167 research outputs found
Time-Energy Tradeoffs for Evacuation by Two Robots in the Wireless Model
Two robots stand at the origin of the infinite line and are tasked with
searching collaboratively for an exit at an unknown location on the line. They
can travel at maximum speed and can change speed or direction at any time.
The two robots can communicate with each other at any distance and at any time.
The task is completed when the last robot arrives at the exit and evacuates. We
study time-energy tradeoffs for the above evacuation problem. The evacuation
time is the time it takes the last robot to reach the exit. The energy it takes
for a robot to travel a distance at speed is measured as . The
total and makespan evacuation energies are respectively the sum and maximum of
the energy consumption of the two robots while executing the evacuation
algorithm.
Assuming that the maximum speed is , and the evacuation time is at most
, where is the distance of the exit from the origin, we study the
problem of minimizing the total energy consumption of the robots. We prove that
the problem is solvable only for . For the case , we give an
optimal algorithm, and give upper bounds on the energy for the case .
We also consider the problem of minimizing the evacuation time when the
available energy is bounded by . Surprisingly, when is a
constant, independent of the distance of the exit from the origin, we prove
that evacuation is possible in time , and this is optimal up
to a logarithmic factor. When is linear in , we give upper bounds
on the evacuation time.Comment: This is the full version of the paper with the same title which will
appear in the proceedings of the 26th International Colloquium on Structural
Information and Communication Complexity (SIROCCO'19) L'Aquila, Italy during
July 1-4, 201
Evacuating Two Robots from a Disk: A Second Cut
We present an improved algorithm for the problem of evacuating two robots
from the unit disk via an unknown exit on the boundary. Robots start at the
center of the disk, move at unit speed, and can only communicate locally. Our
algorithm improves previous results by Brandt et al. [CIAC'17] by introducing a
second detour through the interior of the disk. This allows for an improved
evacuation time of . The best known lower bound of was shown by
Czyzowicz et al. [CIAC'15].Comment: 19 pages, 5 figures. This is the full version of the paper with the
same title accepted in the 26th International Colloquium on Structural
Information and Communication Complexity (SIROCCO'19
Fast Two-Robot Disk Evacuation with Wireless Communication
In the fast evacuation problem, we study the path planning problem for two
robots who want to minimize the worst-case evacuation time on the unit disk.
The robots are initially placed at the center of the disk. In order to
evacuate, they need to reach an unknown point, the exit, on the boundary of the
disk. Once one of the robots finds the exit, it will instantaneously notify the
other agent, who will make a beeline to it.
The problem has been studied for robots with the same speed~\cite{s1}. We
study a more general case where one robot has speed and the other has speed
. We provide optimal evacuation strategies in the case that by showing matching upper and lower bounds on the
worst-case evacuation time. For , we show (non-matching)
upper and lower bounds on the evacuation time with a ratio less than .
Moreover, we demonstrate that a generalization of the two-robot search strategy
from~\cite{s1} is outperformed by our proposed strategies for any .Comment: 18 pages, 10 figure
Deterministic meeting of sniffing agents in the plane
Two mobile agents, starting at arbitrary, possibly different times from
arbitrary locations in the plane, have to meet. Agents are modeled as discs of
diameter 1, and meeting occurs when these discs touch. Agents have different
labels which are integers from the set of 0 to L-1. Each agent knows L and
knows its own label, but not the label of the other agent. Agents are equipped
with compasses and have synchronized clocks. They make a series of moves. Each
move specifies the direction and the duration of moving. This includes a null
move which consists in staying inert for some time, or forever. In a non-null
move agents travel at the same constant speed, normalized to 1. We assume that
agents have sensors enabling them to estimate the distance from the other agent
(defined as the distance between centers of discs), but not the direction
towards it. We consider two models of estimation. In both models an agent reads
its sensor at the moment of its appearance in the plane and then at the end of
each move. This reading (together with the previous ones) determines the
decision concerning the next move. In both models the reading of the sensor
tells the agent if the other agent is already present. Moreover, in the
monotone model, each agent can find out, for any two readings in moments t1 and
t2, whether the distance from the other agent at time t1 was smaller, equal or
larger than at time t2. In the weaker binary model, each agent can find out, at
any reading, whether it is at distance less than \r{ho} or at distance at least
\r{ho} from the other agent, for some real \r{ho} > 1 unknown to them. Such
distance estimation mechanism can be implemented, e.g., using chemical sensors.
