-
Avoiding Deadlocks via Weak Deadlock Sets
Authors:
Gianpaolo Oriolo,
Anna Russo Russo
Abstract:
A deadlock occurs in a network when two or more items prevent each other from moving and are stalled. In a general model, items are stored at vertices and each vertex $v$ has a buffer with $b(v)$ slots. Given a route for each item toward its destination, the Deadlock Safety Problem asks whether the current state is safe, i.e., it is possible to deliver each item at its destination, or is bound to…
▽ More
A deadlock occurs in a network when two or more items prevent each other from moving and are stalled. In a general model, items are stored at vertices and each vertex $v$ has a buffer with $b(v)$ slots. Given a route for each item toward its destination, the Deadlock Safety Problem asks whether the current state is safe, i.e., it is possible to deliver each item at its destination, or is bound to deadlock, i.e., any sequence of moves will end up with a set of items stalled. While when $b \geq 2$ the problem is solvable in polynomial time building upon a nice characterization of YES/NO-instances, it is NP-hard on quite simple graphs as grids when $b=1$ and on trees when $b\leq 3$. We improve on these results by means of two new tools, weak deadlock sets and wise states. We show that for general networks and $b$ a state that is wise and without weak deadlock sets -- this can be recognized in polynomial time -- is safe: this is indeed a strengthening of the result for $b\geq 2$. We sharpen this result for trees, where we show that a wise state is safe if and only if it has no weak deadlock set. That is interesting in particular in the context of rail transportation where networks are often single-tracked and deadlock detection and avoidance focuses on local sub-networks, mostly with a tree-like structure. We pose some research questions for future investigations.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Optimization for Evaluating the Practical Capacity of a Transshipment Yard
Authors:
Anna Russo Russo,
Roberto Mancini,
Gianpaolo Oriolo,
Veronica Piccialli,
Davide Ussai
Abstract:
In order to increase rail freight transportation in Italy, Rete Ferroviaria Italiana (RFI) the Italian railway infrastructure manager, is carrying out several investment plans to enhance the Transshipment Yards, that act as an interface between the rail and road networks. The need is to increase their practical capacity, i.e. the maximum number of train services that can be inserted without alteri…
▽ More
In order to increase rail freight transportation in Italy, Rete Ferroviaria Italiana (RFI) the Italian railway infrastructure manager, is carrying out several investment plans to enhance the Transshipment Yards, that act as an interface between the rail and road networks. The need is to increase their practical capacity, i.e. the maximum number of train services that can be inserted without altering the current timetable while respecting all relevant constraints. Several factors influence the practical capacity of a transshipment yard: physical resources (such as tracks and vehicles for loading/unloading); constraints on the possible time slots of individual operations; constraints on the length of time a train must stay in the yard, that follow from both timetable requirements that are settled by the (prevalent) main line and from administrative and organisational issues in the yard. In this paper, we propose a MILP-based optimization model that is based on the solution of a suitable saturation problem, that deals with all these constraints and that can be used for evaluating the practical capacity of a transshipment yard both in its current configuration and in any plausible future configuration. The model provides operational details, such as routes and schedules, for each train service, and allows to impose periodic timetables and schedules that keep the daily management of the yard easier. Both the model and its solutions are validated on a real Italian transshipment yard, located at Marzaglia, on different scenarios corresponding to different investment plans of RFI. The results show that proper investments allow to get a feasible timetable with a period of 24 hours with doubles the number of current train services.
△ Less
Submitted 3 October, 2024;
originally announced October 2024.
-
Horizontal collaboration in forestry: game theory models and algorithms for trading demands
Authors:
Mourad Baïou,
Gianpaolo Oriolo,
Gautier Stauffer
Abstract:
In this paper, we introduce a new cooperative game theory model that we call production-distribution game to address a major open problem for operations research in forestry, raised by Rönnqvist et al. in 2015, namely, that of modelling and proposing efficient sharing principles for practical collaboration in transportation in this sector. The originality of our model lies in the fact that the val…
▽ More
In this paper, we introduce a new cooperative game theory model that we call production-distribution game to address a major open problem for operations research in forestry, raised by Rönnqvist et al. in 2015, namely, that of modelling and proposing efficient sharing principles for practical collaboration in transportation in this sector. The originality of our model lies in the fact that the value/strength of a player does not only depend on the individual cost or benefit of the objects she owns but also depends on her market shares (customers demand). We show however that the production-distribution game is an interesting special case of a market game introduced by Shapley and Shubik in 1969. As such it exhibits the nice property of having a non-empty core. We then prove that we can compute both the nucleolus and the Shapley value efficiently, in a nontrivial and interesting special case. We in particular provide two different algorithms to compute the nucleolus: a simple separation algorithm and a fast primal-dual algorithm. Our results can be used to tackle more general versions of the problem and we believe that our contribution paves the way towards solving the challenging open problem herein.
△ Less
Submitted 8 November, 2022;
originally announced November 2022.
-
An Efficient Real-Time NMPC for Quadrotor Position Control under Communication Time-Delay
Authors:
Barbara Barros Carlos,
Tommaso Sartor,
Andrea Zanelli,
Gianluca Frison,
Wolfram Burgard,
Moritz Diehl,
Giuseppe Oriolo
Abstract:
The advances in computer processor technology have enabled the application of nonlinear model predictive control (NMPC) to agile systems, such as quadrotors. These systems are characterized by their underactuation, nonlinearities, bounded inputs, and time-delays. Classical control solutions fall short in overcoming these difficulties and fully exploiting the capabilities offered by such platforms.…
▽ More
The advances in computer processor technology have enabled the application of nonlinear model predictive control (NMPC) to agile systems, such as quadrotors. These systems are characterized by their underactuation, nonlinearities, bounded inputs, and time-delays. Classical control solutions fall short in overcoming these difficulties and fully exploiting the capabilities offered by such platforms. This paper presents the design and implementation of an efficient position controller for quadrotors based on real-time NMPC with time-delay compensation and bounds enforcement on the actuators. To deal with the limited computational resources onboard, an offboard control architecture is proposed. It is implemented using the high-performance software package acados, which solves optimal control problems and implements a real-time iteration (RTI) variant of a sequential quadratic programming (SQP) scheme with Gauss-Newton Hessian approximation. The quadratic subproblems (QP) in the SQP scheme are solved with HPIPM, an interior-point method solver, built on top of the linear algebra library BLASFEO, finely tuned for multiple CPU architectures. Solution times are further reduced by reformulating the QPs using the efficient partial condensing algorithm implemented in HPIPM. We demonstrate the capabilities of our architecture using the Crazyflie 2.1 nano-quadrotor.
△ Less
Submitted 23 October, 2020; v1 submitted 21 October, 2020;
originally announced October 2020.
-
Decentralized Multi-Robot Encirclement of a 3D Target with Guaranteed Collision Avoidance
Authors:
Antonio Franchi,
Paolo Stegagno,
Giuseppe Oriolo
Abstract:
We present a control framework for achieving encirclement of a target moving in 3D using a multi-robot system. Three variations of a basic control strategy are proposed for different versions of the encirclement problem, and their effectiveness is formally established. An extension ensuring maintenance of a safe inter-robot distance is also discussed. The proposed framework is fully decentralized…
▽ More
We present a control framework for achieving encirclement of a target moving in 3D using a multi-robot system. Three variations of a basic control strategy are proposed for different versions of the encirclement problem, and their effectiveness is formally established. An extension ensuring maintenance of a safe inter-robot distance is also discussed. The proposed framework is fully decentralized and only requires local communication among robots; in particular, each robot locally estimates all the relevant global quantities. We validate the proposed strategy through simulations on kinematic point robots and quadrotor UAVs, as well as experiments on differential-drive wheeled mobile robots.
△ Less
Submitted 19 June, 2015; v1 submitted 26 July, 2013;
originally announced July 2013.
-
A fast algorithm to remove proper and homogenous pairs of cliques (while preserving some graph invariants)
Authors:
Yuri Faenza,
Gianpaolo Oriolo,
Claudia Snels
Abstract:
We introduce a family of reductions for removing proper and homogeneous pairs of cliques from a graph G. This family generalizes some routines presented in the literature, mostly in the context of claw-free graphs. These reductions can be embedded in a simple algorithm that in at most |E(G)| steps builds a new graph G' without proper and homogeneous pairs of cliques, and such that G and G' agree o…
▽ More
We introduce a family of reductions for removing proper and homogeneous pairs of cliques from a graph G. This family generalizes some routines presented in the literature, mostly in the context of claw-free graphs. These reductions can be embedded in a simple algorithm that in at most |E(G)| steps builds a new graph G' without proper and homogeneous pairs of cliques, and such that G and G' agree on the value of some relevant invariant (or property).
△ Less
Submitted 14 March, 2011;
originally announced March 2011.
-
The Virtual Private Network Design Problem with Concave Costs (Oberwolfach abstract)
Authors:
Samuel Fiorini,
Gianpaolo Oriolo,
Laura Sanità,
Dirk Oliver Theis
Abstract:
The symmetric Virtual Private Network Design (VPND) problem is concerned with buying capacity on links (edges) in a communication network such that certain traffic demands can be met. We investigate a natural generalization of VPND where the cost per unit of capacity may decrease if a larger amount of capacity is reserved (economies of scale principle). The growth of the cost of capacity is mode…
▽ More
The symmetric Virtual Private Network Design (VPND) problem is concerned with buying capacity on links (edges) in a communication network such that certain traffic demands can be met. We investigate a natural generalization of VPND where the cost per unit of capacity may decrease if a larger amount of capacity is reserved (economies of scale principle). The growth of the cost of capacity is modelled by a non-decreasing concave function $f$. We call the problem the concave symmetric Virtual Private Network Design (cVPND) problem. After showing that a generalization of the so-called Pyramidal Routing problem and hence also the cVPND have the so-called tree routing property, we study approximation algorithms for cVPND. For general $f$, using known results on the so-called Single Source Buy at Bulk problem by Grandoni and Italiano, we give a randomized 24.92-approximation algorithm.
△ Less
Submitted 12 December, 2008;
originally announced December 2008.
-
The VPN Tree Routing Conjecture for Outerplanar Networks
Authors:
Samuel Fiorini,
Gianpaolo Oriolo,
Laura Sanità,
Dirk Oliver Theis
Abstract:
The VPN Tree Routing Conjecture is a conjecture about the Virtual Private Network Design problem. It states that the symmetric version of the problem always has an optimum solution which has a tree-like structure. In recent work, Hurkens, Keijsper and Stougie (Proc. IPCO XI, 2005; SIAM J. Discrete Math., 2007) have shown that the conjecture holds when the network is a ring. A shorter proof of th…
▽ More
The VPN Tree Routing Conjecture is a conjecture about the Virtual Private Network Design problem. It states that the symmetric version of the problem always has an optimum solution which has a tree-like structure. In recent work, Hurkens, Keijsper and Stougie (Proc. IPCO XI, 2005; SIAM J. Discrete Math., 2007) have shown that the conjecture holds when the network is a ring. A shorter proof of the VPN Conjecture for rings was found a few months ago by Grandoni, Kaibel, Oriolo and Skutella (to appear in Oper. Res. Lett., 2008). In their paper, Grandoni et al. introduce another conjecture, called the Pyramidal Routing Conjecture (or simply PR Conjecture), which implies the VPN Conjecture. Here we consider a strengthened version of the PR Conjecture. First we establish several general tools which can be applied in arbitrary networks. Then we use them to prove that outerplanar networks satisfy the PR Conjecture.
△ Less
Submitted 24 November, 2008; v1 submitted 16 November, 2007;
originally announced November 2007.
-
A Short Proof of the VPN Tree Routing Conjecture on Ring Networks
Authors:
Fabrizio Grandoni,
Volker Kaibel,
Gianpaolo Oriolo,
Martin Skutella
Abstract:
The VPN Tree Routing Conjecture states that there always exists an optimal solution to the symmetric Virtual Private Network Design (sVPND) problem where the paths between all terminals form a tree. Only recently, Hurkens, Keijsper, and Stougie gave a proof of this conjecture for the special case of ring networks. Their proof is based on a dual pair of linear programs and is somewhat in- volved.…
▽ More
The VPN Tree Routing Conjecture states that there always exists an optimal solution to the symmetric Virtual Private Network Design (sVPND) problem where the paths between all terminals form a tree. Only recently, Hurkens, Keijsper, and Stougie gave a proof of this conjecture for the special case of ring networks. Their proof is based on a dual pair of linear programs and is somewhat in- volved. We present a short proof of a slightly stronger conjecture which might also turn out to be useful for proving the VPN Tree Routing Conjecture for general networks.
△ Less
Submitted 26 October, 2007; v1 submitted 16 October, 2007;
originally announced October 2007.