Sciweavers

214 search results - page 12 / 43
» Finding Optimal Strategies for Imperfect Information Games
Sort
View
ICC
2009
IEEE
127views Communications» more  ICC 2009»
14 years 2 months ago
Security Games with Incomplete Information
—We study two-player security games which can be viewed as sequences of nonzero-sum matrix games where at each stage of the iterations the players make imperfect observations of ...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 5 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
ATAL
2010
Springer
13 years 8 months ago
Using counterfactual regret minimization to create competitive multiplayer poker agents
Games are used to evaluate and advance Multiagent and Artificial Intelligence techniques. Most of these games are deterministic with perfect information (e.g. Chess and Checkers)....
Nicholas Abou Risk, Duane Szafron
CORR
2010
Springer
57views Education» more  CORR 2010»
13 years 7 months ago
Optimal Control Strategies in Delayed Sharing Information Structures
The n-step delayed sharing information structure is investigated. This information structure comprises of K controllers that share their information with a delay of n time steps. ...
Ashutosh Nayyar, Aditya Mahajan, Demosthenis Tenek...
CONCUR
2009
Springer
14 years 2 months ago
Compositional Control Synthesis for Partially Observable Systems
We present a compositional method for deriving control constraints on a network of interconnected, partially observable and partially controllable plant components. The constraint ...
Wouter Kuijper, Jaco van de Pol