{"id":"https://openalex.org/W2091154629","doi":"https://doi.org/10.1109/isit.2014.6875125","title":"Optimality of non-adaptive strategies: The case of parallel games","display_name":"Optimality of non-adaptive strategies: The case of parallel games","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2091154629","doi":"https://doi.org/10.1109/isit.2014.6875125","mag":"2091154629"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2014.6875125","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875125","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053315559","display_name":"Gr\u00e9gory Demay","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Gregory Demay","raw_affiliation_strings":["Department of Computer Science, ETH Zurich, Switzerland","Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051578427","display_name":"Peter Ga\u017ei","orcid":"https://orcid.org/0000-0003-1572-3255"},"institutions":[{"id":"https://openalex.org/I157556583","display_name":"Institute of Science and Technology Austria","ror":"https://ror.org/03gnh5541","country_code":"AT","type":"education","lineage":["https://openalex.org/I157556583"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Peter Gazi","raw_affiliation_strings":["Institute of Science and Technology, Austria","Institute of Science and Technology [Austria]"],"affiliations":[{"raw_affiliation_string":"Institute of Science and Technology, Austria","institution_ids":["https://openalex.org/I157556583"]},{"raw_affiliation_string":"Institute of Science and Technology [Austria]","institution_ids":["https://openalex.org/I157556583"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064085132","display_name":"Ueli Maurer","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Ueli Maurer","raw_affiliation_strings":["Department of Computer Science, ETH Zurich, Switzerland","Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]},{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055191549","display_name":"Bj\u00f6rn Tackmann","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]},{"id":"https://openalex.org/I2799323385","display_name":"Board of the Swiss Federal Institutes of Technology","ror":"https://ror.org/01rvn4p91","country_code":"CH","type":"government","lineage":["https://openalex.org/I2799323385"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Bjorn Tackmann","raw_affiliation_strings":["Eidgenossische Technische Hochschule Zurich, Zurich, ZH, CH","Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Eidgenossische Technische Hochschule Zurich, Zurich, ZH, CH","institution_ids":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]},{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5053315559"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":0.409,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74928912,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1707","last_page":"1711"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.8016012907028198},{"id":"https://openalex.org/keywords/bounding-overwatch","display_name":"Bounding overwatch","score":0.7171202301979065},{"id":"https://openalex.org/keywords/equivalence","display_name":"Equivalence (formal languages)","score":0.674656331539154},{"id":"https://openalex.org/keywords/adaptive-strategies","display_name":"Adaptive strategies","score":0.5856596827507019},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5647308230400085},{"id":"https://openalex.org/keywords/strategy","display_name":"Strategy","score":0.49565207958221436},{"id":"https://openalex.org/keywords/repeated-game","display_name":"Repeated game","score":0.46933212876319885},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4314461648464203},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39400580525398254},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.38406985998153687},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.38316065073013306},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.38155797123908997},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.27202415466308594},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20372670888900757},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.1970319151878357},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1868813931941986}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.8016012907028198},{"id":"https://openalex.org/C63584917","wikidata":"https://www.wikidata.org/wiki/Q333286","display_name":"Bounding overwatch","level":2,"score":0.7171202301979065},{"id":"https://openalex.org/C2780069185","wikidata":"https://www.wikidata.org/wiki/Q7977945","display_name":"Equivalence (formal languages)","level":2,"score":0.674656331539154},{"id":"https://openalex.org/C167393769","wikidata":"https://www.wikidata.org/wiki/Q4680768","display_name":"Adaptive strategies","level":2,"score":0.5856596827507019},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5647308230400085},{"id":"https://openalex.org/C88959737","wikidata":"https://www.wikidata.org/wiki/Q1546627","display_name":"Strategy","level":3,"score":0.49565207958221436},{"id":"https://openalex.org/C202556891","wikidata":"https://www.wikidata.org/wiki/Q1584646","display_name":"Repeated game","level":3,"score":0.46933212876319885},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4314461648464203},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39400580525398254},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.38406985998153687},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.38316065073013306},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.38155797123908997},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.27202415466308594},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20372670888900757},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.1970319151878357},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1868813931941986},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2014.6875125","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2014.6875125","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Symposium on Information Theory","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1499934958","https://openalex.org/W1553792294","https://openalex.org/W1805451635","https://openalex.org/W1892798954","https://openalex.org/W2015780695","https://openalex.org/W2158554251","https://openalex.org/W2167606175","https://openalex.org/W2913555003","https://openalex.org/W4300349690","https://openalex.org/W6638278217"],"related_works":["https://openalex.org/W3121198132","https://openalex.org/W2734941633","https://openalex.org/W1643208677","https://openalex.org/W2391693198","https://openalex.org/W2208861692","https://openalex.org/W2910530315","https://openalex.org/W2132864390","https://openalex.org/W1501131054","https://openalex.org/W2917025599","https://openalex.org/W2166890307"],"abstract_inverted_index":{"Most":[0],"cryptographic":[1],"security":[2],"proofs":[3,16],"require":[4],"showing":[5],"that":[6,18,35,98,115],"two":[7,37,130],"systems":[8,38],"are":[9],"indistinguishable.":[10],"A":[11,87],"central":[12],"tool":[13],"in":[14,69,108,148],"such":[15,54,79],"is":[17,33,46,65,82,97,118,141,152],"of":[19,52,94,99,125,132,138],"a":[20,28,55,80,103,105],"game,":[21,56],"where":[22,73],"winning":[23,53,78],"the":[24,36,50,70,74,92,123,136],"game":[25,81],"means":[26],"provoking":[27,58],"certain":[29],"condition,":[30,60],"and":[31],"it":[32],"shown":[34],"considered":[39],"cannot":[40],"be":[41,85],"distinguished":[42],"unless":[43],"this":[44,59,111,116],"condition":[45],"provoked.":[47],"Upper":[48],"bounding":[49],"probability":[51],"i.e.,":[57],"for":[61,77,90],"an":[62],"arbitrary":[63],"strategy":[64,76],"usually":[66],"hard,":[67],"except":[68],"special":[71],"case":[72],"best":[75],"known":[83],"to":[84,102,121],"non-adaptive.":[86],"sufficient":[88],"criterion":[89,117],"ensuring":[91],"optimality":[93,124,137],"non-adaptive":[95,126,139],"strategies":[96,127,140],"conditional":[100,150],"equivalence":[101,151],"system,":[104],"notion":[106],"introduced":[107],"[1].":[109],"In":[110],"paper,":[112],"we":[113],"show":[114],"not":[119,142],"necessary":[120],"ensure":[122],"by":[128],"giving":[129],"results":[131],"independent":[133],"interest:":[134],"1)":[135],"preserved":[143,153],"under":[144,154],"parallel":[145,155],"composition;":[146],"2)":[147],"contrast,":[149],"composition.":[156]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
