Security Games with Multiple Attacker Resources
暂无分享,去创建一个
Vincent Conitzer | Ronald Parr | Dmytro Korzhyk | Ronald E. Parr | Dmytro Korzhyk | Vincent Conitzer
[1] Xiaotie Deng,et al. Settling the Complexity of Two-Player Nash Equilibrium , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[2] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[3] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[4] Vincent Conitzer,et al. Solving Stackelberg games with uncertain observability , 2011, AAMAS.
[5] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[6] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[7] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[8] Bernhard von Stengel,et al. Leadership games with convex strategy sets , 2010, Games Econ. Behav..
[9] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.