2008 IEEE International Conference on Robotics and Automation 2008
DOI: 10.1109/robot.2008.4543563
|View full text |Cite
|
Sign up to set email alerts
|

Multi-robot perimeter patrol in adversarial settings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
205
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 182 publications
(210 citation statements)
references
References 8 publications
3
205
0
2
Order By: Relevance
“…The key point was that if a bandit were only activated finitely many times under a policy, the remaining rewards from that bandit were discounted to 0 by the assumption of Eq. (2).…”
Section: Assumptions C and C And Zeno's Hypothesismentioning
confidence: 99%
“…The key point was that if a bandit were only activated finitely many times under a policy, the remaining rewards from that bandit were discounted to 0 by the assumption of Eq. (2).…”
Section: Assumptions C and C And Zeno's Hypothesismentioning
confidence: 99%
“…As mentioned in the introduction, Stackelberg games have been widely applied to security domains, although most of this work has considered static targets (e.g., Korzhyk et al, 2010;Krause, Roper, & Golovin, 2011;Letchford & Vorobeychik, 2012 Agmon, Kraus, and Kaminka (2008) proposed algorithms for computing mixed strategies for setting up a perimeter patrol in adversarial settings with mobile robot patrollers. Similarly, Basilico, Gatti, and Amigoni (2009) computed randomized leader strategies for robotic patrolling in environments with arbitrary topologies.…”
Section: Related Workmentioning
confidence: 99%
“…Robots are then distributed from their initial positions to their sub-regions, and finally, each robot patrols its sub-region in order to detect a possible intrusion of an adversary agent into that sub-region. Agmon et al (2008b) studied patrolling a cyclic boundary, in which the robots' goal is to maximize their rewards by detecting an adversary agent, which attempts to penetrate through a point on the boundary unknown to the robots. In their scenario, the full-knowledge adversary knows the location of the robots and the patrol strategy and needs a time interval of length t to accomplish the intrusion.…”
Section: Adversarial Repeated Coveragementioning
confidence: 99%