A modeling language for mathematical programming
Management Science
Computing the optimal strategy to commit to
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Security in multiagent systems by policy randomization
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
An efficient heuristic approach for security against multiple adversaries
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track
A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form
Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence
Randomized pursuit-evasion in a polygonal environment
IEEE Transactions on Robotics
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Developing a Deterministic Patrolling Strategy for Security Agents
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
ICRA'09 Proceedings of the 2009 IEEE international conference on Robotics and Automation
Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games
CIG'09 Proceedings of the 5th international conference on Computational Intelligence and Games
On events in multi-robot patrol in adversarial environments
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 2 - Volume 2
Strategy generation in multi-agent imperfect-information pursuit games
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
How to protect a city: strategic security placement in graph-based domains
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Methods and algorithms for infinite Bayesian Stackelberg security games
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
GUARDS and PROTECT: next generation applications of security games
ACM SIGecom Exchanges
Security applications: lessons of real-world deployment
ACM SIGecom Exchanges
A double oracle algorithm for zero-sum security games on graphs
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Computing time-dependent policies for patrolling games with mobile targets
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
TALOS: a tool for designing security applications with mobile patrolling robots
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Journal of Artificial Intelligence Research
Multiagent Communication Security in Adversarial Settings
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
Multi-robot adversarial patrolling: facing a full-knowledge opponent
Journal of Artificial Intelligence Research
PROTECT: a deployed game theoretic system to protect the ports of the United States
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Computing optimal strategy against quantal response in security games
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Multi-objective optimization for security games
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Solving non-zero sum multiagent network flow security games with attack costs
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Game theory for security: an important challenge for multiagent systems
EUMAS'11 Proceedings of the 9th European conference on Multi-Agent Systems
Near-optimal continuous patrolling with teams of mobile information gathering agents
Artificial Intelligence
Security games with surveillance cost and optimal timing of attack execution
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Security games with interval uncertainty
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Optimal patrol strategy for protecting moving targets with multiple mobile resources
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Modeling human adversary decision making in security games: an initial report
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Defender (mis)coordination in security games
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
An extended study on multi-objective security games
Autonomous Agents and Multi-Agent Systems
Protecting moving targets with multiple mobile resources
Journal of Artificial Intelligence Research
Hi-index | 0.00 |
Game theoretic approaches to patrolling have become a topic of increasing interest in the very last years. They mainly refer to a patrolling mobile robot that preserves an environment from intrusions. These approaches allow for the development of patrolling strategies that consider the possible actions of the intruder in deciding where the robot should move. Usually, it is supposed that the intruder can hide and observe the actions of the patroller before intervening. This leads to the adoption of a leader-follower solution concept. In this paper, mostly theoretical in its nature, we propose an approach to determine optimal leader-follower strategies for a mobile robot patrolling an environment. Differently from previous works in literature, our approach can be applied to environments with arbitrary topologies.