SlideShare a Scribd company logo
1 of 11
Download to read offline
Sensor-Task Assignment
         in Heterogeneous
          Sensor Networks
                      Diego Pizzocaro
                      D.Pizzocaro@cs.cf.ac.uk




Research Group: KIS                      Supervisor: Prof. Alun Preece
Why sensor-task assignment?
•   Heterogeneous Sensor Networks (HSN) introduce new resource allocation
    problems in which sensors must be assigned to the tasks they best help


•   An already deployed HSN is usually required to support multiple sensing
    tasks of different nature to be accomplished simultaneously


•   Tasks might compete for the exclusive usage of the same sensing resource

          ➡   We need schemes to assign individual sensors to tasks


•   Research focus: find the right way to model this allocation problem

      •   we defined increasingly detailed models

      •   we developed computationally efficient approaches to solve them
Example
•   Two target identification tasks.
    (Tasks may have different priorities)

•   Targets are close in the field.

•   We only have one video sensor that could identify both.

•   Problem: Where do we point the video sensor?
    (i.e. To which task do we assign the sensor?)


                                                      X
                                                    Target 2




                  X
                Target 1
Simple model
                        Sensor-Task Assignment

•   Tasks vary in priority and have a different demand   Sensors

    for sensing resource capabilities.                     S1
                                                                          e11
                                                                                     Tasks


                                                                    e1                 T1    (d1, p1)
                                                                      2




•   Each sensor has a different utility for each task,     S2

    because of:

      •   Geography & distance                             S3
                                                                                       T2    (d2, p2)



      •   Remaining battery life
                                                           S4



•   Goal: A sensor assignment that maximizes the
                                                           e = utility of sensor to a task
    utility that the sensor network can provide               d = task utility demand
    to tasks.                                                     p = task priority




             This problem is NP-Complete and very hard to approximate:
          We developed many heuristic algorithms to solve it (greedy algs)
Non additive utility!
•    Utilities from multiple sensors do not always combine additively

•    Example:

        ‣   Triangulation tasks

        ‣   We need two audio sensors for each task


                                   X                                        X
                              Target 2                                    Target 2




    X                                       X
Target 1                                  Target 1



    Task 1: Utility(S1,S2) = 100                Task 1: Utility(S1) = 0
More detailed model
               Sensor-Bundle-Task Assignment

•   We first want to group sensors into bundles, and then we want to find the
    best assignment of bundles to tasks.

•   NP-Complete problem: we will use COMBINATORIAL AUCTION techniques.


                  Sensors
                                           Bundles                Tasks

                    S1
                                                        e11
                                              B1                      T1   (p1)

                    S2
                                                      e1
                                                        2




                    S3

                                              B2                      T2   (p2)

                    S4


                            e = joint utility of a bundle to a task
                                       p = task priority
Combinatorial auctions



•   Combinatorial auction:

    ‣   It is a silent auction in which bidders can bid on sets of items
        (instead of single items).

    ‣   Each bidder provides sets of items and corresponding prices for each set.

    ‣   The auctioneer chooses the set of bids that maximizes the payment.

•   The Sensor-Bundle-Task Assignment model can be seen as a combinatorial auction.
Related work - overview
•   Combinatorial auctions have been already applied to sensor-task assignment
    problems in scenarios where sensor utility does not combine additively:

    ‣   J. Ostwald, V. Lesser, and S. Abdallah.
        Combinatorial auctions for resource allocation in a distributed sensor
        network. In RTSS ’05 (Real Time Systems Symposium), Washington, DC, USA.


•   Problem: assign radar sensors to weather monitoring tasks

        ‣   Sensors have multiple settings (and can be configured)

        ‣   Joint utility of a bundle is computed with a probabilistic approach
            (i.e. non-additively)

        ‣   A sensor can be shared by multiple tasks


•   This problem is a variant of the classic combinatorial auction:

        •   they modified a pre-existent algorithm.
Similarities and differences
•   Similarities:

    ‣   Their problem can be modeled as a variant of classic combinatorial auctions.

    ‣   Their joint utility is computed using a task dependent joint utility function.

    ‣   They use heuristic/preprocessing to limit the number of possible bundles and
        sensor configurations.


•   Differences:

    ‣   They assume an homogeneous sensor network (only radars) but configurable.

    ‣   Their tasks are not different by nature (only “monitoring tasks”):
        joint utility is easier to compute.

