On the Power and Limitations of Deception in Multi-Robot Adversarial Patrolling

Authors: Noga Talmor, Noa Agmon

IJCAI 2017 | Conference PDF | Archive PDF | Plain Text | LLM Run Details

Reproducibility Variable Result LLM Response
Research Type Experimental We have fully implemented the deception mechanisms, and following an empirical evaluation, report the tradeoff between deception and probability of penetration detection along the perimeter in several cases.
Researcher Affiliation Academia Noga Talmor and Noa Agmon Department of Computer Science, Bar-Ilan University, Israel nogatalmor@gmail.com, agmon@cs.biu.ac.il
Pseudocode Yes Algorithm 1 Seemingly Random Patrol
Open Source Code No The paper states 'We have fully implemented the deception mechanisms' but does not provide a link or explicit statement about the code being open-source or publicly available.
Open Datasets No The paper describes a theoretical perimeter setup ('P into N identical time segments') and does not refer to a publicly available dataset with concrete access information.
Dataset Splits No The paper does not mention specific dataset split information (percentages, counts, or standard splits) as it does not use a pre-existing dataset.
Hardware Specification No The paper does not provide any specific hardware details (e.g., GPU/CPU models, memory) used for running its experiments.
Software Dependencies No The paper does not provide specific software dependencies with version numbers (e.g., Python, libraries, or solvers).
Experiment Setup No The paper describes the algorithmic logic and models but does not provide specific experimental setup details such as hyperparameter values, optimizer settings, or training schedules.