Milind Tambe

Orcid: 0000-0003-3296-3672

Affiliations:
  • Harvard University, Cambridge, MA, USA
  • University of Southern California (former)


According to our database1, Milind Tambe authored at least 539 papers between 1988 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2013, "For contributions to the theory and practice of multi-agent systems, teamwork and security games.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Decision-Language Model (DLM) for Dynamic Restless Multi-Armed Bandit Tasks in Public Health.
CoRR, 2024

Social Environment Design.
CoRR, 2024

Evaluating the Effectiveness of Index-Based Treatment Allocation.
CoRR, 2024

A Bayesian Approach to Online Learning for Contextual Restless Bandits with Applications to Public Health.
CoRR, 2024

Leaving the Nest: Going beyond Local Loss Functions for Predict-Then-Optimize.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Improving Health Information Access in the World's Largest Maternal Mobile Health Program via Bandit Algorithms.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Expanding impact of mobile health programs: SAHELI for maternal and child care.
AI Mag., December, 2023

Predicting micronutrient deficiency with publicly available satellite data.
AI Mag., March, 2023

Toward Computationally Efficient Inverse Reinforcement Learning via Reward Shaping.
CoRR, 2023

Analyzing and Predicting Low-Listenership Trends in a Large-Scale Mobile Health Program: A Preliminary Investigation.
CoRR, 2023

Towards Zero Shot Learning in Restless Multi-armed Bandits.
CoRR, 2023

Equitable Restless Multi-Armed Bandits: A General Framework Inspired By Digital Health.
CoRR, 2023

Reflections from the Workshop on AI-Assisted Decision Making for Conservation.
CoRR, 2023

Decision-Focused Evaluation: Analyzing Performance of Deployed Restless Multi-Arm Bandits.
CoRR, 2023

Find Rhinos without Finding Rhinos: Active Learning with Multimodal Imagery of South African Rhino Habitats.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Limited Resource Allocation in a Non-Markovian World: The Case of Maternal and Child Healthcare.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Complex Contagion Influence Maximization: A Reinforcement Learning Approach.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Improved Policy Evaluation for Randomized Trials of Algorithmic Resource Allocation.
Proceedings of the International Conference on Machine Learning, 2023

Accounting for Uncertainty in Deceptive Signaling for Cybersecurity.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Restless Multi-Armed Bandits for Maternal and Child Health: Results from Decision-Focused Learning.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Modeling Robustness in Decision-Focused Learning as a Stackelberg Game.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Indexability is Not Enough for Whittle: Improved, Near-Optimal Algorithms for Restless Bandits.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

AI-driven Prices for Externalities and Sustainability in Production Markets.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Fairness for Workers Who Pull the Arms: An Index Based Policy for Allocation of Restless Bandit Tasks.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

A Learning Approach to Complex Contagion Influence Maximization.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Scalable Decision-Focused Learning in Restless Multi-Armed Bandits with Application to Maternal and Child Health.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Increasing Impact of Mobile Health Programs: SAHELI for Maternal and Child Care.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Robust Planning over Restless Groups: Engagement Interventions for a Large-Scale Maternal Telehealth Program.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Flexible Budgets in Restless Bandits: A Primal-Dual Algorithm for Efficient Budget Allocation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Optimistic Whittle Index Policy: Online Learning for Restless Bandits.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Artificial Intelligence and Life in 2030: The One Hundred Year Study on Artificial Intelligence.
CoRR, 2022

Artificial Replay: A Meta-Algorithm for Harnessing Historical Data in Bandits.
CoRR, 2022

Learning (Local) Surrogate Loss Functions for Predict-Then-Optimize Problems.
CoRR, 2022

Artificial Intelligence for Cyber Security (AICS).
CoRR, 2022

Decision-Focused Learning in Restless Multi-Armed Bandits with Application to Maternal and Child Care Domain.
CoRR, 2022

Designing effective masking strategies for cyberdefense through human experimentation and cognitive models.
Comput. Secur., 2022

Solving structured hierarchical games using differential backward induction.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Restless and uncertain: Robust policies for restless bandits via deep multi-agent reinforcement learning.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Decision-Focused Learning without Decision-Making: Learning Locally Optimized Decision Losses.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

AI for Social Impact: Results from Deployments for Public Health and Conversation.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Evolutionary Approach to Security Games with Signaling.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Ranked Prioritization of Groups in Combinatorial Bandit Allocation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

ADVISER: AI-Driven Vaccination Intervention Optimiser for Increasing Vaccine Uptake in Nigeria.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Networked Restless Multi-Armed Bandits for Mobile Interventions.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

Efficient Algorithms for Finite Horizon and Streaming Restless Multi-Armed Bandit Problems.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

Field Study in Deploying Restless Multi-Armed Bandits: Assisting Non-profits in Improving Maternal and Child Health.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Facilitating Human-Wildlife Cohabitation through Conflict Prediction.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Micronutrient Deficiency Prediction via Publicly Available Satellite Data.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

Using Public Data to Predict Demand for Mobile Health Clinics.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Allocating outreach resources for disease control in a dynamic population with information spread.
IISE Trans., 2021

Harnessing Heterogeneity: Learning from Decomposed Feedback in Bayesian Modeling.
CoRR, 2021

Robust Restless Bandits: Tackling Interval Uncertainty with Deep Reinforcement Learning.
CoRR, 2021

Learning MDPs from Features: Predict-Then-Optimize for Sequential Decision Problems by Reinforcement Learning.
CoRR, 2021

Selective Intervention Planning using Restless Multi-Armed Bandits to Improve Maternal and Child Health Outcomes.
CoRR, 2021

Efficient Algorithms for Finite Horizon and Streaming Restless Multi-Armed Bandit Problems.
CoRR, 2021

A Game-Theoretic Approach for Hierarchical Policy-Making.
CoRR, 2021

Towards a Cognitive Theory of Cyber Deception.
Cogn. Sci., 2021

Robust reinforcement learning under minimax regret for green security.
Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, 2021

