2016
DOI: 10.1109/lra.2016.2523600
|View full text |Cite
|
Sign up to set email alerts
|

Automated Creation of Topological Maps in Unknown Environments Using a Swarm of Resource-Constrained Robots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
20
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(21 citation statements)
references
References 11 publications
0
20
0
1
Order By: Relevance
“…The construction of topological maps is combined with metric maps [16], [17] or not [2]. Generalized Voronoi diagram [18] and spectral clustering [19] are the two main methods [20] to construct the topological map. In [21], spectral clustering and extended Voronoi diagrams are used to construct the topological map from the metric map.…”
Section: Related Work a Topological Mapmentioning
confidence: 99%
“…The construction of topological maps is combined with metric maps [16], [17] or not [2]. Generalized Voronoi diagram [18] and spectral clustering [19] are the two main methods [20] to construct the topological map. In [21], spectral clustering and extended Voronoi diagrams are used to construct the topological map from the metric map.…”
Section: Related Work a Topological Mapmentioning
confidence: 99%
“…Other works have proposed systems for augmented reality for robots that present a structure very similar to ARK [14], [15], [16], [17], [18], [19], [20]. In all these works, the robots' locations are tracked through overhead cameras connected to a base control station which then delivers virtual environment information to the robots.…”
Section: Related Workmentioning
confidence: 99%
“…En los mismos, se puede aplicar el concepto de fronteras de exploración tanto a 2D (Yamauchi, 1997), como a 3D (Zhu, Ding, Lin, & Wu, 2015), donde se obtienen buenos resultados y el problema pasa a ser el de elegir la mejor frontera a visitar. Estos mapas, por sus características, rápidamente ocupan gran cantidad de memoria, y no son fácilmente aplicables a sistemas embebidos, en particular aquellos con las restricciones de vuelo para MAVs (Ramaithitima, Whitzer, Bhattacharya, & Kumar, 2016).…”
Section: Introductionunclassified