Security and sustainability are two critical global challenges that involve the interaction of ma... more Security and sustainability are two critical global challenges that involve the interaction of many intelligent actors. Game theory provides a sound mathematical framework to model such interactions, and computational game theory in particular has a promising role to ...
While game-theoretic approaches have been proposed for addressing complex security resource alloc... more While game-theoretic approaches have been proposed for addressing complex security resource allocation problems, many of the standard game-theoretic assumptions fail to address human adversaries who security forces will likely face. To that end, approaches have been proposed that attempt to incorporate better models of human decision-making in these security settings. We take a new approach where instead of trying to create a model of human decision-making, we leverage ideas from robust optimization techniques. In addition, we extend our approach and the previous best performing approach to also address human anchoring biases under limited observation conditions. To evaluate our approach, we perform a comprehensive examination comparing the performance of our new approach against the current leading approaches to addressing human adversaries. Finally, in our experiments we take the first ever analysis of some demographic information and personality measures that may influence decisi...
1. INTRODUCTION The last five years have witnessed the successful application of game theory in r... more 1. INTRODUCTION The last five years have witnessed the successful application of game theory in rea-soning about complex security problems [Basilico et al. 2009; Korzhyk et al. 2010; Dickerson et al. 2010; Jakob et al. 2010; Paruchuri et al. 2008; Pita et al. 2009; Pita et al. 2010; ...
Massively Multiplayer Online Role-Playing Games (MMORPGs) typically use a handful of static conve... more Massively Multiplayer Online Role-Playing Games (MMORPGs) typically use a handful of static conventions for involving players in stories, such as predefined quest or story paths (a quest or story path is one in which the user experiences a sequence of related quests that must be accomplished in a particular order). Beyond the work done in MMORPGs there has been strong
Security at major locations of economic or political importance is a key concern around the world... more Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security cover-age at all times, which allows adversaries to observe and exploit patterns in ...
Security at major locations of economic or political impor- tance is a key concern around the wor... more Security at major locations of economic or political impor- tance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security coverage at all times, which allows adversaries to observe and exploit patterns in selective patrolling or mon- itoring, e.g. they can plan an attack avoiding existing pa- trols. Hence, randomized patrolling
Security and sustainability are two critical global challenges that involve the interaction of ma... more Security and sustainability are two critical global challenges that involve the interaction of many intelligent actors. Game theory provides a sound mathematical framework to model such interactions, and computational game theory in particular has a promising role to ...
While game-theoretic approaches have been proposed for addressing complex security resource alloc... more While game-theoretic approaches have been proposed for addressing complex security resource allocation problems, many of the standard game-theoretic assumptions fail to address human adversaries who security forces will likely face. To that end, approaches have been proposed that attempt to incorporate better models of human decision-making in these security settings. We take a new approach where instead of trying to create a model of human decision-making, we leverage ideas from robust optimization techniques. In addition, we extend our approach and the previous best performing approach to also address human anchoring biases under limited observation conditions. To evaluate our approach, we perform a comprehensive examination comparing the performance of our new approach against the current leading approaches to addressing human adversaries. Finally, in our experiments we take the first ever analysis of some demographic information and personality measures that may influence decisi...
1. INTRODUCTION The last five years have witnessed the successful application of game theory in r... more 1. INTRODUCTION The last five years have witnessed the successful application of game theory in rea-soning about complex security problems [Basilico et al. 2009; Korzhyk et al. 2010; Dickerson et al. 2010; Jakob et al. 2010; Paruchuri et al. 2008; Pita et al. 2009; Pita et al. 2010; ...
Massively Multiplayer Online Role-Playing Games (MMORPGs) typically use a handful of static conve... more Massively Multiplayer Online Role-Playing Games (MMORPGs) typically use a handful of static conventions for involving players in stories, such as predefined quest or story paths (a quest or story path is one in which the user experiences a sequence of related quests that must be accomplished in a particular order). Beyond the work done in MMORPGs there has been strong
Security at major locations of economic or political importance is a key concern around the world... more Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security cover-age at all times, which allows adversaries to observe and exploit patterns in ...
Security at major locations of economic or political impor- tance is a key concern around the wor... more Security at major locations of economic or political impor- tance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent full security coverage at all times, which allows adversaries to observe and exploit patterns in selective patrolling or mon- itoring, e.g. they can plan an attack avoiding existing pa- trols. Hence, randomized patrolling
Uploads
Papers by James Pita