When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing
暂无分享,去创建一个
Milind Tambe | Peter Stone | Fei Fang | P. Stone | Milind Tambe | Fei Fang
[1] J. Davenport. Editor , 1960 .
[2] Graham K. Rand,et al. Quantitative Applications in the Social Sciences , 1983 .
[3] Editors , 1986, Brain Research Bulletin.
[4] A. Rubinstein. Modeling Bounded Rationality , 1998 .
[5] H. Sabourian. Repeated games with M-period bounded memory (pure strategies) , 1998 .
[6] Bikramjit Banerjee,et al. Efficient learning of multi-step best response , 2005, AAMAS '05.
[7] Yoav Shoham,et al. Learning against opponents with bounded memory , 2005, IJCAI.
[8] Nelson Cowan,et al. Working Memory Capacity , 2005 .
[9] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[10] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[11] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[12] Marios Mavronicolas,et al. Proceedings of the 2nd International Symposium on Algorithmic Game Theory , 2009 .
[13] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS.
[14] Nicholas R. Jennings,et al. Planning against fictitious players in repeated normal form games , 2010, AAMAS.
[15] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[16] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[17] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[18] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[19] Gerald Tesauro,et al. Playing repeated Stackelberg games with unknown opponents , 2012, AAMAS.
[20] Doran Chakraborty and Peter Stone,et al. Targeted Opponent Modeling of Memory-Bounded Agents , 2013 .
[21] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[22] A. Lemieux. Situational prevention of poaching , 2014 .
[23] Milind Tambe,et al. Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries , 2014, GameSec.
[24] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[25] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.