
{"id":478,"date":"2022-09-25T23:38:56","date_gmt":"2022-09-25T23:38:56","guid":{"rendered":"https:\/\/pages.charlotte.edu\/probability-seminar\/?p=478"},"modified":"2022-10-03T19:20:14","modified_gmt":"2022-10-03T19:20:14","slug":"fri-sept-30-2022-at-230pm-in-fretwell-379-math-conference-room","status":"publish","type":"post","link":"https:\/\/pages.charlotte.edu\/probability-seminar\/blog\/2022\/09\/25\/fri-sept-30-2022-at-230pm-in-fretwell-379-math-conference-room\/","title":{"rendered":"Fri Oct 7, 2022 at 2:30PM in Fretwell 379 (Math Conference Room)"},"content":{"rendered":"\n<p><a href=\"https:\/\/webpages.charlotte.edu\/imsonin\/\" data-type=\"URL\" data-id=\"https:\/\/webpages.charlotte.edu\/imsonin\/\">Isaac Sonin<\/a>, UNC Charlotte<\/p>\n\n\n\n<p><em>Title:&nbsp;<\/em>&nbsp;Locks-Bombs-Testing&nbsp;Model<\/p>\n\n\n\n<p><em>Abstract<\/em>: I will discuss a very general Defense\/Attack resource allocation model, where the Defender has some number of &#8220;locks&#8221; to protect&nbsp;n vulnerable boxes (sites), and the Attacker is trying to destroy these boxes, having some number of &#8220;bombs&#8221;, which can be placed into the boxes. Similar models were studied in game theory &#8211; e.g. (Colonel) Blotto games, but our model has a feature that is absent from the previous literature. Here, the Attacker tests the vulnerability of all sites before allocating her resources. These tests are not perfect and a test can give a positive result for a box without a lock and a negative result for a box with a lock. I will describe the full solution for several special cases and will discuss a possible approach to a solution for the general case. The only prerequisite for this talk is knowledge of the Total Probability formula and Bayes&#8217; formula.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Isaac Sonin, UNC Charlotte Title:&nbsp;&nbsp;Locks-Bombs-Testing&nbsp;Model Abstract: I will discuss a very general Defense\/Attack resource allocation model, where the Defender has some number of &#8220;locks&#8221; to protect&nbsp;n vulnerable boxes (sites), and the Attacker is trying to destroy these boxes, having some number of &#8220;bombs&#8221;, which can be placed into the boxes. Similar models were studied in [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-478","post","type-post","status-publish","format-standard","hentry","category-probability_seminar"],"_links":{"self":[{"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/posts\/478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/comments?post=478"}],"version-history":[{"count":2,"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/posts\/478\/revisions"}],"predecessor-version":[{"id":480,"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/posts\/478\/revisions\/480"}],"wp:attachment":[{"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/media?parent=478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/categories?post=478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pages.charlotte.edu\/probability-seminar\/wp-json\/wp\/v2\/tags?post=478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}