Skip to main content
Log in

Strategies for utility maximization in social groups with preferential exploration

  • Published:
Autonomous Agents and Multi-Agent Systems Aims and scope Submit manuscript

Abstract

Social Group is group of interconnected nodes interested in obtaining common content (Scott, in Social network analysis, 2012). Social groups are observed in many networks for example, cellular network assisted Device-to-Device network (Fodor et al., in IEEE Commun Mag 50:170–177, 2012, Lei et al., in Wirel Commun 19:96–104, 2012), hybrid Peer-to-Peer content distribution (Christos Gkantsidis and Miller, in 5th International Workshop on Peer-to-Peer Systems, 2006, Vakali and Pallis, in IEEE Internet Comput 7:68–74, 2003) etc. In this paper, we consider a “Social Group” of networked nodes, seeking a “universe” of data segments for maximizing their individual utilities. Each node in social group has a subset of the universe, and access to an expensive link for downloading data. Nodes can also acquire the universe by exchanging copies of data segments among themselves, at low cost, using inter-node links. While exchanges over inter-node links ensure minimum or negligible cost, some nodes in the group try to exploit the system by indulging in collusion, identity fraud etc. We term such nodes as ‘non-reciprocating nodes’ and prohibit such behavior by proposing the “Give-and-Take” criterion, where exchange is allowed iff each participating node provides at least one segment to the node which is unavailable with the node. While complying with this criterion, each node wants to maximize its utility, which depends on the node’s segment set available with the node. Link activation between pair of nodes requires mutual consent of the participating nodes. Each node tries to find a pairing partner by preferentially exploring nodes for link formation. Unpaired nodes download data segments using the expensive link with pre-defined probability (defined as segment aggressiveness probability). We present various linear complexity decentralized algorithms based on the Stable Roommates Problem that can be used by nodes for choosing the best strategy based on available information. We present a decentralized randomized algorithm that is asymptotically optimal in the number of nodes. We define Price of Choice for benchmarking the performance of social groups consisting of non-aggressive nodes (i.e. nodes not downloading data segments from the expensive link) only. We evaluate performances of various algorithms and characterize the behavioral regime that will yield best results for nodes and social groups, spending the least on the expensive link. The proposed algorithms are compared with the optimal. We find that the Link For Sure algorithm performs nearly optimally.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. These algorithms are not incentive compatible  [24, 39].

  2. Price of choice (defined in Sect.  4) for link for sure algorithm is very close to 1. It is only possible when most of the nodes obtain their best possible utility values.

  3. Lemma 2 shows that at least one pair of nodes will be give mutual consent for activation of link. nodes unpaired. These unpaired nodes might choose to download new segments via the expensive link based on their “aggressiveness” for new segments.

  4. \(X^c\) denotes the complement of set X.

  5. We use the terminology “slot” as it suggests an interval of time over which a number of things can happen. In the beginning of a slot, decision negotiation for pairings is done. During the slot, segment exchange among nodes takes place. We have refrained from using other terminologies such as “tick” as it suggests an instant and it is difficult to visualize a situation where multiple events can happen.

  6. For the purpose of analysis in this paper, we have assumed \(u_i(r)\) to be strictly increasing w.r.t. to cardinality of segment set as outlined in A3.

  7. Node i may choose to ignore some nodes in \(l_i(r)\) based on value of its PEF in \(r\mathrm{th}\) slot, \(e_i(r)\).

  8. Assumed equality in Eq. (8) has been used in Eq. (7) to obtain Eq. (12).

  9. MPSM can be treated as a special case of LPSM, in which the PEF of node i, viz., \(e_i(r)\) is 1 for all nodes \(i\in \mathscr {M}\).

  10. \((a\mod b)\) denotes the remainder when a is divided by b, where \(a,b\in \mathbb {N}\) and \(a\ge b\).

  11. \(s_{(r,i)}\) is different from \(s_i(r)\) as defined in Sect. 2.

  12. PoC is only defined for cases where nodes are non-aggressive, i.e. \(a_i(r)=0\forall i\in \mathscr {M}, r>0\).

  13. Optimal ‘centralized’ solution refers to the system-wide state in a multi-agent system [24, 27, 28], which maximizes the social utility function.

  14. To generate a k element subset \(O_i\) for node i, we pick k elements uniformly at random without replacement from universe \(\mathscr {N}\). We choose subsets for all nodes in \(\mathscr {M}\). If \(\underset{i\in \mathscr {M}}{\bigcup } O_i\ne \mathscr {N}\), we repeat the process for all nodes.

  15. Complexity for computing Maximal Partial Stable Matching (MPSM) in each slot is same as that of computing Stable roommate matching i.e. \(O(m^2)\).

References

  1. Fodor, G., Dahlman, E., Mildh, G., Parkvall, S., Reider, N., Miklos, G., et al. (2012). Design aspects of network assisted device-to-device communications. IEEE Communications Magazine, 50(3), 170–177.

    Article  Google Scholar 

  2. Lei, L., Zhong, Z., Lin, C., & Shen, X. (2012). Operator controlled device-to-device communications in lte-advanced networks. IEEE Wireless Communications, 19(3), 96–104.

    Article  Google Scholar 

  3. Paakkonen, J., Hollanti, C., & Tirkkonen, O. (December 2013). Device-to-device data storage for mobile cellular systems. In Globecom Workshops (GC Wkshps), 2013 IEEE (pp. 671–676).

  4. Christos Gkantsidis, P. R. & Miller, J. (2006). Anatomy of a p2p content distribution system with network coding. In 5th International Workshop on Peer-to-Peer Systems.

  5. Vakali, A., & Pallis, G. (2003). Content delivery networks: Status and trends. IEEE Internet Computing, 7(6), 68–74.

    Article  Google Scholar 

  6. Jin, X., & Kwok, Y.-K. (December 2010). Cloud assisted p2p media streaming for bandwidth constrained mobile subscribers. In: 2010 IEEE 16th International Conference on Parallel and Distributed Systems (ICPADS) (pp. 800–805).

  7. Ion, B., & Furtuna, A. (2009). Dc++ and ddos attacks. Journal of Systemics, Cybernetics and Informatics. http://www.iiis.org/cds2009/cd2009sci/SCI2009/PapersPdf/S167TT.pdf.

  8. Holmström, J. (2014). File sharing beyond grabbing and running exploring the sense of community in a peer-to-peer file sharing network. Thousand Oaks: SAGE Publications.

    Google Scholar 

  9. Scott, J. (2012). Social network analysis. London: SAGE Publications Limited.

    Google Scholar 

  10. Jaho, E., Karaliopoulos, M., & Stavrakakis, I. (2013). Social similarity favors cooperation: The distributed content replication case. IEEE Transactions on Parallel and Distributed Systems, 24(3), 601–613.

    Article  Google Scholar 

  11. Asch, P., & Gigliotti, G. A. (1991). The free-rider paradox: Theory, evidence, and teaching. The Journal of Economic Education, 22(1), 33–38. http://www.jstor.org/stable/1182332.

  12. Francois, P. (2003). Not-for-profit provision of public services*, The Economic Journal, 113(486), C53–C61. http://dx.doi.org/10.1111/1468-0297.00110.

  13. Feldman, M., Papadimitriou, C., Chuang, J. & Stoica, I. (2004). Free-riding and whitewashing in peer-to-peer systems. In Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems, ser. ACM PINS.

  14. Feldman, M., & Chuang, J. (2005). Overcoming free-riding behavior in peer-to-peer systems. SIGecom Exchanges, 5(4), 41–50.

    Article  Google Scholar 

  15. Locher, T., Moor, P., Schmid, S. & Wattenhofer, R. (2006). Free riding in bittorrent is cheap, in In HotNets.

  16. Rahman, R., Meulpolder, M., Hales, D., Pouwelse, J., Epema, D. & Sips, H. (May 2010). Improving efficiency and fairness in p2p systems with effort-based incentives. In 2010 IEEE International Conference on Communications (ICC) (pp. 1 –5).

  17. Nishida, H., & Nguyen, T. (2010). A global contribution approach to maintain fairness in p2p networks. IEEE Transactions on Parallel and Distributed Systems, 21(6), 812–826.

    Article  Google Scholar 

  18. Karakaya, M., Korpeoglu, I., & Ulusoy, O. (2009). Free riding in peer-to-peer networks. IEEE Internet Computing, 13(2), 92–98.

    Article  MATH  Google Scholar 

  19. Mol, J. J.-D., Pouwelse, J. A., Meulpolder, M., Epema, D. H., & Sips, H. J. (2008). Give-to-get: Free-riding resilient video-on-demand in p2p systems. In Electronic Imaging 2008 International Society for Optics and Photonics (pp. 681, 804–681, 804).

  20. Fehr, E. & Gachter, S. (2000). Cooperation and punishment in public goods experiments, The American Economic Review, 90(4), 980–994. http://www.jstor.org/stable/117319.

  21. Douceur, J. R. (2002). The sybil attack. Peer-to-peer systems (pp. 251–260). Berlin: Springer.

    Book  MATH  Google Scholar 

  22. Dinger, J., & Hartenstein, H. (2006). Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In Availability, Reliability and Security, 2006. ARES 2006. (p. 8)

  23. Guo, X., & Lim, J. (2007). Negotiation support systems and team negotiations: The coalition formation perspective. Information and Software Technology, 49(11–12), 1121–1127. http://www.sciencedirect.com/science/article/pii/S0950584906001935.

  24. Dash, R., Jennings, N., & Parkes, D. (2003). Computational-mechanism design: A call to arms. IEEE Intelligent Systems, 18(6), 40–47.

    Article  Google Scholar 

  25. Jennings, N., Faratin, P., Lomuscio, A., Parsons, S., Wooldridge, M., & Sierra, C. (2001). Automated negotiation: Prospects, methods and challenges. Group Decision and Negotiation, 10(2), 199–215.

    Article  Google Scholar 

  26. Espinasse, B., Picolet, G. & Chouraqui, E. (1997). Negotiation support systems: A multi-criteria and multi-agent approach. European Journal of Operational Research, 103(2), 389–409. http://www.sciencedirect.com/science/article/pii/S0377221797001276.

  27. Lim, J. (2003). A conceptual framework on the adoption of negotiation support systems. Information and Software Technology, 45(8), 469–477. http://www.sciencedirect.com/science/article/pii/S0950584903000272.

  28. Snchez-Anguix, V., Valero, S., Julin, V., Botti, V. & Garca-Fornes, A. (2013). Evolutionary-aided negotiation model for bilateral bargaining in ambient intelligence domains with complex utility functions. Information Sciences, 222 pp. 25–46 including Special Section on New Trends in Ambient Intelligence and Bio-inspired Systems. http://www.sciencedirect.com/science/article/pii/S0020025510005633.

  29. Feigenbaum, J., Papadimitriou, C. H., & Shenker, S. (2001). Sharing the cost of multicast transmissions. Journal of Computer and System Sciences, 63(1), 21–41. http://www.sciencedirect.com/science/article/pii/S0022000001917544.

  30. Nisan, N., & Ronen, A. (2001). Algorithmic mechanism design. Games and Economic Behavior, 35(1–2), 166–196. http://www.sciencedirect.com/science/article/pii/S089982569990790X.

  31. Oliver, J. R. (1996). A machine-learning approach to automated negotiation and prospects for electronic commerce. Journal of management information systems, 13, 83–112.

    Article  Google Scholar 

  32. Shojafar, M., Abawajy, J., Delkhah, Z., Ahmadi, A. Z. P., & Abraham, A. (2015). An efficient and distributed file search in unstructured peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(1), 120–136. http://dx.doi.org/10.1007/s12083-013-0236-0.

  33. Braubach, L., & Pokahr, A. (2014). Advanced intelligent computational technologies and decision support systems (pp. 107–121)., Negotiation-based patient scheduling in hospitals Berlin: Springer.

    Book  Google Scholar 

  34. Guttman, R. H., Moukas, A. G., & Maes, P. (1998). Agent-mediated electronic commerce: A survey. The Knowledge Engineering Review, 13(02), 147–159.

