andyjzhao commited on
Commit
42d16d8
·
verified ·
1 Parent(s): 5410b91

Upload folder using huggingface_hub

Browse files
iclr26/6KrETIaOYD/appendix_chunks.jsonl ADDED
The diff for this file is too large to render. See raw diff
 
iclr26/6KrETIaOYD/appendix_text_v3.txt ADDED
@@ -0,0 +1,620 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
2
+ Proposition 1. The probability P(\mathbf{a}_t \mid \mathbf{L}) of generating a specific sequence of agent-task assignments defined by
3
+
4
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Equation]
5
+ P(\mathbf{a}_t \mid \mathbf{L}) = \prod_{k=1}^{M} \frac{\exp(L_{m_k, v_k})}{\sum_{(m', v' \in \mathcal{E}_k)} \exp(L_{m', v'})} (7)
6
+
7
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
8
+ is a valid probability distribution over the space of all possible ordered agent-task matchings.
9
+
10
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
11
+ Proof. To establish that P(\mathbf{a} \mid \mathbf{L}) is a valid probability distribution over the space \mathcal{A}_{\text{seq}} of all ordered sequences of M agent-task assignments, we demonstrate that it satisfies two axioms: (i) non-negativity and (ii) normalization.
12
+
13
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
14
+ Non-negativity. Each term in Equation (7) is mapped into the probability simplex via the softmax function f: \mathbb{R}^{\mathcal{E}_k} \to \Delta(|\mathcal{E}_k|) applied to the set of available agent-task pairs \mathcal{E}_k = \mathcal{E} \cap (\mathcal{M}_k \times \mathcal{V}_k) . By definition of the probability simplex, the softmax yields non-negative values that sum to one. Thus, each conditional probability P(a_k \mid \mathbf{a}^{< k}, \mathbf{L}) is non-negative, and the total probability P(\mathbf{a} \mid \mathbf{L}) , as a product of non-negative terms, is also non-negative for any \mathbf{a} \in \mathcal{A}_{\text{seq}} , satisfying the non-negativity axiom.
15
+
16
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
17
+ Normalization. To verify normalization, we demonstrate that the sum of probabilities over the entire sample space is unity. We expand this sum by expressing it as a nested sum over all possible choices at each step of the sequence generation. Using the notation \mathcal{E}(\mathbf{a}^{< k}) for the set of available choices at step k given the history \mathbf{a}^{< k} we have:
18
+
19
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Equation]
20
+ \sum_{\mathbf{a} \in \mathcal{A}_{\text{seq}}} P(\mathbf{a} \mid \mathbf{L}) = \sum_{\mathbf{a} \in \mathcal{A}_{\text{seq}}} \prod_{k=1}^{M} P(a_k \mid \mathbf{a}^{< k}, \mathbf{L}) = \sum_{a_1 \in \mathcal{E}} \sum_{a_2 \in \mathcal{E}(a_1)} \cdots \sum_{a_M \in \mathcal{E}(\mathbf{a}^{< M})} \prod_{k=1}^{M} P(a_k \mid \mathbf{a}^{< k}, \mathbf{L}) = \sum_{a_1 \in \mathcal{E}} P(a_1 \mid \mathbf{L}) \sum_{a_2 \in \mathcal{E}(a_1)} P(a_2 \mid a_1, \mathbf{L}) \cdots \sum_{a_M \in \mathcal{E}(\mathbf{a}^{< M})} P(a_M \mid \mathbf{a}^{< M}, \mathbf{L})
21
+
22
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
23
+ Consider the sum over all possible assignments for any given history \mathbf{a}^{< k} . By substituting the definition from Equation 2, we have:
24
+
25
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Equation]
26
+ \sum_{a_k \in \mathcal{E}(\mathbf{a}^{< k})} P(a_k = (m_k, v_k) \mid \mathbf{a}^{< k}, \mathbf{L}) = \sum_{(m_k, v_k) \in \mathcal{E}(\mathbf{a}^{< k})} \frac{\exp(L_{m_k, v_k})}{\sum_{(m', v') \in \mathcal{E}(\mathbf{a}^{< k})} \exp(L_{m', v'})} = \frac{\sum_{(m_k, v_k) \in \mathcal{E}(\mathbf{a}^{< k})} \exp(L_{m_k, v_k})}{\sum_{(m', v') \in \mathcal{E}(\mathbf{a}^{< k})} \exp(L_{m', v'})} = 1
27
+
28
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
29
+ Since \sum_{a_k \in \mathcal{E}(\mathbf{a}^{< k})} P(a_k \mid \mathbf{a}^{< k}, \mathbf{L}) = 1 for any 1 \le k \le M , the marginalized sum collapses:
30
+
31
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Equation]
32
+ \sum_{\mathbf{a} \in \mathcal{A}_{seq}} P(\mathbf{a} \mid \mathbf{L}) = 1 \times \ldots \times 1 = 1.
33
+
34
+ [p. 14 | section: A PROOF OF PROPOSITION 1 | type: Text]
35
+ Thus, the normalization property is satisfied. Since both axioms hold, P(\mathbf{a} \mid \mathbf{L}) is a valid probability distribution.
36
+
37
+ [p. 15 | section: B MACSIM POLICY | type: Text]
38
+ As defined in Section 3, the problems tackled by MACSIM can be formulated as MMDPs, whose states are bipartite graphs consisting of agent and task nodes. MACSIM therefore requires an architectural policy backbone, that is capable of encoding such graph structure effectively. Our policy is strongly motivated by related works of Kwon et al. (2021); Luttmann & Xie (2024; 2025), who define such architectures in the realm of NCO.
39
+
40
+ [p. 15 | section: B MACSIM POLICY | type: Text]
41
+ First, the policy employed in our paper projects the different node-types (agents and tasks) from their distinct feature spaces into a mutual embedding space of dimensionality d using type-specific transformations \mathbf{W}_{\epsilon_i} for node i of type \epsilon_i . The features used to represent agents and tasks for the respective problems can be found in Appendix C.
42
+
43
+ [p. 15 | section: B MACSIM POLICY | type: Text]
44
+ Given the initial embeddings \mathbf{H}_{\mathcal{M}}^0 and \mathbf{H}_{\mathcal{V}}^0 for agents and tasks, respectively, we use several layers of self- and cross-attention to enable message passing between all nodes in the graph. While self-attention is applied independently to agent and task embeddings following the Transformer architecture Vaswani et al. (2017), cross-attention allows message passing between agent and task nodes.
45
+
46
+ [p. 15 | section: B MACSIM POLICY | type: Text]
47
+ Formally, to perform cross-attention we compute a matrix of attention scores A using agent embeddings as queries Q and task embeddings as keys K:
48
+
49
+ [p. 15 | section: B MACSIM POLICY | type: Equation]
50
+ \mathbf{A} = \frac{\mathbf{Q}\mathbf{K}^{\top}}{\sqrt{d_k}}
51
+
52
+ [p. 15 | section: B MACSIM POLICY | type: Text]
53
+ where
54
+
55
+ [p. 15 | section: B MACSIM POLICY | type: Equation]
56
+ \mathbf{Q} = \mathbf{W}^{\mathbf{Q}} \mathbf{H}_{\mathcal{M}}^{l-1}, \qquad \mathbf{K} = \mathbf{W}^{\mathbf{K}} \mathbf{H}_{\mathcal{V}}^{l-1}
57
+
58
+ [p. 15 | section: B MACSIM POLICY | type: FigureGroup]
59
+ Figure 4: MACSIM Policy
60
+
61
+ [p. 15 | section: B MACSIM POLICY | type: Equation]
62
+ \mathbf{A}_{\mathcal{M}\to\mathcal{V}} = \mathrm{MLP}_{\mathcal{M}}([\mathbf{A}||\mathbf{E}]), \quad \mathbf{A}_{\mathcal{V}\to\mathcal{M}} = \mathrm{MLP}_{\mathcal{V}}([\mathbf{A}^\top||\mathbf{E}^\top]), (8)
63
+
64
+ [p. 15 | section: B MACSIM POLICY | type: Text]
65
+ The resulting attention scores are then used to compute the embeddings for the nodes of the respective type:
66
+
67
+ [p. 15 | section: B MACSIM POLICY | type: Equation]
68
+ \mathbf{H}'_{\mathcal{M}} = \operatorname{softmax}(\mathbf{A}_{\mathcal{M} \to \mathcal{V}}) \mathbf{V}_{\mathcal{V}}, \quad \mathbf{V}_{\mathcal{V}} = \mathbf{W}_{\mathcal{V}}^{\mathbf{V}} \mathbf{H}_{\mathcal{V}}^{l-1} (9)
69
+
70
+ [p. 15 | section: B MACSIM POLICY | type: Equation]
71
+ \mathbf{H}_{\mathcal{V}}' = \operatorname{softmax}(\mathbf{A}_{\mathcal{V} \to \mathcal{M}}) \mathbf{V}_{\mathcal{M}}, \quad \mathbf{V}_{\mathcal{M}} = \mathbf{W}_{\mathcal{M}}^{\mathbf{V}} \mathbf{H}_{\mathcal{M}}^{l-1} (10)
72
+
73
+ [p. 15 | section: B MACSIM POLICY | type: Footnote]
74
+ & lt;sup>3</sup>For succinctness, we omit the layer and head enumeration
75
+
76
+ [p. 16 | section: B MACSIM POLICY | type: Text]
77
+ As in Vaswani et al. (2017), \mathbf{H}'_{\mathcal{M}} and \mathbf{H}'_{\mathcal{V}} are then augmented through skip connections and layer normalization, before being passed to the self-attention layer, yielding the agent and task embeddings \mathbf{H}^l_{\mathcal{M}} and \mathbf{H}^l_{\mathcal{V}} , respectively, of the current layer l.
78
+
79
+ [p. 16 | section: B MACSIM POLICY | type: Text]
80
+ Given the final agent and task embeddings \mathbf{H}_{\mathcal{M}} and \mathbf{H}_{\mathcal{V}} , respectively, the policy utilized in MAC-SIM uses a multiple-pointer mechanism similar to Berto et al. (2024):
81
+
82
+ [p. 16 | section: B MACSIM POLICY | type: Equation]
83
+ \mathbf{L} = c \cdot \tanh\left(\frac{\mathbf{Q}\mathbf{K}^{\top}}{\sqrt{d}}\right), \quad \mathbf{Q} = \mathbf{W}_{\text{Dec}}^{\mathbf{Q}}\mathbf{H}_{\mathcal{M}}, \quad \mathbf{K} = \mathbf{W}_{\text{Dec}}^{\mathbf{K}}(\mathbf{H}_{\mathcal{V}}||\mathbf{h}^{\text{skip}}) (11)
84
+
85
+ [p. 16 | section: B MACSIM POLICY | type: Text]
86
+ with learnable parameters W_{\text{Dec}}^Q and W_{\text{Dec}}^K \in \mathbb{R}^{d \times d} , and c is a scale parameter, set to 10 following Bello et al. (2017) to enhance exploration.
87
+
88
+ [p. 16 | section: C.1 FLEXIBLE JOB SHOP SCHEDULING PROBLEM | type: Text]
89
+ The Flexible Job Shop Scheduling Problem (FJSP) is a highly complex, NP-hard optimization problem and a generalization of the classical Job Shop Scheduling Problem (JSP). The problem concerns scheduling a set of N jobs on M machines. Each job consists of a sequence of operations that must be processed in a specific order. The critical distinction from the classical JSP is the "flexibility": each operation can be processed by any machine from a given subset of capable machines. This introduces two interdependent decision layers: a routing problem (assigning each operation to a suitable machine) and a sequencing problem (determining the order of operations on each machine). The FJSP can be modeled as a multi-agent CO problem, where each machine acts as an agent responsible for building its own schedule. In an autoregressive framework, a decision is made at each step to assign and schedule the next operation, considering machine availability and job precedence constraints. The ultimate goal is typically to find a schedule that minimizes the makespan, i.e., the time required to complete all operations for all jobs.
90
+
91
+ [p. 16 | section: C.1.1 MATHEMATICAL MODEL | type: Text]
92
+ We present a common mixed-integer linear programming (MILP) model for the FJSP, based on the formulation described by Özgüven et al. (2010):
93
+
94
+ [p. 16 | section: Indices | type: Table]
95
+ j, l Job index i, h Operation index k Machine index
96
+
97
+ [p. 16 | section: Parameters | type: Table]
98
+ N Number of jobs M Number of machines O_i Set of operations for job j M_{ij} Set of machines capable of processing operation i of job j p_{ijk} Processing time of operation i of job j on machine k B^{"} A very large positive number (for big-M constraints)
99
+
100
+ [p. 16 | section: Decision variables | type: Code]
101
+ \begin{array}{ll} C_{max} & \text{The makespan (maximum completion time)} \\ c_{ij} & \text{Completion time of operation } i \text{ of job } j \\ x_{ijk} & \begin{cases} 1 & \text{if operation } i \text{ of job } j \text{ is assigned to machine } k \\ 0 & \text{otherwise} \end{cases} \\ y_{jilkh} & \begin{cases} 1 & \text{if op } (j,i) \text{ precedes op } (l,h) \text{ on machine } k \\ 0 & \text{otherwise} \end{cases}
102
+
103
+ [p. 17 | section: Decision variables | type: Text]
104
+ Objective:
105
+
106
+ [p. 17 | section: Decision variables | type: Equation]
107
+ \min C_{max} \tag{12}
108
+
109
+ [p. 17 | section: Decision variables | type: Text]
110
+ Subject to:
111
+
112
+ [p. 17 | section: Decision variables | type: Equation]
113
+ C_{max} \ge c_{ij} \qquad \forall j, \ \forall i \in O_j (13)
114
+
115
+ [p. 17 | section: Decision variables | type: Equation]
116
+ \sum_{k \in M_{ij}} x_{ijk} = 1 \qquad \forall j, \ \forall i \in O_j (14)
117
+
118
+ [p. 17 | section: Decision variables | type: Equation]
119
+ c_{ij} - \sum_{k \in M_{ij}} p_{ijk} x_{ijk} \ge c_{(i-1)j} \qquad \forall j, \ \forall i \in O_j, i > 1 (15)
120
+
121
+ [p. 17 | section: Decision variables | type: Equation]
122
+ c_{ij} - c_{lh} + B(1 - y_{iilkh}) > p_{ijk} - B(2 - x_{ijk} - x_{lhk}) \forall j, l, i, h, k \text{ s.t. } j < l (16)
123
+
124
+ [p. 17 | section: Decision variables | type: Equation]
125
+ c_{lh} - c_{ij} + B \cdot y_{jilkh} \ge p_{lhk} - B(2 - x_{ijk} - x_{lhk}) \qquad \forall j, l, i, h, k \text{ s.t. } j < l
126
+
127
+ [p. 17 | section: Decision variables | type: Equation]
128
+ c_{ij} - c_{lh} + B(1 - y_{jilkh}) \ge p_{ijk} - B(2 - x_{ijk} - x_{lhk}) \qquad \forall j, l, i, h, k \text{ s.t. } j < l \qquad (16) c_{lh} - c_{ij} + B \cdot y_{jilkh} \ge p_{lhk} - B(2 - x_{ijk} - x_{lhk}) \qquad \forall j, l, i, h, k \text{ s.t. } j < l \qquad (17) c_{ij} \ge \sum_{k \in M_{ij}} p_{ijk} x_{ijk} \qquad \forall j, \forall i \in O_j, i = 1 \qquad (18)
129
+
130
+ [p. 17 | section: Decision variables | type: Text]
131
+ The objective function in equation 12 minimizes the makespan. The makespan itself is defined by constraint set equation 13 as being greater than or equal to the completion time of every operation. Constraint set equation 14 is the assignment constraint, ensuring that each operation is assigned to exactly one machine from its set of eligible machines. The chronological sequence of operations within the same job is enforced by constraint set equation 15, which states that an operation (j,i)cannot be completed before the completion of its predecessor (j, i-1) plus its own processing time. For the first operation of a job, constraint set equation 18 ensures its completion time is at least its processing time. Constraint sets equation 16 and equation 17 are the core disjunctive constraints that prevent a machine from processing more than one operation at a time. For any two operations (j,i)and (l,h) assigned to the same machine k, these "big-M" constraints ensure that one must finish before the other begins. The binary variable y_{jilkh} determines their relative order.
132
+
133
+ [p. 17 | section: C.1.2 MULTI-AGENT MDP | type: Text]
134
+ To solve the FJSP with MACSIM, we cast it as a multi-agent Markov decision process (MDP) as defined in Section 3. In this formulation, we define the state of the FJSP at construction step t as a bipartite graph, where machines correspond to the set of agents \mathcal{M} and jobs/operations to the set of tasks \mathcal{V} . An edge (m,v) \in \mathcal{E} exists if machine m can process the next operation of job v, with processing time w(m,v). At each step, each agent m chooses an action a^m = v from the set of admissible edges (m, v) (or the skip token), which assigns job v's next operation to machine m. The joint action \mathbf{a}_t = \{a_t^m\}_{m \in \mathcal{M}} induces a deterministic transition to s_{t+1} , which updates the schedule, the job progress, and machine queues. The reward is 0 for all intermediate steps, with a final terminal reward of the negative makespan (-C_{max}) shared between all agents.
135
+
136
+ [p. 17 | section: C.2 FLEXIBLE FLOW SHOP PROBLEM | type: Text]
137
+ The flexible flow shop problem (FFSP) is a challenging and extensively studied optimization problem in production scheduling, involving N jobs that must be processed by a total of M machines divided into i=1\ldots S stages, each with multiple machines (M_i>1) . Jobs follow a specified sequence through these stages, but within each stage, any available machine can process the job, with the key constraint that no machine can handle more than one job simultaneously. The FFSP can naturally be viewed as a multi-agent CO problem by considering each machine as an agent that constructs its own schedule. Adhering to autoregressive CO, agents construct the schedule sequentially, selecting one job (or no job) at a time. The job selected by a machine (agent) at a specific stage in the decoding process is scheduled at the earliest possible time, that is, the maximum of the time the job becomes available in the respective stage (i.e., the time the job finished on prior stages) and the machine becoming idle. The process repeats until all jobs for each stage have been scheduled, and the ultimate goal is to minimize the makespan, i.e., the total time required to complete all jobs.
138
+
139
+ [p. 18 | section: C.2.1 MATHEMATICAL MODEL | type: Text]
140
+ We use the model outlined in Kwon et al. (2021) to define the FFSP:
141
+
142
+ [p. 18 | section: Indices | type: Text]
143
+ i Stage index j, l Job index
144
+
145
+ [p. 18 | section: Indices | type: Text]
146
+ k Machine index in each stage
147
+
148
+ [p. 18 | section: Parameters | type: Text]
149
+ N Number of jobs S Number of stages
150
+
151
+ [p. 18 | section: Parameters | type: Text]
152
+ M i Number of machines in stage i
153
+
154
+ [p. 18 | section: Parameters | type: Text]
155
+ B A very large number
156
+
157
+ [p. 18 | section: Parameters | type: Text]
158
+ pijk Processing time of job j in stage i on machine k
159
+
160
+ [p. 18 | section: Decision variables | type: Text]
161
+ cij Completion time of job j in stage i x ijk 1 if job j is assigned to machine k in stage i 0 otherwise y ilj 1 if job l is processed earlier than job j in stage i 0 otherwise
162
+
163
+ [p. 18 | section: Objective | type: Equation]
164
+ \min\left(\max_{j=1..n}\{c_{Sj}\}\right) \tag{19}
165
+
166
+ [p. 18 | section: Subject to | type: Equation]
167
+ \sum_{k=1}^{M_i} x_{ijk} = 1 i = 1, \dots, S; \ j = 1, \dots, N (20)
168
+
169
+ [p. 18 | section: Subject to | type: Equation]
170
+ y_{iij} = 0 i = 1, ..., S; j = 1, ..., N (21)
171
+
172
+ [p. 18 | section: Subject to | type: Equation]
173
+ \sum_{j=1}^{N} \sum_{l=1}^{N} y_{ilj} = \sum_{k=1}^{M_i} \max \left( \sum_{j=1}^{n} (x_{ijk}) - 1, 0 \right) \qquad i = 1, \dots, S (22)
174
+
175
+ [p. 18 | section: Subject to | type: Equation]
176
+ y_{ilj} \le \max\left(\max_{k=1...M_i} \{x_{ijk} + x_{ilk}\} - 1, 0\right) \quad i = 1, ..., S; \ j, l = 1, ..., N (23)
177
+
178
+ [p. 18 | section: Subject to | type: Equation]
179
+ \sum_{l=1}^{N} y_{ilj} \le 1 \qquad i = 1, \dots, S; \ j = 1, \dots, N (24)
180
+
181
+ [p. 18 | section: Subject to | type: Equation]
182
+ \sum_{j=1}^{N} y_{ilj} \le 1 \qquad i = 1, \dots, S; \ l = 1, \dots, N (25)
183
+
184
+ [p. 18 | section: Subject to | type: Equation]
185
+ c_{1j} \ge \sum_{k=1}^{m_1} p_{1jk} \cdot x_{1jk} j = 1, \dots, N (26)
186
+
187
+ [p. 18 | section: Subject to | type: Equation]
188
+ c_{ij} \ge c_{i-1j} + \sum_{k=1}^{M_i} p_{ijk} \cdot x_{ijk} i = 2, 3, \dots, S; \ j = 1, \dots, N (27)
189
+
190
+ [p. 18 | section: Subject to | type: Equation]
191
+ c_{ij} + B(1 - y_{ilj}) \ge c_{il} + \sum_{k=1}^{M_i} p_{ijk} \cdot x_{ijk} i = 1, \dots, S; \ j, l = 1, \dots, N (28)
192
+
193
+ [p. 19 | section: Subject to | type: Text]
194
+ Here, the objective function equation 19 minimizes the makespan of the resulting schedule, that is, the completion time of the job that finishes last. The schedule has to adhere to several constraints: First, constraint set equation 20 ensures that each job is assigned to exactly one machine at each stage. Constraint sets equation 21 through equation 25 define the precedence relationships between jobs within a stage. Specifically, constraint set equation 21 ensures that a job has no precedence relationship with itself. Constraint set equation 22 ensures that the total number of precedence relationships in a stage equals N-M_i minus the number of machines with no jobs assigned. Constraint set equation 23 dictates that precedence relationships can only exist among jobs assigned to the same machine. Additionally, constraint sets equation 24 and equation 25 restrict a job to having at most one preceding job and one following job.
195
+
196
+ [p. 19 | section: Subject to | type: Text]
197
+ Moving on, constraint set equation 26 specifies that the completion time of a job in the first stage must be at least as long as its processing time in that stage. The relationship between the completion times of a job in consecutive stages is described by constraint set equation 27. Finally, constraint set equation 28 ensures that no more than one job can be processed on the same machine at the same time.
198
+
199
+ [p. 19 | section: C.2.2 Multi-Agent MDP | type: Text]
200
+ We formulate the FFSP as a multi-agent MDP. At construction step t, the state is represented by a bipartite graph: jobs form the task set \mathcal{V} , and machines grouped by production stages form the agent set \mathcal{M} . Within each stage, an edge (m,v) \in \mathcal{E} exists if machine m at that stage is eligible to process the next pending operation of job v, with processing time w(m,v). At each step, each agent m \in \mathcal{M} selects an action a^m = v from its admissible edges (m,v), assigning the corresponding job operation to that machine. The joint action \mathbf{a}_t induces a deterministic transition to s_{t+1} by updating the partial schedule, machine queues, and job progression across stages. Intermediate steps yield zero reward , while the terminal state provides a reward equal to the negative makespan shared between all agents.
201
+
202
+ [p. 19 | section: C.3 MIN-MAX HETEROGENEOUS CAPACITATED VEHICLE ROUTING PROBLEM | type: Text]
203
+ The min-max heterogeneous capacitated vehicle routing problem (HCVRP) is an NP-hard combinatorial optimization problem, representing a significant extension of the classic Capacitated Vehicle Routing Problem (CVRP). The problem involves designing a set of optimal routes for a heterogeneous fleet of vehicles, stationed at a central depot, to serve a geographically dispersed set of customers, each with a specific demand. The heterogeneity implies that vehicles may differ in their capacities and costs. The primary objective of the HCVRP is to minimize the length (or cost, or duration) of the longest single route in the solution, rather than the total length of all routes. This "Min-Max" criterion is crucial for applications where the balance of workload between drivers is a priority.
204
+
205
+ [p. 19 | section: C.3.1 MATHEMATICAL MODEL | type: Text]
206
+ We present a three-index vehicle flow formulation for the HCVRP, adapted from standard VRP models as described in works such as Li et al. (2022):
207
+
208
+ [p. 19 | section: Indices | type: Text]
209
+ i, j Node indices (customers and depot)k Vehicle index
210
+
211
+ [p. 19 | section: Sets | type: Text]
212
+ L Set of N customers, indexed 1, \ldots, N
213
+
214
+ [p. 19 | section: Sets | type: Text]
215
+ V Set of all nodes, V = L \cup \{0\} , where 0 is the depot
216
+
217
+ [p. 19 | section: Sets | type: Text]
218
+ K Set of vehicles
219
+
220
+ [p. 19 | section: Parameters | type: Text]
221
+ d_i Demand of customer i \in L Q_k Capacity of vehicle k \in K
222
+
223
+ [p. 19 | section: Parameters | type: Text]
224
+ c_{ijk} Cost (e.g. travel time) for vehicle k to travel between nodes i and j
225
+
226
+ [p. 20 | section: Decision variables | type: Text]
227
+ \begin{array}{ll} C_{max} & \text{The maximum route length (the objective)} \\ x_{ijk} & \begin{cases} 1 & \text{if vehicle $k$ travels directly from node $i$ to node $j$} \\ 0 & \text{otherwise} \end{cases} \\ u_{ik} & \text{Continuous variable representing the load of vehicle $k$ after visiting node $i$} \end{array}
228
+
229
+ [p. 20 | section: Objective | type: Equation]
230
+ \min C_{max} \tag{29}
231
+
232
+ [p. 20 | section: Subject to | type: Equation]
233
+ C_{max} \ge \sum_{i \in V} \sum_{j \in V, i \ne j} c_{ijk} x_{ijk} \qquad \forall k \in K (30)
234
+
235
+ [p. 20 | section: Subject to | type: Equation]
236
+ \sum_{k \in K} \sum_{i \in V, i \neq j} x_{ijk} = 1 \qquad \forall j \in L (31)
237
+
238
+ [p. 20 | section: Subject to | type: Equation]
239
+ \sum_{i \in V, i \neq h} x_{ihk} = \sum_{j \in V, j \neq h} x_{hjk} \qquad \forall h \in L, \ \forall k \in K (32)
240
+
241
+ [p. 20 | section: Subject to | type: Equation]
242
+ \sum_{j \in L} x_{0jk} \le 1 \qquad \forall k \in K \tag{33}
243
+
244
+ [p. 20 | section: Subject to | type: Equation]
245
+ u_{ik} - u_{jk} + Q_k x_{ijk} \le Q_k - d_j \qquad \forall i, j \in L, i \ne j, \ \forall k \in K (34)
246
+
247
+ [p. 20 | section: Subject to | type: Equation]
248
+ d_{i} \sum_{j \in V} x_{jik} \le u_{ik} \le Q_{k} \sum_{j \in V} x_{jik} \qquad \forall i \in L, \ \forall k \in K (35)
249
+
250
+ [p. 20 | section: Subject to | type: Text]
251
+ The objective function eq. (29) minimizes the maximum route cost C_{max} . C_{max} is defined by constraint set equation 30, which ensures it is greater than or equal to the calculated cost of every individual route, using the vehicle-specific cost parameter c_{ijk} .
252
+
253
+ [p. 20 | section: Subject to | type: Text]
254
+ Constraint set equation 31 guarantees that each customer is visited exactly once by one vehicle. The vehicle flow conservation is handled by two sets of constraints. First, constraint set equation 32 ensures that if a vehicle enters a customer node, it must also depart from it. Second, constraint set equation 33 ensures that each vehicle can leave the depot at most once; combined with constraint set equation 32, this also implies that any vehicle that serves customers must return to the depot.
255
+
256
+ [p. 20 | section: Subject to | type: Text]
257
+ Finally, constraint sets equation 34 and equation 35 are the Miller-Tucker-Zemlin constraints, which simultaneously prevent subtours and enforce vehicle capacity limits. The continuous variable u_{ik} tracks the cumulative load of vehicle k. Constraint set equation 34 establishes a valid sequence for load accumulation, while constraint set equation 35 binds the load variable for each customer visit, ensuring it is positive only if the customer is on vehicle k's route and that it never exceeds the vehicle's capacity Q_k .
258
+
259
+ [p. 20 | section: C.3.2 MULTI-AGENT MDP | type: Text]
260
+ We formulate the HCVRP as a multi-agent MDP where each vehicle is modeled as an agent. The state at construction step t consists of a graph with customer nodes \mathcal V and vehicles \mathcal M , where each customer v\in \mathcal V has a remaining demand d_{t,v} , and each vehicle m\in \mathcal M has residual capacity c_{t,m} and a current position on the graph. At each step, each vehicle m selects an action a^m=v corresponding to the next customer to visit, a return to the depot, or a stay at the current location, subject to feasibility given its residual capacity and route status. The joint action \mathbf a_t determines the transition to s_{t+1} by updating vehicle positions, capacities, and customer demands. The shared reward is sparse: intermediate steps yield zero reward, while the final reward is defined as the negative of the maximum travel cost among all agents -C_{max} .
261
+
262
+ [p. 21 | section: C.3.2 MULTI-AGENT MDP | type: TableGroup]
263
+ FJSP ] Brandima ırte Н urink (rda Hı ırink (eda ata) Hurink (vdata) Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time (s.) OR-Tools 174.20 0.99% 1447 935.80 0.16% 1397 1028.93 0.00% 899 919.60 0.00% 639 MWKR 201.70 16.52% 0.49 1053.10 12.72% 0.52 1219.01 18.47% 0.52 952.01 3.52% 0.52 PPO (g.) 198.50 15.07% 1.25 1030.83 10.33% 1.4 1182.08 14.88% 1.4 954.33 3.78% 1.37 DANIEL (g.) 184.40 6.90% 1.3 1031.63 10.42% 1.37 1175.53 14.25% 1.37 944.85 2.75% 1.36 SLIM (g.) 195.12 13.11% 2.16 1011.15 8.23% 2.28 1170.45 13.75% 2.29 937.04 1.90% 2.28 MACSIM (g.) 185.80 7.71% 1.12 992.10 6.19% 0.87 1168.97 13.61% 0.85 937.07 1.90% 1.04 PPO (s.) 190.30 10.32% 4.13 985.33 5.46% 4.81 1116.68 8.53% 4.87 930.80 1.22% 4.72 DANIEL (s.) 180.80 4.81% 4.12 978.28 4.71% 4.73 1119.73 8.82% 4.73 925.40 0.63% 4.77 SLIM (s.) 191.20 10.84% 30.75 963.55 3.13% 30.81 1117.50 8.61% 30.82 924.07 0.49% 33.12 MACSIM (s.) 177.30 2.78% 9.78 957.92 2.53% 6.84 1094.85 6.41% 7.05 923.17 0.39% 8.83 Table 5: Generalization performance on public FJSP benchmark instances.
264
+
265
+ [p. 21 | section: D.1 PUBLIC BENCHMARK DATASET FOR FJSP | type: Text]
266
+ In addition to the synthetic FJSP instances used in Tables 1 and 2, we analyze the generalization capabilities of MACSIM on two well-known FJSP benchmarks. First, the Brandimarte benchmark comprises 10 benchmark cases ranging from 10–20 jobs with 3–15 operations each, processed on 4–15 machines with varying machine flexibility (Brandimarte, 1993). Second, the benchmark from Hurink et al. (1994) contains 120 instances ranging from 6–30 jobs and 6–15 machines, with the number of operations per job matching the machine count. These are categorized into three groups based on machine flexibility:
267
+
268
+ [p. 21 | section: D.1 PUBLIC BENCHMARK DATASET FOR FJSP | type: ListGroup]
269
+ edata: Few operations may be assigned to more than one machine. rdata: Most of the operations may be assigned to some machines. vdata: All operations may be assigned to several machines.
270
+
271
+ [p. 21 | section: D.1 PUBLIC BENCHMARK DATASET FOR FJSP | type: Text]
272
+ The aggregated results for these 4 benchmarks are presented in Table 5. For each instance type, we report results for the best-performing model selected from the models trained on the instance sizes reported in Table 1. MACSIM consistently outperforms all other neural baselines and substantially narrows the gap to the state-of-the-art CP-SAT solver, OR-Tools.
273
+
274
+ [p. 21 | section: D.2 INCREASING THE NUMBER OF AGENTS IN FFSP | type: Text]
275
+ We further evaluate all solvers for the FFSP on instances with an increasing number of agents while keeping the number of jobs fixed. Specifically, we consider instances with N=50 jobs processed across S=3 stages, each containing M_i=4 , 6, and 8 machines, for a total of M=12, 18, and 24 machines, respectively. The results in Table 6 reveal a widening performance gap between standard self-improvement (SLIM) and MACSIM, highlighting the importance of exploiting agent symmetries during training. These symmetries become more pronounced in problems with more agents, making coordination increasingly challenging. MACSIM consistently produces policies that achieve superior coordination as the number of agents grows.
276
+
277
+ [p. 21 | section: D.3 ANALYSIS OF THE SKIP TOKEN | type: Text]
278
+ In Figure 5a, we evaluate the effect of the skip token and its associated penalty on solution quality. The skip token proves essential for achieving high-quality solutions. However, introducing a penalty on its usage initially skews training towards solutions with fewer skip tokens, which results in slightly worse performance compared to MACSIM without the penalty. By annealing the penalty towards zero via an exponential decay, the model ultimately reaches solutions of equal quality while requiring significantly fewer construction steps (forward passes through \pi_{\theta} ), as confirmed in Figure 5b. The different penalty schedules reported in Figure 5b are visualized in Figure 5c.
279
+
280
+ [p. 21 | section: D.3 ANALYSIS OF THE SKIP TOKEN | type: Text]
281
+ Although we found that the policy is largely insensitive to the specific form of penalty decay, we adopt an exponential decay because it naturally prevents the penalty from reaching exactly zero. If the penalty were to reach zero, the model would immediately resume increasing its use of the skip
282
+
283
+ [p. 22 | section: D.3 ANALYSIS OF THE SKIP TOKEN | type: TableGroup]
284
+ FFSP N \times M_i \times S 50 \times 4 \times 3 50 \times 6 \times 3 50 \times 8 \times 3 Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time (s.) Shortest Job First 56.94 19.27% 0.37 38.01 23.65% 0.25 29.39 27.45% 0.25 Genetic Algorithm 56.92 19.23% 44.33 38.26 24.46% 47.12 29.05 25.98% 50.95 Particle Swarm Opt. 55.1 15.42% 82.74 36.83 19.81% 85.43 28.06 21.68% 89.01 MatNet (g.) 51.52 7.92% 2.17 34.82 13.27% 2.42 27.52 19.34% 2.65 PARCO (g.) 51.19 7.23% 0.52 32.88 6.96% 0.50 24.89 7.94% 0.44 SLIM (g.) 50.01 4.75% 2.28 32.99 7.32% 3.01 25.04 8.59% 3.87 MACSIM (g.) 49.36 3.39% 0.43 32.23 4.85% 0.59 24.45 6.03% 0.61 MatNet (s.) 49.68 4.06% 8.91 33.45 8.82% 9.23 26.00 12.75% 9.81 PARCO (s.) 49.27 3.20% 1.97 31.60 2.80% 1.89 23.59 2.30% 1.68 SLIM (s.) 48.13 0.82% 8.87 31.65 2.96% 9.64 24.41 5.85% 10.6 MACSIM (s.) 47.74 0.00% 0.91 30.74 0.00% 1.65 23.06 0.00% 1.78 Table 6: Test set performance on FFSP instances with varying number of agents.
285
+
286
+ [p. 22 | section: D.3 ANALYSIS OF THE SKIP TOKEN | type: FigureGroup]
287
+ Figure 5: Left : Training curves for MACSIM with and without skip token as well as different penalties. Middle : Effect of different penalty strategies on the number of skip tokens used. Right : Skip token penalty coefficient for different strategies over the course of training.
288
+
289
+ [p. 22 | section: D.3 ANALYSIS OF THE SKIP TOKEN | type: Text]
290
+ token as shown in Figure 5b. Maintaining a penalty slightly above zero ensures that, when multiple solutions have equal objective values during training data generation, the skip token usage serves as a meaningful tie-breaking criterion for the expert data selection. As such, a very small penalty still serves as an effective regularizer during the later stages of training.
291
+
292
+ [p. 22 | section: D.3 ANALYSIS OF THE SKIP TOKEN | type: Text]
293
+ Moreover, Figure 5b illustrates how the model learns to regulate skip token usage. At the start of training, the model employs the skip token at a relatively low rate. It then rapidly increases its usage, recognizing that deferring a decision in FFSP can unlock better scheduling opportunities for machines. As training progresses, the model reduces unnecessary skips to avoid the penalty, returning to nearly the same skip frequency as at the beginning. Crucially, however, the model has now learned to distinguish when deferring an assignment is beneficial and when it is not.
294
+
295
+ [p. 22 | section: D.4 TRAINING DYNAMICS ANALYSIS | type: Text]
296
+ Figure 6 offers additional insight into the training behavior of MACSIM relative to SLIM across FFSP instances of increasing size. Beyond final performance metrics, these curves highlight fundamental differences in stability and efficiency. As the problem size grows from N=20 to N=100 jobs, SLIM exhibits increasingly unstable training dynamics, with pronounced oscillations in validation performance. In contrast, MACSIM maintains smooth and monotonic convergence. This contrast suggests that SLIM's single-action supervision becomes insufficient for complex coordination tasks, while MACSIM's set-based loss provides more reliable and stable gradient signals.
297
+
298
+ [p. 22 | section: D.4 TRAINING DYNAMICS ANALYSIS | type: Text]
299
+ The comparison of wall-clock training times (right y-axis) further demonstrates that MACSIM's efficiency advantages extend to the training process itself. MACSIM trains nearly an order of magnitude faster per epoch while still achieving superior final performance. This consistent efficiency gain across problem sizes, coupled with its robustness on larger instances where SLIM becomes unstable, provides strong empirical evidence that the joint-action framework effectively overcomes scalability limitations in self-improvement for multi-agent combinatorial optimization.
300
+
301
+ [p. 23 | section: D.4 TRAINING DYNAMICS ANALYSIS | type: FigureGroup]
302
+ Figure 6: Wall-clock training time per epoch (right axis) and evolution of the average makespan on the validation set of FFSP instances with N=20,\,50,\, and 100 jobs (left axis). As the problem size increases, SLIM's training becomes progressively unstable, whereas MACSIM maintains stability and converges while being nearly an order of magnitude faster to train.
303
+
304
+ [p. 23 | section: D.5 SCALABILITY ANALYSIS | type: Text]
305
+ A key concern in neural combinatorial optimization is scalability to large problem instances. In this section, we provide a comprehensive analysis demonstrating that MACSIM's design choices – training on single state-action pairs and amortizing re-encoding costs over multiple actions – yield substantial scalability advantages over both traditional RL-based NCO methods and standard self-improvement approaches.
306
+
307
+ [p. 23 | section: D.5 SCALABILITY ANALYSIS | type: Text]
308
+ Comparison with RL-based NCO. Traditional RL-based NCO methods like MatNet (Kwon et al., 2021) train via REINFORCE, which requires backpropagation through entire solution trajectories. This necessitates storing activations for all T decoding steps, leading to memory consumption that scales linearly with solution length. In contrast, MACSIM's self-improvement paradigm trains on individual state-action pairs, requiring only single-step gradients.
309
+
310
+ [p. 23 | section: D.5 SCALABILITY ANALYSIS | type: Text]
311
+ We empirically validate this advantage by comparing memory consumption and training efficiency between MACSIM and MatNet on FFSP instances of increasing size. For memory analysis, we use a batch size of 1 for both methods and record peak GPU memory consumption during training. For training time analysis, we use the maximum feasible batch size for each method on a single NVIDIA A100 GPU with 40GB VRAM and measure wall-clock time per epoch (1,000 instances).
312
+
313
+ [p. 23 | section: D.5 SCALABILITY ANALYSIS | type: Text]
314
+ Results are presented in Table 7. For N=100 jobs, MatNet consumes approximately 1 GB of memory, which increases to roughly 13 GB for N=500, corresponding to a 13\times increase. In contrast, MACSIM increases from only 702 MB to just under 2 GB – less than a 3\times increase. This dramatic difference in memory scaling enables MACSIM to use significantly larger batch sizes (64 vs. 8 for N=500), directly translating to faster training: MatNet's training time grows from 6.4 minutes per epoch at N=100 to 264 minutes at N=500, while MACSIM only increases from 5.1 minutes to 63 minutes.
315
+
316
+ [p. 23 | section: D.5 SCALABILITY ANALYSIS | type: Text]
317
+ These results demonstrate that MACSIM's state-action pair training paradigm provides a fundamental scalability advantage over trajectory-based RL methods, enabling efficient training on problem sizes where traditional approaches become prohibitively expensive.
318
+
319
+ [p. 23 | section: D.5 SCALABILITY ANALYSIS | type: TableGroup]
320
+ Table 7: Memory consumption and training time comparison between MatNet (RL-based) and MACSIM on FFSP instances of increasing size. Fraction columns show MACSIM's cost relative to MatNet. FFSP N \times M_i \times S Pe ak Memory (C GB) Training Time (min/epoch) MatNet MACSIM Fraction MatNet MACSIM Fraction 100 \times 4 \times 3 1.47 0.71 0.48 6.43 5.12 0.79 250 \times 4 \times 3 4.12 1.24 0.30 31.12 15.60 0.50 500 \times 4 \times 3 12.87 1.95 0.15 264.41 63.62 0.24
321
+
322
+ [p. 24 | section: D.5 SCALABILITY ANALYSIS | type: Text]
323
+ Comparison with Standard Self-Improvement. While standard self-improvement methods like SLIM share MACSIM's advantage of state-action pair training, they employ step-wise re-encoding with fully autoregressive decoding, thus computing new embeddings for every single action. MAC-SIM amortizes this computational cost by generating M agent actions from a single encoding step.
324
+
325
+ [p. 24 | section: D.5 SCALABILITY ANALYSIS | type: Text]
326
+ Figure 3c in the main paper demonstrates this advantage across FFSP instances of varying size. For N = 50 jobs with M = 24 agents, MACSIM requires approximately 10 construction steps to generate a complete solution, while SLIM requires 150 steps. This translates directly to wall-clock time as shown in Figure 6: MACSIM trains in approximately 400 seconds per epoch compared to SLIM's 3,000 seconds – almost an order of magnitude faster.
327
+
328
+ [p. 24 | section: D.5 SCALABILITY ANALYSIS | type: Text]
329
+ Combined Advantage: Scaling to large multi-agent Problems. The combination of (1) stateaction pair training and (2) multi-action generation creates a powerful synergy for scaling to large multi-agent problems:
330
+
331
+ [p. 24 | section: D.5 SCALABILITY ANALYSIS | type: ListGroup]
332
+ Memory efficiency from state-action pair training enables large batch sizes during training Computational efficiency from amortized re-encoding significantly reduces training time by a factor proportional the number of agents Training stability from the permutation-invariant loss ensures reliable convergence even as coordination complexity increases
333
+
334
+ [p. 24 | section: D.5 SCALABILITY ANALYSIS | type: Text]
335
+ Together, these properties position MACSIM as a highly scalable approach for large-scale multiagent combinatorial optimization.
336
+
337
+ [p. 24 | section: D.6 RUNTIME PROFILING AND EFFICIENCY ANALYSIS | type: Text]
338
+ To isolate the source of MACSIM's computational efficiency, we perform a decomposition of inference latency into two distinct components: (i) policy evaluation, which encompasses the forward pass of the neural network πθ(L | st) to generate logits, and (ii) sampling, which refers to the discrete selection of actions from the distribution P(L).
339
+
340
+ [p. 24 | section: D.6 RUNTIME PROFILING AND EFFICIENCY ANALYSIS | type: Text]
341
+ We compare the baseline SLIM against MACSIM on the Flexible Flow Shop Problem (FFSP). We fix the problem size to N = 50 jobs across S = 3 stages and vary the number of parallel machines per stage, denoted as M i ∈ {4, 6, 8}. This results in total agent counts of M = 12, 18, and 24, respectively.
342
+
343
+ [p. 24 | section: D.6 RUNTIME PROFILING AND EFFICIENCY ANALYSIS | type: TableGroup]
344
+ Table 8: Inference time decomposition. Times are reported as milliseconds for a single solution construction, averaged over 100 instances. The Policy column measures the cumulative time spent in neural network forward passes, while Sampling measures the time spent selecting discrete actions. Percentages indicate the relative contribution to total latency. FFSP N × Mi × S MACSIM SLIM Policy Sampling Policy Sampling 50 × 4 × 3 234.44 (65%) 125.02 (35%) 3119.36 (96%) 120.12 (4%) 50 × 6 × 3 319.73 (71%) 133.45 (29%) 3966.12 (97%) 120.40 (3%) 50 × 8 × 3 568.44 (79%) 155.64 (21%) 8844.75 (99%) 121.01 (1%)
345
+
346
+ [p. 24 | section: D.6 RUNTIME PROFILING AND EFFICIENCY ANALYSIS | type: Text]
347
+ Policy. As shown in Table 8, inference in SLIM is overwhelmingly dominated by policy evaluation, which accounts for over 96% of total runtime. This bottleneck arises because SLIM operates as a single-action sequential predictor: for a problem requiring N total assignments, SLIM must execute the encoder-decoder stack N times.
348
+
349
+ [p. 24 | section: D.6 RUNTIME PROFILING AND EFFICIENCY ANALYSIS | type: Text]
350
+ In contrast, MACSIM reduces the policy evaluation time by a factor of 12 to 16. This speedup is a direct consequence of the multi-agent architecture defined in Equation (3) , where the joint logit matrix L is computed once to construct M actions. By enabling all M agents to act based on a single forward pass, MACSIM effectively amortizes the expensive neural computation over M decisions. Consequently, the end-to-end speedup ranges from approximately 9 to 11 across these settings.
351
+
352
+ [p. 25 | section: D.6 RUNTIME PROFILING AND EFFICIENCY ANALYSIS | type: Text]
353
+ Sampling. Notably, the absolute time spent on sampling remains comparable between the two methods (e.g., \approx 125 ms vs. \approx 120 ms for the 50 \times 3 \times 4 instance), though MACSIM exhibits a slight increase as agent count grows. It is important to note that the total count of sampled actions in MACSIM is slightly higher than in SLIM, due to the incorporation of the skip token . While this mechanism increases the total volume of discrete samples required to complete a solution, the sampling cost remains negligible relative to the massive reduction in policy evaluation steps.
354
+
355
+ [p. 25 | section: E Loss Function Gradient Analysis | type: Text]
356
+ Here, we provide a detailed analysis of the gradients for the four loss functions discussed and evaluated in the main text: the single-agent cross-entropy loss (evaluating only a single action a_t^m \in \mathbf{a}_t at a time) akin to SLIM, the multi-agent cross-entropy loss ( \mathcal{L}_{\text{CE}} ), the loss derived from the Plackett-Luce formulation ( \mathcal{L}_{\text{PL}} ), and the loss corresponding to the Maximum Likelihood Estimation (MLE) of the generative model of Equation (3), denoted \mathcal{L}_{\text{ML}} . This analysis highlights the sources of instability and bias in \mathcal{L}_{\text{SA}} , \mathcal{L}_{\text{ML}} , and \mathcal{L}_{\text{PL}} , justifying our use of \mathcal{L}_{\text{CE}} as a permutation-invariant surrogate.
357
+
358
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Text]
359
+ This loss mimics standard self-improvement methods which are trained in a "next-token prediction" fashion as described by Pirnay & Grimm (2024). Given state s_t and any pseudo-expert action (m^*, v^*) \in \mathbf{a}_t^* , the model's task under this loss is to predict this single pair from the entire, static pool of all possible agent-task assignments, \mathcal{E} . The loss is the negative log-likelihood of selecting the single expert pair (m^*, v^*) from the set of all pairs \mathcal{E} :
360
+
361
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Equation]
362
+ \mathcal{L}_{SA} = -\log \frac{\exp(L_{m^*,v^*})}{\sum_{(m,v)\in\mathcal{E}} \exp(L_{m,v})} (36)
363
+
364
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Text]
365
+ and the gradient for any logit L_{i,j} in the logits matrix is given by:
366
+
367
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Equation]
368
+ \frac{\partial \mathcal{L}_{SA}}{\partial L_{i,j}} = \frac{\exp(L_{i,j})}{\sum_{(m,v)\in\mathcal{E}} \exp(L_{m,v})} - \mathbb{I}(i=m^*, j=v^*) (37)
369
+
370
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Text]
371
+ where \mathbb{I}(\cdot) is the indicator function.
372
+
373
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Text]
374
+ Conflicting and Spurious Gradients. The core problem arises from the global softmax normalization. At each step, the gradient update for the target pair (m_k^*, v_k^*) is defined in competition with all other available pairs in \mathcal E . This setup effectively designates a single pair as positive while treating the remaining M-1 correct assignments as negatives. Consequently, the model is explicitly penalized for predicting other parts of the ground-truth solution: for every correct pair not chosen as the target, the gradient contributes a positive update that suppresses its logit. The resulting signal is inherently contradictory, preventing the model from converging toward a consistent joint policy.
375
+
376
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Text]
377
+ This flaw is particularly evident in forced-choice scenarios. When an agent m has only one valid task v^* at step k, no genuine decision is required. Nevertheless, \mathcal{L}_{\mathrm{ML}} still yields a non-zero loss, producing spurious gradients that penalize unrelated logits L_{i,j} with i \neq m . Such unnecessary updates destabilize optimization by introducing noise unrelated to the actual decision process.
378
+
379
+ [p. 25 | section: E.1 SINGLE-AGENT CROSS-ENTROPY LOSS | type: Text]
380
+ Vanishing Gradients. The softmax denominator is calculated over the entire set \mathcal{E} , which can contain thousands of possible actions. This makes the probability of the single target action infinitesimally small, leading to a vanishing gradient problem even more severe than that of the sequential MLE loss ( \mathcal{L}_{ML} ). This effectively makes training infeasible for large problem sizes.
381
+
382
+ [p. 25 | section: E.2 MLE Loss | type: Text]
383
+ Unlike the single-agent formulation, the MLE loss computes a softmax over the remaining feasible pairs at each step k, with \mathcal{E}_k denoting the available pairs. The gradient for L_{i,j} aggregates contributions across agents:
384
+
385
+ [p. 26 | section: E.2 MLE Loss | type: Equation]
386
+ \frac{\partial \mathcal{L}_{\text{ML}}}{\partial L_{i,j}} = \sum_{k=1}^{M} \frac{\exp(L_{i,j})}{\sum_{(a,b)\in\mathcal{E}_k} \exp(L_{a,b})} - \mathbb{I}(i = m_k^*, j = v_k^*) (38)
387
+
388
+ [p. 26 | section: E.2 MLE Loss | type: Text]
389
+ Similar to \mathcal{L}_{\mathrm{SA}} , the global softmax normalization in \mathcal{L}_{\mathrm{ML}} leads to conflicting and spurious gradient signals . Since the loss is a sum over all agents, the final gradient for any correct assignment becomes an inefficient and contradictory sum of one large negative update and many small positive updates (penalties). Also, similar to \mathcal{L}_{\mathrm{SA}} , this loss formulation suffers from vanishing gradients , especially for decisions made early in the sequence when the action space is at its largest. This effectively stalls the learning process, making it very difficult for the model to learn meaningful policies for large problems.
390
+
391
+ [p. 26 | section: E.3 PLACKETT-LUCE LOSS | type: Text]
392
+ The Plackett-Luce model addresses the global competition issue by conditioning the choice of a task on a specific agent at each step. If agent i=m_k is assigned at step k, the softmax is computed only over the set of available tasks \mathcal{V}_k = \mathcal{V} \setminus \{v_1, \dots, v_{k-1}\} . The gradient for agent i's logit L_{i,j} is:
393
+
394
+ [p. 26 | section: E.3 PLACKETT-LUCE LOSS | type: Equation]
395
+ \frac{\partial \mathcal{L}_{PL}}{\partial L_{i,j}} = \frac{\exp(L_{i,j})}{\sum_{j' \in \mathcal{V}_k} \exp(L_{i,j'})} - \mathbb{I}(j = v_k) (39)
396
+
397
+ [p. 26 | section: E.3 PLACKETT-LUCE LOSS | type: Text]
398
+ Permutation-Induced Bias. While \mathcal{L}_{PL} resolves the conflicting gradient issue of \mathcal{L}_{ML} , it remains sensitive to the arbitrary order of the expert permutation. This bias arises directly from the structure of the gradient. For an agent acting early in a sequence, the set of available actions \mathcal{V}_k is large, leading to a large normalization term in its softmax calculation. At the beginning of training, this large denominator yields a very small initial probability P(v_k|i) for the expert action. Since a smaller probability results in a gradient with a larger magnitude, the optimization process is forced to drive the corresponding logit to a significantly higher magnitude. In contrast, a late-sequence agent starts with a higher probability and thus a smaller gradient magnitude, requiring a less substantial increase in its logit value. Consequently, the model dedicates capacity to learning an artificial, agent-specific confidence level, where the scale of the output logits becomes entangled with the agent's position in the training sequence.
399
+
400
+ [p. 26 | section: E.4 SET CROSS-ENTROPY LOSS | type: Text]
401
+ To avoid the issues of sequential modeling, the multi-agent cross-entropy loss ( \mathcal{L}_{\text{CE}} ) treats each agent's assignment as an independent classification problem. Each agent i predicts its task v^*(i) from the complete set of tasks \mathcal{V} . The gradient for agent i's logit L_{i,j} depends only on its own logits:
402
+
403
+ [p. 26 | section: E.4 SET CROSS-ENTROPY LOSS | type: Equation]
404
+ \frac{\partial \mathcal{L}_{CE}}{\partial L_{i,j}} = \frac{\exp(L_{i,j})}{\sum_{j' \in \mathcal{V}} \exp(L_{i,j'})} - \mathbb{I}(j = v^*(i)) (40)
405
+
406
+ [p. 26 | section: E.4 SET CROSS-ENTROPY LOSS | type: Text]
407
+ where v^*(i) is the expert-assigned task for agent i.
408
+
409
+ [p. 26 | section: E.4 SET CROSS-ENTROPY LOSS | type: Text]
410
+ This decoupled formulation provides a stable and robust learning signal. Every correct pair (i, v_i^*) is reinforced individually, without interference or competition from the assignments of other agents. This elegant structure entirely circumvents the conflicting gradients of \mathcal{L}_{\mathrm{ML}} and the permutation bias of \mathcal{L}_{\mathrm{PL}} , making it a superior objective for learning multi-agent assignment policies. Figure 6 validates the superiority of MACSIM trained with \mathcal{L}_{\mathrm{CE}} over SLIM that uses a single-agent loss \mathcal{L}_{\mathrm{SA}} , especially for larger instances.
411
+
412
+ [p. 26 | section: F.1 Training-Inference Mismatch | type: Text]
413
+ The surrogate loss in equation 6 offers a tractable and stable method for training. While the generative model in equation 3 couples assignments through a one-to-one matching constraint, the set-based cross-entropy loss simplifies this by treating each expert agent-task pair as an independent
414
+
415
+ [p. 27 | section: F.1 Training-Inference Mismatch | type: Text]
416
+ classification problem. This is justified because the training process only observes valid matchings , allowing for clean, per-agent supervision. The result is a permutation-invariant learning signal that provides stable gradients, avoiding the conflicts and biases inherent in more complex objectives like direct Maximum Likelihood Estimation (MLE) as shown in Appendix E.
417
+
418
+ [p. 27 | section: F.1 Training-Inference Mismatch | type: Text]
419
+ This independent loss signal does not prevent the model from learning coordination. Inter-agent dependencies are captured implicitly by the policy's architecture, where self- and cross-attention mechanisms compute the joint logit matrix L with full context. At inference, the autoregressive sampling algorithm then acts as a hard constraint enforcer, translating these context-aware logits into a valid, conflict-free assignment. This combination of a stable surrogate for training and a structurally-aware process for inference proves highly effective. Empirically, this approach significantly outperforms training with an exact MLE or Plackett-Luce loss (Table 4), confirming its practical advantages.
420
+
421
+ [p. 27 | section: F.1 Training-Inference Mismatch | type: Text]
422
+ In the following, we provide a formal justification for using the set-based cross-entropy loss, \mathcal{L}_{CE} . We prove that it is a sound proxy for the ideal (but intractable) permutation-invariant objective.
423
+
424
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
425
+ Setup. We introduce shorthand notation for softmax normalization and marginals. For agent m and its expert-assigned task v^*(m) , we use:
426
+
427
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Equation]
428
+ Z_m = \sum_{v \in \mathcal{V}} \exp(L_{m,v}), \qquad p_m(v) = \frac{\exp(L_{m,v})}{Z_m}, \quad p_m := p_m(v^*(m)).
429
+
430
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
431
+ During generation, the policy samples agents in some order \sigma (a permutation of \{1,\ldots,M\} ) with prior w(\sigma) , where \sum_{\sigma} w(\sigma) = 1 . At step k, agent m_k = \sigma(k) selects a task from the remaining set \mathcal{V}_k(\sigma) \subseteq \mathcal{V} . The normalizer for the softmax function is given as:
432
+
433
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Equation]
434
+ S_k(\sigma) = \sum_{v \in \mathcal{V}_k(\sigma)} \exp(L_{\sigma(k),v}).
435
+
436
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
437
+ The probability of producing the unordered matching a* is
438
+
439
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Equation]
440
+ P_{\text{perm}}(\mathbf{a}^*) = \sum_{\sigma} w(\sigma) \prod_{k=1}^{M} \frac{\exp(L_{\sigma(k), v^*(\sigma(k))})}{S_k(\sigma)}.
441
+
442
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
443
+ The ideal loss is \mathcal{L}_{\text{ideal}} = -\log P_{\text{perm}}(\mathbf{a}^*) , while the surrogate loss is the set cross-entropy \mathcal{L}_{\text{CE}} = -\sum_{m=1}^{M} \log p_m .
444
+
445
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
446
+ Theorem 2 (Upper Bound and Tightness). For any permutation prior w(\sigma) :
447
+
448
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
449
+ 1. (Upper Bound) The surrogate loss upper-bounds the ideal loss:
450
+
451
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Equation]
452
+ \mathcal{L}_{CE} \geq \mathcal{L}_{ideal} .
453
+
454
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
455
+ 2. (Gap Bound) With r_m = (1 - p_m)/p_m :
456
+
457
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Equation]
458
+ 0 \le \mathcal{L}_{CE} - \mathcal{L}_{ideal} \le \sum_{m=1}^{M} \log(1 + r_m).
459
+
460
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Text]
461
+ If p_m \geq 1 - \varepsilon for all m, then
462
+
463
+ [p. 27 | section: F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS | type: Equation]
464
+ \mathcal{L}_{CE} - \mathcal{L}_{ideal} \le M \log \left( 1 + \frac{\varepsilon}{1 - \varepsilon} \right) \le \frac{M\varepsilon}{1 - \varepsilon}.
465
+
466
+ [p. 27 | section: Part 1: Proof of the Upper Bound. | type: Text]
467
+ Proof. Fix a permutation \sigma and denote P(\mathbf{a}^* \mid \sigma) its sequence probability. At each step k,
468
+
469
+ [p. 27 | section: Part 1: Proof of the Upper Bound. | type: Equation]
470
+ S_k(\sigma) = \sum_{v \in \mathcal{V}_k(\sigma)} \exp(L_{\sigma(k),v}) \le \sum_{v \in \mathcal{V}} \exp(L_{\sigma(k),v}) = Z_{\sigma(k)},
471
+
472
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Text]
473
+ since \mathcal{V}_k(\sigma) \subseteq \mathcal{V} . Thus
474
+
475
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Equation]
476
+ \frac{\exp(L_{\sigma(k),v^*(\sigma(k))})}{S_k(\sigma)} \ge \frac{\exp(L_{\sigma(k),v^*(\sigma(k))})}{Z_{\sigma(k)}} = p_{\sigma(k)}.
477
+
478
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Text]
479
+ Hence
480
+
481
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Equation]
482
+ P(\mathbf{a}^* \mid \sigma) \ge \prod_{m=1}^{M} p_m.
483
+
484
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Text]
485
+ Taking the expectation over \sigma preserves this bound:
486
+
487
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Equation]
488
+ P_{\text{perm}}(\mathbf{a}^*) = \sum_{\sigma} w(\sigma) P(\mathbf{a}^* \mid \sigma) \ge \prod_{m=1}^{M} p_m.
489
+
490
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Text]
491
+ Applying -\log(\cdot) yields
492
+
493
+ [p. 28 | section: Part 1: Proof of the Upper Bound. | type: Equation]
494
+ \mathcal{L}_{ideal} \leq \mathcal{L}_{CE} .
495
+
496
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
497
+ Proof. To bound the gap, we establish an upper bound on P_{\text{perm}}(\mathbf{a}^*) . We start by rewriting the probability of a single sequence by multiplying and dividing each factor by Z_{\sigma(k)} :
498
+
499
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Equation]
500
+ P(\mathbf{a}^* \mid \sigma) = \prod_{k=1}^M \left( \frac{\exp(L_{\sigma(k),v^*(\sigma(k))})}{Z_{\sigma(k)}} \cdot \frac{Z_{\sigma(k)}}{S_k(\sigma)} \right) = \left( \prod_{k=1}^M p_{\sigma(k)} \right) \left( \prod_{k=1}^M \frac{Z_{\sigma(k)}}{S_k(\sigma)} \right).
501
+
502
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
503
+ Since v^*(\sigma(k)) \in \mathcal{V}_k(\sigma) , it must hold that S_k(\sigma) \ge \exp(L_{\sigma(k),v^*(\sigma(k))}) , and thus:
504
+
505
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Equation]
506
+ \frac{Z_{\sigma(k)}}{S_k(\sigma)} \le \frac{Z_{\sigma(k)}}{\exp(L_{\sigma(k)} v^*(\sigma(k)))} = \frac{1}{p_{\sigma(k)}} = 1 + r_{\sigma(k)}.
507
+
508
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
509
+ Thus
510
+
511
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Equation]
512
+ P(\mathbf{a}^* \mid \sigma) \le \left(\prod_{i=1}^{M} p_i\right) \left(\prod_{i=1}^{M} (1+r_i)\right).
513
+
514
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
515
+ Averaging over \sigma preserves the bound, so
516
+
517
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Equation]
518
+ P_{\text{perm}}(\mathbf{a}^*) \le \left(\prod_{m=1}^M p_m\right) \left(\prod_{m=1}^M (1+r_m)\right).
519
+
520
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
521
+ Taking -\log gives
522
+
523
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Equation]
524
+ \mathcal{L}_{\text{ideal}} \geq \mathcal{L}_{\text{CE}} - \sum_{m=1}^{M} \log(1 + r_m),
525
+
526
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
527
+ or equivalently
528
+
529
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Equation]
530
+ \mathcal{L}_{\text{CE}} - \mathcal{L}_{\text{ideal}} \leq \sum_{m=1}^{M} \log(1 + r_m).
531
+
532
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
533
+ If p_m \geq 1 - \varepsilon , then r_m \leq \frac{\varepsilon}{1 - \varepsilon} , so
534
+
535
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Equation]
536
+ \sum_{m=1}^{M} \log(1 + r_m) \le M \log\left(1 + \frac{\varepsilon}{1 - \varepsilon}\right) \le \frac{M\varepsilon}{1 - \varepsilon}.
537
+
538
+ [p. 28 | section: Part 2: Proof of the Gap Bound. | type: Text]
539
+ Implication for Optimization. Theorem 2 establishes that \mathcal{L}_{CE} is a tractable upper bound on the true symmetric objective. Moreover, the bound tightens as the policy becomes confident, ensuring that optimization with \mathcal{L}_{CE} smoothly transitions from providing stable gradients early to closely approximating the ideal objective in later training.
540
+
541
+ [p. 29 | section: G DISCUSSING THE INDEPENDENCE ASSUMPTION IN THE SET-BASED LOSS | type: Text]
542
+ This section analyzes the efficacy of the agent-independent loss function ( \mathcal{L}_{CE} ) for solving coupled multi-agent combinatorial problems. The proposed loss function \mathcal{L}_{CE} treats the assignment of each agent m to a task v as an independent classification problem. Letting the total loss be the sum of individual agent losses, \mathcal{L}_{CE} = \sum_{m=1}^{M} \mathcal{L}_m(L_{m,:}) , a direct analysis of the gradients (Appendix E.4) shows that the loss for a specific agent m yields no direct gradient signal with respect to the logits of any other agent:
543
+
544
+ [p. 29 | section: G DISCUSSING THE INDEPENDENCE ASSUMPTION IN THE SET-BASED LOSS | type: Equation]
545
+ \frac{\partial \mathcal{L}_m}{\partial L_{k,n}} = 0 \quad \forall k \neq m \tag{41}
546
+
547
+ [p. 29 | section: G DISCUSSING THE INDEPENDENCE ASSUMPTION IN THE SET-BASED LOSS | type: Text]
548
+ Consequently, at the output layer, the optimization objective for Agent m is independent of the decisions of Agent k. Despite this independence at the loss level, MACSIM achieves coordinated solutions through the synergy of three distinct mechanisms: Architectural Coupling , Implicit Constraint Learning , and Inference-Time Constraints enforced via our autoregressive sampling approach.
549
+
550
+ [p. 29 | section: G.1 MECHANISM 1: ARCHITECTURAL COUPLING | type: Text]
551
+ While the gradients are independent with respect to the logits {\bf L} , the agents are coupled via the shared model parameters \theta . The policy architecture processes the state through a deep encoder utilizing multiple layers of self-attention and cross-attention. In this shared latent space, the embedding of Agent m, denoted as h_m , is computed by aggregating information from all other agents and tasks. As a result, the gradient of Agent m's loss with respect to the shared parameters affects the representations of all agents:
552
+
553
+ [p. 29 | section: G.1 MECHANISM 1: ARCHITECTURAL COUPLING | type: Equation]
554
+ \frac{\partial \mathcal{L}_m}{\partial \theta} \neq 0 \tag{42}
555
+
556
+ [p. 29 | section: G.1 MECHANISM 1: ARCHITECTURAL COUPLING | type: Text]
557
+ This implies updates to features utilized by Agent k. To minimize \mathcal{L}_{\text{CE}} , the encoder learns to produce disentangled representations where the features for Agent m align with Task v_m , while the features for Agent k align with Task v_k .
558
+
559
+ [p. 29 | section: G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS | type: Text]
560
+ The second coordination mechanism emerges from the specific gradient dynamics of the setbased loss. As detailed in our gradient analysis in Appendix E, single-action supervision (e.g., SLIM) inherently suffers from gradient interference. Because it utilizes a global Softmax over all possible agent-task pairs, reinforcing a single target action explicitly degrades the probability of valid future actions for other agents. This creates conflicting signals that hinder the learning of a consistent joint policy. In contrast, MACSIM avoids this interference by optimizing M independent local losses. For any specific agent m, the objective maximizes the logit for the assigned task v_m^* while suppressing the logits for all other tasks. Crucially, this set of suppressed tasks includes all tasks v_k^* assigned to other agents k \neq m .
561
+
562
+ [p. 29 | section: G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS | type: FigureGroup]
563
+ Figure 7: Evolution of the raw conflict rate (percentage of agents that share the same argmax action) during training on FJSP 10 \times 5 instances.
564
+
565
+ [p. 29 | section: G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS | type: Text]
566
+ Since the expert targets are conflict-free, exactly one agent receives a positive update for any given task v, while all M-1 other agents receive negative updates for that same task, actively reducing contention. The policy internalizes global coordination constraints purely through this independent contrast.
567
+
568
+ [p. 29 | section: G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS | type: Text]
569
+ We visualize this effect in Figure 8 and quantify it in Figure 7. Figure 8 compares the logit heatmaps of MACSIM against an Attention Model (AM) trained via standard SLIM. After training, MACSIM's logits exhibit a clear "permutation matrix" structure—high values are sparse and
570
+
571
+ [p. 30 | section: G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS | type: Text]
572
+ non-overlapping across agents. Conversely, the AM baseline fails to coordinate, frequently assigning the highest logit value for a single task to multiple agents simultaneously.
573
+
574
+ [p. 30 | section: G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS | type: Text]
575
+ Furthermore, we analyse the percentage of agents that share the same argmax action of the logits during training. As shown in Figure 7, this conflict rate drops precipitously during training for MACSIM while staying consistently on a high level for the AM trained via SLIM. This empirically validates that the independent loss, when combined with conflict-free expert labels, successfully teaches the network to respect injectivity constraints.
576
+
577
+ [p. 30 | section: G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS | type: FigureGroup]
578
+ Figure 8: Comparison of joint logits L computed on an FJSP 10 \times 5 problem instance by (a) an untrained MACSIM policy, (b) MACSIM after training, and (c) an Attention Model trained by SLIM.
579
+
580
+ [p. 30 | section: G.3 MECHANISM 3: INFERENCE-TIME CONSTRAINTS | type: Text]
581
+ The third layer of coordination occurs during the solution generation phase. Although the loss is calculated independently, the inference process defined in Algorithm 1 explicitly couples the agents via autoregressive sampling from the flattened joint logits. Because we sample without replacement, an agent that is highly confident (possessing a high logit value) exerts a "soft" suppression on all other agents. Specifically, if Agent m has a high probability for Task v, it is statistically likely to be sampled early in the sequence. Once (m,v) is added to the solution, task v is masked. This mechanism effectively converts confidence into priority. An agent that was reinforced multiple times during training to take a specific action will exhibit a sharp probability peak. In our AR-sampling algorithm, this confident agent will take precedence, thereby preventing other agents from making a conflicting choice.
582
+
583
+ [p. 30 | section: G.3 MECHANISM 3: INFERENCE-TIME CONSTRAINTS | type: Text]
584
+ The ablation study in Table 3 validates that the policy implicitly learns to rank agents: replacing our logit-dependent sampling order with a fixed or random order significantly degrades performance, particularly for instances with a larger number of agents, proving that the learned confidence hierarchy is essential for resolving complex inter-agent conflicts.
585
+
586
+ [p. 30 | section: H.1.1 HYPERPARAMETERS | type: Text]
587
+ We train MACSIM on the FJSP for 50 epochs using 4,000 randomly generated instances per epoch. For each training instance x the current best policy \pi_{\theta}^* is used to sample \beta=128 solutions, where the best serves as training example. Within the training loop, we sample pseudo expert state-assignment pairs in batches of size 2,000 from the generated training dataset and use the Adam optimizer Kingma & Ba (2015) with a learning rate of 10^{-4} , which we alter during training using a cosine annealing scheme. The embedding dimension d is set to 256, transformer layers use 8 heads and we set the number of encoder layers P to 4. Also, we use a dropout rate of 10%.
588
+
589
+ [p. 30 | section: H.1.2 DATASETS | type: Text]
590
+ Train data generation. We train MACSIM on FJSP instances of size 10 \times 5 , 20 \times 5 , and 15 \times 10 , following the generation scheme and parameters described in Song et al. (2022).
591
+
592
+ [p. 31 | section: H.1.2 DATASETS | type: Text]
593
+ Testing. Testing on the instance-types reported in Tables 1 and 2 is performed on 1000 separate test instances provided by Song et al. (2022) . Further, we test MACSIM on public benchmark datasets (see Appendix D.1 for details).
594
+
595
+ [p. 31 | section: H.2.1 HYPERPARAMETERS | type: Text]
596
+ In each epoch, we train the models using 1,000 randomly generated instances for which we sample β = 128 solutions and put the best into the training dataset. During training, we sample pseudo expert state-assignment pairs in batches of size 1,000 from the generated training dataset and use the Adam optimizer Kingma & Ba (2015) with a learning rate of 10− 4 , which we alter during training using a cosine annealing scheme. Same as for the FJSP, the embedding dimension d is set to 256 and we set the number of encoder layers P to 4. Also, we use the same dropout rate of 10%. However, following Kwon et al. (2021) we use 16 heads in the attention layers. We train models corresponding to environments with 20 jobs for 100, with 50 jobs for 150 and with 100 jobs for 200 epochs.
597
+
598
+ [p. 31 | section: H.2.2 DATASETS | type: Text]
599
+ Train data generation. We follow the instance generation scheme outlined in Kwon et al. (2021) and sample processing times for job-machine pairs independently from a uniform distribution within the bounds [2, 10]. For the FFSP instance types shown in Table 1 we also use the same instance sizes as Kwon et al. (2021) with N = 20, 50 and 100 jobs and M = 12 machines which are spread evenly over S = 3 stages. To test for agent sensitivity in the FFSP, we fix the number of jobs to N = 50 but alter the number of agents for the last three instance types shown in Table 1. Still, we use S = 3 for this experiment, but alter the number of machines per stage to M i = 6, 8 and 10, yielding a total of 18, 24 and 30 agents, respectively.
600
+
601
+ [p. 31 | section: H.2.2 DATASETS | type: Text]
602
+ Testing. Testing on the instance-types reported in Table 1 is performed on 1000 separate test instances provided by Kwon et al. (2021) . For the instance types reported in Table 6, test instances are generated randomly according to the above generation scheme.
603
+
604
+ [p. 31 | section: H.3.1 HYPERPARAMETERS | type: Text]
605
+ We train MACSIM on the HCVRP for 200 epochs. In each epoch, we train the models using 1,000 randomly generated instances for which we sample β = 200 solutions. Within the training loop we sample pseudo expert state-assignment pairs in batches of size 1,000 from the generated training dataset and use Adam with a learning rate of 10 − 4 , which we alter during training using a cosine annealing scheme. The embedding dimension d is set to 256, dropout rate is 10%, transformer layers use 16 heads and we set the number of encoder layers P to 4.
606
+
607
+ [p. 31 | section: H.3.2 DATASETS | type: Text]
608
+ Train data generation. We apply the instance generation scheme and seed used by Liu et al. (2024) . The authors follow the standard procedure in NCO literature and sample coordinates for the N customer locations and the depot from the unit square. The demand of customer locations is sampled i.i.d. from U(1, 10) and the capacity for each vehicle from U(20, 41). The speed of each vehicle is uniformly distributed within the range U(0.5, 1.0).
609
+
610
+ [p. 31 | section: H.3.2 DATASETS | type: Text]
611
+ Testing. Testing is performed on the 1280 instances per N ×M test setting from Liu et al. (2024) . Neural baselines in Table 1 were trained with the specific number of nodes N and number of agents M they were tested on.
612
+
613
+ [p. 32 | section: H.4.1 HARDWARE | type: Text]
614
+ We experiment on a workstation equipped with 2 INTEL(R) XEON(R) GOLD 6338 CPUs and 8 NVIDIA A100 graphic cards with 80 GB of VRAM each. Each training run uses a single A100.
615
+
616
+ [p. 32 | section: H.4.2 SOFTWARE | type: Text]
617
+ Our code base is implemented in Python 3.10. Neural policies are implemented in PyTorch 2.8 (Paszke et al., 2019) and training algorithms are defined as PyTorch Lightning Modules (Falcon & The PyTorch Lightning team, 2019) . Environment implementations are based on or inspired by the RL4CO library (Berto et al., 2025) . The operating system is Ubuntu 24.04 LTS.
618
+
619
+ [p. 32 | section: H.5 USE OF LARGE LANGUAGE MODELS | type: Text]
620
+ Large language models (LLMs) were used in this work solely as a general-purpose writing assistant. Their role was limited to polishing phrasing, improving clarity, and correcting grammar in drafts of the manuscript. All research ideas, analyses, results, and interpretations were generated and verified by the authors. The content produced by LLMs was carefully reviewed, edited, and integrated by the authors to ensure accuracy and adherence to academic standards.
iclr26/6KrETIaOYD/assets.json ADDED
@@ -0,0 +1,90 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [
2
+ {
3
+ "filename": "_page_14_Figure_9.jpeg",
4
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_14_Figure_9.jpeg",
5
+ "bytes": 70395,
6
+ "width": 571,
7
+ "height": 1041,
8
+ "aspect_ratio": 0.5485110470701249,
9
+ "keep": true,
10
+ "reject_reason": null,
11
+ "model_path": "assets/_page_14_Figure_9.jpeg"
12
+ },
13
+ {
14
+ "filename": "_page_1_Figure_2.jpeg",
15
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_1_Figure_2.jpeg",
16
+ "bytes": 20476,
17
+ "width": 567,
18
+ "height": 363,
19
+ "aspect_ratio": 1.56198347107438,
20
+ "keep": true,
21
+ "reject_reason": null,
22
+ "model_path": "assets/_page_1_Figure_2.jpeg"
23
+ },
24
+ {
25
+ "filename": "_page_21_Figure_3.jpeg",
26
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_21_Figure_3.jpeg",
27
+ "bytes": 46934,
28
+ "width": 1013,
29
+ "height": 359,
30
+ "aspect_ratio": 2.8217270194986073,
31
+ "keep": true,
32
+ "reject_reason": null,
33
+ "model_path": "assets/_page_21_Figure_3.jpeg"
34
+ },
35
+ {
36
+ "filename": "_page_22_Figure_1.jpeg",
37
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_22_Figure_1.jpeg",
38
+ "bytes": 40918,
39
+ "width": 1054,
40
+ "height": 333,
41
+ "aspect_ratio": 3.165165165165165,
42
+ "keep": true,
43
+ "reject_reason": null,
44
+ "model_path": "assets/_page_22_Figure_1.jpeg"
45
+ },
46
+ {
47
+ "filename": "_page_28_Figure_11.jpeg",
48
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_28_Figure_11.jpeg",
49
+ "bytes": 17628,
50
+ "width": 456,
51
+ "height": 361,
52
+ "aspect_ratio": 1.263157894736842,
53
+ "keep": true,
54
+ "reject_reason": null,
55
+ "model_path": "assets/_page_28_Figure_11.jpeg"
56
+ },
57
+ {
58
+ "filename": "_page_29_Figure_3.jpeg",
59
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_29_Figure_3.jpeg",
60
+ "bytes": 50890,
61
+ "width": 1108,
62
+ "height": 331,
63
+ "aspect_ratio": 3.3474320241691844,
64
+ "keep": true,
65
+ "reject_reason": null,
66
+ "model_path": "assets/_page_29_Figure_3.jpeg"
67
+ },
68
+ {
69
+ "filename": "_page_3_Figure_1.jpeg",
70
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_3_Figure_1.jpeg",
71
+ "bytes": 57183,
72
+ "width": 1110,
73
+ "height": 359,
74
+ "aspect_ratio": 3.0919220055710306,
75
+ "keep": true,
76
+ "reject_reason": null,
77
+ "model_path": "assets/_page_3_Figure_1.jpeg"
78
+ },
79
+ {
80
+ "filename": "_page_7_Figure_3.jpeg",
81
+ "path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/marker_raw/6KrETIaOYD/marker_markdown/6KrETIaOYD/_page_7_Figure_3.jpeg",
82
+ "bytes": 47948,
83
+ "width": 1052,
84
+ "height": 334,
85
+ "aspect_ratio": 3.1497005988023954,
86
+ "keep": true,
87
+ "reject_reason": null,
88
+ "model_path": "assets/_page_7_Figure_3.jpeg"
89
+ }
90
+ ]
iclr26/6KrETIaOYD/assets/_page_14_Figure_9.jpeg ADDED

Git LFS Details

  • SHA256: d33f4dd454a58cd87f9abd65dee1cc51efd15c48b640c655e57d8f0447943b12
  • Pointer size: 130 Bytes
  • Size of remote file: 70.4 kB
iclr26/6KrETIaOYD/assets/_page_1_Figure_2.jpeg ADDED

Git LFS Details

  • SHA256: aab70494fbe98d9118f9dc6e70d47df50f77f186eb78e050a56e26c87ad6c22b
  • Pointer size: 130 Bytes
  • Size of remote file: 20.5 kB
iclr26/6KrETIaOYD/assets/_page_21_Figure_3.jpeg ADDED

Git LFS Details

  • SHA256: aeea1d3e40d8ace0157c9fa0f019c449d764970bb9c39021c764b897aae9d2ba
  • Pointer size: 130 Bytes
  • Size of remote file: 46.9 kB
iclr26/6KrETIaOYD/assets/_page_22_Figure_1.jpeg ADDED

Git LFS Details

  • SHA256: 2e6113c599b66b9342271fe95a713e60c06915b0bcfa2227273a4ea70ffb3c03
  • Pointer size: 130 Bytes
  • Size of remote file: 40.9 kB
iclr26/6KrETIaOYD/assets/_page_28_Figure_11.jpeg ADDED

Git LFS Details

  • SHA256: 4bd534fa9c014e565c665a414218c03a12bcae27e68e5d51ac079147763009e9
  • Pointer size: 130 Bytes
  • Size of remote file: 17.6 kB
iclr26/6KrETIaOYD/assets/_page_29_Figure_3.jpeg ADDED

Git LFS Details

  • SHA256: e577fe4f0047131203a8fb10ca0551183a2af74c6cb1b8a5905a0a32a915952f
  • Pointer size: 130 Bytes
  • Size of remote file: 50.9 kB
iclr26/6KrETIaOYD/assets/_page_3_Figure_1.jpeg ADDED

Git LFS Details

  • SHA256: 217f2c0dce4de5f3569f184b8b0a8992bc226cec45fe4a07f17705857dfedc4b
  • Pointer size: 130 Bytes
  • Size of remote file: 57.2 kB
iclr26/6KrETIaOYD/assets/_page_7_Figure_3.jpeg ADDED

Git LFS Details

  • SHA256: 3b7f02b921a3a38982f5c93fcb42e69b9b541b2efe3973e12b171d8328e56997
  • Pointer size: 130 Bytes
  • Size of remote file: 47.9 kB
iclr26/6KrETIaOYD/chunks_v3_anonymized.jsonl ADDED
The diff for this file is too large to render. See raw diff
 
iclr26/6KrETIaOYD/dataset_meta.json ADDED
@@ -0,0 +1,62 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "paper_id": "6KrETIaOYD",
3
+ "pipeline": "Paper2Markdown-V3",
4
+ "ok": true,
5
+ "page_count": 32,
6
+ "chunk_count": 278,
7
+ "main_body_chunk_count": 67,
8
+ "appendix_chunk_count": 207,
9
+ "reference_chunk_count": 4,
10
+ "model_text_chars": 41180,
11
+ "raw_markdown_chars": 133891,
12
+ "sanitized_chars": 121999,
13
+ "page_provenance": {
14
+ "min_page": 1,
15
+ "max_page": 32,
16
+ "invalid_count": 0
17
+ },
18
+ "marker_block_type_counts": {
19
+ "Code": 1,
20
+ "Equation": 65,
21
+ "FigureGroup": 8,
22
+ "Footnote": 3,
23
+ "ListGroup": 7,
24
+ "PageFooter": 32,
25
+ "PageHeader": 32,
26
+ "SectionHeader": 78,
27
+ "Table": 3,
28
+ "TableGroup": 7,
29
+ "Text": 193
30
+ },
31
+ "asset_count_raw": 8,
32
+ "asset_count_model_kept": 8,
33
+ "asset_count_rejected": 0,
34
+ "asset_reject_reasons": {
35
+ "kept": 8
36
+ },
37
+ "artifact_leak_audit": {
38
+ "ok": true,
39
+ "hits": {
40
+ "Anonymous Authors": [],
41
+ "ACKNOWLEDGMENT": [],
42
+ "OpenReview": [],
43
+ "\"accept_label\"": [],
44
+ "\"decision\"": [],
45
+ "\"decision_tier\"": [],
46
+ "\"source_status\"": [],
47
+ "Meta-review": [],
48
+ "Official Review": [],
49
+ "official_reviews": [],
50
+ "meta_reviews": [],
51
+ "suggested_verdict_score": []
52
+ },
53
+ "artifact_count": 2
54
+ },
55
+ "default_model_input": "model_text_v3.txt",
56
+ "appendix_input": "appendix_text_v3.txt",
57
+ "reference_input": "reference_text_v3.txt",
58
+ "source": "iclr2026_test_public",
59
+ "run_name": "iclr26_20260429_1952_all",
60
+ "partial_snapshot": true,
61
+ "snapshot_created_at": "2026-04-30T02:34:47.606558+00:00"
62
+ }
iclr26/6KrETIaOYD/main_body_chunks.jsonl ADDED
@@ -0,0 +1,67 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0000", "section": "ABSTRACT", "page_start": 1, "page_end": 1, "type": "Text", "text": "Self-improvement has emerged as a state-of-the-art paradigm in Neural Combinatorial Optimization (NCO), where models iteratively refine their policies by generating and imitating high-quality solutions. Despite strong empirical performance, existing methods face key limitations. Training is computationally expensive, as policy updates require sampling numerous candidate solutions per instance to extract a single expert trajectory. More fundamentally, these approaches fail to exploit the structure of combinatorial problems involving the coordination of multiple agents, such as vehicles in min-max routing or machines in scheduling. By supervising on single-action trajectories, they fail to exploit agent-permutation symmetries, where distinct sequences of actions yield identical solutions, hindering generalization and the ability to learn coordinated behavior.", "source": "marker_v2", "marker_block_id": "/page/0/Text/7"}
2
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0001", "section": "ABSTRACT", "page_start": 1, "page_end": 1, "type": "Text", "text": "We address these challenges by extending self-improvement to operate over joint multi-agent actions. Our model architecture predicts complete agent-task assignments jointly at each decision step. To explicitly leverage symmetries, we employ a set-prediction loss, which supervises the policy on multiple expert assignments for any given state. This approach enhances sample efficiency and the model's ability to learn coordinated behavior. Furthermore, by generating multi-agent actions in parallel, it drastically accelerates the solution generation phase of the selfimprovement loop. Empirically, we validate our method on several combinatorial problems, demonstrating consistent improvements in the quality of the final solution and a reduced generation latency compared to standard self-improvement.", "source": "marker_v2", "marker_block_id": "/page/0/Text/8"}
3
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0002", "section": "1 INTRODUCTION", "page_start": 1, "page_end": 1, "type": "Text", "text": "End-to-end constructive Neural Combinatorial Optimization (NCO) has emerged as a powerful framework for solving combinatorial optimization (CO) problems by casting them as sequential Markov Decision Processes (MDPs), where a neural policy constructs solutions step by step (Ben gio et al., 2021) . Reinforcement Learning (RL)-based methods have proven especially effective in this setting, enabling models to learn solution strategies through interaction rather than relying on pre-existing expert data (Bello et al., 2017; Kool et al., 2019; Kwon et al., 2020; Kim et al., 2022) .", "source": "marker_v2", "marker_block_id": "/page/0/Text/10"}
4
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0003", "section": "1 INTRODUCTION", "page_start": 1, "page_end": 1, "type": "Text", "text": "Despite their flexibility, traditional RL approaches in NCO face significant challenges. The sparse reward signals inherent to combinatorial optimization – where a meaningful objective is available only upon solution completion – have largely limited training to the REINFORCE algorithm (Williams, 1992) and variants (Kool et al., 2019; Kim et al., 2022; Kwon et al., 2020) . Since these methods require backpropagation through the entire solution trajectory, the resulting high memory requirements and risk of gradient instability have encouraged a \"heavy-encoder, light-decoder\" architectural paradigm. In this setup, a static representation of the initial problem is generated once and used for all subsequent decisions. This becomes a critical bottleneck, as it fails to reflect the evolving problem state, often resulting in suboptimal decisions in the later stages of solution construction (Drakulic et al., 2023; Luo et al., 2024) . Recently, self-improvement methods have offered a compelling solution to these issues (Pirnay & Grimm, 2024; Corsini et al., 2024) . During training, these algorithms generate numerous solutions for a given problem instance, identify the best-performing trajectory, and use it as a pseudo-expert example for imitation learning. Because the policy is trained on individual state-action pairs along this expert trajectory, it enables the use of more powerful, decoder-only architectures that can dynamically re-encode the state at each step.", "source": "marker_v2", "marker_block_id": "/page/0/Text/11"}
5
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0004", "section": "1 INTRODUCTION", "page_start": 2, "page_end": 2, "type": "Text", "text": "However, this next-token prediction approach of self-improvement faces a fundamental limitation in multi-agent CO problems, where multiple decision entities (agents) must plan and coordinate their actions to achieve a shared objective. These problems often exhibit agentpermutation symmetries, meaning that different permutations of agent-task assignments can yield identical solutions. For example, in vehicle routing, assigning driver 1 to location A and then driver 2 to location B leads to the same overall route as the reverse assignment order (Figure 1) . However, by supervising the policy on a single \"best\" next action per state, self-improvement implicitly enforces an arbi-", "source": "marker_v2", "marker_block_id": "/page/1/Text/1"}
6
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0005", "section": "1 INTRODUCTION", "page_start": 2, "page_end": 2, "type": "FigureGroup", "text": "Figure 1: Example for agent-permutation symmetry. Both trajectories have the same solution.", "source": "marker_v2", "marker_block_id": "/page/1/FigureGroup/292"}
7
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0006", "section": "1 INTRODUCTION", "page_start": 2, "page_end": 2, "type": "Text", "text": "trary agent order and treats the remaining symmetric choices as errors. This reduces sample efficiency and limits the model's ability to learn coordination in multi-agent settings, thus limiting generalization performance.", "source": "marker_v2", "marker_block_id": "/page/1/Text/4"}
8
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0007", "section": "1 INTRODUCTION", "page_start": 2, "page_end": 2, "type": "Text", "text": "To address these limitations, this paper introduces MACSIM – a Multi-ACtion Self-Improvement Method. MACSIM extends the self-improvement paradigm by incorporating a multi-agent policy that predicts joint assignments for all agents in parallel at each decision step. To explicitly leverage problem symmetries, we employ a set-prediction loss, which allows the policy to learn from multiple equivalent expert assignments for a given state. This design promotes agent coordination, improves sample efficiency, and significantly accelerates solution generation. We demonstrate the effectiveness of MACSIM on several challenging combinatorial optimization tasks spanning both routing and scheduling domains. Our key contributions are as follows:", "source": "marker_v2", "marker_block_id": "/page/1/Text/5"}
9
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0008", "section": "1 INTRODUCTION", "page_start": 2, "page_end": 2, "type": "ListGroup", "text": "We propose MACSIM, a novel learning paradigm for cooperative multi-agent combinatorial optimization problems that achieves better empirical results with lower solution generation latency compared to standard self-improvement methods. We develop a new solution generation scheme that models the entire joint-agent action space in a single forward pass – thus fostering coordination – and avoids conflicts between agents through an autoregressive sampling algorithm. We introduce a permutation-invariant surrogate loss function for imitation learning on expert multi-action trajectories, which stabilizes and accelerates the training process.", "source": "marker_v2", "marker_block_id": "/page/1/ListGroup/293"}
10
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0009", "section": "2 RELATED WORKS", "page_start": 2, "page_end": 2, "type": "Text", "text": "The application of deep learning to CO problems was pioneered by the Pointer Network (Vinyals et al., 2015) , which was trained via supervised learning to autoregressively construct solutions for the Traveling Salesman Problem (TSP). This paradigm was quickly adapted to RL, removing the dependency on optimal solutions as training data and thus improving scalability (Bello et al., 2017; Nazari et al., 2018) . A major architectural advance came with transformer-based policies leveraging self-attention (Vaswani et al., 2017) , leading to substantial performance gains (Kool et al., 2019) .", "source": "marker_v2", "marker_block_id": "/page/1/Text/10"}
11
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0010", "section": "2 RELATED WORKS", "page_start": 2, "page_end": 2, "type": "Text", "text": "A common strategy in these REINFORCE-based methods (Williams, 1992) is to apply a computationally expensive encoder once per problem instance and use the resulting embeddings in a lightweight, iterative decoder. While efficient, this \"encode-once\" approach has been shown to generalize poorly to out-of-distribution instances (Manchanda et al., 2022) . In response, recent works have explored alternative strategies, such as re-encoding the state at each decoding step (Drakulic et al., 2023; Luo et al., 2024) , learning a diverse set of policies to improve performance at test time (Grinsztajn et al., 2023; Hottung et al., 2025) , or abandoning autoregressive decoding entirely in favor of heatmap-based (Joshi et al., 2019; Fu et al., 2021; Qiu et al., 2022; Ye et al., 2023) or diffusion-based methods (Sun & Yang, 2023; Li et al., 2023; 2024) .", "source": "marker_v2", "marker_block_id": "/page/1/Text/11"}
12
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0011", "section": "2 RELATED WORKS", "page_start": 2, "page_end": 2, "type": "Text", "text": "Self-improvement learning has recently emerged as a powerful training paradigm that bypasses the need for expert solutions (Corsini et al., 2024; Pirnay & Grimm, 2024) . Inspired by elite sampling from cross-entropy methods (Boer et al., 2005) , these approaches sample multiple solution trajec-", "source": "marker_v2", "marker_block_id": "/page/1/Text/12"}
13
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0012", "section": "2 RELATED WORKS", "page_start": 3, "page_end": 3, "type": "Text", "text": "tories, identify the best-performing one as a \"pseudo-expert\" and train the policy to imitate this target via next-token prediction. However, this approach assumes a unique optimal action per step, which is often violated in CO problems that exhibit symmetries (Cappart et al., 2023). In such cases, forcing the model to follow a single sequence reduces solution diversity and impairs generalization.", "source": "marker_v2", "marker_block_id": "/page/2/Text/1"}
14
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0013", "section": "2 RELATED WORKS", "page_start": 3, "page_end": 3, "type": "Text", "text": "Several lines of research have focused explicitly on exploiting symmetries. POMO (Kwon et al., 2020) and Sym-NCO (Kim et al., 2022) leverage the cyclic symmetry of the TSP by training on rollouts from all possible starting nodes and using their averaged returns to compute a low-variance baseline. More recently, DPN (Zheng et al., 2024) generalized this concept to multi-agent problems like the min-max VRP, where the order of agent routes is permutation-invariant. DPN samples multiple agent orderings and computes an agent-permutation-symmetric baseline, which reduces gradient variance and accelerates convergence by avoiding redundant learning.", "source": "marker_v2", "marker_block_id": "/page/2/Text/2"}
15
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0014", "section": "2 RELATED WORKS", "page_start": 3, "page_end": 3, "type": "Text", "text": "We extend self-improvement to explicitly leverage these structural symmetries in multi-agent CO problems. In contrast to PARCO, which resolves conflicts post-hoc, and DPN, which reduces variance through permutation-invariant baselines, MACSIM generates coordinated and conflict-free assignments directly and learns with a set-based loss, leading to more robust symmetry-aware policies.", "source": "marker_v2", "marker_block_id": "/page/2/Text/3"}
16
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0015", "section": "3 Preliminaries", "page_start": 3, "page_end": 3, "type": "Text", "text": "NCO typically involves a reformulation of the respective CO problem into a Markov Decision Process (MDP), where a solution \\tau to a problem instance x is constructed over a finite horizon t=1,\\ldots,T . The current configuration of the problem at time step t is encoded in the state s_t \\in \\mathcal{S} , which typically represents all information in a graph \\mathcal{G} = \\{\\mathcal{V}, \\mathcal{E}, w\\} , with N nodes \\mathcal{V} , edges \\mathcal{E} \\subseteq \\mathcal{V} \\times \\mathcal{V} and edge weights w: \\mathcal{E} \\to \\mathbb{R} (Khalil et al., 2017). At each step, a policy \\pi_{\\theta} with learnable weights \\theta selects an action a_t \\in \\mathcal{V} based on s_t , and the transition function \\psi updates the state to s_{t+1} (Khalil et al., 2017). Due to the sequential structure of MDPs, NCO commonly adopts autoregressive (AR) policies that generate actions step by step, conditioned on prior decisions. Classical approaches trained via REINFORCE typically encode only the initial state s_0 using a graph neural network, while the policy operates autoregressively from this encoding. In contrast, self-improvement methods enable training at the action level, allowing the policy to encode intermediate states s_t and use decoder-only architectures defined as P(\\tau \\mid x; \\theta) = \\prod_{t=1}^T \\pi_{\\theta}(a_t \\mid s_t) .", "source": "marker_v2", "marker_block_id": "/page/2/Text/5"}
17
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0016", "section": "3 Preliminaries", "page_start": 3, "page_end": 3, "type": "Text", "text": "In this work, we specifically target CO problems that can be framed as a cooperative multi-agent MDP (MMDP or Markov Game) with M agents sharing a common reward (Boutilier, 1996). Agents correspond to decision entities executing tasks, such as machines in scheduling problems or vehicles in routing. The state s_t of the problem can be defined by a bipartite graph \\mathcal{G} = \\{\\mathcal{V}, \\mathcal{M}, \\mathcal{E}, w\\} , where \\mathcal{V} is the set of nodes (tasks), \\mathcal{M} is the set of agents, and edges \\mathcal{E} \\subseteq \\mathcal{M} \\times \\mathcal{V} denote feasible agent-task assignments, each associated with a cost w: \\mathcal{E} \\to \\mathbb{R} .", "source": "marker_v2", "marker_block_id": "/page/2/Text/6"}
18
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0017", "section": "3 Preliminaries", "page_start": 3, "page_end": 3, "type": "Text", "text": "At each step t, the policy \\pi_{\\theta} maps the state s_t to a bipartite matching \\mathbf{a}_t = \\{a_t^k\\}_{k=1}^M between agent and tasks. Each element a_t^k = (m_k, v_k) denotes the assignment of task v_k to agent m_k , where no two agents can be assigned to the same task. Given a matching \\mathbf{a}_t \\in \\mathcal{A} , with \\mathcal{A} the space of valid matchings, the problem transitions from s_t to s_{t+1} according to a transition function \\psi: \\mathcal{S} \\times \\mathcal{A} \\to \\mathcal{S} , until a complete solution \\tau is obtained. The transition function is assumed order-invariant, meaning it depends only on the final matching \\mathbf{a}_t , not on the order in which assignments are produced. Agents receive a shared reward observed only at terminal states, where the return R(\\tau, x) equals the negative value of the CO objective for the complete solution.", "source": "marker_v2", "marker_block_id": "/page/2/Text/7"}
19
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0018", "section": "4.1 Multi-Agent Policy", "page_start": 3, "page_end": 3, "type": "Text", "text": "The permutation invariance of the transition function with respect to joint agent-task assignments induces symmetries over agent orderings. Standard self-improvement typically ignores this structure by assuming a single best action per time-step. In contrast, our approach leverages these agent-permutation symmetries by learning a policy that generates complete joint agent-task assignments \\mathbf{a}_t instead of single next actions a_t = (m, v) . To this end, MACSIM utilizes a multi-agent policy that directly maps the current state s_t to a joint agent-action assignment \\mathbf{a}_t . This policy first encodes", "source": "marker_v2", "marker_block_id": "/page/2/Text/10"}
20
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0019", "section": "4.1 Multi-Agent Policy", "page_start": 4, "page_end": 4, "type": "FigureGroup", "text": "Figure 2: Overview of MACSIM. It generates joint agent-action logits in parallel through a multi-agent policy and autoregressively samples from them to generate complete agent-task assignments. The policy is used to sample \\beta solutions, where the best serves as training example. A set-based loss function is used to train the policy on pseudo-expert multi-agent actions for a given state.", "source": "marker_v2", "marker_block_id": "/page/3/FigureGroup/149"}
21
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0020", "section": "4.1 Multi-Agent Policy", "page_start": 4, "page_end": 4, "type": "Text", "text": "the bipartite input graph \\mathcal G into agent embeddings \\mathbf H_{\\mathcal M} \\in \\mathbb R^{M \\times d} and task embeddings \\mathbf H_{\\mathcal V} \\in \\mathbb R^{N \\times d} . Based on these embeddings, it computes a matrix of unnormalized logits \\mathbf L \\in \\mathbb R^{M \\times N} , where each entry L_{m,v} represents the compatibility score for assigning task v to agent m. For full architectural details of the policy network, we refer the reader to Appendix B.", "source": "marker_v2", "marker_block_id": "/page/3/Text/3"}
22
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0021", "section": "4.1 Multi-Agent Policy", "page_start": 4, "page_end": 4, "type": "Text", "text": "While the idea of multi-agent policies in NCO is not novel, existing approaches either sample only once from the resulting joint-distribution (Liu et al., 2024), thus discarding learned inter-agent correlations as well as potential efficiency gains through multi-step prediction. Or, they assume independence across agents by normalizing L per agent and sampling independently from the resulting marginal distributions. However, this independence assumption does not hold, leading to suboptimal coordination and conflicts, where agents happen to select the same action. PARCO (Berto et al., 2024) resolves conflicts by a post-hoc resolution mechanism, prioritizing agents with larger log-probabilities while leaving others idle. Yet, since agents are modeled independently through different marginal distributions, effective coordination does not take place.", "source": "marker_v2", "marker_block_id": "/page/3/Text/4"}
23
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0022", "section": "4.2 Multi-Action Generation", "page_start": 4, "page_end": 4, "type": "Text", "text": "To address this, we introduce an autoregressive sampling procedure, that utilizes the joint-logits \\mathbf{L} from the neural policy to sequentially sample agent-action pairs from their joint distribution without replacement. To this end, the probability of generating a specific sequence \\mathbf{a}_t is factorized using the chain rule of probability:", "source": "marker_v2", "marker_block_id": "/page/3/Text/6"}
24
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0023", "section": "4.2 Multi-Action Generation", "page_start": 4, "page_end": 4, "type": "Equation", "text": "P(\\mathbf{a}_t \\mid \\mathbf{L}) = \\prod_{k=1}^{M} P(m_{t,k}, v_{t,k} \\mid \\mathbf{a}_t^{\\leq k}, \\mathbf{L}) (1)", "source": "marker_v2", "marker_block_id": "/page/3/Equation/7"}
25
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0024", "section": "4.2 Multi-Action Generation", "page_start": 4, "page_end": 4, "type": "Text", "text": "where \\mathbf{a}_t^{< k} = ((m_{t,1}, v_{t,1}), \\dots, (m_{t,k-1}, v_{t,k-1})) denotes the sequence of previous assignments in the construction of \\mathbf{a}_t . This formulation casts the selection of each agent-task pair as a step in a sequence, where the choice at step k is conditioned on all prior assignments. Specifically, let \\mathcal{M}_k and \\mathcal{V}_k be the sets of agents and tasks, respectively, available at step k, with \\mathcal{M}_1 = \\mathcal{M} and \\mathcal{V}_1 = \\mathcal{V} . At each step k \\in \\{1, \\dots, M\\} , the policy samples a feasible and available agent-task pair, (m_k, v_k) \\in \\mathcal{E}_k \\subseteq \\mathcal{E} , where \\mathcal{E}_k = \\mathcal{E} \\cap (\\mathcal{M}_k \\times \\mathcal{V}_k) , from a categorical distribution with probabilities proportional to their scores L_{m_k, v_k} :", "source": "marker_v2", "marker_block_id": "/page/3/Text/8"}
26
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0025", "section": "4.2 Multi-Action Generation", "page_start": 4, "page_end": 4, "type": "Equation", "text": "P(a_t^k = (m_k, v_k) \\mid \\mathbf{a}_t^{< k}, \\mathbf{L}) = \\frac{\\exp(L_{m_k, v_k})}{\\sum_{(m', v') \\in \\mathcal{E}_h} \\exp(L_{m', v'})}, (2)", "source": "marker_v2", "marker_block_id": "/page/3/Equation/9"}
27
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0026", "section": "4.2 Multi-Action Generation", "page_start": 4, "page_end": 4, "type": "Text", "text": "After sampling a_t^k = (m_k, v_k) , the sets for the next step are updated via \\mathcal{M}_{k+1} = \\mathcal{M}_k \\setminus \\{m_k\\} and \\mathcal{V}_{k+1} = \\mathcal{V}_k \\setminus \\{v_k\\} and the process continues until all agents are assigned to a task. We summarize this sampling process, which guarantees the generation of a valid matching \\mathbf{a}_t , in Algorithm 1. The validity of the resulting distribution is formally stated as follows:", "source": "marker_v2", "marker_block_id": "/page/3/Text/10"}
28
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0027", "section": "4.2 Multi-Action Generation", "page_start": 4, "page_end": 4, "type": "Text", "text": "Proposition 1. The function P(\\mathbf{a}_t \\mid \\mathbf{L}) defined by the autoregressive process in Equations 1 and 2 is a valid probability distribution over the space of all possible ordered agent-task matchings. <sup>1</sup>", "source": "marker_v2", "marker_block_id": "/page/3/Text/11"}
29
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0028", "section": "4.2 Multi-Action Generation", "page_start": 4, "page_end": 4, "type": "Footnote", "text": "& lt;sup>1</sup>A proof for Proposition 1 can be found in Appendix A.", "source": "marker_v2", "marker_block_id": "/page/3/Footnote/12"}
30
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0029", "section": "4.2 Multi-Action Generation", "page_start": 5, "page_end": 5, "type": "Text", "text": "The injectivity constraint implies that earlier assignments reduce the set of available actions for subsequent agents, making the generation process order-sensitive, even though the final solution is permutation-invariant. Our autoregressive approach explicitly models this dependency: the joint softmax normalization dynamically integrates coordination, since the denominator depends on all remaining agent-task pairs. High logits for a pair (m^*, v^*) implicitly reduce the probability of competing agents choosing the same task, allowing the policy to prioritize favorable assignments and avoid conflicts with-", "source": "marker_v2", "marker_block_id": "/page/4/Text/1"}
31
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0030", "section": "Algorithm 1 Joint Action Sampling from L", "page_start": 5, "page_end": 5, "type": "Text", "text": "out relying on heuristics or post hoc conflict resolution, as PARCO does.", "source": "marker_v2", "marker_block_id": "/page/4/Text/4"}
32
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0031", "section": "Algorithm 1 Joint Action Sampling from L", "page_start": 5, "page_end": 5, "type": "Text", "text": "Substituting the definition of P(\\mathbf{a}_t \\mid \\mathbf{L}) from Equation (1) into the decoder-only policy of Section 3 yields the following definition of our MACSIM policy:", "source": "marker_v2", "marker_block_id": "/page/4/Text/5"}
33
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0032", "section": "Algorithm 1 Joint Action Sampling from L", "page_start": 5, "page_end": 5, "type": "Equation", "text": "P(\\tau \\mid s_t; \\theta) = \\prod_{t=1}^{T} \\pi_{\\theta}(\\mathbf{L} \\mid s_t) \\prod_{k=1}^{M} P(a_t^k \\mid \\mathbf{a}_t^{< k}, \\mathbf{L}) (3)", "source": "marker_v2", "marker_block_id": "/page/4/Equation/6"}
34
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0033", "section": "Algorithm 1 Joint Action Sampling from L", "page_start": 5, "page_end": 5, "type": "Text", "text": "In this formulation, the joint logits {\\bf L} are computed only once by the computationally expensive neural policy \\pi_{\\theta} , after which M actions are generated using a fast autoregressive sampling procedure. As a result, MACSIM can construct solutions significantly faster than fully autoregressive models, as we demonstrate in the experimental section of this paper.", "source": "marker_v2", "marker_block_id": "/page/4/Text/7"}
35
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0034", "section": "4.3 SKIP TOKEN", "page_start": 5, "page_end": 5, "type": "Text", "text": "The generative model defined by Equation (3) requires each agent to select an action at every decision step. However, enforcing task assignments for all agents at every step can be suboptimal, particularly in problems with strong inter-agent dependencies. In job-shop scheduling, for instance, the set of available jobs for a machine likely changes as other machines schedule operations. In such cases, it may be beneficial for an agent to wait until a more favorable task becomes available.", "source": "marker_v2", "marker_block_id": "/page/4/Text/9"}
36
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0035", "section": "4.3 SKIP TOKEN", "page_start": 5, "page_end": 5, "type": "Text", "text": "Therefore, we introduce a dummy action, referred to as the skip token. The skip token is a transient action that can be chosen by any agent at any time, allowing them to wait until the next decision step without modifying the current solution. To encourage efficient solution construction, each use of the skip token incurs a small penalty added to the objective value. Empirically, we find that annealing this penalty toward zero during training yields the best performance. This strategy encourages the policy to increasingly prioritize generating high-quality solutions as training progresses. We examine the effect of the skip token in Table 3 and provide more details and analyses in Appendix D.3.", "source": "marker_v2", "marker_block_id": "/page/4/Text/10"}
37
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0036", "section": "4.3 SKIP TOKEN", "page_start": 5, "page_end": 5, "type": "Text", "text": "Technically, the skip token is implemented as a learnable embedding \\mathbf{h}^{\\text{skip}} \\in \\mathbb{R}^d which is added to the set of all task embeddings \\mathbf{H}_{\\mathcal{V}} . Unlike other actions, the skip token can be selected by multiple agents, with the only restriction that at least one agent selects an actual task.", "source": "marker_v2", "marker_block_id": "/page/4/Text/11"}
38
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0037", "section": "4.4 POLICY LEARNING", "page_start": 5, "page_end": 5, "type": "Text", "text": "We train MACSIM with a two-stage self-improvement framework, similar to Pirnay & Grimm (2024) and Corsini et al. (2024). In the first stage, the current best policy \\pi_{\\theta}^* generates \\beta\\gg 1 solutions for each problem instance x. We select the best solution with respect to the objective value plus the penalty term for skip token usage, and add the state-action pairs ((s_1, \\mathbf{a}_1^*), \\ldots, (s_T, \\mathbf{a}_T^*)) corresponding to the solution \\tau^* to the training dataset. In the second stage, the policy network \\pi_{\\theta} is updated via imitation learning on these pseudo-expert trajectories.", "source": "marker_v2", "marker_block_id": "/page/4/Text/13"}
39
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0038", "section": "4.4 POLICY LEARNING", "page_start": 5, "page_end": 5, "type": "Text", "text": "Unlike prior work that predicts a single \"token\" from a partial solution, we aim to maximize the likelihood of the policy producing the entire expert multi-agent action \\mathbf{a}_t^* given the state s_t . The corresponding negative log-likelihood (NLL) under our generative process of Equation (1) is:", "source": "marker_v2", "marker_block_id": "/page/4/Text/14"}
40
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0039", "section": "4.4 POLICY LEARNING", "page_start": 5, "page_end": 5, "type": "Equation", "text": "\\mathcal{L}_{\\text{ML}} = -\\sum_{k=1}^{M} \\log P(m_k, v_k \\mid \\mathbf{a}_t^{< k}) = -\\sum_{k=1}^{M} \\log \\left( \\frac{\\exp(L_{m_k, v_k})}{\\sum_{(m', v') \\in \\mathcal{E}_k} \\exp(L_{m', v'})} \\right). \\tag{4}", "source": "marker_v2", "marker_block_id": "/page/4/Equation/15"}
41
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0040", "section": "4.4 POLICY LEARNING", "page_start": 6, "page_end": 6, "type": "Text", "text": "However, direct optimization with \\mathcal{L}_{\\mathrm{ML}} is problematic. As detailed in Appendix E, its primary flaw is conflicting gradient signals: each term in the sum assumes one assignment is correct at a given step and consequently penalizes all others, including those that occur later in the expert assignments.", "source": "marker_v2", "marker_block_id": "/page/5/Text/1"}
42
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0041", "section": "4.4 POLICY LEARNING", "page_start": 6, "page_end": 6, "type": "Text", "text": "A first step to mitigate this issue is to utilize the agent order from the expert assignment. By assuming a fixed agent order \\mathbf{m}^* = (m_1, \\dots, m_M) the choice of agent at step k becomes deterministic. Thus, P(m_k \\mid \\mathbf{a}_t^{< k}) = 1 and the probability P(v_k, m_k \\mid \\mathbf{a}_t^{< k}) can be factorized as P(v_k \\mid m_k, \\mathbf{a}_t^{< k}) , transforming the generative process into a Plackett-Luce (PL) model (Volkovs & Zemel, 2012). Its NLL computes the loss over the marginal distributions for each agent, preventing gradient conflicts:", "source": "marker_v2", "marker_block_id": "/page/5/Text/2"}
43
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0042", "section": "4.4 POLICY LEARNING", "page_start": 6, "page_end": 6, "type": "Equation", "text": "\\mathcal{L}_{PL} = -\\sum_{k=1}^{M} \\log P(v_k \\mid m_k, \\mathbf{a}_t^{< k}) = -\\sum_{k=1}^{M} \\log \\frac{\\exp(L_{m_k, v_k})}{\\sum_{v' \\in \\mathcal{V}_k} \\exp(L_{m_k, v'})}. (5)", "source": "marker_v2", "marker_block_id": "/page/5/Equation/3"}
44
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0043", "section": "4.4 POLICY LEARNING", "page_start": 6, "page_end": 6, "type": "Text", "text": "While this improves gradient stability, the loss remains sensitive to the permutation of the expert sequence. However, every permutation of the assignments in \\mathbf{a}^* yields the same solution, which should be reflected in the loss function. Ideally, this would be achieved by averaging the Plackett-Luce loss over all possible M! agent orderings, which is computationally intractable. Therefore, we employ a surrogate\\ loss by relaxing the sequential dependence assumption for the loss calculation and treating each agent-task pair in an expert matching as an independent supervised instance with conditional probability P(v\\mid m) . This is justified because the expert data consist only of valid matchings, making it unnecessary to enforce the injectivity constraint within the loss itself. This is analogous to bipartite matching in object detection (Carion et al., 2020), where the assignment between predictions and ground-truth objects is first established algorithmically, and losses are then computed independently for each matched pair. The resulting surrogate is defined as the crossentropy (CE) loss summed over all agents:", "source": "marker_v2", "marker_block_id": "/page/5/Text/4"}
45
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0044", "section": "4.4 POLICY LEARNING", "page_start": 6, "page_end": 6, "type": "Equation", "text": "\\mathcal{L}_{CE} = -\\sum_{k=1}^{M} \\log P(v_k \\mid m_k) = -\\sum_{k=1}^{M} \\log \\frac{\\exp(L_{m_k, v_k})}{\\sum_{v' \\in \\mathcal{V}} \\exp(L_{m_k, v'})}. (6)", "source": "marker_v2", "marker_block_id": "/page/5/Equation/5"}
46
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0045", "section": "4.4 POLICY LEARNING", "page_start": 6, "page_end": 6, "type": "Text", "text": "This surrogate is permutation-invariant, computationally efficient, and provides a more robust training signal as we will validate empirically in the experimental section. Moreover, we provide a thorough analysis of \\mathcal{L}_{CE} in Appendices E and F.", "source": "marker_v2", "marker_block_id": "/page/5/Text/6"}
47
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0046", "section": "5 EXPERIMENTS", "page_start": 6, "page_end": 6, "type": "Text", "text": "We assess the effectiveness of MACSIM on representative multi-agent CO problems, spanning routing and scheduling domains. Specifically, we evaluate MACSIM on two challenging scheduling problems – the flexible job shop scheduling problem (FJSP) and the flexible flow shop problem (FFSP) – as well as a common routing problem, the heterogeneous capacitated vehicle routing problem (HCVRP). We compare MACSIM with common and SOTA solvers for the respective CO problems and the self-improvement method ( SLIM ) of Corsini et al. (2024); Pirnay & Grimm (2024).", "source": "marker_v2", "marker_block_id": "/page/5/Text/8"}
48
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0047", "section": "5.1 PROBLEMS", "page_start": 6, "page_end": 6, "type": "Text", "text": "Flexible Job Shop Scheduling Problem. The FJSP is concerned with scheduling N jobs on M machines (agents). Each job consists of a sequence of operations that must be executed in a fixed order. Unlike the classical job shop problem, each operation in FJSP can be processed by a subset of eligible machines \\mathcal{M}_k \\subseteq \\mathcal{M} , with machine-dependent processing times, resulting in a combined routing (assigning operations to machines) and sequencing problem (ordering operations on each machine). The common objective is to minimize the makespan of the resulting schedule. The formal mathematical model and the MMDP formulation of the FJSP are presented in Appendix C.1.", "source": "marker_v2", "marker_block_id": "/page/5/Text/10"}
