  @prefix epid: <https://pure.iiasa.ac.at/id/> .
  @prefix void: <http://rdfs.org/ns/void#> .
  @prefix xsd: <http://www.w3.org/2001/XMLSchema#> .
  @prefix cc: <http://creativecommons.org/ns#> .
  @prefix ep: <http://eprints.org/ontology/> .
  @prefix eprel: <http://eprints.org/relation/> .
  @prefix doi: <https://doi.org/> .
  @prefix dc: <http://purl.org/dc/elements/1.1/> .
  @prefix bibo: <http://purl.org/ontology/bibo/> .
  @prefix geo: <http://www.w3.org/2003/01/geo/wgs84_pos#> .
  @prefix owl: <http://www.w3.org/2002/07/owl#> .
  @prefix event: <http://purl.org/NET/c4dm/event.owl#> .
  @prefix skos: <http://www.w3.org/2004/02/skos/core#> .
  @prefix foaf: <http://xmlns.com/foaf/0.1/> .
  @prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
  @prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
  @prefix dct: <http://purl.org/dc/terms/> .

<>
	foaf:primaryTopic <https://pure.iiasa.ac.at/id/eprint/13857>;
	rdfs:comment "The repository administrator has not yet configured an RDF license."^^xsd:string .

<https://pure.iiasa.ac.at/id/eprint/13857#authors>
	rdf:_1 <https://pure.iiasa.ac.at/id/person/ext-58111ba1a7762615409cd3dd40c08dfc>;
	rdf:_2 <https://pure.iiasa.ac.at/id/person/ext-8fd802a0df849eef10a67d9cd358d72c>;
	rdf:_3 <https://pure.iiasa.ac.at/id/person/ext-0026c02c0dfae9388247c075d824a03b>;
	rdf:_4 <https://pure.iiasa.ac.at/id/person/ext-5656cc38d44ad30fb3222aecc44e566e>;
	rdf:_5 <https://pure.iiasa.ac.at/id/person/ext-1555> .

<https://pure.iiasa.ac.at/id/eprint/13857/>
	dc:format "text/html";
	dc:title "HTML Summary of #13857 \n\nDifferential Terror Queue Games\n\n";
	foaf:primaryTopic <https://pure.iiasa.ac.at/id/eprint/13857> .

<https://pure.iiasa.ac.at/id/eprint/13857>
	bibo:abstract "We present models of differential terror queue games, wherein terrorists seek to determine optimal attack rates over time, while simultaneously the government develops optimal counterterror staffing levels. The number of successful and interdicted terror attacks is determined via an underlying dynamic terror queue model. Different information structures and commitment abilities derive from different assumptions regarding what the players in the game can and cannot deduce about the underlying model. We compare and explain the impact of different information structures, i.e., open loop, closed loop, and asymmetric. We characterize the optimal controls for both the terrorists and the government in terms of the associated state and costate variables and deduce the costate equations that must be solved numerically to yield solutions to the game for the different cases. Using recently assembled data describing both terror attack and staffing levels, we compare the differential game models to each other as well as to the optimal control model of Seidl et al. (Eur J Oper Res 248:246–256, 2016). The paper concludes with a discussion of the lessons learned from the entire modeling exercise."^^xsd:string;
	bibo:authorList <https://pure.iiasa.ac.at/id/eprint/13857#authors>;
	bibo:issue "4";
	bibo:status <http://purl.org/ontology/bibo/status/peerReviewed>,
		<http://purl.org/ontology/bibo/status/published>;
	bibo:volume "7";
	dct:creator <https://pure.iiasa.ac.at/id/person/ext-8fd802a0df849eef10a67d9cd358d72c>,
		<https://pure.iiasa.ac.at/id/person/ext-0026c02c0dfae9388247c075d824a03b>,
		<https://pure.iiasa.ac.at/id/person/ext-1555>,
		<https://pure.iiasa.ac.at/id/person/ext-5656cc38d44ad30fb3222aecc44e566e>,
		<https://pure.iiasa.ac.at/id/person/ext-58111ba1a7762615409cd3dd40c08dfc>;
	dct:date "2017-12-01";
	dct:isPartOf <https://pure.iiasa.ac.at/id/repository>,
		<https://pure.iiasa.ac.at/id/publication/ext-21530785>;
	dct:publisher <https://pure.iiasa.ac.at/id/org/ext-4ec4b2496fc9ca77fc995e0c1e1d96f2>;
	dct:title "Differential Terror Queue Games"^^xsd:string;
	owl:sameAs <https://doi.org/10.1007/s13235-016-0195-1>;
	rdf:type bibo:AcademicArticle,
		bibo:Article,
		ep:ArticleEPrint,
		ep:EPrint;
	rdfs:seeAlso <https://pure.iiasa.ac.at/id/eprint/13857/> .

<https://pure.iiasa.ac.at/id/org/ext-4ec4b2496fc9ca77fc995e0c1e1d96f2>
	foaf:name "Springer USA"^^xsd:string;
	rdf:type foaf:Organization .

<https://pure.iiasa.ac.at/id/person/ext-8fd802a0df849eef10a67d9cd358d72c>
	foaf:familyName "Kaplan"^^xsd:string;
	foaf:givenName "E.H."^^xsd:string;
	foaf:name "E.H. Kaplan"^^xsd:string;
	rdf:type foaf:Person .

<https://pure.iiasa.ac.at/id/person/ext-0026c02c0dfae9388247c075d824a03b>
	foaf:familyName "Caulkins"^^xsd:string;
	foaf:givenName "J.P."^^xsd:string;
	foaf:name "J.P. Caulkins"^^xsd:string;
	rdf:type foaf:Person .

<https://pure.iiasa.ac.at/id/person/ext-1555>
	foaf:familyName "Feichtinger"^^xsd:string;
	foaf:givenName "G."^^xsd:string;
	foaf:name "G. Feichtinger"^^xsd:string;
	rdf:type foaf:Person .

<https://pure.iiasa.ac.at/id/person/ext-5656cc38d44ad30fb3222aecc44e566e>
	foaf:familyName "Seidl"^^xsd:string;
	foaf:givenName "A."^^xsd:string;
	foaf:name "A. Seidl"^^xsd:string;
	rdf:type foaf:Person .

<https://pure.iiasa.ac.at/id/person/ext-58111ba1a7762615409cd3dd40c08dfc>
	foaf:familyName "Wrzaczek"^^xsd:string;
	foaf:givenName "S."^^xsd:string;
	foaf:name "S. Wrzaczek"^^xsd:string;
	rdf:type foaf:Person .

<https://pure.iiasa.ac.at/id/publication/ext-21530785>
	bibo:issn "21530785";
	foaf:name "Dynamic Games and Applications"^^xsd:string;
	owl:sameAs <urn:issn:21530785>;
	rdf:type bibo:Collection .

