PAWS - A Deployed Game-Theoretic Application to Combat Poaching
暂无分享,去创建一个
Bo An | Milind Tambe | Fei Fang | Thanh Hong Nguyen | Rob Pickles | Wai Y. Lam | Gopalasamy R. Clements | Amandeep Singh | Brian C. Schwedock | Andrew Lemieux | Milind Tambe | Fei Fang | Bo An | T. Nguyen | R. Pickles | Amandeep Singh | G. Clements | A. Lemieux
[1] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[2] Jean Clobert,et al. The impact on tigers of poaching versus prey depletion , 2008 .
[3] Moses Makonjio Okello,et al. Correlates of wildlife snaring patterns in Tsavo West National Park, Kenya , 2006 .
[4] W. Tobler,et al. Three Presentations on Geographical Analysis and Modeling: Non- Isotropic Geographic Modeling; Speculations on the Geometry of Geography; and Global Spatial Analysis (93-1) , 1993 .
[5] Ariel D. Procaccia,et al. Strategyproof Classification with Shared Inputs , 2009, IJCAI.
[6] J. Ragle,et al. IUCN Red List of Threatened Species , 2010 .
[7] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[8] Dirk Van Oudheusden,et al. The orienteering problem: A survey , 2011, Eur. J. Oper. Res..
[9] W. Tobler,et al. THREE PRESENTATIONS ON GEOGRAPHICAL ANALYSIS AND MODELING , 1993 .
[10] Eric Langmuir. Mountaincraft and Leadership: A Handbook for Mountaineers and Hillwalking Leaders in the British Isles , 1984 .
[11] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[12] Milind Tambe,et al. Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.
[13] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[14] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[15] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.
[16] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[17] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[18] Simon Thompson. Unjustifiable Risk?: The Story of British Climbing , 2010 .
[19] Adi Botea,et al. Near Optimal Hierarchical Path-Finding , 2004, J. Game Dev..
[20] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[21] E. Dinerstein. Setting Priorities for the Conservation and Recovery of WILD TIGERS : 2005-2015 , 2006 .
[22] Martyn Plummer,et al. JAGS: A program for analysis of Bayesian graphical models using Gibbs sampling , 2003 .
[23] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[24] Robert P. Anderson,et al. Maximum entropy modeling of species geographic distributions , 2006 .
[25] Milind Tambe,et al. Online planning for optimal protector strategies in resource conservation games , 2014, AAMAS.
[26] A. Lemieux. Situational prevention of poaching , 2014 .
[27] Bo An,et al. Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty , 2014, AAAI.
[28] Noa Agmon,et al. Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.
[29] Rong Yang,et al. Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.
[30] T. Tsiligirides,et al. Heuristic Methods Applied to Orienteering , 1984 .
[31] Milind Tambe,et al. Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.
[32] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[33] David G. Tarboton,et al. On the extraction of channel networks from digital elevation data , 1991 .
[34] E. Stokes,et al. Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using MIST. , 2010, Integrative zoology.