463 research outputs found

    Deep Reinforcement Learning for Swarm Systems

    Full text link
    Recently, deep reinforcement learning (RL) methods have been applied successfully to multi-agent scenarios. Typically, these methods rely on a concatenation of agent states to represent the information content required for decentralized decision making. However, concatenation scales poorly to swarm systems with a large number of homogeneous agents as it does not exploit the fundamental properties inherent to these systems: (i) the agents in the swarm are interchangeable and (ii) the exact number of agents in the swarm is irrelevant. Therefore, we propose a new state representation for deep multi-agent RL based on mean embeddings of distributions. We treat the agents as samples of a distribution and use the empirical mean embedding as input for a decentralized policy. We define different feature spaces of the mean embedding using histograms, radial basis functions and a neural network learned end-to-end. We evaluate the representation on two well known problems from the swarm literature (rendezvous and pursuit evasion), in a globally and locally observable setup. For the local setup we furthermore introduce simple communication protocols. Of all approaches, the mean embedding representation using neural network features enables the richest information exchange between neighboring agents facilitating the development of more complex collective strategies.Comment: 31 pages, 12 figures, version 3 (published in JMLR Volume 20

    NEFI: Network Extraction From Images

    Full text link
    Networks and network-like structures are amongst the central building blocks of many technological and biological systems. Given a mathematical graph representation of a network, methods from graph theory enable a precise investigation of its properties. Software for the analysis of graphs is widely available and has been applied to graphs describing large scale networks such as social networks, protein-interaction networks, etc. In these applications, graph acquisition, i.e., the extraction of a mathematical graph from a network, is relatively simple. However, for many network-like structures, e.g. leaf venations, slime molds and mud cracks, data collection relies on images where graph extraction requires domain-specific solutions or even manual. Here we introduce Network Extraction From Images, NEFI, a software tool that automatically extracts accurate graphs from images of a wide range of networks originating in various domains. While there is previous work on graph extraction from images, theoretical results are fully accessible only to an expert audience and ready-to-use implementations for non-experts are rarely available or insufficiently documented. NEFI provides a novel platform allowing practitioners from many disciplines to easily extract graph representations from images by supplying flexible tools from image processing, computer vision and graph theory bundled in a convenient package. Thus, NEFI constitutes a scalable alternative to tedious and error-prone manual graph extraction and special purpose tools. We anticipate NEFI to enable the collection of larger datasets by reducing the time spent on graph extraction. The analysis of these new datasets may open up the possibility to gain new insights into the structure and function of various types of networks. NEFI is open source and available http://nefi.mpi-inf.mpg.de

    Remarks on Category-Based Routing in Social Networks

    Full text link
    It is well known that individuals can route messages on short paths through social networks, given only simple information about the target and using only local knowledge about the topology. Sociologists conjecture that people find routes greedily by passing the message to an acquaintance that has more in common with the target than themselves, e.g. if a dentist in Saarbr\"ucken wants to send a message to a specific lawyer in Munich, he may forward it to someone who is a lawyer and/or lives in Munich. Modelling this setting, Eppstein et al. introduced the notion of category-based routing. The goal is to assign a set of categories to each node of a graph such that greedy routing is possible. By proving bounds on the number of categories a node has to be in we can argue about the plausibility of the underlying sociological model. In this paper we substantially improve the upper bounds introduced by Eppstein et al. and prove new lower bounds.Comment: 21 page

