Exploring Information Asymmetry in Two-Stage Security Games
|
|
- Pamela Powers
- 5 years ago
- Views:
Transcription
1 Exploring Information Asymmetry in Two-Stage Security Games Haifeng Xu 1, Zinovi Rabinovich 2, Shaddin Dughmi 1, Milind Tambe 1 1 University of Southern California 2 Independent Researcher
2 Security Games Background Stackelberg Games Defender/Attacker players Protect a set of targets using limited resources Flights Roads Ports Wildlife Strong Stackelberg Equilibrium 2 /54
3 What is Defense? (Randomly) allocate resources to protect targets Shape the attacker s belief on the protection of targets. E.g., manipulate the information regarding the game to bias the attacker s belief Protected? Probably! 3 /54
4 Information & Beliefs Attacker s belief depends on the information he has Information asymmetry gives rise to manipulation Widely studied in economics [2001 Nobel Prize] In security: defender usually has more information How should defender make use of additional information for strategic gain? 4 /54
5 Contributions Initiate the study of strategic information in security Show when (always?) and how (optimally?) can information help? 5 /54
6 Outline An Example Domain Information Revelation Scheme General Modeling and Results 6 /54
7 Outline An Example Domain Information Revelation Scheme General Modeling and Results 7 /54
8 Example Domain: Fare Evasion Fare Evasion in LA Metro System [Yin et al. 2012] Proof-of-payment Estimated annual loss: $5.6 million 300,000 rider daily ( 2.5% evader) 8 /54
9 Example Domain: Fare Evasion Traditionally: /54
10 Example Domain: Fare Evasion Traditionally: p:0.2 1 Another option is to buy a ticket; both get 0. 1 p:0.2 2 defu = evau = 0.4 p: /54
11 Zoom in: Example Domain: Fare Evasion Protected? Yes! Protected? p=0.2 Station announces a message -- an inspector is inside! Unfortunately, such lucky chance happens with p=0.2 Is there a smarter way? 11 /54
12 Outline An Example Domain Information Revelation Scheme General Modeling and Results 12 /54
13 A Strategic Way Twomessages m c or m 0.2 u : covered 0.2 Persuasion m c P(cover m evau 0; 0.8 c ) 1/ 4; P(uncover m defu 1 Buy defu =0 c ) 3/ uncovered m u evau = 2 defu = -2 In expectation, defu = -0.4 ( > -1.2 ); evau = 0.4 (no change) 13 /54
14 Persuasion in a Nutshell 0.2 P(cover m evau 0; c ) 1/ 4; P(uncover defu 1 m c ) 3/ covered m c uncovered m u A posterior, which is bad for both players Persuasion Scheme identifies such a posterior, and signal it to the evader 14 /54
15 Outline An Example Domain Information Revelation Scheme General Modeling and Results 15 /54
16 Modeling A natural two-stage security game model Phase 1: scheduling (as regular security games) Phase 2 : strategically reveal information at each target (persuasion) 16 /54
17 Assumption Questions Why should the attacker follow the persuasion scheme? His best response, given the information Why should the defender honestly send signals? Signaling scheme should be trustful Why breaks tie in favor of the defender? Without loss of generality 17 /54
18 Theoretical Results When would the defender strictly benefit by information (notice that the defender is never worse off)? provide a succinct iff characterization No benefit in zero-sum games How would the attacker s utility change? Does not change if the defender persuade optimally How to do both phases optimally? Phase 2: an LP for each target, parameterized by marginal coverage Phase 1 the Strong Stackelberg Equilibrium (SSE) of its standard version -- need to consider the effect of phase 2 Algorithm: multiple LPs and the same complexity as computing SSE 18 /54
19 Theoretical Results When would the defender strictly benefit by information (notice that the defender is never worse off)? The paper provides a succinct iff characterization No benefit in zero-sum games How would the attacker s utility change? Does not change if the defender persuade optimally How to do both phases optimally? Phase 2: an LP for each target, parameterized by marginal coverage Phase 1 the Strong Stackelberg Equilibrium (SSE) of its standard version -- need to consider the effect of phase 2 Algorithm: multiple LPs and the same complexity as computing SSE 19 /54
20 Theoretical Results When would the defender strictly benefit by information? (notice that the defender is never worse off) The paper provides a succinct iff characterization No benefit in zero-sum games How would the attacker s utility change? Does not change if the defender persuade optimally How to do both phases optimally? Phase 2: an LP for each target, parameterized by marginal coverage Phase 1 the Strong Stackelberg Equilibrium (SSE) of its standard version -- need to consider the effect of phase 2 Algorithm: multiple LPs and the same complexity as computing SSE 20 /54
21 Simulations Measures proximity to zero-sum 21 /54
22 Open Problems General extensive form games? Other type of information? Defender s knowledge about resources, targets, environments. Human behavior models (irrational attacker) Information asymmetry in general strategic interactions 22 /54
23 Thanks Q&A 23 /54
Game Theory for Safety and Security. Arunesh Sinha
Game Theory for Safety and Security Arunesh Sinha Motivation: Real World Security Issues 2 Central Problem Allocating limited security resources against an adaptive, intelligent adversary 3 Prior Work
More informationAnavilhanas Natural Reserve (about 4000 Km 2 )
Anavilhanas Natural Reserve (about 4000 Km 2 ) A control room receives this alarm signal: what to do? adversarial patrolling with spatially uncertain alarm signals Nicola Basilico, Giuseppe De Nittis,
More informationModeling Security Decisions as Games
Modeling Security Decisions as Games Chris Kiekintveld University of Texas at El Paso.. and MANY Collaborators Decision Making and Games Research agenda: improve and justify decisions Automated intelligent
More informationCSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi
CSCI 699: Topics in Learning and Game Theory Fall 217 Lecture 3: Intro to Game Theory Instructor: Shaddin Dughmi Outline 1 Introduction 2 Games of Complete Information 3 Games of Incomplete Information
More informationLecture #3: Networks. Kyumars Sheykh Esmaili
Lecture #3: Game Theory and Social Networks Kyumars Sheykh Esmaili Outline Games Modeling Network Traffic Using Game Theory Games Exam or Presentation Game You need to choose between exam or presentation:
More informationScalable Randomized Patrolling for Securing Rapid Transit Networks
Scalable Randomized Patrolling for Securing Rapid Transit Networks Pradeep Varakantham, Hoong Chuin Lau, Zhi Yuan School of Information Systems, Singapore Management University, Singapore {pradeepv,hclau,zhiyuan}@smu.edu.sg
More informationReciprocating Trust or Kindness
Reciprocating Trust or Kindness Ilana Ritov Hebrew University Belief Based Utility Conference, CMU 2017 Trust and Kindness Trusting a person typically involves giving some of one's resources to that person,
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition
More informationSummary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility
Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility theorem (consistent decisions under uncertainty should
More informationBelief-based rational decisions. Sergei Artemov
Belief-based rational decisions Sergei Artemov September 22, 2009 1 Game Theory John von Neumann was an Hungarian American mathematician who made major contributions to mathematics, quantum mechanics,
More informationGame Theory. Wolfgang Frimmel. Dominance
Game Theory Wolfgang Frimmel Dominance 1 / 13 Example: Prisoners dilemma Consider the following game in normal-form: There are two players who both have the options cooperate (C) and defect (D) Both players
More information1 Game Theory and Strategic Analysis
Page 1 1 Game Theory and Strategic Analysis 11. 12. 13. 14. Static Games and Nash Equilibrium Imperfect Competition Explicit and Implicit Cooperation Strategic Commitment (a) Sequential games and backward
More information0.1 Battle of the Sexes. 0.2 Chicken. 0.3 Coordination Game
This is a record of most of the different games we have tested with RSRS. In all cases, the prediction algorithm used is fictitious play, and games are repeated times. In each figure the top graph shows
More informationRandomizing Regression Tests Using Game Theory
Randomizing Regression Tests Using Game Theory Nupul Kukreja, William G.J. Halfond, Milind Tambe University of Southern California Los Angeles, California, USA Email: {nkukreja, halfond, tambe}@usc.edu
More informationDetails of Play Each player counts out a number of his/her armies for initial deployment, according to the number of players in the game.
RISK Risk is a fascinating game of strategy in which a player can conquer the world. Once you are familiar with the rules, it is not a difficult game to play, but there are a number of unusual features
More informationA short introduction to Security Games
Game Theoretic Foundations of Multiagent Systems: Algorithms and Applications A case study: Playing Games for Security A short introduction to Security Games Nicola Basilico Department of Computer Science
More informationInstructions [CT+PT Treatment]
Instructions [CT+PT Treatment] 1. Overview Welcome to this experiment in the economics of decision-making. Please read these instructions carefully as they explain how you earn money from the decisions
More informationU strictly dominates D for player A, and L strictly dominates R for player B. This leaves (U, L) as a Strict Dominant Strategy Equilibrium.
