Applying Influence Diagrams to Infer Rival's Private Information
نویسندگان
چکیده
It is important for having the initiative in competition to infer the rival’s private information accurately. In this paper, the rival’s decision making model is described by influence diagram. According to the criterion that rival is apt to gain the global maximum expected utility rather than to gain the local maximum expected utility, we infer rival’s private information about cost, bankroll, tactic, and utility by combining decision computation and Bayesian network illation. The experiment results show that our proposed method is feasible.
منابع مشابه
Task-Based Listening Assessment and the Influence of Construct-Irrelevant Variance
Task-based listening tests such as IELTS require testees to listen to some information on a CD and simultaneously answer the related items. To answer such items, testees are expected to comprehend, analyze, compare and infer pieces of information while listening to the incoming audio material. The present research attempted to investigate whether the two major characteristics of question type a...
متن کاملSequential Decision Making Predictions under the Influence of Observational Learning
Today’s corporate managers face challenges in information technology (IT) adoption with great stakes. The waiting period for an IT investment to be realized, if any, could be long; thus word-of-mouth information propagation may not help them to make wise decisions. Though information used by early adopters to make their decisions may not be available to the public, late adopters can often obser...
متن کاملSocial Influences in Sequential Decision Making
People often make decisions in a social environment. The present work examines social influence on people's decisions in a sequential decision-making situation. In the first experimental study, we implemented an information cascade paradigm, illustrating that people infer information from decisions of others and use this information to make their own decisions. We followed a cognitive modeling ...
متن کاملYou are what you like! Information leakage through users' Interests
Suppose that a Facebook user, whose age is hidden or missing, likes Britney Spears. Can you guess his/her age? Knowing that most Britney fans are teenagers, it is fairly easy for humans to answer this question. Interests (or “likes”) of users is one of the highly-available on-line information. In this paper, we show how these seemingly harmless interests (e.g., music interests) can leak privacy...
متن کاملOSSINT - Open Source Social Network Intelligence An efficient and effective way to uncover "private" information in OSN profiles
Online Social Networks (OSNs), such as Facebook, provide users with tools to share information along with a set of privacy controls preferences to regulate the spread of information. Current privacy controls are efficient to protect content data. However, the complexity of tuning them undermine their efficiency when protecting contextual information (such as the social network structure) that m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- AISS
دوره 2 شماره
صفحات -
تاریخ انتشار 2010