Optimal patrol strategy for protecting moving targets with multiple mobile resources
暂无分享,去创建一个
[1] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[2] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[3] S. Alpern. Infiltration games on arbitrary graphs , 1992 .
[4] David Eppstein,et al. Studying Geometric Graph Properties of Road Networks Through an Algorithmic Lens , 2008 .
[5] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[6] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[7] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[8] Peter Bro Miltersen,et al. Computing Proper Equilibria of Zero-Sum Games , 2006, Computers and Games.
[9] Patrick Weber,et al. OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.
[10] Steven Okamoto,et al. Solving non-zero sum multiagent network flow security games with attack costs , 2012, AAMAS.
[11] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[12] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[13] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[14] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[15] Bo An,et al. Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.
[16] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.
[17] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[18] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[19] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[20] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[21] Nicola Basilico,et al. A Formal Framework for Mobile Robot Patrolling in Arbitrary Environments with Adversaries , 2009, ArXiv.
[22] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[23] Sarit Kraus,et al. Multi-robot adversarial patrolling: facing coordinated attacks , 2014, AAMAS.
[24] Michal Pechoucek,et al. Using Multi-agent Simulation to Improve the Security of Maritime Transit , 2011, MABS.
[25] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[26] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[27] Milind Tambe,et al. The Deployment-to-Saturation Ratio in Security Games , 2012, AAAI.
[28] P. Hudson. Search Games , 1982 .
[29] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[30] Yevgeniy Vorobeychik,et al. Computing Optimal Security Strategies for Interdependent Assets , 2012, UAI.
[31] Branislav Bosanský,et al. Computing time-dependent policies for patrolling games with mobile targets , 2011, AAMAS.
[32] Milind Tambe,et al. Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.
[33] Andreas Krause,et al. Randomized Sensing in Adversarial Environments , 2011, IJCAI.
[34] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.