Algorithms for secure patrols in adversarial domains
暂无分享,去创建一个
[1] Timothy W. McLain,et al. Multiple UAV cooperative search under collision avoidance and limited range communication constraints , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[2] Aranyak Mehta,et al. Playing large games using simple strategies , 2003, EC '03.
[3] Chinh Nguyen,et al. Development and testing for physical security robots , 2005, SPIE Defense + Commercial Sensing.
[4] Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .
[5] Drew Fudenberg,et al. Game theory (3. pr.) , 1991 .
[6] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[7] Sarit Kraus,et al. Security in multiagent systems by policy randomization , 2006, AAMAS '06.
[8] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[9] Vincent Conitzer,et al. Mixed-Integer Programming Methods for Finding Nash Equilibria , 2005, AAAI.
[10] Edmund H. Durfee,et al. Constructing optimal policies for agents with constrained architectures , 2003, AAMAS '03.
[11] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[12] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[13] Nikita Borisov,et al. Anonymity in Structured Peer-to-Peer Networks , 2003 .
[14] Robert W Poole,et al. A Risk-based Airport Security Policy , 2003 .
[15] R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
[16] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.