Search Results - "Algorithmic Game Theory and Mechanism Design"
-
1
HIFI: Explaining and Mitigating Algorithmic Bias Through the Lens of Game-Theoretic Interactions
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Machine Learning (ML) algorithms are increasingly used in decision-making process across various social-critical domains, but they often somewhat inherit and…”
Get full text
Conference Proceeding -
2
Comonadic semantics for guarded fragments
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…In previous work ([1], [2], [3]), it has been shown how a range of model comparison games which play a central role in finite model theory, including…”
Get full text
Conference Proceeding -
3
Multi-Structural Games and Number of Quantifiers
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…We study multi-structural games, played on two sets {\mathcal{A}} and {\mathcal{B}} of structures. These games generalize Ehrenfeucht-Fraïssé games. Whereas…”
Get full text
Conference Proceeding -
4
Asynchronous Template Games and the Gray Tensor Product of 2-Categories
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…In his recent and exploratory work on template games and linear logic, Melliès defines sequential and concurrent games as categories with positions as objects…”
Get full text
Conference Proceeding -
5
System Component-Level Self-Adaptations for Security via Bayesian Games
ISBN: 1665412194, 9781665412193Published: IEEE 01.05.2021Published in 2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (01.05.2021)“…Security attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. However, modeling the system as a…”
Get full text
Conference Proceeding -
6
Compositional relational reasoning via operational game semantics
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…We show how to use operational game semantics as a guide to develop relational techniques for establishing contextual equivalences with respect to contexts…”
Get full text
Conference Proceeding -
7
Inapproximability of Unique Games in Fixed-Point Logic with Counting
Published: IEEE 29.06.2021Published in Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science (29.06.2021)“…We study the extent to which it is possible to approximate the optimal value of a Unique Games instance in Fixed-Point Logic with Counting (FPC). We prove two…”
Get full text
Conference Proceeding -
8
Auto-tuning Spark big data workloads on POWER8: Prediction-based dynamic SMT threading
Published: ACM 01.09.2016Published in 2016 International Conference on Parallel Architecture and Compilation Techniques (PACT) (01.09.2016)“…Much research work devotes to tuning big data analytics in modern data centers, since even a small percentage of performance improvement immediately translates…”
Get full text
Conference Proceeding -
9
A novel individually rational objective in multi-agent multi-armed bandits: Algorithms and regret bounds
ISSN: 1558-2914, 1548-8403Published: 2020Published in Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems (2020)“…We study a two-player stochastic multi-armed bandit (MAB) problem with different expected rewards for each player, a generalisation of two-player general sum…”
Get full text
Conference Proceeding -
10
Game-Theoretic Modeling of Human Adaptation in Human-Robot Collaboration
ISBN: 9781450343367, 1450343368ISSN: 2167-2148Published: New York, NY, USA ACM 06.03.2017Published in 2017 12th ACM/IEEE International Conference on Human-Robot Interaction (HRI (06.03.2017)“…In human-robot teams, humans often start with an inaccurate model of the robot capabilities. As they interact with the robot, they infer the robot's…”
Get full text
Conference Proceeding -
11
Defining Winning Strategies in Fixed-Point Logic
ISSN: 1043-6871Published: IEEE 01.07.2015Published in 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (01.07.2015)“…We study definability questions for positional winning strategies in infinite games on graphs. The quest for efficient algorithmic constructions of winning…”
Get full text
Conference Proceeding -
12
What if Autonomous Systems Had a Game Master? Targeted Explaining With the Help of a Supervisory Control System
Published: ACM 20.04.2024Published in 2024 IEEE/ACM Workshop on Explainability Engineering (ExEn) (20.04.2024)“…In the era of increasing automation, systems are making more autonomous decisions than ever before, often leading to conflicts with other systems. In…”
Get full text
Conference Proceeding -
13
Federated Node Classification over Distributed Ego-Networks with Secure Contrastive Embedding Sharing
ISSN: 2155-0751Published: United States 01.01.2024Published in Proceedings of the ... ACM International Conference on Information & Knowledge Management (01.01.2024)“…Federated learning on graphs (a.k.a., federated graph learning- FGL) has recently received increasing attention due to its capacity to enable collaborative…”
Get more information
Journal Article -
14
Strategic Considerations for Neuromorphic Computing
Published: IEEE 30.07.2024Published in 2024 International Conference on Neuromorphic Systems (ICONS) (30.07.2024)“…Co-design is a prominent topic presently in computing, speaking to the mutual benefit of coordinating design choices of several layers in the technology stack…”
Get full text
Conference Proceeding -
15
On Fighting Fire with Fire: Strategic Destabilization of Terrorist Networks
ISBN: 1450349935, 9781450349932Published: New York, NY, USA ACM 31.07.2017Published in Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 (31.07.2017)“…Terrorist organizations have social networks that enable them to recruit and operate around the world. This paper presents a novel computational framework for…”
Get full text
Conference Proceeding -
16
In This Apportionment Lottery, the House Always Wins
Published: St. Louis Federal Reserve Bank of St. Louis 01.01.2022Published in IDEAS Working Paper Series from RePEc (01.01.2022)Get full text
Paper -
17
Using Behavioural Programming with Solver, Context, and Deep Reinforcement Learning for Playing a Simplified RoboCup-Type Game
Published: IEEE 01.09.2019Published in 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C) (01.09.2019)“…We describe four scenario-based implementations of controllers for a player in a simplified RoboCup-type game. All four implementations are based on the…”
Get full text
Conference Proceeding -
18
Resource and Revenue Sharing with Coalition Formation of Cloud Providers: Game Theoretic Approach
ISBN: 1457701294, 9781457701290Published: IEEE 01.05.2011Published in 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (01.05.2011)“…In cloud computing, multiple cloud providers can cooperate to establish a resource pool to support internal users and to offer services to public cloud users…”
Get full text
Conference Proceeding -
19
Markov decision process routing games
ISBN: 9781450349659, 145034965XPublished: New York, NY, USA ACM 18.04.2017Published in 2017 ACM IEEE 8th International Conference on Cyber Physical Systems (ICCPS) (18.04.2017)“…We explore an extension of nonatomic routing games that we call Markov decision process routing games where each agent chooses a transition policy between…”
Get full text
Conference Proceeding -
20
On the Robustness of Influence Maximization Algorithms against Non-Adversarial Perturbations
ISBN: 1450349935, 9781450349932ISSN: 2473-991XPublished: New York, NY, USA ACM 31.07.2017Published in 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (31.07.2017)“…Influence maximization is a combinatorial optimization problem on a graph: Given a social network, an influence maximization algorithm aims to find a set of…”
Get full text
Conference Proceeding

