Sciweavers

133 search results - page 6 / 27
» Towards a Game Theoretic View of Secure Computation
Sort
View
DIGRA
2005
Springer
14 years 1 months ago
Theory as Game: Designing the Game Game
Is there a way to analyze games by the means of a game? Is there a way to brainstorm game ideas and design solutions through theory? Finnish scholar and game designer Aki Järvine...
Aki Järvinen
JAIR
2011
214views more  JAIR 2011»
12 years 10 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
CHI
2009
ACM
14 years 8 months ago
Synchronized communication and coordinated views: qualitative data discovery for team game user studies
We present a tool for qualitative data discovery that aids researchers in analyzing synchronized log data with audio collected from multiple computers. The tool was originally dev...
William A. Hamilton, Zachary O. Toups, Andruid Ker...
NOSSDAV
2005
Springer
14 years 1 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
FOCS
2006
IEEE
14 years 1 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...