Abstract
Previous work has considered the problem of swiftly traversing a marked traversal-medium where the marks represent probabilities that associated local regions are traversable, further supposing that the traverser is equipped with a dynamic capability to disambiguate these regions en route. In practice, however, the marks are given by a noisy sensor, and are only estimates of the respective probabilities of traversability. In this paper, we investigate the performance of disambiguation protocols that utilize such sensor readings. In particular, we investigate the difference in performance when a disambiguation protocol employs various sensors ranked by their estimation quality. We demonstrate that a superior sensor can yield superior traversal performance—so called Sensor Information Monotonicity. In so doing, we provide to the decision-maker the wherewithal to quantitatively assess the advantage of a superior (and presumably more expensive) sensor in light of the associated improvement in performance.
Similar content being viewed by others
References
Ahuja RK, Magnanti TL and Orlin JB (1993). Network flows: Theory, algorithms, and applications . Prentice Hall: Upper Saddle River, NJ.
Aksakalli V, Fishkind DE, Priebe CE and Ye X (2008). The CR Disambiguation Protocol, submitted for publication.
Andreatta G and Romeo L (1988). Stochastic shortest paths with recourse . Networks 18: 193–204.
Baglietto M, Battistelli G, Vitali F and Zoppoli R (2003). Shortest path problems on stochastic graphs: A neuro dynamic programming approach . Proceedings of the 42nd IEEE Conference on Decision and Control pp 6187–6193.
Bar-Noy A and Schieber B (1991). The Canadian traveller problem . SODA'91: Proceedings of the Second Annual ACM-SIAM Symposium on Discrete Algorithms pp 261–270.
Blei DM and Kaelbling LP (1999). Shortest paths in a dynamic uncertain domain. IJCAI Workshop on Adaptive Spatial Representations of Dynamic Environments.
Fishkind DE, Priebe CE, Giles K, Smith LN and Aksakalli V (2007). Disambiguation protocols based on risk simulation . IEEE Trans Syst Man & Cybern Part A 37: 814–823.
Olson T, Pang JS and Priebe CE (2002). A likelihood-MPEC approach to target classification . Math Program Ser A 96: 1–31.
Papadimitriou CH and Yannakakis M (1991). Shortest paths without a map . Theor Comput Sci 84: 127–150.
Piatko CD, Priebe CE, Cowen LJ, Wang IJ and McNamee P (2001). Path planning for mine countermeasures command and control . Proceedings of the SPIE 4394: 836–843.
Piatko CD, Diehl CP, McNamee P, Resch C and Wang IJ (2002). Stochastic search and graph techniques for MCM path planning . Proceedings of the SPIE 4742: 583–592.
Polychronopoulos GH and Tsitsiklis JN (1996). Stochastic shortest path problems with recourse . Networks 27: 133–143.
Priebe CE, Olson TE and Healy DM Jr, (1997). Exploiting stochastic partitions for minefield detection . Proceedings of the SPIE 3079: 508–518.
Priebe CE, Pang JS and Olson T (1999). Optimizing sensor fusion for classification performance. Proceedings of the CISST '99 International Conference, Las Vegas, Nevada, June 1999, pp 397–403.
Priebe CE, Naiman DQ and Cope L (2001). Importance sampling for spatial scan analysis: Computing scan statistic p-values for marked point processes . Comput Stat Data An 35(4): 475–485.
Priebe CE, Fishkind DE, Abrams L and Piatko CD (2005). Random disambiguation paths for traversing a mapped hazard field. Nav Res Log 52: 285–292.
Provan JS (2003). A polynomial-time algorithm to find shortest paths with recourse . Networks 42: 115–125.
Smith DL (1995). Detection technologies for mines and minelike targets. Proceedings of the SPIE: Detection Technologies for Mines and Minelike Targets, Orlando, Florida, April 1995, Vol. 2496, pp 404–408.
Washburn A (1999). Mine warfare . In: Wagner DH, Mylander WC and Sanders TJ (eds). Chapter 10 of Naval Operations Analysis. Naval Institute Press: Annapolis, MD.
Witherspoon NH, Holloway JH, Davis KS, Miller RW and Dubey AC (1995). The Coastal Battlefield Reconnaissance and Analysis (COBRA) Program for Minefield Detection. Proceedings of the SPIE: Detection Technologies for Mines and Minelike Targets, Orlando, Florida, April 1995, Vol. 2496, pp 500–508.
Acknowledgements
XY, DEF, and CEP were supported in part by Office of Naval Research grant N000140610013. LA was supported in part by The Acheson J Duncan Fund for the Advancement of Research in Statistics grant 08–17. We thank the Johns Hopkins University Center for Imaging Science for providing substantial computing resources.
Author information
Authors and Affiliations
Appendix
Appendix
Stochastic order and the ordering of sensors by sensitivity
For any random variable Θ, let F Θ denote the cumulative distribution function, and let F Θ −1 denote the quantile function; of course, if F Θ is injective then F Θ −1 is the inverse function of F Θ, otherwise, for all u∈(0,1), recall that F Θ −1(u)≔inf{w∈ℝ:F Θ(w)⩾u}. (So, for example, F −1(0.25), F −1(0.5), and F −1(0.75) are the first quartile, median, and third quartile of the distribution, that is, the probability of being less than or equal to these numbers is 0.25, 0.5, and 0.75, respectively.) The random variable Θ1 is said to be stochastically greater than or equal to the random variable Θ2, denoted Θ1⩾ sto Θ2, if for all w∈ℝ; straightforward computation confirms that this condition is equivalent to the condition that for all u∈(0,1).
Thus, in the notation from this paper, when we say that sensor (F T ,F N ) is at least as sensitive as sensor (F T′,F N′) precisely when F T ⩾ sto F T′ and F N′⩾ sto F N , what is meant is that, conditioning on an edge being traversable, each quantile for the marks generated by the at-least-as-sensitive-sensor (random vector ) is greater than or equal to that same quantile for the marks generated by the other sensor and, conditioning on an edge not being traversable, each quantile for the marks generated by the at-least-as-sensitive-sensor is less than or equal to that same quantile for the marks generated by the other sensor. So, very informally, if an edge is actually traversable then a more sensitive sensor can be more optimistic about the edge's traversability than the less sensitive sensor, and if an edge is actually nontraversable then the more sensitive sensor can be more pessimistic about the edge's traversability than the less sensitive sensor.
Also note that Θ1⩾ sto Θ2 if and only if it holds that, for all nondecreasing real functions g, E[g(Θ1)]⩾E[g(Θ2)]. Thus, in the notation of this paper, if a protocol is strongly monotone then it is weakly monotone, but the converse does not necessarily hold.
Rights and permissions
About this article
Cite this article
Ye, X., Fishkind, D., Abrams, L. et al. Sensor information monotonicity in disambiguation protocols. J Oper Res Soc 62, 142–151 (2011). https://doi.org/10.1057/jors.2009.152
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1057/jors.2009.152