Search Materials
Sort materials by
Search Materials
Get more information on the MERLOT Editors' Choice Award in a new window.
Get more information on the MERLOT Classics Award in a new window.
Get more information on the JOLT Award in a new window.
Go to Search Page
Go to Partner Benefits
View material results for all disciplines
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
Please limit a note about this material to 2048 characters
A Bookmark with this title already existed.
Search all MERLOT
Select to go to your profile
Select to go to your workspace
Select to go to your Dashboard Report
Select to go to your Content Builder
Select to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
Select OK to launch help window
Cancel help

MERLOT II

Advanced Search





    

Refine Your Search:

 
Materials 111 - 120 shown of 1,411 results

Lecture 5 - Nash equilibrium: bad fashion and bank runs

This video was recorded at ECON 159 - Game Theory. We first define formally the new concept from last time: Nash... see more
Material Type: Presentation
Author: Benjamin Polak
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
User Rating for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
Member Comments for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
Bookmark Collections for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
Course ePortfolios for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
Learning Exercises for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
Accessibility Info for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
eTextbook Reviews for material titled "Lecture 5 - Nash equilibrium: bad fashion and bank runs"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Lecture 4 - Best responses in soccer and business partnerships

This video was recorded at ECON 159 - Game Theory. We continue the idea (from last time) of playing a best response to what... see more
Material Type: Presentation
Author: Benjamin Polak
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Lecture 4 - Best responses in soccer and business partnerships"
User Rating for material titled "Lecture 4 - Best responses in soccer and business partnerships"
Member Comments for material titled "Lecture 4 - Best responses in soccer and business partnerships"
Bookmark Collections for material titled "Lecture 4 - Best responses in soccer and business partnerships"
Course ePortfolios for material titled "Lecture 4 - Best responses in soccer and business partnerships"
Learning Exercises for material titled "Lecture 4 - Best responses in soccer and business partnerships"
Accessibility Info for material titled "Lecture 4 - Best responses in soccer and business partnerships"
eTextbook Reviews for material titled "Lecture 4 - Best responses in soccer and business partnerships"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Lecture 3 - Iterative deletion and the median-voter theorem

This video was recorded at ECON 159 - Game Theory. We apply the main idea from last time, iterative deletion of dominated... see more
Material Type: Presentation
Author: Benjamin Polak
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
User Rating for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
Member Comments for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
Bookmark Collections for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
Course ePortfolios for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
Learning Exercises for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
Accessibility Info for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
eTextbook Reviews for material titled "Lecture 3 - Iterative deletion and the median-voter theorem"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Lecture 2 - Putting yourselves into other people's shoes

This video was recorded at ECON 159 - Game Theory. At the start of the lecture, we introduce the "formal ingredients" of a... see more
Material Type: Presentation
Author: Benjamin Polak
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Lecture 2 - Putting yourselves into other people's shoes"
User Rating for material titled "Lecture 2 - Putting yourselves into other people's shoes"
Member Comments for material titled "Lecture 2 - Putting yourselves into other people's shoes"
Bookmark Collections for material titled "Lecture 2 - Putting yourselves into other people's shoes"
Course ePortfolios for material titled "Lecture 2 - Putting yourselves into other people's shoes"
Learning Exercises for material titled "Lecture 2 - Putting yourselves into other people's shoes"
Accessibility Info for material titled "Lecture 2 - Putting yourselves into other people's shoes"
eTextbook Reviews for material titled "Lecture 2 - Putting yourselves into other people's shoes"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Lecture 1 - Introduction to Game Theory: five first lessons

This video was recorded at ECON 159 - Game Theory. We introduce Game Theory by playing a game. We organize the game into... see more
Material Type: Presentation
Author: Benjamin Polak
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
User Rating for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
Member Comments for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
Bookmark Collections for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
Course ePortfolios for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
Learning Exercises for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
Accessibility Info for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
eTextbook Reviews for material titled "Lecture 1 - Introduction to Game Theory: five first lessons"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Connectivity Structure of Bipartite Graphs via the KNC-Plot

This video was recorded at First ACM International Conference on Web Search and Data Mining - WSDM 2008. WSDM (pronounced... see more
Material Type: Presentation
Author: Erik Vee
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
User Rating for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
Member Comments for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
Bookmark Collections for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
Course ePortfolios for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
Learning Exercises for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
Accessibility Info for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
eTextbook Reviews for material titled "Connectivity Structure of Bipartite Graphs via the KNC-Plot"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning

This video was recorded at Cognitive Systems Workshop & Thematic Programmes and Pump Priming Workshops, Cumberland Lodge... see more
Material Type: Presentation
Author: Mark Herbster
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
User Rating for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
Member Comments for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
Bookmark Collections for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
Course ePortfolios for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
Learning Exercises for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
Accessibility Info for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
eTextbook Reviews for material titled "Data-Dependent Geometries and Structures: Analyses and Algorithms for Machine Learning"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Detection of server side web attacks

This video was recorded at Workshop on Applications of Pattern Analysis (WAPA), Cumberland Lodge 2010. Pattern Analysis and... see more
Material Type: Presentation
Author: Igino Corona
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Detection of server side web attacks"
User Rating for material titled "Detection of server side web attacks"
Member Comments for material titled "Detection of server side web attacks"
Bookmark Collections for material titled "Detection of server side web attacks"
Course ePortfolios for material titled "Detection of server side web attacks"
Learning Exercises for material titled "Detection of server side web attacks"
Accessibility Info for material titled "Detection of server side web attacks"
eTextbook Reviews for material titled "Detection of server side web attacks"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Matematika v odkrivanju skrivnostne narave

This video was recorded at Ugriznimo znanost - Izobraževalna TV oddaja. V naravi je vse urejeno v pravilnih zaporedjih.... see more
Material Type: Presentation
Author: Miha Žorž, Boštjan Kuzman, Peter Legiša, Izidor Hafner, Phillip Ball
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Matematika v odkrivanju skrivnostne narave"
User Rating for material titled "Matematika v odkrivanju skrivnostne narave"
Member Comments for material titled "Matematika v odkrivanju skrivnostne narave"
Bookmark Collections for material titled "Matematika v odkrivanju skrivnostne narave"
Course ePortfolios for material titled "Matematika v odkrivanju skrivnostne narave"
Learning Exercises for material titled "Matematika v odkrivanju skrivnostne narave"
Accessibility Info for material titled "Matematika v odkrivanju skrivnostne narave"
eTextbook Reviews for material titled "Matematika v odkrivanju skrivnostne narave"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)

Game Theory for Security: Lessons learned from deployed applications

This video was recorded at 27th Conference on Uncertainty in Artificial Intelligence (UAI), Barcelona 2011. Security at... see more
Material Type: Presentation
Author: Milind Tambe, Christopher Kiekintveld
Date Added: Feb 10, 2015 Date Modified: Feb 10, 2015
Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
Name the Bookmark Collection to represent the materials you will add
Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time.
Edit the information about the material in this {0}
Submitting Bookmarks...
Peer Review for material titled "Game Theory for Security: Lessons learned from deployed applications"
User Rating for material titled "Game Theory for Security: Lessons learned from deployed applications"
Member Comments for material titled "Game Theory for Security: Lessons learned from deployed applications"
Bookmark Collections for material titled "Game Theory for Security: Lessons learned from deployed applications"
Course ePortfolios for material titled "Game Theory for Security: Lessons learned from deployed applications"
Learning Exercises for material titled "Game Theory for Security: Lessons learned from deployed applications"
Accessibility Info for material titled "Game Theory for Security: Lessons learned from deployed applications"
eTextbook Reviews for material titled "Game Theory for Security: Lessons learned from deployed applications"
About this material:
Reviewed by members of Editorial board for inclusion in MERLOT.
Editor Review (not reviewed)
User Rating (not rated)
Discussion (none)
Bookmark Collections (none)
Course ePortfolios (none)
Learning Exercises (none)
Accessibility Info (none)
RSS

Results page 12 of 142
Left Arrow  Prev 7  8  9  10  11  12  13  14  15  16  Next Next Arrow
Jump to page