Escape Sensing Games:
Detection-vs-Evasion in Security Applications

Niclas Boehmer111Equal Contribution.
Harvard University
[email protected]
   Minbiao Han
University of Chicago
[email protected]
   Haifeng Xu
University of Chicago
[email protected]
   Milind Tambe
Harvard University
[email protected]
Abstract

Traditional game-theoretic research for security applications primarily focuses on the allocation of external protection resources to defend targets. This work puts forward the study of a new class of games centered around strategically arranging targets to protect them against a constrained adversary, with motivations from varied domains such as peacekeeping resource transit and cybersecurity. Specifically, we introduce Escape Sensing Games (ESGs). In ESGs, a blue player manages the order in which targets pass through a channel, while her opponent tries to capture the targets using a set of sensors that need some time to recharge after each activation. We present a thorough computational study of ESGs. Among others, we show that it is NP-hard to compute best responses and equilibria. Nevertheless, we propose a variety of effective (heuristic) algorithms whose quality we demonstrate in extensive computational experiments.

1 Introduction

The past decade has witnessed an influential line of research in AI, particularly multiagent systems (MAS), that employs computational game theory to tackle critical challenges in security and public safety applications, ranging from protecting national ports [21] to combating smuggling [7] and illegal poaching [14] to defending our cyber systems [27]. At the core of almost all of these problems is to optimize the allocation of (often limited) external forces to protect critical targets. In this work, we adopt a similar computational game theory approach but address a fundamentally different type of security challenge that looks to improve security via optimizing the arrangement of targets in the face of adversaries. This research contributes a novel perspective to game-theoretic security strategies, emphasizing target arrangement as a defense mechanism against adversaries.

Specifically, we introduce and study Escape Sensing Games (ESGs). In these games, a blue player aims to securely navigate a set of targets through a channel, whereas her opponent, the red player, controls a set of sensors along the channel and tries to sense (and therefore “steal”) as many targets as possible. This model captures strategic interactions arising in various domains. One example is the transportation of peacekeeping resources using a convoy of ships or cars over a fixed route with malicious actors (e.g., pirates or hostile forces) trying to intercept them [25] (see Section 2 for details). In cybersecurity, the blue player could model a network administrator routing sensitive data packets through a network with an attacker trying to intercept them. Our model captures strategic interactions in these settings arising when security measures are either unavailable or have already been allocated and the blue player is only left with scheduling the targets to avoid detection by the attacker.

We study the optimal sequential play in ESGs, where the blue player first commits to an ordering of targets followed by the red player devising an optimal sensing plan. Herein, sensors’ capabilities are limited in two ways. First, each sensor is only capable of sensing certain targets, modeling that detection and interception technologies are not uniformly effective across different targets, due to differing characteristics such as size, speed, or defense mechanisms. Second, sensors need a certain time to recharge after sensing a target, modeling limits inherent in detection and interception systems, where permanent action is not feasible.

There are certain challenges integral to our model that make the computation of equilibria highly non-trivial. First, the action space of both players has an exponential size, rendering standard solution approaches such as support enumeration computationally infeasible. Second, also after the strategies of both players have been fixed, the game evolves in a complex, sequential fashion with targets moving one after each other through the channel. Connected to this, third, it turns out that the red player’s best response problem of coming up with an optimal sensing plan given a target ordering is already NP-hard. Consequently, this paper also contributes to the algorithmic research on computationally challenging games, a fairly unexplored topic outside of combinatorial game theory [10, 20, 12].

1.1 Our Contribution

We contribute a new perspective to the rich literature on computational game theory for security applications through our study of the previously overlooked problem of target arrangement. Specifically, we introduce and analyze Escape Sensing Games with a focus on the target-controlling blue player. We demonstrate that solving this game is highly complex, as we prove that it is NP-hard for both players to compute their optimal strategies. To nevertheless be able to solve ESGs in practice, we devise algorithms for computing the red player’s strategy, which turn out to scale well in our experiments. Computing the blue player’s strategy and thereby the game’s Stackelberg equilibrium turns out to be a much more intricate task. Our experiments show that our formulation of the problem as a bilevel program is only capable of solving small instances of the game exactly. Motivated by this, we present a heuristic that effectively combines simulated annealing with a greedy heuristic and an Integer Linear Program (ILP) for computing the red player’s strategy. We demonstrate the quality of our heuristic through extensive experiments.

We further this investigation in Section 6 by studying a different variant where sensors are decentralized hence each sensor acts independently according to a simple greedy strategy. We show that it remains NP-hard for the blue player to compute its optimal strategy. While in this setting blue’s problem admits an ILP formulation, we demonstrate in experiments that it can only solve up to medium-sized instances. Addressing this, we present heuristics that perform well in our experiments. We also demonstrate that while sensors usually have some gain from coordination, this gain depends decisively on the instance structure and is oftentimes rather small (below 20%percent2020\%20 %).

Full proofs of all results and descriptions of additional experiments can be found in our full version [6].

2 Escape Sensing Games (ESGs): The Model

Refer to caption
Figure 1: A visual representation of an Escape Sensing Game.

In an Escape Sensing Game (ESG) a blue player (henceforth Blue) tries to route a set of targets through a channel. They compete against a red player (henceforth Red) who controls a set of sensors and tries to sense (and therefore “steal”) as many of Blue’s targets as possible.222Note that the terms “sensor” and “sensing” are only part of our terminology and do not limit the applications of our model. For instance, instead of “sensing” the targets, Red might also aim to intercept them. Formally, an Escape Sensing Game is defined by

  1. 1.

    a set of targets T={t1,,tn}𝑇subscript𝑡1subscript𝑡𝑛T=\{t_{1},\dots,t_{n}\}italic_T = { italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT }, each target tiTsubscript𝑡𝑖𝑇t_{i}\in Titalic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_T equipped with some utility value vi+subscript𝑣𝑖superscriptv_{i}\in\mathbb{R}^{+}italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ blackboard_R start_POSTSUPERSCRIPT + end_POSTSUPERSCRIPT,

  2. 2.

    a set of sensors S={s1,,sk}𝑆subscript𝑠1subscript𝑠𝑘S=\{s_{1},\dots,s_{k}\}italic_S = { italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT } and a recharging time τ{}𝜏\tau\in\mathbb{N}\cup\{\infty\}italic_τ ∈ blackboard_N ∪ { ∞ } which is the same for all sensors and,

  3. 3.

    a sensing matrix D{0,1}n×k𝐷superscript01𝑛𝑘D\in\{0,1\}^{n\times k}italic_D ∈ { 0 , 1 } start_POSTSUPERSCRIPT italic_n × italic_k end_POSTSUPERSCRIPT where Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 means that sensor sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT is capable of sensing target tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

We assume that all of these parts are known to both players at any point in time. Note that in this paper, we consider the constant-sum utility structure and leave the general-sum version for future work. That is, Blue seeks to maximize the summed value of not-sensed targets, i.e., targets not sensed by any sensor. In contrast, Red seeks to minimize this value, or equivalently, maximize the summed value of targets that are sensed by some sensor.

The strategy of Blue is an ordering of the targets σ:T[n]:𝜎𝑇delimited-[]𝑛\sigma:T\to[n]italic_σ : italic_T → [ italic_n ] that assigns each target tT𝑡𝑇t\in Titalic_t ∈ italic_T a unique position σ(t)𝜎𝑡\sigma(t)italic_σ ( italic_t ), i.e., σ𝜎\sigmaitalic_σ is a bijection. The targets move through the channel according to σ𝜎\sigmaitalic_σ, i.e., the target on position 1111 moves first, on position 2222 second, and so on. In each time step each target moves to the next sensor, leaves the channel (in case it passed all sensors), or enters the channel at the first sensor (in case it is the next target in the ordering σ𝜎\sigmaitalic_σ).

The strategy of Red is a sensing plan ψ:S2T:𝜓𝑆superscript2𝑇\psi:S\to 2^{T}italic_ψ : italic_S → 2 start_POSTSUPERSCRIPT italic_T end_POSTSUPERSCRIPT that maps each sensor to a subset of targets TTsuperscript𝑇𝑇T^{\prime}\subseteq Titalic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_T sensed by the sensor, where each sensor senses different targets, i.e., ψ(s)ψ(s)=𝜓𝑠𝜓superscript𝑠\psi(s)\cap\psi(s^{\prime})=\emptysetitalic_ψ ( italic_s ) ∩ italic_ψ ( italic_s start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) = ∅ for each ssS𝑠superscript𝑠𝑆s\neq s^{\prime}\in Sitalic_s ≠ italic_s start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ italic_S. Red cannot play arbitrary sensing plans but only those which are valid. A sensing plan is valid (with respect to a senor ordering σ𝜎\sigmaitalic_σ) if (i) a sensor only senses targets it has the capabilities to sense, i.e., for each sjSsubscript𝑠𝑗𝑆s_{j}\in Sitalic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_S and tiψ(sj)subscript𝑡𝑖𝜓subscript𝑠𝑗t_{i}\in\psi(s_{j})italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_ψ ( italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) we have Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1, and (ii) a sensor pauses for at least τ𝜏\tauitalic_τ time steps after sensing a target, i.e., for each sS𝑠𝑆s\in Sitalic_s ∈ italic_S and t,tψ(s)𝑡superscript𝑡𝜓𝑠t,t^{\prime}\in\psi(s)italic_t , italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ italic_ψ ( italic_s ) we have |σ(t)σ(t)|>τ𝜎𝑡𝜎superscript𝑡𝜏|\sigma(t)-\sigma(t^{\prime})|>\tau| italic_σ ( italic_t ) - italic_σ ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) | > italic_τ. Given a sensing plan, we can immediately calculate the value of not-sensed targets as v(ψ):=tiTsSψ(s)viassign𝑣𝜓subscriptsubscript𝑡𝑖limit-from𝑇subscript𝑠𝑆𝜓𝑠subscript𝑣𝑖v(\psi):=\sum_{t_{i}\in T\setminus\cup_{s\in S}\psi(s)}v_{i}italic_v ( italic_ψ ) := ∑ start_POSTSUBSCRIPT italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_T ∖ ∪ start_POSTSUBSCRIPT italic_s ∈ italic_S end_POSTSUBSCRIPT italic_ψ ( italic_s ) end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, which quantifies Blue’s utility.

Objectives and equilibrium

Due to the motivating applications of our interest, this work adopts Blue’s perspective and analyzes sequential play in this game by assuming Blue moves first.333Note that this is already reflected in our game definition, since the validity of Red’s sensing plan depends on the strategy of Blue. Thus, Red cannot move before or simultaneous to Blue. Our analysis consists of two parts. First, we will analyze the best response problem for Red called Best Red Response: Given an ordering σ𝜎\sigmaitalic_σ of the targets, output the sensing plan ψ𝜓\psiitalic_ψ that is valid with respect to σ𝜎\sigmaitalic_σ and minimizes v(ψ)𝑣𝜓v(\psi)italic_v ( italic_ψ ) among such plans. Second, to compute the optimal strategy of Blue, we analyze the game’s Stackelberg equilibrium444We assume that ties in the strategies are broken according to some predefined lexicographic ordering of the strategies., which can be written as the following bilevel optimization problem: maxσminψ:ψ is valid wrt. σv(ψ).subscript𝜎subscript:𝜓ψ is valid wrt. σ𝑣𝜓\max_{\sigma}\min_{\begin{subarray}{c}\psi:\text{$\psi$ is valid wrt. $\sigma$% }\end{subarray}}v(\psi).roman_max start_POSTSUBSCRIPT italic_σ end_POSTSUBSCRIPT roman_min start_POSTSUBSCRIPT start_ARG start_ROW start_CELL italic_ψ : italic_ψ is valid wrt. italic_σ end_CELL end_ROW end_ARG end_POSTSUBSCRIPT italic_v ( italic_ψ ) . We term the corresponding computational problem Blue Leader Stackelberg Equilibrium.

A motivating application

One major motivation of our work is the secure transit of peacekeeping resources in the presence of adversarial actors such as pirates, which has critical importance due to past incidents, e.g., to the United Nations [25]. Citing the UN’s peacekeeping mission manual [26], “protecting shipping in transit ensures the safety and security of vessels as they pass through waters threatened by piracy on the high seas…” In these applications, UN plays Blue’s role whereas pirates correspond to Red, who can observe the ordering of targets and then act second. The UN commands a fleet of ships (i.e., targets in our model) that often carry resources of different importance and that can be arranged strategically. Protecting shipping is overall a complex, multi-facet, task and our model captures one of the phases after potential (often scarce) security measures have already been allocated to the ships and the pirates look to identify targets to attack. According to Winn and Govern [28], pirates often use a set of boats (i.e., sensors in our model) to probe different passing targets, usually by following them to observe their speed, crew amount, firearm, etc. to judge based on this whether they are capable of capturing the ship. Such probing takes time, which is modeled by the recharging time τ𝜏\tauitalic_τ.

Sensor and target types

We develop some customized algorithms for instances with only a few different target or sensor models: We say that two sensors si,sjSsubscript𝑠𝑖subscript𝑠𝑗𝑆s_{i},s_{j}\in Sitalic_s start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_S are of the same type if they are capable of sensing the same targets, i.e., the i𝑖iitalic_i-th and j𝑗jitalic_j-th column of the sensing matrix are identical. We say that two targets ti,tjTsubscript𝑡𝑖subscript𝑡𝑗𝑇t_{i},t_{j}\in Titalic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_T are of the same type if they have the same utility value and can be sensed by the same sensors, i.e., vi=vjsubscript𝑣𝑖subscript𝑣𝑗v_{i}=v_{j}italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT = italic_v start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and the i𝑖iitalic_i-th and j𝑗jitalic_j-th row of the sensing matrix are identical. We denote as Γ={γ1,,γnχ}Γsubscript𝛾1subscript𝛾subscript𝑛𝜒\Gamma=\{\gamma_{1},\dots,\gamma_{n_{\chi}}\}roman_Γ = { italic_γ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_γ start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT } and Θ={θ1,,θkχ}Θsubscript𝜃1subscript𝜃subscript𝑘𝜒\Theta=\{\theta_{1},\dots,\theta_{k_{\chi}}\}roman_Θ = { italic_θ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_θ start_POSTSUBSCRIPT italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT } the set of target and sensor types, respectively. It is easy to see that kχ2nχsubscript𝑘𝜒superscript2subscript𝑛𝜒k_{\chi}\leq 2^{n_{\chi}}italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ≤ 2 start_POSTSUPERSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUPERSCRIPT, as a sensor’s sensing capabilities are defined by the set of target types it can sense. Similarly, assuming that all targets have the same value, it holds that nχ2kχsubscript𝑛𝜒superscript2subscript𝑘𝜒n_{\chi}\leq 2^{k_{\chi}}italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ≤ 2 start_POSTSUPERSCRIPT italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUPERSCRIPT.

3 Related Work

While the escape sensing game model is new, it is closely related to a few lines of AI research, as detailed below.

Computational game theory for security

Conceptually, our work subscribes to the extensive MAS literature on computational game theory for tackling security challenges. The Stackelberg security game [24] is one widely studied example. Other game-theoretic models include the hide-and-seek game [8], blotto games [4], auditting games [5] and catcher-evader games [19]. Most of these games study the optimal usage of security forces under different game structures. In contrast, our ESG model is motivated by detection-vs-evasion situations in which security forces have already been allocated.

Scheduling

On a formal level, our problem is to schedule/order targets in an adversarial environment, which shares similarities with the classic problem of scheduling that looks to assign tasks to different machines to optimize certain criteria [18]. There is a rich body of AI research on scheduling, ranging from solving varied problems using AI techniques such as satisfiability [11] and distributed constraint optimization [22], to developing new models of scheduling problems under uncertainty [3] or in multi-agent setups [31].

In fact, the Best Red Response problem can be formulated as the following slightly non-standard scheduling problem: There are k𝑘kitalic_k machines (modeling sensors). In each step, a job (modeling a target) arrives. The job can be processed (modeling sensing) by a given subset of machines and if executed successfully generates a given reward value. The job has a processing time of τ𝜏\tauitalic_τ and needs to be processed within the next τ𝜏\tauitalic_τ steps. This implies that the job needs to be processed (i.e., sensed) either now or its reward is lost.

4 The Algorithmics of Escape Sensing Games

We analyze the computational complexity of ESGs starting with Red’s best response problem, followed by computing equilibria.

4.1 Computing Red’s Best Response Strategy

We analyze Red’s best response problem that Red needs to solve in each game after Blue has committed to a target ordering. This problem turns out to be NP-hard, even if Red is only interested in determining whether it can sense all targets. This intractability result is the first strong indicator of the intricate game dynamics in ESGs.

Theorem 1.

Best Red Response is NP-complete, even when asked to decide whether Red can sense all targets or not.

Proof.

We reduce from Hitting Set where we are given a universe U𝑈Uitalic_U, a collection of sets 𝒵={Z1,,Zm}𝒵subscript𝑍1subscript𝑍𝑚\mathcal{Z}=\{Z_{1},\dots,Z_{m}\}caligraphic_Z = { italic_Z start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_Z start_POSTSUBSCRIPT italic_m end_POSTSUBSCRIPT } and an integer t𝑡titalic_t, and the question is whether there a size-t𝑡titalic_t subset UUsuperscript𝑈𝑈U^{\prime}\subseteq Uitalic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_U containing at least one element from each set in 𝒵𝒵\mathcal{Z}caligraphic_Z (we assume that t2𝑡2t\geq 2italic_t ≥ 2 and |U|>t𝑈𝑡|U|>t| italic_U | > italic_t).

In the construction, all targets have a value of 1111 and the question is whether Red can sense all targets. As the core of the construction we add element sensors {auuU}conditional-setsubscript𝑎𝑢𝑢𝑈\{a_{u}\mid u\in U\}{ italic_a start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT ∣ italic_u ∈ italic_U }, set targets {αZZ𝒵}conditional-setsubscript𝛼𝑍𝑍𝒵\{\alpha_{Z}\mid Z\in\mathcal{Z}\}{ italic_α start_POSTSUBSCRIPT italic_Z end_POSTSUBSCRIPT ∣ italic_Z ∈ caligraphic_Z }, and selection targets {βi,ji[|U|t],j[m]}conditional-setsubscript𝛽𝑖𝑗formulae-sequence𝑖delimited-[]𝑈𝑡𝑗delimited-[]𝑚\{\beta_{i,j}\mid i\in[|U|-t],j\in[m]\}{ italic_β start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ | italic_U | - italic_t ] , italic_j ∈ [ italic_m ] }. Each element sensor can sense all selection targets and all set targets corresponding to sets in which the element appears. Regarding the ordering of targets, it is easiest to think of the targets as being arranged in “rounds”. In each round j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ], first the selection targets {βi,ji[|U|t]}conditional-setsubscript𝛽𝑖𝑗𝑖delimited-[]𝑈𝑡\{\beta_{i,j}\mid i\in[|U|-t]\}{ italic_β start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ | italic_U | - italic_t ] } move through the channel followed by the the set target αZjsubscript𝛼subscript𝑍𝑗\alpha_{Z_{j}}italic_α start_POSTSUBSCRIPT italic_Z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT. The idea is that the same |U|t𝑈𝑡|U|-t| italic_U | - italic_t element sensors sense the selection targets in every round, which correspond to the elements that are not part of the hitting set (we extend the construction in the following paragraph to ensure that this holds). Then, the remaining t𝑡titalic_t element sensors need to form a hitting set to be able to sense the set target in each round.

We extend the construction as follows. We add filling targets γi,jsubscript𝛾𝑖𝑗\gamma_{i,j}italic_γ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT for all i[t1]𝑖delimited-[]𝑡1i\in[t-1]italic_i ∈ [ italic_t - 1 ] and j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ], which all element sensors can sense. Moreover, we add dummy sensors di,jsubscript𝑑𝑖𝑗d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT for each i[2|U|]𝑖delimited-[]2𝑈i\in[2|U|]italic_i ∈ [ 2 | italic_U | ] and j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ] and dummy targets δi,jsubscript𝛿𝑖𝑗\delta_{i,j}italic_δ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT for each i[2|U|]𝑖delimited-[]2𝑈i\in[2|U|]italic_i ∈ [ 2 | italic_U | ] and j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ]. For each i[2|U|]𝑖delimited-[]2𝑈i\in[2|U|]italic_i ∈ [ 2 | italic_U | ] and j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ], dummy sensor di,jsubscript𝑑𝑖𝑗d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT can sense dummy target δi,jsubscript𝛿𝑖𝑗\delta_{i,j}italic_δ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT. We set τ:=2|U|+1assign𝜏2𝑈1\tau:=2|U|+1italic_τ := 2 | italic_U | + 1. Formally, the target ordering σ𝜎\sigmaitalic_σ is constructed—in multiple “rounds”—as follows. In each round j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ], we first move the selection targets {βi,ji[|U|t]}conditional-setsubscript𝛽𝑖𝑗𝑖delimited-[]𝑈𝑡\{\beta_{i,j}\mid i\in[|U|-t]\}{ italic_β start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ | italic_U | - italic_t ] } through the channel, then the dummy targets {δi,ji[|U|]}conditional-setsubscript𝛿𝑖𝑗𝑖delimited-[]𝑈\{\delta_{i,j}\mid i\in[|U|]\}{ italic_δ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ | italic_U | ] }, then the set target αZjsubscript𝛼subscript𝑍𝑗\alpha_{Z_{j}}italic_α start_POSTSUBSCRIPT italic_Z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT, then the filling targets {γi,ji[t1]}conditional-setsubscript𝛾𝑖𝑗𝑖delimited-[]𝑡1\{\gamma_{i,j}\mid i\in[t-1]\}{ italic_γ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ italic_t - 1 ] } and then the dummy targets {δi,ji[|U|+1,2|U|]}conditional-setsubscript𝛿𝑖𝑗𝑖𝑈12𝑈\{\delta_{i,j}\mid i\in[|U|+1,2|U|]\}{ italic_δ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ | italic_U | + 1 , 2 | italic_U | ] } (the ordering of targets in each of the groups is arbitrary).

Proof of correctness: forward direction

Assume that UUsuperscript𝑈𝑈U^{\prime}\subseteq Uitalic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_U is a size-t𝑡titalic_t hitting set of 𝒵𝒵\mathcal{Z}caligraphic_Z. For each i[2|U|]𝑖delimited-[]2𝑈i\in[2|U|]italic_i ∈ [ 2 | italic_U | ] and j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ], we let di,jsubscript𝑑𝑖𝑗d_{i,j}italic_d start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT sense δi,jsubscript𝛿𝑖𝑗\delta_{i,j}italic_δ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT. We construct the sensing plan for the element sensors iteratively as follows. In each round j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ], we let each of the |U|t𝑈𝑡|U|-t| italic_U | - italic_t element sensors {auuUU}conditional-setsubscript𝑎𝑢𝑢𝑈superscript𝑈\{a_{u}\mid u\in U\setminus U^{\prime}\}{ italic_a start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT ∣ italic_u ∈ italic_U ∖ italic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT } sense exactly one of the selection targets {βi,ji[|U|t]}conditional-setsubscript𝛽𝑖𝑗𝑖delimited-[]𝑈𝑡\{\beta_{i,j}\mid i\in[|U|-t]\}{ italic_β start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ | italic_U | - italic_t ] }. Now, let usuperscript𝑢u^{*}italic_u start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT be an element from Usuperscript𝑈U^{\prime}italic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT that is contained in Zjsubscript𝑍𝑗Z_{j}italic_Z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT (such an element needs to exist because Usuperscript𝑈U^{\prime}italic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is a hitting set). We let ausubscript𝑎superscript𝑢a_{u^{*}}italic_a start_POSTSUBSCRIPT italic_u start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT sense αZjsubscript𝛼subscript𝑍𝑗\alpha_{Z_{j}}italic_α start_POSTSUBSCRIPT italic_Z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT and we let each of the t1𝑡1t-1italic_t - 1 element sensors {auuU{u}}conditional-setsubscript𝑎𝑢𝑢superscript𝑈superscript𝑢\{a_{u}\mid u\in U^{\prime}\setminus\{u^{*}\}\}{ italic_a start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT ∣ italic_u ∈ italic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∖ { italic_u start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT } } sense exactly one of the filling targets {γi,ji[t1]}conditional-setsubscript𝛾𝑖𝑗𝑖delimited-[]𝑡1\{\gamma_{i,j}\mid i\in[t-1]\}{ italic_γ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ∣ italic_i ∈ [ italic_t - 1 ] }.

The constructed sensing plan senses all targets and clearly respects the sensing matrix. It remains to be argued that the recharging times of all element sensors are respected (dummy sensors only sense one target). For each uUU𝑢𝑈superscript𝑈u\in U\setminus U^{\prime}italic_u ∈ italic_U ∖ italic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, we have that ausubscript𝑎𝑢a_{u}italic_a start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT senses one selection target in each round. Between two selection targets in two different rounds there are at least 2|U|2𝑈2|U|2 | italic_U | dummy targets and one set target, so recharging times are respected. For each uU𝑢superscript𝑈u\in U^{\prime}italic_u ∈ italic_U start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT, the sensor ausubscript𝑎𝑢a_{u}italic_a start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT senses either a set or filling target in each round. There are 2|U|2𝑈2|U|2 | italic_U | dummy targets and |U|t1𝑈𝑡1|U|-t\geq 1| italic_U | - italic_t ≥ 1 selection targets between each two sets and filling targets from different rounds, so recharging times are respected.

Proof of correctness: backward direction

Assume that ψ𝜓\psiitalic_ψ is a valid sensing plan that senses all targets. Consequently, in each round, the |U|𝑈|U|| italic_U | element sensors need to sense |U|t𝑈𝑡|U|-t| italic_U | - italic_t selection, t1𝑡1t-1italic_t - 1 filling, and one set target. As ψ𝜓\psiitalic_ψ is valid and there are only |U|t1+|U|+1+t2=2|U|2𝑈𝑡1𝑈1𝑡22𝑈2|U|-t-1+|U|+1+t-2=2|U|-2| italic_U | - italic_t - 1 + | italic_U | + 1 + italic_t - 2 = 2 | italic_U | - 2 targets between the first selection and last filling target in each round, this means that each element sensor needs to sense exactly one of these targets in each round. Note that an element sensor that senses a non-selection (i.e., either a set or filling) target in round j[m]𝑗delimited-[]𝑚j\in[m]italic_j ∈ [ italic_m ] cannot sense a selection target in round j+1𝑗1j+1italic_j + 1, as there are only t1+|U|+|U|t1=2|U|2𝑡1𝑈𝑈𝑡12𝑈2t-1+|U|+|U|-t-1=2|U|-2italic_t - 1 + | italic_U | + | italic_U | - italic_t - 1 = 2 | italic_U | - 2 targets between the first non-selection target in round j𝑗jitalic_j and the last selection target in round j+1𝑗1j+1italic_j + 1. Consequently, as each element sensor needs to sense one target in each round, it follows that there is a set U′′Usuperscript𝑈′′𝑈U^{\prime\prime}\subseteq Uitalic_U start_POSTSUPERSCRIPT ′ ′ end_POSTSUPERSCRIPT ⊆ italic_U of |U|t𝑈𝑡|U|-t| italic_U | - italic_t elements so that the corresponding element sensors sense a selection target in every round. Consequently, the remaining t𝑡titalic_t element sensors need to sense all set targets. As an element sensor is only capable of sensing a set target if the element appears in the set, it follows that UU′′𝑈superscript𝑈′′U\setminus U^{\prime\prime}italic_U ∖ italic_U start_POSTSUPERSCRIPT ′ ′ end_POSTSUPERSCRIPT is a size-t𝑡titalic_t hitting set of 𝒵𝒵\mathcal{Z}caligraphic_Z. ∎

Despite this intractability result, it is still possible to construct exact combinatorial algorithms for Best Red Response. In particular, we present a dynamic programming-based algorithm empowered by some structural observations on ESGs that runs in 𝒪(n(kχ+1)τ+2)𝒪𝑛superscriptsubscript𝑘𝜒1𝜏2\mathcal{O}(n\cdot(k_{\chi}+1)^{\tau+2})caligraphic_O ( italic_n ⋅ ( italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT ) (recall that kχksubscript𝑘𝜒𝑘k_{\chi}\leq kitalic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ≤ italic_k). This algorithm in particular implies that the problem becomes polynomial-time solvable if the recharging time, which we expect to be rather small in comparison to the number of targets, is a constant.

Proposition 2.

There is a 𝒪(n(kχ+1)τ+2)𝒪𝑛superscriptsubscript𝑘𝜒1𝜏2\mathcal{O}(n\cdot(k_{\chi}+1)^{\tau+2})caligraphic_O ( italic_n ⋅ ( italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT )-time algorithm for Best Red Response.

Proof Sketch.

Our idea is to construct a valid sensing plan iteratively by going through the arriving targets one by one (we assume that the ordering of targets is t1,,tnsubscript𝑡1subscript𝑡𝑛t_{1},\dots,t_{n}italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT). For each target, we either decide that it will not be sensed or assign it to one of the sensors so that the resulting plan is still valid. Our key observation to bring down the time and space complexity of the dynamic program is that we do not need to store the full sensing plan to ensure the validity of the plan after updating it. Instead, it is sufficient to know for each sensor whether it has sensed a target in the last τ𝜏\tauitalic_τ steps. More formally, given a valid sensing plan ψ𝜓\psiitalic_ψ that has been constructed by iterating over the first i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] targets, we only store the following information: (i) the value of all targets {t1,,ti}subscript𝑡1subscript𝑡𝑖\{t_{1},\dots,t_{i}\}{ italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } that have not been assigned to a sensor in ψ𝜓\psiitalic_ψ, i.e., tj{t1,,ti}sSψ(s)vjsubscriptsubscript𝑡𝑗limit-fromsubscript𝑡1subscript𝑡𝑖subscript𝑠𝑆𝜓𝑠subscript𝑣𝑗\sum_{t_{j}\in\{t_{1},\dots,t_{i}\}\setminus\cup_{s\in S}\psi(s)}v_{j}∑ start_POSTSUBSCRIPT italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ { italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } ∖ ∪ start_POSTSUBSCRIPT italic_s ∈ italic_S end_POSTSUBSCRIPT italic_ψ ( italic_s ) end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT, (ii) the sensors the last τ+1𝜏1\tau+1italic_τ + 1 targets have been assigned to. It is possible to store this information in a table of size 𝒪(n(k+1)τ+1)𝒪𝑛superscript𝑘1𝜏1\mathcal{O}(n\cdot(k+1)^{\tau+1})caligraphic_O ( italic_n ⋅ ( italic_k + 1 ) start_POSTSUPERSCRIPT italic_τ + 1 end_POSTSUPERSCRIPT ) where each cell can be computed in 𝒪(k)𝒪𝑘\mathcal{O}(k)caligraphic_O ( italic_k )-time. To extend the algorithm to sensor types, we prove that we can collapse sensors of one type into a “meta” sensor, making it sufficient to bookmark the types of sensors that have sensed the last τ+1𝜏1\tau+1italic_τ + 1 targets. ∎

We conclude by giving a clean ILP formulation of Best Red Response, which turns out to scale very favorably in our experiments allowing us to solve instances with up to 10000100001000010000 targets within one minute.

Proposition 3.

Best Red Response admits an ILP formulation with 𝒪(nk)𝒪𝑛𝑘\mathcal{O}(n\cdot k)caligraphic_O ( italic_n ⋅ italic_k ) binary variables and 𝒪(nk)𝒪𝑛𝑘\mathcal{O}(n\cdot k)caligraphic_O ( italic_n ⋅ italic_k ) constraints.

Proof.

We model an instance \mathcal{I}caligraphic_I of Best Red Response as an ILP as follows. We assume that the targets are ordered as t1,,tnsubscript𝑡1subscript𝑡𝑛t_{1},\dots,t_{n}italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT. We create a binary variable xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k+1]𝑗delimited-[]𝑘1j\in[k+1]italic_j ∈ [ italic_k + 1 ]. Setting xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT to one corresponds to letting sensor sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT sense target tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT if j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], and letting tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT not be sensed by any sensor if j=k+1𝑗𝑘1j=k+1italic_j = italic_k + 1.

To ensure that Red minimizes the value of not-sensed targets, the optimization criterion becomes: mini[n]vixi,k+1.subscript𝑖delimited-[]𝑛subscript𝑣𝑖subscript𝑥𝑖𝑘1\min\sum_{i\in[n]}v_{i}\cdot x_{i,k+1}.roman_min ∑ start_POSTSUBSCRIPT italic_i ∈ [ italic_n ] end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ⋅ italic_x start_POSTSUBSCRIPT italic_i , italic_k + 1 end_POSTSUBSCRIPT . To ensure the validity of the sensing plan ψ𝜓\psiitalic_ψ, for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ], we enforce that: j[k+1]xi,j=1.subscript𝑗delimited-[]𝑘1subscript𝑥𝑖𝑗1\sum_{j\in[k+1]}x_{i,j}=1.∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_k + 1 ] end_POSTSUBSCRIPT italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 . Moreover, to ensure that sensor capabilities are respected, we impose for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ] that: xi,jDi,j.subscript𝑥𝑖𝑗subscript𝐷𝑖𝑗x_{i,j}\leq D_{i,j}.italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ≤ italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT . Lastly, to enforce that recharging times are respected, for each j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ] and i[nτ]𝑖delimited-[]𝑛𝜏i\in[n-\tau]italic_i ∈ [ italic_n - italic_τ ] we add the constraint: =ii+τx,j1.superscriptsubscript𝑖𝑖𝜏subscript𝑥𝑗1\sum_{\ell=i}^{i+\tau}x_{\ell,j}\leq 1.∑ start_POSTSUBSCRIPT roman_ℓ = italic_i end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_i + italic_τ end_POSTSUPERSCRIPT italic_x start_POSTSUBSCRIPT roman_ℓ , italic_j end_POSTSUBSCRIPT ≤ 1 .

4.2 Solving for the Stackelberg Equilibrium

We now study the problem of computing Blue’s optimal strategy, i.e., to solve Blue Leader Stackelberg Equilibrium. Theorem 1 already shows the NP-hardness of Best Red Response. While this does not imply the hardness of computing Stackelberg equilibria555Note that the fact that it is NP-hard for Red to best respond to certain Blue strategies (as constructed in the reduction of Theorem 1) does not imply that is also hard for Red to best respond to the particular Stackelberg equilibrium strategy of Blue (as these strategies might admit some structure that makes it easier to best respond)., a convincing intractability result for Blue’s optimal strategy shall ideally “disentangle” its complexity from Red’s best response problem. With this in mind, we prove the NP-hardness of Blue Leader Stackelberg Equilibrium even in situations where Red’s best response problem is linear-time solvable. This demonstrates that the complexity in our reduction does not come from finding Red’s strategy but from the problem of whether Blue can arrange the targets in an optimal way.

Theorem 4.

Blue Leader Stackelberg Equilibrium is NP-hard, even on instances where Best Red Response is linear-time computable and the recharging time is 3333.

Note that the NP-hardness upholds even if sensors’ recharging time is constant, a case in which Red’s best response problem is polynomial-time solvable (see Proposition 2). Our hardness result indicates that computing Blue’s optimal strategy is a generally much harder problem than computing Red’s optimal strategy. In fact, it remains open whether Blue Leader Stackelberg Equilibrium is contained in NP or whether it is complete for complexity classes beyond NP. We suspect the latter to hold.

4.2.1 Bilevel Optimization

In light of this, it is unclear (and from our perspective rather unlikely) that Blue Leader Stackelberg Equilibrium admits an ILP formulation. Naive brute-force approaches are also computationally infeasible, as we would need to enumerate all n!𝑛n!italic_n ! possible target orderings and solve the NP-hard Best Red Response problem as a subroutine for each of them.

Thus, we turn to a formulation as a bilevel optimization problem [9] as one way to solve the problem exactly. In such formulations, constraints are still linear, but there exist two connected levels of the problem, i.e., an outer and an inner level. The inner level controls certain variables that it sets to minimize an objective subject to linear constraints that also involve variables controlled by the outer level, while the outer level sets these variables to maximize the objective. In our problem, we can model Red’s best response problem as the inner level loosely following the ILP from Proposition 3. The outer-level models Blue’s problem. The key parts of the outer level are variables for each target that encode the position in which the target appears in the final ordering and that are used in the inner level to ensure the validity of the sensing plan.

Proposition 5.

Blue Leader Stackelberg Equilibrium admits a bilevel optimization formulation with 𝒪(n2+nk)𝒪superscript𝑛2𝑛𝑘\mathcal{O}(n^{2}+n\cdot k)caligraphic_O ( italic_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT + italic_n ⋅ italic_k ) binary variables, 𝒪(n)𝒪𝑛\mathcal{O}(n)caligraphic_O ( italic_n ) integer variables, and 𝒪(n2k)𝒪superscript𝑛2𝑘\mathcal{O}(n^{2}\cdot k)caligraphic_O ( italic_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ⋅ italic_k ) constraints.

Note that standard techniques to convert this bilevel program into an (integer) linear program, e.g., by exploiting KTT-optimality conditions [2, 13], are not applicable in our setting, as we are solving an integer bilevel program within which the inner-level program is already non-convex.

4.2.2 Heuristic

We will see later that the running time for the bilevel formulation of the problem becomes already infeasible on small-sized instances. Therefore, we experimented with different heuristics to solve the problem.666Note that the heuristic double-oracle approach that has been successfully employed for other large combinatorial games [1, 17] is not applicable to ESGs. Traditionally, the approach successively expands the strategy spaces of both players by letting them best respond to each other. However, in ESGs, we face a bilevel problem in which there is no best response of the leader to the follower. The approach also fails here because the valid strategies of the follower heavily depend on the strategy picked by the leader. In the following, we present two variants of simulated annealing-based heuristics that performed best. For a target ordering σ𝜎\sigmaitalic_σ, we denote as N(σ)𝑁𝜎N(\sigma)italic_N ( italic_σ ) its neighbors, i.e., all (n2)binomial𝑛2{n\choose 2}( binomial start_ARG italic_n end_ARG start_ARG 2 end_ARG ) orderings that arise from σ𝜎\sigmaitalic_σ by swapping the position of any two different targets. The relaxed version of our simulated annealing (SA_Relax) is presented in Algorithm 1. The idea is to find an optimal ordering through repeated local rearrangements. We store the current ordering as σ𝜎\sigmaitalic_σ and compute its value for Blue by solving Red’s best response problem using Proposition 3. Then, we pick a random neighbor of σ𝜎\sigmaitalic_σ, compute its value, and update the ordering based on this according to standard simulated annealing rules.

Algorithm 1 SA_Relax

Input: Target ordering σ𝜎\sigmaitalic_σ and temperature T=100𝑇100T=100italic_T = 100

1:  Compute optimal sensing plan ψ𝜓\psiitalic_ψ wrt. σ𝜎\sigmaitalic_σ.
2:  while T>0.00001𝑇0.00001T>0.00001italic_T > 0.00001 do
3:     Select a random neighbor σ^N(σ)^𝜎𝑁𝜎\hat{\sigma}\in N(\sigma)over^ start_ARG italic_σ end_ARG ∈ italic_N ( italic_σ ).
4:     Compute optimal sensing plan ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT wrt. σ^^𝜎\hat{\sigma}over^ start_ARG italic_σ end_ARG.
5:     if ev(ψ^)v(ψ)T>superscript𝑒𝑣^𝜓𝑣𝜓𝑇absente^{\frac{v(\hat{\psi})-v(\psi)}{T}}>italic_e start_POSTSUPERSCRIPT divide start_ARG italic_v ( over^ start_ARG italic_ψ end_ARG ) - italic_v ( italic_ψ ) end_ARG start_ARG italic_T end_ARG end_POSTSUPERSCRIPT > random[0, 1] then
6:        σ:=σ^assign𝜎^𝜎\sigma:=\hat{\sigma}italic_σ := over^ start_ARG italic_σ end_ARG, ψ:=ψ^assign𝜓^𝜓\psi:=\hat{\psi}italic_ψ := over^ start_ARG italic_ψ end_ARG.
7:     T:=T0.9assign𝑇𝑇0.9T:=T\cdot 0.9italic_T := italic_T ⋅ 0.9.
8:  Return σ𝜎\sigmaitalic_σ.

In the full version of our simulated annealing (SA), instead of picking a random neighbor σ^^𝜎\hat{\sigma}over^ start_ARG italic_σ end_ARG from N(σ)𝑁𝜎N(\sigma)italic_N ( italic_σ ) in Line 3 of Algorithm 1, we first run a heuristic for Best Red Response on all orderings from N(σ)𝑁𝜎N(\sigma)italic_N ( italic_σ ).777In our (greedy) heuristic, we consider the targets in decreasing order of their value and construct the sensing plan ψ𝜓\psiitalic_ψ iteratively. Let SSsuperscript𝑆𝑆S^{\prime}\subseteq Sitalic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_S be the sensors s𝑠sitalic_s so that ψ𝜓\psiitalic_ψ remains a valid sensing plan after adding the current target to ψ(s)𝜓𝑠\psi(s)italic_ψ ( italic_s ). We let the target be sensed by a randomly selected sensor from S𝑆Sitalic_S (or by no sensor if S𝑆Sitalic_S is empty). For a formal description, see our full version [6]. Then, on the μ𝜇\muitalic_μ fraction of neighbors with the highest returned value, we execute the ILP from Proposition 3 to compute the optimal sensing plan. Of the examined neighbors, we pick the one with the highest returned value as σsuperscript𝜎\sigma^{\prime}italic_σ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. As a hyper-parameter tuning process, we tested the performance of our heuristic algorithm with respect to the choice of μ𝜇\muitalic_μ (see our full version [6] for results). It turns out that μ=0.1𝜇0.1\mu=0.1italic_μ = 0.1 provides a good trade-off between the algorithm’s running time and Blue’s utility. Thus, we fix μ=0.1𝜇0.1\mu=0.1italic_μ = 0.1 throughout the paper. For both heuristics, we always run the heuristic three times with three different initial randomly generated target orderings and return the best computed ordering.

5 Experimental Evaluations

We analyze the quality and performance of our algorithms to compute the Stackelberg equilibrium.888We use Gurobi [15] to solve the ILP from Proposition 3 and MIBS [23] to solve the bilevel program from Proposition 5. Both are among the most popular off-the-shelf tools for solving the respective problem. We consider three simulated game settings for generating ESGs. For each setting, we determine the value of a target by drawing a number uniformly within [0,1]01[0,1][ 0 , 1 ]999In our full version [6], we analyze supplementary scenarios, reinforcing similar conclusions to those presented here.:

  1. 1.

    Default (Def): For each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], we set Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 with probability 0.20.20.20.2.

  2. 2.

    Euclidean (Euc): Each target tiTsubscript𝑡𝑖𝑇t_{i}\in Titalic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_T and each sensor sjSsubscript𝑠𝑗𝑆s_{j}\in Sitalic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_S are uniformly sampled points in [0,1]×[0,1]0101[0,1]\times[0,1][ 0 , 1 ] × [ 0 , 1 ]. A sensor can sense a target (i.e., Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1) if the Euclidean distance between their points is below 0.30.30.30.3.

  3. 3.

    RandomLevel (Rand): Each target tiTsubscript𝑡𝑖𝑇t_{i}\in Titalic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_T has a difficulty level disubscript𝑑𝑖d_{i}italic_d start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT uniformly sampled from [0,1]01[0,1][ 0 , 1 ], and each sensor sjSsubscript𝑠𝑗𝑆s_{j}\in Sitalic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_S has a skill level sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT uniformly sampled from [0,1]01[0,1][ 0 , 1 ]. For each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], we set Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 with probability (1di)sj1subscript𝑑𝑖subscript𝑠𝑗(1-d_{i})\cdot s_{j}( 1 - italic_d start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) ⋅ italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT.

In all our experiments, if not stated otherwise, we average over 50505050 instances generated according to one of the models. We present our experimental results as tables where each entry contains Blue’s average utility (i.e., the summed value of not-sensed targets) from the computed target ordering assuming Red best responds and the average running time in seconds in italics, both followed by their respective standard deviations. Note that standard deviations are calculated across the different sampled instances, implying that independent of the solution method some non-trivial standard deviation is to be expected, as certain instances are more favorable for Blue than others.

We analyze the maximum size of instances that we can solve exactly using the bilevel program, which we denote as OPT. We present results for the Default game setting in Table 3 (results for other simulated game settings are similar). It turns out that while instances with 5555 targets can be solved within a second by OPT, instances with 9999 targets take already around 9999 hours to solve. This demonstrates that the bilevel program is only usable for quite small instances. Moreover, we observe the to-be-expected trend that Blue’s utility increases when Blue has more targets or Red has less sensors. However, we do not find any consistent trend regarding whether it is more advantageous for Blue: more targets or fewer sensors.

Motivated by the high computational cost of the bilevel program, we now turn to analyzing the quality of our heuristics. We also include the Random method here as a baseline where Blue simply picks an arbitrary ordering of targets (and Red best responds to it). In addition, we compare our heuristics against a naive random strategy of comparable computational cost. For this, we include the Random2 method which generates 3000300030003000 random orderings for Table 3 and 31073superscript1073\cdot 10^{7}3 ⋅ 10 start_POSTSUPERSCRIPT 7 end_POSTSUPERSCRIPT random orderings for Table 3. The sampled ordering that achieves the highest utility for Blue assuming that Red best responds is returned.

#targets #sensors 2 3 5
5 1.79 ±plus-or-minus\pm± 0.71, 0.61 ±plus-or-minus\pm± 0.21 1.55 ±plus-or-minus\pm± 0.65, 0.77 ±plus-or-minus\pm± 0.02 1.02±plus-or-minus\pm± 0.62, 0.98 ±plus-or-minus\pm± 0.04
7 2.41 ±plus-or-minus\pm± 0.78, 102 ±plus-or-minus\pm± 36 2.29 ±plus-or-minus\pm± 0.80, 116 ±plus-or-minus\pm± 31 1.62±plus-or-minus\pm± 0.72, 140 ±plus-or-minus\pm± 29
8 2.96 ±plus-or-minus\pm± 0.81, 1501 ±plus-or-minus\pm± 354 2.33 ±plus-or-minus\pm± 0.74, 1760 ±plus-or-minus\pm± 38 1.7 ±plus-or-minus\pm± 0.69, 1814 ±plus-or-minus\pm± 23
9 n/a, 31358 n/a, 32541 n/a, 35376
Table 1: Scalability test of bilevel-program (OPT) for Default game setting with τ=2𝜏2\tau=2italic_τ = 2. For n=9𝑛9n=9italic_n = 9, we report running time for one instance. For all tables: each entry shows Blue’s average utility (top) and running time in seconds (bottom).
Algo. Setting Def Euc Rand
OPT 2.29 ±plus-or-minus\pm± 0.80, 116 ±plus-or-minus\pm± 31 1.952 ±plus-or-minus\pm± 0.74, 126±plus-or-minus\pm± 2.29 2.09 ±plus-or-minus\pm± 0.87, 120 ±plus-or-minus\pm± 25
SA 2.29 ±plus-or-minus\pm± 0.80, 4.78 ±plus-or-minus\pm± 0.38 1.951 ±plus-or-minus\pm± 0.75, 4.96 ±plus-or-minus\pm± 0.47 2.09 ±plus-or-minus\pm± 0.87, 5.03 ±plus-or-minus\pm± 0.69
SA_Relax 2.29 ±plus-or-minus\pm± 0.80, 0.81 ±plus-or-minus\pm± 0.03 1.952 ±plus-or-minus\pm± 0.74, 0.84 ±plus-or-minus\pm± 0.05 2.09 ±plus-or-minus\pm± 0.87, 0.85 ±plus-or-minus\pm± 0.08
Random 2.16 ±plus-or-minus\pm± 0.84, 0.001 1.71 ±plus-or-minus\pm± 0.83, 0.001 1.93 ±plus-or-minus\pm± 0.92, 0.001
Random2 2.29 ±plus-or-minus\pm± 0.80, 5.13 ±plus-or-minus\pm± 0.16 1.952 ±plus-or-minus\pm± 0.74, 5.25 ±plus-or-minus\pm± 0.33 2.09 ±plus-or-minus\pm± 0.87, 5.3 ±plus-or-minus\pm± 0.46
Table 2: Comparison of algorithms to compute Blue’s utility for different simulated game settings, where n=7𝑛7n=7italic_n = 7, k=3𝑘3k=3italic_k = 3, and τ=2𝜏2\tau=2italic_τ = 2.
Algo. Setting Def Euc Rand
SA 15.96 ±plus-or-minus\pm± 1.1, 28101 ±plus-or-minus\pm± 563 18.4 ±plus-or-minus\pm± 2.1, 27755 ±plus-or-minus\pm± 928 17.3 ±plus-or-minus\pm± 4.2, 27970 ±plus-or-minus\pm± 1136
SA_Relax 8.76 ±plus-or-minus\pm± 0.9, 49.6 ±plus-or-minus\pm± 2.57 10.53 ±plus-or-minus\pm± 2.32, 47.5 ±plus-or-minus\pm± 0.86 12.3 ±plus-or-minus\pm± 3.6, 49.7 ±plus-or-minus\pm± 1.6
Random 6.19 ±plus-or-minus\pm± 1.26, 0.001 6.86 ±plus-or-minus\pm± 2.25, 0.001 9.68 ±plus-or-minus\pm± 2.78, 0.001
Random2 8.27 ±plus-or-minus\pm± 0.73, 25036 ±plus-or-minus\pm± 311 9.54 ±plus-or-minus\pm± 2.45, 24333 ±plus-or-minus\pm± 211 11.68 ±plus-or-minus\pm± 3.58, 26810 ±plus-or-minus\pm± 295
Table 3: Comparison of algorithms to compute Blue’s utility for different simulated game settings, where n=75𝑛75n=75italic_n = 75, k=10𝑘10k=10italic_k = 10, and τ=5𝜏5\tau=5italic_τ = 5. We generate 9999 instances per method.

In Table 3, we show the algorithms’ performance for small instances where we can still compute Blue’s maximum utility (OPT) via the bilevel program. In Table 3, we consider larger instances where the optimum value is unknown. Note that higher values correspond to a better performance of the algorithm, as we always report Blue’s utility for Red’s best response.

From the results in Table 3, we can see that all heuristics perform well on small instances. In particular, SA_Relax, SA, and Random2 find the optimal solution in all (but one) cases. However, SA_Relax proves advantageous because it only needs a sixth of the running time of the other two methods.

While our two heuristics SA and SA_Relax show a similar approximation quality for small instances, for larger instances (Table 3) SA clearly outperforms SA_Relax. For the Default game setting, using SA compared to SA_Relax even regularly leads to a doubled utility for Blue. While this is a strong argument for using SA, SA’s downside is its higher computational cost, needing over 7777 hours to solve instances with 75757575 targets.

Finally, we observe that both methods clearly outperform the Random baseline, with SA consistently preserving an average of approximately 20 more targets for the larger instances. This highlights that the solution quality of the target ordering clearly increases throughout the simulated annealing. Considering Random2, we find that repeatedly sampling orders (instead of only once) leads to a noticeable utility increase. However, on the larger instances, Random2 performs even worse than SA_Relax while running as long as SA, thereby combining the disadvantages of SA and SA_Relax. Overall, our experiments highlight that Blue benefits from ordering the targets strategically instead of randomly.

6 Escape from Non-Coordinated Sensing

ESGs assume that the different sensors are controlled by a central authority that computes the sensing plan. We now investigate the situation where these sensors are non-coordinated and each one acts independently based on a natural greedy algorithm. This happens when sensors cannot easily exchange information and coordinate with each other. Another motivation is when sensors are controlled by different adversaries, each serving only their own interests and being unlikely to coordinate their actions and share their reward. Both of these scenarios can occur in our motivating domain of piracy at large open seas, as coordination between different groups is likely to be challenging. Different pirate groups might even refuse to coordinate at all and instead directly compete with each other.

We model these situations by assuming that sensors have a predefined ordering as s1,,sksubscript𝑠1subscript𝑠𝑘s_{1},\dots,s_{k}italic_s start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_s start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT (as induced by fixed locations of the sensors); for each sensor sS𝑠𝑆s\in Sitalic_s ∈ italic_S, as soon as a not previously sensed target that s𝑠sitalic_s can sense passes s𝑠sitalic_s (i.e., s𝑠sitalic_s has the capabilities and is currently not recharging), s𝑠sitalic_s senses it, thereby greedily maximizing its number of sensed targets.

Formally, given a target ordering σ𝜎\sigmaitalic_σ, we construct a sensing plan ψσsubscript𝜓𝜎\psi_{\sigma}italic_ψ start_POSTSUBSCRIPT italic_σ end_POSTSUBSCRIPT sequentially as follows. For each step [n+k1]delimited-[]𝑛𝑘1\ell\in[n+k-1]roman_ℓ ∈ [ italic_n + italic_k - 1 ], if target tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT passes sensor sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT in step \ellroman_ℓ, then we add tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to ψσ(sj)subscript𝜓𝜎subscript𝑠𝑗\psi_{\sigma}(s_{j})italic_ψ start_POSTSUBSCRIPT italic_σ end_POSTSUBSCRIPT ( italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) if the resulting sensing plan remains valid with respect to σ𝜎\sigmaitalic_σ (formally, for i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ] target σ1(i)superscript𝜎1𝑖\sigma^{-1}(i)italic_σ start_POSTSUPERSCRIPT - 1 end_POSTSUPERSCRIPT ( italic_i ) passes sensor sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT in step i+j1𝑖𝑗1i+j-1italic_i + italic_j - 1). As the strategy of Red is fixed, the problem Best Blue Response Blue faces is to pick a target ordering σ𝜎\sigmaitalic_σ so that v(ψσ)𝑣subscript𝜓𝜎v(\psi_{\sigma})italic_v ( italic_ψ start_POSTSUBSCRIPT italic_σ end_POSTSUBSCRIPT ) gets maximized. In the following, we study the computational complexity of this problem and solve it in computational experiments. By comparing the answer of Best Blue Response to the value of the Stackelberg equilibrium in the corresponding ESG we can ultimately answer how much Red gains from being able to centrally control its sensors.

6.1 Algorithmic Analysis

Unfortunately, it turns out that computing Blue’s strategy is NP-hard, even in restricted cases where each sensor can only sense one target. Due to the sequential construction of Red’s sensing plan, this reduction is our most intricate one:

Theorem 6.

Best Blue Response is NP-complete, even if the recharging time is \infty, i.e., each sensor can sense only one target, each target has value 1111, and the sum of each row and column in the sensing matrix is at most four.

Proof Sketch.

We focus on the variant where each sensor can only sense one target. Interestingly, as discussed in more detail in our full version [6] this problem shares some similarities with the NP-hard Minimum Maximal Matching problem, as we can view the sensors and targets as two sides of a bipartite graph with sensor-target pairs where the sensor senses the target corresponding to maximal matchings in this graph. However, the ordering of the sensors makes only certain maximal matchings in these graphs realizable, which is why we instead show NP-hardness by reducing from a variant of 3-SAT where each variable appears only twice positive and once negative. The core idea of our construction is the following: We add a literal target for each literal. Moreover, for each clause, we add a clause sensor and a clause target. The clause sensor is capable of sensing the corresponding clause target as well as targets corresponding to the three literals appearing in the clause. We add further targets and sensors to the instance so that all clause targets need to make it unsensed through the channel. This implies that each clause sensor needs to sense a literal target as it will otherwise sense the corresponding clause target in passing, i.e., we need to “cover” each clause with a literal appearing in the clause. Now for each variable, we add a slightly intricate gadget that ensures that we can either use the targets corresponding to positive literals to cover clause sensors (which corresponds to setting the variable to true) or the one target corresponding to a negative literal (which corresponds to setting the variable to false). Because we need to “cover” each clause, the induced assignment is satisfying. ∎

We can adopt a similar view as in Proposition 2 to solve the problem via dynamic programming. However, this time the dynamic programming iteratively constructs the optimal target ordering and we need to keep track of the previously used targets together with the sensors used in the last τ+1𝜏1\tau+1italic_τ + 1 timesteps. This results in a naive running time of 𝒪(n2n(k+1)τ+2)𝒪𝑛superscript2𝑛superscript𝑘1𝜏2\mathcal{O}(n\cdot 2^{n}\cdot(k+1)^{\tau+2})caligraphic_O ( italic_n ⋅ 2 start_POSTSUPERSCRIPT italic_n end_POSTSUPERSCRIPT ⋅ ( italic_k + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT ), which can be improved to 𝒪(nχ(i=1nχ(i+1))(k+1)τ+2)𝒪subscript𝑛𝜒superscriptsubscriptproduct𝑖1subscript𝑛𝜒subscript𝑖1superscript𝑘1𝜏2\mathcal{O}\left(n_{\chi}\cdot\left(\prod_{i=1}^{n_{\chi}}(\ell_{i}+1)\right)% \cdot(k+1)^{\tau+2}\right)caligraphic_O ( italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ⋅ ( ∏ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ( roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + 1 ) ) ⋅ ( italic_k + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT ) if we incorporate types:

Proposition 7.

Best Blue Response is solvable in 𝒪(nχ(i=1nχ(i+1))(k+1)τ+2)𝒪subscript𝑛𝜒superscriptsubscriptproduct𝑖1subscript𝑛𝜒subscript𝑖1superscript𝑘1𝜏2\mathcal{O}\left(n_{\chi}\cdot\left(\prod_{i=1}^{n_{\chi}}(\ell_{i}+1)\right)% \cdot(k+1)^{\tau+2}\right)caligraphic_O ( italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ⋅ ( ∏ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ( roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + 1 ) ) ⋅ ( italic_k + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT ), where isubscript𝑖\ell_{i}roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is the number of targets of type γisubscript𝛾𝑖\gamma_{i}italic_γ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

6.1.1 ILP Formulation

Constructing an ILP for Best Blue Response turns out to be slightly more challenging, as we need to encode Red’s greedy sequential behavior:

Proposition 8.

There is an ILP formulation for Best Blue Response with 𝒪(n2k)𝒪superscript𝑛2𝑘\mathcal{O}(n^{2}\cdot k)caligraphic_O ( italic_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ⋅ italic_k ) binary variables, 𝒪(n)𝒪𝑛\mathcal{O}(n)caligraphic_O ( italic_n ) integer variables, and 𝒪(n2k)𝒪superscript𝑛2𝑘\mathcal{O}(n^{2}\cdot k)caligraphic_O ( italic_n start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT ⋅ italic_k ) constraints.

Proof Sketch.

We introduce for each target i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] an integer variable zisubscript𝑧𝑖z_{i}italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT encoding the position in which the target appears. Moreover, similar to Proposition 3, for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k+1]𝑗delimited-[]𝑘1j\in[k+1]italic_j ∈ [ italic_k + 1 ], we add a binary variable xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT, which encodes whether tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is sensed by sensor sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT or whether the target makes it unsensed through the channel (for j=k+1𝑗𝑘1j=k+1italic_j = italic_k + 1). We can add mostly straightforward constraints to ensure that xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT respects recharging times. The main challenge is to encode the greedy behavior of the sensors (i.e., the ILP cannot have the freedom to pick the xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT values arbitrarily to optimize Blue’s utility but they are set according to sensors’ greedy behavior). For this, for each i,i[n]𝑖superscript𝑖delimited-[]𝑛i,i^{\prime}\in[n]italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], we add a binary variable yi,i,jsubscript𝑦𝑖superscript𝑖𝑗y_{i,i^{\prime},j}italic_y start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT and add constraints so that yi,i,jsubscript𝑦𝑖superscript𝑖𝑗y_{i,i^{\prime},j}italic_y start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT is equal to one if target i𝑖iitalic_i is sensed by sensor j𝑗jitalic_j and because of this j𝑗jitalic_j recharges when isuperscript𝑖i^{\prime}italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is passing, i.e., i𝑖iitalic_i “covers” isuperscript𝑖i^{\prime}italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT.

To encode sensors’ greedy behavior, we want to add a constraint that makes sure that in case xi,j=1subscript𝑥𝑖𝑗1x_{i,j}=1italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1, the target needs to be covered by other targets for all sensors that are capable of sensing it placed before j𝑗jitalic_j. Note that this together with another constraint (j[k+1]xi,j=1subscript𝑗delimited-[]𝑘1subscript𝑥𝑖𝑗1\sum_{j\in[k+1]}x_{i,j}=1∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_k + 1 ] end_POSTSUBSCRIPT italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1) in particular implies that each target is sensed by the first sensor it passes which is not recharging, thereby encoding the greedy behavior of sensors. Specifically, for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k+1]𝑗delimited-[]𝑘1j\in[k+1]italic_j ∈ [ italic_k + 1 ], we add:

t[j1]:Di,t=01+limit-fromsubscript:𝑡delimited-[]𝑗1subscript𝐷𝑖𝑡01\displaystyle\sum_{t\in[j-1]:D_{i,t}=0}1+∑ start_POSTSUBSCRIPT italic_t ∈ [ italic_j - 1 ] : italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 0 end_POSTSUBSCRIPT 1 + t[j1]:Di,t=1i[n]yi,i,t(j1)subscript:𝑡delimited-[]𝑗1subscript𝐷𝑖𝑡1subscriptsuperscript𝑖delimited-[]𝑛subscript𝑦superscript𝑖𝑖𝑡𝑗1\displaystyle\sum_{t\in[j-1]:D_{i,t}=1}\sum_{i^{\prime}\in[n]}y_{i^{\prime},i,% t}-(j-1)∑ start_POSTSUBSCRIPT italic_t ∈ [ italic_j - 1 ] : italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] end_POSTSUBSCRIPT italic_y start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_i , italic_t end_POSTSUBSCRIPT - ( italic_j - 1 ) (1)
n(1t=jk+1xi,t).absent𝑛1superscriptsubscript𝑡𝑗𝑘1subscript𝑥𝑖𝑡\displaystyle\geq-n(1-\sum_{t=j}^{k+1}x_{i,t}).≥ - italic_n ( 1 - ∑ start_POSTSUBSCRIPT italic_t = italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k + 1 end_POSTSUPERSCRIPT italic_x start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) .

6.1.2 Heuristic

Since it will turn out that the ILP formulation cannot quickly solve medium-to-large instances, we explore various simulated annealing-based heuristics, similar to the approach discussed in Section 5. We present the variant SA_Relax where a random neighbor is picked in Algorithm 2. The other variant SA computes Blue’s utility v(ψσ^)𝑣subscript𝜓^𝜎v(\psi_{\hat{\sigma}})italic_v ( italic_ψ start_POSTSUBSCRIPT over^ start_ARG italic_σ end_ARG end_POSTSUBSCRIPT ) for all neighbors and picks the one with the highest utility.

Algorithm 2 SA_Relax for Best Blue Response

Input: Initial target ordering σ𝜎\sigmaitalic_σ and temperature T=100𝑇100T=100italic_T = 100

1:  while T>0.00001𝑇0.00001T>0.00001italic_T > 0.00001 do
2:     Select a random neighbor σ^N(σ)^𝜎𝑁𝜎\hat{\sigma}\in N(\sigma)over^ start_ARG italic_σ end_ARG ∈ italic_N ( italic_σ ).
3:     if ev(ψσ^)v(ψσ)T>superscript𝑒𝑣subscript𝜓^𝜎𝑣subscript𝜓𝜎𝑇absente^{\frac{v(\psi_{\hat{\sigma}})-v(\psi_{\sigma})}{T}}>italic_e start_POSTSUPERSCRIPT divide start_ARG italic_v ( italic_ψ start_POSTSUBSCRIPT over^ start_ARG italic_σ end_ARG end_POSTSUBSCRIPT ) - italic_v ( italic_ψ start_POSTSUBSCRIPT italic_σ end_POSTSUBSCRIPT ) end_ARG start_ARG italic_T end_ARG end_POSTSUPERSCRIPT > random[0, 1] then
4:        σ:=σ^assign𝜎^𝜎\sigma:=\hat{\sigma}italic_σ := over^ start_ARG italic_σ end_ARG.
5:     T:=T0.9assign𝑇𝑇0.9T:=T\cdot 0.9italic_T := italic_T ⋅ 0.9.
6:  Return σ𝜎\sigmaitalic_σ.

6.2 Experiments

We reuse the general setup described in Section 5, but naturally now report Blue’s computed utility assuming that sensors act greedily. Here, we let the Random2 method generate 1000100010001000 random orderings in Table 6 and 51055superscript1055\cdot 10^{5}5 ⋅ 10 start_POSTSUPERSCRIPT 5 end_POSTSUPERSCRIPT random orderings in Table 6.

First of all, we evaluate the scalability of our ILP for Best Blue Response (OPT) in Table 6. The ILP can solve the problem for medium-sized instances with up to 25252525 targets in a few minutes. However, due to the complexity of the ILP modeling, already for 25252525 targets as soon as the number of sensors reaches 5555, instances can take more than 5555 hours to solve. This is why the last line of the table only reports the running time for one instance.

#targets #sensors 2 3 5
5 2 ±plus-or-minus\pm± 0.68, 0.007 ±plus-or-minus\pm± 0.005 1.71 ±plus-or-minus\pm± 0.57, 0.009 ±plus-or-minus\pm± 0.005 1.32±plus-or-minus\pm± 0.52, 0.01 ±plus-or-minus\pm± 0.003
15 6.6 ±plus-or-minus\pm± 1, 0.14 ±plus-or-minus\pm± 0.35 6.29 ±plus-or-minus\pm± 0.9, 0.32 ±plus-or-minus\pm± 0.88 5.46 ±plus-or-minus\pm± 0.87, 6.85 ±plus-or-minus\pm± 22.9
20 9.05 ±plus-or-minus\pm± 1.13, 0.52 ±plus-or-minus\pm± 2.94 8.49 ±plus-or-minus\pm± 1.01, 1.58 ±plus-or-minus\pm± 4.4 7.56 ±plus-or-minus\pm± 1.01, 229 ±plus-or-minus\pm± 1261
25 11.38 ±plus-or-minus\pm± 1.26, 6.8 ±plus-or-minus\pm± 30.6 10.96 ±plus-or-minus\pm± 1.29, 283 ±plus-or-minus\pm± 1771 n/a, 22537
Table 4: Scalability test of ILP (OPT) for Default game setting with τ=2𝜏2\tau=2italic_τ = 2. For all tables: each entry shows Blue’s average utility (top) and running time in seconds (bottom).
Algo. Setting Def Euc Rand
OPT 3.1±plus-or-minus\pm± 0.86, 0.15 ±plus-or-minus\pm± 0.37 3.25±plus-or-minus\pm± 0.79, 0.25 ±plus-or-minus\pm± 0.71 3.04 ±plus-or-minus\pm± 0.78, 3.26 ±plus-or-minus\pm± 8.77
SA 2.83 ±plus-or-minus\pm± 0.81, 0.7±plus-or-minus\pm± 0.02 2.92 ±plus-or-minus\pm± 0.81, 0.71 ±plus-or-minus\pm± 0.02 2.72 ±plus-or-minus\pm± 0.8, 0.71 ±plus-or-minus\pm± 0.018
SA_Relax 3.06 ±plus-or-minus\pm± 0.88, 0.02 3.17 ±plus-or-minus\pm± 0.81, 0.02 2.89 ±plus-or-minus\pm± 0.82, 0.02
Random 1.9 ±plus-or-minus\pm± 0.72, 0.001 2.15 ±plus-or-minus\pm± 0.9, 0.001 1.9 ±plus-or-minus\pm± 0.9, 0.001
Random2 2.91 ±plus-or-minus\pm± 0.87, 0.81 ±plus-or-minus\pm± 0.0004 3.11 ±plus-or-minus\pm± 0.79, 0.81 ±plus-or-minus\pm± 0.0004 2.89 ±plus-or-minus\pm± 0.78, 0.83 ±plus-or-minus\pm± 0.0004
Table 5: Comparison of algorithms for Best Blue Response for different game settings, where n=10𝑛10n=10italic_n = 10, k=5𝑘5k=5italic_k = 5, and τ=2𝜏2\tau=2italic_τ = 2.
Algo. Setting Def Euc Rand
SA 16.57 ±plus-or-minus\pm± 1.64, 485 ±plus-or-minus\pm± 20 17.2 ±plus-or-minus\pm± 2.4, 470 ±plus-or-minus\pm± 9.6 17.54 ±plus-or-minus\pm± 3.27, 503 ±plus-or-minus\pm± 20
SA_Relax 12.3 ±plus-or-minus\pm± 1.58, 3.14 ±plus-or-minus\pm± 0.35 13.11 ±plus-or-minus\pm± 2.62, 2.84 ±plus-or-minus\pm± 0.2 14.47 ±plus-or-minus\pm± 2.96, 2.95 ±plus-or-minus\pm± 0.2
Random 9.2 ±plus-or-minus\pm± 1.99, 0.001 10.02 ±plus-or-minus\pm± 2.77, 0.001 11.67 ±plus-or-minus\pm± 3.07, 0.001
Random2 12.75 ±plus-or-minus\pm± 1.03, 458 ±plus-or-minus\pm± 15 12.98 ±plus-or-minus\pm± 2.37, 437 ±plus-or-minus\pm± 13 14.67 ±plus-or-minus\pm± 3.18, 496 ±plus-or-minus\pm± 19
Table 6: Comparison of algorithms for Best Blue Response for different game settings, where n=75𝑛75n=75italic_n = 75, k=10𝑘10k=10italic_k = 10, and τ=5𝜏5\tau=5italic_τ = 5.

Next, we analyze the solution quality of our heuristic approaches. On small instances presented in Table 6, our best heuristic algorithm approximates the optimal solution quite well and the error is typically below 10%percent1010\%10 % with the SA_Relax method consistently outperforming SA. Both heuristics outperform Random, while Random2 performs better than SA (yet still worse than SA_Relax, while having a much longer running time). When moving to larger instances in Table 6, the picture flips, as SA is now substantially outperforming SA_Relax. This shows a general trend that the solution quality of SA scales more favorably than that of SA_Relax (while the opposite is naturally true for the running time). The heuristics again clearly outperform Random, with SA sensing approximately 15151515 more targets. Random 2 performs similarly to the suboptimal heuristic SA_Relax, while being slower by a factor of more than 100100100100.

Finally, we are interested in exploring the power of coordination for Red, i.e., the difference between the optimal utility Blue gets in the non-coordinated setting explored in this section compared to its utility in the Stackelberg equilibria from Section 5. We find that for the small instances where we can compute the Stackelberg equilibrium exactly Red can reduce Blue’s utility by 10%percent1010\%10 % to 20%percent2020\%20 % through coordination. For larger instance sizes, we no longer know the optimal solutions, which is why we resort to comparing the results of the respective SA heuristics. We find that for larger instances, the gap decreases with Red being only able to decrease Blue’s utility by 5%percent55\%5 % through coordination in the instances from the Default setting underlying Table 3. In our full version [6], we show that when Red’s sensors are capable of sensing more targets, coordination is more important sometimes leading to halving Blue’s utility.

7 Conclusion

By introducing Espace Sensing Games, we initiated the study of a new class of games concerned with target arrangement and motivated by security applications. We showed that while the worst-case computational complexity of ESGs is prohibitive, our presented algorithms still have a good performance in experiments.

There are multiple directions for future work emanating from our work. First, pinpointing the precise complexity of computing Stackelberg equilibria remains a concrete open question. Second, there are other variants of ESGs beyond those studied by us. For instance, it would be possible to merge the settings studied in Sections 4 and 6 into a game where sensors act greedily but Red can control the ordering of the sensors. In this game variant where both Red and Blue need to pick orders, it would also be possible to study simultaneous play or Stackelberg equilibria where Red moves first. Lastly, there are various other target arrangement problems to be studied. One example could be a game where Blue needs to place targets on a grid and Red cannot sense any two targets placed close to each other.

Acknowledgements

This work was supported by the Office of Naval Research (ONR) under Grant Number N00014-23-1-2802. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the Office of Naval Research or the U.S. Government.

References

  • [1] Lukás Adam, Rostislav Horcík, Tomás Kasl, and Tomás Kroupa. Double oracle algorithm for computing equilibria in continuous games. In AAAI, pages 5070–5077, 2021.
  • [2] Gemayqzel Bouza Allende and Georg Still. Solving bilevel programs with the kkt-approach. Math. Program, 138:309–332, 2013.
  • [3] Evripidis Bampis, Konstantinos Dogeas, Alexander V Kononov, Giorgio Lucarelli, and Fanny Pascual. Scheduling with untrusted predictions. In IJCAI, pages 4581–4587, 2022.
  • [4] Soheil Behnezhad, Avrim Blum, Mahsa Derakhshan, MohammadTaghi HajiAghayi, Mohammad Mahdian, Christos H Papadimitriou, Ronald L Rivest, Saeed Seddighin, and Philip B Stark. From battlefields to elections: Winning strategies of blotto and auditing games. In SODA, pages 2291–2310, 2018.
  • [5] Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel Procaccia, and Arunesh Sinha. Audit games with multiple defender resources. In AAAI, pages 791–797, 2015.
  • [6] Niclas Boehmer, Minbiao Han, Haifeng Xu, and Milind Tambe. Escape sensing games: Detection-vs-evasion in security applications. CoRR, abs/XXXX, 2024.
  • [7] Victor Bucarey, Carlos Casorrán, Óscar Figueroa, Karla Rosas, Hugo Navarrete, and Fernando Ordóñez. Building real Stackelberg security games for border patrols. In GameSec, pages 193–212, 2017.
  • [8] Martin Chapman, Gareth Tyson, Peter McBurney, Michael Luck, and Simon Parsons. Playing hide-and-seek: an abstract game for cyber security. In ACySE, pages 1–8, 2014.
  • [9] Benoît Colson, Patrice Marcotte, and Gilles Savard. An overview of bilevel optimization. Annals of operations research, 153:235–256, 2007.
  • [10] John H. Conway. On numbers and games, Second Edition. Academic Press, 2001.
  • [11] James M Crawford and Andrew B Baker. Experimental results on the application of satisfiability algorithms to scheduling problems. In AAAI, pages 1092–1097, 1994.
  • [12] Erik D. Demaine. Playing games with algorithms: Algorithmic combinatorial game theory. In MFCS, pages 18–32, 2001.
  • [13] Stephan Dempe and Alain Zemkoho. Bilevel optimization. In Springer optimization and its applications, volume 161. Springer, 2020.
  • [14] Fei Fang, Thanh Nguyen, Benjamin Ford, Nicole Sintov, and Milind Tambe. Introduction to green security games. In IJCAI, 2015.
  • [15] Gurobi Optimization, LLC. Gurobi Optimizer Reference Manual, 2022.
  • [16] Venkatesan Guruswami, C. Pandu Rangan, Maw-Shang Chang, Gerard J. Chang, and C. K. Wong. The vertex-disjoint triangles problem. In WG, pages 26–37, 1998.
  • [17] Manish Jain, Dmytro Korzhyk, Ondrej Vanek, Vincent Conitzer, Michal Pechoucek, and Milind Tambe. A double oracle algorithm for zero-sum security games on graphs. In AAMAS, pages 327–334, 2011.
  • [18] Jan Karel Lenstra, AHG Rinnooy Kan, and Peter Brucker. Complexity of machine scheduling problems. In Annals of discrete mathematics, volume 1, pages 343–362. Elsevier, 1977.
  • [19] Yuqian Li, Vincent Conitzer, and Dmytro Korzhyk. Catcher-evader games. In IJCAI, pages 329–337, 2016.
  • [20] Christof Löding and Philipp Rohde. Solving the sabotage game is PSPACE-hard. In MFCS, pages 531–540, 2003.
  • [21] Eric Shieh, Bo An, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo, Ben Maule, and Garrett Meyer. Protect: A deployed game theoretic system to protect the ports of the united states. In AAMAS, pages 13–20, 2012.
  • [22] Evan Sultanik, Pragnesh Jay Modi, and William C Regli. On modeling multiagent task scheduling as a distributed constraint optimization problem. In IJCAI, pages 1531–1536, 2007.
  • [23] Sahar Tahernejad, Ted K Ralphs, and Scott T DeNegre. A branch-and-cut algorithm for mixed integer bilevel linear optimization problems and its implementation. Math. Program. Comput., 12:529–568, 2020.
  • [24] Milind Tambe. Security and game theory: algorithms, deployed systems, lessons learned. Cambridge university press, 2011.
  • [25] UN-News. Somalia: Pirates attack UN aid ship, prompting call for action, June 2007. https://reliefweb.int/report/somalia/somalia-pirates-attack-un-aid-ship-prompting-call-action.
  • [26] United-Nation. United nations peacekeeping missions military maritime task force manual, Sept 2015.
  • [27] Ondřej Vaněk, Zhengyu Yin, Manish Jain, Branislav Bošanskỳ, Milind Tambe, and Michal Pěchouček. Game-theoretic resource allocation for malicious packet detection in computer networks. In AAMAS, pages 905–912, 2012.
  • [28] John I Winn and Kevin H Govern. Maritime pirates, sea robbers, and terrorists: New approaches to emerging threats. Homeland Security Rev., 2:131, 2008.
  • [29] Mihalis Yannakakis. Edge-deletion problems. SIAM J. Comput., 10(2):297–309, 1981.
  • [30] Mihalis Yannakakis and Fanica Gavril. Edge dominating sets in graphs. SIAM J. Appl. Math., 38(3):364–372, 1980.
  • [31] Chongjie Zhang and Julie A Shah. Co-optimizating multi-agent placement with task assignment and scheduling. In IJCAI, pages 3308–3314, 2016.

Appendix A Additional Material for Section 4.1

See 2

Proof.

For our dynamic program, we create a table J[i,b1,,bτ+1]𝐽𝑖subscript𝑏1subscript𝑏𝜏1J[i,b_{1},\dots,b_{\tau+1}]\in\mathbb{N}italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] ∈ blackboard_N for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and b1,,bτ+1S{}subscript𝑏1subscript𝑏𝜏1𝑆b_{1},\dots,b_{\tau+1}\in S\cup\{\emptyset\}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ∈ italic_S ∪ { ∅ }. J[i,b1,,bτ+1]𝐽𝑖subscript𝑏1subscript𝑏𝜏1J[i,b_{1},\dots,b_{\tau+1}]italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] stores the minimum value of surviving target from t1,,tisubscript𝑡1subscript𝑡𝑖t_{1},\dots,t_{i}italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT induced by a valid sensing plan ψ𝜓\psiitalic_ψ that for each j[max(1,iτ),i]𝑗1𝑖𝜏𝑖j\in[\max(1,i-\tau),i]italic_j ∈ [ roman_max ( 1 , italic_i - italic_τ ) , italic_i ] assigns target tjsubscript𝑡𝑗t_{j}italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT to sensor bij+1subscript𝑏𝑖𝑗1b_{i-j+1}italic_b start_POSTSUBSCRIPT italic_i - italic_j + 1 end_POSTSUBSCRIPT if bjsubscript𝑏𝑗b_{j}\neq\emptysetitalic_b start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≠ ∅ and to no sensor if bj=subscript𝑏𝑗b_{j}=\emptysetitalic_b start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = ∅. In this case, we say that ψ𝜓\psiitalic_ψ witnesses the table entry. If no such sensing plan exists, J[i,b1,,bτ+1]𝐽𝑖subscript𝑏1subscript𝑏𝜏1J[i,b_{1},\dots,b_{\tau+1}]italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] is \infty. Clearly, the answer to the problem is minb1,,bτ+1S{}J[n,b1,,bτ+1]subscriptsubscript𝑏1subscript𝑏𝜏1𝑆𝐽𝑛subscript𝑏1subscript𝑏𝜏1\min_{b_{1},\dots,b_{\tau+1}\in S\cup\{\emptyset\}}J[n,b_{1},\dots,b_{\tau+1}]roman_min start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ∈ italic_S ∪ { ∅ } end_POSTSUBSCRIPT italic_J [ italic_n , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ].

For the initialization, we set an entry J[i,b1,,bτ+1]𝐽𝑖subscript𝑏1subscript𝑏𝜏1J[i,b_{1},\dots,b_{\tau+1}]italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] to 00 if i=0𝑖0i=0italic_i = 0 and to \infty otherwise. Now, we update the table for increasing i=0,1,,n𝑖01𝑛i=0,1,\dots,nitalic_i = 0 , 1 , … , italic_n by filling J[i,b1,,bτ+1]𝐽𝑖subscript𝑏1subscript𝑏𝜏1J[i,b_{1},\dots,b_{\tau+1}]italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] as follows. We start by assuming that b1subscript𝑏1b_{1}\neq\emptysetitalic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ≠ ∅ implying that tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is to be sensed by b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT. In this case, we set the entry to \infty if [2,τ+1]:b1=b:2𝜏1subscript𝑏1subscript𝑏\exists\ell\in[2,\tau+1]:b_{1}=b_{\ell}∃ roman_ℓ ∈ [ 2 , italic_τ + 1 ] : italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = italic_b start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT (i.e., the recharging period of b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT would be violated) or if b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT is not capable of sensing tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. In both cases, there is no sensing plan to witness the entry. Otherwise, we update the entry as:

J[i,b1,,bτ+1]=minsS{}J[i1,b2,,bτ+1,s].𝐽𝑖subscript𝑏1subscript𝑏𝜏1subscript𝑠𝑆𝐽𝑖1subscript𝑏2subscript𝑏𝜏1𝑠J[i,b_{1},\dots,b_{\tau+1}]=\min_{s\in S\cup\{\emptyset\}}J[i-1,b_{2},\dots,b_% {\tau+1},s].italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] = roman_min start_POSTSUBSCRIPT italic_s ∈ italic_S ∪ { ∅ } end_POSTSUBSCRIPT italic_J [ italic_i - 1 , italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT , italic_s ] .

We claim that in case an update of the entry happens here, it is correct. For this, let sS{}superscript𝑠𝑆s^{*}\in S\cup\{\emptyset\}italic_s start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ∈ italic_S ∪ { ∅ } be the minimizer of the right hand side and ψsuperscript𝜓\psi^{*}italic_ψ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT the plan witnessing J[i1,b2,,bτ+1,s]𝐽𝑖1subscript𝑏2subscript𝑏𝜏1superscript𝑠J[i-1,b_{2},\dots,b_{\tau+1},s^{*}]italic_J [ italic_i - 1 , italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ]. Then, we can extend ψsuperscript𝜓\psi^{*}italic_ψ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT to a sensing plan ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT by adding tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT to ψ(b1)superscript𝜓subscript𝑏1\psi^{*}(b_{1})italic_ψ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ( italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ). Plan ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is valid and a witness for the updated entry, since ψsuperscript𝜓\psi^{*}italic_ψ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT is valid and we ruled out above that b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT is either not ready or capable of sensing tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

Lastly, it remains to consider the case b1=subscript𝑏1b_{1}=\emptysetitalic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = ∅, where tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is not assigned to any sensor. In this case, we update the entry as:

J[i,b1,,bτ+1]=minsS{}J[i,b2,,bτ+1,s]+vi.𝐽𝑖subscript𝑏1subscript𝑏𝜏1subscriptsubscript𝑠𝑆𝐽𝑖subscript𝑏2subscript𝑏𝜏1𝑠subscript𝑣𝑖J[i,b_{1},\dots,b_{\tau+1}]=\min_{s_{\in}S\cup\{\emptyset\}}J[i,b_{2},\dots,b_% {\tau+1},s]+v_{i}.italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] = roman_min start_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT ∈ end_POSTSUBSCRIPT italic_S ∪ { ∅ } end_POSTSUBSCRIPT italic_J [ italic_i , italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT , italic_s ] + italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT .

Analogous to above, in case an update happens assume that sS{}superscript𝑠𝑆s^{*}\in S\cup\{\emptyset\}italic_s start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ∈ italic_S ∪ { ∅ } is the minimizer of the right-hand side and ψsuperscript𝜓\psi^{*}italic_ψ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT the plan witnessing J[i1,b2,,bτ+1,s]𝐽𝑖1subscript𝑏2subscript𝑏𝜏1superscript𝑠J[i-1,b_{2},\dots,b_{\tau+1},s^{*}]italic_J [ italic_i - 1 , italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ]. Then ψsuperscript𝜓\psi^{*}italic_ψ start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT is also a witness for the updated entry.

The algorithm runs in 𝒪(n(k+1)τ+2)𝒪𝑛superscript𝑘1𝜏2\mathcal{O}(n\cdot(k+1)^{\tau+2})caligraphic_O ( italic_n ⋅ ( italic_k + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT ), as the table contains 𝒪(n(k+1)τ+1)𝒪𝑛superscript𝑘1𝜏1\mathcal{O}(n\cdot(k+1)^{\tau+1})caligraphic_O ( italic_n ⋅ ( italic_k + 1 ) start_POSTSUPERSCRIPT italic_τ + 1 end_POSTSUPERSCRIPT ) entries and for each entry we need to take the minimum over k+1𝑘1k+1italic_k + 1 values.

For i[kχ]𝑖delimited-[]subscript𝑘𝜒i\in[k_{\chi}]italic_i ∈ [ italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ], let isubscript𝑖\ell_{i}roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT be the number of sensors of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. To extend the algorithm to sensor types, we need to prove the following lemma that allows us to collapse all sensors of the same type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT into a “meta”-sensor, which can sense isubscript𝑖\ell_{i}roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT many targets in each τ𝜏\tauitalic_τ-time window:

Lemma 9.

There is a valid sensing plan of value v𝑣vitalic_v if and only if there is a sensing plan of value v𝑣vitalic_v where sensor capabilities are respected and for each j[1,nτ]𝑗1𝑛𝜏j\in[1,n-\tau]italic_j ∈ [ 1 , italic_n - italic_τ ] at most isubscript𝑖\ell_{i}roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT targets from {tj,,tj+τ}subscript𝑡𝑗subscript𝑡𝑗𝜏\{t_{j},\dots,t_{j+\tau}\}{ italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_j + italic_τ end_POSTSUBSCRIPT } are assigned to a target of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for i[kχ]𝑖delimited-[]subscript𝑘𝜒i\in[k_{\chi}]italic_i ∈ [ italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ].

Proof.

Let ψ𝜓\psiitalic_ψ be a valid sensing plan of value v𝑣vitalic_v. We claim that ψ𝜓\psiitalic_ψ also fulfills the second condition. Assume for the sake of contradiction that there is a θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and some j[1,nτ]𝑗1𝑛𝜏j\in[1,n-\tau]italic_j ∈ [ 1 , italic_n - italic_τ ] so that more than isubscript𝑖\ell_{i}roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT targets from {tj,,tj+τ}subscript𝑡𝑗subscript𝑡𝑗𝜏\{t_{j},\dots,t_{j+\tau}\}{ italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_j + italic_τ end_POSTSUBSCRIPT } are assigned to a target of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT. Then, by the pigeonhole principle, at least one sensor of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT needs to sense two targets within τ𝜏\tauitalic_τ steps, rendering the plan invalid.

For the reverse direction, assume ψ𝜓\psiitalic_ψ is the sensing plan of value v𝑣vitalic_v respecting the condition. For each sensor type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, let Tψ(θi)subscript𝑇𝜓subscript𝜃𝑖T_{\psi}(\theta_{i})italic_T start_POSTSUBSCRIPT italic_ψ end_POSTSUBSCRIPT ( italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) be the targets sensed by sensors of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT in ψ𝜓\psiitalic_ψ. We construct a sensing plan ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT as follows. For each sensor type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT, we iterate over the targets in Tψ(θi)subscript𝑇𝜓subscript𝜃𝑖T_{\psi}(\theta_{i})italic_T start_POSTSUBSCRIPT italic_ψ end_POSTSUBSCRIPT ( italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ) according to their position in the target ordering and always assign a target to the sensor of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT who has not sensed a target for the longest time. ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT has the same value as ψ𝜓\psiitalic_ψ and respects sensor capabilities, so it remains to argue that the recharging periods are respected. For the sake of contradiction assume that there is a sensor of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and some j𝑗jitalic_j so that the sensor is assigned two targets from {tj,,tj+τ}subscript𝑡𝑗subscript𝑡𝑗𝜏\{t_{j},\dots,t_{j+\tau}\}{ italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_j + italic_τ end_POSTSUBSCRIPT } in ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. Then, by the construction of ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT all other sensors of type θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT are also assigned a target from {tj,,tj+τ}subscript𝑡𝑗subscript𝑡𝑗𝜏\{t_{j},\dots,t_{j+\tau}\}{ italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_j + italic_τ end_POSTSUBSCRIPT }. It follows that sensors of θisubscript𝜃𝑖\theta_{i}italic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT are assigned at least i+1subscript𝑖1\ell_{i}+1roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + 1 many targets from {tj,,tj+τ}subscript𝑡𝑗subscript𝑡𝑗𝜏\{t_{j},\dots,t_{j+\tau}\}{ italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_j + italic_τ end_POSTSUBSCRIPT } in ψsuperscript𝜓\psi^{\prime}italic_ψ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT and thereby also in ψ𝜓\psiitalic_ψ, which contradicts our initial assumptions on ψ𝜓\psiitalic_ψ. ∎

Using this lemma we can easily adjust the dynamic programming formation: Instead of bookmarking the sensors b1,,bτ+1Ssubscript𝑏1subscript𝑏𝜏1𝑆b_{1},\dots,b_{\tau+1}\in Sitalic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ∈ italic_S that have sensed the last τ+1𝜏1\tau+1italic_τ + 1 targets, we instead bookmark the types θ1,,θτ+1Θsubscriptsuperscript𝜃1subscriptsuperscript𝜃𝜏1Θ\theta^{\prime}_{1},\dots,\theta^{\prime}_{\tau+1}\in\Thetaitalic_θ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_θ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ∈ roman_Θ of these sensors. Now, we can set a table entry to \infty (due to violated recharging time) if {θ1,,θτ+1}subscriptsuperscript𝜃1subscriptsuperscript𝜃𝜏1\{\theta^{\prime}_{1},\dots,\theta^{\prime}_{\tau+1}\}{ italic_θ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_θ start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT } contains more some sensor type θiΘsubscript𝜃𝑖Θ\theta_{i}\in\Thetaitalic_θ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ roman_Θ more than isubscript𝑖\ell_{i}roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT times. The rest of the algorithm adapts in a straightforward manner with a resulting running time of 𝒪(n(kχ+1)τ+2)𝒪𝑛superscriptsubscript𝑘𝜒1𝜏2\mathcal{O}(n\cdot(k_{\chi}+1)^{\tau+2})caligraphic_O ( italic_n ⋅ ( italic_k start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT )

Appendix B Additional Material for Section 4.2

See 4

Proof.

Let σ:T[n]:𝜎𝑇delimited-[]𝑛\sigma:T\to[n]italic_σ : italic_T → [ italic_n ] be some target ordering. We will say that two targets t,tT𝑡superscript𝑡𝑇t,t^{\prime}\in Titalic_t , italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ italic_T are (placed) at distance j𝑗jitalic_j (in σ𝜎\sigmaitalic_σ) if |σ(t)σ(t)|=j𝜎𝑡𝜎superscript𝑡𝑗|\sigma(t)-\sigma(t^{\prime})|=j| italic_σ ( italic_t ) - italic_σ ( italic_t start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ) | = italic_j. Further, for a target t𝑡titalic_t we define its i𝑖iitalic_i-surrounding to be the set of all targets whose distance from t𝑡titalic_t is at most i𝑖iitalic_i.

We start the proof with two immediate claims about optimal sensing plans in response to some target ordering σ𝜎\sigmaitalic_σ:

Claim 1.

Let s𝑠sitalic_s be a sensor and t𝑡titalic_t be a target so that s𝑠sitalic_s is the only sensor capable of sensing t𝑡titalic_t and t𝑡titalic_t has a higher value than all the other targets s𝑠sitalic_s can sense combined. s𝑠sitalic_s senses t𝑡titalic_t in an optimal sensing plan.

Proof.

Assume that s𝑠sitalic_s did not sense t𝑡titalic_t, we could just arrive at a better valid sensing plan by letting s𝑠sitalic_s sense only t𝑡titalic_t. ∎

Claim 2.

Let s𝑠sitalic_s be a sensor with recharging time τ𝜏\tauitalic_τ and t𝑡titalic_t be some target s𝑠sitalic_s is capable of sensing. If there is no other target s𝑠sitalic_s capable of sensing in the τ𝜏\tauitalic_τ-surrounding of t𝑡titalic_t, then t𝑡titalic_t will be sensed by some sensor in the optimal sensing plan.

Proof.

Assume that t𝑡titalic_t is not sensed by any sensor. Then we can just arrive at a better valid sensing plan by letting s𝑠sitalic_s sense t𝑡titalic_t: This will not violate the recharging constraint, as s𝑠sitalic_s does not sense any other targets in the τ𝜏\tauitalic_τ-surrounding of t𝑡titalic_t. ∎

We reduce from Independent Set on 3333-regular triangle-free graphs [16, Theorem 3].

Construction

Let G=(V,E)𝐺𝑉𝐸G=(V,E)italic_G = ( italic_V , italic_E ) be a 3333-regular triangle-free graph. For each vertex vV𝑣𝑉v\in Vitalic_v ∈ italic_V, we introduce a vertex target αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT of value 1111 and for each i[3]𝑖delimited-[]3i\in[3]italic_i ∈ [ 3 ] a blocker vertex target βvisubscriptsuperscript𝛽𝑖𝑣\beta^{i}_{v}italic_β start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT of value 3333 and a vertex sensor avisubscriptsuperscript𝑎𝑖𝑣a^{i}_{v}italic_a start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT which is capable of sensing αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT and βvisubscriptsuperscript𝛽𝑖𝑣\beta^{i}_{v}italic_β start_POSTSUPERSCRIPT italic_i end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT. Moreover, for each edge e={u,v}E𝑒𝑢𝑣𝐸e=\{u,v\}\in Eitalic_e = { italic_u , italic_v } ∈ italic_E, we introduce an edge target γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT of value 3333 and an edge sensor gesubscript𝑔𝑒g_{e}italic_g start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT that can sense γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT, αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT, and αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT. Additionally, we add a constraining edge target γ^esubscript^𝛾𝑒\hat{\gamma}_{e}over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT of value 4444 and a constraining edge sensor g^esubscript^𝑔𝑒\hat{g}_{e}over^ start_ARG italic_g end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT that is capable of sensing targets γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT and γ^esubscript^𝛾𝑒\hat{\gamma}_{e}over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT. The recharging time is τ=3𝜏3\tau=3italic_τ = 3. We claim that there is an \ellroman_ℓ-sized independent set X𝑋Xitalic_X in G𝐺Gitalic_G if and only if the Stackelberg equilibrium in the constructed ESG has value at least \ellroman_ℓ.

Forward Direction

Assume that XV𝑋𝑉X\subseteq Vitalic_X ⊆ italic_V is an independent set of size \ellroman_ℓ. To construct the target ordering we go through the vertices from the independent set one by one: For vX𝑣𝑋v\in Xitalic_v ∈ italic_X, let e1,e2,e3subscript𝑒1subscript𝑒2subscript𝑒3e_{1},e_{2},e_{3}italic_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , italic_e start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , italic_e start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT be the three edges incident to v𝑣vitalic_v. Then, we add to the ordering of targets the targets γ^e1βv1,βv2,γe1,αv,γe2,γe3,βv3,γ^e2,γ^e3subscript^𝛾subscript𝑒1subscriptsuperscript𝛽1𝑣subscriptsuperscript𝛽2𝑣subscript𝛾subscript𝑒1subscript𝛼𝑣subscript𝛾subscript𝑒2subscript𝛾subscript𝑒3subscriptsuperscript𝛽3𝑣subscript^𝛾subscript𝑒2subscript^𝛾subscript𝑒3\hat{\gamma}_{e_{1}}\beta^{1}_{v},\beta^{2}_{v},\gamma_{e_{1}},\alpha_{v},% \gamma_{e_{2}},\gamma_{e_{3}},\beta^{3}_{v},\hat{\gamma}_{e_{2}},\hat{\gamma}_% {e_{3}}over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT italic_β start_POSTSUPERSCRIPT 1 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT , italic_β start_POSTSUPERSCRIPT 2 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT , italic_γ start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT , italic_γ start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_γ start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_β start_POSTSUPERSCRIPT 3 end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT , over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT end_POSTSUBSCRIPT in this order. After we have processed all vertices from the independent set like this, we append all other targets in a random ordering. First observe that because of 1, the constraining edge sensors will always sense the constraining edge targets. As a result of the structure of our target ordering, the constraint edge sensors for edges incident to vX𝑣𝑋v\in Xitalic_v ∈ italic_X cannot sense the corresponding edge targets. From this, following a reasoning analogous to 1, we get that for each edge e𝑒eitalic_e incident to a vertex from X𝑋Xitalic_X, the edge sensor gesubscript𝑔𝑒g_{e}italic_g start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT senses the edge target γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT. Moreover, we also get from 1 that all three vertex sensors corresponding to a vertex vX𝑣𝑋v\in Xitalic_v ∈ italic_X sense their respective blocker vertex target. All in all, it follows that for each vertex vX𝑣𝑋v\in Xitalic_v ∈ italic_X all three corresponding vertex sensors and all edge sensors corresponding to incident edges sense a target within distance 3333 of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT. Thus, none of the sensors that are capable of sensing v𝑣vitalic_v can do so without violating their recharging constraint. Thus, all \ellroman_ℓ vertex targets corresponding to vertices from X𝑋Xitalic_X make it unsensed through the channel.

Backward Direction

Assume that we have a target ordering σ𝜎\sigmaitalic_σ so that targets of summed value at least \ellroman_ℓ make it unsensed through the channel under optimal play by Red. Let ψ𝜓\psiitalic_ψ be the optimal sensing plan played in response by Red. From 1, it is immediate that no blocker vertex target and no constraining edge target can make it unsensed through the channel. Moreover, it is also easy to see that no edge target can make it unsensed through the channel, as otherwise we could always improve the plan by letting the corresponding edge sensor sense the edge target (and delete all vertex targets the sensor senses instead). Let X𝑋Xitalic_X be the set vertices so that the corresponding vertex targets make it unsensed through the channel. By the above observation, we have |X|𝑋|X|\geq\ell| italic_X | ≥ roman_ℓ. We will now show that X𝑋Xitalic_X is an independent set.

For this, we make a series of observations: First, let αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT be an unsensed vertex target. Note that αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT can be sensed by 6666 different sensors (three vertex sensors and three edge sensors). By 2, we have that for all of these sensors there needs to be another target that the sensor is capable of sensing in the 3333-surrounding of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT. As there are 6666 targets in a 3333-surrounding, it follows that the 3333-surrounding of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT contains only targets that can be sensed by one of these six sensors (specifically one target for each of these six sensors).

Second, we show that for each unsensed vertex target αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT there is no other vertex target in its 3333-surrounding. Recall from the first observations that the only vertex targets that could be in the 3333-surrounding of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT are vertex targets corresponding to neighbors of v𝑣vitalic_v that are sensed by the corresponding edge sensor in ψ𝜓\psiitalic_ψ. For the sake of contradiction assume that there is some uV𝑢𝑉u\in Vitalic_u ∈ italic_V so that e={u,v}E𝑒𝑢𝑣𝐸e=\{u,v\}\in Eitalic_e = { italic_u , italic_v } ∈ italic_E and |σ(αv)σ(αu)|3𝜎subscript𝛼𝑣𝜎subscript𝛼𝑢3|\sigma(\alpha_{v})-\sigma(\alpha_{u})|\leq 3| italic_σ ( italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT ) - italic_σ ( italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT ) | ≤ 3. Observe that the 3333-surroundings of αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT and αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT overlap in at least 3333 targets. As G𝐺Gitalic_G is triangle-free and thus u𝑢uitalic_u and v𝑣vitalic_v do not share any common neighbors, this implies that the 3333-surrounding of αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT contains at most three targets that can be sensed by one of the six sensors that are capable of sensing αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT (the other three spots will be filled with vertex blocker targets corresponding to v𝑣vitalic_v and edge targets corresponding to edges incident to v𝑣vitalic_v by the first observation and as v𝑣vitalic_v makes it unsensed through the channel). Let s𝑠sitalic_s be a sensor that is capable of sensing αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT for which no other target that s𝑠sitalic_s can sense in the 3333-surrounding of αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT. Next, note that by the first observation, αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT is sensed by gesubscript𝑔𝑒g_{e}italic_g start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT in ψ𝜓\psiitalic_ψ. We alter the sensing plan ψ𝜓\psiitalic_ψ as follows. We let αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT instead of αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT be sensed by gesubscript𝑔𝑒g_{e}italic_g start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT and let αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT be sensed by s𝑠sitalic_s. As argued above, this does not violate the recharging time of the sensor s𝑠sitalic_s. Moreover, it also does not violate the recharging time of gesubscript𝑔𝑒g_{e}italic_g start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT, as there are no other targets (except αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT) that gesubscript𝑔𝑒g_{e}italic_g start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT is capable of sensing in the 3333-surrounding of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT (by the first observation). In the altered sensing plan the value of surviving targets is strictly smaller contradicting that ψ𝜓\psiitalic_ψ is an optimal response by Red.

Third, we claim that for each of two unsensed vertex targets αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT and αvsubscript𝛼superscript𝑣\alpha_{v^{\prime}}italic_α start_POSTSUBSCRIPT italic_v start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT we have that they are placed at a distance at least 7777 from each other, i.e., their 3333-surroundings do not overlap. In order to show that this cannot be the case, we need to examine the constraining edge sensors. Let e𝑒eitalic_e be an edge incident to v𝑣vitalic_v. Our first two observations told us that the edge target γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT needs to be in the 3333-surrounding of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT. However, this is not sufficient: We claim that the constraining edge target γ^esubscript^𝛾𝑒\hat{\gamma}_{e}over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT needs to be in the 3333-surroundings of γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT. Assume that this was not to hold. Then we could alter our sensing plan ψ𝜓\psiitalic_ψ by making g^esubscript^𝑔𝑒\hat{g}_{e}over^ start_ARG italic_g end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT sense γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT (it can do so without violating its recharging time because γ^esubscript^𝛾𝑒\hat{\gamma}_{e}over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT is not in the 3333-surrounding of γe)\gamma_{e})italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT ) and make gesubscript𝑔𝑒g_{e}italic_g start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT sense αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT, which leads to a strictly better sensing plan. The claim follows. To prove the observation, for the sake of contradiction assume that the 3333-surroundings of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT and αvsubscript𝛼superscript𝑣\alpha_{v^{\prime}}italic_α start_POSTSUBSCRIPT italic_v start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT did overlap. From the previous two observations, it follows that the only possibility for their 3333-surrounding to overlap is that there is an edge e={v,v}E𝑒𝑣superscript𝑣𝐸e=\{v,v^{\prime}\}\in Eitalic_e = { italic_v , italic_v start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT } ∈ italic_E and that γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT constitutes the overlap of their 3333-surrounding. However, in this case γ^esubscript^𝛾𝑒\hat{\gamma}_{e}over^ start_ARG italic_γ end_ARG start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT cannot be placed in the 3333-surrounding of γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT, as it can neither belong to the 3333-surrounding of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT nor αvsubscript𝛼superscript𝑣\alpha_{v^{\prime}}italic_α start_POSTSUBSCRIPT italic_v start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT (by the first observation). This leads to a contradiction to our above claim.

Now, combining these observations it follows that for each vX𝑣𝑋v\in Xitalic_v ∈ italic_X, the 3333-surrounding of αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT contains edge targets γe1,γe2,γe3subscript𝛾subscript𝑒1subscript𝛾subscript𝑒2subscript𝛾subscript𝑒3\gamma_{e_{1}},\gamma_{e_{2}},\gamma_{e_{3}}italic_γ start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_γ start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_γ start_POSTSUBSCRIPT italic_e start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT end_POSTSUBSCRIPT with e1subscript𝑒1e_{1}italic_e start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT, e2subscript𝑒2e_{2}italic_e start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT, and e3subscript𝑒3e_{3}italic_e start_POSTSUBSCRIPT 3 end_POSTSUBSCRIPT being the edges incident to v𝑣vitalic_v. Moreover, we have shown that the 3333-surrounding of each target αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT with vX𝑣𝑋v\in Xitalic_v ∈ italic_X is disjoint. This implies that no two vertices v,uX𝑣𝑢𝑋v,u\in Xitalic_v , italic_u ∈ italic_X can be incident to the same edge e𝑒eitalic_e, as otherwise, γesubscript𝛾𝑒\gamma_{e}italic_γ start_POSTSUBSCRIPT italic_e end_POSTSUBSCRIPT would be in the 3333-surrounding of αusubscript𝛼𝑢\alpha_{u}italic_α start_POSTSUBSCRIPT italic_u end_POSTSUBSCRIPT and αvsubscript𝛼𝑣\alpha_{v}italic_α start_POSTSUBSCRIPT italic_v end_POSTSUBSCRIPT, which leads to a contradiction as they are disjoint. It follows that X𝑋Xitalic_X is an independent set of size at least \ellroman_ℓ.

Algorithm 3 Greedy_Sensing

Input: Blue team’s ordering σ𝜎\sigmaitalic_σ of targets
Output: Red team’s sensing plan ψ𝜓\psiitalic_ψ

1:  Sort Blue’s target according to their value
2:  Label Red’s sensors with {1,,k}1𝑘\{1,\cdots,k\}{ 1 , ⋯ , italic_k }
3:  for each target in the order of decreasing values do
4:     Find all sensors that are available to sense the target with index i𝑖iitalic_i in the input ordering
5:     if Only one sensor s[k]𝑠delimited-[]𝑘s\in[k]italic_s ∈ [ italic_k ] can sense then
6:        Set ψi,s=1subscript𝜓𝑖𝑠1\psi_{i,s}=1italic_ψ start_POSTSUBSCRIPT italic_i , italic_s end_POSTSUBSCRIPT = 1
7:     else if Multiple sensors S[k]𝑆delimited-[]𝑘S\subseteq[k]italic_S ⊆ [ italic_k ] can sense then
8:        Choose one sS𝑠𝑆s\in Sitalic_s ∈ italic_S randomly and set ψi,s=1subscript𝜓𝑖𝑠1\psi_{i,s}=1italic_ψ start_POSTSUBSCRIPT italic_i , italic_s end_POSTSUBSCRIPT = 1
9:  Return ψ𝜓\psiitalic_ψ

See 5

Proof.

We start by giving the formulation, where the inner-level program is similar to the ILP presented in Proposition 3. Note that the outer-level maximizes the value of non-sensed targets, while the inner-level minimizes this value:

maxz,tsubscript𝑧𝑡\displaystyle\max_{z,t}roman_max start_POSTSUBSCRIPT italic_z , italic_t end_POSTSUBSCRIPT i[n]vixi,k+1subscript𝑖delimited-[]𝑛subscript𝑣𝑖subscript𝑥𝑖𝑘1\displaystyle\sum_{i\in[n]}v_{i}\cdot x_{i,k+1}∑ start_POSTSUBSCRIPT italic_i ∈ [ italic_n ] end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ⋅ italic_x start_POSTSUBSCRIPT italic_i , italic_k + 1 end_POSTSUBSCRIPT (2)
s.t. zizi,ii[n]formulae-sequencesubscript𝑧𝑖subscript𝑧superscript𝑖for-all𝑖superscript𝑖delimited-[]𝑛\displaystyle z_{i}\neq z_{i^{\prime}},\forall i\neq i^{\prime}\in[n]italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≠ italic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT , ∀ italic_i ≠ italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] (3)
τ+1n(1li,j)zjzi,i,j[n]formulae-sequence𝜏1𝑛1subscript𝑙𝑖𝑗subscript𝑧𝑗subscript𝑧𝑖for-all𝑖𝑗delimited-[]𝑛\displaystyle\tau+1-n\cdot(1-l_{i,j})\leq z_{j}-z_{i},\forall i,j\in[n]italic_τ + 1 - italic_n ⋅ ( 1 - italic_l start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) ≤ italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , ∀ italic_i , italic_j ∈ [ italic_n ] (4)
zjzinli,j+τ,i,j[n]formulae-sequencesubscript𝑧𝑗subscript𝑧𝑖𝑛subscript𝑙𝑖𝑗𝜏for-all𝑖𝑗delimited-[]𝑛\displaystyle z_{j}-z_{i}\leq n\cdot l_{i,j}+\tau,\forall i,j\in[n]italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≤ italic_n ⋅ italic_l start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT + italic_τ , ∀ italic_i , italic_j ∈ [ italic_n ] (5)
𝐱=argmin𝐱^i[n]vix^i,k+1𝐱subscriptargmin^𝐱subscript𝑖delimited-[]𝑛subscript𝑣𝑖subscript^𝑥𝑖𝑘1\displaystyle\mathbf{x}=\text{argmin}_{\hat{\mathbf{x}}}\sum_{i\in[n]}v_{i}% \cdot\hat{x}_{i,k+1}bold_x = argmin start_POSTSUBSCRIPT over^ start_ARG bold_x end_ARG end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i ∈ [ italic_n ] end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ⋅ over^ start_ARG italic_x end_ARG start_POSTSUBSCRIPT italic_i , italic_k + 1 end_POSTSUBSCRIPT (6)
s.t. j[k+1]x^i,j=1,i[n]formulae-sequencesubscript𝑗delimited-[]𝑘1subscript^𝑥𝑖𝑗1for-all𝑖delimited-[]𝑛\displaystyle\sum_{j\in[k+1]}\hat{x}_{i,j}=1,\forall i\in[n]∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_k + 1 ] end_POSTSUBSCRIPT over^ start_ARG italic_x end_ARG start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 , ∀ italic_i ∈ [ italic_n ] (7)
x^i,jDi,j,i[n],j[k]formulae-sequencesubscript^𝑥𝑖𝑗subscript𝐷𝑖𝑗formulae-sequencefor-all𝑖delimited-[]𝑛𝑗delimited-[]𝑘\displaystyle\hat{x}_{i,j}\leq D_{i,j},\forall i\in[n],j\in[k]over^ start_ARG italic_x end_ARG start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ≤ italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT , ∀ italic_i ∈ [ italic_n ] , italic_j ∈ [ italic_k ] (8)
x^i,j+x^i,j1+li,i+li,i,ii[n],j[k]formulae-sequenceformulae-sequencesubscript^𝑥𝑖𝑗subscript^𝑥superscript𝑖𝑗1subscript𝑙𝑖superscript𝑖subscript𝑙superscript𝑖𝑖for-all𝑖superscript𝑖delimited-[]𝑛𝑗delimited-[]𝑘\displaystyle\hat{x}_{i,j}+\hat{x}_{i^{\prime},j}\leq 1+l_{i,i^{\prime}}+l_{i^% {\prime},i},\forall i\neq i^{\prime}\in[n],j\in[k]over^ start_ARG italic_x end_ARG start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT + over^ start_ARG italic_x end_ARG start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT ≤ 1 + italic_l start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT + italic_l start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_i end_POSTSUBSCRIPT , ∀ italic_i ≠ italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] , italic_j ∈ [ italic_k ] (9)

The outer-level program controls an integer variable zisubscript𝑧𝑖z_{i}italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT for each target i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] that encodes the position in which the target appears in the final ordering. Moreover, for each pair of targets i,j[n]𝑖𝑗delimited-[]𝑛i,j\in[n]italic_i , italic_j ∈ [ italic_n ], we have a binary variable li,jsubscript𝑙𝑖𝑗l_{i,j}italic_l start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT capturing whether tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT appears at least τ+1𝜏1\tau+1italic_τ + 1 positions before tjsubscript𝑡𝑗t_{j}italic_t start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT in the ordering induced by the z𝑧zitalic_z variables. Equation 3 ensures that each target is assigned a unique position101010For each ii[n]𝑖superscript𝑖delimited-[]𝑛i\neq i^{\prime}\in[n]italic_i ≠ italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ], to convert Equation 3 into a linear constraint, we have to introduce a new binary variable δi,isubscript𝛿𝑖superscript𝑖\delta_{i,i^{\prime}}italic_δ start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT. We then add two linear constraint zizj1+nδi,jsubscript𝑧𝑖subscript𝑧𝑗1𝑛subscript𝛿𝑖𝑗z_{i}\leq z_{j}-1+n\cdot\delta_{i,j}italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≤ italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - 1 + italic_n ⋅ italic_δ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT and zizj+1+n(1δi,j)subscript𝑧𝑖subscript𝑧𝑗1𝑛1subscript𝛿𝑖𝑗z_{i}\geq z_{j}+1+n\cdot(1-\delta_{i,j})italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≥ italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT + 1 + italic_n ⋅ ( 1 - italic_δ start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ) that are satisfied if and onlf if zizisubscript𝑧𝑖subscript𝑧superscript𝑖z_{i}\neq z_{i^{\prime}}italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≠ italic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT. and Equations 5 and 6 ensures that li,jsubscript𝑙𝑖𝑗l_{i,j}italic_l start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT is set to one if and only if zjzi+τ+1subscript𝑧𝑗subscript𝑧𝑖𝜏1z_{j}\geq z_{i}+\tau+1italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≥ italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_τ + 1 (in Equations 5 and 6 we have τ+1zjzi𝜏1subscript𝑧𝑗subscript𝑧𝑖\tau+1\leq z_{j}-z_{i}italic_τ + 1 ≤ italic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT if li,j=1subscript𝑙𝑖𝑗1l_{i,j}=1italic_l start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1; and zjziτsubscript𝑧𝑗subscript𝑧𝑖𝜏z_{j}-z_{i}\leq\tauitalic_z start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≤ italic_τ if li,j=0subscript𝑙𝑖𝑗0l_{i,j}=0italic_l start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 0).

The inner-level program controls binary variables xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k+1]𝑗delimited-[]𝑘1j\in[k+1]italic_j ∈ [ italic_k + 1 ], which encode the sensing plan as in Proposition 3, i.e, xi,j=1subscript𝑥𝑖𝑗1x_{i,j}=1italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 for i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ] implies that tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is sensed by sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT. The value of the encoded plan is again i[n]vixi,k+1subscript𝑖delimited-[]𝑛subscript𝑣𝑖subscript𝑥𝑖𝑘1\sum_{i\in[n]}v_{i}\cdot x_{i,k+1}∑ start_POSTSUBSCRIPT italic_i ∈ [ italic_n ] end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ⋅ italic_x start_POSTSUBSCRIPT italic_i , italic_k + 1 end_POSTSUBSCRIPT, which Blue wants to maximize (Equation 2) and Red wants to minimize (Equation 6). The validity of the sensing plan is secured in Equations 7, 8 and 9, where Equation 9 imposes that a sensor sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT can only sense two targets tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and tisubscript𝑡superscript𝑖t_{i^{\prime}}italic_t start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT if either tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is at least τ+1𝜏1\tau+1italic_τ + 1 positions before tisubscript𝑡superscript𝑖t_{i^{\prime}}italic_t start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT in the ordering encoded in the z𝑧zitalic_z variables (i.e., li,i=1subscript𝑙𝑖superscript𝑖1l_{i,i^{\prime}}=1italic_l start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT = 1) or the other way around (i.e., li,i=1subscript𝑙superscript𝑖𝑖1l_{i^{\prime},i}=1italic_l start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_i end_POSTSUBSCRIPT = 1). ∎

We give our greedy approximation algorithm for Best Red Response in Algorithm 3.

Appendix C Additional Material for Section 6.1

C.1 Proof of Theorem 6

C.1.1 Connection Best Blue Response and Minimum Maximal Matching

On an intuitive level, solving Best Blue Response with infinite recharging time τ=𝜏\tau=\inftyitalic_τ = ∞ and uniform target values has some similarities to solving the classic NP-hard Minimum Maximal Matching problem Yannakakis and Gavril [30]:

Minimum Maximal Matching
Input: A bipartite graph G=(UV,E)𝐺𝑈𝑉𝐸G=(U\cup V,E)italic_G = ( italic_U ∪ italic_V , italic_E ) and an integer \ellroman_ℓ.

Question: Is there a maximal matching in G𝐺Gitalic_G containing at most \ellroman_ℓ edges?

We now discuss the intuitive connection as well as reasons why immediate reductions between the two problems are prohibited. Assume that we have a solution to our Best Blue Response instance where targets are ordered as (t1,,tn)subscript𝑡1subscript𝑡𝑛(t_{1},\dots,t_{n})( italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ). From this let us construct a bipartite graph G𝐺Gitalic_G with vertices T𝑇Titalic_T on the left side and vertices S𝑆Sitalic_S on the right side. For the edge set E𝐸Eitalic_E, we add an edge between a target t𝑡titalic_t and a sensor s𝑠sitalic_s if s𝑠sitalic_s is capable of sensing t𝑡titalic_t Let now FE𝐹𝐸F\subseteq Eitalic_F ⊆ italic_E be the set of sensor-target pairs with {t,s}F𝑡𝑠𝐹\{t,s\}\in F{ italic_t , italic_s } ∈ italic_F if s𝑠sitalic_s senses t𝑡titalic_t when targets are send according to (t1,,tn)subscript𝑡1subscript𝑡𝑛(t_{1},\dots,t_{n})( italic_t start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_t start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT ). It needs to hold that F𝐹Fitalic_F is a maximal matching in G𝐺Gitalic_G: Otherwise, there is some {t,s}EF𝑡𝑠𝐸𝐹\{t,s\}\in E\setminus F{ italic_t , italic_s } ∈ italic_E ∖ italic_F. The existence of this edge implies that target t𝑡titalic_t made it through the channel and sensor s𝑠sitalic_s did not sense any target, which leads to a contradiction. Moreover, the size of this matching, i.e., |F|𝐹|F|| italic_F |, corresponds to the number of lost targets. Thus, Blue wants to find a maximal matching of minimum size. This discussion suggests a close connection between Simple Sequential Covering and Minimum Maximal Matching.

However, there are some crucial differences between the two problems which prohibit immediate reductions from one problem to the other: Most crucially, assume we were to model a bipartite graph as an instance of Best Blue Response by letting U𝑈Uitalic_U be the targets and V𝑉Vitalic_V the sensors (in some ordering (v1,,vn)subscript𝑣1subscript𝑣𝑛(v_{1},\dots,v_{n})( italic_v start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_v start_POSTSUBSCRIPT italic_n end_POSTSUBSCRIPT )) and let v𝑣vitalic_v be capable of sensing u𝑢uitalic_u if {u,v}E𝑢𝑣𝐸\{u,v\}\in E{ italic_u , italic_v } ∈ italic_E. The problem with this construction is that we cannot model arbitrary matchings EEsuperscript𝐸𝐸E^{\prime}\subseteq Eitalic_E start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_E as solutions to the constructed Best Blue Response instance: Assume that Esuperscript𝐸E^{\prime}italic_E start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT contains some edge {u,vi}𝑢subscript𝑣𝑖\{u,v_{i}\}{ italic_u , italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT } and there is some vjsubscript𝑣𝑗v_{j}italic_v start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT with j<i𝑗𝑖j<iitalic_j < italic_i, {u,vj}E𝑢subscript𝑣𝑗𝐸\{u,v_{j}\}\in E{ italic_u , italic_v start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT } ∈ italic_E, and vjsubscript𝑣𝑗v_{j}italic_v start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT is not incident to any edges from Esuperscript𝐸E^{\prime}italic_E start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. In this case, it is not possible to send the targets through the channel such that Esuperscript𝐸E^{\prime}italic_E start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT will be the sensed sensor-target pairs because u𝑢uitalic_u will always be sensed by vjsubscript𝑣𝑗v_{j}italic_v start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT before it can be sensed by visubscript𝑣𝑖v_{i}italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT (which in turn implies that visubscript𝑣𝑖v_{i}italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is still ready to sense other targets). As a consequence, intuitively speaking, in instances of Best Blue Response we are only interested in maximal matchings where each matched vertex from the left is matched to its “first” otherwise unmatched neighbor from the right side.

Because of this, we need to turn to a slightly more involved reduction that draws inspiration from the NP-hardness proof of Minimum Maximal Matching by Yannakakis and Gavril [30], yet requires some reworking of the construction and a different more involved proof. We reduce from the following SAT variant.

C.1.2 Proof of Correctness

See 6

Proof.

In this proof, for a target t𝑡titalic_t, we let D(t)𝐷𝑡D(t)italic_D ( italic_t ) be the set of sensors that are capable of sensing t𝑡titalic_t.

We reduce from the following problem, which is NP-hard as proven by Yannakakis [29].

Restricted 3-Sat
Input: A propositional formula (X,C)𝑋𝐶(X,C)( italic_X , italic_C ) where each clause contains three literals and each variable appears in exactly two clauses positively and in exactly one clause negatively.

Question: Is there an assignment to variables in X𝑋Xitalic_X such that each clause from C𝐶Citalic_C is satisfied?

Let (X,C)𝑋𝐶(X,C)( italic_X , italic_C ) be a given Restricted 3-Sat instance.

Construction.

Each target has value one. For each clause cC𝑐𝐶c\in Citalic_c ∈ italic_C, we add a clause target tcsubscript𝑡𝑐t_{c}italic_t start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT and a clause sensor scsubscript𝑠𝑐s_{c}italic_s start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT with D(tc)={sc}𝐷subscript𝑡𝑐subscript𝑠𝑐D({t_{c}})=\{s_{c}\}italic_D ( italic_t start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT ) = { italic_s start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT }.

For each variable xX𝑥𝑋x\in Xitalic_x ∈ italic_X, we add a variable gadget. That is, we add variable targets tx,1subscript𝑡𝑥1t_{x,1}italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT, tx,2subscript𝑡𝑥2t_{x,2}italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT and tx¯subscript𝑡¯𝑥t_{\bar{x}}italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT together with dummy targets tx,1dusubscriptsuperscript𝑡du𝑥1t^{\mathrm{du}}_{x,1}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT, tx,2dusubscriptsuperscript𝑡du𝑥2t^{\mathrm{du}}_{x,2}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT, tx,3dusubscriptsuperscript𝑡du𝑥3t^{\mathrm{du}}_{x,3}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 3 end_POSTSUBSCRIPT, and tx,4dusubscriptsuperscript𝑡du𝑥4t^{\mathrm{du}}_{x,4}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 4 end_POSTSUBSCRIPT. Next, we add catch sensors sx,1casubscriptsuperscript𝑠ca𝑥1s^{\mathrm{ca}}_{x,1}italic_s start_POSTSUPERSCRIPT roman_ca end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT, sx,2casubscriptsuperscript𝑠ca𝑥2s^{\mathrm{ca}}_{x,2}italic_s start_POSTSUPERSCRIPT roman_ca end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT, and sx¯casubscriptsuperscript𝑠ca¯𝑥s^{\mathrm{ca}}_{\bar{x}}italic_s start_POSTSUPERSCRIPT roman_ca end_POSTSUPERSCRIPT start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT, which ensure that none of the variable targets can make it through the channel. Moreover, we add variable sensors sx,1subscript𝑠𝑥1s_{x,1}italic_s start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT, sx,2subscript𝑠𝑥2s_{x,2}italic_s start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT and sx¯subscript𝑠¯𝑥s_{\bar{x}}italic_s start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT together with dummy sensors sx,1dusubscriptsuperscript𝑠du𝑥1s^{\mathrm{du}}_{x,1}italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and sx,2dusubscriptsuperscript𝑠du𝑥2s^{\mathrm{du}}_{x,2}italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT.

Let ci,cj,ckCsubscript𝑐𝑖subscript𝑐𝑗subscript𝑐𝑘𝐶c_{i},c_{j},c_{k}\in Citalic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_c start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ italic_C be three clauses such that x𝑥xitalic_x appears positive in clauses cisubscript𝑐𝑖c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and cjsubscript𝑐𝑗c_{j}italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and negative in clause cksubscript𝑐𝑘c_{k}italic_c start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT. The sensing matrix is defined through:

D(tx,1)={sci,sx,1,sx,1ca}𝐷subscript𝑡𝑥1subscript𝑠subscript𝑐𝑖subscript𝑠𝑥1subscriptsuperscript𝑠ca𝑥1\displaystyle D({t_{x,1}})=\{s_{c_{i}},s_{x,1},s^{\mathrm{ca}}_{x,1}\}italic_D ( italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT ) = { italic_s start_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_s start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT roman_ca end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT } D(tx,1du)={sx,1,sx,1du}𝐷superscriptsubscript𝑡𝑥1dusubscript𝑠𝑥1subscriptsuperscript𝑠du𝑥1\displaystyle D({t_{x,1}^{\mathrm{du}}})=\{s_{x,1},s^{\mathrm{du}}_{x,1}\}italic_D ( italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT ) = { italic_s start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT }
D(tx,2)={scj,sx,2,sx,2ca}𝐷subscript𝑡𝑥2subscript𝑠subscript𝑐𝑗subscript𝑠𝑥2subscriptsuperscript𝑠ca𝑥2\displaystyle D({t_{x,2}})=\{s_{c_{j}},s_{x,2},s^{\mathrm{ca}}_{x,2}\}italic_D ( italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT ) = { italic_s start_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_s start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT roman_ca end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT } D(tx,2du)={sx¯,sx,1du}𝐷superscriptsubscript𝑡𝑥2dusubscript𝑠¯𝑥subscriptsuperscript𝑠du𝑥1\displaystyle D({t_{x,2}^{\mathrm{du}}})=\{s_{\bar{x}},s^{\mathrm{du}}_{x,1}\}italic_D ( italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT ) = { italic_s start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT }
D(tx¯)={sck,sx¯,sx¯ca}𝐷subscript𝑡¯𝑥subscript𝑠subscript𝑐𝑘subscript𝑠¯𝑥subscriptsuperscript𝑠ca¯𝑥\displaystyle D({t_{\bar{x}}})=\{s_{c_{k}},s_{\bar{x}},s^{\mathrm{ca}}_{\bar{x% }}\}italic_D ( italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT ) = { italic_s start_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_s start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT roman_ca end_POSTSUPERSCRIPT start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT } D(tx,3du)={sx¯,sx,2du}𝐷superscriptsubscript𝑡𝑥3dusubscript𝑠¯𝑥subscriptsuperscript𝑠du𝑥2\displaystyle D({t_{x,3}^{\mathrm{du}}})=\{s_{\bar{x}},s^{\mathrm{du}}_{x,2}\}italic_D ( italic_t start_POSTSUBSCRIPT italic_x , 3 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT ) = { italic_s start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT }
D(tx,4du)={sx,2,sx,2du}𝐷superscriptsubscript𝑡𝑥4dusubscript𝑠𝑥2subscriptsuperscript𝑠du𝑥2\displaystyle D({t_{x,4}^{\mathrm{du}}})=\{s_{x,2},s^{\mathrm{du}}_{x,2}\}italic_D ( italic_t start_POSTSUBSCRIPT italic_x , 4 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT ) = { italic_s start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT , italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT }

The recharging time is \infty, i.e., each sensor can sense at most one target. The ordering of the sensors is as follows. First, come the clause sensors (in some arbitrary ordering), then the dummy sensors (in some arbitrary ordering), then the variable sensors (in some arbitrary ordering) and last the catch sensors (in some arbitrary ordering). We ask whether there is an ordering of targets so that at least :=|C|+2|X|assign𝐶2𝑋\ell:=|C|+2|X|roman_ℓ := | italic_C | + 2 | italic_X | targets are not sensed. It is easy to see that the construction satisfies the restrictions from the theorem statement.

Proof of Correctness: Forward Direction

Assume we are given an assignment of variables X𝑋Xitalic_X that fulfills C𝐶Citalic_C. Let XXsuperscript𝑋𝑋X^{*}\subseteq Xitalic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ⊆ italic_X be the set of variables set to true in this assignment. From this, we construct a partition of the targets into four groups that determine the ordering in which the targets move through the channel; the first group comes first and so on; the ordering of targets within one group is arbitrary. The first group consists of targets tx,1subscript𝑡𝑥1t_{x,1}italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and tx,2subscript𝑡𝑥2t_{x,2}italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT for each xX𝑥superscript𝑋x\in X^{*}italic_x ∈ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT and target tx¯subscript𝑡¯𝑥t_{\bar{x}}italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT for each xX𝑥superscript𝑋x\notin X^{*}italic_x ∉ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT. The second group consists of targets tx,1dusubscriptsuperscript𝑡du𝑥1t^{\mathrm{du}}_{x,1}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and tx,4dusubscriptsuperscript𝑡du𝑥4t^{\mathrm{du}}_{x,4}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 4 end_POSTSUBSCRIPT for each xX𝑥superscript𝑋x\in X^{*}italic_x ∈ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT and tx,2dusubscriptsuperscript𝑡du𝑥2t^{\mathrm{du}}_{x,2}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT and tx,3dusubscriptsuperscript𝑡du𝑥3t^{\mathrm{du}}_{x,3}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 3 end_POSTSUBSCRIPT for each xX𝑥superscript𝑋x\notin X^{*}italic_x ∉ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT. The third group contains all remaining variable targets. And, finally, the fourth group contains all |C|𝐶|C|| italic_C | clause targets and the remaining 2|X|2𝑋2|X|2 | italic_X | dummy targets. It is sufficient to prove that all \ellroman_ℓ targets from the fourth group make it through the channel. We prove this via a series of three claims.

Claim 3.
  1. 1.

    Each clause sensor senses a target from the first group.

  2. 2.

    Each dummy sensor senses a target from the second group.

  3. 3.

    For each xX𝑥superscript𝑋x\in X^{*}italic_x ∈ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT, sx¯subscript𝑠¯𝑥s_{\bar{x}}italic_s start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT senses a target from one of the first three groups, and for each xX𝑥superscript𝑋x\notin X^{*}italic_x ∉ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT, sx,1subscript𝑠𝑥1s_{x,1}italic_s start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and sx,2subscript𝑠𝑥2s_{x,2}italic_s start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT sense a target from one of the first three groups.

Proof.

Proof of 1. This follows directly from the fact that Xsuperscript𝑋X^{*}italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT is a satisfying assignment and that the clause sensors come first in the ordering of sensors.

Proof of 2. This follows directly from the fact that the dummy sensors come after the clause sensors in the sensor ordering and as the second group contains for each xX𝑥𝑋x\in Xitalic_x ∈ italic_X tx,1dusubscriptsuperscript𝑡du𝑥1t^{\mathrm{du}}_{x,1}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT or tx,2dusubscriptsuperscript𝑡du𝑥2t^{\mathrm{du}}_{x,2}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT (making sx,1dusubscriptsuperscript𝑠du𝑥1s^{\mathrm{du}}_{x,1}italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT sense a target) and tx,3dusubscriptsuperscript𝑡du𝑥3t^{\mathrm{du}}_{x,3}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 3 end_POSTSUBSCRIPT or tx,4dusubscriptsuperscript𝑡du𝑥4t^{\mathrm{du}}_{x,4}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 4 end_POSTSUBSCRIPT (making sx,2dusubscriptsuperscript𝑠du𝑥2s^{\mathrm{du}}_{x,2}italic_s start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT sense a target).

Proof of 3. Let us focus on one xX𝑥𝑋x\in Xitalic_x ∈ italic_X, and let ci,cj,ckCsubscript𝑐𝑖subscript𝑐𝑗subscript𝑐𝑘𝐶c_{i},c_{j},c_{k}\in Citalic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT , italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT , italic_c start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT ∈ italic_C be three clauses such that x𝑥xitalic_x appears positive in clauses cisubscript𝑐𝑖c_{i}italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT and cjsubscript𝑐𝑗c_{j}italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT and negative in clause cksubscript𝑐𝑘c_{k}italic_c start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT. If xX𝑥superscript𝑋x\in X^{*}italic_x ∈ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT, then tx¯subscript𝑡¯𝑥t_{\bar{x}}italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT is part of the third group. However, from Statement 1 it follows that scksubscript𝑠subscript𝑐𝑘s_{c_{k}}italic_s start_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_k end_POSTSUBSCRIPT end_POSTSUBSCRIPT already sensed a previous target. As the variable sensors are before the catch sensors in the sensor order, it follows that sx¯subscript𝑠¯𝑥s_{\bar{x}}italic_s start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT senses tx¯subscript𝑡¯𝑥t_{\bar{x}}italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT. Similarly, if xX𝑥superscript𝑋x\notin X^{*}italic_x ∉ italic_X start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT, tx,1subscript𝑡𝑥1t_{x,1}italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and tx,2subscript𝑡𝑥2t_{x,2}italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT are part of the third group. Both scisubscript𝑠subscript𝑐𝑖s_{c_{i}}italic_s start_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT end_POSTSUBSCRIPT and scjsubscript𝑠subscript𝑐𝑗s_{c_{j}}italic_s start_POSTSUBSCRIPT italic_c start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT end_POSTSUBSCRIPT have already sensed previous targets because of Statement 1. From this Statement 3 follows. ∎

The claim implies that all sensors that can sense a target from the fourth group have already sensed another target before it is the fourth group’s turn, implying that all \ellroman_ℓ targets from the fourth group will make it through the channel.

