z-logo
open-access-imgOpen Access
Non-Exploitable Protocols for Repeated Cake Cutting
Author(s) -
Omer Tamuz,
Shai Vardi,
Juba Ziani
Publication year - 2018
Publication title -
proceedings of the ... aaai conference on artificial intelligence
Language(s) - Uncategorized
Resource type - Journals
eISSN - 2374-3468
pISSN - 2159-5399
DOI - 10.1609/aaai.v32i1.11472
Subject(s) - protocol (science) , exploit , computer science , constant (computer programming) , contrast (vision) , mathematics , artificial intelligence , medicine , computer security , alternative medicine , pathology , programming language

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here