Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Yang, Rong
Tambe, Milind
Jain, Manish
Kwak, Jun-young
Pita, James
and
Yin, Zhengyu
2011.
Algorithmic Decision Theory.
Vol. 6992,
Issue. ,
p.
320.
Yin, Zhengyu
Jiang, Albert Xin
Tambe, Milind
Kiekintveld, Christopher
Leyton‐Brown, Kevin
Sandholm, Tuomas
and
Sullivan, John P.
2012.
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory.
AI Magazine,
Vol. 33,
Issue. 4,
p.
59.
Fiondella, Lance
Gokhale, Swapna S.
Lownes, Nicholas
and
Accorsi, Michael
2012.
Security and performance analysis of a passenger screening checkpoint for mass-transit systems.
p.
312.
An, Bo
Shieh, Eric
Yang, Rong
Tambe, Milind
Baldwin, Craig
DiRenzo, Joseph
Maule, Ben
and
Meyer, Garrett
2012.
PROTECT — A Deployed Game‐Theoretic System for Strategic Security Allocation for the United States Coast Guard.
AI Magazine,
Vol. 33,
Issue. 4,
p.
96.
Jain, Manish
An, Bo
and
Tambe, Milind
2012.
An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability, and Safety.
AI Magazine,
Vol. 33,
Issue. 3,
p.
14.
Kawas, Ban
Laumanns, Marco
and
Pratsini, Eleni
2013.
A robust optimization approach to enhancing reliability in production planning under non-compliance risks.
OR Spectrum,
Vol. 35,
Issue. 4,
p.
835.
Alpcan, Tansu
2013.
Encyclopedia of Systems and Control.
p.
1.
Delle Fave, Francesco M.
Qian, Yundi
Jiang, Albert X.
Brown, Matthew
and
Tambe, Milind
2013.
Planning and learning in security games.
ACM SIGecom Exchanges,
Vol. 12,
Issue. 1,
p.
38.
Shieh, Eric
An, Bo
Yang, Rong
Tambe, Milind
Baldwin, Craig
DiRenzo, Joseph
Maule, Ben
Meyer, Garrett
and
Moretti, Kathryn
2013.
Handbook of Computational Approaches to Counterterrorism.
p.
441.
An, Bo
Ordóñez, Fernando
Tambe, Milind
Shieh, Eric
Yang, Rong
Baldwin, Craig
DiRenzo, Joseph
Moretti, Kathryn
Maule, Ben
and
Meyer, Garrett
2013.
A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard.
Interfaces,
Vol. 43,
Issue. 5,
p.
400.
Kukreja, Nupul
Halfond, William G. J.
and
Tambe, Milind
2013.
Randomizing regression tests using game theory.
p.
616.
Fave, Francesco M. Delle
Brown, Matthew
Zhang, Chao
Shieh, Eric
Jiang, Albert Xin
Rosoff, Heather
Tambe, Milind
and
Sullivan, John P.
2014.
Engineering Multi-Agent Systems.
Vol. 8758,
Issue. ,
p.
103.
Brown, Matthew
Haskell, William B.
and
Tambe, Milind
2014.
Decision and Game Theory for Security.
Vol. 8840,
Issue. ,
p.
23.
Zhang, Youzhi
Luo, Xudong
Ma, Wenjun
and
Leung, Ho-fung
2014.
Bayesian games with ambiguous type players.
p.
1164.
Zhang, Youzhi
Luo, Xudong
Ma, Wenjun
and
Leung, Ho-fung
2014.
Ambiguous Bayesian Games.
International Journal of Intelligent Systems,
Vol. 29,
Issue. 12,
p.
1138.
Zhang, Ming
Zheng, Zizhan
and
Shroff, Ness B.
2014.
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints.
p.
813.
Nunes, Ernesto
Godoy, Julio
and
Gini, Maria
2014.
Multiagent Decision Making on Transportation Networks.
Journal of Information Processing,
Vol. 22,
Issue. 2,
p.
307.
Hata, Hideaki
Todo, Taiki
Onoue, Saya
and
Matsumoto, Kenichi
2015.
Characteristics of Sustainable OSS Projects: A Theoretical and Empirical Study.
p.
15.
Zhang, Ming
Zheng, Zizhan
and
Shroff, Ness B.
2015.
Decision and Game Theory for Security.
Vol. 9406,
Issue. ,
p.
93.
Merlevede, Jonathan S. A.
and
Holvoet, Tom
2015.
Decision and Game Theory for Security.
Vol. 9406,
Issue. ,
p.
334.