Search games

S Gal - Wiley encyclopedia of operations research and …, 2010 - Wiley Online Library
This article surveys the area of search games with immobile and mobile hider. The search
space is either a graph, a bounded domain or an unbounded set. The search process is …

[BOOK][B] The theory of search games and rendezvous

S Alpern, S Gal - 2002 - books.google.com
Search Theory is one of the original disciplines within the field of Operations Research. It
deals with the problem faced by a Searcher who wishes to minimize the time required to find …

Patrolling games

S Alpern, A Morton, K Papadaki - Operations research, 2011 - pubsonline.informs.org
A key operational problem for those charged with the security of vulnerable facilities (such
as airports or art galleries) is the scheduling and deployment of patrols. Motivated by the …

[BOOK][B] Game theory, alive

AR Karlin, Y Peres - 2017 - books.google.com
We live in a highly connected world with multiple self-interested agents interacting and
myriad opportunities for conflict and cooperation. The goal of game theory is to understand …

A jamming game in wireless networks with transmission cost

E Altman, K Avrachenkov, A Garnaev - … 2007, Avignon, France, June 5-7 …, 2007 - Springer
We consider jamming in wireless networks with transmission cost for both transmitter and
jammer. We use the framework of non-zero-sum games. In particular, we prove the …

Search games: Literature and survey

R Hohzaki - Journal of the Operations Research Society of Japan, 2016 - jstage.jst.go.jp
The purpose of this paper is to review literature published to date on search games, almost
all of which have originated from search theory. Search theory itself is a research field of …

Two-person zero-sum games

AR Washburn - 2014 - Springer
This book is unusual among books on game theory in considering only the special case
where there are exactly two players whose interests are completely opposed—the two …

Infrastructure security games

M Baykal-Guersoy, Z Duan, HV Poor… - European Journal of …, 2014 - Elsevier
Infrastructure security against possible attacks involves making decisions under uncertainty.
This paper presents game theoretic models of the interaction between an adversary and a …

Jamming in wireless networks under uncertainty

E Altman, K Avrachenkov, A Garnaev - Mobile Networks and Applications, 2011 - Springer
Jamming is a form of a denial of service attack in which an adversary can degrade the
quality of the reception by creating interference. One can study jamming both in the purpose …

[BOOK][B] Search and foraging: individual motion and swarm dynamics

E Kagan, I Ben-Gal - 2015 - books.google.com
This book examines how to program artificial search agents so that they act optimally or
demonstrate the same behavior as predicted by the foraging theory for living organisms. It …