Login / Signup

Security Games with Multiple Attacker Resources.

Dmytro KorzhykVincent ConitzerRonald Parr
Published in: IJCAI (2011)
Keyphrases
  • resource allocation
  • resource constraints
  • website
  • resource management
  • limited resources
  • mobile robot
  • web applications
  • computing resources