Bayes Bluff: Opponent Modelling in Poker

Size: px
Start display at page:

Download "Bayes Bluff: Opponent Modelling in Poker"

Transcription

1 Bayes Bluff: Opponent Modelling in Poker Finnegan Southey, Mihael Bowling, Brye Larson, Carmelo Piione, Neil Burh, Darse Billings, Chris Rayner Department of Computing Siene University of Alberta Edmonton, Alberta, Canada T6G 2E8 Abstrat Poker is a hallenging problem for artifiial intelligene, with non-deterministi dynamis, partial observability, and the added diffiulty of unknown adversaries. Modelling all of the unertainties in this domain is not an easy task. In this paper we present a Bayesian probabilisti model for a broad lass of poker games, separating the unertainty in the game dynamis from the unertainty of the opponent s strategy. We then desribe approahes to two key subproblems: (i) inferring a posterior over opponent strategies given a prior distribution and observations of their play, and (ii) playing an appropriate response to that distribution. We demonstrate the overall approah on a redued version of poker using Dirihlet priors and then on the full game of Texas hold em using a more informed prior. We demonstrate methods for playing effetive responses to the opponent, based on the posterior. Introdution The game of poker presents a serious hallenge to artifiial intelligene researh. Unertainty in the game stems from partial information, unknown opponents, and game dynamis ditated by a shuffled dek. Add to this the large spae of possible game situations in real poker games suh as Texas hold em, and the problem beomes very diffiult indeed. Among the more suessful approahes to playing poker is the game theoreti approah, approximating a Nash equilibrium of the game via linear programming [5, ]. Even when suh approximations are good, Nash solutions represent a pessimisti viewpoint in whih we fae an optimal opponent. Human players, and even the best omputer players, are ertainly not optimal, having idiosynrati weaknesses that an be exploited to obtain higher payoffs than the Nash value of the game. Opponent modelling attempts to apture these weaknesses so they an be exploited in subsequent play. Existing approahes to opponent modelling have employed a variety of approahes inluding reinforement learning [4], neural networks [2], and frequentist statistis [3]. Additionally, earlier work on using Bayesian models for poker [6] attempted to lassify the opponent s hand into one of a variety of broad hand lasses. They did not model unertainty in the opponent s strategy, using instead an expliit strategy representation. The strategy was updated based on empirial frequenies of play, but they reported little improvement due to this updating. We present a general Bayesian probabilisti model for hold em poker games, ompletely modelling the unertainty in the game and the opponent. We start by desribing hold em style poker games in general terms, and then give detailed desriptions of the asino game Texas hold em along with a simplified researh game alled Ledu hold em for whih game theoreti results are known. We formally define our probabilisti model and show how the posterior over opponent strategies an be omputed from observations of play. Using this posterior to exploit the opponent is non-trivial and we disuss three different approahes for omputing a response. We have implemented the posterior and response omputations in both Texas and Ledu hold em, using two different lasses of priors: independent Dirihlet and an informed prior provided by an expert. We show results on the performane of these Bayesian methods, demonstrating that they are apable of quikly learning enough to exploit an opponent. 2 Poker There are many variants of poker. We will fous on hold em, partiularly the heads-up limit game (i.e., two players with pre-speified bet and raise amounts). A single hand onsists of a number of rounds. In the first round, players are dealt a fixed number of private ards. In all rounds, A more thorough introdution of the rules of poker an be found in [2].

2 f r f 2 r Figure : An example deision tree for a single betting round in poker with a two-bet maximum. Leaf nodes with open boxes ontinue to the next round, while losed boxes end the hand. some fixed number (possibly zero) of shared, publi board ards are revealed. The dealing and/or revealing of ards is followed by betting. The betting involves alternating deisions, where eah player an either fold (f), all (), or raise (r). If a player folds, the hand ends and the other player wins the pot. If a player alls, they plae into the pot an amount to math what the other player has already plaed in the pot (possibly nothing). If a player raises, they math the other player s total and then put in an additional fixed amount. The players alternate until a player folds, ending the hand, or a player alls (as long as the all is not the first ation of the round), ontinuing the hand to the next round. There is a limit on the number of raises (or bets) per round, so the betting sequene has a finite length. An example deision tree for a single round of betting with a two-bet maximum is shown in Figure. Sine folding when both players have equal money in the pot is dominated by the all ation, we do not inlude this ation in the tree. If neither player folds before the final betting round is over, a showdown ours. The players reveal their private ards and the player who an make the strongest poker hand with a ombination of their private ards and the publi board ards wins the pot. Many games an be onstruted with this simple format for both analysis (e.g., Kuhn poker [7] and Rhode Island hold em [9]) and human play. We fous on the ommonly played variant, Texas hold em, along with a simplified and more tratable game we onstruted alled Ledu hold em. Texas Hold Em. The most ommon format for hold em is Texas Hold em, whih is used to determine the human world hampion and is widely onsidered the most strategially omplex variant. A standard 52-ard dek is used. There are four betting rounds. In the first round, the players are dealt two private ards. In the seond round (or flop), three board ards are revealed. In the third round (turn) f f 2 2 r r and fourth round (river), a single board ard is revealed. We use a four-bet maximum, with fixed raise amounts of units in the first two rounds and 2 units in the final two rounds. Finally, blind bets are used to start the first round. The first player begins the hand with 5 units in the pot and the seond player with units. Ledu Hold Em. We have also onstruted a smaller version of hold em, whih seeks to retain the strategi elements of the large game while keeping the size of the game tratable. In Ledu hold em, the dek onsists of two suits with three ards in eah suit. There are two rounds. In the first round a single private ard is dealt to eah player. In the seond round a single board ard is revealed. There is a two-bet maximum, with raise amounts of 2 and 4 in the first and seond round, respetively. Both players start the first round with already in the pot. Challenges. The hallenges introdued by poker are many. The game involves a number of forms of unertainty, inluding stohasti dynamis from a shuffled dek, imperfet information due to the opponent s private ards, and, finally, an unknown opponent. These unertainties are individually diffiult and together the diffiulties only esalate. A related hallenge is the problem of folded hands, whih amount to partial observations of the opponent s deisionmaking ontexts. This has reated serious problems for some opponent modelling approahes and our Bayesian approah will shed some light on the additional hallenge that fold data imposes. A third key hallenge is the high variane of payoffs, also known as luk. This makes it diffiult for a program to even assess its performane over short periods of time. To aggravate this diffiulty, play against human opponents is neessarily limited. If no more than two or three hundred hands are to be played in total, opponent modelling must be effetive using only very small amounts of data. Finally, Texas hold em is a very large game. It has on the order of 8 states [], whih makes even straightforward alulations, suh as best response, non-trivial. 3 Modelling the Opponent We will now desribe our probabilisti model for poker. In all of the following disussion, we will assume that Player (P) is modelling its opponent, Player 2 (P2), and that all inomplete observations due to folding are from P s perspetive. 3. Strategies In game theoreti terms, a player makes deisions at information sets. In poker, information sets onsist of the ations taken by all players so far, the publi ards revealed so far, and the player s own private ards. A behaviour strategy speifies a distribution over the possible ations

3 for every information set of that player. Leaving aside the preise form of these distributions for now, we denote P s omplete strategy by and P2 s by. We make the following simplifying assumptions regarding the player strategies. First, P2 s strategy is stationary. This is an unrealisti assumption but modelling stationary opponents in full-sale poker is still an open problem. Even the most suessful approahes make the same assumption or use simple methods suh as deaying histories to aommodate opponent drift. However, we believe this framework an be naturally extended to dynami opponents by onstruting priors that expliitly model hanges in opponent strategy. The seond assumption is that the players strategies are independent. More formally, P (, ) = P ()P (). This assumption, implied by the stationarity, is also unrealisti. Hower, modelling opponents that learn, and effetively deeiving them, is a diffiult task even in very small games and we defer suh efforts until we are sure of effetive stationary opponent modelling. Finally, we assume the dek is uniformly distributed, i.e., the game is fair. These assumptions imply that all hands are i.i.d. given the strategies of the players. 3.2 Hands The following notation is used for hand information. We onsider a hand, H, with k deisions by eah player. Eah hand, as observed by an orale with perfet information, is a tuple H = (C, D, R :k, A :k, B :k ) where, 3.3 Probability of Observations Suppose a hand is fully observed, i.e., a showdown ours. The probability of a partiular showdown hand H s ourring given the opponent s strategy is, 2 P (H s ) = P (C, D, R :k, A :k, B :k ) [ = P (D C)P (C) P (Bi D, R :i, A :i, B :i, ) P (A i C, R :i, A :i, B :i ) P (R i C, D, R :i ) ] = P (D C)P (C) [ Yi,C,A i P (R i C, D, R :i ) ] = p showards Yi,C,A i, where for notational onveniene, we separate the information sets for P (P2) into its publi part Y i (Z i ) and its private part C (D). So, C and D denote P and P2 s private ards, R i is the set (possibly empty) of publi ards dealt before either player makes their ith deision, and A i and B i denote P and P2 s ith deisions (fold, all or raise). We an model any limit hold em style poker with these variables. A hand runs to at most k deisions. The fat that partiular hands may have fewer real deisions (e.g., a player may all and end the urrent betting round, or fold and end the hand) an be handled by padding the deisions with speifi values (e.g., one a player has folded all subsequent deisions by both players are assumed to be folds). Probabilities in the players strategies for these padding deisions are fored to. Furthermore, the publi ards for a deision point (R i ) an be the empty set, so that multiple deisions onstituting a single betting round an our between revealed publi ards. These speial ases are quite straightforward and allow us to model the variable length hands found in real games with fixed length tuples. Y i = (R :i, A :i, B :i ) Z i = (R :i, A :i, B :i ). In addition, Yi,C,A i is the probability of taking ation A i in the information set (Y i, C), ditated by P s strategy,. A similar interpretation applies to the subsripted. p showards is a onstant that depends only on the number of ards dealt to players and the number of publi ards revealed. This simplifiation is possible beause the dek has uniform distribution and the number of ards revealed is the same for all showdowns. Notie that the final unnormalized probability depends only on. Now onsider a hand where either player folds. In this ase, we do not observe P2 s private ards, D. We must marginalize away this hidden variable by summing over all possible sets of ards P2 ould hold. 2 Stritly speaking, this should be P (H, ) but we drop the onditioning on here and elsewhere to simplify the notation.

4 The probability of a partiular fold hand H f ourring is, P (H f ) = P (C, R :k, A :k, B :k ) = P (C) [ P (D C) P (Bi D, R :i, A :i, B :i, ) D P (A i C, R :i, A :i, B :i ) P (R i C, D, R :i ) ] [ = p foldards (H f ) D Zi,D,B i Yi,C,A i ] D k Zi,D,B i where D are sets of ards that P2 ould hold given the observed C and R (i.e., all sets D that do not interset with C R), and p foldards (H f ) is a funtion that depends only on the number of ards dealt to the players and the number of publi ards revealed before the hand ended. It does not depend on the speifi ards dealt or the players strategies. Again, the unnormalized probability depends only on. 3.4 Posterior Distribution Over Opponent Strategies Given a set O = O s O f of observations, where O s are the observations of hands that led to showdowns and O f are the observations of hands that led to folds, we wish to ompute the posterior distribution over the spae of opponent strategies. A simple appliation of Bayes rule gives us, P (O )P () P ( O) = P (O) = P () P (H s ) P (H f ) P (O) H s O s H f O f P () P (H s ) P (H f ) H s O s H f O f 4 Responding to the Opponent Given a posterior distribution over the opponent s strategy spae, the question of how to ompute an appropriate response remains. We present several options with varying omputational burdens. In all ases we ompute a response at the beginning of the hand and play it for the entire hand. 4. Bayesian Best Response The fully Bayesian answer to this question is to ompute the best response to the entire distribution. We will all this the Bayesian Best Response (). The objetive here is to maximize the expeted value over all possible hands and opponent strategies, given our past observations of hands. We start with a simple objetive, = argmax E H O V (H) = argmax = argmax = argmax = argmax V (H) V (H)P (H O, ) V (H) P (H,, O)P ( O) P (H,, O)P (O )P () [ V (H) P (H,, O)P () H s O s H f O f D ] where H is the set of all possible perfetly observed hands (in effet, the set of all hands that ould be played). Although not immediately obvious from the equation above, one algorithm for omputing Bayesian best response is a form of Expetimax [8], whih we will now desribe. Begin by onstruting the tree of possible observations in the order they would be observed by P, inluding P s ards, publi ards, P2 s ations, and P s ations. At the bottom of the tree will be an enumeration of P2 s ards for both showdown and fold outomes. We an bakup values to the root of the tree while omputing the best response strategy. For a leaf node the value should be the payoff to P multiplied by the probability of P2 s ations reahing this leaf given the posterior distribution over strategies. For an internal node, alulate the value from its hildren based on the type of node. For a P2 ation node or a publi ard node, the value is the sum of the hildren s values. For a P ation node, the value is the maximum of its hildren s values, and the best-response strategy assigns probability one to the ation that leads to the maximal hild for that node s information set. Repeat until every node has been assigned a value, whih implies that every P information set has been assigned an ation. More formally Expetimax omputes the following value for the root of the tree, R max A B R k max A k V (H) B k D P (O )P () This orresponds to Expetimax, with the posterior induing a probability distribution over ations at P2 s ation nodes. It now remains to prove that this version of Expetimax

5 omputes the. This will be done by showing that, max V (H) P (H,, O)P (O )P () max max V (H) A A R B R k k B k D P (O )P () First we rewrite max H as, max max, () (k) B D R A where max (i) is a max over the set of all parameters in that govern the ith deision. Then, beause max x y f(x, y) y max x f(x, y), we get, max max () (k) R A B R k A k B k D max max max (2) (k) () R A B R k A k B k D max max () (k) R A B D R k R k A k A k B k B k Seond, we note that, P (H,, O)P (O )P () Yi,C,A i We an distribute parameters from to obtain, max Y,C,A () R A B R k max (k) = R max A A k Yk,C,A k B k D P (O )P () max A B R k k B k D P (O )P (), whih is the Expetimax algorithm. This last step is possible beause parameters in must sum to one over all possible ations at a given information set. The maximizing parameter setting is to take the highest-valued ation with probability. Computing the integral over opponent strategies depends on the form of the prior but is diffiult in any event. For Dirihlet priors (see Setion 5), it is possible to ompute the posterior exatly but the alulation is expensive exept for small games with relatively few observations. This makes the exat an ideal goal rather than a pratial approah. For real play, we must onsider approximations to. One straightforward approah to approximating is to approximate the integral over opponent strategies by importane sampling using the prior as the proposal distribution: P (H,, O)P (O )P () P (H,, O)P (O ) where the are sampled from the prior, P (). More effetive Monte Carlo tehniques might be possible, depending on the prior used. Note that P (O ) need only be omputed one for eah, while the muh smaller omputation P (H,, O) must be omputed for every possible hand. The running time of omputing the posterior for a strategy sample sales linearly in the number of samples used in the approximation and the update is onstant time for eah hand played. This tratability failitates other approximate response tehniques. 4.2 Max A Posteriori Response An alternate goal to is to find the max a posteriori () strategy of the opponent and ompute a best response to that strategy. Computing a true strategy for the opponent is also hard, so it is more pratial to approximate this approah by sampling a set of strategies from the prior and finding the most probable amongst that set. This sampled strategy is taken to be an estimate of a strategy and a best response to it is omputed and played. is potentially dangerous for two reasons. First, if the distribution is multimodal, a best response to any single mode may be suboptimal. Seond, repeatedly playing any single strategy may never fully explore the opponent s strategy. 4.3 s Response A potentially more robust alternative to is to sample a strategy from the posterior distribution and play a best response to that strategy. As with and, sampling the posterior diretly may be diffiult. Again we an use importane sampling, but in a slightly different way. We sample a set of opponent strategies from the prior, ompute their posterior probabilities, and then sample one strategy aording to those probabilities.

6 P (i) = P ( i H, O) j P ( j H, O) This was first proposed by []. s has some probability of playing a best-response to any nonzero probability opponent strategy and so offers more robust exploration. 5 Priors As with all Bayesian approahes, the resulting performane and effiieny depends on the hoie of prior. Obviously the prior should apture our beliefs about the strategy of our opponent. The form of the prior also determines the tratability of (i) omputing the posterior, and (ii) responding with the model. As the two games of hold em are onsiderably different in size, we explore two different priors. Independent Dirihlet. The game of Ledu hold em is suffiiently small that we an have a fully parameterized model, with well-defined priors at every information set. Dirihlet distributions offer a simple prior for multinomials, whih is a natural desription for ation probabilities. Any strategy (in behavioural form) speifies a multinomial distribution over legal ations for every information set. Our prior over strategies, whih we will refer to as an independent Dirihlet prior, onsists of independent Dirihlet distributions for eah information set. We are using Dirihlet(2, 2, 2) distributions, whose mode is the multinomial (/3, /3, /3) over fold, all, and raise. Informed. In the Texas hold em game, priors with independent distributions for eah information set are both intratable and ineffetive. The size of the game virtually guarantees that one will never see the same information set twie. Any useful inferene must be aross information sets and the prior must enode how the opponent s deisions at information sets are likely to be orrelated. We therefore employ an expert defined prior that we will refer to as an informed prior. The informed prior is based on a ten dimensional reursive model. That is, by speifying values for two sets of five intuitive parameters (one set for eah player), a omplete strategy is defined. Table summarizes the expert defined meaning of these five parameters. From the modelling perspetive, we an simply onsider this expert abstration to provide us with a mapping from some low-dimensional parameter spae to the spae of all strategies. By defining a density over this parameter spae, the mapping speifies a resulting density over behaviour strategies, whih serves as our prior. In this paper we use an independent Gaussian distribution over the parameter spae with means and varianes hosen by a domain expert. We omit further details Table : The five parameter types in the informed prior parameter spae. A orresponding set of five are required to speify the opponent s model of how we play. Parameter Desription r r b f t Fration of opponent s strength distribution that must be exeeded to raise after $ bets (i.e., to initiate betting). Fration of opponent s strength distribution that must be exeeded to raise after >$ bets (i.e., to raise). Fration of the game-theoreti optimal bluff frequeny. Fration of the game-theoreti optimal fold frequeny. Trap or slow-play frequeny. of this model beause it is not the intended ontribution of this paper but rather a means to demonstrate our approah on the large game of Texas hold em. 6 Experimental Setup We tested our approah on both Ledu hold em with the Dirihlet prior and Texas hold em with the informed prior. For the Bayesian methods, we used all three responses (,, and s) on Ledu and the s response for Texas ( has not been implemented for Texas and s behaviour is very similar to s, as we will desribe below). For all Bayesian methods, strategies were sampled from the prior at the beginning of eah trial and used throughout the trial. We have several players for our study. is a Nash (or minimax) strategy for the game. In the ase of Ledu, this has been omputed exatly. We also sampled opponents from our priors in both Ledu and Texas, whih we will refer to as Priors. In the experiments shown, a new opponent was sampled for eah trial (2 hands), so results are averaged over many samples from the priors. Both Priors and are stati players. Finally, for state-of-the-art opponent modelling, we used uentist, (also known as Vexbot) desribed fully in [3] and implemented for Ledu. All experiments onsisted of running two players against eah other for two hundred hands per trial and reording the bankroll (aumulated winnings/losses) at eah hand. These results were averaged over multiple trials ( trials for all Ledu experiments and 28 trials for the Texas experiments). We present two kinds of plots. The first is simply average bankroll per number of hands played. A straight line on suh a plot indiates a onstant winning rate. The seond is the average winning rate per number of hands played (i.e., the first derivative of the aver-

