Computing optimal randomized resource allocations for massive security games
暂无分享,去创建一个
Manish Jain | Milind Tambe | Fernando Ordóñez | Christopher Kiekintveld | Jason Tsai | James Pita | Milind Tambe | F. Ordóñez | Christopher Kiekintveld | Manish Jain | J. Tsai | J. Pita
[1] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[2] Howard Raiffa,et al. Games And Decisions , 1958 .
[3] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[4] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[5] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[6] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[7] Daphne Koller,et al. Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.
[8] Bernhard von Stengel,et al. Chapter 51 Inspection games , 2002 .
[9] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[10] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[11] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[12] Tim Roughgarden. Stackelberg Scheduling Strategies , 2004, SIAM J. Comput..
[13] Allen B. MacKenzie,et al. Using game theory to analyze wireless ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[14] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[15] Kevin Leyton-Brown,et al. A Polynomial-Time Algorithm for Action Graph Games , 2006, AAAI.
[16] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[17] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[18] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.