Individual Rationality in Competitive Multiagent Systems

  • Jianye Hao
  • Ho-fung Leung


In competitive MASs, each individual agent is usually interested in maximizing its personal benefits only, which may have conflicts with the utility of others and the overall system as well. Thus, one natural research direction in competitive MASs is to consider how an agent can learn to obtain as much utility as possible against different opponents based on its local information. Another important question is raised from the system designer’s perspective, i.e., how can the selfish agents be incentivized to coordinate their behaviors to maximize the system-level performance (i.e., maximizing social optimality)? In this chapter, we focus on the first research direction by considering an important competitive multiagent interaction scenario: bilateral negotiation [1]. The second research direction will be the focus of Chap.  6


Strategy Profile Negotiation Strategy Acceptance Threshold Negotiation Outcome Bilateral Negotiation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Hao JY, Leung HF (2012) Abines: an adaptive bilateral negotiating strategy over multiple items. In: Proceedings of IAT’12, Macau, vol 2, pp 95–102Google Scholar
  2. 2.
    Lai GM, Li CH, Sycara K, Giampapa JA (2004) Literature review on multi-attribute negotiations. Technical report CMU-RI-TR-04-66, Robotics Institute, Carnegie Mellon University, Pittsburgh, Dec 2004Google Scholar
  3. 3.
    Faratin P, Sierra C, Jennings NR (2003) Using similarity criteria to make negotiation trade-offs. Artif Intell 142(2):205–237MathSciNetCrossRefGoogle Scholar
  4. 4.
    Saha S, Biswas A, Sen S (2005) Modeling opponent decision in repeated one-shot negotiations. In: Proceedings of AAMAS’05, Utrecht, pp 397–403Google Scholar
  5. 5.
    Hindriks K, Tykhonov D (2008) Opponent modeling in auomated multi-issue negotiation using bayesian learning. In: Proceedings of AAMAS’08, Estoril, pp 331–338Google Scholar
  6. 6.
    Jakub B, Ryszard K (2006) Predicting partner’s behaviour in agent negotiation. In: Proceedings of AAMAS’06, Hakodate, pp 355–361Google Scholar
  7. 7.
    Zeng D, Sycara K (1998) Bayesian learning in negotiation. Int J Hum Comput Syst 48:125–141CrossRefGoogle Scholar
  8. 8.
    Coehoorn RM, Jennings NR (2004) Learning an opponent’s preferences to make effective multi-issue negotiation trade-offs. In: Proceedings of ICEC’04, Delft, pp 59–68Google Scholar
  9. 9.
    Zeng D, Sycara K (1996) Bayesian learning in negotiation. In: AAAI symposium on adaptation, co-evolution and learning in multiagent systems, Portland, pp 99–104Google Scholar
  10. 10.
    Baarslag T, Hindriks K, Jonker C, Kraus S, Lin R (2010) The first automated negotiating agents competition (ANAC 2010). In: Ito T, Zhang M, Robu V, Fatima S, Matsuo T (eds) New trends in agent-based complex automated negotiations. Springer, Berlin/Heidelberg, pp 113–135Google Scholar
  11. 11.
    Baarslag T, Fujita K, Gerding EH, Hindriks K, Ito T, Jennings NR, Jonker C, Kraus S, Lin R, Robu V, Williams CR (2013) Evaluating practical negotiating agents: results and analysis of the 2011 international competition. Artif Intell 198:73–103CrossRefGoogle Scholar
  12. 12.
    Baarslag T, Hindriks K, Jonker C (2011) Acceptance conditions in automated negotiation. In: Proceedings of ACAN’11, TaibeiGoogle Scholar
  13. 13.
    The third international automated negotiating agent competition (ANAC 2012) (2012). Accessed 30 Sept 2015
  14. 14.
    Lin R, Kraus S, Baarslag T, Tykhonov D, Hindriks K, Jonker CM (2014) Genius: an integrated environment for supporting the design of generic automated negotiators. Comput Intell 30(1):48–70MathSciNetCrossRefGoogle Scholar
  15. 15.
    Song S, Hao J, Liu Y, Sun J, Leung H-F, Zhang J (2015) Improved EGT-based robustness analysis of negotiation strategies in multiagent systems via model checking. IEEE Trans Hum-Mach SystGoogle Scholar
  16. 16.
    Coehoorn RM, Jennings NR (2004) Learning an opponent’s preferences to make effective multi-issue negotiation trade-offs. In: Proceedings of ICEC’04, Delft, pp 59–68. ACMGoogle Scholar
  17. 17.
    Osborne MJ, Rubinstein A (1994) A course in game theory. MIT, CambridgeMATHGoogle Scholar
  18. 18.
    The second international automated negotiating agent competition (ANAC 2011) (2011). Accessed 30 Sept 2015
  19. 19.
    Estelle J, Wellman MP, Singh S, Vorbeychik Y, Soni V (2005) Strategic interactions in a supply chain game. Comput Intell 21(1):1–26MathSciNetCrossRefGoogle Scholar
  20. 20.
    Williams CR, Robu V, Gerding EH, Jennings NR (2012) Using Gaussian processes to optimise concession in complex negotiations against unknown opponents. In: Proceedings of IJCAI’12, Montpellier, pp 432–438Google Scholar
  21. 21.
    Chen SQ, Weiss G (2012) An efficient and adaptive approach to negotiation in complex environments. In: Proceedings of ECAI’12, Montpellier, pp 228–233Google Scholar
  22. 22.
    Williams CR, Robu V, Gerding EH, Jennings NR (2012) Negotiating concurrently with unkown opponents in complex, real-time domains. In: Proceedings of ECAI’12, Montpellier, pp 834–839Google Scholar
  23. 23.
    Results of the third international automated negotiating agent competition (ANAC 2012) (2012). Accessed 30 Sept 2015
  24. 24.
    Vytelingum P, Cliff D, Jennings NR (2008) Strategic bidding in continuous double auctions. Artif Intell 172(14):1700–1729CrossRefMATHGoogle Scholar
  25. 25.
    Pratt JW (1964) Risk aversion in the small and in the large. Econometrica 32:122–136CrossRefMATHGoogle Scholar
  26. 26.
    Arrow KJ (1971) The theory of risk aversion. In: Arrow KJ (ed) Essays in the theory of risk-bearing. Markham Publishing Company, Chicago, pp 90–120Google Scholar
  27. 27.
    Yong H (1993) The evolution of conventions. Econometrica 61(1):57–84MathSciNetCrossRefMATHGoogle Scholar
  28. 28.
    Clarke EM, Grumberg O, Long DE (1994) Model checking and abstraction. ACM Trans Program Lang Syst 16(5):1512–1542CrossRefGoogle Scholar
  29. 29.
    Sun J, Liu Y, Dong JS, Chen C (2009) Integrating specification and programs for system modeling and verification. In: Proceedings of TASE’09. IEEE Computer Society, Los Alamitos, pp 127–135Google Scholar
  30. 30.
    Sun J, Liu Y, Dong JS, Pang J (2009) PAT: towards flexible verification under fairness. In: Proceedings of CAV’09, Grenoble, pp 709–714Google Scholar

Copyright information

© Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg 2016

Authors and Affiliations

  • Jianye Hao
    • 1
  • Ho-fung Leung
    • 2
  1. 1.School of Computer SoftwareTianjin UniversityTianjinChina
  2. 2.Department of Computer Sci. and Eng.The Chinese University of Hong KongHong KongChina

Personalised recommendations