We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
José Alberto Fernández-Zepeda, Daniel Brubeck-Salcedo, Daniel Fajardo-Delgado, Héctor Zatarain-Aceves. A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem[J]. Journal of Computer Science and Technology, 2018, 33(4): 823-837. DOI: 10.1007/s11390-018-1858-8
Citation: José Alberto Fernández-Zepeda, Daniel Brubeck-Salcedo, Daniel Fajardo-Delgado, Héctor Zatarain-Aceves. A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem[J]. Journal of Computer Science and Technology, 2018, 33(4): 823-837. DOI: 10.1007/s11390-018-1858-8

A Two-Player Coalition Cooperative Scheme for the Bodyguard Allocation Problem

Funds: This work was partially supported by National Council of Science and Technology (CONACyT) of Mexico under Grant No. 231224, the Program for Professional Teacher Development (PRODEP) of Mexico under Grant No. ITCGUZ-PTC-004, and the National Institute of Technology of Mexico (TecNM) under Grant No. 6307.17-P.
More Information
  • Author Bio:

    José Alberto Fernández-Zepeda: José Alberto Fernández-Zepeda received his B.Sc. and M.Sc. degrees in electronics from the National Autonomous University of Mexico (UNAM) in 1991 and 1994, respectively, and his Ph.D. degree in computer engineering from Louisiana State University in 1999. Since 2000, he is an associate professor in the Department of Computer Science at Center for Scientific Research and Higher Education of Ensenada (CICESE), Ensenada. His research interests include analysis and design of parallel and distributed algorithms and software process improvement in small organizations.

  • Received Date: April 26, 2017
  • Revised Date: April 26, 2017
  • Published Date: July 04, 2018
  • We address the bodyguard allocation problem (BAP), an optimization problem that illustrates the conflict of interest between two classes of processes with contradictory preferences within a distributed system. While a class of processes prefers to minimize its distance to a particular process called the root, the other class prefers to maximize it; at the same time, all the processes seek to build a communication spanning tree with the maximum social welfare. The two state-of-the-art algorithms for this problem always guarantee the generation of a spanning tree that satisfies a condition of Nash equilibrium in the system; however, such a tree does not necessarily produce the maximum social welfare. In this paper, we propose a two-player coalition cooperative scheme for BAP, which allows some processes to perturb or break a Nash equilibrium to find another one with a better social welfare. By using this cooperative scheme, we propose a new algorithm called FFC-BAPS for BAP. We present both theoretical and empirical analyses which show that this algorithm produces better quality approximate solutions than former algorithms for BAP.
  • [1]
    Tanenbaum A S, van Steen M. Distributed Systems:Principles and Paradigms (2nd edition). Prentice-Hall, Inc., 2006.
    [2]
    Nisan N, Roughgarden T, Tardos E, Vazirani V V. Algo?ithmic Game Theory. Cambridge University Press, 2007.
    [3]
    Halpern J Y. Beyond Nash equilibrium:Solution concepts for the 21st century. In Proc. the 27th ACM Symp. Principles of Distributed Computing, August 2008.
    [4]
    Manshaei M H, Zhu Q Y, Alpcan T, Baçsar T, Hubaux J P. Game theory meets network security and privacy. ACM Computing Surveys, 2013, 45(3):Article No. 25.
    [5]
    Feldman M, Lai K, Stoica I, Chuang J. Robust incentive techniques for peer-to-peer networks. In Proc. the 5th ACM Conf. Electronic Commerce, May 2004, pp.102-111.
    [6]
    Feldman M, Papadimitriou C, Chuang J, Stoica I. Freeriding and whitewashing in peer-to-peer systems. IEEE Journal on Selected Areas in Communications, 2006, 24(5):1010-1019.
    [7]
    Roughgarden T. Selfish Routing and the Price of Anarchy. The MIT Press, 2005.
    [8]
    Koutsoupias E, Papadimitriou C. Worst-case equilibria. Computer Science Review, 2009, 3(2):65-69.
    [9]
    von Neumann J, Morgenstern O. Theory of Games and Economic Behavior. Princeton University Press, 2007.
    [10]
    Fajardo-Delgado D, Fernández-Zepeda J A, Bourgeois A G. The bodyguard allocation problem. IEEE Trans. Parallel and Distributed Systems, 2013, 24(7):1465-1478.
    [11]
    Nash J F Jr. Equilibrium points in n-person games. Proceedings of the National Academy of Sciences of the United States of America, 1950, 36(1):48-49.
    [12]
    Dasgupta A, Ghosh S, Tixeuil S. Selfish stabilization. In Stabilization, Safety, and Security of Distributed Systems, Datta A K, Datta M (eds.), Springer, 2006, pp.231-243.
    [13]
    Cohen J, Dasgupta A, Ghosh S, Tixeuil S. An exercise in selfish stabilization. ACM Trans. Autonomous and Adaptive Systems, 2008, 3(4):Article No. 15.
    [14]
    Zatarain-Aceves H, Fernández-Zepeda J A, Brizuela C A, Fajardo-Delgado D. A cascade evolutionary algorithm for the bodyguard allocation problem. Applied Soft Computing, 2015, 37:643-651.
    [15]
    Raidl G R, Julstrom B A. Edge sets:An effective evolutionary coding of spanning trees. IEEE Trans. Evolutionary Computation, 2003, 7(3):225-239.
    [16]
    Barabási A L, Albert R. Emergence of scaling in random networks. Science, 1999, 286(5439):509-512.
    [17]
    Erdös P, Rényi A. On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci., 1960, 5:17-61.
    [18]
    Kumar R, Raghavan P, Rajagopalan S, Sivakumar D, Tomkins A, Upfal E. Stochastic models for the web graph. In Proc. the 41st Annual Symp. Foundations of Computer Science, November 2000, pp.57-65.
    [19]
    Schulz A S, Moses N S. On the performance of user equilibria in traffic networks. In Proc. the 14th Annual ACMSIAM Symp. Discrete Algorithms, January 2003, pp.86-87.
    [20]
    Anshelevich E, Dasgupta A, Kleinberg J, Tardos E, Wexler T, Roughgarden T. The price of stability for network design with fair cost allocation. In Proc. the 45th Annual IEEE Symp. Foundations of Computer Science, October 2004, pp.295-304.
    [21]
    Blum C, Roli A. Metaheuristics in combinatorial optimization:Overview and conceptual comparison. ACM Computing Surveys, 2003, 35(3):268-308.
    [22]
    Eiben A E, Jelasity M. A critical note on experimental research methodology in EC. In Proc. Congress on Evolutionary Computation, May 2002, pp.582-587.
    [23]
    Crepinšek M, Liu S H, Mernik M. Replication and compa?ison of computational experiments in applied evolutionary computing:Common pitfalls and guidelines to avoid them. Applied Soft Computing, 2014, 19:161-170.
    [24]
    Lilliefors H W. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. Journal of the American Statistical Association, 1967, 62(318):399-402.
    [25]
    Conover W J. Practical Nonparametric Statistics. Wiley Series in Probability and Statistics, John Wiley & Sons, 1980.
  • Related Articles

    [1]En Wang, Han Wang, Peng-Min Dong, Yuan-Bo Xu, Yong-Jian Yang. Distributed Game-Theoretical D2D-Enabled Task Offloading in Mobile Edge Computing[J]. Journal of Computer Science and Technology, 2022, 37(4): 919-941. DOI: 10.1007/s11390-022-2063-3
    [2]Yang Liu, Guo-Fu Zhang, Zhao-Pin Su, Feng Yue, Jian-Guo Jiang. Using Computational Intelligence Algorithms to Solve the Coalition Structure Generation Problem in Coalitional Skill Games[J]. Journal of Computer Science and Technology, 2016, 31(6): 1136-1150. DOI: 10.1007/s11390-016-1688-5
    [3]Pin-Yan Lu, Chang-Yuan Yu. Worst-Case Nash Equilibria in Restricted Routing[J]. Journal of Computer Science and Technology, 2012, 27(4): 710-717. DOI: 10.1007/s11390-012-1257-5
    [4]Ya-Feng Wu, Yin-Long Xu, Guo-Liang Chen. Approximation Algorithms for Steiner Connected Dominating Set[J]. Journal of Computer Science and Technology, 2005, 20(5): 713-716.
    [5]WAN Yingyu, XU Yinlong, GU Xiaodong, CHEN Guoliang. Efficient Minimum Spanning Tree Algorithms on the Reconfigurable Mesh[J]. Journal of Computer Science and Technology, 2000, 15(2): 116-125.
    [6]Ma Jun, Ma Shaohan. An O(k~2n~2) Algorithm to Find a k-Partition in a k-Connected Graph[J]. Journal of Computer Science and Technology, 1994, 9(1): 86-91.
    [7]Ma Jun, Ma Shaohan. Efficient Parallel Algorithms for Some Graph Theory Problems[J]. Journal of Computer Science and Technology, 1993, 8(4): 76-80.
    [8]Li Tianzhu. A Study of Optimization and Rule/Goal Graph for a Logical Query[J]. Journal of Computer Science and Technology, 1992, 7(4): 356-362.
    [9]Chen Fang, Shi Baile. A Conservative Multiversion Locking-Graph Scheduler Algorithm[J]. Journal of Computer Science and Technology, 1991, 6(2): 161-166.
    [10]Li Hao, Liu Qun. A Problem of Tree Graph[J]. Journal of Computer Science and Technology, 1989, 4(1): 61-66.

Catalog

    Article views (34) PDF downloads (2462) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return