{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T22:16:45Z","timestamp":1649110605457},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T00:00:00Z","timestamp":1549238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Robot"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s10514-019-09833-8","type":"journal-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T11:32:37Z","timestamp":1549279957000},"page":"691-703","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive target tracking with a mixed team of static and mobile guards: deployment and activation strategies"],"prefix":"10.1007","volume":"44","author":[{"given":"Guillermo J.","family":"Laguna","sequence":"first","affiliation":[]},{"given":"Sourabh","family":"Bhattacharya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,4]]},"reference":[{"key":"9833_CR1","volume-title":"Multi-camera networks: Principles and applications","author":"H Aghajan","year":"2009","unstructured":"Aghajan, H., & Cavallaro, A. (2009). Multi-camera networks: Principles and applications. Cambridge: Academic Press."},{"issue":"6018","key":"9833_CR2","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1126\/science.1197448","volume":"331","author":"RG Baraniuk","year":"2011","unstructured":"Baraniuk, R. G. (2011). More is less: Signal processing and the data deluge. Science, 331(6018), 717\u2013719.","journal-title":"Science"},{"key":"9833_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-4757-5","volume-title":"H-infinity optimal control and related minimax design problems: A dynamic game approach","author":"T Ba\u015far","year":"2008","unstructured":"Ba\u015far, T., & Bernhard, P. (2008). H-infinity optimal control and related minimax design problems: A dynamic game approach. New York: Springer."},{"key":"9833_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77974-2","volume-title":"Computational geometry: Algorithms and applications","author":"M Berg","year":"2008","unstructured":"Berg, M., Cheong, O., Kreveld, M., & Overmars, M. (2008). Computational geometry: Algorithms and applications (3rd ed.). Santa Clara, CA: Springer.","edition":"3"},{"key":"9833_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Baar, T., & Falcone, M. (2014). Numerical approximation for a visibility based pursuit-evasion game. In Proceedings of IEEE\/RSJ international conference on intelligent robots and systems (pp. 68\u201375).","DOI":"10.1109\/IROS.2014.6942542"},{"issue":"7","key":"9833_CR6","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1177\/0278364909354628","volume":"29","author":"S Bhattacharya","year":"2010","unstructured":"Bhattacharya, S., & Hutchinson, S. (2010). On the existence of Nash equilibrium for a two-player pursuit-evasion game with visibility constraints. The International Journal of Robotics Research, 29(7), 831\u2013839.","journal-title":"The International Journal of Robotics Research"},{"issue":"14","key":"9833_CR7","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1177\/0278364911415885","volume":"30","author":"S Bhattacharya","year":"2011","unstructured":"Bhattacharya, S., & Hutchinson, S. (2011). A cell decomposition approach to visibility-based pursuit evasion among obstacles. The International Journal of Robotics Research, 30(14), 1709\u20131727.","journal-title":"The International Journal of Robotics Research"},{"key":"9833_CR8","doi-asserted-by":"crossref","unstructured":"Bhatti, S., & Xu, J. (2009). Survey of target tracking protocols using wireless sensor network. In Proceedings of fifth international conference on wireless and mobile communications (pp. 110\u2013115).","DOI":"10.1109\/ICWMC.2009.25"},{"issue":"5","key":"9833_CR9","doi-asserted-by":"publisher","first-page":"2294","DOI":"10.1109\/TSP.2007.893213","volume":"55","author":"Y Chen","year":"2007","unstructured":"Chen, Y., Zhao, Q., Krishnamurthy, V., & Djonin, D. (2007). Transmission scheduling for optimizing sensor network lifetime: A stochastic shortest path approach. IEEE Transactions on Signal Processing, 55(5), 2294\u20132309.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"9833_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/0095-8956(75)90061-1","volume":"18","author":"V Chvatal","year":"1975","unstructured":"Chvatal, V. (1975). A combinatorial theorem in plane geometry. Journal of Combinatorial Theory Series B, 18, 39\u201341.","journal-title":"Journal of Combinatorial Theory Series B"},{"issue":"6","key":"9833_CR11","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s11036-005-4441-9","volume":"10","author":"J Deng","year":"2005","unstructured":"Deng, J., Han, Y. S., Heinzelman, W. B., & Varshney, P. K. (2005). Scheduling sleeping nodes in high density cluster-based sensor networks. Mobile Networks and Applications, 10(6), 825\u2013835.","journal-title":"Mobile Networks and Applications"},{"key":"9833_CR12","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-40313-2_29","volume-title":"Mathematical foundations of computer science 2013","author":"S Durocher","year":"2013","unstructured":"Durocher, S., & Mehrabi, S. (2013). Guarding orthogonal art galleries using sliding cameras: Algorithmic and hardness results. In K. Chatterjee & J. Sgall (Eds.), Mathematical foundations of computer science 2013 (pp. 314\u2013324). Berlin: Springer."},{"issue":"13","key":"9833_CR13","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1177\/0278364915602321","volume":"34","author":"K Hausman","year":"2015","unstructured":"Hausman, K., M\u00fcller, J., Hariharan, A., Ayanian, N., & Sukhatme, G. S. (2015). Cooperative multi-robot control for target tracking with onboard sensing. The International Journal of Robotics Research, 34(13), 1660\u20131677.","journal-title":"The International Journal of Robotics Research"},{"issue":"5","key":"9833_CR14","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.dsp.2005.02.005","volume":"16","author":"Y He","year":"2006","unstructured":"He, Y., & Chong, E. K. (2006). Sensor scheduling for target tracking: A Monte Carlo sampling approach. Digital Signal Processing, 16(5), 533\u2013545.","journal-title":"Digital Signal Processing"},{"key":"9833_CR15","unstructured":"Hoffmann, F. (1990). On the rectilinear art gallery problem. In M. S. Paterson (Ed.), Automata, languages and programming: Proceedings of 17th international Colloquium Warwick University, England (pp. 717\u2013728). Berlin: Springer."},{"issue":"4","key":"9833_CR16","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/TAC.1964.1105763","volume":"9","author":"Y Ho","year":"1964","unstructured":"Ho, Y., & Lee, R. (1964). A Bayesian approach to problems in stochastic estimation and control. IEEE Transactions on Automatic Control, 9(4), 333\u2013339.","journal-title":"IEEE Transactions on Automatic Control"},{"key":"9833_CR17","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-4-431-65941-9_30","volume":"5","author":"A Howard","year":"2002","unstructured":"Howard, A., Mataric, M. J., & Sukhatme, G. S. (2002). Mobile sensor network deployment using potential fields: A distributed, scalable solution to the area coverage problem. Distributed Autonomous Robotic Systems, 5, 299\u2013308.","journal-title":"Distributed Autonomous Robotic Systems"},{"key":"9833_CR18","unstructured":"Isler, V., Kannan, S., & Khanna, S. (2004). Randomized pursuit-evasion with limited visibility. In Proceedings of ACM-SIAM symposium on discrete algorithms (SODA) (pp. 1053\u20131063)."},{"key":"9833_CR19","unstructured":"Jung, B., & Sukhatme, G. S. (2002). Tracking anonymous targets using a robotics sensor network. In AAAI spring symposium. AAAI Press."},{"key":"9833_CR20","unstructured":"Kumar, S., Lai, T. H., & Balogh, J. (2004). On k-coverage in a mostly sleeping sensor network. In Proceedings of the 10th annual international conference on mobile computing and networking, MobiCom \u201904 (pp. 144\u2013158). New York, NY: ACM."},{"key":"9833_CR21","doi-asserted-by":"crossref","unstructured":"Laguna, G. J., & Bhattacharya, S. (2017). Hybrid system for target tracking in triangulation graphs. In Proceedings of IEEE international conference on robotics and automation (ICRA) (pp. 839\u2013844).","DOI":"10.1109\/ICRA.2017.7989102"},{"key":"9833_CR22","doi-asserted-by":"crossref","unstructured":"Laguna, G. J., Zou, R., & Bhattacharya, S. (2016). Target tracking on triangulation graphs. In Proceedings of IEEE\/RSJ international conference on intelligent robots and systems (IROS) (pp. 460\u2013465).","DOI":"10.1109\/IROS.2016.7759094"},{"key":"9833_CR23","doi-asserted-by":"crossref","unstructured":"LaValle, S., Lin, D., Guibas, L., Latombe, J. C., & Motwani, R. (1997). Finding an unpredictable target in a workspace with obstacles. In Proceedings of IEEE international conference on robotics and automation (vol.\u00a01, pp. 737\u2013742).","DOI":"10.1109\/ROBOT.1997.620123"},{"key":"9833_CR24","unstructured":"Luke, S., Sullivan, K., Panait, L., & Balan, G. (2005). Tunably decentralized algorithms for cooperative target observation. In Proceedings of the fourth international joint conference on autonomous agents and multiagent systems, AAMAS \u201905 (pp. 911\u2013917). New York, NY: ACM."},{"key":"9833_CR25","doi-asserted-by":"crossref","unstructured":"Megiddo, N., Hakimi, S. L., Garey, M. R., Johnson, D. S., & Papadimitriou, C. H. (1981). The complexity of searching a graph. In 22nd Annual symposium on foundations of computer science (SFCS 1981) (pp. 376\u2013385).","DOI":"10.1109\/SFCS.1981.46"},{"key":"9833_CR26","unstructured":"Mehmetcik, E., & Ozguner, U. (2013). Centralized target tracking with propagation delayed measurements. In Proceedings of the 16th international conference on information fusion (pp. 820\u2013826)."},{"key":"9833_CR27","doi-asserted-by":"crossref","unstructured":"Murrieta-Cid, R., Gonzalez, H., & Tovar, B. (2002). A reactive motion planner to maintain visibility of unpredictable targets. In Proceedings of IEEE international conference on robotics and automation (pp. 4242\u20134248).","DOI":"10.1109\/ROBOT.2002.1014421"},{"issue":"3","key":"9833_CR28","first-page":"273","volume":"14","author":"J O\u2019Rourke","year":"1983","unstructured":"O\u2019Rourke, J. (1983). Galleries need fewer mobile guards a variation on Chv\u00e1tal\u2019s theorem. Geometriae Dedicata, 14(3), 273\u2013283.","journal-title":"Geometriae Dedicata"},{"key":"9833_CR29","volume-title":"Art gallery theorems and algorithms","author":"J O\u2019Rourke","year":"1987","unstructured":"O\u2019Rourke, J. (1987). Art gallery theorems and algorithms. New York, NY: Oxford University Press."},{"key":"9833_CR30","unstructured":"Simon, G., Mar\u00f3ti, M., L\u00e9deczi, A., Balogh, G., Kusy, B., N\u00e1das, A., Pap, G., Sallai, J., & Frampton, K. (2004). Sensor network-based countersniper system. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys \u201904 (pp. 1\u201312). New York, NY: ACM."},{"issue":"5","key":"9833_CR31","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1137\/0221051","volume":"21","author":"I Suzuki","year":"1992","unstructured":"Suzuki, I., & Yamashita, M. (1992). Searching for a mobile intruder in a polygonal region. SIAM Journal on Computing, 21(5), 863\u2013888.","journal-title":"SIAM Journal on Computing"},{"issue":"6","key":"9833_CR32","doi-asserted-by":"publisher","first-page":"1219","DOI":"10.1109\/TSMCC.2012.2198055","volume":"42","author":"T Theodoridis","year":"2012","unstructured":"Theodoridis, T., & Hu, H. (2012). Toward intelligent security robots: A survey. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1219\u20131230.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"9833_CR33","unstructured":"Tian, D., & Georganas, N. D. (2002). A coverage-preserving node scheduling scheme for large wireless sensor networks. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications, WSNA \u201902 (pp. 32\u201341). New York, NY: ACM."},{"issue":"2","key":"9833_CR34","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIC.2006.26","volume":"10","author":"G Werner-Allen","year":"2006","unstructured":"Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., et al. (2006). Deploying a wireless sensor network on an active volcano. IEEE Internet Computing, 10(2), 18\u201325.","journal-title":"IEEE Internet Computing"},{"key":"9833_CR35","doi-asserted-by":"crossref","unstructured":"Williams, R. K., & Sukhatme, G. S. (2015). Observability in topology-constrained multi-robot target tracking. In Proceedings of IEEE international conference on robotics and automation (ICRA) (pp. 1795\u20131801).","DOI":"10.1109\/ICRA.2015.7139431"},{"key":"9833_CR36","unstructured":"Zou, R., & Bhattacharya, S. (2015). Visibility based multi-agent surveillance strategies in decentralized network. In SPIE Defense + Security (pp. 94,640P\u201394,640P). International Society for Optics and Photonics."}],"container-title":["Autonomous Robots"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10514-019-09833-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10514-019-09833-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10514-019-09833-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T02:15:35Z","timestamp":1583806535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10514-019-09833-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,4]]},"references-count":36,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["9833"],"URL":"https:\/\/doi.org\/10.1007\/s10514-019-09833-8","relation":{},"ISSN":["0929-5593","1573-7527"],"issn-type":[{"value":"0929-5593","type":"print"},{"value":"1573-7527","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,4]]},"assertion":[{"value":"1 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}