Using Abstractions to Solve Opportunistic Crime Security Games at Scale
暂无分享,去创建一个
Milind Tambe | Chao Zhang | Yevgeniy Vorobeychik | Victor Bucarey | Yundi Qian | Arunesh Sinha | Ayan Mukhopadhyay | Milind Tambe | Chao Zhang | Arunesh Sinha | Yundi Qian | Ayan Mukhopadhyay | Víctor Bucarey | Yevgeniy Vorobeychik
[1] O. Kariv,et al. An Algorithmic Approach to Network Location Problems. II: The p-Medians , 1979 .
[2] Gang Wang,et al. Crime data mining: a general framework and some examples , 2004, Computer.
[3] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[4] Nicola Basilico,et al. Strategic guard placement for optimal response toalarms in security games , 2014, AAMAS.
[5] Vincent Conitzer,et al. A technique for reducing normal-form games to compute a Nash equilibrium , 2006, AAMAS '06.
[6] Troels Bjerre Lund,et al. A heads-up no-limit Texas Hold'em poker player: discretized betting models and automatically generated equilibrium-finding programs , 2008, AAMAS.
[7] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[8] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[9] Fernando Ordóñez,et al. Shape and Balance in Police Districting , 2015 .
[10] Nicola Basilico,et al. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..
[11] Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[12] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997, Athena scientific optimization and computation series.
[13] Milind Tambe,et al. Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals , 2015, AAMAS.
[14] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[15] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[16] O. Kariv,et al. An Algorithmic Approach to Network Location Problems. I: The p-Centers , 1979 .
[17] Tuomas Sandholm,et al. Lossy stochastic game abstraction with bounds , 2012, EC '12.
[18] Milind Tambe,et al. Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms , 2014, GameSec.
[19] Tuomas Sandholm,et al. Better automated abstraction techniques for imperfect information games, with application to Texas Hold'em poker , 2007, AAMAS '07.
[20] Stefan Nickel,et al. Towards a unified territorial design approach — Applications, algorithms and GIS integration , 2005 .
[21] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[22] Tuomas Sandholm,et al. Lossless abstraction of imperfect information games , 2007, JACM.
[23] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[24] Hanif D. Sherali,et al. NP-Hard, Capacitated, Balanced p-Median Problems on a Chain Graph with a Continuum of Link Demands , 1988, Math. Oper. Res..
[25] Walter A. Kosters,et al. Data Mining Approaches to Criminal Career Analysis , 2006, Sixth International Conference on Data Mining (ICDM'06).
[26] Andrea L. Bertozzi,et al. c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .
[27] Noa Agmon,et al. Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.
[28] Anjon Basak,et al. Abstraction Using Analysis of Subgames , 2016, AAAI.
[29] S. Sastry,et al. Probabilistic pursuit-evasion games: a one-step Nash approach , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).
[30] Shyam Varan Nath,et al. Crime Pattern Detection Using Data Mining , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[31] Milind Tambe. Security and Game Theory: EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES , 2011 .