Control of the Contract of a Public Transport Service
|
|
- Eustace Cameron
- 5 years ago
- Views:
Transcription
1 Control of the Contract of a Public Transport Service Andrea Lodi, Enrico Malaguti, Nicolás E. Stier-Moses Tommaso Bonino DEIS, University of Bologna Graduate School of Business, Columbia University SRM - Reti e Mobilità January 11th, 2012 Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 1
2 Outline 1 Problem description 2 A non-cooperative game 3 Optimized performance control 4 Case study: applying the control to a mid-size city 5 Conclusions Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 2
3 Problem Description Every day 6000 bus journeys are run in a mid-size Italian city (Bologna), serving customers. Large part of the service cost is publicly subsidized. This is quite a common situation where two players are involved in a service provision: An Agency, who designs and contracts the service; An Operator, who provides the service. Some questions arise: what is the relationship between Agency and Operator? How does the Agency control the service provided by the Operator? Can the Agency trust the information provided by the Operator about its own performance? Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 3
4 Problem Description More specifically for the bus service case (similar in all the European Union): The Agency: designs the service (timetable); designs the service contract; organizes a public auction to contract the service; is in charge of controlling the service provided. The Operator winning the auction: hires the drivers; manages the buses; is in charge of providing the service. The Operator reports his performance to the Agency. If the contractual obligations are not met, the Operator receives a fine from the Agency. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 4
5 Problem Description The issue in this scheme is the informative asymmetry between the Operator and the Agency. The Agency needs a control procedure to check the correctness of the information received from the Operator, and the latter will be fined hefty in case the information provided is false or inaccurate. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 5
6 Agency - Operator: a non-cooperative game The Agency-Operator relationship is modeled as a dynamic non-cooperative game. 1 Contract design: the Agency fixes the fines level. For each reported skipped journey, there is a fine f. For each non-reported skipped journey, there is fine F, if discovered. 2 The Operator decides about the level of effort is going to spend to provide the service. 3 The Operator decides about being honest or not reporting missing journeys. It will be honest about the single journey with probability t. The Agency decides the average budget per journey to allocate to the controls, which determines the probability p for a journey to be checked. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 6
7 Agency - Operator: a non-cooperative game Third stage: Operator: honest about the single journey with probability t. Agency: checks a journey with probability p. p = 0 when the agency does not check; in general p = p(b, P), where B is the budget allocated to the control and P is the control procedure. In general, p = p(b, P) cannot be computed in closed-form. We propose an optimized performance control procedure, so p = p(b, P) is the result of an optimization model. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 7
8 Agency - Operator: a non-cooperative game Third stage equilibrium: The operator reports skipped journeys with probability t. Its payoff (per journey) is: = f (1 q)t F (1 q)(1 t)p π 3 OP Where 1 q is the probability of skipping a journey. The optimal operator pure strategy is declaring missing journeys (t = 1) when p > f /F and not declaring (t = 0) when p < f /F. Approximating p(b A ) = kba α strategy at equilibrium is: (k > 0, 0 < α 1) the operator mixed t NE = 1 1 (1 q)(η 2 + η 3 )αk( f kf ) α 1 α Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 8
9 Optimized Performance Control Problem: given a budget of working hours, check as many journeys as possible. A profit is associated with the check of each journey. Frequency check: counts the number of buses observed at a bus stops. For each stop, a few waiting times are defined, and a profit is defined depending on the number of journeys that can be observed during that time. Controllers can move in the town by riding the buses or by walking. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 9
10 Optimized Performance Control More formally, we are given a sparse directed graph G = (V, A), where V is the set of bus stops and A the set of (bus or walking) connections. Each arc a has a positive travel time d a. Stops s V have associated waiting times t which give a profit π t s, depending on the journey observed during t. Given K controllers, each of them working W hours, we want to route them in the town so as to maximize the profit of the collected information. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 10
11 Optimized Performance Control A MILP model for optimized performance control: We use binary variables ys t,k to denote the check of stop s during time period t of length τ by controller k. Integer variables za k denote the number of times arc a is traversed by controller k. (working hours) max πsy t s t,k k K s S t T s d a za k + τs t ys t,k W k k K a A s S t T s Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 11
12 Optimized Performance Control (balance) (office visit) (no duplication) a δ + (s) z k a = (subtour elimination) a δ (s) a δ (Σ) a δ + (0) y t,k k K t T s z k a 1 k K s 1 s S z k a t T s y t,k s z k a t T s y t,k s s S, k K k K, Σ V, s Σ, 0 / Σ ys t,k {0, 1} s S, t T, k K za k Z + a A, k K. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 12
13 Optimized Performance Control (balance) a δ + (s) z k a = a δ (s) z k a t T s y t,k s s S, k K Note that we work with a sparse graph, and the shortest path between nodes is not computed in a pre-processing phase. Some nodes (blue) are crossed but not checked.!" #" $" y t,k i = 1 y t,k j = 0 y t,k k = 1 Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 13
14 Separation We use separation to tackle the exponentially many subtour elimination constraints. Given a fractional solution (ȳ, z), define a max-flow problem for each k by setting the arc capacities to z a k, a A. Let f s be the value of the max flow from the office (0) to s and Σ a set of vertices, including s, corresponding to a min-cut. If we have that s > f s, t T s ȳ t,k we add the corresponding violated constraint za k ys t,k. t T s a δ (Σ) Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 14
15 Additional Constraints In order to forbid solutions which visit stops which are close to each other, we add to the model a set of clique constraints of the form: y t,k k K t T s s 1 s C greedily computed on a suited incompatibility graph. Additional constraints are considered for imposing the check of special stops. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 15
16 Algorithm Models with about 100 nodes can be solved through Branch-and-Cut with CPLEX12. For larger graphs, we get good bounds but it is hard to produce feasible solutions. This is because when we add a subtour elimination constraint, the solver easily finds an equivalent solution by re-routing on non-checked (blue) nodes. a δ (Σ) z k a t T s y t,k s!" #" Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 16
17 Algorithm Models with about 100 nodes can be solved through Branch-and-Cut with CPLEX12. For larger graphs, we get good bounds but it is hard to produce feasible solutions. This is because when we add a subtour elimination constraint, the solver easily finds an equivalent solution by re-routing on non-checked (blue) nodes. a δ (Σ) z k a t T s y t,k s!" #"!" #" Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 17
18 Algorithm To obtain good feasible solutions we designed a MIP-heuristic that uses information from the current fractional solution: consider a reduced problem restricted to nodes s having an associated y s larger then a given threshold; define an associated complete graph G; solve the model on G for a limited amount of time; map the solution back to G. The algorithm is executed during the Branch-and-Cut with a specified frequency. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 18
19 Case study: applying the Model to Bologna We focused on 29 high frequency lines (average time between two consecutive journeys of at most 30 minutes), serving the 81.9% of the total operator passengers and visiting 1104 stops. The graph G = (S {0}, A) is derived from the real network by considering only arcs corresponding to existing network connections (i.e., G is sparse). There are two kinds of such arcs, namely: bus connections and pedestrian connections. In total, A Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 19
20 Case study: bus connections Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 20
21 Case study: overall graph (bus and pedestrian connections) Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 21
22 Case study: Iterated Control The schedule of the controllers is optimized day-by-day through the deterministic model. In order to discount recently collected information, the profits associated with lines and stops are modified as follows: π s = π s (1 1 1 int ), where int is the interval of time (in days) since the last visit to the stop. Figure: Two consecutive working days for two controllers. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 22
23 Case study: solving the model All algorithms were coded in C and tested on a single core of a core i5 650 PC at 3.20GHz and 8GB ram under linux. We used CPLEX 12.2 as MIP solver. When solving the whole model on the sparse graph G, separation is called only for integer solutions, and we generate at most 5 cuts per controller. When solving the reduced model (MIP-heuristic) on the complete graph G, we call the cut generating procedure every 100 nodes of Branch-and-Cut, in addition to separating all integer solutions. The MIP-heuristic is executed every 100 nodes of the Branch-and-Cut with a time limit of 200 seconds. The overall method has a time limit of 2 hours. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 23
24 Case study: solving the model We considered 6 basic scenarios with 2, 3 and 4 controllers, each one working 3 or 6 hours. Solutions are compared with those produced by an iterated greedy randomized algorithm. controllers working hours gap nodes cuts heur gap Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 24
25 Case study: check probability!"#!$%&'()*+,-,%.%/0(( )"!!# ("!!# '"!!# &"!!# %"!!# %#*+,-.+//0.1# &#*+,-.+//0.1# '#*+,-.+//0.1# $"!!#!"!!#!# (# $!# $(# %!# %(# &!# "+1*2( p(b A ) is computed through the model. Effort b A is measured in working hours w i per controller i, so p(b A ) = p(w) with w = (w 1,..., w k ). Experiments tell us that we have p(b A ) = p(w ) with W = k i=1 w i. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 25
26 Case study: feedback on game!"#!$%&'()*+,-,%.%/0(( )"!!# ("!!# '"!!# &"!!# %"!!# %#*+,-.+//0.1# &#*+,-.+//0.1# '#*+,-.+//0.1# $"!!#!"!!#!# (# $!# $(# %!# %(# &!# "+1*2( By considering the current fines: f = 250 and F = 5000 euro, we need to have p > 5% to make honesty the optimal pure strategy for the operator (t = 1). This can be obtained with 24 hours of optimized control. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 26
27 Conclusions We considered the problem of an Agency who contracts a public transport service to a private Operator. The informative asymmetry between the two players was addressed from a game theoretical perspective, coming to the (not too surprising) conclusion that the Operator will not provide reliable information if no one checks the information correctness. We proposed an optimized control strategy based on the solution of a price collecting routing model. The model solution describes the working day of the controllers, who will check the service at bus stops. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 27
28 Conclusions The output of the model was used, as a feedback to the game, to evaluate the optimal level of effort to be spent in the checks. At the service contract renewal, the game theoretical/optimization approach will support the design of the new contract. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 28
Anavilhanas Natural Reserve (about 4000 Km 2 )
Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,
More informationTransportation Timetabling
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING 1. Sports Timetabling Lecture 16 Transportation Timetabling Marco Chiarandini 2. Transportation Timetabling Tanker Scheduling Air Transport Train Timetabling
More informationOn-demand high-capacity ride-sharing via dynamic trip-vehicle assignment - Supplemental Material -
On-demand high-capacity ride-sharing via dynamic trip-vehicle assignment - Supplemental Material - Javier Alonso-Mora, Samitha Samaranayake, Alex Wallar, Emilio Frazzoli and Daniela Rus Abstract Ride sharing
More informationOptimizing Client Association in 60 GHz Wireless Access Networks
Optimizing Client Association in 60 GHz Wireless Access Networks G Athanasiou, C Weeraddana, C Fischione, and L Tassiulas KTH Royal Institute of Technology, Stockholm, Sweden University of Thessaly, Volos,
More informationAn applied optimization based method for line planning to minimize travel time
Downloaded from orbit.dtu.dk on: Dec 15, 2017 An applied optimization based method for line planning to minimize travel time Bull, Simon Henry; Rezanova, Natalia Jurjevna; Lusby, Richard Martin ; Larsen,
More informationA GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks
MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio
More informationA short introduction to Security Games
Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science
More informationA GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS
A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:
More informationCS510 \ Lecture Ariel Stolerman
CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will
More informationRailway disruption management
Railway disruption management 4 5 6 7 8 Delft Center for Systems and Control Railway disruption management For the degree of Master of Science in Systems and Control at Delft University of Technology
More informationConvergence in competitive games
Convergence in competitive games Vahab S. Mirrokni Computer Science and AI Lab. (CSAIL) and Math. Dept., MIT. This talk is based on joint works with A. Vetta and with A. Sidiropoulos, A. Vetta DIMACS Bounded
More informationChapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks
Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional
More informationVehicle routing problems with road-network information
50 Dominique Feillet Mines Saint-Etienne and LIMOS, CMP Georges Charpak, F-13541 Gardanne, France Vehicle routing problems with road-network information ORBEL - Liège, February 1, 2018 Vehicle Routing
More informationSummary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility
Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility theorem (consistent decisions under uncertainty should
More informationA new mixed integer linear programming formulation for one problem of exploration of online social networks
manuscript No. (will be inserted by the editor) A new mixed integer linear programming formulation for one problem of exploration of online social networks Aleksandra Petrović Received: date / Accepted:
More informationDecision Mathematics D1 Advanced/Advanced Subsidiary. Friday 17 May 2013 Morning Time: 1 hour 30 minutes
Paper Reference(s) 6689/01R Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Friday 17 May 2013 Morning Time: 1 hour 30 minutes Materials required for examination Nil Items included with
More informationThe School Bus Routing and Scheduling Problem with Transfers
The School Bus Routing and Scheduling Problem with Transfers Michael Bögl Christian Doppler Laboratory for efficient intermodal transport operations, Johannes Kepler University Linz, Altenberger Straße
More informationCSC 380 Final Presentation. Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis
CSC 380 Final Presentation Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis Intro Connect 4 is a zero-sum game, which means one party wins everything or both parties win nothing; there is no mutual
More informationNeighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities
Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities Bernardetta Addis, Giuliana Carello Alberto Ceselli Dipartimento di Elettronica e Informazione,
More informationPart VII: VRP - advanced topics
Part VII: VRP - advanced topics c R.F. Hartl, S.N. Parragh 1/32 Overview Dealing with TW and duration constraints Solving VRP to optimality c R.F. Hartl, S.N. Parragh 2/32 Dealing with TW and duration
More informationTravel time uncertainty and network models
Travel time uncertainty and network models CE 392C TRAVEL TIME UNCERTAINTY One major assumption throughout the semester is that travel times can be predicted exactly and are the same every day. C = 25.87321
More informationProblem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1
Solutions for Homework 2 Networked Life, Fall 204 Prof Michael Kearns Due as hardcopy at the start of class, Tuesday December 9 Problem (5 points: Graded by Shahin) Recall the network structure of our
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition
More informationConstruction of periodic timetables on a suburban rail network-case study from Mumbai
Construction of periodic timetables on a suburban rail network-case study from Mumbai Soumya Dutta a,1, Narayan Rangaraj b,2, Madhu Belur a,3, Shashank Dangayach c,4, Karuna Singh d,5 a Department of Electrical
More informationGraphs and Network Flows IE411. Lecture 14. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 14 Dr. Ted Ralphs IE411 Lecture 14 1 Review: Labeling Algorithm Pros Guaranteed to solve any max flow problem with integral arc capacities Provides constructive tool
More informationChapter 3 Learning in Two-Player Matrix Games
Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play
More informationfinal examination on May 31 Topics from the latter part of the course (covered in homework assignments 4-7) include:
The final examination on May 31 may test topics from any part of the course, but the emphasis will be on topic after the first three homework assignments, which were covered in the midterm. Topics from
More informationTwo-stage column generation and applications in container terminal management
Two-stage column generation and applications in container terminal management Ilaria Vacca Matteo Salani Michel Bierlaire Transport and Mobility Laboratory EPFL 8th Swiss Transport Research Conference
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationUsing hybrid optimization algorithms for very-large graph problems and for small real-time problems
Using hybrid optimization algorithms for very-large graph problems and for small real-time problems Karla Hoffman George Mason University Joint work with: Brian Smith, Tony Coudert, Rudy Sultana and James
More informationDomination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown
Game Theory Week 3 Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown, Slide 1 Lecture Overview 1 Domination 2 Rationalizability 3 Correlated Equilibrium 4 Computing CE 5 Computational problems in
More informationTopic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition
SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se Topic 1: defining games and strategies Drawing a game tree is usually the most informative way to represent an extensive form game. Here is one
More informationLink and Link Impedance 2018/02/13. VECTOR DATA ANALYSIS Network Analysis TYPES OF OPERATIONS
VECTOR DATA ANALYSIS Network Analysis A network is a system of linear features that has the appropriate attributes for the flow of objects. A network is typically topology-based: lines (arcs) meet at intersections
More informationTrip Assignment. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1. 2 Link cost function 2
Trip Assignment Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents 1 Overview 1 2 Link cost function 2 3 All-or-nothing assignment 3 4 User equilibrium assignment (UE) 3 5
More informationOptimization of On-line Appointment Scheduling
Optimization of On-line Appointment Scheduling Brian Denton Edward P. Fitts Department of Industrial and Systems Engineering North Carolina State University Tsinghua University, Beijing, China May, 2012
More informationDelay Aware Link Scheduling for Multi-hop TDMA Wireless Networks
1 Delay Aware Link Scheduling for Multi-hop TDMA Wireless Networks Petar Djukic and Shahrokh Valaee Abstract Time division multiple access (TDMA) based medium access control (MAC) protocols can provide
More informationAI Approaches to Ultimate Tic-Tac-Toe
AI Approaches to Ultimate Tic-Tac-Toe Eytan Lifshitz CS Department Hebrew University of Jerusalem, Israel David Tsurel CS Department Hebrew University of Jerusalem, Israel I. INTRODUCTION This report is
More informationPartially Overlapped Channel Assignment for Multi-Channel Wireless Mesh Networks
Partially Overlapped Channel Assignment for Multi-Channel Wireless Mesh Networks A. Hamed Mohsenian Rad and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British
More informationCS221 Project Final Report Gomoku Game Agent
CS221 Project Final Report Gomoku Game Agent Qiao Tan qtan@stanford.edu Xiaoti Hu xiaotihu@stanford.edu 1 Introduction Gomoku, also know as five-in-a-row, is a strategy board game which is traditionally
More informationAd Hoc Networks 8 (2010) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:
Ad Hoc Networks 8 (2010) 545 563 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc Routing, scheduling and channel assignment in Wireless Mesh Networks:
More informationLecture 2. 1 Nondeterministic Communication Complexity
Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols
More informationAircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study
Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study Pedro Munari, Aldair Alvarez Production Engineering Department, Federal University
More informationOpportunistic Communications under Energy & Delay Constraints
Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities
More information16.410/413 Principles of Autonomy and Decision Making
16.10/13 Principles of Autonomy and Decision Making Lecture 2: Sequential Games Emilio Frazzoli Aeronautics and Astronautics Massachusetts Institute of Technology December 6, 2010 E. Frazzoli (MIT) L2:
More informationThe Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis
The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis Jeffery L. Kennington Mark W. Lewis Department of Computer
More informationCS 229 Final Project: Using Reinforcement Learning to Play Othello
CS 229 Final Project: Using Reinforcement Learning to Play Othello Kevin Fry Frank Zheng Xianming Li ID: kfry ID: fzheng ID: xmli 16 December 2016 Abstract We built an AI that learned to play Othello.
More informationSurveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan
Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines
More informationOn Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011
On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background
More informationMonte Carlo based battleship agent
Monte Carlo based battleship agent Written by: Omer Haber, 313302010; Dror Sharf, 315357319 Introduction The game of battleship is a guessing game for two players which has been around for almost a century.
More informationColumn Generation. A short Introduction. Martin Riedler. AC Retreat
Column Generation A short Introduction Martin Riedler AC Retreat Contents 1 Introduction 2 Motivation 3 Further Notes MR Column Generation June 29 July 1 2 / 13 Basic Idea We already heard about Cutting
More informationLECTURE 26: GAME THEORY 1
15-382 COLLECTIVE INTELLIGENCE S18 LECTURE 26: GAME THEORY 1 INSTRUCTOR: GIANNI A. DI CARO ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation
More informationUsing Nested Column Generation & Generic Programming to solve Staff Scheduling Problems:
Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems: Using Compile-time Customisation to create a Flexible C++ Engine for Staff Rostering Andrew Mason & Ed Bulog Department
More informationMulti-user Space Time Scheduling for Wireless Systems with Multiple Antenna
Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance
More informationAdvanced Techniques for Mobile Robotics Location-Based Activity Recognition
Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Wolfram Burgard, Cyrill Stachniss, Kai Arras, Maren Bennewitz Activity Recognition Based on L. Liao, D. J. Patterson, D. Fox,
More informationResearch Article On Connectivity Limits in Ad Hoc Networks with Beamforming Antennas
Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 009, Article ID 878419, 15 pages doi:10.1155/009/878419 Research Article On Connectivity Limits in Ad Hoc
More informationAssignment Problem. Introduction. Formulation of an assignment problem
Assignment Problem Introduction The assignment problem is a special type of transportation problem, where the objective is to minimize the cost or time of completing a number of jobs by a number of persons.
More informationJoint Scheduling and Fast Cell Selection in OFDMA Wireless Networks
1 Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract In modern
More informationAppendix A A Primer in Game Theory
Appendix A A Primer in Game Theory This presentation of the main ideas and concepts of game theory required to understand the discussion in this book is intended for readers without previous exposure to
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18 24.1 Introduction Today we re going to spend some time discussing game theory and algorithms.
More informationThe Wireless Network Jamming Problem Subject to Protocol Interference
The Wireless Network Jamming Problem Subject to Protocol Interference Author information blinded December 22, 2014 Abstract We study the following problem in wireless network security: Which jamming device
More informationMulti-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks
Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks Hongkun Li, Yu Cheng, Chi Zhou Department of Electrical and Computer Engineering Illinois Institute of Technology
More informationShuttle Planning for Link Closures in Urban Public Transport Networks
Downloaded from orbit.dtu.dk on: Jan 02, 2019 Shuttle Planning for Link Closures in Urban Public Transport Networks van der Hurk, Evelien; Koutsopoulos, Haris N.; Wilson, Nigel; Kroon, Leo G.; Maroti,
More informationBranch-and-cut for a real-life highly constrained soccer tournament scheduling problem
Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem Guillermo Durán 1, Thiago F. Noronha 2, Celso C. Ribeiro 3, Sebastián Souyris 1, and Andrés Weintraub 1 1 Department
More informationOptimal Multicast Routing in Ad Hoc Networks
Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting
More informationDynamic Programming in Real Life: A Two-Person Dice Game
Mathematical Methods in Operations Research 2005 Special issue in honor of Arie Hordijk Dynamic Programming in Real Life: A Two-Person Dice Game Henk Tijms 1, Jan van der Wal 2 1 Department of Econometrics,
More informationAdversary Search. Ref: Chapter 5
Adversary Search Ref: Chapter 5 1 Games & A.I. Easy to measure success Easy to represent states Small number of operators Comparison against humans is possible. Many games can be modeled very easily, although
More informationGame Theory. Vincent Kubala
Game Theory Vincent Kubala Goals Define game Link games to AI Introduce basic terminology of game theory Overall: give you a new way to think about some problems What Is Game Theory? Field of work involving
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game
More informationComputational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010
Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)
More informationFrom ProbLog to ProLogic
From ProbLog to ProLogic Angelika Kimmig, Bernd Gutmann, Luc De Raedt Fluffy, 21/03/2007 Part I: ProbLog Motivating Application ProbLog Inference Experiments A Probabilistic Graph Problem What is the probability
More informationTRAINS ON TIME. Optimizing and Scheduling of railway timetables. Soumya Dutta. IIT Bombay. Students Reading Group. July 27, 2016
TRAINS ON TIME Optimizing and Scheduling of railway timetables Soumya Dutta IIT Bombay Students Reading Group July 27, 2016 Soumya Dutta TRAINS ON TIME 1 / 22 Outline Introduction to Optimization Examples
More informationGame Theory ( nd term) Dr. S. Farshad Fatemi. Graduate School of Management and Economics Sharif University of Technology.
Game Theory 44812 (1393-94 2 nd term) Dr. S. Farshad Fatemi Graduate School of Management and Economics Sharif University of Technology Spring 2015 Dr. S. Farshad Fatemi (GSME) Game Theory Spring 2015
More informationGame Theory. Vincent Kubala
Game Theory Vincent Kubala vkubala@cs.brown.edu Goals efine game Link games to AI Introduce basic terminology of game theory Overall: give you a new way to think about some problems What Is Game Theory?
More informationCMU-Q Lecture 20:
CMU-Q 15-381 Lecture 20: Game Theory I Teacher: Gianni A. Di Caro ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation in (rational) multi-agent
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationFast Detour Computation for Ride Sharing
Fast Detour Computation for Ride Sharing Robert Geisberger, Dennis Luxen, Sabine Neubauer, Peter Sanders, Lars Volker Universität Karlsruhe (TH), 76128 Karlsruhe, Germany {geisberger,luxen,sanders}@ira.uka.de;
More informationGames and Adversarial Search II
Games and Adversarial Search II Alpha-Beta Pruning (AIMA 5.3) Some slides adapted from Richard Lathrop, USC/ISI, CS 271 Review: The Minimax Rule Idea: Make the best move for MAX assuming that MIN always
More informationSURVIVABILITY in the face of failures has become an essential
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL., NO., JUNE 00 Spare Capacity Allocation in Two-Layer Networks Yu Liu, Member, IEEE, David Tipper, Senior Member, IEEE, Korn Vajanapoom Abstract In
More informationA Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information
A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu
More informationQUALITY OF SERVICE (QoS) is driving research and
482 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 3, MARCH 2015 Joint Allocation of Resource Blocks, Power, and Energy-Harvesting Relays in Cellular Networks Sobia Jangsher, Student Member,
More informationCS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements
CS 171 Introduction to AI Lecture 1 Adversarial search Milos Hauskrecht milos@cs.pitt.edu 39 Sennott Square Announcements Homework assignment is out Programming and experiments Simulated annealing + Genetic
More informationChapter 13. Game Theory
Chapter 13 Game Theory A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes. You can t outrun a bear, scoffs the camper. His friend coolly replies, I don
More informationSection Notes 6. Game Theory. Applied Math 121. Week of March 22, understand the difference between pure and mixed strategies.
