default search action
Jason Tsai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [p1]Edward F. Melcer, Cara A. Liebert, Samuel Shields, Oleksandra G. Keehl, Jason Tsai, Fatyma Camacho, Hyrum Eddington, Amber Trickey, Melissa Lee, Sylvia Bereknyei Merrell, James R. Korndorffer, Dana T. Lin:
ENTRUST: Co-design and Validation of a Serious Game for Assessing Clinical Decision-Making and Readiness for Entrustment. Software Engineering for Games in Serious Contexts 2023: 85-116 - 2021
- [c15]HsinChen Chen, Rolf Lagerquist, Ashish Nayak, Hugh Mair, Gokulakrishnan Manoharan, Ericbill Wang, Gordon Gammie, Efron Ho, Anand Rajagopalan, Lee-Kee Yong, Ramu Madhavaram, Madhur Jagota, Chi-Jui Chung, Sudhakar Maruthi, Jenny Wiedemeier, Tao Chen, Henry Hsieh, Daniel Dia, Amjad Sikiligiri, Manzur Rahman, Barry Chen, Curtis Lin, Vincent Lin, Elly Chiang, Cheng-Yuh Wu, Po-Yang Hsu, Jason Tsai, Wade Wu, Achuta Thippana, S. A. Huang:
A 7nm 5G Mobile SoC Featuring a 3.0GHz Tri-Gear Application Processor Subsystem. ISSCC 2021: 54-56
2010 – 2019
- 2018
- [c14]Shengjia Shao, Jason Tsai, Michal Mysior, Wayne Luk, Thomas Chau, Alexander Warren, Ben Jeppesen:
Towards Hardware Accelerated Reinforcement Learning for Application-Specific Robotic Control. ASAP 2018: 1-8 - 2014
- [j4]Jason Tsai, Thanh Hong Nguyen, Nicholas Weller, Milind Tambe:
Game-Theoretic Target Selection in Contagion-Based Domains. Comput. J. 57(6): 893-905 (2014) - 2013
- [j3]Jason Tsai, Emma Bowring, Stacy Marsella, Milind Tambe:
Empirical evaluation of computational fear contagion models in crowd dispersions. Auton. Agents Multi Agent Syst. 27(2): 200-217 (2013) - [c13]Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe:
Security games with contagion: handling asymmetric information. AAMAS 2013: 1185-1186 - [c12]Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe:
Bayesian Security Games for Controlling Contagion. SocialCom 2013: 33-38 - 2012
- [c11]Jason Tsai, Thanh Hong Nguyen, Milind Tambe:
Security Games for Controlling Contagion. AAAI 2012: 1464-1470 - [c10]Thanh Hong Nguyen, Jason Tsai, Albert Xin Jiang, Emma Bowring, Rajiv T. Maheswaran, Milind Tambe:
Security Games on Social Networks. AAAI Fall Symposium: Social Networks and Social Contagion 2012 - [c9]Jason Tsai, Nicholas Weller, Milind Tambe:
Analysis of Heuristic Techniques for Controlling Contagion. AAAI Fall Symposium: Social Networks and Social Contagion 2012 - [c8]Jason Tsai, Emma Bowring, Stacy Marsella, Milind Tambe:
Emotional contagion with virtual characters. AAMAS 2012: 1193-1194 - [c7]Jason Tsai, Emma Bowring, Stacy Marsella, Wendy Wood, Milind Tambe:
A Study of Emotional Contagion with Virtual Characters. IVA 2012: 81-88 - 2011
- [c6]Jason Tsai, Natalie Fridman, Emma Bowring, Matthew Brown, Shira Epstein, Gal A. Kaminka, Stacy Marsella, Andrew Ogden, Inbal Rika, Ankur Sheel, Matthew E. Taylor, Xuezhi Wang, Avishay Zilka, Milind Tambe:
ESCAPES: evacuation simulation with children, authorities, parents, emotions, and social comparison. AAMAS 2011: 457-464 - [c5]Jason Tsai, Emma Bowring, Stacy Marsella, Milind Tambe:
Empirical Evaluation of Computational Emotional Contagion Models. IVA 2011: 384-397 - 2010
- [j2]Manish Jain, Jason Tsai, James Pita, Christopher Kiekintveld, Shyamsunder Rathi, Milind Tambe, Fernando Ordóñez:
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service. Interfaces 40(4): 267-290 (2010) - [c4]Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe:
Urban Security: Game-Theoretic Resource Allocation in Networked Domains. AAAI 2010: 881-886 - [c3]Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe:
How to protect a city: strategic security placement in graph-based domains. AAMAS 2010: 1453-1454 - [c2]Jason Tsai, Seng Oon Toh, Zheng Guo, Liang-Teck Pang, Tsu-Jae King Liu, Borivoje Nikolic:
SRAM stability characterization using tunable ring oscillators in 45nm CMOS. ISSCC 2010: 354-355
2000 – 2009
- 2009
- [j1]James Pita, Harish Bellamane, Manish Jain, Christopher Kiekintveld, Jason Tsai, Fernando Ordóñez, Milind Tambe:
Security applications: lessons of real-world deployment. SIGecom Exch. 8(2): 5 (2009) - [c1]Christopher Kiekintveld, Manish Jain, Jason Tsai, James Pita, Fernando Ordóñez, Milind Tambe:
Computing optimal randomized resource allocations for massive security games. AAMAS (1) 2009: 689-696
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint