:74)1, 5(cid:75)
TABLE III: Fulfilments Detected in the Action Observability
Experiment
Observ Traditional Approximate NM
Prob. Monitor
Identify+Discover
0%
20%
40%
60%
80%
100%
36+8%
50+6%
62+6%
70+2%
78+2%
100+0%
A ∈(cid:74)1, 50(cid:75) and G ∈(cid:74)1, 500(cid:75)
2%
18%
35%
49%
65%
100%
Observ Traditional Full Approximate NM
Prob. Monitor NM Identify+Discover
0%
20%
40%
60%
80%
100%
44%
20%
50%
23%
56%
32%
68%
42%
56%
78%
100% 100%
33+1%
37+0%
45+0%
55+0%
69+0%
100+0%
A ∈(cid:74)1, 50(cid:75) and G ∈(cid:74)1, 5(cid:75)
TABLE IV: Violations Detected in the Action Observability
Experiment
NM over a traditional monitor decreases as the number of
actions increases. However, the approximate NM still offer on
average a 56% performance improvement over a traditional
monitor. When the number of actions is very high (e.g., when
the number of actions is 128 in small scenarios), then action
preconditions become very complex and most of the times the
NOP action is executed by all agents, which entails that the all
monitors obtain a good performance. We can see that, as in the
previous experiment, the approximate NM performs slightly
worse than the full NM (i.e., the full NM offers on average
a 15% performance improvement over an approximate NM).
However, full and approximate NMs noticeably outperform
the traditional monitor regardless of the number of actions.
Actions Traditional Approximate NM
Identify+Discover
Monitor
Actions Traditional Full Approximate NM
Monitor NM Identify+Discover
95+8%
75+1%
48+0%
40+0%
52%
49%
32%
29%
G ∈(cid:74)1, 500(cid:75)
69%
47%
38%
53%
99%
75%
63%
83%
G ∈(cid:74)1, 5(cid:75)
95+3%
71+0%
48+0%
57+0%
TABLE V: Fulfilments Detected in the Action Possibilities
Experiment
Actions Traditional Approximate NM
Identify+Discover
Monitor
Actions Traditional Full Approximate NM
Monitor NM Identify+Discover
93+5%
76+6%
50+1%
39+0%
53%
49%
35%
31%
G ∈(cid:74)1, 500(cid:75)
68%
48%
38%
56%
99%
76%
62%
85%
G ∈(cid:74)1, 5(cid:75)
95+2%
72+1%
47+0%
59+0%
TABLE VI: Violations Detected in the Action Possibilities
Experiment
C. Summary
The conclusions of our evaluation are threefold:
1) Both approximate and full reconstruction processes are
more effective (i.e., detect more norm violations and ful-
filments) than traditional monitoring approaches regard-
less of the scenario complexity (i.e., action possibilities
2
8
32
128
2
8
32
128
2
8
32
128
2
8
32
128
11
and observability). Both in the case study and in the ran-
dom experiments our algorithms improved significantly
the percentage of violations and fulfilments detected.
2) Approximate reconstruction is slighting less effective
than full reconstruction. In the case study, where a single
prohibition norm was monitored; the approximate NM
obtained almost
the same results as the full NM. In
our random experiments, where several prohibition and
obligation norms were monitored, the full NM offered
an average improvement of a 18% over an approximate
NM.
3) Approximate reconstruction is scalable with the scenario
size (i.e., the number of agents and actions to be mon-
itored). In particular, our experiments demonstrate that
the approximate algorithm can be used to monitor a large
number of agents (we simulated scenarios with up to 500
agents), actions (we simulated scenarios with up to 128
actions), and norms (we simulated scenarios with up to
128 norms).
VI. RELATED WORK
Previous work on norms for regulating MAS proposed
control mechanisms for norms to have an effective influence on
agent behaviours [15]. These control mechanisms are classified
into two main categories [15]: regimentation mechanisms,
which make the violation of norms impossible; and enforce-
ment mechanisms, which are applied after the detection of
norm violations and fulfilments, reacting upon them.
Regimentation mechanisms prevent agents from performing
forbidden actions (vs. force agents to perform obligatory
actions) by mediating access to resources and the commu-
nication channel, such as Electronic Institutions (EIs) [12].
However, the regimentation of all actions is often difficult or
impossible. Furthermore, it is sometimes preferable to allow
agents to make flexible decisions about norm compliance
[7]. In response to this need, enforcement mechanisms were
developed. Proposals on the enforcement of norms can be
classified according to the entity that monitors whether norms
are fulfilled or not. Specifically, norm compliance can be
monitored by either agents themselves or the underlying
infrastructure may provide monitoring entities.
Regarding agent monitoring, this approach is characterized
by the fact that norm violations and fulfilments are monitored
by agents that are involved in an interaction [30], [9], or other
agents that observe an interaction in which they are not directly
involved [28], [10], [32]. The main drawback of proposals
based on agent monitoring is the fact that norm monitoring
and enforcement must be implemented by agent programmers.
Regarding infrastructural monitoring, several authors pro-
posed developing entities at the infrastructure level that are in
charge of both monitoring and enforcing norms. Cardoso &
Oliveira [6] proposed an architecture in which the monitoring
and enforcement of norms is made by a single institutional
entity. This centralized implementation represents a perfor-
mance limitation when dealing with a considerable number
of agents. To address the performance limitation of central-
ized approaches, distributed mechanisms for an institutional
enforcement of norms were proposed in [23], [14], [24], [8].
12
All of the aforementioned proposals on monitoring assume
that monitors have complete observational capabilities. Excep-
tion to these approaches is the recent work of Bulling et al.
[5] and Alechina et al. [2]. In [5], the partial observability
problem is addressed combining different norm monitors to
build ideal monitors (i.e., monitors that together are able to
detect the violation of a given set of norms). In [2], the authors
propose to synthesise an approximate set of norms that can be
monitored given the observational capabilities of a monitor.
However, there are circumstances in which norms cannot be
modified (e.g., contract and law monitoring) or ideal monitors
are expensive and/or not feasible. We take a different approach
in which norms and monitors' observation capabilities remain
unchanged and monitors reconstruct unobserved actions.
Our approach is also related to planning, where methods
(e.g., POMDPs [18]) for choosing optimal actions in partially
observable environments have been proposed. A major differ-
ence between these proposals and our proposal is that NMs
do not perform practical reasoning, i.e., they do not try to
optimise or achieve a practical goal. Instead, NMs perform
both deductive and abductive reasoning [25] to reason from
observed actions to reach a conclusion about the state of the
world, and to infer unobserved actions.
VII. CONCLUSION
In this paper, we propose information models and algo-
rithms for monitoring norms under partial action observability
by reconstructing unobserved actions from observed actions
using two different reconstruction processes: full and ap-
proximate. Our experiments demonstrate that both reconstruc-
tion processes detect more norm violations than traditional
monitoring approaches. Approximate reconstruction performs
slightly worse than full reconstruction, whereas its computa-
tional cost is much cheaper, making it suitable to be applied
in practice.
The reconstruction algorithms proposed in this paper can
be applied to several domains that require action monitoring;
from normative MAS [31], to intrusion detection systems [16],
to control systems [26] and to intelligent surveillance systems
[17]. As future work, we plan to investigate domain-dependent
approximations that could speed up action reconstruction even
further.
REFERENCES
update. In Proc. of IJCAI, 2013.
[2] N. Alechina, M. Dastani, and B. Logan. Norm approximation for
imperfect monitors. In Proc. of AAMAS, pages 117 -- 124, 2014.
[3] T. Bass.
Intrusion detection systems and multisensor data fusion.
Communications of the ACM, 43(4):99 -- 105, 2000.
[4] C. Boutilier and R. I. Brafman. Partial-order planning with concur-
Journal of Artificial Intelligence Research,
rent interacting actions.
14(1):105 -- 136, 2001.
[5] N. Bulling, M. Dastani, and M. Knobbout. Monitoring norm violations
in multi-agent systems. In Proc. of AAMAS, pages 491 -- 498, 2013.
[6] H. Cardoso and E. Oliveira. Institutional reality and norms: Specifying
and monitoring agent organizations. International Journal of Coopera-
tive Information Systems, 16(1):67 -- 95, 2007.
[7] C. Castelfranchi.
Formalising the informal? Dynamic social order,
bottom-up social control, and spontaneous normative relations. Journal
of Applied Logic, 1(1-2):47 -- 92, 2003.
[1] N. Alechina, M. Dastani, and B. Logan. Reasoning about normative
Proc. of IJCAI, pages 1507 -- 1512, 2007.
[8] N. Criado, E. Argente, P. Noriega, and V. Botti. Manea: A distributed
architecture for enforcing norms in open mas. Engineering Applications
of Artificial Intelligence, 26(1):76 -- 95, 2013.
[9] A. Daskalopulu, T. Dimitrakos, and T. Maibaum.
Evidence-based
electronic contract performance monitoring. Group Decision and Nego-
tiation, 11(6):469 -- 485, 2002.
[10] A. P. de Pinninck, C. Sierra, and W. M. Schorlemmer. A multiagent
network for peer norm enforcement. Journal of Autonomous Agents
and Multi-Agent Systems, 21(3):397 -- 424, 2010.
[11] F. Dignum. Autonomous agents with norms. Artificial Intelligence and
Law, 7(1):69 -- 79, 1999.
[12] M. Esteva, B. Rosell, J. A. Rodr´ıguez-Aguilar, and J. L. Arcos. Ameli:
In Proc. of
An agent-based middleware for electronic institutions.
AAMAS, pages 236 -- 243, 2004.
[13] M. Fitting. First-order logic and automated theorem proving. Springer,
1996.
[14] D. Gaertner, A. Garcia-Camino, P. Noriega, J.-A. Rodriguez-Aguilar, and
W. Vasconcelos. Distributed norm management in regulated multiagent
systems. In Proc. of AAMAS, pages 624 -- 631, 2007.
[15] D. Grossi, H. Aldewereld, and F. Dignum. Ubi lex, ibi poena: Designing
In COIN II, pages 101 -- 114.
in e-institutions.
norm enforcement
Springer, 2007.
[16] W. Hu, W. Hu, and S. Maybank. Adaboost-based algorithm for
network intrusion detection. IEEE Transactions on Systems, Man, and
Cybernetics, Part B: Cybernetics, 38(2):577 -- 583, 2008.
[17] C.-M. Huang and L.-C. Fu. Multitarget visual tracking based effec-
IEEE
tive surveillance with cooperation of multiple active cameras.
Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics,
41(1):234 -- 247, 2011.
[18] L. P. Kaelbling, M. L. Littman, and A. R. Cassandra. Planning and
acting in partially observable stochastic domains. Journal of Artificial
Intelligence, 101(1):99 -- 134, 1998.
[19] F. L´opez y L´opez, M. Luck, and M. dInverno. A normative framework
for agent-based systems. Computational & Mathematical Organization
Theory, 12(2-3):227 -- 250, 2006.
[20] E. Lorini. On the logical foundations of moral agency. In Deontic Logic
in Computer Science, pages 108 -- 122. Springer, 2012.
[21] F. Meneguzzi, S. Modgil, N. Oren, S. Miles, M. Luck, and N. Faci.
Applying electronic contracting to the aerospace aftercare domain.
Engineering Applications of Artificial Intelligence, 25(7):1471 -- 1487,
2012.
[22] R. Micalizio, P. Torasso, and G. Torta. On-line monitoring and diagnosis
In Proc. of ECAI,
of multi-agent systems: a model based approach.
volume 16, page 848, 2004.
[23] N. Minsky and V. Ungureanu. Law-governed interaction: a coordination
and control mechanism for heterogeneous distributed systems. ACM
Transactions on Software Engineering and Methodology, 9(3):273 -- 305,
2000.
[24] S. Modgil, N. Faci, F. Meneguzzi, N. Oren, S. Miles, and M. Luck. A
framework for monitoring agent-based normative systems. In Proc. of
AAMAS, pages 153 -- 160, 2009.
[25] G. Paul. Approaches to abductive reasoning: an overview. Journal of
Artificial Intelligence Review, 7(2):109 -- 152, 1993.
[26] C. Rieger, D. Scheidt, and W. Smart. Guest editorial: Introduction to
IEEE
the special issue on resilient control architectures and systems.
Transactions on Cybernetics, 44(11):1994 -- 1996, Nov 2014.
[27] S. Sadiq, G. Governatori, and K. Namiri. Modeling control objectives for
business process compliance. In Business process management, pages
149 -- 164. Springer, 2007.
[28] S. Sen and S. Airiau. Emergence of norms through social learning. In
[29] W. Vasconcelos, M. J. Kollingbaum, and T. J. Norman. Resolving
conflict and inconsistency in norm-regulated virtual organizations.
In
Proceedings of the 6th international joint conference on Autonomous
agents and multiagent systems, page 91. ACM, 2007.
[30] M. Venkatraman and M. Singh. Verifying compliance with commitment
Journal of Autonomous Agents and Multi-Agent Systems,
protocols.
2(3):217 -- 236, 1999.
[31] C. Yu, M. Zhang, and F. Ren. Collective learning for the emergence of
social norms in networked multiagent systems. IEEE Transactions on
Cybernetics, 44(12):2342 -- 2355, Dec 2014.
[32] W. Zeng and M.-Y. Chow. Resilient distributed control in the presence
of misbehaving agents in networked control systems. IEEE Transactions
on Cybernetics, 44(11):2038 -- 2049, Nov 2014.
|
1302.5592 | 2 | 1302 | 2013-04-29T14:52:46 | A tournament of order 24 with two disjoint TEQ-retentive sets | [
"cs.MA",
"math.CO"
] | Brandt et al. (2013) have recently disproved a conjecture by Schwartz (1990) by non-constructively showing the existence of a counterexample with about 10^136 alternatives. We provide a concrete counterexample for Schwartz's conjecture with only 24 alternatives. | cs.MA | cs |
A tournament of order 24 with two disjoint
TEQ-retentive sets
Felix Brandt
and Hans Georg Seedig
Technische Universitat Munchen
85748 Munich, Germany
{brandtf,seedigh}@in.tum.de
Brandt et al. (2013) have recently disproved a conjecture by Schwartz (1990)
by non-constructively showing the existence of a counterexample with about
10136 alternatives. We provide a concrete counterexample for Schwartz's con-
jecture with only 24 alternatives.
1 Introduction
A tournament T is a pair (A, ≻), where A is a set of alternatives and ≻ is an asymmetric and
complete (and thus irreflexive) binary relation on A, usually referred to as the dominance
relation. The dominance relation can be extended to sets of alternatives by writing X ≻ Y
when x ≻ y for all x ∈ X and y ∈ Y . For a tournament (A, ≻), an alternative x ∈ A, and
a subset X ⊆ A of alternatives, we denote by DX(x) = { y ∈ X y ≻ x } the dominators
of x. A tournament solution is a function that maps a tournament to a nonempty subset
of its alternatives (see, e.g., Laslier, 1997, for further information). Given a tournament
T = (A, ≻) and a tournament solution S, a nonempty subset of alternatives X ⊆ A is called
S-retentive if S(DA(x)) ⊂ X for all x ∈ X such that DA(x) 6= ∅. Schwartz (1990) defined
the tournament equilibrium set (TEQ) of a given tournament T = (A, ≻) recursively as
the union of all inclusion-minimal TEQ-retentive sets in T .
Schwartz conjectured that every tournament contains a unique inclusion-minimal TEQ-
retentive set, which was later shown to be equivalent to TEQ satisfying any one of a num-
ber of desirable properties for tournament solutions (Laffond et al., 1993; Houy, 2009a,b;
Brandt et al., 2010a; Brandt, 2011b; Brandt and Harrenstein, 2011; Brandt, 2011a). This
conjecture was recently disproved by Brandt et al. (2013) who have shown the existence
of a counterexample with about 10136 alternatives using the probabilistic method. Since
1
it was shown that TEQ satisfies the above mentioned desirable properties for all tour-
naments that are smaller than the smallest counterexample to Schwartz's conjecture, the
search for smaller counterexamples remains of interest. In fact, the counterexample found
by Brandt et al. (2013) is so large that it has no practical consequences whatsoever for
TEQ.
In this note, we provide a tournament of order 24 with two disjoint TEQ-retentive
sets. In contrast to the previous counterexample, both TEQ-retentive sets are of the same
order and even isomorphic. On the other hand, the tournament does not constitute a
counterexample to a weakening of Schwartz's conjecture by Brandt (2011b).
Let nTEQ be the greatest natural number n such that all tournaments of order n or less
admit a unique minimal TEQ-retentive set. Together with earlier results by Brandt et al.
(2010b), we now have that 12 ≤ nTEQ ≤ 23.
The counterexample is based on new structural insights about tournament solutions that
we will explore further in future work.
2 The Counterexample
We define a tournament T = (A ≻) with 24 alternatives that has two disjoint TEQ-
retentive sets X = {x1, . . . , x12} and Y = {y1, . . . , y12} with A = X ∪ Y . The two induced
subtournaments T X and T Y are isomorphic.
Let X1 = {x1, . . . , x6}, X2 = {x7, . . . , x12}, Y1 = {y1, . . . , y6}, and Y2 = {y7, . . . , y12}.
Then, the dominance relation between alternatives in X and Y is defined as illustrated in
Figure 1.
X1
X2
X
Y1
Y2
Y
Figure 1: The structure of the counterexample. The two subtournaments T X and T Y are
isomorphic and of order 12. Furthermore, X1 ≻ Y2, X2 ≻ Y1, Y1 ≻ X1, and
Y2 ≻ X2.
The dominator sets in T X (and equivalently in T Y ) are defined as follows:
DX (x1) = {x4, x5, x6, x8, x9, x12},
DX (x3) = {x1, x2, x6, x7, x9, x10},
DX (x5) = {x2, x3, x4, x8, x10, x11},
DX (x7) = {x1, x5, x6, x11, x12},
DX (x9) = {x2, x4, x5, x7, x8},
DX (x11) = {x1, x2, x3, x8, x9, x10}, and DX(x12) = {x3, x4, x5, x9, x10, x11}.
DX(x2) = {x1, x6, x7, x10, x12},
DX(x4) = {x2, x3, x7, x8, x11},
DX(x6) = {x4, x5, x9, x11, x12},
DX(x8) = {x2, x3, x6, x7, x12},
DX(x10) = {x1, x4, x6, x7, x8, x9},
2
A rather tedious check reveals that
TEQ(DA(x2)) = {x6, x10, x12} ⊂ X,
TEQ(DA(x1)) = {x4, x8, x12} ⊂ X,
TEQ(DA(x4)) = {x2, x7, x11} ⊂ X,
TEQ(DA(x3)) = {x6, x7, x9} ⊂ X,
TEQ(DA(x6)) = {x4, x9, x11} ⊂ X,
TEQ(DA(x5)) = {x2, x8, x10} ⊂ X,
TEQ(DA(x8)) = {x3, x6, x12} ⊂ X,
TEQ(DA(x7)) = {x1, x5, x11} ⊂ X,
TEQ(DA(x9)) = {x2, x5, x7} ⊂ X,
TEQ(DA(x10)) = {x4, x6, x7} ⊂ X,
TEQ(DA(x11)) = {x1, x2, x8} ⊂ X, and TEQ(DA(x12)) = {x3, x4, x9} ⊂ X.
Hence, X is TEQ-retentive in T . Moreover, it can be checked that TEQ(DA(yi)) ⊂ Y for
all i ∈ {1, . . . , 12}, which implies that Y is TEQ-retentive as well. In fact, we even have
that, for all i, j ∈ {1, . . . , 12}, yj ∈ TEQ(DA(yi)) if and only if xj ∈ TEQ(DA(xi)).
References
F. Brandt. Group-strategyproof irresolute social choice functions.
In T. Walsh, editor,
Proc. of 22nd IJCAI, pages 79 -- 84. AAAI Press, 2011a.
F. Brandt. Minimal stable sets in tournaments. Journal of Economic Theory, 146(4):
1481 -- 1499, 2011b.
F. Brandt and P. Harrenstein. Set-rationalizable choice and self-stability. Journal of
Economic Theory, 146(4):1721 -- 1731, 2011.
F. Brandt, M. Brill, F. Fischer, and P. Harrenstein. Minimal retentive sets in tournaments.
In W. van der Hoek, G. A. Kaminka, Y. Lesp´erance, and M. Luck, editors, Proc. of 9th
AAMAS Conference, pages 47 -- 54. IFAAMAS, 2010a.
F. Brandt, F. Fischer, P. Harrenstein, and M. Mair. A computational analysis of the
tournament equilibrium set. Social Choice and Welfare, 34(4):597 -- 609, 2010b.
F. Brandt, M. Chudnovsky, I. Kim, G. Liu, S. Norin, A. Scott, P. Seymour, and
S. Thomass´e. A counterexample to a conjecture of Schwartz. Social Choice and Welfare,
40:739 -- 743, 2013.
N. Houy. Still more on the tournament equilibrium set. Social Choice and Welfare, 32:
93 -- 99, 2009a.
N. Houy. A few new results on TEQ. Mimeo, 2009b.
G. Laffond, J.-F. Laslier, and M. Le Breton. More on the tournament equilibrium set.
Math´ematiques et sciences humaines, 31(123):37 -- 44, 1993.
J.-F. Laslier. Tournament Solutions and Majority Voting. Springer, 1997.
T. Schwartz. Cyclic tournaments and cooperative majority voting: A solution. Social
Choice and Welfare, 7:19 -- 29, 1990.
3
|
1805.10176 | 1 | 1805 | 2018-05-25T14:34:51 | Few self-involved agents among BC agents can lead to polarized local or global consensus | [
"cs.MA"
] | Social issues are generally discussed by highly-involved and less-involved people to build social norms defining what has to be thought and done about them. As self-involved agents share different attitude dynamics to other agents Wood, Pool et al, 1996, we study the emergence and evolution of norms through an individual-based model involving these two types of agents. The dynamics of self-involved agents is drawn from Huet and Deffuant, 2010, and the dynamics of others, from Deffuant et al, 2001. The attitude of an agent is represented as a segment on a continuous attitudinal space. Two agents are close if their attitude segments share sufficient overlap. Our agents discuss two different issues, one of which, called main issue, is more important for the self-involved agents than the other, called secondary issue. Self-involved agents are attracted on both issues if they are close on main issue, but shift away from their peer's opinion if they are only close on secondary issue. Differently, non-self-involved agents are attracted by other agents when they are close on both the main and secondary issues. We observe the emergence of various types of extreme minor clusters. In one or different groups of attitudes, they can lead to an already-built moderate norm or a norm polarized on secondary and/or main issues. They can also push disagreeing agents gathered in different groups to a global moderate consensus. | cs.MA | cs | March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
8
1
0
2
y
a
M
5
2
]
A
M
.
s
c
[
1
v
6
7
1
0
1
.
5
0
8
1
:
v
i
X
r
a
Advances in Complex Systems
c(cid:13) World Scientific Publishing Company
FEW SELF-INVOLVED AGENTS AMONG BOUNDED
CONFIDENCE AGENTS CAN CHANGE NORMS
Irstea, Laboratory of Engineering for Complex Systems LISC, Address
Sylvie HUET∗
63172 Aubi`ere, France
[email protected]
Jean-Denis MATHIAS
Irstea, Laboratory of Engineering for Complex Systems LISC, Address
63172 Aubi`ere, France
[email protected]
Received (received date)
Revised (revised date)
Social issues are generally discussed by highly-involved and less-involved people to build
social norms defining what has to be thought and done about them. As self-involved
agents share different attitude dynamics to other agents [46], we study the emergence
and evolution of norms through an individual-based model involving these two types of
agents. The dynamics of self-involved agents is drawn from [20], and the dynamics of
others, from [9]. The attitude of an agent is represented as a segment on a continuous
attitudinal space. Two agents are close if their attitude segments share sufficient overlap.
Our agents discuss two different issues, one of which, called main issue, is more important
for the self-involved agents than the other, called secondary issue. Self-involved agents are
attracted on both issues if they are close on main issue, but shift away from their peers
opinion if they are only close on secondary issue. Differently, non-self-involved agents
are attracted by other agents when they are close on both the main and secondary
issues. We observe the emergence of various types of extreme minor clusters. In one
or different groups of attitudes, they can lead to an already-built moderate norm or a
norm polarized on secondary and/or main issues. They can also push disagreeing agents
gathered in different groups to a global moderate consensus.
Keywords: Attraction; rejection; norm; involvement; bounded confidence model; polar-
ization; extreme minority effect.
1. Introduction
In this paper, we define a norm as simply the behavior or opinion adopted by the
majority of a group of people. We are not interested in descriptive norms but more in
the injunctive norm emerging from our interactions with others and from the shared
∗Typeset names in 10 pt Times Roman, uppercase. Use the footnote to indicate the present or
permanent address of the author.
1
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
2 Huet S., Mathias J.D.
normative beliefs supporting it [2]. Whereas descriptive norms refer to what most
people do, injunctive norms depict what most people approve of doing [12], what
is acceptable in a group. As a rule, the norm exerts social pressure to conformity
in the group, and agents tend to avoid straying too far from it. However, norms
do change, and there may also be a boomerang effect [37]. For instance, in most
European countries, majority opinion on society issues like abortion, homosexuality
and smoking has changed dramatically over the last 50 years. In agriculture, the
norm has long been towards strong intensification, meaning most farmers attach
high value to intensive practices and their high production outcomes regardless of
whether or not they conform in terms of behavior. Today, however, more and more
people and a minority of farmers disapprove of these practices, and this groundswell
may bring about strong social change in our conceptions of agriculture. The research
reported here sets out to understanding how such minorities emerge and how such
changes can take place.
The scholarship has singled out the involvement of certain agents as a condition
favoring resistance to the pressure to conformity. Muzafer Sherif especially outlined
the role of ego-involvement in persuasion: "... Regardless of the discrepancy of the
position presented, we predict that the more the person is involved in the issue
(the more important it is to him), the less susceptible he will be to short-term
attempts to change his attitude" [38]. Ego-involvement "refers more generally to
the involvement of the self or personal involvement. Ego-involving topics are those
that have intrinsic importance and personal meaning ... Important or involving
issues were those that had self-relevance" [33].
In his theories of social comparison [13] and cognitive dissonance [14], Leon
Festinger highlighted the need to be close, to be a member of a group, and to be
cognitively consistent. Here, building on these seminal works, we propose an agent-
based model inspired by [46] and social identity theories [4] [40] [42] to explore how
the strong ego-involvement of a part of the population may be responsible for the
evolution of a norm. The model agents can be involved or not in an issue being
discussed, and the corresponding dynamics are based on [9] and [20]. Two issues
are discussed. Some agents are involved in neither of them, while others are involved
in one issue, called main issue, but not in the other, called secondary issue.
The simulations show the emergence of small sets of agents sharing common ex-
treme opinions on the issues and differing from the majority. Under some conditions,
these agent clusters can lead a moderate majority to follow their extreme opinion on
the main or the secondary issues. This drift to the extreme can also take place when
the moderate majority is split in several different groups of opinions, each having
their own norm. However, we observe that the polarization on the secondary issue
can be very slow. In all these cases, we observe that a moderate norm changes for
a more extreme one. In what follows, we start by giving an overview of the model,
then go on to describe more details of the results and explain how they emerge, and
finish by summarizing the main results and discussing the interpretations .
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
3
2. State of the art
Global overviews of the social psychology literature and agent-based models related
to social influence can be found in [5] [26] [17]. The vast majority of existing models
fail to consider the involvement of the agent in the issue discussed, despite it long
being recognized as an important variable by the social psychology scholarship [1]
[39] [38] [41].
A few models do consider agent involvement to some extent. The bounded con-
fidence model [9] [18] is quite consistent with social judgment theory, which states
that positive influence (i.e. opinion or attitude attraction) is a function of the dis-
crepancy of opinions between two agents, bounded by the influencees level of ego-
involvement in the discussed issue [39]. The "confidence segment" may thus be
related to the involvement in an issue - the larger the segment, the less involved the
agent.
Assuming that agents can sometimes shift away from each other as shown by [44]
or [39], [25] [21] [22] and [15] have proposed models with one threshold for attraction
and the same or another threshold for rejection. Overall, they have modeled atti-
tude shifts as proportional to the distance to the threshold relevant for rejection.
These thresholds can be also interpreted as defining the level of the agents ego-
involvement. Another investigation by simulation showing potential links between
involvement and attitude dynamics can be found in [36] with a model derived from
self-categorization theory [43]. More on more-or-less similar models can be found
in a recent review [17] that concluded on a need to compare existing models. In
line with this recommendation, below we give an in-depth description of models
potentially relatable to ego-involvement and sufficiently related to be meaningfully
compared.
Bounded confidence models can show convergence to extreme or moderate con-
sensus. The simulation typically starts with a population including two types of
agents: extremists who have extreme and very certain attitudes (they are never in-
fluenced by others), and moderates whose fairly uncertain attitudes are uniformly
distributed and who can easily be influenced. Depending on the initial number
of extremists and the initial uncertainty of the moderates, three types of conver-
gence emerge: central clusters, double extreme clusters in which almost everyone
has adopted one or the other extremist attitude, and a single extreme cluster imply-
ing that everyone shares the same extremist attitude [8] [7] [10]. A single extreme
cluster emerges from an initial convergence to a central opinion of moderate agents
which is then pulled by the extremist agents. This can be related to a norm change.
Recently, [28, 27] show that a new stationary state appears when the uncertainties
do not change over time and when the moderates have very large uncertainties,
i.e. the attitudes of moderate agents keep fluctuating without clustering, but the
distribution of the attitudes remains stable over time. These models assume that
attraction to the extreme minority is the main driver of norm change. Importantly,
they suppose that this extreme minority is initially present in the population - they
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
4 Huet S., Mathias J.D.
do not explain how these initial extremists appear.
These models are in line with social psychology scholarship that assumes attrac-
tion to an extreme minority attitude [32] or an extreme minority group [11] [45] [6]
is the main driver of polarization. This is also tied to ego-involvement, since social
judgment theory [39] from which the bounded confidence models are largely in-
spired, assumes that level of ego-involvement influences the sensitivity of the agents
to persuasion. It argues for an influence that increases and then decreases with the
discrepancy between the attitude of influencer and the attitude of the influence.
The level of ego-involvement defines the inflexion point of the influence. Greater
ego-involvement leads to thicker discrepancy before the inflexion point, and thus
lower susceptibility to opinion change.
Another hypothesis to explain norm change can be found in a willingness of
agents to differentiate from others or at least some others. This is particularly
salient when agents are in deep disagreement on an important issue, typically one
that involves their identity, in which case they tend to be willing to differentiate
on other, less important issues. Indeed, several studies and theories suggest that
polarization is connected with identity issues [4] [40] [42]. The set of experiments
presented in [46] suggests that level of self-relevance of the source-group for the
agent is a key factor in the rejection mechanism. Indeed, the experiments show that
in cases of agreement on a minor issue and disagreement on a highly self-relevant
issue (i.e. group membership in the experimentation), a subject tends to shift away
from alters position on the minor issue. Moreover, in cases of agreement on a highly
self-relevant issue, the subjects tend to be attracted on minor issues whatever the
level of preliminary disagreement. [20] proposed an agent-based model inspired by
[46] considering a dynamics for highly self-involved agents (considering the degree
ego-involvement in an issue as very similar in concept to the self-relevance of an
issue). The authors consider peer interactions in which two agents influence each
other on attitudinal dimensions, assuming that one attitude is important (main)
and the other is secondary. On each of the two dimensions (i.e. two attitudes), they
suppose that the attitudes can take continuous values between -1 and +1. When
the agents are close to each other on the main dimension, they tend to attract each
other on the secondary dimension, even if their disagreement is strong. When they
disagree on the main dimension and are close on the secondary, then they tend to
reject each other on the secondary dimension. The model includes two thresholds:
the um threshold on the main dimension, and the us threshold on the secondary
dimension.
This model leads to approximately 1/um main opinion clusters, while in the
classical bounded confidence model, this number is approximately 1/um ∗ 1/us.
The reason for this significant difference is that in the model proposed in [20] the
clustering is only driven by the main dimension with its threshold um; the number
of secondary dimensions does not influence the number of clusters [20]. This makes
the number of clusters independent from the number of secondary dimensions, and
simplifies the perception of the social space (the smaller number of clusters).
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
5
Simulations with this model also show the existence of minor clusters containing
a very small number of agents, when the parameter ruling the speed of attraction
is sufficiently large (as is the case in the following study). These minor clusters
have already been observed in the bounded confidence model. They are located
between the main clusters and at the extremes of the opinion space, especially for
large values of confidence threshold u leading to one major cluster containing at
least 95% of the population [23] [24]. These minor clusters are important in the new
model that we describe later in this paper.
[20] also observe a polarization on the secondary dimension due to rejection.
This polarization often occurs after a first stage of clustering in a moderate opinion
and then they migrate to an extreme attitude. However, this dynamics takes place
only when all agents share the main dimension as highly self-relevant, as in the
experiments of [46]. Of course, in practice it is unlikely to find a situation where all
the agents of a population define themselves through the same salient social issue.
[46] (pp. 1190, 1191) adds that if the participant is not highly negatively self-
involved in the source-group of the source, he will not change his opinion when he
agrees with the source on the secondary issue but not on the main issue. Instead,
he decreases the relevance of the source (i.e. the level of importance assigned to the
sources group) in a way to not differentiate from it in the future. They add that
participants who were relatively indifferent to the group source demonstrated little
shift in their attitude judgments (p. 1186). Here, then, and for the sake of simplicity,
we assume that some agents are indifferent to their group membership and do not
change their opinion if they disagree on only one dimension and that self-relevance,
or level of importance given to the main attitude, is constant.
In the following, we consider a mixed population composed of a static set of
highly-self-involved agents (called HSI agents) in one main attitude and the com-
plementary set of no-more-important-attitude agents (called non-HSI agents). The
dynamics of the HSI type of agents is based on [20] while the dynamics of the non-
HSI type is based on a classical 2D bounded confidence model [9]. Our populations
of agents have attitudes initially drawn uniformly. We simulate their evolution, for
different values of the parameters, in order to compare the behavior of a mixed
population to the behavior of pure population of highly involved agents or non-
highly-involved agents. Analysis of the simulation found the emergence of several
types of extreme minor clusters. They can lead a population that has converged
to a moderate norm in a first stage to an extreme norm on both the minor and
fundamental ones. This phenomenon can drive the majority of the population or
only some groups of opinions. We also observe that several groups polarized on
secondary issues ultimately, after a very long time, adopt a unique moderate norm.
Some of these observations are specific to mixed populations. Moreover, a small
number of self-involved agents in the population is enough to significantly reduce
the number of clusters.
In what follows, we start by giving an overview of the model, then go on to
describe more details of the results and explain how they emerge, and finish by
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
6 Huet S., Mathias J.D.
summarizing the main results and discussing the interpretations.
3. The model and experimental design
We consider a population of N individuals, part of them considered highly-self-
involved in the main dimension while the other part is not. The model includes four
parameters: h, the proportion of highly-self-involved people that share very similar
dynamics to the people considering group membership as highly self-relevant in
[44], um and us, thresholds for opinion change on the main and the secondary
dimension, respectively, and µ ruling the intensity of influence at each meeting
(comprised between 0 and 0.5). An individual has two attitudes, xm (on the main
dimension) and xs (on the secondary dimension), taking real values between -1 and
+1. During an iteration, a pair of individuals X and Y is randomly chosen and can
influence each other. The algorithm is the following:
• Choose a random couple (X,Y ) of individuals in the population;
• X and Y change their attitudes at the same time, according to the influence
function corresponding to their status, i.e. the potential influencee is a non-highly-
self-involved (non-HSI) agent or a highly-self-involved (HSI) agent.
3.1. Influence on a non-highly self-involved agent (non-HSI)
The calculation of the influence of Y on X if X is a non-HSI agent (of course the
influence of X on Y if Y is a non-HSI agent is found by inverting X and Y ) is as
follows. Let (xm, xs) and (ym, ys) be the attitudes of X and Y, respectively. The
influence of Y on X is not null if xm − ym ≤ um and xs − ys ≤ us indicating
that agent X agrees with Y. Both attitudes of X are going to get closer to those of
Y, proportionally to the attitudinal distance on each dimension:
xm(t + 1) = xm(t) + µ(ym(t) − xm(t))
xs(t + 1) = xs(t) + µ(ys(t) − xs(t))
(1)
(2)
For every other case of partial agreement (only close on one dimension) or total
disagreement (far on two dimensions), X remains indifferent to Y and does not
change opinion.
3.2. Influence on a highly self-involved agent (HSI)
The calculation of the influence of Y on X if X is a HSI agent (of course the
influence of X on Y if Y is a HSI is found by inverting X and Y ) is based on [20]
as follows. Let (xm, xs) and (ym, ys) be the attitudes of X and Y respectively. We
first consider the main attitude dimension.
If xm − ym ≤ um, agent X agrees with Y on the main dimension. Both atti-
tudes of X are going to get closer to those of Y, proportionally to the attitudinal
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
7
distance on each dimension:
xm(t + 1) = xm(t) + µ(ym(t) − xm(t))
xs(t + 1) = xs(t) + µ(ys(t) − xs(t))
(3)
(4)
Indeed, whatever the agreement level on the secondary dimension is, X is going
to be globally closer to Y. If it was already close, it gets closer.
If xm − ym > um, then agent X disagrees with Y on the main dimension,
and if xs − ys ≤ us, then agent X feels it is too close to Y on the secondary
dimension, because of their disagreement on the main dimension. X solves this
conflicting situation by moving away from Y on this dimension. The attitude change
is proportional to the distance to reach the rejection threshold:
if (xs − ys) < 0, then xs (t + 1) = xs (t) − µ (us − (ys (t) − xs (t)))
else if (ys (t) 6= xs (t)), then xs (t + 1) = xs (t) + µ (us + (ys (t) − xs (t)))
else xs (t + 1) = xs (t) + sign() µus
where sign() is a function returning -1 or 1, each with a probability 0.5. This
sets the direction of the opinion change chosen at random when X and Y perfectly
agree.
In the other cases, X is not modified by Y. Moreover, we confine the main
attitude in the interval [-1, +1]. The secondary attitude can be confined in the
interval [-1, +1], or totally unbounded. These two cases allow, in an experimental
design considering both, an understanding of the impact of the confinement. The
attitude of Y is calculated in the same way, considering the situation of the meeting
with X and if Y is HSI.
3.3. Experimental design and the measured indicators
We run the model, for different values of the parameters, in order to compare the
behavior of a mixed population to the known behaviors of a pure population of
HSI or non-HSI agents. We vary the following parameters considering 10 replicates
for each set of values and 10,000 agents. Using 10 replications is sufficient for our
study, since there is little variation in outcome measures between runs: the average
standard deviation of our main indicator, i.e. the average absolute opinion of the
population varying between 0 and 1, is 0.06. um and us vary from 0.05 to 1 in
increments of 0.05. Most of the study is done using h equal to 0.1. However, we
also vary h to show that the emerging patterns are sensitive to this parameter for
what is observed on the secondary attitude dimension. For a same set of parameter
values, we consider two cases for the purpose of comparison: (1) on the secondary
dimension, the opinion is confined between [-1;+1]; (2) it is not confined, nor on
the main, neither on the secondary dimension. However, this is only during the
simulation, since in both cases the initial distribution is confined in [-1;+1].
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
8 Huet S., Mathias J.D.
While the basic study is done with 10,000 agents, the figures representing one
population state in what follows can be built on a population of 25,000 or 5,000
agents (figures 1 to 4 and 8). This is only to make the figures easier to read and
does not impact the qualitative results observed. The figures giving an overview of
the behavior of the model (figures 5, 7, 9 and 10) are built from a population of
10,000 agents.
We arbitrarily stop the exploration of um and us at 1 for this first study. Sim-
ilarly, µ, the parameter ruling the intensity of the influence, remains constant on
the two dimensions for every experimental condition, at a value of 0.5.
The second case was studied to prove that the bounds are not responsible for
the polarization. Indeed, due to bounds, some clusters of agents unable to adopt
an attitude far enough from others might explain why some other clusters polarize
and are finally located further than expected. Two indicators are measured during
the simulation and then averaged over the replicates in order to define the number
of norms we observe as well as how moderate they are. These indicators are:
• the number of clusters (which is classically counted by considering an agent as a
member of a cluster if it is located at a distance smaller than a threshold from at
least one member of the group considered); each cluster has its own norm, which
is the average opinion of its members;
• the average absolute opinion on each dimension so as to define how polarized the
population is. Polarization is classically defined as an extremization of attitudes
after some discussions in a group compared to the attitudes initially held by
the in-group people. It is classically measured by the average opinion before and
after a discussion. When the average opinion has increased in absolute value,
the discussion is assumed to have led to polarization, in a process that is both
individual and collective.
The interpretation of the level of moderation of the norm(s) and its
evolution from the average absolute opinion depends on the number of
clusters. We know this model is ruled in terms of group number by the dynamics of
the bounded confidence model. From this model, we are able to define the expected
absolute average opinion of the population when it does not polarize. We thus know
the evolution has to be interpreted differently when the final number of groups is
one and when it is at least two or more:
• when all the agents converge to a unique group, we know that they tend to a
moderate central opinion which is 0.5 in our model. Since the agents opinions are
initialized at random, the average absolute opinion is valued 0 at the beginning,
as the opinion case goes from -1 to +1. Then, for a unique opinion group (a
unique norm), a final value of the average absolute opinion higher than 0 indicates
a polarization of the norm. If the average absolute opinion is higher than 0.5,
this means the population gathered into one moderate group (with an average
absolute opinion close to 0) before adopting an extreme norm (this behavior will
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
9
be illustrated in the following);
• when agents are gathered in several groups at the end of the simulation, the
initial average absolute opinion is still valued 0.5 but the expected moderate
final average absolute opinion varies from 0.4 to 0.5 depending on whether the
number of clusters is odd or even, respectively. Then we can diagnose the level of
polarization of the groups - and each of their corresponding norms - using these
references.
4. The trajectories to understand the global dynamics
Fig. 1. Opinion states for 25,000 agents (25,000 agents were chosen for illustration purposes to
make the dynamics more visible on the graph): on the left, initial random opinion; on the right,
at time-step 448. Each dot represents one couple of opinion (xm,xs) of an agent. On the x-axis,
opinion 1 is the main opinion. On the y-axis, opinion 2 is the secondary dimension. The attitudes
on the secondary dimension are confined in [-1, +1]. Small dots are non-HSI agents, and large dots
are HSI agents. The density distributions of opinions on each dimension are visible on the right and
at the top of the right-hand graph. The model can be run at http://motive.cemagref.fr/lisc/bc/
and thus the trajectories seen in color.
This section shows typical trajectories of the model corresponding to the emer-
gence of a first norm which then goes on to change due to the dynamics. These
trajectories illustrate the main principles of the model. They have been selected for
illustration purposes considering the most frequent steady state of the bounded con-
fidence model: the moderate consensus for which every or almost every agent adopts
a moderate opinion. Figure 1 presents the initial state as well as the type of graph
used to show the trajectories of the model (on the left). All along the simulation,
dots on graphs represent agents opinions: small dots represent the non-HSI agents,
and large dots represent the HSI agents. Since the clusters are sufficiently formed,
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
10 Huet S., Mathias J.D.
they are also represented in density over the parameter space (on the right). The
scale for the density is on the right of the figure. The model can be run online at
http://motive.cemagref.fr/lisc/bc/ and thus the trajectories seen in color (the code
is also available). All the graphs in this section consider a population with 25,000
agents to make them more readable, and a confined secondary attitude.
4.1. A moderate consensus on the main dimension polarizes due
to a minority effect
Figure 2 presents the first unexpected impact of the presence of HIS agents in
the population. After an expected convergence, since um is higher than 0.5, to a
moderate consensus among almost all the agents, this consensual group is seen to
polarize due to the impact of extreme minorities. The trajectory is mainly ruled
by attraction between agents. Due to the high value of um which implies strong
interagent influence, agents quickly gravitate to the center (from step 20 to step
190), and some agents are forgotten by the dynamics on the extreme values of the
main dimension (see the histogram representation of the main dimension on the
figures). HSI agents gravitate to center quicker than non-HSI agents; they only
need to be close to the influencer on the main dimension to converge to the center.
Non-HSI agents are slower due to the double constraint for influence (close on
the two dimensions), and so they are then the ones forgotten by the dynamics on
the extremes. They gather together and constitute the "minor clusters" referred
to in the state-of-the-art section. For us < um, the initial centralization on the
secondary dimension is slower than the centralization on the main dimension (see
figures from step 20 to 190). Then, there are less forgotten agents at the extremes
on the secondary dimension. Moreover, HSI agents gravitate to center quicker than
non-HSI agents (see larger dots in the center compared to small ones around at
steps 20 to 80).
We observe a second period in the simulation from step 80 to step 190. This
is a transitory in-group polarization on the secondary dimension. Almost all the
agents are gathered in the central cluster defined by the main dimension. However,
regarding the secondary dimension, non-HSI agents, which composed the majority
of the central cluster, are gathered in three clusters (see the density distribution
on the right of the figures, step 80 and 93). The HSI agents, which are members
of this central cluster due to their dynamics, assess the non-HSI agents, which are
also members of the central cluster, as being member of their unique cluster also
on the secondary dimension. They are then influenced by them, and continuously
move from one non-HSI secondary dimension cluster to another. At the same time,
they influence in return the non-HSI agents, progressively attracting them to the
center, reducing the number of clusters on the secondary dimension to two (see
density distribution on the figure at step 150), and finally gathering them into a
unique central cluster (step 190).
In a third period, since everyone is gathered in a unique large centered cluster, a
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
11
Fig. 2. From a moderate majority to an extreme majority on the main dimension. Stable state for
25000 agents, um = 0.8, us = 0.3, h = 0.1 (large dots are HSI and small dots are non-HSI agents).
From top left to bottom right, time: 20, 40, 80, 93, 150, 190, 1200, 5300, 8676, 14275, 32600 and
89720. On x-axis, opinion 1 is the main opinion. On y-axis, opinion 2 is the secondary dimension.
The attitudes on the secondary dimension are confined in [-1, +1]. More details on how to read
figures can be found in the caption to Fig. 1.
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
12 Huet S., Mathias J.D.
first moderate norm has been built. However, this moderate cluster slowly oscillates
in the opinion space due to HSI agents who want to be closer to forgotten agents
on the borders since they consider them as members of their own group. This
movement leads the larger cluster to a polarization that is only stopped when all
forgotten people who are close on the main dimension are gathered in it (see from
step 190 to the end). The major cluster, which had been moderate at time 190 and
for a long time, has ultimately changed norm by the end to finish with a relatively
extreme norm.
It is obvious that HSI agents represented by the larger dots are attracted on
both dimensions by the extreme corners of non-HSI agents. To sum up, it is the
stability of the emerging small corner clusters which is responsible for
the polarization of the larger cluster. This stability comes from non-
HSI agents which require closeness on both the main and secondary
dimensions in order to be influenced. It allows the extreme corners of non-HSI
agents to attract the HSI agents previously located in the center. This first type
of polarization is entirely due to the attraction process and does not
depend on the rejection process.
Fig. 3. Long transitory in-group polarization on the secondary dimension um = 0.7, us = 0.1, h
= 0.1, 5000 agents. The clustering process on the secondary dimension is very long when us is
small. Then, the agents stay a long time within several clusters on the secondary dimension inside
a unique cluster based on the main dimension (see time 1500 and 4000 on the left and the centered
graph). However they ultimately form a unique cluster after a very long time (step 96032 on the
right). On x-axis, opinion 1 is the main opinion. On y-axis, opinion 2 is the secondary dimension.
The attitudes on the secondary dimension are confined in [-1, +1]. More details on how to read
figures can be found in the caption to Fig. 1.
The transitory in-group polarization on the secondary dimension observed dur-
ing the second period can last for long as shown in figure 3. It occurs when us is
small (and um >0.5). It is due to the time required to reach the convergence, which
increases when us decreases. At smaller us values, the unique central cluster covers
almost all the secondary dimension for a long time, composed of various subclusters
of non-HSI agents which are joined altogether by moving HSI agents (see Fig. 5).
At the end, everyone is gathered in the center due to the impact of the HSI agents.
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
13
This perfectly describes how HSI increases the level of cohesion of the population
compared to a population of non-HSI agents (i.e. compared to the classical bounded
confidence model).
4.2. A moderate consensus on the secondary dimension polarizes
due to another minority effect
Fig. 4. From a moderate majority to an extreme majority on the secondary dimension. Stable
state for 25000 agents, um = 0.7, us = 1.0, h = 0.1 (large dots are HSI agents and small dots
are non-HSI agents). Top circles indicate extreme cluster of non-HSI agents and bottom circles
indicate HSI agents. From top left to bottom right, time: 11, 14, 96, 6505 and 15969. On the x-axis,
opinion 1 is the main opinion. On the y-axis, opinion 2 is the secondary dimension. The attitudes
on the secondary dimension are confined in [-1, +1]. More details on how to read figures can be
found in the caption to Fig. 1.
Figure 4 shows how a similar change can also occur on the secondary dimension
in a mixed population. For our particular case, compared to the minority effect
leading to norm change on the main dimension, agents in the central cluster gather
very fast on the secondary dimension (see steps 11 and 14). As in the previous
subsection, some non-HSI agents remain forgotten on the extremes, especially on
the main dimension because us is so large on the secondary dimension that the
convergence to the center happens very quickly and does not forget anyone except
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
14 Huet S., Mathias J.D.
if the closeness conditions is not respected on the main dimension. Moreover, agains
since us is very large, agents are very close to each other on the secondary dimension
before being close on the main. In such situation, HSI agents located at one extreme
of the large cluster on the main dimension shift away from agents (HSI or non-HSI)
located at the other extreme of this same large cluster, since they do not consider
them as members of the same group while feeling close on the secondary dimension
(see steps 11 and 14, HSI agents represented by the larger dots). Some HSI agents
polarize progressively to the extreme by shifting away from the other HSI agents
and the forgotten non-HSI agents located close to the other extreme, while the other
agents have gathered to a major cluster with a moderate norm (see step 96).
Then, these HSI and non-HSI agents gather together to create extreme minor
clusters (see step 6505). From the point of view of the HSI agents, members of the
largest initially central cluster, the members of the minor clusters are considered as
close on the secondary dimension while far on the main dimension. The HSI agents
of the largest cluster then shift away from them while simultaneously attracting
the non-HSI agents of the largest cluster. On the other hand, extreme HSI agents
of the minor clusters do the same (see bottom circles on fig. 4). This makes the
large cluster polarized on the secondary dimension until the minor clusters are no
longer considered close while minor clusters do the same. Then, once again, after
having an initially moderate norm, the major cluster adopts an extreme norm, but
on the secondary dimension. This type of polarization depends on rejection
(it does not appear for a similar model with no rejection).
5. The global properties of the dynamics
This section overviews the stable states reached by the model presented in section
3. We especially want to see which norm is reached and whether it changed during
the simulation.
5.1. When does the norm change on the main dimension?
In the following, we address our research question by looking on the main dimension
and the secondary dimension in turn. We draw maps of the average absolute opinion
at the end of the simulation for various um and various us on the main and on the
secondary dimension. As explained in subsection 3.3, interpretation of the degree
of gray depends on the number of clusters at the end of the simulation. Two areas
should be distinguished: um > 0.5 giving more than one cluster on the left of the
map; and um < 0.55 giving one major cluster on the right of the map. Perfect
moderation of the final opinions is indicated in white on the right but mid-grey on
the left. For both sides, all other gray degree show various levels or polarization.
The fig. 5 shows the maps for main dimension.
For um > 0.5 corresponding to only one major cluster, we observed a polarized
norm within a particular angle-shape of couples of (um, us) values. The trajectory
shown in the Figure 2 occurs in this area which corresponds to a norm change from
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
15
s
u
1
0.95
0.9
0.85
0.8
0.75
0.7
0.65
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 1
um
Fig. 5. Variation of average absolute opinion on the main dimension for h = 0.1 and 10000 agents.
x-axis plots um and y-axis plots various um.
moderate to extreme. The white area indicates agents that have adopted a moderate
norm and then remain unaffected by extreme minor clusters. The angle-shape is due
to the speed of convergence which, depending on the value of uncertainty, leaves the
agentsat various distances from the center without being influenced by the other
converging agents. This was pointed out by [23] in their study of the emergence
of minor clusters in a bounded confidence model implemented in an agent-based
model. Figure 6, which is extracted from their work, clearly shows that in the area
corresponding to one major centered cluster (on the right of the graph), the location
of the minor cluster, not so far from the center at the beginning, strays further away
as u increases. Thus, when the minor clusters are closer on one dimension to the
HSI agents shifting towards them, they can be influenced quicker by HSI agents and
join the moderate central cluster before the HSI agents have attracted the majority
of non-HSI agents of the moderate central cluster to the extreme. When the minor
clusters are further, they almost cannot be influenced by HSI agents before the
moderate major cluster becomes more extreme. This indicates that this dynamics
is probably sensitive to the proportion of HSI agents in the population.
On the left part of the figure, for um < 0.55 corresponding to more than one
major cluster, we observed norms that polarized for um=0.45 and us from = 0.3
to 0.75 (see the darkest gray of the left part of the figure). This um value indicates
that the stable state has two major clusters. The darker area thus corresponds to a
bipolarization of the population. For lower and larger values of us, the population
gathered in two moderate clusters is not sensitive to the minor extreme clusters.
Note that this kind of polarization on the main dimension only occurs when the
population is mixed, composed of HSI and non-HSI agents. It does not occur with a
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
16 Huet S., Mathias J.D.
simple 2D bounded confidence model, nor with a model like [20] with a population
composed only of HSI agents.
Fig. 6. Distribution of agents opinions x (on the y-axis) as a function of attraction threshold u
in x-axis for µ = 0.5 - extracted from [23], figure 2. White dots indicate minor clusters, whereas
black dots indicate major clusters, with a population larger than 1000 agents. The lines enclose
the basin of attraction of the state with a single cluster. The results of a single realization are
shown in each panel for each value of u on the x-axis.
5.2. When does the norm change occur on the secondary
dimension?
Figure 7 shows the maps for the secondary dimension.
For um > 0.5 corresponding to only one major cluster, we observed a polarized
norm for (a) large us > 0.9 and (b) small us < 0.15. The trajectory shown in
figure 4 occurs in this area, for a large us. This is where we observe a norm change:
from moderate to extreme. What occur in this area for small us corresponds to the
trajectory shown in the figure 3, which is a very long transitory polarization on the
secondary dimension. We have not done a long-enough simulation to observe the
final moderate consensus, so the centralization is not yet total at the end of our
simulations. The white and light-grey areas indicate a total centralization where
agents have adopted a moderate norm and then remain unaffected by extreme
minor clusters.
On the left part of the figure, for um < 0.55 corresponding to more than one ma-
jor cluster, we observed a polarization of norms when us is large enough compared
to um (darker areas). Note there is not only a polarization on the left corner (darker
areas) but also a centralization (mid-grey area around the diagonal of the left part).
The population states in this centralization area is composed of clusters of agents
having a similar opinion that is closer to the centered opinion 0 compared to the
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
17
s
u
1
0.95
0.9
0.85
0.8
0.75
0.7
0.65
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
1.0
0.8
0.6
0.4
0.2
0.0
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 1
um
Fig. 7. Variation of the average absolute opinion on secondary dimension for h = 0.1 and 10000
agents. x-axis plots um and y-axis plots various um.
expected moderate behavior. This expected behavior corresponding to the case of
HSI agents having no impact is reached in the transitory area between the darker
top triangle and the mid-grey diagonal [see 3.3 for details on how to interpret the
average absolute opinion values]. These polarization and centralization dynamics on
the secondary dimension, as well as the position of the moderate frontier between
the two, can be properly explained. The frontier is defined by us=2 um. Indeed,
in a pure non-HSI-agent population, cluster localization is exclusively due to the
attraction process, as agents gather each other in areas of us or um widths. So two
clusters, located in two different areas, are distant from two us or um (depending
on the dimensions we look at). Conversely, when the population contains some HSI
agents, the attraction on the secondary dimension is no longer bounded by us since
HSI agents are attracted and attract in return every other agent that is close on
the main dimension until they all become members of the same cluster on the sec-
ondary dimension too. There is thus a strong tendency to gather in the center of
the secondary dimension in a first step. However, in a second step, the rejection
by HSI agents of members of other clusters defined by the main dimension pushes
away the people from different clusters on the secondary dimension. This is a norm
change: from moderate at first, to polarized. However, HSI agents do not need to
differ from more than us to become stable. This is why clusters have a closer equi-
librium position in the opinion space on the secondary dimension (distant from us)
than expected from a more oriented attraction dynamics (distant from 2 us). As
confirmed by Figure 8 at right, this is affected by h, which partly rules the initial
attraction strength against the rejection process.
Overall, for a population containing HSI agents, the frontier between centraliza-
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
18 Huet S., Mathias J.D.
Fig. 8. Dynamic equilibrium state for 5000 agents, um = 0.05 and us = 1.1, for h = 0.7 on the left
and for h = 0.05 on the right. A small h (on the right) allows agents to cluster on the secondary
dimension even if HSI agents continue moving, whereas for a large h the agents are always moving
and unsatisfied (on the right). This clearly shows that the smaller proportion of HSI agents allows
non-HSI agents to cluster despite the bounded property of the opinion space. The HSI agents are
located on the extrema of the secondary dimension and in the center. Clusters, mainly composed
of non-HSI agents are stable even if close on the main dimension. Since HSI agents, a minority, are
attracted by their related clusters of non-HSI agents, they remain close to them on the secondary
dimension despite their discomfort with also being close on the main dimension with other clusters
and/or on the borders of the secondary dimension. They have pushed their own clusters away
from the center of the secondary space, but there are too few of HSI agents to make them move
continuously.
tion and polarization on the secondary dimension is defined by us=2um, regardless
of whether the dimension is bounded, because this is the exact value for which
the opinion space occupied by the clusters on the main dimension and the second
dimension is the same, knowing that the whole space on the main dimension is oc-
cupied according to the uniform initial distribution of opinion. For us <2um, there
is less space occupied on the secondary dimension, which implies a centralization
of opinions that are consequently closer to the center than they initially were. For
us >2um, the clustering process on the secondary dimension requires more space
than that occupied on the main dimension. This opinion evolution occurs when the
rejection threshold is significantly higher than the attraction threshold. For these
values, the rejection process is dominant. The initial attraction on the secondary
dimension is weak. Indeed, as the attraction on the main dimension is also weak,
many agents stay far from each other. The polarization on this dimension begins
before the centralization has really been formed. In this case, people are partic-
ularly narrow-minded about what is important for them, and thus form a lot of
groups. Moreover, HSI agents want to be very different from agents of other groups
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
19
on the secondary dimension. They socially self-define by differentiation to others.
For a pure population of HSI agents and for very small um values and very large
us values, agents continue to fluctuate on the secondary dimension without being
able to find an opinion allowing them to differentiate from agents of other groups.
In the same conditions, for a mixed population with a small enough h, agents do
not fluctuate. Figure 8 illustrates these behaviors and shows (see left) that a mixed
population tends to cluster. Indeed, on the left, we observe that for low h values, the
number of clusters is the same for a bounded opinion space as for an un-bounded
opinion space (see on the right of Figure 9). Conversely, on the left of figure 9
showing a pure population of HSI agents in a bounded opinion space, for larger h
values, the number of clusters decreases to zero since the continuous move on the
secondary dimension makes the cluster-counting algorithm inefficient.
Fig. 9. Average absolute opinion on the secondary dimension (bars) and average number of clusters
containing more than 2% of the population (line) for various h on x-axis on the left for an bounded
opinion space and on the right for an unbounded opinion space (5000 agents um = 0.05 and us
=1.1, 10 replicates). Note that polarization level is the same for all h in the bounded space case
but sensitive to h in an unbounded opinion space. This finding warrants further investigations,
which are not in the scope of this paper.
Note, finally, that the polarizations for um > 0.5 on the secondary dimension
only occur when the population is mixed, composed of HSI and non-HSI agents,
at least for us ≤ 1. It does not occur with a simple 2D bounded confidence model,
nor with a model like [20] with a population composed only of HSI agents. The
polarization for um < 0.55 and a large enough us does not occur with a simple 2D
bounded confidence model but does occur with a model like [20] with a population
composed only of HSI agents.
5.3. What about the two dimensions seen simultaneously?
Overall, from the comparison between the figure 5 and the figure 7, one can no-
tice the two types of polarization, on the main and on the secondary dimension,
do not appear simultaneously. However, the centralization area on the secondary
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
20 Huet S., Mathias J.D.
dimension, delimited by us ≃ 2um, corresponds to very different behaviors on the
main dimension: polarization, centralization or no change. This means that while
the cohesion increases on the secondary dimension, all the behaviors are possible
on the main dimension.
We would intuitively think that the polarization can be explained by the fact
the opinion space is bounded. However, this is not the case, as can be seen in Figure
10 below showing results for an unbounded attitude space, where we see the same
polarization areas on both maps.
s
u
1
0.95
0.9
0.85
0.8
0.75
0.7
0.65
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
s
u
1
0.95
0.9
0.85
0.8
0.75
0.7
0.65
0.6
0.55
0.5
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
4.0
3.5
3.0
2.5
2.0
1.5
1.0
0.5
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 1
0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 1
um
um
Fig. 10. Average absolute opinion on the main (left) secondary (right) dimension for 10000 agents
evaluating in an unbounded opinion space, h=0.1. x-axis plots um and y-axis plots us. While
white (right part on the right figure) or mid-grey (left part of the left figure) charts the area with
a moderate polarization [which in fact can correspond to no change in polarization compared to
the initialization, but also to a decrease preceding an increase], white on the right part of the left
figure) charts the area of total centralization and darker grey charts the area of polarization [which
has decreased and then increased, or not changed].
6. Conclusions
Here we study how self-involvement can explain a norm change in an agent-based
model. We consider a population composed of two different types of agents: highly-
self-involved (HSI) agents having a dynamics based on [20] inspired by a particular
set of experiments [46]; non-highly-self-involved agents (non-HSI) with a dynamics
based on a 2D bounded confidence model [9]. The dynamics of HSI corresponds to
the particular behavior in terms of attitude change of people who are highly self-
involved in one dimension and consider it as self-defining. From the modelling point
of view, it assumes that one dimension is more stable and more important than the
other. This more stable dimension, called main dimension, represents the highly
self-relevant issue for the agents, and it rules the attitude change on a secondary
dimension. If two agents are close on the main dimension (separated by a distance
smaller than um), then they attract each other on the main dimension and on
the secondary dimension, whatever their disagreement on the secondary dimension.
If they are far from each other on the main dimension, then proximity on the
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
21
secondary dimension (at a distance less than us) is uncomfortable, and generates
rejection on this dimension. Proximity on a dimension is defined by comparing the
attitude distance with the agents threshold on this dimension. For non-HSI agents,
neither main nor secondary dimension is more important. Then, to be influenced,
the non-HSI agent should consider the peer source as close on the two dimensions
simultaneously. One might think this latter condition for influence is hard to meet,
yet [46] state that participants who do not consider the source as highly self-relevant
do not change their opinions, and experiments reported in [30] [29] [31] [35] show
that the level of attraction for peers depends on the degree of similarity with them.
As expected, simulations show agents gathering in attitudinal groups. The num-
ber of groups is defined by how close they are on the main dimension to the rest
of the population. Even a few HSI people are enough to minimize the number of
clusters.
The moderate cluster(s) built in the central part (i.e. having a moderate norm)
of the opinion space at first can later polarize on main issues for some particular
couples of values (um, us) and adopt a (some) more extreme norm(s). This is due
to the interaction of these major moderate cluster(s) with some extreme minor
clusters. These extreme minor clusters emerge from the dynamics and are only
composed of non-HSI agents. When they appear close enough to major clusters,
they get absorbed by them, whereas when they are further in the opinion space,
but not far enough for moderate HSI agents to see them as not in-group members,
they attract the moderate agents without being influenced by them. Indeed, they
are more stable, as they are more demanding on the conditions of closeness to
be influenced (i.e. closeness on the two attitudinal dimensions is required). The
attracted moderate HSI agents are then attracted by the non-HSI agents located
both in the center and in the extremes. However, only the interaction with centered
agents is symmetrical. Due to the stochasticity of the model, one of the minor
extreme clusters finally has more impact on the moderate agents. Then, at this time,
extreme non-HSI agents attract moderate HSI agents who, in turn, will attract the
moderate non-HSI agents. This is a long process, since moderate non-HSI agents
resist by also attracting HSI agents. However, as extreme non-HSI agents cannot
be attracted, they finish by winning, and the previous majority of moderate agents
becomes more extreme.
A second type of norm change from moderate to extreme appears on the sec-
ondary dimension. It occurs when some agents remain forgotten on the extreme of
the main dimension - i.e. non-HSI agents, as well as some HSI agents, located far
enough from the center on the main dimensionare rejected on the secondary dimen-
sion during the convergence to a moderate opinion of the population majority. These
extreme agents, both HSI and non-HSI, form extreme minor clusters on the main
attitudinal dimension. The norm change of the clusters is due to HSI agents reject-
ing other HSI agents from other groups and attracting agents of their own groups.
This echoes the theories related to groups and identity, especially self-categorization
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
22 Huet S., Mathias J.D.
theory [25] [16] [21] arguing that agents look for a compromise between difference
and similarity to others at group level. This type of polarization depends on re-
jection. It is more intuitive, since people are more certain about their fundamental
issue than their secondary issue.
The appearance of a long transitory in-group polarization associated with large
certainty (i.e. small uncertainty) on secondary issues is also of interest. It also
perfectly describes how HSI increases the level of in-population cohesion compared
to a population of non-HSI.
7. Discussion
Our discussion consists mainly in a comparison to other models of attitude, as
recommended in [17]. Overall, these first results seem to reconcile different points
of view on the possible source of polarization due to minorities: (1) attraction for
extreme minority on the main issue, or (2) rejection on the secondary issue.
In contrast with most of the scholarship presented in introduction, the hypothe-
ses of our model do not favor one or the other reason for evolution to polarized
norms, but instead integrates both mechanisms and shows that both explanations
are compatible and can occur in different contexts.
Indeed, if we focus on the hypothesis that the change of norm is due to an
attraction of the majority by a minority, we can compare our work to [7] and
[10] and more recently [28] or [19] with a slightly different version of the bounded
confidence model (these two versions have been properly compared in [24]). In
our model, as in these works, the evolution to a polarized norm does not depend
on rejection, but only on attraction to an extreme minority on the main issue.
The result of our experimental design has been also interpreted with the patterns
reported by these authors (see the Appendix). One can draw a parallel with the
classical increase of u and proportion of extremists in the population explaining
the emerging pattern in the bounded confidence with extremists, and the increase
of um, ruling the number of clusters and us ruling how strong the extremists are.
The models differ in the hypothesis explaining the strength of the minor extreme
cluster: in the bounded confidence model, the strength of the extremist cluster is
directly proportional to its size, whereas in our model this relationship is less direct,
because the influence requires conditions on both the attitude dimensions. But the
main difference is that extremists are endogenously added at initialization in the
bounded confidence model with extremists, whereas they emerge in our model. This
emergence makes the impact of us complex and difficult to disentangle. Note too in
Figure 11 in Appendix on the left map that "bipolarization"' in the darkest gray
occurs for lower uncertainty values (i.e. um) compared to the bounded confidence
model with extremists (u).
This suggests that an evolution of the fundamental attitudes defining a norm
is not due to the rejection mechanism on these attitudes but more to the low self-
involvement (i.e. strong uncertainty) of the majority of agents, which makes them
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
23
easier to influence by the extreme minor groups. In some cases, these minor groups
are themselves conversely very resistant to the influence of the moderate majority,
which is the condition they need to attract this majority to their extreme attitude. In
the bounded confidence model with extremists, this resistance comes from strong
certainty, whereas in our model it is due to a higher similarity requirement to
trigger influence. In fact, both explanations can be seen as complementary. Both
of them are compatible with the attitude strength-related literature which argues
that extremity, importance and certainty are key factors in the capacity to resist
influence [34] [3].
Turning to focus on the second possible explanation for evolution of a norm, i.e.
willingness to differentiate, we can also compare our model to the classical patterns
of the bounded confidence model with extremists. An evolution of the moderate
norm to a polarized norm occurs due to rejection on the secondary dimension in our
model. We can see in figure 11 in Appendix on the right map that our model is able
to produce a "single extreme"' and "bipolarization"', again for lower uncertainty
values (um) than the bounded confidence model with extremists. It also shows a
"polarization"' when there are numerous clusters that, to our knowledge, do not
appear in the bounded confidence model with extremists.
Here then, overall, and standing apart from most of the models considering a
rejection process presented in [17], we show in a unique model the various behaviors
and explanations related to the emergence of extreme clusters and moderate to
polarized norms. Moreover, we show that our conclusions are also valid when the
attitude space is not bounded.
However, our results are dependent to a number of assumptions:
• as already stated, the emergence of extreme minority clusters is due to the speed
of the converging process (i.e. due to the parameter µ); nothing occurs when the
speed of convergence to the center is lower ;
• the model assumes a uniform initial opinion distribution. Compared to other
distributions, depending on factors such as the standard deviation of a normal
initial distribution, it yields a lower or higher number of extremists that might
exacerbate the emergence and influence of extreme clusters when these clusters
are due to the speed of the attraction process;
• the interaction network is complete: every agent can try to interact with any other
agent. Regardless of whether this assumption is plausible, it can be expected
to have a positive effect on the number of interactions before convergence, and
perhaps on the number of agents who remain extremists due of the convergence
dynamics;
• the most important dimension is the same for every agent, so the dimension for
unconditional attraction and rejection is the same for everyone, which makes it
quite difficult to expect what would occur if the most important dimension varies
from one agent to another;
• homogeneous um and us thresholds, which might make opinion clusters more
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
24 Huet S., Mathias J.D.
stable than they would be if agents had different thresholds;
The next step is to study the sensitivity of our results to these assumptions.
Acknowledgments
The authors thank the Auvergne Region in France for providing grant funding
("Emergent themes" 2015, project Associatione), and Guillaume Deffuant (Irstea
Lisc) for providing valuable help.
References
[1] Allport, G., The ego in contemporary psychology, Psychological Review 50 (1943)
451 -- 478.
[2] Bicchieri, C. and Mercier, H., Norms and Beliefs: How Change Occurs (Computa-
tional Social Sciences, Springer, Cham, 2014), pp. 1 -- 25.
[3] Bizer, G., Visser, P., Berent, M. K., and Krosnick, J., Importance, Knowledge, and
Accessibility: Exploring the Dimensionality of Strength-Related Attitude Properties
(Princeton University Press, Princeton, 2004), pp. 215 -- 241.
[4] Brewer, M., The social self: On being the same and different at the same time,
Personality and Social Psychology Bulletin 17 (1991) 475 -- 482.
[5] Castellano, C., Fortunato, S., and Loreto, V., Statistical physics of social dynamics,
Review of Modern Physics 81 (2009) 591 -- 646.
[6] Crano, W. D. and Prislin, R., Attitudes and persuasion, Annual Review of Psychology
57 (2006) 345 -- 374.
[7] Deffuant, G., Comparing extremism propagation in continuous opinion models, Jour-
nal of Artificial Societies and Social Simulation 9 (2006) 1 -- 8.
[8] Deffuant, G., Amblard, F., Weisbuch, G., and Faure, T., How can extremism pre-
vail? a study based on the relative agreement interaction model, Journal of Artificial
Societies and Social Simulation 5 (2002).
[9] Deffuant, G., Neau, D., Amblard, F., and Weisbuch, G., Mixing beliefs among inter-
acting agents, Advances in Complex Systems (2001) 87 -- 98.
[10] Deffuant, G. and Weisbuch, G., Probability distribution dynamics explaining agent
model convergence to extremism, Premier Reference Source (Information Science Ref-
erence, Hershey, USA, 2007), pp. 43 -- 60.
[11] Eagly, A. H. and Chaiken, S., The Social Context of Attitude Formation and Change,
Vol. Chapter 13 (Fort Worth, TX: Harcourt Brace Jovanovich, Thomson/Wadsworth,
1993), pp. 627 -- 663.
[12] Farrow, K., Grolleau, G., and Ibanez, L., Social norms and pro-environmental behav-
ior: A review of the evidence, Ecological Economics 140 (2017) 1 -- 13.
[13] Festinger, L., A theory of social comparison processes, Human Relations 7 (1954)
117 -- 140.
[14] Festinger, L., A Theory of Cognitive Dissonance (Stanford, CA, Stanford University
Press, 1957).
[15] Flache, A. and Macy, M. W., Local convergence and global diversity: From interper-
sonal to social influence, Journal of Conflict Resolution 55 (2011) 970 -- 995.
[16] Flache, A. and Mas, M., Why do faultlines matter? a computational model of how
strong demographic faultlines undermine team cohesion, Simulation Modelling Prac-
tice and Theory 16 (2008a) 175 -- 191.
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
25
[17] Flache, A., Mas, M., Feliciani, T., Chattoe-Brown, E., Deffuant, G., Huet, S., and
Lorenz, J., Models of social influence: Towards the next frontiers, Journal of Artificial
Societies and Social Simulation 20 (2017) 2.
[18] Hegselmann, R. and Krause, U., Opinion dynamics and bounded confidence models,
analysis and simulation, Journal of Artificial Societies and Social Simulation 5 (2002).
[19] Hegselmann, R. and Krause, U., Opinion dynamics under the influence of radical
groups, charismatic leaders, and other constant signals: A simple unifying model,
NHM 10 (2015) 477 -- 509.
[20] Huet, S. and Deffuant, G., Openness leads to opinion stability and narrowness to
volatility, Advances in Complex Systems 13 (2010) 405 -- 423.
[21] Jager, W. and Amblard, F., Uniformity, bipolarization and pluriformity captured as
generic stylized behavior with an agent-based simulation model of attitude change,
Computational and Mathematical Organization Theory (2004) 295 -- 303.
[22] Jager, W. and Amblard, F., Multiple attitude dynamics in large populations, in
Agent 2005 Conference on Generative Social Processes, Models, and Mechanisms,
eds. Macal, C., North, M., and Sallach, D. (co-sponsored by Argonne National Lab-
oratory and The University of Chicago, 2005), pp. 595 -- 613.
[23] Laguna, M. F., Abramson, G., and Zanette, D. H., Minorities in a model for opinion
formation, Complexity 9 (2004) 31 -- 36.
[24] Lorenz, J., Continuous opinion dynamics under bounded confidence: A survey, Inter-
national Journal of Modern Physics C 18 (2007) 1819 -- 1838.
[25] Mark, N. P., Culture and competition: Homophily and distancing explanations for
cultural niches, American Sociological Review 68 (2003) 319 -- 345.
[26] Mason, W. A., Conrey, F. R., and Smith, E. R., Situating social influence processes:
Dynamic, multidirectional flows of influence within social networks, Personality and
Social Psychology Review 11 (2007) 279 -- 300.
[27] Mathias, J., Huet, S., and Deffuant, G., An energy-like indicator to assess opinion
resilience, Physica A: Statistical Mechanics and its Applications 473 (2017) 501 --
510.
[28] Mathias, J.-D., Huet, S., and Deffuant, G., Bounded confidence model with fixed
uncertainties and extremists: The opinions can keep fluctuating indefinitely, Journal
of Artificial Societies and Social Simulation 19 (2016) 6.
[29] Michinov, E. and Michinov, N., Social comparison orientation moderates the effects
of group membership on the similarity-attraction relationship, The Journal of Social
Psychology 151 (2011) 754 -- 766.
[30] Michinov, E. and Monteil, J.-M., Attraction personnelle et attraction sociale: Lorsque
la saillance categorielle annule la relation similitude-attraction, Canadian Journal of
Behavioural Science/Revue canadienne des sciences du comportement 35 (2003) 305.
[31] Montoya, R. M. and Pittinsky, T. L., When increased group identification leads to
outgroup liking and cooperation: The role of trust, The Journal of Social Psychology
151 (2011) 784 -- 806.
[32] Moscovici, S. and Zavalloni, M., The group as a polarizer of attitudes, Journal of
Personality and Social Psychology 12 (1969) 125 -- 135.
[33] Petty, R., Cacioppo, J., and Haugtvedt, C., Ego-involvement and persuasion: An
appreciative look at the Sherif 's contribution to the study of self-relevance and attitude
change (Springer/Verlag, New York, 1992), pp. 147 -- 175.
[34] Petty, R. and Krosnick, J. A., Attitude strength: An overview, Vol. 4 (Lawrence Erl-
baum Associates, Inc, Hillsdale, NJ, England, 1995), pp. 1 -- 24.
[35] Reid, C. A., Davis, J. L., and Green, J. D., The power of change: interpersonal
attraction as a function of attitude similarity and attitude alignment, The Journal of
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
26 Huet S., Mathias J.D.
Social Psychology 153 (2013) 700 -- 719.
[36] Salzarulo, L., A continuous opinion dynamics model based on the principle of meta-
contrast, Journal of Artificial Societies and Social Simulation 9 (2006).
[37] Schultz, P., Nolan, J., Cialdini, R., Goldstein, N., and Griskevicius, V., The construc-
tive, destructive, and reconstructive power of social norms, Psychological Science 18
(2007) 429 -- 434.
[38] Sherif, C. W. and Muzafer, S., Attitude, ego-involvement, and change, in Symposium
of the Pennsylvania State University (Wiley, New York, 1968), p. 316.
[39] Sherif, M. and Hovland, C., Social Judgment. Assimilation and contrast effects. Com-
munication and attitude change (New Haven and London: Yale University Press,
1961).
[40] Tajfel, H. and Turner, J., An integrative theory of intergroup conflict (Monterey, CA:
Brooks/Cole, 1979), pp. 33 -- 47.
[41] Thomsen, C. J., Borgida, E., and Lavine, H., The causes and consequences of personal
involvement (Psychology Press Taylor and Francis Group, 1995), pp. 191 -- 214.
[42] Turner, J., Social identification and psychological group formation, chapter 25 (Cam-
bridge University Press, Cambridge, 1984), pp. 518 -- 538.
[43] Turner, J., Hogg, M., Oakes, p., Reicher, S., and Wetherell, M., Rediscovering the
social groups: A self-categorization theory (Cambridge, MA: Basil Blackwell, 1987).
[44] Whittaker, J. O., Opinion change as a function of communication-attitude discrep-
ancy, Psychological Reports 13 (1963) 763 -- 772.
[45] Wood, W., Lundgren, S., Ouellette, J., Busceme, S., and Blackstone, T., Minority
influence: a meta-analytic review of social influence processes, Psychological Bulletin
115 (1994) 323 -- 345.
[46] Wood, W., Pool, G., Leck, K., and Purvis, D., Self-definition, defensive processing,
and influence: the normative impact of majority and minority groups, Journal of
Personality and Social Psychology (1996) 1181 -- 1193.
Appendix A. Results of the experimental design expressed in
terms of patterns of the bounded confidence model
with extremists
Figure 11 presents the map indicating the patterns output from the model for the
experimental design presented in section 3.3. A type of convergence, i.e. a pattern,
is defined by at least 50% of replicates leading to this type. The patterns are:
• the large majority of agents gather in a single moderate cluster - number 0 on
the map;
• the large majority of agents gather in a single polarized cluster - number 1 on
the map;
• the agents are gathered in different groups of attitudes or opinions and these
groups are located further from each other than expected by the bounded confi-
dence model - number 3 on the map;
• bi-polarization, a subcategory of the pattern above, in which the agents are gath-
ered in two major groups of attitudes or opinions and these two groups are located
further from each other than expected by the bounded confidence model - number
2 on the map ;
• the agents are gathered in different groups of attitudes or opinions and these
March 24, 2021 11:6 WSPC/INSTRUCTION FILE
sHuetHSInonHSI
Few self-involved agents among BC agents can lead to polarized local or global consensus
27
groups are moderate enough since they are located at the same distance from
each other as expected by the bounded confidence model - number 4 on the map;
Fig. 11. Diagnosis on the main dimension (on the left) and on the secondary dimension (on
the right), h 0.1: 0 (or 0.5) means single moderate cluster; 1 means single extreme cluster; 3
means several polarized clusters; 4 means several moderate clusters; 2 means bi-polarization (two
polarized clusters). For each map, x-axis plots um increasing from right to the left, and y-axis
plots us decreasing from top to the bottom.
The polarization on the main and on the secondary issue does not, at a stable
state, seem able to occur simultaneously in most cases. However, a long transitory
polarization on the two dimensions is definitely possible for um and us values in the
bottom right corner.
Moreover, the map does not show the state recently pointed out by [28] in
which non-extremist agents continue to fluctuate without being able to find a stable
attitude due to a very large uncertainty and their attraction for the extremists
agents. This is because it does not appear with h 0.1, but we know from [20] that
when h is larger, in fact 1 in this paper, this kind of state also appears. However,
it differs in the way it can be explained from the dynamics, since it is not only
associated to the uncertainty value but also to the rejection process.
|
1204.6091 | 1 | 1204 | 2012-04-27T00:34:19 | A structured approach to VO reconfigurations through Policies | [
"cs.MA",
"cs.SE"
] | One of the strength of Virtual Organisations is their ability to dynamically and rapidly adapt in response to changing environmental conditions. Dynamic adaptability has been studied in other system areas as well and system management through policies has crystallized itself as a very prominent solution in system and network administration. However, these areas are often concerned with very low-level technical aspects. Previous work on the APPEL policy language has been aimed at dynamically adapting system behaviour to satisfy end-user demands and - as part of STPOWLA - APPEL was used to adapt workflow instances at runtime. In this paper we explore how the ideas of APPEL and STPOWLA can be extended from workflows to the wider scope of Virtual Organisations. We will use a Travel Booking VO as example. | cs.MA | cs | A structured approach to VO reconfigurations through
Policies
Stephan Reiff-Marganiec
Department of Computer Science
University of Leicester
Leicester, UK
[email protected]
One of the strength of Virtual Organisations is their ability to dynamically and rapidly adapt in re-
sponse to changing environmental conditions. Dynamic adaptability has been studied in other system
areas as well and system management through policies has crystallized itself as a very prominent so-
lution in system and network administration. However, these areas are often concerned with very
low-level technical aspects. Previous work on the APPEL policy language has been aimed at dynam-
ically adapting system behaviour to satisfy end-user demands and – as part of STPOWLA – APPEL
was used to adapt workflow instances at runtime. In this paper we explore how the ideas of APPEL
and STPOWLA can be extended from workflows to the wider scope of Virtual Organisations. We will
use a Travel Booking VO as example.
1 Introduction
Over the last decade there were many changes to the business sector, many were driven by a fundamental
penetration of IT into business and daily life. Customers nowadays expect businesses to be available
24/7 and to cater for their ever changing demands – and they can do so because the world has in many
ways become more local. Through the internet one can now obtain services and products from around
the globe with no additional effort to buying from a local provider. Clearly these changes mean that
businesses have to adapt to cater for this demand and remain competitive.
This might sound very negative, but many opportunities have arisen out of this change as businesses
can now provide to a global market, thus having significantly expanded their customer reach. Businesses
can also use this connected world to work together effectively, thus being able to jointly offer services
which they cannot offer individually.
On the IT side, Business Process Management (BPM) and SOA have become more integrated, pro-
viding promising solutions to the design and development of the software systems of the future, as
clearly stated in [10]: "The BPM-SOA combination allows services to be used as reusable components
that can be orchestrated to support the needs of dynamic business processes. The combination enables
businesses to iteratively design and optimize business processes that are based on services that can be
changed quickly, instead of being 'hard-wired'. This has the potential to lead to increased agility, more
transparency, lower development and maintenance costs and a better alignment between business and
IT."
These changes apply to the business process, where the flexibility to customize a core model to
adapt it to various requirements and to accommodate the variability of a business domain are required.
In previous work [9], we defined StPowla – to be read like 'Saint Paula' – a Service-Targeted Policy-
Oriented WorkfLow Approach. StPowla supports policy-driven business modelling over general Service
Oriented Architectures (SOAs).
Jeremy Bryans and John Fitzgerald (Eds.):
Formal Aspects of Virtual Organisations 2011 (FAVO 2011)
EPTCS 83, 2012, pp. 22–31, doi:10.4204/EPTCS.83.3
c(cid:13) S. Reiff-Marganiec
This work is licensed under the
Creative Commons Attribution License.
S. Reiff-Marganiec
23
However, the demand for flexibility and copying with variability does not stop at the business process
– it extends to the whole organisation. This becomes of fundamental importance when we consider small
and medium organisations working together to be competitive in a global market. In some sectors, for
example the building trade, people have done this for a long time by pulling in skills from other compa-
nies by subcontracting. Virtual Organisations have emerged as a way to capture flexible cooperation. As
such a VO presents a loosely bound consortium of organisations that work together to achieve a specific
goal for a customer; the consortium will usually disband when no further demand for its service exists.
To allow for VOs to be formed quickly, the notion of a VBE (a VO Breeding Environment) provides a
structure in which companies are aware of each other and have established relationships on which they
can draw when new demands arise. The organisational advantages of VBEs have been discussed in detail
in several publications, for example [1, 7].
Much work in the area of VOs focuses on their use in organisational environments or steps towards
frameworks for enabling VOs. another avenue that is pursued, possibly to a lesser extent, is that of
modelling VOs to understand and analyze their behaviour and structure more formally. Such approaches
include [6, 17, 4], and the work presented here considers modelling of reconfigurations.
In this short exploratory paper we will review APPEL and STPOWLA in Section 2 and briefly recap
on the VOML modelling framework for VOs in Section 3. The core of the paper (Section 4)will present
initial investigations in extensions to the StPowla ideas for VOs – which is very much work in progress.
Sections 5 and 6 will round the paper off by looking at related work and drawing conclusions on our
work.
2 Appel Policies and Workflow Reconfigurations
Policies have been used to describe rules that are used to modify the behaviour of a system at runtime,
e.g. [12]. Much effort has been invested in defining policy languages for low-level system administration
(such as management of network routers), but also into policy languages for access control. APPEL has
been defined with a natural language semantics [18] as well as a formal semantics based on ∆DSTL [14].
APPEL was developed for telecommunications systems, however it is a general language for expressing
policies in a variety of application domains. APPEL was designed with a separation between the core
language and its specialization for concrete domains.
In APPEL a policy consists of a number of policy rules, grouped using a number of operators
(sequential, parallel, guarded and unguarded choice). A policy rule has the following syntax
[appliesTo location] [when trigger] [if condition] do action
(1)
The core language defines the structure of the policies, the details of these parts are defined in specific
application domains. Triggers and actions are domain-specific. An atomic condition is either a domain-
specific or a more generic (e.g. time) predicate. This allows the core language to be used for different
purposes.
The applicability of a rule is defined on the core language and depends on whether its trigger has
occurred and whether its conditions are satisfied. Triggers are caused by external events. Triggers may
be combined using or, with the obvious meaning that either is sufficient to apply the rule. Conditions
may be negated as well as combined with and and or with the expected meaning. A condition expresses
properties of the state and of the trigger parameters. Finally, actions have an effect on the system in
which the policies are applied. A few operators (and, andthen, or and orelse) have been defined to
24
VO reconfigurations through Policies
create composite actions.
component of a system they apply.
In addition policies are 'located', that is one can define to which actor or
STPOWLA is concerned with the adaptation of workflows, which are then executed on top of a service
oriented architecture. A workflow defines the business process core as the composition of building
blocks called tasks, similar to [16]. Each task performs a step in the business; policies are used to
express finer details of the business process, by defining details of task executions as well as workflow
adaptations. Policies can be updated dynamically, to adapt the core workflow to the changing needs of
the environment. Note that the policies are assumed to be applied at execution time of a workflow and
dynamically make changes to an instance of the workflow that is being run.
Policies in STPOWLA exist in two flavours: refinement policies and reconfiguration policies. The
former are concerned with adding extra requirements to be considered when a service is located to
execute a task (e.g. select only services that are based in Europe). The latter modify the workflow
structure, for example by adding and/or deleting tasks. Let us just consider a few examples of policies,
at a quite abstract level. Considering a hotel setting, we might have policies like
P1: Company invoiced customers will not be required to pay a deposit on checking in.
P2: In a small hotel, the hotel manager will show VIP customers to their rooms.
P1 would be an example of a policy that changes the workflow: one would normally expect a 'pay
deposit' task to exist, which would be removed for the instances covered by P1. P2, on the other hand,
is a policy that places requirements on a task: if we assume a 'show customer to room' task, then this
would normally need to be enacted by a hotel employee and the specific one to be chosen for VIP guests
is the hotel manager.
APPEL was specialised to the domain of workflows, by making precise the triggers, conditions and
actions that are possible in the domain of workflow adaptation [15] and [3] are concerned with refinement
and reconfiguration policies respectively.
The defined triggers are based on tasks: one might wish to apply rules when a task is started,
completes or fails so triggers are defined as task entry, task exit and task f ail. Actions are either a
parametrised refinement action req(−,−,−) or actions to insert and remove tasks (insert(T 1,T 2,−)
and remove(T )). The semantics of req is to find a service as described by the first and third arguments
(specifying service type and SLA constraints), bind it, and invoke it with the values in the second argu-
ment (the invocation parameters). insert inserts the task specified in the first argument after or in parallel
to the task in the second argument based on the value in the third argument while remove removes the
task. Clearly when adding or removing tasks there might be clean-up actions needed to ensure a well-
formed workflow, which are considered in the definition of the semantics of the actions. Also, req might
lead to requirements that cannot be fulfilled if no suitable service can be found – a fact of reality.
3 VOML Models
The Virtual Organization Modelling Language (VOML) is dedicated to VO development in the context
of a VO Breeding Environment. The VOML approach [2, 17] supports the definition of structural and
behavioural models of VBEs and VOs based on three different levels of representation: (1) the defini-
tion of the persistent functionalities of the VBE; (2) the definition of the transient functionalities of the
VOs that are offered by the VBE at a specific moment in time and (3) the ensemble of components (in-
stances) and connectors that, at that time, deliver the services offered by the VOs present in the business
configuration.
S. Reiff-Marganiec
25
VOML offers several sub languages, addressing different levels of a VO. VO-S (the structural VO
modelling language) is concerned with the structural level description of a VO, VO-O (the operational
VO modelling language) is more focused on a description that refines the structural model by provid-
ing operational details. VO-R (the VO reconfiguration language) presents an alternative approach to
describing reconfigurations (we will contrast this in the next section).
In this paper we are mostly concerned with the structural representation of a VO, as it is here that in
our opinion the most interesting adaptations can be made. We will here review VO-S briefly.
We define the basic structure of the VO in VO-S. The VO structural model consists of five basic
elements: (1) Members, (2) Process, (3) Tasks, (4) VBEResource and (5) Data-Flow. Of these, Members,
Tasks and VBEResources are elements that can occur in VBE specifications, too.
Members can be Partners (permanent members of the VBE), Associates (transient members of the
VBE who have joined temporarily to fulfil demand for a VO) and extEntity (transient members of a VO
who are discovered for each VO instance). The Process describes the workflow which lists those tasks
that contribute directly towards achieving the goals of the VO (this captures the control flow) and Data-
Flow expresses which data items are expected from the customer and partners and their flow between
tasks. VBEResources are resources available to all VOs and are provided by the VBE. Finally, Task
specifications define the competencies required by the VO from its members. Tasks are complex and a
more detailed description is available in [17]. VO-S provides three types of tasks: AtomicTask (tasks to
be performed by only one member), ReplicableTask (tasks that can be shared to gain extra capacity) and
ComposableTask (tasks that can be shared to address capability issues) to address one of the main reason
of VO formation (namely the incapacity of each individual organisation of reacting to a demand).
4 VO reconfigurations
Applications of APPEL in the context of communications systems, and indeed in our related work [17]
policy triggers are events occurring through communication or events in the system. For example, we
have suggested triggers such as capability de f icit(), which would be raised if the VO (maybe through its
coordinator) identifies that there could be the specific problem of a certain capability not being available.
The advantage is that the events are occurring in the domain, however it comes with the disadvantage that
new such domain events might be formulated and hence the vocabulary of the policy languages needs to
be extended. There is also the question as to implementing the monitoring of the environment and the
raising of the triggers as part of a component or actor who gains a very central role in the VO.
STPOWLA considers adaptations made to the workflows or tasks in relation to the starting or entering
of a task, so one could say that policies are triggered by the execution structure of the workflow. This
approach is different in that decisions to restructure are taken just before a task is undertaken or after
it has finished (or failed). This means that a very small and stable number of triggers exists. We will
explore here how this approach would work for VOs.
Let us consider the specific triggers, actions and conditions that form the domain specific parts of a
policy language for VO reconfigurations.
The VO-S model has tasks as central entities, which are then discharged by VO members. It seems
sensible to assume that these tasks do in their fundamental nature not differ from tasks in a workflow,
and hence we can reuse the three triggers from StPowla. The triggers are summarised in Tab. 1
Note that a tasks will have a hidden boot-strap process where it will be checked whether members are
assigned to enact it and where the existence of all capabilities and capacities needed for the task will be
evaluated. One could say that this is a default policy for a task, which as actions adds required members
26
VO reconfigurations through Policies
Trigger
task entry()
task exit()
task f ailure()
Description
occurs when a new task is started, that is when data and control flows have
reached a task and it becomes active
occurs when a task completes successfully, that is when data and control
flows are exiting the task
occurs when a task fails
Table 1: Triggers
Group
Workflow – Control
Workflow – Control
Workflow – Data
Workflow – Data
Action
add task(T 1,T 2,relation)
delete task(T )
provide input(I,T )
remove input(I,T )
change type(T,newtype,args) Task Structure
add member(P)
remove member(P)
assign duty(P,T,args)
unassign duty(P,T,args)
Members
Members
Duty
Duty
Table 2: Actions
and assigns them to the task if there is any shortage. If no suitable members can be found the task will
fail.
Policies achieve change through the actions that they propose. In order to understand the full cata-
logue of actions that we need to offer we need to analyse what aspects of VO we might wish to change.
Recall that STPOWLA allowed for changes to the workflow as well as the addition of extra require-
ments for a task. VOs are more complex than workflows, in fact workflows form just one part of a VO
specification.
Table 2 shows the actions that will be available to policy authors and hence the opportunities to
change the VO. The actions fall into a number of different groups, depending on which entity they affect.
We believe that all structural changes that must be made to a VO can be achieved by the above actions,
which we will now describe and analyse in more detail.
The most obvious change to a VO is the addition or removal of a member. To that extend add member()
and remove member() actions are provided. They take a single argument, the member identifier P of the
affected member. The semantics of add member() is straight forward: a new member will be available in
the VO to undertake duties. remove member() is more complicated. While the member is removed from
the VO and hence will not be available for any duties any more they will have to discharge any activities
that they are involved with in active instances of the VO and as a consequence of them being removed
the will be automatically unassigned from any duties on tasks. This will possibly lead to a number of
tasks that are unassigned to a member or where there is a shortage of capabilities or capacities – these
circumstances will be repaired by the task's default policy.
assign duty(P,T [,args]) allows for member P to be added to task T . As members could offer a
number of capabilities and there is always choice on capacity the assignment operation will allow to
specify which capability and what capacity a member will bring to a task. unassign duty(P,T [,args])
allows to remove responsibilities from a member – note that as with remove member() the member will
S. Reiff-Marganiec
Action
can run(T )
active(T )
task type(T )
has capacity(P,c1,c2)
has capability(P,c)
27
Group
allows to check whether all requirements for a task T are full-filled,
that is whether all needed members are assigned and sufficient resources
are available.
allows to check if an instance of task T is executing.
allows to check the current type of a task T .
allows to check whether member P has free capacity of amount c2
in capability c1.
short-hand for has capacity(P,c1,0) – a check whether the member has
a capability.
Table 3: Conditions
need to discharge currently active tasks. Either of these two actions will allow to change the involvement
of a member by providing a T and P pair that already exists with new values for args – these will
overwrite the existing values. In case of a reduction, again any commitment made to currently active
tasks remains.
Changes to the task structure, allowing for tasks to be changed between Atomic, Replicable and
Composable Tasks can be achieved using the change type(T,new type,args) action.
We also cater for 4 actions in relation to the workflow of the VO. Two of these are concerned with
control flow, while the other two allow to redirect data flow. add task(T 1,T 2,relation) allows to insert
a new task T 1 'next to' task T 2 – where 'next to' is made precise by the relation. The values foreseen
for relation are "parallel" and "after", with the obvious semantics of the control flow reaching the par-
allel task T 1 simultaneously with T 2, whereas the outgoing control flow of T 2 would be input to T 1
and T 1's output goes to where T 2's went before with the after relation. delete task(T ) deletes a task,
making good any control flow breaks caused. Clearly tasks can only be deleted if they are not active.
provide input(I,T ) and remove input(I,T ) allow to redirect the dataflow, with either providing a data
item I to task T or removing it.
Conditions in policies will usually need to allow checks for certain assignments. We will assume the
general checks for time or date that are useful for all policies in all domains. Specifically for VOs we
require a few new conditions. These are shown with a brief explanation in Tab. 3.
4.1 Example
Let us consider a VO for travel arrangements, a quite typical example used frequently in the literature.
[17] presents a model of such a VO in more detail, however here a brief description will be sufficient.
This VO, let us call it VisitUs, offers travel arrangements including flight and hotel bookings. Hotel
bookings are provided by a task HotelProv, which for sake of argument is currently fulfilled by one
partner with an exclusive contract. VisitUs realises that it could increase business by being able to offer
more accommodation. The current hotel provision partner is in agreement to let competitors contribute
rooms when they a getting too full. The following policy describes how this could be captured.
policy MoreBeds
appliesTo HotelProv
when task entry()
if not has capacity(Hotel, beds, n)
do change type(HotelProv, Replicable, competition)
28
VO reconfigurations through Policies
andthen add member(newHotel)
andthen assign duty(newHotel, beds)
The policy MoreBeds describes situations where the HotelProv task needs to be adapted if the
hotel partner does not have sufficient capacity. In order to allow for other organisations to offer beds,
the current partner cannot be exclusive anymore, and hence the task has to become of a replicable type.
Once it can be shared, a new hotel partner can be added and be assigned duties against the task. Note that
the task can be shared once it is replicable, but here a sharing of a competitive nature has been selected,
under which the partner offering the best conditions will get the allocation.
5 Related Work
There has been some effort in modelling virtual organisations, as well as providing flexibility in systems.
We would like to identify three specific items here, as we deem them most relevant. However, this is not
meant to be an exhaustive review and we are aware that other work that can be seen as relevant exists,
which is not mentioned here.
[13] presents a formal set-up to model the structure and responsibilities of a VO in an agent based
setting. This work is focused mostly on the creation of VOs which is an aspect that we do not cover
here. We do believe that the presented reconfiguration work is orthogonal and and could be applied to
the agent based work where the main change would be that the enactment of the actions defined in this
paper would be on agents rather than on the VOML model. This could be an interesting angle, as agents
are by their very nature much closer to an executable environment than a modelling language.
VDM has been employed in [6] to model VOs. This work differs from our approach in that it uses a
general purpose modelling language rather than the VO specific one used here. An advantage from their
approach is the direct access to verification tools and methodologies, which they employed to analyse
properties of VOs. This approach does not provide a direct route to domain experts to model VOs and
describe reconfigurations as extensive VDM knowledge is required. Some more recent work [8] proposes
the use of animation to make the analysis of the models more accessible – however it does not address
the aspect that we considered here of making the actual modelling more accessible.
While we focused on system adaptation through policies, which has been a long standing and suc-
cessful approach, it is not the only. Aspect oriented programming allows to isolate concerns and treat
them as separate concepts when implementing systems. [11] presented an approach that allows to re-
configure BPEL processes using aspect oriented techniques. They dynamically weave separately defined
rules (expressed as aspects) into a BPEL process to adapt its behaviour. This could be a possible alter-
native to the approach presented here. It would require that the trigger points identified were 'hooks'
for aspects, which would then be executed at the respective places. However, this approach is far less
natural, as it requires additional programmes that will be run instead or in addition to the specified task
descriptions while the policy based approach is purely descriptive and furthermore shows simple changes
to the existing system which are easier to comprehend.
6 Discussion and Future Work
We presented an overview of STPOWLA, an approach based on the APPEL policy language to dynam-
ically adapt workflows. We also reviewed the VOML, the Virtual Organisation Modelling Language,
framework briefly, focusing our attention to the structural descriptions for VOs. The aim of the paper
S. Reiff-Marganiec
29
was to explore how a STPOWLA-like approach could be used to adapt virtual organisations. The result of
this analysis is an identification of a small and comprehensive set of domain specific triggers, actions and
conditions for the APPEL policy language that allow to express structural reconfigurations of VOs. This
has been exemplified with a Travel Booking VO. We believe that the small policy language presented
allows to describe typical structural transformations required for a VO in a natural way.
There are two more generic aspects worthy of discussion: one is the question whether the added
formality gained by modelling is of actual benefit to the VO community and the other is whether the
definition of more specific or the use of more generic languages provides a better approach. Considering
the former, VOs have been studies from several angles, but like any system it is often useful to have a
very precise understanding of their behaviour. one example would be the analysis of scenarios making
predictions about the future. For example one might wish to know what happens if a partner were
to leave or what would happen if a disaster struck and some services could not be provided anymore.
Formal analysis of a model allows to make such predictions, but for that a model is required capturing
the desired properties of the VO. This has let to several approaches for modelling VOs as we have shown
in the previous section.
The second aspect is a more debatable topic, as the existing studies in the more formal arena show that
different groups have taken different views on this. A more specific language offering dedicated concepts
for modelling VOs is desirable as it allows 'users' of VOs to describe them and to also understand their
structure. Our work on VOML falls into this category as it makes concepts from the VO domain first
class citizens in the language. Work using general formal modelling languages has a big advantage in
that it can usually rely on readily available tools for modelling as well as analyzing said models, however
this usually comes at the cost of experts in those languages and tools being required. Of course one could
add a further less formal layer, namely that of generic graphical modelling languages such as UML into
the discussion. What we believe is that the ideal approach is a combination of all of these techniques. We
foresee that for example UML activity diagrams form an ideal vehicle to describe the processes and task
dependencies in the workflow of the VO, with VOML (or similar domain specific languages) allowing to
express domain specific criteria of VOs. The combination of these could be mapped into a more generic
modelling language such as VDM and at that level analysis could be performed. This leaves one very
crucial aspect, which has seen more attention in the formal modeling and verification community in the
last decade, namely that of mapping the analysis results back into the domain language so that the user
can understand the results more directly.
Future work will analyse which properties of a VO can be guaranteed in the light of changes possible
through policies – that is we wish to study how fundamental a VO can be changed through policies and
whether that is desirable. The initial feeling is that this is not too desirable, as essentially by using the
right policies the purpose of a VO could be changed fundamentally (all tasks could be removed and a
completely new set be added). Furthermore, there is of course the questions of how easy it will be to
recover through the tasks default policy from member removals or duty dis-allocations.
A solution to restrict the changes possible, which would not only address this problem, but actu-
ally add to the properties one might wish to define on VO models would be to add more policies (also
expressed in APPEL) at the VBE and VO level. These policies would be constraints rather than recon-
figuration instructions, and as such would not have triggers, but rather would specify a set of conditions
and have actions that prohibit or undo (or repair) certain reconfigurations made. This will be explored,
as it is of interest beyond the scope of the current work presented here. Having policies expressed at
different levels also can give rise to a problem referred to as policy conflict: this occurs when policies
are simultaneously requesting actions that are incompatible – however solutions to the policy conflict
problem have already been studied and formalised for APPEL in [14].
30
References
VO reconfigurations through Policies
[1] H. Afsarmanesh & L.M. Camarinha-Matos (2005): A framework for management of virtual organizations
breeding environments. In: Collaborative Networks and their Breeding Environments – Proceedings of 6th
PRO-VE'05, Springer, pp. 35–48.
[2] Laura Bocchi, Jos´e Luiz Fiadeiro, Noor Rajper & Stephan Reiff-Marganiec (2009): Structure and
In Bryans & Fitzgerald [5], pp. 26–40,
Behaviour of Virtual Organisation Breeding Environments.
doi:10.4204/EPTCS.16.3.
[3] Laura Bocchi, Stephen Gorton & Stephan Reiff-Marganiec (2010): From StPowla processes to SRML models.
Form. Asp. Comput. 22, pp. 243–268, doi:10.1007/s00165-009-0118-7.
[4] Jeremy Bryans, John Fitzgerald & Tom McCutcheon (2011): Refinement-Based Techniques in the Analysis of
Information Flow Policies for Dynamic Virtual Organisations. In Luis Camarinha-Matos, Alexandra Pereira-
Klen & Hamideh Afsarmanesh, editors: Adaptation and Value Creating Collaborative Networks, IFIP Ad-
vances in Information and Communication Technology 362, Springer Boston, pp. 314–321, doi:10.1007/978-
3-642-23330-2 35.
[5] Jeremy Bryans & John S. Fitzgerald, editors (2009): Proceedings Second Workshop on Formal Aspects of
Virtual Organisations. EPTCS 16, doi:10.4204/EPTCS.16.
[6] Jeremy W. Bryans, John S. Fitzgerald, Cliff B. Jones & Igor Mozolevsky (2006): Formal modelling of
dynamic coalitions, with an application in chemical engineering. Technical Report, Newcastle University.
[7] L.M. Camarinha-Matos, H. Afsarmanesh & A. Ortiz, editors (2005): Collaborative networks and their breed-
ing environments. IFIP Vol. 186, Springer.
[8] John S Fitzgerald, Jeremy W Bryans, David Greathead, Clifff B Jones & Richard Payne (2008): Animation-
based Validation of a Formal Model of Dynamic Virtual Organisations Available at www.bcs.org/upload/
pdf/ewic_fm07_paper3.pdf.
[9] S. Gorton, C. Montangero, S. Reiff-Marganiec & L. Semini (2007): STPOWLA: SOA, Policies and Work-
flows. In: Revised Selected Papers of Workshops, ICSOC'07, LNCS 4907, Springer, pp. 351–362.
[10] F. Kamoun (2007): A roadmap towards the convergence of business process management and service ori-
ented architecture. Ubiquity 8(14), doi:10.1145/1247272.1247273. ACM Press.
[11] Dimka Karastoyanova & Frank Leymann (2009): BPEL'n'Aspects: Adapting Service Orchestration Logic.
In: Proceedings of the 2009 IEEE International Conference on Web Services, ICWS '09, IEEE Computer
Society, Washington, DC, USA, pp. 222–229, doi:10.1109/ICWS.2009.75.
[12] E. Lupu & M. Sloman (1999): Conflicts in Policy Based Distributed Systems Management. IEEE Transac-
tions on Software Engineering 25(6).
[13] Jarred McGinnis, Kostas Stathis & Francesca Toni (2009): A Formal Framework of Virtual Organisations as
Agent Societies. In Bryans & Fitzgerald [5], pp. 1–14, doi:10.4204/EPTCS.16.1.
[14] Carlo Montangero, Stephan Reiff-Marganiec & Laura Semini (2008): Logic-based Conflict Detection for
Distributed Policies. Fundam. Inf. 89, pp. 511–538. Available at http://dl.acm.org/citation.cfm?
id=1497115.1497122.
[15] Carlo Montangero, Stephan Reiff-Marganiec & Laura Semini (2011): Model-Driven Development of Adapt-
able Service-Oriented Business Processes. In Martin Wirsing & Matthias Holzl, editors: Rigorous Software
Engineering for Service-Oriented Systems, Lecture Notes in Computer Science 6582, Springer Berlin / Hei-
delberg, pp. 115–132, doi:10.1007/978-3-642-20401-2 6.
[16] OMG (2006): Business Process Modeling Notation (BPMN) Specification.
[17] Stephan Reiff-Marganiec & Noor Rajper (2011): Modelling Virtual Organisations: Structure and Reconfig-
urations. In Luis Camarinha-Matos, Alexandra Pereira-Klen & Hamideh Afsarmanesh, editors: Adaptation
and Value Creating Collaborative Networks, IFIP Advances in Information and Communication Technology
362, Springer Boston, pp. 297–305, doi:10.1007/978-3-642-23330-2 33.
S. Reiff-Marganiec
31
[18] K. J. Turner, S. Reiff-Marganiec, L. Blair, J. Pang, T. Gray, P. Perry & J. Ireland (2006): Policy Support for
Call Control. Computer Standards and Interfaces 28(6), pp. 635–649.
|
1911.07591 | 1 | 1911 | 2019-11-18T12:44:14 | Dynamic exploration of multi-agent systems with timed periodic tasks | [
"cs.MA"
] | We formalise and study multi-agent timed models MAPTs (Multi-Agent with timed Periodic Tasks), where each agent is associated to a regular timed schema upon which all possibles actions of the agent rely. MAPTs allow for an accelerated semantics and a layered structure of the state space, so that it is possible to explore the latter dynamically and use heuristics to greatly reduce the computation time needed to address reachability problems. We apply MAPTs to explore state spaces of autonomous vehicles and compare it with other approaches in terms of expressivity, abstraction level and computation time. | cs.MA | cs |
Dynamic exploration of multi-agent systems
with timed periodic tasks
Johan Arcile
IBISC, Univ Evry, Universit´e Paris-Saclay,
91025, Evry, France
Hanna Klaudel
IBISC, Univ Evry, Universit´e Paris-Saclay,
91025, Evry, France
Raymond Devillers
ULB, Bruxelles, Belgium
Abstract. We formalise and study multi-agent timed models MAPTs (Multi-Agent with timed
Periodic Tasks), where each agent is associated to a regular timed schema upon which all possibles
actions of the agent rely. MAPTs allow for an accelerated semantics and a layered structure of
the state space, so that it is possible to explore the latter dynamically and use heuristics to greatly
reduce the computation time needed to address reachability problems.
We apply MAPTs to explore state spaces of autonomous vehicles and compare it with other
approaches in terms of expressivity, abstraction level and computation time.
Keywords: Real time multi-agent systems, periodic behaviour, on-the-fly exploration
1.
Introduction
In the context of modelling and validating communicating autonomous vehicles (CAVs), the
framework VERIFCAR [2] allows to study the behaviour and properties of systems composed
of concurrent agents interacting in real time (expressed through real variables called clocks) and
through shared variables. Each agent performs time restricted actions that impact the valuation
of shared variables. The system is highly non-deterministic due to overlaps of timed intervals in
which the actions of various agents can occur.
VERIFCAR is suitable for the exhaustive analysis of critical situations in terms of safety, efficiency
and robustness with a specific focus on the impact of latencies, communication delays and failures
on the behaviour of CAVs. It features a parametric model of CAVs allowing to automatically
adjust the size of the state space to suit the required level of abstraction. This model is based on
timed automata with an interleaving semantics [1], and is implemented with UPPAAL [14], a state
of the art tool for real time systems with an efficient state space reduction for model checking.
However, it is limited in terms of expressivity and deals only with discrete values, which is not
always convenient and may lead to imprecise computations.
2
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
Various approaches [8, 6, 10, 12], relying on formal methods, address the modelling and analysis
of multi-agent systems in a context similar to ours. In particular, bounded model checking ap-
proaches [4, 3, 13] have been used for studying temporal logic properties. Standard and highly
optimised model checking tools, like UPPAAL [14, 7, 1], simplify a lot the process of studying
the behaviour of such systems, but have some drawbacks. For instance, in addition to clocks,
they usually only allow integer variables while rational ones would sometimes be more natural,
leading to artificial discretisations. Next, they only check Boolean expressions while it may be
essential to analyse numerical ones. Finally, the Boolean expressions are restricted to a subset of
the ones allowed by classical logical languages, in particular by excluding nested queries.
It turns out that state spaces in the applications studied with VERIFCAR are generally very large
but take the form of a semantic directed acyclic graph (DAG). Each agent also has syntactically
the form of a DAG between clock resets. Our goal is to exploit these peculiarities to build a
dedicated checking environment for reachability problems. Concretely, we want to explore the
graph dynamically (i.e., checking temporal logic properties directly as we explore states) to avoid
constructing the full state space, and therefore not to loose time and memory space storing and
comparing all previously reached states. The objective is to be able to tune the verification algo-
rithm with heuristics that will choose which path to explore in priority, which might significantly
speed up the computation time if the searched state exists. That implies that our algorithms
should explore the graph depth-first, since width-first algorithms cannot explore paths freely and
are restricted to fully explore all the states at some depth before exploring the next one.
For systems featuring a high level of concurrency between actions, such as the CAV systems,
most of the non-determinism results from possibly having several actions of different agents
available from a given state, that can occur in different orders and which often lead eventually
to the same state. This corresponds in the state space to what is sometimes called diamonds.
Width first exploration allows to compare states at a given depth and therefore remove duplicates,
which is an efficient way to detect such diamonds. On the other hand, depth-first exploring such
a state space with diamonds, leads to examine possibly several times the same states or paths,
which is not efficient. In this context, our aim is to detect and merge identical states coming
from diamonds while continuing to explore the state space mainly depth-firstly. This diamond
detection will consist in a width-first exploration in a certain layer of the state space, each layer
corresponding to some states at a given depth having common characteristics. It turns out that
such layers may be observed in the state space of CAV systems. This allows for a depth-first
exploration from layer to layer, while greatly reducing the chances of exploring several times the
same states. The class of models on which this kind of algorithm can be applied will be referred
to as Multi-Agent with timed Periodic Tasks (MAPTs).
To implement such algorithms we use ZINC [11], a compiler for high level Petri nets that gen-
erates a library of functions allowing to easily explore the state space. We use such functions to
dynamically explore the state space with algorithms designed for our needs. In particular, this
allows to apply heuristics leading to faster computation times, and results in a better expressivity
of temporal logic than UPPAAL, in particular by including nested queries. Another gain when
comparing to UPPAAL is that we are not limited to integer computations and can use real or ra-
tional variables, thus avoiding loss of information. To use ZINC, we have to emulate the real time
with discrete variables. We do so in a way that preserves the behaviour of the system: when using
the model with the same discrete variables as with UPPAAL, we obtain identical results.
In this paper, we start by a formal definition of G-MAPTs, a general class of MAPT-like models,
study its properties and provide a translation for high level Petri nets. Then, we introduce our
MAPT models, by slightly constraining G-MAPT ones, in order to avoid useless features and
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
3
to allow a first kind of acceleration procedures. Then, we present the layered structure and the
algorithms taking advantage of it. Finally, we propose heuristics and use them in experiments that
highlight the benefits of our approach in terms of expressivity, abstraction level and computation
time.
2. Syntax and semantics of G-MAPTs
A G-MAPT is a model composed of several agents that may interact through a shared variable.
Each agent is associated with a clock and performs actions occurring in some given time intervals.
There is no competition between agents in the sense that no agent will ever have to wait for another
one's action in order to perform its own actions. However, there may be non determinism when
several actions are available at the same time, as well as choices between actions and time passing.
A G-MAPT is a tuple (V, F, A, Init) where:
• V is a set of values;
• F is a (finite) set of variable transformations, i.e., calculable functions from V to V;
• A is a set of n agents such that ∀i ∈ [1, n], agent Ai
df= (Li, Ci, Ti, Ei) with:
-- Li is a set of localities denoted as a list Li
df= (l1
i , . . . , lmi
i
) with mi > 0, such that
∀i (cid:54)= j, Li ∩ Lj = ∅;
-- Ci is the unique clock of agent Ai, with values in N;
-- Ti is a finite set of transitions, forming a directed acyclic graph between localities,
, each transition being of
with a unique initial locality l1
the form (l, f, I, l(cid:48)) where l, l(cid:48) ∈ Li are the source and destination localities, f ∈ F is
a function and I df= [a, b] is an interval with a, b ∈ N and a ≤ b.
i and a unique final locality lmi
i
-- Ei ∈ N \ {0} is the reset period of agent Ai.
• Init is a triple ((l1,··· , ln), (init1,··· , initn), initV ) where ∀i ∈ [1, n], li ∈ Li, initi ∈ N
and initV ∈ V.
•
)
i
i = ∅ and (l mi
For each agent Ai and each locality l ∈ Li, we shall define by l• = {(l, f, I, l(cid:48)) ∈ Ti} the set
of transitions originated from l, and by •l = {(l(cid:48), f, I, l) ∈ Ti} the set of transitions leading
= ∅. Moreover, when i (cid:54)= j, since
to l. Note that, from the hypotheses, •l1
Li ∩ Lj = ∅, Ti ∩ Tj = ∅ too, so that each transition belongs to a single agent, avoiding
confusions in the model.
A simple example of a G-MAPT M with two non-deterministic agents is represented in Ex 2.1.
In the semantics, for each agent Ai, we will emulate a transition from lmi
i that resets clock
Ci every Ei time units. As such, each agent in the network cycles over a fixed period. There can
be several possible cycles though, since a given locality may be the source of several transitions,
so that there may be several paths from l1
The behaviour of the system is defined as a transition system where Init is the initial state. A state
of a G-MAPT composed of n agents as described above is a tuple denoted by s = ((cid:126)l, (cid:126)c, v) where
(cid:126)l = (l1,··· , ln) with li ∈ Li is the current locality of agent Ai, (cid:126)c = (c1,··· , cn) where ci ∈ N
is the value of clock Ci, and v ∈ V is the value of variable V . There are three possible kinds of
state changes: a firing of a transition, a clock reset and a time increase.
i to lmi
to l1
.
i
i
4
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
• A transition (l, f, [a, b], l(cid:48)) ∈ Ti can be fired if li = l and a ≤ ci ≤ b. Then, in the new
state, li ← l(cid:48) and v ← f (v).
• A clock Ci can be reset if li = lmi
• Time can increase if ∀i ∈ [1, n], either there exist at least one transition (l, f, [a, b], l(cid:48)) ∈ Ti
and ci < Ei. A time increase means that ∀i ∈ [1, n],
and ci = Ei. Then, ci ← 0 and li ← l1
i .
i
with li = l and ci < b, or li = lmi
ci ← ci + 1.
i
It may be observed that there is a single global element in such a system: variable V ; all the other
ones are local to an agent. It is unique but its values may have the form of a vector, and an agent
may modify several components of this vector through the functions of F used in its transitions,
thus emulating the presence of several global variables. The values of V are not restricted to the
integer domain, but there is only a countable set of values that may be reached: the ones that
may be obtained from initv by a recursive application of functions from F (the variable is not
modified by the resets nor the time increases). However this domain may be dense inside the
reals, for instance.
1
[1, 1]
f1
[2, 3]
f2
E1 = 5
2
3
[1, 1]
f3
[2, 3]
f4
E2 = 5
4
Figure 1. Visual representation of G-MAPT from Ex. 2.1. Dashed arcs represent resets.
Example 2.1. Let M = (V, F, A, Init) where:
• V = R × N;
• F = {f1, f2, f3, f4} with
f1(x, y) → (2x, y + 1)
f3(x, y) → ( x
f2(x, y) → (x + 1.3, y + 1)
f4(x, y) → (2x, y)
• A = {(L1, C1, T1, E1), (L2, C2, T2, E2)} with
2 , y)
L1 = {1, 2} T1 = {(1, f1, [1, 2], 2), (l, f2, [3, 3], 2)} E1 = 5
L2 = {3, 4} T2 = {(3, f3, [1, 2], 4), (3, f4, [3, 3], 4)} E2 = 5
• Init = ((1, 3), (0, 0), (0.5, 0)).
A visual representation of M is given in Fig. 1 while the initial fragment of its dynamics is
depicted on top left of Fig. 5. Note that only transition firings and time increases are represented
♦
in Fig. 5 while the values v of variable V in the states ((cid:126)l, (cid:126)c, v) are always omitted.
In a dynamic system, persistence is a property that states that, if two state changes are enabled at
some state, then none of these changes disables the other one and performing them in any order
leads to the same resulting state, forming a kind of diamond. In G-MAPT systems we have a
kind of persistence restricted to different agents.
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
5
1. if s enables two transitions t1 = (l1, f1, I1, l(cid:48)
Proposition 2.2. In a G-MAPT, if i (cid:54)= j and s = ((cid:126)l, (cid:126)c, v) is any state, we have:
1) ∈ Ti and t2 = (l2, f2, I2, l(cid:48)
2) ∈ Tj, leading
respectively to states s1 and s2, then s1 enables t2 leading to a state s3 and s2 enables t1
leading to a state s4; moreover s3 = s4 iff f1◦f2(v) = f2◦f1(v), i.e., if f1 and f2 commute
on v;
2. if s enables a transition t = (l, f, I, l(cid:48)) ∈ Ti and a reset of Aj, leading respectively to states
s1 and s2, then s1 enables the reset of Aj leading to a state s3 and s2 enables t leading to
the same state s3;
3. if s enables a reset of Ai and a reset of Aj, leading respectively to states s1 and s2, then s1
enables the reset of Aj leading to a state s3 and s2 enables the reset of Ai leading to the
same state s3.
Proof:
1. The property results from the fact that transitions do not modify clocks, and a transition of
some agent only modifies the locality of the latter, together with the common variable V ; in
s3 the variable becomes f2 ◦ f1(v), while in s4 the variable becomes f1 ◦ f2(v). Note that
if i = j, s1 does not enable transition t2 since, from the acyclicity hypothesis, the locality
of Ai is changed, hence is not the source of t2 (and symmetrically);
2. the property results from the fact that a transition does not modify any clock, and a reset of
Aj only modifies the locality and clock of the latter; the common variable V will have the
value f (v) after both the execution of the transition followed by the reset as well as after
the reset followed by the transition. Note that i may not be the same as j here since the
reset of Ai may only occur in locality lmi
, while no transition may occur there;
i
3. the property results from the fact that a reset of an agent only modifies the locality and clock
i , so that a
, i.e., Ai has a single locality, no transition and does
of the latter. Note that, if i = j, since after a first reset the locality becomes l1
second one may only occur if l1
not act on the common variable, hence may be dropped.
i = lmi
i
(cid:117)(cid:116)
2.1. Constraints
We define in this subsection two types of constraints, which are motivated by the properties of
our target application domain and which will be used to obtain interesting properties.
A G-MAPT is called strongly live if it satisfies the following constraint:
Constraint 1.
1. If the initial locality of some agent Ai is the terminal one (li = lmi
), then the initial value
i
of clock Ci satisfies initi ≤ Ei;
2. otherwise (when li (cid:54)= lmi
), we have initi ≤ max{b (li, f, [a, b], l(cid:48)) ∈ li
•});
i
6
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
3. moreover, for each agent Ai, if l ∈ Li \ {l1
max{b (l(cid:48), f, [a, b], l) ∈ •l} ≤ min{b(cid:48) (l, f(cid:48), [a(cid:48), b(cid:48)], l(cid:48)(cid:48)) ∈ l•};
i , lmi
i }, then
i } ≤ Ei.
4. and we have max{b (l(cid:48), f, [a, b], lmi
) ∈ •lmi
i
The first two constraints ensure that, when the system is started, either in the terminal locality or
in a non terminal one of some agent, the time is not blocked and we shall have the possibility
to perform an action in some future. The next constraint ensures that whenever a non terminal
locality is entered, any (and not only some) transition originated from that locality will have the
possibility to occur in some future (the case when we enter an initial locality is irrelevant since
resets reinitialise the corresponding clock to 0). The last constraint captures similar features in
the case when we enter a terminal locality.
In other words, each transition or reset in l• is enabled when entering l or will be enabled in the
future (after possibly some time passings in order to reach the lower bound a).
Proposition 2.3. In a G-MAPT satisfying Constraints 1, after any evolution ω, each transition
and each reset (as well as time passings) may be fired in some future.
i
i
) =⇒ ci ≤ Ei and (li (cid:54)= lmi
Proof:
We may first observe by induction on the length of ω that, if s = ((cid:126)l, (cid:126)c, v) is the state reached
) =⇒
after the evolution ω, for any agent Ai we have (li = lmi
•}), i.e., the same G-MAPT with initial state s also satisfies
ci ≤ max{b (li, f, [a, b], l(cid:48)) ∈ li
Constraint 1 (the last two ones do not rely on the initial state). The property is trivial for ω = ε.
If the property is satisfied for some ω, it remains so for any extension, from the definition of the
semantics of G-MAPT and the last two points of Constraint 1.
It also results from the same remark that any evolution ω satisfying the mentioned properties may
be extended (there is no deadlock). It remains to show that any extension may be performed in
some future.
For time passing, we may observe that, if time passing may never be performed, since the set of
localities for each agent has the form of a DAG, extending ω will finally perform a reset, and
since each Ei is strictly positive we shall finally perform all the resets and stop at some point,
which is forbidden. Hence we are sure time passings will be possible.
Since time passings may always be performed in the future, all resets will be performed eventu-
ally.
i ) ∈ Ti. From the same argument about time passings, it will be
Finally, let t = (l(cid:48)
possible to eventually perform reset ri, then follow a path going from l1
i in the DAG of Ai,
performing each transition in turn when reaching the corresponding a, due to Constraint 1.3. (cid:117)(cid:116)
i, f, [a, b], l(cid:48)(cid:48)
i to l(cid:48)
The next constraint is a syntactic manner of ensuring the acyclicity of the G-MAPT's dynamics
(i.e., its state space):
Constraint 2.
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
7
1. V df= W × X and there exist an agent Ai such that in all paths of transition from l1
i to lmi
,
there exists a transition t df= (l, f, [a, b], l(cid:48)) such that for all (w, x) ∈ V, f (w, x) = (w(cid:48), x(cid:48))
with x < x(cid:48);
i
2. and there is no f ∈ F such that for some (w, x) ∈ V, we have f (w, x) = (w(cid:48), x(cid:48)) with
x > x(cid:48).
The first constraint ensures that at least one agent increments the X part of variable V at least
once between two of its resets. The second one ensures that no function can decrease the X part
of variable V .
In other words, the X part of v increases in each cycle of agent Ai, which results in an absence
of cycles in the whole state space of the G-MAPT.
Proposition 2.4. A G-MAPT satisfying Constraint 2 is acyclic.
Proof:
If there is a cycle, it means that there exists a path from the initial state with at least two different
states in the path s1 = ((cid:126)l, (cid:126)c, v) and s2 = ((cid:126)l(cid:48), (cid:126)c(cid:48), v(cid:48)), which are actually identical. Since the
localities of each agent form a static DAG determined by its transitions and each Ei is strictly
positive, having (cid:126)l = (cid:126)l(cid:48) and (cid:126)c = (cid:126)c(cid:48) may only happen if all agents have done at least one reset
between s1 and s2. Indeed, if there is no reset, since (cid:126)c = (cid:126)c(cid:48) we may only have transitions in the
cycle, but this is incompatible to have DAGs in each agent. Moreover, since between two resets
of an agent time strictly increases, (cid:126)c = (cid:126)c(cid:48) may only occur if all agents have performed one or
more resets. Thus, it is enough to observe that variable V cannot decrease from Constraint 2.2,
and a transition t like in Constraint 2.1 should occur, guaranteeing that v (cid:54)= v(cid:48).
(cid:117)(cid:116)
Definition 2.5. A MAPT is a G-MAPT satisfying Constraints 1 and 2.
A MAPT may be non-deterministic but it is strongly live and has a DAG state space. For instance,
the G-MAPT M from Ex. 2.1 satisfies both constraints (acyclicity is satisfied due to y being
incremented in all cycles of A1) and so is actually a MAPT.
3. Translation into high level Petri nets
A high level Petri net [5] can be viewed as an abbreviation of a low-level one [9] where tokens are
elements of some set of values that can be checked and updated when transitions are fired. Here,
we express a G-MAPT as a high level Petri net to be implemented with ZINC.
Formally, a high level Petri net is a tuple (S, T, λ, M0) where:
• S is a finite set of places;
• T is a finite set of transitions;
• λ is a labelling function on places, transitions and arcs such that
-- for each place s ∈ S, λ(s) is a set of values defining the type of s,
8
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
-- for each transition t ∈ T , λ(t) is a Boolean expression with variables and constants
-- for each arc (x, y) ∈ (S × T ) ∪ (T × S), λ(x, y) is the annotation of the arc from x
defining the guard of t and
to y, driving the production or consumption of tokens.
• M0 is an initial marking associating tokens to places, according to their types.
The semantics of a high level Petri net is captured by a transition system containing as states
all the markings, which are reachable from the initial marking M0. A marking M(cid:48) is directly
reachable from a marking M if there is a transition t enabled at M, whose firing leads to M(cid:48); it
is reachable from M if there is a sequence of such firings leading to it. A transition t is enabled
at some marking M if the tokens in all the input places of t allow to satisfy the flow expressed by
the annotations of input arcs and the guard of t, through a valuation of the variables involved in
the latter. The firing of t consumes the concerned tokens in input places of t and produces tokens
on output places of t, according to the annotations of the output arcs and the same valuation.
s1
1
x
x > 0
t
y
s2
2
(w, z)
(w + x, z + y)
(0, 0) s3
Figure 2. A high level Petri net.
Fig. 2 shows an example of a high level Petri net where place types are N for s1 and s2, and N×N
for s3. Transition t is enabled at the initial marking since there exists a valuation of variables in the
annotations of arcs and in the guard of t, with values from tokens, x (cid:55)→ 1, y (cid:55)→ 2, w (cid:55)→ 0, z (cid:55)→ 0,
that satisfies the guard. The firing of t consumes the tokens in all three places and produces a new
token (1, 2) in place s3.
Definition 3.1. Given a G-MAPT Q = (V, F, A, Init) with A = n, its translation to a high
level Petri net N = translate(P ) = (S, T, λ, M0) is defined as follows:
• S = {sA, sC, sV } with λ(sA) df= L1 × ··· × Ln where Li is the set of localities of agent
i ), λ(sC) df= Nn and λ(sV ) df= V; For any token x of
Ai (its jth element will be denoted lj
the type λ(sA) or λ(sC), we denote by x[i] the ith element of the list.
• T df= Ttrans ∪ Treset ∪ {ttime} where
-- Ttrans is the smallest set of transitions such that, for each agent Ai = (Li, Ci, Ti, Ei)
in A and for each transition (l, f, [a, b], l(cid:48)) ∈ Ti, there is a transition t ∈ Ttrans such
that λ(sA, t) df= x, λ(sC, t) df= y, λ(sV , t) df= z, λ(t, sA) df= x(cid:48) where x(cid:48)[i] ← l(cid:48) and
∀j (cid:54)= i, x(cid:48)[j] ← x[j], λ(t, sC) df= y, λ(t, sV ) df= f (z) and λ(t) df= (x[i] = l) ∧ (a ≤
y[i] ≤ b). This is equivalent to the set of transitions of the G-MAPT.
-- Treset is the smallest set of transitions such that, for each agent Ai = (Li, Ci, Ti, Ei)
in A, there is a transition t ∈ Treset such as λ(sA, t) df= x, λ(sC, t) df= y, λ(t, sA) df= x(cid:48)
where x(cid:48)[i] ← l1
i and ∀j (cid:54)= i, x(cid:48)[j] ← x[j], λ(t, sC) df= y(cid:48) where y(cid:48)[i] ← 0 and
df= Li. This
∀j (cid:54)= i, y(cid:48)[j] ← y[j], and λ(t) df= (x[i] = lmi
is equivalent to the set of clock resets of the G-MAPT.
) ∧ (y[i] = Ei) where mi
i
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
9
-- λ(sA, ttime) df= x, λ(sC, ttime) df= y, λ(ttime, sA) df= x, λ(ttime, sC) df= y(cid:48), where
∀i ∈ [1, n], y(cid:48)[i] ← y[i] + 1, and λ(ttime) df= G1 ∧ ··· ∧ Gn where Gi acts as the
df= (g1 ∨ ··· ∨ gmi)
"upper bound guard" for all the transitions in agent Ai, i.e., Gi
with mi = Li and ∀j ∈ [1, mi − 1], gj
i ) ∧ (y[i] < B), where B =
•} is the highest upper bound of the intervals from all
max{b(lj
) ∧ (y[i] < Ei). This is equivalent to
outgoing transitions of lj
a time increase.
i , f, [a, b], l(cid:48)) ∈ l j
df= (x[i] = lj
i
i and gmi
df= (x[i] = lmi
i
• (M0(sA), M0(sC), M0(sV )) = Init is the initial marking
The translation associates singletons as arc annotations for all arcs. As a consequence, during
the execution, starting from the initial marking which associates one token to each place, there
will always be exactly one token in each of the three places. Each reachable marking, where sA
contains (cid:126)l, sC contains (cid:126)c and sV contains v, encodes a state ((cid:126)l, (cid:126)c, v) of the considered G-MAPT.
Figure 3 sketches the Petri net translation of the G-MAPT from Ex. 2.1. At the initial marking,
t1, t2, t(cid:48)
2 are not enabled because the token read from sC (i.e., the vector of clock values)
does not satisfies the guards, while r1 and r2 are not enabled because the token read from sA
(i.e., the vector of localities) does not satisfies the guards. On the other hand, the transition time
is enabled. Its firing reads1 tokens in places sV and sA, consumes (0, 0) and produces (1, 1) in
sC. At this new marking, time, t1 and t2 are enabled and the process continues exactly as in the
G-MAPT.
1 and t(cid:48)
Proposition 3.2. A G-MAPT Q and its translated Petri net N = translate(Q) have equivalent
state spaces and semantics.
Proof:
Immediate from the definitions.
(cid:117)(cid:116)
1means that consumes and produces the same tokens
10
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
((l1 = 1 ∧ c1 < 3) ∨ (l1 = 2 ∧ c1 < 5))
∧((l2 = 3 ∧ c2 < 3) ∨ (l2 = 4 ∧ c2 < 5))
(c1, c2)/(c1 + 1, c2 + 2)
time
l1 = 2 ∧ c1 = 5
(l1, l2)
(c1, c2)
(c1, c2)
(c1, c2)
(c1, c2)
r1
l2 = 4 ∧ c2 = 5
r2
(l1, l2)/(1, l2)
(l1, l2)/(l1, 3)
(l1, l2)/(l1, 4)
(1, 3) sA
(l1, l2)/(l1, 4)
(l1, l2)/(2, l2)
(l1, l2)/(2, l2)
l2 = 3 ∧ 2 ≤ c2 ≤ 3
sC
(0, 0)
(c1, c2)
(c1, c2)
t2
l2 = 3 ∧ 1 ≤ c2 ≤ 1
(x, y)/( x
2 , y)
(x, y)/(2x, y)
t(cid:48)
2
t1
(x, y)/(2x, y + 1)
l1 = 1 ∧ 1 ≤ c1 ≤ 1
(x, y)/(x + 1.3, y + 1)
l1 = 1 ∧ 2 ≤ c1 ≤ 3
t(cid:48)
1
(0.5, 0)
sV
Figure 3.
Petri net translation of the G-MAPT from Ex. 2.1 with the initial marking. Arcs are bidirectional
and annotated by pairs w/z (or w instead of w/w) meaning that w is the label of the arc from place to transition
and z of the opposite one.
4. Acceleration
Let us assume we are interested by the causality relation between transitions rather than by the
exact dates of their firings. It is then often possible to reduce the size of the original state space.
To do so, we assume that the G-MAPT satisfies Constraint 1.
We may first consider action zones, defined as maximum time intervals in which the same tran-
sitions and resets are enabled from the current state (note however that, when a reset is enabled,
the zone has length 0, since before an Ei the corresponding reset is not enabled and we may not
go beyond Ei). Instead of increasing time by unitary steps, we can then progress in one step from
an action zone to another one, until we decide or must fire a transition or reset. This generally
corresponds to increasing time by more than one unit at once. Note that, when we jump to a zone,
we may choose any point in it since, by definition, all of them behave the same with respect to
enabled events; in the following, we have chosen to go to the end of the zone since this allows to
perform bigger time steps; this will also be precious when defining borders of layers.
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
11
However, not all action zones reachable from a given state need to be explored: we may neglect
action zones which are dominated by other ones, i.e., for which the set of enabled transitions
and resets is included in another one. As an example, let us assume that the sets of enabled
transitions are successively (from the current state): {t1, t2} → {t1, t2, t3} → {t2, t3} →
{t3} → {t3, t4} → {t3, t4, t5} → {t4, t5} . . . (i.e., letting the time evolve, we first encounter
a3, then b1, b2, a4, a5, b3, ...). The maximal (non-dominated) action zones are indicated in
bold. We may thus first jump (in time) to the end of the zone allowing {t1, t2, t3}, then choose
if we want to fire t1 or t2 or t3, or jump to the end of the zone allowing {t3, t4, t5}, where we
can again decide to fire a transition or not (unless a firing is mandatory, i.e., there is no further
non-dominated action zone).
In order to pursue the analysis, let s = ((cid:126)l, (cid:126)c, v) be the current state and, for each agent Ai let
(cid:40)
Bi
df=
Ei − ci if li = lmi
max{b − ci (li, f, [a, b], l(cid:48)) ∈ li
i
•} otherwise
B df= min{Bi i ∈ [1, n]}
From our hypotheses, each Bi, hence also B, is non-negative, and we may not let pass more than
B time units before choosing to fire a transition or a reset. In particular, if B = 0, increasing
time would prevent any transition in some locality to ever be enable again. To avoid such a local
deadlock, we must choose a transition or reset to fire.
When time evolves, if we reach an a or an E the set of enabled transitions and resets increases
(note that an E behaves both as an a and as a b), and if we overtake a b (we may not overtake an
E), this set shrinks. We must thus find the first b or E preceded by at least one a.
This may be done as follows: let
a
df=
δ
df=
min(α)
0
min(β)
0
if α df= {a − ci ∃ (li, f, [a, b], l(cid:48)
and ci < a ≤ B} ∪ {Ei − ci li = lmi
and ci < Ei ≤ B} (cid:54)= ∅
otherwise
i
i) ∈ Ti for some agent Ai
for some agent Ai
if β df= {b − ci ∃ (li, f(cid:48), [a, b], l(cid:48)) ∈ li
with 0 < a ≤ b − ci ≤ B} ∪ {Ei − ci li = lmi
agent Ai with Ei ≤ ci + B } (cid:54)= ∅
otherwise
• for some agent Ai
for some
i
It may be observed that a > 0 ⇐⇒ α (cid:54)= ∅ ⇐⇒ β (cid:54)= ∅ ⇐⇒ δ > 0.
If a = 0, that means that there is no way to increase the set of enabled transitions or resets in the
future; there is thus no interest to let time evolve (and indeed δ = 0) and we must choose now
a transition or a reset to be fired (time will possibly be allowed to increase in the new locality).
Otherwise, we may fire a transition or a reset or perform a time jump of δ, which is of at most
B time units. Note that when a transition or reset is fired, we need to recompute B; when a time
shift (or jump) is performed, δ > 0 and we need to adjust all the clocks and B: ∀i : ci ← ci + δ
and B ← B − δ.
12
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
We may remark that the initial state as well as the states reached after a firing are not necessarily
in a maximal zone. This may be checked easily: the first b or E is preceded by one or more a's
from this current state. We may then force a time jump δ as computed above to reach the end
of the first maximal zone before wondering if we shall perform a firing. However, this is not
absolutely necessary and we may decide to perform a firing or a time jump at this current state.
Finally, we may observe that, when we perform a firing in some agent Ai, we are positioned
before B, hence before Bi by definition. From Constraints 1.3 and 1.4 above, whatever the time
jumps performed in the previous state, the first maximal zone is the same, so that we do not miss
a possible firing from the new current state.
Figure 4. Example of time increase based on the action zone acceleration. Current time is indicated by grey
dots, while the maximal possible time increase for each variant is shown with its respective color (blue for t4,
red for t(cid:48)
4 and green for t(cid:48)(cid:48)
4).
For a better understanding, let us consider the example of acceleration illustrated in Fig. 4, with
two agents A1 and A2. To simplify the presentation, we shall assume that the clocks C1 and C2
are aligned, so that the time intervals of the transitions can be represented in the same space. The
current state of the system can be described as follows: from the current locality of agent A1,
the outgoing transitions t1 and t2 can be fired respectively in the intervals [0, 3] and [1, 5], while
from the current locality of agent A2, the outgoing transitions t3 and t4 (in blue in the figure)
can be fired respectively in [0, 6] and [2, 4]. For any transition ti, its lower and upper bounds
will be referred to as ai and bi. Let us assume that the current time is currently at instant 1. In
such a case, the current action zone is [a2, a4[ and it enables t1, t2 and t3. The next action zone
[a4, b1] enables all four transitions (and is thus maximal). So, from the current action zone we
may fire one of t1, t2 or t3 or let the time pass. The (accelerated) time increase should lead then
to action zone [a4, b1], for instance at b1. That way, we would include all the possible sequences
of transitions, including the firing of t4 followed by t1.
Now let us consider a variant of the example, in which t4 is replaced by t(cid:48)
4 (in red in the figure),
with a time interval of [4, 6]. In that scenario, the current action zone is [a2, b1] and it enables t1,
t2 and t3. The next zone is ]b1, a4(cid:48)[, which enables t2 and t3 only: since the enabled transitions
are included in the current action zone, this zone is not interesting from a causality point of
view. Finally, the zone [a(cid:48)
4, b2] enables t2, t3 and t4, which is interesting because a new transition
becomes enabled and the next time increase should lead to the end of this zone. It is important
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
13
to note that all the sequences involving t1 are preserved, as the time increase is only one of the
possibles evolution of the system, the firing of t1, t2 and t3 also being possible.
Finally, let us consider a second variant, in which t4 is replaced by t(cid:48)(cid:48)
4 (in green in the figure), with
a time interval of [6, 8]. In that scenario, the current action zone is still [a2, b1], which enables t1,
t2 and t3. The next action zone ]b1, b2] enables t2 and t3 only. As before, the enabled transitions
are included in the current action zone, which means that going to this zone is irrelevant. However,
it is not possible to go further ahead since we reached B (it corresponds to the time before reaching
b2). We must thus chose a transition to fire in the current zone. Transition t(cid:48)(cid:48)
4 is presently non-
enabled; it may become enabled in the future however, after (at least) t1 or t2 is fired.
In the context of Petri net the acceleration may be defined syntactically (by modifying the guard
of transition ttime and the annotations of arcs from transition ttime to place sC) and corresponds
to replacing the following items in Definition 3.1:
• λ(ttime, sC) = y(cid:48), where ∀i ∈ [1, n], y(cid:48)[i] ← y[i] + δ;
• λ(ttime) df= δ > 0.
The computation of δ is possible thanks to the current localities of agents present in tokens in
place sA and the values of clocks present as tokens in place sC.
Note finally an interesting feature of the accelerated semantics: if we change the granularity of the
time and multiply all the timing constant by some factor, the size of the state space of the original
semantics is inflated accordingly. On the contrary, the size (and structure) of the accelerated
semantics remains the same.
4.1. Abstracted dynamics
In order to capture the causality feature of such models, mixing time passings and transition/reset
executions, and to drop the purely timed aspects, we shall consider the graph whose nodes are the
projections of evolutions from the initial state on the set of transitions and resets. Said differently,
if we have a word on the alphabet composed of +δ (time passing, with δ = 1 in the original, non-
accelerated, semantics), ti,j's (transitions of agent Ai) and ri's (reset of agent Ai) representing
a possible evolution of the system up to some point, by dropping all the +δ's we shall get its
projection, and a node of the abstracted (from timing aspects) graph. The (labelled) arcs between
those nodes will be defined by the following rule: if α and αt (or αr) are two nodes, there is an
arc labelled t (or r) between them. This will define a (usually infinite) labelled tree, abstracted
unfolding of the semantics (either original or accelerated) of the considered system.
The initial node (corresponding to the empty evolution) will be labelled by the projection ((cid:126)l; v)
of the initial state ((cid:126)l, (cid:126)c; v). This will automatically (recursively) determine the label of the other
nodes: if ((cid:126)l; v) is the label of some node and there is an arc labelled t = (li, f, [a, b], l(cid:48)
i) from it to
another one, the latter will be labelled ((cid:126)l(cid:48); f (v)), where (cid:126)l(cid:48) is (cid:126)l with li replaced by l(cid:48)
i; and if the arc
is labelled ri, the label of the destination node will be ((cid:126)l(cid:48); v), where (cid:126)l(cid:48) is (cid:126)l with li replaced by l1
i .
As an illustration consider the MAPT of Ex. 2.1, where we neglect the values of the variable to
simplify a bit the presentation. The initial fragment of the original and accelerated dynamics as
well as the corresponding abstracted dynamics are represented in Fig. 5, assuming initially the
clocks are both equal to 0, A1 is in state 1 and A2 is in state 3.
14
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
(1, 3; 0, 0)
(1, 3; 0, 0)
t2
+1
(2, 3; 1, 1)
(2, 4; 1, 1)
t1
t1
+1
(1, 3; 1, 1)
(1, 4; 1, 1)
+1
+2
t2
t2
t2
+1
(2, 3; 2, 2)
+1
(2, 4; 2, 2)
(2, 3; 2, 2)
(2, 4; 2, 2)
t1
(1, 3; 2, 2)
t1
+1
(1; 4; 2, 2)
t(cid:48)
2
t2
t1
+1
(1, 3; 2, 2)
t1
+1
(1; 4; 2, 2)
t(cid:48)
2
t2
+1
+1
t(cid:48)
1
t(cid:48)
2
t(cid:48)
1
+1
(2, 3; 3, 3)
+1
(2, 4; 3, 3)
+1
(2, 3; 3, 3)
+1
(2, 4; 3, 3)
t(cid:48)
1
t(cid:48)
2
t(cid:48)
1
+1
(1, 3; 3, 3)
(1, 4; 3, 3)
(1, 3; 3, 3)
(1, 4; 3, 3)
(1, 3)
t1
t(cid:48)
1
t2
t(cid:48)
2
(2, 3)
t(cid:48)
2
t2
(2, 3)
t(cid:48)
2
(2, 4)
(2, 4)
(2, 4)
(1, 4)
t(cid:48)
1
(2, 4)
(1, 4)
t1
t(cid:48)
1
(2, 4)
(2, 4)
Figure 5.
Top left: the original dynamics. Top right: the accelerated one. Bottom: the abstracted dynamics.
The initial fragments (without variable values) of the various dynamics for the MAPT from Ex 2.1.
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
15
Proposition 4.1. The original and accelerated semantics of a MAPT lead to the same abstracted
dynamics.
Proof:
We only have to show that the set of (untimed) projections of evolutions in the original semantics
is the same as the ones in the accelerated one.
First, we may observe that each evolution in the accelerated semantics is also an evolution in
the original one: a time passing of δ time units to reach a maximal action zone is the same as δ
time passings of 1 time unit; indeed, by definition, δ ≤ B and at the end in both cases we have
B − δ = B − δ · 1 ≥ 0.
It thus remains to show that, if word(ω) is the projection of some evolution ω of the original
semantics, it is also the projection of some evolution ω(cid:48) of the accelerated one. We shall proceed
by induction on the length of ω and show more exactly that for each ω there is an accelerated
evolution ω(cid:48) such that word(ω(cid:48)) = word(ω) and the set of enabled transitions/resets after ω is
included in the one after ω(cid:48).
The property is trivially satisfied initially, when ω = ω(cid:48) = ε, but also if the initial enabled
set is not maximal and we choose the accelerated strategy going to (any point realising) the first
maximal enabled set through some shift δ. Indeed, we know by definition that some shift δ always
lead to the first maximal enabled set and nowhere else. Then, in this last case, by definition δ ≤ B
and the set of enabled transitions/resets increases.
We already observed that, if word(ω) = word(ω(cid:48)), the locality and the variable are the same after
ω and ω(cid:48). Let ∆(ω) be the time elapsed during the evolution described by ω. We may observe
that the clocks are determined by word(ω) and ∆(ω), independently on when the time passings
exactly occurred: for any agent Ai, ci = initi + ∆(ω)− Ei · #ri(ω), where #ri(ω) is the number
of resets of Ai in word(ω). We also have that we may not let more than mini{Ei} time passings
We shall now assume that(cid:101)ω extends ω by one event, that ω and ω(cid:48) form an adequate pair, and
to occur in a row, since then we should have a reset occurring before.
that it is then possible to build an adequate accelerated evolution(cid:101)ω(cid:48).
If(cid:101)ω = ω(+1), i.e., if(cid:101)ω is obtained from ω by adding a time passing (of 1 time unit), the projection
of(cid:101)ω is the same as the one of ω, hence of ω(cid:48) by the induction hypothesis. If the enabled set after(cid:101)ω
set after(cid:101)ω is no longer included in the one after ω(cid:48), that means we reached one or more a's which
were not reached yet by ω(cid:48), so that we may deduce that ∆(ω(cid:48)) < ∆((cid:101)ω). But then, going to (any
also occur for(cid:101)ω, forcing to first perform a transition or reset after ω) and recover the induction
If(cid:101)ω = ωri, for some agent Ai, we must have that initi + ∆((cid:101)ω) = initi + ∆(ω) = k · Ei for
ω(cid:48) we have the same action zone and initi + ∆(ω(cid:48)) = k · Ei (the same factor for ω(cid:48) as for(cid:101)ω since
ω(cid:48)ri is the same as after(cid:101)ω, and the situation is the same as initially.
If(cid:101)ω = ωt, for some transition t of some agent Ai, by the induction hypothesis t may also occur
after ω(cid:48) and word((cid:101)ω) = word(ω(cid:48)t). Any t(cid:48) enabled after ω in any Aj for j (cid:54)= i remains enabled
some factor k, with ri belonging to the set of transitions/resets enabled after ω. But an action
zone enabling a reset is an interval including exactly one time unit, and is maximal. Hence after
the time passings between resets are limited). We may thus also perform ri after ω(cid:48), the state after
is still included in the one after ω(cid:48), the latter still satisfies the induction hypothesis. If the enabled
point in) the next maximal action zone (with the aid of some aggregated time passing δ) in the
accelerated semantics, we shall reach those a's (without trespassing B since otherwise this would
hypothesis.
16
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
Constraint 1, no transition at the new location has already reached its enabling end point in the
after (cid:101)ω as well as after ω(cid:48)t, by the induction hypothesis. For agent Ai, from the third item of
original (after(cid:101)ω) and in the accelerated (after ω(cid:48)t) semantics. If ∆((cid:101)ω) ≤ ∆(ω(cid:48)t) = ∆(ω(cid:48)), the
clock Ci of Ai is not greater after(cid:101)ω than after ω(cid:48)t) (see the formula above yielding ci) so that
all the enabled transitions of Ai after(cid:101)ω are also enabled after(cid:101)ω(cid:48)t, and the induction hypothesis
remains valid. On the contrary, if ∆((cid:101)ω) > ∆(ω(cid:48)t), it may happen that some(cid:101)t in Ai is enabled after
(cid:101)ω but not after ω(cid:48)t; however, from ω(cid:48)t it is then possible to let time pass during ∆((cid:101)ω) − ∆(ω(cid:48)t),
which leads to the same state as after (cid:101)ω; it is then also possible to consider a maximal action
zone after ω(cid:48)t which encompasses all the transitions enabled after(cid:101)ω, to reach it in the accelerated
semantics, and the induction hypothesis remains valid.
(cid:117)(cid:116)
5. Layers and strong and weak variables
When model checking a system, one usually has the choice between a depth-first and a width-
first exploration of the state space. For reachability properties (where one searches if some state
satisfying a specific property may be reached), depth-first (directed and limited by the query)
is usually considered more effective. However, the majority of the non-determinism in systems
featuring a high level of concurrency (such as MAPTs, and in particular CAV systems) leads to
diamonds. Indeed, if transitions on different agents are available at a state then they may occur
in several possible orders, all of them converging most of the time to the same state (see the
paragraph on persistence above). In order to avoid exploring again and again the same states,
a depth-first exploration needs to store all the states already visited up to now, which is usually
impossible to do in case of large systems. For example, if states s1 and s2 share a common
successor s3, the algorithm will compute successors of s1, then remove s1 from memory and
continue with its successors, until reaching s3 and exploring all paths from s3, forgetting each
time the nodes already visited. That way, when the algorithm has explored all paths from s1 and
start exploring from s2, there is no memory of s3 having been explored already, and thus all paths
starting from it will be explored again.
On the contrary, using width-first algorithms would guarantee avoiding that issue, because dupli-
cate states obtained at a given depth can be removed. However, this would also imply exploring
all reachable states at a given depth and forbid using heuristics to direct and limit the exploration.
An idea is then to try to combine both approaches.
5.1. Layered state space
The state space of a MAPT shows an interesting characteristics: apart from having no cycles
(see Prop. 2.4: the state space in our case is always a DAG), its structure can often be divided in
layers such that all states on the border of a layer share the same vectors of localities and clocks
(and thus, the same set of enabled transitions) and are situated at the same time distance from the
initial state. The only difference concerns the value of the variable, due to the non-determinism
and the concurrency inherent to this kind of models. Non-determinism means that an agent has
the choice between several transitions at some location; concurrency means that at least two
agents may perform transitions at some point. In the first case, several paths may be followed
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
17
by the agent to reach some point, leading to different values of the variable; in the second case,
transitions of the two agents may be commuted, leading again to different values of the variable.
This is schematised by Fig. 6, where one can see how the state space is divided in sub-spaces
(each of them being a DAG with a unique initial state) such that each final state of a sub-space is
the initial state of another one. The sub-spaces may intersect.
More formally, in a DAG, we have a natural partial order: s1 < s2 if there is a non-empty path
from s1 to s2; s1 and s2 are incomparable if there is no non-empty path between them.
A cut is a maximal subset of incomparable states. A cut partitions the partially ordered space into
three subsets: the states before the cut, the cut itself, and the states after the cut.
In the following, we shall denote by ω a (possibly empty) evolution leading from some state s to
some state s(cid:48), i.e., the sequence of transitions, resets and time passings labelling some path going
from s to s(cid:48) in the state space of the considered model. As usual, we shall also denote by ∆(ω)
the sum of the time passings along ω, also called the time distance from s to s(cid:48) (along ω).
Definition 5.1. In a MAPT (whose state space is a DAG), a cut is said coherent if all its states
have the same locality and clock vectors, and any two evolutions ω1, ω2 linking the initial state
to states of the cut have the same time length: ∆(ω1) = ∆(ω2). Coherent cuts may be used to
define borders between layers.
Let s be any state in a MAPT; the states reachable from s form a DAG subspace, in which we
may also define coherent cuts: a coherent cone with apex s is the set of states up to a coherent cut
in this subspace (including s and the cut).
Proposition 5.2.
1 ∈ C1, s2, s(cid:48)
1 to s(cid:48)
2 ∈ C2. If there is an evolution ω from s1 to s2 and ω(cid:48) from s(cid:48)
• Coherent cuts do not cross, in the following sense. Let C1 and C2 be two coherent cuts in a
MAPT, s1, s(cid:48)
2 to
1, then C1 = C2 and ω = ε = ω(cid:48). In particular, no two distinct coherent cuts may have a
s(cid:48)
common state.
• The time distance between coherent cuts is constant, in the following sense. Let C1 and C2
2 ∈ C2, with an evolution ω from
• If s1 ∈ C1 and there is a coherent cone with time height ∆ (for any evolution ω from s1 to
the base of the cone, ∆(ω) = ∆), then there is a coherent cut C3 separated from C1 by a
time distance ∆.
two different coherent cuts in a MAPT, s1, s(cid:48)
s1 to s2 and ω(cid:48) from s(cid:48)
2, then ∆(ω) = ∆(ω(cid:48)).
1 ∈ C1, s2, s(cid:48)
Proof:
• In the first case, if there is a path (cid:101)ω from s0 to s1 and a path (cid:101)ω(cid:48) from s0 to s(cid:48)
have ∆((cid:101)ω) + ∆(ω) = ∆((cid:101)ωω) = ∆((cid:101)ω(cid:48)) and ∆((cid:101)ω(cid:48)) + ∆(ω(cid:48)) = ∆((cid:101)ω(cid:48)ω(cid:48)) = ∆((cid:101)ω), hence
∆(ω) = −∆(ω(cid:48)), which is only possible if ∆(ω) = 0 = ∆(ω(cid:48)).
Also, since s2 and s(cid:48)
to some state s(cid:48)(cid:48)
length 0 from s1 to s(cid:48)(cid:48)
of each agent Ai form a DAG and Ei > 0, this is only possible if ω = ε = ω(cid:48).
2 have the same localities and clocks, there is an evolution ω(cid:48) from s(cid:48)
1 with the same localities and clocks as s1, hence an evolution ωω(cid:48) of time
1, which reproduces the same localities and clocks. Since the localities
2, we must
2
18
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
from s0 to s(cid:48)
the property.
• The last property results from the observation that, if s(cid:48)
1 = s(cid:48)
In particular, if ω = ε, i.e., s1 = s2, we also have that s(cid:48)
if ω(cid:48) = ε.
2 and C1 = C2, and similarly
• In the next case, if s0 is the initial state and there is a path(cid:101)ω from s0 to s1 and a path(cid:101)ω(cid:48)
1, we must have ∆((cid:101)ω) + ∆(ω) = ∆((cid:101)ωω) = ∆((cid:101)ω(cid:48)ω(cid:48)) = ∆((cid:101)ω(cid:48)) + ∆(ω(cid:48)), hence
1 ∈ C1, since s1 and s2 have the
same localities and clocks, any evolution from s1 to the base of the cone is also present
from s(cid:48)
1 and leads to a state with the same localities and clocks as the states on the base of
the cone (but the variables may differ). And conversely, if a path leads from s(cid:48)
1 to a state of
C3, it has time length ∆ and there is the same path from s1 to some state on the base of the
cone.
(cid:117)(cid:116)
For instance, if agent Ai in a MAPT starts at l1
i with a null clock, after Ei time units and before
(Ei + 1) time units, it shall necessarily pass through its reset (it is possible that it performs other
transitions before and/or after this reset without modifying its clock, but it is sure the agent will
go through this reset before performing a new time passing). Hence, if each agent starts from its
initial locality with a null clock, after lcm{E1, . . . , En} (i.e., the least common multiple of the
various reset periods; in the following, we shall denote this value by lcm(E)) time units, it is sure
we shall be able to revisit the initial state, but possibly with various values of the variable, yielding
the border of a layer. From this border the same sequences of transitions/resets/time-passings as
initially will occur periodically (with a period of lcm(E)), leading to new borders, with the initial
localities and the null clocks.
The situation will be similar if ∀Ai : initi = init mod Ei for some value init < lcm(E). Indeed,
for each agent Ai and each k, after Ei − initi + k · Ei time passing we shall visit l1
i with a null
clock, hence visit new borders after (k + 1) · lcm(E) − init time passings.
For other initial values of the clocks, it is not sure we shall be able to structure the state space in
layers, but in either case, it may also happen there are other kinds of layers and borders.
Let us consider for instance the system illustrated on top of Fig. 7, where each agent starts with
a null clock in its initial locality. Agent A1 is deterministic since there is a single transition
1, and agent A2 is not since two transitions may occur while
originated from l1
2. If we forget the value of the variable, the graph for A1 is periodic with a period of
being in l2
E1 = 10 and the graph for A2 is periodic with a period of E2 = 15. The whole system is therefore
periodic with a period of lcm(E) = lcm{E1, E2} = 30. The sequence of intervals depicted in
the bottom of the figure for A1, represents the intervals where transitions have to take place, with
their time distance from the initial state (here these intervals are disjoint, but they could overlap
as well). Note that if an initial clock initi were to be strictly positive, the sequence of intervals
for agent i would be shifted to the left by initi time units. For A2, the intervals exhibited on the
figure have a different interpretation, that will be explained below.
A border may not occur at a time t measured from the beginning of the system if, for some
deterministic agent Ai (the case for non-deterministic agents will be handled below), there is an
interval [a, b], shifted by some multiple of Ei, such that
1 as well as from l2
a + k · Ei − initi < t < b + k · Ei − initi
(1)
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
19
initial state
s1
s2
s
initial part
first layer
second layer
...
...
...
...
Figure 6. General shape of a layered state space with a zoom on the initial part. Identical states are merged
together. All states on the border of a layer share the same vectors of localities and clocks but have different
values of v. Each sub-space surrounded by dashed lines is a DAG having a unique initial state and one or more
final states as shown in blue for the sub-space corresponding to the initial part.
Indeed, in that case, at time t, Ai may either be at the source or at the destination of the cor-
responding transition, without being able to impeach that, hence without being certain of the
locality.
Hence, a deterministic agent may allow a border to occur at a time t if one of the following cases
occurs:
• If t is strictly between the various shifted intervals of Ai, we know immediately that when
we reach this time we are at some specific location in Ai. For instance at time t = 19 in
1.
Fig. 7, we are sure A1 is in location l3
• If t is situated at the right of some (shifted) interval, the agent can be either in the source or
in the destination localities. The first situation does not exist in every paths, as it is possible
to leave the source before t, while the second situation exists in all paths. Therefore, the
second situation is suitable for a coherent cut. This case happens in Fig. 7, for instance
when the system reaches time t = 5, A1 may be either in l1
1.
1 or in l2
• If t is situated at the left of some (shifted) interval, the agent can be either in the source
or in the destination localities. This is symmetric to the previous case, and here it is the
first situation that exists in all paths and is suitable for a coherent cut. This case happens in
Fig. 7, for instance when the system reaches time t = 6, A1 may be either in l2
• If t is situated on an interval of length 0 (such as a reset, or transition with an interval
where a = b). This corresponds to a union of the two previous cases, where two localities
1 or in l3
1.
20
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
A1
l1
1
[1, 5]
l2
1
[6, 8]
l3
1
E1 = 10
A2
l1
2
[0, 4]
l2
2
[7, 11]
l4
2
E2 = 15
[6,7]
l3
2
9 ]
[ 9 ,
Top: Example of a MAPT composed of agents A1 and A2 with clocks C1 and C2 initialized to 0.
Figure 7.
Bottom: Time intervals where a transition or set of transitions may be performed. Red dotted lines indicate time
units where a coherent cut may exist.
are possible. Here, both are suitable for a coherent cut. This case happens in Fig. 7, for
instance when the system reaches time t = 20, A1 may be either in l3
1 or in l1
1.
• If t is both at the right of some shifted interval and at the left of another one (meaning that
they intersect on t), this comes back to a combination of the previous cases. As such, a
suitable situation for a coherent cut is to consider the system after performing the transition
corresponding to the left interval and before performing the transition corresponding to the
right interval. A particular occurrence of this case is shown in Fig. 7 at time 15, where A2 is
at the right of an interval of length 0 corresponding to its reset and at the left of the interval
2. The fact that one
of the transition from l1
of the interval is of length 0, is included in the general case.
2. In this situation, A2 may either be in l4
2 or l2
2, l1
2 after having performed a transition at time 6, or in l2
For a non-deterministic agent, like A2 in Fig. 7, the analysis is similar but slightly more complex;
indeed, even between intervals it may be in several possible localities2. For instance, at time
2, and we may
t = 7, A2 may either be in l3
2 since it has the possibility to choose the other
not force the system to wait for A2 going in l3
transition. The idea is then to consider the localities of the considered non-deterministic agent
Ai which by themselves are singleton cuts in the DAG of its localities, i.e., the localities which
2, l2
are visited in every complete iteration (from l1
2
and l4
2. They form a sequence in Li: let Pi be this list and denote by succ(l) the successor of l
in Pi. Thus, between two localities l and succ(l) in Pi, either there is a unique transition enabled
in some interval [a, b] (as in the deterministic case above) or there are at least two different paths
with possibly several transitions enabled at some moment in the interval [a, b], where a is the
smallest lower bound of all the outgoing transitions from l and b is the greatest upper bound of all
i ). For A2 in Fig. 7, those localities are l1
i to lm
2of course not at the same time: for different histories.
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
21
the incoming transitions to succ(l). One may think about [a, b] as the enabling interval of some
virtual transition from l to succ(l). Then, exactly the same argument as above may be used to
check if a state space of a MAPT admits layers, and this amounts to a proof of:
Proposition 5.3. A MAPT admits a layered state space with borders at t + (cid:96)· lcm(E) with (cid:96) ∈ N
i }, and for a df= min{a (l, f, [a, b], l(cid:48)) ∈ l•},
if, for each agent Ai, for each l ∈ Pi \ {lm
b df= max{b (l(cid:48), f, [a, b], succ(l)) ∈ •succ(l)}, no k ∈ N satisfies: a + k · Ei − initi < t <
b + k · Ei − initi, where initi is the initial value of clock Ci.
(cid:3)
A border detected that way will then be defined by the couple ((l1,··· , ln), (c1,··· , cn)) where,
for agent Ai, ci = (t + initi) mod Ei (or Ei instead of 0 if we reach the position of a reset
but decide not to perform the latter) and li is the locality periodically reached in all possibles
paths at clock value ci. Locality li is determined by the clock if we are not at the border of an
interval, otherwise we have to know if the corresponding transition or reset has to be performed.
In particular, when reaching intervals of length 0, we have a choice between several localities
(before or after performing the corresponding transition or reset).
Searching for t more efficiently Proposition 5.3 allows to search for the coherent cuts
whose sets of localities and clocks reproduce every lcm(E) time units3. Hence, it is not nec-
essary to consider times t beyond lcm(E); note however that it may happen that a coherent cut
occurs at time lcm(E), but not at time 0, if the corresponding localities occur "before" the initial
ones at time lcm(E). Also, this proposition seems to imply we should consider all the shifted
version of each interval [a, b], i.e., all integer values for k. This is not true: for each [a, b] we only
have to consider the greatest k respecting the left constraint a + k· Ei − initi < t, i.e., the greatest
− 1(cid:101). We then have
ka such that ka < t+initi−a
to check if t < b + ka · Ei − initi (in which case the considered t does not define a coherent cut).
If we also want to avoid the extremities of the intervals [a, b], we get that no k should lead to
the constraint a + k · Ei − initi ≤ t ≤ b + k · Ei − initi. This leads to the simpler formula
ka = (cid:98) t+initi−a
(cid:99), and to the check t ≤ b + ka · Ei − initi. Also, in this case the clock vector is
enough to describe the coherent cut without any ambiguity.
, which is given by the formula ka = (cid:100) t+initi−a
Ei
Ei
Ei
Combination with the accelerated semantics
If we consider only the locality and clock
vectors and we neglect the value of variable V in the states, a coherent cut becomes a mandatory
crossing point in the original dynamics of the system. This will also be true in the accelerated
semantics, but in order to preserve the periodic occurrences of these points we need to avoid
letting time jumps go anywhere in the next maximal action zone: we need a deterministic rule,
like the one we mentioned before, prescribing to go to the end of the zone. We shall adopt this
rule in the following.
Since in the accelerated semantics, time passings jump to (the end of) the next maximal action
zone, intervals do not play the same role as in the original semantics and we may not rely on
Property 5.3 to find the coherent cuts. In particular, coherent cuts in the accelerated semantics
3There may also be non-periodic coherent cuts at the beginning of the state space, if some agents do not start at their initial
locality with a null clock. Indeed, for those agents, it may happen that other localities are certainly visited before the first
reset, which introduce other intervals [a, b] before that time. However, we shall not use those extra coherent cuts in our
exploration and model checking tool.
22
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
((1, 1); (0, 0))
((1, 2); (5, 5))
((2, 2); (4, 4))
+1
((2, 2); (5, 5))
+1
+3
((2, 2); (6, 6))
+2
((3, 2); (6, 6))
((2, 3); (6, 6))
+1
((2, 2); (7, 7))
A fragment of the original and accelerated dynamics with omitted values of V for Example 7.
Figure 8.
Vectors of localities (li
2) are denoted by (i, j). The thick arcs correspond to the steps present in the accelerated
dynamics while thin ones correspond to the steps present in the original one. Time passing arcs are labelled by
the corresponding delay; transition arcs are unlabelled (the corresponding transition may be read in the change
of localities). Coherent cuts in original dynamics are underlined and those in the accelerated one are bold.
1, lj
are usually not ones in the original one. This is due to the fact that, as time steps may be bigger
than one unit in the accelerated dynamics, it may happen that a time passing overpasses the clock
vector corresponding to some coherent cut ((cid:126)l, (cid:126)c) present in the original dynamics.
However, we may relate coherent cuts in the accelerated semantics to the ones in the original one,
which may be characterised by Property 5.3: as we shall see in Proposition 5.4, a state ((cid:126)l, (cid:126)c + δ)
reached after going over an original coherent cut ((cid:126)l, (cid:126)c) is in fact a coherent cut of the accelerated
dynamics. This is illustrated in Figure 8.
One may observe that in both dynamics, all paths go to either ((1, 2); (5, 5)) or ((2, 2); (4, 4)).
In the original dynamics, the coherent cut at ((2, 2); (5, 5)) is reached, and after a time passing
the coherent cut at ((2, 2); (6, 6)) is reached. From ((2, 2); (6, 6)), three actions are possible
(two transitions and one time passing).
In the accelerated dynamics, it is still possible from
((1, 2); (5, 5)) to reach ((2, 2); (5, 5)), but not from ((2, 2); (4, 4)) as the acceleration directly
leads to ((2, 2); (7, 7)). From ((2, 2); (5, 5)) in the accelerated semantics, the acceleration also
leads to ((2, 2); (7, 7)), since this state corresponds to the end of the first maximal action zone.
As such, in the accelerated semantics, ((2, 2); (6, 6)) is not a coherent cut anymore since it is
not reachable, but also ((2, 2); (5, 5)) is no longer a coherent cut since there exist paths that go
over it. This illustrates that, in the accelerated dynamics, the locality vector corresponding to an
original cut may be entered with different clock values, but from those states (here ((2, 2); (4, 4))
and ((2, 2); (5, 5))) the acceleration will always lead to the same vectors of localities and clocks
(here ((2, 2); (7, 7))), which is a coherent cut in the accelerated semantics.
It remains to show that this is not an accident but a general rule.
Proposition 5.4. For each (periodic, with the period lcm(E)) coherent cut characterised by the
vectors ((cid:126)l, (cid:126)c) at time t (measured from the beginning of the system) in the original semantics,
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
23
there is a coherent cut in the accelerated semantics for the same vector of localities (cid:126)l and clock
vector (cid:126)c + δ at time t + δ, for some δ ∈ N.
Proof:
Since, in the accelerated semantics as in the original one, the localities are determined by the se-
quence of transitions and resets that have been performed, from Proposition 4.1 we know that the
visited localities are the same in both semantics. Moreover, each reachable state in the accelerated
dynamics is also reachable in the original one and for each existing path between two states in
the accelerated dynamics there is also at least one path in the original one. As a coherent cut is a
mandatory crossing point (when we neglect the values of the variable) in the original dynamics of
the system, the only way to avoid it in the accelerated dynamics is to have a new arc from a state
before the cut leading to a state after the cut (for instance, in Figure 8, the original cut (2, 2)(5, 5)
is reachable in the accelerated semantics, but it may also be skipped by the arc from (2, 2)(4, 4)
to (2, 2)(7, 7), hence it is not a cut in the accelerated semantics; the original cut (2, 2)(6, 6) is
not even reachable in the accelerated semantics, due to the arc from (2, 2)(5, 5) to (2, 2)(7, 7)).
All transitions and resets present in the accelerated dynamics are also present in the original one,
therefore only a time passing (jumping to the end of the next maximal action zone) may provide
such a possibility. Hence, if we may prove that whenever a time passing in the accelerated dy-
namics goes from a state s before a cut in the original dynamics to a state s(cid:48) after that cut, the
state s(cid:48) belongs to a coherent cut in the accelerated dynamics, we are done.
If an agent Ai has a single location l1
i , i.e., mi = 1, its resets do not change the location (only
its clock goes from Ei to 0), hence we shall neglect it in the following definition of t− and t+,
considering its resets are spurious. Let t− = max{t(cid:48) t(cid:48) = (k · Ei − initi) ≤ t, k > 0, i ∈
{1, . . . , n}, mi > 1} be the time of the last (non-spurious) reset not after t, and t+ = min{t(cid:48)
t(cid:48) = (k · Ei − initi) ≥ t, k > 0, i ∈ {1, . . . , n}, mi > 1} be the time of the first (non-spurious)
reset not before t.
If the original coherent cut ((cid:126)l, (cid:126)c) occurs before the first non-spurious reset then, with the usual
convention max(∅) = 0 in N, t− = 0. If a reset is available or was just performed at t, then
t− = t = t+.
Since we assumed that the transition graph of each agent is acyclic, if an agent leaves a locality,
the same locality cannot be reached again before the next reset of this agent. As a consequence, in
the interval [t−, t+], a vector of localities (cid:126)l once exited (i.e., performing a transition from a state
with (cid:126)l) cannot be reached again. Therefore in both semantics, it is not possible to enter (cid:126)l strictly
after t in the interval [t−, t+], nor to leave (cid:126)l strictly before t in the interval [t−, t+], since (cid:126)l must be
reached at time t in each original path (by definition of a coherent cut in the original semantics;
note that other vectors of localities may also be reached at t, before or after (cid:126)l).
Hence, in the accelerated semantics, (cid:126)l will always be entered at some t(cid:48) ≤ t and may only be
leaved at some t(cid:48)(cid:48) ≥ t. There may be several values for t(cid:48), depending on the path followed
to reach this locality (for instance, in Figure 8, there are two ways to enter (2, 2): (2, 2)(4, 4)
and (2, 2)(5, 5)). On the contrary, there is single value t(cid:48)(cid:48), corresponding to the end of the first
maximal action zone starting at or after t, and there is one since otherwise that would mean there
is no way to reach t and get out of (cid:126)l. This yields the unique way to get out of the locality vector (cid:126)l,
hence a coherent cut of the accelerated semantics, adding δ = t(cid:48)(cid:48) − t to each clock since we did
not performed a reset meanwhile. For instance, in the example of Figure 8, if t = 5 there are two
24
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
possible paths, either t(cid:48) = 4 and d = 3, or t(cid:48) = 5 and d = 2, leading in both cases to the coherent
cut (2, 2)(7, 7) of the accelerated semantics. Notice a curious feature: in the accelerated semantics
for the same example, we reach the coherent cut ((2, 2); (5, 5)) of the original semantics, but it is
no longer a coherent cut since there exists now a path that does not reach it, because of the added
arc labelled +3.
From the choice of the jump points in the accelerated semantics, δ will be the same for each
re-occurrence of the considered coherent cut, at t + k · lcm(E).
(cid:117)(cid:116)
Exploring layered state space The function next border(state), depicted in Algorithm 1
takes a state state = ((cid:126)l, (cid:126)c, v) and computes, through a width first exploration, the set of successors
up to the next border. It applies to both original and accelerated semantics and requires to define
a non empty set of periodic cuts Cuts (in the form ((cid:126)l, (cid:126)c), i.e., without the variable, obtained from
an application of Prop. 5.3) that are coherent in the original dynamics.
To do so we introduce the function next state(s), which returns the set of all successors of state
s (depending on the chosen semantics), and the function is cut(pre s, s), which is true if the state
s, successor of state pre s is part of a cut defined by Cuts. Formally, is cut(pre s, s) depends
on the chosen semantics. In the original semantics, is cut(pre s, s) is true if s = ((cid:126)l, (cid:126)c, v) and
((cid:126)l, (cid:126)c) ∈ Cuts. In the accelerated semantics, is cut(pre s, s) is true if one of the following occurs:
• s = ((cid:126)l, (cid:126)c, v), ((cid:126)l, (cid:126)c) ∈ Cuts and at least one transition or reset allows to leave s, which means
that the coherent cut is the same in both semantics;
• pre s = ((cid:126)l, (cid:126)c, v), s = ((cid:126)l, (cid:126)c+, v), ((cid:126)l, (cid:126)c) ∈ Cuts and s is the only successor of pre s with
(cid:126)c < (cid:126)c+, which means that the original cut has also been reached in accelerated semantics
but is no longer a coherent cut;
• pre s = ((cid:126)l, (cid:126)c−, v), s = ((cid:126)l, (cid:126)c+, v) and ((cid:126)l, (cid:126)c) ∈ Cuts with (cid:126)c− < (cid:126)c ≤ (cid:126)c+, which means that
the accelerated time increase went over the original cut.
The algorithm is described in python : list.add(e) adds element e in the queue list (only if
e /∈ list) , while list.pop() removes the first element (it is a first in/first out behaviour), border
and exploring are initially empty and the loop condition is true as long as exploring is nonempty.
This can be used iteratively in a depth-first exploration to jump from a state to one of its successors
belonging to the next border. During this exploration, an additional function may be used to check
if a state satisfies some condition. Such a use of layers allows to reduce the number of explored
paths by detecting diamonds caused by the order of transitions of concurrent agents.
5.2. Exploration using strong and weak variables
The approach presented in the previous section does not deal with diamonds spreading on a time
distance longer than the one between two adjacent borders. For example, it may still happen
that two different states s1 and s2 belonging to the same border have a common successor s in
the future, as illustrated in Fig. 6. To cope with this issue, it is more interesting to perform the
width-first exploration that computes successors at the next border for the set {s1, s2} instead
than taking them separately. In general, it is not obvious to know or guess which states should be
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
25
Algorithm 1 next border(state)
border[] {Set of states to be returned}
exploring[] {Queue of states to explore}
exploring.add(state)
while exploring do
end if
end for
end while
return border
pre s ← exploring.pop()
successors ← next state(pre s)
for all s ∈ successors do
if is cut(pre s, s) then
border.add(s) {States of the cut are added to border}
exploring.add(s) {Other states are added to exploring}
else
kept together in the computation of the next border. Indeed, one should be able to determine when
sets of states should be split in sub-sets and when they should be kept together. To perform such
a clustering, it may be interesting to exploit the properties of target applications, such as CAVS.
A possible solution is to assume V df= Vw × Vs, where Vw (weak) is a less important part of V
and Vs (strong) a more important one, such that states differing in the valuation of Vs are unlikely
to have a common successor, while this is not the case for Vw. Symmetrically, states with the
same valuation of Vs are more likely to have a common successor. This may give us a criterion
to cluster states and jump from a set of states to the set of their successors at the next border.
The choice of Vs and Vw is of course system-dependent and should be defined by an expert, or
with the help of a simulation tool. As an example, elements that can be assigned a new value
independently of their previous one might be considered as weak, while elements whose value
changes depend on their present value (for instance the position of a moving object) might be
considered as strong.
Function clustered next border(state set) is then a variant of next border(), taking a set of
states and producing a set of clusters, i.e., sets of states having identical values of variables in Vs.
It is used in a similar way as next border() to explore in a depth-first manner the layered state
space, the only difference being that it jumps from a cluster belonging to some border to a cluster
belonging to the next one, based on the choice of Vs.
Note that if Vs = ∅, such an exploration is equivalent to a classical width-first one, since states at
a border are always kept is the same sub-set. With such an algorithm, for a bounded layered state
space of a MAPT, one can perform an "on-the-fly" depth-first exploration since there is no need
to memorize explored states. This may be used to efficiently search for specific reachable states,
and may be sped up by the use of heuristics that choose which sets of states to explore first.
26
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
6. Dynamic exploration of a MAPT
This section is dedicated to exploration algorithms of finite prefixes of MAPTs: states that do not
have successors in the considered prefix will be called final. The algorithms are denoted with the
CTL temporal logic syntax. Since this temporal logic is meant to explore infinite paths, we shall
consider that each final state has a self loop.
Our algorithms have two main characteristics: they operate "on-the-fly", which means that they do
not store the entire visited state space (but only a cut of it), and they can be tuned with heuristics
defining a priority on paths to be explored, that might significantly speed up the computation
time if the searched states exist. To do so we rely on the algorithm clustered next border()
mentioned in Section 5. Since they do not store all the states that have been explored, we chose
not to return traces of execution, unlike what is usually proposed by standard temporal logic
model checking tools.
We formalise in the following algorithms for the basic CTL properties EF p and EGp, respec-
tively meaning a reachable state satisfies p and there exists a path where p is always true. Any
property for which we have an algorithm may be negated, so that we can also express AF p and
AGp, respectively equivalent to ¬(EG¬p) and ¬(EF¬p).
The algorithm for EF p consists, starting from a stack containing the initial state, in taking the
first element s of the stack, returning it if p is true on s, and otherwise adding the result of function
clustered next border(s) to the stack. The algorithm continues recursively until reaching p or
there is no more states to explore in the considered finite prefix. Additionally, we return true if p is
satisfied by a state between two borders, i.e., during an application of clustered next border().
The algorithm for EGp works in a similar way, but the state s is returned if p is true on s and if s
is final, and clustered next border(s) is added to the stack only if p is true on s. Additionally,
states where p is not true are dropped when explored in clustered next border(). That way,
only states where p is true are explored.
We may also define algorithms for nested CTL queries built with binary logical operators. We
shall for example consider two of them: EF (p ∧ EF q), meaning that a reachable state satisfies
p and from that state a reachable state satisfies q, and EF (p ∧ EGq), meaning that a reachable
state satisfies p and from that state there exist a path where q is always true. One may notice that
the "leads to" operator ( −−> ) used in the state of the art tool UPPAAL follows the equivalence :
p −−> q <=> AG(¬p∨ AF q) <=> ¬EF (p∧ EG¬q). This operator is therefore expressible
in our framework. Although only these two queries are given here, any kind of nested CTL query
can be implemented.
Those nested queries are implemented using a marking function (i.e., a Boolean indicator). EF (p∧
EF q) is implemented as follows. Whenever p is true on a state, the state is marked. Whenever
a state is marked, all its successors are marked. Starting from a stack containing the initial state,
the first element s of the stack is returned if q is true on s and s is marked. Otherwise, the re-
sult of clustered next border(s) is added to the stack. The same marking process is performed
between two borders, i.e., in clustered next border(). We continue recursively until a state val-
idates the property or there is no more state to explore. As for EF (p ∧ EGq), states are marked
whenever both p and q are true or the state is a successor of a marked state and q is true. If a
marked final state is reached, it validates the property and is returned. Again, the same marking
process is performed in clustered next border().
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
27
7. Experiments
In this section we illustrate the performances of our exploration algorithms. To do so, we use
MAPTs representing systems of autonomous communicating vehicles, for which both Con-
straints 1 and 2 are satisfied. The first constraint allows to use the acceleration, which heavily
reduces the size of the state space as well as the number of diamonds. The second constraint
ensures that the state space is a DAG. As a consequence of the latter, the state space is infinite,
because of the X part of V . In the following case studies, the longitudinal positions of the vehi-
cles on the road will play the role of this part. The road we observe is technically infinite, but as
we are interested only in the analysis of a portion of it, we can bound the exploration to a fixed
value of X. The system thus converges towards a bound that, once reached, is considered as a
final state.
In the following, we first compare the exploration time obtained with or without acceleration.
Then, we discuss the advantages and drawbacks of using various types of layer-based explo-
rations. In the third part of this section, we provide some heuristics, and experiment them in order
to (hopefully) observe the gain that can be achieved with them. Finally, we compare this method
with the framework VERIFCAR [2], which uses UPPAAL, and we provide a verification method
for the analysis of such systems that is more efficient than the one proposed in [2].
Three models used in [2], featuring various state space sizes, have been implemented as MAPTs.
Those models represent systems of autonomous vehicles circulating on a portion of highway
where each vehicle communicates with the other ones to make decisions about its behaviour.
These experiments have been performed by implementing the models with the free high level
Petri net tool ZINC, using its library to implement our exploration algorithms.
7.1. Efficiency of the accelerated dynamics.
A width first exploration of the state space on each of the three models have been performed using
both the original and the accelerated semantics. Table 1 provide for each model the number of
states in its state space along with their full exploration times (FET) in both semantics and in
UPPAAL. As expected, the accelerated semantics reduced exploration time, therefore, it has been
used in all the subsequent experiments.
Model 1 Model 2 Model 3
FET original semantics (s)
FET accelerated semantics (s)
FET UPPAAL (s)
Size of the state space
14.5
10.8
5
144
52.1
36
574
420
379
7751
52732
285944
Table 1.
It is interesting to mention that the main improvement of the accelerated semantics, compared to
the original one, is to explore only one state of each (maximal) action zone. As such, the more
a system features transitions with wide non-deterministic time intervals, the greater is the time
gain provided by the accelerated semantics. Here, the non-deterministic time intervals present
28
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
in Model 1 and Model 3 are quite short, such that the number of paths that are ignored in the
accelerated dynamics is not very important. On the other hand, Model 2 features a transition with
a wider non-deterministic time interval, explaining why the difference between the two semantics
is more pronounced for this model. We can thus expect the accelerated semantics to be even more
useful when using models similar to the one depicted in Figure 7.
7.2. Efficiency of the layer-based exploration.
Here, we compare, for several exploration algorithms, the full exploration time and the reachabil-
ity time of the first occurrence of a final state. They are explored in width first, depth first without
layers and depth first with layers (with and without the use of strong/weak variables). The size of
the list Cuts was 1 for the models 1 and 3, and 5 for the second one. Table 2 shows the results.
Exploration algorithm
Full exploration time (s)
Model 1 Model 2 Model 3
Width first
Depth first without layers
Depth first layered (Vw = ∅)
Depth first layered (small Vw)
Depth first layered (large Vw)
10.8
∞
11
11
11
52.1
∞
∞
250
71
420
∞
∞
2015
667
First occurrence of a final state (s)
Model 1 Model 2
Model 3
419.9
10.7
3.3
4.5
4.5
4.5
52
4.6
6.6
7.4
14.4
3.9
4.1
6
7.2
Table 2.
Comparison of full exploration time and time to reach the first occurrence of a final state state for
exploration algorithms in width first, depth first with and without layers and with or without the use of weak
variables. ∞ means that the exploration was stopped after 50 hours of computation without a result.
One can see that the width first algorithm has the best full exploration time in any case, but
the time before reaching any final state is close to the full exploration one, which makes it the
worst technique in this case. On the other hand, the standard depth first algorithm is the fastest
for reaching a final state, but it does not fully explore the state space even after 50 hours of
computation.
Results for Model 1 show that as long as the layer based approach is used, the full exploration
time is very close to that of the width first algorithm. This indicates that there is almost no
diamonds covering several layers, meaning that different states belonging to the border of a layer
almost never share a common successor. Because of that, the use of weak variables has no effect.
Although this case is rather simple, it clearly highlights the advantage of layer-based exploration:
with almost no increase in full exploration time, it is able to reach a final state much faster.
Model 2 and Model 3 have much more complex state spaces and, in these cases, the layer-based
algorithm that does not rely on weak variables to aggregate states is not able to explore the full
state space even after 50 hours of computation. On the contrary, using even a small number but
well chosen weak variables (6 out of 39), it is possible to fully explore the state space. In both
cases, exploration is about five times longer than the exploration time of width first algorithm.
When using a large number of weak variables (30 out of 39), the exploration is much shorter
(about 1.5 times the time of width first algorithm). One can note however that the larger Vw, the
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
29
longer it takes to reach a final state. Indeed, as states are aggregated layer by layer, a too large Vw
would result in an exploration similar to a width first one, where all states are kept together and
final states are only reached at the end of the computation. With the weak variables chosen, the
time to reach a final state remains however reasonable.
In the next experiments, the depth first algorithms always use layers and a fixed non-empty Vw.
7.3. Heuristics
Exploration algorithms based on layers allow the use of heuristics. These heuristics guide the
exploration, choosing among all the unexplored states the one that will most likely lead to a state
that satisfies the checked property. The heuristics we use consists in associating a weight to each
state. When a new state is discovered, it is placed in a list ordered by weight of states to explore.
The list of states to explore is sorted either by ascending or descending weight, depending on the
property to verify. The weight is a prediction of the distance between the current state and a state
satisfying the property. The next state to be explored is the last in the list, i.e., having the highest
(respectively lowest) weight.
Therefore, a property may be associated with a heuristics that takes a state as an input and returns
a weight as an output. Below is a list of heuristics that we used for experiment purposes together
with the property they are associated to:
1. distance vh1 vh2 : returns the longitudinal position of vehicle vh1 minus that of vehicle
vh2. It may be used with property EF arrival vh1 bef ore vh2 and weights sorted in
ascending order, where arrival vh1 before vh2 is true in a state if vehicle vh1 reaches the
end of the road portion before vehicle vh2 does. The idea behind is to check in priority
states where vh1 is the most ahead of vh2.
2. estimated travel time vh: returns the time traveled since the initial state plus the esti-
mated time to reach the end of the road portion, assuming the current speed is maintained. It
may be used with weights sorted in ascending order and property EF travel time vh sup n,
where travel time vh ≥ n is true in a state if vh has reached the end of the road portion
within n time units. The idea is to check in priority states where vh is predicted to reach
the end of the road with the shortest time.
3. time to overtake vh1 vh2 : is the time before both vehicles arrive at the same longitudinal
position if they keep their current speed. It may be used with weights sorted in descending
order and property EF ttc vh1 vh2 ≤ n, where ttc vh1 vh2 is the value of the time to
collision indicator between vh1 and vh2 (i.e., the delay before there is a collision between
the two vehicles if they keep their current speed), and n is a time to collision value. The
idea is to check in priority states where one of the vehicles is getting closer to the other one
with the higher speed.
These heuristics have been used on Model 3, with results given in Table 3. The scenario in Model
3 considers three vehicles positioned as depicted in Fig. 9 on a two lane road portion that is 500
m long, with one additional junction lane. Initially, vehicle A is on the right lane at position 0 m
with a speed of 30 m/s, vehicle B is on the left lane at position 30 m with a speed of 15 m/s and
vehicle C is on the junction lane at position 40 m with a speed of 20 m/s. They all aim at being
on the right lane at the end of the road portion.
The first two queries can only be true in a final state (the deepest layer). As such, the reachability
time with the width first algorithm is close to the full exploration time with the same algorithm.
30
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
Figure 9.
Initial positions and possible trajectories of autonomous vehicles for the scenario in Model 3.
Exploration algorithm
Width first
Depth first without heuristics
Depth first with heuristics
EF arrival B bef ore A EF travel time A ≥ 15.9 EF ttc A C ≤ 1.14 EF ttc A B ≤ 0
416
234 -- 357
131
427
167 -- 340
149
292
247 -- 547
103
95
277 -- 483
13
Comparison of reachability time for exploration algorithms in width first and depth first with and
Table 3.
without heuristics. As depth first without heuristics is non deterministic, the two values correspond to the fastest
and the slowest runs obtained for each query (five runs where performed each time).
In general, the width first reachablity time depends on the depth of the first state that satisfies the
property. One can observe that for the fourth query, the state is actually reached at a lower depth,
which is reflected by the reachability time.
As the depth first algorithm without heuristics randomly chooses which paths to explore first, the
reachability time varies. The number of states in the whole state space that satisfies the property
thus impacts the mean reachability time with this algorithm, i.e., when there is more possibility
to verify the property, the average time needed is shorter. As we do not want to rely on luck, this
is not satisfying.
On the other hand, depth first algorithm with heuristics explores states in a given order (depending
on their weights) and therefore the reachablity time is always the same. The heuristics we used
could of course be modified and improved, but they are enough to show a significant decrease of
the reachability time. Even for the fourth query, where the width first is faster than the depth first
algorithm, the heuristics allows to quickly identify the state that satisfies the property.
7.4. Comparison with VERIFCAR
We will now compare the reachability time obtained with UPPAAL with the ones obtained with
the depth first exploration algorithms with heuristics, on Model 3. We observed that UPPAAL
first constructs the state space in about 106 s, then is able to answer almost instantly if a searched
state exists.
It can therefore answer several queries after constructing the state space, unlike
our heuristics-based dynamic exploration algorithms, which have to explore the state space from
scratch for each query. Yet, most of the states we aimed for can be reached easily, and the
computation took only about 4 seconds. Queries depicted in Table 3 are those where states were
harder to reach. Compared to the ones we obtained in [2], these results indicate that, when a
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
31
reachability property is verified, our algorithms have the same kind of execution time than the
ones observed with UPPAAL. On the other hand, if the reachability property is not true, they are
slower than UPPAAL, which depending on the kind of query takes between 34 and 370 seconds,
which equals the full exploration time with this tool for Model 3. As mentioned previously, the
full state space exploration time with depth first algorithms on this Model, is in our case, of 667
seconds. This is not a surprise since UPPAAL is a mature tool using many efficient abstractions.
However, UPPAAL is restricted in terms of expressivity, at least in two ways interesting for us.
First, it is not possible to directly check bounds of a given numerical indicator, and such bounds
should be obtained by dichotomy, requiring several runs for each indicator, such as proposed in
the methodology of [2]. Second, it is limited to a subset of CTL (accepting mainly non nested
queries). Our algorithms do not have such restrictions.
Indeed it is possible to do a full exploration of the state space while keeping, for each state, the
lower and higher values reached on the paths leading to the state, for a given set of indicators.
That way, all the information needed to analyse the behaviour of the system, can be obtained after
only one full exploration. This is performed as a standard width-first exploration (storing states
in a file) with the difference that each state is associated to a set of pairs (min, max), being the
(temporary) bounds of the considered indicators. Each time a state is explored, the value for each
indicator is computed, and it overwrites min if it is smaller, and max if it is greater. That way,
each state s contains, for each indicator, the smallest and highest values that exist on the paths
from the initial state to s. As several paths can lead to s, we will consider that s reached from
path P 1 and s reached from path P 2 are equivalent only if the set of their indicators are also
equivalent. Therefore, some diamonds might be detected (i.e., two identical states coming from
different paths) but not merged together in order to keep information about their respective paths.
That way it is possible to have several versions of the same state, but with different indicator
values. If one is interested in the reachability of states (for instance, if an indicator is equal to
some value), this can easily be done in the same way, by adding Boolean variables to the set
of indicators. At the end of the exploration, we get this way the set of all final states, together
with all the information that has been carried on their respective paths. It therefore contains all
the information needed to analyse finely the system. For the case of Model 3, getting the arrival
order together with the bounds for travel time and worst time-to-collision takes 708 seconds. In
comparison, the time needed by UPPAAL to obtain the same information with the dichotomy
procedure is 3553 seconds.
Also, the DAG shape of the state space allows us to implement any kind of CTL queries. For the
experiments, we used a query of the kind EF (p ∧ EGq), which is the negation of the "leads to"
operator p −−> ¬q (the only nested operator available in UPPAAL, in addition to deadlock tests)
and two of the kind EF (p ∧ EF q), which cannot be expressed in UPPAAL.
In [2], arrival C bef ore A −−> arrival B bef ore A) was used and reached a state invalid-
ing the property in 110 seconds. Its negation can be expressed here as EF (arrival C bef ore A∧
EG¬arrival B bef ore A) and our algorithm finds the state validating the property in about 10
seconds. The properties EF (ttc A B ≤ 1 ∧ EF arrival A bef ore C and EF (ttc A B ≤
1 ∧ EF arrival A bef ore B), that cannot be checked in UPPAAL, can be expressed here. The
first one expresses the possibility for vehicle A to arrive ahead of vehicle C after a dangerous
situation has occurred, involving a time to collision of less than 1 second. The second is similar
for vehicle A and B in the same conditions. The first query is false and needs to explore the
whole state space to give an answer (in 680 seconds), while the second one is true and finds a
state satisfying the property in about 10 seconds.
32
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
Finally, it is worth mentioning that discretisation is needed for UPPAAL, and therefore approxi-
mations may be mandatory in some cases, leading to a loss in precision and realism. In addition
to a better expressivity, the model checking process presented in this paper also ensures that no
approximation is needed, hence a higher level of realism is achieved.
8. Conclusion
We introduced G-MAPTs, multi-agent timed models where each agent is associated to a regular
timed schema upon which all possibles actions of the agent rely. The formalism allows to eas-
ily model systems featuring a high level of concurrency between actions, where actions are not
temporally deterministic, such as the CAVs. We have then formalised MAPTs (Multi-Agent with
timed Periodic Tasks), by soundly constraining G-MAPT ones. MAPTs allows for an acceler-
ated semantics which is an abstraction that greatly reduces the size of the state space by reducing
as much as possible the number of time passings in the system. We also presented how to extract
a layered structure out of a MAPT, that allows to detect diamonds while exploring the system
depth first. We provided a translation from G-MAPT to high level Petri nets, which allowed us
to implement a dedicated checking environment for this formalism with the (free) academic tool
ZINC. Algorithms implemented in such environments explore state spaces dynamically and can
be used together with heuristics that allow to reduce the computation time needed to reach some
states in the model. Finally, experiments highlighted the efficiency of our abstractions, and a com-
parison of model checking CAVs systems with the framework VERIFCAR has been performed.
Although our checking environment does not return traces of executions and is not better for full
exploration times than the state of art tool UPPAAL used in VERIFCAR, it has a better expressiv-
ity both on the model, since we can compute with non-integer numbers, and on the queries since
nested CTL ones can be checked. The heuristics performed well for reachability problems and
we also provided an exploration algorithm that allows to gather all information needed to analyse
the system in one run, which greatly decreased the time needed to gather the same amount of
information when using VERIFCAR. Although we developed this method with the case study of
autonomous vehicles in mind, this formalism and all the abstractions and algorithms presented in
this paper can be easily applied to any multi-agent real time systems where agents adopt a cyclic
behaviour, such as mobile robots completing cyclically tasks according to their own objectives,
flying drone squadrons, etc.
References
[1] R. Alur and D. Dill. Automata for modelling real-time systems.
In Proceedings of the
International Colloquium on Automata, Languages and Programming (ICALP'90), volume
443 of LNCS, pages 322 -- 335. Springer-Verlag, 1990.
[2] Johan Arcile, Raymond Devillers, and Hanna Klaudel. Verifcar: a framework for modeling
and model checking communicating autonomous vehicles. Autonomous Agents and Multi-
Agent Systems, 33(3):353 -- 381, May 2019.
[3] Armin Biere, Alessandro Cimatti, Edmund M Clarke, Ofer Strichman, Yunshan Zhu, et al.
Bounded model checking. Advances in computers, 58(11):117 -- 148, 2003.
[4] Edmund Clarke, Armin Biere, Richard Raimi, and Yunshan Zhu. Bounded model checking
using satisfiability solving. Formal Methods in System Design, 19(1):7 -- 34, Jul 2001.
J. Arcile, R. Devillers, H. Klaudel / Dynamic exploration of MAS with timed periodic tasks
33
[5] Kurt Jensen. Coloured Petri Nets - Basic Concepts, Analysis Methods and Practical Use -
Volume 1. EATCS Monographs on TCS. Springer, 1992.
[6] S. Kong, S. Gao, W. Chen, and E. Clarke. dreach: δ-reachability analysis for hybrid systems.
In Christel Baier and Cesare Tinelli, editors, Tools and Algorithms for the Construction and
Analysis of Systems, pages 200 -- 205, Berlin, Heidelberg, 2015. Springer Berlin Heidelberg.
[7] Kim G. Larsen, Paul Pettersson, and Wang Yi. Uppaal in a nutshell. International Journal
on Software Tools for Technology Transfer (STTT), 1(1-2):134 -- 152, Oct 1997.
[8] M. O'Kelly, H. Abbas, and R. Mangharam. APEX : Autonomous vehicle plan verification
and execution. In SAE World Congress, 2016.
[9] James L. Peterson. Petri Net Theory and the Modelling of Systems. Prentice Hall, 1981.
[10] A. Platzer and J.-D. Quesel. European train control system: A case study in formal ver-
In Karin Breitman and Ana Cavalcanti, editors, Formal Methods and Software
ification.
Engineering, pages 246 -- 265, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.
[11] Franck Pommereau. ZINC: a compiler for "any language"-coloured Petri nets. Technical
report, IBISC, university of Evry / Paris-Saclay, 2018.
[12] M. M. Quottrup, T. Bak, and R. I. Zamanabadi. Multi-robot planning : a timed automata ap-
proach. In IEEE International Conference on Robotics and Automation, 2004. Proceedings.
ICRA '04. 2004, volume 5, pages 4417 -- 4422 Vol.5, April 2004.
[13] Maria Sorea. Bounded model checking for timed automata. Electronic Notes in Theoretical
Computer Science, 68(5):116 -- 134, 2003.
[14] Uppaal. http://www.uppaal.org/.
|
1903.01365 | 1 | 1903 | 2019-03-04T17:05:38 | Microscopic Traffic Simulation by Cooperative Multi-agent Deep Reinforcement Learning | [
"cs.MA",
"cs.AI",
"cs.LG"
] | Expert human drivers perform actions relying on traffic laws and their previous experience. While traffic laws are easily embedded into an artificial brain, modeling human complex behaviors which come from past experience is a more challenging task. One of these behaviors is the capability of communicating intentions and negotiating the right of way through driving actions, as when a driver is entering a crowded roundabout and observes other cars movements to guess the best time to merge in. In addition, each driver has its own unique driving style, which is conditioned by both its personal characteristics, such as age and quality of sight, and external factors, such as being late or in a bad mood. For these reasons, the interaction between different drivers is not trivial to simulate in a realistic manner. In this paper, this problem is addressed by developing a microscopic simulator using a Deep Reinforcement Learning Algorithm based on a combination of visual frames, representing the perception around the vehicle, and a vector of numerical parameters. In particular, the algorithm called Asynchronous Advantage Actor-Critic has been extended to a multi-agent scenario in which every agent needs to learn to interact with other similar agents. Moreover, the model includes a novel architecture such that the driving style of each vehicle is adjustable by tuning some of its input parameters, permitting to simulate drivers with different levels of aggressiveness and desired cruising speeds. | cs.MA | cs | Microscopic Traffic Simulation by
Cooperative Multi-agent Deep Reinforcement Learning
Giulio Bacchiani
VisLab - University of Parma
Parma, Italy
[email protected]
Daniele Molinari
VisLab
Parma, Italy
[email protected]
Marco Patander
VisLab
Parma, Italy
[email protected]
9
1
0
2
r
a
M
4
]
A
M
.
s
c
[
1
v
5
6
3
1
0
.
3
0
9
1
:
v
i
X
r
a
ABSTRACT
Expert human drivers perform actions relying on traffic laws and
their previous experience. While traffic laws are easily embedded
into an artificial brain, modeling human complex behaviors which
come from past experience is a more challenging task. One of these
behaviors is the capability of communicating intentions and nego-
tiating the right of way through driving actions, as when a driver is
entering a crowded roundabout and observes other cars movements
to guess the best time to merge in. In addition, each driver has its
own unique driving style, which is conditioned by both its personal
characteristics, such as age and quality of sight, and external fac-
tors, such as being late or in a bad mood. For these reasons, the
interaction between different drivers is not trivial to simulate in a
realistic manner. In this paper, this problem is addressed by devel-
oping a microscopic simulator using a Deep Reinforcement Learning
Algorithm based on a combination of visual frames, representing
the perception around the vehicle, and a vector of numerical param-
eters. In particular, the algorithm called Asynchronous Advantage
Actor-Critic has been extended to a multi-agent scenario in which
every agent needs to learn to interact with other similar agents.
Moreover, the model includes a novel architecture such that the
driving style of each vehicle is adjustable by tuning some of its in-
put parameters, permitting to simulate drivers with different levels
of aggressiveness and desired cruising speeds.
1 INTRODUCTION
The development of autonomous vehicles is a topic of great inter-
est in recent years, gaining more and more attention both from
academy and industry. An interesting challenge is teaching the
autonomous car to interact and thus implicitly communicate with
human drivers about the execution of particular maneuvers, such
as entering a roundabout or an intersection. This is a mandatory re-
quest since the introduction of self-driving cars onto public roads is
going to be gradual, hence human- and self-driving vehicles have to
cohabit the same spaces. In addition, it would be desirable that this
communication would resembles the one which takes place every
day on the streets between human beings, so that human drivers
does not need to care if the other vehicles are autonomous or not.
Achieving this goal would improve the efficiency in traffic scenarios
with both artificial and human players, as studied in [9] in case of
vehicle-pedestrian negotiation, as well as increase people's trust
in autonomous vehicles. We believe that seeing self-driving cars
hesitating and interpreting the situation, as human usually do to
negotiate, would help in breaking the diffidence of the community
and support a seamless integration in regular traffic.
Typical solutions ([28], [4]) for handling those particular maneu-
vers consist on rule-based methods which use some notion of the
time-to-collision ([29]), so that they will be executed only if there is
enough time in the worst case scenario. These solutions lead to ex-
cessively cautious behaviors due to the lack of interpretation of the
situation, and suggested the use of machine learning approaches,
such as Partially Observable Markov Decision Processes ([17]) or
Deep Learning techniques ([12]), in order to infer intentions of
other drivers. However, training machine learning algorithms of
this kind typically requires simulated environments, and so the
behavioral simulation of other drivers plays an important role.
Popular microscopic traffic simulators, such as Vissim [6] and
Sumo [13], use specific hard-coded rules to control vehicles dy-
namic based on common traffic laws. For example, in uncontrolled
intersections where vehicles have to give way to traffic on the right,
each vehicle will wait the freeing of the right lane before entering
the intersection. At the same time, a vehicle will yield to all cars
within a roundabout before entering.
Even if this conduct seems normal, the capability of negotia-
tion between vehicles is missing: an artificial driver will not try to
convince other cars of letting it squeeze in, or it will wait forever
if another vehicle with the right of way is yielding. In a nutshell,
simulated vehicles are not able to break the behavioral rules, a thing
that men and women usually do in normal driving scenarios.
Recent advances in machine learning suggest the use of Deep
Neural Networks ([7]) to achieve complex behaviors, inducing the
agent to learn from representations instead of manually writing
rules. In particular, the use of Reinforcement Learning (RL, [25])
techniques to train such agents appears to be a proficient path ([20]).
RL deals with how an agent should act in a given environment
in order to maximize the expected cumulative sum of rewards it
will receives, with the idea of behaving optimally in the long run
instead of chasing the highest immediate reward. This framework
is appealing because it does not need explicit supervision at every
decision instant, but the agent learns through a scalar reward signal
that reflects the overall result of the actions taken. This reward can
also be given once it is known if the whole series of actions led to
a good or bad result, like when the car succeed in completing the
maneuver or it collides with another vehicle.
A well-known downside of Deep Learning is that it is data-
hungry ([10]), namely many examples are needed to robustly train
the model. Moreover RL requires both positive and negative experi-
ences, making it unsuitable to be used in real world where negative
experiences are generally very expensive to get. These two limita-
tions make the use of a synthetic environment fundamental when
using Deep Reinforcement Learning (DRL).
The aim of this work is to develop a microscopic traffic simu-
lator in which vehicles are endowed with interaction capabilities.
This simulator has been thought to be used to train modules able
to perform high-level maneuvers with implicit negotiation skills;
however it may turn useful for traffic safety and flow analyses as
well. Longitudinal accelerations of each vehicle are modeled by a
neural network.
Our contributions to reach the goal is twofold: firstly we extend
the Asynchronous Advantage Actor-Critic (A3C, [19]) to operate in
a multi-agent setting; secondly, we propose a novel architecture
which permits to modify the behavior of every agent, even if they
all share parameters of the same network as required by the A3C
scenario. Agents are collectively trained in a multi-agent fashion so
that cooperative behaviors can emerge, gradually inducing agents
to learn to interact with each other.
Each agent receives as input a sequence of images representing
the scene portions that can be seen at different times translated
as top views, taking a cue from the ATARI environment. Using a
visual input makes the system ready to be applicable to different
scenarios without the need of having a situation-dependent input.
However, this kind of input alone does not give the possibility of
differentiate the behavior between different drivers.
Because of that, the introduced architecture permits to incorpo-
rate the visual input with a vector of parameters, which are used to
tune the behavior of the driver. Indeed, every human has its own
peculiar way of driving affected by its temper and external factors
resulting in impatience or calmness depending on the situation:
let's think for this purpose on how we drive when we are in a hurry
or when we are carrying a baby to the kindergarten. Encapsulating
drivers with different styles inside the simulator makes the simu-
lation more realistic and would lead to the development of more
robust applications. Moreover, the parameter input can be used
to give additional details which are not perceivable from images,
such as the absolute speed of the agent, enriching the incoming
information to the network.
The proposed solution is evaluated on a synthetic single-lane
roundabout scenario shown in Figure 1b, but the same approach
can be adopted in other scenarios as well. The advantage of abstract
representations of this kind is their ease of reproduction with both
synthetic and real data, so that high-level maneuver modules trained
upon the simulator can be directly used in real world with little
effort. A similar approach has been taken concurrently to this work
in [1].
2 RELATED WORKS
Road users simulation is essential to the development of maneu-
ver decision making modules for automated vehicles. In [12] a
system able to enter in an intersection is trained while other vehi-
cles followed a deterministic model called Intelligent Driver Model
(IDM, [27]). In [16] a lane change maneuver module is learned us-
ing DRL in a scenario where other vehicles follow a simple lane
keeping behavior with collision avoidance, while in [14] they are
also able to overtake relying on hard-coded rules. In [22] both high
level (maneuver decision) and low level policies (acceleration and
braking) are learned for addressing an intersection in which other
vehicles behave aggressively following some preprogrammed rules.
(a) Real world
(b) Synthetic representation
(c) Navigable
(d) Obstacles
(e) Path
Figure 1: Synthetic representation of a real world scenario.
The top-view of the real scene depicted in (a) is translated
in the synthetic representation shown in (b). (c), (d) and (e)
are the semantic layers of the region inside the green square
used as visual input for the green agent.
In all these cases, vehicles populating the environment have a
similar conduct and their driving styles are undifferentiated, weak-
ening the realism of the environment.
In [11] the driving styles diversity is increased by assigning
randomly generated speed trajectories to the IDM model; in [17]
the behavior variation is enforced by adding a finite number of
motion intentions which can be adopted by the drivers.
However, none of the aforementioned works explicitly consider
agents with complex behaviors such as negotiation, since their
motion depends on some specific features, e.g. the distance from
the vehicle ahead.
Non-trivial vehicles' motion is obtained in [24] by imitation
learning ([2]) using data collected from human drivers; this solution
is clearly expensive and directed to a specific situation.
Having a visual input enhance the system capability of modeling
complex behaviors and makes it adaptable to a varieties of different
problems and road scenarios without the need of shaping the input
for each situation. This was initially proved in [20], where the
same algorithm, network architecture and hyperparameters were
used to learn how to play many different ATARI 2600 games. The
difficulty posed by the correlation between subsequent states in RL
was overcome by storing past experiences and updating the agent
with mini-batches of old and new examples, a mechanism called
experience replay.
The system has been improved in [19] increasing its time and
memory efficiency thanks to the parallel execution of multiple
agents in place of experience replay. In particular, we extended the
Asynchronous Advantage Actor Critic (A3C) so that it can operate in
a multi-agent scenarios where many agents are allowed to interact.
In [8] the algorithm called Trust Region Policy Optimization
(TRPO [23]) and A3C are extended to multi-agent systems where
all agents share parameters of a single policy and contribute to its
update simultaneously. In the same work this approach has been
evaluated for other two popular DRL algorithms, DQN and Deep
Deterministic Policy Gradient (DDPG [15]), which both rely on ex-
perience replay; the results were not satisfying, probably due to the
incompatibility between experience replay and the non-stationarity
of the system coming from the constantly changing policies of
agents populating the environment. This suggests that using paral-
lel actor-learners as in A3C has a stabilizing effect which holds in
case of a multi-agent setting, since it removes the dependency on
the experience replay mechanism. A different approach in case of
independent learners with no parameter sharing is taken in [18],
where the environment is made stationary by feeding the critic of
the DDPG algorithm at training time with actions and observations
of all agents.
Parameter sharing is appealing but forces the agents to behave
similarly. For this reason we coupled the visual input with some
parameters whose values influence the agent policy, inducing differ-
ent and tunable behaviors. The idea of mixing a high-dimensional
visual input and a low-dimensional stream was taken from [5], in
which the low-dimensional vector, called measurements, is used
to define the goal for the agent and to drive the setting toward
supervised learning by learning how actions modify future values
of the measurements. However, this solution fits those problems
that have a natural concept of relevant and observable set of mea-
surements (such as video-game playing), but fails on problems in
which only a sparse and delayed feedback is available. Hence, we
used the low-dimensional input just as an additional input, and
followed standard temporal-difference reinforcement learning for
training our agents.
3 BACKGROUND
3.1 Reinforcement Learning
In this work we used Reinforcement Learning methods applied to
the Markov Decision Process framework, in which an agent takes
actions at discrete time steps based on the state of the environment.
At every step the agent receives a reward signal together with the
new state of the updated environment, which is modified by both
its natural progress and the action of the agent itself. The reward
signal is generally a simple scalar value and has a central role in the
learning process, since it is the only way for the agent to evaluate its
actions. This introduces a well-known difficulty of RL: the feedback
is generally the result of many actions, possibly taken several steps
in the past.
Describing the process in mathematical terms, the action at time
t is represented by at and is taken from a discrete or continuous
range of actions referred to as A; the state at time t is represented
as st while the reward as rt . The goal of the agent is to learn
a policy π(as), namely the probability of taking action a given
the state s, in order to maximize the expectation of a function of
future rewards called return. The return is generally defined as
t rt + γrt +1 + ... + γT−t rT−t , where T is the terminal time
step and γ is a discount factor used to modulate the importance of
future rewards.
Rt =T
Useful for the estimation of a policy are the value functions.
The state-value function (1) of a policy π gives the expected return
when, starting from state s, the policy π is followed; the action-value
function (2), similarly, gives the expected return if we follow policy
π after taking action a in state s.
Vπ(st) = E(Rt st)
(1)
Qπ(st , at) = E(Rt st , at)
(2)
If the agent was able to find the optimal action-value function
Q∗(s, a), namely the action-value function of the best policy, the
problem would be solved since it could pick the best action from a
generic state st simply by choosing a∗ = maxa∈A Q∗(s, a).
Trying to estimate this function is the goal of those algorithms
which fall under the category of action-value methods such as Q-
learning ([30]). If we approximate Q∗(s, a) with a function q(s, a; θ)
modeled by the vector of parameters θ, in 1-step Q-learning the
parameters are updated as:
θt +1 = θt + α · K
∂q(st , at ; θt)
∂θt
(3)
K = rt + maxa∗q(st +1, a
where α is a parameter dependent on the optimization algorithm
while K tells if the approximated action-value function should be
increased or decreased around the pair {st , at } and is defined as:
(4)
It is worth noting that the target value rt +maxa∗q(st +1, a∗; θt) is an
estimate itself because it uses the estimated action-value function
of the next state as better approximation of the real optimal action-
value. This operation of learning "a guess from a guess" is called
bootstrapping.
∗; θt) − q(st , at ; θt)
A different approach is taken in policy-based methods, which
directly estimate the policy instead of a value function. In this cate-
gory falls the algorithm called Reinforce ([31]) in which parameters
are updated such that probabilities of actions that yielded a bet-
ter cumulative reward at the end of an episode are increased with
respect to the lower-return actions. Approximating the optimal
policy π∗(as) with a function π(as; θ), the updates are:
θt +1 = θt + α · Rt
∂ log π(as; θ)
∂θ
(5)
In this algorithm the updates can be computed only at the end of
an episode, since the true cumulative reward is needed.
Between action-value and policy-based methods there is an hy-
brid family of algorithms called actor-critic methods.
In this setting the policy is directly optimized as in policy-based
solutions; however, the value function is also estimated, giving two
benefits: firstly the value of a state is used to reduce the variance of
updates, as explained in [25]; furthermore the estimated state-value
function permits bootstrapping, thus avoiding the need to wait for
the end of an episode before performing a parameters update. The
probability of actions can now be modulated with the following
Advantage Ab instead of the full reward Rt :
Ab = rt + γrt +1 + ... + γ b−1rt +b−1 + v(st +b; θv) − v(st ; θv)
(6)
where b is the number of real rewards used before bootstrapping,
called bootstrapping interval.
Calling the approximated optimal policy π(as; θ π) and the state-
value function v(s; θv), the updates of this two functions can now
be defined as:
(7)
θ π
t +1 = θ π
t + απ · Ab
t + αv · Ab
∂ log π(as; θ π)
∂θ π
∂v(st ; θv)
∂θv
θv
t +1 = θv
(8)
If the bootstrapping interval b equals 1, only the reward following
an action is used to directly evaluate that action. This setting is
ideal in scenarios where the complete consequences of an action
are known immediately (e.g. face correctly recognized by a face
detection agent); however, it is not optimal in situation where the
reward is delayed (e.g. agent regulating the water level of a dam).
Increasing b, a longer series of rewards will be accumulated before
estimating the value function; in this way delayed rewards are
propagated faster but their merit is divided among all the actions
performed in the time window.
In the n-step actor critic algorithm used in A3C a mixed approach
is adopted. In this solution both long and short-term bootstrapping
take place: every n time-steps (or if a terminal state is reached) a se-
quence of updates like those in equations (7) and (8) are performed,
one for each time-step. In each update the longest possible series of
rewards is used for estimating the value of the state, ranging from
a 1-step to n-step updates. This process is shown in Algorithm 1.
(cid:40)0
Algorithm 1 n-step Advantage Actor Critic
1: initialize parameters θπ of π(as; θπ)
2: initialize parameters θv of V(as; θv)
3: t ← 1
4: while learninд is active do
5:
6:
7: while t − tlast_up < n and st is not terminal do
8:
9:
10:
11:
execute action at
get reward rt , state st +1
t ← t + 1
end while
get st
tlast_up = t
if st is terminal
12:
V(st ; θv) otherwise
R =
∆π = 0, ∆v = 0
for each i = t − 1, .., t − tlast_up do
R = ri + γr
∆π = ∆π + ∇θπ log π(aisi; θπ)(R − V(si; θv))
∆v = ∆v + ∇θv (R − V(si; θv))2
end for
get απ , αv from the optimization algorithm
θπ = θπ + απ · ∆π
θv = θv + αv · ∆v
13:
14:
15:
16:
17:
18:
19:
20:
21:
22: end while
3.2 Asynchronous Advantage Actor Critic -
A3C
A problem of using Deep Neural Networks as function approxima-
tors in RL is the correlation between updates that comes from the
sequentiality of data in the process.
This correlation was initially broken by using the so called expe-
rience replay ([20]): tuples {st , at , st +1, rt } were stored instead of
being used immediately, while the parameters updates were com-
puted using randomly sampled tuples from the replay buffer. In
this setting, updates are not based on sequential data anymore, but
the replay buffer makes the process expensive in terms of memory
occupation and it forces the use of old data.
An improved solution, adopted in [19], consists in running sev-
eral actor-critic agents in parallel, each one with its own copy of
the parameters of a global neural network. Every agent acts in a
different instance of the environment and sends its updates, com-
puted as in Algorithm 1, asynchronously from the other agents.
Since each agent is seeing a different environment configuration,
their updates are not correlated and contribute in augmenting the
stability of the process. A visual representation of this system is
shown in Figure 2a.
4 MICROSCOPIC TRAFFIC SIMULATION
4.1 Multi-agent A3C
In the normal A3C setting, multiple agents act in parallel in in-
dependent instances of the same environment. However, it is not
possible for them to learn the interaction with each other, since
each agent is sensing a state which is independent from that of the
others.
In order to make this interaction possible we let several agents
share the same playground, so that they will be able to sense each
other. For instance, let's consider agents a and b acting on the same
environment: a, by taking action aa
t at time step t based on policy
t ), could affect state sb
π(aa
t sa
t +1 of the agent b. If this happens, b will
t +1sb
t +1), potentially affecting
react accordingly taking action π(ab
in turn sa
t +2. Therefore, learning the optimal policy π for an agent
means taking into account not only how the environment is affected
by its actions, but also what behavior they induce to other agents.
In practice, this implies that agents have to wait that the oth-
ers took their actions before receiving the subsequent state. This
affects negatively the performance of the algorithm, since, due to
the asynchronous nature of the process, some of the agents could
be computing their updates, that is executing a time consuming
backpropagation. Moreover, this solution jeopardizes the stability
of the system because parameter updates of agents acting in the
same environment are not independent anymore. For this reason,
in multi-agent A3C we run several environment instances as in
traditional A3C, each one populated with several active agents.
Each agent accumulates updates every n frames, and sends them
to a global copy of the network only at the end of the episode
in order to reduce the synchronization burden, updating at the
same time its local copy with the updates coming from the other
agents. Since some of those agents are accumulating experience in
different environment instances, the correlation between updates is
diminished, making the process more stable. Algorithm 2 shows the
process of multi-agent A3C, whose visual representation is given
in Figure 2b.
In our experiment we set n = 20 and γ = 0.99; we used RMSProp
optimizer with a decay factor of α = 0.99 and initial learning rate
of 7e−4.
# executed concurrently
Algorithm 2 multi-agent n-step Advantage Actor Critic
д
д
π of π(as; θπ)
v of V(as; θv)
run naд threads concurrently
1: initialize parameters θ
2: initialize parameters θ
3: get nenv as the number of environment instances
4: get naд as the number of agents for each environment
5: run nenv environment instances concurrently
6: for each environment instance do
7:
8: end for
9: for each aдent a do
t ← 1
10:
11: while traininд is active do
д
π = θ
12:
π
д
v = θ
13:
v
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
get st
tlast_up = t
while t − tlast_up < n and st is not terminal do
execute action at from π(at st ; θ a
π)
wait other agents to finish their actions
get reward rt , state st +1
t ← t + 1
end while
copy parameters θ a
copy parameters θ a
∆a
π = 0, ∆a
while st is not terminal do
v = 0
(cid:40)0
if st is terminal
V(st , θ a
v) otherwise
R =
for each i = t − 1, .., t − tlast_up do
R = ri + γr
∆a
π = ∆a
∆a
v = ∆a
π log π(aisi; θ a
(R − V(asi; θ a
π + ∇θ a
v + ∇θ a
v
π)(R − V(asi; θ a
v))
v))2
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34: end for
end for
end while
д
π using ∆a
update θ
π
д
v using ∆a
update θ
v
end while
Depending on how the reward function is shaped, the learning
process may be cooperative or competitive ([26]). The former is the
way we followed to simulate behavior of road vehicles: a positive
reward is given to the artificial driver if it reaches its goal while a
negative reward is given to those drivers involved in a crash. Agents
are stimulated to reach their goals avoiding other agents, leading
to an implicit negotiation when the paths of different vehicles
intersect.
We think that this multi-agent learning setting is captivating
for many applications that require a simulation environment with
intelligent agents, because it learns the joint interactive behavior
eliminating the need for hand-designed behavioral rules.
4.2 Input architecture
Having a visual input organized as images is appealing since it frees
from the need of defining a case-specific design for each different
scenario. Moreover, it frees from the need of considering a fixed
amount of vehicles (as in [11]).
(a) Single-agent setting
(b) Multi-agent setting
Figure 2: Comparison between single and multi-agent A3C
settings. Red robots are learning agents acting in environ-
ment Ei, while blue robots are passive agents. Each ac-
tive agent owns a copy Lj of the global network, and it
contributes to its evolution by updates Uj. In (a) learning
agents play in an environment populated only by non-active
agents, while in (b) active agents can sense each other, allow-
ing them to learn how to interact.
However, this kind of input has a drawback: the convolutional
pipeline makes it not suitable for communicating numerical infor-
mation, such as the desired behavior for the agent or its precise
speed. Transferring this type of information is possible using fully-
connected layers, but it becomes inefficient to directly process
visual images by this mean. For this reason, we shaped our system
in order to have a mixed input, made of visual and numerical infor-
mation, which is processed by two different pipelines as elucidated
in Section 4.3.
4.2.1 Visual input. The agent may not be able to sense the whole
environment but just a portion of it, which we call its view. The
visual part of the input consists on a historical sequence of the v
most recent views seen from the agent. We set v = 4 as in [20]
making the estimation of relative speed and acceleration feasible.
Each view is divided in semantic layers separating information with
different origin. As explained in Section 5.1 we included semantic
layers related to the navigable space, the path the agent will follow
and obstacles around the vehicle; however, several other layers
could be added, such as the occluded area or the road markings, in
order to enrich the input information.
4.2.2 Numerical input. The numerical component permits the
augmentation of the input with information which are not directly
perceivable from the sequence of views, such as the absolute speed
of the agent or the exact distance which is still to be traveled to
reach the goal. This allows a better understanding of the scene,
i.e. a better estimation of the states value. More importantly, the
numerical input can be used to shape agents attitude by teaching it
a direct correlation between some of its tunable input and the to-be-
obtained reward. Practically, they can be used to partially perturb
the state of the agent at will. In this work we took advantage of
numerical input to the network for tuning the agent aggressiveness
and to suggest a desired cruising speed, as explained in Sections 5.4
and 5.5 respectively.
4.3 Network architecture
Because of the different nature of the two input streams, they are
initially processed by two different pipelines, aimed to produce two
feature vectors.
The image processing pipeline is constituted by two convolu-
tional and one fully connected layers, whereas the numerical input
vector is processed by two fully connected layers. Each pipeline
produces a feature vector as output. The two output vectors are
joined together before being handled by the last fully-connected
hidden layer. After every transformation a ReLU nonlinearity is
applied to the output.
The idea of this hybrid architecture has been inspired from [5], in
which an input made of a single image and two numerical vectors
is processed by a network built in a similar fashion.
The output of the last hidden layer is finally used for the actions
log-probabilities computation and the state-value estimation. The
network architecture is represented in Figure 3.
5 EXPERIMENT
The model explained in Section 4 has been used to simulate the
traffic of cars on a roundabout with three entries (Figure 1b), which
is a representation of an existing roundabout (Figure 1a) made with
the help of the Cairo graphics library ([21]).
Each vehicle populating the roundabout has its own path which
simply depends on a randomly assigned exit; the goal of the agent
is to reach the end of its exit lane. Furthermore, to each agent is
assigned a desired cruising speed consisting to the maximum speed
the agent is aiming for, which it should be reached and maintained
when caution is not needed; this speed will be called from now
on its target speed. A new vehicle with a random target speed is
spawned from an entry lane dependently on the positions of the
other cars, inducing different traffic conditions.
During the experiments the roundabout was populated by a
maximum of six vehicles such that no traffic jams were created,
thus making the effects of the agent's behavior tuning appreciable.
Figure 3: Architecture of the network. Visual input V and
numerical input N initially follow two different pipelines,
before being merged in a single vector, which is then used
to compute probabilities of actions and to estimate the value
of the state.
However, this framework can be used to simulate vehicles' behavior
even in high traffic conditions.
5.1 State space
As explained in Section 4.2 the input is made of two different
streams, a visual and a numerical one. The visual part is a rep-
resentation of the surrounding of the vehicle within a limited range
of 50x50 square meters converted to a sequence of images with
84x84 pixels. This input is made of several semantic layers, which
in this experiment are:
(1) Navigable space: the part of the space in which vehicles can
drive, generally given from the maps and shown in Figure 1c;
(2) Obstacles: made of all vehicles and obstacles seen from the
agent, including the agent himself; this information can be
obtained from the perception module of the self-driving
vehicle and it is shown in Figure 1d;
(3) Path: that shows to the agent its assigned path, and depends
on the choices of the high-level planner; this layer is shown
in Figure 1e.
The numerical part, on the other hand, consists of several scalar
values which contain both additional information about the scene
and clues to predict future rewards, which are used at test time to
modulate the agent behavior. In our instance the numerical input
is restricted to the following parameters:
(1) Agent speed.
(2) Target speed.
(3) Elapsed time ratio: ratio between the elapsed time from
the beginning of the episode and the time limit to reach the
goal.
(4) Distance to the goal: distance to be traveled before reach-
ing the goal.
The network architecture, together with the hyperparameters
used for the experiment, are shown in Figure 3.
5.2 Action space
The chosen action space is discrete and boils down to three actions:
accelerate, brake or maintain the same speed. We set comfortable
acceleration values, which are 1 m
s2 in case of positive acceleration
and −2 m
s2 in case of braking. The acceleration command will have
its effect only if the speed is under a maximum accepted value.
rt = rterminal + rdanдer + rspeed
zero only if t is a terminal state; it equals:
5.3 Reward shaping
The reward obtained from an agent is made of three main terms:
(9)
rterminal depends on how the episode ends, and so differs from
• +1: if the agent reaches its goal;
• −1: if the agent crashes against another agent;
• −1: if the available time expires.
• 0: if t is a non-terminal state.
rdanдer is a soft penalization given in situations which are to be
avoided, either because the agent made a dangerous maneuver or
because it broke some traffic laws. Calling dv the distance traveled
from the vehicle v in one second, rdanдer will be:
• −ky: if the agent fails to yield when entering the roundabout
to an already inserted vehicle v. This happens when the
agent crosses the region in front of v whose length is taken
equal to 3 · dv, as shown from the orange region in the
example of Figure 1b.
• −ks: if the agent a violates the safety distance with the ve-
hicle in front, unless the latter is entering the roundabout
and it is cutting in front of the agent. The safety distance in
this case is taken equal to da, and the associated region is
depicted in yellow in Figure 1b.
• 0: if none of the above occur.
rspeed is a positive reward which is maximized when the ac-
tual speed of the agent (sa) coincides with the target speed input
parameter (st ):
(cid:40) sa
· kp
rspeed =
st
kp − sa−st
st
· kn
if sa ≤ st
if sa > st
(10)
In our experiment we set ky = ks = 0.05, kp = 0.001, kn = 0.03.
5.4 Aggressiveness tuning
In the training phase, agents learn to increase their speed to reach
the goal within a time limit. This is possible because both time
left and remaining distance to be traveled are provided as input. It
was not possible to achieve this same behavior without using the
distance-to-the-goal input, highlighting the agent inability to realize
from images that increasing its speed the goal will be reached faster.
Nevertheless, things work well when this information is enforced
with the remaining distance, confirming the power of the visual-
numerical coupling.
This experience has been exploited at test time to vary the agent
aggressiveness by tuning its time and distance left at will, since it
is not needed anymore to limit the episode length. Doing this each
agent present in the simulator will have its own unique attitude,
resulting in a more heterogeneous scenario.
We explored scenarios in which the elapsed time ratio was re-
placed by an arbitrary real value in the [0, 1] interval, keeping the
distance to an imaginary goal fixed. Values close to 1 will induce
the agent to drive faster, in order to avoid the predicted negative
return for running out of time. For the same reason, values close
to 0 will tell the driver that it still has much time, and it is not a
problem to yield to other vehicles. This way, the elapsed time ratio
acts as an "aggressiveness level" for the agent.
An experiment has been set up in order to test the validity of this
approach. We populated the roundabout with six vehicles having
random aggressiveness levels, and we tested how an agent with
a fixed known aggressiveness behaves by letting it play several
episodes. We registered two different parameters as feedback of
each driver style: the ratio of positive ending episodes, in which the
agent reaches the goal, and its average speed. Results are shown in
the graph of Figure 4a. It is clearly visible that, by increasing the
aggressiveness level, the driver behavior will shift towards a more
risky configuration, since both average speed and probability of
accidents grow. Moreover, it is interesting to see that values of ag-
gressiveness outside the training interval [0, 1] produce consistent
consequences to the agent conduct, intensifying its behavior even
further.
5.5 Target speed tuning
The rspeed reward term, presented in Section 5.3, increases until
the speed of the agent gets closer to its target speed, and it starts
to diminish for agent speeds above the desired one. At training
time, agents were assigned a random target speed for every episode,
taken from a uniform distribution between [5, 8] m
s , inducing them
to learn to not surpass that tunable value and so simulating drivers
with different desired speeds. Agents can still decide to surpass
their target speed if this will bring advantages, such as stopping
the insertion of another vehicle by a particular aggressive driver.
To evaluate how the dedicated input affects the behavior of the
agent we let several agents, having different target speed values
but equal aggressiveness levels of 0.5, to play several runs in sce-
narios similar to the one used to test the aggressiveness tuning in
Section 5.4.
The graph with the results, given in Figure 4b, shows that an
increment on the agent target speed leads to an higher average
speed, without affecting negatively the positive ending ratio. Even
in this case, values of the target speed outside the training range
[5, 8] induce consistent agent behaviors.
5.6 Environment settings comparisons
We compared agents trained with 1 and 4 environment instances
in a simplified case in which the target speed given to the agent
cannot be exceeded (once reached the target speed the accelerate
command has no effect), in order to speed up learning for compari-
son purposes. We tested both with and without action repeat of 4
([20]), that is repeating the last action for the following 4 frames
(repeated actions are not used for computing the updates). It has
been proved that in some cases action repeat improves learning
([3]) by increasing the capability to learn associations between tem-
porally distant state-action pairs, giving to actions more time to
affect the state.
(a) aggressiveness test
//
(b) speed test
Figure 4: Effect of aggressiveness (a) and target speed (b)
levels variation on the agent behavior. Blue plots show the
agent positive-ending episodes ratio while the red plots its
average speed. Dashed lines refer to an agent whose action
are repeated for 4 times while solid lines to an agent free to
choose actions at every time step. Each data point is obtained
averaging over 5000 episodes.
The learning curves, shown in Figure 5, tell that, when using the
action repeat technique, training the system with multiple instances
stabilizes learning and leads to a better overall performance, even if
in both cases the model converges. This confirms that reducing the
correlation between updates brings a positive effect. It is interesting
to note that in the multi-instance scenario agents start to improve
their ability to reach the goal at a later stage but with a faster pace.
Our explanation for this behavior is that, when running several
environment instances, a higher rate of asynchronous updates com-
ing from pseudo-random policies makes learning more problematic.
Indeed, during the length of an episode, the local policy of the agent
for which the updates are computed remains fixed, while the global
policy receives asynchronous updates from several other agents
whose behavior is still infant. However, when the policies of agents
start to gain sense, their updates will be directed strongly toward a
common goal due to a reduced search space.
Nonetheless, things change when action are not repeated. Indeed,
while the model still converges when using a single environment
instance, agents are not able to learn successfully when adopting
(a) 1 instance, yes action repeat
(b) 4 instances, yes action repeat
(c) 1 instance, no action repeat
(d) 4 instances, no action repeat
Figure 5: Learning comparison between systems trained
with single or multiple environment instances, with or with-
out action repeat.
the multi-instance setting, making the stabilizing effect of action
repetition necessary.
However, the use of repeated actions brings a drawback, that is
to diminish the rate at which agents interact with the environment.
Indeed our empirical results, given in the graphs of Figure 4, show
that the positive episode ratio at test time increases if actions are
not repeated, even if the model was trained with action repetition.
In this way it is possible to take advantage of the stabilizing effect
of action repetition, without loosing the chance of a finer action
selection resolution.
6 CONCLUSION
We presented an architecture able to model the longitudinal behav-
ior of vehicles on a synthetic road scenario by using a multi-agent
version of the A3C algorithm. This solution allows simulating road
traffic without the need of specifying hand crafted behaviors for
vehicles or collecting real data.
Agents populating the simulator sense the surrounding by a
visual input made of a sequence of images representing different
semantic information across the last time steps. The proposed ar-
chitecture gives also the possibility to simulate the uniqueness of
each real human driver by coupling a series of scalar parameters to
the visual one. We exploited this feature so that aggressiveness and
desired cruising speed of each driver can be regulated.
Even if our framework is able to deal with generic junction
shapes, we focused our tests on a specific scenario consisting of a
single-lane roundabout with three entries: it would be interesting
to see how well the system is able to generalize to different junction
topologies for application in which these information are not known
a priori. Moreover, it would be intriguing to extend the architecture
in order to include lateral behaviors of vehicles in the simulation.
It is worth to mention, as can be seen in the previous graphs, that
the proposed simulator is not collision free, but it reaches success
−0.200.20.40.60.811.251.51.7520.70.750.80.850.90.951Aggressivenesspositiveepisodesratio4.24.655.45.86.26.677.4averagespeed[ms]p.e.ratioavgspeedp.e.ratiowitha.r.avg.speedwitha.r.4.555.566.577.588.50.70.750.80.850.90.951Targetspeedpositiveepisodesratio4.24.655.45.86.26.677.4averagespeed[ms]p.e.ratioavgspeedp.e.ratiowitha.r.avgspeedwitha.r. 0 0.2 0.4 0.6 0.8 1 0 50000 100000 150000 200000positive episodes ratioEpisode 0 0.2 0.4 0.6 0.8 1 0 50000 100000 150000 200000positive episodes ratioEpisode 0 0.2 0.4 0.6 0.8 1 0 50000 100000 150000 200000positive episodes ratioEpisode 0 0.2 0.4 0.6 0.8 1 0 50000 100000 150000 200000positive episodes ratioEpisoderatios close to 1 when a safe driving is set. Even though a collision-
free simulator could be desirable for some applications, the aim of
this work was to simulate real driving scenarios in which errors
and accidents happen: modeling them in the simulator may lead to
the development of more robust high-level maneuver modules.
The time needed to train the model is not negligible and can
reach several days in a desktop computer. The main issue is that
before proceeding to the subsequent time step, all the agents acting
in the same environment instance need to have taken their actions:
since some of them might be computing gradients, the overall per-
formance decreases. Future works can be directed toward the design
of a more efficient network architecture, as well as the development
of a learning setting in which the gradient computations of all the
agents in the same instance are executed simultaneously.
7 ACKNOWLEDGMENTS
We are grateful to the reviewers for their precious advices. Thanks
also to Claudio, Roberto and Alessandra for their suggestions.
REFERENCES
[1] Mayank Bansal, Alex Krizhevsky, and Abhijit S. Ogale. 2018. ChauffeurNet:
(2018).
Learning to Drive by Imitating the Best and Synthesizing the Worst.
arXiv:1812.03079
[2] Mariusz Bojarski et al. 2016. End to End Learning for Self-Driving Cars. (2016).
arXiv:1604.07316
[3] Alex Braylan et al. 2015. Frame Skip Is a Powerful Parameter for Learning to
Play Atari. In AAAI-15 Workshop on Learning for General Competency in Video
Games.
[4] Akansel Cosgun et al. 2017. Towards Full Automated Drive in Urban Environ-
ments: A Demonstration in GoMentum Station, California. abs/1705.01187 (2017).
arXiv:1705.01187
[5] Alexey Dosovitskiy and Vladlen Koltun. 2017. Learning to Act by Predicting the
Future. In International Conference on Learning Representations (ICLR).
[6] Vortisch P. Fellendorf M. [n. d.]. Microscopic Traffic Flow Simulator VISSIM. In
Fundamentals of Traffic Simulation, Jaume Barcelò (Ed.).
[7] Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT
Press. http://www.deeplearningbook.org.
[8] Jayesh K. Gupta, Maxim Egorov, and Mykel Kochenderfer. 2017. Cooperative
Multi-agent Control Using Deep Reinforcement Learning. In Autonomous Agents
and Multiagent Systems. 66 -- 83.
[9] S. Gupta, M. Vasardani, and S. Winter. 2018. Negotiation Between Vehicles and
Pedestrians for the Right of Way at Intersections. IEEE Transactions on Intelligent
Transportation Systems (2018), 1 -- 12.
[10] Alon Halevy, Peter Norvig, and Fernando Pereira. 2009. The Unreasonable
Effectiveness of Data. IEEE Intelligent Systems 24 (2009), 8 -- 12.
[11] Carl-Johan Hoel, Krister Wolff, and Leo Laine. 2018. Automated Speed and
(2018).
Lane Change Decision Making using Deep Reinforcement Learning.
arXiv:1803.10056
[12] David Isele, Akansel Cosgun, Kaushik Subramanian, and Kikuo Fujimura. 2017.
Navigating Occluded Intersections with Autonomous Vehicles using Deep Rein-
forcement Learning. (2017). arXiv:1705.01196
[13] Daniel Krajzewicz, Georg Hertkorn, Christian Feld, and Peter Wagner. 2002.
SUMO (Simulation of Urban MObility); An open-source traffic simulation. In 4th
Middle East Symposium on Simulation and Modelling (MESM2002). 183 -- 187.
[14] X. Li, X. Xu, and L. Zuo. 2015. Reinforcement learning based overtaking decision-
making for highway autonomous driving. In International Conference on Intelli-
gent Control and Information Processing (ICICIP). 336 -- 342.
[15] Timothy P. Lillicrap, Jonathan J. Hunt, Alexander Pritzel, Nicolas Heess, Tom
Erez, Yuval Tassa, David Silver, and Daan Wierstra. 2015. Continuous control
with deep reinforcement learning. (2015). arXiv:1509.02971
[16] Jingchu Liu, Pengfei Hou, Lisen Mu, Yinan Yu, and Chang Huang. 2018. Elements
of Effective Deep Reinforcement Learning towards Tactical Driving Decision
Making. (2018). arXiv:1802.00332
[17] W. Liu, S. Kim, S. Pendleton, and M. H. Ang. 2015. Situation-aware decision
making for autonomous driving on urban road using online POMDP. In IEEE
Intelligent Vehicles Symposium (IV). 1126 -- 1133.
[18] Ryan Lowe et al. 2017. Multi-Agent Actor-Critic for Mixed Cooperative-
Competitive Environments. (2017). arXiv:1706.02275
[19] Volodymyr Mnih, Adrià Puigdomènech Badia, Mehdi Mirza, Alex Graves, Timo-
thy P. Lillicrap, Tim Harley, David Silver, and Koray Kavukcuoglu. 2016. Asyn-
chronous Methods for Deep Reinforcement Learning. In Proceedings of the 33nd
International Conference on Machine Learning (ICML). 1928 -- 1937.
[20] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, et al. 2015. Human-level
control through deep reinforcement learning. Nature 518, 7540 (Feb. 2015), 529 --
533.
[21] Keith Packard and Carl Worth. 2003 -- 2018. Cairo graphics library. https://www.
cairographics.org/. (2003 -- 2018).
[22] Chris Paxton, Vasumathi Raman, Gregory D. Hager, and Marin Kobilarov. 2017.
Combining neural networks and tree search for task and motion planning in
challenging environments. In IEEE/RSJ International Conference on Intelligent
Robots and Systems (IROS), Vol. 2017-September. 6059 -- 6066.
[23] John Schulman, Sergey Levine, Philipp Moritz, Michael I. Jordan, and Pieter
Abbeel. 2015. Trust Region Policy Optimization. In International Conference on
Machine Learning (ICML).
[24] Shai Shalev-Shwartz, Shaked Shammah, and Amnon Shashua. 2016.
Multi-Agent, Reinforcement Learning for Autonomous Driving.
arXiv:1610.03295
[25] Richard S. Sutton and Andrew G. Barto. 2018. Reinforcement Learning: An Intro-
Safe,
(2016).
duction. MIT Press.
[26] Ardi Tampuu et al. 2015. Multiagent Cooperation and Competition with Deep
Reinforcement Learning. (2015). arXiv:1511.08779
[27] M Treiber, A Hennecke, and D Helbing. 2000. Congested Traffic States in Empiri-
cal Observations and Microscopic Simulations. Phys. Rev. E 62 (2000), 1805 -- 1824.
[28] Chris Urmson et al. 2008. Autonomous Driving in Urban Environments: Boss
and the Urban Challenge. J. Field Robot. 25, 8 (Aug. 2008), 425 -- 466.
[29] Richard van der Horst and Jeroen Hogema. 1994. Time-To-Collision and Collision
Avoidance Systems. In 6th ICTCT workshop.
[30] Christopher John Cornish Hellaby Watkins. 1989. Learning from Delayed Rewards.
Ph.D. Dissertation. King's College, Cambridge, UK.
[31] Ronald J. Williams. 1992. Simple Statistical Gradient-Following Algorithms for
Connectionist Reinforcement Learning. Mach. Learn. 8, 3-4 (May 1992), 229 -- 256.
|
1712.07887 | 1 | 1712 | 2017-12-21T11:41:13 | Multiagent-based Participatory Urban Simulation through Inverse Reinforcement Learning | [
"cs.MA",
"cs.AI"
] | The multiagent-based participatory simulation features prominently in urban planning as the acquired model is considered as the hybrid system of the domain and the local knowledge. However, the key problem of generating realistic agents for particular social phenomena invariably remains. The existing models have attempted to dictate the factors involving human behavior, which appeared to be intractable. In this paper, Inverse Reinforcement Learning (IRL) is introduced to address this problem. IRL is developed for computational modeling of human behavior and has achieved great successes in robotics, psychology and machine learning. The possibilities presented by this new style of modeling are drawn out as conclusions, and the relative challenges with this modeling are highlighted. | cs.MA | cs | Multiagent-based Participatory Urban Simulation through
Inverse Reinforcement Learning
Soma Suzuki
Center for Advanced Spatial Analysis
University College London
Abstract
The multiagent-based participatory simulation
features prominently in urban planning as the
acquired model is considered as the hybrid
system of the domain and the local
knowledge. However, the key problem of
generating realistic agents for particular social
phenomena invariably remains. The existing
models have attempted to dictate the factors
involving human behavior, which appeared to
be intractable. In this paper, Inverse
Reinforcement Learning (IRL) is introduced
to address this problem. IRL is developed for
computational modeling of human behavior
and has achieved great successes in robotics,
psychology and machine learning. The
possibilities presented by this new style of
modeling are drawn out as conclusions, and
the relative challenges with this modeling are
highlighted.
I. Introduction
Urban modeling is traditionally seen as
rational and technical (Sager 1999), thus
leading to massive failures in urban planning
(Jacobs 1961). To interpret knowledge of
local context (McCall 2003), participatory
simulation has been studied intensively, by
allowing experts and non-experts to
interactively define the model (Drogoul,
In
Vanbergue and Meurisse 2002).
conjunction with participatory simulation,
multi-agent human movement modeling has
garnered attention in that the model enables
bottom-up simulation which has the potential
to deemphasize the manipulative intrusion
(Epstein 1999). Even though it made great
progress, the limitation of the multi-agent
simulation in constructing highly realistic
agents has been the subject of much
discussion (Batty and Torrens 2001). The
incurred distrust in the simulation model has
always vexed urban planners and impeded
efficient urban planning. The constraints
mainly arise from the number of variables
that the agent needs to address since the
solution space quickly becomes intractable as
the number of parameters increases. A
promising approach for overcoming this
drawback is to learn preferences of humans
from the observed demonstration by inverting
a model of rational decision making given a
reward function (Russell and Norvig 1995).
This approach is known as Inverse
Reinforcement Learning (IRL) in Markov
Decision Process (MDP) (Ng and Russell
2000) in the machine learning community.
This paper attempts to address the limitation
of multi-agent participatory simulation when
replicating social phenomena. In section II,
the importance of participatory simulation is
discussed with a particular experiment in the
city of Kyoto. To demonstrate that IRL
creates another paradigm in urban simulation,
the contribution and the limitation of existing
theoretical models are examined in section
III. Then Markov Decision Process and
Inverse Reinforcement
Learning are
introduced in section IV with a specific
example of robot simulation to illustrate the
potential of IRL. Finally, the conclusion and
future work are discussed in section V.
II. Participatory Simulation
Significant planning difficulties result from
the estrangement between the stakeholder's
local knowledge and planner's technical
theory. With the participation of the
stakeholder in the process of urban planning,
more plausible solutions are expected to be
achieved. This is particularly true of multi-
agent urban simulation design. It is most
unlikely that a virtual agent merely based on
academic data reflects local knowledge.
Start
Define agent
Multi-agent simulation
Participatory Simulation
Refine agent
Multi-agent simulation
Output
Figure 1. Participatory design.
The recent rise of participatory urban
simulation has opened a new field of research
to address this problem, by enabling the
model to incorporate knowledge of both
experts and non-experts, through a role-
playing game or by being immersed in the
simulation as "human agent" (Edmonds
2000). The human agents interact with virtual
agents to gain the insight into the simulated
model. The brief process of participatory
urban modeling is illustrated in Figure 1
(Ishida, Nakajima, Murakami and Nakanishi
2007). The learning process of multiagent-
based participatory simulation consists of two
phases: the deductive agent design and
participatory agent design. At first, experts
generate agents based on the domain
knowledge and data. After validating the
model, the human agents are immersed in the
simulated environment and the participatory
simulation is performed. There is also an
extension of participatory simulation known
as argument experiment, where an experiment
is performed in real space by humans with a
multiagent virtual simulation. Take, for
instance, the augmented experiment has been
conducted in the city of Kyoto (Ishida,
Nakajima, Murakami and Nakanishi 2007).
Example: Augmented Experiment in Kyoto
To simulate disaster evacuation in Kyoto
station, a tracking system that navigates
passengers based on their current location
was deployed. Beyond the conventional
evacuation system in stations, which
announces route information from public
megaphones, the systems are intended to
instruct individuals via mobile phones. In the
augmented experiment, the pedestrians'
movements were captured using GPS trace.
Then, the real-time human movements were
projected onto avatars in virtual space. In
parallel with the real space experiment, a
multiagent-based simulation with a large
number of agents generated by domain theory
was conducted. Finally, the system instructed
the evacuees to evacuation destinations, with
a) two-dimensional map and b) three-
dimensional virtual spaces. Ten humans and
three thousand agents undertook the
experiment. Through the experiment, it turns
out that a map is an excellent method for
evacuee navigation. On the other hand, the
small and low-resolution images of three-
dimensional virtual spaces on mobiles phones
were not very effective.
By integrating the real world experiment and
virtual world experiment, the experiment is
augmented, enabling large-scale simulation
with the small number of subjects for
experiments. By incorporating theory based
agents and human-controlled agents,
multiagent-based participatory urban
simulation is expected to fill in the gap
between the refined academic theory and
practical domain knowledge, and an expected
consequence being that stakeholders are more
engaged in the planning process to achieve
more effective urban modeling.
III. Limitation on Agent Design
Models are, by definition, representation of a
simplification of the real world, and
consequently, any simulation models are
necessarily incomplete and partial (Batty and
Torrens 2001). However, they need to, of
course, achieve minimum plausibility to be
utilized in actual planning. There are two
issues that we should draw together to
illustrate the limitation of reproducing the real
world with traditional agent-based pedestrian
simulation. The first is the issue of the
complications that arise from the rule-based
models
intractable
mathematical operations. This leads to the
second issue of the impracticability of
validating all the plausible models against
data. The archetypal example of this is an
agent-based pedestrian model STREETS that
which
induce
Center for Advanced Spatial Analysis in
University College London developed
(Schelhorn, O'Sullivan, Haklay and Thurstain
1999).
Example: STREETS
In the simulated environment of STREETS,
the street network with various attractions
such as shops, offices and public buildings are
configured. Each pedestrian agent was
attributed two characters: socio-economic and
behavioral. Socio-economic characteristics
contribute to income and gender, which
define the locations that the agents are
intended to visit. Behavioral characteristics
dictate the detailed behavior of agents such as
speed, visual range, and fixation. The speed is
the maximum walking speed of the agent.
Visual range defines which elements in the
environment the agent will see. Fixation
relates to how consistent the agent is in the
pre-determined activity schedule upon
encountering the configured attraction.
Finally, various parameters are introduced to
determine the likelihood of following
distractions. a) The match of agent types and
building types. For instance, an agent who is
engaged in the activity of shopping is
assumed to enter into another shop during the
journey but is less likely to be attracted by the
office building. b) The attractiveness of the
building for a certain demographics. c) The
level of inconsistency of the agent, which is a
general behavioral characteristic defined as
fixation. This models the reality that some
people are more easily distracted than others.
Fixation interacts with the agent's internal
clock, which measures the time an agent is
supposed to stay in the system. As the
remaining time decreases, the agent becomes
more concentrated in completing the pre-
determined schedule.
Even though the STREETS is an interesting
approach toward modeling social phenomena
in the city and explains the pedestrian
movement to a certain level, the generated
simulation is not realistic enough to be used
in policy-making. First and most importantly,
pedestrians' activity schedule and the possible
deviation when finding the attractive building
is not, of course, based merely on their gender
and salary. A naive solution to replicating the
real world more plausibly is to use more
variables, or rules such as age, ethnicity and
household structures, with more detailed
parameters on the attractiveness of facilities.
However, the solution space explodes
enormously as the number of variables
increases, and there are almost infinite
numbers of factors involved in a pedestrian
activity and incorporating all the elements is
typically intractable. To make matters worse,
even supposing all the necessary variables are
described, there is no way that all the
elements of the model are validated. This
dilemma between the parsimony model and
complex system has been the chief limitation
of the agent-based pedestrian model in
practical applications, and a consequence of
this is that the simulation model is relegated
to non-policy contexts such as education, a
group discussion, learning from visualization
and even entertainment (Batty and Torrens
2001). Although those applications of the
model are very important, the original passion
of replicating the reality is seemingly lost.
IV. Inverse Reinforcement Learning
Instead of merely reacting to the environment,
the cognitive agents need to take actions
based on what they individually observe. In
this section, Inverse Reinforcement Learning
(IRL) and Markov Decision Process (MDP)
are briefly introduced as the potential use for
generating realistic and plausible pedestrian
agents.
Markov Decision Process
A finite MDP is a tuple (S, A,
where
Psa
, γ, R ),
S is a finite set of N states {
}.
sn
A is a set of K actions {
a1, a2,
…, }.
ak
s1, s2,
…,
is state transition probabilities upon
Psa
taking action a in state s.
γ
∈
R :
𝕊 × 𝔸 → ℝ
that depends on state and action.
[0,1] is the discount factor.
is the reward function
sn
:
a1, a2,
π* 𝕊 → 𝔸
The classical problem of MDP consists of
finding the optimal policy
which
selects the actions that maximize the expected
reward for every state.
Inverse Reinforcement Learning
Inverse Reinforcement Learning (IRL)
problem is to find the reward function from
an observed policy. More specifically, given a
finite space S = {
…, }, set of actions
s1, s2,
A = {
…, }, transition probabilities
ak
, a discount factor γ
[0,1] and a policy π
∈
Psa
, the goal of IRL is to find a reward
:
𝕊 → 𝔸
function such that π is an optimal policy
.
π*
When learning reward functions through IRL,
the ultimate objective is to guide an artificial
agent with the acquired reward function, and
a consequence being that the agent learns a
"good" policy or simply imitates the observed
behavior. IRL is a very promising approach in
generating pedestrian agents in the urban
environment as the current pervasiveness of
mobile devices allows us for the collection of
mobile location data such as GPS, Wi-Fi, or
RFID,
namely training data at an
unprecedented scale and granularity
(Mehrotra and Musolesi 2017).
The traditional agent-based pedestrian model
assumes, in a sense, that the reward function
is known: STREETS assumes that the
attractiveness, in other words, the reward of
each building, is fixed. However, it seems
evident that in examining human behavior the
reward function must be considered unknown
to be ascertained through inductive reasoning
(Ng and Russell 2000). As it is infeasible to
determine the relative weights of the factors
such as the desire for shortest path, avoidance
of crowded areas and movement with the
flow, IRL is a fundamental problem of the
agent-based pedestrian model. To give a clear
example, the successful application of IRL in
robot navigation is illustrated here.
Example: Robot Navigation with IRL
In the context of socially intelligent robot
navigation, a human-like walking pattern has
been investigated (Shiarlis, Messias and
Whiteson 2017). The experiments took place
in a simplified social environment where two
people are placed randomly in a room. The
purpose of the experiment is to find the
reward function that accounts for the
relationship between the placed people and
the navigation route. For example, if people
are facing each other, the robot should not
pass between them as they are likely engaged
in some activities such as conversation. In
contrast, if they are looking away from each
other, it might be better to navigate between
them if it yields the shortest path. With the
trajectory data of human demonstrator for
multiple initial and final points, the reward
function is learned and then deployed in the
robot. As a result, the robot demonstrated a
plausible and socially compliant path.
Learning socially intelligent navigation and
generating realistic pedestrians in urban
environments is intuitively equivalent in that
both processes address the problem of how
humans "would" behave. In light of the
success in robotics, it is not altogether
irrelevant to attempt anew to replicate
pedestrians in the city. Although IRL is a
promising approach for learning pedestrian
movement patterns, there are several
challenges that need to be addressed.
Furthermore, as the model does not need a
particular underlying theory, it could be
applied to scenarios where no theory has yet
been established and even possibly used to
develop new human behavior theory.
Pitfall in Inverse Reinforcement Learning
There are three conceivable issues for
generating pedestrian agents through IRL. As
a full description of the pitfalls of IRL is
beyond the scope of this paper, only the major
challenges are introduced briefly. a) As is
always the case with deductive models, a
quantitative evaluation is difficult since no
ground truth data is available. Instead, the
model is qualitatively validated. The plausible
validation method needs to be considered. b)
The other problem arises as the learned
reward functions do not necessarily explain
human preferences. People often deviate from
optimality (Evans, Stuhlmuller, and Goodman
2015). To illustrate, if an agent repeatedly
fails to choose preferred actions due to
cognitive bias or irrationality, the model
concludes that the agent does not prefer the
option at all. To illustrate, a number of people
smoke every day while intending to quit and
considering the action to be regrettable. c) In
addition, a major challenge in applying
reinforcement learning in the multiagent
model is how to manage the explosive
computational cost as the state-action space
grows exponentially with the number of
agents and the learning becomes prohibitively
slow. There are two possible approaches to
alleviate this drawback. Firstly, as known as
structural reinforcement learning, it is
possible to reduce the size of the state-action
space by supplying the model with the partial,
but fundamental pedestrian movements in the
form of connectivity graph structures (Hillier
1989). Secondly, by replacing the simulation
model with a fast statistical surrogate (also
called an emulator), the state-action space is
more efficiently explored, thus leading to less
expensive computation. To achieve this, one
needs to apply a dimension reduction
technique to the input space, as done for
Gaussian Process emulators for instance (Liu
and Guillas).
V. Conclusion
robotics,
In this paper, Inverse Reinforcement Learning
(IRL) is presented for designing multiagent-
based participatory urban simulation. This has
helped to demonstrate that the existing agent-
based urban modelings, although they are
declared as "agent-based", are invariably top-
down and tautological, being less informative
of real world, This is due, for the most part, to
the intractability of factors involving human
behavior, and to the wrong attempt to dictate
them. An interdisciplinary approach to spatial
analysis,
and computational
psychology is required to realize robust
simulation for efficient urban planning.
Through the immediate feedback from the
model that incorporates knowledge of experts
and non-experts, urban planning is expected
to be more nimble, responsive and effective.
More importantly, as qualitative validation is
not
in participatory urban
simulation, the acquired simulation result
needs to be qualitatively interpreted.
Consider, for example, that the pedestrian
simulation in the urban environment is
performed and a number of accidents have
occurred in the virtual environment. With the
lack of fear of death, participated stakeholders
would behave in a fundamentally different
way. To gain plausible insights into social
phenomena from participatory simulation, a
available
standardized validation method needs to be
established: subsequent examination on the
levels of reality participants experienced is
one of the possible analysis.
J.
M.
References
Sager, T. (1999) The rationality issue in land-
use planning. Journal of Management History
5.
Jacobs, J. (1961) The Death and Life of Great
American Cities.
McCall, M. (2003) Seeking good governance
in participatory-GIS. Habitat International 27
549-573.
Epstein,
(1999) Agent-Based
Computational Model and Generative Social
Science, Complexity, 4, 41-60.
Batty, M., & Torrens, P.M. (2001) Modeling
Complexity: The Limits to Prediction,
Working Paper 36, Centre for Advanced
Spatial Analysis, University College, London.
Russell, S., & Norvig, P. (1995) Artificial
Intelligence: A modern approach.
Ishida, T., & Nakajima, Y., & Murakami Y., &
Nakanishi, H. (2007) Augmented Experiment:
Participatory Design with Multiagent
Simulation, International Joint Conference on
Artificial Intelligence (IJCAI-07).
Schelhorn, T., & O'Sullivan, D., & Haklay,
M., & Thurstain, G. M. (1999) STREETS: An
Agent-Based Pedestrian Model, Working
Paper 9, Centre for Advanced Spatial
Analysis, University College, London.
Ng, A. Y., & Russell, S. J. (2000) Algorithms
for inverse reinforcement learning. Icml, 663–
670.
Shiarlis, K., & Messias, J., & Whiteson, S.
(2017) Rapidly Exploring Learning Trees.
Robotics and Automation (ICRA), 2017 IEEE
International Conference.
Drogoul, A., & Vanbergue, D., & Meurisse, T.
(2002) Multiagent-Based Simulation: Where
are the Agents? LNAI 2581, 1-15.
Evans, O., & Stuhlmuller, A., & Goodman, N.
D. (2016) Learning the Preferences of
Ignorant, Inconsistent Agents. Proceedings of
the 30th AAAI Conference on Artificial
Intelligence (AAAI-2016)
Mehrotra, A., & Musolesi, M. (2017).
Sensing and Modeling Human Behavior
Using Social Media and Mobile Data,
Comprehensive Geographic Information
Systems. 3, 313-319.
Hillier, B (1989) The architecture of the urban
object. Ekistics , 56, 5 - 21.
Liu, X., & Guillas, S. (2017). Dimension
reduction for Gaussian process emulation: an
application to the influence of bathymetry on
tsunami heights. SIAM/ASA Journal on
Uncertainty Quantification, 5(1), 787-812.
Edmonds, B. (2000) The use of models -
making MABS more informative. Moss, S.,
Davidson, P., eds.: Multi-Agent Based
Simulation 2000. Volume 1979 of Lecture
Notes in Artificial Intelligence. 15-32
|
1711.11181 | 4 | 1711 | 2019-03-04T17:03:27 | Strategic Topology Switching for Security-Part II: Detection & Switching Topologies | [
"cs.MA",
"math.OC"
] | This two-part paper considers strategic topology switching for security in the second-order multi-agent system. In Part II, we propose a strategy on switching topologies to detect zero-dynamics attack (ZDA), whose attack-starting time is allowed to be not the initial time. We first characterize the sufficient and necessary condition for detectability of ZDA, in terms of the network topologies to be switched to and the set of agents to be monitored. We then propose an attack detection algorithm based on the Luenberger observer, using the characterized detectability condition. Employing the strategy on switching times proposed in Part I and the strategy on switching topologies proposed here, a strategic topology-switching algorithm is derived. Its primary advantages are threefold: (i) in achieving consensus in the absence of attacks, the control protocol does not need velocity measurements and the algorithm has no constraint on the magnitudes of coupling weights; (ii) in tracking system in the absence of attacks, the Luenberger observer has no constraint on the magnitudes of observer gains and the number of monitored agents, i.e., only one monitored agent's output is sufficient; (iii) in detecting ZDA, the algorithm allows the defender to have no knowledge of the attack-starting time and the number of misbehaving agents (i.e., agents under attack). Simulations are provided to verify the effectiveness of the strategic topology-switching algorithm. | cs.MA | cs | Strategic Topology Switching for Security -- Part II:
Detection & Switching Topologies
Yanbing Mao, Emrah Akyol, and Ziang Zhang
1
9
1
0
2
r
a
M
4
]
A
M
.
s
c
[
4
v
1
8
1
1
1
.
1
1
7
1
:
v
i
X
r
a
Abstract -- This two-part paper considers strategic topology
switching for security in the second-order multi-agent system.
In Part II, we propose a strategy on switching topologies to
detect zero-dynamics attack (ZDA), whose attack-starting time
is allowed to be not the initial time. We first characterize the
sufficient and necessary condition for detectability of ZDA, in
terms of the network topologies to be switched to and the
set of agents to be monitored. We then propose an attack
detection algorithm based on the Luenberger observer, using
the characterized detectability condition. Employing the strategy
on switching times proposed in Part I [1] and the strategy on
switching topologies proposed here, a strategic topology-switching
algorithm is derived. Its primary advantages are threefold: (i)
in achieving consensus in the absence of attacks, the control
protocol does not need velocity measurements and the algorithm
has no constraint on the magnitudes of coupling weights; (ii)
in tracking system in the absence of attacks, the Luenberger
observer has no constraint on the magnitudes of observer gains
and the number of monitored agents, i.e., only one monitored
agent's output is sufficient; (iii) in detecting ZDA, the algorithm
allows the defender to have no knowledge of the attack-starting
time and the number of misbehaving agents (i.e., agents under
attack). Simulations are provided to verify the effectiveness of
the strategic topology-switching algorithm.
Index Terms -- Multi-agent system, strategic topology switching,
zero-dynamics attack, attack-starting time, attack detection.
I. INTRODUCTION
I N Part-I paper [1], the proposed simplified control protocol
under switching topology employs only relative positions
of agents, which is different from the well-studied control
protocols [2] -- [8]. The main objective of this two-part paper
is the strategic topology-switching algorithm for the second-
order multi-agent system under attack. The algorithm is based
on two strategies, one of which on switching times and the
other on switching topologies. The strategy on switching
times, as introduced in Part-I paper [1], enables the second-
order multi-agent system in the absence of attacks to reach the
second-order consensus. The strategy on switching topologies
proposed in this Part-II paper enables the strategic topology-
switching algorithm to detect stealthy attacks.
Security concerns regarding the networked systems pose
a formidable threat to their wide deployment, as highlighted
by the recent incidents including distributed denial-of-service
(DDOS) attack on Estonian web sites [9], Maroochy water
breach [10] and cyber attacks on smart grids [11]. The
"networked" aspect exacerbates the difficulty of securing these
Y. Mao, E. Akyol and Z. Zhang are with the Department of Electrical
and Computer Engineering, Binghamton University -- SUNY, Binghamton, NY,
13902 USA, (e-mail: {ymao3, eakyol, zhangzia}@binghamton.edu).
systems since centralized measurement (sensing) and control
are not feasible for such large-scale systems [12], and hence
require the development of decentralized approaches, which
are inherently prone to attacks. Particularly, a special class of
"stealthy" attacks, namely the "zero-dynamics attack" (ZDA),
poses a significant security challenge [13] -- [15]. The main
idea behind ZDA is to hide the attack signal in the null-
space of the state-space representation of the control system
so that it cannot be detected by applying conventional de-
tection methods on the observation signal (hence, the name
"stealthy"). The objective of such an attack can vary from
manipulating the controller to accept false data that would
yield the system towards a desired (e.g., unstable) state to
maliciously altering system dynamics (topology attack [16])
to affect system trajectory.
Recent research efforts have focused on variations of ZDA
for systems with distinct properties. For stochastic cyber-
physical systems, Park et al. [17] designed a robust ZDA,
where the attack-detection signal is guaranteed to stay be-
low a threshold over a finite horizon. In [18], Kim et al.
proposed a discretized ZDA for the sampled-date control
systems, where the attack-detection signal is constantly zero
at the sampling times. Another interesting line of research
pertains to developing defense strategies [12], [19] -- [22]. For
example, Jafarnejadsani et al. [14], [23] proposed a multi-rate
L1 adaptive controller which can detect ZDA in the sampled-
data control systems, by removing certain unstable zeros of
discrete-time systems [13], [15]. Back et al. [24] utilized
"generalized hold" to render the impact of bounded ZDA.
While developing defense strategies for the ZDAs in multi-
agent systems have recently gained interest [12], [19] -- [22]
(see Table I for a brief summary), the space of solutions is
yet to be thoroughly explored. The most prominent features
of prior work are that the conditions of detectable attack
have constrain the connectivity of network topology and
the number of the misbehaving agents (referred to agents
under attack) [12], [19] -- [21], and the corresponding developed
defense strategy for attack detection works effectively only in
situation where the number of misbehaving agents and the
attack-starting time being the initial time are known to the
defender [12], [19], [20], [22], [25], [26]. The main objective
of this work is to remove such constraints and unrealistic
assumptions by utilizing a new approach for attack detection:
intentional topology switching.
Recent experiment of stealthy false-data injection attacks
on networked control system [27] showed the changes in the
system dynamics could be utilized by defender to detect ZDA.
To have changes in the system dynamics, Teixeira et al. [25]
2
proposed a method of modifying output matrix through adding
and removing observed measurements, or modifying input
matrix through adding and removing actuators or perturbing
the control input matrix. But the defense strategy requires
the attack-starting times to be the initial time and known
to defender. In other words,
the defense strategy fails to
work if the attack-starting time is designed to be not the
initial
time and the defender has no such knowledge, as
is practically the case for most scenarios. In such realistic
scenario,
the system dynamics must have
dynamic changes, i.e., some parameters of system dynamics
changes infinitely over infinite time. However, before using the
dynamic changes to detect ZDA in such realistic situation, the
question that whether the dynamic changes in system dynamics
can destroy system stability in the absence of attacks? must
be investigated. If the dynamic changes can destroy system
stability in the absence of attacks, these changes could utilized
by adversary/attacker [28] -- [30].
to detect ZDA,
In recent several years, actively/strategically topology
switching has received significantly attention in the control
theory, network science and graph theory literatures, see
e.g., Amelkin and Singh [31] proposed edge recommenda-
tion to disable external influences of adversaries in social
networks (consensus-seeking social dynamics), while the cou-
pling weights are uncontrollable since they correspond to the
users' interpersonal appraisals; Mao and Akyol [32], [33]
showed that strategic (time-dependent) topology switching is
an effective method in detecting ZDA in the coupled harmonic
oscillators; Ciftcioglu et al. [30] studied dynamic topology
design in the adversary environment where the network de-
signer continually and strategically change network topology
to a denser state, while the adversary attempts to thwart the
defense strategy simultaneously.
Moreover, driven by recent developments in mobile com-
puting, wireless communication and sensing [34], it is more
feasible to set communication topology as a control vari-
able [35]. These motivate us to consider the method of
topology switching to induce changes in the dynamics of
multi-agent systems to detect ZDA. The strategy on switching
times proposed in Part-I paper [1] answers the question: when
the topology of network should switch such that the occurring
dynamic changes in system dynamics do not undermine the
agent's ability of reaching consensus in the absence of attacks.
Based on the work in Part-I paper [1], this Part-II paper focuses
on the strategy on switching topologies that addresses the
problem of switching to what topologies to detect ZDA.
The contribution of this paper is fourfold, which can be
summarized as follows.
• A ZDA variation is first studied, whose attack-starting
time can be not the initial time.
• We characterize the sufficient and necessary condition
for detectability of the ZDA variation under strategic
topology switching.
• We characterize the sufficient and necessary condition for
Luenberger observer in tracking real multi-agent system
in the absence of attacks, which has no constraint on the
number of monitored agents.
CONDITIONS ON DETECTABLE ATTACK
Table I
Reference
[19]
[20]
[12]
[21]
[22]
Conditions
connectivity is not smaller than 2K + 1
K is smaller than connectivity
size of input-output linking is smaller than K
the minimum vertex separator is larger than K + 1
single attack, i.e., K = 1
Dynamics
Discrete Time
Discrete Time
Continuous Time
Discrete Time
Continuous Time
• Based on the strategy on switching times and the strategy
on switching topologies, through employing Luenberger
observer, a strategic topology-switching algorithm for
attack detection is proposed. The advantages of the al-
gorithm are: i) in detecting ZDA, it allows the defender
to have no knowledge of misbehaving agents and the
attack-starting time; ii) in tracking real systems in the
absence of attacks, it has no constraint on the magnitudes
of observer gains and the number of monitored agents;
iii) in achieving the second-order consensus, it has no
constraint on the magnitudes of coupling weights, while
the control protocol does not need velocity measurements.
This paper is organized as follows. We present the pre-
liminaries and the problem formulation in Sections II and
III respectively. In Section IV, we characterize the condition
for detectability of ZDA. Based on this characterization, we
develop an attack detection algorithm in Section V. We provide
numerical simulation results in Section VI, and, in Section VII
we discuss the future research directions.
II. PRELIMINARIES
A. Notation
We use P < 0 to denote a negative definite matrix P . Rn
and Rm×n denote the set of n-dimensional real vectors and
the set of m × n-dimensional real matrices, respectively. Let
C denote the set of complex number. N represents the set of
the natural numbers and N0 = N ∪ {0}. Let 1n×n and 0n×n
be the n × n-dimensional identity matrix and zero matrix,
respectively. 1n ∈ Rn and 0n ∈ Rn denote the vector with all
ones and the vector with all zeros, respectively. The superscript
'⊤' stands for matrix transpose.
The interaction among n agents is modeled by an undirected
graph G = (V, E), where V = {1, 2, . . . , n} is the set of agents
and E ⊂ V × V is the set of edges. The weighted adjacency
matrix A = [aij] ∈ Rn×n is defined as aij = aji > 0 if
(i, j) ∈ E, and aij = aji = 0 otherwise. Assume that there
are no self-loops, i.e., for any i ∈ V, aii = 0. The Laplacian
matrix of an undirected graph G is defined as L = [lij ] ∈
Rn×n, where lii =
aij and lij = −aij for i 6= j.
nPj=1
Some important notations are highlighted as follows:
lcm(·) : operator of least common multiple among scalers;
ker (Q) : set {y : Qy = 0n, Q ∈ Rn×n};
A−1F
V :
V\K :
λi (M ) : ith eigenvalue of matrix M ∈ Rn×n;
S (r) :
µP (·) : matrix measure of induced P -norm;
set {y : Ay ∈ F};
cardinality (i.e., size) of the set V;
complement set of K with respect to V;
rth element of ordered set S;
Q :
set of rational numbers.
B. Attack Model
As a class of stealthy attacks, "zero-dynamics" attack is
hard to detect, identify, and then mitigate from a control theory
perspective [13] -- [15]. Before reviewing its attack policy, let
us first consider the following system:
z (t) = Az (t) ,
y (t) = Cz (t) ,
(1a)
(1b)
where z(t) ∈ R¯n and y(t) ∈ R ¯m denote system state and
monitored output, respectively; A ∈ R¯nׯn, C ∈ R ¯mׯn. Its
corresponding version under attack is described by
z (t) = Az (t) + Bg(t),
y (t) = C z (t) + Dg(t),
(2a)
(2b)
where g(t) ∈ R¯o is attack signal, B ∈ R¯nׯo and D ∈ R ¯mׯo.
The policy of ZDA with introduction of attack-starting time
is presented in the following definition, which is different from
the attack policies studied in [12], [19], [20], [22], [25], [26],
whose attack-starting times are the initial time.
Definition 1: The attack signal
(3)
0¯o,
t ∈ [0, ρ)
g(t) =(cid:26)geη(t−ρ), t ∈ [ρ,∞)
in system (2) is a zero-dynamics attack, if 0¯n 6= z(0)− z(0) ∈
R¯n, 0¯o 6= g(ρ) ∈ R¯o, ρ ≥ 0 and η ∈ C satisfy
z (0) − z (0) ∈ ker (O) , if ρ > 0
(cid:21) ∈ ker(cid:18)(cid:20) η1¯nׯn − A B
D(cid:21)(cid:19) ,
(cid:20) eAρ (z (0) − z (0))
(cid:0)CA¯n−1(cid:1)⊤ i⊤
O ,h C⊤ (CA)⊤ . . .
−g (ρ)
−C
where
(4b)
.
(5)
(4a)
3
implies that Bg(ρ) = 0¯n and Dg(ρ) = 0 ¯m. Thus, the attack
signal (3) does not have any effect on the system (2). The
attack policy (4) in conjunction with the property (6) implies
that in the situation where ρ > 0, i.e., the attack-starting time is
not the initial time, the attack strategy comprises two stealthy
attacks, which can be well illustrated in the example of cyber-
physcial systems:
• Before the starting time ρ, the attacker injects false data
to the data of initial condition sent to the Luenberger
observer (attack detector [12]) in cyber layer, while
keeping stealthy, i.e., y (t) = y (t) for t ∈ [0, ρ).
ZDA g(t) = geη(t−ρ), t ≥ ρ, to the system.
• At the starting time ρ, the attacker introduces signals of
III. PROBLEM FORMULATION
For simplicity, we let the increasingly ordered set M ,
{1, 2, . . .} ⊆ V denote the set of monitored agents.
A. System in The Absence of Attacks
Under the simplified control protocol proposed in [1], the
second-order multi-agent system with monitored outputs is
described by
xi (t) = vi (t)
nXj=1
vi (t) =
aσ(t)
ij
(xj (t) − xi (t)),
i ∈ V
(8a)
(8b)
yj (t) = xj (t), j ∈ M
(8c)
where xi(t) ∈ R is the position, vi(t) ∈ R is the velocity,
yj (t) ∈ R is the output of monitored agent i used to detect
stealthy attack, σ(t) :
is
the topology-switching signal. Here, σ(t) = pk ∈ S for
t ∈ [tk, tk+1) means the pth topology is activated over time
interval [tk, tk+1), k ∈ N0, and apk
ij is the entry of the weighted
adjacency matrix which describes the activated pth topology of
communication network.
[0,∞) → S , {1, 2, . . . , s},
Corollary 1: Under the ZDA (4), the states and monitored
outputs of systems (2) and (1) satisfy
B. System in The Presence of Attacks
y (t) = y (t) , for all t ≥ 0
z (t) =(cid:26)eAt z (0) ,
z (t) + (z (ρ) − z (ρ)) eη(t−ρ), t ∈ (ρ,∞) .
t ∈ [0, ρ]
(6)
(7)
We usually refer to an agent under attack as a misbehaving
agent [20]. We let K ⊆ V denote the set of misbehaving
agents. The multi-agent system (8) under ZDA is described
by
Proof: See Appendix A.
xi (t) = vi (t)
Remark 1: The state solution (7) shows that through choos-
ing the parameter η and also the attack-starting time ρ, the
attacker can achieve various objectives, see e.g.,
vi (t) =
system stability;
• ρ = ∞: altering the steady-state value while not affecting
• ρ < ∞, Re (η) > 0: making system unstable;
• ρ < ∞, Re (η) = 0, Im (η) 6= 0: causing oscillatory
behavior.
aσ(t)
ij
nXi=1
(xj (t) − xi (t)) +(cid:26)gi(t), i ∈ K
0, i ∈ V\K
yj (t) = xj (t), j ∈ M
where gi (t) is the ZDA signal in the form of (3):
gi (t) =(cid:26)gieη(t−ρ), t ∈ [ρ,∞)
otherwise.
0,
(9a)
(9b)
(9c)
(10)
The output (6) indicates the undetectable/stealthy property of
proposed ZDA (3).
Remark 2 (Mixed Stealthy Attacks): To launch the ZDA,
the attacker must modify initial condition; otherwise, z (0) −
z (0) = 0¯n, eAρ(z (0) − z (0)) = 0¯n, which with (4b)
We note that system (9) can equivalently transforms to a
switched system under attack:
z (t) = Aσ(t) z (t) + g (t)
y (t) = C z (t)
(11a)
(11b)
12n×2n
z (t) , e
y (t) , y (t) − y (t) ,
Pσ(tk)
−C
Aσ(tk)(t−tk)
v(t)(cid:21) =(cid:20) x(t)
v(t)(cid:21) ,
0M×2n (cid:21) ,
v(t)(cid:21)−(cid:20) x(t)
z(t) , z(t)−z(t) =(cid:20) x(t)
,(cid:20) η12n×2n − Aσ(tk)
k−1Yo=0
gn (cid:3) ,
g ,(cid:2) 0⊤
Ok ,(cid:20)C⊤ (cid:0)CAσ(tk)(cid:1)⊤
. . . (cid:16)CA2n−1
q = ker(Oq)\ e−Aσ(tq )τq Nk
σ(tk)(cid:17)⊤(cid:21)⊤
k = ker (Om) ,
eAσ(to )(to+1−to) z (0) ,
Nk
Nk
. . .
g1
n
(15a)
(15b)
(15c)
(15d)
(15e)
. (15f)
(15g)
q+1, 1 ≤ q ≤ k − 1. (15h)
. . .
1n×n
Aσ(t)
−Lσ(t) 0n×n (cid:21) ,
,(cid:20) 0n×n
C ,(cid:2) e1
eM 0M×2n−M(cid:3)⊤
z (t) ,(cid:2) x1 (t)
g (t) ,(cid:2) 0⊤
a⊤ (t)(cid:3)⊤
[a (t)]i ,(cid:26)gi (t) , i ∈ K
. . . xn (t) v1 (t)
i ∈ V\K
0,
n
,
,
. . . vn (t)(cid:3)⊤
(12a)
(12b)
,
(12c)
(12d)
(12e)
where ei ∈ Rn is the ith vector of the canonical basis. In
addition, system (8) equivalently transforms to a switched
system:
z (t) = Aσ(t)z (t)
y (t) = Cz (t) .
(13a)
(13b)
We present
the definition of time-dependent switching,
which is part of our defense strategy.
Definition 2: The topology-switching signals σ(t) and σ(t)
in multi-agent systems (11) and (13) are said to be time-
dependent if the switching times and topologies depend only
on time, such that
σ(t) = σ(t), for all t ≥ 0.
(14)
4
where we define the following variables and matrices:
Before presenting the selection scheme of attack-starting
time, let us define:
Algorithm 1: Attack-Starting Time ρ
Input: Sets: Nk
1 recursively computed by (15g)
and (15h), and
Sk ,(cid:26)t :(cid:20) z (t)
−g (cid:21)∈ ker(cid:0)Pσ(tk)(cid:1), t∈ [tk,tk+1](cid:27) (16)
with Pσ(tk), z (t), g and Ok defined in (15).
1 if z (0) 6∈ Nk
1 then
Choose ρ = tk at current tk;
2
3 else
We made the following assumptions on the attacker and
defender.
Assumption 1: The attacker
4
5
6
7
if max
t∈Sk {t} 6= tk+1 then
Choose ρ ∈ Sk at current tk;
Choose ρ at current tk or next tk+1.
else
1) knows the currently activated topology and its dwell time;
2) has the memory of the past switching sequences.
end
8
9 end
Assumption 2: The defender
1) designs the switching sequences including switching
times and topologies;
2) has no knowledge of the attack-starting time;
3) has no knowledge of the number of misbehaving agents.
Proposition 1: Under
topology switch-
ing (14), the action "start attack" of ZDA in the system (11)
does not affect the stealthy property (6) if and only if the
attack-starting time ρ is generated by Algorithm 1.
time-dependent
Proof: See Appendix B.
D. Strategy on Switching Times
C. Attack-Starting Time
The attack-starting time ρ of the signal (3) plays a critical
role in guaranteeing the stealthy property (6), which can be
utilized by the attacker to escape from being detected by the
defense strategy of modifying input or output matrix [25]
finitely over finite time. If the attack-starting time is not rea-
sonable, the changes in system dynamics induced by attacker's
action "start attack" at ρ can be used by defender to detect
the stealthy attack. Therefore, from the perspective of stealthy
attack design, it is not trivial to study how the attacker should
use its knowledge and memory to decide the attack-starting
time to guarantee its stealthy.
Inspired by [25], the core of defense strategy proposed in
this paper is to make changes on system dynamics through
changing communication topology such that the attack pol-
icy (4) is not feasible. In the realistic situation where the
defender has no knowledge of the attack-starting times, to
detect ZDA we must consider infinitely changing topology
over infinite time. The strategy on switching times described
by the following lemma, which are studied in Part I paper
and will also be used for observer design in this Part II paper,
addresses the problem: when should the topology of multi-
agent system (8) switch to detect ZDA, such that the changes
in the system dynamics do not destroy system stability in the
absence of attacks?
Lemma 1:
[1] Consider the second-order multi-agent sys-
5
tem (8). For the given topology set S that satisfies
∀r ∈ S :s λi (Lr)
λj (Lr) ∈ Q, for ∀i, j = 2, . . . , n
(17)
and the scalars 1 > β > 0, α > 0 and κ ∈ N, if the dwell
times τr, r ∈ S, satisfy
, m ∈ N
τr =bτmax + m
α , 0 <bτmax + mTr
; i = 2, ..., n(cid:19),
α−ξ ,
r∈S,i=1,...,n{1 − λi (Lr),−1 + λi (Lr)} and
then the asymptotic
2 −(cid:16)β− 1
κ − 1(cid:17) κ
ξ < α, ξ =
where 0 <bτmax < − ln β
Tr = lcm(cid:18) 2π√λi(Lr)
second-order consensus is achieved.
max
(18)
Tr
2
k ) and v(tk) = v(t−
Remark 3: Let us assume that at time t−
k , system (11)
or (13) is already at the steady state. It verifies that under the
attack signal (3), at the topology-switching time tk, x(tk) =
x(t−
k ), and the system maintains its steady
state at tk, which means topology switching does not have
impulsive effect on the systems (11) and (13). We should note
that the defense strategy (strategic topology switching) that
will be developed in the following sections cannot be directly
applied to such multi-agent systems that topology switching
has impulsive effect.
IV. DETECTABILITY OF ZERO-DYNAMICS ATTACK
This section focuses on the detectability of ZDA, which will
answer the question: what topologies of multi-agent system (8)
to switch to such that the attack policy (4) is not feasible? To
better illustrate the strategy on switching topologies, we intro-
duce the definitions of components in a graph and difference
graph.
Definition 3 (Components of Graph [36]): The components
of a graph are its maximal connected subgraphs. A component
is said to be trivial if it has no edges; otherwise, it is a
nontrivial component.
Definition 4: The difference graph Grs
diff = (Vrs
diff, Ers
diff) of
Figure 1. Components of difference graph (the weights of communications
links are uniformly set as ones).
In the following theorem, we present the strategy on switch-
ing topologies.
Theorem 1: Consider the multi-agent system (11). Under
time-dependent topology switching, the ZDA can be detected
by defender without knowledge of the numbder of misbe-
having agents and the attack-starting time,
if and only if
each component of union difference graph has at least one
monitored agent, i.e.,
Ci(Gdiff) ∩ M 6= ∅,∀i = 1, . . . d.
(20)
Proof: Under result of time-dependent topology switch-
ing (14), from (11) and (13), we have:
z (t) = Aσ(t) z (t) + g (t) ,
y (t) = C z (t) ,
(21a)
(21b)
two graphs Gr and Gs is generated as
where z (t) and y (t) are given by (15a) and (15b), respectively.
Vrs
diff = Vr ∪ Vs
diff, if ar
(i, j) ∈ Ers
where Vr and ar
ij are the set of vertices (agents) and the entry
of weighted adjacency matrix of the graph Gr, respectively.
We define the union difference graph for switching differ-
ij − as
ij 6= 0
Let us define:
0M×2n(cid:21) .
Pr =(cid:20)η12n×2n − Ar 12n×2n
−C
(22)
(Sufficient Condition) We now assume to the contrary that
the system (11) is under ZDA. By Definition 1, we obtain
−g(ρ)(cid:21) ∈ ker(cid:0)Pσ(ρ)(cid:1) .
(cid:20) z(ρ)
(23)
ence graphs as:
Gdiff , [r,s∈S
Vrs
diff, [r,s∈S
Ers
diff .
(19)
We use Ci(Gdiff) to denote the set of agents in ith component
of union difference graph Gdiff. Obviously, V = C1 S C2
S . . . S Cd, and Cp T Cq = ∅ if p 6= q, where d is the
number of the component of graph Gdiff. As an example, the
difference graph in Figure 1 has two nontrivial components,
C1(Gdiff) = {1, 2, 3, 4}, C2(Gdiff) = {5, 6}, and two trivial
components, C3(Gdiff) = {7}, C4(Gdiff) = {8}.
By the resulted state (7) and the form of ZDA signal (3),
we obtain that
[z (t) ,−g(t)] = eη(t−ρ) [z (ρ) ,−g(ρ)] , t ≥ ρ.
Since eη(t−ρ) 6= 0, we conclude that system (11) has ZDA is
equivalent to
(cid:20) z(ρ)
−g(ρ)(cid:21) ∈ \r∈S
ker (Pr).
(24)
6
Substituting C in (12b), z (ρ) in (15a), g(ρ) in (12d)
with (12e), Ar in (12a), and Pr in (22) into (24) and expanding
it out yields
η1n×n−1n×n 0n×n 0n×n
Lr
η1n×n 0n×n 1n×n
−e⊤
0⊤
n
0⊤
n
0⊤
n
j
which is equivalent to
x(ρ)
v(ρ)
0n
−a (ρ)
=
0n
0n
0
,∀j ∈ M,∀r∈ S
ηx (ρ) − v (ρ) = 0n,
−a (ρ) + Lr x (ρ) + ηv(ρ) = 0n,∀r ∈ S
−a (ρ) + Ls x (ρ) + ηv(ρ) = 0n,∀s ∈ S
xj (ρ) = 0,∀j ∈ M.
(25)
(26)
(27)
(28)
Through elementary row transformation, the Laplacian ma-
trix of union difference graph Gdiff can be written as
L , diag{L (C1(Gdiff)) , . . . ,L (Cd(Gdiff))} ,
(29)
where L (Cq(Gdiff)), q ∈ {1, 2, . . . , d}, denote the Laplacian
matrix of the qth component.
Noting that equation (26) subtracting equation (27) results
in (Lr − Ls) x (κ) = 0n,∀r, s ∈ S, which is equivalent to
Lx (κ) = 0n,
where L is defined in (29). From [37], it is known that the
Laplacian matrix of component L (Cq(Gdiff)) has properties:
i) zero is one of its eigenvalues with multiplicity one, ii)
the eigenvector that corresponds to the eigenvalue zero is
1Cq(Gdiff), ∀q ∈ {1, . . . , d}. It follows from (28) and (20)
that the solution of (30) is obtained as x (ρ) = 0n, which
works with (25) implies that v (ρ) = 0n, substituting which
into (26) or (27) yields the same result as a (ρ) = 0n, which, in
conjunction with (12d), implies g (ρ) = 02n, indicating there
is no ZDA by Definition 1. Thus, a contradiction occurs.
(Necessary Condition) Substituting (25) into (26) yields
(cid:0)Lr + η21n×n(cid:1) x (ρ) = a (ρ) ,∀r ∈ S, which is equivalent to
αrLr + η21n×n)x (ρ) = a (ρ) ,
(
SXr=1
(31a)
(31b)
∀αr > 0,
αr = 1.
SXr=1
If Im (η) 6= 0, (25) shows that
∃i ∈ V : Im (xi (ρ)) 6= 0 or Im (vi (ρ)) 6= 0,
which contradicts with v (ρ) ∈ Rn and x (ρ) ∈ Rn in the
definition of ZDA. Therefore, in the following proof, we need
to consider only the cases of (Im (η) = 0, Re (η) = 0) and
(Im (η) = 0, Re (η) 6= 0).
Case One -- (Im (η) = 0, Re (η) 6= 0): We note that there
exists one implied condition that is the union graph G ,
Er(cid:19) of switching topologies in S is connected;
if not,
the asymptotic second-order consensus cannot be
achieved, which is undesirable. It is straightforward to verify
that if the condition (20) is not satisfied, the equation (30) has
(cid:18) Sr∈S
Vr, Sr∈S
(30)
Based on the obtained detectability of ZDA, this section
SPr=1
the solution that has non-identical entries. Moreover, if η 6= 0,
αr = 1.
αrLr + η21n×n is full-rank for ∀αr > 0,
Thus, we obtain a feasible non-zero vector a (ρ) from (31a).
Case Two -- (Im (η) = 0, Re (η) = 0): If the condition (20)
is not satisfied, the equation (30) has the solution with non-
identical entries. Moreover, the union graph of all switching
topologies is connected means that the eigenvector associated
SPr=1
SPr=1
with eigenvalue zero of
αrLr is the only 1n, for any αr >
SPr=1
0,
αr = 1. Therefore, from (31a) with η = 0, we obtain a
feasible non-zero vector a (ρ), which completes the proof of
necessary condition.
Remark 4: The strategy (20) in Theorem 1 implies that the
minimum number of monitored agents required to detect ZDA
is equivalent to the number of components of union difference
graph. Take the difference graph in Figure 1 as an example,
which has four components: two nontrivial components and
if the topology set S
two trivial components. Therefore,
includes only Graph One and Graph Two in Figure 1, M ≥ 4.
V. ATTACK DETECTION ALGORITHM
focus on its detection algorithm.
A. Luenberger Observer under Switching Topology
We now present a Luenberger observer [38] for the sys-
tem (9):
(32a)
(32b)
xi(t) = vi(t)
vi(t) =
nXi=1
aσ(t)
ij (xj(t)−xi(t))−(cid:26)ψiri(t)+θi ri(t), i∈ M
0, i∈ V\M
(32c)
ri(t) = xi(t) − yi(t), i∈ V\M
where yi(t) is the output of monitored agent i in system (9),
ri (t) is the attack-detection signal, ψi and θi are the observer
gains designed by the defender, x(t0) = x(t0), v(t0) = v(t0).
We define the tracking errors as ex (t) , x (t) − x (t) and
ev (t) , v (t) − v (t). A dynamics of tracking errors with
attack-detection signal is obtained from (32) and (9):
ex (t) = ev (t) ,
ev (t) = −(cid:0)Lσ(t)+Φ(cid:1) ex (t)−Θev (t)−a (t) ,
r (t) = Cex (t) ,
(33a)
(33b)
(33c)
where a (t) is defined in (12e), r (t) , y (t) − y(t), and
Φ , diag{ψ1, . . . , ψM, 0, . . . , 0} ∈ Rn×n,
Θ , diag{θ1, . . . , θM, 0, . . . , 0} ∈ Rn×n.
(34)
(35)
The strategy (13) in Theorem 1 implies that if the union dif-
ference graph is connected, i.e., the union difference graph has
only one component, using only one monitored agent's output
is sufficient to detect ZDA. The following result regarding
the stability of system (33) in the absent of attack will answer
the question: under what condition only one monitored agent's
output is sufficient for the observer (32) to asymptotically track
the system (9) in the absent of attack?
Theorem 2: Consider the following matrix:
satisfy (37) and (38), and the topology-switching signal σ(tk)
of the observer (32) and the system (9) are generated by
Algorithm 2.
7
As ,(cid:20)
0n×n
−Ls − Φ −Θ (cid:21) ,
1n×n
(36)
where Ls is the Laplacian matrix of a connected undirected
graph, the gain matrices Φ and Θ defined in (34) and (35)
satisfy
i)
ii)
0n×n 6= Φ ≥ 0,
0n×n 6= Θ ≥ 0.
(37)
(38)
As is Hurwitz for any M ≥ 1, if and only if Ls has distinct
eigenvalues.
iii)
Proof: See Appendix C.
Without knowledge of the misbehaving agents and
the attack-starting time, the observer (32) is able to
detect ZDA in system (9), i.e., r(t) ≡ 0M does not
holds, if and only if the set of monitored agents and
switching topologies satisfy (20).
In the absence of attacks, without constraint on
the magnitudes of observer gains, the observer (32)
asymptotically track the real system (9), i.e.,
the
system (33) is globally uniformly asymptotically
stable.
In the absence of attacks, the agents in system (9)
achieve the asymptotic second-order consensus.
B. Strategic Switching Topology For Detection
The observer (32) can also be modeled as a switched system
as well. Let us recall a technical lemma that can address
the problem: when the topology of observer (32) should
strategically switch such that it can asymptotically track the
real system (9) in the absence of attacks.
Lemma 2:
[39] Consider the switched systems:
x (t) = Aσ(t)x (t) .
under periodic switching, i.e., σ (t) = σ (t + τ ) ∈ S. If there
exists a convex combination of some matrix measure that
satisfies
LXm=1
νmµ (Am) < 0,
(39)
then the switched system system is uniformly asymptotically
stable for every positive τ .
The strategic topology-switching algorithm is described by
Algorithm 2.
Algorithm 2: Strategic Topology-Switching Algorithm
Input: Initial index k = 0, initial time tk = 0, an ordered
topology set S that satisfies (39) and
∃s ∈ S : Ls has distinct eigenvalues,
(40)
dwell times τs, s ∈ S, generated by (18) that
satisfy
Xs∈S
νsµP (As) < 0, νs =
τsPr∈S
.
τr
(41)
1 Run the multi-agent system (9) and the observer (32);
2 Switch topology of system (9) and its observer (32) at
time tk + τσ(tk): σ(tk) ← S (mod(k + 1,S) + 1);
3 Update topology-switching time: tk ← tk + τσ(tk);
4 Update index: k ← k + 1;
5 Go to Step 2.
Theorem 3: Consider the multi-agent system (9) and the
observer (32), where the observer gain matrices Φ and Θ
Proof: We first note that Line 3 and 5 of Algorithm 2
imply the topology-switching signal σ(t) is time-dependent.
Proof of i): Replacing Aσ(t) by Aσ(t) (defined in (36)) in
the steps to derive (25) -- (28) in the proof of Theorem 1, we
have
ηex (ρ) − ev (ρ) = 0n,
a (ρ) + Lrex (ρ) + ηex(ρ) = 0n,∀r ∈ S
a (ρ) + Lsex (ρ) + ηex(ρ) = 0n,∀s ∈ S
exj (ρ) = 0,∀j ∈ M.
(42)
(43)
(44)
(45)
Therefore, the rest of the proof of i) follows that of Theorem 1
straightforwardly.
Proof of ii): In the absence of attacks, the system matrix
of system (33) is Aσ(t) defined in (36). Considering (41), by
Lemma 2, and the conditions (37) and (38), As is Hurwitz.
Thus, there exists P > 0 such that µP (As) < 0. Through
setting on the switching times (dwell times) by (18), (39) can
be satisfied. By Lemma 2, the switched linear system (33) is
uniformly asymptotically stable, which is, in fact, equivalent
to globally uniformly asymptotically stable.
Proof of iii) follows Lemma 1 straightforwardly.
VI. SIMULATION
We consider a system with n = 4 agents. The initial position
and velocity conditions are chosen randomly as x(0) = v(0) =
[1, 2, 3, 4]⊤. The considered network topologies with their
coupling weights are given in Figure 2. The working situation
is illustrated by Figure 2 as:
• Agents 2 -- 4 are misbehaving agents, i.e., K = {2, 3, 4};
• only agent 1 is the monitored one, i.e., M = {1}.
Property ii) in Theorem 3 states that our strategic topology
switching has no constraint on the magnitudes of observer
gains in tracking real system. To demonstrate this, we set the
observer gains significantly small as
Φ = Θ = diag{10−6, 0, 0, 0}.
(46)
A. Undetectable Zero-Dynamics Attack
First, we consider the topology set S = {1, 2}, and set the
topology switching sequence as 1 → 2 → 1 → 2 → . . .,
periodically. It verifies from Figure 2 that the topology set
8
Figure 2. Working situation.
2 + 0.2 = T2
S = {1, 2} satisfies (17) and (41). By Lemma 1, we select
the dwell times τ1 = τ2 = T1
2 + 0.2.
It verifies from Topologies One and Two in Figure 2 that
their generated difference graph is disconnected. Thus, the set
S = {1, 2} does not satisfy (20) in Theorem 1. Therefore, the
attacker can easily design a ZDA such that the observer (32)
under Algorithm 2 fails to detect it.
2 + 0.2 = π
Let the attacker's goal be to make the system working
under Algorithm 2 unstable, without being detected. Following
the policy (4) and the attack-starting time selection scheme --
Algorithm 1, one of its attack strategies is designed as:
• η = 0.0161;
• modify the data of initial condition sent to observer (32)
• choose attack-starting time ρ = 1097.4;
• introduce ZDA signal to system at ρ:
as bx (0) = [1, 1, 3, 5]⊤ andbv (0) = [1, 1, 4, 4]⊤;
g (t) = 10−3(cid:2)0, 7.3eη(t−ρ), 7.3eη(t−ρ),−14.6eη(t−ρ)(cid:3)⊤
The trajectories of detection signal r(t) designed in (32),
and the velocities are shown in Figure 3, which illustrates
that the attacker's goal of making the system unstable without
being detected is achieved under the topology set S = {1, 2}.
.
B. Detectable Zero-Dynamics Attack
To detect
the designed stealthy attack, we now incor-
porate Topology Three in Figure 2 into topology set, i.e.,
S = {1, 2, 3}. We let the topology switching sequence to
be 1 → 2 → 3 → 1 → 2 → 3 → . . ., periodically. It
verifies that the topology set S = {1, 2, 3} satisfies (17)
and (41). Using Lemma 1, the dwell times are selected as
τ1 = τ2 = τ3 = π
2 + 0.2.
We note that in the working situation illustrated by Figure 2,
the existing results [12], [19] -- [22] for the multi-agent systems
under fixed topology fail to detect ZDA. This is mainly due
to the misbehaving-agents set K = 3; the connectivities of
Topologies One, Two and Three are as the same as 1; and the
10
8
6
4
2
0
(a)
Attack-Starting Time
= 1097.4
-2
0
10-9
1
500
1097.4
1500
Time
(b)
)
t
(
r
l
i
a
n
g
S
n
o
i
t
c
e
t
e
D
-
k
c
a
t
t
A
0.5
0
-0.5
-1
0
500
1000
Time
1500
Figure 3. States v(t): multi-agent system under attack is unstable; attack-
detection signal r(t): the attack keeps stealthy over time.
output set M = 1. All these violate the conditions on the
connectivity of the communication network, the size of the
misbehaving-agent set, and the size of the output set, which
are summarized in Table I.
It verifies from Figure 2 that the difference graph generated
by Topologies One and Three, or Topologies Two and Three
is connected. Thus, by property i) in Theorem 3, we conclude
that using only one monitored agent's output, the observer (32)
working under Algorithm 2 is able to detect the designed ZDA
under the topology set S = {1, 2, 3}.
The trajectory of the attack-detection signal r(t) is shown
in Figure 4. Remark 3 states that when the starting time of
ZDA is not the initial time, the proposed attack policy includes
two mixed stealthy attacks. Figure 4 illustrates that using only
agent 1's output, the mixed stealthy attacks are successfully
detected.
C. Observer in The Absence of Attacks
We now show the effectiveness of strategic topology switch-
ing for the observer (32) in estimating the states of the multi-
agent system (8), i.e., the multi-agent system (9) in the absence
of attacks. Input the initial conditions modified by attacker
to the observer (32), i.e., x (0) = bx (0) = [1, 1, 3, 5]⊤ and
v (0) = bv (0) = [1, 1, 4, 4]⊤. The trajectories of observer
Detect Mixed Stealthy Attacks
Zero-dynamics attack is detected.
Attack that modifies initial condition is detected.
0.4
0.2
0
-0.2
Attack-starting time of zero-dynamics attack is
= 1097.4.
)
t
(
r
l
i
a
n
g
S
n
o
i
t
c
e
t
e
D
-
k
c
a
t
t
A
-0.4
0
200
400
600
800
1097.4
1400
Time
Figure 4. Attack-detection signal r(t): using only one monitored agent's
output, the designed ZDA is detected.
errors are shown in Figure 5, which shows that using the
significantly small observer gains in (46) and only agent 1's
output, Algorithm 2 works successfully for the observer (32) to
asymptotically track the real multi-agent system in the absence
of attacks.
VII. CONCLUSION
This two-part paper studies strategic topology switching for
the second-order multi-agent system under attack. In Part-I
paper [1], for the simplified control protocol that does need
velocity measurements, we propose a strategy on switching
times that addresses the problem: when the topology should
switch such that
the changes in system dynamics do not
undermine agent's ability of reaching the second consensus
in the absence of attacks. In Part-II paper, we propose a
strategy on switching topologies that addresses the problem:
what topology to switch to, such that the ZDA can be detected.
Based on the two strategies, a defense strategy is derived in
this Part-II paper, its merits are summarized as
• In achieving the second-order consensus in the absence
of attacks, the control protocol does not need the velocity
measurements, while the algorithm has no constraint on
the magnitudes of coupling weights.
• In tracking real systems in the absence of attack, it has
no constraint on the magnitudes of observer gains of
the proposed Luenberger observer and the number of
monitored agents.
• In detecting ZDA, the algorithm has no constraint on the
size of misbehaving-agent set, while the algorithm allows
the defender to have no knowledge of the attack-starting
time.
The theoretical results obtained in this two-part paper imply
several rather interesting results:
• for the size of switching topology set, there exists a
fundamental tradeoff between the topology connection
cost and the convergence speed to consensus;
• for the dwell time of switching topologies, there exist a
tradeoff between the switching cost and the duration of
9
0.4
0.2
0
-0.2
-0.4
1
0.5
0
)
t
(
1
x
e
)
t
(
3
x
e
0
20
40
Time
60
-0.5
0
20
40
Time
60
)
t
(
1
v
e
)
t
(
3
v
e
1
0
-1
-2
0
2
1
0
-1
-2
0
20
40
Time
60
20
40
Time
60
)
t
(
2
x
e
2
1
0
-1
-2
0
)
t
(
4
x
e
1
0.5
0
-0.5
-1
0
)
t
(
2
v
e
)
t
(
4
v
e
4
2
0
-2
0
2
0
-2
-4
0
20
40
Time
60
20
40
Time
60
20
40
Time
60
20
40
Time
60
Figure 5.
Algorithm 2 are globally uniformly asymptotically stable.
In the absence of attacks, trajectories of observer errors under
attacks going undetected, and the convergence speed to
consensus.
Analyzing the tradeoff problems in the lights of game theory
and multi-objective optimization constitutes a part of our
future research.
APPENDIX A
PROOF OF COROLLARY 1
From the attack signal (3), we know that g(t) = 0¯o for t ∈
[0, ρ). Thus, before the attack-starting time ρ, the system (2)
is described by
z (t) = Az (t) ,
y (t) = C z (t) , t ∈ [0, ρ)
(47a)
(47b)
from which the first item in (7) is obtained by integration.
It is straightforward to derive from (47) and (1) that
z (t) − z (t) = A (z (t) − z (t))
y (t) − y (t) = C (z (t) − z (t)) , t ∈ [0, ρ).
(48a)
(48b)
10
We note that (6) implies y (t) − y (t) = C (z (t) − z (t)) =
0 ¯m for all t ∈ [0, ρ), which means z(0) − z(0) 6= 0¯n is
unobservable under the dynamics (48). Thus, z (0) − z (0) ∈
ker (O), i.e., the policy (4a) holds.
Considering the fact that the system (2) under the attack sig-
nal (3) is continuous w.r.t. time, which implies z(ρ−) = z(ρ).
Therefore, z(ρ) − z(ρ) = eAρ(z(0) − z(0)) can be obtained
from (48). The results (6) and (7) over the time interval [ρ,∞)
are generated through launching the classical ZDA signal
g(t) = geη(t−ρ), t ≥ ρ, the detailed proof can be found in [40],
it is omitted here.
APPENDIX B
PROOF OF PROPOSITION 1
Under the result of time-dependent topology switching (14),
from (11) and (13), we obtain a dynamics:
z (t) = Aσ(t) z (t) ,
y (t) = C z (t) , t ∈ [0, ρ)
(49a)
(49b)
where z and y (t) are given in (15a) and (15b), respectively.
It follows from the dynamics (49) that the solution (15d) is
obtained by integration.
Without loss of generality, we let [0, ρ] = [0, t1)∪ [t1, t2)∪
. . . ∪ [tk, ρ) with ρ ≤ tk+1, k ∈ N0. (49) implies the stealthy
property: y (t) = y (t) for all t ∈ [0, ρ], is equivalent to
y (t) = 0M, for all t ∈ [0, t1) ∪ . . . ∪ [tk, ρ).
(50)
for any t ∈ [t0, t+
z (0) ∈ Nk
1 with Nk
We note that (50) means that the system (49) is unobservable
k ), k ∈ N0, which is further equivalent to
1 recursively computed by (15g) and (15h),
via considering Theorem 1 of [41]. The condition in Lines 1
and 2 of Algorithm 1 means that once the attacker finds (50)
does not hold at tk, he must immediately launches ZDA signal
to keep stealthy, i.e., ρ = tk; otherwise, y (tk) 6= 0M. If (50)
holds, the attacker can launch the ZDA at future time, i.e.,
ρ > tk.
The set defined in (16) and the condition "max
t∈Sk {t} = tk+1"
contained in Line 6 of Algorithm 1 implies that the selection
of ρ also dependents on whether ZDA policy (4b) is feasible
at ρ, so that its stealthy property can continue to hold. Line
7 of Algorithm 1 implies that if it is feasible at the incoming
switching time tk+1, the attacker can launch the ZDA signal
at current activated time interval [tk, tk+1) or next interval
[tk+1, tk+2). Otherwise, the attacker must launch the ZDA at
a time in the current time interval, i.e., ρ ∈ Sk.
APPENDIX C
PROOF OF THEOREM 2
We let σ(t) = s ∈ S for t ∈ [tk, tk+1), k ∈ N0. Since Ls is
the Laplacian matrix of a connected graph and Φ ≥ 0, Ls + Φ
is positive definite. We define the following positive function
for the system (33) with a(t) ≡ 0n:
Vs(e (t)) =
e⊤
x (t)(Ls +Φ) ex(t)+e⊤
v (t) ev(t) .
1
2
Its time derivative is obtained as
e (t) = Ase (t) with e (t) ,(cid:2) e⊤
where the inequality is obtained by considering Θ ≥ 0.
Since the dynamics (33) with a(t) ≡ 0n is equivalent to
, we conclude
from (51) that none of the eigenvalues of Ar has positive real
part.
We next prove Ar has neither zero nor pure imagine
v (t)(cid:3)⊤
x (t)
e⊤
C D (cid:21)(cid:19) =
eigenvalues.
1V×V
det (As − λ12n×2n)
Using the well-known formula det(cid:18)(cid:20) A B
det (A) det(cid:0)D − CA−1B(cid:1), from (36) we have:
−Ls − Φ −Θ − λ1n×n (cid:21)(cid:19)
= det(cid:18)(cid:20) −λ1n×n
λ (cid:19)
= det (−λ1n×n) det(cid:18)−Θ − λ1n×n − Ls + Φ
= det(cid:0)λ21n×n + Θλ + Ls + Φ(cid:1) .
φm ,pψm + λθmem,
Let us define:
with em ∈ Rn being the mth vector of the canonical basis. It
verifies from (53), (34) and (35) that
(52)
(53)
(54)
(55)
with
MXp=m
φpφ⊤
p ,
P(m) , λbΘ(m) +bΦ(m) =
bΘ(m) , diag(cid:8)0, . . . , 0, θm, . . . , θM, 0, . . . 0(cid:9) ,
bΦ(m) , diag(cid:8)0, . . . , 0, ψm, . . . , ψM, 0, . . . 0(cid:9) .
det(cid:0)A + χuw⊤(cid:1) = det (A)(cid:0)1 + χw⊤A−1u(cid:1) ,
Let us recall the well-known formula:
where A is invertible, and w and u are vectors. By (55), we
obtain from (52) and (53) -- (55) that
det (As − λ12n×2n)
=
MYm=1(cid:16)1 + φ⊤
m(Hs + P (m + 1))−1φm(cid:17) det (Hs) ,
where
Hs , λ21n×n + Ls.
(56)
(57)
Since Lr
qi2
is a symmetric matrix,
there exists an or-
. . .
qiV (cid:3)⊤
thogonal matrix Q , [q1; . . . ; qn] ∈ RV×V with qi ,
(cid:2) qi1
Q⊤HsQ = diag(cid:8)λ2 + λ1(Ls), . . . , λ2 + λn(Ls)(cid:9) .
∈ RV, i ∈ V, such that
Considering (38) and (35), without loss of generality, we let
Q⊤ = Q−1,
(58b)
(58a)
Vs (e (t)) = −e⊤
v (t) Θev (t) ≤ 0,
(51)
θM 6= 0.
(59)
It follows from (58) and (53) that
M(Hs)−1φM =
φ⊤
det (Hs) =
iM
λi (Ls) + λ2
nXi=1 (cid:0)ψM + λθM(cid:1) q2
nYi=1(cid:0)λi (Ls) + λ2(cid:1),
,
(60)
(61)
from which, we arrive at
=
M(Hs)−1φM(cid:17) det (Hs)
(cid:16)1 + φ⊤
nYi=1(cid:0)λi (Ls) + λ2(cid:1)
nYj6=i(cid:0)λj (Ls) + λ2(cid:1)(cid:0)ψM + λθM(cid:1) q2
nXi=1
M−1Ym=1 (cid:16)1 + φ⊤
m(Hs + P (m + 1))−1φm(cid:17).
Q (λ) ,
iM.
+
Let us define:
Substituting (62) and (63) into (56) yields
det (As − λ12n×2n)
= Q (λ) nYi=1(cid:0)λi (Ls) + λ2(cid:1)
nXi=1
+
iM .
nYj6=i(cid:0)λj (Ls) + λ2(cid:1)(cid:0)ψM+λθM(cid:1) q2
In the followings, we consider two different cases.
(62)
(63)
(64)
A. Case One: Ar has zero eigenvalue
In this case, i.e., λ = 0, it follows from (53), (54), (57), (63)
and the condition θm ≥ 0 and ψm ≥ 0, ∀m ∈
that Q (λ) > 0. Thus, we conclude from (64) that
M,
det (As − λ12n×2n)λ=0 > 0. Therefore, Ar does not have
any zero eigenvalue. A contradiction occurs.
B. Case Two: Ar has pure imagine eigenvalue
This case means λ = i with 0 6= ∈ R. It verifies
from (53), (54) and (57) that
1 + φ⊤
m(Hs + P (m + 1))−1φm 6= 0,∀m ∈ M
thus, Q (λ)λ=i
det (As − i12n×2n) = 0 is equivalent to
6= 0. Then, we conclude from (64) that
nYi=1(cid:0)λi(Ls)−2(cid:1)+
nXi=1
nYj6=i(cid:0)λj (Ls)−2(cid:1) ψMq2
iM
We note that (65) implies
+ i
nYj6=i(cid:0)λj (Ls) − 2(cid:1)θMq2
nXi=1
nYj6=i(cid:0)λj (Ls) − 2(cid:1)θMq2
nXi=1
iM = 0.
iM = 0,
(65)
(66)
which, in conjunction with (59), results in
11
which further implies that
nYj6=i(cid:0)λj (Ls) − 2(cid:1)q2
nXi=1
nYj6=i(cid:0)λj(Ls)−2(cid:1) ψMq2
nXi=1
iM = 0,
iM = 0.
Thus, from (65) we have
that
nQi=1(cid:0)λi(Ls) − 2(cid:1) = 0, which means
∃i ∈ {1, . . . , n} : 2 = λi (Ls).
(67)
it
However,
nPi=1
nQj6=i(cid:0)λj (Ls) − 2(cid:1)θMq2
is straightforward to verify from (67) that
iM 6= 0 if and only if Ls has
thus a
distinct eigenvalues. Consequently, (65) does hold,
contradiction occurs.
ACKNOWLEDGMENT
The authors thank Dr. Sadegh Bolouki, Dr. Hamidreza
Jafarnejadsani, and Dr. Pan Zhao for valuable discussions.
REFERENCES
[1] Y. Mao,
switching
https://arxiv.org/abs/1711.11183, 2017.
security-part
E. Akyol,
and
for
Z.
Zhang,
"Strategic
i: Consensus & switching
topology
times,"
[2] W. Yu, G. Chen, and M. Cao, "Some necessary and sufficient con-
ditions for second-order consensus in multi-agent dynamical systems,"
Automatica, vol. 46, no. 6, pp. 1089 -- 1095, 2010.
[3] J. Qin, C. Yu, and B. D. Anderson, "On leaderless and leader-following
consensus for interacting clusters of second-order multi-agent systems,"
Automatica, vol. 74, pp. 214 -- 221, 2016.
[4] J. Mei, W. Ren, and J. Chen, "Distributed consensus of second-order
multi-agent systems with heterogeneous unknown inertias and control
gains under a directed graph," IEEE Transactions on Automatic Control,
vol. 61, no. 8, pp. 2019 -- 2034, 2016.
[5] X. Ai, S. Song, and K. You, "Second-order consensus of multi-agent
systems under limited interaction ranges," Automatica, vol. 68, pp. 329 --
333, 2016.
[6] W. Ren and E. Atkins, "Distributed multi-vehicle coordinated control
via local information exchange," International Journal of Robust and
Nonlinear Control, vol. 17, no. 10-11, pp. 1002 -- 1033, 2007.
[7] N. Huang, Z. Duan, and G. R. Chen, "Some necessary and sufficient
conditions for consensus of second-order multi-agent systems with
sampled position data," Automatica, vol. 63, pp. 148 -- 155, 2016.
[8] A. Abdessameud and A. Tayebi, "On consensus algorithms for double-
integrator dynamics without velocity measurements and with input
constraints," Systems & Control Letters, vol. 59, no. 12, pp. 812 -- 821,
2010.
[9] J. Nazario, "Politically motivated denial of service attacks," The Virtual
Battlefield: Perspectives on Cyber Warfare, pp. 163 -- 181, 2009.
[10] J. Slay and M. Miller, "Lessons learned from the maroochy water
breach," in International Conference on Critical Infrastructure Protec-
tion. Springer, 2007, pp. 73 -- 82.
[11] J. Meserve, "Sources: Staged cyber attack reveals vulnerability
in power grid," http://www.cnn.com/2007/US/09/26/power.at.risk/ , ac-
cessed 2007-09-26.
[12] F. Pasqualetti, F. D orfler, and F. Bullo, "Attack detection and identi-
fication in cyber-physical systems," IEEE Transactions on Automatic
Control, vol. 58, no. 11, pp. 2715 -- 2729, 2013.
[13] M. Naghnaeian, N. Hirzallah, and P. G. Voulgaris, "Dural rate control
for security in cyber-physical systems," in Decision and Control (CDC),
2015 IEEE 54th Annual Conference on.
IEEE, 2015, pp. 1415 -- 1420.
[14] H. Jafarnejadsani, H. Lee, N. Hovakimyan, and P. Voulgaris, "A multirate
adaptive control for mimo systems with application to cyber-physical
security," in 2018 IEEE Conference on Decision and Control (CDC).
IEEE, 2018, pp. 6620 -- 6625.
12
[15] N. H. Hirzallah and P. G. Voulgaris, "On the computation of worst
attacks: a lp framework," in 2018 Annual American Control Conference
(ACC).
IEEE, 2018, pp. 4527 -- 4532.
[40] T. Geerts, "Invariant subspaces and invertibility properties for singular
systems: The general case," Linear algebra and its applications, vol.
183, pp. 61 -- 88, 1993.
[16] J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable
attacks and countermeasures," IEEE Journal on Selected Areas in
Communications, vol. 31, no. 7, pp. 1294 -- 1305, 2013.
[41] A. Tanwani, H. Shim, and D. Liberzon, "Observability for switched
linear systems: characterization and observer design," IEEE Transactions
on Automatic Control, vol. 58, no. 4, pp. 891 -- 904, 2013.
[17] G. Park, H. Shim, C. Lee, Y. Eun, and K. H. Johansson, "When
adversary encounters uncertain cyber-physical systems: Robust zero-
dynamics attack with disclosure resources," in Decision and Control
IEEE, 2016, pp. 5085 -- 5090.
(CDC), 2016 IEEE 55th Conference on.
[18] J. Kim, G. Park, H. Shim, and Y. Eun, "Zero-stealthy attack for sampled-
data control systems: The case of faster actuation than sensing," in
Decision and Control (CDC), 2016 IEEE 55th Conference on.
IEEE,
2016, pp. 5956 -- 5961.
[19] S. Sundaram and C. N. Hadjicostis, "Distributed function calculation
via linear iterative strategies in the presence of malicious agents," IEEE
Transactions on Automatic Control, vol. 56, no. 7, pp. 1495 -- 1508, 2011.
[20] F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in
unreliable networks: A system theoretic approach," IEEE Transactions
on Automatic Control, vol. 57, no. 1, pp. 90 -- 104, 2012.
[21] S. Weerakkody, X. Liu, and B. Sinopoli, "Robust structural analysis and
design of distributed control systems to prevent zero dynamics attacks,"
in Decision and Control (CDC), 2017 IEEE 56th Annual Conference
on.
IEEE, 2017, pp. 1356 -- 1361.
[22] J. Chen, J. Wei, W. Chen, H. Sandberg, K. H. Johansson, and J. Chen,
"Protecting positive and second-order systems against undetectable
attacks," IFAC-PapersOnLine, vol. 50, no. 1, pp. 8373 -- 8378, 2017.
[23] H. Jafarnejadsani, H. Lee, N. Hovakimyan, and P. Voulgaris, "Dual-
rate L1 adaptive controller for cyber-physical sampled-data systems,"
in Decision and Control (CDC), 2017 IEEE 56th Annual Conference
on.
IEEE, 2017, pp. 6259 -- 6264.
[24] J. Back, J. Kim, C. Lee, G. Park, and H. Shim, "Enhancement of security
against zero dynamics attack via generalized hold," in Decision and
Control (CDC), 2017 IEEE 56th Annual Conference on.
IEEE, 2017,
pp. 1350 -- 1355.
[25] A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, "Revealing
stealthy attacks in control systems," in Communication, Control, and
Computing (Allerton), 2012 50th Annual Allerton Conference on.
IEEE,
2012, pp. 1806 -- 1813.
[26] -- -- , "A secure control framework for resource-limited adversaries,"
Automatica, vol. 51, pp. 135 -- 148, 2015.
[27] A. Teixeira, D. P´erez, H. Sandberg, and K. H. Johansson, "Attack models
and scenarios for networked control systems," in Proceedings of the
1st international conference on High Confidence Networked Systems.
ACM, 2012, pp. 55 -- 64.
[28] Z. Feng, G. Hu, and G. Wen, "Distributed consensus tracking for multi-
agent systems under two types of attacks," International Journal of
Robust and Nonlinear Control, vol. 26, no. 5, pp. 896 -- 918, 2016.
[29] J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable
attacks and countermeasures," IEEE Journal on Selected Areas in
Communications, vol. 31, no. 7, pp. 1294 -- 1305, 2013.
[30] E. N. Ciftcioglu, S. Pal, K. S. Chan, D. H. Cansever, A. Swami, A. K.
Singh, and P. Basu, "Topology design games and dynamics in adversarial
environments," IEEE Journal on Selected Areas in Communications,
vol. 35, no. 3, pp. 628 -- 642, 2017.
[31] V. Amelkin and A. K. Singh, "Disabling external influence in social
networks via edge recommendation," arXiv preprint arXiv:1709.08139,
2017.
[32] Y. Mao and E. Akyol, "Detectability of cooperative zero-dynamics
attack," in 2018 56th Annual Allerton Conference on Communication,
Control, and Computing (Allerton), 2018, pp. 227 -- 234.
[33] -- -- , "Synchronization of coupled harmonic oscillators by time-
dependent topology switching," IFAC-PapersOnLine, vol. 51, no. 23,
pp. 402 -- 407, 2018.
[34] H. Hartenstein, K. P. Laberteaux et al., "A tutorial survey on vehicular
ad hoc networks," IEEE Communications magazine, vol. 46, no. 6, p.
164, 2008.
[35] S. K. Mazumder, Wireless networking based control. Springer, 2011.
[36] M. Newman, Networks: an introduction. Oxford university press, 2010.
[37] A. E. Brouwer and W. H. Haemers, Spectra of graphs. Springer Science
& Business Media, 2011.
[38] D. G. Luenberger, "Observing the state of a linear system," IEEE
Transactions on Military Electronics, vol. 8, no. 2, pp. 74 -- 80, 1964.
[39] M. Porfiri, D. G. Roberson, and D. J. Stilwell, "Fast switching analysis
of linear switched systems using exponential splitting," SIAM Journal
on Control and Optimization, vol. 47, no. 5, pp. 2582 -- 2597, 2008.
|
1910.05424 | 1 | 1910 | 2019-10-11T21:46:09 | Anticipating Illegal Maritime Activities from Anomalous Multiscale Fleet Behaviors | [
"cs.MA",
"cs.SI"
] | Illegal fishing is prevalent throughout the world and heavily impacts the health of our oceans, the sustainability and profitability of fisheries, and even acts to destabilize geopolitical relations. To achieve the United Nations' Sustainable Development Goal of "Life Below Water", our ability to detect and predict illegal fishing must improve. Recent advances have been made through the use of vessel location data, however, most analyses to date focus on anomalous spatial behaviors of vessels one at a time. To improve predictions, we develop a method inspired by complex systems theory to monitor the anomalous multi-scale behavior of whole fleets as they respond to nearby illegal activities. Specifically, we analyze changes in the multiscale geospatial organization of fishing fleets operating on the Patagonia Shelf, an important fishing region with chronic exposure to illegal fishing. We show that legally operating (and visible) vessels respond anomalously to nearby illegal activities (by vessels that are difficult to detect). Indeed, precursor behaviors are identified, suggesting a path towards pre-empting illegal activities. This approach offers a promising step towards a global system for detecting, predicting and deterring illegal activities at sea in near real-time. Doing so will be a big step forward to achieving sustainable life underwater. | cs.MA | cs | Anticipating Illegal Maritime Activities from Anomalous
Multiscale Fleet Behaviors
James R. Watson and A. John Woodill†
Oregon State University
October 15, 2019
Abstract
Illegal fishing is prevalent throughout the world and heavily impacts the health of our oceans,
the sustainability and profitability of fisheries, and even acts to destabilize geopolitical relations.
To achieve the United Nations Sustainable Development Goal of "Life Below Water", our ability to
detect and predict illegal fishing must improve. Recent advances have been made through the use of
vessel location data, however, most analyses to date focus on anomalous spatial behaviors of vessels
one at a time. To improve predictions, we develop a method inspired by complex systems theory
to monitor the anomalous multi-scale behavior of whole fleets as they respond to nearby illegal
activities. Specifically, we analyze changes in the multiscale geospatial organization of fishing fleets
operating on the Patagonia Shelf, an important fishing region with chronic exposure to illegal fishing.
We show that legally operating (and visible) vessels respond anomalously to nearby illegal activities
(by vessels that are difficult to detect).
Indeed, precursor behaviors are identified, suggesting a
path towards pre-empting illegal activities. This approach offers a promising step towards a global
system for detecting, predicting and deterring illegal activities at sea in near real-time. Doing so
will be a big step forward to achieving sustainable life underwater.
Keywords: sustainable fisheries; illegal, unreported and unregulated fishing; geospatial intelli-
gence; complex systems; information theory; prediction.
9
1
0
2
t
c
O
1
1
]
A
M
.
s
c
[
1
v
4
2
4
5
0
.
0
1
9
1
:
v
i
X
r
a
†James R. Watson: College of Earth, Ocean and Atmospheric Sciences, Oregon State University;
jrwat-
[email protected]. A. John Woodill: College of Earth, Ocean and Atmospheric Sciences, Oregon State
University; [email protected]. This work was supported by NASA under the award "Securing Sustainable
Seas: Near real-time monitoring and predicting of global fishing fleet behavior" (Award No. 80NSSC19K0203).
INTRODUCTION
The United Nations Sustainable Development Goal (SDG) 14 is to conserve and sustainably use the
ocean's resources for sustainable growth (United Nations 2016). This is a vital goal to achieve as
many millions of people rely on the oceans for food and income, and unsustainable use of the seas will
lead to diminished food and income security around the world (Béné et al. 2016). The SDG Target
14.4 is to have the global capacity to effectively regulate harvesting and end overfishing by 2020. In
doing so, overharvested fish stocks will then be on a path towards recovery. Sustainable Development
Goal 14 and its specific target can only be achieved if illegal, unreported and unregulated (IUU)
fishing is dealt with (Pramod et al. 2014). This means being able to identify in (near) real-time
IUU events around the world, and even predict their occurrences, all so that enforcement and
intervention can occur more frequently and with more efficacy.
Illegal fishing undermines SDG
14 by creating aggregate fishing effort above maximum sustainable levels and potentially creates
geopolitical tension and possibly armed conflict, which have detrimental consequences for regional
development (Österblom and Bodin 2012). Since illegal fishers do not report their catch, their
fishing activities reduce the accuracy of official fish catch and stock estimates and impedes the
ability of regulatory bodies to set catch limits, manage fish populations, and evaluate SDG progress
(Worm and Branch 2012). Further, since their catch is not geographically referenced, their fishing
activities undermine our global ability to monitor marine protection and the health of the oceans
more broadly (Lubchenco and Grorud-Colvert 2015).
Equally important to IUU's socio-economic impacts are its effects on marine environments: IUU
fishing often causes grave environmental damage, especially when vessels use prohibited gear, such
as driftnets, that catch non-target species (like sharks, turtles or dolphins) or physically damages
or destroys reefs, seamounts, and other vulnerable marine ecosystems. In concert, both the socio-
economic and environmental impacts of IUU has a disproportionate effect on smaller-scale fishers
in developing countries, by stealing fish from near-shore waters and undermining the ecosystem on
which the fish depend (Pauly 2018). Given that illegal fishing is valued at $36.4 billion annually and
represents 20% of the global seafood catch (Sumaila et al. 2006; Stimson Center 2018), there is a
pressing need to be able to detect illegal fishing in a timely manner and at spatial and temporal scales
relevant to enforcement. In doing so, diminished IUU activity will lead to improved geopolitical
2
relations in areas where IUU occurs, as well as increases in legal catch and profits (estimated around
14% and 12% respectively; Cabral et al. 2018)
The biggest challenge to detecting and predicting IUU activity has to do with IUU vessels going
dark, that is most "normal" vessels operating legally transmit their location to other vessels via
the Automatic Information System (AIS; Kroodsma et al. 2018). This is done primarily for vessel
collision avoidance and for search and rescue efforts. The trouble is that when certain vessels engage
in illegal activities, they typically turn off their AIS transponders or even falsify their location (this
is known as "spoofing"; de Souza et al. 2016). Looking across the globe there is a "global dark
fleet" operating in and amongst the world's visible (legally operating) fleets (Sumaila et al. 2006)
committing all sorts of bad behaviors, starting with illegal fishing but extending to narcotics, human
and arms trafficking (Tickler et al. 2018). Most current approaches to detecting IUU fishing focuses
on identifying spoofing in AIS data (e.g. Ford et al. 2018), which has led to several recent advances
in our understanding of the global spatial distribution and possible scale of IUU fishing (Miller
et al. 2018). However, these spoofing analyses are almost always retroactive, revealing anomalous
behavior after they have occurred. To make predictions about where IUU activity might happen in
the future, at spatial and temporal scales relevant to enforcement, new approaches are required.
A major limit to current spoofing detection approaches is that they only analyze the anomalous
spatial behavior of vessels one at a time (e.g. Ford et al. 2018; Miller et al. 2018; Petrossian 2018).
In contrast, studies of anomalous behaviors in complex systems show that early detection (and
prediction) can be achieved through the analysis of multiscale patterns, that is a spatial anomaly
(for example) that starts with one actor, but then that spreads to others (Motter 2004). Identifying
contagious behaviors has aided the discovery of large and abrupt changes in financial markets (Gai
and Kapadia 2010), ecosystems (Levin 1998) and our bodies (e.g. the onset of an epileptic fit say;
Litt and Echauz 2002). In the context of IUU fishing, the key conceptual advance is to acknowledge
that any one vessel is embedded in a complex spatial system comprised of all the other vessels in
its proximity. The expectation is that the spatial behavior of a given vessel is determined by their
major objectives (e.g. moving from A to B, finding and catching fishing, etc.), but also by the
proximity and behavior of nearby vessels. If a nearby vessel goes dark and commits an illegal act,
then those nearby legally operating (and visible) vessels may respond anomalously, for instance,
they may move in such a way as to avoid any trouble.
3
For early detection and prediction of IUU fishing, this means not just looking for anomalous
behaviors of any one vessel (i.e. our current abilities to detect spoofing), but in analyzing the
anomalous behavior of whole fleets. A useful analogy is to visible matter in the universe, whose
movement through space is in large part determined by unobserved dark matter. On the seas, the
movement of visible fleets is determined in part by the actions of unobserved dark fleets. Thus, an
approach based on the analysis of anomalous multiscale spatial patterns of visible fleets, as they react
to nearby but unobserved vessels committing illegal activities, could result in an entirely new way
to detect and even predict IUU fishing. Our goal here was to develop such an approach, analyzing
AIS data using new multiscale anomaly detection algorithms inspired by similar approaches applied
to complex systems. We applied our algorithms to vessel location data for the Patagonia shelf, a
highly productive fisheries region, and reveal anomalous precursor signals for several IUU events in
the area. These results offer a promising new path to pre-empting illegal behaviors at sea, with the
ultimate goal of diminishing IUU activity worldwide, and achieving the Sustainable Development
Goal 14: Life Under Water.
METHODS
In order to develop new algorithms for detecting and predicting IUU fishing, we synthesized AIS
data for a specific region of the world -- the Patagonia Shelf (see Figure 1 for a map of the region).
The Patagonia shelf is one of the world's most productive areas for fisheries, and fleets from all
over the world come to harvest many species (Bisbal 1995). Major fisheries include the illex squid,
southern blue whiting and blue grenadier / hoki fisheries, and fleets that dominate the region include
those from Argentina, the UK (through the Falklands Islands), China, and Spain. Indeed, in the
last decade or so, the presence of Chinese fishing fleets has increased substantially (in line with their
Ocean Silk Road initiative; Sutter 2012). Along with increased fishing in general, the Patagonia
Shelf has also experienced increased incidences of illegal fishing, in particular by Chinese fishing
vessels. There have been a number of high-profile incidences where Chinese fishing vessels have
been found to be fishing illegally, for example by the Argentine navy, and then either chased and
even destroyed. To develop new abilities to detect and predict IUU activities, the Patagonia shelf
and these few high profile IUU events serve as important case-studies with which to develop the
4
new methodology.
Fishing Vessel Location Data
Global AIS data for the period 2016-2018 were obtained through Global Fishing Watch1. AIS data
were originally designed for collision avoidance at sea; vessels equipped with an AIS transponder
transmit their position and vessel identification data, such as maritime mobile security information
number (MMSI), call sign, ship type, speed and course over ground, and other information to ships
nearby carrying similar transponders as well as to receiving ground stations and low-orbit satellites.
Signal transmission frequencies vary with speeds between a few seconds and a few minutes. These
high-resolution tracking data are synthesized by ORBCOMM, which were then obtained through
Global Fishing Watch. For this analysis of IUU fishing, we subsetted these global data spatially to
the Patagonia Shelf (Fig. 1) and temporally to specific historic IUU events in this area (see Table
1 for a description of these events).
The AIS data required significant "cleaning" for it to be useable. Specifically, a significant
fraction (12-20%) of vessels were found to spoof their locations. That is specific vessel locations were
observed to "jump" unrealistic distances, indicating anomalous AIS reporting. Another observed
issue was multiple (non)unique identifiers (MMSI) reporting across the region (i.e. the impossible
case where the same vessel is in two locations at the same time). To remove these erroneous data
points, vessels with speeds greater than 32 kilometers per hour were removed. This threshold was
calculated as the 99th percentile of the vessel speed distribution calculated over the whole region for
the whole year of 2016. Vessels reporting locations on land, at a port or zero kilometers from shore
were also removed from the data, as well as vessels that did not travel more than one kilometer per
day. The remaining data were then interpolated to an hourly time-step to remove the intermittent
reporting times by vessels. Although these cleaning steps removed a sizable fraction of the original
data, for each IUU case-study on the Patagonia Shelf, there remained a usable number of vessel
locations (see Table 1, last column).
1https://globalfishingwatch.org/datasets-and-code/
5
Multiscale Fleet Spatial Behavior
To quantify changes in the spatial behavior of entire fleets, we first calculated the "relationship"
between vessels as simply their distances from one another. More specifically, for a given time (i.e.
an hourly time-point in the processed data), for each vessel, the Haversine distance was calculated
to all other vessels in the area (Fig. 1A; for clarity lines identify the nearest three vessels). Overall
vessels and for a given time, this results in an NxN Haversine distance matrix, where N is the
number of vessels in the region. From this distance matrix, a probability density function (PDF) is
computed using kernel density estimation (e.g. see Fig. 1B). Overall time periods, this leads to a
set of between vessel distance distributions, each summarizing the multiscale spatial organization of
fishing vessels on the Patagonia shelf at a given time. These distributions hold an incredible amount
of information that we utilize to develop spatial anomaly indexes indicative of IUU activity.
To monitor the spatial organization of fleets over time, as they potentially respond to nearby
illegal activities, we imagine a situation in which a real-time analysis is required. As new AIS
data is made available, there is a need to compute a spatial anomaly index for that time period.
To allow for this, we perform a retrospective analysis wherein for a given leading time period, it's
between vessel distance distribution is compared with those from a specific lagged time period. This
lagged time period is dependent on two factors: 1) the inherent memory of the system and 2) the
typical timescale of IUU activities. The former is important because marine social-ecological systems
are inherently non-stationary. As a consequence, an "anomaly" should be relative to a recent time
period. The latter is important because if too short a timescale is chosen then a relatively prolonged
period of IUU activity will be diagnosed as "normal". For the 2016 and 2018b IUU events, this
lagged time period was chosen as 8 days and for the 2018a event, 3 days. These choices were made
by iteratively exploring the results of our analysis and choosing time periods that best captured the
non-stationarity of the system, as well as the timescales of each IUU event.
Once the lagged timescale was chosen, each between vessel distance distribution was compared
with those from the respective lagged time period. This comparison was made using the Kolmogorov-
Smirnov (KS) statistic, which measures the distance between two PDFs. The result is a set of
(lagged) KS statistics for each time period. To summarize this lagged information, we computed
various moments over these sets. In particular, we computed the mean lagged KS statistic per time
6
period, as well as the kurtosis. These each provide information about how anomalous a given time
period is based upon the geospatial organization of vessels in the region.
The last step is to compute the significance of these anomaly indexes. We do so by repeating
the calculation of the two anomaly indexes (the mean and kurtosis of the lagged KS statistic sets)
but for three null periods. These null periods are those immediately after the 2016 and 2018 IUU
events. They were chosen because they are the least likely to have IUU events: the challenge here
is to precisely identify times when no illegal activities were conducted, which is difficult because
reporting of illegal activities is not accurate, and we could not simply choose time periods at random.
As a consequence, we chose the periods after the 2016 and 2018 events because after the preceding
naval/coast-guard intervention, any further illegal activity would be highly unlikely during these
periods. With these null periods, significant anomalies were then computed as those greater than
the 99th percentile of the null distributions.
RESULTS
Between vessel distance distributions change over time (see Fig. 2A for the IUU event that occurred
in March 2016, where the Lu Yan Yuan Yu 010 was caught fishing illegally and ultimately scuttled
by the Argentine coast guard, and 2B and C for results for the two other case studies in 2018).
Between vessel distance distributions generally have a mode at short spatial distances (<50 km;
this is identified by the red bands across time in each panel in Figure 2). This is the spatial scale of
local fleets, as can be seen on the map in Fig. 1A, which aggregate around specific fishing hotspots
(Sabatini et al. 2012). In addition to this local structure, there is spatial structure in the tails of
these between vessel distance distributions, and changes through time can be observed, potentially
revealing anomalous spatial behaviors in legally operating vessels (those that transmit AIS data) as
they respond to nearby vessels committing illegal fishing (Fig. 2; red lines denote the approximate
time of IUU activity). However, from visual inspection of these between vessel distributions through
time, it is not immediately clear if there is a spatial signature relating to IUU activity.
To quantitatively and objectively find a signal of IUU activity we compared every between vessel
distance distribution with those from a lagged set, using the Kolmogorov-Smirnov statistic. The
lagged KS statistics through time, for each IUU case-study, can be seen in Figure 3. In each we
7
see a strong signal of the IUU events: the KS statistic rises around the time of each event (Fig. 3,
black vertical lines), identifying that as these events occur, the spatial organization of vessels in the
region becomes quite distinct from previous times. Notably, there is nuance to these changes, with
the 2016 event producing a pronounced and relatively long period of elevated KS statistic values,
relative to the two 2018 events. Interestingly, this rise in the KS statistic in 2016 occurs after the
IUU event, whereas there appears to be an elevated signal proceeding the events in 2018, especially
2018a (Fig. 3B).
For every time period, the lagged KS statistic sets were summarized using the mean and kurtosis
moments. These define two spatial anomaly indexes (Figures 4 and 5 respectively). The mean
anomaly index identifies each IUU event quite clearly (Fig. 4): for each, there are elevated levels of
this anomaly index during the period of illegal activity. Interestingly, for the 2016 event the mean
anomaly index peaks after the reported date of 2016 IUU event; for the 2018a event, the anomaly
peaks approximately at the time of the IUU event, and for the 2018b event, the anomaly peak
occurs before the event. This suggests that anomalous spatial behavior can precede the ultimate
intervention of the illegal activity.
This is mirrored by the second spatial anomaly index: the kurtosis of the lagged KS statistic sets
(Fig. 5). This kurtosis anomaly index shows an even clearer precursor signal for all case-studies.
Furthermore, for the 2018b event this index identifies anomalous geospatial patterns in times well
before the period IUU activity. This is evidence to suggest that while the other precursor signals
might be indicative of the impact of a coast-guard intervention on the geospatial organization of
legally operating and visible fleets, these early-warning signals seen in 2018b may be indicative of
the response of the "good" vessels to that actual IUU activity committed by dark fleets.
DISCUSSION
To detect IUU fishing quickly, and even make predictions of where it is likely to happen, a new data
analytic approach was developed based on concepts from complex systems, specifically multiscale
anomaly detection. The approach uses a novel anomaly detection algorithm to identify spatial
behaviors exhibited by legally operating and visible (through the transmission of AIS location data)
vessels, as they respond to nearby illegal activities. Specifically, changes in between vessel distance
8
distributions were quantified using the Kolmogorov-Smirnov statistic. Then, a moving window was
used to emulate a real-time situation in which an anomaly index âĂŞmoments from the lagged KS
statistic setsâĂŞ is computed as new data arrives. Two anomaly indexes were explored: the mean
and kurtosis of the lagged KS statistic sets. These indexes identified anomalous periods, based on
the geospatial organization of vessels in the Patagonia shelf region, occurring before, during and after
the time of known historical IUU events. Importantly, precursor signals were identified, suggesting
the possibility that legally operating vessels do respond anomalously in response to nearby IUU
activity. This highlights an opportunity to advance predictive data analytics for IUU activities at
sea, globally and in near real-time, and not just retrospective analyses. This has immediate utility
marine conservation and fisheries management.
This method for IUU detection is distinct from other approaches, which have to date focused
solely on the spatial dynamics of vessels one at a time. In contrast, our approach makes use of
the spatial characteristics of whole fleets and assumes that any illegal activity will be revealed by
the anomalous spatial behavior of nearby vessels. The utility of this approach was verified for the
Patagonia Shelf, a highly productive and busy area for fisheries. We chose this area for a few
reasons: first, this area has experienced in the past and continues to suffer chronic exposure to IUU
fishing. Second, this is also a congested oceanic area, meaning that at any given time there are
numerous vessels both fishing, shipping and recreational operating in the area. This is important
because for our spatial anomaly detection algorithm to work, there needs to be vessels proximate to
the IUU event. This is, on the one hand, an opportunity, for most of the world's fisheries operate
in only a fraction of the world's oceans (albeit a large fraction), and recent work has shown that
in most of these fishing regions, there are often many vessels from numerous nations (Kroodsma
et al. 2018). However, this is also a major challenge, for there remain many areas of the world's
oceans where IUU activity occurs in relatively isolated and remote locations. For example, recent
work has highlighted the high seas (i.e. areas far from the exclusive economic zones) as areas where
illegal activities occur constantly (Cullis-Suzuki and Pauly 2010). This means that there exists
a key spatial scale at which people/vessels do not react to nearby illegal activities, and at which
our spatial anomaly detection algorithm will cease to be useful. This spatial scale is yet unknown,
and will also be location and event specific, highlighting further need to examine the spatial and
temporal scales of the spatial behavior of vessels.
9
New and improved methods for detecting and predicting IUU fishing will help us achieve Sus-
tainable Development Goal 14 (life below water) in one major way; it will improve the accuracy of
our estimates of aggregate fishing pressure on fish stocks. Currently, impacts of IUU fishing can be
accounted for through indirect means (Pauly and Zeller 2016), and at coarse spatial scales (i.e. at
the scale of exclusive economic zones). Even though limited, results from these assessments suggest
that globally IUU fishing accounts for 20% of total fish catch (Sumaila et al. 2006; Shaver and
Yozell 2018). This information has motivated nations to combat illegal fishing, and the next step
is to improve the operational capacity for (maritime) law enforcement groups (i.e. coast guards)
through finer-resolution data products. Most current analyses of vessel location data provide infor-
mation on potential dark-fleet activity after it has occurred. In order to curb illegal fishing, and
as a consequence overharvesting of fish stocks, pre-emptive capacity is required. This is what our
analysis provides, and although only demonstrated for the Patagonia shelf for a limited number of
case studies, vessel location data are now global, and hence, there is an opportunity to monitor
anomalous spatial behaviors across the world's oceans. Before doing so, two major caveats to note
are 1) we only performed our analysis on three incidences of illegal fishing, this is well below what
would normally be necessary to verify the accuracy and precision of an algorithm and 2) our ap-
proach does not confirm IUU activity, rather it is suggestive of dark fleet IUU activity, which can
be used to direct the attention of coast guards and navies for example.
An important benefit of our approach is that it requires only minimal spatial information,
specifically the algorithm only needs the location of vessels through time. Many current approaches
to detecting IUU fishing rely on additional information like the vessel Maritime Mobile Service
Identity (MMSI) number and the historical trajectory of vessels. While a relatively straightforward
goal, in practice it is very difficult tracking vessels from raw AIS data. Spoofing is rife (by our
estimates, the raw AIS data that we worked with included 12-20% of vessels spoofing daily through
changing their MMSI number). Methods have been applied to deal with this (e.g. Patroumpas et al.
2017), and some successes have been made, but it remains a challenge. Another route to detecting
IUU fishing is, once a dark fleet vessel has been identified (by their MMSI number say), to then
trace their spatial history and track them forward in time. The full spatiotemporal trajectory of
vessels reveals rich information about their past and present activities, and this has been used to
great effect to help in the detection of IUU fishing and can be used to capture dark fleet vessels
10
when they come to port (Miller et al. 2016). However, there are again challenges to associating with
tracking vessels through time (primarily because of spoofing). Our approach needs none of this.
With simply the location of vessels in a given spatial region at a given time, we can infer anomalous
multiscale fleet behavior, which we show can be associated with illegal activities. This approach is
agnostic to vessel identity and a vessel's spatial history. As a consequence, the information mined
from these data makes the least assumptions about the vessels and regions being studied and is
thus arguably more robust.
Monitoring the changing multiscale spatial behavior of fishing fleets has utility beyond detecting
and predicting illegal fishing. A variety of bad things happen at sea, including narcotics, arms and
human trafficking (Tickler et al. 2018). There is active slavery in many areas of the world's oceans,
and geopolitical machinations are implemented through both official (naval) and unofficial actors
(e.g. fishing vessels; Fravel 2011). All these kinds of activities happen in and around vessels
operating legally by "good" actors. Furthermore, the level of information sharing and contextual
knowledge of skippers and crew on vessels is known to be high (Johannes et al. 2000), meaning that
they know what is happening around them. Harnessing this knowledge-capital is an opportunity for
dealing with maritime illegal activities broadly defined: given this analysis here of illegal fishing, it is
likely that other illegal activities committed by "dark vessels" will lead to some form of anomalous
spatial behavior in other nearby vessels. Indeed, it would be fascinating to create a typology of
anomalous spatial behaviors, with different archetypes associated with different illegal activities.
The typology could, for example, include descriptions of whether vessels group together, or spread
apart, or create spatial sub-modules, and if so, if there is a typical spatial scale of clustering. This
information could inform heuristics for faster identification of IUU activity; i.e.
if observed fleets
are exhibiting spatial behaviors X and Y, then illegal activity Z could be occurring nearby.
An important and obvious next step in our approach to detecting and predicting IUU activity
is to improve upon the algorithm. Between vessel distributions do well at capturing the spatial
organization of fleets, however, there are many other ways in which this could have been done. From
a mathematical perspective, this simple first step is to put a metric/weight on the edges defining
interactions between vessels. Spatial distance is an obvious choice, but other metrics could have been
derived from correlations in heading or velocity for example. With different measures of association
between vessels, different spatial behavioral anomalies could be detected/classified. Furthermore,
11
methods from the study of complex systems, specifically collective behavior in nature (Rosenthal
et al. 2015) and people (Cattuto et al. 2010), have used such measures of association between
agents comprising the system, in conjunction with dimensional reduction/denoising algorithms, to
identify signals of change otherwise lost in the noise (Jolliffe 2011; Coifman and Lafon 2004). These
approaches have been applied to big spatial datasets to find a signal of anomalous behaviors, and it
is likely a fruitful (and key) next step in the continued development of IUU detection and prediction
algorithms.
CONCLUSION
To conclude, combating IUU fishing is key to improving the sustainability of fisheries around the
world, and to secure the health of our oceans now and in the future. Important secondary outcomes
are diminished geopolitical tension and economic impacts on local economies. Current IUU mon-
itoring relies on detecting spoofing in vessel location records, which is retrospective and confined
to identifying anomalous spatial behavior of vessels one at a time. Both are useful but limited in
their ability to inform enforcement agencies like coast guards about the occurrence of IUU activity.
To overcome these challenges, we have developed an approach to IUU detection, and even predic-
tion, that examines the multiscale spatial behavior of whole fleets, those groups of vessels that are
visible and are legally operating, as they respond anomalously to nearby dark fleet activity. We
have shown that this approach identifies consistent precursor signals of IUU activity for a number
of known IUU events on the Patagonia shelf, as well as clear identification of the ultimate interven-
tion by the coast-guard. This is a promising new tool for detecting, predicting and deterring IUU
fishing. Future research will focus on expanding the analysis to other geographic regions, and for
other illegal activities, not just fishing, for example, narcotics trafficking and piracy. If the "good"
vessels and fleets continually exhibit anomalous multiscale behaviors across regions and events, then
it is possible to create near real-time and global indicators of IUU activity, broadly defined. This
new information will improve enforcement of maritime laws, and ultimately the sustainability of
our seas.
12
References
Béné, C., R. Arthur, H. Norbury, E. H. Allison, M. Beveridge, S. Bush, L. Campling, W. Leschen,
D. Little, D. Squires, et al. (2016). Contribution of fisheries and aquaculture to food security and
poverty reduction: assessing the current evidence. World Development 79, 177 -- 196.
Bisbal, G. A. (1995). The southeast South American shelf large marine ecosystem: Evolution and
components. Marine Policy 19 (1), 21 -- 38.
Cabral, R. B., J. Mayorga, M. Clemence, J. Lynham, S. Koeshendrajana, U. Muawanah, D. Nu-
groho, Z. Anna, A. Ghofar, N. Zulbainarni, et al. (2018). Rapid and lasting gains from solving
illegal fishing. Nature ecology & evolution 2 (4), 650.
Cattuto, C., W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, and A. Vespignani (2010).
Dynamics of person-to-person interactions from distributed rfid sensor networks. PloS one 5 (7),
e11596.
Coifman, R. and S. Lafon (2004). Diffusion maps: Applied and computational harmonic analysis.
Cullis-Suzuki, S. and D. Pauly (2010). Failing the high seas: a global evaluation of regional fisheries
management organizations. Marine Policy 34 (5), 1036 -- 1042.
de Souza, E. N., K. Boerder, S. Matwin, and B. Worm (2016). Improving fishing pattern detection
from satellite AIS using data mining and machine learning. PloS one 11 (7), e0158248.
Ford, J. H., D. Peel, D. Kroodsma, B. D. Hardesty, U. Rosebrock, and C. Wilcox (2018). Detecting
suspicious activities at sea based on anomalies in automatic identification systems transmissions.
PloS one 13 (8), e0201640.
Fravel, M. T. (2011). China's strategy in the South China Sea. Contemporary Southeast Asia: A
Journal of International and Strategic Affairs 33 (3), 292 -- 319.
Gai, P. and S. Kapadia (2010). Contagion in financial networks. Proceedings of the Royal Society
A: Mathematical, Physical and Engineering Sciences 466 (2120), 2401 -- 2423.
Johannes, R. E., M. M. Freeman, and R. J. Hamilton (2000). Ignore fishers' knowledge and miss
the boat. Fish and Fisheries 1 (3), 257 -- 271.
13
Jolliffe, I. (2011). Principal component analysis. Springer.
Kroodsma, D. A., J. Mayorga, T. Hochberg, N. A. Miller, K. Boerder, F. Ferretti, A. Wilson,
B. Bergman, T. D. White, B. A. Block, et al. (2018). Tracking the global footprint of fisheries.
Science 359 (6378), 904 -- 908.
Levin, S. A. (1998). Ecosystems and the biosphere as complex adaptive systems. Ecosystems 1 (5),
431 -- 436.
Litt, B. and J. Echauz (2002). Prediction of epileptic seizures. the LANCET Neurology 1 (1), 22 -- 30.
Lubchenco, J. and K. Grorud-Colvert (2015). Making waves: The science and politics of ocean
protection. Science 350 (6259), 382 -- 383.
Miller, D. D., U. R. Sumaila, D. Copeland, D. Zeller, B. Soyer, T. Nikaki, G. Leloudas, S. T.
Fjellberg, R. Singleton, and D. Pauly (2016). Cutting a lifeline to maritime crime: marine
insurance and IUU fishing. Frontiers in Ecology and the Environment 14 (7), 357 -- 362.
Miller, N. A., A. Roan, T. Hochberg, J. Amos, and D. A. Kroodsma (2018).
Identifying global
patterns of transshipment behavior. Frontiers in Marine Science 5, 240.
Motter, A. E. (2004). Cascade control and defense in complex networks. Physical Review Let-
ters 93 (9), 098701.
Österblom, H. and Ö. Bodin (2012). Global cooperation among diverse organizations to reduce
illegal fishing in the Southern Ocean. Conservation biology 26 (4), 638 -- 648.
Patroumpas, K., E. Alevizos, A. Artikis, M. Vodas, N. Pelekis, and Y. Theodoridis (2017). Online
event recognition from moving vessel trajectories. GeoInformatica 21 (2), 389 -- 427.
Pauly, D. (2018). A vision for marine fisheries in a global blue economy. Marine Policy 87, 371 -- 374.
Pauly, D. and D. Zeller (2016). Catch reconstructions reveal that global marine fisheries catches
are higher than reported and declining. Nature communications 7, 10244.
Petrossian, G. A. (2018). A micro-spatial analysis of opportunities for IUU fishing in 23 Western
African countries. Biological Conservation 225, 31 -- 41.
14
Pramod, G., K. Nakamura, T. J. Pitcher, and L. Delagran (2014). Estimates of illegal and unre-
ported fish in seafood imports to the USA. Marine Policy 48, 102 -- 113.
Rosenthal, S. B., C. R. Twomey, A. T. Hartnett, H. S. Wu, and I. D. Couzin (2015). Revealing the
hidden networks of interaction in mobile animal groups allows prediction of complex behavioral
contagion. Proceedings of the National Academy of Sciences 112 (15), 4690 -- 4695.
Sabatini, M., R. Akselman, R. Reta, R. Negri, V. Lutz, R. Silva, V. Segura, M. Gil, N. Santinelli,
A. Sastre, et al. (2012). Spring plankton communities in the southern Patagonian shelf: Hy-
drography, mesozooplankton patterns and trophic relationships. Journal of Marine Systems 94,
33 -- 51.
Shaver, A. and S. Yozell (2018). Casting a wider net: The security implications of illegal, unreported,
and unregulated fishing.
Sumaila, U. R., J. Alder, and H. Keith (2006). Global scope and economics of illegal fishing. Marine
Policy 30 (6), 696 -- 703.
Sutter, R. G. (2012). Chinese foreign relations: Power and policy since the Cold War. Rowman &
Littlefield.
Tickler, D., J. J. Meeuwig, K. Bryant, F. David, J. A. Forrest, E. Gordon, J. J. Larsen, B. Oh,
D. Pauly, U. R. Sumaila, et al. (2018). Modern slavery and the race to fish. Nature communica-
tions 9 (1), 4643.
United Nations Department of Economic and S. Affairs (2016). The Sustainable Development Goals
Report 2016.
Worm, B. and T. A. Branch (2012). The future of fish. Trends in ecology & evolution 27 (11),
594 -- 599.
15
Table 1: Description of Patagonia Shelf IUU Events
Date
Fleets
involved
Context
Data
March
15, 20161
China,
Argentina
A Chinese fishing vessel, the Lu Yan
Yuan Yu 010, was fishing in Ar-
gentina's exclusive economic zone.
The Argentina Navy fired warning
shots which resulted in the Chinese
fishing vessel attempting to crash
with the Navy vessel. The Argen-
tine Navy opened fire and sunk the
vessel. Four members were rescued
by the Navy while the others were
rescued by other Chinese fishing ves-
sels.
February
2, 20182
Spain,
Argentina
A Spanish fishing vessel, the Playa
Pesmar Uno, was intercepted by the
Argentina Navy for illegally oper-
ating in Argentina's EEZ which re-
sulted in a heavy fine.
February
21, 20183
China,
Argentina
The Argentina Navy warned a Chi-
nese Fishing Vessel, the Jing Yuan
626, to halt because they were op-
erating inside their exclusive eco-
nomic zone. The vessel ignored the
warning and escaped into interna-
tional waters. Additional Chinese
fishing vessels attempted to collide
with the Navy vessel to intervene in
the chase. The Argentina Navy was
unable to capture the Chinese fish-
ing vessels and issued orders for the
capture of the five vessels.
The time scale includes observa-
tions from March 1 - March 31
2016 and the spatial scale isolates
the ocean region outside of Puerto
Madryn along the Argentina coast.
The final subset of the data pro-
vides 749 unique vessels in 1.263
million square kilometers (1,000.76
km x 1,262.30 km) from March 1 -
March 31 2016 for a balanced panel
of 2,786,280 observations.
The time scale includes observa-
tions from January 15 - February 15
2018 and the spatial scale isolates
the ocean region outside of Puerto
Madryn along the Argentina coast.
The final subset of the data pro-
vides 777 unique vessels in 1.263
million square kilometers (1,000.76
km x 1,262.30 km) from January 15
- February 15 2018 for a balanced
panel of 2,983,680 observations.
The time scale includes observa-
tions from February 5 - March 10
2018 and the spatial scale isolates
the ocean region outside of Puerto
Madryn along the Argentina coast.
The final subset of the data pro-
vides 828 unique vessels in 1.263 mil-
lion square kilometers (1,000.76 km
x 1,262.30 km) from February 5 -
March 10 2018 for a balanced panel
of 3,378,240 observations.
1 www.cnn.com/2016/03/15/americas/argentina-chinese-fishing-vessel/index.html
2 www.laht.com/article.asp?CategoryId=14093&ArticleId=2450374
3 www.reuters.com/article/us-argentina-china-fishing/argentina-calls-for-capture-of-five-chinese-fishing-boats-idUSKCN1GK35T
16
Figure 1: The map shows the location for each vessel on March 15, 2016 at 12PM, with lines connecting nearest five
neighbors (chosen for visual clarity). This highlights the spatial network of interactions defining a complex fisheries
system. B) A between vessel distance distribution (km) for all vessels. These between vessel distance distributions
are used to characterize the multiscale spatial organization of fleets operating in this region. Essentially, changes in
between vessel distance distributions reveal IUU events.
17
(A)2016−03−15 12:00:00(B)0.0000.0010.0020.00302505007501000Distance (km)ProbabilityFigure 2: Between vessel distance probability density functions (color scale) through time for three time periods
where illegal fishing occurred on the Patagonia shelf: 2016, 2018a and 2018b (see Table 1 for details of these events;
red lines in each panel). These between vessel distance distributions have a distinct mode at short distances. This
identifies the scale of local fleets in the region. But there exist other minor modes too, identifying smaller fleets
operating in the region. Notably, these distributions change shape over time. These changes in the multiscale
geospatial organization of vessels in the region can be used to identify anomalous behaviors indicative of illegal
activities.
18
Figure 3: A moving window is used to compare a given time period, based on its between vessel distance
distribution (the horizontal axis), with those from a specific lagged period (the vertical axis). The comparison is
made using the Kolmogorov-Smirnov (KS) statistic (i.e. the color scale). The KS statistic essentially captures how
different a given time period is, based on the geospatial organization of vessels, compared to other lagged times. For
each IUU event (black vertical lines), we observe an increase in the lagged KS statistic. This highlights that the
geospatial organization of vessels in and around an illegal activity is relatively anomalous.
19
Figure 4: Moments from the lagged KS statistic sets can be used to create anomaly indexes. Here, the mean
lagged KS statistic is plotted over time. For each IUU event (vertical red lines) this anomaly index peaks immediately
before, during and after the events. "Significant" anomalous times (red markers) are identified by comparing values to
those created from null periods where IUU activities were suspected to not have occurred. These significant anomalies
again all fall on the times when IUU events occurred, highlighting that this method can be used to identify when
these kinds of events occurred. Importantly, precursor signals are observed, suggesting that predicting IUU activities
may be possible.
20
Figure 5: Moments from the lagged KS statistic distributions can be used to create anomaly indexes. Here,
the kurtosis of the lagged KS statistic sets is plotted over time. "Significant" anomalous times (red markers) are
identified by comparing values to those created from null periods where IUU activities were suspected to not have
occurred. This anomaly index reveals strong precursor signals before all IUU events. This signal may be indicative
of the naval/coast-guard intervention, but potentially more powerful, it may also be indicative of IUU activity itself,
especially in (B) the 2018a case-study, where the precursor anomalies occur well before the intervention.
21
|
1811.07799 | 1 | 1811 | 2018-11-19T16:55:30 | Distributed Learning of Average Belief Over Networks Using Sequential Observations | [
"cs.MA",
"cs.LG",
"eess.SY"
] | This paper addresses the problem of distributed learning of average belief with sequential observations, in which a network of $n>1$ agents aim to reach a consensus on the average value of their beliefs, by exchanging information only with their neighbors. Each agent has sequentially arriving samples of its belief in an online manner. The neighbor relationships among the $n$ agents are described by a graph which is possibly time-varying, whose vertices correspond to agents and whose edges depict neighbor relationships. Two distributed online algorithms are introduced for undirected and directed graphs, which are both shown to converge to the average belief almost surely. Moreover, the sequences generated by both algorithms are shown to reach consensus with an $O(1/t)$ rate with high probability, where $t$ is the number of iterations. For undirected graphs, the corresponding algorithm is modified for the case with quantized communication and limited precision of the division operation. It is shown that the modified algorithm causes all $n$ agents to either reach a quantized consensus or enter a small neighborhood around the average of their beliefs. Numerical simulations are then provided to corroborate the theoretical results. | cs.MA | cs | Distributed Learning of Average Belief
Over Networks Using Sequential Observations (cid:63)
Kaiqing Zhang, Yang Liu, Ji Liu, Mingyan Liu, Tamer Ba¸sar
8
1
0
2
v
o
N
9
1
]
A
M
.
s
c
[
1
v
9
9
7
7
0
.
1
1
8
1
:
v
i
X
r
a
Abstract
This paper addresses the problem of distributed learning of average belief with sequential observations, in which a network
of n > 1 agents aim to reach a consensus on the average value of their beliefs, by exchanging information only with their
neighbors. Each agent has sequentially arriving samples of its belief in an online manner. The neighbor relationships among
the n agents are described by a graph which is possibly time-varying, whose vertices correspond to agents and whose edges
depict neighbor relationships. Two distributed online algorithms are introduced for undirected and directed graphs, which are
both shown to converge to the average belief almost surely. Moreover, the sequences generated by both algorithms are shown
to reach consensus with an O(1/t) rate with high probability, where t is the number of iterations. For undirected graphs, the
corresponding algorithm is modified for the case with quantized communication and limited precision of the division operation.
It is shown that the modified algorithm causes all n agents to either reach a quantized consensus or enter a small neighborhood
around the average of their beliefs. Numerical simulations are then provided to corroborate the theoretical results.
1 Introduction
Considerable interest in developing algorithms for dis-
tributed computation and decision making problems of
all types has arisen over the past few decades, includ-
ing consensus problems [2], multi-agent coverage prob-
lems [3], power distribution system management [4, 5],
and multi-robot formation control [6]. These problems
have found applications in different fields, including sen-
sor networks [7], robotic teams [6], social networks [8],
internet of things [9], and electric power grids [4, 10].
For large-scale complex networks, distributed compu-
tation and control are especially promising, thanks to
their attractive features of fault tolerance and cost sav-
ing, and their ability to accommodate various physical
constraints such as limitations on sensing, computation,
and communication.
(cid:63) This paper builds on some earlier results presented at
the 2017 American Control Conference [1]. Corresponding
author: Kaiqing Zhang.
1 K. Zhang and T. Ba¸sar are with the Department of Elec-
trical and Computer Engineering at University of Illinois at
Urbana-Champaign ({kzhang66, basar1}@illinois.edu).
Y. Liu is with the School of Engineering and Applied Sciences
at Harvard University and the Department of Computer Sci-
ence and Engineering at University of California, Santa Cruz
([email protected]). J. Liu is with the Department of Elec-
trical and Computer Engineering at Stony Brook University
([email protected]). M. Liu is with the Electrical En-
gineering and Computer Science Department at University
of Michigan ([email protected]).
Among the distributed control and computation prob-
lems, the consensus problem [2, 11] is one of the most
basic and important task. In a typical consensus pro-
cess, the agents in a given group all try to agree on
some quantity by communicating what they know only
to their neighboring agents. In particular, one impor-
tant type of consensus process, called distributed aver-
aging [12], aims to compute the average of the initial
values of the quantity of interest to the agents. Exist-
ing work has developed elegant solutions to such con-
ventional distributed averaging problems, such as lin-
ear iterations [13]; gossiping [14, 15]; push-sum [16], also
known as weighted gossip [17]; ratio consensus [18]; and
double linear iterations [19].
In the present work, we extend the conventional dis-
tributed averaging problem setting to the case where
each distributed agent has its local belief/measurement
arriving sequentially. In the previous studies of dis-
tributed averaging, each agent i was assumed to hold
xi(1) at initial time t = 1, which corresponds to the
true belief, and the subsequent averaging and commu-
nication processes are carried out entirely over xi(1),
i ∈ {1, 2, . . . , n}. In contrast, we consider here the case
where a series of local observations, denoted by xi(t),
t ∈ {1, 2, . . .}, is available to each agent i, which are
used to estimate the unknown true belief ¯xi. We refer
to this setting as distributed learning of average belief
using sequential observations.
Consider the motivating example of a sensor network,
where each sensor needs to take a sequence of local mea-
Preprint Accepted to Automatica
20 November 2018
surements in order to obtain an accurate estimate of a
local mean (or belief as referred to earlier) due to envi-
ronmental and instrumentation noises; at the same time
we have the goal of estimating the global/field mean
through message exchange among sensors. It is clear that
in this case there are multiple averaging processes taking
place simultaneously, one globally among sensors, and a
local one at each sensor. This is the main difference be-
tween our problem and traditional distributed averaging
which only focuses on the global averaging process by
assuming that the local mean is already available.
In general, the setting considered here belongs to the
family of problems on distributed learning and control.
We note that the distributed learning settings with noisy
observations have also been investigated in several previ-
ous studies, e.g. [7, 20]. The key differences between our
work here and those studies are the following: (1) in our
formulation, uncertainties are not modeled as coming
from external noise sources independent of the sample
observations, as the case in the previous study [20]; (2)
our algorithms are not developed based on a distributed
estimation framework as in [7], where the observability
of the system need to be assumed. Therefore, we note
that there are multiple averaging processes going on si-
multaneously in our setting -- a global one among the
agents, and a local one at each agent. Similar ideas have
been exploited in [21] and [22] for two different prob-
lems, distributed inference and estimation, respectively.
In the classical literature on distributed averaging and
consensus, however, only the global averaging process is
considered since the local mean is already available. It
would be desirable to embed the multiple underlying av-
eraging processes here into the same updating procedure
as in the classical distributed averaging process, with-
out much modification. In particular, we should manage
to integrate the new measurements/samples that occur
in an online fashion into the classical distributed aver-
aging process, which serves as the goal of the present
work. To this end, we introduce two distributed online
algorithms and formally establish their convergence and
convergence rates.
To implement the algorithms, the agents are required
to send, receive, as well as evaluate the running aver-
age of local beliefs with infinite precision. However, in a
realistic network of agents, messages with only limited
length are allowed to be transmitted among agents due
to the capacity constraints of communication links. This
is usually referred to as quantized communication in dis-
tributed averaging, see previous works on reaching quan-
tized consensus under such quantization [23 -- 25]. Addi-
tionally, in the distributed belief averaging algorithms
considered here, limited precision of belief averages may
occur due to the division operation in the local update
at each agent. This is similar but more involved than
the previous works on distributed averaging with inte-
ger/quantized values at each agent [11, 26, 27]. We thus
discuss the convergence of the proposed algorithms in
the presence of these two quantization effects. We can
show that under certain conditions, the quantized up-
date can converge to a small neighborhood of the actual
average belief with bounded errors, even with such joint
quantization effects.
The main contributions of this paper are threefold.
First, we propose a new setting of distributed averaging
using sequential observations, and develop two easily-
implementable distributed algorithms for undirected
and directed graphs, respectively. Second, we establish
almost sure convergence and polynomial convergence
rate with high probability for both algorithms. In ad-
dition, we investigate the effects of quantized commu-
nication and limited precision of the division operation
on the algorithm for undirected graphs, and provide a
convergence analysis under certain conditions.
This paper builds on some earlier results presented in [1],
but presents a more comprehensive treatment of the
problem. Specifically, the paper establishes the conver-
gence rate for the algorithm over directed graphs, and
characterizes the effects of two types of quantization on
the algorithm over undirected graphs, which were not
included in [1].
The rest of the paper is organized as follows. The prob-
lem is formulated and stated in Section 2. Two algo-
rithms are presented to solve the problem over undi-
rected and directed graphs, in Section 3, along with re-
sults on their convergence rates. In Section 4, the con-
vergence results for the algorithm under system quanti-
zation are provided, for both static and dynamic graphs.
The analysis of the algorithms and proofs of the main
results are given in Section 5. The theoretical results are
verified by numerical simulations in Section 6, followed
by conclusions in Section 7.
2 Problem Formulation
Consider a network consisting of n > 1 agents, with the
set of agents denoted by N = {1, 2,··· , n}. The neigh-
bor relationships among the n agents are described by
a time-varying n-vertex graph N(t) = (N ,E(t)), called
the neighbor graph, with E(t) denoting the set of edges
at time t. Note that the graph N(t) can be either undi-
rected or directed. The n vertices represent the n agents
and the edges indicate the neighbor relationships. Specif-
ically, if the communications among agents are bidirec-
tional, the graph N(t) is undirected, and agents i and j
are neighbors at time t if and only if (i, j) is an edge in
N(t). We use Ni(t) to denote the set of neighbors of agent
i, i.e., the degree of vertex i at time t. We also define
N +
the agent i itself. Otherwise, if the communications are
unidirectional, we say that an agent j is an out-neighbor
of agent i at time t if agent i can send information to
agent j at time t. In this case, we also say that agent i is
i (t) := Ni(t)(cid:83){i} as the set of neighbors including
2
an in-neighbor of agent j at time t. Then, agent j is a out-
neighbor of agent i (and thus agent i is an in-neighbor of
agent j) at time t if and only if (i, j) is a directed edge in
N(t). Thus, the neighbor graph N(t) becomes directed,
in which the directions of edges represent the directions
of information flow. By a slight abuse of notation, we
use Ni(t) to denote the set of out-neighbors of agent i
at time t, and also let N +
oi(t) to denote the number of out-neighbors of agent i at
time t, or equivalently, the out-degree of vertex i in N(t).
i (t) = Ni(t)(cid:83){i}. We also use
We assume that time is discrete in that t takes val-
ues in {1, 2, . . .}. Each agent i receives a real-valued
scalar 2 xi(t) at each time t. We assume that the sam-
ples {xi(t)}∞
t=1 form an independent and identically dis-
tributed (i.i.d.) process, and the sequence is generated
according to a random variable Xi with distribution
fXi(·). For simplicity, we assume that the support set
for Xi is bounded, i.e., there exists a constant K such
that Xi(ω) ≤ K for all i ∈ N and ω, where ω indicates
an arbitrary sample realization. Note that the agents'
observations do not need to be identical, i.e., the fXi (·),
i ∈ N , do not need to be structurally the same. We use
¯xi to denote the expectation of agent i's local observa-
tions, i.e.,
¯xi = E[Xi] ,
and call ¯xi the local belief of agent i. An application con-
text for this problem in sensor networks was described
in the introduction as a motivating example.
At each time step t, each agent i can exchange infor-
mation only with its current neighbors j ∈ Ni(t). Thus,
only local information is available to each agent, i.e.,
each agent i, only knows its own samples, the informa-
tion received from its current neighbors in Ni(t), and
nothing more, while the global connectivity patterns re-
main unknown to any agent in the network.
Suppose that each agent has control over a real-valued
variable yi(t) which it can update from time to time. Let
n(cid:88)
i=1
¯x =
1
n
¯xi ,
(1)
represent the average belief within the network. Our goal
is to devise distributed algorithms for each agent i, over
either undirected or directed graphs, which ensures that
t→∞ yi(t) = ¯x ,
lim
∀i ,
with high probability (w.h.p.) 3 , and their extensions to
the case with quantization effects of the system, as we
will elaborate next.
3 Distributed Learning Algorithms
In this section, we introduce two algorithms for dis-
tributed learning of average belief using sequential ob-
servations over time-varying graphs. We establish both
almost sure convergence and O(1/t) convergence rate
w.h.p. for the algorithms.
3.1 Algorithms
We first consider the case where N(t) is a time-varying
undirected graph. At initial time t = 1, each agent i sets
yi(1) = xi(t), where we note that xi(t) is an i.i.d. sample
of the local belief Xi. For each time t > 1, each agent i
first broadcasts its current yi(t) to all its current neigh-
bors in Ni(t). At the same time, each agent i receives
yj(t) from all its neighbors j ∈ Ni(t). Then, each agent
i updates its variable by setting
(cid:88)
yi(t + 1) = wii(t)yi(t) +
wij(t)yj(t)
j∈Ni(t)
+zi(t + 1) − zi(t) ,
where
t(cid:88)
τ =1
1
t
xi(τ )
zi(t) =
(2)
(3)
is the running average of the data, and wij(t) is the real-
valued weight from the matrix W (t) = [wij(t)] ∈ Rn×n.
The update rule (2) can be written in a more compact
form as
y(t + 1) = W (t)y(t) + z(t + 1) − z(t) ,
(4)
where y(t), z(t) ∈ Rn are the column vectors obtained
by stacking up yi(t)s and zi(t)s, respectively.
We make the following standard assumptions on W (t)
hereafter unless stated otherwise.
Assumption 1 The weight matrix W (t) has the follow-
ing properties at any time t.
almost surely (a.s.). Moreover, we would like to char-
acterize the convergence properties of such algorithms
2 The results in this paper can be straightforwardly ex-
tended to the vector-valued case.
3 Throughout the paper, when we say with high probabil-
ity, we mean that the probability goes to 1 when t goes to
infinity. Note that this is akin to the standard concept of
"convergence in probability" [28]. In particular, our results
of reaching consensus with O(1/t) rate w.h.p. not only im-
ply reaching consensus in probability, but also provide the
convergence rate of the sequence as t → ∞.
3
A.1) W (t) is a symmetric stochastic matrix 4 with posi-
tive diagonal entries, i.e., ∀i, j ∈ N ,
where oi(t) denotes the number of observers at agent i at
time t, and zi(t) is the running average as defined in (3).
The quotient µi(t)/vi(t) can then be shown to converge
to ¯x.
wii(t) > 0, wij(t) = wji(t) ≥ 0, and
n(cid:88)
n(cid:88)
wkj(t) =
wik(t) = 1 .
3.2 Convergence Results
k=1
k=1
A.2) W (t) is consistent with the network connectivity
constraint, i.e., if (i, j) /∈ E(t), then wij(t) = 0.
2
Note that Assumption 1 is a standard one for the con-
ventional distributed averaging problem (without any
sequential observations) [23]. Such weights wij(t) can be
designed in a distributed manner using the well-known
Metropolis weights [13].
Moreover, note that even though zi(t) used in the update
is a running average over time, an agent need not store
all its received samples. Instead, each agent i can only
keep track of zi(t) and update following
zi(t + 1) =
tzi(t) + xi(t + 1)
t + 1
.
(5)
The algorithm (2) requires that the communication be-
tween any pair of neighboring agents be bidirectional.
Such a requirement may not always be satisfied in ap-
plications. For example, different agents may have dis-
tinct transmission radii. In this subsection, we introduce
another algorithm to handle the case when the neigh-
bor graph N(t) is directed, i.e., the communication be-
tween agents is unidirectional. The algorithm makes use
of the idea of the push-sum protocol [16], which solves
the conventional distributed averaging problem for di-
rected neighbor graphs.
Now, we consider the following algorithm (for directed
neighbor graphs). Each agent i has control over two real-
valued variables yi(t) and vi(t), which are initialized as
yi(1) = xi(1) and vi(1) = 1, respectively. At each time
t > 1, each agent i sends the weighted current values
1+oi(t) and vi(t)
1+oi(t) to all its current neighbors and up-
dates its variables according to the rules
yi(t)
µi(t + 1) =
yi(t)
1 + oi(t)
+
vi(t)
vi(t + 1) =
1 + oj(t)
yi(t + 1) = µi(t + 1) + zi(t + 1) − zi(t) ,
1 + oi(t)
j∈Ni(t)
+
(cid:88)
(cid:88)
j∈Ni(t)
yj(t)
1 + oj(t)
vj(t)
,
,
(6)
4 A square nonnegative matrix is called stochastic if its row
sums all equal 1, and called doubly stochastic if its row sums
and column sums all equal 1. Thus, W (t) is also a doubly
stochastic matrix.
4
To establish convergence results, we first introduce some
concepts on the connectivity of time-varying graphs. An
undirected graph G is called connected if there is a path
between each pair of distinct vertices in G. A directed
graph G is called strongly connected if there is a di-
rected path between each ordered pair of distinct ver-
tices in G. By the union of a finite sequence of undi-
rected (or directed) graphs, G1, G2, . . . , Gp, each with
the vertex set V, is meant the undirected (or directed)
graph G with vertex set V and edge set equaling the
union of the edge sets of all the graphs in the sequence.
We say that such a finite sequence is jointly connected
(or jointly strongly connected) if the union of its mem-
bers is a connected (or strongly connected) graph. We
say that an infinite sequence of undirected (or directed)
graphs G1, G2, . . . is repeatedly jointly connected (or re-
peatedly jointly strongly connected) if there is a posi-
tive integer r such that for each k ≥ 0, the finite se-
quence Grk+1, Grk+2, . . . , Gr(k+1) is jointly connected
(or jointly strongly connected).
Now we are ready to present the connectivity assumption
on the undirected neighbor graphs {N(t)}, building upon
which we establish the convergence of system (4).
Assumption 2 The sequence of undirected neighbor
graphs {N(t)} is repeatedly jointly connected.
2
Theorem 1 Let all n agents adhere to the update rule
(2). Suppose that Assumptions 1 and 2 hold. Then,
lim
t→∞ yi(t) = ¯x ,
∀i,
(7)
almost surely. Moreover, the sequence {yi(t)} reaches
consensus for all i ∈ N with the order of O(1/t) w.h.p.2
A precise proof of the theorem is relegated to Section 5,
but here we provide the basic intuition behind it. First,
it is straightforward to verify that
n(cid:88)
i=1
n(cid:88)
i=1
lim
t→∞
1
n
zi(t) =
1
n
¯xi .
(8)
Since y(1) = x(1) = z(1), from (4), it follows that
1(cid:62)y(2) = 1(cid:62)z(2), where 1 denotes the vector whose
entries all equal to 1 and 1(cid:62) denotes its transpose. By
induction, it follows that 1(cid:62)y(t) = 1(cid:62)z(t) for any t,
which implies by ignoring the small perturbation terms
z(t + 1) − z(t) (later we will show that this term con-
verges polynomially fast to the zero vector 0 w.h.p.),
Note that, from (8) and (1),(cid:80)n
y(t + 1) = W (t)y(t) leads all yi(t) to the same value [23].
i=1 zi(t) will converge to
n¯x, and therefore we could expect that each yi(t) will
converge to ¯x since 1(cid:62)y(t) = 1(cid:62)z(t).
Likewise, we impose the following assumption on the
connectivity of the neighbor graph N(t) when it is di-
rected.
Assumption 3 The sequence of directed neighbor
graphs {N(t)} is repeatedly jointly strongly connected. 2
Now we are ready to present the convergence result for
the update rule (6) for directed neighbor graphs, which
shows that it also achieves the same convergence result
as update rule (4) for undirected neighbor graphs.
Theorem 2 Let all n agents adhere to the update rule
(6). Suppose that Assumptions 1 and 3 hold. Then,
lim
t→∞
µi(t)
vi(t)
= ¯x ,
∀i ,
(9)
a.s. Moreover, the sequence {µi(t)/vi(t)} reaches con-
sensus for all i ∈ N with the order of O(1/t) w.h.p. 2
Proof of this theorem is given later in Section 5.
Based on Theorems 1 and 2, we also obtain the following
corollary which quantifies the convergence performance
of the update rules for a finite time t. The proof is de-
ferred to Section 5.
Corollary 1 For the update (2), there exist constants
λ1 ∈ [0, 1) and C1, C2 > 0, such that after t ≥ (2C2)−1 ·
log
iterations,
(cid:17)
(cid:16)
2
δ(1−2e−2C2 )
yi(t) − ¯x ≤ C1λt
1 + (C2 + K + ¯xi)/t, ∀i ∈ N
holds with probability at least 1− δ. The same finite-time
performance also holds 5 for the update (6).
4 Quantization Effects
In this section, we investigate the effects of two common
sources of quantization on algorithm (2). Specifically,
the quantization includes quantized communication and
limited precision of the division operation, which are
common in realistic distributed computation systems.
The joint effects of the two quantization are considered
over both static and dynamic neighbor graphs.
5 Note that the constants λ1, C1, C2 for the results of up-
dates (2) and (6) may be different.
5
4.1 Static Graphs
The algorithm (2) requires the agents to send and receive
real-valued variables y(t) at each iteration. However, in
a realistic network, with limited capacity of communica-
tion links, the messages transmitted among agents can
have only limited length. On the other hand, both up-
dates (3) and (5) require one step of division operation.
As such, the result z(t) may only have limited precision
due to the finite digits of representing divided numbers
in realistic digital computers. This effect can be viewed
as one type of quantization on the value of z(t). With
these two quantization effects, the precise belief averag-
ing cannot be achieved in general (except in some spe-
cial cases). We first analyze the performance of system
(4) subject to these effects over a static neighbor graph.
To this end, we impose the following standard assump-
tion on the static graph and the corresponding weight
matrix.
Assumption 4 The communication graph N(t) is static
and connected, i.e., N(t) = (N ,E) for all t where (N ,E)
is a connected undirected graph. Accordingly, there exists
a matrix W which satisfies Assumption 1 in that W (t) =
W for all t, and has the following properties:
A.1) W has dominant diagonal entries, i.e., wii > 1/2
for all i ∈ N .
A.2) For any (i, j) ∈ E, we have wij ∈ Q+, where Q+ is
the set of rational numbers in the interval (0, 1).
2
Note that conditions A.1) and A.2) are specifically
needed for the convergence of quantized systems as
in [25]. In a practical implementation, it is not restrictive
to have rational numbers as weights and require dom-
inant diagonal weights. As reported in [25, Appendix
A], the quantized update may fail to converge even in
the deterministic setting of distributed averaging. Thus,
conditions A.1) and A.2) are essential here since our
analysis will rely on the results developed in [25].
Let zi(t) denote the value of z(t) after the division in (3),
or equivalently (5). We impose an assumption on zi(t)
as follows.
Assumption 5 There exists a precision ∆ > 0 such
that zi(t) is multiples of ∆ for any time t and i ∈ N . 2
It follows from Assumption 5 that the decimal part of
zi(t) can only have a finite number of values. For no-
tational convenience, we introduce the following defini-
tions. Define the sets B and C as,
B := {b : b = k∆ + ∆/2, k = 0, 1,···},
C := {b : b = k∆, k = 0, 1,···}.
(10)
(11)
Let R : R → R be the operation that rounds the value
to the nearest multiples of ∆, i.e.,
R(x) = argmin
b∈C
b − x.
(12)
Hence, we have zi(t) = R(zi(t)). In particular, if x ∈ B
for some k > 0, we define the value of R(x) as R(x) :=
(k + 1)∆. In practice, the value of the quantized zi(t)
(cid:80)
can be evaluated by simply keeping track of the summa-
tion of all the previous data at time t, i.e., define si(t) :=
τ≤t xi(τ ), and then calculate zi(t) = R(si(t)/t). In
this regard, the imprecision caused by the division op-
eration will not accumulate over time.
To avoid the information loss caused by the quantized
communication, we adopt the following update:
y(t + 1) = WQ(y(t)) + y(t)−Q(y(t)) + ∆z(t + 1) , (13)
where Q : Rn → Rn denotes the operation of element-
wise quantization on a vector, and ∆z(t + 1) := z(t +
1) − z(t). The deterministic quantizer Q can be either
truncation quantizer Qt, the ceiling quantizer Qc, or the
rounding quantizer Qr, which round the values to, re-
spectively, the nearest lower integer, the nearest upper
integer, or the nearest integer. For more discussion on
the types of deterministic quantizers, see [25, Section
IV]. Without any loss of generality, we analyze the sys-
tem with a truncation quantizer Qt.
Since W is column stochastic (i.e., 1(cid:62)W = 1(cid:62)), from
equation (13), we have
1(cid:62)y(t + 1) = 1(cid:62)y(t) + 1(cid:62)(cid:0)z(t + 1) − z(t)(cid:1).
(14)
Hence, the property that 1(cid:62)y(t) = 1(cid:62) z(t) for any t
also holds under quantized communication provided
1(cid:62)y(1) = 1(cid:62) z(1). In addition, we define m(t) and M (t)
as follows:
m(t) := min
i∈N(cid:98)yi(t)(cid:99), M (t) := max
i∈N (cid:98)yi(t)(cid:99), ∀t ≥ 0 ,
where (cid:98)·(cid:99) denotes the floor function. Let αi = 1−wii +γ,
and γ > 0 be a sufficiently small positive scalar 6 that
guarantees αi < 0.5. As shown in [25], the value of γ
is not necessarily known and is only used here for the
convenience of analysis. Define α := max
i∈N αi, which is
also upper bounded by 0.5, and a value ¯xR as
(cid:88)
i∈N
¯xR :=
1
n
R(¯xi) .
(15)
If ¯xi /∈ B,∀i ∈ N , then the value of ¯xR corresponds to
the average of all beliefs with limited precisions. Note
that the difference between ¯xR and the actual average
belief ¯x is no greater than ∆/2 by definition. We will
show that the quantized system (13) will converge to
the neighborhood of ¯xR a.s., provided that ¯xi /∈ B,∀i ∈
N . Formally, we have the following proposition on the
convergence of system (13).
Proposition 1 Let all n agents adhere to the update rule
(13). Under Assumptions 4 and 5, if ¯xi /∈ B,∀i ∈ N ,
then almost surely either
1) the system reaches quantized consensus to the value
¯xR defined in (15), i.e.,
(cid:40) (cid:98)yi(t)(cid:99) = (cid:98)yj(t)(cid:99), ∀i, j ∈ N ,
yi(t) − ¯xR < 1, ∀i ∈ N ,
which implies that yi(t) − ¯x < 1 + ∆/2,∀i ∈ N , or
2) all n agents' values live in a small neighborhood around
¯xR in that(cid:40) yi(t) − yj(t) ≤ αi + αj, ∀i, j ∈ N ,
yi(t) − ¯xR ≤ 2α, ∀i ∈ N ,
which implies that yi(t) − ¯x < 2α + ∆/2,∀i ∈ N . 2
Proposition 1 states that under the condition that ¯xi /∈
B,∀i ∈ N , system (13) will either reach a quantized con-
sensus with error smaller than 1+∆/2 to the actual aver-
age belief ¯x, or enter a bounded neighborhood of ¯x with
size smaller than 2α + ∆/2. This result can be viewed as
extension of the one for standard distributed averaging
with quantized communications [25]. Notably, the quan-
tization effect caused by the division operation enlarges
the error away from exact consensus by an amount of
∆/2, which is usually small in practice. The proof of
the proposition is provided in Section 5.
Remark 1 It is worth noting that the limiting behav-
ior of the quantized system (13) differs from the results
in [25] in three ways: i) quantized communication does
not necessarily cause exact cyclic behavior of y(t) due to
the randomness in the sequential data sample xi(t); ii)
limited precision of z(t) induces inevitable mismatch to
the convergent point from the actual average belief ¯x by
a small amount; instead, the system can only converge
to some value ¯xR close to ¯x up to a small deviation; iii)
the convergence result holds almost surely, instead of in
2
deterministic finite number of iterations.
4.2 Dynamic Graphs
6 The exact characterization of how γ is selected is given
in [25].
In this subsection, we extend the previous convergence
result over static graphs to dynamic graphs. It follows
6
from [29] that even without sequential data samples, i.e.,
∆z(t + 1) ≡ 0, there exist counterexamples which show
that quantized communication could prevent consen-
sus update from converging for general dynamic graphs.
Therefore, we consider a special class of dynamic graphs,
namely, the probabilistic dynamic graphs model, where
each link has a positive probability to appear in the
graph at any time t. The probabilistic model is formally
detailed in the following assumption. We note that this
is still a fairly large class of graphs.
Assumption 6 The neighbor graph N(t) is dynamic.
Specifically, there exists an underlying graph (N ,E) and
a corresponding matrix W satisfying Assumption 1 and
Assumption 4. At each time t, W (t) is constructed from
W as follows:
wij(t) =
and wii(t) = 1−(cid:80)
wij, if (i, j) ∈ E(t) ,
if (i, j) /∈ E(t) ,
0,
wij(t). Moreover, let {Ft}t≥1 be
the σ-field generated by the random graphs {N(τ )}τ≤t,
i.e., Ft = σ(N(1),··· , N(t)). Then, P rob[(i, j) ∈
E(t)Ft−1] ≥ p for all t and all (i, j) ∈ E, where p > 0 is
a positive constant and (N ,E) is a connected undirected
2
graph.
j∈Ni
(cid:40)
We note that Assumption 6, a probabilistic model for
dynamic graphs, is different from the deterministic mod-
els in Assumptions 2 and 3. This probabilistic model has
been adopted in many prior work on distributed averag-
ing, including asynchronous gossiping graphs [30], wire-
less sensor networks subject to probabilistic link fail-
ures [31], and conventional distributed averaging with
quantized communication [29].
The update rule over the dynamic graph thus becomes
y(t + 1) = W (t)Q(y(t)) + y(t) − Q(y(t)) + ∆z(t + 1) .
(16)
The following proposition describes the limiting behav-
ior of system (16), the proof of which is provided in Sec-
tion 5.
Proposition 2 Let all n agents adhere to the update rule
(16). Under Assumption 6, if ¯xi /∈ B,∀i ∈ N , then the
result in Proposition 1 still holds.
2
5 Analysis
In this section, we provide proofs of the results presented
in Sections 3 and 4.
5.1 Preliminaries
The proofs for the results in Section 3 will appeal to
the stability properties of discrete-time linear consensus
processes. We begin with the idea of a certain semi-norm
which was introduced in [15]. Let · be the induced
infinity norm on Rm×n. For M ∈ Rm×n, define
M∞ = min
c∈R1×n
M − 1c .
It has been shown in [15] that · ∞ is a semi-norm,
namely that it is positively homogeneous and satisfies
the triangle inequality. Moreover, this particular semi-
norm is sub-multiplicative (see Lemma 1 in [32]). In par-
ticular, from Lemmas 2 and 3 in [32], for any x ∈ Rn
and nonnegative matrix A ∈ Rn×n, we have
(cid:18)
(cid:19)
xi − min
j
xj
(17)
x∞ =
A∞ =
1
2
1
2
max
i
n(cid:88)
k=1
max
i,j
aik − ajk .
Moreover, from [33], A∞ ≤ 1 if A is a stochastic matrix.
We first introduce the notion of internal stability, which
has been proposed and studied in [32].
Consider a discrete-time linear consensus process mod-
eled by a linear recursion equation of the form
x(k0) = x0 ,
x(k + 1) = S(k)x(k) ,
(18)
where x(k) is a vector in Rn and S(k) is an n×n stochas-
tic matrix. It is easy to verify that the equilibria of (18)
include points of the form a1. We say that the system
described by (18) is uniformly exponentially consensus
stable if there exist a finite positive constant γ and a
constant 0 ≤ λ < 1 such that for any k0 and x0, the
corresponding solution satisfies
x(k)∞ ≤ γλk−k0x0∞ ,
k ≥ k0 .
Uniform exponential consensus stability implies that so-
lutions of (18) approach a consensus vector (i.e., all the
entries of x(t) have the same value) exponentially fast.
Exponential consensus stability can be characterized by
graph connectivity. Toward this end, we need the fol-
lowing concept. The graph of a nonnegative symmetric
matrix M ∈ Rn×n, denoted by γ(M ), is an undirected
graph on n vertices with an edge between vertex i and
vertex j if and only if mji (cid:54)= 0 (and thus mij (cid:54)= 0).
Lemma 1 Let F denote a compact subset of the set of
all n × n symmetric stochastic matrices with positive di-
agonal entries. Suppose that F (1), F (2), . . . is an infi-
nite sequence of matrices in F. Then, the discrete-time
linear recursion equation x(k + 1) = F (k)x(k), k ≥ 1,
is uniformly exponentially consensus stable if and only
if the sequence of graphs γ(F (1)), γ(F (2)), γ(F (3)) . . . is
2
repeatedly jointly connected.
7
This lemma is a direct consequence of Theorem 4 in [32].
Now we turn to input-output stability of discrete-time
linear consensus processes. Toward this end, we rewrite
the equation (18) in an input-output form as follows:
x(k + 1) = S(k)x(k) + B(k)u(k) ,
y(k) = C(k)x(k) .
(19)
(20)
We are interested in the case when B(k) and C(k) are
stochastic matrices for all k. We say that the system de-
fined by (19)-(20) is uniformly bounded-input, bounded-
output consensus stable if there exists a finite constant η
such that for any k0 and any input signal u(k) the cor-
responding zero-state response satisfies
y(k)∞ ≤ η sup
k≥k0
sup
k≥k0
u(k)∞ .
It is worth noting that y(t) may not be bounded
even though the system is uniformly bounded-input,
bounded-output consensus stable.
The following result establishes the connection between
uniform bounded-input, bounded-output stability, and
uniform exponential stability.
Proposition 3 (Theorem 2 in [34]) Suppose that (18)
is uniformly exponentially consensus stable. Then, the
system (19)-(20) is uniformly bounded-input, bounded-
2
output consensus stable.
5.2 Proof of Theorem 1
The system (4) can be viewed as a linear consensus sys-
tem with input u(t) = z(t + 1) − z(t), S(t) = W (t) a
stochastic matrix, and B(t) = C(t) = I, where I is the
identity matrix, which is also a stochastic matrix. Let
Φ(t, τ ) be the discrete-time state transition matrix of
S(t), i.e.,
Φ(t, τ ) =
S(t − 1)S(t − 2)··· S(τ ) if t > τ ,
if t = τ .
I
(21)
(cid:40)
It is easy to verify that Φ(t, τ ) is a stochastic matrix
for any t ≥ τ . Then, the output is given by y(t) =
Φ(t, 1)y(1) + y(t), where y(t) is the zero-state response
and the first component on the right-hand side is the
zero-input response. It then follows that
y(t)∞ ≤ Φ(t, 1)y(1)∞ + y(t)∞
≤ Φ(t, 1)y(1)∞ + sup
τ≥t
y(τ )∞ .
(22)
Since the sequence of neighbor graphs is repeat-
edly jointly connected, by Lemma 1, the system
8
y(t + 1) = W (t)y(t) is uniformly exponentially con-
sensus stable, and thus the system (4) is uniformly
input-bounded, output-bounded consensus stable by
Proposition 3. Since Φ(t, 1)y(1)∞ converges to 0 ex-
ponentially fast, to prove the theorem, it suffices to
show that supτ≥t y(τ )∞ converges to 0 almost surely
with the order of O(1/t) with high probability, and
the consensual value reached by the sequence {yi(t)}
is indeed ¯x. Since supτ≥t y(τ )∞ ≤ η supτ≥t u(τ )∞
for some constant η, and noting that from (17),
supτ≥t u(τ )∞ ≤ 2 supτ≥t maxi ui(τ ),
it will be
enough to study the convergence of supτ≥t maxi ui(τ ).
Note that ui(t) = zi(t + 1) − zi(t) for any i ∈ N , and
(cid:80)t
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
k=1 xi(k)
t + 1
−
k=1 xi(k)
t
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:80)t+1
(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)
k=1 xi(k)
zi(t + 1) − zi(t) =
(cid:12)(cid:12)(cid:12)t · xi(t + 1) −(cid:80)t
(cid:12)(cid:12)(cid:12)(cid:80)t
t(t + 1)
=
.
+
t + 1
k=1 xi(k)
t(t + 1)
≤ xi(t + 1)
have that (cid:80)t
(cid:80)t
1(cid:62)z(t) and thus (cid:80)
Strong Law of Large Numbers), we have(cid:80)
converges to(cid:80)
Recall that Xi(ω) ≤ K for some constant K.
Also, by the Strong Law of Large Numbers, we
k=1 xi(k)/t converges to ¯xi a.s. Thus,
k=1 xi(k)/[t(t + 1)] converges to 0 a.s., which implies
that almost surely, the sequence {yi(t)} reaches to a con-
sensual value ¯y for all i ∈ N . Moreover, since 1(cid:62)y(t) =
i∈N zi(t)/n holds
for any t ≥ 0, and also zi(t) converges to ¯xi a.s. (by the
i∈N yi(t)/n
i∈N ¯xi/n = ¯x a.s. Therefore, we obtain
that the consensual value ¯y equals the value of ¯x, which
concludes the first argument in Theorem 1.
i∈N yi(t)/n = (cid:80)
In addition, using the Chernoff bound, for any δ > 0,
with a probability of at least 1 − 2e−2δt, we have
(cid:80)t
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
k=1 xi(k)
t
− ¯xi
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤ δ .
(cid:12)(cid:12)(cid:12)(cid:12) ≤ δ
(cid:19)
(cid:12)(cid:12)(cid:12)(cid:12) ≤ δ
(cid:19)
(cid:12)(cid:12)(cid:12)(cid:12) > δ
(cid:19)
− ¯xi
k=1 xi(k)
− ¯xi
k=1 xi(k)
τ
sup
τ≥t
∀τ ≥ t,
τ
(cid:12)(cid:12)(cid:12)(cid:12)(cid:80)τ
(cid:12)(cid:12)(cid:12)(cid:12)(cid:80)τ
(cid:18)(cid:12)(cid:12)(cid:12)(cid:12)(cid:80)τ
Then,
P
(cid:18)
(cid:18)
≥ 1 −(cid:88)
≥ 1 −(cid:88)
τ≥t
= P
τ≥t
P
k=1 xi(k)
− ¯xi
2e−2δτ = 1 − 2e−2δt
τ
1 − e−2δ ,
which implies that w.h.p.,
(cid:12)(cid:12)(cid:12)(cid:12)(cid:80)τ
k=1 xi(k)
τ
(cid:12)(cid:12)(cid:12)(cid:12) ≤ ¯xi + δ ,
Note that both S(t) and B(t) are stochastic matrices.
The following lemma shows the uniformly exponentially
consensus stability of the zero-input response (i.e., the
input ∆z(t) = 0).
(23)
sup
τ≥t
and furthermore,
Lemma 2 Under Assumptions 1 and 3, the system h(t+
1) = S(t)h(t) is uniformly exponentially consensus sta-
ble, with h(t) and S(t) defined in (25) and (26), respec-
2
tively.
Proof: From Lemma 1 (a) in [35], we know that under
Assumptions 1 and 3, there exist constants C(cid:48) > 0 and
λ ∈ (0, 1) such that for any i ∈ N
zi(τ + 1) − zi(τ ) ≤ K + ¯xi + δ
t + 1
sup
τ≥t
,
(24)
which is decreasing uniformly with the order of O(1/t).
From (22), this means that the sequence {y(t)} reaches
consensus with the rate of O(1/t), which completes the
proof.
5.3 Proof of Theorem 2
The proof of Theorem 2 also relies on the concept of
uniformly exponentially consensus stability and Propo-
sition 3. Define the state in update (7) as
hi(t) :=
, ∀i ∈ N .
µi(t)
vi(t)
(25)
For notational convenience, we also define, for any time
t,
∆zi(t) := zi(t) − zi(t − 1),
li(t) :=
1
1 + oi(t)
, ∀i ∈ N .
We first rewrite the update (6) as an input-output sys-
tem of the form (19)-(20). In particular, from (6), we
have
j∈N +
i (t) lj(t)(wj(t) + ∆zj(t))
(cid:80)
(cid:80)
li(t) +(cid:80)
j∈N +
j∈Ni(t) lj(t) · vj(t)/vi(t)
i (t) lj(t)vj(t)
li(t) (1 + ∆zi(t)/µi(t))
hj(t) ·
lj(t) +(cid:80)
hi(t + 1) =
= hi(t) ·
(cid:88)
+
j∈Ni(t)
lj(t) (1 + ∆zj(t)/wj(t))
i (t),k(cid:54)=j lk(t) · vk(t)/vj(t)
k∈N +
where we recall that N +
i (t) is the set of neighbors in-
cluding agent i at time t. Let the entries of S(t) and B(t)
in (19) be
(cid:80)
lj(t)vj(t)
i (t) lj(t)vj(t)
j∈N +
sij(t) =
, bij(t) = sij(t),
(26)
respectively. Then, the update (6) can be written as
h(t + 1) = S(t)h(t) + B(t) (∆z(t) (cid:11) v(t)) ,
(27)
where (cid:11) denotes the Hadamard (element-wise) division
operation.
Hence, there exists a constant C = C(cid:48)/(λ · h(0)∞) > 0
such that
(cid:12)(cid:12)(cid:12)(cid:12)hi(t + 1) − 1(cid:62)y(t)
n
(cid:12)(cid:12)(cid:12)(cid:12) ≤ C(cid:48) · λt.
(cid:19)
(cid:12)(cid:12)(cid:12)(cid:12)
hi(t) − min
hi(t) − 1(cid:62)y(t − 1)
hj(t) − 1(cid:62)y(t − 1)
hj(t)
n
j
i
max
(cid:18)
(cid:12)(cid:12)(cid:12)(cid:12) max
(cid:12)(cid:12)(cid:12)(cid:12) max
i
j
1
2
n
· λt = C · h(0)∞ · λt.
+
≤ C(cid:48)
λ
h(t)∞ =
1
2
≤ 1
2
(cid:12)(cid:12)(cid:12)(cid:12)
(28)
By definition, the update is uniformly exponentially con-
sensus stable, which completes the proof.
We are now in a position to prove Theorem 2.
Proof of Theorem 2: The system (27) can be viewed as a
linear consensus system with input u(t) = ∆z(t) (cid:11) v(t)
and C(t) = I. Recall the definition of Φ(t, τ ) in (21), we
can write the output as
,
h(t) = Φ(t, 1)h(1) + h(t) ,
where Φ(t, 1) is as defined in (21), h(t) and Φ(t, 1)h(1)
are the zero-state and zero-input responses, respectively.
Since
h(t)∞ ≤ Φ(t, 1)h(1)∞ + sup
τ≥t
h(τ )∞ ,
and Φ(t, 1)h(1)∞ converges to zero exponentially fast
according to Lemma 2, it suffices to study the conver-
gence rate of supτ≥t h(τ )∞.
In addition, by Proposition 3 and Lemma 2, the
update (27)
is uniformly input-bounded, output-
bounded consensus
that
supτ≥t y(τ )∞ ≤ η supτ≥t u(τ )∞ for some constant
stable. Hence,
follows
it
9
η > 0. It is thus sufficient to bound the convergence
rate of supτ≥t maxi ∆zi(τ )/vi(τ ). By Lemma 3 in [19],
there exists a constant > 0, such that for any i ∈ N ,
the state vi(t) that follows the update (7) is lower
bounded by . Thus we obtain
Under A.2) in Assumption 4, there exist co-prime posi-
tive integers aij and bij such that wij = aij/bij. Let Bi
be the least common multiple of the integers {bij : ∀j ∈
Ni}, where Ni is the set of neighbors of agent i on the
static graph (N ,E). Define the decimal part of yi(t) as
ci(t) := yi(t) − (cid:98)yi(t)(cid:99). Then, ci(t) ∈ [0, 1) satisfies
(cid:12)(cid:12)(cid:12)(cid:12) ∆zi(t)
vi(t)
(cid:12)(cid:12)(cid:12)(cid:12) ≤ 1
· zi(t) − zi(t − 1) .
(29)
ci(t) =yi(t) − (cid:98)yi(t)(cid:99)
From the proof of Theorem 1, this implies that i)
∆zi(τ )/vi(τ ) converges to zero a.s.; ii) ∆zi(τ )/vi(τ )
also converges with a rate of O(1/t) w.h.p., which com-
pletes the proof.
=
=
j∈Ni
+ yi(t − 1) + ∆zi(t)
(cid:88)
(cid:88)
5.4 Proof of Corollary 1
From (22), we further obtain that
y(t)∞ ≤ Φ(t, 1)y(1)∞ + sup
τ≥t
zi(τ + 1) − zi(τ ) ,
1. Also,
Φ(t, 1)y(1)∞ ≤ C1λt
for some constant η > 0. Since Φ(t, 1) is a stochas-
tic matrix, there exists a λ1 ∈ [0, 1) and C1 >
0 such that
from
(24), we know that there exists C2 > 0 such that
supτ≥t zi(τ + 1) − zi(τ ) ≤ C2/t with probability at
least 1 − [2e−2(C2−K−¯xi)t]/[1 − e−2(C2−K−¯xi)]. Letting
δ = [2e−2(C2−K−¯xi)t]/[1 − e−2(C2−K−¯xi)], we obtain
the desired expression for t = t(δ), which completes
the proof of the first argument. The second argument
also holds due to (29), which relates ∆zi(t)/vi(t) to
zi(t) − zi(t − 1). This concludes the proof.
5.5 Proof of Proposition 1
The proofs for the results in Section 4 will depend on
the results in [25] and [29]. To prove Proposition 1, we
first state the following lemma, which is in the spirit of
Proposition 1 in [29].
Lemma 3 Consider the quantized system (13). Under
Assumptions 4 and 5, if ¯xi /∈ B,∀i ∈ N , then almost
surely, the values of yi(t), t ∈ {1, 2, . . .}, belong to a finite
set for all i ∈ N .
2
Proof: As shown in [25], the three types of quantizers
from communications, i.e., truncation quantizer Qt, ceil-
ing quantizer Qc, and rounding quantizer Qr, are all re-
lated and can be transformed to each other. Thus, it is
sufficient to analyze the quantized update (13) using any
one of the types 7 . Without any loss of generality, we
focus here on the truncation quantizer, i.e., Q(·) = (cid:98)·(cid:99).
7 Note that the update (13) using rounding and truncation
quantizers are identical, while the update using ceiling quan-
tizer Q is slightly different since Qc(x) = −Qt(−x), which
wij((cid:98)yj(t − 1)(cid:99) − (cid:98)yi(t − 1)(cid:99)) − (cid:98)yi(t)(cid:99)
((cid:98)yj(t − 1)(cid:99) − (cid:98)yi(t − 1)(cid:99)) − (cid:98)yi(t)(cid:99)
aij
bij
j∈Ni
+ ci(t − 1) + (cid:98)yi(t − 1)(cid:99) + ∆zi(t)
=ci(t − 1) +
Zi(t)
Bi
+ ∆zi(t),
(30)
where Zi(t) ∈ Z is an integer. Note that ∆z(t) can only
take values of multiples of ∆. Hence, ci(t) ∈ [0, 1) can
only take a finite number of values.
We first show that as t → ∞, zi(t + 1) − zi(t) = 0 a.s.
In particular, let Rh(x) denote the operation of finding
the belief in B that is closest to x, i.e.,
b − x.
(31)
Rh(x) = argmin
b∈B
Recall the definition of the belief set B in (10). Since ¯xi /∈
B, we have ¯xi−Rh(¯xi) > 0,∀i ∈ N . By the Strong Law
of Large Numbers, we have limt→∞ zi(t) − ¯xi = 0 a.s.
Thus, for any sample realization ω, let δ = ¯xi−Rh(¯xi);
then there exists an integer Ti such that zi(t)(ω) − ¯xi ≤
δ for any t ≥ Ti. In addition, for any x ∈ R, if x− ¯xi ≤
¯xi−Rh(¯xi), then R(x) = R(¯xi). Hence, for any t ≥ Ti,
it follows that
zi(t + 1) = R(zi(t + 1)) = R(¯xi) = R(zi(t)) = zi(t),
for this realization ω. Therefore, we obtain
wij((cid:98)yj(t)(cid:99) − (cid:98)yi(t)(cid:99))
yi(t + 1) =yi(t) +
(cid:88)
j∈Ni
(M (t) − (cid:98)yi(t)(cid:99))
wij
(cid:88)
j∈Ni
≤ci(t) + (cid:98)yi(t)(cid:99) +
≤ci(t) + M (t).
This reduces to the argument of Proposition 1 in [25],
which implies that (cid:98)yi(t + 1)(cid:99) ≤ M (t), and thus {M (t)}
is a non-increasing sequence. Similarly, we can show that
changes the sign of the last two terms z(t + 1) − z(t). How-
ever, as we show in the proof, this difference term does not
invalidate the result in Lemma 3.
10
{m(t)} is a non-decreasing sequence. Therefore, the in-
teger part of yi(t) (i.e., (cid:98)yi(t)(cid:99)) takes values in the finite
set {m(Ti), m(Ti)+1,··· , M (Ti)−1, M (Ti)}. Since both
the integer and the decimal parts take finite numbers of
values, so does the value of y(t). Note that the argument
above holds for any realization ω in the sample space,
which completes the proof.
Lemma 3 implies that with sufficiently long time, the
limited precision of the running average of the data be-
comes negligible almost surely in the analysis of the
quantized system (13).
We next prove Proposition 1.
Proof of Proposition 1: From the proof of Lemma 3, if
¯xi /∈ B,∀i, for any realization ω, there exists a Ti for each
i ∈ N , such that for t ≥ Ti, the term ∆zi(t) will be zero.
Let T0 = maxi∈N Ti; then from the iteration T0 on, the
system (13) reduces to system (11) in [25] with initial
values yi(T0),∀i ∈ N . Moreover, we have obtained that
for any t ≥ T0, it holds that zi(t) = R(¯xi). Hence, the
average of y(T0) satisfies
1(cid:62)y(T0)
n
1(cid:62) z(T0)
n
=
1
n
=
R(¯xi) = ¯xR,
(cid:88)
i∈N
since 1(cid:62)y(T0)/n = 1(cid:62) z(T0)/n holds for all time t.
Then, the statement in Proposition 1 follows directly
from Proposition 4 in [25]. Moreover, note that the dif-
ference between ¯xR and actual average belief ¯x is no
greater than ∆/2, since R(¯xi) − ¯xi < ∆/2,∀i ∈ N .
This further bounds the deviation between yi(t) and ¯xi.
Note that the argument above holds for any realization
ω, which completes the proof.
5.6 Proof of Proposition 2
The proof of Proposition 2 is similar to that of Proposi-
tion 1, where the key is to ensure that yi(t) only takes
a finite number of values a.s. We thus first present the
following lemma.
2
Lemma 4 Consider the quantized system (16). Under
Assumption 6, if ¯xi /∈ B,∀i ∈ N , then almost surely, the
values of yi(t), t ∈ {1, 2, . . .}, belong to a finite set for all
i ∈ N .
Proof: The proof for that the integer part (cid:98)yi(t)(cid:99) can
only take a finite number of values is identical to that
in Section 5.5. Moreover, by Assumption 6, wij(t) takes
values of either wij = aij/bij or 0. Thus, for the deci-
mal part, there still exists the least common multiple B(cid:48)
for the integers {bij : ∀j ∈ N , j (cid:54)= i}. Note that by As-
i
sumption 6, we need to consider all other agents j ∈ N ,
j (cid:54)= i, which are possibly connected with agent i. There-
fore, ci(t) = ci(t − 1) + Zi(t)/B(cid:48)
i + ∆zi(t) still holds for
some time-varying integer Zi(t), which implies that ci(t)
can only take a finite number of values. The rest of proof
follows directly from the proof of Lemma 3.
Similarly, as shown in the proof of Lemma 3, the limited
precision of the running average of the data becomes neg-
ligible a.s. with sufficiently long time. Thus, by Lemma
4, the proof of Proposition 2 follows from that of Theo-
rem 2 in [29], and we will not repeat it here for brevity.
Remark 2 Note that for the case when ¯xi ∈ B for some
i ∈ N , it is not clear whether the convergence results
in [25] and [29] can be extended to the setting here with the
joint quantization effects. In this case, the term ∆zi(t)
becomes a random variable that does not vanish to zero,
since the consecutive samples zi(t) and zi(t+1) are drawn
around ¯xi and can be truncated to either ¯xi + ∆/2 or
¯xi − ∆/2. Therefore, the term ∆zi(t) can take values of
∆, −∆, or 0, randomly at any time t. Based on extensive
simulations, we conjecture that the random error ∆zi(t)
will not accumulate, and that systems (14) and (16) will
asymptotically enter a small neighborhood around the de-
sired average belief a.s. We will illustrate this via numer-
ical simulations in Section 6, but a formal proof of this
2
result is yet not available.
6 Numerical results
In this section, we illustrate the convergence perfor-
mance of the proposed algorithms through numerical
examples. We consider a network of n = 10 agents.
Throughout the discussion of our numerical results, the
local beliefs of each agent ¯xi are generated uniformly
from [0, 100], and the sequential samples {xi(t)}∞
t=1 are
generated from a normal distribution with each local
belief ¯xi as the mean and 10 as the variance. At any
time t, we use the average error
(cid:80)n
i=1 yi(t) − ¯x
n
e(t) :=
to capture the convergence performance.
6.1 Undirected Graphs
We first study the convergence performance over a
static undirected graph. We test the proposed algorithm
on connected Random Geometric Graphs (RGG). The
RGGs are generated following [25] with connectivity ra-
dius R selected as R =(cid:112)10 ∗ log(n)/n = 1. This choice
of connectivity radius has been adopted by many in the
literature on RGG [25]. The doubly stochastic matrix W
is generated following the Metropolis weights [13]. For
each fixed W , we have repeated the simulation 20 times
(in terms of different realizations of agents' observed
samples) and present simulation results on convergence
11
(a) Convergence of the average error
Fig. 2. Performance evaluation over a time-varying undi-
rected graph
(b) Comparison with deterministic Distributed Averag-
ing
Fig. 1. Performance evaluation over a static undirected graph
in Fig. 1a (with the curve representing average error
and shaded region for variance).
It can be readily seen that our algorithm converges nicely
with bounded variance. Moreover, comparing its conver-
gence with that of the deterministic distributed averag-
ing algorithm, where true beliefs are revealed to each
agent at the initial time step, we see a clear (order-wise)
gap between these two scenarios, which is primarily due
to the sequential arriving nature of the data in our se-
quential data arriving setting (notice that in Fig. 1b we
have changed the y-axis to log scale). This also validates
the proved O(1/t) convergence rate of the algorithm,
which is order-wise slower than the deterministic sce-
nario (which is exponentially fast).
We then investigate the convergence performance over a
time-varying undirected graph. Following [29], we gen-
erate random probabilistic dynamic-graphs on the ba-
sis of a connected union graph. In particular, given a
union graph (N ,E), the agents i and j with (i, j) ∈ E are
connected with probability p, generating a time-varying
N(t). We make sure that the generated graph is con-
nected. Note that such time-varying graphs satisfy both
Assumptions 2 and 6. The Metropolis weights are then
calculated over this N(t) at each time t. As shown in Fig.
2, a higher value of p leads to a faster convergence rate as
expected. Moreover, a smaller variance is incurred when
the graph has less variability over time. In any case, the
polynomial convergence rate shown in Theorem 1 is cor-
roborated.
6.2 Directed Graphs
We next investigate the convergence performance over
directed graphs. To generate random directed graphs,
we first generate undirected RGGs and then randomly
delete some of the unidirectional edges between agents.
With a fixed union graph, a time-varying graph is gen-
erated in the same way as in Section 6.1. Thus, the
graphs satisfy Assumption 3. We have tested the update
(6) for both static and time-varying graphs. It can be
seen in Fig. 3 that the network-wide belief averaging is
successfully achieved at polynomial rate, which corrob-
orates the theoretical results in Theorem 2. Similarly, a
higher value of p results in a faster convergence rate and
a smaller variance.
(a) Convergence of the average error over a static graph
(b) Convergence of the average error over a time-varying
graph
Fig. 3. Performance evaluation over a directed graph
12
51015202530Time step5101520Average errorConvergence rate with standard deviation2040608010010−410−2100Time stepAverage error Deterministic Distributed AveragingDistributed Averaging w/ Sequential ObservationConvergence gap50100150200Time step102030Average errorp=0.1p=0.8520406080100Time step024Average errorConvergence rate with standard deviation20406080100Time step05101520Average errorp=0.1p=0.856.3 Quantization
In addition, we also study the effects of the two sources
of quantization considered in Section 4. To satisfy con-
ditions A.1) and A.2) in Assumption 4, we adopt a mod-
ified Metropolis weight as in [25]. Specifically, we let
1
, (i, j) ∈ N(t) ,
(32)
(a) Convergence of the average error
wij(t) =
C(1 + max{ni(t), nj(t)})
with C > 1 and wii(t) selected such that(cid:80)n
j=1 wij(t) =
1. Moreover, we choose the communication quantizer Q
to be the truncation operator, and the precision 8 ∆ to
be 0.1. We first consider the case when the local belief
¯xt /∈ B for any i ∈ N . It is demonstrated in Fig. 4 that
over a static undirected graph, the average error e(t) in-
deed converges in around 130 iterations under the quan-
tization we consider. In contrast to the results without
quantization, however, the convergence of the error e(t)
is stalled at somewhere above zero (note that we have
log scale y-axis in Fig. 4a). In fact, as shown in Fig. 4b,
the local state yi(t) converges to the neighborhood of
the average belief at a very fast rate. In the middle of
convergence, oscillation of the states is observed, which
is similar to the cyclic behavior as reported in [25]. Due
to the stochastic nature of the sequential data, the os-
cillation may not be exact cyclic. Eventually, the local
state values converge to the quantized consensus that
deviates from the actual average belief by less than 1.
More examples have been observed to have similar con-
vergence results as shown in Fig. 4, which corroborate
the convergence results in Proposition 1.
Likewise, as shown in Fig. 5a, over a time-varying graph,
the average error e(t) converges (in around 300 and 600
iterations for p = 0.85 and p = 0.1, respectively), at a
relatively slower rate than the case with a static graph.
Moreover, the error e(t) still fails to converge to exactly
zero due to the quantization effects. Furthermore, the
convergence behavior of the local states yi(t) in Fig. 5b
resembles what is shown in Fig. 4b, while it takes longer
time to converge to quantized consensus. Additionally,
we are also interested in the convergence performance
when some local beliefs ¯xi are inside the belief set B.
We thus specifically round the random beliefs ¯xi to the
set B by finding the value in B that is closest to ¯xi in
magnitude. Fig. 6a illustrates that the local states also
fail to reach exact consensus to the average belief. In-
terestingly, the states here do not achieve the quantized
consensus as in Fig. 4b and Fig.5b, while keep oscillat-
ing (though not exact cycling) around the neighborhood
of the consensual belief. This somehow reflects the dif-
ficulty we encountered in theoretical analysis, that the
8 Note that in practice, the precision may be smaller than
0.1. We choose such a relatively large value just to better
illustrate the convergence results.
13
(b) Convergence of the local state yi(t)
Fig. 4. Performance evaluation under quantization over a
static graph. In (b), each curve corresponds to the evolution
of local state yi(t) at each agent.
(a) Convergence of the average error
(b) Convergence of the local state yi(t) with p = 0.85
Fig. 5. Performance evaluation under quantization over a
time-varying graph. In (b), each curve corresponds to the
evolution of local state yi(t) at each agent.
50100150200250300Time step100Average error0300Time step020406080Local values15016017037.53838.527028029037.538100200300400500600700800Time step100Average errorp=0.1p=0.850800Time step050100Local values14515015516016517045.54646.572073074075076077045.546(a) Convergence of the average error
(b) Convergence of the local state yi(t)
Fig. 6. Performance evaluation under quantization when
¯xi ∈ B for all i ∈ N . In (b), each curve corresponds to the
evolution of local state yi(t) at each agent.
difference of the running average with limited precision
will randomly take values from ∆, −∆, or 0 (see Remark
2). The random error ∆zi(t) does not accumulate over
time and the size of the neighborhood is bounded to be
within 1.
6.4 Convergence Speed
We also numerically investigate how the convergence
speed is influenced by the quantization effects. As shown
in Fig. 7, we compare the convergence of the average er-
rors under various levels of quantization. Note that ∆ =
0 represents the case where only communication quanti-
zation exists and the division operation leads to no pre-
cision errors. As expected, a higher level of quantization
leads to a slower convergence rate and a larger steady-
state error. Surprisingly, however, the convergence rate
is insensitive to either sources of quantizations. This im-
plies that O(1/t) seems to be an inherent convergence
rate in the distributed averaging problem using sequen-
tial data. Thus, we conjecture that the rate to reach con-
sensus under quantization is still in the order of O(1/t),
whose proof is left for future work.
7 Conclusion
In this paper, we have studied distributed learning of av-
erage belief over networks with sequential observations,
14
Fig. 7. Performance evaluation under various levels of quan-
tizations.
where in contrast to the conventional distributed averag-
ing problem setting, each agent's local belief is not avail-
able immediately and can only be learned through its
own observations. Two distributed algorithms have been
introduced for solving the problem over time-varying
undirected and directed graphs, and their polynomial
convergence rates have been established. We have also
modified the algorithm for the practical case in which
both quantized communication and limited precision of
division operation occur. Numerical results have been
provided to corroborate our theoretical findings.
For future work, we plan to investigate other important
aspects of the proposed scheme for distributed learning
of average belief with sequential data, e.g., the case un-
der malicious data attack or with privacy requirement
among agents. It is also interesting to connect the pro-
posed scheme with other distributed and multi-agent
learning algorithms [22, 36 -- 39].
Acknowledgements
The work of K. Zhang and T. Ba¸sar was supported in
part by Office of Naval Research (ONR) MURI Grant
N00014-16-1-2710, and in part by US Army Research
Office (ARO) Grant W911NF-16-1-0485. The work of
M. Liu is partially supported by the NSF under grants
ECCS 1446521, CNS-1646019, and CNS-1739517. The
authors also thank Zhuoran Yang from Princeton Uni-
versity for the helpful discussion that improves the final
version of the paper.
References
[1] Y. Liu, J. Liu, T. Ba¸sar, and M. Liu. Distributed belief
averaging using sequential observations. In Proceedings of the
2017 American Control Conference, pages 680 -- 685, 2017.
[2] A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of
groups of mobile autonomous agents using nearest neighbor
rules. IEEE Transactions on Automatic Control, 48(6):988 --
1001, 2003.
[3] J. Cort´es, S. Mart´ınez, T. Karata¸s, and F. Bullo. Coverage
control for mobile sensing networks. IEEE Transactions on
Robotics and Automation, 20(2):243 -- 255, 2004.
100200300400500600700Time step100Average error700Time step3040506070Local values66068070053.854[4] K. Zhang, W. Shi, H. Zhu, E. Dall'Anese, and T. Ba¸sar.
Dynamic power distribution system management with a
locally connected communication network. IEEE Journal of
Selected Topics in Signal Processing, 12(4):673 -- 687, 2018.
[5] K. Zhang, L. Lu, C. Lei, H. Zhu, and Y. Ouyang. Dynamic
operations and pricing of electric unmanned aerial vehicle
systems and power networks. Transportation Research Part
C: Emerging Technologies, 92:472 -- 485, 2018.
[6] L. Krick, M. E. Broucke, and B. A. Francis. Stabilisation
of infinitesimally rigid formations of multi-robot networks.
International Journal of Control, 82(3):423 -- 439, 2009.
[7] S. Kar, J. M. Moura, and K. Ramanan. Distributed
estimation in sensor networks: Nonlinear
parameter
observation models and imperfect communication.
IEEE
Transactions on Information Theory, 58(6):3575 -- 3605, 2012.
[8] J. Liu, N. Hassanpour, S. Tatikonda, and A. S. Morse.
Dynamic threshold models of collective action in social
networks.
In Proceedings of the 51st IEEE Conference on
Decision and Control, pages 3991 -- 3996, 2012.
[9] T. Chen, S. Barbarossa, X. Wang, G. B. Giannakis, and
Z. Zhang. Learning and management for Internet-of-Things:
Accounting for adaptivity and scalability. Proc. of the IEEE,
November 2018.
[10] K. Zhang, W. Shi, H. Zhu, and T. Ba¸sar. Distributed
equilibrium-learning for power network voltage control with a
locally connected communication network. In IEEE Annual
American Control Conference, pages 3092 -- 3097. IEEE, 2018.
[11] A. Kashyap, T. Ba¸sar, and R. Srikant. Quantized consensus.
Automatica, 43(7):1192 -- 1203, 2007.
[12] L. Xiao and S. Boyd. Fast linear iterations for distributed
averaging. Systems and Control Letters, 53(1):65 -- 78, 2004.
[13] L. Xiao, S. Boyd, and S. Lall. A scheme for robust distributed
sensor fusion based on average consensus. In Proceedings of
the 4th International Conference on Information Processing
in Sensor Networks, pages 63 -- 70, 2005.
[14] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. Randomized
IEEE Transactions on Information
gossip algorithms.
Theory, 52(6):2508 -- 2530, 2006.
[15] J. Liu, S. Mou, A. S. Morse, B. D. O. Anderson, and
C. Yu. Deterministic gossiping. Proceedings of the IEEE,
99(9):1505 -- 1524, 2011.
[16] D. Kempe, A. Dobra, and J. Gehrke.
Gossip-based
computation of aggregate information. In Proceedings of the
44th Annual IEEE Symposium on Foundations of Computer
Science, pages 482 -- 491, 2003.
[17] F. B´en´ezit, V. Blondel, P. Thiran, J. N. Tsitsiklis, and
M. Vetterli. Weighted gossip: Distributed averaging using
non-doubly stochastic matrices. In Proceedings of the 2010
IEEE International Symposium on Information Theory,
pages 1753 -- 1757, 2010.
[18] A. D. Dom´ınguez-Garc´ıa, S. T. Cady, and C. N.
Hadjicostis. Decentralized optimal dispatch of distributed
energy resources. In Proceedings of the 51st IEEE Conference
on Decision and Control, pages 3688 -- 3693, 2012.
[19] J. Liu and A. S. Morse. Asynchronous distributed averaging
In Proceedings of the 2012
using double linear iterations.
American Control Conference, pages 6620 -- 6625, 2012.
[20] M. Huang and J. H. Manton. Coordination and consensus
of networked agents with noisy measurements: Stochastic
algorithms and asymptotic behavior.
SIAM Journal on
Control and Optimization, 48(1):134 -- 161, 2009.
[21] S. Kar and J. M. Moura. Consensus+innovations distributed
inference over networks: Cooperation and sensing in
15
networked systems.
30(3):99 -- 109, 2013.
IEEE Signal Processing Magazine,
[22] M. A. Rahimian and A.
Distributed
estimation and learning over heterogeneous networks.
In
Communication, Control, and Computing (Allerton), 2016
54th Annual Allerton Conference on, pages 1314 -- 1321, 2016.
Jadbabaie.
[23] A. Nedi´c, A. Olshevsky, A. Ozdaglar, and J. N. Tsitsiklis.
On distributed averaging algorithms and quantization effects.
IEEE Transactions on Automatic Control, 54(11):2506 -- 2517,
2009.
[24] R. Carli, F. Fagnani, P. Frasca, and S. Zampieri.
Gossip consensus algorithms via quantized communication.
Automatica, 46(1):70 -- 80, 2010.
[25] M. El Chamie, J. Liu, and T. Ba¸sar. Design and analysis of
distributed averaging with quantized communication. IEEE
Transactions on Automatic Control, 61(12):3870 -- 3884, 2016.
[26] K. Cai and H. Ishii. Quantized consensus and averaging on
gossip digraphs. IEEE Transactions on Automatic Control,
56(9):2087 -- 2100, 2011.
[27] T. Ba¸sar, S. R. Etesami, and A. Olshevsky.
Fast
convergence of quantized consensus using Metropolis chains.
In Proceedings of the 53rd IEEE Conference on Decision and
Control, pages 1330 -- 1334. IEEE, 2014.
[28] R. Durrett. Probability: Theory and Examples. Cambridge
University Press, 2010.
[29] M. El Chamie, J. Liu, T. Ba¸sar, and B. A¸cıkme¸se. Distributed
averaging with quantized communication over dynamic
graphs.
In Proceedings of the 55th IEEE Conference on
Decision and Control, pages 4827 -- 4832. IEEE, 2016.
[30] J. Lavaei and R. M. Murray. Quantized consensus by means of
gossip algorithm. IEEE Transactions on Automatic Control,
57(1):19 -- 32, 2012.
[31] S. Patterson, B. Bamieh, and A. El Abbadi. Convergence
rates of distributed average consensus with stochastic
link failures.
IEEE Transactions on Automatic Control,
55(4):880 -- 892, 2010.
[32] J. Liu, A. S. Morse, A. Nedi´c, and T. Ba¸sar. Internal stability
of linear consensus processes. In Proceedings of the 53rd IEEE
Conference on Decision and Control, pages 922 -- 927, 2014.
[33] E. Seneta. Non-negative Matrices and Markov Chains.
Sringer, 2006.
[34] J. Liu, T. Ba¸sar, and A. Nedi´c.
Input-output stability of
linear consensus processes. In Proceedings of the 55th IEEE
Conference on Decision and Control, pages 6978 -- 6983, 2016.
[35] A. Nedi´c and A. Olshevsky. Distributed optimization
IEEE Transactions on
over time-varying directed graphs.
Automatic Control, 60(3):601 -- 615, 2015.
[36] O. Shamir. Fundamental limits of online and distributed
In
algorithms for statistical
Advances in Neural Information Processing Systems, pages
163 -- 171, 2014.
learning and estimation.
[37] W. Zhang, P. Zhao, W. Zhu, S. C. Hoi, and T. Zhang.
Projection-free distributed online learning in networks.
In
International Conference on Machine Learning, pages 4054 --
4062, 2017.
[38] K. Zhang, Z. Yang, H. Liu, T. Zhang, and T. Ba¸sar.
Fully decentralized multi-agent reinforcement learning with
networked agents. In International Conference on Machine
Learning, pages 5867 -- 5876, 2018.
[39] K. Zhang, Z. Yang, and T. Ba¸sar. Networked multi-agent
reinforcement learning in continuous spaces. In Proceedings
of the 57rd IEEE Conference on Decision and Control, 2018.
|
1709.05793 | 1 | 1709 | 2017-09-18T07:21:33 | MAX-consensus in open multi-agent systems with gossip interactions | [
"cs.MA",
"math.OC"
] | We study the problem of distributed maximum computation in an open multi-agent system, where agents can leave and arrive during the execution of the algorithm. The main challenge comes from the possibility that the agent holding the largest value leaves the system, which changes the value to be computed. The algorithms must as a result be endowed with mechanisms allowing to forget outdated information. The focus is on systems in which interactions are pairwise gossips between randomly selected agents. We consider situations where leaving agents can send a last message, and situations where they cannot. For both cases, we provide algorithms able to eventually compute the maximum of the values held by agents. | cs.MA | cs | MAX-consensus in open multi-agent systems with
gossip interactions
Mahmoud Abdelrahim, Julien M. Hendrickx and W.P.M.H. Heemels
7
1
0
2
p
e
S
8
1
]
A
M
.
s
c
[
1
v
3
9
7
5
0
.
9
0
7
1
:
v
i
X
r
a
Abstract -- We study the problem of distributed maximum
computation in an open multi-agent system, where agents can
leave and arrive during the execution of the algorithm. The
main challenge comes from the possibility that the agent holding
the largest value leaves the system, which changes the value to
be computed. The algorithms must as a result be endowed
with mechanisms allowing to forget outdated information. The
focus is on systems in which interactions are pairwise gossips
between randomly selected agents. We consider situations where
leaving agents can send a last message, and situations where
they cannot. For both cases, we provide algorithms able to
eventually compute the maximum of the values held by agents.
I. INTRODUCTION
Multi-agent systems involve interacting elements with
computing capabilities, also called agents or nodes, who
communicate with each other to achieve a collective control
task that is more difficult or sometimes even impossible to
be performed by an individual agent. This configuration of
multi-agent systems has a great benefit to model and solve
many problems in different fields of applications including
sensor networks [1] -- [3], computer networks [4], [5] and
social science [6] -- [8]. One of the common problems that has
been studied in these applications is the consensus of multi-
agent systems on aggregate functions such as, e.g., MIN,
MAX, SUM and AVERAGE. For instance, in a group of
distributed sensors, it can be required to compute the average
temperature of a specific region or to elect the sensor with
maximum power resource to preserve the communication
over a costly link or to reduce energy for a wireless sensor
network, see, e.g., [9] -- [11].
Most existing results of the literature rely on the assump-
tion that the system composition is static, i.e., the set of
Mahmoud Abdelrahim is with the Department of Mechanical Engi-
neering, Assiut University, Egypt. Julien Hendrickx is with the ICTEAM
institute, Universit´e catholique de Louvain, Louvain-la-Neuve, Belgium.
Maurice Heemels is with the Control Systems Technology Group, De-
partment of Mechanical Engineering, Eindhoven University of Technol-
ogy, the Netherlands. Email addresses: [email protected],
[email protected], [email protected].
Mahmoud Abdelrahim and Maurice Heemels were supported by the
Innovational Research Incentives Scheme under the VICI grant "Wireless
control systems: A new frontier in automation" (No. 11382) awarded by
NWO (The Netherlands Organisation for Scientific Research) and STW
(Dutch Technology Foundation). Julien Hendrickx's work is partially sup-
ported by the Belgian Network DYSCO (Dynamical Systems, Control,
and Optimization), funded by the Interuniversity Attraction Poles Program,
initiated by the Belgian Science Policy Office, and by the Concerted
Research Action (ARC) programme supported by the Federation Wallonia-
Brussels.
agents present in the system does not change after the initial
time, see, e.g., [10], [12] -- [14] and the references therein.
However, this requirement can be difficult to satisfy in some
implementation scenarios where new agents can join and/or
existing agents can leave the network at any time instant.
This phenomenon is known in the literature as "network
churn" [15], [16], "dynamic network" [17] -- [19] or "open
multi-agent systems" [20] -- [22]. In this case, the consensus
problem on aggregate estimates becomes more challenging to
handle compared to the case of static networks. For instance,
consider the paradigmatic problem of MAX-consensus with
distributed communications and assume that the agent with
the largest state value has left the network after all the
agents have converged to its state value. In this case, all
the existing nodes in the network will then hold outdated
information. This scenario cannot occur in static networks,
which highlights one of the inherent challenges of open
multi-agent systems.
In this paper, we investigate the problem of MAX-
consensus in open multi-agent systems with distributed com-
munications. The agents are assumed to be anonymous, do
not have global identifiers, and all run the same algorithm.
We further assume that interactions only occur via pairwise
"gossip" exchanges between randomly selected agents in the
sense that, at any (discrete) time instant, (only) two agents are
selected randomly to exchange their information, update their
MAX estimates and possibly other variables. To cope with
the dynamic nature of the network, two different solutions
are proposed depending on whether or not it is possible for
the leaving agents to announce their departures.
In the case in which announcements are made, our algo-
rithm relies on a variable that describes how "up-to-date"
agents are with respect to recent departures, and priority
is given to information coming from the most "up-to-date"
agents. In the case where agents disappear without sending
a last message, our algorithm maintains an estimate of
the age of the information, and estimates corresponding to
information deemed too old are discarded.
We will show that our two approaches ensure that outdated
information can be forgotten, and that the consensus on the
MAX value can be achieved (with high probability) if the
system composition stops evolving.
The problem of MAX-consensus in multi-agent systems
has been studied in, e.g., [10], [11], [23], [24]. Among
existing techniques, the work of [10] has considered MAX-
consensus with random gossip interactions between agents,
on a static network. Compared to existing works of the
literature, our result is adapted to the problem of MAX-
consensus in multi-agent systems when the network is open,
which has not been considered in the previously mentioned
works. Our proposed approach encompasses the result of
pairwise gossip interaction in static networks in [10] as a
particular case.
The remainder of the paper is organized as follows.
Notations are given in Section II. The problem is formulated
in Section III. In Section IV, we treat the case where leaving
agents send a last message, and in Section V, we treat the
case where they do not. Numerical simulations are given
in Section VI. Conclusions and discussions are provided in
Section VII.
II. NOTATION
Let R := (−∞,∞), R(cid:62)0 := [0,∞), N := {0, 1, 2, . . .},
N(cid:62)1 := {1, 2, . . .} and N(cid:62)T := {T, T + 1, . . .} for T ∈
N. We denote by 0n and 1n the vectors in Rn whose all
elements are 0 or 1, respectively. We write AT to denote
the transpose of A, and (x, y) ∈ Rnx+ny to represent the
vector [xT , yT ]T for x ∈ Rnx and y ∈ Rny. The symbol In
stands for the identity matrix of dimension n. For a random
variable R, the symbol E(R) denotes the expectation of R.
III. PROBLEM STATEMENT
Consider a connected time-varying graph G(t) =
(V(t),E(t)), where V(t) and E(t) denote, respectively, the
set of existing agents and the set of edges in the graph
at time t ∈ N. The graph G(t) is dynamic in the sense
that new agents can join and/or existing agents can leave
at any time t. Hence, the cardinality of V(t), denoted by
N (t), is not necessarily constant for all t ∈ N. The agents
communicate with each other in a pairwise randomized
gossip fashion [9]. In other words, at any time instant t ∈ N,
there are three possibilities: (i) an agent joins the system
and N (t + 1) = N (t) + 1, (ii) an agent leaves the system
and N (t + 1) = N (t) − 1, or (iii) two randomly selected
agents i, j ∈ V(t), i (cid:54)= j communicate with each other (Note
that these discrete-time instants may be interpreted as the
sampling of an asynchronous process at those times where
an event occurs). Joining agents are assumed to know that
they join the system. Leaving agents may or may not be able
to send one last message (to one other agent) before leaving,
which are two cases of interest, which will be discussed in
Section IV and V, respectively.
Every agent i has two special states: xi ∈ R is its intrinsic
value, which is constant and determined arbitrarily when
joining the system, and yi(t) is its estimated answer at time
t ∈ N for the MAX value. Our goal is to estimate the
maximum intrinsic value of all the agents present in the
system, so we would ideally want, when no more agents
are joining or leaving the network after time T ∈ N, that
there is a time T ∗ ∈ N (cid:62) T such that yi(t) = MAX(t) :=
maxj∈V(t) xj, for all i ∈ V(t) and for t ∈ N (cid:62) T ∗. Agents
may then have other states that they use to reach this goal.
If the network would be static, i.e., G(t) is time-invariant,
the estimation of the maximum could be achieved in finite
time by starting from yi(0) = xi(0) for every agent, and
setting yi(t + 1) = yj(t + 1) = max(yi(t), yj(t)) whenever
time t ∈ N, see, e.g., [10].
agents i and j interact at
The main challenge in a dynamic or open network lies
with the need for the algorithm to take new agents into
account and to eventually discard information related to
agents no longer present in the system to ensure that maxj xj
is eventually recovered once the system composition stops
evolving. Classical algorithms such as that in [10] do not
guarantee this: outdated values from agents no longer in the
system may never be discarded.
Note that an alternative and maybe more natural goal
would be to have the yi(t), i ∈ V(t) track MAX(t) =
maxj∈V(t) xj sufficiently accurately. This more ambitious
goal is left for future studies, see Section VII for further
discussions on this issue.
Finally, we chose to make the following assumption for
the sake of simplicity of exposition.
Assumption 1. The graph G(t) = (V(t),E(t)) is complete
for all t ∈ N.
(cid:3)
This means that every pair of distinct agents in the network
can communicate directly with each other. The algorithms we
develop would actually also work on general dynamic graphs
under suitable connectivity assumptions, but
the analysis
would be more complex.
IV. DEPARTURES ARE ANNOUNCED
A. Algorithm description
If leaving agents announce their departure (to one other
agent), then we can benefit from this knowledge to correct
the outdated information. For that purpose, we introduce an
auxiliary variable κi(t) ∈ N at each agent, meant to represent
the "level of information" available to i about the departures
up to time t ∈ N. It will in general not be equal to the actual
number of departures, nor converge to it. The algorithm
is designed to ensure that those with the largest value κi
have valid estimates, i.e. their yi(t) correspond to the xj of
agents present in the system. For this purpose, information
coming from agents with higher κi will be given priority
over information coming from agents with lower values, and
it will be made sure that agents with a lower value of κi will
never have influenced those with a higher value.
The algorithm is summarized as follows. Initially, every
existing agent at t = 0 sets yi(0) = xi and κi = 0, i ∈ V(0),
as shown in Algorithm 1.
Algorithm 1 Intialization algorithm
At time t = 0, every existing node i ∈ V(0) initializes its
state as
1: yi(0) = xi
2: κi(0) = 0
When a new agent n joins the group at time t ∈ N, it
initializes its counter κn(t) and its estimate yn(t) according
to Algorithm 2.
Algorithm 2 Joining algorithm
Assume at any time t ∈ N(cid:62)1, a new agent n wants to join,
i.e., V(t + 1) = V(t) ∪ {n}. Agent n initializes its state as
1: yn(t) = xn
2: κn(t) = 0
If an agent (cid:96) leaves the system, it sends a last message
containing its counter value κ(cid:96) to a randomly selected agent
m. The reaction of m is governed by Algorithm 3, which
can be interpreted as follows: If the counter κ(cid:96)(t) of the
leaving agent (cid:96) is less than κm(t), then agent m ignores this
departure since the information of (cid:96) is deemed less up-to-date
than its own and has not influenced it. On the other hand, if
κ(cid:96)(t) (cid:62) κm(t), then (cid:96) may have influenced m and possibly
agents i with values κi higher than κm, but no larger than
κ(cid:96). To ensure that none of the agents with the highest values
κ hold the now outdated value xl, m will reset its ym to
xm, which is by definition a valid value, and set its κm to
κ(cid:96) + 1, a value above that of all those who could have been
influenced by (cid:96).
Algorithm 3 Departure algorithm
Assume at time t ∈ N, agent (cid:96) leaves, i.e., V(t + 1) =
V(t) \ {(cid:96)}.
Agent (cid:96) picks a random agent m to inform, and agent m
updates its state as follows
1: if κ(cid:96)(t) < κm(t) then
ym(t + 1) = ym(t)
2:
κm(t + 1) = κm(t)
3:
4: else if κ(cid:96)(t) (cid:62) κm(t) then
5:
6:
7: end if
ym(t + 1) = xm
κm(t + 1) = κ(cid:96)(t) + 1
The gossip communication between agents is performed
via Algorithm 4 (values not explicitly updated remain con-
stant between t and t + 1). When κi(t) = κj(t), this implies
that agents i and j either have not been informed about
any departure from the group, i.e., κi(t) = κj(t) = 0, or
have equal information level about the departure of one or
more agents. In either case, agents i and j can exchange
their information to update their estimate for the MAX
value. When κi(t) > κj(t), agent i's information about past
departures is deemed more up to date. Agent j is then not
allowed to transfer its estimate yj to avoid infecting i with
possibly outdated information (unless its estimate is actually
its own value, which is by definition valid). Therefore, agent
j restarts to max(yi(t), xj) and increments its counter to
κj(t + 1) = κi(t) in order to alert other future agents
who have not been informed yet to restart. The case when
κj(t) > κi(t) is completely symmetric.
yi(t + 1) = yj(t + 1) = max(yi(t), yj(t))
Algorithm 4 Gossip algorithm
At each time step t ∈ N, two agents i, j ∈ V(t) are picked
randomly (with possibly i = j)
1: if κi(t) = κj(t) then
2:
3: else if κi(t) > κj(t) then
4:
5:
6: else
7:
8:
9: end if
yi(t + 1) = yj(t + 1) = max(xi, yj(t))
κi(t + 1) = κj(t)
yi(t + 1) = yj(t + 1) = max(yi(t), xj)
κj(t + 1) = κi(t)
B. Eventual Correctness
We now show that the algorithm described in the previous
subsection is correct in the sense that, with high probability
(and even almost surely), it eventually settles on the correct
value if arrivals and departures stop.
Remember that V(t) := {1, . . . ,N (t)} denotes the group
of agents present at time t, and let X := {x1, . . . , xN (t)} be
the set of intrinsic values of nodes in V(t). Assume that after
some time T ∈ N no agent leaves and no new agent joins
the system, so that V(t) = V(T ) = V, E(t) = E(T ) = E
and N (t) = N (T ) = N for all t ∈ N(cid:62)T . Then, we need
to show that all the currently existing agents V(T ) in the
network will successfully reach the correct maximum value.
For that purpose, we define the following property.
Definition 1. We say that an algorithm is eventually correct
if for any T ∈ N with G(t) = (V,E) for all t ∈ NT , there
exists a T ∗ ∈ N(cid:62)T such that yi(t) = maxj∈V xj for all
i ∈ V and all t ∈ NT ∗.
Denote K(t) := max
i∈V(t)
κi(t), MAX(t) = max
i∈V(t)
xi and
XK(t) := {xi : i ∈ V(t) ∧ κi(t) = K(t)}. We state the
following result.
Lemma 1. For all t ∈ N and any j ∈ V(t), if κj(t) = K(t)
then yj(t) ∈ XK(t) ⊆ X(t).
Lemma 1 states that, at any time t ∈ N, if the counter value
of an agent j ∈ V(t) is equal to the maximum value K(t),
then its estimate yj(t) is equal to an intrinsic value xi ∈
XK(t) of one of the agents present in the system at this
time t and whose value κi is K(t).
Proof. Consider any agent j ∈ V(t) with κj(t) = K(t). We
have three scenarios:
(a) Agent j has just joined the system at time t. Hence,
κj(t) = 0 and yj(t) = xj according to Algorithm 2.
Since κj(t) = K(t), this implies that K(t) = 0. Hence,
Ki(t) = 0 for all i ∈ V(t). Consequently, it holds that
yj(t) ∈ XK(t) = X(t).
(b) K(t) > K(t− 1) (and j is not a new agent). In this case,
since at most one agent can change its counter at any time,
there is exactly one agent j with κj(t) = K(t). This implies
that an agent (cid:96) ∈ V(t− 1) with κ(cid:96)(t− 1) = K(t− 1) has left
at time t and informed agent j about its departure, otherwise
κj(t) (cid:54)= K(t) or K(t) ≯ K(t − 1). Consequently, agent j
restarts according to lines 7-9 in Algorithm 3 and we have
that κj(t) = K(t− 1) + 1 = K(t) and yj(t) = xj ∈ XK(t).
(c) K(t) = K(t − 1) (and j is not a new agent). We have
two possibilities:
c1) κj(t) > κj(t − 1), i.e., agent j has increased its counter
value at time t such that κj(t) = K(t) = K(t − 1), which
can happen by one of the following actions:
- an agent i ∈ V(t − 1) with κi(t − 1) = K(t − 1) −
1 (cid:62) κj(t − 1) has left the group and informed agent j
about its departure. Consequently, in view of lines 4-6
in Algorithm 3, agent j has incremented its counter to
κj(t) = κi(t − 1) + 1 = K(t − 1) = K(t), otherwise
κj(t) (cid:54)= K(t − 1) and yj(t) = xj ∈ XK(t).
- no departure occurred but agent j has interacted with
an agent i ∈ V(t − 1) with κi(t − 1) = K(t − 1).
Consequently, in view of lines 4-6 in Algorithm 4, we
obtain κj(t) = κi(t − 1) = K(t − 1) = K(t) and
yj(t) = max(xj, yi(t − 1)) ∈ XK(t).
c2) κj(t) = κj(t−1), i.e., agent j did not increase its counter
value at time t. Then, since K(t) = K(t − 1), it holds that
κj(t − 1) = K(t − 1) and we know that yj(t − 1) = xi for
some xi ∈ X(t − 1). There are two different possibilities:
- yj(t) (cid:54)= yj(t − 1), which can only happen if agent j
has interacted via algorithm 4 with an agent h with
κh(t − 1) = K(t − 1). Hence, in view of line 3 in
algorithm 4, it holds that yj(t) = yh(t − 1) ∈ XK(t).
- yj(t) = yj(t − 1) = xi. We know that agent i did
not leave because otherwise it would have been true
that agent i has informed some neighbour m about its
departure and resulted in κm(t) = κi(t − 1) + 1 =
K(t − 1) + 1, which leads to case (b) not case (c).
Hence, since i ∈ V(t), it holds that yj(t) ∈ XK(t).
This completes the proof of Lemma 1.
Theorem 1. Suppose that Assumption 1 holds. Then, Algo-
rithm 1-4 is eventually correct.
(cid:3)
Proof. The proof of Theorem 1 relies on Lemma 1 and the
result developed in [10]. Note that an essential difference
between our problem and the setup in [10] is that the gossip
interaction between agents (as in Algorithm 4) depends
considerably on their counter values, which is not the case
in static networks as in [10]. Therefore, we will invoke their
result twice, once on the counter values κi to show that all
agents eventually have the maximal counter value K(T ), and
once on the actual estimate yi(t) to show that they eventually
reach MAX(T ).
After time T , only Algorithm 4 is applied. Ignoring for
the moment its effect on the yi(t), observe that it performs
a classical gossip operation on the κi(t), in the sense that an
interaction between i and j results in κi(t+1) = κj(t+1) =
max(κi(t), κj(t)). Theorem 4, 5 in [10], applied to complete
graphs following Assumption 1, allows us then to guarantee
that the counters of all agents converge to the maximum
counter value K(T ) in a finite time T ∗
1 with the following
properties
E(T ∗
1 − T ) (cid:54) (N − 1)hN−1,
(cid:80)n
where hn denotes the nth harmonic number, i.e., hn :=
k . Moreover, we have, with probability 1 − that
(cid:32)
1 − T is bounded by
T ∗
(N − 1)hN−1
(cid:19)(cid:32)
(cid:18)N
(cid:33)(cid:33)
(cid:115)
1
k=1
1+log
1+
1+
(1)
1
log N
.
(2)
After T , since κi(t) = K(t) for all i, it follows from
Lemma 1 that all yi(t) correspond to actual values xj, j ∈ V.
Moreover, since one can easily verify that yi(t) (cid:62) xi at all
times, there holds maxi∈V yi(t) = maxi∈V xi = MAX(t) =
MAX(T ). It is therefore sufficient to show that all yi(t)
eventually settle on the same value.
1 as on T ∗
For this purpose, observe that when all agents have the
same κi(t) = K(t), Algorithm 4 reduces to its line 2,
yi(t + 1) = yj(t + 1) = max(yi(t), yj(t)), which is again a
classical pairwise gossip. We can then re-invoke Theorem
4, 5 in [10] to show the existence of a T ∗ after which
yi(t) = maxi∈V yi(T ∗) = maxi∈barV xi = MAX, with
the same bounds on T ∗ − T ∗
1 − T . In particular,
E(T ∗ − T ) (cid:54) 2(N − 1)hN−1, and there is a probability
1− that T ∗− T is at most twice the expression in (2). This
(cid:3)
achieves the proof of Theorem 1.
Remark 1. Note that, since we apply the result of [10] twice
to prove that Algorithm 1-4 is eventually correct, the upper
bound that we obtain on the time needed to achieve this
property is conservative. This comes from the fact that, in
Algorithm 1-4, the agents update their counters and their
(cid:3)
estimates simultaneously and not sequentially.
V. DEPARTURES ARE NOT ANNOUNCED
A. Algorithm description
Leaving agents may not always be able to announce
their departure, such as in case of unforeseen failures or
disconnections. The algorithms in Section IV can no longer
be applied in such a more challenging setting. Therefore,
we now propose an alternative algorithm that does not use
messages from departing agents. The idea is to have each
agent maintain a variable Ti representing the "age" of its
information. This age Ti
is kept at 0 when the agent's
estimate yi(t) of MAX(t) corresponds to (only) its own
value xi, as the validity of its information is then guaranteed.
Otherwise Ti is increased by 1 every time agent i interacts
with another agent, as the information gets "older". When an
agent i changes its estimate yi(t) by adopting the estimate
yj(t) of an agent j, it also sets Ti(t) to the value Tj(t), which
corresponds to the age of the new information it now holds.
Finally, when Ti(t) reaches a threshold T ∗, the information
yi(t) is considered too old to be reliable and is discarded;
yi(t) is reset to xi and Ti(t) to 0. We defer the discussion
on the value of T ∗ to Section VII, but already note that it
should depend on (bounds of) the system size, or (possibly)
change with time.
Formally, the behavior of an agent joining the system is
governed by Algorithm 5, while the update of Ti(t) and
the gossip interactions are governed by Algorithms 6 and 7
(where we use yi(t+),Ti(t+) to denote intermediate values
the variables yi,Ti may take during the computation leading
to their values at t + 1). Observe that when i and j have
the same estimate yi(t) = yj(t) they update the age of
information to the smallest among Ti(t) and Tj(t). Observe
also that the algorithms guarantee that yi(t) (cid:62) xi for every
i at all times, since yi(t) can never decrease except when it
is re-initialized at xi. Finally, there is no algorithm for the
departure, since agents are not assumed to be able to take
any action when other agents leave as this is not announced.
Algorithm 5 Joining algorithm
Assume at time t ∈ N(cid:62)1, a new agent n wants to join. Agent
n initializes its state as follows
1: yn(t) = xn
2: Tn(t) = 0
Algorithm 6 UpdateTimer
When agent i calls this procedure1:
1: if yi(t) = xi then
Ti(t+) = 0
2:
yi(t+) = xi
3:
4: else
Ti(t+) = Ti(t) + 1
5:
yi(t+) = yi(t)
6:
7: end if
8: if Ti(t) = T ∗ then
9:
10:
11: end if
yi(t+) = xi
Ti(t+) = 0
(cid:46) guaranteed validity of estimate
(cid:46) estimate gets one period older
(cid:46) Reset if threshold reached
Algorithm 7 Gossip algorithm
At each time step t, two agents i, j are picked randomly
1: UpdateTimer(i), UpdateTimer(j)
2: if yi(t+) > yj(t+) then
yj(t + 1) = yi(t+)
3:
Tj(t + 1) = Ti(t+)
4:
5: else if yj(t+) < yi(t+) then
6:
7:
8: else if yj(t+) = yi(t+) then
9:
10: end if
yi(t + 1) = yj(t+)
Ti(t + 1) = Tj(t+)
Ti(t + 1),Tj(t + 1) := min(Ti(t+),Tj(t+))
B. Eventual Correctness
We now discuss the eventual correctness of the algorithm
described above. For space reasons, only sketches of proofs
will be presented. We use the same conventions as in Section
IV-B. We first prove that outdated values are eventually
discarded if agents stop leaving or arriving.
Lemma 2. If no arrival or departure takes place after time
T ∈ N, then almost surely there exists a time T (cid:48) ∈ N
after which every estimate yi corresponds to the value of
an agent present in the system, i.e., for t ∈ N (cid:62) T (cid:48), for
all i there exists a j ∈ V(t) = V such that yi(t) = xj. As
a consequence, yi(t) (cid:54) MAX(T ) = maxj∈V xj for every
i ∈ V(t) = V and t ∈ N (cid:62) T (cid:48).
Proof. Observe first that agents can only set their yi to their
own xi or to the value yj of some other agent. Hence, since
the set of values xi remains unchanged after T , values yi(t)
for times t (cid:62) T that are not equal to some xj, j ∈ V, must be
equal to some yj(T ), i.e., must have been held as estimated
at time T . We show that these outdated values are eventually
discarded.
Let z ∈ R be such an outdated value, that is, yi(T ) = z
for some i ∈ V but z = xj for no j ∈ V. Let then D(t) =
{i ∈ V : yi(t) = z} be the set of agents holding z as estimate
at time t, and τ (t) = min{Ti(t) : i ∈ D(t)} be the minimal
age of information at t for those holding this outdated value
as estimate. As long as D(t) is non-empty, there must hold
τ (t) (cid:54) T ∗ due to the reset in Algorithm 6. We will show
that τ (t) must keep increasing if D(t) remains non-empty,
leading to a contradiction.
Every time an agent i ∈ D(t) for which Ti(t) = τ (t)
interacts with some other agent, It follows from Algorithm
7 and the timer update in Algorithm 6 that it must increase
its counter Ti by 1, unless it changes its value yi and no
longer belongs to D(t + 1). In both cases the set of agents
in D(t) with this Ti
taking this value has decreased by
1. Besides, since z is equal to no xi, the only way an
agent i can join D(t + 1) if it was not in D(t) is by
interacting with an agent j ∈ D(t), and the rules of the
algorithm imply then that Ti(t + 1) = Tj(t) + 1 (cid:62) τ (t) + 1.
Hence τ (t) = mini∈D(t) Ti(t) never decreases, and when
it
the number of agents in D(t) for
which Ti(t) = τ (t) either remains constant, or decreases
as soon as one of them is involved in an interaction (once
it reaches 0, τ (t) automatically increases). Since all agents
are almost surely repeatedly involved in interactions, this
means τ (t) will almost surely eventually increase as long
as D(t) is nonempty, in contradiction with the fact that it
cannot exceed T ∗. D(t) must thus almost surely eventually
be empty, which means that any outdated value is thus almost
surely eventually discarded, so that after some time T (cid:48) every
estimate yi(t) corresponds to a xj for j ∈ V.
(cid:3)
Let us now prove that the agents' estimates yi eventually
increasing,
is not
take the correct value MAX with a high probability.
Theorem 2. For all > 0, there exists a (sufficiently large)
T ∗ ∈ N such that, if no arrival or departure takes place
after time T ∈ N, then there exists a time T (cid:48)(cid:48) ∈ N (cid:62) T after
which yi(t) = MAX(T ) = maxj∈V xj holds for every i ∈ V
with a probability at least 1 − .
Proof. Let m be an agent holding the maximal value after
time T : xm = MAX = maxi∈V xi. It follows from Lemma
2 that ym(t) (cid:54) MAX holds after some T (cid:48), which implies
ym(t) = MAX = xm, since one can verify that yi(t) (cid:62) xi
holds for all agents at all times. The timer update Algorithm
6 implies then that Tm(t) = 0 at all times after T (cid:48).
Let us now fix some arbitrary time t0 (cid:62) T (cid:48) and let C(t) ⊆
V be the set of agents i such that (i) yi(t) = MAX, and
(ii) Ti (cid:54) t − t0. The set C(t0) contains at least agent m.
Moreover, for t ∈ [t0, t0 + T ∗ − 1], there holds C(t) ⊆
C(t + 1). Indeed, observe first that no agent of C(t) "resets"
because the Ti of agents in C(t) are by definition smaller
than T ∗. Moreover, agents in C(t) do not change their value
yi either because it follows from Lemma 2 that no agent j
has a value yj (cid:62) yi = MAX, so condition (i) still holds.
Besides, the timer Ti increase by at most 1 at each iteration
so condition (ii) also holds. Observe now that whenever an
agent i ∈ C(t) interacts with an agent j (cid:54)∈ C(t) at a time
t ∈ [t0, t0+T ∗−1], agent j will set yj(t+1) to yi(t) = MAX
and join C(t + 1). A reasoning similar to that the analysis of
classical pairwise gossip algorithm in [10] shows then that,
for every , there exists of a τ given by (2) such that with
probability at least 1 − , all agents will be in C(t) after
t0 + τ and at least until t0 + T (provided T (cid:62) τ). There
would thus hold yi = MAX for all i. Since this holds true
for any arbitrary t0 (cid:62) T (cid:48), it follows that for every i and
t (cid:62) T (cid:48) + τ, yi(t) = MAX holds with probability at least
1 − .
(cid:3)
The proofs of eventual correctness show that the value of
the threshold T ∗ is subject to a trade-off: We see from the
proof of Lemma 2 that the time needed to discard outdated
values increases when T ∗ is increased. On the other hand,
a sufficiently large threshold is needed in Theorem 2. In its
proof, we see that larger thresholds allow larger τ, which
imply smaller probabilities of some agent not having the
correct value.
Besides, we see in Theorem 2 that T ∗ must be sufficiently
larger than the expression (2), which depends on N , the even-
tual size of the system. This implies that agent must know at
least a bound on this size, unlike in the algorithm developed
in Section IV when leaving agents could send a last message.
One theoretical solution to avoid this problem would be to
let T ∗ slowly grow with time, so that it would eventually
always be sufficiently large if the system composition stops
changing (This growth should be sufficiently slow for the
argument of Lemma 2 still to be valid). However, the system
would also become slower and slower in discarding outdated
information.
VI. SIMULATIONS
We demonstrate the application of our algorithms on a
group of 25 agents: Initially, the intrinsic states xi of all
agents were assigned to random integer values between 0
and 1000. The largest two values of xi are found to be x9 =
936 and x13 = 815. The estimates yi(0) for all agents are
initialized to xi and all the counters κi(0) and ages Ti(0)
are initialized to 0. Agent 9 with the highest value, x9 =
(a)
(b)
(c)
Fig. 1. Evolution with time of the agent estimates yi(t) for the algorithm of
Section IV where departures can be announced (a), and of Section V where
departures are not announced, for tresholds T ∗ = 40 (b) and T ∗ = 200
(c). (The scale is different in (a)). Departure of the agent with highest value
is represented by a dashed line.
936 leaves at t = 200. Pairwise interactions between two
randomly selected agents take place at every other time.
We have simulated the two algorithms, with two thresholds
T ∗ for that of Section V, and the results are represented
in Fig. 1. We note that in the three cases, all the agents
first converge to the MAX value of x9 = 936 in a bit
more than 100 time steps, before agent 9 leaves the network.
After the departure of agent 9 at t = 200, we see that the
algorithm of Section IV that uses messages from departing
agents reconverges to the new maximal value x13 = 815 in
137 time steps. The performance of the algorithm of Section
V without messages from leaving agents are significantly
worse. For a threshold T ∗ = 40, we see that it takes 506 time
steps to reconverge to the new maximal value, but the system
later suffers from several spurious resets. These are caused by
agents reaching the threshold by chance. The probability of
this occurring can be significantly reduced by taking a higher
threshold, but this results in an even longer time to react to
the departure of 9, as seen in Fig. 1(c) with T = 200. 2439
time-steps are indeed needed to re-obtain the correct value,
Time[s]020040060080010001200MAX estimates for agents020040060080010000500100015002000250030003500400002004006008001000Time[s]MAX estimates for agents0500100015002000250030003500400002004006008001000Time[s]MAX estimates for agentsmostly because it takes very long before the agents abandon
their former estimate. This clearly illustrates the trade-off
on the threshold value T ∗: a too small value will result in
spurious resets as soon as some agents "have not heard"
about the agent with the highest value for too long. But a
too large threshold will result in a significant delay before
agents decide that an agent has probably left the system.
We also performed comparisons between the two ap-
proaches on the convergence time to reach consensus after
the agent with MAX has left the group for other numbers
of nodes. The results are summarized in Table I. We take
T ∗ = 1.1N (0) with the algorithm of Section V. We observe
that when the number of agents increases, the algorithm of
Section IV requires proportionally much fewer iterations to
reach consensus, as expected and already observed in Fig. 1.
Moreover, it also achieves a stronger version of the property
of eventual correctness than the algorithm of Section V, as it
avoids spurious resets, as discussed above. It does however
require the possibility of sending messages when leaving.
Number of nodes
Iterations to reach MAX-consensus
Algorithm 1-4
Algorithm 1, 5-7
10
20
30
50
100
64
162
599
1885
6580
21
129
194
246
628
TABLE I
COMPARISON BETWEEN THE TWO TECHNIQUES WITH DIFFERENT
NUMBER OF NODES.
VII. DISCUSSION AND CONCLUSION
We have investigated the distributed MAX-consensus
problem for open multi-agent systems. Two algorithms have
been proposed depending on whether the agents who leave
the network can inform another existing agent about their
departure or cannot. The eventual correctness has been
proven for both.
Taking a step back, we see two main challenges in the
design of algorithms for open multi-agent systems, as also
briefly noted in [20]:
to departures and arrivals,
Robustness and dynamic information treatment: The al-
gorithms should be robust
in
the sense that they should keep updating their estimates to
discard outdated information. Moreover, novel information
held by arriving agents should be taken into account, and
outdated information, for example, related to agents no
longer in the system, should eventually be discarded.
Performance in open context: The performance of classical
multi-agents algorithms is often measured by the rate at
which they converge to an exact solution or a desired sit-
uation (or the time to reach such a situation). This approach
is no longer relevant in a context where agents' departures
and arrivals keep "perturbing" the system, and possibly
the algorithm goal (as is the case here). Rather, efficient
algorithms would be those for which the estimated answer
remains "close" to some "instantaneous exact solution",
according to a suitable metric.
The algorithms we have developed here do answer the first
issue of robustness and information treatment for the problem
of distributed maximum computation. The characterization
and optimization of their performance in an open context,
however, remains unanswered at present and could be the
topic of further works. We note that the behavior of a gossip
averaging algorithm in an open multi-agent system was
characterized in [20], but this algorithm was not designed
to compute a specific value, as is the case here.
In particular, we observe that both algorithms would suffer
from occasional apparently unnecessary resets. This may
happen after the departure of an agent that did not have the
largest value in the algorithm of Section IV, or when an agent
has been isolated for too long from that with the highest value
in the algorithm of Section V. We do not know at this stage if
these spurious resets can be entirely avoided, especially when
leaving agents cannot send a final message. In this case, it is
indeed impossible to know for sure whether the agent with
the highest value has left or has just not communicated for a
while. There are, however, several possibilities to mitigate
the damage of these spurious resets and to play on the
trade-off between the effect of these perturbation and the
speed at which the system reacts. A simple solution could
be for example to apply an additional filtering layer when the
algorithm requires an important decrease of yi. In this case,
a new estimate yi would follow yi except that sharp decrease
would be replaced by gradual ones. We also observe that our
second algorithm will either only work when the system size
is not too large with respect to T ∗ (case of a fixed threshold)
or eventually work for all size but gradually become slower
and slower to react (case of a growing T ∗). Whether this
can be avoided in a context when leaving agents do not warn
others about their departure also remains an open interesting
question.
REFERENCES
[1] R. Olfati-Saber and N. F. Sandell, "Distributed tracking in sensor
networks with limited sensing range," In Proceedings of the 2008
American Control Conference, Washington, U.S.A., pp. 3157 -- 3162,
2008.
[2] L. Shi, A. Capponi, K. Johansson, and R. Murray, "Resource op-
timisation in a wireless sensor network with guaranteed estimator
performance," IET Control Theory and Applications, vol. 4, no. 5,
pp. 710 -- 723, 2010.
[3] O. Demigha, W. Hidouci, and T. Ahmed, "On energy efciency in
collaborative target tracking in wireless sensor network: A review,"
IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1210 --
1222, 2012.
[4] V. Cerf and R. Kahn, "A protocol
for packet network inter-
communication," IEEE Transactions on Communications, vol. 22,
no. 5, pp. 637 -- 648, 1974.
[5] S. Muthukrishnan, B. Ghosh, and M. Schultz, "First and second order
diffusive methods for rapid, coarse, distributed load balancing," Theory
of Computing Systems, pp. 331 -- 354, 1998.
[6] R. Hegselmann and U. Krause, "Opinion dynamics and bounded
confidence models, analysis, and simulation," Journal of Artifical
Societies and Social Simulation, vol. 5, no. 3, pp. 1 -- 33, 2002.
[7] V. Blondel, J. Hendrickx, and J. Tsitsiklis, "Continuous-time average-
preserving opinion dynamics with opinion-dependent communica-
tions," SIAM Journal on Control and Optimization, vol. 48, no. 8,
pp. 5214 -- 5240, 2010.
[8] J. Liu, N. Hassanpour, S. Tatikonda, and A. Morse, "Dynamic thresh-
old models of collective action in social networks," In Proceedings of
the 51st IEEE Conference on Decision and Control, Hawaii, U.S.A.,
pp. 3991 -- 3996, 2012.
[9] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Randomized gossip
algorithms," IEEE Transactions on Automatic Control, vol. 52, no. 6,
pp. 2508 -- 2530, 2006.
[10] F. Iutzeler, P. Ciblat, and J. Jakubowicz, "Analysis of max-consensus
algorithms in wireless channels," IEEE Transactions on Signal Pro-
cessing, vol. 60, no. 11, pp. 6103 -- 6107, 2012.
[11] S. Giannini, A. Petitti, D. D. Paola, and A. Rizzo, "Asynchronous
max-consensus protocol with time delays: Convergence results and
applications," IEEE Transactions on Circuits and Systems-I, vol. 63,
no. 2, pp. 256 -- 264, 2016.
[12] R. Olfati-Saber, J. Fax, and R. Murray, "Consensus and cooperation
in networked multi-agent systems," In Proceedings of the IEEE, pp.
215 -- 233, 2007.
[13] J. Hendrickx, A. Olshevsky, and J. Tsitsiklis, "Distributed anonymous
discrete function computation," IEEE Transactions on Automatic Con-
trol, vol. 56, no. 10, pp. 2276 -- 2289, 2011.
[14] W. Ren, R. Beard, and E. Atkins, "A survey of consensus problems
in multi-agent coordination," In Proceedings of the 2005 American
Control Conference, Portland, U.S.A., pp. 1859 -- 1864, 2005.
[15] D. Stutzbach and R. Rejaie, "Understanding churn in peer-to-peer
networks," In Proceedings of the 6th ACM SIGCOMM conference on
Internet measurement, Rio de Janeriro, Brazil, pp. 189 -- 202, 2006.
[16] F. Kuhn, S. Schmid, and R. Wattenhofer, "Towards worst-case churn
resistant peer-to-peer systems," Distributed Computing, vol. 2, no. 4,
pp. 249 -- 267, 2010.
[17] M. Jelasity, A. Montresor, and O. Babaoglu, "Gossip-based aggre-
gation in large dynamic networks," ACM Transactions on Computer
Systems, vol. 23, no. 3, pp. 219 -- 252, 2005.
[18] F. Kuhn, N. Lynch, and R. Oshman, "Distributed computation in
dynamic networks," In Proceedings of the 42nd ACM symposium on
Theory of computing, Massachusetts, U.S.A., pp. 513 -- 522, 2010.
[19] C. Dutta, G. Pandurangan, R. Rajaraman, Z. Sun, and E. Viola, "On
the complexity of information spreading in dynamic networks," In
Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete
Algorithms, pp. 717 -- 736, 2013.
[20] J. Hendrickx and S. Martin, "Open multi-agent systems: Gossiping
with deterministic arrivals and departures," In Proceedings of
the
54th Annual Allerton Conference on Communication, Control, and
Computing, Monticello, Illinois, U.S.A.
[21] T. Huynh, N. Jennings, and N. Shadbolt, "An integrated trust and
reputation model for open multi-agent systems," Autonomous Agents
and Multi-Agent Systems, vol. 13, no. 2, p. 119154, 2006.
[22] I. Pinyol and J. Sabater-Mir, "Computational
trust and reputation
models for open multi-agent systems: a review," Artificial Intelligence
Review, vol. 40, no. 1, pp. 1 -- 25, 2013.
[23] B. Nejad, S. Attia, and J. Raisch, "Max-consensus in a max-plus alge-
braic setting: The case of xed communication topologies," In Proceed-
ings of the International Symposium on Information, Communication
and Automation Technologies, Sarajevo, Bosnia and Herzegovina, pp.
1 -- 7, 2009.
[24] S. Zhang, C. Tepedelenlioglu, M. Banavar, and A. Spanias, "Max
consensus in sensor networks: Non-linear bounded transmission and
additive noise," IEEE Sensors Journal, vol. 16, no. 24, pp. 9089 -- 9098,
2016.
|
1010.0145 | 1 | 1010 | 2010-10-01T12:37:26 | Multi-Agent Programming Contest 2010 - The Jason-DTU Team | [
"cs.MA"
] | We provide a brief description of the Jason-DTU system, including the methodology, the tools and the team strategy that we plan to use in the agent contest. | cs.MA | cs |
Multi-Agent Programming Contest 2010
--
The Jason-DTU Team
Jørgen Villadsen, Niklas Skamriis Boss, Andreas Schmidt Jensen, and
Steen Vester
Department of Informatics and Mathematical Modelling
Technical University of Denmark
Richard Petersens Plads, Building 321, DK-2800 Kongens Lyngby, Denmark
Abstract. We provide a brief description of the Jason-DTU system,
including the methodology, the tools and the team strategy that we plan
to use in the agent contest.
Updated 1 October 2010: Appendix with comments on the contest added.
1
Introduction
1. The name of our team is Jason-DTU. We participated in the contest for the
first time in 2009 where we finished number 4 out of 8 teams [2].
2. The members of the team are as follows:
-- Jørgen Villadsen, PhD
-- Niklas Skamriis Boss, MSc
-- Andreas Schmidt Jensen, MSc
-- Steen Vester, BSc (currently MSc student, new in the team this year)
We are affiliated with DTU Informatics (short for Department of Informatics
and Mathematical Modelling, Technical University of Denmark, and located
in the greater Copenhagen area).
3. We use the Jason platform, which is an interpreter for AgentSpeak, an agent-
oriented programming language [1].
4. The main contact is associate professor Jørgen Villadsen, DTU Informatics,
email: [email protected]
5. We expect that we will have invested approximately 100 man hours when
the tournament starts.
2 System Analysis and Design
1. We intend to use three types of agents: a leader, a scout and the regular
herders. The leader is a herder with extra responsibilities and the scout
will initially explore the environment. We do not use a specific requirement
analysis approach.
2. We design our system using the Prometheus methodology as a guideline [3].
By this we mean that we have adapted relevant concepts from the method-
ology, while not following it too strictly.
3. The agents navigate using the A* algorithm [4]. We also implement algo-
rithms that enable the agents to move in a formation and to detect groups
of cows.
4. Communication is primarily between individual agents and the leader. Each
agent has a role based on their type. Coordination is done by the leader.
5. We have chosen to have a centralized coordination mechanism in form of a
leader.
3 Software Architecture
1. We use the Jason platform and the AgentSpeak programming language to
specify the goals an agent must pursue. Furthermore, we are able to use Java
using so-called internal actions.
2. We use the architecture customization available in the Jason platform. Each
agent is associated with an agent architecture which contains basic function-
ality such as connecting to the server and sharing knowledge. This enables
us to implement and custumize the agents in a rather elegant way.
3. We use the Jason platform within the Eclipse IDE.
4 Agent Team Strategy
1. We use mainly the A* algorithm to avoid obstacles and we do not use any
algorithms for opponent blocking at the moment.
2. The team leader handles coordination. Each herder will get delegated a po-
sition from which it must herd.
3. We do not employ a distributed optimization technique, however, the leader
chooses an agent which is currently closest to the goal.
4. All knowledge is shared between the agents. This means that every agent
knows everything about the environment. Furthermore, each agent commu-
nicates with the leader.
2
5. We plan to consider a more autonomous and decentralized approach where
each agent is able to decide without having to ask the leader.
6. Our agents do not perform any background processing while the team is idle,
i.e. between sending an action message to the simulation server and receiving
a perception message for the subsequent simulation step.
7. We do not have a crash recovery measure.
Whereas classical multi-agent systems have the agent in center, there have
recently been a development towards focusing more on the organization of
the system. If time permits we would like to investigate the pros and cons
of a more organizational approach [5].
References
1. Rafael H. Bordini, Jomi Fred Hubner, and Michael Wooldridge. Programming Multi-
Agent Systems in AgentSpeak Using Jason. John Wiley & Sons, 2007.
2. Niklas Skamriis Boss, Andreas Schmidt Jensen, and Jørgen Villadsen. Building
Multi-Agent Systems Using Jason. Annals of Mathematics and Artificial Intelli-
gence, Springer Online First 6 May 2010.
3. Lin Padgham and Michael Winikoff. Developing Intelligent Agent Systems: A Prac-
tical Guide. John Wiley & Sons, 2007.
4. Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Approach (Second
Edition). Prentice Hall, 2003.
5. Andreas Schmidt Jensen. Multi-Agent Systems: An Investigation of the Advantages
of Making Organizations Explicit. MSc Thesis, Department of Informatics and
Mathematical Modelling, Technical University of Denmark, 2010.
Acknowledgements
Thanks to Mikko Berggren Ettienne (BEng student) for joining the team.
More information about the Jason-DTU team is available here:
http://www.imm.dtu.dk/~jv/MAS
3
Appendix
We gained the insight about the practical use of multi-agent systems that do-
main specific knowledge is quite important in a multi-agent system like the one
in the contest. General concepts of search algorithms, belief sharing, communi-
cation and organization are important too and provide a solid basis for a good
solution. However, we think that domain specific topics such as understanding
cow movement, refinement of herding strategy, obstruction of enemy goals etc.
were even more important to obtain success. We definitely spent most of our
time doing domain specific refinements and performance tests.
The scenario had some nice properties like uncertainty about the environ-
ment, nondeterministic cow movement and the need for agent cooperation to
obtain good herding results. These properties made sure that good solutions
were non-trivial and gave motivation for experimenting with a lot of different
approaches. Interaction with an enemy team is also very interesting. Though,
we feel that care should be taken when designing a scenario so it will not be
too easy to implement a near-perfect destructive strategy which will ruin the
motivation for pursuing other ideas.
We used a centralized structure with one leader delegating targets to all
other agents which gave an overall control of our team. The leader divided the
agents into groups which had different purposes. For example we had a couple
of herding groups and a group responsible for making life harder for our oppo-
nents herders. Originally we used fixed groups (with fixed sizes) of agents with
quite static responsibilities. We learned that it can be important for agents to
switch roles if the environment acts in a way that makes this preferable. We did
some experiments with this when forming groups of herders. In some cases the
environment (and our agents) acted in such a way that it was more optimal for
agents to switch to other groups than to stick with the predefined groups.
We have a few ideas for potential extensions of the cow-and-cowboys-scenario.
One issue is that changes should be made so that a destructive approach will
not be as beneficial as it was this year. One suggestion is to restrict the number
of agents that can be in the corral of the enemy at any time, for example by
automatically teleport additional agents to their own corral, but of course this
makes the scenario quite unrealistic. Some other ideas are to let the cows be
controlled by one or more teams and perhaps allowing the number of cows to
increase or decrease over time.
We prefer to stay with a variant of the current scenario for the coming year
but eventually a less toy-like scenario might be introduced. Perhaps some kind
of scenario within health, food, energy, climate or engineering would be possible.
Alternatively one could move towards computer games (say, World of Warcraft).
We think that the contest was organized very well and that the information
regarding protocols and rules were quite clear. Even though several members of
the team had not participated in an event like this before we did not experience
any problems communicating with the servers and we feel that the information
level overall was quite good. The live chat was also a positive feature.
4
|
1901.05671 | 1 | 1901 | 2019-01-17T08:00:12 | H${}^2$CM-based holonic modeling of a gas pipeline | [
"cs.MA"
] | A gas pipeline is a relatively simple physical system, but the optimality of the control is difficult to achieve. When switching from one kind of gas to another , a volume of useless mixture is generated. Therefore, the control needs to both respond to the demand and minimize the volume of lost gas. In case of stable and perfectly known demand, scheduling techniques can be used, but in other cases , calculation times are incompatible with an industrial application. This article introduces the application of H${}^2$CM (Holonic Hybrid Control Model) generic architecture on this specific case. The study case is extensively presented. Then, the defined holonic architecture (H${}^2$CM compatible) is detailed, and the role and functions of each holon are presented. Finally, a tentative general control algorithm is suggested, which gives an insight on the actual algorithms that will be developed in perspective of this work. | cs.MA | cs | H²CM-based holonic modeling of a gas pipeline
C. Indriago*, L. Ghomri**, O. Cardin***
*Universidad Politécnica Antonio José de Sucre.
(CENIPRO Centro de Investigación de Procesos)
Barquisimeto-Venezuela.
(e-mail: [email protected])
**Manufacturing Engineering Laboratory of Tlemcen
Department of Electrical Engineering and Electronics
Abou-Bekr Belkaïd University
Tlemcen -- Algeria
(e-mail: [email protected]).
***LUNAM Université, IUT de Nantes -- Université de Nantes, LS2N UMR CNRS 6004
(Laboratoire des Sciences du Numérique de Nantes),
2 avenue du Prof. Jean Rouxel -- 44475 Carquefou
(e-mail: [email protected]).
Abstract. A gas pipeline is a relatively simple physical system, but the optimality
of the control is difficult to achieve. When switching from one kind of gas to an-
other, a volume of useless mixture is generated. Therefore, the control needs to
both respond to the demand and minimize the volume of lost gas. In case of stable
and perfectly known demand, scheduling techniques can be used, but in other cas-
es, calculation times are incompatible with an industrial application. This article
introduces the application of H²CM (Holonic Hybrid Control Model) generic ar-
chitecture on this specific case. The study case is extensively presented. Then, the
defined holonic architecture (H²CM compatible) is detailed, and the role and func-
tions of each holon are presented. Finally, a tentative general control algorithm is
suggested, which gives an insight on the actual algorithms that will be developed
in perspective of this work.
Keywords: Hybrid dynamic systems, Holonic Hybrid Control Model, Pipe-line
transport system.
2
1
Introduction
Hybrid dynamic systems (HDS) are dynamic systems integrating explicitly and
simultaneously continuous systems and discrete event systems. They require for
their description the use of continuous time models, discrete event models and the
interface between them [1]. The hybrid character of the system either owes to the
system itself or to the control applied to this system. Typical examples of such
systems are communication protocols, manufacturing systems, transportation sys-
tems, power electronics, etc.
Modeling, analysis and control of HDS are crucial concerns. Two of the most
important formalisms for the modeling and analysis of HDS are hybrid automata
[2] and hybrid Petri nets [3]. Hybrid automata can consider any continuous dy-
namics in a location, and the commutation from one location to the other one is
synchronized by a discrete event. It is then possible to model any type of system.
The main modeling drawback of the hybrid automata is the explosion of the num-
ber of locations in case of real life systems. To overcome this problem, hybrid Pe-
tri nets consider a state as a marking with a continuous and a discrete part. They
provide very compact and readable models very useful for engineers. However, in
order to perform a formal analysis, it is necessary to come back to the hybrid au-
tomata which are known for their analysis power. This analysis requires the con-
struction of the reachable state space. This operation is all the more complex be-
cause the discrete part is strongly nonlinear and the time is often non-
deterministic. The calculation algorithms of the reachable state space only termi-
nate under very restrictive constraints, for example for timed models or some line-
ar hybrid automata where the continuous dynamics are constant. The reachable
state space is described with a set of inequalities over the state variables, thus al-
lowing both the performance analysis of the system and the synthesis of the con-
trol.
Most realistic formal approaches consider either continuous approaches with
few commutations or discrete approaches with a very poor continuous dynamics
(clocks). Since these systems are strongly nonlinear, any change in one or several
parameters often forces us to completely redo the study of the problem. When the
HDS become more complex, the analysis tools also become more complex, turn-
ing them into loosely flexible systems with high calculation times, which do not
react fast enough to unexpected events. In order to provide flexibility to the HDS,
the researchers have studied the possibility of implementing flexible control archi-
tectures on complex dynamic systems [4][5].
Holonic Hybrid Control Model (H²CM) [5] is a holonic architecture developed
with the aim of giving flexibility to HDS control and it is based on the holonic ar-
chitecture of discrete systems called PROSA [6]. It is composed of three basic ho-
lons:
• the product holon, which has all the information of the product;
• the resource holon, which is an abstraction of the resource;
3
• the order holon, which takes the information of both holons and generates the
scheduling of the services to implement.
An example of a complex HDS is the pipeline system [7], which is a very im-
portant transport system that guarantees a regular supply of products and a rapid
adaptation to market demand, thus significantly reducing costs and delays of
product transportation. Pipeline systems are continuous operation systems that
work with several products, resulting in a contaminated mixing zone on the con-
tact of two products that are transported sequentially. Therefore, a greater number
of batches transported will produce a larger number of contaminated product
batches. With the objective of minimizing contaminated product batches, optimi-
zation methods are used that generate the batch sequence scheduling to be trans-
ported, with the restriction that these methods have high calculation times and are
not flexible to changes in transport demand.
The objective of this article is to propose the implementation of the H²CM ar-
chitecture to a pipeline transport system in order to provide operational flexibility
in the phase of changes in the demand for products, keeping the optimization crite-
ria of the generation of contaminated product. This preliminary study extends the
performance evaluation of H²CM that was made on a water tanks system [8] with
the notion of switching costs (contaminated product volume) and the dynamics of
the pipeline (delay between the switch and the final tank filling).
The study case is extensively presented in the next section. Then, the defined
holonic architecture (H²CM compatible) is detailed, and the role and function of
each holon are presented. Finally, a tentative general control algorithm is suggest-
ed, which gives an insight on the actual algorithms that will be developed in per-
spective of this work.
2
Case study: pipeline presentation
2.1 Description of the ASR multi-product pipeline
The transportation of fuels by pipeline is increasingly spread throughout the
world. This is explained by an increase in the quantities of transported products.
This situation requires companies to further develop their logistics. It is in this ob-
jective that the Algerian oil companies have an investment program, aimed at se-
curing the country's petroleum products, through an intelligent network of pipe-
lines, responding to the real need of the different zones of the country.
The transportation by pipeline contributes to the reduction of both costs, deliv-
ery times, road traffic and also ensures mass transport respecting the environment
with the most security. If pipelines did not exist, it would be inevitable to have
thousands of trucks and railcars that circulate on roads, highways and railways to
carry out the same transport.
The current technology is oriented towards multi-product pipelines. The latter
has the disadvantage of creating a mixing or a contaminated product zone between
4
two products in contact (Fig. 1), which circulate sequentially in the pipeline. The
contaminated product is generated at each contact of two different products of
fuels. So a sequence of several batches promotes proportionately several batches
of contaminated product, requiring a large space for their storage.
Fuel A
Contaminated mixture
Fuel B
Fig. 1. Typical sequence with two products and one contaminated area
In this paper, we focus our study on a typical pipeline of the National Petroleum
Algerian Company (SONATRACH). It is the multi-product ASR pipeline (Abbre-
viation for the three cities: Arzew, Sidi Bel Abbès and Remchi in the west of Al-
geria, through which the pipeline passes). The pipeline transports fuel from the
Arzew refinery to the storage and distribution sites of Sidi Bel Abbes and Remchi.
They feed the regions West and South-West of Algeria in fuels (diesel fuel and
gasolines). The demand of the region, leads to the introduction into the ASR pipe-
line of important sequences of several batches to meet the needs of the region.
This results in numerous interfaces, zones of birth of the mixtures and high levels
of the contaminated product stock at the depot of Remchi.
In view of the contamination constraints and the high demand of fuel, it will be
interesting to study the optimization of the multi-product fuel transport. The objec-
tive will therefore be the minimization of the contaminated product stocks on one
hand, and the satisfaction of the of the demands of the two distribution depots of
pure products on the other hand,
2.2 Physical data of the pipeline:
The multi-product ASR pipeline is located in the west of Algeria. Its profile ex-
tends over a length of about 168 𝑘𝑚, from the refinery of Arzew passing by Sidi
Bel Abbes depot and arriving at the final depot of Remchi. The pipeline receives
the liquid fuels from the Arzew refinery and supplies the storage and distribution
depots in Sidi Bel Abbes and Remchi (Fig. 2).
Table 1 below shows the storage capacities of each depot in the different fuels.
In table 2 we represent the daily demand at the two depots level.
5
3
Holonic Modelling
3.1 H²CM overview
H2CM generic architecture is based on the three basic holons of PROSA, intro-
duced in Fig. 4 (a). Two main features can be highlighted:
1. Each resource is granted with an order and a product along its life. The order
holon is in charge of the monitoring of the resource whereas the product holon
is in charge of the recipe to be applied on the actual product. The content and
objectives of the order and product holons are constantly evolving, but the
structure remains constantly the same;
2. A recursivity link is present on the resource holon (Fig. 4 (b)). Indeed, each
compound resource can be fractally decomposed into one or several holarchies,
comprising one or several resources and their associated order and product ho-
lons. The aggregation relations created here can be changed along the working
of the system; holarchies can be created and destroyed online.
Fig. 2. Longitudinal profile of the multi-product pipeline ASR.
Sidi Bel Abbes
Distribution depot
Remchi Distribu-
tion depot
Refinery
PG
SG
GE
PG
C1 C2
SG
UG
GE
Product 1 Product 2
Product 1
Product 3
contaminated product
Fig. 3. Structure of the ASR structure.
6
Table 1. Capacities, initial volumes and safety stocks of products and contaminated prod-
ucts in the two depots.
Sidi Bel Abbes depot
Remchi depot
Capacity
[m3]
6000
1700
Initial
stock
[m3]
814
809
Security
stock
[m3]
1200
Capacity
[m3]
Initial
stock
[m3]
22000
5572.4
Security
stock
[m3]
4400
340
9500
3394.6
1900
450
196
90
1000
996
200
5000
3284.7
1000
500
396.5
500
405
Fuels
Diesel
Pure
gasoline
Super
gasoline
Unleaded
gasoline
Contaminated
product type 1
Contaminated
product type 2
Table 2. Daily demand in the two depots.
Product
Diesel
Pure gasoline
Super gasoline
unleaded gasoline
Daily demand
Sidi Bel Abbes depot
Rechi depot
1200
80
400
3000
150
800
150
The order holon is globally responsible for the scheduling of the system. It is very
representative of the dual working of every holons: one part is dedicated to the ne-
gotiation mechanisms in look-ahead mode in order to determine the future sched-
uling and holarchies of the system, while the other part of the holon is dedicated to
the system in real time mode through the application of the scheduling resulting
from the previous negotiations.
The product holon is dedicated to store and communicate the products recipes
which are deduced from a Master Recipe. In H2CM, this Master Recipe can be de-
fined as a generic recipe, i.e. a sequential list of operations to be applied to the
product to obtain a final product from raw materials (BOM -- Bill of Materials),
from which the actual recipe can be derived according to the conditions of the sys-
tem. In HDS context, a service-oriented specification, as proposed in [9, 10], is
well suited for the product specification. The distinction made in this article, with
7
respect to the definition used in [9, 10], is that the parameters and variables of the
service can be continuous or discrete.
By nature, HDS are large systems, constituted of many components. Therefore,
a lot of resource holons are necessary to control the system. As Fig. 4 (b) defined a
recursivity of the resources, so the smallest resource holon to be defined is called
atomic resources and can be expressed as "the maximal aggregation of elements
whose system of differential equations can be inversed in a short delay relatively
to the dynamics of the system". Considering compound resources, the negotiation
mechanism is meant to determine the best solution recursively, interrogating the
aggregated resources until atomic ones. Resources holons are part of the negotia-
tion mechanisms and their function is to evaluate and transmit to the order holon
the best possible variables values to obtain the desired function and services. Re-
source holons also have the responsibility for the devices online control, i.e. the
role of controllers of the system.
Fig. 4. a) H2CM basic holons b) H2CM diagram
Another resource holon's specificity is its structure. Classically, it is composed
by a physical part and a logical part, see Fig. 4 (a). The physical part is represent-
ed by the shop floor. The logical part of the resource holon is an abstraction of the
physical part and contains the conversion models from continuous states to dis-
crete states and vice-versa. The models used are hybrid models that change their
state using threshold levels of continuous variables. The abstraction of physical
part can be developed by any industrial computer with communication capability.
3.2 Description of holons and services in the case of a pipeline
The work developed in this paper focuses on the multi-product ASR pipeline link-
ing the Arzew refinery to the storage and distribution centers of Sidi Bel Abbes
and Remchi. The latter deserves the centers in fuels namely: Diesel, Super Gaso-
line, Unleaded Gasoline and Normal Gasoline. From the holonic point of view, the
ASR pipeline will be divided into three composite holons (see Fig. 5) which will
offer three different types of services.
8
The first composite holon to be defined is the Arzew refinery, composed by the
finished product tanks system and the pipe and pump system. The service offered
by the holon of the Arzew refinery is the supply of fuel products. Looking at Fig.
6, the refinery resource holon has an associated product holon and an order holon.
The product holon has contaminated product information, such as the volume gen-
erated in each product mix and the variation of product density during mixing. The
order holon will have the task of scheduling and executing the product supply ser-
vice. The order holon will perform a scheduling using off-line optimization meth-
ods, so it will need the atomic resources holon information and the store holons in-
formation, obtained by holons negotiation. A second task of the order holon is
based on the supervision of real-time scheduling, if any disturbance occurs in the
execution of the same, the holon order must take corrective measures with the new
information and perform a re-scheduling, this procedure will be discussed in the
next section.
Fig. 5. Distribution level holonic architecture
On the other hand the refinery resource holon is composed of tank holons,
which for the case under study is considered an inexhaustible supply. Therefore,
its function is to switch the supply valve depending on the product to be supplied.
If there was no inexhaustible supply, this holon should supply the level status of
each product to be considered during the scheduling. The other holon available in
the refinery holon is the pipeline holon, its task is based on determining the avail-
ability of the pipeline as well as providing the products density measure service
and the control pumps service during product supply.
The other two holons represented in Fig. 5 are the products depots holons of
Sidi Bel Abbès and Remchi. Both composite holons are made up of diesel tanks,
Super gasoline tank, and normal gasoline tank, this latter depot additionally has
unleaded gasoline tank and contaminated product tank. Both depots offer the ser-
9
vice of storage of finished product (normal gasoline, super gasoline and diesel). In
addition, Remchi depot offers the storage service of unleaded gasoline and con-
taminated product, see Fig. 7.
Each holon depot also has associated a product holon and an order holon. The
information possessed by the product holon is the characteristic of each products
to be received, among them we must highlight the products density since this in-
formation is used to monitor the products in the pipeline. The order holon contains
information on the capacity of each tank resource holon. The method used to ob-
tain this information from the compound holons is detailed in [5], [11]. The ser-
vice provided by the order holon is based on online monitoring filling of the prod-
uct tanks. If there is a change in the demand, it establishes a new negotiation with
the refinery holon to obtain a corrective action.
Fig. 6. Refinery Composite Holon
This description of the adaptation of H²CM reference architecture to this new
case study outlines the adaptability of the architecture, that was intended generic
enough to cope with multiple type of HDS.
4
Algorithms
The main goal of the product supply scheduling algorithm is to minimize the
amount of contaminated product while supplying the tanks to ensure the demand.
For this, it is necessary to execute an optimization method that guarantees the de-
sired objective. Usual optimization methods have high calculation times which
make them difficult to implement online. Thus, the system can perform a first
schedule using optimal methods since it has sufficient time to perform the calcula-
10
tion, but this schedule needs to be updated in real time using other techniques.
This reschedule is obtained by negotiating between the refinery holon and the de-
pot holons.
Fig. 7. Depot Composite Holon
Once the schedule is calculated (by any method), the scheduling supervision
process begins. Once an unforeseen event is present in the product supply process,
the order holon needs to make a decision based on the information obtained
through the negotiation of the holons the resolve this new disturbance. It is obvi-
ously difficult to exhaustively list all the disturbances that may occur in the sys-
tem, but the following ones can be considered as the most frequent and impacting:
1. Variation in demand for products depots;
2. Variation of the tanks capacity of contaminated product;
3. Decreased pump performance of the pipeline system.
These disturbances, when occurring on a system controlled by a schedule
based on optimal methods without adjustments in line, can cause changes in the
system that result in a shutdown of the functions in the transport system. For this,
an online scheduling algorithm is proposed, that aims to find a solution to the pre-
sented perturbation, see Fig. 8.
In Fig. 8 is observed that once the disturbance is presented, the incidence on
the current planning is calculated as a function of time. If the present disturbance
is not so aggressive that immediate changes are needed, then re-scheduling will be
performed by optimal methods, otherwise re-scheduling will be done by any other
computational method that is fast enough to find a solution. An online schedule
algorithm for tanks filling minimizing the number of switches of the unique server
was proposed in [8], and might be adapted to this specific case study. The main
idea is to try and maximize the duration the server remains in the same position,
while avoiding the situation where the rest of tank are empty at the same time.
11
Therefore, the algorithm tries to anticipate the reservation of the server if the time
slot where some tank would be empty is already scheduled to another tank. A
timelapse is also defined. This timelapse represents the length of the reservation a
tank tries to schedule. If no solution can be found by the system with the prede-
termined timelapse, then the algorithm loops with a shorter timelapse. The calcu-
lation time of the algorithm is very short, which makes us believe that this kind of
scheduling, although it does not guarantee the best minimization of the amount of
generated contaminated product, is a good candidate for a pertinent control in the
situations where the input data are frequently disturbed.
Fig. 8. Scheduling and re-scheduling Algorithm
The algorithms that need to be developed in this case study greatly differ from
the ones previously published [8]. Indeed, the former was related to a single server
of water and no setup times, while this is related to a single server generating set-
up wastes denoted contaminated product in this description.
5
Conclusion
Pipeline transport systems are complex HDS that can be scheduled by optimal
methods, but they have little flexibility facing disturbances, which makes them
difficult to control using online methods. To this end, the H2CM implementation
on HDS was previously proposed [5] in order to give flexibility to those systems.
12
To demonstrate the application of H2CM on HDS, a case study of the multi-
product ASR pipeline was used in this article. This preliminary work outlined the
adaptation of H²CM to this specific case study and showed it was suitable for
modelling. Some elements were given about the definition of the future algorithms
that will control the whole architecture, with the objective of finding solutions
through optimal and non-optimal methods, and also allowing online monitoring
and re-scheduling of the system in presence of any deviation.
The perspectives of this preliminary work deal with the actual coding of the ar-
chitecture and the performance evaluation compared to the scheduling techniques
with a perfectly known demand in order to evaluate the optimality of the holonic
control. Then, a study will be performed in order to evaluate the robustness of the
control in case of demand variation. The H²CM based control is meant to absorb
those uncertainties in real time, which needs to be verified.
6
1.
2.
3.
4.
5.
6.
7.
8.
9.
References
Pettersson S, Lennartson B, others (1995) Hybrid modelling focused on hybrid Petri
nets. In: 2nd Eur. Workshop Real-Time Hybrid Syst. pp 303 -- 309
Alur R, Courcoubetis C, Halbwachs N, Henzinger TA, Ho P-H, Nicollin X, Olivero
A, Sifakis J, Yovine S (1995) The algorithmic analysis of hybrid systems. Theor
Comput Sci 138:3 -- 34
David R, Alla H (2001) On hybrid Petri nets. Discrete Event Dyn Syst 11:9 -- 40
Chokshi N, McFarlane D (2008) A distributed architecture for reconfigurable con-
trol of continuous process operations. J Intell Manuf 19:215 -- 232
Indriago C, Cardin O, Rakoto N, Castagna P, Chacòn E (2016) H 2 CM: A holonic
architecture for flexible hybrid control systems. Comput Ind 77:15 -- 28
Van Brussel H, Wyns J, Valckenaers P, Bongaerts L, Peeters P (1998) Reference ar-
chitecture for holonic manufacturing systems: PROSA. Comput Ind 37:255 -- 274
Bennacer D, Saim R, Abboudi S, Benameur B, others (2016) Interface calculation
method improves multiproduct transport. Oil Gas J 114:74 -- +
Indriago C, Cardin O, Bellenguez-Morineau O, Rakoto N, Castagna P, Chacòn E
(2016) Performance evaluation of holonic control of a switch arrival system. Con-
curr Eng 1063293X16643568
Gamboa Quintanilla F, Cardin O, Castagna P (2014) Product Specification for Flex-
ible Workflow Orchestrations in Service Oriented Holonic Manufacturing Systems.
In: Serv. Orientat. Holonic Multi-Agent Manuf. Robot. Springer, pp 177 -- 193
10. Gamboa Quintanilla F, Cardin O, L'Anton A, Castagna P (2016) A Petri net-based
methodology to increase flexibility in service-oriented holonic manufacturing sys-
tems. Comput Ind 76:53 -- 68
Indriago C, Cardin O, Rakoto-Ravalontsalama N, Chacón E, Castagna P (2014) Ap-
plication of holonic paradigm to hybrid processes: case of a water treatment process.
SOHOMA'14 Workshop Serv. Orientat. Holonic Multi-Agent Manuf.
11.
|
1302.4774 | 1 | 1302 | 2013-02-19T23:06:58 | A theoretical framework for conducting multi-level studies of complex social systems with agent-based models and empirical data | [
"cs.MA",
"cs.SI",
"stat.AP"
] | A formal but intuitive framework is introduced to bridge the gap between data obtained from empirical studies and that generated by agent-based models. This is based on three key tenets. Firstly, a simulation can be given multiple formal descriptions corresponding to static and dynamic properties at different levels of observation. These can be easily mapped to empirically observed phenomena and data obtained from them. Secondly, an agent-based model generates a set of closed systems, and computational simulation is the means by which we sample from this set. Thirdly, properties at different levels and statistical relationships between them can be used to classify simulations as those that instantiate a more sophisticated set of constraints. These can be validated with models obtained from statistical models of empirical data (for example, structural equation or multi-level models) and hence provide more stringent criteria for validating the agent-based model itself. | cs.MA | cs | A theoretical framework for conducting
multi-level studies of complex social systems
with agent-based models and empirical data
Chih-Chun Chen
3
1
0
2
b
e
F
9
1
]
A
M
.
s
c
[
1
v
4
7
7
4
.
2
0
3
1
:
v
i
X
r
a
1
Abstract
A formal but intuitive framework is introduced to bridge the gap
between data obtained from empirical studies and that generated by
agent-based models. This is based on three key tenets. Firstly, a
simulation can be given multiple formal descriptions corresponding to
static and dynamic properties at different levels of observation. These
can be easily mapped to empirically observed phenomena and data ob-
tained from them. Secondly, an agent-based model generates a set of
closed systems, and computational simulation is the means by which
we sample from this set. Thirdly, properties at different levels and
statistical relationships between them can be used to classify simula-
tions as those that instantiate a more sophisticated set of constraints.
These can be validated with models obtained from statistical mod-
els of empirical data (for example, structural equation or multi-level
models) and hence provide more stringent criteria for validating the
agent-based model itself.
ABM framework for multi-level studies of complex social systems
3
1
Introduction
Many social and economic phenomena can be characterised in terms of 'com-
plex systems'. Within this characterisation, entities and patterns of behaviour
emerge at different levels, and interact with one another in non-linear ways.
Agent-based modelling (ABM) is a computational method for modelling and
simulating such systems.
The complex systems perspective has two major strands. From a more
Statistical Mechanics-oriented view, the study of complex systems has fo-
cused mainly on the ways in which lower level micro-properties and inter-
actions give rise to higher level macro-properties (Feldman and Crutchfield,
2003), (Ellis, 2005). The more biologically-based approach tends to focus
more on relating properties at different levels, such as functional modules
in the brain or biochemical pathways and networks (in some cases, such as
feedback, the emergent phenomenon may even be at the micro-level) (Varela,
1979), (Tononi et al., 1994), (Hartwell et al., 1999). Both these strands should
be leveraged in the social sciences.
From a policy point of view, it is important to understand how changes
in rules at the micro-level (which might represent the interaction between
psychology and policy) affect more macro-level behaviours (which might in-
clude those associated with family, organisational, or geographical units). At
the same time, we often have important information about the way decisions
or behaviours of units at different levels relate to each other (for example,
ABM framework for multi-level studies of complex social systems
4
if several commercial organisations dominate a sector, this can affect both
other organisations within the sector and other sectors).
Currently, the complex systems approach is largely model-dominated
and/or model-driven (whether models are informal, formal, mathematical,
or statistical). While this allows theories to be specified with precision, there
is a risk of alienating those conducting empirical research and hence mod-
els becoming irrelevant or too idealized for real world application. There is
therefore an urgent need to establish robust techniques for analysing and val-
idating models with respect to empirical data, particularly as, unlike in the
physical sciences, idealizations of models do not always have clear isomor-
phism with empirically based studies (Henrickson and McKelvey, 2002). As
ABM is maturing and becoming more widely adopted in the social sciences
(Bonabeau, 2002), (Sawyer, 2001), (Gilbert and Trioitzsch, 2005), (Focus,
2010), it is crucial that the appropriate methods of analysis are applied and
that the conclusions we draw from these analyses are valid. This requires an
understanding of their theoretical basis and rationale.
Furthermore, a rigorously grounded theory allows us to defend the con-
clusions we draw from validating models against empirical data and avoid
the doubts often cast upon the utility and validity of agent-based models
(see, for example (McCauley, 2006)). Related to this are questions regarding
the interpretation and analysis of simulations, for example:
• How many simulations do we need to run to draw a conclusion?
ABM framework for multi-level studies of complex social systems
5
• How do we interpret differences between simulations?
• How do we use empirical data and simulation-generated data to validate
a model? (Discussions of different aspects of ABM empirical validation
issues can be found in (Kleijnen, 1995)„ (Axtell et al., 1996), (Kleijnen
and Kleijnen, 2001), (Fagiolo, 2003), (Troitzsch, 2004), (Brenner and
Werker, 2007), (Marks, 2007), (Windrum et al., 2007), (Moss, 2008).)
• How do we choose between different agent-based models and parameter
configurations when they are all able to generate empirically valid data?
This article introduces a simple theory of types for describing agent-based
simulations at different levels and relates this to the application of different
established analytical techniques. The theory is based on three fundamental
tenets:
1. Theoretically, an agent-based model generates a finite set of formally
describable closed complex systems, and simulations are the means by
which we sample from this set. In other words, each simulation is an
instantiation of a possible system generated by the model;
2. A simulation can be formally described in terms of properties or phe-
nomena at different levels, with micro-level properties corresponding
to computational states end events, and higher level properties corre-
sponding to sets and/or structures of these states and events. (Higher
level properties such as population behaviour can also be expressed in
ABM framework for multi-level studies of complex social systems
6
terms of macro-variables and changes in macro-variables, which would
define the sets of event structures; see Section ??)
3. Property descriptions at different levels can be used (either in isolation
or in combination) to classify simulations.
These tenets allow us to build more stringently constrained models relat-
ing phenomena at different levels, which provide stricter criteria for valida-
tion with empirical data. Instead of simply requiring that some phenomenon
'emerges' at the systemic level in simulations, structures of related phenom-
ena (possibly at different scales and/or levels of abstraction) need to be
reproduced with appropriate frequencies or probabilities.
Before commencing, we wish to emphasize that the social sciences cover
a vast landscape of disciplines and domains, and that each domain (and
subdomain) will have its own set of issues to address when both developing
and validating agent-based models. The hope is that each specific domain
will be able to adapt, extend and apply our framework for their specific
purposes.
2 Background and motivation: The applica-
tion of ABM in the study of social systems
Quantitative characterization of dynamic social and economic systems is of-
ten problematic because such systems are complex. By complex, it is meant
ABM framework for multi-level studies of complex social systems
7
that the behaviour of these systems arises as the result of interactions be-
tween multiple factors at different levels (we will formalise the notion of levels
in Section 4). In the Complex Systems literature (particularly from Statis-
tical Physics) the terms 'non-equilibrium', 'non-linear' and 'non-ergodic' are
often used to refer to describe such system. The difficulty posed by such
systems is that knowledge of micro-behaviour does not guarantee knowledge
of the macro-behaviour, and vice versa. There are two aspects to this.
Firstly, the macro-level behaviour by definition can not be descriptively
or logically reduced to micro-level behaviour; language used to describe the
micro-level is therefore logically distinct from that used to characterise the
macro-level (Darley, 1994), (Bonabeau and Dessalles, 1997), (Kubik, 2003),
(Deguet et al., 2006). This follows from the fact that micro- and macro-level
phenomena require different levels of observation to be manifest (Crutchfield,
1994), (Crutchfield and Feldman, 2003), (Sasai and Gunji, 2008), (Ryan,
2007), (Prokopenko et al., 2009).
Secondly, in contrast to systems in equilibrium in which differences at the
micro-level make little difference to macro-level observations and hence for
which we can predict macro-level behaviour from micro-level observations,
complex systems are sensitive to relatively small perturbations. This sensi-
tivity means that perturbations at the micro-level can have non-linear effects
at the macro-level (Kauffman, 1993), (Holland, 2000), (Yam, 2003), (Ellis,
2005).
The motivation for ABM comes from both these aspects. In ABM, the
ABM framework for multi-level studies of complex social systems
8
micro-level is specified computationally in the form of state transition rules
(ST Rs) governing the behaviour of computational agents and the macro-level
behaviour is usually represented by system-level global state variables which
aggregate in some way the states or behaviours of the agents in the system.
These two modes of representation can be seen to respectively represent the
logically distinct micro- and macro-level languages. At the same time, ABM
is used to study the effects of perturbations at the micro-level, which are
introduced as differences in initial conditions and/or parameters. The types
of questions that ABM practice typically try to address are:
• How different are the behaviours of simulations generated from different
initial conditions?
• Which parameters is the model most sensitive to?
• Under which parameter configurations and/or ranges is the behaviour
most sensitive or stable?
However, the idea that complex, non-linear relationships exist between
phenomena at different levels is in fact extremely pervasive in empirical
studies. The key difference between such studies and more model-centric
approaches to complexity lies in the methods used to analyse and represent
this complexity.
In empirical studies, the techniques tend to focus more
on interactive statistical associations between phenomena e.g. (Pearl, 1998),
(Krull and MacKinnon, 2001), which tend to be represented in network-based
or hierarchical models, such as Bayesian networks, structural equations, or
ABM framework for multi-level studies of complex social systems
9
multi-level models. In such representations, the relations between 'levels' are
not formal, but descriptive (based only on our understanding of the phe-
nomena) or statistical (as in the case of multi-level (Gelman, 2006), (Gelman
and Hill, 2006) or modular (Seth, 2008) models). Model-driven studies on
the other hand, tend to consider associations in terms of their fundamental
statistical mechanics (?) or emergent network dynamics (Barab´asi, 2002),
(Dorogovtsev and Mendes, 2003).
This paper seeks to explicitly relate these two perspectives using an ex-
tended ABM framework that permits the representation of properties and
behaviours at any level of abstraction and the relationships between them,
going beyond simple two-level micro-macro/macro-micro relationships.
2.1 Hypotheses, empirical data, models and simula-
tions
Empirical validation is a significant challenge that needs to be overcome in
order for ABM to become more seriously adopted in the Social sciences. We
can classify validation techniques according to the types of hypotheses they
support. To date, the motivation for applying agent-based modelling tends
to be motivated by the following two hypotheses classes:
• Hypotheses concerning the ability of mechanisms and interactions at
the micro-level to give rise to phenomena at the systemic level, for
example, attraction/repulsion -¿ regional segregation. In these cases,
ABM framework for multi-level studies of complex social systems
10
qualitative data can be used to (weakly) validate the model (i.e. show
that it is not false). At the micro-level, these might be based on findings
from Psychology or on enforced policies. At the systemic level, they
might be anecdotal or event-based observations. This is illustrated in
Figure 1.
• Hypotheses concerning the conditions under which mechanisms and in-
teractions at the micro-level are able to give rise to phenomena at the
systemic level, for example, attraction/repulsion -¿ regional segrega-
tion when the initial diversity of agents exceeds a particular threshold.
With these types of hypotheses, validation would require empirical data
about both the initial configuration and the observed phenomena (e.g.
regional distribution of different ethnic backgrounds at t1 and t2). This
is illustrated in Figure 2.
However, we can also analyse agent-based models with empirical data to
address the following:
• Hypotheses relating micro-level mechanisms to relationships between
phenomena at different levels, including how they might interact to
give rise to global systemic phenomena. For example, we could for-
mulate and validate a model that describes the relationship between
individuals' psychology, policy decisions, regional migration, local un-
employment, and the country's economy. This would require empirical
data relating to each of the phenomena at the different levels. If the
ABM framework for multi-level studies of complex social systems
11
totality of qualitative effects are observed, then we can say the model is
valid. This can be expressed as a graph or network. If the data we have
is quantitative, the edges of the graph can also be weighted to represent
the strength of the relationships. This is illustrated in Figures 3 and 5.
• Hypotheses about the conditions under which relationships between
phenomena at different levels hold. This would require data from differ-
ent instances of the related phenomena, including their non-occurrence.
For example, we would need to ensure that the cases in which the re-
lationships hold have the same features (or feature combinations) as
hypothesised, and that these features combinations are not found in
the cases in which the relationships do not hold. It is also possible that
this a matter of degree e.g. factor X reduces the strength of association
between phenomena A, B, and C. This is illustrated in Figure 4.
2.2 A general characterisation of ABM
To ensure we have as general a characterisation of ABM as possible, we
do not base our framework on any specific modelling language or software
framework, but instead give an abstract definition that can be easily mapped
to existing ABM frameworks.
We define an ABM as a set of agent types A0, ..., An (global state vari-
ables, e.g. representing resource availability, and dynamic spatial represen-
tations can also be represented as agent types in this abstract formulation)
ABM framework for multi-level studies of complex social systems
12
and constraints C determining how agents are able to interact in the system
(for example, whether they can communicate directly, synchronously, asyn-
chronously, symmetrically, asymmetrically or via some specified protocol or
topology; this also determines the updating or execution order). Each agent
type Ai consists of a set of variables with defined value ranges and a set
of state transition rules (ST Ri). ST Rs can be seen to represent the range
of possible behaviours for agents (instantiations) of the particular type Ai
and therefore encode the knowledge we have about individual- or micro-level
behaviour. The set of variables and value ranges define the set of states that
agents of the type are able to realise.
We define a state transition rule ST RAi to be a function that maps (i)
a source subsystem state (ϕsource) represented by the values of some subset
of the system's state variables (which might be encapsulated in the agent
itself or belong to other agents and/or elements in the system) to (ii) a
target subsystem state (ϕtarget) represented by some new set of values for
the set of variables when a particular condition cn is satisfied. The mapping
ϕsource → ϕtarget is the state transition, as defined below:
State transition A state transition is a transformation of one subsystem
state to another subsystem state. The state before the transformation is
applied is called the source state and is denoted ϕsource, while the state after
the transformation has been applied is called the target state and denoted
ϕtarget. (The definition for subsystem state is given in Definition ??).
ABM framework for multi-level studies of complex social systems
13
State transition rule (ST R)
ST RAi(cn) = ϕsource → ϕtarget,
(1)
where cn ∈ CN, and CN denotes the set of conditions that can be distin-
guished by agents of the type Ai.
* The condition cn under which an ST R is executed might be dependent
on the agent's own state qa, the state qe of its environment or neighbourhood
e (which might itself be made up of other agents' states), or both. State
transition rules might also be expressed implicitly in terms of constraints on
permissible action as well as explicitly in terms of conditional state changes,
but these are formally equivalent.
In the most general terms therefore (abstracting away from particular
formal languages or modelling frameworks), an agent-based model is a set
of agent types with a set of constraints governing the interactions between
agents.
3 Agent-based models as both generators and
classifiers of system types
To truly understand what we are doing when we run simulations of agent-
based models, it is necessary to delve a little into some of the technical
ABM framework for multi-level studies of complex social systems
14
computational details of simulation. Although the practice of agent-based
modelling should be seen as abstracted from computational matters (just
as programming languages are seen as distinct from machine code), when
running simulations, the realisation of computations can have certain impli-
cations.
The following are especially important to note:
Execution order Different orders of execution and state updating can
lead to radically different outcomes, even with the same initial conditions and
parameter settings (Garg et al., 2008), (Blok et al., 1999). In fact, we can see
different updating rules as an extension of the agent-based model itself, since
the set of systems generated by one set of updating rules (e.g. asynchronous)
is different to (and may not even overlap with) the set generated by another
(e.g. synchronous).
Set of systems generated The set of possible systems (distinguishable
simulations) that can be generated from an agent-based model can be ar-
bitrarily limited by the nature of the platform on which it is run. This is
particularly pertinent in cases where real (rather than integer) values are
included in the model or where stochasticity features. In the case of real val-
ues, the memory limitations mean that accuracy is limited. In other words,
the set of possible simulations only includes systems in which we are able
to measure a variable to n decimal places. While this might at first seem
trivial, the implication is theoretically significant, since it means that the
ABM framework for multi-level studies of complex social systems
15
set of systems we are able to study computationally (if we were to simulate
every possible system) is only a subset of the possible systems that could
theoretically be generated by our agent-based model.
More generally, if we see each distinguishable simulation 1 as a computa-
tional representation of a system that the agent-based model can generate,
it is clear that however many simulations we run, the set of systems that
we can study is finite, even if the agent-based model is theoretically able to
generate an infinite set of systems. (We will formalise this later in terms of
complex event types.) 2
In the remainder of this section we will probe more deeply into the impli-
cations of this for three important aspects of simulation: (i) model concreti-
sation for validating predicted behaviour; (ii) sampling to determine 'typical'
behaviour; (iii) probing to evaluate parameter sensitivity.
3.1 Simulation as model concretization
In the practice of agent-based modelling, the most basic function of simula-
tion is to establish whether or not the model defined at the agent level is able
to generate some phenomenon at a higher systemic level. This is typically
represented by one or more state variables that aggregate individual agents'
state variable values. In many cases, models are also parametised so as to
capture some features of the system being modelled, so that the higher level
phenomenon is hypothesised to occur within some defined value range(s).
ABM framework for multi-level studies of complex social systems
16
Simulation is therefore treated as a means of determining what happens
when the statically represented agent-based model (expressed in terms of
agent state transition rules) is concretised and dynamically executed under
particular conditions (represented by parameters and initial conditions).
Returning to the fact that the set of distinguishable simulations is finite,
the implication is that even if we were to run every possible simulation, we
never observe the desired systemic phenomenon even though the agent-based
model is theoretically able to generate it. In other words, we are only able
to concretise part of the agent-based model (this is equivalent to saying we
can only sample a subset of the possible systems the model can generate; see
below).
This is especially problematic when the phenomenon we are trying to
understand itself a one-off or rare event. In this case, we have no informa-
tion about how probable the phenomenon is under the conditions we have
represented in the concretised model. Hence, even if the concretised model
(simulation) does emulate the phenomenon, we are not really entitled to
draw any strong conclusions (unless we have extremely detailed information
about the initial conditions and the phenomenon is only reproduced in simu-
lations where these initial conditions are realised; this is the rationale behind
'history-friendly' validation (Werker and Brenner, 2004)).
ABM framework for multi-level studies of complex social systems
17
3.2 Simulation as sampling
Another widely adopted approach to simulation is to treat it as sampling
(see Figure 6).
In terms of data about the system being modelled, this
requires us to have information about the distribution or probability with
which the desired phenomenon occurs. When simulating therefore, it is not
sufficient simply to reproduce the phenomenon, but to reproduce it to the
correct degree. For example, if our real world data tell us that phenomenon
X occurs in 50% of the cases, only around 50% of our simulations should
exhibit the phenomenon (assuming that we have represented in our agent-
based model everything we know about the system and that the fact that X
is only observed in 50% of the empircal cases is due to the incompleteness of
our knowledge of the conditions necessary for it to occur).
The issue with sampling from only a subset of systems implied by the
agent-based model is that neither our knowledge nor our ignorance is com-
pletely represented. Hence the resulting distribution of simulations sampled
is not strictly speaking a reflection of the information (or lack of information)
we have included in the agent-based model.
3.3 Simulation as probing
Yet another approach to agent-based simulation is to use it as a means of
understanding the fundamental nature of the phenomenon being studied.
This is strongly linked to other complex systems modelling techniques, such
ABM framework for multi-level studies of complex social systems
18
as equations or iterative maps. The type of model features that we are
interested in within this approach include for example, whether or not a
phenomenon is sensitive to scale (scale invariance) or how the degree to
which it occurs alters under different conditions (parameter sensitivity). In
other words, simulation is used as a means to better understand the model
and its set of systems.
The issue that arises here generalises that which arises when simulation
is used as a means of sampling. If we are using simulation as a means of
understanding the shape of the space of systems defined by our model, the
fact that we may only able to include a subset of the possible systems means
that only a region of the possible locations in the space of systems will be
accessible to us, leading to a mis-representation of the shape of this space.
More concretely, our response to the result that out of 1000 simulations, all
expect one show sufficient agreement with our empirical data might be very
different depending on the type of study. We could conclude that we have
captured the essential mechanisms underlying the phenomenon described by
our empirical data and that our agent-based model has been validated. On
the other hand, we might wish to further investigate the differences between
the anomalous simulation and the others by identifying the key differences
(for example, different initial conditions, subsystem behaviours or global sub-
trajectories). Empirical data associated with these distinguishing attributes
could then be sought to provide further support for the model (in the best
ABM framework for multi-level studies of complex social systems
19
case, the differences in the anomalous simulation would map directly onto an
anomalous case in the real world with the same distinguishing attributes).
On the other hand, even if the distinguishing attributes in the anomalous
simulation are implausible (for example, they refute what we believe should
be possible in human interactions), we might still accept the model as having
sufficient explanatory and predictive validity since the vast majority of sim-
ulations manage to reproduce what has been observed in the real world (of
course, different domains will have different tolerances to such discrepancies).
From a theoretical perspective, an agent-based model can be seen as both
a generator and a classifier of systems. The totality of the set of systems that
can possibly be generated computationally is determined by (i) the agent-
based model; (ii) the updating rules (which can be seen as an extension of the
model)the updating rules (which can be seen as an extension of the model);
(iii) the set of parameter value combinations that can be represented, includ-
ing the initial conditions and the set of possible values for random generator
seeds for stochastic models (e.g. x1 = [0.00000000000, 0.9999999999] × x2 =
[0.00000000000, 0.9999999999] × x3 = [0.00000000000, 0.9999999999]).
Correspondingly, the abstractly defined unparametised agent-based model
can be seen as defining a set of systems, with subsets defined by specific com-
binations of (i), (ii) and (iii). Even more generally, any feature that can be
represented computationally in terms of the model, either as simulation in-
put (as in the case of (i), (ii) and (iii)) or as some property or behaviour
'observed' in the simulation (see Section 4 below), can be seen to define a
ABM framework for multi-level studies of complex social systems
20
subset of distinguishable systems and hence be used to classify simulations
(see Figure 6).
4
'Levels' and 'observations' within simula-
tions
Although agent-based models were initially motivated by the desire to un-
derstand how phenomena observed at one level can give rise to phenomena
observed at another level. surprisingly little work has focused on formally
defining levels or observations in agent-based simulations. This section ad-
dresses this issue by showing how to formally represent observations at dif-
ferent levels in agent-based modelling terms.
In order to do this, we begin by first defining what we mean in general
by observing a system at different levels, and what it means to say that a
property exists at a particular level. An important point to note is that the
notion of level is by its very nature a relative one; it only makes sense to
to say that some property exists at a higher level than some other property.
Essentially there are two types of relation that link lower level properties to
higher level ones:
1. Composition, where lower level properties are the constituents of the
higher level property in some structured relation (e.g. Na + Cl -¿
NaCl)3;
ABM framework for multi-level studies of complex social systems
21
2. Set membership, where lower level properties belong to a set defined
by the higher level property (e.g. dog -¿ mammal). (See Figure 7.)
In many cases, these two types of relations are combined. For example, in
the case of 'marriage', not only does the property require the participation
of two individuals in some structured relation, but it is also blind to which
particular individuals participate in this structured relation. This can be
formally represented as a hypernetwork (Johnson, 2006), (Johnson, 2007)
or 'heterarchy' (Gunji and Kamiura, 2004). Furthermore, when speaking
of levels, it is impossible to separate a property's existence at a particular
level from the observation or description of the property at this level. The
resolution or precision of observation is equivalent to set membership (since a
lower resolution implies more members belonging to the set), while the scope
of observation is related to composition (since a greater scope implies more
constituents) (Ryan, 2007), (?).
4.1 Static and dynamic properties in simulations
Properties in agent-based simulations can be either static or dynamic.
In
terms of computational representation, static properties are subsystem states,
which are represented by the values of a subset of the variables (which might
also cut across agent boundaries, as in the example of group states, which take
an aggregate of only a subset of the variable values within each agent mem-
ber). Dynamic properties (or behaviours) are represented computationally
ABM framework for multi-level studies of complex social systems
22
by (possibly temporally extended) structures of state transition rule execu-
tions and state transitions. Indeed, every distinguishable system generated
by an agent-based model can be described formally as a unique structure of
ST R executions and their state transitions.
4.1.1 Static properties as variable values and their configurations
At any given point in time during the simulation, we can formally describe
the current state of the system as a structured set of variable values. Fur-
thermore, we can give descriptions of this structured set at different levels.
For example, from a single-agent level, the current state is described simply
as the set of state variable values encapsulated in the agent. On the other
hand, we can give descriptions that cut across agent boundaries, for example
taking only a subset of different agents' variable values (returning to the ex-
ample of a marriage, we do not necessarily need to know the colour of agents'
hair to obtain the number of married couples in the system at a given time,
only the marital status).
To capture the observations or description of properties, we introduce the
notion of types. A type is a specification for a class of objects such that objects
satisfying the specification belong to the set defined by the class. To formalise
the observation of properties in simulation using the two notions of hierarchy
(compositional and subset, as defined above), we define a subsystem state
type (SST) using a hypergraph representation where the hyperedges can be
either compositional or set relations (as defined by above). A hypergraph
ABM framework for multi-level studies of complex social systems
23
is a generalisation of a graph, where instead of the edges being limited to
binary relations between two nodes, they can be n-ary between any number
of nodes. An SST is then recursively defined by the hypergraph:
SST :: ({SST},{R})(V AR, [RG]),
(2)
where:
• R is a compositional or subset relation connecting n SSTs
• V AR is a variable;
• [RG] is the range of values that the variable must fall within (to rep-
resent the property).
• ( stands for OR)
So for example, to observe marriage, we might define the SST:
sstM arriage = ({(sstM1), sstM2, SSTM3, sstM4},{(sstM1∧sstM2∧sstM3∧sstM4)}),
where
• sstM1 = (husbID, N otN ull) (an agent has a husband);
• sstM2 = (wif eID, N otN ull) (an agent has a wife);
• sstM3 = (agentID, husbID) (identifies which agent the husband is);
ABM framework for multi-level studies of complex social systems
24
• sstM4 = (agentID, wif eID) (identifies which agent the wife is);
• wedge stands for AND and is a compositional relationship.
4.1.2 Behaviours as events and structured event executions
Given that an important motivation for agent-based modelling is often to
better understand the relationship between micro-level mechanisms (repre-
sented by ST Rs) and higher level phenomena, we further distinguish between
behaviours arising from the execution of a single ST R and those arising from
an execution structure of ST Rs. In general, a structure of ST R executions
and their state transitions is called a complex event. When a state transition
results from only a single ST R execution, we call it a simple event (a simple
event is also a complex event, albeit one which results from only one ST R
execution). Each simulation is therefore a complex event.
As with states, observation of behaviour is formally represented using
event types, where an event type is a specification defining a set of events
(state transitions). To respect the distinction between events arising from
the execution of a single ST R and those arising from more than one ST R
execution, simple event types (SETs) are those event classes where the re-
quirement for class membership is determined at least in part by which ST R
is executed. However, for a given ST R execution, different observations
(descriptions) are possible. For example, an stri that results in the state
transition (var1, var2) → (var10, var20) can be described with three distinct
SETs (or observed at three different 'levels'):
ABM framework for multi-level studies of complex social systems
25
1. {stri : [(var1, var2) → (var10, var20)]};
2. {stri : [var1 → var10]};
3. {stri : [var2 → var20]};
Furthermore, executions of different ST Rs might give rise to different
state transitions, but should be defined by distinct SETs (i.e. stri : [var1 →
var10] 6= ST Rj : [var1 → var10]).
Formally therefore, an SET is defined both by a set of two-tuple:
SET :: (ST R, ST),
(3)
where
• ST R is a state transition rule, and
• ST :: SST → SST 0 is a constraint that the description (or observation)
of the resulting state transition SST → SST 0 must satisfy. 4
: [var1 → var10], ST Rj
So, for example, the SET {ST Ri
: [var2 →
var20], ST Rk : [var3 → var30]} would be the set of events resulting from
either ST Ri, ST Rj or ST Rk observed at the one variable level which satisfy
the constraints satisfied (e.g. var1 > x, var10 < y...).
Complex event types (CETs) are event classes defined by a structure or
set of structures of state transitions resulting from a set of structured ST R
executions (this would include SETs, since SETs are simply classes of events
ABM framework for multi-level studies of complex social systems
26
where the structure of ST R execution is a single execution). As with SSTs,
this can be defined as a hypergraph of CETs, where each hyperedge can be
either a compositional (structural) or subtype (set membership) relation. As
in the case of SSTs, we are thus able to integrate the two types of hierarchy
(compositional and set) introduced above within a common event type. The
formal recursive definition can be given as:
CET :: ({CET},{R})SET,
(4)
where:
• R is a compositional or subset relation connecting n CETs
• ( stands for OR)
This definition is mainly for formal purposes. While it is possible to
specify a CET explicitly by defining the relationships between its constituent
or subtypes, this is not always possible in practice since these relationships
are not always known or, if they are, it would be extremely cumbersome to
specify them in the representation above. Indeed, the goal of simulation may
be to discover such relationships. In practice therefore, it is more feasible
to specify CETs implicitly using aggregated state variables; for example,
we might specify a CET that includes all those structured events where a
change in systemic variable X (e.g. mean population crime rate) exceeds a
given threshold a. One could then discover the execution structures after
simulation by examining the simulations where X exceeds a.
ABM framework for multi-level studies of complex social systems
27
Table 1 outlines the empirical equivalents of the SST /CET constructs
defined above and gives examples of empirical data to which they can be
mapped.
5
Inter- and multi-level validation of agent-
based models with empirical data
Having defined how we can 'observe' the dynamic instantiation properties and
behaviours in simulation, we can also use these to classify the set of systems
generated by an agent-based model (just as we can use input parameter
configurations to classify systems). The repertoire of models that we can
study has therefore been extended from hypotheses about how agent-level
rules generate systemic properties, to hypotheses about how agent-level rules
generate relationships between systemic properties.
5.1
Inter-level models and validation
Graph-based representations such as structural equation models and Bayesian
networks have been used in the social sciences to describe structures of re-
lated phenomena (usually represented as variables) and the nature of the
relationships (e.g. their strength, positivity). We call these structural mod-
els. Combined with the SST/CET framework defined above, we have a
means to represent structured, defined relationships between phenomena at
ABM framework for multi-level studies of complex social systems
28
different levels in terms of the agent-based model itself, and not only as ad-hoc
system-level state variables. We call these inter-level models.
To give a concrete example, as illustrated in Figure 8, if variables x1, x2,
and x3 respectively (i) overall crime rate, (ii) clan marriage rate, and (iii) clan
size, we can ask whether the agent-based model is able to generate an inter-
level model such that x2 is positively associated with x1, and x1 increases
x3 (Value ranges for x1, x2, and x3 are also implicit specifications for three
different CETs). Assuming that the agent-based model was developed and
parametised in an empirically-driven fashion, we would require multiple data
sets with data corresponding to x1, x2 and x3 to validate the inter-level model.
If the associations specified by the model are found in these empirical data,
the inter-level model is said to be valid, in the sense that it has not been
shown to be wrong. 5.
Similarly, if we have data corresponding to variations in parameter values
(e.g. different policies at the individual level, which could be translated into
agent propensities for action), we can hypothesise about the effects of inter-
ventions at the agent level on the structural or inter-level model. Or, if we
have very little information about what might be going on at the individual
level, we can classify simulations into those which generate these inter-level
relationships and those which do not (or do so with a far weaker degree), and
then conduct further analyses to determine what the 'unsuccessful' simula-
tions have in common. This might involve specifying and identifying further
CETs or, more simply, evaluating SET frequencies (and hence agent level
ABM framework for multi-level studies of complex social systems
29
ST R execution frequencies).
If, say, we find that a given SET is associ-
ated with an inter-level model, it would be worth probing further on the
effects of the particular ST R associated with this SET. In real world terms,
this might, for example, correspond to identifying a particular law as being
associated with a self-perpetuating web of social problems.
5.2 Multi-level models and parameter spaces
Given that an agent-based model aims to represent the essential individual-
level mechanisms underlying systemic phenomena, a deeper understanding
of these mechanisms can only be attained through probing the model's be-
haviour under different conditions. In practice, this is done through systemti-
cally varying the model's parameters, which (either individually or together)
can be used to represent different real-world scenarios. A characterisation of
the parameter space can therefore be seen as a statement of how our modelled
mechanisms interact under different conditions.
The multi-level statistical framework has proved to be extremely promis-
ing in the analysis of data in the social sciences. In multi-level modelling
(also known as hierarchical linear models), effects can vary depending on the
level of analysis. For example, a model relating two variables q and s, repre-
senting say, the salary per year of an individual and an individual's level of
education, and a parameter p, representing age, we might find that different
levels (precisions) of p grouping expose different relationships or relationship
strengths. If we choose a precision of 1 year to group individuals (i.e. 1, 2,
ABM framework for multi-level studies of complex social systems
30
3....), there may be little difference between groups, while a precision of 10
years (i.e. 1-10, 11-20, 21-30...) might yield a stronger relationship between
q and s for some groups than for others.
This same framework can be applied to the parametisation of agent-based
models. If, say, an agent-based model has two parameters p1 and p2, we can
probe the model by simulating with different p1×p2 configurations, giving an
n1 × n2 matrix of CETs, with each matrix cell corresponding to simulation
under the particular p1 × p2 configuration (n1 is the set of values for p1 we
simulate with, and n2 is the set of values for p2).
If some region of this matrix contains CETs differing greatly from the rest
of the matrix (but similar to each other), we separate it from the remainder
of the matrix using the p1 and p2 values. For example, we could discover
a multi-level model in which M1 holds between ranges p1 = [a1, a2] and
p2 = [b1, b2]; M2 holds between ranges p1 = [a1, a2] and p2 = [b3, b4]; and
M3 holds between ranges p1 = [a3, a4] and p2 = [b1, b4], where M1, M2 and
M3 could be any specified relationship, from simple linear correlation to an
inter-level network model. (In terms of CETs we can also say that the CET
associated with M1 and the CET associated with M2 are both subtypes
of a third CET defined by the parameter range p1 = [a1, a2].) Figure 7
illustrates this. As in the case of inter-level models, the multi-level model
itself implicitly specifies a CET, as do its sub-models.
Regions in which parameters (either on their own or in combination) are
particularly sensitive are regions in which the resolution defining groups has
ABM framework for multi-level studies of complex social systems
31
to be higher to observe the differences. Complexity comes in when the levels
are defined irregularly (i.e. the resolution for defining groups varies; this can
be within or between dimensions). To validate these regions, we need to also
split the empirical data into the appropriate groupings, possibly requiring
relatively high resolution data for some ranges.
In the above example, we would need two empirical datasets correspond-
ing to the two interval p2 = [b1, b2] and p2 = [b3, b4] within p1 = [a1, a2].
These two datasets correspond to the two groups ('levels'): (p1 = [a1, a2] ×
p2 = [b1, b2]) and (p1 = [a1, a2] × p2 = [b3, b4]). A third dataset is required
for the group (p1 = [a3, a4] × p2 = [b1, b4]). If, in these data groupings, the
relationships defined by M1, M2 and M3 hold, the multi-level model gener-
ated through simulations can be said to have been validated by the empirical
data. 6
This multi-level approach to describing the state space of an agent-based
model maps more naturally to data obtained from empirical studies than
the equation-based descriptions of phase transitions typically used to char-
acterise complex systems by physicists while still being formally related to
this description.
6 Summary and conclusions
In this article, we have introduced subsystem types (SSTs) and complex
event types (CETs), which allow us to formally describe or 'observe' at any
ABM framework for multi-level studies of complex social systems
32
level of abstraction the states and behaviours generated by an agent-based
model. Therefore, we can characterise an agent-based model as a function
that generates a set of SSTs and CETs with given probability distributions.7
SSTs and CETs can be used as the building blocks for defining sophisti-
cated inter-level and multi-level models (formally speaking, inter-level models
and multi-level models are also CETs). Structural and inter-level models al-
low us to define a structure of statistically related CETs and/or SSTs, and
the types of statistical relationships that need to hold between them. The
multi-level modelling framework allows us to define different classes of system
for which different models hold (models might be structural, inter-level, or
simple linear models). This can also be linked to the sensitivity of parameters
and the characterisation of the model's parameter phase space.
From a more practical perspective, the ability to specify structured sta-
tistical relationships between phenomena at different abstraction levels in
ABM terms allows us to formally define the isomorphism between models
and empirical observations and data. Networks and hierarchies of statis-
tical associations then give us more stringent sets of criteria for empirically
validating these types of models. Rather than simply requiring that an agent-
based model can generate phenomenon X for example, we can stipulate that
it should be able to generate associations with particular strengths between
phenomena X, Y and Z in scenario A, and a different set of strengths in
scenario B. By identifying emergent structures of behaviour, we are able to
formally relate the agent-based model to empirical observables. This repre-
ABM framework for multi-level studies of complex social systems
33
sents a significant step towards true integration of empirical and model-driven
research in the social sciences.
ABM framework for multi-level studies of complex social systems
34
Notes
1Two simulation instances with the same sequence and structure of agent
rule executions and resulting state changes are indistinguishable.
2It is important to note that in many cases, the agent-based model itself
implies a finite set of systems e.g. a closed system with boolean values
deterministically governing rule execution.
3Note that structure here is meant in the most general sense here and
does not necessarily imply spatial structure
4In the above example, we can express (var1, var2) → (var10, var20) in
SST terms as sstA → sstB, where sstA = ({(var1, rg1), (var2, rg2)},{AN D})
and sstB = ({(var1, rg10), (var2, rg20)},{AN D}) (rg1 and rg10 represent dif-
ferent value ranges for var1; rg2 and rg20 represent different value ranges for
var2)
5The precise type of association relationship e.g. correlation, mechanistic
causation, phenomenal causation, depends on the statistical constraints that
need to be satisfied; these would depend on the goals of the modelling project.
6Of course, when we wish to establish stricter, more specific relationships
between models and parameters (e.g. causal relationships), validation be-
comes more problematic, since it is then necessary not only to show the
ABM framework for multi-level studies of complex social systems
35
same irregular regions show up in empirical data as in simulation-generated
data, but also that they do so for the correct reasons. For example, should we
say that p1 must lie within [a1, a2] for M1 and M2 to hold for p2 = [b1, b2]
and p2 = [b3, b4], or is it that in the value range [a1, a2], p1 has no effect
when p2 lies between b1 and b4? The difficulty of validating such relations
is a general one however, and the challenge comes mainly from finding the
appropriate 'treated' and untreated' cases. This can be particularly chal-
lenging in the social sciences, since assumptions often have to be made about
the commonalities between two cases since active treatment (the methodol-
ogy of the experimental sciences) is not usually appropriate (one could even
argue that it is inconsistent with the very point of the social sciences). Data
that would allow us to distinguish, for example, necessary conditions from
irrelevant background conditions, are therefore extremely difficult to obtain.
7However, if an agent-based model contains real values or stochasticity,
the computational representation of the model will only be an approximation,
and the set of computationally generated CETs (simulations) generated may
be a biased sample from the true set of systems that could be generated by
the model.
ABM framework for multi-level studies of complex social systems
36
References
Axtell, R., Axelrod, R., Epstein, J. M., and Cohen, M. D. (1996), "Align-
ing simulation models: A case study and results," Computational &
Mathematical Organization Theory, 1, 123 -- 141 -- 141.
Barab´asi, A.-L. (2002), Linked: The New Science of Networks, Basic Books,
1st ed.
Blok, H. J., Bergersen, B., and Revtex, T. U. (1999), "Synchronous versus
asynchronous updating in the "game of Life"," Rev. E, 59.
Bonabeau, E. (2002), "Agent-based modeling: Methods and techniques for
simulating human systems," Proceedings of the National Academy of Sci-
ences of the United States of America, 99, 7280 -- 7287.
Bonabeau, E. and Dessalles, J. L. (1997), "Detection and emergence," Intel-
lectica, 2, 85 -- 94.
Brenner, T. and Werker, C. (2007), "A Taxonomy of Inference in Simulation
Models," Computational Economics, 30, 227 -- 244.
Crutchfield, J. P. (1994), "The calculi of emergence: Computation, Dynam-
ics, and Induction," Physica D, 75, 11 -- 54.
Crutchfield, J. P. and Feldman, D. P. (2003), "Regularities unseen, random-
ness observed: Levels of entropy convergence," Chaos, 13, 25 -- 54.
ABM framework for multi-level studies of complex social systems
37
Darley, V. (1994), "Emergent phenomena and complexity," Arificial Life, 4,
411 -- 416.
Deguet, J., Demazeau, Y., and Magnin, L. (2006), "Elements about the
Emergence Issue - A Survey of Emergence Definitions," ComPlexUs, 3,
24 -- 31.
Dorogovtsev, S. N. and Mendes, J. F. F. (2003), Evolution of Networks: From
Biological Nets to the Internet and WWW (Physics), Oxford University
Press, USA.
Ellis, G. F. R. (2005), "Physics, complexity and causality," Nature, 435.
Fagiolo, G. (2003), "Exploitation, exploration and innovation in a model of
endogenous growth with locally interacting agents," Structural Change and
Economic Dynamics, 14, 237 -- 273.
Feldman, D. P. and Crutchfield, J. P. (2003), "Structural information in two-
dimensional patterns: Entropy convergence and excess entropy," Physical
Review E, 67, 051104+.
Focus, E. (2010), "Agents of change," The Economist.
Garg, A., Di Cara, A., Xenarios, I., Mendoza, L., and De Micheli, G. (2008),
"Synchronous versus asynchronous modeling of gene regulatory networks."
Bioinformatics (Oxford, England), 24, 1917 -- 1925.
ABM framework for multi-level studies of complex social systems
38
Gelman, A. (2006), "Multilevel (Hierarchical) Modeling: What it can and
cannot do," Technometrics, 48, 432 -- 436.
Gelman, A. and Hill, J. (2006), Data analysis using regression and multi-
level/hierarchical models, Cambridge University Press.
Gilbert, N. and Trioitzsch, K. G. (2005), Simulation for the social scientist,
Open University Press.
Gunji, Y.-P. and Kamiura, M. (2004), "Observational heterarchy enhancing
active coupling," Physica D: Nonlinear Phenomena, 198, 74 -- 105.
Hartwell, L. H., Hopfield, J. J., Leibler, S., and Murray, A. W. (1999), "From
molecular to modular cell biology." Nature, 402, C47 -- C52.
institutional
Henrickson, L. and McKelvey, B. (2002), "Foundations of "new" social
science:
legitimacy from philosophy, complexity science,
postmodernism, and agent-based modeling." Proceedings of the National
Academy of Sciences of the United States of America, 99 Suppl 3, 7288 --
7295.
Holland, J. (2000), Emergence - from chaos to order, Oxford University Press.
Johnson, J. (2006), "Hypernetworks for reconstructing the dynamics of mul-
tilevel systems," in Proceedings of European Conference on Complex Sys-
tems.
ABM framework for multi-level studies of complex social systems
39
-- (2007), Multidimensional Events in Multilevel Systems, Physica-Verlag
HD, pp. 311 -- 334.
Kauffman, S. (1993), The Origins of Order: Self-Organisation and Selection
in Evolution, Oxford University Press.
Kleijnen, J. (1995), "Verification and validation of simulation models," Eu-
ropean Journal of Operational Research, 82, 145 -- 162.
Kleijnen, J. P. C. and Kleijnen, J. P. C. (2001), "Experimental Designs for
Sensitivity Analysis of Simulation Models," in Proceedings of EUROSIM
2001.
Krull, J. L. and MacKinnon, D. P. (2001), "Multilevel Modeling of Individual
and Group Level Mediated Effects," Multivariate Behavioral Research, 36,
249 -- 277.
Kubik, A. (2003), "Toward a formalization of emergence," Artificial Life, 9,
41 -- 66.
Marks, R. (2007), "Validating Simulation Models: A General Framework and
Four Applied Examples," Computational Economics, 30, 265 -- 290 -- 290.
McCauley, J. L. (2006), "Response to Worrying Trends in Econophysics,"
Physica A, 2, 601 -- 609.
Moss, S. (2008), "Alternative approaches to the empirical validation of agent-
based models," Journal of Artificial Societies and Social Simulation.
ABM framework for multi-level studies of complex social systems
40
Pearl, J. (1998), "Graphs, Causality and STructural Equation Models," So-
ciological methods and research, 27, 226 -- 284.
Prokopenko, M., Boschetti, F., and Ryan, A. J. (2009), "An information-
theoretic primer on complexity, self-organization, and emergence," Com-
plexity, 15, 11 -- 28.
Ryan, A. (2007), "Emergence is coupled to scope, not level," Nonlinear Sci-
ences.
Sasai, K. and Gunji, Y.-P. (2008), "Heterarchy in biological systems: A
logic-based dynamical model of abstract biological network derived from
time-state-scale re-entrant form," Biosystems, 92, 182 -- 188.
Sawyer, R. K. (2001), "Simulating emergence and downward causation in
small groups," in Proceedings of the Second International Workshop on
Multi-Agent Based Simulation, eds. Moss, S. and Davidsson, P., Berlin:
Springer-Verlag, pp. 49 -- 67.
Seth, A. (2008), "Measuring emergence via nonlinear Granger causality," in
Artificial Life XI: Proceedings of the Eleventh International Conference on
the Simulation and Synthesis of Living Systems, eds. Bullock, S., Noble, J.,
Watson, R., and Bedau, M. A., MIT Press, Cambridge, MA, pp. 545 -- 552.
Tononi, G., Sporns, O., and Edelman, G. M. (1994), "A measure for brain
complexity: Relating functional seggregation and integration in the ner-
vous system." PNAS, 91, 5033 -- 5037.
ABM framework for multi-level studies of complex social systems
41
Troitzsch, K. (2004), "Validating simulation models," in Proceedings of the
18th European Simulation Multiconference, pp. 98 -- 106.
Varela, F. (1979), Principles of Biological Autonomy, North-Holland.
Werker, C. and Brenner, T. (2004), "Empirical Calibration of Simulation
Models," Tech. rep., Max Planck Institute of Economics, Evolutionary
Economics Group.
Windrum, P., Fagiolo, G., and Moneta, A. (2007), "Empirical Validation of
Agent-based models," Journal of Artificial Societies and Social Simulation,
10.
Yam, B. Y. (2003), Dynamics of Complex Systems, Westview Press Inc.
ABM framework for multi-level studies of complex social systems
42
7 Figures and tables
ABM framework for multi-level studies of complex social systems
43
Figure 1: Graphical representation of hypothesis that mechanisms and/or
interactions a, b and c at the micro-level give rise to phenomenon X at the
systemic macro-level.
ABM framework for multi-level studies of complex social systems
44
Figure 2: Graphical representation of hypothesis that under condition A,
mechanisms and/or interactions a, b and c at the micro-level give rise to
phenomenon X at the systemic macro-level, but under condition B, a, b and
c give rise to phenomenon Y .
ABM framework for multi-level studies of complex social systems
45
Figure 3: Graphical representation of hypothesis that mechanisms and/or
interactions a, b and c at the micro-level need to be related by specific as-
sociations, represented by i, j and k, to give rise to phenomenon X at the
systemic macro-level.
ABM framework for multi-level studies of complex social systems
46
Figure 4: Graphical representation of hypothesis that under condition A,
mechanisms and/or interactions a, b and c at the micro-level need to be
related by specific associations, represented by i1, j1 and k1, to give rise
to phenomenon X at the systemic macro-level, but under condition B, they
need different relations i2, j2, and k2. This is a multi-level model, where each
of the sub-models is distinguished only by the strengths of the relationships
(and not the structure).
ABM framework for multi-level studies of complex social systems
47
Figure 5: Graphical representation of hypothesis that (i) mechanisms and/or
interactions a, b and c at the micro-level need to be related by specific as-
sociations, represented by i, j and k, to give rise to phenomenon X at the
systemic macro-level; (ii) mechanisms and/or interactions d, e and f at the
micro-level need to be related by specific associations, n, o, p, to give rise
to phenomenon Y ; and (iii) Y is associated with X by relation q. X and Y
could also represent phenomena at different abstraction levels
ABM framework for multi-level studies of complex social systems
48
Figure 6: An agent-based model (abm) generates a set of possible system
trajectories, of which a simulation is an instantiation. The occurrence rate of
simulations with a particular set of attributes (X and Y) reflects the proba-
bility or frequency with which this type of system is expected to occur given
the agent-based model. Attributes X and Y could include any combination
of within-simulation observations and measures discussed above in Section 4,
such as the the emergence of a particular global phenomenon or end state.
ABMSimulation 3Simulation 2Simulation 1Simulation nSatisfies XSatisfies YABM framework for multi-level studies of complex social systems
49
Figure 7: Two categories of hierarchy.
(a) Compositional hierarchy/α-
aggregation: P2, P3 and P4 are constituents of P1. We can also say that P1
has a greater scope than its constituents. (b) Set membership hierarchy/β-
aggregation: P6, P7 and P8 fall in the set defined by P5. We can also say
that P5 has a lower resolution than its members P6, P7 and P8.
ABM framework for multi-level studies of complex social systems
50
Figure 8: Left: Example of an inter-level model where the nodes in the
graph, x1, x2 and x3 can represent phenomena at different levels. The edges
between the nodes represent statistical associations between x1, x2 and x3.
These can be heterogeneous in terms of their nature (correlation, modular,
causal), direction, and strength. Right: Formally, the inter-level model is
an implicit specification for a CET since the statistical associations between
phenomena at different levels define the relative value ranges that must hold
for x1, x2 and x3 (which in turn specify further CETs).
x1x2x3++CETx1++CETx2CETx1CETx1,x2,x3ABM framework for multi-level studies of complex social systems
51
Figure 9: Top: Matrix representing different models (system behaviours)
for different parameter ranges of p1 and p2. M1, M2 and M3 might be
radically different models (e.g. M1 might represent a simple linear relation
while M2 could be an inter-level network relation, or they could simply be
different strengths of of the same model structure. Bottom: Multiple multi-
level models represented in a single hierarchy ('heterarchy'), where each node
also represents a distinct CET. Within the range p1 = [a1, a2, M1 and M2
can be treated as submodels defined by two different p2 value ranges: [b1, b2]
and [b3, b4]. Within the range p2 = [b1, b2], there are also two submodels, M1
and M3. Hence, M1 can be multiple classified as a submodel of both p1 =
[a1, a2 and p2 = [b1, b2]. All three models, M1, M2, and M3 can be treated
as submodels of the multi-level model defined by the range p1 = [a1, a4] and
p2 = [b1, b4].
p1a1a2a3a4p2b1M1M1M3M3b2M1M1M3M3b3M2M2M3M3b4M2M2M3M3 p1=[a1, a4]p2=[b1, b4]M1M2p1=[a1, a2]p1=[a3, a4]M3p2=[b1, b2]p2=[b3, b4]ABM framework for multi-level studies of complex social systems
52
SST
ST R
SET
Empirical equivalent
Validation data
Observed situation in a system at
a given point in time
Individual, collective, population
measures and/or statistics e.g. an
individual's current employment
status, an organisation's current
revenue, a country's GDP at time
ti
Hypothesised micro-level (which
can be individuals, organisations,
countries depending on what the
agents are modelling) responses
to environment. e.g.
if individ-
ual unable to pay bills and feels
cheated, more likely to steal;
if
tax imposed on activity A, firm
less likely to do A.
May be largely theory-based, so
data not always available.
If
available, may be from experi-
mental or case studies at micro-
level e.g. Social Psychology stud-
ies investigating the responses of
human subjects, case studies on
firms.
Micro-level behaviour in a sys-
tem that arises as a direct con-
sequence of the entity's response
to his/her/its environment e.g.
stealing when unable to pay bills.
from
so-
Data
cial/behavioural/cognitive
studies
and/or
psychology
case
(especially when
the entity is an organisation or
geographical region).
studies
(includes
CET
SETs)
Observed behaviour in a system.
As well as micro-level behaviour,
this also includes collective or sys-
temic behaviours at other levels
e.g.
increase in criminal activity
in community X.
Data from experimental studies
and/or case studies addressing
micro-level behaviour; population
statistics and changes in popula-
tion statistics over time.
Table 1: Table outlining the empirical equivalents and validation data for
different constructs in the SST /CET framework.
|
0706.0280 | 1 | 0706 | 2007-06-02T17:20:21 | Multi-Agent Modeling Using Intelligent Agents in the Game of Lerpa | [
"cs.MA",
"cs.GT"
] | Game theory has many limitations implicit in its application. By utilizing multiagent modeling, it is possible to solve a number of problems that are unsolvable using traditional game theory. In this paper reinforcement learning is applied to neural networks to create intelligent agents | cs.MA | cs | Multi-Agent Modeling Using Intelligent Agents in
the Game of Lerpa.
Evan Hurwitz and Tshilidzi Marwala
School of Electrical and Information Engineering
University of the Witwatersrand
Johannesburg, South Africa
[email protected]
Abstract – Game-theory has many limitations implicit in its application. By utilizing multi-agent
modeling, it is possible to solve a number of problems that are unsolvable using traditional game-theory.
In this paper reinforcement learning is applied to neural networks to create intelligent agents. Utilizing
intelligent agents, intelligent virtual players learn from each other and their own rewards to play the game
of Lerpa. These agents not only adapt to each other, but are even able to anticipate each other’s
reactions, and to “bluff" accordingly should the occasion arise. By pre-dealing specific hands, either to
one player or to the whole table, one may “solve” the game, finding the best play to any given situation.
Keywords: Neural Networks, Reinforcement Learning, Game Theory, Temporal
Difference, Multi Agent, Lerpa
1 Introduction
Current game analysis methods generally rely on the application of traditional game-
theory to the system of interest [6]. While successful in simple systems/games, anything
remotely complex requires the simplification of the said system to an approximation that
can be handled by game-theory, with its not unsubstantial limitations [9]. An alternative
approach is to rather analyze the game from within the Multi-agent Modeling (MAM)
paradigm. While this approach traditionally utilizes simple agents [29], far too simplistic
to handle any game of reasonable complexity, creating intelligent agents however, offers
the possibility to “solve” these complex systems. The solution then becomes plausible
without oversimplifying the system, as would be required in order to analyze them from
a traditional game-theory perspective.
This paper explores the use of intelligent agents in a multi-agent system framework, in
order to model and gain insight into a non-trivial, episodic card game with multiple
players. The requirements for a multi-agent model will be specified, as will those for
intelligent agents. Intelligent agents are then applied to the problem at hand, namely the
card game, and results are observed and interpreted by utilizing sound engineering
principles. All of this is presented with a view of evaluating the feasibility of applying
intelligent agents within a multi-agent model framework, in order to solve complex
games beyond the scope of traditional game-theory.
2 Game Theory
Game Theory is concerned with finding of the best, or dominant strategy (or strategies,
in the case of multiple, equally successful strategies) in order to maximize a player’s
winnings within the constraints of a game’s rule-set [19]. Game theory makes the
following assumptions when finding these dominant strategies [11]:
• Each player has two or more well-specified choices or sequences of choices
• Every possible combination of choices leads to a well-specified end-state that
terminates the game.
• A numerically meaningful payoff/reward is defined for each possible end-state.
• Each player has a perfect knowledge of the game and its opposition. Perfect knowledge
implies that it knows the full rules of the game, as well as the payoffs of the other
players.
• All decision-makers are rational. This implies that a player will always choose the
action that yields the greatest payoff.
With these assumptions in mind, the game can then be analyzed from any given position
by comparing the rewards of all possible strategy combinations, and then, by the last
assumption, declaring that each player will choose the strategy with its own highest
expected return [11].
2.1 Limitations of Game-Theory
As a result of the assumptions made when applying game theory, and of the methods
themselves, the techniques developed have some implicit limitations [9]. A few of the
more pressing limitations, which are not necessarily true of real-world systems, are as
follows:
Game theory methods arrive at static solutions. These methods will deduce a solution, or
equilibrium point for a given situation in a game. In many games, however, one will find
that a solution changes or evolves as players learn the particular favored strategy of a
player, and subsequently adapt to exploit the predictable behavior that results from
playing only dominant strategies, and thus ultimately defeating the player utilizing the
dominant strategy.
Real players are not always rational, as defined above. A player may display preferences,
often seemingly at odds with statistically “best-play” strategies, which can change the
odds within a game. A good strategy should account for this possibility and exploit it,
rather than ignore it. This problem is referred to in economic and game-theory circles as
the “trembling hand”.
Game theory cannot handle more than two to three players. Due to dimensionality issues,
game theory cannot be used to analyze games with a large number of players without
simplifying the game to two- or three-player games, game complexity having the final
word on the player limit.
Game theory can only be applied to relatively simple games. Once again as a result of
dimensionality issues, complex games have too many states to be effectively analyzed
using traditional game theory methods.
In order to be analyzed, many complex games are simplified by dividing the players into
grouped “camps”, effectively reducing multi-player games into two- or three-player
games. Likewise the rules are often simplified, in order to similarly reduce the
dimensionality of a game. While these simplifications may allow analysis to proceed,
they also change the fundamental nature of many games, rendering the analysis flawed
by virtue of examining an essentially dissimilar game.
These limitations within game-theory prompt the investigation of an alternative method
of analyzing more complex games. This paper investigates the option of utilizing Multi-
Agent Modeling, using intelligent agents, to analyze a complex game.
3 Multi-Agent Modelling
In its simplest form, multi-agent modeling involves breaking a system up into its
component features, and modeling those components in order to model the overall
system [10]. Central to this methodology is the notion of emergent behavior, that is, that
the simple interactions between agents produce complex results [8]. These results are
often far more complex than the agents that gave rise to them [8].
3.1 Emergent Behavior
Emergent behavior is so pivotal to the understanding and utilization of multi-agent
modeling, that a brief elaboration becomes necessary. While not, strictly speaking, an
instance of MAM, John Conway’s game of artificial life provides an excellent illustration
of emergent behavior, and the ramifications thereof [11]. In Conway’s game, an MxN
grid of squares (often infinite) each contains one binary value, being either alive or dead.
In each iteration of the game, a dead square will become alive if exactly three adjacent
squares are also alive, and an alive square will die if there are less than two adjacent
living squares, or if there are more than three adjacent living squares, as depicted in
Figure 1.
(a)
(b)
Figure 1. A single iteration of Life
In the next iteration, the two outermost living squares in Figure 1(a) will die since each
has only one living neighbor, and the two squares above and below the centre living
square will come to life, as each has exactly three living neighbors, resulting in the
situation depicted in Figure 1(b). As one can see, the rules are incredibly simple, but the
consequences of these rules, i.e. the Emergent Behavior, are far from simple. Figure 2
shows a simple-looking shape, commonly referred to as a glider [11].
Figure 2. Simple Glider
This shape continues to stably propagate itself at a forty-five degree angle within the
game. In contrast, the even simpler-looking shape in Figure 3, known as an r-pentamino,
produces an explosion of shapes and patterns that continually change and mutate, only
becoming predictable after 1103 iterations [11].
Figure 3. R-Pentamino
It is this same complex behavior, emerging from interacting components following
simple rules, that lies at the heart of MAM’s promise, and making it such a powerful tool
[8].
3.2 Advantages of Multi-Agent Modeling
An agent-based model holds many advantages over standard analytical techniques, which
are traditionally mathematical or statistical in nature [5]. Specifically, some of the
advantages offered by an agent-based model are as follows [14]:
• Agents are far simpler to model than the overall system they comprise, and hence the
system becomes easier to model.
• The emergent behavior resulting from the agent interactions implies that systems too
complex to be traditionally modeled can now be tackled, since the complexity of the
system need not be explicitly modeled.
• Large systems with heterogeneous agents can be easily handled within a multi-agent
system, while this is incredibly difficult to cater for using traditional mathematics,
which would make the often unrealistic demand that the components be homogenous.
3.3 Weaknesses/Limitations
While MAM has definite advantages, it is not without weaknesses. Since the emergent
behavior is arrived at empirically, and is not deterministic, it is difficult to state with any
degree of certainty as to why a certain outcome has been arrived at [26]. Similarly, since
emergent behavior is often unexpected [8], it can be difficult to ascertain whether the
multi-agent system (MAS) is incorrectly modeling the system in question. Thus,
validation of the model becomes an important aspect of any MAS.
3.4 MAM Applications
Multi-agent modeling lends itself to a number of applications. The following are some of
the more common applications of multi-agent modeling:
3.4.1 Swarm Theory
Multi-agent modeling is utilized for the development of Swarm Theory based systems
[4]. These systems utilize many simple agents, and attempt to design simple individual
rules that will allow the agents to work together to achieve a larger, common goal, much
in the same manner that a swarm of ants will work together to collect food for the colony.
These systems depend on the engineer’s ability to predict the (often unexpected)
emergent behavior of the system for given agent behavior.
3.4.2 Complexity Modelling
Multi-agent modeling is well-suited to the task of complexity modeling [25]. Complexity
modeling refers to modeling complex systems that are often too complex to be explicitly
modeled [25]. The usage of representative agents allows for the emergent behavior of the
MAM to model the complexity within the system, rather than the said complexity being
explicitly modeled by the engineer [25]. Essentially, the complexity is contained by the
interactions between the agents, and between the agents and the system, rather than the
traditional, and often insufficient, mathematical models previously used [25].
3.4.3 Economics
Fundamentally an application of complexity modeling, multi-agent modeling can be
applied to economic systems [7]. This discipline, known as Applied Computational
Economics (ACE), applies a bottom-up approach to modeling an economic system,
rather than the traditional top-down approach, which requires full system specification
and then component decomposition [7]. In order to verify ACE system veracity, the ACE
model is required to reproduce known results empirically. Once this has been
accomplished, the same system can then be used to predict the results of unknown
situations, allowing for better forecasting and policy decision-making.
3.4.4 Social Sciences
Many attempts have been made to model social phenomena, with varying degrees of
success [15]. Since social systems, by definition, involve the interaction of autonomous
entities [27], multi-agent modeling offers an ideal methodology for modeling such
systems [15]. The foundations of such applications have already been laid, with the
groundwork being solutions to such problems as the standing ovation problem [15].
3.5 Making a Multi-agent Model
In order to create a multi-agent model, the smaller components that comprise the system
must be specified [24]. These smaller components need to be fully modeled, so as to
become the agents that are at the heart of the modeling technique [24]. Each agent must
be capable of making decisions (often dictated by a rule-set), and these decisions may
involve incomplete knowledge of its environment [24]. The agents also need to be able to
receive information from their environments, and depending on the type of system being
modeled, sometimes communicate with other agents [24]. The environment itself needs
to be able to adjudicate the interactions between agents, but at no stage needs to be able
to determine the overall ramifications of these interactions. Instead, the overall result will
become apparent empirically, taking advantage of the emergent behavior of the multi-
agent system to handle the complexity modeling [24].
4 Intelligent Agents
Artificial intelligence (A.I.) can only truly be considered worthy of the name when the
system in question is capable of learning on its own, without having an expert teacher
available to point out correct behavior. This leads directly into the paradigm of
reinforcement learning [23]. Most reinforcement learning techniques explored utilize
lookup-table system representations, or linear function approximators, which severely
hinder the scope of learning available to the artificial intelligence system. One notable
exception is the work on TD-Gammon, in which he successfully applied the TD(λ)
reinforcement learning algorithm to train a neural network, with staggeringly successful
results [11]. Following attempts to emulate this work have, however, been met with
failure due to the extreme difficulties of combining back-propagation with TD(λ). Some
methods for overcoming these problems have been explored, allowing for the
combination of these versatile techniques in order to create an intelligent agent.
4.1 What is Intelligence?
In order to create intelligent agents, it is necessary to first define intelligence, so that we
may critically evaluate whether the agent created meets these criteria. In order to be
considered intelligent, an entity must be capable of the following [20]:
• The entity must be able to learn.
• The entity must be able to learn from its own inferences, without being taught.
• The entity must be capable of drawing conclusions from incomplete data, based on its
own knowledge.
• The entity must be able to re-evaluate its own knowledge, and adapt if necessary.
Should an agent meet these requirements, it can then be considered intelligent. In order to
meet these requirements, the agents will learn within the reinforcement learning
paradigm.
4.2 Reinforcement Learning
Reinforcement learning involves the training of an artificial intelligence system by trial-
and-error, reflecting the same manner of learning that living beings exhibit [23].
Reinforcement learning is very well suited to episodic tasks [21], and as such is highly
appropriate in the field of game-playing, where many episodes are encountered before a
final result is reached, and an A.I. system is required to evaluate the value of each
possible move long before a final result is achieved. This methodology allows for online
learning, and also eliminates the need for expert knowledge [23].
4.2.1 Rewards and Returns
Any artificial intelligence system requires some sort of goal or target to strive towards
[28]. In the case of reinforcement learning, there are two such quantities that need to be
defined, namely rewards and returns [23]. A reward is defined to be the numerical value
attributed to an individual state, while a return is the final cumulative rewards that are
returned at the end of the sequence [23]. The return need not necessarily be simply
summed, although this is the most common method [23]. An example of this process can
be seen below in Figure 4, where an arbitrary Markov process is illustrated with rewards
given at each step, and a final return at the end. This specific example is that of a
Random walk problem.
Figure 4. Random walk rewards and returns.
An A.I. system utilizing reinforcement learning must learn to predict its expected return
at each stage, hence enabling it to make a decision that has a lower initial reward than
other options, but maximizing its future return. This can be likened to making a sacrifice
in chess, where the initial loss of material is accepted for the future gains it brings.
4.2.2 Exploitation vs Exploration
An A.I. system learning by reinforcement learning learns only through its own
experiences [23]. In order to maximize its rewards, and hence its final return, the system
needs to experiment with decisions not yet tried, even though it may perceive them to be
inferior to tried-and-tested decisions [23]. This attempting of new approaches is termed
exploration, while the utilization of gained knowledge to maximize returns is termed
exploitation [23]. A constant dilemma that must be traded off in reinforcement learning is
that of the choice between exploration and exploitation. One simple approach is the ε-
greedy approach, where the system is greedy, i.e. attempts to exploit, with probability ε.
Hence the system will explore with probability 1- ε [23].
4.2.3 TD (λ)
One common method of training a reinforcement learning system is to use the TD (λ)
(Temporal Difference) algorithm to update one’s value estimates [22][23]. This
algorithm is specifically designed for use with episodic tasks, being an adaptation of the
common Widdrow-Hoff learning rule [21]. In this algorithm, the parameters or weights w
to be altered are updated by equation (1) [21].
=∆
w
(
α
P
t
+
1
−
P
t
t
)∑
=
1
k
−
kt
λ
∇
wP
k
(1)
The prediction Pt+1 is used as a target for finding the error in prediction Pt, allowing the
update rule to be computed incrementally, rather than waiting for the end of the sequence
before any learning can take place [22]. Parameters α and λ are the learning rate and
weight-decay parameters, respectively.
The prediction P can be made in a number of different methods, ranging from a simple
lookup table to complex function approximators [21]. Owing to the nature of the task at
hand, a function approximator with a high degree of flexibility is required, since the
agents must be capable of drawing any logical links they see fit, and not be limited by
our choice of function
5 Neural Networks
It is necessary to understand the workings and advantages of neural networks to
appreciate the task of applying them in the reinforcement learning paradigm. It is
likewise important to fully grasp the implications of reinforcement learning, and the
break they represent from the more traditional supervised learning paradigm.
5.1 Neural network architecture
The fundamental building-blocks of neural networks are neurons [28]. These neurons are
simply a multiple-input, single-output mathematical function [28]. Each neuron has a
number of weights connecting it to inputs from a previous layer, which are then added
together, possibly with a bias, the result of which is then passed into the neuron’s
activation function [28]. The activation function is a function that represents the way in
which the neural network “thinks”. Different activation functions lend themselves to
different problem types, ranging from yes-or-no decisions to linear and nonlinear
mathematical relationships. Each layer of a neural network is comprised of a finite
number of neurons. A network may consist of any number of layers, and each layer may
contain any number of neurons [28]. When a neural network is run, each neuron in each
consecutive layer sums its inputs and multiplies each input by its respective weight, and
then treats the weighted sum as an input to its activation function. The output will then be
passed on as an input to the next layer, and so on until the final output layer is reached.
Hence the input data is passed through a network of neurons in order to arrive at an
output. Figure 5 illustrates an interconnected network, with 2 input neurons, three hidden
layer neurons, and two output neurons. The hidden layer and output layer neurons can all
have any of the possible activation functions. This type of neural network is referred to as
a multi-layer perceptron [28], and while not the only configuration of neural network, it
is the most widely used configuration for regression-type problems [18].
Figure 5. Sample connectionist network
5.2 Neural network properties
Neural networks have various properties that can be utilized and exploited to aid in the
solving of numerous problems. Some of the properties that are relevant to this particular
problem are detailed below.
5.2.1 Universal approximators
Multi-layer feed-forward neural networks have been proven
to be universal
approximators [28]. By this one refers to the fact that a feed-forward neural network with
nonlinear activation functions of appropriate size can approximate any function of
interest to an arbitrary degree of accuracy [28]. This is contingent upon sufficient
training data and training being supplied.
5.2.2 Neural Networks Can Generalize
By approximating a nonlinear function from its inputs, the neural network can learn to
approximate a function [28]. In doing so, it can also infer the correct output from inputs
that it has never seen, by inferring the answer from similar inputs that it has seen. This
property is known as generalization [28]. As long as the inputs received are within the
ranges of the training inputs, this property will hold [28].
5.2.3 Neural Networks Recognize Patterns
Neural networks are often required to match large input/output sets to each other, and
these sets are often ‘noisy’ or even incomplete [28]. In order to achieve this matching,
the network learns to recognize patterns in the data sets rather than fixate on the answers
themselves [28]. This enables a network to ‘see’ through the data points and respond to
the underlying pattern instead. This is an extended benefit of the generalization property.
5.3 Training
Training of neural networks is accomplished through the use of an appropriate algorithm
[16]. The two main types of training algorithms employed are back-propagation and
batch updating algorithms [16]. Many algorithms exist, all with their own unique
advantages and disadvantages. Commonly used back-propagation algorithms are
Steepest Descent and Scaled Conjugate Gradient training methods [16], while a
commonly used batch updating algorithm is the Quasi-Newton training algorithm [16].
All of these algorithms are gradient-based algorithms for multivariable optimization,
which are preferable to evolutionary methods due to their guaranteed convergence, even
though global optimality cannot be guaranteed [16]. Regardless of the variation, the
fundamental idea behind back-propagation methods is that weights are updated, via the
optimization method selected, from the last neuron layer back to the first [16], whereas
batch updating algorithms update all weights simultaneously, making for more complex
computations, although fewer required iterations [16].
5.4 Generalization
Neural networks are capable of generalizing to situations that they have not in fact been
trained on, providing that they have been trained over an encompassing range of inputs
[3]. In other words, a network trained on input values of 1; 4; 7; and 10 will be able to
present an accurate answer to an input of 8 since the network has been trained with
values both greater and smaller than 8. It will however, struggle to present a correct
answer to an input of 11 since the highest input training value was only 10. The ability to
generalize is at the heart of the over-fitting/overtraining issue [3]. It is generally accepted
that overtraining is a myth, provided that the number of hidden neurons is correct and
that the training data is complete. However, since satisfying both of these conditions is
nontrivial, the problem of overtraining remains a stark reality. Overtraining leads to the
more specific problem of over-fitting, wherein a network fits too closely to data that may
be incorrect, often fitting the function to the noise rather than the underlying pattern [3].
A visual example of over-fitting and in contrast good generalization is presented in
Figure 6.
Figure 6. Over-fitted Vs generalising Networks
5.5 Suitability of Neural Networks for an Intelligent MAM Agent
A neural network would seem to be an exceptionally good, and obvious choice for use as
a function approximator for the agent’s predictor. The fact that it is a universal
approximator means that the agent is capable of making any inference it deems fit to link
the inputs to its observed values, thus not constraining the agent to limited human/expert
knowledge, which a linear function approximator would. A comprehensive database
lookup-table could provide a similar result, but it has a number of difficulties that
prohibit such a measure. The first problem would be that of dimensionality, i.e. that there
are simply too many possible states to encode, often more in total than even modern
computer memory can handle. On the contrary, the compact nature of a neural network
allows for all of these states to be captured using minimal memory. In addition, the
training time for any sort of convergence would be extremely slow with a lookup-table
method, again due to its size. Differing methods for generalizing using eligibility traces
[18] do exist, but all would impose an artificial linking between states that may not
necessarily exist. A neural network’s generalization property, however, allows for
training of similar states without imposing any such constraints on the budding Artificial
Intelligence’s freedom.
With these advantages in mind, the next problem is observed to be the act of training the
network, since the standard algorithms are of no use in the reinforcement learning
paradigm. The standard gradient-based algorithms require input/output data sets upon
which to train [16], which for the following reasons our agent will not have access to:
• Datasets would require a known correct answer, which would prevent the agent from
finding better answers than those currently accepted.
• Datasets can grow outdated swiftly, especially in a competitive gaming situation,
where one’s opponents can form an integral part of the game’s optimum strategy.
For these reasons, the TD(λ) algorithm has been selected for use, based largely on the
success of the Tessauro TD-Gammon program.
5.6 Jumping the hurdles
In order to implement the TD(λ) algorithm for training neural networks, it is better to
first tackle a known, smaller problem. By first tackling such a problem, one can identify
and solve the prevailing issues within the application of the algorithm, without them
being clouded by issues pertaining to the more complex system. For these reasons, the
problem of tic-tac-toe has been tackled, with an agent created to play against itself,
learning to play the game as it plays. The simplicity of the game makes analysis of the
agents easy, and the finite, solved nature of the game means that one can easily
determine whether the agent has made a good or a bad decision. This last facet will not
be true of larger games, where the agent could easily become better than the standard by
which it is judged, and is thus very important to establish now, when evaluating the
methodology.
6 Tic Tac Toe
The game of Tic Tac Toe, or noughts and crosses, is played on a 3x3 grid, with players
taking alternate turns to fill an empty spot [12][13]. The first player places a ‘O’, and the
second player places a ‘X’ whenever it is that respective player’s turn [13]. If a player
manages to get three of his mark in a row, he wins the game [13]. If all 9 squares are
filled without a winner, the game is a draw [13]. The game was simulated in MATLAB,
with a simple matrix representation of the board.
6.1 Player evaluation
The A.I. system, or player, needs to be evaluated in order to compare different players,
who have each learned using a different method of learning. In order to evaluate a
player’s performance, ten different positions are set up, each with well-defined correct
moves. Using this test-bed, each player can be scored out of ten, giving a measure of the
level of play each player has achieved. Also important is the speed of convergence – i.e.
how fast does each respective player reach its own maximum level of play.
6.2 TD(λ) for backpropogation
In order to train a neural network, equation (1) needs to be adapted for use with the back-
propagation algorithm [23]. The adaptation, without derivation, is as follows [23]:
+
1
t
w
ij
=
t
w
ij
+
∑ ∈
α
OK
(
t
P
K
+
1
−
)
t
eP
K
t
ijk
where the eligabilities are:
(2)
+
1
t
e
ijk
=
λ
e
t
ijk
+
+
1
t
δ
kj
y
t
i
+
1
(3)
and δ is calculated by recursive back-propagation
t
=δ
ki
t
∂
P
k
t
∂
S
i
(4)
as such, the TD(λ) algorithm can be implemented to update the weights of a neural
network [23].
6.3 Stability issues
The TD(λ) algorithm has proven stability for linear functions [22]. A multi-layer neural
network, however, is non-linear [16], and the TD(λ) algorithm can become unstable in
some instances [23] [22]. The instability can arise in both the actual weights and in the
predictions [23] [22]. In order to prevent instability, a number of steps can be taken, the
end result of which is in most cases to limit the degree of variation in the outputs, so as to
keep the error signal small to avoid instability.
6.3.1 Input/Output Representation
The inputs to, and outputs from, a typical A.I. system are usually represented as real or
integer values. This is not optimal for TD(λ) learning, as the values have too much
variation. Far safer is to keep the representations in binary form, accepting the
dimensionality trade-off (a function of the number of inputs into the network, and hence
larger using a binary representation) as a fair price to ensure a far higher degree of
stability. Specifically in the case of the outputs, this ensures that the output error of the
system can never be more than 1 for any single output, thus keeping the mean error to
within marginally stable bounds. For the problem of the Tic Tac Toe game, the input to
the network is an 18-bit binary string, with the first 9 bits representing a possible placed
‘o’ in each square, and the second 9 bits representing a ‘1’ in each square. The output of
the network is a 3-bit string, representing an ‘o’ win, a draw and an ‘x’ win respectively.
6.3.2 Activation Functions
As shown in Section 2, there are many possible activation functions that can be used for
the neural network. While it is tempting to utilize activation functions that have a large
scope in order to maximize the versatility of the network, it proves far safer to use an
activation function that is limited to an upper bound of 1, and a lower bound of zero. A
commonly used activation function of this sort is the sigmoidal activation function,
having the form of [16]:
( )
xf
=
1
−+
xe
1
(5)
This function is nonlinear, allowing for the freedom of approximation required of a
neural network, and limiting the upper and lower bounds as recommended above. While
this activation function is commonly used as a middle-layer activation function, it is
unusual as an output layer activation function. In this manner, instability is further
discouraged.
6.3.3 Learning Rate
As the size of the error has a direct effect on the stability of the learning system,
parameters that directly effect the error signal also have an effect on the said stability.
For this reason, the size of the learning rate α needs to be kept low, with experimental
results showing that values between 0.1 and 0.3 prove safe, while higher values tend to
become unstable, and lower values simply impart too little real learning to be of any
value.
6.3.4 Hybrid Stability Measures
In order to compare relative stability, the percentage chance of becoming unstable has
been empirically noted, based upon experimental results. Regardless of each individual
technique presented, it is the combination of these techniques that allows for better
stability guarantees. While no individual method presented gives greater than a 60%
stability guarantee (that is, 60% chance to be stable given a 100-game training run), the
combination of all of the above measures results in a much better 98% probability of
being stable, with minor tweaking of the learning rate parameter solving the event of
instability occurring at unusual instances.
6.4 The Players
All of the players are trained using an ε-greedy policy, with the value of ε = 0.1. i.e. for
each possible position the player has a 10% chance of selecting a random move, while
having a 90% chance of selecting whichever move it deems to be the best move. This
selection is done by determining all of the legal moves available, and then finding the
positions that would result from each possible move. These positions are sequentially
presented to the player, who then rates each resultant position, in order to find the best
resultant position. It obviously follows that whichever move leads to the most favored
position is the apparently best move, and the choice of the player for a greedy policy. The
training of each player is accomplished via self-play, wherein the player evaluates and
chooses moves for both sides, learning from its own experiences as it discovers errors on
its own. This learning is continued until no discernable improvement occurs.
As a benchmark, randomly initialized networks were able to correctly solve between 1
and 2 of the posed problems, beyond which one can say genuine learning has indeed
taken place, and is not simply random chance.
6.5 Player #1 – Simple TD(λ)
Player #1 learned to play the game using a simple TD(λ) back-propagation learning
algorithm. This proved to be very fast, allowing for many thousands of games to be
played out in a very short period of time. The level of play achieved using this method
was however not particularly inspiring, achieving play capable of solving no more than 5
of the 10 problems posed in the rating system. The problem that is encountered by player
#1 is that the learning done after each final input, the input with the game result, gets
undone by the learning of the intermediate steps of the next game. While in concept the
learning should be swifter due to utilizing the knowledge gained, the system ends up
working at cross-purposes against itself, since it struggles to build its initial knowledge
base, due to the generalization of the neural network which is not present in more
traditional reinforcement learning arrangements.
6.6 Player #2 – Historical Database Learning
In this instance, the player learns by recording each position and its corresponding target,
and storing the pair in a database. Duplicate input data sets and their corresponding
targets are removed, based on the principle that more recent data is more accurate, since
more learning has been done when making the more recent predictions. This database is
then used to train the network in the traditional supervised learning manner. A problem
encountered early on with this method is that early predictions have zero knowledge
base, and are therefore usually incorrect. The retaining of this information in the database
therefore taints the training data, and is thus undesirable. A solution to this problem is to
limit the size of the database, replacing old data with new data once the size limit is
reached, thus keeping the database recent. This methodology trains slower than that
employed to train player #1, making long training runs less feasible than for TD(λ)
learning. The play level of this method is the lowest of those examined, able to solve
only four of the ten proposed problems. Nonetheless, the approach does show promise
for generating an initial knowledge base from which to work with more advanced
methods.
6.7 Player #3 – Fact/Opinion DB Learning
Building on the promise of Player #2, a more sophisticated database approach can be
taken. If one takes into account the manner of the training set generation, one notes that
most of the targets in the database are no more than opinions – targets generated by
estimates of the next step, as seen in equation (1) – while relatively few data points are in
fact facts – targets generated by viewing the end result of the game. In order to avoid this
problem, the database can be split into two sub-databases, with one holding facts, and the
other holding opinions. Varying the sizes, and the relative sizes, of these two sub-
databases can then allow the engineer to decide how much credence the system should
give to fact versus opinion. This method proved far more successful than Player #2,
successfully completing 6 of the 10 problems posed by the rating system. It’s speed of
convergence is comparable to that of Player #2.
6.8 Player #4 – Widdrow-Hoff based DB Learning
In this instance, a very similar approach to that of Player #2 is taken, with one important
distinction: Instead of estimating a target at each move, the game is played out to
completion with a static player. After each game finishes, the player then adds all of the
positions encountered into its database, with the final result being the target of each
position. This means that no opinions can ever enter into the training, which trades off
speed of convergence for supposedly higher accuracy. This method is not optimal, as it
loses one of the primary advantages of reinforcement learning, namely that of being able
to incorporate current learning into its own learning, hence speeding up the learning
process. Unsurprisingly, this method trains with the same speed as the other database
methods, but takes far longer to converge. It achieves a similar level of play as does
Player #1, being able to solve 5 of the posed problems.
6.9 Player #5 - Hybrid Fact/Opinion DB TD(λ) Learning
The logical extension to the previous players is to hybridise the most successful players
in order to compensate for the failings of each. Player #5 thus utilizes the Fact/Opinion
database learning in order to build an initial knowledge base from which to learn, and
then proceeds to learn from thence using the TD(λ) approach of Player #1. This proves
more successful, since the intrinsic flaw in player #1’s methodology lies in its inability to
efficiently create a knowledge base, and the database method of player #3 creates that
knowledge base from which to learn. Player #5 begins its learning with the expected
sluggishness of database methods, but then learns much faster once it begins to learn
using the TD(λ) approach. Player #5 managed to successfully solve seven of the ten
problems once trained to convergence. The problem of unlearning learned information is
still apparent in Player #5, but is largely mitigated by the generation of the initial
knowledge base.
6.10 Player Comparisons
As is illustrated in Figure 7, the hybrid method learns to play at the strongest level of all of the methods
presented. Due to the drastic differences in speed and computational power requirements, it is preferable to
stay away from database-based methods, and it is thus worth noting that only the fact/opinion database
method arrives at a stronger level of play than the simple TD(λ)-trained player #1, and that this
methodology can easily be incorporated into a TD(λ) learning system, which produces the far more
promising player #5.
Figure 7. Relative player strengths
The fact that after a short knowledge-base generation sequence the hybrid system uses
the highly efficient TD(λ) approach makes it a faster and more reliable learning system
than the other methods presented. As can be seen in Figure 7, however, there is still a
greater level of play strength that should be achievable in this simple game, and that has
been limited by the unlearning error seen in Players #1 and #5.
While no perfect result is achieved, the primary goal of learning and adapting is
successful. The agents have been shown to learn on their own, without tutoring. They can
infer from past knowledge to make estimates of unknown situations, and can adapt to
changing situations. Thus the agents have satisfied all four requirements necessary to be
considered “intelligent agents”.
7 Lerpa
The card game being modeled is the game of Lerpa. While not a well-known game, its
rules suit the purposes of this research exceptionally well, making it an ideal testbed
application for intelligent agent. The rules of the game first need to be elaborated upon,
in order to grasp the implications of the results obtained. Thus, the rules for Lerpa now
follow.
The game of Lerpa is played with a standard deck of cards, with the exception that all of
the 8s, 9s and 10s are removed from the deck. The cards are valued from greatest- to
least-valued from ace down to 2, with the exception that the 7 is valued higher than a
king, but lower than an ace, making it the second most valuable card in a suit. At the end
of dealing the hand, during which each player is dealt three cards, the dealer has the
choice of dealing himself in – which entails flipping his last card over, unseen up until
this point, which then declares which suit is the trump suit. Should he elect not to do this,
he then flips the next card in the deck to determine the trump suit. Regardless, once
trumps are determined, the players then take it in turns, going clockwise from the
dealer’s left, to elect whether or not to play the hand (to knock), or to drop out of the
hand, referred to as folding (If the Dealer has dealt himself in, as described above, he is
then automatically required to play the hand). Once all players have chosen, the players
that have elected to play then play the hand, with the player to the dealer’s left playing
the first card. Once this card has been played, players must then play in suit – in other
words, if a heart is played, they must play a heart if they have one. If they have none of
the required suit, they may play a trump, which will win the trick unless another player
plays a higher trump. The highest card played will win the trick (with all trumps valued
higher than any other card) and the winner of the trick will lead the first card in the next
trick. At any point in a hand, if a player has the Ace of trumps and can legally play it, he
is then required to do so. The true risk in the game comes from the betting, which occurs
as follows:
At the beginning of the round, the dealer pays the table 3 of whatever the basic betting
denomination is (referred to usually as ‘chips’). At the end of the hand, the chips are
divided up proportionately between the winners, i.e. if you win two tricks, you will
receive two thirds of whatever is in the pot. However, if you stayed in, but did not win
any tricks, you are said to have been Lerpa’d, and are then required to match whatever
was in the pot for the next hand, effectively costing you the pot. It is in the evaluation of
this risk that most of the true skill in Lerpa lies.
8 Lerpa MAM
As with any optimization system, very careful consideration needs to be taken with
regards to how the system is structured, since the implications of these decisions can
often result in unintentional assumptions made by the system created. With this in mind,
the Lerpa MAS has been designed to allow the maximum amount of freedom to the
system, while also allowing for generalization and swift convergence in order to allow
the intelligent agents to interact unimpeded by human assumptions, intended or
otherwise.
8.1 System Overview
The game is, for this model, going to be played by four players. Each of these players
will interact with each other indirectly, by interacting directly with the table, which is
their shared environment, as depicted in Figure 8.
Figure 8. System interactions.
Over the course of a single hand, an agent will be required to make three decisions, once
at each interactive stage of the game. These three decision-making stages are:
• Whether to play the hand, or drop (knock or fold)
• Which card to play first
• Which card to play second
Since there is no decision to be made at the final card, the hand can be said to be
effectively finished from the agent’s perspective after it has played its second card (or
indeed after the first decision should the agent fold). Following on the TD(λ) algorithm,
each agent will update its own neural network at each stage, using its own predictions as
a reward function, only receiving a true reward after its final decision has been made.
This decision making process is illustrated below, in Figure 9.
Figure 9. Agent learning scheme
With each agent implemented as described, they can now interact with each other
through their shared environment, and will continuously learn upon each interaction and
its consequent result.
Each hand played will be viewed as an independent, stochastic event, and as such only
information about the current hand will be available to the agent, who will have to draw
on its own learned knowledge base to draw deductions from rather than from previous
hands.
8.2 Agent AI Design
A number of decisions need to be made in order to implement the agent AI effectively
and efficiently. The type of learning to be implemented needs to be chosen, as well as the
neural network architecture. Special attention needs to be paid to the design of the inputs
to the neural network, as these determine what the agent can ‘see’ at any given point.
This will also determine what assumptions, if any, are implicitly made by the agent, and
hence cannot be taken lightly. Lastly, this will determine the dimensionality of the
network, which directly affects the learning rate of the network, and hence must
obviously be minimized.
8.2.1 Input Parameter Design
In order to design the input stage of the agent’s neural network, one must first determine
all that the network may need to know at any given decision-making stage. All inputs, in
order to optimize stability, are structured as binary-encoded inputs. When making its first
decision, the agent needs to know its own cards, which agents have stayed in or folded,
and which agents are still to decide. It is necessary for the agent to be able to match
specific agents to their specific actions, as this will allow for an agent to learn a particular
opponent’s characteristics, something impossible to do if it can only see a number of
players in or out. Similarly, the agent’s own cards must be specified fully, allowing the
agent to draw its own conclusions about each card’s relative value. It is also necessary to
tell the agent which suit has been designated the trumps suit, but a more elegant method
has been found to handle that information, as will be seen shortly. Figure 10 below
illustrates the initial information required by the network.
Figure 10. Basic input structure.
The agent’s hand needs to be explicitly described, and the obvious solution is to encode
the cards exactly, i.e. four suits, and ten numbers in each suit, giving forty possibilities
for each card. A quick glimpse at the number of options available shows that a raw
encoding style provides a sizeable problem of dimensionality, since an encoded hand can
be one of 403 possible hands (in actuality, only 40P3 hands could be selected, since cards
cannot be repeated, but the raw encoding scheme would in fact allow for repeated cards,
and hence 403 options would be available). The first thing to notice is that only a single
deck of cards is being used, hence no card can ever be repeated in a hand. Acting on this
principle, consistent ordering of the hand means that the base dimensionality of the hand
is greatly reduced, since it is now combinations of cards that are represented, instead of
permutations. The number of combinations now represented is 40C3. This seemingly
small change from nPr to nCr reduces the dimensionality of the representation by a factor
of r!, which in this case is a factor of 6. Furthermore, the representation of cards as
belonging to discrete suits is not optimal either, since the game places no particular value
on any suit by its own virtue, but rather by virtue of which suit is the trump suit. For this
reason, an alternate encoding scheme has been determined, rating the ‘suits’ based upon
the makeup of the agent’s hand, rather than four arbitrary suits. The suits are encoded as
belonging to one of the following groups, or new “suits”:
• Trump suit
• Suit agent has multiple cards in (not trumps)
• Suit in agent’s highest singleton
• Suit in agent’s second-highest singleton
• Suit in agent’s third-highest singleton
This allows for a much more efficient description of the agent’s hand, greatly improving
the dimensionality of the inputs, and hence the learning rate of the agents. These five
options are encoded in a binary format, for stability purposes, and hence three binary
inputs are required to represent the suits. To represent the card’s number, ten discrete
values must be represented, hence requiring four binary inputs to represent the card’s
value. Thus a card in an agent’s hand is represented by seven binary inputs, as depicted
in Figure 11.
Figure 11. Agent card input structure
Next must be considered the information required in order to make decisions two and
three. For both of these decisions, the cards that have already been played, if any, are
necessary to know in order to make an intelligent decision as to the correct next card to
play. For the second decision, it is also plausible that knowledge of who has won a trick
would be important. The most cards that can ever be played before a decision must be
made is seven, and since the table after a card is played is used to evaluate and update the
network, it is necessary to represent eight played cards. Once again, however, simply
utilizing the obvious encoding method is not necessarily the most efficient method. The
actual values of the cards played are not necessarily important, only their values relative
to the cards in the agent’s hand. As such, the values can be represented as one of the
following, with respect to the cards of the same suit in the agent’s hand:
• Higher than the card/cards in the agent’s hand
• Higher than the agent’s second-highest card
• Higher than the agent’s third-highest card
• Lower than any of the agent’s cards
• Member of a void suit (value is immaterial)
Another suit is now relevant for representation of the played cards, namely a void suit – a
suit in which the agent has no cards. Lastly, a number is necessary to handle the special
case of the Ace of trumps, since its unique rules mean that strategies are possible to
develop based on whether it has or has not been played. The now six suits available still
only require three binary inputs to represent, and the six number groupings now reduce
the value representations from four binary inputs to three binary inputs, once again
reducing the dimensionality of the input system.
With all of these inputs specified, the agent now has available all of the information
required to draw its own conclusions and create its own strategies, without human-
imposed assumptions affecting its “thought” patterns.
8.2.2
Network Architecture Design
With the inputs now specified, the hidden and output layers need to be designed. For the
output neurons, these need to represent the prediction P that the network is making. A
single hand has one of five possible outcomes, all of which need to be catered for. These
possible outcomes are:
• The agent wins all three tricks, winning 3 chips.
• The agent wins two tricks, winning 2 chips.
• The agent wins one trick, winning 1 chip.
• The agent wins zero tricks, losing 3 chips.
• The agent elects to fold, winning no tricks, but losing no chips.
This can be seen as a set of options, namely [3 2 1 0 -3]. While it may seem tempting to
output the result as one continuous output, there are two compelling reasons for breaking
these up into binary outputs. The first of these is in order to optimize stability, as
elaborated upon in Section 5. The second reason is that these are discrete events, and a
continuous representation would cover the range of [-3 0], which does not in fact exist.
The binary inputs then specified are:
• P(O = 3)
• P(O = 2)
• P(O = 1)
• P(O = -3)
With a low probability of all four catering to folding, winning and losing no chips.
Consequently, the agent’s predicted return is:
P
=
3
A
+
2
+
CB
−
3
D
(6)
where
= OPA
( =
)3
= OPB
( =
)2
(7)
(8)
= OPC
( =
)1
(9)
= OPD
(
−=
)3
(10)
The internal structure of the neural network is consistent with that upon which the
stability optimization in Section 5 was done, using equation (5) for the hidden layer
activation function. Since a high degree of freedom is required, a high number of hidden
neurons is required, and thus fifty have been used. This number is iteratively achieved,
trading off training speed versus performance. The output neurons are linear functions,
since they represent not binary effects, but rather a continuous probability of particular
binary outcomes.
8.2.3 Agent Decision-Making
With its own predictor specified, the agent is now equipped to make decisions when
playing. These decisions are made by predicting the return of the resultant situation
arising from each legal choice it can make. An ε-greedy policy is then used to determine
whether the agent will choose the most promising option, or whether it will explore the
result of the less appealing option. In this way, the agent will be able to trade off
exploration versus exploitation.
9 The Intelligent Model
With each agent implemented as described above, and interacting with each other as
specified in section eight, we can now perform the desired task, namely that of utilizing a
multi-agent model to analyze the given game, and develop strategies that may “solve” the
game given differing circumstances.
9.1 Agent Learning Verification
In order for the model to have any validity, one must establish that the agents do indeed
learn as they were designed to do. In order to verify the learning of the agents, a single
intelligent agent was created, and placed at a table with three ‘stupid’ agents. These
‘stupid’ agents always stay in the game, and choose a random choice whenever called
upon to make a decision. The results show quite conclusively that the intelligent agent
soon learns to consistently outperform its opponents, as shown in Figure 12.
Figure 12 gent performance, averaged over 40 hands
The agents named Randy, Roderick and Ronald use random decision-making, while
AIden has the TD(λ) AI system implemented. The results have been averaged over 40
hands, in order to be more viewable, and to also allow for the random nature of cards
being dealt. As can be seen, AIden is consistently performing better than its counterparts,
and continues to learn the game as it plays.
9.1.1 Cowardice
In the learning phase of the abovementioned intelligent agent, an interesting and
somewhat enlightening problem arises. When initially learning, the agent does not in fact
continue to learn. Instead, the agent quickly determines that it is losing chips, and decides
that it is better off not playing, and keeping its chips! This is illustrated in Figure 13.
Figure 13. Agent cowardice. Averaged over 5 hands
As can be seen, AIden quickly decides that the risks are too great, and does not play in
any hands initially. After forty hands, AIden decides to play a few hands, and when they
go badly, gets scared off for good. This is a result of the penalizing nature of the game,
since bad play can easily mean one loses a full three chips, and since the surplus of lost
chips is nor carried over in this simulation, a bad player loses chips regularly. While
insightful, a cowardly agent is not of any particular use, and hence the agent must be
given enough ‘courage’ to play, and hence learn the game. In order to do this, one option
is to increase the value of ε for the ε-greedy policy, but this makes the agent far too much
like a random player without any intelligence. A more successful, and sensible solution is
to force the agent to play when it knows nothing, until such a stage as it seems prepared
to play. This was done by forcing AIden to play the first 200 hands it had ever seen, and
thereafter leave AIden to his own devices.
9.2 Parameter Optimisation
A number of parameters need to be optimized, in order to optimize the learning of the
agents. These parameters are the learning-rate α, the memory parameter λ and the
exploration parameter ε. The multi-agent system provides a perfect environment for this
testing, since four different parameter combinations can be tested competitively. By
setting different agents to different combinations, and allowing them to play against each
other for an extended period of time (number of hands), one can iteratively find the
parameter combinations that achieve the best results, and are hence the optimum learning
parameters. Figure 14 shows the results of one such test, illustrating a definite ‘winner’,
whose parameters were then used for the rest of the multi-agent modeling. It is also
worth noting that as soon as the dominant agent begins to lose, it adapts its play to
remain competitive with its less effective opponents. This is evidenced at points 10 and
30 on the graph (games number 300 and 900, since the graph is averaged over 30 hands)
where one can see the dominant agent begin to lose, and then begins to perform well
once again.
Figure 14. Competitive agent parameter optimisation. Averaged over 30 hands.
Surprisingly enough, the parameters that yielded the most competitive results were α =
0.1; λ = 0.1 and ε = 0.01. while the ε value is not particularly surprising, the relatively
low α and λ values are not exactly intuitive. What they amount to is a degree of
temperance, since higher values would mean learning a large amount from any given
hand, effectively over-reacting when they may have played well, and simply have fallen
afoul of bad luck.
9.3 MAS Learning Patterns
With all of the agents learning in the same manner, it is noteworthy that the overall
rewards they obtain are far better than those obtained by the random agents, and even by
the intelligent agent that was playing against the random agents. A sample of these
results is depicted in Figure 15.
Figure 15. Comparative returns over 200 hands.
R1 to R3 are the Random agents, while AI1 is the intelligent agent playing against the
random agents. AI2 to AI5 depict intelligent agents playing against each other. As can be
seen, the agents learn far better when playing against intelligent opponents, an attribute
that is in fact mirrored in human competitive learning [1]. The agents with better
experience tend to fold bad hands, and hence lose far fewer chips than the intelligent
agent playing against unpredictable opponents.
9.4 Agent Adaptation
In order to ascertain whether the agents in fact adapt to each other or not, the agents were
given pre-dealt hands, and required to play them against each other repeatedly. The
results of one such experiment, illustrated in Figure 16, shows how an agent learns from
its own mistake, and once certain of it, changes its play, adapting in order to gain a better
return from the hand. The mistakes it sees are its low returns, returns of -3 to be precise.
At one point, the winning player obviously decides to explore, giving some false hope to
the losing agent, but then quickly continues to exploit his advantage. Eventually, at game
#25, the losing agent gives up, adapting his play to suit the losing situation in which he
finds himself. Figure 16 also illustrates the progression of the agents and the adaptation
described.
Figure 16. Adaptive agent behaviour
9.5 Strategy analysis
The agents have been shown to successfully learn to play the game, and to adapt to each
other’s play in order to maximize their own rewards. These agents form the pillars of the
multi-agent model, which can now be used to analyze, and attempt to ‘solve’ the game.
Since the game has a nontrivial degree of complexity, situations within the game are to
be solved, considering each situation a sub-game of the overall game. The first, and most
obvious type of analysis is a static analysis, in which all of the hands are pre-dealt. This
system can be said to have stabilized when the results and the playout become constant,
with all agents content to play the hand out in the same manner, each deciding that
nothing better can be achieved. This is akin to Game Theory’s “static equilibrium”.
9.6 Bluffing
A bluff is an action, usually in the context of a card game, that misrepresents one’s cards
with the intent of causing one’s opponents to drop theirs (i.e. to fold their hand). There
are two opposing schools of thought regarding bluffing [2]. One school claims that
bluffing is purely psychological, while the other maintains that a bluff is a purely
statistical act, and therefore no less sensible than any other strategy [2]. Astoundingly
enough, the intelligent agents do in fact learn to bluff! A classic example is illustrated in
Figure 17, which depicts a hand in which bluffing was evidenced.
Figure 17. Agent bluffing
In the above hand, Randy is the first caller, and diamonds have been declared trumps.
Randy’s hand is not particularly impressive, having only one low trump, and two low
supporting cards. Still, he has the lead, and a trump could become a trick, although his
risks are high for minimal reward. Nonetheless, Randy chooses to play this hand. Ronald,
having nothing to speak of, unsurprisingly folds. Roderick, on the other hand, has a very
good hand. One high trump, and an outside ace. However, with one still to call, and
Randy already representing a strong hand by playing, Roderick chooses to fold. AIden,
whose hand is very strong with two high trumps and an outside jack, plays the hand.
When the hand is played repeatedly, Randy eventually chooses not to play, since he loses
all three to AIden. Instantly, Roderick chooses to play the hand, indicating that the bluff
was successful, that it chased a player out of the hand! Depending on which of the
schools of thought regarding bluffing one follows this astonishing result leads us to one
of two possible conclusions. If, like the authors, one maintains that bluffing is simply
playing the odds, making the odds for one’s opponent unfavorable by representing a
strong hand, then this result shows that the agents learn each other’s patterns well enough
to factor their opponent’s strategies into the game evaluation, something Game Theory
does a very poor job of. Should one follow the theory that bluffing is purely
psychological, then the only conclusion that can be reached from this result is that the
agents have in fact developed their own ‘psyches’, their own personalities which can then
be exploited. Regardless of which option tickles the reader, the fact remains that agents
have been shown to learn, on their own and without external prompting, to bluff!
[12][17]
9.7 Deeper Strategy Analysis
While the strategy analysis already presented is useful, it is not truly practical, since for
many applications one may have access to no more information than a single agent has.
For such situations, one can perform a different simulation, pre-dealing only a single
agent’s hand. In this way, the agent will be testing its strategy against a dynamic
opposition, being forced to value its hand on its own merit and not based on static results.
Once the agent performs constantly with its hand, the resulting strategy will be the
dominant strategy. To be said to be constantly performing, the agent should average zero
or greater than zero returns when playing out according to its arrived at strategy, since
negative returns would indicate playing with a weak hand that should be folded. In this
way, one can determine the correct play with any given hand, effectively ‘solving’ the
game.
9.8 Personality Profiling
While Game Theory stagnates in the assumption that all players are rational, there is no
such limit strangling a multi-agent model using intelligent agents. While this may not
seem important on the surface, it does in fact extend the usefulness of the model far
beyond that of standard Game Theory. Many poker players of reasonable skill complain
bitterly about playing against beginners, bemoaning the fact that the beginners do not
play as they should, as a “rational” player would, and thus throw the better players off
their game. A good player, however, should not be limited to assuming rationality from
his opponents, but rather should identify his opponents’ characteristics and exploit their
weaknesses. In order to perform this task, one needs to create “personality” types in
agents, this while sounding somewhat daunting, is in fact a rather simple task. All that is
required is to modify the reward function for an agent (equation #6) to reflect the
personality type to be modeled. Two personality types were created, namely an
aggressive personality and a conservative personality. The aggressive agent uses the
reward function:
P
=
3
A
+
2
+
CB
−
2
D
(11)
While the conservative agent uses the reward function:
P
=
3
A
+
2
+
CB
−
4
D
(12)
Where the symbols have the following meanings: P denotes the expected outcome of the
hand; A denotes the probability of winning three tricks; B denotes the probability of
winning two tricks; C denotes the probability of winning one trick; and D denotes the
probability of winning zero tricks.
As can be seen, in this case both agents modify the coefficient of the D term in order to
skew their world view. This is certainly not the only manner in which the reward
function can be modified in order to reflect a personality, but is the most obvious, since
the D term represents the “risk” that the agent sees within a hand. Using the above
modifications, the previously detailed strategy analysis techniques can be performed on
agents with distinctive personalities. The static analysis of comes to the same results as
with rational players, due to the unchanging nature of the problem, while the dynamic
analysis yields more interesting results. Dynamic strategy analysis finds different
dominant strategies when playing against these profiled personalities. More specifically,
the aggressive player is not considered as dangerous when playing in a hand, while the
conservative player is treated with the utmost of respect, since he only plays the best of
hands.
10 Conclusions
Mutli-agent modeling using intelligent agents allows one to analyze and solve games that
traditional game theory struggles to handle. By utilizing reinforcement learning, and the
TD(λ) algorithm in particular, adaptive, intelligent agents can be created to interact
within the multi-agent system. While these agents will learn against both intelligent and
non-intelligent agents, they learn far faster against better, more intelligent agents,
achieving a higher standard of play in a shorter period of time. They also continually
adapt to each other’s play styles, finding dynamic equilibria within the game. The system
can be used to determine “best play” strategy for any given hand, in any specific
scenario. Moreover, bluffing in the game was shown to be in all likelihood a natural
strategic development, an act of “playing the odds”, rather than the traditional view of
being a psychological play. Through modifying the reward signals received by agents, it
was also shown that personality types can be modeled, allowing for hands to be “solved”
taking into account non-rational opponents, a feature sorely lacking in traditional game-
theory. Finally, input sensitivity analysis was found to be unsuccessful in analyzing the
decision-making process of the agents, by reason of the encoding scheme.
11 References
[1]
C. Ames and J. Archer, “Achievement Goals in the Classroom: Students’ Learning Strategies and
the Motivation Processes” Journal of Educational Psychology, vol. 80, no.3, pp. 260-267, 1988.
[2]
R. Bellman, D. Blackwell. “Some Two-person Games Involving Bluffing”, Proceedings of the
Academy of Sciences of the United States of America, vol. 35, pp. 600-605, 1949.
[3] J.J. Distefano, R. Allen, J. Ivan, Feedback and Control Systems. 2/ed. McGraw-Hill. New York.
1990.
[4] A.P. Engelbrecht, ComputationalIntelligence: An Introduction, John Wiley & Sons. 2002.
[5] L. Fahrmeir, G. Tutz, Multivariate Statistical Modelling Based on Generalised Linear Model,
Springer-Verlag, 1994.
[6] R. Gibbons, Game Theory for Applied Economists, Princeton University Press, July 1992.
[7] D.K. Gode, S. Sunder, “Allocative Efficiency of Markets with Zero Intelligence Traders: Market as
a Partial Substitute for Individual Rationality” Journal of Political Economy, vol. 101, pp 119-137, 1993
[8] M. Granovetter, “Threshold Models of Collective Behavior”, American Journal of Sociology, vol. 83,
no. 6, pp. 1420–1443, 1978.
[9] S.H. Heap, Game Theory: A Critical Introduction, Routledge, 2004.
[10] S. Herbert, The Architecture of Complexity, The Sciences of the Artificial. MIT Press. 1982
[11] E. Hurwitz, Multi-Agent Modelling Using Intelligent Agents in Competitive Games, M.Sc. Thesis,
University of the Witwatersrand, South Africa, 2007.
[12] E. Hurwitz and T. Marwala. “Optimising reinforcement learning for neural networks”, In Proceedings
of the 6th Annual European on Intelligent Games and Simulation, Leicester, UK, 2005, pp. 13-18.
[13] E. Hurwitz and T. Marwala, “Learning to bluff: A multi-agent approach“, IEEE International
Conference on Systems, Man and Cybernetics, Montreal, Canada, (accepted)
[14] R. Khosla, T. Dillon. Engineering Intelligent Hybrid Multi-Agent Systems, Kluver Academic
Publishers, 1997.
[15] M.W. Macy, R. Willer, “From Factors to Actors: Computational Sociology and Agent-Based
Modelling”, Annual Review of Sociology, vol. 28, pp 143-166. 2002.
[16] T. Marwala. Fault identification using neural networks and vibration data. Doctor of Philosophy
Thesis, University of Cambridge, 2001.
[17] Z. Merali. “Software learns when it pays to deceive“, New Scientist 30 May 2007, p. 32
[18] W.T. Miller, R.S. Sutton and P. Werbos, Neural Networks for Control. MIT Press. Cambridge,
Massachusetts. 1990
[19] P.C. Ordeshook, Game Theory and Political Theory: An Introduction, Cambridge University Press.
1986.
[20] S.J. Russel, “Rationality and Intelligence”, Fourteenth International Joint Conference on Artificial
Intelligence. 1995.
[21] R.S. Sutton, “Learning to Predict by the Methods of Temporal Differences”, Machine Learning, vol.
3, pp. 9-44, 1988.
[22] R.S. Sutton, Implementation Details of the TD(λ) Procedure for the Case of Vector Predictions and
Back-propagation, GTE Laboratories Technical Note TN87-509.1, 1989.
[23] R.S. Sutton, A.G. Barto, Reinforcement Learning: An Introduction, MIT Press, 1998.
[24] K.P., Sycara, Multiagent Systems, AI Magazine, vol. 19, no. 2, pp. 79-92, 1998.
[25] V. Tamas, “Complexity: The Bigger Picture”, Nature, vol. 418, no. 6894, pp. 131, 2002.
[26] H. Van Peach, Complexity and Ecosystem Management: The Theory and Practice of Multi-Agent
Systems, Edward Elgar Publishing Limited, 2002.
[27] E. Wenger, Communities of Practice: Learning as a Social System, Systems Thinker, June 1988.
[28] H.J. Wesley, MATLAB Supplement to Fuzzy and Neural Approaches in Engineering, John Wiley &
Sons Inc. New York. 1997.
[29] M. Wooldridge, N.R. Jennings, “Intelligent Agents: Theory and Practice”, Knowledge Engineering
Review, vol. 10, no. 2, pp. 115-152, 1995.
|
1901.11000 | 2 | 1901 | 2019-08-13T20:19:52 | Determining r- and (r,s)-Robustness of Digraphs Using Mixed Integer Linear Programming | [
"cs.MA"
] | There has been an increase in the use of resilient control algorithms based on the graph theoretic properties of $r$- and $(r,s)$-robustness. These algorithms guarantee consensus of normally behaving agents in the presence of a bounded number of arbitrarily misbehaving agents if the values of the integers $r$ and $s$ are sufficiently large. However, determining an arbitrary graph's robustness is a highly nontrivial problem. This paper introduces a novel method for determining the $r$- and $(r,s)$-robustness of digraphs using mixed integer linear programming; to the best of the authors' knowledge it is the first time that mixed integer programming methods have been applied to the robustness determination problem. The approach only requires knowledge of the graph Laplacian matrix, and can be formulated with binary integer variables. Mixed integer programming algorithms such as branch-and-bound are used to iteratively tighten the lower and upper bounds on $r$ and $s$. Simulations are presented which compare the performance of this approach to prior robustness determination algorithms. | cs.MA | cs | Determining r- and (r, s)-Robustness of Digraphs Using Mixed
Integer Linear Programming (cid:63)
James Usevitch a, Dimitra Panagou a,
aDepartment of Aerospace Engineering, University of Michigan
9
1
0
2
g
u
A
3
1
]
A
M
.
s
c
[
2
v
0
0
0
1
1
.
1
0
9
1
:
v
i
X
r
a
Abstract
There has been an increase in the use of resilient control algorithms based on the graph theoretic properties of r- and (r, s)-
robustness. These algorithms guarantee consensus of normally behaving agents in the presence of a bounded number of
arbitrarily misbehaving agents if the values of the integers r and s are sufficiently large. However, determining an arbitrary
graph's robustness is a highly nontrivial problem. This paper introduces a novel method for determining the r- and (r, s)-
robustness of digraphs using mixed integer linear programming; to the best of the authors' knowledge it is the first time that
mixed integer programming methods have been applied to the robustness determination problem. The approach only requires
knowledge of the graph Laplacian matrix, and can be formulated with binary integer variables. Mixed integer programming
algorithms such as branch-and-bound are used to iteratively tighten the lower and upper bounds on r and s. Simulations are
presented which compare the performance of this approach to prior robustness determination algorithms.
Key words: Networks, Robustness, Graph Theory, Optimization problems, Integer programming
1 Introduction
Consensus on shared information is fundamental to the
operation of multi-agent systems. In context of mo-
bile agents, it enables formation control, rendezvous,
distributed estimation, and many more objectives. Al-
though a vast number of algorithms for consensus exist,
many are unable to tolerate the presence of misbehaving
agents subject to attacks or faults. Recent years have
seen an increase of attention on resilient algorithms
that are able to operate despite such misbehavior. Many
of these algorithms have been inspired by [9], which is
one of the seminal papers on consensus in the presence
of adversaries; [14, 15, 43], which outline discrete- and
continuous-time algorithms along with necessary and
sufficient conditions for scalar consensus in the pres-
ence of Byzantine adversaries; and [32, 34, 38, 39], which
outline algorithms for multi-agent vector consensus
of asynchronous systems in the presence of Byzantine
adversaries. Some of the most recent resilience-based
results that draw upon these papers include state es-
timation [18 -- 21], rendezvous of mobile agents [22, 23],
output synchronization [11], simultaneous arrival of in-
terceptors [17], distributed optimization [29,31], reliable
broadcast [33, 43], clock synchronization [8], random-
ized quantized consensus [5], self-triggered coordination
[26], and multi-hop communication [30].
A large number of results on network resilience are
based upon the graph theoretical properties known as
r-robustness and (r, s)-robustness [15, 43]. r-robustness
and (r, s)-robustness are key notions included in the
sufficient conditions for convergence of several resilient
consensus algorithms including the ARC-P [14], W-
MSR [15], SW-MSR [25], and DP-MSR [4] algorithms.
Given an upper bound on the global or local number of
adversaries in the network, the aforementioned resilient
algorithms guarantee convergence of normally behaving
agents' states to a value within the convex hull of initial
states if the integers r and s are sufficiently large.
(cid:63) The authors would like to acknowledge the support of
the Automotive Research Center (ARC) in accordance
with Cooperative Agreement W56HZV-14-2-0001 U.S. Army
TARDEC in Warren, MI, and the Award No W911NF-17-
1-0526.
Email addresses: [email protected] (James Usevitch),
[email protected] (Dimitra Panagou).
A key challenge in implementing these resilient algo-
rithms is that determining the r- and (r, s)-robustness
of arbitrary digraphs is an NP-hard problem in general
[13,42]. The first algorithmic analysis of determining the
values of r and s for arbitrary digraphs was given in [13].
The algorithms proposed in [13] employ an exhaustive
search to determine the maximum values of r and s for
Preprint submitted to Automatica
15 August 2019
a given digraph, and have exponential complexity w.r.t.
the number of nodes in the network. In [42] it was shown
that the decision problem of determining if an arbitrary
graph is r-robust for a given integer r is coNP-complete
in general. Subsequent work has focused on methods
to circumvent this difficulty, including graph construc-
tion methods which increase the graph size while pre-
serving given values of r and s [6, 15]; lower bounding
r with the isoperimetric constant and algebraic connec-
tivity of undirected graphs [27]; and demonstrating the
behavior of r as a function of certain graph properties
[7,24,28,35,42,44]. In particular, it has been shown that
the r-robustness of some specific classes of graphs can
be exactly determined in polynomial time from certain
graph parameters. Examples include k-circulant graphs
[35] and lattice-based formations [7, 24]. Another recent
approach has used machine learning to correlate char-
acteristics of certain graphs to the values of r and s
[40], but these correlations are inherently stochastic in
nature and do not provide explicit guarantees. Despite
the impressive results of prior literature, methods to ei-
ther approximate or determine exactly the r- and (r, s)-
robustness of arbitrary digraphs remain relatively rare.
Methods to determine the exact r- or (r, s)-robustness of
arbitrary undirected graphs are also uncommon. Find-
ing more efficient or practical ways of determining the
robustness of arbitrary graphs in general, and digraphs
in particular, remains an open problem.
In response to this open problem, this paper intro-
duces novel methods for determining the r- and (r, s)-
robustness of digraphs and undirected graphs using
mixed integer linear programming (MILP). These meth-
ods only require knowledge of the graph Laplacian
matrix and are zero-one MILPs, i.e. with all integer
variables being binary. To the best of our knowledge,
this is the first time the robustness determination prob-
lem has been formulated in this way. These results con-
nect the problem of graph robustness determination to
the extensive and well-established literature on integer
programming and linear programming.
This paper makes the following specific contributions:
(1) We present a method to determine the maximum
integer for which a nonempty, nontrivial, simple di-
graph is r-robust using mixed integer linear pro-
gramming.
(2) We present a method which determines the (r, s)-
robustness of a digraph using linear programming.
Here, the (r, s)-robustness of a digraph refers to the
maximal (r, s) integer pair according to a lexico-
graphical order for which a given digraph is (r, s)-
robust, as first described in [13]. Furthermore, we
show that our method can also determine the maxi-
mum integer F for which a digraph is (F +1, F +1)-
robust, which is not considered in [13].
(3) We present two mixed integer linear programs
whose optimal values provide lower and upper
bounds on the maximum r for which a nonempty,
nontrivial, simple digraph is r-robust. These two
formulations exhibit a lower complexity than the
method in the first contribution described above.
The contributions of this paper provide several advan-
tages. First, expressing the robustness determination
problem in MILP form allows for approximate lower
bounds on a given digraph's r-robustness to be itera-
tively tightened using algorithms such as branch-and-
bound. Lower bounds on the maximum value of s for
which a given digraph is (r, s) robust (for a given non-
negative integer r) can also be iteratively tightened us-
ing the approach in this paper. Prior algorithms are only
able to tighten the upper bound on the maximum robust-
ness for a given digraph or undirected graph. Second,
this formulation enables commercially available solvers
such as Gurobi or MATLAB's intlinprog to be used to
find the maximum robustness of any digraph. Finally,
experimental results using this new formulation suggest
a reduction in computation time as compared to the cen-
tralized algorithm proposed in [13].
Part of this paper was previously submitted as a confer-
ence paper [36]. The extensions to the conference version
include the following:
robustness is considered.
• The more general case of determining (r, s)-
• Two optimization problems with reduced-dimension
binary vector variables are given whose optimal
values provide a lower bound and an upper bound,
respectively, on the maximum value of r for which
a graph is r-robust.
This paper is organized as follows: notation is presented
in Section 2, the problem formulation is given in Section
3, determining the r-robustness of digraphs is treated
in Section 4, determining the values of s for which a
digraph is (r, s)-robust for a given r is treated in Section
5, methods to obtain upper and lower bounds on the
maximum r for which a digraph is r-robust are presented
in Section 6, a brief discussion about the advantages of
the MILP formulations is given in Section 7, simulations
demonstrating our algorithms are presented in Section
8, and a brief conclusion is given in 9.
2 Notation
The sets of real numbers and integers are denoted R and
Z, respectively. The sets of nonnegative real numbers
and integers are denoted R+ and Z+, respectively. Rn
denotes an n-dimensional vector space over the field R,
Zn represents the set of n dimensional vectors with in-
teger entries, and {0, 1}n represents a binary vector of
dimension n. Scalars are denoted in normal text (e.g.
x ∈ R) while vectors are denoted in bold (e.g. x ∈ Rn).
The notation xi denotes the ith entry of vector x.
2
The inequality symbol (cid:22) denotes a componentwise in-
equality between vectors; i.e. for x, y ∈ Rn, x (cid:22) y im-
plies xi ≤ yi ∀i ∈ {1, . . . , n}. A vector of ones is de-
noted 1, and a vector of zeros is denoted 0, where the
length of each vector will be implied by the context. The
union, intersection, and set complement operations are
denoted by ∪, ∩, and \, respectively. The cardinality
of a set S is denoted as S, and the empty set is de-
noted ∅. The infinity norm of a vector is denoted (cid:107)·(cid:107)∞.
k ) = n!/(k!(n − k)!) are both
The notations C(n, k) = ( n
used in this paper to denote the binomial coefficient with
n, k ∈ Z+. Given a set S, the power set of S is denoted
P(S) = {A : A ⊆ S}. Given a function f : D → R, the
image of a set A ⊆ D under f is denoted f (A). Similarly,
the preimage of B ⊆ R under f is denoted f−1(B). The
logical OR operator, AND operator, and NOT operator
are denoted by ∨,∧,¬, respectively. The lexicographic
cone is defined as Klex = {0} ∪ {x ∈ Rn : x1 = . . . =
xk = 0, xk+1 > 0} for some 0 ≤ k < n. The lexico-
graphic ordering on Rn is defined as x ≤lex y if and only
if y − x ∈ Klex, with x, y ∈ Rn [3, Ch. 2].
A directed graph (digraph) is denoted as D = (V,E),
where V = {1, . . . , n} is the set of indexed vertices and
E is the edge set. This paper will use the terms ver-
tices, agents, and nodes interchangeably. A directed edge
is denoted (i, j), with i, j ∈ V, meaning that agent j
can receive information from agent i. The set of in-
neighbors for an agent j is denoted Nj = {i ∈ V : (i, j) ∈
E}. The minimum in-degree of a digraph D is denoted
δin(D) = minj∈V Nj. Occasionally, G = (V,E) will be
used to denote an undirected graph, i.e. a digraph in
which (i, j) ∈ E ⇐⇒ (j, i) ∈ E. The graph Laplacian
L for a digraph (or undirected graph) is defined as fol-
lows, with Li,j denoting the entry in the ith row and jth
column:
if i = j,
if j ∈ Ni,
if j /∈ Ni.
(1)
Ni
−1
0
Li,j =
The property of r-robustness is based upon the notion
of r-reachability. The definitions of r-reachability and r-
robustness are as follows:
Definition 1 ([15]) Let r ∈ Z+ and D = (V,E) be a
digraph. A nonempty subset S ⊂ V is r-reachable if ∃i ∈
S such that Ni\S ≥ r.
Definition 2 ([15]) Let r ∈ Z+. A nonempty, nontriv-
ial digraph D = (V,E) on n nodes (n ≥ 2) is r-robust
if for every pair of nonempty, disjoint subsets of V, at
least one of the subsets is r-reachable. By convention,
the empty graph (n = 0) is 0-robust and the trivial graph
(n = 1) is 1-robust.
The property of (r, s)-robustness is based upon the
notion of (r, s)-reachability. The definitions of (r, s)-
reachability and (r, s)-robustness are as follows:
Definition 3 ([15]) Let D = (V,E) be a nonempty,
nontrivial, simple digraph on n ≥ 2 nodes. Let r, s ∈ Z+,
0 ≤ s ≤ n. Let S be a nonempty subset of V, and de-
S = {j ∈ S : Nj\S ≥ r}. We say that S
fine the set X r
is an (r, s)-reachable set if there exist s nodes in S, each
of which has at least r in-neighbors outside of S. More
explicitly, S is (r, s)-reachable if X r
Definition 4 ([15]) Let r, s ∈ Z+, 0 ≤ s ≤ n. Let D =
(V,E) be a nonempty, nontrivial, simple digraph on n ≥ 2
nodes. Define X r
S = {j ∈ S : Nj\S ≥ r}, S ⊂ V. The
digraph D is (r, s)-robust if for every pair of nonempty,
disjoint subsets S1, S2 ⊂ V, at least one of the following
conditions holds:
= S1,
A) X r
B) X r
= S2,
+ X r
C) X r
S ≥ s.
≥ s.
S1
S2
S1
S2
3 Problem Formulation
The notions of r- and (r, s)-robustness are graph theo-
retical properties used to describe the communication
topologies of multi-agent networks. Examples of such
networks include stations in a power grid, satellites
in formation, or a group of mobile robots. In these
networks, edges model the ability for one agent i to
transmit information to another agent j. Prior litera-
ture commonly considers simple digraphs, which have
no repeated edges or self edges [12, 15, 16, 37, 39]. More
specifically, simple digraphs satisfy (i, i) /∈ E ∀i ∈ V, and
if the directed edge (i, j) ∈ E, then it is the only directed
edge from i to j. Prior work also commonly considers
nonempty and nontrivial graphs, where V > 1.
Assumption 1 This paper considers nonempty, non-
trivial, simple digraphs.
The properties of r- and (r, s)-robustness are used to
quantify the ability of several resilient consensus algo-
rithms to guarantee convergence of normally behaving
agents in the presence of Byzantine and malicious ad-
versaries, collectively referred to in this paper as misbe-
having agents [4, 11, 14, 15, 25]. Larger values of r and
s generally imply the ability of networks applying these
resilient algorithms to tolerate a greater number of mis-
behaving agents in the network. For a more detailed ex-
planation of the properties of r-robustness and (r, s)-
robustness, the reader is referred to [15, 16, 42].
It should be clear from Definitions 2 and 4 that deter-
mining r and (r, s)-robustness for a digraph D = (V,E)
by using an exhaustive search method is a combinato-
rial problem, which involves checking the reachabilities
of all nonempty, disjoint subsets of V. For notational
purposes, we will denote the set of all possible pairs of
nonempty, disjoint subsets of V as T ⊂ P(V) × P(V).
3
p=2( n
S1 ∩ S2 = 0(cid:9).
Fig. 1. Depiction of all 12 possible (S1, S2) elements in T for a
complete graph D of 3 agents. Each graph represents a different
possible way of dividing D into sets S1 and S2. In each individual
graph, yellow agents are in S1, blue agents are in S2, and white
agents are in neither S1 nor S2.
More explicitly, T is defined as
T =(cid:8)(S1, S2) ∈ P(V) × P(V) : S1 > 0, S2 > 0,
It was shown in [13] that T =(cid:80)n
(2)
p )(2p − 2). 1 As
a simple example, Figure 1 depicts all elements of T for
a graph of 3 agents, i.e. all possible ways to choose two
nonempty, disjoint subsets from the graph.
When considering a particular digraph D, there may be
multiple values of r for which D is r-robust. Similarly,
there may be multiple values of r and s for which D is
(r, s)-robust. The following properties of robust graphs
demonstrate this characteristic. Note that r-robustness
is equivalent to (r, 1)-robustness; i.e. D is r-robust if and
only if it is (r, 1)-robust [13, Property 5.21] [15, Section
VII-B].
Property 1 ([10], Prop. 5.13) Let D be an arbitrary,
simple digraph on n nodes. Suppose D is (r, s)-robust with
r ∈ N and s ∈ {0, . . . , n}. Then D is also (r(cid:48), s(cid:48))-robust
∀r(cid:48) : 0 ≤ r(cid:48) ≤ r and ∀s(cid:48) : 1 ≤ s(cid:48) ≤ s.
Property 2 ([10], Prop. 5.20) Let D be an arbitrary,
simple digraph on n nodes. Suppose D is (r, s)-robust with
r ∈ N and s ∈ {1, . . . , n}. Then D is (r− 1, s + 1)-robust.
As an example, if a digraph D1 is 4-robust, it is (4, 1)-
robust, and therefore by Property 1 it is also simulta-
neously 3-robust, 2-robust, and 1-robust. In addition, if
a digraph D2 is (5, 4)-robust, then it is simultaneously
(r(cid:48), s(cid:48))-robust for all integers 0 ≤ r(cid:48) ≤ 5 and 0 ≤ s(cid:48) ≤ 4.
Moreover, by Property 2, D2 is also (4, 5)-robust, (3, 6)-
robust, (2, 7)-robust, and (1, 8)-robust. For notational
purposes, we denote the set of all values for which a di-
graph D is (r, s)-robust as Θ, where Θ ⊂ Z+ × Z+. By
Definition 4, Θ is explicitly defined as
Θ = {(r, s) ∈ Z+ × Z+ : ∀(S1, S2) ∈ T , (X r
≥ s)}.
= S2) or (X r
= S1) or
(3)
S1
(X r
S2
+ X r
S2
S1
Note that the conditions of (3) are simply an alternate
way of expressing the conditions of Definition 4.
To characterize the resilience of graphs however, prior
literature has generally been concerned with only a few
particular values of r and s for which a given digraph is
r- or (r, s)-robust. For r-robustness, the value of interest
is the maximum integer r for which the given digraph is
r-robust.
Definition 5 We denote the maximum integer r for
which a given digraph D is r-robust as rmax(D) ∈ Z+.
Several resilient algorithms guarantee convergence of the
normal agents when the adversary model is F -total or
F -local in scope, 2 and the digraph is (2F + 1)-robust.
The value of rmax(D) therefore determines the maximum
adversary model under which these algorithms can op-
erate successfully. Furthermore, all other values of r for
which a digraph D is r-robust can be determined from
rmax(D) by using Property 1.
For (r, s)-robustness, there are two (r, s) pairs of inter-
est. The authors of [13] order the elements of Θ using a
lexicographical total order, where elements are ranked
by r value first and s value second. More specifically,
(r1, s1) ≤lex (r2, s2) if and only if(cid:2) r2−r1
(cid:3) ∈ Klex, where
Klex is the lexicographic cone defined in Section 2. Their
algorithm DetermineRobustness finds the maximum el-
ement of Θ with respect to this order. For notational
clarity, we denote this maximum element as (r∗, s∗) ∈ Θ.
s2−s1
Definition 6 Let Θ be defined as in (3). The element
(r∗, s∗) is defined as the maximum element of Θ under
the lexicographical order on R2.
The other (r, s) pair of interest is (Fmax + 1, Fmax +
1), where Fmax = max({F ∈ Z+ : (F + 1, F + 1) ∈
Θ}). Several resilient algorithms guarantee convergence
of the normally behaving agents when the (malicious
[15]) adversary model is F -total in scope and the digraph
is (F + 1, F + 1)-robust. The value Fmax determines the
maximum malicious adversary model under which these
algorithms can operate successfully. The value of (Fmax+
1, Fmax + 1) does not always coincide with the (r∗, s∗)-
robustness of the digraph. A simple counterexample is
given in Figure 2, where the (r∗, s∗)-robustness of the
graph is (2, 1) but the value of (Fmax + 1, Fmax + 1) is
equal to (1, 1).
The purpose of this paper is to present methods
using mixed integer linear programming to deter-
mine rmax(D), the (r∗, s∗)-robustness of D, and the
1 Since (S1, S2) ∈ T =⇒ (S2, S1) ∈ T , the total number
of unique nonempty, disjoint subsets is (1/2)T , denoted as
R(n) in [13].
2 An F -total adversary model implies that there are at most
F ∈ Z+ misbehaving agents in the entire network. An F -
local adversary model implies that each normal agent has at
most F misbehaving agents in its in-neighbor set.
4
Fig. 2. An example of the elements of Θ for a digraph D1. Since
V = 4, the possible values of r and s for which the digraph is
(r, s)-robust fall within the range 0 ≤ r ≤ 2, 1 ≤ s ≤ 4. One
possible pair of subsets S1 and S2 is depicted, which satisfies
X 2
= 1. By Def-
inition 4, D1 therefore cannot be (2, 2)-robust, (2, 3)-robust, or
S1
(2, 4)-robust.
= 0 and X 2
S2
(cid:54)= S2, X 2
(cid:54)= S1, X 2
S2
S1
(Fmax + 1, Fmax + 1)-robustness of D for any nonempty,
nontrivial, simple digraph D.
Problem 1 Given an arbitrary nonempty, nontrivial,
simple digraph D, determine the value of rmax(D).
Problem 2 Given an arbitrary nonempty, nontrivial,
simple digraph D, determine the (r∗, s∗)-robustness of D.
Problem 3 Given an arbitrary nonempty, nontrivial,
simple digraph D, determine the (Fmax + 1, Fmax + 1)-
robustness of D.
Finally, the values of r for which a digraph can be
r-robust lie within the interval 0 ≤ r ≤ (cid:100)n/2(cid:101) [10, Prop-
erty 5.19]. Since r-robustness is equivalent to (r, 1)-
robustness, the values of r for which a graph can be
(r, s)-robust fall within the same interval. The values of
s for which a digraph can be (r, s)-robust lie within the
interval 1 ≤ s ≤ n. 3 However, we will use an abuse of
notation by denoting a graph as (r, 0)-robust for a given
r ∈ Z+ if the graph is not (r, 1)-robust.
4 Determining r-Robustness using Mixed Inte-
ger Linear Programming
In this section we will demonstrate a method for solving
Problem 1 using a mixed integer linear program (MILP)
formulation. An MILP will be presented whose optimal
value is equal to rmax(D) for any given nonempty, non-
trivial, simple digraph D.
In other words, the function R(S) returns the maximum
r for which S is r-reachable. Using this function, the
following Lemma presents an optimization formulation
which yields rmax(D):
Lemma 1 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph with V = n. Let rmax(D) be
defined as in Definition 5. The following holds:
rmax(D) = min
max (R(S1),R(S2))
S1,S2∈P(V)
subject to
1 , S∗
1 ),R(S∗
1 ), R(S∗
1 ),R(S∗
1 ),R(S∗
1 ),R(S∗
1 ),R(S∗
2 )).
max(cid:0)R(S∗
2 )(cid:1) or R(S2) ≥ max (R(S∗
S1 > 0, S2 > 0, S1 ∩ S2 = 0. (5)
PROOF. Note that S1, S2 ∈ P(V) and the three con-
straints of the RHS of (5) imply that the feasible set
consists of all subsets S1, S2 such that (S1, S2) ∈ T , as
per (2). In addition, max (R(S1),R(S2)) = m implies
R(S1) = m or R(S2) = m. Let (S∗
2 ) be a minimizer
of (5). Then max (R(S∗
2 )) ≤ max (R(S1),R(S2))
∀(S1, S2) ∈ T . Therefore ∀(S1, S2) ∈ T , either R(S1) ≥
2 )).
This satisfies the definition of r-robustness as per Def-
inition 2, therefore D is at least max (R(S∗
2 ))-
robust. This implies rmax(D) ≥ max (R(S∗
We next show that rmax(D) = max (R(S∗
2 )). We
prove by contradiction. Recall from Definition 5 that
rmax(D) is the maximum integer r for which D is r-
robust, which means D is rmax(D)-robust by definition.
1 ),R(S∗
Suppose rmax(D) > max (R(S∗
2 )). This implies
R(S∗
2 ) < rmax(D). Since the
1 ) < rmax(D) and R(S∗
2 ) ∈ T satisfy R(S∗
nonempty, disjoint subsets (S∗
1 , S∗
1 ) <
2 ) < rmax(D), by the negation of Defi-
rmax(D) and R(S∗
nition 2 this implies that D is not rmax(D)-robust. How-
ever, this contradicts the definition of rmax(D) being
the largest integer for which D is r-robust (Definition
5). This provides the desired contradiction; therefore
rmax(D) = max (R(S∗
(cid:4)
Remark 1 Using the definition of T in (2), the con-
straints on the RHS of (5) can be made implicit [3, sec-
tion 4.1.3] as follows:
rmax(D) = min
(S1,S2)∈T max (R(S1),R(S2)) .
1 ),R(S∗
2 )).
(6)
First, an equivalent way of expressing the maximum ro-
bustness rmax(D) of a digraph D is derived. This equiv-
alent expression will clarify how rmax(D) can be de-
termined by means of an optimization problem. Given
an arbitrary, simple digraph D = (V,E) and a subset
S ⊂ V , the reachability function R : P(V) → Z+ is de-
fined as follows:
(cid:26)maxi∈S Ni\S,
R(S) =
0,
if S (cid:54)= {∅},
if S = {∅}.
(4)
σj(S) =
We demonstrate next that the objective function of (5)
can be expressed as a function of the network Laplacian
matrix. Recall that n = V and that {0, 1}n represents a
binary vector of dimension n. The indicator vector σ(·) :
P(V) → {0, 1}n is defined as follows: for all S ∈ P(V),
(cid:26)1
0
if j ∈ S
if j /∈ S
, j = {1, . . . , n}.
(7)
3 Footnote 8 in [15] offers an excellent explanation for re-
stricting s to this range by convention.
In other words the jth entry of σ(S) is 1 if the node with
index j is a member of the set S ∈ P(V), and zero oth-
erwise. It is straightforward to verify that σ : P(V) →
5
{0, 1}n is a bijection. Therefore given x ∈ {0, 1}n, the
set σ−1(x) ∈ P(V) is defined by σ−1(x) = {j ∈ V :
xj = 1}. Finally, observe that for any S ∈ P(V), S =
1T σ(S). The following Lemma demonstrates that for
any S ∈ P(V), the function R(S) can be determined as
an affine function of the network Laplacian matrix and
the indicator vector of S:
Lemma 2 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph, let L be the Laplacian matrix
of D, and let S ∈ P(V). Then the following holds for all
j ∈ {1, . . . , n}:
(cid:26)Nj\S,
−Nj ∩ S,
if j ∈ S,
if j /∈ S,
Ljσ(S) =
where Lj is the jth row of L. Furthermore,
R(S) = max
j
Ljσ(S), j ∈ {1, . . . , n}.
which implies
(cid:18)
(cid:19)
max
j∈{1,...,n} Ljσ(S) = max
= max
j∈S
(max
j∈S
Ljσ(S)), (max
j /∈S
Ljσ(S))
Ljσ(S).
(12)
Therefore by equations (12) and (11), the maximum
reachability of S is found by the expression
R(S) = max
(Ljσ(S)), j ∈ {1, . . . , n}.
j
(13)
(8)
(9)
Lastly, if S = ∅, then by (4) we have R(S) = 0. In
addition, σ(S) = 0, implying that maxj Ljσ(S) = 0 =
R(S), j ∈ {1, . . . , n}.
(cid:4)
Using Lemma 2, it will next be shown that the objective
function of (5) can be rewritten as the maximum over a
set of affine functions:
PROOF. The term σ(S) is shortened to σ for brevity.
Recall that the entry in the jth row and ith column of
L is denoted Lj,i. The definition of L from (1) implies
Ljσ = (Lj,j)σj +
(cid:88)
= Njσj − (cid:88)
σq − (cid:88)
q∈{1,...,n}\j
(Lj,q)σq
q∈Nj∩S
q∈Nj\S
(cid:80)
Since by (7), q ∈ S implies σq = 1, the term
σq = 0, the term (cid:80)
q∈Nj∩S σq = Nj ∩ S. In addition, since q /∈ S implies
q∈Nj\S σq = 0. By this, equation
(10) simplifies to Ljσ = Njσj − Nj ∩ S.
The value of the term Njσj depends on whether j ∈ S
or j /∈ S. If j ∈ S, then σj = 1, implying Ljσ = Nj −
Nj ∩ S = (Nj ∩ S + Nj\S) − Nj ∩ S = Nj\S. If
j /∈ S, then σj = 0 implying Ljσ = −Nj ∩ S. This
proves the result for equation (8).
To prove (9), we first consider nonempty sets S ∈
P(V)\{∅}. By the results above and (4), the maximum
reachability of any S ∈ P(V)\{∅} is
Nj\S = max
j∈S
R(S) = max
j∈S
(Ljσ(S)).
(11)
By its definition, R(S) ≥ 0. Observe that if j ∈ S then
Ljσ(S) = Nj\S ≥ 0, implying maxj∈S Ljσ(S) ≥ 0.
Conversely, if an agent j is not in the set S, then the func-
tion Ljσ(S) takes the nonpositive value −Nj ∩ S. This
implies maxj /∈S Ljσ(S) ≤ 0. By these arguments, we
therefore have maxj /∈S Ljσ(S) ≤ 0 ≤ maxj∈S Ljσ(S),
6
Lemma 3 Consider an arbitrary, nonempty, nontrivial,
simple digraph D = (V,E). Let L be the Laplacian matrix
of D, and let Li be the ith row of L. Let T be defined as
in (2). Then for all (S1, S2) ∈ T the following holds:
max (R(S1),R(S2)) =
(cid:18)
(cid:19)
σq.
(10)
max
max
i∈{1,...,n} (Liσ(S1)) , max
j∈{1,...,n} (Ljσ(S2))
PROOF. By Lemma 2, R(S1) = maxi Liσ(S1) and
R(S2) = maxj Ljσ(S2) for i, j ∈ {1, . . . , n}. The result
(cid:4)
follows.
min
(S1,S2)∈T max(cid:0) max
ten as max(cid:0) maxi
i
From Lemma 1, Lemma 3, and Remark 1, we can imme-
diately conclude that rmax(D) satisfies
rmax(D) =
(Ljσ(S2))(cid:1). (14)
(Liσ(S1)) , max
j
(cid:0)Lib1(cid:1) , maxj
(cid:0)Ljb2(cid:1)(cid:1). Every pair
Note that the terms σ(S1) and σ(S2) are each n-
dimensional binary vectors. Letting b1 = σ(S1) and
b2 = σ(S2), the objective function of (14) can be writ-
(S1, S2) ∈ T can be mapped into a pair of binary vec-
tors (b1, b2) by the function Σ : T → {0, 1}n × {0, 1}n,
where Σ(S1, S2) = (σ(S1), σ(S2)) = (b1, b2). By deter-
mining the image of T under Σ(·,·), the optimal value
of (14) can be found by minimizing over pairs of binary
vectors (b1, b2) ∈ Σ(T ) directly. Using binary vector
variables instead of set variables (S1, S2) will allow (14)
to be written directly in an MILP form. Towards this
end, the following Lemma defines the set Σ(T ):
Lemma 4 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph, and let T be defined as in (2).
Define the function Σ : T → {0, 1}n × {0, 1}n as
Σ(S1, S2) = (σ(S1), σ(S2)), (S1, S2) ∈ T .
(15)
Define the set B ⊂ {0, 1}n × {0, 1}n as
B =
(b1, b2) ∈ {0, 1}n × {0, 1}n : 1 ≤ 1T b1 ≤ (n − 1),
1 ≤ 1T b2 ≤ (n − 1), b1 + b2 (cid:22) 1
.
(16)
(cid:27)
(cid:26)
Then both of the following statements hold:
(1) The image of T under Σ is equal to B, i.e. Σ(T ) = B
(2) The mapping Σ : T → B is a bijection.
PROOF. We prove 1) by showing first that Σ(T ) ⊆ B,
and then B ⊆ Σ(T ). Any (S1, S2) ∈ T satisfies S1 > 0,
S2 > 0, S1 ∩ S2 = 0 as per (2). Observe that
S1 > 0 =⇒ 1T σ(S1) ≥ 1,
S2 > 0 =⇒ 1T σ(S2) ≥ 1.
Because S1, S2 ⊂ V and S1 ∩ S2 = 0, then S1 < n.
Otherwise if S1 = n then either S2 = 0 or S1 ∩ S2 (cid:54)=
0, which both contradict the definition of T . Therefore
S1 < n, and by similar arguments S2 < n. Observe
that
S1 < n =⇒ 1T σ(S1) ≤ n − 1,
S2 < n =⇒ 1T σ(S2) ≤ n − 1.
Finally, S1 ∩ S2 = 0 implies that j ∈ S1 =⇒ j /∈ S2
and j ∈ S2 =⇒ j /∈ S1 ∀j ∈ {1, . . . , n}. Therefore
σj(S1) = 1 =⇒ σj(S2) = 0 and σj(S2) = 1 =⇒
σj(S1) = 0. This implies that
S1 ∩ S2 = 0 =⇒ σ(S1) + σ(S2) (cid:22) 1.
Therefore for all (S1, S2) ∈ T , (σ(S1), σ(S2)) =
Σ(S1, S2) satisfies the constraints of the set on the RHS
of (16). This implies that Σ(T ) ⊆ B.
Next, we show B ⊆ Σ(T ) by showing that for all
(b1, b2) ∈ B, there exists an (S1, S2) ∈ T such that
(b1, b2) = Σ(S1, S2). Choose any (b1, b2) ∈ B and define
sets (S1, S2) as follows:
j = 1 =⇒ j ∈ S1, j ∈ {1, . . . , n},
b1
j = 0 =⇒ j /∈ S1,
b1
j = 1 =⇒ j ∈ S2,
b2
j = 0 =⇒ j /∈ S2.
b2
(17)
7
j = 1 =⇒ b2
For the considered sets (S1, S2), 1 ≤ 1T b1 implies S1 >
0 and 1 ≤ 1T b2 implies S2 > 0. In addition since
b1 + b2 (cid:22) 1, we have b1
j = 0 and
j = 1 =⇒ b1
b2
j = 0. By our choice of S1 and S2, we
j = 1 =⇒ j ∈ S1, and from previous arguments
have b1
j = 0 =⇒ j /∈ S2. Similar reasoning can
j = 1 =⇒ b2
b1
j = 1 =⇒ j /∈ S1. These argu-
be used to show that b2
ments imply that S1 ∩ S2 = 0. Consequently, (S1, S2)
satisfies all the constraints of T and is therefore an ele-
ment of T . Clearly, by (17) we have Σ(S1, S2) = (b1, b2),
which shows that there exists an (S1, S2) ∈ T such that
(b1, b2) = Σ(S1, S2). Since this holds for all (b1, b2) ∈ B,
this implies B ⊆ Σ(T ). Therefore Σ(T ) = B.
We next prove 2). Since Σ(T ) = B, the function
Σ : T → B is surjective. To show that it is injective,
consider any Σ(S1, S2) ∈ B and Σ( ¯S1, ¯S2) ∈ B such that
Σ(S1, S2) = Σ( ¯S1, ¯S2). This implies (σ(S1), σ(S2)) =
(σ( ¯S1), σ( ¯S2)). Note that (σ(S1), σ(S2)) = (σ( ¯S1), σ( ¯S2))
if and only if σ(S1) = σ( ¯S1) and σ(S2) = σ( ¯S2). Since
the indicator function σ : P(V) → {0, 1}n is itself injec-
tive, this implies S1 = ¯S1 and S2 = ¯S2, which implies
(S1, S2) = ( ¯S1, ¯S2). Therefore Σ : T → B is injective. (cid:4)
Using Lemma 4 allows us to present the following mixed
integer program which solves Problem 1:
Theorem 1 Let D be an arbitrary nonempty, nontrivial,
simple digraph and let L be the Laplacian matrix of D.
The maximum r-robustness of D, denoted rmax(D), is
obtained by solving the following minimization problem:
(cid:18)
(cid:0)Lib1(cid:1) , max
j
(cid:0)Ljb2(cid:1)(cid:19)
rmax(D) = min
b1,b2
max
max
subject to b1 + b2 (cid:22) 1
i
1 ≤ 1T b1 ≤ (n − 1)
1 ≤ 1T b2 ≤ (n − 1)
b1, b2 ∈ {0, 1}n.
(18)
Furthermore, (18) is equivalent to the following mixed
integer linear program:
rmax(D) = min
t
t,b
subject to 0 ≤ t, t ∈ R, b ∈ Z2n
(cid:35)
1
1
(cid:34)
(cid:105)
b (cid:22) t
0 L
0 (cid:22) b (cid:22) 1
In×n In×n
(cid:35)
L 0
(cid:34)
(cid:104)
1 ≤(cid:104)
1 ≤(cid:104)
(cid:105)
(cid:105)
b (cid:22) 1
b ≤ n − 1
b ≤ n − 1
1T 0
0 1T
(19)
PROOF. From Lemmas 1 and 3 we have
rmax(D) =
(cid:18)
(cid:19)
i
min
max
(Liσ(S1)) , max
S1,S2∈P(V)
subject to
max
(Ljσ(S2))
S1 > 0, S2 > 0, S1 ∩ S2 = 0,
for i, j ∈ {1, . . . , n}. As per Remark 1, the definition of
T can be used to make the constraints implicit:
j
rmax(D) =
(cid:18)
(cid:19)
min
(S1,S2)∈T max
max
i
(Liσ(S1)) , max
j
(Ljσ(S2))
,
(20)
for i, j ∈ {1, . . . , n}. Since Σ : T → B is a bijection by
Lemma 4, (20) is equivalent to
(cid:18)
(cid:0)Lib1(cid:1) , max
j
(cid:0)Ljb2(cid:1)(cid:19)
i, j ∈ {1, . . . , n}.
(21)
rmax(D) = min
(b1,b2)∈B max
max
i
the (r∗, s∗)-robustness of a
Using this notation,
nonempty, nontrivial simple digraph satisfies r∗ =
rmax(D) and s∗ = smax(rmax(D)). This can be verified
by recalling that r-robustness is equivalent to (r, 1)-
robustness [13, Property 5.21], and that (r∗, s∗) is the
maximum element of Θ according to the lexicographic
ordering defined in Section 2. Since a method for de-
termining rmax(D) has already been presented, this
section will introduce a method for determining smax(r)
for any given r ∈ Z+. This can then be used to find
smax(rmax(D)) after rmax(D) is determined.
Recall that ∨ indicates logical OR. An equivalent defini-
tion of smax(r) can be given using the following notation:
Definition 8 Let Θ be the set of all (r, s) values for
which a given digraph D is (r, s)-robust, as per (3). Let
r ∈ Z+, and let X r
S be defined as in Definition 4. The set
Θr ⊂ Θ is defined as follows:
Θr = {s ∈ Z+ : ∀(S1, S2) ∈ T , (cid:0)X r
(cid:0)X r
S2
= S2(cid:1) ∨(cid:0)X r
= S1(cid:1)∨
≥ s(cid:1)},
S1
+ X r
S2
S1
(23)
Making the constraints of (21) explicit yields (18).
Next, we prove that (19) is equivalent to (18). The vari-
ables b1 and b2 from (18) are combined into the variable
b ∈ Z2n in (19); i.e. b = [ (b1)T (b2)T ]T . The first and
third constraints of (19) restrict b ∈ {0, 1}2n. Next, it
can be demonstrated [3, Chapter 4] that the formulation
minx maxi(xi) is equivalent to mint,x t subject to 0 ≤ t,
x (cid:22) t1. Reformulating the objective of the RHS of (18)
in this way yields the objective and first two constraints
of (19):
min
t,b
t
subject to 0 ≤ t,
(cid:34)
L 0
(cid:35)
0 L
(cid:34)
(cid:35)
1
1
.
b (cid:22) t
(22)
The fourth, fifth, and sixth constraints of (19) restrict
(b1, b2) ∈ B and are simply a reformulation of the first
(cid:4)
three constraints in (18).
5 Determining (r, s)-Robustness using Mixed
Integer Linear Programming
In this section we address Problems 2 and 3, which in-
volve determining the (r∗, s∗)-robustness and (Fmax +
1, Fmax + 1)-robustness of a given digraph. To determine
these values, we will use the following notation:
Definition 7 For a digraph D and a given r ∈ Z+, the
maximum integer s for which D is (r, s)-robust is denoted
as smax(r) ∈ Z+. If D is not (r, s)-robust for any 1 ≤
s ≤ n, we will denote smax(r) = 0.
In words, Θr is the set of all integers s for which the
given digraph D is (r, s)-robust for a given r ∈ Z+. By
this definition, smax(r) = max Θr, i.e. smax(r) is simply
the maximum element of Θr.
As per (23), checking directly if an integer s ∈ Θr
involves testing a logical disjunction for all possible
(S1, S2) ∈ T . This quickly becomes impractical for large
n since T grows exponentially with n. This difficulty
can be circumvented, however, by defining the set
¯Θr = Z+\Θr
= {¯s ∈ Z+ : ¯s /∈ Θr}
= {¯s ∈ Z+ : ∃(S1, S2) ∈ T s.t. (cid:0)X r
(cid:0)X r
< S1(cid:1) ∧(cid:0)X r
+ X r
< S1(cid:1)∧
< ¯s(cid:1)},
S1
S1
S2
(24)
where ∧ denotes logical AND. The set ¯Θr contains all
integers ¯s for which the given digraph is not (r, ¯s)-robust
for the given value of r.
Definition 9 For a digraph D and a given r ∈ Z+, the
minimum integer ¯s for which D is not (r, ¯s)-robust is
denoted as ¯smin(r) ∈ Z+.
As a simple example, consider a digraph D of 7 nodes
where smax(3) = 2. This implies that Θ3 = {1, 2}, i.e.
the digraph is (3, 1)- and (3, 2)-robust. In this case, the
set ¯Θ3 = {3, 4, 5, . . .} since D is not (3, 3)-robust, (3, 4)-
robust, etc. Here we have ¯smin(3) = 3. In general, observe
that by definitions 7 and 9 we have
S2
smax(r) = ¯smin(r) − 1.
(25)
8
j
S)).
S) = 1 ⇐⇒ y∗
S) = 1. This implies j ∈ X r
S ) (cid:54)= 1 ⇐⇒ σj(X r
(cid:54)= 1 ⇐⇒ y∗
S) = 0 ⇐⇒ y∗
S) = 1 ⇐⇒ y∗
to demonstrating σj(X r
S ) (cid:54)= 1 ⇐⇒ y∗
j (cid:54)= 1 ∀j, which
is equivalent to demonstrating σj(X r
S ) = 0 ⇐⇒ y∗
j =
0 ∀j. This can be seen by noting σ(X r
S) ∈ {0, 1}n which
implies σj(X r
S ) = 0, and y∗ ∈ {0, 1}n
which implies y∗
j = 0. Since proving
σj(X r
j = 1 for all j ∈ {1, . . . , n} is
equivalent to proving σj(X r
j = 0 for
all j ∈ {1, . . . , n}, and both y∗ ∈ {0, 1}n and σ(X r
S) ∈
j = 1 ∀j)
{0, 1}n, we therefore have (σj(X r
if and only if (y∗ = σ(X r
Sufficiency: Consider any j ∈ {1, . . . , n} such that
σj(X r
S and therefore Nj\S ≥
r by Definition 4. By Lemma 2, Nj\S = Ljσ(S), and
therefore Ljσ(S) > (r−1). Since y∗ is an optimal point,
it is therefore a feasible point. If y∗
j = 0, the jth row of
the first constraint on the RHS of (26) is be violated
since Ljσ(S) − (n)y∗
j = Ljσ(S) (cid:2) (r − 1). Therefore
j = 1. Note that Nj\S ≤ n ∀j ∈ S for
we must have y∗
any S ⊂ V.
Necessity: We prove by contradiction. Suppose y∗
j = 1
S) = 0. This implies that Ljσ(S) = Nj\S <
and σj(X r
i ∀i (cid:54)=
r. Consider the vector y where yj = 0 and yi = y∗
j, i ∈ {1, . . . , n}. Since Ljσ(S) = Nj\S < r, then y
is therefore also a feasible point, and 1T y < 1T y∗. This
contradicts y∗ being an optimal point to (26); therefore
we must have σj(X r
(cid:4)
S) = 1.
The next Theorem presents a mixed integer linear pro-
gram which determines ¯smin(r) for any fixed r ∈ Z+.
Theorem 2 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph. Let L be the Laplacian matrix
of D. Let r ∈ Z+, and let ¯smin(r) be the minimum value of
s for which D is not (r, s)-robust. Then if ¯smin(r) < n+1,
the following holds:
¯smin(r) =
min
¯s,b1,b2,y1,y2
subject to
(cid:34)
(cid:35)
(cid:34)
(cid:35)(cid:34)
¯s
1 ≤ ¯s ≤ n + 1, ¯s ∈ Z
1T y1 ≤ 1T b1 − 1
1T y2 ≤ 1T b2 − 1
1T y1 + 1T y2 ≤ (¯s − 1)
y1
L 0
y2
b1
b2
0 L
b1 + b2 (cid:22) 1
1 ≤ 1T b1 ≤ (n − 1)
1 ≤ 1T b2 ≤ (n − 1)
b1, b2, y1, y2 ∈ {0, 1}n.
− (n)
(cid:35)
(cid:22) (r − 1)
(cid:35)
(cid:34)
1
1
(28)
Furthermore, for any r > 0, ¯smin(r) = n + 1 if and only
if the integer program in (28) is infeasible.
Illustration of how the (r∗, s∗)-robustness of a graph
Fig. 3.
is found by the DetermineRobustness algorithm and the MILP
method. Consider a digraph D of n = 6 nodes which satisfies
(r∗, s∗) = (2, 3). DetermineRobustness begins with the maxi-
mum possible r and s values (r = (cid:100)n/2(cid:101) and s = n), then iterates
in a lexicographically decreasing manner. The MILP formulation
first determines rmax(D), then ¯smin(rmax(D)), then finally infers
smax(rmax(D)) (abbreviated to ¯smin(r) and smax(r) for clarity).
It is therefore sufficient to find ¯smin(r) in order to de-
termine smax(r). An illustration is given in Figure 3.
The methods in this section will solve for ¯smin(r) using
a mixed integer linear program. Note that since possi-
ble values of smax(r) are limited to 0 ≤ smax(r) ≤ n
(Definition 7), possible values of ¯smin(r) are limited to
1 ≤ ¯smin(r) ≤ n + 1. We point out that it is easier to test
if an integer ¯s ∈ ¯Θr than to test if an integer s ∈ Θr,
in the sense that only one element (S1, S2) ∈ T is re-
quired to verify that ¯s ∈ ¯Θr (as per (24)) whereas all
(S1, S2) ∈ T must be checked to verify that s ∈ Θr (as
per (23)).
S , denoted σ(X r
The following Lemma is needed for our main result. It
shows that given any r ∈ Z+ and S ⊂ V, the indi-
cator vector of the set X r
S), can be ex-
pressed using an MILP. Recall that X r
S is the set of agents
in S which have r in-neighbors outside of S, implying
σj(X r
S) = 1 if Ljσ(S) = Nj\S ≥ r.
Lemma 5 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph. Let L be the Laplacian matrix
of D, and let r ∈ N. Consider any subset S ⊂ V, S >
0 and let X r
S be defined as in Definition 4. Then the
following holds:
σ(X r
S) = arg min
y
subject to
1T y
Lσ(S) − (n)y (cid:22) (r − 1)1
y ∈ {0, 1}n.
(26)
PROOF. Recall that the entries of the indicator vector
σ(X r
S) are defined as
σj(X r
S) =
if j ∈ X r
S ,
0, otherwise.
(27)
(cid:26)1,
Let y∗ be an optimal point of the RHS of (26). To prove
that y∗ = σ(X r
S), we demonstrate that ∀j ∈ {1, . . . , n},
σj(X r
j = 1. Observe that this is equivalent
S) = 1 ⇐⇒ y∗
9
PROOF. Note that the theorem statement assumes r
is a fixed integer. First, consider the case where ¯smin(r) <
(n + 1). The value of ¯smin can be found by solving the
problem ¯smin(r) = min¯s∈ ¯Θr ¯s. Making the constraints
explicit yields
¯smin(r,D) =
min
¯s,(S1,S2)∈T
subject to
¯s
X r
X r
X r
S1
S2
S1
≤ S1 − 1
≤ S2 − 1
+ X r
S2
≤ ¯s − 1. (29)
S1
, X r
To put this problem in an MILP form, we show that the
terms X r
, S1, and S2 can be represented by
functions of binary vectors. This can be done by first
observing that for any S ⊆ V, S = 1T σ(S). Therefore
the following relationships hold:
S2
sixth through ninth constraints. Therefore by Lemma 5,
σ(X r
S1
) = arg min
y1
subject to
σ(X r
S2
) = arg min
y2
subject to
1T y1
Lb1 − (n)y1 (cid:22) (r − 1)1
y1 ∈ {0, 1}n,
1T y2
Lb2 − (n)y2 (cid:22) (r − 1)1
y2 ∈ {0, 1}n.
(32)
(33)
The constraints of (32) and (33) are contained in the fifth
and last constraints of (28). Since the fourth constraint
of (28), 1T y1+1T y2 ≤ (¯s−1), simultaneously minimizes
1T y1 and 1T y2, the fourth, fifth, and last constraints
of (28) ensure that y1 = σ(X r
).
Therefore 1T y1 = X r
) and y2 = σ(X r
and 1T y2 = X r
.
S2
S1
S1
S2
S1 = 1T σ(S1),
S2 = 1T σ(S2),
X r
X r
S1
S2
= 1T σ(X r
= 1T σ(X r
S1
S2
Equation (29) can therefore be rewritten as
),
).
Now, by the above arguments, solving the RHS of (28)
yields ¯smin(r) when ¯smin(r) < (n + 1). We now prove
that for r > 0, ¯smin(r) = n + 1 if and only if the RHS
of (28) is infeasible. Note that if r = 0, then it trivially
holds by Definition 4 that smax(0) = n and therefore
¯smin(0) = n + 1.
¯smin(r,D) =
min
¯s,(S1,S2)∈T ¯s
subject to 1T σ(X r
1T σ(X r
1T σ(X r
S1
S2
S1
) ≤ 1T σ(S1) − 1
) ≤ 1T σ(S2) − 1
) + 1T σ(X r
S2
) ≤ ¯s − 1. (30)
By Lemma 4, the terms σ(S1), σ(S2) for (S1, S2) ∈ T
can be represented by vectors (b1, b2) ∈ B. This yields
¯smin(r,D) = min
¯s
¯s,b1,b2
S1
subject to 1T σ(X r
1T σ(X r
1T σ(X r
(b1, b2) ∈ B.
S1
S2
) ≤ 1T b1 − 1
) ≤ 1T b2 − 1
) + 1T σ(X r
S2
) ≤ ¯s − 1
(31)
Expanding the last constraint using the definition of B
in (16) yields the sixth, seventh, and eighth constraints
in (28) as well as the constraint that b1, b2 ∈ {0, 1}n. In
addition, the first constraint of the RHS of (28) limits
the search for feasible value of ¯s to the range of possible
values for ¯smin(r).
The vectors y1, y2 are constrained to satisfy y1 =
σ(X r
) as follows: by Lemma 4,
b1 = σ(S1) and b2 = σ(S2) for (S1, S2) ∈ T as per the
) and y2 = σ(X r
S1
S2
10
Sufficiency: ¯smin(r) = n + 1 implies that smax(r) =
n. Recall that D is (r, smax(r))-robust by Definition 7,
since smax(r) is the largest integer s for which D is
(r, s)-robust. By Definition 4, this implies that for all
(S1, S2) ∈ T , at least one of the following three condi-
+
tions holds: X r
≥ smax(r) = n. Given any (S1, S2) ∈ T , we con-
X r
sider each condition separately and show that at least
one constraint of (28) is violated if the condition holds
true:
= S2, or X r
= S1, or X r
S2
S1
S1
S2
S2
S1
S1
S1
• X r
• X r
= S1.
= S1 being true implies that the second con-
straint of (28) is violated. This can be shown using
earlier arguments from this proof. Specifically, we
= S1 = 1T b1 > 1T b1 − 1.
have 1T y1 = X r
Therefore no feasible point can be constructed from
the given set pair (S1, S2) if X r
= S2 being true implies that the third con-
straint of (28) is violated. Specifically, we have
. This implies that
1T b2 = S2 and 1T y2 = X r
1T y2 = X r
= S2 = 1T b2 > 1T b2 − 1. There-
fore no feasible point can be constructed from the
given set pair (S1, S2) if X r
• X r
≥ n being true implies that both
X r
= S2. This follows by ob-
⊆ S2, S1∩ S2 = {∅}
serving that X r
by definition of T in (2), and therefore X r
=
{∅}. Since S1, S2 ⊂ V and V = n, we have n ≤
≤ S1 + S2 ≤ V = n. We must
X r
therefore have X r
= S2, which
from prior arguments both imply that a constraint
+ X r
= S1 and X r
= S1 and X r
⊆ S1 and X r
= S2.
+ X r
∩X r
S2
S2
S2
S1
S1
S1
S2
S2
S2
S1
S2
S1
S2
S1
S2
of (28) is violated. Therefore no feasible point can
be constructed from the given set pair (S1, S2) if
X r
+ X r
≥ n
S1
S2
Since for all (S1, S2) ∈ T at least one of these three con-
ditions holds, for all (S1, S2) ∈ T at least one constraint
of (28) is violated when smax(r) = n, which is equivalent
to ¯smin(r) = n + 1. Therefore ¯smin(r) = n + 1 implies
that (28) is infeasible.
Necessity: We prove the contrapositive, i.e. we prove that
¯smin (cid:54)= n + 1 implies that there exists a feasible point to
the RHS of (28). First, no digraph on n nodes is (r, n +
1)-robust [15, Definition 13], and the contrapositive of
Property 1 implies that if a graph is not (¯r, ¯s)-robust,
then it is also not (¯r(cid:48), ¯s(cid:48))-robust for all ¯r(cid:48) ≥ ¯r, and for all
¯s(cid:48) ≥ ¯s. Therefore ¯smin (cid:54)= n + 1 implies ¯smin ≤ n. Next,
¯smin ≤ n implies n ∈ ¯Θr, which implies that there exists
≤
(S1, S2) ∈ T such that X r
S2 − 1 and X r
≤ n − 1, as per (24). Letting
¯s = n, b1 = σ(S1), b2 = σ(S2), y1 = σ(X r
), and
y2 = σ(X r
(cid:4)
≤ S1 − 1 and X r
) yields a feasible point to (28).
+ X r
S1
S1
S2
S2
S1
S2
The MILPs in Theorems 1 and 2 can be used to deter-
mine the (r∗, s∗)-robustness of any digraph satisfying
Assumption 1, thereby solving Problem 2. Recall from
the beginning of Section 5 that r∗ = rmax(D) and s∗ =
smax(rmax(D)). Theorem 1 can first be used to determine
the value of rmax(D) = r∗. Using rmax(D), Theorem 2
can then be used to find the value of smax(rmax(D)) = s∗.
More generally however, the MILP formulation in The-
orem 2 allows for smax(r) to be determined for any r ∈
Z+. Since (r, 1)-robustness is equivalent to r-robustness,
the MILP in Theorem 2 can also be used to determine
whether a digraph D is r robust for a given r ∈ Z+.
If ¯smin(r) ≥ 2, then smax(r) ≥ 1 which implies that D
is (r, 1)-robust. On the other hand, ¯smin(r) = 1 implies
that 1 ∈ ¯Θr and therefore D is not (r, 1)-robust (and not
r-robust).
Finally, to solve Problem 3 Theorem 2 can be used
to determine the (Fmax + 1, Fmax + 1)-robustness of
a nonempty, nontrivial, simple digraph. Recall that
Fmax = max({F ∈ Z+ : (F + 1, F + 1) ∈ Θ}). The value
of Fmax is determined by Algorithm 1, presented below.
In essence, Algorithm 1 finds the largest values of r(cid:48) and
s(cid:48) such that r(cid:48) = s(cid:48) and (r(cid:48), s(cid:48)) ∈ Θ. It begins by setting
r(cid:48) ← rmax(D), and finding smax(r(cid:48)) using Theorem 2.
If smax(r(cid:48)) ≥ r(cid:48), then by Proposition 1 the digraph D
is (r(cid:48), s)-robust for s = r(cid:48) and therefore (r(cid:48), r(cid:48))-robust.
This implies r(cid:48) = Fmax + 1. However, if smax(r(cid:48)) < r(cid:48)
then r(cid:48) is decremented, smax(r(cid:48)) recalculated, and the
process is repeated until the algorithm terminates with
the highest integer r(cid:48) such that D is (r(cid:48), r(cid:48))-robust,
yielding Fmax = (r(cid:48) − 1).
11
Algorithm 1
DetermineFmax
1: r(cid:48) ← rmax(D) from MILP in Theorem 1
2: while r(cid:48) > 0
3:
4:
s(cid:48) ← smax(r(cid:48)) from MILP in Theorem 2
if s(cid:48) ≥ r(cid:48) then
(cid:46) Prop. 1 implies graph is
(r(cid:48), s)-rob. ∀s ≤ s(cid:48), therefore
D is (r(cid:48), r(cid:48))-robust
Fmax ← (r(cid:48) − 1)
return Fmax
r(cid:48) ← (r(cid:48) − 1)
else
5:
6:
7:
8:
9:
end if
10: end while
11: Fmax ← 0
12: return Fmax
6 Reducing Worst-Case Performance of Deter-
mining rmax(D)
When solving a MILP with zero-one integer variables us-
ing a branch-and-bound technique, the worst-case num-
ber of subproblems to be solved is equal to 2q, where q
is the dimension of the zero-one integer vector variable.
In Section 4, the MILP in Theorem 1 which solves for
rmax(D) has a binary vector variable with dimension 2n.
In this section, we present two MILPs whose optimal
values provide upper and lower bounds on the value of
rmax(D). Each MILP has a binary vector variable with
dimension of only n, which implies a reduced worst-case
performance as compared to the MILP in Theorem 1.
6.1 A Lower Bound on Maximum r-Robustness
In [6], a technique is presented for lower bounding
rmax(D) of undirected graphs by searching for the
minimum reachability of subsets S ⊂ V such that
S ≤ (cid:98)n/2(cid:99). We extend this result to digraphs in the
next Lemma.
Lemma 6 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph. Let Ψ = {S ⊂ V : 1 ≤ S ≤
(cid:98)n/2(cid:99)}. Then the following holds:
rmax(D) ≥ min
S∈Ψ
R(S).
(34)
PROOF. By Lemma 1 and Remark 1, proving (34) is
equivalent to proving
(35)
min
S∈Ψ
R(S) ≤ min
(S1,S2)∈T max (R(S1),R(S2)) .
Denote S∗ = arg minS∈Ψ R(S) and (S∗
2 ) =
arg min(S1,S2)∈T max(R(S1),R(S2)). We prove by con-
tradiction. Suppose R(S∗) > max(R(S∗
1 ),R(S∗
2 )). Since
2 ≥ 1. Since
1 ≥ 1 and S∗
S∗
1 and S∗
1 ≤ (cid:98)n/2(cid:99),
they are disjoint, we must have either S∗
1 and S∗
2 less than or
or S∗
equal to (cid:98)n/2(cid:99). Therefore either S∗
2 ∈ Ψ.
2 are nonempty, S∗
2 ≤ (cid:98)n/2(cid:99), or both S∗
1 ∈ Ψ or S∗
1 , S∗
1 ) ≥ R(S∗) (if S∗
1 ∈ Ψ)
This implies that either R(S∗
2 ∈ Ψ), since S∗ is an opti-
or R(S∗
mal point. But this contradicts the assumption that
R(S∗) > max(R(S∗
2 )). Therefore we must have
R(S) ≤ min
2 ) ≥ R(S∗) (if S∗
1 ),R(S∗
(S1,S2)∈T max (R(S1),R(S2)) = rmax(D),
min
S∈Ψ
which concludes the proof.
(36)
(cid:4)
Using this result, a lower bound on rmax(D) can be ob-
tained by the following optimization problem:
Theorem 3 Let D be an arbitrary nonempty, nontrivial,
simple digraph and let L be the Laplacian matrix of D.
A lower bound on the maximum integer for which D is
r-robust, denoted rmax(D), is found as follows:
rmax(D) ≥ min
b
subject to 1 ≤ 1T b ≤ (cid:98)n/2(cid:99)
(37)
max
(Lib)
i
b ∈ {0, 1}n.
Furthermore, (37) is equivalent to the following mixed
integer linear program:
{0, 1}n, then σ : Ψ → BΨ is also injective and therefore
a bijection. This implies that (39) is equivalent to
rmax(D) ≥ min
b∈BΨ
max
i
Lib.
(41)
Making the constraints of (41) explicit yields (37). More
specifically, since BΨ = {b ∈ {0, 1}n : 1 ≤ 1T b ≤ (cid:98)n/2(cid:99)}
by (40), equation (41) can be rewritten with explicit
constraints on b as follows:
rmax(D) ≥ min
b
subject to
i
(Lib)
max
1 ≤ 1T b ≤ (cid:98)n/2(cid:99)
b ∈ {0, 1}n.
(42)
Equation (42) is the same as (37).
We next prove that (38) is equivalent to (37). As per
the proof of Theorem 1, the objective and first two con-
straints of (38) are a reformulation of the objective of the
RHS of (37). The first and third constraint ensure b to
be in {0, 1}n, and the fourth constraint ensures b ∈ BΨ.(cid:4)
rmax(D) ≥ min
t,b
subject to
t
t ≥ 0, b ∈ Zn
Lb (cid:22) t1
0 (cid:22) b (cid:22) 1
1 ≤ 1T b ≤ (cid:98)n/2(cid:99)
6.2 An Upper Bound on Maximum r-Robustness
This section will present an MILP whose solution pro-
vides an upper bound on the value of rmax(D), and whose
binary vector variable has a dimension of n. This will
be accomplished by searching a subset T (cid:48) ⊂ T which is
defined as
(38)
PROOF. To prove the result we show that the RHS
of (37) is equivalent to the RHS of (34). By Lemma 2,
R(S) = maxi Liσ(S). Therefore (34) is equivalent to
rmax(D) ≥ min
S∈Ψ
max
i
Liσ(S).
(39)
Next, we demonstrate that the set
BΨ = {b ∈ {0, 1}n : 1 ≤ 1T b ≤ (cid:98)n/2(cid:99)}
(40)
satisfies BΨ = σ(Ψ), where σ(Ψ) is the image of Ψ under
σ : P(V) → {0, 1}n. Since 1 ≤ S ≤ (cid:98)n/2(cid:99) for all S ∈ Ψ,
then by (7) we have 1 ≤ 1T σ(S) ≤ (cid:98)n/2(cid:99) for all S ∈ Ψ.
Also, σ(S) ∈ {0, 1}n, and therefore σ(S) ∈ BΨ ∀S ∈
Ψ, implying that σ(Ψ) ⊆ B. Next, for any b ∈ BΨ,
choose the set S = σ−1(b) (recall from ?? that σ−1 :
{0, 1}n → P(V)). Then clearly σ(S) = σ(σ−1(b)) = b,
and therefore BΨ ⊆ σ(Ψ). Therefore BΨ = σ(Ψ).
The function σ : Ψ → BΨ is therefore surjective. Since
σ : P(V) → {0, 1}n is injective, Ψ ⊂ P(V), and BΨ ⊂
T (cid:48) = {(S1, S2) ∈ T : S1 ∪ S2 = V}.
(43)
In other words, T (cid:48) is the set of all possible partitionings
of V into S1 and S2. Considering only elements of T (cid:48)
yields certain properties that allow us to calculate an
upper bound on rmax(D) using an MILP with only an
n-dimensional binary vector.
Observe that T (cid:48) = 2n − 2, since neither T nor T (cid:48) in-
clude the cases where S1 = {∅} or S2 = {∅}. Simi-
lar to the methods discussed earlier, the partitioning of
V into S1 and S2 can be represented by the indicator
vectors σ(S1) and σ(S2), respectively. Note that since
S1 ∪ S2 = V for all (S1, S2) ∈ T (cid:48), it can be shown that
σ(S1) + σ(S2) = 1 ∀(S1, S2) ∈ T (cid:48). These properties al-
low the following Lemma to be proven:
Lemma 7 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph. Let L be the Laplacian matrix
of D and let Lj be the jth row of L. Let T (cid:48) be defined as
12
Theorem 4 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph. Let L be the Laplacian matrix
of D. The maximum integer for which D is r-robust,
denoted rmax(D), is upper bounded as follows:
(44)
rmax(D) ≤ min
b
subject to
(cid:107)Lb(cid:107)∞
1 ≤ 1T b ≤ (n − 1)
b ∈ {0, 1}n.
(50)
in (43). Then for all (S1, S2) ∈ T (cid:48), the following holds:
(cid:26)Nj\S1,
(cid:26)Nj\S2,
−Nj\S2,
−Nj\S1,
if j ∈ S1,
if j ∈ S2.
if j ∈ S2,
if j ∈ S1.
Ljσ(S1) =
Ljσ(S2) =
PROOF. Lemma 2 implies that Ljσ(S1) = Nj\S1
if j ∈ S1, and Ljσ(S2) = Nj\S2 if j ∈ S2. Since
(S1, S2) ∈ T (cid:48) =⇒ σ(S1) + σ(S2) = 1, we have
Ljσ(S1) = Lj(1 − σ(S2)) = −Ljσ(S2).
(45)
This relation holds because, by the definition of L, 1 is
always in the null space of L. Therefore for j ∈ S2 we
have Ljσ(S1) = −Ljσ(S2) = −Nj\S2, and for j ∈ S1
we have Ljσ(S2) = −Ljσ(S1) = −Nj\S1.
(cid:4)
An interesting result of Lemma 7 is that for any sub-
sets (S1, S2) ∈ T (cid:48), the maximum reachability of the two
subsets can be recovered using the infinity norm.
Lemma 8 Let D = (V,E) be an arbitrary nonempty,
nontrivial, simple digraph and let L be the Laplacian ma-
trix of D. For all (S1, S2) ∈ T (cid:48), the following holds:
(cid:107)Lσ(S1)(cid:107)∞ = (cid:107)Lσ(S2)(cid:107)∞ = max(R(S1),R(S2)).
(46)
PROOF. Denote the nodes in S1 as {i1, . . . , ip} and
the nodes in S2 as {j1, . . . , j(n−p)} with p ∈ Z, 1 ≤
p ≤ (n − 1). Note that since S1 ∪ S2 = V, we have
{i1, . . . , ip} ∪ {j1, . . . , jn−p} = {1, . . . , n}.
The right hand side of equation (46) can be expressed as
max(R(S1),R(S2)) = max(Ni1\S1, . . . ,Nip\S1,
Nj1\S2, . . . ,Nj(n−p)\S2). (47)
Similarly, using Lemma 7 yields
(cid:107)Lσ(S1)(cid:107)∞ = max(cid:0)L1σ(S1), . . . ,Lnσ(S1)(cid:1)
= max(cid:0)Ni1\S1, . . . ,Nip\S1,
Nj1\S2, . . . ,Nj(n−p)\S2(cid:1)
= max(R(S1),R(S2)).
(48)
Finally, observe that
(cid:107)Lσ(S2)(cid:107)∞ = (cid:107)L(1 − σ(S1))(cid:107)∞ = (cid:107)Lσ(S1)(cid:107)∞ , (49)
(cid:4)
which completes the proof.
A mixed integer linear program yielding an upper bound
on the value of rmax(D) is therefore given by the follow-
ing Theorem:
13
Furthermore, (50) is equivalent to the following mixed
integer linear program:
rmax(D) ≤ min
(51)
t,b
subject to
t
0 ≤ t, b ∈ Zn.
− t1 (cid:22) Lb (cid:22) 1t
0 (cid:22) b (cid:22) 1
1 ≤ 1T b ≤ (n − 1)
PROOF. Consider the optimization problem
(S1,S2)∈T (cid:48) max (R(S1),R(S2)) .
min
(52)
Since T (cid:48) ⊂ T , the optimal value of (52) is a valid upper
bound on the value of rmax(D) as per Remark 1. From
(52) and Lemma 8 we obtain
rmax(D) ≤ min
(S1,S2)∈T (cid:48) (cid:107)Lσ(S1)(cid:107)∞
(S1,S2)∈T (cid:48) (cid:107)Lσ(S2)(cid:107)∞ .
= min
(53)
Since S1, S2 are nonempty and S1 ∪ S2 = V for all
(S1, S2) ∈ T (cid:48), the set of all possible S1 subsets within
elements of T (cid:48) is (P(V)\{∅,V}). Similarly, the set of
all possible S2 subsets within elements of T (cid:48)
is also
(P(V)\{∅,V}). For brevity, denote P∅,V = P(V)\{∅,V}.
Next, we demonstrate that the set B(cid:48) = {b ∈ {0, 1}n :
1 ≤ 1T b ≤ (n − 1)} satisfies σ(P∅,V ) = B(cid:48). Since 1 ≤
S ≤ (n − 1) for all S ∈ P∅,V , then by (7) we have
1 ≤ 1T σ(S) ≤ (n − 1) for all S ∈ P∅,V . Also, σ(S) ∈
{0, 1}n, and therefore σ(S) ∈ B(cid:48) ∀S ∈ P∅,V , implying
that σ(P∅,V ) ⊆ B(cid:48). Next, for any b ∈ B(cid:48), choose the set
S = σ−1(b). Then clearly σ(S) = σ(σ−1(b)) = b, and
therefore B(cid:48) ⊆ σ(P∅,V ). Therefore B(cid:48) = σ(P∅,V ).
The function σ : P∅,V → B(cid:48) is therefore surjective. Since
σ : P(V) → {0, 1}n is injective, P∅,V ⊂ P(V), and
B(cid:48) ⊂ {0, 1}n, then σ : P∅,V → B(cid:48) is also injective. There-
fore σ : P∅,V → B(cid:48) is a bijection, implying that (53) is
equivalent to
rmax(D) ≤ min
b∈B(cid:48) (cid:107)Lb(cid:107)∞ .
(54)
Making the constraints of (54) explicit yields (50). We
next prove that (51) is equivalent to (50). It can be shown
[3, Chapter 4] that minx (cid:107)x(cid:107)∞ is equivalent to
(3.60 GHz) capable of handling 16 total threads. All
MILP problems are solved using MATLAB's intlinprog
function.
t
min
t,x
subject to − t1 (cid:22) x (cid:22) t1.
Likewise, the objective and first two constraints of the
RHS of (51) are a reformulation of the objective of the
RHS of (50). The first and third constraint restrict b ∈
{0, 1}n, and the fourth constraint restricts b to be an
element of B(cid:48). These arguments imply that the RHS of
(cid:4)
(51) is equivalent to the RHS of (50).
7 Discussion
MILP problems are N P -hard problems to solve in gen-
eral. As such, the formulations presented in this paper do
not reduce the theoretical complexity of the robustness
determination problem. However, it has been pointed
out that algorithmic advances and improvement in com-
puter hardware have led to a speedup factor of 800 bil-
lion for mixed integer optimization problems during the
last 25 years [1]. The results of this paper allow for the
robustness determination problem to benefit from ongo-
ing and future improvements in the active areas of opti-
mization and integer programming.
In addition, one crucial advantage of the MILP formu-
lations is the ability to iteratively tighten a global lower
bound on the optimal value over time by using a branch-
and-bound algorithm. The reader is referred to [41] for a
concise overview of how such a lower bound can be cal-
culated. In context of robustness determination, lower
bounds on rmax(D) and smax(r) are generally more use-
ful than upper bounds since they can be used to cal-
culate lower bounds on the maximum adversary model
that the network can tolerate. The ability to use branch-
and-bound algorithms for solving the robustness deter-
mination problem offers the flexibility of terminating
the search for rmax(D) and/or smax(r) when sufficiently
high lower bounds have been determined. In this man-
ner, approximations of these values can be found when
it is too computationally expensive to solve for them ex-
actly. The investigation of additional methods to find
approximate solutions to the MILP formulations in this
paper is left for future work.
8 Simulations
This section presents simulations which demonstrate the
performance of the MILP formulations as compared to
a robustness determination algorithm from prior liter-
ature called DetermineRobustness [13]. Computations
for these simulations are performed in MATLAB 2018b
on a desktop computer with 8 Intel core i7-7820X CPUs
Four types of random graphs are considered in the simu-
lations: Erdos-R´enyi random graphs, random digraphs,
k-out random graphs [2], and k-in random graphs. The
Erdos-R´enyi random graphs in these simulations consist
of n agents, with each possible undirected edge present
independently with probability p ∈ [0, 1] and absent
with probability 1− p. Three values of p are considered:
0.3, 0.5, and 0.8. The random digraphs considered con-
sist of n nodes with each possible directed edge present
independently with probability p and absent with prob-
ability 1−p. The values of p considered are again 0.3, 0.5,
and 0.8. The k-out random graphs consist of n nodes.
For each vertex i ∈ V, k ∈ N other nodes are chosen
with all having equal probability and all choices being
independent. For each node j of the k chosen nodes, a
directed edge (i, j) is formed. k-in random graphs are
formed in the same manner as k-out random graphs with
the exception that the direction of the directed edges
are reversed; i.e. edges (j, i) are formed. The values of k
considered are {3, 4, 5}.
Two sets of simulations are considered. The first set
compares two algorithms which determine the pair
(r∗, s∗) for a digraph: the DetermineRobustness al-
gorithm from [13] and Algorithm 3, (r, s)-Rob. MILP,
which is an MILP formulation using results from The-
orems 1 and 2. Details about the implementation of
these algorithms can be found in the Appendix, sec-
tion A. The algorithms are tested on the four types of
graphs described above with values of n ranging from
7 to 15. In addition, the MILP formulation is tested
on digraphs with values of n ranging from 17 to 25.
The DetermineRobustness algorithm is not tested on
values of n above 15 since the convergence rate trend
is clear from the existing data, and the projected con-
vergence times are prohibitive for large n. 100 graphs
per graph type and combination of n and p (or n and
k depending on the respective graph type), are ran-
domly generated, and the algorithms are run on each
graph. Overall, 10,800 total graphs are analyzed with
DetermineRobustness and 16,800 total graphs are an-
alyzed with Algorithm 3. The time for each algorithm
to determine the pair (r∗, s∗) is averaged for each com-
bination of n and p (for Erdos-R´enyi random graphs
and random digraphs), and for each combination of n
and k (for k-out and k-in random graphs). The inter-
polated circles represent the average convergence time
in seconds over 100 trials for each value of n, while the
vertical lines represent the spread between maximum
convergence time and minimum convergence time over
trials for the respective value of n. Note the logarithmic
scale of the y-axis.
To facilitate the large number of graphs being tested, a
time limit of 103 seconds (roughly 17 minutes) is imposed
14
on Algorithm 3 (the MILP formulation). However, out
of the 16,800 graphs tested by Algorithm 3, there are
only 62 instances where the algorithm did not converge
to optimality before this time limit. Instances where the
time limit was violated are given the maximum time of
103 seconds and included in the data. The graphs where
optimality was not reached by the time limit all have
between 21 and 25 nodes, are either Erdos-R´enyi random
graphs or random digraphs, and have edge formation
probabilities of p = 0.8.
Several patterns in the data warrant discussion. It
is clear that in some cases, the minimum time of
DetermineRobustness is less than that of (r, s)-Rob.
MILP. DetermineRobustness terminates if two subsets
S1 and S2 which are both 0-reachable are encountered,
since this implies that the graph is at most (0, n)-robust.
This can result in fast termination if such subsets are en-
countered early in the search. Second, there are instances
where the maximum time for the (r, s)-Rob. MILP is
much higher than that of the DetermineRobustness
algorithm (e.g. for k-out random digraphs with k = 4).
It is not immediately clear why this is the case; future
work will investigate graph characteristics which affect
the convergence time of the MILP formulations. Finally,
for small values of n (e.g. n ∈ {7, 8}) the average time
for DetermineRobustness is lower than the average
time for the (r, s)-Rob. MILP. This likely reflects that
it may be quicker to simply test all unique nonempty,
disjoint subsets in these cases (966 for n = 7, 3025 for
n = 8) than to incur computational overhead associ-
ated with solving the MILP formulations. We point out
that, with a few exceptions, the difference in this case is
small: the average convergence time for both algorithms
is generally under 10−1 seconds for n ∈ {7, 8}.
The second simulation set compares the performance
of four algorithms which determine only the value of
rmax(D) for digraphs. These include Algorithm 4, a mod-
ified version of DetermineRobustness which determines
rmax(D), the MILP formulation from Theorem 1 (de-
noted r-Rob. MILP ), the lower bound MILP formulation
from Theorem 3 (denoted r-Rob. Lower Bnd ), and the
upper bound MILP formulation from Theorem 4 (de-
noted r-Rob. Upper Bnd ). These algorithms are tested
on the four types of graphs described above with values
of n ranging from 7 to 15. Additionally, the MILP for-
mulations are tested on digraphs with values of n rang-
ing from 17 to 25. Again, 100 graphs per graph type and
combination of n and p (or n and k, depending on the
respective graph type) are randomly generated, and the
algorithms are run on each graph. Overall, 10,800 graphs
are analyzed with Algorithm 4 and 16,800 graphs are
analyzed by each of the three MILP formulations. The
time for each algorithm to determine rmax(D) is aver-
aged for each combination of n, p or k, and graph type.
The average, minimum, and maximum times per com-
bination are plotted in Figure 5. A time limit of 103 sec-
onds is again imposed on all three of the MILP formu-
15
lations, but out of the 16,800 graphs tested there are no
instances where this time limit was violated.
Some of the same patterns as in the first set of simu-
lations (with the DetermineRobustness and (r, s)-Rob.
MILP algorithms) are evident in the second set of sim-
ulations. The Mod. Det. Rob. algorithm also terminates
if a pair of subsets S1 and S2 are found which are both
0-reachable, which is likely the reason for the small min-
imum computation time of this algorithm for several of
the graphs. Mod. Det. Rob. generally has a lower aver-
age computational time for n ∈ {7, 8}, again likely due
to the speed of checking the relatively low number of
unique nonempty, disjoint subset pairs as compared to
solving the MILPs. It is not clear why the r-Rob. Upper
Bnd MILP exhibits high average and maximum com-
putational times for the k-out random digraphs. Future
work will further analyze graph characteristics which
negatively affect the convergence time of the MILP for-
mulations.
9 Conclusion
This paper presents a novel approach on determining
the r- and (r, s)-robustness of digraphs using mixed inte-
ger linear programming (MILP). The advantages of the
MILP formulations and branch-and-bound algorithms
over prior algorithms are discussed, and the performance
of the MILP methods to the DetermineRobustness al-
gorithm is compared.
Much work remains to be done in the area of robustness
determination. The results in this paper merely open the
door for the extensive literature on mixed integer pro-
gramming to be applied to the robustness determination
problem. Future work will focus on applying more ad-
vanced integer programming techniques to the formula-
tions in this paper to yield faster solution times. In par-
ticular, the Laplacian matrix exhibits a high degree of
structure and plays a central role in the MILP formula-
tions presented in this paper. Future efforts will explore
ways to exploit this structure to determine the robust-
ness of digraphs more efficiently.
References
[1] Dimitris Bertsimas and Jack Dunn. Optimal classification
trees. Machine Learning, 106(7):1039 -- 1082, 2017.
[2] B´ela Bollob´as. Models of Random Graphs, page 3459.
Cambridge Studies in Advanced Mathematics. Cambridge
University Press, 2nd edition, 2001.
[3] Stephen Boyd and Lieven Vandenberghe.
optimization. Cambridge university press, 2004.
Convex
[4] Seyed Mehran Dibaji and Hideaki Ishii. Resilient consensus
of second-order agent networks: Asynchronous update rules
with delays. Automatica, 81:123 -- 132, 2017.
[5] Seyed Mehran Dibaji, Hideaki
and Roberto
Tempo. Resilient randomized quantized consensus.
IEEE
Transactions on Automatic Control, 63(8):2508 -- 2522, 2018.
Ishii,
Fig. 4. Comparison of DetermineRobustness to (r, s)-Rob. MILP (Algorithm 3). The interpolating lines and circles represents the
average computation time in seconds over 100 digraphs for each value of n, the upper and lower lines represent the maximum and
minimum computation times, respectively, over the 100 trials for each n. Note that (r, s)-Rob. MILP actually solves two MILPs
sequentially: one to find rmax(D), and one to find smax(rmax(D)).
[6] Luis Guerrero-Bonilla, Amanda Prorok, and Vijay Kumar.
Formations for Resilient Robot Teams. In IEEE Robotics and
Automation Letters, volume 2, pages 841 -- 848. IEEE, 2017.
[7] Luis Guerrero-Bonilla, David Saldana, and Vijay Kumar.
Design guarantees for resilient robot formations on lattices.
IEEE Robotics and Automation Letters, 4(1):89 -- 96, 2018.
wireless sensor networks. IEEE Transactions on Control of
Network Systems, 2017.
[9] Leslie Lamport, Robert Shostak, and Marshall Pease.
The byzantine generals problem. ACM Transactions on
Programming Languages and Systems (TOPLAS), 4(3):382 --
401, 1982.
[8] Yuhei Kikuya, Seyed Mehran Dibaji, and Hideaki Ishii. Fault
tolerant clock synchronization over unreliable channels in
[10] Heath J LeBlanc. Resilient cooperative control of networked
multi-agent systems. Vanderbilt University, 2012.
16
510152025Number of nodes10-410-2100102104Erdos-Renyi GraphsComputation time (sec)p =0.3Det. Rob.(r,s)-Rob. MILP510152025Number of nodes10-410-2100102104p =0.5510152025Number of nodes10-410-2100102104p =0.8510152025Number of nodes10-410-2100102104Random DigraphsComputation time (sec)p =0.3510152025Number of nodes10-410-2100102104p =0.5510152025Number of nodes10-410-2100102104p =0.8510152025Number of nodes10-410-2100102104k-In Random DigraphsComputation time (sec)k =3Det. Rob.(r,s)-Rob. MILP510152025Number of nodes10-410-2100102104k =4510152025Number of nodes10-410-2100102104k =5510152025Number of nodes10-410-2100102104k-Out Random DigraphsComputation time (sec)k =3510152025Number of nodes10-410-2100102104k =4510152025Number of nodes10-410-2100102104k =5Fig. 5. Comparison of the Mod. Det. Rob. algorithm (Algorithm 4) which determines rmax(D) to three MILP formulations. The first
MILP formulation labeled r-Rob. MILP is an implementation of Theorem 1 and calculates rmax(D) exactly. The MILP formulation
labeled r-Rob. Lower Bnd is an implementation of Theorem 3 and calculates a lower bound on rmax(D). The MILP formulation labeled
r-Rob. Upper Bnd is an implementation of Theorem 4 and calculates an upper bound on rmax(D). The interpolating lines and circles
represents the average computation time over 100 digraphs for each value of n, the upper and lower lines represent the maximum and
minimum computation times, respectively, over the 100 trials for each n.
[11] Heath J LeBlanc and Xenofon Koutsoukos.
Resilient
first-order consensus and weakly stable, higher order
synchronization of continuous-time networked multi-agent
systems. IEEE Transactions on Control of Network Systems,
2017.
[12] Heath J LeBlanc and Xenofon D Koutsoukos.
Low
complexity resilient consensus in networked multi-agent
systems with adversaries. In Proceedings of the 15th ACM
international conference on Hybrid Systems: Computation
and Control, pages 5 -- 14. ACM, 2012.
[13] Heath J LeBlanc and Xenofon D Koutsoukos. Algorithms for
determining network robustness. In Proceedings of the 2nd
17
510152025Number of nodes10-410-2100102104Erdos-Renyi GraphsComputation time (sec)p =0.3Mod. Det. Rob.r-Rob. MILPr-Rob. Lower Bndr-Rob. Upper Bnd510152025Number of nodes10-410-2100102104p =0.5510152025Number of nodes10-410-2100102104p =0.8510152025Number of nodes10-410-2100102104Random DigraphsComputation time (sec)p =0.3510152025Number of nodes10-410-2100102104p =0.5510152025Number of nodes10-410-2100102104p =0.8510152025Number of nodes10-410-2100102104k-In Random DigraphsComputation time (sec)k =3Mod. Det. Rob.r-Rob. MILPr-Rob. Lower Bndr-Rob. Upper Bnd510152025Number of nodes10-410-2100102104k =4510152025Number of nodes10-410-2100102104k =5510152025Number of nodes10-410-2100102104k-Out Random DigraphsComputation time (sec)k =3510152025Number of nodes10-410-2100102104k =4510152025Number of nodes10-410-2100102104k =5ACM international conference on High confidence networked
systems, pages 57 -- 64. ACM, 2013.
[14] Heath J. LeBlanc, H Zhang, S Sundaram, and X Koutsoukos.
Resilient continuous-time consensus in fractional robust
networks. In 2013 American Control Conference, pages 1237 --
1242, 6 2013.
[15] Heath J LeBlanc, Haotian Zhang, Xenofon Koutsoukos,
and Shreyas Sundaram. Resilient asymptotic consensus
in robust networks.
IEEE Journal on Selected Areas in
Communications, 31(4):766 -- 781, 2013.
[16] Heath J LeBlanc, Haotian Zhang, Shreyas Sundaram, and
Xenofon Koutsoukos. Consensus of multi-agent networks
in the presence of adversaries using only local information.
In Proceedings of the 1st international conference on High
Confidence Networked Systems, pages 1 -- 10. ACM, 2012.
[17] Zhenhong Li and Zhengtao Ding. Robust cooperative
guidance law for simultaneous arrival. IEEE Transactions
on Control Systems Technology, (99):1 -- 8, 2018.
[18] A. Mitra and S. Sundaram.
Secure distributed state
estimation of an LTI system over time-varying networks and
analog erasure channels. In 2018 Annual American Control
Conference (ACC), pages 6578 -- 6583, June 2018.
[19] Aritra Mitra, Waseem Abbas, and Shreyas Sundaram. On
the impact of trusted nodes in resilient distributed state
estimation of LTI systems.
In 2018 IEEE Conference on
Decision and Control (CDC), pages 4547 -- 4552. IEEE, 2018.
[20] Aritra Mitra, John A Richards, Saurabh Bagchi, and Shreyas
Sundaram. Resilient distributed state estimation with mobile
agents: overcoming byzantine adversaries, communication
losses, and intermittent measurements. Autonomous Robots,
pages 1 -- 26, 2018.
[21] Aritra Mitra and Shreyas Sundaram. Secure distributed
observers for a class of linear time invariant systems in the
presence of byzantine adversaries. In Decision and Control
(CDC), 2016 IEEE 55th Conference on, pages 2709 -- 2714.
IEEE, 2016.
[22] Hyongju Park and Seth Hutchinson. An efficient algorithm
for fault-tolerant rendezvous of multi-robot systems with
controllable sensing range.
In Robotics and Automation
(ICRA), 2016 IEEE International Conference on, pages 358 --
365. IEEE, 2016.
[23] Hyongju Park and Seth A Hutchinson.
rendezvous of multirobot systems.
robotics, 33(3):565 -- 582, 2017.
Fault-tolerant
IEEE transactions on
[24] David Saldana, Luis Guerrero-Bonilla, and Vijay Kumar.
Resilient backbones in hexagonal robot formations.
In
Distributed Autonomous Robotic Systems, pages 427 -- 440.
Springer, 2019.
[25] David Saldana, Amanda Prorok, Shreyas Sundaram,
Mario FM Campos, and Vijay Kumar. Resilient consensus
for time-varying networks of dynamic agents. In American
Control Conference (ACC), 2017, pages 252 -- 258. IEEE,
2017.
[26] Danial Senejohnny, Shreyas Sundaram, Claudio De Persis,
and Pietro Tesi. Resilience against misbehaving nodes in self-
triggered coordination networks. In 2018 IEEE Conference
on Decision and Control (CDC), pages 2848 -- 2853. IEEE,
2018.
[27] Ebrahim Moradi Shahrivar, Mohammad Pirani, and Shreyas
Sundaram. Robustness and algebraic connectivity of random
interdependent networks. arXiv preprint arXiv:1508.03650,
2015.
[28] Ebrahim Moradi Shahrivar, Mohammad Pirani, and Shreyas
Sundaram. Spectral and structural properties of random
interdependent networks. Automatica, 83:234 -- 242, 2017.
[29] Lili Su and Nitin H Vaidya. Fault-tolerant multi-agent
optimization: optimal iterative distributed algorithms.
In
Proceedings of the 2016 ACM Symposium on Principles of
Distributed Computing, pages 425 -- 434. ACM, 2016.
[30] Lili Su and Nitin H Vaidya. Reaching approximate byzantine
consensus with multi-hop communication. Information and
Computation, 255:352 -- 368, 2017.
[31] Shreyas Sundaram and Bahman Gharesifard. Distributed
optimization under adversarial nodes. IEEE Transactions on
Automatic Control, 2018.
[32] Lewis Tseng and Nitin Vaidya.
Iterative approximate
byzantine consensus under a generalized fault model.
In
International Conference on Distributed Computing and
Networking, pages 72 -- 86. Springer, 2013.
[33] Lewis Tseng, Nitin Vaidya, and Vartika Bhandari. Broadcast
using certified propagation algorithm in presence of byzantine
faults. Information Processing Letters, 115(4):512 -- 514, 2015.
[34] Lewis Tseng and Nitin H Vaidya. Asynchronous convex hull
consensus in the presence of crash faults.
In Proceedings
of the 2014 ACM symposium on Principles of distributed
computing, pages 396 -- 405. ACM, 2014.
[35] James Usevitch and Dimitra Panagou. r-robustness and (r,
s)-robustness of circulant graphs. In 2017 IEEE 56th Annual
Conference on Decision and Control (CDC), pages 4416 --
4421, Dec 2017.
[36] James Usevitch and Dimitra Panagou.
Determining
r-robustness
linear
programming. In 2019 Annual American Control Conference
(ACC). IEEE, 2019.
of digraphs using mixed integer
[37] Nitin H Vaidya.
Iterative byzantine vector consensus
in incomplete graphs.
In International Conference on
Distributed Computing and Networking, pages 14 -- 28.
Springer, 2014.
[38] Nitin H Vaidya and Vijay K Garg. Byzantine vector
consensus in complete graphs.
In Proceedings of the 2013
ACM symposium on Principles of distributed computing,
pages 65 -- 73. ACM, 2013.
[39] Nitin H Vaidya, Lewis Tseng, and Guanfeng Liang. Iterative
in arbitrary directed
approximate byzantine consensus
graphs.
In Proceedings of the 2012 ACM symposium on
Principles of distributed computing, pages 365 -- 374. ACM,
2012.
[40] Guang Wang, Ming Xu, Yiming Wu, Ning Zheng, Jian Xu,
and Tong Qiao. Using machine learning for determining
network robustness of multi-agent systems under attacks.
In Pacific Rim International Conference on Artificial
Intelligence, pages 491 -- 498. Springer, 2018.
[41] Laurence A Wolsey. Mixed integer programming. Wiley
Encyclopedia of Computer Science and Engineering, pages
1 -- 10, 2007.
[42] Haotian Zhang, Elaheh Fata, and Shreyas Sundaram. A
notion of robustness in complex networks. IEEE Transactions
on Control of Network Systems, 2(3):310 -- 320, 2015.
[43] Haotian Zhang and Shreyas Sundaram.
Robustness
of
information diffusion algorithms to locally bounded
adversaries. In American Control Conference (ACC), 2012,
pages 5855 -- 5861. IEEE, 2012.
[44] Jun Zhao, Osman Yagan, and Virgil Gligor. On connectivity
and robustness in random intersection graphs.
IEEE
Transactions on Automatic Control, 62(5):2121 -- 2136, 2017.
18
A Description of Algorithm implementations
This section gives additional details about the im-
plementations of the algorithms tested in the Sim-
ulation. Algorithm 2 provides the details about the
implementation of the DetermineRobustness algo-
rithm implemented in the simulations. One modifica-
(cid:7)(cid:1)
2: r ← min(cid:0)max(cid:0)δin(D), 1(cid:1) ,(cid:6) n
Algorithm 2 [13]
DetermineRobustness(A(D))
1: comment: A(D) is the adjacency matrix of the graph.
3: s ← n
4: comment: δin(D) is the min. in-degree of nodes in D
5: for each k ← 2 to n
6:
7:
8:
k ) unique subsets of V
for each Pj ∈ PKi (j = 1, 2, . . . , 2k−1 − 1)
comment: PKi is set of partitions of Ki with
for each Ki ∈ Kk (i = 1, 2, . . . , ( n
comment: Kk is the set of ( n
k ))
2
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
exactly two nonempty parts
comment: Pj = {S1, S2}
isRSRobust ← Robustholds(A(D), S1, S2, r, s)
if (isRSRobust == false) and s > 0 then
s ← s − 1
end if
while isRRobust == false and (r > 0)
while isRSRobust == false and (s > 0)
isRRobust
←
Robustholds(A(D), S1, S2, r, s)
if not isRSRobust then
s ← s − 1
end if
end while
if isRSRobust == false then
r ← r − 1
s ← n
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33: end for
34: return (r, s)
end for
end if
end while
if r == 0 then
return (r, s)
end if
end for
(cid:46) Implies rmax(D) = 0
(cid:46) Returned values are
(rmax(D), smax(rmax(D)))
tion was made to the DetermineRobustness algorithm
to ensure accuracy of results. In the first line of the
original DetermineRobustness algorithm, r is initial-
ized with min(cid:0)δin(D),(cid:100)n/2(cid:101)(cid:1). This yields incorrect
results however for directed spanning trees where the
in-degree of the root node is zero. Consider the di-
graph depicted in Figure A. Here, δin(D) = 0, since
the left agent has no in-neighbors. This implies that
the original DetermineRobustness algorithm would
initialize r ← 0 and return (0, n) as the values of
(rmax(D), smax(rmax(D))). However, Figure A shows
that for all nonempty, disjoint subsets S1 and S2, at
least one is 1-reachable. The depicted graph is therefore
19
(Left) Example of a digraph which has δin(D) = 0
Fig. A.1.
but which is 1-robust. The graph is depicted on the far left, and
all possible (S1, S2) pairs in T are depicted on the close left.
(Right) Fig A.2. A rooted out-branching, where the in-degree of
the root node (far left) is zero. All digraphs containing a rooted
outbranching are at least (1, 1)-robust [15].
(1, 1)-robust with rmax(D) = 1 and smax(rmax(D)) = 1.
In fact, initializing r ← δin(D) will always yield this
error for any directed spanning tree where the in-degree
of the root node is 0. This happens because any di-
graph is 1-robust if and only if it contains a rooted out-
branching [15, Lemma 7], yet DetermineRobustness
initializes r ← δin(D) = 0 which results in termination
at line 23. In Algorithm 2, r is instead initialized with
δin(D) = 0, since it is still possible for the digraph to be
1-robust.
(cid:7)(cid:1). This initializes r ← 1 if
min(cid:0)max(cid:0)δin(D), 1(cid:1) ,(cid:6) n
2
To compare the MILP methodologies of this pa-
per with the DetermineRobustness algorithm, Al-
gorithm 3 was used which determines the values of
(rmax(D), smax(rmax(D))). The first part of Algorithm
Algorithm 3
(r, s)-Rob. MILP
1: r ← rmax(D) from MILP in Theorem 1
2: if r == 0 then
3:
4: else
5:
s ← n
if δin(D) ≥ (cid:98)n/2(cid:99) + r − 1 then (cid:46) See Property 5.23
s ← n
¯smin(r) ← from MILP in Theorem 2
s ← ¯smin(r) − 1
in [10]
else
6:
7:
8:
9:
10:
11: end if
12: return (r, s)
end if
3 uses the formulation in Theorem 1 to determine
rmax(D). If rmax(D) = 0, then s ← n and the algorithm
returns (r, s). If rmax(D) > 0, then the algorithm deter-
mines in line 5 whether the minimum in-degree of the
graph δin(D) ≥ (cid:98)n/2(cid:99) + r − 1. By Property 5.23 in [10],
if this is satisfied then the digraph is (r, s)-robust for all
1 ≤ s ≤ n. Since for r > 0 the MILP in Theorem 2 is
infeasible if and only if s = n, this test attempts to help
the MILP solver avoid a fruitless search for a feasible
solution if s is indeed equal to n. This test works for
graphs with large minimum in-degrees (e.g. complete
graphs), but since it is a sufficient condition only it may
not always detect when smax(r) = n. Determining a
more rigorous test to determine when smax(r) = n is left
for future work. Finally, if the test in line 5 fails then
the MILP formulation in Theorem 2 is performed to
determine ¯smin. Since smax(r) = ¯smin(r) − 1, the value
of smax(r) is stored in s and the algorithm returns (r, s).
The MILP algorithms in Section 4 consider r-robustness,
which is equivalent to (r, 1)-robustness [13, Property
5.21], [15, Section VII-B]. Since they effectively do not
consider values of s greater than 1, it is unfair to com-
pare them directly with the DetermineRobustness
algorithm. Algorithm 4 is a modified version of
DetermineRobustness which only considers
(r, 1)-
robustness. This is accomplished by initializing s ← 1 in
lines 2 and 20 instead of s ← n. Algorithm 4 is labeled
Mod. Det. Rob. in the simulation legends.
(cid:7)(cid:1)
2: r ← min(cid:0)max(cid:0)δin(D), 1(cid:1) ,(cid:6) n
Algorithm 4
Modified version of DetermineRobustness
1: comment: A(D) is the adjacency matrix of the graph
3: s ← 1
(cid:46) (Different than Alg. 3.2 in [13])
4: comment: δin(D) is the min. in-degree of nodes in D
5: for each k ← 2 to n
6: comment: Kk is the set of ( n
7:
8:
k ) unique subsets of V
for each Pj ∈ PKi (j = 1, 2, . . . , 2k−1 − 1)
comment: PKi is set of partitions of Ki into S1
for each Ki ∈ Kk (i = 1, 2, . . . , ( n
k ))
2
and S2
isRSRobust ← Robustholds(A(D), S1, S2, r, s)
if (isRSRobust == false) and s > 0 then
s ← s − 1
end if
while isRRobust == false and (r > 0)
isRRobust
while isRSRobust == false and (s > 0)
← Robustholds(A, S1, S2, r, s)
s ← s − 1
if not isRSRobust then
end if
end while
if isRSRobust == false then
(cid:46) (Diff. than Alg. 3.2 in [13])
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32: end for
33: return r
r ← r − 1
s ← 1
end if
end while
if r == 0 then
return r
end if
end for
end for
20
|
1910.00741 | 1 | 1910 | 2019-10-02T01:35:14 | Emergence of Writing Systems Through Multi-Agent Cooperation | [
"cs.MA",
"cs.CL",
"cs.CV",
"cs.IT",
"cs.LG",
"cs.IT"
] | Learning to communicate is considered an essential task to develop a general AI. While recent literature in language evolution has studied emergent language through discrete or continuous message symbols, there has been little work in the emergence of writing systems in artificial agents. In this paper, we present a referential game setup with two agents, where the mode of communication is a written language system that emerges during the play. We show that the agents can learn to coordinate successfully using this mode of communication. Further, we study how the game rules affect the writing system taxonomy by proposing a consistency metric. | cs.MA | cs | Emergence of Writing Systems Through Multi-Agent Cooperation
Shresth Verma, Joydip Dhar
ABV-Indian Institute of Information Technology and Management
Gwalior, MP, India 474003
E-mail: [email protected], [email protected]
9
1
0
2
t
c
O
2
]
A
M
.
s
c
[
1
v
1
4
7
0
0
.
0
1
9
1
:
v
i
X
r
a
Abstract
Learning to communicate is considered an essential task to
develop a general AI. While recent literature in language
evolution has studied emergent language through discrete or
continuous message symbols, there has been little work in
the emergence of writing systems in artificial agents. In this
paper, we present a referential game setup with two agents,
where the mode of communication is a written language sys-
tem that emerges during the play. We show that the agents
can learn to coordinate successfully using this mode of com-
munication. Further, we study how the game rules affect the
writing system taxonomy by proposing a consistency metric.
Introduction
Recent advances in deep learning have shown exceptional
results in language-related tasks such as machine transla-
tion, question answering, or sentiment analysis. However,
the supervised approaches that capture the underlying statis-
tical patterns in language are not sufficient in perceiving the
interactive nature of communication and how humans use it
for coordination. It is thus crucial to learn to communicate
by interaction, i.e., communication must emerge out of ne-
cessity. Such study gives further insights into how communi-
cation protocols emerge for successful coordination and the
ability of a learner to understand the emerged language.
Several recent works (Lazaridou, Peysakhovich, and Ba-
roni 2016; Havrylov and Titov 2017; Lazaridou et al. 2018;
Mordatch and Abbeel 2018), have shown that in multi-agent
cooperative setting of referential games, deep reinforcement
learning can successfully induce communication protocols.
In these games, communication success is the only super-
vision during learning, and the meaning of the emergent
messages gets grounded during the game. In (Lazaridou,
Peysakhovich, and Baroni 2016), the authors have restricted
the message to be a single symbol token picked from a fixed
vocabulary while in (Havrylov and Titov 2017), the mes-
sage is considered to be a sequence of symbols. (Lazaridou
et al. 2018) demonstrates that successful communication can
also emerge in environments which present raw pixel input.
Copyright c(cid:13) 2020, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
(Mordatch and Abbeel 2018) further extends the scope of
mode of communication by also studying the emergence of
non-verbal communication.
While these works have studied a wide variety of game
setups as well as variations in communication rules, none of
them have considered written language system as a mode of
communication. Historically, written language systems have
shown complex patterns in evolution over time. Moreover,
the process of writing requires sophisticated graphomotor
skills which involves both linguistic and non-linguistic fac-
tors. Thus writing systems can be considered crucial for un-
derstanding autonomous system development. We are fur-
ther motivated by the work in (Ganin et al. 2018), where the
authors demonstrate that artificial agents can produce visual
representations similar to those created by humans. This can
only be achieved by giving them access to the same tools
that we use to recreate the world around us. We extend this
idea to study emergence of writing systems.
Referential Game Framework
In our work, we have used two referential game setups
that are slight modifications to the ones used in (Lazaridou,
Peysakhovich, and Baroni 2016; Lazaridou et al. 2018).
There are two players, a sender and a receiver. From a
given set of images I = {ij}N
j=1, we sample a target image
t ∈ I and K − 1 distracting images D = {dj}K−1
j=1 , dj ∈ I
s.t. ∀j t (cid:54)= dj. Now, we define two sender types, Distractor
Agnostic (D-Agnostic): where the sender only has access to
the target image t; Distractor Aware (D-Aware): where the
sender has access to the candidate set C = t ∪ D. In both
these variations, the sender has to come up with a message
Ml = {mj}l
j=1, which is a sequence of l brushstrokes. A
black-box renderer R accepts the sequence of brushstrokes
Ml and paints them onto a canvas. This results in a written
symbol image W = R(Ml). Given the written symbol im-
age W and the candidate set C, the receiver has to identify
the target image t. Communicative success is achieved when
the target is correctly identified and a payoff of 1 is assigned
to both the players. In rest of the cases, payoff is 0.
Experimental Setup
Agents
The sender and receiver are modelled as reinforcement
learning policy networks Sθ andRφ. Specifically, the sender
is a recurrent neural network which takes as input the cur-
rent state of the canvas along with the visual input V which
can either be target image t (D-Agnostic) or candidate set C
(D-Aware). At the ith timestep, the sender outputs a brush-
stroke mi. The canvas state is the intermediate rendering
R(Mi), where Mi is the collection of brushstrokes pro-
duced upto timestep i. Thus, mi+1 is generated by sampling
from Sθ(R(Mi), hi, V ) where hi is the internal hidden state
maintained across timesteps. The sequence is terminated
when either the maximum sequence length L is reached or
a terminal flag is produced along with the brushstroke. The
internal state is maintained across timesteps using an LSTM
cell (Hochreiter and Schmidhuber 1997). The receiver agent
first extracts features from the written symbol image W . For
creating brushstrokes that are similar to written languages
used by humans, we use feature extractor from a Siamese
Neural Network (Koch, Zemel, and Salakhutdinov 2015),
pre-trained on the OMNIGLOT dataset (Lake, Salakhutdi-
nov, and Tenenbaum 2015). Given the written symbol im-
age W , a candidate set U (a random permutation of C), and
the feature extractor fs, the receiver returns an integer value
t(cid:48) = Rφ(fs(W ), U ) in the range 0 to K-1 that points to the
target.
Learning
For both the agents, we pose the learning of communication
protocols as maximization of the expected return Er[R(r)],
where R is the reward function. The payoff is 1 for both the
agents iff Rφ(fs(Sθ(R(Mi), hi, V )), U ) = t , where i is the
last timestep of the episode. In all other cases and interme-
diate timesteps, the payoff is 0. Because of the high dimen-
sional search space introduced due to brushstrokes, we use
Proximal Policy Optimization (PPO) (Schulman et al. 2017)
for optimizing the weights of sender and receiver agents.
Images
We have used CIFAR-10 dataset (Krizhevsky, Hinton, and
others 2009), as a source of images. From the test set of
CIFAR-10, we randomly sample 100 images from each class
and represent them as outputs from relu7 layer of pre-
trained VGG-16 convNet (Simonyan and Zisserman 2014).
Results and Conclusion
Figure 1 shows the performance of our game setup for both
the sender variations. The agents converge to coordination
in both sender types, but D-Aware sender reaches higher
levels more quickly. Further, we quantify the consistency
of a writing system by studying the variability of the sym-
bols produced for a given entity e. Let we be the set of all
written symbol images representing e. We define heatmap
He = mean(we). For a writing system consistent for the
entity e, He would contain sharp brushstrokes while a non-
consistent writing system would give a blurred heatmap. We
thus compute Variance of Laplacian (VoL) of the heatmap to
Figure 1: Communication success as a function of training
episodes for referential games with K = 3 and L = 2
Sender Type Avg. Consis-
D-Agnostict
D-Awaret
D-Awaret&d
tency Score
0.019
0.007
0.015
Baseline Consis-
tency Score
0.0055
0.0044
0.0044
Table 1: Consistency Score for different sender types
quantify sharpness. Table 1 reports the average consistency
score given by
(cid:80)
e∈E V oL(He)
E
where E is the set of all the entities considered which can
either be targets (t) or target-distractor combinations (t&d).
We also report a baseline consistency score where heatmap
is generated by averaging across the universal set of gener-
ated symbol images.
High consistency of D-Agnostic sender indicates a one-
to-one mapping from target class to written symbols. The D-
Aware sender has low consistency over target class but high
consistency for target-distractor combinations . This means
that symbols are context dependent. From our qualitative
evaluations, we infer that D-Aware sender assigns mean-
ing to brushstrokes that represent conceptual differences
between target and distractors. Furthermore, D-Agnostic
sender uses a scheme akin to hierarchical encoding to at-
tribute high level semantics to brushstrokes. Thus, the writ-
ing system emerging from D-Aware sender is an ideographic
one representing concepts while D-Agnostic sender pro-
duces a writing system which has compositionality and
shows logographic traits.
References
[Ganin et al. 2018] Ganin, Y.; Kulkarni, T.; Babuschkin, I.;
Eslami, S.; and Vinyals, O. 2018. Synthesizing programs for
images using reinforced adversarial learning. arXiv preprint
arXiv:1804.01118.
[Havrylov and Titov 2017] Havrylov, S., and Titov, I. 2017.
Emergence of language with multi-agent games: Learning
to communicate with sequences of symbols. In Advances in
neural information processing systems, 2149 -- 2159.
S.,
[Hochreiter and Schmidhuber 1997] Hochreiter,
and
Schmidhuber, J. 1997. Long short-term memory. Neural
computation 9(8):1735 -- 1780.
[Koch, Zemel, and Salakhutdinov 2015] Koch, G.; Zemel,
R.; and Salakhutdinov, R. 2015. Siamese neural networks
In ICML deep learning
for one-shot image recognition.
workshop, volume 2.
[Krizhevsky, Hinton, and others 2009] Krizhevsky, A.; Hin-
ton, G.; et al. 2009. Learning multiple layers of features
from tiny images. Technical report, Citeseer.
[Lake, Salakhutdinov, and Tenenbaum 2015] Lake, B. M.;
Salakhutdinov, R.; and Tenenbaum, J. B. 2015. Human-
level concept learning through probabilistic program induc-
tion. Science 350(6266):1332 -- 1338.
[Lazaridou et al. 2018] Lazaridou, A.; Hermann, K. M.;
Tuyls, K.; and Clark, S. 2018. Emergence of linguistic com-
munication from referential games with symbolic and pixel
input. arXiv preprint arXiv:1804.03984.
[Lazaridou, Peysakhovich, and Baroni 2016] Lazaridou, A.;
Peysakhovich, A.; and Baroni, M. 2016. Multi-agent co-
operation and the emergence of (natural) language. arXiv
preprint arXiv:1612.07182.
[Mordatch and Abbeel 2018] Mordatch, I., and Abbeel, P.
2018. Emergence of grounded compositional language in
multi-agent populations. In Thirty-Second AAAI Conference
on Artificial Intelligence.
[Schulman et al. 2017] Schulman, J.; Wolski, F.; Dhariwal,
P.; Radford, A.; and Klimov, O. 2017. Proximal policy op-
timization algorithms. arXiv preprint arXiv:1707.06347.
[Simonyan and Zisserman 2014] Simonyan, K., and Zisser-
man, A. 2014. Very deep convolutional networks for large-
scale image recognition. arXiv preprint arXiv:1409.1556.
|
1907.00899 | 1 | 1907 | 2019-06-27T20:53:43 | Engineering Token Economy with System Modeling | [
"cs.MA"
] | Cryptocurrencies and blockchain networks have attracted tremendous attention from their volatile price movements and the promise of decentralization. However, most projects run on business narratives with no way to test and verify their assumptions and promises about the future. The complex nature of system dynamics within networked economies has rendered it difficult to reason about the growth and evolution of these networks. This paper drew concepts from differential games, classical control engineering, and stochastic dynamical system to come up with a framework and example to model, simulate, and engineer networked token economies. A model on a generalized token economy is proposed where miners provide service to a platform in exchange for a cryptocurrency and users consume service from the platform. Simulations of this model allow us to observe outcomes of complex dynamics and reason about the evolution of the system. Speculative price movements and engineered block rewards were then experimented to observe their impact on system dynamics and network-level goals. The model presented is necessarily limited so we conclude by exploring those limitations and outlining future research directions. | cs.MA | cs | Engineering Token Economy with System Modeling
Zixuan Zhang
Acknowledgment
This thesis will not be possible without the advice and guidance from Dr Michael
Zargham, founder of BlockScience and Penn PhD alumnus in Network Science and Dr Victor
Preciado, Raj and Neera Singh Professor in Network and Data Sciences.
Abstract
Cryptocurrencies and blockchain networks have attracted tremendous attention from their
volatile price movements and the promise of decentralization. However, most projects run on
business narratives with no way to test and verify their assumptions and promises about the
future. The complex nature of system dynamics within networked economies has rendered it
difficult to reason about the growth and evolution of these networks. This paper drew concepts
from differential games, classical control engineering, and stochastic dynamical system to come
up with a framework and example to model, simulate, and engineer networked token economies.
A model on a generalized token economy is proposed where miners provide service to a platform
in exchange for a cryptocurrency and users consume service from the platform. Simulations of
this model allow us to observe outcomes of complex dynamics and reason about the evolution of
the system. Speculative price movements and engineered block rewards were then experimented
to observe their impact on system dynamics and network-level goals. The model presented is
necessarily limited so we conclude by exploring those limitations and outlining future research
directions.
Table of Content
Introduction
A Token Economy
Differential Games and Control
Networked Economy
Beyond Cryptocurrencies
Model Setup
Model Assumptions
Model Scope
State Variables
System Dynamics
Simulation and Evaluation
Baseline Simulation
Speculative Price Influence
Engineering Block Rewards
Future Directions
Network Effect as a Positive Externality
Lyapunov Argument with Energy Field
Optimal Agent Strategy
Conclusion
Bibliography
1
1
2
3
4
5
5
6
8
9
13
13
21
23
26
26
27
27
29
30
Introduction
A Token Economy
The advent of Bitcoin ushered in a wave of blockchain projects with native currencies, distributed
architecture, and cryptographic guarantees. Many projects are built on the business narrative of a
new digital economy where one can provide service or product and get paid in cryptocurrencies
that can be sold on exchanges around the world. Given the decentralized nature of most of these
platforms, there is almost no external authority that governs the evolution of these networks.
These self-sovereign networks with emergent properties are only controlled by the rules of the
system and the human agents that interact with them. It has become increasingly important to
design the right set of microscopic incentives that can achieve the desirable system-level
behavior. With economic incentives, human decisions, and cryptographic proofs, the term
cryptoeconomics is coined to describe the design and study of incentives and mechanisms in a
blockchain network.
Many approach the design problem with theories from mechanism design and algorithmic game
theory whose analyses focus on the equilibrium [1]. However, the real world is full of random
disturbances, irrational behaviors, and deviation from the equilibrium which goes beyond the
scope of those analyses. We draw inspiration from early military pursuer-and-evader differential
games where the model is agnostic to the exact behavior of the players and derives proofs just
from permissible actions and trajectories of the system [2]. In the context of designing a
blockchain economic system, as protocol designers, we want to design a set of rules such that
irrespective of exact agent behaviors, the system-level objectives are still preserved. Compared to
other games and distributed control considered in the past [3, 4, 5], putting protocol design in the
context of a game has the property of global information where every agent is aware of the
actions and payoffs of other players.
Our Markovian dynamical system modeling approach for decision making and economics drew
inspiration from Ole Peters and Alexander Adamou's work on ergodicity economics [6] and John
Sterman's work on business dynamics [7]. In addition, a stochastic dynamical system model
enables us to understand complex relationships within a system and observe the business level
impact resulted from secondary or tertiary dynamics. Non-obvious business impacts that are
difficult to conceptualize will become clear and obvious after one has witnessed the impact as an
outcome of a dynamical system. Such an impact is often non-intuitive prior to the observation.
Differential Games and Control
Differential games bridge many concepts in control theory with game theory. Control theory is
foundational to design systems that are robust to environmental noise and system-failures [8]. In
our previous paper [9], we have described an application of state-space model to the analysis of
blockchain networks. In this thesis, we will further describe the process of using state-space
model to control and optimize for desired properties from the perspective of a protocol designer.
To fully harness the power of control theory, we first need to define the system-level objectives
for the blockchain network which are often neglected in the business narratives. In addition,
traditional control theory often deals with physical system over which designers have direct
control [10]. In designing an economic network of human agents and incentives, designers at best
have indirect control over the incentive structure with little control over the exact behavior.
Since a large part of the design depends on the system-level objective for control engineering
principles to work, we should first define the system in its state variables, transition functions,
system-level objectives and cost constraints. Common system-goals include steady appreciation
of network token, low cost of service provided on the network, steady growth of network
utilization and so on. We will then have the potential to apply Lyapunov-style arguments to
bound the reachable states of the system through the bound on its inputs [11]. However, to do a
full proof of min-max optimization with Lyapunov control over input and output requires much
more rigorous analysis and much contextual knowledge. Protocol designers will also require the
power to design a universe where they can design incentive structure and energy function such
that it requires energy for users to go against the allowable option space. Traditional control
engineering concept such as a barrier function can be applied in constraining the allowable
actions and reachable space. While this is a very interesting area, this thesis will not focus on its
proof and analysis but instead setting up a generalized token economy model that other more
complex models and system can be extended from.
Another major difference of our model from classical control system model is the presence of a
black box. We see this in price movement but also in agent behavior. Each individual follows
their own control policies, not necessarily the ones that protocol designers hope for. This is where
concepts from differential games come in. Agents follow their own policies as a function of their
own beliefs of the system state and their own payout function. The collective behaviors of
different agents result in sometimes unexpected system-level outcome. A differential game
assumes an adversarial agent with a complete opposite payout function. The role of the designer
is to design a set of rules and incentives such that the system-level goal can still be achieved
irrespective of the exact behavior of the agents. In our model, we will treat these black boxes as
random variables drawn from a reasonable distribution from which some meaning can be derived.
Figure 1. High-level control systems for agent-based networks.
As illustrated in the figure above, the exact agent beliefs and the full state of the system are much
like black boxes. Random processes will be fed into the agent policies and system mechanism
which collectively update the unobservable full system state. Agents in the system can then
observe the state and form their beliefs, signals, and objectives that impact their policies in the
next iteration. Despite the presence of these unobservable states and random processes, we can
design allowable agent policies and system mechanisms to achieve certain observable outcome.
This mix of white-box and black-box approach renders the token design process robust and
innovative.
Networked Economy
Another key aspect of a token economy is that it is a global networked economy from day one,
from the physical layer of distributed machines that power the network to the agent level network
of producers and consumers of services [9]. There are many interesting topics within the domain
of network itself that are worth considering. Quite a few papers in network formation will prove
relevant in modeling and understanding the growth of a network [12, 13]. In addition, the contact
and interaction of agents on the network are also dependent on the network topology, similar to
how epidemic spreads over different network topologies [14, 15]. Network topologies play an
important role in network efficiency, growth, and even adoption.
However, as our thesis focuses on the economics of the token economy on a population level, the
exact interaction over network topology is important but less relevant in the immediate term.
Many of the cryptoeconomic networks are still in their infancy for us to consider their topologies.
In addition, much of the impact of network topology is reflected in network latency which at best
can lead to lag in decision and processes. For example, mining nodes operating in a mining farm
share close proximity with each other and result in reduced latency and oftentimes lead to gains in
consensus power [16, 17]. In our population level analysis of a service based economy, the
impact of network topology has been absorbed and reflected in the quality of service, in terms of
up time, response time, and latency. From a population-level economy's perspective, it may
appear to be a random noise in the system and hence, we will not include network topology in our
modeling and analysis. Nonetheless, our model lays down the foundation for future work and
enhancement in this area.
Beyond Cryptocurrencies
Even though the problem that we are solving stems from designing cryptoeconomic network,
there are many parallels and similarities between designing the rules to deploy resources in a
blockchain network and allocating resources to build a network economy with venture capital.
After all, the generous block rewards subsidizing a new token economy is very similar to the
subsidies for new platform businesses provided by venture capital money, like Airbnb, Uber, and
Lime. Perhaps they know how to allocate resources and design incentives to achieve system-level
objectives for their networked economy.
From an economic research perspective, our approach has well addressed the Lucas critique in
macroeconomics. Lucas critique argues that it is naive to solely rely on past data and correlation
and neglect fundamental micro-foundations in designing economic policies and making economic
decisions [18]. It is worth noting that our approach to engineering economies address this critique
head-on. We start from agent-level incentives and policies with the system state as an input. We
will then run simulation with state updates to help further refine the agent policies and shed light
on system level decisions. This combination of microeconomic incentives and macroeconomic
outcome connected through networked system dynamics underpins the robustness of our model
and approach.
Model Setup
To facilitate proper design and engineering of a token economy, we need to first define its
internal states and transition dynamics. First of all, let us first define a token economy and how it
might be different from a traditional platform economy despite their similarities. Next, we will
highlight the assumptions that we will be using in our model. Lastly, we will define the minimal
set of internal states and their dynamics.
Traditional networked economies have been characterized by a centralized platform where users
and producers can exchange services on this platform. The value of such a platform is often
considered to be proportional to the square of the number of active users by Metcalfe's Law [19].
While Bitcoin and other dominant blockchain platforms today have been criticized for their high
energy usage and wasteful computation with its Proof of Work, there are new token economies
introducing new models where the work done by miners can be useful and dubbed Proof of
Useful Work. The work that miners have done is both useful to the users and useful in
maintaining consensus and network security. New networked economies such as incentivized
peer-to-peer file storage network and video streaming network are just two promising examples
[20, 21].
For most of these token economies, platform providers and service producers are tightly coupled
even though they have plans to allow for third-party providers on their network to provide
differentiated services. Apart from that, there are protocol designers and organizations designing
state update mechanisms and policies within the system but not actively participating in the
economy. As such, in our models below, we will combine platform providers and service
producers into miners and we will put ourselves in the shoes of protocol designers with design
freedom over state update mechanisms.
Model Assumptions
To help formulate the model for a token economy, we will first define the assumptions that we
are making. After all, the quality of a model is only as good as its assumptions.
Assumption 1:
The model considers each miner and user homogeneous with unit service capacity similar
to work in mean field games [22]. A large miner in real life will just be an aggregation of many
unit miners in the model. Similarly, a user with a lot of demand will be a combination of many
unit users. Each unit miner and unit user supply and demand one unit of service which is defined
by the users of the model. This abstracts away individual idiosyncratic demand and supply from
users and miners. Each user demands one unit of service and each miner can only provide one.
Assumption 2:
We assume a perfectly competitive market where miners are users are both price takers,
given the open nature of a token economy [23]. Users will consume inversely proportional the
unit price of service denominated in fiat currency. Similarly for miners, if mining is very
profitable, miners will provide as much service as possible to earn block rewards. Furthermore,
we assume the service that miners provide is a commodity, meaning that it does not matter who
produces the unit service. This is in alignment with the assumption of a perfectly competitive
market where products are homogeneous with no differentiation [24].
Model Scope
With these assumptions in mind, we can create a state-space representation of the system. We aim
to define the minimal set of internal states that can capture different aspects of the system. The
system can pause and restart any time if we keep track of all the state variables. We will also
define TOKEN, or TOK in short, as the native cryptocurrency to the network. There are two
subsystems within our token economy. The first is with regard to the flow of TOK and the second
is related to the service provided on the network. The two subsystems are connected with three
important signals, miner's profitability, price of service on the platform, and the price of the token
itself. We also assume a discrete time system and states are only updated after a new block is
produced. Note that it can also be extended into an event-based discrete time system.
If we first look at where TOKs are held, they can be in the hands of miners, users, and a liquid
pool. We are calling them TOK miner, TOK user, and TOK liquid. In many cases, miners are
required to pose a collateral requirement in TOK to participate in the network and block rewards
are minted directly to miners' account [25]. Miners allocate a portion of their TOK to participate
in the mining process to earn more block rewards and may sell some of them to the liquid pool
when the price is high. Similarly, users buy TOKs from the liquid pool to purchase service from
miners or they can speculate and trade in the market. Here, we can encode different user and
miner population profiles in which they have different strategies and thresholds with regard to
trading TOK [26]. The flow of TOK among different holding parties within the system can be
illustrated with Figure 2 below.
Figure 2. Flow diagram of TOK holdings.
The change in total TOK owned by miners is constantly affected by the inflow of block rewards
and transaction fee paid by the users. Depending on the price of TOK at t, miner population will
sell a fraction of its share of TOK to the liquid market. Similarly for users, rational users may
hoard TOK when the price is low and attempt to sell them when the price is high. Users who are
using the service on demand will purchase TOK when the service price is attractive and users will
have to pay for a transaction fee when service is consumed. Miners and users buy from and sell to
the liquid market which represents the total tradeable TOK available in the market.
Fundamentally, network mints TOK in exchange for the service that miners provide, even though
in an inflationary way.
Given our efficient market assumption, we have decided to leave out the modeling of TOK
holdings entirely. For one, it is one subsystem in and of itself with its own dynamics about price
movement relative to the amount of TOK in the liquid pool and trading activities. In addition,
with the efficient market assumption, we can assume that all the trading volume and liquidity has
been embedded in the price. After all, both miners and users are just price takers. Lastly, within
TOK user, there is also a group of speculative investors with a different set of dynamics. The
dynamics of speculative investors catalyzing technological innovation is a very interesting topic
but yet another subsystem that can be built as an extension to our model.
Figure 3. Feedback mechanism in a token economy.
Figure 3 presents a more complete picture of feedback mechanism in a token economy. There are
two main subsystems, one with the flow in TOK holdings and the other with the network service
provided. The efficient market assumption allows us to treat price of TOK as a signal that
encapsulates the flow in TOK holdings. Any attempts to take flows in TOK holdings into account
at this point will over-complicate the model and introduce arbitrary dynamics. Nonetheless, it is
worth considering and building a subsystem on top of that as an extension to our current model.
Hence, the scope of our model is restricted to an efficient token economy where miners and users
provide and consume commodity services on the platform as price takers.
State Variables
Given the above scope and assumptions, we will now define state variables for the token
economy system that we would like to study.
S(t): supply of unit service at time t
D(t): demand of unit service at time t
Q(t): transacted service at time t
P(t): price of a unit service at time t
R(t): miner profitability at time t
TOK(t): price of a TOK at time t
B(t): block rewards released at time t
C(t): cost of unit service at time t
There are also intermediary variables are relevant in state updates.
ΔS(t): arrival of new unit service supply at time t
ΔD(t): arrival of new unit service demand at time t
V(t): TOK earned per unit fiat invested in the system at time t
1/V(t): intrinsic value of TOK at time t
U(t): speculative value of TOK at time t
W(t): amount of TOK left in block rewards pool at time t
M(t): total amount of tokens that has been released as block rewards by time t
KPI(t): index on the network's progress to achieve its goal at time t
It is also worth noting that the price of TOK is not just dependent on the internal states of the
system as TOK is openly traded on secondary markets from day one. Price of TOK will have
significant impact on agent incentives within the network. It is also subject to influences from
secondary market dynamics, speculation, and sentiments that may or may not correlate with the
actual activity on the network itself.
System Dynamics
We will first model supply and demand as an arrival-departure stochastic dynamical system.
Miner profitability and unit service price are the two driving signals for two main feedback loops
in the systems. Miner profitability represents how much the network is going to pay for the
service that miners provide. A high miner profit will bring in more miners and supply of service.
Similarly, unit service price represents how much the network is willing to accept in exchange for
the service capacity it provides. When mining is extremely profitable, we can expect service price
to be small and supply outweighs demand. A low unit service price will bring in more users and
more service demand.
Hence, we are modeling the arrivals of new service supplied and new service demanded as two
Poisson processes.
ΔS(t) ~ Po(𝛌s(t))
ΔD(t) ~ Po(𝛌d(t))
The mean of two Poisson processes are dependent on the unit service price and miner
profitability. More concretely, 𝛌s(t) should expand when mining is very profitable and contract
when it is less so. Similarly, 𝛌d(t) will expand when the price of a unit service is low and contract
when the price of a unit service is high.
𝛌s(t) ~ 𝛌s(t-1) × (R(t) / R(t-1) )
𝛌d(t) ~ 𝛌d(t-1) × (P(t-1) / P(t))
We further define two constants as the departure rates for service supplied and demanded.
Xs: departure of unit service supply at every time step
Xd: departure of unit service demand at every time step
Having these two constants simplifies the dynamics without losing much of its meaning. In the
case where supply is increasing quickly, we can consider service departure as departing and then
immediately arriving again. This can be accounted for by a very positive ΔS(t). The same can be
said about departure in demand.
S(t) = S(t-1) + ΔS(t) - Xs
D(t) = D(t-1) + ΔD(t) - Xd
From S(t) and D(t), we can define P(t) and Q(t), which are the price of service and the amount of
service consumed and transacted in every round.
P(t) ~ D(t) / S(t)
Given our efficient market assumption, price is simply set by relative strength in demand and
supply. When demand is greater than supply, a higher price is expected and vice versa. This price
model, despite being very simple, captures much of the dynamics in the system. It can be further
expanded to include momentum, user valuation, and other factors that will affect service price.
Q(t) ~ min(D(t), S(t))
Q(t) is the amount of service transacted on the network at time t. It is at most the minimum
between net new demand and supply. After all, no transactions will take place with unmet
demand or supply. This can be made more realistic with a slippage later since not all matching
supply and demand can find each other in the market. Nonetheless, this has been taken care of by
the efficient market assumption.
We can now define the dynamics for the cost of providing a unit service, miner profitability, and
price of TOK in our system.
We will first model C(t) as a stochastic process that is noisy but it is neither diverging or
converging, similar to sampling from a normal distribution with momentum.
C(t) = 𝛼C(t-1) + (1-𝛼)N(𝝁, 𝝈)
Then, we can define a signal V(t) which is the revenue per unit spend signal for miners from all
the aforementioned state variables.
V(t) ~ (P(t) × Q(t) + B(t)) / (C(t) × Q(t))
P(t) × Q(t) is how much miners earn from providing the service in terms of TOK and B(t) is the
subsidy that the network provides in TOK at time t. This represents how much tokens are miner
earning for the service they provide. Multiplying V(t) which is in TOK/FIAT by the price of
token at time t, TOK(t), we get miner profitability in a unitless denomination. The system also
cares about the inverse of V(t), which is 1/V(t). This represents the intrinsic value of the token as
it measures the value of service provided per unit of token in FIAT/TOK.
R(t) = V(t) × TOK(t)
However, determining TOK(t) is not easy. The secondary market price is a speculative estimator
of future 1/V(t). Market decouples from current state of 1/V(t), because speculation is estimating
future 1/V(t) in an effort to create returns. Hence, it makes sense to model price of TOK as a
convex combination of its intrinsic and speculative value. This is in line with the general asset
pricing framework that the price of an asset can be attributed to its fundamental and speculative
value [27, 28, 29]. Speculative value U(t) captures momentum in price movement with a naive
projection. In the equation below, 𝛄 is treated as a constant but it can also be a randomized value
that can randomize the composition of the mixture model.
TOK(t) = 𝛄 × (1 / V(t)) + (1 - 𝛄) × U(t)
Lastly, TOK issued in block rewards is usually set by a predetermined release schedule that
follows an exponential decay rate. However, we can consider a more abstract and generalized
version of block rewards issuance by introducing the concept of a KPI(t). Most traditional
exponential decay block rewards scheme with a pre-determined release schedule is effectively
treating the block time as the KPI. However, if we define the release of block reward as a
function of the rate of change in achieving the KPI, we can then create direct incentives based on
what the network desires.
M(t) = B(i): total amount of tokens that has been released as block rewards by time t
W(t) = W(0) - B(i) = W(0) - M(t - 1): amount of TOK left in block rewards reserve
ΔKPI(t) = KPI(t) / KPI(t-1): change in KPI
B(t) ~ 𝛆 × ΔKPI(t - 1) × W(t - 1)
t−1
∑
i=0
t
∑
i=0
Subsidy can be given out as a function of the change in KPI(t) and the amount of TOK left in the
rewards pool. This set of subsidies {B(0), B(1), B(2), ..., B(t)} can be the set of control policies
that protocol designers can control to bootstrap the network to some target with some initial
capital. This KPI can be as simple as the cumulative service transacted on the network over some
period of time. Figure 4 below summarizes the system dynamics outlined above.
Figure 4. System dynamics at every round of update.
Simulation and Evaluation
We are leveraging a tool, cadCAD, which stands for Computer Aided Design of Complex
Agent-based Decision System, developed by Dr Zargham and his team at BlockScience. It is a
Python differential game engine that assists in the process of designing, testing, and validating
complex systems through simulation. We have encoded the dynamics of different agents and
subsystems in every discrete time step into the system.
To facilitate evaluation, we want to outline a few metrics that we can use to define the success of
our network. As a token-enabled platform economy, we would first want the platform to grow in
adoption and in the underlying value of the token. In other words, we want Q(t), V(t), and
TOK(t) to grow over time. We will also look at the distribution over the total aggregated growth
of Q(t) in our model. In addition, we want a relatively low volatility in the price of the service
provided P(t) × TOK(t) and hence we will look at the variance which is its mean squared error
from its mean as a volatility metric. Too volatile a unit service price may render the platform
service less attractive to potential users.
We will first come up with a baseline simulation in which the release of block rewards follows a
traditional exponential decay with a predetermined half-life on a similar normalized scale to
Bitcoin. We will then run Monte Carlo simulations for the baseline setup and plot summary
statistics of the metrics that we care about. Next, we will experiment with different block rewards
subsidy regime to show that it can engineered to improve macroeconomic outcomes.
Baseline Simulation
As a baseline simulation, we are treating timestep as the KPI of the system. The concept of a KPI
that the system is tracking can be applied to the timestep itself, demonstrating the generality of
our model. The most common policy for block rewards is a halving schedule where the block
rewards half after some period of time. Our baseline model will adopt a continuous exponential
decay as the block reward release schedule, treating timestep as the KPI. To determine what is a
good decay rate, we are looking at Bitcoin as the benchmark for our generalized token TOK. Note
that almost every cryptocurrency follows a different schedule. Even in the case of Bitcoin, its
block reward release function follows a step decay function with a halving period of 4 years,
introducing arbitrary shocks into the system [30]. Hence, the goal for this comparison is to
determine a comparable scale for the block reward schedule, rather than fitting for an estimate.
Instead of simulating on the block by block level, we chose to simulate on a weekly basis. A
week-by-week level makes it high-level enough to reason about the numbers and granular enough
to experiment with policy changes.
Currenc
y
BTC
TOK
Total Supply Initial Block Reward (weekly) Half Life (weeks)
21,000,000
50,400
10,000,000
26,624
208 (4 years)
260 (5 years)
Table 1. BTC and TOK release schedule comparison.
The decay rate can be back-calculated with the following formula derived from the sum of a
geometric series.
T
otal Supply
=
Initial Block Reward
1 − Decay Rate
1
2
Initial Block Reward
=
Initial Block Reward
× D
D
ecay Rate
Half Life = 2
1
ecay Rate
Half Life
Hence, the initial block reward is 26624.00 and the decay rate should be 0.99734. We will run
Monte Carlo simulations for 100 times for each configuration for 1040 weeks or 20 years to
evaluate the model. For the baseline simulation, here is the block rewards release chart.
Figure 5. Baseline model open-loop deterministic block rewards B(t).
Next, we would like to define the following metrics that we care about as a system.
1. Growth trajectory in 1/V(t) of unit FIAT/TOK.
2. High aggregated growth in Q(t) which measures the usage of the system and
3. Low variance on P(t) × TOK(t) as the price of the service in fiat unit.
approximates network value.
The following are the charts and statistics of a particular simulation of the baseline model over
100 Monte Carlo runs.
(a)
(b)
Figure 6. (a) Summary statistics and (b) distribution of 1/V(t)
over 100 Monte Carlo runs for baseline simulation.
(a)
(b)
Figure 7. (a) Summary statistics of TOK(t) and (b) bivariate distribution of log(TOK(t)) and
1/V(t)
over 100 Monte Carlo runs for baseline simulation.
As we can see from Figure 6(a) and Figure 7(a), 1/V(t) grows linearly and steadily whereas the
token price on secondary market has increased exponentially. The mean token prices is at about a
20-time multiple of the mean intrinsic value, suggesting that the token price is largely driven by
speculative value. This is further confirmed by the joint distribution of log(TOK(t)) and 1/V(t) in
Figure 7(b). The log of TOK(t) is highly correlated with 1/V(t), especially so when the network
has gained some intrinsic value so that speculators have something to speculate on.
However, the growth of the intrinsic value slows down rather quickly, as seen in Figure 6(a),
while the token prices continue to grow in Figure 7(a). This can be attributed to how the
secondary market prices are modeled in our system. It can also be explained by how secondary
market is not trying to track intrinsic value but trying to track how much people consider the
token to be worth in the future. This is rather common in the world of markets and finance where
one hope to estimate the distribution and evolution of strategies by all players in the market.
Figure 8. TOK movement for the first 5 Monte Carlo runs for baseline simulation.
A sanity check from Figure 8 shows that our price simulation which is primarily a Brownian
motion with drift is largely in line with movement in cryptocurrency prices, especially in Run 3.
(a)
(b)
Figure 9. (a) Aggregated growth in Q(t) (b) pairwise distribution of growth in Q(t) over different
time durations over 100 Monte Carlo runs for baseline simulation.
In Figure 9(a), we look at the aggregated growth in Q(t) which is the cumulative growth in
transaction volume of the platform and we want to shift the overall distribution towards the right
as much as possible. In Figure 9(b), we plot pairwise distribution of time averages of growth in
Q(t). We observed that the average growth rate across 10 timesteps is still highly correlated with
the average growth rate across 20 and 30 timesteps. This makes sense because, after all, they
share the same underlying data and short-term price movements tend to have higher correlation
with each other. However, this correlation falls apart as the duration window increases, indicating
that the system is not time-invariant. This is interpreted as a result of non-ergodicity because if
the system is indeed ergodic, we should expect invariance on the temporal dimension. Since it is
not observed, we infer that there is some element of non-ergodicity. Note that there is a clear
upward trend structure in Figure 9(b), this can be explained by how the simulation is set up and
Q(t) always increases with new arrivals of S(t) and D(t). We can inject more entropy into the
system by changing the initial values, arrival, and departure rates.
This is an important result to acknowledge because most economic systems and human activities
are non-ergodic in nature whereas many Markovian systems and simulations are implicitly
ergodic. Non-ergodicity means that the ensemble average across different parallel universes is
independent of the time average of a particular trajectory of an individual. This is important
because even if we can derive properties successfully from an ensemble average, there are no
guarantees that a particular network economy's trajectory will be successful [31]. It will be
interesting to further understand what contributes to the non-ergodicity in our system in future
studies.
Figure 10. Summary of P(t) over 100 Monte Carlo runs for baseline simulation in fiat currency.
Figure 10 shows the movement of service price in fiat terms with a variance of 10.43 and a mean
of 3.55. A steady and relatively low service price is desirable property that the network would
like to pursue. Nonetheless, what is a low price for unit service depends on what the unit service
itself is and it is up to the users to define.
Speculative Price Influence
The price of the token has been the bridge between the token economy and the rest of the world
economy. It is therefore interesting to look at the impact of price movement on system-level
objectives and behavior. In addition, cryptocurrencies have always been notorious for their price
volatility and speculative behaviors.
Speculative TOK prices play a dominant role in the R(t) which is the profitability level for
miners. This will in turn have an impact on the supply of the service S(t) which will further
impact service price P(t) and service transacted Q(t). As a result, the higher the TOK prices, the
greater the miner profitability, the higher the service supply, and the lower the service price. A
cheaper service price creates greater service demand D(t) that consumes the service supply S(t),
leading to greater service transacted and hence even more profits for miners, creating a positive
feedback loop as illustrated in Figure 11 below.
Figure 11. Positive feedback loop within token economy.
We now perform the following experiments with another 100 Monte Carlo simulations each at
different upward drift in terms of TOK prices. In the baseline model, there is a 55% probability
drift that TOK price will move up. We ran two separate experiments with 58% and 52%
respectively.
(a) (b)
Figure 12. (a) Summary charts of high speculative value scenario
(b) summary charts of low speculative value scenario.
As we can see from Figure 12(a), a greater upward drift results in much higher TOK prices and a
rightward shift in the distribution of aggregated growth in Q(t) with a mean of 133x. However, it also
results in a much higher unit service price in fiat denomination with a variance of 283.96 and a mean of
10.24. This is very much the case in Bitcoin when the transaction fee in fiat terms became too high as the price
of Bitcoin went above $10,000. In contrast, in Figure 12(b) where there is not much speculation going on in
TOK prices. We observe a leftward shift in the distribution of aggregated growth in Q(t) with a mean of 60x
and much lower TOK prices. Nonetheless, the unit service price is much lower in fiat currency with a smaller
variance of 0.176. Note also that the intrinsic value of the token is also much higher with higher speculation, as
speculation leads to a larger network with a higher level of activity as described in the positive feedback loop
above.
As much as people criticized cryptocurrencies for their insane volatility, our simulation shows that consistent
speculation can be a great way to seed a network. Fundamentally speaking, the existence of a token seeded the
network with a community of stakeholders whose incentives are aligned to help the network grow and the
token appreciate in value. Such an advantage is not present in most traditional ventures.
We have attempted to pull real world data from decentralized networks. However, the data quality is rather
poor with no simple ways to ingest and query. In addition, the notion of a unit service that the network
provides is not well defined. For instance, Ethereum is providing distributed computation as a service but the
unit of computation is not well defined on the network level. This is important for token economies to scale
beyond the circle of hobbyists to allow for proper business forecasting, demand projection, and large-scale
adoption. Nonetheless, the assumption of a user-defined unit service enables us to abstract away the exact
value of supply and demand and instead focuses on the system dynamics.
Engineering Block Rewards
On a high level, we want a token economy where its native token continues to appreciate in intrinsic
value, its service provided is highly demanded, and its service is transacted at a relatively stable price
even in fiat denomination. The variable B(t), the block rewards at time t, plays a very important role. A
high B(t) represents a high subsidy that the network provides to subsidize its formation. However, it is
also an inflationary force that dilutes the intrinsic value of the token. Nonetheless, B(t) is a big part of
miner profitability R(t) that will impact the service supply. Hence, we want to engineer B(t) such that it
gives out more block reward when the intrinsic value is decreasing. We now attempt to engineer a series
of block rewards that keep track of the system performance in 1/V(t) with a series of B(t) that follows the
following update equation,
B
(t)
~ V (t)
V (t−1) × B(t−1)
W (t−1) × W
(t)
In other words, B(t) as a fraction of the remaining block rewards, W(t), increases when the intrinsic value
1/V(t) decreases and hence maintaining a driving force on 1/V(t). Given our new block rewards function,
we will now perform 100 Monte Carlo runs with the same initial block rewards and speculative level as
the baseline model.
Figure 13. Block rewards over 100 Monte Carlo runs for V_inverse targeted model .
Figure 14. Summary of 1/V(t) over 100 Monte Carlo runs for V_inverse targeted simulation.
Note that in Figure 13, there is a sharp drop to zero for block rewards. That occurs when the allocated
block rewards reserve W(t) gets depleted. In Figure 14, the terminal intrinsic value did not significantly
outperform that in our baseline model. This can be attributed to two factors. One, the block rewards might
have been depleted in later stages and its impact on value has reduced. Two, as Q(t) grows, the intrinsic
value is largely dominated by C(t)/P(t). However, it is worth noting that 1/V(t) rose very sharply early in
the network. The following table shows the time taken for the token value to reach certain milestones.
V_inverse Value
Baseline Model
0.5
28 weeks
V_inverse targeted Model
9 weeks
0.75
177 weeks
125 weeks
1.00
529 weeks
504 weeks
Table 2. Time taken for network to reach V_inverse milestones.
After 100 Monte Carlo runs on each of our models, it takes about one third of the time for the intrinsic
value to hit 0.5 and one year in advance for the metric to hit 0.75. As the network progresses, block
rewards get depleted and Q(t) becomes the dominant factor and hence the advantage of a targeted model
becomes less obvious. A more accurate model of intrinsic value will have to capture the network effect
value of the system but that is beyond the scope of the thesis.
We then attempted to run experiments that target the growth of R(t) in a similar way but given the
volatility of TOK(t) as an input to R(t), block rewards get depleted quickly and fail to lead to interesting
results.
Future Directions
A reasonable, robust, and informative model of the token economy can serve as the springboard to answer
more important questions that are of interest to users, miners, investors, and protocol designers. The
mathematical constructs developed and examined in this paper pave the way for more complex system
and network analyses. In classical control engineering language, we are designing a useful model of a
plant in this paper, that is a representation of a token economy in which the network pays miners in tokens
to provide for a service of interest to consumers. We will now discuss future directions that our thesis can
lead to and outline their respective challenges.
Network Effect as a Positive Externality
Network effect can be loosely defined as the positive externality of a user to a platform economy when
the user joins the network. Given the presence of network effect, the value of a product or platform
increases with every additional user. Metcalfe's Law states that the value of a telecommunication network
is proportional to the square of the number of users in the network. With our current set up, we consider
the intrinsic value of the token as how much fiat money people are willing to put in exchange for the
token. However, we do not capture the network effect that these token economy may achieve when it
reaches a certain scale. After all, the holy grail of the most wildly successful ventures and platform
economies is no doubt network effect. We would even argue that the ultimate goal of block reward
subsidies is to bootstrap the network to a state in which strong network effect has been achieved.
Network effects in the context of traditional venture backed startups are straightforward to understand. It
is also quite similar in token economies and cryptocurrencies. Every additional person believing in the
value of Bitcoin will make Bitcoin more valuable because other users can now exchange goods and
services with this person in Bitcoin. Similarly for Ethereum as another case in point, every additional user
of decentralized applications will make Ethereum as the underlying computation platform and token more
valuable.
The general heuristic for network effect is that users create more users, consumptions create
consumptions, and capacity creates more capacity. We can potentially define an awareness vector that
captures the awareness, sentiment, and perception of the network as a hidden state of the system. Changes
in token price, user activity, media announcements, and so on will create a percentage change to this
vector and the awareness vector will result in a faster adoption of the network. However, the modeling of
network effect is another model in and of itself and hence we are not covering it in this thesis.
Lyapunov Argument with Energy Field
Lyapunov argument is often used to provide guarantee on system stability around a subspace of attraction
[32, 33]. If there is a maximum (or minimum) in an energy field and system energy is guaranteed to go up
(or down) by at least a constant at every timestep, the system is bound to converge to the maximum (or
the minimum). We have attempted to apply some of this concept into our system modeling. However, this
will involve coming up with new energy field that may lose generality and breadth of application for our
model since Lyapunov argument often only applies on a case-by-case basis.
The general stability guarantee provided by Lyapunov arguments means that in a closed-loop system, the
system converges to a low energy state. An additional layer to that is input-output stability which is more
robust in the sense that a system is only stable to the extent that a threshold amount of energy is injected
into the system. Otherwise, the system remains stable and converges to a ball in space. The only way to
move up to a higher energy level is through agents injecting energy into the system. How much energy
injection is required to move the system into a certain energy state depends on the energy function of the
system, which can be made to be a Lyapunov one. For someone to attack a cryptoeconomic system,
Lyapunov stability enables us to encode the energy of the system and compute how much resources in fiat
currency unit are required to move the system out of its stability. For instance, we can compute the
amount of capital expenditure required to increase the energy of the system by 1% and the system can be
designed to be insensitive to massive energy injection from agents. Such an argument is more robust than
the economic stability arguments that are currently made in the decentralized economy ecosystem which
often only focus on the cost to attack a system at some point in time without taking the temporal dynamics
of the system into account.
Optimal Agent Strategy
Another interesting angle to further this research is through the lens of an agent. Given the states and
dynamics of the system, we hope to understand and compute the optimal strategies for a population of
agents. We can define the following objective function for each agent i. Note that each agent i can also
represent a subpopulation of agents with a similar profile.
m
ax J
i = U i
(σ , X)
i
− L i
(S , D , X)
i
U i
is a concave personal utility function of agent i with
where
, supply side actions,
global observable system states, as inputs. Given the actions taken by the agent,
and
, demand side actions, and the global state X, a cost is incurred as determined by the cost function
L. This formulation is heavily inspired by literature in optimal control theory with infinite time horizon
, agent's private beliefs, and X, the
Di
σi
Si
[34]. As a control problem on infinite time horizon, discount on future utility has been accounted for by
the utility function. Note that if one can properly define a terminating condition, such as achieving some
definition of network effect, the above objective can be transformed to one that heavily rewards terminal
utility and penalizes for the path taken to get there. It then becomes very similar to the strategy and
optimization suggested in differential game literature [2].
Conclusion
This thesis presents a methodology to model and simulate a generalized token economy in which the
platform pays miners for a unit service provided in cryptocurrency. The market is assumed to be perfectly
competitive with miners and users transacting a unit commodity service. To simulate the evolution of the
system, we have defined a stochastic dynamical system and run Monte Carlo simulations to observe for
system level behaviors and properties. Modifications to the model has been made to understand
speculative price influence and explore the possibility of engineering block rewards for a specific
property. Contrary to popular belief, token speculation on secondary market turns out to be beneficial to
the network growth as it kicks start a positive feedback loop in adoption. Engineering block rewards to
track token value also turns out to be viable but its impact will be better understood if we can include
network value in modeling the value of the token. This thesis has been the first attempt to turn high level
business narratives in cryptocurrency into observable and controllable simulation and experiment. We
presented a framework and study on a generalized token economy that can be applied and extended easily
to other more complex systems, turning the design of token economies from an art to a science.
Bibliography
2018.
HD30. 2 S7835 2000. 2000.
2 (2001): 331-341.
1. Nisan, Noam, Tim Roughgarden, Eva Tardos, and Vijay V. Vazirani, eds. Algorithmic game
theory. Cambridge university press, 2007.
Isaacs, Rufus. Differential games: a mathematical theory with applications to warfare and
2.
pursuit, control and optimization. Courier Corporation, 1999.
3. Marden, Jason R. "State based potential games." Automatica 48, no. 12 (2012): 3075-3088.
4. Marden, Jason R., and Jeff S. Shamma. "Game theory and distributed control." In Handbook of
game theory with economic applications, vol. 4, pp. 861-899. Elsevier, 2015.
5. Gopalakrishnan, Ragavendran, Jason R. Marden, and Adam Wierman. "An architectural view of
game theoretic control." ACM SIGMETRICS Performance Evaluation Review 38, no. 3 (2011):
31-36.
6. Peters, Ole, and Alexander Adamou. Ergodicity Economics. London Mathematical Laboratory,
7. Sterman, John D. Business dynamics: systems thinking and modeling for a complex world. No.
8. Dockner, Engelbert J., Steffen Jorgensen, Ngo Van Long, and Gerhard Sorger. Differential games
in economics and management science. Cambridge University Press, 2000.
9. Zargham, Michael, Zixuan Zhang, and Victor Preciado. "A State-Space Modeling Framework for
Engineering Blockchain-Enabled Economic Systems." arXiv preprint arXiv:1807.00955 (2018).
10. Franklin, Gene F., J. David Powell, Abbas Emami-Naeini, and J. David Powell. Feedback control
of dynamic systems. Vol. 3. Reading, MA: Addison-Wesley, 1994.
11. Antsaklis, Panos J., and Anthony N. Michel. Linear systems. Springer Science & Business Media,
2006.
12. Watts, Alison. "A dynamic model of network formation." Games and Economic Behavior 34, no.
13. Jackson, Matthew O. "A survey of network formation models: stability and efficiency." Group
14. Nowzari, Cameron, Victor M. Preciado, and George J. Pappas. "Analysis and control of
formation in economics: Networks, clubs, and coalitions 664 (2005): 11-49.
epidemics: A survey of spreading processes on complex networks." IEEE Control Systems
Magazine 36, no. 1 (2016): 26-46.
15. Preciado, Victor M., Michael Zargham, Chinwendu Enyioha, Ali Jadbabaie, and George Pappas.
"Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks." In 52nd IEEE
conference on decision and control, pp. 7486-7491. IEEE, 2013.
Communications of the ACM 61, no. 7 (2018): 95-102.
Rosenschein. "Bitcoin mining pools: A cooperative game theoretic analysis." In Proceedings of
the 2015 International Conference on Autonomous Agents and Multiagent Systems, pp. 919-927.
International Foundation for Autonomous Agents and Multiagent Systems, 2015.
16. Eyal, Ittay, and Emin Gün Sirer. "Majority is not enough: Bitcoin mining is vulnerable."
17. Lewenberg, Yoad, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S.
18. Ericsson, Neil R., and John S. Irons. "The lucas critique in practice." In Macroeconometrics, pp.
19. Zhang, Xing-Zhou, Jing-Jie Liu, and Zhi-Wei Xu. "Tencent and Facebook data validate
263-324. Springer, Dordrecht, 1995.
Metcalfe's Law." Journal of Computer Science and Technology 30, no. 2 (2015): 246-251.
20. Petkanic, D., and E. Tang. "Livepeer Whitepaper: Protocol and Economic Incentives for a
Decentralized Live Video Streaming Network." (2017).
mathematics 2, no. 1 (2007): 229-260.
21. Protocol Labs. "Filecoin: A Decentralized Storage Network." (2017).
22. Lasry, Jean-Michel, and Pierre-Louis Lions. "Mean field games." Japanese journal of
23. Mankiw, N. Gregory. Principles of economics. Cengage Learning, 2014.
24. Hayek, Friedrich A. "The meaning of competition." Individualism and economic order 92 (1948):
25. Saleh, Fahad. "Blockchain without waste: Proof-of-stake." Available at SSRN 3183935 (2019).
26. Paulin, James, Anisoara Calinescu, and Michael Wooldridge. "Agent-based modeling for
98.
complex financial systems." IEEE Intelligent Systems 33, no. 2 (2018): 74-82.
& Finance 23, no. 12 (1999): 1745-1769.
Collected Writings of John Maynard Keynes 7 (1964): 1971-9.
Princeton University Press, 2011.
27. Dimson, Elroy, and Massoud Mussavian. "Three centuries of asset pricing." Journal of Banking
28. Keynes, John Maynard. "The general theory of employment, interest and money (1936)." The
29. Bachelier, Louis. Louis Bachelier's theory of speculation: the origins of modern finance.
30. Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." (2008).
31. Peters, Ole. "Optimal leverage from non-ergodicity." Quantitative Finance 11, no. 11 (2011):
32. Araujo, Ricardo Azevedo, and Helmar Nunes Moreira. "Lyapunov stability in an evolutionary
1593-1602.
33. Lechevin, N., and C. A. Rabbath. "Lyapunov-based nonlinear missile guidance." Journal of
34. Bertsekas, Dimitri P., Dimitri P. Bertsekas, Dimitri P. Bertsekas, and Dimitri P. Bertsekas.
game theory model of the labour market." EconomiA 15, no. 1 (2014): 41-53.
guidance, control, and dynamics 27, no. 6 (2004): 1096-1102.
Dynamic programming and optimal control. Vol. 1, no. 2. Belmont, MA: Athena scientific, 1995.
|
1702.03466 | 1 | 1702 | 2017-02-11T22:56:22 | Safe Open-Loop Strategies for Handling Intermittent Communications in Multi-Robot Systems | [
"cs.MA",
"cs.RO"
] | In multi-robot systems where a central decision maker is specifying the movement of each individual robot, a communication failure can severely impair the performance of the system. This paper develops a motion strategy that allows robots to safely handle critical communication failures for such multi-robot architectures. For each robot, the proposed algorithm computes a time horizon over which collisions with other robots are guaranteed not to occur. These safe time horizons are included in the commands being transmitted to the individual robots. In the event of a communication failure, the robots execute the last received velocity commands for the corresponding safe time horizons leading to a provably safe open-loop motion strategy. The resulting algorithm is computationally effective and is agnostic to the task that the robots are performing. The efficacy of the strategy is verified in simulation as well as on a team of differential-drive mobile robots. | cs.MA | cs | Safe Open-Loop Strategies for Handling Intermittent Communications
in Multi-Robot Systems*
Siddharth Mayya1 and Magnus Egerstedt2
7
1
0
2
b
e
F
1
1
]
A
M
.
s
c
[
1
v
6
6
4
3
0
.
2
0
7
1
:
v
i
X
r
a
Abstract -- In multi-robot systems where a central decision
maker is specifying the movement of each individual robot, a
communication failure can severely impair the performance
of the system. This paper develops a motion strategy that
allows robots to safely handle critical communication failures
for such multi-robot architectures. For each robot, the proposed
algorithm computes a time horizon over which collisions with
other robots are guaranteed not to occur. These safe time
horizons are included in the commands being transmitted to
the individual robots. In the event of a communication failure,
the robots execute the last received velocity commands for
the corresponding safe time horizons leading to a provably
safe open-loop motion strategy. The resulting algorithm is
computationally effective and is agnostic to the task that the
robots are performing. The efficacy of the strategy is verified
in simulation as well as on a team of differential-drive mobile
robots.
I. INTRODUCTION
Multi-robot systems have reached a point of maturity
where they are beginning to be deployed in real-world
scenarios (see e.g., the special issue [10] and constituent
papers [1], [17]). Such deployments of robot teams often
require a signal exchange network, typically in the form of a
wireless communication channel. Communication is not only
essential for sharing sensor measurements and performing
diagnostics, it is often an integral part of the closed loop
control mechanism [3], [11]. In fact, in many applications
and scenarios such as extra-terrestrial exploration [21], high
precision manufacturing [5], and multi-robot testbeds [14],
the robots frequently rely on communicating with a central-
ized decision maker for their velocity or position commands.
In such situations, a failure in the communication network
can severely hinder the motion of the robots and performance
of the algorithm. This is the premise behind the work per-
formed in this paper, whereby the adverse effects caused by
intermittently failing communication networks are mitigated.
As deployment conditions for multi-robot systems become
increasingly harsh, occasional failures in wireless communi-
cation channels are both expected and inevitable [15]. This
raises the following question: What should a robot do in case
a communication failure prevents it from receiving critical
motion commands from a central decision maker?
*This research was sponsored by Grant No. 1544332 from the U.S.
National Science Foundation
1Siddharth Mayya is with the School of Electrical and Computer
Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA
[email protected]
2Magnus Egerstedt is a professor at the School of Electrical and Com-
puter Engineering, Georgia Institute of Technology, Atlanta, GA 30332,
USA [email protected]
Many different techniques have been explored to handle
communication uncertainties in multi-robot teams [2], [13],
[20]. In many cases, the robots are assumed to have signif-
icant decision making capability, have sensors to maneuver
around obstacles, or have knowledge about the positions
of other robots. Furthermore, some developed communica-
tion recovery techniques do not provide formal collision-
avoidance guarantees in case of unforeseen communication
failures.
An existing technique used to handle communication
failures, mentioned in [20], is to stop the robot when critical
data is not received. While this behavior preserves safety, it
could cause the robot to behave erratically. For example, if
only intermittent velocity commands are received, the robot
could move in a jerky "start-stop" fashion. This problem
was observed on the Robotarium: a remote-access multi-
robot testbed being developed at Georgia Tech [14]. The
Robotarium is a multi-robot research platform, and gives
users the flexibility to test any coordination algorithm they
wish. During experiments, it was observed that failures in the
communication channels prevented robots from receiving ve-
locity or position commands which caused them to abruptly
stop moving. This lead to a disruption in the coordination
algorithm being executed, and affected the ability of the
Robotarium to faithfully reproduce the behavior specified by
the user.
Motivated by the need to alleviate such problems in
general, and resolve issues with the Robotarium in particular,
this paper proposes a strategy that allows differential-drive
robots without sensory or decision-making capabilities, to
continue moving safely for a specific amount of time even
when velocity commands from a central decision maker are
not received. For each robot, the central decision maker
computes a time horizon over which collisions with other
robots are guaranteed not to occur. This is called the safe
time horizon. During normal operations, the desired velocity
and the safe time horizon are transmitted to the robots period-
ically. If a robot stops receiving data due to a communication
failure, it executes the last received velocity command for the
duration of the last received safe time horizon. This allows
the robot to continue moving in a provably collision-free
manner despite having no updated information about the
environment. The robot can follow this open-loop trajectory
for the entire duration of the safe time horizon, beyond which
it stops moving.
In order to calculate the safe time horizon, we first
compute the set of all possible locations that can be reached
by a robot within a given time (i.e., the reachable set [6],
[18]). This is followed by computing the time horizon for
which each robot lies outside the reachable set of other
robots. But, for the differential-drive robots considered here,
performing such set-membership tests is computationally
expensive owing to the non-convexity of the reachable set.
Consequently, the reachable set is over-approximated by en-
closing it within an ellipse whose convex structure allows for
simpler set-membership tests and finite representation [12].
By minimizing the area of the ellipse enclosing the convex
hull of the reachable set, we obtain the best ellipsoidal over-
approximation of the reachable set in terms of the accuracy
and effectiveness of set-membership tests.
The outline of this paper is as follows: In Section II, the
structure of the reachable sets of differential-drive robots
is outlined. Section III derives an ellipsoidal approximation
of the reachable set. Section IV formally defines the safe
time horizon, outlines the algorithm used by the robots, and
proves the safety guarantees that it provides. In Section V,
the developed algorithm is first implemented in simulation,
following which, experimental verification is performed on a
team of differential-drive mobile robots. Finally, Section VI
concludes the paper.
II. REACHABILITY ANALYSIS
Consider a dynamical system whose state evolves accord-
ing to the following differential equation,
x = f (x, u), y = h(x), x(0) = x0, u ∈ U,
where x is the state of the system, y represents the output
of the system, u is the control input, and U is the set of
admissible control inputs. The reachable set of outputs at
time t can be defined as
R(t; x0) =
Y(t, x0, u(·)),
(cid:91)
u(·)∈U
where Y(t, x0, u(·)) represents the output of the dynamical
system at time t under control action u(·).
Since the Robotarium [14], in its current form, is populated
with differential-drive mobile robots, this paper investigates
the reachability of two-wheeled differential-drive robots with
non-holonomic dynamics.
For such systems, let z = (x, y) ∈ R2 denote the position
of the robot in the 2D plane, and let φ ∈ [−π, π] denote its
orientation with respect to the horizontal axis. As such, the
robot is described as a point (z, φ) in the configuration space
R2× S1. The motion of the robots can be captured using the
unicycle dynamics model:
x = v cos(φ),
v ≤ 1, ω ≤ 1.
y = v sin(φ),
φ = ω,
(1)
The bounds on the linear velocity v and the angular velocity
ω represent the physical limitations of the robots, and are
normalized to 1 without loss of generality.
Since collisions are ultimately defined by positions rather
than orientations, we consider the output of the system to be
z. Relative to this output, the reachable set R(t; z0, φ0) is
the set of all positions in the 2D plane that can be reached
at time t by a robot starting in the configuration (z0, φ0) at
t = 0. For z0 = (0, 0), φ0 = 0, denote the reachable set as
R(t). Since the dynamics in (1) is drift-free, the structure of
the reachable set does not depend on z0 and φ0, i.e.,
R(t; z0, φ0) = z0 + Πφ0R(t),
where Πφ0 is a rotation by φ0. Therefore, the study of
reachable sets can be restricted to the case when z0 = (0, 0)
and φ0 = 0.
In order to reach the boundary of the reachable set, a robot
must travel in a time-optimal manner [4]. If this was not true,
a point even farther away would be reachable in the same
amount of time. A closely related motion model for which
the structure of time-optimal paths has been extensively
studied is the Reeds-Shepp car [16].
The motion model of a Reeds-Shepp car is similar to (1),
except that the set of admissible inputs is v = 1,ω ≤ 1.
In [19], the authors compute a family of trajectories rich
enough to contain a time-optimal path between any two
configurations for a robot with dynamics given in (1). It
is shown that every trajectory in this family is also time-
optimal for a Reeds-Shepp car, and furthermore, this family
of trajectories is sufficient for time-optimality of a Reeds-
Shepp car. Another way to view this result is that, when
moving in a time-optimal manner, the robot behaves like a
Reeds-Shepp car. As mentioned earlier, any path reaching
the boundary of the reachable set has to be time-optimal.
Therefore, the reachable set for the Reeds-Shepp car and for
the differential-drive robot considered here are identical. By
utilizing expressions for the reachable set of a Reeds-Shepp
car given in [18], Fig. 1 portrays the reachable set for a robot
with dynamics given in (1).
Fig. 1: The reachable set R(t) of a robot with dynamics
given in (1), is depicted for varying time horizons. The robot
is represented as a circle at the center.
The complexity of performing set-membership tests with
respect to the non-convex set R(t) increases the computa-
tional burden associated with the safe time horizon algorithm.
Consequently, the next section derives an ellipsoidal approx-
imation of the reachable set.
III. APPROXIMATING THE REACHABLE SET
Given any convex set K ⊂ Rn, there exists a unique
ellipsoid of minimum volume circumscribing it [9]. This
ellipsoid is denoted as ξ(K). One way to derive an ellipsoidal
approximation of the reachable set would be to compute
the minimum area ellipse ξ(conv(R(t))), where conv(R(t))
denotes the convex hull of R(t). Additionally, the derivation
of analytical expressions for the ellipse ξ(conv(R(t))), if at
all possible, will enable its efficient and fast computation in
the safe time horizon algorithm.
The feasibility of the derivation of analytical expressions
for the ellipses, is closely linked to the symmetry properties
of the underlying set as well as the equations describing it
[7]. Consequently, in order to allow for analytical solutions,
we introduce a new set K(t) enclosing conv(R(t)), which
allows for an easier computation of ξ(K(t)). Essentially, this
enables us to swap the problem of computing ξ(conv(R(t)))
with the simpler problem of computing ξ(K(t)).
Furthermore, this approximation is justified by showing
the dissimilarity between conv(R(t)) and K(t), as
that
measured by the Jaccard distance metric [8], asymptotically
goes to zero over time. For the sets X, Y ⊂ R2, the Jaccard
distance based on the area measure is given by,
dJ (X, Y ) = 1 − A(X ∩ Y )
A(X ∪ Y )
,
where A(·) denotes the area of the set. The following
proposition formally introduces the set K(t).
Proposition 1. Let K(t) be given by,
K(t) =
∈ R2 : (cid:107)p(cid:107)2 ≤ t,
(cid:40)
(cid:20)px
(cid:21)
(cid:26)1 − cos(t),
p =
py
py ≤
if 0 < t ≤ π/2
t − π/2 + 1, if
t > π/2
(cid:41)
.
Since p(t, 0) = (t, 0), this point lies on the circular arc of
radius t. Then, the fact that ∂(cid:107)p(t,ψ)(cid:107)2
≤ 0, implies that, as
ψ increases, the curve either overlaps with the circular arc
of radius t, or gets closer to the origin. This proves that, a
part of the outer boundary of conv(R(t)), represented by the
curve C++(t), can be over-approximated by a circular arc of
radius t. (see Fig. 2). Also, the definition of py(t, ψ) gives
∂ψ
2
Fig. 2: The set conv(R(t)) is shown enclosed within K(t).
In particular, it is illustrated how the curve C++(t), which
represents the curved boundary of conv(R(t)) in the first
quadrant, can be over-approximated by a circular arc of
radius t, which forms the boundary of K(t) in the first
quadrant.
us the y-axis bounds of conv(R(t)):
1 − cos(t),
t − π/2 + 1, if t > π/2
if 0 < t ≤ π/2
ψ∈[0,min(t,π/2)]
py(t, ψ) =
(cid:40)
max
.
Then, conv(R(t)) ⊂ K(t) and
t→∞ dJ (conv(R(t)),K(t)) = 0,
lim
where dJ is the Jaccard distance.
Proof. Denote C++(t) as the curved outer boundary of
conv(R(t)) in the first quadrant (see Fig. 2). From [18],
we know that, C++(t) can be expressed as,
C++(t) =
(cid:26)px = sin ψ + γ cos ψ
p ∈ R2
py = − cos ψ + γ sin ψ + 1
(cid:40)
(cid:41)
++ :
,
By symmetry, these results hold in all the 4 quadrants and
it follows that conv(R(t)) ⊂ K(t) (see Fig. 2).
Next, it is shown that, as t grows larger, the dissimilarity
between the two sets asymptotically goes to zero. Due to
the asymptotic nature of the result, only values of time
greater than π/2 are considered. Since conv(R(t)) ⊂ K(t),
conv(R(t))∩K(t) = conv(R(t)) and conv(R(t))∪K(t) =
K(t). So, the Jaccard distance can be computed as,
(cid:0)conv(R(t)),K(t)(cid:1) = 1 − A(conv(R(t)))
.
dJ
A(K(t))
where ψ ∈ [0, min(t, π/2)], and γ = t − ψ.
