Filters








62,308 Hits in 4.9 sec

Bounding the Inefficiency of Compromise

Ioannis Caragiannis, Panagiotis Kanellopoulos, Alexandros A. Voudouris
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
We formulate simple games that capture this behavior and quantify the inefficiency of equilibria using the well-known notion of the price of anarchy.  ...  We follow the same modeling approach, focusing on scenarios where the opinion expressed by each user is a compromise between her internal belief and the opinions of a small number of neighbors among her  ...  The first author would like to thank Pino Persiano for fruitful discussions at early stages of this work. Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  ... 
doi:10.24963/ijcai.2017/21 dblp:conf/ijcai/CaragiannisKV17 fatcat:wdmopoq43bcb3biqd572mi7pxa

Bounding the inefficiency of compromise in opinion formation [article]

Ioannis Caragiannis, Panagiotis Kanellopoulos, Alexandros A. Voudouris
2018 arXiv   pre-print
We formulate simple games that capture this behavior and quantify the inefficiency of equilibria using the well-known notion of the price of anarchy.  ...  We follow the same modeling approach, focusing on scenarios where the opinion expressed by each user is a compromise between her internal belief and the opinions of a small number of neighbors among her  ...  A preliminary version of this paper entitled "Bounding the inefficiency of compromise" appeared in Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI), pages 142-148  ... 
arXiv:1702.07309v2 fatcat:3tnjqxsc6rdhplqzp7adlumu5m

Page 58 of Illinois Medical Journal Vol. 156, Issue 1 [page]

1979 Illinois Medical Journal  
The dichotomies developed during negotiation frequently are not bound by logical sequence and lack logical conclusions. Theoretically, negotiation results in a reasonable compromise.  ...  However, I assure you that ISMS never will accept a “settlement” which compromises professional ethics or standards. The future of ISMS-IDPA negotiation remains clouded.  ... 

Page 315 of Economic Development and Cultural Change Vol. 25, Issue 2 [page]

1977 Economic Development and Cultural Change  
This is a less mechanical view of the production process than the standard microeconomic one. It is also consistent with various degrees of X-inefficiency.  ...  Elsewhere I have referred to the extent of the compromise as the degree of constraint concern.  ... 

Rational agents, contract curves, and inefficient compromises

G.E. Kersten, S.J. Noronha
1998 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Several studies of two-party negotiations have shown that negotiators more often than not reach inefficient compromises.  ...  We analyze the circumstances under which rational agents make inefficient compromises and refrain Crom improving them.  ...  Fig. 5 . 5 Local strict opposition and inefficient compromises Fig. 6 . 6 Global nonstrict opposition and an inefficient compromise.  ... 
doi:10.1109/3468.668964 fatcat:rasss53pfbcc3mw2ei6tio5pmq

Page 407 of The American Journal of Economics and Sociology Vol. 11, Issue 4 [page]

1952 The American Journal of Economics and Sociology  
Local chieftains, themselves bound by ties of kinship to many of their tribesmen, were entrusted with the collection of tribute.  ...  The compromise, under which Chinese magistrates administered native areas side by side with her- editary native chiefs, restored the area to a semblance of peace.  ... 

Data envelopment analysis with common weights: the compromise solution approach

C Kao, H-T Hung
2005 Journal of the Operational Research Society  
The efficiencies of the inefficient units are unchanged.  ...  The third method is the measure of inefficiency dominance (MID) of Bardhan et af In contrast to the preceding two methods, this method ranks inefficient units by calculating the average proportional inefficiency  ... 
doi:10.1057/palgrave.jors.2601924 fatcat:tted7n6byncw3prr47ahcitl6i

Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs [article]

Mustafa Abdallah, Parinaz Naghizadeh, Ashish R. Hota, Timothy Cason, Saurabh Bagchi, Shreyas Sundaram
2020 arXiv   pre-print
We also show that pure strategy Nash equilibria exist in settings with multiple (behavioral) defenders, and study the inefficiency of the equilibrium investments by behavioral defenders compared to a centralized  ...  The interdependencies between the assets are captured by an attack graph, where an edge from one asset to another indicates that if the former asset is compromised, an attack can be launched on the latter  ...  Security Games can have multiple PNEs in general. • We quantify the inefficiency of the Nash equilibria by defining the notion of PoBA, and provide (tight) bounds on it. • We illustrate the theoretical  ... 
arXiv:2001.03213v2 fatcat:s56hqhviv5eazkrrsymogqgd74

A Local Search Approach to Solve a Financial Portfolio Design Problem

Fatima Zohra Lebbah, Yahia Lebbah
2015 International Journal of Applied Metaheuristic Computing  
Experimental results on non-trivial instances of the problem show the effectiveness of this work's approach.  ...  It is well known that exact solving approaches on difficult and large instances of quadratic integer programs are known to be inefficient. That is why this work has adopted a local search method.  ...  However, they gave an analytical lower bound of the optimal value associated to the problem, but they noticed that this bound is rough (in comparison with the optimal bound) on large instances.  ... 
doi:10.4018/ijamc.2015040101 fatcat:qnzhauv7sng4fhxvejgnoy3hgy

Ranking Decision Making Units By Compromise Programming

Majid Darehmiraki, Zahra Behdani
2012 Journal of Mathematics and Computer Science  
In this paper we developed a new method for measuring the efficiency score of Decision-Making Units (DMUs) by using compromise programming.  ...  A numerical example is provided to illustrate the application of the proposed DEA model.  ...  The fifth research area ranks inefficient units through proportional measures of inefficiency.  ... 
doi:10.22436/jmcs.04.04.04 fatcat:dyfem6schve6xasagvwwvvifsq

Nonparametric estimation of residual variance revisited

BURKHARDT SEIFERT, THEO GASSER
1993 Biometrika  
Here the one given by Hall, Kay & Titterington (1990) is of particular interest. It minimizes the asymptotic variance.  ...  A new estimator is introduced, compromising between bias and variance.  ...  The choice of equal weights in (13) is the simplest but not necessarily the natural and optimal one.  ... 
doi:10.1093/biomet/80.2.373 fatcat:4pna52bbobhcnggq4ej2zcodpq

Page 8 of Monthly Review Vol. 19, Issue 57 [page]

1905 Monthly Review  
8 THE MONTHLY REVIEW bounds, but the expenditure and debt of the county and borough councils is not a bad second in the race of extrava- gance.  ...  No true man wishes the governors of his town to be asleep, behind the times, inefficient ; but the present complaint is of the opposite evil.  ... 

Interactive fuzzy goal programming for multi-objective transportation problems

Waiel F. Abd El-Wahed, Sang M. Lee
2006 Omega : The International Journal of Management Science  
The approach focuses on minimizing the worst upper bound to obtain an efficient solution which is close to the best lower bound of each objective function.  ...  This paper presents an interactive fuzzy goal programming approach to determine the preferred compromise solution for the multi-objective transportation problem.  ...  Acknowledgements The authors are extremely thankful to the anonymous referees for their constructive suggestions to improve this work.  ... 
doi:10.1016/j.omega.2004.08.006 fatcat:y5xisngtyzawhhuuydk3ypklqi

Page 520 of London Magazine Vol. 5, Issue [page]

1826 London Magazine  
open-handed Lords of the Treasury, as an implied equivalent for the compromise of principle ; and suffered the expression, and indeed the reality of its independence, to be bound in the golden chains of  ...  As a means of restoring or maintaining rights, Whiggism is utterly inefficient ; and as a criterion of the force of public opinion, it is neither more nor less than the mere weather-gauge of political  ... 

Tailored Security and Safety for Pervasive Computing [chapter]

Erik-Oliver Blass, Martina Zitterbart
2009 IFIP Advances in Information and Communication Technology  
Today's research for security in pervasive computing makes naive, inefficient, and unrealistic assumptions regarding safety properties, in particular the quality of basic communication.  ...  Instead, security solutions tailored to the demands of a user, the scenario, or the expected adversary are more promising. 2.)  ...  of compromised devices (i.e., devices under control of the adversary).  ... 
doi:10.1007/978-3-642-05437-2_8 fatcat:x43ho6ajjvhd5a3pjjaspfddda
« Previous Showing results 1 — 15 out of 62,308 results