Decentralized graph processes for robust multi-agent networks
暂无分享,去创建一个
[1] Avi Wigderson,et al. Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[2] Christian Blum,et al. Metaheuristics in combinatorial optimization: Overview and conceptual comparison , 2003, CSUR.
[3] Gilbert Laporte,et al. Dynamic pickup and delivery problems , 2010, Eur. J. Oper. Res..
[4] Marcin Dziubinski,et al. Network Design and Defence , 2012, Games Econ. Behav..
[5] H. Ohtsuki,et al. A simple rule for the evolution of cooperation on graphs and social networks , 2006, Nature.
[6] Adam Wierman,et al. Distributed welfare games with applications to sensor coverage , 2008, 2008 47th IEEE Conference on Decision and Control.
[7] Scott Kirkpatrick,et al. Optimization by Simmulated Annealing , 1983, Sci..
[8] Joel Friedman,et al. A proof of Alon's second eigenvalue conjecture and related problems , 2004, ArXiv.
[9] Jorge Cortes,et al. Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms , 2009 .
[10] Sonia Martínez,et al. Distributed Coverage Games for Energy-Aware Mobile Sensor Networks , 2013, SIAM J. Control. Optim..
[11] Mehryar Mohri,et al. Multi-armed Bandit Algorithms and Empirical Evaluation , 2005, ECML.
[12] M. Randic,et al. Resistance distance , 1993 .
[13] Mark S. Daskin,et al. Strategic facility location: A review , 1998, Eur. J. Oper. Res..
[14] Gaurav S. Sukhatme,et al. Constrained coverage for mobile sensor networks , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.
[15] Robert E. Tarjan,et al. Depth-First Search and Linear Graph Algorithms , 1972, SIAM J. Comput..
[16] Chinwendu Enyioha,et al. Optimal Resource Allocation for Network Protection Against Spreading Processes , 2013, IEEE Transactions on Control of Network Systems.
[17] Ruggero Carli,et al. Discrete Partitioning and Coverage Control With Gossip Communication , 2009 .
[18] Samir Khuller,et al. The Budgeted Maximum Coverage Problem , 1999, Inf. Process. Lett..
[19] Timon C. Du,et al. Mobile agents in distributed network management , 2003, CACM.
[20] Béla Bollobás,et al. A Probabilistic Proof of an Asymptotic Formula for the Number of Labelled Regular Graphs , 1980, Eur. J. Comb..
[21] M. Kelbert,et al. Probability and Statistics by Example: Contents , 2008 .
[22] A. Jamakovic,et al. On the relationship between the algebraic connectivity and graph's robustness to node and link failures , 2007, 2007 Next Generation Internet Networks.
[23] Stefan Richter,et al. Centrality Indices , 2004, Network Analysis.
[24] N. Linial,et al. Expander Graphs and their Applications , 2006 .
[25] Alessandro Vespignani,et al. Dynamical Processes on Complex Networks , 2008 .
[26] O Mason,et al. Graph theory and networks in Biology. , 2006, IET systems biology.
[27] Sudipto Guha,et al. A constant-factor approximation algorithm for the k-median problem (extended abstract) , 1999, STOC '99.
[28] Marco Dorigo,et al. Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.
[29] Emilio Frazzoli,et al. Efficient Routing Algorithms for Multiple Vehicles With no Explicit Communications , 2009, IEEE Transactions on Automatic Control.
[30] M. Pinsker,et al. On the complexity of a concentrator , 1973 .
[31] Hans J. Herrmann,et al. Mitigation of malicious attacks on networks , 2011, Proceedings of the National Academy of Sciences.
[32] Avi Wigderson,et al. Randomness conductors and constant-degree lossless expanders , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[33] Eric Klavins,et al. A grammatical approach to self-organizing robotic systems , 2006, IEEE Transactions on Automatic Control.
[34] Noga Alon,et al. Eigenvalues and expanders , 1986, Comb..
[35] R. Olfati-Saber. Ultrafast consensus in small-world networks , 2005, Proceedings of the 2005, American Control Conference, 2005..
[36] Albert-László Barabási,et al. Controllability of complex networks , 2011, Nature.
[37] Ennio Cascetta,et al. Transportation Systems Engineering: Theory and Methods , 2001 .
[38] Kai-Yeung Siu,et al. Distributed construction of random expander networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[39] M. Fiedler. Algebraic connectivity of graphs , 1973 .
[40] L. Blume. The Statistical Mechanics of Strategic Interaction , 1993 .
[41] Magnus Egerstedt,et al. Graph Theoretic Methods in Multiagent Networks , 2010, Princeton Series in Applied Mathematics.
[42] Fred W. Glover,et al. Tabu Search - Part I , 1989, INFORMS J. Comput..
[43] H. Young,et al. The Evolution of Conventions , 1993 .
[44] Ashish Goel,et al. Set k-cover algorithms for energy efficient monitoring in wireless sensor networks , 2003, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[45] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[46] Matteo Fischetti,et al. Algorithms for the Set Covering Problem , 2000, Ann. Oper. Res..
[47] Jason R. Marden,et al. Revisiting log-linear learning: Asynchrony, completeness and payoff-based implementation , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[48] Maja J. Mataric,et al. Territorial multi-robot task division , 1998, IEEE Trans. Robotics Autom..
[49] Richard M. Murray,et al. Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.
[50] Moshe Morgenstern,et al. Existence and Explicit Constructions of q + 1 Regular Ramanujan Graphs for Every Prime Power q , 1994, J. Comb. Theory, Ser. B.
[51] Anthony H. Dekker,et al. Network Robustness and Graph Topology , 2004, ACSC.
[52] Francesco Bullo,et al. Esaim: Control, Optimisation and Calculus of Variations Spatially-distributed Coverage Optimization and Control with Limited-range Interactions , 2022 .
[53] R. Olfati-Saber,et al. Algebraic Connectivity Ratio of Ramanujan Graphs , 2007, 2007 American Control Conference.
[54] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[55] Massimo Marchiori,et al. Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[56] Magnus Egerstedt,et al. Controllability of Multi-Agent Systems from a Graph-Theoretic Perspective , 2009, SIAM J. Control. Optim..
[57] Mark Jerrum,et al. Fast Uniform Generation of Regular Graphs , 1990, Theor. Comput. Sci..
[58] Sonia Martinez,et al. Deployment algorithms for a power‐constrained mobile sensor network , 2010 .
[59] Mac Schwager,et al. Decentralized, Adaptive Coverage Control for Networked Robots , 2009, Int. J. Robotics Res..
[60] Anna Scaglione,et al. Electrical centrality measures for electric power grid vulnerability analysis , 2010, 49th IEEE Conference on Decision and Control (CDC).
[61] Bojan Mohar,et al. Isoperimetric numbers of graphs , 1989, J. Comb. Theory, Ser. B.
[62] Salil P. Vadhan,et al. Derandomized Squaring of Graphs , 2005, APPROX-RANDOM.
[63] Gregory F. Lawler. Introduction to Stochastic Processes , 1995 .
[64] Mark Newman,et al. Networks: An Introduction , 2010 .
[65] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[66] Roger Wattenhofer,et al. Constant-time distributed dominating set approximation , 2003, PODC '03.
[67] R. Rajaraman,et al. An efficient distributed algorithm for constructing small dominating sets , 2002 .
[68] Christian Schindelhauer,et al. Peer-to-peer networks based on random transformations of connected regular undirected graphs , 2005, SPAA '05.
[69] A. Barabasi,et al. Lethality and centrality in protein networks , 2001, Nature.
[70] N. Wormald,et al. Models of the , 2010 .
[71] Gaurav S. Sukhatme,et al. Mobile Sensor Network Deployment using Potential Fields : A Distributed , Scalable Solution to the Area Coverage Problem , 2002 .
[72] M. Murty. Ramanujan Graphs , 1965 .
[73] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[74] Nicholas C. Wormald,et al. Generating Random Regular Graphs Quickly , 1999, Combinatorics, Probability and Computing.
[75] N. Megiddo,et al. The Maximum Coverage Location Problem , 1983 .
[76] Sonia Martínez,et al. Coverage control for mobile sensing networks , 2002, IEEE Transactions on Robotics and Automation.
[77] Daniela Rus,et al. Distributed coverage with mobile robots on a graph: Locational optimization , 2012, 2012 IEEE International Conference on Robotics and Automation.
[78] J. Reese,et al. Solution methods for the p-median problem: An annotated bibliography , 2006 .
[79] Jason R. Marden,et al. Autonomous Vehicle-Target Assignment: A Game-Theoretical Formulation , 2007 .
[80] Heinz Mühlenbein,et al. Evolution algorithms in combinatorial optimization , 1988, Parallel Comput..
[81] Stephen P. Borgatti,et al. Centrality and network flow , 2005, Soc. Networks.
[82] Stephen P. Boyd,et al. Randomized gossip algorithms , 2006, IEEE Transactions on Information Theory.
[83] Vijay Kumar,et al. Sensing and coverage for a network of heterogeneous robots , 2008, 2008 47th IEEE Conference on Decision and Control.
[84] R. Linsker,et al. Improving network robustness by edge modification , 2005 .
[85] Helena Ramalhinho Dias Lourenço,et al. Iterated Local Search , 2001, Handbook of Metaheuristics.