Milind Tambe

According to our database1, Milind Tambe
  • authored at least 392 papers between 1988 and 2017.
  • has a "Dijkstra number"2 of four.

Awards

ACM Fellow

ACM Fellow 2013, "For contributions to the theory and practice of multi-agent systems, teamwork and security games.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Practical Scalability for Stackelberg Security Games.
CoRR, 2017

Video Labeling for Automatic Video Surveillance in Security Domains.
CoRR, 2017

Activating the "Breakfast Club": Modeling Influence Spread in Natural-World Social Networks.
CoRR, 2017

The Curse of Correlation in Security Games and Principle of Max-Entropy.
CoRR, 2017

Keeping it Real: Using Real-World Problems to Teach AI to Diverse Audiences.
AI Magazine, 2017

PAWS - A Deployed Game-Theoretic Application to Combat Poaching.
AI Magazine, 2017

Every team deserves a second chance: an extended study on predicting team performance.
Autonomous Agents and Multi-Agent Systems, 2017

Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Explanation Systems for Influence Maximization Algorithms.
Proceedings of the 3rd International Workshop on Social Influence Analysis co-located with 26th International Joint Conference on Artificial Intelligence (IJCAI 2017), 2017

Maximizing Awareness about HIV in Social Networks of Homeless Youth with Limited Information.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Influence Maximization with an Unknown Network by Exploiting Community Structure.
Proceedings of the 3rd International Workshop on Social Influence Analysis co-located with 26th International Joint Conference on Artificial Intelligence (IJCAI 2017), 2017

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Staying Ahead of the Game: Adaptive Robust Optimization for Dynamic Allocation of Threat Screening Resources.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Optimal Patrol Planning for Green Security Games with Black-Box Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

VIOLA: Video Labeling Application for Security Domains.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Influence Maximization in the Field: The Arduous Journey from Emerging to Deployed Application.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Uncharted but not Uninfluenced: Influence Maximization with an Uncertain Network.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals.
Games, 2016

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty - An Extended Version.
CoRR, 2016

Pilot Testing an Artificial Intelligence Algorithm That Selects Homeless Youth Peer Leaders Who Promote HIV Testing.
CoRR, 2016

PSINET: Assisting HIV Prevention Amongst Homeless Youth by Planning Ahead.
AI Magazine, 2016

Comparing human behavior models in repeated Stackelberg security games: An extended study.
Artif. Intell., 2016

Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Three Strategies to Success: Learning Adversary Models in Security Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Divide to Defend: Collusive Security Games.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Toward Addressing Collusion Among Human Adversaries in Security Games.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Know Your Adversary: Insights for a Better Adversarial Behavioral Model.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Using Abstractions to Solve Opportunistic Crime Security Games at Scale.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

HEALER: POMDP Planning for Scheduling Interventions among Homeless Youth (Demonstration).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

POMDPs for Assisting Homeless Shelters - Computational and Deployment Challenges.
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016

Signaling in Bayesian Stackelberg Games.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Learning Adversary Behavior in Security Games: A PAC Model Perspective.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Restless Poachers: Handling Exploration-Exploitation Tradeoffs in Security Domains.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Simultaneous Influencing and Mapping Social Networks: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

SPECTRE: A Game Theoretic Framework for Preventing Collusion in Security Games (Demonstration).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

From the Lab to the Classroom and Beyond: Extending a Game-Based Research Platform for Teaching AI to Diverse Audiences.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Conquering Adversary Behavioral Uncertainty in Security Games: An Efficient Modeling Robust Based Algorithm.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Protecting Wildlife under Imperfect Observation.
Proceedings of the Computer Poker and Imperfect Information Games, 2016

Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Simultaneous Influencing and Mapping for Health Interventions.
Proceedings of the Expanding the Boundaries of Health Informatics Using AI, 2016

Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration).
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs.
Multiagent and Grid Systems, 2015

From physical security to cybersecurity.
J. Cybersecurity, 2015

Security Games With Information Leakage: Modeling and Computation.
CoRR, 2015

Learning Adversary Behavior in Security Games: A PAC Model Perspective.
CoRR, 2015

Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system.
Autonomous Agents and Multi-Agent Systems, 2015

Security Games with Information Leakage: Modeling and Computation.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Learning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Robust Strategy against Unknown Risk-averse Attackers in Security Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

A Unifying Methodology for Confronting Uncertainties in Security Games: Advances and Algorithms: (Doctoral Consortium).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Every Team Deserves a Second Chance: Identifying when Things Go Wrong.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Multi-agent Team Formation for Design Problems.
Proceedings of the Coordination, Organizations, Institutions, and Normes in Agent Systems XI, 2015

Three Fundamental Pillars of Multi-agent Team Formation.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Every Team Deserves a Second Chance: An Interactive 9x9 Go Experience (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

"A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Defender Strategies In Domains Involving Frequent Adversary Interaction.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Preventing HIV Spread in Homeless Populations Using PSINET.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Exploring Information Asymmetry in Two-Stage Security Games.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Every Team Makes Mistakes: An Initial Report on Predicting Failure in Teamwork.
Proceedings of the Learning for General Competency in Video Games, 2015

Every Team Deserves a Second Chance: Identifying When Things Go Wrong (Student Abstract Version).
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Agents Vote for the Environment: Designing Energy-Efficient Architecture.
Proceedings of the Computational Sustainability, 2015

Effectiveness of Probability Perception Modeling and Defender Strategy Generation Algorithms in Repeated Stackelberg Games: An Initial Report.
Proceedings of the Computational Sustainability, 2015

Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Computational Game Theory for Security and Sustainability.
JIP, 2014

Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System.
J. Artif. Intell. Res., 2014

Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness.
CoRR, 2014

Game-Theoretic Target Selection in Contagion-Based Domains.
Comput. J., 2014

TESLA: an extended study of an energy-saving agent that leverages schedule flexibility.
Autonomous Agents and Multi-Agent Systems, 2014

An extended study on multi-objective security games.
Autonomous Agents and Multi-Agent Systems, 2014

Diverse Randomized Agents Vote to Win.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Unleashing Dec-MDPs in Security Games: Enabling Effective Defender Teamwork.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

Security Games in the Field: Deployments on a Transit System.
Proceedings of the Engineering Multi-Agent Systems - Second International Workshop, 2014

Towards a game theoretic approach for defending against crime diffusion.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Adaptive resource allocation for wildlife protection against illegal poachers.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Online planning for optimal protector strategies in resource conservation games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

The Power of Teams that Disagree: Team Formation in Large Action Spaces.
Proceedings of the Coordination, Organizations, Institutions, and Norms in Agent Systems X, 2014

Building THINC: user incentivization and meeting rescheduling for energy savings.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

PAWS: adaptive game-theoretic patrolling for wildlife protection.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Security games in the field: an initial study on a transit system.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Give a Hard Problem to a Diverse Team: Exploring Large Action Spaces.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Aggregating Opinions to Design Energy-Efficient Buildings.
Proceedings of the Multidisciplinary Workshop on Advances in Preference Handling, 2014

Robust Protection of Fisheries with COmPASS.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

STREETS: Game-Theoretic Traffic Patrolling with Exploration and Exploitation.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Security Games Applied to Real-World: Research Contributions and Challenges.
Proceedings of the Moving Target Defense II, 2013

Planning and learning in security games.
SIGecom Exchanges, 2013

Protecting Moving Targets with Multiple Mobile Resources.
J. Artif. Intell. Res., 2013

A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard.
Interfaces, 2013

Improving resource allocation strategies against human adversaries in security games: An extended study.
Artif. Intell., 2013

Mitigating multi-path fading in a mobile mesh network.
Ad Hoc Networks, 2013

Empirical evaluation of computational fear contagion models in crowd dispersions.
Autonomous Agents and Multi-Agent Systems, 2013

Bayesian Security Games for Controlling Contagion.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Randomizing regression tests using game theory.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach.
Proceedings of the IJCAI 2013, 2013

Efficiently Solving Joint Activity Based Security Games.
Proceedings of the IJCAI 2013, 2013

Multi-Agent Team Formation: Diversity Beats Strength?
Proceedings of the IJCAI 2013, 2013

