-
2
-
-
84899414515
-
Studying (Non-planar) road networks through an algorithmic lens
-
D. Eppstein and M. T. Goodrich. Studying (Non-Planar) Road Networks Through an Algorithmic Lens. CoRR, abs/0808.3694, 2008.
-
(2008)
CoRR, Abs/0808.3694
-
-
Eppstein, D.1
Goodrich, M.T.2
-
3
-
-
0004194991
-
-
Academic Press, New York
-
S. Gal. Search Games. Academic Press, New York, 1980.
-
(1980)
Search Games
-
-
Gal, S.1
-
4
-
-
54849431370
-
Openstreetmap: User-generated street maps
-
M. Haklay and P. Weber. Openstreetmap: user-generated street maps. Pervasive Computing, IEEE, 7(4): 12-18, 2008.
-
(2008)
Pervasive Computing, IEEE
, vol.7
, Issue.4
, pp. 12-18
-
-
Haklay, M.1
Weber, P.2
-
5
-
-
78751683676
-
Multi-step multi-sensor hider-seeker games
-
E. Halvorson, V. Conitzer, and R. Parr. Multi-step Multi-sensor Hider-Seeker Games. In IJCAI, pages 159-166, 2009.
-
(2009)
IJCAI
, pp. 159-166
-
-
Halvorson, E.1
Conitzer, V.2
Parr, R.3
-
6
-
-
84899460757
-
A double oracle algorithm for zero-sum security games on graphs
-
M. Jain, D. Korzhyk, O. Vanek, V. Conitzer, M. Pechoucek, and M. Tambe. A Double Oracle Algorithm for Zero-Sum Security Games on Graphs. In AAMAS, 2011.
-
(2011)
AAMAS
-
-
Jain, M.1
Korzhyk, D.2
Vanek, O.3
Conitzer, V.4
Pechoucek, M.5
Tambe, M.6
-
7
-
-
84896061093
-
The deployment-to-saturation ratio in security games
-
M. Jain, K. Leyton-Brown, and M. Tambe. The Deployment-to-Saturation Ratio in Security Games. In AAAI, 2012.
-
(2012)
AAAI
-
-
Jain, M.1
Leyton-Brown, K.2
Tambe, M.3
-
8
-
-
1942452324
-
Planning in the presence of cost functions controlled by an adversary
-
H. B. McMahan, G. J. Gordon, and A. Blum. Planning in the Presence of Cost Functions Controlled by an Adversary. In ICML, pages 536-543, 2003.
-
(2003)
ICML
, pp. 536-543
-
-
McMahan, H.B.1
Gordon, G.J.2
Blum, A.3
-
9
-
-
0000095809
-
An analysis of approximations for maximizing submodular set functions-I
-
Dec
-
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An Analysis of Approximations for Maximizing Submodular Set Functions-I. Mathematical Programming, 14(1): 265-294, Dec 1978.
-
(1978)
Mathematical Programming
, vol.14
, Issue.1
, pp. 265-294
-
-
Nemhauser, G.L.1
Wolsey, L.A.2
Fisher, M.L.3
-
10
-
-
84899407351
-
Solving non-zero sum multiagent network flow security games with attack costs
-
S. Okamoto, N. Hazon, and K. Sycara. Solving non-zero sum multiagent network flow security games with attack costs. In AAMAS, pages 879-888, 2012.
-
(2012)
AAMAS
, pp. 879-888
-
-
Okamoto, S.1
Hazon, N.2
Sycara, K.3
-
11
-
-
84899424114
-
Protect: A deployed game theoretic system to protect the ports of the United States
-
E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, and G. Meyer. Protect: A Deployed Game Theoretic System to Protect the Ports of the United States. In AAMAS, 2012.
-
(2012)
AAMAS
-
-
Shieh, E.1
An, B.2
Yang, R.3
Tambe, M.4
Baldwin, C.5
DiRenzo, J.6
Maule, B.7
Meyer, G.8
-
12
-
-
77958574403
-
Urban security: Game-theoretic resource allocation in networked physical domains
-
J. Tsai, Z. Yin, J. young Kwak, D. Kempe, C. Kiekintveld, and M. Tambe. Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains. In AAAI, pages 881-886, 2010.
-
(2010)
AAAI
, pp. 881-886
-
-
Tsai, J.1
Yin, Z.2
Young Kwak, J.3
Kempe, D.4
Kiekintveld, C.5
Tambe, M.6
-
13
-
-
84899445988
-
Game-theoretic resource allocation for malicious packet detection in computer networks
-
O. Vanek, Z. Yin, M. Jain, B. Bosansky, M. Tambe, and M. Pechoucek. Game-theoretic resource allocation for malicious packet detection in computer networks. In AAMAS, 2012.
-
(2012)
AAMAS
-
-
Vanek, O.1
Yin, Z.2
Jain, M.3
Bosansky, B.4
Tambe, M.5
Pechoucek, M.6
-
14
-
-
0001590955
-
Two-person zero-sum games for network interdiction
-
A. Washburn and K. Wood. Two-person Zero-sum Games for Network Interdiction. Operations Research, 43(2): 243-251, 1995.
-
(1995)
Operations Research
, vol.43
, Issue.2
, pp. 243-251
-
-
Washburn, A.1
Wood, K.2
-
15
-
-
85014266931
-
Designing better strategies against human adversaries in network security games
-
(Extended Abstract)
-
R. Yang, F. Fang, A. X. Jiang, K. Rajagopal, M. Tambe, and R. Maheswaran. Designing Better Strategies against Human Adversaries in Network Security Games. In AAMAS (Extended Abstract), 2012.
-
(2012)
AAMAS
-
-
Yang, R.1
Fang, F.2
Jiang, A.X.3
Rajagopal, K.4
Tambe, M.5
Maheswaran, R.6
-
16
-
-
80053434424
-
Stackelberg vs. Nash in security games: Interch-angeability, equivalence, and uniqueness
-
Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg vs. Nash in Security Games: Interch-angeability, Equivalence, and Uniqueness. In AAMAS, pages 1139-1146, 2010.
-
(2010)
AAMAS
, pp. 1139-1146
-
-
Yin, Z.1
Korzhyk, D.2
Kiekintveld, C.3
Conitzer, V.4
Tambe, M.5
|