Sciweavers

73 search results - page 4 / 15
» Algorithms for Interdependent Security Games
Sort
View
IJSR
2011
74views more  IJSR 2011»
13 years 1 months ago
Acting Deceptively: Providing Robots with the Capacity for Deception
Deception is utilized by a variety of intelligent systems ranging from insects to human beings. It has been argued that the use of deception is an indicator of theory of mind [2] ...
Alan R. Wagner, Ronald C. Arkin
NOSSDAV
2005
Springer
14 years 13 days ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
HRI
2009
ACM
14 years 1 months ago
Creating and using matrix representations of social interaction
This paper explores the use of an outcome matrix as a computational representation of social interaction suitable for implementation on a robot. An outcome matrix expresses the re...
Alan R. Wagner
SIGECOM
2010
ACM
165views ECommerce» more  SIGECOM 2010»
13 years 11 months ago
Computing optimal strategies to commit to in extensive-form games
Computing optimal strategies to commit to in general normal-form or Bayesian games is a topic that has recently been gaining attention, in part due to the application of such algo...
Joshua Letchford, Vincent Conitzer
ALDT
2011
Springer
251views Algorithms» more  ALDT 2011»
12 years 7 months ago
Game Theory and Human Behavior: Challenges in Security and Sustainability
Security and sustainability are two critical global challenges that involve the interaction of many intelligent actors. Game theory provides a sound mathematical framework to model...
Rong Yang, Milind Tambe, Manish Jain, Jun-young Kw...