Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bidding agents for online auctions with hidden bids., and . Mach. Learn., 67 (1-2): 117-143 (2007)Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs., , , , and . IJCAI, page 681-688. AAAI Press, (2015)Polynomial computation of exact correlated equilibrium in compact games., and . SIGecom Exch., 10 (1): 6-8 (2011)Linear solvers for nonlinear games: using pivoting algorithms to find Nash equilibria in n-player games., , and . SIGecom Exch., 10 (1): 9-12 (2011)Online planning for optimal protector strategies in resource conservation games., , , and . AAMAS, page 733-740. IFAAMAS/ACM, (2014)Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty - An Extended Version., , , , , and . CoRR, (2016)Using social networks to raise HIV awareness among homeless youth., , , , , , and . IBM J. Res. Dev., 61 (6): 4:1-4:10 (2017)Game-Theoretic Goal Recognition Models with Applications to Security Domains., , , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 256-272. Springer, (2017)Security Games on Social Networks., , , , , and . AAAI Fall Symposium: Social Networks and Social Contagion, volume FS-12-08 of AAAI Technical Report, AAAI, (2012)Resource Graph Games: A Compact Representation for Games with Structured Strategy Spaces., , and . AAAI, page 572-578. AAAI Press, (2017)