Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Inapproximability of Nash equilibrium
A Rubinstein - Proceedings of the forty-seventh annual ACM …, 2015 - dl.acm.org
We prove that finding an ε-approximate Nash equilibrium is PPAD-complete for constant ε
and a particularly simple class of games: polymatrix, degree 3 graphical games, in which …
and a particularly simple class of games: polymatrix, degree 3 graphical games, in which …
Lossless abstraction of imperfect information games
A Gilpin, T Sandholm - Journal of the ACM (JACM), 2007 - dl.acm.org
Finding an equilibrium of an extensive form game of imperfect information is a fundamental
problem in computational game theory, but current techniques do not scale to large games …
problem in computational game theory, but current techniques do not scale to large games …
An efficient heuristic approach for security against multiple adversaries
In adversarial multiagent domains, security, commonly defined as the ability to deal with
intentional threats from other agents, is a critical issue. This paper focuses on domains …
intentional threats from other agents, is a critical issue. This paper focuses on domains …
Exploiting locality of interaction in factored Dec-POMDPs
Decentralized partially observable Markov decision processes (Dec-POMDPs) constitute an
expressive framework for multiagent planning under uncertainty, but solving them is …
expressive framework for multiagent planning under uncertainty, but solving them is …
Protecting privacy through distributed computation in multi-agent decision making
T Léauté, B Faltings - Journal of Artificial Intelligence Research, 2013 - jair.org
As large-scale theft of data from corporate servers is becoming increasingly common, it
becomes interesting to examine alternatives to the paradigm of centralizing sensitive data …
becomes interesting to examine alternatives to the paradigm of centralizing sensitive data …
Game theoretic control for robot teams
R Emery-Montemerlo, G Gordon… - Proceedings of the …, 2005 - ieeexplore.ieee.org
In the real world, noisy sensors and limited communication make it difficult for robot teams to
coordinate in tightly coupled tasks. Team members cannot simply apply single-robot solution …
coordinate in tightly coupled tasks. Team members cannot simply apply single-robot solution …
Computing pure Bayesian-Nash equilibria in games with finite actions and continuous types
We extend the well-known fictitious play (FP) algorithm to compute pure-strategy Bayesian-
Nash equilibria in private-value games of incomplete information with finite actions and …
Nash equilibria in private-value games of incomplete information with finite actions and …
Game theoretic modeling of malicious users in collaborative networks
G Theodorakopoulos, JS Baras - IEEE Journal on selected …, 2008 - ieeexplore.ieee.org
If a network is to operate successfully, its users need to collaborate. Collaboration takes the
form of following a network protocol and involves some resource expenditure on the part of …
form of following a network protocol and involves some resource expenditure on the part of …
Computing best-response strategies in infinite games of incomplete information
D Reeves, MP Wellman - arxiv preprint arxiv:1207.4171, 2012 - arxiv.org
We describe an algorithm for computing best response strategies in a class of two-player
infinite games of incomplete information, defined by payoffs piecewise linear in agents' types …
infinite games of incomplete information, defined by payoffs piecewise linear in agents' types …
Approximate and online multi-issue negotiation
This paper analyzes bilateral multi-issue negotiation between self-interested autonomous
agents. The agents have time constraints in the form of both deadlines and discount factors …
agents. The agents have time constraints in the form of both deadlines and discount factors …