Defender (Mis)coordination in Security Games.
Proceedings of the IJCAI 2013, 2013

Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Engineering the Decentralized Coordination of UAVs with Limited Communication Range.
Proceedings of the Advances in Artificial Intelligence, 2013

Security games with contagion: handling asymmetric information.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Modeling human adversary decision making in security games: an initial report.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

A Detailed Analysis of a Multi-agent Diverse Team.
Proceedings of the Coordination, Organizations, Institutions, and Norms in Agent Systems IX, 2013

Diversity beats strength?: a hands-on experience with 9x9 go.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Game-theoretic patrol strategies for transit systems: the TRUSTS system and its mobile app.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

TESLA: an energy-saving agent that leverages schedule flexibility.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Game-theoretic randomization for security patrolling with dynamic execution uncertainty.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security scheduling for real-world networks.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Optimal patrol strategy for protecting moving targets with multiple mobile resources.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security games with surveillance cost and optimal timing of attack execution.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Analyzing the Effectiveness of Adversary Modeling in Security Games.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory.
AI Magazine, 2012

An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety.
AI Magazine, 2012

PROTECT - A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard.
AI Magazine, 2012

Reports of the AAAI 2012 Spring Symposia.
AI Magazine, 2012

A Study of Emotional Contagion with Virtual Characters.
Proceedings of the Intelligent Virtual Agents - 12th International Conference, 2012

TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems.
Proceedings of the Twenty-Fourth Conference on Innovative Applications of Artificial Intelligence, 2012

A Robust Approach to Addressing Human Adversaries in Security Games.
Proceedings of the ECAI 2012, 2012

Game theory for security: Key algorithmic principles, deployed systems, lessons learned.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Computing optimal strategy against quantal response in security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Designing better strategies against human adversaries in network security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Adversarial patrolling games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Game-theoretic resource allocation for malicious packet detection in computer networks.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Emotional contagion with virtual characters.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

PROTECT: a deployed game theoretic system to protect the ports of the United States.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

A robust approach to addressing human adversaries in security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Sustainable multiagent application to conserve energy (demonstration).
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

SAVES: a sustainable multiagent application to conserve building energy considering occupants.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Detection of suspicious behavior from a sparse set of multiagent interactions.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

AgentPolis: towards a platform for fully agent-based modeling of multi-modal transportation (demonstration).
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Multi-objective optimization for security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Adversarial Patrolling Games.
Proceedings of the Game Theory for Security, 2012

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond.
Proceedings of the Game Theory for Security, 2012

Getting Started on a Real-World Challenge Problem in Computational Game Theory and Beyond.
Proceedings of the AI, 2012

Challenges in Patrolling to Maximize Pristine Forest Area (Position Paper).
Proceedings of the Game Theory for Security, 2012

Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems.
Proceedings of the Game Theory for Security, 2012

A Study of Phase Transitions in Security Games.
Proceedings of the Game Theory for Security, 2012

Security Games with Limited Surveillance: An Initial Report.
Proceedings of the Game Theory for Security, 2012

Analysis of Heuristic Techniques for Controlling Contagion.
Proceedings of the Social Networks and Social Contagion, 2012

Security Games on Social Networks.
Proceedings of the Social Networks and Social Contagion, 2012

Security Games for Controlling Contagion.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Patrol Strategies to Maximize Pristine Forest Area.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

The Deployment-to-Saturation Ratio in Security Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Security Games with Limited Surveillance.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned.
Cambridge University Press, ISBN: 978-1-10-709642-4, 2012

2011
GUARDS and PROTECT: next generation applications of security games.
SIGecom Exchanges, 2011

Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness.
J. Artif. Intell. Res., 2011

A probabilistic risk analysis for multimodal entry control.
Expert Syst. Appl., 2011

Hybrid BDI-POMDP Framework for Multiagent Teaming
CoRR, 2011

Towards Adjustable Autonomy for the Real World
CoRR, 2011

The Communicative Multiagent Team Decision Problem: Analyzing Teamwork Theories and Models
CoRR, 2011

Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach
CoRR, 2011

Robust Agent Teams via Socially-Attentive Monitoring
CoRR, 2011

Distributed on-Line Multi-Agent Optimization under Uncertainty: Balancing Exploration and Exploitation.
Advances in Complex Systems, 2011

Game Theory for Security: Lessons Learned from Deployed Applications.
Proceedings of the Agents in Principle, Agents in Practice - 14th International Conference, 2011

Empirical Evaluation of Computational Emotional Contagion Models.
Proceedings of the Intelligent Virtual Agents - 11th International Conference, 2011

Continuous Time Planning for Multiagent Teams with Temporal Constraints.
Proceedings of the IJCAI 2011, 2011

Improving Resource Allocation Strategy against Human Adversaries in Security Games.
Proceedings of the IJCAI 2011, 2011

GUARDS - Innovative Application of Game Theory for National Airport Security.
Proceedings of the IJCAI 2011, 2011

Towards Addressing Model Uncertainty: Robust Execution-Time Coordination for Teamwork.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011

Game Theory for Security: An Important Challenge for Multiagent Systems.
Proceedings of the Multi-Agent Systems - 9th European Workshop, 2011

Improved computational models of human behavior in security games.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Quality guarantees for region optimal DCOP algorithms.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

GUARDS: game theoretic security allocation on a national scale.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Teamwork in distributed POMDPs: execution-time coordination under model uncertainty.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

A double oracle algorithm for zero-sum security games on graphs.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Game Theory and Human Behavior: Challenges in Security and Sustainability.
Proceedings of the Algorithmic Decision Theory - Second International Conference, 2011

Mixed-Initiative Optimization in Security Games: A Preliminary Report.
Proceedings of the Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, 2011

Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

Toward Addressing Human Behavior with Observational Uncertainty in Security Games.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

Towards Detection of Suspicious Behavior from Multiple Observations.
Proceedings of the Plan, Activity, and Intent Recognition, 2011

Addressing Execution and Observation Error in Security Games.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

Refinement of Strong Stackelberg Equilibria in Security Games.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Introducing communication in Dis-POMDPs with locality of interaction.
Web Intelligence and Agent Systems, 2010

Balancing local resources and global goals in multiply-constrained DCOP.
Multiagent and Grid Systems, 2010

Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service.
Interfaces, 2010

A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?
Informatica (Slovenia), 2010

Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition.
Artif. Intell., 2010

Game Theory for Security: Lessons Learned from Deployed Applications.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract).
Proceedings of the Decision and Game Theory for Security, 2010

Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

How to protect a city: strategic security placement in graph-based domains.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Asynchronous algorithms for approximate distributed constraint optimization with quality bounds.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Robust Bayesian methods for Stackelberg security games.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Urban Security: Game-Theoretic Resource Allocation in Networked Domains.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Teamwork and Coordination under Model Uncertainty in DEC-POMDPs.
Proceedings of the Interactive Decision Theory and Game Theory, 2010

Security Games with Arbitrary Schedules: A Branch and Price Approach.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
Safety in the Context of Coordination via Adjustable Autonomy.
Proceedings of the Safety and Security in Multiagent Systems, 2009

Coordinating Randomized Policies for Increasing Security in Multiagent Systems.
Proceedings of the Safety and Security in Multiagent Systems, 2009

Analyzing Dangers in Multiagent Rescue Using DEFACTO.
Proceedings of the Safety and Security in Multiagent Systems, 2009

Security applications: lessons of real-world deployment.
SIGecom Exchanges, 2009

Coordinating randomized policies for increasing security of agent systems.
Information Technology and Management, 2009

Using Game Theory for Los Angeles Airport Security.
AI Magazine, 2009

DCOPs Meet the Real World: Exploring Unknown Reward Matrices with Applications to Mobile Sensor Networks.
Proceedings of the IJCAI 2009, 2009

Improving adjustable autonomy strategies for time-critical domains.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Planning with continuous resources for agent teams.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Computing optimal randomized resource allocations for massive security games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Sensitivity analysis for distributed optimization with resource constraints.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Exploiting Coordination Locales in Distributed POMDPs via Social Model Shaping.
Proceedings of the 19th International Conference on Automated Planning and Scheduling, 2009

2008
Bayesian stackelberg games and their application for security at Los Angeles international airport.
SIGecom Exchanges, 2008

Electric Elves: What Went Wrong and Why.
AI Magazine, 2008

Solving Multiagent Networks using Distributed Constraint Optimization.
AI Magazine, 2008

Introducing Communication in Dis-POMDPs with Locality of Interaction.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2008

Multiagent Adjustable Autonomy Framework (MAAF) for multi-robot, multi-human teams.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

RIAACT: a robust approach to adjustable autonomy for human-multiagent teams.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Not all agents are equal: scaling up distributed POMDPs for agent networks.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

On k-optimal distributed constraint optimization algorithms: new bounds and algorithms.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Using Science Fiction in Teaching Artificial Intelligence.
Proceedings of the Using AI to Motivate Greater Participation in Computer Science, 2008

ARMOR Security for Los Angeles International Airport.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

Towards Faster Planning with Continuous Resources in Stochastic Domains.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
An Intelligent Personal Assistant for Task and Time Management.
AI Magazine, 2007

Towards Efficient Computation of Error Bounded Solutions in POMDPs: Expected Value Approximation and Dynamic Disjunctive Beliefs.
Proceedings of the IJCAI 2007, 2007

Quality Guarantees on k-Optimal Solutions for Distributed Constraint Optimization Problems.
Proceedings of the IJCAI 2007, 2007

A Fast Analytical Algorithm for Solving Markov Decision Processes with Real-Valued Resources.
Proceedings of the IJCAI 2007, 2007

Letting loose a SPIDER on a network of POMDPs: generating quality guaranteed policies.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

An efficient heuristic approach for security against multiple adversaries.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

On opportunistic techniques for solving decentralized Markov decision processes with temporal constraints.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Demonstration of teamwork in uncertain domains using hybrid BDI-POMDP systems.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

SPIDER Attack on a Network of POMDPs: Towards Quality Bounded Solutions.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007

An Efficient Heuristic for Security against Multiple Adversaries in Stackelberg Games.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007

2006
Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications.
Autonomous Agents and Multi-Agent Systems, 2006

Asimovian Multiagents: Applying Laws of Robotics to Teams of Humans and Agents.
Proceedings of the Programming Multi-Agent Systems, 4th International Workshop, 2006

Solution Sets for DCOPs and Graphical Games: Metrics and Bounds.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2006

Security in Multiagent Systems by Policy Randomization.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2006

Winning back the CUP for distributed POMDPs: planning over continuous belief spaces.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Using multiagent teams to improve the training of incident commanders.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Solution sets for DCOPs and graphical games.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Security in multiagent systems by policy randomization.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Experimental analysis of privacy loss in DCOP algorithms.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Multiply-constrained distributed constraint optimization.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Conflict negotiation among personal calendar agents.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Electric Elves: What Went Wrong and Why.
Proceedings of the What Went Wrong and Why: Lessons from AI Research and Applications, 2006

Exploiting Locality of Interaction in Networked Distributed POMDPs.
Proceedings of the Distributed Plan and Schedule Management, 2006

Cooperative Team Plan: Planning, Execution, and Replanning.
Proceedings of the Distributed Plan and Schedule Management, 2006

Analysis of Privacy Loss in Distributed Constraint Optimization.
Proceedings of the Proceedings, 2006

Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System.
Proceedings of the Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006

2005
Towards flexible coordination of human-agent teams.
Multiagent and Grid Systems, 2005

Hybrid BDI-POMDP Framework for Multiagent Teaming.
J. Artif. Intell. Res., 2005

Research Directions for Service-Oriented Multiagent Systems.
IEEE Internet Computing, 2005

Adopt: asynchronous distributed constraint optimization with quality guarantees.
Artif. Intell., 2005

Implementation Techniques for Solving POMDPs in Personal Assistant Agents.
Proceedings of the Programming Multi-Agent Systems, 2005

Networked Distributed POMDPs: A Synergy of Distributed Constraint Optimization and POMDPs.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

On Communication in Solving Distributed Constraint Satisfaction Problems.
Proceedings of the Multi-Agent Systems and Applications IV, 2005

