Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Efrat, L. Guibas, Sariel Har-Peled, David Lin, Joseph Mitchell, T. Murali (2000)
Sweeping simple polygons with a chain of guards
A. LaPaugh (1993)
Recontamination does not help to search a graphJ. ACM, 40
L. Kirousis, C. Papadimitriou (1986)
Searching and PebblingTheor. Comput. Sci., 47
L. Guibas, J. Latombe, S. LaValle, David Lin, R. Motwani (1999)
A Visibility-Based Pursuit-Evasion ProblemInt. J. Comput. Geom. Appl., 9
(1972)
Zelikin: A certain differential game with incomplete information
I. Chatzigiannakis, S. Nikoletseas, P. Spirakis (2001)
An efficient communication strategy for ad-hoc mobile networks
N. Megiddo, S. Hakimi, M. Garey, David Johnson, C. Papadimitriou (1981)
The complexity of searching a graph22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
S. Gal (1979)
Search games with mobile and immobile hider, SIAMJ. Control Optimization, 17
M.I. Zelikin (1972)
A certain differential game with incomplete informationDoklady Akademii Nauk SSSR, 202
R. Aleliunas, R. Karp, R. Lipton, L. Lovász, C. Rackoff (1979)
Random walks, universal traversal sequences, and the complexity of maze problems20th Annual Symposium on Foundations of Computer Science (sfcs 1979)
Y. Babichenko, Y. Peres, R. Peretz, Perla Sousi, P. Winkler (2012)
Hunter, Cauchy Rabbit, and Optimal Kakeya SetsTransactions of the American Mathematical Society, 366
M. Adler, Harald Räcke, N. Sivadasan, C. Sohler, Berthold Vöcking (2002)
Randomized Pursuit-Evasion in GraphsCombinatorics, Probability and Computing, 12
F. Spitzer (1965)
Principles Of Random Walk
T. Parsons (1978)
Pursuit-evasion in a graph
Brian Gerkey, Sebastian Thrun, Geoffrey Gordon (2004)
Visibility-based Pursuit-evasion with Limited Field of ViewThe International Journal of Robotics Research, 25
D. Wishart (1966)
Differential Games. A Mathematical Theory with Applications to Warfare and Pursuit, Control and OptimizationPhysics Bulletin, 17
S. Gal (1979)
Search Games with Mobile and Immobile HiderSiam Journal on Control and Optimization, 17
I. Suzuki, M. Yamashita (1992)
Searching for a Mobile Intruder in a Polygonal RegionSIAM J. Comput., 21
(1965)
Differential games, A mathematical theory with applications to warfare and pursuit, control and optimization
N. Megiddo, S.L. Hakimi, M.R. Garey, D.S. Johnson, C.H. Papadimitriou (1988)
The complexity of searching a graphJ. ACM, 35
I. Suzuki, M. Yamasita (1992)
Searching for a mobile intruder in a polygonal region, SIAMJ. Comput, 21
G. Lawler (1991)
Intersections of random walks
I. Chatzigiannakis, S. Nikoletseas, Nearchos Paspallis, P. Spirakis, C. Zaroliagis (2001)
An Experimental Study of Basic Communication Protocols in Ad-hoc Mobile Networks
(1978)
The search number of a connected graph
We analyze the Hunter vs. Rabbit game on a graph, which is a model of communication in adhoc mobile networks. Let G be a cycle graph with N nodes. The hunter can move from a vertex to a vertex along an edge. The rabbit can jump from any vertex to any vertex on the graph. We formalize the game using the random walk framework. The strategy of the rabbit is formalized using a one dimensional random walk over [InlineMediaObject not available: see fulltext.]. We classify strategies using the order O(k −β−1) of their Fourier transformation. We investigate lower bounds and upper bounds of the probability that the hunter catches the rabbit. We found a constant lower bound if β∈(0,1) which does not depend on the size N of the graph. We show the order is equivalent to O(1/logN) if β=1 and a lower bound is 1/N (β−1)/β if β∈(1,2]. These results help us to choose the parameter β of a rabbit strategy according to the size N of the given graph. We introduce a formalization of strategies using a random walk, theoretical estimation of bounds of a probability that the hunter catches the rabbit, and also show computing simulation results.
Pacific Journal of Mathematics for Industry – Springer Journals
Published: Jun 2, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.