Behavioral Minimax Regret for Security Games and Its Application for UAV Planning
暂无分享,去创建一个
Milind Tambe | Amulya Yadav | Thanh H. Nguyen | Milind Tambe | T. Nguyen | F. D. Fave | Manish Jain | A. Yadav | Agmon | Noa | Richard Van Deventer | Francesco Delle Fave | Manish Jain
[1] Milind Tambe,et al. Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries , 2014, GameSec.
[2] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[3] E. Stokes,et al. Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using MIST. , 2010, Integrative zoology.
[4] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[5] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[6] Yoav Shoham,et al. Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[7] R. Wilcox. Applying Contemporary Statistical Techniques , 2003 .
[8] Benjamin Van Roy,et al. On Constraint Sampling in the Linear Programming Approach to Approximate Dynamic Programming , 2004, Math. Oper. Res..
[9] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[10] D. McFadden. Conditional logit analysis of qualitative choice behavior , 1972 .
[11] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[12] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[13] Dirk Van Oudheusden,et al. The orienteering problem: A survey , 2011, Eur. J. Oper. Res..
[14] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[15] Craig Boutilier,et al. Assessing regret-based preference elicitation with the UTPREF recommendation system , 2010, EC '10.
[16] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[17] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.
[18] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[19] Bo An,et al. Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty , 2014, AAAI.
[20] S. French,et al. Decision Theory: An Introduction to the Mathematics of Rationality. , 1988 .
[21] Craig Boutilier,et al. Constraint-based optimization and utility elicitation using the minimax decision criterion , 2006, Artif. Intell..
[22] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[23] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.