Sciweavers

894 search results - page 96 / 179
» Game Theory with Costly Computation
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
14 years 12 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ATAL
2006
Springer
15 years 5 months ago
The communication complexity of coalition formation among autonomous agents
It is self-evident that in numerous Multiagent settings, selfish agents stand to benefit from cooperating by forming coalitions. Nevertheless, negotiating a stable distribution of...
Ariel D. Procaccia, Jeffrey S. Rosenschein
WINE
2005
Springer
107views Economy» more  WINE 2005»
15 years 7 months ago
Price of Anarchy of Network Routing Games with Incomplete Information
We consider a class of networks where n agents need to send their traffic from a given source to a given destination over m identical, non-intersecting, and parallel links. For suc...
Dinesh Garg, Yadati Narahari
COLCOM
2007
IEEE
15 years 8 months ago
Multicasting in groupware?
— While multicast has been studied extensively in many domains such as content streaming and file sharing, there is little research applying it to synchronous collaborations invo...
Sasa Junuzovic, Prasun Dewan
HRI
2009
ACM
15 years 8 months ago
Creating and using matrix representations of social interaction
This paper explores the use of an outcome matrix as a computational representation of social interaction suitable for implementation on a robot. An outcome matrix expresses the re...
Alan R. Wagner