簡易檢索 / 詳目顯示

研究生: 張功玉
Kung-Yu Chang
論文名稱: 透過信任第三者及聯盟代理人以避免勾結與欺騙之多代理人協商機制
Multi-agent Negotiation Mechanism Design for Collusion and Deception Avoidance Using a Trusted-Third-Party and Coalition Agents
指導教授: 蘇豐文
Von- Wun Soo
口試委員:
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊系統與應用研究所
Institute of Information Systems and Applications
畢業學年度: 91
語文別: 英文
論文頁數: 189
中文關鍵詞: 多代理人協商信任第三者聯盟代理人拍賣會勾結欺騙
外文關鍵詞: Multi-agent Negotiation, Trusted-Third-Party, Coalition Agents, Auction, Collusion, Deception
相關次數: 點閱:100下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

  • 本論文研究的主題是透過信任第三者及聯盟代理人的設計來避免多代理人協商過程中的勾結與欺騙。我們首先分析多代理人協商所面臨的問題,以及為何前人的研究無法克服此困境的癥結。論文中使用到許多對局論中的概念:優勢策略(Dominant Strategy),劣勢策略(Dominated Strategy),納許均衡(Nash Equilibrium),帕累脫效率(Pareto efficiency),無集體背離之納許均衡(Coalition-Proof Nash Equilibrium)。其後,我們提出了一套適用於各領域的多代理人協商機制,並且定義了該多代理人協商機制中包含了信任第三者、聯盟代理人以及協商協定;並說明了信任第三者、聯盟代理人所擔任的角色及工作。此篇論文提出「多回合密封標拍賣會」(Multi-round Sealed-bid Auction)的構想,以拍賣會模式作為多代理人協商機制中的協商協定;並設計兩套不同的得標價決定演算法。我們引入誘因機制設計的消去誘因原則以設計演算法I;而以直觀的人性心理角度設計演算法II的原型,並進一步引入「罰金」與「補償比例」的概念以期消去欺騙的誘因,成為論文中所列之演算法II。此篇論文細分協商中所可能發生的欺騙為「延遲式欺騙」(Deception of Delay)與「提前式欺騙」(Deception of Haste)兩種形式;並將多代理人協商中勾結的行為依「協商前的集體串謀」與「協商後的集體背離」兩種情況分別討論分析。論文最後以數學式證明演算法I和II分別達到了不同程度與不同形式的欺騙避免;並證明雖然此協商機制無法避免代理人間協商前的集體串謀,但是可以達到協商後無集體背離之納許均衡(Coalition-Proof Nash Equilibrium),並降低代理人間協商前的集體串謀所造成的傷害。最後我們給出一些定理及其證明。

    CHAPTER 1 INTRODUCTION 1 1.1. MOTIVATION 1 1.2. PROBLEM FORMULATION 2 1.3. RELATED WORK 3 1.4. ORGANIZATION OF THESIS 5 CHAPTER 2 PRELIMINARIES 7 2.1. BACKGROUND CONCEPTS IN GAME THEORY 7 Games in normal form 7 Payoff value 7 The dominant strategy 7 The dominated strategy 8 The Nash equilibrium 8 The Pareto-efficient 8 Pareto-dominant 9 The Strong Nash equilibrium 9 The Coalition-Proof Nash equilibrium 9 2.2. SCENARIOS OF COLLUSION AND DECEPTION IN N-PERSON NEGOTIATION GAMES 10 Scenarios of Deception in 2-person Negotiation Games 10 Scenarios of Coalition-proof 15 CHAPTER 3 DESIGN OF TTP-MEDIATED N-PERSON NEGOTIATION GAMES 16 3.1. FORMAL MODEL OF NEGOTIATION GAME 16 3.1.1. The Trusted Third Party Mediated Game 16 3.1.2. The Negotiation Mechanism 17 The Trusted Third Party 18 The Communication Actions 19 The Coalition Agents 20 The Negotiation Protocol 21 3.2. THE TTP N-PERSON NEGOTIATION PROCEDURES 22 3.2.1. Procedures and Sub-procedures in the General Negotiation 23 The General Negotiation Procedure 23 Sub-procedures of the General Negotiation Procedure 23 3.2.2. The Multi-round Sealed-bid Auction 27 Auction Rules 28 The Multi-round Sealed-bid Auction Procedure 32 CHAPTER 4 THEORETICAL ANALYSIS AND DISCUSSION 34 4.1. DERIVATION OF COMPENSATION IN MULTI-ROUND SEALED-BID AUCTION 34 Derivation of compensation based on AlgorithmⅠ 35 Derivation of compensation based on AlgorithmⅡ 36 4.2. AGENT BIDDING POLICIES 38 4.3. THEOREMS 40 4.3.1. Escape from the Prisoner's Dilemma 41 4.3.2. Existence of Nash and Pareto-efficient Equilibrium 41 4.3.3. No-Fear-of-Deviation (NFD) Equilibrium 41 4.3.4. Convergence of the negotiation