Now showing items 63-82 of 113

    • Knightian auctions 

      Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (© Massachusetts Institute of Technology, 2012-01-10)
      We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor δ ∈ (0, 1), and the mech- anism designer knows δ. The classical notions of implementation ...
    • Learning legal principles to enable law at cyber speeds 

      Finlayson, Mark A. (Explorations in Cyber International Relations, 2011-12-07)
      Goal: Law at Cyber Speeds. If we are to enable the creation of Automatic Cyber Targeting Systems to respond in network time to cyberattacks, we must be able to do legal analyses at network speeds
    • Learning narrative structure from annotated folktales 

      Finlayson, Mark (Mark Alan), 1977- (Massachusetts Institute of Technology, 2012)
      Narrative structure is an ubiquitous and intriguing phenomenon. By virtue of structure we recognize the presence of Villainy or Revenge in a story, even if that word is not actually present in the text. Narrative structure ...
    • Leveraging possibilistic beliefs in unrestricted combinatorial auctions 

      Chen, Jing; Micali, Silvio (MDPI AG/© Jing Chen, & Silvio Micali, 2016-10-26)
      In unrestricted combinatorial auctions, we put forward a mechanism that guarantees a meaningful revenue benchmark based on the possibilistic beliefs that the players have about each other’s valuations. In essence, the ...
    • Lost in cyberspace: Harnessing the Internet, international relations, and global security 

      Choucri, Nazli; Goldsmith, Daniel (Sage Journals/© 2012 Nazli Choucri, & Daniel Goldsmith, 2012-03-01)
      Early in the twenty-first century, new, cyber-based threats to the well-being of individuals, economies, and societies added a new dimension to the well-understood threats of the twentieth century. For the first time in ...
    • A matrix based integrated framework for multi disciplinary exploration of cyber-international relations 

      Gaurav, Agarwal (Massachusetts Institute of Technology, 2010)
      Cyberspace is the most pervasive and rapidly adopted communication media and the most disruptive until date. It is now indispensable for almost every facet of modern society and touches, practically, everyone by providing ...
    • Mechanism design with set-theoretic beliefs 

      Chen, Jing; Micali, Silvio (© IEEE, 2011-10-22)
      In settings of incomplete information, we put forward (1) a very conservative -- indeed, purely set-theoretic -- model of the beliefs (including totally wrong ones) that each player may have about the payoff types of his ...
    • Mixed context and privacy 

      Sowell, Jesse (© TRPC, 2010-08-15)
      Users engaging online service providers (OSPs) such as Google, Amazon, and Facebook encounter environments architected by a single actor (the OSP), but comprised of content and executable elements potentially provided by ...
    • Modeling the influence of narratives on collective behavior 

      Houghton, James; Siegel, Michael; Goldsmith, Daniel (© The System Dynamics Society, 2013-07-21)
      This paper considers the problem of understanding the influences of narratives or stories on individual and group behavior. Narrative theory describes how stories help people make sense of the world, and is being used to ...
    • The next 50 years: A personal view 

      Winston, Patrick Henry (© Elsevier B.V., 2012-04-24)
      I review history, starting with Turing’s seminal paper, reaching back ultimately to when our species started to outperform other primates, searching for the questions that will help us develop a computational account of ...
    • The order independence of iterated dominance in extensive games 

      Chen, Jing; Micali, Silvio (John Wiley & Sons, Inc./© Jing Chen, & Silvio Micali, 2013-01-22)
      Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
    • Perspectives on cybersecurity: A collaborative study 

      Choucri, Nazli; Jackson, Chrisma (© Massachusetts Institute of Technology, 2015)
    • Possibilistic beliefs and higher-level rationality 

      Chen, Jing; Micali, Silvio; Pass, Rafael (© Massachusetts Institute of Technology, 2014-06-09)
      We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...
    • The prevalence of descriptive referring expressions in news and narrative 

      Hervaś, Raquel; Finlayson, Mark Alan (© Association for Computational Linguistics, 2010-07-11)
      Generating referring expressions is a key step in Natural Language Generation. Researchers have focused almost exclusively on generating distinctive referring expressions, that is, referring expressions that uniquely ...
    • The problem isn't attribution: It's multi-stage attacks 

      Clark, David D.; Landau, Susan (© Association for Computing Machinery, New York, NY, USA, 2010-11-30)
      As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at ...
    • Rational proofs 

      Azar, Pablo Daniel; Micali, Silvio (© Association for Computing Machinery, New York, NY, USA, 2012-05-19)
      We study a new type of proof system, where an unbounded prover and a polynomial time verifier interact, on inputs a string x and a function f , so that the Verifier may learn f (x). The novelty of our setting is that there ...
    • Rational robustness for mechanism design 

      Chen, Jing; Micali, Silvio (© Massachusetts Institute of Technology, 2009-11-10)
      The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, ...
    • Representing cyberspace using taxonomies and meta-data analysis 

      Elbait, Gihan Daw (Explorations in Cyber International Relations, 2011-12-07)
      Problem: Modeling and mapping the landscapes of emerging research fields, such as cyberspace. • Most research fields are composed of many subfields which are related in intricate ways, therefore structural organization ...
    • Resilient and virtually perfect revenue from perfectly informed players 

      Chen, Jing; Hassidim, Avinatan; Micali, Silvio (© Massachusetts Institute of Technology, 2010-01-13)
      We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is ...
    • Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy 

      Micali, Silvio; Choucri, Nazli; Chen, Jing; Williams, Cindy (© Massachusetts Institute of Technology, 2013-09)
      Three related trends in world politics – shifting in power relations, increased diversity of actors and entities, and the growing mobilization and politicization of global constituencies are contributing to a global “tussle” ...