{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:25:36Z","timestamp":1761675936377,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/cdc.2011.6160836","type":"proceedings-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T16:18:31Z","timestamp":1331137111000},"page":"6266-6271","source":"Crossref","is-referenced-by-count":8,"title":["Intruder capturing game on a topological map assisted by information networks"],"prefix":"10.1109","author":[{"given":"Jonghoek","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sean","family":"Maxon","sequence":"additional","affiliation":[]},{"given":"Magnus","family":"Egerstedt","sequence":"additional","affiliation":[]},{"given":"Fumin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-010-9200-5"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(91)90003-H"},{"journal-title":"Intruder Capture Beta 1 2","year":"2010","author":"kim","key":"17"},{"key":"23","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0304-3975(96)00177-6","article-title":"Fugutive- search games on graphs and related parameters","volume":"172","author":"dendris","year":"1997","journal-title":"Theoretical Computer Science"},{"journal-title":"Introduction to Graph Theory","year":"2001","author":"douglas","key":"18"},{"journal-title":"Survey of Approximation Algorithms for Set Cover Problem","year":"2009","author":"dutta","key":"24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1006\/jctb.1993.1027"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1137\/070705398"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.02.040"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(89)90016-4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-007-9041-6"},{"key":"12","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1145\/564870.564906","article-title":"Capture of an intruder by mobile agents","author":"barrire","year":"2002","journal-title":"Proc of the Fourteenth Annual ACM Symposium on Parallel Algorithms and Architectures"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(86)90146-5"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.1999.811721"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(85)90046-9"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/70.928558"},{"key":"1","first-page":"1","article-title":"Simultaneous cooperative exploration and networking based on voronoi diagrams","author":"kim","year":"2009","journal-title":"Proc of IFAC Workshop on Networked Robotics"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/151261.151263"},{"key":"7","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/BFb0070400","article-title":"Pursuit-evasion in a graph","volume":"642","author":"parsons","year":"1978","journal-title":"Lecture Notes in Mathmatics Theory and Application of Graphs"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546877"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MFI.1996.572184"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/70.97883"},{"key":"9","first-page":"1003","article-title":"The graph-clear problem: Definition, theoretical properties and its connections to multirobot aided surveillance","author":"kolling","year":"2009","journal-title":"Proc of the 2007 IEEE\/RSJ International Conference on Intelligent Robots and Systems"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/42267.42268"}],"event":{"name":"2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011)","start":{"date-parts":[[2011,12,12]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2011,12,15]]}},"container-title":["IEEE Conference on Decision and Control and European Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6149620\/6159299\/06160836.pdf?arnumber=6160836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:19:45Z","timestamp":1497957585000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6160836\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cdc.2011.6160836","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}