Author | dc.contributor.author | Bahamondes, Bastián | |
Author | dc.contributor.author | Correa Haeussler, José | |
Author | dc.contributor.author | Matuschke, Jannik | |
Author | dc.contributor.author | Oriolo, Gianpaolo | |
Admission date | dc.date.accessioned | 2019-05-29T13:39:07Z | |
Available date | dc.date.available | 2019-05-29T13:39:07Z | |
Publication date | dc.date.issued | 2017 | |
Cita de ítem | dc.identifier.citation | Lecture Notes in Computer Science, LNCS, Volumen 10575, 2017 | |
Identifier | dc.identifier.issn | 16113349 | |
Identifier | dc.identifier.issn | 03029743 | |
Identifier | dc.identifier.other | 10.1007/978-3-319-68711-7_3 | |
Identifier | dc.identifier.uri | https://repositorio.uchile.cl/handle/2250/169018 | |
Abstract | dc.description.abstract | We study a network security game arising in the interdiction of fare evasion or smuggling. A defender places a security checkpoint in the network according to a chosen probability distribution over the links of the network. An intruder, knowing this distribution, wants to travel from her initial location to a target node. For every traversed link she incurs a cost equal to the transit time of that link. Furthermore, if she encounters the checkpoint, she has to pay a fine.
The intruder may adapt her path online, exploiting additional knowledge gained along the way. We investigate the complexity of computing optimal strategies for intruder and defender. We give a concise encoding of the intruders optimal strategy and present an approximation scheme to compute it. For the defender, we consider two different objectives: (i) maximizing the intruder’s cost, for which we give an approximation scheme, and (ii) maximizing the collected fine, which we show to be strongly NP-hard. We also give a paramterized bound on the worst-case ratio of the intruders best adaptive strategy to the best non-adaptive strategy, i.e., when she fixes the complete route at the start. | |
Lenguage | dc.language.iso | en | |
Publisher | dc.publisher | Springer | |
Type of license | dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Chile | |
Source | dc.source | Lecture Notes in Computer Science | |
Keywords | dc.subject | Theoretical Computer Science | |
Keywords | dc.subject | Computer Science (all) | |
Título | dc.title | Adaptivity in Network Interdiction | |
Document type | dc.type | Artículo de revista | |
dcterms.accessRights | dcterms.accessRights | Acceso a solo metadatos | |
Cataloguer | uchile.catalogador | laj | |
Indexation | uchile.index | Artículo de publicación SCOPUS | |
uchile.cosecha | uchile.cosecha | SI | |