2017
DOI: 10.1016/j.cor.2016.08.013
|View full text |Cite
|
Sign up to set email alerts
|

A two-resource allocation algorithm with an application to large-scale zero-sum defensive games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…To date, many researchers have addressed the attacker‐defender game, where each player seeks to maximize a single objective function under certain constraints. Game theory and the concept of Nash equilibrium have been recognized as suitable tools for studying such strategy‐interaction resource allocation problems for a long time . For example, Zhuang and Bier utilized game theory to identify the best defensive strategy with endogenous attacker effort for countering terrorism and natural disasters.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To date, many researchers have addressed the attacker‐defender game, where each player seeks to maximize a single objective function under certain constraints. Game theory and the concept of Nash equilibrium have been recognized as suitable tools for studying such strategy‐interaction resource allocation problems for a long time . For example, Zhuang and Bier utilized game theory to identify the best defensive strategy with endogenous attacker effort for countering terrorism and natural disasters.…”
Section: Introductionmentioning
confidence: 99%
“…Game theory and the concept of Nash equilibrium have been recognized as suitable tools for studying such strategy-interaction resource allocation problems for a long time. [4][5][6] For example, Zhuang and Bier 7 utilized game theory to identify the best defensive strategy with endogenous attacker effort for countering terrorism and natural disasters. Bier et al 8 explored a rigorous computational model for the optimal allocation of resources among potential terrorist targets.…”
Section: Introductionmentioning
confidence: 99%
“…Allocating resources by optimising an objective function, in particular, a linear one is one of the classic problems in operations research which can be traced back to the foundation of linear programming [26, 27]. Studying this problem by classic approaches gives a static, fix results.…”
Section: Introductionmentioning
confidence: 99%
“…1, if B s new operation loops can cover R s threat nodes 0, if B s new operation loops can not cover R s threat nodes (11) In summary, the cumulative threat (D B ) expression is:…”
Section: Evaluation Of Threat Reduction Effectsmentioning
confidence: 99%