Login / Signup
Security Games with Multiple Attacker Resources.
Dmytro Korzhyk
Vincent Conitzer
Ronald Parr
Published in:
IJCAI (2011)
Keyphrases
</>
resource allocation
resource constraints
website
resource management
limited resources
mobile robot
web applications
computing resources