Skip to main content
Log in

Sensor information monotonicity in disambiguation protocols

  • Theoretical Paper
  • Published:
Journal of the Operational Research Society

Abstract

Previous work has considered the problem of swiftly traversing a marked traversal-medium where the marks represent probabilities that associated local regions are traversable, further supposing that the traverser is equipped with a dynamic capability to disambiguate these regions en route. In practice, however, the marks are given by a noisy sensor, and are only estimates of the respective probabilities of traversability. In this paper, we investigate the performance of disambiguation protocols that utilize such sensor readings. In particular, we investigate the difference in performance when a disambiguation protocol employs various sensors ranked by their estimation quality. We demonstrate that a superior sensor can yield superior traversal performance—so called Sensor Information Monotonicity. In so doing, we provide to the decision-maker the wherewithal to quantitatively assess the advantage of a superior (and presumably more expensive) sensor in light of the associated improvement in performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5

Similar content being viewed by others

References

  • Ahuja RK, Magnanti TL and Orlin JB (1993). Network flows: Theory, algorithms, and applications . Prentice Hall: Upper Saddle River, NJ.

    Google Scholar 

  • Aksakalli V, Fishkind DE, Priebe CE and Ye X (2008). The CR Disambiguation Protocol, submitted for publication.

  • Andreatta G and Romeo L (1988). Stochastic shortest paths with recourse . Networks 18: 193–204.

    Article  Google Scholar 

  • Baglietto M, Battistelli G, Vitali F and Zoppoli R (2003). Shortest path problems on stochastic graphs: A neuro dynamic programming approach . Proceedings of the 42nd IEEE Conference on Decision and Control pp 6187–6193.

  • Bar-Noy A and Schieber B (1991). The Canadian traveller problem . SODA'91: Proceedings of the Second Annual ACM-SIAM Symposium on Discrete Algorithms pp 261–270.

  • Blei DM and Kaelbling LP (1999). Shortest paths in a dynamic uncertain domain. IJCAI Workshop on Adaptive Spatial Representations of Dynamic Environments.

  • Fishkind DE, Priebe CE, Giles K, Smith LN and Aksakalli V (2007). Disambiguation protocols based on risk simulation . IEEE Trans Syst Man & Cybern Part A 37: 814–823.

    Article  Google Scholar 

  • Olson T, Pang JS and Priebe CE (2002). A likelihood-MPEC approach to target classification . Math Program Ser A 96: 1–31.

    Article  Google Scholar 

  • Papadimitriou CH and Yannakakis M (1991). Shortest paths without a map . Theor Comput Sci 84: 127–150.

    Article  Google Scholar 

  • Piatko CD, Priebe CE, Cowen LJ, Wang IJ and McNamee P (2001). Path planning for mine countermeasures command and control . Proceedings of the SPIE 4394: 836–843.

    Article  Google Scholar 

  • Piatko CD, Diehl CP, McNamee P, Resch C and Wang IJ (2002). Stochastic search and graph techniques for MCM path planning . Proceedings of the SPIE 4742: 583–592.

    Article  Google Scholar 

  • Polychronopoulos GH and Tsitsiklis JN (1996). Stochastic shortest path problems with recourse . Networks 27: 133–143.

    Article  Google Scholar 

  • Priebe CE, Olson TE and Healy DM Jr, (1997). Exploiting stochastic partitions for minefield detection . Proceedings of the SPIE 3079: 508–518.

    Article  Google Scholar 

  • Priebe CE, Pang JS and Olson T (1999). Optimizing sensor fusion for classification performance. Proceedings of the CISST '99 International Conference, Las Vegas, Nevada, June 1999, pp 397–403.

  • Priebe CE, Naiman DQ and Cope L (2001). Importance sampling for spatial scan analysis: Computing scan statistic p-values for marked point processes . Comput Stat Data An 35(4): 475–485.

    Article  Google Scholar 

  • Priebe CE, Fishkind DE, Abrams L and Piatko CD (2005). Random disambiguation paths for traversing a mapped hazard field. Nav Res Log 52: 285–292.

    Article  Google Scholar 

  • Provan JS (2003). A polynomial-time algorithm to find shortest paths with recourse . Networks 42: 115–125.

    Article  Google Scholar 

  • Smith DL (1995). Detection technologies for mines and minelike targets. Proceedings of the SPIE: Detection Technologies for Mines and Minelike Targets, Orlando, Florida, April 1995, Vol. 2496, pp 404–408.

  • Washburn A (1999). Mine warfare . In: Wagner DH, Mylander WC and Sanders TJ (eds). Chapter 10 of Naval Operations Analysis. Naval Institute Press: Annapolis, MD.

    Google Scholar 

  • Witherspoon NH, Holloway JH, Davis KS, Miller RW and Dubey AC (1995). The Coastal Battlefield Reconnaissance and Analysis (COBRA) Program for Minefield Detection. Proceedings of the SPIE: Detection Technologies for Mines and Minelike Targets, Orlando, Florida, April 1995, Vol. 2496, pp 500–508.

Download references

Acknowledgements

XY, DEF, and CEP were supported in part by Office of Naval Research grant N000140610013. LA was supported in part by The Acheson J Duncan Fund for the Advancement of Research in Statistics grant 08–17. We thank the Johns Hopkins University Center for Imaging Science for providing substantial computing resources.

Author information

Authors and Affiliations

Authors

Appendix

Appendix

Stochastic order and the ordering of sensors by sensitivity

For any random variable Θ, let F Θ denote the cumulative distribution function, and let F Θ −1 denote the quantile function; of course, if F Θ is injective then F Θ −1 is the inverse function of F Θ, otherwise, for all u∈(0,1), recall that F Θ −1(u)≔inf{w∈ℝ:F Θ(w)⩾u}. (So, for example, F −1(0.25), F −1(0.5), and F −1(0.75) are the first quartile, median, and third quartile of the distribution, that is, the probability of being less than or equal to these numbers is 0.25, 0.5, and 0.75, respectively.) The random variable Θ1 is said to be stochastically greater than or equal to the random variable Θ2, denoted Θ1 sto Θ2, if for all w∈ℝ; straightforward computation confirms that this condition is equivalent to the condition that for all u∈(0,1).

Thus, in the notation from this paper, when we say that sensor (F T ,F N ) is at least as sensitive as sensor (F T,F N) precisely when F T sto F T and F N sto F N , what is meant is that, conditioning on an edge being traversable, each quantile for the marks generated by the at-least-as-sensitive-sensor (random vector ) is greater than or equal to that same quantile for the marks generated by the other sensor and, conditioning on an edge not being traversable, each quantile for the marks generated by the at-least-as-sensitive-sensor is less than or equal to that same quantile for the marks generated by the other sensor. So, very informally, if an edge is actually traversable then a more sensitive sensor can be more optimistic about the edge's traversability than the less sensitive sensor, and if an edge is actually nontraversable then the more sensitive sensor can be more pessimistic about the edge's traversability than the less sensitive sensor.

Also note that Θ1 sto Θ2 if and only if it holds that, for all nondecreasing real functions g, E[g1)]⩾E[g2)]. Thus, in the notation of this paper, if a protocol is strongly monotone then it is weakly monotone, but the converse does not necessarily hold.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ye, X., Fishkind, D., Abrams, L. et al. Sensor information monotonicity in disambiguation protocols. J Oper Res Soc 62, 142–151 (2011). https://doi.org/10.1057/jors.2009.152

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/jors.2009.152

Keywords

Navigation