{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:21:30Z","timestamp":1775665290696,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031210891","type":"print"},{"value":"9783031210907","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-21090-7_8","type":"book-chapter","created":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T18:11:35Z","timestamp":1671041495000},"page":"115-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Role of\u00a0Heterogeneity in\u00a0Autonomous Perimeter Defense Problems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3698-7639","authenticated-orcid":false,"given":"Aviv","family":"Adler","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0167-1992","authenticated-orcid":false,"given":"Oscar","family":"Mickelin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4396-0127","authenticated-orcid":false,"given":"Ragesh K.","family":"Ramachandran","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2408-474X","authenticated-orcid":false,"given":"Gaurav S.","family":"Sukhatme","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2225-7275","authenticated-orcid":false,"given":"Sertac","family":"Karaman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,15]]},"reference":[{"key":"8_CR1","unstructured":"Adler, A., Mickelin, O., Ramachandran, R.K., Sukhatme, G.S., Karaman, S.: The role of heterogeneity in autonomous perimeter defense problems (2022). arXiv:abs\/2202.10433"},{"key":"8_CR2","unstructured":"Casey, M.: Drones bring fight and flight to battle against poachers. Sci. Am. (online) 20 (2014)"},{"key":"8_CR3","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. 2nd edn. The MIT Press (2001)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Fuchs, Z.E., Khargonekar, P.P., Evers, J.: Cooperative defense within a single-pursuer, two-evader pursuit evasion differential game. In: Proceedings of the IEEE Conference on Decision Control (CDC), pp. 3091\u20133097 (2010)","DOI":"10.1109\/CDC.2010.5717894"},{"key":"8_CR5","unstructured":"Isaacs, R.: Differential Games: A Mathematical Theory with Applications to Warfare and Pursuit, Control and Optimization. SIAM Series in Applied mathematics, Wiley (1965)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Lee, E.S., Shishika, D., Kumar, V.: Perimeter-defense game between aerial defender and ground intruder. In: Proceedings of the IEEE Conference on Decision Control (CDC), pp. 1530\u20131536 (2020)","DOI":"10.1109\/CDC42340.2020.9304213"},{"issue":"12","key":"8_CR7","doi-asserted-by":"publisher","first-page":"3537","DOI":"10.3390\/s20123537","volume":"20","author":"G Lykou","year":"2020","unstructured":"Lykou, G., Moustakas, D., Gritzalis, D.: Defending airports from UAS: a survey on cyber-attacks and counter-drone sensing technologies. Sensors 20(12), 3537 (2020)","journal-title":"Sensors"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/LRA.2022.3155805","volume":"7","author":"S Mayya","year":"2022","unstructured":"Mayya, S., Ramachandran, R.K., Zhou, L., Senthil, V., Thakur, D., Sukhatme, G.S., Kumar, V.: Adaptive and risk-aware target tracking for robot teams with heterogeneous sensors. IEEE Robot. Autom. Lett. 7(2), 5615\u20135622 (2022)","journal-title":"IEEE Robot. Autom. Lett."},{"key":"8_CR9","unstructured":"National Interagency Fire Center: Statistics. https:\/\/www.nifc.gov\/fire-information\/statistics. Accessed: 2022-02-01"},{"key":"8_CR10","unstructured":"Puterman, M.L.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley (2014)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Ramachandran, R.K., Preiss, J.A., Sukhatme, G.S.: Resilience by reconfiguration: exploiting heterogeneity in robot teams. In: 2019 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 6518\u20136525 (2019)","DOI":"10.1109\/IROS40897.2019.8968611"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TRO.2021.3128313","volume":"38","author":"RK Ramachandran","year":"2022","unstructured":"Ramachandran, R.K., Pierpaoli, P., Egerstedt, M., Sukhatme, G.S.: Resilient monitoring in heterogeneous multi-robot systems through network reconfiguration. IEEE Trans. Robot. 38(1), 126\u2013138 (2022)","journal-title":"IEEE Trans. Robot."},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10458-020-09461-y","volume":"34","author":"H Ravichandar","year":"2020","unstructured":"Ravichandar, H., Shaw, K., Chernova, S.: Strata: unified framework for task assignments in large teams of heterogeneous agents. Auton. Agent. Multi-Agent Syst. 34(2), 1\u201325 (2020)","journal-title":"Auton. Agent. Multi-Agent Syst."},{"key":"8_CR14","unstructured":"Missiles, R.: Defense: Iron Dome System and SkyHunter Missile. https:\/\/www.raytheonmissilesanddefense.com\/capabilities\/products\/irondome. Accessed: 2022-02-01"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Santos, M., Egerstedt, M.: Coverage control for multi-robot teams with heterogeneous sensing capabilities using limited communications. In: IEEE International Conference on Intelligent Robots and Systems (IROS), pp. 5313\u20135319 (2018)","DOI":"10.1109\/IROS.2018.8594056"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Shishika, D., Kumar, V.: Local-game decomposition for multiplayer perimeter-defense problem. In: Proceedings IEEE Conference on Decision and Control, pp. 2093\u20132100 (2018)","DOI":"10.1109\/CDC.2018.8618879"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-030-64793-3_26","volume-title":"Decision and Game Theory for Security","author":"D Shishika","year":"2020","unstructured":"Shishika, D., Kumar, V.: A review of multi agent perimeter defense games. In: Zhu, Q., Baras, J.S., Poovendran, R., Chen, J. (eds.) Decision and Game Theory for Security, pp. 472\u2013485. Springer International Publishing, Cham (2020)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Shishika, D., Paulos, J., Dorothy, M.R., Ani\u00a0Hsieh, M., Kumar, V.: Team composition for perimeter defense with patrollers and defenders. In: Proceedings IEEE Conference on Decision and Control (CDC), pp. 7325\u20137332 (2019)","DOI":"10.1109\/CDC40024.2019.9030082"},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"2738","DOI":"10.1109\/LRA.2020.2972818","volume":"5","author":"D Shishika","year":"2020","unstructured":"Shishika, D., Paulos, J., Kumar, V.: Cooperative team strategies for multi-player perimeter-defense games. IEEE Robot. Autom. Lett. 5(2), 2738\u20132745 (2020)","journal-title":"IEEE Robot. Autom. Lett."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Twu, P., Mostofi, Y., Egerstedt, M.: A measure of heterogeneity in multi-agent systems. In: 2014 Proceedings of the American Control Conference, pp. 3972\u20133977 (2014)","DOI":"10.1109\/ACC.2014.6858632"},{"issue":"8","key":"8_CR21","first-page":"407","volume":"17","author":"A Von Moll","year":"2020","unstructured":"Von Moll, A., Garcia, E., Casbeer, D., Suresh, M., Swar, S.C.: Multiple-pursuer, single-evader border defense differential game. J. Aerosp. Inf. Syst. 17(8), 407\u2013416 (2020)","journal-title":"J. Aerosp. Inf. Syst."},{"issue":"3","key":"8_CR22","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/TCYB.2018.2794769","volume":"49","author":"R Yan","year":"2019","unstructured":"Yan, R., Shi, Z., Zhong, Y.: Reach-avoid games with two defenders and one attacker: an analytical approach. IEEE Trans. Cybern. 49(3), 1035\u20131046 (2019)","journal-title":"IEEE Trans. Cybern."}],"container-title":["Springer Proceedings in Advanced Robotics","Algorithmic Foundations of Robotics XV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21090-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T18:17:11Z","timestamp":1671041831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21090-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,15]]},"ISBN":["9783031210891","9783031210907"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21090-7_8","relation":{},"ISSN":["2511-1256","2511-1264"],"issn-type":[{"value":"2511-1256","type":"print"},{"value":"2511-1264","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,15]]},"assertion":[{"value":"15 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAFR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on the Algorithmic Foundations of Robotics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":", MD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wafr2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wafr2022.github.io","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}