Integrating domain and constraint privacy reasoning in the distributed stochastic algorithm with breakouts
Privacy has traditionally been a major motivation of distributed problem solving. One popular approach to enable privacy in distributed environments is to implement complex cryptographic protocols. In this paper, we propose a different, orthogonal approach, which is to control the quality and the qu...
Gespeichert in:
| Veröffentlicht in: | Annals of mathematics and artificial intelligence Jg. 90; H. 1; S. 31 - 73 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Cham
Springer International Publishing
01.01.2022
Springer Springer Nature B.V Springer Verlag |
| Schlagworte: | |
| ISSN: | 1012-2443, 1573-7470 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Privacy has traditionally been a major motivation of distributed problem solving. One popular approach to enable privacy in distributed environments is to implement complex cryptographic protocols. In this paper, we propose a different, orthogonal approach, which is to control the quality and the quantity of publicized data. We consider the Open Constraint Programming model and focus on algorithms that solve Distributed Constraint Optimization Problems (DCOPs) using a local search approach. Two such popular algorithms exist to find good solutions to DCOP: DSA and GDBA. In this paper, we propose DSAB, a new algorithm that merges ideas from both algorithms to allow extensive handling of constraint privacy. We also study how algorithms behave when solving Utilitarian DCOPs, where utilitarian agents want to reach an agreement while reducing the privacy loss. We experimentally study how the utilitarian approach impacts the quality of the solution and of publicized data. |
|---|---|
| AbstractList | Privacy has traditionally been a major motivation of distributed problem solving. One popular approach to enable privacy in distributed environments is to implement complex cryptographic protocols. In this paper, we propose a different, orthogonal approach, which is to control the quality and the quantity of publicized data. We consider the Open Constraint Programming model and focus on algorithms that solve Distributed Constraint Optimization Problems (DCOPs) using a local search approach. Two such popular algorithms exist to find good solutions to DCOP: DSA and GDBA. In this paper, we propose DSAB, a new algorithm that merges ideas from both algorithms to allow extensive handling of constraint privacy. We also study how algorithms behave when solving Utilitarian DCOPs, where utilitarian agents want to reach an agreement while reducing the privacy loss. We experimentally study how the utilitarian approach impacts the quality of the solution and of publicized data. Keywords Multi-agent system * Privacy * Distributed constraint problems * Local search Mathematics Subject Classification (2010) 68T42 Privacy has traditionally been a major motivation of distributed problem solving. One popular approach to enable privacy in distributed environments is to implement complex cryptographic protocols. In this paper, we propose a different, orthogonal approach, which is to control the quality and the quantity of publicized data. We consider the Open Constraint Programming model and focus on algorithms that solve Distributed Constraint Optimization Problems (DCOPs) using a local search approach. Two such popular algorithms exist to find good solutions to DCOP: DSA and GDBA. In this paper, we propose DSAB, a new algorithm that merges ideas from both algorithms to allow extensive handling of constraint privacy. We also study how algorithms behave when solving Utilitarian DCOPs, where utilitarian agents want to reach an agreement while reducing the privacy loss. We experimentally study how the utilitarian approach impacts the quality of the solution and of publicized data. |
| Audience | Academic |
| Author | Vion, Julien Silaghi, Marius Mandiau, René Piechowiak, Sylvain |
