2015
DOI: 10.1109/tac.2015.2426317
|View full text |Cite
|
Sign up to set email alerts
|

Robotic Surveillance and Markov Chains With Minimal Weighted Kemeny Constant

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 50 publications
(28 citation statements)
references
References 30 publications
0
27
0
Order By: Relevance
“…Second, we provided results for multiple Markov chains in which travel times are homogeneous. A clear extension is to consider the case of heterogeneous travel times similar to what was done in [32]. Finally, given the maximum pairwise hitting time of a Markov chain, there exist bounds on the cover time for multiple copies of that Markov chain running in parallel [11,2].…”
Section: Discussionmentioning
confidence: 99%
“…Second, we provided results for multiple Markov chains in which travel times are homogeneous. A clear extension is to consider the case of heterogeneous travel times similar to what was done in [32]. Finally, given the maximum pairwise hitting time of a Markov chain, there exist bounds on the cover time for multiple copies of that Markov chain running in parallel [11,2].…”
Section: Discussionmentioning
confidence: 99%
“…Mean hitting time has found many applications in different areas [53]. For example, it can be applied to measure the efficiency of user navigation through the World Wide Web [52], as well as the efficiency of robotic surveillance in network environments [54].…”
Section: Mean Hitting Timementioning
confidence: 99%
“…For example, it is used to evaluate and improve user navigation efficiency through web graphs [20], and also for search and discovery in peer-to-peer networks by interpreting the Kemeny's constant as the search time of a random search method [7,26,30]. It is recently used as an indicator of network robustness to design surveillance policies for the quickest detection of intruders and anomalies in the network [25].…”
Section: Introductionmentioning
confidence: 99%