Skip to main content
Erschienen in: Autonomous Agents and Multi-Agent Systems 5/2018

10.05.2018

A new distributed algorithm for efficient generalized arc-consistency propagation

verfasst von: Shufeng Kong, Jae Hee Lee, Sanjiang Li

Erschienen in: Autonomous Agents and Multi-Agent Systems | Ausgabe 5/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Generalized arc-consistency propagation is predominantly used in constraint solvers to efficiently prune the search space when solving constraint satisfaction problems. Although many practical applications can be modelled as distributed constraint satisfaction problems, no distributed arc-consistency algorithms so far have considered the privacy of individual agents. In this paper, we propose a new distributed arc-consistency algorithm, called \(\mathsf {DisAC3.1}\), which leaks less private information of agents than existing distributed arc-consistency algorithms. In particular, \(\mathsf {DisAC3.1}\) uses a novel termination determination mechanism, which allows the agents to share domains, constraints and communication addresses only with relevant agents. We further extend \(\mathsf {DisAC3.1}\) to \(\mathsf {DisGAC3.1}\), which is the first distributed algorithm that enforces generalized arc-consistency on k-ary (\(k\ge 2\)) constraint satisfaction problems. Theoretical analyses show that our algorithms are efficient in both time and space. Experiments also demonstrate that \(\mathsf {DisAC3.1}\) outperforms the state-of-the-art distributed arc-consistency algorithm and that \(\mathsf {DisGAC3.1}\) ’s performance scales linearly in the number of agents.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
The address of an agent, as defined in [54], represents the unique identity of the agent in the agent communication graph.
 
2
Although not explicitly stated in [21], \(\mathsf {DisAC9}\) implicitly assumes a complete agent communication graph, as it uses the distributed snapshot algorithm [8, 44].
 
3
This technique was first introduced in [21].
 
4
Note that the sender’s “id” remains in the forwarded message, but this “id” does not need to be the real id of the sender, it can be a code name (cf. [30]), e.g., a randomly generated character string. In this case, two neighbours need to exchange their code names with each other before running the algorithm.
 
5
This is because when several messages from agent i are received, the “up to date” message will only bear the timestamp of the latest one.
 
6
Here by ‘modulo semi-private information’, we mean that we do not consider leak of semi-private information as privacy loss.
 
7
In this paper, unless otherwise stated, \(\mathsf {DisAC3.1}\) always refers to the original Algorithm 2.
 
8
In this paper, unless otherwise stated, \(\mathsf {DisGAC3.1}\) always refers to the original Algorithm 4.
 
9
Note that these two measures do not reflect the cost of the echo algorithm used in our distributed algorithms. However, since the number of agents are relatively small comparing to the number of variables of the input and the time complexity of the echo algorithm is only \(O({\hat{D}})\), where \({\hat{D}} \le p \le n\) is the diameter of the standard agent communication graph, the cost of the echo algorithm is negligible.
 
10
Note that Lai and Wu’s algorithm assumes fully-connected agent communication graphs, and every agent knows the identifications of all agents in the system.
 
11
Note that we do not compare #NCCCs between the modified \(\mathsf {DisAC3.1}\) and \(\mathsf {DisAC3.1}\), as termination detector is superimposed on the underling computation, i.e., it cannot intervene in the underling computation [15] and thus does not affect #NCCCs.
 
14
In this experiment, we measured the performance of the algorithm using the simulated time metric [49] where message latency is simulated by a random time from 0–10ms per message.
 
