Utility-based multiagent coalition formation with incomplete information and time constraints

Leen Kiat Soh, Costas Tsatsoulis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

In this paper we propose a coalition formation model for a cooperative multiagent system in which an agent forms sub-optimal coalitions in view of incomplete information about its noisy, dynamic, and uncertain world, and its need to respond to events within time constraints. Our model has two stages: (1) when an agent detects an event in the world, it first compiles a list of coalition candidates that it thinks would be useful (coalition initialization), and (2) then negotiates with the candidates (coalition finalization). A negotiation is an exchange of information and knowledge for constraint satisfaction until both parties agree on a deal or one opts out. Each successful negotiation adds a new member to the agent's final coalition. This paper talks about the steps we have designed to enhance the finalization stage.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE International Conference on Systems, Man and Cybernetics
Pages1481-1486
Number of pages6
Volume2
StatePublished - 2003
EventSystem Security and Assurance - Washington, DC, United States
Duration: Oct 5 2003Oct 8 2003

Other

OtherSystem Security and Assurance
CountryUnited States
CityWashington, DC
Period10/5/0310/8/03

Keywords

  • Coalition formation
  • Multiagent systems
  • Negotiation

ASJC Scopus subject areas

  • Hardware and Architecture
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'Utility-based multiagent coalition formation with incomplete information and time constraints'. Together they form a unique fingerprint.

  • Cite this

    Soh, L. K., & Tsatsoulis, C. (2003). Utility-based multiagent coalition formation with incomplete information and time constraints. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (Vol. 2, pp. 1481-1486)