2014
DOI: 10.4204/eptcs.144.6
|View full text |Cite
|
Sign up to set email alerts
|

Using HMM in Strategic Games

Abstract: In this paper we describe an approach to resolve strategic games in which players can assume different types along the game. Our goal is to infer which type the opponent is adopting at each moment so that we can increase the player's odds. To achieve that we use Markov games combined with hidden Markov model. We discuss a hypothetical example of a tennis game whose solution can be applied to any game with similar characteristics.Comment: In Proceedings DCM 2013, arXiv:1403.768

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
1
0
Order By: Relevance
“…Hidden Markov Games (HMG [42]) represent a fusion of Markov Games with Hidden Markov Models (HMMs), enabling the estimation of transition probabilities between hidden type states. In their research, HMGs were applied to predict transitions between hidden type states in a tennis game characterized by stationary transitions.…”
Section: Defenses and Related Workmentioning
confidence: 99%
“…Hidden Markov Games (HMG [42]) represent a fusion of Markov Games with Hidden Markov Models (HMMs), enabling the estimation of transition probabilities between hidden type states. In their research, HMGs were applied to predict transitions between hidden type states in a tennis game characterized by stationary transitions.…”
Section: Defenses and Related Workmentioning
confidence: 99%
“…Oneofthemostpopularandthreateningattacksthatmostlyaffectcloud-basedinfrastructureis DenialofService(DoS)/DistributedDenialofService(DDoS)attacks.ADoSattackusuallyhaltsa virtualmachine (Fanetal.,2013) So,theHiddenMarkovModel(HMM)canbeusedasastatisticalmethod(Ariuetal.,2007) (Benevides et al, 2014) in speech recognition, extraction of information and other areas where classificationisrequired.Therefore,itcanalsobeusedforintrusiondetectionasithastheability toeasilymodeltimeseriesbyusingastatefulapproachinwhichtheinternalstatesarehidden.In caseofintrusiondetection,theseseriescanbesequencesofsomeeventsoritcanbeafunctionor commandsthatmayberunningonasinglehostmachine.…”
Section: Introductionmentioning
confidence: 99%