272 results on '"game-theory"'
Search Results
2. Challenges of reproducible AI in biomedical data science.
- Author
-
Han, Henry
- Subjects
- *
GOAL (Psychology) , *MEDICAL sciences , *ARTIFICIAL intelligence , *DATA science , *RESEARCH personnel - Abstract
Artificial intelligence (AI) is revolutionizing biomedical data science at an unprecedented pace, transforming various aspects of the field with remarkable speed and depth. However, a critical issue remains unclear: how reproducible are the AI models and systems employed in biomedical data science? In this study, we examine the challenges of AI reproducibility by analyzing the factors influenced by data, model, and learning complexities, as well as through a game-theoretical perspective. While adherence to reproducibility standards is essential for the long-term advancement of AI, the conflict between following these standards and aligning with researchers' personal goals remains a significant hurdle in achieving AI reproducibility. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
3. Branding fashion through gameplay: the branded gaming and the cool dynamics in the fashion markets. A game-theory approach
- Author
-
Alanadoly, Alshaimaa Bahgat and Salem, Suha Fouad
- Published
- 2024
- Full Text
- View/download PDF
4. Branding fashion through gameplay: the branded gaming and the cool dynamics in the fashion markets. A game-theory approach
- Author
-
Alshaimaa Bahgat Alanadoly and Suha Fouad Salem
- Subjects
Game-theory ,Asia–Pacific ,Brand coolness ,Brand equity ,In-game advertising ,Advergames ,Business ,HF5001-6182 ,Finance ,HG1-9999 - Abstract
Purpose – The aim of this study was to investigate the role of immersive gaming on brand coolness and brand equity, with particular emphasis on fashion gaming collaborations. We used game theory as a theoretical framework to analyse immersive branding strategies and gain a deeper understanding of fashion consumers’ decision-making process in gaming environments. Gender, as a significant factor affecting gamers, has been studied as a moderator that impacts the overall proposed framework. Design/methodology/approach – A quantitative method was used to assess the significance of relationships within the proposed model empirically. The partial least squares structural equation modelling technique was implemented to assess the relationships of the framework with a sample size of 160 active Malaysian gamers. Findings – The findings indicate that brand equity is positively associated with perceived brand coolness. Furthermore, of the three core values of online games, perceived enjoyment is most strongly associated with perceived brand coolness, ahead of the values of self-expression and perceived emotional challenge. The results of the multigroup analysis further suggest that in the fashion industry, building brand equity through online games is strongly related to perceived brand coolness among female respondents, the role of perceived brand coolness being weaker among male respondents. Originality/value – The study contributes to the existing literature by providing a deeper understanding of the impact of immersive gaming branding practices on the overall equity of the fashion brand. The results provide insight for fashion brand managers into the significant effect on consumer behaviour outcomes of fashion-gaming collaborations. 研究目的 – 本研究擬探討身歷其境的遊戲體驗在品牌酷感和品牌資產上所扮演的角色; 研究特別強調裝扮遊戲的合作。研究人員以博弈論作為研究的理論框架,來分析沉浸品牌策略、和對時裝消費者在遊戲的環境中如何作出決策取得更深入的瞭解。研究人員探討了性別作為影響遊戲參與者的重要因素,這因素被視為為整個被提出的框架帶來調節的影響和作用。 研究設計/方法/理念 – 研究人員採用定量方法進行研究,目的為於被提出的模型內之各種關聯的意義進行以經驗為依據的評估。研究人員採用了基於偏最小平方法的結構方程模型研究法,來對一個包含160名活躍的馬來西亞遊戲參與者的樣本進行框架的各個聯繫的評估研究。 研究結果 – 研究結果顯示,品牌資產與品牌酷感成正相關; 而且,在網絡遊戲的三個核心價值中,感知享受與品牌酷感之間的聯繫最為強烈和密切,超過自我表現和感知情感挑戰兩者的價值; 多群組的分析結果更暗示了在時裝產業裡,透過網絡遊戲去建立品牌資產在女性回應者中是與品牌酷感有強烈密切的關係; 而在男性回應者中,品牌酷感所扮演的角色則較弱。 研究的原創性/價值 – 本研究使我們能更深入認識沉浸遊戲品牌的慣常做法如何影響時裝品牌的整體資產。研究結果為時裝品牌經理提供了啟示,使他們明瞭時裝遊戲的合作會給消費者行為產生重要的影響。
- Published
- 2024
- Full Text
- View/download PDF
5. Insuperable Strategies in Two-Player and Reducible Multi-Player Games: Insuperable Strategies in Two-Player and Reducible Multi-Player Games
- Author
-
Chalub, Fabio A. C. C. and Souza, Max O.
- Published
- 2025
- Full Text
- View/download PDF
6. Game-Theoretic Approach to Managing the Composition and Structure of a Bearing-Only Measurement System in Conditions of a priori Uncertainty.
- Author
-
Ugolnickiy, G. A. and Chepel, E. N.
- Abstract
The problem of managing the composition and structure of a bearing-only measurement system (BOMS) in a game-theoretic formulation is considered. An approach for a cooperative search for the placement of BOMS points and a method for estimating the work-time indicator of the system are proposed. The search for the placement of BOMS points uses the toolkit of multiagent potential games. The criteria for selecting the placement of points and the type of potential function are determined. The management of the composition and structure of the BOMS is based on the results of the cluster-variation method (CVM). A structural and functional description of the simulation model is presented. The presented results of simulation modeling confirm the practical effectiveness of the proposed approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Optimal Control of Endemic Epidemic Diseases With Behavioral Response
- Author
-
Francesco Parino, Lorenzo Zino, and Alessandro Rizzo
- Subjects
Epidemics ,game-theory ,nonlinear control systems ,optimal control ,Control engineering systems. Automatic machinery (General) ,TJ212-225 ,Technology - Abstract
Behavioral factors play a crucial role in the emergence, spread, and containment of human diseases, significantly influencing the effectiveness of intervention measures. However, the integration of such factors into epidemic models is still limited, hindering the possibility of understanding how to optimally design interventions to mitigate epidemic outbreaks in real life. This paper aims to fill in this gap. In particular, we propose a parsimonious model that couples an epidemic compartmental model with a population game that captures the behavioral response, obtaining a nonlinear system of ordinary differential equations. Grounded on prevalence-elastic behavior—the empirically proven assumption that the disease prevalence affects the adherence to self-protective behavior—we consider a nontrivial negative feedback between contagions and adoption of self-protective behavior. We characterize the asymptotic behavior of the system, establishing conditions under which the disease is quickly eradicated or a global convergence to an endemic equilibrium is attained. In addition, we elucidate how the behavioral response affects the endemic equilibrium. Then, we formulate and solve an optimal control problem to plan cost-effective interventions for the model, accounting for their healthcare and social-economical implications. Numerical simulations on a case study calibrated on sexually transmitted diseases demonstrate and validate our findings.
- Published
- 2024
- Full Text
- View/download PDF
8. St-Hot: A Prospect of Price Equilibrium in a Multi-Player Game for Electric Vehicle Charging Application
- Author
-
Ajay Kumar Gupta and Manav R. Bhatnagar
- Subjects
Charging station ,competition ,electric vehicle ,game-theory ,Hotelling’s law ,Nash equilibrium (NE) ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This article studies a game theory-based pricing competition among multiple non-cooperative electric vehicle charging stations (EVCS) that seek to maximize expected profit. In contrast, electric vehicle (EV) drivers aim to minimize charging costs. In this regard, we introduce a modified game setup that alleviates the limitations of a conventional Hotelling’s game (CHG) application to achieve the price equilibrium among multiple non-cooperative players in a discrete dynamic market. In a CHG, it is assumed that each player has a positive market share. However, a CHG provides positive utilities to all players at Nash equilibrium (NE) only if they choose prices that satisfy the market sharing condition (MSC). The NE price depends on the players’ locations. Therefore, positive utilities can be achieved only if the players’ locations are confined such that the resultant NE price satisfies the MSC. The proposed game is called the St-Hot (Stackelberg-Hotelling), which can be applied to achieve the price equilibrium for those locations of players where the CHG fails to satisfy the MSC. The proposed game is applied in an EV charging environment, wherein multiple competitive EVCSs are placed at strategic locations in a linear space. The equilibrium condition is analyzed using closed-form solutions, and the results are compared with the existing CHG model. The analysis reveals that every EVCS remains profitable in a competitive market, irrespective of their location. This demonstrates that the proposed game model ensures profitability for each EVCS, showcasing its superiority over CHG.