Contingency-aware influence maximization: A reinforcement learning approach.
Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, 2021

Learning MDPs from Features: Predict-Then-Optimize for Sequential Decision Making by Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Q-Learning Lagrange Policies for Multi-Action Restless Bandits.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Learn to Intervene: An Adaptive Learning Policy for Restless Bandits in Application to Preventive Healthcare.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Measuring Data Collection Diligence for Community Healthcare.
Proceedings of the EAAMO 2021: ACM Conference on Equity and Access in Algorithms, Mechanisms, and Optimization, Virtual Event, USA, October 5, 2021

Reinforcement Learning for Unified Allocation and Patrolling in Signaling Games with Uncertainty.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Cohorting to Isolate Asymptomatic Spreaders: An Agent-Based Simulation Study on the Mumbai Suburban Railway.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Active Screening for Recurrent Diseases: A Reinforcement Learning Approach.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Risk-Aware Interventions in Public Health: Planning with Restless Multi-Armed Bandits.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Beyond "To Act or Not to Act": Fast Lagrangian Approaches to General Multi-Action Restless Bandits.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Learning Index Policies for Restless Bandits with Application to Maternal Healthcare.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Dual-Mandate Patrols: Multi-Armed Bandits for Green Security.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Clinical Trial of an AI-Augmented Intervention for HIV Prevention in Youth Experiencing Homelessness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Tracking Disease Outbreaks from Sparse Data with Bayesian Inference.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Fair Influence Maximization: a Welfare Optimization Approach.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models.
Top. Cogn. Sci., 2020

Modeling the dynamism of HIV information diffusion in multiplex networks of homeless youth.
Soc. Networks, 2020

Efficient Reservoir Management through Deep Reinforcement Learning.
CoRR, 2020

Enhancing Poaching Predictions for Under-Resourced Wildlife Conservation Parks Using Remote Sensing Imagery.
CoRR, 2020

Measuring Data Collection Quality for Community Healthcare.
CoRR, 2020

Preliminary Results from a Peer-Led, Social Network Intervention, Augmented by Artificial Intelligence to Prevent HIV among Youth Experiencing Homelessness.
CoRR, 2020

Collapsing Bandits and Their Application to Public Health Interventions.
CoRR, 2020

Game Theory on the Ground: The Effect of Increased Patrols on Deterring Poachers.
CoRR, 2020

Fair Influence Maximization: A Welfare Optimization Approach.
CoRR, 2020

Missed calls, Automated Calls and Health Support: Using AI to improve maternal health outcomes by increasing program engagement.
CoRR, 2020

AI for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline.
CoRR, 2020

Artificial Intelligence for Social Impact: Learning and Planning in the Data-to-Deployment Pipeline.
AI Mag., 2020

BIRDSAI: A Dataset for Detection and Tracking in Aerial Thermal Infrared Videos.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2020

Robust Spatial-Temporal Incident Prediction.
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020

Collapsing Bandits and Their Application to Public Health Intervention.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Automatically Learning Compact Quality-aware Surrogates for Optimization Problems.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Active Screening on Recurrent Diseases Contact Networks with Uncertainty: A Reinforcement Learning Approach.
Proceedings of the Multi-Agent-Based Simulation XXI - 21st International Workshop, 2020

Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations (Short Version).
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Adaptive Cyber Deception: Cognitively Informed Signaling for Cyber Defense.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Scalable Game-Focused Learning of Adversary Models: Data-to-Decisions in Network Security Games.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Who and When to Screen: Multi-Round Active Screening for Network Recurrent Infectious Diseases Under Uncertainty.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Influence Maximization in Unknown Social Networks: Learning Policies for Effective Graph Sampling.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

Solving Online Threat Screening Games using Constrained Action Space Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

End-to-End Game-Focused Learning of Adversary Behavior in Security Games.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

MIPaaL: Mixed Integer Program as a Layer.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

To Signal or Not To Signal: Exploiting Uncertain Real-Time Information in Signaling Games for Security and Sustainability.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Learning policies for Social network discovery with Reinforcement learning.
CoRR, 2019

Stay Ahead of Poachers: Illegal Wildlife Poaching Prediction and Patrol Planning Under Uncertainty with Field Test Evaluations.
CoRR, 2019

Who and When to Screen: Multi-Round Active Screening for Recurrent Infectious Diseases Under Uncertainty.
CoRR, 2019

Decision-Focused Learning of Adversary Behavior in Security Games.
CoRR, 2019

Social Network Based Substance Abuse Prevention via Network Modification (A Preliminary Study).
CoRR, 2019

Artificial Intelligence for Social Good.
CoRR, 2019

Computational sustainability: computing for a better world and a sustainable future.
Commun. ACM, 2019

Improving GP-UCB Algorithm by Harnessing Decomposed Feedback.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

Mobile Game Theory with Street Gangs.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2019

End to end learning and optimization on graphs.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Exploring Algorithmic Fairness in Robust Graph Covering Problems.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Learning to Prescribe Interventions for Tuberculosis Patients Using Digital Adherence Data.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

Group-Fairness in Influence Maximization.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Cyber Camouflage Games for Strategic Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

DeepFP for Finding Nash Equilibrium in Continuous Action Spaces.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

General-Sum Cyber Deception Games under Partial Attacker Valuation Information.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Robust Peer-Monitoring on Graphs with an Application to Suicide Prevention in Social Networks.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Deep Fictitious Play for Games with Continuous Action Spaces.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Don't Put All Your Strategies in One Basket: Playing Green Security Games with Imperfect Prior Knowledge.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Warning Time: Optimizing Strategic Signaling for Security Against Boundedly Rational Adversaries.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Using Game Theory in Real Time in the Real World: A Conservation Case Study.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Broken Signals in Security Games: Coordinating Patrollers and Sensors in the Real World.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Melding the Data-Decisions Pipeline: Decision-Focused Learning for Combinatorial Optimization.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

On the Inducibility of Stackelberg Equilibrium for Security Games.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Decentralized dynamic task allocation for UAVs with limited communication range.
CoRR, 2018

From Empirical Analysis to Public Policy: Evaluating Housing Systems for Homeless Youth.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Bridging the Gap Between Theory and Practice in Influence Maximization: Raising Awareness about HIV among Homeless Youth.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

End to end influence maximization for HIV prevention.
Proceedings of the First Joint Workshop on AI in Health organized as part of the Federated AI Meeting (FAIM 2018), 2018

Stackelberg Security Games: Looking Beyond a Decade of Success.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

The Price of Usability: Designing Operationalizable Strategies for Security Games.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Near Real-Time Detection of Poachers from Drones in AirSim.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Scaling-Up Stackelberg Security Games Applications Using Approximations.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring Games.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Imbalanced Collusive Security Games.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

AirSim-W: A Simulation Environment for Wildlife Conservation with UAVs.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Designing Fair, Efficient, and Interpretable Policies for Prioritizing Homeless Youth for Housing Resources.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2018

Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games.
Proceedings of the 40th Annual Meeting of the Cognitive Science Society, 2018

Please be an Influencer?: Contingency-Aware Influence Maximization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Mitigating the Curse of Correlation in Security Games by Entropy Maximization.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Optimizing Network Structure for Preventative Health.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

End-to-End Influence Maximization in the Field.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Equilibrium Refinement in Security Games with Arbitrary Scheduling Constraints.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Deceiving Cyber Adversaries: A Game Theoretic Approach.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Activating the: Modeling Influence Spread in Natural-World Social Networks.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Inducible Equilibrium for Security Games.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Adversary Models Account for Imperfect Crime Data: Forecasting and Planning against Real-world Poachers.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Partially Generative Neural Networks for Gang Crime Classification with Partial Information.
Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, 2018

Utilizing Housing Resources for Homeless Youth Through the Lens of Multiple Multi-Dimensional Knapsacks.
Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, 2018

Strategic Coordination of Human Patrollers and Mobile Sensors With Signaling for Security Games.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Preventing Infectious Disease in Dynamic Populations Under Uncertainty.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Maximizing Influence in an Unknown Social Network.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Influence Maximization for Social Network Based Substance Abuse Prevention.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Policy Learning for Continuous Space Security Games Using Neural Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Evaluation of Predictive Models for Wildlife Poaching Activity through Controlled Field Test in Uganda.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

SPOT Poachers in Action: Augmenting Conservation Drones With Automatic Detection in Near Real Time.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Using social networks to raise HIV awareness among homeless youth.
IBM J. Res. Dev., 2017

Predicting poaching for wildlife Protection.
IBM J. Res. Dev., 2017

Practical Scalability for Stackelberg Security Games.
CoRR, 2017

Video Labeling for Automatic Video Surveillance in Security Domains.
CoRR, 2017

Activating the "Breakfast Club": Modeling Influence Spread in Natural-World Social Networks.
CoRR, 2017

The Curse of Correlation in Security Games and Principle of Max-Entropy.
CoRR, 2017

Keeping it Real: Using Real-World Problems to Teach AI to Diverse Audiences.
AI Mag., 2017

PAWS - A Deployed Game-Theoretic Application to Combat Poaching.
AI Mag., 2017

Every team deserves a second chance: an extended study on predicting team performance.
Auton. Agents Multi Agent Syst., 2017

Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Explanation Systems for Influence Maximization Algorithms.
Proceedings of the 3rd International Workshop on Social Influence Analysis co-located with 26th International Joint Conference on Artificial Intelligence (IJCAI 2017), 2017

Maximizing Awareness about HIV in Social Networks of Homeless Youth with Limited Information.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Influence Maximization with an Unknown Network by Exploiting Community Structure.
Proceedings of the 3rd International Workshop on Social Influence Analysis co-located with 26th International Joint Conference on Artificial Intelligence (IJCAI 2017), 2017

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Staying Ahead of the Game: Adaptive Robust Optimization for Dynamic Allocation of Threat Screening Resources.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Optimal Patrol Planning for Green Security Games with Black-Box Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

VIOLA: Video Labeling Application for Security Domains.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Influence Maximization in the Field: The Arduous Journey from Emerging to Deployed Application.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Uncharted but not Uninfluenced: Influence Maximization with an Uncertain Network.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Evidence From the Past: AI Decision Aids to Improve Housing Systems for Homeless Youth.
Proceedings of the 2017 AAAI Fall Symposia, Arlington, Virginia, USA, November 9-11, 2017, 2017

2016
Keeping Pace with Criminals: An Extended Study of Designing Patrol Allocation against Adaptive Opportunistic Criminals.
Games, 2016

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty - An Extended Version.
CoRR, 2016

Pilot Testing an Artificial Intelligence Algorithm That Selects Homeless Youth Peer Leaders Who Promote HIV Testing.
CoRR, 2016

PSINET: Assisting HIV Prevention Amongst Homeless Youth by Planning Ahead.
AI Mag., 2016

Comparing human behavior models in repeated Stackelberg security games: An extended study.
Artif. Intell., 2016

Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

Addressing Behavioral Uncertainty in Security Games: An Efficient Robust Strategic Solution for Defender Patrols.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Three Strategies to Success: Learning Adversary Models in Security Games.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Divide to Defend: Collusive Security Games.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Toward Addressing Collusion Among Human Adversaries in Security Games.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Know Your Adversary: Insights for a Better Adversarial Behavioral Model.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

Using Abstractions to Solve Opportunistic Crime Security Games at Scale.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

HEALER: POMDP Planning for Scheduling Interventions among Homeless Youth (Demonstration).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Using Social Networks to Aid Homeless Shelters: Dynamic Influence Maximization under Uncertainty.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

POMDPs for Assisting Homeless Shelters - Computational and Deployment Challenges.
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016