    ‣   The size of the network and the number of simultaneous tasks
        (a few dozens of radar sensors, and ten tasks).

    ‣   The computational time is not the main focus (time to solve it is 10 seconds!).
Learned lessons

•   Applying combinatorial auctions to solve our current model seems reasonable.



•   We need to modify (again!) our model considering configurable sensors and
    resource sharing

    ‣   To solve it we could adopt a similar approach to modify combinatorial auction.



•   Critique to their approach:

    ‣   they should have modified other algorithms or developed new greedy algorithms
        to compare the performances (quality of solution, computational cost).
Thanks for listening!




          Questions?

More Related Content

Similar to Sensor-Task Assignment with Combinatorial Auctions

Object-Region Video Transformers
Object-Region Video TransformersObject-Region Video Transformers
Object-Region Video TransformersSangwoo Mo
 
Review: You Only Look One-level Feature
Review: You Only Look One-level FeatureReview: You Only Look One-level Feature
Review: You Only Look One-level FeatureDongmin Choi
 
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksA Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksMichele Weigle
 
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...Spark Summit
 
A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationRyo Takahashi
 
PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)Jinwon Lee
 
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...Sangwoo Mo
 
Domain driven design ch1
Domain driven design ch1Domain driven design ch1
Domain driven design ch1HyeonSeok Choi
 
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksPairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksIDES Editor
 
Recurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRURecurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRUananth
 
Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57 Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57 Raj Patel
 
Collaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot studyCollaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot studyDaniele Gianni
 
Scalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and KubernetesScalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and KubernetesLaura Frank Tacho
 
OWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLOWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLizso
 
Design & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptxDesign & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptxJeevaMCSEKIOT
 
Media4Math's Spring 2012 Catalog
Media4Math's Spring 2012 CatalogMedia4Math's Spring 2012 Catalog
Media4Math's Spring 2012 CatalogMedia4math
 

Similar to Sensor-Task Assignment with Combinatorial Auctions (20)

Object-Region Video Transformers
Object-Region Video TransformersObject-Region Video Transformers
Object-Region Video Transformers
 
Review: You Only Look One-level Feature
Review: You Only Look One-level FeatureReview: You Only Look One-level Feature
Review: You Only Look One-level Feature
 
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor NetworksA Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
A Virtual Infrastructure for Mitigating Typical Challenges in Sensor Networks
 
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
A More Scaleable Way of Making Recommendations with MLlib-(Xiangrui Meng, Dat...
 
A Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth EstimationA Beginner's Guide to Monocular Depth Estimation
A Beginner's Guide to Monocular Depth Estimation
 
PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)PR-284: End-to-End Object Detection with Transformers(DETR)
PR-284: End-to-End Object Detection with Transformers(DETR)
 
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
 
Domain driven design ch1
Domain driven design ch1Domain driven design ch1
Domain driven design ch1
 
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor NetworksPairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
 
Recurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRURecurrent Neural Networks, LSTM and GRU
Recurrent Neural Networks, LSTM and GRU
 
Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57 Understanding Large Social Networks | IRE Major Project | Team 57
Understanding Large Social Networks | IRE Major Project | Team 57
 
Collaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot studyCollaborative modeling and co simulation with destecs - a pilot study
Collaborative modeling and co simulation with destecs - a pilot study
 
Scalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and KubernetesScalable and Available Services with Docker and Kubernetes
Scalable and Available Services with Docker and Kubernetes
 
Are homes smart if they are aware?
Are homes smart if they are aware?Are homes smart if they are aware?
Are homes smart if they are aware?
 
02 analysis
02 analysis02 analysis
02 analysis
 
NPTEL complete.pptx.pptx
NPTEL complete.pptx.pptxNPTEL complete.pptx.pptx
NPTEL complete.pptx.pptx
 
OWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPLOWL2+SWRL to EMF+IQPL
OWL2+SWRL to EMF+IQPL
 
unsplitted slideshare
unsplitted slideshareunsplitted slideshare
unsplitted slideshare
 
Design & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptxDesign & Analysis of Algorithm course .pptx
Design & Analysis of Algorithm course .pptx
 
Media4Math's Spring 2012 Catalog
Media4Math's Spring 2012 CatalogMedia4Math's Spring 2012 Catalog
Media4Math's Spring 2012 Catalog
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Sensor-Task Assignment with Combinatorial Auctions

