Signaling in Bayesian Stackelberg Games
暂无分享,去创建一个
Vincent Conitzer | Haifeng Xu | Milind Tambe | Shaddin Dughmi | Rupert Freeman | Milind Tambe | S. Dughmi | V. Conitzer | Haifeng Xu | Rupert Freeman | Vincent Conitzer
[1] Emir Kamenica,et al. Bayesian Persuasion , 2009 .
[2] Haifeng Xu,et al. Algorithmic Bayesian persuasion , 2015, STOC.
[3] Yoav Shoham,et al. Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[4] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[5] Milind Tambe. Security and Game Theory: EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES , 2011 .
[6] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[7] Haifeng Xu,et al. Information Disclosure as a Means to Security , 2015, AAMAS.
[8] Federico Etro. Stackelberg, Heinrich von: Market Structure and Equilibrium , 2013 .
[9] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[10] Peter Bro Miltersen,et al. Send mixed signals: earn more, work less , 2012, EC '12.
[11] Kevin Leyton-Brown,et al. Polynomial-time computation of exact correlated equilibrium in compact games , 2010, EC '11.
[12] Vincent Conitzer,et al. Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains , 2014, AAAI.
[13] L. Lovász,et al. Geometric Algorithms and Combinatorial Optimization , 1981 .
[14] Heinrich von Stackelberg. Market Structure and Equilibrium , 2010 .
[15] Vincent Conitzer,et al. Commitment to Correlated Strategies , 2011, AAAI.
[16] Christos H. Papadimitriou,et al. Computing correlated equilibria in multi-player games , 2005, STOC '05.
[17] Mingyu Guo,et al. Revenue Maximization via Hiding Item Attributes , 2013, IJCAI.
[18] Paul W. Goldberg,et al. The Complexity of Computing a Nash Equilibrium , 2009, SIAM J. Comput..
[19] Xiaotie Deng,et al. Settling the complexity of computing two-player Nash equilibria , 2007, JACM.
[20] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[21] Emir Kamenica,et al. A Rothschild-Stiglitz Approach to Bayesian Persuasion , 2016 .
[22] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[23] Moshe Tennenholtz,et al. Signaling Schemes for Revenue Maximization , 2012, TEAC.
[24] Haifeng Xu,et al. Security Games with Information Leakage: Modeling and Computation , 2015, IJCAI.
[25] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[26] Andriy Zapechelnyuk,et al. Persuasion of a Privately Informed Receiver , 2016 .
[27] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[28] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[29] Sarit Kraus,et al. Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.
[30] Vincent Conitzer,et al. Catcher-Evader Games , 2016, IJCAI.
[31] Haifeng Xu,et al. Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.