Sciweavers

205 search results - page 17 / 41
» An Algorithmic Analysis of the Honey-Bee Game
Sort
View
ATAL
2009
Springer
14 years 3 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
SASO
2009
IEEE
14 years 3 months ago
Self-organizing Bandwidth Sharing in Priority-Based Medium Access
In this paper, we present an analysis of self-organizing bandwidth sharing in priority-based medium access. For this purpose, the priority-based Access Game is introduced. Analysi...
Stefan Wildermann, Tobias Ziermann, Jürgen Te...
ATAL
2010
Springer
13 years 9 months ago
Robust Bayesian methods for Stackelberg security games
Recent work has applied game-theoretic models to real-world security problems at the Los Angeles International Airport (LAX) and Federal Air Marshals Service (FAMS). The analysis o...
Christopher Kiekintveld, Milind Tambe, Janusz Mare...
AISADM
2007
Springer
14 years 2 months ago
Peer-to-Peer Data Mining, Privacy Issues, and Games
Peer-to-Peer (P2P) networks are gaining increasing popularity in many distributed applications such as file-sharing, network storage, web caching, searching and indexing of releva...
Kanishka Bhaduri, Kamalika Das, Hillol Kargupta
GECCO
2009
Springer
305views Optimization» more  GECCO 2009»
14 years 3 months ago
Evolving competitive car controllers for racing games with neuroevolution
Modern computer games are at the same time an attractive application domain and an interesting testbed for the evolutionary computation techniques. In this paper we apply NeuroEvo...
Luigi Cardamone, Daniele Loiacono, Pier Luca Lanzi