- arXiv.org
- Space Physics
- Popular Physics
- Data Analysis, Statistics and Probability
- Physics and Society
- History and Philosophy of Physics
- Biological Physics
- Atomic and Molecular Clusters
- Optics
- Fluid Dynamics
- General Physics
- Plasma Physics
- Medical Physics
- Geophysics
- Atomic Physics
- Instrumentation and Detectors
- Classical Physics
- Computational Physics
- Chemical Physics
- Physics Education
- Accelerator Physics
- Atmospheric and Oceanic Physics

- Information Theory
- Number Theory
- Analysis of PDEs
- Statistics Theory
- Combinatorics
- Mathematical Physics
- Representation Theory
- Algebraic Geometry
- Operator Algebras
- Probability
- Complex Variables
- Group Theory
- History and Overview
- Symplectic Geometry
- Metric Geometry
- Numerical Analysis
- Optimization and Control
- Dynamical Systems
- General Topology
- Quantum Algebra
- Geometric Topology
- Differential Geometry
- General Mathematics
- Logic
- Commutative Algebra
- Functional Analysis
- Algebraic Topology
- K-Theory and Homology
- Rings and Algebras
- Category Theory
- Spectral Theory
- Classical Analysis and ODEs

- Operating Systems
- Symbolic Computation
- Information Theory
- Information Retrieval
- Formal Languages and Automata Theory
- Multiagent Systems
- Computational Complexity
- General Literature
- Computer Vision and Pattern Recognition
- Emerging Technologies
- Learning
- Software Engineering
- Social and Information Networks
- Numerical Analysis
- Neural and Evolutionary Computing
- Databases
- Sound
- Programming Languages
- Other Computer Science
- Cryptography and Security
- Distributed, Parallel, and Cluster Computing
- Digital Libraries
- Artificial Intelligence
- Computer Science and Game Theory
- Human-Computer Interaction
- Computational Engineering, Finance, and Science
- Systems and Control
- Discrete Mathematics
- Performance
- Mathematical Software
- Hardware Architecture
- Data Structures and Algorithms
- Computation and Language
- Multimedia
- Computers and Society
- Computational Geometry
- Graphics
- Logic in Computer Science
- Robotics
- Networking and Internet Architecture

- In this paper, we study the notion of admissibility for randomised strategies in concurrent games. Intuitively, an admissible strategy is one where the player plays `as well as possible', because there is no other strategy that dominates it, i.e., that wins (almost surely) against a super set of adversarial strategies. We prove that admissible strategies always exist in concurrent games, and we characterise them precisely. Then, when the objectives of the players are omega-regular, we show how to perform assume-admissible synthesis, i.e., how to compute admissible strategies that win (almost surely) under the hypothesis that the other players play admissible
- Critical infrastructure protection (CIP) is envisioned to be one of the most challenging security problems in the coming decade. One key challenge in CIP is the ability to allocate resources, either personnel or cyber, to critical infrastructures with different vulnerability and criticality levels. In this work, a contract-theoretic approach is proposed to solve the problem of resource allocation in critical infrastructure with asymmetric information. A control center (CC) is used to design contracts and offer them to infrastructures' owners. A contract can be seen as an agreement between the CC and infrastructures using which the CC allocates resources and gets rewards in return. Contracts are designed in a way to maximize the CC's benefit and motivate each infrastructure to accept a contract and obtain proper resources for its protection. Infrastructures are defined by both vulnerability levels and criticality levels which are unknown to the CC. Therefore, each infrastructure can claim that it is the most vulnerable or critical to gain more resources. A novel mechanism is developed to handle such an asymmetric information while providing the optimal contract that motivates each infrastructure to reveal its actual type. The necessary and sufficient conditions for such resource allocation contracts under asymmetric information are derived. Simulation results show that the proposed contract-theoretic approach maximizes the CC's utility while ensuring that no infrastructure has an incentive to ask for another contract, despite the lack of exact information at the CC.
- Feb 22 2017 cs.GT arXiv:1702.06189v1In this work, we study the social learning problem, in which agents of a networked system collaborate to detect the state of the nature based on their private signals. A novel distributed graphical evolutionary game theoretic learning method is proposed. In the proposed game-theoretic method, agents only need to communicate their binary decisions rather than the real-valued beliefs with their neighbors, which endows the method with low communication complexity. Under mean field approximations, we theoretically analyze the steady state equilibria of the game and show that the evolutionarily stable states (ESSs) coincide with the decisions of the benchmark centralized detector. Numerical experiments are implemented to confirm the effectiveness of the proposed game-theoretic learning method.

A Discrete and Bounded Envy-Free Cake Cutting Protocol for Any Number of ...

Māris Ozols Oct 21 2016 21:06 UTCPiotr Migdał Apr 18 2014 18:43 UTC

...(continued)A podcast summarizing this paper, by Geoff Engelstein: [The Dice Tower # 351 - Dealing with the Mockers (43:55 - 50:36)](http://dicetower.coolstuffinc.com/tdt-351-dealing-with-the-mockers), and [an alternative link on the BoardGameGeek](http://boardgamegeek.com/boardgamepodcastepisode/117163/tdt-351