Sciweavers

179 search results - page 23 / 36
» Adversarial Leakage in Games
Sort
View
ATAL
2010
Springer
13 years 11 months ago
Deception in networks of mobile sensing agents
Recent studies have investigated how a team of mobile sensors can cope with real world constraints, such as uncertainty in the reward functions, dynamically appearing and disappea...
Viliam Lisý, Roie Zivan, Katia P. Sycara, M...
ATAL
2008
Springer
13 years 11 months ago
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Janusz Marecki, Fernando ...
GI
2009
Springer
14 years 2 months ago
A Game-Theoretic Model for Distributed Programming by Contract
: We present an extension of the programming-by-contract (PBC) paradigm to a concurrent and distributed environment. Classical PBC is characterized by absolute conformance of code ...
Anders Starcke Henriksen, Tom Hvitved, Andrzej Fil...
ATAL
2009
Springer
14 years 4 months ago
A demonstration of the Polaris poker system
Poker games provide a useful testbed for modern Artificial Intelligence techniques. Unlike many classical game domains such as chess and checkers, poker includes elements of impe...
Michael H. Bowling, Nicholas Abou Risk, Nolan Bard...
ATAL
2009
Springer
14 years 4 months ago
Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties
How do we build multiagent algorithms for agent interactions with human adversaries? Stackelberg games are natural models for many important applications that involve human intera...
James Pita, Manish Jain, Fernando Ordó&ntil...