We describe how to take a set of interaction traces produced by different pairs of players in a two-player repeated game, and combine them into a composite strategy. We provide an...
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
In contrast to traditional teaching-and-learning environments whereby the teacher controls the learning (e.g., teacher-centered), video games present a learner-centered approach t...
Andrew Milner, Andrew Hogue, Bill Kapralos, John F...
Minesweeper is a one-person game which looks deceptively easy to play, but where average human performance is far from optimal. Playing the game requires logical, arithmetic and p...
We utilize evolutionary game theory to study the evolution of cooperative societies and the behaviors of individual agents (i.e., players) in such societies. We present a novel pla...
Kan-Leung Cheng, Inon Zuckerman, Ugur Kuter, Dana ...