-
1
-
-
84869147896
-
Randomized pursuit-evasion in graphs
-
M. Adler, H. Racke, N. Sivadasan, C. Sohler, and B. Vocking. Randomized pursuit-evasion in graphs. In ICALP, pages 901-912, 2002.
-
(2002)
ICALP
, pp. 901-912
-
-
Adler, M.1
Racke, H.2
Sivadasan, N.3
Sohler, C.4
Vocking, B.5
-
3
-
-
79960566162
-
Path disruption games
-
Y. Bachrach and E. Porat. Path Disruption Games. In AAMAS, pages 1123-1130, 2010.
-
(2010)
AAMAS
, pp. 1123-1130
-
-
Bachrach, Y.1
Porat, E.2
-
4
-
-
70350350338
-
Leader-follower strategies for robotic patrolling in environments with arbitrary topologies
-
N. Basilico, N. Gatti, and F. Amigoni. Leader-Follower Strategies for Robotic Patrolling in Environments with Arbitrary Topologies. In AAMAS, pages 500-503, 2009.
-
(2009)
AAMAS
, pp. 500-503
-
-
Basilico, N.1
Gatti, N.2
Amigoni, F.3
-
5
-
-
77958587143
-
Battle for mumbai ends, death toll rises to 195
-
29 November
-
R. Chandran and G. Beitchman. Battle for Mumbai Ends, Death Toll Rises to 195. Times of India, 29 November 2008.
-
(2008)
Times of India
-
-
Chandran, R.1
Beitchman, G.2
-
6
-
-
84899407181
-
A graph-theoretic approach to protect static and moving targets from adversaries
-
J. Dickerson, G. Simari, V. Subrahmanian, and S. Kraus. A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries. In AAMAS, pages 299-306, 2010.
-
(2010)
AAMAS
, pp. 299-306
-
-
Dickerson, J.1
Simari, G.2
Subrahmanian, V.3
Kraus, S.4
-
7
-
-
71549163588
-
The hide and seek game of Von Neumann
-
M. M. Flood. The Hide and Seek Game of Von Neumann. MANAGEMENT SCIENCE, 18(5-Part-2):107-109, 1972.
-
(1972)
Management Science
, vol.18
, Issue.5 PART 2
, pp. 107-109
-
-
Flood, M.M.1
-
8
-
-
0004194991
-
-
Academic Press, New York
-
S. Gal. Search Games. Academic Press, New York, 1980.
-
(1980)
Search Games
-
-
Gal, S.1
-
9
-
-
78751683676
-
Multi-step multi-sensor hider-seeker games
-
E. Halvorson, V. Conitzer, and R. Parr. Multi-step Multi-sensor Hider-Seeker Games. In IJCAI, pages 159-166, 2009.
-
(2009)
IJCAI
, pp. 159-166
-
-
Halvorson, E.1
Conitzer, V.2
Parr, R.3
-
10
-
-
77958590576
-
Security games with arbitrary schedules: A branch and price approach
-
M. Jain, E. Kardes, C. Kiekintveld, F. Ordonez, and M. Tambe. Security Games with Arbitrary Schedules: A Branch and Price Approach. In AAAI, pages 792-797, 2010.
-
(2010)
AAAI
, pp. 792-797
-
-
Jain, M.1
Kardes, E.2
Kiekintveld, C.3
Ordonez, F.4
Tambe, M.5
-
11
-
-
1942452324
-
Planning in the presence of cost functions controlled by an adversary
-
H. B. McMahan, G. J. Gordon, and A. Blum. Planning in the Presence of Cost Functions Controlled by an Adversary. In ICML, pages 536-543, 2003.
-
(2003)
ICML
, pp. 536-543
-
-
McMahan, H.B.1
Gordon, G.J.2
Blum, A.3
-
12
-
-
21244466146
-
Zur theorie der gesellschaftsspiele
-
J. V. Neumann. Zur Theorie der Gesellschaftsspiele. Mathematische Annalen, 100(1):295-320, 1928.
-
(1928)
Mathematische Annalen
, vol.100
, Issue.1
, pp. 295-320
-
-
Neumann, J.V.1
-
13
-
-
64749085271
-
Using game theory for Los Angeles airport security
-
J. Pita, M. Jain, F. Ordonez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus. Using Game Theory for Los Angeles Airport Security. AI Magazine, 30(1), 2009.
-
(2009)
AI Magazine
, vol.30
, Issue.1
-
-
Pita, J.1
Jain, M.2
Ordonez, F.3
Portway, C.4
Tambe, M.5
Western, C.6
Paruchuri, P.7
Kraus, S.8
-
14
-
-
0016930068
-
Ambushing random walks I: Finite models
-
W. Ruckle, R. Fennell, P. T. Holmes, and C. Fennemore. Ambushing Random Walks I: Finite Models. Operations Research, 24:314-324, 1976.
-
(1976)
Operations Research
, vol.24
, pp. 314-324
-
-
Ruckle, W.1
Fennell, R.2
Holmes, P.T.3
Fennemore, C.4
-
15
-
-
77958574403
-
Urban security: Game-theoretic resource allocation in networked physical domains
-
J. Tsai, Z. Yin, J. young Kwak, D. Kempe, C. Kiekintveld, and M. Tambe. Urban security: Game-theoretic resource allocation in networked physical domains. In AAAI, pages 881-886, 2010.
-
(2010)
AAAI
, pp. 881-886
-
-
Tsai, J.1
Yin, Z.2
Kwak, J.Y.3
Kempe, D.4
Kiekintveld, C.5
Tambe, M.6
-
16
-
-
80051929143
-
Transiting areas patrolled by a mobile adversary
-
O. Vanek, B. Bosansky, M. Jakob, and M. Pechoucek. Transiting Areas Patrolled by a Mobile Adversary. In IEEE CIG, pages 9-16, 2010.
-
(2010)
IEEE CIG
, pp. 9-16
-
-
Vanek, O.1
Bosansky, B.2
Jakob, M.3
Pechoucek, M.4
-
17
-
-
0001590955
-
Two-person zero-sum games for network interdiction
-
A. Washburn and K. Wood. Two-person Zero-sum Games for Network Interdiction. Operations Research, 43(2):243-251, 1995.
-
(1995)
Operations Research
, vol.43
, Issue.2
, pp. 243-251
-
-
Washburn, A.1
Wood, K.2
-
18
-
-
80053434424
-
Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness
-
Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg vs. Nash in Security Games: Interch- Angeability, Equivalence, and Uniqueness. In AAMAS, pages 1139-1146, 2010.
-
(2010)
AAMAS
, pp. 1139-1146
-
-
Yin, Z.1
Korzhyk, D.2
Kiekintveld, C.3
Conitzer, V.4
Tambe, M.5
|