IDEAS home Printed from https://ideas.repec.org/a/inm/oropre/v61y2013i2p265-279.html
   My bibliography  Save this article

Mining Coal or Finding Terrorists: The Expanding Search Paradigm

Author

Listed:
  • Steve Alpern

    (ORMS Group, Warwick Business School, University of Warwick, Coventry CV4 7AL, United Kingdom)

  • Thomas Lidbetter

    (Department of Mathematics, London School of Economics, London WC2A 2AE, United Kingdom)

Abstract

We show how to optimize the search for a hidden object, terrorist, or simply Hider, located at a point H according to a known or unknown distribution (nu) on a rooted network Q . We modify the traditional “pathwise search” approach to a more general notion of “expanding search.” When the Hider is restricted to the nodes of Q , an expanding search S consists of an ordering \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$(a_{1},a_{2},\ldots)$\end{document} of the arcs of a spanning subtree such that the root node is in a 1 and every arc a i is adjacent to a previous arc a j , j i . If a k contains H , the search time T is \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\lambda (a_{1}) +\cdots +\lambda (a_{k})$\end{document} , where (lambda) is length measure on Q . For more general distributions (nu) , an expanding search S is described by the nested family of connected sets S ( t ) that specify the area of Q that has been covered by time t . S (0) is the root, \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\lambda (S(t) ) =t$, and $T=\min \{ t: H \in S(t)\}$\end{document} . For a known Hider distribution (nu) on a tree Q , the expected time minimizing strategy \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\bar{S}$\end{document} begins with the rooted subtree Q ' maximizing the “density” (nu) ( Q ')/ (lambda) ( Q '). (For arbitrary networks, we use this criterion on all spanning subtrees.) The search \documentclass{aastex}\usepackage{amsbsy}\usepackage{amsfonts}\usepackage{amssymb}\usepackage{bm}\usepackage{mathrsfs}\usepackage{pifont}\usepackage{stmaryrd}\usepackage{textcomp}\usepackage{portland,xspace}\usepackage{amsmath,amsxtra}\pagestyle{empty}\DeclareMathSizes{10}{9}{7}{6}\begin{document}$\bar{S}$\end{document} can be interpreted as the optimal method of mining known coal seams, when the time to move miners or machines is negligible compared to digging time. When the Hider distribution is unknown, we consider the zero-sum search game where the Hider picks H , the Searcher S , and the payoff is T . For trees Q , the value is V = ( (lambda) ( Q ) + D )/2, where D is a mean distance from root to leaf nodes. If Q is 2-arc connected, V = (lambda) ( Q )/2. Applications and interpretations of the expanding search paradigm are given, particularly to multiple agent search.

Suggested Citation

  • Steve Alpern & Thomas Lidbetter, 2013. "Mining Coal or Finding Terrorists: The Expanding Search Paradigm," Operations Research, INFORMS, vol. 61(2), pages 265-279, April.
  • Handle: RePEc:inm:oropre:v:61:y:2013:i:2:p:265-279
    DOI: 10.1287/opre.1120.1134
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/opre.1120.1134
    Download Restriction: no

    File URL: https://libkey.io/10.1287/opre.1120.1134?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. S. Gal & J. V. Howard, 2005. "Rendezvous-Evasion Search in Two Boxes," Operations Research, INFORMS, vol. 53(4), pages 689-697, August.
    2. Kensaku Kikuta & William H. Ruckle, 1994. "Initial point search on weighted trees," Naval Research Logistics (NRL), John Wiley & Sons, vol. 41(6), pages 821-831, October.
    3. Shmuel Gal, 1999. "Rendezvous Search on the Line," Operations Research, INFORMS, vol. 47(6), pages 974-976, December.
    4. Steve Alpern, 2002. "Rendezvous Search: A Personal Perspective," Operations Research, INFORMS, vol. 50(5), pages 772-795, October.
    5. Reijnierse, J H & Potters, J A M, 1993. "Search Games with Immobile Hider," International Journal of Game Theory, Springer;Game Theory Society, vol. 21(4), pages 385-394.
    6. Jotshi, Arun & Batta, Rajan, 2008. "Search for an immobile entity on a network," European Journal of Operational Research, Elsevier, vol. 191(2), pages 347-359, December.
    7. Reyniers, Diane J., 1996. "Coordinated search for an object hidden on the line," European Journal of Operational Research, Elsevier, vol. 95(3), pages 663-670, December.
    8. Elizabeth J. Chester & Reha H. Tütüncü, 2004. "Rendezvous Search on the Labeled Line," Operations Research, INFORMS, vol. 52(2), pages 330-334, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Bui, Thuy & Lidbetter, Thomas, 2023. "Optimal patrolling strategies for trees and complete networks," European Journal of Operational Research, Elsevier, vol. 311(2), pages 769-776.
    2. Hellerstein, Lisa & Lidbetter, Thomas, 2023. "A game theoretic approach to a problem in polymatroid maximization," European Journal of Operational Research, Elsevier, vol. 305(2), pages 979-988.
    3. Steve Alpern & Thomas Lidbetter, 2014. "Searching a Variable Speed Network," Mathematics of Operations Research, INFORMS, vol. 39(3), pages 697-711, August.
    4. Steve Alpern, 2017. "Hide-and-Seek Games on a Network, Using Combinatorial Search Paths," Operations Research, INFORMS, vol. 65(5), pages 1207-1214, October.
    5. Alpern, Steve & Lidbetter, Thomas, 2020. "Search and Delivery Man Problems: When are depth-first paths optimal?," European Journal of Operational Research, Elsevier, vol. 285(3), pages 965-976.
    6. Vic Baston & Kensaku Kikuta, 2015. "Search games on a network with travelling and search costs," International Journal of Game Theory, Springer;Game Theory Society, vol. 44(2), pages 347-365, May.
    7. Yolmeh, Abdolmajid & Baykal-Gürsoy, Melike, 2021. "Weighted network search games with multiple hidden objects and multiple search teams," European Journal of Operational Research, Elsevier, vol. 289(1), pages 338-349.
    8. Steve Alpern & Thomas Lidbetter, 2015. "Optimal Trade-Off Between Speed and Acuity When Searching for a Small Object," Operations Research, INFORMS, vol. 63(1), pages 122-133, February.
    9. Felix Happach & Lisa Hellerstein & Thomas Lidbetter, 2022. "A General Framework for Approximating Min Sum Ordering Problems," INFORMS Journal on Computing, INFORMS, vol. 34(3), pages 1437-1452, May.
    10. Ben Hermans & Roel Leus & Jannik Matuschke, 2022. "Exact and Approximation Algorithms for the Expanding Search Problem," INFORMS Journal on Computing, INFORMS, vol. 34(1), pages 281-296, January.
    11. Liu, Dehai & Xiao, Xingzhi & Li, Hongyi & Wang, Weiguo, 2015. "Historical evolution and benefit–cost explanation of periodical fluctuation in coal mine safety supervision: An evolutionary game analysis framework," European Journal of Operational Research, Elsevier, vol. 243(3), pages 974-984.
    12. Steven M. Shechter & Farhad Ghassemi & Yasin Gocgun & Martin L. Puterman, 2015. "Technical Note—Trading Off Quick versus Slow Actions in Optimal Search," Operations Research, INFORMS, vol. 63(2), pages 353-362, April.
    13. Robbert Fokkink & Thomas Lidbetter & László A. Végh, 2019. "On Submodular Search and Machine Scheduling," Management Science, INFORMS, vol. 44(4), pages 1431-1449, November.
    14. Steve Alpern & Thomas Lidbetter, 2019. "Approximate solutions for expanding search games on general networks," Annals of Operations Research, Springer, vol. 275(2), pages 259-279, April.
    15. Angelopoulos, Spyros & Lidbetter, Thomas, 2020. "Competitive search in a network," European Journal of Operational Research, Elsevier, vol. 286(2), pages 781-790.
    16. Tianyu Wang & Igor Averbakh, 2022. "Network construction/restoration problems: cycles and complexity," Journal of Combinatorial Optimization, Springer, vol. 44(1), pages 51-73, August.
    17. Vassili Kolokoltsov, 2017. "The Evolutionary Game of Pressure (or Interference), Resistance and Collaboration," Mathematics of Operations Research, INFORMS, vol. 42(4), pages 915-944, November.
    18. Lidbetter, Thomas, 2020. "Search and rescue in the face of uncertain threats," European Journal of Operational Research, Elsevier, vol. 285(3), pages 1153-1160.
    19. Ben Hermans & Herbert Hamers & Roel Leus & Roy Lindelauf, 2019. "Timely exposure of a secret project: Which activities to monitor?," Naval Research Logistics (NRL), John Wiley & Sons, vol. 66(6), pages 451-468, September.
    20. Deutsch, Yael, 2021. "A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game," European Journal of Operational Research, Elsevier, vol. 288(3), pages 1036-1052.
    21. Spyros Angelopoulos, 2022. "Further connections between contract-scheduling and ray-searching problems," Journal of Scheduling, Springer, vol. 25(2), pages 139-155, April.
    22. Baston, Vic & Kikuta, Kensaku, 2019. "A search problem on a bipartite network," European Journal of Operational Research, Elsevier, vol. 277(1), pages 227-237.
    23. Garrec, Tristan & Scarsini, Marco, 2020. "Search for an immobile hider on a stochastic network," European Journal of Operational Research, Elsevier, vol. 283(2), pages 783-794.
    24. Robbert Fokkink & Ken Kikuta & David Ramsey, 2017. "The search value of a set," Annals of Operations Research, Springer, vol. 256(1), pages 63-73, September.
    25. Lidbetter, Thomas, 2017. "On the approximation ratio of the Random Chinese Postman Tour for network search," European Journal of Operational Research, Elsevier, vol. 263(3), pages 782-788.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Steve Alpern, 2011. "Find-and-Fetch Search on a Tree," Operations Research, INFORMS, vol. 59(5), pages 1258-1268, October.
    2. Steve Alpern & Thomas Lidbetter, 2015. "Optimal Trade-Off Between Speed and Acuity When Searching for a Small Object," Operations Research, INFORMS, vol. 63(1), pages 122-133, February.
    3. Leone, Pierre & Buwaya, Julia & Alpern, Steve, 2022. "Search-and-rescue rendezvous," European Journal of Operational Research, Elsevier, vol. 297(2), pages 579-591.
    4. Pierre Leone & Steve Alpern, 2018. "Rendezvous search with markers that can be dropped at chosen times," Naval Research Logistics (NRL), John Wiley & Sons, vol. 65(6-7), pages 449-461, September.
    5. Alpern, Steve, 2008. "Line-of-sight rendezvous," European Journal of Operational Research, Elsevier, vol. 188(3), pages 865-883, August.
    6. Steve Alpern & Thomas Lidbetter, 2014. "Searching a Variable Speed Network," Mathematics of Operations Research, INFORMS, vol. 39(3), pages 697-711, August.
    7. Oléron Evans, Thomas P. & Bishop, Steven R., 2013. "Static search games played over graphs and general metric spaces," European Journal of Operational Research, Elsevier, vol. 231(3), pages 667-689.
    8. Steve Alpern, 2017. "Hide-and-Seek Games on a Network, Using Combinatorial Search Paths," Operations Research, INFORMS, vol. 65(5), pages 1207-1214, October.
    9. Alpern, Steve & Baston, Vic, 2006. "A common notion of clockwise can help in planar rendezvous," European Journal of Operational Research, Elsevier, vol. 175(2), pages 688-706, December.
    10. Cheng-Shang Chang & Wanjiun Liao & Ching-Min Lien, 2015. "On the Multichannel Rendezvous Problem: Fundamental Limits, Optimal Hopping Sequences, and Bounded Time-to-Rendezvous," Mathematics of Operations Research, INFORMS, vol. 40(1), pages 1-23, February.
    11. Steve Alpern & Li Zeng, 2022. "Social Distancing, Gathering, Search Games: Mobile Agents on Simple Networks," Dynamic Games and Applications, Springer, vol. 12(1), pages 288-311, March.
    12. Pierre Leone & Steve Alpern, 2022. "A Symbolic Programming Approach to the Rendezvous Search Problem," SN Operations Research Forum, Springer, vol. 3(1), pages 1-29, March.
    13. Duvocelle, Benoit & Flesch, János & Staudigl, Mathias & Vermeulen, Dries, 2022. "A competitive search game with a moving target," European Journal of Operational Research, Elsevier, vol. 303(2), pages 945-957.
    14. Steve Alpern & Shmuel Gal, 2002. "Searching for an Agent Who May OR May Not Want to be Found," Operations Research, INFORMS, vol. 50(2), pages 311-323, April.
    15. Alpern, Steve & Katrantzi, Ioanna, 2009. "Equilibria of two-sided matching games with common preferences," European Journal of Operational Research, Elsevier, vol. 196(3), pages 1214-1222, August.
    16. Steve Alpern & Wei Shi Lim, 2002. "Rendezvous of three agents on the line," Naval Research Logistics (NRL), John Wiley & Sons, vol. 49(3), pages 244-255, April.
    17. Steve Alpern, 2011. "A New Approach to Gal’s Theory of Search Games on Weakly Eulerian Networks," Dynamic Games and Applications, Springer, vol. 1(2), pages 209-219, June.
    18. Garrec, Tristan & Scarsini, Marco, 2020. "Search for an immobile hider on a stochastic network," European Journal of Operational Research, Elsevier, vol. 283(2), pages 783-794.
    19. Dinah Rosenberg & Eilon Solan & Nicolas Vieille, 2009. "Protocols with No Acknowledgment," Operations Research, INFORMS, vol. 57(4), pages 905-915, August.
    20. J. V. Howard & Marco Timmer, 2013. "New results on rendezvous search on the interval," Naval Research Logistics (NRL), John Wiley & Sons, vol. 60(6), pages 454-467, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:oropre:v:61:y:2013:i:2:p:265-279. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.