Skip to main content

Improvements to the Linear Optimization Models of Patrol Scheduling for Mobile Targets

  • Conference paper
  • First Online:
Book cover Advances in Artificial Intelligence (Canadian AI 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9091))

Included in the following conference series:

  • 2655 Accesses

Abstract

Recent work in the field of security for the generation of patrol schedules has provided many solutions to real-world situations by using Stackelberg models and solving them with linear programming software. More specifically, some approaches have addressed the difficulties of defining patrol schedules for moving targets such as ferries to minimize their vulnerabilities to terrorist threats. However, one important aspect of these types of problems that hasn’t been explored yet concerns the concept of time-windows. In this work, we show the relevance of considering time-windows when generating solutions such as to attend to a broader class of problems and generate sound solutions. We propose some improvements to the model for the generation of patrol schedules for attacks on mobile targets with adjustable time durations while keeping the constraints linear to take advantage of linear programming solvers. To address the scalability issues raised by this new model, we propose a general column-generation approach composed of a master and slave problem, which can also be used on the original problem of patrol generation without time-windows. Finally, we discuss and propose a new two-phase equilibrium refinement approach to improve the robustness of the solutions found.

J.-F. Landry–This work was funded by MITACS, Menya Solutions inc. and the Natural Sciences and Engineering Research Council of Canada (NSERC).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. CoRR abs/1401.3888 (2014)

    Google Scholar 

  2. Basilico, N., Gatti, N., Amigoni, F.: Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder. Artificial Intelligence 184–185, 78–123 (2012)

    Article  Google Scholar 

  3. Basilico, N., Gatti, N., Amigoni, F.: Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2009, vol. 1. International Foundation for Autonomous Agents and Multiagent Systems, Richland, pp. 57–64 (2009)

    Google Scholar 

  4. Bošanský, B., Lisý, V., Jakob, M., Pěchouček, M.: Computing time-dependent policies for patrolling games with mobile targets. In: The 10th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2011, vol 3. International Foundation for Autonomous Agents and Multiagent Systems, Richland, pp. 989–996 (2011)

    Google Scholar 

  5. Lisý, V., Píbil, R., Stiborek, J., Bosanský, B., Pechoucek, M.: Game-theoretic approach to adversarial plan recognition. In: Raedt, L.D., Bessiére, C., Dubois, D., Doherty, P., Frasconi, P., Heintz, F., Lucas, P.J.F., (eds.) ECAI. Frontiers in Artificial Intelligence and Applications, vol. 242. IOS Press, pp. 546–551 (2012)

    Google Scholar 

  6. Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, 1st edn. Cambridge University Press, New York (2011)

    Book  Google Scholar 

  7. Fang, F., Jiang, A., Tambe, M.: Protecting Moving Targets with Multiple Mobile Resources. Journal of Artificial Intelligence 48, 583–634 (2013)

    MATH  MathSciNet  Google Scholar 

  8. Xu, H., Fang, F., Jiang, A.X., Conitzer, V., Dughmi, S., Tambe, M.: Solving zero-sum security games in discretized spatio-temporal domains. In: Proceedings of the 28th Conference on Artificial Intelligence (AAAI 2014), Québec, Canada (2014)

    Google Scholar 

  9. Miltersen, P.B., Sørensen, T.B.: Computing proper equilibria of zero-sum games. In: van den Herik, H.J., Ciancarini, P., Donkers, H.H.L.M.J. (eds.) CG 2006. LNCS, vol. 4630, pp. 200–211. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Fudenberg, D., Tirole, J.: Game Theory, 1st edn. The MIT Press, Cambridge (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Éric Beaudry .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Landry, JF., Dussault, JP., Beaudry, É. (2015). Improvements to the Linear Optimization Models of Patrol Scheduling for Mobile Targets. In: Barbosa, D., Milios, E. (eds) Advances in Artificial Intelligence. Canadian AI 2015. Lecture Notes in Computer Science(), vol 9091. Springer, Cham. https://doi.org/10.1007/978-3-319-18356-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18356-5_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18355-8

  • Online ISBN: 978-3-319-18356-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics