暂无分享,去创建一个
Haifeng Xu | Milind Tambe | Shaddin Dughmi | Venil Loyd Noronha | Milind Tambe | S. Dughmi | Haifeng Xu
[1] Bo An,et al. Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.
[2] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[3] Seinosuke Toda,et al. PP is as Hard as the Polynomial-Time Hierarchy , 1991, SIAM J. Comput..
[4] Leslie G. Valiant,et al. The Complexity of Enumeration and Reliability Problems , 1979, SIAM J. Comput..
[5] Mohit Singh,et al. Entropy, optimization and counting , 2013, STOC.
[6] Haifeng Xu,et al. The Mysteries of Security Games: Equilibrium Computation Becomes Combinatorial Algorithm Design , 2016, EC.
[7] Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[8] William D. Moreto. To conserve and protect: examining law enforcement ranger culture and operations in Queen Elizabeth National Park, Uganda , 2013 .
[9] Bo An,et al. Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.
[10] Vincent R. Nyirenda,et al. Field foot patrol effectiveness in Kafue National Park, Zambia , 2012 .
[11] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[12] Bizeck Jube Phiri,et al. Zambia , 2001, IMF Staff Country Reports.
[13] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[14] Milind Tambe,et al. Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.
[15] E. Jaynes. Information Theory and Statistical Mechanics , 1957 .
[16] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[17] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[18] Branislav Bosanský,et al. Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies , 2015, AAAI.
[19] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[20] Charles J. Colbourn,et al. The complexity of computing the tutte polynomial on transversal matroids , 1995, Comb..
[21] Physical Review , 1965, Nature.
[22] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[23] Milind Tambe,et al. Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games , 2014, AAMAS.
[24] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[25] Haifeng Xu,et al. Security Games with Information Leakage: Modeling and Computation , 2015, IJCAI.
[26] S. Crawford,et al. Volume 1 , 2012, Journal of Diabetes Investigation.
[27] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[28] Milind Tambe,et al. The Deployment-to-Saturation Ratio in Security Games , 2012, AAAI.
[29] Branislav Bosanský,et al. Computing time-dependent policies for patrolling games with mobile targets , 2011, AAMAS.