2007
DOI: 10.1016/j.sysconle.2006.10.027
|View full text |Cite
|
Sign up to set email alerts
|

Coordinated patterns of unit speed particles on a closed curve

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
96
0
1

Year Published

2009
2009
2022
2022

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 121 publications
(98 citation statements)
references
References 22 publications
(31 reference statements)
1
96
0
1
Order By: Relevance
“…Email: jkim37@mail.gatech.edu, {fumin,magnus}@ece.gatech.edu law was used to model the interaction of a particle with an image particle representing the closest point on a closed curve bounding an obstacle. This controller design method was generalized to cooperative motion patterns on closed curves for multiple vehicles in [4], [5], [6]. The closest point is also used for path following in [7].…”
Section: Introductionmentioning
confidence: 99%
“…Email: jkim37@mail.gatech.edu, {fumin,magnus}@ece.gatech.edu law was used to model the interaction of a particle with an image particle representing the closest point on a closed curve bounding an obstacle. This controller design method was generalized to cooperative motion patterns on closed curves for multiple vehicles in [4], [5], [6]. The closest point is also used for path following in [7].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is piecewise uniformly continuous on [0, ∞) in the sense of the definition from [15]. We notice that discontinuous commands such as steps or square waves satisfy these conditions.…”
Section: M-mracmentioning
confidence: 97%
“…The interpretation here is that, as fish pay more attention to near-by fish, the square norm counter-acts this by penalizing far-away fish in an overly aggressive manner. If the robots are supposed to arrange themselves at a prescribed inter-robot distance δ, we obtain a formation control protocol, [16], [24], [46]- [49], as opposed to a rendezvous protocol. An example of this found in [14] is given by…”
Section: Weighted Protocolsmentioning
confidence: 99%
“…A number of algorithms that satisfy these four constraints have been proposed and they have been used successfully for achieving and maintaining formations [15]- [18], for covering areas [19]- [21], for securing and tracking boundary curves [22]- [24], or for mimicking biological social behaviors such as flocking and swarming [25]- [28]. In this overview, we illustrate some of the common features and unifying assumptions behind this body of work.…”
Section: Introductionmentioning
confidence: 99%