Evader interdiction: algorithms, complexity and collateral damage

From MaRDI portal
Publication:490228

DOI10.1007/S10479-013-1372-XzbMATH Open1303.90058arXiv1108.0894OpenAlexW1973266786WikidataQ34361359 ScholiaQ34361359MaRDI QIDQ490228FDOQ490228


Authors: Matthew P. Johnson, Alexander Gutfraind, Kiyan Ahmadizadeh Edit this on Wikidata


Publication date: 22 January 2015

Published in: Annals of Operations Research (Search for Journal in Brave)

Abstract: In network interdiction problems, evaders (e.g., hostile agents or data packets) may be moving through a network towards targets and we wish to choose locations for sensors in order to intercept the evaders before they reach their destinations. The evaders might follow deterministic routes or Markov chains, or they may be reactive}, i.e., able to change their routes in order to avoid sensors placed to detect them. The challenge in such problems is to choose sensor locations economically, balancing security gains with costs, including the inconvenience sensors inflict upon innocent travelers. We study the objectives of 1) maximizing the number of evaders captured when limited by a budget on sensing cost and 2) capturing all evaders as cheaply as possible. We give optimal sensor placement algorithms for several classes of special graphs and hardness and approximation results for general graphs, including for deterministic or Markov chain-based and reactive or oblivious evaders. In a similar-sounding but fundamentally different problem setting posed by Rubinstein and Glazer where both evaders and innocent travelers are reactive, we again give optimal algorithms for special cases and hardness and approximation results on general graphs.


Full work available at URL: https://arxiv.org/abs/1108.0894




Recommendations




Cites Work


Cited In (8)





This page was built for publication: Evader interdiction: algorithms, complexity and collateral damage

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q490228)