{"id":"https://openalex.org/W4415428106","doi":"https://doi.org/10.3233/faia251326","title":"Adaptive Graph Pruning for Multi-Agent Communication","display_name":"Adaptive Graph Pruning for Multi-Agent Communication","publication_year":2025,"publication_date":"2025-10-21","ids":{"openalex":"https://openalex.org/W4415428106","doi":"https://doi.org/10.3233/faia251326"},"language":null,"primary_location":{"id":"doi:10.3233/faia251326","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251326","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia251326","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101884383","display_name":"Boyi Li","orcid":"https://orcid.org/0000-0002-8921-3808"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Boyi Li","raw_affiliation_strings":["Zhejiang University \u2013 University of Illinois Urbana-Champaign Institute"],"affiliations":[{"raw_affiliation_string":"Zhejiang University \u2013 University of Illinois Urbana-Champaign Institute","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064430294","display_name":"Zhonghan Zhao","orcid":"https://orcid.org/0000-0003-0993-2018"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhonghan Zhao","raw_affiliation_strings":["Zhejiang University, College of Computer Science and Technology"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, College of Computer Science and Technology","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046443901","display_name":"Der\u2010Horng Lee","orcid":"https://orcid.org/0000-0001-5428-8810"},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Der-Horng Lee","raw_affiliation_strings":["Zhejiang University \u2013 University of Illinois Urbana-Champaign Institute"],"affiliations":[{"raw_affiliation_string":"Zhejiang University \u2013 University of Illinois Urbana-Champaign Institute","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089410490","display_name":"Gaoang Wang","orcid":"https://orcid.org/0000-0002-8403-1538"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Gaoang Wang","raw_affiliation_strings":["Zhejiang University \u2013 University of Illinois Urbana-Champaign Institute","Zhejiang University, College of Computer Science and Technology"],"affiliations":[{"raw_affiliation_string":"Zhejiang University \u2013 University of Illinois Urbana-Champaign Institute","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"Zhejiang University, College of Computer Science and Technology","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101884383"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67709563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9373999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9373999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.6855000257492065},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.6129999756813049},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5548999905586243},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.48489999771118164},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.45399999618530273},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.38609999418258667},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.33889999985694885}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7612000107765198},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.6855000257492065},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.6129999756813049},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5548999905586243},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.48489999771118164},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.45399999618530273},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4496999979019165},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44130000472068787},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.38609999418258667},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35679998993873596},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3538999855518341},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.3301999866962433},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.3125},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.29899999499320984},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.2732999920845032},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C115067241","wikidata":"https://www.wikidata.org/wiki/Q1639854","display_name":"Token passing","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.2542000114917755}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia251326","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251326","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia251326","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251326","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Large":[0],"Language":[1],"Model":[2],"(LLM)":[3],"based":[4],"multi-agent":[5,74],"systems":[6],"have":[7],"shown":[8],"impressive":[9],"performance":[10,168,188,227,238],"across":[11,113,153,159],"various":[12],"fields":[13],"of":[14,36,53,133,169,220,248],"tasks,":[15,183],"further":[16],"enhanced":[17],"through":[18],"collaborative":[19],"debate":[20],"and":[21,45,55,83,110,116,121,135,156,198,207,222,255],"communication":[22,26,40,84,137,178],"using":[23],"carefully":[24],"designed":[25],"topologies.":[27],"However,":[28],"existing":[29,242],"methods":[30],"typically":[31],"employ":[32],"a":[33,71,91,124,165,215],"fixed":[34],"number":[35,52,132],"agents":[37,54,134],"or":[38],"static":[39],"structures,":[41],"requiring":[42],"manual":[43],"pre-definition,":[44],"thus":[46],"struggle":[47],"to":[48,58,104,128,181],"dynamically":[49,129,175],"adapt":[50],"the":[51,131,211,241],"topology":[56,85],"simultaneously":[57],"varying":[59],"task":[60,192],"complexities.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65],"propose":[66],"Adaptive":[67],"Graph":[68],"Pruning":[69],"(AGP),":[70],"novel":[72],"task-adaptive":[73],"collaboration":[75],"framework":[76],"that":[77,144],"jointly":[78,118],"optimizes":[79],"agent":[80,102],"quantity":[81],"(hard-pruning)":[82],"(soft-pruning).":[86],"Specifically,":[87],"our":[88,145],"method":[89],"employs":[90],"two-stage":[92],"training":[93,97,205,231,249],"strategy:":[94],"firstly,":[95],"independently":[96],"soft-pruning":[98,122],"networks":[99],"for":[100],"different":[101],"quantities":[103],"determine":[105],"optimal":[106],"agent-quantity-specific":[107],"complete":[108,126],"graphs":[109],"positional":[111],"masks":[112],"specific":[114,182],"tasks;":[115],"then":[117],"optimizing":[119],"hard-pruning":[120],"within":[123],"maximum":[125],"graph":[127],"configure":[130],"their":[136],"topologies":[138,179],"per":[139],"task.":[140],"Extensive":[141],"experiments":[142],"demonstrate":[143],"approach":[146],"is:":[147],"(1)":[148],"High-performing,":[149],"achieving":[150,225],"state-of-the-art":[151],"results":[152],"six":[154,251],"benchmarks":[155],"consistently":[157],"generalizes":[158],"multiple":[160],"mainstream":[161],"LLM":[162],"architectures,":[163],"with":[164,184,214,228,234],"increase":[166],"in":[167,189,217],"2.58%":[170],"\u223c":[171],"9.84%;":[172],"(2)":[173],"Task-adaptive,":[174],"constructing":[176],"optimized":[177],"tailored":[180],"an":[185],"extremely":[186],"high":[187,226],"all":[190],"three":[191],"categories":[193],"(general":[194],"reasoning,":[195,197],"mathematical":[196],"code":[199,254],"generation);":[200],"(3)":[201],"Token-economical,":[202],"having":[203],"fewer":[204],"steps":[206,232,247],"token":[208,218],"consumption":[209,219],"at":[210,260],"same":[212],"time,":[213],"decrease":[216],"90%+;":[221],"(4)":[223],"Training-efficient,":[224],"very":[229],"few":[230],"compared":[233],"other":[235],"methods.":[236],"The":[237],"will":[239],"surpass":[240],"baselines":[243],"after":[244],"about":[245],"ten":[246],"under":[250],"benchmarks.":[252],"Our":[253],"demos":[256],"are":[257],"publicly":[258],"available":[259],"https://resurgamm.github.io/AGP/.":[261]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-24T00:00:00"}
