Milind Tambe


Ontology type: schema:Person     


Person Info

NAME

Milind

SURNAME

Tambe

Publications in SciGraph latest 50 shown

  • 2019 From Empirical Analysis to Public Policy: Evaluating Housing Systems for Homeless Youth in MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES
  • 2018-09-26 Scaling-Up Stackelberg Security Games Applications Using Approximations in DECISION AND GAME THEORY FOR SECURITY
  • 2018-09-26 A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring Games in DECISION AND GAME THEORY FOR SECURITY
  • 2018-09-26 Imbalanced Collusive Security Games in DECISION AND GAME THEORY FOR SECURITY
  • 2018 Designing Fair, Efficient, and Interpretable Policies for Prioritizing Homeless Youth for Housing Resources in INTEGRATION OF CONSTRAINT PROGRAMMING, ARTIFICIAL INTELLIGENCE, AND OPERATIONS RESEARCH
  • 2018 Trends and Applications in Stackelberg Security Games in HANDBOOK OF DYNAMIC GAME THEORY
  • 2017-10-04 VIOLA: Video Labeling Application for Security Domains in DECISION AND GAME THEORY FOR SECURITY
  • 2017-10-04 Optimal Patrol Planning for Green Security Games with Black-Box Attackers in DECISION AND GAME THEORY FOR SECURITY
  • 2017-09 Every team deserves a second chance: an extended study on predicting team performance in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2017 Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test in MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES
  • 2016 POMDPs for Assisting Homeless Shelters – Computational and Deployment Challenges in AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS
  • 2016 Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model in DECISION AND GAME THEORY FOR SECURITY
  • 2016 Trends and Applications in Stackelberg Security Games in HANDBOOK OF DYNAMIC GAME THEORY
  • 2016 Towards a Science of Security Games in MATHEMATICAL SCIENCES WITH MULTIDISCIPLINARY APPLICATIONS
  • 2016 Divide to Defend: Collusive Security Games in DECISION AND GAME THEORY FOR SECURITY
  • 2016 Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections in ADVANCES IN PRACTICAL APPLICATIONS OF SCALABLE MULTI-AGENT SYSTEMS. THE PAAMS COLLECTION
  • 2016 Multi-agent Team Formation for Design Problems in COORDINATION, ORGANIZATIONS, INSTITUTIONS, AND NORMS IN AGENT SYSTEMS XI
  • 2016 Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks in DECISION AND GAME THEORY FOR SECURITY
  • 2015-09 Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2015 Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games in DECISION AND GAME THEORY FOR SECURITY
  • 2015 The Power of Teams that Disagree: Team Formation in Large Action Spaces in COORDINATION, ORGANIZATIONS, INSTITUTIONS, AND NORMS IN AGENT SYSTEMS X
  • 2015 Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games in DECISION AND GAME THEORY FOR SECURITY
  • 2014-07 TESLA: an extended study of an energy-saving agent that leverages schedule flexibility in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2014 Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries in DECISION AND GAME THEORY FOR SECURITY
  • 2014-01 An extended study on multi-objective security games in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2014 Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms in DECISION AND GAME THEORY FOR SECURITY
  • 2014 A Detailed Analysis of a Multi-agent Diverse Team in COORDINATION, ORGANIZATIONS, INSTITUTIONS, AND NORMS IN AGENT SYSTEMS IX
  • 2014 Security Games in the Field: Deployments on a Transit System in ENGINEERING MULTI-AGENT SYSTEMS
  • 2013-09 Empirical evaluation of computational fear contagion models in crowd dispersions in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2013 Security Games Applied to Real-World: Research Contributions and Challenges in MOVING TARGET DEFENSE II
  • 2013 Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers in DECISION AND GAME THEORY FOR SECURITY
  • 2013 Deployed Security Games for Patrol Planning in HANDBOOK OF OPERATIONS RESEARCH FOR HOMELAND SECURITY
  • 2013 Engineering the Decentralized Coordination of UAVs with Limited Communication Range in ADVANCES IN ARTIFICIAL INTELLIGENCE
  • 2013 PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response in HANDBOOK OF COMPUTATIONAL APPROACHES TO COUNTERTERRORISM
  • 2012 Game Theory for Security: An Important Challenge for Multiagent Systems in MULTI-AGENT SYSTEMS
  • 2012 A Study of Emotional Contagion with Virtual Characters in INTELLIGENT VIRTUAL AGENTS
  • 2011 Empirical Evaluation of Computational Emotional Contagion Models in INTELLIGENT VIRTUAL AGENTS
  • 2011 Game Theory and Human Behavior: Challenges in Security and Sustainability in ALGORITHMIC DECISION THEORY
  • 2011 Game Theory for Security: Lessons Learned from Deployed Applications in AGENTS IN PRINCIPLE, AGENTS IN PRACTICE
  • 2011 Two Decades of Multiagent Teamwork Research: Past, Present, and Future in COLLABORATIVE AGENTS - RESEARCH AND DEVELOPMENT
  • 2010 Methods and Algorithms for Infinite Bayesian Stackelberg Security Games in DECISION AND GAME THEORY FOR SECURITY
  • 2009-03 Coordinating randomized policies for increasing security of agent systems in INFORMATION TECHNOLOGY AND MANAGEMENT
  • 2009 Safety in the Context of Coordination via Adjustable Autonomy in SAFETY AND SECURITY IN MULTIAGENT SYSTEMS
  • 2009 Coordinating Randomized Policies for Increasing Security in Multiagent Systems in SAFETY AND SECURITY IN MULTIAGENT SYSTEMS
  • 2009 Analyzing Dangers in Multiagent Rescue Using DEFACTO in SAFETY AND SECURITY IN MULTIAGENT SYSTEMS
  • 2008 Using Multi-Agent Teams to Improve the Training of Incident Commanders in DEFENCE INDUSTRY APPLICATIONS OF AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2007 Asimovian Multiagents: Applying Laws of Robotics to Teams of Humans and Agents in PROGRAMMING MULTI-AGENT SYSTEMS
  • 2006-07 Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications in AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS
  • 2006 Implementation Techniques for Solving POMDPs in Personal Assistant Agents in PROGRAMMING MULTI-AGENT SYSTEMS
  • 2006 A Family of Graphical-Game-Based Algorithms for Distributed Constraint Optimization Problems in COORDINATION OF LARGE-SCALE MULTIAGENT SYSTEMS
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "https://www.grid.ac/institutes/grid.42505.36", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Tambe", 
        "givenName": "Milind", 
        "id": "sg:person.016163237417.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016163237417.07"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2019-03-07T13:44", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-researchers-20181010/20181011/dim_researchers/base/researchers_1508.json", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.016163237417.07'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.016163237417.07'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.016163237417.07'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.016163237417.07'


     




    Preview window. Press ESC to close (or click here)


    ...