The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christopher Kiekintveld: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christopher Kiekintveld, Michael P. Wellman, Satinder P. Singh, Joshua Estelle, Yevgeniy Vorobeychik, Vishal Soni, Matthew R. Rudary
    Distributed Feedback Control for Decision Making on Supply Chains. [Citation Graph (0, 0)][DBLP]
    ICAPS, 2004, pp:384-392 [Conf]
  2. Joshua Estelle, Yevgeniy Vorobeychik, Michael P. Wellman, Satinder P. Singh, Christopher Kiekintveld, Vishal Soni
    Strategic Interactions in the TAC 2003 Supply Chain Tournament. [Citation Graph (0, 0)][DBLP]
    Computers and Games, 2004, pp:316-331 [Conf]
  3. Christopher Kiekintveld, Jason Miller, Patrick R. Jordan, Michael P. Wellman
    Controlling a supply chain agent using value-based decomposition. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2006, pp:208-217 [Conf]
  4. Yevgeniy Vorobeychik, Christopher Kiekintveld, Michael P. Wellman
    Empirical mechanism design: methods, with application to a supply-chain scenario. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2006, pp:306-315 [Conf]
  5. Christopher Kiekintveld
    Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games. [Citation Graph (0, 0)][DBLP]
    AAAI, 2007, pp:1935-1936 [Conf]
  6. Patrick R. Jordan, Christopher Kiekintveld, Jason Miller, Michael P. Wellman
    Market Efficiency, Sales Competition, and the Bullwhip Effect in the TAC SCM Tournaments. [Citation Graph (0, 0)][DBLP]
    TADA/AMEC, 2006, pp:62-74 [Conf]

  7. Security Games with Arbitrary Schedules: A Branch and Price Approach. [Citation Graph (, )][DBLP]


  8. Urban Security: Game-Theoretic Resource Allocation in Networked Domains. [Citation Graph (, )][DBLP]


  9. Empirical game-theoretic analysis of the TAC Supply Chain game. [Citation Graph (, )][DBLP]


  10. Forecasting market prices in a supply chain game. [Citation Graph (, )][DBLP]


  11. Selecting strategies using empirical game models: an experimental analysis of meta-strategies. [Citation Graph (, )][DBLP]


  12. Computing optimal randomized resource allocations for massive security games. [Citation Graph (, )][DBLP]


  13. How to protect a city: strategic security placement in graph-based domains. [Citation Graph (, )][DBLP]


  14. Asynchronous algorithms for approximate distributed constraint optimization with quality bounds. [Citation Graph (, )][DBLP]


  15. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. [Citation Graph (, )][DBLP]


  16. Robust Bayesian methods for Stackelberg security games. [Citation Graph (, )][DBLP]


  17. Strategic Interactions in a Supply Chain Game. [Citation Graph (, )][DBLP]


  18. Forecasting market prices in a supply chain game. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002