Literatur
1.
Zurück zum Zitat Awerbuch, B., & Gallager, R. (1987). A new distributed algorithm to find breadth first search trees. IEEE Transactions on Information Theory, 33(3), 315–322.MATHCrossRef Awerbuch, B., & Gallager, R. (1987). A new distributed algorithm to find breadth first search trees. IEEE Transactions on Information Theory, 33(3), 315–322.MATHCrossRef
2.
Zurück zum Zitat Baudot, B., & Deville, Y. (1997). Analysis of distributed arc-consistency algorithms. Technical report, Université catholique de Louvain. Baudot, B., & Deville, Y. (1997). Analysis of distributed arc-consistency algorithms. Technical report, Université catholique de Louvain.
3.
4.
Zurück zum Zitat Bessiere, C., Freuder, E. C., & Régin, J. C. (1999). Using constraint metaknowledge to reduce arc consistency computation. Artificial Intelligence, 107(1), 125–148.MathSciNetMATHCrossRef Bessiere, C., Freuder, E. C., & Régin, J. C. (1999). Using constraint metaknowledge to reduce arc consistency computation. Artificial Intelligence, 107(1), 125–148.MathSciNetMATHCrossRef
5.
Zurück zum Zitat Bessiere, C., Régin, J. C., Yap, R. H., & Zhang, Y. (2005). An optimal coarse-grained arc consistency algorithm. Artificial Intelligence, 165(2), 165–185.MathSciNetMATHCrossRef Bessiere, C., Régin, J. C., Yap, R. H., & Zhang, Y. (2005). An optimal coarse-grained arc consistency algorithm. Artificial Intelligence, 165(2), 165–185.MathSciNetMATHCrossRef
6.
Zurück zum Zitat Boerkoel, J. C, Jr., & Durfee, E. H. (2013). Distributed reasoning for multiagent simple temporal problems. Journal of Artificial Intelligence Research, 47, 95–156.MathSciNetMATHCrossRef Boerkoel, J. C, Jr., & Durfee, E. H. (2013). Distributed reasoning for multiagent simple temporal problems. Journal of Artificial Intelligence Research, 47, 95–156.MathSciNetMATHCrossRef
7.
Zurück zum Zitat Chandy, K. M., & Misra, J. (1985). A paradigm for detecting quiescent properties in distributed computations. In K. R. Apt (Ed.), Logics and models of concurrent systems (pp. 325–341). New York: Springer.CrossRef Chandy, K. M., & Misra, J. (1985). A paradigm for detecting quiescent properties in distributed computations. In K. R. Apt (Ed.), Logics and models of concurrent systems (pp. 325–341). New York: Springer.CrossRef
8.
Zurück zum Zitat Chandy, K. M., & Lamport, L. (1985). Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems (TOCS), 3(1), 63–75.CrossRef Chandy, K. M., & Lamport, L. (1985). Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems (TOCS), 3(1), 63–75.CrossRef
9.
Zurück zum Zitat Chandy, K. M., & Misra, J. (1986). How processes learn. Distributed Computing, 1(1), 40–52.MATHCrossRef Chandy, K. M., & Misra, J. (1986). How processes learn. Distributed Computing, 1(1), 40–52.MATHCrossRef
10.
Zurück zum Zitat Chang, E. J. H. (1982). Echo algorithms: Depth parallel operations on general graphs. IEEE Transactions on Software Engineering, SE–8(4), 391–401.CrossRef Chang, E. J. H. (1982). Echo algorithms: Depth parallel operations on general graphs. IEEE Transactions on Software Engineering, SE–8(4), 391–401.CrossRef
11.
Zurück zum Zitat Conry, S. E., Kuwabara, K., Lesser, V. R., & Meyer, R. A. (1991). Multistage negotiation for distributed constraint satisfaction. IEEE Transactions on Systems, Man, and Cybernetics, 21(6), 1462–1477.MATHCrossRef Conry, S. E., Kuwabara, K., Lesser, V. R., & Meyer, R. A. (1991). Multistage negotiation for distributed constraint satisfaction. IEEE Transactions on Systems, Man, and Cybernetics, 21(6), 1462–1477.MATHCrossRef
12.
Zurück zum Zitat Cooper, P. R., & Swain, M. J. (1992). Arc consistency: Parallelism and domain dependence. Artificial Intelligence, 58(1–3), 207–235.MathSciNetCrossRef Cooper, P. R., & Swain, M. J. (1992). Arc consistency: Parallelism and domain dependence. Artificial Intelligence, 58(1–3), 207–235.MathSciNetCrossRef
13.
15.
