Sciweavers

1653 search results - page 204 / 331
» Computer science and game theory
Sort
View
78
Voted
IJCAI
2003
15 years 8 days ago
On the Foundations of Expected Expected Utility
Intelligent agents often need to assess user utility functions in order to make decisions on their behalf, or predict their behavior. When uncertainty exists over the precise natu...
Craig Boutilier
IJIS
2007
94views more  IJIS 2007»
14 years 10 months ago
The eightfold way of deliberation dialogue
Deliberation dialogues occur when two or more participants seek to jointly agree an action or a course of action in some situation. We present the first formal framework for such...
Peter McBurney, David Hitchcock, Simon Parsons
CORR
2008
Springer
118views Education» more  CORR 2008»
14 years 11 months ago
Distributed Constrained Optimization with Semicoordinate Transformations
Recent work has shown how information theory extends conventional full-rationality game theory to allow bounded rational agents. The associated mathematical framework can be used ...
William G. Macready, David Wolpert
STOC
2012
ACM
256views Algorithms» more  STOC 2012»
13 years 1 months ago
Competitive contagion in networks
We develop a game-theoretic framework for the study of competition between firms who have budgets to “seed” the initial adoption of their products by consumers located in a s...
Sanjeev Goyal, Michael Kearns
STACS
1992
Springer
15 years 3 months ago
Secure Commitment Against A Powerful Adversary
abstract Rafail Ostrovskyy Ramarathnam Venkatesanz Moti Yungx Secure commitment is a primitive enabling information hiding, which is one of the most basic tools in cryptography. S...
Rafail Ostrovsky, Ramarathnam Venkatesan, Moti Yun...