Handling Payoff Uncertainty in Green Security Domains with Adversary Bounded Rationality
暂无分享,去创建一个
Thien Hai Nguyen | Milind Tambe | N. Agmon | F. D. Fave | A. Yadav | M. Jain | W. Ramono | T. Batubara | Noam Agmon
[1] D. McFadden. Conditional logit analysis of qualitative choice behavior , 1972 .
[2] S. French,et al. Decision Theory: An Introduction to the Mathematics of Rationality. , 1988 .
[3] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[4] Benjamin Van Roy,et al. On Constraint Sampling in the Linear Programming Approach to Approximate Dynamic Programming , 2004, Math. Oper. Res..
[5] Yoav Shoham,et al. Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[6] Craig Boutilier,et al. Constraint-based optimization and utility elicitation using the minimax decision criterion , 2006, Artif. Intell..
[7] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[8] E. Stokes,et al. Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using MIST. , 2010, Integrative zoology.
[9] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[10] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[11] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[12] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[13] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[14] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.
[15] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[16] A. Lemieux. Situational prevention of poaching , 2014 .
[17] Milind Tambe,et al. Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries , 2014, GameSec.
[18] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[19] Bo An,et al. Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty , 2014, AAAI.
[20] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.