Show icon Show search tips...
Hide icon Hide search tips...

[CCICADA-announce] (no subject)

Linda Casals lindac at
Wed Aug 4 13:46:36 EDT 2010

Subject: DIMACS/CCICADA Workshop on Adversarial Decision Making

--text follows this line--

DIMACS/CCICADA Workshop on Adversarial Decision Making

  September 30 - October 1, 2010
  DIMACS Center, CoRE Building, Rutgers University

    David Banks, Duke University, banks at 
    Janusz Marecki, IBM T.J. Watson Research, marecki at 
    Bonnie Ray, IBM T.J. Watson Research, bonnier at 
    Milind Tambe, University of Southern California, tambe at 

Presented under the auspices of the Special Focus on Algorithmic
Decision Theory and The Homeland Security Center for Command, Control,
and Interoperability Center for Advanced Data Analysis (CCICADA).


Adversarial decision making arises in many situations, including
counterterrorism, corporate competition, and federal
regulation. Military leaders, corporate executives, and consumer
groups regularly make large investments in the context of intelligent
opposition. Such choices typically entail high-consequence outcomes
conditional on low-probability events, with solutions drawn from the
fields of decision analysis and game theory. However, previous work in
decision analysis has largely overlooked adversarial
situations---instead, it has focused on the uncertainties associated
with natural disasters and concomitant costs. Game theory on the other
hand has addressed head-on the assumption that the adversaries
anticipate and adapt to each other's actions. Yet, in doing so,
classical game theory assumed that agents act rationally (i.e. are
risk insensitive) and know each others' payoff structures. As a
result, current game theoretic and decision theoretic techniques
result in formulations which make untenable assumptions about how
humans process information and cope with uncertainty. These issues
form the basis for the agenda of this workshop.

We invite members of the broad Algorithmic Decision Theory community
to actively participate in this workshop through presentation of a
poster at the Poster Session planned for Thursday evening, September
30, or through attending and contributing to the session
discussions. Topics of interest for the Poster session include, but
are not limited to:

    * Practical methods for modeling decision processes
    * Computational challenges in Adversarial Decision Making
    * Dealing with investments that provide overlapping but incomplete mitigation for multiple threats.
    * Handling of unreliable information
    * Elicitation of uncertainties for low probability-high consequence events 
Call for Participation:

Submission and Registration Process

    * To participate in this workshop as a poster presenter, please:
         1. Submit an abstract (200 word limit) and title for your 
            presentation to marecki at no later than August 15, 2010.
         2. Notification of acceptance will be provided by August 31, 2010.
         3. Register and submit registration fees using the web
            registration form no later than September 10, 2010. 

    * To participate in this workshop as an attendee, please:
         1. Register and submit registration fees using the web
            registration form no later than September 10, 2010. 

Workshop Program:

This is a preliminary program subject to change.

Thursday, September 30, 2010

 9:15 -  9:50  Registration and Continental Breakfast	

 9:50 - 10:00  Welcome and Opening Remarks	
               Fred Roberts, DIMACS Director

10:00 - 10:15  Welcome and Opening Remarks	
               David Banks, Duke University

10:15 - 11:15  The Emerging Threat; Ten years ago, al-Qaeda said this 
               is where they wanted to be
	       Erroll Southers, University of Southern California

11:15 - 12:00  Quantifying unobserved attributes in expert 
               elicitation of terrorist preferences	
               Vicki Bier, University of Wisconsin

12:00 -  1:15  Lunch	

 1:15 -  2:00  Trust Based Decision Making with Uncertain Information	
               Mudhakar Srivatsa, IBM Research

 2:00 -  2:45  Bayesian Borel Games
               David Banks, Duke University

 2:45 -  3:15  Break		

 3:15 -  4:00  Two-Person and n-Person Red and Black Games
               Laura Pontiggia, University of the Sciences

 4:00 -  5:00  Game Theory for Homeland Security Applications	
               Christopher Kiekintveld, USC
               Milend Tambe, USC
               Janusz Marecki, IBM Research

 5:00 -  5:30  Day 1 Summary and Discussion - All	

 5:30 -  6:30  Poster Session and Cocktail Reception - All	

 6:30 -  8:00  Workshop Dinner - All	

Friday, October 1, 2010

 9:00 -  9:30  Registration and Continental Breakfast		

 9:30 - 10:15  Finding Optimal Mixed Strategies to Commit to in Security Games	
               Vince Conitzer, Duke University

10:15 - 11:00  Game-Theoretic Models and Solution Algorithms for Critical 
               Infrastructure Protection
               Matt Carlyle, Naval Postgraduate School

11:00 - 11:15  Break	 	

11:15 - 12:00  Agency Effects in the Attacker-Defender Problem:
               Addressing Multi-tiered Defender Organizations  	
               Seth Guikema, The John Hopkins University

12:00 -  1:00  Lunch	 	

 1:00 -  1:45  Secure or Insure? A Game-theoretic analysis of
               Information Security Games	
               Nicolas Christin, Carnegie Mellon University

 1:45 -  2:30  Adversarial Risk Analysis for Counterterrorism Modelling	
               Jesus Rios, University of Manchester and IBM Research

 2:30 -  3:00  Wrap-Up: Discussion on Future Research Agenda, Next Steps Organizers	


 For details and to register see:


 Information on participation, registration, accommodations, 
 and travel can be found at:

More information about the Dimacs-ccicada-announce mailing list