Footnotes
...decisions.
Various versions of this well-known algorithm have appeared in the literature [Weld, 1994, Russell & Norvig, 1995, Kambhampati, Knoblock & Yang, 1995]. The version we give corresponds most directly to that given by Williamson and Hanks (1996).
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...z).
An alternative approach also treats cases in which E = F as threats; this is required to make the planner systematic, i.e., guaranteed never to generate the same node more than once [McAllester & Rosenblitt, 1991].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...repairs.
Conditional planners make use of an additional method of threat resolution--confrontation--but we ignore that within this paper [Peot & Smith, 1992, Etzioni, Hanks, Weld, Draper, Lesh & Williamson 1992]. Joslin (1996) provides a detailed account of generalizing the treatment of flaws to other types of planning decisions.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...same.
In the current version of UCPOP (v.4), the flaw selection strategy that is run by default is the DSep strategy, discussed just below. For historical reasons, we maintain the name DSep for that strategy, and use UCPOP for the older default strategy.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...strategy:
The LCFR strategy is similar to the branch-1/branch-n search heuristics included in the O-Plan system [Currie & Tate, 1991]. The contribution of our original work on this topic was to isolate this strategy and examine it in detail.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...(CSPs).
When planning problems are cast as CSPs in the planner Descartes [Joslin & Pollack, 1996, Joslin, 1996], this correspondence is even more direct.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...v.4.
Note that the experiments in both our earlier LCFR paper [Joslin & Pollack, 1994] and Gerevini and Schubert's (1996) ZLIFO paper were run using an earlier version (v.2) of UCPOP. As a result, the number of nodes produced in our experiments sometimes differs from what is reported in these other two papers. This appears to be largely due to the fact that UCPOP v.4 puts the elements of a new set of open conditions onto the flaw list in the reverse order of the way in which UCPOP v.2 does [Gerevini, 1997]. As discussed below in Sections gif-gif, we studied the influence of this ordering change by also collecting data using a modified version of UCPOP v.4 in which we reversed the order of conditions entered in the open list. While the resulting numbers are similar to those previously published, they are not identical, leading us to conclude that there are additional subtle differences between v.2 and v.4. However, because all the experiments on which we report here were run using the same version of UCPOP, we believe this to be a fair comparison of the strategies.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...%-overrun.
Because of the way in which UCPOP completes its basic iteration, it sometimes will go somewhat beyond the specified node limit before terminating the run. In such cases, we used the node limit value, rather than the actual number of nodes generated, in our computation of %-overrun.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...-.
To preserve readability, in Figure gif, we have used ``(1)'' to denote S+OC, ``(2)'' for S+OC+UC, and ``(3)'' for S+OC+UC+.1F.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...tasks.
The difficulty that LCFR-DSep encounters by greedily picking low-cost flaws might be reduced by doing a lookahead of several planning steps, to determine a more accurate repair cost. This is the approach taken in the branch-n mechanism in O-Plan [Currie & Tate, 1991]. Significant overhead can be involved in such a strategy, however.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...domains.
We have omitted the strategies that did very poorly, performing worse both on the node- and time-limit experiments than did any of the strategies graphed. Note that we ran the reverse-order experiments only with a node limit.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...faster.
In interpreting the Trains timing data, it is important to note that some of the strategies shown--notably UCPOP, UCPOP-LC, and Dunf, failed to solve Trains2 within either the node or the time limit.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

TOM Conversion
Wed Jun 25 17:40:58 EDT 1997