FeReRA: A Multi-agent Approach to Constraint Satisfaction

Author(s):  
Muhammed Basharu
Author(s):  
Kamal Moummadi ◽  
Rachida Abidar ◽  
Hicham Medromi

The growth of technological capabilities of mobile devices, the evolution of wireless communication technologies, and the maturity of embedded systems contributed to expand the Machine to machine (M2M) concept. M2M refers to data communication between machines without human intervention. The objective of this paper is to present the grand schemes of a model to be used in an agricultural Decision support System. The authors start by explaining and justifying the need for a hybrid system that uses both Multi-Agent System (MAS) and Constraint Programming (CP) paradigms. Then, the authors propose an approach for Constraint Programming and Multi-Agent System mixing based on controller agent concept. The authors present concrete constraints and agents to be used in a distributed architecture based on the proposed approach for M2M services and agricultural decision support. The platform is built in Java using general interfaces of both MAS and Constraint Satisfaction Problem (CSP) platforms and the conception is made by agent UML (AUML).


2002 ◽  
Vol 136 (1) ◽  
pp. 101-144 ◽  
Author(s):  
Jiming Liu ◽  
Han Jing ◽  
Y.Y. Tang

2013 ◽  
Vol 47 ◽  
pp. 649-695 ◽  
Author(s):  
T. Leaute ◽  
B. Faltings

As large-scale theft of data from corporate servers is becoming increasingly common, it becomes interesting to examine alternatives to the paradigm of centralizing sensitive data into large databases. Instead, one could use cryptography and distributed computation so that sensitive data can be supplied and processed in encrypted form, and only the final result is made known. In this paper, we examine how such a paradigm can be used to implement constraint satisfaction, a technique that can solve a broad class of AI problems such as resource allocation, planning, scheduling, and diagnosis. Most previous work on privacy in constraint satisfaction only attempted to protect specific types of information, in particular the feasibility of particular combinations of decisions. We formalize and extend these restricted notions of privacy by introducing four types of private information, including the feasibility of decisions and the final decisions made, but also the identities of the participants and the topology of the problem. We present distributed algorithms that allow computing solutions to constraint satisfaction problems while maintaining these four types of privacy. We formally prove the privacy properties of these algorithms, and show experiments that compare their respective performance on benchmark problems.


Sign in / Sign up

Export Citation Format

Share Document