Cost-Optimal Symbolic Pattern Database Planning with State Trajectory and Preference Constraints Stefan Edelkamp University of Dortmund.

Slides:



Advertisements
Similar presentations
Hybrid BDD and All-SAT Method for Model Checking Orna Grumberg Joint work with Assaf Schuster and Avi Yadgar Technion – Israel Institute of Technology.
Advertisements

Representing Boolean Functions for Symbolic Model Checking Supratik Chakraborty IIT Bombay.
Automatic Verification Book: Chapter 6. What is verification? Traditionally, verification means proof of correctness automatic: model checking deductive:
Linked List Implementation class List { private List next; private Object data; private static List root; private static int size; public static void addNew(Object.
Query Optimization of Frequent Itemset Mining on Multiple Databases Mining on Multiple Databases David Fuhry Department of Computer Science Kent State.
Game-theoretic approach to the simulation checking problem Peter Bulychev Vladimir Zakharov Lomonosov Moscow State University.
Constraint Optimization Presentation by Nathan Stender Chapter 13 of Constraint Processing by Rina Dechter 3/25/20131Constraint Optimization.
Efficient Reachability Analysis for Verification of Asynchronous Systems Nishant Sinha.
CS 267: Automated Verification Lecture 10: Nested Depth First Search, Counter- Example Generation Revisited, Bit-State Hashing, On-The-Fly Model Checking.
Syntax-driven partitioning for model-checking of Esterel programs Eric Vecchié - INRIA Aoste.
1 Temporal Claims A temporal claim is defined in Promela by the syntax: never { … body … } never is a keyword, like proctype. The body is the same as for.
Lecture 12: Revision Lecture Dr John Levine Algorithms and Complexity March 27th 2006.
Dynamic State-Space Partitioning in External-Memory Graph Search Rong Zhou † and Eric A. Hansen ‡ † Palo Alto Research Center ‡ Mississippi State University.
Review of topics Final exam : -May 2nd to May 7 th - Projects due on May 7th.
SAT and Model Checking. Bounded Model Checking (BMC) A.I. Planning problems: can we reach a desired state in k steps? Verification of safety properties:
Syntax-driven partitioning for model-checking of Esterel programs Eric Vecchié - INRIA Tick.
Weizmann Institute Tuning SAT-checkers for Bounded Model-Checking A bounded guided tour Ofer Shtrichman Weizmann Institute & IBM (HRL)
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
On the Use of Automata Techniques to Decide Satisfiability Mia Minnes May 3, 2005.
Research Related to Real-Time Strategy Games Robert Holte November 8, 2002.
Sanjit A. Seshia and Randal E. Bryant Computer Science Department
Efficient Reachability Checking using Sequential SAT G. Parthasarathy, M. K. Iyer, K.-T.Cheng, Li. C. Wang Department of ECE University of California –
Boolean Unification EE219B Presented by: Jason Shamberger March 1, 2000.
ECE Synthesis & Verification - L211 ECE 697B (667) Spring 2006 Synthesis and Verification of Digital Systems Verification Equivalence checking.
A Compressed Breadth-First Search for Satisfiability DoRon B. Motter and Igor L. Markov University of Michigan, Ann Arbor.
Weizmann Institute Tuning SAT-checkers for Bounded Model-Checking A bounded guided tour Ofer Shtrichman Weizmann Institute & IBM-HRL.
1 Completeness and Complexity of Bounded Model Checking.
1 A propositional world Ofer Strichman School of Computer Science, Carnegie Mellon University.
CS 267: Automated Verification Lecture 13: Bounded Model Checking Instructor: Tevfik Bultan.
272: Software Engineering Fall 2012 Instructor: Tevfik Bultan Lecture 4: SMT-based Bounded Model Checking of Concurrent Software.
Identifying Reversible Functions From an ROBDD Adam MacDonald.
1 Outline:  Outline of the algorithm  MILP formulation  Experimental Results  Conclusions and Remarks Advances in solving scheduling problems with.
R. Banach, School of Computer Science, University of Manchester, UK M. Bozzano, Fondazione Bruno Kessler, FBK-IRST, Trento, Italy 11. FSAP and the Model.
Dana Nau: Lecture slides for Automated Planning Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License:
Database Management 9. course. Execution of queries.
1 Automatic Refinement and Vacuity Detection for Symbolic Trajectory Evaluation Orna Grumberg Technion Haifa, Israel Joint work with Rachel Tzoref.
TECH Computer Science NP-Complete Problems Problems  Abstract Problems  Decision Problem, Optimal value, Optimal solution  Encodings  //Data Structure.
Li Wang Haorui Wu University of South Carolina 04/02/2015 A* with Pattern Databases.
Algorithmic Software Verification V &VI. Binary decision diagrams.
Real-Time Model Checking on Secondary Storage Stefan Edelkamp and Shahid Jabbar Chair for Programming Systems and Compiler Construction Computer Science.
Spatio-temporal Pattern Queries M. Hadjieleftheriou G. Kollios P. Bakalov V. J. Tsotras.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Lecture 3: Uninformed Search
Cost-Optimal Planning with Constraints and Preferences in Large State Spaces Stefan Edelkamp, Shahid Jabbar, Mohammed Nazih University of Dortmund.
1 Outline:  Optimization of Timed Systems  TA-Modeling of Scheduling Tasks  Transformation of TA into Mixed-Integer Programs  Tree Search for TA using.
Dana Nau: Lecture slides for Automated Planning Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License:
Automated Reasoning Early AI explored how to automated several reasoning tasks – these were solved by what we might call weak problem solving methods as.
Automated Reasoning Early AI explored how to automate several reasoning tasks – these were solved by what we might call weak problem solving methods as.
Real-Time Support for Mobile Robotics K. Ramamritham (+ Li Huan, Prashant Shenoy, Rod Grupen)
Automated Planning Dr. Héctor Muñoz-Avila. What is Planning? Classical Definition Domain Independent: symbolic descriptions of the problems and the domain.
External A* Stefan Edelkamp, Shahid Jabbar (ich) University of Dortmund, Germany and Stefan Schrödl (DaimlerChrysler, CA)
External Memory Value Iteration Stefan Edelkamp, Shahid Jabbar Chair for Programming Systems, University of Dortmund, Germany Blai Bonet Departamento de.
Towards Interoperability Test Generation of Time Dependent Protocols: a Case Study Zhiliang Wang, Jianping Wu, Xia Yin Department of Computer Science Tsinghua.
Verification & Validation By: Amir Masoud Gharehbaghi
Predicate Abstraction. Abstract state space exploration Method: (1) start in the abstract initial state (2) use to compute reachable states (invariants)
Dana Nau: Lecture slides for Automated Planning Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License:
I/O Efficient Directed Model Checking Shahid Jabbar and Stefan Edelkamp, Computer Science Department University of Dortmund, Germany.
Branch and Bound Algorithms Present by Tina Yang Qianmei Feng.
1 Distributed BDD-based Model Checking Orna Grumberg Technion, Israel Joint work with Tamir Heyman, Nili Ifergan, and Assaf Schuster CAV00, FMCAD00, CAV01,
Variants of LTL Query Checking Hana ChocklerArie Gurfinkel Ofer Strichman IBM Research SEI Technion Technion - Israel Institute of Technology.
1 A framework for eager encoding Daniel Kroening ETH, Switzerland Ofer Strichman Technion, Israel (Executive summary) (submitted to: Formal Aspects of.
Symbolic Model Checking of Software Nishant Sinha with Edmund Clarke, Flavio Lerda, Michael Theobald Carnegie Mellon University.
Honors Track: Competitive Programming & Problem Solving Seminar Topics Kevin Verbeek.
1 Advanced course on: Parallel and Distributed Model Checking Lecture 1 – Lecturers: Orna Grumberg, Computer Science Dept, Technion Karen Yorav,
SS 2017 Software Verification Bounded Model Checking, Outlook
Planning as model checking, (OBDDs)
Abstraction Transformation & Heuristics
Arithmetic Constraints and Automata
Spatio-temporal Pattern Queries
Discrete Controller Synthesis
Presentation transcript:

Cost-Optimal Symbolic Pattern Database Planning with State Trajectory and Preference Constraints Stefan Edelkamp University of Dortmund

Motivation Our BDD Planner MIPS compute Step- Optimal Propositional Plans How can it be extended to compute Cost- Optimal Plans for PDDL3 to take part in the 2006 International Planning Competition?

Overview BDD-based Planning Forward, Backward Partitioned Images Bidirectional Search Symbolic Pattern Databases Abstraction Databases Genetic PDBs Sequential PDDL3 Planning Encoding Cost-Functions Cost-Optimal Breadth-First Branch-And-Bound Results, Conclusion, Future Work

BDD-based Planning Symbolic Representation of Planning State Sets 1 Bit per Proposition Inefficient  Use Multivariate (SAS+) Encoding Variable Ordering is important Breadth-First Symbolic Search: Si(x) represents all states reachable in i steps Symbolic Heuristic Search: Available through Boolean Representation of the Heuristic

Images T(x,x‘) encodes Transition Relation for Image(x‘) =  x States(x)  T(x,x‘) Pre-Image(x) =  x States(x‘)  T(x,x‘)  Forward and Backward Search very much the same Partition Computation: 1 Transition Relation for each Planning Operator (  and v commute)  Disjunctive Partition

Symbolic Bidirectional Search Direction: Time BDD Size State Set Size Intersection found

Pattern Databases  Not used in Competition  Backward Search only executed in Abstract State Space Abstraction (Set SAS+-variables to Don‘t Care/Smaller Ranges) Precomputed Partition in BDDs H[0,…m], computed with Backward BFS Guides Search in Concrete State Space Pattern Selection Strategy: Bin-Packing Faster and Smaller than Explicit-PDBs

Genetic Pattern Databases  Not used in Competition (MoChArt)  Problem of Greedy Bin Packing: Selection Strategy influences Efficiency Many Patterns to Choose From Proposal: Automate Pattern Selection Problem Genetic Algorithm with Variable- Selection Vector Genes Selection based on mean heuristic value as fitness (one PDB) During learning PDBs are constructed but not used

PDDL3 Sequential Plan Semantics

Symbolic PDDL3 Planning State Trajectory Constraints PDDL3-to-PDDL2 Approach  Poster on Main Conference Goal Constraints Soft Constraints evaluated at Intersection States BnB Pruning at Intersection States Temporal Constraints e.g. hold-after (t p):  i>t: Openi  Openi  p Unidirectional Search (? Bidirectional ?)

BDDs for Linear Expressions Preference (preference pi Pi)  Introduce Boolean Variable bi for Pi, s.t. Indicator Function: bi  Pi Metric F(x) = a1*v1 + … an*vn Compute minF,maxF Encode Range [0,maxF-minF] Construct BDD for F Bartzis & Bultan (2006): Space & Time: O(n *(a1+…+an)) Encoding crucial, if well-chosen better than ADDs

Cost-Optimal Search

Correctness Theorem: The latest plan stored by the symbolic search planner Cost-Optimal-Symbolic-BFS has minimal cost. Proof: The algorithm applies full duplicate detection and traverses entire planning state space. It generates each planning state exactly once. Only clearly inferior states are pruned in the intersection (when evaluated in Eval and taken into conjunct with Bound). Therefore, Metric empty only if there is no state in the intersection that has an improved bound.

Memory Savings Locality k: Number of Previous Layers to be looked up for Duplicate Elimination Undirected Graphs: k=2 Layers, Planning Graphs: k<5 Store only Layers that correspond to Concrete State Space m-fold reduction, m=#Automata Automata Transition correspond to Axioms

Results GA-Optimization

Conclusion 1st Approach to PDB optimization Solves Pattern Selection Problem Some Memory Saving Strategies Results: See IPC-5

Future Work Implement Bartzis & Bultan‘s Method: So far we are using Buddy‘s Functionality to come up with same result but with more work (fixpoint computation) Bidirectional Constraint Search Natural Numbers, Real-Time Variables: Use Büchi- Automata Representation for Presburger Arithmetic as e.g. suggested by Felix Klaedtke CAV-06 Combine Symbolic Search and Externalization (  ICAPS 05)