2018
DOI: 10.1007/s10479-018-2966-0
|View full text |Cite
|
Sign up to set email alerts
|

Approximate solutions for expanding search games on general networks

Abstract: We study the classical problem introduced by R. Isaacs and S. Gal of minimizing the time to find a hidden point H on a network Q moving from a known starting point. Rather than adopting the traditional continuous unit speed path paradigm, we use the "expanding search" paradigm recently introduced by the authors. Here the regions S (t) that have been searched by time t are increasing from the starting point and have total length t. Roughly speaking the search follows a sequence of arcs a i such that each one st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(53 citation statements)
references
References 29 publications
0
52
0
1
Order By: Relevance
“…Expanding search on a network was introduced in (Alpern & Lidbetter, 2013), with the focus on the Bayesian problem of minimizing the expected search time against a known Hider distribution. In a followup paper (Alpern & Lidbetter, 2019), the same authors studied expanding search on general networks and gave two strategy classes that have expected search times that are within a factor close to 1 of the value of the game. Both these works apply to the unnormalized search time.…”
Section: Related Workmentioning
confidence: 99%
“…Expanding search on a network was introduced in (Alpern & Lidbetter, 2013), with the focus on the Bayesian problem of minimizing the expected search time against a known Hider distribution. In a followup paper (Alpern & Lidbetter, 2019), the same authors studied expanding search on general networks and gave two strategy classes that have expected search times that are within a factor close to 1 of the value of the game. Both these works apply to the unnormalized search time.…”
Section: Related Workmentioning
confidence: 99%
“…Introduction the network: the intruder and the agent. The intruder tries to optimize the value of the system, for example by (1) computing the shortest path between a source node and a sink node [14,36,59]; (2) maximizing the amount of flow through the network [18,76,113]; (3) maximizing the probability of completing a route [29,92,93,101]. The agent attempts to intercept the intruder before the goal is achieved.…”
Section: Game Theory In the Security Domainmentioning
confidence: 99%
“…Consider a network with 3 nodes. There are two players with routes R (1) = {{1}, {2}} and R (2) = {{2}, {3}}. The payoff functions for player 1 and 2 are given by:…”
Section: Finding Pure Nash Equilibriamentioning
confidence: 99%
See 2 more Smart Citations