Learn More
Recent real-world deployments of Stackelberg security games make it critical that we address human adversaries' bounded rationality in computing optimal strategies. To that end, this paper provides three key contributions: (i) new efficient algorithms for computing optimal strategic solutions using Prospect Theory and Quantal Response Equilibrium; (ii) the(More)
Game-theoretic approaches have been proposed for addressing the complex problem of assigning limited security resources to protect a critical set of targets. However, many of the standard assumptions fail to address human adversaries who security forces will likely face. To address this challenge, previous research has attempted to integrate models of human(More)
Stackelberg games have garnered significant attention in recent years given their deployment for real world security. Most of these systems, such as ARMOR, IRIS and GUARDS have adopted the standard game-theoretical assumption that adversaries are perfectly rational, which is standard in the game theory literature. This assumption may not hold in real-world(More)
This study examined the utility of the TELE, a telephone assessment for dementia, in a sample of 269 individuals that was not selected on the basis of previous dementia diagnosis. Thus, the conditions of the study reflect the actual situation in which a screening instrument might be employed. Scores on TELE were compared to dementia diagnoses. Using the(More)
It becomes critical to address human adversaries' bounded rationality in security games as the real-world deployment of such games spreads. To that end, the key contributions of this paper include: (i) new efficient algorithms for computing optimal strategic solutions using Prospect Theory and Quantal Response Equilibrium; (ii) the most comprehensive(More)
Stackelberg games have recently gained significant attention for resource allocation decisions in security settings. One critical assumption of traditional Stackelberg models is that all players are perfectly rational and that the followers perfectly observe the leader's strategy. However, in real-world security settings, security agencies must deal with(More)
Professor Longstaff is also a lawyer and consultant who has advised clients in the print, broadcast, and telecommunications industries and holds a Master's of Public Administration Acknowledgements The author gratefully acknowledges the following people who reviewed and commented critically on the draft version of this report. Without their consideration,(More)