Joshua Letchford, Ph.D. - Publications

Affiliations: 
2013 Computer Science Duke University, Durham, NC 
Area:
Computer Science

14 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Vorobeychik Y, Letchford J. Securing interdependent assets Autonomous Agents and Multi-Agent Systems. 29: 305-333. DOI: 10.1007/S10458-014-9258-0  0.531
2014 Smith A, Vorobeychik Y, Letchford J. Multi-Defender security games on networks Performance Evaluation Review. 41: 4-7. DOI: 10.1145/2627534.2627536  0.334
2014 Letchford J, Korzhyk D, Conitzer V. On the value of commitment Autonomous Agents and Multi-Agent Systems. 28: 986-1016. DOI: 10.1007/S10458-013-9246-9  0.618
2014 Sørensen TB, Dalis M, Letchford J, Korzhyk D, Conitzer V. Beat the cheater: Computing game-theoretic strategies for when to kick a gambler out of a casino Proceedings of the National Conference On Artificial Intelligence. 1: 798-804.  0.639
2013 Letchford J, Conitzer V. Solving security games on graphs via marginal probabilities Proceedings of the 27th Aaai Conference On Artificial Intelligence, Aaai 2013. 591-597.  0.659
2013 Letchford J, Vorobeychik Y. Optimal interdiction of attack plans 12th International Conference On Autonomous Agents and Multiagent Systems 2013, Aamas 2013. 1: 199-206.  0.353
2012 Letchford J, MacDermed L, Conitzer V, Parr R, Isbell CL. Computing Stackelberg strategies in stochastic games Acm Sigecom Exchanges. 11: 36-40. DOI: 10.1145/2509002.2509011  0.711
2012 Letchford J, Vorobeychik Y. Computing optimal security strategies for interdependent assets Uncertainty in Artificial Intelligence - Proceedings of the 28th Conference, Uai 2012. 459-468.  0.392
2012 Letchford J, MacDermed L, Conitzer V, Parr R, Isbell CL. Computing optimal strategies to commit to in stochastic games Proceedings of the National Conference On Artificial Intelligence. 2: 1380-1386.  0.701
2011 Letchford J, Vorobeychik Y. Computing randomized security strategies in networked domains Aaai Workshop - Technical Report. 49-56.  0.349
2010 Letchford J, Conitzer V. Computing optimal strategies to commit to in extensive-form games Proceedings of the Acm Conference On Electronic Commerce. 83-92. DOI: 10.1145/1807342.1807354  0.688
2010 Conitzer V, Immorlica N, Letchford J, Munagala K, Wagman L. False-name-proofness in social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6484: 209-221. DOI: 10.1007/978-3-642-17572-5_17  0.634
2009 Letchford J, Conitzer V, Munagala K. Learning and approximating the optimal strategy to commit to Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5814: 250-262. DOI: 10.1007/978-3-642-04645-2_23  0.669
2008 Letchford J, Conitzer V, Jain K. An "ethical" game-theoretic solution concept for two-player perfect-information games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5385: 696-707. DOI: 10.1007/978-3-540-92185-1_75  0.609
Show low-probability matches.