暂无分享,去创建一个
[1] Vincent Conitzer,et al. Security Games with Multiple Attacker Resources , 2011, IJCAI.
[2] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[3] Vincent Conitzer,et al. Game-Theoretic Question Selection for Tests , 2013, IJCAI.
[4] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[5] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[6] Barteld Kooi,et al. Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI-11) , 2011, AAAI 2011.
[7] T. Murray,et al. Volume 9 , 1998 .
[8] Jose M. Such,et al. International Joint Conference on Artificial Intelligence (IJCAI) , 2016 .
[9] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[10] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[11] T. D. Parsons,et al. Pursuit-evasion in a graph , 1978 .
[12] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[13] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[14] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[15] Sven Koenig,et al. Algorithms and Complexity Results for Pursuit-Evasion Problems , 2009, IJCAI.
[16] Bo An,et al. PROTECT - A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard , 2012, AI Mag..