Show simple item record

Authordc.contributor.authorBahamondes, Bastián 
Authordc.contributor.authorCorrea Haeussler, José 
Authordc.contributor.authorMatuschke, Jannik 
Authordc.contributor.authorOriolo, Gianpaolo 
Admission datedc.date.accessioned2019-05-29T13:39:07Z
Available datedc.date.available2019-05-29T13:39:07Z
Publication datedc.date.issued2017
Cita de ítemdc.identifier.citationLecture Notes in Computer Science, LNCS, Volumen 10575, 2017
Identifierdc.identifier.issn16113349
Identifierdc.identifier.issn03029743
Identifierdc.identifier.other10.1007/978-3-319-68711-7_3
Identifierdc.identifier.urihttps://repositorio.uchile.cl/handle/2250/169018
Abstractdc.description.abstractWe study a network security game arising in the interdiction of fare evasion or smuggling. A defender places a security checkpoint in the network according to a chosen probability distribution over the links of the network. An intruder, knowing this distribution, wants to travel from her initial location to a target node. For every traversed link she incurs a cost equal to the transit time of that link. Furthermore, if she encounters the checkpoint, she has to pay a fine. The intruder may adapt her path online, exploiting additional knowledge gained along the way. We investigate the complexity of computing optimal strategies for intruder and defender. We give a concise encoding of the intruders optimal strategy and present an approximation scheme to compute it. For the defender, we consider two different objectives: (i) maximizing the intruder’s cost, for which we give an approximation scheme, and (ii) maximizing the collected fine, which we show to be strongly NP-hard. We also give a paramterized bound on the worst-case ratio of the intruders best adaptive strategy to the best non-adaptive strategy, i.e., when she fixes the complete route at the start.
Lenguagedc.language.isoen
Publisherdc.publisherSpringer
Type of licensedc.rightsAttribution-NonCommercial-NoDerivs 3.0 Chile
Sourcedc.sourceLecture Notes in Computer Science
Keywordsdc.subjectTheoretical Computer Science
Keywordsdc.subjectComputer Science (all)
Títulodc.titleAdaptivity in Network Interdiction
Document typedc.typeArtículo de revista
dcterms.accessRightsdcterms.accessRightsAcceso a solo metadatos
Catalogueruchile.catalogadorlaj
Indexationuchile.indexArtículo de publicación SCOPUS
uchile.cosechauchile.cosechaSI


Files in this item

Icon

This item appears in the following Collection(s)

Show simple item record