Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Capacity Constrained Facility Location Problem., , , and . WINE, volume 11920 of Lecture Notes in Computer Science, page 336. Springer, (2019)Who Should Pay the Cost: A Game-theoretic Model for Government Subsidized Investments to Improve National Cybersecurity., , and . IJCAI, page 6020-6027. ijcai.org, (2019)Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks., , and . UAI, page 152-162. AUAI Press, (2012)Maximizing Awareness about HIV in Social Networks of Homeless Youth with Limited Information., , , , , and . IJCAI, page 4959-4963. ijcai.org, (2017)Budget-feasible mechanisms for proportionally selecting agents from groups., , , , and . Artif. Intell., (October 2023)Monotone k-submodular secretary problems: Cardinality and knapsack constraints., , and . Theor. Comput. Sci., (2022)On maximizing a monotone k-submodular function under a knapsack constraint., , and . Oper. Res. Lett., 50 (1): 28-31 (2022)Offline Equilibrium Finding., , , , , and . CoRR, (2022)Make It or Break It: Manipulating Robustness in Large Networks., , and . SDM, page 325-333. SIAM, (2014)Multi-Stage Facility Location Problems with Transient Agents., , , , and . AAAI, page 5850-5857. AAAI Press, (2023)