{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T05:51:54Z","timestamp":1746769914839},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474120"},{"type":"electronic","value":"9783319474137"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47413-7_8","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T20:20:15Z","timestamp":1475612415000},"page":"129-138","source":"Crossref","is-referenced-by-count":4,"title":["Patrolling a Pipeline"],"prefix":"10.1007","author":[{"given":"Steve","family":"Alpern","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Lidbetter","sequence":"additional","affiliation":[]},{"given":"Alec","family":"Morton","sequence":"additional","affiliation":[]},{"given":"Katerina","family":"Papadaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"crossref","first-page":"1246","DOI":"10.1287\/opre.1110.0983","volume":"59","author":"S Alpern","year":"2011","unstructured":"Alpern, S., Morton, A., Papadaki, K.: Patrolling games. Oper. Res. 59(5), 1246\u20131257 (2011)","journal-title":"Oper. Res."},{"key":"8_CR2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.artint.2012.03.003","volume":"184","author":"N Basilico","year":"2012","unstructured":"Basilico, N., Gatti, N., Amigoni, F.: Patrolling security games: definition and algorithms for solving large instances with single patroller and single intruder. Artif. Intell. 184, 78\u2013123 (2012)","journal-title":"Artif. Intell."},{"issue":"1","key":"8_CR3","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/BF01580113","volume":"5","author":"J Edmonds","year":"1973","unstructured":"Edmonds, J., Johnson, E.L.: Matching, Euler tours and the Chinese postman. Math. Program. 5(1), 88\u2013124 (1973)","journal-title":"Math. Program."},{"issue":"3","key":"8_CR4","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1287\/opre.1120.1149","volume":"61","author":"KY Lin","year":"2013","unstructured":"Lin, K.Y., Atkinson, M.P., Chung, T.H., Glazebrook, K.D.: A graph patrol problem with random attack times. Oper. Res. 61(3), 694\u2013710 (2013)","journal-title":"Oper. Res."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Papadaki, K., Alpern, S., Lidbetter, T., Morton, A.: Patrolling a Border: Oper. Res. (2016, in press)","DOI":"10.1287\/opre.2016.1511"},{"key":"8_CR6","unstructured":"Pita, J., Jain, M., Marecki, J., Ord\u00f3\u00f1ez, F., Portway, C., Tambe, M., Western, C., Paruchuri, P., Kraus, S.: Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems: Industrial Track, pp. 125\u2013132. International Foundation for Autonomous Agents and Multiagent Systems (2008)"},{"key":"8_CR7","unstructured":"Yang, R., Ford, B., Tambe, M., Lemieux, A.: Adaptive resource allocation for wildlife protection against illegal poachers. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, pp. 453\u2013460. International Foundation for Autonomous Agents and Multiagent Systems (2014)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47413-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T00:20:42Z","timestamp":1498350042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47413-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474120","9783319474137"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47413-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}