2012
DOI: 10.1609/aimag.v33i3.2420
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability, and Safety

Abstract: A key feature of the AAMAS conference is its emphasis on ties to real-world applications. The focus of this article is to provide a broad overview of application-focused papers published at the AAMAS 2010 and 2011 conferences. More specifically, recent applications at AAMAS could be broadly categorized as belonging to research areas of security, sustainability and safety. We outline the domains of applications, key research thrusts underlying each such application area, and emerging trends.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 48 publications
0
20
0
Order By: Relevance
“…Given that OP T T SP ≥ |V T SP |, we have that such a tour has a cost not larger than OP T T SP − 1 + 2(1 − β)|V T SP | ≤ OP T T SP (3 − 2β). Therefore, the tour is a (3 − 2β)-approximation for TSP (1,2). Since TSP(1,2) is not approximable in polynomial time for any approximation ratio smaller than α, we have the constraint that 3 − 2β ≥ α, and therefore that β ≤ 3−α 2 .…”
Section: Lemmamentioning
confidence: 99%
“…Given that OP T T SP ≥ |V T SP |, we have that such a tour has a cost not larger than OP T T SP − 1 + 2(1 − β)|V T SP | ≤ OP T T SP (3 − 2β). Therefore, the tour is a (3 − 2β)-approximation for TSP (1,2). Since TSP(1,2) is not approximable in polynomial time for any approximation ratio smaller than α, we have the constraint that 3 − 2β ≥ α, and therefore that β ≤ 3−α 2 .…”
Section: Lemmamentioning
confidence: 99%
“…The problem of patrolling environments with autonomous mobile robots has attracted the attention of many researchers both within the Autonomous Robotics and the Multiagent Systems communities [2,14]. It can be considered as an instance of a general class of problems related to surveillance and security [19] and can be generalized from detecting intruders to detecting any kind of threats.…”
Section: Patrolling Environments To Prevent Intrusionsmentioning
confidence: 99%
“…Given this model, a game theoretical perspective is adopted [19]: the patroller (i.e., the autonomous mobile robot) and the intruder are considered to play a strategic game that develops along a discrete timespan. At each time step, one of the two players performs an action (for the patroller, moving from one location of the environment to another location; for the intruder, entering or not the environment) and the combination of their actions determines the final outcome of the game (e.g., the intruder has been detected or the intruder successfully entered the environment).…”
Section: Patrolling Environments To Prevent Intrusionsmentioning
confidence: 99%
“…The area of applications of Agents can be structured in three areas [2], say security, sustainability and safety, pointing out real systems and algorithms at work in airports, fire brigades or armed forces. In Security, we find Game Theory for deploying resources to defend targets of terrorism (ARMOR, IRIS) and for scheduling assistants for (GUARDS, PROTECT).…”
Section: Solving Real Problensmentioning
confidence: 99%