PAWS: Game Theory Based Protection Assistant for Wildlife Security
暂无分享,去创建一个
Milind Tambe | Fei Fang | Rong Yang | Andrew Lemieux | Benjamin J. Ford | Milind Tambe | Fei Fang | Rong Yang | A. Lemieux
[1] W. A. Wagenaar. Generation of random sequences by human subjects: A critical survey of literature. , 1972 .
[2] Moses Makonjio Okello,et al. Correlates of wildlife snaring patterns in Tsavo West National Park, Kenya , 2006 .
[3] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[4] Edward Opiyo Ouko. Where , when and why are there elephant poaching hotspots in Kenya ? , 2013 .
[5] Noa Agmon,et al. Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.
[6] William D. Moreto. To conserve and protect: examining law enforcement ranger culture and operations in Queen Elizabeth National Park, Uganda , 2013 .
[7] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[8] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[9] E. Stokes,et al. Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using MIST. , 2010, Integrative zoology.
[10] Milind Tambe,et al. Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.
[11] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[12] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[13] Martyn Plummer,et al. JAGS: A program for analysis of Bayesian graphical models using Gibbs sampling , 2003 .
[14] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[15] Colin Camerer. Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .
[16] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[17] Milind Tambe,et al. Comparing human behavior models in repeated Stackelberg security games: An extended study , 2016, Artif. Intell..
[18] S. Pires,et al. The illegal parrot trade in the neo-tropics: The relationship between poaching and illicit pet markets , 2012 .
[19] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[20] Tomas Holmern,et al. Local law enforcement and illegal bushmeat hunting outside the Serengeti National Park, Tanzania , 2007, Environmental Conservation.
[21] Milind Tambe,et al. Online planning for optimal protector strategies in resource conservation games , 2014, AAMAS.
[22] Rong Yang,et al. Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.
[23] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[24] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[25] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.
[26] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[27] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.