Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

True story: dynamically generated, contextually linked quests in persistent systems., , and . Future Play, page 145-151. ACM, (2007)A robust approach to addressing human adversaries in security games., , , , , and . AAMAS, page 1297-1298. IFAAMAS, (2012)Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties., , , , , and . AAMAS (1), page 369-376. IFAAMAS, (2009)Modeling human adversary decision making in security games: an initial report., , , , , and . AAMAS, page 1297-1298. IFAAMAS, (2013)Real-world security games: toward addressing human decision-making uncertainty.. AAMAS, page 1359-1360. IFAAMAS, (2011)GUARDS - Innovative Application of Game Theory for National Airport Security., , , , and . IJCAI, page 2710-2715. IJCAI/AAAI, (2011)Computing optimal randomized resource allocations for massive security games., , , , , and . AAMAS (1), page 689-696. IFAAMAS, (2009)GUARDS: game theoretic security allocation on a national scale., , , , and . AAMAS, page 37-44. IFAAMAS, (2011)Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport., , , , , , , , and . AAMAS (Industry Track), page 125-132. IFAAMAS, (2008)Using Game Theory for Los Angeles Airport Security., , , , , , , and . AI Mag., 30 (1): 43-57 (2009)