Control of the Contract of a Public Transport Service

Size: px
Start display at page:

Download "Control of the Contract of a Public Transport Service"

Transcription

1 Control of the Contract of a Public Transport Service Andrea Lodi, Enrico Malaguti, Nicolás E. Stier-Moses Tommaso Bonino DEIS, University of Bologna Graduate School of Business, Columbia University SRM - Reti e Mobilità January 11th, 2012 Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 1

2 Outline 1 Problem description 2 A non-cooperative game 3 Optimized performance control 4 Case study: applying the control to a mid-size city 5 Conclusions Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 2

3 Problem Description Every day 6000 bus journeys are run in a mid-size Italian city (Bologna), serving customers. Large part of the service cost is publicly subsidized. This is quite a common situation where two players are involved in a service provision: An Agency, who designs and contracts the service; An Operator, who provides the service. Some questions arise: what is the relationship between Agency and Operator? How does the Agency control the service provided by the Operator? Can the Agency trust the information provided by the Operator about its own performance? Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 3

4 Problem Description More specifically for the bus service case (similar in all the European Union): The Agency: designs the service (timetable); designs the service contract; organizes a public auction to contract the service; is in charge of controlling the service provided. The Operator winning the auction: hires the drivers; manages the buses; is in charge of providing the service. The Operator reports his performance to the Agency. If the contractual obligations are not met, the Operator receives a fine from the Agency. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 4

5 Problem Description The issue in this scheme is the informative asymmetry between the Operator and the Agency. The Agency needs a control procedure to check the correctness of the information received from the Operator, and the latter will be fined hefty in case the information provided is false or inaccurate. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 5

6 Agency - Operator: a non-cooperative game The Agency-Operator relationship is modeled as a dynamic non-cooperative game. 1 Contract design: the Agency fixes the fines level. For each reported skipped journey, there is a fine f. For each non-reported skipped journey, there is fine F, if discovered. 2 The Operator decides about the level of effort is going to spend to provide the service. 3 The Operator decides about being honest or not reporting missing journeys. It will be honest about the single journey with probability t. The Agency decides the average budget per journey to allocate to the controls, which determines the probability p for a journey to be checked. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 6

7 Agency - Operator: a non-cooperative game Third stage: Operator: honest about the single journey with probability t. Agency: checks a journey with probability p. p = 0 when the agency does not check; in general p = p(b, P), where B is the budget allocated to the control and P is the control procedure. In general, p = p(b, P) cannot be computed in closed-form. We propose an optimized performance control procedure, so p = p(b, P) is the result of an optimization model. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 7

8 Agency - Operator: a non-cooperative game Third stage equilibrium: The operator reports skipped journeys with probability t. Its payoff (per journey) is: = f (1 q)t F (1 q)(1 t)p π 3 OP Where 1 q is the probability of skipping a journey. The optimal operator pure strategy is declaring missing journeys (t = 1) when p > f /F and not declaring (t = 0) when p < f /F. Approximating p(b A ) = kba α strategy at equilibrium is: (k > 0, 0 < α 1) the operator mixed t NE = 1 1 (1 q)(η 2 + η 3 )αk( f kf ) α 1 α Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 8

9 Optimized Performance Control Problem: given a budget of working hours, check as many journeys as possible. A profit is associated with the check of each journey. Frequency check: counts the number of buses observed at a bus stops. For each stop, a few waiting times are defined, and a profit is defined depending on the number of journeys that can be observed during that time. Controllers can move in the town by riding the buses or by walking. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 9

10 Optimized Performance Control More formally, we are given a sparse directed graph G = (V, A), where V is the set of bus stops and A the set of (bus or walking) connections. Each arc a has a positive travel time d a. Stops s V have associated waiting times t which give a profit π t s, depending on the journey observed during t. Given K controllers, each of them working W hours, we want to route them in the town so as to maximize the profit of the collected information. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 10

11 Optimized Performance Control A MILP model for optimized performance control: We use binary variables ys t,k to denote the check of stop s during time period t of length τ by controller k. Integer variables za k denote the number of times arc a is traversed by controller k. (working hours) max πsy t s t,k k K s S t T s d a za k + τs t ys t,k W k k K a A s S t T s Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 11

