{"id":"https://openalex.org/W2568098594","doi":"https://doi.org/10.1109/cdc.2016.7799179","title":"Distributed partitioning strategies with visual optimization for camera network perimeter patrolling","display_name":"Distributed partitioning strategies with visual optimization for camera network perimeter patrolling","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2568098594","doi":"https://doi.org/10.1109/cdc.2016.7799179","mag":"2568098594"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2016.7799179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2016.7799179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 55th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054192782","display_name":"Giuseppe Belgioioso","orcid":"https://orcid.org/0000-0002-8892-1466"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Giuseppe Belgioioso","raw_affiliation_strings":["Department of Electrical Engineering, Eindhoven University of Technology, Nederland"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Eindhoven University of Technology, Nederland","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033437862","display_name":"Angelo Cenedese","orcid":"https://orcid.org/0000-0003-2249-5094"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Angelo Cenedese","raw_affiliation_strings":["Department of Information Engineering, University of Padova, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padova, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089018207","display_name":"Giulia Michieletto","orcid":"https://orcid.org/0000-0002-1357-8077"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giulia Michieletto","raw_affiliation_strings":["Department of Information Engineering, University of Padova, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padova, Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054192782"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":0.2966,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67717127,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"5912","last_page":"5917"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/patrolling","display_name":"Patrolling","score":0.9540958404541016},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7559876441955566},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6915311217308044},{"id":"https://openalex.org/keywords/gossip","display_name":"Gossip","score":0.6410888433456421},{"id":"https://openalex.org/keywords/perimeter","display_name":"Perimeter","score":0.554086446762085},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5175406336784363},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.42995941638946533},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42066118121147156},{"id":"https://openalex.org/keywords/discontinuity","display_name":"Discontinuity (linguistics)","score":0.4169199764728546},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3446362018585205},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24644196033477783},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13454964756965637}],"concepts":[{"id":"https://openalex.org/C110698143","wikidata":"https://www.wikidata.org/wiki/Q651389","display_name":"Patrolling","level":2,"score":0.9540958404541016},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7559876441955566},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6915311217308044},{"id":"https://openalex.org/C62989814","wikidata":"https://www.wikidata.org/wiki/Q854648","display_name":"Gossip","level":2,"score":0.6410888433456421},{"id":"https://openalex.org/C98503990","wikidata":"https://www.wikidata.org/wiki/Q28474","display_name":"Perimeter","level":2,"score":0.554086446762085},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5175406336784363},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.42995941638946533},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42066118121147156},{"id":"https://openalex.org/C2777042112","wikidata":"https://www.wikidata.org/wiki/Q5281658","display_name":"Discontinuity (linguistics)","level":2,"score":0.4169199764728546},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3446362018585205},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24644196033477783},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13454964756965637},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/cdc.2016.7799179","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2016.7799179","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE 55th Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire_cris_publications/d23e3937-2aab-4490-9c3b-0186a97ab6ee","is_oa":false,"landing_page_url":"https://research.tue.nl/en/publications/d23e3937-2aab-4490-9c3b-0186a97ab6ee","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Belgioioso, G, Cenedese, A & Michieletto, G 2016, Distributed partitioning strategies with visual optimization for camera network perimeter patrolling. in 2016 IEEE 55th Conference on Decision and Control, CDC 2016., 7799179, Institute of Electrical and Electronics Engineers, Piscataway, pp. 5912-5917, 55th IEEE Conference on Decision and Control (CDC 2016), Las Vegas, Nevada, United States, 12/12/16. https://doi.org/10.1109/CDC.2016.7799179","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:library.tue.nl:900950","is_oa":false,"landing_page_url":"http://repository.tue.nl/900950","pdf_url":null,"source":{"id":"https://openalex.org/S4406923046","display_name":"TU/e Research Portal (Eindhoven University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.tue.nl:publications/d23e3937-2aab-4490-9c3b-0186a97ab6ee","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85010754875&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Belgioioso, G, Cenedese, A & Michieletto, G 2016, Distributed partitioning strategies with visual optimization for camera network perimeter patrolling. in 2016 IEEE 55th Conference on Decision and Control, CDC 2016., 7799179, Institute of Electrical and Electronics Engineers, Piscataway, pp. 5912-5917, 55th IEEE Conference on Decision and Control (CDC 2016), Las Vegas, Nevada, United States, 12/12/16. https://doi.org/10.1109/CDC.2016.7799179","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:www.research.unipd.it:11577/3221309","is_oa":false,"landing_page_url":"http://hdl.handle.net/11577/3221309","pdf_url":null,"source":{"id":"https://openalex.org/S4377196283","display_name":"Research Padua  Archive (University of Padua)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138689650","host_organization_name":"University of Padua","host_organization_lineage":["https://openalex.org/I138689650"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:tue:oai:pure.tue.nl:publications/d23e3937-2aab-4490-9c3b-0186a97ab6ee","is_oa":false,"landing_page_url":"https://research.tue.nl/nl/publications/d23e3937-2aab-4490-9c3b-0186a97ab6ee","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2016 IEEE 55th Conference on Decision and Control, CDC 2016, 5912 - 5917","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1561269585","https://openalex.org/W1603050797","https://openalex.org/W1728603878","https://openalex.org/W1974977174","https://openalex.org/W1988982485","https://openalex.org/W2026048835","https://openalex.org/W2034595333","https://openalex.org/W2084519719","https://openalex.org/W2101049525","https://openalex.org/W2113190283","https://openalex.org/W2129328467","https://openalex.org/W2136483715","https://openalex.org/W2142474603","https://openalex.org/W2161128818","https://openalex.org/W2171117352","https://openalex.org/W4232693667","https://openalex.org/W6680573446"],"related_works":["https://openalex.org/W170273588","https://openalex.org/W2337788814","https://openalex.org/W2092973197","https://openalex.org/W2404411151","https://openalex.org/W2163146706","https://openalex.org/W3206391274","https://openalex.org/W167683769","https://openalex.org/W2332242917","https://openalex.org/W2095900292","https://openalex.org/W2083827078"],"abstract_inverted_index":{"This":[0],"work":[1],"addresses":[2],"the":[3,13,17,39,49,53,58,63,79,92,99,102,105],"boundary":[4],"patrolling":[5],"problem,":[6],"where":[7],"a":[8,32,42,68,86,109],"smart":[9],"camera":[10],"network":[11],"undertakes":[12],"task":[14],"of":[15,19,41,52,60,62,74,81,101],"monitoring":[16],"perimeter":[18],"an":[20,82],"environment":[21],"so":[22],"as":[23],"to":[24,78],"detect":[25],"anomalies":[26],"and":[27,56,66,104],"track":[28],"possible":[29],"intrusions.":[30],"Here,":[31],"distributed":[33],"solution":[34],"is":[35],"sought":[36],"based":[37],"on":[38,85,108],"definition":[40],"suitable":[43],"functional":[44,76],"that":[45],"accounts":[46],"both":[47],"for":[48,57],"equitable":[50],"partitioning":[51],"available":[54],"space":[55],"quality":[59],"vision":[61],"patrolled":[64],"area,":[65],"admits":[67],"unique":[69],"optimal":[70],"solution.":[71],"The":[72,95],"optimization":[73],"such":[75],"leads":[77],"design":[80],"algorithm":[83],"relying":[84],"symmetric":[87],"gossip":[88],"communication":[89],"protocol":[90],"among":[91],"neighboring":[93],"cameras.":[94],"theoretical":[96],"results":[97],"prove":[98],"correctness":[100],"approach":[103],"numerical":[106],"simulations":[107],"realistic":[110],"scenario":[111],"confirm":[112],"its":[113],"validity.":[114]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
