Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks
暂无分享,去创建一个
Nicholas R. Jennings | Oskar Skibski | Talal Rahwan | Tomasz P. Michalak | Michael Wooldridge | Ramasuri Narayanam | Piotr L. Szczepanski | Piotr L. Szczepanski | M. Wooldridge | N. Jennings | Ramasuri Narayanam | Talal Rahwan | Oskar Skibski
[1] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[2] Herbert Hamers,et al. The influence of secrecy on the communication structure of covert networks , 2009, Soc. Networks.
[3] Peter Borm,et al. Characterizations of the β- and the Degree Network Power Measure , 2008 .
[4] Ely Porat,et al. Power and stability in connectivity games , 2008, AAMAS.
[5] Talal Rahwan,et al. A new approach to betweenness centrality based on the Shapley Value , 2012, AAMAS.
[6] Jonathan David Farley,et al. Breaking Al Qaeda Cells: A Mathematical Analysis of Counterterrorism Operations (A Guide for Risk Assessment and Decision Making) , 2003 .
[7] Guillermo Owen,et al. Centrality and power in social networks: a game theoretic approach , 2003, Math. Soc. Sci..
[8] L. Shapley,et al. Values of Large Games, I , 1977 .
[9] Herbert Hamers,et al. On Heterogeneous Covert Networks , 2008 .
[10] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[11] Guido Moerkotte,et al. Analysis of two existing and one new dynamic programming algorithm for the generation of optimal bushy join trees without cross products , 2006, VLDB.
[12] Toshihide Ibaraki,et al. Complexity of the Minimum Base Game on Matroids , 1997, Math. Oper. Res..
[13] Sarvapali D. Ramchurn,et al. On coalition formation with sparse synergies , 2012, AAMAS.
[14] P. Flajolet. On approximate counting , 1982 .
[15] Ulrik Brandes,et al. Network Analysis: Methodological Foundations (Lecture Notes in Computer Science) , 2005 .
[16] Herbert Hamers,et al. Leaderless Covert Networks: A Quantitative Approach , 2012 .
[17] Rafael Amer,et al. A connectivity game for graphs , 2004, Math. Methods Oper. Res..
[18] Peter C. Fishburn,et al. Theory and decision , 2003 .
[19] Muhammad H. Alsuwaiyel,et al. Algorithms - Design Techniques and Analysis , 1999, Lecture Notes Series on Computing.
[20] Daniel Gómez,et al. Polynomial calculation of the Shapley value based on sampling , 2009, Comput. Oper. Res..
[21] Xiaotie Deng,et al. On the Complexity of Cooperative Solution Concepts , 1994, Math. Oper. Res..
[22] Nicholas R. Jennings,et al. A randomized method for the shapley value for the voting game , 2007, AAMAS '07.
[23] Noah E. Friedkin,et al. Theoretical Foundations for Centrality Measures , 1991, American Journal of Sociology.
[24] Herbert Hamers,et al. Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda , 2013, Eur. J. Oper. Res..
[25] Jens Vygen,et al. The Book Review Column1 , 2020, SIGACT News.
[26] L. Shapley,et al. VALUES OF LARGE GAMES. 6: EVALUATING THE ELECTORAL COLLEGE EXACTLY , 1962 .
[27] Michael Wooldridge,et al. Computational Aspects of Cooperative Game Theory , 2011, KES-AMSTA.
[28] L. S. Shapley,et al. 17. A Value for n-Person Games , 1953 .
[29] Nicholas R. Jennings,et al. Efficient Computation of the Shapley Value for Centrality in Networks , 2010, WINE.
[30] Roland Bacher,et al. Determinants of matrices related to the Pascal triangle , 2002 .
[31] Ulrik Brandes,et al. Network Analysis: Methodological Foundations , 2010 .
[32] Rahul Savani,et al. Power Indices in Spanning Connectivity Games , 2009, AAIM.
[33] Evangelos Markakis,et al. Approximating power indices , 2008, AAMAS.
[34] G. Owen,et al. A game theoretic approach to measuring degree of centrality in social networks , 1982 .
[35] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[36] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[37] Michael Wooldridge,et al. Computational Aspects of Cooperative Game Theory (Synthesis Lectures on Artificial Inetlligence and Machine Learning) , 2011 .
[38] Kathleen M. Carley,et al. Destabilizing Terrorist Networks , 1998 .