Login / Signup
Extending Security Games to Defenders with Constrained Mobility.
Ondrej Vanek
Branislav Bosanský
Michal Jakob
Viliam Lisý
Michal Pechoucek
Published in:
AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health (2012)
Keyphrases
</>
mobile users
mobile networks
network configuration
real time
computer vision
feature selection
multimedia
case study
image segmentation
three dimensional
video sequences
mobile agents
mobility patterns