Monotonicity in graph searching
Journal of Algorithms
Searching for a mobile intruder in a polygonal region
SIAM Journal on Computing
Recontamination does not help to search a graph
Journal of the ACM (JACM)
The complexity of pursuit on a graph
Theoretical Computer Science
Erratum to "Vickrey Pricing and Shortest Paths: What is an Edge Worth?"
FOCS '02 Proceedings of the 43rd Symposium on Foundations of Computer Science
Visibility-Based Pursuit-Evasion in a Polygonal Region by a Searcher
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Finding the most vital node of a shortest path
Theoretical Computer Science - Computing and combinatorics
Randomized Pursuit-Evasion with Local Visibility
SIAM Journal on Discrete Mathematics
The role of information in the cop-robber game
Theoretical Computer Science
Search and pursuit-evasion in mobile robotics
Autonomous Robots
Randomized pursuit-evasion in a polygonal environment
IEEE Transactions on Robotics
Capturing an evader in a polygonal environment with obstacles
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume Three
Capture bounds for visibility-based pursuit evasion
Proceedings of the twenty-ninth annual symposium on Computational geometry
Hi-index | 0.00 |
Suppose an unpredictable evader is free to move around in a polygonal environment of arbitrary complexity that is under full camera surveillance. How many pursuers, each with the same maximum speed as the evader, are necessary and sufficient to guarantee a successful capture of the evader? The pursuers always know the evader's current position through a camera network, but need to physically reach the evader to capture it. We allow the evader knowledge of the current positions of all the pursuers as well-this accords with the standard worst-case analysis model, but also models a practical situation where the evader has 'hacked' into the surveillance system. Our main result is to prove that three pursuers are always sufficient and sometimes necessary to capture the evader. The bound is independent of the number of vertices or holes in the polygonal environment.