12 Optimized Performance Control (balance) (office visit) (no duplication) a δ + (s) z k a = (subtour elimination) a δ (s) a δ (Σ) a δ + (0) y t,k k K t T s z k a 1 k K s 1 s S z k a t T s y t,k s z k a t T s y t,k s s S, k K k K, Σ V, s Σ, 0 / Σ ys t,k {0, 1} s S, t T, k K za k Z + a A, k K. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 12

13 Optimized Performance Control (balance) a δ + (s) z k a = a δ (s) z k a t T s y t,k s s S, k K Note that we work with a sparse graph, and the shortest path between nodes is not computed in a pre-processing phase. Some nodes (blue) are crossed but not checked.!" #" $" y t,k i = 1 y t,k j = 0 y t,k k = 1 Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 13

14 Separation We use separation to tackle the exponentially many subtour elimination constraints. Given a fractional solution (ȳ, z), define a max-flow problem for each k by setting the arc capacities to z a k, a A. Let f s be the value of the max flow from the office (0) to s and Σ a set of vertices, including s, corresponding to a min-cut. If we have that s > f s, t T s ȳ t,k we add the corresponding violated constraint za k ys t,k. t T s a δ (Σ) Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 14

15 Additional Constraints In order to forbid solutions which visit stops which are close to each other, we add to the model a set of clique constraints of the form: y t,k k K t T s s 1 s C greedily computed on a suited incompatibility graph. Additional constraints are considered for imposing the check of special stops. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 15

16 Algorithm Models with about 100 nodes can be solved through Branch-and-Cut with CPLEX12. For larger graphs, we get good bounds but it is hard to produce feasible solutions. This is because when we add a subtour elimination constraint, the solver easily finds an equivalent solution by re-routing on non-checked (blue) nodes. a δ (Σ) z k a t T s y t,k s!" #" Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 16

17 Algorithm Models with about 100 nodes can be solved through Branch-and-Cut with CPLEX12. For larger graphs, we get good bounds but it is hard to produce feasible solutions. This is because when we add a subtour elimination constraint, the solver easily finds an equivalent solution by re-routing on non-checked (blue) nodes. a δ (Σ) z k a t T s y t,k s!" #"!" #" Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 17

18 Algorithm To obtain good feasible solutions we designed a MIP-heuristic that uses information from the current fractional solution: consider a reduced problem restricted to nodes s having an associated y s larger then a given threshold; define an associated complete graph G; solve the model on G for a limited amount of time; map the solution back to G. The algorithm is executed during the Branch-and-Cut with a specified frequency. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 18

19 Case study: applying the Model to Bologna We focused on 29 high frequency lines (average time between two consecutive journeys of at most 30 minutes), serving the 81.9% of the total operator passengers and visiting 1104 stops. The graph G = (S {0}, A) is derived from the real network by considering only arcs corresponding to existing network connections (i.e., G is sparse). There are two kinds of such arcs, namely: bus connections and pedestrian connections. In total, A Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 19

20 Case study: bus connections Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 20

21 Case study: overall graph (bus and pedestrian connections) Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 21

22 Case study: Iterated Control The schedule of the controllers is optimized day-by-day through the deterministic model. In order to discount recently collected information, the profits associated with lines and stops are modified as follows: π s = π s (1 1 1 int ), where int is the interval of time (in days) since the last visit to the stop. Figure: Two consecutive working days for two controllers. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 22

23 Case study: solving the model All algorithms were coded in C and tested on a single core of a core i5 650 PC at 3.20GHz and 8GB ram under linux. We used CPLEX 12.2 as MIP solver. When solving the whole model on the sparse graph G, separation is called only for integer solutions, and we generate at most 5 cuts per controller. When solving the reduced model (MIP-heuristic) on the complete graph G, we call the cut generating procedure every 100 nodes of Branch-and-Cut, in addition to separating all integer solutions. The MIP-heuristic is executed every 100 nodes of the Branch-and-Cut with a time limit of 200 seconds. The overall method has a time limit of 2 hours. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 23

24 Case study: solving the model We considered 6 basic scenarios with 2, 3 and 4 controllers, each one working 3 or 6 hours. Solutions are compared with those produced by an iterated greedy randomized algorithm. controllers working hours gap nodes cuts heur gap Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 24

25 Case study: check probability!"#!$%&'()*+,-,%.%/0(( )"!!# ("!!# '"!!# &"!!# %"!!# %#*+,-.+//0.1# &#*+,-.+//0.1# '#*+,-.+//0.1# $"!!#!"!!#!# (# $!# $(# %!# %(# &!# "+1*2( p(b A ) is computed through the model. Effort b A is measured in working hours w i per controller i, so p(b A ) = p(w) with w = (w 1,..., w k ). Experiments tell us that we have p(b A ) = p(w ) with W = k i=1 w i. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 25

26 Case study: feedback on game!"#!$%&'()*+,-,%.%/0(( )"!!# ("!!# '"!!# &"!!# %"!!# %#*+,-.+//0.1# &#*+,-.+//0.1# '#*+,-.+//0.1# $"!!#!"!!#!# (# $!# $(# %!# %(# &!# "+1*2( By considering the current fines: f = 250 and F = 5000 euro, we need to have p > 5% to make honesty the optimal pure strategy for the operator (t = 1). This can be obtained with 24 hours of optimized control. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 26

27 Conclusions We considered the problem of an Agency who contracts a public transport service to a private Operator. The informative asymmetry between the two players was addressed from a game theoretical perspective, coming to the (not too surprising) conclusion that the Operator will not provide reliable information if no one checks the information correctness. We proposed an optimized control strategy based on the solution of a price collecting routing model. The model solution describes the working day of the controllers, who will check the service at bus stops. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 27

28 Conclusions The output of the model was used, as a feedback to the game, to evaluate the optimal level of effort to be spent in the checks. At the service contract renewal, the game theoretical/optimization approach will support the design of the new contract. Control of the Contract of a Public Transport Service (A. Lodi, E. Malaguti, N.E. Stier-Moses, T. Bonino) 28

Anavilhanas Natural Reserve (about 4000 Km 2 )

Anavilhanas Natural Reserve (about 4000 Km 2 ) Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,

More information

Transportation Timetabling

Transportation Timetabling Outline DM87 SCHEDULING, TIMETABLING AND ROUTING 1. Sports Timetabling Lecture 16 Transportation Timetabling Marco Chiarandini 2. Transportation Timetabling Tanker Scheduling Air Transport Train Timetabling

More information

On-demand high-capacity ride-sharing via dynamic trip-vehicle assignment - Supplemental Material -

On-demand high-capacity ride-sharing via dynamic trip-vehicle assignment - Supplemental Material - On-demand high-capacity ride-sharing via dynamic trip-vehicle assignment - Supplemental Material - Javier Alonso-Mora, Samitha Samaranayake, Alex Wallar, Emilio Frazzoli and Daniela Rus Abstract Ride sharing

More information

Optimizing Client Association in 60 GHz Wireless Access Networks

Optimizing Client Association in 60 GHz Wireless Access Networks Optimizing Client Association in 60 GHz Wireless Access Networks G Athanasiou, C Weeraddana, C Fischione, and L Tassiulas KTH Royal Institute of Technology, Stockholm, Sweden University of Thessaly, Volos,

More information

An applied optimization based method for line planning to minimize travel time

An applied optimization based method for line planning to minimize travel time Downloaded from orbit.dtu.dk on: Dec 15, 2017 An applied optimization based method for line planning to minimize travel time Bull, Simon Henry; Rezanova, Natalia Jurjevna; Lusby, Richard Martin ; Larsen,

More information

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio

More information

A short introduction to Security Games

A short introduction to Security Games Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science

More information

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Introduction Intelligent security for physical infrastructures Our objective:

More information

CS510 \ Lecture Ariel Stolerman

CS510 \ Lecture Ariel Stolerman CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will

More information

Railway disruption management

Railway disruption management Railway disruption management 4 5 6 7 8 Delft Center for Systems and Control Railway disruption management For the degree of Master of Science in Systems and Control at Delft University of Technology

More information

Convergence in competitive games

Convergence in competitive games Convergence in competitive games Vahab S. Mirrokni Computer Science and AI Lab. (CSAIL) and Math. Dept., MIT. This talk is based on joint works with A. Vetta and with A. Sidiropoulos, A. Vetta DIMACS Bounded

More information

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional

More information

Vehicle routing problems with road-network information

Vehicle routing problems with road-network information 50 Dominique Feillet Mines Saint-Etienne and LIMOS, CMP Georges Charpak, F-13541 Gardanne, France Vehicle routing problems with road-network information ORBEL - Liège, February 1, 2018 Vehicle Routing

