Game-theoretical study of some hierarchical control methods

被引:0
|
作者
Ugol'nitskij, G.A. [1 ]
机构
[1] Rostov State Univ., pr. Stachki 194, Rostov-na-Donu, 344104, Russia
关键词
731.1 Control Systems - 921.5 Optimization Techniques - 922.1 Probability Theory;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:97 / 101
相关论文
共 50 条
  • [1] Game-theoretical study of some hierarchical control methods
    Ugol'nitskii, GA
    JOURNAL OF COMPUTER AND SYSTEMS SCIENCES INTERNATIONAL, 2002, 41 (01) : 93 - 97
  • [2] Game-Theoretical Methods in Control of Engineering Systems AN INTRODUCTION TO THE SPECIAL ISSUE
    Ocampo-Martinez, Carlos
    Quijano, Nicanor
    IEEE CONTROL SYSTEMS MAGAZINE, 2017, 37 (01): : 30 - 32
  • [3] Use of Game-Theoretical Methods in Biochemistry and Biophysics
    Stefan Schuster
    Jan-Ulrich Kreft
    Anja Schroeter
    Thomas Pfeiffer
    Journal of Biological Physics, 2008, 34 : 1 - 17
  • [4] Use of Game-Theoretical Methods in Biochemistry and Biophysics
    Schuster, Stefan
    Kreft, Jan-Ulrich
    Schroeter, Anja
    Pfeiffer, Thomas
    JOURNAL OF BIOLOGICAL PHYSICS, 2008, 34 (1-2) : 1 - 17
  • [5] Choice from comparisons: A survey of game-theoretical methods
    Laslier, JF
    ADVANCES IN DECISION ANALYSIS, 1999, 4 : 31 - 46
  • [6] In defense of (some) verificationism: Verificationism and game-theoretical semantics
    Vigeant, L
    MEANING: THE DYNAMIC TURN, 2003, 12 : 259 - 270
  • [7] GAME-THEORETICAL SEMANTICS
    SAARINEN, E
    MONIST, 1977, 60 (03): : 406 - 418
  • [8] GAME-THEORETICAL AESTHETICS
    PYLKKO, P
    AMERICAN JOURNAL OF SEMIOTICS, 1991, 8 (1-2): : 101 - 111
  • [9] A Game-Theoretical Framework for Industrial Control System Security
    Colbert, Edward J. M.
    Zhu, Quanyan
    Rieger, Craig G.
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 469 - 470
  • [10] A game-theoretical power control algorithm with relay selection
    Wu, Dan
    Cai, Yue-Ming
    Pan, Cheng-Kang
    Sheng, Yan-Ming
    Xu, You-Yun
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (12): : 2829 - 2833