Sciweavers

1191 search results - page 50 / 239
» Online Games and Security
Sort
View
SIGECOM
2010
ACM
165views ECommerce» more  SIGECOM 2010»
14 years 26 days ago
Computing optimal strategies to commit to in extensive-form games
Computing optimal strategies to commit to in general normal-form or Bayesian games is a topic that has recently been gaining attention, in part due to the application of such algo...
Joshua Letchford, Vincent Conitzer
JNW
2006
55views more  JNW 2006»
13 years 8 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
14 years 2 months ago
Personality Matters: Incorporating Detailed User Attributes and Preferences into the Matchmaking Process
Finding ways of reducing undesired behavior in online interactions is at the forefront of the social computing research agenda. One promising way to reduce perceived “bad behavi...
Jens Riegelsberger, Scott Counts, Shelly Farnham, ...
CONCUR
2007
Springer
14 years 2 months ago
Strategy Logic
We introduce strategy logic, a logic that treats strategies in two-player games as explicit first-order objects. The explicit treatment of strategies allows us to specify properti...
Krishnendu Chatterjee, Thomas A. Henzinger, Nir Pi...
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 3 months ago
Parallel Online Learning
Online learning algorithms have impressive convergence properties when it comes to risk minimization and convex games on very large problems. However, they are inherently sequenti...
Daniel Hsu, Nikos Karampatziakis, John Langford, A...