ARTFEED — Contemporary Art Intelligence

New Algorithmic Method Improves Finite-Memory Strategies in Adversarial Patrolling Games

other · 2026-04-22

A computational research paper introduces a novel general method for optimizing finite-memory strategies in adversarial patrolling games, a subclass of security games. The work addresses a significant open problem: the manual assignment of memory size at each location, which has limited the practical application of these strategies. Finite-memory strategies, also known as regular strategies, have been shown to outperform other classes in experimental settings. These strategies function as positional strategies operating on a finite set of states, where each state combines a location with an integer memory value. While existing algorithms refine the transitional probabilities between states, they rely on a pre-determined, manually assigned memory allocation. The newly developed method proposes an iterative approach to automate and improve this memory assignment process, potentially enhancing the Defender's ability to minimize worst-case damage from an Attacker. The research is documented in the paper "Memory Assignment for Finite-Memory Strategies in Adversarial Patrolling Games," identified as arXiv:2505.14137v2, which was announced as a replacement. In these security scenarios, a Defender patrols between locations to protect vulnerable targets against an Attacker.

Key facts

  • The paper addresses adversarial patrolling games, a subclass of security games.
  • It focuses on constructing a Defender strategy to minimize worst-case Attacker damage.
  • Finite-memory (regular) strategies are the primary subject, noted for experimental superiority.
  • A finite-memory strategy is a positional strategy on a finite set of states.
  • Each state is a pair of a location and an integer memory value.
  • Existing algorithms improve state transition probabilities but require manual memory size assignment.
  • Choosing the right memory assignment is a known open and hard problem.
  • The paper develops a general, iterative method to solve the memory assignment issue.

Entities

Institutions

  • arXiv

Sources