This paper is motivated by the diverse array of border threats, ranging from terrorists to arms dealers and human traffickers. We consider a moving sensor that patrols a certain section of a border with the objective to detect infiltrators who attempt to penetrate that section. Infiltrators arrive according to a Poisson process along the border with a specified distribution of arrival location, and disappear a random amount of time after their arrival. The measures of effectiveness are the target (infiltrator) detection rate and the time elapsed from target arrival to target detection. We study two types of sensor trajectories that have constant endpoints, are periodic, and maintain constant speed: (1) a sensor that jumps instantaneously fr...
When securing complex infrastructures or large environments, constant surveillance of every area is ...
Motivated by a number of security applications, among which border patrolling, we study, to the best...
Interdiction operations involving search, identification, and interception of suspected objects are ...
Intrusion detection, area coverage and border surveillance are important applications of wireless se...
Intrusion detection, area coverage and border surveillance are important applications of wireless se...
The article of record as published may be found at https://doi.org/10.1016/j.ejor.2019.11.004Supplem...
AbstractIntrusion detection, area coverage and border surveillance are important applications of wir...
AbstractMoving sensors can cover more area over a period of time than the same number of stationary ...
Patrolling games were recently introduced by Alpern, Morton and Papadaki to model the problem of pro...
Border security has evolved significantly since the days when no more than 75 Mounted Guards patroll...
Border security has evolved significantly since the days when no more than 75 Mounted Guards patroll...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2...
A novel intrusion detector offers several advantages compared with traditional methods, including a ...
Abstract. Interdiction operations involving search, identification, and interception of suspected ob...
We consider the problem of optimally allocating static and dynamic detection resources in order to d...
When securing complex infrastructures or large environments, constant surveillance of every area is ...
Motivated by a number of security applications, among which border patrolling, we study, to the best...
Interdiction operations involving search, identification, and interception of suspected objects are ...
Intrusion detection, area coverage and border surveillance are important applications of wireless se...
Intrusion detection, area coverage and border surveillance are important applications of wireless se...
The article of record as published may be found at https://doi.org/10.1016/j.ejor.2019.11.004Supplem...
AbstractIntrusion detection, area coverage and border surveillance are important applications of wir...
AbstractMoving sensors can cover more area over a period of time than the same number of stationary ...
Patrolling games were recently introduced by Alpern, Morton and Papadaki to model the problem of pro...
Border security has evolved significantly since the days when no more than 75 Mounted Guards patroll...
Border security has evolved significantly since the days when no more than 75 Mounted Guards patroll...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2...
A novel intrusion detector offers several advantages compared with traditional methods, including a ...
Abstract. Interdiction operations involving search, identification, and interception of suspected ob...
We consider the problem of optimally allocating static and dynamic detection resources in order to d...
When securing complex infrastructures or large environments, constant surveillance of every area is ...
Motivated by a number of security applications, among which border patrolling, we study, to the best...
Interdiction operations involving search, identification, and interception of suspected objects are ...