How Best to Handle a Dicey Situation

We introduce the {Destructive Object Handling} (DOH) problem, which models aspects of many real-world allocation problems, such as shipping explosive munitions, scheduling processes in a cluster with fragile nodes, re-using passwords across multiple websites, and quarantining patients during a disease outbreak. In these problems, objects must be assigned to handlers, but each object has a probability of destroying itself and all the other objects allocated to the same handler. The goal is to maximize the expected value of the objects handled successfully. We show that finding the optimal allocation is $\mathsf{NP}$-$\mathsf{complete}$, even if all the handlers are identical. We present an FPTAS when the number of handlers is constant. We note in passing that the same technique also yields a first FPTAS for the weapons-target allocation problem \cite{manne_wta} with a constant number of targets. We study the structure of DOH problems and find that they have a sort of phase transition -- in some instances it is better to spread risk evenly among the handlers, in others, one handler should be used as a ``sacrificial lamb''. We show that the problem is solvable in polynomial time if the destruction probabilities depend only on the handler to which an object is assigned; if all the handlers are identical and the objects all have the same value; or if each handler can be assigned at most one object. Finally, we empirically evaluate several heuristics based on a combination of greedy and genetic algorithms. The proposed heuristics return fairly high quality solutions to very large problem instances (upto 250 objects and 100 handlers) in tens of seconds.

[1]  J. Munkres ALGORITHMS FOR THE ASSIGNMENT AND TRANSIORTATION tROBLEMS* , 1957 .

[2]  Thomas Bäck,et al.  Evolutionary algorithms in theory and practice - evolution strategies, evolutionary programming, genetic algorithms , 1996 .

[3]  Claude Castelluccia,et al.  How Unique and Traceable Are Usernames? , 2011, PETS.

[4]  Andrew V. Goldberg,et al.  Finding minimum-cost circulations by canceling negative cycles , 1989, JACM.

[5]  Vedat Verter,et al.  Designing emergency response networks for hazardous materials transportation , 2007, Comput. Oper. Res..

[6]  Erhan Erkut,et al.  Solving the hazmat transport network design problem , 2008, Comput. Oper. Res..

[7]  L. Kantorovich On the Translocation of Masses , 2006 .

[8]  Cormac Herley,et al.  A large-scale study of web password habits , 2007, WWW '07.

[9]  G. Pólya,et al.  Inequalities (Cambridge Mathematical Library) , 1934 .

[10]  Christos D. Tarantilis,et al.  Using the vehicle routing problem for the transportation of hazardous materials , 2001, Oper. Res..

[11]  Alexander Schrijver,et al.  Combinatorial optimization. Polyhedra and efficiency. , 2003 .

[12]  Gerhard J. Woeginger,et al.  When does a dynamic programming formulation guarantee the existence of an FPTAS? , 1999, SODA '99.

[13]  David S. Johnson,et al.  Complexity Results for Multiprocessor Scheduling under Resource Constraints , 1975, SIAM J. Comput..

[14]  James B. Orlin,et al.  A polynomial time primal network simplex algorithm for minimum cost flows , 1996, SODA '96.

[15]  R. Jackson Inequalities , 2007, Algebra for Parents.

[16]  Vedat Verter,et al.  Modeling of Transport Risk for Hazardous Materials , 1998, Oper. Res..

[17]  S. E. Kolitz Analysis of a maximum marginal return assignment algorithm , 1988, Proceedings of the 27th IEEE Conference on Decision and Control.

[18]  Andrew V. Goldberg,et al.  Finding Minimum-Cost Circulations by Successive Approximation , 1990, Math. Oper. Res..

[19]  A. S. Manne A Target-Assignment Problem , 1958 .