In order to prove that conv(R(t)) ⊂ K(t), we first show that
all points on C++(t) are closer to the origin than points on
the outer boundary of K(t), which is a circular arc of radius
t. Let p(t, ψ) = (px(t, ψ), py(t, ψ)) denote a point on the
curve C++(t). The squared l2-norm of p(t, ψ) is given as,
(cid:107)p(t, ψ)(cid:107)2
2 = (t − ψ)2 + 2 − 2 cos(ψ) + 2(t − ψ) sin(ψ),
where ψ ∈ [0, min(t, π/2)]. The derivative of (cid:107)p(t, ψ)(cid:107)2
2
with respect to the parameter ψ, is shown to be always non-
positive:
∂(cid:107)p(t, ψ)(cid:107)2
2
∂ψ
= 2(t − ψ)(cos(ψ) − 1) ≤ 0,
Since both the sets are symmetric with respect to the x and
y axes, area is computed in the first quadrant alone. After in-
tegrating over the boundary of conv(R(t)), A(conv(R(t)))
is given by,
(12π(t2−1)+t(48−6π2)+π3). (2)
A(conv(R(t))) =
Similarly, computing the area of K(t) in the first quadrant,
1
48
A(K(t)) =
t2
2
sin−1 (1 − δ(t))+
sin(2 sin−1 (1 − δ(t)))
(3)
where δ(t) = (π/2 − 1)/t. As t → ∞, the term t2 in (2)
dominates and δ(t) → 0 in (3). So, for large values of t,
1
2
,
(cid:19)
(cid:18)
∀ ψ ∈ [0, min(t, π/2)].
A(conv(R(t))) ≈ π
4
t2, A(K(t)) ≈ π
4
t2.
(4)
Evaluating limt→∞ dJ (conv(R(t)),K(t)) using (4), the de-
sired result is obtained.
The set K(t) not only allows us to derive analytical
expressions for the minimum area ellipse enclosing it, the
asymptotic reduction in the dissimilarity between K(t) and
conv(R(t)) implies that, the impact of using ξ(K(t)) instead
of ξ(conv(R(t))) on the accuracy of set-membership tests
in the safe time horizon algorithm, is minimal.
In Rn, an ellipsoid can be represented uniquely by its
center c and a positive-definite matrix H: E(c, H) = {x ∈
(x − c)T H(x − c) ≤ 1}. According to results
Rn :
presented in [9], at any given time t, the minimum area
ellipse circumscribing K(t) can be obtained by solving the
following semi-infinite programming problem:
− log det(H)
min
c,H
s.t. (z − c)T H(z − c) ≤ 1,∀z ∈ K(t).
(5)
The rest of this section formulates an analytical solution
to this semi-infinite programming problem. In Lemma 1, we
utilize the symmetry properties of K(t) to determine the
center and orientation of the ellipse ξ(K(t)). Following this,
Lemma 2 and Lemma 3 pose the semi-infinite programming
problem as a convex optimization problem. By solving this,
we present analytical expressions for the ellipse ξ(K(t)) in
Theorem 1.
Lemma 1. The ellipse ξ(K(t)) has the form E(c, H(t)),
where c = (0, 0) and H(t) = diag(A(t), B(t)) for some
A(t), B(t) ∈ R, such that A(t) > 0, B(t) > 0,∀t > 0.
Proof. For a convex set K ⊂ Rn, denote O(K) as a set of
affine transformations which leave the set K invariant:
O(K) = {T(x) = a + P x : T(K) = K}.
This set is called the automorphism group of K. Applying
results from [7], we know that, O(K) ⊆ O(ξ(K)). Since
K(t) is symmetric about both the x and y axes, the trans-
formation T(x) = −I2x, where I2 is the identity matrix,
lies in O(K(t)), and hence in O(ξ(K(t))). Furthermore, if
T ∈ O(ξ(K(t))) then T(c) = c. Applying this result with
the transformation T(x) = −I2x, we get c = (0, 0).
We know from [7], that T ∈ O(ξ(K(t))) =⇒ P T H(t)P =
H(t). The structure of H(t) appears by applying
(cid:20)1
(cid:21)
P =
0
0 −1
,
and the fact that H(t) is always positive definite.
Applying results from [9] for the case of K(t) ⊂ R2,
1, 0 < h ≤ 5
we know that, there exist contact points {qi}h
satisfying qi ∈ ∂K(t)∩ ∂ξ(K(t)), i = 1, . . . , h. Furthermore,
these contact points cannot all lie in any closed halfspace
whose bounding hyperplane passes through the center of
ξ(K(t)). Using these facts, the following lemma can be
stated:
Lemma 2. There are 4 contact points between K(t) and
ξ(K(t)).
Proof. We seek to find the number of contact points h. Since
K(t) and ξ(K(t)) are symmetric about the x and y axes (see
Lemma 1), and 0 < h ≤ 5, h can only take values 2 or 4.
If h = 2, both contact points must lie on the x or y axes
(otherwise symmetry in all the 4 quadrants is not possible).
But, the contact points cannot lie in any closed halfspace
whose bounding hyperplane passes through the center of
ξ(K(t)). Hence h = 4.
Given the structure of H(t) from Lemma 1, and the
number of contact points from Lemma 2, the semi-infinite
programming problem (5) will now be re-formulated as a
convex optimization problem.
Lemma 3. The matrix H(t) = diag(A(t), B(t)) can be
expressed as the solution of a convex optimization problem.
At any given time t > 0, A(t) is given as,
A(t) = argmin
Xt
− log Xt − log
1 − Xt(t2 − α(t)2)
(6)
α(t)2
s.t. 0 < Xt ≤ 1
t2 .
Furthermore,
1 − A(t)(t2 − α(t)2)
(cid:40)
B(t) =
1 − cos(t),
t − π/2 + 1, if
α(t)2
if 0 < t ≤ π/2
t > π/2
.
where α(t) =
Proof. As outlined in the semi-infinite programming prob-
lem given by (5), we aim to derive expressions for A(t) and
B(t) which minimize the cost function,
− log det(H(t)) = − log(A(t)) − log(B(t)),
(7)
subject to the constraint that K(t) ⊂ E((0, 0), H(t)). This
constraint can be translated into the condition that
the
quadratic function,
g(y) = A(t)(t2 − y2) + B(t)(y2) − 1,
(8)
is non-positive for y ≤ α(t).
As outlined in Lemma 2, there are a total of four contact
points, one in each quadrant. Thus, there must be at least
two distinct points at which g(y) is zero. The roots of
the quadratic function g(y) must lie at y = ±α(t) (in no
other situation can g(y) take non-positive values in the given
interval). So g(y) can be alternatively expressed as,
g(y) = λ(y − α(t))(y + α(t)), for some λ ≥ 0.
(9)
By equating the coefficients in (8) and (9), the following
constraints emerge,
B(t) − A(t) = λ ≥ 0,
A(t)t2 − 1 + λα(t)2 = 0.
Eliminating λ from the equations, the two constraints are re-
duced to B(t) ≥ A(t) and A(t)t2−1+(B(t)−A(t))α(t)2 =
0. Expressing B(t) in terms of A(t) using the second
constraint, we get,
A(t) ≤ 1
1 − A(t)(t2 − α(t)2)
(10)
.
t2 , B(t) =
α(t)2
Substituting B(t) from equation (10) into the cost function
(7), and denoting Xt as the value taken by the function A(·)
at time t, we obtain the optimization problem given in (6),
whose point-wise minimizer in time gives the value of A(t).
The next theorem solves the convex optimization prob-
lem outlined above to obtain analytical expressions for the
minimum area ellipses enclosing K(t) (Fig. 3).
Theorem 1. The minimum area ellipse ξ(K(t)) has the form
E(c, H(t)), where c = (0, 0) and H(t) = diag(A(t), B(t)).
A(t) and B(t) are given by the following expressions:
1) If 0 < t ≤ π/2, then
1
A(t) =
2(t2 − α(t)2)
where α(t) = 1 − cos(t).
2) If π/2 < t ≤ (1 + 1√
2
1
A(t) =
2(t2 − α(t)2)
where α(t) = t − π/2 + 1.
3) If t > (1 + 1√
and B(t) =
1
2α(t)2 ,
)(π − 2), then
and B(t) =
1
2α(t)2 ,
2
)(π − 2),
1
t2 and B(t) =
A(t) =
1
t2
Proof. We seek to calculate the minimizer to the convex cost
function f (Xt) given in (6). In the interior of the constraint
set, i.e., when Xt < 1
t2 , the minimizer can be found by
setting the gradient to zero and solving for Xt:
t2 − α(t)2
+
1 − Xt(t2 − α2)
∇f (Xt) = − 1
Xt
1
Xt =
2(t2 − α(t)2)
For this expression to satisfy the constraint, the inequality
t2 > 2α(t)2 must be satisfied. This is true for all values of
t in the interval (0, π/2]. For t > π/2, this holds whenever
the function t2 + 4(1 − π/2)t + 2(1 − π/2)2 takes non-
positive values. This is true for the time interval 0 < t ≤
)(π − 2), the
(1 + 1√
2
minimum in the feasible set is achieved when Xt = 1/t2.
Evaluating A(t) from (6) and B(t) from (10), we get the
desired result.
)(π − 2). For all values of t > (1 + 1√
2
The following theorem justifies the ellipsoidal approxima-
tion by showing that the dissimilarity between conv(R(t))
and ξ(K(t)) asymptotically goes to zero as time grows larger.
Theorem 2. Let R(t) denote the reachable set of
a differential-drive robot with dynamics given in (1),
conv(R(t)) denote its convex hull, K(t) denote an approx-
imation of the convex hull as defined in Proposition 1 and
let ξ(t) be the minimum area ellipse circumscribing K(t).
Then,
t→∞ dJ (conv(R(t)), ξ(t)) = 0,
lim
= 0,
Since the Jaccard distance is a metric distance, it obeys the
triangle inequality,
Fig. 3: Minimum area ellipse enclosing K(t)
where dJ is the Jaccard distance.
Proof. We first compute dJ (K(t), ξ(t)). Since K(t) ⊆ ξ(t),
K(t) ∪ ξ(t) = ξ(t) and K(t) ∩ ξ(t) = K(t). So,
dJ (K(t), ξ(t)) = 1 − A(K(t))
.
A(ξ(t))
2
Due to the asymptotic nature of the result, only values of
)(π − 2) are considered. For these
time greater than (1 + 1√
values of time, ξ(t) is a circle of radius t (see Theorem 1).
Also, since both ξ(t) and K(t) are symmetric about the x
and y axes, it suffices to compute areas in the first quadrant.
So, A(ξ(t)) = πt2/4. From (4), we know that, for large
values of t, A(K(t)) ≈ πt2/4 which is equal to the area of
ξ(t) in the first quadrant. Thus,
t→∞ dJ (K(t), ξ(t)) = 0.
lim
(11)
dJ (conv(R(t)), ξ(t)) ≤ dJ (conv(R(t)),K(t))
+ dJ (K(t), ξ(t)).
Applying Proposition 1 and (11), the desired result is
obtained.
Fig. 4 shows the evolution of R(t), conv(R(t)),K(t)
and ξ(K(t)) for different values of time. As predicted by
the result, the dissimilarity between conv(R(t)), K(t) and
ξ(K(t)) asymptotically goes to zero.
Using the ellipsoidal approximation of the reachable set
developed in this section, Section IV outlines a safe time
horizon based open-loop motion strategy for the robots.
IV. A SAFE OPEN-LOOP MOTION STRATEGY
Let M = {1, . . . , N} be a set of N differential-drive
robots, where each robot moves according to the dynamics
specified in (1). Let (zi(t), φi(t)) denote the configuration
of robot i ∈ M at time t. At regular intervals of time tk =
kδ, k ∈ N, the central decision maker transmits the desired
velocities ui(tk) = (vi(tk), ωi(tk)) and the corresponding
safe time horizon si(tk) to each robot i ∈ M via a wireless
communication channel. 1/δ is called the update frequency.
Thus, the safe time horizon is the longest amount of time
for which the trajectory of the robot after communication
failure, does not intersect the reachable sets of its neighbors.
But, as discussed in Section III, an ellipsoidal approximation
of the reachable set can be used to simplify set-membership
tests. Thus, the definition of sij(tk) can be modified by
replacing R(µ; zj(tk), φj(tk)) with ξj(µ, tk) in (13), where
ξj(µ, tk) denotes the ellipsoidal approximation correspond-
ing to R(µ; zj(tk), φj(tk)) as derived in Section III. Next,
we discuss how the safe time horizon is incorporated into
the motion strategy of the robots.
As discussed earlier, the central decision maker transmits
ui(tk) and si(tk) to all the robots i ∈ M at regular time
intervals tk, k ∈ N. Let ci represent
the status of the
communication link of robot i:
ci(tk) =
1,
0,
if (ui(tk), si(tk)) was received
if (ui(tk), si(tk)) was not received.
(cid:40)
Algorithm 1 outlines the motion strategy that robot i em-
ploys.
Algorithm 1 Safe Time Horizon based Open-Loop Motion
Strategy
k = 1, l = 1; ui(0) = 0, si(0) = 0
while true do
if ci(tk) = 1 then
Execute ui(tk)
l = k
else if tk − tl < si(tl) then
Execute ui(tl)
else
Stop Moving
end if
k = k + 1
end while
Fig. 5 illustrates the rationale behind the safe time horizon
algorithm. As long as the robot experiencing communication
failure is outside the ellipsoidal reachable sets of its neigh-
bors, it can safely move. The end of the safe time horizon
corresponds to the time when the robot reaches the boundary
of one of the ellipses. At this point, the robot stops moving.
In order to state formal safety guarantees regarding Algo-
rithm 1, we make mild assumptions on the capability of the
control algorithm executing on the central decision maker.
We assume that,
the control algorithm ensures collision
avoidance between communicating robots as well as between
communicating robots and stationary obstacles. In particular,
if ∃i, j ∈ M such that ci(tk) = 1 and cj(tk) = 1, then ui(tk)
and uj(tk) guarantee that,
(cid:107)zi(tk) − zj(tk)(cid:107) > 0 =⇒ (cid:107)zi(tk+1) − zj(tk+1)(cid:107) > 0.
Let zO denote the position of a stationary obstacle. If
ci(tk) = 1 for any i ∈ M,
(cid:107)zi(tk) − zO(cid:107) > 0 =⇒ (cid:107)zi(tk+1) − zO(cid:107) > 0.
(14)
Fig. 4: Evolution of R(t), conv(R(t)),K(t) and ξ(K(t)) for
t = 2, 5, 12, 25. As predicted by Theorem 2, the dissimilarity
between conv(R(t) and ξ(K(t)) asymptotically goes to zero.
The scale for each figure is different.
When a robot experiences communication failure, it exe-
cutes the last received velocity command repeatedly for the
duration of the corresponding safe time horizon. This causes
the robot to follow a circular trajectory. Let Zi(µ, tk) denote
the position of robot i along this circular trajectory, where tk
is the time of the last received command and µ is the time
elapsed since the communication failure. The expressions for
Zi(µ, tk) are obtained by integrating (1) for constant velocity
inputs. If ωi(tk) (cid:54)= 0,
Zi(µ, tk) = zi(tk)+
vi(tk)
ωi(tk)
and if ωi(tk) = 0,
(cid:19)
(cid:18) sin(ωi(tk)µ + φi(tk)) − sin(φi(tk))
(cid:18)cos(φi(tk))
(cid:19)
cos(φi(tk)) − cos(ωi(tk)µ + φi(tk))
Zi(µ, tk) = zi(tk) + µvi(tk)
sin(φi(tk))
.
In order
to ensure the scalability and computational
tractability of the safe time horizon algorithm, we introduce
the notion of a neighborhood set for each robot. To do this,
the safe time horizon for each robot is upper-bounded by
a pre-specified value L. This allows us to introduce the
neighborhood set of robot i at time t as:
Ni(t) =(cid:8)j ∈ M, j (cid:54)= i : (cid:107)zi(t) − zj(t)(cid:107) < 2L(cid:9), (12)
where (cid:107).(cid:107) denotes the l2 norm. If robot i and robot j are
not neighbors, they cannot collide within the maximum safe
time horizon L.
The safe time horizon si(tk) can be defined as,
si(tk) = min
j∈Ni
sij(tk),
where sij(tk) is called the pair-wise safe time and is defined
as,
λ(cid:90)
0
sij(tk) = max
λ
1 dλ
(13)
s.t. Zi(µ, tk) /∈ R(µ; zj(tk), φj(tk)),∀µ ∈ [0, λ]
and λ ≤ L.
robot. Thus,
the original safety guarantee of the control
algorithm is extended to situations where the robot is moving
without commands from the central decision maker within
the safe time horizon.
A. Simulations
V. RESULTS
This section presents the simulation results of the safe time
horizon algorithm implemented on a team of 6 robots. Fig. 6
compares the motion of the robots during a communication
failure with and without the safe time horizon algorithm. A
communication failure is simulated lasting from t = 3.1s
to t = 8.3s. In the case where safe time horizons are
not utilized, shown by Fig. 6a and Fig. 6b,
the robots
experiencing communication failure abruptly stop moving,
thus exhibiting a jerky motion pattern. When safe time
horizons are utilized, the robots experiencing communication
failure execute their last received velocity command for the
duration of the safe time horizon (Fig. 6c and Fig. 6d).
This allows them to keep moving during the communication
failure, thereby avoiding jerky "start-stop" motion behaviors
and reducing the disruption caused to the multi-robot system.
(a) No Safe Times: t = 3.1s
(b) No Safe Times: t = 8.3s
(c) With Safe Times: t = 3.1s
(d) With Safe Times: t = 8.3s
Fig. 6: Comparison of the motion of robots with and without
safe time horizons. Two robots experience communication
failure from t = 3.1s to t = 8.3s. In the case when
safe time horizons are not used (Fig. 6a and Fig. 6b), the
robots exhibit jerky motion behavior, since they abruptly
stop during the communication failure. When safe time
horizons are used (Fig. 6c and Fig. 6d), the robots continue
moving by executing their last received velocity command
for the corresponding safe time horizon, thus demonstrating
the ability of the safe time horizon algorithm to effectively
handle communication failures.
(a) t = 0.005
(b) t = 3
(c) t = 5
(d) t = 5.96
Fig. 5: The safe time horizon represents the longest time
duration for which the robot
lies outside the ellipsoidal
reachable sets of other robots. Thus, the robot experiencing
communication failure can execute its last received velocity
command for the corresponding safe time horizon and remain
safe. Beyond this, the robot stops moving.
Utilizing these assumptions, the following theorem outlines
the safety guarantees provided by Algorithm 1.
Theorem 3. If robot i does not receive any commands from
the central decision maker after time tk, i.e., ci(tk) = 1 and
ci(tm) = 0 ∀m > k, then Algorithm 1 ensures that,
(cid:107)zi(tk) − zj(tk)(cid:107) > 0 =⇒ (cid:107)zi(tk + µ) − zj(tk + µ)(cid:107) > 0,
∀µ ∈ [0, si(tk)], ∀j ∈ M, j (cid:54)= i.
Proof. Since (cid:107)zi(tk) − zj(tk)(cid:107) > 0 ∀j ∈ M, si(tk) > 0.
As seen in (12), if j /∈ Ni, then a collision is not possible
between robot i and j within the safe time horizon. Next,
we consider the case when j ∈ Ni. From the definition of
si(tk), we know that, zi(tk+µ) /∈ ξj(µ, tk), ∀µ ∈ [0, si(tk)].
Furthermore, from the definition of reachable sets, zj(tk +
µ) ∈ ξj(µ, tk), ∀µ ∈ [0, si(tk)]. From the previous two
statements, it is clear that zi(tk + µ) (cid:54)= zj(tk + µ), ∀µ ∈
[0, si(tk)]. Hence,
(cid:107)zi(tk +µ)−zj(tk +µ)(cid:107) > 0, ∀µ ∈ [0, si(tk)], ∀j ∈ Ni.
This completes the proof.
Beyond the safe time horizon, the robot stops moving,
and (14) ensures that no collisions occur with the stationary
*Position of robot when the communication failure occured Current position of the robot Safe Open-Loop trajectory followed by robot Ellipsoidal reachable sets of neighboring robots Robot under normal operation Current Position of robot experiencing communication failureSafe Open-Loop trajectory followed by robot *Position of robot when the communication failure occured B. Experimental Results
The safe time horizon algorithm is implemented on a
multi-robot testbed with 4 Khepera III robots and an Op-
titrack motion capture system, which is connected to a
desktop computer serving as the central decision maker. In
the first scenario (Fig. 7a and Fig. 7b), the robot experiencing
communication failure executes its last received velocity
command for the duration of the safe time horizon, after
which it becomes stationary. In the second scenario, (Fig.
7c and Fig. 7d),
the robot experiences a short duration
communication failure and keeps moving safely through it.
In particular, the safe time horizon algorithm successfully
combats issues pertaining to intermittent communications
on the Robotarium, and enables the seamless execution of
coordination algorithms in the face of such failures.
(a) Robots at t = 9s
(b) Robots at t = 14s
(c) Robots at t = 28s
(d) Robots at t = 32s
Fig. 7: Four Khepera III robots are shown patrolling a
U-shaped corridor. At t = 9s, a robot experiences com-
munication failure and executes its last received velocity
command until t = 14s. Similarly, a robot
loses com-
munication at t = 28s (Fig. 7c) and keeps moving in
a safe manner. Before the safe time horizon of the robot
elapses, communication is restored (Fig. 7d). Thus, the safe
time horizon algorithm prevents jerky "start-stop" motion
patterns of the robot during the intermittent communica-
tion failure. This experiment demonstrates how the safe
time horizon algorithm can prevent disruptions in robot
motion caused due to intermittent communications on the
Robotarium. A video of this experiment can be found at
www.youtube.com/watch?v=Gyz861xwaHY
VI. CONCLUSIONS
The safe time horizon algorithm not only provides a
technique for multi-robot systems to safely handle intermit-
tent communication failures, it demonstrates the feasibility
of reachability analysis as a powerful tool for multi-robot
algorithms. The minimum area ellipse derived in Section
III provides a compact and efficient way to represent the
reachable set of a differential-drive robot and can be used in
other robotics algorithms as an abstraction of the reachable
set itself.
REFERENCES
[1] Gianluca Antonelli, Filippo Arrichiello, and Stefano Chiaverini. The
null-space-based behavioral control for autonomous robotic systems.
Intelligent Service Robotics, 1(1):27 -- 39, 2008.
[2] R C Arkin and J Diaz. Line-of-sight constrained exploration for
reactive multiagent robotic teams. In Advanced Motion Control, 2002.
7th International Workshop on, pages 455 -- 461. IEEE, 2002.
[3] Tucker Balch and Ronald C Arkin. Communication in reactive
multiagent robotic systems. Autonomous Robots, 1(1):27 -- 52, 1994.
[4] Jean-Daniel Boissonnat and Xuan-Nam Bui. Accessibility region for
a car that only moves forwards along optimal paths. INRIA France,
1994.
[5] M Dogar, R A Knepper, A Spielberg, C Choi, H I Christensen, and
D Rus. Multi-scale assembly with robot teams. The International
Journal of Robotics Research, 34(13):1645 -- 1659, 2015.
[6] A Fedotov, V Patsko, and V Turova. Reachable Sets for Simple Models
of Car Motion. INTECH Open Access Publisher, 2011.
[7] O Guler and F Gurtuna. Symmetry of convex sets and its applications
to the extremal ellipsoids of convex bodies. Optimization Methods
and Software, 27(4-5):735 -- 759, 2012.
[8] Paul Jaccard. Distribution de la Flore Alpine: dans le Bassin des
dranses et dans quelques r´egions voisines. Rouge, 1901.
[9] F John. Extremum problems with inequalities as subsidiary conditions.
In Traces and Emergence of Nonlinear Programming, pages 197 -- 215.
Springer, 2014.
[10] Christopher A Kitts and Magnus B Egerstedt. Design, control, and
applications of real-world multi-robot systems. 2008.
[11] E Klavins. Communication complexity of multi-robot systems.
In
Algorithmic Foundations of Robotics V, pages 275 -- 291. Springer,
2004.
[12] Oded Maler. Computing reachable sets: An introduction. Technical
report, 2008.
[13] H Nguyen, N Pezeshkian, M Raymond, A Gupta, and J Spector.
Autonomous communication relays for tactical robots. Technical
report, DTIC Document, 2003.
[14] D Pickem, L Wang, P Glotfelter, Y Diaz-Mercado, M Mote, A Ames,
E Feron, and M Egerstedt.
Safe, remote-access swarm robotics
research on the robotarium. arXiv preprint arXiv:1604.00640, 2016.
[15] R Ramanathan and J Redi. A brief overview of ad hoc networks:
challenges and directions. IEEE communications Magazine, 40(5):20 --
22, 2002.
[16] J Reeds and L Shepp. Optimal paths for a car that goes both forwards
and backwards. Pacific journal of mathematics, 145(2):367 -- 393, 1990.
[17] S Sariel, T Balch, and N Erdogan. Naval mine countermeasure
missions. IEEE robotics & automation magazine, 15(1):45 -- 52, 2008.
[18] P Sou`eres, J Y Fourquet, and J Pl Laumond. Set of reachable positions
for a car. Automatic Control, IEEE Transactions on, 39(8):1626 -- 1630,
1994.
[19] H J Sussmann and G Tang. Shortest paths for the reeds-shepp car: a
worked out example of the use of geometric techniques in nonlinear
optimal control. Rutgers Center for Systems and Control Technical
Report, 10:1 -- 71, 1991.
[20] Patrick Ulam and Ronald C Arkin. When good communication go
bad: communications recovery for multi-robot teams. In Robotics and
Automation, 2004. Proceedings. ICRA'04. 2004 IEEE International
Conference on, volume 4, pages 3727 -- 3734. IEEE, 2004.
[21] Logan Yliniemi, Adrian K Agogino, and Kagan Tumer. Multirobot
coordination for space exploration. AI Magazine, 35(4):61 -- 74, 2014.
Position of robot when communication failure occuredRobot currently experiencing communication failure Safe Open-Loop trajectory followed by robot XXX |
1909.01711 | 1 | 1909 | 2019-09-04T11:53:40 | Simulation and computational analysis of multiscale graph agent-based tumor model | [
"cs.MA",
"q-bio.TO"
] | This paper deals with the cellular biological network analysis of the tumor-growth model, consisting of multiple spaces and time scales. In this paper, we present a model in graph simulation using ABM for tumor growth. In particular, we propose a graph agent-based modeling and simulation system in the format of tumor growth scenario for evolving analysis. To manage cellular biological network analysis, we developed a workflow that allows us to estimate the tumor model and the complexity of the evolving behavior in a principled manner. By developing the model using Python, which has enabled us to run the model multiple times (more than what is possible by conventional means) to generate a large amount of data, we have succeeded in getting deep in to the micro-environment of the tumor, employing network analysis. Combining agent-based modeling with graph-based modeling to simulate the structure, dynamics, and functions of complex networks is exclusively important for biological systems with a large number of open parameters, e.g., epidemic models of disease spreading or cancer. Extracting data from evolutionary directed graphs and a set of centrality algorithms helps us to tackle the problems of pathway analysis and to develop the ability to predict, control, and design the function of metabolisms. Reproducing and performing complex parametric simulations a known phenomenon at a sufficient level of detail for computational biology could be an impressive achievement for fast analysis purposes in clinics, both on the predictive diagnostic and therapeutic side. | cs.MA | cs |
Simulation and computational analysis of multiscale
graph agent-based tumor model
Department Computer Architecture & Operating Systems
Department Computer Architecture & Operating Systems
Ghazal Tashakor
Remo Suppi
Universitat Autnoma de Barcelona
Barcelona, Spain
[email protected]
Universitat Autnoma de Barcelona
Barcelona, Spain
[email protected]
Abstract -- This paper deals with the cellular biological network
analysis of the tumor-growth model, consisting of multiple spaces
and time scales. In this paper, we present a model in graph
simulation using ABM for tumor growth. In particular, we
propose a graph agent-based modeling and simulation system
in the format of tumor growth scenario for evolving analysis.
To manage cellular biological network analysis, we developed a
workflow that allows us to estimate the tumor model and the
complexity of the evolving behavior in a principled manner. By
developing the model using Python, which has enabled us to
run the model multiple times (more than what is possible by
conventional means) to generate a large amount of data, we
have succeeded in getting deep in to the micro-environment of
the tumor, employing network analysis.
Combining agent-based modeling with graph-based modeling
to simulate the structure, dynamics, and functions of complex
networks is exclusively important for biological systems with
a large number of open parameters, e.g., epidemic models of
disease spreading or cancer. Extracting data from evolutionary
directed graphs and a set of centrality algorithms helps us to
tackle the problems of pathway analysis and to develop the
ability to predict, control, and design the function of metabolisms.
Reproducing and performing complex parametric simulations
a known phenomenon at a sufficient level of detail for com-
putational biology could be an impressive achievement for fast
analysis purposes in clinics, both on the predictive diagnostic and
therapeutic side.
Index Terms -- multi scale modeling, agent based modeling
(ABM), graph-based modeling, tumor agent-based model.
I. INTRODUCTION
Scientific agent-based modeling and simulation requires
specific techniques to manage parametric executions and the
computational cost of the evolution analysis. It gets more
complicated when it is defined as Systems Biology (SB) based
on a multiscale nature. There is a large set of references in SB
which reviewed and compared different agent-based modeling
tool-kits. From the scientific community point of view this
field still lacks an accepted generic methodology to address
Research supported under contract TIN2017-84875-P, funded by the Agen-
cia Estatal de Investigaci´on, Spain and the FEDER-UE and partially funded by
a research collaboration agreement with the Fundaci´on Escuelas Universitarias
Gimbernat.
multiscale computation. Specifically to optimize the transport
of data between sub-models in high-performance computing
(HPC) environments which means exchanging large volumes
of data. In this case, dedicated data pattern software and
high-performance multiscale computing applications would be
needed.
This paper presents our work in graph simulation and
modeling of an agent-based tumor growth. The most novel
changes in this paper on the ground of the other scenarios
are obtaining a probabilistic state machine in Python using
Mesa [4], a graph-based representation using NetworkX [21]
and consideration of multiscale simulation to perform cellular
and molecular population dynamics. Unlike many other tools,
NetworkX [21] data analysis features are designed to handle
data on a scale relevant to complex problems, and most of the
core algorithms rely on extremely fast legacy code for flexible
graph representations which a node and edge can be anything.
On the other hand, implementing our tumor agent-based
in Python using Mesa [4] is indeed a prospective
model
approach since it is becoming the language for scientific com-
puting and facilitating the web crawling for direct visualization
of every model step. Mesa allows large-scale modeling to
create agent-based models using built-in core components such
as agent schedulers and spatial grids in parallel computation.
II. BACKGROUND
A primary tumor model just addressing the vascular growth
state depends on differential equations, but In silico [6] refers
to computational models of biology and it has many applica-
tions. There are three approaches of In silico to build a cancer
model: continuum, discrete and hybrid. Each approach has
the characteristics that make it suitable for analyzing specific
properties of tumors and tumor cells [8]. However, an adaptive
hybrid model which integrates both continuous and discrete
based models is the most challenging for simulating a complex
system. A minimal coupling of a vascular tumor dynamics to
tumor angiogenic factors through agent-based modeling has
pushed the progress of experimental studies during recent
years1. It is a big challenge to simulate total process of a
complex system such as tumor growth, metastasis, and tu-
mor response treatments mathematically because mathematical
modeling is still a simplification of the systems biology and
the results require validation [7]. As we can see in some
papers such as [8][9], it is apparent that building a bulky
model over a range of matrix densities which covers numerous
factors in this way for large domain sizes or 3D simulations
are restricted by computational and application costs. In [8]
they have presented a series of ABMs that are intended to in-
troduce a multiscale architecture2 for representing biomedical
knowledge in NetLogo [1] and in conclusion they mentioned
that a full-scale ABM implementation is not possible at this
time. They have pointed out that there is a need to develop
and communicate the potential framework that is conceptually
robust and allows the evolution of knowledge represented
in a computable form. Authors of [10][11] also suggested
focusing on modified methods for analyzing and modeling
which scales more with network size using information about
edge betweenness to detect community peripheries3. This
suggestion allows scientists to go through a broader inves-
tigation of tumor information extraction and tumor-growth
dynamics. Also, it seems using dynamic networks based on
a large number of interactive agents make it possible for
researchers to carry out more detailed research on inter-cellular
network interactions and metastasis in a multiscale model
[12]. One of the latest papers is [22] which addresses recent
progress and open questions in multiscale modeling. From
their point of view, a well-established methodology is building
and maintaining a computer code and proposing a framework
which includes theoretical concepts, a multiscale modeling
language and an execution environment to solve the interdisci-
plinary multiscale problems such as spatial scale. On the other
hand, cell populations can be very heterogeneous, so nested
effects modeling for single-cell data to simultaneously identify
different cellular sub-populations to explain the heterogeneity
in a cell population will be necessary. It helps entering the
mechanisms of gene regulation and the reconstruction of cell
signaling networks [23].
Building a general framework at this time which could
model the static and dynamic aspects of the tumor behavior
and provide the computational resources is an open application
area challenge with many technical barriers overcome in recent
years [23]. Perhaps a hybrid graph agent-based simulation
and modeling could be an outset to metabolic engineering for
applications which have expanded to address problems such
as evolution.
It
is noteworthy that graphs,
in
such integrative analysis of data from different sources which
in general, are useful
1ABM model that allows rule definition with great detail and different levels
of activation to model the angiogenesis phenomenon.
2Multilevel structure of information exchange through which it is defined
that how the agents interact in the model.
3Methods proposed by [10-12] are based on the exchange of information
between agents that allows extracting a greater quantity of tumor information
and understanding its dynamics
Fig. 1.
Stem cells evolution and metastasis visualization with grow-
factor=1.75, apoptosis=low and replication-factor=high (near 200,000 cells
in steady state).
naturally required an in-depth integrity and dependency.
A. Modeling and Simulation in NetLogo
Our initial ABM NetLogo model [2] was designed as a
self-organized model that illustrates the growth of a tumor
and how it resists chemical treatment. This model in NetLogo
which is based on Wilensky's tumor model [1] permits us to
change the parameters that affect tumor progression, immune
system response, and vascularization. Figure 1 shows the
steady state of a tumor metastasis visualization with six stem
cells and the grow-factor=1.75, replication-factor=high, and
apoptosis=low. As it could be seen, the growth of metastasis
is more aggressive and through reducing apoptosis, there is a
higher number of cells that do not die, amounting near 200,000
cells (agents) [2]. NetLogo [1] includes the Behavior Space
tool that allows the exploration of the model data space using
parametric executions in varying settings of the model and for
recording the results of each model run. The main problem
of these executions is that the Behavioral Space only supports
multithreading, so its performance is limited to the number of
cores/threads at the local infrastructure. To solve the problem,
we have executed the parametric simulations using our HPC
cluster in order to reduce the necessary time to explore a
determinate model data space. It has pointed out that this
implementation using NetLogo caused the limitations of the
execution environment (Java memory limitations) and loss of
performance with a high number of metastasis cells. Also, it
shows this model did not allow capturing in detail interactions
between the different parameters the microenvironment level.
B. Static preliminary model in Python
Taking into account
the limitations of Netlogo and the
different research tendencies to introduce multiscale simula-
tions to represent biomedical knowledge, our research was
data. Graph visualization makes large amounts of data more
accessible and easier to read as we can see in Fig. 2. The
interactive visualization in Mesa helps us to identify insights
and generate value from connected data. The visualization of
the model is a network of nodes that shows the distribution
of agents and their links. A scheduler (time module) activates
agents and stores their locations and updates the network. The
total operation time is directly related to the number of steps
necessary to deploy all the agents.
III. A NEW MULTISCALE GRAPH AGENT-BASED MODEL OF
TUMOR-GROWTH
Large multiscale experimental modeling and simulation
causes an accumulation of data which reflect the possible
infinite divers of interactions in cellular biological networks.
Accordingly, there is a great need for computational methods
and computer tools to manage, query and analysis of these
experiments. In the most abstract level, cellular biological
networks represent as mathematical graphs because metabolic
networks generally require complex representations which
have made it possible to investigate the topology and func-
tions of these kinds of networks. By using graph-theoretical
concepts, predicting the dynamical properties of deep layers
may suggest new biological hypotheses. Functional modules
across different data sources will be essential in understanding
the behavior of the system on a large scale. Since agent-
based modeling became an alternative and potentially a more
appropriate form of mathematics to define for a computational
system, ABM researchers use model analyzing sample distri-
butions to record real-world network outcomes and summarize
the theoretical concepts. In the end,
the results of these
analyses also can be beneficial on the biological goals of
the study. The development and clinical implementation for
tumor growth behaviors have become a priority these days,
and it requires the analysis of large multiscale data from
cell populations to identify features and parameters which
predict tumor behavior. Our static preliminary model in Python
still was a limited scale model because of using the Erds-
Rnyi graph. To advance the initial idea, we have developed
a computational workflow for simulating a multiscale tumor
model. The graph-based methodology nested in agent-based
modeling aids us to exploit evolving analysis more accurate.
Mapping agents to the nodes in the graph-structure model
coordinates the assignments of values to their variables in such
a way that maximizes their aggregation. Agents work as states,
locations or even sometimes as controls of all the variables that
map to the nodes.
A. A workflow for simulating tumor model and evolving
analysis
This section aims to illustrate an evolving analysis of tumor
growth in different patients. Let's assume that an oncologist
needs growing analysis of cellular interplay for a patient with
newly diagnosed cancer disease. Therefore the basic level of
the tumor must be characterized for future prediction of the
possible growth behaviors. In principle, we need intervention
Fig. 2. Graph visualization for a tumor in three states (normal, dead and
inflamed) which has shown in three colors(green, grey and red).
oriented towards this type of ABM simulations. For this,
the environment and modeling were changed to represent all
the interactions in a multiscale ABM model. In this sense,
Python + Mesa were chosen as a development environment
and a graph-based model was selected to represent all the
complexity and interactions of the tumor model. Fig. 2 shows
the visual form of our second approach [5] for tumor agent-
based modeling which tumor cells changed color while they go
through state transition. We have implemented a preliminary
tumor agent-based model in graph architecture considering
that in life science data analysis such as tumor almost ev-
erything is about connections and dependencies. As well a
large amount of data makes it difficult for researchers to
identify insights or controlling dynamical networks and here
the role of graph architecture in displaying complex patterns
of interactions between components is significant. Each agent
nested in a single-node and changes in three states under the
influence of the neighbor nodes. The process goes on until
the tumor agent's volume appears as metastasis. To simulate a
graph network for this model, we selected a random graph to
construct the cell interactions and stromal cells behavior within
a tumor microenvironment. Due to the time-dependency of the
connections, we developed our graph agent-based model on
Erds-Rnyi [24] topology. Erds-Rnyi model takes a number of
vertices N and connecting nodes by selecting edges from the
(N (N-1)/2) possible edges randomly. As the same scenario
as our NetLogo tumor model,
to study and analyze the
behavior of Python tumor model under different conditions,
we needed to explore the relevant data of the model using
parametric executions. For this purpose, we found Mesa [4]
which supports multi-agent and multiscale simulations. It is a
framework that allows us to make changes to existing ABMs.
Also monitoring the data management issues when processing
actions happen in parallel seems facile in Mesa since each
module runs on the server and turns a model state into JSON
by agent-based modeling to set the initial experimental con-
ditions. Fig. 3 introduces the workflow of our computational
simulation system for modeling a scenario of tumor growth
and preparing data from different scales and stages of its
evolving behavior. As can be seen at the part (ii) in Fig. 3, we
have defined three steps for the scenario of the workflow. The
first step is simulating an initial tumor by setting up initial
features to create an initial graph model. Collecting data at
the end of each step helps the oncologist to reuse the data
whenever he needs again.
The second step is forwarding the initial graph to the
growing module with redirection possibilities in tumor growth.
The third step is feeding the growing tumor by changing subset
features of angiogenic switch.
The last two steps of the scenario are implemented as a
growing network with redirection (GNR) [21] nested in an
ABM model. The subset features of the angiogenic switch
define as a state transition based on probabilistic state machine
(explained in next section). We considered that the transient
states probability adopted in the subset features are necessarily
valued between 0 and 1. Finally, in the Back-end computa-
tional part of the workflow, we designed a data visualization
tool for the oncologists.
biological parameters which are known as cancer driver: the
number of divisions (d), the number of stem cells (N), the
number of critical rate-limiting pathway driver mutations (k),
and the mutation rate (u).
p = 1 − (1 − (1 − (1 − u)d)k)N
(1)
Subset features get in the computational simulation system
through agents as state transition probabilities to change the
state of the cells in the growing network. These parameters
could be selected by the oncologist or any other user of the
system through the interactive visualization form.
At the agent-based model, tumor cells are affected, inflamed
and turn quiescent. Based on these key factors we have
simulated the tumor growth behavior and measurements such
as the tumor volume, density and also we calculate a number
of dead, inflamed and tumor-derived cells.
B. The probabilistic state machine of tumor growth
Using probabilistic automaton (PA) in computational biol-
ogy can be a useful aspect of tracking a natural problem.
Fig. 3. Graph-based modeling and simulation system in the format of tumor
growth scenario
We have deployed two complementary graph-driven meth-
ods for analyzing and estimating probable growing network
patterns. The selected methods are presented in the context
of network analysis in Python using Mesa [4] and NetworkX
[21] packages. The amount of data which is extracted from
the methods address some problems in cell biology.
We chose a fast binomial graph generator on Erds-Rnyi
topology for initialization, so we used our static preliminary
model as an initial input. To simulate our growing network
nested in the agent-based model, we used a growing network
with redirection (GNR) graph with probability (p) for adding
nodes one at a time with a link to the initial nodes. In this
graph, a target node is a node where a new link attached. Target
nodes are selected randomly following a uniform distribution.
We set the redirection probability (p) which is shown by the
equation in (1) like that gives us a new pattern of tumor growth
every time.
Based on [13], we used the following equation in (1) to
calculate the probability (p) of tumor growth. It contains five
Fig. 4. Flowchart representation of our tumor behavior in a PFA model
Probabilistic finite-state automaton (PFA) during the past
years was applied to the model and generate distributions over
sets of possible infinite terms and trees. Typically, PFA is
represented as directed labeled graphs[15][16].
The fundamental biological aspect of
the probabilistic
model of our tumor growth comes from the acute inflammation
based upon the key factors involved such as an angiogenic
switch. Tumor angiogenesis is critical for tumor growth and
maintenance [14][20].
Fig. 4 shows the metabolic flowchart of this aspect and how
we have created our PFA model based on the flowchart. The
strategy begins with initial identification of a minor population
of cells with the characteristics of tumor-initiating cancer stem
cells and they will be assumed inflamed or dead under the
influence of angiogenic switch factors.
The threshold of angioprevention K is compared with
the assessment values of transition probability PA which is
selected by oncologist interactively. The result of the com-
parison works as a trigger to change the state of the cells
from their current state S0 to the proliferation state S1 or
the inflammation state S3. Afterward, under the influence of
changing angiogenic switch values Ω, the inflammation state
S1 may turn to the progression state S2 and metastasis can
happen.
(cid:88)
s∈SA
IA(S) = 1
(2)
PA(s, b.s(cid:48)) = 1 where ∀ Ps > Ki (3)
(cid:88)
s(cid:48)∈SA,b∈Ω
FA(s) +
From the probabilistic point of view in equation 2 and 3, a
finite generic states SA is transitioned under the influence
of angiogenic probabilities defined by alphabets Ω. K is
a threshold drawn from a uniform [0,1] distribution. If the
transition probability PA is greater than K, the current state
assumed to be extended with PA(s, b.s(cid:48)). In the End, initial-
state probability IA, final state probability FA and transition
probabilities PA are considered as total and PFA definition
will be a tuple of below functions.
C. Results of Parametric Execution
Human-tumor-derived cell lines contain common and dif-
ferent transforming genomic profiles which is essential for
a comprehensive understanding of tumorigenesis, and for
identifying the earliest events in tumor evolution [17].
We assumed four different parametric baseline executions
for monitoring tumor-growth model in four different patients
as it can be seen in Fig. 5. For each baseline, it is considered
three repetitions as growth patterns to be able to extract data
from the growing network in different redirection patterns. The
goal is simulating the dynamic behavior of tumor-growth.
Fig. 5. Initial tumor graph to set up four baselines (Symbol of four patients)
The first baseline set to an initial state of 200 stem cells and
increase to 400 under the influence of 50 cancer stem cells.
The second baseline set to an initial state of 400 stem cells
and increase to 800 under the influence of 200 cancer stem
cells. The third baseline set to an initial state of 600 stem
cells and increase to 1200 under the influence of 400 cancer
stem cells. Moreover, the forth baseline set to an initial state
of 1200 stem cells and increase to 2400 under the influence
of 650 cancer stem cells.
The configuration management of these four baselines is es-
tablished for analyzing tumor density variations, tumor-derived
cells into cancer redirection and identifying genomic profiles
of those essential cells. Significant revision regarding graph
patterns configuration is extracted from neighborhood analysis
and graph centrality methods such as centrality closeness or
betweenness [19] which quantify the number of times a node
acts as a bridge along the shortest path between two other
nodes. These methods were introduced as a measure for quan-
tifying the control of a human on the communication between
other humans in a social network by Linton Freeman. In this
conception, vertices which have a high probability to occur
on a randomly chosen shortest path between two randomly
chosen vertices have a high betweenness [21]. We used this
concept to reconstruct the tumor-derived cell lines and produce
their profiles by extracting data from our experiments and
comparing the results of the baselines in Table I to Table IV.
As it could be seen, the most aggressive growth pattern be-
longs to the Table III about patient3 for as-much as the average
value of the essential genomic profile of tumor patterns and
the number of tumor-derived cells are higher than the other
tumors.
TUMOR-DERIVED CELL ID AND GENOMIC PROFILE FOR PATIENT 1
TABLE I
Initial tumor(Patient1)
tumor-derived cell ID
Essential Genomic Profile
GP1
10
2.19E-03
GP2
4
4.70E-03
GP3
18
3.34E-03
TUMOR-DERIVED CELL ID AND GENOMIC PROFILE FOR PATIENT 2
TABLE II
Initial tumor(Patient2)
tumor-derived cell ID
Essential Genomic Profile
GP1
6
1.34E-03
GP2
12
8.94E-04
GP3
6
1.50E-03
TUMOR-DERIVED CELLS ID AND GENOMIC PROFILE FOR PATIENT 3
TABLE III
Initial tumor(Patient3)
tumor-derived cell ID
Essential Genomic Profile
GP1
1
3.96E-04
GP2
17 and 10
7.07E-04
GP3
5
6.85E-04
TUMOR-DERIVED CELLS ID AND GENOMIC PROFILE FOR PATIENT 4
TABLE IV
Initial tumor(Patient4)
tumor-derived cell ID
Essential Genomic Profile
GP1
1
2.70E-04
GP2
6
3.70E-04
GP3
1
2.13E-04
Fig. 6 is a visual representation of genome profile variation
of tumor-derived cells distribution in tumor number three.
We selected this tumor because it behaved more aggressive
than the others especially because it grows very radical in
its growth patterns number two and three. Cell lines serve
as models to study cancer biology and to connect genomic
variation to angiogenic responses. This modeling can aid in
understanding different tumor behavior. The tumor-derived cell
distribution results are significant for molecular and cell lines
study. Molecular sub-typing could be done based on gene
expression patterns and it helps for tumor-derived cell classi-
fication [24]. Accordingly, the assortment of classes in tumor-
derived cell distribution is our future work. By computing
the ratio of the dead cells to the inflamed cells, we have
also been able to demonstrate different tumor growth behavior
upon the effective laboratory condition from the angiogenic
switch. Fig. 7 illustrates the change scale of inflammatory in
tumor3 based on different angiogenic key factors determinate
in Table V. There is evidence in the chart that angiogenesis
and inflammation are mutually dependent.
ANGIOGENIC SWITCH KEY FACTORS AS TRANSITION PROBABILITIES
TABLE V
AngioPrevention
Angiogenesis
PA Values
Quiescent
ASW1
0.4
0.6
0.2
ASW2
0.6
0.4
0.2
ASW3
0.4
0.6
0.8
Fig. 6. Genome profile variation of tumor-derived cells distribution in tumor
number three
Also, stem cell quiescence is a way to control the inflam-
mation in the tumor microenvironment. Increasing angiogenic
value in angiogenic switch 1 causes inflammatory reactions
and raise the number of inflamed cells. Targeting inflammation
by using angioprevention and stop cancer cells from prolifer-
ating helps to decrease the number of inflamed cells as it is
shown in angiogenic switch 2 and 3 of the chart.
D. Conclusions and Future work
In this paper, we simulated and developed a multiscale
graph agent-based model. The model uses for extracting and
analyzing data from the cellular network of a tumor while
growing. The extracted information from the hybrid simulation
with transient probabilities and variable angiogenesis key
factors to target emulating the dynamic behavior of tumor-
growth seems interesting to oncologists and scientist since
they can study the probable predictive power of pathways in
the cellular network of the tumor. Migrating from NetLogo to
Python using Mesa and NetworkX was a successful strategy
since the Python framework permits us to develop faster and
deeper into the details in multistage and multiscale modeling.
Presenting the mathematical and biological form of the tumor-
growth model in the format of graph agent-based model using
a probabilistic state machine and the identification based on
genomic profiling idea could be validated in the future. Also,
this idea will allow us to integrate our model to an alternative
approach in discovering similarly or densely connected sub-
graphs of nodes[18]. This approach is an imitation of the
metastasis complication.
Fig. 7. The result of the change scale of inflamed and dead cells of tumor
number 3
REFERENCES
[1] U. Wilensky, "NetLogo tumor model. Center for Connected Learning
and Computer-Based Modeling Northwestern University, Evanston, IL,"
http://ccl.northwestern.edu/netlogo/models/tumor, 1998.
[2] G. Tashakor,E. Luque,R. Suppi,"High Performance Computing for tumor
Propagation Agent-based Model," in Proceedings of the XXIII Computer
Science Conference (CACIC) (Argentina, La Plata, 2017.
[3] D. Drau, D. Stanimirov,T. Carmichael,M. Hadzikadic, "An agent-based
model of solid tumor progression," Bioinformatics and Computational
Biology, Springer, Berlin, Heidelberg, 2009, pp. 187-198.
[4] D. Masad,J. Kazil, "MESA : an agent-based modeling framework," in
Proceedings of the 14th Python in Science Conference (SCIPY), 2015,
pp. 53-60.
[5] G. Tashakor, R. Suppi, "Agent-based model for tumor-analysis using
Python+Mesa,"in Proceedings European Modeling and Simulation Sym-
posium (EMSS), 2018, pp. 248-253.
[6] LB. Edelman, JA. Eddy, ND. Price, "In silico models of cancer," Systems
Biology and Medicine, Wiley Interdisciplinary Reviews, vol. 2(4), 2010,
pp. 438-459.
[7] S. Soleimani, M.Shamsi, MA. Ghazani,HP. Modarres,KP. Valente, M.
Saghafian, MM. Ashani, M. Akbari, A. Sanati-Nezhad, "Translational
models of tumor angiogenesis: A nexus of in silico and in vitro models,"
Biotechnology Advances, 2018.
[8] G. An, "Introduction of an agent-based multi-scale modular architecture
for dynamic knowledge representation of acute inflammation," Theoret-
ical Biology and Medical Modelling, vol. 5(1), 2008.
[9] AM. Bailey,BC. Thorne,SM. Peirce, "Multi-cell agent-based simulation
of the microvasculature to study the dynamics of circulating inflamma-
tory cell trafficking," in Annals of biomedical engineering, vol. 5(6),
2007, pp. 916-936.
[10] M. Girvan, ME. Newman, "Community structure in social and biological
networks," in Proceedings of the national academy of sciences, vol.
99(12), 2002, pp. 7821-7826.
[11] ME. Newman, "Detecting community structure in networks," The Eu-
ropean Physical Journal B., vol. 38(2), 2004, pp. 321-330.
[12] V. Grimm ,E. Revilla, U. Berger, F. Jeltsch, WM. Mooij, SF. Railsback,
HH. Thulke, J. Weiner, T. Wiegand, DL. DeAngelis, "Pattern-oriented
modeling of agent-based complex systems:
lessons from ecology,"
Science, vol. 310(5750), 2002, pp. 987-991.
[13] P. Calabrese, D. Shibata, "A simple algebraic cancer equation: calculat-
ing how cancers may arise with normal mutation rates," BMC Cancer,
vol. 10(1), 2010.
[14] RS. Kerbel, "Tumor Angiogenesis," New England Journal of Medicine,
vol. 358(19), 2008, pp. 2039-2049.
[15] E. Vidal, F.Thollard, C. De La Higuera, F.Casacuberta, RC. Carrasco,
"Probabilistic finite-state machines-part I," IEEE transactions on pattern
analysis and machine intelligence, vol. 27(7), 2005, pp. 1013-1025.
[16] E. Vidal, F.Thollard, C. De La Higuera, F.Casacuberta, RC. Carrasco,
"Probabilistic finite-state machines-part II," IEEE Transactions on Pat-
tern Analysis and Machine Intelligence, vol. 27(7), 2005, pp. 1026-1039.
[17] C. Jolly, P. Van Loo, "Timing somatic events in the evolution of cancer,"
Genome biology, vol. 19(1), 2018.
[18] A. Bulu, H. Meyerhenke, I. Safro, P. Sanders, C. Schulz, "Recent
Advances in Graph Partitioning," Algorithm Engineering, Springer,
Cham, 2016, pp. 117-158.
[19] Lc. Freeman, "A set of measures of centrality based on betweenness,"
Sociometry, vol. 1, 1977, pp. 35-41.
[20] DF. Quail, JA. Joyce, "Microenvironmental regulation of tumor progres-
sion and metastasis," Nature medicine, vol. 19(11), 2013.
[21] Aric A. Hagberg, Daniel A. Schult and Pieter J. Swart, "Exploring net-
work structure, dynamics, and function using NetworkX," in Proceedings
of the 7th Python in Science Conference (SciPy), 2008, pp. 1115.
[22] P. Knzli, JL. Falcone, E. Rossi, P. Albuquerque, Chopard B., "HPC Mul-
tiscale Simulation of Transport and Aggregation of Volcanic Particles,"
in 17th International Symposium on Parallel and Distributed Computing
(ISPDC), 2018, pp. 25-32.
[23] O. ys, J. Stelling, "Genome-scale metabolic networks in time and space,"
Current Opinion in Systems Biology, vol. 1(8), 2018, pp. 51-58.
[24] A. Goodspeed, LM. Heiser, JW. Gray, JC.Costello, "Tumor-derived cell
lines as molecular models of cancer pharmacogenomics," Molecular
Cancer Research, vol. 14(1), 2016, pp. 3-13.
[25] S. Wuchty, E. Ravasz, AL. Barabsi, "The architecture of biological
networks," Complex systems science in biomedicine, Springer, Boston,
MA, 2006, pp. 165-181.
|
1602.06731 | 1 | 1602 | 2016-02-22T11:23:26 | Decentralised Norm Monitoring in Open Multi-Agent Systems | [
"cs.MA",
"cs.GT"
] | We consider the problem of detecting norm violations in open multi-agent systems (MAS). We show how, using ideas from scrip systems, we can design mechanisms where the agents comprising the MAS are incentivised to monitor the actions of other agents for norm violations. The cost of providing the incentives is not borne by the MAS and does not come from fines charged for norm violations (fines may be impossible to levy in a system where agents are free to leave and rejoin again under a different identity). Instead, monitoring incentives come from (scrip) fees for accessing the services provided by the MAS. In some cases, perfect monitoring (and hence enforcement) can be achieved: no norms will be violated in equilibrium. In other cases, we show that, while it is impossible to achieve perfect enforcement, we can get arbitrarily close; we can make the probability of a norm violation in equilibrium arbitrarily small. We show using simulations that our theoretical results hold for multi-agent systems with as few as 1000 agents---the system rapidly converges to the steady-state distribution of scrip tokens necessary to ensure monitoring and then remains close to the steady state. | cs.MA | cs |
Decentralised Norm Monitoring in Open
Multi-Agent Systems
Natasha Alechina
University of Nottingham
[email protected]
Joseph Y. Halpern∗
Cornell University
[email protected]
Ian A. Kash
Microsoft Research
[email protected]
Brian Logan
University of Nottingham
[email protected]
Abstract
We consider the problem of detecting norm violations in open multi-agent sys-
tems (MAS). We show how, using ideas from scrip systems, we can design mech-
anisms where the agents comprising the MAS are incentivised to monitor the ac-
tions of other agents for norm violations. The cost of providing the incentives is
not borne by the MAS and does not come from fines charged for norm violations
(fines may be impossible to levy in a system where agents are free to leave and
rejoin again under a different identity). Instead, monitoring incentives come from
(scrip) fees for accessing the services provided by the MAS. In some cases, perfect
monitoring (and hence enforcement) can be achieved: no norms will be violated in
equilibrium. In other cases, we show that, while it is impossible to achieve perfect
enforcement, we can get arbitrarily close; we can make the probability of a norm
violation in equilibrium arbitrarily small. We show using simulations that our
theoretical results hold for multi-agent systems with as few as 1000 agents -- the
system rapidly converges to the steady-state distribution of scrip tokens necessary
to ensure monitoring and then remains close to the steady state.
1
Introduction
Norms have been widely proposed as a means of coordinating and controlling the be-
haviour of agents in a multi-agent system (MAS). Norms specify the behaviours that
agents should follow to achieve the objectives of the MAS. For example, the designer
of a system to allow agents to post content (invitations to tender for work, prices of
goods or services, etc.) may wish to ensure that the content posted is relevant, accurate
and up to date.
∗Supported in part by NSF grants IIS-0534064, IIS-0812045, IIS-0911036, and CCF-1214844, and by
AFOSR grants FA9550-08-1-0438, FA9550-09-1-0266, and FA9550-12-1-0040, and ARO grant W911NF-
09-1-0281.
1
In a MAS where norms must be enforced, the responsibility for enforcing norms
lies with a system component termed the normative organisation [Dastani et al., 2009],
which continuously monitors the actions of the agents (and perhaps carries out other
tasks on behalf of the MAS). If an action (or the state resulting from an action) would
violate or violates a norm, the action is either prevented, or the agent that performed
the action is penalised (incurs a sanction). The effective monitoring of agent actions
is therefore key to enforcing norms in a MAS. However, in large systems with many
agents, maintaining a separate component to monitor the actions of the agents may
involve significant overhead for the MAS.
In this paper, we propose an approach to norm monitoring in open multi-agents
systems in which the monitoring of agent actions is performed by the agents comprising
the MAS. We term this decentralised monitoring. We focus on norms which prohibit
certain actions (or the resulting state), for example, posting irrelevant or inaccurate
content may be prohibited. The novelty of our approach is that the MAS does not
need to bear the cost of paying for monitoring; at the same time we do not need to
assume that fines can be levied on the agents who violate the norms and used to pay
for monitoring, as done by Fagundes et al. [2014]. The latter assumption does not hold
for many open systems where the agents can always leave the system and, if needed,
rejoin it later under a different identity. Hence, a key issue for our approach is how
to incentivise the agents to monitor the actions of other agents. We show how, using
ideas from scrip systems [Friedman et al., 2006], we can design incentive-compatible
mechanisms where the agents do the monitoring themselves. We can think of scrip
as "virtual money" or "tokens". Performing an action costs a token, and detecting
violations is rewarded with tokens. The main difference between our setting and that of
[Friedman et al., 2006] is that the agents are not always rewarded after they monitor, but
only if they discover a violation. This requires a non-trivial adaptation of the techniques
developed in [Friedman et al., 2006].
We consider two settings. In the first, the inadvertent setting, actions that violate a
norm are assumed to be inadvertent or unintentional: violating a norm does not increase
an agent's utility. In the second, the strategic setting, actions that violate the norm
are intentional: violating the norm increases the agent's utility, and an agent chooses
whether to try to violate the norm. We describe a mechanism that achieves perfect
enforcement in the inadvertent setting; in equilibrium, all actions are monitored and
hence there are no violations of the norm. In the strategic setting, we prove that there
can be no equilibrium with perfect enforcement. However, the probability of violations
can be made arbitrarily small: for all > 0, we can design a mechanism where, in
equilibrium, the probability of violations is . We show how all the key steps in our
mechanisms can be decentralised, and how our ideas can be extended to open systems,
where agents may enter and leave the system at any time. We also consider robustness,
and show that the mechanisms we propose are m-resilient: no coalition of up to m
agents can increase their utility through collusion. Finally, we show using simulations
that our theoretical results hold for multi-agent systems with as few as 1000 agents. In
particular, we show that the system rapidly converges to the steady-state distribution of
scrip tokens necessary to ensure monitoring and then remains close to the steady state.
2
2
Incentivising Monitoring
In this section we outline the simple scenario that we use as a running example through-
out the remainder of the paper.
We consider a MAS where agents want to post content on the web. There are
norms regarding what may be posted; for example, copyrighted images should not be
posted, and comments should not be abusive or defamatory. We assume that agents
may occasionally submit posts that violate the norm. If such content appears on the
web, the MAS loses significant utility (e.g., it can be fined or sued). Note that here
we are viewing the MAS as a whole as an entity that can be fined or sued for norm
violations, and which may incur the computational costs associated with monitoring
for violations (and hence can gain and lose utility).
It is therefore in the MAS's interest that submitted posts are checked for compliance
with the norm before they appear on the web. We assume that it is possible to check
objectively if a particular item of content violates the norm. (For simplicity, we assume
that if a post that violates the norm is checked, the violation will be detected. We
can easily modify our approach to handle the case where there is some probability ρ
of the violation being caught.) Checking whether a post is 'bad' (violates the norm)
requires some work, and incurs a small utility cost. Although checking requires some
resources, we assume that if a violation is found, evidence of the violation can be
provided that can be checked in negligible time (so we do not need to deal with disputes
about whether content violates the norm). If the content does violate the norm, the post
is discarded and no violation occurs. We assume a basic infrastructure that ensures that
content posted by an agent is signed, and that the digital signatures can be trusted. The
signature identifies the agent id, and is interpreted as a statement by the agent that the
content posted conforms to the norm. Note however, that the infrastructure does not
itself enforce the norm; it serves only to ensure auditability. We believe that such a
separation of concerns is good design: the same basic infrastructure may be used by
different systems with different norms.
There is a system-level objective that content conform to the norm, but since the
cost to the MAS to check all posts may be prohibitive, we would like to distribute
the monitoring of posts among the agents that use the system. Just as for the MAS,
monitoring incurs a small negative utility for an agent. This means that agents must be
appropriately incentivised to monitor. It should be clear that the ideas exemplified by
this scenario are applicable far more broadly.
We formalise the posting and monitoring of content for norm violations as a non-
cooperative game. This scenario (and the resulting game) is similar to the scenario
considered by Friedman et al. [2006], but differs in several key respects. Friedman et
al. assume that some agent requests a service (e.g., downloading a file), and the problem
is to incentivise provision of the service; if the service is not provided, the requesting
agent will not be satisfied. Here, it is not necessary that each post be monitored for the
posting agent to be satisfied. We assume that, if no agent monitors, it is possible for
the posting agent to post and benefit from it; however, a norm violation may be missed.
This difference turns out to be not so significant. A more significant difference is that,
in our setting, a post may violate the norm. This has no analogue in the setting of
Friedman et al., and does complicate matters, as we shall see. Despite this, many of the
3
ideas used by Friedman et al. [2006] can be used in our setting. In particular, we adopt
the idea of using tokens as payment for posting and as a reward for monitoring. In
order to post, an agent must pay one token; finding a bad post is rewarded by receiving
one or more tokens as payment. This encourages agents to volunteer to monitor posts.
The exact mechanisms and amounts are discussed below.
We consider two scenarios, one in which bad posts are unintentional, and one in
which they are strategic. These correspond to different games. We formalise these two
scenarios and our approach for dealing with them in the next two subsections.
2.1 Unintentional Violation
In this scenario, bad posts happen with a constant probability b, but agents are unaware
that they are violating the norm when they post something inappropriate. For technical
reasons, we assume that b is a rational number (our results hold as long as we use
a sufficiently good approximation to the true probability, so this assumption is really
without loss of generality). The game in the inadvertent scenario is described by the
following parameters:
• a finite set of n agents 1, . . . , n;
• the time between rounds is 1/n;1
• at each round t an agent is picked at random to submit a post (we implicitly
assume that agents always have something that they want to post);
• probability of a post being bad: b;
• utility of posting (to the agent doing the posting): 1 (independent of whether
what is posted violates the norm);
• disutility of monitoring (to the agent doing the monitoring): −α (where 0 < α <
1);
• discount rate: δ ∈ (0, 1).
The game runs forever. As is standard in the literature, we assume that agents discount
future payoffs. This captures the intuition that a util now is worth more than a util
tomorrow, and allows us to compute the total utility derived by an agent in the infinite
game. We have assumed for simplicity that the system is homogeneous: all agents
get the same utility for posting (1), the same disutility for monitoring (−α), have the
same probability of being chosen to post something (1/n), and have the same discount
factor (δ). Using ideas from [Kash et al., 2012], we can extend the approach discussed
here to deal with different types of agents, characterised by different parameters. Some
agents may want to post more often; other agents may be less patient (so have a smaller
discount rate); etc.
We need some additional notation to describe what happens:
• pt ∈ {1, . . . , n} is the agent chosen to submit a post in round t;
1The assumption that the time between rounds is 1/n, which also made by Friedman et al.
[2006],
makes the analysis easier. It guarantees that, on average, each agent wants to post one message per time unit,
independent of the total number of agents.
4
• vt ∈ {0, . . . , n} \ {pt}; vt = j if agent j (cid:54)= pt is chosen to monitor in round t,
and vt = 0 if no one is chosen to monitor at round t;
• f t ∈ {0, 1}; f t = 0 if the content posted in round t is good, f t = 1 if it is bad.
Given that good and bad posts have the same utility (1), the utility of an agent i in
1
ut
i =
−α if vt = i;
otherwise.
0
round t is:
if i = pt and either vt = 0 or f t = 0;
Thus, an agent gets utility 1 at round t if it is chosen to submit a post (pt = i), and
either the post is not monitored (vt = 0) or it does not violate the norm (f t = 0). Given
the discount factor δ, the total utility Ui for agent i is Σ∞
So now the question is how to incentivise monitoring. The key idea is to use tokens
as payment for posting and as a reward for monitoring. Note that the number of tokens
that an agent has does not affect the agent's utility. However, if an agent requires a
token to post something, the number of tokens that an agent has does have an indirect
impact on utility; if the agent has no tokens, then it will not be able to post anything,
and thus will forego the opportunity to get utility 1.
i.
t=0δt/n ut
Agents are rewarded with tokens only if they detect a bad post. We argue below
that in order for the system to function successfully (agents being able to post, and
some agents always available for monitoring), the 'right' amount to pay for finding a
bad posting is 1/b.2 This means, in expectation, an agent gets one token for finding a
bad posting. Thus, the price of a posting is equal to the expected cost of checking a
posting.
Paying agents 1/b for finding a bad posting makes the situation similar to that
in [Friedman et al., 2006], where the agent wanting work done pays one token, and
the agent doing the work gets one token. However, the fact that in the current setting
payment is made only if a problem is found complicates matters. An expected payment
of 1 token is not equivalent to an actual payment of 1 token! To understand the issue
here, note that the most obvious way to deal with the payment of tokens is to have the
agent who wants to post pay one token to the normative organisation, and then have
the normative organisation pay 1/b tokens to the monitor if a violation is detected. But
there are problems with this approach. If monitors have a long run of "bad luck" and
do not find postings that violate the norm, there will be very few tokens left in the
system; on the other hand, if monitors get lucky, and find quite a few postings that
violate the norm, the normative organisation will end up pumping quite a few tokens
into the system. As pointed out by Friedman et al. [2006], having both too few or too
many tokens in the system will cause problems. Intuitively, with too many tokens in
the system, (almost) everyone will have plenty of tokens, so no one will volunteer to
monitor; with too few tokens in the system, it will often be the case that the agent who
wants to post will not have a token to pay for it.3 This problem does not occur in the
2We are implicitly assuming that tokens are divisible into units such that it is possible to transfer 1/b
tokens.
3The situation would be even worse if the payment for detecting a violation were different from 1/b; then
after some time there would certainly be too few or too many tokens in the system.
5
setting of Friedman et al. [2006], because there, the payment of person doing the work
always matched exactly the payment received by the person doing the work.
We deal with this problem by having the agents rather than the normative organi-
sation perform the role of the "bank". When agent i wants to post, it pays a randomly
chosen agent who has fewer than the maximum number of tokens allowed (see below)
1 token; if an agent j monitors and finds a violation, a randomly chosen agent with at
least 1/b tokens gives j 1/b tokens. This ensures that the number of tokens in 'circu-
lation' remains constant. (Note also that a randomly chosen agent pays the monitoring
agent 1/b tokens if there is a violation; this allows agents to post as long as they have a
single token.)
We assume that all agents follow a threshold strategy when deciding whether to
monitor. There is a fixed threshold k such that agents volunteer iff they have fewer
than k tokens.
It is easy to see that there is an equilibrium in threshold strategies
if everyone uses a threshold of 0. In that case, no one ever volunteers to monitor a
posting, so everyone gets to post, without monitoring. Of course, no agent has any
incentive to deviate from this strategy. On the other hand, this equilibrium is rather bad
from the point of view of the MAS. We are thus interested in nontrivial equilibria in
threshold strategies, where everyone uses a threshold k > 0.
Friedman et al. [2006] show that, in their setting, there is a nontrivial equilibrium in
threshold strategies; more precisely, for all > 0, there exists a δ sufficiently close to
1 and a threshold k such that as long as the discount factor is at least δ, all agents using
a threshold of k is an -Nash equilibrium: no agent can gain more than by deviating.
We can get a similar result in our setting, using the banking idea above, where the
maximum number of tokens any agent may have is k + 1/b. To summarise, if an agent
i has at least one token and is chosen to submit a post (i = pt), pt gives a randomly
chosen agent with fewer than k + 1/b tokens one more. The posting agent pt than asks
for volunteers to act as monitor. All agents with fewer than k tokens volunteer. If at
least one agent volunteers, one, vt, is chosen at random to act as monitor. If vt confirms
the post conforms to the norm, it is posted. If vt detects a violation of the norm, then
the post is discarded, and a randomly chosen agent with at least 1/b tokens gives vt
1/b tokens.
Theorem 1: For all > 0, there exist a δ sufficiently close to 1 and an n sufficiently
large such that if all n agents have a discount factor δ(cid:48) ≥ δ, then there exists a k
such that the mechanism above with all agents using a threshold of k is an -Nash
equilibrium.
The proof of Theorem 1 is similar in spirit to that of Friedman et al. [2006]. A
proof sketch can be found in Section 6.
Note that in the equilibrium the existence of which is stated in Theorem 1, we get
perfect enforcement; all bad posts will be detected. Although the theorem applies only
if δ is "sufficiently close to 1" and n is "sufficiently large", simulations (reported in
Section 3) show that, in practice, the distribution of tokens is reasonably stable with n
as small as 1000.4 These simulations also show that, rather than having one randomly
4In fact, simulations show that even with 100 -- 1000 agents, performance is in a range that seems quite
tolerable in practice.
6
chosen agent pay 1/b tokens if a violation is discovered, we can have (cid:100)1/b(cid:101) randomly
chosen agents pay 1 token each. The latter approach may be more acceptable in some
systems.
2.2 Strategic Violation
We now consider the scenario of strategic violation. In this scenario, we assume when
an agent is chosen to submit a post, it can either submit something good (i.e., that does
not violate the norm) or something bad. The parameters of the game are the same as
in Section 2.1, except that there is no longer a probability b of a posting being bad (the
quality of a posting now becomes a strategic decision), and the utility of a bad posting
is no longer 1, but κ > 1. (We must assume κ > 1 here, otherwise no agent would ever
post anything bad: the utility of doing so is no higher than that of posting something
good, and the violation may be detected.)
As before, monitoring agents get paid only if they find a bad post. With these
assumptions, it is not hard to show that there does not exist an equilibrium with perfect
enforcement.
Theorem 2:
perfect enforcement.
In the setting of strategic violations, there can be no equilibrium with
Proof: Suppose, by way of contradiction, that there is an equilibrium with perfect
enforcement. In this equilibrium, all attempts to make a bad posting are caught. Thus,
no agent will use a strategy that gives a positive probability to making a bad posting,
for that agent would get higher utility by posting something good instead of something
bad. But then no agent would monitor. Even if an agent volunteers to monitor, the
agent would just claim that no violations were found without actually monitoring (since
monitoring costs −α in utility, and there would be no violations to catch). But if there
is no actual monitoring, then agents should deviate and make bad postings, since they
will not be caught.
Although we cannot achieve perfect enforcement in the strategic setting, we can
achieve the next best thing: we can make the probability of a bad posting as low as
we want. More precisely, for all , (cid:48) > 0, there is an -Nash equilibrium such that the
probability of a bad post is (cid:48).
The idea now is that, with some probability, a submitted post will not be checked;
there will be no attempt to get volunteers to monitor that posting. Let ct = 0 if there
is no monitoring in round t; ct = 1 otherwise. The decision regarding whether to
monitor is made after the poster submits their post (otherwise, the agent chosen to post
will always post something bad in round t if ct = 0). If ct = 0, then whatever the
poster submits is posted in that round, whether it is good or bad. As before, if an agent
submits a bad post and there is monitoring, we assume that the bad post definitely will
be detected and discarded, so the posting agent gets utility 0 in that round. The utility
7
of agent i in round t now becomes
if i = pt and f t = 0;
if i = pt, f t = 1, and either ct = 0
or ct = 1 and vt = 0;
1
κ
−α if i = vt;
otherwise.
0
ut
i =
Suppose that the normative organisation decides that postings will be monitored
with probability 1 − 1/κ. Further suppose that an agent uses a randomised algorithm:
with probability β it submits a good posting, and with probability 1 − β it submits a
bad posting. Note that the agent's expected payoff is then β + (1 − β)(1/κ)κ = 1,
independent of β. Thus, we get an equilibrium in the single-shot game if monitoring
occurs with probability 1− 1/κ and agents submit bad postings with probability β, for
all choices of β, provided that there is always guaranteed to be a monitor available. We
will show that again there is an equilibrium in threshold policies. As long as there are
not too many tokens in the system, there are bound to be some agents with fewer than
the threshold number of tokens, so there will be a volunteer.
We assume the designer of the MAS specifies a value β∗ (which, intuitively, should
be a small 'tolerable' probability of a violation occurring).
If a monitor that finds
a problem is paid 1/β∗ tokens, then essentially the same type of mechanism as that
proposed for the case of unintentional violations will work, provided that we get bad
postings with probability exactly β∗. So, perversely, in this setup, while all strategies
are equally good for the poster, the MAS actually wants to encourage agents to post
something bad with probability β∗, so that monitors again get an expected payment
of 1 token. The way to do this is for the normative organisation to announce that it
will track the number of bad postings, and if the fraction of postings that have been
bad up to round t is β, checks will happen with probability 1 − β∗/(βκ). Thus, if
β = β∗, then checks happen with probability 1 − 1/κ, and we have an equilibrium.
Moreover, the payment (1/β tokens) is exactly what is needed to ensure that, in equi-
librium, monitoring occurs with probability β∗. For if β < β∗, then the check will
happen with probability less than 1 − 1/κ, which means that agents will want to make
more bad posts. On the other hand, if β > β∗, then monitoring will happen with prob-
ability greater than 1 − 1/κ, and agents will want to make fewer bad posts. Thus, in
equilibrium, we get bad posts with probability exactly β∗.
To summarise, we have the following mechanism, given a threshold k. If an agent
is chosen to post, it submits bad content with probability β∗ and good content with
probability 1 − β∗. After the agent has decided what to post and made the posting
available, the normative organisation decides whether the posting will be monitored.
For an initial period (say 1,000 rounds), a posting is monitored with probability 1 −
1/κ; afterwards, if the fraction of postings that have been discovered to be bad due
to monitoring is β and β is more than (say) two standard deviations from β∗, then
monitoring occurs with probability 1 − β∗/(βκ). If the decision has been made to
monitor, and the posting agent has at least one token (so that a post can be made), the
posting agent asks for volunteers and all agents with fewer than k tokens volunteer to
monitor and one is chosen to be the monitor. As in the case of unintentional violations,
if at least one agent volunteers, then the posting agent gives a randomly chosen agent
8
with less than k + 1/β∗ tokens one more. If the monitor approves the posting, it is
posted. If the monitor finds a problem with the posting, then a randomly chosen agent
with at least 1/β∗ tokens gives the monitor 1/β∗ tokens.
Theorem 3: For all > 0, there exist a δ sufficiently close to 1 and an n sufficiently
large such that if all n agents use a discount factor δ(cid:48) ≥ δ, then there exists a k such that
the mechanism above with all agents using a threshold of k is an -Nash equilibrium.
A proof sketch can be found in Section 6.
of a bad posting is β∗, as desired.
Note that, in the equilibrium whose existence is stated in Theorem 3, the probability
2.3 Optimising Social Welfare
In this section, we expand our analysis to include the utility of the MAS, and show how
social welfare can be maximised by controlling the number of tokens in the system.
Suppose that the MAS gets utility −C (where C > 0) for each norm violation. In
the setting where bad posts are inadvertent, if there is no monitoring, the MAS suffers
an expected loss of utility of bC in each round and the remaining players get 1 unit
of utility in each round (because a post is never discarded), so all the agents in the
system get an expected utility of 1 − bC per round. With monitoring, if we assume for
simplicity that an agent always has a token when it wants to post something and there
is always a volunteer to monitor, players get a total expected utility of 1 − b − α per
round. Thus, as long as C > (b + α)/b, we maximise social welfare by monitoring.
This analysis doesn't change if occasionally an agent does not have a token to pay for
a posting.
In the strategic setting, without monitoring, players will always post inappropriate
material, so the total utility will be κ − C per round.5 With monitoring, assuming
agents post something bad with probability β∗, as we have seen, the expected utility
of an agent who makes a posting is 1 (independent of β∗, so the total expected utility
in each round is 1 − (1 − 1/κ)α. So monitoring increases social welfare if C >
κ − 1 + (1 − 1/κ)α.
Although we have taken the MAS to be a separate entity with its own utility, in
some cases the utility of the MAS is best thought of as shared among the individual
agents posting content (e.g., in the case of a community or collaboratively maintained
website). In this case, we can assume that the players collectively bear the costs of a
bad posting. It is then certainly reasonable to assume that monitoring increases social
welfare; otherwise the players would simply not bother. But even if the MAS is really
an independent entity, whether or not monitoring increases social welfare, the MAS
can ensure the monitoring equilibrium is the one that occurs by simply posting this
equilibrium and asking agents to play it. As long as sufficiently many agents play it
(where "sufficiently many" means that there are enough to ensure that there will always
be a monitor), then no agent gains by deviating. Posting the equilibrium is also useful
if new agents join the system (see Section 2.5). Note that the MAS can always threaten
to shut down if there is no monitoring (which would be in its best interests). Given
5Of course, the utility of an inappropriate post may decrease if everyone is posting such material.
9
that, in the remainder of the discussion, we assume that agents play an equilibrium
with monitoring.
Social welfare is then maximised if, every time an agent is chosen to submit a post,
it has a token to pay for posting and there is an agent who is willing to volunteer to act
as a monitor. Friedman et al. [2006] show that, in their setting, social welfare depends
completely on the average number of tokens per agent. Social welfare increases mono-
tonically as the average number of tokens per agent increases, until it reaches a critical
point. The key point is that the threshold used in equilibrium decreases as the average
number of tokens per agent increases. The critical point is the one where the average
number of tokens per agent is equal to the threshold. At this point, no one is willing to
volunteer, so social welfare drops immediately to 0.
Essentially the same arguments apply in our setting, although we need to be a
In the setting of Friedman et al., after an initial period, no agent has
little careful.
more than the threshold number of tokens (since once they hit the threshold, they stop
volunteering). In our setting, since an agent can receive 1/b tokens (or 1/β∗ in the case
of strategic violations) in one round by discovering a violation, the maximum number
of tokens than an agent can have is not k, but k + 1/b (or k + 1/β∗), where k is the
threshold. As long as the average number of tokens per agent is less than k−(k−1)/n,
then there is always guaranteed to be a volunteer. Thus, social welfare is maximized if
the average number of tokens per agent, a, is as large as possible, while still being less
than k − (k − 1)/n, where k is the equilibrium threshold corresponding to a, since a
higher average increases the likelihood that an agent who is chosen to post can make a
posting.
2.4 Minimising the Role of the Normative Organisation
Although, using our mechanisms, the normative organisation no longer has to monitor
postings, it still has a role to play. The normative organisation:
• keeps track of the agents in the system (this is needed to ensure that all agents
are aware of a call for volunteers);
• chooses an agent at random with fewer than k + 1/b (or k + 1/β∗) tokens to
receive a token from the agent posting;
• choses an agent at random with at least 1/b (or 1/β∗) tokens to pay the monitor
if the monitor detects a bad posting;
• keeps track of the number of bad postings and decides whether checking should
be carried out in a given round in the mechanism for strategic violations.
There is actually no need for the normative organisation to do any of these things;
we can distribute its role among the agents in the system. It is easy for the agents
to maintain a list of the agents in the system (think of this as a large email list). Of
course, it will have to be updated whenever an agent enters or leaves the system (see
also Section 2.5).
Choosing an agent at random from among a group of agents to receive a token from
a posting agent, to monitor, or pay for finding a bad post can be done in an incentive-
compatible way (i.e., in a way that no agent has any incentive to deviate) using the
10
leader-election algorithm of Abraham et al. [2013]. Choosing a leader among a set of
players is equivalent to choosing one monitor among a set of volunteers. In equilibrium,
the algorithm of [Abraham et al., 2013] results in each player having an equal chance
of being chosen.
To handle the banking process, we can assume that each agent keeps track of how
many tokens each agent has. All the transactions can be announced publicly (i.e., who
is chosen at random to make a posting, who is chosen at random to get one token, etc.),
so everyone can update the amounts appropriately. (We can minimise the communica-
tion required by having only a small subset of agents keep track of how many tokens
each agent has, or by distributing the role of the bank, so that each agent keeps track
of the amounts held by only a few other agents [Vishnumurthy et al., 2003], but the
overhead seems low in any case.)
The leader-election algorithm of Abraham et al. can also be used to decide whether
checking should be carried out in a given round in the second mechanism. To see
how this works, first suppose that κ is an integer that is at most n. Choose a subset
of κ agents, including agent 1. There is monitoring if the leader chosen among the
κ players is not agent 1. This guarantees that checking is done with probability 1 −
1/κ. We can easily modify this algorithm to compute any rational probability. If the
detection of a bad post is announced publicly, agents can also keep track of the number
of bad postings in the mechanism for strategic violation case, so that the probability of
checking can be modified if needed.
2.5 Open Systems
We assume that our system is open; agents can enter and leave at any time. Dealing
with agents leaving is straightforward: they are just deleted from the list of players.
Noticing that an agent has left is also straightforward: an agent who does not attempt
to make a posting when it is chosen to submit a post, or does not pay tokens to a monitor
that detects a bad post when it is chosen to, will be assumed to have left. In the latter
case, a new agent can be chosen to make a payment by rerunning the leader election
algorithm.
Dealing with agents entering is almost as straightforward. We assume that there
is a url where agents can post a message saying that they wish to join. They are then
automatically added (by all agents) to the list of members. As in Friedman et al. [2006],
we assume that a new agent starts out with no tokens, so new entrants to the system
cannot post anything. This prevents an agent from joining the system, not doing any
monitoring until it runs out of tokens, then leaving the system and rejoining under a
different identity. New entrants can acquire tokens by monitoring, or by receiving one
token at random from an agent making a post.
There is one other issue that needs to be dealt with: if the number of agents changes
significantly, the average number of tokens per agent will change. As noted in Sec-
tion 2.3, this can have an effect on social welfare. To deal with this, we apply an idea
suggested by Friedman et al.: we choose a factor F , and multiply the number of tokens
that each agent has by F . The factor F is chosen so as to make the average number
11
of tokens close to the threshold again.6 As long as all the agents are keeping track of
the number of agents in the system (or can consult a public url where this information
is available) and we are using public banking, then the agents can detect if the average
number of tokens has deviated significantly from the target range, and apply the factor
F in a distributed way.
2.6 Robustness
In a Nash equilibrium, no single agent can do better by deviating. However, a coalition
may be able to do better by deviating in a coordinated way. In large systems, it seems
quite likely that coalitions may form.
Abraham et al. [2006] define a strategy profile to be m-resilient if no group of up to
m agents can increase their utility by deviating. A Nash equilibrium is just a 1-resilient
profile. It is not hard to show that our basic protocol, combined with "public banking",
where all agents keep track of how many tokens are held by each agent, is m-resilient
for all m. We assume that agents all keep track of of the number of tokens that each
agent has, and compare notes at each step. (If the number of messages exchanged is
a concern, it should suffice to compare notes far less often.) If there is disagreement
between any pair of agents, then the system simply stops. Clearly, no group of agents
gains any advantage by misrepresenting the status of the bank.
We suggested that the leader-election algorithm of Abraham et al. [2013] could be
used to distribute the process of choosing a volunteer at random. This algorithm is m-
resilient for all m < n in a completely-connected network (which we have implicitly
assumed -- every agent can communicate with every other agent). Thus, we can put all
the pieces together and still get m-resilience for reasonable-sized m.
However, this resilience claim relies on the assumption that the actions and agents
are exactly those in our model. In the remainder of this section we discuss some al-
ternatives and our intuitions for how they would affect our results, but we leave a full
analysis to future work.
As pointed out by Friedman et al. [2006], if it is possible to transfer funds between
agents, yet another type of collusion is possible: coalitions can use a lower threshold
because they can "insure" each other (i.e., if one agent runs out of tokens to pay for
a posting, another agent in the coalition can loan it a token); this allows agents in the
coalition to deviate by monitoring less frequently. However, this possibility does not
arise in our setting with public banking: there is no procedure for one agent to loan a
token to another agent.
If b is relatively small (so that 1/b is large) and an agent i could somehow arrange
that another j would always be the one to check i's post (and vice versa), then i might
be tempted to deliberately make a bad posting, so that j could find it and collect 1/b.
This is not a problem for Nash equilibrium, since it requires collusion on the part
6If the desired average number of tokens is t, an obvious alternative might be to have each agent entering
the system start with t tokens. But, as pointed out by Friedman et al., this leaves the system open to a sybil
attack: a new player enters the system, makes posts, but never monitors. Once the agent runs out of tokens, it
drops out of the system and re-enters the system using a different id. This approach may be less problematic
in our setting if agents like to have their identity associated with a post, so there is some loss of utility in
leaving the system and re-entering with a new id.
12
of two agents, but it is an issue if we want to prove 2-resilience. However, as our
analysis shows, in equilibrium, there will be many volunteers, so as long as the choice
among volunteers and the choice of agent required to pay if a violation is found are
both made at random, it is not hard to show that type of deviation will not result in a
gain, no matter how large the coalition is, since probability of gaining 1/b tokens by
deliberately deviating is equal to the probability of having to pay 1/b tokens.
Another potential source of actions outside our model is asynchrony. This would
complicate our Nash equilibrium analysis, but we would not expect this to have a
significant effect on single-agent deviations. With coalitions however, more care is
needed. In particular, using the leader-election algorithm of Abraham et al. [2013] is
only m resilient when m < n/2 with asynchronous communication.
In practice, as pointed out by Abraham et al. [2006], we may want even more. We
may want to allow for a certain number of "irrational" or "malicious" players, who do
not to seem to be acting according to their self-interests. This may be simply because
we do not understand what motivates them; that is, we do not know their true utility
functions. It may also be because of computer or system problems, or unfamiliarity
with the system; these are agents that would act rationally if they could, but something
is preventing them from doing so. Note that our proposal for dealing with the bank-
ing system, while sufficient to guarantee m-resilience, is not even what Abraham et
al. [2006] call 1-immune: one agent who wants to bring down the system can easily do
so by lying about the status of the bank. We can deal with such "malicious" agents by
using techniqes of Byzantine agreement [Fischer, 1983] to get agreement on the bank
status, as long as fewer than one-third of the agents are malicious. Indeed, if there is
a public-key infrastruture, so that cryptography is available, we can actually use tech-
niques of Byzantine agreement to handle an arbitrary number of malicious agents.
While we think that other aspects of our system are quite robust, and will degrade
gracefully in the presence of such irrational or malicious behaviour, we do not have
a formal proof. This is a topic that we believe deserves further exploration, since
robustness is an important property in practice.
3 Simulations
In this section, we use simulations to quantitatively evaluate the reasonableness of our
theoretical results. In particular, we show that the system is well behaved with as few
as 1000 agents, converging to the steady-state distribution of tokens quickly and then
staying close to it. We also examine an alternative version of our system where we take
the payment of 1/b tokens from 1/b random agents rather than all from a single agent.
We report here results of simulations where there are twice as many tokens as agents
(so the average number of tokens per agent -- shown to be a key parameter in [Friedman
et al., 2006] -- is two), agents used a threshold of k = 5, and, in the inadvertent setting,
the probability of a bad posting is b = 0.2. (These choices are arbitrary; similar results
hold for other settings of the parameters.) Results below refer to the notion of closeness
of distributions of tokens. We represent each distribution as a vector that indicates the
fraction of agents with each amount of tokens and then calculate the Euclidean distance
between those vectors. We elected to use Euclidean distance to be consistent with prior
13
work [Friedman et al., 2006]. The claims below remain true for a variety of reasonable
notions of closeness of distributions.
Figure 1 shows the results of starting the system near the steady-state distribution
of tokens predicted by the theory and then running the system for 1 million rounds.
It shows that the system stays quite close to the steady-state distribution with as few
as 1000 agents. For larger numbers, the system is even closer. With larger numbers
of agents, this simulation results in fewer rounds per agent, but an alternate version
where we ran it for 1000 rounds per agent (omitted) produced visually indistinguishable
results.
For 100 agents (omitted), the maximal distance is 10 times larger than in Figure 1
(below 0.05 rather than below 0.005), which may still be tolerable in practice.
Figure 1: The system stays close to the steady-state distribution of tokens.
In practice, it may be more natural to start the system with some more convenient
distribution, such as every agent having the same number of tokens, rather than the
maximum-entropy distribution predicted by the theory. (See Section 6).
We simulated starting with the most extreme distribution possible (every agent has
either 0 or k + 1/b − 1 tokens) to determine how long it took to get close to the
steady-state distribution. Figure 2 shows that even in this unrealistic and extreme case,
convergence takes only a small constant number of rounds per agent.
(With these
parameters, 5 rounds per agent suffice.) Figure 3, which fixes the number of agents at
1000, shows that the required time does not rise significantly even if we ask for very
small distances.
Our model has the somewhat undesirable feature that, when a payment must be
made, all 1/b tokens are taken from a single agent. It seems more palatable to take a
single token from 1/b agents instead. However, this invalidates the technique used to
calculate the steady-state distribution of wealth. While other work has shown that it is
possible to find other ways of calculating the steady-state distribution in other settings
where the analogous assumption is not made [Humbert et al., 2011], this requires sig-
nificant effort. Our intuition strongly suggested that charging 1/b agents one token each
should have no effect on the results, although we could not find a formal proof. There-
fore, we decided to empirically validate the existence of a steady-state distribution of
tokens. To do so, we ran this alternate mechanism for 100 million steps, sampling the
14
5000100001500020000250000.0000.0010.0020.0030.004NumberofAgentsMaximumDistanceFigure 2: Convergence time to the near the steady-state distribution is a constant num-
ber of rounds per agent.
Figure 3: Convergence is fast even for very close distances.
distribution every 20000 steps, and took the sample mean as our estimate of the true
steady-state distribution. This change affected the final steady-state distribution more
than we expected. The results are shown in Figures 4 -- 7.
The blue dots in Figure 4 show the new steady-state distribution; the original dis-
tribution is described by the orange dots. The distance between these distributions is
0.152, which is two orders of magnitude larger than the variation around the steady-
state distribution that we saw Figure 1.
We verified that this is in fact the steady-state distribution by rerunning all three
simulations and calculating distances from it. The results, shown in Figures 5 -- 7, are
essentially the same. The results of this change seem positive overall: agents do not
face sudden large drops in their supply of tokens and convergence is, if anything, mod-
estly faster. There are more agents without tokens, but this could be mitigated by using
a larger number of tokens.
15
0500010000150002000025000020000400006000080000100000NumberofAgentsTimetoDistance.0010.0000.0020.0040.0060.0080.0102000300040005000EuclideanDistanceNumberofStepsFigure 4: Original and Alternate distribution of tokens.
Figure 5: The system stays close to the steady-state distribution of tokens.
4 Related Work
Our analysis of the behaviour and incentives of the token economy draws heavily on
prior work on scrip systems by Kash et al. [2006; 2012]. We adopt many of their
techniques, but extend their analysis to a variant model that applies to our setting.
Other work has shown that changing the random volunteer procedure can improve
welfare [Johnson et al., 2014] and that this approach still works if more than one agent
must be hired to perform work [Humbert et al., 2011]. Work from the systems com-
munity has looked at practical details such as the efficient implementation of a token
bank [Vishnumurthy et al., 2003].
Another strand of related work is on game-theoretic models of norm emergence.
Axelrod [1986] showed by means of simulations how norms could emerge given sim-
ple game rules where players punish each other for violations (and punish players who
don't punish violations), and a number of norm enforcement mechanisms with good
incentive properties have been analysed [Kandori, 1992; Ellison, 1994]. Axelrod's
work has been extended by Mahmoud et al. [2013] to general scenarios and to incor-
16
1from1/b1/bfrom1024680.00.10.20.30.4NumberofTokensFractionofAgents5000100001500020000250000.0000.0010.0020.0030.004NumberofAgentsMaximumDistanceFigure 6: Convergence time to the near the steady-state distribution is a constant num-
ber of rounds per agent.
Figure 7: Convergence is fast even for very close distances.
porate learning. Da Pinnick et al. [2010] proposed a distributed norm enforcement
mechanism that uses ostracism as punishment, and showed both analytically and ex-
perimentally that it provides an upper bound on the number of norm violations.
There is a significant amount of work in the MAS literature on infrastructures for
implementing normative organisations, monitoring for norm violations, and compen-
sating violations through sanctions. One common approach involves the use of addi-
tional components or agents to implement the normative organisation. For example,
Boella and van der Torre [2003] propose 'defender agents' which detect and punish
norm violations. Esteva et al. [2004] propose the use of 'governors' to monitor and
regiment message exchanges between agents; each agent is associated with a governor,
and all interactions with other agents are filtered by the governor to ensure compliance
with norms. Grizard et al. [2007], propose an approach in which a separate system of
'controller agents' monitor norm violations and apply reputational sanctions to 'appli-
cation agents' in a MAS; application agents avoid interactions with other application
agents that have low reputation, hence eventually excluding bad agents from the sys-
17
0500010000150002000025000020000400006000080000NumberofAgentsTimetoDistance.0010.0000.0020.0040.0060.0080.01020002500300035004000EuclideanDistanceNumberofStepstem. Modgil et al. [2009] propose a two-layer approach, in which 'trusted observers'
relay observations of states of interest referenced by norms to 'monitor agents' re-
sponsible for determining whether a norm has been violated (a similar approach is
described by Criado et al. [Criado et al., 2012]). Hubner et al. [2010] describe an ap-
proach in which 'organizational agents' monitor interactions between agents mediated
by 'organizational artifacts'. Balke et al. [2013] have used simulation to investigate the
effectiveness and costs of paying 'enforcement agents' to monitor norm violations in
a wireless mobile grid scenario; the mechanism they propose for rewarding enforce-
ment agents results in a cost to the MAS (in their setting, the telecommunications
company), and they assume sanction-based enforcement (agents who violate the norm
are punished by the telecommunications company). Testerink et al. [2014] consider
the problem of monitoring and enforcement by a network of normative organisations
in which each normative organisation has only partial information about the actions of
the agents and is capable of only local enforcement (by sanctioning).
These approaches are distributed, but the responsibility for monitoring still lies
with the normative organisation, and the cost of monitoring is borne by the MAS,
either in the cost of running additional system components which monitor and regulate
interactions (e.g., [Boella and van der Torre, 2003; Esteva et al., 2004]) or by paying
some agents to monitor the rest (e.g., [Balke et al., 2013]). Fagundes et al. [2014] have
explored the tradeoff between the efficiency and cost of norm enforcement in stochastic
environments, to identify scenarios in which monitoring can be funded by sanctions
levied on violating agents while at the same time keeping the number of violations
within a tolerable level. However, in an open multi-agent system, approaches in which
norm enforcement is based on sanctioning (e.g., [Grizard et al., 2007; Testerink et
al., 2014]) may be susceptible to sybil attacks; sanctioned agents may simply leave
the system and rejoin under a different id. In contrast, in our approach, the cost of
monitoring is borne by the agents using the MAS. Moreover, agents cannot benefit by
dropping out and rejoining the system, and monitoring is m-resilient against collusion
by monitoring agents.
5 Conclusion
We propose an approach to norm monitoring and show that, for sufficiently large MAS,
perfect monitoring (and hence enforcement) can be achieved when violations are in-
advertent. When violations are strategic, the probability of a norm violation can be
made arbitrarily small. This is achieved at no cost to the MAS and without assuming
that fines can be used to pay for monitoring. Instead, we achieve perfect or near per-
fect enforcement using techniques adapted from scrip systems [Friedman et al., 2006].
Our approach is limited to monitoring norms which forbid single actions (or result-
ing states). In contrast, approaches such as [Esteva et al., 2004; Modgil et al., 2009;
Hubner et al., 2010] are capable of monitoring conditional norms which specify com-
plex behaviours, such as multi-step protocols. We leave extending our approach to such
conditional norms to future work.
18
6 Appendix: Sketch of Proof of Theorems 1 and 3
In the setting of Friedman et al. [2006] (denoted FHK in this section), there is someone
who wants work done and an agent who is willing to do it. The agent who wants work
done gives a token to the agent willing to do it (chosen among volunteers, just as in our
setting). In our setting, there is an agent who wants to post something; it plays the same
role as the agent who wants work done in the FHK system. But now the posting agent
gives a token to a random agent, and the agent performing work (monitoring) gets paid
only if he detects a problem. Moreover, it is not paid by the agent doing the posting,
but by a random agent; and it is not paid one token, but 1/b (or 1/β∗) tokens. While
these seem to be significant differences, the argument used by FHK to prove that there
exists an equilibrium in threshold strategies goes through almost without change.
We briefly sketch the key features of the FHK argument here, and the differences in
our setting. Suppose that all players are following a threshold strategy with threshold
k. What is the best response for a given agent? In particular, when should the agent
volunteer?
Clearly, the one thing that the agent is concerned about is that it will run out of
tokens before it is next chosen to monitor, and thus not be able to post when it has the
opportunity to do so. The likelihood of this happening depends on how many other
volunteers there are each time the agent volunteers. To take an extreme case, if the
agent can be sure that it will be the only volunteer, then it is safe waiting until it has
one token left. It is unlikely that it will get a chance to make a posting twice before it
is able to earn a token. On the other hand, if there will be lots of competition each time
it volunteers, then it would be better to use a higher threshold.
So the first step in the proof is to get an accurate estimate of how many volunteers
there will be at each step. To do this, we view the system as a Markov chain, where the
state of the system is characterised by how many tokens each agent has. For simplicity,
we take the Markov chain to consist of all states reachable from some fixed initial state,
assuming that all players follow a fixed threshold-k strategy and all players have an
integral number of tokens, bounded by k. In each state, it is straightforward to compute
the probability of a transition to another state: each agent will be chosen to make a
posting with probability 1/n; we know whether that agent has a token (and thus can
post something); we know exactly who will volunteer to monitor (all agents with less
than k tokens); and, since a volunteer is chosen at random among the volunteers, we
also know the likelihood that an agent will be chosen to monitor. The key observation is
that, in the FHK setting, this Markov chain is reversible: the probability of a transition
from a state s to a state s(cid:48) (cid:54)= s is the same as the probability of the reverse transition
from s(cid:48) to s.
In the FHK setting, reversibility is easy to check: the only such transition that can
occur is from a state where an agent i performs work for an agent j. Then in state s(cid:48),
j has one fewer token than in state s, and i has one more. This transition occurs with
probability 1/nm, where m is the number of agents in state s other than j who have
fewer than k tokens: i is chosen in state s with probability 1/m, and j is chosen with
independent probability 1/n. The transition from s(cid:48) to s also has probability 1/nm.
Agent i is chosen in s(cid:48) with probability 1/n (and i is guaranteed to have at least one
token in s(cid:48), since it received the token from j) and there are again m volunteers: all the
19
ones that volunteered in state s other than i together with agent j (who must have less
than k tokens in state s(cid:48), since j gave a token to i).
In the inadvertent setting, we again take the Markov chain to consist of all states
reachable with positive probability from some fixed starting state, with everyone fol-
lowing the threshold strategy. Reversibility still holds, but we have to work a little
harder to show it. For simplicity, we assume that the act of the person wanting to do
monitoring paying one token to a random agent with less the maximum number of
tokens is distinct from the act where an agent who discovers a violation is paid 1/b
tokens by a random agent with at least 1/b tokens. In the first transition, the agent
i who makes a post ends up with one less token and the random agent j who gets it
has one more token. This transition happens with probability 1/nm, where m is the
number of agents other than i who have less than k + 1/b tokens. The reverse transition
happens with the same probability: j is chosen to post something with probability 1/n,
j can make a posting since it received a token from i, and the agents who have less
than k + 1/b tokens other than j is still m: all the agents who had less than k + 1/b
tokens in state s, together with i (who must have less than k + 1/b tokens, since it gave
a token to j).
Now consider the transition from s to s(cid:48) where i gives j 1/b tokens because j
discovered a violation. This transition occurs with probability b/mm(cid:48), where m is the
number of agents other than i with less than k tokens in s (these are the volunteers)
and m(cid:48) is the number of agents with at least 1/b tokens. Again the reverse transition
happens with the same probability: now j must have at least 1/b tokens and i must
have less than k tokens, so i is a potential volunteer and j is an agent who can pay i.
The rest of the argument now continues as in [Friedman et al., 2006], so we just
sketch the details. Clearly the Markov chain is finite, given our assumption that b is
rational: we can easily bound the number of possible states, since b is rational and
players have at most k + 1/b tokens.7 It immediately follows from reversibility and
our assumptions that the states in the Markov chain consist of all states reachable from
some initial starting state that Markov chain is irreducible: every state is reachable
from every other state. Finally, the same arguments as in FHK show that the Markov
chain is aperiodic: for every state s, there exist to cycles from s to itself such that the
gcd of their lengths is 1.
It is well known [Resnick, 1992] that every finite, reversible, aperiodic, and irre-
ducible Markov chain has a limit distribution π (where π(s) is the fraction of the time
that the Markov chain is in state s) and in this limit distribution, all states are equally
likely. However, we are not so interested in the probability of a given state; we are
interested in the probability of the distribution of tokens; in particular we are interested
in the fraction of agents that have less than the threshold number of tokens, because this
will tell us how many volunteers there will be. To understand the difference, consider
a system with two tokens. There are n states where agent has both the tokens, and(cid:0)n
2
states where two agents have one token each. So although all states are equally likely,
the distribution where 2/n of the agents have one token and the rest have none is far
more likely than the distribution where 1/n of the agents have two tokens, and the rest
have none.
(cid:1)
7Here is where we need the technical assumption that b is rational.
20
Using standard techniques, it can be shown that the distribution that maximises
entropy is overwhelmingly more likely than the rest. So, as long as n is sufficiently
large, the number of agents with less than the threshold k of tokens is, with extremely
high probability, γn, where γ is the probability of having less than k tokens according
to the maximum entropy distribution. Once the agent knows how much competition
she will face, it is easy to compute a best response, and to show that there is a best
response in threshold strategies.
Let BR(k) denote the agent's best-response threshold strategy if all other agents are
using threshold k. FHK show that BR(k) is monotonically increasing in k; moreover,
for δ sufficiently close to 1, there exists k such that BR(k) > k.
It follows using
standard arguments that BR has a fixed point that is greater than k. That fixed-point is
an -Nash equilibrium, for if BR(k) = k and all agents are playing a threshold strategy,
then playing a threshold of k is an -best response. (The accounts for the fact that the
the distribution of money is not exactly described by the maximum entropy distribution,
and even with the maximum entropy distribution, there is a very small chance that
playing k is not a best response.) This completes the proof sketch of Theorem 1.
The argument in the case of Theorem 3 is quite similar. Here the setting appears
more complicated, because agents have two strategic choices: deciding whether or not
to post bad material, and deciding whether or not to volunteer. However, as shown
earlier, our choice of parameters guarantees that an agent's payoff is independent of
its strategy regarding whether or not to post bad material. Indeed, if we fix agent i's
strategy for deciding whether or not to volunteer, and fix the strategies of all other
agents, all choices of strategy for deciding whether or not to post bad material, even
ones that are history-dependent and correlated the agent i's threshold and the strategies
of all other agents, give i the same utility. So, we can assume without loss of generality
that in equilibrium, agent i makes a bad posting with probability β∗.
Now essentially the same argument as that used in the proof of Theorem 1 shows
that there is an equilibrium where agents' make their choices regarding volunteering ac-
cording to some threshold strategy. In particular, the reversibility argument still holds;
the probability just need to be multiplied by 1 − 1/κ.
21
References
[Abraham et al., 2006] I. Abraham, D. Dolev, R. Gonen, and J. Y. Halpern. Distributed
computing meets game theory: robust mechanisms for rational secret sharing and
multiparty computation. In Proc. 25th ACM Symposium on Principles of Distributed
Computing, pages 53 -- 62, 2006.
[Abraham et al., 2013] Ittai Abraham, Danny Dolev, and Joseph Y. Halpern. Dis-
tributed protocols for leader election: A game-theoretic perspective.
In Yehuda
Afek, editor, Distributed Computing - 27th International Symposium, DISC 2013,
Jerusalem, Israel, October 14-18, 2013. Proceedings, volume 8205 of Lecture Notes
in Computer Science, pages 61 -- 75. Springer, 2013.
[Axelrod, 1986] Robert Axelrod. An evolutionary approach to norms. The American
Political Science Review, 80(4):1095 -- 1111, 1986.
[Balke et al., 2013] Tina Balke, Marina De Vos, and Julian Padget. Evaluating the
cost of enforcement by agent-based simulation: A wireless mobile grid example.
In Guido Boella, Edith Elkind, Bastin Tony Roy Savarimuthu, Frank Dignum, and
Martin K. Purvis, editors, PRIMA 2013: Principles and Practice of Multi-Agent
Systems, volume 8291 of Lecture Notes in Computer Science, pages 21 -- 36. Springer
Berlin Heidelberg, 2013.
[Boella and van der Torre, 2003] Guido Boella and Leendert W. N. van der Torre.
Norm governed multiagent systems: The delegation of control to autonomous
In 2003 IEEE/WIC International Conference on Intelligent Agent Tech-
agents.
nology (IAT 2003), pages 329 -- 335. IEEE Computer Society, 2003.
[Criado et al., 2012] Natalia Criado, Estefania Argente, Pablo Noriega, and Vicente J.
Botti. A distributed architecture for enforcing norms in open MAS. In Francien
Dechesne, Hiromitsu Hattori, Adriaan ter Mors, Jose M. Such, Danny Weyns, and
Frank Dignum, editors, Advanced Agent Technology - AAMAS 2011 Workshops,
AMPLE, AOSE, ARMS, DOCM3AS, ITMAS, Taipei, Taiwan, May 2-6, 2011. Revised
Selected Papers, volume 7068 of Lecture Notes in Computer Science, pages 457 --
471. Springer, 2012.
[Dastani et al., 2009] Mehdi Dastani, Davide Grossi, John-Jules Ch. Meyer, and Nick
Tinnemeier. Normative multi-agent programs and their logics. In John-Jules Ch.
Meyer and Jan Broersen, editors, Knowledge Representation for Agents and Multi-
Agent Systems, volume 5605 of Lecture Notes in Computer Science, pages 16 -- 31.
Springer Berlin Heidelberg, 2009.
[de Pinninck et al., 2010] Adrian Perreau de Pinninck, Carles Sierra, and W. Marco
Schorlemmer. A multiagent network for peer norm enforcement. Autonomous
Agents and Multi-Agent Systems, 21(3):397 -- 424, 2010.
[Ellison, 1994] Glenn Ellison. Cooperation in the prisoner's dilemma with anonymous
random matching. Review of Economic Studies, 61:567 -- 588, 1994.
22
[Esteva et al., 2004] Marc Esteva, Bruno Rosell, Juan A. Rodr´ıguez-Aguilar, and
Josep Llu´ıs Arcos. AMELI: An agent-based middleware for electronic institutions.
In 3rd International Joint Conference on Autonomous Agents and Multiagent Sys-
tems (AAMAS 2004), 19-23 August 2004, New York, NY, USA, pages 236 -- 243. IEEE
Computer Society, 2004.
[Fagundes et al., 2014] Moser Silva Fagundes, Sascha Ossowski,
and Felipe
Meneguzzi. Analyzing the tradeoff between efficiency and cost of norm enforce-
ment in stochastic environments. In 21st European Conference on Artificial Intelli-
gence (ECAI 2014), pages 1003 -- 1004. IOS Press, 2014.
[Fischer, 1983] M. J. Fischer. The consensus problem in unreliable distributed sys-
tems. In M. Karpinski, editor, Foundations of Computation Theory, Lecture Notes in
Computer Science, Volume 185, pages 127 -- 140. Springer, Berlin/New York, 1983.
[Friedman et al., 2006] Eric J. Friedman, Joseph Y. Halpern, and Ian A. Kash. Effi-
ciency and nash equilibria in a scrip system for P2P networks. In Proceedings 7th
ACM Conference on Electronic Commerce (EC-2006), pages 140 -- 149. ACM, 2006.
[Grizard et al., 2007] Amandine Grizard, Laurent Vercouter, Tiberiu Stratulat, and
Guillaume Muller. A peer-to-peer normative system to achieve social order. In Pablo
Noriega, Javier Vzquez-Salceda, Guido Boella, Olivier Boissier, Virginia Dignum,
Nicoletta Fornara, and Eric Matson, editors, Coordination, Organizations, Institu-
tions, and Norms in Agent Systems II, Lecture Notes in Computer Science, pages
274 -- 289. Springer Berlin Heidelberg, 2007.
[Hubner et al., 2010] JomiF. Hubner, Olivier Boissier, Rosine Kitio, and Alessandro
Instrumenting multi-agent organisations with organisational artifacts and
Ricci.
agents. Autonomous Agents and Multi-Agent Systems, 20:369 -- 400, 2010.
[Humbert et al., 2011] M. Humbert, H. Manshaei, and J.-P. Hubaux. One-to-n scrip
systems for cooperative privacy-enhancing technologies. In Communication, Con-
trol, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pages
682 -- 692, 2011.
[Johnson et al., 2014] Kris Johnson, David Simchi-Levi, and Peng Sun. Analyzing
scrip systems. Operations Research, 62(3):524 -- 534, 2014.
[Kandori, 1992] Michihiro Kandori. Social norms and community enforcement. Re-
view of Economic Studies, 59:63 -- 80, 1992.
[Kash et al., 2012] Ian A. Kash, Eric J. Friedman, and Joseph Y. Halpern. Optimizing
scrip systems: crashes, altruists, hoarders, sybils and collusion. Distributed Com-
puting, 25(5):335 -- 357, 2012.
[Mahmoud et al., 2013] Samhar Mahmoud, Nathan Griffiths, Jeroen Keppens, and
Michael Luck. Norm emergence through dynamic policy adaptation in scale free
networks. In Huib Aldewereld and Jaime Simao Sichman, editors, Coordination,
Organizations, Institutions, and Norms in Agent Systems VIII - 14th International
23
Workshop, COIN 2012, Revised Selected Papers, volume 7756 of Lecture Notes in
Computer Science, pages 123 -- 140. Springer, 2013.
[Modgil et al., 2009] Sanjay Modgil, Noura Faci, Felipe Rech Meneguzzi, Nir Oren,
Simon Miles, and Michael Luck. A framework for monitoring agent-based nor-
mative systems.
In Carles Sierra, Cristiano Castelfranchi, Keith S. Decker, and
Jaime Simao Sichman, editors, 8th International Joint Conference on Autonomous
Agents and Multiagent Systems (AAMAS 2009), pages 153 -- 160, Budapest, Hungary,
2009. IFAAMAS.
[Resnick, 1992] S. I. Resnick. Adventures in Stochastic Processes. Birkhauser, 1992.
[Testerink et al., 2014] Bas Testerink, Mehdi Dastani, and John-Jules Meyer. Norms
in distributed organizations. In Tina Balke, Frank Dignum, M. Birna van Riemsdijk,
and Amit K. Chopra, editors, Coordination, Organizations, Institutions, and Norms
in Agent Systems IX, Lecture Notes in Computer Science, pages 120 -- 135. Springer
International Publishing, 2014.
[Vishnumurthy et al., 2003] V. Vishnumurthy, S. Chandrakumar, and E. G. Sirer.
KARMA: a secure economic framework for peer-to-peer resource sharing. In First
Workshop on Economics of Peer-to-Peer Systems (P2PECON), 2003.
24
|
1907.09112 | 1 | 1907 | 2019-07-22T03:18:05 | Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems | [
"cs.MA",
"cs.DC",
"cs.LO"
] | Causality is an important concept both for proving impossibility results and for synthesizing efficient protocols in distributed computing. For asynchronous agents communicating over unreliable channels, causality is well studied and understood. This understanding, however, relies heavily on the assumption that agents themselves are correct and reliable. We provide the first epistemic analysis of causality in the presence of byzantine agents, i.e., agents that can deviate from their protocol and, thus, cannot be relied upon. Using our new framework for epistemic reasoning in fault-tolerant multi-agent systems, we determine the byzantine analog of the causal cone and describe a communication structure, which we call a multipede, necessary for verifying preconditions for actions in this setting. | cs.MA | cs | Causality and Epistemic Reasoning
in Byzantine Multi-Agent Systems
Roman Kuznets*
Embedded Computing Systems
TU Wien
Vienna, Austria
[email protected]
Laurent Prosperi
ENS Paris-Saclay
Cachan, France
[email protected]
Krisztina Fruzsa†
Embedded Computing Systems
TU Wien
Vienna, Austria
[email protected]
Ulrich Schmid
Embedded Computing Systems
TU Wien
Vienna, Austria
[email protected]
Causality is an important concept both for proving impossibility results and for synthesizing efficient
protocols in distributed computing. For asynchronous agents communicating over unreliable chan-
nels, causality is well studied and understood. This understanding, however, relies heavily on the
assumption that agents themselves are correct and reliable. We provide the first epistemic analysis
of causality in the presence of byzantine agents, i.e., agents that can deviate from their protocol and,
thus, cannot be relied upon. Using our new framework for epistemic reasoning in fault-tolerant multi-
agent systems, we determine the byzantine analog of the causal cone and describe a communication
structure, which we call a multipede, necessary for verifying preconditions for actions in this setting.
1
Introduction
Reasoning about knowledge has been a valuable tool for analyzing distributed systems for decades [5, 9],
and has provided a number of fundamental insights. As crisply formulated by Moses [17] in the form of
the Knowledge of Preconditions Principle, a precondition for action must be known in order to be action-
able. In a distributed environment, where agents only communicate by exchanging messages, an agent
can only learn about events happening to other agents via messages (or sometimes the lack thereof [8]).
In asynchronous systems, where the absence of communication is indistinguishable from delayed
communication, agents can only rely on messages they receive. Lamport's seminal definition of the
happened-before relation [14] establishes the causal structure for asynchronous agents in the agent -- time
graph describing a run of a system. This structure is often referred to as a causal cone, whereby causal
links are either time transitions from past to future for one agent or messages from one agent to another.
As demonstrated by Chandy and Misra [2], the behavior of an asynchronous agent can only be affected
by events from within its causal cone.
The standard way of showing that an agent does not know of an event is to modify a given run by
removing the event in question in such a way that the agent cannot detect the change. By Hintikka's
definition of knowledge [11], the agent thinks it possible that the event has not occurred and, hence, does
not know of the event to have occurred. Chandy and Misra's result shows that in order for agent i to learn
of an event happening to another agent j, there must exist a chain of successfully delivered messages
*Supported by the Austrian Science Fund (FWF) projects RiSE/SHiNE (S11405) and ADynNet (P28182).
†PhD student in the FWF doctoral program LogiCS (W1255).
L.S. Moss (Ed.): TARK 2019
EPTCS 297, 2019, pp. 293 -- 312, doi:10.4204/EPTCS.297.19
© R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
This work is licensed under the
Creative Commons Attribution License.
294
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
leading from the moment of agent j observing the event to some past or present state of agent i. This ob-
servation remains valid in asynchronous distributed systems where messages could be lost and/or where
agents may stop operating (i.e., crash) [4, 10, 19].
In synchronous systems, if message delays are upper-bounded, agents can also learn from the absence
of communication (communication-by-time). As shown in [1], Lamport's happened-before relation must
then be augmented by causal links indicating no communication within the message delay upper bound
to also capture causality induced via communication-by-time, leading to the so-called syncausality rela-
tion. Its utility has been demonstrated using the ordered response problem, where agents must perform
a sequence of actions in a given order: both the necessary and sufficient knowledge and a necessary and
sufficient communication structure (called a centipede) have been determined in [1]. It is important to
note, however, that syncausality works only in fault-free distributed systems with reliable communica-
tion. Although it has recently been shown in [8] that silent choirs are a way to extend it to distributed
systems where agents may crash, the idea does not generalize to less benign faults.
Unfortunately, all the above ways of capturing causality and the resulting simplicity of determining
the causal cone completely break down if agents may be byzantine faulty [15]. Byzantine faulty agents
may behave arbitrarily, in particular, need not adhere to their protocol and may, hence, send arbitrary
messages. It is common to limit the maximum number of agents that ever act byzantine in a distributed
system by some number f , which is typically much smaller than the total number n of agents. Prompted
by the ever growing number of faulty hardware and software having real-world negative, sometimes
life-critical, consequences, capturing causality and providing ways for determining the causal cone in
byzantine fault-tolerant distributed systems is both an important and scientifically challenging task. To
the best of our knowledge, this challenge has not been addressed in the literature before.1
In a nutshell, for f > 0, the problem of capturing causality becomes complicated by the fact that
a simple causal chain of messages is no longer sufficient: a single byzantine agent in the chain could
manufacture "evidence" for anything, both false negatives and false positives. And indeed, obvious
generalizations of message chains do not work. For example, it is a folklore result that, in the case
of direct communication, at least f + 1 confirmations are necessary because f of them could be false.
When information is transmitted along arbitrary, possibly branching and intersecting chains of messages,
the situation is even more complex and defies simplistic direct analysis. In particular, as shown by the
counterexample in [16, Fig. 1], one cannot rely on Menger's Theorem [3] for separating nodes in the
two-dimensional agent -- time graph.
Major contributions: In this paper, we generalize the causality structure of asynchronous distributed
systems described above to multi-agent systems involving byzantine faulty agents. Relying on our novel
byzantine runs-and-systems framework [12] (described in full detail in [13]), we utilize some generic
epistemic analysis results for determining the shape of the byzantine analog of Lamport's causal cone.
Since knowledge of an event is too strong a precondition in the presence of byzantine agents, it has to be
relaxed to something more akin to belief relative to correctness [18], for which we coined the term hope.
We show that hope can only be achieved via a causal message chain that passes solely through correct
agents (more precisely, through agents still correct while sending the respective messages). While the
result looks natural enough, its formal proof is quite involved technically and paints an instructive pic-
ture of how byzantine agents can affect the information flow. We also establish a necessary condition for
detecting an event, and a corresponding communication structure (called a multipede), which is severely
complicated by the fact that the reliable causal cones of indistinguishable runs may be different.
Paper organization: In Sect. 2, we succinctly introduce the features of our byzantine runs-and-
1Despite having "Byzantine" in the title, [4, 10] only address benign faults (crashes, send/receive omissions of messages).
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
295
systems framework [13] and state some generic theorems and lemmas needed for proving the results
of the paper. In Sect. 3, we describe the mechanism of run modifications, which are used to remove
events an agent should not know about from a run, without the agent noticing. Our characterization of
the byzantine causal cone is provided in Sect. 4, the necessary conditions for establishing hope for an
occurrence of an event and the underlying multipede structure can be found in Sect. 5. Some conclusions
in Sect. 6 round-off the paper.
2 Runs-and-Systems Framework for Byzantine Agents
First, we describe the modifications of the runs-and-systems framework [5] necessary to account for
byzantine behavior. To prevent wasting space on multiple definition environments, we give the following
series of formal definitions as ordinary text marking defined objects by italics; consult [13] for the same
definitions in fully spelled-out format. As a further space-saving measure, instead of repeating every
time "actions and/or events," we use haps2 as a general term referring to either actions or events.
The goal of all these definitions is to formally describe a system where asynchronous agents 1, . . . , n
perform actions according to their protocols, observe events, and exchange messages within an envi-
ronment represented as a special agent ε. Unlike the environment, agents only have limited local in-
formation, in particular, being asynchronous, do not have access to the global clock. No assumptions
apart from liveness are made about the communication. Messages can be lost, arbitrarily delayed, and/or
delivered in the wrong order. This part of the system is a fairly standard asynchronous system with un-
reliable communication. The novelty is that the environment may additionally cause at most f agents
to become faulty in arbitrary ways. A faulty agent can perform any of its actions irrespective of its
protocol and observe events that did not happen, e.g., receive unsent or corrupted messages. It can also
have false memories about actions it has performed. At the same time, much like the global clock, such
malfunctions are not directly visible to an agent, especially when it mistakenly thinks it acted correctly.
We fix a finite set A = {1, . . . , n} of agents. Agent i ∈ A can perform actions a ∈ Actionsi,
e.g., send messages, and witness events e ∈ Eventsi such as message delivery. We denote Hapsi :=
Actionsi ⊔ Eventsi. The action of sending a copy numbered k of a message µ ∈ Msgs to an agent j ∈ A
is denoted send( j,µk), whereas a receipt of such a message from i ∈ A is recorded locally as recv(i,µ).3
Agent i records actions from Actionsi and observes events from Eventsi without dividing them into
correct and faulty. The environment ε, on the contrary, always knows if the agent acted correctly or
was forced into byzantine behavior. Hence, the syntactic representations of each hap for agents (local
view) and for the environment (global view) must differ, with the latter containing more information.
In particular, the global view syntactically distinguishes correct haps from their byzantine counterparts.
While there is no way for an agent to distinguish a real event from its byzantine duplicate, it can analyze
its recorded actions and compare them with its protocol. Sometimes, this information might be sufficient
for the agent to detect its own malfunctions.
All of Actions :=Si∈A Actionsi, Events :=Si∈A Eventsi, and Haps := Actions ⊔ Events represent the
local view of haps. All haps taking place after a timestamp t ∈ T := N and no later than t + 1 are grouped
into a round denoted t + ½ and are treated as happening simultaneously. To model asynchronous agents,
we exclude these system timestamps from the local format of Haps. At the same time, the environment ε
incorporates the current timestamp t into the global format of every correct action a ∈ Actionsi, as initi-
2Cf. "Till I know 'tis done, Howe'er my haps, my joys were ne'er begun." W. Shakespeare, Hamlet, Act IV, Scene 3.
3Thus, it is possible to send several copies of the same message in the same round. If one or more of such copies are received
in the same round, however, the recipient does not know which copy it has received, nor that there have been multiple copies.
296
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
ated by agent i in the local format, via a one-to-one function global (i,t, a). Timestamps are especially
crucial for proper message processing with global (i,t, send( j,µk)) := gsend(i, j,µ, id(i, j,µ, k,t)) for
some one-to-one function id : A × A × Msgs × N × T → N that assigns each sent message a unique
global message identifier (GMI). We chose not to model agent-to-agent channels explicitly. With all
messages effectively sent through one system-wide channel, these GMIs are needed to ensure the causal-
ity of message delivery, i.e., that only sent messages can be delivered correctly. The sets GActionsi :=
{global (i,t, a) t ∈ T, a ∈ Actionsi} of all possible correct actions for each agent in global format are
Unlike correct actions, correct events witnessed by agents are generated by the environment ε and,
hence, can be assumed to be produced already in the global format GEventsi. We define GEvents :=
pairwise disjoint due to the injectivity of global. We set GActions :=Fi∈A GActionsi.
Fi∈A GEventsi assuming them to be pairwise disjoint, and GHaps = GEvents ⊔ GActions. We do not
consider the possibility of the environment violating its protocol, which is meant to model the fundamen-
tal physical laws of the system. Thus, all events that can happen are considered correct. A byzantine event
is, thus, a subjective notion. It is an event that was perceived by an agent despite not taking place. In other
words, each correct event E ∈ GEventsi has a faulty counterpart fake (i, E), and agent i cannot distinguish
the two. An important type of correct global events of agent j is the delivery grecv( j, i,µ, id) ∈ GEvents j
of message µ with GMI id ∈ N sent by agent i. Note that the GMI, which is used in by the global
format to ensure causality, must be removed before the delivery is recorded by the agent in the local
format because GMIs contain the time of sending, which should not be accessible to agents. To strip
this information before updating local histories, we employ a function local : GHaps → Haps converting
correct haps from the global into the local format in such a way that for actions local reverses global,
i.e., local(cid:0)global (i,t, a)(cid:1) := a. For message deliveries, local(cid:0)grecv( j, i,µ, id)(cid:1) := recv(i,µ), i.e., agent j
only knows that it received message µ from agent i. It is, thus, possible for two distinct correct global
events, e.g., grecv( j, i,µ, id) and grecv( j, i,µ, id′), representing the delivery of different copies of the
same message µ, possibly sent by i at different times, to be recorded by j the same way, as recv(i,µ).
Therefore, correct actions are initiated by agents in the local format and translated into the global
format by the environment. Correct and byzantine events are initiated by the environment in the global
format and translated into the local format before being recorded by agents.4 We will now turn our
attention to byzantine actions.
While a faulty event is purely an error of perception, actions can be faulty in another way: they can
violate the protocol. The crucial question is: who should be responsible for such violations? With agents'
actions governed by their protocols while everything else is up to the environment, it seems that errors,
especially unintended errors, should be the environment's responsibility. A malfunctioning agent tries
to follow its protocol but fails for reasons outside of its control, i.e., due to environment interference. A
malicious agent tries to hide its true intentions from other agents by pretending to follow its expected
protocol and, thus, can also be modeled via environment interference. Thus, we model faulty actions as
byzantine events of the form fake (i, A 7→ A′) where A, A′ ∈ GActionsi ⊔ {noop} for a special non-action
noop in global format. Here A is the action (or, in case of noop, inaction) performed, while A′ rep-
resents the action (inaction) perceived instead by the agent. More precisely, the agent either records
a′ = local(A′) ∈ Eventsi if A′ ∈ GEventsi or has no record of this byzantine action if A′ = noop. The
byzantine inaction fail (i) := fake (i, noop 7→ noop) is used to make agent i faulty without performing
any actions and without leaving a record in i's local history. The set of all i's byzantine events, corre-
sponding to both faulty events and faulty actions, is denoted BEventsi, with BEvents :=Fi∈A BEventsi.
To prevent our asynchronous agents from inferring the global clock by counting rounds, we make
4This has already been described for correct events. A byzantine event is recorded the same way as its correct counterpart.
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
297
waking up for a round contingent on the environment issuing a special system event go(i) for the agent in
question. Agent i's local view of the system immediately after round t + ½, referred to as (process-time or
agent-time) node (i,t + 1), is recorded in i's local state ri(t + 1), also called i's local history. Nodes (i, 0)
correspond to initial local states ri(0) ∈ Σi, with G (0) := ∏i∈A Σi. If a round contains neither go(i) nor
any event to be recorded in i's local history, then the said history ri(t + 1) = ri(t) remains unchanged,
denying the agent the knowledge of the round just passed. Otherwise, ri(t + 1) = X : ri(t), for X ⊆ Hapsi,
the set of all actions and events perceived by i in round t + ½, where : stands for concatenation. The ex-
act definition will be given via the updatei function, to be described shortly. Thus, the local history ri(t)
is a list of all haps as perceived by i in rounds it was active in. The set of all local states of i is L
i.
While not necessary for asynchronous agents, for future backwards compatibility, we add more sys-
tem events for each agent, to serve as faulty counterparts to go(i). Commands sleep (i) and hibernate (i)
signify a failure to activate the agent's protocol and differ in that the former enforces waking up the agent
(and thus recording time) notwithstanding. These commands will be used, e.g., for synchronous systems.
None of the system events SysEventsi := {go(i), sleep (i), hibernate (i)} is directly detectable by agents.
To summarize, GEventsi := GEventsi ⊔ BEventsi ⊔ SysEventsi with GEvents :=Fi∈A GEventsi and
GHaps := GEvents ⊔ GActions. Throughout the paper, horizontal bars signify phenomena that are cor-
rect. Note that the absence of this bar means the absence of a claim of correctness. It does not necessarily
imply a fault. Later, this would also apply to formulas, e.g., occurredi(e) demands a correct occurrence
of an event e whereas occurredi(e) is satisfied by either correct or faulty occurrence.
We now turn to the description of runs and protocols for our byzantine-prone asynchronous agents.
A run r is a sequence of global states r(t) = (rε(t), r1(t), . . . , rn(t)) of the whole system consisting of the
state rε(t) of the environment and local states ri(t) of every agent. We already discussed the composition
of local histories. Similarly, the environment's history rε(t) is a list of all haps that happened, this time
faithfully recorded in the global format. Accordingly, rε(t + 1) = X : rε(t) for the set X ⊆ GHaps of all
haps from round t + ½. The set of all global states is denoted G .
What happens in each round is determined by protocols Pi of agents, protocol Pε of the environ-
ment, and chance, the latter implemented as the adversary part of the environment. Agent i's protocol
i → ℘(℘(Actionsi)) \ {∅} provides a range Pi (ri(t)) of sets of actions based on i's current local
Pi : L
state ri(t), with the view of achieving some collective goal. Recall that the global timestamp t is not
part of ri(t). The control of all events -- correct, byzantine, and system -- lies with the environment ε
via its protocol Pε : T →℘(℘(GEvents)) \ {∅}, which can depend on a timestamp t ∈ T but not on the
current state. The environment's protocol is thus kept impartial by denying it an agenda based on the
global history so far. Other parts of the environment must, however, have access to the global history, in
particular, to ensure causality. Thus, the environment's protocol provides a range Pε(t) of sets of events.
Protocols Pi and Pε are non-deterministic and always provide at least one option. The choice among the
options (if more than one) is arbitrarily made by the already mentioned adversary part of the environ-
ment. It is also required that all events from Pε(t) be mutually compatible at time t. These t-coherency
conditions are: (a) no more than one system event go(i), sleep (i), and hibernate (i) per agent i at a time;
(b) a correct event perceived as e by agent i is never accompanied by a byzantine event that i would also
perceive as e, i.e., an agent cannot be mistaken about witnessing an event that did happen; (c) the GMI
of a byzantine sent message is the same as if a copy of the same message were sent correctly in the same
round. Note that the prohibition (b) does not extend to correct actions.
Both the global run r : T → G and its local parts ri : T → L
i provide a sequence of snapshots of
the system and local states respectively. Given the joint protocol P := (P1, . . . , Pn) and the environment's
protocol Pε, we focus on τf ,Pε,P-transitional runs r that result from following these protocols and are built
according to a transition relation τf ,Pε,P ⊆ G × G for asynchronous agents at most f ≥ 0 of which may
298
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
Pn (rn (t))
adversary
Pn
. . .
Xn
. . .
r (t)
P1
P1 (r1 (t))
adversary
X1
global
Pε
Pε (t)
adversary
Xε
global
αt
n (r)
αt
n (r)
f iltern
βt
n (r)
updaten
rn (t + 1)
. . .
αt
1 (r)
Xε =
αt
ε (r)
. . .
. . .
. . .
αt
1 (r)
f ilter1
βt
1 (r)
βt
εn (r)
update1
βt
ε1 (r)
r1 (t + 1)
r (t + 1)
f ilterε
βt
ε (r)
βt
ε (r)
updateε
rε (t + 1)
Protocol phase
Adversary phase
Labeling phase
Filtering phase
Updating phase
t
t + 1
Figure 1: Details of round t + ½ of a τf ,Pε,P-transitional run r.
become faulty in a given run. In this paper, we only deal with generic f , Pε, and P. Hence, whenever safe,
we write τ in place of τf ,Pε,P. Each transitional run begins in some initial global state r(0) ∈ G (0) and
progresses by ensuring that r (t) τ r (t + 1), i.e., (r (t) , r (t + 1)) ∈ τ, for each timestamp t ∈ T. Given f ,
Pε, and P, the transition relation τf ,Pε,P consisting of five consecutive phases is graphically represented
in Figure 1 and described in detail below:
1. Protocol phase. A range Pε (t) ⊆ ℘(GEvents) of t-coherent sets of events is determined by the en-
vironment's protocol Pε; for each i ∈ A , a range Pi (ri (t)) ⊆ ℘(Actionsi) of sets of i's actions is
determined by the agents' joint protocol P.
2. Adversary phase. The adversary non-deterministically picks a t-coherent set Xε ∈ Pε (t) and a set
Xi ∈ Pi (ri (t)) for each i ∈ A .
3. Labeling phase. Locally represented actions in Xi's are translated into the global format: αt
{global (i,t, a) a ∈ Xi} ⊆ GActionsi. In particular, correct sends are supplied with GMIs.
i (r) :=
4. Filtering phase. Functions f ilterε and f ilteri for each i ∈ A remove all causally impossible at-
i (r).
ε (r) := Xε and actions from αt
tempted events from αt
4.1. First, f ilterε filters out causally impossible events based (a) on the current global state r(t),
which could not have been accounted for by the protocol Pε, (b) on αt
i (r), not
accessible for Pε either. Specifically, two kinds of events are causally impossible for asynchronous
agents with at most f byzantine failures and are removed by f ilterε in two stages as follows (for-
mal definitions can be found in the appendix, Definitions A.16 -- A.17; cf. also [13] for details):
(1) in the 1st stage, all byzantine events are removed by f ilter≤ f
ε
if they would have resulted in
ε (r), and (c) on all αt
more than f faulty agents in total;
(2) in the 2nd stage, correct receives without matching sends (either in the history r(t) or in the
current round) are removed by f ilterB
ε .
The resulting set of events to actually occur in round t + ½ is denoted
βt
ε (r) := f ilterε(cid:0)r (t) , αt
ε (r), αt
1 (r),
. . . , αt
n (r)(cid:1) .
4.2. After events are filtered, f ilteri for each agent i removes all i's actions iff go(i) /∈ βt
resulting sets of actions to be actually performed by agents in round t + ½ are
ε (r). The
We have βt
i (r) ⊆ αt
βt
i (r) := f ilteri(cid:0)αt
i (r) ⊆ GActionsi and βt
1 (r),
. . . , αt
n (r), βt
ε (r) ⊆ αt
ε (r) ⊆ GEvents.
ε (r)(cid:1) .
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
299
5. Updating phase. The resulting mutually causally consistent sets of events βt
ε (r) and of actions βt
i (r)
are appended to the global history r(t); for each i ∈ A , all non-system events from
βt
εi (r) := βt
ε (r) ∩ GEventsi
as perceived by the agent and all correct actions βt
i (r) are appended in the local form to the local
history ri(t), which may remain unchanged if no action or event triggers an update or be appended
with the empty set if an update is triggered only by a system event go(i) or sleep (i):
rε (t + 1) :=updateε(cid:0)rε (t) , βt
ri (t + 1) :=updatei(cid:0)ri (t) , βt
ε (r), βt
i (r), βt
. . . , βt
n (r)(cid:1) ;
(1)
(2)
1 (r),
ε (r)(cid:1) .
Formal definitions of updateε and updatei are given in Def. A.19 in the appendix.
The protocols P and Pε only affect phase 1, so we group the operations in the remaining phases 2 -- 5
into a transition template τf that computes a transition relation τf ,Pε,P for any given P and Pε. This transi-
tion template, primarily via the filtering functions, represents asynchronous agents with at most f faults.
The template can be modified independently from the protocols to capture other distributed scenarios.
Liveness and similar properties that cannot be ensured on a round-by-round basis are enforced by
restricting the allowable runs by admissibility conditions Ψ, which formally are subsets of the set R of all
transitional runs. For example, since no goal can be achieved without allowing agents to act from time to
time, it is standard to impose the Fair Schedule (FS) admissibility condition, which for byzantine agents
states that an agent can only be delayed indefinitely through persistent faults:
FS := {r ∈ R (∀i ∈ A ) (∀t ∈ T) (∃t′ ≥ t)βt′
ε (r) ∩ SysEventsi 6= ∅}.
In scheduling terms, FS ensures that each agent be considered for using CPU time infinitely often. Deny-
ing any of these requests constitutes a failure, represented by a sleep (i) or hibernate (i) system event.
We now combine all these parts in the notions of context and agent-context:
Definition 1. A context γ = (Pε, G (0),τf , Ψ) consists of an environment's protocol Pε, a set of global
initial states G (0), a transition template τf for f ≥ 0, and an admissibility condition Ψ. For a joint proto-
col P, we call χ = (γ, P) an agent-context. A run r : T → G is called weakly χ-consistent if r(0) ∈ G (0)
and the run is τf ,Pε,P-transitional. A weakly χ-consistent run r is called (strongly) χ-consistent if r ∈ Ψ.
The set of all χ-consistent runs is denoted Rχ ⊆ R. Agent-context χ is called non-excluding if any finite
prefix of a weakly χ-consistent run can be extended to a χ-consistent run.
We are also interested in narrower types of faults. Let FEventsi := BEventsi ⊔{sleep (i), hibernate (i)}.
Definition 2. Environment's protocol Pε makes an agent i ∈ A :
1. correctable if X ∈ Pε (t) implies that X \ FEventsi ∈ Pε (t);
2. delayable if X ∈ Pε (t) implies X \ GEventsi ∈ Pε (t);
3. error-prone if X ∈ Pε (t) implies that, for any Y ⊆ FEventsi, the set Y ⊔ (X \ FEventsi) ∈ Pε (t)
whenever it is t-coherent;
4. gullible if X ∈ Pε (t) implies that, for any Y ⊆ FEventsi, the set Y ⊔(X \GEventsi) ∈ Pε (t) whenever
it is t-coherent;
5. fully byzantine if agent i is both error-prone and gullible.
In other words, correctable agents can always be made correct for the round by removing all their
byzantine events; delayable agents can always be forced to skip a round completely (which does not
300
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
make them faulty); error-prone (gullible) agents can exhibit any faults in addition to (in place of) correct
events, thus, implying correctability (delayability); fully byzantine agents' faults are unrestricted. Com-
mon types of faults, e.g., crash or omission failures, can be obtained by restricting allowable sets Y in
the definition of gullible agents.
Now that our byzantine version of the runs-and-systems framework is laid out, we define interpreted
systems in this framework in the usual way, i.e., as special kinds of Kripke models for multi-agent dis-
tributed environments [5]. For an agent-context χ, we consider pairs (r,t′) ∈ Rχ × T of a χ-consistent
run r and timestamp t′. A valuation function π: Prop → ℘(Rχ × T) determines whether an atomic
proposition from Prop is true in run r at time t′. The determination is arbitrary except for a small set
of designated atomic propositions whose truth value at (r,t′) is fully determined. More specifically, for
i ∈ A , o ∈ Hapsi, and t ∈ T such that t ≤ t′,
correct(i,t) is true at (r,t′), or node (i,t) is correct in run r, iff no faulty event happened to i by
timestamp t, i.e., no event from FEventsi appears in the rε(t) prefix of the rε(t′) part of r(t′);
correcti is true at (r,t′) iff correct(i,t′ ) is;
fake(i,t) (o) is true at (r,t′) iff i has a faulty reason to believe that o ∈ Hapsi occurred in round t − ½,
i.e., o ∈ ri(t) because (at least in part) of some O ∈ BEventsi ∩ βt−1
(r);
ε
occurred(i,t)(o) is true at (r,t′) iff i has a correct reason to believe o ∈ Hapsi occurred in round t − ½,
i.e., o ∈ ri(t) because (at least in part) of O ∈ (GEventsi ∩ βt−1
ε
(r)) ⊔ βt−1
(r);
i
occurredi(o) is true at (r,t′) iff at least one of occurred(i,m)(o) for 1 ≤ m ≤ t′ is;
occurred (o) is true at (r,t′) iff at least one of occurredi(o) for i ∈ A is;
occurredi(o) is true at (r,t′) iff either occurredi(o) is or at least one of fake(i,m) (o) for 1 ≤ m ≤ t′ is.
An interpreted system is a pair I = (Rχ,π). The epistemic language ϕ ::= p ¬ϕ (ϕ ∧ ϕ) Kiϕ
where p ∈ Prop and i ∈ A and derived Boolean connectives are defined in the usual way. Truth for these
(epistemic) formulas is defined in the standard way, in particular, for a run r ∈ Rχ, timestamp t ∈ T,
atomic proposition p ∈ Prop, agent i ∈ A , and formula ϕ we have (I , r,t) = p iff (r,t) ∈ π(p) and
(I , r,t) = Kiϕ iff (I , r′,t′) = ϕ for any r′ ∈ Rχ and t′ ∈ T such that ri(t) = r′
i(t′). A formula ϕ is valid
in I , written I = ϕ, iff (I , r,t) = ϕ for all r ∈ Rχ and t ∈ T.
Due to the t-coherency of all allowed protocols Pε, an agent cannot be both right and wrong about any
local event e ∈ Eventsi, i.e., I = ¬(occurred(i,t)(e) ∧ fake(i,t) (e)). Note that for actions this can happen.
Following the concept from [6] of global events that are local for an agent, we define conditions
under which formulas can be treated as such local events. A formula ϕ is called localized for i within
i(t′) implies (I , r,t) = ϕ ⇐⇒ (I , r′,t′) = ϕ for any I = (Rχ,π), runs
an agent-context χ iff ri(t) = r′
r, r′ ∈ Rχ, and timestamps t,t′ ∈ T. By these definitions, we immediately obtain:
Lemma 3. The following statements are valid for any formula ϕ localized for an agent i ∈ A within an
agent-context χ and any interpreted system I = (Rχ,π): I = ϕ ↔ Kiϕ and I = ¬ϕ ↔ Ki¬ϕ.
The knowledge of preconditions principle [17] postulates that in order to act on a precondition an
agent must be able to infer it from its local state. Thus, Lemma 3 shows that formulas localized for i can
always be used as preconditions. Our first observation is that the agent's perceptions of a run are one
example of such epistemically acceptable (though not necessarily reliable) preconditions:
Lemma 4. For any agent-context χ, agent i ∈ A , and local hap o ∈ Hapsi, the formula occurredi(o) is
localized for i within χ.
It can be shown that correctness of these perceptions is not localized for i and, hence, cannot be the
basis for actions. In fact, Theorem 12 will reveal that no agent can establish its own correctness.
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
301
3 Run modifications
We will now introduce the pivotal technique of run modifications, which are used to show an agent does
not know ϕ by creating an indistinguishable run where ϕ is false.
Definition 5. A function ρ: Rχ →℘(GActionsi) ×℘(GEventsi) is called an i-intervention for an agent-
context χ and agent i ∈ A . A joint intervention B = (ρ1, . . . ,ρn) consists of i-interventions ρi for each
agent i ∈ A . An adjustment [Bt ; . . . ; B0] is a sequence of joint interventions B0 . . . , Bt to be performed at
rounds from ½ to t + ½.
εi (r′) = βt
i (r′) = X and βt
We consider an i-intervention ρ(r) = (X , Xε) applied to a round t + ½ of a given run r to be a
meta-action by the system designer, intended to modify the results of this round for i in such a way
ε (r′) ∩ GEventsi = Xε in the artificially constructed new run r′. For
that βt
ρ(r) = (X , Xε), we denote aρ(r) := X and eρ(r) := Xε. Accordingly, a joint intervention (ρ1, . . . ,ρn) pre-
scribes actions βt
Thus, an adjustment [Bt ; . . . ; B0] fully determines actions and events in the initial t + 1 rounds of run r′:
Definition 6. Let adj = [Bt ; . . . ; B0] be an adjustment where Bm = (ρm
n ) for each 0 ≤ m ≤ t and
is an i-intervention for an agent-context χ = ((Pε, G (0),τf , Ψ), P). A run r′ is obtained from
each ρm
i
r ∈ Rχ by adjustment adj iff for all t′ ≤ t, all T ′ > t, and all i ∈ A ,
(a) r′ (0) := r (0),
ε (r′) =Fi∈A eρi(r) for the round in question.
i (r′) = aρi(r) for each agent i and events βt
1 , . . . ,ρm
(b) r′
(c) r′
i (t′ + 1) := updatei(cid:16)r′
ε (t′ + 1) := updateε(cid:16)r′
i (t′) , aρt′
i (r), Fi∈A eρt′
i (r)(cid:17),
ε (t′) , Fi∈A eρt′
(d) r′(T ′) τf ,Pε,P r′(T ′ + 1).
R (τf ,Pε,P, r, adj) is the set of all runs obtained from r by adj.
i (r), aρt′
1 (r), . . . , aρt′
n (r)(cid:17),
Note that adjusted runs need not be a priori transitional, i.e., obey (d), for t′ ≤ t. Of course, we intend
to use adjustments in such a way that r′ is a transitional run. But it requires a separate proof. In order to
improve the readability of these proofs, we allow ourselves (and already used) a small abuse of notation.
i (r′) were initially defined only for transitional runs as the result of filtering.
The β-sets βt
But they also represent the sets of events and i's actions respectively happening in round t + ½. This
alternative definition is equivalent for transitional runs and, in addition, can be used for adjusted runs r′.
This is what we mean whenever we write β-sets for runs obtained by adjustments.
ε (r′) and βt
In order to minimize an agent's knowledge in accordance with the structure of its (soon to be defined)
reliable (or byzantine) causal cone, we will use several types of i-interventions that copy round t + ½ of
the original run to various degrees: (a) CFreeze denies i all actions and events, (b) FakeEchot
i reproduces
all messages sent by i but in byzantine form, (c) X -Focust
i (for an appropriately chosen set X ⊆ A × T)
faithfully reproduces all actions and as many events as causally possible.
Definition 7. For an agent-context χ, i ∈ A , and r ∈ Rχ, we define the following i-interventions:
CFreeze (r) := (∅, ∅).
{fail (i)} ⊔ (cid:8) fake (i, gsend(i, j,µ, id) 7→ noop)
i (r) ∨ (∃A) fake (i, gsend(i, j,µ, id) 7→ A) ∈ βt
gsend(i, j,µ, id) ∈ βt
(cid:12)(cid:12)
(3)
(4)
(5)
ε (r)(cid:9)(cid:17).
( j, m) /∈ X , k ∈ N(cid:9)(cid:17).
FakeEchot
X -Focust
i (r) :=(cid:16)∅,
i (r) := (cid:16)βt
i (r),
βt
εi (r) \(cid:8)grecv(i, j,µ, id( j, i,µ, k, m))
(cid:12)(cid:12)
302
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
4 The Reliable Causal Cone
Before giving formal definitions and proofs, we first explain the intuition behind our byzantine analog of
Lamport's causal cone, and the particular adjustments used for constructing runs with identical reliable
causal cones in the main Lemma 10 of this section.
In the absence of faults [2], the only way information, say, about an event e that happens to an agent j
can reach another agent i, or more precisely, its node (i,t), is via a causal chain (time progression and
delivered messages) originating from j after e happened and reaching i no later than timestamp t. The
set of beginnings of causal chains, together with all causal links, is called the causal cone of (i,t). The
standard way of demonstrating the necessity of such a chain for i to learn about e, when expressed in
our terminology, is by using an adjustment that removes all events and actions outside the causal cone.
Once an adjusted run with no haps outside the causal cone is shown to be transitional and the local state
of i at timestamp t is shown to be the same as in the given run, it follows that i considers it possible that
e did not happen and, hence, does not know that e happened. This well known proof is carried out in our
framework in [12] (see also [13] for an extended version).
However, one subtle aspect of our formalization is also relevant for the byzantine case. We illus-
trate it using a minimal example. Suppose, in the given run, js sent exactly one message to jr during
round m + ½ and it was correctly received by jr in round l + ½. At the same round, jr itself sent its last
ever message, and sent it to i. If this message to i arrived before t, then ( jr, l) is a node within the causal
cone of (i,t). On the other hand, neither ( jr, l + 1) nor ( js, m) are within the causal cone. Thus, the run
adjustment discussed in the previous paragraph removes the action of sending the message from js to jr,
which happened outside the causal cone, and, hence, makes it causally impossible for jr to receive it de-
spite the fact that the receipt happened within, or more precisely, on the boundary of the causal cone. On
the other hand, the message sent by jr in the same round cannot be suppressed without i noticing. Thus,
suppressing all haps on the boundary of the causal cone is not an option. These considerations necessitate
the use of X -Focusl
j to remove such "ghosts" of messages instead of the exact copy of round l + ½ of the
given run. To obtain Chandy -- Misra's result, one needs to set X to be the entire causal cone.5
We now explain the complications created by the presence of byzantine faults. Because byzantine
agents can lie, the existence of a causal chain is no more sufficient for reliable delivery of information.
Causal chains can now be reliable, i.e., involve only correct agents, or unreliable, whereby a byzantine
agent can corrupt the transmitted information or even initiate the whole communication while pretending
to be part of a longer chain. If several causal chains link a node ( j, m) witnessing an event with (i,t),
where the decision based on this event is to be made, then, intuitively, the information about the event can
only be relied upon if at least one of these causal chains is reliable. In effect, all correct nodes, i.e., nodes
( j, m) such that (I , r,t) = correct( j,m), are divided into three categories: those without any causal chains
to (i,t), i.e., nodes outside Lamport's causal cone, those with causal chains but only unreliable ones, and
those with at least one reliable causal chain. There is, of course, the fourth category consisting of byzan-
tine nodes, i.e., nodes ( j, m) such that (I , r,t) 6= correct( j,m). Since there is no way for nodes without
reliable causal chains to make themselves heard, we call these nodes silent masses and apply to them the
CFreeze intervention: since they cannot have an impact, they need not act. The nodes with at least one
reliable causal chain to (i,t), which must be correct themselves, form the reliable causal cone and treated
the same way as Lamport's causal cone in the fault-free case, except that the removal of "ghost" messages
is more involved in this case. Finally, the remaining nodes are byzantine and form a fault buffer on the
5This treatment of the cone's boundary could be perceived as overly pedantic. But in our view this is preferable to being
insufficiently precise.
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
303
way of reliable information. Their role is to pretend the run is the same independently of what the silent
masses do. We will show that FakeEchom
j suffices since only messages sent from the fault buffer matter.
Before stating our main Lemma 10, which constructs an adjusted run that leaves agent i at t in the
same position while removing as many haps as possible, it should be noted that our analysis relies on
knowing which agents are byzantine in the given run, which may easily change without affecting local
histories. This assumption will be dropped in the following section.
First we define simple causal links among nodes as binary relations on A × T in infix notation:
i (r) or fake (i, gsend(i, j,µ, id) 7→ A) ∈ βm
c( j, l) iff there are µ ∈ Msgs and id ∈ N such that grecv( j, i,µ, id) ∈ βl−1
Definition 8. For all i ∈ A and t ∈ T, we have (i,t) →l (i,t + 1). Additionally, for a run r, we
have (i, m)→r
(r) and either
gsend(i, j,µ, id) ∈ βm
ε (r) for some A ∈ {noop} ⊔ GActionsi.
Causal r-links →r :=→l ∪→r
c are either local or communication related. A causal r-path for a run r is
a sequence ξ = hθ0,θ1, . . . ,θki, k ≥ 0, of nodes connected by causal r-links, i.e., such that θl→rθl+1 for
each 0 ≤ l < k. This causal r-path is called reliable iff node ( jl,tl + 1) is correct in r for each θl = ( jl,tl)
with 0 ≤ l < k and, additionally, node θk = ( jk,tk) is correct in r. We also write θ0 r
ξ θk to denote the
fact that path ξ connects node θ0 to θk in run r, or simply θ0 r θk to state that such a causal r-path exists.
Note that neither receives nor sends of messages forming a reliable causal r-path can be byzantine.
ε
The latter is guaranteed by the immediate future of nodes on the path being correct.
Definition 9. The reliable causal cone ◮r
that ζ r
nodes ( j, m) with m < t such that ( j, m) r θ and ( j, m + 1) is not correct. Abbreviating ii◮r
the silent masses of node θ in run r are all the remaining nodes ·ir
θ of node θ in run r consists of all nodes ζ ∈ A × T such
θ of node θ in run r consists of all
θ ⊔iir
θ,
ξ θ for some reliable causal r-path ξ. The fault buffer iir
θ :=◮r
θ := (A × T) \ ii◮r
θ.
Here the filling of the cone ◮ signifies reliable communication, ii represents a barrier for correct
information, whereas ·i depicts correct information isolated from its destination. We can now state the
main result of this section:
Lemma 10 (Cone-equivalent run construction). For f ∈ N, for a non-excluding agent-context χ =
(cid:0)(Pε, G (0),τf , Ψ), P(cid:1) such that all agents are gullible, correctable, and delayable, for any τf ,Pε,P-tran-
sitional run r, for a node θ = (i,t) ∈ A × T correct in r, let adjustment adj = [Bt−1; . . . ; B0] where
Bm = (ρm
n ) for each 0 ≤ m ≤ t − 1 such that
1 , . . . ,ρm
θ-Focusm
ii◮r
FakeEchom
j
j
CFreeze
if ( j, m) ∈◮r
θ ,
if ( j, m) ∈ iir
θ,
if ( j, m) ∈ ·ir
θ.
(6)
ρm
j
:=
Then each r′ ∈ R (τf ,Pε,P, r, adj) satisfies the following properties:
(A) (∀( j, m) ∈◮r
θ)
r′
(B) (∀m ≤ t)
i(m) = ri(m);
(C) for any m ≤ t, we have that βm−1
r′
j (m) = r j (m);
ε
(r′) ∩ FEvents j 6= ∅ iff both ( j, m − 1) r θ and ( j, m) is not
correct in r;
(D) for any m ≤ t, any node ( j, m) correct in r is also correct in r′;
(E) the number of agents byzantine by any m ≤ t in run r′ is not greater than that in run r and is ≤ f ;
(F) r′ is τf ,Pε,P-transitional.
Proof sketch. The following properties follow from the definitions:
◮
θ = ∅,
r
θ ∩iir
( j, m) ∈◮
r
θ & (k, m′)→r( j, m)
θ ∈◮
r
θ,
=⇒
(k, m′) ∈ ii◮r
θ.
(7)
(8)
304
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
Note that for βk = ( jk, mk) with k = 1, 2, we have β1→rβ2 implies m1 < m2 and β1 r β2 implies
m1 ≤ m2. Thus, all parts of the lemma except for Statement (F) only concern m ≤ t, and even this last
statement for m > t is a trivial corollary of Def. 6(d). Thus, we focus on m ≤ t.
Statement (A) can be proved by induction on m using the following auxiliary lemma for the given
transitional run r and the adjusted run r′, which is also constructed using the standard update functions.
Lemma 11. If r j(m) = r′
j(m), and βm
j (r) = aρm
j (r), and βm
εj (r) = eρm
j (r), then r j(m + 1) = r′
j(m + 1).
Proof. This statement follows from (2) for the transitional run r, Def. 6(b) for the adjusted run r′, and the
fact that update j only depends on events of agent j, in particular, on the presence of go( j) or sleep ( j)
(see Def. A.19 in the appendix for details).
The third condition of Lemma 11 is satisfied for ρm
if ( j, m) ∈◮r
Statement (B) follows from Statement (A) we have already proved.
θ, then so are all ( j, m′) with m′ ≤ m.
j (r) = ii◮r
In particular, (i, m′) ∈◮r
θ-Focusm
j within ◮r
θ by (8). Further,
θ for any m′ ≤ t. Thus,
Statement (C) is due to the fact that (a) ii◮r
εj (r), which contains none for ( j, m) ∈◮r
j does not produce any new byzantine events
θ, (b) CFreeze never produces byzantine events,
j always contains at least fail ( j) ∈ BEvents j. Statements (D) and (E) are direct
θ-Focusm
relative to βm
whereas (c) FakeEchom
corollaries of Statement (C).
The bulk of the proof concerns Statement (F), or, more precisely the transitionality up to times-
j (r′) = {global ( j, m, a) a ∈ X j} for some
j (r) for all j ∈ A ,
tamp t. For each m < t, we need sets αm
X j ∈ Pj(r′
j(m)) for each j ∈ A such that for βm
ε (r′) ∈ Pε (m) and αm
j (r′) = aρm
j (r) and βm
βm
βm
ε (cid:0)r′(cid:1) = f ilterε(cid:0)r′(m),αm
j (cid:0)r′(cid:1) = f ilter j(cid:0)αm
ε (r′) =F j∈A eρm
ε (cid:0)r′(cid:1),αm
1 (cid:0)r′(cid:1), . . . ,αm
1 (cid:0)r′(cid:1), . . . ,αm
n (cid:0)r′(cid:1)(cid:1) ,
n (cid:0)r′(cid:1),βm
ε (cid:0)r′(cid:1)(cid:1) .
(9)
(10)
(11)
The construction of such α-sets and the proof of (9) -- (10) for them is by induction on m. Note that
r′
ε(0) = rε(0) and r′
j(0) = r j(0) for all j ∈ A by Def. 6(a). We will show that it suffices to choose
j (r)
αm
j (cid:0)r′(cid:1) :=(αm
{global ( j, m, a) a ∈ X j} for some X j ∈ Pj(r′
j(m)) otherwise,
if ( j, m) ∈◮r
θ,
with the choice in the latter case possible by Pj(r′
j(m)) 6= ∅, and
αm
ε (cid:0)r′(cid:1) :=(cid:16) f ilter≤ f
ε (r),αm
1 (r), . . . ,αm
ε (cid:0)r(m),αm
nfake (l, gsend(l, j,µ, id) 7→ noop)
n (r)(cid:1) \ G(l,m)∈·ir
(cid:12)(cid:12)(cid:12)
(cid:16)gsend(l, j,µ, id) ∈ βm
GEventsl(cid:17) ⊔ {fail (l) (l, m) ∈ iir
θ}⊔
θ ⊔iir
θ
(l, m) ∈ iir
θ &
l (r) ∨ (∃A) fake (l, gsend(l, j,µ, id) 7→ A) ∈ βm
(12)
ε (r)(cid:17)o.
Informally, according to (11), in r′, we just repeat the choices made in r within the reliable causal
cone and make arbitrary choices elsewhere. According to (12), events are chosen in a more complex
way. First, mimicking the 1st-stage filtering in the given run r, the originally chosen αm
ε (r) ∈ Pε (m)
is preventively purged of all byzantine events whenever they would have caused more than f agents to
become faulty in r. Note that, in our transitional simulation of the adjusted run r′, this is done prior to
filtering (9) by exploiting the correctability of all agents. Secondly, for all agents l outside the reliable
causal cone at the current timestamp m, i.e., with (l, m) ∈ ·ir
θ, all events are removed, to comply with
θ ⊔ iir
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
305
the total freeze among the silent masses ·ir
θ and to make room for byzantine communication in the fault
buffer iir
θ. The resulting set complies with Pε because all agents are delayable. For the silent masses, this
is the desired result. For the fault buffer, on the other hand, byzantine sends are added for every correct
or byzantine send in r, thus, ensuring that the incoming information in the reliable causal cone in r′ is the
same as in r. For the case when a faulty buffer node (l, m) sent no messages in the original run, fail (l) is
added to make the immediate future (l, m + 1) byzantine despite its silence, which is crucial for fulfilling
Statement (C) and simplifying bookkeeping for byzantine agents.
The proof of (9) -- (10) is by induction on m = 0, . . . ,t − 1. To avoid overlong formulas, we ab-
j for
ε (r′) defined in (11) and (12) respectively. Thus, it only remains to show that
ε ∩ GEvents j, that
breviate the right-hand side of (9) by ϒm
the specific αm
ε (r′) = ϒm
βm
ε and the right-hand sides of (10) for each j ∈ A by Ξm
j , or equivalently, further abbreviating ϒm
ε and (∀ j ∈ A )βm
j (r′) and αm
j (r′) = Ξm
j := ϒm
for all j ∈ A , by simultaneous induction on m.
βm
εj(cid:0)r′(cid:1) = ϒm
j
and
βm
j (cid:0)r′(cid:1) = Ξm
j
Induction step for the silent masses ( j, m) ∈ ·ir
j = ∅ = βm
tering it yields ϒm
j (r′), whatever it is, yields Ξm
that filtering αm
applied within ·ir
θ.
εj (r′) as prescribed by CFreeze. In particular, go( j) /∈ βm
θ. By (12), αm
εj (r′) := αm
ε (r′) ∩ GEvents j = ∅, and fil-
εj (r′), thus, ensuring
j (r′), once again in compliance with CFreeze
j = ∅ = βm
Before proceeding with the induction step for the remaining nodes, observe that events in αm
ε (r′),
if added to r′(m), do not cross the byzantine-agent threshold f , meaning that the 1st-stage filtering does
not affect αm
ε (r′):
f ilter≤ f
ε (cid:0)r′(m),αm
ε (cid:0)r′(cid:1),αm
1 (cid:0)r′(cid:1), . . . ,αm
n (cid:0)r′(cid:1)(cid:1) = αm
ε (cid:0)r′(cid:1).
ε (r′): byzantine events from αm
in (12) and those pertaining to nodes in the fault buffer iir
ε (r) in the original run because the 2nd-stage filter f ilterB
Indeed there are two sources of byzantine events in αm
ε (r) that survived
f ilter≤ f
θ. The former were also present
ε
in βm
ε only removes correct (receive) events.
At the same time, for any (l, m) ∈ iir
θ, the immediate future (l, m + 1) was a faulty node in r by the def-
ε (r′) was also faulty by timestamp m + 1
inition of iir
in r. Additionally, any agent already faulty in r′(m) was also faulty in r(m) by Statement (D). Since the
ε (r′)
number of agents faulty by m + 1 in the original transitional run r could not exceed f , adding αm
to r′(m) does not exceed this threshold either. It follows from (13) that
θ. In either case, any agent faulty in r′ based on αm
(13)
Induction step for the fault buffer ( j, m) ∈ iir
ϒm
j = filterB
ε(r′(m),αm
ε (cid:0)r′(cid:1),αm
1 (cid:0)r′(cid:1), . . . ,αm
n (cid:0)r′(cid:1)) ∩ GEvents j.
θ. For these nodes, the αm
εj (r′) part of αm
ε (r′) contains
(14)
no correct events, hence, f ilterB
ε , which only removes correct receives, has no effect. In other words,
ϒm
j = αm
ε (cid:0)r′(cid:1) ∩ GEvents j = {fail ( j)} ⊔ nfake ( j, gsend( j, h,µ, id) 7→ noop)(cid:12)(cid:12)(cid:12)
ε (r)o = βm
j (r) ∨ (∃A) fake ( j, gsend( j, h,µ, id) 7→ A) ∈ βm
gsend( j, h,µ, id) ∈ βm
j . As in the case of the silent masses, go( j) /∈ βm
ε (r′) guarantees that the
εj(cid:0)r′(cid:1)
as prescribed by FakeEchom
Ξm
j = ∅ = βm
j (r′) requirement is fulfilled within iir
θ.
Induction step for the reliable causal cone ( j, m) ∈◮r
θ. The case of the nodes with a reliable causal
path to θ, whose immediate future remains correct in r, is the final and also most complex induction step.
θ by Statement (A) r′(m) = r(m).
Recall that αm
j (r) ∈ Pj(r(m)) = Pj(r′(m)) because within ◮r
j (r′) = αm
306
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
εj (r) := αm
ε (r) ∩ GEvents j part of αm
j (r′) in (11) is in compliance with transitionality. Since ( j, m + 1) is correct,
Thus, our choice of αm
the αm
ε (r) contained no byzantine events and, hence, is unchanged
by (12). For the same reason it is not affected by 1st-stage filtering in either run. Thus, the same set of
j's events undergoes the 2nd-stage filtering in both the original run r and in our transitional simulation
of the adjusted run r′. Let us call this set of j's events Ω j.
Since both f ilterB
εj (r′) ⊆ βm
βm
ensuring that Ξm
εj (r) and ϒm
j = αm
j (r).
ε and ii◮r
θ-Focusm
j can only remove receive events, it immediately follows that
j agree on all non-receive events. Importantly, this includes go( j) events, thus
A receive event U = grecv( j, k,µ, id) ∈ Ω j is retained in either run iff it is causally grounded by a
matching send, correct or byzantine. Due to the uniqueness of GMI id, as ensured by the injectivity of
both id and global functions, as well as Condition (c) of the t-coherency of sets produced by Pε, there is at
most one agent k's node where such a matching send can originate from. If id is not well-formed and no
ε (r′). The rea-
such send can exist, U is filtered out from both βm
soning in the case such a node η = (k, z) exists depends on where timestamp z is relative to m and where
η falls in our partition of nodes. Generally, to retain U in βm
j , one must find either a correct
send V := gsend(k, j,µ, id) or a faulty send WA := fake (k,V 7→ A) for some A ∈ GActionsk ⊔ {noop}.
ε (r′).
εj (r′)
because the message's origin is outside the focus area. At the same time, no actions or events are
scheduled at η in r′ (for z = m it follows from the already proven induction step for silent masses).
Without either V or WA, event U is filtered out from ϒm
ε .
θ, then, independently of filtering in r, hap U /∈ e(cid:0)ii◮r
• If z > m is in the future of m, then U is filtered out from both βm
• If z ≤ m and η ∈ ·ir
ε , hence, U /∈ βm
θ-Focusm
ε , the former ensuring U /∈ βm
j (r)(cid:1) = βm
εj (r) and ϒm
ε (r) and ϒm
ε (r) and ϒm
• If z < m and η ∈◮r
• If z = m and η ∈ iir
εk (r′) iff either V ∈ βz
θ, again only Wnoop can save U in ϒm
ε (r′) 6∋ go(k). Here Wnoop ∈ αm
αm
tering U yields the same result in both runs, and ii◮r
j , this time by construction (12) of
εk (r) for some A. Thus, fil-
j does not affect U because η ∈ ii◮r
θ.
θ, then (k, z + 1) is still correct in both r and r′, hence, no byzantine events
such as WA are present in either r(m) or r′(m). Accordingly, only V can save U in this case. Since
βz
k (r) = βz
k, filtering U yields the same result in both runs,
and ii◮r
k (r′) by construction (5) of ii◮r
j does not affect U because η ∈ ii◮r
θ.
k (r) or WA ∈ βz
θ-Focusm
θ-Focusm
θ-Focusz
• If z = m and η ∈◮r
θ, again (k, m + 1) is correct in r meaning this time that no WA are present in Ωk.
k (r′) by construction (11) and the sets
Again, only V can save U from filtering. Since αm
of events being filtered agree on go(k) ∈ Ωk, here too filtering U yields the same result in both
runs, and ii◮r
j does not affect U because η ∈ ii◮r
θ.
k (r) = αm
θ-Focusm
This case analysis completes the induction step for the reliable causal cone, the induction proof, proof of
Statement (F), and the proof of the whole Lemma 10.
5 Preconditions for Actions: Multipedes
Arguably the most important application of Lemma 10, and, hence, of causal cones, is to derive precon-
ditions for agents' actions, cp. [1]. While relatively simple in traditional settings, where events can be
preconditions according to the knowledge of preconditions principle [17] and where Lamport's causal
cone suffices, this is no longer true in byzantine settings. As Theorem 12 reveals, if f > 0, an asyn-
• If z < m and η ∈ iir
θ, then, by (4) in the definiton of FakeEchoz
Wnoop ∈ βz
result in both runs, and ii◮r
εk (r′) iff either V ∈ βz
k (r) or WA ∈ βz
θ-Focusm
j does not affect U because η ∈ ii◮r
θ.
j and
εk (r) for some A. Thus, filtering U yields the same
k, only Wnoop can save U in ϒm
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
307
chronous agent can learn neither that it is (still) correct nor that a particular event6 really occurred.
Theorem 12 ([12]). If f ≥ 1, then for any o ∈ Eventsi, for any interpreted system I = (Rχ,π) with any
non-excluding agent-context χ = ((Pε, G (0),τf , Ψ), P) where i is gullible and every j 6= i is delayable,
I = ¬Kioccurred(o)
and
I = ¬Kicorrecti.
(15)
These validities can be shown by modeling the infamous brain in a vat scenario (see [12] for details).
Theorem 12 obviously implies that knowledge of simple preconditions, e.g., events, is never achiev-
able if byzantine agents are present. Settling for the next best thing, one could investigate whether
i knows o has happened relative to its own correctness, i.e., whether Ki(correcti → occurred (o)) holds
(cf. [18]), a kind of non-factive belief in o. This means that i can be mistaken about o due to its own
faults (in which case it cannot rely on any information anyway), not due to being misinformed by other
agents. It is, however, sometimes overly restrictive to assume that Ki(correcti → occurred(o)) holds in
situations when i is, in fact, faulty: typical specifications, e.g., for distributed agreement [15], do not
restrict the behavior of faulty agents, and agents might sometimes learn that they are faulty. We therefore
introduced the hope modality
Hiϕ := correcti → Ki(correcti → ϕ),
which was shown in [7] to be axiomatized by adding to K45 the axioms correcti → (Hiϕ → ϕ), and
¬correcti → Hiϕ, and Hicorrecti.
The following Theorem 13 shows that hope is also closely connected to reliable causal cones, in the
sense that events an agent can hope for must lie within the reliable causal cone.
Theorem 13. For a non-excluding agent-context χ = ((Pε, G (0),τf , Ψ), P) such that all agents are
gullible, correctable, and delayable, for a correct node θ = (i,t), and for an event o ∈ Events, if all
occurrences of O ∈ GEvents such that local(O) = o happen outside the reliable causal cone ◮r
θ of a run
r ∈ Rχ, i.e., if O ∈ βm
ε (r) ∩ GEvents j & local(O) = o implies ( j, m) /∈◮r
θ, then for any I = (Rχ,π),
(I , r,t) 6= Hioccurred(o).
Proof. Constructing the first t rounds according to the adjustment from Lemma 10 and extending this
prefix to an infinite run r′ ∈ Rχ using the non-exclusiveness of χ, we obtain a run with no correct events
recorded as o. Indeed, in r′, there are no events originating from ·ir
θ, and all
events originating from ◮r
θ, though correct, were also present in r and, hence, do not produce o in local
i(t) by Lemma 10(B), making (I , r′,t) indistinguishable for i, and
histories. At the same time, ri(t) = r′
(I , r′,t) = correcti by Lemma 10(D).
θ, no correct events from iir
It is interesting to compare the results and proofs of Theorems 12 and 13. Essentially, in the run r′
modeling the brain in a vat in the former, i is a faulty agent that perceives events while none really happen.
Therefore, Kioccurred (o) can never be attained. In the run r′ constructed by Lemma 10 in Theorem 13,
on the other hand, i remains correct. The reason that Hioccurred (o) fails here is that o does not occur
within the reliable causal cone.
Theorem 13 shows that, in order to act based on the hope that an event occurred, it is necessary that
the event originates from the reliable causal cone. Unfortunately, this is not sufficient. Consider the
case of a run r where no agent exhibits a fault: every causal message chain is reliable and the ordinary
6Actually, the reasoning in this section also extends to actions, i.e., arbitrary haps.
308
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
and reliable causal cones coincide. However, since up to f agents could be byzantine, it is trivial to
modify r by seeding fail ( j) events in round ½ for several agents j in a way that is indistinguishable for
agent i trying to hope for the occurrence of o. This would enlarge the fault buffer and shrink the reliable
causal cone in the so-constructed adjusted run r. Obviously, by making different sets of agents byzantine
(without violating f , of course), one can fabricate multiple adjusted runs where ri(t) = ri(t) is exactly
the same but fault buffers and reliable causal cones vary in size and shape. Any single one of those r
satisfying the conditions of Theorem 13, in the sense that all occurrences of o happen outside its reliable
causal cone, dash the hope of i for o in r.
Thus, in order for i to have hope at (i,t) in run r that o really occurred, it is necessary that some
correct global version O of o (not necessarily the same one) is present somewhere (not necessarily at
the same node) in the reliable causal cone of every run r that ensures ri(t) = ri(t). This gives rise to the
definition of a multipede, which ensures (I , r,t) = Hioccurred(o) according to Theorem 13:
Definition 14 (Multipede). We say that a run r in a non-excluding agent context χ = ((Pε, G (0),τf , Ψ), P)
θ for event o ∈ Events at some node θ = (i,t) iff, for all runs r ∈ Rχ with ri(t) = ri(t),
contains a multipedeo
it holds that o happens inside its reliable causal cone, i.e., that
(∃( j, m) ∈◮
r
θ) (∃O ∈ GEvents j)(cid:0)O ∈ βm
ε (r) & local(O) = o(cid:1).
We obtain the following necessary condition for the existence of a multipede:
Theorem 15 (Necessary condition for a multipede). Given an arbitrary non-excluding agent-context
χ =(cid:0)(Pε, G (0),τf , Ψ), P(cid:1) such that all agents are gullible, correctable, and delayable and for any run
r ∈ Rχ in any interpreted system I = (Rχ,π), if (I , r,t) = Hioccurred(o) for a correct node θ = (i,t),
i.e., if there is a multipedeo
θ}.
For any S ⊆ A \({i}⊔ Byzr
θ, there must exist a witness wS ∈ A of some correct
event OS ∈ βmS
θ
that does not involve agents from S ⊔ Byzr
θ.
ε (r)∩ GEventswS such that local(OS) = o and such that there is causal path (wS, mS) r
ξS
θ in r, then the following must hold: Let Byzr
θ) such that S = f −Byzr
θ := { j ∈ A (∃m)( j, m) ∈ iir
ε (rS) := β0
ε (r′) ⊔ {fail ( j) j ∈ S ⊔ Byzr
θ, i.e., pertain to agents from Byzr
Proof. Since, by Lemma 10, the adjusted run r′ ∈ Rχ and since the only faults up to t occur in r′ in
the fault buffer iir
θ, for any S described above, one can construct first
θ} and keeping the rest of r′ intact. These first
t rounds by setting β0
t rounds can be extended to complete infinite runs rS ∈ Rχ indistinguishable for i at θ from either r′ or r
because the addition of fail ( j) is imperceptible for agents and does not affect protocols. The only poten-
tially affected element could have been f ilterε in the part ensuring byzantine agents do not exceed f in
number, but it also behaves the same way as in r′ because S + Byzr
i (t),
we have (I , rS,t) = Hioccurred (o). Node θ remains correct in these runs because i /∈ S. Thus, by
Theorem 13, each run rS must have a requisite correct event OS ∈ βmS
θ . It remains to note
εwS
that any such correct event from rS must be present in r′ and in r and any causal path in rS exists already
in r′ and r, according to the construction from Lemma 10. Thus, there must exist a causal path ξ in r from
(wS, mS) to θ such that ξ is reliable in rS. Finally, since all f byzantine agents in rS, namely S ⊔ Byzr
θ,
are made faulty from round ½, path ξS being reliable in rS means not involving these agents.
θ = f . Since ri(t) = r′
(rS)∩ ◮rS
i(t) = rS
From the perspective of protocol design, arguably, of more interest are sufficient conditions for
the existence of a multipede in a given run. Whereas a sufficient condition could be obtained directly
from Def. 14, of course, identifying all the transitional runs r with ri(t) = ri(t) is far from being com-
putable in general. Actually, we conjecture that sufficient conditions cannot be formulated in a protocol-
independent way at all. Unfortunately, however, protocol-dependence cannot be expected to be simple
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
309
either. For instance, even just varying the number and location of faults in r for suppressing occurred (o)
in a modified run r could be non-trivial. If k agents are already faulty in run r, at least f − k ones can
freely be used for this purpose. However, some of the k byzantine faults in r may also be re-located in r,
as agents that only become faulty after timestamp t cannot be part of any fault buffer. Rather than making
them faulty, it would suffice to just freeze them.
For instance, for the following communication structure with f = 2 and agents 1 and 2 being byzan-
tine (we omit the time dimension for simplicity's sake),
1
2
3
4
they would both participate in the fault buffer, whereas, already 2 alone would suffice because even were
1 correct, the observed communication does not give it a chance to pass by 2. Depending on 1's protocol,
it might be possible to reassign 1 to the silent masses, thereby allowing to consider 4 as the second faulty
agent and, thus, showing the impossibility for 3 to act in this situation. An opposite outcome is possible
in the following scenario:
A1.1
A2.1
I1
A1.2
C
A2.2
I2
A1.3
A2.3
Let f = 2 and the faulty agents be A2.1 and A1.1. While the sufficient condition forces C to consider
the case of both I1 and I2 being compromised and information originating from them unreliable, our
necessary condition does not rule out C's ability to make a decision.
Indeed, suppose I1 and I2 are
investigators sending in their reports via three aides each. Having received 4 identical reports that are
correct from A1.2, A1.3, A2.2, and A2.3 and only 2 fake reports from A1.1 and A2.1, agent C would have
been able to choose the correct version if the possibility of both investigators being compromised were
off the table. Our method of adjusting the run does not allow us to move the faulty agent from A1.1 to I1
because it is not clear how A1.1 would have behaved were it correct and had it received a fake report
from I1. By designing a protocol in such a way that A1.1's correct behavior in such a hypothetical situ-
ation is different, we can eliminate the possibility of investigators being compromised and, thus, resolve
the situation for C.
6 Conclusions
The main contribution of this paper is the characterization of the analog of Lamport's causal cone in
asynchronous multi-agent systems with byzantine faulty agents. Relying on our novel byzantine runs-
and-systems framework, we provided an accurate epistemic characterization of causality and the induced
reliable causal cone in the presence of asynchronous byzantine agents. Despite the quite natural final
shape of a reliable causal cone, it does not lead to simple conditions for ascertaining preconditions:
the detection of what we called a multipede is considerably more complex than the verification of the
existence of one causal path in the fault-free case. Since the agents' actions depend on the shape of
multiple alternative reliable causal cones in byzantine fault-tolerant protocols like [20], however, there is
no alternative but to detect multipedes.
310
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
Developing practical sufficient conditions for the existence of a multipede poses exciting challenges,
which are currently being addressed in the context of the epistemic analysis of some real byzantine
fault-tolerant protocols. This context-dependency is unavoidable, since the agent that tries to detect a
multipede in a run lacks global information such as the actual members of the fault buffer. On the other
hand, the gap between the necessary and sufficient conditions can potentially be minimized by designing
protocols based on the insights into the causality structure we have uncovered. For instance, while we
treated all error-creating nodes as part of the fault buffer in our necessary conditions for a multipede,
it is sometimes possible to relegate redundant parts of it into the silent masses. As this would allow to
re-locate byzantine faults for intercepting more causal paths, one may design protocols in a way that does
not allow this.
A larger and more long-term goal is to extend our study to syncausality and the reliable syncausal
cone in the context of synchronous byzantine fault-tolerant multi-agent systems, and to possibly incor-
porate protocols explicitly into the logic.
Acknowledgments. We are grateful to Yoram Moses, Hans van Ditmarsch, and Moshe Vardi for
fruitful discussions and valuable suggestions that have helped shape the final version of this paper. We
also thank the anonymous reviewers for their comments and suggestions.
References
[1] Ido Ben-Zvi & Yoram Moses (2014): Beyond Lamport's Happened-before: On Time Bounds and the Order-
ing of Events in Distributed Systems. Journalof the ACM 61(2:13), doi:10.1145/2542181.
[2] K. M. Chandy & Jayadev Misra (1986): How processes learn. Distributed Computing 1(1), pp. 40 -- 52,
doi:10.1007/BF01843569.
[3] Reinhard Diestel (2017): Graph Theory, Fifth edition. Springer, doi:10.1007/978-3-662-53622-3.
[4] Cynthia Dwork & Yoram Moses (1990): Knowledge and Common Knowledge in a Byzantine Environment:
Crash Failures. InformationandComputation 88(2), pp. 156 -- 186, doi:10.1016/0890-5401(90)90014-9.
[5] Ronald Fagin, Joseph Y. Halpern, Yoram Moses & Moshe Y. Vardi (1995): Reasoning About Knowledge.
MIT Press.
[6] Ronald Fagin, Joseph Y. Halpern, Yoram Moses & Moshe Y. Vardi (1999): Common knowledge revisited.
Annalsof Pure andApplied Logic 96(1 -- 3), pp. 89 -- 105, doi:10.1016/S0168-0072(98)00033-5.
[7] Krisztina Fruzsa (2019): Hope for Epistemic Reasoning with Faulty Agents!
In: Proceedings of ESSLLI
2019StudentSession. (To appear).
[8] Guy Goren & Yoram Moses (2018): Silence. In: PODC '18, Proceedings of the 2018 ACM Symposium on
Principlesof DistributedComputing, ACM, pp. 285 -- 294, doi:10.1145/3212734.3212768.
[9] Joseph Y. Halpern & Yoram Moses (1990): Knowledge and Common Knowledge in a Distributed Environ-
ment. Journalof the ACM 37(3), pp. 549 -- 587, doi:10.1145/79147.79161.
[10] Joseph Y. Halpern, Yoram Moses & Orli Waarts (2001): A characterization of eventual Byzantine agreement.
SIAM Journalon Computing 31(3), pp. 838 -- 865, doi:10.1137/S0097539798340217.
[11] Jaakko Hintikka (1962): Knowledge and Belief: An Introduction to the Logic of the Two Notions. Cornell
University Press.
[12] Roman Kuznets, Laurent Prosperi, Ulrich Schmid & Krisztina Fruzsa (2019): Epistemic Reasoning with
Byzantine-Faulty Agents. In: Proceedingsof FroCoS2019. (To appear).
[13] Roman Kuznets, Laurent Prosperi, Ulrich Schmid, Krisztina Fruzsa & Lucas Gr´eaux (2019): Knowledge in
Byzantine Message-Passing Systems I: Framework and the Causal Cone. Technical Report TUW-260549,
TU Wien. Available at https://publik.tuwien.ac.at/files/publik_260549.pdf.
R. Kuznets, L. Prosperi, U. Schmid & K. Fruzsa
311
[14] Leslie Lamport (1978): Time, Clocks, and the Ordering of Events in a Distributed System. Communications
of the ACM 21(7), pp. 558 -- 565, doi:10.1145/359545.359563.
[15] Leslie Lamport, Robert Shostak & Marshall Pease (1982): The Byzantine Generals Problem. ACMTransac-
tionson ProgrammingLanguagesandSystems 4(3), pp. 382 -- 401, doi:10.1145/357172.357176.
[16] Alexandre Maurer, S´ebastien Tixeuil & Xavier Defago (2015): Reliable Communication in a Dynamic Net-
work in the Presence of Byzantine Faults. eprint 1402.0121, arXiv. Available at https://arxiv.org/abs/
1402.0121.
[17] Yoram Moses (2015): Relating Knowledge and Coordinated Action: The Knowledge of Preconditions Prin-
ciple. In R. Ramanujam, editor: Proceedingsof TARK 2015, pp. 231 -- 245, doi:10.4204/EPTCS.215.17.
[18] Yoram Moses & Yoav Shoham (1993): Belief as defeasible knowledge. Artificial Intelligence 64(2), pp.
299 -- 321, doi:10.1016/0004-3702(93)90107-M.
[19] Yoram Moses & Mark R. Tuttle (1988): Programming Simultaneous Actions Using Common Knowledge.
Algorithmica 3, pp. 121 -- 169, doi:10.1007/BF01762112.
[20] T. K. Srikanth & Sam Toueg (1987): Optimal Clock Synchronization. JournaloftheACM34(3), pp. 626 -- 645,
doi:10.1145/28869.28876.
Appendix
Filter functions
Definition A.16. The filtering function f ilterε for asynchronous agents with at most f ≥ 0 byzantine
faults is defined as follows.
First, we define a subfilter f ilterB
ε : G ×℘(GEvents) × ∏n
i=1℘(GActionsi) → ℘(GEvents) that re-
moves impossible receives: for a global state h ∈ G , set Xε ⊆ GEvents, and sets Xi ⊆ GActionsi,
f ilterB
ε (h, Xε, X1, . . . , Xn) := Xε \ngrecv( j, i,µ, id)
gsend(i, j,µ, id) /∈ hε ∧
(∀A ∈ {noop} ⊔ GActionsi) fake (i, gsend(i, j,µ, id) 7→ A) /∈ hε ∧ (gsend(i, j,µ, id) /∈ Xi ∨ go(i) /∈ Xε)∧
(cid:12)(cid:12)(cid:12)
(∀A ∈ {noop} ⊔ GActionsi) fake (i, gsend(i, j,µ, id) 7→ A) /∈ Xεo,
where hε is the environment's record of all haps in the global state h and O ∈ hε (O /∈ hε) states that the
hap O ∈ GHaps is (isn't) present in this record of all past rounds, Xε represents all events attempted by
the environment and Xi's represent all actions attempted by agents i in the current round.
Second, using X B
εi
:= Xε ∩(cid:0)BEventsi ⊔ {sleep (i), hibernate (i)}(cid:1) and defining A (Failed (h)) to be
the set of agents who have already exhibited faulty behavior in the global state h, we define a subfilter
f ilter≤ f
i=1℘(GActionsi) →℘(GEvents) that removes all byzantine events in the
situation when having them would have exceeded the f threshold:
ε : G ×℘(GEvents)× ∏n
f ilter≤ f
Xε
ε (h, Xε, X1, . . . , Xn) :=
Xε \ Fi∈A
A (Failed (h)) ∪(cid:8)i X B
otherwise.
εi
if(cid:12)(cid:12)(cid:12)
≤ f ,
6= ∅(cid:9)(cid:12)(cid:12)(cid:12)
X B
εi
The filter f ilterε : G ×℘(GEvents) × ∏n
i=1℘(GActionsi) →℘(GEvents) is obtained by composing
these two subfilters, with the ≤ f subfilter applied first:
f ilterε (h, Xε, X1, . . . , Xn) := f ilterB
ε(cid:16)h, f ilter
≤ f
ε (h, Xε, X1, . . . , Xn) , X1, . . . , Xn(cid:17) .
312
Causality and Epistemic Reasoning in Byzantine Multi-Agent Systems
The composition in the opposite order could violate causality if a message receipt is preserved by
ε based on a byzantine send in the same round, which is later removed by f ilter≤ f
ε .
f ilterB
Definition A.17. The filters f ilteri : ∏n
j=1℘(GActions j) ×℘(GEvents) →℘(GActionsi) for agents' ac-
tions are defined as follows: for Xε representing all environment's events and Xi representing all actions
attempted by agent i in the current round,
f ilteri (X1, . . . , Xn, Xε) :=(Xi
if go(i) ∈ Xε,
∅ otherwise.
Update functions
Before defining the update functions, we need several auxiliary functions:
Definition A.18. We use a function local : GHaps → Haps converting correct haps from the global
format into the local formats for the respective agents in such a way that, for any i, j ∈ A , any t ∈ T, any
a ∈ Actionsi, any µ ∈ Msgs, and any M ∈ N:
1.
2.
local(GActionsi) = Actionsi;
local(GEventsi) = Eventsi;
3.
4.
local(cid:0)global (i,t, a)(cid:1) = a;
local(cid:0)grecv(i, j,µ, M)(cid:1) = recv( j,µ).
For all other haps, the localization cannot be done on a hap-by-hap basis because system events and
byzantine events fake (i, A 7→ noop) do not create a local record. Accordingly, we define a localization
function σ : ℘(GHaps) →℘(Haps) as follows: for each X ⊆ GHaps,
σ(cid:0)X(cid:1) := local(cid:16)(X ∩ GHaps) ∪
Definition A.19. We abbreviate Xεi := Xε ∩ GEventsi for performed events Xε ⊆ GEvents and actions
{E ∈ GEvents (∃i) fake (i, E) ∈ X } ∪ {A′ ∈ GActions (∃i)(∃A) fake(cid:0)i, A 7→ A′(cid:1) ∈ X }(cid:17).
Xi ⊆ GActionsi for each i ∈ A . Given a global state r (t) =(cid:0)rε (t) , r1 (t) , . . . , rn (t)(cid:1) ∈ G , we define
i ×℘(GActionsi) ×℘(GEvents) → L
i that outputs a new local state from L
i based
agent i's updatei : L
on i's actions Xi and events Xε:
updatei (ri (t) , Xi, Xε) :=(ri (t)
(cid:2)σ(cid:0)Xεi ⊔ Xi(cid:1)(cid:3) : ri (t)
if σ(Xεi) = ∅ and Xεi ∩ {go(i), sleep(i)} = ∅,
otherwise
(note that in transitional runs, updatei is always used after the action f ilteri, thus, in the absence of go(i),
it is always the case that Xi = ∅).
Similarly, the environment's state updateε : L
ε ×℘(GEvents) × ∏n
i=1℘(GActionsi) → L
ε outputs
a new state of the environment based on events Xε and all actions Xi:
updateε (rε (t) , Xε, X1, . . . , Xn) := (Xε ⊔ X1 ⊔ · · · ⊔ Xn) : rε (t) .
Accordingly, the global update function update : G ×℘(GEvents) × ∏n
the global state as follows:
i=1℘(GActions j) → G modifies
update (r (t) , Xε, X1, . . . , Xn) :=(cid:16)updateε (rε (t) , Xε, X1, . . . , Xn) ,
update1 (r1 (t) , X1, Xε) , . . . , updaten (rn (t) , Xn, Xε)(cid:17).
|
1512.07038 | 1 | 1512 | 2015-12-22T11:46:44 | Conflict Solution According to "Aggressiveness" of Agents in Floor-Field-Based Model | [
"cs.MA"
] | This contribution introduces an element of "aggressiveness" into the Floor-Field based model with adaptive time-span. The aggressiveness is understood as an ability to win conflicts and push through the crowd. From experiments it is observed that this ability is not directly correlated with the desired velocity in the free flow regime. The influence of the aggressiveness is studied by means of the dependence of the travel time on the occupancy of a room. A simulation study shows that the conflict solution based on the aggressiveness parameter can mimic the observations from the experiment. | cs.MA | cs | Conflict Solution According to "Aggressiveness"
of Agents in Floor-Field-Based Model
Pavel Hrab´ak1,(cid:63) and Marek Buk´acek2
1 Institute of Information Theory and Automation
Czech Academy of Sciences
Pod Vodarenskou vezi 4, 182 08 Prague, Czech Republic
2 Faculty of Nuclear Sciences and Physical Engineering
[email protected]
Czech Technical University in Prague
Trojanova 13, 120 00 Prague, Czech Republic
[email protected]
June 16, 2021
Abstract. This contribution introduces an element of "aggressiveness"
into the Floor-Field based model with adaptive time-span. The aggres-
siveness is understood as an ability to win conflicts and push through the
crowd. From experiments it is observed that this ability is not directly
correlated with the desired velocity in the free flow regime. The influence
of the aggressiveness is studied by means of the dependence of the travel
time on the occupancy of a room. A simulation study shows that the
conflict solution based on the aggressiveness parameter can mimic the
observations from the experiment.
Keywords: Floor-Field model, conflict solution, aggressiveness.
1
Introduction
This article focuses on a microscopic study of a simulation tool for pedestrian
flow. The object of the study is a simulation of one rather small room with
one exit and one multiple entrance, which may be considered as one segment
of a large network. The behaviour of pedestrians in such environment has been
studied by our group by means of variety experiments [4,6] from the view of the
boundary induced phase transition (this has been studied theoretically for Floor-
Field model in [9]). Observing data from these experiments we have found out
that each participant has different ability to push through the crowd. Therefore,
this article is motivated by the aim to mimic such behaviour by simple cellu-
lar model, which may be applied in simulations of apparently heterogeneous
scenarios as [13,16].
The original model is based on the Floor-Field Model [7,12,14] with adap-
tive time-span [5] and principle of bonds [10]. The adaptive time span enables
(cid:63) Corresponding author
5
1
0
2
c
e
D
2
2
]
A
M
.
s
c
[
1
v
8
3
0
7
0
.
2
1
5
1
:
v
i
X
r
a
2
P. Hrab´ak M. Buk´acek
to model heterogeneous stepping velocity of pedestrians; the principle of bonds
helps to mimic collective behaviour of pedestrians in lines. It is worth noting
that there is a variety of modifications of the Floor-Field model capturing dif-
ferent aspects of pedestrian flow and evacuation dynamics. Quite comprehensive
summary can be found in [15].
In this article we focus on the solution of conflicts, which accompany all cellu-
lar models with parallel update, i.e., when more agents decide to enter the same
site/cell. In such case, one of the agents can be chosen at random to win the
conflict, the randomness can be executed proportionally to the hopping proba-
bility of conflicting agents [7]. The unresolved conflicts play an important role
in models of pedestrian evacuation. The aim to attempt the same cell may lead
to the blocking of the motion. This is captured by the friction parameter µ de-
noting the probability that none of the agent wins the conflict. An improvement
is given by the friction function [17], which raises the friction according to the
number of conflicting agents.
In our approach we introduce an additional property determining the agent's
ability to win conflicts, which may be understood as agent's aggressiveness. This
characteristics has been inspired by the analyses of repeated passings of pedestri-
ans through a room under various conditions from free flow to high congestion.
As will be shown below, this characteristics significantly affects the time spent by
individual agents in the room, which is referred to as the travel time. Similar het-
erogeneity in agents behaviour has been used in [11], where the "aggressiveness"
has been represented by the willingness to overtake.
2 Experiment
The introduction of the aggressiveness as an additional model parameter is moti-
vated by the microscopic analyses of the experimental data from the experiment
"passing-through" introduced in [6]. The set-up of the experiment is shown in
Figure 1. Participants of the experiment were entering a rectangle room in order
to pass through and leave the room via the exit placed at the opposite wall to
the entrance.
The inflow rate of pedestrians has been controlled in order to study the
dependence of the phase (free flow or congested regime) on the inflow rate α. In
order to keep stable flow through the room, pedestrians were passing the room
repeatedly during all runs of the experiment.
Each participant has been equipped by a hat with unique binary code. The
automatic image recognition enables us not only to restore the pedestrians tra-
jectories but more over to assign all trajectories to individual participants. This
enables the study of individual properties of the pedestrians under a bride scale
of conditions, since for each participant there are 20 to 40 records of their pass-
ings.
One of the investigated quantities is the travel-time T T = Tout−Tin denoting
the length of the interval a pedestrian spent in the room between the entrance at
Tin and the egress at Tout. To capture the pedestrians behaviour under variety
"Aggressiveness" in Floor-Field Model
3
Fig. 1. Taken from [6]. Left: Experimental setting the experiment, a = 7.2 m, b =
4.4 m. After the passage through the exit, participant returned to the area Y waiting for
another entry. Right: sketch of pedestrian's hat used for automatic image recognition.
of conditions, the travel time is investigated with respect to the average number
of pedestrians in the room Nmean defined as
(cid:90) Tout
Tout − Tin
Tin
Nmean =
1
N (t)dt ,
(1)
where N (t) stands for the number of pedestrians in the room at time t. Fig-
ure 2 shows the scatter plot of all pairs (Nmean, T T ) gathered over all runs of
experiment and all participants.
The reaction of participants on the occupancy of the room significantly dif-
fers. There are two basic characteristics of that can be extracted: the mean travel
time in the free-flow regime (0 - 7 pedestrians) and the slope of the travel-time
dependence on the number of pedestrians in the congested regime (10 - 45 pedes-
trians). The former is given by the desired velocity, the latter reflects the ability
to push through the crowd, referred to as the aggressiveness. This observation
corresponds to the piece-wise linear model for each pedestrian
T T =
S
v0(i)
+ 1{N >7}(N − 7) · slope(i) + noise
(2)
where S = 7.2 m, v0(i) is the free-flow velocity of the pedestrian i, slope(i) is the
unique coefficient of the linear model for pedestrian i. The breakpoint N = 7
depends from the room geometry. The weighted mean of the R2 value of the
model (2) is 0.688.
Detailed description of the experiment and its analyses has been presented
at the conference TGF 15 and will be published in the proceedings [3]. Videos
capturing the exhibition of the aggressive behaviour are available at http://
gams.fjfi.cvut.cz/peds.
3 Model Definition
The model adapts the principle of the known Floor-Field cellular model. The
playground of the model is represented by the rectangular two-dimensional lat-
tice L ⊂ Z2 consisting of cells x = (x1, x2). Every cell may be either occupied by
26252423222120control bitbinary codecentre of massrecognitionmark4
P. Hrab´ak M. Buk´acek
Fig. 2. Scatter plot of the travel time T T with respect to the occupancy Nmean ex-
tracted from the experiment. Three participants are highlighted. Their travel time is
approximated by the piecewise linear model. We can see that Ped. 2 has lower desired
velocity in free regime but higher ability to push through the crowd in comparison to
Ped. 4.
one agent or empty. Agents are moving along the lattice by hopping from their
current cell x ∈ L to a neighbouring cell y ∈ N (x) ⊂ L, where the neighbourhood
N (x) is Moore neighbourhood, i.e., N (x) = {y ∈ L; maxj=1,2 xj − yj ≤ 1} .
3.1 Choice of the New Target Cell
(cid:112)
Agents choose their target cells y from N (x) stochastically according to proba-
bilistic distribution P (y x; state of N (x)), which reflects the "attractiveness"
of the cell y to the agent. The "attractiveness" is expressed by means of the
static field S storing the distances of the cells to the exit cell E = (0, 0), which
is the common target for all agents. For the purposes of this article, the eu-
y12 + y22. Then it is considered
clidean distance has been used, i.e., S(y) =
P (y x) ∝ exp{−kSS(y)}, for y ∈ N (x). Here kS ∈ [0, +∞) denotes the param-
eter of sensitivity to the field S.
The probabilistic choice of the target cell is further influenced by the occu-
pancy of neighbouring cells and by the diagonality of the motion. An occupied
cell is considered to be less attractive, nevertheless, it is meaningful to allow the
choice of an occupied cell while the principle of bonds is present (explanation of
the principle of bonds follows below). Furthermore, the movement in diagonal
direction is penalized in order to suppress the zig-zag motion in free flow regime
and support the symmetry of the motion with respect to the lattice orientation.
0510152025303540455001020304050N_mean [peds]TT [s] Ped. 17 dataPed. 17 modelPed. 4 dataPed. 4 modelPed. 2 dataPed. 2 model"Aggressiveness" in Floor-Field Model
5
Technically this is implemented as follows. Let Ox(y) be the identifier of
agents occupying the cell y from the point of view of the agent sitting in cell
x, i.e. Ox(x) = 0 and for y (cid:54)= x Ox(y) = 1 if y is occupied and Ox(y) = 0
if y is empty. Then P (y x) ∝ (1 − kOOx(y)), where kO ∈ [0, 1] is again the
parameter of sensitivity to the occupancy (kO = 1 means that occupied cell
will never be chosen). Similarly can be treated the diagonal motion defining
the diagonal movement identifier as Dx(y) = 1 if (x1 − y1) · (x2 − y2) (cid:54)= 0 and
Dx(y) = 0 otherwise. Sensitivity parameter to the diagonal movement is denoted
by kD ∈ [0, 1] (kD = 1 implies that diagonal direction is never chosen).
final form
The probabilistic choice of the new target cell can be than written in the
exp(cid:8)
z∈N (x) exp(cid:8)
(cid:80)
− kSS(y)(cid:9)(cid:0)1 − kOOx(y)(cid:1)(cid:0)1 − kDDx(y)(cid:1)
− kSS(z)(cid:9)(cid:0)1 − kOOx(z)(cid:1)(cid:0)1 − kDDx(z)(cid:1) .
P (y x) =
(3)
It is worth noting that the site x belongs to the neighbourhood N (x), therefore
the equation (3) applies to P (x x) as well.
3.2 Updating Scheme
The used updating scheme combines the advantages of fully-parallel update ap-
proach, which leads to necessary conflicts, and the asynchronous clocked scheme [8]
enabling the agents to move at different rates.
Each agent carries as his property the own period denoted as τ , which repre-
sents his desired duration between two steps, i.e., the agent desires to be updated
agents, but undesirably suppresses the number of conflicts between agents with
different τ . To prevent this, we suggest to divide the time-line into isochronous
at times t = kτ , k ∈ Z. Such principle enables to model different velocities of
(cid:2)kh, (k + 1)h(cid:1). A wise choice of the interval length h in dependence on the dis-
intervals of the length h > 0. During each algorithm step k ∈ Z such agents
are updated, whose desired time of the next actualization lies in the interval
tribution of τ leads to the restoration of conflicts in the model. It worth noting
that we use the concept of adaptive time-span, i.e., the time of the desired actu-
alization is recalculated after each update of the agent, since it can be influenced
by the essence of the motion, e.g., diagonal motion leads to a time-penalization,
since it is √2 times longer. For more detail see e.g. [5]. This is an advantage over
the probabilistic approach introduced in [1].
3.3 Principle of Bonds
The principle of bonds is closely related to the possibility of choosing an occupied
cell. An agent who chooses an occupied cell builds a bond to the agent sitting in
the chosen cell. This bond lasts until the motion of the blocking agent or until
the next activation of the bonded agent. The idea is that the bonded agents
attempt to enter their chosen cell immediately after it becomes empty.
6
P. Hrab´ak M. Buk´acek
3.4 Aggressiveness and Solution of Conflicts
The partially synchronous updating scheme of agents leads to the kind of con-
flicts that two ore more agents are trying to enter the same cell. This occurs when
more agents choose as their target cell the same cell, or when more agents are
bonded to the same cell, which becomes empty. The mechanism of the conflict
solution is the same in both cases. Each agent carries an information about his
ability to "win" conflicts which is here referred to as aggressiveness and denoted
by letter γ ∈ [0, 1]. The conflict is always won by agents with highest γ.
If there are two or more agents with the highest γ, the friction parameter µ
plays a role. In this article we assume that the higher is the aggressiveness γ, the
less should be the probability that none of the agents wins the conflict. Therefore,
the conflict is not solved with probability µ(1 − γ) (none of the agents move).
With complement probability 1 − µ(1 − γ) the conflict resolves to the motion
of one of the agents. This agent is chosen randomly with equal probability from
all agents with involved in the conflict having the highest γ. The mechanism of
the friction can be easily modified. An example of conflict solution is depicted
in Figure 3.
Fig. 3. Conflict solution for γ1 < γ2. Left: More aggressive wins the conflict over two
less aggressive. Right: The conflict of two more aggressive can resolve by the blocking
of the movement.
4
Impact of the Aggressiveness Element
The effect of the aggressiveness has been studied by means of the simulation.
Results stressed in this article come from the simulations with parameters given
by Table 1. The values of τ and γ are distributed among agents uniformly and
independently on each other.
The simulation set-up has been designed according to the experiment, i.e.,
the room of the size 7.2 m × 4.4 m has been modelled by the rectangular lat-
tice 18 sites long and 11 sites wide. The size of one cell therefore corresponds
to 0.4 m × 0.4 m. The exit is placed in the middle of the shorter wall, the
6P.Hrab´akM.Buk´acekIftherearetwoormoreagentswiththehighestγ,thefrictionparameterµplaysarole.Inthisarticleweassumethatthehigheristheaggressivenessγ,thelessshouldbetheprobabilitythatnoneoftheagentswinstheconflict.Therefore,theconflictisnotsolvedwithprobabilityµ(1−γ)(noneoftheagentsmove).Withcomplementprobability1−µ(1−γ)theconflictresolvestothemotionofoneoftheagentswithhighestγ.Thisagentischosenatrandom.Themechanismofthefrictioncanbeeasilymodified.AnexampleofconflictsolutionisdepictedinFigure3.γ2γ1γ1γ2γ1γ1γ1γ2γ2µ(1−γ2)γ1γ2γ21−µ(1−γ2)2γ1γ2γ21−µ(1−γ2)2γ1γ2γ2Fig.3.Conflictsolutionforγ1<γ2.Left:Moreaggressivewinstheconflictovertwolessaggressive.Right:Theconflictoftwomoreaggressivecanresolvebytheblockingofthemovement.4ImpactoftheAggressivenessElementTheeffectoftheaggressivenesshasbeenstudiedbymeansofthesimulation.ResultsstressedinthisarticlecomefromthesimulationswithparametersgivenbyTable1.Thevaluesofτandγaredistributedamongagentsuniformlyandindependentlyoneachother.Table1.Valuesofparametersusedforsimulation.kSkOkDhµτγ3.510.70.1s0.5{.25,.4}{0,1}Thesimulationset-uphasbeendesignedaccordingtotheexperiment,i.e.,theroomofthesize7.2m×4.4mhasbeenmodelledbytherectangularlat-tice18siteslongand11siteswide.Thesizeofonecellthereforecorrespondsto0.4m×0.4m.Theexitisplacedinthemiddleoftheshorterwall,theopenboundaryismodelledbyamultipleentranceontheoppositewall.Newagentsareenteringthelatticestochasticallywiththemeaninflowrateα[pedes-"Aggressiveness" in Floor-Field Model
7
Table 1. Values of parameters used for simulation.
kS
3.5
kO
1
kD
0.7
h
0.1 s
µ
0.5
τ
{.25, .4}
γ
{0, 1}
open boundary is modelled by a multiple entrance on the opposite wall. New
agents are entering the lattice stochastically with the mean inflow rate α [pedes-
trians/second]. The inflow rate is a controlled parameter. For more detailed
description of the simulation we refer the reader to [2].
It has been shown that such system evinces the boundary induced phase
transition from the free flow (low number of agents in the lattice) to the conges-
tion regime (high number of pedestrians in the lattice) via the transient phase
(number of pedestrians fluctuating between the low and high value). Therefore,
wise choice of different inflow rates α covering the all three phases, enables us to
study the dependence of the travel time T T on the average number of agents in
the lattice Nmean. When simulating with parameters from Table 1, the correct
choice of inflow rate is α ∈ [1, 3].
Figure 4 shows the dependence of the travel time T T = Tout−Tin on the aver-
age number of agents in the lattice Nmean calculated according to (1). Measured
data consisting of pairs (Nmean, T T ) are aggregated over simulations for inflow
rate values α ∈ {1, 1.5, 1.8, 2.0, 2.3, 2.7, 3.0}; for each inflow α twenty runs of the
simulation have been performed. Each run simulates 1000 s of the introduced
scenario starting with empty room. Agents were distributed into four groups
according their own period τ and aggressiveness γ, namely "fast aggressive"
(τ = 0.25, γ = 1), "fast calm" (τ = 0.25, γ = 0), "slow aggressive" (τ = 0.4,
γ = 1), and "slow calm" (τ = 0.4, γ = 0).
In the graph of the Figure 4 we can see the average travel time for each group
calculated with respect to the occupancy of the room. It is evident that for low
occupancy up to 10 agents in the room the mean travel time for each group levels
at a value corresponding to the free flow velocity given by the own updating
period. For the occupancy above 20 agents in the lattice, the linear growth of
the mean travel time with respect to Nmean is obvious. Furthermore, the average
travel time for fast-calm corresponds to the travel time of slow aggressive. The
Figure 4 shows two auxiliary graphs presenting the dependence of T T on Nmean
for systems with homogeneity in γ (left) or in τ (right). From the graphs we
can conclude that the heterogeneity in aggressiveness γ reproduces the desired
variance in the slope of the graph without the non-realistic high variance in free
flow generated by the heterogeneity of own updating frequency.
The influence is even more evident from the graph in Figure 5 representing a
plot of all travel time entries with respect to the time of the exiting Tout. Right
graph shows the box-plots of the travel time for four groups measured after 500 s
from the initiation, i.e., in the steady phase of the system. We can see that in
this view, the aggressiveness plays more important role that the desired velocity
of agents.
8
P. Hrab´ak M. Buk´acek
Fig. 4. Dependence of the mean travel time T T on the average occupancy Nmean for
each group of agents. Gray lines represent the quantiles of the travel time regardless
to the groups. Top: heterogeneity in both, γ and τ . Bottom left: heterogeneity in τ .
Bottom right: heterogeneity in γ.
5 Conclusions and Future Work
The article introduced a parameter of aggressiveness as an additional character-
istics of agents in the Floor-Field model with adaptive time. This parameter is
understood as an ability to win conflicts. Therefore the heterogeneity of agents
is given by their desired velocity (determined by the own period τ ) and their
ability to win conflicts referred to as the aggressiveness.
The simulation study shows that the aggressiveness has significant influence
in the regime with high occupation of the room, i.e., in the dense crowd, and on
the other hand has no effect in the free flow, as desired. The linear dependence of
the travel time on the number of pedestrians in the agents neighbourhood seems
to be a good tool how to measure the ability of agents/pedestrians to push
through the crowd. The independence of this ability on the desired velocity of
agents is very important to mimic the aspect that some "fast" pedestrians can
be significantly slowed down by the crowd while some "slow" pedestrians can
push through the crowd more effectively.
TitTitTitPavelHrab´ak2,?andMarekBuk´acek11FacultyofNuclearSciencesandPhysicalEngineeringCzechTechnicalUniversityinPragueTrojanova13,12000Prague,CzechRepublicbukacma2@fjfi.cvut.cz2InstituteofInformationTheoryandAutomationAcademyofSciencesoftheCzechRepublicPodVodarenskouvezi4,18208Prague,[email protected],2015020406080100120140160180200050100150qv = 0qv = 0.1qv = 0.5qv = 0.9N_meanmean(TT) γ=0, τ=0.25γ=0, τ=0.4γ=1, τ=0.25γ=1, τ=0.4010203005101520 050100150200050100150N_meanmean(TT) γ=0, τ=0.25γ=0, τ=0.4010203001020 050100150200050100150N_meanmean(TT) γ=0, τ=0.3γ=1, τ=0.3010203001020 ?Correspondingauthor"Aggressiveness" in Floor-Field Model
9
Fig. 5. Left: Development of travel time T T in time for one run of the simulation. The
value T T is plotted against the time of the exit Tout to ensure that values corresponding
to the same time stem from similar conditions near the exit. Inflow rate α = 3 ped/s.
The agent group is indicated by the color. Right: Box-plots of the travel time for entries
with Tin > 500 s (i.e. in the steady state).
We believe that such feature can be very useful in the simulation of the
evacuation or egress of large complexes as e.g. football stadiums, where the less
aggressive pedestrians (parents with children, fragile women) can be slowed down
and leave the facility significantly later than the average. The model reproduces
this aspect even in the case of the homogeneity in own period τ .
In the future we plan to study this aspect in more detail. Mainly we would like
to focus on the joint distribution of the desired velocity τ and the aggressiveness
γ among the population and study its impact by means of the proposed model.
Acknowledgements.
This work was supported by the Czech Science Foundation under grants GA13-
13502S (P. Hrab´ak) and GA15-15049S (M. Buk´acek). Further support wa pro-
vided by the CTU grant SGS15/214/OHK4/3T/14.
References
1. Bandini, S., Crociani, L., Vizzari, G.: Heterogeneous pedestrian walking speed
in discrete simulation models. In: Chraibi, M., Boltes, M., Schadschneider, A.,
Seyfried, A. (eds.) Traffic and Granular Flow '13, pp. 273 -- 279. Springer Interna-
tional Publishing (2015)
2. Buk´acek, M., Hrab´ak, P.: Case study of phase transition in cellular models of
pedestrian flow. In: Was, J., Sirakoulis, G., Bandini, S. (eds.) Cellular Automata,
Lecture Notes in Computer Science, vol. 8751, pp. 508 -- 517. Springer International
Publishing AG (2014)
020040060080010000100200300400T_out [s]TT [s] 010020030040000110.250.40.250.4γ = 1, τ = 0.4γ = 1, τ = 0.25γ = 0, τ = 0.4γ = 0, τ = 0.2510
P. Hrab´ak M. Buk´acek
3. Buk´acek, M., Hrab´ak, P., Krb´alek, M.: Individual microscopic results of bottleneck
experiments. In: Traffic and Granular Flow '15. Springer International Publishing,
to be published.
4. Buk´acek, M., Hrab´ak, P., Krb´alek, M.: Experimental analysis of two-dimensional
pedestrian flow in front of the bottleneck. In: Chraibi, M., Boltes, M., Schadschnei-
der, A., Seyfried, A. (eds.) Traffic and Granular Flow '13, pp. 93 -- 101. Springer
International Publishing (2015)
5. Buk´acek, M., Hrab´ak, P., Krb´alek, M.: Cellular model of pedestrian dynamics with
adaptive time span. Lecture Notes in Computer Science, vol. 8385, pp. 669 -- 678.
Springer Berlin Heidelberg (2014)
6. Buk´acek, M., Hrab´ak, P., Krb´alek, M.: Experimental study of phase transition in
pedestrian flow. In: Daamen, W., Duives, D.C., Hoogendoorn, S.P. (eds.) Pedes-
trian and Evacuation Dynamics 2014, Transportation Research Procedia, vol. 2,
pp. 105 -- 113. Elsevier Science B.V. (2014)
7. Burstedde, C., Klauck, K., Schadschneider, A., Zittartz, J.: Simulation of pedes-
trian dynamics using a two-dimensional cellular automaton. Physica A: Statistical
Mechanics and its Applications 295(3-4), 507 -- 525 (2001)
8. Cornforth, D., Green, D.G., Newth, D.: Ordered asynchronous processes in multi-
agent systems. Physica D 204(1-2), 70 -- 82 (2005)
9. Ezaki, T., Yanagisawa, D., Nishinari, K.: Analysis on a single segment of evacuation
network. Journal of Cellular Automata 8(5-6), 347 -- 359 (2013)
10. Hrab´ak, P., Buk´acek, M., Krb´alek, M.: Cellular model of room evacuation based
on occupancy and movement prediction: Comparison with experimental study.
Journal of Cellular Automata 8(5-6), 383 -- 393 (2013)
11. Ji, X., Zhou, X., Ran, B.: A cell-based study on pedestrian acceleration and over-
taking in a transfer station corridor. Physica A: Statistical Mechanics and its Ap-
plications 392(8), 1828 -- 1839 (2013)
12. Kirchner, A., Schadschneider, A.: Simulation of evacuation processes using a
bionics-inspired cellular automaton model for pedestrian dynamics. Physica A:
Statistical Mechanics and its Applications 312(12), 260 -- 276 (2002)
13. Kleczek, P., Was, J.: Simmulation of pedestrian behavior in shopping mall. In:
Was, J., Sirakoulis, G., Bandini, S. (eds.) Cellular Automata, Lecture Notes in
Computer Science, vol. 8751, pp. 650 -- 659. Springer International Publishing AG
(2014)
14. Kretz, T.: Pedestrian Traffic, Simulation and Experiments. Ph.D. thesis, Univer-
sitat Duisburg-Essen, Germany (2007)
15. Schadschneider, A., Chowdhury, D., Nishinari, K.: Stochastic Transport in Com-
plex Systems: From Molecules to Vehicles. Elsevier Science B. V., Amsterdam
(2010)
16. Spartalis, E., Georgoudas, I., Sirakulis, G.: Ca crowd modeling for a retirement
house evacuation with guidance. In: Was, J., Sirakoulis, G., Bandini, S. (eds.)
Cellular Automata, Lecture Notes in Computer Science, vol. 8751, pp. 481 -- 491.
Springer International Publishing AG (2014)
17. Yanagisawa, D., Kimura, A., Tomoeda, A., Nishi, R., Suma, Y., Ohtsuka, K.,
Nishinari, K.: Introduction of frictional and turning function for pedestrian outflow
with an obstacle. Phys. Rev. E 80, 036110 (2009)
|
1912.11495 | 1 | 1912 | 2019-12-24T19:12:21 | A Bi-Level Cooperative Driving Strategy Allowing Lane Changes | [
"cs.MA",
"math.OC"
] | This paper studies the cooperative driving of connected and automated vehicles (CAVs) at conflict areas (e.g., non-signalized intersections and ramping regions). Due to safety concerns, most existing studies prohibit lane change since this may cause lateral collisions when coordination is not appropriately performed. However, in many traffic scenarios (e.g., work zones), vehicles must change lanes. To solve this problem, we categorize the potential collision into two kinds and thus establish a bi-level planning problem. The right-of-way of vehicles for the critical conflict zone is considered in the upper-level, and the right-of-way of vehicles during lane changes is then resolved in the lower-level. The solutions of the upper-level problem are represented in tree space, and a near-optimal solution is searched for by combining Monte Carlo Tree Search (MCTS) with some heuristic rules within a very short planning time. The proposed strategy is suitable for not only the shortest delay objective but also other objectives (e.g., energy-saving and passenger comfort). Numerical examples show that the proposed strategy leads to good traffic performance in real-time. | cs.MA | cs | A Bi-Level Cooperative Driving Strategy Allowing Lane
Changes
Huile Xu 1, 2, Yi Zhang 1, 3, Christos G. Cassandras 2, Li Li 1, , Shuo Feng 4
1. Department of Automation, Tsinghua University, Beijing, China 100084
2. Division of Systems Engineering and Center for Information and Systems Engineering, Boston University, Boston,
MA, USA 02215
3. Tsinghua-Berkeley Shenzhen Institute (TBSI), Shenzhen, China 518055
4. Department of Civil and Environmental Engineering, University of Michigan, Ann Arbor, MI, USA 48109
Abstract: This paper studies the cooperative driving of connected and automated vehicles (CAVs)
at conflict areas (e.g., non-signalized intersections and ramping regions). Due to safety concerns,
most existing studies prohibit lane change since this may cause lateral collisions when
coordination is not appropriately performed. However, in many traffic scenarios (e.g., work zones),
vehicles must change lanes. To solve this problem, we categorize the potential collision into two
kinds and thus establish a bi-level planning problem. The right-of-way of vehicles for the critical
conflict zone is considered in the upper-level, and the right-of-way of vehicles during lane changes
is then resolved in the lower-level. The solutions of the upper-level problem are represented in tree
space, and a near-optimal solution is searched for by combining Monte Carlo Tree Search (MCTS)
with some heuristic rules within a very short planning time. The proposed strategy is suitable for
not only the shortest delay objective but also other objectives (e.g., energy-saving and passenger
comfort). Numerical examples show that the proposed strategy leads to good traffic performance
in real-time.
Keywords: connected and automated vehicles (CAVs), cooperative driving, lane change, Monte
Carlo Tree Search (MCTS)
1. Introduction
Increasing traffic congestion and accidents have caused huge losses to society and generated
Manuscript received Dec. 2nd, 2019.
Corresponding author. Mail address: #806, Central Main Building, Tsinghua University, Beijing, China 100084
Tel.: + 86 (10) 62782071; E-mail address: [email protected]
-1-
wide concern in recent years (Rios-Torres et al., 2016). The emergence of Connected and
Automated Vehicles (CAVs) and CAV-based traffic control is believed to be a promising way of
improving safety and
traffic efficiency. With
the aid of vehicle-to-everything (V2X)
communication, CAVs can share their driving states (position, velocity, acceleration, etc.) and
intentions with adjacent vehicles and road infrastructure to better coordinate their motions (Li et
al., 2014; Sukuvaara et al., 2009).
The existing studies for CAV-based traffic control can be categorized into six types of
approaches (Guo et al., 2019), that is, driver guidance (Ubiergo and Jin, 2016), actuated (adaptive)
signal control (Yun and Park, 2012), platoon-based signal control (Lioris et al., 2017),
planning-based signal control (Goodall et al., 2013), signal-vehicle coupled control (Yu et al.,
2018), and multi-vehicle cooperative driving without traffic signals (Chen and Englund, 2016).
Different from the other five types of approaches, most studies about multi-vehicle cooperative
driving requires a 100% CAV environment but does not rely on the traffic signal control system
like traffic lights and stop signs. In recent years, there also have been some studies to investigate
the performance of cooperative driving under different penetration rates, revealing that multiple
benefits still can be offered by CAVs even there are some human-driving vehicles in the
environment (Zhang and Cassandras, 2019). Thus, with the rapid development of CAVs, it is
regarded as the most promising and efficient intelligent transportation system (ITS) in the future.
The main task of cooperative driving is to cooperatively control CAVs passing through the
conflict areas safely and efficiently without any traffic signaling. The concept of cooperative
driving first appeared in the early 1990s. The Association of Electronic Technology for
Automobile Traffic and Driving presented it for flexible platooning of automated vehicles with a
short inter-vehicle distance (Tsugawa, 2002). Since then, cooperative driving has been
continuously studied by many researchers and examined by various projects, e.g., the Demo 2000
Cooperative Driving System in Japan (Kato et al., 2002) and the Grand Cooperative Driving
Challenge in Netherlands (Englund et al., 2016). Researchers found that one of the key points for
cooperative driving was to determine the right-of-way of vehicles for conflicting areas (Li et al.,
2006; Guler et al., 2014). An assignment of the right-of-way of vehicles for the critical conflict
zone generates a possible passing order for vehicles.
As summarized in (Meng et al., 2017), there are two primary kinds of cooperative driving
strategies, ad hoc negotiation-based and planning-based, for determining the passing order.
Ad hoc negotiation-based strategies aim to assign right-of-way using some heuristic rules
within a very short time (Xu et al., 2019a). Dresner and Stone (2008) proposed a
reservation-based intersection management strategy which divided the intersection into grids
(resources) and assigned these grids to CAVs in a First-In-First-Out (FIFO) manner. Choi et al.
(2018) extended the idea of reservation-based cooperative traffic management to an intersection of
multi-lane roads. They considered moving directions of vehicles when passing through the
-2-
intersection and found that the vehicles turning left greatly contribute to the overall average delay.
Malikopoulos et al. (2018) proposed a decentralized energy-optimal control framework for CAVs
at signal-free intersections in which the right-of-way (desired arrival times to the intersection) was
determined according to the FIFO manner and the trajectories (velocity and acceleration profiles)
of vehicles were derived through a decentralized optimal control problem. To realize a fast
implementation, they presented a complete analytical solution for the decentralized optimal
control problem. For simplicity, the considered scenario in the work was an isolated single-lane
intersection with no lane changes and no turns allowed. Then, Zhang et al. (2018) further extended
the decentralized energy-optimal control framework by including left and right turns and proposed
a dynamic resequencing method for relaxing the FIFO constraints and exploring some other
possible right-of-way. Besides the intersection scenarios, the FIFO-based passing order can be
easily extended to resolve the conflicts in other traffic scenarios such as highway ramps and work
zones. Other conflict resolutions for assigning the right-of-way like conflict graph (Liu et al., 2018)
and virtual vehicles (Uno et al., 1999; Xu et al., 2018) also have been attempted to be applied in
this field. However, as shown in (Meng et al., 2017), the passing order found by ad hoc
negotiation-based strategies roughly followed the FIFO rule and were not good enough in many
situations.
Planning-based strategies aim to enumerate all possible passing orders to find a globally
optimal solution (Xu et al., 2019a). Most state-of-the-art studies formulate the problem as an
optimization problem whose objective is usually set to minimize the total delay or passing time of
all CAVs (Meng et al., 2017; Li et al., 2017). Li et al. (2017) formulated the intersection
automation policy within a 100% CAV environment as a mixed-integer linear programming
(MILP) problem whose decision variables were desired arrival
times and used
the
branch-and-bound search approach to find the exact optimal solution. Hult et al. (2016)
formulated an optimal coordination problem for vehicles and the decision variables were states
and control signals for each vehicle. They used model predictive control to solve the problem and
took a simple intersection scenario with six vehicles as an example. Apart from the above, the
objective of some studies is to minimize the overlap of vehicle trajectories inside the intersection
zone. For example, Kamal et al. (2014) proposed a vehicle-intersection coordination scheme for
preventing each pair of conflicting vehicles from approaching their cross-collision point at the
same time. A risk function was designed to indicate the risk of a collision of a pair of vehicles, and
then the model predictive control was used to solve the resulting constrained nonlinear
optimization problem. The tree search method is an equivalent formulation to the optimization
method. Li et al. (2006) showed that we can also view the cooperative driving problem as a tree
search problem. Each tree node indicates a special passing order and the equivalent objective was
to find the node corresponds to the minimum objective value. However, all these studies ignore
the lane change for the sake of safety concerns and simplicity. Moreover, the computation time of
all planning-based strategies increases sharply as the number of vehicles increases (Lawler et al.,
-3-
1966; Morrison et al., 2016). This hinders their applications in practice.
In recent years, some state-of-the-art studies have started taking lane changing into
consideration mainly because a) no feasible solution exists for collision avoidance in some driving
scenarios without considering a lane change; and b) the latest development of CAV technology is
beginning to meet the requirement of control and positioning accuracy for lane changes. Lu et al.
(2019) considered lane changing and formulated the traffic management of vehicle trajectories as
a mixed-integer nonlinear programming (MINLP) problem and developed a specialized algorithm
based on the rolling horizon approach to improve the computational efficiency. They aimed to
optimize both longitudinal and lateral trajectories for all vehicles, subject to vehicle kinematics
and collision avoidance. For simplicity, they assumed that a lane change maneuver can always be
completed within a given time interval. Hu et al. (2019) showed that when the passing order of
vehicles in the cooperative lane change region was determined, the trajectories of vehicles could
be efficiently optimized by a linear programming model. The FIFO-based passing order was used,
and the lane change maneuvers of all vehicles were assumed to be completed within the same time
interval. Nevertheless, the assumption is practically impossible, and the lane change trajectory
used is not mentioned. Smooth lane change trajectories approximated by the sixth order
polynomials were considered in (Li et al., 2005). They showed that the lane change trajectories of
vehicles can be considered and optimized through a constructed tree search problem. Then, this
idea was further extended from intersections to lane closures (Li et al., 2007). Thus, the lane
change can be carried out in a more practical way. However, it is difficult to find a good solution
when the number of vehicles is large. Although the lane change was not considered, Xu et al.
(2019b) showed that Monte Carlo tree search with heuristic rules can help us to search a good
solution even when the search space is huge. As seen from the above, the studies of cooperative
driving allowing lane changing is limited or oversimplified.
In summary, there are two problems to conquer in this research direction. First, it is difficult
to handle lane changing in local conflict areas and deal with the high nonlinearity caused by
considering the lane change trajectories. Second, the following vehicle may pass through the
conflict zones earlier than the preceding vehicle because of the lane change, which results in the
sharp increase of the size of the search space for possible passing orders. The increasing number
of the passing orders makes it difficult to find a good enough passing order within limited
computation time. To realize a fast implementation, many studies use FIFO-based rule or other
heuristic rules to assign right-of-way to vehicles. However, the performance of the solution cannot
be guaranteed.
To address these two major limitations, we propose a bi-level-based cooperative driving
strategy allowing lane changes. According to the two types of potential collisions, we establish a
bi-level planning problem in which the optimization problem for the cooperative driving is broken
down into two sub-problems. For the first problem of finding the optimal passing order, we
-4-
creatively build a tree representation of the solution space for passing orders. After that, we
combine the Monte Carlo Tree Search (MCTS) with some heuristic rules to find a more promising
passing order than the FIFO-based passing order. For the second problem of deriving the objective
value and the corresponding trajectories of vehicles, we design a passing-order-to-trajectory
interpretation algorithm to quickly derive a feasible solution for the optimization problem on
condition that the passing order is given. For each lane change vehicle, a suitable lane change
trajectory constrained by vehicle dynamics is chosen from a pre-designed trajectory set according
to the velocity of the vehicle. Thus, the right-of-way of vehicles for the critical conflict zone is
considered in the upper-level, and the right-of-way of vehicles during lane changes is then
resolved in the lower-level. Testing results show that the proposed strategy can effectively
improve traffic efficiency with a short enough computation time.
The main contributions of the paper include: (a) we explicitly consider the lane change
trajectories constrained by vehicle dynamics and make the solution framework more practical than
most of the existing studies; (b) we formulate a bi-level planning which greatly reduces the
complexity of the problem and makes it more efficiently solved than the conventional MIP
problem; (c) we use the MCTS-based tree search to realize the trade-off between the
computational efficiency and coordination performance.
To give a better presentation of our finding, the rest of this paper is arranged as follows.
Section 2 introduces the problem and formulates it into an optimization problem. Section 3 briefly
reviews the existing strategies and presents our new strategy. Section 4 shows the testing results of
this new strategy. Finally, Section 5 gives conclusions.
2. Problem Presentation
2.1 Conflict Zone Classification
We can classify all conflict zones into two kinds, critical conflict zones and local conflict
zones, according to the impact of the conflict on the driving scenario.
Critical conflict zones are the relatively fixed areas where a lot of potential collisions may
occur if vehicles do not appropriately adjust their motion. They are usually the bottleneck area of
traffic flow and are caused by two main reasons: 1) changes in road geometry and 2) unreasonable
occupancy of road resources. For the former, lane crossing and lane merging are the most common
causes of road geometry changes. The resulting increase in collision risk and the reduction of the
maximum traffic capacity require good coordination of the motions of the vehicles. For the latter,
the unreasonable occupancy of road resources often leads to the reduction of the number of lanes
and blocks the traffic flow in several lanes. For example, a part of the road in a lane is disabled
because of a work zone, an accident vehicle, or other obstacles. All vehicles in the same lane
-5-
where a part of the road is disabled must change their lanes in advance to avoid a collision with
them. The classic critical conflict zones include intersections, highways with a work zone, etc.
In contrast, local conflict zones are the areas where conflicts are caused by the maneuvers of
vehicles. These local conflicts influence the motions of several adjacent vehicles for a small period
of time. For instance, the local conflict zone may appear due to a lane change maneuver of one
vehicle and quickly disappear when the maneuver is completed.
Most of the complicated driving scenarios are made up of several basic driving scenarios,
like intersection, on-ramp, off-ramp, roundabout, road segment, etc. For example, a simple urban
traffic network can be divided into several intersection scenarios and road segment scenarios
based on the geometry of the road. As shown in Fig. 1, most basic driving scenarios include only
one critical conflict zone which lies in the downstream of local conflict zones. Thus, if we can
handle the conflicts in all basic driving scenarios well, then it can be extended to deal with all
complicated driving scenarios like traffic networks by dividing the conflicts into each basic
driving scenarios. The main goal of the paper is to propose an effective way to solve the conflicts
in basic driving scenarios.
Since the critical conflict zones have significant impact on the traffic efficiency of the driving
scenario, the primary task for cooperative driving is to optimize the assignment of right-of-way in
the critical conflict zone. We can first plan the motions of vehicles that are approaching to the
critical conflict zone and then backwardly plan their motions in the local conflict zone.
Yang et al. (2016) pointed out that all kinds of conflicts arise from the unclear assignment of
the right-of-way. For the critical conflict zone, we define a passing order to be a possible result of
assigning right-of-way and represents the priority of vehicles. For simplicity, we can use a string
to denote a passing order (Li et al., 2006). For example, string BAC means vehicle B, vehicle A,
and vehicle C enter into the critical conflict zone sequentially. The vehicle with the leftmost
position in the string has the highest priority. If there is a potential collision between two vehicles,
no matter in either the critical or local conflict zone, the vehicle with higher priority in the passing
order can pass through the conflict zone first.
-6-
Fig. 1. Typical driving scenarios with conflict zones. The red dashed boxes represent critical
conflict zones, and the blue dashed boxes represent local conflict zones. (a) Vehicle B changes
lanes to avoid a collision with the work zone; (b) The left-turning vehicle A changes its lane to the
left lane because of driving rules.
2.2 The Trajectory Planning Problem
If we take the locations of vehicles as decision variables, we can formulate the cooperative
driving problem as a trajectory planning problem. The constraints include vehicle dynamics,
collision avoidance, and physical constraints. The trajectory planning problem can be formulated
as
(1a)
(1b)
(1c)
(1d)
(1e)
(1f)
-7-
Work Zone(a)(b)Critical Conflict ZonesLocal Conflict ZonesIntersectionCell123456ABCDELane 1Lane 2Lane 3AB(),()1min((),())niiixtutiJxtut=..()((),(),)iiiistxtfxtutt=,((),(),)0ijijgxtxtb=,min,max()iiivvtv,min,max()iiiuutu,{0,1}ijbwhere
and
represent the state and control input for each vehicle at time
. The state
is a vector that consists of the vehicle's position and velocity. The function
is an
objective function which could be very general including traffic efficiency, energy consumption,
etc. Since we are more concerned about the traffic efficiency, we limit ourselves to an objective
which is the delay. Therefore, the objective function in (1a) is the total delay. Of course, by
dividing by the number of vehicles n, we get the average vehicle delay. It is worth noting that the
number of vehicles in the control zone varies with time, and we solve the above trajectory
planning problem in a time-driven manner like every few seconds. Every time we formulate the
problem, n is the number of vehicles in the control zone at that time. The function
in (1b)
is the vehicle dynamics constraint for vehicle
, the function
in (1c) is the collision
avoidance constraints, and (1d) and (1e) is the physical constraints for velocity and control input.
The binary variable
is introduced to denote the right-of-way priority between vehicle
and
vehicle
. For example, if
equals 0, the vehicle
has higher right-of-way than vehicle
;
otherwise, the vehicle
has higher right-of-way.
The optimization problem (1) is a continuous-time optimal control problem. For practical
implementation, we can discretize the control horizon and use the locations of vehicles at each
sampling time as decision variables, which results in a similar discrete-time optimal control
problem. When the sampling time is small enough, the resulting trajectories are still smooth and
continuous (Li and Li, 2019).
Clearly, the formulated optimization problem is a MINLP that is hard to solve. Although
there are many algorithms for collision avoidance constraints (1c) (Mukhtar et al., 2015; Ji et al.,
2017), it is still time-consuming to do collision avoidance for vehicles especially when the lane
change is considered.
To solve the problem, some studies use the cell-based modeling method and discretize the
road space into several cells as shown in Fig. 1 (Dresner and Stone, 2004; Dresner and Stone,
2008). The length of the cells can be determined according to the length of the vehicles. For
simplicity, we assume that all vehicles are homogeneous passenger cars, and the lengths of all
cells are the same. The lane change vehicles are assumed to simultaneously occupy the cells in
both the origin and destination lane of the maneuver. Then the safety in the critical conflict zone
and local critical zones can both be guaranteed by requiring that every cell is occupied by no more
than one vehicle at any time. It can be easily realized through optimizing the arrival times to all
cells for all vehicles.
The decision variables in this method are the arrival times of vehicles instead of the locations
of vehicles. Compared with the original formulation, the collision avoidance constraints of the
cooperative driving problem can be further discretized and simplified as
,
,
(2a)
(2b)
-8-
()xt()utt()xt()iJ()ifi()ig,ijbij,ijbijj,()(),,ijijtztzMbtijz−+,()()(1),,jiijttttMbtijz−+−where
is the arrival time of the vehicle
to the
th cell,
is a sufficiently large
number and
is the safety headway. Clearly, when
equals 0, the constraint (2a) is
reduced to
,
(3)
and the constraint (2b) is not active because of the large
. So, vehicle
must arrive at the
th cell later than vehicle
, that is to say, vehicle
has higher right-of-way than vehicle
.
Otherwise, when
equals 1, vehicle
has higher right-of-way. Thus, the vector consisting of
all binary variables
is an equivalent expression to the passing
order and represents the right-of-way priority for all vehicles.
If the temporal and spatial duration of the lane change trajectory is not considered, the
constraint (1b) under cell discretization can be written as
,
(4)
where
is the function that describes the time constraint between any two adjacent cells.
For example, if we only consider the longitudinal movement of a vehicle and assume that the
acceleration of a vehicle in a cell remains the same, we have
(5)
where
is the length of a cell.
However, to be more realistic, we consider the lane change trajectory instead of assuming the
lane change can be completed immediately or within the distance of one cell. The lane change
trajectory satisfies vehicle dynamics and can be designed in advance using fifth-order polynomial
curve functions or other functions that can guarantee a continuous third derivative and smooth
curvature (Li et al., 2005; Papadimitriou and Tomizuka, 2003; Wang et al., 2014; Luo et al.,
2016).
For vehicles during the lane change process, the constraints (4) should be modified since the
lane change trajectory is determined in advance and the input
is given correspondingly. For
example, as shown in Fig. 1, the lane change maneuver of vehicle B begins at the start-edge of cell
1 and ends at the end-edge of cell 6. Based on the given lane change trajectory, suppose that the
vehicle B spends 2s, 1s, and 1.5s passing through cell 1, cell 2, and cell 3 respectively. Then, we
have
, (6)
. (7)
As aforementioned, lane change vehicles simultaneously occupy the cells in two lanes, that is,
-9-
()itzizMt,ijb()(),,ijtztztijz−Mizjji,ijbi1,21,3,1,[,,,]ijnnbbbb−=b1(1)((),(),(),)iiiiitzftzuzvzz+=1()if22(())((1)())0.5(())((1)())(())2(())(())(1)(())iiiiiiiiiiivtztztzutztztzpvtzutzpvtztzutz+−++−=+−+=p()ut(2)(1)2BBtt=+(3)(2)1BBtt=+. (8)
Thus, during the lane change process, the arrival times to cells can be directly determined
according to the given lane change trajectory
, which can be expressed as
,
(9)
where
is the function that indicates the arrival time gap between two adjacent cells on
condition that the lane change trajectory
is given.
Thus, the trajectory planning problem under cell discretization can be expressed as
(10a)
(10b)
(10c)
(10d)
(10e)
After the lane change trajectory is considered, more binary variables need to be introduced to
indicate the states (changing lane or going straight) of vehicles in cell
. Meanwhile, the possible
trajectories of vehicles become more complicated, which makes the problem (10) difficult to be
handled.
3. The Bi-level Planning Framework
To solve above MIP problems, researchers have proposed various methods and most of them
are planning-based methods. The planning-based methods can be regarded as single level planning
methods that aim at solving the formulated MIP model directly. However, the computation time is
too large since the collision avoidance is complicated. Some ad hoc negotiation-based methods
proposed that we can determine the passing order of vehicles first according to some heuristic
rules, and then schedule the trajectories of all vehicles according to the given passing order.
However, the performance of the given FIFO-based passing order cannot be guaranteed. Thus, it is
necessary to propose a new strategy that can deal with different kinds of conflicts and at the same
time has the ability of balancing the coordination performance and computation time.
Based on the above observation of conflict zone classification, it is natural for us to put
forward a bi-level planning framework that maximizes a specific objective such as traffic
efficiency in the upper-level problem through optimizing the passing order of vehicles and
resolves all local conflicts in the lower-level problem, see Fig. 2.
-10-
(4)(1),(5)(2),(6)(3)BBBBBBtttttt===i2(1)((),)iiiitzftz+=2()ifi(),()1min((),())niiitzuziJtzuz=..(2),(2),(4),(9)stab,min,max()iiivvzv,min,max()iiiuuzu,{0,1}ijbiFig. 2. Bi-level planning framework.
In the upper-level problem, we transfer the problem of finding the optimal passing order into
a tree search problem (Li et al., 2006; Xu et al., 2019b). Next, we use Monte Carlo tree search
with some heuristic rules to accelerate the searching process. Instead of exploring all possible
passing orders like the planning-based methods, the Monte Carlo tree search method tries to
search the passing orders that are promising to be the optimal passing order, and the amount of
this kind of passing order only accounts for a small part of all passing orders.
In the lower-level problem, we design a passing-order-to-trajectory interpretation algorithm
to quickly derive conflict-free trajectories for all vehicles according to the passing priority
represented by the passing order (Malikopoulos et al., 2018; Xu et al., 2019b). The trajectory of
the vehicle that has higher priority will be scheduled earlier. This algorithm provides a
performance evaluation of the given passing order for the upper-level problem. It is worth noting
that different passing-order-to-trajectory
interpretation algorithms can
lead
to different
performance evaluations. Our goal is to propose an algorithm that can quickly obtain an accurate
solution for the lower-level problem. However, sometimes when the lower-level problem is
complicated, we tend to obtain an approximate solution of the lower-level problem with a very
small computation time instead of deriving an accurate solution with a large amount of
computation time since the sub-optimality does not noticeably degenerate the performance of the
whole bi-level planning framework.
Through solving these two problems iteratively, the current best passing order is continuously
updated. When the computation budget is reached, the search process terminates and returns the
best passing order and corresponding conflict-free trajectories of vehicles.
3.1 Upper-level Planning
As pointed out in (Meng et al., 2017), we can formulate the whole problem as a tree search
problem in the solution space that consists of all possible passing orders. Each leaf node represents
a possible passing order of vehicles which can also be denoted as a string (Li et al., 2006). Passing
order indicates the priority of all vehicles and the vehicle which ranks higher in the passing order
has higher priority of occupying a road resource. For example, string CAB means vehicle C has
-11-
Optimizing the passing order through Monte Carlo tree searchObtaining conflict-free trajectories for all vehicles using a passing order to trajectories interpretation algorithmUpper LevelLower LevelA feasible passing orderThe objective value of the given passing orderMaximizing a specific objective through finding a passing order for the critical conflict zoneResolving all local conflicts for vehicles according to the given passing orderObjectivesMethodsthe highest priority and other vehicles need to decelerate and let it go first when there is a conflict
between them. If there is no conflict between vehicle A and vehicle C, the performance of two
passing orders CAB and ACB would be the same.
The following part takes the scenario shown in Fig. 1(a) as an example to show how to
construct a search tree. To discard some possible passing orders that are not promising to be the
optimal solution, we make the following assumptions: 1) The vehicles in the middle lane can
choose going straight or changing lanes, and we use the index symbol with subscript "change
lane" to represent the vehicles which will change lanes; 2) The vehicles in lane 1 must change
lanes to avoid a collision with the work zone, and the vehicles in lane 3 must not change lanes to
make the middle lane have more space to accommodate the vehicles from lane 1, so we do not use
subscripts to indicate their actions; 3) For vehicles in the same lane, the preceding vehicle should
have higher priority than the following vehicles.
Let us take the scenario shown in Fig. 1(a) as an example to explain how to interpret the tree
representation of the solution space. At first, we set the passing order in the root node to be empty.
Then, each direct child node of the root node (in the second layer) refers to one index symbol that
indicates the first vehicle in a special passing order. Due to the above assumption 3, the first
vehicle only could be the leading vehicle in three lanes shown in Fig. 1(a), i.e., vehicle A, vehicle
B, and vehicle D. Moreover, a subscript "change lane" should be added to vehicle A since it may
change lanes. Next, the nodes in the third layer refer to one string consisting of two indices
symbols that indicate the first two vehicles in a special passing order. As shown in Fig. 3, if we
choose vehicle A with going straight action as the first vehicle in the passing order, then the
vehicle C becomes the new leading vehicle in lane 2, and the second vehicle in the passing order
could be the vehicle B, vehicle C, and vehicle D. Similarly, the child nodes expand their child
nodes, and all possible passing orders are generated as leaf nodes in the bottom layer of the
solution tree as shown in Fig. 3.
It is usually impossible to expand all the nodes of the solution tree within the limited
computation budget when there are lots of unplanned vehicles. Thus, we use MCTS to search
nodes with the potential to be the optimal solution. The successful application of MCTS in the
game of Go shows it is an effective way to deal with such problems (Silver et al., 2017).
MCTS gradually builds a search tree in an iteration way, and one iteration consists of four
steps including selection, expansion, simulation, and backpropagation (Kocsis et al., 2006;
Browne et al., 2012). The detailed iteration operation is shown in Fig. 4. Due to the space limit,
the detail introduction of the four steps is neglected. Interested readers can refer to (Browne et al.,
2012; Xu et al., 2019b).
-12-
Fig. 3. The solution tree stemmed from the intersection scenario shown in Fig. 1(a). The leaf
nodes in the bottom layer represent the complete passing orders for all vehicles. For vehicles in
the middle lane, we use subscript "change lane" to denote whether the vehicle will change lane.
Fig. 4. One iteration of the MCTS.
During the building process of the search tree, the best passing order is continuously updated.
As soon as the computation budget is reached, the search terminates and returns the
state-of-the-art best passing order. The velocity and acceleration profiles of all vehicles can be
calculated according to the best passing order by using a passing-order-to-trajectory interpretation
algorithm that will be introduced in the lower-level planning.
The classical MCTS uses random sampling and adds the uncovered vehicles into the passing
order string one by one until we find a complete passing order string and reach the maximum
depth of the tree from the current new node without branching (Browne et al., 2012). For example,
when we apply a random sampling policy to the node BC shown in Fig. 4, we can randomly
expand a direct child node in its next layer; say node BCA. The node BCA will be further
-13-
RootABDA BA CA C change laneA C BA C DA C B DA C B D E change laneA C B D E A change lane A D A C E change lane A C B E change laneA C E A C B EA C B E change lane DA C B E DRootABCB AB CLeaf Node (Passing Order)SelectionExpansionSimulationBackpropagationSimulation PolicyRootABCB AB CRootABCB AB CRootABCB Aexpanded by repeating such a process until a leaf node (e.g., node BCADE) is expanded. Finally,
the potential of the new node will be evaluated by the partial passing order and its simulated
off-spring leaf nodes (passing orders).
However, the number of possible passing orders is huge especially when the lane change is
considered. The passing orders generated by random sampling cannot quickly capture the real
potential of a node during simulation. To solve the problem, some heuristic rules based on human
knowledge are added into the simulation policy to help us to decide which nodes (vehicles) should
be expanded (added into the candidate passing order string) first as shown in Algorithm 1.
Before we introduce the Algorithm 1, we first define a set
to include identities of all
vehicles sorted by their longitudinal location. For example,
stores the identity of the vehicle
whose location is the farthest from the entrance in a longitudinal sense.
Algorithm 1 Heuristic Simulation Policy
Input: The set
Output: A possible passing order
1) Set
= 1. Among all vehicles, we consider the vehicle
first.
2) If the action of the considered vehicle is going straight, we add it into the initial passing
order.
3) If the action of the considered vehicle is changing lanes, we judge whether the collision
avoidance conditions are satisfied. If the result is true, we add it into the initial passing order.
Otherwise,
=
+ 1 and consider the vehicle
. Repeat the steps 2 and 3 until a
vehicle is added.
4) We delete the vehicle
from the set
. Repeat the steps 1, 2, and 3 until a complete
passing order is generated.
5) The objective value (10a) of the generated passing order can be easily derived by a
passing-order-to-trajectory interpretation algorithm.
3.2 Lower-level Planning
As aforementioned, the decision variables of the optimization problem (10) are the passing
order, desired arrival times, and acceleration profiles of all vehicles. If a passing order is given, we
can design a passing-order-to-trajectory interpretation algorithm for directly deriving the
remaining variables in the optimization problem, see Algorithm 2.
In Algorithm 2,
is the
th element in the input (partial) passing order,
is a set
which consists of all cells that vehicle
will pass through,
is the largest arrival time that
cell
has been occupied,
represents the desired arrival time to Cell z for vehicle
,
is the minimum arrival time to Cell z for vehicle
. The flow chart of the Algorithm 2 is
shown in Fig. 5.
-14-
(1)i()iii()i()i()PkkiZimax,ztz,,arrivaliztimin,,izti
-15-
Fig. 5. The flow chart of Algorithm 2.
In the green part of the flow chart, we use the collision avoidance conditions proposed in (Li
et al., 2018) to judge whether it is safe to implement a lane change. The collision avoidance
conditions are defined as:
(7)
where
is the distance between vehicle
and ,
is the safety gap,
is the
velocity of vehicle
,
is the safety time headway,
is the minimum brake
acceleration, and
is the maximum brake acceleration. We can combine various
car-following models
such as Newell's car-following model
(Newell, 2002),
the
mass-spring-damper-clutch system-based car-following model (Li et al., 2019) into the algorithm
for guiding the unplanned vehicles to keep a safe and desired distance with its preceding vehicle.
Meanwhile, it is difficult to consider several possible lane change trajectories in the
optimization problem, and all vehicles are supposed to use the same lane change trajectory.
However, one candidate lane change trajectory is easy to make the problem infeasible. So, in the
proposed Algorithm 2 (line 13), some improvement is made. We first construct a trajectory set
which consists of lots of different lane change trajectories that are designed according to the initial
velocity and final velocity of vehicles, then let vehicles that need to change lanes search a suitable
lane change trajectory from the predesigned trajectory set according to its velocity as shown in Fig.
5. Then, we update the road occupancy information according to the trajectory of the vehicle.
Thus, a feasible solution of the optimization problem can be quickly obtained.
When the passing order is determined, the problem of finding corresponding trajectories for
-16-
Predesigned trajectory setLongitudinal position adjustment Trajectory planning()ixt()ixt1()ixt+1()ixt+1()ixt− 1()ixt−frontfrontdFrearreardFStartScheduling trajectories for all unplanned vehicles in turn according to the passing orderAll unplanned vehicles follow their preceding vehiclesDo the longitudinal position distances meet collision avoidance conditions?YNEndfrontdreard22,,max,,,min,,max,,min,,max()()()()()()2()2()()()ijijjiijiibrakejbrakeiibrakeibrakeibrakeibrakeidtFtvtvtFtvtatavtataaav=+−=+−()ijdtij()ijFt()ivti,min,ibrakea,max,ibrakeavehicles can be regarded as a degenerated case of the optimization problem (10) and it can be
easily solved by Algorithm 2. The computation can be finished within several milliseconds. Thus,
the low-level planning can quickly provide a performance evaluation of the given passing order
for the upper-level planning.
4. Simulation Results
We design three experiments to determine the best parameter set for the new cooperative
driving strategy and compare it with some classical ones. The first experiment gives a case study
to explain why the bi-level-based strategy can outperform the classical cooperative driving
strategy. The second experiment introduces how to determine the parameters for the proposed
strategy. Finally, the third experiment compares the performance of different cooperative driving
strategies.
These experiments are conducted for the work zone scenario with three lanes as shown in Fig.
1(a). The vehicles' arrival is assumed to be a Poisson process. We vary the mean value of this
Poisson process to test the performance of the proposed strategy under different traffic demands.
To accurately describe the total delays of vehicles, we adopt the point-queue model in the
simulation (Ban et al., 2012). The model assumes vehicles travel in free flow state until they get to
the boundary of the scenario we study. If the preceding vehicle leaves enough spaces, the first
vehicle in the point-queue will dequeue and enter the scenario. Otherwise, it will stay in the virtual
queue. Each lane has an independent point-queue.
All experiments are implemented using C++ language on a Visual Studio platform in a
personal computer with an Intel i7 CPU and a 16GB RAM.
4.1 Case Study
To intuitively show the effectiveness of the proposed strategy, we first give a case study for a
work zone scenario with 7 CAVs. The bi-level-based strategy and FIFO-based strategy are applied
respectively to plan the trajectories for these vehicles, and the results are shown in Fig. 6.
The left plot in Fig. 6 shows that the movements of vehicles on lane 2 have been greatly
influenced by the lane change vehicle 1 on lane 1. They need to decelerate to leave enough space
for the lane change vehicle, which leads to a bigger passing time. In contrast, the bi-level-based
strategy searches approximately 200 nodes within 0.5s and finds a better passing order in which
vehicle 2 and vehicle 3 go first and then vehicle 1 changes its lane. Besides, the bi-level-based
strategy finds it would be better to let vehicle 6 on lane 2 change its lane to lane 3 to leave more
space for lane change vehicle 7. It is clear that the traffic efficiency is improved by a better
passing order and the trajectories of vehicles tend to be more smooth which helps to reduce energy
consumption.
-17-
Fig. 6. (left) The planned trajectories of vehicles by the FIFO-based strategy. (right) The planned
trajectories of vehicles by the bi-level-based strategy.
4.2 The Choice of Parameters
The parameters in the strategy undoubtedly influence its performance. For example, a bigger
computation time allows us to search more nodes and thus produce better results. However, the
computation time should be as small as possible in practical applications. Besides, it is important
to address the problem of balancing the exploration and exploitation. In the MCTS,
and
are two weighting parameters related to the problem. A larger
encourages more exploration,
and
indicates that we are more concerned about the objective values of the current node or the
best simulated off-spring passing order generated from the current node. More detail introduction
in terms of these parameters can be found in (Xu et al., 2019b).
Since the FIFO-based passing order is the one most common used, we use it as a baseline
solution and define the improvement ratio
of the objective value when being compared with it
as
(21)
where
is the objective value of the FIFO-based passing order, and
is the
objective value of the best passing order found by the bi-level-based strategy.
We first fix the computation time as 0.5 s and vary
and
from 0 to 1 to discuss the
influence of the exploration and exploitation. The average improvement rates for the work zone
scenarios with 10 vehicles are shown in Fig. 7.
-18-
CCFIFOBiLevelFIFOJJJ−−=FIFOJBiLevelJ−CFig. 7. The improvement rate of the bi-level-based strategy with different parameter settings.
It is clear that the parameter
has an obvious impact on the improvement rates while the
parameter
is not so critical. A larger
leads to more exploration and sometimes a worse
result since we have wasted too much computation resource on exploring useless nodes. But it is
necessary to do some exploration because the improvement rates with
= 0.2 are better than
that with
= 0.
Then, we further study the scenarios with other numbers of vehicles and the results are
similar. It should be noted that the improvement rates for scenarios with a small number of
vehicles are small since the FIFO rule works well for these simple scenarios. Based on these
results, in the rest of the paper, we set
= 0.2 and
= 0.2.
To further determine the appropriate maximum computation time, we investigate the
relationship between the improvement rates and the number of searched nodes to eliminate the
influence of computational power of experimental devices. We select the best parameter
combination shown in Fig. 7 for this experiment. To better understand the performance of the
strategy under different traffic demands, we vary the vehicle arrival rates to generate a series of
driving scenarios with different numbers of vehicles and record corresponding improvement rates
and the number of searched nodes.
-19-
CCCCCFig. 8. The results of the improvement rates with respect to the number of searched nodes. Since
the number of possible nodes is small when the number of vehicles is 5, its curve ends at abscissa
200.
Fig. 8 shows that the improvement rate increases significantly when the number of searched
nodes increases from 1 to 200, and the improvement rate gets saturated afterward. Thus, it
illustrates that a good enough passing order always can be found through searching 200 possible
nodes for the considered scenarios. Since our experimental device can search 200 nodes within
0.5s, we set the computation time as 0.5s, and it is small enough to be applied in practice.
Besides, when the number of vehicles is small or large, the improvement rate is relatively
small. This is because when the number of vehicles is small, the vehicles may be far away from
each other, and FIFO-based passing order tends to be the best passing order in these simple
driving scenarios; when the number of vehicles is large, there is too little space on the road to
adjust the passing order.
4.3 Comparison of Different Cooperative Driving Strategies
In this experiment, we vary the traffic arrival rates to compare the performance of different
cooperative driving strategies under different traffic demands. For each arrival rate, we simulate a
10-minute traffic process and use the bi-level-based strategy and FIFO-based strategy to
coordinate the traffic process respectively. The comparison results are shown in Table 1.
To compare the coordination performance of different cooperative driving strategies, we
consider two performance indices: the average delay of vehicles and the traffic throughput (the
number of vehicles that has passed the work zone) within a given time interval. The delay of
vehicle
is defined as
(22)
where
is the actual passing time of vehicle
and
is the minimum passing
time of vehicle
.
-20-
i,delay,passing,min,passingiiittt=−,passingiti,min,passingitiTable 1 Comparison results of different cooperative driving strategies
Arrival rate (veh/h)
Strategies
Throughput (veh) Average delay (s)
360
1200
1800
2400
Bi-Level
FIFO
Bi-Level
FIFO
Bi-Level
FIFO
Bi-Level
FIFO
51
51
205
205
296
295
382
372
0.1528
0.1528
0.5981
0.7972
0.9695
1.7412
3.3484
6.8925
The results in Table 1 show that the throughputs under low arrival rates are similar, but
benefits in throughput can be obtained under high arrival rates. This is because there are a few
vehicles in the control zone under low traffic demands, and vehicles still can pass the work zone
area even if the cooperative strategy is inefficient. However, the inefficient cooperative strategy
results in a bigger average delay. The differences between the average delay of two cooperative
strategies increase with the arrival rates, and the delay can be effectively reduced when the arrival
rate is high. Thus, the bi-level-based cooperative strategy is a promising way of traffic
coordination in the future.
5. Conclusion
In this paper, a novel cooperative driving strategy is proposed to improve the safety and
traffic efficiency for driving scenarios allowing lane changes. According to the conflict zone
classification, we design a bi-level-based strategy in which the right-of-way for vehicles is
considered in the upper-level, and the right-of-way of vehicles during the lane changes are solved
in the lower-level. For the upper-level planning, we construct a tree representation for possible
solutions and use the MCTS with some heuristic rules to accelerate the search process. For the
lower-level planning, we design a passing-order-to-trajectory interpretation algorithm to quickly
derive trajectories for vehicles and feedback the corresponding objective value of the given
passing order to the upper-level planning. Finally, the effectiveness of the proposed strategy is
validated through simulation experiments which show that the traffic efficiency is improved when
compared with the classical cooperative driving strategy.
It should be mentioned that the proposed strategy can be easily extended to other driving
scenarios with arbitrary road geometry. However, due to the space limit, the influence of the
penetration rate of CAVs on the strategy has not been covered in the paper. We will leave this
topic for our future studies. Besides, we are currently building several CAVs prototypes so that we
can test our strategy in field studies in the future.
-21-
Acknowledgements
This work was supported in part by the National Key Research and Development Program of
China under Grant 2018YFB1600600, National Natural Science Foundation of China under Grant
61673233, 61790565, 61603005, and Beijing Municipal Commission of Transport Program under
Grant ZC179074Z.
References
Ban, X. J., Pang, J., Liu, H. X., Ma, R. (2012) Continuous-time point-queue models in dynamic network loading,
Transportation Research Part B: Methodological, 46(3), 360-380.
Browne, C. B., Powley, E., Whitehouse D., Lucas, S. M., Cowling, P. I., Rohlfshagen, P., Tavener, S., Perez, D.,
Samothrakis, S., Colton, S. (2012) A survey of monte carlo tree search methods, IEEE Transactions on
Computational Intelligence and AI in games, 4 (1), 1-43.
Chen, L., Englund, C. (2016) Cooperative intersection management: a survey, IEEE Transactions on Intelligent
Transportation Systems, 17(2), 570 -- 586.
Choi, M., Rubenecia, A. and Choi, H. H. (2018) Reservation-based cooperative traffic management at an
intersection of multi-lane roads, 2018 International Conference on Information Networking (ICOIN), 456-460.
Dresner, K., Stone, P. (2004) Multiagent traffic management: A reservation-based intersection control mechanism,
Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems,
530-537.
Dresner, K., Stone, P. (2008) A multiagent approach to autonomous intersection management, Journal of artificial
intelligence research, 31, 591-656.
Englund, C., Chen, L., Ploeg, J., Semsar-Kazerooni, E., Voronov, A., Bengtsson, H.H. and Didoff, J. (2016) The
grand cooperative driving challenge 2016: boosting the introduction of cooperative automated vehicles, IEEE
Wireless Communications, 23(4), 146-152.
Guler, S. I., Menendez, M., Meier, L. (2014) Using connected vehicle technology to improve the efficiency of
intersections, Transportation Research Part C: Emerging Technologies, 46, 121-131.
Guo, Q., Li, L., Ban, X. (2019) Urban traffic signal control with connected and automated vehicles: A survey,
Transportation Research Part C: Emerging Technologies, 101, 313-334.
Goodall, N., Smith, B., Park, B. (2013) Traffic signal control with connected vehicles, Transportation Research
Record: Journal of the Transportation Research Board, 2381, 65 -- 72.
Hu, X., Sun, J. (2019) Trajectory optimization of connected and autonomous vehicles at a multilane freeway
merging area, Transportation Research Part C: Emerging Technologies, 101, 111-125.
Hult, R., Campos, G.R., Steinmetz, E., Hammarstrand, L., Falcone, P. and Wymeersch, H. (2016) Coordination of
cooperative autonomous vehicles: Toward safer and more efficient road transportation, IEEE Signal
Processing Magazine, 33(6), 74-84.
Ji, J., Khajepour, A., Melek, W. W., Huang, Y. Path planning and tracking for vehicle collision avoidance based on
model predictive control with multiconstraints, IEEE Transactions on Vehicular Technology, 66(2), 952-964.
Kato, S., Tsugawa, S., Tokuda, K., Matsui, T. and Fujii, H. (2002) Vehicle control algorithms for cooperative
driving with automated vehicles and intervehicle communications, IEEE Transactions on intelligent
transportation systems, 3(3), 155-161.
Kamal, M. A. S., Imura, J. I., Hayakawa, T., Ohata, A. and Aihara, K. (2014) A vehicle-intersection coordination
scheme for smooth flows of traffic without using traffic lights, IEEE Transactions on Intelligent
Transportation Systems, 16(3), 1136-1147.
Kocsis, L., Szepesvari, C. (2006) Bandit based monte-carlo planning, European conference on machine learning,
282-293.
Lawler, E. L., Wood, D. E. (1966) Branch-and-bound methods: A survey, Operations Research, 14(4), 699-719.
-22-
Li, B., Zhang, Y., Feng, Y., Zhang, Y., Ge, Y., Shao, Z. (2018) Balancing computation speed and quality: A
decentralized motion planning method for cooperative lane changes of connected and automated vehicles,
IEEE Transactions on Intelligent Vehicles, 3(3), 340-350.
Li, L., Li, X. (2019) Parsimonious trajectory design of connected automated traffic, Transportation Research Part
B: Methodological, 119, 1-21.
Li, L., Peng, X., Wang, F. Y., Cao, D., Li, L. (2018) A situation-aware collision avoidance strategy for
car-following, IEEE/CAA Journal of Automatica Sinica, 5(5), 1012-1016.
Li, L., Wen, D., Yao, D. (2014) A survey of traffic control with vehicular communications, IEEE Transactions on
Intelligent Transportation Systems, 15(1), 425-432.
Li, L., Wang, F. Y., Kim, H. (2005) Cooperative driving and lane changing at blind crossings, IEEE Proceedings.
Intelligent Vehicles Symposium, 435-440.
Li, L., Wang, F. Y. (2006) Cooperative driving at blind crossings using intervehicle communication, IEEE
Transactions on Vehicular Technology, 55(6), 1712-1724.
Li, L., Wang, F.Y. and Zhang, Y. (2007) Cooperative driving at lane closures, 2007 IEEE Intelligent Vehicles
Symposium, 1156-1161.
Li, Z., Khasawneh, F., Yin, X., Li, A., Song, Z. (2019) A new microscopic traffic model using a
spring-mass-damper-clutch system, arXiv preprint, arXiv: 1903.04469.
Li, P. T., Zhou, X. (2017) Recasting and optimizing intersection automation as a connected-and-automated-vehicle
(cav) scheduling problem: A sequential branch-and-bound search approach in phase-time-traffic hypernetwork,
Transportation Research Part B: Methodological, 105, 479-506.
Liu, C., Lin, C. W., Shiraishi, S., Tomizuka, M. (2018) Distributed conflict resolution for connected autonomous
vehicles, IEEE Transactions on Intelligent Vehicles, 3(1), 18-29.
Lioris, J., Pedarsani, R., Tascikaraoglu, F. Y., Varaiya, P. (2017) Platoons of connected vehicles can double
throughput in urban roads, Transportation Research Part C: Emerging Technologies, 77, 292 -- 305.
Lu, G., Nie, Y., Liu, X., Li, D. (2019) Trajectory-based traffic management inside an autonomous vehicle zone,
Transportation Research Part B: Methodological, 120, 76-98.
Luo, Y., Xiang, Y., Cao, K., Li, K. (2016) A dynamic automated lane change maneuver based on vehicle-to-vehicle
communication, Transportation Research Part C: Emerging Technologies, 62, 87-102.
Newell G. F. (2002) A simplified car-following theory: a lower order model, Transportation Research Part B:
Methodological, 36(3), 195-205.
Malikopoulos, A. A., Cassandras, C. G., Zhang, Y. (2018) A decentralized energy-optimal control framework for
connected automated vehicles at signal-free intersections, Automatica, 93, 244-256.
Mukhtar, A., Xia, L., Tang, T. B. (2015) Vehicle detection techniques for collision avoidance systems: a review,
IEEE Transactions on Intelligent Transportation Systems, 16(5), 2318-2338.
Meng, Y., Li, L., Wang, F. Y., Li, K., Li, Z. (2017) Analysis of cooperative driving strategies for non-signalized
intersections, IEEE Transactions on Vehicular Technology, 67(4), 2900-2911.
Morrison, D. R., Jacobson, S. H., Sauppe, J. J. (2016) Branch-and-bound algorithms: A survey of recent advances
in searching, branching, and pruning, Discrete Optimization, 19, 79-102.
Papadimitriou, I. and Tomizuka, M. (2003) Fast lane changing computations using polynomials, Proceedings of
the 2003 American Control Conference, 48-53.
Rios-Torres, J., Malikopoulos, A. A. (2016) A survey on the coordination of connected and automated vehicles at
intersections and merging at highway on-ramps, IEEE Transactions on Intelligent Transportation Systems,
18(5), 1066-1077.
Silver, D., Schrittwieser, J., Simonyan, K., Antonoglou, I., Huang, A., Guez, A., Hubert, T., Baker, L., Lai, M.,
Bolton A., Chen, Y., Lillicrap, T., Fan, H., Sifre, L., Driessche, G., Graepel, T., Hassabis, D. (2017) Mastering
the game of Go without human knowledge, Nature, 550, 354-359.
Sukuvaara, T., Nurmi, P. (2009) Wireless traffic service platform for combined vehicle-to-vehicle and
-23-
vehicle-to-infrastructure communications, IEEE Wireless Communications, 16(6), 54-61.
Tsugawa, S. (2002) Inter-vehicle communications and their applications to intelligent vehicles: an overview, IEEE
Intelligent Vehicle Symposium, 564-569.
Ubiergo, G. A., Jin, W. -L. (2016) Mobility and environment improvement of signalized networks through
Vehicle-to-Infrastructure (V2I) communications, Transportation Research Part C: Emerging Technologies, 68,
70 -- 82.
Uno, A., Sakaguchi, T., Tsugawa, S. (1999) A merging control algorithm based on inter-vehicle communication,
Proceedings 1999 IEEE/IEEJ/JSAI International Conference on Intelligent Transportation Systems, 783-787.
Wang, Q., Li, Z. and Li, L. (2014) Investigation of discretionary lane-change characteristics using next-generation
simulation data sets, Journal of Intelligent Transportation Systems, 18(3), 246-253.
Xu, B., Li, S. E., Bian, Y., Li, S., Ban, J. X., Wang, J., Li. K. (2018) Distributed conflict-free cooperation for
multiple connected vehicles at unsignalized intersections, Transportation Research Part C: Emerging
Technologies, 93, 322-334.
Xu, H., Feng, S., Zhang, Y., Li, L. (2019a) A Grouping based cooperative driving strategy for CAVs merging
problems, IEEE Transactions on Vehicular Technology, 68(6), 6125-6136.
Xu, H., Zhang, Y., Li, L. and Li, W. (2019b) Cooperative driving at unsignalized intersections using tree search,
IEEE Transactions on Intelligent Transportation Systems.
Yang, K., Guler, S.I. and Menendez, M. (2016) Isolated intersection control for various levels of vehicle
technology: Conventional, connected, and automated vehicles, Transportation Research Part C: Emerging
Technologies, 72, 109-129.
Yu, C., Feng, Y., Liu, H.X., Ma, W., Yang, X. (2018) Integrated optimization of traffic signals and vehicle
trajectories at isolated urban intersections, Transportation Research Part B: Methodological, 112, 89-112.
Yun, I., Park, B. (2012) Stochastic optimization for coordinated actuated traffic signal systems. Journal of
Transportation Engineering, 138, 819 -- 829.
Zhang, Y., Cassandras, C. G. (2018) A decentralized optimal control framework for connected automated vehicles
at urban intersections with dynamic resequencing, 2018 IEEE Conference on Decision and Control, 217-222.
Zhang, Y., Cassandras, C. G. (2019) An impact study of integrating connected automated vehicles with
conventional traffic, Annual Reviews in Control, 48, 347-356.
-24-
|
1802.06444 | 3 | 1802 | 2019-12-02T01:35:56 | Efficient Collaborative Multi-Agent Deep Reinforcement Learning for Large-Scale Fleet Management | [
"cs.MA",
"cs.AI"
] | Large-scale online ride-sharing platforms have substantially transformed our lives by reallocating transportation resources to alleviate traffic congestion and promote transportation efficiency. An efficient fleet management strategy not only can significantly improve the utilization of transportation resources but also increase the revenue and customer satisfaction. It is a challenging task to design an effective fleet management strategy that can adapt to an environment involving complex dynamics between demand and supply. Existing studies usually work on a simplified problem setting that can hardly capture the complicated stochastic demand-supply variations in high-dimensional space. In this paper we propose to tackle the large-scale fleet management problem using reinforcement learning, and propose a contextual multi-agent reinforcement learning framework including three concrete algorithms to achieve coordination among a large number of agents adaptive to different contexts. We show significant improvements of the proposed framework over state-of-the-art approaches through extensive empirical studies. | cs.MA | cs | EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
1
Efficient Collaborative Multi-Agent Deep
Reinforcement Learning for Large-Scale Fleet
Management
9
1
0
2
c
e
D
2
]
A
M
.
s
c
[
3
v
4
4
4
6
0
.
2
0
8
1
:
v
i
X
r
a
Kaixiang Lin, Renyu Zhao, Zhe Xu and Jiayu Zhou
Abstract -- Large-scale online ride-sharing platforms have substantially transformed our lives by reallocating transportation resources
to alleviate traffic congestion and promote transportation efficiency. An efficient fleet management strategy not only can significantly
improve the utilization of transportation resources but also increase the revenue and customer satisfaction. It is a challenging task to
design an effective fleet management strategy that can adapt to an environment involving complex dynamics between demand and
supply. Existing studies usually work on a simplified problem setting that can hardly capture the complicated stochastic demand-supply
variations in high-dimensional space. In this paper we propose to tackle the large-scale fleet management problem using reinforcement
learning, and propose a contextual multi-agent reinforcement learning framework including three concrete algorithms to achieve
coordination among a large number of agents adaptive to different contexts. We show significant improvements of the proposed
framework over state-of-the-art approaches through extensive empirical studies.
Index Terms -- Multi-agent Reinforcement Learning; Deep Reinforcement Learning; Fleet Management
!
1 INTRODUCTION
Large-scale online ride-sharing platforms such as Uber [1],
Lift [2], and Didi Chuxing [3] have transformed the way
people travel, live and socialize. By leveraging the advances
in and wide adoption of information technologies such
as cellular networks and global positioning systems, the
ride-sharing platforms redistribute underutilized vehicles
on the roads to passengers in need of transportation. The
optimization of transportation resources greatly alleviated
traffic congestion and calibrated the once significant gap
between transport demand and supply [4].
One key challenge in ride-sharing platforms is to balance
the demands and supplies, i.e., orders of the passengers
and drivers available for picking up orders. In large cities,
although millions of ride-sharing orders are served every-
day, an enormous number of passengers requests remain
unserviced due to the lack of available drivers nearby. On
the other hand, there are plenty of available drivers looking
for orders in other locations. If the available drivers were
directed to locations with high demand, it will significantly
increase the number of orders being served, and thus si-
multaneously benefit all aspects of the society: utility of
transportation capacity will be improved, income of drivers
and satisfaction of passengers will be increased, and market
share and revenue of the company will be expanded. fleet
management is a key technical component to balance the
differences between demand and supply, by reallocating
• K. Lin and J. Zhou are with the Department of Computer Science and
• R. Zhao and Z. Xu are with Didi Chuxing, Beijing, China.
Engineering, Michigan State University, East Lansing, MI, 48823.
E-mail: {linkaixi, jiayuz}@msu.edu.
E-mail: {zhaorenyu, xuzhejesse}@didichuxing.com
available vehicles ahead of time, to achieve high efficiency
in serving future demand.
Even though rich historical demand and supply data
are available, using the data to seek an optimal allocation
policy is not an easy task. One major issue is that changes
in an allocation policy will impact future demand-supply,
and it is hard for supervised learning approaches to capture
and model these real-time changes. On the other hand, the
reinforcement learning (RL) [5], which learns a policy by
interacting with a complicated environment, has been nat-
urally adopted to tackle the fleet management problem [6],
[7], [8]. However, the high-dimensional and complicated dy-
namics between demand and supply can hardly be modeled
accurately by traditional RL approaches.
Recent years witnessed tremendous success in deep re-
inforcement learning (DRL) in modeling intellectual chal-
lenging decision-making problems [9], [10], [11] that were
previously intractable. In the light of such advances, in this
paper we propose a novel DRL approach to learn highly
efficient allocation policies for fleet management. There are
significant technical challenges when modeling fleet man-
agement using DRL:
1) Feasibility of problem setting. The RL framework is reward-
driven, meaning that a sequence of actions from the policy is
evaluated solely by the reward signal from environment [12].
The definitions of agent, reward and action space are essen-
tial for RL. If we model the allocation policy using a central-
ized agent, the action space can be prohibitively large since
an action needs to decide the number of available vehicles
to reposition from each location to its nearby locations. Also,
the policy is subject to a feasibility constraint enforcing that
the number of repositioned vehicles needs to be no larger
than the current number of available vehicles. To the best of
our knowledge, this high-dimensional exact-constrain satis-
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
2
faction policy optimization is not computationally tractable
in DRL: applying it in a very small-scale problem could
already incur high computational costs [13].
2) Large-scale Agents. One alternative approach is to instead
use a multi-agent DRL setting, where each available vehicle
is considered as an agent. The multi-agent recipe indeed
alleviates the curse of dimensionality of action space. How-
ever, such setting creates thousands of agents interacting
with the environment at each time. Training a large number
of agents using DRL is again challenging: the environment
for each agent is non-stationary since other agents are learn-
ing and affecting the environment at same the time. Most
of existing studies [14], [15], [16] allow coordination among
only a small set of agents due to high computational costs.
3) Coordinations and Context Dependence of Action space Fa-
cilitating coordination among large-scale agents remains a
challenging task. Since each agent typically learns its own
policy or action-value function that are changing over time,
it is difficult to coordinate agents for a large number of
agents. Moreover, the action space is dynamic changing over
time since agents are navigating to different locations and
the number of feasible actions depends on the geographic
context of the location.
In this paper, we propose a contextual multi-agent DRL
framework to resolve the aforementioned challenges. Our
major contributions are listed as follows:
• We propose an efficient multi-agent DRL setting for large-
scale fleet management problem by a proper design of
agent, reward and state.
• We propose contextual multi-agent reinforcement learning
framework in which three concrete algorithms: contextual
multi-agent actor-critic (cA2C), contextual deep Q-learning
(cDQN), and Contextual multi-agent actor-critic with linear
programming (LP-cA2C) are developed. For the first time
in multi-agent DRL, the contextual algorithms can not
only achieve efficient coordination among thousands of
learning agents at each time, but also adapt to dynamically
changing action spaces.
• In order to train and evaluate the RL algorithm, we
developed a simulator that simulates real-world traffic
activities perfectly after calibrating the simulator using
real historical data provided by Didi Chuxing [3].
• Last but not least, the proposed contextual algorithms
significantly outperform the state-of-the-art methods in
multi-agent DRL with a much less number of repositions
needed.
The rest of paper is organized as follows. We first give
a literature review on the related work in Sec 2. Then the
problem statement is elaborated in Sec 3 and the simulation
platform we built for training and evaluation are introduced
in Sec 6. The methodology is described in Sec 4. Quantitative
and qualitative results are presented in Sec 7. Finally, we
conclude our work in Sec 8.
2 RELATED WORKS
Intelligent Transportation System. Advances in machine
learning and traffic data analytics lead to widespread appli-
cations of machine learning techniques to tackle challenging
traffic problems. One trending direction is to incorporate
reinforcement learning algorithms in complicated traffic
management problems. There are many previous studies
that have demonstrated the possibility and benefits of re-
inforcement learning. Our work has close connections to
these studies in terms of problem setting, methodology and
evaluation. Among the traffic applications that are closely
related to our work, such as taxi dispatch systems or traffic
light control algorithms, multi-agent RL has been explored
to model the intricate nature of these traffic activities [17],
[18], [19]. The promising results motivated us to use multi-
agent modeling in the fleet management problem. In [6], an
adaptive dynamic programming approach was proposed to
model stochastic dynamic resource allocation. It estimates
the returns of future states using a piecewise linear function
and delivers actions (assigning orders to vehicles, reallocate
available vehicles) given states and one step future states
values, by solving an integer programming problem. In [7],
the authors further extended the approach to the situations
that an action can span across multiple time periods. These
methods are hard to be directly utilized in the real-world
setting where orders can be served through the vehicles
located in multiple nearby locations.
Multi-agent reinforcement learning. Another relevant re-
search topic is multi-agent reinforcement
learning [20]
where a group of agents share the same environment, in
which they receive rewards and take actions. [21] compared
and contrasted independent Q-learning and a cooperative
counterpart in different settings, and empirically showed
that the learning speed can benefit from the cooperation
among agents. Independent Q-learning is extended into
DRL in [16], where two agents are cooperating or compet-
ing with each other only through the reward. In [15], the
authors proposed a counterfactual multi-agent policy gra-
dient method that uses a centralized advantage to estimate
whether the action of one agent would improve the global
reward, and decentralized actors to optimize the agent
policy. Ryan et al. also utilized the framework of decentral-
ized execution and centralized training to develop multi-
agent multi-agent actor-critic algorithm that can coordinate
agents in mixed cooperative-competitive environments [14].
However, none of these methods were applied when there
are a large number of agents due to the communication cost
among agents. Recently, few works [22], [23] scaled DRL
methods to a large number of agents, while it is not appli-
cable to apply these methods to complex real applications
such as fleet management. In [24], [25], the authors studied
large-scale multi-agent planning for fleet management with
explicitly modeling the expected counts of agents.
Deep reinforcement learning. DRL utilizes neural network
function approximations and are shown to have largely im-
proved the performance over challenging applications [9],
[11]. Many sophisticated DRL algorithms such as DQN [9],
A3C [26] were demonstrated to be effective in the tasks in
which we have a clear understanding of rules and have easy
access to millions of samples, such as video games [27], [28].
However, DRL approaches are rarely seen to be applied
in complicated real-world applications, especially in those
with high-dimensional and non-stationary action space, lack
of well-defined reward function, and in need of coordina-
tion among a large number of agents. In this paper, we show
that through careful reformulation, the DRL can be applied
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
3
to tackle the fleet management problem.
3 PROBLEM STATEMENT
In this paper, we consider the problem of managing a
large set of available homogeneous vehicles for online ride-
sharing platforms. The goal of the management is to maxi-
mize the gross merchandise volume (GMV: the value of all
the orders served) of the platform by repositioning available
vehicles to the locations with larger demand-supply gap
than the current one. This problem belongs to a variant
of the classical fleet management problem [29]. A spatial-
temporal illustration of the problem is available in Figure 1.
In this example, we use hexagonal-grid world to represent the
map and split the duration of one day into T = 144 time
intervals (one for 10 minutes). At each time interval, the
orders emerge stochastically in each grid and are served by
the available vehicles in the same grid or six nearby grids.
The goal of fleet management here is to decide how many
available vehicles to relocate from each grid to its neighbors
in ahead of time, so that most orders can be served.
To tackle this problem, we propose to formulate the
problem using multi-agent reinforcement learning [20]. In this
formulation, we use a set of homogeneous agents with small
action spaces, and split the global reward into each grid.
This will lead to a much more efficient learning procedure
than the single agent setting, due to the simplified action
dimension and the explicit credit assignment based on split
reward. Formally, we model the fleet management problem
as a Markov game G for N agents, which is defined by
a tuple G = (N,S,A,P,R, γ), where N,S,A,P,R, γ are
the number of agents, sets of states,
joint action space,
transition probability functions, reward functions, and a
discount factor respectively. The definitions are given as
follows:
• Agent: We consider an available vehicle (or equivalently
an idle driver) as an agent, and the vehicles in the same
spatial-temporal node are homogeneous, i.e., the vehicles
located at the same region at the same time interval are
considered as same agents (where agents have the same
policy). Although the number of unique heterogeneous
agents is always N, the number of agents Nt is changing
over time.
• State st ∈ S: We maintain a global state st at each
time t, considering the spatial distributions of available
vehicles and orders (i.e. the number of available vehicles
and orders in each grid) and current time t (using one-
hot encoding). The state of an agent i, si
t, is defined as the
identification of the grid it located and the shared global
t = [st, gj] ∈ RN×3+T , where gj is the one-hot
state i.e. si
encoding of the grid ID. We note that agents located at
same grid have the same state si
t.
• Action at ∈ A = A1 × ... × ANt: a joint action at = {ai
t}Nt
instructing the allocation strategy of all available vehicles
at time t. The action space Ai of an individual agent
specifies where the agent is able to arrive at the next time,
which gives a set of seven discrete actions denoted by
{k}7
k=1. The first six discrete actions indicate allocating the
agent to one of its six neighboring grids, respectively. The
last discrete action ai
t = 7 means staying in the current
grid. For example, the action a1
0 = 2 means to relocate the
1
k=0 γkri
t+k
return: E(cid:2)(cid:80)∞
(cid:3). The individual reward ri
1st agent from the current grid to the second nearby grid
at time 0, as shown in Figure 1. For a concise presentation,
(cid:44) [g0, g1] to represent agent i moving from
we also use ai
t
grid g0 to g1. Furthermore, the action space of agents
depends on their locations. The agents located at corner
grids have a smaller action space. We also assume that the
(cid:44) [g0, g1], then agent i will
action is deterministic: if ai
t
arrive at the grid g1 at time t + 1.
• Reward function Ri ∈ R = S × A → R: Each agent
is associated with a reward function Ri and all agents in
the same location have the same reward function. The i-th
agent attempts to maximize its own expected discounted
t for the
i-th agent associated with the action ai
t is defined as the
averaged revenue of all agents arriving at the same grid as
the i-th agent at time t + 1. Since the individual rewards
at same time and the same location are same, we denote
this reward of agents at time t and grid gj as rt(gj).
Such design of rewards aims at avoiding greedy actions
that send too many agents to the location with high value
of orders, and aligning the maximization of each agent's
return with the maximization of GMV (value of all served
orders in one day). Its effectiveness is empirically verified
in Sec 7.
• State transition probability p(st+1st, at) : S × A × S →
[0, 1]: It gives the probability of transiting to st+1 given
a joint action at is taken in the current state st. Notice
that although the action is deterministic, new vehicles
and orders will be available at different grids each time,
and existing vehicles will become off-line via a random
process.
To be more concrete, we give an example based on the
above problem setting in Figure 1. At time t = 0, agent 1
is repositioned from g0 to g2 by action a1
0, and agent 2 is
also repositioned from g1 to g2 by action a2
0. At time t = 1,
two agents arrive at g2, and a new order with value 10 also
emerges at same grid. Therefore, the reward r1 for both a1
0
and a2
0 is the averaged value received by agents at g2, which
is 10/2 = 5.
It's worth to note that this reward design may not lead to
the optimal reallocation strategy though it empirically leads
to good reallocation policy. We give a simple example to
illustrate this problem. We use the grid world map as show
in Figure 1. At time t = 1, there is an order with value 100
emerged in g1 and another order with value 10 emerged in
g0. Suppose we have two agents that are available in grid
g0 at time t = 0. The optimal reallocation strategy in this
case is to ask one agent stay in g0 and another go to g1, by
which we can receive the total reward 110. However, in the
current setting, each agent trys to maximize its own reward.
As a result, both of them will go to g1 and receive 50 reward
and none of them will go to g1 since the reward they can
receive is less than 50. However, we show that there are few
ways to approximate this global optimal allocation strategy
using the individual action function of each agent.
4 CONTEXTUAL MULTI-AGENT REINFORCEMENT
LEARNING
In this section, we present two novel contextual multi-agent
RL approaches: contextual multi-agent actor-critic (cA2C)
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
4
Fig. 1: The grid world system and a spatial-temporal illus-
tration of the problem setting.
centralized action-value table at each time for all agents,
which can serve as the foundation for coordinating the
actions of agents.
Geographic context. In hexagonal grids systems, border
grids and grids surrounded by infeasible grids (e.g., a lake)
have reduced action dimensions. To accommodate this, for
each grid we compute a geographic context Ggj ∈ R7, which
is a binary vector that filters out invalid actions for agents
in grid gj. The kth element of vector Ggj represents the
validity of moving toward kth direction from the grid gj.
Denote gd as the grid corresponds to the kth direction of
grid gj, the value of the kth element of Ggj is given by:
(cid:26) 1,
0,
and contextual DQN (cDQN) algorithm. We first briefly
introduce the basic multi-agent RL method.
[Gt,gj ]k =
if gd is valid grid,
otherwise,
(4)
(cid:34)
(cid:32)
(cid:33)(cid:35)2
combines
4.1 Independent DQN
Independent DQN [16]
independent Q-
learning [21] and DQN [9]. A straightforward extension
of independent DQN from small scale to a large number
of agents, is to share network parameters and distinguish
agents with their IDs [22]. The network parameters can be
updated by minimizing the following loss function, with
respect to the transitions collected from all agents:
E
Q(si
t, ai
t; θ) −
ri
t+1 + γ max
ai
t+1
Q(si
t+1, ai
t+1; θ(cid:48))
, (1)
where θ(cid:48) includes parameters of the target Q network up-
dated periodically, and θ includes parameters of behavior
Q network outputting the action value for -greedy policy,
same as the algorithm described in [9]. This method could
work reasonably well after extensive tunning but it suffers
from high variance in performance, and it also repositions
too many vehicles. Moreover, coordination among massive
agents is hard to achieve since each unique agent executes
its action independently based on its action values.
4.2 Contextual DQN
Since we assume that the location transition of an agent
after the allocation action is deterministic, the actions that
lead the agents to the same grid should have the same
action value. In this case, the number of unique action-
values for all agents should be equal to the number of grids
(cid:44) [gi, gd]
N. Formally, for any agent i where si
and gi ∈ N er(gd), the following holds:
t) = Q(st, gd)
t = [st, gi], ai
t
Q(si
t, ai
(2)
Hence, at each time step, we only need N unique action-
values (Q(st, gj),∀j = 1, . . . , N) and the optimization of
Eq (1) can be replaced by minimizing the following mean-
(cid:20)
(cid:19)(cid:21)2
squared loss:
Q(st, gd; θ) −
Q(st+1, gp; θ(cid:48))
rt+1(gd) + γ max
(cid:18)
.
gp∈Ner(gd)
(3)
This accelerates the learning procedure since the output
dimension of the action value function is reduced from
Rst → R7 to Rst → R. Furthermore, we can build a
where k = 0, . . . , 6 and last dimension of the vector repre-
sents direction staying in same grid, which is always 1.
Collaborative context. To avoid the situation that agents are
moving in conflict directions (i.e., agents are repositioned
from grid g1 to g2 and g2 to g1 at the same time.), we
provide a collaborative context Ct,gj ∈ R7 for each grid gj at
each time. Based on the centralized action values Q(st, gj),
we restrict the valid actions such that agents at the grid gj
are navigating to the neighboring grids with higher action
values or staying unmoved. Therefore, the binary vector
Ct,gj eliminates actions to grids with lower action values
than the action staying unmoved. Formally, the kth element
of vector Ct,gj that corresponds to action value Q(st, gi) is
defined as follows:
[Ct,gj ]k =
if Q(st, gi) >= Q(st, gj),
otherwise.
(5)
(cid:26) 1,
0,
After computing both collaborative and geographic context,
the -greedy policy is then performed based on the action
values survived from the two contexts. Suppose the original
t) ∈ R7≥0, given
action values of agent i at time t is Q(si
state si
t, the valid action values after applying contexts is as
follows:
q(si
t) = Q(si
t) ∗ Ct,gj ∗ Gt,gj .
(6)
The coordination is enabled because that the action values
of different agents lead to the same location are restricted to
be same so that they can be compared, which is impossible
in independent DQN. This method requires that action
values are always non-negative, which will always hold
because that agents always receive nonnegative rewards.
The algorithm of cDQN is elaborated in Alg 2.
4.3 Contextual Actor-Critic
the contextual multi-agent actor-critic
We now present
(cA2C) algorithm, which is a multi-agent policy gradient
algorithm that tailors its policy to adapt to the dynamically
changing action space. Meanwhile, it achieves not only a
more stable performance but also a much more efficient
learning procedure in a non-stationary environment. There
are two main ideas in the design of cA2C: 1) A centralized
value function shared by all agents with an expected update;
2) Policy context embedding that establishes explicit coordi-
nation among agents, enables faster training and enjoys the
flexibility of regulating policy to different action spaces. The
g0g1t=0t=1g2Timea01=[g0, g2]a02=[g1, g2](cid:1)(cid:1)(cid:1)Repositions/OrdersTheGridWorldAnorderwithvalue10Reward r1=5EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
Algorithm 1 -greedy policy for cDQN
Require: Global state st
1: Compute centralized action value Q(st, gj),∀j =
1, . . . , N
2: for i = 1 to Nt do
3:
t, ai
t = k).
Compute action values Qi by Eq (2), where (Qi)k =
Q(si
Compute contexts Ct,gj and Gt,gj for agent i.
Compute valid action values qi
ai
t = argmaxkqi
choose an action randomly from the valid actions.
t ∗ Ct,gj ∗ Gt,gj .
t with probability 1 − otherwise
t = Qi
4:
5:
6:
7: end for
8: return Joint action at = {ai
t}Nt
1 .
5
Algorithm 3 Contextual Multi-agent Actor-Critic Policy for-
ward
Require: The global state st.
1: Compute centralized state-value vt
2: for i = 1 to Nt do
3:
4:
Compute contexts Ct,gj and Gt,gj for agent i.
Compute action probability distribution qvalid(si
agent i in grid gj as Eq (10).
Sample action for agent i in grid gj based on action
probability pi.
t) for
5:
6: end for
7: return Joint action at = {ai
t}Nt
1 .
Algorithm 2 Contextual Deep Q-learning (cDQN)
1: Initialize replay memory D to capacity M
2: Initialize action-value function with random weights θ
or pre-trained parameters.
3: for m = 1 to max-iterations do
4:
5:
6:
7:
Reset the environment and reach the initial state s0.
for t = 0 to T do
Sample joint action at using Alg. 1, given st.
Execute at in simulator and observe reward rt and
next state st+1
Store
t, ai
(si
end for
for k = 1 to M1 do
the
of
t+1,∀i = 1, ..., Nt) in D.
t, si
transitions
agents
t, ri
all
t, ai
Sample a batch of transitions (si
t, ri
D, where t can be different in one batch.
ri
Compute
t + γ
maxai
Update Q-network as θ ← θ+∇θ(yi
yi
t
t+1; θ(cid:48)).
target
t+1, ai
t+1) from
∗
t−Q(si
t; θ))2,
Q(si
t, ai
t, si
=
t+1
8:
9:
10:
11:
12:
13:
14:
15: end for
end for
centralized state-value function is learned by minimizing
the following loss function derived from Bellman equation:
Vtarget(st+1; θ(cid:48)
L(θv) = (Vθv (si
v, π) =
t) − Vtarget(st+1; θ(cid:48)
π(ai
t+1 + γVθ(cid:48)
tsi
t)(ri
v, π))2,
(7)
t+1)). (8)
(si
v
(cid:88)
ai
t
where we use θv to denote the parameters of the value
network and θ(cid:48)
v to denote the target value network. Since
agents staying unmoved at the same time are treated ho-
mogeneous and share the same internal state, there are
N unique agent states, and thus N unique state-values
(V (st, gj),∀j = 1, ..., N) at each time. The state-value out-
put is denoted by vt ∈ RN , where each element (vt)j =
V (st, gj) is the expected return received by agent arriving
at grid gj on time t. In order to stabilize learning of the
value function, we fix a target value network parameterized
by θ(cid:48)
v, which is updated at the end of each episode. Note
that the expected update in Eq (7) and training actor/critic
in an offline fashion are different from the updates in n-step
actor-critic online training using TD error [26], whereas the
expected updates and training paradigm are found to be
more stable and sample-efficient. This is also in line with
prior work in applying actor-critic to real applications [30].
(cid:26) 1,
0,
Furthermore, efficient coordination among multiple agents
can be established upon this centralized value network.
Policy Context Embedding. Coordination is achieved by
masking available action space based on the context. At each
time step, the geographic context is given by Eq (4) and
the collaborative context is computed according to the value
network output:
[Ct,gj ]k =
if V (st, gi) >= V (st, gj),
otherwise,
(9)
t). Let P(si
t = ksi
where the kth element of vector Ct,gj corresponds to the
t) ∈ R7
probability of the kth action π(ai
>0
denote the original logits from the policy network output
for the ith agent conditioned on state si
t) =
t) ∗ Ct,gj ∗ Ggj denote the valid logits considering both
P(si
geographic and collaborative context for agent i at grid gj,
where ∗ denotes an element-wise multiplication. In order
to achieve effective masking, we restrict the output logits
P(si
t) to be positive. The probability of valid actions for all
agents in the grid gj are given by:
t. Let qvalid(si
πθp (ai
t = ksi
t) = [qvalid(si
[qvalid(si
(cid:107)qvalid(si
The gradient of policy can then be written as:
t)A(si
∇θp J(θp) = ∇θp log πθp (ai
t)]k =
tsi
t, ai
t),
t)]k
t)(cid:107)1
.
(10)
(11)
where θp denotes the parameters of policy network and the
advantage A(si
t, ai
t, ai
t) is computed as follows:
t) = ri
t+1) − Vθv (si
(si
t).
t+1 + γVθ(cid:48)
v
A(si
(12)
The detailed description of cA2C is summarized in Alg 4.
5 EFFICIENT ALLOCATION WITH LINEAR PRO-
GRAMMING
In this section, we present the proposed LP-cA2C that uti-
lizes the state value functions learned by cA2C and compute
the reallocations in a centralized view, which achieves the
best performance with higher efficiency.
From another perspective, if we formulate this problem
as a MDP where we have a meta-agent that controls the
decisions of all drivers, our goal is to maximize the long
term reward of the platform:
Qc(s, a) = E[
γt−1rt(st, at)s0 = s, a0 = a, π∗].
∞(cid:88)
t=1
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
Fig. 2: Illustration of contextual multi-agent actor-critic. The
left part shows the coordination of decentralized execution
based on the output of centralized value network. The right
part illustrates embedding context to policy network.
Algorithm 4 Contextual Multi-agent Actor-Critic Algorithm
for N agents
1: Initialization:
2: Initialize the value network with fixed value table.
3: for m = 1 to max-iterations do
4:
5:
6:
7:
8:
Reset environment, get initial state s0.
Stage 1: Collecting experience
for t = 0 to T do
Sample actions at according to Alg 3, given st.
Execute at in simulator and observe reward rt and
next state st+1.
Compute value network target as Eq (8) and ad-
vantage as Eq (12) for policy network and store the
transitions.
end for
Stage 2: Updating parameters
for m1 = 1 to M1 do
Sample a batch of experience: si
Update value network by minimizing the value
loss Eq (7) over the batch.
t, Vtarget(si
v, π)
t; θ(cid:48)
end for
for m2 = 1 to M2 do
9:
10:
11:
12:
13:
14:
15:
16:
17:
6
to the global long term reward.
N(cid:88)
Qi(si, ai) =
i=1
i=1
= Eπ∗
= Eπ∗
N(cid:88)
(cid:35)
(cid:35)
Eπ∗
(cid:34) ∞(cid:88)
(cid:34) ∞(cid:88)
(cid:34) ∞(cid:88)
t=1
t=1
γt−1
γt−1ri
0 = ai
t
0 = si, ai
(cid:12)(cid:12)(cid:12)si
(cid:12)(cid:12)(cid:12)s0 = s, a0 = a
N(cid:88)
(cid:35)
(cid:12)(cid:12)(cid:12)s0 = s, a0 = a
ri
t
i=1
γt−1rt
t=1
= Qc(s, a)
However, in this work, this simple relationship does not
hold mainly since the number of agents (Nt) is not static.
As shown in Eq (13), the global reward at time t + 1 of
the platform is not equal to the sum of all current agents'
i=1 ri
t+1 = rt+1) even given a
centralized policy π∗.
i=1 ri
reward (i.e.(cid:80)Nt
Nt(cid:88)
Q(si
t, ai
t) =
t+1 (cid:54)=(cid:80)Nt+1
Nt(cid:88)
Eπ∗ [ri
t+1 + γ max
Q(si
t+1, ai
t+1)]
(13)
i=1
i=1
ai
t+1
Ideally, we would like to directly learn the centralized action
value function Qc while it's computational intractable to
explore and optimize the Qc in the case we have substan-
tially large action space. Therefore, we need to leverage the
averaged long term reward of each agent to approximate the
maximization of the centralized action-value function Qc.
In cDQN, we approximate this allocation by avoiding the
greedy allocation with −greedy strategy even during the
evaluation stage. In cA2C, the policy will allocate the agents
in the same location to its nearby locations with certain
probability according to the state-values. In fact, we uses
this empirical strategy to better align the joint actions of each
individual agent with the action from optimal reallocation.
However, both of the cA2C and cDQN try to coordinate
agents from a localized view, in which each agent only
consider its nearby situation when they are coordinating.
Therefore, the redundant reallocation still exists in those
two methods. Other methods that can approximate the
centralized action-value function such as VDN [31] and
QMIX [32] are not able to scale to large number of agents.
In this work, we propose to approximate the centralized
policy by formulating the reallocation as a linear program-
ming problem.
y(st) − λ(cid:107)D (ot+1 − Aty(st))(cid:107)2
2
(14)
(cid:17)
v(st)T At − cT
t
max
y(st)
s.t. y(st) ≥ 0
Bty(st) = dt
batch
a
experience:
t, ai
t), Ct,gj , Ggj , where t can be different
Sample
t, A(si
t, ai
si
one batch.
Update policy network as θp ← θp + ∇θp J(θp).
of
(cid:16)
18:
19:
20: end for
end for
the platform, i.e. (cid:80)
The π∗ in above formulation denotes the optimal global
reallocation strategy. Although the sum of immediate re-
ward received by all agents is equal to the total reward
of the platform, maximizing the long term reward of each
agent is not equal to maximize the long term reward of
i maxai Q(si, ai) (cid:54)= maxa Qc(s, a). In
cooperative multi-agent reinforcement learning, the sum of
rewards of multiple agents is the global reward we want to
maximize. In this case, given a centralized policy (π∗) for all
agents, the summation of long term reward should be equal
where the vector y(st) ∈ RNr(t)×1 denotes the feasible
repositions for all agents at current time step t. Each element
in y(st) represents one reposition from current grid to its
nearby grid. Nr(t) is the total number of feasible reposition
direction. The number of feasible repositions depends on
the current state values in each grid since we reallocate
agents from location with lower state value to the grid with
higher state value. A ∈ RN×Nr(t) is a indicator matrix
that denotes the allocations that dispatch drivers into the
grid, i.e. Ai,j ∈ {0, 1}. Ai,j = 1 means the j-th reposition
reallocates agents into the i-th grid. Similarly, B ∈ RN×Nr(t)
is the indicator matrix that denotes the allocations that
CentralizedValue OutputDynamic Collaborative ContextGeographic ContextAgentAgentAgentAgentParameter-Shared Policy NetworkDecentralizedActorExecutionParameter-Shared Policy NetworkAgent StateGeo-ContextRaw LogitsSampled Action01110…Col-Context00101…11CentralizedCritic NetworkValid LogitsEFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
7
dispatch drivers out of the grid. D ∈ {0, 1}N×N is the
adjacency matrix denotes the connectivity of the grid world.
ot+1 denotes the estimated number of orders in each grid at
next time step. ct ∈ RNr(t)×1 denotes the cost associated
with each reposition and s(st) ∈ RN×1 denotes the state
value for each grid in time step t.
The first term in Eq (14) approximates our goal that we
want to maximize the long term reward of the platform.
Since the state value can be interpreted as the averaged
long term reward one agent will receive if it appears in
certain grid, the first term represents the total reward minus
the total cost associated with the repositions. However,
optimizing the first term will lead to a greedy solution that
reallocates all the agents to the nearby grid with highest
state value minus the cost. To alleviate this greedy realloca-
tion, we add the second term to regularize the number of
agents reallocated to each grid. Since the agent in current
grid can pick up the orders emerged in nearby grids, we
utilize the adjacency matrix to regularize the number of
agents reallocated into a group of nearby grids should
be close to the number of orders emerged in a group of
nearby grids. From another point of view, the second term
more focus on the immediate reward since it prefer the
solution that allocates right amount of agents to pick-up the
orders without consider the future income that an agent can
receive by that reposition. The regularization parameter λ
is used to balance the long term reward and the immediate
reward. The two flow conservation constrains requires the
number of repositions should be positive and the number of
repositions from current grid should be equal to the number
of available agents in current grids.
Ideally, we need to solve a integer programming prob-
lem where our solution satisfies y(st) ∈ Z Nr . However,
solving integer programming is NP-hard in worst case while
solving its linear programming relaxation is in P. In practice,
we solve the linear programming relaxation and round the
solution into integers [33].
6 SIMULATOR DESIGN
A fundamental challenge of applying RL algorithm in real-
ity is the learning environment. Unlike the standard super-
vised learning problems where the data is stationary to the
learning algorithms and can be evaluated by the training-
testing paradigm, the interactive nature of RL introduces
intricate difficulties on training and evaluation. One com-
mon solution in traffic studies is to build simulators for
the environment [8], [18], [19]. In this section, we introduce
a simulator design that models the generation of orders,
procedure of assigning orders and key driver behaviors such
as distributions across the city, on-line/off-line status control
in the real world. The simulator serves as the training envi-
ronment for RL algorithms, as well as their evaluation. More
importantly, our simulator allows us to calibrate the key
performance index with the historical data collected from a
fleet management system, and thus the policies learned are
well aligned with real-world traffics.
The Data Description The data provided by Didi Chuxing
includes orders and trajectories of vehicles in two cities
including Chengdu and Wuhan. Chengdu is covered by a
hexagonal grids world consisting of 504 grids. Wuhan con-
tains more than one thousands grids. The order information
includes order price, origin, destination and duration. The
trajectories contain the positions (latitude and longitude)
and status (on-line, off-line, on-service) of all vehicles every
few seconds.
Timeline Design. In one time interval (10 minutes), the
main activities are conducted sequentially, also illustrated
in Figure 4.
• Vehicle status updates: Vehicles will be stochastically set
offline (i.e., off from service) or online (i.e., start working)
following a spatiotemporal distribution learned from real
data using the maximum likelihood estimation (MLE).
Other types of vehicle status updates include finishing
current service or allocation. In other words, if a vehicle
is about to finish its service at the current time step, or
arriving at the dispatched grid, the vehicles are available
for taking new orders or being repositioned to a new
destination.
• Order generation: The new orders generated at the current
time step are bootstrapped from real orders occurred in
the same time interval. Since the order will naturally
reposition vehicles in a wide range, this procedure keeps
the reposition from orders similar to the real data.
• Interact with agents: This step computes state as input to
fleet management algorithm and applies the allocations
for agents.
• Order assignments: All available orders are assigned
through a two-stage procedure. In the first stage, the
orders in one grid are assigned to the vehicles in the same
grid. In the second stage, the remaining unfilled orders are
assigned to the vehicles in its neighboring grids. In reality,
the platform dispatches order to a nearby vehicle within a
certain distance, which is approximately the range covered
by the current grid and its adjacent grids. Therefore, the
above two-stage procedure is essential to stimulate these
real-world activities and the following calibration. This
setting differentiates our problem from the previous fleet
management problem setting (i.e., demands are served
by those resources at the same location only.) and make
it impossible to directly apply the classic methods such
as adaptive dynamic programming approaches proposed
in [6], [7].
Calibration. The effectiveness of the simulator is guaranteed
by calibration against the real data regarding the most im-
portant performance measurement: the gross merchandise
volume (GMV). As shown in Figure 3, after the calibration
procedure, the GMV in the simulator is very similar to that
from the ride-sharing platform. The r2 between simulated
GMV and real GMV is 0.9331 and the Pearson correlation is
0.9853 with p-value p < 0.00001.
7 EXPERIMENTS
In this section, we conduct extensive experiments to evalu-
ate the effectiveness of our proposed method.
7.1 Experimental settings
In the following experiments, both of training and evalu-
ation are conducted on the simulator introduced in Sec 6.
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
8
current valid actions are [g1, g2] and [g1, g1], the rule-
(cid:44) [g1, gj]) =
based method sample its actions from p(ai
Vrule(t+1, j)/(Vrule(t+1, 2)+Vrule(t+1, 1)),∀j = 1, 2.
t
• Value-Iter: It dynamically updates the value table based
on policy evaluation [5]. The allocation policy is computed
based on the new value table, the same used in the rule-
based method, while the collaborative context is consid-
ered.
• T-Q learning: The standard independent
tabular Q-
learning [5] learns a table qtabular ∈ RT×N×7 with -
greedy policy. In this case the state reduces to time and
the location of the agent.
• T-SARSA: The independent tabular SARSA [5] learns a
table qsarsa ∈ RT×N×7 with same setting of states as T-Q
learning.
• DQN: The independent DQN is currently the state-of-
the-art as we introduced in Sec 4.1. Our Q network is
parameterized by a three-layer ELUs [34] and we adopt
the -greedy policy as the agent policy. The is annealed
linearly from 0.5 to 0.1 across the first 15 training episodes
and fixed as = 0.1 during the testing.
• cDQN: The contextual DQN as we introduced in Sec 4.2.
The is annealed the same as in DQN. At the end of each
episode, the Q-network is updated over 4000 batches, i.e.
M1 = 4000 in Alg 2. To ensure a valid context masking, the
activation function of the output layer of the Q-network is
ReLU + 1.
• cA2C: The contextual multi-agent actor-critic as we intro-
duced in Sec 4.3. At the end of each episode, both the
policy network and the value network are updated over
4000 batches, i.e. M1 = M2 = 4000 in Alg 2. Similar to
cDQN, The output layer of the policy network uses ReLU
+ 1 as the activation function to ensure that all elements in
the original logits P(si
t) are positive.
• LP-cA2C: The contextual multi-agent actor-critic with lin-
ear programming as introduced in Sec 5. During the
training state, we use cA2C to explore the environment
and learn the state value function. During the evaluation,
we conduct the policy given by linear programming.
Except for the first baseline, the geographic context is con-
sidered in all methods so that the agents will not navi-
gate to the invalid grid. Unless other specified, the value
function approximations and policy network in contextual
algorithms are parameterized by a three-layer ReLU [35]
with node sizes of 128, 64 and 32, from the first layer to the
third layer. The batch size of all deep learning methods is
fixed as 3000, and we use ADAMOPTIMIZER with a learning
rate of 1e − 3. Since performance of DQN varies a lot when
there are a large number of agents, the first column in the
Table 1 for DQN is averaged over the best three runs out of
six runs, and the results for all other methods are averaged
over three runs. Also, the centralized critics of cDQN and
cA2C are initialized from a pre-trained value network using
the historical mean of order values computed from ten
episodes simulation, with different random seeds from both
training and evaluation.
To test the robustness of proposed method, we evaluate
all competing methods under different numbers of initial
vehicles accross different cities. The results are summarized
in Table 1, 2, 3. The results of Diffusion improved the perfor-
Fig. 3: The simulator calibration in terms of GMV. The red
curves plot the GMV values of real data averaged over 7
days with standard deviation, in 10-minute time
granularity. The blue curves are simulated results averaged
over 7 episodes.
For all the competing methods, we prescribe two sets of
random seed that control the dynamics of the simulator for
training and evaluation, respectively. Examples of dynamics
in simulator include order generations, and stochastically
status update of all vehicles. In this setting, we can test the
generalization performance of algorithms when it encoun-
ters unseen dynamics as in real scenarios. The performance
is measured by GMV (the total value of orders served in
the simulator) gained by the platform over one episode (144
time steps in the simulator), and order response rate (ORR),
which is the averaged number of orders served divided by
the number of orders generated. We use the first 15 episodes
for training and conduct evaluation on the following ten
episodes for all learning methods. The number of available
vehicles at each time in different locations is counted by a
pre-dispatch procedure. This procedure runs a virtual two-
stage order dispatching process to compute the remaining
available vehicles in each location. On average, the simula-
tor has 5356 agents per time step waiting for management.
All the quantitative results of learning methods presented
in this section are averaged over three runs.
7.2 Performance comparison
In this subsection, the performance of following methods
are extensively evaluated by the simulation.
• Simulation: This baseline simulates the real scenario with-
out any fleet management. The simulated results are cali-
brated with real data in Sec 6.
• Diffusion: This method diffuses available vehicles to
neighboring grids randomly.
• Rule-based: This baseline computes a T × N value table
Vrule, where each element Vrule(t, j) represents the av-
eraged reward of an agent staying in grid gj at time step
t. The rewards are averaged over ten episodes controlled
by random seeds that are different with testing episodes.
With the value table, the agent samples its action based
on the probability mass function normalized from the
values of neighboring grids at the next time step. For
example, if an agent located in g1 at time t and the
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
9
Fig. 4: Simulator time line in one time step (10 minutes).
mance a lot in Table 1, possibly because that the method
sometimes encourages the available vehicles to leave the
grid with high density of available vehicles, and thus the
imbalanced situation is alleviated. However, in a more re-
alistic setting that we consider reposition cost, this method
can lead to negative effective due to the highly inefficient
reallocations. The Rule-based method that repositions vehi-
cles to the grids with a higher demand value, improves the
performance of random repositions. The Value-Iter dynami-
cally updates the value table according to the current policy
applied so that it further promotes the performance upon
Rule-based. Comparing the results of Value-Iter, T-Q learning
and T-SARSA, the first method consistently outperforms the
latter two, possibly because that the usage of a centralized
value table enables coordinations, which helps to avoid
conflict repositions. The above methods simplify the state
representation into a spatial-temporal value representation,
whereas the DRL methods account both complex dynam-
ics of supply and demand using neural network function
approximations. As the results shown in last three rows of
Table 1, 2, 3, the methods with deep learning outperforms
the previous one. Furthermore, the contextual algorithms
largely outperform the independent DQN (DQN), which
is the state-of-the-art among large-scale multi-agent DRL
method and all other competing methods. Last but not least,
the lp-cA2C acheive the best performance in terms of return
on investment (the gmv gain per reallocation), GMV, and
order response rate.
7.3 On the Efficiency of Reallocations
In reality, each reposition comes with a cost. In this sub-
section, we consider such reposition costs and estimated
them by fuel costs. Since the travel distance from one grid to
another is approximately 1.2km and the fuel cost is around
0.5 RMB/km, we set the cost of each reposition as c = 0.6.
In this setting, the definition of agent, state, action and
transition probability is same as we stated in Sec 3. The only
difference is that the repositioning cost is included in the
reward when the agent is repositioned to different locations.
Therefore, the GMV of one episode is the sum of all served
order value substracted by the total of reposition cost in one
episode. For example, the objective function for DQN now
includes the reposition cost as follows:
t+1 − c + γ maxai
ri
,
(15)
(cid:44) [go, gd], and if gd = go then c = 0, otherwise
where ai
t
c = 0.6. Similarly, we can consider the costs in cA2C.
However, it is hard to apply them to cDQN because that
the assumption, that different actions that lead to the same
location should share the same action value, which is not
t+1; θ(cid:48)(cid:17)(cid:105)2
t; θ) −(cid:16)
Q(si
t+1, ai
t+1
E(cid:104)
Q(si
t, ai
held in this setting. Therefore, instead of considering the
reposition cost in the objective function, we only incorporate
the reposition cost when we actually conduct our policy
based on cDQN. Under this setting, the learning objective of
action value of cDQN is same as in Eq (3) while the context
embedding is changed from Eq (4) to the following:
(cid:26) 1,
0,
[Ct,gj ]k =
if Q(st, gi) >= Q(st, gj) + c,
otherwise.
(16)
For LP-cA2C, the cost effect is naturally incorporated in
the objective function as in Eq (14). As the results shown in
Table 4, the DQN tends to reposition more agents while the
contextual algorithms achieve better performance in terms
of both GMV and order response rate, with lower cost.
More importantly, the LP-cA2C outperforms other methods
in both of the performance and efficiency. The reason is
that this method formulate the coordination among agents
into an optimization problem, which approximates the max-
imization of the platform's long term reward in a centralized
version. The centralized optimization problem can avoid
lots of redundant reallocations compared to previous meth-
ods. The training procedures and the network architecture
are the same as described in the previous section.
To be more concrete, we give a specific scenario to
demonstrate that the efficiency of LP-cA2C. Imaging we
would like to ask drivers to move from grid A to nearby grid
B while there is a grid C that is adjacent to both grid A and
B. In the previous algorithms, since the allocation is jointly
given by each agent, it's very likely that we reallocate agents
by the short path A → B and longer path A → C → B
when there are sufficient amount of agents can arrive at
B from A. These inefficient reallocations can be avoided by
LP-cA2C naturally since the longer path only incurs a higher
cost which will be the suboptimal solution to our objective
function compared to the solution only contains the first
path. As shown in Figure 5 (a), the allocation computed
by cA2C contains many triangle repositions as denoted by
the black circle, while we didn't observe these inefficient
allocations in Figure 5 (b). Therefore, the allocation policy
delivered by LP-cA2C is more efficient than those given by
previous algorithms.
7.4 The effectiveness of averaged reward design
In multi-agent RL, the reward design for each agent is
essential for the success of learning. In fully cooperative
multi-agent RL, the reward for all agents is a single global
reward [20], while it suffers from the credit assignment
problem for each agent's action. Splitting the reward to
each agent will alleviate this problem. In this subsection,
we compare two different designs for the reward of each
agent: the averaged reward of a grid as stated in Sec 3
Update distribution of available vehiclesBootstrap new ordersInteract with AgentsStatePolicyActionReposition current available vehiclesDispatch ordersABReward10
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
TABLE 1: Performance comparison of competing methods in terms of GMV and order response rate under the setting
that each reposition doesn't incur any cost. For a fair comparison, the random seeds that control the dynamics of the
environment are set to be the same across all methods.
100% initial vehicles
Normalized GMV
90% initial vehicles
Normalized GMV
10% initial vehicles
Normalized GMV
Simulation
Diffusion
Rule-based
Value-Iter
T-Q learning
T-SARSA
DQN
cDQN
cA2C
100.00 ± 0.60
105.68 ± 0.64
108.49 ± 0.40
110.29 ± 0.70
108.78 ± 0.51
109.12 ± 0.49
114.06 ± 0.66
115.19 ± 0.46
115.27 ±0.70
ORR
81.80% ± 0.37%
86.48% ± 0.54%
90.19% ± 0.33%
90.14% ± 0.62%
90.06% ± 0.38%
90.18% ± 0.38%
93.01% ± 0.20%
94.77% ± 0.32%
94.99% ±0.48%
98.81 ± 0.50
104.44 ± 0.57
107.38 ± 0.55
109.50 ± 0.68
107.71 ± 0.42
107.69 ± 0.49
113.19 ± 0.60
114.29 ±0.66
113.85 ± 0.69
ORR
80.64% ± 0.37%
84.93% ± 0.49%
88.70% ± 0.48%
89.59% ± 0.69%
89.11% ± 0.42%
88.68% ± 0.42%
91.99% ± 0.30%
94.00% ±0.53%
93.99% ± 0.47%
92.78 ± 0.79
99.00 ± 0.51
100.08 ± 0.50
102.60 ± 0.61
100.07 ± 0.55
99.83 ± 0.50
103.80 ± 0.96
105.29 ± 0.70
105.62 ±0.66
ORR
70.29% ± 0.64%
74.51% ± 0.28%
75.58% ± 0.36%
77.17% ± 0.53%
75.57% ± 0.40%
75.40% ± 0.44%
77.03% ± 0.23%
79.28% ± 0.58%
79.57% ±0.51%
TABLE 2: Performance comparison of competing methods in terms of GMV, order response rate (ORR), and return on
invest (ROI) under the setting that each reposition is associated with a cost.
100% initial vehicles
Normalized GMV
Normalized GMV
90% initial vehicles
ORR
Normalized GMV
10% initial vehicles
ORR
Simulation
Diffusion
Rule-based
Value-Iter
T-Q learning
T-SARSA
DQN
cDQN
cA2C
LP-cA2C
100.00 ± 0.60
103.02 ± 0.41
106.21 ± 0.43
108.26 ± 0.65
107.55 ± 0.58
107.73 ± 0.46
110.81 ± 0.68
112.49 ± 0.42
112.70 ± 0.64
113.60 ±0.56
-
ORR
ROI
81.80% ± 0.37%
86.49% ± 0.42% 0.5890
90.00% ± 0.43% 1.4868
90.28% ± 0.50% 2.0092
90.12% ± 0.52% 2.9201
89.93% ± 0.34% 3.3881
92.50% ± 0.50% 1.7811
94.88% ± 0.33% 2.2207
94.74% ± 0.57% 3.1062
95.27% ±0.36% 4.4633
98.81 ± 0.50
102.35 ± 0.51
105.30 ± 0.42
107.69 ± 0.82
106.60 ± 0.52
106.88 ± 0.45
110.16 ± 0.60
112.12 ± 0.40
112.05 ± 0.45
112.75±0.65
-
ROI
80.64% ± 0.37%
85.00% ± 0.47% 0.7856
88.58% ± 0.37% 1.7983
89.53% ± 0.56% 2.5776
89.17% ± 0.41% 4.2052
88.82% ± 0.37% 5.1559
91.79% ± 0.29% 2.3790
94.17% ± 0.36% 2.7708
93.97% ± 0.37% 3.8085
94.62%±0.47%
5.2719
92.78 ± 0.79
97.41 ± 0.55
99.37 ± 0.36
101.56 ± 0.65
99.99 ± 1.28
99.11 ± 0.40
103.40 ± 0.51
104.25 ± 0.55
104.19 ± 0.70
105.37 ±0.58
-
ROI
70.29% ± 0.64%
74.51% ± 0.46% 1.5600
75.83% ± 0.48% 3.2829
77.11% ± 0.44% 4.5251
75.97% ± 0.91% 5.2527
75.23% ± 0.35% 6.8805
77.14% ± 0.26% 4.3770
79.41% ± 0.48% 4.8340
79.25% ± 0.68% 5.2124
80.15% ±0.46% 7.2949
TABLE 3: Performance comparison of competing methods
in terms of GMV, order response rate and return on invest-
ment in Wuhan under the setting that each reposition is
associated with a cost.
Simulation
Diffusion
Rule-based
Value-Iter
T-Q learning
T-SARSA
DQN
cDQN
cA2C
LP-cA2C
Normalized GMV
100.00 ± 0.48
98.84 ± 0.44
103.84 ± 0.63
107.13 ± 0.70
107.10 ± 0.61
107.14 ± 0.64
108.45 ± 0.62
108.93 ± 0.57
113.31 ± 0.54
114.92 ±0.65
-
ORR
ROI
76.56% ± 0.45%
80.07% ± 0.24% -0.2181
84.91% ± 0.25% 0.5980
85.06% ± 0.45% 1.6156
85.28% ± 0.28% 1.8302
84.99% ± 0.28% 2.0993
86.67% ± 0.33% 1.0747
89.03% ± 0.26% 1.1001
88.57% ± 0.45% 4.4163
89.29% ±0.39%
6.1417
TABLE 4: The effectiveness of contextual multi-agent actor-
critic considering dispatch costs.
DQN
cDQN
cA2C
LP-cA2C
Normalized GMV
110.81 ± 0.68
112.49 ± 0.42
112.70 ± 0.64
113.60 ± 0.56
ORR
92.50% ± 0.50%
94.88% ± 0.33%
94.74% ± 0.57%
95.27% ± 0.36%
Repositions
606932
562427
408859
304752
and the total reward of a grid that does not average on
the number of available vehicles at that time. As shown in
table 5, the methods with averaged reward (cA2C, cDQN)
largely outperform those using total reward, since this de-
sign naturally encourages the coordinations among agents.
Using total reward, on the other hand, is likely to reposition
an excessive number of agents to the location with high
demand.
7.5 Ablations on policy context embedding
In this subsection, we evaluate the effectiveness of context
embedding, including explicitly coordinating the actions
of different agents through the collaborative context, and
eliminating the invalid actions with geographic context. The
TABLE 5: The effectiveness of averaged reward design. The
performance of methods using the raw reward (second
column) is much worse than the performance of methods
using the averaged reward.
Proposed methods
Raw Reward
Normalized GMV/ORR
Normalized GMV/ORR
cA2C 115.27±0.70/94.99% ± 0.48% 105.75 ± 1.17/88.09% ± 0.74%
cDQN 115.19± 0.46/94.77%± 0.32% 108.00 ± 0.35/89.53% ± 0.31%
TABLE 6: The effectiveness of context embedding.
Normalized GMV/ORR
Repositions
cA2C
cA2C-v1
cA2C-v2
cA2C
cA2C-v3
Without reposition cost
115.27 ± 0.70/94.99% ± 0.48%
114.78 ± 0.67/94.52% ± 0.49%
111.39 ± 1.65/92.12% ± 1.03%
112.70 ± 0.64/94.74% ± 0.57%
110.43 ± 1.16/93.79% ± 0.75%
With reposition cost
460586
704568
846880
408859
593796
following variations of proposed methods are investigated
in different settings.
• cA2C-v1: This variation drops collaborative context of
cA2C in the setting that does not consider reposition
cost.
• cA2C-v2: This variation drops both geographic and
collaborative context of cA2C in the setting that does
not consider reposition cost.
• cA2C-v3: This variation drops collaborative context of
cA2C in the setting that considers reposition cost.
The results of above variations are summarized in Ta-
ble 6 and Figure 6. As seen in the first two rows of Table 6
and the red/blue curves in Figure 6 (a), in the setting of zero
reposition cost, cA2C achieves the best performance with
much less repositions (65.37%) comparing with cA2C-v1.
Furthermore, collaborative context embedding achieves sig-
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
11
(a) cA2C
(b) LP-cA2C
Fig. 5: The illustration of allocations of cA2C and LP-cA2C at 18:40, 19:40, 20:40, 21:40, and 22:40, respsectively. The black
circles in the left column highlight the redundant repositions in the allocation policy given by cA2C. In the right column,
there are no such inefficient repositions given by LP-cA2C since we compute the repositions in a global view.
Fig. 6: Convergence comparison of cA2C and its variations
without using context embedding in both settings, with
and without reposition costs. The X-axis is the number of
episodes. The left Y-axis denotes the number of conflicts
and the right Y-axis denotes the normalized GMV in one
episode.
(a) Without reposition cost
(b) With reposition cost
nificant advantages when the reposition cost is considered,
as shown in the last two rows in Table 6 and Figure 6 (b). It
not only greatly improves the performance but also acceler-
ates the convergence. Since the collaborative context largely
narrows down the action space and leads to a better policy
solution in the sense of both effectiveness and efficiency, we
can conclude that coordination based on collaborative con-
text is effective. Also, comparing the performances of cA2C
and cA2C-v2 (red/green curves in Figure 6 (a)), apparently
the policy context embedding (considering both geographic
and collaborative context) is essential to performance, which
greatly reduces the redundant policy search.
7.6 Ablation study on grouping the locations
This section studies the effectiveness of our regularization
design for LP-cA2C. One key difference between our work
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
12
and traditional fleet management works [6], [7] is that we
didn't assume the drivers in one location can only pick up
the orders in the same location. On the contrary, one agent
can also serve the orders emerged in the nearby locations,
which is a more realistic and complicated setting. In this
case, we regularize the number of agents repositioned into a
set of nearby grids close to the number of estimated orders
at next time step. This grouping regularization in Eq (14) is
more efficient than the regularization in Eq (17) requiring
the number of agents repositioned into each grid is close
to the number of estimated orders at that gird since lots of
reposition inside the same group can be avoided. As the
results shown in Table 7, using the group regularization
in Eq (14) reallocates less agents while achieves same best
performance as the one in Eq (17) (LP-cA2C').
(v(st)T At − cT
t )y(st) − λ(ot − Aty(st))2
(17)
max
y(st)
TABLE 7: The effectiveness of group regularization design.
The results are averaged over three runs.
LP-cA2C
LP-cA2C'
Normalized GMV
113.56 ± 0.61
113.60 ± 0.56
ORR
95.24% ± 0.40%
95.27% ± 0.36%
Repositions
ROI
341774
304752
3.9663
4.4633
7.7 Qualitative study
In this section, we analyze whether the learned value func-
tion can capture the demand-supply relation ahead of time,
and the rationality of allocations. To see this, we present a
case study on the region nearby the airport. The state value
and allocation policy is acquired from cA2C that was trained
for ten episodes. We then run the well-trained cA2C on one
testing episode, and qualitatively exam the state value and
allocations under the unseen dynamics. The sum of state
values and demand-supply gap (defined as the number of
orders minus the number of vehicles) of seven grids that
cover the CTU airport is visualized. As seen in Figure 8,
the state value can capture the future dramatic changes of
demand-supply gap. Furthermore, the spatial distribution
of state values can be seen in Figure 7. After the midnight,
the airport has a large number of orders, and less available
vehicles, and therefore the state values of airport are higher
than other locations. During the daytime, more vehicles
are available at the airport so that each will receive less
reward and the state values are lower than other regions,
as shown in Figure 7 (b). In Figure 7 and Figure 8, we can
conclude that the value function can estimate the relative
shift of demand-supply gap from both spatial and temporal
perspectives. It is crucial to the performance of cA2C since
the coordination is built upon the state values. Moreover,
as illustrated by blue arrows in Figure 7, we see that the
allocation policy gives consecutive allocations from lower
value grids to higher value grids, which can thus fill the
future demand-supply gap and increase the GMV.
8 CONCLUSIONS
In this paper, we first formulate the large-scale fleet manage-
ment problem into a feasible setting for deep reinforcement
learning. Given this setting, we propose contextual multi-
in which two
agent reinforcement learning framework,
(a) At 01:50 am.
(b) At 06:40 pm.
Fig. 7: Illustration on the repositions nearby the airport at
1:50 am and 06:40 pm. The darker color denotes the higher
state value and the blue arrows denote the repositions.
Fig. 8: The normalized state value and demand-supply gap
over one day.
contextual algorithms cDQN and cA2C are developed and
both of them achieve the large scale agents' coordination in
fleet management problem. cA2C enjoys both flexibility and
efficiency by capitalizing a centralized value network and
decentralized policy execution embedded with contextual
information. It is able to adapt to different action space in
an end-to-end training paradigm. A simulator is developed
and calibrated with the real data provided by Didi Chux-
ing, which served as our training and evaluation platform.
Extensive empirical studies under different settings in sim-
ulator have demonstrated the effectiveness of the proposed
framework.
ACKNOWLEDGMENTS
This material is based in part upon work supported by the
National Science Foundation under Grant IIS-1565596, IIS-
1615597, IIS-1749940 and Office of Naval Research N00014-
14-1-0631, N00014- 17-1-2265.
EFFICIENT COLLABORATIVE MARL FOR LARGE-SCALE FLEET MANAGEMENT
REFERENCES
[1] Uber. [Online]. Available: https://www.uber.com/
[2] Lyft. [Online]. Available: https://www.lyft.com/
[3] D. Chuxing. [Online]. Available: http://www.didichuxing.com/
[4] Z. Li, Y. Hong, and Z. Zhang, "Do on-demand ride-sharing ser-
vices affect traffic congestion? evidence from uber entry," Working
paper, available at SSRN: https://ssrn. com/abstract= 2838043,
Tech. Rep., 2016.
[5] R. S. Sutton and A. G. Barto, Reinforcement learning: An introduction.
MIT press Cambridge, 1998, vol. 1, no. 1.
[6] G. A. Godfrey and W. B. Powell, "An adaptive dynamic program-
ming algorithm for dynamic fleet management, i: Single period
travel times," Transportation Science, vol. 36, no. 1, pp. 21 -- 39, 2002.
[7] -- -- , "An adaptive dynamic programming algorithm for dynamic
fleet management, ii: Multiperiod travel times," Transportation
Science, vol. 36, no. 1, pp. 40 -- 54, 2002.
[8] C. Wei, Y. Wang, X. Yan, and C. Shao, "Look-ahead insertion policy
for a shared-taxi system based on reinforcement learning," IEEE
Access, 2017.
[9] V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G.
Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski
et al., "Human-level control through deep reinforcement learning,"
Nature, vol. 518, no. 7540, pp. 529 -- 533, 2015.
[10] D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. Van
Den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam,
M. Lanctot et al., "Mastering the game of go with deep neural
networks and tree search," Nature, vol. 529, no. 7587, pp. 484 -- 489,
2016.
[11] D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang,
A. Guez, T. Hubert, L. Baker, M. Lai, A. Bolton et al., "Mastering
the game of go without human knowledge," Nature, vol. 550, no.
7676, p. 354, 2017.
[12] K. Arulkumaran, M. P. Deisenroth, M. Brundage, and A. A.
Bharath, "A brief survey of deep reinforcement learning," arXiv
preprint arXiv:1708.05866, 2017.
[13] T.-H. Pham, G. De Magistris, and R. Tachibana, "Optlayer-
practical constrained optimization for deep reinforcement learning
in the real world," arXiv preprint arXiv:1709.07643, 2017.
[14] R. Lowe, Y. Wu, A. Tamar, J. Harb, P. Abbeel, and I. Mordatch,
"Multi-agent actor-critic for mixed cooperative-competitive envi-
ronments," arXiv preprint arXiv:1706.02275, 2017.
[15] J. Foerster, G. Farquhar, T. Afouras, N. Nardelli, and S. White-
son, "Counterfactual multi-agent policy gradients," arXiv preprint
arXiv:1705.08926, 2017.
[16] A. Tampuu, T. Matiisen, D. Kodelja, I. Kuzovkin, K. Korjus, J. Aru,
J. Aru, and R. Vicente, "Multiagent cooperation and competition
with deep reinforcement learning," PloS one, vol. 12, no. 4, p.
e0172395, 2017.
[17] B. Bakker, S. Whiteson, L. Kester, and F. C. Groen, "Traffic light
control by multiagent reinforcement learning systems," in Interac-
tive Collaborative Information Systems. Springer, 2010, pp. 475 -- 510.
[18] K. T. Seow, N. H. Dang, and D.-H. Lee, "A collaborative multiagent
taxi-dispatch system," IEEE T-ASE, vol. 7, no. 3, pp. 607 -- 616, 2010.
[19] M. Maciejewski and K. Nagel, "The influence of multi-agent coop-
eration on the efficiency of taxi dispatching," in PPAM. Springer,
2013, pp. 751 -- 760.
[20] L. Busoniu, R. Babuska, and B. De Schutter, "A comprehensive
survey of multiagent reinforcement learning," IEEE Transactions
on Systems, Man, And Cybernetics-Part C: Applications and Reviews,
38 (2), 2008, 2008.
[21] M. Tan, "Multi-agent reinforcement learning: Independent vs.
cooperative agents," in ICML, 1993, pp. 330 -- 337.
[22] L. Zheng, J. Yang, H. Cai, W. Zhang, J. Wang, and Y. Yu, "Ma-
gent: A many-agent reinforcement learning platform for artificial
collective intelligence," arXiv preprint arXiv:1712.00600, 2017.
[23] Y. Yang, R. Luo, M. Li, M. Zhou, W. Zhang, and J. Wang, "Mean
field multi-agent reinforcement learning," ICML, 2018.
[24] D. T. Nguyen, A. Kumar, and H. C. Lau, "Collective multiagent
sequential decision making under uncertainty," AAAI, 2017.
[25] -- -- , "Policy gradient with value function approximation for
collective multiagent planning," NIPS, 2017.
[26] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley,
D. Silver, and K. Kavukcuoglu, "Asynchronous methods for deep
reinforcement learning," in ICML, 2016, pp. 1928 -- 1937.
[27] G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schul-
man, J. Tang, and W. Zaremba, "Openai gym," arXiv preprint
arXiv:1606.01540, 2016.
13
[28] M. G. Bellemare, Y. Naddaf, J. Veness, and M. Bowling, "The
arcade learning environment: An evaluation platform for general
agents." J. Artif. Intell. Res.(JAIR), vol. 47, pp. 253 -- 279, 2013.
[29] P. J. Dejax and T. G. Crainic, "Survey papera review of empty
flows and fleet management models in freight transportation,"
Transportation science, vol. 21, no. 4, pp. 227 -- 248, 1987.
[30] D. Bahdanau, P. Brakel, K. Xu, A. Goyal, R. Lowe, J. Pineau,
A. Courville, and Y. Bengio, "An actor-critic algorithm for se-
quence prediction," arXiv preprint arXiv:1607.07086, 2016.
[31] P. Sunehag, G. Lever, A. Gruslys, W. M. Czarnecki, V. Zambaldi,
M. Jaderberg, M. Lanctot, N. Sonnerat, J. Z. Leibo, K. Tuyls
et al., "Value-decomposition networks for cooperative multi-agent
learning," arXiv preprint arXiv:1706.05296, 2017.
[32] T. Rashid, M. Samvelyan, C. S. de Witt, G. Farquhar, J. Foerster,
and S. Whiteson, "Qmix: Monotonic value function factorisa-
tion for deep multi-agent reinforcement learning," arXiv preprint
arXiv:1803.11485, 2018.
[33] J. S. Dibangoye and O. Buffet, "Learning to act in decentralized
partially observable mdps," Ph.D. dissertation, INRIA Grenoble-
Rhone-Alpes-CHROMA Team; INRIA Nancy, ´equipe LARSEN,
2018.
[34] D.-A. Clevert, T. Unterthiner, and S. Hochreiter, "Fast and accurate
deep network learning by exponential linear units (elus)," arXiv
preprint arXiv:1511.07289, 2015.
[35] K. He, X. Zhang, S. Ren, and J. Sun, "Identity mappings in deep
residual networks," in ECCV. Springer, 2016, pp. 630 -- 645.
Kaixiang Lin received the B.S. degree from the
University of Science and Technology of China,
Hefei, China, in 2014, and is currently work-
ing toward the Ph.D. degree at Michigan State
University, East Lansing, MI, USA. His research
interests include machine learning, data mining
and reinforcement learning, with applications to
the large-scale traffic data and various domains.
Renyu Zhao received B.S. and M.E. degrees
from China Agriculture University, Beijing, China,
and Peking University, Beijing, China, in 2007
and 2013 respectively. He is a senior research
engineer in Didi AI Labs, Beijing, China. His
research interests include spatiotemporal data
mining, stochastic process, as well as spectral
graph theory, Bayesian analysis, etc.
Zhe Xu received the B.S. degree in informa-
tion engineering from Shanghai Jiao Tong Uni-
versity, Shanghai, China, in 2011. He received
the Ph.D. degree from the Institute of Image
Communication and Networking, Shanghai Jiao
Tong University, Shanghai, China, and Quantum
Computation and Intelligent Systems, University
of Technology, Sydney, N.S.W., Australia. His
research interests include computer vision, web
mining, machine learning, and multimedia anal-
ysis.
Jiayu Zhou received the Ph.D. degree in com-
puter science from Arizona State University,
Tempe, AZ, USA, in 2014. He is an Assistant
Professor with the Department of Computer Sci-
ence and Engineering at Michigan State Univer-
sity, East Lansing, MI, USA. His research inter-
ests include large-scale machine learning and
data mining, and biomedical
informatics. Prof.
Zhou served as Technical Program Committee
Member of premier conferences such as NIPS,
ICML, and SIGKDD. He was the recipient of
the Best Student Paper Award at the 2014 IEEE INTERNATIONAL
CONFERENCE ON DATA MINING (ICDM) and the Best Student Paper
Award at the 2016 International Symposium on Biomedical Imaging
(ISBI).
|
cs/0502081 | 1 | 0502 | 2005-02-20T09:08:03 | Tables, Memorized Semirings and Applications | [
"cs.MA",
"cs.DM"
] | We define and construct a new data structure, the tables, this structure generalizes the (finite) $k$-sets sets of Eilenberg \cite{Ei}, it is versatile (one can vary the letters, the words and the coefficients). We derive from this structure a new semiring (with several semiring structures) which can be applied to the needs of automatic processing multi-agents behaviour problems. The purpose of this account/paper is to present also the basic elements of this new structures from a combinatorial point of view. These structures present a bunch of properties. They will be endowed with several laws namely : Sum, Hadamard product, Cauchy product, Fuzzy operations (min, max, complemented product) Two groups of applications are presented. The first group is linked to the process of "forgetting" information in the tables. The second, linked to multi-agent systems, is announced by showing a methodology to manage emergent organization from individual behaviour models. | cs.MA | cs |
Tables, Memorized Semirings and Applications
Cyrille Bertelle ∗,
G´erard H. E. Duchamp †
and
Khalaf Khatatneh‡§
ßKeywords: Tables, k-subsets, efficient data
structures, efficient algebraic structures.
0
Introduction
The following is intended to be a contribution
in the area of what could be called efficient al-
gebraic structures or efficient data structures.
In fact, we define and construct a new data
structure, the tables, which are special kinds
of two-raws arrays. The first raw is filled with
words and the second with some coefficients.
This structure generalizes the (finite) k-sets
sets of Eilenberg [6], it is versatile (one can vary
the letters, the words and the coefficients), eas-
ily implemented and fast computable. Varying
the scalars and the operations on them, one can
obtain many different structures and, among
them, semirings. Examples will be provided
and worked out in full detail.
Here, we present a new semiring (with sev-
eral semiring structures) which can be applied
to the needs of automatic processing multi-
agents behaviour problems. The purpose of
this account/paper is to present also the basic
elements of this new structures from a com-
binatorial point of view. These structures
present a bunch of properties. They will be
endowed with several
laws namely : Sum,
Hadamard product, Cauchy product, Fuzzy op-
erations (min, max, complemented product)
Two groups of applications are presented.
The first group is linked to the process of "for-
getting" information in the tables and then
obtaining,
for instance, a memorized semir-
ing.The latter is specially suited to solve the
shortest path with addresses problem by re-
peated squaring over matrices with entries in
this semiring.
The second, linked to multi-agent systems, is
announced by showing a methodology to man-
age emergent organization from individual be-
haviour models.
∗LIH, Laboratoire d'Informatique du Havre, 25 rue Philippe Lebon, BP 540 76058 Le Havre cedex, France
†LIPN, Institut Galil´ee - Universit´e Paris XIII 99, avenue Jean-Baptiste Cl´ement, 93430 Villetaneuse, France
‡LIFAR, Facult´e des Sciences et des Techniques, 76821 Mont-Saint-Aignan Cedex, France
§[email protected], [email protected],
[email protected]
1
1 Description of
the data
structure
cients)of the table. The order of the columns
is not relevant. Thus, a table reads
1.1 Tables and operations on tables
The input alphabet being set by the automaton
under consideration, we will here rather focus
on the definition of semirings providing transi-
tion coefficients. For convenience, we first be-
gin with various laws on R+ := [0, +∞[ includ-
ing
1. + (ordinary sum)
2. × (ordinary product)
3. min (if over [0, 1], with neutral 1, oth-
erwise must be extended to [0, +∞] and
then, with neutral +∞) or max
4. +a defined by x +a y := loga(ax + ay)
(a > 0)
5. +[n] (Holder laws) defined by x +[n] y :=
n√xn + yn
6. +s (shifted sum, x +c y := x + y − 1, over
whole R, with neutral 1)
7. ×c (complemented product, x + y − xy,
can be extended also to whole R, stabi-
lizes the range of probabilities or fuzzy
[0, 1] and is distributive over the shifted
sum)
ßA table T is a two-rows array, the first row
being filled with words taken in a given free
monoid (see [4], [7] in this conference or [8]).
The set of words which are present in the first
row will be called the indices of the table (I(T ))
and for the second row the values or (coeffi-
(cid:26) indices set of words I(T )
bottom row V (T )
values
(1)
The laws defined on tables will be of two types:
pointwise type (subscript p) and convolution
type (subscript c).
Now, we can define the pointwise composition
(or product) of two tables, noted ∗p.
Let us consider, two tables T1, T2 and a law ∗
T1 =
u1 u2
p1
p2
and
T2 =
v1
q1
v2
q2
···
···
···
···
uk
pk
vl
ql
then T1∗pT2 is defined by Ti[w] if w ∈ I(Ti)
and w /∈ I(T3−i) and by T1[w] ∗ T2[w] if w ∈
I(T1) ∩ I(T2)
ßIn particular one has I(T1∗pT2) = I(T1) ∪
I(T2).
Note 1 i) At this stage one do no need any
neutral. The structure automatically creates it
(see algebraic remarks below for full explana-
tion).
ii) The above is a considerable generalization of
an idea appearing in [3], aimed only to semir-
ings with units.
ßFor convolution type, one needs two laws, say
⊕,⊗, the second being distributive over the
first, i.e. identically
x ⊗ (y ⊕ z) = (x ⊗ y) ⊕ (x ⊗ z) and
(y ⊕ z) ⊗ x = (y ⊗ x) ⊕ (z ⊗ x)
(2)
(see
http://mathworld.wolfram.com/
2
Semiring.html).
The set of indices of T1∗cT2 (I(T1∗cT2)) is the
concatenation of the two (finite) langages I(T1)
and I(T2) i.e. the (finite) set of words
I(T1)I(T2) = {uv}(u,v)∈I(T1)×I(T2).
(3)
then, for w ∈ I(T1)I(T2), one defines
T1 ⊗c T2[w] = Muv=w(cid:16)T1[u] ⊗ T2[v](cid:17)
(4)
the interesting fact is that the constructed
structure (call it T for tables) is then a semiring
(T ,⊕p,⊗c) (provided ⊕ is commutative and -
generally - without units, but this is sufficient
to perform matrix computations). There is, in
fact no mystery in the definition (3) above, as
every table can be decomposed in elementary
bits
T1 =
u1 u2
p2
p1
···
···
uk
pk
=
k
Mi=1
ui
pi
(5)
one has, thanks to distributivity, to understand
the convolution of these indecomposable ele-
ments, which is, this time, very natural
u1
p1 Oc
u2
p2
:=
u1u2
p1 × p2
(6)
1.2 Why semirings ?
In many applications, we have to compute the
weights of paths in some weighted graph (short-
est path problem, enumeration of paths, cost
computations, automata, transducers to cite
only a few) and the computation goes with two
main rules: multiplication in series (i.e. along a
path), and addition in parallel (if several paths
3
are involved).
This paragraph is devoted to showing that, un-
der these conditions, the axioms of Semirings
are by no means arbitrary and in fact unavoid-
able. A weighted graph is an oriented graph to-
gether with a weight mapping ω : A 7→ K from
the set of the arrows (A) to some set of coef-
ficients K, an arrow is drawn with its weight
(cost) above as follows a = q1
For such objects, one has the general conven-
tions of graph theory.
α→ q2.
• t(a) := q1 (tail)
• h(a) := q2 (head)
• w(a) := α (weight).
A path is a sequence of arrows c = a1a2 ··· an
such that h(ak) = t(ak+1) for 1 ≤ k ≤ n − 1.
The preceding functions are extended to paths
by t(c) = t(a1), h(c) = h(an), w(c) =
w(a1)w(a2)··· w(an) (product in the set of co-
efficients).
For example with a path of length 3 and (k =
N),
u = p 2→ q 3→ r 5→ s
(7)
one has t(u) = p, h(u) = s, w(u) = 30.
ßAs was stated above, the (total) weight of a
set of paths with the same head and tail is the
sum of the individual weights. For instance,
with
q1
q2
(8)
α→β
→
the weigth of this set of paths est α + β. From
the rule that the weights multiply in series and
add in parallel one can derive the necessity of
the axioms of the semirings. The following di-
agrams shows how this works.
Diagram
Identity
β
α→
→ q
→
q
γ
α
→
β
→
p
p
p α→ q
p
β
γ
→ r
→ r
β
→
→ r
γ
α
→
β
→
q
p α→ q
α + (β + γ) = (α + β) + γ
α + β = β + α
→ s α(βγ) = (αβ)γ
γ
(α + β)γ = αγ + βγ
α(β + γ) = αβ + αγ
these identities are familiar and bear the fol-
lowing names:
Line Name
I
II
III
IV
V
Associativity of +
Commutativity of +
Associativity of ×
Distributiveness (right) of × over +
Distributiveness (left) of × over +
1.3 Total mass
The total mass of a table is just the sum of the
coefficients in the bottom row. One can check
that
mass(T 1 ⊕ T 2) = mass(T 1) + mass(T 2);
mass(T 1 ⊗ T 2) = mass(T 1) · mass(T 2)(9)
this allows, if needed, stochastic conditions.
1.4 Algebraic remarks
We have confined in this paragraph some proofs
of structural properties concerning the tables.
The reader may skip this section with no seri-
ous harm.
First, we deal with structures with as little as
possible requirements, i.e. Magmas and Semir-
ings. For formal definitions, see
4
http://
encyclopedia.thefreedictionary.com/
Magma%20category
ßhttp://mathworld.wolfram.com/
Semiring.html
Proposition 1 (i) Let (S,∗) be a magma, Σ
an alphabet, and denote T [S] the set of tables
with indices in Σ∗ and values in S. Define ∗p
as in (1.1). Then
i) The law ∗ is associative (resp. commutative)
iff ∗ is. Moreover the magma (T [S], ∗) always
possesses a neutral, the empty table (i.e. with
an empty set of indices).
ii) If (K,⊕,⊗) is a semiring, then (TK,⊕,⊗)
is a semiring.
Proof. (Sketch) Let S(1) the magma with unit
built over (S ∪ {e}) by adjunction of a unit.
Then, to each table T , associate the (finite sup-
ported) function fT : Σ∗ 7→ S(1) defined by
fT (w) = (cid:26) T [w]
e
if w ∈ I(T )
otherwise
(10)
then, check that fT1∗pT2 = fT1∗1fT2 (where ∗1
is the standard law on S(Σ∗)
(1) ) and that the cor-
respondence is a isomorphism. Use a similar
technique for the point (ii) with K0,1 the semir-
ing with units constructed over K and show
that the correspondence is one-to-one and has
K0,1hΣi as image.
Note 2 1) Replacing Σ∗ by a simple set, the
(i) of proposition above can be extended with-
out modification (see also K-subsets in [6]).
2) If one replaces the elements of free monoid
on the top row by elements of a semigroup S
and admits some colums with a top empty cell,
we get the algebra of S(1).
3) Pointwise product can be considered as be-
ing constructed with respect to the (Hadamard)
coproduct c(w) = w ⊗ w whereas convolution is
w.r.t. the Cauchy coproduct
to such a table, one can associate
φ(T ) := [{u1, u2 ··· uk}, l1] in the memo-
rized semiring. It is easy to check that φ
transports the laws and the neutrals and
obtain the result.
c(w) = Xuv=w
u ⊗ v
(11)
(see [5]).
2 Applications
2.1 Specializations and images
1. Multiplicities,
Stochastic
and
Boolean. --
Whatever the multiplicities, one gets the
classical automata by emptying the al-
phabet (setting Σ = ∅). For stochastic,
one can use the total mass to pin up out-
going conditions.
2. Memorized Semiring. --
We explain here why the memorized
semiring, devised at first to perform ef-
ficient computations on the shortest path
problem with memory (of addresses) can
be considered as an image of a "table
semiring" (thus proving without compu-
tation the central property of [9]).
Let T be here the table semiring with co-
efficients in ([0, +∞], min, +). Then a ta-
ble
T =
u1
l1
···
···
uk
lk
···
···
un
ln
(12)
can be written so that l1 = ··· =
lk < lm for m > k (this amounts
to say that the set where the mini-
mum is reached is {u1, u2 ··· uk}). Then,
5
2.2 Application to evolutive systems
Tables are structured as semirings and are
flexible enough to recover and amplify the
structures of automata with multiplicities and
transducers. They give operational tools for
modelling agent behaviour for various simu-
lations in the domain of distributed artificial
intelligence [2]. The outputs of automata with
multiplicities or the values of tables allow to
modelize in some cases agent actions or in other
cases, probabilities on possible transitions be-
tween internal states of agents behaviour.
In
all cases, the algebraic structures associated
with automata outputs or tables values is very
interesting to define automatic computations in
respect with the evolution of agents behaviour
during simulation.
One of ours aims is to compute dynamic multi-
agent systems formations which emerge from a
simulation. The use of table operations deliv-
ers calculable automata aggregate formation.
Thus, when table values are probabilities, we
are able to obtain evolutions of these aggrega-
tions as adaptive systems do.
With the definition of adapted operators com-
ing from genetic algorithms, we are able to rep-
resent evolutive behaviors of agents and so evo-
lutive systems [1]. Thus, tables and memorized
semiring are promizing tools for this kind of
implementation which leads to model complex
systems in many domains.
References
[1] Bertelle C., Flouret M., Jay V., Olivier
D., Ponty J.-L., Genetic Algorithms on
Automata with Multiplicities for Adap-
tative Agent Behaviour in Emergent
Organisations.
[2] Bertelle C., Flouret M., Jay V., Olivier
D., Ponty J.-L., Automata with Multi-
plicities as Behaviour Model in Multi-
Agent Simulations SCI 2001.
[3] Champarnaud J.-M., Duchamp G.,
Derivatives of rational expressions
and related theorems, T.C.S. 313 31
(2004).
[4] Duchamp G., Hatem Hadj Kacem, ´Eric
Laugerotte, On the erasure of several
letter-transitions, JICCSE'04
[5] Duchamp G., Flouret M., Laugerotte
E., Luque J-G., Direct and dual
laws
for automata with multiplicites, Theo-
ret. Comput. Sci. 267 (2001) 105-120.
[6] Eilenberg S., Automata, languages and
machines, Vol A, Acad. Press (1974).
[7] Laugerotte E., Abbad H., Symbolic
computation on weighted automata,
JICCSE'04.
[8] Lothaire M., Combinatorics on words,
Cambridge University Press (new edi-
tion), 1997.
[9] Khatatneh K., Construction of a mem-
orized semiring, DEA ITA Memoir,
University of Rouen (2003).
6
|
1505.00956 | 2 | 1505 | 2015-06-02T17:30:59 | Informational parasites in code evolution | [
"cs.MA"
] | In a previous study, we considered an information-theoretic model of code evolution. In it, agents obtain information about their (common) environment by the perception of messages of other agents, which is determined by an interaction probability (the structure of the population). For an agent to understand another agent's messages, the former must either know the identity of the latter, or the code producing the messages must be universally interpretable. A universal code, however, introduces a vulnerability: a parasitic entity can take advantage of it. Here, we investigate this problem. In our specific setting, we consider a parasite to be an agent that tries to inflict as much damage as possible in the mutual understanding of the population (i.e. the parasite acts as a disinformation agent). We show that, after introducing a parasite in the population, the former adopts a code such that it captures the information about the environment that is missing in the population. Such agent would be of great value, but only if the rest of the population could understand its messages. However, it is of little use here, since the parasite utilises the most common messages in the population to express different concepts. Now we let the population respond by updating their codes such that, in this arms race, they again maximise their mutual understanding. As a result, there is a code drift in the population where the utilisation of the messages of the parasite is avoided. A consequence of this is that the information that the parasite possesses but the agents lack becomes understandable and readily available. | cs.MA | cs | Informational parasites in code evolution
Andr´es C. Burgos1 and Daniel Polani2
1,2Adaptive Systems Research Group, University of Hertfordshire, Hatfield, UK
[email protected]
5
1
0
2
n
u
J
2
]
A
M
.
s
c
[
2
v
6
5
9
0
0
.
5
0
5
1
:
v
i
X
r
a
Abstract
In a previous study, we considered an information-theoretic
model of code evolution. In this model, agents bet on (com-
mon) environmental conditions using their sensory informa-
tion as well as that obtained from messages of other agents,
which is determined by an interaction probability (the struc-
ture of the population). For an agent to understand another
agent's messages, the former must either know the identity of
the latter, or the code producing the messages must be univer-
sally interpretable.
A universal code, however, introduces a vulnerability: a para-
sitic entity can take advantage of it. Here, we investigate this
problem. In our specific setting, we consider a parasite to be
an agent that tries to inflict as much damage as possible in the
mutual understanding of the population (i.e. the parasite acts
as a disinformation agent). We show that, after introducing
a parasite in the population, the former adopts a code such
that it captures the information about the environment that is
missing in the population. Such an agent would be of great
value, but only if the rest of the population can understand
its messages. However, it is of little use here, since the para-
site utilises the most common messages in the population to
express different concepts.
Now we let the population respond by updating their codes
such that, in this arms race, they again maximise their mu-
tual understanding. As a result, there is a code drift in the
population where the utilisation of the messages of the para-
site is avoided. A consequence of this is that the information
that the parasite possesses but which the agents lack becomes
understandable and readily available.
Introduction
Codes shared among entities are ubiquitous in nature, not
only present in biological systems, but also, at the least, in
technological ones (Doyle, 2010). We define a code as a
probabilistic mapping from an "input" random variable (e.g.
environmental variable) to a set of outputs (e.g. messages).
A code, then, implies a representation of the input variable.
When representations are shared among entities, they be-
come conventions which are used for communication (Bur-
gos and Polani, 2014, 2015). The correct use of these con-
ventions for communicating can be interpreted as "honest
signalling". For instance, the TCP/IP protocol allows the in-
teraction of hardware and software in a code-based, "plug-
and-play" fashion, as long as they obey the protocol (Doyle,
2010). In biology, the genetic code acts as an innovation-
sharing protocol, one that allows the exchange of innova-
tions through horizontal gene transfer (HGT) (Woese, 2004).
However, communication protocols introduce vulnerabili-
ties: parasitic agents can take advantage of them (Ackley
and Littman, 1994; Doyle, 2010). For instance, the chem-
ical cues that ant colonies use to recognise nest-mates can
be mimicked by slave-making workers for social integration
(D'Ettorre et al., 2002). On the Internet, one can take advan-
tage of machine communication protocols (TCP/IP) to force
target computers to perform computations on behalf of a re-
mote node, in what is called "parasitic computing" (Barab´asi
et al., 2001).
Parasites benefit from their interaction with other agents,
while reducing the fitness of the attacked hosts. Never-
theless, parasites can be a positive force in evolution. For
instance, they can be generators of biodiversity, achieving
more resistance to future attacks (Brockhurst et al., 2004).
In an artificial setting, the presence of parasites was shown
to attain more efficient communication between agents of a
population, increasing their reproductive success (Robbins,
1994). Furthermore, some authors suggest that a healthy
ecosystem is one rich in parasites (Hudson et al., 2006).
In this work, we study this apparent contradiction from an
information-theoretic perspective.
We look at some aspects of the co-evolutionary arms race
between host and parasite. Particularly, we would like to
characterise informationally the behaviour of parasites and
the consequences for the host. For this purpose, we assume
a simple scenario where organisms seek to maximise their
long-term growth rate by following a bet-hedging strategy
(Seger and Brockmann, 1987). We know that maximising
their information about the environment achieves this (Shan-
non, 1948; Kelly, 1956). Then, individuals obtaining extra
environmental information from other individuals will have
an advantage over those that do not, since they would be
able to better predict the future environmental conditions
(Donaldson-Matasci et al., 2010). However, as we showed
in a previous work, for simple agents which do not have the
ability to identify who they are listening to, a shared code
among the population is necessary to interpret the transmit-
ted information and therefore improve predictions (Burgos
and Polani, 2014, 2015). Here, we keep this assumption
with respect to the agents, and we study the effects of in-
troducing a parasite in a population that previously evolved
its codes as well as its structure.
Model
In our previous model of code evolution (Burgos and Polani,
2014, 2015), the outputs or messages of an agent were pro-
duced according to a code, which was a conditional prob-
ability from sensor states to messages. The probability of
each sensor state of an agent conditioned on the environ-
mental variable µ was given. The information about the en-
vironment of each agent was obtained by considering the
mutual information between the environmental variable and
its sensor variable, together with the outputs of other agents.
These outputs would be perceived or not, according to the
structure of the population. The codes, as well as the pop-
ulation structure, were optimised in order to maximise what
was called the similarity of the codes (we will introduce a
more suitable term below) among the interacting agents of
the population.
Here, instead, we consider a simplified model where the
sensor states of an agent are the agent's messages, which
are represented by a random variable XΘ.
is,
p (XΘ µ, Θ = θ) gives the probability distribution of the
sensor states (and, simultaneously, the messages) of an agent
θ given the environmental conditions µ.
That
Agents perceive the sensor states (messages) of other agents
according to the structure of the population, which is given
by p(Θ, Θ(cid:48)). This joint probability induces a weighted
graph, where agents represent the nodes of the graph and
there is an edge from agent θ to an agent θ(cid:48) if p(θ, θ(cid:48)) > 0
(which is the weight of the edge). We interpret p(θ, θ(cid:48)) as the
probability of interaction between these two agents, and thus
we require that p(θ, θ(cid:48)) = p(θ(cid:48), θ) (interactions are symmet-
rical) and p(θ, θ) = 0 for every agent θ (self-interaction is
excluded).
We now consider a population of agents where interact-
ing agents maximise their mutual understanding. This is
XΘ
Θ
µ
Ξ
XΘ(cid:48)
Θ(cid:48)
Figure 1: Bayesian network representing the relation of the vari-
ables in the simplified model of code evolution. XΘ(cid:48) is an i.i.d
copy of XΘ. Θ and Θ(cid:48) selects agents from the same set, but their
probability distributions are not necessary the same. These two
variables depend on a common variable Ξ to model more general
interaction structures.
formally defined by I (XΘ ; XΘ(cid:48)), and, when this value
achieves its maximum, the mapping that results from the
agents' codes, p (XΘ XΘ(cid:48)), is deterministic. It is impor-
tant to note here that this model allows the agents to clus-
ter into different sub-populations due to differences in their
codes. Therefore, each sub-population could have its own
convention for representing different aspects about the envi-
ronment, and the conventions used can be as varied as possi-
ble, as long as the mapping p (XΘ XΘ(cid:48)) is universal among
all sub-populations.
For cases where the mutual understanding is locally optimal,
the codes of the agents are related to each other in one of two
possible manners: (a) within each sub-population, all agents
have the same code, and the mapping p (XΘ XΘ(cid:48)) is the
identity matrix; or (b) within each sub-population, there are
two types of agents (where the type is given by the agent's
code), and the interaction is only between agents of differ-
ent type. In this case, the graph induced by the interaction
probability is bipartite between the types.
For cases where an agent interacts with more than one type
of agent, then p (XΘ XΘ(cid:48)) will necessarily be probabilis-
tic, and thus the mutual understanding among the popu-
lation will decrease. We can measure the total amount
of information about the environment of an agent θ by
I (µ ; XΘ, XΘ(cid:48) Θ = θ). And, since the interaction prob-
ability is symmetric, the proposed measure for agent θ is
equal to I (µ ; XΘ, XΘ(cid:48) Θ(cid:48) = θ). Let us note that, when-
ever the mutual understanding of a population is optimal,
then the individuals that interact necessarily capture the
same aspects of the environment. Then, at the optimum
of mutual understanding in a population, agents do not in-
crease their information by reading other agent's messages,
although this indeed plays an important role in the evolution
of codes. Nevertheless, the ties that an agent establishes are
relevant for other purposes, which we study in the following
sections.
Informational parasitism
There are different ways to define an informational para-
site. Here, we adopt the model that characterises an infor-
mational parasite as an agent π that tries to minimise the
mutual understanding between the agents with whom it in-
teracts. An informationally antagonistic parasite is not typi-
cal for biology, as the parasite is concentrating at abusing the
host system for its own interest, but does not care about the
host except for avoiding detection. However, in the context
of social networks or news sources, such a parasite can be
considered a "troll" or a "disinformation" (FUD) agent who
has direct interest in damaging the mutual understanding of
the other agents of the population and/or their confidence in
their knowledge of the true state of the environment.
In our case, the parasite will choose its code in such a way
that the value I (XΘ ; XΘ(cid:48)) is minimised. This is an ex-
treme case of parasitism, where the parasite may kill its
host as a result of maximising damage. Usually, the known
parasites manipulate their hosts in order to benefit from
it, decreasing their fitness such that it would not kill them
(Schmid-Hempel, 1998). Although the defined type of par-
asite is not common in biology, it is still a possibility in the
range of behaviours that decrease fitness of the host while
increasing the attacker's fitness.
We now analyse the consequences of introducing a parasite
in a population for a few very simple, but illustrative, sce-
narios. First, let us define the following types of codes:
1 2
3 4
x2 x2
x1 x1
x1 x1
x2 x2
x1 x2
x1 x2
x2 x1
x2 x1
states of µ
type φ1
type φ2
type φ3
type of φ4
Figure 2: The left-most grid shows an illustration of the environ-
ment, although it does not denote its real structure. Then, each type
shows a partition of the environmental states induced by an agent's
code (codes here are deterministic). The types φ1 and φ2 capture
the first bit of µ. Types φ3 and φ4 capture the second bit of µ.
Let us analyse a few simple scenarios where a parasite at-
tacks a population. Let us assume that two (non-parasitic)
agents share the same code, for instance, agents θ1 and θ2
are of type φ1, and that these agents interact only with each
other (their mutual understanding is 1 bit). Now, if we min-
imise their mutual understanding by introducing a parasite
π, the optimal configuration is the following: the parasite
interacts with one agent only and the parasite's code is of
type φ2 (the "opposite" of type φ1). The mutual understand-
ing between all three agents now is zero. Let us note that, in
this case, the environmental information of each agent, be-
fore and after introducing the parasite, is 1 bit, which is the
amount of information each of them acquire through their
corresponding sensors.
Let us consider now a more interesting case:
two sub-
populations of two agents each, where agents only interact
with agents within the sub-population and where the codes
are the following: in the first sub-population, we have agents
θ1 and θ2 of code type φ1 (they capture the first bit of µ); and
in the second sub-population, we have agents θ3 and θ4 of
code type φ3 (they capture the second bit of µ). Now, when
we introduce a parasite, two configurations achieve zero mu-
tual understanding: in both, the parasite interacts with every
agent, but in the first one, it adopts the "opposite" code of
agents θ1 and θ2, which is code type φ2, while in the sec-
ond one, it adopts the "opposite" code of agents θ3 and θ4,
which is code type φ4. Here, in the first case, the environ-
mental information of agents θ3 and θ4 increases, since the
parasite conveys information captured by agents θ1 and θ2
(captured by the parasite through its "opposite" code) that
the former two agents do not possess. In the same way, for
the second configuration, agents θ1 and θ2 are benefited by
their interactions with the parasite, since here also, the para-
site conveys information they lack.
Methods
All optimisations were performed using a genetic algo-
rithm (GA). We utilised the C++ library GAlib v2.4.7 (Wall,
1996). The GA searches for a particular (possibly local)
optimum, and this optimum corresponds to an evolutionary
process that has converged. In order to accelerate computa-
tions, we assume the following: the probability distribution
over µ is uniform, the codes of all agents are determinis-
tic, and the interaction probability between any two agents
is given by one over the amount of interactions. To visu-
alise the evolution of the codes of the agents, we use the
method of multidimensional scaling provided by R version
2.14.1 (2011-12-22). This method takes as input the distance
matrix between codes, and plots them in a two-dimensional
space preserving the distances as well as possible.
Results
We study the introduction of a parasite in a population where
the mutual understanding was previously maximised. We
consider a population of 256 agents, in an environment with
16 equally likely states, where agents can encode the envi-
ronment using 16 different symbols. In this way, agents can
potentially capture by themselves all the information about
µ. As a result of the optimisation process, we obtained 5
sub-populations, where, in each of them, the induced inter-
action graph is bipartite. Therefore, there are 10 different
codes globally, two per sub-population. In Fig. 3 we show
the distance between the resulting codes, with point's size
proportional to the number of agents that adopted each code.
The distance used is the Jensen-Shannon divergence (see
(Burgos and Polani, 2014)). The average mutual understand-
ing in the population is I (XΘ ; XΘ(cid:48)) = 3.93 bits, which,
coincidentally, is also the mutual understanding within each
sub-population (this does not need to hold necessarily).
ery other agent is maximal (the distance is 4, the maximum
achievable with 16 states). The resulting average mutual un-
derstanding now is I (XΘ ; XΘ(cid:48)) = 2.55 bits (before the at-
tack, it was 3.93 bits), and the code of the parasite is shown
in Fig. 4.
1
5
9
2
6
3
7
10
11
13
14
15
4
8
12
16
x3
x3
x13
x3
x3
x3
x3
x3
x3
x12
x12
x3
x3
x12
x3
x16
(a) states of µ
(b) code of π
Figure 4: (a) Illustration of the environment µ, although the grid
does not denote its real structure. (b) Partition of the environmental
states induced by the code of the parasite π.
To understand the choice of code by the parasite, we anal-
yse the joint probability p(XΘ, XΘ(cid:48)) before introducing the
parasite in the population. Our results show that the parasite
encodes the environment through the messages that are most
commonly used among the population. In this case, the par-
asite chose 4 messages (x3, x12, x13 and x16), all of them
among the most popular in the population (see Fig. 5).
Figure 3: 2-dimensional plot of the distance between the codes:
each point represents a particular code, and its size is relative to the
number of agents adopting that particular code. The colour of the
points denotes the sub-population to which the codes belong.
Blending in with the crowd
We introduce now a parasite π in the population, and we let
it freely choose with whom it interacts, as well as its code
(the parasite is introduced before the optimisation process
begins, at generation 0). However, the parasite is allowed
to use 32 symbols to encode µ, instead of 16, as we did for
the rest of the agents. The reason for allowing a larger set
of symbols to the parasite is that, otherwise, we will be forc-
ing the parasite to use the symbols used by the population.
We allow the double amount of symbols to enable the para-
site to perfectly encode the environment while avoiding all
symbols already in use.
We found that after optimisation, the parasite interacts with
every agent of the population, and its code distance to ev-
Figure 5: Joint probability of messages p(XΘ, XΘ(cid:48) ) of the pop-
ulation before the parasitic attack. Values are normalised to the
maximum of all values, in this case p(x3, x(cid:48)
3) = 0.125. White
squares have probability zero.
l−1.5−1.0−0.50.00.51.01.5−1.5−1.0−0.50.00.51.01.5lllllllllllllllllllllllllllllllllllllllx01x02x03x04x05x06x07x08x09x010x011x012x013x014x015x016x1x2x3x4x5x6x7x8x9x10x11x12x13x14x15x16As a consequence of this antagonistic behaviour, the par-
asite blends in the population. This suggests that the par-
asite would try to avoid being identified by its messages.
Our model allows us to measure how "identifiable" agents
are by comparing the average joint messages. For instance,
this can be measured by the mutual information between the
agent selector and the joint messages, I (Θ XΘ, XΘ(cid:48)). For
a population with a universal code, this measure is zero, that
is, we cannot identify any agent. Here, we want to know
particularly how much we can identify the parasite by its
messages. Then, we can consider the following measure:
DKL (p(XΘ, XΘ(cid:48) Θ = π) p(XΘ, XΘ(cid:48)))
(1)
In Fig. 6, we show the values of Eq. 1 during the optimi-
sation process, which shows that the divergence diminishes
as the parasite minimises the mutual understanding of the
population.
(cid:1)
)
(cid:48)
Θ
X
,
Θ
X
(
p
)
π
=
Θ
(cid:48)
Θ
X
,
Θ
X
(
p
(cid:0)
L
K
D
3.6
3.5
3.4
3.3
3.2
3.1
3
2.9
0
10
20
30
generation
40
50
Figure 6: We measure how much we can identify the parasite
from its messages. As a consequence of maximising damage to
the population, the parasite blends in. The parasite is introduced at
generation 0.
Missing environmental aspects
However, it is not only a question of choosing common mes-
sages: they must not coincide with other agent's codes given
the environmental conditions.
In other words, these mes-
sages that are popular among the population will be used by
the parasite to express different aspects of µ. Otherwise, if
the parasite expresses overlapping aspects, then there might
be coincidences with one or more sub-population's adopted
conventions. Consequently, the parasite will capture miss-
ing aspects in the population. This can be measured by how
much information the code of the parasite adds about µ if
we look at the average messages. Formally,
I (µ ; XΘ(cid:48) XΘ, Θ(cid:48) = π)
(2)
2 is plotted in Fig.
through its sensors only,
The value of Eq.
7 dur-
ing the optimisation process.
After convergence, we
have that I (µ ; XΘ(cid:48) XΘ, Θ(cid:48) = π) = 1.30 bits, while
is
what the parasite acquires,
I (µ ; XΘ Θ = π) = 1.32 bits. That is, almost all the
information it captures is missing in the population. If we
consider the perceived information from µ together with the
environmental information provided by the population, the
parasite captures I (µ ; XΘ, XΘ(cid:48) Θ = π) = 4 bits, which
is the maximum possible, and this means that the parasite
always correctly predicts the environment.
)
)
π
=
(cid:48)
Θ
,
Θ
X
(cid:48)
Θ
X
;
µ
(
I
1.3
1.2
1.1
1
0.9
0.8
0
10
20
30
generation
40
50
Figure 7: Amount of information the parasite possesses that the
population lacks. The parasite is introduced at generation 0.
Robustness against parasites
After the parasitic attack, each sub-population has dimin-
ished its mutual understanding by different quantities. Al-
though the (former) sub-populations now share a common
agent (the parasite, and thus are not strictly speaking differ-
ent sub-populations), we maintain the colours used in Fig.
3 to identify them. In Table 8 we show a summary of the
outcome of the parasitic attack.
As Table 8 shows, in general, larger sub-populations are less
damaged by a parasitic intrusion. This phenomenon is due
to the large number of interactions among friendly agents,
which diminishes the influence of any single agent by con-
sidering the average of the perceived messages. The ex-
ception in the example is the second largest sub-population,
which becomes more damaged than the third largest sub-
population. The reason why we see this is that the former
Colour
Size
Sizes of types
I1
I2
I3
47
35
16
8
7
41, 6
33, 2
11, 5
5, 3
5, 2
3.93
2.85
3.59
3.93
2.15
3.05
3.93
2.54
3.33
3.93
2.16
2.98
3.93
1.83
2.65
113
95, 18
3.93
2.55
3.50
Figure 8: Summary of the parasitic attack for each sub-population.
The colours of each sub-population are the same as the ones in Fig.
3. I1 is the mutual understanding before the parasitic attack, I2 is
the mutual understanding after the parasitic attack, and I3 is the
mutual understanding after the population's response.
sub-population is highly unbalanced, having a small num-
ber of agents of one type. Then, agents of the most numer-
ous type interact only with a small number of agents, and
therefore are more vulnerable to malicious agents.
Another way in which a population can defend itself against
parasitic attacks is through diversification of their codes.
Particularly, agents can reduce damage by using synonyms
to express the same conditions. The presence of synonyms
presents an obstacle for the parasite: when trying to con-
fuse agents by expressing different conditions with a chosen
symbol, the meaning of the correspondent synonym is not
obfuscated.
We study this by comparing populations with different
amounts of code types, while maintaining the same popu-
lation structure. The setup is the following: the population
is well-mixed (every agent interacts with every other agent),
and first we randomly sample a code for every one of the
64 agents with symbols in the range [1, 16]. This population
has one type of code only, and the used sample has a mutual
understanding of 3.5 bits. Then, we produce a new popula-
tion by modifying the code of half of the agents, such that
p (x + 16 µ) := p (x µ) and then we set p (x µ) := 0
(here, x + 16 is a synonym of x). In this way, the mutual un-
derstanding remains the same for the modified population,
which now has two types. Each new type is introduced in a
similar fashion, always mapping the original code to a set of
(16) unused symbols.
We perform the minimisation of the mutual understanding
on each population by introducing a parasite until conver-
gence. We show in Fig. 9 the values of I(XΘ ; XΘ(cid:48))
during the optimisation process for each population. Our
results confirm our expectations: more diverse populations
are more resistant to parasitic attacks.
)
(cid:48)
Θ
X
;
Θ
X
(
I
3.5
3.45
3.4
3.35
3.3
3.25
3.2
1 type
2 types
4 types
8 types
0
50
100
150
200
generation
Figure 9: Mutual understanding of populations with varying
amounts of types of codes during optimisation. Populations with
more types of codes are more resistant to parasitic attacks. In all
cases, the parasite was introduced at generation 0.
Code diversification
Now we let the population respond to the parasitic attack.
If we let the rest of the agents respond to the parasite by
freely changing the structure of the population, then our sim-
ulations shows that the parasite becomes isolated from the
population, which is the expected outcome. However, we
consider here a scenario where the structure of the popula-
tion is maintained, and agents can only respond to the attack
by updating their codes. In the same way as we did with
the parasite, we allow the agents to choose from a larger set
of messages (we consider 32 symbols to give the option to
agents of changing completely their encoding of µ).
After convergence, the population's mutual understanding
recovered to a value of I (XΘ ; XΘ(cid:48)) = 3.50 bits (see Ta-
ble 8 for a summary). In response to the parasitic attack,
the agents of the population replaced, mostly, the symbols
utilised by the parasite with unused ones. In Fig. 10, we
can see how the joint probability p(XΘ, XΘ(cid:48)) changed after
the population's response. Here, the symbols present in the
parasite's code (x3, x12, x13 and x16) are mostly removed
from the population's codes.
Three important features follow from the population's re-
sponse: first, new code profiles are created in the population.
For instance, the orange, purple and green sub-populations
shown in Fig. 3 now consist of three types of codes (see
Fig. 11. Nevertheless, the bipartite property is kept, but,
instead, synonyms were adopted by one type in these sub-
populations. This is due to the large amount of symbols
available that, in the case they are not in use within the
agent's type, are detached from any meaning and thus would
not create confusion.
(a) after the parasitic attack.
(b) after the population's
response.
Figure 10: Joint probability of messages p(XΘ, XΘ(cid:48) ) (a) after the
parasitic attack and (b) after the population's response.
This can be appreciated in Fig. 12, where we represent the
code of an agent before and after the population's response
to the parasitic attack. This agent updated its code such that
most symbols used by the parasite are avoided (x3 and x12
are changed for x29 and x21, respectively). On the other
hand, x13 is kept. To check whether this is an optimal solu-
tion, we manually updated the code of all agents of the same
type, changing x13 with every other possible symbol. In-
deed, using this particular symbol occupied by the parasite
maximises the population's mutual understanding. The rea-
son for this is that, since all other symbols are occupied by
more than one agent, x13 is the one that confuses the popu-
lation the least.
Second, by drifting from the parasite's symbols, agents may
update their codes in such a way that, after the update, they
capture more environmental information. This is the case of
the type shown in Fig. 12: before the update, environmen-
tal states 9 and 16 (see Fig. 4a to locate these states) were
represented by x3, while after the update, these states are
distinguished from one another.
Third, and most important, the information that the parasite
offers can now be understood (although not entirely) by the
population: the missing information is mostly expressed us-
ing symbols that are not occupied any more by the agents of
the population. This cannot be shown in the example, since
changes in the agent's codes after the response to the attack
may result in an overlap with the information that the para-
site captures. However, we can manipulate the resulting con-
figuration after the parasitic attack to show that agents now
consider the information offered by the parasite. For each
agent that is not the parasite, we update its code such that
p (x + 16 µ) := p (x µ) and then we set p (x µ) := 0.
In this way, we make sure that all agents capture the same
aspects of µ as before the update, without interference (all
of the parasite's symbols are in the range [1, 16]).
Figure 11: 2-dimensional plot of the distance between the codes
after the population's response to the parasite attack. Each point
represents a particular code, and its size is relative to the number
of agents adopting that particular code. The colour of the points
denotes the sub-population to which the codes belong. The black
diamond represents the parasite's code.
Now, we measure the average environmental
informa-
tion before and after the change. Before, the value was
I (µ ; XΘ, XΘ(cid:48)) = 3.70 bits, and after, I (µ ; XΘ, XΘ(cid:48)) =
3.72 bits. The increase is small, but we are considering one
parasite only. If we introduce 8 parasites in the population,
then the increase in the average environmental information
is more significant: from 3.43 bits to 3.73 bits after updat-
ing the codes. It is worth noting that, if the parasites interact
between themselves, then they would try to capture not only
environmental information that is not present in the popula-
tion, but also that is not captured by the other parasites.
Discussion and conclusions
We have considered a scenario where a parasite is introduced
in a previously evolved population, and, after convergence,
we looked at the response of the population, in one step of
many in the co-evolutionary arms race. We considered one
step only since, in this setting where the agent's behaviours
are not unified, the arms race will cycle continuously.
Our model shows interesting behaviour consistent with em-
pirical observations. For instance, parasites are known to
mimic the chemical signatures utilised by the attacked host
(D'Ettorre et al., 2002; Lorenzi et al., 2014). In this way,
identification of the parasite by the population becomes
harder. We measured this property during the parasite's at-
tack, showing that as it increased damage in the mutual un-
derstanding of the population, it blended in. Additionally,
l−2−1012−2−1012llllllllllllllllllllllllllllllllllx15
x8
x5
x9
x3
x12
x15
x8
x6
x7
x2
x10
x13
x11
x4
x8
x1
x3
x5
x9
x29
x21
x6
x7
x2
x4
x8
x1
x10
x13
x11
x19
(a) before the parasitic attack
(b) after the parasitic attack
Figure 12: Partition of the environmental states induced by the
code of an agent (a) before, and (b) after the parasitic attack.
we showed that it becomes parasitically dependent on the
population, as most of the environmental information it uses
to predict the environment comes from the population.
We have also showed which properties a population may
have in order to be robust against parasitic attacks. For in-
stance, large populations are more resilient, since its numer-
ous members provide a solid standard from which pertur-
bations become less significant. Another way in which the
population becomes resilient is for the population's agents to
utilise synonyms. If the parasite intends to create confusion
among the population by using messages that have a differ-
ent meaning for the rest of the agents, then when synonyms
are present, then they do not present any ambiguities.
The presence of parasites in a population can be, in the
long term, a positive force (Hudson et al., 2006). For in-
stance, they increase the diversity of the population, which
in our scenario was manifested in the creation of new types
of codes by using synonyms. As we have seen, this makes
the population more robust to subsequent attacks in their co-
evolution. Second, parasites are able to capture information
about the environment which is not captured by any other
agent. Most of this information is not understandable by the
agents until they respond to the parasitic attack by drifting
their codes.
The code drift has two effects: first, it makes the parasite
easier to identify, since it is the only agent using a particu-
lar set of messages; and second, after the messages used by
the parasite are avoided, the parasite's information becomes
understandable for the whole population. Therefore, after
the population recovers from the attack, agents can improve
their predictions of the environment. The parasite, after the
population's response, can still perfectly predict the state of
the environment, but with one major drawback: it becomes
easily identifiable, and thus the population have the possi-
bility to take action (for instance, by avoiding interaction)
when a future attack begins.
References
Ackley, D. H. and Littman, M. L. (1994). Altruism in the evolution
of communication. In Artificial life IV, pages 40 -- 48.
Barab´asi, A.-L., Freeh, V. W., Jeong, H., and Brockman, J. B.
(2001). Parasitic computing. Nature, 412(6850):894 -- 897.
Brockhurst, M. a., Rainey, P. B., and Buckling, A. (2004). The ef-
fect of spatial heterogeneity and parasites on the evolution of
host diversity. Proceedings. Biological sciences / The Royal
Society, 271(April 2003):107 -- 111.
Burgos, A. C. and Polani, D. (2014). An informational study of
the evolution of codes in different population structures. In
ALIFE 14: The Fourteenth Conference on the Synthesis and
Simulation of Living Systems, volume 14, pages 352 -- 359.
Burgos, A. C. and Polani, D. (2015). An informational study of the
evolution of codes and of emerging concepts in population of
agents. Accepted to "Artificial Life".
D'Ettorre, P., Mondy, N., Lenoir, A., and Errard, C. (2002). Blend-
ing in with the crowd: social parasites integrate into their host
colonies using a flexible chemical signature. Proceedings. Bi-
ological sciences / The Royal Society, 269(1503):1911 -- 8.
Donaldson-Matasci, M. C., Bergstrom, C. T., and Lachmann, M.
(2010). The fitness value of information. Oikos, 119(2):219 --
230.
Doyle, J. C. (2010). The Architecture of Robust, Evolvable Net-
works. The Lee Center, pages 12 -- 14.
Hudson, P. J., Dobson, A. P., and Lafferty, K. D. (2006).
Is a
healthy ecosystem one that is rich in parasites? Trends in
Ecology and Evolution, 21(7):381 -- 385.
Kelly, J. (1956). A new interpretation of information rate. IEEE
Transactions on Information Theory, 2(3):185 -- 189.
Lorenzi, M. C., Azzani, L., and Bagn`eres, A. G. (2014). Evolu-
tionary consequences of deception: Complexity and informa-
tional content of colony signature are favored by social para-
sitism. Current Zoology, 60:137 -- 148.
Robbins, P. (1994). The effect of parasitism on the evolution of a
communication protocol an artificial life simulation. In Pro-
ceedings of the third international conference on Simulation
of adaptive behavior: from animals to animats 3: from ani-
mals to animats 3, pages 431 -- 437. MIT Press.
Schmid-Hempel, P. (1998). Parasites in social insects. Princeton
University Press.
Seger, J. and Brockmann, H. J. (1987). What is bet-hedging? Ox-
ford surveys in evolutionary biology.
Shannon, C. (1948). A mathematical theory of communication.
Bell Systems Technical Journal, 27:379 -- 423.
Wall, M. (1996). Galib: A c++ library of genetic algorithm compo-
nents. Mechanical Engineering Department, Massachusetts
Institute of Technology, 87:54.
Woese, C. R. (2004). A new biology for a new century. Microbiol-
ogy and Molecular Biology Reviews, 68(2):173 -- 186.
|
1909.09390 | 1 | 1909 | 2019-09-20T09:37:06 | SPSC: a new execution policy for exploring discrete-time stochastic simulations | [
"cs.MA",
"cs.PF"
] | In this paper, we introduce a new method called SPSC (Simulation, Partitioning, Selection, Cloning) to estimate efficiently the probability of possible solutions in stochastic simulations. This method can be applied to any type of simulation, however it is particularly suitable for multi-agent-based simulations (MABS). Therefore, its performance is evaluated on a well-known MABS and compared to the classical approach, i.e., Monte Carlo. | cs.MA | cs |
SPSC: a new execution policy for exploring
discrete-time stochastic simulations
Yu-Lin Huang, Gildas Morvan, Fr´ed´eric Pichon, and David Mercier
Univ. Artois, EA 3926, Laboratoire de G´enie Informatique et d'Automatique de
l'Artois (LGI2A), B´ethune, France.
{ylin.huang, firstname.lastname}@univ-artois.fr
Abstract. In this paper, we introduce a new method called SPSC (Sim-
ulation, Partitioning, Selection, Cloning) to estimate efficiently the prob-
ability of possible solutions in stochastic simulations. This method can
be applied to any type of simulation, however it is particularly suitable
for multi-agent-based simulations (MABS). Therefore, its performance
is evaluated on a well-known MABS and compared to the classical ap-
proach, i.e., Monte Carlo.
Keywords: stochastic simulation · multi-agent-based simulation · solu-
tion space exploration
1
Introduction
Multi-agent-based simulations (MABS) are widely used in various fields to study
complex systems [6]. Most of them are combined with stochasticity to represent
non fully controllable phenomena and use a discrete-time approach to facilitate
model construction. Such model can generally be described as taking some initial
conditions and some parameter set as inputs, in order to return outputs at each
time step (c.f. Figure 1).
Before running into exploration of the parameter set or the initial condition
space, we must first analyze outcomes from a fixed parameter set and initial
conditions. Let us denote a stochastic simulation outputs (called observables in
the following) at a final time step T as a random vector X T . Then a key question
to address is: what is the probability P(X T ∈ S) = θS of a specific solution S?
Initial conditions
Parameter set
Observables
Stochastic
Model
∆t
Fig. 1. Illustration of a discrete-time stochastic simulation
The classical method to handle this question is Monte Carlo simulation
(MC) [7]. It consists in simulating a number n of replications and building an
2
Y-L. Huang et al.
estimator θS of θS defined as:
n(cid:88)
i=1
θS =
1
n
1S (X i
T )
(1)
where 1S is the indicator function of the set S and X i
T the value of observables
in the ith replication. The issue with this approach is that for the estimator to
be good, the number n has generally to be large, as illustrated in Section 2.
Some methods have been developed to speed-up the computation of such
simulations, such as splitting [3] or polyagent [5]. However, they look for specific
solutions (rare or mean), assume a particular modeling approach (Markov chains
or agent-based) and require some low-level manipulations of the model.
In this paper, we propose a policy that simulates an authorized number N of
replications and is as generic as the MC approach yet provides a better estimator
when computational resources are limited (i.e. small N ).
The paper is organized as follows: Section 2 recalls and illustrates a stan-
dard approach to determine the required number of replications in Monte Carlo
simulation for a single observable. The design principles and the approach pro-
posed to answer the above-mentioned issues are presented in Section 3 and then
applied to a classical MABS in Section 4. Section 5 concludes the paper.
2 Monte Carlo simulation, how many replications?
We recall in this section a standard approach to determine the number n(XT,i) of
replications to obtain a good estimator θSi of the probability P(XT,i ∈ Si) = θSi
of some solution Si where XT,i is one observable of the vector X T . Suppose a
desired relative error for the estimator θSi at confidence level 1 − α :
P(
θSi − θSi
θSi
≤ ) ≥ 1 − α.
(2)
The minimal value for n(XT,i) to verify (2) can be determined by applying the
following algorithm [1, p. 449]:
T,i, . . . , X n0
1. Simulate n0 replications. (n0 observations X 1
T,i)
2. Compute
2 ) · si
Z1−( α
· X T,i
(3)
where Z1−(α/2) is the 100(1 − α/2) quantile of the normal distribution, si
stands for the sample standard deviation over the n0 observations and X T,i
is the sample mean value over the n0 observations. The conventional values
for n0, and α are respectively 150, 0.05 and 0.05.
n(XT,i) = (cid:100)(
)2(cid:101)
Afterward, we can then deduce the necessary number n satisfying every observ-
able as:
n = max
XT ,i∈XT
n(XT,i)
(4)
SPSC: A new execution policy for stochastic simulations
3
To illustrate this algorithm, let us take an academic example. We consider an
environment containing vegetation and 2 types of agents: preys consuming the
vegetation and predators hunting preys for food. Both preys and predators can
move without restriction in the environment. This model has been implemented
on the Similar platform [4] and is based on the NetLogo wolf sheep predation
model [8]. The set of observables here consists of the populations of different
species at each time step. The necessary number n for some arbitrarily chosen
parameter set and initial state of the simulation, using the conventional values
for n0, and α, is 3600 (c.f. Table 1). However, if we want a more precise estima-
tion, the necessary number n of replications increases drastically: for example,
considering a relative error = 0.005 yields a necessary number of replications
n = 7249285.
Table 1. Determination of the necessary number of replications for the prey predator
model implemented on the Similar platform. The parameters applied are n0 = 150,
= 0.05 and α = 0.05.
XT,i
si
X T,i
n(XT,i)
number of preys
number of predators
697.83
196.95
783.77
128.67
1219
3600
3 A new execution policy for stochastic simulations
In this section, we introduce a new execution policy for stochastic simulations
called SPSC (Simulation, Partitioning, Selection, Cloning). This approach relies
on a decomposition of the probability of interest that we explain first.
3.1 Decomposition of the probability of interest
The probability P(X T ∈ S) concerns the observables with respect to a specific
solution S at some final time step T . Thanks to the law of total probability,
considering some intermediate time step j before T , we can write
P(X T ∈ SX j ∈ Sj)P(X j ∈ Sj)
P(X T ∈ S) =
(5)
(cid:88)
Sj∈Pj
where Pj is a partition of the state space of the random vector X j.
More generally, considering all time steps before T , we can obtain the follow-
ing decomposition by assuming a discrete-time system where X i depends only
on X i−1:
4
Y-L. Huang et al.
P(X T ∈ S) =
T−1(cid:89)
i=0
(cid:88)
ST−1∈PT −1
...S1∈P1
P(X i+1 ∈ Si+1X i ∈ Si)
(6)
where Pi, i = 1, ..., T − 1, is a partition of the state space of X i, ST = S and
S0 is the initial state of the simulation.
3.2 SPSC: Simulation, Partitioning, Selection, Cloning
Inspired by the decomposition (6), we split the time interval [0, T ] into m pieces:
[t(0), t(1)], [t(1), t(2)], ..., [t(m−1), t(m)] where t(0) = 0 < t(1) < ... < t(m−1) <
t(m) = T . Then, for each interval [t(i), t(i+1)] the following steps are applied (c.f.
Figures 2 and 3):
Simulation Simulate N replications from t(i) to t(i+1), i ∈ {0, . . . , m − 1},
where N corresponds to the number of replications we authorize for the
simulation.
Partitioning At time t(i+1), form a partition of the space of observables of
these N replications. This can be done by applying a clustering algorithm.
Selection Choose one or multiple representative replications (which we call
delegates) from each partition and discard the other replications.
Cloning Clone the selected delegates to obtain N replications in total.
Initial states
enter
at time t(0)
CLONING
SIMULATION
exit
at time t(m)
Final states
loop from t(0) to t(m−1)
SELECTION
PARTITIONING
Fig. 2. SPSC process diagram
Once the iterations are finished, we have created for each t(i) a partition
P(i) for the state space of X t(i). For an element S(i) ∈ P(i) of the partition at
time step t(i), after the selection and cloning steps, it has ni cloned replications.
Besides, among these ni cloned replications, after evolving to the next time step
SPSC: A new execution policy for stochastic simulations
5
t(i+1), some of them (ni+1 replications) belong to some element S(i+1) ∈ P(i+1).
We propose to use the numbers ni and ni+1 to approximate the conditional
probability P(X t(i+1) ∈ S(i+1)X t(i) ∈ S(i)) by:
P (X t(i+1) ∈ S(i+1)X t(i) ∈ S(i)) =
ni+1
ni
(7)
Finally, we define an estimator θS for P(X T ∈ S) using a similar decomposition
as that of Equation (6), based on time steps t(i) and (7):
θS =
P (X t(i+1) ∈ S(i+1)X t(i) ∈ S(i))
(8)
(cid:88)
m−1(cid:89)
S(m−1)∈P(m−1)
i=0
...
S(1)∈P(1)
where S(m) = S and S(0) = S0.
First
replication
Cloning
and
Simulation
Partitioning
Selection
Cloning
and
Simulation
Partitioning
delegate
of S 1
(1)
delegate
of S 2
(1)
delegate
of S 3
(1)
delegate
of S 1
(2)
delegate
of S 3
(2)
delegate
of S 2
(2)
t(0)
t(1)
t(2)
Fig. 3. Illustration of the first and second iterations of SPSC, starting from a single
initial state.
3.3 Implementation
We describe here a simple implementation of SPSC used in the experiment in
Section 4:
Simulation No special action is taken in this step.
Partitioning N replications provide N instances of observables. To form a par-
tition in the space of observables, we can take advantage of existing unsuper-
vised learning algorithm which can separate instances by multiple subgroups.
The well-known clustering process kmeans has been chosen to fulfill the task.
The number of cluster k is preset to 15.
6
Y-L. Huang et al.
Selection From any element S(i) ∈ P(i) of an intermediate partition, we select
the replication which is the nearest to the center using euclidean distance on
the space of observables.
Cloning After partitioning and selection, k delegates are obtained to be cloned.
k (cid:99) times. If
To come back to N replications in total, we clone each delegate (cid:98) N
k does not divide N , we select randomly the remainder number N − k ∗(cid:98) N
k (cid:99)
of delegates to produce one more clone per selected delegate.
The time interval [0, T ] is homogeneously split into m = 5 pieces (i.e. ∀i ∈
{0, 1, . . . , 5}, t(i) = i × T
5 ).
4 Experiment
Let us take the prey predator model mentioned previously in Section 2 as an
example. As this model is well-known and well-studied, we can give some possible
solutions before launching simulations:
S1: Extinction of preys and predators, only vegetation remains.
S2: Predators go extinct, preys live without nature enemy's harass.
S3: All species survive and form a stable ecosystem.
Now the question is, for an arbitrary parameter set and initial condition, what
is the probability of these solutions at a given time step (e.g. T = 1000)? To
answer this question, the MC approach recalled in Section 2 is generally used.
In the following, we compare the performances of MC and SPSC. The valida-
tion is done by comparing the outputs of these methods with the same limited
number of replications N = 50. By repeating the simulations 1000 times, we
will be able to compare statistically the results obtained by MC and SPSC. Two
performance measures are considered here : 1) The detection rate of a specific
solution S. 2) The precision of the probability estimator for a specific solution.
Before evaluating these performance measures, we have done 30000 replications
using MC in order to provide reference values for the comparisons:
Pref (S1) ≈ 0.0065, Pref (S2) ≈ 0.0126, Pref (S3) ≈ 0.981
(9)
The detection rates obtained with MC and SPSC policies, i.e, the capacity
of identifying a specific solution, from N = 50 replications are summed up in
Table 2. The first three columns indicate the detection rate of single solutions and
the last column indicate the detection rate for the three solutions simultaneously.
We can then deduce that SPSC explores more efficiently the solution space.
To evaluate the precision of the probability estimator, the absolute error
between the probability estimator outcomes and the references is computed:
Err(Si) = P (Si) − Pref (Si).
(10)
Furthermore, to gain an entire vision on the three solutions simultaneously, we
consider also the mean of three solutions relative errors:
.
P (Si) − Pref (Si)
Err =
(cid:88)
1≤i≤3
Pref (Si)
(11)
SPSC: A new execution policy for stochastic simulations
7
Table 2. Detection rates obtained with MC and SPSC when launching 50 replications.
S1
MC 0.236
SPSC 0.332
S2
0.455
0.617
S3
1
1
S1, S2 and S3
0.102
0.203
Histograms of these errors for the policies SPSC and MC are shown in Fig. 4.
Fig. 4. Comparison of errors
We can notice that the distribution of errors are not normal nor symmetric.
Thus, to compare the errors from MC and SPSC policies, the Wilcoxon-Mann-
Whitney test is applied with the threshold α = 0.05. The test results are pre-
sented in Table 3 with p-value and alternative hypotheses, we can then conclude
that SPSC yields better probability estimates for each solution than MC.
Table 3. Hypothesis and p-value given by Wilcoxon-Mann-Whitney test.
Target solution Alternative hypotheses
p-value
Conclusion
S1
S2
S3
S1, S2 and S3
ErrSP SC < ErrM C
ErrSP SC < ErrM C
ErrSP SC < ErrM C
ErrSP SC < ErrM C
2.2e-16 ErrSP SC < ErrM C
3.163e-16 ErrSP SC < ErrM C
9.849e-09 ErrSP SC < ErrM C
2.2e-16 ErrSP SC < ErrM C
0.000.020.040.060.0802004006008001000SPSCS1absolute errors0.000.020.040.060.0802004006008001000S2absolute errors0.000.020.040.060.0802004006008001000S3absolute errors0123402004006008001000Meanrelative errors0.000.020.040.060.0802004006008001000MC0.000.020.040.060.08020040060080010000.000.020.040.060.080200400600800100001234020040060080010008
Y-L. Huang et al.
5 Conclusions and perspectives
We have introduced a generic policy called SPSC for executing stochastic simu-
lations that deals with the weakness of MC when the number of replications is
limited. It treats simulations as black boxes and therefore, does not rely upon a
priori knowledge. We have also presented a simple implementation of SPSC and
run it on a classic stochastic MABS model. By comparing the results obtained
with SPSC and with MC, we can conclude that SPSC gives a better solution
probability estimation and can reveal more different solutions than MC.
The first perspectives of this work are related to the impact of the parame-
ters (N , k, etc.), the partitioning algorithm as well as the selection and cloning
strategies on the performance. For instance, instead of having the same number
of clones for each delegate, we could clone more the delegates from small parti-
tions and less the delegates from large partitions. Theoretical properties of the
proposed solution as well as its interest for multimodal transport simulation will
also be investigated.
Moreover, since we deal with small sample size at each intermediate time
step, we could take advantage of modern tools [2] for statistical inference to
compute the estimator θS .
Acknowledgement
The ELSAT2020 project is co-financed by the European Union with the Euro-
pean Regional Development Fund, the French state and the Hauts de France
Region Council.
References
1. Banks, J., Carson II, J., Nelson, B., Nicol, D.: Discrete-event system simulation.
Pearson, 5th edn. (2010)
2. Kanjanatarakul, O., Denoeux, T., Sriboonchitta, S.: Prediction of future observa-
tions using belief functions: A likelihood-based approach. Int J Approx Reason 72,
71 -- 94 (2016)
3. L'Ecuyer, P., Le Gland, F., Lezaud, P., Tuffin, B.: Rare Event Simulation using
Monte Carlo Methods, chap. Splitting Techniques. Wiley (2009)
4. Morvan, G., Kubera, Y.: On time and consistency in multi-agent-based simulations.
CoRR arXiv:1703.02399 (2017)
5. Parunak, H.: Pheromones, probabilities and multiple futures. In: Multi-Agent-Based
Simulation XI, LNCS, vol. 6532, pp. 44 -- 60. Springer (2011)
6. Railsback, S., Grimm, V.: Agent-Based and Individual-Based Modeling: A Practical
Introduction. Princeton University Press (2011)
7. Rubinstein, R.Y., Kroese, D.P.: Simulation and the Monte Carlo method. John
Wiley & Sons, third edn. (2016)
8. Wilensky, U.: NetLogo wolf sheep predation model. http://ccl.northwestern.
edu/netlogo/models/WolfSheepPredation, Center for Connected Learning and
Computer-Based Modeling, Northwestern University. Evanston, IL. (1997)
|
1901.00441 | 1 | 1901 | 2018-12-07T18:10:11 | Hierarchical Fuzzy Opinion Networks: Top-Down for Social Organizations and Bottom-Up for Election | [
"cs.MA",
"cs.SI",
"eess.SY"
] | A fuzzy opinion is a Gaussian fuzzy set with the center representing the opinion and the standard deviation representing the uncertainty about the opinion, and a fuzzy opinion network is a connection of a number of fuzzy opinions in a structured way. In this paper, we propose: (a) a top-down hierarchical fuzzy opinion network to model how the opinion of a top leader is penetrated into the members in social organizations, and (b) a bottom-up fuzzy opinion network to model how the opinions of a large number of agents are agglomerated layer-by-layer into a consensus or a few opinions in the social processes such as an election. For the top-down hierarchical fuzzy opinion network, we prove that the opinions of all the agents converge to the leaders opinion, but the uncertainties of the agents in different groups are generally converging to different values. We demonstrate that the speed of convergence is greatly improved by organizing the agents in a hierarchical structure of small groups. For the bottom-up hierarchical fuzzy opinion network, we simulate how a wide spectrum of opinions are negotiating and summarizing with each other in a layer-by-layer fashion in some typical situations. | cs.MA | cs | 1
Hierarchical Fuzzy Opinion Networks:
Top-Down for Social Organizations and
Bottom-Up for Election
Li-Xin Wang
Abstract -- A fuzzy opinion is a Gaussian fuzzy set with the
center representing the opinion and the standard deviation
representing the uncertainty about the opinion, and a fuzzy
opinion network is a connection of a number of fuzzy opinions in a
structured way. In this paper, we propose: (a) a top-down
hierarchical fuzzy opinion network to model how the opinion of a
top leader is penetrated into the members in social organizations,
and (b) a bottom-up fuzzy opinion network to model how the
opinions of a
large number of agents are agglomerated
layer-by-layer into a consensus or a few opinions in the social
processes such as an election. For the top-down hierarchical fuzzy
opinion network, we prove that the opinions of all the agents
converge to the leader's opinion, but the uncertainties of the
agents in different groups are generally converging to different
values. We demonstrate that the speed of convergence is greatly
improved by organizing the agents in a hierarchical structure of
small groups. For the bottom-up hierarchical fuzzy opinion
network, we simulate how a wide spectrum of opinions are
negotiating and summarizing with each other in a layer-by-layer
fashion in some typical situations.
Index Terms -- Opinion dynamics; social hierarchy; fuzzy
opinion networks.
I. INTRODUCTION
Hierarchy is the most popular structure in social organizations
such as government, army, company, etc. [1,2,3]. In a company,
for example, it is typically structured with a relatively small top
management team, at least one layer of middle management,
and a large number of lower level employees responsible for
day-to-day operations [4]. Why is hierarchy so pervasive in
human societies across almost all cultures throughout time [5],
giving the fact that hierarchy is in direct opposition to some of
the best ideas humanity has produced such as democracy,
equality, fairness, and justice [1] ? The interdisciplinary
research on social hierarchy in sociology [6,7], psychology
[8,9], management [10], economics [11], and other disciplines
suggest a number of reasons. First, hierarchy establishes social
order that is appealing psychologically to individuals who need
Li-Xin Wang is with the University of Chinese Academy of Sciences,
Beijing, P.R. China (e-mail: [email protected]).
safety and stability (people come and go, but the system
remains). Second, hierarchy provides incentives for individuals
in organizations to work hard to obtain higher rank to satisfy
material self-interest and their need for control that in turn
serves the organization's interests (motivating the individuals
to work hard for the organization). Third, hierarchy facilitates
coordination and improves efficiency in comparison to other
more egalitarian structures such as free markets (the rapid
development of China's "state capitalism" economy in recent
years is an example, which has led to the deglobalization
movement in the "laisser-faire capitalism" economies to
reestablish the hierarchy). Fourth, hierarchical differentiation
between people fosters more satisfying working relationships
(leaders provide the guidance their followers need, and
followers execute what the leaders want to be realized).
Although hierarchy has been studied in social sciences for a
long time (back to Marx and Engels [12] in 1846), the research
is largely qualitative without mathematical modeling. Usually,
some concepts or variables are defined verbally, then a theory is
developed that describes the relationships among these
variables using natural languages rather than mathematical
equations [13]. The most mathematically advanced study
related to social hierarchy is perhaps the multidisciplinary field
of opinion dynamics where the researchers from mathematical
sociology [14], economics [15,16], physics [17,18], social
psychology [19], control [20], signal processing [21], fuzzy
systems [22], etc., join forces to tackle the problem. A
shortcoming of the mainstream opinion dynamics models
[23,24] is that the uncertainties of the opinions are not included
in the models. Human opinions are inherently uncertain so that
an opinion and
its uncertainty should be considered
simultaneously to give the accurate picture of the opinion. For
example, when we are asked to review a research paper, we
need to give an overall rating for the paper and, at the same time,
we must claim our level of expertise on the subject which is a
measure of uncertainty about the overall rating. In fact, the
uncertainty may be more important than the opinion itself in
many situations, because the uncertainty is more directly
related to the psychological pressure of the agent when the
opinion is broadcasted [25].
2
The fuzzy opinion networks (FONs) proposed in [22] model
an opinion by a Gaussian fuzzy set whose center and standard
deviation represent the opinion and its uncertainty, respectively,
so that the interactions between the opinions and their
uncertainties are systematically exploited. The goal of this
paper is to use the FON framework to model social hierarchy.
According to [2], social hierarchies can be classified into two
types: i) formal hierarchies that are delineated by rule and
consensually agreed upon, and ii) informal hierarchies that are
established and subjectively understood during the interaction
among social members. Formal hierarchies are top-down -- a
hierarchical structure is designed first and members at different
levels are then recruited; informal hierarchies are bottom-up -- a
hierarchical structure emerges after the free interaction among
the community members. We will use fuzzy opinion networks
to model both formal and informal hierarchies. To model the
formal hierarchy, we first define a basic leader-follow group of
fuzzy agents and study its basic convergence properties, then
we connect the basic leader-follower groups in a hierarchical
fashion to get the final hierarchical fuzzy opinion network. To
model an informal hierarchy, we let a large number of fuzzy
agents to interact with each other based on a local reference
scheme, and we see the initially very diversified opinions are
merging gradually in a hierarchical fashion into a consensus or
a number of representative opinions -- a process very similar to
an election in a democratic society.
This paper is organized as follows. In Section II, the
top-down hierarchical fuzzy opinion networks are constructed
and their convergence properties are proved. We also show that
the speed of convergence to the top leader's opinion is greatly
improved by organizing the followers into a hierarchical
structure rather than in a flat nonhierarchical fashion. In Section
III, we construct the bottom-up hierarchical fuzzy opinion
networks through the natural process of free interacting among
a large number of fuzzy agents based on the local reference
scheme, and we simulate a number of typical scenarios --
consensus reaching, polarization, or converging to multiple
ends. Finally, Section IV concludes the paper and the Appendix
contains the proofs of the theorems in the paper.
II. TOP-DOWN HIERARCHICAL FUZZY OPINION NETWORKS
We start with the definition of fuzzy opinion networks (FON)
and bounded confidence FONs1, and then introduce the basic
leader-follower group which is the basic building block of the
top-down hierarchical fuzzy opinion networks.
Definition 1: A fuzzy opinion is a Gaussian fuzzy set with
membership function
where the center
represents the opinion and the standard deviation
characterizes the uncertainty about the opinion . A Fuzzy
1 The concept of FON was introduced in [22] and the basic convergence
properties of bounded confidence FONs were studied in [26].
Opinion Network (FON) is a connection of a number of
Gaussian nodes, where a Gaussian node is a 2-input-1-output
fuzzy opinion
function
with Gaussian membership
whose center and standard deviation
are two input fuzzy sets to the node and the fuzzy set itself is
the output of the node. A Gaussian node is also called an agent,
a node, or a fuzzy node throughout this paper.
The connection of the fuzzy nodes can be static or
dynamically changing with time and the status of the nodes.
The bounded confidence fuzzy opinion networks, defined
below, are FONs with connections that are dynamically
changing according to the states of the nodes -- if the fuzzy
opinions of two nodes are close enough to each other, they are
connected; otherwise, they are disconnected.
Definition 2: A bounded confidence fuzzy opinion network
(BCFON) is a dynamic connection of n fuzzy nodes
( ) with membership functions
, where the center input and the standard
deviation input to node at time ( )
are determined as follows: the center input is a
weighted average of the outputs of the n fuzzy nodes at
the previous time point :
with the weights
where ( ) is the collection of nodes that are
connected to node at time t, defined as:
where represents the closeness between
fuzzy opinions and , are constants and
denotes the number of elements in ; and, the
standard deviation input are determined according to
one of the two schemes:
(a) Local reference scheme:
(b) External reference scheme:
where denotes the center of fuzzy set , is an
external signal and is a positive scaling constant. The initial
fuzzy opinions ( ) are Gaussian fuzzy sets
3
Fig. 1:The basic leader-follower group, where the leader passes his opinion to each of the n followers who are connected among
themselves in the bounded confidence fashion.
the initial uncertainties are given.
, where the initial opinions and
It was proved in [26] that the opinions and their
uncertainties of the Gaussian nodes in the BCFON
are evolving according to the following dynamic equations.
The Evolution of BCFON: The fuzzy opinions
( ; ) in the BCFON are Gaussian fuzzy
sets:
where the opinions and their uncertainties
are evolving according to the following dynamic equations:
and the uncertainty input
for local reference scheme, or
for external reference scheme with initial condition
(initial opinion of agent ) and (uncertainty
about the initial opinion), where , are
constants.
where the weights
We now define the basic leader-follower group which is the
basic building block of the top-down hierarchical fuzzy opinion
networks of this paper.
Definition 3: A basic leader-follower group (BLFG),
illustrated in Fig. 1, consists of a leader node with
and n follower
membership function
nodes ( ) with membership functions
, where the leader node passes his
opinion to each of the n follower nodes and the n
follower nodes are connected among themselves in the
bounded confidence fashion. Specifically, the leader's opinion
and its uncertainty are not influenced by the n
followers, and the opinions and their uncertainties
of the n followers are evolving according to the following
dynamic equations:
where is given in (10) with , and the
uncertainty input is chosen either with the local
reference scheme (11), or with the leader reference scheme:
We see from (13) that the opinion of follower i is updated
as the average of the neighbor's opinions
plus
the leader's opinion . For the uncertainty of follower i,
we see from (14) that it is updated as the average of the
neighbor's uncertainties
plus
the
uncertainty input which takes either the local
reference scheme (11) or the leader reference scheme (15). In
the local reference scheme, agent i views the average of his
neighbor's opinions as the reference, so the closer his opinion is
22()()ennxxtt2323()()exxtt2222()()exxtt2121()()exxtt22()()eaaxxttFollowersLeader()axt()axt()axt()axt
4
Fig. 2: A simulation run of the basic leader-follower group with local
reference scheme, where the top and bottom sub-figures plot the
opinions and the uncertainties of the n=156 followers,
respectively; the leader's opinion .
to this average, the less uncertainty he has. In the leader
reference scheme, however, agent i views the leader's opinion
as the reference, so the closer his opinion is to the leader's
opinion , the less uncertainty he has.
To get a feel of the dynamics of the opinions and their
uncertainties of the agents in the basic leader-follower group,
let's see an example.
Example 1: Consider the basic leader-follower group of Fig.
1 with followers. With , , the
leader's opinion and the initial ( )
uniformly distributed over the interval [5,25] (
) and their uncertainties for all
, Fig. 2 and Fig. 3 show the simulation runs of the
dynamic model with local reference scheme (11) and leader
reference scheme (15), respectively, where the top sub-figures
of Figs. 2 and 3 plot the opinions of the
followers and the bottom sub-figures plot the uncertainties
.
We see from Figs. 2 and 3 that for both the local and leader
reference schemes, the opinions of all the followers
converge to the leader's opinion , but the speed of
convergence is slow. In the following theorem, we prove that
convergence to the leader's opinion is indeed guaranteed, but
the speed of convergence is greatly influenced by the number of
followers in the group.
Theorem 1: Consider the basic leader-follower dynamics of
(13), (14) and (10) with local reference scheme (11) or leader
reference scheme (15), and suppose the leader's opinion
is a constant. Starting from arbitrary initial
opinions and uncertainties ,
we have:
Fig. 3: A simulation run of the basic leader-follower group with leader
reference scheme, where the top and bottom sub-figures plot the
opinions and the uncertainties of the n=156 followers,
respectively; the leader's opinion .
(a) the followers converge to a consensus in finite time, i.e.,
there exists such that and for all
and all ;
(b) the opinion consensus converges to the leader's
opinion according to
where ;
(c) for local reference scheme (11), the uncertainty
consensus (a constant) for all ;
(d) for leader reference scheme (15), the uncertainty
consensus is changing according to
for , from which we get
.
The proof of Theorem 1 is given in the Appendix.
From (16) in Theorem 1 we see that the opinion consensus
converges to the leader's opinion with the factor
,
i.e., the error is reduced by
each time step, so in
k time steps the error is reduced by
which gives
With (reduce to error to 1%), Fig. 4 plots the k as
function of n, from which we see that the steps needed to reduce
the error increases about linearly with the number of followers
020406080100120140160510152025Opinions of the n=156 followers with local reference scheme; the leader opinion xa=10topinions0204060801001201401600.99511.0051.011.0151.021.0251.031.035Uncertainties of the n=156 followers with local reference schemetuncertainties020406080100120140160510152025Opinions of the n=156 followers with leader reference scheme; the leader opinion xa=10topinions02040608010012014016011.522.533.544.5Uncertainties of the n=156 followers with leader reference schemetuncertainties
5
, Figs. 7 and 8 show the
all their uncertainties
simulation runs of the dynamic model with local reference
scheme (11) and leader reference scheme (15), respectively,
where the top sub-figures of Figs. 7 and 8 plot the opinions
of the agents in Levels 1 and 2 and the bottom
sub-figures plot the corresponding uncertainties
.
Similarly, in the 4-level TD-HFON (right in Fig. 6), Level-1
consists of 25 groups with 5 agents in each group, Level-2
consists of 5 groups with 5 agents in each group and these 25
agents are the leaders of the 25 groups in Level-1, Level-3
consists of a single group of 5 agents who are the leaders of the
5 groups in Level-2, and Level-4 is the top leader who is the
leader of the 5-agent group in Level-3. With ,
, the top leader's opinion and the initial
(
opinions of the 5 agents in a group
)
uniformly distributed over the interval [5,25] (
) and all their uncertainties
,
Figs. 9 and 10 show the simulation runs of the dynamic model
with local reference scheme (11) and leader reference scheme
(15), respectively, where the top sub-figures of Figs. 9 and 10
of the agents in Levels 1, 2
plot the opinions
and 3 and the bottom sub-figures plot the corresponding
uncertainties
.
Comparing Fig. 2 and 3 with Figs. 7-10, we have the
following observations:
(a) The opinions
of all the agents converge to the
the agents are organized
leader's opinion no matter
hierarchically in small groups or in one large group.
(b) The speed of convergence to the leader's opinion is
greatly improved when the agents are organized hierarchically
in small groups; the more the levels or the smaller the groups,
the faster the convergence will be (comparing the top
sub-figures of Figs. 2, 7 and 9 for the local reference scheme,
and the top sub-figures of Figs. 3, 8 and 10 for the leader
reference scheme).
(c) Although the opinions
of all the agents converge to
in general
the leader's opinion, their uncertainties
converge to different values for agents in different groups,
reflecting the different processes that the agents in different
groups were experiencing during the convergence to the
leader's opinion.
Indeed, we will prove in the following theorem that the
observations above are true in general.
Fig. 4: Plot of (18), the steps k needed to reduce the error to
1% as function of number of followers n in group.
in the group, meaning that larger groups are more difficult to
converge to the leader's opinion than smaller groups.
The conclusion from (18) and Fig. 4 is that to speed up the
convergence of the followers' opinions to the leader's opinion,
reducing the size of the group is crucial. Organizing the
followers hierarchically in smaller groups, as we will do next
through the top-down hierarchical fuzzy opinion networks, is
an efficient way to speed up the convergence.
We now introduce the top-down hierarchical fuzzy opinion
networks.
Definition 4: A top-down hierarchical fuzzy opinion
network (TD-HFON), illustrated in Fig. 5, is constructed from a
number of basic leader-follower groups of Fig. 1 in a
in Level l is a follower
multi-layer structure, where an agent
to an agent in Level l+1 and is a leader to some agents in Level
, l is the level index ( ), i is
l-1. In the notation
the group index ( ), j is the index in the group
is a Gaussian fuzzy set with center
(
and standard deviation
To see how fast the hierarchical structure can speed up the
convergence to the leader's opinion, we reorganize the n=156
followers in Example 1 into a 3-level and a 4-level TD-HFONs
in the following example.
), and
.
Example 2: Consider the 3-level and 4-level TD-HFONs in
Fig. 6. In the 3-level TD-HFON (left in Fig. 6), Level-1 consists
of 12 groups with 12 agents in each group, Level-2 consists of a
single group of 12 agents with each agent being the leader of
one the 12 groups in Level-1, and Level-3 is the top leader who
is the leader of the 12-agent group in Level-2. With ,
, the top leader's opinion and the initial
(
opinions of the 12 agents in a group
) uniformly distributed over
the interval [5,25] (
) and
02040608010012014016018020001002003004005006007008009001000Steps needed to reduce error to 1% as function of follower numbernumber of followers n in a groupsteps needed to reduce the error to 1%
6
Fig. 5:The top-down hierarchical fuzzy opinion networks.
Fig. 6: Reorganizing the agents in Example 1 into a 3-level TD-HFON with 12 followers in each group (left) and a 4-level TD-HFON with
5 followers in each group (right).
11XlLevel 1Level L (Top Leader)Level 3Level 23Xlln2Xlln1Xlln22Xl21Xl13Xl12XlLevel lLevel l+1Level L-122()()eaaxxtt()axt()axt()axt()axt11()lxt3()llnxt2()llnxt1()llnxt22()lxt21()lxt13()lxt12()lxt11XL11XLLn13XL12XL11()Lxt11()LLnxt12()Lxt13()Lxt111Xl112Xl111()lxt112()lxt111()lxt112()lxtLevel 1Level 3Level 212 agents12 agents12 agents12 agents5 agents5 agents5 agents5 agents5 agents5 agents25 agents in 5 groups5 agentsLevel 4156 agents in a 3-level TD-HFON with 12 followers each group155 agents in a 4-level TD-HFON with 5 followers each group
7
Fig. 7: The opinions (top) and their uncertainties (bottom) of the
n=156 agents in the 3-level TD-HFON of Fig. 6 with local reference
scheme.
Fig. 9: The opinions (top) and their uncertainties (bottom) of the
n=155 agents in the 4-level TD-HFON of Fig. 6 with local reference
scheme.
Fig. 8: The opinions (top) and their uncertainties (bottom) of the
n=156 agents in the 3-level TD-HFON of Fig. 6 with leader reference
scheme.
Fig. 10: The opinions (top) and their uncertainties (bottom) of the
n=155 agents in the 4-level TD-HFON of Fig. 6 with leader reference
scheme.
Theorem 2: Consider the general TD-HFON in Fig. 5 with
dynamics of all the groups following (13), (14) and (10) with
local reference scheme (11) or leader reference scheme (15),
and suppose the top leader's opinion is a constant.
and
Starting from arbitrary
uncertainties
, we have:
initial opinions
(a) the opinions
opinion ;
of all the agents (
) converge to the leader's
(b) the uncertainties
of the followers in the same
leader-follower group converge to a constant, but different
groups in general converge to different values.
The proof of Theorem 2 is given in the Appendix.
We now move to the next section to study the bottom-up
hierarchical fuzzy opinion networks.
III. BOTTOM-UP HIERARCHICAL FUZZY OPINION NETWORKS
As we discussed in the Introduction that although social
hierarchy is prevalent throughout culture and time, hierarchy is
against some of the best values of humanity -- hierarchy is
undemocratic, unequal, unfair, and unjust. So, if we have to
choose hierarchy to govern a large population such as a nation,
we should have some counter measures to prevent those in the
higher levels to abuse their power. Election by the general
public is the way of choice of most countries in the world to
select their top leaders. In the election scenario, the opinions of
the large population are initially very diversified and many
small leaders are emerging to represent different interest groups,
then these small leaders have to compromise with each other to
select
this process continues
level-by-level in a bottom-up fashion until some consensuses
are reached. We now propose the bottom-up hierarchical fuzzy
opinion networks to model such processes.
the middle-level
leaders,
0102030405060708090100510152025Opinions of the n=156 agents in 3-level TD-HFON with local reference scheme; the leader opinion xa=10topinions010203040506070809010011.0051.011.0151.021.025Uncertainties of the n=156 agents in 3-level TD-HFON with local reference schemetuncertainties0102030405060708090100510152025Opinions of the n=156 agents in 3-level TD-HFON with leader reference scheme; the leader opinion xa=10topinions010203040506070809010011.11.21.31.41.51.61.71.8Uncertainties of the n=156 agents in 3-level TD-HFON with leader reference schemetuncertainties0102030405060708090100510152025Opinions of the n=155 agents in 4-level TD-HFON with local reference scheme; the leader opinion xa=10topinions010203040506070809010011.051.11.15Uncertainties of the n=155 agents in 4-level TD-HFON with local reference schemetuncertainties0102030405060708090100510152025Opinions of the n=155 agents in 4-level TD-HFON with leader reference scheme; the leader opinion xa=10topinions010203040506070809010011.11.21.31.41.5Uncertainties of the n=155 agents in 4-level TD-HFON with leader reference schemetuncertainties
8
Fig. 11:The bottom-up hierarchical fuzzy opinion networks.
Definition 5: A bottom-up hierarchical fuzzy opinion
network (BU-HFON), illustrated in Fig. 11, is the layered
connection of a number of bounded confidence fuzzy opinion
networks (BCFON) with local reference scheme (Definition 2),
where the converged opinions of a lower level BCFON are
passed to the upper level BCFON as the initial opinions.
We now simulate the BU-HFON to see how the initial fuzzy
opinions are agglomerated layer-by-layer in some typical
situations.
Example 3: Consider a 5-level BU-HFON of Fig. 11 (L=5)
with agents in Level 1 whose initial opinions
(i=1,2, …, n) are randomly
and initial uncertainties
distributed over the intervals [5,25] and (0,1), respectively. The
five BCFONs in the five levels are evolving according to the
dynamic equations (7)-(11), where for Level 1
BCFON, for Level 2 BCFON, for Level 3
BCFON, for Level 4 BCFON and for
Level 5 BCFON. The meaning of these 's are explained as
follows.
For the Level 1 agents (the general public), we choose a large
(=0.95) because the general public has no obligation to reach
some consensuses so that they can show little sign of
compromise (a large means talking only to those whose
opinions are very close to each other). For the Level 2 agents
(the local representatives of the general public), they have to
show some sign of compromise in order for the process to
continue, so we choose a little smaller (=0.7) to model the
situation. Then, the Level 3 agents must be even more
compromising in order to reach some rough consensuses, so we
choose a even smaller (=0.45) for these middle level agents.
This process continues with smaller and smaller 's for the
upper level agents ( for Level 4 and for
Level 5) because the higher the level they are in, the more
pressure they have to reach the final consensus (this is why
many elected agents fall to realize their election promises when
they are in the office, because they have to consider many
different concerns when they are in the higher levels).
With b=0.5 for all the BCFONs and each BCFON evolving
40 time steps, i.e., the Level 1 BCFON is operating from t=0 to
t=40, then followed by the Level 2 BCFON which is operating
from t=41 to t=80 with the converged fuzzy opinions of the
Level 1 BCFON as the initial values, this process continues
with the Level 3 BCFON operating from t=81 to t=120, the
Level 4 BCFON operating from t=121 to t=160 and the Level 5
BCFON operating from t=160, Fig. 12 shows a simulation run
in a typical situation, where the top and bottom sub-figures in
Level 1Level 211X0()1X0n()1-1X0n()1-2X0n()15X0()14X0()13X0()12X0()BCFON121X0()24X0()23X0()22X0()22X0n()22-1X0n()31X0()33X0()32X0()33X0n()33-1X0n()Initial fuzzy opinionsConverged fuzzy opinions from Level 1Converged fuzzy opinions from Level 2BCFON2Level LL1X0()2X0L()X0LLn()1XmXConverged fuzzy opinions from Level L-1Final fuzzy opinionsBCFONL
9
Fig. 12: The opinions (top) of the agents in different levels and their
uncertainties (bottom).
Fig. 14: The opinions (top) of the agents in different levels and their
uncertainties (bottom).
Fig. 13: The opinions (top) of the agents in different levels and their
uncertainties (bottom).
Fig. 15: The opinions (top) of the agents in different levels and their
uncertainties (bottom).
Fig. 12 show the opinions ( of (7)) of the agents and their
uncertainties ( of (8)), respectively. We see from top
sub-figure of Fig. 12 that the Level 1 general public ( )
converge to a large number of opinions due to the large
(=0.95), then with a smaller (=0.7) the Level 2 agents
converge to about 17 opinions, which are further combined by
the Level 3 agents (with ) into 11 opinions, and
continuing with the Level 4 agents reach 5 opinions,
finally, the top level agents have to adopt a very small
to reach a single consensus. The bottom sub-figure
of Fig. 12 shows that the uncertainties are getting larger and
larger for the higher level agents, reflecting the fact that the
higher level agents must demonstrate more compromises which
result in more uncertainties about their decisions.
Figs. 13-15 show the simulation runs in other typical
situations, where a consensus is reached in Fig. 13, but in the
situations of Figs. 14 and 15, a consensus cannot be reached
after five rounds of negotiations. Comparing the bottom
sub-figures of Figs. 12-15 we see that the uncertainties of the
Level 5 agents are high if they converge to a single consensus
(Figs. 12 and 13), but if they converge to two consensuses (Fig.
14), their uncertainties are much lower, and if they are allowed
to keep three different opinions (Fig. 15), their uncertainties are
even lower. This demonstrates that the uncertainty in our
HFON model provides a good measure for the psychological
pressures of the agents in different levels.
020406080100120140160180200510152025Opinions of the agents in different levels of the BU-HFONtopinions0204060801001201401601802000123456Uncertainties of the agents in different levels of the BU-HFONtuncertaintiesLevel 1Level 2Level 3Level 4Level 5d=0.95d=0.7d=0.45d=0.2d=0.05020406080100120140160180200510152025Opinions of the agents in different levels of the BU-HFONtopinions0204060801001201401601802000123456Uncertainties of the agents in different levels of the BU-HFONtuncertaintiesLevel 1Level 2Level 3Level 4Level 5d=0.95d=0.7d=0.45d=0.2d=0.05020406080100120140160180200510152025Opinions of the agents in different levels of the BU-HFONtopinions0204060801001201401601802000123456Uncertainties of the agents in different levels of the BU-HFONtuncertaintiesLevel 1Level 2Level 3Level 4Level 5d=0.95d=0.7d=0.45d=0.2d=0.05020406080100120140160180200510152025Opinions of the agents in different levels of the BU-HFONtopinions0204060801001201401601802000123456Uncertainties of the agents in different levels of the BU-HFONtuncertaintiesLevel 1Level 2Level 3Level 4Level 5d=0.95d=0.7d=0.45d=0.2d=0.05
10
IV. CONCLUDING REMARKS
ii) there is such that the lowest positive entry of
in
The top-down and bottom-up hierarchical fuzzy opinion
networks (HFON) developed
this paper provide a
mathematical framework to model the dynamical propagation
and formation of opinions and their uncertainties through the
hierarchical structures. For the top-down HFON, we prove that
the opinions of all followers throughout the hierarchy converge
to the top leader's opinion, but the uncertainties of the followers
in different groups are different, which means that although all
the followers have to follow the top leader's opinion, their
psychological acceptance (the uncertainty) for the top leader's
opinion is different. We show that the iterations needed to
reduce the tracking error between the followers and leader's
opinions by a certain percentage is proportional to the number
of followers in the group, this means that organizing the
followers hierarchically can greatly improve the efficiency; for
example, if we organize 155 followers in a 4-level top-down
HFON with five followers in each leader-follower group, then
the speed of convergence to the top leader's opinion is
approximately
times faster than organizing the 155
followers in a single flat group. For the bottom-up HFON, we
show that the psychological pressure (the uncertainty) of the
agents in the higher levels is greater than those in the lower
levels because the higher level agents have to make more
compromises (tougher decisions), also we show that the
uncertainties are lower if the higher level agents are allowed to
keep different opinions.
In the future research, we will apply the HFON models to
some real organizations and real election scenarios.
APPENDIX
Proof of Theorem 1: (a) Let
and
with
for , ,
for and
Then, with the leader's opinion being a constant,
the opinion dynamic equation (13) can be rewritten in the
matrix form:
We need the follow Lemma from [27] to continue our proof.
Lemma: If the row-stochastic matrix in (A4) satisfies
the following three conditions:
i) the diagonal of is positive, i.e., for
,
is greater than , and
iii) any two nonempty saturated sets for have a
intersection, where is
nonempty
saturated for if and implies ,
then a consensus is reached for in finite time.
We now show that the of (A1)-(A3) satisfies the three
conditions in the Lemma. Since according to the
definition of in (10), we have
for
; with , condition i) in the
Lemma is satisfied. Since , it follows that any
positive
, hence condition ii) of
the Lemma is satisfied. To check condition iii), notice from (A1)
that
for , which implies
that any two nonempty saturated sets for
must contain the element , hence condition iii) of
the Lemma is satisfied. Consequently, according to the Lemma,
the followers converge to a consensus in
finite time, i.e., there exists such that for all
and all .
To prove for and , notice
that for , for the local reference scheme
(11), and for the leader reference
scheme (15). Substituting these into the dynamic
equation (14) of , we have for that
for the local reference scheme (11), and
for the leader reference scheme (15). Since the right hand sides
of both (A5) and (A6) are independent of , we have in both
cases that . This completes the proof of (a) of
Theorem 1.
(b) Since for all when , we
have from (13) that
or
for , and (16) follows from (A8).
(c) The conclusion follows from (A5).
(d) Substituting into (A6), we have
for , and (17) follows from (A9) and (16).
Proof of Theorem 2:
leader-follower group in the HFON and let
(a) Consider an arbitrary
be the group
11
) be the followers'
(
leader's opinion and
followers are connected to each other
opinions. Since all the
through the group leader (the group leader is a common
element in any saturated set), we have from the Lemma that the
followers converge to a consensus in finite steps, i.e., there
when , so from
exists such that
(13) we have
or
for . If
converges to , then since
we
converges to , i.e., if the group
have from (A11) that
leader's opinion converges to the top leader's opinion , then
consensus of the followers in the group also converges to .
Since the top leader and the agents in Level L-1 form a basic
leader-follower group, we have from Theorem 1 that the
opinions of the agents in Level L-1 converge to the top leader's
opinion . Hence, by induction, we have that the opinions of
all the agents converge to the top leader's opinion .
(
(b) For the agents in the same group (say group in Level ),
we can use the same method as in the proof of Theorem 1 to
) reach a
show that their uncertainties
in finite time which converges to the constant
consensus
for the local reference scheme or to the constant
leader
reference scheme. Since these converged values are group
dependent, they are in general different for different groups.
the
for
REFERENCES
[1] Diefenbach, T., Hierarchy and Organisation: Toward a General
Theory of Hierarchical Social Systems, Routledge, New York,
2013.
[2] Magee, J.C. and A.D. Galinsky, "Social hierarchy: The
self-reinforcing nature of power and status," Academy of
Management Annals, vol. 2, no. 1, 2008.
[3] Acemoglu, D. and J.A. Robinson, Economic Origins of
Dictatorship and Democracy, Cambridge University Press, NY,
2006.
[4] Mintzberg, H., The Structuring of Organizations: A Synthesis of
the Research, Englewood Cliffs, NJ: Prentice-Hall, 1979.
[5] Leavitt, H. J., Top Down: Why Hierarchies Are Here to Stay and
How to Manage Them More Effectively, Boston, MA: Harvard
Business School Press, 2005.
[6] Bearman, P.S. and P. Parigi, "Cloning headless frogs and other
important matters: Conversion topics and network structure,"
Social Forces 83: 535-557, 2004.
[7] Sidanius, J., and F. Pratto, Social Dominance: An Intergroup
Theory of Social Hierarchy and Oppression, New York:
Cambridge University Press, 1999.
[8] Baron, J. N. and J. Pfeffer, "The social psychology of
organizations and inequality," Social Psychology Quarterly, vol.
57, no.3, pp: 190-209, 1994.
[9] Mason, W.A., F.R. Conrey and E.R. Smith, "Situating social
influence processes: Dynamic, multidirectional flows of influence
within social networks," Personality and Social Psychology
Review 11(3): 279-300, 2007.
[10] Bunderson, J.S., G.S. van der Vegt, Y. Cantimur and F. Rink,
"Different views of hierarchy and why they matter: Hierarchy as
inequality or as cascading influence," Academy of Management
Journal, vol. 59, no. 4, 2016.
[11] Athey, S., E. Calvano and S. Jha, "A theory of community
formation and social hierarchy," https://ssrn.com/abstract
=2823777, 2016.
[12] Marx, K. and F. Engels, The German ideology (C. J. Arthur,
Ed.), New York: International Publishers, 1970 (Originally
published 1846)
[13] Myers, D.G., Social Psychology (9th Edition), McGraw-Hill
Education (Asia), 2008.
[14] Friedkin, N.E., "The problem of social control and coordination
of complex systems in sociology: A look at the community
cleavage problem," IEEE Control Systems Magazine 35(3):
40-51, 2015.
[15] Acemoglu, D. and A. Ozdaglar, "Opinion dynamics and learning
in social networks," Dynamic Games and Applications 1.1: 3-49,
2011.
[16] Jackson, M.O., Social and Economic Networks, Princeton
University Press, 2008.
[17] Lorenz, J., "Continuous opinion dynamics under bounded
confidence: A survey," International Journal of Modern Physics
C 18(12): 1819 -- 1838, 2007.
[18] Sornette, D., "Physics and financial economics (1776-2014):
Puzzles, Ising and agent-based models," Rep. Prog. Phys. 77,
2014.
[19] Hegselmann, R. and U. Krause, "Opinion dynamics and
bounded confidence: Models, analysis, and simulations," Journal
of Artificial Societies and Social Simulations 5(3):
http://jasss.soc.surrey.ac.uk/5/3/2.html, 2002.
[20] Proskurnikov, A.V. and R. Tempo, "A tutorial on modeling and
analysis of dynamic social networks. Part II," Annual Reviews in
Control, vol. 45, pp. 166-190, 2018.
[21] Chamley, C., A. Scaglione, and L. Li, "Models for the diffusion
of beliefs in social networks: An overview," Signal Processing
Magazine 30(3): 16-29, 2013.
[22] Wang, L.X. and J.M. Mendel, "Fuzzy opinion networks: A
mathematical framework for the evolution of opinions and their
uncertainties across social networks," IEEE Trans. on Fuzzy
Systems, vol. 24, no. 4, pp. 880-905, 2016.
[23] DeGroot, M.H., "Reaching a consensus," Journal of the
American Statistical Association 69: 118-121, 1974.
[24] Hegselmann, R. and U. Krause, "Opinion dynamics under the
influence of radical groups, charismatic leaders, and other
constant signals: A simple unifying model," Networks and
Heterogeneous Media 10(3): 477-509, 2015.
12
[25] Kahneman,D., Thinking: Fast and Slow, Farrar, Straus, New
York, 2011.
[26] Wang, L.X., "Modeling stock price dynamics with fuzzy opinion
networks," IEEE Trans. on Fuzzy Systems, vol. 25, no. 2, pp.
277-301, 2017.
[27] Krause, U., Positive Dynamical Systems in Discrete Time:
Theory, Models, and Applications, De Gruyter, Berlin, 2015.
|
1608.04511 | 1 | 1608 | 2016-08-16T08:07:41 | AntPaP: Patrolling and Fair Partitioning of Graphs by A(ge)nts Leaving Pheromone Traces | [
"cs.MA"
] | A team of identical and oblivious ant-like agents - a(ge)nts - leaving pheromone traces, are programmed to jointly patrol an area modeled as a graph. They perform this task using simple local interactions, while also achieving the important byproduct of partitioning the graph into roughly equal-sized disjoint sub-graphs. Each a(ge)nt begins to operate at an arbitrary initial location, and throughout its work does not acquire any information on either the shape or size of the graph, or the number or whereabouts of other a(ge)nts. Graph partitioning occurs spontaneously, as each of the a(ge)nts patrols and expands its own pheromone-marked sub-graph, or region. This graph partitioning algorithm is inspired by molecules hitting the borders of air filled elastic balloons: an a(ge)nt that hits a border edge from the interior of its region more frequently than an external a(ge)nt hits the same edge from an adjacent vertex in the neighboring region, may conquer that adjacent vertex, expanding its region at the expense of the neighbor. Since the rule of patrolling a region ensures that each vertex is visited with a frequency inversely proportional to the size of the region, in terms of vertex count, a smaller region will effectively exert higher "pressure" at its borders, and conquer adjacent vertices from a larger region, thereby increasing the smaller region and shrinking the larger. The algorithm, therefore, tends to equalize the sizes of the regions patrolled, resembling a set of perfectly elastic physical balloons, confined to a closed volume and filled with an equal amount of air. The pheromone based local interactions of agents eventually cause the system to evolve into a partition that is close to balanced rather quickly, and if the graph and the number of a(ge)nts remain unchanged, it is guaranteed that the system settles into a stable and balanced partition. | cs.MA | cs |
AntPaP: Patrolling and Fair Partitioning of
Graphs by A(ge)nts Leaving Pheromone Traces
Gidi Elazar and Alfred M. Bruckstein
Multi Agent Robotic Systems (MARS) Lab
Technion Autonomous Systems Program (TASP)
Center for Intelligent Systems (CIS)
Department of Computer Science
Technion, Haifa 32000, Israel
Abstract. A team of identical and oblivious ant-like agents -- a(ge)nts
-- leaving pheromone traces, are programmed to jointly patrol an area
modeled as a graph. They perform this task using simple local interac-
tions, while also achieving the important byproduct of partitioning the
graph into roughly equal-sized disjoint sub-graphs. Each a(ge)nt begins
to operate at an arbitrary initial location, and throughout its work does
not acquire any information on either the shape or size of the graph,
or the number or whereabouts of other a(ge)nts. Graph partitioning oc-
curs spontaneously, as each of the a(ge)nts patrols and expands its own
pheromone-marked sub-graph, or region. This graph partitioning algo-
rithm is inspired by molecules hitting the borders of air filled elastic
balloons: an a(ge)nt that hits a border edge from the interior of its re-
gion more frequently than an external a(ge)nt hits the same edge from
an adjacent vertex in the neighboring region, may conquer that adja-
cent vertex, expanding its region at the expense of the neighbor. Since
the rule of patrolling a region ensures that each vertex is visited with
a frequency inversely proportional to the size of the region, in terms of
vertex count, a smaller region will effectively exert higher "pressure" at
its borders, and conquer adjacent vertices from a larger region, thereby
increasing the smaller region and shrinking the larger. The algorithm,
therefore, tends to equalize the sizes of the regions patrolled, resembling
a set of perfectly elastic physical balloons, confined to a closed volume
and filled with an equal amount of air. The pheromone based local inter-
actions of agents eventually cause the system to evolve into a partition
that is close to balanced rather quickly, and if the graph and the number
of a(ge)nts remain unchanged, it is guaranteed that the system settles
into a stable and balanced partition.
1
Introduction
Patrolling is continuously traveling through an environment in order
to supervise or guard it. Although mostly used to refer to humans
guarding an area, the term patrolling is also used to describe sur-
veying through a digital, virtual environment. Consider, for example,
the task of repeatedly reading web pages from the world-wide-web
in order to keep an updated database representing the links between
pages, possibly for the purpose of later retrieval of pages in an a
accurate and prompt manner. These problems exhibit similarities,
in the sense that they can be represented as traveling through the
vertices of a graph. But there are also differences: a physical area is
usually fixed in size, whereas the virtual area is, in general, prone
to constant change. The number of human guards is, generally, fixed
for the particular area being patrolled, while the number of soft-
2
ware agents or "bots" performing a large scale patrolling task may
be subject to change as well.
Partitioning a graph into similar sized components is an impor-
tant and difficult task in many areas of science and engineering. To
name few examples, we can mention the partitioning of a netlist of
an electronic VLSI design [5], the need for clustering in data mining
[4], and the design of systems that balance the load on computer
resources in a networked environment [6].
The general graph partition problem is loosely defined as dividing
a graph into disjoint, connected components, such that the compo-
nents are similar to each other in some sense. Practical considera-
tions impose additional constrains. For example, an important prob-
lem, known as the graph k-cut, requires a partition where the sum of
the weights of vertices belonging to each component is more or less
equal, and additionally, the number and/or the sum of weights of
edges that connect disjoint components is minimized [7]. The k-cut
problem can model the distribution of tasks between computers on
a network, while minimizing communication requirements between
them.
In this work we define a patrolling strategy that fairly divides
the work of patrolling the environment among several a(ge)nts by
partitioning it into regions of more or less the same size. We have
no constraints on edges connecting different components, but we im-
3
pose strict restrictions on our patrolling agents in search for a heuris-
tic multi-agent graph partitioning algorithm that may continuously
run in the background of a host application. We are interested in
programming the same behavior for each individual ant-like agent,
which should be very simple in terms of resources, hardware or com-
munications. Furthermore the agents have no id's, hence are part of
a team of units that are anonymous and indistinguishable to each
other. Our a(ge)nts should have very little knowledge about the sys-
tem or environment they operate in, have no awareness on the size or
shape of the graph, no internal memory to accumulate information,
nor a sense of the number and locations of other agents active in the
system. These limitations mean that such a multi agent process has
inherent scalability; the environment might be large, complex, and
subject to changes, in terms of vertices, edges and even the num-
ber of agents, and our simple agents should still be able to patrol
it, while also evolving towards, and ultimately finding balanced par-
titions, if such partitions exist. To simplify the discussion, we will
think of a graph to be partitioned as a planar area, and the task at
hand will be to partition the area into regions of more or less the
same size. The area is modeled as a grid, where each vertex is a unit
area, thus a balanced partition should have components of roughly
the same number of vertices. In our scheme, agents are each given
the task to patrol and define a region of their own, and have the
4
ability to expand their region via conquests. Like ants, our agents
leave pheromone marks on their paths. The marks decay with time
and are subsequently used as cues by all the agents to make decisions
about their patrolling route and about the possibility to expand their
region. By assumption, each agent operates locally, thus it can sense
levels of pheromones or leave pheromone marks on the vertex it is
located, on its edges and on adjacent vertices.
While patrolling its region, an agent visits a vertex and reads
the intensity of pheromone marks that remain from previous visits.
It then uses the reading, and the known rate of pheromone decay,
to calculate the vertex's idle-time -- the time that passed since the
previous visit. Using the decaying pheromone mark we can chose a
patrolling rule according to which the agents visit the vertices of
their region in repetitive cycles, each vertex being marked with a
pheromone once on each cycle. The patrolling process hence ensures
that the idle-time measured by agents on visits to their region's
vertices is the same, effectively encoding their region's cover time --
the time that takes for an a(ge)nt to complete a full patrolling cycle
-- and therefore it can also be used to estimate the region's size: the
shorter the cover time, the smaller the region.
We assume that each agent detects pheromones without being
able to distinguish between them, except for recognizing its own
pheromone. When an a(ge)nt hits a border edge -- an edge that
5
connects its region with one that is patrolled by another agent - it
can use the neighbor's idle-time (encoded in its pheromone marks)
to calculate the size of the neighboring region, and thereby decide
whether to try to conquer the vertex "on the other side of the border".
This causes an effect that mimics pressure equalization between gas-
filled balloons: at two vertices on opposing ends of a border edge,
the agent that hits the border more frequently is the agent with
a shorter cover time (patrolling the smaller region) hence it may
attempt a conquest.
We define that in a balanced partition, any pair of neighboring
regions have a size difference of at most one vertex. This means
that for a graph G and k agents, our partitioning heuristics ensures
a worst case difference of k − 1 vertices between the largest and
smallest of the regions, once a balanced partition is reached. For ex-
ample in a graph of 1 million vertices (e.g. database entries, each
representing a web page) and 10 agents (network bots patrolling the
pages), this difference is truly negligible. Additionally, the length
of the patrolling path is predetermined, and is proportional to the
size of the region being patrolled, therefore when a balanced parti-
tion is reached, the algorithm guarantees that the idleness of any of
the vertices of the graph is bounded by a number of steps equal to
− 1, about twice the size of the largest possi-
+ (k − 1)
2
(cid:18)(cid:22)G
(cid:23)
k
(cid:19)
6
ble region (Note that Gdenotes the number of vertices in the graph
G).
In Figure 1 one can see a series of snapshots depicting 8 patrolling
agents working to partition a 50x50 grid. The first snapshot shows
an early phase of the joint patrolling algorithm, where agents already
captured some of the vertices around their initial random locations,
in the second, the area is almost covered and most of the vertices of
the graph are being patrolled, the third exhibits a phase when all the
area is covered but the regions are not balanced, and finally, the last
snapshot shows a balanced partition that the system evolved into.
This Figure exhibits typical stages in the evolution of such a sys-
tem, for which balanced partitions exist, and the environment graph
remains stationary for a time long enough for agents to find one of
them. Often, the agents will relatively quickly find a partition that
covers the graph, and is close to being balanced. Then, on station-
ary graphs, they may spend a rather long time to reach a perfectly
balanced partition. In a time varying environment the system will
continuously adapt to the changing conditions.
2 Related Work
The concept of partitioning a graph with a(ge)nts patrolling a region
and exerting pressure on neighboring regions was first presented by
Elor and Bruckstein in [1]. They proposed a patrol algorithm named
7
Fig. 1. Evolution of a 50x50 Grid Graph Partitioning by 8 A(ge)nts
BDFS -- Balloon DFS -- and this work is a follow up research on
this problem. According to BDFS, an agent patroling a smaller re-
gion conquers vertices from a neighboring larger region. To achieve
the goal of patrolling an area, BDFS uses a variation of Multi-Level
Depth-First-Search (MLDFS), an algorithm presented by Wagner,
Lindenbaum and Bruckstein in [2]. The task of the MLDFS too, was
to distribute the work of covering "tiles on a floor" among several
8
identical agents. The floor-plan mapping of the tiles is unknown and
may even be changing, an allegory for moving furniture around while
agents are busy cleaning the floor. MLDFS implements a generaliza-
tion on DFS: agents leave decaying pheromone marks on their paths
as they advance in the graph, and then use them either to move
to the vertex least recently visited or to backtrack. When none of
the choices are possible, either when the graph covering ends, or fol-
lowing to changes in the graph or loss of tracks due to noise in the
pheromone marks, agents reset, thus starting a new search. The time
of reset, named "the time where new history begins", is stored in the
agents' memory, as a search-level variable. After a reset, the cycle
repeats, hence an agent traces pheromone marks left in an earlier
cycle. The mere existence of a pheromone mark is, however, not suf-
ficient for agents to choose a path not yet taken during the current
search cycle. To select the next step, agents use the value stored in
the search-level variable as a threshold: any pheromone that was
marked on a vertex or edge prior to this time must have been the
result of marking in an earlier cycle. In MLDFS, pheromones of all
agents are the same, and agents are allowed to step on each other's
paths. For the task of partition a graph, in BDFS each agent has
its own pheromone and it performs MLDFS cycles on its "own" re-
gion of the graph, leaving its particular pheromone marks. As long
as the region is stationary, BDFS agents exactly repeat their pre-
9
vious route. If the region changes, either expands or shrinks, it will
cause BDFS to look for a new and possibly substantially different
route before settling into the next search cycle. This occurs due to a
subtlety in the way that depth-first-search defines a spanning tree,
a special type of tree called a palm tree, were each edge (v, w) not
in the spanning tree connects a vertex v with one of its ancestors,
see e.g. Tarjan [8]. The spanning tree defined during a BDFS search
cycle does not consider all edges emanating from all of the region's
vertices, simply because some of the edges connect to vertices on
neighboring regions. When BDFS conquers a vertex, it is possible
that this vertex has more than one edge connecting to the region.
All these edges will now be considered during the next search cycle,
a process that may dictate a different palm tree. We call this event
- respanning. In the algorithm we define here, named Ant Patrolling
and Partitioning, or AntPaP, we use a different generalization of
DFS that avoids respanning. Furthermore we reduce the require-
ments on the agent's capabilities. For example, our agents have no
memory, and also cannot control the levels of pheromones they leave,
the pheromone level at the time of a marking is always the same. We
further add the possibility for agents to lose a vertex if a conquest
fails, and we provide a proof of convergence to balanced partitions,
while experimentally observing much faster evolution towards such
partitions.
10
The subject of multi-agent patrolling has been extensively stud-
ied. Lauri and Charpillet [12] also use an "ants paradigm", where a
method based on Ant Colony Optimization (ACO), introduced by
Dorigo, Maniezzo, and Colorni in [13]. ACO provides multi-agent
solutions for various problems, for example the Traveling Salesman
Problem (TSP) in complete and weighted graphs by a so-called ant-
cycle algorithm. Ants move to the next vertex according to a prob-
ability that is biased by two parameters: the closest neighbor vertex
(corresponding to the lowest edge weight) and the level of pheromone
on the edge. During their search, ants record their path to avoid vis-
iting the same vertex twice. Since at each step all ants traverse one
edge to a neighboring vertex, all ants complete their travel at the
same time. Thereafter each ant leaves pheromone marks on the en-
tire path it took. Due to the probability bias, shorter edges have
a higher probability to be traversed, thus it is probable that mul-
tiple ants traversed them, hence they tend to accumulate stronger
pheromone levels. The cycles repeat, and with each cycle the biasing
gets stronger towards the shortest path. The process ends after a
a-priori given number of cycles complete or when the ants all agree
on the shortest path. For the patrolling problem, Lauri et. al. [12]
used this method to find multiple paths, one for each agent, before
the agents begin their joint work. Their algorithm employs multiple
colonies of ants where each agent is assigned one ant on each colony.
11
Ants in a colony cooperate (exchange information regarding their
choices) to divide the exploration into disjoint paths , leading the
agents to eventually cooperate in the patrolling task. Unlike for the
TSP, the environment graph is not required to be complete, and ants
are allowed to visit a vertex more than once when searching for a
patrolling route.
Chevaleyre, Yann, Sempe, and Ramalho [11] compared cyclic pa-
trolling strategies, in which agents tend to follow each other, to par-
titioning strategies, in which agents patrol each its own region. By
applying several algorithms on several graphs examples, they found
that the choice of strategy should be based on the shape of the graph.
The partitioning based strategy gets better results on "graphs having
'long corridors' connecting sub-graphs", i.e. if there are high weight
edges that are slow to traverse, it is better not traverse them at all
by allocating them to connect disjoint partitions.
There is substantial research on heuristics for partitioning of a
graph, and some of it even related to multi-agent scenarios. Inspired
by ants, Comellas and Sapena [10] presented yet another Ants al-
gorithm to find a k-cut solution to a graph. The system is initiated
by randomly coloring all the graph vertices in a more or less even
number of colors and positioning the agents randomly on the graph.
Then a local cost value is calculated for each of the vertices, storing
the percentage of neighbors that have the same color as its own.
12
Agents will then iteratively move to a neighboring vertex v that
has the lowest cost (i.e. with the most neighbors of a different color
than its own), and then switch colors with a random vertex u on
the graph, where the color of u is the one most suitable for v, i.e.
similar to most of v's neighbors. u is selected from from a random
list of vertices colored with the same color as u, by choosing from
this list the one with lowest cost (most neighbors colored differently
than u). Then the cost value is refreshed for both v and u. On each
iteration the number of cuts, defined as the number of edges con-
necting vertices of different colors, is calculated over all the edges
of the graph and the lowest value is stored. The choices of agent
moves are stochastic, i.e. agents have a probability p to select the
next vertex to move to by using the cost value, otherwise it selects
another neighbor vertex at random. This allows the system to es-
cape from local minima. Unlike our algorithm, agents of Comellas
and Sapena's Ants aim to find a k-cut, and while doing so do not
leave pheromones to be used as cues on vertices and edges they visit
as our agents do. Also, their agents are assumed to have the ability
to look at vertices that are anywhere in the graph and change their
values, thus their sensing is not local as in our algorithm. In Ants,
each iteration relies on a global calculation that involves access to
values on all edges of the graph, in order to measure the quality of
the partition so far determined, as well as storing the result.
13
Inspired by bee foraging, McCaffrey [9] simulates a bee colony
in order to find a k-cut graph partition. Each of the agents, in this
case called bees, is assumed to know in advance the size and shape of
the graph, as well as the number of components desired. The agent
must have an internal memory to store an array of vectors listing
the vertices of all sub-graphs of a proposed solution, as well as the
number of cuts this partition has, as a measure of its quality. In a
hive, some 10% of the bees are considered scouts, all other agents
being in one of two states, active or inactive. Emulated scouts select a
random partition of the graph. If the selection is better than what the
scout previously found, it stores it in its memory and communicates
it to other bees in the hive that are in an inactive state. Some of
those store the scout's solution in their own memory, change their
state to active and begin to search for a better partition around this
solution. If an active bee finds an improved solution it communicates
it to the bees that are left in the hive. After looking at neighboring
solutions for a long enough time, the active bee returns to the hive
and becomes inactive again. The algorithm, therefore, is constantly
searching for improvements in the quality of the partition that the
bees collectively determine.
The partitioning and patrolling multi-agent algorithms that we
have surveyed above, all assume that agents posses substantial in-
ternal memory. Some algorithms assume that the agents are able to
14
sense and even change values of vertices and/or edges in graph loca-
tions that are distant from their position in the graph, and sometimes
they can even sense and/or store a representation of the whole graph
in their memory. Patrolling algorithms may be partition based, and
then the task is divided into two stages. In the first stage the graph
is partitioned into disjoint components, and at the second stage each
of the agents patrols one of those components.
In our case, partitioning the graph, and thereby balancing the
workload among our agents, is a requirement. Our algorithm does
not have stages, the agents simply perform pheromone directed local
steps thereby carrying out a patrolling algorithm, and while doing so
also implicitly cooperate in partitioning the graph. Our agents have
no internal memory at all. Their decisions are based on pheromone
readings from vertices and edges alone, and they can only sense or
leave pheromone marks around their graph location. One may view
our solution for patrolling and partitioning the graph environment
as using the graph as a shared distributed memory for our oblivious
agents.
15
3 The AntPaP Algorithm and Empirical Results
The task analyzed here is the partition of an area or environment
into regions of similar size by a set of agents with severe restrictions
on their capabilities. The inspiration for the algorithm are gas filled
balloons; consider a set of elastic balloons located inside a box, and
being inflated at a constant and equal rate, until the balloons oc-
cupy the entire volume of the box. While inflating, it may be that
one balloon disturbs the expansion of another balloon. This may
cause a momentarily difference of the pressure in the balloons, un-
til the pressure difference is large enough to displace the disturbing
balloon and provide space for the expansion of the other. Since the
amount of gas is equal for all balloons, they will each occupy the
same part of the volume, effectively partitioning it into equal parts.
Our agents mimic this behavior by patrolling a region of the area
"of their own", while continuously aiming to expand it. The area is
modeled by a graph and the region is a connected component of
the graph. When expanding regions touch, the agent on the smaller
region may conquer vertices of the larger region. We assume that
initially a given number of agents are randomly placed in the envi-
ronment, they start the process of expanding and this process goes
on forever. Eventually the expansion is "contained" due to the inter-
action between the regions of the agent, hence the process will lead
16
to an equalization of the sizes of the regions patrolled by the agents.
In the discrete world of our agents a partition to regions of exactly
the same size may not exist, therefore we define a balanced partition
as such that any two neighboring regions may have a size difference
of at most one vertex.
17
Agent Modeling and Implementation Details
For simplicity, a(ge)nts operate in time slots, in a strongly asyn-
chronous mode, i.e. within a time interval every agent operates at
some random time, so that they do not interfere with each other.
During a given time slot, each agent may move over an edge to an-
other vertex, and may leave pheromone marks on a vertex and/or
edges. The marks, if made, are assumed to erase or coexist with the
pheromone that remained there from the previous visit. Agents have
no control over the amount of pheromone they leave, its initialization
level being always the same. Thereafter, the pheromone level decays
in time. Each agent has its own pheromone, thus pheromones are like
colors identifying the disjoint components and hence the partition-
ing of the graph. The agents themselves can only tell if a pheromone
is their own or not. Agents are oblivious, i.e. have no internal mem-
ory. On each time slot, an agent reads remaining pheromone levels
previously marked on the vertex it is located and its surroundings,
and bases its decisions solely upon these readings. The readings and
decisions are transient, in the sense that they are forgotten when the
time slot advances. Decaying pheromone marks on vertices and edges
linger, serving both as distributed memory as well as means of com-
munication. In our model, agents leave pheromones in two patterns:
one pheromone pattern is marked when agents advance in their pa-
trolling route, and the second pattern is used when agents decide to
18
remain on the same vertex. Pheromones are decaying in time, thus
once marked on a vertex or edge, their level on the vertex or edge de-
creases with each time step. A straightforward way for implementing
such behavior in a computer program, is to use the equivalent "time
markings", i.e. stamping the time at which a pheromone is marked
on the vertex or edge. We therefore denote by ϕ0 (v) the time of
pheromone marking on vertex v, hence ϕ0 (v) = t means that an
agent left a pheromone on vertex v at time t. As time advances, the
"age" of the pheromone on vertex v, i.e. the time interval since it
was marked, which can be calculated as t − ϕ0 (v) where t is the
current time, advances as well. This is equivalent to measuring the
level of the temporally decaying pheromone on vertex v, and using
its value along with the known rate of decay to calculate its "age".
Similarly, ϕ (u, v) = t is a time marking, equivalent to the decay-
ing pheromone level on the edge, where ϕ (u, v) and ϕ (v, u) are not
necessarily the same. The use of time markings require the computer
program implementation to know the current time t in order to be
able to calculate the age of pheromones. However, the knowledge of
current time is strictly limited to its use in the emulation of tem-
porally decaying pheromones by equivalent time markings, thus it
does not depart from our paradigm of obliviousness and local deci-
sions based on decaying pheromone markings only. When an agent
decides to leave a pheromone mark on a vertex, it may avoid erasing
19
the pheromone that remains from the previous (most recent) visit.
We denote the previous time marking as ϕ1 (v), thus when an agent
marks a pheromone on vertex v, the computer program implemen-
tation moves the value stored in ϕ0 (v) to ϕ1 (v) and afterwards
sets the new time mark to ϕ0 (v). Hence, the value, ϕ0 (v) − ϕ1 (v)
encodes the idle time of the vertex v.
The Patrol Algorithm
Agents patrol their region in a DFS-like route, in the sense that
they advance into each vertex once and backtrack through the same
edge once during a complete traversal of their region. When an agent
completes traversing the region it resets (i.e. it stays at the same lo-
cation for one time step and refreshes its pheromone mark), and sub-
sequently starts the search again. The cycles repeat the same route
as long as the region is unchanged. When the region does change
-- either expanding or shrinking -- out agents persist on keeping ad-
vancing and backtracking into a vertex through the same edge that
was used to conquer the vertex. This is implemented by marking
"pair trails", i.e. leaving pheromones over edges as well as vertices,
when conquering and (subsequently) advancing into a vertex. A pair
trail is a directed mark from a vertex u to an adjacent vertex v,
of the form ϕ0 (v) = ϕ (u, v) = ϕ (v, u), and is one of the two
pheromone patterns that agents leave. This behavior results in a
patrolling process that follows the pair trails, were agents advance
20
through the earliest marked pair trail, refreshing the marks while
doing so. When all pair trails to advance through are exhausted, it
backtracks through the same pair trail it entered. An example of a
route and the spanning tree it defines are depicted in Figure 2. The
departure from the classic DFS is that edges that are not marked as
pair trails are ignored. The pair trails mark a spanning tree (which is
not necessarily a palm tree) of the region, where its root is the ver-
tex where the search cycle begins, and each pair trail marks the path
advancing upwards the tree. When an agent backtracks to the root,
it has no untraveled pair trail to advance through, and it restarts
the search cycle remaining one time slot in the root. It then uses the
second marking pattern which is simply leaving a pheromone on the
vertex, denoted as ϕ0 (u) = t, where u is the root.
Fig. 2. An example of a patrolling route in a region, and the spanning tree it defines.
The arrows indicate pair trail directions: advance in the direction of the arrow, and
(eventually) backtrack the other way
Since agents advance and backtrack once from each vertex in their
region (except the root) and then restart a patrolling cycle in the
21
root, the number of steps in one patrolling cycle, called the cover
time, is ∆tα = 2Gα − 1. Gα denotes the region of agent α, the
set of vertices that are part of α(cid:48)s patrolling cycle. Patrolling cycles
repeat the exact same route as long as the region remains unchanged,
hence the idle time of any vertex v of the region is also the region's
cover time ϕ0 (v) − ϕ1 (v) = ∆tα. Thus the pheromone markings
on the vertex can be used to calculate the size of the region Gα =
∆tα + 1
.
2
Conquest
To expand their region, agents may conquer vertices adjacent to
(vertices of) their region. For agent α to attempt to launch a con-
quest from a vertex u ∈ Gα to a target vertex v, the following
conditions must apply:
(1) v is not part of α's region, v /∈ Gα, let us then assume that
v ∈ Gβ of another agent β
(2) u is subject to a double visit by α, i.e. α visits u leaving pheromone
marks twice, while v was not visited even once by β during the
same period of time. Since the time difference between the two
visits by α is the cover time and the cover time is proportional to
the size of the region, it means that α's region is smaller than β's,
Gα < Gβ. An agent may check for this condition by evaluating
if ϕ1 (u) > ϕ0 (v).
22
(3) If the double visit condition is met, thus β's region is larger, allow
a conquest attempt if it is not larger by exactly one vertex -- since
a difference of one vertex is considered balanced.
(4) If the double visit condition is met and β's region is larger by ex-
actly one vertex, allow a conquest attempt if vertex v is stagnated
-- it's pheromones are older than their purported cover time. An
agent checks this by comparing the idle time t − ϕ0 (v) to the
cover time ϕ0 (v) − ϕ1 (v).
Depending on the above conditions, an agent may stochastically at-
tempt the conquest of vertex v, with a predefined probability 0<ρc<1.
This mechanism works even if v is not part of any of the other agent's
regions, v /∈ Gi, ∀i. In such case the pheromone marks on v will
never be refreshed and the conquest conditions hold.
Temporary Inconsistency
When a region expands or shrinks as result of conquests, its be-
comes inconsistent in the sense that the size of the region changed,
but at least some of the pheromone marks on its vertices encoding
the cover time (ϕ0 (v) − ϕ1 (v)) do not reflect that immediately. To
regain consistency on a vertex u, the pheromone marks on u must
be refreshed, hence an agent must leave there a fresh pheromone,
and that may occur only when the agent advances into vertex u
through a pair trail. Therefore, there is a delay in the propagation
of the change, thus there will be a temporary inconsistency between
23
the actual size of the region and the cover time encoded on region's
vertices. That inconsistency is certainly not desirable since it might
result in a miscalculation of conquest conditions. Consider an agent
α with a larger region than two of its neighbors β and γ. Both
neighbors will be attempting to conquer vertices from α. Since all
agents' awareness is local, β and γ have no means to know that α
is shrinking due to the work of the other as well, and as β and γ
repeatedly conquer vertices from α, the combined conquests may ac-
cumulate to "eat up" too much out of α's region up to a point where
the imbalance is reversed, and the areas of both β and γ are now
larger than α's. Nonetheless, the inconsistency is temporary. It is
convenient to analyze this issue by considering the spanning tree of
pair trails. When an agent conquers a vertex and expands its region,
it results in adding a leaf to the spanned tree, and losing a vertex
to another agent results in the pruning of the tree, the splitting of
the tree into two or more branches, while the losing agent remains
on one of them. In either case, the follow the pair trails strategy
ensures that the new route remains well defined. It is therefore suffi-
cient for an agent to patrol its region twice, to ensure that the region
is consistent, as described in the following Lemma:
Lemma 1. A region is consistent if it has remained unchanged for
a period of time which is twice its cover time.
24
Proof. On the first cycle, the agent leaves a fresh pheromone, ϕ0, on
each vertex, while the previous most recently visit, ϕ1, may reflect an
inconsistent state. The second cycle repeats the exact same route as
the first, since the region remains unchanged, and now both the most
recent visit as well as the one preceding it, indicated by pheromone
levels ϕ0 and ϕ1, are updated, thus ϕ0 − ϕ1 reflects the cover time
(cid:117)(cid:116)
on all vertices of the route and the region becomes consistent.
Losing a Vertex
When balloons are inflated in a box, to the observer it looks as a
smooth evolution where the balloons steadily grow and occupy more
of the volume until the box is filled. But unlike gas inside a balloon
that exerts pressure in all directions concurrently, our discrete agents
work in steps, where at each step they attend one vertex of their re-
gion, while the other vertices may be subject to conquests by other
agents. Since regions are defined by patrolling routes, an agent α, by
conquest of a single vertex from β, may prune β's region in a way
that leaves β to patrol a much smaller region effectively rendering
it smaller than α's. Now the "balance tilts", as the region that was
larger prior to the conquest becomes the smaller. Pruning may cut a
spanning tree into two or more sections, but in many cases the sec-
tions of the tree may still be connected by edges that are not marked
by a pair trail. In such case, β has an opportunity to mark a pair trail
over such an edge and regain access to a branch still marked with
25
its own pheromones. Yet, sometimes the pruning divides the region
into two unconnected components. We call these balloon explosions,
and when these occur it is more difficult for the agent that lost part
of its region to regain its loss. Therefore, when an agent launches
a conquest attempt it is not always clear if its success will advance
or set-back the evolution towards convergence. It is then natural to
add the following vertex loss rule: should an agent fail the conquest
attempt, there is a predefined probability 0 < ρl < 1 for losing the
vertex from which the attempt was launched. Losing the vertex may
indeed be a better evolution step than succeeding in that conquest,
resembling actions of withdrawal from local minima used in simu-
lated annealing. In fact, this property becomes instrumental in our
convergence proof for the AntPaP algorithm. In order to prevent an
agent from "cutting the branch it is sitting on", we limit vertex loss
events to steps of the patrolling process in which agents backtrack,
and, symmetrically restrict conquests to steps in which the agents
advance.
We next list the algorithm describing the work of each agent on
the graph environment.
26
Rule AntPaP
Entry point of an agent α at time step t.
Upon entry, the agent is located on vertex u.
Pseudo Code
Description
for each ∃v ∈ N (u) (Self (v) = f alse) ∧ (ϕ1 (u) > ϕ0 (v))
if (ϕ0 (u) − ϕ1 (u)) + 2 (cid:54)= (ϕ0 (v) − ϕ1 (v))
or (t − ϕ1 (v)) > (ϕ0 (v) − ϕ1 (v)) then
if (cid:64)v ∈ N (u)ϕ (u, v) = ϕ0 (u) + 1 then
if (AgentPresent (v) = f alse) ∧ (x < ρc) then
ϕ (u, v) = t; ϕ (v, u) = t; ϕ0 (v) = t
ϕ1 (v) = 0
goto v ; return
lose = (y < ρl)
else lose = (y < ρl)
if ∃v = argmin
v∈N (u)
then
{ϕ0 (v) , s.t.ϕ1 (u) > ϕ0 (v) , Self (v) = true}
ϕ (u, v) = t ; ϕ (v, u) = t ; ϕ0 (v) = t ; ϕ1 (v) = 0
goto v ; return
if ∃v = argmin
v∈N (u)
{ϕ (u, v) , s.t. ϕ (u, v) in a pair trail} then
if (ϕ (u, v) = ϕ (v, u) = ϕ0 (v)) ∧ (ϕ0 (u) > ϕ0 (v)) then
ϕ1 (v) = ϕ0 (v)
ϕ (u, v) = t ; ϕ (v, u) = t ; ϕ0 (v) = t
goto v; return
if (ϕ (u, v) = ϕ (v, u) = ϕ (u)) then
if lose then
ϕ0 (u) , ϕ1 (u) = 0,∀w ∈ N (u) , ϕ (u, w) , ϕ (w, u) = 0
goto v; return
ϕ1 (v) = ϕ0 (v) ; ϕ0 (u) = t
return
27
Explore border
for each neighbor v of u, not marked by α's
pheromone, and meeting the double hit.
if size difference(cid:54)= 1,
or v is stagnated (pruned or empty) then,
if not backtracked to u
if chance allows conquest (x random ∈ [0, 1])
Conquer vertex v
mark pair-trail into v
move to v and exit this step
if no conquest, set lose flag (y random ∈ [0, 1])
Rejoin Isolated
if v has α(cid:48)s (self) mark but double visit is met,
rejoin v. Move to v and exit this step
select v of the oldest pair-trail
Advance
if pair-trail points into v, and mark on v is older
keep previous time-mark
refresh the pair-trail pointing to v
move to v and exit this step
Backtrack
if pair-trail points into u
Lose
if lose flag is set
remove time marks of u and its pair-trails
move to v and exit this step
Reset
refresh vertex u
exit this step
4 Typical Evolution of Patrolling and Partitioning
During a patrolling cycle, an agent attempts conquests over all the
border edges of all vertices of its region. Hence its region may expand
with additional vertices bordering its route. This causes the spanning
tree defined by its DFS-route to have an ever growing number of
branches as the patrolling cycles continue, resulting in a tree shape
resembling a "snow flake" .
Additionally, agents have a strong tendency to form "rounded"
regions, if the environment and other agents' regions allow it. This
happens because vertices that are candidates for conquest and are
adjacent to more than one of the region's vertices, have a higher
probability to be conquered and incorporated into the patrolled re-
gion.
Fig. 3. Rounded and Thick Regions build-up by 12 ants on a 50x50 grid
28
These two properties, the snow-flake like spanning tree and rounded
build-ups, often assist in achieving a smooth evolution towards con-
vergence. Thick regions make the possibility of major "balloon explo-
sions" unlikely. The thiner branches at the ends of the snow-flake-like
region, cause the pruning of the region by another agent to merely
"shave" off small fragments from the region, and are less likely to
cut out a large portion of its vertices. Moreover, if a greater portion
was cut out by pruning, it is highly likely that the lost portion is
connected by edges that were not pair trails, making it is easier for
the losing agent to regain its vertices.
Figure 4 depicts a chart showing a typically observed evolution
of 12 regions in a 50x50 square grid. The chart describes how the
sizes of the regions change with time. The images of Figure 3 are
two snapshots taken during the same evolution, the second snap-
shot being of the balanced partition that the agents reached. The
chart shows that some regions grew faster than others, then at some
point, the regions grew enough so that the graph was covered (or
close to being covered due to continuous pruning), and the smaller
regions began to grow at the expense of the larger regions until they
all reach a very similar size, albeit not yet balanced. For practical
purposes arriving to this state in the graph might suffice, especially
if the graph is constantly changing and a partition that is balanced
is not well defined. This process occurs quickly, then there is a much
29
longer phase towards convergence. The "turbulence" seen at about
t = 30, 000 are due to some mild "balloon explosions" followed by
recovery and convergence. The last plateau towards convergence is
short in this particular example, but in some other simulated exam-
ples it appeared much longer. This is especially noticeable in cases
which the evolution results in the system having two large regions
that are adjacent and have very similar sizes but are not yet bal-
anced, e.g. a size difference of 2 vertices. Such scenarios may increase
the time required for a double visit, which is a condition for conquest.
Fig. 4. A Typically Observed Partition Evolution , 12 agents on a 50x50 grid
30
Figure 5 is a chart depicting time to convergence for a system with
5 agents as a function of the graph size, overlaying results of multiple
simulation runs. It shows that the spread in the time to convergence
grows with size, but it also clear that the majority, depicted as dense
occurrences, are not highly spread in value, indicative of runs of
"typical evolution scenarios" on square grid, as was the environment
tested in these simulations. The dotted line is an interpolation of
average convergence time among the results achieved for each graph
size.
Fig. 5. Time to Convergence as a Function of Graph Size
31
5 Proof of Convergence
The above discussed experimental evidence showcases an evolution
of the system towards a balanced partition (when the topology of
the environment/graph remains stationary), an evolution which is
smooth without "dramatic" incidents, driven by the AntPaP algo-
rithm mimicking pressure equalization. However, AntPaP is a heuris-
tic process, and the experimentally observed smooth convergence is
by no means guaranteed. In the evolution towards balanced parti-
tions there are various events that may substantially alter the size
difference between regions, and lead the system to longer and chaotic
excursions. Chance dictates the way regions expand and, for exam-
ple, a region may build up with less thickness in some areas allow-
ing other agents to cut across it causing "major balloon explosions".
Furthermore, even a quite well-rounded region may be subject to
an "unfair" probabilistic attack, driven to cut through its width and
eventually succeeding to remove a large portion of its area. To make
things even worse, the portion of the split region that ceased to be
patrolled, becomes a readily available prey to neighboring agents.
Therefore, although the system is relentlessly progressing towards a
balanced partition due to the rules of "pressure equalization", such
"balloon explosions" are singular events that may significantly derail
the smooth evolution towards convergence, slowing the process con-
32
siderably. One may wonder if there are conditions were these events
occur repeatedly, making the convergence into a balanced partition
an elusive target, that may even never be reached.
Clearly, there are systems where a balanced partition cannot be
reached, simply because one does not exist. An evident example is a
graph having the shape of a star. Consider a graph of 7 vertices, one
at the center and three branches of two vertices each. A system with
7 vertices and 2 agents should be partitioned into two connected
components, one of 3 vertices and the other of 4. But such partition
does not exist, thus repeated balloon explosions will forever occur.
Interestingly, a balanced partition does exist for the same graph with
3 agents.
Therefore, our first step towards proof is to precisely define the
systems of interest, which are based on environment-graphs for which
a balanced partitions exist for any number of agents (up to a bound).
The most general set of such graphs is an interesting question in
itself. For our purposes, we shall limit our analysis to systems of the
following type:
(1) The environment is a graph G that has a Hamiltonian path, a
path that passes through every vertex in a graph exactly once,
with any number of agents n ≤ G patrolling it. Indeed, for any
graph G that has a Hamiltonian path, we can find multiple possi-
bilities for a balanced partition for any number of agents n ≤ G.
33
To name one, the partition where each region includes vertices
that are all adjacent one to another along the Hamiltonian path,
and the regions are chained one after another along the path.
Some of the regions can be of size
and the others of size
(cid:22)G
(cid:23)
n
(cid:22)G
(cid:23)
n
+ 1. Note that for our purposes, the path does not need to
be closed, so the existence of a Hamiltonian cycle is not required.
(2) The environment is a k-connected graph, a graph that stays con-
nected when any fewer than k of its vertices are removed, with
n ≤ k agents patrolling it. In [14], Gyori shows that a k-connected
graph can always be partitioned into k components, including k
different and arbitrarily selected vertices.
We shall analyze the evolution of the system as a stochastic process,
and base our proof of convergence on the theory of Markov chains.
The remainder of this section is organized as follows: we define a
"system configuration" by considering a simple evolution example
and show that there always exists a mapping from configurations to
well defined "states". We then look at more complex configurations
and realize that although the set of configurations is not bounded,
it can be divided into a finite set of equivalence classes, each class
representing a state. Hence, we conclude that the number of states
in the Markov chain is finite, and the evolution of the configurations
maps into corresponding transitions between the states of the chain.
34
Next we use the concept of consistency of a region, as presented in
Lemma 1, to conclude that if a balanced partition is attained, it may
persist indefinitely. This means that balanced partitions map to re-
current states in the Markov chain. We use this result to analyze the
structure of the stochastic matrix that describes the chain. Then we
turn to prove that it is only the balanced partitions that are mapped
to recurrent states. We first abstract the complexity of the problem
by classifying all possible graph partitions into mutually exclusive
classes: uncovered, covered but unbalanced, balanced but unstable,
balanced and stable. Then we proceed to analyze the changes that
may cause the system to shift from a configuration in one class to a
configuration in another. Finally we show that when the graph has a
Hamiltonian path or is k-connected, despite the possibility that the
system may repeatedly transition between these classes, it cannot do
so indefinitely and will inevitably have to sink into a recurrent state
that belongs to a set of states which are all assigned to the same
balanced partition, forming a so-called "recurrent class".
Definition 1. The vertices and edges of the graph with their respec-
tive pheromone markings, and the agent locations, will be called a
configuration of the system, and denoted by C. Recall that, as dis-
cussed in section 3 (sub-section "Agents"), more straightforward time
markings, (in which the current time, ϕ0 (v) = t, is marked), can be
35
used to emulate their equivalent pheromone markings with temporal
decay.
Fig. 6. Starting at configuration CA, the system must move to CB and then to CC.
Then it will stochastically transition to CD1, CD2, CD3, CD4 or CD5.
CC and CD5 are equivalent since both have the same pheromone decay levels. The values
shown are time markings (ϕ0, ϕ1).
The diagram of Figure 6 depicts an example of transitions be-
tween configurations of a system of a 4-vertex graph on which two
agents, the green and the cyan, are active. CA is the initial configura-
tion at t = 0 . Agents, shown as dots, are placed at some random ini-
tial vertices that are colored according to the agent patrolling them,
green at the top-left vertex and the cyan at the bottom-right vertex.
The pheromone markings on vertices are shown as ordered pairs of
time markings (ϕ0, ϕ1), where ϕ0 is the most recent time that a ver-
36
tex was marked with pheromone, and ϕ1 is the previous time that the
vertex was marked (so, generally, ϕ0 > ϕ1). When the two agents
wake up at time slot t = 1, the readings of pheromone marks around
are all zero, therefore the double visit condition ϕ1 (u) > ϕ0 (v), is
not met, and conquests are prohibited. Hence the only possible action
for the agents is reset, i.e. leaving a fresh pheromone mark ϕ0 (u) = 1
(the current time), and thus transitioning to the new configuration
CB. At t = 2, the double visit condition is again not met, and the
system transitions to CC (recall that according to the AntPaP al-
gorithm, at the time that a pheromone is marked on a vertex, the
previous mark is moved from ϕ0 to ϕ1). At t = 3, conquest condi-
tions are met for both agents, and the system may now transition
to any one of the configurations {CD1,CD2,CD3,CD4}, according to
whether one or more conquests succeed, or to CD5, with a probabil-
ity of (1 − ρc)3, if all 3 conquest attempts fail . It is important to
notice that CD5 is equivalent to CC (and in fact the configurations
are identical in terms of temporally decaying pheromone markings
since (3, 2)at t=3 ≡ (2, 1)at t=2 ≡ (t, t − 1)at t). In both we have a
ϕ0 pheromone that has been freshly marked, so (t − ϕ0) = 0 , and
a ϕ1 which has been marked on the immediately preceding time slot,
hence (t − ϕ1) = 1. We can, therefore, map each configuration of
Figure 6 to distinct "states", states 1, 2, . . . , 7, as depicted in Figure
7, and group CD5 and CC into an equivalence class of system con-
37
figurations, were configurations in such equivalence class map to the
same "state" (in this case the equivalence class that includes CD5 and
CC maps to state 3).
Fig. 7. States Matching the Configurations of Figure 6
Calculating transition probabilities between "states" is straight-
forward, but sometimes subtleties arise, for example:
P (State 1 → State 2) =P (State 2 → State 3) = 1,
P (State 3 → State 3) = (1 − ρc)3 (both agents attempt con-
quests, but fail), and
2 (ρc) (1− ρc) + 1
P (State 3 → State 7) = 1
2 (1 − ρc)2 ρc (due
to the strong asynchronous assumption, the cyan agent has a proba-
2 to move first within the time slot, and if so, its attempted
conquest has a probability ρc to succeed. The result is multiplied by
bility of 1
38
a probability (1−ρc) that the green agent fails in its conquest. If the
green moves first, there is a probability (1 − ρc)2 that it would fail
both attempts, and then a probability ρc that the cyan succeeds).
Definition 2. An edge (u, v) which is part of a pair-trail pattern
marking, so that ϕ (u, v) = ϕ (v, u) = ϕ (v), will be called a pair-
trail edge.
Definition 3. For a time interval in which no conquests or losses
of a vertex in a region occur, the region is considered "stable".
Lemma 2. A system comprising a graph G with time-invariant topol-
ogy, and k agents, in a configuration CN, satisfying
(1) The k regions marked by the agents are consistent
(2) Pheromone marks exist only on vertices and pair-trail edges in-
side the k-regions, and no pheromone markings exist elsewhere
on the graph,
will transition through a finite sequence of M of states, where M is
the least common multiple of the cover times of the k-regions (i.e.
M = lcm (∆t1, ∆t2, . . . , ∆tk)), prior arriving to a configuration
CM equivalent to CN (i.e. CM ∼ CN ), as long as the k regions are
stable (no conquests or losses occur).
Proof. A consistent region Gi is a region for which ϕ0 (v)− ϕ1 (v) =
∆ti, ∀v ∈ Gi, where ∆ti is the cover time of region Gi (see Lemma
39
1). Therefore, as long as the region is stable, all vertices and all
pair-trail edges of Gi, cyclically return to the exact same decay-
ing pheromone levels, i.e. exactly the same temporal differences t −
ϕ0 (v) (where t is the current time) every ∆ti steps. We can thereby
consider the k regions in the partition, each repeating its pheromone
level markings independently, as k cyclic processes each with its own
cycle time. Hence, all the processes complete an integer number of
cycles every M steps, where M is the least common multiple of the
cycle times, M = lcm (∆t1, ∆t2, . . . , ∆tk), which ensures that all
vertices of all the k regions in the configuration CM that was reached
have exactly the same temporal differences as in CN, and therefore
(cid:117)(cid:116)
CM ∼ CN.
In the above Lemma, we required to have no pheromones at all
on edges that are not pair-trail edges. But, if there were markings
on such edges, the patrolling agents would simply ignore them, ac-
cording to the AntPaP algorithm. Therefore such markings have no
influence on the possible future evolutions of the system. We shall
formally define states of the system by grouping together configura-
tions that have "the same future evolutions", i.e. same possible future
configuration transition sequences with the same probabilities. For
example, as seen above, configurations that differ only by levels of
pheromones on non pair-trail edges form such equivalence classes,
40
hence each class defines a distinct state. In systems theory, this is
the classical Nerode equivalence way of defining states.
Accordingly, two configurations that do not have the exact same
patrolling routes (either not having the same k regions, or the agents
have developed different patrolling paths within the regions) cannot
have the same future evolutions, since, even without any conquests
or loses, the future sequences of configurations that the systems go
through are different due to the different patrolling steps. Therefore
these two configurations can not belong to the same equivalence class
thus represent distinct states.
Next we turn to discuss pheromone markings that may exist on
vertices and edges that are not part of any current patrolling route,
hence outside of all the regions. Such scenarios may occur as result
of a successful conquest by an agent that disconnects the region
of a neighbor and hence prunes the spanning tree of that agent,
splitting it into two or more disjoint branches. Clearly, the latter
agent remains on one of these branches, while the others cease to be
part of its patrolling route and remain "isolated".
Definition 4. A segment of a spanning tree (i.e. a set of vertices
marked with pheromones and connected by pair trails) that is not part
of a patrolling route, thus not included in any of the regions, forms
what we shall call an isolated branch. For completeness, a single
41
such vertex that is not connected by a pair-trail is also considered an
isolated branch.
In our pheromone marking model we have not limited the pheromone
decay, thus, on an isolated branch, pheromones may decay indefi-
nitely. This means that there is no bound to the set of configura-
tions, and raises the question of whether there exists a bound to the
set of equivalence classes to which they can belong, hence a bound
on the number of states of the system. We shall, therefore, consider
configurations that include isolated branches, and analyze the effect
of pheromone decay in these branches on the evolution of the system,
or more precisely, how such decay influences "future" system states.
We have already seen that two configurations that do not have the
exact same patrolling routes must represent different states, thus we
shall verify that this distinction, by itself, does not produce an un-
bounded number of states. The number of permutations of possible
k stable regions is finite (in a finite graph), and for each such per-
mutation, the number of permutations of possible routes for the k
agents must be finite too (since each of the k regions have a finite
number of edges).
We are therefore left to show that starting at any arbitrary config-
uration with k agents patrolling k regions that also include isolated
branches, all future evolutions in an arbitrarily large interval in which
42
all k regions remain stable, can be grouped into a finite number of
equivalence classes.
Let us consider a setup of k regions and an isolated branch, where
the regions are stable in an arbitrarily large interval, and further as-
sume that a vertex v of the isolated branch is adjacent to a vertex u
in one of the regions (See figure 8). Since the regions are stable, every
patrolling cycle the value ϕ0 (u) is refreshed, thus its time-marking
increases with each cycle. On the other hand, the time marking
ϕ0 (v) of the vertex in the branch remains unchanged. When the
agent is on vertex u the following scenarios may arise:
Fig. 8. An agent (black dot) on a vertex u adjacent to a vertex v on an isolated
branch that is marked with the agent's pheromone. The solid line represents an edge,
the arrows represent pair-trail edges. Rejoining the lost vertex v on the isolated branch
results in pruning the isolated branch into disjoint parts. One with the upper two
vertices, another with the lower three.
43
(1) The vertex v on the branch might be marked with the same
agent's pheromone, and hence moving into the adjacent vertex
consists of the action of rejoining a vertex previously lost. Ac-
cording to AntPaP, agents check for a double visit condition, i.e.
ϕ1 (u) > ϕ0 (v), prior to this action. When traversing onto the
vertex, e.g. at time t, the agent marks there a fresh pheromone
ϕ0 (v) = t. This may result in splitting the isolated branch into
two or more disjoint branches. The agent will then follow the
pair-trails emanating from vertex v at which it is presently lo-
cated, oblivious to the fact that pheromone marks on pair-trails
and vertices of the branch are old. Thereafter the agent traverses
the section of the previously-isolated branch it is located on, thus
refreshing its marks, until all the section is visited (e.g., in the
example of Figure 8, the agent will visit all vertices on the lower
section), then it returns to the vertex u from which the conquest
was launched. The other disjoint branches (in the example of
Figure 8, the upper section) remain isolated.
(2) if the branch is marked with another agent's pheromone, and con-
quest conditions are met (e.g. double visit (ϕ1 (u) > ϕ0 (v)) and
the regions size difference is not exactly one vertex ( or equiva-
lently the difference in cover time is not 2 , i.e., (ϕ0 (u) − ϕ1 (u))+
2 (cid:54)= (ϕ0 (v) − ϕ1 (v)) ), the agent may attempt a conquest on
44
the vertex v and thereafter on all the vertices of the branch, one
by one.
(3) if the branch is marked with another agent's pheromone but
the double visit condition is not met (i.e. ϕ1 (u) ≯ ϕ0 (v)), it
may remain so only for at most two cycles of patrolling. Note
that ϕ1 (u) is growing with each agent's visit, while ϕ0 (v) re-
mains unchanged and as a result a double visit condition will
necessarily arise. Furthermore, meeting the double visit condi-
tion also ensures that all the additional conquest conditions are
met at the same time, since either the cover time encoded in
the vertex of the isolated branch indicates a region size con-
ducive to conquests, or the agent recognizes that the neighbor-
ing region is stagnated (not being patrolled for too long, i.e.,
(t − ϕ1 (v)) > (ϕ0 (v) − ϕ1 (v))). Therefore any further decay
of the pheromone mark on the isolated branch will not influence
the future behavior of the system.
A double visit is, therefore, a sufficient condition for an agent to
conquer or rejoin a vertex on an adjacent isolated branch, hence we
conclude the following:
Lemma 3. A system comprising a graph G with time-invariant topol-
ogy, and k agents, in a configuration C that includes exactly one
isolated branch will transition through a finite sequence of at most
N + M states, where N = 2 ∗ max (∆t1, ∆t2, . . . , ∆tk) and M =
45
lcm (∆t1, ∆t2, . . . , ∆tk), where ∆ti is the cover time of region Gi,
as long as all the regions are stable (no conquests or losses occur).
Proof. The completion of two patrolling cycles of a region by its
patrolling agent ensures that the double visit condition is met at
any vertex u of the region adjacent to a vertex v of the isolated
branch (see discussion above). Therefore, after an interval of N =
2 ∗ max (∆t1, ∆t2, . . . , ∆tk) (i.e. when the agent on the largest
region completed two patrolling cycles) it is certain that the double
visit condition is globally met (i.e. for any vertex u on any of the
regions adjacent to any vertex v in the isolated branch). Moreover,
it will be met on any time step that follows (as long as the regions
are stable). Hence any two configurations on which the double visit
condition is globally met, and have the same levels of pheromones
on vertices and pair-trail edges that are in the k regions (but may
differ in levels of pheromones on the isolated branch) are equivalent.
Since we also know, based on Lemma 2, that every
M = lcm (∆t1, ∆t2, . . . , ∆tk) time steps, all pheromones in ver-
tices and pair-trails included in the k regions cyclically return to the
exact same decaying pheromone levels (i.e. exactly the same tempo-
ral differences), we conclude that a system in a configuration C, will
transition at most N distinct states to a configuration CN (on which
the double visit condition is globally met) and then will cyclically
46
transition through M states reaching, at each cycle, a configuration
(cid:117)(cid:116)
CM ∼ CN.
Our next analysis is of the effect of multiple isolated branches
on future evolutions of a system with stable regions. Consider two
scenarios, both starting with the same configuration that has one
isolated branch. An arbitrary time later, a conquest creates another
isolated branch, the second branch being the same in both, only the
time of its creation is different. Hence, there can be an arbitrar-
ily large time difference between the creation of the second isolated
branch in the two scenarios. Contemplating the case of an arbitrary
number of isolated branches created each at an arbitrary time, the
complexity of such presented scenarios may substantially grow. Nev-
ertheless, in term of system states the above complexity does not
matter. Once the decay of pheromones on an isolated branch is such
that the double visit condition is globally met, the conquest or rejoin
threshold is triggered, and afterwards no amount of further decay
affects the future evolutions of the system. This insensitivity holds
regardless of the presence of other isolated branches, simply because
the double visit is a local condition, limited to the time difference en-
coded in pheromones a on a vertex in a region and an adjacent vertex
on the branch. Thus, any two configurations that differ only by level
of pheromones on isolated branches for which the double visit condi-
tion is globally met, are equivalent. Particularly, there must exist a
47
configuration such that the level of pheromones on isolated branches
is at its "highest level", i.e. the time marking on each vertex of each
isolated branch is the highest that allows the double visit condition
to be globally met. A branch with such "highest level" will have one
vertex v, where v = argmax (ϕ0 (w) , w ∈ isolated branch) with
a time-mark value ϕ0 (v) = t − (M + N ) where t is the current
time (i.e. a pheromone was left there M + N steps before the cur-
rent time), and all other vertices and edges with (lower) values that
agree with the ordered directions of pair-trails.
Hence we conclude, again, that any configuration C that includes
multiple isolated branches will transition at most M + N distinct
states as long as all the regions remain stable.
Theorem 1. For a system with a graph G of stationary topology,
and k agents, the set S of states is finite.
Proof. Based on the above analysis, we conclude:
(1) any configuration C is equivalent to a configuration CP identical
to C except for having no pheromone marking on edges that are
not pair trails.
(2) any configuration CP that includes isolated branches is equiva-
lent to a configuration CA identical to CP except by the levels
of pheromones on vertices and pair-trail edges in those isolated
branches that globally meet the double visit condition on both
48
configurations. Specifically, in CA, vertices and pair-trail edges on
each such isolated branch, will be of a "highest level", i.e. will have
one vertex v, where v = argmax (ϕ0 (w) , w ∈ isolated branch)
with a time-mark value ϕ0 (v) = t − (M + N ) where t is the
current time (i.e. a pheromone was left there M + N steps be-
fore the current time), N = 2 ∗ max (∆t1, ∆t2, . . . , ∆tk) and
M = lcm (∆t1, ∆t2, . . . , ∆tk) , and all other vertices and edges
with values that agree to the directions of pair-trails.
Therefore any configuration C is grouped in an equivalence class with
a correspondingly "representative" configuration CA. To find out how
many such classes exist, we observe that a CA includes the following
elements: k regions with k patrolling routes, isolated branches that
do not globally meet the double visit condition and isolated branches
of a highest level of time-markings that globally meet the double visit
condition.
However, we have that:
(a) The number of possible choices of k regions is finite (in a finite
graph).
(b) For any arbitrary set of k regions, the number of possible routes
in the k regions is finite.
(c) For any arbitrary set of k regions (with a particular selection of k
routes) the number of vertices not included in these is finite, thus
the number of possible isolated branches is finite (and their possi-
49
ble assignments to whether they meet the double visit condition
or not is also finite).
Therefore the set of possible representative configurations CA is fi-
nite, each defines an equivalence class corresponding to a distinct
state of the Markov chain, hence the set S of system states is finite.
(cid:117)(cid:116)
Concluding the above analysis we see that in spite of the infinite
number of configurations possible for a system, the number of system
states, though quite large, is finite. Let us denote the finite set of
states of a system by S.
Definition 5. (Gallager [15]), A Markov chain is an integer-time
process, {Xn, n > 0} for which the sample values for each random
variable Xn, n > 1 lie in a countable set S and depend on the past
only through the most recent random variable Xn−1.
Clearly, any state of the system at time n, formally represented by
Xn ∈ S, is dependent only on the previous state Xn−1 ∈ S, since
our agents have no memory, and their decisions are based solely on
readings from vertices and edges of the configuration, which are com-
pletely described by Xn−1. We can, therefore, analyze the evolution
of the system based on the theory of Markov chains. Our aim is to
prove that the Markov chain is not irreducible (i.e. given enough
time, the probability to reach some of its states tends to zero), and
50
that all its recurrent states represent balanced partitions. To proceed
with our analysis, we notice that the size of set S grows very fast
with the size of the graph. Calculations show that even the simple
example of Figure 7 develops to a surprisingly large chain. In order
to be able to describe the evolution of the system in a simple manner,
we also define a partition of the environment.
Definition 6. The coloring of each vertex of a configuration C by
its patrolling agent along with the set of unvisited vertices form a
partition P of the graph. Partitions are unconcerned about the levels
of pheromones on the vertices and indifferent to agent locations, thus
only exhibit the regions of C.
Many different configurations (and hence states too) correspond
to the same partition, therefore we can use the concept of a partition
as an abstraction referring to all those configurations.
Fig. 9. An example partition P of the graph
Figure 9 is an example of a partition of the environment graph
that the system we discussed above arrived to. From our previous
discussion we know that it represents a set of states of the underlying
Markov chain. One characteristic of that set of states is that it con-
tains a cyclic path. This reflects the fact that agents may cyclically
51
repeat their patrolling route for some period of time during which
conquests or losses do not occur, and the partition remains station-
ary. In fact, having a cyclic path in the underlying Markov chain is
characteristic of any reachable partition.
Eventually conquests or losses are stochastically enabled leading
to a different partition, and, as a result, to a different set of under-
lying states. In Figure 10, the system may remain in partition A for
a while, as the underlying chain cycles through the relevant states,
but eventually it will probabilistically transition to one of the par-
titions B,C,D,E. Note that the transition from A to D means that
both agents conquered one vertex each during the same time-slot.
Fig. 10. Transitions between partitions (note that these transitions may correspond to
many different transitions between possible configurations or states, see figure 7)
A recurrent class in a Markov chain is a set of states which are all
accessible from each other (possibly passing through other states),
and no state outside the set is accessible (Gallager [15]). The fol-
52
lowing Lemma shows that the set of states corresponding to any
balanced partition includes recurrent classes:
Lemma 4. If a system remains in a balanced partition for a period
of time equal to twice the cover time of its largest region, it will
remain so indefinitely.
Proof. We know from Lemma 1, that if a region remains unchanged
for a period of time which is twice its cover time, it becomes consis-
tent, so the pheromone levels in all of its vertices correctly indicate
its cover time, ϕ0 − ϕ1 = ∆t. Therefore if the system remains in
a balanced partition for a period twice the largest cover time (the
cover time of its largest region), it is guaranteed that all the regions
are consistent. Hence, we conclude that no conquest attempts are
subsequently possible, since the system is balanced and conquest
(cid:117)(cid:116)
conditions can not be satisfied across any border edge.
The conclusion of Lemma 4 is that a balanced partition with all
its regions consistent, must correspond to a recurrent (and periodic)
class in the Markov chain. The random process continuously re-
peats a series of states based on the individual agents' patrolling cy-
cles. Since agents may reach different patrolling routes for the same
region, a balanced partition may correspond to multiple recurring
classes. Additionally we can conclude the following:
53
Lemma 5. A system may enter a state in which the partition is
balanced, and then move into a state in which the partition is not
balanced.
Proof. Clearly, we see while the conditions for consistency are not
satisfied for one or more regions in the partition, a conquest or loss
may possibly happen, hence the partition may become unbalanced.
(cid:117)(cid:116)
Since recurrent classes exist, the stochastic transition matrix of the
Markov chain of the patrolling system must have the form:
T TR
M =
0 R
where T is a matrix of transitions between transient states (for exam-
ple those corresponding to non-balanced partitions), R is a matrix
of transitions between states in recurrent classes (for example those
corresponding to balanced partitions with consistent regions), and
TR describes the transitions from transient to recurrent states (for
example those corresponding to balanced partitions with inconsis-
tent regions as described in corollary 5). Note that we assume an
initial distribution given by a row vector ¯π0 and hence the future
distributions evolve according to ¯πk+1 = ¯πkM.
54
Each recurrent class representing one particular occurrence of k
routes in the k regions contributes a section Ci to R, of the form of
a shifted identity matrix,
1 0
0 1 0 ··· 0
...
...
··· 0 1 0
··· 0 1
··· 0
0
1 0
Ci =
The rank of Ci is M = lcm (∆t1, ∆t2, . . . , ∆tk) (i.e. the least com-
mon multiple of the cover times of the k regions), and is a function
of the sizes of the regions in the partition. The contribution of a
particular balanced partition would be a matrix Pj that comprises
of a set of Ci matrices on its diagonal,
C1 0 ···
0 C2
...
C3
0 ···
0
...
... 0
0 Cr
Pj =
where r here is the finite number of possible route combinations in
55
the regions that form the partition. Therefore our goal is to show
that the structure of R is
R =
P1 0 ···
0 P2
...
P3
0 ···
0
...
... 0
0 Pn
listing contributions from a finite number n of possible balanced
partitions. To achieve this we must prove that recurring classes that
are not representing balanced partitions do not exist. This is done
next.
To visualize the problem, we will classify all possible partitions
as shown in Table 1, recalling that a partition P represents a set of
states in the underlying Markov chain:
By construction of the classifications CL1,CL2,CL3,CL4 it is
clear that these are mutually exclusive as well as complete, hence
they divide the set of all possible partitions, so that any partition
P can belongs to one and only one of the four defined classes. It
also means that any state of the system X ∈ S can be classified to
one and only one of the above classes. CL4 includes the set of par-
titions that comply with Lemma 4, and CL3 includes the partitions
56
Partition Class Name
Not Covered
CL1
CL2
CL3
CL4
Table 1. Classification of Partitions
Covered,
Not Balanced
Description
Any partition P that includes at
least one vertex that is not part
of a patrolling cycle.
Any partition P /∈ CL1 that
includes two adjacent regions
with size difference greater than
one.
Balanced, Unstable Any partition P /∈ {CL1,CL2}
where one or more inconsistent
regions.
Any partition P /∈ {CL1,CL2}
where all regions are consistent.
Balanced, Stable
(Convergence)
of Lemma 5. Our goal is to show that from any initial state X ∈ S
the system will reach some state in CL4.
Figure 11, which we will soon justify, depicts the possible tran-
sitions between the classes, i.e. from a state in one class, exists a
transition sequence in the Markov chain to a state in another class
as depicted in the diagram.
We first observe that clearly, any state in CL1 or CL2 must be
transient, the system cannot remain in any one of them indefinitely.
In CL1 the partition includes free vertices (that are not part of any
region). For an agent that persist in visiting a neighboring vertex,
conquest conditions will be eventually met, and the agent will make
57
Fig. 11. Partition Class Transitions Diagram
repeated attempts to conquer it. Eventually all free vertices will be
conquered and the graph becomes covered. Similarly, on CL2, when
an agent visits a vertex bordering a larger region there is a chance it
will conquer the neighboring vertex. The conquest could cause the
pruning of the spanning tree and even a balloon explosion of the
larger region, and the system shifts to CL1, or maybe, by chance, it
will move to a balanced partition and end up in CL3.
In CL3 the system is balanced but inconsistent. We know from
Lemma 4 that it can become consistent, thus shift to CL4, since
there is always a chance that no conquests or losses will occur in
any finite period of time. If a conquest does occur, it may become
unbalanced, and then we are back to CL1 or CL2. So any state in
CL3 is transient and may sink to a state in CL4.
58
We are left to show that from any state in CL1 and CL2 there
exists a path to CL3. A sequence of states that switches the system
back and forth between CL1 and CL2 is the scenario were the sys-
tem repeatedly evolves to a covered graph only to retract by events
such as a balloon explosion. We will show now that from any con-
figuration there is a strictly positive probability to find a balanced
partition, hence move to CL3, and as result there is a strictly pos-
itive probability to get into CL4. This means that CL4, the set of
balanced partitions, are the only partitions that map to recurrent
classes. To do that we recall our restriction to Hamiltonian graphs
(or k-connected graphs) and invoke the property of vertex loss.
Lemma 6. Given a system with an environment graph G having
a Hamiltonian path (or a k-connected graph), and n agents, in an
arbitrary configuration C0, there is a strictly positive probability for
the system to evolve to a balanced partition.
Proof. Let us assume the contrary, that there exists a configura-
tion C0 representing a state s0 ∈ {CL1,CL2} such that the prob-
ability of any arbitrarily long step sequence starting at C0 to ar-
rive into a state in CL3 is strictly zero. We first note that there
is a strictly positive probability that the next change of a region is
the loss of a vertex. Namely, assume that for a sequence of con-
figurations {C0,C1, . . . ,CN}, where N is finite, at configurations
{C0,C1, . . . ,CN−1} there were no changes to any of the regions in the
59
partition of the environment, and at CN one or more of the regions
lost one vertex each, following failed conquest attempts. This could
repeat and consequently, there is a strictly positive (though very
small) probability for a sequence of configurations {C0,C1, . . . ,CM},
where M is finite, to arrive to a configuration CM where each of the
regions is of size 1. Now, we note that there is a strictly positive prob-
ability that the next change of a region is a conquest launched from
one vertex to a neighbor along a given Hamiltonian path. This could
repeat until the regions form one of the possible balanced partitions
along the Hamiltonian path and the system is now in CL3. This
evolution contradicts our assumption regarding C0, and we therefore
conclude that {CL1,CL2} is a transient set, thus from any arbi-
trary configuration there is a strictly positive probability to arrive
to a balanced partition.
Note that a similar argument can be made for a k-connected
(cid:117)(cid:116)
environment graph.
We therefore conclude:
Theorem 2. A system with a Hamiltonian or k-connected graph G
with stationary topology, and n agents implementing AntPaP con-
verges in finite expected time to a balanced and stable partition with
probability 1.
60
Proof. The conclusion from Lemma 6, is that any state s ∈ {CL1,CL2}
is transient. We also know that any state s ∈ CL3 is transient by
Lemma 4. This means that all recurrent classes included in the ma-
T TR
represent balanced
trix R of the stochastic matrix M =
and stable partitions, classified as CL4. A Markov chain described
by a stochastic matrix of this form, will eventually enter a recurrent
0 R
state, regardless of the initial state, and the probability that this
takes more than t steps approaches zero geometrically with t (see,
for example, Gallager [15]). We conclude that a system with a graph
G (of stationary topology) and n agents implementing AntPaP con-
verges with probability 1 and a finite expected time to a balanced
(cid:117)(cid:116)
and stable partition.
61
6 Experimental Results and Discussion
We presented and thoroughly analyzed the AntPaP algorithm for
continuously patrolling a graph-environment with simple finite state
automaton agents (or bots) using "pheromone traces". The simu-
lations presented so far were on an environment in the shape of a
square. On such an environment, we know that many balanced parti-
tions do indeed exist. Practical scenarios are seldom so simplistic. In
many important cases, the environment graph is, in fact, uncharted
and much more complex in its structure. Still, agents implementing
AntPaP will find a balanced partition with probability one (almost
surely), if such a partition exists, and will certainly divide their work
fairly even when such partitions do not exist.
The shape of the environment considerably affects the time to
convergence. The number of balanced partitions that the environ-
ment graph has is, naturally, one of the major factors. So is their
diversity, i.e. how different the balanced partitions are from each
other. If the balanced partitions are similar to one another, the de-
pendency of the time to convergence on the initial locations of the
agents tends to be higher than if the solutions are further apart.
Consider the system of Figure 12. The initial positions of 7 agents
are shown in the first snapshot at t = 1. Next, at t = 896, the lower
section becomes almost covered. At t = 5995, the upper section is
62
almost covered, and the two agents there clearly have larger regions
than the agents in the lower section. At t = 12993, the cyan agent
is trapped in the upper section, and we witness a competition be-
tween the agents from the lower section to grow their regions into
the prolonged section, that the cyan agent abandoned.
Fig. 12. Evolution of a system with 7 a(ge)nts
At t = 85896, the competition ends after the yellow agent tra-
versed into the upper section. Now we have 3 agents on each of the
upper and lower sections, and one on the prolonged section. Soon af-
63
ter, the system reaches a balanced partition. Clearly, there are many
balanced partitions for this system, but all of them have one agent on
the prolonged section, and 3 agents on each of the upper and lower
sections. Initial conditions with 3 agents on the upper and lower
sections each will ensure faster convergence to a balanced partition.
Following this experiment and discussion, it is interesting to consider
a system with the same environment graph and an even number of
agents.
We simulated a system with the same environment graph and 2
agents. This system has only one balanced partition, shown in Figure
13.
Fig. 13. The only balanced partition of a systen with 2 agents
Since only one balanced partition exists, it is reasonable to predict
that the required time for convergence might be substantial. Figure
14 shows snapshots of an evolution of this system. Both the violet
64
and yellow agents are initially located in the lower section. After a
while, the violet agent expands its region so that part of it extends
into the upper section. A while later, the violet region covers almost
all of the upper section as well as the prolonged section. Then, the
yellow agent begins to expand into the prolonged section, eventually
causing a "balloon explosion" of violet's region. Soon enough, the
violet agent responds, and causes a balloon explosion of the yellow's
region.
Fig. 14. Evolution of a system with 2 a(ge)nts
65
Due to the shape of the graph, this cycle may repeat over and over
again. It will stop only when the single possible balanced partition
is reached, and subsequently the regions "lock-in", and the system
remains stable. For that to happen, an agent must conquer the ap-
propriate half of the vertices of the prolonged section. We know that
this will eventually happen with probability 1, however the time it
will take can be very very long.
Fig. 15. A system with a "Cross" graph and 5 agents
Fig. 16. A system with the same "Cross" graph as in Figure 15, and 100 agents
66
The number of agents is also an important factor of conver-
gence time. Generally, more agents hasten the convergence. Figure
15 shows an evolution of a system with 5 agents on a different envi-
ronment. We shall call this environment graph the "Cross". Figure 16
shows a system with the same "Cross" graph and 100 agents. Here,
the "pressure" that an agent "feels" from other "balloons" quickly
accumulates around its region, and the convergence is swift. Figure
17 depicts results of multiple simulation runs, of systems with the
"Cross" graph of figure 15, exhibiting convergence time as a function
of the number of agents.
Fig. 17. Convergence time of a system with a "Cross" graph as function of the number
of agents
67
In some systems, particular numbers of agents may cause a sub-
stantially larger time to convergence. In Figure 18 we present a bal-
anced partition in a graph environment that we call "6 Rooms".
Fig. 18. Balanced partition reached on a "6 Rooms" graph
Systems with a "6 Rooms" graph and 6 agents sometimes require a
substantially longer convergence time, as shown in Figure 19. Ignor-
ing the outliers at 6 agents, Figure 20 shows that the chart exhibiting
convergence time as a function of the number of agents is similar in
shape to the one we have seen for the "Cross" graph, in Figure 17.
68
Fig. 19. Convergence time of a system with a "6 Rooms" graph as function of the
number of agents
Fig. 20. Zoom-In on the chart of Figure 19
69
Fig. 21. An evolution of a system of 10 agents and a "6 Rooms" graph of about 10,000
vertices. Convergence was achieved at approximately t = 4, 000, 000. But the system
became "close to balanced" rather quickly.
Fig. 22. An evolution that reached "close to balanced" quickly, and remain so for long.
In the simulations described above, we tested the evolution of
the multi-agent patrolling process until convergence to a stable and
balanced partition. However remarkably, the system evolves rather
70
quickly to close-to-balanced partitions due to the "balloon" forces
implicitly driving the agents' behavior. Therefore, for practical pur-
poses we see that the AntPaP algorithm balances the work of the
agents much earlier than its convergence time, and the partitioning
becomes reasonably good rather quickly. This property is crucial in
case of time varying topologies. Hence, AntPaP is a versatile and
adaptive process. Considering again the "6 Rooms" example with 10
agents, we see in Figure 21 a temporal evolution of AntPaP until a
stable and balanced partition is achieved. As is clear on the chart
displaying the time evolution of the sizes of the 10 regions, the sys-
tem reached convergence at approximately t = 4, 000, 000 steps.
However it is also clear that after approximately 400, 000 steps, the
difference between the largest and smallest regions in the partition of
the environment graph is already insignificant. In the chart, a system
is defined as "close to balanced" when more than 99% of the graph is
covered, and the difference between the largest and smallest regions
is less than 5% the ideally balanced size (i.e. the graph size divided
by the number of agents). Figure 22 exhibits a partition reached
when the system was "close to balanced". Both snapshots show the
same partition (at two different times). The snapshot at the right
also shows the borders between regions that "reached balance" (i.e.
their size difference is at most 1 vertex) depicted in purple. There
is only one border which is not yet balanced, between the magenta
71
region and the dark yellow region, located in the right "corridor".
These regions are close in their sizes, and as a result the double visit
condition does not occur very often. Despite the partition not being
balanced yet, the division of work between agents is already fair,
hence for practical purposes, a "close to balanced" condition is good
enough.
We note in summary that AntPaP does not produce k-cut parti-
tions [7], and generally assumes that there are no constraints on the
grouping of vertices. Some important real-world problems impose
such constraints, for example, the allocation of users in a social net-
work to hosting servers, according to their interconnections. Other
real-world problems, however, do not impose such constrains, for ex-
ample, the division of work patrolling the world-wide-web for content
analysis and classification. In view of the good properties discussed
above, we envision that AntPaP could become a building block for
distributed algorithms aiming to fairly divide between agents the
labor of patrolling an environment, using very simple agents con-
strained to local interactions based on tiny "pheromone" marks left
in the environment.
72
References
1. Y. Elor, A. M. Bruckstein, "Multi-a(ge)nt graph patrolling and partitioning". Pro-
ceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web In-
telligence and Intelligent Agent Technology-Volume 02. IEEE Computer Society,
2009.
2. I.A. Wagner, M. Lindenbaum, A. M. Bruckstein, "Efficiently searching a graph by
a smell-oriented vertex process". Annals of Mathematics and Artificial Intelligence,
24(1-4):211 -- 223, 1998.
3. S. Even, "Graph Algorithms". Rockville, MD: Comput. Sci. Press, 1979
4. P. Berkhin, "A survey of clustering data mining techniques." Grouping multidi-
mensional data. Springer Berlin Heidelberg, pp. 25-71, 2006.
5. C. J. Alpert, A. B. Kahng, "Recent directions in netlist partitioning: a survey",
Integration, the VLSI Journal , 19(1 -- 2):1-81,1995
6. K. Schloegel, G. Karypis, V. Kumar, "Parallel static and dynamic multi-constraint
graph partitioning", Concurrency and Computation: Practice and Experience, 14
(3):219 -- 240,2002
7. R. G. Downey, V. Estivill-Castro, M. R. Fellows, E. Prieto, F. A. Rosamond,
"Cutting Up Is Hard To Do: the Parameterized Complexity of k -Cut and Related
Problems", Electronic Notes in Theoretical Computer Science, 78():209 -- 222,2003
8. R. Tarjan, "Depth-First Search and Linear Graph Algorithms", SIAM, 1(2):146-
160, 1972
9. J. D. McCaffrey. "Graph Partitioning using a Simulated Bee Colony Algorithm",
IEEE Conference on Information Reuse and Integration (IRI) Las Vegas, USA, pp.
400-405, 2011
10. F. Comellas, E. Sapena, "A multiagent algorithm for graph partitioning". EvoWork-
shops, Lecture Notes in Computer Science 3907:279 -- 285, 2006
11. Y. Chevaleyre, F. Sempe, G. Ramalho, "A theoretical analysis of multi-agent pa-
trolling strategies." Proceedings of the Third International Joint Conference on
Autonomous Agents and Multiagent Systems-Volume 3. IEEE Computer Society,
pp. 1524-1525, 2004.
73
12. F. Lauri, F. Charpillet, "Ant colony optimization applied to the multi-agent pa-
trolling problem." IEEE Swarm Intelligence Symposium, 2006.
13. M. Dorigo, V. M. Maniezzo, A. Colorni, "Ant system: optimization by a colony of
cooperating agents." IEEE Transactions on Systems, Man, and Cybernetics, Part
B (Cybernetics) 26(1): 29-41, 1996.
14. E. Gyori, "On division of graphs to connected subgraphs." Combinatorics (Proc.
Fifth Hungarian Colloq., Keszthely). Vol. 1, 1976.
15. R. G. Gallager, Stochastic processes: theory for applications. Cambridge University
Press, 2013.
16. A. Nerode, "Linear automaton transformations." Proceedings of the American
Mathematical Society 9(4): 541-544, 1958
74
|
1911.09807 | 1 | 1911 | 2019-11-22T01:51:02 | Multi-Objective Multi-Agent Planning for Jointly Discovering and Tracking Mobile Object | [
"cs.MA",
"cs.RO",
"eess.SY",
"eess.SY"
] | We consider the challenging problem of online planning for a team of agents to autonomously search and track a time-varying number of mobile objects under the practical constraint of detection range limited onboard sensors. A standard POMDP with a value function that either encourages discovery or accurate tracking of mobile objects is inadequate to simultaneously meet the conflicting goals of searching for undiscovered mobile objects whilst keeping track of discovered objects. The planning problem is further complicated by misdetections or false detections of objects caused by range limited sensors and noise inherent to sensor measurements. We formulate a novel multi-objective POMDP based on information theoretic criteria, and an online multi-object tracking filter for the problem. Since controlling multi-agent is a well known combinatorial optimization problem, assigning control actions to agents necessitates a greedy algorithm. We prove that our proposed multi-objective value function is a monotone submodular set function; consequently, the greedy algorithm can achieve a (1-1/e) approximation for maximizing the submodular multi-objective function. | cs.MA | cs | Multi-Objective Multi-Agent Planning for Jointly Discovering and Tracking
Mobile Objects
Hoa Van Nguyen,1 Hamid Rezatofighi,1 Ba-Ngu Vo,2 Damith C. Ranasinghe1
1 The University of Adelaide
2 Curtin University
{hoavan.nguyen,hamid.rezatofighi,damith.ranasinghe}@adelaide.edu.au, [email protected]
9
1
0
2
v
o
N
2
2
]
A
M
.
s
c
[
1
v
7
0
8
9
0
.
1
1
9
1
:
v
i
X
r
a
Abstract
We consider the challenging problem of online planning for
a team of agents to autonomously search and track a time-
varying number of mobile objects under the practical con-
straint of detection range limited onboard sensors. A standard
POMDP with a value function that either encourages discov-
ery or accurate tracking of mobile objects is inadequate to
simultaneously meet the conflicting goals of searching for
undiscovered mobile objects whilst keeping track of discov-
ered objects. The planning problem is further complicated by
misdetections or false detections of objects caused by range
limited sensors and noise inherent to sensor measurements.
We formulate a novel multi-objective POMDP based on infor-
mation theoretic criteria, and an online multi-object tracking
filter for the problem. Since controlling multi-agent is a well
known combinatorial optimization problem, assigning control
actions to agents necessitates a greedy algorithm. We prove
that our proposed multi-objective value function is a monotone
submodular set function; consequently, the greedy algorithm
can achieve a (1 − 1/e) approximation for maximizing the
submodular multi-objective function.
Introduction
We study the problem of controlling a team of agents to
jointly track discovered mobile objects and explore the en-
vironment to search for undiscovered mobile objects of
interest. Such problems are ubiquitous in wildlife track-
ing (Cliff et al. 2015; Kays et al. 2011; Nguyen et al. 2019a;
Thomas, Holland, and Minot 2012), search and rescue mis-
sions (Gerasenko et al. 2001; Murphy et al. 2008). For in-
stance, a team of unmanned aerial vehicles (UAVs) can be
deployed to monitor activities of endangered radio-tagged
wildlife in a survey scene, or to search for victims in a disaster
response (Beck et al. 2018). Hence, it is critical to not only
search for undiscovered objects but also track the movements
of discovered objects of interest. Consequently, the overall
team's objectives arise as a natural multi-objective optimiza-
tion problem, where several pertinent goals (i.e., tracking and
discovering) need to be simultaneously achieved.
Intrinsically, searching for undiscovered objects whilst si-
multaneously tracking visible objects are competing goals
Copyright c(cid:13) 2020, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
because, in practice, agent sensor systems, such as cameras,
have limited detection range. A single agent may only ob-
serve a small region of space and a decision to leave a visible
object to explore hitherto unseen regions will lead to los-
ing track of visible objects. Therefore, an agent observing
a small region of the search area needs to collaboratively
interact with other agents to plan its course of actions to col-
lectively maximize the overall team's objectives of tracking
and discovering multiple objects.
Multi-agent planning to achieve multiple competing objec-
tives remains a challenging problem because of the complex
interactions between agents leading to combinatorial opti-
mization problems (Wai et al. 2018). In practice, the problem
is further complicated because: i) the agent sensors are not
only limited in range but also sensitivity, and measurements
are always subjected to environmental noise. Consequently,
object detectors suffer from both missing detections of ob-
jects and false detections; and ii) the number of objects of
interest is often unknown, and varies with time since mobile
objects can enter and leave the scene anytime (Vo et al. 2012).
Most critically, the computation of optimal planning actions
must be timely for real-world applications.
We propose a framework for multiple agents to jointly
plan, search and track a time-varying number of objects us-
ing a novel multi-objective information-based value function
formulation. Our multi-objective value function captures the
competing objectives of planning for tracking and discovery.
We adopt the random finite set (RFS) model for the collection
of objects of interest to account for the random appearance
and disappearance of objects and their dynamics. Our pro-
posed multi-objective value function maximizes information
gain over a look-ahead horizon for both discovered and undis-
covered objects. Most importantly, our multi-objective value
function is proven to be a monotone submodular set function;
thus, we can cope with the intractability of the multi-objective
optimization problem (MOP) by employing a greedy algo-
rithm. Our ability to use a greedy algorithm facilitates the
computation of approximately optimal control actions with
linear complexity in the number of agents for realizing an
online planning method.
Related Work: Multi-agent path planning in partially ob-
servable environments is a difficult problem for which the
Partially Observable Markov Decision Processes (POMDP)
approach has recently gained significant interest (Silver and
Veness 2010; MacDermed and Isbell 2013; Messias, Spaan,
and Lima 2011). Although the cooperation problem can
be formulated as a decentralized POMDP (Dec-POMDP),
its exact solutions are NEXP-hard (Bernstein et al. 2002).
This is especially problematic for multi-agent POMDPs
since the action and observation space grows exponentially
with the number of agents (Amato and Oliehoek 2015).
To cope with this intractability, we adopt the MPOMDP
centralized approach (Messias, Spaan, and Lima 2011)
for controlling multiple agents (Dames and Kumar 2015;
Dames, Tokekar, and Kumar 2017; Wang et al. 2018).
POMDP has also been employed for sensor selection prob-
lems, e.g., (Spaan, Veiga, and Lima 2015; Satsangi et al.
2018) proposed using the ρPOMDP (Araya et al. 2010) for a
mobile agent to select K in N available sensors to search and
track multiple objects. In particular, (Spaan, Veiga, and Lima
2015) proposed a method that always assumes the existence
of one extra object in the scene to encourage discovery. How-
ever, biasing the cardinality estimate generates sub optimal
planing decisions at the cost of tracking performance.
Our study focuses on the problem of controlling a team of
agents for the task of tracking and discovering mobile targets.
The task requires a suitable tracking framework. Studies on
tracking objects have employed approaches such as Multiple
Hypotheses Tracking (MHT) (Reid 1979) or Joint Probabilis-
tic Data Association (JPDA) (Blackman and Popoli 1999).
The complex nature of our problem requires a framework that
has the notion of probability of a random collection due to a
time-varying and random number of objects where the states
of objects are random vectors. The random finite set (RFS)
(Mahler 2007) is the only framework that has the notion of
probability density of a random set. Hence, we adopt RFS as
our tracking framework.
Information-based path planning under the RFS framework
for a single agent has been studied in several works (Beard
et al. 2017; Hoang and Vo 2014; Ristic and Vo 2010). Most
studies on multi-agent path planning using an RFS frame-
work, is based on the Generalized Covariance Intersection
(GCI) methods with the assumption that agents have a con-
sensus view of all objects (Gostar, Hoseinnezhad, and Bab-
Hadiashar 2016; Wang et al. 2018) and using only a single
look-ahead horizon. (Dames, Tokekar, and Kumar 2017) pro-
posed to control multiple fixed-wing UAVs to localize mobile
taxis with a single objective value function. For localizing
and searching objects simultaneously, (Dames and Kumar
2015) and (Charrow, Michael, and Kumar 2015) considered
a similar scenario, but only for stationary objects. Planning
using multi-objective optimization (MOP) has not been ex-
plored yet, except for single sensor selection (Zhu, Wang, and
Liang 2019) or using the weighted sum method presented in
(Charrow, Michael, and Kumar 2015) where the weighting
parameters are difficult to define without prior knowledge.
In contrast, we focus on optimizing all value functions (i.e.,
tracking and discovering) simultaneously using MOP. In par-
ticular, our proposed tracking and discovering value functions
are based on information criteria. The tracking value func-
tion maximizes the mutual information between future mea-
surements and discovered object states under a multi-sensor
Bernoulli filter; the discovering value function maximizes
the mutual information between empty measurements and
undiscovered object states under a grid occupancy filter.
Our contributions: The main contributions of our work
are: (i) We formulate a multi-agent planning problem with
competing objectives and propose a planning algorithm for
searching and tracking multiple mobile objects; (ii) We unify
tracking and planning algorithms under a Bernoulli-based
model; (iii) We prove that our proposed multi-objective value
function is submodular; hence, the greedy algorithm can
be used to rapidly determine the approximately optimal
control actions with a bounded performance guarantee at
(1 − 1/e)OPT.
Problem Formulation
First, we introduce assumptions to help define our problem
and introduce the notations we adopt in our work. Second, we
provide a brief overview of the multi-sensor Bernoulli filter
which unifies the tracking and discovering formulation. Next,
we formulate our MPOMDP multi-agent planning approach
for controlling the multi-agent team.
Assumptions and Notations
Assumptions: We consider a team of S agents surveying a
large area to detect and track an unknown and time-varying
number of mobile objects using detection-based measure-
ments. We assume that each agent can localize itself (e.g.,
using an onboard GPS for UAVs) and that all agents can
communicate to a central node to enables us to adopt the
centralized approach for MPOMDP. Consequently, we as-
sume that all of the measurements are transferred to a central
node that analyzes received information and subsequently
sends control actions to all of the agents. Here, we em-
ploy a discrete control action space to reduce the compu-
tational load (Beard et al. 2017; Dames, Tokekar, and Kumar
2017). We further assume that the measurements from an
object collected by the agents are conditionally independent
given the object's state (Charrow, Michael, and Kumar 2015;
Thrun, Burgard, and Fox 2005).
Notations: We use the convention that lower-case letters
(e.g., x) represent single-object states, upper-case letters (e.g.,
X) represent multi-object (finite-set) states, and blackboard
bold letters (e.g., X, Z) represent spaces. We denote the inner
product(cid:82) f (x)g(x)dx = (cid:104)f, g(cid:105).
Multi-sensor Bernoulli filter (MS-BF)
In practice, an object can randomly enter and leave the surveil-
lance region, hence the number of objects of interest is un-
known and time-varying. Further, it is important to consider
the existence of objects of interest to allow the agents to dis-
cover new objects when they enter the scene and to prevent
agents following false-positives. This can be addressed by
the random finite sets (RFSs) approach, first proposed by
(Mahler 2007). RFSs are finite-set valued random variables.
We assume that each measurement is uniquely identified, e.g.,
transmit frequencies from radio beacons (Cliff et al. 2015;
Kays et al. 2011; Nguyen et al. 2019a; Nguyen et al. 2019b;
Thomas, Holland, and Minot 2012) or MAC address (Beck
et al. 2018; Charrow, Michael, and Kumar 2015), which is
typical for wildlife tracking or search and rescue missions.
Since each object is uniquely identified, we propose using
a the multi-sensor Bernoulli filter (MS-BF) (Vo et al. 2012),
where each object's state is a Bernoulli RFS, and run mul-
tiple MS-BF filters parallelly to track multiple objects. A
Bernoulli RFS X on X has at most one element with prob-
ability r for being singleton or 1 − r for being empty. Its
probability density π(·) = (r, p(·)) given by
X = ∅,
(cid:26)1 − r,
π(X) =
r · p(x), X = {x}.
k
Object tracking with MS-BF: We model each object's state
at time k by Xk as a Bernoulli RFS. The MS-BF propagates
the two quantities: the existence probability r and spatial den-
sity p(·). If the posterior density is πk−1 = (rk−1, pk−1),
then the predicted density πkk−1 = (rkk−1, pkk−1) is
also a Bernoulli RFS, with rkk−1 = rB,k(1 − rk−1) +
rk−1(cid:104)pS,k, pk−1(cid:105); pk−1(xk) = (cid:2)rB,k(1 − rk−1)bk(xk) +
rk−1(cid:104)fkk−1(xk·), pS,k(·)pk−1(·)(cid:105)(cid:3)/rkk−1. Here, rB,k and
◦ ··· ◦ Ψ(1)
pS,k are the probabilities of object birth and object survival,
bk(·) is the object birth density. Further, the updated density
πk is also a Bernoulli RFS, given by πk = (rk, pk) with rk =
Ψ(S)
k (pkk−1).
Here, ◦ denotes composition (of operators), Ψ(s)
is an update
operator for agent s, i.e.:
k (r)] =(cid:104)η(s)(Z (s)·), p(·)(cid:105)r/(cid:2)(1 − r)e−λ(s)
k (rkk−1); pk = Ψ(S)
◦ ··· ◦ Ψ(1)
+ r(cid:104)η(s)(Z (s)·), p(·)(cid:105)(cid:3),
k (p)](x) =η(s)(Z (s)x)p(x)/(cid:104)η(s)(Z (s)·), p(·)(cid:105)
(1)
(2)
where the superscript (s) denotes the parameters of agent
s, λ(s) is the clutter rate, and η(s)(Z (s)x) denotes the like-
lihood of measurement set Z (s) from agent s given the ob-
ject's state x. η(s)(Z (s)x) is also a Bernoulli RFS, given by
η(s)(Z (s)x) =
1 − p(s)
d (x)g(s)(zx), Z (s) = {z}.
p(s)
Z (s) = ∅,
d (x),
(cid:40)
[Ψ(s)
[Ψ(s)
k
k
Here, p(s)
d (x) is the probability that agent s detects object
x, and g(s)(zx) is the (conventional) likelihood function of
measurement z given object's state x.
Planning
At time k, the team of S agents needs to plan how they ma-
noeuvre over the time interval k + 1 : k + H to improve
its estimation of the states of multiple objects Xk, where
H denotes the look-ahead horizon length. Let A ⊆ RN be
all possible set of control actions for a given agent. When
k ∈ A is applied to an agent i, it fol-
the control action ai
lows a trajectory comprised of sequence of the discrete poses
k+H ]T with corresponding
ui
k+1, . . . , ui
k+1:k+H (ai
measurements Z i
k+H ]T (for
k) = [Z i
notational compactness, we omit the dependence on Xk
k ]T ∈ AS be the control ac-
here). Let Ak = [a1
tions where AS = A × ··· × A is the control action space
k+1, . . . , Z i
k+1:k+H (ai
k) = [ui
k, . . . , aS
for S agents, and the corresponding measurement set is
Zk+1:k+H (Ak) = [Z 1
The objective of path planning is to find the optimal action
k ∈ AS that maximizes the value function, i.e.,
A∗
k+1:k+H (aS
k+1:k+H (a1
k), . . . , Z S
k )]T .
V (Xk+1:k+H , Zk+1:k+H (Ak)).
(3)
A∗
k = arg max
Ak∈AS
(cid:104)(cid:80)H
(cid:105)
H(cid:88)
V (Xk+1:k+H , Zk+1:k+H (Ak))
j=1 R(Xk+j, Zk+j(Ak))
where
=
the value function
E
or the expected sum of immediate rewards R(·) over a finite
horizon H. Since an analytic solution does not exist for the
expected reward, we use the predicted ideal measurement
set (PIMS) (Mahler 2004) -- a computationally low-cost
approach. The value function is calculated:
is
V (Xk+1:k+H , Zk+1:k+H (Ak)) =
R(Xk+j, Zk+j(Ak))
j=1
where Zk+j(Ak) denotes the ideal measurement set of
Zk+j(Ak) calculated using the measurement model and
the estimated states of objects without measurement noise.
For notational compactness, we write the value function
V (Xk+1:k+H , Zk+1:k+H (Ak)) as V (Ak).
Planning for Tracking and Discovering
Multiple Objects
Planning for tracking discovered mobile objects
In this problem, we consider maximizing an information-
based reward function to reduce the overall uncertainty of the
discovered mobile objects because more information natu-
rally implies less uncertainty. In particular, we propose using
the mutual information I(X; Z) between the object's state X
and measurement state Z as the immediate reward function,
and the long-term sum of rewards over a finite horizon H, or
so-called the value function is given by
H(cid:88)
V1(Ak) =
I(Xk+j; Zk+j(Ak))
(4)
j=1
where I(X; Z) = h(X) − h(XZ), with h(X) is the gener-
alization of differential entropy for a finite set X ⊆ X with
X f (X) log f (X)δX;
X ·δX is the set integral (Mahler 2007). For Bernoulli
density f (X) defined as h(X) = −(cid:82)
here(cid:82)
RFS, this integration is simplified to h(X) = −(cid:2)f (X =
∅) log f (X = ∅) +(cid:82) f (X = x) log f (X = x)dx(cid:3). We have
the following theorem.
Theorem 1. The mutual information I(X; Z) between the
object state X and measurement state Z is a monotone sub-
modular set function of Z.
Proof. We want to prove that this mutual information
I(X; Z) is a monotone submodular set function, i.e., for
Z1 ⊆ Z2 ⊆ Z, and z ∈ Z \ Z2 independent of Z1 and Z2:
I(X; Z2,{z}) − I(X; Z2) ≤ I(X; Z1,{z}) − I(X; Z1).
Since Z1 ⊆ Z2 ⊆ Z, using mutual information inequalities
(Cover and Thomas 2012, p.50), we have:
I(Z2;{z}) ≥ I(Z1;{z}),
⇔ h(z) − h(zZ2) ≥ h(z) − h(zZ1),
⇔ h(zZ1) ≥ h(zZ2),
⇔ h(Z1,{z}) − h(Z1) ≥ h(Z2,{z}) − h(Z2).
(5)
Further, since I(Z2;{z}X) = I(Z1;{z}X) = 0 is due to
z is independent of Z1 and Z2 given X, we have:
h({z}X) = h({z}X, Z2) + I(Z2;{z}X) = h({z}X, Z2)
= h(X, Z2,{z}) − h(X, Z2),
h({z}X) = h({z}X, Z1) + I(Z1;{z}X)
= h(X, Z1,{z}) − h(X, Z1).
Hence,
h(X, Z2,{z}) − h(X, Z2) = h(X, Z1,{z}) − h(X, Z1).
(6)
Subtracting (5) from (6), we have:
[h(X, Z2,{z}) − h(X, Z2)] − [h(Z2,{z}) − h(Z2)]
≥ [h(X, Z1,{z}) − h(X, Z1)] − [h(Z1,{z}) − h(Z1)]
Using differential entropy chain rules (Cover and Thomas
2012, p.253), we have that h(XZ2,{z}) = h(X, Z2,{z})−
h(Z2,{z}) and h(XZ2) = h(X, Z2) − h(Z2), thus the
above equation is equivalent to
h(XZ2,{z}) − h(XZ2) ≥ h(XZ1,{z}) − h(XZ1)
⇔[h(X) − h(XZ2,{z})] − [h(X) − h(XZ2)]
≤ [h(X) − h(XZ1,{z}] − [h(X) − h(XZ1)],
⇔I(X; Z2,{z}) − I(X; Z2) ≤ I(X; Z1,{z}) − I(X; Z1).
Thus, I(X; Z) is a submodular set function. Further, using
the chain rule we have:
I(X; Z2,{z}) − I(X; Z2) = I(X; Z2{z}) ≥ 0
Therefore, I(X; Z) is a monotone submodular set function.
Remark: Our mutual information formulation is different to
that in (Krause, Singh, and Guestrin 2008) used for sensor
selection problems. Krause et al. showed that for Z ⊆ Z, the
mutual information I(Z; Z \ Z) is a submodular set function.
In other words, the mutual information I(Z1; Z2) is submod-
ular with the property that Z1 ∪ Z2 = Z and Z is fixed. In
contrast, we measure the mutual information between the
random set object state X and the random set measurement
state Z and prove I(X; Z) is also a submodular set function
of Z without the aforementioned property.
Corollary 2. The value function V1(Ak) in (4) is a monotone
submodular set function.
Proof. Since I(Xk; Zk+j(Ak)) is a monotone submodular
set function and V1(Ak) is a positive linear combination of it,
according to (Nemhauser, Wolsey, and Fisher 1978, p.272),
V1(Ak) is a monotone submodular set function.
.
j=1
i
m=1
m=1
m=1
i
i
(7)
w(m)
i
i
− ri
h(X) =
Ns(cid:80)
n(cid:88)
log(riw(m)
set of Ns particles, such that pi(x) ≈ Ns(cid:80)
Mutual Information Calculation based on MS-BF: As-
sume that each object i is associated with a Bernoulli dis-
tribution π(Xi) = (ri, pi). Let pi(x) be approximated by a
δ(x(m) − x)
i = 1 and δ(·) is the Kronecker delta function;
w(m)
with
X = X1 ∪ ··· ∪ Xn be the state of multiple objects. Since
each object is uniquely identified by its label and estimated
by an individual Bernoulli filter, we have
(cid:104) − (1 − ri) log(1 − ri)
)(cid:3)(cid:105)
Ns(cid:88)
(cid:2)w(m)
(cid:2)h(Xk+j) −
V1(Ak) can be calculated as V1(Ak) =(cid:80)H
h(Xk+j Zk+j(Ak))(cid:3), where h(Xk+1) is calculated directly
According to the definition of the mutual information
I(X; Z) = h(X)−h(XZ), thus the tracking value function
h(Xi) ≈ n(cid:88)
in (7). For h(Xk+j Zk+j(Ak)), it has the same form as in
(7); however, rk+j,i and w(m)
k+j,i are calculated by propagat-
ing rk,i and w(m)
from time k to k + j using (1) and (2)
k,i
respectively with the ideal measurements Zk+j(Ak).
Planning to search for undiscovered mobile objects
Occupancy Grid Filter: Since an agent is equipped with
a sensor with a limited detection range, we propose us-
ing an occupancy grid to represent the probability of any
undiscovered objects (Elfes 1989). We extend the static
grid approach in (Charrow, Michael, and Kumar 2015;
Thrun, Burgard, and Fox 2005) by incorporating the birth
probability into each occupancy cell to account for the pos-
sibilities of mobile objects entering and leaving the survey
area, anytime. The survey area is divided into an occupancy
grid G = {g1, . . . , gNg} ⊂ RN , where each cell gi ∈ G
associated with a Bernoulli random variable ri. Here, ri is
the probability that cell gi contains at least one undiscovered
object. For initialization, we set ri
0 = rB such that every
cell has the same prior. Each cell i is propagated through
MS-BF over time using the predict and update equations. In
particular, let ri
k−1 be the probability of cell gi containing
at least one undiscovered object, then its predict and update
probabilities at time k are (8) and (9). Note that since these
objects are yet to be discovered, we use empty measurements
for all agents (denoted as Z∅ to update).
k−1) + ri
◦ ··· ◦ Ψ(1)
k (ri
kk−1 = rB(1 − ri
ri
k = Ψ(S)
ri
k−1pS,
(8)
k
d (gi))(cid:3).
d (gi))ri/(cid:2)1 − ri + ri(1 −
kk−1),
(9)
k (ri)] = (1 − p(s)
where [Ψ(s)
p(s)
Searching for undiscovered objects: As before, we propose
using mutual information as the immediate reward function.
We want to maximize the mutual information between the
estimated occupancy grid G and the ideal empty future mea-
surement Z∅
k+1:k+H (Ak), i.e.,
I(Gk; Z∅
V2(Ak) =
k+j(Ak)),
k+j(Ak)) = H(Gk)−H(Gk Z∅
where I(Gk; Z∅
H(Gk) is the Shannon entropy of Gk:
j=1
k+j(Ak)) and
(10)
(11)
H(cid:88)
(cid:2)ri
Ng(cid:88)
i=1
H(Gk) = −
k log(ri
k)
k) log(1 − ri
+ (1 − ri
k)(cid:3),
and H(Gk+j Z∅
k+j(Ak)) has the same form as in (11) with
k+j from k to k + j using
k+j is calculated by propagating ri
ri
the update step in (9) with empty measurements Z∅
k+j(Ak).
Theorem 3. The value function V2 in (10) is a monotone
submodular set function.
Proof. We can apply a similar strategy as per Theorem 1 to
prove that I(Gk; Z∅
k+j(Ak)) is a monotone submodular set
function, note that H(·) is the Shannon entropy (a discrete
version of differential entropy h(·)). Further, since V2(Ak) is
a positive linear combination of I(Gk; Z∅
k+j(Ak)), according
to (Nemhauser, Wolsey, and Fisher 1978, p.272), V2(Ak) is
a monotone submodular set function.
Multi-objective value function for tracking and
discovering
In this problem, we want to control the team of agents to
perform both tracking and discovering; this naturally leads to
a multi-objective problem. Specifically, we want to maximize
V (Ak) = [V1(Ak), V2(Ak)]T
subject to Ak ∈ AS where V1 and V2 are defined in (4) and
(10), respectively. Multi-objective optimization provides a
meaningful notion of multi-objective optimality such as the
Pareto-set, which represents trade-offs between the objec-
tives such that there is no other solution that can improve one
objective without degrading any remaining objectives (White-
son and Roijers 2016). Online planning necessitates selecting
one compromised solution from the Pareto-set on-the-fly.
One approach is Robust Submodular Observation Selection
(RSOS) (Krause et al. 2008), which is robust against the
worst possible objective; however, even if each Vi is submod-
ular, Vmin = mini Vi is generally not submodular. Other
approaches include Weighted Sum (WS) and Global Crite-
rion Method (GCM); simplicity of these methods are not only
attractive for meeting the demands of online planning but
also result in a submodular value function. In this work, we
adopt GCM to select the compromised solution considering
the distance from the ideal solution. Inspired by (Koski 1993),
we define the value function Vmo (with Vmo(∅) = 0) as:
2(cid:88)
i=1
Vi(Ak) − min
Ak∈AS
Vi(Ak) − min
Ak∈AS
max
A∈AS
Vi(Ak)
.
(12)
Vi(Ak)
Vmo(Ak) =
The global criterion method admits a unique optimal so-
lution from the Pareto-set (Coello et al. 2007). Hence, the
multi-objective problem becomes
A∗
k = arg max
Ak∈AS
Vmo(Ak).
(13)
Since finding the optimal control action A∗ ∈ AS is a com-
binatorial optimization problem, we want to show that the
multi-objective value function Vmo(A) in (12) is also a mono-
tone submodular set function on Z. This enables us to use
the greedy algorithm to find the optimal action that approxi-
mately maximize this multi-objective value function.
Corollary 4. The multi-objective value function Vmo in (12)
is a monotone submodular set function.
Proof. Since Vi(Ak)) is a monotone submodular set function
and Vmo(Ak) is a positive linear combination of it, according
to (Nemhauser, Wolsey, and Fisher 1978, p.272), Vmo(Ak)
is a monotone submodular set function.
Greedy search algorithm
We proved our multi-objective value function Vmo(·) is a
monotone submodular set function -- see Corollary 4. For
submodular functions, (Nemhauser, Wolsey, and Fisher 1978)
proved the greedy search algorithm guarantees a performance
bound at (1−1/e)OPT, where OPT is the optimal value of the
submodular function. Therefore, if the optimal value of our
value function is Vmo(A∗), we can simply state the following
fundamental performance bound for our submodular value
function:
Theorem 5. From (Nemhauser, Wolsey, and Fisher 1978).
Let AG be the output greedy control action and A∗ be the
optimal control action evaluated using brute-force method of
(13). Then
Vmo(AG) ≥ (1 − 1/e)Vmo(A∗)
(14)
where e = 2.718 . . . is the base of the natural logarithm.
Hence, we propose using the greedy search algorithm by
simply adding agents sequentially and picking the next agent
which provides the maximum value function Vmo(·) as pre-
sented in Algorithm 1.
Experiments
We evaluate the proposed value function using a series of
comprehensive synthetic experiments since we can control
all of the parameters of the problem, especially with a time-
varying number of agents and objects. We compare three plan-
ning algorithm formulations: (i) using the single objective
value function V1(·) in (4) for tracking. (ii) using a single ob-
jective value function based on our new discovery value func-
tion V2(·) in (10). (iii) using our proposed multi-objective
value function Vmo(·).
We use optimal sub-pattern assignment (OSPA) (Schuh-
macher, Vo, and Vo 2008) to measure performance. We re-
port OSPA Dist as the main metric to evaluate the overall
team performance since it incorporates both tracking and
discovery indicators. For further insights into our planning
formulations, we also report: (i) OSPA Loc as a localization
Figure 1: Setup for four scenarios: (a) Scenario 1; (b) Scenario 2; (c) Scenario 3; (d) Scenario 4. Start/Stop locations for each
object are denoted by (cid:13)/(cid:3). Start locations for agents are denoted by (cid:63).
Algorithm 1 Greedy algorithm
1: Input: Vmo(·), A (cid:46) Value function and the action space
2: Output: AG ∈ AS
(cid:46) Greedy control actions for all
agents
3: AG ← ∅
4: P ← ∅
5: U ← {1, . . . , S}
6: while U (cid:54)= ∅ do
7:
8:
(cid:46) Initialize the greedy control action
(cid:46) Initialize the agent planned list
(cid:46) Initialize list of agents to plan
for each s ∈ U do
(cid:46) Find the best
As, V s
Vmo(A)
c = arg max
A∈AV ∪{s}
action and value function for each agent in U
end for
s∗ = arg max
s∈U
V s
c
(cid:46) Select the agent s∗ that
provides the best value function
action for agent s∗
AG ← AG ∪ {As∗}
(cid:46) Save the greedy control
P ← P ∪ {s∗} (cid:46) Add agent s∗ into the planned list
U ← U \ {s∗} (cid:46) Remove agent s∗ from the list of
9:
10:
11:
12:
13:
agents to plan
14: end while
15: return AG
accuracy measure, (ii) OSPA Card as an object discovery
performance measure; and (iii) Search Area Entropy as
the average entropy of the occupancy grid to measure the
coverage area of the team. For demonstration, a team of
quad-copter UAVs flying at different altitudes is considered.
The detailed parameter settings are provided in the appendix,
while scenario setups are shown in Figure 1. Our experi-
ments considered four different scenarios and two different
detection-based sensors subject to noisy measurements.
Scenario 1 (FastMoving): Three fast moving objects in
two groups travelling in the same direction. A team of agents
starts at [500, 100]T m as depicted in Figure 1a.
Scenario 2 (LateBirth): Late birth objects. We investi-
gate a searching and tracking scenario in Figure 1b) with four
slow-moving mobile objects using a team of agents. Here, the
groups of objects D and C enter the scene when the agents
are out of their detection range -- late birth. This scenario
favours agent planning with the discovery value function en-
Figure 2: Multi-objective value function ratio between the
greedy V GD
mo algorithms with agents
(a) S = 2 and (b) S = 3 (20 MC runs, range and bearing
based sensor with rd = 200 m).
mo and brute-force V BF
couraging exploration and demonstrates the effectiveness of
our multi-objective value function with its competing track-
ing and discovery objectives.
Scenario 3 (Opposite): Four objects in two groups (A and
B) moving rapidly in opposing directions. Figure 1c illustrates
the scenario. We use this setting to confirm the effectiveness
of our multi-objective value function. Now, the possibility to
discover group B out of the sensor detection range must be
achieved through exploration while planning to track group
A in the vicinity of the agents is immediately rewarded by
the tracking objective.
Scenario 4 (Explosion): Multiple groups of fast moving
objects in opposing directions. Here, we consider a team of
agents to search and track 20 fast moving mobile objects as
shown in Figure 1d.
Detection-based sensors:
(i) We considered agents
equipped with a range and bearing based sensor -- common
in wildlife tracking (Cliff et al. 2015) for example. Let us =
z]T be the position of agent s, xp = [px, py, 1]T be
[ps
the position of object x, each detected object x leads to a
noisy measurement z of range and bearing given by: z =
+ v. Here,·
(cid:2) arctan [(py − ps
x)],xp− us(cid:3)T
y)/(px − ps
x, ps
y, ps
05001000x-coordinate (m)05001000y-coordinate (m)(a)05001000x-coordinate (m)05001000(b)05001000x-coordinate (m)05001000(c)010002000x-coordinate (m)010002000(d)ABABCDAgentsABABCDScenario 1Scenario 2Scenario 3Scenario 40.50.60.70.80.91.0(a)Scenario 1Scenario 2Scenario 3Scenario 40.50.60.70.80.91.0(b)Table 1: Comparing multi-agent planning for tracking mobile objects using our multi-objective value function Vmo across
Scenarios 1, 2, 3 and 4 with detection range rd = 200 m. V1 and V2 are baselines and the results are averaged over 20 MC trials.
Scenario 2 (LateBirth)
Tracking
OSPA
OSPA
Loc (m)
4.0
10.3
5.2
3.6
9.5
5.1
Card (m)
53.0
30.8
46.9
49.8
34.4
33.7
Scenario 4 (Explosion)
50.6
25.2
31.0
31.9
11.7
11.1
3.1
29.8
9.7
5.0
19.5
6.4
Discovery
Performance
Search Area
Entropy (nats)
0.22
0.12
0.17
0.17
0.09
0.11
0.32
0.28
0.32
0.30
0.25
0.29
Agents
S = 3
S = 5
S = 3
S = 5
Indicators
Value
Functions
V1
V2
Vmo
V1
V2
Vmo
V1
V2
Vmo
V1
V2
Vmo
Performance
Performance
Performance
Performance
Scenario 1 (FastMoving)
Tracking
Discovery
Performance
OSPA
Overall
OSPA
Dist (m)
OSPA
Loc (m)
4.4
9.7
6.1
5.1
9.2
5.7
Card (m)
29.5
11.5
11.6
20.3
11.1
11.1
Scenario 3 (Opposite)
48.7
5.5
5.2
48.3
3.6
4.1
3.0
12.8
5.9
2.9
6.9
5.9
33.9
21.2
17.7
25.4
20.3
16.8
51.7
18.3
11.1
51.2
10.5
10.5
Search Area
Entropy (nats)
0.23
0.12
0.17
0.2
0.09
0.13
Overall
OSPA
Dist (m)
57.0
41.1
52.1
53.4
43.9
38.8
0.24
0.12
0.18
0.24
0.09
0.15
53.7
55.0
40.7
36.9
31.2
17.4
is the Euclidean norm; v ∼ N (0, R) with R = diag(σ2
φ, σ2
ρ)
where σφ = σ0,φ + βφxp − us, σρ = σ0,ρ + βρxp − us.
(ii) To demonstrate the sensor-agnostic nature of our ap-
proach, we consider agents equipped with a vision-based
sensor. Each detected object x leads to a measurement z
v ∼ N (0, R) with R = diag(σ2
of noisy xy positions, given by: z = (cid:2)px, py]T + v. Here,
Experiment 1 Comparing greedy and brute force algo-
rithm results for our submodular multi-objective value func-
tion: Figure 2 depicts the ratio of our multi-objective value
function obtained from greedy and brute-force algorithms for
the four scenarios. The result obtained from 20 Monte-Carlo
(MC) runs for each scenario agrees with the performance
guarantee of the greedy algorithm to yield an approximately
optimal solution with a bounded performance guarantee at
(1 − 1/e) OPT.
x, σ2
y).
Experiment 2: Comparing multi-objective multi-agent
planning with single objective multi-agent planning. Table 1
compares results for scenario 1, 2, 3 and 4 collected from 20
MC runs for agents with range and bearing based sensors.
It is expected that the average search area entropy is small-
est for V2 since it encourages agents to explore the search
area. Consequently, V2 can also be seen to generate the best
performance in term so of OSPA cardinality -- OSPA Card.
In contrast, we can see that the multi-agent planning with
the single value function (to encourage only tracking accu-
racy) V1, achieves improved results for object localization
accuracy only (low OSPA Loc results) but at the expense of
missing objects often out of the range of the sensors (as seen
by significantly large OSPA Card results). Most importantly,
our results verify that Vmo performs best in term of overall
tracking and cardinality accuracy (reported by OSPA Dist)
since Vmo not only rewards agents for undertaking the dis-
covery of new objects but also rewards agents for accurately
tracking discovered objects.
Experiment 3: Explore the asymptotic behavior of track-
ing performance with an increasing number of agents for
our planning formulation. Figure 4 depicts the overall mean
tracking accuracy from 20 MC runs for agent teams with
each detection-based sensor. It confirms that planning with
Vmo consistently performs better than V1 or V2 alone. As
expected, when the number of agents increases, V1 and V2
tracking performances improve and approach that of Vmo.
Interestingly, multi-agent planning with a single exploration
objective closely approaches the tracking performance of the
multi-objective value function when the team of agents is
large enough to cover the survey area with its range limited
sensors and all objects become visible to the agents.
Conclusion
In this paper, we have formulated a multi-objective plan-
ning approach for multi-agent tracking and searching for
mobile objects. We have established that our formulation
results in a value function that is monotone and submodu-
lar. We presented a series of extensive experimental results
to demonstrate the effectiveness of our method and perfor-
mance guarantees when using the low-cost greedy algorithm
to determine control actions for the multi-agent.
We consider a centralized MPOMDP approach where scal-
ability can be a limitation. Factored-POMDP (Oliehoek et
al. 2008) can be employed to achieve further system scala-
bility. We require reliable and fast communications between
all agents and their centralized controller. If there are any
delays in communications, the problem can be formulated as
an MPOMDP with delayed communications. It is extremely
challenging to plan and track mobile objects in an online
manner without any communications among agents as in
Dec-POMDP, hence it is an open question for future work.
Acknowledgments
Figure 3 shows the grid occupancy probability and the tra-
jectories of the agents for scenario 3. The results demonstrate
the effectiveness of our proposed planning method, where
agents not only track but discover distant mobile objects.
This work was jointly supported by the Western Australia
Parks and Wildlife (WA Parks), the Australian Research
Council (LP160101177, DP160104662), the Defense Science
and Technology Group (DSTG), and The Shultz Foundation.
Figure 3: Scenario 3. Grid occupancy probability (top) and heat map (bottom) of trajectories for 3 agents over 20 MC runs with
rd = 200 m using (a) V1. Late birth group B never discovered, (b) V2. Extensive exploration, and (c) Vmo. Discovers the late
birth group B whilst tracking both groups.
ground plane to speed up the numerical experiments by track-
ing in 2D. Each object state x = (x, l) is uniquely identified
by its label l, while its motion state x = [px, px, py, py]T
comprises of object's position and velocity in Cartesian coor-
dinates. Each object moves in accordance with the constant
velocity (CV) model given by xk = F CV xk−1 + qCV
k−1. Here,
F CV = [1, T0; 0, T0] ⊗ I2, T0 is the sampling interval (T0 =
1 s for our experiments), ⊗ denotes for the Kronecker tensor
product; I2 is the 2×2 identity matrix; qCV
k−1 ∼ N (0, QCV ) is
a 4 × 1 zero mean Gaussian process noise, with co-variance
0 /2, T0] ⊗ I2. The detection
QCV = σ2
probability is pD(us, xp) =
0 /3, T 2
0 /2; T 2
CV [T 3
(cid:26)0.98
max(0, 0.98 − (xp − us − rd)) otherwise;
xp − us ≤ rd
Figure 4: Overall tracking performance over 20 MC runs
based on multi-agent planning with our multi-objective value
function Vmo compare with the single objective value func-
tions V1 and V2 when the number of agents are increased
from 2 to 10 for Scenario 4 (Explosion) with rd = 200 m
using (a) agents with range and bearing based sensors, (b)
agents with vision based sensors.
Appendix
Parameter settings for experiments
The search areas for the first three scenarios and scenario 4 are
1000 m ×1000 m and 2000 m ×2000 m, respectively. Each
agent is controlled to fly at a fixed and different altitude (i.e.,
5 m altitude gap between each agent) to prevent collisions
with other team members. The minimum altitude starts at
30 m for the first agent and increases 5 m for each additional
agent. Further, all objects are assumed exist on a horizontal
where rd is the sensor detection range and = 0.008 m−1.
The sensor reports false detections or false-alarm measure-
ments following a Poison RFS with a clutter rate λ = 0.2,
where each agent collects at most one measurement per time
step for each object, either from the real objects, clutters
(false detections) or the measurement is empty (missed de-
tections). For sensor noise, the range and bearing based
measurement is corrupted with a zero mean Gaussian pro-
cess noise that depends on the distance between objects and
agents, i.e., v ∼ N (0, R) with R = diag(σ2
ρ) where
σφ = σ0,φ + βφxp − us, σρ = σ0,ρ + βρxp − us;
σ0,φ = 2π/180 rad, βφ = 1.7 · 10−5 rad/m, σ0,ρ = 10 m,
and βρ = 5 · 10−3. Similarly, for vision-based sensor, each
detected object x leads to a measurement z of noisy x− y po-
y) where σx = σy = σ0,xy + βxyxp − us
R = diag(σ2
with σ0,xy = 10 m, and βxy = 1 · 10−2. The grid size is
100 × 100 across four scenarios. This corresponds to a grid
cell of 10 m ×10 m for scenario 1,2 and 3 and a grid cell of
sitions, given by: z =(cid:2)px, py]T +v. Here, v ∼ N (0, R) with
φ, σ2
x, σ2
2345678910Number of agents0204060OSPA Dist (m)(a)2345678910Number of agents204060OSPA Dist (m)(b)where
(cid:104)
S, H,F(X) × US, AS,F(Z)S,T ,R,O(cid:105)
20 m ×20 m for scenario 4. The total time is 200 s. The agent
does not have any prior knowledge about object's state, thus it
uses the initial birth probability rB = 0.005, and a Gaussian
density pB = N (x; mB, QB) with mB = [500, 0, 500, 0]T
and QB = diag([500, 10, 500, 10]).
Multi-agent POMDP (MPOMDP)
Multi-agent POMDP is a centralized control framework for
multiple agents wherein each agent shares its observations via
communications to a centralized controller. Let F(A) denote
the class of finite subsert of A. An MPOMDP is described by
a tuple
• S is the number of agents.
• H is the look-ahead horizon.
• F(X) × US is the space, wherein each element is an or-
dered pair (X, U ), with X is the object state and U =
[u1, . . . , uS]T ∈ US is states of S agents.
• AS = A × ··· × A is the control action space for S agents
resulting in the joint action A = [a1, . . . , aS]T ∈ AS
• F(Z)S = F(Z) × ··· × F(Z) is the space of joint
observations resulting in the joint observation Z =
[Z 1, . . . , Z S]T ∈ F(Z)S.
• T :(cid:2)F(X) × US(cid:3) ×(cid:2)F(X) × US(cid:3) × AS → [0, 1] defines
the transition probabilities Pr(cid:0)(X(cid:48), U(cid:48))(X, U ), A(cid:1).
• R : (cid:2)F(X) × US(cid:3) × AS → R defines the immediate
reward of performing action A in state(cid:2)F(X) × US(cid:3).
• O : F(Z)S ×(cid:2)F(X) × US(cid:3) × AS → [0, 1] defines the
joint observation probabilities Pr(cid:0)Z(X(cid:48), U(cid:48)), A(cid:1).
The Optimal Sub-Pattern Assignment (OSPA)
Let F(X) be the space of finite subsets of X. According
to (Schuhmacher, Vo, and Vo 2008), let ¯d(c)
p (X, Y ) be the
OSPA Dist between X, Y ∈ F(X) with order p and cutoff c.
Let m is the cardinality of X and n is cardinality of Y , with
m ≤ n, ¯d(c)
¯d(c)
p (X, Y )
p (X, Y ) is defined as
(cid:19)(cid:33)1/p
d(c)(xi, yπ(i))p + cp(n − m)
(cid:32)
(cid:18)
1
n
=
min
π∈Πn
m(cid:88)
i=1
(15)
where d(c)(x, y) = min(c, d(x, y)), in which d(·,·) is a
metric on the single object state space X. If m > n, then
p (X, Y ) (cid:44) ¯d(c)
¯d(c)
The OSPA Dist is comprised of two components: OSPA
Loc ¯d(c)
p,card to account for localization
and cardnality errors. These components are given by with
m ≤ n:
p,loc and OSPA Card ¯d(c)
p (Y, X).
(cid:18) 1
m(cid:88)
(cid:18) cp(n − m)
(cid:19)1/p
min
π∈Πn
i=1
n
n
¯d(c)
p,loc(X, Y ) =
¯d(c)
p,card(X, Y ) =
(cid:19)1/p
,
(16)
(17)
d(c)(xi, yπ(i))p
and if m > n,
p,card(X, Y ) (cid:44) ¯d(c)
¯d(c)
then ¯d(c)
p,card(Y, X).
p,loc(X, Y ) (cid:44) ¯d(c)
p,loc(Y, X),
References
[Amato and Oliehoek 2015] Amato, C., and Oliehoek, F.
2015.
Scalable planning and learning for Multiagent
POMDPs. In AAAI, 1995 -- 2002.
[Araya et al. 2010] Araya, M.; Buffet, O.; Thomas, V.; and
Charpillet, F. 2010. A POMDP extension with belief-
dependent rewards. In NeurIPS 23, 64 -- 72.
[Beard et al. 2017] Beard, M.; Vo, B.-T.; Vo, B.-N.; and Aru-
lampalam, S. 2017. Void probabilities and Cauchy-Schwarz
divergence for generalized labeled multi-Bernoulli models.
IEEE Trans. on Sig. Proc. 5047 -- 5061.
[Beck et al. 2018] Beck, Z.; Teacy, W. L.; Rogers, A.; and
Jennings, N. R. 2018. Collaborative online planning for
automated victim search in disaster response. RAS 100:251 --
266.
[Bernstein et al. 2002] Bernstein, D. S.; Givan, R.; Immer-
man, N.; and Zilberstein, S. 2002. The complexity of
decentralized control of Markov decision processes. MOS
27(4):819 -- 840.
[Blackman and Popoli 1999] Blackman, S., and Popoli, R.
1999. Design and analysis of modern tracking systems.
Artech House.
[Charrow, Michael, and Kumar 2015] Charrow, B.; Michael,
N.; and Kumar, V. 2015. Active control strategies for dis-
covering and localizing devices with range-only sensors. In
Algo. Found. of Rob., 55 -- 71. Springer.
[Cliff et al. 2015] Cliff, O. M.; Fitch, R.; Sukkarieh, S.; Saun-
ders, D.; and Heinsohn, R. 2015. Online localization of
radio-tagged wildlife with an autonomous aerial robot sys-
tem. In RSS.
[Coello et al. 2007] Coello, C. A. C.; Lamont, G. B.;
Van Veldhuizen, D. A.; et al. 2007. Evolutionary algorithms
for solving multi-objective problems, volume 5. Springer.
[Cover and Thomas 2012] Cover, T. M., and Thomas, J. A.
2012. Elements of information theory. John Wiley & Sons.
[Dames and Kumar 2015] Dames, P., and Kumar, V. 2015.
Autonomous localization of an unknown number of targets
without data association using teams of mobile sensors. IEEE
Trans. on Auto. Sci. and Eng. 12(3):850 -- 864.
[Dames, Tokekar, and Kumar 2017] Dames, P.; Tokekar, P.;
and Kumar, V. 2017. Detecting, localizing, and tracking an
unknown number of moving targets using a team of mobile
robots. IJRR 36(13-14):1540 -- 1553.
[Elfes 1989] Elfes, A. 1989. Using occupancy grids for mo-
bile robot perception and navigation. Computer 22(6):46 -- 57.
[Gerasenko et al. 2001] Gerasenko, S.; Joshi, A.; Rayaprolu,
S.; Ponnavaikko, K.; and Agrawal, D. P. 2001. Beacon
signals: what, why, how, and where? Computer 34(10):108 --
110.
[Gostar, Hoseinnezhad, and Bab-Hadiashar 2016] Gostar,
A. K.; Hoseinnezhad, R.; and Bab-Hadiashar, A. 2016.
Multi-Bernoulli sensor-selection for multi-target tracking
[Satsangi et al. 2018] Satsangi, Y.; Whiteson, S.; Oliehoek,
F. A.; and Spaan, M. T. 2018. Exploiting submodular
value functions for scaling up active perception. Autonomous
Robots 42(2):209 -- 233.
[Schuhmacher, Vo, and Vo 2008] Schuhmacher, D.; Vo, B.-
T.; and Vo, B.-N. 2008. A consistent metric for performance
evaluation of multi-object filters. IEEE Trans. on Sig. Proc.
56(8):3447 -- 3457.
[Silver and Veness 2010] Silver, D., and Veness, J. 2010.
In NeurIPS 23,
Monte-carlo planning in large POMDPs.
2164 -- 2172.
[Spaan, Veiga, and Lima 2015] Spaan, M. T.; Veiga, T. S.;
and Lima, P. U. 2015. Decision-theoretic planning under
uncertainty with information rewards for active cooperative
perception. AAMAS 1157 -- 1185.
[Thomas, Holland, and Minot 2012] Thomas, B.; Holland,
J. D.; and Minot, E. O. 2012. Wildlife tracking technology
options and cost considerations. Wildlife Research 38(8):653 --
663.
[Thrun, Burgard, and Fox 2005] Thrun, S.; Burgard, W.; and
Fox, D. 2005. Probabilistic robotics. MIT press.
[Vo et al. 2012] Vo, B. T.; See, C. M.; Ma, N.; and Ng, W. T.
2012. Multi-sensor joint detection and tracking with the
IEEE Trans. on Aero. and Elect. Syst.
Bernoulli filter.
48(2):1385 -- 1402.
[Wai et al. 2018] Wai, H.-T.; Yang, Z.; Wang, P. Z.; and Hong,
M. 2018. Multi-agent reinforcement learning via double
averaging primal-dual optimization. In NeurIPS 32, 9649 --
9660.
[Wang et al. 2018] Wang, X.; Hoseinnezhad, R.; Gostar,
A. K.; Rathnayake, T.; Xu, B.; and Bab-Hadiashar, A. 2018.
Multi-sensor control for multi-object Bayes filters. Signal
Processing 142:260 -- 270.
[Whiteson and Roijers 2016] Whiteson, S., and Roijers,
D. M. 2016. Tutorial: Multi-objective planning under uncer-
tainty. ICAPS.
[Zhu, Wang, and Liang 2019] Zhu, Y.; Wang, J.; and Liang,
S. 2019. Multi-objective optimization based multi-Bernoulli
sensor selection for multi-target tracking. Sensors 19(4):980.
Signal
with unknown clutter and detection profiles.
Processing 119:28 -- 42.
[Hoang and Vo 2014] Hoang, H. G., and Vo, B. T. 2014. Sen-
sor management for multi-target tracking via multi-Bernoulli
filtering. Automatica 50(4):1135 -- 1142.
[Kays et al. 2011] Kays, R.; Tilak, S.; Crofoot, M.; Fountain,
T.; Obando, D.; and et al. 2011. Tracking animal location
and activity with an automated radio telemetry system in a
tropical rainforest. The Computer Journal 1931 -- 1948.
[Koski 1993] Koski, J. 1993. Multicriterion Structural Opti-
mization. Dordrecht: Springer Netherlands. 793 -- 809.
[Krause et al. 2008] Krause, A.; McMahan, H. B.; Guestrin,
C.; and Gupta, A. 2008. Robust submodular observation
selection. JMLR 9(Dec):2761 -- 2801.
[Krause, Singh, and Guestrin 2008] Krause, A.; Singh, A.;
and Guestrin, C. 2008. Near-optimal sensor placements
in Gaussian processes: Theory, efficient algorithms and em-
pirical studies. JMLR 9(Feb):235 -- 284.
[MacDermed and Isbell 2013] MacDermed, L. C., and Isbell,
C. L. 2013. Point based value iteration with optimal belief
compression for Dec-POMDPs. In NeurIPS 26, 100 -- 108.
[Mahler 2004] Mahler, R. 2004. Multitarget sensor manage-
ment of dispersed mobile sensors. In Theory and algorithms
for cooperative systems, 239 -- 310. World Scientific.
[Mahler 2007] Mahler, R. P. 2007. Statistical Multisource-
Multitarget Inf. Fusion. Artech House, Inc.
[Messias, Spaan, and Lima 2011] Messias, J. V.; Spaan, M.;
and Lima, P. U. 2011. Efficient offline communication
policies for Factored Multiagent POMDPs. In NeurIPS 24,
1917 -- 1925.
[Murphy et al. 2008] Murphy, R. R.; Tadokoro, S.; Nardi, D.;
Jacoff, A.; Fiorini, P.; Choset, H.; and Erkmen, A. M. 2008.
Search and Rescue Robotics. Berlin, Heidelberg: Springer
Berlin Heidelberg. 1151 -- 1173.
[Nemhauser, Wolsey, and Fisher 1978] Nemhauser, G. L.;
Wolsey, L. A.; and Fisher, M. L. 1978. An analysis of
approximations for maximizing submodular set functions -- i.
Mathematical programming 14(1):265 -- 294.
[Nguyen et al. 2019a] Nguyen, H. V.; Chesser, M.; Koh, L. P.;
Rezatofighi, H.; and Ranasinghe, D. C. 2019a. TrackerBots:
Autonomous unmanned aerial vehicle for real-time localiza-
tion and tracking of multiple radio-tagged animals. Journal
of Field Robotics 36(3):617 -- 635.
[Nguyen et al. 2019b] Nguyen, H. V.; Rezatofighi, H.; Vo, B.-
N.; and Ranasinghe, D. C. 2019b. Online UAV path planning
for joint detection and tracking of multiple radio-tagged ob-
jects. IEEE Trans. on Sig. Proc. 67(20):5365 -- 5379.
[Oliehoek et al. 2008] Oliehoek, F. A.; Spaan, M. T.; White-
son, S.; and Vlassis, N. 2008. Exploiting locality of interac-
tion in factored dec-pomdps. In AAMAS, 517 -- 524.
[Reid 1979] Reid, D. 1979. An algorithm for tracking multi-
ple targets. IEEE Trans, on Auto. Control 24(6):843 -- 854.
[Ristic and Vo 2010] Ristic, B., and Vo, B.-N. 2010. Sensor
control for multi-object state-space estimation using random
finite sets. Automatica 46(11):1812 -- 1818.
|
1909.11468 | 1 | 1909 | 2019-09-25T13:11:33 | Independent Generative Adversarial Self-Imitation Learning in Cooperative Multiagent Systems | [
"cs.MA"
] | Many tasks in practice require the collaboration of multiple agents through reinforcement learning. In general, cooperative multiagent reinforcement learning algorithms can be classified into two paradigms: Joint Action Learners (JALs) and Independent Learners (ILs). In many practical applications, agents are unable to observe other agents' actions and rewards, making JALs inapplicable. In this work, we focus on independent learning paradigm in which each agent makes decisions based on its local observations only. However, learning is challenging in independent settings due to the local viewpoints of all agents, which perceive the world as a non-stationary environment due to the concurrently exploring teammates. In this paper, we propose a novel framework called Independent Generative Adversarial Self-Imitation Learning (IGASIL) to address the coordination problems in fully cooperative multiagent environments. To the best of our knowledge, we are the first to combine self-imitation learning with generative adversarial imitation learning (GAIL) and apply it to cooperative multiagent systems. Besides, we put forward a Sub-Curriculum Experience Replay mechanism to pick out the past beneficial experiences as much as possible and accelerate the self-imitation learning process. Evaluations conducted in the testbed of StarCraft unit micromanagement and a commonly adopted benchmark show that our IGASIL produces state-of-the-art results and even outperforms JALs in terms of both convergence speed and final performance. | cs.MA | cs | Independent Generative Adversarial Self-Imitation Learning in
Cooperative Multiagent Systems
Xiaotian Hao*, Weixun Wang*, Jianye Hao(cid:66), Yaodong Yang
College of Intelligence and Computing, Tianjin University
{xiaotianhao,wxwang,jianye.hao}@tju.edu.cn,[email protected]
Tianjin, China
9
1
0
2
p
e
S
5
2
]
A
M
.
s
c
[
1
v
8
6
4
1
1
.
9
0
9
1
:
v
i
X
r
a
ABSTRACT
Many tasks in practice require the collaboration of multiple agents
through reinforcement learning. In general, cooperative multia-
gent reinforcement learning algorithms can be classified into two
paradigms: Joint Action Learners (JALs) and Independent Learners
(ILs). In many practical applications, agents are unable to observe
other agents' actions and rewards, making JALs inapplicable. In
this work, we focus on independent learning paradigm in which
each agent makes decisions based on its local observations only.
However, learning is challenging in independent settings due to
the local viewpoints of all agents, which perceive the world as
a non-stationary environment due to the concurrently exploring
teammates. In this paper, we propose a novel framework called Inde-
pendent Generative Adversarial Self-Imitation Learning (IGASIL)
to address the coordination problems in fully cooperative multi-
agent environments. To the best of our knowledge, we are the
first to combine self-imitation learning with generative adversarial
imitation learning (GAIL) and apply it to cooperative multiagent
systems. Besides, we put forward a Sub-Curriculum Experience Re-
play mechanism to pick out the past beneficial experiences as much
as possible and accelerate the self-imitation learning process. Evalu-
ations conducted in the testbed of StarCraft unit micromanagement
and a commonly adopted benchmark show that our IGASIL pro-
duces state-of-the-art results and even outperforms JALs in terms
of both convergence speed and final performance.
KEYWORDS
Multiagent learning; Learning agent-to-agent interactions (coordi-
nation); Adversarial machine learning
ACM Reference Format:
Xiaotian Hao*, Weixun Wang*, Jianye Hao(cid:66), Yaodong Yang. 2019. Inde-
pendent Generative Adversarial Self-Imitation Learning in Cooperative
Multiagent Systems. In Proc. of the 18th International Conference on Au-
tonomous Agents and Multiagent Systems (AAMAS 2019), Montreal, Canada,
May 13 -- 17, 2019, IFAAMAS, 9 pages.
1 INTRODUCTION
With the advance of deep neural network [14, 22], Deep Reinforce-
ment Learning (DRL) approaches have made significant progress for
a number of applications including Atari games [30], Go [42], game
theory [23, 46] and robot locomotion and manipulation [24, 41].
* Equal contribution. (cid:66)Corresponding author.
Proc. of the 18th International Conference on Autonomous Agents and Multiagent Systems
(AAMAS 2019), N. Agmon, M. E. Taylor, E. Elkind, M. Veloso (eds.), May 13 -- 17, 2019,
Montreal, Canada. © 2019 International Foundation for Autonomous Agents and
Multiagent Systems (www.ifaamas.org). All rights reserved.
In practice, a large number of important applications can be natu-
rally modeled as cooperative multiagent systems. Examples include
coordination of robot swarms [18], coordination of autonomous
vehicles [7], network packet delivery [48], managing air traffic flow
[2] and energy distribution [47].
However, directly applying single-agent reinforcement learning
approaches such as Q-learning to cooperative multiagent environ-
ments behaves poorly. Thus, effective coordination mechanism
needs to be incorporated into agents' learning strategies to address
the cooperative multiagent problems. Multiagent reinforcement
learning (MARL) can be generally classified in to two paradigms
[8]: Joint Action Learners (JALs) and Independent Learners (ILs).
JALs observe the rewards and actions (policies) taken by all agents
whose information is explicitly considered during policy update,
whereas ILs make decisions based on their local observations, ac-
tions and rewards only. Under the JAL paradigm, MADDPG [27]
is a recently proposed approach for multiagent games with large
continuous state space and action space. By taking the other agents'
observations and policies directly into consideration, MADDPG
learns a centralized critic and uses the centralized critic to provide
a better guidance for the policy update. However, MADDPG does
not consider some specially designed mechanisms for handling the
multiagent cooperative challenges when dealing with difficult coop-
eration environments (e.g., sparse rewards, high miss-coordination
penalties, exploration-exploitation trade-off [29]). Besides, due to
the inaccessibility of all other agents' states and actions in practice
and the exponential growth of the state-action space in the number
of agents, JALs are difficult to be applied to practical applications.
Avoiding the above two restrictions, ILs are more universally
applicable and have been widely studied over the past years, e.g.,
Distributed Q-learning [21], Hysteretic Q-learning [28] and Lenient
Learners [37]. However, for ILs, one typical issue is that each agent's
policy is changing as training progresses, and the environment be-
comes non-stationary from the perspective of any individual agent
since other agents' policies are changing concurrently. Hysteretic
Q-learning [28] and Lenient Learners [37] are proposed to facilitate
multiple reinforcement learning agents to overcome the indepen-
dent learning problems (e.g., the non-stationary problem [29]). Very
recently, the idea of hysteretic Q-learning and lenient learners has
been successfully applied to deep multiagent reinforcement learn-
ing settings [35, 36]. However, all these approaches are Q-learning
based methods and are naturally suitable for settings with discrete
action space only. Therefore, it's difficult to apply these approaches
to solve the cooperative multiagent continuous control tasks.
In this work, we propose a novel framework under the indepen-
dent learning paradigm called independent generative adversarial
self imitation learning (IGASIL), which conducts both learning
and execution in a fully decentralized manner. In the framework,
there are n independent agents cooperatively solving a task without
knowing other agents' policies and making decisions based on their
own local observations. Initially, each agent maintains a positive
buffer and a normal buffer. At run time, each agent interacts with
the environment independently according to the current policy.
The resulting trajectory is stored twice in the positive buffer and
the normal buffer. The positive buffer is a specially designed sub-
curriculum experience replay which continuously helps to pick
out and reserve preferable experiences the agent has experienced.
Combining self-imitation learning with generative adversarial im-
itation learning, each agent trains a discriminator using samples
from these two buffers whose target is to capture the features of
the past good experiences. Besides the environment rewards, each
agent receives additional rewards from the discriminator, which
would guide the agents to imitate from the past good experiences
and do more exploration around these high-reward regions. Once
the agents find better policies, they will produce higher quality
trajectories. Thus, the learning will turn into a virtuous circle until
a good cooperation is achieved.
The main contributions of this paper can be summarized as
follows.
(1) To the best of our knowledge, we are the first to combine self im-
itation learning with generative adversarial imitation learning
and propose a novel framework called Independent Genera-
tive Adversarial Self Imitation Learning (IGASIL) to address the
multiagent coordination problems.
(2) We put forward a Sub-Curriculum Experience Replay mecha-
nism to accelerate the self-imitation learning process.
(3) IGASIL is well applicable to both discrete and continuous action
spaces and can be integrated with any Policy Gradient or Actor-
Critic algorithm in fully cooperative multiagent environments.
(4) Besides, our proposed method follows the decentralized training
pattern which does not require any communication among
agents during learning.
(5) Experimental results show that our method outperforms state-
of-the-art in cooperative multiagent continuous and discrete
control tasks in terms of both convergence speed and final
performance.
2 BACKGROUND
2.1 Markov Decision Process
We use the tuple (S, A, P, r , ρ0, γ) to define an infinite-horizon, dis-
counted Markov decision process (MDP), where S represents the
state space, A represents the action space, P : S × A × S → [0, 1]
denotes the transition probability distribution, r : S × A → R de-
notes the reward function, ρ0 → [0, 1] is the distribution of the
initial state s0, and γ ∈ (0, 1) is the discount factor. Let πθ denote
a stochastic policy π : S × A → [0, 1], where θ is the parameter
of the policy. The performance of a stochastic policy πθ is usually
evaluated by its expected cumulative discounted reward Jπθ :
= Eρ0,P,πθ [
Jπθ
γ t r(st , at)]
(1)
∞
t =0
Reinforcement Learning (RL) [44] is a set of algorithms trying
to infer a policy πθ , which maximizes the expected cumulative
discounted reward Jπθ when given access to a reward signal r(s, a).
2.2 Generative Adversarial Imitation Learning
Imitation learning is also known as learning from demonstrations
or apprenticeship learning, whose goal is to learn how to perform
a task directly from expert demonstrations, without any access to
the reward signal r(s, a). Recent main lines of researches within
imitation learning are behavioural cloning (BC) [6, 39], which per-
forms supervised learning from observations to actions when given
a number of expert demonstrations; inverse reinforcement learning
(IRL)[1], where a reward function is estimated that explains the
demonstrations as (near) optimal behavior; and generative adver-
sarial imitation learning (GAIL) [3, 4, 17, 43], which is inspired by
the generative adversarial networks (GAN) [15]. Let TE denote the
trajectories generated by the behind expert policy πE, each of which
consists of a sequence of state-action pairs. In the GAIL framework,
an agent mimics the behavior of the expert policy πE by matching
the generated state-action distribution ρπθ (s, a) with the expert's
distribution ρπE(s, a). The state-action visitation distribution (oc-
cupancy measure [17]) of a policy πθ is defined as:
γ t p(st = sπθ)
(2)
where p(st = sπθ) is the probability of being in state s at time t
when starting at state s0 ∼ ρ0 and following policy πθ . Thus, Jθ
can be written as:
ρπθ (s, a) = πθ(as)
∞
t =0
= Eρ0,P,πθ [
Jπθ
γ t r(st , at)]
∞
p(st = sπθ)
∞
t =0
a
πθ(as)
s
a
t =0
ρπθ (s, a)r(st , at)
=
∞
=
=
t =0
s
s,a
πθ(as)γ t r(st , at)
(3)
p(st = sπθ)γ t r(st , at)
which only depends on the discounted state-action visitation distri-
bution ρπθ (s, a). The optimum is achieved when the distance be-
tween these two distributions is minimized as measured by Jensen-
Shannon divergence. The formal GAIL objective is denoted as:
(4)
max
w
E(s,a)∼ρπE (s,a)[log(Dw(s, a))]+
min
θ
E(s,a)∼ρπθ (s,a)[log(1 − Dw(s, a))] − λH H(πθ)
generated by πθ and πE, H(πθ) ≜ Eρ0,P,πθ [∞
where Dw is a discriminative binary classifier parameterized by w
which tries to distinguish state-action pairs from the trajectories
t =0 γ t(− log πθ(as))]
is the γ−discounted causal entropy of policy πθ [5] and λH is the
coefficient. Unlike GANs, the original GAIL requires interactions
with the environment/simulator to generate state-action pairs, and
thus the objective (4) is not differentiable end-to-end with respect
to the policy parameter θ. Hence, optimization of the policy re-
quires RL techniques based on Monte-Carlo estimation of policy
gradients. The optimization over the GAIL objective is performed
by alternating between K gradient step to increase (4) with respect
to the discriminator parameters w, and a Trust Region Policy Op-
timization (TRPO) step to decrease (4) with respect to the policy
parameters θ (using log(Dw(s, a)) as the reward function).
2.3 Sample-Efficient GAIL
One of the most important advantages of GAIL is that it can obtain
a higher performance than behavioral cloning when given only a
small number of expert demonstrations. However, a large number
of policy interactions with the learning environment are required
for policy convergence. As illustrated in [20], while GAIL requires
as little as 200 expert frame transitions to learn a robust reward
function on most MuJoCo [45] tasks, the number of policy frame
transitions sampled from the environment can be as high as 25
million in order to reach convergence, which is intractable for real-
world applications. To this end, [20] address the sample inefficiency
issue via incorporating an off-policy RL algorithm and an off-policy
discriminator to dramatically decrease the sample complexity by
many orders of magnitude. Experimental results show that their
off-policy approach works well even without using the importance
sampling.
2.4 Self-Imitation Learning
In an environment with the very sparse reward, it's difficult to
learn the whole task at once. It is natural to master some basic skills
for solving easier tasks firstly. e.g., In Montezuma's Revenge (an
Atari game), the agent needs to pick up the key and then open the
door. Directly learning opening the door is hard due to the poor
exploration, but it is easier to master picking up the key at first.
Based on this idea, self-imitation learning (SIL) [34] is a very recent
approach proposed to solve the sparse reward problem by learning
to imitate the agent's own past good experiences. In brief, SIL stores
previous experiences in a replay buffer and learns to imitate the
experiences when the return is greater than the agent's expectation.
Experimental results show that this bootstrapping approach (learn
to imitate the agent's own past good decisions) is highly promising
on hard exploration tasks A proper level of exploitation of past
good experiences during learning can lead to a deeper exploration
(moving to the deeper region) of the learning environment. Similar
idea and results can also be found in [19].
3 PROBLEM DESCRIPTION
The setting we are considering is a fully cooperative partially ob-
servable Markov game [26], which is a multiagent extension of a
Markov decision process (MDPs). A Markov game for N agents is
defined by a set of states S describing the possible configurations of
all agents and environment, a set of actions A1, ..., AN and a set of
observations O1, ..., ON for each agent. Initial states are determined
by a distribution ρ0 : S → [0, 1]. State transitions are determined
by a function P : S × A1 × ... × AN × S → [0, 1]. For each agent i,
rewards are given by function ri : S × A1 × ... × AN → R, observa-
tions are given by function oi : S → Oi. To choose actions, each
: Oi × Ai → [0, 1]. The joint
agent i uses a stochastic policy πi
policy π of all agents is defined as π : ⟨π1, ..., πN ⟩. The joint action
is represented as a = ⟨a1, ..., an⟩. We consider a finite horizon set-
ting, with episode length T . If all agents receive the same rewards
(r1 = r2 = ... = rN ), the Markov game is fully cooperative, which
means a best-interest action of one agent is also a best-interest
action of all agents. Besides, we only consider the environments
with deterministic reward functions at present.
In the following of this paper, we are going to analyze and deal
with the coordination problems under the following two difficult co-
operative environments: (1) cooperative endangered wildlife rescue;
(2) decentralised StarCraft micromanagement from an independent
perspective. For example, in the cooperative endangered wildlife
rescue task, there are N slower independent rescue agents which
have to cooperatively chase and rescue one of the M faster wounded
animals in a randomly generated environment with continuous
state and action spaces. Each rescue agent makes decisions (go
north, south, east, or west to chase one of the M animals) based
on its local observation only and can't observe the others' policies
(local observation and continuous action space). Only when
the N rescue agents chase and capture the same wounded animal
simultaneously, will they get a reward based on the caught animal's
value. So, the reward is very sparse and it's hard for the independent
rescuers to explore (sparse rewards). Besides, the changing of the
other agents' policies (e.g. the other agents' move to different direc-
tions for exploration instead of cooperatively capturing the same
animal with the current agent) will influence the reward of current
agent's action. Therefore, the environment becomes non-stationary
from the perspective of each individual rescuer (non-stationary).
If a rescue agent changes its actions too quickly when perceiving
the changed reward (due to the others' explorations), the others
will change their policies in their turn (exploration-exploitation).
Moreover, different wounded animals has different rewards and
different penalties (the animal with the higher reward also has the
higher penalty for miss-coordination). So, to avoid punishment,
the rescuers prefer to capture the animals with the lowest reward
instead of the global optimal one (high penalty and shadowed
equilibrium). Detail settings of the game are shown in Section
5.1.1. Thus, it's hard to coordinate the independent learners to
achieve successful cooperation and converge to a better equilib-
rium. Thus, additional cooperation mechanisms are needed.
4 INDEPENDENT SELF-IMITATION
LEARNING FRAMEWORK
Figure 1: IGASIL framework for cooperative multiagent sys-
tems.
Environment𝝅𝝅𝟏𝟏oa𝐃𝐃𝟏𝟏𝐐𝐐𝟏𝟏𝑴𝑴𝑬𝑬𝟏𝟏𝐑𝐑𝟏𝟏1𝛑𝛑𝐍𝐍oa𝐃𝐃𝐍𝐍𝐐𝐐𝐍𝐍𝑴𝑴𝑬𝑬𝑵𝑵𝐑𝐑𝐍𝐍N………4.1 Independent Generative Adversarial
Self-Imitation Learning
Combining the idea of self-imitation learning with GAIL, we pro-
pose a novel independent generative adversarial self-imitation
learning (IGASIL) framework aiming at facilitating the coordination
procedure of the interactive agents, reducing the learning variance
and improving the sample efficiency. The learning procedure for
each independent learner i is summarized in Algorithm 1.
Algorithm 1 Independent Generative Adversarial Self-Imitation
Learning
1: Input: For each agent i, initial parameters of actor, critic, dis-
i , sub-curriculum experience replay Mi
E
i , w0
criminator θ0
i , ϕ0
and a normal replay buffer Ri.
E ← , Ri ← .
2: Initialize Mi
3: for n=0,1,2,... do
4:
5:
6:
7:
n ∼ πθi .
n in Ri.
n in Mi
Sample a trajectory T i
Store T i
Store T i
Sample state-action pairs Xn ∼ Ri and XE ∼ ME with the
same batch size.
Update wn
i
E according to Algorithm 2.
by ascending with gradients:
8:
9:
10:
11:
12:
13:
i to wn+1
∆w n
i
=EXE[log(Dw n
EXn[log(1 − Dw n
n ∼ Ri.
(s, a))]+
(s, a))]
i
i
i
Sample (s,a,r,s',done) tuples X ′
Calculate the imitation reward for each (s, a) ∼ X ′
(s, a))
Calculate the reshaped reward for each (s, a) ∼ X ′
rimit(s, a) = log(Dw n
(s, a)) − log(1 − Dw n
′(s, a) = r + λimit ∗ rimit(s, a)
Replace r in X ′
n with r′(s, a).
Using samples X ′
n to update the policy parameter θn
and the critic parameter ϕn
(off-policy A2C [9])
i to ϕn+1
r
i
i
n by:
n by:
i to θn+1
according to DDPG [25]
i
(5)
(6)
(7)
14: end for
An illustration of our IGASIL is shown in Figure (1). Initially,
each agent i maintains a sub-curriculum experience replay buffer
E and a normal buffer Ri (Algorithm 1, Line 1-2). At run time,
Mi
each agent interacts with the environment independently according
to the current policy. The resulting trajectory is stored in Mi
E and
Ri respectively (stored twice) (Algorithm 1, Line 4-6). The normal
buffer Ri is used for off-policy training, which will be discussed
in Section 4.1.1. The sub-curriculum experience replay buffer Mi
E
of each agent preserves the past useful skills (demonstrations) for
future use, which will be detailed in Section 4.2. We consider these
useful demonstrations in Mi
E as self generated expert data and re-
gard the policy behind these self-generated demonstrations as π i
E
for each agent i. At the same time, each agent trains a discriminator
Di using samples from these two buffers whose target is to capture
the features of the past good experiences. (Algorithm 1, Line 7-8).
Then, each agent begins to update its policy based on two types
of rewards: (1) the imitation rewards given by the discriminator
Di (Algorithm 1, Line 9-10), which will be discussed in Section
4.1.2; (2) the original environment rewards, which are combined
according to Equation (7), in which λimit control the weight of the
imitation reward1 (Algorithm 1, Line 11-12). The final reshaped re-
ward r′(s, a) will encourage each agent to explore more around the
nearby region of the past good experience to check whether a better
coordination can be achieved or have been achieved. After that,
the policy of each agent is updated according to the corresponding
update rules (Algorithm 1, Line 13). Thus, under the guidance of
the discriminator, the past good experiences and skills are dynami-
cally reused. After that, each agent's policy is more likely updated
towards a better direction independently. Though we use the off-
policy actor-critic approaches (DDPG and off-policy A2C) in our
algorithm, our self-imitation framework can be integrated with any
policy gradient or actor-critic methods.
Since all independent agents receive exactly the same reward
and use the same learning approach (same parameters and settings),
the positive trajectories stored in Mi
E would be stored in a synchro-
nized way, which means the agents could cooperatively imitate the
"same" past good experience in a distributed way. Thus, all indepen-
dent agents would have the same behavioral intentions (e.g., jointly
imitating the same past good experience and doing deeper explo-
ration, which we call "the joint intention") during learning. As the
"joint" imitation learning progresses, the policy of each agent would
be induced to update towards the "same" direction. Consequently,
the non-stationary and learning issues can be alleviated.
4.1.1 Sample-efficient GASIL. One limitation of GAIL is that
it requires a significant number of interactions with the learning
environment in order to imitate an expert policy [20], which is
also the case of our settings. To address the sample inefficiency
of GASIL, we use off-policy RL algorithms (Here, we use DDPG
and off-policy A2C) and perform off-policy training of the GAIL
discriminator performed in such way: for each agent i, instead of
sampling trajectories from the current policy directly, we sample
transitions from the replay buffer Ri collected while performing
off-policy training:
max
w
E(s,a)∼π i
[log(Dwi(s, a))]+
min
θ
E(s,a)∼Ri[log(1 − Dwi(s, a))] − λH H(π i
θ)
E
(8)
Equation (8) tries to match the occupancy measures between the
expert and the distribution induced by the replay buffer Ri instead of
the latest policy πi.It has been found that the off-policy GAIL works
well in practice even without using importance sampling [20]. As
will be shown in Section 5.2, we also observe similar phenomenons
in our cooperative endangered wildlife rescue environment.
4.1.2 Unbiased imitation reward. Another problem of GAIL
is that either rimit(s, a) = −loд(1−D(s, a)) or rimit(s, a) = loд(D(s, a))
(which is often used as the reward function in GAIL approaches)
has reward biases that can either implicitly impose prior knowl-
edge about the true reward, or alternatively, prevent the policy
from imitating the optimal expert [20]. We summarize the reason
1In our settings, we grow the λimit exponentially as learning progresses (One intuition
is that as the training progresses, the trajectories produced by the agent becomes better
and better. Thus, the agent should pay more attention to these better ones).
of the two rewards' bias here: (1) −loд(1 − D(s, a)) is always pos-
itive and potentially provides a survival bonus which drives the
agent to survive longer in the environment to collect more rewards.
(2) loд(D(s, a)) is always negative and provides a per step penalty
which drives the agent to exit from the environment earlier. Thus,
to stabilize the training process of our IGASIL, we use a more stable
reward function as shown in Equation (9). Similar analysis can be
found in [13] and [20].
rimit(s, a) = loд(D(s, a)) − loд(1 − D(s, a))
(9)
4.2 Sub-Curriculum Experience Replay
In a complex cooperative game, a series of actions need to be taken
simultaneously by all agents to achieve a successful cooperation.
However, due to the independent learning agents (ILs) interacting
with the environment according to their own observations and poli-
cies without any communication, each agent might randomly take
different actions for exploration at the same state. But, to achieve a
perfect cooperation, each agent must exactly select the "right" ac-
tion at all states. This means the collected trajectories of successful
cooperation are very few during learning. So, it's difficult for the
independent agents to grasp all these series of actions simultane-
ously to achieve perfect cooperation at once. Therefore, additional
mechanisms are needed to induce the individual agents to gradually
pick the "right" actions at the same state.
Curriculum learning is an extension of transfer learning, where
the goal is to automatically design and choose a sequence of tasks
(i.e. a curriculum) T1,T2, ...Tt for an agent to train on, such that the
learning speed or performance on a target task Tt will be improved
[33]. Inspired by this idea, we want our independent learning agents
to follow the curriculum learning paradigm. For example, it's easier
for the agents to firstly learn to cooperate at some easier states.
And then, reusing the basic skills learned in the previous step, the
agents would gradually achieve deeper cooperation and finally are
able to solve the target task. The main idea is that the past useful
skills can be reused to facilitate the coordination procedure. Similar
ideas have been applied to a series of curriculum learning tasks [31],
[32]. In our settings, we consider a whole trajectory as an instance
of solving the target task. Our goal is to find and reuse the past use-
ful skills/experiences for each agent to accelerate the cooperation
process. An intuitive way is to pick out these useful experiences by
rewards. One example is that given two trajectories with rewards
[0, +1, +3, +1, 0, 0,−20] and [0, 0, 0, 0, 0, 0,−15], though the total
rewards are both −15 (low), there is still some useful experience in-
cluded in the first trajectory (e.g.: the sub-trajectory [0, +1, +3, +1]
with a total reward +5 still demonstrates some good behaviors). By
imitating the behaviors from these good sub-trajectories, the agents
can still grasp some useful cooperation skills. Another example is
considering a trajectory with sparse rewards [0, 0, 0, ..., 0, 0, +1]
(only receiving +1 at the terminal state), imitating from the sub-
trajectories near the terminal state (e.g. [0, +1], [0, 0, +1]) would
drive the agent to quickly master skills around the terminal state,
reduce unnecessary explorations, and thus ease the reward back-
propagation problem when rewards are sparse, which is similar
to the idea of reverse curriculum generation for reinforcement
learning [10].
Algorithm 2 Sub-Curriculum Experience Replay
1: Given: A learning policy πθi for agent i.
2: Initialize the min-heap based positive trajectory buffer Mi
E.
3: for n=0,1,2,... do
4:
5:
6:
7:
8:
Sample a trajectory T i
Calculate the discounted Return of T i
Store (T i
n, RT i
n
for j=0,N do
n as RT i
▷ resorting by priority
Randomly sample a sub-trajectory subj(T i
out repetition.
Calculate the discounted Return of subj(T i
Store (subj(T i
n) from T i
n with-
n) as Rsubj(T i
n).
E. ▷ resorting by priority
n), Rsubj(T i
) in Mi
E.
n)) in Mi
n ∼ πθi .
.
n
9:
10:
11:
12:
13: end for
end for
Update the policy πθi according to Algorithm 1.
Given the above analysis, we build a min-heap based sub-curriculum
experience replay (SCER) Mi
E with a small buffer size k for each
agent i to continuously maintain the past beneficial experiences.
The formal description of our SCER is summarized in Algorithm
2. The priority of the min-heap is based on the return of each
trajectory/sub-trajectory. To pick out the beneficial (useful) ex-
periences as much as possible, we randomly sample some sub-
trajectories from a given trajectory without repetition (Algorithm
2, Line 8), calculate their discounted returns and feed them into Mi
E
(Algorithm 2, Line 9-10). The ranking and filtering of the trajectories
are processed within Mi
E is built based on a min-heap,
it can be viewed as a filter which keeps the latest top-k-return
trajectories/sub-trajectories (Algorithm 2, Line 10). The positive
buffer Mi
E usually starts by storing suboptimal trajectories (e.g.,
killing only few enmies in StarCraft micromanagement games),
and our sub-curriculum ER with IGASIL allows each agent to learn
better sub-policies in the subspaces. Based on the pre-learned skills,
the agents are easier to explore to the deeper regions and the posi-
tive buffer will receive trajectories with higher quality. This leads
to agents learning better coordinated policies in return.
E. Since Mi
5 EXPERIMENTS
In the following experiments, we evaluate the effectiveness of our
IGASIL framework in two cooperative multiagent benchmarks: (1)
cooperative endangered wildlife rescue, which has the very sparse
reward and high miss-coordination penalty [27]; (2) decentralised
StarCraft micromanagement, which has multi types of units, strong
stochasticity and uncertainty [11, 38, 40].
5.1 Effectiveness of our Approach
Architecture & Training. In this paper, all of our policies, critics
and discriminators are parameterized by a two-layer ReLU MLP
(Multilayer Perceptron) followed by a fully connected layer acti-
vated by tanh functions for DDPG's policy nets(DDPG is used only
for the animal rescue game), softmax functions for AC's policy nets
and sigmoid functions for all discriminators. Only in decentralised
StarCraft micromanagement task , we share the parameters among
the homogeneous agents (units with the same type) to accelerate
the training process. The code has been published on GitHub 2.
5.1.1 Cooperative Endangered Wildlife Rescue.
Game Settings. Cooperative endangered wildlife rescue is a
more tough version (sparse rewards and high penalty of miss-
coordination) of the "predator-prey" task illustrated in MADDPG
[27], which requires more accurate cooperation. There are N slower
cooperating rescue agents which cooperatively chase and rescue
one of the M faster wounded animals in a randomly generated
environment. Each time if all the cooperative rescuers capture a
wounded animal simultaneously, the agents will be rewarded by
some rewards based on the wounded animal they saved. Different
wounded animals (e.g., Lion, wildebeest and Deer) correspond to
different rewards and different risks. Different risks means that the
penalties for miss-coordination on different animals are different
(e.g., hurt by the lion). The target for each rescue agent is learning to
rescue the same wounded animal independently without knowing
each other's policy. Besides, in our settings, we stipulate a rescue
agent can hold a wounded animal without suffering any penalty for
some game steps Thold before the other partners' arrival. So, the
difficulty level of the task can be modulated by the value of Thold.
The larger, the easier. In the following experiments, we set N to
2, M to 3 and Thold to 8. An typical illustration of the cooperative
endangered wildlife rescue task is shown in Figure (2).
(a)
(b)
(c)
(d)
Figure 2: (a) Two rescue agents are in red (translucent red
represents the grasper of each agent) and three wounded an-
imals are in blue (deeper blue represents higher value and
higher risk); (b), (c) The animal in dark blue turns to green,
which means it has been hold by a rescue agent (can't move
anymore); (d) The animal in dark blue turns to red, which
means it has been captured and saved by the two rescue
agents and the episode finished.
States and Actions. All rescue agents and wounded animals
can observe the relative positions of others. Besides, each rescue
agent can observe the relative velocities of wounded animals (can't
observe the other rescuers' velocities). Actions are accelerations in
4 directions (controlled by 2 actions actually: north or south, east
or west). The acceleration of a direction is controlled by the force
applied. To sum up, the action space is continuous with a valid
range of [-1, 1].
Reward Function. The environmental rewards are sparse and
only depend on the terminal state of each episode. The payoff ma-
trix of the terminal state is defined in Table (1). At each state sT , if
both agents capture and save the same target a, b or c simultane-
ously, they will both receive 11, 7 or 5. Else, if one agent captures i
while the other captures j, they will both receive r(i, j). Finally, if
2https://github.com/tjuHaoXiaotian/GASIL
Table 1: The payoff matrix of the rescue agents at the ter-
minal state of each episode. Both agents receive the same
payoff written in the corresponding cell.
Agent 2
catch b
catch a
catch c
Agent 1
catch a
catch b
catch c
on the
road
11
-30
0
-30
-30
7
6
-10
0
6
5
0
on the
road
-30
-10
0
0
Figure 3: The 1000-episode averaged return of IGASIL ver-
sus maddpg and ddpg during training in cooperative endan-
gered wildlife rescue task from the viewpoint of the two res-
cue agents.
one agent holds i and the other doesn't come over in Thold steps,
they will both be punished by r(i, 3). According to Table (1), the
theoretical-optimal action is "catch a", but the action "catch c" can
be easily mistaken for having the highest reward due to the lowest
penalty for exploration. The game can be seen as a Markov exten-
sion of the climbing game [8] with continuous state and action
spaces.
Experimental Results To make the different algorithms com-
parable, we pre-train both the rescue agents and wounded animal
agents with DDPG and save the animal models during training.
Then, we reuse the same pre-trained animal models as the default
policies for the wounded animals in all experiments. The learning
curves of IGASIL versus MADDPG and DDPG are plotted in Figure
(3) under five random seeds (1,2,3,4,5). To show a smoother learn-
ing procedure, the reward value is averaged every 1000 episodes.
Apparently, our IGASIL outperforms MADDPG and DDPG by a
significant margin in terms of both convergence rate and final per-
formance. To obviously express the different equilibrium the three
algorithms converged to, we show the average number of touches
of the three wounded animals by the two rescue agents during
training with different algorithms in Figure (5). As illustrated in
Table (1), "animal a" has the highest reward +11 and the highest
miss-coordination penalty -30. In Figure (5), we can easily observe
that only our IGASIL succeeds in converging to the optimal Nash
equilibrium (a, a) (learned to rescue "animal a") while MADDPG and
DDPG converge to the worst equilibrium (c, c) (learned to rescue
"animal c"). This result shows that only our IGASIL overcame the
risk of being punished by miss-coordination and achieved a better
cooperation result (which need more accurate collaborations).
(a) 5m
(b) 2d3z
Figure 4: Win rates for IGASIL, IAC and IAC+PER on two different scenarios.
Actor-Critic. The actor and critic parameters are also shared among
the homogeneous agents. IAC+PER means we add a positive replay
buffer Mi
E to each IAC but each agent only stores the original entire
trajectory into Mi
E instead of additionally sampling and storing
some sub-trajectories (sub-skills). IGASIL is our approach, which
equals to IAC+SCER.
Table 2: Mean win percentage across final 1000 evaluation
episodes for the different scenarios. The highest mean per-
formances are in bold. The results of COMA are extracted
from the published paper [11].
Map
5 M
2d3z
Heur.
66
63
IAC
45
23
IAC+PER
85
76
COMA
81
47
IGASIL
96
87
The results show that our IGASIL is superior to the IAC base-
lines in all scenarios. For the parameters sharing among the homo-
geneous agents (which has been shown to be useful in facilitate
training [16]), IAC also learned some coordination on the simpler
m5v5 scenario. However, it's hard for IAC to achieve cooperation
on the more complicated 2d3z scenario, due to the different types of
units, local observations and the resulting dynamics. On 2d3z, our
IGASIL still achieves a 82% win rate during training and achieves a
87% win rate in evaluation. In Table (2), we summarize the averaged
evaluation win rates of different approaches under multiple combat
scenarios (The results of COMA are extracted from the published
paper [11].). The winning rate of the built-in AI (Heur.) is also
provided as an indicator of the level of difficulty of the combats.
The best result for a given map is in bold. The results show that
our independent IGASIL outperforms all approaches in the perfor-
mance of evaluation win rate and even outperforms the centralized
trained COMA. Besides, our IGASIL converges faster than COMA
according to Figure (4) and Figure (3) of [11].
5.2 Sample Efficiency of IGASIL
To show the sample efficiency of our off-policy IGASIL in coop-
erative multiagent systems, we compare the performance of the
on-policy (on-policy AC+SCER) and off-policy versions (based on
off-policy AC+SCER) of IGASIL in the animal rescue task. To clearly
Figure 5: The average number of touches of different
wounded animals by the two rescues during training with
different algorithms.
5.1.2 Decentralised StarCraft Micromanagement.
Game Settings. In this section, we focus on the problem of mi-
cromanagement in StarCraft, which refers to the low-level control
of individual units' positioning and attack commands as they fight
with enemies. This task is naturally represented as a multiagent
system, where each StarCraft unit is controlled by a decentralized
independent controller (agent). We consider two scenarios with
symmetric teams formed of: 5 marines (5m) and 2 dragoons with
3 zealots (2d_3z). The enemy team is controlled by the built-in
StarCraft AI, which uses reasonable but suboptimal hand-crafted
heuristics. Since the game is easily obtained and is fair for compari-
son, micromanagement of StarCraft has become a standard testbed
for multagent learning algorithms (for both independent learners
and joint learners), which has been widely studied in recent years
such as COMA [11], BiCNet [38], QMIX [40]. Different from their
approaches which are all joint learners, we focus on fully indepen-
dent learning paradigm (independent learning and independent
execution). Similar settings can be found in [12]. The settings of
action space, state features and reward function are similar to that
in COMA [11].
Experimental Results. Figure (4) shows the average training
win rates as a function of episode for each method and for each Star-
Craft scenario. For each method, we conduct 5 independent trials
and calculate the win rate every 200 training episodes and average
them across all trials. In Figure (4), IAC represents the independent
IAC IAC+PER IGASIL 5000 1 0000 15000 20000 25000 30000 # Episodes (cid:68)(cid:81)(cid:76)(cid:80)(cid:68)(cid:79)(cid:86)see the influence of the on-policy and off-policy only, we initialize
Mi
E for each agent i with the same 32 demonstrations (demonstrated
by the pre-trained DDPG agent in Section 5.1.1, which will coopera-
tively catch "animal c", resulting an average return +5). We perform
learning under 5 random seeds (1,2,3,4,5). The imitation learning
results are shown in Figure (6). The x-axis represents the number
of episodes interacting with the environment during training. From
the figure, we see both the on-policy and off-policy IGASILs fi-
nally achieved cooperation (learned to "catch c" simultaneously).
However, the off-policy IGASIL is able to recover the expert policy
given a significantly smaller number of samples than the on-policy
version (about 10 times less). Thus, the sample-efficiency was sig-
nificantly improved.
Figure 6: The 100-episode training average returns of on-
policy and off-policy IGASIL respectively.
Figure 7: The curves of the maximum and average return val-
ues of the trajectories/sub-trajectories stored in Mi
E during
training on the 2d3z scenario.
Figure 8: The curve of the number of enemies killed per
episode during training on the 2d3z scenario (5 enemies in
total).
5.3 Contributions of Sub-Curriculum
Experience Replay
We analyze the roles and contributions of the sub-curriculum ex-
perience replay here. In Figure (4), we see IAC+PER outperforms
the IAC baseline in both scenarios, which means adding a positive
buffer Mi
E to store the good trajectories and doing self-imitation
learning could help the independent agents reach a cooperation.
Besides, IGASIL (IAC+SCER) outperforms IAC+PER in both scenar-
ios, which indicates that adding additional sub-trajectories sampled
from the original one (useful sub-skills) to Mi
E could further accel-
erate the self-imitation procedure and achieve better cooperation.
Besides, from Figure (7), we see that as the self-imitation learning
progresses, better experiences are stored in Mi
E. Then, the agents
would grasp these beneficial skills stored in Mi
E via self-imitation
learning. Using the learned new skills, the agents are more likely
to reach a better cooperation and learn better policies. As shown
in Figure (8), as the stored experiences in Mi
E gets better and bet-
ter, the number of enemies killed per episode (which indicates the
performance of the current policies) grows. All these analysis il-
lustrates that our sub-curriculum experience replay does help the
independent agents to achieve better cooperation. However, in our
settings, we limit the size of the normal buffers and positive buffers.
The techniques proposed in [12] might be incorporated into our
framework to allow us to use larger buffer size and further improve
the sample efficiency. We will consider it as future work.
6 CONCLUSION & FUTURE WORK
In this paper, we presented a novel framework called indepen-
dent generative adversarial self-imitation learning (IGASIL) to ad-
dress the coordination problems in some difficult fully cooperative
Markov Games. Combining self-imitation learning with generative
adversarial imitation learning, IGASIL address the challenges (e.g.,
non-stationary and exploration-exploitation) by guiding all agents
to frequently explore more around the nearby regions of the past
good experiences and learn better policy. Besides, we put forward a
sub-curriculum experience replay mechanism to accelerate the self-
imitation learning process. Evaluations conducted in the testbed
of StarCraft unit micromanagement and cooperative endangered
wildlife rescue show that our IGASIL produces state-of-the-art re-
sults in terms of both convergence speed and final performance.
In order to obviously see whether our IGASIL can significantly
facilitate the coordination procedure of the interactive agents, we
only consider the environments with deterministic reward func-
tions at present. In our future work, we are going to deal with more
challenging cooperative tasks (e.g., environments with stochastic
rewards).
ACKNOWLEDGMENTS
The work is supported by the National Natural Science Founda-
tion of China (Grant Nos.: 61702362, U1836214), Special Program
of Artificial Intelligence, Tianjin Research Program of Application
Foundation and Advanced Technology (No.: 16JCQNJC00100), and
Special Program of Artificial Intelligence of Tianjin Municipal Sci-
ence and Technology Commission (No.: 569 17ZXRGGX00150).
REFERENCES
[1] Pieter Abbeel and Andrew Y Ng. 2004. Apprenticeship learning via inverse
reinforcement learning. In Proceedings of the twenty-first international conference
on Machine learning. ACM, 1.
[2] Adrian K Agogino and Kagan Tumer. 2012. A multiagent approach to managing
air traffic flow. Autonomous Agents and Multi-Agent Systems 24, 1 (2012), 1 -- 25.
[3] Feryal Behbahani, Kyriacos Shiarlis, Xi Chen, Vitaly Kurin, Sudhanshu Kasewa,
Ciprian Stirbu, João Gomes, Supratik Paul, Frans A Oliehoek, João Messias, et al.
2018. Learning from Demonstration in the Wild. arXiv preprint arXiv:1811.03516
(2018).
[4] Raunak P Bhattacharyya, Derek J Phillips, Blake Wulfe, Jeremy Morton, Alex
Kuefler, and Mykel J Kochenderfer. 2018. Multi-agent imitation learning for
driving simulation. In 2018 IEEE/RSJ International Conference on Intelligent Robots
and Systems (IROS). IEEE, 1534 -- 1539.
[5] Michael Bloem and Nicholas Bambos. 2014.
Infinite time horizon maximum
causal entropy inverse reinforcement learning. In Decision and Control (CDC),
2014 IEEE 53rd Annual Conference on. IEEE, 4911 -- 4916.
[6] Mariusz Bojarski, Davide Del Testa, Daniel Dworakowski, Bernhard Firner, Beat
Flepp, Prasoon Goyal, Lawrence D Jackel, Mathew Monfort, Urs Muller, Jiakai
Zhang, et al. 2016. End to end learning for self-driving cars. arXiv preprint
arXiv:1604.07316 (2016).
[7] Yongcan Cao, Wenwu Yu, Wei Ren, and Guanrong Chen. 2013. An overview
of recent progress in the study of distributed multi-agent coordination. IEEE
Transactions on Industrial informatics 9, 1 (2013), 427 -- 438.
[8] Caroline Claus and Craig Boutilier. 1998. The dynamics of reinforcement learning
in cooperative multiagent systems. AAAI/IAAI 1998 (1998), 746 -- 752.
[9] Thomas Degris, Martha White, and Richard S Sutton. 2012. Off-policy actor-critic.
arXiv preprint arXiv:1205.4839 (2012).
[10] Carlos Florensa, David Held, Markus Wulfmeier, Michael Zhang, and Pieter
Abbeel. 2017. Reverse curriculum generation for reinforcement learning. arXiv
preprint arXiv:1707.05300 (2017).
[11] Jakob Foerster, Gregory Farquhar, Triantafyllos Afouras, Nantas Nardelli, and
Shimon Whiteson. 2017. Counterfactual multi-agent policy gradients. arXiv
preprint arXiv:1705.08926 (2017).
[12] Jakob Foerster, Nantas Nardelli, Gregory Farquhar, Triantafyllos Afouras,
Philip HS Torr, Pushmeet Kohli, and Shimon Whiteson. 2017. Stabilising ex-
perience replay for deep multi-agent reinforcement learning. In Proceedings of
the 34th International Conference on Machine Learning-Volume 70. JMLR. org,
1146 -- 1155.
[13] Justin Fu, Katie Luo, and Sergey Levine. 2017. Learning Robust Rewards with
Adversarial Inverse Reinforcement Learning. arXiv preprint arXiv:1710.11248
(2017).
[14] Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep
learning. Vol. 1. MIT press Cambridge.
[15] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley,
Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial
nets. In Advances in neural information processing systems. 2672 -- 2680.
[16] Jayesh K Gupta, Maxim Egorov, and Mykel Kochenderfer. 2017. Cooperative multi-
agent control using deep reinforcement learning. In International Conference on
Autonomous Agents and Multiagent Systems. Springer, 66 -- 83.
[17] Jonathan Ho and Stefano Ermon. 2016. Generative adversarial imitation learning.
In Advances in Neural Information Processing Systems. 4565 -- 4573.
[18] Maximilian Hüttenrauch, Adrian Šošić, and Gerhard Neumann. 2017. Guided
deep reinforcement learning for swarm systems. arXiv preprint arXiv:1709.06011
(2017).
[19] Bingyi Kang, Zequn Jie, and Jiashi Feng. 2018. Policy Optimization with Demon-
strations. In International Conference on Machine Learning. 2474 -- 2483.
[20] I. Kostrikov, K. Krishna Agrawal, D. Dwibedi, S. Levine, and J. Tompson. 2018.
Discriminator-Actor-Critic: Addressing Sample Inefficiency and Reward Bias in
Adversarial Imitation Learning. ArXiv e-prints (Sept. 2018). arXiv:1809.02925
[21] Martin Lauer and Martin Riedmiller. 2000. An algorithm for distributed rein-
forcement learning in cooperative multi-agent systems. In In Proceedings of the
Seventeenth International Conference on Machine Learning. Citeseer.
[22] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. nature
521, 7553 (2015), 436.
[23] Joel Z Leibo, Vinicius Zambaldi, Marc Lanctot, Janusz Marecki, and Thore Graepel.
2017. Multi-agent reinforcement learning in sequential social dilemmas. In
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems.
International Foundation for Autonomous Agents and Multiagent Systems, 464 --
473.
[24] Sergey Levine, Chelsea Finn, Trevor Darrell, and Pieter Abbeel. 2016. End-to-end
training of deep visuomotor policies. The Journal of Machine Learning Research
17, 1 (2016), 1334 -- 1373.
[25] Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez,
Yuval Tassa, David Silver, and Daan Wierstra. 2015. Continuous control with
deep reinforcement learning. arXiv preprint arXiv:1509.02971 (2015).
[26] Michael L Littman. 1994. Markov games as a framework for multi-agent rein-
forcement learning. In Machine Learning Proceedings 1994. Elsevier, 157 -- 163.
[27] Ryan Lowe, Yi Wu, Aviv Tamar, Jean Harb, OpenAI Pieter Abbeel, and Igor
Mordatch. 2017. Multi-agent actor-critic for mixed cooperative-competitive
environments. In Advances in Neural Information Processing Systems. 6379 -- 6390.
[28] Laëtitia Matignon, Guillaume Laurent, and Nadine Le Fort-Piat. 2007. Hysteretic
Q-Learning: an algorithm for decentralized reinforcement learning in cooperative
multi-agent teams.. In IEEE/RSJ International Conference on Intelligent Robots and
Systems, IROS'07. 64 -- 69.
[29] Laetitia Matignon, Guillaume J Laurent, and Nadine Le Fort-Piat. 2012. Indepen-
dent reinforcement learners in cooperative markov games: a survey regarding
coordination problems. The Knowledge Engineering Review 27, 1 (2012), 1 -- 31.
[30] Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness,
Marc G Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg
Ostrovski, et al. 2015. Human-level control through deep reinforcement learning.
Nature 518, 7540 (2015), 529.
[31] Sanmit Narvekar. 2016.
Curriculum Learning in Reinforcement Learn-
ing:(Doctoral Consortium). In Proceedings of the 2016 International Conference
on Autonomous Agents & Multiagent Systems. International Foundation for Au-
tonomous Agents and Multiagent Systems, 1528 -- 1529.
[32] Sanmit Narvekar, Jivko Sinapov, Matteo Leonetti, and Peter Stone. 2016. Source
task creation for curriculum learning. In Proceedings of the 2016 International
Conference on Autonomous Agents & Multiagent Systems. International Foundation
for Autonomous Agents and Multiagent Systems, 566 -- 574.
[33] Sanmit Narvekar, Jivko Sinapov, and Peter Stone. 2017. Autonomous task sequenc-
ing for customized curriculum design in reinforcement learning. In Proceedings
of the 26th International Joint Conference on Artificial Intelligence (IJCAI), Vol. 147.
149.
[34] Junhyuk Oh, Yijie Guo, Satinder Singh, and Honglak Lee. 2018. Self-Imitation
Learning. arXiv preprint arXiv:1806.05635 (2018).
[35] Shayegan Omidshafiei, Jason Pazis, Christopher Amato, Jonathan P How, and
John Vian. 2017. Deep decentralized multi-task multi-agent reinforcement learn-
ing under partial observability. arXiv preprint arXiv:1703.06182 (2017).
[36] Gregory Palmer, Karl Tuyls, Daan Bloembergen, and Rahul Savani. 2018. Lenient
multi-agent deep reinforcement learning. In Proceedings of the 17th International
Conference on Autonomous Agents and MultiAgent Systems. International Founda-
tion for Autonomous Agents and Multiagent Systems, 443 -- 451.
[37] Liviu Panait, Keith Sullivan, and Sean Luke. 2006. Lenient learners in cooperative
multiagent systems. In Proceedings of the fifth international joint conference on
Autonomous agents and multiagent systems. ACM, 801 -- 803.
[38] Peng Peng, Quan Yuan, Ying Wen, Yaodong Yang, Zhenkun Tang, Haitao Long,
and Jun Wang. 2017. Multiagent bidirectionally-coordinated nets for learning to
play starcraft combat games. arXiv preprint arXiv:1703.10069 (2017).
[39] Dean A Pomerleau. 1991. Efficient training of artificial neural networks for
autonomous navigation. Neural Computation 3, 1 (1991), 88 -- 97.
[40] Tabish Rashid, Mikayel Samvelyan, Christian Schroeder de Witt, Gregory Far-
quhar, Jakob Foerster, and Shimon Whiteson. 2018. QMIX: Monotonic Value
Function Factorisation for Deep Multi-Agent Reinforcement Learning. arXiv
preprint arXiv:1803.11485 (2018).
[41] John Schulman, Philipp Moritz, Sergey Levine, Michael Jordan, and Pieter Abbeel.
2015. High-dimensional continuous control using generalized advantage estima-
tion. arXiv preprint arXiv:1506.02438 (2015).
[42] David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George
Van Den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershel-
vam, Marc Lanctot, et al. 2016. Mastering the game of Go with deep neural
networks and tree search. nature 529, 7587 (2016), 484.
[43] Jiaming Song, Hongyu Ren, Dorsa Sadigh, and Stefano Ermon. 2018. Multi-agent
generative adversarial imitation learning. In Advances in Neural Information
Processing Systems. 7472 -- 7483.
[44] Richard S Sutton, Andrew G Barto, et al. 1998. Reinforcement learning: An intro-
duction. MIT press.
[45] Emanuel Todorov, Tom Erez, and Yuval Tassa. 2012. Mujoco: A physics engine
for model-based control. In Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ
International Conference on. IEEE, 5026 -- 5033.
[46] Weixun Wang, Jianye Hao, Yixi Wang, and Matthew Taylor. 2018. Towards Co-
operation in Sequential Prisoner's Dilemmas: a Deep Multiagent Reinforcement
Learning Approach. arXiv preprint arXiv:1803.00162 (2018).
[47] Yaodong Yang, Jianye Hao, Mingyang Sun, Zan Wang, Changjie Fan, and Goran
Strbac. 2018. Recurrent Deep Multiagent Q-Learning for Autonomous Brokers
in Smart Grid.. In IJCAI. 569 -- 575.
[48] Dayong Ye, Minjie Zhang, and Yun Yang. 2015. A multi-agent framework for
packet routing in wireless sensor networks. sensors 15, 5 (2015), 10026 -- 10047.
|
1604.02704 | 1 | 1604 | 2016-04-10T15:25:23 | Modeling and Simulation of Passenger Traffic in a National Airport | [
"cs.MA"
] | Optimal operation of a country's air transport infrastructure plays a major role in the economic development of nations. Due to the increasing use of air transportation in today's world, flights' boarding times have become a concern for both airlines and airports, thus the importance of knowing beforehand how changes in flights demand parameters and physical airport layout will affect passengers flow and boarding times. This paper presents a pedestrian modeling study in which a national airport passenger flow was analyzed. The study was conducted at Vanguardia National Airport in Villavicencio, Meta, Colombia. Different effects of structural changes are shown and provide judging elements for decision makers regarding passenger traffic in airport design. | cs.MA | cs | Modeling and Simulation of Passenger Traffic in a
National Airport
1Universidad de los Llanos, Colombia, [email protected], [email protected],
J. Enciso, M.Sc.1, J. Vargas, Ing.(c)1, and P. Martinez, Ing.1
[email protected]
Abstract– Optimal operation of a country's air transport
infrastructure plays a major role in the economic development of
nations. Due to the increasing use of air transportation in today's
world, flights' boarding times have become a concern for both
airlines and airports, thus the importance of knowing beforehand
how changes in flights demand parameters and physical airport
layout will affect passengers flow and boarding times. This paper
presents a pedestrian modeling study in which a national airport
passenger flow was analyzed. The study was conducted at
Vanguardia National Airport in Villavicencio, Meta, Colombia.
Different effects of structural changes are shown and provide
judging elements for decision makers regarding passenger traffic in
airport design.
Keywords-- Passenger traffic flow, airport model, pedestrian
model.
I. INTRODUCTION
The aim of this research project is to understand the
passenger flow in a national airport using a pedestrian model
with emphasis on boarding time (the time it takes for a
passenger to go from the airport's entrance door to the
airplane, going trough check-in and control points, and
waiting halls) in order to provide insights for decision makers
regarding the capacity usage and passenger satisfaction trough
diminishing waiting times.
Technological advancements have made flights safer, faster,
and cheaper, making air transportation an each time more
popular option for passengers. Passenger satisfaction, in
accordance with cost and operational efficiency,
is
increasingly difficult to manage due to growing demand,
thereby, increasing demand becomes a double-edged sword:
while it may seems like a perfect opportunity to increase
profits for airports and airlines, it can also become a problem
as the rising demand makes the boarding and landing times
longer,
in
consequence, a smaller number of flights gets done daily.
Today, one of the bottlenecks of analysis for terminal and
operational planners consists in realistically modeling and
analyzing passenger operations, constrained by the terminal's
physical design.
Air transport is one of the most influential services in
Colombian economy. The country's topography and the
consequent difficult access to the most remote regions make it
really important. In addition, air transportation presents to
Colombia, a developing country, as a gate to global economy,
is, each flight needs more
time and
that
include:
supporting
the previous claim
more convenient than other transportation options after the
cost/ benefit analysis.
There has been a notable growth of air transportation system
in Colombia in the last years. Between 1990 and 1999, air
transportation's contribution to the Gross Domestic Product
(GDP) grew to an annual average rate of 2, 7% and went down
to 1, 3% in the financial crisis period between 1999 and 2002.
After the crisis period, from 2003 to 2009 it grew around 4,1%
similar to that of the country's economy, that tells that the
demand for air transportation services is directly proportional
to the Colombian economy growth [1].
"La
Studies
infraestructura de transporte en Colombia" by Cardenas et al.
[2], "El impacto del transporte aéreo en la economía
colombiana y las políticas públicas" by Olivera et al. [1], "La
infraestructura aeroportuaria del Caribe colombiano" by
Otero [3] and "A Study of Cargo Receipt Logistics for Flower
Exportation at El Dorado International Airport in Bogotá
D.C." by Gutierrez et al. [4].
Research on this topic is uncommon in Latin American
countries, let alone, research using modeling and simulation
techniques, that and the importance of an optimal functioning
air-transport infrastructure for a developing country like
Colombia gives relevance to these kind of studies and
encourages further research in this field.
After the implementation of the computational model was
done, scenarios were constructed using
the Simulation
experiment from the Experiment Framework provided by
AnyLogic. The results of the research were presented on a
public lecture that reunited entrepreneurs, merchandisers, and
civil authorities from the city council.
The remainder of this article is structured as follows. Section 2
presents a review of previous work on the use of modeling and
improve airport
simulation
performance. Section 3 presents
the agent-based and
pedestrian modeling theory. Section 4 presents the research
project's methodology. Section 5 demonstrates the scenarios
generated and results analysis and, finally, in Section 6
conclusions are presented.
study and
techniques
to
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
1
II. PREVIOUS WORK
tool
to
Simulation has been used as a
improve
performance in many fields. Regarding air transport terminal
design, there are some examples like the one presented by
Thomet & Mostoufi in a chapter of the book "Transportation
and Development, Innovative Best Practices" [5] where they
show the application of simulation techniques in the design of
an air terminal in Curaçao. Simulation was done with a
dynamic, object-oriented, pedestrian model fed by a realistic
flight itinerary for a 24-hour day, with the aim of knowing the
amount of passengers arriving and departing the airport along
one day. Curcio presents another example in "Passengers'
flow analysis and security issues in airport terminals using
modeling & simulation" [6] where the International airport of
Lamezia Terme in Calabria, Italy, is studied. The objective of
the study was to analyze system performance under different
scenarios
in
AnyLogic. The passengers average wait time for reaching the
gate area was the measure of system performance.
through a simulation model
implemented
It has also been used on a more 'micro' level for addressing
things like optimization of check-in points location in
"Optimizing
the Airport Check-In Counter Allocation
Problem" by Araujo & Repolho [7], and reducing its number
in "A network model for airport common use check-in counter
assignments" by Tang [8].
Software tools for this kind of problems have been created,
although they are still few, one of them is GPenSIM by
Davidrajuh & Lin written in 2011[9] and designed to model
and simulate Harstad/Narvik airport in Norway using a
discrete-event system with emphasis on the flow capacity,
defined as the number of passengers using the airport per time
unit, and the average time required to board the plane once the
passenger is inside the airport. Another one, popular within the
research community, and with a more generic approach, is
SimWalk Airport described by its authors as a "specialized
passenger simulation and analysis solution for airports that
offers realistic modeling and evaluation of passenger
operations", it allows to optimize airport design, passenger
flows and terminal operations, by modeling airport objects
(e.g., check-in and security control points) and integrating
flight schedules and airport processes.
Another tool is Space Syntax by Raford & Ragland a
pedestrian volume-modeling
tool specially designed for
pedestrian safety purposes [10].
Future applications of modeling and simulation techniques to
improve air transport terminals' performance are endless.
Generic and little-thought construction and design guidelines
for public buildings –often inadequately– are provided for the
complexities of physical reality, in particular under emergency
scenarios. Experience has shown that application of simplistic
physical standards to densely occupied public buildings like
airports, stadiums and shopping malls most of the time fails to
provide the safety of crowds in an emergency situation.
Moreover, the world today is facing an increasing danger from
the dynamic and unpredictable threat of terrorism. One of the
most effective ways to protect pedestrians in these public-
places emergency scenarios lies in the attention given to their
behavior within the building in these cases [11]. As stated by
Smedresman, "The increased frequency of natural and man-
made disasters makes it important to assess and optimize
evacuation plans. Emergency event modeling can help
emergency management agencies develop effective evacuation
plans that save lives." [12].
III. AGENT BASED AND PEDESTRIAN MODELING
THEORY
System modeling is a tool for solving real world
problems [13]. Most of the time, solutions for these problems
cannot be found by experimental means, because modifying
system's components can result too expensive, dangerous, or
literally impossible [14]. In these cases, the best option is to
build a computational model of the real-world system. The
modeling process implies a certain level of abstraction, where
only the most relevant features of the system are included. A
model is always less complex than the original system.
AnyLogic is a tool that provides three simulation methods:
system dynamics, discrete event and agent-based simulation;
these methods can be used individually or at the same time
[12]. AnyLogic is one of the most popular tools in the market
and has been used in many research fields and for different
purposes, such as the distributed simulation of hybrid systems
[15], spread of epidemics
[16] and massive product
consumption [17]. AnyLogic is the simulation tool chosen for
this research project.
Agent-based modeling is a tool for the study of systems from
the complex adaptive system perspective. This approach tries
to explain macro phenomena as a result of micro level
behavior among a heterogeneous set of interacting agents.
Agent-based modeling allows for testing in a systematic way
different hypotheses related to agent attributes, behavioral
rules, and interaction types and their effect on macro level
facts of the system [18].
their objects (agents) and determining
Agent-based modeling allows building a system's model by
identifying
their
behaviors, even if the whole system behavior, their key
variables, and their dependencies are unknown. Once agent
behavior is defined, agents can be created and put in an
environment where they are allowed to interact. The system's
global behavior is a result of lots of concurrent individual
behaviors [12].
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
2
Agents determine their interactions with other agents and with
their environment, on the basis of internalized social norms
and mental models, internal behavioral rules and cognitive
abilities, and formal and informal institutional rules among
other factors [18]. In Agent-based modeling, agents do not
have perfect knowledge of the system and make their
decisions based on the perceptions they have on their
environment; these perceptions do not have to include correct
representations of reality and may vary among agents.
An agent is defined by its characteristics: activity, autonomy,
and heterogeneity. Each agent has an activity; it acts according
to the rules of the system and its own pre-programmed
behavior. The agent's behavior can also be defined according
to its features: goal direction, sensitivity, bounded reality,
interactivity, mobility and adaptation [19]. Although agents
may have a defined goal, and its behavior be 'ruled' by the
system rules they can still make their own decisions, so they
are autonomous. By the way, although each agent may begin
as a member of a limited set of common templates, it can
develop individuality through autonomous activity in the sense
described previously [19].
The inherent complexity of agent-based modeling may make it
seem like a technique with difficult or little application, and in
fact, in many domains, agent-based modeling competes with
traditional equation based approaches based on
the
identification of system variables and its evaluation through
integrated sets of equations relating these variables. Both
approaches simulate the system by constructing a model and
executing it on a computer. The differences are in the form of
the model and how it is executed [20].
In agent-based modeling, the model consists of a set of agents
that encapsulate the behaviors of the various individuals that
make up the system, and execution consists of emulating these
behaviors. In equation-based modeling, the model is a set of
equations, and execution consists of evaluating them.
Thus "simulation" is the general term that applies to both
methods, which are distinguished as (agent-based) emulation
and (equation-based) evaluation [20]. Understanding the
relative capabilities of these two approaches is of great ethical
and practical interest to system modelers and simulators.
Choosing the wrong approach for a problem could lead to
incorrect results and it may translate to emergency situations
in the real world.
Traditional modeling methods such as discrete-event and
queuing may not work well in areas with high amounts of
pedestrian movement
[12]. Traditional discrete-event
simulation looks down on a system from above, designing
process flows and creating entities to travel through the
system. Agent-based modeling changes the perspective of the
simulation from the high-level processes to that of the system
entities, called agents. Instead of the processes evaluating and
manipulating the agents, the agents themselves are able to
gather information about their environment and react based on
what they individually perceive.
The power of agent-based modeling lies in its ability to allow
the agents to have some level of intelligence and to control
their own decisions, thus resulting in behavior and outcomes
that are more authentic in real-world systems dependent on
individual actions. Pedestrians move in continuous space
while they react to obstacles and one another [12]. Because of
this unique perspective, agent-based simulation techniques are
well suited for modeling pedestrian flows
through an
environment. The techniques are able to address some of the
difficulties from which pedestrian modeling has suffered when
trying to obtain complexity on a microscopic level [21].
An early example of the use of agent-based modeling to
simulate pedestrian movement can be found in STREETS, a
model developed by Schelhorn et al. in 1999 [22], under the
idea of the importance of people movement for defining the
'vibrancy' of a town. The study outlined the possible uses of
this kind of simulation and served as a beginning for such
predictive models.
Life in cities is becoming increasingly crowded with people.
Mass gatherings are more frequent in nowadays world than
they were in past years, this can be attributed to the increase in
world population and to air transportation becoming more
cost-effective. This fact creates the need to find solutions to
make those crowded places safer, and more efficient in terms
of travel time. Pedestrian modeling can help to assess and
optimize locations where pedestrian crowds move around
[23]. Modeling allows collecting data about a given areas
pedestrian density, ensure acceptable performance levels for
service points with a hypothetical load, estimate how long
pedestrians will stay in specific areas, and detect potential
problems that interior changes such as adding or removing
obstacles, or service points, may cause. Pedestrian traffic
simulation plays an important role in nowadays construction,
expansion, and other design-related projects for public
buildings like airports, shopping centers and stadiums [12].
These studies can help architects improve building designs,
facility owners review potential structural and organizational
changes, engineers evaluate scenarios for improving capacity
usage and civil authorities simulate possible evacuation routes
in emergency scenarios. Since pedestrian flows can be
complex, they require a full-blown simulation.
Pedestrians' behavior follows basic rules that have been
determined by theoretical studies: they move at predetermined
rates, they avoid physical obstacles such as walls, furniture
and other people, and they use information about the crowds
that surround them to adjust their movements (word-of-mouth
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
3
effect). The results have been proven many times in field
studies and customer applications [12].
PEDESTRIAN MODELING APPROACHES CLASSIFICATION
TABLE 1
In the design of a building that will have many high-traffic
areas, like a supermarket, a subway station, a museum, a
stadium or an airport it should be a goal to create a physical
layout that minimizes travel time and ensures pedestrian flows
don't interfere with each other. Simulation can test for normal,
special, or peak pedestrian volume conditions, and it can also
be used to understand how changes in the physical layout like
the establishment of a new kiosk, new furniture or the
relocation of existing items like advertising panels, flowerpots,
pictures etc. will affect their operations, pedestrian travel
times, and the general customer experience.
Different approaches to pedestrian modeling can be classified
according to their level of abstraction, detail of description and
model's
[23], a
classification of pedestrian modeling approaches is shown in
Table 1.
(discrete or continuous)
time
type
IV. METHODOLOGY
The aim of this project is to model the Vanguardia
National Airport's passenger flow in order to obtain qualitative
information that can be useful for improving airport's capacity
usage, and passenger satisfaction.
Modeling and simulation are the quantitative research methods
used in this project; qualitative research is done through
previous work review and data collection. Data for developing
the model were collected by means of observation, interviews
to airport's employees and information requests made to the
airport's administration. Airport's security policies limited the
data collection process, as much information could not be
made publicly available.
ICAO: SKVV)
The study object is the Vanguardia National Airport (IATA:
in Villavicencio, Meta,
VVC,
Colombia.
flights
for commercial
passenger, Chárter, cargo, and private airlines.
located
It serves domestic
to 18:00 COT. According
The airport works seven days a week, every week of the year,
from 06:00
to airport's
administration, the airport handles a total daily operation
volume of about a hundred flights (this includes, all types of
flights: passenger, Chárter, private and cargo flights) and a
monthly total volume of around 3.400 flights. The number of
passengers received for the year 2014 was 107.551, there were
108.121 passengers shipped that same year [24]. Only
departing passengers are modeled in this project, incoming
passengers are not within the scope of this study.
Abstraction level
Microscopic
models
Macroscopic
models
Mesoscopic
models
Describe
each
pedestrian as a unique
entity with
its own
properties.
Determine the average
pedestrian dynamics by
densities,
flows and
velocities as functions
of space and time.
These models are in
between the other two,
taking into account the
velocity
distribution.
Mesoscopic models
often
include
individual entities but
model
interactions
between the m with
common fields.
Description detail
Discrete-space models
Continuous models
Sub-divide the environment into a
lattice, and the spatial resolution of
the model is limited by the cell size.
Describe the spatial resolution down
to an arbitrary level of detail.
Time
Discrete time
Continuous time
If time is advanced only until next
event occurs, system time is discrete.
If there is no fixed time step in the
model, system time is continuous.
Villavicencio is the capital city of Meta department, and it is
situated in the northern part of it, 85 km to the south of
Bogotá, the country's capital.
It is considered the most-important commercial center of the
Orinoquía region, and it has an approximate population of
495,200 inhabitants and a population density of 370.1
inhabitants per square kilometer. It is still a small city and its
population is about one sixteenth of the Colombia's capital
city, Bogotá population [25].
Lack of concise and relevant airport's operation historical data
hindered the development of the model, the research team had
to do the best it could with what it had. Model parameters
were estimated based on data provided by the airport
administration, interviews to airport and airlines employees,
and in-site observation.
A. BOARDING LOGIC
Vanguardia is still a small national airport. Although
there are more airlines working there, only local
airlines –Avianca and Satena– have enough demand
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
4
leave
to need check-in point queues, therefore these are the
only check-in points modeled.
Passengers can buy their tickets through a travel
agency, call-center, web page, or at the airport
facilities. Passenger check-in can be done on-line, by
mobile app, or at the airport facilities. In-site check-
in takes about one minute according to the airlines'
employees
interviewed. There are not different
boarding types in the studied airlines, although there
are Chárter flights, an exclusive type of flight that is
not marketed through the usual sales channels, and
that due to its characteristic is not within the scope of
this study.
After checking-in, passengers must
their
luggage in the corresponding airline warehouse,
where it is scanned. The airport police agents call
passengers if abnormalities are found during the
scanning process. The Airport has two security-check
rooms; passengers go to the one working at the
moment their boarding starts. Security check-in staff
members check the passengers boarding pass and
ticket, and made them pass through a metal detector.
The entire security check-in process lasts no more
than five minutes for each passenger, according to
security check-in staff members.
Inside the airport there is a police office for migration
control and prevention. At the moment of this
research, control is for foreign passengers only.
Police officer must check if the foreign passengers
have criminal records after they have made their
check-in, and before they go to the security check-in.
Next step involves one of the two local airlines.
Satena (acronym for Servicio Aéreo a Territorios
Nacionales) is a Colombian government owned
airline that operates domestic routes, it is based in
Bogotá, Colombia, and it was founded in 1962.
Satena has direct flights from Villavicencio to
Bogotá, Puerto Inírida, Puerto Carreño, and Mitú.
These flights depart on different days of the week,
and there is only one of each per day: Bogotá and
Mitú on Mondays, Puerto Inírida on Tuesdays and
Saturdays, and Puerto Carreño on Thursdays.
Avianca (acronym for Aerovías del continente
americano S.A.) is Colombia's national airline and
flag carrier, since December 5, 1919.
is
headquartered in Bogotá it is the largest airline in
Colombia, and the world's second oldest airline. It
offers direct flights from Villavicencio to Bogotá
only, and these flights depart twice every day.
It
B. COMPUTATIONAL MODEL DEVELOPMENT
Summarizing, the airport's boarding logic goes as
follows: a passenger buys his ticket through a travel
agency, call-center, web page, or at the airport
facilities (in the day previous to the flight's date).
Once the flight's date comes the passenger goes to the
airport and makes his/her check-in, and goes to sit at
the waiting hall until the flight's boarding starts, once
that happens, the passenger goes through the security
check-in, if the passenger is a foreigner he/she must
have gone to the migration police office before, after
the passenger goes through all this, he/she goes to the
gate, shows the ticket to an airport's employee and
then, boards the plane.
The computational model was developed using
AnyLogic 7 University 7.2.0. Model describes the
pedestrian flow at the airport by simulating the
services
like security checkpoints and check-in
facilities and its queues, the boarding logic and the
different kinds of routes each passenger could follow
from the entrance to the gate, and a realistic flight
schedule saved in a Microsoft Excel sheet. Finally,
qualitative information is obtained through the model
execution animation and the pedestrian density map
included.
The model development was carried out in five
phases.
In the first phase, a simplified pedestrian flow was
defined. Passengers appear at the airport's entrance
line and go to the gate in order to board their plane.
In this path, passengers will have to stop and wait at
some points. From the data given by the airport
administration the research team concluded that the
average passenger arrival rate is approximately 25
passengers per hour. From statistical work carried
over direct observation data it was found that the
average passenger comfortable walking speed lies in
the interval between 0,61493 and 0,88841 meters per
second with a mean of 0,75167 and a standard
deviation of 0,13674 .
On the second phase, the airport's service point and
waiting areas were defined, that is, the points that
passengers have to stop at, previously mentioned.
Avianca had two check-in points and Satena, one.
The airport had two security check points, passengers
go to the one with the shortest queue as both points
are modeled as if they were always working; there
was only one waiting area for passengers. The airport
police office for migration control and prevention is
modeled as an airport service as well. The delay
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
5
in
is defined
times was
these delay
computational model
(service) times for each service point are entered in
the
through probability
distributions (stochastic). The distribution chosen to
model
the Triangular
probability distribution, based on the knowledge of
the minimum, maximum and a "guess" of the mean
time. This limited sample data was obtained through
interviews to the operating staff of the mentioned
services.
On the third phase, types of passengers were
differentiated. As there are no different kinds of
boarding for commercial passenger flights in this
airport, passengers are differentiated by
their
nationality. Colombian passengers get to the airport,
check-in, and wait for their flight's boarding start, go
through the security check-in and then go to the gate.
Foreign passengers have to go to the airport's police
office, to check their criminal records, before they
pass through the airport's security check. The flight's
schedule
the fourth phase. The
simulation has a duration of 12 hours following the
airport's schedule, from 06:00 to 18:00 COT. The
schedule implemented is based on the real destinies
served by the airport, so it is a realistic schedule, but
not a real one. Each flight has a departure and a
destination times, this information is recorded in the
spreadsheet
flight has a passenger
collection as well; this collection stores the list of
passengers that has bought tickets for the flight. At
this point, passengers have two attributes, nationality
and flight.
On the last phase, the functions and events that tie the
whole model together are defined, functions represent
complex processes that connect the model's pieces
and allow defining a simulation flow for it, events
allow
information-
dependent events happening at the same time, for this
model the events were the boarding and the departure
events (EventoAbordaje and EventoSalida in the
model). Functions defined for this model were
comenzarAbordaje,
configurarPasajero,
planearAbordaje
configurarVuelos.
The Simulation experiment from the AnyLogic's
Experiment Framework was chosen as the tool for
the debugging, validation and visual demonstration of
the model. The computer-generated animation
allowed the diagnosis of some programming errors,
especially related to airport services parameters
configuration.
file. Each
similar
scheduling
several
and
C. SCENARIOS GENERATED AND RESULT
ANALYSIS
The result analysis stage deals with the development
of scenarios for
the verification of productive
bottlenecks and proposal of process improvements
[26]. The flight schedule used for the scenarios
generated is shown in Table 2.
TABLE 2
FLIGHT SCHEDULE
Destination
Mitú – Satena
Bogotá – Avianca 1
Puerto Inírida – Satena
Bogotá – Satena
Puerto Carreño – Satena
Bogotá – Avianca 2
Departure Date
23/01/2016 6:30
23/01/2016 7:00
23/01/2016 8:30
23/01/2016 10:00
23/01/2016 15:30
23/01/2016 16:30
to
information request
The first scenario represents reality, which was simulated
using the computational model using data obtained from
interviews, specific
the airport
administration and observations, and trying to emulate the
airport service layout as close as possible.
The areas with highest pedestrian density were the waiting
hall –that tends to get crowded very easily– and the area near
the police office –that gets easily crowded as the number of
foreign passengers grow– when there is only one officer in
service. Check-in service works well as long queues are not
common. When there is only one officer in service, this area
gets really crowded. Around 4:00 p.m. the airport services
start to work at full-capacity, all areas get crowded and the
number of security check points shows insufficient as there are
really long queues on both points.
Pedestrian density map and queue sizes in each service point
are the main performance indicators for each scenario.
Parameters like passenger arrival rate, number of check-in
points, number of security check points and number of police
officers in service are varied to generate the next three
scenarios.
A total of four scenarios were generated. Table 3 shows a
description of each scenario.
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
6
TABLE 3.
SIMULATION SCENARIOS
Passenger
arrival rate
per hour
25
Check
in point
number
3
Security
point
number
2
Police
officer
number
1
25
50
25
4
3
3
3
2
3
1
1
3
Scenario
1
2
3
4
Annotation
Services
collapse
after 4 p.m.
Better
performance.
Services still
collapse
after 4 p.m.
The airport
is in chaos.
Best
performance
scenario.
For the second scenario the number of check-in and security
checkpoints is increased by 1, other parameters were left
equal. Performance in general, is much better than in scenario
1, the waiting areas have less pedestrian density, especially in
the morning. Pedestrian traffic around 4:00 p.m. is still heavy;
queues become long, but not so much as in Scenario 1. The
police office is just as crowded as it was in Scenario 1.
What would happen if the number of passengers coming to the
airport doubled? Would the current layout be enough? In the
third scenario the passenger arrival rate is doubled, but the
airport service desk layout remains untouched. By 8:00 a.m.
the waiting hall is near full, but the rest of the airport remains
empty. At 10:00 a.m. a first collapse occurs, security check
queues get long and only empty themselves until 12:00 m. By
2:00 p.m. the waiting hall is full again. By 4:00 p.m., the
airport gets really crowded, all airport service points are full
and have really long queues, and pedestrian density is high in
almost every point of the airport surface. The airport is in
chaos.
The fourth scenario seems to be the one with the best
performance; passenger flow remains nice all day long,
although the waiting area gets crowded from noon onwards.
Around 4:00 p.m., after an initial congestion, queues move
faster than in the previous scenarios and the pedestrian density
is much more evenly distributed. Despite the increase in police
officers, the police office waiting area remains as the most
crowded in the model.
V. CONCLUSIONS
This research project aim was to study the pedestrian
flow in the Vanguardia National Airport by means of
computational modeling and simulation. By means of the
simulation experiment potential effects of structural changes
in the model's sources of delay –the airport's service points– in
the airport's performance and found useful information for
improving it.
The scenario generation done allowed finding that, first, the
current airport service points layout would not be enough to
face significant increases in the number of passengers; second,
the security check points are the main bottlenecks in the
airport's pedestrian flow, an increase in the number of these
immediately improves the airport's performance. And third,
the police officer for migration control and prevention is the
next most important bottleneck in the flow, the process of
checking the foreign passengers' criminal records can take so
much time that not even tripling the number of officers is
enough to avoid forming crowds at that point as the number of
foreign passengers grow.
Generalization of the developments made in this study would
open up possibilities for the application of these techniques in
the design of functional spaces for other types of buildings
with high levels of pedestrian traffic. Although is still
somewhat challenging to create an airport's service point
organization from scratch using simulation, a model could be
used effectively to work on an already existing organization
and suggest modifications for more efficient capacity usage
and a better passenger flow [11].
Finally, this study enable decision makers to improve their
understanding regarding pedestrian flows in public buildings
in Villavicencio and offers the first and most detailed look yet
at the Vanguardia National Airport processes, as well as
suggestions for improving its performance. However, this
should not be the concluding study for these topics, but one
that inspires further research in this field.
ACKNOWLEDGMENT
The authors would like to express their gratitude to the
University of the Llanos for supporting the efforts of the
research team trough the study-group Advanced Simulation
Concepts
the Vanguardia National Airport
administration staff, for their kind help and appreciation for
the project, and finally, to IngenTIC, the IT solutions
company, that helped fund their efforts.
(ASC),
to
REFERENCES
[1] M. Olivera, P. Cabrera, W. Bermúdez, and A. Hernández, "El impacto del
transporte aéreo en la economía colombiana y las políticas públicas",
Cuadernos de Fedesarrollo, Apr. 2011.
[2] M. Cárdenas, A. Gaviria, and M. Meléndez, "La infraestructura de
transporte en Colombia," Infraestructura, Transporte, Comunicaciones y
Servicios Públicos, Aug. 2005.
[3] A. Otero, "La infraestructura aeroportuaria del Caribe colombiano,"
Documentos de trabajo sobre economía regional, Feb. 2012.
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
7
[4] E. Gutierrez, F. Ballesteros, and J. Torres, "A study of cargo receipt
logistics for flower exportation at el dorado international airport in Bogotá
in Production Systems and Supply Chain Management in
D.C.,"
Emerging Countries: Best Practices (G. Mejia and N. Velasco, eds.), pp.
61{79, Springer Berlin Heidelberg, 2012.
[5] M. A. Thomet and F. Mostoufi, "Simulation-Aided airport terminal
design," in Transportation and Development Innovative Best Practices
2008, pp. 118 - 123, American Society of Civil Engineers, Apr. 2008.
[6] F. L. Duilio Curcio, "Passengers' flow analysis and security issues in
airport terminals using modeling & simulation".
[7] G. E. Araujo and H. M. Repolho, \Optimizing the airport Check-In
counter allocation problem," Journal of Transport Literature, vol. 9, pp.
15-19, Dec. 2015.
[8] C.-H. Tang, "A network model for airport common use check-in counter
assignments," Journal of the Operational Research Society, vol. 61, pp.
1607-1618, Oct. 2009.
[9] R. Davidrajuh and B. Lin, "Exploring airport trafficc capability using
petri net based model,"Expert Systems with Applications, vol. 38, pp.
10923 - 10931, Sept. 2011.
[10] N. Raford and D. Ragland, "Space syntax: Innovative pedestrian volume
modeling tool for pedestrian safety," Transportation Research Record:
Journal of the Transportation Research Board, vol. 1878, pp. 66 - 74,
Jan. 2004
[11] G. Smedresman, "Crowd simulations and evolutionary algorithms in floor
[12] I. Grigoryev, AnyLogic in three days - A quick course in simulation
plan design," May 2006.
modeling. 2015.
2005.
[13] J. Banks, J. S. Carson, B. L. Nelson, and D. M. Nicol, Discrete-Event
System Simulation (5th Edition). Prentice Hall, 5 ed., July 2009.
[14] Applied Simulation and Optimization: In Logistics, Industrial and
Aeronautical Practice. Springer, 2015 ed., Apr. 2015.
[15] A. Borshchev, Y. Karpov, and V. Kharitonov, \Distributed simulation of
hybrid systems with AnyLogic and HLA," Future Generation Computer
Systems, vol. 18, pp. 829 - 839, May 2002.
[16] Eurosim, B. Zupancic, R. Karba, S. Blazic, S. S. for Simulation,
Modelling, University., and F. od Electrical Engineering, "EUROSIM
2007 proceedings of the 6th EUROSIM congress on modeling and
simulation, 9-13 September 2007, Ljubljana, Slovenia," 2007.
[17] M. Garifullin, A. Borshchev, and T. Popkov, "Using AnyLogic and agent-
based approach to model consumer market".
[18] M. A. Janssen, Agent-Based Modelling. Arizona State University, Mar.
[19] A. Getchell, \Agent-based modeling," June 2008.
[20] H. Van Dyke Parunak, R. Savit, and R. Riolo, "Agent-Based modeling vs.
Equation Based modeling: A case study and users' guide," in Multi-Agent
Systems and Agent-Based Simulation (J. a. Sichman, R. Conte, and N.
Gilbert, eds.), vol. 1534 of Lecture Notes in Computer Science , ch. 2, pp.
10 - 25, Berlin, Heidelberg: Springer Berlin Heidelberg, 1998.
[21] M. Barker, "A survey on Agent-Based modeling of pedestrian
movement," tech.rep., University of Central Florida, 2006.
[22] T. Schelhorn, D. O'Sullivan, M. Haklay, and M. Thurstain-Goodwin,
"STREETS: An agent-based pedestrian model," Apr. 1999.
[23] A. Johansson and T. Kretz, "Applied pedestrian modeling," in Agent-
Based Models of Geographical Systems (A. J. Heppenstall, A. T. Crooks,
L. M. See, and M. Batty, eds.), pp. 451 - 462, Springer Netherlands, 2012.
[24] L. M. S. Rodríguez, "Respuesta solicitud de información", Aeropuerto
Vanguardia, Aeronáutica Civil Colombiana, Jan. 2016.
[25] DANE, "Resultados y proyecciones (2005-2020) del censo 2005," tech.
rep., 2005.
[26] J. P. Lima, K. C. D. Lobato, F. Leal, and R. D. S. Lima, "Urban solid
waste management by process mapping and simulation," Pesquisa
Operacional, 2015.
14th LACCEI International Multi-Conference for Engineering, Education, and Technology: "Engineering Innovations for
Global Sustainability", 20-22 July 2016, San José, Costa Rica.
8
|
1310.6342 | 1 | 1310 | 2013-10-23T19:46:45 | Cultural Evolution as Distributed Computation | [
"cs.MA",
"nlin.AO"
] | The speed and transformative power of human cultural evolution is evident from the change it has wrought on our planet. This chapter proposes a human computation program aimed at (1) distinguishing algorithmic from non-algorithmic components of cultural evolution, (2) computationally modeling the algorithmic components, and amassing human solutions to the non-algorithmic (generally, creative) components, and (3) combining them to develop human-machine hybrids with previously unforeseen computational power that can be used to solve real problems. Drawing on recent insights into the origins of evolutionary processes from biology and complexity theory, human minds are modeled as self-organizing, interacting, autopoietic networks that evolve through a Lamarckian (non-Darwinian) process of communal exchange. Existing computational models as well as directions for future research are discussed. | cs.MA | cs | LIANE GABORA
University of British Columbia
Abstract
The speed and transformative power of human cultural evolution is evident from the
change it has wrought on our planet. This chapter proposes a human computation
program aimed at (1) distinguishing algorithmic from non-algorithmic components of
cultural evolution, (2) computationally modeling the algorithmic components, and
amassing human solutions to the non-algorithmic (generally, creative) components,
and (3) combining them to develop human-machine hybrids with previously
unforeseen computational power that can be used to solve real problems. Drawing on
recent insights into the origins of evolutionary processes from biology and complexity
theory, human minds are modeled as self-organizing, interacting, autopoietic networks
that evolve through a Lamarckian (non-Darwinian) process of communal exchange.
Existing computational models as well as directions for future research are discussed.
Reference
Gabora, L. (2013). Cultural evolution as distributed human computation. In P. Michelucci
(Ed.) Handbook of Human Computation. Berlin: Springer.
Cultural Evolution as Distributed Computation
Introduction
The origin of life brought about unprecedented change to our planet; new forms emerged creating
niches that paved the way for more complex forms, completely transforming the lands, skies, and
oceans. But if biological evolution is effective at bringing about adaptive change, human cultural
evolution is arguably even more effective, and faster. Cultural change doesn’t take generations; it
works at the speed of thought, capitalizing on the strategic, intuitive creative abilities of the
human mind.
This chapter outlines current and potential future steps toward the development of a human
computation program inspired by the speed and effectiveness of how culture evolves. The
overarching goal of the kind of research program outlined in this chapter is to develop a scientific
framework for cultural evolution by abstracting its algorithmic structure, use this algorithmic
structure to develop human-machine hybrid structures with previously unforeseen computational
power, and to apply it to solving real problems. The proposed approach can be thought of as a
"repeatable method" or “design pattern” for fostering cultural emergence, defined by specific
computational methods for modeling interactions at the conceptual level, the individual level, and
the social level, and their application to the accumulation of adaptive, open-ended cultural
novelty.
Two Approaches to a Scientific Framework for Culture
Cultural evolution entails the generation and transmission of novel behavior and artifacts within a
social group, both vertically from one generation to another, and horizontally amongst members
of a generation. Like biological evolution, it relies on mechanisms for both introducing variation
Gabora - Cultural Evolution as Distributed Computation 2
and preserving fit variants. Elements of culture adapt, diversify, and become more complex over
time, and exhibit phenomena observed in biological evolution, such as niches, drift, epistasis, and
punctuated equilibrium (Bentley, Hahn & Shennan, 2004; Durham, 1991; Gabora, 1995).
However, we lack a precise understanding of how culture evolves.
We begin by summarizing two approaches that have been taken to developing a formal
understanding of the process by which culture evolves: Darwinian approaches, and Communal
Exchange approaches.
Darwinian Approaches
Dawkins’ (1975) proposal that culture evolves through reiterated variation and selection inspired
formal Darwinian models of cultural evolution (Boyd & Richerson, 1985, 2005; O’Brien, M.J., &
Lyman Cavalli-Sforza & Feldman, 1981; Henrich & Boyd, 1998, 2002). It also inspired some
archaeologists to apply methods designed for documenting the evolution of biological organisms
to chart the historical evolution of artifacts (e.g., O’Brien, & Lyman, 2000; Shennan, 2008).
Aside from the questionable assumptions underlying this approach (Atran, 2001; Fracchia &
Lewontin, 1999; Gabora, 1997, 1998, 1999, 2001, 2004, 2006a, 2008, 2011; Skoyles, 2008;
Temkin & Eldredge, 2007), it aims to model how cultural variants spread, not how they come
into existence, strategically building on and opening up new niches for one another.
Holland (1975) elucidated the algorithmic structure of natural selection, resulting in the
genetic algorithm (GA), and subsequently genetic programming (GP) (Koza, 1993), optimization
tools with diverse applications to everything from scheduling tasks (Hou, Ansari, & Ren, 1994)
to pipeline design (Goldberg, Kuo, 1987) to music and art (Bentley & Corne, 2002; DiPaola &
Gabora, 2009). The term cultural algorithm has referred to a GA that includes a ‘belief space’
used to prune the search space (Reynolds, 1994), not an algorithm inspired by how culture itself
evolves. GAs are effective for multi-constraint problems with complex fitness landscapes, but
would not do well on problems that require reformulating or restructuring the problem from
another perspective. GAs are breadth-first (generate many solutions randomly, and some by
chance may be effective), whereas cultural evolution, which relies on cognitive processes such as
learning, is depth-first (generate few solutions making use of strategic analysis or spontaneous
associations, either intentional or unintentional).
Communal Exchange
Mounting evidence suggests that a non-Darwinian framework is appropriate for, not just cultural
evolution, but the earliest stages of organic life itself (Gabora, 2006; Kauffman, 1993; Vetsigian,
Woese, & Goldenfeld, 2006; Williams & Frausto da Silva, 2003), and aspects of modern
microbial life (Woese 2002). There is widespread support for the hypothesis that the earliest
protocells were self-organized autocatalytic networks that evolved (albeit haphazardly) through a
non-Darwinian process involving horizontal transfer of innovation protocols, referred to as
communal exchange (Vetsigian, Woese, & Goldenfeld, 2006). Communal exchange differs
substantially from natural selection. Acquired change is retained, and information is transmitted
communally, not by way of a self-assembly code from parent to offspring. Formal methods for
modeling reaction networks can be used to investigate the feasibility of the emergence of the kind
of self-sustaining structure that could evolve through communal exchange.
It has been suggested that the basic unit of cultural evolution is, not an autocatalytic
network per se, but an associative network that is (like an autocatalytic network) autopoietic, i.e.,
the whole emerges through interactions amongst the parts (Gabora, 1999, 2004). A communal
exchange based computational model of cultural evolution has been developed (Gabora, 1995,
Gabora - Cultural Evolution as Distributed Computation 3
2008a,b). EVOC (for EVOlution of Culture) consists of neural network based agents that invent
new actions and imitate actions performed by neighbors. The assemblage of ideas changes over
time not because some replicate at the expense of others, as in natural selection, but because they
transform through inventive and social processes. Agents can make generalizations concerning
what kinds of actions are fittest, and use this acquired knowledge to modify ideas for actions
between transmission events. EVOC exhibits typical evolutionary patterns, e.g., cumulative
increase in fitness and complexity of cultural elements over time, and an increase in diversity as
the space of possibilities is explored, followed by a decrease as agents find and converge on the
fittest possibilities. EVOC has been used to model how the mean fitness and diversity of cultural
elements is affected by factors such as leadership, population size and density, borders that affect
transmission between populations, and the proportion and distribution of creators (who acquire
new ideas primarily by inventing them) versus imitators (who acquire new ideas primarily by
copying their neighbors) (Gabora, 1995, 2008a,b; Gabora, & Firouzi, 2012; Gabora & Leijnen,
2009; Leijnen & Gabora, 2010).
A communal exchange inspired method for organizing artifacts into historical lineages has
also been developed. Worldview Evolution, or WE for short, uses both superficial (e.g., ‘beveled
edge’) and abstract (e.g., ‘object is thrown’) attributes, as well as analogical transfer (e.g., of
‘handle’ from knife to cup) and complementarity (e.g., bow and arrow) (Gabora, Leijnen, Veloz,
& Lipo, 2011). It represents objects not in terms of a convenient list of discrete measurable
attributes, but in terms of how they are actually conceptualized, as a network of interrelated
properties, using a perspective parameter that can be weighted differently according to their
relative importance. Preliminary analyses show that the conceptual network approach can recover
previously unacknowledged patterns of historical relationship that are more congruent with
geographical distribution and temporal data than is obtained with an alternative cladistic
approach that is based on the assumption that cultural evolution, like biological evolution, is
Darwinian.
These two computational models, EVOC and WE, show that a communal exchange
approach to cultural evolution is computationally tractable. However such models will not begin
to approach the open-ended ingenuity and complexity of human cultural evolution until they
incorporate certain features of the cognitive process by which cultural novelty is generated.
The Generation of Cultural Novelty
We said that cultural evolution is a depth-first evolution strategy. A depth-first evolution strategy
entails processes that adaptively bias the generation of novelty. A number of key, interrelated
processes have been identified that, in addition to learning, accomplish this in cultural evolution.
We now look briefly at some of these processes, as well as efforts to model them.
Recursive Recall and Restorative Restructuring
Recursive recall (RR) is the capacity for one thought to trigger another, enabling progressive
modification of an idea. Donald’s (1991) hypothesis that cultural evolution was made possible by
onset of the capacity for RR has been tested using EVOC (Gabora & Saberi, 2011; Gabora &
DiPaola, 2012). A comparison was made of runs in which agents were limited to single-step
actions to runs in which they could recursively operate on ideas, and chain them together,
resulting in more complex actions. While RR and no-RR runs both converged on optimal actions,
without RR this set was static, but with RR it was in constant flux as ever-fitter actions were
found. In RR runs there was no ceiling on mean fitness of actions, and RR enhanced the benefits
of learning.
Gabora - Cultural Evolution as Distributed Computation 4
Although these findings support Donald’s hypothesis, the novel actions generated with RR
were predictable. They did not open up new cultural niches in the sense that, for example, the
invention of cars created niches for the invention of things like seatbelts and stoplights. EVOC in
its current form could not solve insight problems, which require restructuring the solution space
(Boden, 1990; Kaplan & Simon, 1990, Ohlsson, 1992). Restructuring can be viewed as a form of
RR that entails looking at the problem from a new context or perspective, and that this is driven
by the mind’s self-organizing, restorative capacity.
Contextual Focus (CF) and Divergent versus Associative Thought
It has been proposed that restorative restructuring is aided by contextual focus (CF): the capacity
to spontaneously and temporarily shift to a more divergent mode of thought (Gabora, 2003).
Divergent thought entails an increase in activation of the associates of a given item (Runco,
2010). Thus for example, given the item TABLE, in a convergent mode of thought you might call
to mind accessible associates such as CHAIR, but in a divergent mode of thought you might also
call to mind more unusual associates such as PICNIC or MULTIPLICATION TABLE. CF has
been implemented in EVOC (the computational model of cultural evolution). Low fitness of
ideas induces a temporary shift to a more divergent processing mode by increasing the
‘reactivity’, α, which determines the degree to which a newly invented idea can differ from the
idea on which it was based.
Current research on the architecture of memory suggests that creative thought is actually
not divergent but associative, as illustrated in Figure 1 (Gabora, 2010; Gabora & Ranjan, 2013).
While divergent thought refers to an increase in activation of all associates, associative thought
increases only activation of those relevant to the context. Because memory is distributed and
content-addressable, associations are forged by way of shared structure. In associative thought,
items come together that, though perhaps seemingly different, share properties or relations, and
are thus more likely than chance to be relevant to one another, perhaps in a previously unnoticed
but useful way.
Figure 1. Convergent thought (left) activates key properties only, represented by black dots.
Divergent thought (centre) activates not just key properties but also peripheral (less salient)
properties, represented by both grey dots and black triangles. The grey dots represent peripheral
properties that are relevant to the current context (goal or situation); the black triangles represent
peripheral properties that are irrelevant to the current context. Associative thought (right)
activates key properties and context-relevant peripheral properties.
A processing mode that is not just divergent but associative could be simulated in a model
such as EVOC capitalizing on the ability to learn generalizations (e.g., symmetrical movements
tend to be fit) to constrain changes in α. It would also be interesting to investigate the topological
and dynamical properties of fitness landscapes for which divergent versus associative forms of
Gabora - Cultural Evolution as Distributed Computation 5
CF is effective. CF is expected to be most beneficial for fitness landscapes that are rugged and
subject to infrequent, abrupt change, with associative CF outperforming divergent CF.
Concept Interaction
Since creative processes such as restructuring involve putting concepts together in new contexts,
a model of cultural evolution should be built upon a solid theory of concepts and how they
interact. However, people use conjunctions and disjunctions of concepts in ways that violate the
rules of classical logic; i.e., concepts interact in ways that are non-compositional (Osherson &
Smith, 1981; Hampton, 1987; Aerts, 2009; Aerts, Aerts, & Gabora, 2009; Aerts, Broekaert &
Gabora, 2010; Kitto, Ram, Sitbon, & Bruza, 2011). This is true both with respect to properties
(e.g., although people do not rate ‘talks’ as a characteristic property of PET or BIRD, they rate it
as characteristic of PET BIRD), and exemplar typicalities (e.g., although people do not rate
‘guppy’ as a typical PET, nor a typical FISH, they rate it as a highly typical PET FISH). Because
of this, concepts have been resistant to mathematical description.
This non-compositionality can be modeled using a generalization of the formalisms of
quantum mechanics (QM) (Aerts & Gabora, 2005; Gabora & Aerts, 2002a,b; Kitto, Ramm,
Sitbon, & Bruza, 2011). The reason for using the quantum formalism is that it allows us to
describe the chameleon-like way in which concepts interact, spontaneously shifting their
meanings depending on what other concepts are nearby or activated. The following formal
exposition, though not essential for grasping the underlying concepts, is provided for the
mathematically inclined reader. In QM, the state÷yñ of an entity is written as a linear
superposition of a set of basis states {÷fiñ} of a complex Hilbert space H. Hence ÷yñ = Sici÷fiñ
where each complex number coefficient ci of the linear superposition represents the contribution
of each component state ÷fiñ to the state ÷yñ. The square of the absolute value of each coefficient
equals the weight of its component basis state with respect to the global state. The choice of basis
states is determined by the observable to be measured. The basis states corresponding to this
observable are called eigenstates. Upon measurement, the state of the entity collapses to one of
the eigenstates. In the quantum inspired State COntext Property (SCOP) theory of concepts, the
basis states represent states (instances or exemplars) of a concept, and the measurement is the
context that causes a particular state to be evoked. SCOP is consistent with experimental concept
data on concept combination (Aerts, 2009; Aerts, Aerts, & Gabora, 2009; Aerts, Broekaert,
Gabora, & Veloz, 2012; Aerts, Gabora, & Sozzo, submitted; Hampton, 1987), and with findings
that a compound’s constituents are not just conjointly activated but bound together in a context-
specific manner that takes relational structure into account (Gagné & Spalding, 2009). The model
is being expanding to incorporate larger conceptual structures (Gabora & Aerts, 2009), and
different modes of thought (Veloz, Gabora, Eyjolfson, & Aerts, 2011). This theoretical work is
complemented by empirical studies aimed at establishing that (i) some concept combinations
involve interference and entangled states, and (ii) creative products are external evidence of an
internal self-organization process aimed at resolving dissonance and restoring equilibrium
through the recursive actualization of potentiality (Gabora, 2011; Gabora, O’Connor, & Ranjan,
2012; Gabora & Saab, 2011).
Harnessing the Computational Power of Cultural Evolution
We have looked at some of the key milestones that have been crossed in the development of a
scientific framework for how culture evolves. These milestones include a crude but functional
computational model of cultural evolution, research into the cognitive mechanisms underlying
the generation of cultural novelty, and preliminary efforts to computationally model these
Gabora - Cultural Evolution as Distributed Computation 6
mechanisms. The rest of this chapter presents new, untested, yet-to-be-implemented ideas for
how to go about harnessing the speed and power of cultural evolution in the development of a
human computation research program.
Computational Model of Restorative Restructuring
A first step is to develop a model of problem restructuring using a “reaction network” inspired
model that has as its basic unit, not catalytic molecules, but interacting concepts. There are
various methods for going about this, for example using Concat, or Holographic Reduced
Representations to computationally model the convolution or ‘twisting together’ of mental
representation (Aerts, Czachor, & De Moor, 2009; Eliasmith & Thagard, 2001; Thagard &
Stewart, 2011). Another promising route is to use a quantum-inspired theory of concepts such as
SCOP that incorporates the notion of context-driven actualization of potential (Aerts & Gabora,
2005a,b; Gabora & Aerts, 2002a,b). A concept is defined in terms of (1) its set of states or
exemplars S, each of which consists of a set L of relevant properties, (2) set M of contexts in
which it may be relevant, (3) a function n that describes the applicability or weight of a certain
property for a specific state and context, and (4) a function µ that describes the transition
probability from one state to another under the influence of a particular context.
The procedure is best explained using an example, such as the idea of using a tire to make a
swing, i.e., the invention of a tire swing (from Gabora, Scott, & Kauffman, in press). The concept
TIRE consists of the set S of states of TIRE, and in the context ‘winter’, TIRE might collapse to
SNOW TIRE. Suppose that the network’s initial conception of TIRE, represented by vector pñ
of length equal to 1, is a superposition of only two possibilities (Fig. 2). The possibility that the
tire has sufficient tread to be useful is denote by unit vector uñ. The possibility that it should be
discarded as waste is denoted by unit vector, wñ. Their relationship is given by the equation pñ =
a0uñ + a1wñ, where a0 and a1 are the amplitudes of uñ and wñ respectively. If a tire us useful
only for transportation, denoted tñ then, uñ = tñ. States are represented by unit vectors and all
vectors of a decomposition such as uñ and wñ have unit length, are mutually orthogonal and
generate the whole vector space, thus a02 + a12 = 1.
Figure 2. Graphical depiction of a vector pñ representing particular state of TIRE, specifically, a state in which the
tread is worn away. In the default context, the state of tire is more likely to collapse to the projection vector wñ
which represents wasteful than to its orthogonal projection vector uñ which represents useful. This can be seen by
the fact that subspace a0 is smaller than subspace a1. Under the influence of the context playground equipment, the
opposite is the case, as shown by the fact that b0 is larger than b1. Also shown is the projection vector after
renormalization.
The conception of TIRE changes when activation of the set L of properties of TIRE, e.g.
Gabora - Cultural Evolution as Distributed Computation 7
‘weather resistant’, spreads to other concepts in the network for which these properties are
relevant. Contexts such as playground equipment that share properties with TIRE become
candidate members of the set M of relevant contexts for TIRE. The context playground
equipment, denoted e, consists of the concepts SWING, denoted señ, and SLIDE, denoted leñ.
The restructured conception of TIRE in the context of playground equipment, denoted peñ, is
given by b0ueñ + b1weñ, where ueñ = b2teñ + b3teseñ + b4teleñ, and where teseñ stands for the
possibility that a tire functions as a swing, and teleñ stands for the possibility that a tire functions
as a slide. The amplitude of weñ, b1, is less than a1, the amplitude of wñ. This is because b0 >
a0, since b0 consists of the possibility of a tire being used not just as a tire, but as a swing or
slide. Because certain strongly weighted properties of SLIDE, such as ‘long’ and ‘flat’, are not
properties of TIRE, b4 is small. That is not the case for SWING, so b3 is large. Therefore, in the
context playground equipment, the concept TIRE has a high probability of collapsing to TIRE
SWING, an entangled state of the concepts TIRE and SWING. Entanglement introduces
interference of a quantum nature, and hence the amplitudes are complex numbers (Aerts, 2009).
If this collapse takes place, TIRE SWING is thereafter a new state of both concepts TIRE and
SWING.
This example shows that a formal approach to concept interactions that is consistent with
human data (Aerts, 2009; Aerts, Aerts, & Gabora, 2009; Aerts, Broekaert, Gabora, & Veloz,
2012; Aerts, Gabora, & Sozzo, submitted; Hampton, 1987) can model the restructuring of
information (e.g., TIRE) under a new context (e.g., playground equipment). Note how in the
quantum representation, probability is treated as arising not from a lack of information per se, but
from the limitations of any particular context (even a ‘default’ context).
The limitations of this approach are as interesting as its strengths. It is not possible to list,
or even develop an algorithm that will list, all possible uses or contexts for any item such as a tire
or screwdriver (Longo, Montevil, & Kaufman, 2012). This is what has been referred to as the
frame problem. As a consequence, human input is particularly welcome at this juncture to define
the relevant contexts, e.g., the possible uses of a tire. Studies would be run using data collected
from real humans to determine the extent to which the model matches typicality ratings and
generation frequencies of exemplars of concepts in particular contexts by human participants, as
per (Veloz, Gabora, Eyjolfson, & Aerts, 2011). SCOP models of individual concepts can be
embedded into an associative “reaction network”. Concept interactions are then modeled as
reactions that generate products. Chemical Organization Theory (Dittrich & Speroni di Fenizio,
2008; Dittrich & Winter, 2007; Dittrich, Ziegler, & Banzhaf, 2001), which provides an algebraic
means of solving nonlinear, coupled differential equations in reaction networks, or some other
such theory, can be used to model the associative structure of interrelated sets of concepts a
whole, and study the conditions under which it restores equilibrium in response to the
introduction of new states of concepts that results from placing them in new contexts.
Using this SCOP-based cognitive “reaction network” it would be possible to test the
hypothesis that contextual focus (the ability to shift between different modes of thought
depending on the context− increases cognitive efficiency. If the amplitude associated with wñ for
any concept becomes high—such as for TIRE if the weight of the property ‘tread’ is low—this
signals that the potentiality to re-conceptualize the concept is high. This causes a shift to a more
associative mode by increasing α, causing activation of other concepts that share properties with
this concept, as described previously.
Enhanced Computational Model of Cultural Evolution
Gabora - Cultural Evolution as Distributed Computation 8
Let us now examine how a model of restorative restructuring such as the SCOP-based one we
just looked at could be used to develop a cognitively sophisticated computational model of
cultural evolution. We will refer to this ‘new and improved’ model as EVOC2.
So that the EVOC2 agents have something to make artifacts from, their world would
contain resource bases from which objects are extracted and wastes are generated. Extracted
objects can be joined (lego-style) to construct other objects. Agents have mental representations
of resources and objects made from resources. Objects derived from the same resource are
modeled in their conceptual networks as states of a concept. Newly extracted or constructed
objects have a fitness that defines how useful or wasteful they are with respect to the other
objects an agent has encountered. Thus existing objects provide contexts that affect the utility of
new objects, and an agent’s knowledge of existing objects defines its perspective.
The artificial culture can now evolve as follows:
Invent. Agents invent as in EVOC, except that they invent not actions but objects, using
resources in adjacent cells. Extracting an object from a resource creates waste objects.
Detect and Actualize Potential for Adaptive Change. If a waste object p is accumulating
adjacent to A1, A1 recursively modifies p by considering it from A1’s perspective. This continues
until p is in a new less wasteful state pA1* which is an eigenstate with respect to A1’s perspective.
This process may modify not just p, but A1’s perspective. Perspectives change in response to the
ideas and objects an agent interacts with; thus a perspective can encompass more than one
context.
Contextual focus. The previous step may involve temporarily assuming a more associative
processing mode in response to the magnitude of potential for adaptive change.
Transmission. Modified object, pA1*, becomes input to the associative networks of adjacent
agents.
Context-dependent Restructuring. If p A1* is wasteful (has potential to change) with respect
to the perspective of another agent, A2, then A2 recursively modifies pA1* until it is an eigenstate
with respect to A2’s perspective, at which point it is referred to as pA1*A2*. Since A1’s perspective
is reflected in pA1*, assimilation of pA1* modifies A2’s perspective in a way that reflects exposure
to (though not necessarily incorporation of or agreement with) A1’s perspective. This continues
until p settles on stable or cyclic attractor, or we terminate after a set number of iterations (since a
chaotic attractor or limit cycle may be hard to distinguish from a non-stable transient).
Evaluate. The user assesses the usefulness of the culturally evolved objects for the agents,
as well as object diversity, and wastefulness.
EVOC2 will be deemed a success if it not only evolves cultural novelty that is cumulative,
adaptive, and open-ended (as in EVOC with RR), but also (a) restructures conceptions of objects
by viewing them from different perspectives (new contexts), (b) generates inventions that open
up niches for other inventions, and (c) exhibits contextual focus, i.e., shifts to an associative
mode to restructure and shifts back to fine-tune. It is hypothesized that these features will
increase the complexity of economic webs of objects and recycled wastes.
Elucidating the Algorithmic Structure of Biological versus Cultural Evolution
The design features that made EVOC2 specific to the problem of waste recycling can eventually
be replaced by general-purpose counterparts, resulting in a cultural algorithm (CAL1). It will be
interesting to compare the performance of a CAL with a GA on standard problems (e.g., the
Rosenbrock function) as well as on insight tasks such as real-world waste recycling webs that
1 Cultural algorithm is abbreviated CAL because CA customarily refers to cellular automaton.
Gabora - Cultural Evolution as Distributed Computation 9
require restructuring. Waste recycling is a particularly appropriate application because it
explicitly requires considering how the same item offers a different set of constraints and
affordances when considered with respect to a different goal, a different demographic, or a
different aesthetic sensibility (one person’s trash is another person’s treasure). In general the CAL
is expected to outperform the GA on problems that involve not just multiple constraints but
multiple perspectives, e.g., economic and environmental.
A long-term objective is to develop an integrated framework for evolutionary processes
that encompasses natural selection, cultural evolution, and communal exchange theories of early
life. Finally, it can advance knowledge of how systems evolve. Early efforts toward a general
cross-disciplinary framework for evolution Processes were modeled as context-dependent
actualization of potential: an entity has potential to change various ways, and how it does change
depends on the contexts it interacts with (Gabora & Aerts, 2005, 2007). These efforts focused on
distinguishing processes according to the degree of non-determinism they entail, and the extent to
which they are sensitive to, internalize, and depend upon a particular context. With the sorts of
tools outlined here, it will be possible to compare the effectiveness of communal exchange,
Darwinian, and mixed strategies in different environments (simple versus complex, static versus
fluctuating, and so forth. This will result in a more precise understanding of the similarities and
differences between biological and cultural evolution, and help us recognize other evolutionary
processes that we may discover as science penetrates ever deeper into the mysteries of our
universe.
Summary and Conclusions
Culture evolves with breathtaking speed and efficiency. We are crossing the threshold to an
exciting frontier: a scientific understanding of the process by which cultural change occurs, as
well as the means to capitalize on this understanding. The cultural evolution inspired human
computation program of research described in this chapter is ambitious and interdisciplinary, but
it builds solidly on previous accomplishments.
We examined evidence that culture evolves through a non-Darwinian communal exchange
process, and discussed a plan for modeling the autopoietic structures that evolve through
biological and cultural processes—i.e., metabolic reaction networks and associative networks.
This will make it possible to undertake a comparative investigation of the dynamics of
communally exchanging groups of these two kinds of networks. This research is necessary to
achieve a unification of the social and behavioral sciences comparable to Darwin’s unification of
the life sciences.
Efforts are underway toward the development of a computational model of cultural
evolution that incorporates the kind of sophisticated cognitive machinery by which cultural
novelty evolves. These include the combining of concepts to give rise to new concepts sometimes
with emergent properties, and the capacity to shift between different modes of thought depending
on the situation. An important step is to embed formal models of concepts in a modified “reaction
network” architecture, in order to computationally model how clusters of interrelated concepts
modify one another to achieve a more stable lower energy state, through a process we referred to
as context-driven restorative restructuring. Efforts are also underway toward the development of
a computer program for identifying patterns of historical relationship amongst sets of artifacts.
Human input is used to define contexts—perspectives or situations that define which features or
attributes are potentially relevant. One long-term objective of this kind of research program is to
develop a cultural algorithm: an optimization and problem-solving tool inspired by cultural
evolution. This will allow us to investigate how strategies for recursively re-processing and
Gabora - Cultural Evolution as Distributed Computation 10
restructuring information, or shifting between different processing modes, affect the capacity to
evolve cumulative, adaptive, open-ended novelty.
The ideas presented in this chapter are speculative, ambitious, and innovative both
conceptually and methodologically, but they have far-reaching implications and potentially
diverse applications. The human computation program proposed here could promote a scientific
understanding of the current accelerated pace of cultural change and its transformative effects on
humans and our planet. It may foster cultural developments that are healthy and productive in the
long term as well as the short term, and help us find solutions to complex crises we now face.
Acknowledgements
This research was conducted with the assistance of grants from the National Science and
Engineering Research Council of Canada, and the Fund for Scientific Research of Flanders,
Belgium.
References
Aerts, D. (2009). Quantum structure in cognition. Journal of Mathematical Psychol, 53, 314−348.
Aerts, D., Aerts, S., & Gabora, L. (2009). Experimental evidence for quantum structure in
cognition. In: P. Bruza, W. Lawless, K. van Rijsbergen, & D. Sofge (Eds.) Proc Int Conf
Quantum Interaction, (pp. 59-70). German Research Center for Artificial Intelligence,
Saarbruken, Germany.
Aerts, D., Broekaert, J. Gabora, L., & Veloz, T. (2012). The guppy effect as interference.
Proceedings Sixth International Symposium on Quantum Interaction. June 27-29, Paris.
Aerts, D., Czachor, M., & De Moor, B. (2009). Geometric analogue of holographic reduced
representation. Journal of Mathematical Psychology, 53, 389−398.
Aerts, D., & Gabora, L. (2005). A state-context-property model of concepts and their
combinations I: The structure of the sets of contexts and properties. Kybernetes, 34(1&2),
151–175.
Aerts, D., & Gabora, L. (2005). A state-context-property model of concepts and their
combinations II: A Hilbert space representation. Kybernetes, 34(1&2), 176–205.
Aerts, D., Gabora, L., & Sozzo, S. (2013). Concepts and their dynamics: A quantum theoretical
model. Topics in Cognitive Science. [http://arxiv.org/abs/1206.1069]
Atran, S. (2001). The trouble with memes: Inference versus imitation in cultural creation. Human
Nature, 12, 351–381.
Bentley, P. D. & Corne D., Eds. (2002). Creative Evolutionary Systems, San Francisco: Morgan
Kaufmann.
Bentley, R. A., M. W. Hahn, & Shennan, S. J. (2004). Random drift and cultural change.
Proceedings of the Royal Society of British Biological Sciences, 271, 1143–1450.
Boden, M. A. (1990/2004). The creative mind: Myths and mechanisms. London: Routledge.
Boyd, R., & Richerson, P. (1985). Culture and the evolutionary process. Chicago: Univ. Chicago
Press.
Boyd, R., & Richerson, P. (2005). The origin and evolution of cultures. Oxford: Oxford
University Press.
Cavalli-Sforza, L. L., & Feldman, M. W. (1981). Cultural transmission and evolution: A
quantitative approach. Princeton: Princeton University Press.
Dantzing, S. V., Raffone, A., & Hommel, B. (2011). Acquiring contextualized concepts: A
connectionist approach. Cognitive Science, 25, 1162−1189.
Gabora - Cultural Evolution as Distributed Computation 11
Dawkins, R. (1976). The selfish gene. Oxford: Oxford Univ. Press.
DiPaola, S., & Gabora, L. (2009). Incorporating characteristics of human creativity into an
evolutionary art algorithm. Genetic Programming and Evolvable Machines, 10(2), 97-110.
Dittrich, P., & Speroni di Fenizio, P. (2008). Chemical organization theory. Bulletin of
Mathematical Biology, 69, 1199–1231.
Dittrich, P, & Winter, L. 2007. Chemical organizations in a toy model of the political system.
Advances in Complex Systems, 1(4), 609– 627.
Dittrich, P., Ziegler, J., & Banzhaf, W. 2001. Artificial chemistries – a review. Artificial Life,
7(3), 225–275.
Donald, M. (1991). Origins of the modern mind, Cambridge, MA: Harvard Univ. Press.
Durham, W. (1991). Coevolution: Genes, culture, and human diversity. Stanford: Stanford Univ.
Press.
Eliasmith, C., & Thagard, P. (2001). Integrating structure and meaning: A distributed model of
analogical mapping. Cognitive Science, 25, 245–286.
Fracchia J. & Lewontin, R. C. (1999). Does culture evolve? History & Theory, 38, 52–78.
Gabora, L. (1995). Meme and variations: A computer model of cultural evolution. In (L. Nadel &
D. Stein, Eds.) 1993 Lectures in complex systems (pp. 471–486). Boston: Addison-Wesley.
Gabora, L. (1996). A day in the life of a meme. Philosophica, 57, 901-938.
Gabora, L. (1997). The origin and evolution of culture and creativity. Journal of Memetics:
Evolutionary Models of Information Transmission, 1(1).
Gabora, L. (1998). Autocatalytic closure in a cognitive system: A tentative scenario for the origin
of culture. Psycoloquy, 9(67). [adap-org/9901002]
Gabora, L. (2003). Contextual focus: A cognitive explanation for the cultural transition of the
Middle/Upper Paleolithic. In (R. Alterman & D. Hirsch, Eds.) Proc Annual Meeting of the
Cognitive Science Society (432-437), Boston MA, 31 July - 2 August. Lawrence Erlbaum.
Gabora, L. (2006a). The fate of evolutionary archaeology: Survival or extinction? World
Archaeology, 38(4), 690–696.
Gabora, L. (2006b). Self-other organization: Why early life did not evolve through natural
selection. Journal of Theoretical Biology, 241(3), 443–250.
Gabora, L. (2008). The cultural evolution of socially situated cognition. Cognitive Systems
Research, 9(1), 104-113.
Gabora, L. (2011). Five clarifications about cultural evolution. J Cognition and Culture, 11, 61-
83.
Gabora, L., & Aerts, D. (2002). Contextualizing concepts. Proc 15th Int FLAIRS Conference
(Special Track 'Categorization and Concept Representation: Models and Implications') (pp.
148-152), Pensacola FL, May 14-17, American Association for Artificial Intelligence.
Gabora, L., & Aerts, D. (2002b). Contextualizing concepts using a mathematical generalization
of the quantum formalism. J Exp and Theor Artificial Intelligence, 14(4), 327–358.
Gabora, L., & Aerts, D. (2005). Evolution as context-driven actualization of potential: Toward an
interdisciplinary theory of change of state. Interdisc Science Reviews, 30(1), 69–88.
Gabora, L., & DiPaola, S. (2012). How did humans become so creative? Proceedings of the
International Conf on Computational Creativity (pp. 203-210). May 31 - June 1, Dublin.
Gabora, L., Leijnen, S., Veloz, T., & Lipo, C. (2011). A non-phylogenetic conceptual network
architecture for organizing classes of material artifacts into cultural lineages. Proc Ann Mtng
Cog Sci Soc. July 20-23, 2011, Boston MA.
Gabora, L., O’Connor, B., & Ranjan, A. (2012). The recognizability of individual creative styles
within and across domains. Psychology of Aesthetics, Creativity, and the Arts, 6(4), 351-360.
Gabora - Cultural Evolution as Distributed Computation 12
Gabora, L., & Ranjan, A. (2013). How insight emerges in distributed, content-addressable
memory. In A. Bristol, O. Vartanian, & J. Kaufman (Eds.) The neuroscience of creativity.
New York: MIT Press.
Gabora, L., & Saberi, M. (2011). How did human creativity arise? An agent-based model of the
origin of cumulative open-ended cultural evolution. Proceedings of the ACM Conference on
Cognition & Creativity. Nov 3-6, 2011, Atlanta, GA.
Gagné, C. L., & Spalding, T. L. (2009). Constituent integration during the processing of
compound words: Does it involve the use of relational structures? Journal of Memory and
Language, 60, 20–35.
Goldberg, D, E., and Kuo, C. H. (1987). Genetic algorithms in pipeline optimization. Journal of
Computing in Civil Engineering ASCE, 1(2), 128-141.
Hampton, J. (1987). Inheritance of attributes in natural concept conjunctions. Memory &
Cognition, 15, 55–71.
Henrich, J., & Boyd R. (1998). The evolution of conformist transmission and the emergence of
between-group differences. Evolution and Human Behavior, 19, 215−242.
Henrich, J., & Boyd, R. (2002). On modeling cognition and culture: Why replicators are not
necessary for cultural evolution. Journal of Cognition and Culture, 2, 87−112.
Holland, J. (1975). Adaptation in natural and artificial systems. Cambridge, MA: MIT Press.
Hou, E. S. H., Ansari, N., & Ren, H. (1994). A genetic algorithm for multiprocessor scheduling.
IEEE Transactions in Parallel Distributed Systems 5(2), 113–120.
Kaplan, C. A,. & Simon, H. A. (1990). In search of insight. Cognitive Psychology, 22, 374−419.
Kauffman, S. (1993). Origins of order. New York: Oxford University Press.
Kitto, K., Ramm, B., Sitbon, L., & Bruza, P. D. (2011). Quantum theory beyond the physical:
Information in context. Axiomathes, 12(2), 331−345.
Koza, J. (1993). Genetic Programming. MIT Press, London.
Leijnen, S., & Gabora, L. (2010). An agent-based simulation of the effectiveness of creative
leadership. Proc Ann Mtng Cognitive Science Soc (pp. 955-960). Aug 11-14, Portland OR.
Longo, G., Montevil, M., & Kaufman, S., (2012). No entailing laws, but enablement in the
evolution of the biosphere. In: Proceedings of the Fourteenth International Conference on
Genetic and Evolutionary Computation, pp. 1379-1392.
O’Brien, M. J., & Lyman, R. L. (2000). Applying evolutionary archaeology: A systematic
approach. Norwell: Kluwer.
Ohlsson, S. (1992). Information-processing explanations of insight and related phenomena. In M.
T. Keane & K. J. Gilhooly (Eds.) Advances in the psychology of thinking (Vol. 1, pp. 1–44).
New York: Harvester Wheatsheaf.
Osherson, D., & Smith, E. (1981). On the adequacy of prototype theory as a theory of concepts.
Cognition, 9, 35−58.
Reynolds, R. G. (1994). An introduction to cultural algorithms. Proceedings of the 3rd annual
conference of evolutionary programming (pp. 131-139). River Edge, NJ: World Scientific.
Runco, M. (2010). Divergent thinking, creativity, and ideation. In (J. Kaufman & R. Sternberg,
Eds.) The Cambridge handbook of creativity (pp. 414–446). Cambridge UK: Cambridge
University Press.
Shennan, S. (2008). Evolution in archaeology, Annual Review of Anthropology, 37, 75–91.
Skoyles, J. R. (2008). Natural selection does not explain cultural rates of change. Proceedings of
the National Academy of Science, 105(22), E27−E27.
Gabora - Cultural Evolution as Distributed Computation 13
Tëmkin, I., & Eldredge, N. (2007). Phylogenetics and material cultural evolution. Current
Anthropology, 48, 146−153.
Thagard, P., & Stewart, T. C. (2011). The AHA! experience: Creativity through emergent
binding in neural networks. Cognitive Science, 35, 1−33.
Veloz, T., Gabora, L., Eyjolfson, M., & Aerts, D. (2011). A model of the shifting relationship
between concepts and contexts in different modes of thought. Proceedings of the Fifth
International Symposium on Quantum Interaction. June 27, 2011, Aberdeen UK.
Veloz, T., Tëmkin, I., & Gabora, L., A conceptual network-based approach to inferring cultural
phylogenies. Proceedings Annual Meeting Cognitive Science Society. Sapporo Japan, 2012.
Vetsigian, K., Woese, C., & Goldenfeld, N. (2006). Collective evolution and the genetic code.
Proceedings of the National Academy of Science, 103, 10696–10701.
Williams, R. J. P., & Frausto da Silva, J. J. R. (2003). Evolution was chemically constrained.
Journal of Theoretical Biology, 220, 323–343.
Woese, C. R. (2002). On the evolution of cells. Proceedings of the National Academy of Science,
99, 8742–8747.
|
1702.08736 | 2 | 1702 | 2017-03-30T12:10:35 | Analysing Congestion Problems in Multi-agent Reinforcement Learning | [
"cs.MA",
"cs.AI"
] | Congestion problems are omnipresent in today's complex networks and represent a challenge in many research domains. In the context of Multi-agent Reinforcement Learning (MARL), approaches like difference rewards and resource abstraction have shown promising results in tackling such problems. Resource abstraction was shown to be an ideal candidate for solving large-scale resource allocation problems in a fully decentralized manner. However, its performance and applicability strongly depends on some, until now, undocumented assumptions. Two of the main congestion benchmark problems considered in the literature are: the Beach Problem Domain and the Traffic Lane Domain. In both settings the highest system utility is achieved when overcrowding one resource and keeping the rest at optimum capacity. We analyse how abstract grouping can promote this behaviour and how feasible it is to apply this approach in a real-world domain (i.e., what assumptions need to be satisfied and what knowledge is necessary). We introduce a new test problem, the Road Network Domain (RND), where the resources are no longer independent, but rather part of a network (e.g., road network), thus choosing one path will also impact the load on other paths having common road segments. We demonstrate the application of state-of-the-art MARL methods for this new congestion model and analyse their performance. RND allows us to highlight an important limitation of resource abstraction and show that the difference rewards approach manages to better capture and inform the agents about the dynamics of the environment. | cs.MA | cs | Analysing Congestion Problems in Multi-agent
Reinforcement Learning ∗
Roxana Radulescu
Artificial Intelligence Lab
Vrije Universiteit Brussel
Belgium
[email protected]
[email protected]
Peter Vrancx
Artificial Intelligence Lab
Vrije Universiteit Brussel
Belgium
Ann Nowé
Artificial Intelligence Lab
Vrije Universiteit Brussel
Belgium
[email protected]
7
1
0
2
r
a
M
0
3
]
A
M
.
s
c
[
2
v
6
3
7
8
0
.
2
0
7
1
:
v
i
X
r
a
ABSTRACT
Congestion problems are omnipresent in today's complex net-
works and represent a challenge in many research domains. In
the context of Multi-agent Reinforcement Learning (MARL),
approaches like difference rewards and resource abstraction
have shown promising results in tackling such problems. Re-
source abstraction was shown to be an ideal candidate for
solving large-scale resource allocation problems in a fully
decentralized manner. However, its performance and appli-
cability strongly depends on some, until now, undocumented
assumptions. Two of the main congestion benchmark prob-
lems considered in the literature are: the Beach Problem
Domain and the Traffic Lane Domain. In both settings the
highest system utility is achieved when overcrowding one re-
source and keeping the rest at optimum capacity. We analyse
how abstract grouping can promote this behaviour and how
feasible it is to apply this approach in a real-world domain
(i.e., what assumptions need to be satisfied and what knowl-
edge is necessary). We introduce a new test problem, the
Road Network Domain (RND), where the resources are no
longer independent, but rather part of a network (e.g., road
network), thus choosing one path will also impact the load on
other paths having common road segments. We demonstrate
the application of state-of-the-art MARL methods for this
new congestion model and analyse their performance. RND
allows us to highlight an important limitation of resource
abstraction and show that the difference rewards approach
manages to better capture and inform the agents about the
dynamics of the environment.
CCS Concepts
•Computing methodologies → Multi-agent systems;
Multi-agent reinforcement learning;
Keywords
Multi-agent reinforcement learning; Congestion problems;
Resource abstraction
1.
INTRODUCTION
Solving congestion problems is an important research area,
as they are present in a wide variety of domains such as
traffic control [16], air traffic management [2], data routing
∗This paper expands our AAMAS 2017 extended abstract [9]
with a detailed description of the RND problem domain,
extensive analysis of the resource abstraction method, and
additional analysis of the experimental results.
[14] and sensor networks [15]. Multi-agent reinforcement
learning (MARL) has proven to be a suitable framework for
such problems [13, 5, 8, 3], as it allows autonomous agents
to learn in a decentralized manner, by interacting within a
common environment.
We are interested here in MARL scenarios of independent
learners, where no direct communication takes place between
the agents. As the task at hand is a resource selection
problem where the number of agents exceeds the available
capacity, the agents should coordinate in order to achieve a
high system utility. We consider here two main approaches
designed to achieve this goal: difference rewards [17] and
resource abstraction [8].
Difference rewards is a reward shaping approach that aims
to align the interests of agents and the system, as well as to
tackle the credit assignment problem in MARL, by informing
each agent of its own contribution to the performance of the
system. Resource abstraction is a recent approach designed to
offer a more informative reward signal that improves learning
speed, coordination between agents, as well as the final
solution quality. In [8] the authors have shown to outperform
difference rewards, however as we show in Section 5, we
cannot confirm this conclusion. Our first contribution is that
we provide clear insights on how resource abstraction guides
the collective behaviour of the agents and we highlight the
method's limitations, assumptions and application guidelines.
Current benchmark congestion problems present in the
literature often make unrealistic assumptions regarding the
independence between the available resources. In complex
network management domains, such as smart grids and traffic
networks, resources are connected and interdependent, such
that using one resource impacts the load of others as well.
For this purpose we introduce the Road Network Domain
(RND), a problem that models the resources as a system of
interconnected roads. We proceed to demonstrate the appli-
cation of state-of-the-art MARL methods on this problem
and analyse their capacity of capturing the newly introduced
dynamics in the environment.
The rest of the paper is organized as follows: Section 2
presents an overview of the theoretical concepts concerning
the congestion problem and describes the two main consid-
ered resource selection tasks, Section 3 offers an in depth
explanation of the recently introduced resource abstraction
method, Section 4 introduces a new congestion problem
and how to apply existing methods for solving it, Section 5
presents and discusses the performed experiments and results,
and finally Section 6 offers some concluding remarks and
future possible directions.
2. BACKGROUND
2.1 Reinforcement Learning
Reinforcement Learning (RL) [10] is a machine learning
approach which allows an agent to learn how to solve a task
by interacting with the environment, given feedback in the
form of a reward signal. The solution consists in finding
a policy, i.e., a mapping between states and actions that
maximizes the received rewards. Q-learning is a common RL
value-based method, in which a value function is iteratively
updated to optimize the expected long-term reward. After a
transition from environment state s to s(cid:48), through action a,
Q-learning performs the following update on its estimated
state-action value function Q, which represents the quality
of actions in given states:
Q(s, a) = Q(s, a) + α[r + γ max
(cid:48)
a(cid:48) Q(s
(cid:48)
) − Q(s, a)]
, a
where α is the learning rate, γ is the discount factor and
r is the immediate reward received from the environment.
In order to address the exploration-exploitation trade-off
challenge in RL, one can use the -greedy action selection
method, which allows the agent to choose exploratory random
actions with a probability .
When transitioning to the multi-agent case, we consider
the scenario of independent learners interacting in the same
environment. Solving a congestion problem can then be
viewed from two perspectives – agent-centred and system-
centred – that are often in conflict. Allowing selfish entities
to act in their own interest in a resource-sharing system can
lead to a tragedy of the commons situation [6], which is a
detrimental outcome for both the system and the agents.
In multi-agent reinforcement learning a central concern
is thus providing a reward signal that will offer a beneficial
collective behaviour at the system level. A first approach
is providing a local reward (L) which reflects information
about the parts of the system the agent is involved in. L is
individually received by each agent and encourages a selfish
behaviour, as agents try to optimize their own reward. An
alternative approach is the global reward (G) which reflects
the global system utility and should stimulate agents to
perform actions beneficial for the system. The global reward
signal can incorporate a significant amount of noise, as the
individual effect of an agent on the system's utility can be
overshadowed by other learners' effect, i.e., credit assignment
problem. Additionally, in large systems, aggregating at each
time-step over all the components can be more costly than
relying on local information for the reward computation.
2.2 Resource Selection Congestion Problems
A congestion problem from a multi-agent learning per-
spective is defined by a set of n available resources Ψ =
{ψ1, ..., ψn}. Each resource ψ is defined by three properties:
ψ = (cid:104)wψ, cψ, xψ,t(cid:105), where wψ ≥ 0 represents the weighting of
the resource, cψ > 0 is the capacity of ψ and finally xψ,t ≥ 0
is the consumption of ψ at time t. A resource ψ is congested
when xψ,t > cψ. The local utility of a resource ψ is defined
in terms of its properties:
L(ψ, t) = f (xψ,t, cψ, wψ)
(1)
In this paper we consider two resource selection problems
that have become benchmark problems for studying resource
allocation in RL. They mainly differ with respect to their
local utility schemes. The first problem is defined as the
beach problem domain (BPD) [12], where all the available
resources are considered beach sections with the same weight
equal to 1 and the same capacity c:
L(ψ, t) = xψ,te
−xψ,t
c
(2)
The second type of problem is the traffic lane domain (TLD)
[11], where the agents have to select between several available
lanes, each having a different capacity and weight (reflecting
the importance or desirability of the lane):
L(ψ, t) =
, xψ,t ≤ cψ
, xψ,t > cψ
(3)
wψe−1
(cid:88)
wψe
−xψ,t
cψ
For both problems the global utility is defined as the sum
over all the local utilities at time t:
G(t) =
L(ψ, t)
(4)
ψ∈Ψ
At each time step the agents choose to move to a certain
beach section or traffic lane and receive a reinforcement in
accordance to the effect of their joint action on the imple-
mented reward scheme. The main difference between the
two described local utility functions is represented by the
segment before the congestion point is reached. For BPD
(Figure 1a) the maximum utility for a resource is achieved
at optimum capacity (xψ,t = cψ), while for TLD (Figure 1b)
this condition is less strict, only requiring the lanes to be
under the congestion point (xψ,t ≤ cψ).
If the number of agents exceeds the total capacity, the
configuration achieving the highest global utility for these
benchmark problems is one that overcrowds one of the re-
sources and leaves the rest at optimum capacity. For the
BPD the congested resource can be any of the available beach
sections, while for the TLD it should be the lane with the
lowest weight and highest capacity combination [5].
2.3 Difference Rewards
Driven by the idea that the reward signals should allow
the agents to deduce their individual contribution to the
system, a reward signal we consider here is difference rewards
(D) [17]. Under a global system utility G, the difference
rewards for agent i is defined as:
Di(z) = G(z) − G(z−i)
(5)
where z denotes a general term for either state, action or state-
action pair, according to the considered domain, and G(z−i)
is the global utility of a system from which the contribution
of agent i is removed. The difference rewards signal was
constructed following two main guidelines: (i) aligning the
reward received by the agent with the global system utility –
factoredness, while (ii) lowering the impact of other agents
on the reward signal – learnability, thus addressing the credit
assignment problem in a multi-agent setting [1, 12]. These
characteristics have proven to significantly improve learning
performance [11, 7, 13], even in domains where G(z−i) cannot
be directly computed and should be estimated [2, 4, 3].
We now take a look at how the presented credit assignment
approach can be defined for these congestion models. By
combining Equations 2, 4 and 5 we obtain the following
formulation of the difference rewards for the BPD case:
Di(t) = L(ψ, t) − (xψ,t − 1)e
−(xψ,t−1)
c
(6)
(a) Local reward BPD, Equation 2
(b) Local reward TLD, Equation 3
(c) Abstract reward BPD, Equation 7
Figure 1: Local reward (TLD and BDP) and abstract reward (BDP) received by the agents selecting section 1 from 5 available
sections, each with capacity 6 and weight 1. After the congestion point of the resource is reached, the abstract reward approach
reflects the reward function over the x-axis, giving agents a high initial penalty for starting to overcrowd a section.
as the impact of agent i is solely limited to the chosen
resource ψ, thus all the other terms in the sum composing
the global reward cancel out. The same approach can be
used for Equations 3 and 5 for the TLD case.
2.4 Resource Abstraction
Resource abstraction [8] is an approach that aims to im-
prove learning speed, solution quality and scalability in large
MARL congestion problems. Resource abstraction provides
the agents with a more informative reward, facilitating coor-
dination in systems with up to 1000 agents [8].
Resource abstraction entails grouping a set of resources
into disjoint subsets, and modifying the local reward function
after the congestion point of a resource is reached, such that
agents using it will get a higher penalty for overcrowding the
resource.
sumption Xb,t = (cid:80)
(cid:80)
ψ∈b xψ,t, capacity Cb = (cid:80)
An abstract group is defined by aggregating the properties
of the composing resources. In the congestion model defined
above, an abstract group b has the following properties: con-
ψ∈b cψ and
weight Wb = 1b
ψ∈b wψ. In other words, resource abstrac-
tion creates virtual resources which are agglomerations of
resources. Given a resource ψ and the abstract group b to
which it belongs to, the abstract reward for an agents using
resource ψ at time t for the BPD is defined as:
xψ,t ≤ cψ
, xψ,t > cψ
(cid:40)L(ψ, t),
(7)
A(b, ψ, t) =
−Xb,te
−Xb,t
Cb
The same approach can be used for the TLD case.
3. ANALYSING RESOURCE ABSTRACTION
Notice that, in order to apply resource abstraction, in-
formation is required regarding the weight, capacity and
consumption of the resources as well as the system utility
function, limiting the straightforward applicability on a real-
world domain, where such information might not be available.
Even though the work [8] presents a few guidelines and re-
marks on how the resource abstraction should be applied,
clear insights and explanations on how to create the group
abstractions are not present. We consider that a more thor-
ough understanding of the method is beneficial to extend its
usability and applicability.
For a better understanding of how the resource abstraction
impacts the collective behaviour of the agents, we turn to
Figure 1c. We plot the abstract reward function of various
groups in the BPD, differing in the number of composing
resources (ranging from size 1 to size 5). There are 5 available
beach sections, each with weight equal to 1 and capacity equal
to 6, giving a total capacity of 30 for the entire beach. We fill
the resources uniformly until we reach the maximum capacity,
after which we proceed to overcrowd each of the abstract
groups (by overcrowding one of the composing resources).
We first remark that after the congestion point of a resource
is reached, the abstract reward mirrors the reward function
over the x-axis (this is due to the second case of the function
presented in Equation 7). This causes the initial penalty
for starting to overcrowd a section to be more severe (i.e.,
a negative reward) compared to the local reward presented
in Figure 1a. However, continuing to overcrowd a section
results in smaller and smaller penalties and given enough
agents it will eventually converge to 0.
A second remark can be made on the effect of the group
size. The initial penalty for congesting a resource is correlated
with the size of the group, thus we expect agents to prefer
overcrowding resources that are part of the smallest abstract
groups (e.g., in the case presented in Figure 1c starting to
overcrowd a group of size 1 returns a reward of -2, while
for a group of size 5 the reward is around -11). The same
reasoning can be applied for the TLD.
Lastly, we note that in order to determine the best con-
figuration for the abstract groups, one should also have
knowledge on the final desired collective behaviour of the
agents (e.g., for the BDP having a group of size 1 should
lead to the desired "overcrowd one" behaviour). For more
complex domains, finding the optimal abstracts grouping can
prove to be impossible, as we show in Section 5, due to the
fact that the resource abstraction approach can no longer
capture the required collective behaviour.
4. ROAD NETWORK DOMAIN
We propose the Road Network Domain (RND), a problem
that introduces a scenario in which the resources are not
independent, as using one path introduces additional load for
others as well. We model this problem as a network of roads
(e.g., Figure 2), where the agents have to choose between
paths of the network. Figure 2 presents an example of a
0102030405060Consumption0.00.51.01.52.02.5Local rewardw = 1, c = 60102030405060Consumption0.000.050.100.150.200.250.300.350.40Local rewardw = 1, c = 6050100150200250300Consumption12108642024Abstract reward (Beach 1)Group size = 1Group size = 2Group size = 3Group size = 4Group size = 5small network topology that can be explored, but that already
serves the points we want to make. Each road segment is
modelled as a resource, corresponding to the description
presented in Section 2.2. The RND can be used with the
utility functions of both BPD and TLD, with the former
creating a more challenging task, as the maximum value of
the utility is only achieved at optimum capacity. The local
reward of a path P is then simply the sum over all the local
rewards of the composing road segments ψ (e.g., roads AB
and BD for the path ABD):
Lpath(P, t) =
L(ψ, t)
(8)
(cid:88)
ψ∈P
We compute the global system utility by summing over all the
local rewards of the roads segments present in the network
(see Equation 4).1
Figure 2: Topology example for the RND problem. The
agents have to travel from point A to point D and have 3
possible paths: ABD, ABCD, or ACD.
We consider that the RND introduces a challenge that is
often present in real-world domains (e.g., electricity grids,
traffic networks). Additionally, one can always increase the
difficulty of the problem by creating more complex network
structures and can easily translate in this model any real-
world situation of interest.
4.1 Difference Rewards
As the impact of agent i on the system is limited to the
composing road segments of his chosen path P , we can define
the difference rewards for the RND as follows, where f is a
local reward function (see Equation 1):
Di(t) = Lpath(P, t) − Lpath(P−i, t)
= Lpath(P, t) −(cid:88)
f (xψ,t − 1, cψ, wψ)
(9)
ψ∈P
4.2 Resource Abstraction
We consider here two approaches for defining the abstract
group construction for the resource abstraction method: over
road segments or over paths of the network. As a road seg-
ment is a resource, the properties of an abstract group over a
set of segments coincide with the ones defined in section 2.4.
The abstract reward for each road segment ψ and its corre-
sponding group b is defined as:
A(b, ψ, t) =
xψ,t ≤ cψ
L(ψ, t),
−f (Xb,t, Cb, Wb), xψ,t > cψ
(10)
(cid:40)
1We sum over road segments rather than over paths in
order to avoid having segments that belong to multiple path
contributing more than once to the global utility value.
(cid:88)
ψ∈P
with f a local reward function (see Equation 1). Finally,
the abstract reward for choosing a path P at time t then
becomes the sum over the abstract reward of each composing
road segment:
Apath(P, t) =
A(b, ψ, t)
(11)
P∈b cP and weight Wb = 1b
a set of paths: consumption Xb,t = (cid:80)
(cid:80)
Cb =(cid:80)
We also extend the definition for an abstract group b over
P∈b xP,t, capacity
P∈b wP , where xP,t is
the number of agents that choose path P , cP = minψ∈P (cψ)
and wP = 1P
ψ∈P wψ. We consider a path to be congested
if any of its composing roads is congested. We can now define
the abstract reward for a selected path P at time t as:
∀ψ ∈ P : xψ,t ≤ cψ
Lpath(P, t),
−f (Xb,t, Cb, Wb), ∃ψ ∈ P : xψ,t > cψ
(cid:80)
(cid:40)
A(b, P, t) =
(12)
where b is the corresponding abstract group of P .
Next, we present a series of experiments designed to demon-
strate how to best use the resource abstraction method, but
also its limitations. Additionally, we test all the presented
approaches (local and global rewards, difference rewards
and resource abstraction) on the RND, and evaluate which
method can best model the underlying dynamics of the envi-
ronment in the reward signal.
5. EXPERIMENTS
Each agent uses the Q-learning algorithm with an explo-
ration parameter = 0.05 and an exploration decay rate of
0.9999. As an important aspect of work is to understand
and explore resource abstraction, the parameters for the
experiment in Section 5.1 were chosen to match the setting
used in the original work [8]: learning rate α = 0.1, decay
rate for α is 0.9999 and the discount factor γ = 1.0. As
for the RND experiments (Section 5.2), after several tests,
the parameters chosen for the local reward L, global reward
G and difference rewards D are: learning rate α = 0.1, no
decay, and the discount factor γ = 0.9.
5.1 Beach Problem Domain
Our first experiment is performed on the BPD and it aims
to explain and demonstrate the use of resource abstraction.
We borrow the original setting from [8], with 6 beach sec-
tions, each with capacity 6, thus a total system capacity of
36. There are 100 agents (creating a congestion scenario)
and the maximum system utility is 11.04, achieved when
overcrowding one of the sections with 70 agents, while keep-
ing the other five at the optimum capacity of 6 agents. Each
agent has three available actions: shift to the resource on
the left, shift to the one on the right and maintain position
and has 5 time-steps to finalize his action sequence for an
episode. We run the scenario for 4 000 episodes and plot the
global utility averaged over 50 trials, together with error bars
representing the standard deviation at every 500 episodes.
Recall that the local reward function for the BPD is the one
plotted in Figure 1a.
Figure 3 presents the results obtained for the BPD for the
following reward schemes: local reward L, global reward G,
difference rewards D and resource abstraction RA. There
are seven different resource abstraction configurations, just
InanimateAnimateConcreteUncountableCountableICU: hout steen rijstIAC: kleur cijfer dagAbstractICC: dak sleutel flesACC: hond vis hertIAU: weer geluk hulpABCDFigure 4: BPD, distribution of agents over the 6 beach
sections for the RA 4 + 2 setting. The agents choose to
overcrowd the group with the smallest size, meaning resources
5 and 6.
Figure 5: BPD, distribution of agents over the 6 beach sec-
tions for the RA 5+1 setting. The agents choose to overcrowd
the group with the smallest size, meaning resource 6. This
distribution is one of the possible optimum configurations.
Figure 3: BPD, 100 agents, 6 sections each with capacity
6. D together with all the RA configurations containing an
abstract group of size 1 achieve the highest performance.
like in [8], composed of either two or three abstract groups.
For example RA 3 + 2 + 1 denotes that the first 3 sections
form one abstract group, the next 2 another one and the last
section represents an abstract group on its own.
Given the insights presented in the previous section on
how the grouping of the resources influences the collective
behaviour and knowing that the maximum utility is achieved
under the 'overcrowd one' behaviour, we expect that the RA
with abstract groups containing only one resource should
attain the best performances. The results presented in Fig-
ure 3 confirm our expectations and provide the following
ranking of the RA configurations: all the variations contain-
ing a group of one resource achieve the best performance,
RA configurations where 2 is the smallest group size come
in second, while the grouping RA 3 + 3 comes in last, but
still above the G and L reward schemes schemes.
An important remark we make here concerns the perfor-
mance of the difference rewards D. In our experiment D
ranks among the best performing methods, in contrast to the
results obtained in [8], where D plateaued around the value
of 8. We also note that the difference rewards application to
the BPD described in Equation 14 of the work [8] does not
correspond to the equation we consider to be the correct one
(Equation 6). 2
Figures 4, 5, and 6 present the final distributions of agents
over the resources for the configurations RA 4 + 2, RA 5 + 1,
and RA 2 + 1 + 3. The results are averaged over 50 trials and
each bar plot is accompanied by the standard deviation error.
Notice that in each case the agents overcrowd the resources
corresponding to the smallest abstract group. RA 5 + 1
and RA 2 + 1 + 3 present two examples of how the optimal
configuration can look like. We note that we did not include
the representations for RA 3 + 2 + 1 and RA 1 + 3 + 2 as they
are similar to RA 2 + 1 + 3. Visualizing the distribution for
configurations like RA 2 + 2 + 2 or RA 3 + 3 is not possible,
as the agents can end up overcrowding any of the abstract
groups.
2Di(t) = L(ψ, t) − xψ,te
term should be a function of (xψ,t − 1).
[8], whereas the second
−(xψ,t−1)
c
Figure 6: BPD, distribution of agents over the 6 beach
sections for the RA 2 + 1 + 3 setting. The agents choose
to overcrowd the group with the smallest size, meaning
resource 3. This distribution is one of the possible optimum
configurations.
05001000150020002500300035004000Episodes6789101112Global utilityLGDRA_3+3RA_4+2RA_5+1RA_2+2+2RA_3+2+1RA_1+3+2RA_2+1+3123456Resources0102030405060ConsumptionRA_4+2123456Resources01020304050607080ConsumptionRA_5+1123456Resources01020304050607080ConsumptionRA_2+1+35.2 Road Network Domain
For our next experiments we test how the considered re-
ward schemes perform on the newly introduced Road Net-
work Domain. As previously mentioned, RND is designed
to work with any of the local utility functions presented
in Section 2.2. We create two types experiments, one us-
ing the local utility of BPD and another with TLD. For all
the experiments we use the network topology presented in
Figure 2. There are 50 agents, all starting at point A and
having to reach point D. They can choose between three
paths: ABD, ACD, or ABCD. Each RA configuration is
expressed using a bracket notation depicting the abstract
groups over either paths or road segments. For example, in
the setting [ABD, ACD], [ABCD] there are two groups: one
of size 2 (ABD and ACD) and one of size 1 (ABCD).
For the BPD utility case all roads have a capacity of 5
and weight 1. We run the first experiment, using RA over
the paths of the network, for 20 000 episodes and plot the
global utility averaged over 30 trials, together with error bars
representing the standard deviation at every 1 000 episodes.
Figure 7 exemplifies one of the possible optimum configura-
tions. The maximum global utility for this scenario is 5.22.
Figure 7: Example of the optimum distribution of 50 agents
over the network under the BPD local utility, where each
road segment has capacity 5 and weight 1. The colors encode
the best performing abstract group configuration over road
segments found for this case: [AB], [AC], [CD], [BC, BD].
The results are presented in Figure 8. We remark that
none of the RA settings is able to capture the underlying
optimal configuration, as this can no longer be expressed in
terms of a pure 'overcrowd one' behaviour, due to the de-
pendencies among the resources and the shape of the utility
function. This is a situation for which there does not exist an
abstract grouping to guide the agents towards the optimal
performance, [ABD, ACD], [ABCD] even performs worse
than L or G, as this setting drives agents to overcrowd the
path ABCD, contributing to the congestion of the other two
paths as well. On the other hand, D manages to achieve the
optimal performance in this scenario, demonstrating its ca-
pacity to allow agents to adapt to more difficult environment
dynamics.
We perform a second experiment using the BPD local util-
ity scheme, defining the RA over road segments this time, in
order to verify whether at this resource granularity level we
can achieve an optimum group abstraction. Notice that, in
this case, the number of possible RA settings is much higher,
making the decision about the abstract group creation even
harder. The L, G, and D results are the same as in Fig-
ure 8. We note that additional smoothing was performed,
to improve the visibility of the results obtained for the RA
and each plot is accompanied by the standard error. The
Figure 8: RND with BPD local utility, RA defined over paths,
50 agents. RA can no longer capture the optimal required
behaviour, due to the dependencies between resources and
shape of the utility function. D manages to reach optimal
performance.
Figure 9: RND with BPD local utility, RA defined over
road segments, 50 agents. Even at segment level RA is
unable to capture the optimal required behaviour, due to
the dependencies between resources and shape of the utility
function. D manages again to reach optimal performance.
results of this experiment are presented in Figure 9. We
remark again that none of the RA settings manage to reach
the optimum solution, with the best performing one being
[AB], [AC], [CD], [BC, BD]. A visual representation of this
best performing grouping can be found in Figure 7: the
two segments that need to be kept under the congestion
point (BC, BD) form the largest group, while all the others
form their own abstract group. Thus, the RND problem
has allowed us to demonstrate that having disjoint abstract
groupings is not a sufficient condition for being able to reach
05000100001500020000Episodes−10123456Global utilityLGD[ABD,ACD],[ABCD][ABD],[ABCD,ACD][ABD],[ABCD],[ACD][ABD,ABCD],[ACD]05000100001500020000Episodes1.52.02.53.03.54.04.55.05.5Global utilityLGD[AC],[AB,CD],[BC,BD][AC,BD],[AB,CD,BC][BC],[AB,BD],[AC,CD][AB],[AC],[CD],[BC,BD][AC],[CD],[AB,BC,BD][AC,CD],[AB,BC,BD]an optimum solution and that the necessity of having indepen-
dent resources goes beyond having segments not belonging
to the same abstract group.
To better understand these results, we can turn again to
Figure 7. Notice that even though the capacity of the road
segments is 5, the optimum configuration does not include
any segments having reached this value. We conclude that
we cannot express the solution as 'overcrowd these segments
and keep the rest at optimum capacity', thus being unable to
properly express the desired solution using the RA approach.
For the TLD utility case we use the network scenario
described in Figure 10. Increasing the weights for AC and BD
determines the maximum global utility to be achieved when
avoiding to overcrowd these segments and their corresponding
paths. Additionally, because the condition for receiving the
highest utility for a road segment is less strict compared to the
BPD utility scheme (maintaining the consumption under the
congestion point versus reaching the optimum capacity), the
maximum global utility is achieved when overcrowding the
path ABCD. An example of such a configuration is presented
in Figure 11. We thus expect RA over paths to display a
good performance in this scenario, as it should be able to
capture the desired behaviour. We run this experiment for
2 000 episodes and plot the global utility averaged over 30
trials, together with error bars representing the standard
deviation at every 100 episodes. The highest global utility is
3.68.
Figure 10: Weights and capacities for each road segment in
the RND scenario considered under the TLD local utility.
Figure 11: Example of the optimum distribution of 50 agents
over the considered RND under the TLD local utility
Figure 12 presents the obtained results. We notice that
in all cases the convergence takes place very fast, however
the quality of the solutions vary from one setting to an-
other. The difference rewards approach, D, manages again
to achieve optimum performance. As expected, the RA con-
figuration [ABD, ACD], [ABCD] also performs optimally, as
it explicitly encourages the congestion of the path ABCD.
[ABD], [ABCD], [ACD] comes close to the optimum per-
formance, however the agents will not always overcrowd
path ABCD in this case. The next two configurations,
Figure 12: RND with TLD local utility, 50 agents.
[ABD, ABCD], [ACD] and [ABD], [ABCD, ACD], still per-
form better than L and G, although they encourage a sub-
optimal behaviour (overcrowd path ACD or ABD respec-
tively). Notice that in comparison to the results in Figure 8,
[ABD, ACD], [ABCD] goes from being the worst performing
setting to one of the best. This emphasizes how important it
is to have insights on what the desired collective behaviour
of the agents is, in order to provide well performing abstract
groupings.
6. DISCUSSION AND CONCLUSIONS
The contribution of this work is two-fold. Firstly, we
introduce a new congestion problem, the Road Network
Domain, in which the resources are no longer independent,
and the selection of one path influences the load in other parts
of the network. Secondly, we provide a thorough analysis
of the resource abstraction approach for resource selection
congestion problems, together with its limitations and clear
guidelines on how to best create the abstract groups according
to the desired outcome.
The Road Network Domain presents a novel challenge
for resource selection congestion problems, introducing the
realistic aspect of interconnected resources as we often find
in real-word application such as: electricity grids or traffic
networks. We note that the network topology used here is a
small one, yet sufficient to illustrate the additional challenge,
and that more research is necessary in order to evaluate
scenarios that closely model real-world situations. A next
possible step would be to investigate the scalability of all
the methods, when dealing with a larger and more complex
network, especially when considering the challenge of tuning
the resource abstraction approach.
While resource abstraction seems to provide a strong
method of guiding agents towards an 'overcrowd one' be-
haviour (namely the smallest sized group), it fails when the
optimal configuration can no longer be expressed in these
terms. Additionally, we consider this method to have a
limited applicability in real-world domains, as it requires
information regarding each composing resource (capacity,
InanimateAnimateConcreteUncountableCountableICU: hout steen rijstIAC: kleur cijfer dagAbstractICC: dak sleutel flesACC: hond vis hertIAU: weer geluk hulpABCDc = 3, w = 1c = 7, w = 5c = 5, w = 1c = 7, w = 5c = 3, w = 1InanimateAnimateConcreteUncountableCountableICU: hout steen rijstIAC: kleur cijfer dagAbstractICC: dak sleutel flesACC: hond vis hertIAU: weer geluk hulpABCD5465414450500100015002000Episodes0.51.01.52.02.53.03.54.0Global utilityLGD[ABD,ACD],[ABCD][ABD],[ABCD,ACD][ABD],[ABCD],[ACD][ABD,ABCD],[ACD]Systems. International Foundation for Autonomous
Agents and Multiagent Systems, 2017. In press.
[10] R. S. Sutton and A. G. Barto. Reinforcement learning:
An introduction. MIT press Cambridge, 1998.
[11] K. Tumer, A. Agogino, Z. Welch, A. Bazzan, and
F. Kluegl. Traffic congestion management as a learning
agent coordination problem. Multiagent Architectures
for Traffic and Transportation Engineering, pages
261–279, 2009.
[12] K. Tumer and S. Proper. Coordinating actions in
congestion games: impact of top–down and bottom–up
utilities. Autonomous agents and multi-agent systems,
27(3):419–443, 2013.
[13] K. Tumer, Z. T. Welch, and A. Agogino. Aligning
social welfare and agent preferences to alleviate traffic
congestion. In Proceedings of the 7th international joint
conference on Autonomous agents and multiagent
systems-Volume 2, pages 655–662. International
Foundation for Autonomous Agents and Multiagent
Systems, 2008.
[14] L. Vicisano, J. Crowcroft, and L. Rizzo. TCP-like
congestion control for layered multicast data transfer.
In INFOCOM'98. Seventeenth Annual Joint
Conference of the IEEE Computer and
Communications Societies. Proceedings. IEEE,
volume 3, pages 996–1003. IEEE, 1998.
[15] C.-Y. Wan, S. B. Eisenman, and A. T. Campbell. Coda:
Congestion detection and avoidance in sensor networks.
In Proceedings of the 1st International Conference on
Embedded Networked Sensor Systems, SenSys '03, pages
266–279, New York, NY, USA, 2003. ACM.
[16] M. Wiering. Multi-agent reinforcement learning for
traffic light control. In P. Langley, editor, Proceedings of
the Seventeenth International Conference on Machine
Learning (ICML'2000), pages 1151–1158, 2000.
[17] D. H. Wolpert and K. Tumer. Optimal payoff functions
for members of collectives. Advances in Complex
Systems, 4(2/3):265–279, 2001.
weight, consumption), as well as some intuition on the prob-
lem's utility function.
We have also shown that the difference rewards approach
achieves a high performance in all the tested scenarios, manag-
ing to capture in the reward signal the necessary information
to allow the agents to coordinate indirectly, even in more
complex scenarios as the RND.
Acknowledgments
This work is supported by Flanders Innovation & Entrepreneur-
ship (VLAIO), SBO project 140047: Stable MultI-agent
LEarnIng for neTworks (SMILE-IT). We are grateful for all
the helpful comments and discussions with our VUB AI Lab
colleagues at each stage of this work.
REFERENCES
[1] A. K. Agogino and K. Tumer. Analyzing and
visualizing multiagent rewards in dynamic and
stochastic domains. Autonomous Agents and
Multi-Agent Systems, 17(2):320–338, 2008.
[2] A. K. Agogino and K. Tumer. A multiagent approach
to managing air traffic flow. Autonomous Agents and
Multi-Agent Systems, 24(1):1–25, 2012.
[3] M. Colby, T. Duchow-Pressley, J. J. Chung, and
K. Tumer. Local Approximation of Difference
Evaluation Functions. In Proceedings of the 2016
International Conference on Autonomous Agents &
Multiagent Systems, pages 521–529. International
Foundation for Autonomous Agents and Multiagent
Systems, 2016.
[4] M. Colby and K. Tumer. Multiagent reinforcement
learning in a distributed sensor network with indirect
feedback. In Proceedings of the 2013 International
Conference on Autonomous Agents and Multi-agent
Systems, AAMAS '13, pages 941–948, Richland, SC,
2013. International Foundation for Autonomous Agents
and Multiagent Systems.
[5] S. Devlin, L. Yliniemi, D. Kudenko, and K. Tumer.
Potential-based difference rewards for multiagent
reinforcement learning. In Proceedings of the 2014
international conference on Autonomous agents and
multi-agent systems, pages 165–172. International
Foundation for Autonomous Agents and Multiagent
Systems, 2014.
[6] G. Hardin. The tragedy of the commons. Science,
162(3859):1243–1248, 1968.
[7] K. Malialis, S. Devlin, and D. Kudenko. Intrusion
response using difference rewards for scalability and
online learning. In Workshop on Adaptive and Learning
Agents at AAMAS (ALA-14), 2014.
[8] K. Malialis, S. Devlin, and D. Kudenko. Resource
abstraction for reinforcement learning in multiagent
congestion problems. In Proceedings of the 2016
International Conference on Autonomous Agents &
Multiagent Systems, pages 503–511. International
Foundation for Autonomous Agents and Multiagent
Systems, 2016.
[9] R. Radulescu, P. Vrancx, and A. Now´e. Analysing
Congestion Problems in Multi-agent Reinforcement
Learning. In Proceedings of the 2017 International
Conference on Autonomous Agents & Multiagent
|
0805.1787 | 1 | 0805 | 2008-05-13T06:51:35 | A Network Protection Framework through Artificial Immunity | [
"cs.MA",
"cs.CR"
] | Current network protection systems use a collection of intelligent components - e.g. classifiers or rule-based firewall systems to detect intrusions and anomalies and to secure a network against viruses, worms, or trojans. However, these network systems rely on individuality and support an architecture with less collaborative work of the protection components. They give less administration support for maintenance, but offer a large number of individual single points of failures - an ideal situation for network attacks to succeed. In this work, we discuss the required features, the performance, and the problems of a distributed protection system called {\it SANA}. It consists of a cooperative architecture, it is motivated by the human immune system, where the components correspond to artificial immune cells that are connected for their collaborative work. SANA promises a better protection against intruders than common known protection systems through an adaptive self-management while keeping the resources efficiently by an intelligent reduction of redundancies. We introduce a library of several novel and common used protection components and evaluate the performance of SANA by a proof-of-concept implementation. | cs.MA | cs |
A Network Protection Framework
through Artificial Immunity
Michael Hilker & Christoph Schommer
University of Luxembourg
6, Rue Richard Coudenhove-Kalergi, L-1359 Luxembourg
Faculty of Science, Technology, and Communications
{michael.hilker, christoph.schommer}@uni.lu
Abstract. Current network protection systems use a collection of in-
telligent components - e.g. classifiers or rule-based firewall systems to
detect intrusions and anomalies and to secure a network against viruses,
worms, or trojans. However, these network systems rely on individu-
ality and support an architecture with less collaborative work of the
protection components. They give less administration support for main-
tenance, but offer a large number of individual single points of failures
- an ideal situation for network attacks to succeed. In this work, we
discuss the required features, the performance, and the problems of a
distributed protection system called SANA. It consists of a cooperative
architecture, it is motivated by the human immune system, where the
components correspond to artificial immune cells that are connected for
their collaborative work. SANA promises a better protection against in-
truders than common known protection systems through an adaptive
self-management while keeping the resources efficiently by an intelligent
reduction of redundancies. We introduce a library of several novel and
common used protection components and evaluate the performance of
SANA by a proof-of-concept implementation.
Keywords: Network Protection, Artificial Immune Systems, Bio-Inspired Com-
puting, Distributed Architectures, Information Management, Network Simulation.
1
Introduction
The attacks towards computer networks is increasing and the costs as well. In
crime towards the computer networks does 88% belong to the infections by
viruses and worms but the attacks by humans is increasing. In addition, more
and more attacks aim to receive information, which are afterwards sold to earn
money; this thread generates a cost of about 70, 000, 000$ [1]. The costs of intru-
sions towards computer networks is measured to 150, 000, 000$ [2]. An emerging
problem are the attacks performed by internal users, e.g. by unsatisfied employes
of a company trying to get access to confident information.
A network protection system is a system that tries to protect the network
and its nodes against intrusions and attacks [3]. It consists of several components
of different granularity [4], ranging from parameter changes in sub-components,
nodes, or packet filters to powerful antivirus software, firewalls, and intrusion
detection systems in important network nodes [5]. Each protection component
contains the workflow and the knowledge in order to perform the tasks so that
the protection system converges to its goals. The protection system holds the
cooperation between the different protection components and the maintenance-
and update workflows. The performance of the protection system is an indication
how secure the network is against intrusions; the performance originates out of
the performance of all protection components.
There exist different characteristics in order to evaluate and compare different
protection systems [6]:
-- The system has to be complete; i.e. the system protects all nodes against
intrusions.
-- The provided resources has to be used efficiently.
-- The protection system has to secure the network and all nodes. It should
also not influence the user and the normal workflows in the network.
-- The installation, maintenance, and update workflows have to be easy and
fast to perform. The system has to ensure that the different protection com-
ponents work properly and are up-to-date.
-- The system has to adapt to the current situation in the network and it has
to be adaptive in order to identify modified, mutated, and/or novel attacks.
An important characteristics of computer network protection systems is that
they should be extendable and cope with upcoming - more and more complex
as well as intelligent - intrusions. For example, the ZMIST virus remains hid-
den in host programs [7]; common-used detection techniques performing pattern
matching have serious problems to identify it. The EVOL virus hides itself through
swapping instructions in existing programs [8]. Thus, we demand for a protection
system to use an adaptive information management having protection compo-
nents collaborated; we demand for protection systems to be easily extendable
towards and permanent protection update.
A recent approach is to model the biological systems for computer science
where the artificial immune systems is one example. In this article, we intro-
duce first a novel framework for protection systems as artificial immune system
[9,10,11,12], which is motivated by the human immune system [13]. We then
suggest a computer network protection system called SANA, present its archi-
tecture, performance and some implementation aspects. An important aspect is
that SANA is a complex - but easy to understandable - system that does not use
a centralised system [14]. It provides the features and characteristics explained
above and provides a dynamic, efficient, and adaptive security environment in
which common used and novel approaches for network security are combined
[15]. These approaches are both motivated by the Biology as well as Computer
Science approaches.
2 Current Situation
Current promising protection solutions and systems contain an architecture of
different components. In each node, antivirus software [16] and firewall [17] are
installed; they observe file access, active processes, and the network packet head-
ers for possible attacks. Additionally, some nodes facilitate other protection com-
ponents like e.g. spam filters for identifying unsolicited and undesired messages.
On the network side, on hubs, switches, and routers header checking packet
filters run in order to define a network policy describing which routings, proto-
cols, and ports are allowed [18]. Important nodes like e.g. internet gateways and
email servers are secured using intrusion detection systems [5], which check each
packet completely and observe the whole node in order to identify intrusions. A
novel approach are intrusion prevention systems [19], which extend the antivirus
software and firewall to a system observing the file access and system calls as
well as checking the whole packets for intrusions. However, these systems mostly
combine only antivirus and firewalls extended by some statistical approaches in
order to detect unknown intrusions; however they are significantly different to
intrusion detection systems.
Currently, these components must be installed and configured in each node
manually where the configuration is more and more done through a centralised
management server. The updates of each protection component - antivirus or
intrusion detection system - works as follows: each component asks regularly a
central management if there exists an update; if yes, then it downloads it. The
antivirus software and the firewall ask then the user when a suspicious event
occurs; the user takes over the decision and proceeds. This is often a risk since
the user is mostly not an expert. Additionally, the antivirus software, firewalls,
packet filters, and intrusion detection systems use a log system in order to inform
the administrators about different event. The administrator analyses such, but
due to the enormous number of messages is it not possible for him to analyse
each message properly; the intrusions may stay undetected.
The different protection components are not connected. Thus, each compo-
nent works on its own and collaborative work does not exist. This leads pri-
marily to redundant checks: for example, the firewall and intrusion detection
system in a node check the packet for similar characteristics; resources are con-
sequently wasted. However, more important is that the different information
gathered through the different protection components are not combined in or-
der to identify intrusions or even to identify abnormal or suspicious behaviour.
Lastly, the protection system does not check itself whether each component is
up-to-date and works properly, which leads to the situation that different protec-
tion components work with limited performance. An example for this problem
is that the update system of an antivirus software does not work properly and
e.g. the antivirus software is no longer updated and does not identify the newest
intrusions; this is a problem because this node is a risk for the whole network.
For facilitating the required resources, distributed installations provide sev-
eral advantages compared to the classical client server architecture. In the client
server architecture, the client software - protection components - perform the
tasks and demand different updates and services from the central management
server. Some approaches for a distributed protection system exist [20], e.g. an ar-
tificial immune system for network security [9,10,11,12]. However, these systems
mostly do not use a fully distributed approach, i.e. there are some centralised
components that are critical for the overall performance of the system, the sys-
tem is mostly not adaptive, and the system does not use small entities as artificial
cells and more the multi-agent system approach [21] using heavy agents with few
mobility, lots of internal information, and lots of knowledge about the current
situation. A system is adaptive when it reconfigures itself so that it copes with
the current and future situation; also learning, self-checking, and -repairing is a
part of adaptive workflows. Furthermore, common used systems do not use an
approach where many artificial cells have to communicate and collaborate. Fur-
thermore, these systems are far away from production; this framework intends to
narrow the gap between the distributed protection systems of academic research
and production.
In the next section, a novel framework for a distributed, integrated, and
dynamic protection system is introduced in which common used and novel ap-
proaches for network security are combined and which tries to solve the limita-
tions of existing protection systems.
3 SANA: A Network Protection Framework through
Artificial Immunity
The protection system SANA [15] is a library of different network protection
components using a subsymbolic organisation and information management.
SANA copes with upcoming attacks that increase continuously adaption and in-
telligence. The administration and maintenance is simplified, it works mainly au-
tonomously. The system does not use centralised protection components, which
are single points of failure. Different components and workflows of SANA are
motivated by workflows and architectures from the Biology. An overview is visu-
alised in figure 1; the system is explained in the next sections according to this
figure.
3.1 Security Environment
Distributed systems with moving entities require an environment in which the
entities work. Therefore, the security environment is installed in each node and
provides an environment that is used by all protection components. The envi-
ronment ensures the access to resources as storage, memory, CPU, and network
as well as ensures that each protection component is recognised when a certain
event occurs. Therefore, each protection component is installed in the security
environment and registered for certain events, e.g. arriving of a packet or access
to a file. Thus, the protection components are independent from the underlying
hardware platform as well as network protocols and configurations, which leads
to a faster deployment of protection components. The security environments is
a middleware between the resources of the node and the protection components.
The security environment also provides checks testing the protection compo-
nents if they are allowed to access the resources and if they intend to perform
properly. This ensures that not properly working components are removed from
the network; they cannot access resources anymore. Additionally, the adminis-
trators can connect to the security environment in order to administrate these
as well as to access the protection components working in this node. The ad-
ministrators can quickly add novel components facilitating novel approaches of
network security.
3.2 Protection Components
The protection system consists of several protection components, which per-
form the tasks required for securing the network. These protection components
are both common used protection components like antivirus software, firewall,
packet filter, and intrusion detection systems in order to benefit from their per-
formance as well as novel approaches of protection components, e.g. the artificial
cells. The common used protection components are installed in the security en-
vironment and perform their tasks.
SANA is an artificial immune system that facilitates common protection
components; SANA is an evolution of common used protection systems. The
common used protection components are designed and implemented for a spe-
cific operating system. Thus, the platform independent system SANA provides
an environment in order to install the protection component in the security en-
vironment. The security environment provides everything for checking, e.g. the
network packets, the system calls, and the file accesses - middleware between
the protection components and the resources. The protection components check
these and the response is transfered to the real resources through the security
environment. For other protection components, an operating systems using hard-
ware virtualisation is provided wherein the protection components runs (see 3.7)
[22].
With this implementation, common used protection components as e.g. an-
tivirus software, firewall, packet filter, and intrusion detection system are imple-
mented and reused without internal changes in the components so that SANA
is a framework for a distributed distribution system. Also, non standard ap-
proaches as e.g. virus throttle [23,24] for slowing down the propagation of intru-
sions and Malfor [25] for automatically generating signatures of intrusions are
implemented.
The artificial cells are dynamic, highly specialised, lightweighted, and mobile
so that the system is dynamic and hard to attack. The cells are highly specialised
and lightweighted because they have only limited knowledge about the situation
in the network and the various tasks required for network security are distributed
over several nodes. The cells are dynamic and mobile through moving around
Fig. 1. Overview about SANA
and changing of the behaviour. The number of different types of artificial cells
is enormous - at least several thousands of cells - because the tasks required for
network security are split in small pieces so that a breakdown of one artificial
cell does not break down the whole system. Furthermore, each type of artificial
cell is several times present in the network so that redundancies occur. Examples
for artificial cells are introduced in [26,27]. Different types of artificial cells:
File Access Accessing a file can install intrusions like viruses. Thus, these cells
check each file that is accessed on the node.
Node Observation Artificial cells observe the whole node including the anal-
yse of the system calls and the control flow graphs of executed programs in
order to identify and prevent installation of intrusions.
Network Traffic Analysis This type of artificial cells evaluates each network
packet whether it contains an intrusion or not. If it contains an intrusion,
the artificial cells also know how to proceed with the packet, e.g. packet drop
or disinfection. An example is the approach ANIMA for Intrusion Detection
wherein the signatures of intrusions are stored in a network like architecture
[28].
Identification of Abnormality In the network, different examples of abnor-
mality exist. E.g. the infected nodes or not proper working protection com-
ponents must be identified and removed. AGNOSCO is an artificial cell using
the information from the distributed network traffic analysis in order to iden-
tify infected nodes using the artificial ant colonies approach [15]. Another
approach is ANIMA for Anomaly Detection, which stores a current view
of normal network traffic in order to identify and report abnormal network
traffic [29].
Regular Checks Abnormality can also be recognised using regular checks. E.g.
viruses and worms have a significant signature - e.g. files, running processes,
and registry entries -, backdoors have an significant open port with service
connected to this port, and not proper working or outdated protection com-
ponents can be identified using some checks. Thus, these cells move through
the network, perform the check, and identify the problems. When a problem
is recognised, they inform other cells in order to solve the problem.
Data Collection These cells collect information from the network, which are
used in order to monitor the network and afterwards for self-improvement
and -learning.
Other Types It is possible to implement nearly all types of artificial cells where
the limitations are that the cells should be small and lightweighted as well
as the cells can only use the resources provided by the security environment.
Using the artificial cells, it is possible to quickly introduce novel approaches;
tasks as described before can be defined and performed using some artificial
cells. For this, the artificial cells shutdown over time where the time is defined
by the administration; values for this parameter are between some minutes and
up to some hours. The systems in the network generate continuously new cells
in order to keep the population up-to-date; these systems are explained in the
next section. With this workflow, novel approaches and techniques for network
security are quickly introduced and the newest information is included.
3.3 Important Nodes
SANA contains the normal network nodes with the security environment and
the protection components installed in this environment. For helping the admin-
istrators to maintain SANA, two specialised nodes are required.These are two
types of nodes with more functionality, which are motivated by the human body.
These specialised nodes are required in order to collect more information and to
organise the system.
Artificial Lymph Nodes The artificial lymph nodes are a meeting point and
response center for artificial cells. The artificial lymph nodes are an extension
to the normal network nodes. A set of artificial lymph nodes manage a small
network part - sub-sub-network called. They have additionally the following
features:
-- Collect status information about the supplied network part.
-- Manage the communication in the sub-sub-network; see also the section 3.4.
-- Respond to the messages from the artificial cells. Examples of the response
are to release novel artificial cells solving a problem (disinfection a node or
updating a protection component) and to inform the administrators.
-- Supply the artificial cells with additional information, e.g. whether a network
packet contains an intrusion or not.
The artificial lymph nodes are redundant installed where several artificial
lymph nodes manage a sub-sub-network so that a breakdown of a few interferes
less the performance of the overall system.
CNTS - Central Nativity and Training Stations The artificial cells shut-
down over time and must be replaced by new ones, which include the newest
information as well as novel approaches of network security. The CNTS produce
novel artificial cells and release these continuously in order to keep the number
of artificial cells approximately constant. Thus, the CNTS are an extension of
the artificial lymph nodes and have the same features as artificial lymph nodes
as well as the generation of artificial cells. A set of CNTS manages a part of
the network with several sub-sub-networks included - sub-network called. The
CNTS model the bone marrow and thymus of the human immune system.
3.4 Artificial Cell Communication
The artificial cells are specialised and perform only a small task. Thus, several
cells have to collaborate in order to identify and prevent attacks. Therefore, the
artificial cell communication is introduced, which is a distributed fault-tolerant
communication protocol for point to multi-point communication. The artificial
cell communication models the cell communication of the human body provid-
ing a communication and collaboration protocol for the artificial cells and other
protection components. Therefore, we introduce the term artificial substance,
which is used for message exchanges. It models the behaviour of different sub-
stances of the human body, e.g. the cytokines and hormones [13]. Each artificial
substance contains the message and a header with the parameters hops-to-go
and time-to-live describing the distribution area of the artificial substance.
Each node manages the routing of the substances where each node has a set of
nodes; each substance is sent to these nodes when the distribution area is not
reached; this set is adapted to the current situation in the network.
The artificial cell communication works as follows: one component sends a
message, packs this message in an artificial substance, defines the distribution
area, and gives it to the network. In each node, the substance is presented to all
protection components and the right components receive the message. The iden-
tification of the right receivers is done using artificial receptors. These receptors
are a public/private key pair describing the type and status of the artificial cells,
protection components, and artificial substances. All artificial cells, protection
components, and artificial substances contain several artificial receptors describ-
ing their type and status. Only when an artificial cell or protection component
can authorise itself using the right keys of the artificial receptors, it will receive
the message stored in the artificial substance. The protection components receiv-
ing the message respond to it, and the node sends the substance to all next nodes
and the process repeats until the distribution area of the substance is reached.
The next nodes are defined by administrator and adapted by the system so that
the communication is configured to the current situation in the network. The
artificial receptors are additionally used in order to secure the access to resources
using authentication processes.
The advantages of the artificial cell communication are a distributed, efficient,
and fail-safe protocol without a single point of failure. Furthermore, the protocol
works fine for point to multi-point communication as used in network security
where a component sends a message to all nearby components of a certain type.
3.5 Self Management
The numerous artificial cells require where their tasks are most needed. There-
fore, the artificial immune cells organise as follows: each protection component
knows how much security it provides (security value). Each node calculates -
basing on the security values of each component in the node - the security level
of the node; when this level falls below a certain threshold - the threshold is
defined by the administrator and defines how much security this node requires
-, it starts a notification process. This notification process attracts other nearby
artificial cells in order to move to this node so that the security value is increased
and the artificial cells in this node are more affine to stay than to move. However,
the artificial cells still work autonomously.
For the artificial cells, performing regular tasks on the nodes, exist another
workflow; we decided to use the artificial ant colonies approach during the de-
signing of this workflow. Briefly, the artificial ants lay pheromone on the ground
when carrying an artificial prey; these pheromones are afterwards used in order
to find other nearby preys. Here, the preys are unchecked nodes and the artifi-
cial ants are the artificial cells. Thus, in each node ni exist a storage for values
for these cells where each value vni,ni+1,tj is for a connection ni, ni+1 and for
a specific type tj of artificial cell, which is identified by the artificial receptors.
When a cell performs the check in node ni and moves afterwards to node ni+1,
it increases the value for the connection (ni, ni+1) and for the specific cell type
tj in the node ni. Furthermore, the node decreases these values over time. When
a cell wants to move from node ni to another node, it can use these values in
order to identify the node, which waits the longest time for a check. The value
describes the number of pheromones released by the artificial ants - artificial
cells - where the pheromones disappear over time.
The self management increases the performance enormously because the ar-
tificial cells are properly distributed over all nodes and enough artificial cells can
still keep moving in order to provide a dynamic protection system. In addition,
the artificial cells performing regular tasks are lead to the nodes where this task
is required; this reduces the required resources because redundant tasks are re-
duced and all nodes are checked regularly, which increases the security in the
network.
3.6 Information Management
Compared to common used protection systems, the information management of
SANA is enhanced: the artificial cells analyse not only the information from one
single node, they use the information from several nodes for a combined anal-
ysis. This is e.g. used for finding abnormal behaviour or multi-step/multi-stage
attacks. Furthermore, the different artificial cells exchange information so that
results from different analysing systems are combined evaluated and used for
finding more intelligent and adaptive intrusions. Furthermore, the self-checking
performed by the checking artificial cells is done distributed so that lots of infor-
mation are gathered. The warnings and alerts are semi-automatically analysed
and processed - common warnings and alerts are automatically processed and
only novel are directly sent to the administration; They are also sent to the ad-
ministrators as summary status information when required or demanded. The
administrators can always demand a status report or snapshot from the system
in order to receive an overview about the current situation.
3.7 Implementation
A platform-independent proof-of-concept implementation is done so that SANA
can be compared with other protection systems. The simulation runs on a net-
work simulator implementing a packet oriented network - e.g. TCP/IP - where
Fig. 2. Implementation layers in a network node
an adversarial stresses the network and the protection system using many pack-
ets with and without intrusions. Furthermore, the implementation can be easily
extended and also common used protection components as antivirus software,
intrusion detection systems, and firewalls are implemented in order to evaluate
and compare the performance of SANA.
Implementation of Security Environment The implementation of the se-
curity environment is crucial. It should provide the features required to run the
protection components efficiently but it should be impossible that the attackers
use the security environment for the intrusion process. For this, the computer is
divided in four layers:
1. The first layer is the hardware layer containing all hardware like CPU, mem-
ory, and storage.
2. The operating system layer 1 contains only the core parts of the operating
system in order to access the resources. Mostly, these are the kernel and
some drivers.
3. The operating system layer 2 contains the rest of the operating system as
well as separated the SANA security environment.
4. The software layer contains in the operating system the application soft-
ware installed by the users and in the security environment the protection
components.
The different layers are visualised in figure 2. As it can be seen in the figure,
the operating system and the SANA security environment are separated. This
is achieved through hardware virtualisation. In the operating system layer 1 is
a software installed, which enables the features to run several different oper-
ating systems - guest operating systems called - at the same time. Then, one
guest operating system has the operating system running and one the SANA
security environment. Furthermore, the operating system cannot see the secu-
rity environment but vice versa, which is ensured through the implementation.
Furthermore, operating system layer 1 is so installed that it only changes when
the hardware changes.
The advantages of this installation:
When an intruder installs an intrusion into the operating system or the software
space, it cannot access the security environment through the hardware virtuali-
sation. If an intruder installs an intrusion into the operating system layer 1, the
runtime environment recognises the change immediately, quarantines the node
through a message to the neighbours, and removes itself from the node; then, the
attacker does not receive internal information from the protection system but the
administrators have to add the node to the network again. When the intruder
tries to install itself in the security environment, a change is prohibited because
this part does not change. Lastly, if the intruder installs an intrusive protection
component - either artificial cells or local protection component - it requires the
right keys from the artificial receptors in order to access the resources; without
the keys, the intrusive component cannot perform intrusive tasks in order to
interfere the network. Thus, the intrusion can itself only install in the software
part as before and has no access to the protection system SANA.
An important advantage is that the working operating system and the protec-
tion system runs in distinguished virtual machines. Thus, the protection system
checks the operating systems and software from outside and the intrusion has
more problems to hide itself from the checking because code armoring and stealth
techniques often fail when the scan comes from outside. Furthermore, the vir-
tual machines can be moved to other machines so that a user works always with
its system on all machines. In addition, the protection system is implemented
in a service oriented architecture (SOA) [30] so that more complex tasks can
be demanded from the artificial lymph nodes and CNTS using different virtual
machines. E.g. a not proper working security environment with protection com-
ponents or a virtual machine with infected operating system can be moved to
the administration computers and checked for repairing and afterwards moved
back. Another example is that complex tasks are done using an additional virtual
computer running the protection components performing the tasks.
The disadvantages of the approach are an increased overhead. However, when
e.g. OpenVZ is used, the overhead is about 1% − 2% [22]. Additionally, novel
CPUs already contain visualization techniques implemented in hardware so that
the overhead is even more reduced.
3.8 Maintenance
The maintenance is important for the administrators. The administrators de-
mand for an easy-to-use and mostly autonomous administration and update
interface where also the enhancements should be done quickly and smoothly.
Therefore, SANA provides different workflows:
Administration The administrators can connect to each security environment
in order to check the current status and administrate the distributed system. The
artificial lymph nodes and CNTS provide summary status information about the
system and artificial cells can be released in order to collect specific information,
which can be afterwards used for further analysis.
Updates The updates are done differently compared to common used systems
where a management server provides the updates and the client softwares down-
load it. The disadvantage is that the client software have to ask regularly for
new updates and outdated software is not identified. Thus, SANA provides two
different ways of updates:
1. The artificial cells are either updated through new information from the arti-
ficial lymph nodes, which are visited regularly. Otherwise, the most common
update workflow for artificial cells is the shutdown of the cells and release of
new cells with the newest updates and information.
2. The protection components are updated using updating artificial cells. These
cells are released when a new update is available. They visit all protection
components of this type and update these. The update is reported in order
to identify unsuccessful updates or outdated components. This workflow is
mostly used for not moving components.
In addition, the administrators can always connect to all security environ-
ments in order to access the protection components and update these.
Enhancements Enhancements can be either released through a new popula-
tion of artificial cells or an installation in the security environments. For the
new population, the information about the enhancement must be added to the
CNTS, which generates and releases the new artificial cells. An installation in
the security environments can be either done manually through connecting to
each security environment or through an automated process updating a set of
security environments. With this, the enhancements are quickly deployed to the
system.
3.9 Configuration of SANA
After the introduction of the different parts and workflows of SANA, this section
provides a short overview about a possible configuration of SANA on a real
network. Each network node, which are the computers in the network as well as
the network equipment, contain a security environment in order to install the
protection components. Each node contains an antivirus software and a firewall
as in a common used protection system. The network equipment have packet
filters in order to define the network policy and to close unused ports. The
artificial cells move through the network and provide a distributed protection
subsystem on all nodes. Important nodes, e.g. the Internet gateway and the email
server but also important productive servers, run additionally to the artificial
cells intrusion detection systems. The artificial lymph nodes are installed in the
network equipment so that the number of hops from the nodes to the next
artificial lymph nodes is small. There are two to three CNTS in the network
releasing continuously novel artificial cells. The self management organises the
artificial cells and guarantees a certain amount of security in each node. The
artificial cell communication enables the cooperation between the different cells.
All other parts are implemented as described above.
4 Performance and Results
The performance of SANA is more than acceptable. It performs mostly bet-
ter than common used protection systems, which are a collection of protection
components, because SANA also uses the same protection components. Addi-
tionally, it contains the artificial cells providing a dynamic and adaptive part.
Furthermore, SANA provides using the security environment an easy to admin-
istrate protection system that has many autonomous workflows. The warnings
and alerts of each protection component are analysed and processed automati-
cally by other protection components in order to adapt the behaviour - a more
sophisticated information management. Therefore, different workflows are used:
first, the information from the protection components are combined in order to
identify infected nodes and abnormal behaviour; second, the infected nodes are
disinfected and abnormal behaviour is observed; third, the warnings and alerts
are sent to the nearby artificial cells which adapt their internal thresholds accord-
ingly - implementation of the danger model; the danger model is an biological
motivated approach where the cells exchange continuously summary status in-
formation in order to adapt their internal thresholds [31,32]. Furthermore, the
protection system is highly dynamic: the artificial cells move continuously and
provide a hard to predict and to attack protection system. Furthermore, the
system can be quickly extended with novel approaches for network security.
In the simulations, real network attacks are modelled where e.g. different
worms use the network to propagate and the aim of the worm is to infect as
many nodes as possible. Two simulations are performed: the first with a common
used protection system consisting of antivirus software, firewall, packet filter, and
intrusion detection system, and a second with SANA. In all of our simulations
SANA is more secure than the common used protection system. Furthermore,
SANA adapts to the current situation because identification of infected nodes,
not proper working components, and suspicious behaviour is detected and the
problems are fixed automatically.
Especially, when an intrusion uses the network for propagation and an intru-
sion detection system checks the traffic between the network and the internet,
the worm can easily infect the whole network because there is not an internal
protection system that stops it. In this case, SANA's artificial cells protect the
nodes through distributed intrusion detection and disinfection of infected nodes.
In the introduction, different criteria are introduced and SANA meets these:
-- Due to the installation in all nodes SANA secures the whole network. The
configuration and the self management ensures that each node is properly
secured. All intrusions are not identified, which is the ideal performance of
a protection system. However, SANA identifies almost all intrusions.
-- The system uses the resources efficiently from all nodes. Thus, the required
resources on a single node is reduced when SANA is used.
-- For the third criteria, the system should secure all nodes as well as it should
not influence the normal production. These two criteria are met because
SANA is installed on each node and uses only limited resources so that the
normal production is not influenced. Furthermore due to its autonomous
workflows SANA asks only rarely the user for critical security issues.
-- The CNTS release regularly artificial cells, which check, repair, and update
the different protection components for proper working - self-checking and
-repairing. Furthermore, the installation is simplified because in each node
must only the security environment installed and the protection components
find a common infrastructure. Due to the enormous number of artificial cells
is a breakdown of one cell less important for the overall performance.
-- SANA adapts to the current situation in the network. Therefore, a sophisti-
cated information management is used and the protection components, i.e.
artificial cells, identify abnormal behaviour, infected nodes, and adapt their
behaviour to the current situation in the network.
After the practical implementation and analysis of the system, distributed pro-
tection systems are analysed more theoretically. Therefore, different attack sce-
narios are discussed where several attacks are nearly always successful when
current protection systems are used. Examples are that a user wants to attack
a node, shuts it therefore down, and boots from an external storage device, e.g.
Linux on an USB-stick. The protection components in this system are inac-
tive and the user can install all intrusions and other protection components of
current protection system does not identify it. SANA identifies infected nodes
quickly, quarantines the node, and informs the administrator. Other attacks are
that novel intrusions can infect a whole network because only centralised systems
identify it. In the next section, SANA is compared with common used protection
systems.
4.1 Comparing SANA with common used Protection Systems
As described in the section 2 is a common used protection system a collection of
different protection components where each component is directly installed on
the node. Mostly, all nodes contain an antivirus software and a firewall, all net-
work equipments contain packet filters, as well as important nodes are secured
using intrusion detection systems. In contrast, SANA facilitates the same con-
figuration of protection components enhanced with the artificial cells, artificial
lymph nodes, and CNTS. These enable collaborative, dynamic, and adaptive
workflows so that SANA identifies infected nodes, weak points, and suspicious
behaviour. Due to the installation of the security environment are the protection
components distinguished from the operating system. Hence, the components
check the system and consequently also the intrusions from outside so that it
is harder for the intrusion to stealth or armour itself from the analysis. Addi-
tionally, SANA can produce a static copy of an virtual machine containing the
user's operating system so that the components check this halted system. This
static copy is also used to save evidences of an intrusions in order to find the
adversaries, which is an important legal aspect.
Other important network protection systems and components are distributed
and host-based intrusion detection systems. Distributed intrusion detection sys-
tems install in each node an intrusion detection system or install capturing parts
in each node and some centralised analysing and response centers. The second
approach has the disadvantage that a lot of traffic is required in order to send
all traffic to the analysing centers. The first approach installing in each node
an intrusion detection system has the disadvantages that a lot of resources are
required. In addition, each intrusion detection system requires lots of administra-
tion and produces several warnings and alerts, which must be analysed. Thus, the
administrators cannot analyse these and, consequently, intrusions found but only
reported to the log file are often not identifies. Furthermore, these approaches
do not identify infected nodes, weak points in the network, and suspicious be-
haviour.
Widely used in big productive and academic networks are honeypots and
honeynets. A honeypot behaves like a normal computer, which pretends to con-
tain important information and processes. Furthermore, the honeypot is nor-
mally weak secured and, thus, an aim for attacks. However, the honeypot tries
to attract the intrusion in order to trap or to delay intrusions. In addition, hon-
eypots are used in order to identify novel intrusions and generate a signature
for these. Honeynets are a network of honeypots in order to simulate a whole
network and to analyse the behaviour of intrusions in a network. Honeypots and
honeynets are not implemented by SANA. However, it is possible to implement
these protection systems in a network secured by SANA.
When a small network is used in a company and there is only few inter-
network communication, the protection system is so installed that all network
traffic is routed over a centralised node, which analyses all network traffic - some-
times this is implemented using a broadcast network or using adapted routing
tables. Then, all other nodes must not check the network traffic and the installa-
tion of protection components is simplified. Unfortunately, this approach has the
disadvantage that a lot of bandwidth is required for routing all traffic over this
center as well as the center needs lots of computational power in order to check
the traffic. Furthermore, when an adversarial has control over some nodes, the
routing tables can be easily changed as well as the encrypted traffic can be only
checked at the destination node. In addition, this configuration is static and does
hardly identify suspicious behaviour and not proper working components where
infected nodes can be identified through analysing the information gathered at
the centralised checking node.
The differences to current protection system are the workflows implemented
through the artificial cells. With these workflows, a distributed, dynamic, and
adaptive protection system is implemented, which facilitates quick and easy-
to-use maintenance workflows. In addition, the information management is in-
creased so that information from different nodes are combined analysed in order
to identify and solve problems in the system. The distributed intrusion detection
system deployed by the artificial cells differs SANA from common used protec-
tion systems; this distributed intrusion detection is analysed in section 4.5.
4.2 Simulation Results
Before different attack scenarios are discussed in detail, some simulation results
comparing SANA with common used protection system are introduced. The
simulations of this section focus on network based attacks where network packets
containing intrusions try to infect a node. Infected nodes send packets with
intrusions in order to propagate the attack. Adversaries start the attack from
outside the network but infected nodes are inside. The network is always a big
network with at least 1000 nodes.
First Simulation: A random network with 1110 nodes. Three different pro-
tection systems where SANA is the implementation of SANA using only artifi-
cial cells, NIDS is the implementation of an IDS in the internet gateway, and
NIDS&SANA is combination of both. Performance:
Percent identified intrusive packets NIDS SANA NIDS&SANA
First Simulation
48.67% 79.35%
85.13%
After analysing the simulation, the results emerges out of the design. NIDS lack
from the infected nodes sending lots of intrusive packets. SANA lack from the
bad securing of the Internet gateway. NIDS&SANA has the problem of infected
nodes, which are not removed from the network.
Second Simulation: The network is a model of a switched company network
with 1110 nodes. The configuration is similar to the first simulation. Two simu-
lations are run: the first with 75% of the traffic is external to the Internet and
the second with 25% external.
Percent identified intrusive packets NIDS SANA NIDS&SANA
Traffic 25% internal
Traffic 75% internal
90.64% 71.23%
37.78% 74.71%
94.12%
81.74%
After analysing the simulation, the results emerges again out of the design. NIDS
lack from the infected nodes sending lots of intrusive packets, which is mostly
a problem in the simulation with lots of internal traffic due to no checking of
this traffic. SANA lack from the bad securing of the Internet gateway where the
most attacks come through. NIDS&SANA has the problem of infected nodes,
which are not identified. However, it can be seen that the combination of SANA
with an IDS in the Internet gateway secures the network properly.
Third Simulation: This simulation uses the same configuration as the second
simulation but SANA uses the workflows to identify and disinfect infected nodes.
Thus, the performance of the NIDS is the same.
Percent identified intrusive packets NIDS SANA NIDS&SANA
Traffic 25% internal
Traffic 75% internal
90.64% 94.19%
37.78% 90.68%
99.20%
95.81%
It can be seen that the infected nodes release lots of intrusive packets and, thus,
the identification of infected nodes increases the performance of the protection
systems enormously.
4.3 Performance in Attack Scenarios
The performance of SANA is analysed through several different attack scenarios.
These scenarios are very common in real life. Furthermore, most attacks can be
reduced to these classes.
Worm Attack A worm is a small software, which tries to infect a node. There-
fore, it uses the network as propagation medium and exploits some security holes
on the operating system and its application softwares. These security holes are
mostly a badly implementation that can e.g. lead to a buffer overflow where the
intrusions receive root- or superuser-rights on the node. The worm has after the
infection control over the node and can collect information, erase data, and in-
terfere the usage of the node. In addition, most worms try to propagate through
sending lots of network packets containing itself or a mutated version of itself.
A famous example is the "ILOVEYOU" worm.
In order to identify worm attacks, SANA facilitates different workflows. The
network packets are checked through the distributed intrusion detection sys-
tem with lots of artificial cells as well as through centralised intrusion detection
systems in important nodes. When the worm is known by the protection sys-
tem, it will remove the packets. The check is performed from outside so that
armoring and stealth techniques of intrusions have more problems to hide it-
self. Furthermore, the information gathered through the distributed analysis is
analysed in order to identify infected nodes using e.g. the artificial cells of the
type AGNOSCO. Identified infected nodes are reported and checked by checking
cells or by the administrators. When an infection is proved, the node is isolated
and disinfected. The infection is analysed for generating signatures, which are
included in the next updates. Commonly worms install e.g. backdoors, files, pro-
cesses, which are characteristic for the worm. The nodes are regularly checked
for different characteristics of intrusions and, when a characteristic is identified,
it is reported to the administrators.
The simulations show that SANA keeps a network clean from worm infec-
tions. Especially the identification of infected nodes and abnormal characteristics
increase the performance compared to common used protection systems. The
AGNOSCO approach identifies quickly infected nodes and other cells located in
the nearby artificial lymph nodes start immediately a disinfection workflow.
Virus and Trojan Horse Attack A virus and a trojan horse attack is similar
to a worm attack. The difference is that the virus requires a host program wherein
it is included. When the host program is copied the virus is copied as well as when
the host program is executed is the virus executed. A trojan horse is a software
that primarily looks and behaves like a normal program but when it is executed
it installs an intrusions. The trojan normally does not exploit a security hole, it
facilitates the approach of social engineering where the user is manipulated in
order to perform actions. The goal of a trojan is to install a backdoor, which is
used by the adversarial in order to access and control the node. In contrast to
worms and viruses does a trojan not always propagate.
The difference between the worm and the virus and trojan horse attack are
the propagation and infection workflows. The viruses and trojan horses do not
always arrive using the network where mainly all data exchanges are facilitated.
The nodes are observed for intrusive processes, file access, and network pack-
ets through the different protection components as e.g. artificial cells, antivirus
software, and intrusion detection systems. When an infected file is identified,
not the user is contacted as in common used protection systems, the systems
analyses the warning autonomously and processes this. Only when the system
does not know how to proceed, it contacts the administrators for further steps.
The workflows to identify and disinfect infected nodes are the same as used in
the worm attack scenario.
The simulations substantiate the performance because SANA identifies and
prevents known attacks as well as SANA identifies infected nodes through the
tasks performed by different artificial cells. E.g. backdoors or running processes
are reported and removed by the system.
Multi-Stage Attack Multi-stage attacks try to infect nodes or try to gather
information while attacking using various steps. Each step is a sub-attack and
can facilitates different attack techniques. These attacks are used in order to
adapt an attack towards the protection system in the network as well as to
collect information about the deployed protection system.
The problem of these attacks is that each stage is only a small tasks, which is
normally not identified as intrusive or the task is normal behaviour of programs
- mimicry of normal behaviour. In the process of multiple stages, the attack
can both collect information as well as find a weak point in the network in
order to attack and infect the node. In order to identify the attack, the different
stages must be detected and this information must be merged. Therefore, the
artificial cells and other protection components observe the node and identify the
different stages. This is logged and the other cells and components can read the
centralised log in a node. Furthermore using the artificial cell communication, the
cells exchange continuously summary status information where the appearance
of these stages are included. Thus, the nearby cells - within some hops distance
- receive the information about the stages and can include this into further
workflows. Identification and disinfection of successful attacks is similar to the
two previous attack scenarios.
The simulations show that SANA identifies and prevents known multi-stage
attacks. Unknown/novel multi-stage attacks are identified when the stages are
similar to known attacks or the infection is found using the checking workflows.
Hacker Attack When a human attacks a network is this hacker attack called.
Also the emerging class of attacks performed by humans with internal informa-
tion belongs to this class.
Attacks performed by humans are harder to identify because the humans
behave in each situation different as well as unpredictable and adapt the at-
tack to the current situation in the network. However, different tasks are always
present when an intrusion is installed and SANA tries to find these characteris-
tics. Therefore SANA observes the node as well as the network traffic in order to
identify intrusive behaviour. Additionally to common used protection systems,
SANA combines using the artificial cell communication and the movement of
cells information from different nodes.
The simulations show that especially backdoors e.g. installed by hackers are
quickly found by checking cells as well as intrusive behaviour is identified on
several nodes and reported to the administration.
Attacks using encrypted VPN Traffic Current networks facilitate virtual
private networks (VPNs) in order to include external nodes into the system or to
safely connect external services into the network. Normally, the VPNs build up a
tunnel between two nodes where the traffic over the tunnel is mostly encrypted
e.g. with IPsec. The problem for the protection system is that the traffic is
encrypted and can be only checked on the two nodes of the tunnel where one
node is mostly external. Thus, centralised protection components present in the
network - e.g. the intrusion detection system at the internet gateway - cannot
check the network traffic due to its encryption.
SANA protects the network against the attacks using the encrypted VPN
tunnel because it checks the network traffic with the distributed intrusion de-
tection system from the artificial cells at least at the internal node of the VPN
tunnel. When both nodes use SANA as protection system, both nodes check
the traffic using the artificial cells. In addition, the node is observed so that the
installation of an intrusion is detected as well as prevented. Additionally, regular
checks are performed so that the nodes are checked for infections.
Our simulations show that SANA identifies the attacks, which use the VPN
for attacks. In addition, the self management makes it feasible to increase the
concentration of cells in these nodes because a VPN tunnel is also a risk for the
network.
4.4 Dynamic and Adaptive Behaviour
The dynamic behaviour featured by the artificial cells is crucial for the perfor-
mance of SANA. The artificial cells move and the self management ensures that
each node is properly secured. Thus, an attacker does not always find the same
configuration of the protection system and cannot be sure to use a backdoor
for further attacks. The system additionally adapts to the current situation.
Hotspots of attacks are identified and the concentration of artificial cells in this
area is increased in order to provide more security. The collaboration between
the artificial cells enables the combination of information gathered in different
protection processes. SANA also adapts through analysing infections and au-
tonomous generation of signatures in order to identify the intrusion afterwards.
These points increase the performance and are not available in most common
used protection components.
4.5 Distributed Intrusion Detection System
The artificial cells for checking network packets implement a distributed intru-
sion detection system. These cells run on all nodes and evaluate the packets
whether they contain an intrusion or not. The generated warnings and alerts are
both sent to the administrations and processed automatically. With the right
configuration, which is guaranteed through the self management, each packet is
checked against all known intrusions. E.g. in all networks each packet travels at
least three hops: sender, network equipment, and receiver. Thus, each hop must
only check the packet against 33% of all known intrusions. When the network
traffic is analysed, it can be seen that in most networks the packets traverse
mostly about ten hops and the configuration can be adapted to this. Also, the
self management can configure the system according to the normal routing paths
as well as to the routing in the network.
The distributed intrusion detection system installed through the artificial
cells works in the simulations well and identifies reliably the intrusions. Further-
more, the problem of packet loss [33] of current centralised approaches is solved
because the dataset of known intrusions in a node is significantly reduced.
4.6 Security in SANA
The distributed protection system SANA can be a risk for the network. When
SANA is not properly secured, adversaries can use the system in order to run
attacks, e.g. through propagating intrusions as artificial cells. Also, the artificial
cells can access critical resources, which are also of special interest for an attacker.
This must be prevented through a proper securing of the protection system and
its components.
Section 3.4 introduces the artificial receptors as a public private key pair
describing the type and status of all components in SANA, especially from the
artificial cells. These keys are extended to a distributed public key infrastructure:
each resource is secured using some keys and the artificial cells have to authorise
with the right keys in order to receive access. Thus, unauthorised cells cannot
access the important resources. Artificial cells introduced by attackers - so called
bad artificial cells - receive no access to the resources because they lack from
having the right receptors.
This approach leads to the next problem that the attackers cannot receive
access to the keys of the artificial receptors. Therefore, the implementation of
the security environment is important, which is introduced in section 3.7 and
visualised in figure 2. The system is organised in three parts: the hardware and
the core parts of the operating system (operating system layer 1), the SANA
security environment with the protection components, and the operating system
with the applications software. The question is, which information can be read
by the adversarial when occupying the node:
-- When an intrusion installs something in the operating system layer 1, SANA
uninstalls itself immediately from this node and quarantines the node through
informing the neighbours. Thus, the intrusion has no change to receive in-
formation about the keys. Afterwards, the administrators have to check the
node and bring it back to production through inserting it in the network.
-- Most intrusion attack the Windows operating system, which is only available
in the operating system part of the security environment. Using the hardware
virtualisation, it is impossible to access the security environment and to
access the keys. When the intrusion tries to break out, it has to change the
operating system layer 1, which is discussed in the last point.
-- The most critical problem is an installation of an intrusion in the security
environment. An arriving intrusive protection component is identified and re-
moved. When an intrusion installs itself in the environment, integrity checks
recognise this and the intrusion is identified and prevented. Due to the small
size and limited features can the environment safely installed so that intru-
sions cannot attack it. Different techniques are e.g. formal verification and
integrity checks.
To sum up, it is hard for an adversarial to use SANA for running attacks. In
addition, self checking by other protection components and especially artificial
cells identify not proper working components quickly and remove them from
production.
5 Next Steps
There are lots of open problems and next steps in the SANA project. One im-
portant next step is to intensive the research in the cooperation between the
different artificial cells. Therefore, the goal is to use the danger theory for the
collaboration between different protection components in SANA.
In the implementation, the idea of using hardware virtualisation for imple-
menting is not enough researched. Here, the next step is to analyse the required
overhead as well as to introduce the service oriented architecture in detail in
order to analyse the novel features emerging out of this architecture.
Furthermore, to extend the library of implemented protection components
e.g. with honeyports is a next step in order to include more approaches of network
security. With the extensions, SANA is tested against more intrusions and a
testbed is built up where SANA protects a real network against real attacks.
6 Conclusion
As it was described, the protection system SANA outperforms current protection
systems. An intelligent administration and a distributed architecture with a
standardised protection environment increases its performance. The distributed
and dynamic framework makes it hard to attack and to break it completely
down. The system is easily update and extendable where also the administration
is simplified so that the system is quickly adapted to the current situation in the
network.
Acknowledgments
SANA is currently implemented at the University of Luxembourg in the Faculty
of Science, Technology, and Communication. We thank Ulrich Sorger, Zdzislaw
Suchanecki, and Foued Melakessou from the University of Luxembourg for help-
ful discussions and the Ministre Luxembourgeois de l'education et de la recherche
for additional financial support.
References
1. CSI, FBI: 2004 computer crime and security survey (2004)
2. Scalet, S.D.:
on e-crime.
threads
Pullig
cso-magazine,
july
2005.
http://www.csoonline.com/info/ecrimesurvey05.pdf (05.06.2007)
3. Sean Convery, C.S.: Network Security Architectures. (Networking Technology).
Second edn. Macmillan Technical Publishing (2004)
4. Dhanjani, N., Clarke, J.: Network Security Tools. First edn. O'Reilly Media (2005)
5. Roesch, M.: Snort - lightweight intrusion detection for networks. LISA 13 (1999)
229 -- 238
6. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection
systems. Comput. Networks 31(9) (1999) 805 -- 822
7. Ferrie,
P.,
Szor,
P.:
Zmist
opportunities,
virus
bulletin,
http://pferrie.tripod.com/papers/zmist.pdf (March 2001)
8. Szor, P., Ferrie, P.: Hunting for metamorphic, symantec security response white pa-
per, http://www.symantec.com/avcenter/reference/hunting.for.metamorphic.pdf
(July 2000)
9. Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion
detection - a review. Proceedings of the 3rd International Conference on Artificial
Immune Systems (ICARIS 2004) (2004)
10. DeCastro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational
Intelligence Approach. First edn. Springer (2002)
11. Hofmeyr, S.A., Forrest, S.:
Immunity by design: An artificial immune system.
Proceedings of the Genetic and Evolutionary Computation Conference 2 (1999)
1289 -- 1296
12. Hofmeyr, S.A., Forrest, S.: Architecture for an artificial immune system. Evolu-
tionary Computation 8(4) (2000) 443 -- 473
13. Janeway, C.A., Travers, P., Walport, M., Shlomchik, M.:
Immunobiology: the
Immune System in Health and Disease. Sixth edn. Garland Publishing (2004)
14. Vargas, P.A., de Castro, L., von Zuben, F.: Artificial immune systems as complex
adaptive systems. In: Proceedings of the 1st International Conference on Artificial
Immune Systems (ICARIS). Volume 1. (2002) 115 -- 123
15. Hilker, M., Schommer, C.: Sana - security analysis in internet traffic through
artificial immune systems. Proceedings of the Trustworthy Software Workshop,
Saarbruecken, Germany (2006)
16. Mikusi, J.:
Open source anti-virus
for
the whole network: Clamav.
http://www.samag.com/documents/s=9464/sam0501a/0501a.htm (2005)
17. Ranum, M.J.: A network firewall. In: Proceedings of the First World Conference
on System Administration and Security, 5401 Westbard Ave. Suite 1501, Bethesda,
MD 20816, SANS Institute (1992)
18. McCanne, S., Jacobson, V.: The BSD packet filter: A new architecture for user-
level packet capture. In: USENIX Winter. (1993) 259 -- 270
19. Xinidis, K., Anagnostakis, K.G., Markatos, E.P.: Design and implementation of a
high-performance network intrusion prevention system. In: SEC, Springer (2005)
20. Duane DeCapite, C.S.: Self-Defending Networks. The Next Generation of Network
Security. First edn. Macmillan Technical Publishing (2006)
21. Bellifemine, F., Poggi, A., Rimassa, G.: JADE - a FIPA-compliant agent frame-
work. In: Proceedings of the Practical Applications of Intelligent Agents. (1999)
22. SWsoft:
Openvz
user's
guide,
version,
2.7.0-8,
link:
http://download.openvz.org/doc/openvz-users-guide.pdf. (23.05.2007)
23. Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious
mobile code. In: ACSAC '02: Proceedings of the 18th Annual Computer Security
Applications Conference, Washington, DC, USA, IEEE Computer Society (2002)
24. Williamson, M.M.: Design, implementation and test of an email virus throttle.
In: ACSAC '03: Proceedings of the 19th Annual Computer Security Applications
Conference, Washington, DC, USA, IEEE Computer Society (2003) 76
25. Neuhaus, S., Zeller, A.: Isolating intrusions by automatic experiments. In: Pro-
ceedings of the 13th Annual Network and Distributed System Security Symposium,
Reston, VA, USA, Internet Society (2006) 71 -- 80
26. Greensmith, J., Aickelin, U., Cayzer, S.:
Introducing dendritic cells as a novel
immune-inspired algorithm for anomaly detection. Proceedings of the 4th Inter-
national Conference on Artificial Immune Systems (ICARIS 2005) (2005)
27. Hilker, M., Schommer, C.: Agnosco - identification of infected nodes with artificial
ant colonies. Proceedings of RASC (2006)
28. Hilker, M., Schommer, C.: Description of bad-signatures for network intrusion
detection. AISW-NetSec 2006 during ACSW 2006, CRPIT 54 (2006)
29. Schroeder, B., Hilker, M., Weires, R.: Dynamic association networks in information
In: Proceedings of the 4th International Conference on Machine
management.
Learning and Data Analysis (MLDA 2007). (2007)
30. Aalst, W.M.P.v.d., Beisiegel, M., Hee, K.M.v., Konig, D., Stahl, C.: A SOA-
Based Architecture Framework. In Leymann, F., Reisig, W., Thatte, S.R., Aalst,
W.M.P.v.d., eds.: The Role of Business Processes in Service Oriented Architectures.
Number 06291 in Dagstuhl Seminar Proceedings (2006)
31. Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: The link
between ais and ids? In: Proceedings of the Second International Conference on
Artificial Immune Systems (ICARIS 2003). LNCS 2787, pp. 147-155, Edinburgh,
UK (2003)
32. Matzinger, P.: The danger model a renewed sense of self. Science 296(5566) (2002)
301 -- 305
33. Schaelicke, L., Freeland, J.C.: Characterizing sources and remedies for packet
In: Proceedings of the 2005 IEEE
loss in network intrusion detection systems.
International Symposium on Workload Characterization, IEEE CS Press (2005)
188 -- 196
|
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.