Sciweavers

73 search results - page 4 / 15
» Algorithms for Interdependent Security Games
Sort
View
IJSR
2011
74views more  IJSR 2011»
14 years 5 months ago
Acting Deceptively: Providing Robots with the Capacity for Deception
Deception is utilized by a variety of intelligent systems ranging from insects to human beings. It has been argued that the use of deception is an indicator of theory of mind [2] ...
Alan R. Wagner, Ronald C. Arkin
NOSSDAV
2005
Springer
15 years 3 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
HRI
2009
ACM
15 years 4 months ago
Creating and using matrix representations of social interaction
This paper explores the use of an outcome matrix as a computational representation of social interaction suitable for implementation on a robot. An outcome matrix expresses the re...
Alan R. Wagner
SIGECOM
2010
ACM
165views ECommerce» more  SIGECOM 2010»
15 years 2 months ago
Computing optimal strategies to commit to in extensive-form games
Computing optimal strategies to commit to in general normal-form or Bayesian games is a topic that has recently been gaining attention, in part due to the application of such algo...
Joshua Letchford, Vincent Conitzer
ALDT
2011
Springer
251views Algorithms» more  ALDT 2011»
13 years 10 months ago
Game Theory and Human Behavior: Challenges in Security and Sustainability
Security and sustainability are two critical global challenges that involve the interaction of many intelligent actors. Game theory provides a sound mathematical framework to model...
Rong Yang, Milind Tambe, Manish Jain, Jun-young Kw...