Login / Signup
A robust approach to addressing human adversaries in security games.
James Pita
Richard John
Rajiv T. Maheswaran
Milind Tambe
Rong Yang
Sarit Kraus
Published in:
AAMAS (2012)
Keyphrases
</>
computationally efficient
real world
genetic algorithm
artificial intelligence
information systems
databases
neural network
information retrieval
case study
three dimensional
human computer interaction
human experts
human subjects
bounded rationality