| Author_xml | – sequence: 1 givenname: Julien orcidid: 0000-0003-1539-9846 surname: Vion fullname: Vion, Julien email: julien.vion@uphf.fr organization: Univ. Polytechnique Hauts-de-France, LAMIH, CNRS, UMR 8201 – sequence: 2 givenname: René surname: Mandiau fullname: Mandiau, René organization: Univ. Polytechnique Hauts-de-France, LAMIH, CNRS, UMR 8201 – sequence: 3 givenname: Sylvain surname: Piechowiak fullname: Piechowiak, Sylvain organization: Univ. Polytechnique Hauts-de-France, LAMIH, CNRS, UMR 8201 – sequence: 4 givenname: Marius surname: Silaghi fullname: Silaghi, Marius organization: Florida Institute of Technology |
| BackLink | https://uphf.hal.science/hal-03396233$$DView record in HAL |
| BookMark | eNp9kU1rXCEUhqWk0CTtH-hKyKqLm_hx1XE5hLYJDHTTrsXrxx0nM5qqk5J_3zO9IdkVQY-H5z28nPcCneWSA0KfKbmmhKibRsmo2EAYHYhWXAziHTqnQvFBjYqcQU0oG9g48g_oorUdIUTLlTxHu_vcw1xtT3nGvhxsythmj13JrVf4dfxY05N1z7gG20o-ccD0bcA-AZKmYw8et17c1raeHLb7udTUtwf8B248ge6hHHv7iN5Hu2_h08t7iX59-_rz9m7Y_Ph-f7veDI6PvA96FaxXQTrJhYokejcR51cCSiFjpHTio43W60BDlI57LSfmKZtYBIHW_BJ9WeZu7d6A-YOtz6bYZO7WG3PqEc61ZJw_UWCvFvaxlt_H0LrZlWPNYM8wTVeMcC0YUNcLNdt9MCnHAqtxcHw4JNhUiAn6a0XlKLQUHARsEbhaWqshvvqgxJwCM0tgBgIz_wIzAkR8ETWA8xzqm5f_qP4CDS2cWg |
| Cites_doi | 10.1016/0004-3702(92)90007-K 10.1613/jair.3197 10.1142/S0218488502001648 10.1007/s10601-008-9048-x 10.1613/jair.5322 10.1007/s10472-019-09628-8 10.1016/j.artint.2018.08.002 10.1145/242587.242589 10.1016/j.artint.2004.10.004 10.1613/jair.3945 10.1007/978-3-642-00487-2_56 10.1016/j.artint.2014.03.002 10.1016/j.artint.2004.08.004 10.1145/1329125.1329333 10.1007/BFb0017442 10.1613/jair.3983 10.1109/WIIAT.2008.177 10.1145/76894.76895 10.1613/jair.5504 10.1023/B:JMMA.0000026709.24659.da 10.1109/WIIAT.2008.426 10.1016/j.artint.2004.10.005 10.1007/978-3-319-18008-3_19 10.1109/69.729707 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Nature Switzerland AG 2021 COPYRIGHT 2022 Springer The Author(s), under exclusive licence to Springer Nature Switzerland AG 2021. Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Nature Switzerland AG 2021 – notice: COPYRIGHT 2022 Springer – notice: The Author(s), under exclusive licence to Springer Nature Switzerland AG 2021. – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PTHSS 1XC |
| DOI | 10.1007/s10472-021-09735-5 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central (ProQuest) Technology collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition Engineering collection Hyper Article en Ligne (HAL) |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Mathematics Computer Science |
| EISSN | 1573-7470 |
| EndPage | 73 |
| ExternalDocumentID | oai:HAL:hal-03396233v1 A716459653 10_1007_s10472_021_09735_5 |
| GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 2.D 203 23M 28- 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFEXP AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IAO IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV KOW LAK LLZTM M4Y M7S MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9O PF0 PT4 PT5 PTHSS QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TN5 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z81 Z83 Z88 Z92 ZMTXR ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG ADKFA AEZWR AFDZB AFFHD AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V P62 PKEHL PQEST PQQKQ PQUKI 1XC |
| ID | FETCH-LOGICAL-c343t-98ead7e6c6357f0fdcb0cd85f0f56ff11b34afad9e1ef6c3d96b2d12b2f357993 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000641680100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1012-2443 |
| IngestDate | Tue Oct 14 20:27:40 EDT 2025 Wed Nov 05 15:00:25 EST 2025 Sat Nov 29 09:48:19 EST 2025 Sat Nov 29 05:14:37 EST 2025 Fri Feb 21 02:46:38 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Distributed constraint problems Privacy Local search 68T42 Multi-agent system "Privacy" "Multi-agent system" "Distributed constraint problems" "Local search" |
| Language | English |
| License | Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c343t-98ead7e6c6357f0fdcb0cd85f0f56ff11b34afad9e1ef6c3d96b2d12b2f357993 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-1539-9846 0000-0001-7722-9848 |
| PQID | 2918203952 |
| PQPubID | 2043872 |
| PageCount | 43 |
| ParticipantIDs | hal_primary_oai_HAL_hal_03396233v1 proquest_journals_2918203952 gale_infotracacademiconefile_A716459653 crossref_primary_10_1007_s10472_021_09735_5 springer_journals_10_1007_s10472_021_09735_5 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-01-01 |
| PublicationDateYYYYMMDD | 2022-01-01 |
