Computing Game-Theoretic Solutions and Applications to Security

3Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorithms must be designed to compute the solutions that game theory prescribes. In this paper, I summarize some of the state of the art on this topic, focusing particularly on how this line of work has contributed to several highly visible deployed security applications, developed at the University of Southern California.

Cite

CITATION STYLE

APA

Conitzer, V. (2012). Computing Game-Theoretic Solutions and Applications to Security. In Proceedings of the 26th AAAI Conference on Artificial Intelligence, AAAI 2012 (pp. 2106–2112). AAAI Press. https://doi.org/10.1609/aaai.v26i1.8446

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free