Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electric Elves: Applying Agent Technology to Support Human Organizations., , , , , , , and . IAAI, page 51-58. AAAI, (2001)Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach, , and . J. Artif. Intell. Res. (JAIR), (2002)Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty., , and . AAMAS, page 1005-1012. IFAAMAS, (2011)Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up., , and . AAMAS, page 997-1004. IFAAMAS, (2011)An Efficient Heuristic for Security against Multiple Adversaries in Stackelberg Games., , , , and . AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents, page 38-46. AAAI, (2007)SPIDER Attack on a Network of POMDPs: Towards Quality Bounded Solutions., , , and . AAAI Spring Symposium: Game Theoretic and Decision Theoretic Agents, page 68-75. AAAI, (2007)A robust approach to addressing human adversaries in security games., , , , , and . AAMAS, page 1297-1298. IFAAMAS, (2012)Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract)., , and . GameSec, volume 6442 of Lecture Notes in Computer Science, page 257-265. Springer, (2010)Decision-Focused Learning of Adversary Behavior in Security Games., , , , , and . CoRR, (2019)Introduction., and . ATAL, volume 2333 of Lecture Notes in Computer Science, page 1-5. Springer, (2001)