Zurück zum Zitat Dijkstra, E. W., & Scholten, C. S. (1980). Termination detection for diffusing computations. Information Processing Letters, 11(1), 1–4.MathSciNetMATHCrossRef Dijkstra, E. W., & Scholten, C. S. (1980). Termination detection for diffusing computations. Information Processing Letters, 11(1), 1–4.MathSciNetMATHCrossRef
16.
Zurück zum Zitat Eriksen, O, & Skyum, S. (1985). Symmetric distributed termination. DAIMI report series 14(189). Eriksen, O, & Skyum, S. (1985). Symmetric distributed termination. DAIMI report series 14(189).
17.
Zurück zum Zitat Faltings, B., Léauté, T., & Petcu, A. (2008). Privacy guarantees through distributed constraint satisfaction. In 2008 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology (Vol. 2, pp. 350–358). Faltings, B., Léauté, T., & Petcu, A. (2008). Privacy guarantees through distributed constraint satisfaction. In 2008 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology (Vol. 2, pp. 350–358).
18.
Zurück zum Zitat Grinshpoun, T. (2012). When you say (DCOP) privacy, what do you mean?—Categorization of DCOP privacy and insights on internal constraint privacy. In: J. Filipe, A. L. N. Fred (Eds.), ICAART 2012—Proceedings of the 4th international conference on agents and artificial intelligence (Vol. 1, pp. 380–386)—Artificial Intelligence, Vilamoura, Algarve, Portugal, 6–8 February, 2012. SciTePress. Grinshpoun, T. (2012). When you say (DCOP) privacy, what do you mean?—Categorization of DCOP privacy and insights on internal constraint privacy. In: J. Filipe, A. L. N. Fred (Eds.), ICAART 2012—Proceedings of the 4th international conference on agents and artificial intelligence (Vol. 1, pp. 380–386)—Artificial Intelligence, Vilamoura, Algarve, Portugal, 6–8 February, 2012. SciTePress.
19.
Zurück zum Zitat Grinshpoun, T., & Tassa, T. (2016). P-syncbb: A privacy preserving branch and bound dcop algorithm. Journal of Artificial Intelligence Research, 57(1), 621–660.MathSciNetMATHCrossRef Grinshpoun, T., & Tassa, T. (2016). P-syncbb: A privacy preserving branch and bound dcop algorithm. Journal of Artificial Intelligence Research, 57(1), 621–660.MathSciNetMATHCrossRef
20.
Zurück zum Zitat Gu, J., Sosic, R. (1991). A parallel architecture for constraint satisfaction. In: International conference on industrial and engineering applications of artificial intelligence and expert systems (pp. 229–237). Gu, J., Sosic, R. (1991). A parallel architecture for constraint satisfaction. In: International conference on industrial and engineering applications of artificial intelligence and expert systems (pp. 229–237).
22.
Zurück zum Zitat Hassine, A. B., & Ghedira, K. (2002). How to establish arc-consistency by reactive agents. In Proceedings of the 15th European conference on artificial intelligence (pp. 156–160). Hassine, A. B., & Ghedira, K. (2002). How to establish arc-consistency by reactive agents. In Proceedings of the 15th European conference on artificial intelligence (pp. 156–160).
23.
Zurück zum Zitat Hassine, A. B., Ghedira, K., & Ho, T. B. (2004). New distributed filtering-consistency approach to general networks. In Proceedings of the 17th international conference on industrial and engineering applications of artificial intelligence and expert systems (pp. 708–717). Hassine, A. B., Ghedira, K., & Ho, T. B. (2004). New distributed filtering-consistency approach to general networks. In Proceedings of the 17th international conference on industrial and engineering applications of artificial intelligence and expert systems (pp. 708–717).
24.
Zurück zum Zitat Huang, S. T. (1989). Detecting termination of distributed computations by external agents. In Proceedings of the 9th international conference on distributed computing systems (pp. 79–84). Huang, S. T. (1989). Detecting termination of distributed computations by external agents. In Proceedings of the 9th international conference on distributed computing systems (pp. 79–84).
25.
Zurück zum Zitat Hubbe, P. D., & Freuder, E. C. (1992). An efficient cross product representation of the constraint satisfaction problem search space. In Proceedings of the tenth national conference on artificial intelligence (pp. 421–427). Hubbe, P. D., & Freuder, E. C. (1992). An efficient cross product representation of the constraint satisfaction problem search space. In Proceedings of the tenth national conference on artificial intelligence (pp. 421–427).
26.
Zurück zum Zitat Huffman, D. A. (1971). Impossible objects as nonsense sentences. Machine Intelligence, 6(1), 295–323. Huffman, D. A. (1971). Impossible objects as nonsense sentences. Machine Intelligence, 6(1), 295–323.
27.
Zurück zum Zitat Huhns, M. N., & Bridgeland, D. M. (1991). Multiagent truth maintenance. IEEE Transactions on Systems, Man, and Cybernetics, 21(6), 1437–1445.CrossRef Huhns, M. N., & Bridgeland, D. M. (1991). Multiagent truth maintenance. IEEE Transactions on Systems, Man, and Cybernetics, 21(6), 1437–1445.CrossRef
28.
Zurück zum Zitat Kong, S., Lee, J. H., & Li, S. (2018). Multiagent simple temporal problem: The Arc-consistency approach. In Thirty-Second AAAI Conference on Artificial Intelligence, AAAI’18. AAAI Press. Kong, S., Lee, J. H., & Li, S. (2018). Multiagent simple temporal problem: The Arc-consistency approach. In Thirty-Second AAAI Conference on Artificial Intelligence, AAAI’18. AAAI Press.
29.
Zurück zum Zitat Lai, T. H., & Wu, L. F. (1995). An (n -1)-resilient algorithm for distributed termination detection. IEEE Transactions on Parallel and Distributed Systems, 6(1), 63–78.CrossRef Lai, T. H., & Wu, L. F. (1995). An (n -1)-resilient algorithm for distributed termination detection. IEEE Transactions on Parallel and Distributed Systems, 6(1), 63–78.CrossRef
30.
Zurück zum Zitat Léauté, T., & Faltings, B. (2013). Protecting privacy through distributed computation in multi-agent decision making. Journal of Artificial Intelligence Research, 47, 649–695.MathSciNetMATHCrossRef Léauté, T., & Faltings, B. (2013). Protecting privacy through distributed computation in multi-agent decision making. Journal of Artificial Intelligence Research, 47, 649–695.MathSciNetMATHCrossRef
31.
Zurück zum Zitat Li, S., Liu, W., & Wang, S. (2013). Qualitative constraint satisfaction problems: An extended framework with landmarks. Artificial Intelligence, 201, 32–58.MathSciNetMATHCrossRef Li, S., Liu, W., & Wang, S. (2013). Qualitative constraint satisfaction problems: An extended framework with landmarks. Artificial Intelligence, 201, 32–58.MathSciNetMATHCrossRef
32.
Zurück zum Zitat Lynch, N. A. (1996). Distributed algorithms. Burlington: Morgan Kaufmann.MATH Lynch, N. A. (1996). Distributed algorithms. Burlington: Morgan Kaufmann.MATH
34.
Zurück zum Zitat Maheswaran, R. T., Pearce, J. P., Bowring, E., Varakantham, P., & Tambe, M. (2006). Privacy loss in distributed constraint reasoning: A quantitative framework for analysis and its applications. Autonomous Agents and Multi-Agent Systems, 13(1), 27–60.CrossRef Maheswaran, R. T., Pearce, J. P., Bowring, E., Varakantham, P., & Tambe, M. (2006). Privacy loss in distributed constraint reasoning: A quantitative framework for analysis and its applications. Autonomous Agents and Multi-Agent Systems, 13(1), 27–60.CrossRef
35.
Zurück zum Zitat Maruyama, H. (1990). Structural disambiguation with constraint propagation. In ACL (pp. 31–38). Maruyama, H. (1990). Structural disambiguation with constraint propagation. In ACL (pp. 31–38).
36.
Zurück zum Zitat Mason, C. L., & Johnson, R. R. (1988). Datms: A framework for distributed assumption based reasoning. Technical report, Lawrence Livermore National Lab., CA (USA). Mason, C. L., & Johnson, R. R. (1988). Datms: A framework for distributed assumption based reasoning. Technical report, Lawrence Livermore National Lab., CA (USA).
37.
Zurück zum Zitat Matocha, J., & Camp, T. (1998). A taxonomy of distributed termination detection algorithms. Journal of Systems and Software, 43(3), 207–221.CrossRef Matocha, J., & Camp, T. (1998). A taxonomy of distributed termination detection algorithms. Journal of Systems and Software, 43(3), 207–221.CrossRef
38.
Zurück zum Zitat Mattern, F. (1987). Algorithms for distributed termination detection. Distributed Computing, 2(3), 161–175.CrossRef Mattern, F. (1987). Algorithms for distributed termination detection. Distributed Computing, 2(3), 161–175.CrossRef
39.
Zurück zum Zitat Mayo, J., & Kearns, P. (1994). Distributed termination detection with roughly synchronized clocks. Information Processing Letters, 52(2), 105–108.CrossRef Mayo, J., & Kearns, P. (1994). Distributed termination detection with roughly synchronized clocks. Information Processing Letters, 52(2), 105–108.CrossRef
41.
Zurück zum Zitat Mohr, R., & Henderson, T. C. (1986). Arc and path consistency revisited. Artificial Intelligence, 28(2), 225–233.CrossRef Mohr, R., & Henderson, T. C. (1986). Arc and path consistency revisited. Artificial Intelligence, 28(2), 225–233.CrossRef
42.
Zurück zum Zitat Montanari, U. (1974). Networks of constraints: Fundamental properties and applications to picture processing. Information Sciences, 7, 95–132.MathSciNetMATHCrossRef Montanari, U. (1974). Networks of constraints: Fundamental properties and applications to picture processing. Information Sciences, 7, 95–132.MathSciNetMATHCrossRef
43.
Zurück zum Zitat Nguyen, T., & Deville, Y. (1998). A distributed arc-consistency algorithm. Science of Computer Programming, 30(1–2), 227–250.MathSciNetMATHCrossRef Nguyen, T., & Deville, Y. (1998). A distributed arc-consistency algorithm. Science of Computer Programming, 30(1–2), 227–250.MathSciNetMATHCrossRef
44.
Zurück zum Zitat Raynal, M. (2013). Distributed termination detection. In Distributed algorithms for message-passing systems (pp. 367–399). Berlin: Springer. Raynal, M. (2013). Distributed termination detection. In Distributed algorithms for message-passing systems (pp. 367–399). Berlin: Springer.
45.
Zurück zum Zitat Samal, A., & Henderson, T. (1987). Parallel consistent labeling algorithms. International Journal of Parallel Programming, 16(5), 341–364.MathSciNetMATHCrossRef Samal, A., & Henderson, T. (1987). Parallel consistent labeling algorithms. International Journal of Parallel Programming, 16(5), 341–364.MathSciNetMATHCrossRef
46.
Zurück zum Zitat Savaux, J., Vion, J., Piechowiak, S., Mandiau, R., Matsui, T., Hirayama, K., Yokoo, M., Elmane, S., & Silaghi, M. (2016). DisCSPs with privacy recast as planning problems for self-interested agents. In 2016 IEEE/WIC/ACM international conference on web intelligence (WI) (pp. 359–366). Savaux, J., Vion, J., Piechowiak, S., Mandiau, R., Matsui, T., Hirayama, K., Yokoo, M., Elmane, S., & Silaghi, M. (2016). DisCSPs with privacy recast as planning problems for self-interested agents. In 2016 IEEE/WIC/ACM international conference on web intelligence (WI) (pp. 359–366).
47.
Zurück zum Zitat Shavit, N., & Francez, N. (1986) A new approach to detection of locally indicative stability. In International colloquium on automata, languages, and programming (pp. 344–358). Springer. Shavit, N., & Francez, N. (1986) A new approach to detection of locally indicative stability. In International colloquium on automata, languages, and programming (pp. 344–358). Springer.
48.
Zurück zum Zitat Silaghi, M. (2002). A comparison of distributed constraint satisfaction approaches with respect to privacy. In In DCR. Citeseer. Silaghi, M. (2002). A comparison of distributed constraint satisfaction approaches with respect to privacy. In In DCR. Citeseer.
49.
Zurück zum Zitat Sultanik, E. A., Lass, R. N., & Regli, W .C. (2007). Dcopolis: A framework for simulating and deploying distributed constraint optimization algorithms. In Proceedings of the workshop on distributed constraint reasoning. Sultanik, E. A., Lass, R. N., & Regli, W .C. (2007). Dcopolis: A framework for simulating and deploying distributed constraint optimization algorithms. In Proceedings of the workshop on distributed constraint reasoning.
50.
Zurück zum Zitat Sycara, K., Roth, S. F., Sadeh, N., & Fox, M. S. (1991). Distributed constrained heuristic search. IEEE Transactions on Systems, Man, and Cybernetics, 21(6), 1446–1461.CrossRef Sycara, K., Roth, S. F., Sadeh, N., & Fox, M. S. (1991). Distributed constrained heuristic search. IEEE Transactions on Systems, Man, and Cybernetics, 21(6), 1446–1461.CrossRef
51.
Zurück zum Zitat Topor, R. W. (1984). Termination detection for distributed computations. Information Processing Letters, 18(1), 33–36.CrossRef Topor, R. W. (1984). Termination detection for distributed computations. Information Processing Letters, 18(1), 33–36.CrossRef
52.
Zurück zum Zitat Venkatesan, S. (1989). Reliable protocols for distributed termination detection. IEEE Transactions on Reliability, 38(1), 103–110.CrossRef Venkatesan, S. (1989). Reliable protocols for distributed termination detection. IEEE Transactions on Reliability, 38(1), 103–110.CrossRef
53.
Zurück zum Zitat Wallace, R. J., & Freuder, E. C. (2005). Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving. Artificial Intelligence, 161(1), 209–227.MathSciNetMATHCrossRef Wallace, R. J., & Freuder, E. C. (2005). Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving. Artificial Intelligence, 161(1), 209–227.MathSciNetMATHCrossRef
54.
Zurück zum Zitat Yokoo, M., Durfee, E. H., Ishida, T., & Kuwabara, K. (1998). The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and Data Engineering, 10(5), 673–685.CrossRef Yokoo, M., Durfee, E. H., Ishida, T., & Kuwabara, K. (1998). The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and Data Engineering, 10(5), 673–685.CrossRef
55.
Zurück zum Zitat Yokoo, M., & Hirayama, K. (2000). Algorithms for distributed constraint satisfaction: A review. Autonomous Agents and Multi-Agent Systems, 3(2), 185–207.CrossRef Yokoo, M., & Hirayama, K. (2000). Algorithms for distributed constraint satisfaction: A review. Autonomous Agents and Multi-Agent Systems, 3(2), 185–207.CrossRef
56.
Zurück zum Zitat Yokoo, M., Suzuki, K., & Hirayama, K. (2005). Secure distributed constraint satisfaction: Reaching agreement without revealing private information. Artificial Intelligence, 161(1), 229–245.MathSciNetMATHCrossRef Yokoo, M., Suzuki, K., & Hirayama, K. (2005). Secure distributed constraint satisfaction: Reaching agreement without revealing private information. Artificial Intelligence, 161(1), 229–245.MathSciNetMATHCrossRef
57.
Zurück zum Zitat Zhang, Y., & Mackworth, A. K. (1991). Parallel and distributed algorithms for finite constraint satisfaction problems. In Proceedings of the 3th IEEE symposium on parallel and distributed processing (pp. 394–397). Zhang, Y., & Mackworth, A. K. (1991). Parallel and distributed algorithms for finite constraint satisfaction problems. In Proceedings of the 3th IEEE symposium on parallel and distributed processing (pp. 394–397).
58.
Zurück zum Zitat Zhang, Y., & Yap, R. H. C. (2001). Making ac-3 an optimal algorithm. In Proceedings of the 17th international joint conference on artificial intelligence (pp. 316–321). Zhang, Y., & Yap, R. H. C. (2001). Making ac-3 an optimal algorithm. In Proceedings of the 17th international joint conference on artificial intelligence (pp. 316–321).
Metadaten
Titel
A new distributed algorithm for efficient generalized arc-consistency propagation
verfasst von
Shufeng Kong
Jae Hee Lee
Sanjiang Li
Publikationsdatum
10.05.2018
Verlag
Springer US
Erschienen in
Autonomous Agents and Multi-Agent Systems / Ausgabe 5/2018
Print ISSN: 1387-2532
Elektronische ISSN: 1573-7454
DOI
https://doi.org/10.1007/s10458-018-9388-x

Weitere Artikel der Ausgabe 5/2018

Autonomous Agents and Multi-Agent Systems 5/2018 Zur Ausgabe