top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Autonomous agents and multiagent systems : best and visionary papers, AAMAS 2022 Workshops, virtual event, May 9-13, 2022, revised selected papers / / edited by Francisco S. Melo and Fei Fang
Autonomous agents and multiagent systems : best and visionary papers, AAMAS 2022 Workshops, virtual event, May 9-13, 2022, revised selected papers / / edited by Francisco S. Melo and Fei Fang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (151 pages)
Disciplina 016.403
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
Multiagent systems
ISBN 3-031-20179-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Best Papers -- TOPS: Transition-Based Volatility-Reduced Policy Search -- 1 Introduction -- 2 Background -- 3 Algorithm Formulation -- 3.1 Augmented MDP -- 3.2 Proposed Algorithms -- 4 Theoretical Analysis -- 4.1 Assumptions -- 4.2 Major Theoretical Results -- 5 Experiments -- 6 Related Work -- 7 Conclusion -- A Notation Systems -- B Algorithm Details -- C Experimental Details -- C.1 Testbeds -- C.2 Hyper-parameter Settings -- C.3 Computing Infrastructure -- D Theoretical Analysis Details -- D.1 Overview -- D.2 Additional Assumptions -- D.3 Proof of Theorem 1 -- D.4 Proof of Theorem 2 -- D.5 Proof of Lemma 1 -- D.6 Proof of Lemma 2 -- E Additional Related Work -- E.1 Global Optimality of Policy Search Methods -- E.2 Over-Parameterized Neural Networks in RL -- References -- School's Out? Simulating Schooling Strategies During COVID-19 -- 1 Introduction -- 2 Agent-Based Models in the Pandemic -- 3 The SoSAD Modeling Approach -- 3.1 Population and Infrastructure -- 3.2 Contacts and Contagion -- 3.3 Activities and Countermeasures -- 4 Simulating Three Schooling Strategies -- 5 Can We Keep Schools Open? Simulation Results -- 6 Discussion - Patterns in Different Experiment Setups -- 7 Conclusion - What Only ABMs Can Show -- References -- Data-Driven Agent-Based Model Development to Support Human-Centric Transit-Oriented Design -- 1 Introduction -- 2 A Prototype ABM -- 3 Data Collection -- 4 Case Study -- 5 Discussions and Conclusion -- References -- Enabling Negotiating Agents to Explore Very Large Outcome Spaces -- 1 Introduction -- 2 Problem Setting -- 2.1 Negotiation Model -- 2.2 Typical Search Queries -- 2.3 Design Specification of Search Algorithms Used by Negotiating Agents -- 3 Related Work -- 4 Searching Through BIDS -- 4.1 Looking for Bid(s) that Satisfy a Utility Target Through BIDS.
4.2 Using BIDS to Implement the Sampling-Utility Query and the Trade-off Query -- 5 Experiments -- 5.1 Setup -- 5.2 Metrics to Quantify Scalability, Speed, Accuracy, and Diversity -- 5.3 Experiment 1 - Scalability and Rapidness of BIDS -- 5.4 Experiment 2 - Accuracy and Diversity -- 6 Conclusions and Future Work -- References -- Purposeful Failures as a Form of Culturally-Appropriate Intelligent Disobedience During Human-Robot Social Interaction -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Discussion -- References -- Visionary Papers -- An Agent-Based Model of Horizontal Mergers -- 1 Introduction -- 2 The Analytical Model -- 2.1 Bertrand Competition with Differentiated Products -- 2.2 Cournot Competition with Differentiated Products -- 3 The Agent-Based Model -- 3.1 Model Implementation and Parameters -- 4 Results -- 4.1 Results from Cournot Competition with Differentiated Products -- 5 Concluding Remarks and Future Extensions -- References -- Multi-agent Traffic Signal Control via Distributed RL with Spatial and Temporal Feature Extraction -- 1 Introduction -- 2 Method -- 2.1 Problem Formulation -- 2.2 Spatial and Temporal Perception Network -- 2.3 Learning Framework -- 3 Experiments and Discussion -- 4 Conclusion and Future Work -- References -- About Digital Twins, Agents, and Multiagent Systems: A Cross-Fertilisation Journey -- 1 Introduction -- 2 Background -- 2.1 Digital Twins Outside of MAS -- 2.2 Digital Twins Within MAS -- 3 DTs for Agents and Multiagent Systems -- 3.1 Individual Perspective -- 3.2 System Perspective -- 4 Agents and Multiagent Systems for DTs -- 4.1 Individual Perspective -- 4.2 System Perspective -- 5 Research Directions -- 5.1 Cognitive DTs -- 5.2 Anticipatory Planning -- 5.3 Sociotechnical Systems -- 5.4 Mirror Worlds -- 5.5 Standardisation and Interoperability -- 6 Concluding Remarks and Outlook -- References.
Only Those Who Can Obey Can Disobey: The Intentional Implications of Artificial Agent Disobedience -- 1 Introduction -- 2 Senses of ``Disobedience'' -- 3 Recent Approaches to Robot ``Disobedience'' -- 4 What Does True Disobedience Entail? Layers of Intentionality and Interaction -- 4.1 Understanding Instruction as Possible Action -- 4.2 Capability of Obedience -- 4.3 Reason, Purpose, or Commitment for Acting Against Instruction -- 5 Local vs. Global Disobedience -- 6 Transparency and Accountability for Ascriptions of Disobedience -- 6.1 Obeying an Instructor vs. an Instruction -- 7 What Kinds of Disobedience Should Be Sought? -- 8 Conclusion -- References -- Author Index.
Record Nr. UNISA-996500066003316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Autonomous agents and multiagent systems : best and visionary papers, AAMAS 2022 Workshops, virtual event, May 9-13, 2022, revised selected papers / / edited by Francisco S. Melo and Fei Fang
Autonomous agents and multiagent systems : best and visionary papers, AAMAS 2022 Workshops, virtual event, May 9-13, 2022, revised selected papers / / edited by Francisco S. Melo and Fei Fang
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (151 pages)
Disciplina 016.403
Collana Lecture Notes in Computer Science
Soggetto topico Artificial intelligence
Multiagent systems
ISBN 3-031-20179-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Best Papers -- TOPS: Transition-Based Volatility-Reduced Policy Search -- 1 Introduction -- 2 Background -- 3 Algorithm Formulation -- 3.1 Augmented MDP -- 3.2 Proposed Algorithms -- 4 Theoretical Analysis -- 4.1 Assumptions -- 4.2 Major Theoretical Results -- 5 Experiments -- 6 Related Work -- 7 Conclusion -- A Notation Systems -- B Algorithm Details -- C Experimental Details -- C.1 Testbeds -- C.2 Hyper-parameter Settings -- C.3 Computing Infrastructure -- D Theoretical Analysis Details -- D.1 Overview -- D.2 Additional Assumptions -- D.3 Proof of Theorem 1 -- D.4 Proof of Theorem 2 -- D.5 Proof of Lemma 1 -- D.6 Proof of Lemma 2 -- E Additional Related Work -- E.1 Global Optimality of Policy Search Methods -- E.2 Over-Parameterized Neural Networks in RL -- References -- School's Out? Simulating Schooling Strategies During COVID-19 -- 1 Introduction -- 2 Agent-Based Models in the Pandemic -- 3 The SoSAD Modeling Approach -- 3.1 Population and Infrastructure -- 3.2 Contacts and Contagion -- 3.3 Activities and Countermeasures -- 4 Simulating Three Schooling Strategies -- 5 Can We Keep Schools Open? Simulation Results -- 6 Discussion - Patterns in Different Experiment Setups -- 7 Conclusion - What Only ABMs Can Show -- References -- Data-Driven Agent-Based Model Development to Support Human-Centric Transit-Oriented Design -- 1 Introduction -- 2 A Prototype ABM -- 3 Data Collection -- 4 Case Study -- 5 Discussions and Conclusion -- References -- Enabling Negotiating Agents to Explore Very Large Outcome Spaces -- 1 Introduction -- 2 Problem Setting -- 2.1 Negotiation Model -- 2.2 Typical Search Queries -- 2.3 Design Specification of Search Algorithms Used by Negotiating Agents -- 3 Related Work -- 4 Searching Through BIDS -- 4.1 Looking for Bid(s) that Satisfy a Utility Target Through BIDS.
4.2 Using BIDS to Implement the Sampling-Utility Query and the Trade-off Query -- 5 Experiments -- 5.1 Setup -- 5.2 Metrics to Quantify Scalability, Speed, Accuracy, and Diversity -- 5.3 Experiment 1 - Scalability and Rapidness of BIDS -- 5.4 Experiment 2 - Accuracy and Diversity -- 6 Conclusions and Future Work -- References -- Purposeful Failures as a Form of Culturally-Appropriate Intelligent Disobedience During Human-Robot Social Interaction -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Discussion -- References -- Visionary Papers -- An Agent-Based Model of Horizontal Mergers -- 1 Introduction -- 2 The Analytical Model -- 2.1 Bertrand Competition with Differentiated Products -- 2.2 Cournot Competition with Differentiated Products -- 3 The Agent-Based Model -- 3.1 Model Implementation and Parameters -- 4 Results -- 4.1 Results from Cournot Competition with Differentiated Products -- 5 Concluding Remarks and Future Extensions -- References -- Multi-agent Traffic Signal Control via Distributed RL with Spatial and Temporal Feature Extraction -- 1 Introduction -- 2 Method -- 2.1 Problem Formulation -- 2.2 Spatial and Temporal Perception Network -- 2.3 Learning Framework -- 3 Experiments and Discussion -- 4 Conclusion and Future Work -- References -- About Digital Twins, Agents, and Multiagent Systems: A Cross-Fertilisation Journey -- 1 Introduction -- 2 Background -- 2.1 Digital Twins Outside of MAS -- 2.2 Digital Twins Within MAS -- 3 DTs for Agents and Multiagent Systems -- 3.1 Individual Perspective -- 3.2 System Perspective -- 4 Agents and Multiagent Systems for DTs -- 4.1 Individual Perspective -- 4.2 System Perspective -- 5 Research Directions -- 5.1 Cognitive DTs -- 5.2 Anticipatory Planning -- 5.3 Sociotechnical Systems -- 5.4 Mirror Worlds -- 5.5 Standardisation and Interoperability -- 6 Concluding Remarks and Outlook -- References.
