Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system
暂无分享,去创建一个
Manish Jain | Milind Tambe | Heather Rosoff | Albert Xin Jiang | John P. Sullivan | Eric Anyung Shieh | Francesco Maria Delle Fave
[1] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[2] Branislav Bosanský,et al. Transiting areas patrolled by a mobile adversary , 2010, Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games.
[3] Vincent Conitzer. Computing Game-Theoretic Solutions and Applications to Security , 2012, AAAI.
[4] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[5] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[6] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[7] Alexis Drogoul,et al. Multi-agent Patrolling: An Empirical Analysis of Alternative Architectures , 2002, MABS.
[8] Richard S. Sutton,et al. Introduction to Reinforcement Learning , 1998 .
[9] Vincent Conitzer,et al. Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.
[10] Yevgeniy Vorobeychik,et al. Optimal interdiction of attack plans , 2013, AAMAS.
[11] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[12] Dan Lovallo,et al. To Review or Not to Review? Limited Strategic Thinking at the Movie Box Office , 2009 .
[13] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[14] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[15] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[16] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[17] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[18] Colin Camerer,et al. Testing Game Theory in the Field: Swedish LUPI Lottery Games , 2010 .
[19] Sarit Kraus,et al. Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..
[20] Gregory Gutin,et al. Traveling salesman should not be greedy: domination analysis of greedy-type heuristics for the TSP , 2001, Discret. Appl. Math..
[21] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997, Athena scientific optimization and computation series.
[22] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[23] Yevgeniy Vorobeychik,et al. Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.
[24] Zhi Yuan,et al. Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.
[25] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[26] Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
[27] Milind Tambe,et al. Defender (Mis)coordination in Security Games , 2013, IJCAI.
[28] Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
[29] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[30] Sarit Kraus,et al. Multi-robot adversarial patrolling: facing coordinated attacks , 2014, AAMAS.
[31] Vincent Conitzer,et al. Security Games with Multiple Attacker Resources , 2011, IJCAI.
[32] Michal Pechoucek,et al. Using Multi-agent Simulation to Improve the Security of Maritime Transit , 2011, MABS.
[33] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[34] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[35] Milind Tambe,et al. Unleashing Dec-MDPs in Security Games: Enabling Effective Defender Teamwork , 2014, ECAI.
[36] Claudia V. Goldman,et al. Solving Transition Independent Decentralized Markov Decision Processes , 2004, J. Artif. Intell. Res..
[37] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[38] Vincent Conitzer,et al. Solving Stackelberg games with uncertain observability , 2011, AAMAS.
[39] Manish Jain,et al. Efficiently Solving Joint Activity Based Security Games , 2013, IJCAI.
[40] Milind Tambe,et al. GUARDS - Innovative Application of Game Theory for National Airport Security , 2011, IJCAI.
[41] Vincent Conitzer,et al. Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.
[42] Ronald V. Clarke,et al. Police and the Prevention of Terrorism , 2007 .
[43] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[44] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.