{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:17:58Z","timestamp":1760955478772,"version":"3.40.4"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2014,5,23]],"date-time":"2014-05-23T00:00:00Z","timestamp":1400803200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Math Artif Intell"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10472-014-9422-x","type":"journal-article","created":{"date-parts":[[2014,5,22]],"date-time":"2014-05-22T03:45:27Z","timestamp":1400730327000},"page":"225-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Effective deadlock resolution with self-interested partially-rational agents"],"prefix":"10.1007","volume":"72","author":[{"given":"Nadav","family":"Sofy","sequence":"first","affiliation":[]},{"given":"David","family":"Sarne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,23]]},"reference":[{"issue":"6","key":"9422_CR1","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.2307\/1913097","volume":"56","author":"D Abreu","year":"1988","unstructured":"Abreu, D., Rubinstein, A.: The structure of nash equilibrium in repeated games with finite automata. Econometrica 56(6), 1259\u20131281 (1988)","journal-title":"Econometrica"},{"issue":"12","key":"9422_CR2","doi-asserted-by":"crossref","first-page":"1348","DOI":"10.1109\/TSE.1987.233145","volume":"13","author":"R Agrawal","year":"1987","unstructured":"Agrawal, R., Carey, M., Mcvoy, L.: The performance of alternative strategies for dealing with deadlocks in database management systems. IEEE Trans. Softw. Eng. 13(12), 1348\u20131363 (1987)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2\u20133","key":"9422_CR3","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer, P., Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2\u20133), 235\u2013256 (2002)","journal-title":"Mach. Learn."},{"doi-asserted-by":"crossref","unstructured":"Azaria, A., Rabinovich, Z., Kraus, S., Goldman, C.: Strategic information disclosure to people with multiple alternatives. In: proceedings of AAAI, pp. 594\u2013600 (2011)","key":"9422_CR4","DOI":"10.1609\/aaai.v25i1.7878"},{"issue":"1","key":"9422_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0167-9236(03)00061-7","volume":"38","author":"R Azoulay-Schwartz","year":"2004","unstructured":"Azoulay-Schwartz, R., Kraus, S., Wilkenfeld, J.: Exploitation vs. exploration: choosing a supplier in an environment of incomplete information. Int. J. Decis. Support. Syst. Electron. Commer. 38(1), 1\u201318 (2004)","journal-title":"Int. J. Decis. Support. Syst. Electron. Commer."},{"doi-asserted-by":"crossref","unstructured":"Bensalem, S., Fernandez, J., Havelund, K.: Confirmation of deadlock potentials detected by runtime analysis. In: proceedings of PADTAD, pp. 41\u201350 (2006)","key":"9422_CR6","DOI":"10.1145\/1147403.1147412"},{"issue":"1","key":"9422_CR7","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1257\/aer.101.1.411","volume":"101","author":"P Bo","year":"2011","unstructured":"Bo, P., Frechette, G.: The evolution of cooperation in infinitely repeated games: Experimental evidence. Am. Econ. Rev. 101(1), 411\u2013429 (2011)","journal-title":"Am. Econ. Rev."},{"unstructured":"Chalamish, M., Sarne, D., Kraus, S.: Programming agents as a means of capturing self-strategy. In: proceedings of AAMAS, pp. 1161\u20131168 (2008)","key":"9422_CR8"},{"issue":"4","key":"9422_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TITS.2012.2228136","volume":"13","author":"M Chalamish","year":"2012","unstructured":"Chalamish, M., Sarne, D., Lin, R.: Enhancing parking simulations using peer-designed agents. IEEE Trans. Intell. Transp. Syst. 13(4), 1\u20137 (2012)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"9422_CR10","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1145\/357360.357365","volume":"1","author":"K Chandy","year":"1983","unstructured":"Chandy, K., Misra, J., Haas, L.: Distributed deadlock detection. ACM Trans. Comput. Syst. 1(2), 144\u2013156 (1983)","journal-title":"ACM Trans. Comput. Syst."},{"unstructured":"Chavez, A., Kasbah, P. Maes.: An agent marketplace for buying and selling goods In: proceedings of PAAM, pp. 75\u201390 (1996)","key":"9422_CR11"},{"issue":"2","key":"9422_CR12","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1145\/356586.356588","volume":"3","author":"E Coffman","year":"1971","unstructured":"Coffman, E., Elphick, M., Shoshani, A.: System deadlocks. ACM Comput. Surv. 3(2), 67\u201378 (1971)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"9422_CR13","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/BF02134016","volume":"5","author":"G Cybeko","year":"1992","unstructured":"Cybeko, G.: Approximations by superpositions of sigmoidal functions. Math. Control Signals Syst. 5(4), 455\u2013455 (1992)","journal-title":"Math. Control Signals Syst."},{"doi-asserted-by":"crossref","unstructured":"Cysneiros, L., Yu, E.: Requirements engineering for large-scale multi-agent systems. In: Proceedings of Software Engineering for Large-Scale Multi-Agent Systems, pp. 39\u201356 (2002)","key":"9422_CR14","DOI":"10.1007\/3-540-35828-5_3"},{"unstructured":"Duffy, J., Hopkins, E.: Learning, information and sorting in market entry games: Theory and evidence. ESE Discussion Papers 78. University of Edinburgh (2004)","key":"9422_CR15"},{"doi-asserted-by":"crossref","unstructured":"Elmalech, A., Sarne, D.: Evaluating the applicability of peer-designed agents in mechanisms evaluation. In: Proceedings of IAT (2012)","key":"9422_CR16","DOI":"10.1109\/WI-IAT.2012.199"},{"issue":"1","key":"9422_CR17","first-page":"31","volume":"2","author":"Y Elmaliach","year":"2008","unstructured":"Elmaliach, Y., Kaminka, G.: Robust multi-robot formations under human supervision and control. J. Phys. Agents 2(1), 31 (2008)","journal-title":"J. Phys. Agents"},{"doi-asserted-by":"crossref","unstructured":"Endriss, U.: Monotonic concession protocols for multilateral negotiation. In: Proceedings of AAMAS, pp. 392\u2013399 (2006)","key":"9422_CR18","DOI":"10.1145\/1160633.1160702"},{"issue":"4","key":"9422_CR19","first-page":"848","volume":"88","author":"I Erez","year":"1998","unstructured":"Erez, I., Roth, A.: Predicting how people play games: Reinforcement learning in experimental games with unique, mixed strategy equilibria. Am. Econ. Rev. 88(4), 848\u2013881 (1998)","journal-title":"Am. Econ. Rev."},{"issue":"1","key":"9422_CR20","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TNN.2004.836233","volume":"16","author":"S Ferrari","year":"2005","unstructured":"Ferrari, S.: Smooth function approximation using neural networks. IEEE Trans. Neural Netw. 16(1), 24\u201338 (2005)","journal-title":"IEEE Trans. Neural Netw."},{"unstructured":"Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: Proceedings of National Computer Security Conference, 305\u2013319 (1989)","key":"9422_CR21"},{"issue":"4","key":"9422_CR22","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1023\/A:1010028119149","volume":"2","author":"P Gmytrasiewicz","year":"2000","unstructured":"Gmytrasiewicz, P., Durfee, E.: Rational coordination in multi-agent environments. J. Auton. Agents. Multi-Agent Syst. 2(4), 319\u2013350 (2000)","journal-title":"J. Auton. Agents. Multi-Agent Syst."},{"unstructured":"Grosz, B., Kraus, S., Talman, S., Stossel, B., Havlin, M.: The influence of social dependencies on decision-making: Initial investigations with a new game. In: proceedings of AAMAS, pp. 780\u2013787 (2004)","key":"9422_CR23"},{"doi-asserted-by":"crossref","unstructured":"Hadad, M., Kraus, S., Hartman, I. B.-A., Rosenfeld, A.: Group planning with time constraints. Ann. Math. Artif. Intell., 1\u201349 (2013)","key":"9422_CR24","DOI":"10.1007\/s10472-013-9363-9"},{"doi-asserted-by":"crossref","unstructured":"Hajaj, C., Hazon, N., Sarne, D., Elmalech, A.: Search more, disclose less. In Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)","key":"9422_CR25","DOI":"10.1609\/aaai.v27i1.8607"},{"unstructured":"Hazon, N., Lin, R., Kraus, S.: How to Change a Group\u2019s Collective Decision? In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI\u201913, pp 198\u2013205. AAAI Press (2013)","key":"9422_CR26"},{"unstructured":"Hirayama, K., Toyoda, J.: Forming coalitions for breaking deadlocks. In: proceedings of AAAI, pp. 155\u2013162 (1995)","key":"9422_CR27"},{"issue":"1","key":"9422_CR28","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/22890.22891","volume":"5","author":"M Hornick","year":"1987","unstructured":"Hornick, M., Zdonik, S.: A shared, segmented memory system for an object-oriented database. ACM Trans. Inf. Syst. 5(1), 70\u201395 (1987)","journal-title":"ACM Trans. Inf. Syst."},{"unstructured":"http:\/\/neuroph.sourceforge.net","key":"9422_CR29"},{"issue":"9","key":"9422_CR30","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MC.1980.1653786","volume":"13","author":"S Isloor","year":"1980","unstructured":"Isloor, S., Marsland, T.: The deadlock problem: An overview. IEEE Comput. 13(9), 58\u201378 (1980)","journal-title":"IEEE Comput."},{"doi-asserted-by":"crossref","unstructured":"Iyengar, S.: The Art of Choosing. Twelve (2010)","key":"9422_CR31","DOI":"10.1037\/e597682010-001"},{"doi-asserted-by":"crossref","unstructured":"Jager, M., Nebel, B.: Decentralized collision avoidance, deadlock detection, and deadlock resolution for multiple mobile robots. In: proceedings of IEEE Intelligent Robots and Systems, pp. 1213\u20131219 (2001)","key":"9422_CR32","DOI":"10.1109\/IROS.2001.977148"},{"doi-asserted-by":"crossref","unstructured":"Kahneman, D., Tversky, A.: Choices, Values, and Frames. Cambridge University Press (2000)","key":"9422_CR33","DOI":"10.1017\/CBO9780511803475"},{"doi-asserted-by":"crossref","unstructured":"Kaveh, N., Emmerich, W.: Deadlock detection in distributed object systems. In: proceedings of ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 44\u201351 (2001)","key":"9422_CR34","DOI":"10.1145\/503215.503216"},{"issue":"1","key":"9422_CR35","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/32.263754","volume":"20","author":"A Kshemkalyani","year":"1994","unstructured":"Kshemkalyani, A., Singhal, M.: Efficient detection and resolution of generalized distributed deadlocks. IEEE Trans. Softw. Eng. 20(1), 43\u201354 (1994)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"9","key":"9422_CR36","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TSE.2004.51","volume":"30","author":"S Lee","year":"2004","unstructured":"Lee, S.: Fast, centralized detection and resolution of distributed deadlocks in the generalized model. IEEE Trans. Softw. Eng. 30(9), 561\u2013573 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"doi-asserted-by":"crossref","unstructured":"Li, P., Agrawal, K., Buhler, J., Chamberlain, R., Lancaster, J.: Deadlock-avoidance for streaming applications with split-join structure: Two case studies. In: proceedings of IEEE Application-specific Systems Architectures and Processors, pp. 333\u2013336 (2010)","key":"9422_CR37","DOI":"10.1109\/ASAP.2010.5540957"},{"doi-asserted-by":"crossref","unstructured":"Lin, R., Kraus, S., Oshrat, Y., Gal, Y.: Facilitating the evaluation of automated negotiators using peer designed agents. In: proceedings of AAAI, pp. 817\u2013822 (2010)","key":"9422_CR38","DOI":"10.1609\/aaai.v24i1.7614"},{"issue":"3","key":"9422_CR39","first-page":"1347","volume":"36","author":"G Mailath","year":"1998","unstructured":"Mailath, G.: Do people play nash equilibrium? lessons from evolutionary game theory. J. Econ. Lit. 36(3), 1347\u20131374 (1998)","journal-title":"J. Econ. Lit."},{"unstructured":"Manisterski, E., Lin, R., Kraus, S.: Understanding how people design trading agents over time. In: proceedings of AAMAS, pp. 1593\u20131596 (2008)","key":"9422_CR40"},{"doi-asserted-by":"crossref","unstructured":"Mitchell, D., Merritt, M.: Distributed algorithm for deadlock detection and resolution. In: proceedings of ACM Symposium on Principles of Distributed Computing, pp. 282\u2013284 (1984)","key":"9422_CR41","DOI":"10.1145\/800222.806755"},{"issue":"4","key":"9422_CR42","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1145\/7239.7266","volume":"11","author":"C Mohan","year":"1986","unstructured":"Mohan, C., Lindsay, B., Obermarck, R.: Transaction management in the r* distributed database management system. ACM Trans. Database Syst. 11(4), 378\u2013396 (1986)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"9422_CR43","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/72.572089","volume":"8","author":"K Narendra","year":"1997","unstructured":"Narendra, K.: Adaptive control using neural networks and approximate models. IEEE Trans. Neural Netw. 8(3), 475\u2013485 (1997)","journal-title":"IEEE Trans. Neural Netw."},{"doi-asserted-by":"crossref","unstructured":"Nguyen, T., Roos, M., Rothe, J.: A survey of approximability and inapproximability results for social welfare optimization in multiagent resource allocation. Ann. Math. Artif. Intell., 1\u201326 (2013)","key":"9422_CR44","DOI":"10.1007\/s10472-012-9328-4"},{"unstructured":"Parameswaran, M., Rui, H., Sayin, S.: A game theoretic model and empirical analysis of spammer strategies. In: proceedings of Collaboration, Electronic Messaging, AntiAbuse and Spam (2010)","key":"9422_CR45"},{"issue":"1","key":"9422_CR46","first-page":"11","volume":"36","author":"M Rabin","year":"1998","unstructured":"Rabin, M.: Psychology and economics. J. Econ. Lit. 36(1), 11\u201346 (1998)","journal-title":"J. Econ. Lit."},{"issue":"8","key":"9422_CR47","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1109\/12.30874","volume":"38","author":"M Roesler","year":"1989","unstructured":"Roesler, M., Burkhard, W.: Resolution of deadlocks in object-oriented distributed systems. IEEE Trans. Comput. 38(8), 1212\u20131224 (1989)","journal-title":"IEEE Trans. Comput."},{"unstructured":"Rosenfeld, A., Kraus, S.: Modeling agents through bounded rationality theories. In: proceedings of IJCAI, pp. 264\u2013271 (2009)","key":"9422_CR48"},{"issue":"2","key":"9422_CR49","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/s10458-010-9158-x","volume":"24","author":"A Rosenfeld","year":"2012","unstructured":"Rosenfeld, A., Kraus, S.: Modeling agents based on aspiration adaptation theory. J. Auton. Agents. Multi-Agent Syst. 24(2), 221\u2013254 (2012)","journal-title":"J. Auton. Agents. Multi-Agent Syst."},{"unstructured":"Sarne, D., Elmalech, A., Grosz, B., Geva, M.: Less is more: Restructuring decisions to improve agent search. In: proceedings of AAMAS, pp. 431\u2013438 (2011)","key":"9422_CR50"},{"issue":"1","key":"9422_CR51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jaec.2010010101","volume":"1","author":"S Selvaraj","year":"2010","unstructured":"Selvaraj, S., Ramasamy, R.: An efficient detection and resolution of generalized deadlocks in distributed systems. Int. J. Comput. Appl. 1(1), 1\u20137 (2010)","journal-title":"Int. J. Comput. Appl."},{"unstructured":"Silberschatz, A., Gagne, G., Galvin, P., 8th edn: Operating System Concepts. Wiley (2008)","key":"9422_CR52"},{"key":"9422_CR53","volume-title":"Decision and Organization","author":"A Simon","year":"1972","unstructured":"Simon, A.: Theories of bounded rationality. In: McGuire, C. B., Radner, R. (eds.) Decision and Organization. Amsterdam, North Holland (1972)"},{"unstructured":"Sofy, N., Sarne, D.: On the failure of game theoretic approach for distributed deadlock resolution. In: Proceedings of AAMAS, pp. 1445\u20131446 (2012)","key":"9422_CR54"},{"issue":"4","key":"9422_CR55","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/s10619-011-7078-7","volume":"29","author":"S