Conference Proceedings: Recent submissions
Now showing items 16-18 of 29
-
Mechanism design with set-theoretic beliefs
(© IEEE, 2011-10-22)In settings of incomplete information, we put forward (1) a very conservative -- indeed, purely set-theoretic -- model of the beliefs (including totally wrong ones) that each player may have about the payoff types of his ... -
The evolution of network based cybersecurity norms: An analytical narrative
(© IEEE, 2014-08-13)We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary game theoretical model [2]. We suggest that norms to encourage network based security systems may not evolve independently ... -
Rational proofs
(© Association for Computing Machinery, New York, NY, USA, 2012-05-19)We study a new type of proof system, where an unbounded prover and a polynomial time verifier interact, on inputs a string x and a function f , so that the Verifier may learn f (x). The novelty of our setting is that there ...