<?xml version="1.0"?>
<dblpperson name="Branislav Bosansk&#253;" pid="24/5039" n="89">
<person key="homepages/24/5039" mdate="2025-01-10">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<note type="uname">Branislav Bo&#353;ansk&#253;</note>
<note type="affiliation">Czech Technical University in Prague, Department of Computer Science and Engineering</note>
<url>http://cs.felk.cvut.cz/en/people/bosanbra</url>
<url>https://orcid.org/0000-0002-3841-9515</url>
<url>https://www.wikidata.org/entity/Q131118750</url>
</person>
<r><article key="journals/ijar/TomasekHB24" mdate="2024-10-22">
<author orcid="0000-0002-6019-8536" pid="252/4957">Petr Tom&#225;sek</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Iterative algorithms for solving one-sided partially observable stochastic shortest path games.</title>
<pages>109297</pages>
<year>2024</year>
<volume>175</volume>
<journal>Int. J. Approx. Reason.</journal>
<ee>https://doi.org/10.1016/j.ijar.2024.109297</ee>
<url>db/journals/ijar/ijar175.html#TomasekHB24</url>
<stream>streams/journals/ijar</stream>
</article>
</r>
<r><inproceedings key="conf/raid/TsingenopoulosC24" mdate="2025-01-19">
<author orcid="0000-0002-7714-5238" pid="249/1155">Ilias Tsingenopoulos</author>
<author orcid="0000-0003-1421-2058" pid="184/5990">Jacopo Cortellazzi</author>
<author orcid="0000-0002-3841-9515" pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0001-9547-3502" pid="204/5152">Simone Aonzo</author>
<author orcid="0000-0001-6279-4430" pid="12/603">Davy Preuveneers</author>
<author orcid="0000-0002-7710-5092" pid="13/86">Wouter Joosen</author>
<author orcid="0000-0002-1254-1758" pid="149/1452">Fabio Pierazzi</author>
<author orcid="0000-0002-3878-2680" pid="95/5162">Lorenzo Cavallaro</author>
<title>How to Train your Antivirus: RL-based Hardening through the Problem Space.</title>
<pages>130-146</pages>
<year>2024</year>
<booktitle>RAID</booktitle>
<ee>https://doi.org/10.1145/3678890.3678912</ee>
<ee>https://www.wikidata.org/entity/Q131118751</ee>
<crossref>conf/raid/2024</crossref>
<url>db/conf/raid/raid2024.html#TsingenopoulosC24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2402-19027" mdate="2024-10-06">
<author pid="184/5990">Jacopo Cortellazzi</author>
<author pid="249/1155">Ilias Tsingenopoulos</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="204/5152">Simone Aonzo</author>
<author pid="12/603">Davy Preuveneers</author>
<author pid="13/86">Wouter Joosen</author>
<author orcid="0000-0002-1254-1758" pid="149/1452">Fabio Pierazzi</author>
<author pid="95/5162">Lorenzo Cavallaro</author>
<title>How to Train your Antivirus: RL-based Hardening through the Problem-Space.</title>
<year>2024</year>
<volume>abs/2402.19027</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2402.19027</ee>
<url>db/journals/corr/corr2402.html#abs-2402-19027</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2404-09352" mdate="2024-05-15">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="375/1120">Lada Hospodkova</author>
<author pid="263/7115">Michal Najman</author>
<author pid="218/6133">Maria Rigaki</author>
<author pid="375/1345">Elnaz Babayeva</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<title>Counteracting Concept Drift by Learning with Future Malware Predictions.</title>
<year>2024</year>
<volume>abs/2404.09352</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2404.09352</ee>
<url>db/journals/corr/corr2404.html#abs-2404-09352</url>
</article>
</r>
<r><article key="journals/ai/HorakBKK23" mdate="2024-03-19">
<author orcid="0000-0003-0307-6281" pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-7954-9420" pid="136/6061">Vojtech Kovar&#237;k</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Solving zero-sum one-sided partially observable stochastic games.</title>
<pages>103838</pages>
<year>2023</year>
<month>March</month>
<volume>316</volume>
<journal>Artif. Intell.</journal>
<ee>https://doi.org/10.1016/j.artint.2022.103838</ee>
<url>db/journals/ai/ai316.html#HorakBKK23</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2307-13107" mdate="2023-08-01">
<author pid="86/3086">Md. Abu Sayed</author>
<author pid="129/1516">Ahmed H. Anwar</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="45/9386">Charles A. Kamhoua</author>
<title>Cyber Deception against Zero-day Attacks: A Game Theoretic Approach.</title>
<year>2023</year>
<volume>abs/2307.13107</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2307.13107</ee>
<url>db/journals/corr/corr2307.html#abs-2307-13107</url>
</article>
</r>
<r><inproceedings key="conf/gamesec/SayedAKBK22" mdate="2023-02-25">
<author orcid="0000-0002-5560-9150" pid="86/3086">Md. Abu Sayed</author>
<author orcid="0000-0001-8907-3043" pid="129/1516">Ahmed H. Anwar</author>
<author orcid="0000-0003-0615-9584" pid="95/1694">Christopher Kiekintveld</author>
<author orcid="0000-0002-3841-9515" pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0003-2169-5975" pid="45/9386">Charles A. Kamhoua</author>
<title>Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach.</title>
<pages>44-63</pages>
<year>2022</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-26369-9_3</ee>
<crossref>conf/gamesec/2022</crossref>
<url>db/conf/gamesec/gamesec2022.html#SayedAKBK22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2208-02694" mdate="2022-08-10">
<author pid="20/1317">Tom&#225;s Pevn&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="87/3587">Petr Somol</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Explaining Classifiers Trained on Raw Hierarchical Multiple-Instance Data.</title>
<year>2022</year>
<volume>abs/2208.02694</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2208.02694</ee>
<url>db/journals/corr/corr2208.html#abs-2208-02694</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2209-03188" mdate="2022-09-26">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="329/4147">Dominik Kouba</author>
<author pid="329/4150">Ondrej Manhal</author>
<author pid="329/4157">Thorsten Sick</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="74/9282">Jakub Kroustek</author>
<author pid="87/3587">Petr Somol</author>
<title>Avast-CTU Public CAPE Dataset.</title>
<year>2022</year>
<volume>abs/2209.03188</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2209.03188</ee>
<url>db/journals/corr/corr2209.html#abs-2209-03188</url>
</article>
</r>
<r><inproceedings key="conf/aaai/CernyLB021" mdate="2023-09-04">
<author pid="32/5231">Jakub Cern&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="42/6178-1">Bo An 0001</author>
<title>Computing Quantal Stackelberg Equilibrium in Extensive-Form Games.</title>
<pages>5260-5268</pages>
<year>2021</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v35i6.16664</ee>
<crossref>conf/aaai/2021</crossref>
<url>db/conf/aaai/aaai2021.html#CernyLB021</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/TomasekHABC21" mdate="2024-12-24">