49
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0048", "section": "5.1 PROBLEMS", "page_start": 6, "page_end": 6, "type": "Text", "text": "To evaluate the performance on the FJSP, we compare MACSIM against several baselines. First, we include OR-Tools, a state-of-the-art CP-SAT solver widely applied in scheduling (Col & Teppan, 2019). We also benchmark against classical priority dispatching rules – FIFO (Firt In First Out), MOR (Most Operations Remaining), and MWKR (Most Work Remaining) – commonly used in manufacturing scheduling (Montazeri & Wassenhove, 1990). Lastly, we consider learning-based approaches, including a graph neural network trained via Proximal Policy Optimization (PPO) proposed by Song et al. (2022), and the dual attention model DANIEL (Wang et al., 2023).", "source": "marker_v2", "marker_block_id": "/page/5/Text/11"}
50
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0049", "section": "5.1 PROBLEMS", "page_start": 6, "page_end": 6, "type": "Footnote", "text": "& lt;sup>2</sup>Source code is available at", "source": "marker_v2", "marker_block_id": "/page/5/Footnote/12"}
51
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0050", "section": "5.1 PROBLEMS", "page_start": 7, "page_end": 7, "type": "Text", "text": "Flexible Flow Shop Scheduling Problem. The FFSP involves scheduling N jobs that must pass through S sequential processing stages. The key challenge lies in the flexibility at each stage, which contains M parallel machines; a job can be processed by any available machine within a stage. The objective is to determine the assignment and sequence of jobs on machines to minimize the makespan. A detailed problem formulation for the FFSP is provided in Appendix C.2.", "source": "marker_v2", "marker_block_id": "/page/6/Text/1"}
52
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0051", "section": "5.1 PROBLEMS", "page_start": 7, "page_end": 7, "type": "Text", "text": "We compare MACSIM against traditional baselines – Gurobi (Gurobi Optimization, LLC, 2025) , a Genetic Algorithm (Hejazi & Saghafian, 2005) , and Particle Swarm Optimization (Singh & Ma hapatra, 2012) – as well as neural baselines: MatNet (Kwon et al., 2021) , PolyNet (Hottung et al., 2025) , and PARCO (Berto et al., 2024) .", "source": "marker_v2", "marker_block_id": "/page/6/Text/2"}
53
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0052", "section": "5.1 PROBLEMS", "page_start": 7, "page_end": 7, "type": "Text", "text": "Min-Max Heterogeneous Capacitated Vehicle Routing Problem. The HCVRP is a challenging extension of the classical CVRP, designed to capture more realistic logistics and transportation scenarios. In HCVRP, a fleet of heterogeneous vehicles, each with distinct capacities and travel costs, is responsible for serving a set of customer demands. The objective differs from standard CVRP: instead of minimizing the total cost or distance, the goal is to minimize the maximum route length (or workload) among all vehicles, ensuring a balanced distribution of effort across the fleet. A detailed mathematical formulation for the min-max HCVRP is provided in Appendix C.3.", "source": "marker_v2", "marker_block_id": "/page/6/Text/3"}
54
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0053", "section": "5.1 PROBLEMS", "page_start": 7, "page_end": 7, "type": "Text", "text": "For the HCVRP, we employ two well-known heuristic baselines: Simulated Annealing (˙Ilhan, 2021) and SISR (Christiaens & Berghe, 2020) , a state-of-the-art heuristic for solving the CVRP and variants. Neural baselines involve Equity-Transformer (ET) (Son et al., 2024) , DRLLI (Li et al., 2022) , 2D-Ptr (Liu et al., 2024) , and DPN (Zheng et al., 2024) .", "source": "marker_v2", "marker_block_id": "/page/6/Text/4"}
55
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0054", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 7, "page_end": 7, "type": "Text", "text": "We present the main empirical results in Table 1, which reports test-set performance of the evaluated methods in terms of average objective values (Obj.), gaps to the best-known solutions, and average inference latency for a single instance. For neural baselines, we report performance under both greedy ( g. ) and sampling ( s. ) decoding, with the latter evaluated using 1,280 sampled solutions (more details on the experimental setup can be found in Appendix H) . MACSIM consistently outperforms neural baselines across all problem types and sizes, surpasses all methods on FFSP, and substantially reduces the gap to OR-Tools on FJSP, even outperforming it on 20 × 5 instances.", "source": "marker_v2", "marker_block_id": "/page/6/Text/6"}
56
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0055", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 7, "page_end": 7, "type": "Text", "text": "Compared to SLIM, the advantage of MACSIM increases with the number of agents, as shown in Figure 3b for the HCVRP and FFSP. In addition, MACSIM significantly reduces inference time compared to SLIM. For FFSP 50×4 instances, SLIM requires nearly ten times longer than MACSIM to generate a solution. This difference grows with the number of agents, as shown in Figure 3c, which illustrates the number of forward passes needed by each policy to construct a solution and the resulting inference times. MACSIM requires only a fraction of the construction steps used by SLIM, and this advantage further increases with the number of agents due to its multi-agent policy.", "source": "marker_v2", "marker_block_id": "/page/6/Text/7"}
57
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0056", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 7, "page_end": 7, "type": "Text", "text": "While MACSIM is not necessarily the fastest among the neural solvers evaluated here, slower inference times compared to other methods can be attributed to the fact that, like SLIM, MACSIM performs step-wise re-encoding of the problem state. As discussed in previous work, this enables better generalization to out-of-distribution instances (e.g., Luo et al. (2024) ). Table 2 validates this by evaluating models trained on the small FJSP instances of Table 1 on larger instances, where MACSIM outperforms all neural baselines and even OR-Tools on two out of three instance types.", "source": "marker_v2", "marker_block_id": "/page/6/Text/8"}
58
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0057", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 7, "page_end": 7, "type": "Text", "text": "We also conduct an ablation study to assess the impact of MACSIM's components. First, Figure 3a evaluates MACSIM with different sequence generation modes. While \"MACSIM-full\" refers to the generative model defined by Equation (3) with the sequential sampling algorithm described in Algorithm 1, \"MACSIM-random-order\" and \"MACSIM-fixed-order\" denote variants where agents act in random or fixed order, respectively, given logits L. The results in Figure 3a and table 3 highlight the effectiveness of the proposed sampling procedure, particularly on instances with many agents. Moreover, Table 3 confirms the importance of the skip token, which proves especially beneficial in larger instances where coordination among agents is more challenging. Although the skip token increases generation latency, it substantially improves solution quality. A more detailed analysis of the skip token and its penalty is provided in Appendix D where we provide more experiments.", "source": "marker_v2", "marker_block_id": "/page/6/Text/9"}
59
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0058", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 8, "page_end": 8, "type": "TableGroup", "text": "Table 1: Test set performance of MACSIM and baselines on FJSP, FFSP, and HCVRP. Best obj. values found by any solver are shown in bold; grey backgrounds indicate the best neural solver. N \\times M 10 5 1 10 \\times 5 20 \\times 5 15 \\times 10 Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time ( OR-Tools 96.32 0.00% 1597 188.15 0.03% 1800 143.53 0.00% 1724 TFO 119.4 23.96% 0.16 216.08 14.88% 0.32 184.55 28.58% 0.51 MOR 115.38 19.79% 0.16 214.16 13.85% 0.32 173.15 20.64% 0.51 /WKR 113.23 17.56% 0.16 209.78 11.53% 0.32 171.25 19.31% 0.50 PPO (g.) 111.67 15.94% 0.45 211.22 12.29% 1.43 166.92 16.30% 1.35 DANIEL (g.) 106.71 10.79% 0.45 197.56 5.03% 0.94 161.28 12.37% 1.43 LIM (g.) 103.85 7.82% 0.91 194.37 3.33% 1.18 154.32 7.62% 2.74 AACSIM (g.) 102.21 6.12% 0.44 191.08 1.58% 0.76 149.84 4.40% 1.32 PO (s.) 105.59 9.62% 1.11 207.53 10.33% 2.36 160.86 12.07% 6.42 DANIEL (s.) 101.67 5.55% 0.74 192.78 2.49% 1.87 153.22 6.75% 6.10 LIM (s.) 98.74 2.51% 2.32 189.08 0.52% 6.91 149.02 3.82% 20.0 MACSIM (s.) 97.64 1.37% 0.86 188.10 0.00% 2.28 145.95 1.69% 6.19 meshi (s.) 77.04 1.5770 0.00 FFSP 0.0070 2.20 143.73 1.07/0 0.17 N \\times M_i \\times S 20 \\times 4 \\times 9 FFSP 50 \\times 4 \\times 9 100 × 4 × 9 • Ob: Ob: Time (s.) Ob: Time Metric Obj. Gap Time (s.) Obj. Gap \\ / Obj. Gap Surobi (600s) 31.61 31.93% 600 56.00 10.220 600 - 00.25 12.700 600 Senetic Algorithm 31.15 30.01% 21.05 56.92 19.23% 44.82 99.25 13.79% 89.2 Particle Swarm 29.10 21.45% 46.17 55.10 15.42% 82.46 97.30 11.56% 154 MatNet (g.) 27.26 13.77% 1.22 51.52 7.92% 2.17 91.58 5.00% 4.9 olyNet (g.) 26.71 11.48% 1.69 51.01 6.85% 2.45 91.22 4.59% 5.2 ARCO (g.) 26.31 9.81% 0.26 51.19 7.23% 0.52 91.29 4.67% 0.89 LIM (g.) 26.18 9.27% 0.86 50.01 4.75% 3.36 91.97 5.45% 5.1 MACSIM (g.) 25.75 7.47% 0.28 49.36 3.39% 0.43 89.88 1.86% 0.9 MatNet (s.) 25.43 6.14% 3.88 49.68 4.06% 8.91 89.72 2.87% 18.0 olyNet (s.) 24.98 4.26% 5.04 49.23 3.12% 9.24 89.21 2.28% 19.2 ARCO (s.) 24.78 3.42% 0.99 49.27 3.20% 1.97 89.46 2.57% 4.0 LIM (s.) 24.19 0.96% 1.55 48.13 0.82% 10.21 89.50 2.61% 19.0 MACSIM (s.) 23.96 0.00% 0.49 47.74 0.00% 0.91 87.22 0.00% 3.60 HCVRP N \\times M 60 \\times 3 80 \\times 3 100 \\times 3 Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time ISRs 6.57 0.00% 478 8.52 0.00% 750 10.29 0.00% 108 imulated Annealing 7.04 7.15% 382 9.17 7.63% 561 11.13 8.16% 765 ET (g.) 7.58 15.37% 0.28 9.76 14.55% 0.38 11.74 14.09% 0.43 OPN (g.) 7.46 13.54% 0.28 9.66 13.38% 0.40 11.48 11.56% 0.40 \\mathrm{DRL}_{Li}\\left(g_{\\cdot}\\right) 7.43 13.09% 0.34 9.64 13.15% 0.46 11.44 11.18% 0.5 D-Ptr (g.) 7.20 9.59% 0.20 9.24 8.45% 0.27 11.12 8.07% 0.3 LIM (g.) 7.19 9.44% 0.63 9.25 8.57% 0.87 11.10 7.87% 1.0 AACSIM (g.) 7.15 8.83% 0.35 9.15 7.39% 0.43 11.02 7.09% 0.73 ET (s.) 7.14 8.68% 0.52 9.19 7.86% 0.66 11.20 8.84% 1.02 OPN (s.) 7.03 7.00% 0.55 9.16 7.51% 0.71 11.03 7.19% 1.0 \\mathrm{DRL}_{Li}\\left(s.\\right) 6.97 6.09% 0.73 9.10 6.81% 1.10 10.90 5.93% 1.4 D-Ptr (s.) 6.82 3.81% 0.32 8.85 3.87% 0.44 10.71 4.08% 0.5 LIM (s.) 6.88 4.75% 2.40 8.92 4.69% 3.31 10.81 5.05% 4.09 2.70 MACSIM (s.) — MACSIM-fi — SLIM 6.76 2.89% 1.65 HCVRP (N = 5) 8.78 3.05% 2.29 10.67 3.69% 2", "source": "marker_v2", "marker_block_id": "/page/7/TableGroup/29"}
60
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0059", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 8, "page_end": 8, "type": "FigureGroup", "text": "Figure 3: Left : Validation performance (makespan) on FJSP 10 \\times 5 instances during training under different sequence generation strategies. Middle : Average performance gap of SLIM relative to MACSIM across varying numbers of agents. Right : Inference efficiency comparison, reporting construction steps (lines, right axis) and inference time to generate a solution (bars, left axis).", "source": "marker_v2", "marker_block_id": "/page/7/FigureGroup/30"}
61
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0060", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 9, "page_end": 9, "type": "TableGroup", "text": "Table 2: Generalization performance of MACSIM and baseline solvers on larger FJSP instance distributions not seen during training. FJSP N \\times M 20 \\times 10 30 \\times 10 40 \\times 10 Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time (s.) OR-Tools 195.98 3.14% 1800 274.67 0.00% 1800 365.96 0.08% 1800 PPO (g.) 215.78 13.56% 1.91 312.59 13.81% 2.86 416.18 13.81% 3.82 DANIEL (g.) 198.50 4.46% 1.85 281.49 2.48% 2.76 371.45 1.58% 3.81 SLIM (g.) 195.89 3.09% 3.11 281.87 2.62% 4.57 374.13 2.31% 6.03 MACSIM (g.) 192.15 1.12% 1.19 276.01 0.49% 1.71 365.87 0.05% 2.27 PPO (s.) 214.81 13.05% 6.23 308.55 12.33% 12.79 410.76 12.33% 24.54 DANIEL (s.) 193.91 2.05% 6.35 279.20 1.65% 12.37 370.08 1.21% 21.09 SLIM (s.) 194.19 2.19% 28.15 281.42 2.46% 69.97 373.70 2.20% 139.30 MACSIM (s.) 190.02 0.00% 6.79 275.48 0.29% 14.12 365.67 0.00% 27.13 Table 3: Ablation study on MACSIM components", "source": "marker_v2", "marker_block_id": "/page/8/TableGroup/67"}
62
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0061", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 9, "page_end": 9, "type": "TableGroup", "text": "Table 4: Comparison of Loss Functions FJSP N \\times M 10 \\times 5 15 \\times 10 Metric Obj. Time Obj. Time MACSIM-full (s.) 97.64 0.86 145.95 6.19 w/o AR-sampling fixed (s.) 98.97 0.76 155.13 3.97 random (s.) 98.66 0,78 150.72 4.15 w/o skip-token (s.) 98.69 0.75 159.65 3.89", "source": "marker_v2", "marker_block_id": "/page/8/TableGroup/68"}
63
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0062", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 9, "page_end": 9, "type": "Table", "text": "FJ SP FFSP N \\times M 10 \\times 5 20 \\times 5 20 \\times 12 50 \\times 12 Metric Obj. Obj. Obj. Obj. \\mathcal{L}_{\\mathrm{SA}}\\left( s.\\right) 98.81 189.18 24.29 49.58 \\mathcal{L}_{\\mathrm{ML}} (s.) 98.13 188.97 24.15 49.02 \\mathcal{L}_{PL} (s.) 97.99 188.81 24.08 47.90 \\mathcal{L}_{\\text{CE}}\\left(s.\\right) 97.64 188.10 23.96 47.74", "source": "marker_v2", "marker_block_id": "/page/8/Table/6"}
64
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0063", "section": "5.2 EXPERIMENTAL RESULTS", "page_start": 9, "page_end": 9, "type": "Text", "text": "Finally, Table 4 compares the loss functions from Section 4.4, along with the single-agent cross-entropy loss \\mathcal{L}_{SA} defined in Appendix E.1. Our surrogate set-based cross-entropy loss consistently achieves the best performance on both FJSP and FFSP.", "source": "marker_v2", "marker_block_id": "/page/8/Text/7"}
65
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0064", "section": "6 Conclusion", "page_start": 9, "page_end": 9, "type": "Text", "text": "We presented MACSIM, a novel self-improvement framework tailored for multi-agent CO problems. Instead of predicting a single next token, MACSIM learns a multi-agent policy that emits joint agent—task logits in one forward pass and then samples a valid matching autoregressively without replacement. This design captures inter-agent dependencies, prevents conflicts by construction, and amortizes policy computation over multiple assignments, drastically accelerating solution generation. A second key ingredient is a permutation-invariant, set-based learning objective. By supervising on the set of expert agent—task pairs rather than a single agent's next step, MACSIM explicitly exploits agent-permutation symmetries, avoids gradient conflicts inherent to single-action imitation, and promotes coordinated behaviors. A skip token combined with an annealed penalty further enables agents to defer actions when beneficial while keeping construction efficient.", "source": "marker_v2", "marker_block_id": "/page/8/Text/9"}
66
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0065", "section": "6 Conclusion", "page_start": 9, "page_end": 9, "type": "Text", "text": "Empirically, MACSIM achieves state-of-the-art results on challenging scheduling and routing benchmarks, consistently improving solution quality. By leveraging the structural symmetries of multi-agent problems, our approach enhances both the performance and scalability of neural solvers, making self-improvement practical for complex, real-world optimization tasks. Overall, MACSIM advances self-improvement for multi-agent CO by unifying joint-action modeling and symmetry-aware learning, yielding a more coordinated, generalizable, and practical solver.", "source": "marker_v2", "marker_block_id": "/page/8/Text/10"}
67
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0066", "section": "6 Conclusion", "page_start": 9, "page_end": 9, "type": "Text", "text": "Limitations and Future Work. Although MACSIM substantially improves inference and training time (see Figure 6 for training times) compared to standard self-improvement, its reliance on step-wise encoding results in slower generation than some lightweight neural solvers, which may hinder applicability in latency-critical settings. Future work will therefore focus on further reducing generation latency through more efficient policy architectures. A promising direction is to encode and cache the initial problem state once, and then incrementally update embeddings as the state evolves, rather than re-encoding the entire graph at each step. This strategy could retain MACSIM's ability to leverage multi-agent symmetries while reducing both memory and computational overhead.", "source": "marker_v2", "marker_block_id": "/page/8/Text/11"}
iclr26/6KrETIaOYD/marker_meta.json ADDED
@@ -0,0 +1,3413 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "table_of_contents": [
3
+ {
4
+ "title": "MULTI-ACTION SELF-IMPROVEMENT FOR NEURAL\nCOMBINATORIAL OPTIMIZATION",
5
+ "heading_level": null,
6
+ "page_id": 0,
7
+ "polygon": [
8
+ [
9
+ 106.3828125,
10
+ 80.05078125
11
+ ],
12
+ [
13
+ 503.5878601074219,
14
+ 80.05078125
15
+ ],
16
+ [
17
+ 503.5878601074219,
18
+ 117.63543701171875
19
+ ],
20
+ [
21
+ 106.3828125,
22
+ 117.63543701171875
23
+ ]
24
+ ]
25
+ },
26
+ {
27
+ "title": "ABSTRACT",
28
+ "heading_level": null,
29
+ "page_id": 0,
30
+ "polygon": [
31
+ [
32
+ 276.416015625,
33
+ 198.38671875
34
+ ],
35
+ [
36
+ 333.7221984863281,
37
+ 198.38671875
38
+ ],
39
+ [
40
+ 333.7221984863281,
41
+ 210.62847900390625
42
+ ],
43
+ [
44
+ 276.416015625,
45
+ 210.62847900390625
46
+ ]
47
+ ]
48
+ },
49
+ {
50
+ "title": "1 INTRODUCTION",
51
+ "heading_level": null,
52
+ "page_id": 0,
53
+ "polygon": [
54
+ [
55
+ 108.17578125,
56
+ 472.18359375
57
+ ],
58
+ [
59
+ 205.98886108398438,
60
+ 472.18359375
61
+ ],
62
+ [
63
+ 205.98886108398438,
64
+ 484.6602783203125
65
+ ],
66
+ [
67
+ 108.17578125,
68
+ 484.6602783203125
69
+ ]
70
+ ]
71
+ },
72
+ {
73
+ "title": "2 RELATED WORKS",
74
+ "heading_level": null,
75
+ "page_id": 1,
76
+ "polygon": [
77
+ [
78
+ 106.98046875,
79
+ 498.61395263671875
80
+ ],
81
+ [
82
+ 217.0968475341797,
83
+ 498.61395263671875
84
+ ],
85
+ [
86
+ 217.0968475341797,
87
+ 510.56915283203125
88
+ ],
89
+ [
90
+ 106.98046875,
91
+ 510.56915283203125
92
+ ]
93
+ ]
94
+ },
95
+ {
96
+ "title": "3 Preliminaries",
97
+ "heading_level": null,
98
+ "page_id": 2,
99
+ "polygon": [
100
+ [
101
+ 106.98046875,
102
+ 278.82421875
103
+ ],
104
+ [
105
+ 208.5,
106
+ 278.82421875
107
+ ],
108
+ [
109
+ 208.5,
110
+ 288.0
111
+ ],
112
+ [
113
+ 106.98046875,
114
+ 288.0
115
+ ]
116
+ ]
117
+ },
118
+ {
119
+ "title": "4 Multi-Action Self-Improvement",
120
+ "heading_level": null,
121
+ "page_id": 2,
122
+ "polygon": [
123
+ [
124
+ 107.578125,
125
+ 620.68359375
126
+ ],
127
+ [
128
+ 316.5,
129
+ 620.68359375
130
+ ],
131
+ [
132
+ 316.5,
133
+ 630.75
134
+ ],
135
+ [
136
+ 107.578125,
137
+ 630.75
138
+ ]
139
+ ]
140
+ },
141
+ {
142
+ "title": "4.1 Multi-Agent Policy",
143
+ "heading_level": null,
144
+ "page_id": 2,
145
+ "polygon": [
146
+ [
147
+ 106.5,
148
+ 645.43359375
149
+ ],
150
+ [
151
+ 231.0,
152
+ 645.43359375
153
+ ],
154
+ [
155
+ 231.0,
156
+ 654.75
157
+ ],
158
+ [
159
+ 106.5,
160
+ 654.75
161
+ ]
162
+ ]
163
+ },
164
+ {
165
+ "title": "4.2 Multi-Action Generation",
166
+ "heading_level": null,
167
+ "page_id": 3,
168
+ "polygon": [
169
+ [
170
+ 106.5,
171
+ 431.96484375
172
+ ],
173
+ [
174
+ 258.75,
175
+ 431.96484375
176
+ ],
177
+ [
178
+ 258.75,
179
+ 441.75
180
+ ],
181
+ [
182
+ 106.5,
183
+ 441.75
184
+ ]
185
+ ]
186
+ },
187
+ {
188
+ "title": "Algorithm 1 Joint Action Sampling from L",
189
+ "heading_level": null,
190
+ "page_id": 4,
191
+ "polygon": [
192
+ [
193
+ 303.609375,
194
+ 88.5
195
+ ],
196
+ [
197
+ 480.75,
198
+ 88.5
199
+ ],
200
+ [
201
+ 480.75,
202
+ 99.0
203
+ ],
204
+ [
205
+ 303.609375,
206
+ 99.0
207
+ ]
208
+ ]
209
+ },
210
+ {
211
+ "title": "4.3 SKIP TOKEN",
212
+ "heading_level": null,
213
+ "page_id": 4,
214
+ "polygon": [
215
+ [
216
+ 106.5,
217
+ 363.0
218
+ ],
219
+ [
220
+ 185.25,
221
+ 363.0
222
+ ],
223
+ [
224
+ 185.25,
225
+ 372.0
226
+ ],
227
+ [
228
+ 106.5,
229
+ 372.0
230
+ ]
231
+ ]
232
+ },
233
+ {
234
+ "title": "4.4 POLICY LEARNING",
235
+ "heading_level": null,
236
+ "page_id": 4,
237
+ "polygon": [
238
+ [
239
+ 106.5,
240
+ 573.75
241
+ ],
242
+ [
243
+ 213.75,
244
+ 573.75
245
+ ],
246
+ [
247
+ 213.75,
248
+ 582.78515625
249
+ ],
250
+ [
251
+ 106.5,
252
+ 582.78515625
253
+ ]
254
+ ]
255
+ },
256
+ {
257
+ "title": "5 EXPERIMENTS",
258
+ "heading_level": null,
259
+ "page_id": 5,
260
+ "polygon": [
261
+ [
262
+ 106.98046875,
263
+ 431.96484375
264
+ ],
265
+ [
266
+ 200.25,
267
+ 431.96484375
268
+ ],
269
+ [
270
+ 200.25,
271
+ 442.5
272
+ ],
273
+ [
274
+ 106.98046875,
275
+ 442.5
276
+ ]
277
+ ]
278
+ },
279
+ {
280
+ "title": "5.1 PROBLEMS",
281
+ "heading_level": null,
282
+ "page_id": 5,
283
+ "polygon": [
284
+ [
285
+ 106.083984375,
286
+ 534.05859375
287
+ ],
288
+ [
289
+ 179.25,
290
+ 534.05859375
291
+ ],
292
+ [
293
+ 179.25,
294
+ 544.5
295
+ ],
296
+ [
297
+ 106.083984375,
298
+ 544.5
299
+ ]
300
+ ]
301
+ },
302
+ {
303
+ "title": "5.2 EXPERIMENTAL RESULTS",
304
+ "heading_level": null,
305
+ "page_id": 6,
306
+ "polygon": [
307
+ [
308
+ 106.681640625,
309
+ 361.58203125
310
+ ],
311
+ [
312
+ 240.22686767578125,
313
+ 361.58203125
314
+ ],
315
+ [
316
+ 240.22686767578125,
317
+ 372.0228576660156
318
+ ],
319
+ [
320
+ 106.681640625,
321
+ 372.0228576660156
322
+ ]
323
+ ]
324
+ },
325
+ {
326
+ "title": "6 Conclusion",
327
+ "heading_level": null,
328
+ "page_id": 8,
329
+ "polygon": [
330
+ [
331
+ 107.578125,
332
+ 425.77734375
333
+ ],
334
+ [
335
+ 195.75,
336
+ 425.77734375
337
+ ],
338
+ [
339
+ 195.75,
340
+ 435.75
341
+ ],
342
+ [
343
+ 107.578125,
344
+ 435.75
345
+ ]
346
+ ]
347
+ },
348
+ {
349
+ "title": "REPRODUCIBILITY STATEMENT",
350
+ "heading_level": null,
351
+ "page_id": 9,
352
+ "polygon": [
353
+ [
354
+ 106.98046875,
355
+ 82.37109375
356
+ ],
357
+ [
358
+ 268.34765625,
359
+ 82.37109375
360
+ ],
361
+ [
362
+ 268.34765625,
363
+ 94.7125244140625
364
+ ],
365
+ [
366
+ 106.98046875,
367
+ 94.7125244140625
368
+ ]
369
+ ]
370
+ },
371
+ {
372
+ "title": "REFERENCES",
373
+ "heading_level": null,
374
+ "page_id": 9,
375
+ "polygon": [
376
+ [
377
+ 107.876953125,
378
+ 199.93359375
379
+ ],
380
+ [
381
+ 175.2598419189453,
382
+ 199.93359375
383
+ ],
384
+ [
385
+ 175.2598419189453,
386
+ 212.57745361328125
387
+ ],
388
+ [
389
+ 107.876953125,
390
+ 212.57745361328125
391
+ ]
392
+ ]
393
+ },
394
+ {
395
+ "title": "A PROOF OF PROPOSITION 1",
396
+ "heading_level": null,
397
+ "page_id": 13,
398
+ "polygon": [
399
+ [
400
+ 107.578125,
401
+ 81.59765625
402
+ ],
403
+ [
404
+ 261.0,
405
+ 81.59765625
406
+ ],
407
+ [
408
+ 261.0,
409
+ 92.25
410
+ ],
411
+ [
412
+ 107.578125,
413
+ 92.25
414
+ ]
415
+ ]
416
+ },
417
+ {
418
+ "title": "B MACSIM POLICY",
419
+ "heading_level": null,
420
+ "page_id": 14,
421
+ "polygon": [
422
+ [
423
+ 108.474609375,
424
+ 81.75
425
+ ],
426
+ [
427
+ 222.75,
428
+ 81.75
429
+ ],
430
+ [
431
+ 222.75,
432
+ 91.5
433
+ ],
434
+ [
435
+ 108.474609375,
436
+ 91.5
437
+ ]
438
+ ]
439
+ },
440
+ {
441
+ "title": "C PROBLEM DEFINITIONS",
442
+ "heading_level": null,
443
+ "page_id": 15,
444
+ "polygon": [
445
+ [
446
+ 106.3828125,
447
+ 254.07421875
448
+ ],
449
+ [
450
+ 249.0,
451
+ 254.07421875
452
+ ],
453
+ [
454
+ 249.0,
455
+ 264.0
456
+ ],
457
+ [
458
+ 106.3828125,
459
+ 264.0
460
+ ]
461
+ ]
462
+ },
463
+ {
464
+ "title": "C.1 FLEXIBLE JOB SHOP SCHEDULING PROBLEM",
465
+ "heading_level": null,
466
+ "page_id": 15,
467
+ "polygon": [
468
+ [
469
+ 107.578125,
470
+ 280.7578125
471
+ ],
472
+ [
473
+ 325.125,
474
+ 280.7578125
475
+ ],
476
+ [
477
+ 325.125,
478
+ 290.25
479
+ ],
480
+ [
481
+ 107.578125,
482
+ 290.25
483
+ ]
484
+ ]
485
+ },
486
+ {
487
+ "title": "C.1.1 MATHEMATICAL MODEL",
488
+ "heading_level": null,
489
+ "page_id": 15,
490
+ "polygon": [
491
+ [
492
+ 106.5,
493
+ 453.62109375
494
+ ],
495
+ [
496
+ 248.25,
497
+ 453.62109375
498
+ ],
499
+ [
500
+ 248.25,
501
+ 462.75
502
+ ],
503
+ [
504
+ 106.5,
505
+ 462.75
506
+ ]
507
+ ]
508
+ },
509
+ {
510
+ "title": "Indices",
511
+ "heading_level": null,
512
+ "page_id": 15,
513
+ "polygon": [
514
+ [
515
+ 106.5,
516
+ 510.75
517
+ ],
518
+ [
519
+ 138.75,
520
+ 510.75
521
+ ],
522
+ [
523
+ 138.75,
524
+ 520.91015625
525
+ ],
526
+ [
527
+ 106.5,
528
+ 520.91015625
529
+ ]
530
+ ]
531
+ },
532
+ {
533
+ "title": "Parameters",
534
+ "heading_level": null,
535
+ "page_id": 15,
536
+ "polygon": [
537
+ [
538
+ 106.5,
539
+ 564.99609375
540
+ ],
541
+ [
542
+ 157.5,
543
+ 564.99609375
544
+ ],
545
+ [
546
+ 157.5,
547
+ 574.5
548
+ ],
549
+ [
550
+ 106.5,
551
+ 574.5
552
+ ]
553
+ ]
554
+ },
555
+ {
556
+ "title": "Decision variables",
557
+ "heading_level": null,
558
+ "page_id": 15,
559
+ "polygon": [
560
+ [
561
+ 106.083984375,
562
+ 651.62109375
563
+ ],
564
+ [
565
+ 186.0,
566
+ 651.62109375
567
+ ],
568
+ [
569
+ 186.0,
570
+ 661.5
571
+ ],
572
+ [
573
+ 106.083984375,
574
+ 661.5
575
+ ]
576
+ ]
577
+ },
578
+ {
579
+ "title": "C.1.2 MULTI-AGENT MDP",
580
+ "heading_level": null,
581
+ "page_id": 16,
582
+ "polygon": [
583
+ [
584
+ 106.5,
585
+ 444.33984375
586
+ ],
587
+ [
588
+ 231.0,
589
+ 444.33984375
590
+ ],
591
+ [
592
+ 231.0,
593
+ 453.75
594
+ ],
595
+ [
596
+ 106.5,
597
+ 453.75
598
+ ]
599
+ ]
600
+ },
601
+ {
602
+ "title": "C.2 FLEXIBLE FLOW SHOP PROBLEM",
603
+ "heading_level": null,
604
+ "page_id": 16,
605
+ "polygon": [
606
+ [
607
+ 106.5,
608
+ 579.75
609
+ ],
610
+ [
611
+ 275.25,
612
+ 579.75
613
+ ],
614
+ [
615
+ 275.25,
616
+ 588.97265625
617
+ ],
618
+ [
619
+ 106.5,
620
+ 588.97265625
621
+ ]
622
+ ]
623
+ },
624
+ {
625
+ "title": "C.2.1 MATHEMATICAL MODEL",
626
+ "heading_level": null,
627
+ "page_id": 17,
628
+ "polygon": [
629
+ [
630
+ 106.98046875,
631
+ 82.37109375
632
+ ],
633
+ [
634
+ 247.40374755859375,
635
+ 82.37109375
636
+ ],
637
+ [
638
+ 247.40374755859375,
639
+ 94.2310791015625
640
+ ],
641
+ [
642
+ 106.98046875,
643
+ 94.2310791015625
644
+ ]
645
+ ]
646
+ },
647
+ {
648
+ "title": "Indices",
649
+ "heading_level": null,
650
+ "page_id": 17,
651
+ "polygon": [
652
+ [
653
+ 106.98046875,
654
+ 123.36328125
655
+ ],
656
+ [
657
+ 138.44569396972656,
658
+ 123.36328125
659
+ ],
660
+ [
661
+ 138.44569396972656,
662
+ 134.47308349609375
663
+ ],
664
+ [
665
+ 106.98046875,
666
+ 134.47308349609375
667
+ ]
668
+ ]
669
+ },
670
+ {
671
+ "title": "Parameters",
672
+ "heading_level": null,
673
+ "page_id": 17,
674
+ "polygon": [
675
+ [
676
+ 106.3828125,
677
+ 178.6640625
678
+ ],
679
+ [
680
+ 157.13552856445312,
681
+ 178.6640625
682
+ ],
683
+ [
684
+ 157.13552856445312,
685
+ 189.26800537109375
686
+ ],
687
+ [
688
+ 106.3828125,
689
+ 189.26800537109375
690
+ ]
691
+ ]
692
+ },
693
+ {
694
+ "title": "Decision variables",
695
+ "heading_level": null,
696
+ "page_id": 17,
697
+ "polygon": [
698
+ [
699
+ 106.681640625,
700
+ 255.62109375
701
+ ],
702
+ [
703
+ 185.11050415039062,
704
+ 255.62109375
705
+ ],
706
+ [
707
+ 185.11050415039062,
708
+ 265.97991943359375
709
+ ],
710
+ [
711
+ 106.681640625,
712
+ 265.97991943359375
713
+ ]
714
+ ]
715
+ },
716
+ {
717
+ "title": "Objective:",
718
+ "heading_level": null,
719
+ "page_id": 17,
720
+ "polygon": [
721
+ [
722
+ 107.279296875,
723
+ 346.5
724
+ ],
725
+ [
726
+ 152.06451416015625,
727
+ 346.5
728
+ ],
729
+ [
730
+ 152.06451416015625,
731
+ 356.8379211425781
732
+ ],
733
+ [
734
+ 107.279296875,
735
+ 356.8379211425781
736
+ ]
737
+ ]
738
+ },
739
+ {
740
+ "title": "Subject to:",
741
+ "heading_level": null,
742
+ "page_id": 17,
743
+ "polygon": [
744
+ [
745
+ 106.083984375,
746
+ 409.27532958984375
747
+ ],
748
+ [
749
+ 154.20651245117188,
750
+ 409.27532958984375
751
+ ],
752
+ [
753
+ 154.20651245117188,
754
+ 419.2379150390625
755
+ ],
756
+ [
757
+ 106.083984375,
758
+ 419.2379150390625
759
+ ]
760
+ ]
761
+ },
762
+ {
763
+ "title": "C.2.2 Multi-Agent MDP",
764
+ "heading_level": null,
765
+ "page_id": 18,
766
+ "polygon": [
767
+ [
768
+ 106.5,
769
+ 266.8359375
770
+ ],
771
+ [
772
+ 231.75,
773
+ 266.8359375
774
+ ],
775
+ [
776
+ 231.75,
777
+ 274.5703125
778
+ ],
779
+ [
780
+ 106.5,
781
+ 274.5703125
782
+ ]
783
+ ]
784
+ },
785
+ {
786
+ "title": "C.3 MIN-MAX HETEROGENEOUS CAPACITATED VEHICLE ROUTING PROBLEM",
787
+ "heading_level": null,
788
+ "page_id": 18,
789
+ "polygon": [
790
+ [
791
+ 106.3828125,
792
+ 397.5
793
+ ],
794
+ [
795
+ 448.5,
796
+ 397.5
797
+ ],
798
+ [
799
+ 448.5,
800
+ 406.5
801
+ ],
802
+ [
803
+ 106.3828125,
804
+ 406.5
805
+ ]
806
+ ]
807
+ },
808
+ {
809
+ "title": "C.3.1 MATHEMATICAL MODEL",
810
+ "heading_level": null,
811
+ "page_id": 18,
812
+ "polygon": [
813
+ [
814
+ 106.5,
815
+ 527.87109375
816
+ ],
817
+ [
818
+ 248.25,
819
+ 527.87109375
820
+ ],
821
+ [
822
+ 248.25,
823
+ 537.75
824
+ ],
825
+ [
826
+ 106.5,
827
+ 537.75
828
+ ]
829
+ ]
830
+ },
831
+ {
832
+ "title": "Indices",
833
+ "heading_level": null,
834
+ "page_id": 18,
835
+ "polygon": [
836
+ [
837
+ 106.5,
838
+ 577.37109375
839
+ ],
840
+ [
841
+ 139.5,
842
+ 577.37109375
843
+ ],
844
+ [
845
+ 139.5,
846
+ 588.0
847
+ ],
848
+ [
849
+ 106.5,
850
+ 588.0
851
+ ]
852
+ ]
853
+ },
854
+ {
855
+ "title": "Sets",
856
+ "heading_level": null,
857
+ "page_id": 18,
858
+ "polygon": [
859
+ [
860
+ 106.5,
861
+ 623.25
862
+ ],
863
+ [
864
+ 126.0,
865
+ 623.25
866
+ ],
867
+ [
868
+ 126.0,
869
+ 632.28515625
870
+ ],
871
+ [
872
+ 106.5,
873
+ 632.28515625
874
+ ]
875
+ ]
876
+ },
877
+ {
878
+ "title": "Parameters",
879
+ "heading_level": null,
880
+ "page_id": 18,
881
+ "polygon": [
882
+ [
883
+ 106.5,
884
+ 676.37109375
885
+ ],
886
+ [
887
+ 159.0,
888
+ 676.37109375
889
+ ],
890
+ [
891
+ 159.0,
892
+ 687.0
893
+ ],
894
+ [
895
+ 106.5,
896
+ 687.0
897
+ ]
898
+ ]
899
+ },
900
+ {
901
+ "title": "Decision variables",
902
+ "heading_level": null,
903
+ "page_id": 19,
904
+ "polygon": [
905
+ [
906
+ 106.681640625,
907
+ 82.7578125
908
+ ],
909
+ [
910
+ 186.0,
911
+ 82.7578125
912
+ ],
913
+ [
914
+ 186.0,
915
+ 92.25
916
+ ],
917
+ [
918
+ 106.681640625,
919
+ 92.25
920
+ ]
921
+ ]
922
+ },
923
+ {
924
+ "title": "Objective:",
925
+ "heading_level": null,
926
+ "page_id": 19,
927
+ "polygon": [
928
+ [
929
+ 106.681640625,
930
+ 172.4765625
931
+ ],
932
+ [
933
+ 152.25,
934
+ 172.4765625
935
+ ],
936
+ [
937
+ 152.25,
938
+ 181.7578125
939
+ ],
940
+ [
941
+ 106.681640625,
942
+ 181.7578125
943
+ ]
944
+ ]
945
+ },
946
+ {
947
+ "title": "Subject to:",
948
+ "heading_level": null,
949
+ "page_id": 19,
950
+ "polygon": [
951
+ [
952
+ 106.083984375,
953
+ 239.765625
954
+ ],
955
+ [
956
+ 154.5,
957
+ 239.765625
958
+ ],
959
+ [
960
+ 154.5,
961
+ 249.046875
962
+ ],
963
+ [
964
+ 106.083984375,
965
+ 249.046875
966
+ ]
967
+ ]
968
+ },
969
+ {
970
+ "title": "C.3.2 MULTI-AGENT MDP",
971
+ "heading_level": null,
972
+ "page_id": 19,
973
+ "polygon": [
974
+ [
975
+ 106.083984375,
976
+ 613.5
977
+ ],
978
+ [
979
+ 231.0,
980
+ 613.5
981
+ ],
982
+ [
983
+ 231.0,
984
+ 623.00390625
985
+ ],
986
+ [
987
+ 106.083984375,
988
+ 623.00390625
989
+ ]
990
+ ]
991
+ },
992
+ {
993
+ "title": "D More Experiments",
994
+ "heading_level": null,
995
+ "page_id": 20,
996
+ "polygon": [
997
+ [
998
+ 107.578125,
999
+ 240.15234375
1000
+ ],
1001
+ [
1002
+ 238.5,
1003
+ 240.15234375
1004
+ ],
1005
+ [
1006
+ 238.5,
1007
+ 249.0
1008
+ ],
1009
+ [
1010
+ 107.578125,
1011
+ 249.0
1012
+ ]
1013
+ ]
1014
+ },
1015
+ {
1016
+ "title": "D.1 PUBLIC BENCHMARK DATASET FOR FJSP",
1017
+ "heading_level": null,
1018
+ "page_id": 20,
1019
+ "polygon": [
1020
+ [
1021
+ 106.5,
1022
+ 264.0
1023
+ ],
1024
+ [
1025
+ 312.0,
1026
+ 264.0
1027
+ ],
1028
+ [
1029
+ 312.0,
1030
+ 273.0234375
1031
+ ],
1032
+ [
1033
+ 106.5,
1034
+ 273.0234375
1035
+ ]
1036
+ ]
1037
+ },
1038
+ {
1039
+ "title": "D.2 INCREASING THE NUMBER OF AGENTS IN FFSP",
1040
+ "heading_level": null,
1041
+ "page_id": 20,
1042
+ "polygon": [
1043
+ [
1044
+ 106.5,
1045
+ 475.27734375
1046
+ ],
1047
+ [
1048
+ 336.75,
1049
+ 475.27734375
1050
+ ],
1051
+ [
1052
+ 336.75,
1053
+ 483.78515625
1054
+ ],
1055
+ [
1056
+ 106.5,
1057
+ 483.78515625
1058
+ ]
1059
+ ]
1060
+ },
1061
+ {
1062
+ "title": "D.3 ANALYSIS OF THE SKIP TOKEN",
1063
+ "heading_level": null,
1064
+ "page_id": 20,
1065
+ "polygon": [
1066
+ [
1067
+ 106.5,
1068
+ 595.93359375
1069
+ ],
1070
+ [
1071
+ 267.75,
1072
+ 595.93359375
1073
+ ],
1074
+ [
1075
+ 267.75,
1076
+ 606.0
1077
+ ],
1078
+ [
1079
+ 106.5,
1080
+ 605.25
1081
+ ]
1082
+ ]
1083
+ },
1084
+ {
1085
+ "title": "D.4 TRAINING DYNAMICS ANALYSIS",
1086
+ "heading_level": null,
1087
+ "page_id": 21,
1088
+ "polygon": [
1089
+ [
1090
+ 106.5,
1091
+ 561.90234375
1092
+ ],
1093
+ [
1094
+ 273.75,
1095
+ 561.90234375
1096
+ ],
1097
+ [
1098
+ 273.75,
1099
+ 571.5
1100
+ ],
1101
+ [
1102
+ 106.5,
1103
+ 571.5
1104
+ ]
1105
+ ]
1106
+ },
1107
+ {
1108
+ "title": "D.5 SCALABILITY ANALYSIS",
1109
+ "heading_level": null,
1110
+ "page_id": 22,
1111
+ "polygon": [
1112
+ [
1113
+ 106.3828125,
1114
+ 273.0234375
1115
+ ],
1116
+ [
1117
+ 239.25,
1118
+ 273.0234375
1119
+ ],
1120
+ [
1121
+ 239.25,
1122
+ 282.75
1123
+ ],
1124
+ [
1125
+ 106.3828125,
1126
+ 282.75
1127
+ ]
1128
+ ]
1129
+ },
1130
+ {
1131
+ "title": "D.6 RUNTIME PROFILING AND EFFICIENCY ANALYSIS",
1132
+ "heading_level": null,
1133
+ "page_id": 23,
1134
+ "polygon": [
1135
+ [
1136
+ 107.578125,
1137
+ 361.1953125
1138
+ ],
1139
+ [
1140
+ 344.55670166015625,
1141
+ 361.1953125
1142
+ ],
1143
+ [
1144
+ 344.55670166015625,
1145
+ 371.6809387207031
1146
+ ],
1147
+ [
1148
+ 107.578125,
1149
+ 371.6809387207031
1150
+ ]
1151
+ ]
1152
+ },
1153
+ {
1154
+ "title": "E Loss Function Gradient Analysis",
1155
+ "heading_level": null,
1156
+ "page_id": 24,
1157
+ "polygon": [
1158
+ [
1159
+ 108.17578125,
1160
+ 168.0
1161
+ ],
1162
+ [
1163
+ 326.25,
1164
+ 168.0
1165
+ ],
1166
+ [
1167
+ 326.25,
1168
+ 177.0
1169
+ ],
1170
+ [
1171
+ 108.17578125,
1172
+ 177.0
1173
+ ]
1174
+ ]
1175
+ },
1176
+ {
1177
+ "title": "E.1 SINGLE-AGENT CROSS-ENTROPY LOSS",
1178
+ "heading_level": null,
1179
+ "page_id": 24,
1180
+ "polygon": [
1181
+ [
1182
+ 106.3828125,
1183
+ 274.5
1184
+ ],
1185
+ [
1186
+ 300.75,
1187
+ 274.5
1188
+ ],
1189
+ [
1190
+ 300.75,
1191
+ 283.5
1192
+ ],
1193
+ [
1194
+ 106.3828125,
1195
+ 283.5
1196
+ ]
1197
+ ]
1198
+ },
1199
+ {
1200
+ "title": "E.2 MLE Loss",
1201
+ "heading_level": null,
1202
+ "page_id": 24,
1203
+ "polygon": [
1204
+ [
1205
+ 106.5,
1206
+ 676.37109375
1207
+ ],
1208
+ [
1209
+ 181.5,
1210
+ 676.37109375
1211
+ ],
1212
+ [
1213
+ 181.5,
1214
+ 687.0
1215
+ ],
1216
+ [
1217
+ 106.5,
1218
+ 687.0
1219
+ ]
1220
+ ]
1221
+ },
1222
+ {
1223
+ "title": "E.3 PLACKETT-LUCE LOSS",
1224
+ "heading_level": null,
1225
+ "page_id": 25,
1226
+ "polygon": [
1227
+ [
1228
+ 106.5,
1229
+ 222.75
1230
+ ],
1231
+ [
1232
+ 231.0,
1233
+ 222.75
1234
+ ],
1235
+ [
1236
+ 231.0,
1237
+ 231.75
1238
+ ],
1239
+ [
1240
+ 106.5,
1241
+ 231.75
1242
+ ]
1243
+ ]
1244
+ },
1245
+ {
1246
+ "title": "E.4 SET CROSS-ENTROPY LOSS",
1247
+ "heading_level": null,
1248
+ "page_id": 25,
1249
+ "polygon": [
1250
+ [
1251
+ 106.681640625,
1252
+ 462.75
1253
+ ],
1254
+ [
1255
+ 250.5,
1256
+ 462.75
1257
+ ],
1258
+ [
1259
+ 250.5,
1260
+ 471.75
1261
+ ],
1262
+ [
1263
+ 106.681640625,
1264
+ 471.75
1265
+ ]
1266
+ ]
1267
+ },
1268
+ {
1269
+ "title": "F THEORETICAL JUSTIFICATION FOR SET-BASED LOSS IN MACSIM",
1270
+ "heading_level": null,
1271
+ "page_id": 25,
1272
+ "polygon": [
1273
+ [
1274
+ 107.25,
1275
+ 654.71484375
1276
+ ],
1277
+ [
1278
+ 465.0,
1279
+ 654.71484375
1280
+ ],
1281
+ [
1282
+ 465.0,
1283
+ 665.25
1284
+ ],
1285
+ [
1286
+ 107.25,
1287
+ 665.25
1288
+ ]
1289
+ ]
1290
+ },
1291
+ {
1292
+ "title": "F.1 Training-Inference Mismatch",
1293
+ "heading_level": null,
1294
+ "page_id": 25,
1295
+ "polygon": [
1296
+ [
1297
+ 107.578125,
1298
+ 679.46484375
1299
+ ],
1300
+ [
1301
+ 279.0,
1302
+ 679.46484375
1303
+ ],
1304
+ [
1305
+ 279.0,
1306
+ 687.97265625
1307
+ ],
1308
+ [
1309
+ 107.578125,
1310
+ 687.97265625
1311
+ ]
1312
+ ]
1313
+ },
1314
+ {
1315
+ "title": "F.2 FORMAL JUSTIFICATION FOR THE SURROGATE LOSS",
1316
+ "heading_level": null,
1317
+ "page_id": 26,
1318
+ "polygon": [
1319
+ [
1320
+ 106.5,
1321
+ 263.25
1322
+ ],
1323
+ [
1324
+ 354.75,
1325
+ 263.25
1326
+ ],
1327
+ [
1328
+ 354.75,
1329
+ 272.25
1330
+ ],
1331
+ [
1332
