Milind Tambe on game theory in security applications | Machine Intelligence Research Institute

نویسنده

  • Milind Tambe
چکیده

Milind Tambe (http://teamcore.usc.edu/tambe/) is Helen N. and Emmett H. Jones Professor in Engineering at the University of Southern California (http://www.usc.edu/) (USC). He is a fellow of AAAI (http://www.aaai.org/) (Association for Advancement of Artificial Intelligence) and ACM (http://www.acm.org/) (Association for Computing Machinery), as well as recipient of the ACM/SIGART Autonomous Agents Research Award (http://sigai.acm.org/awards /autonomous_agents_award.html), Christopher Columbus Fellowship Foundation Homeland security award (http://www.ccolumbusfoundationawards.org/homeland/past.cfm), the INFORMS Wagner prize for excellence in Operations Research Practice (https://www.informs.org/Recognize-Excellence/Award-Recipients /Milind-Tambe), the Rist Prize of the Military Operations Research Society (http://create.usc.edu/2011/08/create_reserachers_awarded_the.html), IBM Faculty Award (http://www.okawa-foundation.or.jp/en/activities /research_grant/index.html), Okawa Foundation Faculty Research Award, RoboCup scientific challenge award, USC Associates Award for Creativity in Research (https://research.usc.edu/associates-award-previousrecipients/) and USC Viterbi School of Engineering use-inspired research award (http://viterbi.usc.edu/academics/awards/viterbi-school-awards /vsoe_research_award.htm).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tambe , Developing the Science and Applications of Security Games : Machine Learning , Uncertainty and Preference Elicitation in Game Theory for Security

Having successfully founded the research area of security games, which has led to real-world applications in scheduling the deployment of limited resources (patrols, checkpoints, inspections, etc.), we now provide fundamental advances by incorporating machine learning to enhance realworld security applications, new models of opportunistic security games, robust methods for handling uncertainty,...

متن کامل

Stackelberg Security Games (SSG) Basics and Application Overview

Security is a critical concern around the world, whether it is the challenge of protecting ports, airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and money, protecting endangered species, forests and fisheries, suppressing urban crime or security in cyberspace. Unfortunately, limited security resources prevent full security coverage at all times; inst...

متن کامل

Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned

Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in the need to deploy limited security resources to maximize their effectiveness. Game theory provides a sound mathematical approach for such effective deployment of limited security resources. A typical resulting approach is to randomize security schedules to avoid predictability, taking into accou...

متن کامل

Computational Game Theory for Security: Progress and Challenges∗

The goal of this paper is to (re)introduce a real-world challenge problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: our goal is to not only introduce the research challenges for algorithmic and behavioral game theory in service of this proble...

متن کامل

Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond

The goal of this paper is to introduce a real-world challenge problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: Our goal is not only to introduce the problem, but also to provide exemplars of initial successes of deployed systems in this chal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015