-
1
-
-
34247245301
-
Multiple UAV cooperative search under collision avoidance and limited range communication constraints
-
R. W. Beard and T. W. McLain. Multiple UAV cooperative search under collision avoidance and limited range communication constraints. In IEEE CDC, 2003.
-
(2003)
IEEE CDC
-
-
Beard, R.W.1
McLain, T.W.2
-
2
-
-
33845439386
-
Defending critical infrastructure
-
G. Brown, M. Carlyle, J. Salmeron, and K. Wood. Defending critical infrastructure. Interfaces, 36(6):530-544, 2006.
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
3
-
-
6344258430
-
Bayesian games for threat prediction and situation analysis
-
J. Brynielsson and S. Amborg. Bayesian games for threat prediction and situation analysis. In FUSION, 2004.
-
(2004)
FUSION
-
-
Brynielsson, J.1
Amborg, S.2
-
5
-
-
33748712836
-
Computing the optimal strategy to commit to
-
V. Conitzer and T. Sandholm. Computing the optimal strategy to commit to. In EC, 2006.
-
(2006)
EC
-
-
Conitzer, V.1
Sandholm, T.2
-
7
-
-
0002754086
-
A generalized Nash solution for two-person bargaining games with incomplete information
-
J. C. Harsanyi and R. Selten. A generalized Nash solution for two-person bargaining games with incomplete information. Management Science, 18(5):80-106, 1972.
-
(1972)
Management Science
, vol.18
, Issue.5
, pp. 80-106
-
-
Harsanyi, J.C.1
Selten, R.2
-
9
-
-
0031192989
-
Representations and solutions for game-theoretic problems
-
D. Koller and A. Pfeffer. Representations and solutions for game-theoretic problems. AI, 94( 1-2): 167-215, 1997.
-
(1997)
AI
, vol.94
, Issue.1-2
, pp. 167-215
-
-
Koller, D.1
Pfeffer, A.2
-
11
-
-
57749095869
-
Random checks
-
28 Sept. 2007
-
A. Murr. Random checks. In Newsweek National News. http://www.newsweek. com/id/4340I, 28 Sept. 2007.
-
Newsweek National News
-
-
Murr, A.1
-
12
-
-
51649088995
-
An efficient heuristic approach for security against multiple adversaries
-
P. Paruchuri, J. P. Pearce, M. Tambe, F. Ordonez, and S. Kraus. An efficient heuristic approach for security against multiple adversaries. In AAMAS, 2007.
-
(2007)
AAMAS
-
-
Paruchuri, P.1
Pearce, J.P.2
Tambe, M.3
Ordonez, F.4
Kraus, S.5
-
13
-
-
84899939869
-
Deployed armor protection: The application of a game theoretic model for security at the los angeles internation airport
-
J. Pita, M. Jain, J. Marecki, F. Ordonez, C. Portway, M. Tambe, C. Western, P. Paruchuri, and S. Kraus. Deployed armor protection: The application of a game theoretic model for security at the los angeles internation airport. In AAMAS Industry Track, 2008.
-
(2008)
AAMAS Industry Track
-
-
Pita, J.1
Jain, M.2
Marecki, J.3
Ordonez, F.4
Portway, C.5
Tambe, M.6
Western, C.7
Paruchuri, P.8
Kraus, S.9
-
14
-
-
34247231518
-
Patrolling in a stochastic environment
-
S. Ruan, C. Meirina, F. Yu, K. R. Pattipati, and R. L. Popp. Patrolling in a stochastic environment. In 10th Intl. Command and Control Research and Tech. Symp., 2005.
-
(2005)
10th Intl. Command and Control Research and Tech. Symp
-
-
Ruan, S.1
Meirina, C.2
Yu, F.3
Pattipati, K.R.4
Popp, R.L.5
-
15
-
-
33750718353
-
Mixed-integer programming methods for finding nash equilibria
-
T. Sandholm, A. Gilpin, and V. Conitzer. Mixed-integer programming methods for finding nash equilibria. In AAAI, 2005.
-
(2005)
AAAI
-
-
Sandholm, T.1
Gilpin, A.2
Conitzer, V.3
|