Now showing items 68-87 of 113

    • A matrix based integrated framework for multi disciplinary exploration of cyber-international relations 

      Gaurav, Agarwal (Massachusetts Institute of Technology, 2010)
      Cyberspace is the most pervasive and rapidly adopted communication media and the most disruptive until date. It is now indispensable for almost every facet of modern society and touches, practically, everyone by providing ...
    • Mechanism design with set-theoretic beliefs 

      Chen, Jing; Micali, Silvio (© IEEE, 2011-10-22)
      In settings of incomplete information, we put forward (1) a very conservative -- indeed, purely set-theoretic -- model of the beliefs (including totally wrong ones) that each player may have about the payoff types of his ...
    • Mixed context and privacy 

      Sowell, Jesse (© TRPC, 2010-08-15)
      Users engaging online service providers (OSPs) such as Google, Amazon, and Facebook encounter environments architected by a single actor (the OSP), but comprised of content and executable elements potentially provided by ...
    • Modeling the influence of narratives on collective behavior 

      Houghton, James; Siegel, Michael; Goldsmith, Daniel (© The System Dynamics Society, 2013-07-21)
      This paper considers the problem of understanding the influences of narratives or stories on individual and group behavior. Narrative theory describes how stories help people make sense of the world, and is being used to ...
    • The next 50 years: A personal view 

      Winston, Patrick Henry (© Elsevier B.V., 2012-04-24)
      I review history, starting with Turing’s seminal paper, reaching back ultimately to when our species started to outperform other primates, searching for the questions that will help us develop a computational account of ...
    • The order independence of iterated dominance in extensive games 

      Chen, Jing; Micali, Silvio (John Wiley & Sons, Inc./© Jing Chen, & Silvio Micali, 2013-01-22)
      Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
    • Perspectives on cybersecurity: A collaborative study 

      Choucri, Nazli; Jackson, Chrisma (© Massachusetts Institute of Technology, 2015)
    • Possibilistic beliefs and higher-level rationality 

      Chen, Jing; Micali, Silvio; Pass, Rafael (© Massachusetts Institute of Technology, 2014-06-09)
      We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...
    • The prevalence of descriptive referring expressions in news and narrative 

      Hervaś, Raquel; Finlayson, Mark Alan (© Association for Computational Linguistics, 2010-07-11)
      Generating referring expressions is a key step in Natural Language Generation. Researchers have focused almost exclusively on generating distinctive referring expressions, that is, referring expressions that uniquely ...
    • The problem isn't attribution: It's multi-stage attacks 

      Clark, David D.; Landau, Susan (© Association for Computing Machinery, New York, NY, USA, 2010-11-30)
      As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at ...
    • Rational proofs 

      Azar, Pablo Daniel; Micali, Silvio (© Association for Computing Machinery, New York, NY, USA, 2012-05-19)
      We study a new type of proof system, where an unbounded prover and a polynomial time verifier interact, on inputs a string x and a function f , so that the Verifier may learn f (x). The novelty of our setting is that there ...
    • Rational robustness for mechanism design 

      Chen, Jing; Micali, Silvio (© Massachusetts Institute of Technology, 2009-11-10)
      The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, ...
    • Representing cyberspace using taxonomies and meta-data analysis 

      Elbait, Gihan Daw (Explorations in Cyber International Relations, 2011-12-07)
      Problem: Modeling and mapping the landscapes of emerging research fields, such as cyberspace. • Most research fields are composed of many subfields which are related in intricate ways, therefore structural organization ...
    • Resilient and virtually perfect revenue from perfectly informed players 

      Chen, Jing; Hassidim, Avinatan; Micali, Silvio (© Massachusetts Institute of Technology, 2010-01-13)
      We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is ...
    • Resilient mechanism design foundations for governance of cyberspace: Exploration in theory, strategy, and policy 

      Micali, Silvio; Choucri, Nazli; Chen, Jing; Williams, Cindy (© Massachusetts Institute of Technology, 2013-09)
      Three related trends in world politics – shifting in power relations, increased diversity of actors and entities, and the growing mobilization and politicization of global constituencies are contributing to a global “tussle” ...
    • The right way 

      Winston, Patrick Henry (© Cognitive Systems Foundation, 2012-01)
      I ask why humans are smarter than other primates, and I hypothesize that an important part of the answer lies in the Inner Language Hypothesis, a prerequisite to what I call the Strong Story Hypothesis, which holds that ...
    • The role of cyberspace in international relations: A view of the literature 

      Reardon, Robert; Choucri, Nazli (© International Studies Association, 2012-04-01)
      This paper reviews the literature on cyber international relations of the previous decade. The review covers all journal articles on the role of cyberspace and information technology that appeared in 26 major policy, ...
    • Sets of signals, information flow, and folktales 

      Finlayson, Mark Alan (© Springer-Verlag, Berlin, Heidelberg, 2012-06-01)
      I apply Barwise and Seligman’s theory of information flow to understand how sets of signals can carry information. More precisely I focus on the case where the information of interest is not present in any individual signal, ...
    • Simulation modeling for cyber resilience 

      Siegel, Michael; Goldsmith, Daniel (© Massachusetts Institute of Technology, 2010-10)
      Identifying high-leverage intervention points to increase cyber resiliency—the ability to provide and maintain acceptable service levels in the face of challenges— requires identifying, integrating, and framing a diverse ...
    • Story retrieval and comparison using concept patterns 

      Krakauer, Caryn E.; Winston, Patrick Henry (© The Association for Computational Linguistics, 2012-05-26)
      Traditional story comparison uses key words to determine similarity. However, the use of key words misses much of what makes two stories alike. The method we have developed use high level concept patterns, which are comprised ...