© 2022 Massachusetts Institute of Technology.

Recent Submissions

  • What is cybersecurity? Explorations in automated knowledge generation 

    Choucri, Nazli; Elbait, Gihan Daw; Madnick, Stuart E. (© Massachusetts Institute of Technology, 2012-11-06)
    This paper addresses a serious impediment to theory and policy for cybersecurity: Trivial as it might appear on the surface, there is no agreed upon understanding of the issue, no formal definition, and not even a consensus ...
  • Knightian auctions 

    Chiesa, Alessandro; Micali, Silvio; Zhu, Zeyuan Allen (© Massachusetts Institute of Technology, 2012-01-10)
    We study single-good auctions in a setting where each player knows his own valuation only within a constant multiplicative factor δ ∈ (0, 1), and the mech- anism designer knows δ. The classical notions of implementation ...
  • Possibilistic beliefs and higher-level rationality 

    Chen, Jing; Micali, Silvio; Pass, Rafael (© Massachusetts Institute of Technology, 2014-06-09)
    We consider rationality and rationalizability for normal-form games of incomplete information in which the players have possibilistic beliefs about their opponents. In this setting, we prove that the strategies compatible ...

View more