Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We study equilibria of dynamic over-the-counter markets in which agents are distinguished by their preferences and information. Over time, agents are privately informed by bids and offers. Investors differ with respect to information quality, including ini ...
We consider the Cauchy problem for an energy supercritical nonlinear wave equation that arises in -dimensional Yang-Mills theory. A certain self-similar solution of this model is conjectured to act as an attractor for generic large data evolutions. Assumin ...
We examine a generic three-stage game for two players with alternating moves, where the first player can choose the level of adjustment cost to be paid in the last period for modifying the action she announced in the first period. In the resulting continuu ...
We study battery filling policies with hard deadlines when the supply of energy can be modulated. This occurs for example with an electric plug-in vehicle using an adjustable electricity service for charging; such a service is offered in some countries as ...
We examine a generic three-stage game for two players with alternating moves, where the first player can choose the level of adjustment cost to be paid in the last period to modify the action she announced in the first period. In the resulting continuum of ...
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in ad ...
To quantify a player’s commitment in a given Nash equilibrium of a finite dynamic game, we map the corresponding normal-form game to a “canonical supergame,” which allows each player to adjust his or her move with a certain probability. The commitment meas ...
We analyze symmetric protocols to rationally coordinate on an asymmetric, efficient allocation in an infinitely repeated N-agent, C-resource allocation problems, where the resources are all homogeneous. Bhaskar proposed one way to achieve this in 2-agent, ...
Sensing and monitoring of our natural environment are important for sustainability. As sensor systems grow to a large scale, it will become infeasible to place all sensors under centralized control. We investigate community sensing, where sensors are contr ...
In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location pri ...