Milind Tambe on game theory in security applications | Machine Intelligence Research Institute
نویسنده
چکیده
Milind Tambe (http://teamcore.usc.edu/tambe/) is Helen N. and Emmett H. Jones Professor in Engineering at the University of Southern California (http://www.usc.edu/) (USC). He is a fellow of AAAI (http://www.aaai.org/) (Association for Advancement of Artificial Intelligence) and ACM (http://www.acm.org/) (Association for Computing Machinery), as well as recipient of the ACM/SIGART Autonomous Agents Research Award (http://sigai.acm.org/awards /autonomous_agents_award.html), Christopher Columbus Fellowship Foundation Homeland security award (http://www.ccolumbusfoundationawards.org/homeland/past.cfm), the INFORMS Wagner prize for excellence in Operations Research Practice (https://www.informs.org/Recognize-Excellence/Award-Recipients /Milind-Tambe), the Rist Prize of the Military Operations Research Society (http://create.usc.edu/2011/08/create_reserachers_awarded_the.html), IBM Faculty Award (http://www.okawa-foundation.or.jp/en/activities /research_grant/index.html), Okawa Foundation Faculty Research Award, RoboCup scientific challenge award, USC Associates Award for Creativity in Research (https://research.usc.edu/associates-award-previousrecipients/) and USC Viterbi School of Engineering use-inspired research award (http://viterbi.usc.edu/academics/awards/viterbi-school-awards /vsoe_research_award.htm).
منابع مشابه
Tambe , Developing the Science and Applications of Security Games : Machine Learning , Uncertainty and Preference Elicitation in Game Theory for Security
Having successfully founded the research area of security games, which has led to real-world applications in scheduling the deployment of limited resources (patrols, checkpoints, inspections, etc.), we now provide fundamental advances by incorporating machine learning to enhance realworld security applications, new models of opportunistic security games, robust methods for handling uncertainty,...
متن کاملStackelberg Security Games (SSG) Basics and Application Overview
Security is a critical concern around the world, whether it is the challenge of protecting ports, airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and money, protecting endangered species, forests and fisheries, suppressing urban crime or security in cyberspace. Unfortunately, limited security resources prevent full security coverage at all times; inst...
متن کاملSecurity and Game Theory - Algorithms, Deployed Systems, Lessons Learned
Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in the need to deploy limited security resources to maximize their effectiveness. Game theory provides a sound mathematical approach for such effective deployment of limited security resources. A typical resulting approach is to randomize security schedules to avoid predictability, taking into accou...
متن کاملComputational Game Theory for Security: Progress and Challenges∗
The goal of this paper is to (re)introduce a real-world challenge problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: our goal is to not only introduce the research challenges for algorithmic and behavioral game theory in service of this proble...
متن کاملGame Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond
The goal of this paper is to introduce a real-world challenge problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: Our goal is not only to introduce the problem, but also to provide exemplars of initial successes of deployed systems in this chal...
متن کامل