Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty
暂无分享,去创建一个
[1] Günther Palm,et al. Evolutionary stable strategies and game dynamics for n-person games , 1984 .
[2] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[3] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[4] Sarit Kraus,et al. Adversarial Uncertainty in Multi-Robot Patrol , 2009, IJCAI.
[5] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[6] Nicola Gatti. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[7] Milind Tambe,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.
[8] Peter R. Wurman,et al. Monte Carlo Approximation in Incomplete Information, Sequential Auction Games , 2005, Decis. Support Syst..
[9] J. Szep,et al. Games with incomplete information , 1985 .
[10] Jeannette M. Wing,et al. Game strategies in network security , 2004, International Journal of Information Security.
[11] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[12] Nicola Basilico,et al. Computing Bayes-Nash Equilibria through Support Enumeration Methods in Bayesian Two-Player Strategic-Form Games , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[13] Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
[14] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[15] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[16] Manish Jain,et al. Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.
[17] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[18] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[19] Jean-Francois Richard,et al. Approximation of Bayesian Nash Equilibrium , 2008 .
[20] Howard Raiffa,et al. Games And Decisions , 1958 .
[21] References , 1971 .
[22] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[23] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[24] Michael P. Wellman,et al. Computing Best-Response Strategies in Infinite Games of Incomplete Information , 2004, UAI.
[25] E. Maasland. Auction Theory , 2006 .
[26] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[27] Kevin Chlebik. Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .
[28] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[29] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.