-
1
-
-
33644678492
-
Robust game theory
-
DOI 10.1007/s10107-005-0686-0
-
Aghassi, M., and Bertsimas, D. 2006. Robust game theory. Math. Program. 107:231-273. (Pubitemid 43334021)
-
(2006)
Mathematical Programming
, vol.107
, Issue.1-2
, pp. 231-273
-
-
Aghassi, M.1
Bertsimas, D.2
-
2
-
-
84899897281
-
The Impact of Adversarial Knowledge on Adversarial Planning in Perimeter Patrol
-
Agmon, N.; Sadov, V.; Kaminka, G. A.; and Kraus, S. 2008. The Impact of Adversarial Knowledge on Adversarial Planning in Perimeter Patrol. In AAMAS, volume 1.
-
(2008)
AAMAS
, vol.1
-
-
Agmon, N.1
Sadov, V.2
Kaminka, G.A.3
Kraus, S.4
-
5
-
-
84899863867
-
Leader-follower strategies for robotic patrolling in environments with arbitrary topologies
-
Basilico, N.; Gatti, N.; and Amigoni, F. 2009. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In AAMAS.
-
(2009)
AAMAS
-
-
Basilico, N.1
Gatti, N.2
Amigoni, F.3
-
6
-
-
33748712836
-
Computing the optimal strategy to commit to
-
Conitzer, V., and Sandholm, T. 2006. Computing the optimal strategy to commit to. In ACM EC-06, 82-90.
-
(2006)
ACM EC-06
, pp. 82-90
-
-
Conitzer, V.1
Sandholm, T.2
-
7
-
-
77955458634
-
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshals Service
-
Jain, M.; Tsai, J.; Pita, J.; Kiekintveld, C.; Rathi, S.; Tambe, M.; and Ordóñez, F. 2010. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshals Service. Interfaces 40:267-290.
-
(2010)
Interfaces
, vol.40
, pp. 267-290
-
-
Jain, M.1
Tsai, J.2
Pita, J.3
Kiekintveld, C.4
Rathi, S.5
Tambe, M.6
Ordóñez, F.7
-
8
-
-
80054962291
-
Robust bayesian methods for stackelberg security games
-
extended abstract
-
Kiekintveld, C.; Tambe, M.; and Marecki, J. 2010. Robust bayesian methods for stackelberg security games (extended abstract). In AAMAS Short Paper.
-
(2010)
AAMAS Short Paper
-
-
Kiekintveld, C.1
Tambe, M.2
Marecki, J.3
-
9
-
-
0042474230
-
Detecting network intrusions via sampling: A game theoretic approach
-
Kodialam, M., and Lakshman, T. 2003. Detecting network intrusions via sampling: A game theoretic approach. In INFOCOM.
-
(2003)
INFOCOM
-
-
Kodialam, M.1
Lakshman, T.2
-
10
-
-
77955848771
-
Robust solutions to stackelberg games: Addressing bounded rationality and limited observations in human cognition
-
Pita, J.; Jain, M.; Tambe, M.; Ordóñez, F.; and Kraus, S. 2010. Robust solutions to stackelberg games: Addressing bounded rationality and limited observations in human cognition. AIJ 174:1142-1171.
-
(2010)
AIJ
, vol.174
, pp. 1142-1171
-
-
Pita, J.1
Jain, M.2
Tambe, M.3
Ordóñez, F.4
Kraus, S.5
-
11
-
-
0031256802
-
Games with imperfectly observable commitment
-
DOI 10.1006/game.1997.0524, PII S0899825697905248
-
van Damme, E., and Hurkens, S. 1997. Games with imperfectly observable commitment. Games and Economic Behavior 21(1-2):282-308. (Pubitemid 127175536)
-
(1997)
Games and Economic Behavior
, vol.21
, Issue.1-2
, pp. 282-308
-
-
Van Damme, E.1
Hurkens, S.2
-
12
-
-
33748689631
-
Leadership with commitment to mixed strategies
-
Technical Report LSE-CDAM-2004-01
-
von Stengel, B., and Zamir, S. 2004. Leadership with commitment to mixed strategies. Technical Report LSE-CDAM-2004-01, CDAM Research Report.
-
(2004)
CDAM Research Report
-
-
Von Stengel, B.1
Zamir, S.2
-
13
-
-
80053434424
-
Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness
-
Yin, Z.; Korzhyk, D.; Kiekintveld, C.; Conitzer, V.; and Tambe, M. 2010. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. In AAMAS.
-
(2010)
AAMAS
-
-
Yin, Z.1
Korzhyk, D.2
Kiekintveld, C.3
Conitzer, V.4
Tambe, M.5
|