Sciweavers

1189 search results - page 40 / 238
» Information Concealing Games
Sort
View
CSL
2006
Springer
15 years 1 months ago
Algorithms for Omega-Regular Games with Imperfect Information,
We study observation-based strategies for two-player turn-based games on graphs with omega-regular objectives. An observation-based strategy relies on imperfect information about t...
Krishnendu Chatterjee, Laurent Doyen, Thomas A. He...
TON
2012
13 years 5 days ago
A Game-Theoretic Approach to Anonymous Networking
—Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as...
Parvathinathan Venkitasubramaniam, Lang Tong
CSSE
2008
IEEE
15 years 4 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
MFCS
2010
Springer
14 years 8 months ago
Asynchronous Omega-Regular Games with Partial Information
We address the strategy problem for ω-regular two-player games with partial information, played on finite game graphs. We consider two different kinds of observability on a gene...
Bernd Puchala
IV
2006
IEEE
98views Visualization» more  IV 2006»
15 years 3 months ago
Database and Narratological Representation of Australian Aboriginal Knowledge as Information Visualisation using a Game Engine
Current database technologies do not support contextualised representations of multi-dimensional narratives. This paper outlines a new approach to this problem using a multi-dimen...
Malcolm Pumpa, Theodor G. Wyeld