Skip to main content

Showing 1–13 of 13 results for author: Rosenschein, J S

.
  1. arXiv:2405.01870  [pdf, other

    cs.MA cs.GT

    Detecting and Deterring Manipulation in a Cognitive Hierarchy

    Authors: Nitay Alon, Joseph M. Barnby, Stefan Sarkadi, Lion Schulz, Jeffrey S. Rosenschein, Peter Dayan

    Abstract: Social agents with finitely nested opponent models are vulnerable to manipulation by agents with deeper reasoning and more sophisticated opponent modelling. This imbalance, rooted in logic and the theory of recursive modelling frameworks, cannot be solved directly. We propose a computational framework, $\aleph$-IPOMDP, augmenting model-based RL agents' Bayesian inference with an anomaly detection… ▽ More

    Submitted 6 March, 2025; v1 submitted 3 May, 2024; originally announced May 2024.

    Comments: 11 pages, 5 figures

  2. arXiv:2207.00760  [pdf, other

    cs.SD cs.AI cs.LG eess.AS

    Unsupervised Symbolic Music Segmentation using Ensemble Temporal Prediction Errors

    Authors: Shahaf Bassan, Yossi Adi, Jeffrey S. Rosenschein

    Abstract: Symbolic music segmentation is the process of dividing symbolic melodies into smaller meaningful groups, such as melodic phrases. We proposed an unsupervised method for segmenting symbolic music. The proposed model is based on an ensemble of temporal prediction error models. During training, each model predicts the next token to identify musical phrase changes. While at test time, we perform a pea… ▽ More

    Submitted 2 July, 2022; originally announced July 2022.

  3. Reaching Consensus Under a Deadline

    Authors: Marina Bannikova, Lihi Dery, Svetlana Obraztsova, Zinovi Rabinovich, Jeffrey S. Rosenschein

    Abstract: Committee decisions are complicated by a deadline, e.g., the next start of a budget, or the beginning of a semester. In committee hiring decisions, it may be that if no candidate is supported by a strong majority, the default is to hire no one - an option that may cost dearly. As a result, committee members might prefer to agree on a reasonable, if not necessarily the best, candidate, to avoid unf… ▽ More

    Submitted 26 January, 2021; v1 submitted 17 May, 2019; originally announced May 2019.

    Journal ref: Autonomous Agents and Multi-Agent Systems, 35(1), 1-42 (2021)

  4. arXiv:1702.04138  [pdf, other

    cs.GT cs.MA

    Agent Failures in All-Pay Auctions

    Authors: Yoad Lewenberg, Omer Lev, Yoram Bachrach, Jeffrey S. Rosenschein

    Abstract: All-pay auctions, a common mechanism for various human and agent interactions, suffers, like many other mechanisms, from the possibility of players' failure to participate in the auction. We model such failures, and fully characterize equilibrium for this class of games, we present a symmetric equilibrium and show that under some conditions the equilibrium is unique. We reveal various properties o… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

    Journal ref: IEEE Intelligent Systems, 2017

  5. Acyclic Games and Iterative Voting

    Authors: Reshef Meir, Maria Polukarov, Jeffrey S. Rosenschein, Nicholas R. Jennings

    Abstract: We consider iterative voting models and position them within the general framework of acyclic games and game forms. More specifically, we classify convergence results based on the underlying assumptions on the agent scheduler (the order of players) and the action scheduler (which better-reply is played). Our main technical result is providing a complete picture of conditions for acyclicity in se… ▽ More

    Submitted 19 June, 2016; originally announced June 2016.

    Comments: some of the results appeared in preliminary versions of this paper: Convergence to Equilibrium of Plurality Voting, Meir et al., AAAI 2010; Strong and Weak Acyclicity in Iterative Voting, Meir, COMSOC 2016

  6. arXiv:1604.03632  [pdf, other

    cs.GT cs.AI cs.MA

    Strategyproof Peer Selection using Randomization, Partitioning, and Apportionment

    Authors: Haris Aziz, Omer Lev, Nicholas Mattei, Jeffrey S. Rosenschein, Toby Walsh

    Abstract: Peer reviews, evaluations, and selections are a fundamental aspect of modern science. Funding bodies the world over employ experts to review and select the best proposals from those submitted for funding. The problem of peer selection, however, is much more general: a professional society may want to give a subset of its members awards based on the opinions of all members; an instructor for a Mass… ▽ More

    Submitted 30 April, 2019; v1 submitted 12 April, 2016; originally announced April 2016.

    Comments: 1 Figure, Source Code available at https://github.com/nmattei/peerselection

    MSC Class: 91A80; 91B10; 91B12; 91B14; 68Q25 ACM Class: J.4; F.2; I.2

  7. arXiv:1408.0258  [pdf, ps, other

    cs.GT cs.MA

    The Pricing War Continues: On Competitive Multi-Item Pricing

    Authors: Omer Lev, Joel Oren, Craig Boutilier, Jeffery S. Rosenschein

    Abstract: We study a game with \emph{strategic} vendors who own multiple items and a single buyer with a submodular valuation function. The goal of the vendors is to maximize their revenue via pricing of the items, given that the buyer will buy the set of items that maximizes his net payoff. We show this game may not always have a pure Nash equilibrium, in contrast to previous results for the special case… ▽ More

    Submitted 1 August, 2014; originally announced August 2014.

  8. arXiv:1404.4688  [pdf, other

    cs.GT

    A Local-Dominance Theory of Voting Equilibria

    Authors: Reshef Meir, Omer Lev, Jeffrey S. Rosenschein

    Abstract: It is well known that no reasonable voting rule is strategyproof. Moreover, the common Plurality rule is particularly prone to strategic behavior of the voters and empirical studies show that people often vote strategically in practice. Multiple game-theoretic models have been proposed to better understand and predict such behavior and the outcomes it induces. However, these models often make unre… ▽ More

    Submitted 21 April, 2014; v1 submitted 18 April, 2014; originally announced April 2014.

  9. Sharing Rewards in Cooperative Connectivity Games

    Authors: Yoram Bachrach, Ely Porat Porat, Jeffrey S. Rosenschein

    Abstract: We consider how selfish agents are likely to share revenues derived from maintaining connectivity between important network servers. We model a network where a failure of one node may disrupt communication between other nodes as a cooperative game called the vertex Connectivity Game (CG). In this game, each agent owns a vertex, and controls all the edges going to and from that vertex. A coalition… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 47, pages 281-311, 2013

  10. arXiv:0907.4385  [pdf, ps, other

    cs.GT cs.AI cs.CC

    The Cost of Stability in Coalitional Games

    Authors: Yoram Bachrach, Edith Elkind, Reshef Meir, Dmitrii Pasechnik, Michael Zuckerman, Joerg Rothe, Jeffrey S. Rosenschein

    Abstract: A key question in cooperative game theory is that of coalitional stability, usually captured by the notion of the \emph{core}--the set of outcomes such that no subgroup of players has an incentive to deviate. However, some coalitional games have empty cores, and any outcome in such a game is unstable. In this paper, we investigate the possibility of stabilizing a coalitional game by using exte… ▽ More

    Submitted 24 July, 2009; originally announced July 2009.

    Comments: 20 pages; will be presented at SAGT'09

    ACM Class: F.2.2; G.1.6; I.2.8

    Journal ref: Proceedings of SAGT 2009, LNCS, 5814, 122-134

  11. arXiv:cs/0701139  [pdf, ps, other

    cs.GT cs.AI

    Time and the Prisoner's Dilemma

    Authors: Yishay Mor, Jeffrey S. Rosenschein

    Abstract: This paper examines the integration of computational complexity into game theoretic models. The example focused on is the Prisoner's Dilemma, repeated for a finite length of time. We show that a minimal bound on the players' computational ability is sufficient to enable cooperative behavior. In addition, a variant of the repeated Prisoner's Dilemma game is suggested, in which players have the… ▽ More

    Submitted 22 January, 2007; originally announced January 2007.

    Comments: Proceedings of the First International Conference on Multiagent Systems (ICMAS95), : 276-282, 1995

  12. arXiv:cs/0203021  [pdf, ps, other

    cs.AI cs.MA

    NetNeg: A Connectionist-Agent Integrated System for Representing Musical Knowledge

    Authors: Claudia V. Goldman, Dan Gang, Jeffrey S. Rosenschein, Daniel Lehmann

    Abstract: The system presented here shows the feasibility of modeling the knowledge involved in a complex musical activity by integrating sub-symbolic and symbolic processes. This research focuses on the question of whether there is any advantage in integrating a neural network together with a distributed artificial intelligence approach within the music domain. The primary purpose of our work is to desig… ▽ More

    Submitted 17 March, 2002; originally announced March 2002.

    Comments: 21 pages, 3 figures, Preliminary versions presented at International Computer Music Conference, pp. 133-140, Hong Kong (China), August 1996 and AAAI Spring Symposium, 1999

    ACM Class: I.2.6; J.5

    Journal ref: Annals of Mathematics and Artificial Intelligence, 25 (1999) pp. 69-90

  13. arXiv:cs/9610101  [pdf, ps

    cs.AI

    Mechanisms for Automated Negotiation in State Oriented Domains

    Authors: G. Zlotkin, J. S. Rosenschein

    Abstract: This paper lays part of the groundwork for a domain theory of negotiation, that is, a way of classifying interactions so that it is clear, given a domain, which negotiation mechanisms and strategies are appropriate. We define State Oriented Domains, a general category of interaction. Necessary and sufficient conditions for cooperation are outlined. We use the notion of worth in an altered defini… ▽ More

    Submitted 30 September, 1996; originally announced October 1996.

    Comments: See http://www.jair.org/ for any accompanying files

    Journal ref: Journal of Artificial Intelligence Research, Vol 5, (1996), 163-238