Sciweavers

663 search results - page 22 / 133
» On the Foundations of Expected Expected Utility
Sort
View
FLAIRS
2008
14 years 11 months ago
Second-Order Risk Constraints
This paper discusses how numerically imprecise information can be modelled and how a risk evaluation process can be elaborated by integrating procedures for numerically imprecise ...
Love Ekenberg, Aron Larsson, Mats Danielson
ATAL
2009
Springer
15 years 4 months ago
Self-deceptive decision making: normative and descriptive insights
Computational modeling of human belief maintenance and decision-making processes has become increasingly important for a wide range of applications. We present a framework for mod...
Jonathan Y. Ito, David V. Pynadath, Stacy C. Marse...
ATAL
2010
Springer
14 years 10 months ago
Preference elicitation for risky prospects
Minimax-regret preference elicitation allows intelligent decisions to be made on behalf of people facing risky choices. Standard gamble queries, a vital tool in this type of prefe...
Greg Hines, Kate Larson
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
INFOCOM
2006
IEEE
15 years 3 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank