Evader interdiction: algorithms, complexity and collateral damage

In network interdiction problems, evaders (e.g., hostile agents or data packets) are moving through a network toward targets and we wish to choose locations for sensors in order to intercept the evaders. The evaders might follow deterministic routes or Markov chains, or they may be reactive, i.e., able to change their routes in order to avoid the sensors. The challenge in such problems is to choose sensor locations economically, balancing interdiction gains with costs, including the inconvenience sensors inflict upon innocent travelers. We study the objectives of (1) maximizing the number of evaders captured when limited by a budget on sensing cost and, (2) capturing all evaders as cheaply as possible.We give algorithms for optimal sensor placement in several classes of special graphs and hardness and approximation results for general graphs, including evaders who are deterministic, Markov chain-based, reactive and unreactive.A similar-sounding but fundamentally different problem setting was posed by Glazer and Rubinstein where both evaders and innocent travelers are reactive. We again give optimal algorithms for special cases and hardness and approximation results on general graphs.

[1]  Shimon Even,et al.  Graph Algorithms: Contents , 2011 .

[2]  Shimon Even,et al.  Graph Algorithms , 1979 .

[3]  Fanica Gavril,et al.  Algorithms for Minimum Coloring, Maximum Clique, Minimum Covering by Cliques, and Maximum Independent Set of a Chordal Graph , 1972, SIAM J. Comput..

[4]  Robin Thomas,et al.  Efficiently four-coloring planar graphs , 1996, STOC '96.

[5]  H. W. Corley,et al.  Finding the n Most Vital Nodes in a Flow Network , 1974 .

[6]  Mohit Singh,et al.  Approximating the k-multicut problem , 2006, SODA '06.

[7]  Feng Pan,et al.  Interdiction of a Markovian Evader , 2010, ICS 2011.

[8]  Guy Kortsarz,et al.  The checkpoint problem , 2012, Theor. Comput. Sci..

[9]  Mihalis Yannakakis,et al.  Primal-dual approximation algorithms for integral flow and multicut in trees , 1997, Algorithmica.

[10]  Satoru Iwata,et al.  Submodular Function Minimization under Covering Constraints , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[11]  Samir Khuller,et al.  The complexity of finding most vital arcs and nodes , 1995 .

[12]  Subhash Khot,et al.  Vertex cover might be hard to approximate to within 2-/spl epsiv/ , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..

[13]  Frank Nielsen,et al.  Maintenance of a Piercing Set for Intervals with Applications , 2000, Algorithmica.

[14]  Christos Koufogiannakis,et al.  Greedy Δ-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost , 2013, Algorithmica.

[15]  Noga Alon,et al.  Improved approximation for directed cut problems , 2007, STOC '07.

[16]  H. W. Corley,et al.  Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..

[17]  Alan W. McMasters,et al.  Optimal interdiction of a supply network , 1970 .

[18]  Feng Pan,et al.  Optimal Interdiction of Unreactive Markovian Evaders , 2009, CPAIOR.

[19]  Frank Nielsen,et al.  Fast stabbing of boxes in high dimensions , 1996, Theor. Comput. Sci..

[20]  N. Megiddo,et al.  The Maximum Coverage Location Problem , 1983 .

[21]  Donald B. Johnson,et al.  Finding All the Elementary Circuits of a Directed Graph , 1975, SIAM J. Comput..

[22]  Toshihide Ibaraki,et al.  Constant Ratio Approximation Algorithms for the Rectangle Stabbing Problem and the Rectilinear Partitioning Problem , 2000, J. Algorithms.

[23]  Pauli Miettinen,et al.  On the Positive-Negative Partial Set Cover problem , 2008, Inf. Process. Lett..

[24]  S. Lubore,et al.  Finding the N most vital links in flow networks , 2011 .

[25]  Danny Segev,et al.  Partial multicuts in trees , 2006, Theor. Comput. Sci..

[26]  David P. Morton,et al.  A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .

[27]  Ariel Rubinstein,et al.  A study in the pragmatics of persuasion: a game theoretical approach , 2006 .

[28]  Dror Rawitz,et al.  Algorithms for capacitated rectangle stabbing and lot sizing with joint set-up costs , 2008, TALG.

[29]  Bengt Sennblad,et al.  The gene evolution model and computing its associated probabilities , 2009, JACM.

[30]  Wen-Lian Hsu,et al.  Linear Time Algorithms on Circular-Arc Graphs , 1991, Inf. Process. Lett..

[31]  David Zuckerman Linear Degree Extractors and the Inapproximability of Max Clique and Chromatic Number , 2007, Theory Comput..

[32]  David L. Woodruff,et al.  Network Interdiction and Stochastic Integer Programming , 2013 .

[33]  David S. Johnson,et al.  Some simplified NP-complete problems , 1974, STOC '74.