PAWS - A Deployed Game-Theoretic Application to Combat Poaching

Poaching is considered a major driver for the population drop of key species such as tigers, elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot patrols is the most commonly used approach in many countries to prevent poaching, such patrols often do not make the best use of the limited patrolling resources.

[1]  Milind Tambe,et al.  Robust Protection of Fisheries with COmPASS , 2014, AAAI.

[2]  Jean Clobert,et al.  The impact on tigers of poaching versus prey depletion , 2008 .

[3]  Moses Makonjio Okello,et al.  Correlates of wildlife snaring patterns in Tsavo West National Park, Kenya , 2006 .

[4]  W. Tobler,et al.  Three Presentations on Geographical Analysis and Modeling: Non- Isotropic Geographic Modeling; Speculations on the Geometry of Geography; and Global Spatial Analysis (93-1) , 1993 .

[5]  Ariel D. Procaccia,et al.  Strategyproof Classification with Shared Inputs , 2009, IJCAI.

[6]  J. Ragle,et al.  IUCN Red List of Threatened Species , 2010 .

[7]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[8]  Dirk Van Oudheusden,et al.  The orienteering problem: A survey , 2011, Eur. J. Oper. Res..

[9]  W. Tobler,et al.  THREE PRESENTATIONS ON GEOGRAPHICAL ANALYSIS AND MODELING , 1993 .

[10]  Eric Langmuir Mountaincraft and Leadership: A Handbook for Mountaineers and Hillwalking Leaders in the British Isles , 1984 .

[11]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[12]  Milind Tambe,et al.  Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.

[13]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[14]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[15]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.

[16]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[17]  Rong Yang,et al.  Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.

[18]  Simon Thompson Unjustifiable Risk?: The Story of British Climbing , 2010 .

[19]  Adi Botea,et al.  Near Optimal Hierarchical Path-Finding , 2004, J. Game Dev..

[20]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[21]  E. Dinerstein Setting Priorities for the Conservation and Recovery of WILD TIGERS : 2005-2015 , 2006 .

[22]  Martyn Plummer,et al.  JAGS: A program for analysis of Bayesian graphical models using Gibbs sampling , 2003 .

[23]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[24]  Robert P. Anderson,et al.  Maximum entropy modeling of species geographic distributions , 2006 .

[25]  Milind Tambe,et al.  Online planning for optimal protector strategies in resource conservation games , 2014, AAMAS.

[26]  A. Lemieux Situational prevention of poaching , 2014 .

[27]  Bo An,et al.  Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty , 2014, AAAI.

[28]  Noa Agmon,et al.  Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.

[29]  Rong Yang,et al.  Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.

[30]  T. Tsiligirides,et al.  Heuristic Methods Applied to Orienteering , 1984 .

[31]  Milind Tambe,et al.  Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.

[32]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[33]  David G. Tarboton,et al.  On the extraction of channel networks from digital elevation data , 1991 .

[34]  E. Stokes,et al.  Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using MIST. , 2010, Integrative zoology.