@Article{ BrazdilHlinenyKuceraRehakAbaffy,
Author = "Br{\'a}zdil, Tom{\'a}{\v s} and Hlin{\v e}n{\'y}, Petr and Ku{\v c}era, Anton{\'\i}n and {\v R}eh{\'a}k, Vojt{\v e}ch and Abaffy, Mat{\'u}{\v s}",
Abstract = "Patrolling is one of the central problems in operational security. Formally, a patrolling problem is specified by a set $U$ of nodes (admissible defender's positions), a set $T \subseteq U$ of vulnerable targets, an admissible defender's moves over $U$, and a function which to every target assigns the time needed to complete an intrusion at it. The goal is to design an optimal strategy for a defender who is moving from node to node and aims at detecting possible intrusions at the targets. The goal of the attacker is to maximize the probability of a successful attack. We assume that the attacker is adversarial, i.e., he knows the strategy of the defender and can observe her moves.",
date-added = "2015-09-02 09:54:46 +0000",
date-modified = "2015-09-02 09:54:46 +0000",
EPrint = "1507.03407",
Month = "07",
Title = "Strategy Synthesis in Adversarial Patrolling Games",
URL = "http://arxiv.org/abs/1507.03407",
Year = "2015",
bdsk-url-1 = "http://arxiv.org/abs/1507.03407",
File = "Strategy Synthesis in Adversarial Patrolling Games - Brázdil, Hliněný, Kučera, Řehák, Abaffy (0) (0) - a - a - m.pdf"
}
Library Size: 13G (12941 entries),
Last Updated: Apr 04, 2026, 18:14:59,
Build Time: N/A