Effects of cueing in cooperative search
Author
Abstract
Suggested Citation
DOI: 10.1002/nav.20172
Download full text from publisher
References listed on IDEAS
- B. O. Koopman, 1956. "The Theory of Search. II. Target Detection," Operations Research, INFORMS, vol. 4(5), pages 503-531, October.
- Lyn C. Thomas & Alan R. Washburn, 1991. "Dynamic Search Games," Operations Research, INFORMS, vol. 39(3), pages 415-422, June.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Laan, Corine M. & van der Mijden, Tom & Barros, Ana Isabel & Boucherie, Richard J. & Monsuur, Herman, 2017. "An interdiction game on a queueing network with multiple intruders," European Journal of Operational Research, Elsevier, vol. 260(3), pages 1069-1080.
- Elina Stengård & Ronald van den Berg, 2019. "Imperfect Bayesian inference in visual perception," PLOS Computational Biology, Public Library of Science, vol. 15(4), pages 1-27, April.
- J F J Vermeulen & M van den Brink, 2005. "The search for an alerted moving target," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 56(5), pages 514-525, May.
- Gordon McCormick & Guillermo Owen, 2019. "A composite game of hide and seek," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 27(1), pages 1-14, March.
- Patriksson, Michael, 2008. "A survey on the continuous nonlinear resource allocation problem," European Journal of Operational Research, Elsevier, vol. 185(1), pages 1-46, February.
- Kompas, Tom & Chu, Long & Nguyen, Hoa Thi Minh, 2016. "A practical optimal surveillance policy for invasive weeds: An application to Hawkweed in Australia," Ecological Economics, Elsevier, vol. 130(C), pages 156-165.
- Manisha Bhardwaj & Ronald van den Berg & Wei Ji Ma & Krešimir Josić, 2016. "Do People Take Stimulus Correlations into Account in Visual Search?," PLOS ONE, Public Library of Science, vol. 11(3), pages 1-16, March.
- Peter Kolesar & Kellen Leister & Daniel Stimpson & Ronald Woodaman, 2013. "A simple model of optimal clearance of improvised explosive devices," Annals of Operations Research, Springer, vol. 208(1), pages 451-468, September.
- Garrec, Tristan, 2019. "Continuous patrolling and hiding games," European Journal of Operational Research, Elsevier, vol. 277(1), pages 42-51.
- Hohzaki, Ryusuke, 2006. "Search allocation game," European Journal of Operational Research, Elsevier, vol. 172(1), pages 101-119, July.
- Kompas, Tom & Chu, Long & McKirdy, Simon & Thomas, Melissa & Van Der Merwe, Johann, 2023. "Optimal post-border surveillance against invasive pests to protect a valuable nature reserve and island asset," Ecological Economics, Elsevier, vol. 208(C).
- Timothy H. Chung & Rachel T. Silvestrini, 2014. "Modeling and analysis of exhaustive probabilistic search," Naval Research Logistics (NRL), John Wiley & Sons, vol. 61(2), pages 164-178, March.
- Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.
- Corine M Laan & Ana Isabel Barros & Richard J Boucherie & Herman Monsuur & Wouter Noordkamp, 2020. "Optimal deployment for anti-submarine operations with time-dependent strategies," The Journal of Defense Modeling and Simulation, , vol. 17(4), pages 419-434, October.
- Baykal-Gürsoy, Melike & Duan, Zhe & Poor, H. Vincent & Garnaev, Andrey, 2014. "Infrastructure security games," European Journal of Operational Research, Elsevier, vol. 239(2), pages 469-478.
- Robert F. Dell & James N. Eagle & Gustavo Henrique Alves Martins & Almir Garnier Santos, 1996. "Using multiple searchers in constrained‐path, moving‐target search problems," Naval Research Logistics (NRL), John Wiley & Sons, vol. 43(4), pages 463-480, June.
- Kyle Y. Lin & Michael P. Atkinson & Timothy H. Chung & Kevin D. Glazebrook, 2013. "A Graph Patrol Problem with Random Attack Times," Operations Research, INFORMS, vol. 61(3), pages 694-710, June.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:navres:v:53:y:2006:i:8:p:814-821. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)1520-6750 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.