Distributed Constraint Optimization * some slides courtesy of P. Modi

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

QoS-based Management of Multiple Shared Resources in Dynamic Real-Time Systems Klaus Ecker, Frank Drews School of EECS, Ohio University, Athens, OH {ecker,
Continuing Abstract Interpretation We have seen: 1.How to compile abstract syntax trees into control-flow graphs 2.Lattices, as structures that describe.
Branch-and-Bound Technique for Solving Integer Programs
Distributed Constraint Optimization Problems M OHSEN A FSHARCHI.
Adopt Algorithm for Distributed Constraint Optimization
Traveling Salesperson Problem
MBD and CSP Meir Kalech Partially based on slides of Jia You and Brian Williams.
Copyright 2004 Koren & Krishna ECE655/DataRepl.1 Fall 2006 UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Fault Tolerant Computing.
Types of Algorithms.
Algorithms + L. Grewe.
Anagh Lal Tuesday, April 08, Chapter 9 – Tree Decomposition Methods- Part II Anagh Lal CSCE Advanced Constraint Processing.
Constraint Optimization Presentation by Nathan Stender Chapter 13 of Constraint Processing by Rina Dechter 3/25/20131Constraint Optimization.
1 Modeling and Optimization of VLSI Interconnect Lecture 9: Multi-net optimization Avinoam Kolodny Konstantin Moiseev.
Planning with Resources at Multiple Levels of Abstraction Brad Clement, Tony Barrett, Gregg Rabideau Artificial Intelligence Group Jet Propulsion Laboratory.
Progress in Linear Programming Based Branch-and-Bound Algorithms
ICS-271:Notes 6: 1 Notes 6: Game-Playing ICS 271 Fall 2008.
5-1 Chapter 5 Tree Searching Strategies. 5-2 Satisfiability problem Tree representation of 8 assignments. If there are n variables x 1, x 2, …,x n, then.
Experiments We measured the times(s) and number of expanded nodes to previous heuristic using BFBnB. Dynamic Programming Intuition. All DAGs must have.
1 Distributed Adaptive Sampling, Forwarding, and Routing Algorithms for Wireless Visual Sensor Networks Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas.
Precedence Constrained Scheduling Abhiram Ranade Dept. of CSE IIT Bombay.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
Sum of Subsets and Knapsack
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 668Set 2: Basic Graph Algorithms1 CPSC 668 Distributed Algorithms and Systems Spring 2008 Prof. Jennifer Welch.
Branch and Bound Similar to backtracking in generating a search tree and looking for one or more solutions Different in that the “objective” is constrained.
1 Delay-efficient Data Gathering in Sensor Networks Bin Tang, Xianjin Zhu and Deng Pan.
Dealing with NP-Complete Problems
Advanced Topics in Algorithms and Data Structures 1 Lecture 4 : Accelerated Cascading and Parallel List Ranking We will first discuss a technique called.
MAE 552 – Heuristic Optimization Lecture 26 April 1, 2002 Topic:Branch and Bound.
2-Layer Crossing Minimisation Johan van Rooij. Overview Problem definitions NP-Hardness proof Heuristics & Performance Practical Computation One layer:
ICS-271:Notes 6: 1 Notes 6: Game-Playing ICS 271 Fall 2006.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Branch and Bound Algorithm for Solving Integer Linear Programming
Impact of Problem Centralization on Distributed Constraint Optimization Algorithms John P. Davin and Pragnesh Jay Modi Carnegie Mellon University School.
Distributed Scheduling. What is Distributed Scheduling? Scheduling: –A resource allocation problem –Often very complex set of constraints –Tied directly.
ICS-270a:Notes 5: 1 Notes 5: Game-Playing ICS 270a Winter 2003.
A1A1 A4A4 A2A2 A3A3 Context-Specific Multiagent Coordination and Planning with Factored MDPs Carlos Guestrin Shobha Venkataraman Daphne Koller Stanford.
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
Efficient Gathering of Correlated Data in Sensor Networks
Introduction to Job Shop Scheduling Problem Qianjun Xu Oct. 30, 2001.
Fundamentals of Algorithms MCS - 2 Lecture # 7
Maximum Reliability K-Hop Multicast Strategy in Tree Networks Mugurel Ionut Andreica, Nicolae Tapus Polytechnic University of Bucharest Computer Science.
Parsimony-Based Approaches to Inferring Phylogenetic Trees BMI/CS 576 Colin Dewey Fall 2010.
Minimax with Alpha Beta Pruning The minimax algorithm is a way of finding an optimal move in a two player game. Alpha-beta pruning is a way of finding.
CP Summer School Modelling for Constraint Programming Barbara Smith 2. Implied Constraints, Optimization, Dominance Rules.
Games. Adversaries Consider the process of reasoning when an adversary is trying to defeat our efforts In game playing situations one searches down the.
Nearest Neighbor Queries Chris Buzzerd, Dave Boerner, and Kevin Stewart.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Parsimony-Based Approaches to Inferring Phylogenetic Trees BMI/CS 576 Colin Dewey Fall 2015.
Chapter 2) CSP solving-An overview Overview of CSP solving techniques: problem reduction, search and solution synthesis Analyses of the characteristics.
Types of Algorithms. 2 Algorithm classification Algorithms that use a similar problem-solving approach can be grouped together We’ll talk about a classification.
Performance of Distributed Constraint Optimization Algorithms A.Gershman, T. Grinshpon, A. Meisels and R. Zivan Dept. of Computer Science Ben-Gurion University.
DISTRIBUTED ALGORITHMS Spring 2014 Prof. Jennifer Welch Set 2: Basic Graph Algorithms 1.
Static Process Scheduling
Proposal of Asynchronous Distributed Branch and Bound Atsushi Sasaki†, Tadashi Araragi†, Shigeru Masuyama‡ †NTT Communication Science Laboratories, NTT.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Holistic Twig Joins Optimal XML Pattern Matching Nicolas Bruno Columbia University Nick Koudas Divesh Srivastava AT&T Labs-Research SIGMOD 2002.
Adversarial Search 2 (Game Playing)
Constraint Programming for the Diameter Constrained Minimum Spanning Tree Problem Thiago F. Noronha Celso C. Ribeiro Andréa C. Santos.
Best-first search is a search algorithm which explores a graph by expanding the most promising node chosen according to a specified rule.
Algorithmic and Domain Centralization in Distributed Constraint Optimization Problems John P. Davin Carnegie Mellon University June 27, 2005 Committee:
1 Chapter 5 Branch-and-bound Framework and Its Applications.
6/13/20161 Greedy A Comparison. 6/13/20162 Greedy Solves an optimization problem: the solution is “best” in some sense. Greedy Strategy: –At each decision.
Mehdi Kargar Department of Computer Science and Engineering
The minimum cost flow problem
Backtracking And Branch And Bound
Major Design Strategies
Major Design Strategies
Presentation transcript:

Distributed Constraint Optimization * some slides courtesy of P. Modi

Outline DCOP and real world problems –DiMES Algorithms to solve DCOP –Synchronous Branch and Bound –ADOPT (distributed search) –DPOP (dynamic programming) DCPOP Future work

Distributed Constraint Optimization Problem (DCOP) Definition: –V = A set of variables –D i = A domain of values for V i –U = A set of utility functions on V Goal is to optimize global utility –can also model minimal cost problems by using negative utilities One agent per variable Each agent knows U i which is the set of all utility functions that involve V i

DiMES Framework for capturing real-world domains involving joint-activities –{R 1,...,R N } is a set of resources –{E 1,...,E K } is a set of events –Some ∆ st T*∆ = T latest – T earliest and T is a natural number –Thus we can characterize the time domain as the set Ŧ = {1,...,T} –An event, E k, is then the tuple (A k,L k ;V k ) where: A k is the subset of resources required by the event L k is the number of contiguous time slots for which the resources A k are needed V k denotes the value per time slot of the k th resource in A k

DiMES (cont’) It was shown in [Maheswaran et al. 2004] that DiMES can be translated into DCOP –Events are mapped to variables –The domain for each event is the time slot at which that event will start –Utility functions are somewhat complex but were able to be restricted to binary functions It was also shown that several resource allocation problems can be represented in DiMES (including distributed sensor networks)

Synchronous Branch and Bound Agents are prioritized into a chain (Hirayama97) or tree Root chooses value, sends to children Children choose value, evaluate partial solution, send partial solution (with cost) to children When cost exceeds upper bound, backtrack Agent explores all its values before reporting to parent

SyncBB Example

Pseudotrees Solid line =parent/child relationship Dashed line =pseudo-parent/pseudo-child relationship Common structure used in search procedures to allow parallel processing of independent branches A node can only have constraints with nodes in the path to root or with descendants

ADOPT SyncBB backtracks only when suboptimality is proven (current solution is greater than an upper bound) ADOPT ’s backtrack condition – when lower bound gets too high –backtrack before sub-optimality is proven –solutions need revisiting Agents are ordered in a Pseudotree Agents concurrently choose values –VALUE messages sent down –COST messages sent up only to parent –THRESHOLD messages sent down only to child

ADOPT Example Suppose parent has two values, “white” and “black”

DPOP Three phase algorithm: 1.Pseudotree generation 2.Utility message propagation bottom-up 3.Optimal value assignments top-down

DPOP: Phase 1

DPOP: Phase 2 Propagation starts at leaves, goes up to root Each agent waits for UTIL messages from children –does a JOIN –sends UTIL message to parent How many total messages in this phase?

DPOP: Phase 2 (cont’) UTIL Message =maximum utility for all value combinations of parent/pseudo-parents =includes maximum utility values for all children

DPOP: Phase 3 Value Propagation –After Phase 2, root has a summary view of the global UTIL information –Root can then pick the value for itself that gives the best global utility –This value is sent to all children –Children can now choose their own value, given the value of the root, that optimizes the global utility –This process continues until all nodes are assigned a value

DCOP Algorithm Summary Adopt –distributed search –linear size messages –worst case exponential number of messages with respect to the depth of the pseudotree DPOP –dynamic programming –worst case exponential size messages with respect to the induced width of the pseudotree –linear number of messages

Can we do better? Are pseudotrees the most efficient translation? –The minimum induced width pseudotree is currently the most efficient known translation –Finding it is NP-Hard and may require global information Heuristics are used to produce the pseudotrees –Current distributed heuristics are all based on some form of DFS or BestFS –We prove in a recent paper that pseudotrees produced by these heuristics are suboptimal

Cross-Edged Pseudotrees Pseudotrees that include edges between nodes in separate branches The dashed line is a cross- edge This relaxed form of a pseudotree can produce shorter trees, as well as less overlap between constraints

DCPOP Our extension to DPOP that correctly handles Cross-Edged Pseudotrees We have proved that using an edge-traversal heuristic (DFS, BestFS) it is impossible to produce a traditional pseudotree that outperforms a well chosen cross-edged pseudotree Edge-traversal heuristics are popular because they are easily done in a distributed fashion and require no sharing of global information

DCPOP (cont’) Computation size is closer to the minimum induced width than with DPOP Message size can actually be smaller than the minimum induced width A new measurement of sequential path cost (represents the maximal amount of parallelism achieved) also shows improvement

DCPOP Metrics

Future Work DCOP mapping for a TAEMS based task/resource allocation problem Full integration of uncertainty characteristics into the DCOP model Anytime adaptation with uncertainty