2020
DOI: 10.1109/tase.2020.2986641
|View full text |Cite
|
Sign up to set email alerts
|

Robust Assignment Using Redundant Robots on Transport Networks With Uncertain Travel Time

Abstract: This paper considers the problem of assigning mobile robots to goals on transport networks with uncertain and potentially correlated information about travel times. Our aim is to produce optimal assignments, such that the average waiting time at destinations is minimized. Since noisy travel time estimates result in sub-optimal assignments, we propose a method that offers robustness to uncertainty by making use of redundant robot assignments. However, solving the redundant assignment problem optimally is strong… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(24 citation statements)
references
References 35 publications
0
24
0
Order By: Relevance
“…Thirty replications of the simulation are performed in total, the same as the field experiments. The 30 simulation results consist of three parts and are concluded, respectively, as the 10 The hotspot (smartphone) always consumes network traffic even though there is no estimate-submission due to the reason that some built-in applications cannot be completely shut down and always lead to network traffic cost. The network data corresponding to such consumption and the estimate-submissions jointly produce data blocks.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thirty replications of the simulation are performed in total, the same as the field experiments. The 30 simulation results consist of three parts and are concluded, respectively, as the 10 The hotspot (smartphone) always consumes network traffic even though there is no estimate-submission due to the reason that some built-in applications cannot be completely shut down and always lead to network traffic cost. The network data corresponding to such consumption and the estimate-submissions jointly produce data blocks.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…This means that C without = 1000 × 10 = 10 000 B and n ε = 55 (see footnote 10). 10 In the test, we measured C with = 10 055 B, so we have ε ≈ (10 055 − 10 000)/55 = 1 B. To emulate the real scenario, simulations and field experiments share the same c and ε and are both carried out by the following three parts.…”
Section: B Parameter Identificationmentioning
confidence: 99%
“…We first consider the assignment problem from the perspective of the pursuers-with the evaders represented by probability distributions {p j } j∈Cy , what's the best pursuer-to-evader assigment? In a probabilistic setup, where the costs (capture times) are stochastic variables (see Section 3.3.2), and there are excess pursuers, this needs to be solved in two stages (Prorok, 2020): First we need to determine an initial assignment of each evader to one pursuer. Following that we determine the assignment of the remaining (redundant) pursuers so as to minimize the (total or maximum) expected capture time.…”
Section: Assignment Strategiesmentioning
confidence: 99%
“…After computation of an initial assignment, A 0 , we determine the assignment of the remaining pursuers using the method proposed in (Prorok, 2020). Formally, we first consider the problem of selecting a set of redundant pursuer-evader matchings, Ā , that minimizes the total expected travel time to evaders, under the constraint that any pursuer is only assigned once:…”
Section: Redundant Pursuer Assignment Approachmentioning
confidence: 99%
“…But most robotics research places no emphasis on robustifying information acquisition against attacks (or failures) that may temporarily disable the robots' sensors; e.g., smokecloud attacks that can block temporarily the field of view of multiple sensors. For example, [21] focuses on formation control, instead of information acquisition; [22] focuses on state estimation against byzantine attacks, i.e., attacks that corrupt the robots' sensors with adversarial noise, instead of disabling them; and [23] focuses on a trajectory scheduling in transportation networks when travel times can be uncertain, instead on trajectory planning for information acquisition. An exception is [16], which however is limited to multi-target tracking based on myopic planning, instead of non-myopic.…”
Section: Introductionmentioning
confidence: 99%