    Guided Deep Reinforcement Learning for Swarm Systems

    Full text link
    In this paper, we investigate how to learn to control a group of cooperative agents with limited sensing capabilities such as robot swarms. The agents have only very basic sensor capabilities, yet in a group they can accomplish sophisticated tasks, such as distributed assembly or search and rescue tasks. Learning a policy for a group of agents is difficult due to distributed partial observability of the state. Here, we follow a guided approach where a critic has central access to the global state during learning, which simplifies the policy evaluation problem from a reinforcement learning point of view. For example, we can get the positions of all robots of the swarm using a camera image of a scene. This camera image is only available to the critic and not to the control policies of the robots. We follow an actor-critic approach, where the actors base their decisions only on locally sensed information. In contrast, the critic is learned based on the true global state. Our algorithm uses deep reinforcement learning to approximate both the Q-function and the policy. The performance of the algorithm is evaluated on two tasks with simple simulated 2D agents: 1) finding and maintaining a certain distance to each others and 2) locating a target.Comment: 15 pages, 8 figures, accepted at the AAMAS 2017 Autonomous Robots and Multirobot Systems (ARMS) Worksho

    On efficiency and reliability in computer science

    Get PDF
    Efficiency of algorithms and robustness against mistakes in their implementation or uncertainties in their input has always been of central interest in computer science. This thesis presents results for a number of problems related to this topic. Certifying algorithms enable reliable implementations by providing a certificate with their answer. A simple program can check the answers using the certificates. If the the checker accepts, the answer of the complex program is correct. The user only has to trust the simple checker. We present a novel certifying algorithm for 3-edge-connectivity as well as a simplified certifying algorithm for 3-vertex-connectivity. Occasionally storing the state of computations, so called checkpointing, also helps with reliability since we can recover from errors without having to restart the computation. In this thesis we show how to do checkpointing with bounded memory and present several strategies to minimize the worst-case recomputation. In theory, the input for problems is accurate and well-defined. However, in practice it often contains uncertainties necessitating robust solutions. We consider a robust variant of the well known k-median problem, where the clients are grouped into sets. We want to minimize the connection cost of the expensive group. This solution is robust against which group we actually need to serve. We show that this problem is hard to approximate, even on the line, and evaluate heuristic solutions.Effizienz von Algorithmen und Zuverlässigkeit gegen Fehlern in ihrer Implementierung oder Unsicherheiten in der Eingabe ist in der Informatik von großem Interesse. Diese Dissertation präsentiert Ergebnisse für Probleme in diesem Themenfeld. Zertifizierende Algorithmen ermöglichen zuverlässige Implementierungen durch Berechnung eines Zertifikats für ihre Antworten. Ein einfaches Programm kann die Antworten mit den Zertifikaten überprüfen. Der Nutzer muss nur dem einfachen Programms vertrauen. Wir präsentieren einen neuen zertifizierenden Algorithmus für 3-Kantenzusammenhang und einen vereinfachten zertifizierenden Algorithmus für 3-Knotenzusammenhang. Den Zustand einer Berechnung gelegentlich zu speichern, sog. Checkpointing, verbessert die Zuverlässigkeit. Im Fehlerfall kann ein gespeicherter Zustand wiederhergestellt werden ohne die Berechnung neu zu beginnen. Wir zeigen Strategien für Checkpointing mit begrenztem Speicher, die die Neuberechnungszeit minimieren. Traditionell sind die Eingaben für Probleme präzise und wohldefiniert. In der Praxis beinhalten die Eingaben allerdings Unsicherheiten und man braucht robuste Lösungen. Wir betrachten eine robuste Variante des k-median Problem. Hier sind die Kunden in Gruppen eingeteilt und wir möchten die Kosten der teuersten Gruppe minimieren. Dies macht die Lösung robust gegenüber welche der Gruppen letztlich bedient werden soll. Wir zeigen, dass dieses Problem schwer zu approximieren ist und untersuchen Heuristiken

    Public service motivation, prosocial motivation and altruism : towards disentanglement and conceptual clarity

    Get PDF
    Research on public service motivation (PSM) has made great strides in terms of study output. Given the enormous scholarly attention on PSM, it is surprising that considerable conceptual ambiguities and overlaps with related concepts such as prosocial motivation, and altruism still remain. This study addresses this issue by systematically carving out the differences and similarities between these concepts. Taking this approach, this study clarifies the conceptual space of both PSM and the other concepts. Using data from semi-structured interviews with police officers, it is illustrated that PSM and prosocial motivation are different types of motivation leading to different types of prosocial behaviour

    Attracting future civil servants with public values? An experimental study on employer branding

    Get PDF
    A frequently cited recommendation of public service motivation (PSM) research is to use PSM in the context of HR marketing. However, empirical evidence demonstrating the usefulness of addressing PSM in the recruitment process is limited. Moreover, we know little about the relative importance of PSM for public employers’ attractiveness. We address this gap using an experimental research design to investigate whether public service motivated individuals differ from extrinsically motivated individuals in terms of their attraction to organizations that emphasize either “traditional” public or private values in their employer branding. Our findings indicate that public service motivated individuals are attracted neither to public nor to private values in employer branding. Furthermore, individuals with very high levels of extrinsic motivation are more attracted to private values employer branding than to public values employer branding and to the control group

    Vernalization shapes shoot architecture and ensures the maintenance of dormant buds in the perennial Arabis alpina

    Get PDF
    Perennials have a complex shoot architecture with axillary meristems organized in zones of differential bud activity and fate. This includes zones of buds maintained dormant for multiple seasons and used as reservoirs for potential growth in case of damage. The shoot of Arabis alpina, a perennial relative of Arabidopsis thaliana, consists of a zone of dormant buds placed between subapical vegetative and basal flowering branches. This shoot architecture is shaped after exposure to prolonged cold, required for flowering.To understand how vernalization ensures the maintenance of dormant buds, we performed physiological and transcriptome studies, followed the spatiotemporal changes of auxin, and generated transgenic plants.Our results demonstrate that the complex shoot architecture in A. alpina is shaped by its flowering behavior, specifically the initiation of inflorescences during cold treatment and rapid flowering after subsequent exposure to growth-promoting conditions. Dormant buds are already formed before cold treatment. However, dormancy in these buds is enhanced during, and stably maintained after, vernalization by a BRC1-dependent mechanism. Post-vernalization, stable maintenance of dormant buds is correlated with increased auxin response, transport, and endogenous indole-3-acetic acid levels in the stem.Here, we provide a functional link between flowering and the maintenance of dormant buds in perennials

    Deep Reinforcement Learning for Swarm Systems

    Get PDF
    Recently, deep reinforcement learning (RL) methods have been applied successfully to multi-agent scenarios. Typically, the observation vector for decentralized decision making is represented by a concatenation of the (local) information an agent gathers about other agents. However, concatenation scales poorly to swarm systems with a large number of homogeneous agents as it does not exploit the fundamental properties inherent to these systems: (i) the agents in the swarm are interchangeable and (ii) the exact number of agents in the swarm is irrelevant. Therefore, we propose a new state representation for deep multi-agent RL based on mean embeddings of distributions, where we treat the agents as samples and use the empirical mean embedding as input for a decentralized policy. We define different feature spaces of the mean embedding using histograms, radial basis functions and neural networks trained end-to-end. We evaluate the representation on two well-known problems from the swarm literature in a globally and locally observable setup. For the local setup we furthermore introduce simple communication protocols. Of all approaches, the mean embedding representation using neural network features enables the richest information exchange between neighboring agents, facilitating the development of complex collective strategies

    Public service motivation: State of the art and conceptual cleanup

    Get PDF
    Public service motivation is an increasingly researched and, at the same time, hotly debated concept in the field of public management and public administration. It refers to the motivation people have to contribute to society. This chapter provides an overview of what has happened so far in this field since the introduction of the concept in the 1980s and 1990s, with a particular focus on the role of the research community. In this overview, causes, consequences, and related theories are identified. The chapter also establishes gaps in the literature and issues that remain unresolved. In so doing, we carry out a conceptual cleanup by positioning the subject alongside related but different concepts such as intrinsic motivation, altruism, and prosocial motivation
    corecore