Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System
暂无分享,去创建一个
[1] Martin Grötschel,et al. The ellipsoid method and its consequences in combinatorial optimization , 1981, Comb..
[2] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[3] James F. Allen,et al. TRAINS-95: Towards a Mixed-Initiative Planning Assistant , 1996, AIPS.
[4] Masaki Aoyagi. Reputation and Dynamic Stackelberg Leadership in Infinitely Repeated Games , 1996 .
[5] J. Filar,et al. Competitive Markov Decision Processes , 1996 .
[6] J M Bland,et al. Weighted comparison of means , 1998, BMJ.
[7] Marcus J. Huber. Considerations for Flexible Autonomy within BDI Intelligent Agent Architectures , 1999 .
[8] Milind Tambe,et al. Towards Adjustable Autonomy for the Real World , 2002, J. Artif. Intell. Res..
[9] Manuela M. Veloso,et al. Existence of Multiagent Equilibria with Limited Agents , 2004, J. Artif. Intell. Res..
[10] Claudia V. Goldman,et al. Solving Transition Independent Decentralized Markov Decision Processes , 2004, J. Artif. Intell. Res..
[11] Kiseop Lee,et al. T-Statistics for Weighted Means in Credit Risk Modelling , 2005 .
[12] Ronen I. Brafman,et al. Planning with Continuous Resources in Stochastic Domains , 2005, IJCAI.
[13] V. Clarke,et al. FARE EVASION AND AUTOMATIC TICKET COLLECTION ON THE LONDON UNDERGROUND , 2006 .
[14] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[15] Robert R. Weidner. TARGET-HARDENING AT A NEW YORK CITY SUBWAY STATION: DECREASED FARE EVASION — AT WHAT PRICE? , 2006 .
[16] Joelle Pineau,et al. A formal framework for robot learning and control under model uncertainty , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.
[17] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[18] Milind Tambe,et al. Towards Faster Planning with Continuous Resources in Stochastic Domains , 2008, AAAI.
[19] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[20] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[21] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[22] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[23] J. Alonso,et al. Convex and Discrete Geometry , 2009 .
[24] Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[25] Dan Lovallo,et al. To Review or Not to Review? Limited Strategic Thinking at the Movie Box Office , 2009 .
[26] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[27] Nicola Basilico,et al. Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.
[28] Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
[29] Vincent Conitzer,et al. Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.
[30] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[31] Ronald V. Clarke,et al. Deterrence and fare evasion: Results of a natural experiment , 2010 .
[32] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[33] Vincent Conitzer,et al. Security Games with Multiple Attacker Resources , 2011, IJCAI.
[34] Bo An,et al. Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.
[35] Vincent Conitzer,et al. Solving Stackelberg games with uncertain observability , 2011, AAMAS.
[36] Christopher Archibald,et al. Hustling in Repeated Zero-Sum Games with Imperfect Execution , 2011, IJCAI.
[37] Manish Jain,et al. Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.
[38] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[39] Colin Camerer,et al. Testing Game Theory in the Field: Swedish LUPI Lottery Games , 2010 .
[40] Sarit Kraus,et al. Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..
[41] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[42] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[43] Branislav Bosanský,et al. Iterative game-theoretic route selection for hostile area transit and patrolling , 2011, AAMAS.
[44] Vincent Conitzer,et al. Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.
[45] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[46] Vincent Conitzer. Computing Game-Theoretic Solutions and Applications to Security , 2012, AAAI.
[47] Bo An,et al. Security Games with Limited Surveillance , 2012, AAAI.
[48] Milind Tambe,et al. A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.
[49] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[50] Yevgeniy Vorobeychik,et al. Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.
[51] Vincent Conitzer,et al. Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.
[52] Yevgeniy Vorobeychik,et al. Optimal interdiction of attack plans , 2013, AAMAS.
[53] Zhi Yuan,et al. Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.
[54] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[55] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[56] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[57] F. D. Fave,et al. Game-theoretic Security Patrolling with Dynamic Execution Uncertainty Game-theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System 1 , 2014 .