A Structural Characterization of Temporal Dynamic Controllability Paul Morris NASA Ames Research Center Moffett Field, CA 94035, U.S.A.

Slides:



Advertisements
Similar presentations
Constraint Satisfaction Problems
Advertisements

Foundations of Constraint Processing Temporal Constraints Networks 1Topic Foundations of Constraint Processing CSCE421/821, Spring
ECE 667 Synthesis and Verification of Digital Circuits
§3 Shortest Path Algorithms Given a digraph G = ( V, E ), and a cost function c( e ) for e  E( G ). The length of a path P from source to destination.
1 Constraint Satisfaction Problems A Quick Overview (based on AIMA book slides)
1 Finite Constraint Domains. 2 u Constraint satisfaction problems (CSP) u A backtracking solver u Node and arc consistency u Bounds consistency u Generalized.
ICS-271:Notes 5: 1 Lecture 5: Constraint Satisfaction Problems ICS 271 Fall 2008.
C&O 355 Mathematical Programming Fall 2010 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Introduction to Graphs
Introduction to Algorithms
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Optimal Rectangle Packing: A Meta-CSP Approach Chris Reeson Advanced Constraint Processing Fall 2009 By Michael D. Moffitt and Martha E. Pollack, AAAI.
R. Johnsonbaugh Discrete Mathematics 5 th edition, 2001 Chapter 8 Network models.
October 31, Algorithms and Data Structures Lecture XIII Simonas Šaltenis Nykredit Center for Database Research Aalborg University
Precedence Constrained Scheduling Abhiram Ranade Dept. of CSE IIT Bombay.
Nov Properties of Tree Convex Constraints Authors: Yuanlin Zhang & Eugene C. Freuder Presentation by Robert J. Woodward CSCE990 ACP, Fall 2009.
1 Maximum Flow w s v u t z 3/33/3 1/91/9 1/11/1 3/33/3 4/74/7 4/64/6 3/53/5 1/11/1 3/53/5 2/22/2 
Algorithm Strategies Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
Introduction Sorting permutations with reversals in order to reconstruct evolutionary history of genome Reversal mutations occur often in chromosomes where.
Circuit Retiming with Interconnect Delay CUHK CSE CAD Group Meeting One Evangeline Young Aug 19, 2003.
Placement of Integration Points in Multi-hop Community Networks Ranveer Chandra (Cornell University) Lili Qiu, Kamal Jain and Mohammad Mahdian (Microsoft.
1 Data Structures DFS, Topological Sort Dana Shapira.
The max flow problem
Jean-Charles REGIN Michel RUEHER ILOG Sophia Antipolis Université de Nice – Sophia Antipolis A global constraint combining.
1 Graph Algorithms Single source shortest paths problem Dana Shapira.
Tirgul 13. Unweighted Graphs Wishful Thinking – you decide to go to work on your sun-tan in ‘ Hatzuk ’ beach in Tel-Aviv. Therefore, you take your swimming.
Graph-Cut Algorithm with Application to Computer Vision Presented by Yongsub Lim Applied Algorithm Laboratory.
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
Chapter 9: Graphs Basic Concepts
Distributed Constraint Optimization * some slides courtesy of P. Modi
EDA (CS286.5b) Day 18 Retiming. Today Retiming –cycle time (clock period) –C-slow –initial states –register minimization.
Penn ESE535 Spring DeHon 1 ESE535: Electronic Design Automation Day 8: February 13, 2008 Retiming.
Advanced Algorithms Piyush Kumar (Lecture 5: Weighted Matching) Welcome to COT5405 Based on Kevin Wayne’s slides.
Factoring Polynomials
1 Shortest Path Problem Topic 11 ITS033 – Programming & Algorithms C B A E D F Asst. Prof. Dr. Bunyarit Uyyanonvara IT Program,
CP Summer School Modelling for Constraint Programming Barbara Smith 1.Definitions, Viewpoints, Constraints 2.Implied Constraints, Optimization,
C&O 355 Mathematical Programming Fall 2010 Lecture 4 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
CS774. Markov Random Field : Theory and Application Lecture 13 Kyomin Jung KAIST Oct
February 18, 2015CS21 Lecture 181 CS21 Decidability and Tractability Lecture 18 February 18, 2015.
CSCI 5582 Fall 2006 CSCI 5582 Artificial Intelligence Fall 2006 Jim Martin.
CALTECH CS137 Winter DeHon CS137: Electronic Design Automation Day 7: February 3, 2002 Retiming.
Data Structures & Algorithms Graphs
1 Chapter 34: NP-Completeness. 2 About this Tutorial What is NP ? How to check if a problem is in NP ? Cook-Levin Theorem Showing one of the most difficult.
Pipelining and Retiming
CONSENSUS THEOREM Choopan Rattanapoka.
CALTECH CS137 Spring DeHon 1 CS137: Electronic Design Automation Day 5: April 12, 2004 Covering and Retiming.
Fundamental Concepts of Algebra
CS38 Introduction to Algorithms Lecture 10 May 1, 2014.
Foundations of Constraint Processing, Spring 2009 Structure-Based Methods: An Introduction 1 Foundations of Constraint Processing CSCE421/821, Spring 2009.
15.082J & 6.855J & ESD.78J September 30, 2010 The Label Correcting Algorithm.
Suppose G = (V, E) is a directed network. Each edge (i,j) in E has an associated ‘length’ c ij (cost, time, distance, …). Determine a path of shortest.
Models of Greedy Algorithms for Graph Problems Sashka Davis, UCSD Russell Impagliazzo, UCSD SIAM SODA 2004.
1 Chapter 7 Network Flow Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
©2010 Cengage Learning SLIDES FOR CHAPTER 8 COMBINATIONAL CIRCUIT DESIGN AND SIMULATION USING GATES Click the mouse to move to the next page. Use the ESC.
TIRGUL 10 Dijkstra’s algorithm Bellman-Ford Algorithm 1.
Factoring bi-primes with Orion Dr. William Macready, Vice-President, Product Development July
©2010 Cengage Learning SLIDES FOR CHAPTER 3 BOOLEAN ALGEBRA (continued) Click the mouse to move to the next page. Use the ESC key to exit this chapter.
Graph Algorithms – 2. graphs Parenthesis Theorem Theorem 22.7 For all u, v, exactly one of the following holds: 1. d[u] < f [u] < d[v] < f [v] or.
Theory of Computational Complexity Yusuke FURUKAWA Iwama Ito lab M1.
Temporal Plan Execution: Dynamic Scheduling and Simple Temporal Networks Brian C. Williams J/6.834J December 2nd,
CSPs: Search and Arc Consistency Computer Science cpsc322, Lecture 12
Dealing with Changes of Time-Aware Processes
Constraint Propagation
CSCE350 Algorithms and Data Structure
Instructor: Shengyu Zhang
Temporal Planning, Scheduling and Execution
Planning for Human-Robot Collaboration
Running example The 4-houses puzzle:
Algorithms for Budget-Constrained Survivable Topology Design
Consistency algorithms
Presentation transcript:

A Structural Characterization of Temporal Dynamic Controllability Paul Morris NASA Ames Research Center Moffett Field, CA 94035, U.S.A.

Simple Temporal Networks (Dechter, Meiri, Pearl 1991) Special type of CSP Variables: Event times Binary Constraints: Event separations Issue: Determine consistency [10,20] AB The time of B is somewhere between 10 and 20 after A.

Temporal Constraints in Planning: Requirements versus Contingencies [10,20] AB Want B to occur at some time between 10 and 20 after A. [10,20] AB Know B will occur at a time between 10 and 20 after A. (precise time is uncertain) Requirement Agent must somehow ensure bounds are satisfied Contingency Nature ensures bounds are satisfied Nature chooses B

Contingencies are Observable Before a contingent link finishes, we can observe that it has not finished yet. After a contingent link finishes, we can observe how long it took.

STN with Uncertainty (STNU) (Vidal & Ghallab 1996, etc.) C D B A [1,2] [4,5] [2,3] C D B A [1,2] [4,4] [2,3] STN with contingent link Projection1 Projection2 [5,5] C D B A [1,2][2,3] Courtesy Morris, Muscettola, & Vidal IJCAI-2001 min max

STN/STNU Solutions STN Problem Solution = Schedule STNU Dynamic Controllability Problem Solution = Dynamic Strategy — mapping from projections to schedules — depends only on past — must not depend on future Courtesy Morris, Muscettola, & Vidal IJCAI-2001

Example ABCD [2,4] [-2,+2] [0,1] Strategy: execute A and C simultaneously Courtesy Morris, Muscettola, & Vidal IJCAI-2001

Example ABCD [2,4] [-2,+2] [0,1] Strategy: execute A and C simultaneously AB CD [-2,+2] [0,0] [2,4] tighten Courtesy Morris, Muscettola, & Vidal IJCAI-2001

Example Wait Tightening AB [0,4] C [-2,+2] C must wait for B or until 2 units after A Wait-for-event with timeout AB [0,4] C [-2,+2] tighten Wait(B;2)

STN/STNU Solutions STN Problem Solution = Schedule STNU Dynamic Controllability Problem Solution = Tightened Network Courtesy Morris, Muscettola, & Vidal IJCAI-2001

Previous & New Results STNU Dynamic Controllability Problem Morris, Muscettola & Vidal (IJCAI01) Tractable; pseudo-polynomial (bounded values) Morris & Muscettola (AAAI05) Strong-polynomial O(N^5) This paper: Strong-polynomial O(N^4) Courtesy Morris, Muscettola, & Vidal IJCAI-2001

Approach Element1: simplify WLOG AB [x,y] UB [0,y-x] A [x,x]

Approach Element2: mimic STN ideas Distance graph Paths of edges Consistent  no neg cycle Neg cycle  O(N) neg cycle Bellman-Ford O(N) cutoff Labeled distance graph paths of label-edges?? DC  no ?? cycle ?? cycle  simpler ?? ??? cutoff STN Methods STNU Methods

Labeled Distance Graph (aaai05) AB [0,y] A [x,y] B A B A B y -x b:0 B:-y A Wait(B;z) C A C B:-z

Labeled-Path Distance Add up edge weights, ignoring labels B c:y A x D E:z Path Distance = x+y+z Theorem???: DC iff no labeled negative cycle?? NOT TRUE!! Theorem: DC iff no allowed labeled negative cycle  C

Allowed Paths: Moat Edges A b:0 CBD first D with BD negative moat edge for AB A b:0 CBA B:-u Unusable moat edge

Allowed Paths: Moat Edges A b:0 CBD Usable moat edge Derived edge same path distance lower-case free

Dynamic Controllability Characterization Theorem: DC if and only if no allowed negative cycle A path is allowed if every lower-case edge has a usable moat edge in the path (These paths are semi-reducible: they can be transformed into paths without lower-case edges)

Nesting Lemma subpaths cannot partially overlap. The subpaths are either nested or disjoint. Thus they lead to a parenthesization of a path. b:0 1 D:-3 d:0 3 B:-2 b:0 -2 A  B  D  C  D  B  A  B  E Depth of nesting = 2

Negative Cycle Simplification x y If x+y < 0 then x < 0 or y < 0 Can eliminate repetitions in STN negative cycles BUT x y lc edge moat edge Cannot eliminate all repetitions in STNU allowed negative cycles

Negative Cycle Simplification HOWEVER: AABBCEDF Nested repetitions CAN be eliminated!  neg cycle with depth of nesting at most O(K). nested repetition (K = no. of contingent links)

Outline of DC Test Algorithm Match up usable pairs from the inside out; add derived edge. Each iteration eliminates one level of nesting. Detects allowed neg. cyc. in O(K) iterations. Each iteration propagates forward from each contingent link. Overall O(N^4) complexity.

DC Execution Needs Test if network is DC (previous slides) Regress waits as far as they will go Bypass certain lower-case edges –lower-case edge followed by negative ordinary path Ensures contingent edges will not be squeezed during execution.

Regression Paths: Tower Edges A B:-x CBD nearest D with DA non-negative tower edge for BA D:-3 2 b:0 B:-1 2 C  D  B  A  B  E Precursor path of derived wait can be parenthesized

No Nested Repetitions in Wait Derivations AABBCEDF Upper-case nested repetition would have to be negative Would be allowed negative cycle Cannot occur if verified DC upper-case nested repetition negative Regression of waits can be done in O(N^4) time

DC Execution Needs Test if network is DC (previous slides) –O(N^4) complexity  Regress waits as far as they will go –O(N^4) complexity  Bypass certain lower-case edges –lower-case edge followed by negative ordinary path –also O(N^4) complexity

Conclusions Simplification: contingent links with zero lower bound Dynamic Controllability Structural Characterization: DC  no negative cycle of specific type Parenthesization based on moat edges Can eliminate nested repetitions, limit depth Strong polynomial O(N^4) algorithm for DC –Compare: STN consistency testing is O(N^3)