@Article{         BrazdilHlinenyKuceraRehakAbaffy,
  Author        = "Br{\'a}zdil, Tom{\'a}{\v s} and Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n and {\v R}eh{\'a}k, Vojt{\v e}ch and Abaffy, Mat{\'u}{\v s}",
  Abstract      = "Patrolling is one of the central problems in operational security. Formally, a patrolling problem is specified by a set $U$ of nodes (admissible defender's positions), a set $T \subseteq U$ of vulnerable targets, an admissible defender's moves over $U$, and a function which to every target assigns the time needed to complete an intrusion at it. The goal is to design an optimal strategy for a defender who is moving from node to node and aims at detecting possible intrusions at the targets. The goal of the attacker is to maximize the probability of a successful attack. We assume that the attacker is adversarial, i.e., he knows the strategy of the defender and can observe her moves.",
  date-added    = "2015-09-02 09:54:46 +0000",
  date-modified = "2015-09-02 09:54:46 +0000",
  EPrint        = "1507.03407",
  Month         = "07",
  Title         = "Strategy Synthesis in Adversarial Patrolling Games",
  URL           = "http://arxiv.org/abs/1507.03407",
  Year          = "2015",
  bdsk-url-1    = "http://arxiv.org/abs/1507.03407",
  File          = "Strategy Synthesis in Adversarial Patrolling Games - Brázdil, Hliněný, Kučera, Řehák, Abaffy (0) (0) - a - a - m.pdf"
}

@Article{ BrazdilHlinenyKuceraRehakAbaffy, Author = "Br{\'a}zdil, Tom{\'a}{\v s} and Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n and {\v R}eh{\'a}k, Vojt{\v e}ch and Abaffy, Mat{\'u}{\v s}", Abstract = "Patrolling is one of the central problems in operational security. Formally, a patrolling problem is specified by a set $U$ of nodes (admissible defender's positions), a set $T \subseteq U$ of vulnerable targets, an admissible defender's moves over $U$, and a function which to every target assigns the time needed to complete an intrusion at it. The goal is to design an optimal strategy for a defender who is moving from node to node and aims at detecting possible intrusions at the targets. The goal of the attacker is to maximize the probability of a successful attack. We assume that the attacker is adversarial, i.e., he knows the strategy of the defender and can observe her moves.", date-added = "2015-09-02 09:54:46 +0000", date-modified = "2015-09-02 09:54:46 +0000", EPrint = "1507.03407", Month = "07", Title = "Strategy Synthesis in Adversarial Patrolling Games", URL = "http://arxiv.org/abs/1507.03407", Year = "2015", bdsk-url-1 = "http://arxiv.org/abs/1507.03407", File = "Strategy Synthesis in Adversarial Patrolling Games - Brázdil, Hliněný, Kučera, Řehák, Abaffy (0) (0) - a - a - m.pdf" }

Library Size: 13G (12941 entries), Last Updated: Apr 04, 2026, 18:14:59, Build Time: N/A badge