{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:39:21Z","timestamp":1762033161844},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,12,27]],"date-time":"2013-12-27T00:00:00Z","timestamp":1388102400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10458-013-9246-9","type":"journal-article","created":{"date-parts":[[2013,12,26]],"date-time":"2013-12-26T08:17:05Z","timestamp":1388045825000},"page":"986-1016","source":"Crossref","is-referenced-by-count":8,"title":["On the value of commitment"],"prefix":"10.1007","volume":"28","author":[{"given":"Joshua","family":"Letchford","sequence":"first","affiliation":[]},{"given":"Dmytro","family":"Korzhyk","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Conitzer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,27]]},"reference":[{"key":"9246_CR1","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1016\/j.geb.2009.11.008","volume":"69","author":"B Stengel von","year":"2010","unstructured":"von Stengel, B., & Zamir, S. (2010). Leadership games with convex strategy sets. Games and Economic Behavior, 69, 446\u2013457.","journal-title":"Games and Economic Behavior"},{"key":"9246_CR2","volume-title":"Recherches sur les principes math\u00e9matiques de la th\u00e9orie des richesses (Researches into the mathematical principles of the theory of wealth)","author":"AA Cournot","year":"1838","unstructured":"Cournot, A. A. (1838). Recherches sur les principes math\u00e9matiques de la th\u00e9orie des richesses (Researches into the mathematical principles of the theory of wealth). Paris: Hachette."},{"key":"9246_CR3","volume-title":"Marktform und Gleichgewicht","author":"H Stackelberg von","year":"1934","unstructured":"von Stackelberg, H. (1934). Marktform und Gleichgewicht. Vienna: Springer."},{"key":"9246_CR4","doi-asserted-by":"crossref","unstructured":"Conitzer, V., & Sandholm, T. (2006). Computing the optimal strategy to commit to. In Proceedings of the ACM conference on electronic commerce (EC) (pp. 82\u201390). Ann Arbor, MI.","DOI":"10.1145\/1134707.1134717"},{"key":"9246_CR5","doi-asserted-by":"crossref","unstructured":"Letchford, J., Conitzer, V., & Munagala, K. (2009). Learning and approximating the optimal strategy to commit to. In Proceedings of the second symposium on algorithmic game theory (SAGT-09), Paphos, Cyprus (pp. 250\u2013262).","DOI":"10.1007\/978-3-642-04645-2_23"},{"key":"9246_CR6","unstructured":"Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ord\u00f3\u00f1ez, F., & Kraus, S. (2008). Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games. In Proceedings of the seventh international joint conference on autonomous agents and multi-agent systems (AAMAS), Estoril, Portugal (pp. 895\u2013902)."},{"issue":"2","key":"9246_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1399589.1399599","volume":"7","author":"M Jain","year":"2008","unstructured":"Jain, M., Pita, J., Tambe, M., Ord\u00f3\u00f1ez, F., Paruchuri, P., & Kraus, S. (2008). Bayesian Stackelberg games and their application for security at Los Angeles International Airport. SIGecom Exchanges, 7(2), 1\u20133.","journal-title":"SIGecom Exchanges"},{"issue":"1","key":"9246_CR8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1609\/aimag.v30i1.2173","volume":"30","author":"J Pita","year":"2009","unstructured":"Pita, J., Jain, M., Ord\u00f3\u00f1ez, F., Portway, C., Tambe, M., & Western, C. (2009). Using game theory for Los Angeles airport security. AI Magazine, 30(1), 43\u201357.","journal-title":"AI Magazine"},{"key":"9246_CR9","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ord\u00f3\u00f1ez, F., & Tambe, M. (2009). Computing optimal randomized resource allocations for massive security games. In Proceedings of the eighth international joint conference on autonomous agents and multi-agent systems (AAMAS), Budapest, Hungary (pp. 689\u2013696)."},{"key":"9246_CR10","doi-asserted-by":"crossref","unstructured":"Korzhyk, D., Conitzer, V., & Parr, R. (2010). Complexity of computing optimal Stackelberg strategies in security resource allocation games. In Proceedings of the national conference on artificial intelligence (AAAI), Atlanta, GA (pp. 805\u2013810).","DOI":"10.1609\/aaai.v24i1.7638"},{"key":"9246_CR11","unstructured":"Tsai, J., Rathi, S., Kiekintveld, C., Ordonez, F., & Tambe, M. (2009). IRIS\u2013a tool for strategic security allocation in transportation networks. In Proceedings of the eighth international joint conference on autonomous agents and multi-agent systems (AAMAS), Budapest, Hungary (pp. 37\u201344)."},{"key":"9246_CR12","unstructured":"Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., & Meyer, G. (2012). PROTECT: A deployed game theoretic system to protect the ports of the United States. In Proceedings of the eleventh international joint conference on autonomous agents and multi-agent systems (AAMAS), Valencia, Spain."},{"key":"9246_CR13","doi-asserted-by":"crossref","unstructured":"Pita, J., Tambe, M., Kiekintveld, C., Cullen, S., & Steigerwald, E. (2011). GUARDS\u2013Game theoretic security allocation on a national scale. In Proceedings of the tenth international joint conference on autonomous agents and multi-agent systems (AAMAS), Taipei, Taiwan (pp. 37\u201344).","DOI":"10.1017\/CBO9780511973031.006"},{"key":"9246_CR14","doi-asserted-by":"crossref","unstructured":"Letchford, J., & Conitzer, V. (2010). Computing optimal strategies to commit to in extensive-form games. In Proceedings of the ACM conference on electronic commerce (EC), Cambridge, MA (pp. 83\u201392).","DOI":"10.1145\/1807342.1807354"},{"key":"9246_CR15","unstructured":"Letchford, J., MacDermed, L., Conitzer, V., Parr, R., & Isbell, C. (2012). Computing optimal strategies to commit to in stochastic games. In Proceedings of the national conference on artificial intelligence (AAAI), Toronto, ON (pp. 1380\u20131386)."},{"key":"9246_CR16","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1613\/jair.2588","volume":"33","author":"I Ashlagi","year":"2008","unstructured":"Ashlagi, I., Monderer, D., & Tennenholtz, M. (2008). On the value of correlation. Journal of Artificial Intelligence Research, 33, 575\u2013613.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"9246_CR17","doi-asserted-by":"crossref","unstructured":"Koutsoupias, E., & Papadimitriou, C. H. (1999). Worst-case equilibria. In Symposium on theoretical aspects in computer science (pp. 404\u2013413).","DOI":"10.1007\/3-540-49116-3_38"},{"key":"9246_CR18","doi-asserted-by":"crossref","unstructured":"Papadimitriou, C. H. (2001). Algorithms, games and the Internet. In Proceedings of the annual symposium on theory of computing (STOC) (pp. 749\u2013753).","DOI":"10.1145\/380752.380883"},{"issue":"2","key":"9246_CR19","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/506147.506153","volume":"49","author":"T Roughgarden","year":"2002","unstructured":"Roughgarden, T., & Tardos, \u00c9. (2002). How bad is selfish routing? Journal of the ACM, 49(2), 236\u2013259.","journal-title":"Journal of the ACM"},{"issue":"1","key":"9246_CR20","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/90.554730","volume":"5","author":"YA Korilis","year":"1997","unstructured":"Korilis, Y. A., Lazar, A. A., & Orda, A. (1997). Achieving network optima using Stackelberg routing strategies. IEEE\/ACM Transactions on Networking, 5(1), 161\u2013173.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"9246_CR21","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1137\/S0097539701397059","volume":"33","author":"T Roughgarden","year":"2004","unstructured":"Roughgarden, T. (2004). Stackelberg scheduling strategies. SIAM Journal on Computing, 33(2), 332\u2013350.","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"9246_CR22","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1287\/moor.1100.0442","volume":"35","author":"V Bonifaci","year":"2010","unstructured":"Bonifaci, V., Harks, T., & Sch\u00e4fer, G. (2010). Stackelberg routing in arbitrary networks. Mathematics of Operations Research, 35(2), 330\u2013346.","journal-title":"Mathematics of Operations Research"},{"key":"9246_CR23","doi-asserted-by":"crossref","unstructured":"Anshelevich, E., Dasgupta, A., Kleinberg, J., Tardos, E., Wexler, T., & Roughgarden, T. (2004). The price of stability for network design with fair cost allocation. In Proceedings of the 45th annual IEEE symposium on foundations of computer science (FOCS) (pp. 295\u2013304).","DOI":"10.1109\/FOCS.2004.68"},{"key":"9246_CR24","doi-asserted-by":"crossref","unstructured":"Christodoulou, G., & Koutsoupias, E. (2005). On the price of anarchy and stability of correlated equilibria of linear congestion games. In Proceedings of the 13th annual european symposium (pp. 59\u201370).","DOI":"10.1007\/11561071_8"},{"issue":"2","key":"9246_CR25","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1613\/jair.3269","volume":"41","author":"D Korzhyk","year":"2011","unstructured":"Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., & Tambe, M. (2011). Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. Journal of Artificial Intelligence Research, 41(2), 297\u2013327.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"9246_CR26","first-page":"299","volume-title":"Algorithms (ESA 2007) volume 4698 of lecture notes in computer science","author":"D Fotakis","year":"2007","unstructured":"Fotakis, D. (2007). Stackelberg strategies for atomic congestion games. In L. Arge, M. Hoffmann, & E. Welzl (Eds.), Algorithms (ESA 2007) volume 4698 of lecture notes in computer science (Vol. 4698, pp. 299\u2013310). Berlin, Heidelberg: Springer."},{"key":"9246_CR27","unstructured":"Nudelman, E., Wortman, J., Leyton-Brown, K., & Shoham, Y. (2004). Run the GAMUT: A comprehensive approach to evaluating game-theoretic algorithms. In Proceedings of the international conference on autonomous agents and multi-agent systems (AAMAS), New York, NY (pp. 880\u2013887)."},{"key":"9246_CR28","doi-asserted-by":"crossref","unstructured":"Conitzer, V., & Korzhyk, D. (2011). Commitment to correlated strategies. In Proceedings of the national conference on artificial intelligence (AAAI), San Francisco, CA (pp. 632\u2013637).","DOI":"10.1609\/aaai.v25i1.7875"},{"key":"9246_CR29","unstructured":"Sandholm, T., Gilpin, A., & Conitzer, V. (2005). Mixed-integer programming methods for finding Nash equilibria. In Proceedings of the national conference on artificial intelligence (AAAI), Pittsburgh, PA (pp. 495\u2013501)."}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-013-9246-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-013-9246-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-013-9246-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T08:48:24Z","timestamp":1688892504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-013-9246-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,27]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["9246"],"URL":"https:\/\/doi.org\/10.1007\/s10458-013-9246-9","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,27]]}}}