Adversarial Modeling and Reasoning in the Maritime Domain - Year 1 Report
暂无分享,去创建一个
[1] Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[2] Jean B. Lasserre,et al. Global Optimization with Polynomials and the Problem of Moments , 2000, SIAM J. Optim..
[3] Mohammad Emtiyaz Khan,et al. Game Theory Models for Pursuit Evasion Games , 2006 .
[4] Tim J. Ellis,et al. Learning semantic scene models from observing activity in visual surveillance , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[5] TanTieniu,et al. A System for Learning Statistical Motion Patterns , 2006 .
[6] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[7] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[8] Mark R. Morelande,et al. Statistical analysis of motion patterns in AIS Data: Anomaly detection and motion prediction , 2008, 2008 11th International Conference on Information Fusion.
[9] Colin L. Mitchell,et al. Countering Maritime Terrorism in the Caribbean Sea and the Atlantic Ocean: Implications of Possible Maritime Terrorism in the Caribbean , 2012 .
[10] Claudia Copeland. Ocean Dumping Act: A Summary of the Law , 2007 .
[11] Farmey A. Joseph,et al. Path-Planning Strategies for Ambush Avoidance , 2005 .
[12] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[13] B R Aune. Maritime drug trafficking: an underrated problem. , 1990, Bulletin on narcotics.
[14] Bradley J. Rhodes,et al. Probabilistic associative learning of vessel motion patterns at multiple spatial scales for maritime situation awareness , 2007, 2007 10th International Conference on Information Fusion.
[15] Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
[16] Allen M. Waxman,et al. Associative Learning of Vessel Motion Patterns for Maritime Situation Awareness , 2006, 2006 9th International Conference on Information Fusion.
[17] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[18] Satya N. Nandan,et al. Oceans and the Law of the Sea , 2002 .
[19] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS.
[20] Micah Adler,et al. Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.
[21] Milind Tambe,et al. Optimal defender allocation for massive security games : A branch and price approach , 2010 .
[22] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[23] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[24] S. Alpern. Infiltration games on arbitrary graphs , 1992 .
[25] L. Baum,et al. A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .
[26] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[27] Hein de Haas,et al. Trans-Saharan Migration to North Africa and the EU: Historical Roots and Current Trends , 2006 .
[28] Tieniu Tan,et al. A system for learning statistical motion patterns , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[30] Nicola Basilico,et al. Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.
[31] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[32] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[33] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[34] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[35] Branislav Bosanský,et al. Transiting areas patrolled by a mobile adversary , 2010, Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games.
[36] Jianbo Shi,et al. Detecting unusual activity in video , 2004, Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2004. CVPR 2004..
[37] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[38] Kristin P. Bennett,et al. Bilinear separation of two sets inn-space , 1993, Comput. Optim. Appl..
[39] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[40] M. M. Flood. THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .
[41] Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
[42] Jason M. Schwier,et al. Markovian Search Games in Heterogeneous Spaces , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[43] P. W. Jones,et al. Bandit Problems, Sequential Allocation of Experiments , 1987 .
[44] P. Hudson. Search Games , 1982 .
[45] Takeo Kanade,et al. A System for Video Surveillance and Monitoring , 2000 .
[46] William H. Ruckle,et al. Ambushing Random Walks I: Finite Models , 1976, Oper. Res..
[47] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[48] M. Dorn. Fishing behavior of factory trawlers: a hierarchical model of information processing and decision-making , 2001 .
[49] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[50] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[51] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[52] P. Goutal,et al. On the infiltration game , 1997, Int. J. Game Theory.
[53] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.