concentrated on fundamental benchmark problems.
Applying the proposed approach with more scalable
solution methods to practical resource allocation and
collaboration problems will be a goal of future study.
6 CONCLUSION
In this study, we addressed a negotiation framework
based on asymmetric constraint optimization prob-
lems, where agents iteratively publish utility values
of their constraints and solve the problem with pub-
lished utility values. We studied applying a decentral-
ized complete solution method to solve both phases in
each negotiation round. The proposed approach em-
ploys two solution methods based on pseudo-trees to
select utility values to be published and to solve the
problem with the published utility values. As our first
investigation, we evaluated the criterion of the dedi-
cated optimization problems and aggregation opera-
tors, and demonstrated is influence and effect.
Since we employed a complete solution method
based on pseudo-trees, the scalability for complex
problems is limited. A focus of our future work
will be decentralized solution methods for large scale
problems in practical domains. Improvement of the
proposed criterion and termination condition consid-
ering agreement among agents with dedicated pricing
of privacy and utility will also be included our future
work.
ACKNOWLEDGEMENTS
This work was supported in part by JSPS KAKENHI
Grant Number JP19K12117.
REFERENCES
Fioretto, F., Pontelli, E., and Yeoh, W. (2018). Distributed
constraint optimization problems and applications: A
survey. Journal of Artificial Intelligence Research,
61:623–698.
Grinshpoun, T., Grubshtein, A., Zivan, R., Netzer, A., and
Meisels, A. (2013). Asymmetric distributed constraint
optimization problems. Journal of Artificial Intelli-
gence Research, 47:613–647.
Grinshpoun, T. and Tassa, T. (2016). P-syncbb: A privacy
preserving branch and bound dcop algorithm. J. Artif.
Int. Res., 57(1):621–660.
Kexing, L. (2011). A survey of agent based automated ne-
gotiation. In 2011 International Conference on Net-
work Computing and Information Security, volume 2,
pages 24–27.
L
´
eaut
´
e, T. and Faltings, B. (2013). Protecting privacy
through distributed computation in multi-agent deci-
sion making. Journal of Artificial Intelligence Re-
search, 47(1):649–695.
Marler, R. T. and Arora, J. S. (2004). Survey of
multi-objective optimization methods for engineer-
ing. Structural and Multidisciplinary Optimization,
26:369–395.
Matsui, T. (2019). A study of cooperation with privacy loss
based on asymmetric constraint optimization problem
among agents. In 3rd International Conference on Ad-
vances in Artificial Intelligence, pages 127–134.
Matsui, T., Matsuo, H., Silaghi, M., Hirayama, K., and
Yokoo, M. (2018a). Leximin asymmetric multiple
objective distributed constraint optimization problem.
Computational Intelligence, 34(1):49–84.
Matsui, T., Silaghi, M., Okimoto, T., Hirayama, K., Yokoo,
M., and Matsuo, H. (2018b). Leximin multiple objec-
tive dcops on factor graphs for preferences of agents.
Fundam. Inform., 158(1-3):63–91.
Petcu, A. and Faltings, B. (2005). A scalable method
for multiagent constraint optimization. In 19th In-
ternational Joint Conference on Artificial Intelligence,
pages 266–271.
Petcu, A., Faltings, B., and Parkes, D. C. (2008). M-DPOP:
Faithful distributed implementation of efficient social
choice problems. Journal of Artificial Intelligence Re-
search, 32:705–755.
Sen, A. K. (1997). Choice, Welfare and Measurement. Har-
vard University Press.
Tassa, T., Grinshpoun, T., and Yanay, A. (2019). A Pri-
vacy Preserving Collusion Secure DCOP Algorithm.
In 28th International Joint Conference on Artificial In-
telligence, pages 4774–4780.
Tassa, T., Grinshpoun, T., and Zivan, R. (2017). Privacy
preserving implementation of the max-sum algorithm
and its variants. J. Artif. Int. Res., 59(1):311–349.
Yeoh, W. and Yokoo, M. (2012). Distributed problem solv-
ing. AI Magazine, 33(3):53–65.
A Study on Negotiation for Revealed Information with Decentralized Asymmetric Multi-objective Constraint Optimization
159