SlideShare a Scribd company logo
1 of 11
Download to read offline
Sensor-Task Assignment
         in Heterogeneous
          Sensor Networks
                      Diego Pizzocaro
                      D.Pizzocaro@cs.cf.ac.uk




Research Group: KIS                      Supervisor: Prof. Alun Preece
Why sensor-task assignment?
•   Heterogeneous Sensor Networks (HSN) introduce new resource allocation
    problems in which sensors must be assigned to the tasks they best help


•   An already deployed HSN is usually required to support multiple sensing
    tasks of different nature to be accomplished simultaneously


•   Tasks might compete for the exclusive usage of the same sensing resource

          ➡   We need schemes to assign individual sensors to tasks


•   Research focus: find the right way to model this allocation problem

      •   we defined increasingly detailed models

      •   we developed computationally efficient approaches to solve them
Example
•   Two target identification tasks.
    (Tasks may have different priorities)

•   Targets are close in the field.

•   We only have one video sensor that could identify both.

•   Problem: Where do we point the video sensor?
    (i.e. To which task do we assign the sensor?)


                                                      X
                                                    Target 2




                  X
                Target 1
Simple model
                        Sensor-Task Assignment

•   Tasks vary in priority and have a different demand   Sensors

    for sensing resource capabilities.                     S1
                                                                          e11
                                                                                     Tasks


                                                                    e1                 T1    (d1, p1)
                                                                      2




•   Each sensor has a different utility for each task,     S2

    because of:

      •   Geography & distance                             S3
                                                                                       T2    (d2, p2)



      •   Remaining battery life
                                                           S4



•   Goal: A sensor assignment that maximizes the
                                                           e = utility of sensor to a task
    utility that the sensor network can provide               d = task utility demand
    to tasks.                                                     p = task priority




             This problem is NP-Complete and very hard to approximate:
          We developed many heuristic algorithms to solve it (greedy algs)
Non additive utility!
•    Utilities from multiple sensors do not always combine additively

•    Example:

        ‣   Triangulation tasks

        ‣   We need two audio sensors for each task


                                   X                                        X
                              Target 2                                    Target 2




    X                                       X
Target 1                                  Target 1



    Task 1: Utility(S1,S2) = 100                Task 1: Utility(S1) = 0
More detailed model
               Sensor-Bundle-Task Assignment

•   We first want to group sensors into bundles, and then we want to find the
    best assignment of bundles to tasks.

•   NP-Complete problem: we will use COMBINATORIAL AUCTION techniques.


                  Sensors
                                           Bundles                Tasks

                    S1
                                                        e11
                                              B1                      T1   (p1)

                    S2
                                                      e1
                                                        2




                    S3

                                              B2                      T2   (p2)

                    S4


                            e = joint utility of a bundle to a task
                                       p = task priority
Combinatorial auctions



•   Combinatorial auction:

    ‣   It is a silent auction in which bidders can bid on sets of items
        (instead of single items).

    ‣   Each bidder provides sets of items and corresponding prices for each set.

    ‣   The auctioneer chooses the set of bids that maximizes the payment.

•   The Sensor-Bundle-Task Assignment model can be seen as a combinatorial auction.
Related work - overview
•   Combinatorial auctions have been already applied to sensor-task assignment
    problems in scenarios where sensor utility does not combine additively:

    ‣   J. Ostwald, V. Lesser, and S. Abdallah.
        Combinatorial auctions for resource allocation in a distributed sensor
        network. In RTSS ’05 (Real Time Systems Symposium), Washington, DC, USA.


•   Problem: assign radar sensors to weather monitoring tasks

        ‣   Sensors have multiple settings (and can be configured)

        ‣   Joint utility of a bundle is computed with a probabilistic approach
            (i.e. non-additively)

        ‣   A sensor can be shared by multiple tasks


•   This problem is a variant of the classic combinatorial auction:

        •   they modified a pre-existent algorithm.
Similarities and differences
•   Similarities:

    ‣   Their problem can be modeled as a variant of classic combinatorial auctions.

    ‣   Their joint utility is computed using a task dependent joint utility function.

    ‣   They use heuristic/preprocessing to limit the number of possible bundles and
        sensor configurations.


•   Differences:

    ‣   They assume an homogeneous sensor network (only radars) but configurable.

    ‣   Their tasks are not different by nature (only “monitoring tasks”):
        joint utility is easier to compute.

    ‣   The size of the network and the number of simultaneous tasks
        (a few dozens of radar sensors, and ten tasks).

    ‣   The computational time is not the main focus (time to solve it is 10 seconds!).
Learned lessons

•   Applying combinatorial auctions to solve our current model seems reasonable.



•   We need to modify (again!) our model considering configurable sensors and
    resource sharing

    ‣   To solve it we could adopt a similar approach to modify combinatorial auction.



•   Critique to their approach:

    ‣   they should have modified other algorithms or developed new greedy algorithms
        to compare the performances (quality of solution, computational cost).
Thanks for listening!




          Questions?

More Related Content

Similar to Sensor-Task Assignment in Heterogeneous Sensor Networks

Object-Region Video Transformers
Object-Region Video TransformersObject-Region Video Transformers
Object-Region Video TransformersSangwoo Mo
 
Review: You Only Look One-level Feature
Review: You Only Look One-level FeatureReview: You Only Look One-level Feature
Review: You Only Look One-level FeatureDongmin Choi
 
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksA Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksMichele Weigle
 
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...Spark Summit
 
A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationRyo Takahashi
 
PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)Jinwon Lee
 
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...Sangwoo Mo
 
Domain driven design ch1
Domain driven design ch1Domain driven design ch1
Domain driven design ch1HyeonSeok Choi
 
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksPairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksIDES Editor
 
Recurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRURecurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRUananth
 
Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57 Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57 Raj Patel
 
Collaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot studyCollaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot studyDaniele Gianni
 
Scalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and KubernetesScalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and KubernetesLaura Frank Tacho
 
OWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLOWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLizso
 
Design & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptxDesign & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptxJeevaMCSEKIOT
 
Media4Math's Spring 2012 Catalog
Media4Math's Spring 2012 CatalogMedia4Math's Spring 2012 Catalog
Media4Math's Spring 2012 CatalogMedia4math
 

Similar to Sensor-Task Assignment in Heterogeneous Sensor Networks (20)

Object-Region Video Transformers
Object-Region Video TransformersObject-Region Video Transformers
Object-Region Video Transformers
 
Review: You Only Look One-level Feature
Review: You Only Look One-level FeatureReview: You Only Look One-level Feature
Review: You Only Look One-level Feature
 
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksA Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
 
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
 
A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth Estimation
 
PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)
 
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
 
Domain driven design ch1
Domain driven design ch1Domain driven design ch1
Domain driven design ch1
 
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksPairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
 
Recurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRURecurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRU
 
Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57 Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57
 
Collaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot studyCollaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot study
 
Scalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and KubernetesScalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and Kubernetes
 
Are homes smart if they are aware?
Are homes smart if they are aware?Are homes smart if they are aware?
Are homes smart if they are aware?
 
02 analysis
02 analysis02 analysis
02 analysis
 
NPTEL complete.pptx.pptx
NPTEL complete.pptx.pptxNPTEL complete.pptx.pptx
NPTEL complete.pptx.pptx
 
OWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLOWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPL
 
unsplitted slideshare
unsplitted slideshareunsplitted slideshare
unsplitted slideshare
 
Design & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptxDesign & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptx
 
Media4Math's Spring 2012 Catalog
Media4Math's Spring 2012 CatalogMedia4Math's Spring 2012 Catalog
Media4Math's Spring 2012 Catalog
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Sensor-Task Assignment in Heterogeneous Sensor Networks

  • 1. Sensor-Task Assignment in Heterogeneous Sensor Networks Diego Pizzocaro D.Pizzocaro@cs.cf.ac.uk Research Group: KIS Supervisor: Prof. Alun Preece
  • 2. Why sensor-task assignment? • Heterogeneous Sensor Networks (HSN) introduce new resource allocation problems in which sensors must be assigned to the tasks they best help • An already deployed HSN is usually required to support multiple sensing tasks of different nature to be accomplished simultaneously • Tasks might compete for the exclusive usage of the same sensing resource ➡ We need schemes to assign individual sensors to tasks • Research focus: find the right way to model this allocation problem • we defined increasingly detailed models • we developed computationally efficient approaches to solve them
  • 3. Example • Two target identification tasks. (Tasks may have different priorities) • Targets are close in the field. • We only have one video sensor that could identify both. • Problem: Where do we point the video sensor? (i.e. To which task do we assign the sensor?) X Target 2 X Target 1
  • 4. Simple model Sensor-Task Assignment • Tasks vary in priority and have a different demand Sensors for sensing resource capabilities. S1 e11 Tasks e1 T1 (d1, p1) 2 • Each sensor has a different utility for each task, S2 because of: • Geography & distance S3 T2 (d2, p2) • Remaining battery life S4 • Goal: A sensor assignment that maximizes the e = utility of sensor to a task utility that the sensor network can provide d = task utility demand to tasks. p = task priority This problem is NP-Complete and very hard to approximate: We developed many heuristic algorithms to solve it (greedy algs)
  • 5. Non additive utility! • Utilities from multiple sensors do not always combine additively • Example: ‣ Triangulation tasks ‣ We need two audio sensors for each task X X Target 2 Target 2 X X Target 1 Target 1 Task 1: Utility(S1,S2) = 100 Task 1: Utility(S1) = 0
  • 6. More detailed model Sensor-Bundle-Task Assignment • We first want to group sensors into bundles, and then we want to find the best assignment of bundles to tasks. • NP-Complete problem: we will use COMBINATORIAL AUCTION techniques. Sensors Bundles Tasks S1 e11 B1 T1 (p1) S2 e1 2 S3 B2 T2 (p2) S4 e = joint utility of a bundle to a task p = task priority
  • 7. Combinatorial auctions • Combinatorial auction: ‣ It is a silent auction in which bidders can bid on sets of items (instead of single items). ‣ Each bidder provides sets of items and corresponding prices for each set. ‣ The auctioneer chooses the set of bids that maximizes the payment. • The Sensor-Bundle-Task Assignment model can be seen as a combinatorial auction.
  • 8. Related work - overview • Combinatorial auctions have been already applied to sensor-task assignment problems in scenarios where sensor utility does not combine additively: ‣ J. Ostwald, V. Lesser, and S. Abdallah. Combinatorial auctions for resource allocation in a distributed sensor network. In RTSS ’05 (Real Time Systems Symposium), Washington, DC, USA. • Problem: assign radar sensors to weather monitoring tasks ‣ Sensors have multiple settings (and can be configured) ‣ Joint utility of a bundle is computed with a probabilistic approach (i.e. non-additively) ‣ A sensor can be shared by multiple tasks • This problem is a variant of the classic combinatorial auction: • they modified a pre-existent algorithm.
  • 9. Similarities and differences • Similarities: ‣ Their problem can be modeled as a variant of classic combinatorial auctions. ‣ Their joint utility is computed using a task dependent joint utility function. ‣ They use heuristic/preprocessing to limit the number of possible bundles and sensor configurations. • Differences: ‣ They assume an homogeneous sensor network (only radars) but configurable. ‣ Their tasks are not different by nature (only “monitoring tasks”): joint utility is easier to compute. ‣ The size of the network and the number of simultaneous tasks (a few dozens of radar sensors, and ten tasks). ‣ The computational time is not the main focus (time to solve it is 10 seconds!).
  • 10. Learned lessons • Applying combinatorial auctions to solve our current model seems reasonable. • We need to modify (again!) our model considering configurable sensors and resource sharing ‣ To solve it we could adopt a similar approach to modify combinatorial auction. • Critique to their approach: ‣ they should have modified other algorithms or developed new greedy algorithms to compare the performances (quality of solution, computational cost).
  • 11. Thanks for listening! Questions?