2 A Computational Game-Theoretic Framework 2 . 1 Bayesian Games
暂无分享,去创建一个
[1] Leandro Chaves Rêgo,et al. Extensive games with possibly unaware players , 2006, AAMAS '06.
[2] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[3] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[4] H. W. Kuhn,et al. 11. Extensive Games and the Problem of Information , 1953 .
[5] Avi Wigderson,et al. On Play by Means of Computing Machines , 1986, TARK.
[6] Yoram Moses,et al. Resource-bounded Knowledge , 1988, TARK.
[7] L. Ross,et al. Biased Assimilation and Attitude Polarization: The Effects of Prior Theories on Subsequently Considered Evidence , 1979 .
[8] A. Tarski. A Decision Method for Elementary Algebra and Geometry , 2023 .
[9] F. Forges. Published by: The , 2022 .
[10] Tuomas Sandholm,et al. Bargaining with limited computation: Deliberation equilibrium , 2001, Artif. Intell..
[11] Joseph Y. Halpern. I Don't Want to Think About it Now: Decision Theory with Costly Computation , 2010, KR.
[12] Shai Halevi,et al. A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.
[13] R. Aumann. Correlated Equilibrium as an Expression of Bayesian Rationality Author ( s ) , 1987 .
[14] A. Rubinstein. Finite automata play the repeated prisoner's dilemma , 1986 .
[15] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[16] E. Kalai. Bounded Rationality and Strategic Complexity in Repeated Games , 1987 .
[17] Andrea Wilson. Bounded Memory and Biases in Information Processing , 2014 .
[18] Ariel Rubinstein,et al. On the Interpretation of Decision Problems with Imperfect Recall , 1996, TARK.
[19] Tuomas Sandholm,et al. Issues in Computational Vickrey Auctions , 2000, Int. J. Electron. Commer..
[20] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[21] A. Urbano,et al. Computationally restricted unmediated talk under incomplete information , 2004 .
[22] Aranyak Mehta,et al. Playing large games using simple strategies , 2003, EC '03.
[23] Joseph Y. Halpern,et al. A Computational Game Theoretic Framework for Cryptography , 2009 .
[24] Adam Tauman Kalai,et al. An Approach to Bounded Rationality , 2006, NIPS.
[25] Eric van Damme,et al. Non-Cooperative Games , 2000 .
[26] David M. Kreps,et al. Rational cooperation in the finitely repeated prisoners' dilemma , 1982 .
[27] T. Sandholm,et al. Costly valuation computation in auctions , 2001 .
[28] Eric Horvitz,et al. Principles and applications of continual computation , 2001, Artif. Intell..
[29] S. Rajsbaum. Foundations of Cryptography , 2014 .
[30] 1 What Is Game Theory Trying to Accomplish ? , 1985 .
[31] H. Simon,et al. A Behavioral Model of Rational Choice , 1955 .
[32] Joseph Y. Halpern,et al. Game Theory with Costly Computation , 2008, ArXiv.
[33] Tim Roughgarden,et al. Computing equilibria in multi-player games , 2005, SODA '05.
[34] Silvio Micali,et al. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[35] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[36] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[37] Burkhard C. Schipper,et al. Unawareness, beliefs and games , 2007, TARK '07.
[38] C. Plott. psychology and economics , 1990 .
[39] Anna R. Karlin,et al. Approximately Revenue-Maximizing Auctions for Deliberative Agents , 2012, AAAI.
[40] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[41] Eric Horvitz,et al. Reasoning about beliefs and actions under computational resource constraints , 1987, Int. J. Approx. Reason..
[42] A. Tversky,et al. The framing of decisions and the psychology of choice. , 1981, Science.
[43] Johan Håstad,et al. Almost optimal lower bounds for small depth circuits , 1986, STOC '86.
[44] Graham Walker,et al. The Official Rock Paper Scissors Strategy Guide , 2004 .
[45] N. Megiddo. On computable beliefs of rational machines , 1989 .
[46] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[47] Joseph Y. Halpern,et al. A knowledge-based analysis of zero knowledge , 1988, STOC '88.
[48] R. Myerson. Incentive Compatibility and the Bargaining Problem , 1979 .
[49] Joseph Y. Halpern,et al. Algorithmic Knowledge , 1994, TARK.
[50] Joseph Y. Halpern,et al. Sequential Equilibrium and Perfect Equilibrium in Games of Imperfect Recall , 2008 .
[51] Vasumathi Raman,et al. An epistemic characterization of zero knowledge , 2009, TARK '09.
[52] Richard J. Lipton,et al. Nash Equilibria via Polynomial Equations , 2004, LATIN.
[53] J. Wooders,et al. Minimax Play at Wimbledon , 2001 .
[54] William Samuelson,et al. Status quo bias in decision making , 1988 .
[55] A. Turing. On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .
[56] Kislaya Prasad,et al. The rationality/computability trade-off in finite games , 2009 .
[57] Vincent Conitzer,et al. Computational criticisms of the revelation principle , 2004, EC '04.
[58] A. Neyman. Bounded complexity justifies cooperation in the finitely repeated prisoners' dilemma , 1985 .
[59] Manindra Agrawal,et al. PRIMES is in P , 2004 .
[60] Sendhil Mullainathan,et al. A Memory Based Model of Bounded Rationality , 2000 .