A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
We formulate simple games that capture this behavior and quantify the inefficiency of equilibria using the well-known notion of the price of anarchy. ... We follow the same modeling approach, focusing on scenarios where the opinion expressed by each user is a compromise between her internal belief and the opinions of a small number of neighbors among her ... The first author would like to thank Pino Persiano for fruitful discussions at early stages of this work. Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence ...doi:10.24963/ijcai.2017/21 dblp:conf/ijcai/CaragiannisKV17 fatcat:wdmopoq43bcb3biqd572mi7pxa
We formulate simple games that capture this behavior and quantify the inefficiency of equilibria using the well-known notion of the price of anarchy. ... We follow the same modeling approach, focusing on scenarios where the opinion expressed by each user is a compromise between her internal belief and the opinions of a small number of neighbors among her ... A preliminary version of this paper entitled "Bounding the inefficiency of compromise" appeared in Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI), pages 142-148 ...arXiv:1702.07309v2 fatcat:3tnjqxsc6rdhplqzp7adlumu5m
Illinois Medical Journal
The dichotomies developed during negotiation frequently are not bound by logical sequence and lack logical conclusions. Theoretically, negotiation results in a reasonable compromise. ... However, I assure you that ISMS never will accept a “settlement” which compromises professional ethics or standards. The future of ISMS-IDPA negotiation remains clouded. ...
Economic Development and Cultural Change
This is a less mechanical view of the production process than the standard microeconomic one. It is also consistent with various degrees of X-inefficiency. ... Elsewhere I have referred to the extent of the compromise as the degree of constraint concern. ...
Several studies of two-party negotiations have shown that negotiators more often than not reach inefficient compromises. ... We analyze the circumstances under which rational agents make inefficient compromises and refrain Crom improving them. ... Fig. 5 . 5 Local strict opposition and inefficient compromises Fig. 6 . 6 Global nonstrict opposition and an inefficient compromise. ...doi:10.1109/3468.668964 fatcat:rasss53pfbcc3mw2ei6tio5pmq
The American Journal of Economics and Sociology
Local chieftains, themselves bound by ties of kinship to many of their tribesmen, were entrusted with the collection of tribute. ... The compromise, under which Chinese magistrates administered native areas side by side with her- editary native chiefs, restored the area to a semblance of peace. ...
The efficiencies of the inefficient units are unchanged. ... The third method is the measure of inefficiency dominance (MID) of Bardhan et af In contrast to the preceding two methods, this method ranks inefficient units by calculating the average proportional inefficiency ...doi:10.1057/palgrave.jors.2601924 fatcat:tted7n6byncw3prr47ahcitl6i
We also show that pure strategy Nash equilibria exist in settings with multiple (behavioral) defenders, and study the inefficiency of the equilibrium investments by behavioral defenders compared to a centralized ... The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter ... Security Games can have multiple PNEs in general. • We quantify the inefficiency of the Nash equilibria by defining the notion of PoBA, and provide (tight) bounds on it. • We illustrate the theoretical ...arXiv:2001.03213v2 fatcat:s56hqhviv5eazkrrsymogqgd74
Experimental results on non-trivial instances of the problem show the effectiveness of this work's approach. ... It is well known that exact solving approaches on difficult and large instances of quadratic integer programs are known to be inefficient. That is why this work has adopted a local search method. ... However, they gave an analytical lower bound of the optimal value associated to the problem, but they noticed that this bound is rough (in comparison with the optimal bound) on large instances. ...doi:10.4018/ijamc.2015040101 fatcat:qnzhauv7sng4fhxvejgnoy3hgy
In this paper we developed a new method for measuring the efficiency score of Decision-Making Units (DMUs) by using compromise programming. ... A numerical example is provided to illustrate the application of the proposed DEA model. ... The fifth research area ranks inefficient units through proportional measures of inefficiency. ...doi:10.22436/jmcs.04.04.04 fatcat:dyfem6schve6xasagvwwvvifsq
Here the one given by Hall, Kay & Titterington (1990) is of particular interest. It minimizes the asymptotic variance. ... A new estimator is introduced, compromising between bias and variance. ... The choice of equal weights in (13) is the simplest but not necessarily the natural and optimal one. ...doi:10.1093/biomet/80.2.373 fatcat:4pna52bbobhcnggq4ej2zcodpq
8 THE MONTHLY REVIEW bounds, but the expenditure and debt of the county and borough councils is not a bad second in the race of extrava- gance. ... No true man wishes the governors of his town to be asleep, behind the times, inefficient ; but the present complaint is of the opposite evil. ...
The approach focuses on minimizing the worst upper bound to obtain an efficient solution which is close to the best lower bound of each objective function. ... This paper presents an interactive fuzzy goal programming approach to determine the preferred compromise solution for the multi-objective transportation problem. ... Acknowledgements The authors are extremely thankful to the anonymous referees for their constructive suggestions to improve this work. ...doi:10.1016/j.omega.2004.08.006 fatcat:y5xisngtyzawhhuuydk3ypklqi
open-handed Lords of the Treasury, as an implied equivalent for the compromise of principle ; and suffered the expression, and indeed the reality of its independence, to be bound in the golden chains of ... As a means of restoring or maintaining rights, Whiggism is utterly inefficient ; and as a criterion of the force of public opinion, it is neither more nor less than the mere weather-gauge of political ...
IFIP Advances in Information and Communication Technology
Today's research for security in pervasive computing makes naive, inefficient, and unrealistic assumptions regarding safety properties, in particular the quality of basic communication. ... Instead, security solutions tailored to the demands of a user, the scenario, or the expected adversary are more promising. 2.) ... of compromised devices (i.e., devices under control of the adversary). ...doi:10.1007/978-3-642-05437-2_8 fatcat:x43ho6ajjvhd5a3pjjaspfddda
« Previous Showing results 1 — 15 out of 62,308 results