A hybrid approach to solving coarse-grained DisCSPs.
Lee, David; Arana, Inés; Ahriz, Hatem; Hui, Kit-Ying
A coarse-grained Distributed Constraint Satisfaction Problem (DisCSP) consists of several loosely connected constraint satisfaction subproblems, each assigned to an individual agent. We present Multi-Hyb, a two-phase concurrent hybrid approach for solving DisCSPs. In the first phase, each agents subproblem is solved using systematic search which generates the key partial solutions to the global problem. Concurrently, a penalty-based local search algorithm attempts to find a global solution from these partial solutions. If phase 1 fails to find a solution, a phase 2 systematic search algorithm solves the problem using the knowledge gained from phase 1. We show that our approach is highly competitive in comparison with other coarse-grained DisCSP algorithms.
LEE, D., ARANA, I., AHRIZ, H. and HUI, K.-Y. 2009. A hybrid approach to solving coarse-grained DisCSPs. In Proceedings of the 8th International conference on autonomous agents and multiagent systems (AAMAS 2009), 10-15 May 2009, Budapest, Hungary. Richland, South Carolina: International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS) [online], pages 1235-1236. Available from: http://www.aamas-conference.org/Proceedings/aamas09/pdf/02_Extended_Abstract/C_SP_0555.pdf
|Conference Name||8th International conference on autonomous agents and multiagent systems (AAMAS 2009)|
|Start Date||May 10, 2009|
|End Date||May 15, 2009|
|Online Publication Date||Dec 31, 2009|
|Publication Date||Dec 31, 2009|
|Deposit Date||Jun 8, 2009|
|Publicly Available Date||Jun 8, 2009|
|Publisher||International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS)|
|Keywords||Artificial intelligence; Constraint satisfaction; Agent cooperation; Distributed problem solving|
LEE 2009 A hybrid approach
Publisher Licence URL
You might also like
Detection of false command and response injection attacks for cyber physical systems security and resilience.
Predicting permeability based on core analysis.
The use of machine learning algorithms for detecting advanced persistent threats.