Perfect Simulation and Deployment Strategies for Detection
This dissertation contains two parts. The first part provides the first algorithm that, under minimal assumptions, allows to simulate the stationary waiting-time sequence of a single-server queue backwards in time, jointly with the input processes of the queue (inter-arrival and service times)...
Main Author: | |
---|---|
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://doi.org/10.7916/D8X066JB |
id |
ndltd-columbia.edu-oai-academiccommons.columbia.edu-10.7916-D8X066JB |
---|---|
record_format |
oai_dc |
spelling |
ndltd-columbia.edu-oai-academiccommons.columbia.edu-10.7916-D8X066JB2019-05-09T15:14:58ZPerfect Simulation and Deployment Strategies for DetectionWallwater, Aya2015ThesesOperations researchThis dissertation contains two parts. The first part provides the first algorithm that, under minimal assumptions, allows to simulate the stationary waiting-time sequence of a single-server queue backwards in time, jointly with the input processes of the queue (inter-arrival and service times). The single-server queue is useful in applications of DCFTP (Dominated Coupling From The Past), which is a well known protocol for simulation without bias from steady-state distributions. Our algorithm terminates in finite time assuming only finite mean of the inter-arrival and service times. In order to simulate the single-server queue in stationarity until the first idle period in finite expected termination time we require the existence of finite variance. This requirement is also necessary for such idle time (which is a natural coalescence time in DCFTP applications) to have finite mean. Thus, in this sense, our algorithm is applicable under minimal assumptions. The second part studies the behavior of diffusion processes in a random environment. We consider an adversary that moves in a given domain and our goal is to produce an optimal strategy to detect and neutralize him by a given deadline. We assume that the target's dynamics follows a diffusion process whose parameters are informed by available intelligence information. We will dedicate one chapter to the rigorous formulation of the detection problem, an introduction of several frameworks that can be considered when applying our methods, and a discussion on the challenges of finding the analytical optimal solution. Then, in the following chapter, we will present our main result, a large deviation behavior of the adversary's survival probability under a given strategy. This result will be later give rise to asymptotically efficient Monte Carlo algorithms.Englishhttps://doi.org/10.7916/D8X066JB |
collection |
NDLTD |
language |
English |
sources |
NDLTD |
topic |
Operations research |
spellingShingle |
Operations research Wallwater, Aya Perfect Simulation and Deployment Strategies for Detection |
description |
This dissertation contains two parts. The first part provides the first algorithm that, under minimal assumptions, allows to simulate the stationary waiting-time sequence of a single-server queue backwards in time, jointly with the input processes of the queue
(inter-arrival and service times).
The single-server queue is useful in applications of DCFTP (Dominated Coupling From The Past), which is a well known protocol for simulation without bias from steady-state distributions. Our algorithm terminates in finite time assuming only finite mean of the
inter-arrival and service times. In order to simulate the single-server queue in stationarity until the first idle period in finite expected termination time we require the existence of finite variance. This requirement is also necessary for such idle time (which is a natural
coalescence time in DCFTP applications) to have finite mean. Thus, in this sense, our algorithm is applicable under minimal assumptions.
The second part studies the behavior of diffusion processes in a random environment.
We consider an adversary that moves in a given domain and our goal is to produce an optimal strategy to detect and neutralize him by a given deadline. We assume that the target's dynamics follows a diffusion process whose parameters are informed by available intelligence information. We will dedicate one chapter to the rigorous formulation of the detection problem, an introduction of several frameworks that can be considered when applying our methods, and a discussion on the challenges of finding the analytical optimal solution. Then, in the following chapter, we will present our main result, a large deviation behavior of the adversary's survival probability under a given strategy. This result will be later give rise to asymptotically efficient Monte Carlo algorithms. |
author |
Wallwater, Aya |
author_facet |
Wallwater, Aya |
author_sort |
Wallwater, Aya |
title |
Perfect Simulation and Deployment Strategies for Detection |
title_short |
Perfect Simulation and Deployment Strategies for Detection |
title_full |
Perfect Simulation and Deployment Strategies for Detection |
title_fullStr |
Perfect Simulation and Deployment Strategies for Detection |
title_full_unstemmed |
Perfect Simulation and Deployment Strategies for Detection |
title_sort |
perfect simulation and deployment strategies for detection |
publishDate |
2015 |
url |
https://doi.org/10.7916/D8X066JB |
work_keys_str_mv |
AT wallwateraya perfectsimulationanddeploymentstrategiesfordetection |
_version_ |
1719046591946424320 |