More information

Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility

Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility theorem (consistent decisions under uncertainty should

More information

A new mixed integer linear programming formulation for one problem of exploration of online social networks

A new mixed integer linear programming formulation for one problem of exploration of online social networks manuscript No. (will be inserted by the editor) A new mixed integer linear programming formulation for one problem of exploration of online social networks Aleksandra Petrović Received: date / Accepted:

More information

Decision Mathematics D1 Advanced/Advanced Subsidiary. Friday 17 May 2013 Morning Time: 1 hour 30 minutes

Decision Mathematics D1 Advanced/Advanced Subsidiary. Friday 17 May 2013 Morning Time: 1 hour 30 minutes Paper Reference(s) 6689/01R Edexcel GCE Decision Mathematics D1 Advanced/Advanced Subsidiary Friday 17 May 2013 Morning Time: 1 hour 30 minutes Materials required for examination Nil Items included with

More information

The School Bus Routing and Scheduling Problem with Transfers

The School Bus Routing and Scheduling Problem with Transfers The School Bus Routing and Scheduling Problem with Transfers Michael Bögl Christian Doppler Laboratory for efficient intermodal transport operations, Johannes Kepler University Linz, Altenberger Straße

More information

CSC 380 Final Presentation. Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis

CSC 380 Final Presentation. Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis CSC 380 Final Presentation Connect 4 David Alligood, Scott Swiger, Jo Van Voorhis Intro Connect 4 is a zero-sum game, which means one party wins everything or both parties win nothing; there is no mutual

More information

Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities

Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities Neighborhood based heuristics for a Two-level Hierarchical Location Problem with modular node capacities Bernardetta Addis, Giuliana Carello Alberto Ceselli Dipartimento di Elettronica e Informazione,

More information

Part VII: VRP - advanced topics

Part VII: VRP - advanced topics Part VII: VRP - advanced topics c R.F. Hartl, S.N. Parragh 1/32 Overview Dealing with TW and duration constraints Solving VRP to optimality c R.F. Hartl, S.N. Parragh 2/32 Dealing with TW and duration

More information

Travel time uncertainty and network models

Travel time uncertainty and network models Travel time uncertainty and network models CE 392C TRAVEL TIME UNCERTAINTY One major assumption throughout the semester is that travel times can be predicted exactly and are the same every day. C = 25.87321

More information

Problem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1

Problem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1 Solutions for Homework 2 Networked Life, Fall 204 Prof Michael Kearns Due as hardcopy at the start of class, Tuesday December 9 Problem (5 points: Graded by Shahin) Recall the network structure of our

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition

More information

Construction of periodic timetables on a suburban rail network-case study from Mumbai

Construction of periodic timetables on a suburban rail network-case study from Mumbai Construction of periodic timetables on a suburban rail network-case study from Mumbai Soumya Dutta a,1, Narayan Rangaraj b,2, Madhu Belur a,3, Shashank Dangayach c,4, Karuna Singh d,5 a Department of Electrical

More information

Graphs and Network Flows IE411. Lecture 14. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 14. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 14 Dr. Ted Ralphs IE411 Lecture 14 1 Review: Labeling Algorithm Pros Guaranteed to solve any max flow problem with integral arc capacities Provides constructive tool

More information

Chapter 3 Learning in Two-Player Matrix Games

Chapter 3 Learning in Two-Player Matrix Games Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play

More information

final examination on May 31 Topics from the latter part of the course (covered in homework assignments 4-7) include:

final examination on May 31 Topics from the latter part of the course (covered in homework assignments 4-7) include: The final examination on May 31 may test topics from any part of the course, but the emphasis will be on topic after the first three homework assignments, which were covered in the midterm. Topics from

More information

Two-stage column generation and applications in container terminal management

Two-stage column generation and applications in container terminal management Two-stage column generation and applications in container terminal management Ilaria Vacca Matteo Salani Michel Bierlaire Transport and Mobility Laboratory EPFL 8th Swiss Transport Research Conference

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Using hybrid optimization algorithms for very-large graph problems and for small real-time problems

Using hybrid optimization algorithms for very-large graph problems and for small real-time problems Using hybrid optimization algorithms for very-large graph problems and for small real-time problems Karla Hoffman George Mason University Joint work with: Brian Smith, Tony Coudert, Rudy Sultana and James

