Sciweavers

1653 search results - page 125 / 331
» Computer science and game theory
Sort
View
FCT
2009
Springer
15 years 4 months ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
CSR
2007
Springer
15 years 1 months ago
On Empirical Meaning of Randomness with Respect to a Real Parameter
We study the empirical meaning of randomness with respect to a family of probability distributions P, where is a real parameter, using algorithmic randomness theory. In the case w...
Vladimir V. V'yugin
IAT
2008
IEEE
15 years 4 months ago
Auction Analysis by Normal Form Game Approximation
Auctions are pervasive in today’s society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by int...
Michael Kaisers, Karl Tuyls, Frank Thuijsman, Simo...
CATE
2004
248views Education» more  CATE 2004»
14 years 11 months ago
SIMSE: An Interactive Simulation Game for Software Engineering Education
The typical software engineering education lacks a practical experience of the process of software engineering-students are presented with relevant process theory in lectures, but...
Emily Oh Navarro, André van der Hoek
ATAL
2007
Springer
15 years 4 months ago
Commitment and extortion
Making commitments, e.g., through promises and threats, enables a player to exploit the strengths of his own strategic position as well as the weaknesses of that of his opponents....
Paul Harrenstein, Felix Brandt, Felix A. Fischer