skip to main content
10.1145/1363686.1363727acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Modeling adversary scheduling with QCSP+

Published:16 March 2008Publication History

ABSTRACT

We consider cumulative scheduling problems in the presence of an adversary. In such setting the scheduler tries to manage the available resources in so as to meet the scheduling deadline, while the adversary is allowed to change some parameters---like the resource consumption of some tasks---up to a certain limit. We ask whether a robust schedule exists, i.e., one that is guaranteed to work whatever (malicious) actions the opponent may take. We propose to model this family of decision problems using a variant of Quantified Constraint Satisfaction Problems called QCSP+, and to solve them by using the solver QeCode.

References

  1. A. Aggoun and N. Beldiceanu. Extending CHIP in Order to Solve Complex Scheduling and Placement Problems. Mathematical and Computer Modelling, 17(7):57--73, April 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Ansótegui, C. P. Gomes, and B. Selman. The Achilles' Heel of QBF. In Manuela M. Veloso and Subbarao Kambhampati, editors, AAAI, pages 275--281. AAAI Press AAAI Press / The MIT Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Baptiste, C. Le Pape, and W. Nuijten. Constraint-Based Scheduling. Operations Research and Management Science. Kluwer Academic Publishers, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. F. Bard. Practical Bilevel Optimization: Algorithms and Applications, volume 30 of Nonconvex Optimization and Its Applications. Kluwer Academic Publishers, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Beldiceanu and M. Carlsson. A New Multi-resource Cumulatives Constraint with Negative Heights. In Pascal Van Hentenryck, editor, CP, volume 2470 of Lecture Notes in Computer Science, pages 63--79. Springer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Benedetti, A. Lallouet, and J. Vautard. QCSP Made Practical by Virtue of Restricted Quantification. In Manuela Veloso, editor, International Joint Conference on Artificial Intelligence, pages 38--43, Hyderabad, India, January 6--12 2007. AAAI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Bidot, T. Vidal, P. Laborie, and J. C. Beck. A General Framework for Scheduling in a Stochastic Environment. In Manuela M. Veloso, editor, IJCAI, pages 56--61, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. Bordeaux and E. Monfroy. Beyond NP: Arc-Consistency for Quantified Constraints. In P. Van Hentenryck, editor, Principles and Practice of Constraint Programming, volume 2470 of LNCS, pages 371--386, Ithaca, NY, USA, 2002. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G. G. Brown, W. M. Carlyle, J. Royset, and R. K. Wood. On the Complexity of Delaying an Adversary's Project. In The Next Wave in Computing, Optimization and Decision, volume 29 of Operations Research/Computer Science Interfaces Series, chapter 1. Springer, 2005.Google ScholarGoogle Scholar
  10. M. Ghallab, D. Nau, and P. Traverso. Automated Planning. Morgan Kaufmann, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Graham, E. Lawler, E. Lenstra, and A. Rinnooy Kan. Optimization and Approximation in Deterministic Sequencing and Scheduling: a Survey. Annals of Discrete Mathematics, 5:287--326, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  12. R. Kolisch, C. Schwindt, and A. Sprecher. Benchmark Instances for Project Scheduling Problems, 1998.Google ScholarGoogle Scholar
  13. S. F. Smith N. Policella, A. Oddi and A. Cesta. Generating Robust Partial Order Schedules. In M. Wallace, editor, Principles and Practice of Constraint Programming, volume 3258, pages 496--511. Springer, 2004.Google ScholarGoogle Scholar
  14. P. Nightingale. Consistency and the Quantified Constraint Satisfaction Problem. PhD thesis, University of St Andrews, 2007.Google ScholarGoogle Scholar
  15. C. H. Papadimitriou. Computational Complexity. Addison Wesley, 1994.Google ScholarGoogle Scholar
  16. N. Policella. Scheduling with Uncertainty: A Proactive Approach Using Partial Order Schedules. PhD thesis, University of Rome "La Sapienza", March 2005.Google ScholarGoogle Scholar
  17. C. Schulte and G. Tack. Views and Iterators for Generic Constraint Implementations. In Peter van Beek, editor, CP, volume 3709 of Lecture Notes in Computer Science, pages 817--821. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. W. Wu, K. N. Brown, and J. C. Beck. Scheduling with Uncertain Durations: Generating Beta-Robust Schedules using Constraint Programming. In ICAPS 2006 Workshop on Constraint Satisfaction Techniques for Planning and Scheduling Problems, 2006.Google ScholarGoogle Scholar

Index Terms

  1. Modeling adversary scheduling with QCSP+

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Conferences
                      SAC '08: Proceedings of the 2008 ACM symposium on Applied computing
                      March 2008
                      2586 pages
                      ISBN:9781595937537
                      DOI:10.1145/1363686

                      Copyright © 2008 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 16 March 2008

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • research-article

                      Acceptance Rates

                      Overall Acceptance Rate1,650of6,669submissions,25%

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader