نتایج جستجو برای: stackelberg game ms

تعداد نتایج: 230028  

2014
Avrim Blum Nika Haghtalab Ariel D. Procaccia

Game-theoretic algorithms for physical security have made an impressive realworld impact. These algorithms compute an optimal strategy for the defender to commit to in a Stackelberg game, where the attacker observes the defender’s strategy and best-responds. In order to build the game model, though, the payoffs of potential attackers for various outcomes must be estimated; inaccurate estimates ...

Journal: :Dynamic Games and Applications 2017
Pierre Bernhard Marc Deschamps

We consider a dynamic game where additional players (assumed identical, even if there will be a mild departure from that hypothesis) join the game randomly according to a Bernoulli process. The problem solved here is that of computing their expected payoff as a function of time and the number of players present when they arrive, if the strategies are given. We consider both a finite horizon gam...

Journal: :Games 2017
Lina Mallozzi Roberta Messalli

We study a non-cooperative game with aggregative structure, namely when the payoffs depend on the strategies of the opponent players through an aggregator function. We assume that a subset of players behave as leaders in a Stackelberg model. The leaders, as well the followers, act non-cooperatively between themselves and solve a Nash equilibrium problem. We assume an exogenous uncertainty affec...

2012
Eric Anyung Shieh Bo An Rong Yang Milind Tambe Craig Baldwin Joseph DiRenzo Ben Maule Garrett Meyer

While three deployed applications of game theory for security have recently been reported at AAMAS [12], we as a community remain in the early stages of these deployments; there is a continuing need to understand the core principles for innovative security applications of game theory. Towards that end, this paper presents PROTECT, a game-theoretic system deployed by the United States Coast Guar...

2005
Dinesh Garg Y. Narahari

This paper takes the first steps towards designing incentive compatible mechanisms for hierarchical decision making problems involving selfish agents. We call these Stackelberg problems. These are problems where the decisions or actions in successive layers of the hierarchy are taken in a sequential way while decisions or actions within each layer are taken in a simultaneous manner. There are m...

2011
Dmytro Korzhyk Vincent Conitzer Ronald Parr

Algorithms for finding game-theoretic solutions are now used in several real-world security applications. This work has generally assumed a Stackelberg model where the defender commits to a mixed strategy first. In general two-player normal-form games, Stackelberg strategies are easier to compute than Nash equilibria, though it has recently been shown that in many security games, Stackelberg st...

Journal: :CoRR 2017
Zhanwei Hou He Chen Yonghui Li Branka Vucetic

Radio frequency energy harvesting (RFEH) is a promising technology to charge unattended Internet of Things (IoT) low-power devices remotely. To enable this, in future IoT system, besides the traditional data access points (DAPs) for collecting data, energy access points (EAPs) should be deployed to charge IoT devices to maintain their sustainable operations. Practically, the DAPs and EAPs may b...

2014
Francesco M. Delle Fave Albert Xin Jiang Zhengyu Yin Chao Zhang Milind Tambe Sarit Kraus John P. Sullivan

Attacker-Defender Stackelberg security games (SSGs) have emerged as an important research area in multi-agent systems. However, existing SSGs models yield fixed, static, schedules which fail in dynamic domains where defenders face execution uncertainty, i.e., in domains where defenders may face unanticipated disruptions of their schedules. A concrete example is an application involving checking...

Journal: :CoRR 2017
Zehui Xiong Shaohan Feng Dusit Niyato Ping Wang Zhu Han

The mining process in blockchain requires solving a proof-of-work puzzle, which is resource expensive to implement in mobile devices due to the high computing power and energy needed. In this paper, we, for the first time, consider edge computing as an enabler for mobile blockchain. In particular, we study edge computing resource management and pricing to support mobile blockchain applications ...

In this paper, greening, pricing, and advertising policies in a supply chain will be examined with government intervention. The supply chain has two members. First, a manufacturer seeking to determine the wholesale price and the greening level and second, a retailer that has to determine the advertising cost and the retail price. The government is trying to encourage the manufacturer to green t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید