1. Agmon, N., Kraus, S., & Kaminka, G. (2008a). Multi-robot perimeter patrol in adversarial settings. In Proceedings of IEEE international conference on robotics and automation, 2008 (pp. 2339–2345).
2. Agmon, N., Sadov, V., Kraus, S., & Kaminka, G. (2008b). The impact of adversarial knowledge on adversarial planning in perimeter patrol. In Proceedings of the international conference on autonomous agents and multi-agent systems, 2008 (pp. 55–62).
3. Barriere, L., Flocchini, P., Fraigniaud, P., & Santoro, N. (2002). Capture of an intruder by mobile agents. In Proceedings of the 14th annual ACM symposium on parallel algorithms and architectures, 2002 (pp. 200–209).
4. Bienstock, D., & Seymour, P. (1991). Monotonicity in graph searching. Journal of Algorithms, 12(2), 239–245.
5. Bodlaender, H., & Kolks, T. (1996). Efficient and constructive algorithms for the pathwidth and treewidth of graphs. Journal of Algorithms, 21, 358–402.