Bo An
TitelGeciteerd doorJaar
Protect: A deployed game theoretic system to protect the ports of the united states
E Shieh, B An, R Yang, M Tambe, C Baldwin, J DiRenzo, B Maule, ...
Proceedings of the 11th International Conference on Autonomous Agents and …, 2012
2542012
Automated negotiation with decommitment for dynamic resource allocation in cloud computing.
B An, VR Lesser, DE Irwin, M Zink
AAMAS 10, 981-988, 2010
2252010
Optimal electric vehicle fast charging station placement based on game theoretical framework
Y Xiong, J Gan, B An, C Miao, ALC Bazzan
IEEE Transactions on Intelligent Transportation Systems 19 (8), 2493-2504, 2017
852017
Deploying PAWS: Field optimization of the protection assistant for wildlife security
F Fang, TH Nguyen, R Pickles, WY Lam, GR Clements, B An, A Singh, ...
Twenty-Eighth IAAI Conference, 2016
762016
Poi2vec: Geographical latent representation for predicting future visitors
S Feng, G Cong, B An, YM Chee
Thirty-First AAAI Conference on Artificial Intelligence, 2017
752017
Strategic agents for multi-resource negotiation
B An, V Lesser, KM Sim
Autonomous Agents and Multi-Agent Systems 23 (1), 114-153, 2011
722011
Guards and protect: Next generation applications of security games
B An, J Pita, E Shieh, M Tambe, C Kiekintveld, J Marecki
ACM SIGecom Exchanges 10 (1), 31-34, 2011
722011
Security games with limited surveillance
B An, D Kempe, C Kiekintveld, E Shieh, S Singh, M Tambe, ...
Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
632012
Refinement of strong Stackelberg equilibria in security games
B An, M Tambe, F Ordonez, E Shieh, C Kiekintveld
Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
612011
A reputation-aware decision-making approach for improving the efficiency of crowdsourcing systems.
H Yu, Z Shen, C Miao, B An
AAMAS 13, 1315-1316, 2013
582013
Security games with surveillance cost and optimal timing of attack execution.
B An, M Brown, Y Vorobeychik, M Tambe
AAMAS, 223-230, 2013
572013
Challenges and opportunities for trust management in crowdsourcing
H Yu, Z Shen, C Miao, B An
2012 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2012
562012
An application of automated negotiation to distributed task allocation
M Krainin, B An, V Lesser
2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2007
522007
Computing solutions in infinite-horizon discounted adversarial patrolling games
Y Vorobeychik, B An, M Tambe, S Singh
Twenty-Fourth International Conference on Automated Planning and Scheduling, 2014
502014
Continuous-time negotiation mechanism for software agents
B An, KM Sim, LG Tang, SQ Li, DJ Cheng
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 36 …, 2006
502006
A reputation management approach for resource constrained trustee agents
H Yu, C Miao, B An, C Leung, VR Lesser
Twenty-Third International Joint Conference on Artificial Intelligence, 2013
462013
PROTECT: An application of computational game theory for the security of the ports of the United States
EA Shieh, B An, R Yang, M Tambe, C Baldwin, J DiRenzo, B Maule, ...
Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
452012
Regret-based optimization and preference elicitation for Stackelberg security games with uncertainty
TH Nguyen, A Yadav, B An, M Tambe, C Boutilier
Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
442014
Security games with protection externalities
J Gan, B An, Y Vorobeychik
Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
402015
Game-theoretic resource allocation for protecting large public events
Y Yin, B An, M Jain
Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
392014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20