Year |
Citation |
Score |
2015 |
Vorobeychik Y, Letchford J. Securing interdependent assets Autonomous Agents and Multi-Agent Systems. 29: 305-333. DOI: 10.1007/S10458-014-9258-0 |
0.531 |
|
2014 |
Smith A, Vorobeychik Y, Letchford J. Multi-Defender security games on networks Performance Evaluation Review. 41: 4-7. DOI: 10.1145/2627534.2627536 |
0.334 |
|
2014 |
Letchford J, Korzhyk D, Conitzer V. On the value of commitment Autonomous Agents and Multi-Agent Systems. 28: 986-1016. DOI: 10.1007/S10458-013-9246-9 |
0.618 |
|
2014 |
Sørensen TB, Dalis M, Letchford J, Korzhyk D, Conitzer V. Beat the cheater: Computing game-theoretic strategies for when to kick a gambler out of a casino Proceedings of the National Conference On Artificial Intelligence. 1: 798-804. |
0.639 |
|
2013 |
Letchford J, Conitzer V. Solving security games on graphs via marginal probabilities Proceedings of the 27th Aaai Conference On Artificial Intelligence, Aaai 2013. 591-597. |
0.659 |
|
2013 |
Letchford J, Vorobeychik Y. Optimal interdiction of attack plans 12th International Conference On Autonomous Agents and Multiagent Systems 2013, Aamas 2013. 1: 199-206. |
0.353 |
|
2012 |
Letchford J, MacDermed L, Conitzer V, Parr R, Isbell CL. Computing Stackelberg strategies in stochastic games Acm Sigecom Exchanges. 11: 36-40. DOI: 10.1145/2509002.2509011 |
0.711 |
|
2012 |
Letchford J, Vorobeychik Y. Computing optimal security strategies for interdependent assets Uncertainty in Artificial Intelligence - Proceedings of the 28th Conference, Uai 2012. 459-468. |
0.392 |
|
2012 |
Letchford J, MacDermed L, Conitzer V, Parr R, Isbell CL. Computing optimal strategies to commit to in stochastic games Proceedings of the National Conference On Artificial Intelligence. 2: 1380-1386. |
0.701 |
|
2011 |
Letchford J, Vorobeychik Y. Computing randomized security strategies in networked domains Aaai Workshop - Technical Report. 49-56. |
0.349 |
|
2010 |
Letchford J, Conitzer V. Computing optimal strategies to commit to in extensive-form games Proceedings of the Acm Conference On Electronic Commerce. 83-92. DOI: 10.1145/1807342.1807354 |
0.688 |
|
2010 |
Conitzer V, Immorlica N, Letchford J, Munagala K, Wagman L. False-name-proofness in social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6484: 209-221. DOI: 10.1007/978-3-642-17572-5_17 |
0.634 |
|
2009 |
Letchford J, Conitzer V, Munagala K. Learning and approximating the optimal strategy to commit to Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5814: 250-262. DOI: 10.1007/978-3-642-04645-2_23 |
0.669 |
|
2008 |
Letchford J, Conitzer V, Jain K. An "ethical" game-theoretic solution concept for two-player perfect-information games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5385: 696-707. DOI: 10.1007/978-3-540-92185-1_75 |
0.609 |
|
Show low-probability matches. |