scholarly journals Symmetry-Breaking Constraints for Grid-Based Multi-Agent Path Finding

Author(s):  
Jiaoyang Li ◽  
Daniel Harabor ◽  
Peter J. Stuckey ◽  
Hang Ma ◽  
Sven Koenig

We describe a new way of reasoning about symmetric collisions for Multi-Agent Path Finding (MAPF) on 4-neighbor grids. We also introduce a symmetry-breaking constraint to resolve these conflicts. This specialized technique allows us to identify and eliminate, in a single step, all permutations of two currently assigned but incompatible paths. Each such permutation has exactly the same cost as a current path, and each one results in a new collision between the same two agents. We show that the addition of symmetry-breaking techniques can lead to an exponential reduction in the size of the search space of CBS, a popular framework for MAPF, and report significant improvements in both runtime and success rate versus CBSH and EPEA* – two recent and state-of-the-art MAPF algorithms.

Author(s):  
Jiaoyang Li ◽  
Pavel Surynek ◽  
Ariel Felner ◽  
Hang Ma ◽  
T. K. Satish Kumar ◽  
...  

Multi-Agent Path Finding (MAPF) has been widely studied in the AI community. For example, Conflict-Based Search (CBS) is a state-of-the-art MAPF algorithm based on a twolevel tree-search. However, previous MAPF algorithms assume that an agent occupies only a single location at any given time, e.g., a single cell in a grid. This limits their applicability in many real-world domains that have geometric agents in lieu of point agents. Geometric agents are referred to as “large” agents because they can occupy multiple points at the same time. In this paper, we formalize and study LAMAPF, i.e., MAPF for large agents. We first show how CBS can be adapted to solve LA-MAPF. We then present a generalized version of CBS, called Multi-Constraint CBS (MCCBS), that adds multiple constraints (instead of one constraint) for an agent when it generates a high-level search node. We introduce three different approaches to choose such constraints as well as an approach to compute admissible heuristics for the high-level search. Experimental results show that all MC-CBS variants outperform CBS by up to three orders of magnitude in terms of runtime. The best variant also outperforms EPEA* (a state-of-the-art A*-based MAPF solver) in all cases and MDD-SAT (a state-of-the-art reduction-based MAPF solver) in some cases.


10.29007/zwdh ◽  
2018 ◽  
Author(s):  
Madalina Erascu ◽  
Flavia Micota ◽  
Daniela Zaharie

The problem of Cloud resource provisioning for component-based applications is very important. It consists in the allocation of virtual machines (VMs) from various Cloud Providers (CPs), to a set of applications such that the constraints induced by the inter- actions between components and by the components hardware/software requirements are satisfied and the performance objectives are optimized (e.g. costs are minimized). It can be formulated as a constrained optimization problem and tackled by state-of-the-art optimization modulo theories (OMT) tools. The performance of the OMT tools is highly dependent on the way the problem is formalized as this determines the size of the search space. In the case when the number of VMs offers is large, a naive encoding which does not exploit the symmetries of the underlying problem leads to a huge search space making the optimization problem intractable. We overcame this issue by reducing the search space by using: (1) a heuristic which exploits the particularities of the application by detect- ing cliques in the conflict graph of the application components fixing all components of the clique with the largest number of component instances, and (2) a lex-leader method for breaking variable symmetry where the canonical solution fulfills an order based on either the number of components deployed on VMs, or on the VMs price. As the result, the running time of the optimization problem improves considerably and the optimization problem scales up to hundreds of VM offers. We also observed that by combining the heuristic with the lex-leader method we obtained better computational results than by using them separately, suggesting the fact that symmetry breaking constraints have the advantage of interacting well with the search heuristic being used.


Author(s):  
Yanchen Deng ◽  
Bo An

Incomplete GDL-based algorithms including Max-sum and its variants are important methods for multi-agent optimization. However, they face a significant scalability challenge as the computational overhead grows exponentially with respect to the arity of each utility function. Generic Domain Pruning (GDP) technique reduces the computational effort by performing a one-shot pruning to filter out suboptimal entries. Unfortunately, GDP could perform poorly when dealing with dense local utilities and ties which widely exist in many domains. In this paper, we present several novel sorting-based acceleration algorithms by alleviating the effect of densely distributed local utilities. Specifically, instead of one-shot pruning in GDP, we propose to integrate both search and pruning to iteratively reduce the search space. Besides, we cope with the utility ties by organizing the search space of tied utilities into AND/OR trees to enable branch-and-bound. Finally, we propose a discretization mechanism to offer a tradeoff between the reconstruction overhead and the pruning efficiency. We demonstrate the superiorities of our algorithms over the state-of-the-art from both theoretical and experimental perspectives.


Author(s):  
Hang Ma ◽  
Daniel Harabor ◽  
Peter J. Stuckey ◽  
Jiaoyang Li ◽  
Sven Koenig

We study prioritized planning for Multi-Agent Path Finding (MAPF). Existing prioritized MAPF algorithms depend on rule-of-thumb heuristics and random assignment to determine a fixed total priority ordering of all agents a priori. We instead explore the space of all possible partial priority orderings as part of a novel systematic and conflict-driven combinatorial search framework. In a variety of empirical comparisons, we demonstrate state-of-the-art solution qualities and success rates, often with similar runtimes to existing algorithms. We also develop new theoretical results that explore the limitations of prioritized planning, in terms of completeness and optimality, for the first time.


Author(s):  
Pavel Surynek

We unify search-based and compilation-based approaches to multi-agent path finding (MAPF) through satisfiability modulo theories (SMT). The task in MAPF is to navigate agents in an undirected graph to given goal vertices so that they do not collide. We rephrase Conflict-Based Search (CBS), one of the state-of-the-art algorithms for optimal MAPF solving, in the terms of SMT. This idea combines SAT-based solving known from MDD-SAT, a SAT-based optimal MAPF solver, at the low-level with conflict elimination of CBS at the high-level. Where the standard CBS branches the search after a conflict, we refine the propositional model with a disjunctive constraint. Our novel algorithm called SMT-CBS hence does not branch at the high-level but incrementally extends the propositional model. We experimentally compare SMT-CBS with CBS, ICBS, and MDD-SAT.


2020 ◽  
Vol 8 (1) ◽  
pp. 33-41
Author(s):  
Dr. S. Sarika ◽  

Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.


2021 ◽  
Vol 37 (1-4) ◽  
pp. 1-30
Author(s):  
Vincenzo Agate ◽  
Alessandra De Paola ◽  
Giuseppe Lo Re ◽  
Marco Morana

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent on disseminating false reputation values. Given the variety of application scenarios in which RMSs can be adopted, as well as the multitude of behaviours that agents can implement, designers need RMS evaluation tools that allow them to predict the robustness of the system to security attacks, before its actual deployment. To this aim, we present a simulation software for the vulnerability evaluation of RMSs and illustrate three case studies in which this tool was effectively used to model and assess state-of-the-art RMSs.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Tao Chen ◽  
Wei Gou ◽  
Dizhou Xie ◽  
Teng Xiao ◽  
Wei Yi ◽  
...  

AbstractWe experimentally study quantum Zeno effects in a parity-time (PT) symmetric cold atom gas periodically coupled to a reservoir. Based on the state-of-the-art control of inter-site couplings of atoms in a momentum lattice, we implement a synthetic two-level system with passive PT symmetry over two lattice sites, where an effective dissipation is introduced through repeated couplings to the rest of the lattice. Quantum Zeno (anti-Zeno) effects manifest in our experiment as the overall dissipation of the two-level system becoming suppressed (enhanced) with increasing coupling intensity or frequency. We demonstrate that quantum Zeno regimes exist in the broken PT symmetry phase, and are bounded by exceptional points separating the PT symmetric and PT broken phases, as well as by a discrete set of critical coupling frequencies. Our experiment establishes the connection between PT-symmetry-breaking transitions and quantum Zeno effects, and is extendable to higher dimensions or to interacting regimes, thanks to the flexible control with atoms in a momentum lattice.


2014 ◽  
Vol 95 ◽  
pp. 175-180
Author(s):  
Takuya Agou ◽  
Hiroya Imao

It is necessary to formpinning centers in superconductors to allow the flow of large currents throughthe specimens. To clarify the properties of pinning centers, it is preferableto investigate single crystals. In this study, heat treatment was used to dopevarious oxides into Bi2Sr2CaCu2Ox(Bi-2212) single crystals prepared by self-flux methods and the criticalcurrent (Ic) was measured. The oxides used in this study were Al2O3and the rare earth oxides Er2O3and Nd2O3. At 77K, Nd2O3and Er2O3 are magnetic, whereas Al2O3is nonmagnetic. The Ic of the samples were measured as a current per width of 1cm (Ics). The resulting Ics of the Bi-2212 single crystal was 2.8A/cm and thatof the Al2O3 doped Bi-2212 sample was 4.5A/cm. Comparedwith these samples, doping the other rare earth oxides gave Ics values inexcess 10A/cm. The results indicated that the doping oxides were effective inoperating as pinning centers in the samples. We assumed the current path in asingle crystal, and calculated the Ics by superconducting current simulation.The results indicated that the oxides permeated from a crystal surface in aporous shape. The oxides increase the current which flow in the Cu-O2planes that are parallel to the a-b plane.


Sign in / Sign up

Export Citation Format

Share Document