Skip to main content

Evolution of Strategies for Resource Protection Problems

  • Chapter
Advances in Evolutionary Computing

Part of the book series: Natural Computing Series ((NCS))

Abstract

The objective of this project is to develop effective finite-state machine (FSM) strategies for winning against an adversary in a Competition for Resources simulation. To achieve this goal, we evolve these strategies in a simulated environment and compare a variety of evolutionary methods in this context. Key empirical questions are addressed, such as how many FSM states are optimal, how effective is it to use an evolutionary algorithm that adapts the number of states, and how can one reduce the variance in fitness evaluation? Some of our experimental answers to these questions are quite intriguing. This chapter also explores and evaluates novel algorithms for detecting and repairing deleterious cycles in the evolved FSMs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bäck, T. and Schwefel, H.-P. (1993) An overview of evolutionary algorithms for parameter optimization. Evolutionary Computation, 1, 1–23

    Article  Google Scholar 

  2. Billings, L., Spears, W., and Schwartz, I. (2002) A unified prediction of computer virus spread in connected networks. Physics Letters A, 297, 261–266

    Article  MathSciNet  MATH  Google Scholar 

  3. Carmel, D. and Markovitch, S. (1996) Learning models of intelligent agents. Proceedings of the Thirteenth National Conference on Artificial Intelligence

    Google Scholar 

  4. Clarke, E. and Wing, J. (1996) Formal methods: State of the art and future directions. ACM Computing Surveys, 28, 626–643

    Article  Google Scholar 

  5. Dean, T. and Wellman, M. (1991) Planning and Control. Morgan Kaufmann, San Mateo

    Google Scholar 

  6. De Jong, K., Spears, W., and Gordon, D. (1993) Using genetic algorithms for concept learning. Machine Learning Journal, 13, 161–188

    Article  Google Scholar 

  7. Denning, D. (1999) Information Warfare and Security. Addison-Wesley, New York

    Google Scholar 

  8. Fogel, D. (1995) Evolutionary Computation. IEEE Press, New York

    Google Scholar 

  9. Fogel, L. (1999) Intelligence Through Simulated Evolution: Forty Years of Evolutionary Programming. Wiley Series on Intelligent Systems, New York

    MATH  Google Scholar 

  10. Fogel, L., Owens, A., and Walsh, M. (1966) Artificial Intelligence Through Simulated Evolution. John Wiley and Sons, New York

    MATH  Google Scholar 

  11. Gordon, D., Spears, W., Sokolsky, O., and Lee, I. (1999) Distributed spatial control, global monitoring and steering of mobile physical agents. Proceedings of the IEEE International Conference on Information, Intelligence, and Systems

    Google Scholar 

  12. Grefenstette, J. and Fitzpatrick, J. (1985) Genetic search with approximate function evaluations. Proceedings of the International Conference on Genetic Algorithms

    Google Scholar 

  13. Holland, J. (1975) Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor

    Google Scholar 

  14. Hopcroft, J. and Ullman, J. (1979) Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Menlo Park

    MATH  Google Scholar 

  15. Jefferson, D., Collins, R., Cooper, C., Dyer, M., Flowers, M., Korf, R., Taylor, C., and Wang, A. (1991) Evolution as a theme in artificial life: The Genesys/Tracker system. Proceedings of Artificial Life II

    Google Scholar 

  16. Kim, M., Viswanathan, M., Ben-Abdallah, H., Kannan, S., Lee, I., and Sokolsky, O. (1999) Formally specified monitoring of temporal properties. Proceedings of the Euromicro Conference on Real-Time Systems

    Google Scholar 

  17. Lamarck, J.B. (1984) Philosophie Zoologique. English Translation, University of Chicago

    Google Scholar 

  18. Mars, P., Chen, J., and Nambiar, R. (1996) Learning Algorithms: Theory and Applications in Signal Processing, Control and Communications. CRC Press, New York

    Google Scholar 

  19. Rich, E. and Knight, K. (1991) Artificial Intelligence. McGraw-Hill, New York

    Google Scholar 

  20. Spears, W. (2000) Evolutionary Algorithms: The Role of Mutation and Recombination. Springer-Verlag, Berlin

    Book  MATH  Google Scholar 

  21. Spears, W. and De Jong, K. (1991) On the virtues of parameterized uniform crossover. Proceedings of the International Conference on Genetic Algorithms

    Google Scholar 

  22. Watkins, C. (1989) Learning from delayed rewards. Ph.D. thesis, University of Cambridge, England

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Spears, W.M., Gordon-Spears, D.F. (2003). Evolution of Strategies for Resource Protection Problems. In: Ghosh, A., Tsutsui, S. (eds) Advances in Evolutionary Computing. Natural Computing Series. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-18965-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-18965-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-62386-8

  • Online ISBN: 978-3-642-18965-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics