Computing the optimal strategy to commit to

V Conitzer, T Sandholm - Proceedings of the 7th ACM conference on …, 2006 - dl.acm.org
In multiagent systems, strategic settings are often analyzed under the assumption that the
players choose their strategies simultaneously. However, this model is not always realistic …

[PDF][PDF] Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games

P Paruchuri, JP Pearce, J Marecki… - Proceedings of the …, 2008 - aamas.csc.liv.ac.uk
In a class of games known as Stackelberg games, one agent (the leader) must commit to a
strategy that can be observed by the other agent (the follower or adversary) before the …

[BOG][B] Game theory and mechanism design

Y Narahari - 2014 - books.google.com
This book offers a self-sufficient treatment of a key tool, game theory and mechanism design,
to model, analyze, and solve centralized as well as decentralized design problems involving …

AWESOME: A general multiagent learning algorithm that converges in self-play and learns a best response against stationary opponents

V Conitzer, T Sandholm - Machine Learning, 2007 - Springer
Two minimal requirements for a satisfactory multiagent learning algorithm are that it 1. learns
to play optimally against stationary opponents and 2. converges to a Nash equilibrium in self …

[PDF][PDF] IRIS-a tool for strategic security allocation in transportation networks

J Tsai, S Rathi, C Kiekintveld, F Ordonez… - AAMAS (Industry …, 2009 - aamas.csc.liv.ac.uk
Security is a concern of major importance to governments and companies throughout the
world. With limited resources, complete coverage of potential points of attack is not possible …

New complexity results about Nash equilibria

V Conitzer, T Sandholm - Games and Economic Behavior, 2008 - Elsevier
We provide a single reduction that demonstrates that in normal-form games:(1) it is NP-
complete to determine whether Nash equilibria with certain natural properties exist (these …

Foundations of cooperative AI

V Conitzer, C Oesterheld - Proceedings of the AAAI Conference on …, 2023 - ojs.aaai.org
AI systems can interact in unexpected ways, sometimes with disastrous consequences. As
AI gets to control more of our world, these interactions will become more common and have …

[BOG][B] Economics and computation

J Rothe - 2015 - Springer
1 Her work has been supported in part by an NRW grant for gender-sensitive universities
supporting her as a junior professor for Computational Social Choice and by the project …

Red teaming game: A game-theoretic framework for red teaming language models

C Ma, Z Yang, M Gao, H Ci, J Gao, X Pan… - arxiv preprint arxiv …, 2023 - arxiv.org
Deployable Large Language Models (LLMs) must conform to the criterion of helpfulness and
harmlessness, thereby achieving consistency between LLMs outputs and human values …

Using game theory for Los Angeles airport security

J Pita, M Jain, F Ordónez, C Portway, M Tambe… - AI magazine, 2009 - ojs.aaai.org
Security at major locations of economic or political importance is a key concern around the
world, particularly given the threat of terrorism. Limited security resources prevent full …