Sciweavers

IJGT
2016
67views more  IJGT 2016»
9 years 12 months ago
Feasibility and individual rationality in two-person Bayesian games
We de…ne feasible, posterior individually rational solutions for twoperson Bayesian games with a single informed player. Such a solution can be achieved by direct signalling fro...
Françoise Forges, Ulrich Horst, Antoine Sal...
IJGT
2016
69views more  IJGT 2016»
9 years 12 months ago
On the dispensable role of time in games of perfect information
In Aumann (1995) and Aumann (1998), time is assumed implicitly in the description of games of perfect information, and it is part of the epistemic distinction between ex-ante and e...
Dov Samet
IJGT
2016
62views more  IJGT 2016»
9 years 12 months ago
Common-value all-pay auctions with asymmetric information and bid caps
We study a class of two-player common-value all-pay auctions (contests) with asymmetric information under the assumption that one of the players has an information advantage over ...
Ezra Einy, Ori Haimanko, Ram Orzach, Aner Sela
29
Voted
IJGS
2016
61views more  IJGS 2016»
9 years 12 months ago
A lattice-free concept lattice update algorithm
Updating a concept lattice when introducing new objects to input data can be done by any of the so-called incremental algorithms for computing concept lattice of the data. The algo...
Jan Outrata
IJGS
2016
48views more  IJGS 2016»
9 years 12 months ago
Formal concept analysis of higher order
The second order formal context is a formal context such that its object and attribute sets are disjoint unions of object and attribute sets of external formal contexts. Every subs...
Ondrej Kridlo, Stanislav Krajci, L'ubomír A...
32
Voted
IJGBL
2016
68views more  IJGBL 2016»
9 years 12 months ago
Computational Thinking in Constructionist Video Games
David Weintrop, Nathan R. Holbert, Michael S. Horn...
IJES
2016
65views more  IJES 2016»
9 years 12 months ago
Identifying malicious Android apps using permissions and system events
: With the popularity of the Android platform, more and more hackers take the Android platform as the profitable target. Android provides a risk communication defence mechanism aga...
Hongmu Han, Ruixuan Li, Xiwu Gu
IJDSN
2016
82views more  IJDSN 2016»
9 years 12 months ago
SDN-Based Active Content Networking
Tai-Won Um, Gyu Myoung Lee, Jinsul Kim
IJDET
2016
60views more  IJDET 2016»
9 years 12 months ago
Interactive Visualization Tools to Improve Learning and Teaching in Online Learning Environments
This paper presents two interactive visualization tools for learning management systems (LMS) in order to improve learning and teaching in online courses. The first tool was devel...
Kirsi Kuosa, Damiano Distante, Anne-Maritta Tervak...