Security Games on a Plane
暂无分享,去创建一个
[1] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[2] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[3] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[4] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[5] Haifeng Xu,et al. The Mysteries of Security Games: Equilibrium Computation Becomes Combinatorial Algorithm Design , 2016, EC.
[6] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[7] Haitao Wang,et al. Linear Time Approximation Schemes for Geometric Maximum Coverage , 2015, COCOON.
[8] Zhen Wang,et al. Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.
[9] Bo An,et al. Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.
[10] T. Ibaraki,et al. The Computational Complexity of the m -Center Problems on the Plane , 1981 .
[11] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[12] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[13] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[14] Bo An,et al. GUARDS and PROTECT: next generation applications of security games , 2011, SECO.
[15] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[16] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997, Athena scientific optimization and computation series.