7 7 6 Best Response Best Response Average Bankroll Average Winning Rate Figure 2: Ledu hold em: Avg. Bankroll per hands played for,, s,, and uentist vs. Priors. Figure 3: Ledu hold em: Avg. Winning Rate per hands played for,, s,, and uentist vs. Priors. age bankroll). This allows one to see the effets of learning more diretly, sine positive hanges in slope indiate improved exploitation of the opponent. Note that winning rates for small numbers of hands are very noisy, so it is diffiult to interpret the early results. All results are expressed in raw pot units (e.g., bets in the first and seond rounds of Ledu are 2 and 4 units respetively). 7 Results 7. Ledu Hold em Figures 2 and 3 show the average bankroll and average winning rate for Ledu against opponents sampled from the prior (a new opponent eah trial). For suh an opponent, we an ompute a best response, whih represents the best possible exploitation of the opponent. In omplement, the strategy shows the most onservative play by assuming that the opponent plays perfetly and making no attempt to exploit any possible weakness. This niely bounds our results in these plots. Results are given for Best Response,,, s,, and uentist. As we would expet, the Bayesian players do well against opponents drawn from their prior, with little differene between the three response types in terms of bankroll. The winning rates show that and s onverge within the first ten hands, whereas is more errati and takes longer to onverge. The uninformed uentist is learly behind. The independent Dirihlet prior is very broad, admitting a wide variety of opponents. It is enouraging that the Bayesian approah is able to exploit even this weak information to ahieve a better result. However, it is unfair to make strong judgements on the basis of these results sine, in general, playing versus its prior is the best possible senario for the Bayesian approah. Figures 4 and 5 show bankroll and winning rate results for,, s,, and uentist versus on Ledu hold em. Note that, on average, a positive bankroll again is impossible, although sample variane allows for it in our experiments. From these plots we an see that the three Bayesian approahes behave very similarly. This is due to the fat that the posterior distribution over our sample of strategies onentrates very rapidly on a single strategy. Within less than 2 hands, one strategy dominates the rest. This means that the three responses beome very similar ( s is almost ertain to pik the strategy, and puts most of its weight on the strategy). Larger sample sizes would mitigate this effet. The winning rate graphs also show little differene between the three Bayesian players. uentist performs slightly worse than the Bayes approahes. The key problem with it is that it an form models of the opponent that are not onsistent with any behavioral strategy (e.g., it an be led to believe that its opponent an always show a winning hand). Suh inorret beliefs, untempered by any prior, an lead it to fold with high probability in ertain situations. One it starts folding, it an never make the observations required to orret its mistaken belief., of ourse, breaks even against itself. On the whole, independent Dirihlet distributions are a poor prior for the solution, but we see a slight improvement over the pure frequentist approah. Our final Ledu results are shown in Figure 6, playing against the uentist opponent. These results are inluded for the sake of interest. Beause the uentist opponent is not stationary, it violates the assumptions upon whih the Bayesian (and, indeed, the uentist) player are based. We annot drawn any real onlusions from this data. It is interesting, however, that the response is substantially worse than or s.