Exploiting belief bounds: practical POMDPs for personal assistant agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Conflicts in teamwork: hybrids to the rescue.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Demonstration of DEFACTO: training tool for incident commanders.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

The DEFACTO system for human omnipresence to coordinate agent teams: the future of disaster response.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Allocating tasks in extreme teams.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

How local is that optimum? k-optimality for DCOP.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Valuations of Possible States (VPS): a quantitative framework for analysis of privacy loss among collaborative personal assistant agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Preprocessing techniques for accelerating the DCOP algorithm ADOPT.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Practical POMDPs for Personal Assistant Domains.
Proceedings of the Persistent Assistants: Living and Working with AI, 2005

The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO.
Proceedings of the AI Technologies for Homeland Security, 2005

Valuations of Possible States (VPS): A Quantitative Framework for Analysis of Privacy Loss Among Collaborative Personal Assistant Agents.
Proceedings of the Persistent Assistants: Living and Working with AI, 2005

Optimize My Schedule but Keep It Flexible: Distributed Multi-Criteria Coordination for Personal Assistants.
Proceedings of the Persistent Assistants: Living and Working with AI, 2005

The DEFACTO System: Training Tool for Incident Commanders.
Proceedings of the Proceedings, 2005

Networked Distributed POMDPs: A Synthesis of Distributed Constraint Optimization and POMDPs.
Proceedings of the Proceedings, 2005

The DEFACTO System: Coordinating Human-Agent Teams for the Future of Disaster Response.
Proceedings of the Multi-Agent Programming: Languages, Platforms and Applications, 2005

2004
Automated Assistants for Analyzing Team Behaviors.
Autonomous Agents and Multi-Agent Systems, 2004

Token Approach for Role Allocation in Extreme Teams: Analysis and Experimental Evaluation.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Coordinating Teams in Uncertain Environments: A Hybrid BDI-POMDP Approach.
Proceedings of the Programming Multi-Agent Systems, 2004

Preprocessing Techniques for Distributed Constraint Optimization.
Proceedings of the Principles and Practice of Constraint Programming, 2004

Allocating Roles in Extreme Teams.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Towards a Formalization of Teamwork with Resource Constraints.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Communication for Improving Policy Computation in Distributed POMDPs.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

On Communication in Distributed Constraint Satisfaction.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Distributed Algorithms for DCOP: A Graphical-Game-Based Approach.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
An Automated Teamwork Infrastructure for Heterogeneous Software Agents and Humans.
Autonomous Agents and Multi-Agent Systems, 2003

Are Multiagent Algorithms Relevant for Real Hardware? A Case Study of Distributed Constraint Algorithms.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Team Oriented Programming and Proxy Agents: The Next Generation.
Proceedings of the Programming Multi-Agent Systems, First International Workshop, 2003

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings.
Proceedings of the IJCAI-03, 2003

A prototype infrastructure for distributed robot-agent-person teams.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Role allocation and reallocation in multiagent teams: towards a practical analysis.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

An asynchronous complete method for distributed constraint optimization.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Adjustable Autonomy Challenges in Personal Assistant Agents: A Position Paper.
Proceedings of the Agents and Computational Autonomy - Potential, Risks, and Solutions - Postproceedings of the 1st International Workshop on Computational Autonomy, 2003

Performance models for large scale multiagent systems: using distributed POMDP building blocks.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

2002
Towards Adjustable Autonomy for the Real World.
J. Artif. Intell. Res., 2002

The Communicative Multiagent Team Decision Problem: Analyzing Teamwork Theories and Models.
J. Artif. Intell. Res., 2002

Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach.
J. Artif. Intell. Res., 2002

Special Issue on Constraint Agents.
Constraints, 2002

Electric Elves: Agent Technology for Supporting Human Organizations.
AI Magazine, 2002

Editorial.
Artif. Intell., 2002

Team Formation for Reformation in Multiagent Domains Like RoboCupRescue.
Proceedings of the RoboCup 2002: Robot Soccer World Cup VI, 2002

Computational Models for Multiagent Coordination Analysis: Extending Distributed POMDP Models.
Proceedings of the Formal Approaches to Agent-Based Systems, Second International Workshop, 2002

Why the elf acted autonomously: towards a theory of adjustable autonomy.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

Multiagent teamwork: analyzing the optimality and complexity of key theories and models.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
Experiences Acquired in the Design of RoboCup Teams: A Comparison of Two Fielded Teams.
Autonomous Agents and Multi-Agent Systems, 2001

Task Allocation in the RoboCup Rescue Simulation Domain: A Short Note.
Proceedings of the RoboCup 2001: Robot Soccer World Cup V, 2001

Electric Elves: Applying Agent Technology to Support Human Organizations.
Proceedings of the Thirteenth Innovative Applications of Artificial Intelligence Conference, 2001

Towards Heterogeneous Agent Teams.
Proceedings of the Multi-Agent Systems and Applications, 2001

A Dynamic Distributed Constraint Satisfaction Approach to Resource Allocation.
Proceedings of the Principles and Practice of Constraint Programming, 2001

Revisiting Asimov's First Law: A Response to the Call to Arms.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

Dynamic Distributed Resource Allocation: A Distributed Constraint Satisfaction Approach.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

Introduction.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

Adjustable autonomy in real-world multi-agent environments.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

Monitoring deployed agent teams.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

Argumentation as distributed constraint satisfaction: applications and results.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

2000
Robust Agent Teams via Socially-Attentive Monitoring.
J. Artif. Intell. Res., 2000

Building Dynamic Agent Organizations in Cyberspace.
IEEE Internet Computing, 2000

Agent Assistants for Team Analysis.
AI Magazine, 2000

Overview of RoboCup-98.
AI Magazine, 2000

Towards Flexible Teamwork in Persistent Teams: Extended Report.
Autonomous Agents and Multi-Agent Systems, 2000

Towards Large-Scale Conflict Resolution: Initial Results.
Proceedings of the 4th International Conference on Multi-Agent Systems, 2000

Adjustable Autonomy: A Response.
Proceedings of the Intelligent Agents VII. Agent Theories Architectures and Languages, 2000

Automated assistants to aid humans in understanding team behaviors.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

Adaptive Infrastructures for Agent Integration.
Proceedings of the Infrastructure for Agents, 2000

Building dynamic organizations of distributed, heterogenous agents.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

1999
The Benefits of Arguing in a Team.
AI Magazine, 1999

Building Agent Teams Using an Explicit Teamwork Model and Learning.
Artif. Intell., 1999

Automated Assistants to Aid Humans in Understanding Team Behaviors.
Proceedings of the RoboCup-99: Robot Soccer World Cup III, 1999

Two Fielded Teams and Two Experts: A RoboCup Challenge Response from the Trenches.
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999

Toward Team-Oriented Programming.
Proceedings of the Intelligent Agents VI, 1999

Towards Flexible Negotiation in Teamwork.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999

On Being a Teammate: Experiences Acquired in the design of RoboCup Teams.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999

I'm OK, you're OK, we're OK: Experiments in Distributed and Centralized Socially Attentive Monitoring.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999

Automated Team Analysis.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
Adaptive agent tracking in real-world multiagent domains: a preliminary report.
Int. J. Hum.-Comput. Stud., 1998

ISIS: An Explicit Model of Teamwork at RobotCup-97.
AI Magazine, 1998

Implementing Agent Teams in Dynamic Multiagent Environments.
Applied Artificial Intelligence, 1998

Using an Explicit Teamwork Model and Learning in RoboCup: An Extended Abstract.
Proceedings of the RoboCup-98: Robot Soccer World Cup II, 1998

Overview of RoboCup-98.
Proceedings of the RoboCup-98: Robot Soccer World Cup II, 1998

Towards Flexible Teamwork in Persistent Teams.
Proceedings of the Third International Conference on Multiagent Systems, 1998

The Belief-Desire-Intention Model of Agency.
Proceedings of the Intelligent Agents V, 1998

A Synergy of Agent Components: Social Comparison for Failure Detection.
Proceedings of the Second International Conference on Autonomous Agents, 1998

What Is Wrong With Us? Improving Robustness Through Social Diagnosis.
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998

1997
Towards Flexible Teamwork.
J. Artif. Intell. Res., 1997

Towards Flexible Teamwork
CoRR, 1997

AAAI-96 Workshop on Agent Modeling (Workshop Report).
AI Magazine, 1997

Using an Explicit Model of Teamwork in RoboCup-97.
Proceedings of the RoboCup-97: Robot Soccer World Cup I, 1997

The RoboCup Synthetic Agent Challenge 97.
Proceedings of the RoboCup-97: Robot Soccer World Cup I, 1997

The RoboCup Synthetic Agent Challenge 97.
Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, 1997

Social Comparison for Failure Detection and Recovery.
Proceedings of the Intelligent Agents IV, 1997

Agent Architectures for Flexible, Practical Teamwork.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

Social Comparison for Failure Detection and Recovery in Multi-Agent Settings.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

Efficient Production Match Algorithm and Its Implication for Dynamic Constraint Satisfaction Problems.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

1996
Event Tracking in a Dynamic Multiagent Environment.
Computational Intelligence, 1996

Some Challenges in Tracking Agent Teams.
Proceedings of the Agent Modeling, Papers from the 1996 AAAI Workshop, 1996

Tracking Dynamic Team Activity.
Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, 1996

1995
Intelligent Agents for Interactive Simulation Environments.
AI Magazine, 1995

RESC: An Approach for Real-time, Dynamic Agent Tracking.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

Recursive Agent and Agent-Group Tracking in a Real-Time Dynamic Environment.
Proceedings of the First International Conference on Multiagent Systems, 1995

Agent Theories, Architectures, and Languages: A Bibliography.
Proceedings of the Intelligent Agents II, 1995

Architectures for Agents that Track Other Agents in Multi-Agent Worlds.
Proceedings of the Intelligent Agents II, 1995

1994
Investigating Production System Representations for Non-Combinatorial Match.
Artif. Intell., 1994

Event Tracking for an Intelligent Automated Agent.
TIME, 1994

1993
Collection Oriented Match.
Proceedings of the CIKM 93, 1993

On the Masking Effect.
Proceedings of the 11th National Conference on Artificial Intelligence. Washington, 1993

1992
Implementation of Production Systems on Message-Passing Computers.
IEEE Trans. Parallel Distrib. Syst., 1992

Workshop Report: Advances in Interfacing Production Systems with the Real World.
AI Magazine, 1992

An Efficient Algorithm for Production Systems with Linear-Time Match.
Proceedings of the Fourth International Conference on Tools with Artificial Intelligence, 1992

Is Production System Match Interesting?
Proceedings of the Fourth International Conference on Tools with Artificial Intelligence, 1992

Learning 10, 000 Chunks: What's It Like Out There?
Proceedings of the 10th National Conference on Artificial Intelligence. San Jose, 1992

1991
The Effectiveness of Task-Level Parallelism for Production Systems.
J. Parallel Distrib. Comput., 1991

1990
The Problem of Expensive Chunks and its Solution by Restricting Expressiveness.
Machine Learning, 1990

The Effectiveness of Task-Level Parallelism for High-Level Vision.
Proceedings of the Second ACM SIGPLAN Symposium on Princiles & Practice of Parallel Programming (PPOPP), 1990

A Frameworkfor Investigating Production System Formulations with Polynomially Bounded Match.
Proceedings of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts, July 29, 1990

1989
Eliminating Expensive Chunks by Restricting Expressiveness.
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989

Production Systems on Message Passing Computers: Simulation Results and Analysis.
Proceedings of the International Conference on Parallel Processing, 1989

1988
Parallel implementation of OPS5 on the encore multiprocessor: Results and analysis.
International Journal of Parallel Programming, 1988

Soar/PSM-E: Investigating Match Parallelism in a Learning Production System.
Proceedings of the ACM/SIGPLAN PPEALS 1988, 1988

Parallel OPS5 on the Encore Multimax.
Proceedings of the International Conference on Parallel Processing, 1988

Some Chunks Are Expensive.
Proceedings of the Machine Learning, 1988

Suitability of Message Passing Computers for Implementing Production Systems.
Proceedings of the 7th National Conference on Artificial Intelligence. St. Paul, 1988


  Loading...