Show simple item record

Discrete search with multiple sensors

dc.contributor.authorSong, Nah-Oaken_US
dc.contributor.authorTeneketzis, Demosthenisen_US
dc.date.accessioned2006-09-11T16:32:04Z
dc.date.available2006-09-11T16:32:04Z
dc.date.issued2004-09en_US
dc.identifier.citationSong, Nah-Oak; Teneketzis, Demosthenis; (2004). "Discrete search with multiple sensors." Mathematical Methods of Operational Research 60(1): 1-13. <http://hdl.handle.net/2027.42/45842>en_US
dc.identifier.issn1432-2994en_US
dc.identifier.issn1432-5217en_US
dc.identifier.urihttps://hdl.handle.net/2027.42/45842
dc.description.abstractA stationary object is hidden in location i , i =1,2,..., K , with probability p i . There are M sensors available and each location can be searched by at most one sensor at each instant of time. Each search of a location takes one unit of time and is conducted independently of previous searches, so that a search of location i finds the object, if it is in that location, with probability α i . After each search of a location a sensor may either continue to search the same location or switch without any delay to another location. We determine optimal search strategies that maximize the total probability of successful search in N units of time, discuss an implementation of an optimal search strategy, and specify conditions under which the solution can be obtained by a forward induction argument. Finally, we discuss the relationship to multi-armed bandits with multiple plays.en_US
dc.format.extent248078 bytes
dc.format.extent3115 bytes
dc.format.mimetypeapplication/pdf
dc.format.mimetypetext/plain
dc.language.isoen_US
dc.publisherSpringer-Verlagen_US
dc.subject.otherGittins Indexen_US
dc.subject.otherMultiple Sensorsen_US
dc.subject.otherEconomicsen_US
dc.subject.otherSearch Problemen_US
dc.subject.otherMulti-armed Banditsen_US
dc.subject.otherForward Inductionen_US
dc.titleDiscrete search with multiple sensorsen_US
dc.typeArticleen_US
dc.subject.hlbsecondlevelIndustrial and Operations Engineeringen_US
dc.subject.hlbsecondlevelIndustrial and Operations Engineeringen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.peerreviewedPeer Revieweden_US
dc.contributor.affiliationumDepartment of Electrical Engineering and Computer Science, , University of Michigan, , 1301 Beal Avenue, Ann Arbor, MI 48109-2122en_US
dc.contributor.affiliationotherAdvanced Network Technologies Division, , National Institute of Standards and Technology, , 100 Bureau Dr. Stop 8920, Gaithersburg, MD 20899-8920en_US
dc.contributor.affiliationumcampusAnn Arboren_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/45842/1/186_2004_Article_360.pdfen_US
dc.identifier.doihttp://dx.doi.org/10.1007/s001860400360en_US
dc.identifier.sourceMathematical Methods of Operational Researchen_US
dc.owningcollnameInterdisciplinary and Peer-Reviewed


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.