Only Those Who Can Obey Can Disobey: The Intentional Implications of Artificial Agent Disobedience -- 1 Introduction -- 2 Senses of ``Disobedience'' -- 3 Recent Approaches to Robot ``Disobedience'' -- 4 What Does True Disobedience Entail? Layers of Intentionality and Interaction -- 4.1 Understanding Instruction as Possible Action -- 4.2 Capability of Obedience -- 4.3 Reason, Purpose, or Commitment for Acting Against Instruction -- 5 Local vs. Global Disobedience -- 6 Transparency and Accountability for Ascriptions of Disobedience -- 6.1 Obeying an Instructor vs. an Instruction -- 7 What Kinds of Disobedience Should Be Sought? -- 8 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910629291403321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (324 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Game theory
Computer security
ISBN 3-031-26369-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deception in Security -- The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender under Uncertainty? .-Casino Rationale: Countering attacker deception in zero-sum Stackelberg security games of bounded rationality -- Cyber Deception against Zero-day Attacks: A Game Theoretic Approach -- Planning and Learning in Dynamic Enviroments -- On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers -- Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment -- Robust Moving Target Defense against Unknown Attacks: A Meta-Reinforcement Learning Approach -- Security Games -- Synchronization in Security Games -- Multiple Oracle Algorithm to Solve Continuous Games -- Optimal Pursuit of Surveilling Agents near a High Value Target -- Adversarial Learning and Optimization -- On Poisoned Wardrop Equilibrium in Congestion Games -- Reward Delay Attacks on Deep Reinforcement Learning -- An Exploration of Poisoning Attacks on Data-based Decision Making -- Novel Applications and new Game Models -- A Network Centrality Game for Epidemic Control -- Optimizing Intrusion Detection Systems Placement against Network Virus Spreading using a Partially Observable Stochastic Minimum-Threat Path Game -- Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies.
Record Nr. UNINA-9910659484703321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (324 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Game theory
Computer security
ISBN 3-031-26369-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deception in Security -- The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender under Uncertainty? .-Casino Rationale: Countering attacker deception in zero-sum Stackelberg security games of bounded rationality -- Cyber Deception against Zero-day Attacks: A Game Theoretic Approach -- Planning and Learning in Dynamic Enviroments -- On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers -- Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment -- Robust Moving Target Defense against Unknown Attacks: A Meta-Reinforcement Learning Approach -- Security Games -- Synchronization in Security Games -- Multiple Oracle Algorithm to Solve Continuous Games -- Optimal Pursuit of Surveilling Agents near a High Value Target -- Adversarial Learning and Optimization -- On Poisoned Wardrop Equilibrium in Congestion Games -- Reward Delay Attacks on Deep Reinforcement Learning -- An Exploration of Poisoning Attacks on Data-based Decision Making -- Novel Applications and new Game Models -- A Network Centrality Game for Epidemic Control -- Optimizing Intrusion Detection Systems Placement against Network Virus Spreading using a Partially Observable Stochastic Minimum-Threat Path Game -- Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies.
Record Nr. UNISA-996511871603316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Decision and Game Theory for Security [[electronic resource] ] : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings / / edited by Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer
Decision and Game Theory for Security [[electronic resource] ] : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings / / edited by Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XI, 534 p. 137 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Computer communication systems
Algorithms
Management information systems
Computer science
Game theory
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
ISBN 3-319-68711-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Game theory and mechanism design for security and privacy -- Pricing and economic incentives for building dependable and secure systems -- Dynamic control, learning, and optimization and approximation techniques -- Decision making and decision theory for cybersecurity and security requirements engineering -- Socio-technological and behavioral approaches to security -- Risk assessment and risk management -- Security investment and cyber insurance -- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems -- New approaches for security and privacy in cloud computing and for critical infrastructure -- Security and privacy of wireless and mobile communications, including user location privacy -- Game theory for intrusion detection -- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
Record Nr. UNINA-9910484971803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decision and Game Theory for Security [[electronic resource] ] : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings / / edited by Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer
Decision and Game Theory for Security [[electronic resource] ] : 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings / / edited by Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XI, 534 p. 137 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Application software
Computer communication systems
Algorithms
Management information systems
Computer science
Game theory
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
ISBN 3-319-68711-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Game theory and mechanism design for security and privacy -- Pricing and economic incentives for building dependable and secure systems -- Dynamic control, learning, and optimization and approximation techniques -- Decision making and decision theory for cybersecurity and security requirements engineering -- Socio-technological and behavioral approaches to security -- Risk assessment and risk management -- Security investment and cyber insurance -- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems -- New approaches for security and privacy in cloud computing and for critical infrastructure -- Security and privacy of wireless and mobile communications, including user location privacy -- Game theory for intrusion detection -- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
Record Nr. UNISA-996465306203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui