References
- H. Von, Marktform und Gleichgewicht, 2nd Edition, Springer, New York, 1934.
- J. Pita, M. Jain, J. Marecki, F. Ordonez, C. Portway, M. Tambe, C. Western, P. Paruchuri and S. Kraus, "Deployed Armor protection: the application of a game theoretic model for security at the Los Angeles International Airport," in Proc. of 17th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 125-132, May 12-16, 2008.
- J. Tsai, S. Rathi, C. Kiekintveld, F. Ordonez and M. Tambe, "IRIS-a tool for strategic security allocation in transportation networks," in Proc. of 18th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 37-44, May 10-15, 2009.
- E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule and G. Meyer, "Protect: an application of computational game theory for the security of the ports of the United States," in Proc. of 26th Association for the Advance of Artificial Intelligence, pp. 2173-2179, July 22-26, 2012.
- B. An, F. Ordonez, M. Tambe, E. Shieh, R. Yang, C. Baldwin, J. DiRenzo, K. Moretti, B. Maule and G. Meyer, "A deployed quantal response-based patrol planning system for the U.S. coast guard," Interfaces, vol. 43, no. 5, pp. 400-420, 2013. https://doi.org/10.1287/inte.2013.0700
- T. Nguyen, A. Sinha, S. Gholami, A. Plumptre, L. Joppa, M. Tambe, M. Driciru, F. Wanyama, A. Rwetsiba, R. Critchlow and C. Beale, "CAPTURE: A new predictive anti-poaching tool for wildlife protection," in Proc. of 25th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 509-540, May 9-13, 2016.
- F. Fang, T. Nguyen, R. Pickles, W. Lam, G. Clements, B. An, A. Singh, M. Tambe and A. Lemieux, "Deploying paws: Field optimization of the protection assistant for wildlife security" in Proc. of 28th Annual Conference on Innovative Applications of Artificial Intelligence, pp. 3966-3973, February 12-17, 2016.
- Z. Yin, A. Jiang, M. Tambe, C. Kiekintveld, K. Leyton-Brown, T. Sandholm and J. Sullivan, "Trusts: scheduling randomized patrols for fare inspection in transit systems using game theory" in Proc. of 24th Annual Conference on Innovative Applications of Artificial Intelligence, pp. 2348-2355, July 22-26, 2012.
- M. Brown, S. Saisubramanian, P. Varakantham and M. Tambe, "STREETS: game-theoretic traffic patrolling with exploration and exploitation," in Proc. of 28th Association for the Advance of Artificial Intelligence, pp. 2966-2971, July 27-31, 2014.
- J. Niu, W. Tang and W. Guo, "Coalition formation game based relay selection and frequency sharing for cooperative relay assisted wireless D2D networks with QoS constraints," KSII Transactions on Internet and Information Systems, vol. 10, no. 11, pp. 5253-5270, 2016. https://doi.org/10.3837/tiis.2016.11.003
- Lin, M. and Chen, Y, "Performance analysis of buffer aware scheduling for video services in LTE network," KSII Transactions on Internet and Information Systems, vol. 9, no. 9, pp. 3594-3610, 2015. https://doi.org/10.3837/tiis.2015.09.017
- V. Conitzer and T. Sandholm, "Computing the optimal strategy to commit to," EC, pp. 82-90, 2006.
- P. Varaiya, "Max pressure control of a network of signalized intersections," Transportation Research Part C: Emerging Technologies, vol. 36, pp. 177-195, 2013. https://doi.org/10.1016/j.trc.2013.08.014
- G. Becker and W. Landes, Essays in the economics of crime and punishment, Columbia University, 1974.
- M.T. Fillmore, J.S. Blackburn and L.R. Harrison, "Acute disinhibiting effects of alcohol as a factor in risky driving behavior," Drag and Alcohol Dependence, vol. 95, pp. 97-106, 2008. https://doi.org/10.1016/j.drugalcdep.2007.12.018
- M.E. Rakauskas, N.J. Ward, E.R. Boer, E.M. Bernat, M. Cadwallader and C.J. Patrick, "Combined effects of alcohol and distraction on driving performance," Accident Analysis and Prevention, vol. 40, pp. 1742-1749, 2008. https://doi.org/10.1016/j.aap.2008.06.009
- D. Korzhyk, V. Conitzer and R. Parr, "Complexity of computing optimal Stackelberg strategies in security resources allocation games," in Proc. of 24th Association for the Advance of Artificial Intelligence, pp. 805-810, July 11-15, 2010.
- J. Ponssard and S. Sorin, "The L.P. formulation of finite zero-sum games with incomplete information," International Journal of Game Theory, vol. 9, pp. 99-105, 1980. https://doi.org/10.1007/BF01769767
- D. Koller, N. Megiddo and B. von Stengel, "Fast algorithms for finding randomized strategies in game trees," in Proc. of 26th Annual ACM Symposium on Theory of Computing, pp. 750-760, May 23-25, 1994.
- P. Paruchuri and P. Pearce, "Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games," in Proc. of 17th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 895-902, May 12-16, 2008.
- C. Kiekintveld and M. Jain, "Computing optimal randomized resource allocations for massive security games," in Proc. of 18th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 689-696, May 10-15, 2009.
- E.W. Dijkstra, "A note on two problems in connexion with graphs," Numerische Mathematik, vol. 1, pp. 269-271, 1959. https://doi.org/10.1007/BF01386390
- H.W. Kuhn, "The Hungarian method for the assignment problem," Naval Research Logistics Quarterly, vol. 2, pp. 83-97, 1955. https://doi.org/10.1002/nav.3800020109
- J. Smith and F. Cruz, "State dependent travel time models," Physica A Statistical Mechanics& Its Applications, vol. 395, no. 4, pp. 560-579, 2014. https://doi.org/10.1016/j.physa.2013.10.048