Computing Game-Theoretic Solutions and Applications to Security

Abstract

The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorithms must be designed to compute the solutions that game theory prescribes. In this paper, I summarize some of the state of the art on this topic, focusing particularly on how this line of work has contributed to several highly visible deployed security applications, developed at the University of Southern California.

Cite

Text

Conitzer. "Computing Game-Theoretic Solutions and Applications to Security." AAAI Conference on Artificial Intelligence, 2012. doi:10.1609/AAAI.V26I1.8446

Markdown

[Conitzer. "Computing Game-Theoretic Solutions and Applications to Security." AAAI Conference on Artificial Intelligence, 2012.](https://mlanthology.org/aaai/2012/conitzer2012aaai-computing/) doi:10.1609/AAAI.V26I1.8446

BibTeX

@inproceedings{conitzer2012aaai-computing,
  title     = {{Computing Game-Theoretic Solutions and Applications to Security}},
  author    = {Conitzer, Vincent},
  booktitle = {AAAI Conference on Artificial Intelligence},
  year      = {2012},
  pages     = {2106-2112},
  doi       = {10.1609/AAAI.V26I1.8446},
  url       = {https://mlanthology.org/aaai/2012/conitzer2012aaai-computing/}
}