Signaling in Bayesian Stackelberg Games.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Learning Adversary Behavior in Security Games: A PAC Model Perspective.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Restless Poachers: Handling Exploration-Exploitation Tradeoffs in Security Domains.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

Simultaneous Influencing and Mapping Social Networks: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

SPECTRE: A Game Theoretic Framework for Preventing Collusion in Security Games (Demonstration).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

From the Lab to the Classroom and Beyond: Extending a Game-Based Research Platform for Teaching AI to Diverse Audiences.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Conquering Adversary Behavioral Uncertainty in Security Games: An Efficient Modeling Robust Based Algorithm.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Protecting Wildlife under Imperfect Observation.
Proceedings of the Computer Poker and Imperfect Information Games, 2016

Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Simultaneous Influencing and Mapping for Health Interventions.
Proceedings of the Expanding the Boundaries of Health Informatics Using AI, 2016

Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Deploying PAWS to Combat Poaching: Game-Theoretic Patrolling in Areas with Complex Terrain (Demonstration).
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs.
Multiagent Grid Syst., 2015

From physical security to cybersecurity.
J. Cybersecur., 2015

Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system.
Auton. Agents Multi Agent Syst., 2015

Security Games with Information Leakage: Modeling and Computation.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Keeping Pace with Criminals: Designing Patrol Allocation Against Adaptive Opportunistic Criminals.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Learning, Predicting and Planning against Crime: Demonstration Based on Real Urban Crime Data (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Robust Strategy against Unknown Risk-averse Attackers in Security Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

A Unifying Methodology for Confronting Uncertainties in Security Games: Advances and Algorithms: (Doctoral Consortium).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Every Team Deserves a Second Chance: Identifying when Things Go Wrong.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Multi-agent Team Formation for Design Problems.
Proceedings of the Coordination, Organizations, Institutions, and Normes in Agent Systems XI, 2015

Three Fundamental Pillars of Multi-agent Team Formation.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Every Team Deserves a Second Chance: An Interactive 9x9 Go Experience (Demonstration).
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

"A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Defender Strategies In Domains Involving Frequent Adversary Interaction.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Preventing HIV Spread in Homeless Populations Using PSINET.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Exploring Information Asymmetry in Two-Stage Security Games.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Every Team Makes Mistakes: An Initial Report on Predicting Failure in Teamwork.
Proceedings of the Learning for General Competency in Video Games, 2015

Every Team Deserves a Second Chance: Identifying When Things Go Wrong (Student Abstract Version).
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Agents Vote for the Environment: Designing Energy-Efficient Architecture.
Proceedings of the Computational Sustainability, 2015

Effectiveness of Probability Perception Modeling and Defender Strategy Generation Algorithms in Repeated Stackelberg Games: An Initial Report.
Proceedings of the Computational Sustainability, 2015

Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Computational Game Theory for Security and Sustainability.
J. Inf. Process., 2014

Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System.
J. Artif. Intell. Res., 2014

Game-Theoretic Target Selection in Contagion-Based Domains.
Comput. J., 2014

TESLA: an extended study of an energy-saving agent that leverages schedule flexibility.
Auton. Agents Multi Agent Syst., 2014

An extended study on multi-objective security games.
Auton. Agents Multi Agent Syst., 2014

Diverse Randomized Agents Vote to Win.
Proceedings of the Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, 2014

Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

Unleashing Dec-MDPs in Security Games: Enabling Effective Defender Teamwork.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

Security Games in the Field: Deployments on a Transit System.
Proceedings of the Engineering Multi-Agent Systems - Second International Workshop, 2014

Towards a game theoretic approach for defending against crime diffusion.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Adaptive resource allocation for wildlife protection against illegal poachers.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Online planning for optimal protector strategies in resource conservation games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

The Power of Teams that Disagree: Team Formation in Large Action Spaces.
Proceedings of the Coordination, Organizations, Institutions, and Norms in Agent Systems X, 2014

Building THINC: user incentivization and meeting rescheduling for energy savings.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

PAWS: adaptive game-theoretic patrolling for wildlife protection.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Security games in the field: an initial study on a transit system.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games.
Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Give a Hard Problem to a Diverse Team: Exploring Large Action Spaces.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

Aggregating Opinions to Design Energy-Efficient Buildings.
Proceedings of the Multidisciplinary Workshop on Advances in Preference Handling, 2014

Robust Protection of Fisheries with COmPASS.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

STREETS: Game-Theoretic Traffic Patrolling with Exploration and Exploitation.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Security Games Applied to Real-World: Research Contributions and Challenges.
Proceedings of the Moving Target Defense II, 2013

Planning and learning in security games.
SIGecom Exch., 2013

Protecting Moving Targets with Multiple Mobile Resources.
J. Artif. Intell. Res., 2013

A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard.
Interfaces, 2013

Improving resource allocation strategies against human adversaries in security games: An extended study.
Artif. Intell., 2013

Mitigating multi-path fading in a mobile mesh network.
Ad Hoc Networks, 2013

Empirical evaluation of computational fear contagion models in crowd dispersions.
Auton. Agents Multi Agent Syst., 2013

Bayesian Security Games for Controlling Contagion.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Randomizing regression tests using game theory.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach.
Proceedings of the IJCAI 2013, 2013

Efficiently Solving Joint Activity Based Security Games.
Proceedings of the IJCAI 2013, 2013

Multi-Agent Team Formation: Diversity Beats Strength?
Proceedings of the IJCAI 2013, 2013

Defender (Mis)coordination in Security Games.
Proceedings of the IJCAI 2013, 2013

Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Engineering the Decentralized Coordination of UAVs with Limited Communication Range.
Proceedings of the Advances in Artificial Intelligence, 2013

Security games with contagion: handling asymmetric information.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Modeling human adversary decision making in security games: an initial report.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

A Detailed Analysis of a Multi-agent Diverse Team.
Proceedings of the Coordination, Organizations, Institutions, and Norms in Agent Systems IX, 2013

Diversity beats strength?: a hands-on experience with 9x9 go.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Game-theoretic patrol strategies for transit systems: the TRUSTS system and its mobile app.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

TESLA: an energy-saving agent that leverages schedule flexibility.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Game-theoretic randomization for security patrolling with dynamic execution uncertainty.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security scheduling for real-world networks.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Optimal patrol strategy for protecting moving targets with multiple mobile resources.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security games with surveillance cost and optimal timing of attack execution.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Modeling Crime Diffusion and Crime Suppression on Transportation Networks: An Initial Report.
Proceedings of the 2013 AAAI Fall Symposia, Arlington, Virginia, USA, November 15-17, 2013, 2013

Analyzing the Effectiveness of Adversary Modeling in Security Games.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory.
AI Mag., 2012

An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety.
AI Mag., 2012

PROTECT - A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard.
AI Mag., 2012

Reports of the AAAI 2012 Spring Symposia.
AI Mag., 2012

A Study of Emotional Contagion with Virtual Characters.
Proceedings of the Intelligent Virtual Agents - 12th International Conference, 2012

TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems.
Proceedings of the Twenty-Fourth Conference on Innovative Applications of Artificial Intelligence, 2012

A Robust Approach to Addressing Human Adversaries in Security Games.
Proceedings of the ECAI 2012, 2012

Game theory for security: Key algorithmic principles, deployed systems, lessons learned.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Computing optimal strategy against quantal response in security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Designing better strategies against human adversaries in network security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Adversarial patrolling games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Game-theoretic resource allocation for malicious packet detection in computer networks.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Emotional contagion with virtual characters.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

PROTECT: a deployed game theoretic system to protect the ports of the United States.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

A robust approach to addressing human adversaries in security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Sustainable multiagent application to conserve energy (demonstration).
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

SAVES: a sustainable multiagent application to conserve building energy considering occupants.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Detection of suspicious behavior from a sparse set of multiagent interactions.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

AgentPolis: towards a platform for fully agent-based modeling of multi-modal transportation (demonstration).
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Multi-objective optimization for security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond.
Proceedings of the Game Theory for Security, 2012

Getting Started on a Real-World Challenge Problem in Computational Game Theory and Beyond.
Proceedings of the AI, 2012

Challenges in Patrolling to Maximize Pristine Forest Area (Position Paper).
Proceedings of the Game Theory for Security, 2012

Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems.
Proceedings of the Game Theory for Security, 2012

A Study of Phase Transitions in Security Games.
Proceedings of the Game Theory for Security, 2012

Security Games with Limited Surveillance: An Initial Report.
Proceedings of the Game Theory for Security, 2012

Analysis of Heuristic Techniques for Controlling Contagion.
Proceedings of the Social Networks and Social Contagion, 2012

Security Games on Social Networks.
Proceedings of the Social Networks and Social Contagion, 2012

Security Games for Controlling Contagion.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Patrol Strategies to Maximize Pristine Forest Area.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

The Deployment-to-Saturation Ratio in Security Games.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Security Games with Limited Surveillance.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned.
Cambridge University Press, ISBN: 978-1-10-709642-4, 2012

2011
GUARDS and PROTECT: next generation applications of security games.
SIGecom Exch., 2011

Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness.
J. Artif. Intell. Res., 2011

A probabilistic risk analysis for multimodal entry control.
Expert Syst. Appl., 2011

Distributed on-Line Multi-Agent Optimization under Uncertainty: Balancing Exploration and Exploitation.
Adv. Complex Syst., 2011

Game Theory for Security: Lessons Learned from Deployed Applications.
Proceedings of the Agents in Principle, Agents in Practice - 14th International Conference, 2011

Empirical Evaluation of Computational Emotional Contagion Models.
Proceedings of the Intelligent Virtual Agents - 11th International Conference, 2011

Continuous Time Planning for Multiagent Teams with Temporal Constraints.
Proceedings of the IJCAI 2011, 2011

Improving Resource Allocation Strategy against Human Adversaries in Security Games.
Proceedings of the IJCAI 2011, 2011

GUARDS - Innovative Application of Game Theory for National Airport Security.
Proceedings of the IJCAI 2011, 2011

Towards Addressing Model Uncertainty: Robust Execution-Time Coordination for Teamwork.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011

Game Theory for Security: An Important Challenge for Multiagent Systems.
Proceedings of the Multi-Agent Systems - 9th European Workshop, 2011

Improved computational models of human behavior in security games.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Quality guarantees for region optimal DCOP algorithms.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

GUARDS: game theoretic security allocation on a national scale.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Teamwork in distributed POMDPs: execution-time coordination under model uncertainty.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

A double oracle algorithm for zero-sum security games on graphs.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Game Theory and Human Behavior: Challenges in Security and Sustainability.
Proceedings of the Algorithmic Decision Theory - Second International Conference, 2011

Mixed-Initiative Optimization in Security Games: A Preliminary Report.
Proceedings of the Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, 2011

Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

Toward Addressing Human Behavior with Observational Uncertainty in Security Games.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

Towards Detection of Suspicious Behavior from Multiple Observations.
Proceedings of the Plan, Activity, and Intent Recognition, 2011

Addressing Execution and Observation Error in Security Games.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

Refinement of Strong Stackelberg Equilibria in Security Games.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Introducing communication in Dis-POMDPs with locality of interaction.
Web Intell. Agent Syst., 2010

Balancing local resources and global goals in multiply-constrained DCOP.
Multiagent Grid Syst., 2010

Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service.
Interfaces, 2010

A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?
Informatica (Slovenia), 2010

Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition.
Artif. Intell., 2010

Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract).
Proceedings of the Decision and Game Theory for Security, 2010

Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

How to protect a city: strategic security placement in graph-based domains.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

When should there be a "Me" in "Team"?: distributed multi-agent optimization under uncertainty.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Asynchronous algorithms for approximate distributed constraint optimization with quality bounds.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Robust Bayesian methods for Stackelberg security games.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Urban Security: Game-Theoretic Resource Allocation in Networked Domains.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Teamwork and Coordination under Model Uncertainty in DEC-POMDPs.
Proceedings of the Interactive Decision Theory and Game Theory, 2010

Security Games with Arbitrary Schedules: A Branch and Price Approach.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
Safety in the Context of Coordination via Adjustable Autonomy.
Proceedings of the Safety and Security in Multiagent Systems, 2009

Coordinating Randomized Policies for Increasing Security in Multiagent Systems.
Proceedings of the Safety and Security in Multiagent Systems, 2009

Analyzing Dangers in Multiagent Rescue Using DEFACTO.
Proceedings of the Safety and Security in Multiagent Systems, 2009

Security applications: lessons of real-world deployment.
SIGecom Exch., 2009

Coordinating randomized policies for increasing security of agent systems.
Inf. Technol. Manag., 2009

Using Game Theory for Los Angeles Airport Security.
AI Mag., 2009

DCOPs Meet the Real World: Exploring Unknown Reward Matrices with Applications to Mobile Sensor Networks.
Proceedings of the IJCAI 2009, 2009

Improving adjustable autonomy strategies for time-critical domains.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Planning with continuous resources for agent teams.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Computing optimal randomized resource allocations for massive security games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Sensitivity analysis for distributed optimization with resource constraints.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Exploiting Coordination Locales in Distributed POMDPs via Social Model Shaping.
Proceedings of the 19th International Conference on Automated Planning and Scheduling, 2009

2008
Bayesian stackelberg games and their application for security at Los Angeles international airport.
SIGecom Exch., 2008

Electric Elves: What Went Wrong and Why.
AI Mag., 2008

Solving Multiagent Networks using Distributed Constraint Optimization.
AI Mag., 2008

Multiagent Adjustable Autonomy Framework (MAAF) for multi-robot, multi-human teams.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

RIAACT: a robust approach to adjustable autonomy for human-multiagent teams.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Not all agents are equal: scaling up distributed POMDPs for agent networks.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

On <i>k</i>-optimal distributed constraint optimization algorithms: new bounds and algorithms.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Using Science Fiction in Teaching Artificial Intelligence.
Proceedings of the Using AI to Motivate Greater Participation in Computer Science, 2008

ARMOR Security for Los Angeles International Airport.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

Towards Faster Planning with Continuous Resources in Stochastic Domains.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
An Intelligent Personal Assistant for Task and Time Management.
AI Mag., 2007

Towards Efficient Computation of Error Bounded Solutions in POMDPs: Expected Value Approximation and Dynamic Disjunctive Beliefs.
Proceedings of the IJCAI 2007, 2007

Quality Guarantees on k-Optimal Solutions for Distributed Constraint Optimization Problems.
Proceedings of the IJCAI 2007, 2007

A Fast Analytical Algorithm for Solving Markov Decision Processes with Real-Valued Resources.
Proceedings of the IJCAI 2007, 2007

Letting loose a SPIDER on a network of POMDPs: generating quality guaranteed policies.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

An efficient heuristic approach for security against multiple adversaries.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

On opportunistic techniques for solving decentralized Markov decision processes with temporal constraints.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Demonstration of teamwork in uncertain domains using hybrid BDI-POMDP systems.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

SPIDER Attack on a Network of POMDPs: Towards Quality Bounded Solutions.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007

An Efficient Heuristic for Security against Multiple Adversaries in Stackelberg Games.
Proceedings of the Game Theoretic and Decision Theoretic Agents, 2007

2006
Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications.
Auton. Agents Multi Agent Syst., 2006

Asimovian Multiagents: Applying Laws of Robotics to Teams of Humans and Agents.
Proceedings of the Programming Multi-Agent Systems, 4th International Workshop, 2006

Solution Sets for DCOPs and Graphical Games: Metrics and Bounds.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2006

Security in Multiagent Systems by Policy Randomization.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2006

Winning back the CUP for distributed POMDPs: planning over continuous belief spaces.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Using multiagent teams to improve the training of incident commanders.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Solution sets for DCOPs and graphical games.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Experimental analysis of privacy loss in DCOP algorithms.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Multiply-constrained distributed constraint optimization.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Conflict negotiation among personal calendar agents.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Electric Elves: What Went Wrong and Why.
Proceedings of the What Went Wrong and Why: Lessons from AI Research and Applications, 2006

Exploiting Locality of Interaction in Networked Distributed POMDPs.
Proceedings of the Distributed Plan and Schedule Management, 2006

Cooperative Team Plan: Planning, Execution, and Replanning.
Proceedings of the Distributed Plan and Schedule Management, 2006

Analysis of Privacy Loss in Distributed Constraint Optimization.
Proceedings of the Proceedings, 2006

Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System.
Proceedings of the Emergent Information Technologies and Enabling Policies for Counter-Terrorism, 2006

2005
Towards flexible coordination of human-agent teams.
Multiagent Grid Syst., 2005

Hybrid BDI-POMDP Framework for Multiagent Teaming.
J. Artif. Intell. Res., 2005

Research Directions for Service-Oriented Multiagent Systems.
IEEE Internet Comput., 2005

Adopt: asynchronous distributed constraint optimization with quality guarantees.
Artif. Intell., 2005

Implementation Techniques for Solving POMDPs in Personal Assistant Agents.
Proceedings of the Programming Multi-Agent Systems, 2005

Networked Distributed POMDPs: A Synergy of Distributed Constraint Optimization and POMDPs.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

On Communication in Solving Distributed Constraint Satisfaction Problems.
Proceedings of the Multi-Agent Systems and Applications IV, 2005

Exploiting belief bounds: practical POMDPs for personal assistant agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Conflicts in teamwork: hybrids to the rescue.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Demonstration of DEFACTO: training tool for incident commanders.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

The DEFACTO system for human omnipresence to coordinate agent teams: the future of disaster response.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Allocating tasks in extreme teams.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

How local is that optimum? <i>k</i>-optimality for DCOP.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Preprocessing techniques for accelerating the DCOP algorithm ADOPT.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Practical POMDPs for Personal Assistant Domains.
Proceedings of the Persistent Assistants: Living and Working with AI, 2005

The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO.
Proceedings of the AI Technologies for Homeland Security, 2005

Valuations of Possible States (VPS): A Quantitative Framework for Analysis of Privacy Loss Among Collaborative Personal Assistant Agents.
Proceedings of the Persistent Assistants: Living and Working with AI, 2005

Optimize My Schedule but Keep It Flexible: Distributed Multi-Criteria Coordination for Personal Assistants.
Proceedings of the Persistent Assistants: Living and Working with AI, 2005

The DEFACTO System: Training Tool for Incident Commanders.
Proceedings of the Proceedings, 2005

Networked Distributed POMDPs: A Synthesis of Distributed Constraint Optimization and POMDPs.
Proceedings of the Proceedings, 2005

The DEFACTO System: Coordinating Human-Agent Teams for the Future of Disaster Response.
Proceedings of the Multi-Agent Programming: Languages, Platforms and Applications, 2005

The Role of Emotions in Multiagent Teamwork.
Proceedings of the Who Needs Emotions? - The brain meets the robot, 2005

2004
Automated Assistants for Analyzing Team Behaviors.
Auton. Agents Multi Agent Syst., 2004

Token Approach for Role Allocation in Extreme Teams: Analysis and Experimental Evaluation.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Coordinating Teams in Uncertain Environments: A Hybrid BDI-POMDP Approach.
Proceedings of the Programming Multi-Agent Systems, 2004

Preprocessing Techniques for Distributed Constraint Optimization.
Proceedings of the Principles and Practice of Constraint Programming, 2004

Allocating Roles in Extreme Teams.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Towards a Formalization of Teamwork with Resource Constraints.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Communication for Improving Policy Computation in Distributed POMDPs.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

On Communication in Distributed Constraint Satisfaction.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

Distributed Algorithms for DCOP: A Graphical-Game-Based Approach.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
An Automated Teamwork Infrastructure for Heterogeneous Software Agents and Humans.
Auton. Agents Multi Agent Syst., 2003

Are Multiagent Algorithms Relevant for Real Hardware? A Case Study of Distributed Constraint Algorithms.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Team Oriented Programming and Proxy Agents: The Next Generation.
Proceedings of the Programming Multi-Agent Systems, First International Workshop, 2003

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings.
Proceedings of the IJCAI-03, 2003

A prototype infrastructure for distributed robot-agent-person teams.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Role allocation and reallocation in multiagent teams: towards a practical analysis.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

An asynchronous complete method for distributed constraint optimization.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Adjustable Autonomy Challenges in Personal Assistant Agents: A Position Paper.
Proceedings of the Agents and Computational Autonomy - Potential, Risks, and Solutions - Postproceedings of the 1st International Workshop on Computational Autonomy, 2003

Performance models for large scale multiagent systems: using distributed POMDP building blocks.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

2002
Towards Adjustable Autonomy for the Real World.
J. Artif. Intell. Res., 2002

The Communicative Multiagent Team Decision Problem: Analyzing Teamwork Theories and Models.
J. Artif. Intell. Res., 2002

Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach.
J. Artif. Intell. Res., 2002

Special Issue on Constraint Agents.
Constraints An Int. J., 2002

Electric Elves: Agent Technology for Supporting Human Organizations.
AI Mag., 2002

Editorial.
Artif. Intell., 2002

Team Formation for Reformation in Multiagent Domains Like RoboCupRescue.
Proceedings of the RoboCup 2002: Robot Soccer World Cup VI, 2002

Computational Models for Multiagent Coordination Analysis: Extending Distributed POMDP Models.
Proceedings of the Formal Approaches to Agent-Based Systems, Second International Workshop, 2002

Why the elf acted autonomously: towards a theory of adjustable autonomy.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

Multiagent teamwork: analyzing the optimality and complexity of key theories and models.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

2001
Experiences Acquired in the Design of RoboCup Teams: A Comparison of Two Fielded Teams.
Auton. Agents Multi Agent Syst., 2001

Task Allocation in the RoboCup Rescue Simulation Domain: A Short Note.
Proceedings of the RoboCup 2001: Robot Soccer World Cup V, 2001

Electric Elves: Applying Agent Technology to Support Human Organizations.
Proceedings of the Thirteenth Innovative Applications of Artificial Intelligence Conference, 2001

Towards Heterogeneous Agent Teams.
Proceedings of the Multi-Agent Systems and Applications, 2001

A Dynamic Distributed Constraint Satisfaction Approach to Resource Allocation.
Proceedings of the Principles and Practice of Constraint Programming, 2001

Revisiting Asimov's First Law: A Response to the Call to Arms.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

Dynamic Distributed Resource Allocation: A Distributed Constraint Satisfaction Approach.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

Introduction.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

Adjustable autonomy in real-world multi-agent environments.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

Monitoring deployed agent teams.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

Argumentation as distributed constraint satisfaction: applications and results.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

2000
Robust Agent Teams via Socially-Attentive Monitoring.
J. Artif. Intell. Res., 2000

Building Dynamic Agent Organizations in Cyberspace.
IEEE Internet Comput., 2000

Agent Assistants for Team Analysis.
AI Mag., 2000

Overview of RoboCup-98.
AI Mag., 2000

Towards Flexible Teamwork in Persistent Teams: Extended Report.
Auton. Agents Multi Agent Syst., 2000

Towards Large-Scale Conflict Resolution: Initial Results.
Proceedings of the 4th International Conference on Multi-Agent Systems, 2000

Adjustable Autonomy: A Response.
Proceedings of the Intelligent Agents VII. Agent Theories Architectures and Languages, 2000

Automated assistants to aid humans in understanding team behaviors.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

Adaptive Infrastructures for Agent Integration.
Proceedings of the Infrastructure for Agents, 2000

Building dynamic organizations of distributed, heterogenous agents.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

1999
The Benefits of Arguing in a Team.
AI Mag., 1999

Building Agent Teams Using an Explicit Teamwork Model and Learning.
Artif. Intell., 1999

Two Fielded Teams and Two Experts: A RoboCup Challenge Response from the Trenches.
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999

Toward Team-Oriented Programming.
Proceedings of the Intelligent Agents VI, 1999

Towards Flexible Negotiation in Teamwork.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999

On Being a Teammate: Experiences Acquired in the design of RoboCup Teams.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999

I'm OK, you're OK, we're OK: Experiments in Distributed and Centralized Socially Attentive Monitoring.
Proceedings of the Third Annual Conference on Autonomous Agents, 1999

Automated Team Analysis.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1998
Adaptive agent tracking in real-world multiagent domains: a preliminary report.
Int. J. Hum. Comput. Stud., 1998

ISIS: An Explicit Model of Teamwork at RobotCup-97.
AI Mag., 1998

Implementing Agent Teams in Dynamic Multiagent Environments.
Appl. Artif. Intell., 1998

Using an Explicit Teamwork Model and Learning in RoboCup: An Extended Abstract.
Proceedings of the RoboCup-98: Robot Soccer World Cup II, 1998

Towards Flexible Teamwork in Persistent Teams.
Proceedings of the Third International Conference on Multiagent Systems, 1998

The Belief-Desire-Intention Model of Agency.
Proceedings of the Intelligent Agents V, 1998

A Synergy of Agent Components: Social Comparison for Failure Detection.
Proceedings of the Second International Conference on Autonomous Agents, 1998

What Is Wrong With Us? Improving Robustness Through Social Diagnosis.
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998

1997
Towards Flexible Teamwork.
J. Artif. Intell. Res., 1997

AAAI-96 Workshop on Agent Modeling (Workshop Report).
AI Mag., 1997

Using an Explicit Model of Teamwork in RoboCup-97.
Proceedings of the RoboCup-97: Robot Soccer World Cup I, 1997

The RoboCup Synthetic Agent Challenge 97.
Proceedings of the RoboCup-97: Robot Soccer World Cup I, 1997

Social Comparison for Failure Detection and Recovery.
Proceedings of the Intelligent Agents IV, 1997

Agent Architectures for Flexible, Practical Teamwork.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

Social Comparison for Failure Detection and Recovery in Multi-Agent Settings.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

Efficient Production Match Algorithm and Its Implication for Dynamic Constraint Satisfaction Problems.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

1996
Event Tracking in a Dynamic Multiagent Environment.
Comput. Intell., 1996

Some Challenges in Tracking Agent Teams.
Proceedings of the Agent Modeling, Papers from the 1996 AAAI Workshop, 1996

Tracking Dynamic Team Activity.
Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, 1996

1995
Intelligent Agents for Interactive Simulation Environments.
AI Mag., 1995

RESC: An Approach for Real-time, Dynamic Agent Tracking.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

Recursive Agent and Agent-Group Tracking in a Real-Time Dynamic Environment.
Proceedings of the First International Conference on Multiagent Systems, 1995

Agent Theories, Architectures, and Languages: A Bibliography.
Proceedings of the Intelligent Agents II, 1995

Architectures for Agents that Track Other Agents in Multi-Agent Worlds.
Proceedings of the Intelligent Agents II, 1995

1994
Investigating Production System Representations for Non-Combinatorial Match.
Artif. Intell., 1994

Event Tracking for an Intelligent Automated Agent.
Proceedings of the TIME-94 International Workshop on Temporal Reasoning, 1994

1993
Collection Oriented Match.
Proceedings of the CIKM 93, 1993

On the Masking Effect.
Proceedings of the 11th National Conference on Artificial Intelligence. Washington, 1993

1992
Implementation of Production Systems on Message-Passing Computers.
IEEE Trans. Parallel Distributed Syst., 1992

Workshop Report: Advances in Interfacing Production Systems with the Real World.
AI Mag., 1992

An Efficient Algorithm for Production Systems with Linear-Time Match.
Proceedings of the Fourth International Conference on Tools with Artificial Intelligence, 1992

Is Production System Match Interesting?
Proceedings of the Fourth International Conference on Tools with Artificial Intelligence, 1992

Learning 10, 000 Chunks: What's It Like Out There?
Proceedings of the 10th National Conference on Artificial Intelligence, 1992

1991
The Effectiveness of Task-Level Parallelism for Production Systems.
J. Parallel Distributed Comput., 1991

1990
The Problem of Expensive Chunks and its Solution by Restricting Expressiveness.
Mach. Learn., 1990

The Effectiveness of Task-Level Parallelism for High-Level Vision.
Proceedings of the Second ACM SIGPLAN Symposium on Princiles & Practice of Parallel Programming (PPOPP), 1990

A Frameworkfor Investigating Production System Formulations with Polynomially Bounded Match.
Proceedings of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts, USA, July 29, 1990

1989
Eliminating Expensive Chunks by Restricting Expressiveness.
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989

Production Systems on Message Passing Computers: Simulation Results and Analysis.
Proceedings of the International Conference on Parallel Processing, 1989

1988
Parallel implementation of OPS5 on the encore multiprocessor: Results and analysis.
Int. J. Parallel Program., 1988

Soar/PSM-E: Investigating Match Parallelism in a Learning Production System.
Proceedings of the ACM/SIGPLAN PPEALS 1988, 1988

Parallel OPS5 on the Encore Multimax.
Proceedings of the International Conference on Parallel Processing, 1988

Some Chunks Are Expensive.
Proceedings of the Machine Learning, 1988

Suitability of Message Passing Computers for Implementing Production Systems.
Proceedings of the 7th National Conference on Artificial Intelligence, 1988


  Loading...