Connected Surveillance Game

نویسندگان

  • Frédéric Giroire
  • Dorian Mazauric
  • Nicolas Nisse
  • Stéphane Pérennes
  • R. Soares
چکیده

The surveillance game [Fomin et al., 2012] models the problem of web-page prefetching as a pursuit evasion game played on a graph. This two-player game is played turn-by-turn. The first player, called the observer, can mark a fixed amount of vertices at each turn. The second one controls a surfer that stands at vertices of the graph and can slide along edges. The surfer starts at some initially marked vertex of the graph, her objective is to reach an unmarked node The surveillance number sn(G) of a graph G is the minimum amount of nodes that the observer has to mark at each turn ensuring it wins against any surfer in G. Fomin et al. also defined the connected surveillance game where the marked nodes must always induce a connected subgraph. They ask if there is a constant c > 0 such that csn(G) sn(G) ≤ c for any graph G. It has been shown that there are graphs G for which csn(G) = sn(G) + 1. In this paper, we investigate this question. We present a family of graphs G such that csn(G) > sn(G)+1. Moreover, we prove that csn(G) ≤ sn(G) √ n for any n-node graph G. While the gap between these bounds remains huge, it seems difficult to reduce it. We then define the online surveillance game where the observer has no a priori knowledge of the graph topology and discovers it little-bylittle. Unfortunately, we show that no algorithm for solving the online surveillance game has competitive ratio better than Ω(∆).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Paired-Domination Game Played in Graphs

In this paper, we continue the study of the domination game in graphs introduced by Bre{v{s}}ar, Klav{v{z}}ar, and Rall. We study the paired-domination version of the domination game which adds a matching dimension to the game. This game is played on a graph $G$ by two players, named Dominator and Pairer. They alternately take turns choosing vertices of $G$ such that each vertex chosen by Domin...

متن کامل

Game Plan: Communicable Disease Surveillance for Super Bowl XLVIII – New Jersey, 2014

Introduction In the summer of 2013, the New Jersey Department of Health (NJDOH) began planning for Super Bowl XLVIII to be held on February 2, 2014, in Met Life Stadium, located in the Meadowlands of Bergen County. Surveillance and epidemiology staff in the Communicable Disease Service (CDS) provided expertise in planning for disease surveillance activities leading up to, during, and after the ...

متن کامل

Sensor Network Surveillance and Counter-surveillance with Power Constraint

Targeting power constrained surveillance and counter-surveillance for a given sensor network, this work first design a power efficient surveillance system by sensor nodes coordination and cooperation, and then solve the power constrained sensor node covering and scheduling (PCSCS) problem by generalized maximal network flow. The counter-surveillance problem is formulated as a hide and seek game...

متن کامل

Pixel Motion: A surveillance camera-enabled public digital game

In this paper, we present a public digital game with a novel interaction strategy: the use of a surveillance camera and motion flow detection software that analyzes movement patterns. The game was designed to support and inspire creative collaborative public play in a public flow-through area of a science museum. In this paper we report about the design of the game to achieve these end-experien...

متن کامل

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013