  • 1. Sensor-Task Assignment in Heterogeneous Sensor Networks Diego Pizzocaro D.Pizzocaro@cs.cf.ac.uk Research Group: KIS Supervisor: Prof. Alun Preece
  • 2. Why sensor-task assignment? • Heterogeneous Sensor Networks (HSN) introduce new resource allocation problems in which sensors must be assigned to the tasks they best help • An already deployed HSN is usually required to support multiple sensing tasks of different nature to be accomplished simultaneously • Tasks might compete for the exclusive usage of the same sensing resource ➡ We need schemes to assign individual sensors to tasks • Research focus: find the right way to model this allocation problem • we defined increasingly detailed models • we developed computationally efficient approaches to solve them
  • 3. Example • Two target identification tasks. (Tasks may have different priorities) • Targets are close in the field. • We only have one video sensor that could identify both. • Problem: Where do we point the video sensor? (i.e. To which task do we assign the sensor?) X Target 2 X Target 1
  • 4. Simple model Sensor-Task Assignment • Tasks vary in priority and have a different demand Sensors for sensing resource capabilities. S1 e11 Tasks e1 T1 (d1, p1) 2 • Each sensor has a different utility for each task, S2 because of: • Geography & distance S3 T2 (d2, p2) • Remaining battery life S4 • Goal: A sensor assignment that maximizes the e = utility of sensor to a task utility that the sensor network can provide d = task utility demand to tasks. p = task priority This problem is NP-Complete and very hard to approximate: We developed many heuristic algorithms to solve it (greedy algs)
  • 5. Non additive utility! • Utilities from multiple sensors do not always combine additively • Example: ‣ Triangulation tasks ‣ We need two audio sensors for each task X X Target 2 Target 2 X X Target 1 Target 1 Task 1: Utility(S1,S2) = 100 Task 1: Utility(S1) = 0
  • 6. More detailed model Sensor-Bundle-Task Assignment • We first want to group sensors into bundles, and then we want to find the best assignment of bundles to tasks. • NP-Complete problem: we will use COMBINATORIAL AUCTION techniques. Sensors Bundles Tasks S1 e11 B1 T1 (p1) S2 e1 2 S3 B2 T2 (p2) S4 e = joint utility of a bundle to a task p = task priority
  • 7. Combinatorial auctions • Combinatorial auction: ‣ It is a silent auction in which bidders can bid on sets of items (instead of single items). ‣ Each bidder provides sets of items and corresponding prices for each set. ‣ The auctioneer chooses the set of bids that maximizes the payment. • The Sensor-Bundle-Task Assignment model can be seen as a combinatorial auction.
  • 8. Related work - overview • Combinatorial auctions have been already applied to sensor-task assignment problems in scenarios where sensor utility does not combine additively: ‣ J. Ostwald, V. Lesser, and S. Abdallah. Combinatorial auctions for resource allocation in a distributed sensor network. In RTSS ’05 (Real Time Systems Symposium), Washington, DC, USA. • Problem: assign radar sensors to weather monitoring tasks ‣ Sensors have multiple settings (and can be configured) ‣ Joint utility of a bundle is computed with a probabilistic approach (i.e. non-additively) ‣ A sensor can be shared by multiple tasks • This problem is a variant of the classic combinatorial auction: • they modified a pre-existent algorithm.
  • 9. Similarities and differences • Similarities: ‣ Their problem can be modeled as a variant of classic combinatorial auctions. ‣ Their joint utility is computed using a task dependent joint utility function. ‣ They use heuristic/preprocessing to limit the number of possible bundles and sensor configurations. • Differences: ‣ They assume an homogeneous sensor network (only radars) but configurable. ‣ Their tasks are not different by nature (only “monitoring tasks”): joint utility is easier to compute. ‣ The size of the network and the number of simultaneous tasks (a few dozens of radar sensors, and ten tasks). ‣ The computational time is not the main focus (time to solve it is 10 seconds!).
  • 10. Learned lessons • Applying combinatorial auctions to solve our current model seems reasonable. • We need to modify (again!) our model considering configurable sensors and resource sharing ‣ To solve it we could adopt a similar approach to modify combinatorial auction. • Critique to their approach: ‣ they should have modified other algorithms or developed new greedy algorithms to compare the performances (quality of solution, computational cost).
  • 11. Thanks for listening! Questions?