2015 IEEE Conference on Computational Intelligence and Games (CIG) 2015
DOI: 10.1109/cig.2015.7317915
|View full text |Cite
|
Sign up to set email alerts
|

Co-evolution of strategies for multi-objective games under postponed objective preferences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(19 citation statements)
references
References 13 publications
0
19
0
Order By: Relevance
“…Let the two players be denoted as P min and P max . Following Eisenstadt, Moshaiov, Avigad, and Branke (), let S min and S max be the sets of all possible I and J strategies for P min and P max , respectively, such that trueSitalicmin=smin1smini..sminISitalicmax=smax1smaxjsmaxJ. …”
Section: Solving Mogs With Undecided Objective Preferencesmentioning
confidence: 99%
See 2 more Smart Citations
“…Let the two players be denoted as P min and P max . Following Eisenstadt, Moshaiov, Avigad, and Branke (), let S min and S max be the sets of all possible I and J strategies for P min and P max , respectively, such that trueSitalicmin=smin1smini..sminISitalicmax=smax1smaxjsmaxJ. …”
Section: Solving Mogs With Undecided Objective Preferencesmentioning
confidence: 99%
“…As suggested in Eisenstadt, Moshaiov, Avigad, and Branke (2016), the associated performances can be analysed to find all rationalizable strategies, from which a strategy can be selected.…”
Section: Solving Mogs With Undecided Objective Preferencesmentioning
confidence: 99%
See 1 more Smart Citation
“…Section 2 presents the general formulation and fundamentals of MOGs. An overview of the baseline co-evolutionary approach for solving MOGs based on [16] is presented in Section 3. Section 4 provides a more detailed description of the proposed surrogate-assisted memetic algorithm tailored for computationally expensive MOGs.…”
Section: Introductionmentioning
confidence: 99%
“…The optimal operating point is computed by considering a network utility function. In this model, vulnerability to the attack metric is dependent on network topology, which makes it unsuitable for fully connected networks [40].…”
Section: Pareto Optimizationmentioning
confidence: 99%