Colonel Blotto’s Top Secret Files
نویسندگان
چکیده
Colonel Blotto “secret files” are opened and Information about the way that people play the game is revealed. The files rely on web-based experiments, which involve a tournament version of the Colonel Blotto Game. A total of 6,500 subjects from two diverse populations participated in the tournaments. The results are analyzed in light of a novel procedure of multi-dimensional iterative reasoning. According to the procedure, a player decides separately about different features of his strategy using iterative reasoning. Measuring the response time of the subjects assists in interpreting the reasoning procedure behind the choices. Common properties of the successful strategies in the tournament are exposed.
منابع مشابه
Colonel Blotto’s Top Secret Files: Multi-Dimensional Iterative Reasoning in Action
We introduce a novel decision procedure involving multi-dimensional iterative reasoning, in which a player decides separately on the various features of his strategy using an iterative process. This type of strategic reasoning fits a range of complicated situations in which a player faces a large and non-ordered strategy space. In this paper, the procedure is used to explain the results of a la...
متن کامل.3(a)(4) Subject Military Thought: "some Factors Affecting the Planning of a Modern Offensive Operation", by Colonel-general Ye. Ivanov
1. Enclosed is a verbatim translation of an article which appeared in the TOP SECRET Special Collection of Articles of the Journal "Military Thought" ("Voyennaya Mys1") published by the Ministry of Defense, USSR, and distributed down to the level of Army Commander. 2: In the interests of protecting our source, this material should be handled on a need-to-know basis within your office. Requests ...
متن کاملAdvanced Steganographic Approach for Hiding Encrypted Secret Message in LSB, LSB+1, LSB+2 and LSB+3 Bits in Non standard Cover Files
In digital steganography normally image, audio or video files are the standard cover files or the host files for embedding secret message such as text, image, audio or video. Nath et al.(2) explored the standard method for hiding secret message inside standard cover files such as image, audio or video files. In the present work we have shown how we can hide secret message in encrypted form in s...
متن کاملSecure Data Outsourcing on Cloud Using Secret Sharing Scheme
Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower management overhead, elasticity of storage etc and these encourage organizations to use cloud computing to outsource massive amount of data to the cloud providers. The outsourced environment of the cloud and its inherent loss of control cause risk of exposing highly sensitive data to internal or external attacks. Tr...
متن کاملHiding Secret Information in Movie Clip: A Steganographic Approach
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant informa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009