Using computational game theory to guide verification and security in hardware designs.
Andrew M. SmithJackson R. MayoVivian KammlerRobert C. ArmstrongYevgeniy VorobeychikPublished in: HOST (2017)
Keyphrases
- game theory
- hardware designs
- cooperative game theory
- game theoretic
- cooperative
- statistical physics
- resource allocation
- nash equilibrium
- model based diagnosis
- multi agent learning
- multi agent systems
- mechanism design
- nash equilibria
- financial crisis
- mathematical programming
- decision theory
- bayesian networks
- model checking
- solution concepts
- evolutionary game theory