<--- Back to Details
First PageDocument Content
Game theory / Pursuit-evasion / Strategy / Nash equilibrium / Search algorithm / Flow network / Directed graph / Best response / Algorithm
Date: 2010-08-10 12:41:00
Game theory
Pursuit-evasion
Strategy
Nash equilibrium
Search algorithm
Flow network
Directed graph
Best response
Algorithm

Transiting Areas Patrolled by a Mobile Adversary Ondˇrej Vanˇek, Branislav Boˇsansk´y, Michal Jakob and Michal Pˇechouˇcek which it chooses a closed-walk starting and ending in a given location in the area, termed

Add to Reading List

Source URL: game.itu.dk

Download Document from Source Website

File Size: 1,61 MB

Share Document on Facebook

Similar Documents

Resistive Network Optimal Power Flow: Uniqueness and Algorithms Chee Wei Tan, Senior Member, IEEE, Desmond W. H. Cai, Student Member, IEEE and Xin Lou Abstract—The optimal power flow (OPF) problem minimizes the power l

Resistive Network Optimal Power Flow: Uniqueness and Algorithms Chee Wei Tan, Senior Member, IEEE, Desmond W. H. Cai, Student Member, IEEE and Xin Lou Abstract—The optimal power flow (OPF) problem minimizes the power l

DocID: 1vid6 - View Document

Introduction Network similarity problem Results Acknowledgements  Spectra of the Spike Flow Graphs of Recurrent

Introduction Network similarity problem Results Acknowledgements Spectra of the Spike Flow Graphs of Recurrent

DocID: 1veQT - View Document

An Arrow-Hurwicz-Uzawa Type Flow as Least Squares Solver for Network Linear Equations Yang Liu, Christian Lageman, Brian D. O. Anderson, and Guodong Shi∗ arXiv:1701.03908v1 [cs.SY] 14 Jan 2017

An Arrow-Hurwicz-Uzawa Type Flow as Least Squares Solver for Network Linear Equations Yang Liu, Christian Lageman, Brian D. O. Anderson, and Guodong Shi∗ arXiv:1701.03908v1 [cs.SY] 14 Jan 2017

DocID: 1uJ5N - View Document

Pipe Network  Hand-in Assignment 1 Flow in Water Pipe Network   

Pipe Network Hand-in Assignment 1 Flow in Water Pipe Network  

DocID: 1uInK - View Document

Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter

Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter

DocID: 1uIen - View Document