Robust Stochastic Games and Applications to Counter-Terrorism Strategies
暂无分享,去创建一个
[1] Stef Tijs,et al. Stochastic games with state independent transitions and separable rewards , 1984 .
[2] Scott E. Atkinson,et al. Terrorism in a Bargaining Framework , 1987, The Journal of Law and Economics.
[3] Gordon B. Hazen. Stochastic Trees and the StoTree Modeling Environment: Models and Software for Medical Decision Analysis , 2004, Journal of Medical Systems.
[4] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[5] Ronald A. Howard,et al. Influence Diagrams , 2005, Decis. Anal..
[6] Kim C. Border,et al. Fixed point theorems with applications to economics and game theory: Fixed point theorems for correspondences , 1985 .
[7] W. A. Kirk,et al. Handbook of metric fixed point theory , 2001 .
[8] Arkadi Nemirovski,et al. Robust Convex Optimization , 1998, Math. Oper. Res..
[9] O. J. Vrieze,et al. Stochastic Games with Finite State and Action Spaces. , 1988 .
[10] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[11] Thierry Vignolo,et al. Why Global Integration May Lead to Terrorism: An Evolutionary Theory of Mimetic Rivalry , 2003 .
[12] Kathryn B. Laskey,et al. Multisource fusion for opportunistic detection and probabilistic assessment of homeland terrorist threats , 2002, SPIE Defense + Commercial Sensing.
[13] Harvey E. Lapan,et al. Terrorism and signalling , 1993 .
[14] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[15] Nicolas Vieille,et al. Stochastic Games with a Single Controller and Incomplete Information , 2002, SIAM J. Control. Optim..
[16] T. Parthasarathy,et al. An orderfield property for stochastic games when one player controls transition probabilities , 1981 .
[17] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[18] B. Silverman,et al. Modeling and Simulating Terrorist Decision-making: A 'Performance Moderator Function' Approach to Generating Virtual Opponents , 2001 .
[19] Laurent El Ghaoui,et al. Robust Solutions to Markov Decision Problems with Uncertain Transition Matrices , 2005 .
[20] A. M. Fink,et al. Equilibrium in a stochastic $n$-person game , 1964 .
[21] S. Kakutani. A generalization of Brouwer’s fixed point theorem , 1941 .
[22] Kathryn B. Laskey,et al. An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners , 2005 .
[23] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[24] Laurent El Ghaoui,et al. Robust Solutions to Uncertain Semidefinite Programs , 1998, SIAM J. Optim..
[25] Allen L. Soyster,et al. Technical Note - Convex Programming with Set-Inclusive Constraints and Applications to Inexact Linear Programming , 1973, Oper. Res..
[26] J. Faria,et al. Terror Cycles , 2003 .
[27] Yacov Y. Haimes,et al. Strategic Responses to Risks of Terrorism to Water Resources , 2002 .
[28] Daphne Koller,et al. Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.
[29] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[30] S. Sorin. “Big Match” with lack of information on one side (part i) , 1984 .
[31] Harvey E. Lapan,et al. To Bargain or Not to Bargain: That is the Question , 1988 .
[32] Ross D. Shachter. Evaluating Influence Diagrams , 1986, Oper. Res..
[33] A. Kirman,et al. Introduction to Equilibrium Analysis , 1977 .
[34] H. Kunreuther,et al. You Only Die Once: Managing Discrete Interdependent Risks , 2003 .
[35] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[36] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[37] H. Kunreuther,et al. Interdependent Security , 2003 .
[38] Anna Jaskiewicz,et al. Zero-Sum Semi-Markov Games , 2002, SIAM J. Control. Optim..
[39] Stefan Arnborg,et al. Bayesian Games for Threat Prediction and Situation Analysis , 2004 .
[40] Vicki M. Bier,et al. Game-Theoretic and Reliability Methods in Counterterrorism and Security , 2006 .
[41] Pierfrancesco La Mura. Game Networks , 2000, UAI.
[42] Yacov Y. Haimes,et al. Roadmap for Modeling Risks of Terrorism to the Homeland , 2002 .
[43] Eilon Solan,et al. Stopping Games in Continuous Time , 2002, math/0306279.
[44] T. Sandler,et al. A Theoretical Analysis of Transnational Terrorism , 1983, American Political Science Review.
[45] J. Filar,et al. Competitive Markov Decision Processes , 1996 .
[46] Kai Virtanen,et al. Modeling Air Combat by a Moving Horizon Influence Diagram Game , 2006 .
[47] Krishna R. Pattipati,et al. Stochastic modeling of a terrorist event via the ASAM system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[48] J. B. Cruz,et al. Moving horizon Nash strategies for a military air operation , 2002 .
[49] J. Faria. Terrorist Innovations and Anti-Terrorist Policies , 2006 .
[50] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[51] Bernard Harris. Mathematical Methods in Combating Terrorism , 2002 .
[52] T. Sandler,et al. Global Terrorism: Deterrence Versus Pre-Emption , 2006 .
[53] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[54] Kai Virtanen,et al. Modeling Pilot s Sequential Maneuvering Decisions by a Multistage Influence Diagram , 2001 .