Evacuating robots via unknown exit in a disk
Consider k mobile robots inside a circular disk of unit radius. The robots are required to
evacuate the disk through an unknown exit point situated on its boundary. We assume all …
evacuate the disk through an unknown exit point situated on its boundary. We assume all …
Search on a line with faulty robots
J Czyzowicz, E Kranakis, D Krizanc… - Proceedings of the …, 2016 - dl.acm.org
We consider the problem of searching on a line using n mobile robots, of which at most f are
faulty, and the remaining are reliable. The robots start at the same location and move in …
faulty, and the remaining are reliable. The robots start at the same location and move in …
Group search and evacuation
J Czyzowicz, K Georgiou, E Kranakis - Distributed Computing by Mobile …, 2019 - Springer
Group search and evacuation are fundamental tasks performed by a set of co-operating,
autonomous mobile agents. The two tasks are similar in that they both aim to search a given …
autonomous mobile agents. The two tasks are similar in that they both aim to search a given …
Natural search algorithms as a bridge between organisms, evolution, and ecology
The ability to navigate is a hallmark of living systems, from single cells to higher animals.
Searching for targets, such as food or mates in particular, is one of the fundamental …
Searching for targets, such as food or mates in particular, is one of the fundamental …
Computing optimal strategies for a search game in discrete locations
J Clarkson, KY Lin - INFORMS Journal on Computing, 2024 - pubsonline.informs.org
Consider a two-person zero-sum search game between a hider and a searcher. The hider
hides among n discrete locations, and the searcher successively visits individual locations …
hides among n discrete locations, and the searcher successively visits individual locations …
Blotto game with testing (the locks, bombs and testing model)
IM Sonin - Stochastics, 2024 - Taylor & Francis
We present a Defense/Attack resource allocation model, where the Defender has some
number of 'locks' to protect n vulnerable boxes (sites), and the Attacker is trying to destroy …
number of 'locks' to protect n vulnerable boxes (sites), and the Attacker is trying to destroy …
Linear search by a pair of distinct-speed robots
Two mobile robots are initially placed at the same point on an infinite line. Each robot may
move on the line in either direction not exceeding its maximal speed. The robots need to find …
move on the line in either direction not exceeding its maximal speed. The robots need to find …
Hide-and-seek game with capacitated locations and imperfect detection
B Bahamondes, M Dahan - Decision Analysis, 2024 - pubsonline.informs.org
We consider a variant of the hide-and-seek game in which a seeker inspects multiple hiding
locations to find multiple items hidden by a hider. Each hiding location has a maximum …
locations to find multiple items hidden by a hider. Each hiding location has a maximum …
A classical search game in discrete locations
J Clarkson, KY Lin… - Mathematics of Operations …, 2023 - pubsonline.informs.org
Consider a two-person zero-sum search game between a hider and a searcher. The hider
hides among n discrete locations, and the searcher successively visits individual locations …
hides among n discrete locations, and the searcher successively visits individual locations …
The expanding search ratio of a graph
We study the problem of searching for a hidden target in an environment that is modeled by
an edge-weighted graph. A sequence of edges is chosen starting from a given root vertex …
an edge-weighted graph. A sequence of edges is chosen starting from a given root vertex …