Sciweavers

5995 search results - page 213 / 1199
» Algorithmic Game Theory
Sort
View
PROVSEC
2007
Springer
15 years 10 months ago
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Game-playing is an approach to write security proofs that are easy to verify. In this approach, security definitions and intractable problems are written as programs called games ...
Reynald Affeldt, Miki Tanaka, Nicolas Marti
157
Voted
JSAC
2008
95views more  JSAC 2008»
15 years 4 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
EUSFLAT
2007
215views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
Two Consensus Protocols Based on an Acceptance Threshold in Group Decision Making
We define two negotiation protocols for Group Decision Making, which main feature is the existence of acceptation thresholds. In order to predict which consensus are expected to ...
Christophe Labreuche
AI
2007
Springer
15 years 4 months ago
If multi-agent learning is the answer, what is the question?
The area of learning in multi-agent systems is today one of the most fertile grounds for interaction between game theory and artificial intelligence. We focus on the foundational...
Yoav Shoham, Rob Powers, Trond Grenager
CORR
2010
Springer
92views Education» more  CORR 2010»
15 years 4 months ago
Hardness Results for Agnostically Learning Low-Degree Polynomial Threshold Functions
Hardness results for maximum agreement problems have close connections to hardness results for proper learning in computational learning theory. In this paper we prove two hardnes...
Ilias Diakonikolas, Ryan O'Donnell, Rocco A. Serve...