IDEAS home Printed from https://ideas.repec.org/a/inm/oropre/v61y2013i2p265-279.html
   My bibliography  Save this article

Mining Coal or Finding Terrorists: The Expanding Search Paradigm

Author

Listed:
  • Steve Alpern

    (ORMS Group, Warwick Business School, University of Warwick, Coventry CV4 7AL, United Kingdom)

  • Thomas Lidbetter

    (Department of Mathematics, London School of Economics, London WC2A 2AE, United Kingdom)

Abstract

We show how to optimize the search for a hidden object, terrorist, or simply Hider, located at a point H according to a known or unknown distribution (nu) on a rooted network Q . We modify the traditional “pathwise search” approach to a more general notion of “expanding search.” When the Hider is restricted to the nodes of Q , an expanding search S consists of an ordering \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$(a_{1},a_{2},\ldots)$\end{document} of the arcs of a spanning subtree such that the root node is in a 1 and every arc a i is adjacent to a previous arc a j , j i . If a k contains H , the search time T is \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\lambda (a_{1}) +\cdots +\lambda (a_{k})$\end{document} , where (lambda) is length measure on Q . For more general distributions (nu) , an expanding search S is described by the nested family of connected sets S ( t ) that specify the area of Q that has been covered by time t . S (0) is the root, \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\lambda (S(t) ) =t$, and $T=\min \{ t: H \in S(t)\}$\end{document} . For a known Hider distribution (nu) on a tree Q , the expected time minimizing strategy \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\bar{S}$\end{document} begins with the rooted subtree Q ' maximizing the “density” (nu) ( Q ')/ (lambda) ( Q '). (For arbitrary networks, we use this criterion on all spanning subtrees.) The search \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\bar{S}$\end{document} can be interpreted as the optimal method of mining known coal seams, when the time to move miners or machines is negligible compared to digging time. When the Hider distribution is unknown, we consider the zero-sum search game where the Hider picks H , the Searcher S , and the payoff is T . For trees Q , the value is V = ( (lambda) ( Q ) + D )/2, where D is a mean distance from root to leaf nodes. If Q is 2-arc connected, V = (lambda) ( Q )/2. Applications and interpretations of the expanding search paradigm are given, particularly to multiple agent search.

Suggested Citation

  • Steve Alpern & Thomas Lidbetter, 2013. "Mining Coal or Finding Terrorists: The Expanding Search Paradigm," Operations Research, INFORMS, vol. 61(2), pages 265-279, April.
  • Handle: RePEc:inm:oropre:v:61:y:2013:i:2:p:265-279
    DOI: 10.1287/opre.1120.1134
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/opre.1120.1134
    Download Restriction: no

    File URL: https://libkey.io/10.1287/opre.1120.1134?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Reijnierse, J H & Potters, J A M, 1993. "Search Games with Immobile Hider," International Journal of Game Theory, Springer;Game Theory Society, vol. 21(4), pages 385-394.
    2. S. Gal & J. V. Howard, 2005. "Rendezvous-Evasion Search in Two Boxes," Operations Research, INFORMS, vol. 53(4), pages 689-697, August.
    3. Shmuel Gal, 1999. "Rendezvous Search on the Line," Operations Research, INFORMS, vol. 47(6), pages 974-976, December.
    4. Elizabeth J. Chester & Reha H. Tütüncü, 2004. "Rendezvous Search on the Labeled Line," Operations Research, INFORMS, vol. 52(2), pages 330-334, April.
    5. Kensaku Kikuta & William H. Ruckle, 1994. "Initial point search on weighted trees," Naval Research Logistics (NRL), John Wiley & Sons, vol. 41(6), pages 821-831, October.
    6. Steve Alpern, 2002. "Rendezvous Search: A Personal Perspective," Operations Research, INFORMS, vol. 50(5), pages 772-795, October.
    7. Jotshi, Arun & Batta, Rajan, 2008. "Search for an immobile entity on a network," European Journal of Operational Research, Elsevier, vol. 191(2), pages 347-359, December.
    8. Reyniers, Diane J., 1996. "Coordinated search for an object hidden on the line," European Journal of Operational Research, Elsevier, vol. 95(3), pages 663-670, December.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Steve Alpern, 2011. "Find-and-Fetch Search on a Tree," Operations Research, INFORMS, vol. 59(5), pages 1258-1268, October.
    2. Pierre Leone & Steve Alpern, 2018. "Rendezvous search with markers that can be dropped at chosen times," Naval Research Logistics (NRL), John Wiley & Sons, vol. 65(6-7), pages 449-461, September.
    3. Steve Alpern & Thomas Lidbetter, 2015. "Optimal Trade-Off Between Speed and Acuity When Searching for a Small Object," Operations Research, INFORMS, vol. 63(1), pages 122-133, February.
    4. Leone, Pierre & Buwaya, Julia & Alpern, Steve, 2022. "Search-and-rescue rendezvous," European Journal of Operational Research, Elsevier, vol. 297(2), pages 579-591.
    5. Steve Alpern & Thomas Lidbetter, 2014. "Searching a Variable Speed Network," Mathematics of Operations Research, INFORMS, vol. 39(3), pages 697-711, August.
    6. Alpern, Steve, 2008. "Line-of-sight rendezvous," European Journal of Operational Research, Elsevier, vol. 188(3), pages 865-883, August.
    7. Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.
    8. Steve Alpern, 2017. "Hide-and-Seek Games on a Network, Using Combinatorial Search Paths," Operations Research, INFORMS, vol. 65(5), pages 1207-1214, October.
    9. Cheng-Shang Chang & Wanjiun Liao & Ching-Min Lien, 2015. "On the Multichannel Rendezvous Problem: Fundamental Limits, Optimal Hopping Sequences, and Bounded Time-to-Rendezvous," Mathematics of Operations Research, INFORMS, vol. 40(1), pages 1-23, February.
    10. Steve Alpern & Li Zeng, 2022. "Social Distancing, Gathering, Search Games: Mobile Agents on Simple Networks," Dynamic Games and Applications, Springer, vol. 12(1), pages 288-311, March.
    11. Steve Alpern & Shmuel Gal, 2002. "Searching for an Agent Who May OR May Not Want to be Found," Operations Research, INFORMS, vol. 50(2), pages 311-323, April.
    12. Alpern, Steve & Katrantzi, Ioanna, 2009. "Equilibria of two-sided matching games with common preferences," European Journal of Operational Research, Elsevier, vol. 196(3), pages 1214-1222, August.
    13. Steve Alpern & Wei Shi Lim, 2002. "Rendezvous of three agents on the line," Naval Research Logistics (NRL), John Wiley & Sons, vol. 49(3), pages 244-255, April.
    14. Steve Alpern, 2011. "A New Approach to Gal’s Theory of Search Games on Weakly Eulerian Networks," Dynamic Games and Applications, Springer, vol. 1(2), pages 209-219, June.
    15. Alpern, Steve & Baston, Vic, 2006. "A common notion of clockwise can help in planar rendezvous," European Journal of Operational Research, Elsevier, vol. 175(2), pages 688-706, December.
    16. Pierre Leone & Steve Alpern, 2022. "A Symbolic Programming Approach to the Rendezvous Search Problem," SN Operations Research Forum, Springer, vol. 3(1), pages 1-29, March.
    17. Duvocelle, Benoit & Flesch, János & Staudigl, Mathias & Vermeulen, Dries, 2022. "A competitive search game with a moving target," European Journal of Operational Research, Elsevier, vol. 303(2), pages 945-957.
    18. Garrec, Tristan & Scarsini, Marco, 2020. "Search for an immobile hider on a stochastic network," European Journal of Operational Research, Elsevier, vol. 283(2), pages 783-794.
    19. Dinah Rosenberg & Eilon Solan & Nicolas Vieille, 2009. "Protocols with No Acknowledgment," Operations Research, INFORMS, vol. 57(4), pages 905-915, August.
    20. Andreas Blume & April Mitchell Franco & Paul Heidhues, 2021. "Dynamic coordination via organizational routines," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 72(4), pages 1001-1047, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:oropre:v:61:y:2013:i:2:p:265-279. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.