{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:18:01Z","timestamp":1740133081900,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-21-1-0189"],"award-info":[{"award-number":["W911NF-21-1-0189"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Visual. Comput. Graphics"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1109\/tvcg.2024.3456306","type":"journal-article","created":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T17:56:06Z","timestamp":1726682166000},"page":"34-43","source":"Crossref","is-referenced-by-count":0,"title":["Who Let the Guards Out: Visual Support for Patrolling Games"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5249-815X","authenticated-orcid":false,"given":"Mat\u011bj","family":"Lang","sequence":"first","affiliation":[{"name":"Masaryk University, Czechia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9388-2546","authenticated-orcid":false,"given":"Adam","family":"\u0160t\u011bp\u00e1nek","sequence":"additional","affiliation":[{"name":"Masaryk University, Czechia"}]},{"given":"R\u00f3bert","family":"Zvara","sequence":"additional","affiliation":[{"name":"Masaryk University, Czechia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9185-7111","authenticated-orcid":false,"given":"Vojt\u011bch","family":"\u0158eh\u00e1k","sequence":"additional","affiliation":[{"name":"Masaryk University, Czechia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0045-0872","authenticated-orcid":false,"given":"Barbora","family":"Kozl\u00edkov\u00e1","sequence":"additional","affiliation":[{"name":"Masaryk University, Czechia"}]}],"member":"263","reference":[{"volume-title":"International Phonetic Association","year":"2024","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/robot.2008.4543563"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1110.0983"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46648-7_20"},{"key":"ref5","first-page":"989","article-title":"Computing time-dependent policies for patrolling games with mobile targets","volume-title":"The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, AAMAS \u201911","author":"Bo\u0161ansk\u00fd"},{"key":"ref6","first-page":"9","article-title":"Strategy representation analysis for patrolling games","volume-title":"AAAI Spring Symposium, No. 3: Game Theory for Security, Sustainability, and Health, Technical Report SS-12-03","author":"Bo\u0161ansk\u00fd","year":"2012"},{"key":"ref7","first-page":"149","article-title":"A heuristic for graph drawing","volume":"42","author":"Eades","year":"1984","journal-title":"Congressus Numerantium"},{"key":"ref8","first-page":"6","volume-title":"Graph drawing algorithms","author":"Eades","year":"2010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i2.19070"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1613\/jair.4317"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511613586"},{"volume-title":"Medialab\/iwanthue: Colors for data scientists","year":"2013","author":"Jacomy","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098679"},{"key":"ref15","first-page":"471","article-title":"Regstar: efficient strategy synthesis for adversarial patrolling games","volume-title":"Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, vol. 161 of Proceedings of Machine Learning Research","author":"Kla\u0161ka","year":"2021"},{"key":"ref16","first-page":"629","article-title":"Adversarial patrolling with drones","volume-title":"Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS \u201920","author":"Kla\u0161ka"},{"volume-title":"p5.js","year":"2024","author":"Lee McCarthy","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13728"},{"volume-title":"Markov Chains","year":"1998","author":"Norris","key":"ref19"},{"key":"ref20","first-page":"125","article-title":"Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport","volume-title":"Adaptive Agents and Multi-Agent Systems","author":"Pita","year":"2008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.120"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(81)90008-0"},{"key":"ref24","first-page":"13","article-title":"PROTECT: a deployed game theoretic system to protect the ports of the united states","volume-title":"Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, AAMAS \u201912","author":"Shieh","year":"2012"},{"volume-title":"Security and game theory: algorithms, deployed systems, lessons learned","year":"2012","author":"Tambe","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346441"},{"key":"ref27","article-title":"The State of the Art in Visualizing Group Structures in Graphs","volume-title":"Eurographics Conference on Visualization (EuroVis) - STARs","author":"Vehlow","year":"2015"},{"key":"ref28","article-title":"Adversarial patrolling games","volume-title":"2012 AAAI Spring Symposium Series","author":"Vorobeychik","year":"2012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-33037-0_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68711-7_24"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v26i2.18975"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.06.014"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/PacificVis52677.2021.00026"}],"container-title":["IEEE Transactions on Visualization and Computer Graphics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/2945\/10766346\/10684132.pdf?arnumber=10684132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T23:52:14Z","timestamp":1732665134000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10684132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tvcg.2024.3456306","relation":{},"ISSN":["1077-2626","1941-0506","2160-9306"],"issn-type":[{"type":"print","value":"1077-2626"},{"type":"electronic","value":"1941-0506"},{"type":"electronic","value":"2160-9306"}],"subject":[],"published":{"date-parts":[[2025,1]]}}}