-
1
-
-
80051534209
-
Mixed-initiative optimization in security games: A preliminary report
-
B. An, M. Jain, M. Tambe, and C. Kiekintveld. Mixed-initiative optimization in security games: A preliminary report. In AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, pages 8-11, 2011.
-
(2011)
AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration
, pp. 8-11
-
-
An, B.1
Jain, M.2
Tambe, M.3
Kiekintveld, C.4
-
2
-
-
84868283798
-
Security games with limited surveillance
-
B. An, D. Kempe, C. Kiekintveld, E. Shieh, S. Singh, M. Tambe, and Y. Vorobeychik. Security games with limited surveillance. In AAAI, pages 1241-1248, 2012.
-
(2012)
AAAI
, pp. 1241-1248
-
-
An, B.1
Kempe, D.2
Kiekintveld, C.3
Shieh, E.4
Singh, S.5
Tambe, M.6
Vorobeychik, Y.7
-
3
-
-
80055055241
-
Refinement of strong stackelberg equilibria in security games
-
B. An, M. Tambe, F. Ordóñez, E. Shieh, and C. Kiekintveld. Refinement of strong Stackelberg equilibria in security games. In AAAI, pages 587-593, 2011.
-
(2011)
AAAI
, pp. 587-593
-
-
An, B.1
Tambe, M.2
Ordóñez, F.3
Shieh, E.4
Kiekintveld, C.5
-
4
-
-
70350350338
-
Leader-follower strategies for robotic patrolling in environments with arbitrary topologies
-
N. Basilico, N. Gatti, and F. Amigoni. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In AAMAS, pages 500-503, 2009.
-
(2009)
AAMAS
, pp. 500-503
-
-
Basilico, N.1
Gatti, N.2
Amigoni, F.3
-
5
-
-
84899407181
-
A graph-theoretic approach to protect static and moving targets from adversaries
-
J. P. Dickerson, G. I. Simari, V. S. Subrahmanian, and S. Kraus. A graph-theoretic approach to protect static and moving targets from adversaries. In AAMAS, pages 299-306, 2010.
-
(2010)
AAMAS
, pp. 299-306
-
-
Dickerson, J.P.1
Simari, G.I.2
Subrahmanian, V.S.3
Kraus, S.4
-
6
-
-
77953149312
-
Computing optimal randomized resource allocations for massive security games
-
C. Kiekintveld, M. Jain, J. Tsai, J. Pita, M. Tambe, and F. Ordóñez. Computing optimal randomized resource allocations for massive security games. In AAMAS, pages 689-696, 2009.
-
(2009)
AAMAS
, pp. 689-696
-
-
Kiekintveld, C.1
Jain, M.2
Tsai, J.3
Pita, J.4
Tambe, M.5
Ordóñez, F.6
-
7
-
-
77958598366
-
Complexity of computing optimal stackelberg strategies in security resource allocation games
-
D. Korzhyk, V. Conitzer, and R. Parr. Complexity of computing optimal Stackelberg strategies in security resource allocation games. In AAAI, pages 805-810, 2010.
-
(2010)
AAAI
, pp. 805-810
-
-
Korzhyk, D.1
Conitzer, V.2
Parr, R.3
-
8
-
-
84899414113
-
Solving stackelberg games with uncertain observability
-
D. Korzhyk, V. Conitzer, and R. Parr. Solving Stackelberg games with uncertain observability. In AAMAS, pages 1013-1020, 2011.
-
(2011)
AAMAS
, pp. 1013-1020
-
-
Korzhyk, D.1
Conitzer, V.2
Parr, R.3
-
9
-
-
34447251248
-
The value of commitment in contests and tournaments when observation is costly
-
J. Morgan and F. Vardy. The value of commitment in contests and tournaments when observation is costly. Games and Economic Behavior, 60(2): 326-338, 2007.
-
(2007)
Games and Economic Behavior
, vol.60
, Issue.2
, pp. 326-338
-
-
Morgan, J.1
Vardy, F.2
-
10
-
-
77955848771
-
Robust solutions to stackelberg games: Addressing bounded rationality and limited observations in human cognition
-
J. Pita, M. Jain, M. Tambe, F. Ordóñez, and S. Kraus. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence, 174(15): 1142-1171, 2010.
-
(2010)
Artificial Intelligence
, vol.174
, Issue.15
, pp. 1142-1171
-
-
Pita, J.1
Jain, M.2
Tambe, M.3
Ordóñez, F.4
Kraus, S.5
-
11
-
-
62349141490
-
Deployed ARMOR protection: The application of a game-theoretic model for security at the los angeles international airport
-
J. Pita, M. Jain, C. Western, C. Portway, M. Tambe, F. Ordóñez, S. Kraus, and P. Parachuri. Deployed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles International Airport. In AAMAS, pages 125-132, 2008.
-
(2008)
AAMAS
, pp. 125-132
-
-
Pita, J.1
Jain, M.2
Western, C.3
Portway, C.4
Tambe, M.5
Ordóñez, F.6
Kraus, S.7
Parachuri, P.8
-
12
-
-
84899424114
-
PROTECT: A deployed game theoretic system to protect the ports of the United States
-
E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, and G. Meyer. PROTECT: A deployed game theoretic system to protect the ports of the United States. In AAMAS, 2012.
-
(2012)
AAMAS
-
-
Shieh, E.1
An, B.2
Yang, R.3
Tambe, M.4
Baldwin, C.5
DiRenzo, J.6
Maule, B.7
Meyer, G.8
-
13
-
-
84864942282
-
-
Lessons Learned Cambridge University Press
-
E. Southers. LAX - terror target: the history, the reason, the countermeasure, chapter Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, pages 27-50. Cambridge University Press, 2011.
-
(2011)
LAX - Terror Target: The History, the Reason, the Countermeasure, Chapter Security and Game Theory: Algorithms, Deployed Systems
, pp. 27-50
-
-
Southers, E.1
-
15
-
-
12044256982
-
Support thoery: A nonextensional representation of subjective probability
-
A. Tversky and D. J. Koehler. Support thoery: A nonextensional representation of subjective probability. Psychological Review, 101: 547-567, 1994.
-
(1994)
Psychological Review
, vol.101
, pp. 547-567
-
-
Tversky, A.1
Koehler, D.J.2
-
16
-
-
0031256802
-
Games with imperfectly observable commitment
-
E. van Damme and S. Hurkens. Games with imperfectly observable commitment. Games and Economic Behavior, 21(1-2): 282-308, 1997.
-
(1997)
Games and Economic Behavior
, vol.21
, Issue.1-2
, pp. 282-308
-
-
Van Damme, E.1
Hurkens, S.2
-
18
-
-
80055033132
-
Risk-averse strategies for security games with execution and observational uncertainty
-
Z. Yin, M. Jain, M. Tambe, and F. Ordóñez. Risk-averse strategies for security games with execution and observational uncertainty. In AAAI, pages 758-763, 2011.
-
(2011)
AAAI
, pp. 758-763
-
-
Yin, Z.1
Jain, M.2
Tambe, M.3
Ordóñez, F.4
-
19
-
-
80053434424
-
Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness
-
Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg vs. nash in security games: interchangeability, equivalence, and uniqueness. In AAMAS, pages 1139-1146, 2010.
-
(2010)
AAMAS
, pp. 1139-1146
-
-
Yin, Z.1
Korzhyk, D.2
Kiekintveld, C.3
Conitzer, V.4
Tambe, M.5
|