1 ACM Student Chapter – Union University Haifei Li, Ph.D. Department of Mathematics and Computer Science Union University Jackson, TN.

Slides:



Advertisements
Similar presentations
Industrial Economics (Econ3400) Week 4 August 14, 2008 Room 323, Bldg 3 Semester 2, 2008 Instructor: Dr Shino Takayama.
Advertisements

Opportunities: About to Graduate? Consider graduate studies in the Department of Computer Science Many, many research areas: AI, graphics, machine learning,
Reaching Agreements II. 2 What utility does a deal give an agent? Given encounter  T 1,T 2  in task domain  T,{1,2},c  We define the utility of a.
Y Narahari, Computer Science and Automation, Indian Institute of Science B2B MARKETPLACES AND E-PROCUREMENT Y. NARAHARI Computer Science and Automation.
CPE555A: Real-Time Embedded Systems
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
Do software agents know what they talk about? Agents and Ontology dr. Patrick De Causmaecker, Nottingham, March
Negotiation A Lesson in Multiagent System Based on Jose Vidal’s book Fundamentals of Multiagent Systems Henry Hexmoor SIUC.
Meta-Level Control in Multi-Agent Systems Anita Raja and Victor Lesser Department of Computer Science University of Massachusetts Amherst, MA
1 Regret-based Incremental Partial Revelation Mechanism Design Nathanaël Hyafil, Craig Boutilier AAAI 2006 Department of Computer Science University of.
CS112: Course Overview George Mason University. Today’s topics Go over the syllabus Go over resources – Marmoset – Blackboard – Piazza – Textbook Highlight.
Educational Programs in Bioinformatics at UNO Hesham H. Ali Department of Computer Science College of Info Science and Technology University of Nebraska.
CS B553: A LGORITHMS FOR O PTIMIZATION AND L EARNING aka “Neural and Genetic Approaches to Artificial Intelligence” Spring 2011 Kris Hauser.
CPS Topics in Computational Economics Instructor: Vincent Conitzer Assistant Professor of Computer Science Assistant Professor of Economics
Bargaining in-Bundle over Multiple Issues in Finite- Horizon Alternating-Offers Protocol Francesco Di Giunta and Nicola Gatti Politecnico di Milano Milan,
COLLEGE OF INFORMATION SCIENCES AND TECHNOLOGY Office of HUMAN RESOURCES Inside our Office IST 440W April 11, 2011 HR Issues and Security.
Ant Colonies As Logistic Processes Optimizers
Review 4 Chapters 8, 9, 10.
Page 0 Optimization Uncertainty Decision Analysis Systems Economics Masters of Engineering With Concentration in Systems Engineering A 30 hour graduate.
Multi-Agent Organizer by Kogan Tanya Shusterman Evgeny Advisor: Domshlak Carmel.
September 2001Ch 11: Collaborative Commerce1 Collaborative Commerce  Questions answered in this chapter: –What is collaborative commerce? –What is buy-side.
Biometric Daily Time Record
Nsm.uh.edu Math Courses Available After College Algebra.
Jian Zhao, Xiaowen Chu, Hai Liu, Yiu-Wing Leung
E-Business and E-Commerce
CHAPTER 1: Marketing: The Art and Science of Satisfying Customers 2 BASIC OPERATING FUNCTIONS OF EVERY ORGANIZATION 1. Production of a good, service, organization,
Buying Behavior and the Buying Process
Thomas Jefferson High School for Science and Technology.
HCI Yonsei University, Korea The Role of Human Computer Interaction (HCI) in the Information Systems (IS) Curriculum Jinwoo.
Vanderbilt Visions... An Exercise in Collaboration LOEX Conference, May 1-3, 2008 Melinda Brown Lee Ann Lannom Amy Stewart-Mailhiot.
Syllabus and Class Policies MATH 130: Summer 2014.
Briefing on DDP in Math/Applied Math and Computer Science July 3, 2007.
Cooperative Meeting Scheduling among Agents based on Multiple Negotiations Toramatsu SHINTANI and Takayuki ITO Department of Intelligence and Computer.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
Chapter 3: Project Management Omar Meqdadi SE 2730 Lecture 3 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Differentially Private Data Release for Data Mining Noman Mohammed*, Rui Chen*, Benjamin C. M. Fung*, Philip S. Yu + *Concordia University, Montreal, Canada.
Copyright © 2010 Pearson Addison-Wesley. All rights reserved. Chapter 3 Demand and Supply.
ASC2003 (July 15,2003)1 Uniformly Distributed Sampling: An Exact Algorithm for GA’s Initial Population in A Tree Graph H. S.
Introduction to Matching Theory E. Maskin Jerusalem Summer School in Economic Theory June 2014.
CS584 - Software Multiagent Systems Lecture 12 Distributed constraint optimization II: Incomplete algorithms and recent theoretical results.
Genetic Algorithms K.Ganesh Reasearch Scholar, Ph.D., Industrial Management Division, Humanities and Social Sciences Department, Indian Institute of Technology.
August 16, 2010 MPREF’10 Dynamic House Allocation Sujit Gujar 1, James Zou 2 and David C. Parkes 2 5 th Multidisciplinary Workshop on Advances in Preference.
Course Introduction CSE250. Course Overview This course will be difficult Work hard and start early You are adults and I will treat you as such – I won’t.
CHAPTER 4: Procurement.
E-Commerce Prof. Ir. Kudang B. Seminar, MSc, PhD Direktur Komunikasi & Sistem Informasi IPB Bogor, 12 Nopember 2008.
Automated Mechanism Design Tuomas Sandholm Presented by Dimitri Mostinski November 17, 2004.
An Extended Alternating-Offers Bargaining Protocol for Automated Negotiation in Multi-agent Systems P. Winoto, G. McCalla & J. Vassileva Department of.
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
Systems design for scheduling: Open Tools Patrick De Causmaecker, Peter Demeester, Greet Vanden Berghe and Bart Verbeke KaHo Sint-Lieven, Gent, Belgium.
Ashley James & Tom Flammini October 8, 2013
Requirements in the product life cycle Chapter 7.
1 Token–based Dynamic Trust Establishment for Web Services Zhengping Wu and Alfred C. Weaver Department of Computer Science University of Virginia March.
Credit and Collections optimization and decision support An example of the intersection of decision tool development and management consulting Includes.
FNA/Spring CENG 562 – Machine Learning. FNA/Spring Contact information Instructor: Dr. Ferda N. Alpaslan
Postgraduate stud. Al-Ahnomi Montaser Don State Technical University Department “Computer-aided design" Theme:- "development and research of intelligent.
Approximation Schemes for Constrained Scheduling Problems Author : Leslie A. HalP 0. R. Center, M.I.T. David B. Shmoyst Dept. of Mathematics, M.I.T. 報告者:童耀民.
CHAPTER 1: Marketing: The Art and Science of Satisfying Customers
Accelerated B.S./M.S An approved Accelerated BS/MS program allows an undergraduate student to take up to 6 graduate level credits as an undergraduate.
Undergrad (UG)s committee
Reinforcement Learning
How Artificial Intelligence is Changing the Supply Chain
USING MICROBIAL GENETIC ALGORITHM TO SOLVE CARD SPLITTING PROBLEM.
Enforcing Privacy Policies for RFID Data Collection and Processing
Constructing Robust Crew Schedules with Bicriteria Optimisation
How to Write a High-Quality Technical Paper for Publication
CS5040: Data Structures and Algorithms
Supply and Demand.
Computer Science Assessment Plan Overview
Introduction to Reinforcement Learning and Q-Learning
Presentation on CAPSTONE PROJECT presented by Cdr MD Masum-ul-Haque, (E), BN ME DEPT MILITARY INSTITUTE of SCIENCE and TECHNOLOGY (MIST)
Presentation transcript:

1 ACM Student Chapter – Union University Haifei Li, Ph.D. Department of Mathematics and Computer Science Union University Jackson, TN

2 Ties with ACM ACM student member when I was a graduate student at the University of Florida. ACM (regular) member when I am a professor. Faculty advisor for Nyack College student chapter of ACM.

3 Algorithms for Automated Negotiations and Their Applications in Information Privacy Haifei Li and David Ahn Nyack College Patrick C. K. Hung Hong Kong University of Science and Technology

4 Overview Introduction Related Work Algorithm to find Pareto Optimal Solutions Algorithm to Conduct Bilateral Negotiations Credit Card as Private Information Conclusion and Discussion

5 Introduction Negotiation is an active research topic. Hard to automate. Human’s resist to automation effort. Negotiation is often viewed as more of an art, instead of a science. Automated algorithms are needed in order to implement negotiation systems. Negotiation for Information privacy is a new area. Strong assumptions may make the algorithms too idealistic to be useful.

6 Related Work Negotiation Support System  Focus on “support”, not “automate”. Negotiation Agent  No consensus on how agents negotiate, what to be negotiated. Game Theory  rational assumption is too strong Machine Learning  genetic algorithm  bayesian probability Information Privacy  Focus on enforcing companies’ Privacy Policy. Consumer is powerless, at the mercy of Big Brother, Big Buck.

7 utilities for Agent X utilities for Agent Y Points on the Pareto Frontiers are Pareto optimal solutions Pareto Frontier B C DAE Pareto Optimal Solution

8 Negotiation attributes are pre-defined, and they are not dynamically added. The main task of bilateral negotiation is to assign values to negotiation attributes. Utilities (preferences) for some negotiation attribute values of both sides are not monotonically increasing or decreasing. Otherwise, the algorithm is trivial. Delivery schedule as an example:  It is possible that the enterprise’s preference over delivery is not as early as possible (for buyer), or as late as possible (for supplier).  In JIT (Just-In-Time) manufacturing, the raw materials may need to arrive at the specified time.  The result: preference over the delivery schedule is NOT a monotonically increasing or decreasing function over the time. Assumption for the Algorithm

9 Weeks (or days) Utility for seller for buyer Delivery Schedule as the Example The preference from the buyer’s side is 2, 6, 1, 5, 4, and 3. The preference from the seller’s side is 3, 4, 2, 1, 5, and 6.

10 Algorithm to Conduct Bilateral Negotiation Only Pareto Optimal Solutions are left after the first algorithm has been applied. For each negotiator, each solution is assigned a “counting number”. Negotiators exchange proposals/counterproposals by consulting the pre-assigned “counting number.”

11 X: Number of Proposal Exchange Y: Ordered Preference List of Alternatives P 11 P 12 P 21 P 22 No-Decreasing Curve for N 1 No-Increasing Curve for N 2 PaPa xaxa yaya Proof of Guaranteed Termination

12 Service Provider Service Requestor 1.Visa [3] 2.MC [2] 3.AMEX [5] 4.DC[4] 1.DC [2] 2.MC [3] 3.AMEX [4] 4.Visa[5] Visa (1) DC (1) Visa (2) DC (2) Visa (3) MC (1) Accept MC Credit Card as Private Information

13 Conclusion Two algorithms have been presented. Application of these two algorithms in information privacy. Credit card example may not be very convincing. Algorithms are general enough to be used in other domains.