<author orcid="0000-0002-6019-8536" pid="252/4957">Petr Tom&#225;sek</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="205/9444">Aditya Aradhye</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="92/5602">Krishnendu Chatterjee</author>
<title>Solving Partially Observable Stochastic Shortest-Path Games.</title>
<pages>4182-4189</pages>
<year>2021</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2021/575</ee>
<crossref>conf/ijcai/2021</crossref>
<url>db/conf/ijcai/ijcai2021.html#TomasekHABC21</url>
</inproceedings>
</r>
<r><proceedings key="conf/gamesec/2021" mdate="2021-11-05">
<editor orcid="0000-0002-3841-9515" pid="24/5039">Branislav Bosansk&#253;</editor>
<editor orcid="0000-0002-6244-2918" pid="39/3618">Cleotilde Gonzalez</editor>
<editor orcid="0000-0003-2821-2489" pid="79/5181">Stefan Rass</editor>
<editor pid="26/9089">Arunesh Sinha</editor>
<title>Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings</title>
<booktitle>GameSec</booktitle>
<publisher>Springer</publisher>
<year>2021</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>13061</volume>
<isbn>978-3-030-90369-5</isbn>
<isbn>978-3-030-90370-1</isbn>
<ee>https://doi.org/10.1007/978-3-030-90370-1</ee>
<url>db/conf/gamesec/gamesec2021.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2110-11987" mdate="2021-10-28">
<author pid="304/7779">Marek Galovic</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<title>Improving Robustness of Malware Classifiers using Adversarial Strings Generated from Perturbed Latent Representations.</title>
<year>2021</year>
<volume>abs/2110.11987</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2110.11987</ee>
<url>db/journals/corr/corr2110.html#abs-2110-11987</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2111-02111" mdate="2021-11-05">
<author pid="205/9444">Aditya Aradhye</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="305/3810">Michael Hlav&#225;cek</author>
<title>Computing Stackelberg Equilibrium with Memory in Sequential Games.</title>
<year>2021</year>
<volume>abs/2111.02111</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2111.02111</ee>
<url>db/journals/corr/corr2111.html#abs-2111-02111</url>
</article>
</r>
<r><article key="journals/ai/CermakLB20" mdate="2020-04-11">
<author pid="131/5318">Jir&#237; Cerm&#225;k</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Automated construction of bounded-loss imperfect-recall abstractions in extensive-form games.</title>
<pages>103248</pages>
<year>2020</year>
<volume>282</volume>
<journal>Artif. Intell.</journal>
<ee>https://doi.org/10.1016/j.artint.2020.103248</ee>
<url>db/journals/ai/ai282.html#CermakLB20</url>
</article>
</r>
<r><inproceedings key="conf/atal/PetrovaDAHNBL20" mdate="2024-03-19">
<author pid="208/8339">Olga Petrova</author>
<author pid="151/0822">Karel Durkota</author>
<author pid="248/1631">Galina Alperovich</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="263/7115">Michal Najman</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<title>Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection.</title>
<pages>1969-1971</pages>
<year>2020</year>
<booktitle>AAMAS</booktitle>
<ee>https://dl.acm.org/doi/10.5555/3398761.3399044</ee>
<ee type="oa">https://www.ifaamas.org/Proceedings/aamas2020/pdfs/p1969.pdf</ee>
<crossref>conf/atal/2020</crossref>
<url>db/conf/atal/aamas2020.html#PetrovaDAHNBL20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/TomasekBN20" mdate="2024-12-24">
<author orcid="0000-0002-6019-8536" pid="252/4957">Petr Tom&#225;sek</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="117/4935">Thanh Hong Nguyen</author>
<title>Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks.</title>
<pages>385-404</pages>
<year>2020</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-64793-3_21</ee>
<crossref>conf/gamesec/2020</crossref>
<url>db/conf/gamesec/gamesec2020.html#TomasekBN20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/CernyLB020" mdate="2020-07-13">
<author pid="32/5231">Jakub Cern&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="42/6178-1">Bo An 0001</author>
<title>Dinkelbach-Type Algorithm for Computing Quantal Stackelberg Equilibrium.</title>
<pages>246-253</pages>
<year>2020</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2020/35</ee>
<crossref>conf/ijcai/2020</crossref>
<url>db/conf/ijcai/ijcai2020.html#CernyLB020</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/CermakLB20" mdate="2020-07-15">
<author pid="131/5318">Jir&#237; Cerm&#225;k</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Automated Construction of Bounded-Loss Imperfect-Recall Abstractions in Extensive-Form Games (Extended Abstract).</title>
<pages>5030-5034</pages>
<year>2020</year>
<note>Journal track</note>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2020/701</ee>
<crossref>conf/ijcai/2020</crossref>
<url>db/conf/ijcai/ijcai2020.html#CermakLB20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigecom/CernyB020" mdate="2025-01-19">
<author pid="32/5231">Jakub Cern&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="42/6178-1">Bo An 0001</author>
<title>Finite State Machines Play Extensive-Form Games.</title>
<pages>509-533</pages>
<year>2020</year>
<booktitle>EC</booktitle>
<ee>https://doi.org/10.1145/3391403.3399517</ee>
<ee>https://www.wikidata.org/entity/Q130980585</ee>
<crossref>conf/sigecom/2020</crossref>
<url>db/conf/sigecom/sigecom2020.html#CernyB020</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2004-10638" mdate="2024-03-19">
<author pid="208/8339">Olga Petrova</author>
<author pid="151/0822">Karel Durkota</author>
<author pid="248/1631">Galina Alperovich</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="263/7115">Michal Najman</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<title>Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection.</title>
<year>2020</year>
<volume>abs/2004.10638</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2004.10638</ee>
<url>db/journals/corr/corr2004.html#abs-2004-10638</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2010-11243" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="136/6061">Vojtech Kovar&#237;k</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Solving Zero-Sum One-Sided Partially Observable Stochastic Games.</title>
<year>2020</year>
<volume>abs/2010.11243</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2010.11243</ee>
<url>db/journals/corr/corr2010.html#abs-2010-11243</url>
</article>
</r>
<r><article key="journals/compsec/DurkotaLBKP19" mdate="2023-08-28">
<author pid="151/0822">Karel Durkota</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Hardening networks against strategic attackers using attack graph games.</title>
<year>2019</year>
<volume>87</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2019.101578</ee>
<ee>https://www.wikidata.org/entity/Q115058109</ee>
<url>db/journals/compsec/compsec87.html#DurkotaLBKP19</url>
</article>
</r>
<r><article key="journals/compsec/HorakBTKK19" mdate="2024-12-24">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-6019-8536" pid="252/4957">Petr Tom&#225;sek</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="45/9386">Charles A. Kamhoua</author>
<title>Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games.</title>
<year>2019</year>
<volume>87</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2019.101579</ee>
<ee>https://www.wikidata.org/entity/Q115058061</ee>
<url>db/journals/compsec/compsec87.html#HorakBTKK19</url>
</article>
</r>
<r><inproceedings key="conf/aaai/HorakB19" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Solving Partially Observable Stochastic Games with Public Observations.</title>
<pages>2029-2036</pages>
<year>2019</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v33i01.33012029</ee>
<crossref>conf/aaai/2019</crossref>
<url>db/conf/aaai/aaai2019.html#HorakB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cogsci/GutierrezCBABKG19" mdate="2025-12-03">
<author pid="178/8704">Marcus Gutierrez</author>
<author pid="32/5231">Jakub Cern&#253;</author>
<author pid="09/2998">Noam Ben-Asher</author>
<author pid="249/6771">Efrat Aharonov-Majar</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="39/3618">Cleotilde Gonzalez</author>
<title>Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem.</title>
<pages>394-400</pages>
<year>2019</year>
<booktitle>CogSci</booktitle>
<ee type="oa">https://escholarship.org/uc/item/2gn3w566</ee>
<crossref>conf/cogsci/2019</crossref>
<url>db/conf/cogsci/cogsci2019.html#GutierrezCBABKG19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/NguyenYBL19" mdate="2020-10-25">
<author pid="117/4935">Thanh Hong Nguyen</author>
<author pid="121/3511">Amulya Yadav</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0001-5194-1271" pid="65/1700-2">Yu Liang 0002</author>
<title>Tackling Sequential Attacks in Security Games.</title>
<pages>331-351</pages>
<year>2019</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-32430-8_20</ee>
<crossref>conf/gamesec/2019</crossref>
<url>db/conf/gamesec/gamesec2019.html#NguyenYBL19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/WangTBA19" mdate="2020-05-06">
<author pid="199/6413">Xinrun Wang</author>
<author pid="67/2667">Milind Tambe</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="42/6178-1">Bo An 0001</author>
<title>When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games.</title>
<pages>542-562</pages>
<year>2019</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-32430-8_32</ee>
<crossref>conf/gamesec/2019</crossref>
<url>db/conf/gamesec/gamesec2019.html#WangTBA19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ictai/RytirCB19" mdate="2023-09-30">
<author orcid="0000-0003-3635-3257" pid="201/8839">Pavel Ryt&#237;r</author>
<author pid="52/604">Luk&#225;s Chrpa</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Using Classical Planning in Adversarial Problems.</title>
<pages>1335-1340</pages>
<year>2019</year>
<booktitle>ICTAI</booktitle>
<ee>https://doi.org/10.1109/ICTAI.2019.00185</ee>
<crossref>conf/ictai/2019</crossref>
<url>db/conf/ictai/ictai2019.html#RytirCB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/HorakBKK19" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="45/9386">Charles A. Kamhoua</author>
<title>Compact Representation of Value Function in Partially Observable Stochastic Games.</title>
<year>2019</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2019/50</ee>
<crossref>conf/ijcai/2019</crossref>
<url>db/conf/ijcai/ijcai2019.html#HorakBKK19</url>
<pages>350-356</pages>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-05511" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="45/9386">Charles A. Kamhoua</author>
<title>Compact Representation of Value Function in Partially Observable Stochastic Games.</title>
<year>2019</year>
<volume>abs/1903.05511</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.05511</ee>
<url>db/journals/corr/corr1903.html#abs-1903-05511</url>
</article>
</r>
<r><article key="journals/ijar/CermakBHLP18" mdate="2024-03-19">
<author pid="131/5318">Jir&#237; Cerm&#225;k</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Approximating maxmin strategies in imperfect recall games using A-loss recall property.</title>
<pages>290-326</pages>
<year>2018</year>
<volume>93</volume>
<journal>Int. J. Approx. Reason.</journal>
<ee>https://doi.org/10.1016/j.ijar.2017.11.010</ee>
<ee>https://www.wikidata.org/entity/Q59209593</ee>
<url>db/journals/ijar/ijar93.html#CermakBHLP18</url>
</article>
</r>
<r><inproceedings key="conf/gamesec/BasakCGCKJBK18" mdate="2019-07-05">
<author orcid="0000-0001-8427-038X" pid="77/9586">Anjon Basak</author>
<author orcid="0000-0002-9407-3782" pid="32/5231">Jakub Cern&#253;</author>
<author orcid="0000-0003-0746-5137" pid="178/8704">Marcus Gutierrez</author>
<author orcid="0000-0001-5599-9462" pid="223/7487">Shelby R. Curtis</author>
<author orcid="0000-0003-2169-5975" pid="45/9386">Charles A. Kamhoua</author>
<author orcid="0000-0003-4766-4827" pid="47/3367-3">Daniel Jones 0003</author>
<author orcid="0000-0002-3841-9515" pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0003-0615-9584" pid="95/1694">Christopher Kiekintveld</author>
<title>An Initial Study of Targeted Personality Models in the FlipIt Game.</title>
<pages>623-636</pages>
<year>2018</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01554-1_36</ee>
<crossref>conf/gamesec/2018</crossref>
<url>db/conf/gamesec/gamesec2018.html#BasakCGCKJBK18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/HorakBC18" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-4561-241X" pid="92/5602">Krishnendu Chatterjee</author>
<title>Goal-HSVI: Heuristic Search Value Iteration for Goal POMDPs.</title>
<pages>4764-4770</pages>
<year>2018</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2018/662</ee>
<crossref>conf/ijcai/2018</crossref>
<url>db/conf/ijcai/ijcai2018.html#HorakBC18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigecom/CernyBK18" mdate="2021-04-22">
<author pid="32/5231">Jakub Cern&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Incremental Strategy Generation for Stackelberg Equilibria in Extensive-Form Games.</title>
<pages>151-168</pages>
<year>2018</year>
<booktitle>EC</booktitle>
<ee>https://doi.org/10.1145/3219166.3219219</ee>
<crossref>conf/sigecom/2018</crossref>
<url>db/conf/sigecom/sigecom2018.html#CernyBK18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1803-05392" mdate="2018-08-13">
<author pid="131/5318">Jiri Cermak</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Constructing Imperfect Recall Abstractions to Solve Large Extensive-Form Games.</title>
<year>2018</year>
<volume>abs/1803.05392</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1803.05392</ee>
<url>db/journals/corr/corr1803.html#abs-1803-05392</url>
</article>
</r>
<r><article key="journals/teco/BosanskyBHLM17" mdate="2018-11-06">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="90/7113">Simina Br&#226;nzei</author>
<author orcid="0000-0002-1155-8072" pid="54/2046">Kristoffer Arnsfelt Hansen</author>
<author pid="87/6541">Troels Bjerre Lund</author>
<author pid="m/PBMiltersen">Peter Bro Miltersen</author>
<title>Computation of Stackelberg Equilibria of Finite Sequential Games.</title>
<pages>23:1-23:24</pages>
<year>2017</year>
<volume>5</volume>
<journal>ACM Trans. Economics and Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/3133242</ee>
<url>db/journals/teco/teco5.html#BosanskyBHLM17</url>
</article>
</r>
<r><inproceedings key="conf/aaai/CermakB17" mdate="2025-12-10">
<author pid="131/5318">Jiri Cermak</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Towards Solving Imperfect Recall Games.</title>
<year>2017</year>
<booktitle>AAAI Workshops</booktitle>
<ee>https://aaai.org/papers/aaaiw-ws0384-17-15192/</ee>
<crossref>conf/aaai/2017w</crossref>
<url>db/conf/aaai/aaai2017w.html#CermakB17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aaai/CermakBP17" mdate="2025-12-10">
<author pid="131/5318">Jiri Cermak</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Combining Incremental Strategy Generation and Branch and Bound Search for Computing Maxmin Strategies in Imperfect Recall Games.</title>
<year>2017</year>
<booktitle>AAAI Workshops</booktitle>
<ee>https://aaai.org/papers/aaaiw-ws0382-17-15190/</ee>
<crossref>conf/aaai/2017w</crossref>
<url>db/conf/aaai/aaai2017w.html#CermakBP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aaai/GuoABK17" mdate="2025-12-10">
<author pid="74/4904">Qingyu Guo</author>
<author pid="42/6178-1">Bo An 0001</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Strategic Information Revelation and Commitment in Security Games.</title>
<year>2017</year>
<booktitle>AAAI Workshops</booktitle>
<ee>https://aaai.org/papers/aaaiw-ws0305-17-15104/</ee>
<crossref>conf/aaai/2017w</crossref>
<url>db/conf/aaai/aaai2017w.html#GuoABK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aaai/HorakBP17" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Heuristic Search Value Iteration for One-Sided Partially Observable Stochastic Games.</title>
<pages>558-564</pages>
<year>2017</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v31i1.10597</ee>
<crossref>conf/aaai/2017</crossref>
<url>db/conf/aaai/aaai2017.html#HorakBP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/CermakBP17" mdate="2017-05-11">
<author pid="131/5318">Jir&#237; Cerm&#225;k</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Combining Incremental Strategy Generation and Branch and Bound Search for Computing Maxmin Strategies in Imperfect Recall Games.</title>
<pages>902-910</pages>
<year>2017</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=3091253</ee>
<crossref>conf/atal/2017</crossref>
<url>db/conf/atal/aamas2017.html#CermakBP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/DurkotaLKHBP17" mdate="2024-03-19">
<author pid="151/0822">Karel Durkota</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-5768-9713" pid="20/1317">Tom&#225;s Pevn&#253;</author>
<title>Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.</title>
<pages>171-192</pages>
<year>2017</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-68711-7_10</ee>
<crossref>conf/gamesec/2017</crossref>
<url>db/conf/gamesec/gamesec2017.html#DurkotaLKHBP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/HorakZB17" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="03/6207">Quanyan Zhu</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security.</title>
<pages>273-294</pages>
<year>2017</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-68711-7_15</ee>
<crossref>conf/gamesec/2017</crossref>
<url>db/conf/gamesec/gamesec2017.html#HorakZB17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icaart/BosanskyCHP17" mdate="2024-03-19">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="131/5318">Jiri Cermak</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Computing Maxmin Strategies in Extensive-form Zero-sum Games with Imperfect Recall.</title>
<pages>63-74</pages>
<year>2017</year>
<booktitle>ICAART (2)</booktitle>
<ee>https://doi.org/10.5220/0006121200630074</ee>
<crossref>conf/icaart/2017-2</crossref>
<url>db/conf/icaart/icaart2017-2.html#BosanskyCHP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icaart/HorakB17" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Dynamic Programming for One-sided Partially Observable Pursuit-evasion Games.</title>
<pages>503-510</pages>
<year>2017</year>
<booktitle>ICAART (2)</booktitle>
<ee>https://doi.org/10.5220/0006190605030510</ee>
<crossref>conf/icaart/2017-2</crossref>
<url>db/conf/icaart/icaart2017-2.html#HorakB17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/CermakBL17" mdate="2019-08-20">
<author pid="131/5318">Jiri Cermak</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<title>An Algorithm for Constructing and Solving Imperfect Recall Abstractions of Large Extensive-Form Games.</title>
<pages>936-942</pages>
<year>2017</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2017/130</ee>
<crossref>conf/ijcai/2017</crossref>
<url>db/conf/ijcai/ijcai2017.html#CermakBL17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/GuoABK17" mdate="2020-05-06">
<author pid="74/4904">Qingyu Guo</author>
<author pid="42/6178-1">Bo An 0001</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Comparing Strategic Secrecy and Stackelberg Commitment in Security Games.</title>
<pages>3691-3699</pages>
<year>2017</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2017/516</ee>
<crossref>conf/ijcai/2017</crossref>
<url>db/conf/ijcai/ijcai2017.html#GuoABK17</url>
</inproceedings>
</r>
<r><article key="journals/ai/BosanskyLLCW16" mdate="2019-06-02">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author pid="64/10094">Marc Lanctot</author>
<author pid="131/5318">Jir&#237; Cerm&#225;k</author>
<author orcid="0000-0002-0125-0824" pid="32/436">Mark H. M. Winands</author>
<title>Algorithms for computing strategies in two-player simultaneous move games.</title>
<pages>1-40</pages>
<year>2016</year>
<volume>237</volume>
<journal>Artif. Intell.</journal>
<ee>https://doi.org/10.1016/j.artint.2016.03.005</ee>
<ee>https://www.wikidata.org/entity/Q59209595</ee>
<url>db/journals/ai/ai237.html#BosanskyLLCW16</url>
</article>
</r>
<r><article key="journals/expert/DurkotaLKBP16" mdate="2021-10-14">
<author pid="151/0822">Karel Durkota</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Case Studies of Network Defense with Attack Graph Games.</title>
<pages>24-30</pages>
<year>2016</year>
<volume>31</volume>
<journal>IEEE Intell. Syst.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MIS.2016.74</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MIS.2016.74</ee>
<ee>https://www.wikidata.org/entity/Q59209596</ee>
<url>db/journals/expert/expert31.html#DurkotaLKBP16</url>
</article>
</r>
<r><inproceedings key="conf/aaai/CermakBDLK16" mdate="2023-09-04">
<author pid="131/5318">Jiri Cermak</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="151/0822">Karel Durkota</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games.</title>
<pages>439-445</pages>
<year>2016</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v30i1.10045</ee>
<crossref>conf/aaai/2016</crossref>
<url>db/conf/aaai/aaai2016.html#CermakBDLK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/HorakB16" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion Games.</title>
<pages>435-454</pages>
<year>2016</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-47413-7_25</ee>
<crossref>conf/gamesec/2016</crossref>
<url>db/conf/gamesec/gamesec2016.html#HorakB16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/HorakB16" mdate="2024-03-19">
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Dynamic Programming for One-Sided Partially Observable Pursuit-Evasion Games.</title>
<year>2016</year>
<volume>abs/1606.06271</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1606.06271</ee>
<url>db/journals/corr/corr1606.html#HorakB16</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/BosanskyCHP16" mdate="2024-03-19">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="131/5318">Jiri Cermak</author>
<author pid="57/10426-2">Karel Hor&#225;k 0002</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Computing Maxmin Strategies in Extensive-Form Zero-Sum Games with Imperfect Recall.</title>
<year>2016</year>
<volume>abs/1608.01510</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1608.01510</ee>
<url>db/journals/corr/corr1608.html#BosanskyCHP16</url>
</article>
</r>
<r><inproceedings key="conf/aaai/BosanskyC15" mdate="2023-09-18">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="131/5318">Jiri Cermak</author>
<title>Sequence-Form Algorithm for Computing Stackelberg Equilibria in Extensive-Form Games.</title>
<pages>805-811</pages>
<year>2015</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v29i1.9304</ee>
<crossref>conf/aaai/2015</crossref>
<url>db/conf/aaai/aaai2015.html#BosanskyC15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aaai/BosanskyJTK15" mdate="2023-09-18">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="59/3808">Albert Xin Jiang</author>
<author pid="67/2667">Milind Tambe</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies.</title>
<pages>812-818</pages>
<year>2015</year>
<booktitle>AAAI</booktitle>
<ee type="oa">https://doi.org/10.1609/aaai.v29i1.9319</ee>
<crossref>conf/aaai/2015</crossref>
<url>db/conf/aaai/aaai2015.html#BosanskyJTK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/DurkotaLKB15" mdate="2015-05-15">
<author pid="151/0822">Karel Durkota</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs.</title>
<pages>1773-1774</pages>
<year>2015</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2773429</ee>
<crossref>conf/atal/2015</crossref>
<url>db/conf/atal/aamas2015.html#DurkotaLKB15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/CermakBG15" mdate="2016-07-25">
<author pid="131/5318">Jir&#237; Cerm&#225;k</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="g/NicolaGatti">Nicola Gatti 0001</author>
<title>Strategy Effectiveness of Game-Theoretical Solution Concepts in Extensive-Form General-Sum Games.</title>
<pages>1813-1814</pages>
<year>2015</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2773450</ee>
<crossref>conf/atal/2015</crossref>
<url>db/conf/atal/aamas2015.html#CermakBG15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/DurkotaLBK15" mdate="2019-06-02">
<author pid="151/0822">Karel Durkota</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Approximate Solutions for Attack Graph Games with Imperfect Information.</title>
<pages>228-249</pages>
<year>2015</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-25594-1_13</ee>
<ee>https://www.wikidata.org/entity/Q59209600</ee>
<crossref>conf/gamesec/2015</crossref>
<url>db/conf/gamesec/gamesec2015.html#DurkotaLBK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/DurkotaLBK15" mdate="2019-08-20">
<author pid="151/0822">Karel Durkota</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<title>Optimal Network Security Hardening Using Attack Graph Games.</title>
<pages>526-532</pages>
<year>2015</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">http://ijcai.org/Abstract/15/080</ee>
<crossref>conf/ijcai/2015</crossref>
<url>db/conf/ijcai/ijcai2015.html#DurkotaLBK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wine/BosanskyBHMS15" mdate="2020-02-04">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="90/7113">Simina Br&#226;nzei</author>
<author orcid="0000-0002-1155-8072" pid="54/2046">Kristoffer Arnsfelt Hansen</author>
<author pid="m/PBMiltersen">Peter Bro Miltersen</author>
<author pid="87/6541">Troels Bjerre S&#248;rensen</author>
<title>Computation of Stackelberg Equilibria of Finite Sequential Games.</title>
<pages>201-215</pages>
<year>2015</year>
<booktitle>WINE</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-48995-6_15</ee>
<crossref>conf/wine/2015</crossref>
<url>db/conf/wine/wine2015.html#BosanskyBHMS15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/BosanskyBHMS15" mdate="2018-08-13">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="90/7113">Simina Br&#226;nzei</author>
<author pid="54/2046">Kristoffer Arnsfelt Hansen</author>
<author pid="m/PBMiltersen">Peter Bro Miltersen</author>
<author pid="87/6541">Troels Bjerre S&#248;rensen</author>
<title>Computation of Stackelberg Equilibria of Finite Sequential Games.</title>
<year>2015</year>
<volume>abs/1507.07677</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1507.07677</ee>
<url>db/journals/corr/corr1507.html#BosanskyBHMS15</url>
</article>
</r>
<r><article key="journals/jair/BosanskyKLP14" mdate="2021-10-14">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information.</title>
<pages>829-866</pages>
<year>2014</year>
<volume>51</volume>
<journal>J. Artif. Intell. Res.</journal>
<ee type="oa">https://doi.org/10.1613/jair.4477</ee>
<url>db/journals/jair/jair51.html#BosanskyKLP14</url>
</article>
</r>
<r><inproceedings key="conf/atal/AbaffyBRBKK14" mdate="2019-08-30">
<author pid="151/3707">Michal Abaffy</author>
<author pid="18/3197">Tom&#225;s Br&#225;zdil</author>
<author pid="06/417">Vojtech Reh&#225;k</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="k/AntoninKucera">Anton&#237;n Kucera 0001</author>
<author pid="43/8180">Jan Krc&#225;l</author>
<title>Solving adversarial patrolling games with bounded error: (extended abstract).</title>
<pages>1617-1618</pages>
<year>2014</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2616090</ee>
<crossref>conf/atal/2014</crossref>
<url>db/conf/atal/aamas2014.html#AbaffyBRBKK14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecai/CermakBL14" mdate="2025-01-15">
<author pid="131/5318">Jir&#237; Cerm&#225;k</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<title>Practical Performance of Refinements of Nash Equilibria in Extensive-Form Zero-Sum Games.</title>
<pages>201-206</pages>
<year>2014</year>
<booktitle>ECAI</booktitle>
<ee type="oa">https://doi.org/10.3233/978-1-61499-419-0-201</ee>
<crossref>conf/ecai/2014</crossref>
<url>db/conf/ecai/ecai2014.html#CermakBL14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/BosanskyKLCP13" mdate="2013-06-28">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="131/5318">Jiri Cermak</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games.</title>
<pages>335-342</pages>
<year>2013</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2484975</ee>
<crossref>conf/atal/2013</crossref>
<url>db/conf/atal/aamas2013.html#BosanskyKLCP13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/Bosansky13" mdate="2013-06-28">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Solving extensive-form games with double-oracle methods.</title>
<pages>1423-1424</pages>
<year>2013</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2485257</ee>
<crossref>conf/atal/2013</crossref>
<url>db/conf/atal/aamas2013.html#Bosansky13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/BosanskyLCVP13" mdate="2022-03-08">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="131/5318">Jiri Cermak</author>
<author pid="133/1989">Roman Vitek</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Using Double-Oracle Method and Serialized Alpha-Beta Search for Pruning in Simultaneous Move Games.</title>
<year>2013</year>
<booktitle>IJCAI</booktitle>
<ee type="archive">http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6815</ee>
<ee type="oa">http://ijcai.org/Abstract/13/018</ee>
<crossref>conf/ijcai/2013</crossref>
<url>db/conf/ijcai/ijcai2013.html#BosanskyLCVP13</url>
<pages>48-54</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/nips/LisyKLB13" mdate="2021-01-21">
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="136/6061">Vojtech Kovar&#237;k</author>
<author pid="64/10094">Marc Lanctot</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Convergence of Monte Carlo Tree Search in Simultaneous Move Games.</title>
<pages>2112-2120</pages>
<year>2013</year>
<booktitle>NIPS</booktitle>
<ee type="oa">https://proceedings.neurips.cc/paper/2013/hash/1579779b98ce9edb98dd85606f2c119d-Abstract.html</ee>
<ee type="oa">http://papers.nips.cc/paper/5145-convergence-of-monte-carlo-tree-search-in-simultaneous-move-games</ee>
<crossref>conf/nips/2013</crossref>
<url>db/conf/nips/nips2013.html#LisyKLB13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/LisyKLB13" mdate="2018-08-13">
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="136/6061">Vojtech Kovar&#237;k</author>
<author pid="64/10094">Marc Lanctot</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<title>Convergence of Monte Carlo Tree Search in Simultaneous Move Games.</title>
<year>2013</year>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1310.8613</ee>
<volume>abs/1310.8613</volume>
<url>db/journals/corr/corr1310.html#LisyKLB13</url>
</article>
</r>
<r><inproceedings key="conf/aaaiss/BosanskyVP12" mdate="2013-09-25">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="88/8524">Ondrej Vanek</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Strategy Representation Analysis for Patrolling Games.</title>
<year>2012</year>
<booktitle>AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health</booktitle>
<ee>http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4312</ee>
<crossref>conf/aaaiss/2012-3</crossref>
<url>db/conf/aaaiss/aaaiss2012-03.html#BosanskyVP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aaaiss/VanekBJLP12" mdate="2013-09-25">
<author pid="88/8524">Ondrej Vanek</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="87/141">Michal Jakob</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Extending Security Games to Defenders with Constrained Mobility.</title>
<year>2012</year>
<booktitle>AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health</booktitle>
<ee>http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4276</ee>
<crossref>conf/aaaiss/2012-3</crossref>
<url>db/conf/aaaiss/aaaiss2012-03.html#VanekBJLP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aamas/VanekYJBTP12" mdate="2015-03-19">
<author pid="88/8524">Ondrej Vanek</author>
<author pid="54/3357">Zhengyu Yin</author>
<author pid="55/6591">Manish Jain</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="67/2667">Milind Tambe</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Game-theoretic resource allocation for malicious packet detection in computer networks.</title>
<pages>905-912</pages>
<year>2012</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2343826</ee>
<crossref>conf/atal/2012</crossref>
<url>db/conf/atal/aamas2012.html#VanekYJBTP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aamas/LisyBP12" mdate="2015-03-19">
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Anytime algorithms for multi-agent visibility-based pursuit-evasion games.</title>
<pages>1301-1302</pages>
<year>2012</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2343974</ee>
<crossref>conf/atal/2012</crossref>
<url>db/conf/atal/aamas2012.html#LisyBP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aamas/NovakKLBcP12" mdate="2015-07-07">
<author pid="47/2805-1">Peter Nov&#225;k 0001</author>
<author pid="96/5384">Anton&#237;n Komenda</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="65/9580">Michal C&#225;p</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Tactical operations of multi-robot teams in urban warfare (demonstration).</title>
<pages>1473-1474</pages>
<year>2012</year>
<booktitle>AAMAS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2344067</ee>
<crossref>conf/atal/2012</crossref>
<url>db/conf/atal/aamas2012.html#NovakKLBcP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecai/BosanskyKLP12" mdate="2025-01-15">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information.</title>
<pages>193-198</pages>
<year>2012</year>
<booktitle>ECAI</booktitle>
<ee type="oa">https://doi.org/10.3233/978-1-61499-098-7-193</ee>
<crossref>conf/ecai/2012</crossref>
<url>db/conf/ecai/ecai2012.html#BosanskyKLP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecai/LisyPSBP12" mdate="2025-01-15">
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author pid="85/7359">Radek P&#237;bil</author>
<author orcid="0000-0002-0953-4717" pid="73/7118">Jan Stiborek</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Game-theoretic Approach to Adversarial Plan Recognition.</title>
<pages>546-551</pages>
<year>2012</year>
<booktitle>ECAI</booktitle>
<ee type="oa">https://doi.org/10.3233/978-1-61499-098-7-546</ee>
<crossref>conf/ecai/2012</crossref>
<url>db/conf/ecai/ecai2012.html#LisyPSBP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gamesec/PibilLKBP12" mdate="2021-10-14">
<author pid="85/7359">Radek P&#237;bil</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author pid="95/1694">Christopher Kiekintveld</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Game Theoretic Model of Strategic Honeypot Selection in Computer Networks.</title>
<pages>201-220</pages>
<year>2012</year>
<booktitle>GameSec</booktitle>
<ee>https://doi.org/10.1007/978-3-642-34266-0_12</ee>
<ee>https://www.wikidata.org/entity/Q59209614</ee>
<crossref>conf/gamesec/2012</crossref>
<url>db/conf/gamesec/gamesec2012.html#PibilLKBP12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/BosanskyLJP11" mdate="2011-11-18">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="87/141">Michal Jakob</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Computing time-dependent policies for patrolling games with mobile targets.</title>
<pages>989-996</pages>
<year>2011</year>
<booktitle>AAMAS</booktitle>
<ee>http://portal.acm.org/citation.cfm?id=2034410&#38;CFID=69154334&#38;CFTOKEN=45298625</ee>
<crossref>conf/atal/2011</crossref>
<url>db/conf/atal/aamas2011.html#BosanskyLJP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/VanekJLBP11" mdate="2011-11-18">
<author pid="88/8524">Ondrej Vanek</author>
<author pid="87/141">Michal Jakob</author>
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Iterative game-theoretic route selection for hostile area transit and patrolling.</title>
<pages>1273-1274</pages>
<year>2011</year>
<booktitle>AAMAS</booktitle>
<ee>http://portal.acm.org/citation.cfm?id=2034522&#38;CFID=69154334&#38;CFTOKEN=45298625</ee>
<crossref>conf/atal/2011</crossref>
<url>db/conf/atal/aamas2011.html#VanekJLBP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/JakobVBHP11" mdate="2011-11-18">
<author pid="87/141">Michal Jakob</author>
<author pid="88/8524">Ondrej Vanek</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="28/10481">Ondrej Hrstka</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>AgentC: agent-based system for securing maritime transit.</title>
<pages>1309-1310</pages>
<year>2011</year>
<booktitle>AAMAS</booktitle>
<ee>http://portal.acm.org/citation.cfm?id=2034540&#38;CFID=69154334&#38;CFTOKEN=45298625</ee>
<crossref>conf/atal/2011</crossref>
<url>db/conf/atal/aamas2011.html#JakobVBHP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/holomas/BosanskyLP11" mdate="2021-10-14">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Towards Cooperation in Adversarial Search with Confidentiality.</title>
<pages>246-255</pages>
<year>2011</year>
<booktitle>HoloMAS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-23181-0_24</ee>
<ee>https://www.wikidata.org/entity/Q59209616</ee>
<crossref>conf/holomas/2011</crossref>
<url>db/conf/holomas/holomas2011.html#BosanskyLP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itbam/LhotskaBD11" mdate="2020-03-27">
<author orcid="0000-0003-0742-5645" pid="20/5486">Lenka Lhotsk&#225;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="50/10003">Jaromir Dolezal</author>
<title>Integration of Procedural Knowledge in Multi-Agent Systems in Medicine.</title>
<pages>82-95</pages>
<year>2011</year>
<booktitle>ITBAM</booktitle>
<ee>https://doi.org/10.1007/978-3-642-23208-4_8</ee>
<crossref>conf/itbam/2011</crossref>
<url>db/conf/itbam/itbam2011.html#LhotskaBD11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cig/VanekBJP10" mdate="2021-10-14">
<author pid="88/8524">Ondrej Vanek</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="87/141">Michal Jakob</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Transiting areas patrolled by a mobile adversary.</title>
<pages>9-16</pages>
<year>2010</year>
<booktitle>CIG</booktitle>
<ee>https://doi.org/10.1109/ITW.2010.5593377</ee>
<crossref>conf/cig/2010</crossref>
<url>db/conf/cig/cig2010.html#VanekBJP10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cig/LisyBVP10" mdate="2021-10-14">
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="47/4468">Roman Vacul&#237;n</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Agent subset adversarial search for complex non-cooperative domains.</title>
<pages>211-218</pages>
<year>2010</year>
<booktitle>CIG</booktitle>
<ee>https://doi.org/10.1109/ITW.2010.5593351</ee>
<ee>https://www.wikidata.org/entity/Q59209620</ee>
<crossref>conf/cig/2010</crossref>
<url>db/conf/cig/cig2010.html#LisyBVP10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/atal/LisyBJP09" mdate="2018-11-30">
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="87/141">Michal Jakob</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Adversarial search with procedural knowledge heuristic.</title>
<pages>899-906</pages>
<year>2009</year>
<booktitle>AAMAS (2)</booktitle>
<ee>https://dl.acm.org/citation.cfm?id=1558137</ee>
<crossref>conf/atal/2009-2</crossref>
<url>db/conf/atal/aamas2009-2.html#LisyBJP09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icaart/LisyBJP09" mdate="2009-05-19">
<author pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="87/141">Michal Jakob</author>
<author pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Goal-based Adversarial Search - Searching Game Trees in Complex Domains using Goal-based Heuristic.</title>
<pages>53-60</pages>
<year>2009</year>
<booktitle>ICAART</booktitle>
<crossref>conf/icaart/2009</crossref>
<url>db/conf/icaart/icaart2009.html#LisyBJP09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icaart/LisyBJP09a" mdate="2021-10-14">
<author orcid="0000-0002-1647-1507" pid="76/5110">Viliam Lis&#253;</author>
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author pid="87/141">Michal Jakob</author>
<author orcid="0000-0002-2582-6795" pid="p/MichalPechoucek">Michal Pechoucek</author>
<title>Goal-Based Game Tree Search for Complex Domains.</title>
<pages>97-109</pages>
<year>2009</year>
<booktitle>ICAART (Revised Selected Papers)</booktitle>
<ee>https://doi.org/10.1007/978-3-642-11819-7_8</ee>
<ee>https://www.wikidata.org/entity/Q59209622</ee>
<crossref>conf/icaart/2009s</crossref>
<url>db/conf/icaart/icaart2009s.html#LisyBJP09a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hais/BosanskyB08" mdate="2018-11-14">
<author pid="24/5039">Branislav Bosansk&#253;</author>
<author orcid="0000-0001-5945-0514" pid="51/2735">Cyril Brom</author>
<title>Agent-Based Simulation of Business Processes in a Virtual World.</title>
<pages>86-94</pages>
<year>2008</year>
<booktitle>HAIS</booktitle>
<ee>https://doi.org/10.1007/978-3-540-87656-4_12</ee>
<ee>https://www.wikidata.org/entity/Q57705687</ee>
<crossref>conf/hais/2008</crossref>
<url>db/conf/hais/hais2008.html#BosanskyB08</url>
</inproceedings>
</r>
<coauthors n="82" nc="3">
<co c="0"><na f="a/Abaffy:Michal" pid="151/3707">Michal Abaffy</na></co>
<co c="0"><na f="a/Aharonov=Majar:Efrat" pid="249/6771">Efrat Aharonov-Majar</na></co>
<co c="0"><na f="a/Alperovich:Galina" pid="248/1631">Galina Alperovich</na></co>
<co c="0"><na f="a/An_0001:Bo" pid="42/6178-1">Bo An 0001</na></co>
<co c="0"><na f="a/Anwar:Ahmed_H=" pid="129/1516">Ahmed H. Anwar</na></co>
<co c="1"><na f="a/Aonzo:Simone" pid="204/5152">Simone Aonzo</na></co>
<co c="0"><na f="a/Aradhye:Aditya" pid="205/9444">Aditya Aradhye</na></co>
<co c="0"><na f="b/Babayeva:Elnaz" pid="375/1345">Elnaz Babayeva</na></co>
<co c="0"><na f="b/Basak:Anjon" pid="77/9586">Anjon Basak</na></co>
<co c="0"><na f="b/Ben=Asher:Noam" pid="09/2998">Noam Ben-Asher</na></co>
<co c="0"><na f="b/Br=acirc=nzei:Simina" pid="90/7113">Simina Br&#226;nzei</na></co>
<co c="0"><na f="b/Br=aacute=zdil:Tom=aacute=s" pid="18/3197">Tom&#225;s Br&#225;zdil</na></co>
<co c="0"><na f="b/Brom:Cyril" pid="51/2735">Cyril Brom</na></co>
<co c="0"><na f="c/C=aacute=p:Michal" pid="65/9580">Michal C&#225;p</na></co>
<co c="1"><na f="c/Cavallaro:Lorenzo" pid="95/5162">Lorenzo Cavallaro</na></co>
<co c="0" n="2"><na f="c/Cermak:Jiri" pid="131/5318">Jiri Cermak</na><na>Jir&#237; Cerm&#225;k</na></co>
<co c="0"><na f="c/Cern=yacute=:Jakub" pid="32/5231">Jakub Cern&#253;</na></co>
<co c="0"><na f="c/Chatterjee:Krishnendu" pid="92/5602">Krishnendu Chatterjee</na></co>
<co c="0"><na f="c/Chrpa:Luk=aacute=s" pid="52/604">Luk&#225;s Chrpa</na></co>
<co c="1"><na f="c/Cortellazzi:Jacopo" pid="184/5990">Jacopo Cortellazzi</na></co>
<co c="0"><na f="c/Curtis:Shelby_R=" pid="223/7487">Shelby R. Curtis</na></co>
<co c="2"><na f="d/Dolezal:Jaromir" pid="50/10003">Jaromir Dolezal</na></co>
<co c="0"><na f="d/Durkota:Karel" pid="151/0822">Karel Durkota</na></co>
<co c="0"><na f="g/Galovic:Marek" pid="304/7779">Marek Galovic</na></co>
<co c="0"><na f="g/Gatti_0001:Nicola" pid="g/NicolaGatti">Nicola Gatti 0001</na></co>
<co c="0"><na f="g/Gonzalez:Cleotilde" pid="39/3618">Cleotilde Gonzalez</na></co>
<co c="0"><na f="g/Guo:Qingyu" pid="74/4904">Qingyu Guo</na></co>
<co c="0" n="2"><na f="g/Gutierrez:Marcus_Paul" pid="178/8704">Marcus Paul Gutierrez</na><na>Marcus Gutierrez</na></co>
<co c="0"><na f="h/Hansen:Kristoffer_Arnsfelt" pid="54/2046">Kristoffer Arnsfelt Hansen</na></co>
<co c="0"><na f="h/Hlav=aacute=cek:Michael" pid="305/3810">Michael Hlav&#225;cek</na></co>
<co c="0"><na f="h/Hor=aacute=k_0002:Karel" pid="57/10426-2">Karel Hor&#225;k 0002</na></co>
<co c="0"><na f="h/Hospodkova:Lada" pid="375/1120">Lada Hospodkova</na></co>
<co c="0"><na f="h/Hrstka:Ondrej" pid="28/10481">Ondrej Hrstka</na></co>
<co c="0"><na f="j/Jain:Manish" pid="55/6591">Manish Jain</na></co>
<co c="0"><na f="j/Jakob:Michal" pid="87/141">Michal Jakob</na></co>
<co c="0"><na f="j/Jiang:Albert_Xin" pid="59/3808">Albert Xin Jiang</na></co>
<co c="0"><na f="j/Jones_0003:Daniel" pid="47/3367-3">Daniel Jones 0003</na></co>
<co c="1"><na f="j/Joosen:Wouter" pid="13/86">Wouter Joosen</na></co>
<co c="0"><na f="k/Kamhoua:Charles_A=" pid="45/9386">Charles A. Kamhoua</na></co>
<co c="0"><na f="k/Kiekintveld:Christopher" pid="95/1694">Christopher Kiekintveld</na></co>
<co c="0"><na f="k/Komenda:Anton=iacute=n" pid="96/5384">Anton&#237;n Komenda</na></co>
<co c="0"><na f="k/Kouba:Dominik" pid="329/4147">Dominik Kouba</na></co>
<co c="0"><na f="k/Kovar=iacute=k:Vojtech" pid="136/6061">Vojtech Kovar&#237;k</na></co>
<co c="0"><na f="k/Krc=aacute=l:Jan" pid="43/8180">Jan Krc&#225;l</na></co>
<co c="0"><na f="k/Kroustek:Jakub" pid="74/9282">Jakub Kroustek</na></co>
<co c="0"><na f="k/Kucera_0001:Anton=iacute=n" pid="k/AntoninKucera">Anton&#237;n Kucera 0001</na></co>
<co c="0"><na f="l/Lanctot:Marc" pid="64/10094">Marc Lanctot</na></co>
<co c="2"><na f="l/Lhotsk=aacute=:Lenka" pid="20/5486">Lenka Lhotsk&#225;</na></co>
<co c="0"><na f="l/Liang_0002:Yu" pid="65/1700-2">Yu Liang 0002</na></co>
<co c="0"><na f="l/Lis=yacute=:Viliam" pid="76/5110">Viliam Lis&#253;</na></co>
<co c="0" n="2"><na f="l/Lund:Troels_Bjerre" pid="87/6541">Troels Bjerre Lund</na><na>Troels Bjerre S&#248;rensen</na></co>
<co c="0"><na f="m/Manhal:Ondrej" pid="329/4150">Ondrej Manhal</na></co>
<co c="0"><na f="m/Miltersen:Peter_Bro" pid="m/PBMiltersen">Peter Bro Miltersen</na></co>
<co c="0"><na f="n/Najman:Michal" pid="263/7115">Michal Najman</na></co>
<co c="0"><na f="n/Nguyen:Thanh_Hong" pid="117/4935">Thanh Hong Nguyen</na></co>
<co c="0"><na f="n/Nov=aacute=k_0001:Peter" pid="47/2805-1">Peter Nov&#225;k 0001</na></co>
<co c="0"><na f="p/Pechoucek:Michal" pid="p/MichalPechoucek">Michal Pechoucek</na></co>
<co c="0"><na f="p/Petrova:Olga" pid="208/8339">Olga Petrova</na></co>
<co c="0"><na f="p/Pevn=yacute=:Tom=aacute=s" pid="20/1317">Tom&#225;s Pevn&#253;</na></co>
<co c="0"><na f="p/P=iacute=bil:Radek" pid="85/7359">Radek P&#237;bil</na></co>
<co c="1"><na f="p/Pierazzi:Fabio" pid="149/1452">Fabio Pierazzi</na></co>
<co c="1"><na f="p/Preuveneers:Davy" pid="12/603">Davy Preuveneers</na></co>
<co c="0"><na f="r/Rass:Stefan" pid="79/5181">Stefan Rass</na></co>
<co c="0"><na f="r/Reh=aacute=k:Vojtech" pid="06/417">Vojtech Reh&#225;k</na></co>
<co c="0"><na f="r/Rigaki:Maria" pid="218/6133">Maria Rigaki</na></co>
<co c="0"><na f="r/Ryt=iacute=r:Pavel" pid="201/8839">Pavel Ryt&#237;r</na></co>
<co c="0"><na f="s/Sayed:Md=_Abu" pid="86/3086">Md. Abu Sayed</na></co>
<co c="0"><na f="s/Sick:Thorsten" pid="329/4157">Thorsten Sick</na></co>
<co c="0"><na f="s/Sinha:Arunesh" pid="26/9089">Arunesh Sinha</na></co>
<co c="0"><na f="s/Somol:Petr" pid="87/3587">Petr Somol</na></co>
<co c="0"><na f="s/Stiborek:Jan" pid="73/7118">Jan Stiborek</na></co>
<co c="0"><na f="t/Tambe:Milind" pid="67/2667">Milind Tambe</na></co>
<co c="0"><na f="t/Tom=aacute=sek:Petr" pid="252/4957">Petr Tom&#225;sek</na></co>
<co c="1"><na f="t/Tsingenopoulos:Ilias" pid="249/1155">Ilias Tsingenopoulos</na></co>
<co c="0"><na f="v/Vacul=iacute=n:Roman" pid="47/4468">Roman Vacul&#237;n</na></co>
<co c="0"><na f="v/Vanek:Ondrej" pid="88/8524">Ondrej Vanek</na></co>
<co c="0"><na f="v/Vitek:Roman" pid="133/1989">Roman Vitek</na></co>
<co c="0"><na f="w/Wang:Xinrun" pid="199/6413">Xinrun Wang</na></co>
<co c="0"><na f="w/Winands:Mark_H=_M=" pid="32/436">Mark H. M. Winands</na></co>
<co c="0"><na f="y/Yadav:Amulya" pid="121/3511">Amulya Yadav</na></co>
<co c="0"><na f="y/Yin:Zhengyu" pid="54/3357">Zhengyu Yin</na></co>
<co c="0"><na f="z/Zhu:Quanyan" pid="03/6207">Quanyan Zhu</na></co>
</coauthors>
</dblpperson>

