{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T18:39:19Z","timestamp":1773859159458,"version":"3.50.1"},"reference-count":33,"publisher":"SAGE Publications","issue":"14","license":[{"start":{"date-parts":[[2011,10,10]],"date-time":"2011-10-10T00:00:00Z","timestamp":1318204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["The International Journal of Robotics Research"],"published-print":{"date-parts":[[2011,12]]},"abstract":"<jats:p> In this paper we present a method for automatically generating optimal robot paths satisfying high-level mission specifications. The motion of the robot in the environment is modeled as a weighted transition system. The mission is specified by an arbitrary linear temporal-logic (LTL) formula over propositions satisfied at the regions of a partitioned environment. The mission specification contains an optimizing proposition, which must be repeatedly satisfied. The cost function that we seek to minimize is the maximum time between satisfying instances of the optimizing proposition. For every environment model, and for every formula, our method computes a robot path that minimizes the cost function. The problem is motivated by applications in robotic monitoring and data-gathering. In this setting, the optimizing proposition is satisfied at all locations where data can be uploaded, and the LTL formula specifies a complex data-collection mission. Our method utilizes B\u00fcchi automata to produce an automaton (which can be thought of as a graph) whose runs satisfy the temporal-logic specification. We then present a graph algorithm that computes a run corresponding to the optimal robot path. We present an implementation for a robot performing data collection in a road-network platform. <\/jats:p>","DOI":"10.1177\/0278364911417911","type":"journal-article","created":{"date-parts":[[2011,10,11]],"date-time":"2011-10-11T04:08:56Z","timestamp":1318306136000},"page":"1695-1708","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":160,"title":["Optimal path planning for surveillance with temporal-logic constraints"],"prefix":"10.1177","volume":"30","author":[{"given":"Stephen L","family":"Smith","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Canada"}]},{"given":"Jana","family":"T\u016fmov\u00e1","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Boston University, USA"},{"name":"Faculty of Informatics, Masaryk University, Czech Republic"}]},{"given":"Calin","family":"Belta","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Boston University, USA"}]},{"given":"Daniela","family":"Rus","sequence":"additional","affiliation":[{"name":"Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology, USA"}]}],"member":"179","published-online":{"date-parts":[[2011,10,10]]},"reference":[{"key":"bibr1-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.1995.525480"},{"key":"bibr2-0278364911417911","volume-title":"Principles of Model Checking","author":"Baier C","year":"2008"},{"key":"bibr3-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/HiBi.2009.10"},{"key":"bibr4-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.884957"},{"key":"bibr5-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2005.851359"},{"key":"bibr6-0278364911417911","volume-title":"Model Checking","author":"Clarke EM","year":"1999"},{"key":"bibr7-0278364911417911","volume-title":"IFAC World Congress","author":"Ding XC","year":"2011"},{"key":"bibr8-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2008.08.008"},{"key":"bibr9-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44585-4_6"},{"key":"bibr10-0278364911417911","first-page":"3","volume-title":"Protocol Specification, Testing and Verification","author":"Gerth R","year":"1995"},{"key":"bibr11-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2003.08.001"},{"key":"bibr12-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2006.876952"},{"key":"bibr13-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"bibr14-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2008.4586787"},{"key":"bibr15-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2008.4739366"},{"key":"bibr16-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2009.5160520"},{"key":"bibr17-0278364911417911","volume-title":"Combinatorial Optimization: Theory and Algorithms","volume":"21","author":"Korte B","year":"2007","edition":"4"},{"key":"bibr18-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2009.2030225"},{"key":"bibr19-0278364911417911","volume-title":"American Control Conference","author":"Lahijanian M","year":"2011"},{"key":"bibr20-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.1090.0301"},{"key":"bibr21-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546877"},{"key":"bibr22-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1177\/02783640122067453"},{"key":"bibr23-0278364911417911","first-page":"153","volume-title":"IEEE Conference on Decision and Control","author":"Loizou SG","year":"2004"},{"key":"bibr24-0278364911417911","first-page":"4417","volume-title":"IEEE International Conference on Robotics and Automation","author":"Quottrup MM","year":"2004"},{"key":"bibr25-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/70.163777"},{"key":"bibr26-0278364911417911","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell S","year":"2003"},{"key":"bibr27-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2010.5650896"},{"key":"bibr28-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1177\/0278364910369189"},{"key":"bibr29-0278364911417911","volume-title":"Monographs on Discrete Mathematics and Applications","author":"Toth P","year":"2001"},{"key":"bibr30-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717316"},{"key":"bibr31-0278364911417911","first-page":"322","author":"Vardi MY","year":"1986","journal-title":"Logic in Computer Science"},{"key":"bibr32-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1092"},{"key":"bibr33-0278364911417911","doi-asserted-by":"publisher","DOI":"10.1145\/1755952.1755968"}],"container-title":["The International Journal of Robotics Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0278364911417911","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0278364911417911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:50:42Z","timestamp":1741085442000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0278364911417911"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,10]]},"references-count":33,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["10.1177\/0278364911417911"],"URL":"https:\/\/doi.org\/10.1177\/0278364911417911","relation":{},"ISSN":["0278-3649","1741-3176"],"issn-type":[{"value":"0278-3649","type":"print"},{"value":"1741-3176","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,10]]}}}