Online Adversarial Coverage: Proofs

نویسنده

  • Noa Agmon
چکیده

Proof. We first prove that every free cell accessible from s becomes a frontier at least once. We prove this by induction on the Manhattan distance d of the cells from s. As the base case, consider d = 0. The only cell with d = 0 is s itself, and it is added to the frontier set F in line 3 of OnlineCoverage. We now assume correctness for d = k and prove for d = k + 1. Consider a cell c with distance d = k+ 1 from s. This cell belongs to the Von Neumann neighborhood of some cell c′ with distance k from s. By the induction hypothesis, c′ becomes a frontier at some point of the algorithm. Thus, at some point c′ is selected by ChooseNextFrontier and then the function UpdateFrontier is called with it (in line 12 of OnlineCoverage). UpdateFrontier iterates over all the neighbors of c′, including c, which can be in one of the following states:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Safest Path Adversarial Coverage: Proofs and Algorithm Details

Proof. Clearly, this problem is in NP, since one can easily guess the coverage path of the robot and then verify its probability of surviving it in polynomial time. To prove its NP-hardness, we use a reduction from the Hamiltonian path problem on grid graphs. A grid graph is a finite node-induced subgraph of the infinite two-dimensional integer grid (see Figure 1 for an example of a general gri...

متن کامل

Robotic adversarial coverage of known environments

Coverage is a fundamental problem in robotics, where one or more robots are required to visit each point in a target area at least once. Most previous work concentrated on finding a coverage path that minimizes the coverage time. In this paper we consider a new and more general version of the problem: adversarial coverage. Here, the robot operates in an environment that contains threats that mi...

متن کامل

Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols

Using EasyCrypt, we formalize a new modular security proof for one-round authenticated key exchange protocols in the random oracle model. Our proof improves earlier work by Kudla and Paterson (ASIACRYPT 2005) in three significant ways: we consider a stronger adversary model, we provide support tailored to protocols that utilize the Naxos trick, and we support proofs under the Computational DH a...

متن کامل

Robotic Adversarial Coverage: (Doctoral Consortium)

Coverage is a fundamental problem in robotics, where one or more robots are required to visit each point in a target area at least once. While all previous studies of the problem concentrated on finding a solution that completes the coverage as quickly as possible, in this thesis I consider a new and more general version of the problem: adversarial coverage. Here, the robot operates in an envir...

متن کامل

Towards Efficient Robot Adversarial Coverage

This paper discusses the problem of generating efficient coverage paths for a mobile robot in an adversarial environment, where threats exist that might stop the robot. First, we formally define the problem of adversarial coverage, and present optimization criteria used for evaluation of coverage algorithms in adversarial environments. We then present a coverage area planning algorithm based on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015