Communications of the ACM
Artificial Intelligence - Special issue: Fuzzy set and possibility theory-based methods in artificial intelligence
Composition of Secure Multi-Party Protocols: A Comprehensive Study
Composition of Secure Multi-Party Protocols: A Comprehensive Study
Optimal Negotiation of Multiple Issues in Incomplete Information Settings
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
Modeling complex multi-issue negotiations using utility graphs
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Human vs. Computer Behaviour in Multi-Issue Negotiation
RRS '05 Proceedings of the Rational, Robust, and Secure Negotiation Mechanisms in Multi-Agent Systems (RRS'05) on Multi-Agent Systems
Approximate and online multi-issue negotiation
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
A preliminary result on a representative-based multi-round protocol for multi-issue negotiations
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 3
Effective bidding and deal identification for negotiations in highly nonlinear scenarios
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Multi-issue negotiation protocol for agents: exploring nonlinear utility spaces
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Artificial Intelligence: A Modern Approach
Artificial Intelligence: A Modern Approach
Studying the impact of negotiation environments on negotiation teams' performance
Information Sciences: an International Journal
Hi-index | 0.00 |
Multi-issue negotiation protocols represent a promising field sincemost negotiation problems in the real world involve multiple issues. Our work focuses on negotiation with multiple interdependent issues in which agent utility functions are nonlinear. Firstly, we define utility function based on cone-constraints which are nonlinear. The utility function based on cone-constraint is more realistic than existing utility models and configures the risk attitudes to the cone-constraint. However, if the utility function has cone-constraint features, the utility space becomes extremely nonlinear, making it very difficult to find the optimal agreement point. Existing works have not yet concerned with agents' private information that should be concealed from others in negotiations. In this paper, we propose Distributed Mediator Protocol and Take it or Leave it Protocol for negotiation that can reach agreements and completely conceal agents’ private information. Moreover, we propose Hybrid Secure Protocol that combines Distributed Mediator Protocol with Take it or Leave it Protocol. The Hybrid Secure Protocol can also reach agreements while completely concealing agents’ private information. Furthermore, the Hybrid Secure Protocol achieves high optimality and uses less communication cost. We demonstrate the performance of Hybrid Secure Protocol in cone-constraints and cube-constraints situations.