{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T16:37:00Z","timestamp":1757608620947,"version":"3.44.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/icra55743.2025.11127616","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:28:56Z","timestamp":1756834136000},"page":"8915-8921","source":"Crossref","is-referenced-by-count":0,"title":["Scalable Multi-Agent Surveillance: a Kernel-Based Approach"],"prefix":"10.1109","author":[{"given":"Shashwata","family":"Mandal","sequence":"first","affiliation":[{"name":"Iowa State University,Department of Computer Science,Ames,IA,USA,50010"}]},{"given":"Sourabh","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"Iowa State University,Department of Computer Science,Ames,IA,USA,50010"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/0278364911415885"},{"key":"ref2","article-title":"Robot police dogs are on patrol, but who\u2019s holding the leash?","author":"McCullom","year":"2023","journal-title":"Undark"},{"key":"ref3","article-title":"More than 1,400 police departments use drones in some form","author":"Yancey-Bragg","year":"2023","journal-title":"USA Today"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1142\/S0218195921500060"},{"key":"ref5","volume":"3","author":"O\u2019Rourke","year":"1987","journal-title":"Art gallery theorems and algorithms \/ Joseph O\u2019Rourke., ser. International series of monographs on computer science"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056648"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1137\/0214056","article-title":"Decomposing a polygon into simpler components","volume":"14","author":"Keil","year":"1985","journal-title":"SIAM J. Comput."},{"volume-title":"Introduction to Algorithms, Third Edition","year":"2009","author":"Cormen","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00170-023-11827-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2625098"},{"issue":"3","key":"ref11","doi-asserted-by":"crossref","DOI":"10.3390\/rs12030518","article-title":"Finite element analysis based on a parametric model by approximating point clouds","volume":"12","author":"Xu","year":"2020","journal-title":"Remote Sensing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1098-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MRS60187.2023.10416773"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1976.16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48891.2023.10161532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2003.09.001"},{"key":"ref17","article-title":"Discovery, analysis, and presentation of strong rules","author":"Piatetsky-Shapiro","year":"1991","journal-title":"Knowledge Discovery in Databases"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359156.359164"},{"volume-title":"Algorithms for clustering data","year":"1988","author":"Jain","key":"ref19"},{"journal-title":"Rapidly-exploring random trees: A new tool for path planning","year":"1998","author":"LaValle","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2005.1545323"},{"key":"ref22","article-title":"Optimal patrol on a perimeter","author":"Lin","year":"2019","journal-title":"arXiv: Optimization and Control"},{"journal-title":"A note on minimal art galleries","year":"2019","author":"Lipka","key":"ref23"},{"key":"ref24","article-title":"Inverse graphics GAN: learning to generate 3d shapes from unstructured 2d data","volume":"abs\/2002.12674","author":"Lunz","year":"2020","journal-title":"CoRR"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.robot.2003.09.004","article-title":"An autonomous mobile robot with a 3D laser range finder for 3d exploration and digitalization of indoor environments","volume":"45","author":"Surmann","year":"2003","journal-title":"Robotics Auton. Syst."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/12\/20230291"}],"event":{"name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","start":{"date-parts":[[2025,5,19]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2025,5,23]]}},"container-title":["2025 IEEE International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11127273\/11127223\/11127616.pdf?arnumber=11127616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T06:03:54Z","timestamp":1756879434000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11127616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icra55743.2025.11127616","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}