Efficient Resource Allocation for Protecting Coral Reef Ecosystems

Coral reefs are valuable and fragile ecosystems which are under threat from human activities like coral mining. Many countries have built marine protected areas (MPAs) and protect their ecosystems through boat patrol. However, it remains a significant challenge to efficiently patrol the MPAs given the limited patrol resources of the protection agency and potential destructors' strategic actions. In this paper, we view the problem of efficiently patrolling for protecting coral reef ecosystems from a game-theoretic perspective and propose 1) a new Stackelberg game model to formulate the problem of protecting MPAs, 2) two algorithms to compute the efficient protection agency's strategies: CLP in which the protection agency's strategies are compactly represented as fractional flows in a network, and CDOG which combines the techniques of compactly representing defender strategies and incrementally generating strategies. Experimental results show that our approach leads to significantly better solution quality than that of previous works.

[1]  H. Possingham,et al.  Hitting the target and missing the point: target‐based conservation planning in context , 2009 .

[2]  L. Goddard,et al.  Operations Research (OR) , 2007 .

[3]  Bo An,et al.  Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.

[4]  Hugh P. Possingham,et al.  Marxan with Zones: Software for optimal conservation based land- and sea-use zoning , 2009, Environ. Model. Softw..

[5]  Bo An,et al.  PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.

[6]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[7]  Vincent Conitzer,et al.  Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.

[8]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[9]  D. Bellwood,et al.  Confronting the coral reef crisis , 2004, Nature.

[10]  Zhen Wang,et al.  Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.

[11]  Milind Tambe,et al.  Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.

[12]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[13]  Vincent Conitzer,et al.  Security scheduling for real-world networks , 2013, AAMAS.

[14]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[15]  K. Bjorndal,et al.  Global Trajectories of the Long-Term Decline of Coral Reef Ecosystems , 2003, Science.

[16]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[17]  Bo An,et al.  Security Games with Protection Externalities , 2015, AAAI.

[18]  Edith Elkind,et al.  Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS) , 2015 .

[19]  Jose M. Such,et al.  International Joint Conference on Artificial Intelligence (IJCAI) , 2016 .

[20]  Bo An,et al.  Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.

[21]  Branislav Bosanský,et al.  Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies , 2015, AAAI.

[22]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[23]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[24]  Bo An,et al.  Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.

[25]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[26]  Avrim Blum,et al.  Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.