Artificial Intelligence最新文献

筛选
英文 中文
Grounded predictions of teamwork as a one-shot game: A multiagent multi-armed bandits approach 团队合作作为一个一次性游戏的基础预测:一个多代理多武装的强盗方法
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-13 DOI: 10.1016/j.artint.2025.104307
Alejandra López de Aberasturi Gómez, Carles Sierra, Jordi Sabater-Mir
{"title":"Grounded predictions of teamwork as a one-shot game: A multiagent multi-armed bandits approach","authors":"Alejandra López de Aberasturi Gómez,&nbsp;Carles Sierra,&nbsp;Jordi Sabater-Mir","doi":"10.1016/j.artint.2025.104307","DOIUrl":"10.1016/j.artint.2025.104307","url":null,"abstract":"<div><div>Humans possess innate collaborative capacities. However, effective teamwork often remains challenging. This study delves into the feasibility of collaboration within teams of rational, self-interested agents who engage in teamwork without the obligation to contribute. Drawing from psychological and game theoretical frameworks, we formalise teamwork as a one-shot aggregative game, integrating insights from Steiner's theory of group productivity. We characterise this novel game's Nash equilibria and propose a multiagent multi-armed bandit system that learns to converge to approximations of such equilibria. Our research contributes value to the areas of game theory and multiagent systems, paving the way for a better understanding of voluntary collaborative dynamics. We examine how team heterogeneity, task typology, and assessment difficulty influence agents' strategies and resulting teamwork outcomes. Finally, we empirically study the behaviour of work teams under incentive systems that defy analytical treatment. Our agents demonstrate human-like behaviour patterns, corroborating findings from social psychology research.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104307"},"PeriodicalIF":5.1,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143422377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grammar induction from visual, speech and text 从视觉、语音和文本进行语法归纳
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-12 DOI: 10.1016/j.artint.2025.104306
Yu Zhao , Hao Fei , Shengqiong Wu , Meishan Zhang , Min Zhang , Tat-seng Chua
{"title":"Grammar induction from visual, speech and text","authors":"Yu Zhao ,&nbsp;Hao Fei ,&nbsp;Shengqiong Wu ,&nbsp;Meishan Zhang ,&nbsp;Min Zhang ,&nbsp;Tat-seng Chua","doi":"10.1016/j.artint.2025.104306","DOIUrl":"10.1016/j.artint.2025.104306","url":null,"abstract":"<div><div>Grammar Induction (GI) seeks to uncover the underlying grammatical rules and linguistic patterns of a language, positioning it as a pivotal research topic within Artificial Intelligence (AI). Although extensive research in GI has predominantly focused on text or other singular modalities, we reveal that GI could significantly benefit from rich heterogeneous signals, such as text, vision, and acoustics. In the process, features from distinct modalities essentially serve complementary roles to each other. With such intuition, this work introduces a novel <em>unsupervised visual-audio-text grammar induction</em> task (named <strong>VAT-GI</strong>), to induce the constituent grammar trees from parallel images, text, and speech inputs. Inspired by the fact that language grammar natively exists beyond the texts, we argue that the text has not to be the predominant modality in grammar induction. Thus we further introduce a <em>textless</em> setting of VAT-GI, wherein the task solely relies on visual and auditory inputs. To approach the task, we propose a visual-audio-text inside-outside recursive autoencoder (<strong>VaTiora</strong>) framework, which leverages rich modal-specific and complementary features for effective grammar parsing. Besides, a more challenging benchmark data is constructed to assess the generalization ability of VAT-GI system. Experiments on two benchmark datasets demonstrate that our proposed VaTiora system is more effective in incorporating the various multimodal signals, and also presents new state-of-the-art performance of VAT-GI. Further in-depth analyses are shown to gain a deep understanding of the VAT-GI task and how our VaTiora system advances. Our code and data: <span><span>https://github.com/LLLogen/VAT-GI/</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104306"},"PeriodicalIF":5.1,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143418533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the computation of mixed strategies for security games with general defending requirements 具有一般防御要求的安全博弈混合策略的计算
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-10 DOI: 10.1016/j.artint.2025.104297
Rufan Bai , Haoxing Lin , Xiaowei Wu , Minming Li , Weijia Jia
{"title":"On the computation of mixed strategies for security games with general defending requirements","authors":"Rufan Bai ,&nbsp;Haoxing Lin ,&nbsp;Xiaowei Wu ,&nbsp;Minming Li ,&nbsp;Weijia Jia","doi":"10.1016/j.artint.2025.104297","DOIUrl":"10.1016/j.artint.2025.104297","url":null,"abstract":"<div><div>The Stackelberg security game is played between a defender and an attacker, where the defender needs to allocate a limited amount of resources to multiple targets in order to minimize the loss due to adversarial attacks by the attacker. While allowing targets to have different values, classic settings often assume uniform requirements for defending the targets. This enables existing results that study mixed strategies (randomized allocation algorithms) to adopt a <em>compact representation</em> of the mixed strategies.</div><div>In this work, we initiate the study of mixed strategies for security games in which the targets can have different defending requirements. In contrast to the case of uniform defending requirements, for which an optimal mixed strategy can be computed efficiently, we show that computing the optimal mixed strategy is <span>NP</span>-hard for the general defending requirements setting. However, we show strong upper and lower bounds for the optimal mixed strategy defending result. Additionally, we extend our analysis to study uniform attack settings on these security games.</div><div>We propose an efficient close-to-optimal <span>Patching</span> algorithm that computes mixed strategies using only a few pure strategies. Furthermore, we study the setting when the game is played on a network and resource sharing is enabled between neighboring targets. We show the effectiveness of our algorithm in various large real-world datasets, addressing both uniform and general defending requirements.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104297"},"PeriodicalIF":5.1,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IID prophet inequality with a single data point 单数据点的IID预测不等式
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-07 DOI: 10.1016/j.artint.2025.104296
Yilong Feng , Bo Li , Haolong Li , Xiaowei Wu , Yutong Wu
{"title":"IID prophet inequality with a single data point","authors":"Yilong Feng ,&nbsp;Bo Li ,&nbsp;Haolong Li ,&nbsp;Xiaowei Wu ,&nbsp;Yutong Wu","doi":"10.1016/j.artint.2025.104296","DOIUrl":"10.1016/j.artint.2025.104296","url":null,"abstract":"<div><div>In this work, we study the single-choice prophet inequality problem, where a seller encounters a sequence of <em>n</em> online bids. These bids are modeled as independent and identically distributed (i.i.d.) random variables drawn from an unknown distribution. Upon the revelation of each bid's value, the seller must make an immediate and irrevocable decision on whether to accept the bid and sell the item to the bidder. The objective is to maximize the competitive ratio between the expected gain of the seller and that of the maximum bid. It is shown by Correa et al. <span><span>[1]</span></span> that when the distribution is unknown or only <span><math><mi>o</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> uniform samples from the distribution are given, the best an algorithm can do is <span><math><mn>1</mn><mo>/</mo><mi>e</mi></math></span>-competitive. In contrast, when the distribution is known <span><span>[2]</span></span>, or when <span><math><mi>Ω</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> uniform samples are given <span><span>[3]</span></span>, the optimal competitive ratio of 0.7451 can be achieved. In this paper, we study the setting when the seller has access to a single point in the cumulative density function of the distribution, which can be learned from historical sales data. We investigate how effectively this data point can be used to design competitive algorithms. Motivated by the algorithm for the secretary problem, we propose the observe-and-accept algorithm that sets a threshold in the first phase using the data point and adopts the highest bid from the first phase as the threshold for the second phase. It can be viewed as a natural combination of the single-threshold algorithm for prophet inequality and the secretary problem algorithm. We show that our algorithm achieves a good competitive ratio for a wide range of data points, reaching up to 0.6785-competitive as <span><math><mi>n</mi><mo>→</mo><mo>∞</mo></math></span> for certain data points. Additionally, we study an extension of the algorithm that utilizes more than two phases and show that the competitive ratio can be further improved to at least 0.6862.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104296"},"PeriodicalIF":5.1,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explanations for query answers under existential rules 存在规则下查询答案的解释
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-04 DOI: 10.1016/j.artint.2025.104294
İsmail İlkan Ceylan , Thomas Lukasiewicz , Enrico Malizia , Andrius Vaicenavičius
{"title":"Explanations for query answers under existential rules","authors":"İsmail İlkan Ceylan ,&nbsp;Thomas Lukasiewicz ,&nbsp;Enrico Malizia ,&nbsp;Andrius Vaicenavičius","doi":"10.1016/j.artint.2025.104294","DOIUrl":"10.1016/j.artint.2025.104294","url":null,"abstract":"<div><div>Ontology-based data access is an extensively studied paradigm aiming at improving query answers with the use of an “ontology”. An ontology is a specification of a domain of interest, which, in this context, is described via a logical theory. As a form of logical entailment, ontology-mediated query answering is fully interpretable, which makes it possible to derive explanations for ontological query answers. This is a quite important aspect, as the fact that many recent AI systems mostly operating as black boxes has led to some serious concerns. In the literature, various works on explanations in the context of description logics (DLs) have appeared, mostly focusing on explaining concept subsumption and concept unsatisfiability in the ontologies. Some works on explaining query entailment in DLs have appeared as well, however, mainly dealing with inconsistency-tolerant semantics and, actually, <em>non</em>-entailment of the queries. Surprisingly, explaining ontological query entailment has received little attention for ontology languages based on existential rules. In fact, although DLs are popular formalisms to model ontologies, it is generally agreed that rule-based ontologies are well-suited for data-intensive applications, as they allow us to conveniently deal with higher-arity relations, which naturally occur in standard relational databases. The goal of this work is to close this gap, and study the problem of explaining query entailment in the context of existential rules ontologies in terms of minimal subsets of database facts. We provide a thorough complexity analysis for several decision problems associated with minimal explanations for various classes of existential rules, and for different complexity measures.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104294"},"PeriodicalIF":5.1,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143394775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No free lunch theorem for privacy-preserving LLM inference 保护隐私的LLM推理没有免费午餐定理
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-04 DOI: 10.1016/j.artint.2025.104293
Xiaojin Zhang , Yahao Pang , Yan Kang , Wei Chen , Lixin Fan , Hai Jin , Qiang Yang
{"title":"No free lunch theorem for privacy-preserving LLM inference","authors":"Xiaojin Zhang ,&nbsp;Yahao Pang ,&nbsp;Yan Kang ,&nbsp;Wei Chen ,&nbsp;Lixin Fan ,&nbsp;Hai Jin ,&nbsp;Qiang Yang","doi":"10.1016/j.artint.2025.104293","DOIUrl":"10.1016/j.artint.2025.104293","url":null,"abstract":"<div><div>Individuals and businesses have been significantly benefited by Large Language Models (LLMs) including PaLM, Gemini and ChatGPT in various ways. For example, LLMs enhance productivity, reduce costs, and enable us to focus on more valuable tasks. Furthermore, LLMs possess the capacity to sift through extensive datasets, uncover underlying patterns, and furnish critical insights that propel the frontiers of technology and science. However, LLMs also pose privacy concerns. Users' interactions with LLMs may expose their sensitive personal or company information. A lack of robust privacy safeguards and legal frameworks could permit the unwarranted intrusion or improper handling of individual data, thereby risking infringements of privacy and the theft of personal identities. To ensure privacy, it is essential to minimize the dependency between shared prompts and private information. Various randomization approaches have been proposed to protect prompts' privacy, but they may incur utility loss compared to unprotected LLMs prompting. Therefore, it is essential to evaluate the balance between the risk of privacy leakage and loss of utility when conducting effective protection mechanisms. The current study develops a framework for inferring privacy-protected Large Language Models (LLMs) and lays down a solid theoretical basis for examining the interplay between privacy preservation and utility. The core insight is encapsulated within a theorem that is called as the NFL (abbreviation of the word No-Free-Lunch) Theorem.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"341 ","pages":"Article 104293"},"PeriodicalIF":5.1,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143394774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Kripke-Lewis semantics for belief update and belief revision 信念更新与修正的Kripke-Lewis语义
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104259
Giacomo Bonanno
{"title":"A Kripke-Lewis semantics for belief update and belief revision","authors":"Giacomo Bonanno","doi":"10.1016/j.artint.2024.104259","DOIUrl":"10.1016/j.artint.2024.104259","url":null,"abstract":"<div><div>We provide a new characterization of both belief update and belief revision in terms of a Kripke-Lewis semantics. We consider frames consisting of a set of states, a Kripke belief relation and a Lewis selection function. Adding a valuation to a frame yields a model. Given a model and a state, we identify the initial belief set <em>K</em> with the set of formulas that are believed at that state and we identify either the updated belief set <span><math><mi>K</mi><mo>⋄</mo><mi>ϕ</mi></math></span> or the revised belief set <span><math><mi>K</mi><mo>⁎</mo><mi>ϕ</mi></math></span> (prompted by the input represented by formula <em>ϕ</em>) as the set of formulas that are the consequent of conditionals that (1) are believed at that state and (2) have <em>ϕ</em> as antecedent. We show that this class of models characterizes both the Katsuno-Mendelzon (KM) belief update functions and the Alchourrón, Gärdenfors and Makinson (AGM) belief revision functions, in the following sense: (1) each model gives rise to a partial belief function that can be completed into a full KM/AGM update/revision function, and (2) for every KM/AGM update/revision function there is a model whose associated belief function coincides with it. The difference between update and revision can be reduced to two semantic properties that appear in a stronger form in revision relative to update, thus confirming the finding by Peppas et al. (1996) <span><span>[30]</span></span> that, “for a fixed theory <em>K</em>, revising <em>K</em> is much the same as updating <em>K</em>”. It is argued that the proposed semantic characterization brings into question the common interpretation of belief revision and update as change in beliefs in response to new information.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104259"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142788884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMOA*: A framework for search-based multi-objective path planning EMOA*:基于搜索的多目标路径规划框架
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104260
Zhongqiang Ren , Carlos Hernández , Maxim Likhachev , Ariel Felner , Sven Koenig , Oren Salzman , Sivakumar Rathinam , Howie Choset
{"title":"EMOA*: A framework for search-based multi-objective path planning","authors":"Zhongqiang Ren ,&nbsp;Carlos Hernández ,&nbsp;Maxim Likhachev ,&nbsp;Ariel Felner ,&nbsp;Sven Koenig ,&nbsp;Oren Salzman ,&nbsp;Sivakumar Rathinam ,&nbsp;Howie Choset","doi":"10.1016/j.artint.2024.104260","DOIUrl":"10.1016/j.artint.2024.104260","url":null,"abstract":"<div><div>In the Multi-Objective Shortest Path Problem (MO-SPP), one has to find paths on a graph that simultaneously minimize multiple objectives. It is not guaranteed that there exists a path that minimizes all objectives, and the problem thus aims to find the set of Pareto-optimal paths from the start to the goal vertex. A variety of multi-objective A*-based search approaches have been developed for this purpose. Typically, these approaches maintain a front set at each vertex during the search process to keep track of the Pareto-optimal paths that reach that vertex. Maintaining these front sets becomes burdensome and often slows down the search when there are many Pareto-optimal paths. In this article, we first introduce a framework for MO-SPP with the key procedures related to the front sets abstracted and highlighted, which provides a novel perspective for understanding the existing multi-objective A*-based search algorithms. Within this framework, we develop two different, yet closely related approaches to maintain these front sets efficiently during the search. We show that our approaches can find all cost-unique Pareto-optimal paths, and analyze their runtime complexity. We implement the approaches and compare them against baselines using instances with three, four and five objectives. Our experimental results show that our approaches run up to an order of magnitude faster than the baselines.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104260"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142788886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Out-of-distribution detection by regaining lost clues 通过恢复丢失的线索进行分布外检测
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104275
Zhilin Zhao , Longbing Cao , Philip S. Yu
{"title":"Out-of-distribution detection by regaining lost clues","authors":"Zhilin Zhao ,&nbsp;Longbing Cao ,&nbsp;Philip S. Yu","doi":"10.1016/j.artint.2024.104275","DOIUrl":"10.1016/j.artint.2024.104275","url":null,"abstract":"<div><div>Out-of-distribution (OOD) detection identifies samples in the test phase that are drawn from distributions distinct from that of training in-distribution (ID) samples for a trained network. According to the information bottleneck, networks that classify tabular data tend to extract labeling information from features with strong associations to ground-truth labels, discarding less relevant labeling cues. This behavior leads to a predicament in which OOD samples with limited labeling information receive high-confidence predictions, rendering the network incapable of distinguishing between ID and OOD samples. Hence, exploring more labeling information from ID samples, which makes it harder for an OOD sample to obtain high-confidence predictions, can address this over-confidence issue on tabular data. Accordingly, we propose a novel transformer chain (TC), which comprises a sequence of dependent transformers that iteratively regain discarded labeling information and integrate all the labeling information to enhance OOD detection. The generalization bound theoretically reveals that TC can balance ID generalization and OOD detection capabilities. Experimental results demonstrate that TC significantly surpasses state-of-the-art methods for OOD detection in tabular data.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104275"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal verification and synthesis of mechanisms for social choice 社会选择机制的形式验证与综合
IF 5.1 2区 计算机科学
Artificial Intelligence Pub Date : 2025-02-01 DOI: 10.1016/j.artint.2024.104272
Munyque Mittelmann , Bastien Maubert , Aniello Murano , Laurent Perrussel
{"title":"Formal verification and synthesis of mechanisms for social choice","authors":"Munyque Mittelmann ,&nbsp;Bastien Maubert ,&nbsp;Aniello Murano ,&nbsp;Laurent Perrussel","doi":"10.1016/j.artint.2024.104272","DOIUrl":"10.1016/j.artint.2024.104272","url":null,"abstract":"<div><div>Mechanism Design (MD) aims at defining resources allocation protocols that satisfy a predefined set of properties, and Auction Mechanisms are of foremost importance. Core properties of mechanisms, such as strategy-proofness or budget balance, involve: (i) complex strategic concepts such as Nash equilibria, (ii) quantitative aspects such as utilities, and often (iii) imperfect information, with agents' private valuations. We demonstrate that Strategy Logic provides a formal framework fit to model mechanisms and express such properties, and we show that it can be used either to automatically check that a given mechanism satisfies some property (verification), or automatically produce a mechanism that does (synthesis). To do so, we consider a quantitative and variant of Strategy Logic. We first show how to express the implementation of social choice functions. Second, we show how fundamental mechanism properties can be expressed as logical formulas, and thus evaluated by model checking. We then prove that model checking for this particular variant of Strategy Logic can be done in polynomial space. Next, we show how MD can be rephrased as a synthesis problem, where mechanisms are automatically synthesized from a partial or complete logical specification. We solve the automated synthesis of mechanisms in two cases: when the number of actions is bounded, and when agents play in turns. Finally, we provide examples of auction design based for each of these two cases. The benefit of our approach in relation to classical MD is to provide a general framework for addressing a large spectrum of MD problems, which is not tailored to a particular setting or problem.</div></div>","PeriodicalId":8434,"journal":{"name":"Artificial Intelligence","volume":"339 ","pages":"Article 104272"},"PeriodicalIF":5.1,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142821057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信