1986
DOI: 10.1109/tac.1986.1104175
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic path planning for a mobile automaton with limited information on the environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
140
0
10

Year Published

1991
1991
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 319 publications
(151 citation statements)
references
References 6 publications
1
140
0
10
Order By: Relevance
“…However, it is weakly dependent on the complexity of the environment since the associated relaxation algorithm depends on the number of cells in the grid and not on the specific placement of obstacles on it. Bug like approaches (Lumelsky and Skewis, 1990;Lumelsky and Stepanov, 1986), for example, focus on completeness rather than optimality and tend to deteriorate as the intricacy of the environment mounts. They guarantee to find a path if it exists but pay little attention to minimizing its length.…”
Section: Discussionmentioning
confidence: 99%
“…However, it is weakly dependent on the complexity of the environment since the associated relaxation algorithm depends on the number of cells in the grid and not on the specific placement of obstacles on it. Bug like approaches (Lumelsky and Skewis, 1990;Lumelsky and Stepanov, 1986), for example, focus on completeness rather than optimality and tend to deteriorate as the intricacy of the environment mounts. They guarantee to find a path if it exists but pay little attention to minimizing its length.…”
Section: Discussionmentioning
confidence: 99%
“…If the environment is totally unknown, then a direct path towards the goal will be generated as if there was no obstacle. On the other hand, Euclidian DT (EDT) algorithm [9] is implemented to the partially or fully known map in order to achieve initial steering costs of the grids on the map. The static trajectory is then calculated based on the current EDT costs.…”
Section: Path-planning Phasementioning
confidence: 99%
“…The initial block of material is cut into individual planes, and duplication proceeds semi-independently in each plane. In each plane, the obstacle perimeter identification problem uses the bug algorithm [13]. Any module on the perimeter of the obstacle (as determined by a missing neighbor), attempts to route a message to the unoccupied lattice location.…”
Section: Formulation Of Distributed Duplicationmentioning
confidence: 99%
“…The 2D duplication algorithm uses the bug algorithm [13] for all message routing. In particular, its ability to route SENse and DUPlication messages along the face of the obstacle is crucial to the algorithm's success.…”
Section: D Duplicationmentioning
confidence: 99%