Optimal Target Assignment and Path Finding for Teams of Agents
|
|
- Spencer Barton
- 5 years ago
- Views:
Transcription
1 Optimal Target Assignment and Path Finding for Teams of Agents Hang Ma Sven Koenig University of Southern California May 12, 2016 AAMAS, Singapore
2 Multi-Agent Path Finding (MAPF) Find collision-free paths for all agents from their start vertices to their targets.
3 Time Step 0
4 Time Step 1
5 Time Step 2
6 Time Step 3
7 Target Assignment and Path Finding (TAPF) TAPF A mix of non-anonymous MAPF and anonymous MAPF. Non-Anonymous MAPF NP-Hard Anonymous MAPF P + = TAPF
8 An Example of TAPF Team0: Agents that move from the stations to the storage locations. Team1: Agents that move from the storage locations to Station 1. Team2: Agents that move from the storage locations to Station 2. Team3: Agents that move from the storage locations to Station Figure: Kiva (Amazon Robotics) Automated Warehouse System 1. Figure 3: A small region of a Kiva layout. The green cells represent pod storage locations, the orange ovals the robots (with pods not pictured), and the purple and pink regions the queues around the inventory stations. 1 P. R. Wurman, R. D Andrea, and M. Mountz. Coordinating Hundreds of Cooperative, Autonomous Vehicles in Warehouses. In: AI Magazine 29.1 (2008), pp used to move the inventory pods with the correct bins from their storage locations to the inventory stations where a pick worker removes the desired products from the desired bin.
9 Task of TAPF Find the target assignments and collision-free paths that minimize the makespan. The makespan = the earliest time step when all agents have reached their targets.
10 How to Solve TAPF? Ideas from: Conflict-Based Search (CBS) 2 for solving non-anonymous MAPF (NP-hard). Max-flow algorithm 3 for solving anonymous MAPF (P). 2 G. Sharon et al. Conflict-based search for optimal multi-agent pathfinding. In: Artificial Intelligence 219 (2015), pp J. Yu and S. M. LaValle. Multi-agent Path Planning and Network Flow. In: Algorithmic Foundations of Robotics X, Springer Tracts in Advanced Robotics. Vol , pp
11 Conflict-Based Min-Cost Flow (CBM) for TAPF Our algorithm Conflict-Based Min-Cost Flow (CBM) = Conflict-Based Search (CBS) + (min-cost) max flow
12 CBS for Non-Anonymous MAPF CBS: 1. Find paths for each single agent separately. 2. Look for collisions in paths. 3. If there is a collision between a 1 and a 2 : Option 1 or Option 2 to avoid collision. Collision: Agent a 1, Agent a 2, Location x, Time t Constraint: Agent, Location, Time Option 1: a 1 cannot stay in x at time step t. Option 2: a 2 cannot stay in x at time step t.
13 Conflict-Based Min-Cost Flow (CBM) for TAPF Our algorithm: Conflict-Based Min-Cost Flow (CBM) considers each team to be a meta-agent. A best-search on a search tree, nodes stored in a priority queue. The key of each tree node is the makespan of the paths stored in the node. For every tree node: 1. Find paths for a single team separately. 2. Look for collisions in paths. 3. If there is a collision between team 1 and team 2 : Option 1 or Option 2 to avoid collision.
14 Conflict-Based Min-Cost Flow (CBM) for TAPF Collision: Team team 1, Team team 2, Location x, Time t Constraint: Team, Location, Time Option 1: agents in team 1 cannot stay in x at time step t. Option 2: agents in team 2 cannot stay in x at time step t.
15 Finding Paths for Single Teams Find paths for each single team team i separately = 1. Assign agents in team i to targets given to team i AND 2. Find paths for team i that have no collisions among agents in team i, according to the target assignment. Use a polynomial-time min-cost max-flow algorithm on a time-expanded network.
16 An Example c c a b d f a b d f e e
17 Finding Paths for Single Teams Separately a b d f s 2 g g 2 1 s 2 1 a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out c e s 1 1 g 1 1 team1 {c,d,e} team2 {a,b,d} {b,d,f} a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out team1 team2
18 Storing Paths and Key Root key = 2
19 Looking for Collisions in Paths a b d f s 2 g g 2 1 s 2 1 a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out c e s 1 1 g 1 1 team1 {c,d,e} team2 {a,b,d} {b,d,f} a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out team1 team2
20 Storing Colliding Teams Root key = 2 Colliding Teams (team1, team2)
21 Poping a Tree Node Root key = 2 Colliding Teams (team1, team2) Earliest Collision (team1, team2, d,1)
22 Two Options Root key = 2 Colliding Teams (team1, team2) Earliest Collision (team1, team2, d,1) (team2, d,1)
23 Option 1: Find New Paths for team 1 a b d f s 2 g g 2 1 s 2 1 c e s 1 1 g 1 1 team1 {c,c,d,e} team2 {a,b,d} {b,d,f} Constraints (team1,d,1) a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out 3 in 3 out team1 team2
24 Storing Paths and Key Root key = 2 Colliding Teams (team1, team2) Earliest Collision (team1, team2, d,1) (team2, d,1) team1 key = 3
25 Looking for Collisions in Paths a b d f s 2 g g 2 1 s 2 1 c e s 1 1 g 1 1 team1 {c,c,d,e} team2 {a,b,d} {b,d,f} Constraints (team1,d,1) a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out 3 in 3 out team1 team2
26 Storing Colliding Teams Root key = 2 Colliding Teams (team1, team2) Earliest Collision (team1, team2, d,1) (team2, d,1) team1 key = 3 Colliding Teams (team1, team2)
27 Option 2: Find New Paths for team 2 a b d f s 2 g g 2 1 s 2 1 c e s 1 1 g 1 1 a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out team1 {c,d,e} team2 {a,a,b,d} {b,b,d,f} Constraints (team2,d,1) a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out 3 in 3 out team1 team2
28 Storing Paths and Key Root key = 2 Colliding Teams (team1, team2) Earliest Collision (team1, team2, d,1) team1 key = 3 Colliding Teams (team1, team2) team2 key = 3
29 Looking for Collisions in Paths a b d f s 2 g g 2 1 s 2 1 c e s 1 1 g 1 1 a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out team1 {c,d,e} team2 {a,a,b,d} {b,b,d,f} Constraints (team2,d,1) a b c d e f s 2 1 s 2 2 s 1 1 g 2 2 g 1 1 g out 1 in 1 out 2 in 2 out 3 in 3 out team1 team2
30 Storing Colliding Teams Root key = 2 Colliding Teams (team1, team2) Earliest Collision (team1, team2, d,1) team1 key = 3 Colliding Teams (team1, team2) team2 key = 3 Colliding Teams None
31 Poping a Tree Node Ties are broken to favor nodes with fewest colliding pairs. Root key = 2 Colliding Teams (team1, team2) Earliest Collision (team1, team2, d,1) (team2, d,1) team1 key = 3 Colliding Teams (team1, team2) team2 key = 3 Colliding Teams None BINGO!
32 Edge Weights Reducing Possible Collisions Idea: Choose paths that have fewest collisions with other teams, when finding paths for a single team. Take into account the paths of other teams. Bias the search using a min-cost max-flow algorithm that finds a max flow with minimal total edge weights.
33 Edge Weights are Crucial Setups: neighbor grids with 10% randomly blocked cells. 5 agents per team. 5-minute time limits. CBM Unweighted CBM agents time success time success
34 Guarantees CBM is optimal and complete.
35 Comparisons Setups: neighbor grids with 10% randomly blocked cells. 5-minute time limits.
36 CBM is Faster CBM: Specialized solver. versus ILP (Integer Linear Program): Useful tool and easy to model. CBM ILP agents time success time (over solved instances) success
37 Spectrum: Anonymous Non-Anonymous Fixed 100 agents in total, 2 to 50 teams. Makespan Makespan Time Number of Teams Time [2 teams, 50 agents per team] [50 teams, 2 agents per team] Anonymous Non-Anonymous P NP-hard
38 Scalibility: Simulated Warehouse System Each instance has 420 agents: 210 incoming and 210 outgoing. CBM solves 40 out of the 50 Kiva instances within a time limit of 5 minutes each. Average running time over solved instances is seconds.
39 Takeaways TAPF: A mix of non-anonymous MAPF and anonymous MAPF. CBM: Guarantees optimality and completeness. Non-Anonymous MAPF NP-Hard Anonymous MAPF P + = TAPF
From Abstract Models to Executable Models for Multi-Agent Path Finding on Real Robots
From Abstract Models to Executable Models for Multi-Agent Path Finding on Real Robots Roman Barták Charles University, Czech Republic with contributions from Ivan Krasičenko, David Nohejl, Věra Škopková,
More informationOptimal Multi-Robot Path Planning on Graphs: Structure, Complexity, Algorithms, and Applications
Optimal Multi-Robot Path Planning on Graphs: Structure, Complexity, Algorithms, and Applications Jingjin Yu Computer Science Rutgers CASE 2016 Multi-Robot Workshop Outline Problem Statement Structural
More informationOptimal Target Assignment and Path Finding for Teams of Agents
Generalized Target Assignment and Path Finding Using Answer Set Programming Optimal Target Assignment and Path Finding for Teams of Agents Van Nguyen Computer Science Department New Mexico State University
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationFinal Exam December 12, 2017
Introduction to Artificial Intelligence CSE 473, Autumn 2017 Dieter Fox Final Exam December 12, 2017 Directions This exam has 7 problems with 111 points shown in the table below, and you have 110 minutes
More informationSolving Zero-Sum Security Games in Discretized Spatio-Temporal Domains
Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains APPENDIX LP Formulation for Constant Number of Resources (Fang et al. 3) For the sae of completeness, we describe the LP formulation
More informationProblem-Solving via Search Lecture 3
Lecture 3 What is a search problem? How do search algorithms work and how do we evaluate their performance? 1 Agenda An example task Problem formulation Infrastructure for search algorithms Complexity
More informationThe exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
CS 188 Spring 2017 Introduction to Artificial Intelligence Midterm V2 You have approximately 80 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. Mark
More informationarxiv: v1 [cs.ai] 1 Jul 2015
arxiv:507.00353v [cs.ai] Jul 205 Harm van Seijen harm.vanseijen@ualberta.ca A. Rupam Mahmood ashique@ualberta.ca Patrick M. Pilarski patrick.pilarski@ualberta.ca Richard S. Sutton sutton@cs.ualberta.ca
More informationDivisible Load Scheduling
Divisible Load Scheduling Henri Casanova 1,2 1 Associate Professor Department of Information and Computer Science University of Hawai i at Manoa, U.S.A. 2 Visiting Associate Professor National Institute
More informationSample questions for Fundamentals of Machine Learning 2018
Sample questions for Fundamentals of Machine Learning 2018 Teacher: Mohammad Emtiyaz Khan A few important informations: In the final exam, no electronic devices are allowed except a calculator. Make sure
More informationThe Hamiltonian Strictly Alternating Cycle Problem
Advanced Studies in Biology, Vol. 4, 2012, no. 10, 491-495 The Hamiltonian Strictly Alternating Cycle Problem Anna Gorbenko Department of Intelligent Systems and Robotics Ural Federal University 620083
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 5 Greedy Algorithms Interval Scheduling Interval Partitioning Guest lecturer: Martin Furer Review In a DFS tree of an undirected graph, can there be an edge (u,v)
More informationWhat is the computational cost of automating brilliance or serendipity? (Computational complexity & P vs NP) COS 116, Spring 2010 Adam Finkelstein
What is the computational cost of automating brilliance or serendipity? (Computational complexity & P vs NP) COS 116, Spring 2010 Adam Finkelstein Combination lock Why is it secure? (Assume it cannot be
More informationIntroduction to Arti Intelligence
Introduction to Arti Intelligence cial Lecture 4: Constraint satisfaction problems 1 / 48 Constraint satisfaction problems: Today Exploiting the representation of a state to accelerate search. Backtracking.
More informationChapter 6 Constraint Satisfaction Problems
Chapter 6 Constraint Satisfaction Problems CS5811 - Artificial Intelligence Nilufer Onder Department of Computer Science Michigan Technological University Outline CSP problem definition Backtracking search
More informationUsing first-order logic, formalize the following knowledge:
Probabilistic Artificial Intelligence Final Exam Feb 2, 2016 Time limit: 120 minutes Number of pages: 19 Total points: 100 You can use the back of the pages if you run out of space. Collaboration on the
More informationFinal. Introduction to Artificial Intelligence. CS 188 Spring You have approximately 2 hours and 50 minutes.
CS 188 Spring 2014 Introduction to Artificial Intelligence Final You have approximately 2 hours and 50 minutes. The exam is closed book, closed notes except your two-page crib sheet. Mark your answers
More informationGIS: Definition, Software. IAI Summer Institute 19 July 2000
GIS: Definition, Software IAI Summer Institute 19 July 2000 What is a GIS? Geographic Information System Definitions DeMers (1997): Tools that allow for the processing of spatial data into information,
More informationCombining distance-based formation shape control with formation translation
Combining distance-based formation shape control with formation translation Brian D O Anderson, Zhiyun Lin and Mohammad Deghat Abstract Steepest descent control laws can be used for formation shape control
More informationMin-Max Message Passing and Local Consistency in Constraint Networks
Min-Max Message Passing and Local Consistency in Constraint Networks Hong Xu, T. K. Satish Kumar, and Sven Koenig University of Southern California, Los Angeles, CA 90089, USA hongx@usc.edu tkskwork@gmail.com
More informationInteracting Vehicles: Rules of the Game
Chapter 7 Interacting Vehicles: Rules of the Game In previous chapters, we introduced an intelligent control method for autonomous navigation and path planning. The decision system mainly uses local information,
More informationMotivation. Dictionaries. Direct Addressing. CSE 680 Prof. Roger Crawfis
Motivation Introduction to Algorithms Hash Tables CSE 680 Prof. Roger Crawfis Arrays provide an indirect way to access a set. Many times we need an association between two sets, or a set of keys and associated
More informationInteger Programming for Phylogenetic Network Problems
Integer Programming for Phylogenetic Network Problems D. Gusfield University of California, Davis Presented at the National University of Singapore, July 27, 2015.! There are many important phylogeny problems
More informationDistributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren, Member, IEEE
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 57, NO. 1, JANUARY 2012 33 Distributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren,
More informationMethods and Models for Combinatorial Optimization
Methods and Models for Combinatorial Optimization Modeling by Linear Programming Luigi De Giovanni, Marco Di Summa Dipartimento di Matematica, Università di Padova De Giovanni, Di Summa MeMoCO 1 / 35 Mathematical
More informationGuest Lecture: Steering in Games. the. gamedesigninitiative at cornell university
Guest Lecture: Pathfinding You are given Starting location A Goal location B Want valid path A to B Avoid impassible terrain Eschew hidden knowledge Want natural path A to B Reasonably short path Avoid
More informationWhat is the computational cost of automating brilliance or serendipity? (P vs NP question and related musings) COS 116: 4/12/2006 Adam Finkelstein
What is the computational cost of automating brilliance or serendipity? (P vs NP question and related musings) COS 116: 4/12/2006 Adam Finkelstein Combination lock Why is it secure? (Assume it cannot be
More informationCS188: Artificial Intelligence, Fall 2009 Written 2: MDPs, RL, and Probability
CS188: Artificial Intelligence, Fall 2009 Written 2: MDPs, RL, and Probability Due: Thursday 10/15 in 283 Soda Drop Box by 11:59pm (no slip days) Policy: Can be solved in groups (acknowledge collaborators)
More informationBayesian Classifiers and Probability Estimation. Vassilis Athitsos CSE 4308/5360: Artificial Intelligence I University of Texas at Arlington
Bayesian Classifiers and Probability Estimation Vassilis Athitsos CSE 4308/5360: Artificial Intelligence I University of Texas at Arlington 1 Data Space Suppose that we have a classification problem The
More informationCS 374: Algorithms & Models of Computation, Spring 2017 Greedy Algorithms Lecture 19 April 4, 2017 Chandra Chekuri (UIUC) CS374 1 Spring / 1
CS 374: Algorithms & Models of Computation, Spring 2017 Greedy Algorithms Lecture 19 April 4, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 1 Part I Greedy Algorithms: Tools and Techniques Chandra
More informationPartition is reducible to P2 C max. c. P2 Pj = 1, prec Cmax is solvable in polynomial time. P Pj = 1, prec Cmax is NP-hard
I. Minimizing Cmax (Nonpreemptive) a. P2 C max is NP-hard. Partition is reducible to P2 C max b. P Pj = 1, intree Cmax P Pj = 1, outtree Cmax are both solvable in polynomial time. c. P2 Pj = 1, prec Cmax
More informationCMSC 722, AI Planning. Planning and Scheduling
CMSC 722, AI Planning Planning and Scheduling Dana S. Nau University of Maryland 1:26 PM April 24, 2012 1 Scheduling Given: actions to perform set of resources to use time constraints» e.g., the ones computed
More informationPhysics-Aware Informative Coverage Planning for Autonomous Vehicles
Physics-Aware Informative Coverage Planning for Autonomous Vehicles Michael J. Kuhlman 1, Student Member, IEEE, Petr Švec2, Member, IEEE, Krishnanand N. Kaipa 2, Member, IEEE, Donald Sofge 3, Member, IEEE,
More informationAd Placement Strategies
Case Study 1: Estimating Click Probabilities Tackling an Unknown Number of Features with Sketching Machine Learning for Big Data CSE547/STAT548, University of Washington Emily Fox 2014 Emily Fox January
More informationDecision Diagrams: Tutorial
Decision Diagrams: Tutorial John Hooker Carnegie Mellon University CP Summer School Cork, Ireland, June 2016 Decision Diagrams Used in computer science and AI for decades Logic circuit design Product configuration
More informationLab: Conservation of Linear Momentum There is a quantity called linear momentum defined as the mass of an object times its velocity, i.e.
Lab: Conservation of Linear Momentum There is a quantity called linear momentum defined as the of an object times its velocity, i.e. p = m v, (1) where p is the symbol for linear momentum. Notice that
More informationAlgorithms and Complexity theory
Algorithms and Complexity theory Thibaut Barthelemy Some slides kindly provided by Fabien Tricoire University of Vienna WS 2014 Outline 1 Algorithms Overview How to write an algorithm 2 Complexity theory
More informationBidirectional Search: Is It For Me? Nathan R. Sturtevant Associate Professor University of Denver
Bidirectional Search: Is It For Me? Nathan R. Sturtevant (@nathansttt) Associate Professor University of Denver practice, the most common heuristic es in the runtime distribution (looked during search)
More information4 Locality-sensitive hashing using stable distributions
4 Locality-sensitive hashing using stable distributions 4. The LSH scheme based on s-stable distributions In this chapter, we introduce and analyze a novel locality-sensitive hashing family. The family
More informationDecision Diagrams and Dynamic Programming
Decision Diagrams and Dynamic Programming J. N. Hooker Carnegie Mellon University CPAIOR 13 Decision Diagrams & Dynamic Programming Binary/multivalued decision diagrams are related to dynamic programming.
More informationLecture 2: The Fast Multipole Method
CBMS Conference on Fast Direct Solvers Dartmouth College June 23 June 27, 2014 Lecture 2: The Fast Multipole Method Gunnar Martinsson The University of Colorado at Boulder Research support by: Recall:
More informationLecture 9: Search 8. Victor R. Lesser. CMPSCI 683 Fall 2010
Lecture 9: Search 8 Victor R. Lesser CMPSCI 683 Fall 2010 ANNOUNCEMENTS REMEMBER LECTURE ON TUESDAY! EXAM ON OCTOBER 18 OPEN BOOK ALL MATERIAL COVERED IN LECTURES REQUIRED READINGS WILL MOST PROBABLY NOT
More informationSection Handout 5 Solutions
CS 188 Spring 2019 Section Handout 5 Solutions Approximate Q-Learning With feature vectors, we can treat values of states and q-states as linear value functions: V (s) = w 1 f 1 (s) + w 2 f 2 (s) +...
More informationTask Assignment. Consider this very small instance: t1 t2 t3 t4 t5 p p p p p
Task Assignment Task Assignment The Task Assignment problem starts with n persons and n tasks, and a known cost for each person/task combination. The goal is to assign each person to an unique task so
More informationACHIEVING OPTIMAL DESIGN OF THE PRODUCTION LINE WITH OBTAINABLE RESOURCE CAPACITY. Miao-Sheng CHEN. Chun-Hsiung LAN
Yugoslav Journal of Operations Research 12 (2002), Number 2, 203-214 ACHIEVING OPTIMAL DESIGN OF THE PRODUCTION LINE WITH OBTAINABLE RESOURCE CAPACITY Miao-Sheng CHEN Graduate Institute of Management Nanhua
More informationIE418 Integer Programming
IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 2nd February 2005 Boring Stuff Extra Linux Class: 8AM 11AM, Wednesday February 9. Room??? Accounts and Passwords
More informationFormation Control Over Delayed Communication Networks
28 IEEE International Conference on Robotics and Automation Pasadena, CA, USA, May 19-23, 28 Formation Control Over Delayed Communication Networks Cristian Secchi and Cesare Fantuzzi DISMI, University
More informationBalancing and Control of a Freely-Swinging Pendulum Using a Model-Free Reinforcement Learning Algorithm
Balancing and Control of a Freely-Swinging Pendulum Using a Model-Free Reinforcement Learning Algorithm Michail G. Lagoudakis Department of Computer Science Duke University Durham, NC 2778 mgl@cs.duke.edu
More informationarxiv: v2 [cs.ro] 26 Sep 2016
Distributed Iterative Learning Control for a Team of Quadrotors Andreas Hock and Angela P Schoellig arxiv:1635933v [csro] 6 Sep 16 Abstract The goal of this work is to enable a team of quadrotors to learn
More information6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search
6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search Daron Acemoglu and Asu Ozdaglar MIT September 30, 2009 1 Networks: Lecture 7 Outline Navigation (or decentralized search)
More information14.2 Weather impacts and routing services in support of airspace management operations. David I. Knapp, Jeffrey O. Johnson, David P.
14.2 Weather impacts and routing services in support of airspace management operations David I. Knapp, Jeffrey O. Johnson, David P. Sauter U.S. Army Research Laboratory, Battlefield Environment Division,
More informationCS188: Artificial Intelligence, Fall 2009 Written 2: MDPs, RL, and Probability
CS188: Artificial Intelligence, Fall 2009 Written 2: MDPs, RL, and Probability Due: Thursday 10/15 in 283 Soda Drop Box by 11:59pm (no slip days) Policy: Can be solved in groups (acknowledge collaborators)
More informationWatershed Modeling With DEMs
Watershed Modeling With DEMs Lesson 6 6-1 Objectives Use DEMs for watershed delineation. Explain the relationship between DEMs and feature objects. Use WMS to compute geometric basin data from a delineated
More informationInduction in Nonmonotonic Causal Theories for a Domestic Service Robot
Induction in Nonmonotonic Causal Theories for a Domestic Service Robot Jianmin Ji 1 and Xiaoping Chen 2 1 Dept. of CSE, The Hong Kong University of Science and Technology, jizheng@mail.ustc.edu.cn 2 Sch.
More informationA Decentralized Approach to Multi-agent Planning in the Presence of Constraints and Uncertainty
2011 IEEE International Conference on Robotics and Automation Shanghai International Conference Center May 9-13, 2011, Shanghai, China A Decentralized Approach to Multi-agent Planning in the Presence of
More informationNon-Collision Conditions in Multi-agent Robots Formation using Local Potential Functions
2008 IEEE International Conference on Robotics and Automation Pasadena, CA, USA, May 19-23, 2008 Non-Collision Conditions in Multi-agent Robots Formation using Local Potential Functions E G Hernández-Martínez
More informationThe Greedy Method. Design and analysis of algorithms Cs The Greedy Method
Design and analysis of algorithms Cs 3400 The Greedy Method 1 Outline and Reading The Greedy Method Technique Fractional Knapsack Problem Task Scheduling 2 The Greedy Method Technique The greedy method
More informationAppendix A Prototypes Models
Appendix A Prototypes Models This appendix describes the model of the prototypes used in Chap. 3. These mathematical models can also be found in the Student Handout by Quanser. A.1 The QUANSER SRV-02 Setup
More informationInteger Programming Formulations for the Minimum Weighted Maximal Matching Problem
Optimization Letters manuscript No. (will be inserted by the editor) Integer Programming Formulations for the Minimum Weighted Maximal Matching Problem Z. Caner Taşkın Tınaz Ekim Received: date / Accepted:
More informationConstraint Programming and Graph Algorithms
Constraint Programming and Graph Algorithms Kurt Mehlhorn Max-Planck-Institute for Computer Science (with significant help from Sven Thiel) I am not an expert on the subject (four publications), but I
More informationHomework 2: MDPs and Search
Graduate Artificial Intelligence 15-780 Homework 2: MDPs and Search Out on February 15 Due on February 29 Problem 1: MDPs [Felipe, 20pts] Figure 1: MDP for Problem 1. States are represented by circles
More informationAn Smodels System with Limited Lookahead Computation
An Smodels System with Limited Lookahead Computation Gayathri Namasivayam and Miros law Truszczyński Department of Computer Science, University of Kentucky, Lexington, KY 40506-0046, USA Abstract. We describe
More informationPROBLEM SOLVING AND SEARCH IN ARTIFICIAL INTELLIGENCE
Artificial Intelligence, Computational Logic PROBLEM SOLVING AND SEARCH IN ARTIFICIAL INTELLIGENCE Lecture 4 Metaheuristic Algorithms Sarah Gaggl Dresden, 5th May 2017 Agenda 1 Introduction 2 Constraint
More informationArtificial Neural Networks Examination, June 2005
Artificial Neural Networks Examination, June 2005 Instructions There are SIXTY questions. (The pass mark is 30 out of 60). For each question, please select a maximum of ONE of the given answers (either
More informationComputational Methods. Solving Equations
Computational Methods Solving Equations Manfred Huber 2010 1 Solving Equations Solving scalar equations is an elemental task that arises in a wide range of applications Corresponds to finding parameters
More information1 [15 points] Search Strategies
Probabilistic Foundations of Artificial Intelligence Final Exam Date: 29 January 2013 Time limit: 120 minutes Number of pages: 12 You can use the back of the pages if you run out of space. strictly forbidden.
