Fast Detection of Unsolvable Planning Instances Using Local Consistency

There has been a tremendous advance in domain-independent planning over the past decades, and planners have become increasingly efficient at finding plans. However, this has not been paired by any corresponding improvement in detecting unsolvable instances. Such instances are obviously important but largely neglected in planning. In other areas, such as constraint solving and model checking, much effort has been spent on devising methods for detecting unsolvability. We introduce a method for detecting unsolvable planning instances that is loosely based on consistency checking in constraint programming. Our method balances completeness against efficiency through a parameter k: the algorithm identifies more unsolvable instances but takes more time for increasing values of k. We present empirical data for our algorithm and some standard planners on a number of unsolvable instances, demonstrating that our method can be very efficient where the planners fail to detect unsolvability within reasonable resource bounds. We observe that planners based on the h^m heuristic or pattern databases are better than other planners for detecting unsolvability. This is not a coincidence since there are similarities (but also significant differences) between our algorithm and these two heuristic methods.

[1]  Patrik Haslum,et al.  Domain-Independent Construction of Pattern Database Heuristics for Cost-Optimal Planning , 2007, AAAI.

[2]  Christer Bäckström,et al.  Algorithms and Limits for Compact Plan Representations , 2012, J. Artif. Intell. Res..

[3]  Bernhard Nebel,et al.  The FF Planning System: Fast Plan Generation Through Heuristic Search , 2011, J. Artif. Intell. Res..

[4]  Patrik Haslum,et al.  Admissible Heuristics for Optimal Planning , 2000, AIPS.

[5]  David E. Smith Choosing Objectives in Over-Subscription Planning , 2004, ICAPS.

[6]  R. Goldman,et al.  Using Classical Planners for Plan Verification and Counterexample Generation , 2012 .

[7]  Stefan Edelkamp,et al.  Summary of Dagstuhl Seminar 06172 on Directed Model Checking , 2007 .

[8]  Michael R. Fellows,et al.  Parameterized Complexity , 1998 .

[9]  Malte Helmert,et al.  The Fast Downward Planning System , 2006, J. Artif. Intell. Res..

[10]  Stefan Edelkamp,et al.  06172 Executive Summary -- Directed Model Checking , 2006, Directed Model Checking.

[11]  David E. Smith Choosing Objectives in OverSubscription Planning , 2004 .

[12]  Malte Helmert,et al.  New Complexity Results for Classical Planning Benchmarks , 2006, ICAPS.

[13]  Endre Szemerédi,et al.  Many hard examples for resolution , 1988, JACM.

[14]  Mark S. Boddy,et al.  Course of Action Generation for Cyber Security Using Classical Planning , 2005, ICAPS.

[15]  Jonathan Schaeffer,et al.  Pattern Databases , 1998, Comput. Intell..

[16]  Carmel Domshlak,et al.  Landmarks, Critical Paths and Abstractions: What's the Difference Anyway? , 2009, ICAPS.

[17]  Jörg Flum,et al.  Parameterized Complexity Theory (Texts in Theoretical Computer Science. An EATCS Series) , 2006 .

[18]  Patrik Haslum,et al.  New Admissible Heuristics for Domain-Independent Planning , 2005, AAAI.

[19]  Mark S. Boddy,et al.  Automated Vulnerability Analysis Using AI Planning , 2005, AAAI Spring Symposium: AI Technologies for Homeland Security.

[20]  Malte Helmert,et al.  A Planning Heuristic Based on Causal Graph Analysis , 2004, ICAPS.

[21]  Jendrik Seipp,et al.  Counterexample-Guided Cartesian Abstraction Refinement , 2013, ICAPS.

[22]  Carmel Domshlak,et al.  Implicit Abstraction Heuristics , 2010, J. Artif. Intell. Res..

[23]  Olivier Buffet,et al.  POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing , 2012, AAAI.

[24]  Jörg Flum,et al.  Parameterized Complexity Theory , 2006, Texts in Theoretical Computer Science. An EATCS Series.

[25]  Sandra Zilles,et al.  The computational complexity of avoiding spurious states in state space abstraction , 2010, Artif. Intell..

[26]  Ilkka Niemelä,et al.  Planning as satisfiability: parallel plans and algorithms for plan search , 2006, Artif. Intell..

[27]  E. Friedgut,et al.  Sharp thresholds of graph properties, and the -sat problem , 1999 .

[28]  Carlos Sarraute,et al.  Building Computer Network Attacks , 2010, ArXiv.

[29]  Silvia Richter,et al.  The LAMA Planner: Guiding Cost-Based Anytime Planning with Landmarks , 2010, J. Artif. Intell. Res..