Sciweavers

5995 search results - page 218 / 1199
» Algorithmic Game Theory
Sort
View
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
15 years 11 months ago
Computing Weakest Strategies for Safety Games of Imperfect Information
CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes ...
Wouter Kuijper, Jaco van de Pol
AMC
2008
86views more  AMC 2008»
15 years 4 months ago
Numerical solution of stochastic Nash games with state-dependent noise for weakly coupled large-scale systems
This paper discusses the infinite horizon stochastic Nash games with state-dependent noise. After establishing the asymptotic structure along with the positive semidefiniteness for...
Muneomi Sagara, Hiroaki Mukaidani, Toru Yamamoto
FLAIRS
2006
15 years 5 months ago
Coalition Formation Meets Information Theory
The process of coalition formation, where distinct autonomous agents come together to act as a coherent group is an important form of interaction in multiagent systems. Previous w...
Victor Palmer, Thomas R. Ioerger
ICIP
2008
IEEE
15 years 10 months ago
Multi-polarity text segmentation using graph theory
Text segmentation, or named text binarization, is usually an essential step for text information extraction from images and videos. However, most existing text segmentation method...
Jia Li, YongHong Tian, Tiejun Huang, Wen Gao
143
Voted
ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
15 years 8 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh