Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains

Similar documents
Learning Optimal Commitment to Overcome Insecurity

Lecture notes on the ellipsoid algorithm

Learning Optimal Commitment to Overcome Insecurity

NOTES ON EXISTENCE AND UNIQUENESS THEOREMS FOR ODES

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

7. Lecture notes on the ellipsoid algorithm

K-center Hardness and Max-Coverage (Greedy)

16.1 Min-Cut as an LP

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

A Polynomial-Time Algorithm for Pliable Index Coding

Polynomiality of Linear Programming

Welsh s problem on the number of bases of matroids

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Distributed Optimization. Song Chong EE, KAIST

Containment restrictions

6.854J / J Advanced Algorithms Fall 2008

Topics in Approximation Algorithms Solution for Homework 3

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

Determinants of Partition Matrices

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

A combinatorial algorithm minimizing submodular functions in strongly polynomial time

Algorithms for a Special Class of State-Dependent Shortest Path Problems with an Application to the Train Routing Problem

Price of Stability in Survivable Network Design

The cocycle lattice of binary matroids

Fast algorithms for even/odd minimum cuts and generalizations

CS 6820 Fall 2014 Lectures, October 3-20, 2014

10.4 The Kruskal Katona theorem

Approximation Algorithms for Maximum. Coverage and Max Cut with Given Sizes of. Parts? A. A. Ageev and M. I. Sviridenko

Lazy Defenders Are Almost Optimal Against Diligent Attackers

Lazy Defenders Are Almost Optimal Against Diligent Attackers

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

arxiv: v1 [cs.dm] 27 Jan 2014

LINEAR PROGRAMMING III

Theorem (Special Case of Ramsey s Theorem) R(k, l) is finite. Furthermore, it satisfies,

Representations of All Solutions of Boolean Programming Problems

A Redundant Klee-Minty Construction with All the Redundant Constraints Touching the Feasible Region

CS6999 Probabilistic Methods in Integer Programming Randomized Rounding Andrew D. Smith April 2003

Duality of LPs and Applications

Deciding Emptiness of the Gomory-Chvátal Closure is NP-Complete, Even for a Rational Polyhedron Containing No Integer Point

Faster Algorithms for some Optimization Problems on Collinear Points

ACO Comprehensive Exam October 14 and 15, 2013

Linear Programming. Chapter Introduction

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters

Advanced Combinatorial Optimization Updated April 29, Lecture 20. Lecturer: Michel X. Goemans Scribe: Claudio Telha (Nov 17, 2009)

CS364A: Algorithmic Game Theory Lecture #16: Best-Response Dynamics

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

Worst case analysis for a general class of on-line lot-sizing heuristics

1 Basic Combinatorics

Lectures 6, 7 and part of 8

The Intersection Theorem for Direct Products

Lecture 4: An FPTAS for Knapsack, and K-Center

Induced subgraphs with many repeated degrees

Topics in Theoretical Computer Science April 08, Lecture 8

Lecture 59 : Instance Compression and Succinct PCP s for NP

The minimum G c cut problem

Lecture 11 October 7, 2013

Small Forbidden Configurations III

BBM402-Lecture 20: LP Duality

Math 320-2: Final Exam Practice Solutions Northwestern University, Winter 2015

Counting Clusters on a Grid

Discrete Applied Mathematics

Optimal Auctions with Correlated Bidders are Easy

Integer Programming ISE 418. Lecture 12. Dr. Ted Ralphs

Decompositions of graphs into cycles with chords

An Algorithmic Proof of the Lopsided Lovász Local Lemma (simplified and condensed into lecture notes)

1 Matchings in Non-Bipartite Graphs

Technische Universität Dresden Institute of Numerical Mathematics

Minimizing Cubic and Homogeneous Polynomials over Integers in the Plane

Protecting Moving Targets with Multiple Mobile Resources

Lecture 6,7 (Sept 27 and 29, 2011 ): Bin Packing, MAX-SAT

On Acceleration with Noise-Corrupted Gradients. + m k 1 (x). By the definition of Bregman divergence:

3.2 Configuration model

M17 MAT25-21 HOMEWORK 6

CSC Linear Programming and Combinatorial Optimization Lecture 8: Ellipsoid Algorithm

A n = A N = [ N, N] A n = A 1 = [ 1, 1]. n=1

MANAGEMENT SCIENCE doi /mnsc ec pp. ec1 ec6

More Approximation Algorithms

ORIE 6334 Spectral Graph Theory October 25, Lecture 18

Provable Approximation via Linear Programming

Maximization of Submodular Set Functions

The number of edge colorings with no monochromatic cliques

Local Maxima and Improved Exact Algorithm for MAX-2-SAT

Complex Analysis Homework 9: Solutions

Lec. 2: Approximation Algorithms for NP-hard Problems (Part II)

The Algorithmic Aspects of the Regularity Lemma

Resolution Lower Bounds for the Weak Pigeonhole Principle

An algorithm to increase the node-connectivity of a digraph by one

Two-Player Kidney Exchange Game

CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms

Lecture 24: April 12

The 2-valued case of makespan minimization with assignment constraints

Topic: Primal-Dual Algorithms Date: We finished our discussion of randomized rounding and began talking about LP Duality.

Ramsey-type problem for an almost monochromatic K 4

15.083J/6.859J Integer Optimization. Lecture 10: Solving Relaxations

HW 4 SOLUTIONS. , x + x x 1 ) 2

1 Matroid intersection

Multicommodity Flows and Column Generation

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.

On a Cardinality-Constrained Transportation Problem With Market Choice

Transcription:

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains APPENDIX LP Formulation for Constant Number of Resources (Fang et al. 3) For the sae of completeness, we describe the LP formulation in (Fang, Jiang, and Tambe 3) as follows. Let variable p(i, j, i, j,..., i K, j K ; n) be the probability that resource moves from position i at time n to position j at time n +. Then, the following LP solves the problem (Fang, Jiang, and Tambe 3). min u s.t f(j,..., j K ; n) = f(i,..., i K ; n) = M i,...,i K = M j,...,j K = p(i, j,..., i K, j K ; n ) p(i, j,..., i K, j K ; n) p(i, j,..., i K, j K ; n) =, if s.t. i j > M f(i,..., i K ; n) = i,...,i K = u ( (i,...,i K ) protecting t at n p(i, j,..., i K, j K ; n) [, ] f(i,..., i K ; n))w rn where (i,...,i K ) protecting t at n means summing over all the profiles (i,..., i K ) in which there exists at least an i satisfying that target t is within the protection range of position i at n. The size of the above LP formulation has order O(NM K ), which is polynomial in M and N but exponential in K. Proof of Lemma Lemma Statement:Separation oracles for P w and P g reduce to each other in poly(t,n) time. Proof. P w P g : given a separation oracle O w for P w, one can construct a separation oracle for P g by simply checing the T N extra constraints ( x tn )w tn u. Copyright c 4, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. P g P w : let u = max t,n w tn. For any x R T N, x P w if and only if (x, u ) P g. Furthermore, if x P w, any hyperplane a T x + bu = c separating (x, u ) from P g gives a hyperplane a T x = c bu separating x from P w. Proof of Lemma Lemma Statement: the separation oracle problem for P w reduces to the following LP (LP w ) in polynomial time: max w tn x tn s.t. x P w t [T ],n [N] for arbitrary weight profile {w tn }. As a result, LP g reduces to LP w in polynomial time. Proof. we re following an argument from (Grötschel, Lovász, and Schrijver 984); proof is provided for completeness. Assume we are given an oracle O that computes LP w. Consider another polyhedron Pw = {y : y T x, x P w }. For any y, we can decide whether y Pw by solving an instance of LP w : max y T x, s.t. x P w. This can be computed by oracle O and output an optimal solution x. If y T x, then y Pw, otherwise y T x = is a hyperplane separating y from Pw. Till now, we have constructed a separation oracle for Pw using O. Therefore, we can maximize any linear function over Pw in polynomial time, again by ellipsoid method. Then, similar arguments as above implies that we can construct a separation oracle for Pw = {x : y T x, y Pw} = P w. This proves that the separation oracle problem for P w reduces to LP w. Then we have, LP g reduces by ellipsoid method to the separation oracle problem for P g, which again reduces to the separation oracle problem for P w (by Lemma ), which then reduces to LP w. Proof of Lemma 3 Lemma Statement: If K M, there exists an optimal vertex solution for LP w corresponding to a defender pure strategy, say {v } [K], satisfying that v is strictly under v for all.

Proof. If =, i.e., each resource has to stay at the same position, this is trivial. We prove it for the case. Assume {v } [K] is any optimal pure patrol strategy with v = {v(), v(),..., v(n) }. We first argue that there is a way to construct another K paths {v } [K], such that v is wealy under v for all. We claim v = {max i {m (i) }, max i {m (i) },..., max i {m (i) N }}, [K] are also another K feasible patrol paths. Here max is the th largest value among {m () n } [K]. Obviously, if this is true, these paths would satisfy optimality, and v is wealy under v. Let m n denote max {m (i) n }. With slight abuse of notation, we also say m n v i if the path v i passes through position m n. We show the move from m n to m n+ is feasible for any n [N] and [K]. If i such that m n and m n+ are both in v i, then this is trivial. Otherwise, let m n = m (i) n v i. If m(i) n+ > m n+, since m n is the th largest due to the construction, there are at least paths wealy above position m n excluding v i, however there are at most paths strictly above position m n+ excluding v i because v i is one of the those paths strictly above m n+ (m (i) n+ > m n+). Therefore, there exists a v j satisfying that it is wealy above m n but wealy under m n+. So we have m (j) n m n but m (j) n+ m n+. This yields that it is feasible to go from m n to m n + (m (j) n+ m(j) n ). Since m n + (m (j) n+ m(j) n ) m n + (m n+ m n)) = m n+ < m (i) n+ and the move m n to m (i) n+ is feasible, the move m n to m n+ is also feasible. A similar argument applies to the case m (i) n+ < m n+. This shows that there exists an optimal set of K feasible patrol paths v,..., v K such that v + is wealy under v for any. Now, we show that there is a way to adjust v,..., v K such that they do not overlap and meanwhile maintain optimality. We first adjust the time layer. Let m in path v and m + in path v + be the first overlap. We aim to adjust these paths to mae v,..., v + not overlap at time. If v = v +, then we simply remove path v + without any loss and start a new path v + from an arbitrary uncovered position at time (this position exists because K M). Otherwise, let n( ) be the first time layer at which v and v + do not overlap, thus m n > mn +. So either of the following adjustments would be feasible and maintain optimality. i > + overlaps with v + at m n +, also push v i down at time n by setting m n i m n i. Note that both of these two adjustments will eep the paths wealy separate. Since v,..., v do not overlap at time due to our choice of, if m = M + which means there are no uncovered positions above v at time, then we tae the second adjustment (if more than two paths overlap at m in this case, push down all the paths, except v, by grid as the second adjustment) and mae the paths v,..., v, v + not overlap at time. Otherwise, there is at least one uncovered position above m, then we tae the first adjustment (always choose v in this case if more than two paths overlap, since we only care about v and v + currently). If m + is uncovered originally, we have made the paths v,..., v + not overlap at time. Otherwise m + = m and we removed the overlap at m, but create a new overlap at m. Nevertheless, we now that there is an uncovered position above m and we made the overlapping position (i.e., m + now) one step closer to this uncovered position. We then continue this adjustment until we get to that uncovered position and mae the paths v,..., v + not overlap at time. By now, we went one step further and made v,..., v + not overlap at time. We can continue this argument until finally maing all the paths not overlap at time. We now consider time layer. Similarly, let m and m + be the first overlap and n( ) be the first time layer at which v and v + do not overlap (let n = N + if v always overlaps v + except at time ). Since m > m + and mn > mn + (if n N + ), the following two adjustments are feasible and maintain optimality: set m n mn + (eep mn the same if m n = M) or mn + mn + (eep mn + the same if m n + = ), n < n. Then similarly to time, we can mae v,..., v + not overlap at time. Continuing this adjustment procedure until time N, we get K paths where for each pair of path, one is strictly under another one. Proof of Lemma 4 Lemma Statement: If N is a constant, Algorithm runs in polynomial time and outputs an optimal vertex solution for LP w, for any weight profile {w tn }. Proof. Lemma 3 guarantees there is always an optimal pure strategy in which paths do not cross or touch. Algorithm computes such an ordered optimal pure strategy using dynamic programming. This algorithm is polynomialtime because N is a constant, therefore the number of states OP T (v; ) is poly(m,k).. Push up v : set m n m n +, n < n; eep m n the same if m n = M; if any path v i satisfying i < overlaps with v at m n, also push v i up at time n by setting m n i m n i +.. Push down v + : set m n + mn m n + +, n < n; eep the same if mn + = ; if any path v i satisfying Proof of Theorem Theorem Statement: If the protection ranges at different grid points do not overlap with each other, then an optimal vertex solution to LP w can be found in polynomial time. Proof. We only need to focus on the pure strategies in which paths do not overlap with each other. Considering the orig-

N S added N Figure : Left: Original Grid; Right: Constructed Networ. inal grid in Figure, we set the reward of each grid point as the sum of all the weights of targets within its protection range, then construct a weighted directed networ as the right panel in Figure, in which weights indicate rewards obtained by passing through edges. The networ is constructed based on the original grid as follows: adding a source S and a sin T ; n < N, adding one more layer between time n and n + (blue points); all the feasible-move arrows become edges starting from each added layer to the next layer; one-to-one edges (purple in Figure ) are added from each original layer to the corresponding added layer. In addition, all the edges have capacity and only blue edges have non-zero weights (rewards), which equal the rewards of their starting points in the original grid. Consider the problem of letting K units flow (possibly fractionally) from source S to sin T such that the sum of the rewards weighted weighted by the flow amount through the corresponding edge is maximized. The following facts hold for this problem (similar to the min-cost flow problem):.) its optimal solution can be computed in polynomial-time because it has an LP formulation ;.) it has an integer optimal solution because all capacities are integers; 3.) this integer optimal solution can be computed in polynomial-time. It is straightforward to chec that the above maxreward flow problem is equivalent to finding optimal nonoverlapped pure strategy in original grid in the following sense: an integer flow in constructed networ can be converted to an optimal non-overlapping pure strategy in the original grid (by contracting the blue edges) and vice versa, and the sums of the collected rewards in both cases are equal. Proof of Lemma Lemma Statement: OP T (P C K ) K K if OP T (DC) = K ; and OP T (DC) K p if OP T (P C K) = p. Proof. First Part: By sampling a combination of K paths from [K ] uniformly at random, we get a solution for PC covering each target with probability at least K/K. Second Part: assume p is optimal for PC and MS = [ ] u,... u,k......... is the support of a mixed strategy u R,... u R,K achieving the optimality. Here each row r of MS corresponds to a pure strategy drawn with probability p r and T R r= p r =. Assume Algorithm outputs K and paths {v } [K]. we show that K K p. We loo at the mixed strategy MS from another perspective, namely, as a set of grid points assigned with probability weights, which we call p-weights from now on. For example, any position in path u, is a grid point assigned with p-weight p. Let X denote the set of all the grid points showing in MS and p X denote the p-weight of grid point X. Each path u r, has N grid points, so the sum of the p-weight over X is X X p X = R r= p r K N = KN. Now we count this sum of p-weights from another way. Let X n denote the set of all the grid points at time n that lie wealy above path v n output by Algorithm. We show the following inequality: X X n p X p,, n. If this is true, by letting = K we have KN = X X p X N n= X X p K X pnk n yielding K K p. We prove X X n p X p by induction on. When =, this is trivial. Now, assume the inequality holds for any r, then we consider the case of = r. We first sort all the positions of path v in a decreasing order (ties are broen randomly). Denote the index of the ordered time layers as n j, i.e., vr nj vr nj+ for all j. We then prove X X rnj p X pr by induction on j. When j =, this is the highest position in path v r. So there exists a target pair, say (t, n ), that is not protected by path v,..., v r, and vr n is the lowest possible position that still covers (t, n ), otherwise, v r is not time-wise lowest because it can move vr n to vr n. As a result, any grid point in X r,n does not protect the pair (t, n ). So all the grid points that protect (t, n) are wealy above vr n, but are not in X r,n, i.e., they are in X r,n \ X r,n. The sum of the p- weights of these grid points is at least p, since (t, n ) is covered by at least probability p. So we have X X r,n p X X X r,n p X + X X r,n \X r,n p X (r )p+p = pr due to induction hypothesis. Now assume the inequality holds for j i, we consider the case j = i. Since v r is time-wise lowest, the reason that v r goes through vr ni can only be one of the following two: i.) there exists a pair (t, n i ) that is not covered by X r,ni and vr ni is the lowest possible position that still covers (t, n i ); ii.) the move from vr ni to a position at a neighboring time layer, i.e., vr ni+ or vr ni, is infeasible. In the first case, we have X X r,ni p X pr with a similar argument as i =. In the second case, w.l.o.g., say the move from vr ni to vr ni is not feasible. Then, vr ni vr ni =, so all the paths going through points in X r,ni must arrive at a points wealy above vr ni, i.e., points in X r,ni. So we have X X r,ni p X X X p r,ni X pr, where the second is due to the induction hypothesis on i since n i rans before n i in the order. This finishes our proof. Proof of Theorem 3 Theorem Statement: OP T (P C K ) = K/OP T (DC). Furthermore, the optimal solution of P C K can be generated from that of DC efficiently.

Proof. Lemma yields OP T (P C K )OP T (DC) K (by first part) and OP T (P C K )OP T (DC) K (by second part). So OP T (P C K ) = K/OP T (DC). Next, we prove that a solution to PC can be obtained from a solution to DC as follows. Given the optimal path set [K ] for DC, we can sample a combination of K paths (i.e., a pure strategy for the defender) from [K ] uniformly at random. This can be easily done in poly(k ) time. Any target is covered by a resource with probability C K K = K CK K K where CK K means K choose K. Proof of Theorem 4 Theorem Statement: The K output by Algorithm is optimal. Proof. Let T denote the set of all targets protected by resource and T = T, i.e., the complement of T, denote all the targets not protected by. It is easy to see that if K is optimal (minimum) for protecting all targets, should be optimal for protecting T, [K ]. We next show the ey property of Algorithm : there exists an optimal solution for DC in which one resource follows precisely the same path as v constructed in Algorithm. The theorem then follows by induction. We prove this by contradiction. W.l.o.g. (Lemma 3), let {u, u,..., u K } be a set of optimal paths satisfying that u i is strictly above u i+, where u i = (u i,..., un i ). We show that v constructed in Algorithm is able to cover all the targets covered by u, and therefore {v, u,..., u K } is a new optimal solution, in which one resource follows v. Assume, for the sae of proof by contradiction, that this is false. Then, there exist targets covered by u but not by v. The uncovered targets must be under the protection range of v because v does not leave any pair (t, n) above its protection range uncovered by construction. So there exists i such that u i < v. i Note that u does not leave any pair (t, n) above its protection range uncovered, either, because {u, u,..., u K } is a cover and u is the highest path. However, the conclusion u i < v i means v is not the time-wise lowest path that does not leave any pair (t, n) above its protection range uncovered, which contradicts the construction in Algorithm. Proof of Lemma 6 Lemma Statement LP w is NP-hard, if A n ( ) for any n. Proof. We prove this by reducing from vertex cover. Construct the following special case: set = 3, set patrol radius r = 3 d, i.e., the protection range is (m 3 d, m+ 3 d ) at position m. Here d is the distance between two neightboring spatial points. Therefore, the position m+ d can be covered by a resource either at m or at m +, but the position m can only be covered by a resource at m. First, the following vertex cover problem (VC) is nown to be NP-hard: given integer K and any graph G = (V, E), finding a subset V V that maximizes the number of edges it covers subject to V = K. We reduce VC to LP w. Given K and any graph instance G = (V, E), we construct an LP w instance as follows. Create V targets, each one corresponding to a node in V. The moving paths for these V targets are constructed as path,,3, etc. in the left of Figure. Generally, two neighboring paths differ by a horizontal translation of 4 time layers. These paths are constructed in such way that each pair of targets cross each other exactly once and all the crossings have the same local geometry as shown in the right of Figure. Any pair of targets does not occupy the same discretized position at any time. We set the weight of each target to be at any time layer. Now, for any edge in E, we add a tiny target with small enough weight. Specifically, e = (u, v) E, let n e denote the discretized time when path u and v are closest, and u ne and v ne denote the position of path u and v at time n e. We put a tiny target with weight ɛ at the time n e on the point in the middle between u ne and v ne (see the position of ɛ in Figure ). Note that a resource can capture this ɛ weight at either u ne or v ne. One may thin of this as a tiny target e that has weight ɛ only at this specific time and has weight otherwise. We set ɛ small enough to satisfy ɛ < E, so that sum of all the tiny weights is still less than, i.e., E ɛ <. This completes the construction of the LP w instance. Our first observation is that any optimal vertex solution to LP w must first optimally capture the weights from the target set V, because E ɛ <, meaning that the loss of failing to cover any target corresponding to a node in V cannot be recovered even by covering all the ɛ tiny targets. Now we show the only way to collect weights optimally from those V targets is to pic any K targets and follow their paths precisely. The reason is that K resources can capture at most K targets at any time layer because of limited protection radius and non-overlapping paths. So capturing a sum of weights of KN is the best one can do and following any K targets achieves this. The reason that these are the only optimal strategies is that the only time when a resource can switch to another path is when the current path is about to intersect that path, however the switch at that time is infeasible because it needs an acceleration of, greater than the limit ( ). As a result, maximizing the collected weights is equivalent to choosing a target set [K] V to follow, such that the number of covered tiny targets is maximized. Note that a tiny target e = (u, v) can be covered if and only if one of its end points corresponds to a path in [K]. So, an optimal vertex solution (i.e., optimal pure strategy) to LP w gives an optimal solution to the original VC problem instance. Since G = (V, E) is arbitrarily chosen, LP w is NP-hard. Column Generation Column generation has been used to solve large linear programs as well as large scale games. Specifically in our problem, we start from an empty support set of defender pure In a slight abuse of notation, here we use u, v to denote both nodes in G and paths corresponding to these nodes.

3 4 3 A n ( ) Figure : Left: enumerated target paths; example position to put an ɛ tiny targets; Right: local intersection geometry, tiny target position and an infeasible acceleration. strategies, use LP w as an oracle to iteratively compute the defender s best response for any attacer mixed strategy and add it to the support set. In each iteration, we first solve for an optimal mixed strategy of the attacer under the assumption that the defender is only allowed to select a pure strategy from a restricted set Γ. Then, we use our algorithms for the weight collection problem to compute an optimal deterministic defender strategy with respect to the attacer s mixed strategy. The optimal pure defender strategy is added to Γ and the whole algorithm ends when the strategy to be added is already in the set. Although the size of the Γ may be exponential in worst case, this method is empirically efficient and can converge or get to near-optimal solutions by enumerating only a small fraction of all pure strategies (Jain et al. ; Halvorson, Conitzer, and Parr 9). Experiment Results with Small Scale Randomly Generated Instances We test the algorithms proposed in this paper with small scale randomly generated settings. The results are similar to that with practical settings in the ferry domain. Figure 3(a) shows the performance of the baseline strategy (LP) as the number of resources (K) increases. The x-axis shows the number of resources. LP is ensured to obtain the optimal solution (AttEU Ratio equals to ); however, the runtime increases exponentially when K increases. When K >= 4, LP runs out of memory and fails to return a solution. So LP is only applicable when K is small. Figure 3(b) shows that DP always achieves the optimal solution. When the number of time steps (M) is small enough (N <= ), DP runs much faster than LP. However, the runtime of DP increases exponentially as N increases and it can be even slower than the baseline algorithm. So DP is suitable for cases with small N. Figure 3(c) shows that NonOverlap achieves the optimal solution when the protection radius is small enough to mae the protection range non-overlapped (r <=.83). As the protection radius increases, the AttEU Ratio increases, indicating a decreasing solution quality. However, when the protection radius is close to d / (e.g., r =. and r =.3), the AttEU Ratio of NonOverlap is close to, meaning the solution quality is close to optimal. Given that NonOverlap outperforms the baseline in runtime significantly, we conclude that NonOverlap should be chosen when the protection range does not overlap and is a good approximation of optimal solution when protection radius is close to d /. Figure 3(d) shows the performance of Hom as the utility range increases. Utility range is defined as the difference between the maximum and minimum utility of the targets. When utility range equals zero, all targets are homogeneous. From the figure, we now Hom obtains an optimal solution when utility range is zero. As the utility range increases, the solution quality of Hom degrades compared to the baseline. When utility range is small, the solution quality is close to optimal, which means Hom provides a good approximation of the optimal solution. Furthermore, its runtime is orders of magnitude shorter than the baseline. The heuristic algorithm OrderGreedy achieves an optimal or near-optimal solution in most of the small scale cases. OrderGreedy also outperforms LP and DP significantly in runtime, which indicates it to be a good heuristic algorithm in many different settings. References Fang, F.; Jiang, A. X.; and Tambe, M. 3. Optimal patrol strategy for protecting moving targets with multiple mobile resources. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Grötschel, M.; Lovász, L.; and Schrijver, A. 984. the ellipsoid method and its consequences in combinatorial optimization. Combinatorica 4(4):9 9. Halvorson, E.; Conitzer, V.; and Parr, R. 9. Multi-step multi-sensor hider-seeer games. In Proceedings of the st International Jont Conference on Artifical Intelligence, IJ- CAI 9, 9 66. Jain, M.; Korzhy, D.; Vaně, O.; Conitzer, V.; Pěchouče, M.; and Tambe, M.. A double oracle algorithm for zero-sum security games on graphs. In The th International Conference on Autonomous Agents and Multiagent Systems - Volume, AAMAS, 37 334.

AttEU Ratio 3 3 4 LP OrderGreedy NonOverlap Hom AttEU Ratio.. 3 4 6 7 LP DP OrderGreedy NonOverlap Hom 3 4 Number of Resources 3 4 6 7 Number of Time Steps (a) Increase K (b) Increase N 3 AttEU Ratio AttEU Ratio....4.7..3.6 LP OrderGreedy NonOverlap Hom LP OrderGreedy NonOverlap Hom..4.7..3.6 Protection Radius Utility Range (c) Increase Re (d) Increase Range Figure 3: Experimental Results For Randomized Settings