{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:46:03Z","timestamp":1725515163468},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/robot.2010.5509943","type":"proceedings-article","created":{"date-parts":[[2010,7,22]],"date-time":"2010-07-22T12:07:20Z","timestamp":1279800440000},"page":"426-431","source":"Crossref","is-referenced-by-count":8,"title":["Moving game theoretical patrolling strategies from theory to practice: An USARSim simulation"],"prefix":"10.1109","author":[{"given":"Francesco","family":"Amigoni","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Basilico","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Gatti","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Saporiti","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Troiani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.804040"},{"key":"ref11","first-page":"55","article-title":"The impact of adversarial knowledge on adversarial planning in perimeter patrol","author":"agmon","year":"2008","journal-title":"Proc AAMAS"},{"journal-title":"Game Theory","year":"1991","author":"fudemberg","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2008.4650763"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2009.5286477"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/KIMAS.2005.1427075"},{"key":"ref16","first-page":"1400","article-title":"Usarsim: a robot simulator for research and education","author":"carpin","year":"2007","journal-title":"Proc ICRA"},{"journal-title":"Primer of Applied Regression and Analysis of Variance","year":"2000","author":"glantz","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/61543"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.324"},{"key":"ref6","article-title":"Patrolling in a stochastic environment","author":"ruan","year":"2005","journal-title":"Proc Int'l Command and Control Research"},{"key":"ref5","first-page":"311","article-title":"An efficient heuristic approach for security against multiple adversaries","author":"paruchuri","year":"2007","journal-title":"Proc AAMAS"},{"key":"ref8","first-page":"895","article-title":"Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games","author":"paruchuri","year":"2008","journal-title":"Proc AAMAS"},{"key":"ref7","first-page":"57","article-title":"Leader-follower strategies for robotic patrolling in environments with arbitrary topologies","author":"basilico","year":"2009","journal-title":"Proc AAMAS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2009.5152497"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2008.4543563"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2005.851373"}],"event":{"name":"2010 IEEE International Conference on Robotics and Automation (ICRA 2010)","start":{"date-parts":[[2010,5,3]]},"location":"Anchorage, AK","end":{"date-parts":[[2010,5,7]]}},"container-title":["2010 IEEE International Conference on Robotics and Automation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5501116\/5509124\/05509943.pdf?arnumber=5509943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T18:56:38Z","timestamp":1489863398000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5509943\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/robot.2010.5509943","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}