procedure 41 4.4. DECEPTION ISSUES 42 Six Possible Bidding Histories 43 Deception in the Auction Mechanism with Algorithm Ⅰ 47 Deception in the Auction Mechanism with Algorithm Ⅱ 50 4.5. COLLUSION ISSUES 53 4.5.1. Coalitional Stability 54 4.5.2. Not Collusion-Proof 54 CHAPTER 5 CONCLUSION 55 5.1. FUTURE WORK 56 APPENDIX A NOTATIONS 58 A 58 C 58 D 59 F 59 G 59 I 60 K 60 M 61 N 61 S 61 T 62 V 62 APPENDIX B PROOFS OF LEMMAS 63 Proof of Lemma 1 63 Proof of Lemma 2 64 Proof of Lemma 3 65 Proof of Lemma 4 68 Proof of Lemma 5 71 Proof of Lemma 6 74 Proof of Lemma 7 80 Proof of Lemma 8 85 Proof of Lemma 9 89 Proof of Lemma 10 95 Proof of Lemma 11 104 Proof of Lemma 12 111 Proof of Lemma 13 114 Proof of Lemma 14 117 Proof of Lemma 15 122 Proof of Lemma 16 128 Proof of Lemma 17 133 Proof of Lemma 18 140 Proof of Lemma 19 145 Proof of Lemma 20 149 Proof of Lemma 21 156 Proof of Lemma 22 169 Proof of Lemma 23 177 Proof of Lemma 24 180 APPENDIX C PROOFS OF THEOREMS 182 Proof of Theorem 1 182 Proof of Theorem 2 182 Proof of Theorem 3 183 Proof of Theorem 4 183 Proof of Theorem 5 183 Proof of Theorem 6 183 Proof of Theorem 7 183 Proof of Theorem 8 183 BIBLIOGRAPHY 184rf [1 ] A. K. Dixit and B. Nalebuff, Thinking Strategically, W.W. Norton & Company, Reissue edition,1993. [2 ] Andreu Mas-Colell, Michael Whinston and Jerry R. Green, Microeconomic Theory, Oxford University Press, 1995. [3 ] B. Douglas Bernheim, Bezalel Peleg, and Michael D. Whinston, Coalition-proof Nash Equilibria I. Concepts, Journal of Economic Theory, 42, 1-12, 1987. [4 ] C. Li and K. Sycara, Algorithm for Combinatorial Coalition Formation and Payoff Division in an Electronic Market Place, in Proc. Of International Conference on Autonomous Agent and Multi-Agent Systems, 2001. [5 ] Conen, W. and Sandholm, T., Partial-Revelation VCG Mechanism for Combinatorial Auctions. National Conference on Artificial Intelligence (AAAI), 2002. [6 ] Dugatkin, L.A., A model for coalition formation in animals, in Proceedings of The Royal Society of London, 265: 2121-2125, 1998. [7 ] Durfee, E., and Lesser, V., and Partial Global Planning, A Coordination Framework for Distributed Hypothesis Formation, IEEE Transactions on Systems, Man, and Cybernetics 21(5), 1987. [8 ] H. R. Varian and J. K. Mackie-Mason, Generalized Vickery Auctions, Technical report, Department of Economics, University of Michigan, June 1994. [9 ] J. Von Neumann and O. Morgenstern., Theory of Games and Economic Behavior, Princeton University Press, 1944. [10 ] J. Yamamoto and K. Sycara, A stable and efficient buyer coalition formation scheme for e-marketplaces, in Proceedings of the fifth international conference on Autonomous agents,2001. [11 ] James P. Kahan and Amnon Rapoport, Theories of Coalition Formation, Lawrence Erlbaum Associates, 1984. [12 ] K. Larson and T. Sandholm., Anytime Coalition Structure Generation: An Average Case Study. Journal of Theoretical and Experimental Arificial Intelligence. 12(2000), 23-42, 2000. [13 ] M. Yokoo, Y. Sakurai, and S. Matsubara, The Effect of False-name Bids in Combinatorial Auctions: New Fraud in Internet Auctions, International Conference on Distributed Computing Systems. [14 ] Martin J. Osborne and Ariel Rubinstein, A Course in Game Theory, MIT Press, 1994. [15 ] MP Wellman, WE Walsh, PR Wurman, and JK MacKie-Mason, Auction Protocols for Decentralized Scheduling, Games and Economic Behavior 35:271-303, 2001. [16 ] Peter R. Wurman, Michael P. Wellman and William E. Walsh, A Parametrization of the Auction Design Space, Games and Economic Behavior 35:304-338, 2001. [17 ] R. preston McAfee and J. McMillan, Auctions and Bidding., Journal of Economic Literature, 25:699-738, 1987. [18 ] Sandholm, T., Distributed Rational Decision Making. In the textbook Multiagent Systems: A Modern Introduction to Distributed Artificial Intelligence, Weis, G., ed., MIT Press. Pp. 201-258, 1999. [19 ] Sandholm, T., An Implementation of the Contract Net Protocol Based on Marginal Cost Calculations. Eleventh National Conference on Artificial Intelligence (AAAI-93), Washington DC, pp. 256-262, 1993. [20 ] Sandholm, T., Larson, K., Andersson, M., Shehory, O., and Tohme, Coalition Structure Generation with Worst Case Guarantees. Artificial Intelligence, 111(1-2), 209-238, 1999. [21 ] Sandholm, T.W. and Lesser, V.R.: Advantages of a Leveled Commitment Contracting Protocol, In Proceedings of the National Conference on Artificial Intelligence, pp.126-133, 1996. [22 ] Shih-Hung Wu and Von-Wun Soo, Negotiation without Knowing Other Agent's Payoffs in the Trusted-Third-Party Mediated Games, Second workshop on game theoretic and decision theoretic agents, 2000. [23 ] Shih-Hung Wu and Von-Wun Soo, Game Theoretic Reasoning in Multi-agent Coordination by Negotiation with a Trusted Third Party, in Proceedings of the Third International Conference on Autonomous Agents (Agents'99), Seattle, Washington, pp.56-61, 1999. [24 ] Shih-Hung Wu and Von-Wun Soo, Making Rational Decisions in N-by-N Negotiation Games with a Trusted Third Party, in Proceedings of the Pacific Rim international workshop of on Multi-Agent (PRIMA'99), 1999. [25 ] Shih-Hung Wu and Von-Wun Soo, Escape from a Prisoners' Dilemma by Communication with a Trusted Third Party, in Proceedings of the Tenth International Conference on Tools with Artificial intelligent (ICTAI'98), pp.58-65, 1998. [26 ] Shih-Hung Wu and Von-Wun Soo, Risk Control in Multi-agent Coordination by Negotiation with a Trusted Third Party, in Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence (IJCAI-99), Stockholm, Sweden, 1999. [27 ] Shih-Hung Wu and Von-Wun Soo, A Fuzzy Game Theoretic Approach to Multi-Agent Coordination, Pacific Rim international workshop of on Multi-Agent (PRIMA'98), 1998. [28 ] Smith, R.G., The Contract Net Protocol: High-level Communication and Control in a Distributed Problem Solver, IEEE Trans. on Computers, 1980, C29, (12)
    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)

    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE