2017
DOI: 10.1007/978-3-319-68445-1_91
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Differentiation of Non-holonomic Fast Marching for Computing Most Threatening Trajectories Under Sensors Surveillance

Abstract: We consider a two player game, where a first player has to install a surveillance system within an admissible region. The second player needs to enter the the monitored area, visit a target region, and then leave the area, while minimizing his overall probability of detection. Both players know the target region, and the second player knows the surveillance installation details.Optimal trajectories for the second player are computed using a recently developed variant of the fast marching algorithm, which takes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 16 publications
(30 reference statements)
0
12
0
Order By: Relevance
“…Hard constraints can also be accounted for, such as vehicles with a bounded turning radius. In the proof of concept work [41], the HFM library is used to optimize a surveillance system for detecting an enemy vehicle, subject to non-holonomic constraints, in a worst case scenario.…”
Section: Applications To Image Processing and Motion Planningmentioning
confidence: 99%
See 4 more Smart Citations
“…Hard constraints can also be accounted for, such as vehicles with a bounded turning radius. In the proof of concept work [41], the HFM library is used to optimize a surveillance system for detecting an enemy vehicle, subject to non-holonomic constraints, in a worst case scenario.…”
Section: Applications To Image Processing and Motion Planningmentioning
confidence: 99%
“…Our contribution is thus two fold: we generalize these previous works to anisotropic fast marching, and we implement reverse sensitivity analysis for the first time in this context. The algorithms presented in this subsection are used in [41] to solve two player zero-sum games, where the first player places a surveillance system and the second player wants to visit a target undetected.…”
Section: Sensitivity Analysismentioning
confidence: 99%
See 3 more Smart Citations