>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Game Theoretic相关记录19条 . 查询时间(0.046 秒)
Coin toss has been extensively studied in the cryptography literature, and the well-accepted notion of fairness (henceforth called strong fairness) requires that a corrupt coalition cannot cause non-n...
This article presents a new model for word sense disambiguation formulated in terms of evolutionary game theory, where each word to be disambiguated is represented as a node on a graph whose edges r...
Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols for fa...
In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their computations to third-party cloud servers. In order to protect service quality, the inte...
In this paper, we consider the following question: Does composing protocols having gametheoretic security result in a secure protocol in the sense of game-theoretic security? In order to discuss the...
A game-theoretic model is proposed to study the cross-layer problem of joint power and rate control with quality of service (QoS) constraints in multiple-access networks. In the proposed game, each us...
We construct a fully specified extensive form game that captures competitive markets with adverse selection. In particular, it allows firms to offer any finite set of contracts, so that cross-subsidiz...
A control law is constructed for a linear time varying system by solving a two player zero sum differential game on a moving horizon, the game being that which is used to construct an H-infinity contr...
This study proposes a game-theoretic approach to model and analyze the process of utilizing biomass for power generation considering three players: distributor, facility developer, and participating f...
We demonstrate how Game Theoretic concepts and formalism can be used to capture cryptographic notions of security. In the restricted but indicative case of two-party protocols in the face of malicious...
Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of i...
Abstract: This paper handles a kind of strategic game called potential games and develops a novel learning algorithm Payoff-based Inhomogeneous Partially Irrational Play (PIPIP). The present algorithm...
Political and social activists are rightfully concerned about future generations: whenever a country borrows money, or an environmental situation worsens, this means, in effect, that we impose an addi...
The paper deals with the methodology of computer modeling and simulation of complex markets with electricity and related products. The methodology is presented using a particular configuration of Cen...
This paper studies robustness of a gradient-type CDMA uplink power control algorithm with respect to disturbances and time-delays. This problem is of practical importance because unmodeled secondary i...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...