+ 106.5,
1333
+ 272.25
1334
+ ]
1335
+ ]
1336
+ },
1337
+ {
1338
+ "title": "Part 1: Proof of the Upper Bound.",
1339
+ "heading_level": null,
1340
+ "page_id": 26,
1341
+ "polygon": [
1342
+ [
1343
+ 106.5,
1344
+ 668.25
1345
+ ],
1346
+ [
1347
+ 254.25,
1348
+ 668.25
1349
+ ],
1350
+ [
1351
+ 254.25,
1352
+ 678.69140625
1353
+ ],
1354
+ [
1355
+ 106.5,
1356
+ 678.69140625
1357
+ ]
1358
+ ]
1359
+ },
1360
+ {
1361
+ "title": "Part 2: Proof of the Gap Bound.",
1362
+ "heading_level": null,
1363
+ "page_id": 27,
1364
+ "polygon": [
1365
+ [
1366
+ 106.5,
1367
+ 277.5
1368
+ ],
1369
+ [
1370
+ 244.5,
1371
+ 277.5
1372
+ ],
1373
+ [
1374
+ 244.5,
1375
+ 287.71875
1376
+ ],
1377
+ [
1378
+ 106.5,
1379
+ 287.71875
1380
+ ]
1381
+ ]
1382
+ },
1383
+ {
1384
+ "title": "G DISCUSSING THE INDEPENDENCE ASSUMPTION IN THE SET-BASED LOSS",
1385
+ "heading_level": null,
1386
+ "page_id": 28,
1387
+ "polygon": [
1388
+ [
1389
+ 108.7734375,
1390
+ 81.984375
1391
+ ],
1392
+ [
1393
+ 501.75,
1394
+ 81.984375
1395
+ ],
1396
+ [
1397
+ 501.75,
1398
+ 92.25
1399
+ ],
1400
+ [
1401
+ 108.7734375,
1402
+ 92.25
1403
+ ]
1404
+ ]
1405
+ },
1406
+ {
1407
+ "title": "G.1 MECHANISM 1: ARCHITECTURAL COUPLING",
1408
+ "heading_level": null,
1409
+ "page_id": 28,
1410
+ "polygon": [
1411
+ [
1412
+ 106.5,
1413
+ 269.25
1414
+ ],
1415
+ [
1416
+ 326.25,
1417
+ 269.25
1418
+ ],
1419
+ [
1420
+ 326.25,
1421
+ 278.25
1422
+ ],
1423
+ [
1424
+ 106.5,
1425
+ 278.25
1426
+ ]
1427
+ ]
1428
+ },
1429
+ {
1430
+ "title": "G.2 MECHANISM 2: IMPLICIT CONSTRAINT LEARNING VIA GRADIENT DYNAMICS",
1431
+ "heading_level": null,
1432
+ "page_id": 28,
1433
+ "polygon": [
1434
+ [
1435
+ 106.5,
1436
+ 425.77734375
1437
+ ],
1438
+ [
1439
+ 466.5,
1440
+ 425.77734375
1441
+ ],
1442
+ [
1443
+ 466.5,
1444
+ 435.0
1445
+ ],
1446
+ [
1447
+ 106.5,
1448
+ 435.0
1449
+ ]
1450
+ ]
1451
+ },
1452
+ {
1453
+ "title": "G.3 MECHANISM 3: INFERENCE-TIME CONSTRAINTS",
1454
+ "heading_level": null,
1455
+ "page_id": 29,
1456
+ "polygon": [
1457
+ [
1458
+ 106.5,
1459
+ 342.6328125
1460
+ ],
1461
+ [
1462
+ 342.75,
1463
+ 342.6328125
1464
+ ],
1465
+ [
1466
+ 342.75,
1467
+ 351.75
1468
+ ],
1469
+ [
1470
+ 106.5,
1471
+ 351.75
1472
+ ]
1473
+ ]
1474
+ },
1475
+ {
1476
+ "title": "H EXPERIMENTAL DETAILS AND RESOURCES",
1477
+ "heading_level": null,
1478
+ "page_id": 29,
1479
+ "polygon": [
1480
+ [
1481
+ 108.17578125,
1482
+ 539.25
1483
+ ],
1484
+ [
1485
+ 348.75,
1486
+ 539.25
1487
+ ],
1488
+ [
1489
+ 348.75,
1490
+ 549.0
1491
+ ],
1492
+ [
1493
+ 108.17578125,
1494
+ 549.0
1495
+ ]
1496
+ ]
1497
+ },
1498
+ {
1499
+ "title": "H.1 FJSP",
1500
+ "heading_level": null,
1501
+ "page_id": 29,
1502
+ "polygon": [
1503
+ [
1504
+ 106.5,
1505
+ 563.25
1506
+ ],
1507
+ [
1508
+ 157.5,
1509
+ 563.25
1510
+ ],
1511
+ [
1512
+ 157.5,
1513
+ 573.50390625
1514
+ ],
1515
+ [
1516
+ 106.5,
1517
+ 573.50390625
1518
+ ]
1519
+ ]
1520
+ },
1521
+ {
1522
+ "title": "H.1.1 HYPERPARAMETERS",
1523
+ "heading_level": null,
1524
+ "page_id": 29,
1525
+ "polygon": [
1526
+ [
1527
+ 106.5,
1528
+ 580.46484375
1529
+ ],
1530
+ [
1531
+ 230.25,
1532
+ 580.46484375
1533
+ ],
1534
+ [
1535
+ 230.25,
1536
+ 592.5
1537
+ ],
1538
+ [
1539
+ 106.5,
1540
+ 592.5
1541
+ ]
1542
+ ]
1543
+ },
1544
+ {
1545
+ "title": "H.1.2 DATASETS",
1546
+ "heading_level": null,
1547
+ "page_id": 29,
1548
+ "polygon": [
1549
+ [
1550
+ 106.5,
1551
+ 691.83984375
1552
+ ],
1553
+ [
1554
+ 187.5,
1555
+ 691.83984375
1556
+ ],
1557
+ [
1558
+ 187.5,
1559
+ 700.5
1560
+ ],
1561
+ [
1562
+ 106.5,
1563
+ 700.5
1564
+ ]
1565
+ ]
1566
+ },
1567
+ {
1568
+ "title": "H.2 FFSP",
1569
+ "heading_level": null,
1570
+ "page_id": 30,
1571
+ "polygon": [
1572
+ [
1573
+ 106.681640625,
1574
+ 138.05859375
1575
+ ],
1576
+ [
1577
+ 158.0221405029297,
1578
+ 138.05859375
1579
+ ],
1580
+ [
1581
+ 158.0221405029297,
1582
+ 148.03802490234375
1583
+ ],
1584
+ [
1585
+ 106.681640625,
1586
+ 148.03802490234375
1587
+ ]
1588
+ ]
1589
+ },
1590
+ {
1591
+ "title": "H.2.1 HYPERPARAMETERS",
1592
+ "heading_level": null,
1593
+ "page_id": 30,
1594
+ "polygon": [
1595
+ [
1596
+ 107.876953125,
1597
+ 160.1015625
1598
+ ],
1599
+ [
1600
+ 229.25865173339844,
1601
+ 160.1015625
1602
+ ],
1603
+ [
1604
+ 229.25865173339844,
1605
+ 171.31402587890625
1606
+ ],
1607
+ [
1608
+ 107.876953125,
1609
+ 171.31402587890625
1610
+ ]
1611
+ ]
1612
+ },
1613
+ {
1614
+ "title": "H.2.2 DATASETS",
1615
+ "heading_level": null,
1616
+ "page_id": 30,
1617
+ "polygon": [
1618
+ [
1619
+ 106.083984375,
1620
+ 290.42578125
1621
+ ],
1622
+ [
1623
+ 186.475830078125,
1624
+ 290.42578125
1625
+ ],
1626
+ [
1627
+ 186.475830078125,
1628
+ 300.5010070800781
1629
+ ],
1630
+ [
1631
+ 106.083984375,
1632
+ 300.5010070800781
1633
+ ]
1634
+ ]
1635
+ },
1636
+ {
1637
+ "title": "H.3 HCVRP",
1638
+ "heading_level": null,
1639
+ "page_id": 30,
1640
+ "polygon": [
1641
+ [
1642
+ 107.279296875,
1643
+ 472.18359375
1644
+ ],
1645
+ [
1646
+ 169.5787353515625,
1647
+ 472.18359375
1648
+ ],
1649
+ [
1650
+ 169.5787353515625,
1651
+ 483.49493408203125
1652
+ ],
1653
+ [
1654
+ 107.279296875,
1655
+ 483.49493408203125
1656
+ ]
1657
+ ]
1658
+ },
1659
+ {
1660
+ "title": "H.3.1 HYPERPARAMETERS",
1661
+ "heading_level": null,
1662
+ "page_id": 30,
1663
+ "polygon": [
1664
+ [
1665
+ 106.98046875,
1666
+ 496.8083190917969
1667
+ ],
1668
+ [
1669
+ 229.2586212158203,
1670
+ 496.8083190917969
1671
+ ],
1672
+ [
1673
+ 229.2586212158203,
1674
+ 506.77093505859375
1675
+ ],
1676
+ [
1677
+ 106.98046875,
1678
+ 506.77093505859375
1679
+ ]
1680
+ ]
1681
+ },
1682
+ {
1683
+ "title": "H.3.2 DATASETS",
1684
+ "heading_level": null,
1685
+ "page_id": 30,
1686
+ "polygon": [
1687
+ [
1688
+ 107.279296875,
1689
+ 604.0773315429688
1690
+ ],
1691
+ [
1692
+ 186.4757843017578,
1693
+ 604.0773315429688
1694
+ ],
1695
+ [
1696
+ 186.4757843017578,
1697
+ 614.0399322509766
1698
+ ],
1699
+ [
1700
+ 107.279296875,
1701
+ 614.0399322509766
1702
+ ]
1703
+ ]
1704
+ },
1705
+ {
1706
+ "title": "H.4 HARDWARE AND SOFTWARE",
1707
+ "heading_level": null,
1708
+ "page_id": 31,
1709
+ "polygon": [
1710
+ [
1711
+ 108.17578125,
1712
+ 83.14453125
1713
+ ],
1714
+ [
1715
+ 254.8540496826172,
1716
+ 83.14453125
1717
+ ],
1718
+ [
1719
+ 254.8540496826172,
1720
+ 94.2310791015625
1721
+ ],
1722
+ [
1723
+ 108.17578125,
1724
+ 94.2310791015625
1725
+ ]
1726
+ ]
1727
+ },
1728
+ {
1729
+ "title": "H.4.1 HARDWARE",
1730
+ "heading_level": null,
1731
+ "page_id": 31,
1732
+ "polygon": [
1733
+ [
1734
+ 107.578125,
1735
+ 104.79150390625
1736
+ ],
1737
+ [
1738
+ 192.57228088378906,
1739
+ 104.79150390625
1740
+ ],
1741
+ [
1742
+ 192.57228088378906,
1743
+ 114.75408935546875
1744
+ ],
1745
+ [
1746
+ 107.578125,
1747
+ 114.75408935546875
1748
+ ]
1749
+ ]
1750
+ },
1751
+ {
1752
+ "title": "H.4.2 SOFTWARE",
1753
+ "heading_level": null,
1754
+ "page_id": 31,
1755
+ "polygon": [
1756
+ [
1757
+ 107.578125,
1758
+ 158.16796875
1759
+ ],
1760
+ [
1761
+ 189.38107299804688,
1762
+ 158.16796875
1763
+ ],
1764
+ [
1765
+ 189.38107299804688,
1766
+ 168.55303955078125
1767
+ ],
1768
+ [
1769
+ 107.578125,
1770
+ 168.55303955078125
1771
+ ]
1772
+ ]
1773
+ },
1774
+ {
1775
+ "title": "H.5 USE OF LARGE LANGUAGE MODELS",
1776
+ "heading_level": null,
1777
+ "page_id": 31,
1778
+ "polygon": [
1779
+ [
1780
+ 107.578125,
1781
+ 234.73828125
1782
+ ],
1783
+ [
1784
+ 289.5093078613281,
1785
+ 234.73828125
1786
+ ],
1787
+ [
1788
+ 289.5093078613281,
1789
+ 245.614013671875
1790
+ ],
1791
+ [
1792
+ 107.578125,
1793
+ 245.614013671875
1794
+ ]
1795
+ ]
1796
+ }
1797
+ ],
1798
+ "page_stats": [
1799
+ {
1800
+ "page_id": 0,
1801
+ "text_extraction_method": "pdftext",
1802
+ "block_counts": [
1803
+ [
1804
+ "Span",
1805
+ 165
1806
+ ],
1807
+ [
1808
+ "Line",
1809
+ 54
1810
+ ],
1811
+ [
1812
+ "Text",
1813
+ 8
1814
+ ],
1815
+ [
1816
+ "SectionHeader",
1817
+ 3
1818
+ ],
1819
+ [
1820
+ "PageHeader",
1821
+ 1
1822
+ ],
1823
+ [
1824
+ "PageFooter",
1825
+ 1
1826
+ ],
1827
+ [
1828
+ "Reference",
1829
+ 1
1830
+ ]
1831
+ ],
1832
+ "block_metadata": {
1833
+ "llm_request_count": 0,
1834
+ "llm_error_count": 0,
1835
+ "llm_tokens_used": 0,
1836
+ "previous_text": "",
1837
+ "previous_type": "",
1838
+ "previous_order": 0
1839
+ }
1840
+ },
1841
+ {
1842
+ "page_id": 1,
1843
+ "text_extraction_method": "pdftext",
1844
+ "block_counts": [
1845
+ [
1846
+ "Span",
1847
+ 218
1848
+ ],
1849
+ [
1850
+ "Line",
1851
+ 60
1852
+ ],
1853
+ [
1854
+ "Text",
1855
+ 6
1856
+ ],
1857
+ [
1858
+ "ListItem",
1859
+ 3
1860
+ ],
1861
+ [
1862
+ "PageHeader",
1863
+ 1
1864
+ ],
1865
+ [
1866
+ "Figure",
1867
+ 1
1868
+ ],
1869
+ [
1870
+ "Caption",
1871
+ 1
1872
+ ],
1873
+ [
1874
+ "SectionHeader",
1875
+ 1
1876
+ ],
1877
+ [
1878
+ "PageFooter",
1879
+ 1
1880
+ ],
1881
+ [
1882
+ "FigureGroup",
1883
+ 1
1884
+ ],
1885
+ [
1886
+ "ListGroup",
1887
+ 1
1888
+ ],
1889
+ [
1890
+ "Reference",
1891
+ 1
1892
+ ]
1893
+ ],
1894
+ "block_metadata": {
1895
+ "llm_request_count": 0,
1896
+ "llm_error_count": 0,
1897
+ "llm_tokens_used": 0,
1898
+ "previous_text": "",
1899
+ "previous_type": "",
1900
+ "previous_order": 0
1901
+ }
1902
+ },
1903
+ {
1904
+ "page_id": 2,
1905
+ "text_extraction_method": "surya",
1906
+ "block_counts": [
1907
+ [
1908
+ "Span",
1909
+ 102
1910
+ ],
1911
+ [
1912
+ "Line",
1913
+ 62
1914
+ ],
1915
+ [
1916
+ "Text",
1917
+ 7
1918
+ ],
1919
+ [
1920
+ "SectionHeader",
1921
+ 3
1922
+ ],
1923
+ [
1924
+ "PageHeader",
1925
+ 1
1926
+ ],
1927
+ [
1928
+ "PageFooter",
1929
+ 1
1930
+ ],
1931
+ [
1932
+ "Reference",
1933
+ 1
1934
+ ]
1935
+ ],
1936
+ "block_metadata": {
1937
+ "llm_request_count": 0,
1938
+ "llm_error_count": 0,
1939
+ "llm_tokens_used": 0,
1940
+ "previous_text": "",
1941
+ "previous_type": "",
1942
+ "previous_order": 0
1943
+ }
1944
+ },
1945
+ {
1946
+ "page_id": 3,
1947
+ "text_extraction_method": "surya",
1948
+ "block_counts": [
1949
+ [
1950
+ "Line",
1951
+ 69
1952
+ ],
1953
+ [
1954
+ "Span",
1955
+ 66
1956
+ ],
1957
+ [
1958
+ "Text",
1959
+ 6
1960
+ ],
1961
+ [
1962
+ "Reference",
1963
+ 3
1964
+ ],
1965
+ [
1966
+ "Equation",
1967
+ 2
1968
+ ],
1969
+ [
1970
+ "PageHeader",
1971
+ 1
1972
+ ],
1973
+ [
1974
+ "Figure",
1975
+ 1
1976
+ ],
1977
+ [
1978
+ "Caption",
1979
+ 1
1980
+ ],
1981
+ [
1982
+ "SectionHeader",
1983
+ 1
1984
+ ],
1985
+ [
1986
+ "Footnote",
1987
+ 1
1988
+ ],
1989
+ [
1990
+ "PageFooter",
1991
+ 1
1992
+ ],
1993
+ [
1994
+ "FigureGroup",
1995
+ 1
1996
+ ]
1997
+ ],
1998
+ "block_metadata": {
1999
+ "llm_request_count": 0,
2000
+ "llm_error_count": 0,
2001
+ "llm_tokens_used": 0,
2002
+ "previous_text": "",
2003
+ "previous_type": "",
2004
+ "previous_order": 0
2005
+ }
2006
+ },
2007
+ {
2008
+ "page_id": 4,
2009
+ "text_extraction_method": "surya",
2010
+ "block_counts": [
2011
+ [
2012
+ "Line",
2013
+ 78
2014
+ ],
2015
+ [
2016
+ "Span",
2017
+ 44
2018
+ ],
2019
+ [
2020
+ "Text",
2021
+ 10
2022
+ ],
2023
+ [
2024
+ "SectionHeader",
2025
+ 3
2026
+ ],
2027
+ [
2028
+ "Reference",
2029
+ 3
2030
+ ],
2031
+ [
2032
+ "Equation",
2033
+ 2
2034
+ ],
2035
+ [
2036
+ "PageHeader",
2037
+ 1
2038
+ ],
2039
+ [
2040
+ "PageFooter",
2041
+ 1
2042
+ ]
2043
+ ],
2044
+ "block_metadata": {
2045
+ "llm_request_count": 0,
2046
+ "llm_error_count": 0,
2047
+ "llm_tokens_used": 0,
2048
+ "previous_text": "",
2049
+ "previous_type": "",
2050
+ "previous_order": 0
2051
+ }
2052
+ },
2053
+ {
2054
+ "page_id": 5,
2055
+ "text_extraction_method": "surya",
2056
+ "block_counts": [
2057
+ [
2058
+ "Line",
2059
+ 61
2060
+ ],
2061
+ [
2062
+ "Span",
2063
+ 42
2064
+ ],
2065
+ [
2066
+ "Text",
2067
+ 7
2068
+ ],
2069
+ [
2070
+ "Equation",
2071
+ 2
2072
+ ],
2073
+ [
2074
+ "SectionHeader",
2075
+ 2
2076
+ ],
2077
+ [
2078
+ "PageHeader",
2079
+ 1
2080
+ ],
2081
+ [
2082
+ "Footnote",
2083
+ 1
2084
+ ],
2085
+ [
2086
+ "PageFooter",
2087
+ 1
2088
+ ],
2089
+ [
2090
+ "Reference",
2091
+ 1
2092
+ ]
2093
+ ],
2094
+ "block_metadata": {
2095
+ "llm_request_count": 0,
2096
+ "llm_error_count": 0,
2097
+ "llm_tokens_used": 0,
2098
+ "previous_text": "",
2099
+ "previous_type": "",
2100
+ "previous_order": 0
2101
+ }
2102
+ },
2103
+ {
2104
+ "page_id": 6,
2105
+ "text_extraction_method": "pdftext",
2106
+ "block_counts": [
2107
+ [
2108
+ "Span",
2109
+ 237
2110
+ ],
2111
+ [
2112
+ "Line",
2113
+ 53
2114
+ ],
2115
+ [
2116
+ "Text",
2117
+ 8
2118
+ ],
2119
+ [
2120
+ "PageHeader",
2121
+ 1
2122
+ ],
2123
+ [
2124
+ "SectionHeader",
2125
+ 1
2126
+ ],
2127
+ [
2128
+ "PageFooter",
2129
+ 1
2130
+ ]
2131
+ ],
2132
+ "block_metadata": {
2133
+ "llm_request_count": 0,
2134
+ "llm_error_count": 0,
2135
+ "llm_tokens_used": 0,
2136
+ "previous_text": "",
2137
+ "previous_type": "",
2138
+ "previous_order": 0
2139
+ }
2140
+ },
2141
+ {
2142
+ "page_id": 7,
2143
+ "text_extraction_method": "surya",
2144
+ "block_counts": [
2145
+ [
2146
+ "TableCell",
2147
+ 500
2148
+ ],
2149
+ [
2150
+ "Span",
2151
+ 12
2152
+ ],
2153
+ [
2154
+ "Line",
2155
+ 11
2156
+ ],
2157
+ [
2158
+ "Caption",
2159
+ 2
2160
+ ],
2161
+ [
2162
+ "Reference",
2163
+ 2
2164
+ ],
2165
+ [
2166
+ "PageHeader",
2167
+ 1
2168
+ ],
2169
+ [
2170
+ "Table",
2171
+ 1
2172
+ ],
2173
+ [
2174
+ "Figure",
2175
+ 1
2176
+ ],
2177
+ [
2178
+ "PageFooter",
2179
+ 1
2180
+ ],
2181
+ [
2182
+ "TableGroup",
2183
+ 1
2184
+ ],
2185
+ [
2186
+ "FigureGroup",
2187
+ 1
2188
+ ]
2189
+ ],
2190
+ "block_metadata": {
2191
+ "llm_request_count": 0,
2192
+ "llm_error_count": 0,
2193
+ "llm_tokens_used": 0,
2194
+ "previous_text": "",
2195
+ "previous_type": "",
2196
+ "previous_order": 0
2197
+ }
2198
+ },
2199
+ {
2200
+ "page_id": 8,
2201
+ "text_extraction_method": "surya",
2202
+ "block_counts": [
2203
+ [
2204
+ "TableCell",
2205
+ 175
2206
+ ],
2207
+ [
2208
+ "Line",
2209
+ 42
2210
+ ],
2211
+ [
2212
+ "Span",
2213
+ 12
2214
+ ],
2215
+ [
2216
+ "Text",
2217
+ 4
2218
+ ],
2219
+ [
2220
+ "Caption",
2221
+ 3
2222
+ ],
2223
+ [
2224
+ "Table",
2225
+ 3
2226
+ ],
2227
+ [
2228
+ "TableGroup",
2229
+ 2
2230
+ ],
2231
+ [
2232
+ "PageHeader",
2233
+ 1
2234
+ ],
2235
+ [
2236
+ "SectionHeader",
2237
+ 1
2238
+ ],
2239
+ [
2240
+ "PageFooter",
2241
+ 1
2242
+ ],
2243
+ [
2244
+ "Reference",
2245
+ 1
2246
+ ]
2247
+ ],
2248
+ "block_metadata": {
2249
+ "llm_request_count": 0,
2250
+ "llm_error_count": 0,
2251
+ "llm_tokens_used": 0,
2252
+ "previous_text": "",
2253
+ "previous_type": "",
2254
+ "previous_order": 0
2255
+ }
2256
+ },
2257
+ {
2258
+ "page_id": 9,
2259
+ "text_extraction_method": "pdftext",
2260
+ "block_counts": [
2261
+ [
2262
+ "Span",
2263
+ 152
2264
+ ],
2265
+ [
2266
+ "Line",
2267
+ 49
2268
+ ],
2269
+ [
2270
+ "ListItem",
2271
+ 14
2272
+ ],
2273
+ [
2274
+ "Reference",
2275
+ 14
2276
+ ],
2277
+ [
2278
+ "SectionHeader",
2279
+ 2
2280
+ ],
2281
+ [
2282
+ "PageHeader",
2283
+ 1
2284
+ ],
2285
+ [
2286
+ "Text",
2287
+ 1
2288
+ ],
2289
+ [
2290
+ "PageFooter",
2291
+ 1
2292
+ ],
2293
+ [
2294
+ "ListGroup",
2295
+ 1
2296
+ ]
2297
+ ],
2298
+ "block_metadata": {
2299
+ "llm_request_count": 0,
2300
+ "llm_error_count": 0,
2301
+ "llm_tokens_used": 0,
2302
+ "previous_text": "",
2303
+ "previous_type": "",
2304
+ "previous_order": 0
2305
+ }
2306
+ },
2307
+ {
2308
+ "page_id": 10,
2309
+ "text_extraction_method": "pdftext",
2310
+ "block_counts": [
2311
+ [
2312
+ "Span",
2313
+ 146
2314
+ ],
2315
+ [
2316
+ "Line",
2317
+ 47
2318
+ ],
2319
+ [
2320
+ "ListItem",
2321
+ 18
2322
+ ],
2323
+ [
2324
+ "Reference",
2325
+ 18
2326
+ ],
2327
+ [
2328
+ "PageHeader",
2329
+ 1
2330
+ ],
2331
+ [
2332
+ "PageFooter",
2333
+ 1
2334
+ ],
2335
+ [
2336
+ "ListGroup",
2337
+ 1
2338
+ ]
2339
+ ],
2340
+ "block_metadata": {
2341
+ "llm_request_count": 0,
2342
+ "llm_error_count": 0,
2343
+ "llm_tokens_used": 0,
2344
+ "previous_text": "",
2345
+ "previous_type": "",
2346
+ "previous_order": 0
2347
+ }
2348
+ },
2349
+ {
2350
+ "page_id": 11,
2351
+ "text_extraction_method": "pdftext",
2352
+ "block_counts": [
2353
+ [
2354
+ "Span",
2355
+ 153
2356
+ ],
2357
+ [
2358
+ "Line",
2359
+ 50
2360
+ ],
2361
+ [
2362
+ "ListItem",
2363
+ 16
2364
+ ],
2365
+ [
2366
+ "Reference",
2367
+ 16
2368
+ ],
2369
+ [
2370
+ "PageHeader",
2371
+ 1
2372
+ ],
2373
+ [
2374
+ "PageFooter",
2375
+ 1
2376
+ ],
2377
+ [
2378
+ "ListGroup",
2379
+ 1
2380
+ ]
2381
+ ],
2382
+ "block_metadata": {
2383
+ "llm_request_count": 0,
2384
+ "llm_error_count": 0,
2385
+ "llm_tokens_used": 0,
2386
+ "previous_text": "",
2387
+ "previous_type": "",
2388
+ "previous_order": 0
2389
+ }
2390
+ },
2391
+ {
2392
+ "page_id": 12,
2393
+ "text_extraction_method": "pdftext",
2394
+ "block_counts": [
2395
+ [
2396
+ "Span",
2397
+ 50
2398
+ ],
2399
+ [
2400
+ "Line",
2401
+ 18
2402
+ ],
2403
+ [
2404
+ "ListItem",
2405
+ 6
2406
+ ],
2407
+ [
2408
+ "Reference",
2409
+ 6
2410
+ ],
2411
+ [
2412
+ "PageHeader",
2413
+ 1
2414
+ ],
2415
+ [
2416
+ "PageFooter",
2417
+ 1
2418
+ ],
2419
+ [
2420
+ "ListGroup",
2421
+ 1
2422
+ ]
2423
+ ],
2424
+ "block_metadata": {
2425
+ "llm_request_count": 0,
2426
+ "llm_error_count": 0,
2427
+ "llm_tokens_used": 0,
2428
+ "previous_text": "",
2429
+ "previous_type": "",
2430
+ "previous_order": 0
2431
+ }
2432
+ },
2433
+ {
2434
+ "page_id": 13,
2435
+ "text_extraction_method": "surya",
2436
+ "block_counts": [
2437
+ [
2438
+ "Span",
2439
+ 47
2440
+ ],
2441
+ [
2442
+ "Line",
2443
+ 39
2444
+ ],
2445
+ [
2446
+ "Text",
2447
+ 8
2448
+ ],
2449
+ [
2450
+ "Equation",
2451
+ 4
2452
+ ],
2453
+ [
2454
+ "Reference",
2455
+ 2
2456
+ ],
2457
+ [
2458
+ "PageHeader",
2459
+ 1
2460
+ ],
2461
+ [
2462
+ "SectionHeader",
2463
+ 1
2464
+ ],
2465
+ [
2466
+ "PageFooter",
2467
+ 1
2468
+ ]
2469
+ ],
2470
+ "block_metadata": {
2471
+ "llm_request_count": 0,
2472
+ "llm_error_count": 0,
2473
+ "llm_tokens_used": 0,
2474
+ "previous_text": "",
2475
+ "previous_type": "",
2476
+ "previous_order": 0
2477
+ }
2478
+ },
2479
+ {
2480
+ "page_id": 14,
2481
+ "text_extraction_method": "surya",
2482
+ "block_counts": [
2483
+ [
2484
+ "Line",
2485
+ 100
2486
+ ],
2487
+ [
2488
+ "Span",
2489
+ 62
2490
+ ],
2491
+ [
2492
+ "Text",
2493
+ 7
2494
+ ],
2495
+ [
2496
+ "Equation",
2497
+ 5
2498
+ ],
2499
+ [
2500
+ "PageHeader",
2501
+ 1
2502
+ ],
2503
+ [
2504
+ "SectionHeader",
2505
+ 1
2506
+ ],
2507
+ [
2508
+ "Figure",
2509
+ 1
2510
+ ],
2511
+ [
2512
+ "Caption",
2513
+ 1
2514
+ ],
2515
+ [
2516
+ "Footnote",
2517
+ 1
2518
+ ],
2519
+ [
2520
+ "PageFooter",
2521
+ 1
2522
+ ],
2523
+ [
2524
+ "FigureGroup",
2525
+ 1
2526
+ ],
2527
+ [
2528
+ "Reference",
2529
+ 1
2530
+ ]
2531
+ ],
2532
+ "block_metadata": {
2533
+ "llm_request_count": 0,
2534
+ "llm_error_count": 0,
2535
+ "llm_tokens_used": 0,
2536
+ "previous_text": "",
2537
+ "previous_type": "",
2538
+ "previous_order": 0
2539
+ }
2540
+ },
2541
+ {
2542
+ "page_id": 15,
2543
+ "text_extraction_method": "surya",
2544
+ "block_counts": [
2545
+ [
2546
+ "Line",
2547
+ 48
2548
+ ],
2549
+ [
2550
+ "Span",
2551
+ 40
2552
+ ],
2553
+ [
2554
+ "TableCell",
2555
+ 18
2556
+ ],
2557
+ [
2558
+ "SectionHeader",
2559
+ 6
2560
+ ],
2561
+ [
2562
+ "Text",
2563
+ 5
2564
+ ],
2565
+ [
2566
+ "Table",
2567
+ 2
2568
+ ],
2569
+ [
2570
+ "Reference",
2571
+ 2
2572
+ ],
2573
+ [
2574
+ "PageHeader",
2575
+ 1
2576
+ ],
2577
+ [
2578
+ "Equation",
2579
+ 1
2580
+ ],
2581
+ [
2582
+ "Code",
2583
+ 1
2584
+ ],
2585
+ [
2586
+ "PageFooter",
2587
+ 1
2588
+ ]
2589
+ ],
2590
+ "block_metadata": {
2591
+ "llm_request_count": 0,
2592
+ "llm_error_count": 0,
2593
+ "llm_tokens_used": 0,
2594
+ "previous_text": "",
2595
+ "previous_type": "",
2596
+ "previous_order": 0
2597
+ }
2598
+ },
2599
+ {
2600
+ "page_id": 16,
2601
+ "text_extraction_method": "surya",
2602
+ "block_counts": [
2603
+ [
2604
+ "Span",
2605
+ 78
2606
+ ],
2607
+ [
2608
+ "Line",
2609
+ 54
2610
+ ],
2611
+ [
2612
+ "Reference",
2613
+ 8
2614
+ ],
2615
+ [
2616
+ "Equation",
2617
+ 7
2618
+ ],
2619
+ [
2620
+ "Text",
2621
+ 5
2622
+ ],
2623
+ [
2624
+ "SectionHeader",
2625
+ 2
2626
+ ],
2627
+ [
2628
+ "PageHeader",
2629
+ 1
2630
+ ],
2631
+ [
2632
+ "PageFooter",
2633
+ 1
2634
+ ]
2635
+ ],
2636
+ "block_metadata": {
2637
+ "llm_request_count": 0,
2638
+ "llm_error_count": 0,
2639
+ "llm_tokens_used": 0,
2640
+ "previous_text": "",
2641
+ "previous_type": "",
2642
+ "previous_order": 0
2643
+ }
2644
+ },
2645
+ {
2646
+ "page_id": 17,
2647
+ "text_extraction_method": "pdftext",
2648
+ "block_counts": [
2649
+ [
2650
+ "Span",
2651
+ 470
2652
+ ],
2653
+ [
2654
+ "Line",
2655
+ 81
2656
+ ],
2657
+ [
2658
+ "Equation",
2659
+ 10
2660
+ ],
2661
+ [
2662
+ "Reference",
2663
+ 10
2664
+ ],
2665
+ [
2666
+ "Text",
2667
+ 8
2668
+ ],
2669
+ [
2670
+ "SectionHeader",
2671
+ 6
2672
+ ],
2673
+ [
2674
+ "PageHeader",
2675
+ 1
2676
+ ],
2677
+ [
2678
+ "PageFooter",
2679
+ 1
2680
+ ]
2681
+ ],
2682
+ "block_metadata": {
2683
+ "llm_request_count": 0,
2684
+ "llm_error_count": 0,
2685
+ "llm_tokens_used": 0,
2686
+ "previous_text": "",
2687
+ "previous_type": "",
2688
+ "previous_order": 0
2689
+ }
2690
+ },
2691
+ {
2692
+ "page_id": 18,
2693
+ "text_extraction_method": "surya",
2694
+ "block_counts": [
2695
+ [
2696
+ "Line",
2697
+ 77
2698
+ ],
2699
+ [
2700
+ "Span",
2701
+ 63
2702
+ ],
2703
+ [
2704
+ "Text",
2705
+ 11
2706
+ ],
2707
+ [
2708
+ "SectionHeader",
2709
+ 6
2710
+ ],
2711
+ [
2712
+ "PageHeader",
2713
+ 1
2714
+ ],
2715
+ [
2716
+ "PageFooter",
2717
+ 1
2718
+ ],
2719
+ [
2720
+ "Reference",
2721
+ 1
2722
+ ]
2723
+ ],
2724
+ "block_metadata": {
2725
+ "llm_request_count": 0,
2726
+ "llm_error_count": 0,
2727
+ "llm_tokens_used": 0,
2728
+ "previous_text": "",
2729
+ "previous_type": "",
2730
+ "previous_order": 0
2731
+ }
2732
+ },
2733
+ {
2734
+ "page_id": 19,
2735
+ "text_extraction_method": "surya",
2736
+ "block_counts": [
2737
+ [
2738
+ "Line",
2739
+ 65
2740
+ ],
2741
+ [
2742
+ "Span",
2743
+ 57
2744
+ ],
2745
+ [
2746
+ "Equation",
2747
+ 7
2748
+ ],
2749
+ [
2750
+ "Reference",
2751
+ 7
2752
+ ],
2753
+ [
2754
+ "Text",
2755
+ 5
2756
+ ],
2757
+ [
2758
+ "SectionHeader",
2759
+ 4
2760
+ ],
2761
+ [
2762
+ "PageHeader",
2763
+ 1
2764
+ ],
2765
+ [
2766
+ "PageFooter",
2767
+ 1
2768
+ ]
2769
+ ],
2770
+ "block_metadata": {
2771
+ "llm_request_count": 0,
2772
+ "llm_error_count": 0,
2773
+ "llm_tokens_used": 0,
2774
+ "previous_text": "",
2775
+ "previous_type": "",
2776
+ "previous_order": 0
2777
+ }
2778
+ },
2779
+ {
2780
+ "page_id": 20,
2781
+ "text_extraction_method": "surya",
2782
+ "block_counts": [
2783
+ [
2784
+ "TableCell",
2785
+ 167
2786
+ ],
2787
+ [
2788
+ "Line",
2789
+ 56
2790
+ ],
2791
+ [
2792
+ "Span",
2793
+ 25
2794
+ ],
2795
+ [
2796
+ "Text",
2797
+ 5
2798
+ ],
2799
+ [
2800
+ "SectionHeader",
2801
+ 4
2802
+ ],
2803
+ [
2804
+ "Reference",
2805
+ 4
2806
+ ],
2807
+ [
2808
+ "ListItem",
2809
+ 3
2810
+ ],
2811
+ [
2812
+ "PageHeader",
2813
+ 1
2814
+ ],
2815
+ [
2816
+ "Table",
2817
+ 1
2818
+ ],
2819
+ [
2820
+ "Caption",
2821
+ 1
2822
+ ],
2823
+ [
2824
+ "PageFooter",
2825
+ 1
2826
+ ],
2827
+ [
2828
+ "TableGroup",
2829
+ 1
2830
+ ],
2831
+ [
2832
+ "ListGroup",
2833
+ 1
2834
+ ]
2835
+ ],
2836
+ "block_metadata": {
2837
+ "llm_request_count": 0,
2838
+ "llm_error_count": 0,
2839
+ "llm_tokens_used": 0,
2840
+ "previous_text": "",
2841
+ "previous_type": "",
2842
+ "previous_order": 0
2843
+ }
2844
+ },
2845
+ {
2846
+ "page_id": 21,
2847
+ "text_extraction_method": "surya",
2848
+ "block_counts": [
2849
+ [
2850
+ "TableCell",
2851
+ 139
2852
+ ],
2853
+ [
2854
+ "Line",
2855
+ 62
2856
+ ],
2857
+ [
2858
+ "Span",
2859
+ 19
2860
+ ],
2861
+ [
2862
+ "Text",
2863
+ 4
2864
+ ],
2865
+ [
2866
+ "Caption",
2867
+ 2
2868
+ ],
2869
+ [
2870
+ "Reference",
2871
+ 2
2872
+ ],
2873
+ [
2874
+ "PageHeader",
2875
+ 1
2876
+ ],
2877
+ [
2878
+ "Table",
2879
+ 1
2880
+ ],
2881
+ [
2882
+ "Figure",
2883
+ 1
2884
+ ],
2885
+ [
2886
+ "SectionHeader",
2887
+ 1
2888
+ ],
2889
+ [
2890
+ "PageFooter",
2891
+ 1
2892
+ ],
2893
+ [
2894
+ "TableGroup",
2895
+ 1
2896
+ ],
2897
+ [
2898
+ "FigureGroup",
2899
+ 1
2900
+ ]
2901
+ ],
2902
+ "block_metadata": {
2903
+ "llm_request_count": 0,
2904
+ "llm_error_count": 0,
2905
+ "llm_tokens_used": 0,
2906
+ "previous_text": "",
2907
+ "previous_type": "",
2908
+ "previous_order": 0
2909
+ }
2910
+ },
2911
+ {
2912
+ "page_id": 22,
2913
+ "text_extraction_method": "surya",
2914
+ "block_counts": [
2915
+ [
2916
+ "Line",
2917
+ 65
2918
+ ],
2919
+ [
2920
+ "TableCell",
2921
+ 33
2922
+ ],
2923
+ [
2924
+ "Span",
2925
+ 29
2926
+ ],
2927
+ [
2928
+ "Text",
2929
+ 5
2930
+ ],
2931
+ [
2932
+ "Caption",
2933
+ 2
2934
+ ],
2935
+ [
2936
+ "Reference",
2937
+ 2
2938
+ ],
2939
+ [
2940
+ "PageHeader",
2941
+ 1
2942
+ ],
2943
+ [
2944
+ "Figure",
2945
+ 1
2946
+ ],
2947
+ [
2948
+ "SectionHeader",
2949
+ 1
2950
+ ],
2951
+ [
2952
+ "Table",
2953
+ 1
2954
+ ],
2955
+ [
2956
+ "PageFooter",
2957
+ 1
2958
+ ],
2959
+ [
2960
+ "FigureGroup",
2961
+ 1
2962
+ ],
2963
+ [
2964
+ "TableGroup",
2965
+ 1
2966
+ ]
2967
+ ],
2968
+ "block_metadata": {
2969
+ "llm_request_count": 0,
2970
+ "llm_error_count": 0,
2971
+ "llm_tokens_used": 0,
2972
+ "previous_text": "",
2973
+ "previous_type": "",
2974
+ "previous_order": 0
2975
+ }
2976
+ },
2977
+ {
2978
+ "page_id": 23,
2979
+ "text_extraction_method": "pdftext",
2980
+ "block_counts": [
2981
+ [
2982
+ "Span",
2983
+ 298
2984
+ ],
2985
+ [
2986
+ "Line",
2987
+ 50
2988
+ ],
2989
+ [
2990
+ "TableCell",
2991
+ 25
2992
+ ],
2993
+ [
2994
+ "Text",
2995
+ 8
2996
+ ],
2997
+ [
2998
+ "ListItem",
2999
+ 3
3000
+ ],
3001
+ [
3002
+ "PageHeader",
3003
+ 1
3004
+ ],
3005
+ [
3006
+ "SectionHeader",
3007
+ 1
3008
+ ],
3009
+ [
3010
+ "Caption",
3011
+ 1
3012
+ ],
3013
+ [
3014
+ "Table",
3015
+ 1
3016
+ ],
3017
+ [
3018
+ "PageFooter",
3019
+ 1
3020
+ ],
3021
+ [
3022
+ "TableGroup",
3023
+ 1
3024
+ ],
3025
+ [
3026
+ "ListGroup",
3027
+ 1
3028
+ ],
3029
+ [
3030
+ "Reference",
3031
+ 1
3032
+ ]
3033
+ ],
3034
+ "block_metadata": {
3035
+ "llm_request_count": 0,
3036
+ "llm_error_count": 0,
3037
+ "llm_tokens_used": 0,
3038
+ "previous_text": "",
3039
+ "previous_type": "",
3040
+ "previous_order": 0
3041
+ }
3042
+ },
3043
+ {
3044
+ "page_id": 24,
3045
+ "text_extraction_method": "surya",
3046
+ "block_counts": [
3047
+ [
3048
+ "Span",
3049
+ 83
3050
+ ],
3051
+ [
3052
+ "Line",
3053
+ 58
3054
+ ],
3055
+ [
3056
+ "Text",
3057
+ 9
3058
+ ],
3059
+ [
3060
+ "SectionHeader",
3061
+ 3
3062
+ ],
3063
+ [
3064
+ "Equation",
3065
+ 2
3066
+ ],
3067
+ [
3068
+ "Reference",
3069
+ 2
3070
+ ],
3071
+ [
3072
+ "PageHeader",
3073
+ 1
3074
+ ],
3075
+ [
3076
+ "PageFooter",
3077
+ 1
3078
+ ]
3079
+ ],
3080
+ "block_metadata": {
3081
+ "llm_request_count": 0,
3082
+ "llm_error_count": 0,
3083
+ "llm_tokens_used": 0,
3084
+ "previous_text": "",
3085
+ "previous_type": "",
3086
+ "previous_order": 0
3087
+ }
3088
+ },
3089
+ {
3090
+ "page_id": 25,
3091
+ "text_extraction_method": "surya",
3092
+ "block_counts": [
3093
+ [
3094
+ "Span",
3095
+ 66
3096
+ ],
3097
+ [
3098
+ "Line",
3099
+ 59
3100
+ ],
3101
+ [
3102
+ "Text",
3103
+ 7
3104
+ ],
3105
+ [
3106
+ "SectionHeader",
3107
+ 4
3108
+ ],
3109
+ [
3110
+ "Equation",
3111
+ 3
3112
+ ],
3113
+ [
3114
+ "Reference",
3115
+ 2
3116
+ ],
3117
+ [
3118
+ "PageHeader",
3119
+ 1
3120
+ ],
3121
+ [
3122
+ "PageFooter",
3123
+ 1
3124
+ ]
3125
+ ],
3126
+ "block_metadata": {
3127
+ "llm_request_count": 0,
3128
+ "llm_error_count": 0,
3129
+ "llm_tokens_used": 0,
3130
+ "previous_text": "",
3131
+ "previous_type": "",
3132
+ "previous_order": 0
3133
+ }
3134
+ },
3135
+ {
3136
+ "page_id": 26,
3137
+ "text_extraction_method": "surya",
3138
+ "block_counts": [
3139
+ [
3140
+ "Span",
3141
+ 61
3142
+ ],
3143
+ [
3144
+ "Line",
3145
+ 52
3146
+ ],
3147
+ [
3148
+ "Text",
3149
+ 12
3150
+ ],
3151
+ [
3152
+ "Equation",
3153
+ 7
3154
+ ],
3155
+ [
3156
+ "SectionHeader",
3157
+ 2
3158
+ ],
3159
+ [
3160
+ "PageHeader",
3161
+ 1
3162
+ ],
3163
+ [
3164
+ "PageFooter",
3165
+ 1
3166
+ ],
3167
+ [
3168
+ "Reference",
3169
+ 1
3170
+ ]
3171
+ ],
3172
+ "block_metadata": {
3173
+ "llm_request_count": 0,
3174
+ "llm_error_count": 0,
3175
+ "llm_tokens_used": 0,
3176
+ "previous_text": "",
3177
+ "previous_type": "",
3178
+ "previous_order": 0
3179
+ }
3180
+ },
3181
+ {
3182
+ "page_id": 27,
3183
+ "text_extraction_method": "surya",
3184
+ "block_counts": [
3185
+ [
3186
+ "Line",
3187
+ 45
3188
+ ],
3189
+ [
3190
+ "Span",
3191
+ 43
3192
+ ],
3193
+ [
3194
+ "Text",
3195
+ 14
3196
+ ],
3197
+ [
3198
+ "Equation",
3199
+ 11
3200
+ ],
3201
+ [
3202
+ "PageHeader",
3203
+ 1
3204
+ ],
3205
+ [
3206
+ "SectionHeader",
3207
+ 1
3208
+ ],
3209
+ [
3210
+ "PageFooter",
3211
+ 1
3212
+ ]
3213
+ ],
3214
+ "block_metadata": {
3215
+ "llm_request_count": 0,
3216
+ "llm_error_count": 0,
3217
+ "llm_tokens_used": 0,
3218
+ "previous_text": "",
3219
+ "previous_type": "",
3220
+ "previous_order": 0
3221
+ }
3222
+ },
3223
+ {
3224
+ "page_id": 28,
3225
+ "text_extraction_method": "surya",
3226
+ "block_counts": [
3227
+ [
3228
+ "Span",
3229
+ 88
3230
+ ],
3231
+ [
3232
+ "Line",
3233
+ 73
3234
+ ],
3235
+ [
3236
+ "Text",
3237
+ 7
3238
+ ],
3239
+ [
3240
+ "SectionHeader",
3241
+ 3
3242
+ ],
3243
+ [
3244
+ "Equation",
3245
+ 2
3246
+ ],
3247
+ [
3248
+ "PageHeader",
3249
+ 1
3250
+ ],
3251
+ [
3252
+ "Figure",
3253
+ 1
3254
+ ],
3255
+ [
3256
+ "Caption",
3257
+ 1
3258
+ ],
3259
+ [
3260
+ "PageFooter",
3261
+ 1
3262
+ ],
3263
+ [
3264
+ "FigureGroup",
3265
+ 1
3266
+ ],
3267
+ [
3268
+ "Reference",
3269
+ 1
3270
+ ]
3271
+ ],
3272
+ "block_metadata": {
3273
+ "llm_request_count": 0,
3274
+ "llm_error_count": 0,
3275
+ "llm_tokens_used": 0,
3276
+ "previous_text": "",
3277
+ "previous_type": "",
3278
+ "previous_order": 0
3279
+ }
3280
+ },
3281
+ {
3282
+ "page_id": 29,
3283
+ "text_extraction_method": "surya",
3284
+ "block_counts": [
3285
+ [
3286
+ "Line",
3287
+ 77
3288
+ ],
3289
+ [
3290
+ "Span",
3291
+ 45
3292
+ ],
3293
+ [
3294
+ "Text",
3295
+ 6
3296
+ ],
3297
+ [
3298
+ "SectionHeader",
3299
+ 5
3300
+ ],
3301
+ [
3302
+ "Reference",
3303
+ 2
3304
+ ],
3305
+ [
3306
+ "PageHeader",
3307
+ 1
3308
+ ],
3309
+ [
3310
+ "Figure",
3311
+ 1
3312
+ ],
3313
+ [
3314
+ "Caption",
3315
+ 1
3316
+ ],
3317
+ [
3318
+ "PageFooter",
3319
+ 1
3320
+ ],
3321
+ [
3322
+ "FigureGroup",
3323
+ 1
3324
+ ]
3325
+ ],
3326
+ "block_metadata": {
3327
+ "llm_request_count": 0,
3328
+ "llm_error_count": 0,
3329
+ "llm_tokens_used": 0,
3330
+ "previous_text": "",
3331
+ "previous_type": "",
3332
+ "previous_order": 0
3333
+ }
3334
+ },
3335
+ {
3336
+ "page_id": 30,
3337
+ "text_extraction_method": "pdftext",
3338
+ "block_counts": [
3339
+ [
3340
+ "Span",
3341
+ 300
3342
+ ],
3343
+ [
3344
+ "Line",
3345
+ 46
3346
+ ],
3347
+ [
3348
+ "Text",
3349
+ 7
3350
+ ],
3351
+ [
3352
+ "SectionHeader",
3353
+ 6
3354
+ ],
3355
+ [
3356
+ "PageHeader",
3357
+ 1
3358
+ ],
3359
+ [
3360
+ "PageFooter",
3361
+ 1
3362
+ ]
3363
+ ],
3364
+ "block_metadata": {
3365
+ "llm_request_count": 0,
3366
+ "llm_error_count": 0,
3367
+ "llm_tokens_used": 0,
3368
+ "previous_text": "",
3369
+ "previous_type": "",
3370
+ "previous_order": 0
3371
+ }
3372
+ },
3373
+ {
3374
+ "page_id": 31,
3375
+ "text_extraction_method": "pdftext",
3376
+ "block_counts": [
3377
+ [
3378
+ "Span",
3379
+ 73
3380
+ ],
3381
+ [
3382
+ "Line",
3383
+ 17
3384
+ ],
3385
+ [
3386
+ "SectionHeader",
3387
+ 4
3388
+ ],
3389
+ [
3390
+ "Text",
3391
+ 3
3392
+ ],
3393
+ [
3394
+ "PageHeader",
3395
+ 1
3396
+ ],
3397
+ [
3398
+ "PageFooter",
3399
+ 1
3400
+ ]
3401
+ ],
3402
+ "block_metadata": {
3403
+ "llm_request_count": 0,
3404
+ "llm_error_count": 0,
3405
+ "llm_tokens_used": 0,
3406
+ "previous_text": "",
3407
+ "previous_type": "",
3408
+ "previous_order": 0
3409
+ }
3410
+ }
3411
+ ],
3412
+ "debug_data_path": "debug_data/6KrETIaOYD"
3413
+ }
iclr26/6KrETIaOYD/model_text_v3.txt ADDED
@@ -0,0 +1,200 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [p. 1 | section: ABSTRACT | type: Text]
2
+ Self-improvement has emerged as a state-of-the-art paradigm in Neural Combinatorial Optimization (NCO), where models iteratively refine their policies by generating and imitating high-quality solutions. Despite strong empirical performance, existing methods face key limitations. Training is computationally expensive, as policy updates require sampling numerous candidate solutions per instance to extract a single expert trajectory. More fundamentally, these approaches fail to exploit the structure of combinatorial problems involving the coordination of multiple agents, such as vehicles in min-max routing or machines in scheduling. By supervising on single-action trajectories, they fail to exploit agent-permutation symmetries, where distinct sequences of actions yield identical solutions, hindering generalization and the ability to learn coordinated behavior.
3
+
4
+ [p. 1 | section: ABSTRACT | type: Text]
5
+ We address these challenges by extending self-improvement to operate over joint multi-agent actions. Our model architecture predicts complete agent-task assignments jointly at each decision step. To explicitly leverage symmetries, we employ a set-prediction loss, which supervises the policy on multiple expert assignments for any given state. This approach enhances sample efficiency and the model's ability to learn coordinated behavior. Furthermore, by generating multi-agent actions in parallel, it drastically accelerates the solution generation phase of the selfimprovement loop. Empirically, we validate our method on several combinatorial problems, demonstrating consistent improvements in the quality of the final solution and a reduced generation latency compared to standard self-improvement.
6
+
7
+ [p. 1 | section: 1 INTRODUCTION | type: Text]
8
+ End-to-end constructive Neural Combinatorial Optimization (NCO) has emerged as a powerful framework for solving combinatorial optimization (CO) problems by casting them as sequential Markov Decision Processes (MDPs), where a neural policy constructs solutions step by step (Ben gio et al., 2021) . Reinforcement Learning (RL)-based methods have proven especially effective in this setting, enabling models to learn solution strategies through interaction rather than relying on pre-existing expert data (Bello et al., 2017; Kool et al., 2019; Kwon et al., 2020; Kim et al., 2022) .
9
+
10
+ [p. 1 | section: 1 INTRODUCTION | type: Text]
11
+ Despite their flexibility, traditional RL approaches in NCO face significant challenges. The sparse reward signals inherent to combinatorial optimization – where a meaningful objective is available only upon solution completion – have largely limited training to the REINFORCE algorithm (Williams, 1992) and variants (Kool et al., 2019; Kim et al., 2022; Kwon et al., 2020) . Since these methods require backpropagation through the entire solution trajectory, the resulting high memory requirements and risk of gradient instability have encouraged a "heavy-encoder, light-decoder" architectural paradigm. In this setup, a static representation of the initial problem is generated once and used for all subsequent decisions. This becomes a critical bottleneck, as it fails to reflect the evolving problem state, often resulting in suboptimal decisions in the later stages of solution construction (Drakulic et al., 2023; Luo et al., 2024) . Recently, self-improvement methods have offered a compelling solution to these issues (Pirnay & Grimm, 2024; Corsini et al., 2024) . During training, these algorithms generate numerous solutions for a given problem instance, identify the best-performing trajectory, and use it as a pseudo-expert example for imitation learning. Because the policy is trained on individual state-action pairs along this expert trajectory, it enables the use of more powerful, decoder-only architectures that can dynamically re-encode the state at each step.
12
+
13
+ [p. 2 | section: 1 INTRODUCTION | type: Text]
14
+ However, this next-token prediction approach of self-improvement faces a fundamental limitation in multi-agent CO problems, where multiple decision entities (agents) must plan and coordinate their actions to achieve a shared objective. These problems often exhibit agentpermutation symmetries, meaning that different permutations of agent-task assignments can yield identical solutions. For example, in vehicle routing, assigning driver 1 to location A and then driver 2 to location B leads to the same overall route as the reverse assignment order (Figure 1) . However, by supervising the policy on a single "best" next action per state, self-improvement implicitly enforces an arbi-
15
+
16
+ [p. 2 | section: 1 INTRODUCTION | type: FigureGroup]
17
+ Figure 1: Example for agent-permutation symmetry. Both trajectories have the same solution.
18
+
19
+ [p. 2 | section: 1 INTRODUCTION | type: Text]
20
+ trary agent order and treats the remaining symmetric choices as errors. This reduces sample efficiency and limits the model's ability to learn coordination in multi-agent settings, thus limiting generalization performance.
21
+
22
+ [p. 2 | section: 1 INTRODUCTION | type: Text]
23
+ To address these limitations, this paper introduces MACSIM – a Multi-ACtion Self-Improvement Method. MACSIM extends the self-improvement paradigm by incorporating a multi-agent policy that predicts joint assignments for all agents in parallel at each decision step. To explicitly leverage problem symmetries, we employ a set-prediction loss, which allows the policy to learn from multiple equivalent expert assignments for a given state. This design promotes agent coordination, improves sample efficiency, and significantly accelerates solution generation. We demonstrate the effectiveness of MACSIM on several challenging combinatorial optimization tasks spanning both routing and scheduling domains. Our key contributions are as follows:
24
+
25
+ [p. 2 | section: 1 INTRODUCTION | type: ListGroup]
26
+ We propose MACSIM, a novel learning paradigm for cooperative multi-agent combinatorial optimization problems that achieves better empirical results with lower solution generation latency compared to standard self-improvement methods. We develop a new solution generation scheme that models the entire joint-agent action space in a single forward pass – thus fostering coordination – and avoids conflicts between agents through an autoregressive sampling algorithm. We introduce a permutation-invariant surrogate loss function for imitation learning on expert multi-action trajectories, which stabilizes and accelerates the training process.
27
+
28
+ [p. 2 | section: 2 RELATED WORKS | type: Text]
29
+ The application of deep learning to CO problems was pioneered by the Pointer Network (Vinyals et al., 2015) , which was trained via supervised learning to autoregressively construct solutions for the Traveling Salesman Problem (TSP). This paradigm was quickly adapted to RL, removing the dependency on optimal solutions as training data and thus improving scalability (Bello et al., 2017; Nazari et al., 2018) . A major architectural advance came with transformer-based policies leveraging self-attention (Vaswani et al., 2017) , leading to substantial performance gains (Kool et al., 2019) .
30
+
31
+ [p. 2 | section: 2 RELATED WORKS | type: Text]
32
+ A common strategy in these REINFORCE-based methods (Williams, 1992) is to apply a computationally expensive encoder once per problem instance and use the resulting embeddings in a lightweight, iterative decoder. While efficient, this "encode-once" approach has been shown to generalize poorly to out-of-distribution instances (Manchanda et al., 2022) . In response, recent works have explored alternative strategies, such as re-encoding the state at each decoding step (Drakulic et al., 2023; Luo et al., 2024) , learning a diverse set of policies to improve performance at test time (Grinsztajn et al., 2023; Hottung et al., 2025) , or abandoning autoregressive decoding entirely in favor of heatmap-based (Joshi et al., 2019; Fu et al., 2021; Qiu et al., 2022; Ye et al., 2023) or diffusion-based methods (Sun & Yang, 2023; Li et al., 2023; 2024) .
33
+
34
+ [p. 2 | section: 2 RELATED WORKS | type: Text]
35
+ Self-improvement learning has recently emerged as a powerful training paradigm that bypasses the need for expert solutions (Corsini et al., 2024; Pirnay & Grimm, 2024) . Inspired by elite sampling from cross-entropy methods (Boer et al., 2005) , these approaches sample multiple solution trajec-
36
+
37
+ [p. 3 | section: 2 RELATED WORKS | type: Text]
38
+ tories, identify the best-performing one as a "pseudo-expert" and train the policy to imitate this target via next-token prediction. However, this approach assumes a unique optimal action per step, which is often violated in CO problems that exhibit symmetries (Cappart et al., 2023). In such cases, forcing the model to follow a single sequence reduces solution diversity and impairs generalization.
39
+
40
+ [p. 3 | section: 2 RELATED WORKS | type: Text]
41
+ Several lines of research have focused explicitly on exploiting symmetries. POMO (Kwon et al., 2020) and Sym-NCO (Kim et al., 2022) leverage the cyclic symmetry of the TSP by training on rollouts from all possible starting nodes and using their averaged returns to compute a low-variance baseline. More recently, DPN (Zheng et al., 2024) generalized this concept to multi-agent problems like the min-max VRP, where the order of agent routes is permutation-invariant. DPN samples multiple agent orderings and computes an agent-permutation-symmetric baseline, which reduces gradient variance and accelerates convergence by avoiding redundant learning.
42
+
43
+ [p. 3 | section: 2 RELATED WORKS | type: Text]
44
+ We extend self-improvement to explicitly leverage these structural symmetries in multi-agent CO problems. In contrast to PARCO, which resolves conflicts post-hoc, and DPN, which reduces variance through permutation-invariant baselines, MACSIM generates coordinated and conflict-free assignments directly and learns with a set-based loss, leading to more robust symmetry-aware policies.
45
+
46
+ [p. 3 | section: 3 Preliminaries | type: Text]
47
+ NCO typically involves a reformulation of the respective CO problem into a Markov Decision Process (MDP), where a solution \tau to a problem instance x is constructed over a finite horizon t=1,\ldots,T . The current configuration of the problem at time step t is encoded in the state s_t \in \mathcal{S} , which typically represents all information in a graph \mathcal{G} = \{\mathcal{V}, \mathcal{E}, w\} , with N nodes \mathcal{V} , edges \mathcal{E} \subseteq \mathcal{V} \times \mathcal{V} and edge weights w: \mathcal{E} \to \mathbb{R} (Khalil et al., 2017). At each step, a policy \pi_{\theta} with learnable weights \theta selects an action a_t \in \mathcal{V} based on s_t , and the transition function \psi updates the state to s_{t+1} (Khalil et al., 2017). Due to the sequential structure of MDPs, NCO commonly adopts autoregressive (AR) policies that generate actions step by step, conditioned on prior decisions. Classical approaches trained via REINFORCE typically encode only the initial state s_0 using a graph neural network, while the policy operates autoregressively from this encoding. In contrast, self-improvement methods enable training at the action level, allowing the policy to encode intermediate states s_t and use decoder-only architectures defined as P(\tau \mid x; \theta) = \prod_{t=1}^T \pi_{\theta}(a_t \mid s_t) .
48
+
49
+ [p. 3 | section: 3 Preliminaries | type: Text]
50
+ In this work, we specifically target CO problems that can be framed as a cooperative multi-agent MDP (MMDP or Markov Game) with M agents sharing a common reward (Boutilier, 1996). Agents correspond to decision entities executing tasks, such as machines in scheduling problems or vehicles in routing. The state s_t of the problem can be defined by a bipartite graph \mathcal{G} = \{\mathcal{V}, \mathcal{M}, \mathcal{E}, w\} , where \mathcal{V} is the set of nodes (tasks), \mathcal{M} is the set of agents, and edges \mathcal{E} \subseteq \mathcal{M} \times \mathcal{V} denote feasible agent-task assignments, each associated with a cost w: \mathcal{E} \to \mathbb{R} .
51
+
52
+ [p. 3 | section: 3 Preliminaries | type: Text]
53
+ At each step t, the policy \pi_{\theta} maps the state s_t to a bipartite matching \mathbf{a}_t = \{a_t^k\}_{k=1}^M between agent and tasks. Each element a_t^k = (m_k, v_k) denotes the assignment of task v_k to agent m_k , where no two agents can be assigned to the same task. Given a matching \mathbf{a}_t \in \mathcal{A} , with \mathcal{A} the space of valid matchings, the problem transitions from s_t to s_{t+1} according to a transition function \psi: \mathcal{S} \times \mathcal{A} \to \mathcal{S} , until a complete solution \tau is obtained. The transition function is assumed order-invariant, meaning it depends only on the final matching \mathbf{a}_t , not on the order in which assignments are produced. Agents receive a shared reward observed only at terminal states, where the return R(\tau, x) equals the negative value of the CO objective for the complete solution.
54
+
55
+ [p. 3 | section: 4.1 Multi-Agent Policy | type: Text]
56
+ The permutation invariance of the transition function with respect to joint agent-task assignments induces symmetries over agent orderings. Standard self-improvement typically ignores this structure by assuming a single best action per time-step. In contrast, our approach leverages these agent-permutation symmetries by learning a policy that generates complete joint agent-task assignments \mathbf{a}_t instead of single next actions a_t = (m, v) . To this end, MACSIM utilizes a multi-agent policy that directly maps the current state s_t to a joint agent-action assignment \mathbf{a}_t . This policy first encodes
57
+
58
+ [p. 4 | section: 4.1 Multi-Agent Policy | type: FigureGroup]
59
+ Figure 2: Overview of MACSIM. It generates joint agent-action logits in parallel through a multi-agent policy and autoregressively samples from them to generate complete agent-task assignments. The policy is used to sample \beta solutions, where the best serves as training example. A set-based loss function is used to train the policy on pseudo-expert multi-agent actions for a given state.
60
+
61
+ [p. 4 | section: 4.1 Multi-Agent Policy | type: Text]
62
+ the bipartite input graph \mathcal G into agent embeddings \mathbf H_{\mathcal M} \in \mathbb R^{M \times d} and task embeddings \mathbf H_{\mathcal V} \in \mathbb R^{N \times d} . Based on these embeddings, it computes a matrix of unnormalized logits \mathbf L \in \mathbb R^{M \times N} , where each entry L_{m,v} represents the compatibility score for assigning task v to agent m. For full architectural details of the policy network, we refer the reader to Appendix B.
63
+
64
+ [p. 4 | section: 4.1 Multi-Agent Policy | type: Text]
65
+ While the idea of multi-agent policies in NCO is not novel, existing approaches either sample only once from the resulting joint-distribution (Liu et al., 2024), thus discarding learned inter-agent correlations as well as potential efficiency gains through multi-step prediction. Or, they assume independence across agents by normalizing L per agent and sampling independently from the resulting marginal distributions. However, this independence assumption does not hold, leading to suboptimal coordination and conflicts, where agents happen to select the same action. PARCO (Berto et al., 2024) resolves conflicts by a post-hoc resolution mechanism, prioritizing agents with larger log-probabilities while leaving others idle. Yet, since agents are modeled independently through different marginal distributions, effective coordination does not take place.
66
+
67
+ [p. 4 | section: 4.2 Multi-Action Generation | type: Text]
68
+ To address this, we introduce an autoregressive sampling procedure, that utilizes the joint-logits \mathbf{L} from the neural policy to sequentially sample agent-action pairs from their joint distribution without replacement. To this end, the probability of generating a specific sequence \mathbf{a}_t is factorized using the chain rule of probability:
69
+
70
+ [p. 4 | section: 4.2 Multi-Action Generation | type: Equation]
71
+ P(\mathbf{a}_t \mid \mathbf{L}) = \prod_{k=1}^{M} P(m_{t,k}, v_{t,k} \mid \mathbf{a}_t^{\leq k}, \mathbf{L}) (1)
72
+
73
+ [p. 4 | section: 4.2 Multi-Action Generation | type: Text]
74
+ where \mathbf{a}_t^{< k} = ((m_{t,1}, v_{t,1}), \dots, (m_{t,k-1}, v_{t,k-1})) denotes the sequence of previous assignments in the construction of \mathbf{a}_t . This formulation casts the selection of each agent-task pair as a step in a sequence, where the choice at step k is conditioned on all prior assignments. Specifically, let \mathcal{M}_k and \mathcal{V}_k be the sets of agents and tasks, respectively, available at step k, with \mathcal{M}_1 = \mathcal{M} and \mathcal{V}_1 = \mathcal{V} . At each step k \in \{1, \dots, M\} , the policy samples a feasible and available agent-task pair, (m_k, v_k) \in \mathcal{E}_k \subseteq \mathcal{E} , where \mathcal{E}_k = \mathcal{E} \cap (\mathcal{M}_k \times \mathcal{V}_k) , from a categorical distribution with probabilities proportional to their scores L_{m_k, v_k} :
75
+
76
+ [p. 4 | section: 4.2 Multi-Action Generation | type: Equation]
77
+ P(a_t^k = (m_k, v_k) \mid \mathbf{a}_t^{< k}, \mathbf{L}) = \frac{\exp(L_{m_k, v_k})}{\sum_{(m', v') \in \mathcal{E}_h} \exp(L_{m', v'})}, (2)
78
+
79
+ [p. 4 | section: 4.2 Multi-Action Generation | type: Text]
80
+ After sampling a_t^k = (m_k, v_k) , the sets for the next step are updated via \mathcal{M}_{k+1} = \mathcal{M}_k \setminus \{m_k\} and \mathcal{V}_{k+1} = \mathcal{V}_k \setminus \{v_k\} and the process continues until all agents are assigned to a task. We summarize this sampling process, which guarantees the generation of a valid matching \mathbf{a}_t , in Algorithm 1. The validity of the resulting distribution is formally stated as follows:
81
+
82
+ [p. 4 | section: 4.2 Multi-Action Generation | type: Text]
83
+ Proposition 1. The function P(\mathbf{a}_t \mid \mathbf{L}) defined by the autoregressive process in Equations 1 and 2 is a valid probability distribution over the space of all possible ordered agent-task matchings. <sup>1</sup>
84
+
85
+ [p. 4 | section: 4.2 Multi-Action Generation | type: Footnote]
86
+ & lt;sup>1</sup>A proof for Proposition 1 can be found in Appendix A.
87
+
88
+ [p. 5 | section: 4.2 Multi-Action Generation | type: Text]
89
+ The injectivity constraint implies that earlier assignments reduce the set of available actions for subsequent agents, making the generation process order-sensitive, even though the final solution is permutation-invariant. Our autoregressive approach explicitly models this dependency: the joint softmax normalization dynamically integrates coordination, since the denominator depends on all remaining agent-task pairs. High logits for a pair (m^*, v^*) implicitly reduce the probability of competing agents choosing the same task, allowing the policy to prioritize favorable assignments and avoid conflicts with-
90
+
91
+ [p. 5 | section: Algorithm 1 Joint Action Sampling from L | type: Text]
92
+ out relying on heuristics or post hoc conflict resolution, as PARCO does.
93
+
94
+ [p. 5 | section: Algorithm 1 Joint Action Sampling from L | type: Text]
95
+ Substituting the definition of P(\mathbf{a}_t \mid \mathbf{L}) from Equation (1) into the decoder-only policy of Section 3 yields the following definition of our MACSIM policy:
96
+
97
+ [p. 5 | section: Algorithm 1 Joint Action Sampling from L | type: Equation]
98
+ P(\tau \mid s_t; \theta) = \prod_{t=1}^{T} \pi_{\theta}(\mathbf{L} \mid s_t) \prod_{k=1}^{M} P(a_t^k \mid \mathbf{a}_t^{< k}, \mathbf{L}) (3)
99
+
100
+ [p. 5 | section: Algorithm 1 Joint Action Sampling from L | type: Text]
101
+ In this formulation, the joint logits {\bf L} are computed only once by the computationally expensive neural policy \pi_{\theta} , after which M actions are generated using a fast autoregressive sampling procedure. As a result, MACSIM can construct solutions significantly faster than fully autoregressive models, as we demonstrate in the experimental section of this paper.
102
+
103
+ [p. 5 | section: 4.3 SKIP TOKEN | type: Text]
104
+ The generative model defined by Equation (3) requires each agent to select an action at every decision step. However, enforcing task assignments for all agents at every step can be suboptimal, particularly in problems with strong inter-agent dependencies. In job-shop scheduling, for instance, the set of available jobs for a machine likely changes as other machines schedule operations. In such cases, it may be beneficial for an agent to wait until a more favorable task becomes available.
105
+
106
+ [p. 5 | section: 4.3 SKIP TOKEN | type: Text]
107
+ Therefore, we introduce a dummy action, referred to as the skip token. The skip token is a transient action that can be chosen by any agent at any time, allowing them to wait until the next decision step without modifying the current solution. To encourage efficient solution construction, each use of the skip token incurs a small penalty added to the objective value. Empirically, we find that annealing this penalty toward zero during training yields the best performance. This strategy encourages the policy to increasingly prioritize generating high-quality solutions as training progresses. We examine the effect of the skip token in Table 3 and provide more details and analyses in Appendix D.3.
108
+
109
+ [p. 5 | section: 4.3 SKIP TOKEN | type: Text]
110
+ Technically, the skip token is implemented as a learnable embedding \mathbf{h}^{\text{skip}} \in \mathbb{R}^d which is added to the set of all task embeddings \mathbf{H}_{\mathcal{V}} . Unlike other actions, the skip token can be selected by multiple agents, with the only restriction that at least one agent selects an actual task.
111
+
112
+ [p. 5 | section: 4.4 POLICY LEARNING | type: Text]
113
+ We train MACSIM with a two-stage self-improvement framework, similar to Pirnay & Grimm (2024) and Corsini et al. (2024). In the first stage, the current best policy \pi_{\theta}^* generates \beta\gg 1 solutions for each problem instance x. We select the best solution with respect to the objective value plus the penalty term for skip token usage, and add the state-action pairs ((s_1, \mathbf{a}_1^*), \ldots, (s_T, \mathbf{a}_T^*)) corresponding to the solution \tau^* to the training dataset. In the second stage, the policy network \pi_{\theta} is updated via imitation learning on these pseudo-expert trajectories.
114
+
115
+ [p. 5 | section: 4.4 POLICY LEARNING | type: Text]
116
+ Unlike prior work that predicts a single "token" from a partial solution, we aim to maximize the likelihood of the policy producing the entire expert multi-agent action \mathbf{a}_t^* given the state s_t . The corresponding negative log-likelihood (NLL) under our generative process of Equation (1) is:
117
+
118
+ [p. 5 | section: 4.4 POLICY LEARNING | type: Equation]
119
+ \mathcal{L}_{\text{ML}} = -\sum_{k=1}^{M} \log P(m_k, v_k \mid \mathbf{a}_t^{< k}) = -\sum_{k=1}^{M} \log \left( \frac{\exp(L_{m_k, v_k})}{\sum_{(m', v') \in \mathcal{E}_k} \exp(L_{m', v'})} \right). \tag{4}
120
+
121
+ [p. 6 | section: 4.4 POLICY LEARNING | type: Text]
122
+ However, direct optimization with \mathcal{L}_{\mathrm{ML}} is problematic. As detailed in Appendix E, its primary flaw is conflicting gradient signals: each term in the sum assumes one assignment is correct at a given step and consequently penalizes all others, including those that occur later in the expert assignments.
123
+
124
+ [p. 6 | section: 4.4 POLICY LEARNING | type: Text]
125
+ A first step to mitigate this issue is to utilize the agent order from the expert assignment. By assuming a fixed agent order \mathbf{m}^* = (m_1, \dots, m_M) the choice of agent at step k becomes deterministic. Thus, P(m_k \mid \mathbf{a}_t^{< k}) = 1 and the probability P(v_k, m_k \mid \mathbf{a}_t^{< k}) can be factorized as P(v_k \mid m_k, \mathbf{a}_t^{< k}) , transforming the generative process into a Plackett-Luce (PL) model (Volkovs & Zemel, 2012). Its NLL computes the loss over the marginal distributions for each agent, preventing gradient conflicts:
126
+
127
+ [p. 6 | section: 4.4 POLICY LEARNING | type: Equation]
128
+ \mathcal{L}_{PL} = -\sum_{k=1}^{M} \log P(v_k \mid m_k, \mathbf{a}_t^{< k}) = -\sum_{k=1}^{M} \log \frac{\exp(L_{m_k, v_k})}{\sum_{v' \in \mathcal{V}_k} \exp(L_{m_k, v'})}. (5)
129
+
130
+ [p. 6 | section: 4.4 POLICY LEARNING | type: Text]
131
+ While this improves gradient stability, the loss remains sensitive to the permutation of the expert sequence. However, every permutation of the assignments in \mathbf{a}^* yields the same solution, which should be reflected in the loss function. Ideally, this would be achieved by averaging the Plackett-Luce loss over all possible M! agent orderings, which is computationally intractable. Therefore, we employ a surrogate\ loss by relaxing the sequential dependence assumption for the loss calculation and treating each agent-task pair in an expert matching as an independent supervised instance with conditional probability P(v\mid m) . This is justified because the expert data consist only of valid matchings, making it unnecessary to enforce the injectivity constraint within the loss itself. This is analogous to bipartite matching in object detection (Carion et al., 2020), where the assignment between predictions and ground-truth objects is first established algorithmically, and losses are then computed independently for each matched pair. The resulting surrogate is defined as the crossentropy (CE) loss summed over all agents:
132
+
133
+ [p. 6 | section: 4.4 POLICY LEARNING | type: Equation]
134
+ \mathcal{L}_{CE} = -\sum_{k=1}^{M} \log P(v_k \mid m_k) = -\sum_{k=1}^{M} \log \frac{\exp(L_{m_k, v_k})}{\sum_{v' \in \mathcal{V}} \exp(L_{m_k, v'})}. (6)
135
+
136
+ [p. 6 | section: 4.4 POLICY LEARNING | type: Text]
137
+ This surrogate is permutation-invariant, computationally efficient, and provides a more robust training signal as we will validate empirically in the experimental section. Moreover, we provide a thorough analysis of \mathcal{L}_{CE} in Appendices E and F.
138
+
139
+ [p. 6 | section: 5 EXPERIMENTS | type: Text]
140
+ We assess the effectiveness of MACSIM on representative multi-agent CO problems, spanning routing and scheduling domains. Specifically, we evaluate MACSIM on two challenging scheduling problems – the flexible job shop scheduling problem (FJSP) and the flexible flow shop problem (FFSP) – as well as a common routing problem, the heterogeneous capacitated vehicle routing problem (HCVRP). We compare MACSIM with common and SOTA solvers for the respective CO problems and the self-improvement method ( SLIM ) of Corsini et al. (2024); Pirnay & Grimm (2024).
141
+
142
+ [p. 6 | section: 5.1 PROBLEMS | type: Text]
143
+ Flexible Job Shop Scheduling Problem. The FJSP is concerned with scheduling N jobs on M machines (agents). Each job consists of a sequence of operations that must be executed in a fixed order. Unlike the classical job shop problem, each operation in FJSP can be processed by a subset of eligible machines \mathcal{M}_k \subseteq \mathcal{M} , with machine-dependent processing times, resulting in a combined routing (assigning operations to machines) and sequencing problem (ordering operations on each machine). The common objective is to minimize the makespan of the resulting schedule. The formal mathematical model and the MMDP formulation of the FJSP are presented in Appendix C.1.
144
+
145
+ [p. 6 | section: 5.1 PROBLEMS | type: Text]
146
+ To evaluate the performance on the FJSP, we compare MACSIM against several baselines. First, we include OR-Tools, a state-of-the-art CP-SAT solver widely applied in scheduling (Col & Teppan, 2019). We also benchmark against classical priority dispatching rules – FIFO (Firt In First Out), MOR (Most Operations Remaining), and MWKR (Most Work Remaining) – commonly used in manufacturing scheduling (Montazeri & Wassenhove, 1990). Lastly, we consider learning-based approaches, including a graph neural network trained via Proximal Policy Optimization (PPO) proposed by Song et al. (2022), and the dual attention model DANIEL (Wang et al., 2023).
147
+
148
+ [p. 6 | section: 5.1 PROBLEMS | type: Footnote]
149
+ & lt;sup>2</sup>Source code is available at
150
+
151
+ [p. 7 | section: 5.1 PROBLEMS | type: Text]
152
+ Flexible Flow Shop Scheduling Problem. The FFSP involves scheduling N jobs that must pass through S sequential processing stages. The key challenge lies in the flexibility at each stage, which contains M parallel machines; a job can be processed by any available machine within a stage. The objective is to determine the assignment and sequence of jobs on machines to minimize the makespan. A detailed problem formulation for the FFSP is provided in Appendix C.2.
153
+
154
+ [p. 7 | section: 5.1 PROBLEMS | type: Text]
155
+ We compare MACSIM against traditional baselines – Gurobi (Gurobi Optimization, LLC, 2025) , a Genetic Algorithm (Hejazi & Saghafian, 2005) , and Particle Swarm Optimization (Singh & Ma hapatra, 2012) – as well as neural baselines: MatNet (Kwon et al., 2021) , PolyNet (Hottung et al., 2025) , and PARCO (Berto et al., 2024) .
156
+
157
+ [p. 7 | section: 5.1 PROBLEMS | type: Text]
158
+ Min-Max Heterogeneous Capacitated Vehicle Routing Problem. The HCVRP is a challenging extension of the classical CVRP, designed to capture more realistic logistics and transportation scenarios. In HCVRP, a fleet of heterogeneous vehicles, each with distinct capacities and travel costs, is responsible for serving a set of customer demands. The objective differs from standard CVRP: instead of minimizing the total cost or distance, the goal is to minimize the maximum route length (or workload) among all vehicles, ensuring a balanced distribution of effort across the fleet. A detailed mathematical formulation for the min-max HCVRP is provided in Appendix C.3.
159
+
160
+ [p. 7 | section: 5.1 PROBLEMS | type: Text]
161
+ For the HCVRP, we employ two well-known heuristic baselines: Simulated Annealing (˙Ilhan, 2021) and SISR (Christiaens & Berghe, 2020) , a state-of-the-art heuristic for solving the CVRP and variants. Neural baselines involve Equity-Transformer (ET) (Son et al., 2024) , DRLLI (Li et al., 2022) , 2D-Ptr (Liu et al., 2024) , and DPN (Zheng et al., 2024) .
162
+
163
+ [p. 7 | section: 5.2 EXPERIMENTAL RESULTS | type: Text]
164
+ We present the main empirical results in Table 1, which reports test-set performance of the evaluated methods in terms of average objective values (Obj.), gaps to the best-known solutions, and average inference latency for a single instance. For neural baselines, we report performance under both greedy ( g. ) and sampling ( s. ) decoding, with the latter evaluated using 1,280 sampled solutions (more details on the experimental setup can be found in Appendix H) . MACSIM consistently outperforms neural baselines across all problem types and sizes, surpasses all methods on FFSP, and substantially reduces the gap to OR-Tools on FJSP, even outperforming it on 20 × 5 instances.
165
+
166
+ [p. 7 | section: 5.2 EXPERIMENTAL RESULTS | type: Text]
167
+ Compared to SLIM, the advantage of MACSIM increases with the number of agents, as shown in Figure 3b for the HCVRP and FFSP. In addition, MACSIM significantly reduces inference time compared to SLIM. For FFSP 50×4 instances, SLIM requires nearly ten times longer than MACSIM to generate a solution. This difference grows with the number of agents, as shown in Figure 3c, which illustrates the number of forward passes needed by each policy to construct a solution and the resulting inference times. MACSIM requires only a fraction of the construction steps used by SLIM, and this advantage further increases with the number of agents due to its multi-agent policy.
168
+
169
+ [p. 7 | section: 5.2 EXPERIMENTAL RESULTS | type: Text]
170
+ While MACSIM is not necessarily the fastest among the neural solvers evaluated here, slower inference times compared to other methods can be attributed to the fact that, like SLIM, MACSIM performs step-wise re-encoding of the problem state. As discussed in previous work, this enables better generalization to out-of-distribution instances (e.g., Luo et al. (2024) ). Table 2 validates this by evaluating models trained on the small FJSP instances of Table 1 on larger instances, where MACSIM outperforms all neural baselines and even OR-Tools on two out of three instance types.
171
+
172
+ [p. 7 | section: 5.2 EXPERIMENTAL RESULTS | type: Text]
173
+ We also conduct an ablation study to assess the impact of MACSIM's components. First, Figure 3a evaluates MACSIM with different sequence generation modes. While "MACSIM-full" refers to the generative model defined by Equation (3) with the sequential sampling algorithm described in Algorithm 1, "MACSIM-random-order" and "MACSIM-fixed-order" denote variants where agents act in random or fixed order, respectively, given logits L. The results in Figure 3a and table 3 highlight the effectiveness of the proposed sampling procedure, particularly on instances with many agents. Moreover, Table 3 confirms the importance of the skip token, which proves especially beneficial in larger instances where coordination among agents is more challenging. Although the skip token increases generation latency, it substantially improves solution quality. A more detailed analysis of the skip token and its penalty is provided in Appendix D where we provide more experiments.
174
+
175
+ [p. 8 | section: 5.2 EXPERIMENTAL RESULTS | type: TableGroup]
176
+ Table 1: Test set performance of MACSIM and baselines on FJSP, FFSP, and HCVRP. Best obj. values found by any solver are shown in bold; grey backgrounds indicate the best neural solver. N \times M 10 5 1 10 \times 5 20 \times 5 15 \times 10 Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time ( OR-Tools 96.32 0.00% 1597 188.15 0.03% 1800 143.53 0.00% 1724 TFO 119.4 23.96% 0.16 216.08 14.88% 0.32 184.55 28.58% 0.51 MOR 115.38 19.79% 0.16 214.16 13.85% 0.32 173.15 20.64% 0.51 /WKR 113.23 17.56% 0.16 209.78 11.53% 0.32 171.25 19.31% 0.50 PPO (g.) 111.67 15.94% 0.45 211.22 12.29% 1.43 166.92 16.30% 1.35 DANIEL (g.) 106.71 10.79% 0.45 197.56 5.03% 0.94 161.28 12.37% 1.43 LIM (g.) 103.85 7.82% 0.91 194.37 3.33% 1.18 154.32 7.62% 2.74 AACSIM (g.) 102.21 6.12% 0.44 191.08 1.58% 0.76 149.84 4.40% 1.32 PO (s.) 105.59 9.62% 1.11 207.53 10.33% 2.36 160.86 12.07% 6.42 DANIEL (s.) 101.67 5.55% 0.74 192.78 2.49% 1.87 153.22 6.75% 6.10 LIM (s.) 98.74 2.51% 2.32 189.08 0.52% 6.91 149.02 3.82% 20.0 MACSIM (s.) 97.64 1.37% 0.86 188.10 0.00% 2.28 145.95 1.69% 6.19 meshi (s.) 77.04 1.5770 0.00 FFSP 0.0070 2.20 143.73 1.07/0 0.17 N \times M_i \times S 20 \times 4 \times 9 FFSP 50 \times 4 \times 9 100 × 4 × 9 • Ob: Ob: Time (s.) Ob: Time Metric Obj. Gap Time (s.) Obj. Gap \ / Obj. Gap Surobi (600s) 31.61 31.93% 600 56.00 10.220 600 - 00.25 12.700 600 Senetic Algorithm 31.15 30.01% 21.05 56.92 19.23% 44.82 99.25 13.79% 89.2 Particle Swarm 29.10 21.45% 46.17 55.10 15.42% 82.46 97.30 11.56% 154 MatNet (g.) 27.26 13.77% 1.22 51.52 7.92% 2.17 91.58 5.00% 4.9 olyNet (g.) 26.71 11.48% 1.69 51.01 6.85% 2.45 91.22 4.59% 5.2 ARCO (g.) 26.31 9.81% 0.26 51.19 7.23% 0.52 91.29 4.67% 0.89 LIM (g.) 26.18 9.27% 0.86 50.01 4.75% 3.36 91.97 5.45% 5.1 MACSIM (g.) 25.75 7.47% 0.28 49.36 3.39% 0.43 89.88 1.86% 0.9 MatNet (s.) 25.43 6.14% 3.88 49.68 4.06% 8.91 89.72 2.87% 18.0 olyNet (s.) 24.98 4.26% 5.04 49.23 3.12% 9.24 89.21 2.28% 19.2 ARCO (s.) 24.78 3.42% 0.99 49.27 3.20% 1.97 89.46 2.57% 4.0 LIM (s.) 24.19 0.96% 1.55 48.13 0.82% 10.21 89.50 2.61% 19.0 MACSIM (s.) 23.96 0.00% 0.49 47.74 0.00% 0.91 87.22 0.00% 3.60 HCVRP N \times M 60 \times 3 80 \times 3 100 \times 3 Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time ISRs 6.57 0.00% 478 8.52 0.00% 750 10.29 0.00% 108 imulated Annealing 7.04 7.15% 382 9.17 7.63% 561 11.13 8.16% 765 ET (g.) 7.58 15.37% 0.28 9.76 14.55% 0.38 11.74 14.09% 0.43 OPN (g.) 7.46 13.54% 0.28 9.66 13.38% 0.40 11.48 11.56% 0.40 \mathrm{DRL}_{Li}\left(g_{\cdot}\right) 7.43 13.09% 0.34 9.64 13.15% 0.46 11.44 11.18% 0.5 D-Ptr (g.) 7.20 9.59% 0.20 9.24 8.45% 0.27 11.12 8.07% 0.3 LIM (g.) 7.19 9.44% 0.63 9.25 8.57% 0.87 11.10 7.87% 1.0 AACSIM (g.) 7.15 8.83% 0.35 9.15 7.39% 0.43 11.02 7.09% 0.73 ET (s.) 7.14 8.68% 0.52 9.19 7.86% 0.66 11.20 8.84% 1.02 OPN (s.) 7.03 7.00% 0.55 9.16 7.51% 0.71 11.03 7.19% 1.0 \mathrm{DRL}_{Li}\left(s.\right) 6.97 6.09% 0.73 9.10 6.81% 1.10 10.90 5.93% 1.4 D-Ptr (s.) 6.82 3.81% 0.32 8.85 3.87% 0.44 10.71 4.08% 0.5 LIM (s.) 6.88 4.75% 2.40 8.92 4.69% 3.31 10.81 5.05% 4.09 2.70 MACSIM (s.) — MACSIM-fi — SLIM 6.76 2.89% 1.65 HCVRP (N = 5) 8.78 3.05% 2.29 10.67 3.69% 2
177
+
178
+ [p. 8 | section: 5.2 EXPERIMENTAL RESULTS | type: FigureGroup]
179
+ Figure 3: Left : Validation performance (makespan) on FJSP 10 \times 5 instances during training under different sequence generation strategies. Middle : Average performance gap of SLIM relative to MACSIM across varying numbers of agents. Right : Inference efficiency comparison, reporting construction steps (lines, right axis) and inference time to generate a solution (bars, left axis).
180
+
181
+ [p. 9 | section: 5.2 EXPERIMENTAL RESULTS | type: TableGroup]
182
+ Table 2: Generalization performance of MACSIM and baseline solvers on larger FJSP instance distributions not seen during training. FJSP N \times M 20 \times 10 30 \times 10 40 \times 10 Metric Obj. Gap Time (s.) Obj. Gap Time (s.) Obj. Gap Time (s.) OR-Tools 195.98 3.14% 1800 274.67 0.00% 1800 365.96 0.08% 1800 PPO (g.) 215.78 13.56% 1.91 312.59 13.81% 2.86 416.18 13.81% 3.82 DANIEL (g.) 198.50 4.46% 1.85 281.49 2.48% 2.76 371.45 1.58% 3.81 SLIM (g.) 195.89 3.09% 3.11 281.87 2.62% 4.57 374.13 2.31% 6.03 MACSIM (g.) 192.15 1.12% 1.19 276.01 0.49% 1.71 365.87 0.05% 2.27 PPO (s.) 214.81 13.05% 6.23 308.55 12.33% 12.79 410.76 12.33% 24.54 DANIEL (s.) 193.91 2.05% 6.35 279.20 1.65% 12.37 370.08 1.21% 21.09 SLIM (s.) 194.19 2.19% 28.15 281.42 2.46% 69.97 373.70 2.20% 139.30 MACSIM (s.) 190.02 0.00% 6.79 275.48 0.29% 14.12 365.67 0.00% 27.13 Table 3: Ablation study on MACSIM components
183
+
184
+ [p. 9 | section: 5.2 EXPERIMENTAL RESULTS | type: TableGroup]
185
+ Table 4: Comparison of Loss Functions FJSP N \times M 10 \times 5 15 \times 10 Metric Obj. Time Obj. Time MACSIM-full (s.) 97.64 0.86 145.95 6.19 w/o AR-sampling fixed (s.) 98.97 0.76 155.13 3.97 random (s.) 98.66 0,78 150.72 4.15 w/o skip-token (s.) 98.69 0.75 159.65 3.89
186
+
187
+ [p. 9 | section: 5.2 EXPERIMENTAL RESULTS | type: Table]
188
+ FJ SP FFSP N \times M 10 \times 5 20 \times 5 20 \times 12 50 \times 12 Metric Obj. Obj. Obj. Obj. \mathcal{L}_{\mathrm{SA}}\left( s.\right) 98.81 189.18 24.29 49.58 \mathcal{L}_{\mathrm{ML}} (s.) 98.13 188.97 24.15 49.02 \mathcal{L}_{PL} (s.) 97.99 188.81 24.08 47.90 \mathcal{L}_{\text{CE}}\left(s.\right) 97.64 188.10 23.96 47.74
189
+
190
+ [p. 9 | section: 5.2 EXPERIMENTAL RESULTS | type: Text]
191
+ Finally, Table 4 compares the loss functions from Section 4.4, along with the single-agent cross-entropy loss \mathcal{L}_{SA} defined in Appendix E.1. Our surrogate set-based cross-entropy loss consistently achieves the best performance on both FJSP and FFSP.
192
+
193
+ [p. 9 | section: 6 Conclusion | type: Text]
194
+ We presented MACSIM, a novel self-improvement framework tailored for multi-agent CO problems. Instead of predicting a single next token, MACSIM learns a multi-agent policy that emits joint agent—task logits in one forward pass and then samples a valid matching autoregressively without replacement. This design captures inter-agent dependencies, prevents conflicts by construction, and amortizes policy computation over multiple assignments, drastically accelerating solution generation. A second key ingredient is a permutation-invariant, set-based learning objective. By supervising on the set of expert agent—task pairs rather than a single agent's next step, MACSIM explicitly exploits agent-permutation symmetries, avoids gradient conflicts inherent to single-action imitation, and promotes coordinated behaviors. A skip token combined with an annealed penalty further enables agents to defer actions when beneficial while keeping construction efficient.
195
+
196
+ [p. 9 | section: 6 Conclusion | type: Text]
197
+ Empirically, MACSIM achieves state-of-the-art results on challenging scheduling and routing benchmarks, consistently improving solution quality. By leveraging the structural symmetries of multi-agent problems, our approach enhances both the performance and scalability of neural solvers, making self-improvement practical for complex, real-world optimization tasks. Overall, MACSIM advances self-improvement for multi-agent CO by unifying joint-action modeling and symmetry-aware learning, yielding a more coordinated, generalizable, and practical solver.
198
+
199
+ [p. 9 | section: 6 Conclusion | type: Text]
200
+ Limitations and Future Work. Although MACSIM substantially improves inference and training time (see Figure 6 for training times) compared to standard self-improvement, its reliance on step-wise encoding results in slower generation than some lightweight neural solvers, which may hinder applicability in latency-critical settings. Future work will therefore focus on further reducing generation latency through more efficient policy architectures. A promising direction is to encode and cache the initial problem state once, and then incrementally update embeddings as the state evolves, rather than re-encoding the entire graph at each step. This strategy could retain MACSIM's ability to leverage multi-agent symmetries while reducing both memory and computational overhead.
iclr26/6KrETIaOYD/paper.blocks.json ADDED
The diff for this file is too large to render. See raw diff
 
