Showing 1–20 of 36 results
/ Date/ Name
Apr 21, 2023A Multi-Fidelity Bayesian Approach to Safe Controller DesignNov 7, 2016Convergence Analysis of Iterated Best Response for a Trusted Computation GameFeb 22, 2016An Algebraic Topological Approach to Privacy: Numerical and Categorical DataSep 3, 2023Game Theory in Distributed Systems Security: Foundations, Challenges, and Future DirectionsApr 29, 2018Scenario Approach for Robust Blackbox Optimization in the Bandit SettingJul 24, 2024Competitive Perimeter Defense in Tree EnvironmentsDec 18, 2017Sensor Selection via Randomized SamplingApr 26, 2013Robust Belief Roadmap: Planning Under Intermittent SensingAug 7, 2011k-Capture in Multiagent Pursuit Evasion, or the Lion and the HyenasMar 7, 2010On Vehicle Placement to Intercept Moving TargetsNov 9, 2020Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement LearningAug 11, 2019Incentivizing Collaboration in Heterogeneous Teams via Common-Pool Resource GamesMar 9, 2024Matrix Concentration Inequalities for Sensor SelectionAug 27, 2009A Dynamic Boundary Guarding Problem with Translating TargetsOct 9, 2023On Multi-Fidelity Impedance Tuning for Human-Robot Cooperative ManipulationJun 12, 2020Secure Route Planning Using Dynamic Games with Stopping StatesNov 19, 2017Sequential Randomized Matrix Factorization for Gaussian Processes: Efficient Predictions and Hyper-parameter OptimizationSep 12, 2022FlipDyn: A game of resource takeovers in dynamical systemsApr 7, 2011Hide-and-Seek with Directional SensingOct 10, 2021Competitive Perimeter Defense of Conical Environments