Advertisement

Applying Evolutionary Approaches for Cooperation

A General Method and a Specific Example
  • David Hales

In this chapter we describe a simple general method by which existing evolutionary algorithms originating in the biological or social sciences can be translated into always-on protocols that adapt at run time. We then discuss how this approach has been applied to import a novel cooperation producing algorithm into a simulated peer-to-peer network. Finally we discuss possible applications and open issues.

Keywords

Evolutionary Algorithm Malicious Node Neighbor List Malicious Behavior Replica Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S. Arteconi and D. Hales. Greedy cheating liars and the fools who believe them. Technical Report UBLCS-2005-21, University of Bologna, Dept. of Computer Science, December 2005.Google Scholar
  2. 2.
    S. Arteconi and D. Hales. Broadcasting at the critcial threshold. Technical Report UBLCS-2006-22, University of Bologna, Dept. of Computer Science, October 2006.Google Scholar
  3. 3.
    R. Axelrod. The Evolution of Cooperation. Basic Books, 1984.Google Scholar
  4. 4.
    R. Dawkins. The Selfish Gene: Second Edition. Oxford University Press, 1989.Google Scholar
  5. 5.
    D. E. Goldberg. Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley, 1989.MATHGoogle Scholar
  6. 6.
    D. Hales. Cooperation without Space or Memory: Tags, Groups and the Pris-oner’s Dilemma. In Multi-Agent-Based Simulation, Lecture Notes in Artificial Intelligence 1979, Springer, 2004.Google Scholar
  7. 7.
    D. Hales. From Selfish Nodes to Cooperative Networks: Emergent Link-based Incentives in Peer-to-Peer Networks. In proceedings of The Fourth IEEE Inter-national Conference on Peer-to-Peer Computing (p2p2004), 25-27 August 2004, Zurich, Switzerland. IEEE Computer Society Press, August 2004.Google Scholar
  8. 8.
    D. Hales. Emergent group-level selection in a peer-to-peer network. Complexus, 2006 (3):108-118, 2006. CrossRefGoogle Scholar
  9. 9.
    D. Hales and S. Arteconi. Slacer: A self-organizing protocol for coordination in p2p networks. IEEE Intelligent Systems, 21(2):39-35, 2006.CrossRefGoogle Scholar
  10. 10.
    D. Hales and B. Edmonds. Applying a socially-inspired technique (tags) to improve cooperation in p2p networks. Transactions in Systems, Man and Cy-bernetics -Part A: Systems and Humans, 35(3):385-395, 2005.CrossRefGoogle Scholar
  11. 11.
    D. Hales, A. Marcozzi, and G. Cortese. Towards cooperative, self-organised replica management. Technical Report UBLCS-2007-02, University of Bologna, Dept. of Computer Science, January 2007.Google Scholar
  12. 12.
    G. Hardin. The tragedy of the commons. Science, 162:1243-1248, 1968.CrossRefGoogle Scholar
  13. 13.
    J. Holland. Adaptation in Natural and Artificial Systems. University of Michigan Press, 1975.Google Scholar
  14. 14.
    J. Holland. The effect of labels (tags) on social interactions. Working Paper 93-10-064, Santa Fe Institute, 1993.Google Scholar
  15. 15.
    J. Chuang M. Feldman, K. Lai and I. Stoica. Robust Incentive Techniques for Peer-to-Peer Networks. In ACM Conference on Electronic Commerce, ACM Press, 2004.Google Scholar
  16. 16.
    R. L. Riolo, M. D. Cohen, and R. Axelrod. Evolution of cooperation without reciprocity. Nature, 414:441-443, 2001.CrossRefGoogle Scholar
  17. 17.
    F. C. Santos, J. M. Pacheco, and T. Lenaerts. Evolution of cooperation without reciprocity. PLoS Comput. Biol., 2(10), 2006.Google Scholar
  18. 18.
    J. M. Smith. Evolution and the Theory of Games. Cambridge University Press, 1982.MATHGoogle Scholar
  19. 19.
    Q. Sun and H. Garcia-Molina. SLIC: A Selfish Link-based Incentive Mechanism for Unstructured Peer-to-Peer Networks. In Proc. of 24th IEEE Int. Conf. on Distributed Systems, IEEE Computer Society, 2004.Google Scholar

Copyright information

© Springer 2007

Authors and Affiliations

  • David Hales
    • 1
  1. 1.Dept. of Computer ScienceUniversity of BolognaItaly

Personalised recommendations