Sciweavers

1616 search results - page 142 / 324
» Robust game theory
Sort
View
CORR
2006
Springer
110views Education» more  CORR 2006»
13 years 10 months ago
The topology of covert conflict
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender counters using various resilience mechanisms. Examples include a music industry bod...
Shishir Nagarja
APAL
2005
117views more  APAL 2005»
13 years 10 months ago
About cut elimination for logics of common knowledge
The notions of common knowledge or common belief play an important role in several areas of computer science (e.g. distributed systems, communication), in philosophy, game theory,...
Luca Alberucci, Gerhard Jäger
CSL
2002
Springer
13 years 10 months ago
Designs, Disputes and Strategies
Ludics has been proposed by Girard as an abstract general approach to proof theory. We explain how its basic notions correspond to those of the "innocent strategy" apprao...
Claudia Faggian, Martin Hyland
DATAMINE
1998
175views more  DATAMINE 1998»
13 years 10 months ago
A Microeconomic View of Data Mining
We present a rigorous framework, based on optimization, for evaluating data mining operations such as associations and clustering, in terms of their utility in decisionmaking. Thi...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
GAMESEC
2011
287views Game Theory» more  GAMESEC 2011»
12 years 10 months ago
Collaborative Location Privacy with Rational Users
Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with the...
Francisco Santos, Mathias Humbert, Reza Shokri, Je...