Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder
暂无分享,去创建一个
[1] B. Stengel,et al. Efficient Computation of Behavior Strategies , 1996 .
[2] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[3] Micah Adler,et al. Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.
[4] Michal Tzur,et al. The Period Vehicle Routing Problem with Service Choice , 2006, Transp. Sci..
[5] Sarit Kraus,et al. Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.
[6] Troels Bjerre Lund,et al. A heads-up no-limit Texas Hold'em poker player: discretized betting models and automatically generated equilibrium-finding programs , 2008, AAMAS.
[7] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[8] Christos H. Papadimitriou,et al. Computational complexity , 1993 .
[9] Noa Agmon,et al. Multi-robot area patrol under frequency constraints , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.
[10] Ari K. Jónsson,et al. Cyclic Scheduling , 1999, IJCAI.
[11] El Houssaine Aghezzaf,et al. Production , Manufacturing and Logistics A practical solution approach for the cyclic inventory routing problem , 2008 .
[12] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[13] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[14] Nicola Basilico,et al. A Game-Theoretical Model Applied to an Active Patrolling Camera , 2010, 2010 International Conference on Emerging Security Technologies.
[15] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.
[16] Sui Ruan,et al. Patrolling in a Stochastic Environment , 2005 .
[17] Sarit Kraus,et al. Uncertainties in adversarial patrol , 2009, AAMAS.
[18] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[19] Elbert E. N. Macau,et al. Patrol Mobile Robots and Chaotic Trajectories , 2007 .
[20] Vincent Conitzer,et al. Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.
[21] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[22] J.K. Hedrick,et al. Border patrol and surveillance missions using multiple unmanned air vehicles , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[23] Nicola Basilico,et al. Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.
[24] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[25] Yehuda Elmaliach,et al. A realistic model of frequency-based multi-robot polyline patrolling , 2008, AAMAS.
[26] Nicola Basilico,et al. TALOS: a tool for designing security applications with mobile patrolling robots , 2011, AAMAS.
[27] Sarit Kraus,et al. Adversarial Uncertainty in Multi-Robot Patrol , 2009, IJCAI.
[28] Nils J. Nilsson,et al. Artificial Intelligence , 1974, IFIP Congress.
[29] Yi Guo,et al. Collaborative Robots for Infrastructure Security Applications , 2007, Mobile Robots.
[30] Bruce L. Golden,et al. The period vehicle routing problem: New heuristics and real-world variants , 2011 .
[31] S. Alpern. Infiltration games on arbitrary graphs , 1992 .
[32] Nicos Christofides,et al. The period routing problem , 1984, Networks.
[33] Noa Agmon. On events in multi-robot patrol in adversarial environments , 2010, AAMAS.
[34] Mokhtar S. Bazaraa,et al. Nonlinear Programming: Theory and Algorithms , 1993 .
[35] Nicola Basilico,et al. Developing a Deterministic Patrolling Strategy for Security Agents , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[36] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[37] Drew Fudenberg,et al. Game theory (3. pr.) , 1991 .
[38] P. Hudson. Search Games , 1982 .
[39] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[40] Olivier Buffet,et al. Theoretical Study of Ant-based Algorithms for Multi-Agent Patrolling , 2008, ECAI.
[41] Alexis Drogoul,et al. Multi-agent Patrolling: An Empirical Analysis of Alternative Architectures , 2002, MABS.
[42] M. M. Flood. THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .
[43] A. Rubinstein. Perfect Equilibrium in a Bargaining Model , 1982 .
[44] Stefano Carpin,et al. Extracting surveillance graphs from robot maps , 2008, 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[45] D. Koller,et al. Efficient Computation of Equilibria for Extensive Two-Person Games , 1996 .
[46] Alexander H. G. Rinnooy Kan,et al. Vehicle Routing with Time Windows , 1987, Oper. Res..
[47] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[48] David M. Kreps,et al. Sequential Equilibria Author ( s ) : , 1982 .
[49] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[50] Yann Chevaleyre,et al. Recent Advances on Multi-agent Patrolling , 2004, SBIA.
[51] Jacques Wainer,et al. Probabilistic Multiagent Patrolling , 2008, SBIA.
[52] Francesco Amigoni,et al. A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[53] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[54] John N. Tsitsiklis,et al. Special cases of traveling salesman and repairman problems with time windows , 1992, Networks.
[55] Brian W. Kernighan,et al. AMPL: A Modeling Language for Mathematical Programming , 1993 .
[56] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[57] Sampath Kannan,et al. Randomized pursuit-evasion in a polygonal environment , 2005, IEEE Transactions on Robotics.
[58] Tuomas Sandholm,et al. Lossless abstraction of imperfect information games , 2007, JACM.
[59] Yann Chevaleyre,et al. Theoretical analysis of the multi-agent patrolling problem , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..
[60] Bohdana Ratitch,et al. Multi-agent patrolling with reinforcement learning , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[61] Milind Tambe,et al. How to protect a city: strategic security placement in graph-based domains , 2010, AAMAS.
[62] William H. Ruckle,et al. Ambushing Random Walks I: Finite Models , 1976, Oper. Res..
[63] Brahim Chaib-draa,et al. Solving the continuous time multiagent patrol problem , 2010, 2010 IEEE International Conference on Robotics and Automation.
[64] Israel A. Wagner,et al. A Distributed Ant Algorithm for\protect Efficiently Patrolling a Network , 2003, Algorithmica.
[65] Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.