-
1
-
-
84899897281
-
The impact of adversarial knowledge on adversarial planning in perimeter patrol
-
N. Agmon, V. Sadov, G. A. Kaminka, and S. Kraus. The Impact of Adversarial Knowledge on Adversarial Planning in Perimeter Patrol. In AAMAS, Volume 1, pages 55-62, 2008.
-
(2008)
AAMAS
, vol.1
, pp. 55-62
-
-
Agmon, N.1
Sadov, V.2
Kaminka, G.A.3
Kraus, S.4
-
2
-
-
67649304665
-
Inspection games
-
R. J. Aumann and S. Hart, editors chapter 51 North-Holland, Amsterdam
-
R. Avenhaus, B. von Stengel, and S. Zamir. Inspection Games. In R. J. Aumann and S. Hart, editors, Handbook of Game Theory, Volume 3, chapter 51, pages 1947-1987. North-Holland, Amsterdam, 2002.
-
(2002)
Handbook of Game Theory
, vol.3
, pp. 1947-1987
-
-
Avenhaus, R.1
Von Stengel, B.2
Zamir, S.3
-
3
-
-
70350350338
-
Leader-follower strategies for robotic patrolling in environments with arbitrary topologies
-
N. Basilico, N. Gatti, and F. Amigoni. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In AAMAS, pages 500-503, 2009.
-
(2009)
AAMAS
, pp. 500-503
-
-
Basilico, N.1
Gatti, N.2
Amigoni, F.3
-
5
-
-
33748712836
-
Computing the optimal strategy to commit to
-
V. Conitzer and T. Sandholm. Computing the optimal strategy to commit to. In ACM EC-06, pages 82-90, 2006.
-
(2006)
ACM EC-06
, pp. 82-90
-
-
Conitzer, V.1
Sandholm, T.2
-
6
-
-
0002754086
-
A generalized nash solution for two-person bargaining games with incomplete information
-
J. Harsanyi and R. Selten. A generalized nash solution for two-person bargaining games with incomplete information. In Management Science, Volume 18, pages 80-106, 1972.
-
(1972)
Management Science
, vol.18
, pp. 80-106
-
-
Harsanyi, J.1
Selten, R.2
-
7
-
-
77958590576
-
Security games with arbitrary schedules: A branch and price approach
-
M. Jain, E. Kardes, C. Kiekintveld, F. Ordonez, and M. Tambe. Security games with arbitrary schedules: A branch and price approach. In AAAI, pages 792-797, 2010.
-
(2010)
AAAI
, pp. 792-797
-
-
Jain, M.1
Kardes, E.2
Kiekintveld, C.3
Ordonez, F.4
Tambe, M.5
-
8
-
-
77955458634
-
Software assistants for randomized patrol planning for the LAX airport police and the federal air marshals service
-
M. Jain, J. Tsai, J. Pita, C. Kiekintveld, S. Rathi, M. Tambe, and F. Ordonez. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshals Service. Interfaces, 40:267-290, 2010.
-
(2010)
Interfaces
, vol.40
, pp. 267-290
-
-
Jain, M.1
Tsai, J.2
Pita, J.3
Kiekintveld, C.4
Rathi, S.5
Tambe, M.6
Ordonez, F.7
-
9
-
-
77953149312
-
Computing optimal randomized resource allocations for massive security games
-
C. Kiekintveld, M. Jain, J. Tsai, J. Pita, M. Tambe, and F. Ordonez. Computing optimal randomized resource allocations for massive security games. In AAMAS, pages 689-696, 2009.
-
(2009)
AAMAS
, pp. 689-696
-
-
Kiekintveld, C.1
Jain, M.2
Tsai, J.3
Pita, J.4
Tambe, M.5
Ordonez, F.6
-
10
-
-
84899446115
-
Approximation methods for infinite Bayesian stackelberg games: Modeling distributional payoff uncertainty
-
to appear
-
C. Kiekintveld, J. Marecki, and M. Tambe. Approximation methods for infinite Bayesian Stackelberg games: Modeling distributional payoff uncertainty. In AAMAS, 2011-to appear.
-
(2011)
AAMAS
-
-
Kiekintveld, C.1
Marecki, J.2
Tambe, M.3
-
11
-
-
0042474230
-
Detecting network intrusions via sampling: A game theoretic approach
-
M. Kodialam and T. Lakshman. Detecting network intrusions via sampling: A game theoretic approach. In INFOCOM, pages 1880-1889, 2003.
-
(2003)
INFOCOM
, pp. 1880-1889
-
-
Kodialam, M.1
Lakshman, T.2
-
12
-
-
77958598366
-
Complexity of computing optimal stackelberg strategies in security resource allocation games
-
D. Korzhyk, V. Conitzer, and R. Parr. Complexity of computing optimal stackelberg strategies in security resource allocation games. In AAAI, pages 805-810, 2010.
-
(2010)
AAAI
, pp. 805-810
-
-
Korzhyk, D.1
Conitzer, V.2
Parr, R.3
-
13
-
-
0018060592
-
On generalized stackelberg strategies
-
G. Leitmann. On generalized Stackelberg strategies. Optimization Theory and Applications, 26(4):637-643, 1978.
-
(1978)
Optimization Theory and Applications
, vol.26
, Issue.4
, pp. 637-643
-
-
Leitmann, G.1
-
14
-
-
71549163155
-
Learning and approximating the optimal strategy to commit to
-
J. Letchford, V. Conitzer, and K. Munagala. Learning and approximating the optimal strategy to commit to. In SAGT, pages 250-262, 2009.
-
(2009)
SAGT
, pp. 250-262
-
-
Letchford, J.1
Conitzer, V.2
Munagala, K.3
-
15
-
-
62349117616
-
Playing games with security: An efficient exact algorithm for Bayesian stackelberg games
-
P. Paruchuri, J. P. Pearce, J. Marecki, M. Tambe, F. Ordonez, and S. Kraus. Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In AAMAS-08, pages 895-902, 2008.
-
(2008)
AAMAS-08
, pp. 895-902
-
-
Paruchuri, P.1
Pearce, J.P.2
Marecki, J.3
Tambe, M.4
Ordonez, F.5
Kraus, S.6
-
16
-
-
84899861231
-
IRIS: A tool for strategic security allocation in transportation networks
-
J. Tsai, S. Rathi, C. Kiekintveld, F. Ordonez, and M. Tambe. IRIS: a tool for strategic security allocation in transportation networks. In AAMAS (Industry Track), pages 37-44, 2009.
-
(2009)
AAMAS (Industry Track)
, pp. 37-44
-
-
Tsai, J.1
Rathi, S.2
Kiekintveld, C.3
Ordonez, F.4
Tambe, M.5
-
17
-
-
29344466989
-
Approximate strategic reasoning through hierarchical reduction of large symmetric games
-
M. P. Wellman, D. M. Reeves, K. M. Lochner, S.-F. Cheng, and R. Suri. Approximate strategic reasoning through hierarchical reduction of large symmetric games. In AAAI, pages 502-508, 2005.
-
(2005)
AAAI
, pp. 502-508
-
-
Wellman, M.P.1
Reeves, D.M.2
Lochner, K.M.3
Cheng, S.-F.4
Suri, R.5
|