Game-theoretic Approach to Adversarial Plan Recognition
暂无分享,去创建一个
Branislav Bosanský | Michal Pechoucek | Viliam Lisý | Jan Stiborek | Radek Píbil | V. Lisý | M. Pechoucek | B. Bosanský | Jan Stiborek | Radek Píbil
[1] Gal A. Kaminka,et al. Incorporating Observer Biases in Keyhole Plan Recognition (Efficiently!) , 2007, AAAI.
[2] David Auger,et al. Multiple Tree for Partially Observable Monte-Carlo Tree Search , 2011, EvoApplications.
[3] Wenke Lee,et al. Attack plan recognition and prediction using causal networks , 2004, 20th Annual Computer Security Applications Conference.
[4] Robert P. Goldman,et al. Plan recognition in intrusion detection systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[5] Csaba Szepesvári,et al. Bandit Based Monte-Carlo Planning , 2006, ECML.
[6] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[7] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[8] Paolo Ciancarini,et al. Monte Carlo tree search in Kriegspiel , 2010, Artif. Intell..
[9] Constantinos Daskalakis,et al. Near-optimal no-regret algorithms for zero-sum games , 2011, SODA '11.
[10] Wenji Mao,et al. A Utility-Based Approach to Intention Recognition , 2004, AAMAS 2004.