• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Shu Chang, Li Qingshan, Wang Lu, Wang Ziqi, Ji Yajiang. A Networked Software Optimization Mechanism Based on Gradient-Play[J]. Journal of Computer Research and Development, 2022, 59(9): 1902-1913. DOI: 10.7544/issn1000-1239.20220016
Citation: Shu Chang, Li Qingshan, Wang Lu, Wang Ziqi, Ji Yajiang. A Networked Software Optimization Mechanism Based on Gradient-Play[J]. Journal of Computer Research and Development, 2022, 59(9): 1902-1913. DOI: 10.7544/issn1000-1239.20220016

A Networked Software Optimization Mechanism Based on Gradient-Play

Funds: This work was supported by the National Natural Science Foundation of China (61972300, 61902288, U21B2015), the Basic Research Program of Natural Science of Shaanxi (2020JQ-300), and the National Key Research and Development Program of China (2019YFB1406404).
More Information
  • Published Date: August 31, 2022
  • Networked software is a novel type of system deploying services on different devices and running based on the Internet. In order to improve service efficiency and realize a greater variety of functions, more software developers prefer to build systems in this way. However, the highly distributed characteristic brings obstacles to optimization of this kind of software. This paper is aimed at solving the optimization decision issues of networked software based on game theory. We let each software node exchange information with other nodes connecting to them and adjust their states for better payoffs, to achieve the purpose of improving overall system performance. In this process, we apply a consensus-based method to overcome the communication problems used to exist in the networked software system. With the method, each software node can make optimization decisions via incomplete system information. In addition, we propose an adaptive step size mechanism and a forced coordination mechanism to adjust parameters reasonably. These two mechanisms alleviate the problem of divergence and reduce the difficulty of parameter selection in this kind of methods, after that, an efficient synergy between state optimization and coordination of nodes can be realized. The experiments show that the original method can converge to Nash equilibrium more efficiently with these two mechanisms proposed by us.
  • Related Articles

    [1]Hao Jiakun, Xiang Peng, He Yifei, Gao Jianbo, Guan Zhi, Xie Anming, Chen Zhong. Cross-Domain Data Trading System Based on Decentralized Identity[J]. Journal of Computer Research and Development, 2024, 61(10): 2570-2586. DOI: 10.7544/issn1000-1239.202440456
    [2]Song Wenpeng, Zhang Liang, Ma Yuhang. Auditable Healthcare Data Sharing Based on Decentralized Identity[J]. Journal of Computer Research and Development, 2024, 61(10): 2501-2513. DOI: 10.7544/issn1000-1239.202440351
    [3]Wang Jingyi, Kan Haibin. Fine-Grained Policy-Hiding and Traceable Decentralized Access Control Scheme in mHealth[J]. Journal of Computer Research and Development, 2024, 61(6): 1525-1535. DOI: 10.7544/issn1000-1239.202330092
    [4]Jiang Renkai, Song Shuwei, Luo Xiapu, Chen Ting, Luo Ruijie, Wang Bingsen, Qiao Ao. DEALS——Track Token Transfer Information Inconsistency[J]. Journal of Computer Research and Development, 2024, 61(2): 274-288. DOI: 10.7544/issn1000-1239.202330613
    [5]Zhang Zhanpeng, Li Kexin, Kan Haibin. An Open Blockchain Oracle Scheme Based on Decentralized Identity[J]. Journal of Computer Research and Development, 2023, 60(11): 2489-2503. DOI: 10.7544/issn1000-1239.202330200
    [6]Zhou Wei, Wang Chao, Xu Jian, Hu Keyong, Wang Jinlong. Privacy-Preserving and Decentralized Federated Learning Model Based on the Blockchain[J]. Journal of Computer Research and Development, 2022, 59(11): 2423-2436. DOI: 10.7544/issn1000-1239.20220470
    [7]Xiao Siyu, Ge Aijun, Ma Chuangui. Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts[J]. Journal of Computer Research and Development, 2016, 53(10): 2207-2215. DOI: 10.7544/issn1000-1239.2016.20160459
    [8]Yang Hongyong, Cao Kecai, and Zhang Siying. Flocking Movement of Delayed Multi-Agent Systems with Leader-Following[J]. Journal of Computer Research and Development, 2011, 48(2): 203-208.
    [9]Huang Jing, Liu Dayou, Yang Bo, and Jin Di. A Self-Organization Based Divide and Conquer Algorithm for Distributed Constraint Optimization Problems[J]. Journal of Computer Research and Development, 2008, 45(11): 1831-1839.
    [10]Wang Jin, Li Dequan, and Feng Dengguo. An Automatically Optimized Distributed Intrusion Detection System Using Mobile Agent[J]. Journal of Computer Research and Development, 2006, 43(1): 9-14.
  • Cited by

    Periodical cited type(1)

    1. 王栓奇,庞红彪,杨顺昆,孟令中,刘钊. 基于多智能体的指挥控制软件可靠性建模仿真方法. 火力与指挥控制. 2024(05): 124-129 .

    Other cited types(0)

Catalog

    Article views (171) PDF downloads (118) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return