Results 51 to 60 of about 2,593 (166)
Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain. [PDF]
Gupta M +7 more
europepmc +1 more source
A silent duel over a cake [PDF]
Game Theory;Equilibrium Analysis;game ...
Hamers, H.J.M.
core +1 more source
Continuous-Time Games of Timing [PDF]
We address the question of existence of equilibrium in general timing games of complete information. Under weak assumptions, any two-player timing game has a subgame perfect e-equilibrium, for each e > 0. This result is tight.
Eilon, SOLAN +2 more
core
The Many-on-One Stochastic Duel Model with Information-Sharing
In this paper we extend the one-on-one stochastic duel model with searching to the many-on-one case based on information-sharing. We have derived the probability density function of the time to kill the target in many-on-one model. It is illustrated by an example in which the firing time and the searching time are of different exponential distributions.
Jianjun Li, Liwei Liu
openaire +2 more sources
Utility-based Dueling Bandits as a Partial Monitoring Game
Partial monitoring is a generic framework for sequential decision-making with incomplete feedback. It encompasses a wide class of problems such as dueling bandits, learning with expect advice, dynamic pricing, dark pools, and label efficient prediction ...
Gajane, Pratik, Urvoy, Tanguy
core
Negative feedback may suppress variation to improve collective foraging performance. [PDF]
Reina A, Marshall JAR.
europepmc +1 more source
Conflict-free collective stochastic decision making by orbital angular momentum of photons through quantum interference. [PDF]
Amakasu T +5 more
europepmc +1 more source
Decoy Bandits Dueling on a Poset
We adress the problem of dueling bandits defined on partially ordered sets, or posets. In this setting, arms may not be comparable, and there may be several (incomparable) optimal arms.
Audiffren, Julien, Liva, Ralaivola
core +1 more source
Biased Dueling Bandits with Stochastic Delayed Feedback
The dueling bandit problem, an essential variation of the traditional multi-armed bandit problem, has become significantly prominent recently due to its broad applications in online advertising, recommendation systems, information retrieval, and more.
Yi, Bongsoo, Kang, Yue, Li, Yao
openaire +2 more sources
On the Performance of Generative Adversarial Network by Limiting Mode Collapse for Malware Detection Systems. [PDF]
Murray A, Rawat DB.
europepmc +1 more source

