Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2900929.2901063guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

TRUSTS: scheduling randomized patrols for fare inspection in transit systems

Published: 22 July 2012 Publication History

Abstract

In proof-of-payment transit systems, passengers are legally required to purchase tickets before entering but are not physically forced to do so. Instead, patrol units move about the transit system, inspecting the tickets of passengers, who face fines if caught fare evading. The deterrence of such fines depends on the unpredictability and effectiveness of the patrols. In this paper, we present TRUSTS, an application for scheduling randomized patrols for fare inspection in transit systems. TRUSTS models the problem of computing patrol strategies as a leader-follower Stackelberg game where the objective is to deter fare evasion and hence maximize revenue. This problem differs from previously studied Stackelberg settings in that the leader strategies must satisfy massive temporal and spatial constraints; moreover, unlike in these counterterrorism-motivated Stackelberg applications, a large fraction of the ridership might realistically consider fare evasion, and so the number of followers is potentially huge. A third key novelty in our work is deliberate simplification of leader strategies to make patrols easier to be executed. We present an efficient algorithm for computing such patrol strategies and present experimental results using real-world ridership data from the Los Angeles Metro Rail system. The Los Angeles County Sheriff's department has begun trials of TRUSTS.

References

[1]
Alpern, S. 1992. Infiltration games on arbitrary graphs. Journal of Mathematical Analysis and Applications 163(1):286-288.
[2]
Becker, G., and Landes, W. 1974. Essays in the Economics of Crime and Punishment. Columbia University Pres.
[3]
Booz Allen Hamilton. 2007. Faregating analysis. Report commissioned by the LA Metro, http://boardarchives.metro.net/Items/2007/11.November/20071115EMACItem27.pdf.
[4]
Conitzer, V., and Sandholm, T. 2006. Computing the optimal strategy to commit to. In EC.
[5]
Dickerson, J. P.; Simari, G. I.; Subrahmanian, V. S.; and Kraus, S. 2010. A graph-theoretic approach to protect static and moving targets from adversaries. In AAMAS.
[6]
Gal, S. 1979. Search games with mobile and immobile hider. SIAM Journal on Control and Optimization 17(1):99-122.
[7]
Halvorson, E.; Conitzer, V.; and Parr, R. 2009. Multi-step multisensor hider-seeker games. In IJCAI.
[8]
Horizon Research Corporation. 2002. Metropolitan transit authority fare evasion study. http://libraryarchives.metro.net/DPGTL/studies/2002.horizon.fare.evasion.study.pdf.
[9]
Jain, M.; Tsai, J.; Pita, J.; Kiekintveld, C.; Rathi, S.; Tambe, M.; and Ordóñez, F. 2010. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshals Service. Interfaces 40:267-290.
[10]
Koller, D.; Megiddo, N.; and von Stengel, B. 1994. Fast algorithms for finding randomized strategies in game trees. In STOC.
[11]
Pita, J.; Tambe, M.; Kiekintveld, C.; Cullen, S.; and Steigerwald, E. 2011. Guards - game theoretic security allocation on a national scale. In AAMAS (Industry Track).
[12]
Ponssard, J., and Sorin, S. 1980. The L.P. formulation of finite zero-sum games with incomplete information. Int. J. of Game Theory 9:99-105.
[13]
Tambe, M. 2011. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press.
[14]
Tsai, J.; Yin, Z.; Kwak, J.; Kempe, D.; Kiekintveld, C.; and Tambe, M. 2010. Urban security: Game-theoretic resource allocation in networked physical domains. In AAAI.
[15]
Wagenaar, W. A. 1972. Generation of random sequences by human subjects: A critical survey of literature. Psychological Bulletin 77(1):65-72.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
AAAI'12: Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence
July 2012
2464 pages

Publisher

AAAI Press

Publication History

Published: 22 July 2012

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Designing the game to playProceedings of the 27th International Joint Conference on Artificial Intelligence10.5555/3304415.3304488(512-518)Online publication date: 13-Jul-2018
  • (2018)Solving Stackelberg security Markov games employing the bargaining Nash approachComputers and Security10.1016/j.cose.2018.01.00574:C(240-257)Online publication date: 1-May-2018
  • (2018)Speed Trap Optimal PatrollingWireless Personal Communications: An International Journal10.1007/s11277-017-5029-y98:4(3563-3582)Online publication date: 1-Feb-2018
  • (2017)The efficiency of the HyperPlay technique over random samplingProceedings of the Thirty-First AAAI Conference on Artificial Intelligence10.5555/3298239.3298283(282-289)Online publication date: 4-Feb-2017
  • (2017)When security games hit trafficProceedings of the 26th International Joint Conference on Artificial Intelligence10.5555/3172077.3172422(3814-3822)Online publication date: 19-Aug-2017
  • (2016)Signaling in Bayesian Stackelberg GamesProceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems10.5555/2936924.2936950(150-158)Online publication date: 9-May-2016
  • (2016)Restless PoachersProceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems10.5555/2936924.2936946(123-131)Online publication date: 9-May-2016
  • (2016)Multilinear GamesProceedings of the 12th International Conference on Web and Internet Economics - Volume 1012310.1007/978-3-662-54110-4_4(44-58)Online publication date: 11-Dec-2016
  • (2016)Computing Equilibria with Partial CommitmentProceedings of the 12th International Conference on Web and Internet Economics - Volume 1012310.1007/978-3-662-54110-4_1(1-14)Online publication date: 11-Dec-2016
  • (2016)Combining Graph Contraction and Strategy Generation for Green Security Games7th International Conference on Decision and Game Theory for Security - Volume 999610.1007/978-3-319-47413-7_15(251-271)Online publication date: 2-Nov-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media