More information

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown, Slide 1 Lecture Overview 1 Domination 2 Rationalizability 3 Correlated Equilibrium 4 Computing CE 5 Computational problems in

More information

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se Topic 1: defining games and strategies Drawing a game tree is usually the most informative way to represent an extensive form game. Here is one

More information

Link and Link Impedance 2018/02/13. VECTOR DATA ANALYSIS Network Analysis TYPES OF OPERATIONS

Link and Link Impedance 2018/02/13. VECTOR DATA ANALYSIS Network Analysis TYPES OF OPERATIONS VECTOR DATA ANALYSIS Network Analysis A network is a system of linear features that has the appropriate attributes for the flow of objects. A network is typically topology-based: lines (arcs) meet at intersections

More information

Trip Assignment. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1. 2 Link cost function 2

Trip Assignment. Lecture Notes in Transportation Systems Engineering. Prof. Tom V. Mathew. 1 Overview 1. 2 Link cost function 2 Trip Assignment Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents 1 Overview 1 2 Link cost function 2 3 All-or-nothing assignment 3 4 User equilibrium assignment (UE) 3 5

More information

Optimization of On-line Appointment Scheduling

Optimization of On-line Appointment Scheduling Optimization of On-line Appointment Scheduling Brian Denton Edward P. Fitts Department of Industrial and Systems Engineering North Carolina State University Tsinghua University, Beijing, China May, 2012

More information

Delay Aware Link Scheduling for Multi-hop TDMA Wireless Networks

Delay Aware Link Scheduling for Multi-hop TDMA Wireless Networks 1 Delay Aware Link Scheduling for Multi-hop TDMA Wireless Networks Petar Djukic and Shahrokh Valaee Abstract Time division multiple access (TDMA) based medium access control (MAC) protocols can provide

More information

AI Approaches to Ultimate Tic-Tac-Toe

AI Approaches to Ultimate Tic-Tac-Toe AI Approaches to Ultimate Tic-Tac-Toe Eytan Lifshitz CS Department Hebrew University of Jerusalem, Israel David Tsurel CS Department Hebrew University of Jerusalem, Israel I. INTRODUCTION This report is

More information

Partially Overlapped Channel Assignment for Multi-Channel Wireless Mesh Networks

Partially Overlapped Channel Assignment for Multi-Channel Wireless Mesh Networks Partially Overlapped Channel Assignment for Multi-Channel Wireless Mesh Networks A. Hamed Mohsenian Rad and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British

More information

CS221 Project Final Report Gomoku Game Agent

CS221 Project Final Report Gomoku Game Agent CS221 Project Final Report Gomoku Game Agent Qiao Tan qtan@stanford.edu Xiaoti Hu xiaotihu@stanford.edu 1 Introduction Gomoku, also know as five-in-a-row, is a strategy board game which is traditionally

More information

Ad Hoc Networks 8 (2010) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:

Ad Hoc Networks 8 (2010) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage: Ad Hoc Networks 8 (2010) 545 563 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc Routing, scheduling and channel assignment in Wireless Mesh Networks:

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study

Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study Aircraft routing for on-demand air transportation with service upgrade and maintenance events: compact model and case study Pedro Munari, Aldair Alvarez Production Engineering Department, Federal University

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

16.410/413 Principles of Autonomy and Decision Making

16.410/413 Principles of Autonomy and Decision Making 16.10/13 Principles of Autonomy and Decision Making Lecture 2: Sequential Games Emilio Frazzoli Aeronautics and Astronautics Massachusetts Institute of Technology December 6, 2010 E. Frazzoli (MIT) L2:

More information

The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis

The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis The Path Restoration Version of the Spare Capacity Allocation Problem with Modularity Restrictions: Models, Algorithms, and an Empirical Analysis Jeffery L. Kennington Mark W. Lewis Department of Computer

More information

CS 229 Final Project: Using Reinforcement Learning to Play Othello

CS 229 Final Project: Using Reinforcement Learning to Play Othello CS 229 Final Project: Using Reinforcement Learning to Play Othello Kevin Fry Frank Zheng Xianming Li ID: kfry ID: fzheng ID: xmli 16 December 2016 Abstract We built an AI that learned to play Othello.

More information

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines

More information

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011 On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background

More information

Monte Carlo based battleship agent

Monte Carlo based battleship agent Monte Carlo based battleship agent Written by: Omer Haber, 313302010; Dror Sharf, 315357319 Introduction The game of battleship is a guessing game for two players which has been around for almost a century.

More information

Column Generation. A short Introduction. Martin Riedler. AC Retreat

Column Generation. A short Introduction. Martin Riedler. AC Retreat Column Generation A short Introduction Martin Riedler AC Retreat Contents 1 Introduction 2 Motivation 3 Further Notes MR Column Generation June 29 July 1 2 / 13 Basic Idea We already heard about Cutting

More information

LECTURE 26: GAME THEORY 1

LECTURE 26: GAME THEORY 1 15-382 COLLECTIVE INTELLIGENCE S18 LECTURE 26: GAME THEORY 1 INSTRUCTOR: GIANNI A. DI CARO ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation

More information

Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems:

Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems: Using Nested Column Generation & Generic Programming to solve Staff Scheduling Problems: Using Compile-time Customisation to create a Flexible C++ Engine for Staff Rostering Andrew Mason & Ed Bulog Department

More information

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance

More information

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Advanced Techniques for Mobile Robotics Location-Based Activity Recognition Wolfram Burgard, Cyrill Stachniss, Kai Arras, Maren Bennewitz Activity Recognition Based on L. Liao, D. J. Patterson, D. Fox,

More information

Research Article On Connectivity Limits in Ad Hoc Networks with Beamforming Antennas

Research Article On Connectivity Limits in Ad Hoc Networks with Beamforming Antennas Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 009, Article ID 878419, 15 pages doi:10.1155/009/878419 Research Article On Connectivity Limits in Ad Hoc

More information

Assignment Problem. Introduction. Formulation of an assignment problem

Assignment Problem. Introduction. Formulation of an assignment problem Assignment Problem Introduction The assignment problem is a special type of transportation problem, where the objective is to minimize the cost or time of completing a number of jobs by a number of persons.

More information

Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks

Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks 1 Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract In modern

More information

Appendix A A Primer in Game Theory

Appendix A A Primer in Game Theory Appendix A A Primer in Game Theory This presentation of the main ideas and concepts of game theory required to understand the discussion in this book is intended for readers without previous exposure to

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18 24.1 Introduction Today we re going to spend some time discussing game theory and algorithms.

More information

The Wireless Network Jamming Problem Subject to Protocol Interference

The Wireless Network Jamming Problem Subject to Protocol Interference The Wireless Network Jamming Problem Subject to Protocol Interference Author information blinded December 22, 2014 Abstract We study the following problem in wireless network security: Which jamming device

More information

Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks

Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks Hongkun Li, Yu Cheng, Chi Zhou Department of Electrical and Computer Engineering Illinois Institute of Technology

More information

Shuttle Planning for Link Closures in Urban Public Transport Networks

Shuttle Planning for Link Closures in Urban Public Transport Networks Downloaded from orbit.dtu.dk on: Jan 02, 2019 Shuttle Planning for Link Closures in Urban Public Transport Networks van der Hurk, Evelien; Koutsopoulos, Haris N.; Wilson, Nigel; Kroon, Leo G.; Maroti,

More information

Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem

Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem Branch-and-cut for a real-life highly constrained soccer tournament scheduling problem Guillermo Durán 1, Thiago F. Noronha 2, Celso C. Ribeiro 3, Sebastián Souyris 1, and Andrés Weintraub 1 1 Department

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

Dynamic Programming in Real Life: A Two-Person Dice Game

Dynamic Programming in Real Life: A Two-Person Dice Game Mathematical Methods in Operations Research 2005 Special issue in honor of Arie Hordijk Dynamic Programming in Real Life: A Two-Person Dice Game Henk Tijms 1, Jan van der Wal 2 1 Department of Econometrics,

More information

Adversary Search. Ref: Chapter 5

Adversary Search. Ref: Chapter 5 Adversary Search Ref: Chapter 5 1 Games & A.I. Easy to measure success Easy to represent states Small number of operators Comparison against humans is possible. Many games can be modeled very easily, although

More information

Game Theory. Vincent Kubala

Game Theory. Vincent Kubala Game Theory Vincent Kubala Goals Define game Link games to AI Introduce basic terminology of game theory Overall: give you a new way to think about some problems What Is Game Theory? Field of work involving

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game

More information

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010 Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)

More information

From ProbLog to ProLogic

From ProbLog to ProLogic From ProbLog to ProLogic Angelika Kimmig, Bernd Gutmann, Luc De Raedt Fluffy, 21/03/2007 Part I: ProbLog Motivating Application ProbLog Inference Experiments A Probabilistic Graph Problem What is the probability

More information

TRAINS ON TIME. Optimizing and Scheduling of railway timetables. Soumya Dutta. IIT Bombay. Students Reading Group. July 27, 2016

TRAINS ON TIME. Optimizing and Scheduling of railway timetables. Soumya Dutta. IIT Bombay. Students Reading Group. July 27, 2016 TRAINS ON TIME Optimizing and Scheduling of railway timetables Soumya Dutta IIT Bombay Students Reading Group July 27, 2016 Soumya Dutta TRAINS ON TIME 1 / 22 Outline Introduction to Optimization Examples

More information

Game Theory ( nd term) Dr. S. Farshad Fatemi. Graduate School of Management and Economics Sharif University of Technology.

Game Theory ( nd term) Dr. S. Farshad Fatemi. Graduate School of Management and Economics Sharif University of Technology. Game Theory 44812 (1393-94 2 nd term) Dr. S. Farshad Fatemi Graduate School of Management and Economics Sharif University of Technology Spring 2015 Dr. S. Farshad Fatemi (GSME) Game Theory Spring 2015

More information

Game Theory. Vincent Kubala

Game Theory. Vincent Kubala Game Theory Vincent Kubala vkubala@cs.brown.edu Goals efine game Link games to AI Introduce basic terminology of game theory Overall: give you a new way to think about some problems What Is Game Theory?

More information

CMU-Q Lecture 20:

CMU-Q Lecture 20: CMU-Q 15-381 Lecture 20: Game Theory I Teacher: Gianni A. Di Caro ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation in (rational) multi-agent

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

Fast Detour Computation for Ride Sharing

Fast Detour Computation for Ride Sharing Fast Detour Computation for Ride Sharing Robert Geisberger, Dennis Luxen, Sabine Neubauer, Peter Sanders, Lars Volker Universität Karlsruhe (TH), 76128 Karlsruhe, Germany {geisberger,luxen,sanders}@ira.uka.de;

More information

Games and Adversarial Search II

Games and Adversarial Search II Games and Adversarial Search II Alpha-Beta Pruning (AIMA 5.3) Some slides adapted from Richard Lathrop, USC/ISI, CS 271 Review: The Minimax Rule Idea: Make the best move for MAX assuming that MIN always

More information

SURVIVABILITY in the face of failures has become an essential

SURVIVABILITY in the face of failures has become an essential IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL., NO., JUNE 00 Spare Capacity Allocation in Two-Layer Networks Yu Liu, Member, IEEE, David Tipper, Senior Member, IEEE, Korn Vajanapoom Abstract In

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

QUALITY OF SERVICE (QoS) is driving research and

QUALITY OF SERVICE (QoS) is driving research and 482 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 3, MARCH 2015 Joint Allocation of Resource Blocks, Power, and Energy-Harvesting Relays in Cellular Networks Sobia Jangsher, Student Member,

More information

CS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements

CS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements CS 171 Introduction to AI Lecture 1 Adversarial search Milos Hauskrecht milos@cs.pitt.edu 39 Sennott Square Announcements Homework assignment is out Programming and experiments Simulated annealing + Genetic

More information

Chapter 13. Game Theory

Chapter 13. Game Theory Chapter 13 Game Theory A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes. You can t outrun a bear, scoffs the camper. His friend coolly replies, I don

More information

Section Notes 6. Game Theory. Applied Math 121. Week of March 22, understand the difference between pure and mixed strategies.

