Sciweavers

1653 search results - page 125 / 331
» Computer science and game theory
Sort
View
FCT
2009
Springer
15 years 11 months ago
Computing Role Assignments of Chordal Graphs
In social network theory, a simple graph G is called k-role assignable if there is a surjective mapping that assigns a number from {1, . . . , k} called a role to each vertex of G ...
Pim van 't Hof, Daniël Paulusma, Johan M. M. ...
CSR
2007
Springer
15 years 8 months ago
On Empirical Meaning of Randomness with Respect to a Real Parameter
We study the empirical meaning of randomness with respect to a family of probability distributions P, where is a real parameter, using algorithmic randomness theory. In the case w...
Vladimir V. V'yugin
IAT
2008
IEEE
15 years 11 months ago
Auction Analysis by Normal Form Game Approximation
Auctions are pervasive in today’s society and provide a variety of real markets. This article facilitates a strategic choice between a set of available trading strategies by int...
Michael Kaisers, Karl Tuyls, Frank Thuijsman, Simo...
CATE
2004
248views Education» more  CATE 2004»
15 years 5 months ago
SIMSE: An Interactive Simulation Game for Software Engineering Education
The typical software engineering education lacks a practical experience of the process of software engineering-students are presented with relevant process theory in lectures, but...
Emily Oh Navarro, André van der Hoek
ATAL
2007
Springer
15 years 10 months ago
Commitment and extortion
Making commitments, e.g., through promises and threats, enables a player to exploit the strengths of his own strategic position as well as the weaknesses of that of his opponents....
Paul Harrenstein, Felix Brandt, Felix A. Fischer