8 Average Bankroll Average Bankroll Figure 4: Ledu hold em: Avg. Bankroll per hands played for,, s,, and uentist vs Figure 6: Ledu hold em: Avg. Bankroll per hands played for,, s, and vs. uentist Average Winning Rate Average Winning Rate Figure 5: Ledu hold em: Avg. Winning Rate per hands played for,, s,, and uentist vs.. It seems likely that the posterior distribution does not onverge quikly against a non-stationary opponent, leading to respond to several differing strategies simulataneously. Beause the prior is independent for every information set, these various strategies ould be giving radially different advie in many ontexts, preventing from generating a foused response. and s neessarily generate more foused responses. We show winning rates in Figure 7 for the sake of ompleteness, with the same aveat regarding non-stationarity. 7.2 Texas Hold em Figure 8 show bankroll results for s,, and uentist versus opponents sampled from the informed prior for Texas hold em. Here s and uentist give very similar performane, although there is a small -. Figure 7: Ledu hold em: Avg. Winning Rate per hands played for,, s, and vs. uentist. advantage to s late in the run. It is possible that even with the more informed prior, two hundred hands does not provide enough information to effetively onentrate the posterior on good models of the opponent in this larger game. It may be that priors enoding strong orrelations between many information sets are required to gain a substantial advantage over the uentist approah. 8 Conlusion This researh has presented a Bayesian model for hold em style poker, fully modelling both game dynamis and opponent strategies. The posterior distribution has been desribed and several approahes for omputing appropriate responses onsidered. Opponents in both Texas hold em and Ledu hold em have been played against using s sampling for Texas hold em, and approximate Bayesian best response,, and s for

9 Average Bankroll telligene, 34( 2):2 24, 22. [3] Darse Billings, Aaron Davidson, Terrane Shauenberg, Neil Burh, Mihael Bowling, Rob Holte, Jonathan Shaeffer, and Duane Szafron. Game Tree Searh with Adaptation in Stohasti Imperfet Information Games. In Nathan Netanyahu and Jaap van den Herik Yngvi Bjornsson, editor, Computers and Games 4. Springer-Verlag, Figure 8: Texas hold em: Avg. Bankroll per hands played for s, uentist, and vs. Priors. Ledu hold em. These results show that, for opponents drawn from our prior, the posterior aptures them rapidly and the subsequent response is able to exploit the opponent, even in just 2 hands. On Ledu, the approah performs favourably ompared with state-of-the-art opponent modelling tehniques against prior-drawn opponents and a Nash equilibrium. Both approahes an play quikly enough for real-time play against humans. The next major step in advaning the play of these systems is onstruting better informed priors apable of modelling more hallenging opponents. Potential soures for suh priors inlude approximate game theoreti strategies, data mined from logged human poker play, and more sophistiated modelling by experts. In partiular, priors that are apable of apturing orrelations between related information sets would allow for generalization of observations over unobserved portions of the game. Finally, extending the approah to non-stationary approahes is under ative investigation. [4] Fredrik A. Dahl. A reinforement learning algorithm applied to simplified two-player Texas Hold em poker. In Proeedings of the 2th European Conferene on Mahine Learning (ECML-), pages 85 96, September 2. [5] D. Koller and A. Pfeffer. Representations and solutions for game-theoreti problems. Artifiial Intelligene, 94():67 25, 997. [6] K. Korb, A. Niholson, and N. Jitnah. Bayesian poker. In Unertainty in Artifiial Intelligene, pages , 999. [7] H. W. Kuhn. A simplified two-person poker. Contributions to the Theory of Games, :97 3, 95. [8] Stuart Russell and Peter Norvig. Artifiial Intelligene: A Modern Approah. Prentie Hall, Englewood Cliffs, NJ, 23. [9] J. Shi and M. Littman. Abstration models for game theoreti poker. In Computer Games. Springer- Verlag, 2. To appear. [] William R.. On the likelihood that one unknown probability exeeds another in view of the evidene of two samples. Biometrika, 25: , 933. Aknowledgements We would like to thank Rob Holte, Dale Shuurmanns, Nolan Bard, and the University of Alberta poker group for their insights. This work was funded by the Alberta Ingenuity Centre for Mahine Learning, icore, and NSERC. Referenes [] D. Billings, N. Burh, A. Davidson, R. Holte, J. Shaeffer, T. Shauenberg, and D. Szafron. Approximating game-theoreti optimal strategies for full-sale poker. In Eighteenth International Joint Conferene on Artifiial Intelligene (IJCAI 23), 23. [2] D. Billings, A. Davidson, J. Shaeffer, and D. Szafron. The hallenge of poker. Artifiial In-

3 Game Theory: Basic Concepts

3 Game Theory: Basic Concepts 3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

5.2 The Master Theorem

5.2 The Master Theorem 170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

1.3 Complex Numbers; Quadratic Equations in the Complex Number System*

1.3 Complex Numbers; Quadratic Equations in the Complex Number System* 04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

Fixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb

Fixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb Fixed-inome Seurities Leture 2: Basi Terminology and Conepts Philip H. Dybvig Washington University in Saint Louis Various interest rates Present value (PV) and arbitrage Forward and spot interest rates

More information

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities Impat Simulation of Extreme Wind Generated issiles on Radioative Waste Storage Failities G. Barbella Sogin S.p.A. Via Torino 6 00184 Rome (Italy), barbella@sogin.it Abstrat: The strutural design of temporary

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully.

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully. Deision Analysis Vol. 7, No. 1, Marh 2010, pp. 23 39 issn 1545-8490 eissn 1545-8504 10 0701 0023 informs doi 10.1287/dea.1090.0155 2010 INFORMS Managing Projet Failure Risk Through Contingent Contrats

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

10.1 The Lorentz force law

10.1 The Lorentz force law Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

DSP-I DSP-I DSP-I DSP-I

DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I DSP-I Digital Signal Proessing I (8-79) Fall Semester, 005 IIR FILER DESIG EXAMPLE hese notes summarize the design proedure for IIR filters as disussed in lass on ovember. Introdution:

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

In this chapter, we ll see state diagrams, an example of a different way to use directed graphs.

In this chapter, we ll see state diagrams, an example of a different way to use directed graphs. Chapter 19 State Diagrams In this hapter, we ll see state diagrams, an example of a different way to use direted graphs. 19.1 Introdution State diagrams are a type of direted graph, in whih the graph nodes

More information

Optimal Sales Force Compensation

Optimal Sales Force Compensation Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005 DOI: 10.4054/DemRes.2005.13.

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005  DOI: 10.4054/DemRes.2005.13. Demographi Researh a free, expedited, online journal of peer-reviewed researh and ommentary in the population sienes published by the Max Plank Institute for Demographi Researh Konrad-Zuse Str. 1, D-157

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

RATING SCALES FOR NEUROLOGISTS

RATING SCALES FOR NEUROLOGISTS RATING SCALES FOR NEUROLOGISTS J Hobart iv22 WHY Correspondene to: Dr Jeremy Hobart, Department of Clinial Neurosienes, Peninsula Medial Shool, Derriford Hospital, Plymouth PL6 8DH, UK; Jeremy.Hobart@

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

BUILDING A SPAM FILTER USING NAÏVE BAYES. CIS 391- Intro to AI 1

BUILDING A SPAM FILTER USING NAÏVE BAYES. CIS 391- Intro to AI 1 BUILDING A SPAM FILTER USING NAÏVE BAYES 1 Spam or not Spam: that is the question. From: "" Subjet: real estate is the only way... gem oalvgkay Anyone an buy real estate with no

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No. 475. The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism

RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No. 475. The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS Shool of Publi Poliy The University of Mihigan Ann Arbor, Mihigan 48109-1220 Disussion Paper No. 475 The Evolution and Utilization of the GATT/WTO Dispute Settlement

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Dynamic and Competitive Effects of Direct Mailings

Dynamic and Competitive Effects of Direct Mailings Dynami and Competitive Effets of Diret Mailings Merel van Diepen, Bas Donkers and Philip Hans Franses ERIM REPORT SERIES RESEARCH IN MANAGEMENT ERIM Report Series referene number ERS-2006-050-MKT Publiation

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Outline. Planning. Search vs. Planning. Search vs. Planning Cont d. Search vs. planning. STRIPS operators Partial-order planning.

Outline. Planning. Search vs. Planning. Search vs. Planning Cont d. Search vs. planning. STRIPS operators Partial-order planning. Outline Searh vs. planning Planning STRIPS operators Partial-order planning Chapter 11 Artifiial Intelligene, lp4 2005/06, Reiner Hähnle, partly based on AIMA Slides Stuart Russell and Peter Norvig, 1998

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

RISK-BASED IN SITU BIOREMEDIATION DESIGN JENNINGS BRYAN SMALLEY. A.B., Washington University, 1992 THESIS. Urbana, Illinois

RISK-BASED IN SITU BIOREMEDIATION DESIGN JENNINGS BRYAN SMALLEY. A.B., Washington University, 1992 THESIS. Urbana, Illinois RISK-BASED IN SITU BIOREMEDIATION DESIGN BY JENNINGS BRYAN SMALLEY A.B., Washington University, 1992 THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Siene in Environmental

More information

A Reputation Management Approach for Resource Constrained Trustee Agents

A Reputation Management Approach for Resource Constrained Trustee Agents A Reputation Management Approah for Resoure Constrained rustee Agents Han Yu, Chunyan Miao, Bo An 2, Cyril Leung 3, and Vitor R. Lesser 4 Nanyang ehnologial University, Singapore 2 he Key Lab of Intelligent

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Hierarchical Beta Processes and the Indian Buffet Process

