Sciweavers

144 search results - page 21 / 29
» Opponent Modeling in Poker
Sort
View
ATAL
2007
Springer
14 years 2 months ago
The LOGIC negotiation model
Successful negotiators prepare by determining their position along five dimensions: Legitimacy, Options, Goals, Independence, and Commitment, (LOGIC). We introduce a negotiation ...
Carles Sierra, John K. Debenham
CANS
2006
Springer
114views Cryptology» more  CANS 2006»
13 years 11 months ago
Achieving Multicast Stream Authentication Using MDS Codes
We address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network m...
Christophe Tartary, Huaxiong Wang
CIA
2006
Springer
13 years 11 months ago
Learning to Negotiate Optimally in Non-stationary Environments
Abstract. We adopt the Markov chain framework to model bilateral negotiations among agents in dynamic environments and use Bayesian learning to enable them to learn an optimal stra...
Vidya Narayanan, Nicholas R. Jennings
AAAI
2007
13 years 10 months ago
RETALIATE: Learning Winning Policies in First-Person Shooter Games
In this paper we present RETALIATE, an online reinforcement learning algorithm for developing winning policies in team firstperson shooter games. RETALIATE has three crucial chara...
Megan Smith, Stephen Lee-Urban, Hector Muño...
IJISEC
2008
92views more  IJISEC 2008»
13 years 7 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk