Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reports on the 2015 AAAI Spring Symposium Series., , , , , , , , , and 5 other author(s). AI Magazine, 36 (3): 113-119 (2015)Strategic Interactions in a Supply Chain Game., , , , , and . Computational Intelligence, 21 (1): 1-26 (2005)Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies., , , and . AAAI, page 812-818. AAAI Press, (2015)Efficient Approximation for Security Games with Interval Uncertainty., and . AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health, volume SS-12-03 of AAAI Technical Report, AAAI, (2012)Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness., , , , and . CoRR, (2014)Teaching Automated Strategic Reasoning Using Capstone Tournaments., , and . AAAI, page 4134-4135. AAAI Press, (2016)Urban Security: Game-Theoretic Resource Allocation in Networked Domains., , , , , and . AAAI, AAAI Press, (2010)An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information., , , and . J. Artif. Intell. Res., (2014)Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources., , and . Applied Adversarial Reasoning and Risk Modeling, volume WS-11-06 of AAAI Technical Report, AAAI, (2011)Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers., , , , , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 171-192. Springer, (2017)