TY - PAT

T1 - Optimizing a security patrolling strategy using decomposed optimal Bayesian Stackelberg solver

AU - Tambe, M

AU - Paruchuri, P

AU - Ordóñez, F

AU - Kraus, S

AU - Pearce, J

AU - Marecki, J

PY - 2012

Y1 - 2012

N2 - Techniques are described for Stackelberg games, in which one agent (the leader) must commit to a strategy that can be observed by other agents (the followers or adversaries) before they choose their own strategies, in which the leader is uncertain about the types of adversaries it may face. Such games are important in security domains, where, for example, a security agent (leader) must commit to a strategy of patrolling certain areas, and robbers (followers) have a chance to observe this strategy over time before choosing their own strategies of where to attack. An efficient exact algorithm is described for finding the optimal strategy for the leader to commit to in these games. This algorithm, Decomposed Optimal Bayesian Stackelberg Solver or “DOBSS,” is based on a novel and compact mixed-integer linear programming formulation. The algorithm can be implemented in a method, software, and/or system including computer or processor functionality.

AB - Techniques are described for Stackelberg games, in which one agent (the leader) must commit to a strategy that can be observed by other agents (the followers or adversaries) before they choose their own strategies, in which the leader is uncertain about the types of adversaries it may face. Such games are important in security domains, where, for example, a security agent (leader) must commit to a strategy of patrolling certain areas, and robbers (followers) have a chance to observe this strategy over time before choosing their own strategies of where to attack. An efficient exact algorithm is described for finding the optimal strategy for the leader to commit to in these games. This algorithm, Decomposed Optimal Bayesian Stackelberg Solver or “DOBSS,” is based on a novel and compact mixed-integer linear programming formulation. The algorithm can be implemented in a method, software, and/or system including computer or processor functionality.

UR - https://scholar.google.co.il/scholar?q=Optimizing+a+security+patrolling+strategy+using+decomposed+optimal+Bayesian+Stackelberg+solver&btnG=&hl=en&as_sdt=0%2C5

M3 - براءة الإختراع

M1 - US8224681 B2

PB - University of Southern California

ER -