نتایج جستجو برای: williamson accepts an efficient equilibrium which occurs once forever

تعداد نتایج: 7402620  

2011
Pedro Cabalar Stéphane Demri

Temporal Equilibrium Logic (TEL) is a formalism for temporal logic programming that generalizes the paradigm of Answer Set Programming (ASP) introducing modal temporal operators from standard Linear-time Temporal Logic (LTL). In this paper we solve some problems that remained open for TEL like decidability, bounds for computational complexity as well as computation of temporal equilibrium model...

2013
Manuel PÉREZ OTERO Eduardo Barrio Genoveva Martí Gabriel Uzquiano Tim Williamson

Necessitism about individuals claims that necessarily every individual necessarily exists. An analogous necessitist thesis attributes necessary existence to properties and relations. Both theses have been defended by Williamson. Furthermore, Williamson specifically argues against the hybrid conjunction of first-order contingentism (the negation of necessitism about individuals) and higher-order...

Kouroush Jenab, Saeid Moslehpour, Srikar Valiveti,

As functional integration has increased in hand-held consumer devices features such as Global Positioning System (GPS) receivers have been embedded in increasingly more devices in recent years. For example, the train positioning system based on GPS provides an integrated positioning solution which can be used in many rail applications without a cost intensive infrastructure. The network built i...

Journal: :Theor. Comput. Sci. 2009
Martin Biely Martin Hutle

Among all classes of faults, Byzantine faults form the most general modeling of value faults. Traditionally, in the Byzantine fault model, faults are statically attributed to a set of up to t processes. This, however, implies that in this model a process at which a value fault occurs is forever “stigmatized” as being Byzantine, an assumption that might not be acceptable for long-lived systems, ...

Journal: :Journal of cybersecurity and privacy 2021

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is exploitation of websites by XSS attacks, are nowadays considered complicated attack. These types attacks aim to execute malicious scripts web browser client including code legitimate page. A serious matter when website accepts “user-input” option. Attackers can exploit application (if vulnerabl...

2007
Hamid Sabourian

Two questions central to the foundations of game theory are (Samuelson 2002): (i) Why equilibrium? Should we expect Nash equilibrium play (players choosing best response strategies to the choices of others)? (ii) If so, which equilibrium? Which of the many Nash equilibria that arise in most games should we expect? To address the …rst question the classical game theory approach employs assumptio...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

Journal: :Journal of Statistical Mechanics: Theory and Experiment 2022

Abstract A classical long-range-interacting N -particle system relaxes to thermal equilibrium on time scales growing with ; in the limit ? ? such a relaxation diverges. However, completely non-collisional process, known as violent relaxation, takes place much shorter scale independent of and brings towards non-thermal quasi-stationary state (QSS). finite will eventually reach equilibrium, while...

2009
Jacek B. Krawczyk Mabel Tidball

We consider a situation, in which a regulator believes that constraining a complex good created jointly by competitive agents, is socially desirable. Individual levels of outputs that generate the constrained amount of the externality can be computed as a Pareto efficient solution of the agents’ joint utility maximisation problem. However, generically, a Pareto efficient solution is not an equi...

2003
Fumitaka KURAUCHI Agachai SUMALEE Yasunori IIDA

This paper proposes the methodology to evaluate the road network anti-hazardous ability by the concept of network capacity reliability. The methodology proposed here considers the area-traffic regulation, which may be implemented when a large disaster occurs in Japan. The model to calculate entry permission rates is formulated as MPEC (Mathematical Programming with Equilibrium Constraints) in w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید