Afficher la notice abrégée

hal.structure.identifierDépartement d'Informatique et d'Ingénierie [DII]
dc.contributor.authorCZYZOWICZ, Jurek
hal.structure.identifierDepartment of Computer Science [Liverpool]
dc.contributor.authorGASIENIEC, Leszek
hal.structure.identifierAlgorithmics for computationally intensive applications over wide scale distributed platforms [CEPAGE]
hal.structure.identifierLaboratoire Bordelais de Recherche en Informatique [LaBRI]
dc.contributor.authorKOSOWSKI, Adrian
hal.structure.identifierSchool of Computer Science (Carleton, Ottawa)
dc.contributor.authorKRANAKIS, Evangelos
dc.contributor.editorCamil Demetrescu and Magnús M. Halldórsson
dc.date.accessioned2024-04-15T09:46:34Z
dc.date.available2024-04-15T09:46:34Z
dc.date.issued2011-09-01
dc.date.conference2011-09-05
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/198018
dc.description.abstractEnA set of k mobile agents are placed on the boundary of a simply connected planar object represented by a cycle of unit length. Each agent has its own predefined maximal speed, and is capable of moving around this boundary without exceeding its maximal speed. The agents are required to protect the boundary from an intruder which attempts to penetrate to the interior of the object through a point of the boundary, unknown to the agents. The intruder needs some time interval of length τ to accomplish the intrusion. Will the intruder be able to penetrate into the object, or is there an algorithm allowing the agents to move perpetually along the boundary, so that no point of the boundary remains unprotected for a time period τ? Such a problem may be solved by designing an algorithm which defines the motion of agents so as to minimize the idle time I, i.e., the longest time interval during which any fixed boundary point remains unvisited by some agent, with the obvious goal of achieving I < τ. Depending on the type of the environment, this problem is known as either boundary patrolling or fence patrolling in the robotics literature. The most common heuristics adopted in the past include the cyclic strategy, where agents move in one direction around the cycle covering the environment, and the partition strategy, in which the environment is partitioned into sections patrolled separately by individual agents. This paper is, to our knowledge, the first study of the fundamental problem of boundary patrolling by agents with distinct maximal speeds. In this scenario, we give special attention to the performance of the cyclic strategy and the partition strategy. We propose general bounds and methods for analyzing these strategies, obtaining exact results for cases with 2, 3, and 4 agents. We show that there are cases when the cyclic strategy is optimal, cases when the partition strategy is optimal and, perhaps more surprisingly, novel, alternative methods have to be used to achieve optimality.
dc.language.isoen
dc.publisherSpringer
dc.title.enBoundary Patrolling by Mobile Agents with Distinct Maximal Speeds
dc.typeCommunication dans un congrès
dc.identifier.doi10.1007/978-3-642-23719-5_59
dc.subject.halInformatique [cs]/Algorithme et structure de données [cs.DS]
bordeaux.page701-712
bordeaux.volume6942
bordeaux.hal.laboratoriesLaboratoire Bordelais de Recherche en Informatique (LaBRI) - UMR 5800*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.titleESA 2011 - 19th Annual European Symposium on Algorithms
bordeaux.countryDE
bordeaux.conference.citySaarbruecken
bordeaux.peerReviewedoui
hal.identifierhal-00646910
hal.version1
hal.invitednon
hal.proceedingsoui
hal.conference.end2011-09-09
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//hal-00646910v1
bordeaux.COinSctx_ver=Z39.88-2004&amp;rft_val_fmt=info:ofi/fmt:kev:mtx:journal&amp;rft.date=2011-09-01&amp;rft.volume=6942&amp;rft.spage=701-712&amp;rft.epage=701-712&amp;rft.au=CZYZOWICZ,%20Jurek&amp;GASIENIEC,%20Leszek&amp;KOSOWSKI,%20Adrian&amp;KRANAKIS,%20Evangelos&amp;rft.genre=unknown


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée