Efficient Resource Allocation for Protecting Coral Reef Ecosystems
暂无分享,去创建一个
[1] H. Possingham,et al. Hitting the target and missing the point: target‐based conservation planning in context , 2009 .
[2] L. Goddard,et al. Operations Research (OR) , 2007 .
[3] Bo An,et al. Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.
[4] Hugh P. Possingham,et al. Marxan with Zones: Software for optimal conservation based land- and sea-use zoning , 2009, Environ. Model. Softw..
[5] Bo An,et al. PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.
[6] R. Rosenfeld. Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.
[7] Vincent Conitzer,et al. Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.
[8] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[9] D. Bellwood,et al. Confronting the coral reef crisis , 2004, Nature.
[10] Zhen Wang,et al. Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.
[11] Milind Tambe,et al. Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.
[12] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[13] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[14] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[15] K. Bjorndal,et al. Global Trajectories of the Long-Term Decline of Coral Reef Ecosystems , 2003, Science.
[16] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[17] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[18] Edith Elkind,et al. Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS) , 2015 .
[19] Jose M. Such,et al. International Joint Conference on Artificial Intelligence (IJCAI) , 2016 .
[20] Bo An,et al. Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.
[21] Branislav Bosanský,et al. Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies , 2015, AAAI.
[22] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[23] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[24] Bo An,et al. Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.
[25] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[26] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.