• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 704
  • 194
  • 103
  • 50
  • 30
  • 23
  • 21
  • 21
  • 19
  • 15
  • 12
  • 12
  • 11
  • 9
  • 9
  • Tagged with
  • 1452
  • 1452
  • 188
  • 185
  • 166
  • 162
  • 148
  • 131
  • 128
  • 122
  • 113
  • 111
  • 111
  • 108
  • 104
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

On Distinguishing the Meaningless from the Meaningful: An Evolutionary Game Theoretic Approach to Ruth Millikan\'s Teleosemantics

Slipetz, Lindley 03 May 2013 (has links)
What distinguishes a meaningless utterance from a meaningful term?  While one might say that, within the context of Ruth Millikan\'s teleosemantics, it is a term\'s having a proper function that distinguishes it from a meaningless utterance, I propose that the distinction can be made with reference to the history of the term.  Using evolutionary game theory, I offer a way to clarify the distinction between the meaningless and the meaningful.  I reject the possibility of correlating meaning with an evolutionarily stable strategy as this does not seem to be consistent with how communication works or with Millikan\'s theory.  Instead, when a term has meaning, the function category of that term corresponds to an evolutionarily stable state composed of both speaker and hearer strategies. / Master of Arts
232

Protocoles de chiffrement quantiques de plusieurs parties en environnements réalistes / Quantum cryptographic primitives in realistic conditions

Pappa, Anna 10 July 2014 (has links)
Cette thèse se situe à l’interface entre la théorie quantique et les expériences, en mettant l’accent sur les protocoles pratiques qui peuvent être mises en place en utilisant la technologie présente. Notre objectif est de contribuer à la construction d’un cadre général pour la conception et la mise en oeuvre de schémas de chiffrement quantiques qui permettront d’améliorer la sécurité des futurs réseaux de télécommunication. En outre, cette thèse veut avancer la recherche pertinente sur la physique quantique et l’informatique, en améliorant notre compréhension du phénomène d’intrication. Les corrélations des états intriqués ne peuvent pas être reproduites par des moyens classiques, ce qui permet d’effectuer des tâches (par exemple la téléportation et le codage super-dense) qui sont autrement impossibles. Il est donc d’une importance majeure d’être capables de vérifier si un état quantique est intriqué. Dans cette thèse, nous montrons comment vérifier efficacement si une source physique peut créer des états intriqués multipartites et les partager avec de nombreuses parties, dont certains sont malhonnêtes et collaborent avec la source. Ce protocole pourrait s’avérer essentiel pour tout type de calcul quantique entre les parties méfiantes et pourrait aussi faciliter la délégation sécurisée des tâches de calcul aux serveurs quantiques puissants qui ne sont pas fiables. Finalement, nous étudions le lien entre la théorie des jeux et la non-localité quantique, dans le cadre de jeux bayésiens. Nous examinons comment l’intrication partagé aide les joueurs gagner un jeu avec une probabilité plus élevée que les ressources classiques pourraient atteindre. / This thesis stands at the interface between quantum theory and experiments, focusing on practical protocols that can be implemented using present-day technology. Our goal is to build a general framework for the design and implementation of quantum cryptographic schemes that will improve the safety of future telecommunication networks. In addition, this thesis aims to advance research on quantum physics and computer science, by improving our understanding of entanglement. The correlations of entangled states can not be reproduced by conventional means, allowing to perform tasks (eg teleportation and superdense coding) that are otherwise impossible. It is therefore of major importance to be able to check whether a quantum state is entangled. In this thesis, we show how to efficiently check whether a physical source can create multi-party entangled states and share them with many parties, some of which are dishonest and work with the source. This protocol could prove essential for quantum computation between suspicious parties and could also facilitate the secure delegation of tasks to powerful untrusted quantum servers. Finally, we study the link between game theory and quantum non-locality, in the context of Bayesian games. We examine how the shared entanglement helps players win a game with a higher probability than the conventional resources could achieve.
233

Organizational Inducements and Social Motives: A Game Theoretic Analysis

Davis, Richard G. 01 January 1989 (has links)
Game theory was used to analyze compensation systems based on individual and group incentives. Payoff formulas were developed for these incentives assuming different preferences for individual and social outcomes. Two levels of contributions were considered: (1) Defection. The minimum acceptable level of contributions, and (2) Cooperation. A level of discretionary contributions above the minimum. The discretionary contributions associated with cooperation were represented as a cost to the individual. A classification scheme for uniform n-person games was developed using the approach of Rappaport and Guyer (1966) for 2 x 2 games. This classification scheme defines the natural outcome (cooperation or defection) for each game. The analysis considered the Individual motive, based on maximizing self-interest, and five social motives (Collective, Competitive, Altruism, Equity and Aggression). These motives reflect preferences for outcomes based on payoffs to self and others. The results indicate the natural outcome and game category for different values of the individual and group incentive factors. Satisficing theory was also used to analyze the natural outcome for the Individual motive. Evolutionary game theory was used to develop two simulation models for social motives. The models interpret social motives as (1) genuine preferences for specific social outcomes, or (2) indirect strategies for maximizing individual payoffs. These models explore the interaction of social motives and the resulting impact on the level of cooperation. The results were used to develop effectiveness criteria for selecting inducement systems which should promote cooperation. Additionally, cost curves were used to determine the least cost inducement system. Based on these results, inducement systems using absolute incentives are recommended over systems using competitive incentives. Competitive incentives should only be considered when there is limited need for coordination between individuals and where aggressive and/or competitive behavior is acceptable. The study has theoretical as well as practical implications. Game theory provides a method for expanding expectancy theory to include expectations about the actions of others and provides a framework for integrating expectancy theory and other theories based on social motives (e.g. equity theory). The use of dynamic models from evolutionary game theory breaks new ground in the theory of motivation.
234

