暂无分享,去创建一个
[1] J. van Leeuwen,et al. Theoretical Computer Science , 2003, Lecture Notes in Computer Science.
[2] Bo An,et al. An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..
[3] Ariel D. Procaccia,et al. Lazy Defenders Are Almost Optimal against Diligent Attackers , 2014, AAAI.
[4] Nicola Basilico,et al. Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.
[5] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[6] Robert M Thrall,et al. Mathematics of Operations Research. , 1978 .
[7] Nicola Basilico,et al. Adversarial patrolling with spatially uncertain alarm signals , 2015, Artif. Intell..
[8] Kristoffer Arnsfelt Hansen,et al. Approximability and Parameterized Complexity of Minmax Values , 2008, WINE.
[9] Vasek Chvátal,et al. A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..
[10] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[11] Nysret Musliu,et al. Local Search Algorithm for Unicost Set Covering Problem , 2006, IEA/AIE.
[12] Oriol Carbonell-Nicolau. Games and Economic Behavior , 2011 .
[13] Adam Tauman Kalai,et al. The myth of the folk theorem , 2008, Games Econ. Behav..
[14] B. Stengel,et al. Team-Maxmin Equilibria☆ , 1997 .
[15] Nicola Basilico,et al. A Security Game Model for Environment Protection in the Presence of an Alarm System , 2015, GameSec.
[16] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[17] Bo An,et al. Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.
[18] Nicola Basilico,et al. Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games , 2009, 2009 IEEE Symposium on Computational Intelligence and Games.