Pseudo-tree construction heuristics for dcops and evaluations on the ns-2 network simulator

  • Atena M. Tabakhi
  • , Reza Tourani
  • , Francisco Natividad
  • , William Yeoh
  • , Satyajayant Misra

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

Distributed Constraint Optimization Problems (DCOPs) are commonly used to model multi-Agent coordination problems. However, empirical evaluations of DCOP algorithms are typically done in simulation under the assumption that the communication times between all pairs of agents are identical, which is unrealistic in many real-world applications. In this paper, we investigate the impact of empirically evaluating a DCOP algorithm under the assumption that communication times between pairs of agents can vary and propose the use of ns-2, a de-facto simulator used by the computer networking community, to simulate the communication times. Additionally, we introduce heuristics that exploit the non-uniform communication times to speed up DCOP algorithms that operate on pseudo-Trees.

Original languageEnglish
Title of host publicationProceedings - 2017 International Conference on Tools with Artificial Intelligence, ICTAI 2017
PublisherIEEE Computer Society
Pages1105-1112
Number of pages8
ISBN (Electronic)9781538638767
DOIs
StatePublished - Jul 2 2017
Event29th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2017 - Boston, United States
Duration: Nov 6 2017Nov 8 2017

Publication series

NameProceedings - International Conference on Tools with Artificial Intelligence, ICTAI
Volume2017-November
ISSN (Print)1082-3409

Conference

Conference29th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2017
Country/TerritoryUnited States
CityBoston
Period11/6/1711/8/17

Keywords

  • Communication times
  • Customer Driven Micro Grids
  • DCOPs
  • DPOP
  • NS 2 simulator
  • Pseudo tree

Fingerprint

Dive into the research topics of 'Pseudo-tree construction heuristics for dcops and evaluations on the ns-2 network simulator'. Together they form a unique fingerprint.

Cite this