An et al., 2013 - Google Patents
A deployed quantal response-based patrol planning system for the US Coast GuardAn et al., 2013
View PDF- Document ID
- 2242655911710354962
- Author
- An B
- Ordóñez F
- Tambe M
- Shieh E
- Yang R
- Baldwin C
- DiRenzo III J
- Moretti K
- Maule B
- Meyer G
- Publication year
- Publication venue
- Interfaces
External Links
Snippet
In this paper, we describe the model, theory developed, and deployment of PROTECT, a game-theoretic system that the United States Coast Guard (USCG) uses to schedule patrols in the Port of Boston. The USCG evaluated PROTECT's deployment in the Port of Boston as …
- 230000004044 response 0 title abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0631—Resource planning, allocation or scheduling for a business operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
Similar Documents
Publication | Publication Date | Title |
---|---|---|
An et al. | A deployed quantal response-based patrol planning system for the US Coast Guard | |
An et al. | PROTECT--A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard | |
Tambe | Security and game theory: algorithms, deployed systems, lessons learned | |
Auerswald et al. | Seeds of disaster, roots of response: How private action can reduce public vulnerability | |
Graham et al. | A COIN-inspired synthetic dataset for qualitative evaluation of hard and soft fusion systems | |
Jain et al. | Security games applied to real-world: Research contributions and challenges | |
Snyder et al. | Measuring cybersecurity and cyber resiliency | |
Moon et al. | Modeling and simulating command and control: for organizations under extreme situations | |
Lamm et al. | Assessing and managing risks to information assurance: A methodological approach | |
Laskey et al. | Combat Identification with bayesian networks | |
Walsh et al. | Exploring the feasibility and utility of machine learning-assisted command and control: volume 2, supporting technical analysis | |
Shieh et al. | Protect in the ports of Boston, New York and beyond: experiences in deploying Stackelberg security games with quantal response | |
An et al. | Game theory for security: An important challenge for multiagent systems | |
Kott et al. | Toward a Research Agenda in Adversarial Reasoning: Computational Approaches to Anticipating the Opponent's Intent and Actions | |
SENGLAUB | Course of action analysis within an effects-based operational context | |
Madia | Homeland security organizations design contingencies in complex environments | |
Falcone | Machine learning systems in nuclear command, control, and communications architecture: Opportunities, limitations, and recommendations for strategic commanders | |
Davis et al. | A composite approach to Air force planning | |
Yau et al. | An exploratory analysis on the effects of information superiority on battle outcomes | |
Alkire et al. | Enhancing Assessments of Space Mission Assurance | |
Paley et al. | Designing optimal organizational structures for combat information centers in the next generation of navy ships | |
Goodwill | The Autonomous Attack Aviation Problem | |
Moon et al. | Tag Gon Kim | |
Santiago | Cybersecurity Risk Management Process For Unmanned Aerial Systems (Uas) At The Strategic Level | |
WALSH et al. | Assisted Command and Control |