More informationMore Approximation Algorithms
CS 473: Algorithms, Spring 2018 More Approximation Algorithms Lecture 25 April 26, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 28 Formal definition of approximation
More informationLow-ranksemidefiniteprogrammingforthe. MAX2SAT problem. Bosch Center for Artificial Intelligence
Low-ranksemidefiniteprogrammingforthe MAX2SAT problem Po-Wei Wang J. Zico Kolter Machine Learning Department Carnegie Mellon University School of Computer Science, Carnegie Mellon University, and Bosch
More informationEmbedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden
of /4 4 Embedded Systems Design: Optimization Challenges Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden Outline! Embedded systems " Example area: automotive electronics " Embedded systems
More informationLecture 8: Kinematics: Path and Trajectory Planning
Lecture 8: Kinematics: Path and Trajectory Planning Concept of Configuration Space c Anton Shiriaev. 5EL158: Lecture 8 p. 1/20 Lecture 8: Kinematics: Path and Trajectory Planning Concept of Configuration
More informationAlgorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on
6117CIT - Adv Topics in Computing Sci at Nathan 1 Algorithms The intelligence behind the hardware Outline! Approximation Algorithms The class APX! Some complexity classes, like PTAS and FPTAS! Illustration
More informationTask Coordination for Non-cooperative Planning Agents
Task Coordination for Non-cooperative Planning Agents Pieter Buzing 1, Adriaan ter Mors 1, Jeroen Valk 1 and Cees Witteveen 1,2 1 Faculty of Electrical Engineering, Mathematics and Computer Science, Delft
More informationModeling and control of a multi-agent system using mixed integer linear programming
Modeling and control of a multi-agent system using mixed integer linear programming Matthew G. Earl 1 Raffaello D Andrea Abstract The RoboFlag competition was proposed by the second author as a means to
More informationNeuroevolution for sound event detection in real life audio: A pilot study
Neuroevolution for sound event detection in real life audio: A pilot study Christian Kroos & Mark D. Plumbley Centre for Vision, Speech and Signal Processing (CVSSP), University of Surrey, UK Background
More informationCS 188: Artificial Intelligence
CS 188: Artificial Intelligence Adversarial Search II Instructor: Anca Dragan University of California, Berkeley [These slides adapted from Dan Klein and Pieter Abbeel] Minimax Example 3 12 8 2 4 6 14
More information5-2 Dividing Polynomials. Simplify. ANSWER: 4y + 2x (3a 2 b 6ab + 5ab 2 )(ab) 1 ANSWER: 3a + 5b (x 2 6x 20) (x + 2) ANSWER:
1. 4y + 2x 2 8. (10x 2 + 15x + 20) (5x + 5) 2. (3a 2 b 6ab + 5ab 2 )(ab) 1 3a + 5b 6 9. (18a 2 + 6a + 9) (3a 2) 3. (x 2 6x 20) (x + 2) 10. 4. (2a 2 4a 8) (a + 1) 11. 5. (3z 4 6z 3 9z 2 + 3z 6) (z + 3)
More informationComplexity Theory Part II
Complexity Theory Part II Time Complexity The time complexity of a TM M is a function denoting the worst-case number of steps M takes on any input of length n. By convention, n denotes the length of the
More informationA Rule-based Approach to Long-term Routing for Autonomous Sailboats
A Rule-based Approach to Long-term Routing for Autonomous Sailboats Johannes Langbein and Thom Frühwirth Faculty of Engineering and Computer Science, Ulm University, Germany firstname.lastname@uni-ulm.de
More informationA Simple Approach to the Multi-Predator Multi-Prey Pursuit Domain
A Simple Approach to the Multi-Predator Multi-Prey Pursuit Domain Javier A. Alcazar Sibley School of Mechanical and Aerospace Engineering Cornell University jaa48@cornell.edu 1. Abstract We present a different
More informationDecentralized Formation Control and Connectivity Maintenance of Multi-Agent Systems using Navigation Functions
Decentralized Formation Control and Connectivity Maintenance of Multi-Agent Systems using Navigation Functions Alireza Ghaffarkhah, Yasamin Mostofi and Chaouki T. Abdallah Abstract In this paper we consider
More informationOn the Tractability of Restricted Disjunctive Temporal Problems
On the Tractability of Restricted Disjunctive Temporal Problems T. K. Satish Kumar Knowledge Systems Laboratory Stanford University tksk@ksl.stanford.edu Abstract In this paper, we provide a polynomial-time
More informationCS 188 Introduction to Fall 2007 Artificial Intelligence Midterm
NAME: SID#: Login: Sec: 1 CS 188 Introduction to Fall 2007 Artificial Intelligence Midterm You have 80 minutes. The exam is closed book, closed notes except a one-page crib sheet, basic calculators only.
More informationOptimisation and Operations Research
Optimisation and Operations Research Lecture 15: The Greedy Heuristic Matthew Roughan http://www.maths.adelaide.edu.au/matthew.roughan/ Lecture_notes/OORII/ School of
More informationDistributed motion constraints for algebraic connectivity of robotic networks
Distributed motion constraints for algebraic connectivity of robotic networks IEEE Conference on Decision and Control December, 2008 Michael Schuresko Jorge Cortés Applied Mathematics and Statistics University
More informationCooperative Motion Control of Multiple Autonomous Marine
Cooperative Motion Control of Multiple Autonomous Marine Collision Avoidance in Dynamic Environments EECI Graduate School on Control Supélec, Feb. 21-25, 2011 Outline Motivation/Objectives Cooperative
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 6 Greedy Algorithms Interval Scheduling Interval Partitioning Scheduling to Minimize Lateness Sofya Raskhodnikova S. Raskhodnikova; based on slides by E. Demaine,
More informationOPTIMIZATION OF THE SUPPLIER SELECTION PROBLEM USING DISCRETE FIREFLY ALGORITHM
Advanced Logistic Systems Vol. 6. No. 1. (2012) pp. 117-126. OPTIMIZATION OF THE SUPPLIER SELECTION PROBLEM USING DISCRETE FIREFLY ALGORITHM LÁSZLÓ KOTA 1 Abstract: In this article I show a firefly optimization
More informationCSE 417. Chapter 4: Greedy Algorithms. Many Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
CSE 417 Chapter 4: Greedy Algorithms Many Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 Greed is good. Greed is right. Greed works. Greed clarifies, cuts through,
More informationIntroduction to Fall 2009 Artificial Intelligence Final Exam
CS 188 Introduction to Fall 2009 Artificial Intelligence Final Exam INSTRUCTIONS You have 3 hours. The exam is closed book, closed notes except a two-page crib sheet. Please use non-programmable calculators
More informationMonday 8th June 2015 Morning
Oxford Cambridge and RSA H Monday 8th June 205 Morning GCSE METHODS IN MATHEMATICS B39/02 Methods in Mathematics (Higher Tier) * 4 8 5 6 4 9 2 5 * Candidates answer on the Question Paper. OCR supplied
More informationAn Effective Chromosome Representation for Evolving Flexible Job Shop Schedules
An Effective Chromosome Representation for Evolving Flexible Job Shop Schedules Joc Cing Tay and Djoko Wibowo Intelligent Systems Lab Nanyang Technological University asjctay@ntuedusg Abstract As the Flexible
More informationAnalysis of Algorithms I: Perfect Hashing
Analysis of Algorithms I: Perfect Hashing Xi Chen Columbia University Goal: Let U = {0, 1,..., p 1} be a huge universe set. Given a static subset V U of n keys (here static means we will never change the
More informationBounded Budget Betweenness Centrality Game for Strategic Network Formations
Bounded Budget Betweenness Centrality Game for Strategic Network Formations Xiaohui Bei 1, Wei Chen 2, Shang-Hua Teng 3, Jialin Zhang 1, and Jiajie Zhu 4 1 Tsinghua University, {bxh08,zhanggl02}@mails.tsinghua.edu.cn
More informationDeterministic Planning and State-space Search. Erez Karpas
Planning and Search IE&M Technion to our Problem-solving agents Restricted form of general agent def Simple-Problem-Solving-Agent (problem): state, some description of the current world state seq, an action
More informationPassivity-based Formation Control for UAVs with a Suspended Load
Passivity-based Formation Control for UAVs with a Suspended Load Chris Meissen Kristian Klausen Murat Arcak Thor I. Fossen Andrew Packard Department of Mechanical Engineering at the University of California,
More informationDecision Procedures An Algorithmic Point of View
An Algorithmic Point of View ILP References: Integer Programming / Laurence Wolsey Deciding ILPs with Branch & Bound Intro. To mathematical programming / Hillier, Lieberman Daniel Kroening and Ofer Strichman
More informationMachine Learning 4771
Machine Learning 4771 Instructor: Tony Jebara Topic 16 Undirected Graphs Undirected Separation Inferring Marginals & Conditionals Moralization Junction Trees Triangulation Undirected Graphs Separation
More informationDefect Detection using Nonparametric Regression
Defect Detection using Nonparametric Regression Siana Halim Industrial Engineering Department-Petra Christian University Siwalankerto 121-131 Surabaya- Indonesia halim@petra.ac.id Abstract: To compare
More informationCSL302/612 Artificial Intelligence End-Semester Exam 120 Minutes
CSL302/612 Artificial Intelligence End-Semester Exam 120 Minutes Name: Roll Number: Please read the following instructions carefully Ø Calculators are allowed. However, laptops or mobile phones are not
More information