Hierarchical Beta Processes and the Indian Buffet Process Hierarhial Beta Proesses and the Indian Buffet Proess Romain Thibaux Dept. of EECS University of California, Berkeley Berkeley, CA 9472 Mihael I. Jordan Dept. of EECS and Dept. of Statistis University

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

Isaac Newton. Translated into English by

Isaac Newton. Translated into English by THE MATHEMATICAL PRINCIPLES OF NATURAL PHILOSOPHY (BOOK 1, SECTION 1) By Isaa Newton Translated into English by Andrew Motte Edited by David R. Wilkins 2002 NOTE ON THE TEXT Setion I in Book I of Isaa

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

Scalable Hierarchical Multitask Learning Algorithms for Conversion Optimization in Display Advertising

Scalable Hierarchical Multitask Learning Algorithms for Conversion Optimization in Display Advertising Salable Hierarhial Multitask Learning Algorithms for Conversion Optimization in Display Advertising Amr Ahmed Google amra@google.om Abhimanyu Das Mirosoft Researh abhidas@mirosoft.om Alexander J. Smola

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Intuitive Guide to Priniples of Communiations By Charan Langton www.omplextoreal.om Understanding Frequeny Modulation (FM), Frequeny Shift Keying (FSK), Sunde s FSK and MSK and some more The proess of

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

protection p1ann1ng report

protection p1ann1ng report f1re~~ protetion p1ann1ng report BUILDING CONSTRUCTION INFORMATION FROM THE CONCRETE AND MASONRY INDUSTRIES Signifiane of Fire Ratings for Building Constrution NO. 3 OF A SERIES The use of fire-resistive

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

Optimal Health Insurance for Multiple Goods and Time Periods

Optimal Health Insurance for Multiple Goods and Time Periods Preliminary draft for review only 0R.P. Ellis, S. Jiang, and W.G.Manning MultipleGood_ 00630.dox June 30, 0 Optimal Health Insurane for Multiple Goods and Time Periods Randall P. Ellis a,, Shenyi Jiang

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Lemon Signaling in Cross-Listings Michal Barzuza*

Lemon Signaling in Cross-Listings Michal Barzuza* Lemon Signaling in Cross-Listings Mihal Barzuza* This paper analyzes the deision to ross-list by managers and ontrolling shareholders assuming that they have private information with respet to the amount

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

HEAT CONDUCTION. q A q T

HEAT CONDUCTION. q A q T HEAT CONDUCTION When a temperature gradient eist in a material, heat flows from the high temperature region to the low temperature region. The heat transfer mehanism is referred to as ondution and the

More information

Basic Properties of Probability

Basic Properties of Probability Basi Properties of Probability Definitions: A random experiment is a proedure or an operation whose outome is unertain and annot be predited with ertainty in advane. The olletion of all possible outomes

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

Context in Artificial Intelligent and Information Modeling

Context in Artificial Intelligent and Information Modeling Context in Artifiial Intelligent and Information Modeling Manos Theodorakis ½ and Niolas Spyratos ¾ ¾ ½ FIT-Fraunhofer Institute for Applied Information Tehnology, D-53754, Sankt Augustin, Germany manos.theodorakis@fit.fraunhofer.de

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

The Basics of International Trade: A Classroom Experiment

The Basics of International Trade: A Classroom Experiment The Basis of International Trade: A Classroom Experiment Alberto Isgut, Ganesan Ravishanker, and Tanya Rosenblat * Wesleyan University Abstrat We introdue a simple web-based lassroom experiment in whih

More information

The Advantages of Using Aountable Care Organizations ( ACOs)

The Advantages of Using Aountable Care Organizations ( ACOs) JLEO, V3 S i77 Struturing Inentives within Aountable Care Organizations Brigham Frandsen Brigham Young University James B. Rebitzer* Boston University Shool of Management and ational Bureau of Eonomi Researh

More information

In many services, the quality or value provided by the service increases with the time the service provider

In many services, the quality or value provided by the service increases with the time the service provider MANAGEMENT SCIENCE Vol. 57, No. 1, January 2011, pp. 40 56 issn 0025-1909 eissn 1526-5501 11 5701 0040 informs doi 10.1287/mns.1100.1250 2011 INFORMS Quality Speed Conundrum: Trade-offs in Customer-Intensive

More information

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters nternational Journal of Supply and Operations Management JSOM November 0, Volume, ssue 3, pp. 60-78 SSN-Print: 383-359 SSN-Online: 383-55 www.ijsom.om Mathematial modeling for EOQ inventory system with

More information

Prices and Heterogeneous Search Costs

Prices and Heterogeneous Search Costs Pries and Heterogeneous Searh Costs José L. Moraga-González Zsolt Sándor Matthijs R. Wildenbeest First draft: July 2014 Revised: June 2015 Abstrat We study prie formation in a model of onsumer searh for

More information