{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T14:27:03Z","timestamp":1756996023493,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/mrs60187.2023.10416773","type":"proceedings-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T18:32:59Z","timestamp":1707157979000},"page":"36-42","source":"Crossref","is-referenced-by-count":1,"title":["From Distributed Coverage to Multi-agent Target Tracking"],"prefix":"10.1109","author":[{"given":"Shashwata","family":"Mandal","sequence":"first","affiliation":[{"name":"Iowa State University,Department of Computer Science,Ames,IA,USA,50010"}]},{"given":"Sourabh","family":"Bhattacharya","sequence":"additional","affiliation":[{"name":"Iowa State University,Department of Computer Science,Ames,IA,USA,50010"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Robotics: Modelling, Planning and Control","volume":"1","author":"Siciliano","year":"2008"},{"article-title":"Security trends: Four surveillance trends for 2023 (and beyond)","year":"2023","author":"Ayad","key":"ref2"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"109558","DOI":"10.1016\/j.oceaneng.2021.109558","article-title":"Recent developments on target tracking problems: A review","volume":"236","author":"Kumar","year":"2021","journal-title":"Ocean Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IROS40897.2019.8967602"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/0278364911415885"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/10991541_29"},{"volume-title":"Introduction to Algorithms","year":"2009","author":"Cormen","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1976.16"},{"key":"ref9","volume-title":"Art gallery theorems and algorithms \/Joseph O\u2019Rourke","volume":"3","author":"O\u2019Rourke","year":"1987"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/b978-044482537-7\/50012-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218195910003451"},{"key":"ref12","first-page":"6","article-title":"Distributed deployment of asynchronous guards in art galleries","volume-title":"2006 American Control Conference","author":"Ganguli"},{"issue":"1","key":"ref13","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/0095-8956(75)90061-1","article-title":"A combinatorial theorem in plane geometry","volume":"18","author":"Chv\u00e1tal","year":"1975","journal-title":"Journal of Combinatorial Theory, Series B"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/0604020"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1137\/0607051","article-title":"A short proof of the rectilinear art gallery theorem","volume":"7","author":"Gy\u00f6ri","year":"1986","journal-title":"Siam Journal on Algebraic and Discrete Methods"},{"article-title":"The art gallery theorem: its variations, applications and algorithmic aspects","year":"1984","author":"Aggarwal","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04245-8","volume-title":"Computational Geometry: Algorithms and Applications","volume":"2","author":"de Berg","year":"2000"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2017.2714980"},{"issue":"2","key":"ref20","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s00454-018-9996-x","article-title":"Mobile versus point guards","volume":"61","author":"Gy\u0151ri","year":"2018","journal-title":"Discrete &amp Computational Geometry"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.1997.620122"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2011.5980515"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/0278364909354628"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2018.2882747"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989102"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IROS51168.2021.9636581"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/s10514-011-9253-0","article-title":"Spatial approaches to broadband jamming in heterogeneous mobile networks: a game-theoretic approach","volume":"31","author":"Bhattacharya","year":"2011","journal-title":"Autonomous Robots"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IROS51168.2021.9636549"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BF00146907"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-016-0452-2"},{"key":"ref31","article-title":"A practical algorithm with performance guarantees for the art gallery problem","author":"Hengeveld","year":"2022","journal-title":"arXiv.org"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1098-6"},{"article-title":"Studies on Kernels of Simple Polygons","year":"2020","author":"Mark","key":"ref33"},{"key":"ref34","first-page":"557","article-title":"An efficient algorithm for finding the visibility polygon for a polygonal region with holes","volume":"68","author":"Asano","year":"1985","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"3","key":"ref35","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/BF00994018","article-title":"Support-vector networks","volume":"20","author":"Cortes","year":"1995","journal-title":"Mach. Learn."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.5187"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.6"},{"key":"ref38","article-title":"A nearly optimal algorithm for the geodesic voronoi diagram in a simple polygon","volume":"abs\/1803.03526","author":"Liu","year":"2018","journal-title":"CoRR"},{"article-title":"A note on minimal art galleries","year":"2019","author":"Lipka","key":"ref39"},{"key":"ref40","article-title":"Inverse graphics GAN: learning to generate 3d shapes from unstructured 2d data","volume":"abs\/2002.12674","author":"Lunz","year":"2020","journal-title":"CoRR"}],"event":{"name":"2023 International Symposium on Multi-Robot and Multi-Agent Systems (MRS)","start":{"date-parts":[[2023,12,4]]},"location":"Boston, MA, USA","end":{"date-parts":[[2023,12,5]]}},"container-title":["2023 International Symposium on Multi-Robot and Multi-Agent Systems (MRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10416762\/10416768\/10416773.pdf?arnumber=10416773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T22:25:18Z","timestamp":1707258318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10416773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/mrs60187.2023.10416773","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}