Srinivasan","year":"2011","unstructured":"Srinivasan, S., Rajaram, R.: A decentralized deadlock detection and resolution algorithm for generalized model in distributed systems. Distrib. Parallel Databases 29(4), 261\u2013276 (2011)","journal-title":"Distrib. Parallel Databases"},{"issue":"3","key":"9422_CR56","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1023\/A:1015556407380","volume":"5","author":"W Stirling","year":"2002","unstructured":"Stirling, W., Goodrich, M., Packard, D.: Satisficing equilibria: a non-classical theory of games and decisions. J. Auton. Agents. Multi-Agent Sys. 5(3), 305\u2013328 (2002)","journal-title":"J. Auton. Agents. Multi-Agent Sys."},{"doi-asserted-by":"crossref","unstructured":"Sujit, P., Sinha, A., Ghose, D.: Multiple uav task allocation using negotiation. In: proceedings of AAMAS, pp. 471\u2013478 (2006)","key":"9422_CR57","DOI":"10.1145\/1160633.1160719"},{"unstructured":"Thaler, R., Sunstein, C.: Nudge: Improving decisions about Health, Wealth, and Happiness. Yale University Press (2008)","key":"9422_CR58"},{"issue":"4481","key":"9422_CR59","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1126\/science.7455683","volume":"211","author":"A Tversky","year":"1981","unstructured":"Tversky, A., Kahneman, D.: The framing of decisions and the psychology of choice. Sci. 211(4481), 453\u2013458 (1981)","journal-title":"Sci."},{"doi-asserted-by":"crossref","unstructured":"Vermorel, J., Mohri, M.: Multi-armed bandit algorithms and empirical evaluation. In: proceedings of European Conference on Machine Learning, pp. 437\u2013448 (2005)","key":"9422_CR60","DOI":"10.1007\/11564096_42"},{"issue":"10","key":"9422_CR61","doi-asserted-by":"crossref","first-page":"1550","DOI":"10.1109\/5.58337","volume":"78","author":"P Werbos","year":"1990","unstructured":"Werbos, P.: Backpropagation through time: what it does and how to do it. Proc. IEEE 78(10), 1550\u20131560 (1990)","journal-title":"Proc. IEEE"},{"issue":"2","key":"9422_CR62","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/s10458-008-9037-x","volume":"17","author":"D Weyns","year":"2008","unstructured":"Weyns, D., Boucke, N., Holvoet, T.: A field-based versus a protocol-based approach for adaptive task assignment. J. Auton. Agents. Multi-Agent Sys. 17(2), 288\u2013319 (2008)","journal-title":"J. Auton. Agents. Multi-Agent Sys."},{"key":"9422_CR63","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0169-023X(02)00042-3","volume":"41","author":"N Wijngaards","year":"2002","unstructured":"Wijngaards, N., Overeinder, B., Steen, M. V., Brazier, F.: Supporting internet-scale multi-agent systems. Data Knowl. Eng. 41, 229\u2013245 (2002)","journal-title":"Data Knowl. Eng."},{"doi-asserted-by":"crossref","unstructured":"Wright, J., Brown, K.: Beyond equilibrium: Predicting human behavior in normal-form games. In: proceedings of AAAI, pp. 901\u2013907 (2010)","key":"9422_CR64","DOI":"10.1145\/1807406.1807449"},{"doi-asserted-by":"crossref","unstructured":"Yu, E.: Evolving and messaging decision-making agents. In: proceedings of AGENTS, pp. 449\u2013456 (2001)","key":"9422_CR65","DOI":"10.1145\/375735.376412"}],"container-title":["Annals of Mathematics and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-014-9422-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10472-014-9422-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-014-9422-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:33:14Z","timestamp":1746232394000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10472-014-9422-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,23]]},"references-count":65,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["9422"],"URL":"https:\/\/doi.org\/10.1007\/s10472-014-9422-x","relation":{},"ISSN":["1012-2443","1573-7470"],"issn-type":[{"type":"print","value":"1012-2443"},{"type":"electronic","value":"1573-7470"}],"subject":[],"published":{"date-parts":[[2014,5,23]]}}}