Stochastic Network Interdiction / October 2001

Similar documents
Stochastic Integer Programming

Reformulation and Sampling to Solve a Stochastic Network Interdiction Problem

Strengthened Benders Cuts for Stochastic Integer Programs with Continuous Recourse

Stochastic Decomposition

Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems

Reformulation and Sampling to Solve a Stochastic Network Interdiction Problem

A Stochastic-Oriented NLP Relaxation for Integer Programming

An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse

F denotes cumulative density. denotes probability density function; (.)

Bilevel Integer Optimization: Theory and Algorithms

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini

Reconnect 04 Introduction to Integer Programming

Optimization Tools in an Uncertain Environment

Stochastic Optimization One-stage problem

Disconnecting Networks via Node Deletions

Integer Programming ISE 418. Lecture 16. Dr. Ted Ralphs

Outline. Relaxation. Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING. 1. Lagrangian Relaxation. Lecture 12 Single Machine Models, Column Generation

LIGHT ROBUSTNESS. Matteo Fischetti, Michele Monaci. DEI, University of Padova. 1st ARRIVAL Annual Workshop and Review Meeting, Utrecht, April 19, 2007

Network Flow Interdiction Models and Algorithms with Resource Synergy Considerations

Lecture 1. Stochastic Optimization: Introduction. January 8, 2018

MILP reformulation of the multi-echelon stochastic inventory system with uncertain demands

Stochastic Programming Models in Design OUTLINE

Monte Carlo Methods for Stochastic Programming

The fundamental theorem of linear programming

Benders Decomposition

Robust Optimization for Risk Control in Enterprise-wide Optimization

MIP reformulations of some chance-constrained mathematical programs

Lecture 4: Two-point Sampling, Coupon Collector s problem

Computational Integer Programming Universidad de los Andes. Lecture 1. Dr. Ted Ralphs

An Integer Programming Approach for Linear Programs with Probabilistic Constraints

The Fixed Charge Transportation Problem: A Strong Formulation Based On Lagrangian Decomposition and Column Generation

A Benders Algorithm for Two-Stage Stochastic Optimization Problems With Mixed Integer Recourse

Extended Formulations, Lagrangian Relaxation, & Column Generation: tackling large scale applications

Simulation. Where real stuff starts

Solving a class of stochastic mixed-integer programs with branch and price

Stochastic Integer Programming An Algorithmic Perspective

Set-based Min-max and Min-min Robustness for Multi-objective Robust Optimization

Robust Backtesting Tests for Value-at-Risk Models

Bilevel Integer Linear Programming

Stochastic Dual Dynamic Integer Programming

Lagrangean Decomposition for Mean-Variance Combinatorial Optimization

Solving Bilevel Mixed Integer Program by Reformulations and Decomposition

Introduction to Survey Analysis!

On a class of bilevel linear mixed-integer programs in adversarial settings

Estimating Gaussian Mixture Densities with EM A Tutorial

Lecture 9: Dantzig-Wolfe Decomposition

SOLVING POWER AND OPTIMAL POWER FLOW PROBLEMS IN THE PRESENCE OF UNCERTAINTY BY AFFINE ARITHMETIC

Part 4. Decomposition Algorithms

The L-Shaped Method. Operations Research. Anthony Papavasiliou 1 / 38

NAVAL POSTGRADUATE SCHOOL

A Tighter Variant of Jensen s Lower Bound for Stochastic Programs and Separable Approximations to Recourse Functions

On the Power of Robust Solutions in Two-Stage Stochastic and Adaptive Optimization Problems

OPTIMAL DESIGN INPUTS FOR EXPERIMENTAL CHAPTER 17. Organization of chapter in ISSO. Background. Linear models

Introduction to Integer Linear Programming

Classification of Dantzig-Wolfe Reformulations for MIP s

Chapter 7 (Cont d) PERT

Application of Optimization Methods and Edge AI

Integer Programming ISE 418. Lecture 8. Dr. Ted Ralphs

The L-Shaped Method. Operations Research. Anthony Papavasiliou 1 / 44

arxiv: v1 [cs.oh] 19 Oct 2012

Complexity of two and multi-stage stochastic programming problems

Uncertainty modeling for robust verifiable design. Arnold Neumaier University of Vienna Vienna, Austria

Min-max-min robustness: a new approach to combinatorial optimization under uncertainty based on multiple solutions 1

Scenario-Free Stochastic Programming

Bilevel Integer Programming

The Primal-Dual Algorithm P&S Chapter 5 Last Revised October 30, 2006

Modeling Uncertainty in Linear Programs: Stochastic and Robust Linear Programming

Selected Examples of CONIC DUALITY AT WORK Robust Linear Optimization Synthesis of Linear Controllers Matrix Cube Theorem A.

Computational Integer Programming. Lecture 2: Modeling and Formulation. Dr. Ted Ralphs

Lecture 3: Semidefinite Programming

Design and Analysis of Simulation Experiments

Combinatorial Data Mining Method for Multi-Portfolio Stochastic Asset Allocation

Applied Lagrange Duality for Constrained Optimization

Robustness Adjustment of Two-Stage Robust Security-Constrained Unit Commitment

Generation and Representation of Piecewise Polyhedral Value Functions

Polyhedral Approaches to Online Bipartite Matching

Travelling Salesman Problem

Integer Programming (IP)

Introduction to integer programming II

MOPEC: Multiple Optimization Problems with Equilibrium Constraints

Stochastic Uncapacitated Hub Location

Concepts in Global Sensitivity Analysis IMA UQ Short Course, June 23, 2015

Algorithms and Complexity theory

Sequential pairing of mixed integer inequalities

Easy and not so easy multifacility location problems... (In 20 minutes.)

arxiv: v2 [math.oc] 31 May 2014

Lagrangian Relaxation in MIP

Reinforcement of gas transmission networks with MIP constraints and uncertain demands 1

Symbolic Variable Elimination in Discrete and Continuous Graphical Models. Scott Sanner Ehsan Abbasnejad

Lecture 8: Column Generation

Branch-and-Price-and-Cut for the Split Delivery Vehicle Routing Problem with Time Windows

Decomposition Algorithms for Two-Stage Chance-Constrained Programs

Optimization Driven Scenario Grouping

Graphical Models and Kernel Methods

Robust goal programming

Bayesian Estimation of Input Output Tables for Russia

Inderjit Dhillon The University of Texas at Austin

Estimation of uncertainties using the Guide to the expression of uncertainty (GUM)

Multistage Robust Mixed Integer Optimization with Adaptive Partitions

Artificial Intelligence

Transcription:

Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2001-10 Stochastic Networ Interdiction / October 2001 Sanchez, Susan M. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/35257

Stochastic Networ Interdiction Susan Sanchez Kevin Wood wood@nps.navy.mil Operations Research Department Naval Postgraduate School Oct. 2001

Purpose of this tal Describe a new, simple solution method for two-stage stochastic integer programs Motivate and illustrate with a particular stochastic, networ-interdiction problem (will consider one other, too) Illustrate two main thrusts of my research, interdiction and SP. 2

First: Other wor Interdiction of communications networs: Physical and cyber-attacs General models and solutions for system interdiction and defense General theoretical wor on SPs Applications of SP: Sealift deployments subject to bio-attacs Integer programming 3

Generic networ interdiction problem Using limited resources, attac an adversary s networ so as to minimize the functionality of that networ (to the adversary). Networs: Road, pipeline, comm Functionality: Max flow, shortest path, convoy movement, path existence Attacs: Aerial sorties, cruise missiles, special operations Can generalize: system interdiction 4

Max-flow interdiction Basic Deterministic Model on G=(N,A) with artificial arc a = (t,s) z * = min max x X y y a s.t. y y = 0 i N FS() i RS() i 0 y u (1 x ) A a A { } where X = x {0,1} Rx r, and 5

A Simple Example Suppose we have enough resource to interduc any two arcs u on arcs s 2 2 4 2 5 t 2 3 6

Max-flow interdiction Converts to a MIP (well, IP actually) min min x X π, θ A a u θ 1 if = a s.t. πi π j + x + θ 0 = ( i, j) A a θ 0 A a s 2 2 4 1 5 t 1 3 7

Interdiction under uncertainty Uncertain success or data, SMFI: ( xi ) min Eh, x X ( xi ) where h, max y y 0 a s.t. y y = 0 i N FS i () RS() i 0 y u (1 I x ) A a where I = 1 if interdiction of is successful 0otherwise 8

Alternative formulation ( xi ) min Eg, x X ( xi ) where g, max y x I y y 0 a A a s.t. y y = 0 i N FSi () RSi () 0 y u A a Note: Deterministic problems are NPcomplete. It s #P-complete to evaluate Eh or Eg for fixed x: These stochastic problems are really hard. 9

SMFI: An instance of a 2SSP ( ) ( x ξ ) min Eg, s.t. D where g x, ξ cx + min fy x D Ax = b 0 x u and integer y 0 s.t. D y = d + B x y 0 (some may be integer) and where ξ vec( f, D, d, B ) D g x, ξ represents the dual of our g( xi, ) ( ) 10

Probability of ill Assume p = E[Ĩ ] is nown Weaponeers now this stuff! Well 11

Bound on z*, pessimistic New soln methodology needs bounds From Jensen s inequality, obtain a global upper bound given a good ˆx : z* Eh, for any xˆ X ( xi ˆ ) h ˆ, E[ ] ( z ) ( x I ) = max ya s.t. Flow balance in y 0 y u (1 E[ I ] xˆ ) A a Can also use probabilistic bounds 12

Bound on z*, pessimistic Actually, because interdictions are binary, and successes/failures are binary in SMFI, we can reformulate the upper-bound problem and minimize that bound via a MIP. * z min u θ + u (1 E[ I ]) x x X, π, θ A a s.t. ( ) 1if = (, t s) πi π j + x + θ 0 = ( i, j) A a θ 0 A a 13

Bound on z*, optimistic A lower bounding MIP: ( xi ) z* min Eg, = x X ( ) min g x, E[ I] because g is convex in I x X min x X, π, θ A a u θ 1if = (, t s) s.t. πi π j + EI [ ] x + θ 0 = ( i, j) A a θ 0 A a 14

Bounds on z*: Comments Bounds can be improved by expanding in terms of conditional probabilities, e.g., by conditioning on the number of successful interdictions. Can use probabilistic bounds; may be necessary for other 2SSPs. But, eep it simple for now. 15

Solution methodology, outline BOUND: Find a global upper bnd ENUMERATE all solns ˆx s.t. call these candidates xˆ X z z* z ( xˆ ) z* z ; SCREEN the candidates (Monte Carlo and statistics) to identify the best, or * the best few x ˆ X X * TEST x ˆ X to determine quality (Or maybe Partially Enumerate, Then Screen: PETS. Or, maybe Bound, Enumerate, Then Screen: BETS. ) 16

Fundamental theorem for PE Theorem 1: ˆx can be optimal for SMFI only if g ( xˆ, E[ I ]) z. Proof: Obvious. QED Theorem leads to finding a set of candidate solutions xˆ X using the algorithm on the next slide. For simplicity, assume that the set of feasible interdiction plans defined by X has cardinality constraint: A x = R 17

Alg. to find candidate solutions 1. X ; Find a good x ˆ X; 2. Compute ub z given ˆx; (or optimize) 3. Solve z = min g x, E[ I ] for ˆx; x X 4. If ( z > z ) print X and halt; 5. Add ˆx to X; 6. Add constraint ( ) x ˆ = 1 R 1 to constraint set X and go to 2; x 18

Alg. to find candidate solutions Find a good x ˆ X z z (Or optimize) ( ˆ ) Compute z = h x, E[ I ] Compute z = min g, E[ ] x X x xˆ x xˆ 1 2 ( x I ) For other 2SSPs, just use other bounds! 19

A better enumeration algorithm z Find a good ˆx (Or optimize) ( ˆ ) Compute z = h x, E[ I ] z Use B&B-lie procedure to enumerate all ( ) xˆ X s.t. z = g xˆ, E [ I ] z 20

Screening candidate solutions For small R we can compute Eg ( xˆ ), I exactly for each xˆ X : There are only 2 R ways for R attempted interdictions to succeed or fail. Can solve SMFI exactly in this case. Will describe general statistical screening procedures because they are necessary for most applications of BEST, including more complicated interdiction problems (and larger R). * Seeing a near-optimal set X X 21

We could do this: ( ) Sample the h xˆ, I for each xˆ X to obtain independent estimates h L = 1 h( ˆ, ˆ ), ( ˆ ) x I Eh x I l L l= 1 h These are distributed with independent t-distributions Reject xˆ that correspond to h being too large (Reject xˆ and xˆ below.) 3 4 h1 h2 h 3 4 h 22

But we will do this: Using CRNs, sample the h ( xˆ ), I for each xˆ X to obtain estimates Order: h = 1 h( ˆ, ˆ ), Create difference r.v.s L ( ˆ ) x I Eh x I l L l= 1 h h h 1 2 K These have a joint t-distribution, approximately, and we could exploit that, but let s eep things simple, so = h h 1 23

And this: x ˆ Reject as bad if confident that < 0 That is, put xˆ if not confident that X * ˆ ˆ ( ˆ ) ( ) ( ) ( * x, ) I > x1, I x, I Eh Eh Eh s Let be the sample s.d. for estimate α Accept xˆ if the 100( 1 )% confidence K 1 interval on covers 0: K 1 (, ] + z α s 24

So: Overall, we ll be 100 (1 α)% confident that we have not rejected a good ˆ X Above procedure depends on Boole- Bonferroni inequality: not very strong. On the other hand, we used CRNs in comparing the xˆ so we have employed a useful variance-reduction technique. (1 or 2 orders of mag. improvement) Many variants/improvements possible x * 25

Testing step Not an issue if K* = 1. Will not cover in this tal, except to say that, empirically: All near-optimal solutions in this tal s test problems are within 2% of optimal with 95% confidence. 26

Advantages to BEST No large approximating problems with multiple scenarios to solve For the most part, we re solving simple bounding models and using Monte Carlo to evaluate 2SSPs with fixed first-stage variables No complicated decompositions needed 27

SMFI, computational results (1) Grid networ s t 100 samples for each u is uniform[10,100], p =0.9 Only resource constraint: Upper bound optimized VR for screening A 1 GHz laptop using GAMS/CPLEX x ˆ x R 28

SMFI, computation results (2) 95% confidence Grid A R L X X* 8 8 183 7 30 3 1 8 7 1 9 65 6 10 10 304 9 5 3 10 9 2 20 12 715 12 100 19 1 20 20 1179 20 7 1 29

Stochastic plant location (SPL) Uncertain demand for a single product x i = 1 if plant i to be built, else 0 ( ) ( xd ) I { x i } i I min Eh, where X = {0,1} x = and x X where h xd, cx+ min{ fy+ gw} y 0 s.t. j J i I y u x plants i I ij i i y + w d customers j J ij j j y 0 i, j; w 0 j J ij j 30

SPL, computational results (1) 10 candidate plants, choose 5 20 customer zones (rvs) Demands uniform, ±v% of mean Probabilistic UB, Jensen LB =784.7 v=10: ub=801.9, K=2, K*=1, T=15.6 v=20: ub=840.0, K=5, K*=1, T=17.4 v=40: ub=939.9, K=28, K*=1, T=29.7 31

SPL, computational results (2) 20 candidate plants, choose 10 50 customer zones (rvs) Demands uniform, ±v% of mean Probabilistic UB, Jensen LB =958.8 v=10: ub= 966.2, K=3, K*=2, T=133 v=20: ub=1006.3, K=72, K*=5, T=255 v=40: ub=1155.1, K=51, K*=17, T=560ª ª LB improved to 1097.8 32

Extensions BEST (PETS, PEST, BETS?) will wor for any 2SSP provided that First-stage variables are binary or integers of modest magnitude, An optimistic bound is not too hard to compute, and For fixed x, Monte Carlo sampling is efficient. For optimistic bounds, we use Jensen s ineq. and restricted recourse Often, the global, pessimistic bound will be probabilistic 33

Generalizations 2 nd -stage integer variables OK Does not depend on distributions: If you can generate the rvs, BEST wors So, dependent rvs OK Probabilistic LBs? Multi-stage??? 34

BEST To End

Other wor Interdiction of communications networs: Physical attacs and cyberattacs General models for system interdiction and defense General theoretical wor on SPs Applications of SP: Sealift deployments subject to bio-attacs Integer programming 36