Finding Optimal Solutions to Cooperative Pathfinding Problems Trevor Standley and Rich Korf Computer Science Department University of California, Los Angeles.

Slides:



Advertisements
Similar presentations
Review: Search problem formulation
Advertisements

Test-First Programming. The tests should drive you to write the code, the reason you write code is to get a test to succeed, and you should only write.
The simplex algorithm The simplex algorithm is the classical method for solving linear programs. Its running time is not polynomial in the worst case.
Artificial Intelligence Presentation
Hadi Goudarzi and Massoud Pedram
Adopt Algorithm for Distributed Constraint Optimization
Informed Search Methods How can we improve searching strategy by using intelligence? Map example: Heuristic: Expand those nodes closest in “as the crow.
Ispd-2007 Repeater Insertion for Concurrent Setup and Hold Time Violations with Power-Delay Trade-Off Salim Chowdhury John Lillis Sun Microsystems University.
The Efficiency of Algorithms
Optimal Rectangle Packing: A Meta-CSP Approach Chris Reeson Advanced Constraint Processing Fall 2009 By Michael D. Moffitt and Martha E. Pollack, AAAI.
EE 553 Integer Programming
The Out of Kilter Algorithm in Introduction The out of kilter algorithm is an example of a primal-dual algorithm. It works on both the primal.
Algorithm Strategies Nelson Padua-Perez Chau-Wen Tseng Department of Computer Science University of Maryland, College Park.
CPSC 322, Lecture 9Slide 1 Search: Advanced Topics Computer Science cpsc322, Lecture 9 (Textbook Chpt 3.6) January, 23, 2009.
Visual Recognition Tutorial
Nonholonomic Multibody Mobile Robots: Controllability and Motion Planning in the Presence of Obstacles (1991) Jerome Barraquand Jean-Claude Latombe.
A Decentralised Coordination Algorithm for Maximising Sensor Coverage in Large Sensor Networks Ruben Stranders, Alex Rogers and Nicholas R. Jennings School.
Decentralized prioritized planning in large multirobot teams Prasanna Velagapudi Paul Scerri Katia Sycara Carnegie Mellon University, Robotics Institute.
Review: Search problem formulation
© University of Minnesota Data Mining for the Discovery of Ocean Climate Indices 1 CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance.
Nature’s Algorithms David C. Uhrig Tiffany Sharrard CS 477R – Fall 2007 Dr. George Bebis.
Constraint Satisfaction Problems
Approximation Algorithms
Research Related to Real-Time Strategy Games Robert Holte November 8, 2002.
Near-Optimal Network Design with Selfish Agents By Elliot Anshelevich, Anirban Dasgupta, Eva Tardos, Tom Wexler STOC’03 Presented by Mustafa Suleyman CIFTCI.
Chapter 5 Outline Formal definition of CSP CSP Examples
Non-Conservative Cost Bound Increases in IDA* Doug Demyen.
Chapter 5.4 Artificial Intelligence: Pathfinding.
10/31/02CSE Greedy Algorithms CSE Algorithms Greedy Algorithms.
Traveling Salesman Problem Continued. Heuristic 1 Ideas? –Go from depot to nearest delivery –Then to delivery closest to that –And so on until we are.
Chapter 5.4 Artificial Intelligence: Pathfinding.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Distributed Constraint Optimization Michal Jakob Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech Technical University A4M33MAS.
Vilalta&Eick: Informed Search Informed Search and Exploration Search Strategies Heuristic Functions Local Search Algorithms Vilalta&Eick: Informed Search.
06 - Boundary Models Overview Edge Tracking Active Contours Conclusion.
SVM by Sequential Minimal Optimization (SMO)
Frame by Frame Bit Allocation for Motion-Compensated Video Michael Ringenburg May 9, 2003.
Game Playing Chapter 5. Game playing §Search applied to a problem against an adversary l some actions are not under the control of the problem-solver.
Recursion, Complexity, and Sorting By Andrew Zeng.
Minimum Cost Flows. 2 The Minimum Cost Flow Problem u ij = capacity of arc (i,j). c ij = unit cost of shipping flow from node i to node j on (i,j). x.
Computer Science CPSC 322 Lecture A* and Search Refinements (Ch 3.6.1, 3.7.1, 3.7.2) Slide 1.
 Pearson Education, Inc. All rights reserved Searching and Sorting.
Hande ÇAKIN IES 503 TERM PROJECT CONSTRAINT SATISFACTION PROBLEMS.
Greedy Algorithms. Surprisingly, many important and practical computational problems can be solved this way. Every two year old knows the greedy algorithm.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Deadlocks II.
CSCI 5582 Fall 2006 CSCI 5582 Artificial Intelligence Fall 2006 Jim Martin.
2005MEE Software Engineering Lecture 11 – Optimisation Techniques.
Lecture 3: Uninformed Search
FORS 8450 Advanced Forest Planning Lecture 5 Relatively Straightforward Stochastic Approach.
OR Chapter 8. General LP Problems Converting other forms to general LP problem : min c’x  - max (-c)’x   = by adding a nonnegative slack variable.
Computer Sciences Department1.  Property 1: each node can have up to two successor nodes (children)  The predecessor node of a node is called its.
Finding Optimal Solutions to Cooperative Pathfinding Problems Trevor Standley Computer Science Department University of California, Los Angeles
Adversarial Search 2 (Game Playing)
1 Distributed Vertex Coloring. 2 Vertex Coloring: each vertex is assigned a color.
CSCE 552 Fall 2012 AI By Jijun Tang. Homework 3 List of AI techniques in games you have played; Select one game and discuss how AI enhances its game play.
Ch. 4 Memory Mangement Parkinson’s law: “Programs expand to fill the memory available to hold them.”
Stochastic Local Search Algorithms for DNA word Design Dan C Tulpan, Holger H Hoos, and Anne Condon Summerized by Ji-Eun Yun.
Chapter 5.4 Artificial Intelligence: Pathfinding
The minimum cost flow problem
ECE 448 Lecture 4: Search Intro
Dynamic Programming.
More on Search: A* and Optimization
Constraint satisfaction problems
ENGM 435/535 Integer Programming.
UNINFORMED SEARCH -BFS -DFS -DFIS - Bidirectional
The Rich/Knight Implementation
Constraint satisfaction problems
The Rich/Knight Implementation
Presentation transcript:

Finding Optimal Solutions to Cooperative Pathfinding Problems Trevor Standley and Rich Korf Computer Science Department University of California, Los Angeles

Introduction  Pathfinding Problems  A single agent must find a path from a start state to a goal state  Cooperative Pathfinding Problems  Multiple agents interact  Want to minimize the total cost

Motivation

My Formulation  Gridworld pathfinding

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Related Work  Centralized Approaches  Strengths: Typically complete, can be optimal  Weaknesses: Takes forever!  Decoupled Approaches  Strengths: Fast  Weaknesses: Incomplete and suboptimal

Our Prior Work (Standley AAAI-10)  Independence Detection  Empowers centralized algorithms.  Combines the strength of centralized and decentralized approaches.  Maintains optimality and completeness.

Simple Independence Detection From (Standley AAAI-10)

Simple Independence Detection 1.Put each agent into its own group. 2.Plan paths for each group independently 3.Check for conflicts in new paths 4.Combine groups with conflicting paths 5.Repeat 2-4 until no conflicts From (Standley AAAI-10)

Simple Independence Detection From (Standley AAAI-10)

Simple Independence Detection Problem  Are these agents independent? From (Standley AAAI-10)

Simple Independence Detection Problem  Are these agents independent? From (Standley AAAI-10)

Better Independence Detection  When a conflict is detected between two groups, try to find an alternative path for one of the groups  If that fails try to find an alternate path for the other group  Only as a last resort do we combine the groups From (Standley AAAI-10)

Best Independence Detection  How can we make agent 2 take this path initially? From (Standley AAAI-10)

Best Independence Detection  Try to avoid future conflicts  avoid the current paths of other agents. From (Standley AAAI-10)

Reservation Tables  Illegal move table  Contains all the ways alternative paths could result in a conflict with the currently conflicting group.  Consider such moves illegal.  Conflict avoidance table  Contains all the ways alternative paths could result in a conflict with any other group  Keep track of conflict avoidance table violations and

Reservation Tables Illegal move table. From (Standley AAAI-10)

Reservation Tables Illegal move table. From (Standley AAAI-10)

Reservation Tables Illegal move table. From (Standley AAAI-10)

Reservation Tables  Illegal move table  Contains all the ways alternative paths could result in a conflict with the currently conflicting group.  Consider such moves illegal.  Conflict avoidance table  Contains all the ways alternative paths could result in a conflict with any other group  Keep track of conflict avoidance table violations

Reservation Tables Conflict avoidance table. From (Standley AAAI-10)

Reservation Tables Conflict avoidance table. From (Standley AAAI-10)

Reservation Tables Conflict avoidance table. From (Standley AAAI-10)

Complete Approximation Algorithms  Our previous work maintained optimality by:  Only accepting alternate paths if they have the same cost as original paths.  Coupling independence detection with an optimal centralized algorithm.  We recognize in our current work that we can drop these two constraints.

Complete Approximation Algorithms  Modifications to the centralized algorithm  Expand nodes with fewest violations first  Use cost to break ties

When to drop these constraints  Always  Leads to a fast and complete algorithm  When doing so avoids the creation of groups containing more than x agents  Leads to a slower but still fast algorithm  Produces higher quality paths

Parameterized Approximation  Maximum group size parameter x  Drop constraints to avoid creating groups larger than x.  x =1 : always drop the constraints.  x = ∞ : never drop the constraints (optimal)  The algorithm is complete for any choice of x

Simple Optimal Anytime Algorithm  Run the parameterized approximation with x = 1.  Then run the parameterized approximation with x = 2.  …  When we run out of time, we return the best solution found by any run.

Simple Optimal Anytime Algorithm Problem  The simple anytime algorithm suffers the cost of unused and incomplete iterations.

Optimal Anytime Algorithm Problem  Keep paths and groupings from previous iterations when possible.  Keep track of groups that might not have optimal paths.  Fix these paths one at a time starting with the easiest.

Optimal Anytime Algorithm  Keep a lower bound for each group.  When merging a group, add lower bounds

Optimal Anytime Algorithm  Update best path many times within an iteration.  Whenever the solution is conflict free we update the best solution found.  When lower bound equals cost, we’re done

Results  Our coarsest approximation is complete, has competitive running time, and produces superior solutions.  As an optimal algorithm, our anytime algorithm is competitive with our previous state-of-the-art.  If our anytime algorithm is terminated early, it often returns an optimal path.