Section Notes 6. Game Theory. Applied Math 121. Week of March 22, understand the difference between pure and mixed strategies. Section Notes 6 Game Theory Applied Math 121 Week of March 22, 2010 Goals for the week be comfortable with the elements of game theory. understand the difference between pure and mixed strategies. be able

More information

Cross-Layer Game Theoretic Mechanism for Tactical Mobile Networks

Cross-Layer Game Theoretic Mechanism for Tactical Mobile Networks Cross-Layer Game Theoretic Mechanism for Tactical Mobile Networks William J. Rogers Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of

More information

Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas

Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas Antonio Capone Department of Electronics and Information Politecnico di Milano Email: capone@elet.polimi.it

More information

Variable Bit Rate Transmission Schedule Generation in Green Vehicular Roadside Units

Variable Bit Rate Transmission Schedule Generation in Green Vehicular Roadside Units Variable Bit Rate Transmission Schedule Generation in Green Vehicular Roadside Units Abdulla A. Hammad 1, Terence D. Todd 1 and George Karakostas 2 1 Department of Electrical and Computer Engineering McMaster

More information

Adversarial Search and Game Theory. CS 510 Lecture 5 October 26, 2017

Adversarial Search and Game Theory. CS 510 Lecture 5 October 26, 2017 Adversarial Search and Game Theory CS 510 Lecture 5 October 26, 2017 Reminders Proposals due today Midterm next week past midterms online Midterm online BBLearn Available Thurs-Sun, ~2 hours Overview Game

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY

MASSACHUSETTS INSTITUTE OF TECHNOLOGY MASSACHUSETTS INSTITUTE OF TECHNOLOGY 15.053 Optimization Methods in Management Science (Spring 2007) Problem Set 7 Due April 12 th, 2007 at :30 pm. You will need 157 points out of 185 to receive a grade

More information

Multiplayer Pushdown Games. Anil Seth IIT Kanpur

Multiplayer Pushdown Games. Anil Seth IIT Kanpur Multiplayer Pushdown Games Anil Seth IIT Kanpur Multiplayer Games we Consider These games are played on graphs (finite or infinite) Generalize two player infinite games. Any number of players are allowed.

More information

SF2972: Game theory. Mark Voorneveld, February 2, 2015

SF2972: Game theory. Mark Voorneveld, February 2, 2015 SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se February 2, 2015 Topic: extensive form games. Purpose: explicitly model situations in which players move sequentially; formulate appropriate

More information

Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks

Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks Multi-Dimensional Conflict Graph Based Computing for Optimal Capacity in MR-MC Wireless Networks Hongkun Li, Yu Cheng, Chi Zhou Dept. Electrical & Computer Engineering Illinois Institute of Technology

More information

An Optimization Approach for Real Time Evacuation Reroute. Planning

An Optimization Approach for Real Time Evacuation Reroute. Planning An Optimization Approach for Real Time Evacuation Reroute Planning Gino J. Lim and M. Reza Baharnemati and Seon Jin Kim November 16, 2015 Abstract This paper addresses evacuation route management in the

More information

Principles of Autonomy and Decision Making. Brian C. Williams / December 10 th, 2003

Principles of Autonomy and Decision Making. Brian C. Williams / December 10 th, 2003 Principles of Autonomy and Decision Making Brian C. Williams 16.410/16.413 December 10 th, 2003 1 Outline Objectives Agents and Their Building Blocks Principles for Building Agents: Modeling Formalisms

More information

Instability of Scoring Heuristic In games with value exchange, the heuristics are very bumpy Make smoothing assumptions search for "quiesence"

Instability of Scoring Heuristic In games with value exchange, the heuristics are very bumpy Make smoothing assumptions search for quiesence More on games Gaming Complications Instability of Scoring Heuristic In games with value exchange, the heuristics are very bumpy Make smoothing assumptions search for "quiesence" The Horizon Effect No matter

More information

ECON 282 Final Practice Problems

ECON 282 Final Practice Problems ECON 282 Final Practice Problems S. Lu Multiple Choice Questions Note: The presence of these practice questions does not imply that there will be any multiple choice questions on the final exam. 1. How

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Energy Saving Routing Strategies in IP Networks

Energy Saving Routing Strategies in IP Networks Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini

More information

Energy Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network

Energy Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network 1 Energy Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network Deyu Zhang, Zhigang Chen, Member, IEEE, Ju Ren, Student Member, IEEE, Ning Zhang, Member,

More information

CS-E4800 Artificial Intelligence

CS-E4800 Artificial Intelligence CS-E4800 Artificial Intelligence Jussi Rintanen Department of Computer Science Aalto University March 9, 2017 Difficulties in Rational Collective Behavior Individual utility in conflict with collective

More information