Section Notes 6 Game Theory Applied Math 121 Week of March 22, 2010 Goals for the week be comfortable with the elements of game theory. understand the difference between pure and mixed strategies. be able
More informationCross-Layer Game Theoretic Mechanism for Tactical Mobile Networks
Cross-Layer Game Theoretic Mechanism for Tactical Mobile Networks William J. Rogers Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of
More informationJoint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas Antonio Capone Department of Electronics and Information Politecnico di Milano Email: capone@elet.polimi.it
More informationVariable Bit Rate Transmission Schedule Generation in Green Vehicular Roadside Units
Variable Bit Rate Transmission Schedule Generation in Green Vehicular Roadside Units Abdulla A. Hammad 1, Terence D. Todd 1 and George Karakostas 2 1 Department of Electrical and Computer Engineering McMaster
More informationAdversarial Search and Game Theory. CS 510 Lecture 5 October 26, 2017
Adversarial Search and Game Theory CS 510 Lecture 5 October 26, 2017 Reminders Proposals due today Midterm next week past midterms online Midterm online BBLearn Available Thurs-Sun, ~2 hours Overview Game
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 15.053 Optimization Methods in Management Science (Spring 2007) Problem Set 7 Due April 12 th, 2007 at :30 pm. You will need 157 points out of 185 to receive a grade
More informationMultiplayer Pushdown Games. Anil Seth IIT Kanpur
Multiplayer Pushdown Games Anil Seth IIT Kanpur Multiplayer Games we Consider These games are played on graphs (finite or infinite) Generalize two player infinite games. Any number of players are allowed.
More informationSF2972: Game theory. Mark Voorneveld, February 2, 2015
SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se February 2, 2015 Topic: extensive form games. Purpose: explicitly model situations in which players move sequentially; formulate appropriate
More informationMulti-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks
Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks Hongkun Li, Yu Cheng, Chi Zhou Dept. Electrical & Computer Engineering Illinois Institute of Technology
More informationAn Optimization Approach for Real Time Evacuation Reroute. Planning
An Optimization Approach for Real Time Evacuation Reroute Planning Gino J. Lim and M. Reza Baharnemati and Seon Jin Kim November 16, 2015 Abstract This paper addresses evacuation route management in the
More informationPrinciples of Autonomy and Decision Making. Brian C. Williams / December 10 th, 2003
Principles of Autonomy and Decision Making Brian C. Williams 16.410/16.413 December 10 th, 2003 1 Outline Objectives Agents and Their Building Blocks Principles for Building Agents: Modeling Formalisms
More informationInstability of Scoring Heuristic In games with value exchange, the heuristics are very bumpy Make smoothing assumptions search for "quiesence"
More on games Gaming Complications Instability of Scoring Heuristic In games with value exchange, the heuristics are very bumpy Make smoothing assumptions search for "quiesence" The Horizon Effect No matter
More informationECON 282 Final Practice Problems
ECON 282 Final Practice Problems S. Lu Multiple Choice Questions Note: The presence of these practice questions does not imply that there will be any multiple choice questions on the final exam. 1. How
More informationOn the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing
1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result
More informationEnergy Saving Routing Strategies in IP Networks
Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini
More informationEnergy Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network
1 Energy Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network Deyu Zhang, Zhigang Chen, Member, IEEE, Ju Ren, Student Member, IEEE, Ning Zhang, Member,
More informationCS-E4800 Artificial Intelligence
CS-E4800 Artificial Intelligence Jussi Rintanen Department of Computer Science Aalto University March 9, 2017 Difficulties in Rational Collective Behavior Individual utility in conflict with collective
More information