Author of the publication

PROTECT: a deployed game theoretic system to protect the ports of the United States.

, , , , , , , and . AAMAS, page 13-20. IFAAMAS, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Refinement of Strong Stackelberg Equilibria in Security Games., , , , and . AAAI, AAAI Press, (2011)An Application of Automated Negotiation to Distributed Task Allocation., , and . IAT, page 138-145. IEEE Computer Society, (2007)Human-Computer Negotiation in Three-Player Market Settings., , , and . ECAI, volume 263 of Frontiers in Artificial Intelligence and Applications, page 417-422. IOS Press, (2014)Strategic agents for multi-resource negotiation., , and . Autonomous Agents and Multi-Agent Systems, 23 (1): 114-153 (2011)Yushu: A Heuristic-Based Agent for Automated Negotiating Competition., and . New Trends in Agent-Based Complex Automated Negotiations, volume 383 of Studies in Computational Intelligence, Springer, (2012)Getting Started on a Real-World Challenge Problem in Computational Game Theory and Beyond., and . AAAI Spring Symposium: AI, The Fundamental Social Aggregation Challenge, volume SS-12-01 of AAAI Technical Report, AAAI, (2012)Measuring the social influences of scientist groups based on multiple types of collaboration relations., , , , and . Inf. Process. Manage., 53 (1): 1-20 (2017)Modeling Bounded Rationality for Sponsored Search Auctions., , , and . ECAI, volume 285 of Frontiers in Artificial Intelligence and Applications, page 515-523. IOS Press, (2016)Accelerating Multiagent Reinforcement Learning by Equilibrium Transfer., , and . IEEE Trans. Cybernetics, 45 (7): 1289-1302 (2015)Sentence Rewriting for Semantic Parsing., , , and . CoRR, (2019)