Machine Learning and Achievement Games

Blankenship, Jessica 14 July 2020 (has links)
No description available.
235

Game theoretic analysis of an inventory problem with substitution, random demand and yield

Martagan, Tugce Gizem 01 May 2010 (has links)
A game theoretic approach is used to analyze an inventory problem with two products, random demand, and random supply. The supply chain analyzed includes two retailers that sell two substitutable products and two suppliers. Each retailer faces a stochastic demand for the product she sells and replenishes her inventory from her supplier. The supplier provides a random fraction of the quantity requested. A given percentage of customers with unmet demand will substitute the product sold by the other retailer. We assume that the two retailers who make ordering decisions are rational players. Since each retailer's decision affects the single period expected profit of the other retailer, game theory is used to find the order quantities when the retailers use a Nash strategy.
236

Incentive effects in the prisoner's dilemma

Sloan, Edward B. January 1970 (has links)
No description available.
237

Three Essays on Conglomerate Mergers / コングロマリット合併をめぐる三つのエッセイ

Herrera-Velasquez, Jose de Jesus 23 March 2023 (has links)
京都大学 / 新制・課程博士 / 博士(経済学) / 甲第24378号 / 経博第665号 / 新制||経||303(附属図書館) / 京都大学大学院経済学研究科経済学専攻 / (主査)教授 関口 格, 教授 原 千秋, 准教授 陳 珈惠 / 学位規則第4条第1項該当 / Doctor of Economics / Kyoto University / DFAM
238

A Game-Theoretic Analysis of Home Court Advantage and Optimal Offensive Strategy in Basketball

Kozy, James E., III 01 June 2011 (has links)
No description available.
239

Essays on Information and Political Economy:

Simsek, Ali January 2023 (has links)
Thesis advisor: Mehmet Ekmekci / This dissertation consists of three essays on media, political and learning. More specifically, I investigate the effects of biased media and learning from that biased media on political institutions. In the first essay, titled “Optimal Dynamic Information Supply and Competition”, I provide a model of an information market where the viewers acquire signals each period at an attention cost, solving an optimal stopping problem à la Wald (1947), and the objective of the potentially biased information providers is to maximize the number of viewers who acquire signals from them across periods. I find that, in a monopoly market, the information provider sends unbiased signals that perfectly reveal the state of the world when there is a single period but provides biased signals when there are multiple periods. This is because biased signals elongate the learning process of some viewers, potentially increasing the information provider payoff. I also find that incentives due to competition, modeled as another information provider that is potentially biased in the opposite direction, overtake the intertemporal incentives and the full information equilibrium is recovered, even though it is wasteful in terms of social welfare. Hence, the paper provides a model with rational information providers and viewers that leads to biased signals in equilibrium. In the second essay, titled “Voter Behavior and Information Aggregation in Elections with Supermajority”, I provide a model of elections where there are three possible outcomes, but the voters can directly vote for one of the two options. Theoutcome of the election corresponds to the options if the vote share for one of them is higher than a supermajority threshold. If neither of the options achieves that, then the result is the third outcome that the voters cannot explicitly vote for, which I interpret as compromise. I investigate various properties of elections in this setting. I find that, in line with the popular argument, supermajority rules foster compromise outcomes. But, on the other hand, elections with supermajority rules fail to aggregate information. In the third essay, titled “Protests, Strategic Information Provision and Political Communication”, I consider a model of protests where the protesters learn about the state of the world via a biased information provider whose objective is to either instigate or dissuade the protest. A successful protest removes the incumbent from office, where the success threshold is determined by the incumbent who is biased. My main aim is to uncover whether the incumbent can learn the true state of the world from the protest turnout, even though the information of the citizens is provided by biased media. I pin down the optimal success threshold and signal noise choices by the incumbent and the information provider, respectively. I find that if the information provider is trying to instigate the protest, then political communication is always possible, regardless of the level of the bias of the incumbent. If the information provider is trying to dissuade the protest, then political communication is possible if and only if the incumbent bias is relatively small. / Thesis (PhD) — Boston College, 2023. / Submitted to: Boston College. Graduate School of Arts and Sciences. / Discipline: Economics.
240

So Long Sucker: Endgame Analysis

Jerade, Marie Rose 07 February 2024 (has links)
So Long Sucker is a strategy board game requiring 4 players, each with c chips of their designated color, and a board made of k empty piles. With a clear set-up come intricate rules, such as: players taking turns but not in a fixed order, agreements between some players being made and broken at any time, and a player winning the game even without any chips in hand. One of the main points of interest in studying this game, is finding when a player has a winning strategy. The game begins with four players that get eliminated successively until the winner is left. To study winning strategies, it is of interest to look at endgame situations. We present the following game set-up: there are two players left in the game, Blue and Red, and only their respective chip colors. In this thesis, we characterize Blue's winning situations and strategies through inductive reasoning.

Page generated in 0.0272 seconds