phone +7 (3412) 91 60 92

Archive of Issues


Russia Petrozavodsk
Year
2015
Volume
25
Issue
4
Pages
453-458
<<
>>
Section Mathematics
Title Search for the optimal initial distribution of players' location in a patrolling game
Author(-s) Gusev V.V.a
Affiliations Institute of Applied Mathematical Research, Karelian Research Centre of the Russian Academy of Sciencesa
Abstract A patrolling game with two players, a patroller and an attacker, is considered in the paper. The aim of the former is to protect an object from intruders and catch the attacker. The aim of the latter is to cause damage to the protected object without being caught. Cellular base stations are viewed as protected objects. A game-theoretic model is constructed to find an initial distribution of players on base stations. When the transition matrix of players among the stations is known, an optimal strategy of players and the value of the game are calculated. An inverse problem of searching for optimal transition matrices with known initial distribution of players is studied. The Nash equilibrium with the attacker making two attacks is found for the considered problem.
Keywords search game, patrolling, attacking, equilibrium
UDC 519.8
MSC 05C57
DOI 10.20537/vm150402
Received 8 October 2015
Language Russian
Citation Gusev V.V. Search for the optimal initial distribution of players' location in a patrolling game, Vestnik Udmurtskogo Universiteta. Matematika. Mekhanika. Komp'yuternye Nauki, 2015, vol. 25, issue 4, pp. 453-458.
References
  1. Benkoski S.J., Monticino M.G., Weisinger J.R. A survey of the search theory literature, Naval Research Logistics, 1991, vol. 18, pp. 469-494.
  2. Chew M.C. Optimal stopping in a discrete search problem, Operations Research, 1973, vol. 21, pp. 741-747.
  3. Gittins J.S. An application of control theory to a game of hide and seek, International Journal of Control, 1979, vol. 30, pp. 981-987.
  4. Iida K. Optimal search and stop in continuous search process, Journal of the Operations Research Society of Japan, 1984, vol. 27, pp. 1-30.
  5. Joshi S.S., Phoha V.V. Investigating hidden Markov models capabilities in anomaly detection, Proceedings of 43rd Annual Southeast Regional Conference, Kennesaw, GA, March 2005, pp. 98-103.
  6. Zhao F., Jin H. Automated approach to intrusion detection in vm-based dynamic execution environment, Computing and Informatics, 2012, vol. 31, pp. 271-297.
  7. Mazalov V.V. Matematicheskaya teoriya igr i prilozheniya (Mathematical theory of games and applications), St. Petersburg: Lan', 2010, 448 p.
Full text
<< Previous article
Next article >>