Problem Set 3 (Game Theory) Do five of nine. 1. Games in Strategic Form Underline all best responses, then perform iterated deletion of strictly dominated strategies. In each case, do you get a unique
More informationGame Theory. Department of Electronics EL-766 Spring Hasan Mahmood
Game Theory Department of Electronics EL-766 Spring 2011 Hasan Mahmood Email: hasannj@yahoo.com Course Information Part I: Introduction to Game Theory Introduction to game theory, games with perfect information,
More informationGame Theoretic Analysis of Security and Sustainability
Game Theoretic Analysis of Security and Sustainability Bo An boan@ntu.edu.sg School of Computer Science and Engineering Nanyang Technological University August 22, 2017@IJCAI 17, Early Career Spotlight
More informationTUESDAYS & FRIDAYS NOW WITH DRAWS PLUS BIGGER JACKPOTS DREAM TO THE MAX HOSPITALITY NETWORK. Retailer Information
NOW WITH DRAWS TUESDAYS & FRIDAYS PLUS BIGGER JACKPOTS Retailer Information HOSPITALITY NETWORK DREAM TO THE MAX For more information, please contact your BCLC Territory Manager or Lottery Support Hotline
More informationTopic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition
SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se Topic 1: defining games and strategies Drawing a game tree is usually the most informative way to represent an extensive form game. Here is one
More informationINTRODUCTION OBJECT OF THE GAME. Classic Bingo. Pattern Bingo
INTRODUCTION Bingo offers players a choice of several Bingo Rooms, each with its own variations and twists. Some Bingo Rooms are for players from the province of Quebec only, while others welcome players
More informationThe topic for the third and final major portion of the course is Probability. We will aim to make sense of statements such as the following:
CS 70 Discrete Mathematics for CS Spring 2006 Vazirani Lecture 17 Introduction to Probability The topic for the third and final major portion of the course is Probability. We will aim to make sense of
More informationGame Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012
Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 01 Rationalizable Strategies Note: This is a only a draft version,
More informationMilind Tambe on game theory in security applications Machine...
Milind Tambe on game theory in security applications Machine... https://intelligence.org/2014/05/30/milind-tambe/ Milind Tambe on game theory in security applications Tweet 0 Like 0 1 May 30, 2014 Luke
More informationSUPPOSE that we are planning to send a convoy through
IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 40, NO. 3, JUNE 2010 623 The Environment Value of an Opponent Model Brett J. Borghetti Abstract We develop an upper bound for
More informationTech the Halls is back again this year and we ve made it even better!
Consumer Promotion All Retail Networks Tech The Halls Contest is back! Thanks to your support, last year s contest was a great success! We received over 6 million unique entries into the contest and 1.4
More informationTech the Halls is back again this year and we ve made it even better!
Consumer Promotion All Retail Networks Tech The Halls Contest is back! Thanks to your support, last year s contest was a great success! We received over 5 million unique entries into the contest and 1.6
More informationAsynchronous Best-Reply Dynamics
Asynchronous Best-Reply Dynamics Noam Nisan 1, Michael Schapira 2, and Aviv Zohar 2 1 Google Tel-Aviv and The School of Computer Science and Engineering, The Hebrew University of Jerusalem, Israel. 2 The
More informationA Game Theoretic Approach on Addressing Cooperation among Human Adversaries
A Game Theoretic Approach on Addressing Cooperation among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California,
More informationGame theory attempts to mathematically. capture behavior in strategic situations, or. games, in which an individual s success in
Game Theory Game theory attempts to mathematically capture behavior in strategic situations, or games, in which an individual s success in making choices depends on the choices of others. A game Γ consists
More informationGAMES BEGIN JULY 25 TH! RETAIL PRODUCT PLAN JULY AUGUST calottery.com
GAMES BEGIN JULY 25 TH! RETAIL PRODUCT PLAN JULY AUGUST 2016 calottery.com COMING SOON AUGUST 2016 SUPERLOTTO PLUS RAFFLE PROMOTION Make Sure Your Players Know! The SuperLotto Plus Raffle Promotion is
More informationMinmax and Dominance
Minmax and Dominance CPSC 532A Lecture 6 September 28, 2006 Minmax and Dominance CPSC 532A Lecture 6, Slide 1 Lecture Overview Recap Maxmin and Minmax Linear Programming Computing Fun Game Domination Minmax
More information10. Because the order of selection doesn t matter: selecting 3, then 5 is the same as selecting 5, then 3. 25! 24 = 300
Chapter 6 Answers Lesson 6.1 1. li, lo, ln, ls, il, io, in, is, ol, oi, on, os, nl, ni, no, ns, sl, si, so, sn 2. 5, 4, 5 4 = 20, 6 5 = 30 3. (1,2) (1,3) (1,4) (1,5) (1,6) (1,7) (1,8) (1,9) (2,3) (2,4)
More informationIntroduction to Industrial Organization Professor: Caixia Shen Fall 2014 Lecture Note 6 Games and Strategy (ch.4)-continue
Introduction to Industrial Organization Professor: Caixia Shen Fall 014 Lecture Note 6 Games and Strategy (ch.4)-continue Outline: Modeling by means of games Normal form games Dominant strategies; dominated
More informationAdversarial Search and Game Theory. CS 510 Lecture 5 October 26, 2017
Adversarial Search and Game Theory CS 510 Lecture 5 October 26, 2017 Reminders Proposals due today Midterm next week past midterms online Midterm online BBLearn Available Thurs-Sun, ~2 hours Overview Game
More informationLecture 6: Basics of Game Theory
0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 6: Basics of Game Theory 25 November 2009 Fall 2009 Scribes: D. Teshler Lecture Overview 1. What is a Game? 2. Solution Concepts:
More informationGame Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness
Game Theory and Algorithms Lecture 3: Weak Dominance and Truthfulness March 1, 2011 Summary: We introduce the notion of a (weakly) dominant strategy: one which is always a best response, no matter what
More informationChapter 13. Game Theory
Chapter 13 Game Theory A camper awakens to the growl of a hungry bear and sees his friend putting on a pair of running shoes. You can t outrun a bear, scoffs the camper. His friend coolly replies, I don
More informationGame theory Computational Models of Cognition
Game theory Taxonomy Rational behavior Definitions Common games Nash equilibria Mixed strategies Properties of Nash equilibria What do NE mean? Mutually Assured Destruction 6 rik@cogsci.ucsd.edu Taxonomy
More informationICONIP 2009 Intelligent Liar Competition: Liar Dice (Individual Hand)
ICONIP 2009 Intelligent Liar Competition: Liar Dice (Individual Hand) Organizer: John SUM Institute of Technology & Innovation Management National Chung Hsing University Taichung 40227, Taiwan. Email:
More informationCOMPSCI 223: Computational Microeconomics - Practice Final
COMPSCI 223: Computational Microeconomics - Practice Final 1 Problem 1: True or False (24 points). Label each of the following statements as true or false. You are not required to give any explanation.
More informationComputational Game Theory for Security: Progress and Challenges
Computational Game Theory for Security: Progress and Challenges Milind Tambe, Albert Xin Jiang Computer Science Department University of Southern California Los Angeles, CA 90089 {tambe, jiangx}@usc.edu
More informationTwo Perspectives on Logic
LOGIC IN PLAY Two Perspectives on Logic World description: tracing the structure of reality. Structured social activity: conversation, argumentation,...!!! Compatible and Interacting Views Process Product
More informationECO 5341 Strategic Behavior Lecture Notes 3
ECO 5341 Strategic Behavior Lecture Notes 3 Saltuk Ozerturk SMU Spring 2016 (SMU) Lecture Notes 3 Spring 2016 1 / 20 Lecture Outline Review: Dominance and Iterated Elimination of Strictly Dominated Strategies
More informationThe next several lectures will be concerned with probability theory. We will aim to make sense of statements such as the following:
CS 70 Discrete Mathematics for CS Fall 2004 Rao Lecture 14 Introduction to Probability The next several lectures will be concerned with probability theory. We will aim to make sense of statements such
More informationPROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States
PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States Eric Shieh +, Bo An +, Rong Yang +, Milind Tambe +, Craig Baldwin*, Joseph DiRenzo*, Ben Maule*, Garrett Meyer* + University
More informationGame playing. Chapter 6. Chapter 6 1
Game playing Chapter 6 Chapter 6 1 Outline Games Perfect play minimax decisions α β pruning Resource limits and approximate evaluation Games of chance Games of imperfect information Chapter 6 2 Games vs.
More informationLotto! Online Product Guide
BCLC Lotto! Online Product Guide Resource Manual for Lottery Retailers October 18, 2016 The focus of this document is to provide retailers the tools needed in order to feel knowledgeable when selling and
More informationA Game Theoretic Approach on Addressing Collusion among Human Adversaries
A Game Theoretic Approach on Addressing Collusion among Human Adversaries Shahrzad Gholami, Bryan Wilder, Matthew Brown, Arunesh Sinha, Nicole Sintov, Milind Tambe University of Southern California, USA,
More informationSession Outline. Application of Game Theory in Economics. Prof. Trupti Mishra, School of Management, IIT Bombay
36 : Game Theory 1 Session Outline Application of Game Theory in Economics Nash Equilibrium It proposes a strategy for each player such that no player has the incentive to change its action unilaterally,
More informationCalifornia State Lottery Commission. Susan S. Kossack, Deputy Director, Marketing
Date: To: California State Lottery Commission From: Joan M. Borucki Director Prepared By: Susan S. Kossack, Deputy Director, Marketing Subject: Item 9(b) Scratchers Game Profiles for Games 597, 598, 599,
More informationBackward Induction and Stackelberg Competition
Backward Induction and Stackelberg Competition Economics 302 - Microeconomic Theory II: Strategic Behavior Shih En Lu Simon Fraser University (with thanks to Anke Kessler) ECON 302 (SFU) Backward Induction
More informationArpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore
Speaker Arpita Biswas PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore Email address: arpita.biswas@live.in OUTLINE Game Theory Basic Concepts and Results
More informationebay in the Sky: StrategyProof Wireless Spectrum Auctions
ebay in the Sky: StrategyProof Wireless Spectrum Auctions Xia Zhou, Sorabh Gandhi, Subhash Suri, Heather Zheng Department of Computer Science University of California, Santa Barbara IUSTITIA (Goddess of
More informationADVERSARIAL SEARCH. Chapter 5
ADVERSARIAL SEARCH Chapter 5... every game of skill is susceptible of being played by an automaton. from Charles Babbage, The Life of a Philosopher, 1832. Outline Games Perfect play minimax decisions α
More informationStudent Name. Student ID
Final Exam CMPT 882: Computational Game Theory Simon Fraser University Spring 2010 Instructor: Oliver Schulte Student Name Student ID Instructions. This exam is worth 30% of your final mark in this course.
More informationLecture 3: Nash Equilibrium
Microeconomics I: Game Theory Lecture 3: Nash Equilibrium (see Osborne, 2009, Sect 2.1-2.7) Dr. Michael Trost Department of Applied Microeconomics November 8, 2013 Dr. Michael Trost Microeconomics I: Game
More informationZolt-Gilburne Imagination Seminar. Knowledge and Games. Sergei Artemov
Zolt-Gilburne Imagination Seminar Knowledge and Games Sergei Artemov October 1, 2009 1 Plato (5-4 Century B.C.) One of the world's best known and most widely read and studied philosophers, a student of
More informationn-person Games in Normal Form
Chapter 5 n-person Games in rmal Form 1 Fundamental Differences with 3 Players: the Spoilers Counterexamples The theorem for games like Chess does not generalize The solution theorem for 0-sum, 2-player
More informationMultiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence
Multiagent Systems: Intro to Game Theory CS 486/686: Introduction to Artificial Intelligence 1 Introduction So far almost everything we have looked at has been in a single-agent setting Today - Multiagent
More informationUsing Fictitious Play to Find Pseudo-Optimal Solutions for Full-Scale Poker
Using Fictitious Play to Find Pseudo-Optimal Solutions for Full-Scale Poker William Dudziak Department of Computer Science, University of Akron Akron, Ohio 44325-4003 Abstract A pseudo-optimal solution
More informationMultiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence
Multiagent Systems: Intro to Game Theory CS 486/686: Introduction to Artificial Intelligence 1 Introduction So far almost everything we have looked at has been in a single-agent setting Today - Multiagent
More informationGAMES BEGIN MAY 21 ST! RETAIL PRODUCT PLAN MAY JUNE calottery.com
GAMES BEGIN MAY 21 ST! RETAIL PRODUCT PLAN MAY JUNE 2018 calottery.com LOTTERY S JUNE 2018 0 BONUS PLAY MILLIONS The 0 Bonus Play Millions POS kit is coming to your store this month! POS display dates:
More informationGames vs. search problems. Game playing Chapter 6. Outline. Game tree (2-player, deterministic, turns) Types of games. Minimax
Game playing Chapter 6 perfect information imperfect information Types of games deterministic chess, checkers, go, othello battleships, blind tictactoe chance backgammon monopoly bridge, poker, scrabble
More informationGame playing. Chapter 6. Chapter 6 1
Game playing Chapter 6 Chapter 6 1 Outline Games Perfect play minimax decisions α β pruning Resource limits and approximate evaluation Games of chance Games of imperfect information Chapter 6 2 Games vs.
More informationGAMES BEGIN OCTOBER 22 ND! RETAIL PRODUCT PLAN
GAMES BEGIN OCTOBER 22 ND! RETAIL PRODUCT PLAN OCTOBER NOVEMBER 2018 calottery.com LOTTERY RESOURCES NOVEMBER 2018 RESPONSIBLE GAMING Holiday Season Reminder: Lottery tickets are not appropriate gifts
More information1. The chance of getting a flush in a 5-card poker hand is about 2 in 1000.
CS 70 Discrete Mathematics for CS Spring 2008 David Wagner Note 15 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice, roulette wheels. Today
More informationCopyright 2008, Yan Chen
Unless otherwise noted, the content of this course material is licensed under a Creative Commons Attribution Non-Commercial 3.0 License. http://creativecommons.org/licenses/by-nc/3.0/ Copyright 2008, Yan
More informationGET READY! MARCH GAMES FEBRUARY 18! MONOPOLY TM SCRATCHERS ARE COMING COMING SOON FEBRUARY 2019
8.75 GAMES BEGIN JANUARY 21ST! 8.5 RETAIL PRODUCT PLAN JANUARY FEBRUARY 2019 calottery.com COMING SOON FEBRUARY 2019 MARCH GAMES GET READY! MONOPOLY TM SCRATCHERS ARE COMING FEBRUARY 18! 2 MONOPOLY 1935,
More informationGAMES BEGIN AUGUST 24 TH! RETAIL PRODUCT PLAN AUGUST SEPTEMBER calottery.com
GAMES BEGIN AUGUST 24 TH! RETAIL PRODUCT PLAN AUGUST SEPTEMBER 2016 calottery.com LOTTERY S SEPTEMBER 2016 SUPERLOTTO PLUS RAFFLE PROMOTION Make Sure Your Players Know! The SuperLotto Plus Raffle Promotion
More informationMohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2
AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant
More informationMultiagent Systems: Intro to Game Theory. CS 486/686: Introduction to Artificial Intelligence
Multiagent Systems: Intro to Game Theory CS 486/686: Introduction to Artificial Intelligence 1 1 Introduction So far almost everything we have looked at has been in a single-agent setting Today - Multiagent
More informationStudent Seminars: Kickoff
Wireless@VT Seminars Wireless@VT Student Seminars: Kickoff Walid Saad Wireless@VT, Durham 447 walids@vt.edu Wireless@VT Seminars Fall Logistics Weekly meetings in SEB 135 SEB 125 used 10/24, 11/07, and
More informationGame Playing. Philipp Koehn. 29 September 2015
Game Playing Philipp Koehn 29 September 2015 Outline 1 Games Perfect play minimax decisions α β pruning Resource limits and approximate evaluation Games of chance Games of imperfect information 2 games
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationCPS 570: Artificial Intelligence Game Theory
CPS 570: Artificial Intelligence Game Theory Instructor: Vincent Conitzer What is game theory? Game theory studies settings where multiple parties (agents) each have different preferences (utility functions),
More informationVersion 1.9 Page 1 of 15
BINGO GAME GUIDE For more information about these games please see the OLG Rules for Bingo Games, site Game Guides, House Rules, Odds of Winning, Refund Policy, and the individual Session Programs. Version
More informationCMU Lecture 22: Game Theory I. Teachers: Gianni A. Di Caro
CMU 15-781 Lecture 22: Game Theory I Teachers: Gianni A. Di Caro GAME THEORY Game theory is the formal study of conflict and cooperation in (rational) multi-agent systems Decision-making where several
More informationThe Complexity of Playing Durak
The Complexity of Playing Durak Édouard Bonnet Institute for Computer Science and Control, Hungarian Academy of Sciences, Budapest, Hungary (MTA SZTAKI) IJCAI 2016, July 15 Few results 2-handed Whist with
More informationGame Theory. 4: Nash equilibrium in different games and mixed strategies
Game Theory 4: Nash equilibrium in different games and mixed strategies Review of lecture three A game with no dominated strategy: The battle of the sexes The concept of Nash equilibrium The formal definition
More informationCS 261 Notes: Zerocash
CS 261 Notes: Zerocash Scribe: Lynn Chua September 19, 2018 1 Introduction Zerocash is a cryptocurrency which allows users to pay each other directly, without revealing any information about the parties
More informationDistributed Optimization and Games
Distributed Optimization and Games Introduction to Game Theory Giovanni Neglia INRIA EPI Maestro 18 January 2017 What is Game Theory About? Mathematical/Logical analysis of situations of conflict and cooperation
More informationResource Allocation and Decision Analysis (ECON 8010) Spring 2014 Foundations of Game Theory
Resource Allocation and Decision Analysis (ECON 8) Spring 4 Foundations of Game Theory Reading: Game Theory (ECON 8 Coursepak, Page 95) Definitions and Concepts: Game Theory study of decision making settings
More information17.5 DECISIONS WITH MULTIPLE AGENTS: GAME THEORY
666 Chapter 17. Making Complex Decisions plans generated by value iteration.) For problems in which the discount factor γ is not too close to 1, a shallow search is often good enough to give near-optimal
More informationCognitive Radios Games: Overview and Perspectives
Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory
More informationA GUIDE TO EFFECTIVE COMMUNICATION WITH MAIN CONTRACTORS
A GUIDE TO EFFECTIVE COMMUNICATION WITH MAIN CONTRACTORS A GUIDE TO EFFECTIVE COMMUNICATION WITH MAIN CONTRACTORS While working together on a project, effective communication between subcontractors and
More informationCalifornia Orthopaedic Association May 30, 2014 Monterey, California
Sponsored by: California Orthopaedic Association May 30, 2014 Monterey, California Presented by: Karen Zupko, President Karen Zupko Investor in Modernizing Medicine, Inc., on the Board of Directors for
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More information6. Bargaining. Ryan Oprea. Economics 176. University of California, Santa Barbara. 6. Bargaining. Economics 176. Extensive Form Games
6. 6. Ryan Oprea University of California, Santa Barbara 6. Individual choice experiments Test assumptions about Homo Economicus Strategic interaction experiments Test game theory Market experiments Test
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game
More informationfinal examination on May 31 Topics from the latter part of the course (covered in homework assignments 4-7) include:
The final examination on May 31 may test topics from any part of the course, but the emphasis will be on topic after the first three homework assignments, which were covered in the midterm. Topics from
More informationGame Theory for Security:
Game Theory for Security: Key Algorithmic Principles, Deployed Systems, Research Challenges Milind Tambe University of Southern California with: Current/former PhD students/postdocs: Matthew Brown, Francesco
More informationIntroduction: What is Game Theory?
Microeconomics I: Game Theory Introduction: What is Game Theory? (see Osborne, 2009, Sect 1.1) Dr. Michael Trost Department of Applied Microeconomics October 25, 2013 Dr. Michael Trost Microeconomics I:
More informationUnderleague Game Rules
Underleague Game Rules Players: 2-5 Game Time: Approx. 45 minutes (+15 minutes per extra player above 2) Helgarten, a once quiet port town, has become the industrial hub of a vast empire. Ramshackle towers
More informationKUNG CHI. By Stone Mage Games RULES. Sample file
KUNG CHI By Stone Mage Games RULES There are 15 Chi Markers per player, a 4 sided die, 15 Scroll Skrypt cards, 15 Sword Skrypt cards, and 15 Army cards. GAME COMPONENTS GAME SETUP The object of Kung Chi
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECF.2011.
Vatsikas, S., Armour, SMD., De Vos, M., & Lewis, T. (2011). A fast and fair algorithm for distributed subcarrier allocation using coalitions and the Nash bargaining solution. In IEEE Vehicular Technology
More information