Sciweavers

796 search results - page 79 / 160
» The canonical function game
Sort
View
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 11 months ago
Power Allocation in Team Jamming Games in Wireless Ad Hoc Networks
In this work, we study the problem of power allocation in teams. Each team consists of two agents who try to split their available power between the tasks of communication and jam...
Sourabh Bhattacharya, Ali Khanafer, Tamer Basar
TACAS
2009
Springer
134views Algorithms» more  TACAS 2009»
14 years 2 months ago
Computing Weakest Strategies for Safety Games of Imperfect Information
CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes ...
Wouter Kuijper, Jaco van de Pol
CDC
2008
IEEE
111views Control Systems» more  CDC 2008»
14 years 2 months ago
Computing correlated equilibria of polynomial games via adaptive discretization
— We construct a family of iterative discretization algorithms for computing sequences of finitely-supported correlated equilibria of n-player games with polynomial utility func...
Noah D. Stein, Asuman E. Ozdaglar, Pablo A. Parril...
CAAN
2007
Springer
14 years 2 months ago
Vertex Pursuit Games in Stochastic Network Models
Abstract. Random graphs with given expected degrees G(w) were introduced by Chung and Lu so as to extend the theory of classical G(n, p) random graphs to include random power law g...
Anthony Bonato, Pawel Pralat, Changping Wang
CDC
2009
IEEE
166views Control Systems» more  CDC 2009»
14 years 16 days ago
Idempotent method for dynamic games and complexity reduction in min-max expansions
— In recent years, idempotent methods (specifically, max-plus methods) have been developed for solution of nonlinear control problems. It was thought that idempotent linearity o...
William M. McEneaney