| PublicationDate_xml | – month: 01 year: 2022 text: 2022-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Cham – name: Dordrecht |
| PublicationTitle | Annals of mathematics and artificial intelligence |
| PublicationTitleAbbrev | Ann Math Artif Intell |
| PublicationYear | 2022 |
| Publisher | Springer International Publishing Springer Springer Nature B.V Springer Verlag |
| Publisher_xml | – name: Springer International Publishing – name: Springer – name: Springer Nature B.V – name: Springer Verlag |
| References | Doshi, P., Matsui, T., Silaghi, M., Yokoo, M., Zanker, M.: Distributed private constraint optimization. In: Proc. IEEE/WIC/ACM Itl Conf on Intelligent Agent Technology, pp 277–281. IEEE Computer Society, Washington (2008) Sweeney, L.: K-anonymity: A model for protecting privacy. In: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. issn: 0218-4885. https://doi.org/10.1142/S0218488502001648, vol. 10.5, pp 557–570 (2002) Hirayama, K., Yokoo, M.: Distributed Partial Constraint Satisfaction Problem, Principles and Practice of Constraint Programming -. In: CP97, Third International Conference, Linz, Austria, October 29 - November 1 1997 Proceedings. Ed. by Gert Smolka. vol. 1330 Lecture Notes in Computer Science, pp 222–236. Springer (1997) Greenstadt, R., Pearce, J.P., Tambe, M.: Analysis of privacy loss in distributed constraint optimization. In: Proc 21st Nat. Conf. on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conf, pp 647–653. AAAI Press (2006) Yokoo, M., Hirayama, K.: Distributed breakout algorithm for solving distributed constraint satisfaction problems. In: Proc. of the 2nd Itl Conf on Multi-Agent Systems, pp 401–408. AAAI Press (1996) Zhang, W., Wang, G., Xing, Z., Wittenburg, L.: Distributed stochastic search and distributed breakout: Properties, comparison and applications to constraint optimization problems in sensor networks. In: Artificial Intelligence, vol. 161.1-2, pp 55–87 (2005) Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: A comparative study. In: ACM Computing Surveys. issn: 0360-0300. https://doi.org/10.1145/76894.76895, vol. 21.4, pp 515–556 (1989) Walsh, T.: Stochastic constraint programming. In: Proceedings of the 15th european conference on artificial intelligence, pp 111–115. IOS Press (2002) Petcu, A, Faltings, B: A scalable method for multiagent constraint optimization. In: Kaelbling, LP, Saffiotti, A (eds.) IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30 - August 5, 2005, pp 266–271. Professional Book Center (2005) Savaux, J., Vion, J., Piechowiak, S., Mandiau, R., Matsui, T., Hirayama, K., Yokoo, M., Elmane, S., Silaghi, M.: Utilitarian approach to privacy in distributed constraint optimization problems. In: Proc. 30th FLAIRS, pp 454–459 (2017) Zivan, R., Okamoto, S., Peled, H.: Explorative anytime local search for distributed constraint optimization. In: Artificial Intelligence, vol. 212, pp 1–26 (2014) Mairy, J.-B., Deville, Y., Lecoutre, C.: The smart table constraint. In: Michel, L. (ed.) Proc. 12th CPAIOR. isbn: 978-3-319-18008-3, pp 271–287. Springer International Publishing, New York (2015) Savaux, J., Vion, J., Piechowiak, S., Mandiau, R., Matsui, T., Hirayama, K., Yokoo, M., Elmane, S., Silaghi, M.: Privacy stochastic games in distributed constraint reasoning. In: Annals of Mathematics and Artificial Intelligence, vol. 88.7, pp 691–715 (2020) Vion, J.: Concrete: A CSP Solving API for the JVM. http://github.com/concretecp(2006) Grinshpoun, T.: When You Say (DCOP) Privacy, What Do Mean? - Categorization of DCOP Privacy and Insights on Internal Constraint Privacy. In: Joaquim, F., Fred, A.L.N. (eds.) Proc. of the 4Th Itl Conference on Agents and Artificial Intelligence (ICAART), pp 380–386. SciTePress, Portugal (2012) Bonér, J., The Akka Team at Lightbend: Akka: Build powerful reactive, concurrent, and distributed applications more easily. akka.io (2009) Hirayama, K., Yokoo, M.: The distributed breakout algorithms. In: Artificial Intelligence, vol. 161.1-2, pp 89–115 (2005) Crépin, L., Demazeau, Y., Boissier, O., Jacquenet, F.: Privacy preservation in a decentralized calendar system. In: Proc. 7th Itl Conf on Practical Applications of Agents and Multi-Agent Systems (PAAMS). vol. 55. Advances in Intelligent and Soft Computing, pp 529–537 (2009) Greenstadt, R., Grosz, B., Smith, M.D.: SSDPOP: Improving the privacy of DCOP with secret sharing. In: Proc. of the 6th Itl joint conference on Autonomous agents and multiagent systems. IFAAMAS, p 171 (2007) Collin, Z., Dechter, R., Katz, S.: On the feasibility of distributed constraint satisfaction. In: Mylopoulos, J., Reiter, R. (eds.) Proceedings of the 12th International Joint Conference on Artificial Intelligence. Sydney, Australia, August 24-30, 1991, pp 318–324. Morgan Kaufmann, Burlington (1991) Grinshpoun, T., Grubshtein, A., Zivan, R., Netzer, A., Meisels, A.: Asymmetric Distributed Constraint Optimization Problems. In: Journal of Artificial Intelligence Research, vol. 47, pp 613–647 (2013) Minton, S., Johnston, M. D., Philips, A. B., Laird, P.: Minimizing conicts: A heuristic repair method for constraint-satisfaction and scheduling problems. In: Artificial Intelligence, vol. 58.1-3, pp 161–205 (1992) Fluckiger, A., Verman, M., Berstein, A.: Improving approximate algorithms for dcops using ranks. In: International Workshop on Optimisation in Multi-Agent Systems, Singapore (2016) Freuder, E.C., Minca, M., Wallace, R.J.: Privacy/efficiency tradeoffs in distributed meeting scheduling by constraint-based agents. In: IJCAI Workshop on Distributed Constraint Reasoning, pp. 63–72 (2001) Galinier, P., Hao, J. K.: A general approach for constraint solving by local search. In: Journal of Mathematical Modelling and Algorithms 3, vol. 1, pp 73–88 (2004) Arshad, M., Silaghi, M.C.: Distributed simulated annealing. In: Distributed Constraint Problem Solving and Reasoning in Multi-Agent Systems, p 112 (2004) Morris, P.: The breakout method for escaping from local minima. In: Proceedings of AAAI’93, pp 40–45 (1993) Faltings, B., Macho-Gonzalez, S.: Open constraint programming. In: Artificial Intelligence 161.1. Distributed Constraint Satisfaction. issn: 0004-3702, pp 181–208 (2005) Hamadi, Y., Bessiere, C., Quinqueton, J.: Backtracking in Distributed Constraint Networks. In: Proc. of 13Th European Conf. on Artificial Intelligence (ECAI). Brighton, UK, pp 219–223 (1998) Silaghi, M., Mitra, D.: Distributed constraint satisfaction and optimization with privacy enforcement. In: Intelligent Agent Technology (IAT), pp 531–535. IEEE (2004) Grinshpoun, T., Tassa, T., Levit, V., Zivan, R.: Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs. In: Artificial Intelligence, vol. 266, pp 27–50 (2019) Faltings, B., Léauté, T., Petcu, A.: Privacy guarantees through distributed constraint satisfaction. In: Proc. IEEE/WIC/ACM Itl Conf on Intelligent Agent Technology, vol. 2, pp 350–358. IEEE Computer Society, Washington (2008) Wallace, R.J., Freuder, E.C.: Anytime Algorithms for Constraint Satisfaction and SAT Problems. In: ACM SIGART Bulletin, vol. 7.2, pp 7–10 (1996) Yokoo, M., Durfee, E.H., Ishida, T., Kuwabara, K.: The distributed constraint satisfaction problem: formalization and algorithms. In: IEEE Transactions on Knowledge and Data Engineering, vol. 10.5, pp 673–685 (1998) Brito, I., Meisels, A., Meseguer, P., Zivan, R.: Distributed constraint satisfaction with partially known constraints. In: Constraints, vol. 14.2, pp 199–234 (2009) Okamoto, S., Zivan, R., Nahon, A.: Distributed Breakout: Beyond Satisfaction. In: Proc. 25th IJCAI, pp 447–453 (2016) Hewitt, C., Bishop, P., Steiger, R.: A universal modular ACTOR formalism for artificial intelligence (1973) Maheswaran, R.T., Pearce, J.P., Tambe, M.: Distributed algorithms for DCOP: A graphical-game-based approach. In: Proceedings of ISCA 17th PDCS, pp 432–439 (2004) Vion, J., Mandiau, R., Piechowiak, S., Silaghi, M.C.: Privacy for the distributed stochastic algorithm with breakouts. In: Proc. Itl Symposium on Artificial Intelligence and Mathematics (ISAIM) (2020) Tassa, T., Zivan, R., Grinshpoun, T.: Privacy preserving implementation of the max-sum algorithm and its variances. In: JAIR, vol. 59, pp 311–349 (2017) Zhang, W., Wang, G., Wittenburg, L.: Distributed stochastic search for constraint satisfaction and optimization: Parallelism, phase transitions and performance. In: Proceedings of AAAI Workshop on Probabilistic Approaches in Search. Alberta, Canada (2002) Léauté, T., Faltings, B.: Protecting privacy through distributed computation in multi-agent decision making. In: Journal Artificial Intelligence Research (JAIR), vol. 47, pp 649–695 (2013) Hebrard, E., Marx, D., O’Sullivan, B., Razgon, I.: Soft constraints of difference and equality. In: Journal of Artificial Intelligence Research. issn: 1076–9757, vol. 41.2, pp 97–130 (2011) Grinshpoun, T., Tassa, T.: P-SyncBB: A privacy preserving branch and bound dcop algorithm. In: Journal of Artificial Intelligence Research (JAIR), vol. 57, pp 621–660 (2016) 9735_CR22 9735_CR44 9735_CR23 9735_CR20 9735_CR42 9735_CR21 9735_CR43 9735_CR40 9735_CR41 9735_CR5 9735_CR4 9735_CR3 9735_CR28 9735_CR2 9735_CR29 9735_CR1 9735_CR26 9735_CR27 9735_CR24 9735_CR25 9735_CR9 9735_CR8 9735_CR7 9735_CR6 9735_CR11 9735_CR33 9735_CR12 9735_CR34 9735_CR31 9735_CR10 9735_CR32 9735_CR30 9735_CR19 9735_CR17 9735_CR39 9735_CR18 9735_CR15 9735_CR37 9735_CR16 9735_CR38 9735_CR13 9735_CR35 9735_CR14 9735_CR36 |
| References_xml | – reference: Hamadi, Y., Bessiere, C., Quinqueton, J.: Backtracking in Distributed Constraint Networks. In: Proc. of 13Th European Conf. on Artificial Intelligence (ECAI). Brighton, UK, pp 219–223 (1998) – reference: Hewitt, C., Bishop, P., Steiger, R.: A universal modular ACTOR formalism for artificial intelligence (1973) – reference: Zivan, R., Okamoto, S., Peled, H.: Explorative anytime local search for distributed constraint optimization. In: Artificial Intelligence, vol. 212, pp 1–26 (2014) – reference: Yokoo, M., Durfee, E.H., Ishida, T., Kuwabara, K.: The distributed constraint satisfaction problem: formalization and algorithms. In: IEEE Transactions on Knowledge and Data Engineering, vol. 10.5, pp 673–685 (1998) – reference: Savaux, J., Vion, J., Piechowiak, S., Mandiau, R., Matsui, T., Hirayama, K., Yokoo, M., Elmane, S., Silaghi, M.: Utilitarian approach to privacy in distributed constraint optimization problems. In: Proc. 30th FLAIRS, pp 454–459 (2017) – reference: Silaghi, M., Mitra, D.: Distributed constraint satisfaction and optimization with privacy enforcement. In: Intelligent Agent Technology (IAT), pp 531–535. IEEE (2004) – reference: Fluckiger, A., Verman, M., Berstein, A.: Improving approximate algorithms for dcops using ranks. In: International Workshop on Optimisation in Multi-Agent Systems, Singapore (2016) – reference: Hirayama, K., Yokoo, M.: The distributed breakout algorithms. In: Artificial Intelligence, vol. 161.1-2, pp 89–115 (2005) – reference: Walsh, T.: Stochastic constraint programming. In: Proceedings of the 15th european conference on artificial intelligence, pp 111–115. IOS Press (2002) – reference: Wallace, R.J., Freuder, E.C.: Anytime Algorithms for Constraint Satisfaction and SAT Problems. In: ACM SIGART Bulletin, vol. 7.2, pp 7–10 (1996) – reference: Petcu, A, Faltings, B: A scalable method for multiagent constraint optimization. In: Kaelbling, LP, Saffiotti, A (eds.) IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30 - August 5, 2005, pp 266–271. Professional Book Center (2005) – reference: Yokoo, M., Hirayama, K.: Distributed breakout algorithm for solving distributed constraint satisfaction problems. In: Proc. of the 2nd Itl Conf on Multi-Agent Systems, pp 401–408. AAAI Press (1996) – reference: Galinier, P., Hao, J. K.: A general approach for constraint solving by local search. In: Journal of Mathematical Modelling and Algorithms 3, vol. 1, pp 73–88 (2004) – reference: Greenstadt, R., Pearce, J.P., Tambe, M.: Analysis of privacy loss in distributed constraint optimization. In: Proc 21st Nat. Conf. on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conf, pp 647–653. AAAI Press (2006) – reference: Zhang, W., Wang, G., Wittenburg, L.: Distributed stochastic search for constraint satisfaction and optimization: Parallelism, phase transitions and performance. In: Proceedings of AAAI Workshop on Probabilistic Approaches in Search. Alberta, Canada (2002) – reference: Greenstadt, R., Grosz, B., Smith, M.D.: SSDPOP: Improving the privacy of DCOP with secret sharing. In: Proc. of the 6th Itl joint conference on Autonomous agents and multiagent systems. IFAAMAS, p 171 (2007) – reference: Grinshpoun, T., Grubshtein, A., Zivan, R., Netzer, A., Meisels, A.: Asymmetric Distributed Constraint Optimization Problems. In: Journal of Artificial Intelligence Research, vol. 47, pp 613–647 (2013) – reference: Arshad, M., Silaghi, M.C.: Distributed simulated annealing. In: Distributed Constraint Problem Solving and Reasoning in Multi-Agent Systems, p 112 (2004) – reference: Léauté, T., Faltings, B.: Protecting privacy through distributed computation in multi-agent decision making. In: Journal Artificial Intelligence Research (JAIR), vol. 47, pp 649–695 (2013) – reference: Mairy, J.-B., Deville, Y., Lecoutre, C.: The smart table constraint. In: Michel, L. (ed.) Proc. 12th CPAIOR. isbn: 978-3-319-18008-3, pp 271–287. Springer International Publishing, New York (2015) – reference: Crépin, L., Demazeau, Y., Boissier, O., Jacquenet, F.: Privacy preservation in a decentralized calendar system. In: Proc. 7th Itl Conf on Practical Applications of Agents and Multi-Agent Systems (PAAMS). vol. 55. Advances in Intelligent and Soft Computing, pp 529–537 (2009) – reference: Grinshpoun, T., Tassa, T., Levit, V., Zivan, R.: Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs. In: Artificial Intelligence, vol. 266, pp 27–50 (2019) – reference: Collin, Z., Dechter, R., Katz, S.: On the feasibility of distributed constraint satisfaction. In: Mylopoulos, J., Reiter, R. (eds.) Proceedings of the 12th International Joint Conference on Artificial Intelligence. Sydney, Australia, August 24-30, 1991, pp 318–324. Morgan Kaufmann, Burlington (1991) – reference: Adam, N.R., Worthmann, J.C.: Security-control methods for statistical databases: A comparative study. In: ACM Computing Surveys. issn: 0360-0300. https://doi.org/10.1145/76894.76895, vol. 21.4, pp 515–556 (1989) – reference: Grinshpoun, T., Tassa, T.: P-SyncBB: A privacy preserving branch and bound dcop algorithm. In: Journal of Artificial Intelligence Research (JAIR), vol. 57, pp 621–660 (2016) – reference: Tassa, T., Zivan, R., Grinshpoun, T.: Privacy preserving implementation of the max-sum algorithm and its variances. In: JAIR, vol. 59, pp 311–349 (2017) – reference: Morris, P.: The breakout method for escaping from local minima. In: Proceedings of AAAI’93, pp 40–45 (1993) – reference: Faltings, B., Macho-Gonzalez, S.: Open constraint programming. In: Artificial Intelligence 161.1. Distributed Constraint Satisfaction. issn: 0004-3702, pp 181–208 (2005) – reference: Zhang, W., Wang, G., Xing, Z., Wittenburg, L.: Distributed stochastic search and distributed breakout: Properties, comparison and applications to constraint optimization problems in sensor networks. In: Artificial Intelligence, vol. 161.1-2, pp 55–87 (2005) – reference: Faltings, B., Léauté, T., Petcu, A.: Privacy guarantees through distributed constraint satisfaction. In: Proc. IEEE/WIC/ACM Itl Conf on Intelligent Agent Technology, vol. 2, pp 350–358. IEEE Computer Society, Washington (2008) – reference: Freuder, E.C., Minca, M., Wallace, R.J.: Privacy/efficiency tradeoffs in distributed meeting scheduling by constraint-based agents. In: IJCAI Workshop on Distributed Constraint Reasoning, pp. 63–72 (2001) – reference: Bonér, J., The Akka Team at Lightbend: Akka: Build powerful reactive, concurrent, and distributed applications more easily. akka.io (2009) – reference: Maheswaran, R.T., Pearce, J.P., Tambe, M.: Distributed algorithms for DCOP: A graphical-game-based approach. In: Proceedings of ISCA 17th PDCS, pp 432–439 (2004) – reference: Brito, I., Meisels, A., Meseguer, P., Zivan, R.: Distributed constraint satisfaction with partially known constraints. In: Constraints, vol. 14.2, pp 199–234 (2009) – reference: Hebrard, E., Marx, D., O’Sullivan, B., Razgon, I.: Soft constraints of difference and equality. In: Journal of Artificial Intelligence Research. issn: 1076–9757, vol. 41.2, pp 97–130 (2011) – reference: Sweeney, L.: K-anonymity: A model for protecting privacy. In: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. issn: 0218-4885. https://doi.org/10.1142/S0218488502001648, vol. 10.5, pp 557–570 (2002) – reference: Savaux, J., Vion, J., Piechowiak, S., Mandiau, R., Matsui, T., Hirayama, K., Yokoo, M., Elmane, S., Silaghi, M.: Privacy stochastic games in distributed constraint reasoning. In: Annals of Mathematics and Artificial Intelligence, vol. 88.7, pp 691–715 (2020) – reference: Vion, J., Mandiau, R., Piechowiak, S., Silaghi, M.C.: Privacy for the distributed stochastic algorithm with breakouts. In: Proc. Itl Symposium on Artificial Intelligence and Mathematics (ISAIM) (2020) – reference: Hirayama, K., Yokoo, M.: Distributed Partial Constraint Satisfaction Problem, Principles and Practice of Constraint Programming -. In: CP97, Third International Conference, Linz, Austria, October 29 - November 1 1997 Proceedings. Ed. by Gert Smolka. vol. 1330 Lecture Notes in Computer Science, pp 222–236. Springer (1997) – reference: Minton, S., Johnston, M. D., Philips, A. B., Laird, P.: Minimizing conicts: A heuristic repair method for constraint-satisfaction and scheduling problems. In: Artificial Intelligence, vol. 58.1-3, pp 161–205 (1992) – reference: Doshi, P., Matsui, T., Silaghi, M., Yokoo, M., Zanker, M.: Distributed private constraint optimization. In: Proc. IEEE/WIC/ACM Itl Conf on Intelligent Agent Technology, pp 277–281. IEEE Computer Society, Washington (2008) – reference: Grinshpoun, T.: When You Say (DCOP) Privacy, What Do Mean? - Categorization of DCOP Privacy and Insights on Internal Constraint Privacy. In: Joaquim, F., Fred, A.L.N. (eds.) Proc. of the 4Th Itl Conference on Agents and Artificial Intelligence (ICAART), pp 380–386. SciTePress, Portugal (2012) – reference: Okamoto, S., Zivan, R., Nahon, A.: Distributed Breakout: Beyond Satisfaction. In: Proc. 25th IJCAI, pp 447–453 (2016) – reference: Vion, J.: Concrete: A CSP Solving API for the JVM. http://github.com/concretecp(2006) – ident: 9735_CR27 doi: 10.1016/0004-3702(92)90007-K – ident: 9735_CR20 doi: 10.1613/jair.3197 – ident: 9735_CR34 doi: 10.1142/S0218488502001648 – ident: 9735_CR4 doi: 10.1007/s10601-008-9048-x – ident: 9735_CR17 doi: 10.1613/jair.5322 – ident: 9735_CR15 – ident: 9735_CR31 doi: 10.1007/s10472-019-09628-8 – ident: 9735_CR36 – ident: 9735_CR11 – ident: 9735_CR18 doi: 10.1016/j.artint.2018.08.002 – ident: 9735_CR32 – ident: 9735_CR38 doi: 10.1145/242587.242589 – ident: 9735_CR30 – ident: 9735_CR2 – ident: 9735_CR43 doi: 10.1016/j.artint.2004.10.004 – ident: 9735_CR16 doi: 10.1613/jair.3945 – ident: 9735_CR29 – ident: 9735_CR25 – ident: 9735_CR42 – ident: 9735_CR21 – ident: 9735_CR10 – ident: 9735_CR33 – ident: 9735_CR6 doi: 10.1007/978-3-642-00487-2_56 – ident: 9735_CR44 doi: 10.1016/j.artint.2014.03.002 – ident: 9735_CR23 doi: 10.1016/j.artint.2004.08.004 – ident: 9735_CR13 doi: 10.1145/1329125.1329333 – ident: 9735_CR39 – ident: 9735_CR37 – ident: 9735_CR22 doi: 10.1007/BFb0017442 – ident: 9735_CR24 doi: 10.1613/jair.3983 – ident: 9735_CR8 doi: 10.1109/WIIAT.2008.177 – ident: 9735_CR1 doi: 10.1145/76894.76895 – ident: 9735_CR14 – ident: 9735_CR19 – ident: 9735_CR35 doi: 10.1613/jair.5504 – ident: 9735_CR3 – ident: 9735_CR12 doi: 10.1023/B:JMMA.0000026709.24659.da – ident: 9735_CR7 doi: 10.1109/WIIAT.2008.426 – ident: 9735_CR9 doi: 10.1016/j.artint.2004.10.005 – ident: 9735_CR26 doi: 10.1007/978-3-319-18008-3_19 – ident: 9735_CR5 – ident: 9735_CR41 – ident: 9735_CR28 – ident: 9735_CR40 doi: 10.1109/69.729707 |
| SSID | ssj0009686 |
| Score | 2.2675843 |
| Snippet | Privacy has traditionally been a major motivation of distributed problem solving. One popular approach to enable privacy in distributed environments is to... |
| SourceID | hal proquest gale crossref springer |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| StartPage | 31 |
| SubjectTerms | Algorithms Analysis Artificial Intelligence Complex Systems Computer Science Constraint modelling Costs Cryptography Mathematics Privacy Variables |
| SummonAdditionalLinks | – databaseName: Engineering Database dbid: M7S link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3Pb9UwDLbY4MAODAZohYEiNGkHiGiTpm1O6AkxDQkmpIG0W5Qmzd6A9Y21exL_PXaW7g0kuHCL-iO1-jmJ49ifAXZdXjpbupo7KQXHRssbtHx519RSqKCdrHwsNlEfHjbHx_pTcrgNKaxymhPjRO0Xjnzkr4UmqnGplXhz_oNT1Sg6XU0lNNbgNrEkFDF072hFulvFSo9EYcVxGZMpaSalzpW14BSgQIQ1iqvfFqY0Pa_NKTryhun5x2lpXIT2N_9X_PtwL5mfbHalLw_gVtdvweZU2oGlkb4FGx-v6VyHh_D1fSKVQKGYX5zZ057Z3jNHxiXVmBgZCry07iejGPfo4WX4DHbBPDHzUlGtzjM0NN3cEjM0s99PULxxfsbIE8xwY26_LS7H4RF82X_3-e0BT0UaEN1Sjlw3qIt1Vzkitgt58K7NnW8UNlUVQlG0srTBet0VXaic9LpqhS9EKwK-gNbRY1jvF323DSzXZHCWouxCgVOJ04X20tlGetvKPJQZvJwQMudXXBxmxbpMeBrE00Q8jcpgj0A0NFDxVzib8g3wW0R5ZWa0U1S6UjKDF4jzdZdEuH0w-2DoWi6lRgNRLosMdiZgTRrmg1mhmsGrSTVWt_8u3JN_9_YU7gpKs4iunh1YHy8uu2dwxy3H0-HieVTyX2Z8AuU priority: 102 providerName: ProQuest |
| Title | Integrating domain and constraint privacy reasoning in the distributed stochastic algorithm with breakouts |
| URI | https://link.springer.com/article/10.1007/s10472-021-09735-5 https://www.proquest.com/docview/2918203952 https://uphf.hal.science/hal-03396233 |
| Volume | 90 |
| WOSCitedRecordID | wos000641680100001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1573-7470 dateEnd: 20241212 omitProxy: false ssIdentifier: ssj0009686 issn: 1012-2443 databaseCode: P5Z dateStart: 19970301 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1573-7470 dateEnd: 20241212 omitProxy: false ssIdentifier: ssj0009686 issn: 1012-2443 databaseCode: K7- dateStart: 19970301 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1573-7470 dateEnd: 20241212 omitProxy: false ssIdentifier: ssj0009686 issn: 1012-2443 databaseCode: M7S dateStart: 19970301 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1573-7470 dateEnd: 20241212 omitProxy: false ssIdentifier: ssj0009686 issn: 1012-2443 databaseCode: BENPR dateStart: 19970301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLink customDbUrl: eissn: 1573-7470 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0009686 issn: 1012-2443 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Rb9MwED7RjQf2wGCAFhiVhZB4AEuJHSfxY0GbhoCq2gBNvFiOHdMCS1GTVeLfc5cl60DwAC-RlTi2defzne277wCeujh1NnU5d1IKjoWSF2j58qrIpVBBO5n5LtlEPp0WZ2d61geFNYO3-3Al2a3U14Ld0lxwcikgiBnF1Qi2Ud0VlLDh5PTjBmo36_I7EnAVR-Ul-1CZP7fxizrqF-XRnHwirxmcv92RdqrnaPf_Bn0HbvemJptczo27cKOq92B3SOPAeqneg513V9CtzT348roHkMBumF-e20XNbO2ZI0OS8km0DIewtu4HI3_27jSXYR1sgnlC4aUEWpVnaFS6uSUUaGa_fV6uFu38nNGpL8NNuP26vGib-_Dh6PD9q2PeJ2RATqay5brAeZdXmSMQuxAH78rY-UJhUWUhJEkpUxus11VShcxJr7NS-ESUIuAPaAk9gK16WVf7wGJNxmUq0iokuGw4nWgvnS2kt6WMQxrB84Ev5vsl7obZICwTUQ0S1XRENSqCZ8Q6Q0KJpHC2jy3AvgjeykxoV6h0pmQET5C7V00SuPbx5K2hd7GUGo1BuU4iOBiYb3qRbozQhHUvtRIRvBiYvfn898E9_Lfqj-CWoBCL7pjnALba1UX1GG66dbtoVmPYfnk4nZ2MYfQm52PyVD3F50x9GndC8BP2wP03 |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB6VggQcKBQQCwUsBOJALRI7Lx8QWgHVrrpdcShSb8bxgy3QbGnSRf1T_EZmskkXkODWA7coiR178nk8Hnu-AXhqo8SaxObcSik4XpS8QMuX-yKXIg3Kysy1ySby6bQ4OFDv1-BHHwtDxyp7ndgqaje35CN_KRRRjUuVitfH3zhljaLd1T6FxhIWu_7sOy7Z6lfjt_h_nwmx827_zYh3WQWwOYlsuCpQeLnPLDGxhSg4W0bWFSleplkIcVzKxATjlI99yKx0KiuFi0UpAhZQRL6EKv9yIrE3tAmc8xXJb9ZmliTKLI7TpuyCdLpQvSQXnA5EEEFOytPfJsJuOrg0o9OYv5i6f-zOtpPezsb_Jq6bcKMzr9lwOR5uwZqvNmGjT13BOk22Cdf3zulq69vwedyRZqAQmJsfmcOKmcoxS8Yz5dBoGApoYewZozP8rQeb4TtYBXPEPExJw7xjaEjbmSHma2a-fkJxNLMjRp5uVmK5L_PTpr4DHy6k_3dhvZpX_h6wSJFBnYjEhxhVpVWxctKaQjpTyigkA3jRI0IfL7lG9IpVmvCjET-6xY9OB_CcQKNJEaEorOniKfBbROmlh7QSTlWWygE8QVydV0mE4qPhRNO9SEqFBrBcxAPY6oGkOzVW6xWKBrDdQ3H1-O-Nu__v2h7D1dH-3kRPxtPdB3BNUEhJ69bagvXm5NQ_hCt20RzWJ4_aAcbg40VD9Cf7_mLN |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwEB7RglB7oFCoCBSwEBIHiJrYcRIfV8CqFWVViYd6sxw_2G1pttpNV-q_ZyabdBcEB8TNShzbmfHjsz3zDcArm2TWZLaIrRA8xkQVl4h8Y18WgsugrMhdG2yiGI3K01N1subF31q791eSS58GYmmqm4NLFw7WHN-ygsdkXkB0MzKWG3A7I0N62q9__rai3c3bWI9EYhXjQiY6t5k_l_HL0tRN0Btjso9cA5-_3Ze2y9Bw5_9_4D7c6yAoGyz7zAO45etd2OnDO7ButO_C9qcbStf5Qzg76oglsErmphdmUjNTO2YJYFKciYZhcxbGXjOyc29PeRnmwSKYI3ZeCqzlHUOwaceG2KGZ-fF9Ops04wtGp8EMN-fmfHrVzB_B1-GHL-8O4y5QA2o4E02sSuyPhc8tkduFJDhbJdaVEpMyDyFNK5GZYJzyqQ-5FU7lFXcpr3jADxAh7cFmPa39Y2CJItCZ8cyHFKcTq1LlhDWlcKYSScgieNPrSF8u-Tj0inmZhKpRqLoVqpYRvCY1ahqsKAprOp8DrItor_SAdotS5VJE8BI1fVMkkW4fDo41PUuEUAgSxSKNYL_vCLob6nPNFXHgCyV5BG97xa9e_71xT_4t-wu4e_J-qI-PRh-fwhYnL4z2JGgfNpvZlX8Gd-yimcxnz9sR8BM_4gSs |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Integrating+domain+and+constraint+privacy+reasoning+in+the+distributed+stochastic+algorithm+with+breakouts&rft.jtitle=Annals+of+mathematics+and+artificial+intelligence&rft.au=Vion%2C+Julien&rft.au=Mandiau%2C+Rene&rft.au=Piechowiak%2C+Sylvain&rft.au=Silaghi%2C+Marius&rft.date=2022-01-01&rft.pub=Springer&rft.issn=1012-2443&rft.volume=90&rft.issue=1&rft.spage=31&rft_id=info:doi/10.1007%2Fs10472-021-09735-5&rft.externalDocID=A716459653 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1012-2443&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1012-2443&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1012-2443&client=summon |