Author of the publication

Localization security in Wireless Sensor Networks as a non-cooperative game.

, , and . ICUMT, page 295-300. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coordination in Adversarial Sequential Team Games via Multi-Agent Deep Reinforcement Learning., , , and . CoRR, (2019)Extending the alternating-offers protocol in the presence of competition: models and theoretical analysis.. Ann. Math. Artif. Intell., 55 (3-4): 189-236 (2009)Game theoretic analysis of wireless access network selection: models, inefficiency bounds, and algorithms., , and . VALUETOOLS, page 6. ICST/ACM, (2008)New results on the verification of Nash refinements for extensive-form games., and . AAMAS, page 813-820. IFAAMAS, (2012)Merging multiple information sources in federated sponsored search auctions., , and . AAMAS, page 1323-1324. IFAAMAS, (2012)Reinforcement learning in extensive form games with incomplete information: the bargaining case study., , and . AAMAS, page 46. IFAAMAS, (2007)Coordinating Multiple Defensive Resources in Patrolling Games with Alarm Systems., , , and . AAMAS, page 678-686. ACM, (2017)Unimodal Thompson Sampling for Graph-Structured Arms., , , and . AAAI, page 2457-2463. AAAI Press, (2017)Persuading Voters in District-based Elections., and . AAAI, page 5244-5251. AAAI Press, (2021)Mathematical Programming Formulations to Compute Steady States in Two-Player Extensive-Form Games., , and . Interactive Decision Theory and Game Theory, volume WS-10-03 of AAAI Technical Report, AAAI, (2010)