Applying Evolutionary Approaches for Cooperation
In this chapter we describe a simple general method by which existing evolutionary algorithms originating in the biological or social sciences can be translated into always-on protocols that adapt at run time. We then discuss how this approach has been applied to import a novel cooperation producing algorithm into a simulated peer-to-peer network. Finally we discuss possible applications and open issues.
KeywordsEvolutionary Algorithm Malicious Node Neighbor List Malicious Behavior Replica Management
Unable to display preview. Download preview PDF.
- 1.S. Arteconi and D. Hales. Greedy cheating liars and the fools who believe them. Technical Report UBLCS-2005-21, University of Bologna, Dept. of Computer Science, December 2005.Google Scholar
- 2.S. Arteconi and D. Hales. Broadcasting at the critcial threshold. Technical Report UBLCS-2006-22, University of Bologna, Dept. of Computer Science, October 2006.Google Scholar
- 3.R. Axelrod. The Evolution of Cooperation. Basic Books, 1984.Google Scholar
- 4.R. Dawkins. The Selfish Gene: Second Edition. Oxford University Press, 1989.Google Scholar
- 6.D. Hales. Cooperation without Space or Memory: Tags, Groups and the Pris-oner’s Dilemma. In Multi-Agent-Based Simulation, Lecture Notes in Artificial Intelligence 1979, Springer, 2004.Google Scholar
- 7.D. Hales. From Selfish Nodes to Cooperative Networks: Emergent Link-based Incentives in Peer-to-Peer Networks. In proceedings of The Fourth IEEE Inter-national Conference on Peer-to-Peer Computing (p2p2004), 25-27 August 2004, Zurich, Switzerland. IEEE Computer Society Press, August 2004.Google Scholar
- 11.D. Hales, A. Marcozzi, and G. Cortese. Towards cooperative, self-organised replica management. Technical Report UBLCS-2007-02, University of Bologna, Dept. of Computer Science, January 2007.Google Scholar
- 13.J. Holland. Adaptation in Natural and Artificial Systems. University of Michigan Press, 1975.Google Scholar
- 14.J. Holland. The effect of labels (tags) on social interactions. Working Paper 93-10-064, Santa Fe Institute, 1993.Google Scholar
- 15.J. Chuang M. Feldman, K. Lai and I. Stoica. Robust Incentive Techniques for Peer-to-Peer Networks. In ACM Conference on Electronic Commerce, ACM Press, 2004.Google Scholar
- 17.F. C. Santos, J. M. Pacheco, and T. Lenaerts. Evolution of cooperation without reciprocity. PLoS Comput. Biol., 2(10), 2006.Google Scholar
- 19.Q. Sun and H. Garcia-Molina. SLIC: A Selfish Link-based Incentive Mechanism for Unstructured Peer-to-Peer Networks. In Proc. of 24th IEEE Int. Conf. on Distributed Systems, IEEE Computer Society, 2004.Google Scholar