Abstract
Social Group is group of interconnected nodes interested in obtaining common content (Scott, in Social network analysis, 2012). Social groups are observed in many networks for example, cellular network assisted Device-to-Device network (Fodor et al., in IEEE Commun Mag 50:170–177, 2012, Lei et al., in Wirel Commun 19:96–104, 2012), hybrid Peer-to-Peer content distribution (Christos Gkantsidis and Miller, in 5th International Workshop on Peer-to-Peer Systems, 2006, Vakali and Pallis, in IEEE Internet Comput 7:68–74, 2003) etc. In this paper, we consider a “Social Group” of networked nodes, seeking a “universe” of data segments for maximizing their individual utilities. Each node in social group has a subset of the universe, and access to an expensive link for downloading data. Nodes can also acquire the universe by exchanging copies of data segments among themselves, at low cost, using inter-node links. While exchanges over inter-node links ensure minimum or negligible cost, some nodes in the group try to exploit the system by indulging in collusion, identity fraud etc. We term such nodes as ‘non-reciprocating nodes’ and prohibit such behavior by proposing the “Give-and-Take” criterion, where exchange is allowed iff each participating node provides at least one segment to the node which is unavailable with the node. While complying with this criterion, each node wants to maximize its utility, which depends on the node’s segment set available with the node. Link activation between pair of nodes requires mutual consent of the participating nodes. Each node tries to find a pairing partner by preferentially exploring nodes for link formation. Unpaired nodes download data segments using the expensive link with pre-defined probability (defined as segment aggressiveness probability). We present various linear complexity decentralized algorithms based on the Stable Roommates Problem that can be used by nodes for choosing the best strategy based on available information. We present a decentralized randomized algorithm that is asymptotically optimal in the number of nodes. We define Price of Choice for benchmarking the performance of social groups consisting of non-aggressive nodes (i.e. nodes not downloading data segments from the expensive link) only. We evaluate performances of various algorithms and characterize the behavioral regime that will yield best results for nodes and social groups, spending the least on the expensive link. The proposed algorithms are compared with the optimal. We find that the Link For Sure algorithm performs nearly optimally.
Similar content being viewed by others
Notes
Price of choice (defined in Sect. 4) for link for sure algorithm is very close to 1. It is only possible when most of the nodes obtain their best possible utility values.
Lemma 2 shows that at least one pair of nodes will be give mutual consent for activation of link. nodes unpaired. These unpaired nodes might choose to download new segments via the expensive link based on their “aggressiveness” for new segments.
\(X^c\) denotes the complement of set X.
We use the terminology “slot” as it suggests an interval of time over which a number of things can happen. In the beginning of a slot, decision negotiation for pairings is done. During the slot, segment exchange among nodes takes place. We have refrained from using other terminologies such as “tick” as it suggests an instant and it is difficult to visualize a situation where multiple events can happen.
For the purpose of analysis in this paper, we have assumed \(u_i(r)\) to be strictly increasing w.r.t. to cardinality of segment set as outlined in A3.
Node i may choose to ignore some nodes in \(l_i(r)\) based on value of its PEF in \(r\mathrm{th}\) slot, \(e_i(r)\).
MPSM can be treated as a special case of LPSM, in which the PEF of node i, viz., \(e_i(r)\) is 1 for all nodes \(i\in \mathscr {M}\).
\((a\mod b)\) denotes the remainder when a is divided by b, where \(a,b\in \mathbb {N}\) and \(a\ge b\).
\(s_{(r,i)}\) is different from \(s_i(r)\) as defined in Sect. 2.
PoC is only defined for cases where nodes are non-aggressive, i.e. \(a_i(r)=0\forall i\in \mathscr {M}, r>0\).
To generate a k element subset \(O_i\) for node i, we pick k elements uniformly at random without replacement from universe \(\mathscr {N}\). We choose subsets for all nodes in \(\mathscr {M}\). If \(\underset{i\in \mathscr {M}}{\bigcup } O_i\ne \mathscr {N}\), we repeat the process for all nodes.
Complexity for computing Maximal Partial Stable Matching (MPSM) in each slot is same as that of computing Stable roommate matching i.e. \(O(m^2)\).
References
Fodor, G., Dahlman, E., Mildh, G., Parkvall, S., Reider, N., Miklos, G., et al. (2012). Design aspects of network assisted device-to-device communications. IEEE Communications Magazine, 50(3), 170–177.
Lei, L., Zhong, Z., Lin, C., & Shen, X. (2012). Operator controlled device-to-device communications in lte-advanced networks. IEEE Wireless Communications, 19(3), 96–104.
Paakkonen, J., Hollanti, C., & Tirkkonen, O. (December 2013). Device-to-device data storage for mobile cellular systems. In Globecom Workshops (GC Wkshps), 2013 IEEE (pp. 671–676).
Christos Gkantsidis, P. R. & Miller, J. (2006). Anatomy of a p2p content distribution system with network coding. In 5th International Workshop on Peer-to-Peer Systems.
Vakali, A., & Pallis, G. (2003). Content delivery networks: Status and trends. IEEE Internet Computing, 7(6), 68–74.
Jin, X., & Kwok, Y.-K. (December 2010). Cloud assisted p2p media streaming for bandwidth constrained mobile subscribers. In: 2010 IEEE 16th International Conference on Parallel and Distributed Systems (ICPADS) (pp. 800–805).
Ion, B., & Furtuna, A. (2009). Dc++ and ddos attacks. Journal of Systemics, Cybernetics and Informatics. http://www.iiis.org/cds2009/cd2009sci/SCI2009/PapersPdf/S167TT.pdf.
Holmström, J. (2014). File sharing beyond grabbing and running exploring the sense of community in a peer-to-peer file sharing network. Thousand Oaks: SAGE Publications.
Scott, J. (2012). Social network analysis. London: SAGE Publications Limited.
Jaho, E., Karaliopoulos, M., & Stavrakakis, I. (2013). Social similarity favors cooperation: The distributed content replication case. IEEE Transactions on Parallel and Distributed Systems, 24(3), 601–613.
Asch, P., & Gigliotti, G. A. (1991). The free-rider paradox: Theory, evidence, and teaching. The Journal of Economic Education, 22(1), 33–38. http://www.jstor.org/stable/1182332.
Francois, P. (2003). Not-for-profit provision of public services*, The Economic Journal, 113(486), C53–C61. http://dx.doi.org/10.1111/1468-0297.00110.
Feldman, M., Papadimitriou, C., Chuang, J. & Stoica, I. (2004). Free-riding and whitewashing in peer-to-peer systems. In Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems, ser. ACM PINS.
Feldman, M., & Chuang, J. (2005). Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exchanges, 5(4), 41–50.
Locher, T., Moor, P., Schmid, S. & Wattenhofer, R. (2006). Free riding in bittorrent is cheap, in In HotNets.
Rahman, R., Meulpolder, M., Hales, D., Pouwelse, J., Epema, D. & Sips, H. (May 2010). Improving efficiency and fairness in p2p systems with effort-based incentives. In 2010 IEEE International Conference on Communications (ICC) (pp. 1 –5).
Nishida, H., & Nguyen, T. (2010). A global contribution approach to maintain fairness in p2p networks. IEEE Transactions on Parallel and Distributed Systems, 21(6), 812–826.
Karakaya, M., Korpeoglu, I., & Ulusoy, O. (2009). Free riding in peer-to-peer networks. IEEE Internet Computing, 13(2), 92–98.
Mol, J. J.-D., Pouwelse, J. A., Meulpolder, M., Epema, D. H., & Sips, H. J. (2008). Give-to-get: Free-riding resilient video-on-demand in p2p systems. In Electronic Imaging 2008 International Society for Optics and Photonics (pp. 681, 804–681, 804).
Fehr, E. & Gachter, S. (2000). Cooperation and punishment in public goods experiments, The American Economic Review, 90(4), 980–994. http://www.jstor.org/stable/117319.
Douceur, J. R. (2002). The sybil attack. Peer-to-peer systems (pp. 251–260). Berlin: Springer.
Dinger, J., & Hartenstein, H. (2006). Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In Availability, Reliability and Security, 2006. ARES 2006. (p. 8)
Guo, X., & Lim, J. (2007). Negotiation support systems and team negotiations: The coalition formation perspective. Information and Software Technology, 49(11–12), 1121–1127. http://www.sciencedirect.com/science/article/pii/S0950584906001935.
Dash, R., Jennings, N., & Parkes, D. (2003). Computational-mechanism design: A call to arms. IEEE Intelligent Systems, 18(6), 40–47.
Jennings, N., Faratin, P., Lomuscio, A., Parsons, S., Wooldridge, M., & Sierra, C. (2001). Automated negotiation: Prospects, methods and challenges. Group Decision and Negotiation, 10(2), 199–215.
Espinasse, B., Picolet, G. & Chouraqui, E. (1997). Negotiation support systems: A multi-criteria and multi-agent approach. European Journal of Operational Research, 103(2), 389–409. http://www.sciencedirect.com/science/article/pii/S0377221797001276.
Lim, J. (2003). A conceptual framework on the adoption of negotiation support systems. Information and Software Technology, 45(8), 469–477. http://www.sciencedirect.com/science/article/pii/S0950584903000272.
Snchez-Anguix, V., Valero, S., Julin, V., Botti, V. & Garca-Fornes, A. (2013). Evolutionary-aided negotiation model for bilateral bargaining in ambient intelligence domains with complex utility functions. Information Sciences, 222 pp. 25–46 including Special Section on New Trends in Ambient Intelligence and Bio-inspired Systems. http://www.sciencedirect.com/science/article/pii/S0020025510005633.
Feigenbaum, J., Papadimitriou, C. H., & Shenker, S. (2001). Sharing the cost of multicast transmissions. Journal of Computer and System Sciences, 63(1), 21–41. http://www.sciencedirect.com/science/article/pii/S0022000001917544.
Nisan, N., & Ronen, A. (2001). Algorithmic mechanism design. Games and Economic Behavior, 35(1–2), 166–196. http://www.sciencedirect.com/science/article/pii/S089982569990790X.
Oliver, J. R. (1996). A machine-learning approach to automated negotiation and prospects for electronic commerce. Journal of management information systems, 13, 83–112.
Shojafar, M., Abawajy, J., Delkhah, Z., Ahmadi, A. Z. P., & Abraham, A. (2015). An efficient and distributed file search in unstructured peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(1), 120–136. http://dx.doi.org/10.1007/s12083-013-0236-0.
Braubach, L., & Pokahr, A. (2014). Advanced intelligent computational technologies and decision support systems (pp. 107–121)., Negotiation-based patient scheduling in hospitals Berlin: Springer.
Guttman, R. H., Moukas, A. G., & Maes, P. (1998). Agent-mediated electronic commerce: A survey. The Knowledge Engineering Review, 13(02), 147–159.
Clearwater, S. H. (Ed.). (1996). Market-based control: A Paradigm for distributed resource allocation. River Edge, NJ: World Scientific Publishing Co., Inc.
Aggarwal, S., Kuri, J. & Saha, C. (2014). Give-and-take based peer-to-peer content distribution networks. Sadhana, pp. 1–16. http://dx.doi.org/10.1007/s12046-014-0266-1.
Aggarwal, S., Kuri, J. & Vaze, R. (2013). Social optimum in social groups with give-and-take criterion, CoRR, arXiv:1308.1911.
Pananjady, A., Bagaria, V. K. & Vaze, R. (February 2014) Maximizing utility among selfish users in social groups. In 2014 Twentieth National Conference on Communications (NCC) (pp. 1–6).
Feigenbaum, J., & Shenker, S. (2002). Distributed algorithmic mechanism design: Recent results and future directions. In In Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (pp. 1–13). ACM Press.
Weiss, G. (1999). Multiagent systems: a modern approach to distributed artificial intelligence, ser. Intelligent robotics and autonomous agents series. MIT Press. http://books.google.co.in/books?id=JYcznFCN3xcC.
Jennings, N. R. (April 2001). An agent-based approach for building complex software systems. Communications ACM, 44(4), 35–41. http://doi.acm.org/10.1145/367211.367250.
Irving, R. W. & Manlove, D. F. (2002). The stable roommates problem with ties. Journal of Algorithms, 43(1), 85–105. http://www.sciencedirect.com/science/article/pii/S0196677402912198.
Irving, R. W. (1985) An efficient algorithm for the stable roommates problem. Journal of Algorithms, 6(4), 577–595. http://www.sciencedirect.com/science/article/pii/0196677485900331.
Pouwelse, J., Garbacki, P., Epema, D., & Sips, H. (2005). The bittorrent p2p file-sharing system: Measurements and analysis. Peer-to-Peer systems IV. Heidelberg: Springer.
Koutsoupias, E. & Papadimitriou, C. (1999). Worst-case equilibria. In Proceedings of the 16th Annual Conference on Theoretical Aspects of Computer Science, ser. STACS’99 (pp. 404–413). Berlin: Springer. http://dl.acm.org/citation.cfm?id=1764891.1764944.
Roughgarden, T. (2005). Selfish routing and the price of anarchy. Stanford: The MIT Press.
Stidham, S. (2014). The price of anarchy for a network of queues in heavy traffic. In Essays in Production, Project Planning and Scheduling ser. International Series in Operations Research and Management Science (vol. 200, pp. 91–121). Springer. http://dx.doi.org/10.1007/978-1-4614-9056-2-5.
Mak V. & Rapoport, A. (2013). The price of anarchy in social dilemmas: Traditional research paradigms and new network applications. In Organizational Behavior and Human Decision Processes, 120(2), 142–153. social Dilemmas. http://www.sciencedirect.com/science/article/pii/S0749597812000787.
He X., & Kempe, D. (2013). Price of anarchy for the n-player competitive cascade game with submodular activation functions. In Web and Internet Economics, ser. Lecture Notes in Computer Science (vol. 8289, pp. 232–248). Berlin: Springer. http://dx.doi.org/10.1007/978-3-642-45046-4-20.
Ding, W., Wu, T., Qin, T. & Liu, T.-Y. (2013). Pure price of anarchy for generalized second price auction. CoRR, arXiv:1305.5404.
Leme, R. P., & Tardos, E. (2010). Pure and bayes-nash price of anarchy for generalized second price auction. In Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, ser. FOCS ’10 (pp. 735–744). Washington, DC: IEEE Computer Society. http://dx.doi.org/10.1109/FOCS.2010.75.
Andelman, N., Feldman, M. & Mansour, Y. (2009) Strong price of anarchy. Games and Economic Behavior, 65(2), 289–317. http://www.sciencedirect.com/science/article/pii/S0899825608000687.
Anshelevich, E., Dasgupta, A., Kleinberg, J. M., Wexler va Tardos, T., & Roughgarden, T. (2004). The price of stability for network design with fair cost allocation. In IEEE Symposium on Foundations of Computer Science (pp. 295–304).
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix 1: Algorithm pseudo codes
1.1 Limited stable pairing algorithm (LSPA)
Algorithm 1 presents the pseudo code of Limited Stable Pairing Algorithm (LSPA). In LSPA, each node tries to find a pairing node (Steps 2-9)in every decision slot. To find a pairing node, node i considers the truncated preference list having only top \(\max (1,\lfloor e_i(r)\left| l_i(r)\right| \rfloor )\). If node i is unable to find a pairing node in the \(r\mathrm{th}\) decision slot, then node i downloads a new segment with probability \(a_i(r)\) (Steps 10-17).
1.2 Preferential exploration pairing algorithm (PEPA)
Algorithm 2 presents the pseudo code of Preferential Exploration Pairing Algorithm (PEPA). Setting Segment Aggressive Probability (SAP) to zero in LSPA, we will obtain PEPA. PEPA is called Link for Sure Algorithm (LSA), if \(e_i(r)=1\forall r>0\).
1.3 Decentralized randomized algorithm
Algorithm 3 presents the pseudo code for decentralized randomized algorithm. If social group does not want to bear the cost of overhead communication among nodes with the help of facilitator, then nodes can use decentralized randomized algorithm.
Appendix 2: Stable roommates problem and variants
The stable-roommate problem (SRP) is the problem of finding a stable matching among a pair of elements, such that, there is no pair of elements, each from a different matched set, where each member of the pair prefers the other to their match [43]. In a given instance of the SRP, each of m participants ranks the other participants in order of preference. A matching is a set of \(\frac{m}{2}\) disjoint pairs of participants. A matching M in an instance of SRP is stable if there are no two participants x and y, each of whom prefers the other to his partner in M. Such a pair is termed as stable pair.
Multiple variants of the SRP have been proposed and studied by researchers. We consider one such variant namely, Stable Roommates Problem with Ties and Incomplete lists (SRPTI), in which, the participants are allowed to have ties among participants and can chose to ignore certain participants [42]. Our problem is each slot can be mapped to an instance of SRPTI. Stable Matching as defined in [42, 43] exists iff all participants are able to find a pairing participant. But, there might exist some matchings in which only some participants are able to find stable pairing participants. We term such matchings as Partial Stable Matching.
We have defined Limited Preference Stable Matching and Maximal Partial Stable Matching in context of our problem.
Appendix 3
Lemma 2
(Rewriting Lemma 1 of [37]) For any order of link activations (resulting in a completely disconnected graph) and \(O_i\subsetneq \bigcup _{j\in \mathscr {M}} O_j \forall i\in \mathscr {M}\), at least two nodes will have \(\bigcup _{i\in \mathscr {M}} O_i\).
Proof
Please refer to proof for Lemma 1 of [37]. \(\square \)
Corollary 2
For any order of link activations (resulting in a completely disconnected graph) optimal aggregate cardinality is upper bounded by \(nm-\left( m\mod 2\right) \).
Proof
Trivial upper bound on aggregate cardinality is given by nm as system consists of m nodes and n segments. For odd number of nodes, it follows from the fact that number of nodes with universe can be even only. Hence, considering the best possible scenario where \(m-1\) nodes have got the universe. And node without universe will have at least 1 segment missing, therefore, optimal aggregate cardinality is upper bounded by \(nm-\left( m\mod 2\right) \). \(\square \)
Rights and permissions
About this article
Cite this article
Aggarwal, S., Kuri, J. Strategies for utility maximization in social groups with preferential exploration. Auton Agent Multi-Agent Syst 31, 107–129 (2017). https://doi.org/10.1007/s10458-015-9315-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10458-015-9315-3