Proof of Correctness: Backward Direction

Assume that there is an ordering of the targets such that at least \ellroman_ℓ targets move unsensed through the channel, and let PPsuperscript𝑃𝑃P^{*}\subseteq Pitalic_P start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT ⊆ italic_P be the set of these targets.

We prove the backward direction in a series of claims:

Claim 4.
  1. 1.

    No variable target is part of Psuperscript𝑃P^{*}italic_P start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT.

  2. 2.

    For each xX𝑥𝑋x\in Xitalic_x ∈ italic_X, either tx,1dusubscriptsuperscript𝑡du𝑥1t^{\mathrm{du}}_{x,1}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT or tx,2dusubscriptsuperscript𝑡du𝑥2t^{\mathrm{du}}_{x,2}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT and either tx,3dusubscriptsuperscript𝑡du𝑥3t^{\mathrm{du}}_{x,3}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 3 end_POSTSUBSCRIPT or tx,4dusubscriptsuperscript𝑡du𝑥4t^{\mathrm{du}}_{x,4}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 4 end_POSTSUBSCRIPT is part of Psuperscript𝑃P^{*}italic_P start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT. All clause targets are part of Psuperscript𝑃P^{*}italic_P start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT.

  3. 3.

    For each xX𝑥𝑋x\in Xitalic_x ∈ italic_X, if tx¯subscript𝑡¯𝑥t_{\bar{x}}italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT is sensed by a clause target, then neither tx,1subscript𝑡𝑥1t_{x,1}italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT nor tx,2subscript𝑡𝑥2t_{x,2}italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT are sensed by a clause target.

Proof.

Proof of 1. This follows immediately from the existence of a designated catch sensor for each variable target which can only sense this target. As a consequence, no variable target can ever make it unsensed through the channel.

Proof of 2. Note that because of the sensor sx,1dusuperscriptsubscript𝑠𝑥1dus_{x,1}^{\mathrm{du}}italic_s start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT it is never possible that both tx,1dusubscriptsuperscript𝑡du𝑥1t^{\mathrm{du}}_{x,1}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and tx,2dusubscriptsuperscript𝑡du𝑥2t^{\mathrm{du}}_{x,2}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT make it unsensed through the targets. Similarly, because of sx,2dusuperscriptsubscript𝑠𝑥2dus_{x,2}^{\mathrm{du}}italic_s start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT it is never possible that both tx,3dusubscriptsuperscript𝑡du𝑥3t^{\mathrm{du}}_{x,3}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 3 end_POSTSUBSCRIPT and tx,4dusubscriptsuperscript𝑡du𝑥4t^{\mathrm{du}}_{x,4}italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 4 end_POSTSUBSCRIPT make it unsensed through the channel. Together with Statement 1, this implies that from each variable gadget at most 2222 targets can be part of Psuperscript𝑃P^{*}italic_P start_POSTSUPERSCRIPT ∗ end_POSTSUPERSCRIPT. By recalling that =|C|+2|X|𝐶2𝑋\ell=|C|+2\cdot|X|roman_ℓ = | italic_C | + 2 ⋅ | italic_X | and that there are only |C|𝐶|C|| italic_C | clause targets outside of variable gadgets, the statement follows.

Proof of 3. Let us focus on tx,1subscript𝑡𝑥1t_{x,1}italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT (the proof for tx,2subscript𝑡𝑥2t_{x,2}italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT is analogous). For the sake of contradiction assume that tx,1subscript𝑡𝑥1t_{x,1}italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and tx¯subscript𝑡¯𝑥t_{\bar{x}}italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT are both sensed by clause sensors, then both sx,1subscript𝑠𝑥1s_{x,1}italic_s start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT and sx¯subscript𝑠¯𝑥s_{\bar{x}}italic_s start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT do not sense a variable target, respectively. Accordingly, at most one target out of {tx,1du,tx,2du,tx,3du,tx,4du}subscriptsuperscript𝑡du𝑥1subscriptsuperscript𝑡du𝑥2subscriptsuperscript𝑡du𝑥3subscriptsuperscript𝑡du𝑥4\{t^{\mathrm{du}}_{x,1},t^{\mathrm{du}}_{x,2},t^{\mathrm{du}}_{x,3},t^{\mathrm% {du}}_{x,4}\}{ italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT , italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT , italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 3 end_POSTSUBSCRIPT , italic_t start_POSTSUPERSCRIPT roman_du end_POSTSUPERSCRIPT start_POSTSUBSCRIPT italic_x , 4 end_POSTSUBSCRIPT } can make it unsensed through the channel, contradicting Statement 2. ∎

Let α𝛼\alphaitalic_α be a truth assignment that sets xX𝑥𝑋x\in Xitalic_x ∈ italic_X to false if tx¯subscript𝑡¯𝑥t_{\bar{x}}italic_t start_POSTSUBSCRIPT over¯ start_ARG italic_x end_ARG end_POSTSUBSCRIPT is sensed by a clause sensor and xX𝑥𝑋x\in Xitalic_x ∈ italic_X to true if tx,1subscript𝑡𝑥1t_{x,1}italic_t start_POSTSUBSCRIPT italic_x , 1 end_POSTSUBSCRIPT or tx,2subscript𝑡𝑥2t_{x,2}italic_t start_POSTSUBSCRIPT italic_x , 2 end_POSTSUBSCRIPT is sensed by a clause sensor. If neither of the two conditions hold, then we set x𝑥xitalic_x to true. Note that the well-definedness of α𝛼\alphaitalic_α follows immediately from Statement 3 of 4. Assume that cC𝑐𝐶c\in Citalic_c ∈ italic_C is not satisfied by α𝛼\alphaitalic_α. However, this implies that scsubscript𝑠𝑐s_{c}italic_s start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT does not sense a variable target corresponding to a literal appearing in c𝑐citalic_c (by the definition of α𝛼\alphaitalic_α). This implies that scsubscript𝑠𝑐s_{c}italic_s start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT will sense tcsubscript𝑡𝑐t_{c}italic_t start_POSTSUBSCRIPT italic_c end_POSTSUBSCRIPT, a contradiction to Statement 2 of 4. ∎

C.2 Proof of Proposition 7

See 7

Proof.

Recall that we assume that sensors act greedily and that the sensor ordering is fixed and known. We iteratively construct the target ordering always appending an additional target at the end of the ordering, while storing the types of already sent targets as well as the sensors that sensed the last τ+1𝜏1\tau+1italic_τ + 1 targets. For our dynamic program, we create a table J[i1,,inχ,b1,,bτ+1]𝐽subscript𝑖1subscript𝑖subscript𝑛𝜒subscript𝑏1subscript𝑏𝜏1J[i_{1},\dots,i_{n_{\chi}},b_{1},\dots,b_{\tau+1}]\in\mathbb{N}italic_J [ italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] ∈ blackboard_N with ij[j]subscript𝑖𝑗delimited-[]subscript𝑗i_{j}\in[\ell_{j}]italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ [ roman_ℓ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ] for each j[nχ]𝑗delimited-[]subscript𝑛𝜒j\in[n_{\chi}]italic_j ∈ [ italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ] and b1,,bτ+1S{}subscript𝑏1subscript𝑏𝜏1𝑆b_{1},\dots,b_{\tau+1}\in S\cup\{\emptyset\}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ∈ italic_S ∪ { ∅ }. For a table cell, let i:=j[nχ]ijassign𝑖subscript𝑗delimited-[]subscript𝑛𝜒subscript𝑖𝑗i:=\sum_{j\in[n_{\chi}]}i_{j}italic_i := ∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ] end_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT, i.e., i𝑖iitalic_i is the total number of targets that have been sent. An entry of the table stores the maximum value of targets that can survive if Blue sends ijsubscript𝑖𝑗i_{j}italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT targets of type γjsubscript𝛾𝑗\gamma_{j}italic_γ start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT (for each j[nχ]𝑗delimited-[]subscript𝑛𝜒j\in[n_{\chi}]italic_j ∈ [ italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ]) through the channel in a way that the t𝑡titalic_tth last target sent for t[max(1,(j[nχ]ij)τ),j[nχ]ij]𝑡1subscript𝑗delimited-[]subscript𝑛𝜒subscript𝑖𝑗𝜏subscript𝑗delimited-[]subscript𝑛𝜒subscript𝑖𝑗t\in[\max(1,(\sum_{j\in[n_{\chi}]}i_{j})-\tau),\sum_{j\in[n_{\chi}]}i_{j}]italic_t ∈ [ roman_max ( 1 , ( ∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ] end_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ) - italic_τ ) , ∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ] end_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ] is sensed by sensor if bjsubscript𝑏𝑗b_{j}\neq\emptysetitalic_b start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ≠ ∅ and by no sensor if bj=subscript𝑏𝑗b_{j}=\emptysetitalic_b start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = ∅ (the intuition is that b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT is the sensor that sensed the most recent passing target (if existent), b2subscript𝑏2b_{2}italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT sensed the second most recent one, and so on. If the second constraint is not realizable, we set the table entry to -\infty- ∞. The answer to our problem is minb1,,bτ+1S{}J[1,,nχ,b1,,bτ+1]subscriptsubscript𝑏1subscript𝑏𝜏1𝑆𝐽subscript1subscriptsubscript𝑛𝜒subscript𝑏1subscript𝑏𝜏1\min_{b_{1},\dots,b_{\tau+1}\in S\cup\{\emptyset\}}J[\ell_{1},\dots,\ell_{n_{% \chi}},b_{1},\dots,b_{\tau+1}]roman_min start_POSTSUBSCRIPT italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ∈ italic_S ∪ { ∅ } end_POSTSUBSCRIPT italic_J [ roman_ℓ start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , roman_ℓ start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ].

For the initialization, we set an entry J[i1,,inχ,b1,,bτ+1]𝐽subscript𝑖1subscript𝑖subscript𝑛𝜒subscript𝑏1subscript𝑏𝜏1J[i_{1},\dots,i_{n_{\chi}},b_{1},\dots,b_{\tau+1}]italic_J [ italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] to 00 if j[nχ]ij=0subscript𝑗delimited-[]subscript𝑛𝜒subscript𝑖𝑗0\sum_{j\in[n_{\chi}]}i_{j}=0∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ] end_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = 0 and to -\infty- ∞ otherwise. Now, we update the table for increasing j[nχ]ij=0,1,,nsubscript𝑗delimited-[]subscript𝑛𝜒subscript𝑖𝑗01𝑛\sum_{j\in[n_{\chi}]}i_{j}=0,1,\dots,n∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ] end_POSTSUBSCRIPT italic_i start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT = 0 , 1 , … , italic_n by filling J[i1,,inχ,b1,,bτ+1]𝐽subscript𝑖1subscript𝑖subscript𝑛𝜒subscript𝑏1subscript𝑏𝜏1J[i_{1},\dots,i_{n_{\chi}},b_{1},\dots,b_{\tau+1}]italic_J [ italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] as follows. We start by assuming that b1subscript𝑏1b_{1}\neq\emptysetitalic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT ≠ ∅ implying that the next target to be sent needs to be sensed by b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT. If b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT appears among b2,,bτ+1subscript𝑏2subscript𝑏𝜏1b_{2},\dots,b_{\tau+1}italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT, we set the entry to -\infty- ∞. Otherwise, let γj1,,γjzsubscript𝛾subscript𝑗1subscript𝛾subscript𝑗𝑧\gamma_{j_{1}},\dots,\gamma_{j_{z}}italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , … , italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_z end_POSTSUBSCRIPT end_POSTSUBSCRIPT be the target types so that b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT is capable of sensing targets of this type and only sensors from {b2,,bτ+1}subscript𝑏2subscript𝑏𝜏1\{b_{2},\dots,b_{\tau+1}\}{ italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT } appear before b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT in the sensor ordering and are capable of sensing targets of this type. Less formally speaking, γj1,,γjzsubscript𝛾subscript𝑗1subscript𝛾subscript𝑗𝑧\gamma_{j_{1}},\dots,\gamma_{j_{z}}italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , … , italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_z end_POSTSUBSCRIPT end_POSTSUBSCRIPT are all the target types so that if a target of this type is sent next over the channel b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT would be the sensor sensing this target (as all other sensors placed before b1subscript𝑏1b_{1}italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT that can sense targets of this type are still recharging, i.e., they are part of {b2,,bτ+1}subscript𝑏2subscript𝑏𝜏1\{b_{2},\dots,b_{\tau+1}\}{ italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT }). If no such target type exists, we set J[i1,,inχ,b1,,bτ+1]𝐽subscript𝑖1subscript𝑖subscript𝑛𝜒subscript𝑏1subscript𝑏𝜏1J[i_{1},\dots,i_{n_{\chi}},b_{1},\dots,b_{\tau+1}]italic_J [ italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT ] to -\infty- ∞. Otherwise, for each t[z]𝑡delimited-[]𝑧t\in[z]italic_t ∈ [ italic_z ], we check maxsS{}J[i1,,iγjt1,,inχ,b2,,bτ+1,s]subscript𝑠𝑆𝐽subscript𝑖1subscript𝑖subscript𝛾subscript𝑗𝑡1subscript𝑖subscript𝑛𝜒subscript𝑏2subscript𝑏𝜏1𝑠\max_{s\in S\cup\{\emptyset\}}J[i_{1},\dots,i_{\gamma_{j_{t}}}-1,\dots,i_{n_{% \chi}},b_{2},\dots,b_{\tau+1},s]roman_max start_POSTSUBSCRIPT italic_s ∈ italic_S ∪ { ∅ } end_POSTSUBSCRIPT italic_J [ italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_POSTSUBSCRIPT - 1 , … , italic_i start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT , italic_s ] and let the entry be the maximum of these values.

Analogously, if b1=subscript𝑏1b_{1}=\emptysetitalic_b start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT = ∅, we let γj1,,γjzsubscript𝛾subscript𝑗1subscript𝛾subscript𝑗𝑧\gamma_{j_{1}},\dots,\gamma_{j_{z}}italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT end_POSTSUBSCRIPT , … , italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_z end_POSTSUBSCRIPT end_POSTSUBSCRIPT be the target types where {b2,,bτ+1}subscript𝑏2subscript𝑏𝜏1\{b_{2},\dots,b_{\tau+1}\}{ italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT } contains all the sensors that are capable of sensing targets of this type. If no such target type exists, we set the entry to be -\infty- ∞. Otherwise, for each t[z]𝑡delimited-[]𝑧t\in[z]italic_t ∈ [ italic_z ], we compute maxsS{}J[i1,,iγjt1,,inχ,b2,,bτ+1,s]subscript𝑠𝑆𝐽subscript𝑖1subscript𝑖subscript𝛾subscript𝑗𝑡1subscript𝑖subscript𝑛𝜒subscript𝑏2subscript𝑏𝜏1𝑠\max_{s\in S\cup\{\emptyset\}}J[i_{1},\dots,i_{\gamma_{j_{t}}}-1,\dots,i_{n_{% \chi}},b_{2},\dots,b_{\tau+1},s]roman_max start_POSTSUBSCRIPT italic_s ∈ italic_S ∪ { ∅ } end_POSTSUBSCRIPT italic_J [ italic_i start_POSTSUBSCRIPT 1 end_POSTSUBSCRIPT , … , italic_i start_POSTSUBSCRIPT italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT end_POSTSUBSCRIPT - 1 , … , italic_i start_POSTSUBSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUBSCRIPT , italic_b start_POSTSUBSCRIPT 2 end_POSTSUBSCRIPT , … , italic_b start_POSTSUBSCRIPT italic_τ + 1 end_POSTSUBSCRIPT , italic_s ] plus the utility of targets of type γjtsubscript𝛾subscript𝑗𝑡\gamma_{j_{t}}italic_γ start_POSTSUBSCRIPT italic_j start_POSTSUBSCRIPT italic_t end_POSTSUBSCRIPT end_POSTSUBSCRIPT and let the entry be the maximum of these values.

The correctness follows from the fact that the initially stated invariant is preserved throughout the algorithm. Observing that computing each table entry takes 𝒪(nχ(k+1))𝒪subscript𝑛𝜒𝑘1\mathcal{O}(n_{\chi}\cdot(k+1))caligraphic_O ( italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ⋅ ( italic_k + 1 ) ) time, the claimed running time of 𝒪(nχ(i=1nχ(i+1))(k+1)τ+2)𝒪subscript𝑛𝜒superscriptsubscriptproduct𝑖1subscript𝑛𝜒subscript𝑖1superscript𝑘1𝜏2\mathcal{O}\left(n_{\chi}\cdot\left(\prod_{i=1}^{n_{\chi}}(\ell_{i}+1)\right)% \cdot(k+1)^{\tau+2}\right)caligraphic_O ( italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT ⋅ ( ∏ start_POSTSUBSCRIPT italic_i = 1 end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_n start_POSTSUBSCRIPT italic_χ end_POSTSUBSCRIPT end_POSTSUPERSCRIPT ( roman_ℓ start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + 1 ) ) ⋅ ( italic_k + 1 ) start_POSTSUPERSCRIPT italic_τ + 2 end_POSTSUPERSCRIPT ) follows.

C.3 Proof of Proposition 8

See 8

Proof.

We model an instance \mathcal{I}caligraphic_I of Best Blue Response as follows. For each target i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ], we add an integer variable zisubscript𝑧𝑖z_{i}italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT that encodes the position in which the target appears in the final ordering. We add linear constraints so that zi[1,n]subscript𝑧𝑖1𝑛z_{i}\in[1,n]italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ [ 1 , italic_n ] and zizisubscript𝑧𝑖subscript𝑧superscript𝑖z_{i}\neq z_{i^{\prime}}italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≠ italic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT for all ii[1,n]𝑖superscript𝑖1𝑛i\neq i^{\prime}\in[1,n]italic_i ≠ italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ 1 , italic_n ] (see Footnote 10).

Next, similar as in Proposition 3, for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k+1]𝑗delimited-[]𝑘1j\in[k+1]italic_j ∈ [ italic_k + 1 ], we add a binary variable xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT. Setting xi,jsubscript𝑥𝑖𝑗x_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT to one means that tisubscript𝑡𝑖t_{i}italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT is detected by sensor sjsubscript𝑠𝑗s_{j}italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT or in case that j=k+1𝑗𝑘1j=k+1italic_j = italic_k + 1 that the target makes it unsensed through the channel. Accordingly, the objective becomes:

maxi[n]vixi,k+1.subscript𝑖delimited-[]𝑛subscript𝑣𝑖subscript𝑥𝑖𝑘1\max\sum_{i\in[n]}v_{i}\cdot x_{i,k+1}.roman_max ∑ start_POSTSUBSCRIPT italic_i ∈ [ italic_n ] end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ⋅ italic_x start_POSTSUBSCRIPT italic_i , italic_k + 1 end_POSTSUBSCRIPT .

For each target i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ], we impose that:

j[k+1]xi,j=1.subscript𝑗delimited-[]𝑘1subscript𝑥𝑖𝑗1\sum_{j\in[k+1]}x_{i,j}=1.∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_k + 1 ] end_POSTSUBSCRIPT italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 .

Moreover, we impose xi,jDi,jsubscript𝑥𝑖𝑗subscript𝐷𝑖𝑗x_{i,j}\leq D_{i,j}italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT ≤ italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], enforcing the sensor capabilities.

To ensure that the recharging times of sensors are respected we add the following set of constraints. For each, j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ] and i,i[n]𝑖superscript𝑖delimited-[]𝑛i,i^{\prime}\in[n]italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ], we add

|zizi|n(2xi,jxi,j)+τ.subscript𝑧superscript𝑖subscript𝑧𝑖𝑛2subscript𝑥𝑖𝑗subscript𝑥superscript𝑖𝑗𝜏|z_{i^{\prime}}-z_{i}|\geq-n(2-x_{i,j}-x_{i^{\prime},j})+\tau.| italic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT | ≥ - italic_n ( 2 - italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT - italic_x start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT ) + italic_τ .

This ensures that if xi,j=1subscript𝑥𝑖𝑗1x_{i,j}=1italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 and xi,j=1subscript𝑥superscript𝑖𝑗1x_{i^{\prime},j}=1italic_x start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT = 1, then i𝑖iitalic_i and isuperscript𝑖i^{\prime}italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT are placed far enough away from each other, while otherwise the condition is vacant. To realize the absolute value from the above equation, we have to introduce another set of binary variables oi,isubscript𝑜𝑖superscript𝑖o_{i,i^{\prime}}italic_o start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT for i,i[n]𝑖superscript𝑖delimited-[]𝑛i,i^{\prime}\in[n]italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] and add the constraints: zizi+noi,in(2xi,jxi,j)+τsubscript𝑧superscript𝑖subscript𝑧𝑖𝑛subscript𝑜𝑖superscript𝑖𝑛2subscript𝑥𝑖𝑗subscript𝑥superscript𝑖𝑗𝜏z_{i^{\prime}}-z_{i}+n\cdot o_{i,i^{\prime}}\geq-n(2-x_{i,j}-x_{i^{\prime},j})+\tauitalic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT + italic_n ⋅ italic_o start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ≥ - italic_n ( 2 - italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT - italic_x start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT ) + italic_τ and zizi+n(1oi,i)n(2xi,jxi,j)+τsubscript𝑧𝑖subscript𝑧superscript𝑖𝑛1subscript𝑜𝑖𝑖𝑛2subscript𝑥𝑖𝑗subscript𝑥superscript𝑖𝑗𝜏z_{i}-z_{i^{\prime}}+n\cdot(1-o_{i,i})\geq-n(2-x_{i,j}-x_{i^{\prime},j})+\tauitalic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT + italic_n ⋅ ( 1 - italic_o start_POSTSUBSCRIPT italic_i , italic_i end_POSTSUBSCRIPT ) ≥ - italic_n ( 2 - italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT - italic_x start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT ) + italic_τ.

If a target i𝑖iitalic_i is sensed by sensor j𝑗jitalic_j then due to the recharging time sensor j𝑗jitalic_j will not be able to sense other sensors, thus i𝑖iitalic_i “protects” some targets from being sensed by sensor j𝑗jitalic_j. To capture this information, for each i,i[n]𝑖superscript𝑖delimited-[]𝑛i,i^{\prime}\in[n]italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], we add a binary variable yi,i,jsubscript𝑦𝑖superscript𝑖𝑗y_{i,i^{\prime},j}italic_y start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT that is equal to one target i𝑖iitalic_i is sensed by sensor j𝑗jitalic_j and because of this j𝑗jitalic_j cannot sense isuperscript𝑖i^{\prime}italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT. To ensure this, first, for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], we add:

i[n]yi,i,jnxi,jsubscriptsuperscript𝑖delimited-[]𝑛subscript𝑦𝑖superscript𝑖𝑗𝑛subscript𝑥𝑖𝑗\sum_{i^{\prime}\in[n]}y_{i,i^{\prime},j}\leq n\cdot x_{i,j}∑ start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] end_POSTSUBSCRIPT italic_y start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT ≤ italic_n ⋅ italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT

(a target i𝑖iitalic_i can only protect other targets if the target is sensed by the corresponding sensor). Moreover, for each i,i[n]𝑖superscript𝑖delimited-[]𝑛i,i^{\prime}\in[n]italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] and j[k]𝑗delimited-[]𝑘j\in[k]italic_j ∈ [ italic_k ], we need to make sure that if yi,i,j=1subscript𝑦𝑖superscript𝑖𝑗1y_{i,i^{\prime},j}=1italic_y start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT = 1, then 0ziziτ0subscript𝑧superscript𝑖subscript𝑧𝑖𝜏0\leq z_{i^{\prime}}-z_{i}\leq\tau0 ≤ italic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≤ italic_τ (to exploit of the recharging constraint). For this, we add constraints:

n(1yi,i,j)zizin(1yi,i,j)+τ.𝑛1subscript𝑦𝑖superscript𝑖𝑗subscript𝑧superscript𝑖subscript𝑧𝑖𝑛1subscript𝑦𝑖superscript𝑖𝑗𝜏-n(1-y_{i,i^{\prime},j})\leq z_{i^{\prime}}-z_{i}\leq n(1-y_{i,i^{\prime},j})+\tau.- italic_n ( 1 - italic_y start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT ) ≤ italic_z start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT - italic_z start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ≤ italic_n ( 1 - italic_y start_POSTSUBSCRIPT italic_i , italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_j end_POSTSUBSCRIPT ) + italic_τ . (10)

Lastly, we need to make sure that a target will survive until step j𝑗jitalic_j if xi,j=1subscript𝑥𝑖𝑗1x_{i,j}=1italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 i.e., the target needs to be covered by other targets for all sensors that are capable of sensing it placed before j𝑗jitalic_j. Note that this together with the first constraint (j[k+1]xi,j=1subscript𝑗delimited-[]𝑘1subscript𝑥𝑖𝑗1\sum_{j\in[k+1]}x_{i,j}=1∑ start_POSTSUBSCRIPT italic_j ∈ [ italic_k + 1 ] end_POSTSUBSCRIPT italic_x start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1) in particular implies that each target is sensed by the first sensor it passes which is not recharging, thereby successfully encoding the greedy behavior of the sensors. Specifically, we add the following set of constraints for each i[n]𝑖delimited-[]𝑛i\in[n]italic_i ∈ [ italic_n ] and j[k+1]𝑗delimited-[]𝑘1j\in[k+1]italic_j ∈ [ italic_k + 1 ]:

t[j1]:Di,t=01+limit-fromsubscript:𝑡delimited-[]𝑗1subscript𝐷𝑖𝑡01\displaystyle\sum_{t\in[j-1]:D_{i,t}=0}1+∑ start_POSTSUBSCRIPT italic_t ∈ [ italic_j - 1 ] : italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 0 end_POSTSUBSCRIPT 1 + t[j1]:Di,t=1i[n]yi,i,t(j1)subscript:𝑡delimited-[]𝑗1subscript𝐷𝑖𝑡1subscriptsuperscript𝑖delimited-[]𝑛subscript𝑦superscript𝑖𝑖𝑡𝑗1\displaystyle\sum_{t\in[j-1]:D_{i,t}=1}\sum_{i^{\prime}\in[n]}y_{i^{\prime},i,% t}-(j-1)∑ start_POSTSUBSCRIPT italic_t ∈ [ italic_j - 1 ] : italic_D start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ∈ [ italic_n ] end_POSTSUBSCRIPT italic_y start_POSTSUBSCRIPT italic_i start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT , italic_i , italic_t end_POSTSUBSCRIPT - ( italic_j - 1 ) (11)
n(1t=jk+1xi,t).absent𝑛1superscriptsubscript𝑡𝑗𝑘1subscript𝑥𝑖𝑡\displaystyle\geq-n(1-\sum_{t=j}^{k+1}x_{i,t}).≥ - italic_n ( 1 - ∑ start_POSTSUBSCRIPT italic_t = italic_j end_POSTSUBSCRIPT start_POSTSUPERSCRIPT italic_k + 1 end_POSTSUPERSCRIPT italic_x start_POSTSUBSCRIPT italic_i , italic_t end_POSTSUBSCRIPT ) .

Appendix D Additional Experimental Results

To begin, we generate a Figure 2 illustrating the average utility for Blue across varying probabilities of Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1. This visualization aims to demonstrate the impact of the probability of Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 on Blue’s utility under the Default game settings.

Refer to caption
Figure 2: In this experiment, we focus on the Default setting, but changes the probability of each element Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1. We vary the probability from 00 to 1111 and observe Blue’s utility. We generate 50 random instances with 500500500500 targets, 10101010 sensors, and τ=10𝜏10\tau=10italic_τ = 10 under each setting. Each target’s value is drawn within [0,1]01[0,1][ 0 , 1 ] uniformly.

In Table 7, we show the effectiveness of our ILP solver. Notably, it demonstrates the capability to solve large instances very fast, completing the task within a second. This proficiency has been valuable in the development of heuristic algorithms for bilevel optimization in the search for identifying the Stackelberg equilibrium. We also show that our ILP solver can solve extensive instances involving hundreds of targets within a single hour in Table 8.

Utility, Time (s) 2 5 10
5 1.76±plus-or-minus\pm± 0.75, 0.001 1 ±plus-or-minus\pm± 0.63, 0.002 ±plus-or-minus\pm± 0.02 0.38 ±plus-or-minus\pm± 0.43, 0.003 ±plus-or-minus\pm± 0.002
25 8.73 ±plus-or-minus\pm± 1.27, 0.004 ±plus-or-minus\pm± 0.002 4.55 ±plus-or-minus\pm± 1.3, 0.008 ±plus-or-minus\pm± 0.002 1.39 ±plus-or-minus\pm± 0.84, 0.01 ±plus-or-minus\pm± 0.003
75 26±plus-or-minus\pm± 2.8, 0.01 ±plus-or-minus\pm± 0.007 13.9±plus-or-minus\pm± 2.33, 0.02 ±plus-or-minus\pm± 0.007 4.41 ±plus-or-minus\pm± 1.57, 0.04 ±plus-or-minus\pm± 0.007
Table 7: Best Red Response ILP running time: Each row represents the number of targets, and each column represents the number of sensors. τ=2𝜏2\tau=2italic_τ = 2 for every setting. Each element represents the average Blue’s utility (first row) and the average solving time (italic second row) of 50 randomly generated instances under Default game setting.
Utility, Time (s) 5 10 20
600 175±plus-or-minus\pm± 6, 0.73 ±plus-or-minus\pm± 0.01 77 ±plus-or-minus\pm± 5, 1.55 ±plus-or-minus\pm± 0.22 4.01 ±plus-or-minus\pm± 1.53, 2.79 ±plus-or-minus\pm± 0.04
800 234 ±plus-or-minus\pm± 6.5, 1.02 ±plus-or-minus\pm± 0.01 103 ±plus-or-minus\pm± 6.1, 2.09 ±plus-or-minus\pm± 0.27 5.28 ±plus-or-minus\pm± 2.06, 3.82 ±plus-or-minus\pm± 0.04
1000 292±plus-or-minus\pm± 7.2, 1.23 ±plus-or-minus\pm± 0.02 131 ±plus-or-minus\pm± 6.7, 2.62 ±plus-or-minus\pm± 0.35 6.4±plus-or-minus\pm± 2, 5 ±plus-or-minus\pm± 0.06
5000 1478 ±plus-or-minus\pm± 20, 6.5 ±plus-or-minus\pm± 0.05 662 ±plus-or-minus\pm± 13.1, 13.66 ±plus-or-minus\pm± 1.48 33.1 ±plus-or-minus\pm± 3.98, 24.76 ±plus-or-minus\pm± 0.051
10,000 2959±plus-or-minus\pm± 24, 12.9 ±plus-or-minus\pm± 0.18 1321 ±plus-or-minus\pm± 20, 29.8 ±plus-or-minus\pm± 2.6 66.3±plus-or-minus\pm± 5.57, 62.59 ±plus-or-minus\pm± 0.83
Table 8: Each row represents the number of targets, and each column represents the number of sensors. τ=10𝜏10\tau=10italic_τ = 10 for every setting. Each element represents the average Blue’s utility (first row) and the average solving time (italic second row) of the ILP for 50 randomly generated instances under Default game setting.

In the remaining parts of this section, we explore a new game setting (Append) for generating ESGs. The new method is similar to Default, with the distinction that each element Di,j=1subscript𝐷𝑖𝑗1D_{i,j}=1italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 with a 0.5 probability. In essence, this configuration increases the likelihood of each target being sensed compared to the Default setting, thereby resulting in a stronger Red sensing model.

D.1 Computing the Follower Strategy

Similar to the Default game setting, we show the scalability results of Append in table 9.

Utility, Time (s) 5 10 20
600 67.8 ±plus-or-minus\pm± 4.3, 0.74 ±plus-or-minus\pm± 0.06 13.82 ±plus-or-minus\pm± 3.96, 4.68 ±plus-or-minus\pm± 8.46 0.2 ±plus-or-minus\pm± 1.38, 2.85 ±plus-or-minus\pm± 0.04
800 91.1 ±plus-or-minus\pm± 5.8, 1.02 ±plus-or-minus\pm± 0.1 19.6 ±plus-or-minus\pm± 7.75, 6.27 ±plus-or-minus\pm± 10.98 0.13 ±plus-or-minus\pm± 0.36, 3.66 ±plus-or-minus\pm± 0.04
1000 114 ±plus-or-minus\pm± 7.9, 1.29 ±plus-or-minus\pm± 0.14 24.5 ±plus-or-minus\pm± 5.9, 6.06 ±plus-or-minus\pm± 4.7 0.25±plus-or-minus\pm± 1.45, 4.77 ±plus-or-minus\pm± 0.06
Table 9: Each row represents the number of targets, and each column represents the number of sensors. τ=10𝜏10\tau=10italic_τ = 10 for every setting. Each element represents the average Blue’s utility (first row) and the average solving time (italic second row) of the ILP for 50 randomly generated instances under Append game setting.

In this new setting, an intriguing observation emerges as the number of sensors increases significantly: the runtime of our ILP decreases, given that the abundant sensors can effectively sense all targets (e.g., when the number of sensors increased from 10 to 20.).

D.2 Additional Results from Computing the Stackelberg Equilbrium

In this subsection, we begin by showing Figure 3, illustrating the impact of the choice of ration (μ𝜇\muitalic_μ) on the SA algorithm discussed in Section 4.2. Specifically, we present and test three quadratic-time greedy heuristics to build the sensing plan ψ𝜓\psiitalic_ψ iteratively by trying to sense the most valuable targets first. We consider the targets in decreasing order of their value. Let Tsuperscript𝑇T^{\prime}italic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT be the already processed targets and tsubscript𝑡t_{\ell}italic_t start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT the target to consider. Moreover, let SSsuperscript𝑆𝑆S^{\prime}\subseteq Sitalic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT ⊆ italic_S the set of sensors s𝑠sitalic_s so that ψ𝜓\psiitalic_ψ remains a valid sensing plan after adding tsubscript𝑡t_{\ell}italic_t start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT to ψ(s)𝜓𝑠\psi(s)italic_ψ ( italic_s ), i.e., the sensors that are currently free to sense tsubscript𝑡t_{\ell}italic_t start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT. If Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT is empty, then we do not assign tsubscript𝑡t_{\ell}italic_t start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT to any sensor, implying that it will be won by Blue. Otherwise, we apply three different methods to decide which sensor from Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT to pick:

random

Randomly select a sensor from Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT.

remaining_value

Pick the sensor s𝑠sitalic_s from Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT that has the lowest summed value of remaining targets that s𝑠sitalic_s is capable of sensing, i.e., argminsjStiTT:Di,j=1visubscriptargminsubscript𝑠𝑗superscript𝑆subscript:subscript𝑡𝑖𝑇superscript𝑇subscript𝐷𝑖𝑗1subscript𝑣𝑖\operatorname*{arg\,min}_{s_{j}\in S^{\prime}}\sum_{t_{i}\in T\setminus T^{% \prime}:D_{i,j}=1}v_{i}start_OPERATOR roman_arg roman_min end_OPERATOR start_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_T ∖ italic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT : italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

harm

Pick the sensor s𝑠sitalic_s from Ssuperscript𝑆S^{\prime}italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT that where assigning tsubscript𝑡t_{\ell}italic_t start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT does the least harm: The harm that tsubscript𝑡t_{\ell}italic_t start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT does to s𝑠sitalic_s in ψ𝜓\psiitalic_ψ summed value of remaining targets that s𝑠sitalic_s is capable of sensing that it can no longer sense when tsubscript𝑡t_{\ell}italic_t start_POSTSUBSCRIPT roman_ℓ end_POSTSUBSCRIPT is assigned to s𝑠sitalic_s, i.e., argminsjStiTT:Di,j=1 and |i|τvisubscriptargminsubscript𝑠𝑗superscript𝑆subscript:subscript𝑡𝑖𝑇superscript𝑇subscript𝐷𝑖𝑗1 and 𝑖𝜏subscript𝑣𝑖\operatorname*{arg\,min}_{s_{j}\in S^{\prime}}\sum_{t_{i}\in T\setminus T^{% \prime}:D_{i,j}=1\text{ and }|i-\ell|\leq\tau}v_{i}start_OPERATOR roman_arg roman_min end_OPERATOR start_POSTSUBSCRIPT italic_s start_POSTSUBSCRIPT italic_j end_POSTSUBSCRIPT ∈ italic_S start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT end_POSTSUBSCRIPT ∑ start_POSTSUBSCRIPT italic_t start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT ∈ italic_T ∖ italic_T start_POSTSUPERSCRIPT ′ end_POSTSUPERSCRIPT : italic_D start_POSTSUBSCRIPT italic_i , italic_j end_POSTSUBSCRIPT = 1 and | italic_i - roman_ℓ | ≤ italic_τ end_POSTSUBSCRIPT italic_v start_POSTSUBSCRIPT italic_i end_POSTSUBSCRIPT.

Refer to caption
Figure 3: In this experiment, we generate 50 random instances with 10101010 targets, 5555 sensors, and τ=2𝜏2\tau=2italic_τ = 2 under Append game setting. Each target’s value is drawn within [0,1]01[0,1][ 0 , 1 ] uniformly.

We also present the bilevel ILP’s scalability results under the new Append game setting in Table 10.

Utility, Time (s) 2 3 5
5 0.72 ±plus-or-minus\pm± 0.55, 0.73 ±plus-or-minus\pm± 0.17 0.41 ±plus-or-minus\pm± 0.49, 0.85 ±plus-or-minus\pm± 0.12 0.14±plus-or-minus\pm± 0.33, 1.02 ±plus-or-minus\pm± 0.04
7 0.92 ±plus-or-minus\pm± 0.43, 121 ±plus-or-minus\pm± 13 0.57 ±plus-or-minus\pm± 0.53, 134 ±plus-or-minus\pm± 17 0.18±plus-or-minus\pm± 0.33, 155 ±plus-or-minus\pm± 16
8 0.86 ±plus-or-minus\pm± 0.51, 1841 ±plus-or-minus\pm± 356 0.41 ±plus-or-minus\pm± 0.42, 2151 ±plus-or-minus\pm± 253 0.13±plus-or-minus\pm± 0.27, 2832 ±plus-or-minus\pm± 549
9 n/a, 31358 n/a, 36181 n/a, 41999
Table 10: Each row represents the number of targets, and each column represents the number of sensors. τ=2𝜏2\tau=2italic_τ = 2 for every setting. Each element (when n=5,7,8𝑛578n=5,7,8italic_n = 5 , 7 , 8) represents the average Blue’s utility (first row) and the solving time (italic second row) of the bilevel ILP for 50 randomly generated instances under the new Append game setting. At n=9𝑛9n=9italic_n = 9, the computational time is prohibitively high. Therefore, we conduct a single run on a random instance and record the solving time. Since the utility of this individual instance is not comparable to the average utility derived from 50 random instances, we have omitted it from the table.

We also provide a comparison of heuristic algorithms under the new Append game setting in Table 11.

Utility, Time (s) (7,3,2) (75, 10, 5)
OPT 0.58 ±plus-or-minus\pm± 0.53, 134 ±plus-or-minus\pm± 17 n/a
SA 0.58 ±plus-or-minus\pm± 0.53, 6.13 ±plus-or-minus\pm± 0.87 2.26 ±plus-or-minus\pm± 1.13, 27335 ±plus-or-minus\pm± 347
SA_Relax 0.58 ±plus-or-minus\pm± 0.53, 0.043 ±plus-or-minus\pm± 0.01 0.56 ±plus-or-minus\pm± 0.48, 46.87 ±plus-or-minus\pm± 0.92
Random 0.50 ±plus-or-minus\pm± 0.54, 0.001 0.15 ±plus-or-minus\pm± 0.27, 0.001
Table 11: Compare the approximability of different greedy algorithms in terms of Blue’s utility and solving time. We generate 50 random instances and report the averaged value plus the standard deviation under Append game setting.

D.3 Additional Results from Non-Coordinated Sensing

In Table 12, we present the scalability results of the ILP that solves for optimal Blue responses in the non-coordinated Red sensing setting under Append game setting.

Utility, Time (s) 2 3 5
5 1.26 ±plus-or-minus\pm± 0.46, 0.01 ±plus-or-minus\pm± 0.04 0.96 ±plus-or-minus\pm± 0.47, 0.02 ±plus-or-minus\pm± 0.04 0.52±plus-or-minus\pm± 0.42, 0.02 ±plus-or-minus\pm± 0.04
10 2.34 ±plus-or-minus\pm± 0.7, 4.07 ±plus-or-minus\pm± 16.8 1.85 ±plus-or-minus\pm± 0.89, 90.2 ±plus-or-minus\pm± 294.6 1±plus-or-minus\pm± 0.73, 293 ±plus-or-minus\pm± 565
15 3.79 ±plus-or-minus\pm± 0.87, 482 ±plus-or-minus\pm± 2551 3.01 ±plus-or-minus\pm± 1.16, 50.4 ±plus-or-minus\pm± 18.9 n/a, 40296 ±plus-or-minus\pm± n/a
20 4.61 ±plus-or-minus\pm± 1, 889 ±plus-or-minus\pm± 1530 n/a, 9380 ±plus-or-minus\pm± n/a n/a, n/a
Table 12: Each row represents the number of targets, and each column represents the number of sensors. τ=2𝜏2\tau=2italic_τ = 2 for every setting. Each element represents the average Blue’s utility (first row) and the solving time (italic second row) of Blue’s best response ILP for 50 randomly generated instances under Append game setting. For settings where the computational time is prohibitively high, we conduct a single run on a random instance and record the single solving time. Thus, their standard deviation value is recorded as “n/a”. Additionally, the utility of this single instance is not comparable to the average utility derived from 50 random instances, we have omitted it from the table.

For the non-coordinated sensing setting, we also provide a comparison of heuristic algorithms under the new scenario in Table 13.

Utility, Time (s) (10,5,2) (75, 10, 5)
OPT 1±plus-or-minus\pm± 0.73, 293 ±plus-or-minus\pm± 565 n/a
SA 0.83 ±plus-or-minus\pm± 0.67, 0.76 ±plus-or-minus\pm± 0.02 4.57 ±plus-or-minus\pm± 1.46, 523 ±plus-or-minus\pm± 6.28
SA_Relax 0.94 ±plus-or-minus\pm± 0.71, 0.02 ±plus-or-minus\pm± 0.003 3.47 ±plus-or-minus\pm± 1.02, 3.13 ±plus-or-minus\pm± 0.12
Random 0.38 ±plus-or-minus\pm± 0.5, 0.001 1.28 ±plus-or-minus\pm± 1.05, 0.001
Table 13: Compare the approximability of different greedy algorithms in terms of Blue’s utility and solving time. We generate 50 random instances and report the averaged value plus the standard deviation under Append game setting.

D.3.1 Power of Coordination

Finally, in Table 14, we present the power of coordination results under Append game setting with Red that has stronger sensing capabilities.

Greedy Coordination
(5, 2, 2) 1.26 ±plus-or-minus\pm± 0.46 0.72 ±plus-or-minus\pm± 0.55
(5, 3, 2) 0.96 ±plus-or-minus\pm± 0.47 0.41 ±plus-or-minus\pm± 0.49
(5, 5, 2) 0.52 ±plus-or-minus\pm± 0.42 0.14 ±plus-or-minus\pm± 0.33
Table 14: Append setting: Each element represents the average Blue’s utility for 50 randomly generated instances. The game is a constant-sum game. Therefore, the decrease in Blue’s utility corresponds to an increase in Red’s utility, showing the power of coordination.

Moreover, in scenarios with large instance sizes, such as n=75,k=10,τ=5formulae-sequence𝑛75formulae-sequence𝑘10𝜏5n=75,k=10,\tau=5italic_n = 75 , italic_k = 10 , italic_τ = 5, where the optimal (bilevel) ILP is unsolvable, we can compare Blue’s approximately optimal utility under the best heuristic algorithms. Specifically, as shown in Table 11, the average Blue’s utility under the SA algorithm is 2.26±1.13plus-or-minus2.261.132.26\pm 1.132.26 ± 1.13 for 9 instances. Given the same 9 instances, the average Blue’s utility when escaping from non-coordinated sensing is 4.43±1.41plus-or-minus4.431.414.43\pm 1.414.43 ± 1.41, which is approximately twice the value observed in the coordinated sensing setting. Once again, due to the constant-sum nature of this game, the utility loss for Blue in transitioning from non-coordinated sensing to coordinated sensing essentially represents the utility gain for Red, highlighting the power of coordination.