Each agent emits some chemical substance (scent), and the sensor of the other
agent detects it, i.e., sniffs. The intensity of the scent decreases with the
distance.Comment: A preliminary version of this paper appeared in the Proc. 23rd
International Colloquium on Structural Information and Communication
Complexity (SIROCCO 2016), LNCS 998
Optimal online and offline algorithms for robot-assisted restoration of barrier coverage
Cooperation between mobile robots and wireless sensor networks is a line of
research that is currently attracting a lot of attention. In this context, we
study the following problem of barrier coverage by stationary wireless sensors
that are assisted by a mobile robot with the capacity to move sensors. Assume
that sensors are initially arbitrarily distributed on a line segment
barrier. Each sensor is said to cover the portion of the barrier that
intersects with its sensing area. Owing to incorrect initial position, or the
death of some of the sensors, the barrier is not completely covered by the
sensors. We employ a mobile robot to move the sensors to final positions on the
barrier such that barrier coverage is guaranteed. We seek algorithms that
minimize the length of the robot's trajectory, since this allows the
restoration of barrier coverage as soon as possible. We give an optimal
linear-time offline algorithm that gives a minimum-length trajectory for a
robot that starts at one end of the barrier and achieves the restoration of
barrier coverage. We also study two different online models: one in which the
online robot does not know the length of the barrier in advance, and the other
in which the online robot knows the length of the barrier. For the case when
the online robot does not know the length of the barrier, we prove a tight
bound of on the competitive ratio, and we give a tight lower bound of
on the competitive ratio in the other case. Thus for each case we give an
optimal online algorithm.Comment: 20 page
Rendezvous of Heterogeneous Mobile Agents in Edge-weighted Networks
We introduce a variant of the deterministic rendezvous problem for a pair of
heterogeneous agents operating in an undirected graph, which differ in the time
they require to traverse particular edges of the graph. Each agent knows the
complete topology of the graph and the initial positions of both agents. The
agent also knows its own traversal times for all of the edges of the graph, but
is unaware of the corresponding traversal times for the other agent. The goal
of the agents is to meet on an edge or a node of the graph. In this scenario,
we study the time required by the agents to meet, compared to the meeting time
in the offline scenario in which the agents have complete knowledge
about each others speed characteristics. When no additional assumptions are
made, we show that rendezvous in our model can be achieved after time in a -node graph, and that such time is essentially in some cases
the best possible. However, we prove that the rendezvous time can be reduced to
when the agents are allowed to exchange bits of
information at the start of the rendezvous process. We then show that under
some natural assumption about the traversal times of edges, the hardness of the
heterogeneous rendezvous problem can be substantially decreased, both in terms
of time required for rendezvous without communication, and the communication
complexity of achieving rendezvous in time
Robots with Lights: Overcoming Obstructed Visibility Without Colliding
Robots with lights is a model of autonomous mobile computational entities
operating in the plane in Look-Compute-Move cycles: each agent has an
externally visible light which can assume colors from a fixed set; the lights
are persistent (i.e., the color is not erased at the end of a cycle), but
otherwise the agents are oblivious. The investigation of computability in this
model, initially suggested by Peleg, is under way, and several results have
been recently established. In these investigations, however, an agent is
assumed to be capable to see through another agent. In this paper we start the
study of computing when visibility is obstructable, and investigate the most
basic problem for this setting, Complete Visibility: The agents must reach
within finite time a configuration where they can all see each other and
terminate. We do not make any assumption on a-priori knowledge of the number of
agents, on rigidity of movements nor on chirality. The local coordinate system
of an agent may change at each activation. Also, by definition of lights, an
agent can communicate and remember only a constant number of bits in each
cycle. In spite of these weak conditions, we prove that Complete Visibility is
always solvable, even in the asynchronous setting, without collisions and using
a small constant number of colors. The proof is constructive. We also show how
to extend our protocol for Complete Visibility so that, with the same number of
colors, the agents solve the (non-uniform) Circle Formation problem with
obstructed visibility
Byzantine Gathering in Networks
This paper investigates an open problem introduced in [14]. Two or more
mobile agents start from different nodes of a network and have to accomplish
the task of gathering which consists in getting all together at the same node
at the same time. An adversary chooses the initial nodes of the agents and
assigns a different positive integer (called label) to each of them. Initially,
each agent knows its label but does not know the labels of the other agents or
their positions relative to its own. Agents move in synchronous rounds and can
communicate with each other only when located at the same node. Up to f of the
agents are Byzantine. A Byzantine agent can choose an arbitrary port when it
moves, can convey arbitrary information to other agents and can change its
label in every round, in particular by forging the label of another agent or by
creating a completely new one.
What is the minimum number M of good agents that guarantees deterministic
gathering of all of them, with termination?
We provide exact answers to this open problem by considering the case when
the agents initially know the size of the network and the case when they do
not. In the former case, we prove M=f+1 while in the latter, we prove M=f+2.
More precisely, for networks of known size, we design a deterministic algorithm
gathering all good agents in any network provided that the number of good
agents is at least f+1. For networks of unknown size, we also design a
deterministic algorithm ensuring the gathering of all good agents in any
network but provided that the number of good agents is at least f+2. Both of
our algorithms are optimal in terms of required number of good agents, as each
of them perfectly matches the respective lower bound on M shown in [14], which
is of f+1 when the size of the network is known and of f+2 when it is unknown
When Patrolmen Become Corrupted: Monitoring a Graph Using Faulty Mobile Robots
A team of k mobile robots is deployed on a weighted graph whose edge weights represent distances. The robots move perpetually along the domain, represented by all points belonging to the graph edges, without exceeding their maximum speed. The robots need to patrol the graph by regularly visiting all points of the domain. In this paper, we consider a team of robots (patrolmen), at most f of which may be unreliable, i.e., they fail to comply with their patrolling duties. What algorithm should be followed so as to minimize the maximum time between successive visits of every edge point by a reliable patrolman? The corresponding measure of efficiency of patrolling called idleness has been widely accepted in the robotics literature. We extend it to the case of untrusted patrolmen; we denote by Ifk(G) the maximum time that a point of the domain may remain unvisited by reliable patrolmen. The objective is to find patrolling strategies minimizing Ifk(G). We investigate this problem for various classes of graphs. We design optimal algorithms for line segments, which turn out to be surprisingly different from strategies for related patrolling problems proposed in the literature. We then use these results to study general graphs. For Eulerian graphs G, we give an optimal patrolling strategy with idleness Ifk(G)=(f+1)|E|/k, where |E| is the sum of the lengths of the edges of G. Further, we show the hardness of the problem of computing the idle time for three robots, at most one of which is faulty, by reduction from 3-edge-coloring of cubic graphsâa known NP-hard problem. A byproduct of our proof is the investigation of classes of graphs minimizing idle time (with respect to the total length of edges); an example of such a class is known in the literature under the name of Kotzig graphs
Revisiting the Problem of Searching on a Line
We revisit the problem of searching for a target at an unknown location on a
line when given upper and lower bounds on the distance D that separates the
initial position of the searcher from the target. Prior to this work, only
asymptotic bounds were known for the optimal competitive ratio achievable by
any search strategy in the worst case. We present the first tight bounds on the
exact optimal competitive ratio achievable, parameterized in terms of the given
bounds on D, along with an optimal search strategy that achieves this
competitive ratio. We prove that this optimal strategy is unique. We
characterize the conditions under which an optimal strategy can be computed
exactly and, when it cannot, we explain how numerical methods can be used
efficiently. In addition, we answer several related open questions, including
the maximal reach problem, and we discuss how to generalize these results to m
rays, for any m >= 2
- âŠ