Author of the publication

SPIDER Attack on a Network of POMDPs: Towards Quality Bounded Solutions.

, , , and . AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents, page 68-75. AAAI, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The DEFACTO System: Coordinating Human-Agent Teams for the Future of Disaster Response., , , , and . Multi-Agent Programming, volume 15 of Multiagent Systems, Artificial Societies, and Simulated Organizations, Springer, (2005)ALARMS: Alerting and Reasoning Management System for Next Generation Aircraft Hazards, , and . CoRR, (2012)Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract)., , and . GameSec, volume 6442 of Lecture Notes in Computer Science, page 257-265. Springer, (2010)SPIDER Attack on a Network of POMDPs: Towards Quality Bounded Solutions., , , and . AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents, page 68-75. AAAI, (2007)Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty., , and . AAMAS, page 1005-1012. IFAAMAS, (2011)Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications., , , , , and . AAAI, page 1559-1562. AAAI Press, (2008)Planning with continuous resources for agent teams., and . AAMAS (2), page 1089-1096. IFAAMAS, (2009)The DEFACTO System: Training Tool for Incident Commanders., , , , and . AAAI, page 1555-1562. AAAI Press / The MIT Press, (2005)GUARDS and PROTECT: next generation applications of security games., , , , , and . SIGecom Exch., 10 (1): 31-34 (2011)Coordinating randomized policies for increasing security of agent systems., , , , , and . Inf. Technol. Manag., 10 (1): 67-79 (2009)