18 June 2012 Exploiting exploration strategies in repeated normal form security games
Author Affiliations +
We describe a method for the estimation of an opponent's utility matrix in a finite repeated game, given that he selects his actions by a known deterministic algorithm with some unknown parameters. We also investigate the prediction, based on the utility matrix estimate, of this opponent's future actions, and a simple method by which the opponent can counter these efforts. These are posed as a feasibility problem and a convex optimization problem, respectively. Simulation results are also presented.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
James Thomas House, James Thomas House, George Cybenko, George Cybenko, } "Exploiting exploration strategies in repeated normal form security games", Proc. SPIE 8359, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI, 835907 (18 June 2012); doi: 10.1117/12.924760; https://doi.org/10.1117/12.924760


Misregistration Effects On Classification Performance
Proceedings of SPIE (October 13 1987)
Detection of constrained signals
Proceedings of SPIE (August 20 2001)
Metrics for evaluating track covariance consistency
Proceedings of SPIE (September 13 2007)

Back to Top