2013
DOI: 10.1007/s10472-013-9383-5
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative exploration and protection of a workspace assisted by information networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 23 publications
(36 citation statements)
references
References 31 publications
0
36
0
Order By: Relevance
“…As far as we know, our intruder capturing strategy is unique in robustness to time delay in data transfer. (Using the same argument as presented in this article, we can prove that the strategy in the study by Kim 15 is robust to time delay using the network. However, Kim 15 did not discuss its robustness to time delay.)…”
Section: Introductionmentioning
confidence: 66%
See 3 more Smart Citations
“…As far as we know, our intruder capturing strategy is unique in robustness to time delay in data transfer. (Using the same argument as presented in this article, we can prove that the strategy in the study by Kim 15 is robust to time delay using the network. However, Kim 15 did not discuss its robustness to time delay.)…”
Section: Introductionmentioning
confidence: 66%
“…In our article, we consider a workspace such that information nodes are deployed along the Voronoi diagram in the workspace. The networking strategy in the study by Kim 15 can be applied to build the information network along the Voronoi diagram. In this section, we briefly introduce the networking strategy in the study by Kim.…”
Section: Cooperative Exploration and Networking Strategy In 15mentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, our algorithms require less memory compared to other multi-robot networking algorithms in the literature. 5,26,27 SCN algorithms use two rules for exploration and networking: boundary updating rule and boundary merging rule. These two rules search for an unexplored vertex along EB, thus can be implemented utilizing the data of vertices…”
Section: Complexity Analysismentioning
confidence: 99%