Sciweavers

16 search results - page 3 / 4
» Stable Belief Sets Revisited
Sort
View
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 7 months ago
Sequential Rationality in Cryptographic Protocols
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationallybounded pl...
Ronen Gradwohl, Noam Livne, Alon Rosen
MSS
2010
IEEE
97views Hardware» more  MSS 2010»
13 years 6 months ago
Network formation under mutual consent and costly communication
We consider four different game-theoretic approaches to describe the formation of social networks under mutual consent and costly communication. First, we consider Jackson-Wolins...
Robert P. Gilles, Sudipta Sarangi
CORR
2012
Springer
170views Education» more  CORR 2012»
12 years 3 months ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
NETCOOP
2007
Springer
14 years 1 months ago
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-T...
Giovanni Neglia, Giuseppe Lo Presti, Honggang Zhan...
IJCV
2000
225views more  IJCV 2000»
13 years 7 months ago
Depth from Defocus vs. Stereo: How Different Really Are They?
Depth from Focus (DFF) and Depth from Defocus (DFD) methods are theoretically unified with the geometric triangulation principle. Fundamentally, the depth sensitivities of DFF and ...
Yoav Y. Schechner, Nahum Kiryati