{"id":"https://openalex.org/W4413925068","doi":"https://doi.org/10.1109/icra55743.2025.11127616","title":"Scalable Multi-Agent Surveillance: a Kernel-Based Approach","display_name":"Scalable Multi-Agent Surveillance: a Kernel-Based Approach","publication_year":2025,"publication_date":"2025-05-19","ids":{"openalex":"https://openalex.org/W4413925068","doi":"https://doi.org/10.1109/icra55743.2025.11127616"},"language":"en","primary_location":{"id":"doi:10.1109/icra55743.2025.11127616","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra55743.2025.11127616","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043406634","display_name":"Shashwata Mandal","orcid":null},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shashwata Mandal","raw_affiliation_strings":["Iowa State University,Department of Computer Science,Ames,IA,USA,50010"],"affiliations":[{"raw_affiliation_string":"Iowa State University,Department of Computer Science,Ames,IA,USA,50010","institution_ids":["https://openalex.org/I173911158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021207606","display_name":"Sourabh Bhattacharya","orcid":"https://orcid.org/0000-0002-1306-2775"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sourabh Bhattacharya","raw_affiliation_strings":["Iowa State University,Department of Computer Science,Ames,IA,USA,50010"],"affiliations":[{"raw_affiliation_string":"Iowa State University,Department of Computer Science,Ames,IA,USA,50010","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5043406634"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31795575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"8915","last_page":"8921"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7936000227928162,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7936000227928162,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7874000072479248,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.703499972820282,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7915493249893188},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6997805833816528},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.5992307066917419},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3233073055744171},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20605561137199402}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7915493249893188},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6997805833816528},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.5992307066917419},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3233073055744171},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20605561137199402},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icra55743.2025.11127616","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra55743.2025.11127616","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1981988453","https://openalex.org/W2032895458","https://openalex.org/W2037337557","https://openalex.org/W2041437464","https://openalex.org/W2058197213","https://openalex.org/W2163178194","https://openalex.org/W2167061621","https://openalex.org/W2567177733","https://openalex.org/W2911302472","https://openalex.org/W3004974007","https://openalex.org/W3020511868","https://openalex.org/W4210635977","https://openalex.org/W4382048029","https://openalex.org/W4383108622","https://openalex.org/W4386961251","https://openalex.org/W4391529052"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1982914007","https://openalex.org/W2159583675","https://openalex.org/W1824242903","https://openalex.org/W1493858311","https://openalex.org/W2155470929","https://openalex.org/W2111125783","https://openalex.org/W2394465510"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"we":[3,26,62,92],"address":[4],"the":[5,43,55,58,80,97,108,111,116],"deployment":[6],"problem":[7],"for":[8,32,66],"a":[9,18,28,34,49,67,83,87],"team":[10,117],"of":[11,36,57,82,96,115,118],"mobile":[12,23,119],"guards":[13,120],"that":[14,41,101],"tries":[15],"to":[16,70],"maintain":[17],"line-ofsight":[19],"with":[20],"an":[21,72],"unpredictable":[22],"intruder.":[24],"First,":[25],"present":[27,93],"computationally":[29],"efficient":[30],"strategy":[31],"generating":[33],"set":[35],"points,":[37,40],"called":[38],"kernel":[39,59],"covers":[42],"entire":[44],"polygon.":[45],"We":[46],"then":[47],"introduce":[48],"polygon":[50],"partitioning":[51],"technique":[52],"based":[53,78,121],"on":[54,79,122],"location":[56],"points.":[60],"Next,":[61],"propose":[63],"control":[64,99],"laws":[65,100],"free":[68],"guard":[69],"track":[71],"intruder":[73],"in":[74,110],"general":[75],"polygonal":[76],"environments":[77],"analysis":[81],"pursuit-evasion":[84],"game":[85],"around":[86],"single":[88],"corner":[89],"[1].":[90],"Finally,":[91],"several":[94],"variations":[95],"proposed":[98],"include":[102],"capture":[103],"and":[104,106],"search,":[105],"illustrate":[107],"improvement":[109],"overall":[112],"visual":[113],"footprint":[114],"extensive":[123],"simulations.":[124]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
