{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:06Z","timestamp":1767339246520},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,7,17]],"date-time":"2014-07-17T00:00:00Z","timestamp":1405555200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10458-014-9270-4","type":"journal-article","created":{"date-parts":[[2014,7,16]],"date-time":"2014-07-16T10:20:37Z","timestamp":1405506037000},"page":"787-820","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Efficient solutions for joint activity based security games: fast algorithms, results and a field experiment on a transit system"],"prefix":"10.1007","volume":"29","author":[{"given":"Francesco Maria","family":"Delle Fave","sequence":"first","affiliation":[]},{"given":"Eric","family":"Shieh","sequence":"additional","affiliation":[]},{"given":"Manish","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Albert Xin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Heather","family":"Rosoff","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]},{"given":"John P.","family":"Sullivan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,17]]},"reference":[{"key":"9270_CR1","doi-asserted-by":"crossref","unstructured":"Agmon, N., Kraus, S., & Kaminka, G. A. (2008). Multi-robot perimeter patrol in adversarial settings. In Proceedings of the International Conference on Robotics and Automation (ICRA) (pp. 2339\u20132345).","DOI":"10.1109\/ROBOT.2008.4543563"},{"key":"9270_CR2","first-page":"55","volume":"1","author":"N Agmon","year":"2008","unstructured":"Agmon, N., Sadov, V., Kaminka, G. A., & Kraus, S. (2008). The impact of adversarial knowledge on adversarial planning in perimeter patrol. AAMAS, 1, 55\u201362.","journal-title":"AAMAS"},{"issue":"1","key":"9270_CR3","first-page":"887","volume":"42","author":"N Agmon","year":"2011","unstructured":"Agmon, N., Kaminka, G. A., & Kraus, S. (2011). Multi-robot adversarial patrolling: Facing a full-knowledge opponent. Journal of Artificial Intelligence Research (JAIR), 42(1), 887\u2013916.","journal-title":"Journal of Artificial Intelligence Research (JAIR)"},{"key":"9270_CR4","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1287\/opre.46.3.316","volume":"46","author":"C Barnhart","year":"1994","unstructured":"Barnhart, C., Johnson, E. L., Nemhauser, G. L., Savelsbergh, M. W. P., & Vance, P. H. (1994). Branch and price: Column generation for solving huge integer programs. Operations Research, 46, 316\u2013329.","journal-title":"Operations Research"},{"key":"9270_CR5","unstructured":"Basilico, N., Gatti, N., & Amigoni, F. (2009). Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In Proceedings of the Eight International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) (pp. 57\u201364)."},{"key":"9270_CR6","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1613\/jair.1497","volume":"22","author":"R Becker","year":"2004","unstructured":"Becker, R., Zilberstein, S., Lesser, V., & Goldman, C. V. (2004). Solving transition independent decentralized Markov decision processes. Journal of Artificial Intelligence Research (JAIR), 22, 423\u2013455.","journal-title":"Journal of Artificial Intelligence Research (JAIR)"},{"key":"9270_CR7","unstructured":"Bertsimas, D., & Tsitsiklis, J. N. (1994). Introduction to Linear Optimization. 1st. Boston: Athena Scientific, 1997."},{"issue":"2","key":"9270_CR8","first-page":"1","volume":"4","author":"A Brown","year":"2012","unstructured":"Brown, A., Camerer, C. F., & Lovallo, D. (2012). To review or not to review? Limited strategic thinking at the movie box office. American Economic Journal: Microeconomics, 4(2), 1\u201326.","journal-title":"American Economic Journal: Microeconomics"},{"key":"9270_CR9","volume-title":"Preventing mass transit crime\u2014Crime prevention studies","author":"RV Clarke","year":"1996","unstructured":"Clarke, R. V. (1996). Preventing mass transit crime\u2014Crime prevention studies (Vol. 6). Monsey: Criminal Justice Press."},{"key":"9270_CR10","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1093\/police\/pam003","volume":"1","author":"RV Clarke","year":"2007","unstructured":"Clarke, R. V., & Newman, G. (2007). Police and the prevention of crime. Policing: A Journal of Policy and Practice, 1, 9\u201320.","journal-title":"Policing: A Journal of Policy and Practice"},{"key":"9270_CR11","unstructured":"Conitzer, V. (2012). Computing game-theoretic solutions and applications to security. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) (pp. 2106\u20132112)."},{"key":"9270_CR12","doi-asserted-by":"crossref","unstructured":"Conitzer, V., & Sandholm, T. (2006). Computing the optimal strategy to commit to. In Proceedings of the Seventh ACM Conference on Electronic Commerce (EC) (pp. 82\u201390).","DOI":"10.1145\/1134707.1134717"},{"key":"9270_CR13","unstructured":"Dickerson, J. P., Simari, G. I., Subrahmanian, V. S., & Kraus, S. (2010). A graph-theoretic approach to protect static and moving targets from adversaries. In Proceedings of the Ninth International Joint Conference on Autonomous Agents and Multiagent Systems (pp. 299\u2013306)."},{"key":"9270_CR14","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1613\/jair.4027","volume":"48","author":"F Fang","year":"2013","unstructured":"Fang, F., Jiang, A. X., & Tambe, M. (2013). Protecting moving targets with multiple mobile resources. Journal of Artificial Intelligence Research (JAIR), 48, 583\u2013634.","journal-title":"Journal of Artificial Intelligence Research (JAIR)"},{"key":"9270_CR15","unstructured":"Gatti, N. (2008). Game theoretical insights in strategic patrolling: Model and algorithm in normal form. In Proceedings of the European Conference on Artificial Intelligence (ECAI) (pp. 403\u2013407)."},{"key":"9270_CR16","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/S0166-218X(01)00195-0","volume":"117","author":"G Gutin","year":"2002","unstructured":"Gutin, G., Yeo, A., & Zverovich, A. (2002). Traveling salesman should not be greedy: Domination analysis of greedy-type heuristics for the tsp. Discrete Applied Mathematics, 117, 81\u201386.","journal-title":"Discrete Applied Mathematics"},{"key":"9270_CR17","doi-asserted-by":"crossref","unstructured":"Jain, M., Kardes, E., Kiekintveld, C., Tambe, M., & Ordonez, F. (2010). Security games with arbitrary schedules: A branch and price approach. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) (pp. 792\u2013797).","DOI":"10.1609\/aaai.v24i1.7611"},{"issue":"4","key":"9270_CR18","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1287\/inte.1100.0505","volume":"40","author":"M Jain","year":"2010","unstructured":"Jain, M., Pita, J., Tsai, J., Kiekintveld, C., Rathi, S., Ordonez, F., et al. (2010). Software assistants for patrol planning at lax and federal air marshals service. Interfaces, 40(4), 267\u2013290.","journal-title":"Interfaces"},{"key":"9270_CR19","unstructured":"Jiang, A. X., Procaccia, A. D., Qian, Y., Shah, N., & Tambe, M. (2013). Defender (mis)coordination in security games. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) (pp. 199\u2013206)."},{"key":"9270_CR20","unstructured":"Jiang, A. X., Yin, Z., Zhang, C., Tambe, M., & Kraus, S. (2013). Game-theoretic randomization for security patrolling with dynamic execution uncertainty. In Proceedings of the Twelfth International Conference on Autonomous Agents and Multiagent Systems (pp. 207\u2013214)."},{"key":"9270_CR21","unstructured":"Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ord\u00f3\u00f1ez, F., & Tambe, M. (2009). Computing optimal randomized resource allocations for massive security games. In Proceedings of The Eighth International Conference on Autonomous Agents and Multiagent Systems (pp. 233\u2013239)."},{"key":"9270_CR22","unstructured":"Korzhyk, D., Conitzer, V., & Parr, R. (2011). Security games with multiple attacker resources. In Proceedings of the Twenty-second International Joint Conference on Artificial Intelligence (IJCAI) (pp. 273\u2013279)."},{"key":"9270_CR23","unstructured":"Korzhyk, D., Conitzer, V., & Parr, R. (2011). Solving stackelberg games with uncertain observability. In Proceedings of the Tenth International Conference on Agents and Multi-agent Systems (AAMAS) (pp. 1013\u20131020)."},{"key":"9270_CR24","doi-asserted-by":"crossref","unstructured":"Letchford, J., & Conitzer, V. (2013). Solving security games on graphs via marginal probabilities. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) (pp. 591\u2013597).","DOI":"10.1609\/aaai.v27i1.8688"},{"key":"9270_CR25","unstructured":"Letchford, J., & Vorobeychik, Y. (2013). Optimal interdiction of attack plans. In Proceedings of the Twelfth International Conference of Autonomous Agents and Multi-agent Systems (AAMAS) (pp. 199\u2013206)."},{"key":"9270_CR26","unstructured":"Letchford, J., MacDermed, L., Conitzer, V., Parr, R., & Isbell, C. L. (2012). Computing optimal strategies to commit to in stochastic games. In Proceedings of the AAAI Conference on Artificial Intelligence (pp. 1380\u20131386)."},{"key":"9270_CR27","doi-asserted-by":"crossref","unstructured":"Machado, A., Ramalho, G., Zucker, J. D., & Drogoul, A. (2003). Multi-agent patrolling: An empirical analysis of alternative architectures. In Proceedings of the International Conference of Multi-Agent-Based Simulation (pp. 155\u2013170).","DOI":"10.1007\/3-540-36483-8_11"},{"issue":"1","key":"9270_CR28","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser, G. L., Wolsey, L. A., & Fisher, M. L. (1978). An analysis of approximations for maximizing submodular set functions-I. Mathematical Programming, 14(1), 265\u2013294.","journal-title":"Mathematical Programming"},{"issue":"3","key":"9270_CR29","first-page":"1","volume":"3","author":"R Ostling","year":"2011","unstructured":"Ostling, R., Wang, J., Tao-yi, J., Chou, E. Y., & Camerer, C. F. (2011). Testing game theory in the field: Swedish lupi lottery games. American Economic Journal: Microeconomics, 3(3), 1\u201333.","journal-title":"American Economic Journal: Microeconomics"},{"key":"9270_CR30","unstructured":"Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordonez, F., & Kraus, S. (2008). Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In Proceedings of the Seventh International Conference on Autonomous Agents and Multiagent Systems (AAMAS) (pp. 539\u2013547)."},{"key":"9270_CR31","unstructured":"Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., et al. (2008). Deployed armor protection: The application of a game theoretic model for security at the los angeles international airport. In Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS)."},{"key":"9270_CR32","unstructured":"Pita, J., Tambe, M., Kiekintveld, C., Cullen, S., & Steigerwald, E. (2011). GUARDS - Innovative Application of Game Theory for National Airport Security. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) (pp. 2710\u20132715)."},{"key":"9270_CR33","unstructured":"Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., et al. (2012). PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States. In Proceedings of the Eleventh International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) (pp. 13\u201320)."},{"key":"9270_CR34","unstructured":"Shieh, E., Jain, M., Jiang, A. X., & Tambe, M. (2013). Efficiently solving joint activity based security games. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) (pp. 346\u2013352)."},{"key":"9270_CR35","unstructured":"Shieh, E., Jiang, A. X., Yadav, A., Varakantham, P., & Tambe, M. (2014). Unleashing dec-mdps in security games: Enabling effective defender teamwork. In Proceedings of the European Conference on Artificial Intelligence (ECAI) (pp. 2340\u20132345)."},{"key":"9270_CR36","unstructured":"Sless, E., Agmon, N., & Kraus, S. (2014). Multi-robot adversarial patrolling: Facing coordinated attacks. In Proceedings of the Thirteenth International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) (pp. 1093\u20131100)."},{"key":"9270_CR37","volume-title":"Reinforcement learning: An introduction","author":"RS Sutton","year":"1998","unstructured":"Sutton, R. S., & Barto, A. G. (1998). Reinforcement learning: An introduction. Cambridge: MIT Press."},{"key":"9270_CR38","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and game theory: Algorithms, deployed systems, lessons learned","author":"M Tambe","year":"2011","unstructured":"Tambe, M. (2011). Security and game theory: Algorithms, deployed systems, lessons learned. Cambridge: Cambridge University Press."},{"key":"9270_CR39","unstructured":"Tsai, J., Rathi, S., Kiekintveld, C., Ord\u00f3\u00f1ez, F., & Tambe, M. (2009). IRIS\u2014A tool for strategic security allocation in transportation networks. In Proceedings of the Eight International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) (pp. 831\u2013839)."},{"key":"9270_CR40","doi-asserted-by":"crossref","unstructured":"Vanek, O., Bosansky, B., Jakob, M., & Pechoucek, M. (2010). Transiting areas patrolled by a mobile adversary. In IEEE Symposium on Computational Intelligence and Games (CIG), IEEE (pp. 9\u201316).","DOI":"10.1109\/ITW.2010.5593377"},{"key":"9270_CR41","unstructured":"Vanek, O., Jakob, M., Hrstka, O. & Pechoucek, M. (2011). Using multi-agent simulation to improve the security of maritime transit. In MABS 2011."},{"key":"9270_CR42","doi-asserted-by":"crossref","unstructured":"Varakantham, P., Chuin Lau, H., & Yuan, Z. (2013). Scalable randomized patrolling for securing rapid transit networks. In Proceedings of the Conference for Innovative Applications for Artificial Intelligence (IAAI) (pp. 1563\u20131568).","DOI":"10.1609\/aaai.v27i2.19002"},{"key":"9270_CR43","unstructured":"Vorobeychik, Y. & Singh, S. (2012). Computing stackelberg equilibria in discounted stochastic games. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI) (pp. 1478\u20131484)."},{"key":"9270_CR44","doi-asserted-by":"crossref","unstructured":"Yin, Z., Jiang, A., Johnson, M., Tambe, M., Kiekintveld, C., Leyton-Brown, K., et al. (2012). Trusts: Scheduling randomized patrols for fare inspection in transit systems. In Proceedings of the Conference on Innovative Applications for Artificial Intelligence (IAAI) (pp. 59\u201372).","DOI":"10.1609\/aaai.v26i2.18975"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-014-9270-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-014-9270-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-014-9270-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T08:20:00Z","timestamp":1689409200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-014-9270-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,17]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["9270"],"URL":"https:\/\/doi.org\/10.1007\/s10458-014-9270-4","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,17]]}}}