    Article  Google Scholar 

  35. Clearwater, S. H. (Ed.). (1996). Market-based control: A Paradigm for distributed resource allocation. River Edge, NJ: World Scientific Publishing Co., Inc.

    Google Scholar 

  36. Aggarwal, S., Kuri, J. & Saha, C. (2014). Give-and-take based peer-to-peer content distribution networks. Sadhana, pp. 1–16. http://dx.doi.org/10.1007/s12046-014-0266-1.

  37. Aggarwal, S., Kuri, J. & Vaze, R. (2013). Social optimum in social groups with give-and-take criterion, CoRR, arXiv:1308.1911.

  38. Pananjady, A., Bagaria, V. K. & Vaze, R. (February 2014) Maximizing utility among selfish users in social groups. In 2014 Twentieth National Conference on Communications (NCC) (pp. 1–6).

  39. Feigenbaum, J., & Shenker, S. (2002). Distributed algorithmic mechanism design: Recent results and future directions. In In Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (pp. 1–13). ACM Press.

  40. Weiss, G. (1999). Multiagent systems: a modern approach to distributed artificial intelligence, ser. Intelligent robotics and autonomous agents series. MIT Press. http://books.google.co.in/books?id=JYcznFCN3xcC.

  41. Jennings, N. R. (April 2001). An agent-based approach for building complex software systems. Communications ACM, 44(4), 35–41. http://doi.acm.org/10.1145/367211.367250.

  42. Irving, R. W. & Manlove, D. F. (2002). The stable roommates problem with ties. Journal of Algorithms, 43(1), 85–105. http://www.sciencedirect.com/science/article/pii/S0196677402912198.

  43. Irving, R. W. (1985) An efficient algorithm for the stable roommates problem. Journal of Algorithms, 6(4), 577–595. http://www.sciencedirect.com/science/article/pii/0196677485900331.

  44. Pouwelse, J., Garbacki, P., Epema, D., & Sips, H. (2005). The bittorrent p2p file-sharing system: Measurements and analysis. Peer-to-Peer systems IV. Heidelberg: Springer.

    Google Scholar 

  45. Koutsoupias, E. & Papadimitriou, C. (1999). Worst-case equilibria. In Proceedings of the 16th Annual Conference on Theoretical Aspects of Computer Science, ser. STACS’99 (pp. 404–413). Berlin: Springer. http://dl.acm.org/citation.cfm?id=1764891.1764944.

  46. Roughgarden, T. (2005). Selfish routing and the price of anarchy. Stanford: The MIT Press.

    MATH  Google Scholar 

  47. Stidham, S. (2014). The price of anarchy for a network of queues in heavy traffic. In Essays in Production, Project Planning and Scheduling ser. International Series in Operations Research and Management Science (vol. 200, pp. 91–121). Springer. http://dx.doi.org/10.1007/978-1-4614-9056-2-5.

  48. Mak V. & Rapoport, A. (2013). The price of anarchy in social dilemmas: Traditional research paradigms and new network applications. In Organizational Behavior and Human Decision Processes, 120(2), 142–153. social Dilemmas. http://www.sciencedirect.com/science/article/pii/S0749597812000787.

  49. He X., & Kempe, D. (2013). Price of anarchy for the n-player competitive cascade game with submodular activation functions. In Web and Internet Economics, ser. Lecture Notes in Computer Science (vol. 8289, pp. 232–248). Berlin: Springer. http://dx.doi.org/10.1007/978-3-642-45046-4-20.

  50. Ding, W., Wu, T., Qin, T. & Liu, T.-Y. (2013). Pure price of anarchy for generalized second price auction. CoRR, arXiv:1305.5404.

  51. Leme, R. P., & Tardos, E. (2010). Pure and bayes-nash price of anarchy for generalized second price auction. In Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, ser. FOCS ’10 (pp. 735–744). Washington, DC: IEEE Computer Society. http://dx.doi.org/10.1109/FOCS.2010.75.

  52. Andelman, N., Feldman, M. & Mansour, Y. (2009) Strong price of anarchy. Games and Economic Behavior, 65(2), 289–317. http://www.sciencedirect.com/science/article/pii/S0899825608000687.

  53. Anshelevich, E., Dasgupta, A., Kleinberg, J. M., Wexler va Tardos, T., & Roughgarden, T. (2004). The price of stability for network design with fair cost allocation. In IEEE Symposium on Foundations of Computer Science (pp. 295–304).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saurabh Aggarwal.

Appendices

Appendix 1: Algorithm pseudo codes

1.1 Limited stable pairing algorithm (LSPA)

Algorithm 1 presents the pseudo code of Limited Stable Pairing Algorithm (LSPA). In LSPA, each node tries to find a pairing node (Steps 2-9)in every decision slot. To find a pairing node, node i considers the truncated preference list having only top \(\max (1,\lfloor e_i(r)\left| l_i(r)\right| \rfloor )\). If node i is unable to find a pairing node in the \(r\mathrm{th}\) decision slot, then node i downloads a new segment with probability \(a_i(r)\) (Steps 10-17).

figure a

1.2 Preferential exploration pairing algorithm (PEPA)

Algorithm 2 presents the pseudo code of Preferential Exploration Pairing Algorithm (PEPA). Setting Segment Aggressive Probability (SAP) to zero in LSPA, we will obtain PEPA. PEPA is called Link for Sure Algorithm (LSA), if \(e_i(r)=1\forall r>0\).

figure b

1.3 Decentralized randomized algorithm

Algorithm 3 presents the pseudo code for decentralized randomized algorithm. If social group does not want to bear the cost of overhead communication among nodes with the help of facilitator, then nodes can use decentralized randomized algorithm.

figure c

Appendix 2: Stable roommates problem and variants

The stable-roommate problem (SRP) is the problem of finding a stable matching among a pair of elements, such that, there is no pair of elements, each from a different matched set, where each member of the pair prefers the other to their match [43]. In a given instance of the SRP, each of m participants ranks the other participants in order of preference. A matching is a set of \(\frac{m}{2}\) disjoint pairs of participants. A matching M in an instance of SRP is stable if there are no two participants x and y, each of whom prefers the other to his partner in M. Such a pair is termed as stable pair.

Multiple variants of the SRP have been proposed and studied by researchers. We consider one such variant namely, Stable Roommates Problem with Ties and Incomplete lists (SRPTI), in which, the participants are allowed to have ties among participants and can chose to ignore certain participants [42]. Our problem is each slot can be mapped to an instance of SRPTI. Stable Matching as defined in [42, 43] exists iff all participants are able to find a pairing participant. But, there might exist some matchings in which only some participants are able to find stable pairing participants. We term such matchings as Partial Stable Matching.

We have defined Limited Preference Stable Matching and Maximal Partial Stable Matching in context of our problem.

Appendix 3

Lemma 2

(Rewriting Lemma 1 of [37]) For any order of link activations (resulting in a completely disconnected graph) and \(O_i\subsetneq \bigcup _{j\in \mathscr {M}} O_j \forall i\in \mathscr {M}\), at least two nodes will have \(\bigcup _{i\in \mathscr {M}} O_i\).

Proof

Please refer to proof for Lemma 1 of [37]. \(\square \)

Corollary 2

For any order of link activations (resulting in a completely disconnected graph) optimal aggregate cardinality is upper bounded by \(nm-\left( m\mod 2\right) \).

Proof

Trivial upper bound on aggregate cardinality is given by nm as system consists of m nodes and n segments. For odd number of nodes, it follows from the fact that number of nodes with universe can be even only. Hence, considering the best possible scenario where \(m-1\) nodes have got the universe. And node without universe will have at least 1 segment missing, therefore, optimal aggregate cardinality is upper bounded by \(nm-\left( m\mod 2\right) \). \(\square \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aggarwal, S., Kuri, J. Strategies for utility maximization in social groups with preferential exploration. Auton Agent Multi-Agent Syst 31, 107–129 (2017). https://doi.org/10.1007/s10458-015-9315-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10458-015-9315-3

Keywords

Navigation