Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2022
Modeling opponent learning in multiagent repeated games
Applied Intelligence (KLU-APIN), Volume 53, Issue 13Pages 17194–17210https://doi.org/10.1007/s10489-022-04249-xAbstractMultiagent reinforcement learning (MARL) has been used extensively in the game environment. One of the main challenges in MARL is that the environment of the agent system is dynamic, and the other agents are also updating their strategies. ...
- research-articleJanuary 2022
Security Analysis of A Parasite Chain Attack in IOTA Based on Repeated Game
Procedia Computer Science (PROCS), Volume 202, Issue CPages 83–88https://doi.org/10.1016/j.procs.2022.04.012AbstractIOTA is widely used in the field of Internet of things, but it also produces a series of security problems which brings great security risks to IOTA. Starting from the perspective of parasite chain attack, we put forward the cost function of nodes ...
- research-articleOctober 2019
Modeling and Analysis of Factors Affecting Brainstorming
ICCSE'19: Proceedings of the 4th International Conference on Crowd Science and EngineeringPages 76–82https://doi.org/10.1145/3371238.3371251Brainstorming is a form of collective intelligence that excels in innovation activities and knowledge production. This article takes brainstorming as the starting point, explores the factors affecting group decision-making, and summarizes the modeling ...
- research-articleMay 2019
Equilibrium paths in discounted supergames
Discrete Applied Mathematics (DAMA), Volume 260, Issue CPages 1–27https://doi.org/10.1016/j.dam.2019.01.026AbstractThis paper examines the subgame-perfect pure-strategy equilibria in discounted supergames with perfect monitoring. It is shown that all the equilibrium paths are composed of fragments called elementary subpaths. This characterization ...
- research-articleMarch 2019
The method of mutual influence object getting along with two parties based on repetitive game control
Cluster Computing (KLU-CLUS), Volume 22, Issue 2Pages 4979–4987https://doi.org/10.1007/s10586-018-2449-8AbstractTo meet the goal of promoting the effectiveness of game analysis towards the governmental regulations and the rules and regulations for enterprise safety, a game analysis method of governmental regulations and the rules and regulations for ...
- research-articleMarch 2019
Repeated game analysis of power suppliers based on dynamic coopetition process and slightly altruistic factor
Cluster Computing (KLU-CLUS), Volume 22, Issue 2Pages 4075–4084https://doi.org/10.1007/s10586-017-1464-5AbstractIn this paper, based on repeated game theory, the dynamic coopetition game model between power supply enterprises is established to analyze the long-term equilibrium from a more practical point of view. The slightly altruistic factor is used as a ...
- research-articleNovember 2016
Codes of conduct, private information and repeated games
International Journal of Game Theory (IJGT), Volume 45, Issue 4Pages 971–984https://doi.org/10.1007/s00182-015-0498-2AbstractWe examine self-referential games in which there is a chance of understanding an opponent’s intentions. Even when this source of information is weak, we are able to prove a folk-like theorem for repeated self-referential games with private ...
- articleMay 2013
A repeated Bayesian auction game for cognitive radio spectrum sharing scheme
Computer Communications (COMS), Volume 36, Issue 8Pages 939–946https://doi.org/10.1016/j.comcom.2013.02.003Due to the remarkable growth in the number of users and the limited spectrum resource, an efficient spectrum sharing scheme is very important and has been an active area of research over the years. Auction model is a rich mathematical tool and widely ...
- research-articleFebruary 2013
Delayed perfect monitoring in repeated games
International Journal of Game Theory (IJGT), Volume 42, Issue 1Pages 283–294https://doi.org/10.1007/s00182-012-0349-3AbstractDelayed perfect monitoring in an infinitely repeated discounted game is studied. A player perfectly observes any other player’s action choice with a fixed and finite delay. The observational delays between different pairs of players are ...
- articleJanuary 2013
Computing Equilibria in Discounted 2 × 2 Supergames
Computational Economics (KLU-CSEM), Volume 41, Issue 1Pages 71–88https://doi.org/10.1007/s10614-011-9308-5This article examines the subgame perfect pure strategy equilibrium paths and payoff sets of discounted supergames with perfect monitoring. The main contribution is to provide methods for computing and tools for analyzing the equilibrium paths and ...
- articleOctober 2012
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks
Computer Communications (COMS), Volume 35, Issue 17Pages 2125–2137https://doi.org/10.1016/j.comcom.2012.07.006In multihop wireless networks (MWNs), the selective forwarding attack is a special case of denial of service attack. In this attack, the malicious wireless nodes only forward a subset of the received packets, but drop the others. This attack becomes more ...
- articleMarch 2011
An efficient reverse auction mechanism for limited supplier base
Electronic Commerce Research and Applications (ECRA), Volume 10, Issue 2Pages 170–182https://doi.org/10.1016/j.elerap.2009.11.002Reverse auction degrades the buyer-supplier relationship and decreases the suppliers' interest to participate in subsequent auctions. The effect is particularly severe in a limited supplier base. We propose a novel multi-attribute relationship-...
- articleNovember 2010
A game-based intrusion detection mechanism to confront internal attackers
Computers and Security (CSEC), Volume 29, Issue 8Pages 859–874https://doi.org/10.1016/j.cose.2010.06.002Insiders might threaten organizations' systems any time. By interacting with a system, an insider plays games with the security mechanisms employed to protect it. We apply game theory to model these interactions in an extensive form game that is being ...
- articleAugust 2010
Efficient wireless packet scheduling in a non-cooperative environment: Game theoretic analysis and algorithms
Journal of Parallel and Distributed Computing (JPDC), Volume 70, Issue 8Pages 790–799https://doi.org/10.1016/j.jpdc.2010.02.011In many practical scenarios, wireless devices are autonomous and thus, may exhibit non-cooperative behaviors due to self-interests. For instance, a wireless cellular device may be programmed to report bogus channel information to gain resource ...
- research-articleJuly 2010
The use of public randomization in discounted repeated games
International Journal of Game Theory (IJGT), Volume 39, Issue 3Pages 431–443https://doi.org/10.1007/s00182-009-0219-9AbstractThis paper presents an example where the set of subgame-perfect equilibrium payoffs of the infinitely repeated game without public randomization is not convex, no matter how large the discount factor is. Also, the set of pure-strategy equilibrium ...
- research-articleDecember 2006
Repeated Downsian electoral competition
International Journal of Game Theory (IJGT), Volume 35, Issue 1Pages 39–69https://doi.org/10.1007/s00182-006-0046-1AbstractWe analyze an infinitely repeated version of the Downsian model of elections. The folk theorem suggests that a wide range of policy paths can be supported by subgame perfect equilibria when parties and voters are sufficiently patient. We go ...
- research-articleFebruary 2002
A Necessary and Sufficient Condition for Approachability
Mathematics of Operations Research (MOOR), Volume 27, Issue 1Pages 31–44https://doi.org/10.1287/moor.27.1.31.333In the framework of two-person repeated games with vector payoffs, Blackwell defined the property of approachability and introduced a sufficient condition for it. He also proved that this condition is necessary in the case of convex sets.
We generalize ...