Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1838206.1838351acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

Planning against fictitious players in repeated normal form games

Published: 10 May 2010 Publication History

Abstract

Planning how to interact against bounded memory and unbounded memory learning opponents needs different treatment. Thus far, however, work in this area has shown how to design plans against bounded memory learning opponents, but no work has dealt with the unbounded memory case. This paper tackles this gap. In particular, we frame this as a planning problem using the framework of repeated matrix games, where the planner's objective is to compute the best exploiting sequence of actions against a learning opponent. The particular class of opponent we study uses a fictitious play process to update her beliefs, but the analysis generalizes to many forms of Bayesian learning agents.
Our analysis is inspired by Banerjee and Peng's AIM framework, which works for planning and learning against bounded memory opponents (e.g an adaptive player). Building on this, we show how an unbounded memory opponent (specifically a fictitious player) can also be modelled as a finite MDP and present a new efficient algorithm that can find a way to exploit the opponent by computing in polynomial time a sequence of play that can obtain a higher average reward than those obtained by playing a game theoretic (Nash or correlated) equilibrium.

References

[1]
M. Babes, E. Munoz de Cote, and M. L. Littman. Social reward shaping in the prisoner's dilemma. In Proceedings of the International Joint Conference on Autonomous Agents and Multi Agent Systems (AAMAS), pages 1389--1392, 2008.
[2]
B. Banerjee and J. Peng. Efficient learning of multi-step best response. In Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pages 60--66, The Netherlands, 2005. ACM.
[3]
G. Brown. Iterative solutions of games by fictitious play. Activity Analysis of Production and Allocation, pages 374--376, 1951.
[4]
D. Chakraborty and P. Stone. Online multiagent learning against memory bounded adversaries. In Proceedings of the 2008 European Conference on Machine Learning and Knowledge Discovery in Databases - Part I, pages 211--226, Antwerp, Belgium, 2008. Springer-Verlag.
[5]
Y.-H. Chang and L. P. Kaelbling. Playing is believing: the role of beliefs in multi-agent learning. In Advances in Neural Information Processing Systems (NIPS) 14, pages 1483--1490, 2001.
[6]
D. Fudenberg and J. Tirole. Game Theory. The MIT Press, Cambridge, MA, USA, 1991.
[7]
S. Hart and A. Mas-Colell. Uncoupled dynamics do not lead to nash equilibrium. American Economic Review, 93(5):1830--1836, December 2003.
[8]
D. A. Levin, Y. Peres, and E. L. Wilmer. Markov Chains and Mixing Times. American Mathematical Society, 2009.
[9]
M. L. Littman and P. Stone. Implicit Negotiation in Repeated Games, pages 393--404. LNCS. Springer, 2002.
[10]
L. Panait and S. Luke. Cooperativemulti-agent learning: The state of the art. Autonomous Agents and Multi-Agent Systems, 11(3):387--434, 2005.
[11]
M. L. Puterman. Markov Decision Processes---Discrete Stochastic Dynamic Programming. John Wiley & Sons, Inc., New York, NY, 1994.
[12]
C. J. Watkins and P. Dayan. Q-learning. Machine Learning, 8:279--292, 1992.
[13]
H. P. Young. The evolution of conventions. Econometrica, 61(1):57--84, Jan 1993.

Cited By

View all
  • (2017)Safely Using Predictions in General-Sum Normal Form GamesProceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems10.5555/3091125.3091257(924-932)Online publication date: 8-May-2017
  • (2017)An exploration strategy for non-stationary opponentsAutonomous Agents and Multi-Agent Systems10.1007/s10458-016-9347-331:5(971-1002)Online publication date: 1-Sep-2017
  • (2015)When security games go greenProceedings of the 24th International Conference on Artificial Intelligence10.5555/2832581.2832611(2589-2595)Online publication date: 25-Jul-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '10: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
May 2010
1578 pages
ISBN:9780982657119

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 10 May 2010

Check for updates

Author Tags

  1. MDPs
  2. fictitious play
  3. repeated games

Qualifiers

  • Research-article

Conference

AAMAS '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Safely Using Predictions in General-Sum Normal Form GamesProceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems10.5555/3091125.3091257(924-932)Online publication date: 8-May-2017
  • (2017)An exploration strategy for non-stationary opponentsAutonomous Agents and Multi-Agent Systems10.1007/s10458-016-9347-331:5(971-1002)Online publication date: 1-Sep-2017
  • (2015)When security games go greenProceedings of the 24th International Conference on Artificial Intelligence10.5555/2832581.2832611(2589-2595)Online publication date: 25-Jul-2015
  • (2015)Defender Strategies In Domains Involving Frequent Adversary InteractionProceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems10.5555/2772879.2773374(1663-1664)Online publication date: 4-May-2015
  • (2013)Ishikawa playProceedings of the 2013 international conference on Autonomous agents and multi-agent systems10.5555/2484920.2485020(627-634)Online publication date: 6-May-2013
  • (2010)EA2Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence10.5555/1860967.1861009(209-214)Online publication date: 4-Aug-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media