1. Barrière, L., Flocchini, P., Fraigniaud, P., & Santoro, N. (2002). Capture of an intruder by mobile agents. In: Proceedings of the fourteenth annual ACM symposium on parallel algorithms and architectures (pp. 200–209). New York, NY, USA: ACM Press.
2. Bhattacharya S., Hutchinson S. (2010) On the existence of nash equilibrium for a visibility based pursuit evasion game. International Journal of Robotics Research, 29(7): 831–839
3. Bienstock D., Seymour P. (1991) Monotonicity in graph searching. Journal of Algorithms 12(2): 239–245
4. Borie, R., Tovey, C., & Koenig, S. (2009). Algorithms and complexity results for pursuit-evasion problems. In: Proceedings of the international joint conference on artificial intelligence (pp. 59–66).
5. Bresenham J. E. (1965) Algorithm for computer control of a digital plotter. IBM Systems Journal 4(1): 25–30