iclr26/6KrETIaOYD/paper.md ADDED
The diff for this file is too large to render. See raw diff
 
iclr26/6KrETIaOYD/parse_report.json ADDED
@@ -0,0 +1,75 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "paper_id": "6KrETIaOYD",
3
+ "pipeline": "marker_non_llm_v3",
4
+ "parser": "marker_single",
5
+ "formats": [
6
+ "markdown",
7
+ "chunks"
8
+ ],
9
+ "llm_enabled": false,
10
+ "pdf_path": "/network/scratch/j/jianan.zhao/ReviewAgent/data/processed_papers/iclr26_20260429_1952_all/raw/6KrETIaOYD.pdf",
11
+ "pdf_sha256": "2ca03f891f4d2d577c2c3fde04d6424562a1920ef9c71c6188add2dbbcafaf80",
12
+ "bytes": 932040,
13
+ "source": "https://openreview.net/pdf?id=6KrETIaOYD",
14
+ "page_count": 32,
15
+ "ok": true,
16
+ "elapsed_seconds": 262.7,
17
+ "paper2markdown_v3": {
18
+ "paper_id": "6KrETIaOYD",
19
+ "pipeline": "Paper2Markdown-V3",
20
+ "ok": true,
21
+ "page_count": 32,
22
+ "chunk_count": 278,
23
+ "main_body_chunk_count": 67,
24
+ "appendix_chunk_count": 207,
25
+ "reference_chunk_count": 4,
26
+ "model_text_chars": 41180,
27
+ "raw_markdown_chars": 133891,
28
+ "sanitized_chars": 121999,
29
+ "page_provenance": {
30
+ "min_page": 1,
31
+ "max_page": 32,
32
+ "invalid_count": 0
33
+ },
34
+ "marker_block_type_counts": {
35
+ "Code": 1,
36
+ "Equation": 65,
37
+ "FigureGroup": 8,
38
+ "Footnote": 3,
39
+ "ListGroup": 7,
40
+ "PageFooter": 32,
41
+ "PageHeader": 32,
42
+ "SectionHeader": 78,
43
+ "Table": 3,
44
+ "TableGroup": 7,
45
+ "Text": 193
46
+ },
47
+ "asset_count_raw": 8,
48
+ "asset_count_model_kept": 8,
49
+ "asset_count_rejected": 0,
50
+ "asset_reject_reasons": {
51
+ "kept": 8
52
+ },
53
+ "artifact_leak_audit": {
54
+ "ok": true,
55
+ "hits": {
56
+ "Anonymous Authors": [],
57
+ "ACKNOWLEDGMENT": [],
58
+ "OpenReview": [],
59
+ "\"accept_label\"": [],
60
+ "\"decision\"": [],
61
+ "\"decision_tier\"": [],
62
+ "\"source_status\"": [],
63
+ "Meta-review": [],
64
+ "Official Review": [],
65
+ "official_reviews": [],
66
+ "meta_reviews": [],
67
+ "suggested_verdict_score": []
68
+ },
69
+ "artifact_count": 2
70
+ },
71
+ "default_model_input": "model_text_v3.txt",
72
+ "appendix_input": "appendix_text_v3.txt",
73
+ "reference_input": "reference_text_v3.txt"
74
+ }
75
+ }
iclr26/6KrETIaOYD/reference_chunks.jsonl ADDED
@@ -0,0 +1,4 @@
 
 
 
 
 
1
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0067", "section": "REFERENCES", "page_start": 10, "page_end": 10, "type": "ListGroup", "text": "Irwan Bello, Hieu Pham, Quoc V. Le, Mohammad Norouzi, and Samy Bengio. Neural combinatorial optimization with reinforcement learning. arXiv preprint arXiv:1611.09940 , 2017. Yoshua Bengio, Andrea Lodi, and Antoine Prouvost. Machine learning for combinatorial optimization: a methodological tour d'horizon. European Journal of Operational Research , 290(2): 405–421, 2021. Federico Berto, Chuanbo Hua, Laurin Luttmann, Jiwoo Son, Junyoung Park, Kyuree Ahn, Changhyun Kwon, Lin Xie, and Jinkyoo Park. Parco: Learning parallel autoregressive policies for efficient multi-agent combinatorial optimization. arXiv preprint arXiv:2409.03811 , 2024. Federico Berto, Chuanbo Hua, Junyoung Park, Laurin Luttmann, Yining Ma, Fanchen Bu, Jiarui Wang, Haoran Ye, Minsu Kim, Sanghyeok Choi, et al. RL4CO: an extensive reinforcement learning for combinatorial optimization benchmark. In Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V. 2 , pp. 5278–5289, 2025. Pieter-Tjerk De Boer, Dirk P. Kroese, Shie Mannor, and Reuven Y. Rubinstein. A tutorial on the cross-entropy method. Annals of Operations Research , 134:19–67, 2005. Craig Boutilier. Planning, learning and coordination in multiagent decision processes. In TARK , volume 96, pp. 195–210, 1996. Paolo Brandimarte. Routing and scheduling in a flexible job shop by tabu search. Annals of Opera tions Research , 41(3):157–183, 1993. Quentin Cappart, Didier Chetelat, Elias B. Khalil, Andrea Lodi, Christopher Morris, and Petar ´ Velickovi ˇ c. Combinatorial optimization and reasoning with graph neural networks. ´ Journal of Machine Learning Research , 24(130):1–61, 2023. Nicolas Carion, Francisco Massa, Gabriel Synnaeve, Nicolas Usunier, Alexander Kirillov, and Sergey Zagoruyko. End-to-end object detection with transformers. In European Conference on Computer Vision , pp. 213–229. Springer, 2020. Jan Christiaens and Greet Vanden Berghe. Slack induction by string removals for vehicle routing problems. Transportation Science , 54(2):417–433, 2020. Giacomo Da Col and Erich C. Teppan. Industrial size job shop scheduling tackled by present day CP solvers. In Principles and Practice of Constraint Programming: 25th International Confer ence, CP 2019, Stamford, CT, USA, September 30 – October 4, 2019, Proceedings , pp. 144–160. Springer-Verlag, 2019. doi: 10.1007/978-3-030-30048-7 9. Andrea Corsini, Angelo Porrello, Simone Calderara, and Mauro Dell'Amico. Self-labeling the job shop scheduling problem. In Advances in Neural Information Processing Systems , volume 37, pp. 105528–105551, 2024. Darko Drakulic, Sofia Michel, Florian Mai, Arnaud Sors, and Jean-Marc Andreoli. Bq-nco: Bisimulation quotienting for efficient neural combinatorial optimization. In Advances in Neural Infor mation Processing Systems , volume 36, pp. 77416–77429, 2023. William Falcon and The PyTorch Lightning team. PyTorch Lightning, 3 2019. URL https: //github.com/Lightning-AI/lightning .", "source": "marker_v2", "marker_block_id": "/page/9/ListGroup/220"}
2
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0068", "section": "REFERENCES", "page_start": 11, "page_end": 11, "type": "ListGroup", "text": "Zhang-Hua Fu, Kai-Bin Qiu, and Hongyuan Zha. Generalize a small pre-trained model to arbitrarily large TSP instances. In Proceedings of the AAAI Conference on Artificial Intelligence , volume 35 No. 8, pp. 7474–7482, 2021. Nathan Grinsztajn, Daniel Furelos-Blanco, Shikha Surana, Clement Bonnet, and Tom Barrett. Win- ´ ner takes it all: Training performant RL populations for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 48485–48509, 2023. Gurobi Optimization, LLC. Gurobi Optimizer Reference Manual, 2025. URL gurobi.com . Seyed Reza Hejazi and S. Saghafian. Flowshop-scheduling problems with makespan criterion: a review. International Journal of Production Research , 43(14):2895–2929, 2005. Dan Hendrycks and Kevin Gimpel. Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415 , 2016. Andre Hottung, Mridul Mahajan, and Kevin Tierney. Polynet: Learning diverse solution strategies ´ for neural combinatorial optimization. In Y. Yue, A. Garg, N. Peng, F. Sha, and R. Yu (eds.), International Conference on Representation Learning , volume 2025, pp. 80417–80435, 2025. Johann Hurink, Bernd Jurisch, and Monika Thole. Tabu search for the job-shop scheduling problem with multi-purpose machines. Operations Research Spektrum , 15(4):205–215, 1994. ˙Ilhan ˙Ilhan. An improved simulated annealing algorithm with crossover operator for capacitated vehicle routing problem. Swarm and Evolutionary Computation , 64:100911, 2021. Chaitanya K. Joshi, Thomas Laurent, and Xavier Bresson. An efficient graph convolutional network technique for the travelling salesman problem. arXiv preprint arXiv:1906.01227 , 2019. Elias Khalil, Hanjun Dai, Yuyu Zhang, Bistra Dilkina, and Le Song. Learning combinatorial optimization algorithms over graphs. In Advances in Neural Information Processing Systems , volume 30, 2017. Minsu Kim, Junyoung Park, and Jinkyoo Park. Sym-nco: Leveraging symmetricity for neural combinatorial optimization. In Advances in Neural Information Processing Systems , volume 35, 2022. Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 , 2015. Wouter Kool, Herke van Hoof, and Max Welling. Attention, Learn to Solve Routing Problems! In International Conference on Learning Representations , 2019. Yeong-Dae Kwon, Jinho Choo, Byoungjip Kim, Iljoo Yoon, Youngjune Gwon, and Seungjai Min. Pomo: Policy optimization with multiple optima for reinforcement learning. In Advances in Neural Information Processing Systems , volume 33, pp. 21188–21198, 2020. Yeong-Dae Kwon, Jinho Choo, Iljoo Yoon, Minah Park, Duwon Park, and Youngjune Gwon. Matrix encoding networks for neural combinatorial optimization. In Advances in Neural Information Processing Systems , volume 34, pp. 5138–5149, 2021. Jingwen Li, Yining Ma, Ruize Gao, Zhiguang Cao, Andrew Lim, Wen Song, and Jie Zhang. Deep reinforcement learning for solving the heterogeneous capacitated vehicle routing problem. IEEE Transactions on Cybernetics , 52(12):13572–13585, 2022. doi: 10.1109/TCYB.2021.3111082. Yang Li, Jinpei Guo, Runzhong Wang, and Junchi Yan. T2T: From distribution learning in training to gradient search in testing for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 50020–50040, 2023. Yang Li, Jinpei Guo, Runzhong Wang, Hongyuan Zha, and Junchi Yan. Fast T2T: Optimization consistency speeds up diffusion-based training-to-testing solving for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 37, pp. 30179–30206, 2024.", "source": "marker_v2", "marker_block_id": "/page/10/ListGroup/213"}
3
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0069", "section": "REFERENCES", "page_start": 12, "page_end": 12, "type": "ListGroup", "text": "Qidong Liu, Chaoyue Liu, Shaoyao Niu, Cheng Long, Jie Zhang, and Mingliang Xu. 2D-Ptr: 2D array pointer network for solving the heterogeneous capacitated vehicle routing problem. In Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems , pp. 1238–1246, 2024. Fu Luo, Xi Lin, Fei Liu, Qingfu Zhang, and Zhenkun Wang. Neural combinatorial optimization with heavy decoder: Toward large scale generalization. In Advances in Neural Information Processing Systems , volume 36, 2024. Laurin Luttmann and Lin Xie. Neural combinatorial optimization on heterogeneous graphs: An application to the picker routing problem in mixed-shelves warehouses. In Proceedings of the International Conference on Automated Planning and Scheduling , volume 34, pp. 351–359, 2024. Laurin Luttmann and Lin Xie. Learning to solve the min-max mixed-shelves picker-routing problem via hierarchical and parallel decoding. arXiv preprint arXiv:2502.10233 , 2025. Sahil Manchanda, Sofia Michel, Darko Drakulic, and Jean-Marc Andreoli. On the generalization of neural combinatorial optimization heuristics. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases , pp. 426–442. Springer, 2022. Mrn Montazeri and L. N. Van Wassenhove. Analysis of scheduling rules for an FMS. The Interna tional Journal of Production Research , 28(4):785–802, 1990. Mohammadreza Nazari, Afshin Oroojlooy, Lawrence Snyder, and Martin Takac. Reinforcement ´ learning for solving the vehicle routing problem. In Advances in Neural Information Processing Systems , volume 31, 2018. Cemal Ozg ¨ uven, Lale ¨ Ozbakır, and Yasemin Yavuz. Mathematical models for job-shop scheduling ¨ problems with routing and process plan flexibility. Applied Mathematical Modelling , 34(6):1539– 1548, 2010. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. Pytorch: An imperative style, high-performance deep learning library. In Advances in Neural Information Processing Systems , volume 32, 2019. Jonathan Pirnay and Dominik G. Grimm. Self-improvement for neural combinatorial optimization: Sample without replacement, but improvement. Transactions on Machine Learning Research , 2024. ISSN 2835-8856. Ruizhong Qiu, Zhiqing Sun, and Yiming Yang. Dimes: A differentiable meta solver for combinatorial optimization problems. In Advances in Neural Information Processing Systems , volume 35, pp. 25531–25546, 2022. Manas Ranjan Singh and S. S. Mahapatra. A swarm optimization approach for flexible flow shop scheduling with multiprocessor tasks. The International Journal of Advanced Manufacturing Technology , 62:267–277, 2012. Jiwoo Son, Minsu Kim, Sanghyeok Choi, Hyeonah Kim, and Jinkyoo Park. Equity-Transformer: Solving NP-Hard Min-Max Routing Problems as Sequential Generation with Equity Context. In Proceedings of the AAAI Conference on Artificial Intelligence , volume 38 No. 18, pp. 20265– 20273, 2024. Wen Song, Xinyang Chen, Qiqiang Li, and Zhiguang Cao. Flexible job-shop scheduling via graph neural network and deep reinforcement learning. IEEE Transactions on Industrial Informatics , 19(2):1600–1610, 2022. Zhiqing Sun and Yiming Yang. Difusco: Graph-based diffusion solvers for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 3706–3731, 2023. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, and Illia Polosukhin. Attention is all you need. In Advances in Neural Infor mation Processing Systems , volume 30, 2017.", "source": "marker_v2", "marker_block_id": "/page/11/ListGroup/221"}
4
+ {"paper_id": "6KrETIaOYD", "chunk_id": "6KrETIaOYD:0070", "section": "REFERENCES", "page_start": 13, "page_end": 13, "type": "ListGroup", "text": "Oriol Vinyals, Meire Fortunato, and Navdeep Jaitly. Pointer networks. In Advances in Neural Information Processing Systems , volume 28, 2015. Maksims Volkovs and Richard Zemel. Efficient sampling for bipartite matching problems. In Ad vances in Neural Information Processing Systems , volume 25, 2012. Runqing Wang, Gang Wang, Jian Sun, Fang Deng, and Jie Chen. Flexible job shop scheduling via dual attention network-based reinforcement learning. IEEE Transactions on Neural Networks and Learning Systems , 35(3):3091–3102, 2023. Ronald J. Williams. Simple statistical gradient-following algorithms for connectionist reinforcement learning. Machine Learning , 8:229–256, 1992. Haoran Ye, Jiarui Wang, Zhiguang Cao, Helan Liang, and Yong Li. DeepACO: Neural-enhanced ant systems for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 43706–43728, 2023. Zhi Zheng, Shunyu Yao, Zhenkun Wang, Xialiang Tong, Mingxuan Yuan, and Ke Tang. DPN: decoupling partition and navigation for neural solvers of min–max vehicle routing problems. In Proceedings of the 41st International Conference on Machine Learning , ICML'24. JMLR.org, 2024.", "source": "marker_v2", "marker_block_id": "/page/12/ListGroup/76"}
iclr26/6KrETIaOYD/reference_text_v3.txt ADDED
@@ -0,0 +1,11 @@
 
 
 
 
 
 
 
 
 
 
 
 
1
+ [p. 10 | section: REFERENCES | type: ListGroup]
2
+ Irwan Bello, Hieu Pham, Quoc V. Le, Mohammad Norouzi, and Samy Bengio. Neural combinatorial optimization with reinforcement learning. arXiv preprint arXiv:1611.09940 , 2017. Yoshua Bengio, Andrea Lodi, and Antoine Prouvost. Machine learning for combinatorial optimization: a methodological tour d'horizon. European Journal of Operational Research , 290(2): 405–421, 2021. Federico Berto, Chuanbo Hua, Laurin Luttmann, Jiwoo Son, Junyoung Park, Kyuree Ahn, Changhyun Kwon, Lin Xie, and Jinkyoo Park. Parco: Learning parallel autoregressive policies for efficient multi-agent combinatorial optimization. arXiv preprint arXiv:2409.03811 , 2024. Federico Berto, Chuanbo Hua, Junyoung Park, Laurin Luttmann, Yining Ma, Fanchen Bu, Jiarui Wang, Haoran Ye, Minsu Kim, Sanghyeok Choi, et al. RL4CO: an extensive reinforcement learning for combinatorial optimization benchmark. In Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V. 2 , pp. 5278–5289, 2025. Pieter-Tjerk De Boer, Dirk P. Kroese, Shie Mannor, and Reuven Y. Rubinstein. A tutorial on the cross-entropy method. Annals of Operations Research , 134:19–67, 2005. Craig Boutilier. Planning, learning and coordination in multiagent decision processes. In TARK , volume 96, pp. 195–210, 1996. Paolo Brandimarte. Routing and scheduling in a flexible job shop by tabu search. Annals of Opera tions Research , 41(3):157–183, 1993. Quentin Cappart, Didier Chetelat, Elias B. Khalil, Andrea Lodi, Christopher Morris, and Petar ´ Velickovi ˇ c. Combinatorial optimization and reasoning with graph neural networks. ´ Journal of Machine Learning Research , 24(130):1–61, 2023. Nicolas Carion, Francisco Massa, Gabriel Synnaeve, Nicolas Usunier, Alexander Kirillov, and Sergey Zagoruyko. End-to-end object detection with transformers. In European Conference on Computer Vision , pp. 213–229. Springer, 2020. Jan Christiaens and Greet Vanden Berghe. Slack induction by string removals for vehicle routing problems. Transportation Science , 54(2):417–433, 2020. Giacomo Da Col and Erich C. Teppan. Industrial size job shop scheduling tackled by present day CP solvers. In Principles and Practice of Constraint Programming: 25th International Confer ence, CP 2019, Stamford, CT, USA, September 30 – October 4, 2019, Proceedings , pp. 144–160. Springer-Verlag, 2019. doi: 10.1007/978-3-030-30048-7 9. Andrea Corsini, Angelo Porrello, Simone Calderara, and Mauro Dell'Amico. Self-labeling the job shop scheduling problem. In Advances in Neural Information Processing Systems , volume 37, pp. 105528–105551, 2024. Darko Drakulic, Sofia Michel, Florian Mai, Arnaud Sors, and Jean-Marc Andreoli. Bq-nco: Bisimulation quotienting for efficient neural combinatorial optimization. In Advances in Neural Infor mation Processing Systems , volume 36, pp. 77416–77429, 2023. William Falcon and The PyTorch Lightning team. PyTorch Lightning, 3 2019. URL https: //github.com/Lightning-AI/lightning .
3
+
4
+ [p. 11 | section: REFERENCES | type: ListGroup]
5
+ Zhang-Hua Fu, Kai-Bin Qiu, and Hongyuan Zha. Generalize a small pre-trained model to arbitrarily large TSP instances. In Proceedings of the AAAI Conference on Artificial Intelligence , volume 35 No. 8, pp. 7474–7482, 2021. Nathan Grinsztajn, Daniel Furelos-Blanco, Shikha Surana, Clement Bonnet, and Tom Barrett. Win- ´ ner takes it all: Training performant RL populations for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 48485–48509, 2023. Gurobi Optimization, LLC. Gurobi Optimizer Reference Manual, 2025. URL gurobi.com . Seyed Reza Hejazi and S. Saghafian. Flowshop-scheduling problems with makespan criterion: a review. International Journal of Production Research , 43(14):2895–2929, 2005. Dan Hendrycks and Kevin Gimpel. Gaussian error linear units (gelus). arXiv preprint arXiv:1606.08415 , 2016. Andre Hottung, Mridul Mahajan, and Kevin Tierney. Polynet: Learning diverse solution strategies ´ for neural combinatorial optimization. In Y. Yue, A. Garg, N. Peng, F. Sha, and R. Yu (eds.), International Conference on Representation Learning , volume 2025, pp. 80417–80435, 2025. Johann Hurink, Bernd Jurisch, and Monika Thole. Tabu search for the job-shop scheduling problem with multi-purpose machines. Operations Research Spektrum , 15(4):205–215, 1994. ˙Ilhan ˙Ilhan. An improved simulated annealing algorithm with crossover operator for capacitated vehicle routing problem. Swarm and Evolutionary Computation , 64:100911, 2021. Chaitanya K. Joshi, Thomas Laurent, and Xavier Bresson. An efficient graph convolutional network technique for the travelling salesman problem. arXiv preprint arXiv:1906.01227 , 2019. Elias Khalil, Hanjun Dai, Yuyu Zhang, Bistra Dilkina, and Le Song. Learning combinatorial optimization algorithms over graphs. In Advances in Neural Information Processing Systems , volume 30, 2017. Minsu Kim, Junyoung Park, and Jinkyoo Park. Sym-nco: Leveraging symmetricity for neural combinatorial optimization. In Advances in Neural Information Processing Systems , volume 35, 2022. Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 , 2015. Wouter Kool, Herke van Hoof, and Max Welling. Attention, Learn to Solve Routing Problems! In International Conference on Learning Representations , 2019. Yeong-Dae Kwon, Jinho Choo, Byoungjip Kim, Iljoo Yoon, Youngjune Gwon, and Seungjai Min. Pomo: Policy optimization with multiple optima for reinforcement learning. In Advances in Neural Information Processing Systems , volume 33, pp. 21188–21198, 2020. Yeong-Dae Kwon, Jinho Choo, Iljoo Yoon, Minah Park, Duwon Park, and Youngjune Gwon. Matrix encoding networks for neural combinatorial optimization. In Advances in Neural Information Processing Systems , volume 34, pp. 5138–5149, 2021. Jingwen Li, Yining Ma, Ruize Gao, Zhiguang Cao, Andrew Lim, Wen Song, and Jie Zhang. Deep reinforcement learning for solving the heterogeneous capacitated vehicle routing problem. IEEE Transactions on Cybernetics , 52(12):13572–13585, 2022. doi: 10.1109/TCYB.2021.3111082. Yang Li, Jinpei Guo, Runzhong Wang, and Junchi Yan. T2T: From distribution learning in training to gradient search in testing for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 50020–50040, 2023. Yang Li, Jinpei Guo, Runzhong Wang, Hongyuan Zha, and Junchi Yan. Fast T2T: Optimization consistency speeds up diffusion-based training-to-testing solving for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 37, pp. 30179–30206, 2024.
6
+
7
+ [p. 12 | section: REFERENCES | type: ListGroup]
8
+ Qidong Liu, Chaoyue Liu, Shaoyao Niu, Cheng Long, Jie Zhang, and Mingliang Xu. 2D-Ptr: 2D array pointer network for solving the heterogeneous capacitated vehicle routing problem. In Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems , pp. 1238–1246, 2024. Fu Luo, Xi Lin, Fei Liu, Qingfu Zhang, and Zhenkun Wang. Neural combinatorial optimization with heavy decoder: Toward large scale generalization. In Advances in Neural Information Processing Systems , volume 36, 2024. Laurin Luttmann and Lin Xie. Neural combinatorial optimization on heterogeneous graphs: An application to the picker routing problem in mixed-shelves warehouses. In Proceedings of the International Conference on Automated Planning and Scheduling , volume 34, pp. 351–359, 2024. Laurin Luttmann and Lin Xie. Learning to solve the min-max mixed-shelves picker-routing problem via hierarchical and parallel decoding. arXiv preprint arXiv:2502.10233 , 2025. Sahil Manchanda, Sofia Michel, Darko Drakulic, and Jean-Marc Andreoli. On the generalization of neural combinatorial optimization heuristics. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases , pp. 426–442. Springer, 2022. Mrn Montazeri and L. N. Van Wassenhove. Analysis of scheduling rules for an FMS. The Interna tional Journal of Production Research , 28(4):785–802, 1990. Mohammadreza Nazari, Afshin Oroojlooy, Lawrence Snyder, and Martin Takac. Reinforcement ´ learning for solving the vehicle routing problem. In Advances in Neural Information Processing Systems , volume 31, 2018. Cemal Ozg ¨ uven, Lale ¨ Ozbakır, and Yasemin Yavuz. Mathematical models for job-shop scheduling ¨ problems with routing and process plan flexibility. Applied Mathematical Modelling , 34(6):1539– 1548, 2010. Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. Pytorch: An imperative style, high-performance deep learning library. In Advances in Neural Information Processing Systems , volume 32, 2019. Jonathan Pirnay and Dominik G. Grimm. Self-improvement for neural combinatorial optimization: Sample without replacement, but improvement. Transactions on Machine Learning Research , 2024. ISSN 2835-8856. Ruizhong Qiu, Zhiqing Sun, and Yiming Yang. Dimes: A differentiable meta solver for combinatorial optimization problems. In Advances in Neural Information Processing Systems , volume 35, pp. 25531–25546, 2022. Manas Ranjan Singh and S. S. Mahapatra. A swarm optimization approach for flexible flow shop scheduling with multiprocessor tasks. The International Journal of Advanced Manufacturing Technology , 62:267–277, 2012. Jiwoo Son, Minsu Kim, Sanghyeok Choi, Hyeonah Kim, and Jinkyoo Park. Equity-Transformer: Solving NP-Hard Min-Max Routing Problems as Sequential Generation with Equity Context. In Proceedings of the AAAI Conference on Artificial Intelligence , volume 38 No. 18, pp. 20265– 20273, 2024. Wen Song, Xinyang Chen, Qiqiang Li, and Zhiguang Cao. Flexible job-shop scheduling via graph neural network and deep reinforcement learning. IEEE Transactions on Industrial Informatics , 19(2):1600–1610, 2022. Zhiqing Sun and Yiming Yang. Difusco: Graph-based diffusion solvers for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 3706–3731, 2023. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Łukasz Kaiser, and Illia Polosukhin. Attention is all you need. In Advances in Neural Infor mation Processing Systems , volume 30, 2017.
9
+
10
+ [p. 13 | section: REFERENCES | type: ListGroup]
11
+ Oriol Vinyals, Meire Fortunato, and Navdeep Jaitly. Pointer networks. In Advances in Neural Information Processing Systems , volume 28, 2015. Maksims Volkovs and Richard Zemel. Efficient sampling for bipartite matching problems. In Ad vances in Neural Information Processing Systems , volume 25, 2012. Runqing Wang, Gang Wang, Jian Sun, Fang Deng, and Jie Chen. Flexible job shop scheduling via dual attention network-based reinforcement learning. IEEE Transactions on Neural Networks and Learning Systems , 35(3):3091–3102, 2023. Ronald J. Williams. Simple statistical gradient-following algorithms for connectionist reinforcement learning. Machine Learning , 8:229–256, 1992. Haoran Ye, Jiarui Wang, Zhiguang Cao, Helan Liang, and Yong Li. DeepACO: Neural-enhanced ant systems for combinatorial optimization. In Advances in Neural Information Processing Systems , volume 36, pp. 43706–43728, 2023. Zhi Zheng, Shunyu Yao, Zhenkun Wang, Xialiang Tong, Mingxuan Yuan, and Ke Tang. DPN: decoupling partition and navigation for neural solvers of min–max vehicle routing problems. In Proceedings of the 41st International Conference on Machine Learning , ICML'24. JMLR.org, 2024.
iclr26/6KrETIaOYD/sanitization_report.json ADDED
@@ -0,0 +1,58 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "paper_id": "6KrETIaOYD",
3
+ "pipeline": "Paper2Markdown-V3",
4
+ "ok": true,
5
+ "page_count": 32,
6
+ "chunk_count": 278,
7
+ "main_body_chunk_count": 67,
8
+ "appendix_chunk_count": 207,
9
+ "reference_chunk_count": 4,
10
+ "model_text_chars": 41180,
11
+ "raw_markdown_chars": 133891,
12
+ "sanitized_chars": 121999,
13
+ "page_provenance": {
14
+ "min_page": 1,
15
+ "max_page": 32,
16
+ "invalid_count": 0
17
+ },
18
+ "marker_block_type_counts": {
19
+ "Code": 1,
20
+ "Equation": 65,
21
+ "FigureGroup": 8,
22
+ "Footnote": 3,
23
+ "ListGroup": 7,
24
+ "PageFooter": 32,
25
+ "PageHeader": 32,
26
+ "SectionHeader": 78,
27
+ "Table": 3,
28
+ "TableGroup": 7,
29
+ "Text": 193
30
+ },
31
+ "asset_count_raw": 8,
32
+ "asset_count_model_kept": 8,
33
+ "asset_count_rejected": 0,
34
+ "asset_reject_reasons": {
35
+ "kept": 8
36
+ },
37
+ "artifact_leak_audit": {
38
+ "ok": true,
39
+ "hits": {
40
+ "Anonymous Authors": [],
41
+ "ACKNOWLEDGMENT": [],
42
+ "OpenReview": [],
43
+ "\"accept_label\"": [],
44
+ "\"decision\"": [],
45
+ "\"decision_tier\"": [],
46
+ "\"source_status\"": [],
47
+ "Meta-review": [],
48
+ "Official Review": [],
49
+ "official_reviews": [],
50
+ "meta_reviews": [],
51
+ "suggested_verdict_score": []
52
+ },
53
+ "artifact_count": 2
54
+ },
55
+ "default_model_input": "model_text_v3.txt",
56
+ "appendix_input": "appendix_text_v3.txt",
57
+ "reference_input": "reference_text_v3.txt"
58
+ }
iclr26/6KrETIaOYD/sanitized_v3.txt ADDED
The diff for this file is too large to render. See raw diff