- Published
- 2024
- Full Text
- View/download PDF
9. A game theoretic decision-making approach for fast gradient sign attacks.
- Author
-
Lung, Rodica Ioana
- Subjects
IMAGE recognition (Computer vision) ,DECISION making ,GAMES ,PIXELS - Abstract
In generating adversarial examples, a trade-off problem is always present, as the attacker aims to deceive the classifier in the most subtle way possible in order not to be uncovered. Trade-offs among different objectives can be tackled in many ways, among the most popular ones is to consider several objectives and further select among optimal ones based on some criteria. In this paper, a game theoretic approach to setting the magnitude of adversarial examples for a fast gradient sign model for image classification is proposed. The model controls the size of the pixel change and the number of randomly chosen pixels to be modified. A solution of the game indicates optimal trade-offs between the values. Numerical examples are used to illustrate the approach. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. A game-theoretic approach to assess peer-to-peer rooftop solar PV electricity trading under constrained power supply.
- Author
-
Krayem, Alaa, Ahmad, Ali, and Najem, Sara
- Abstract
The integration of distributed energy resources and the transition to smart cities are shifting the urban energy sector to a decentralized operating system. Blockchain-based microgrids, where small-scale operators trade electricity among each others, have gained remarkable attention recently. However, most of the proposed schemes study smart grids in prosperous cities. In this study, the performance of a solar-based power trading scheme is investigated in a shortage-prone context, Beirut City. Thus, we resort to a game-theoretic approach to model power trading as a repeated game between buildings at the urban scale. Results show that solar energy can cover up to 25% of the city electricity needs, depending on the rooftops area coverage. On the other hand, we found that deploying a peer-to-peer trading scheme has marginal impact since the energy demand in the city exceeds the supply and most buildings would prioritize self-consumption. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
11. Study on Tailings Risk Assessment Method Based on Combination Weighting-Cloud Model.
- Author
-
HUANG Deyong, LIU Sunzheng, GAO Cong, LYU Shiwei, JIA Ziyue, and LI Mingjian
- Subjects
- *
INVESTMENT risk , *RISK assessment , *SYSTEMS theory , *WEIGHING instruments , *MODEL theory , *MAXIMUM principles (Mathematics) - Abstract
The risk evaluation of tailing ponds is characterized by randomness, fuzziness and numerous uncertainties in the evaluation process. In order to effectively guarantee the operational safety of tailing ponds, a tailing pond risk evaluation method based on a combined assignment-cloud model is proposed. From a system analysis perspective, this paper applies the physical-substance-human-reason (WSR) system theory to explore the factors affecting the safe operation of tailings ponds from three aspects; subject factors, object factors and organisational forms, and constructs a WSR-based tailings pond risk evaluation index system. Secondly, the improved G1 method and CRITIC method are used to assign subjective and objective weights to the evaluation indicators respectively, and the game theory algorithm calculates the combination coefficients with the best weights to derive the combination weights. Finally, the cloud model theory is combined to calculate the relative affiliation and comprehensive characteristic value of each indicator, and the risk level is classified based on the principle of maximum affiliation, and the visualisation effect is presented in the form of a cloud chart. The evaluation method is validated using a tailings pond in Yunnan Province as an example, and the results are consistent with the actual situation, and compared with unknown measures and other methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Game theory-based performance assessment of police personnel.
- Author
-
Ahanger, Tariq Ahamed, Bhatia, Munish, and Aldaej, Abdulaziz
- Abstract
Innovations in the Internet of Things (IoT) technology have revolutionized several industrial domains for smart decision-modeling. The capacity to perceive data about ubiquitous instances has resulted in numerous innovations in sensitive sectors like national security, and police departments. In this paper, an extensive IoT-based framework is introduced for assessing the integrity of police personnel based on his/her performance. The work introduced in this research is centered around analyzing several activities of police personnel to assess his/her integral behavior. In particular, the Probabilistic Measure of Integrity (PMI) is formalized based on professional data analysis for classification based on Bayesian Model. Moreover, the 2-player game model has been presented to assess the performance of police personnel for efficient decision-making. For validation purposes, the presented framework is deployed over challenging datasets acquired from the online repository of UCI. Based on the comparative analysis with the state-of-the-art decision-making models, the presented approach has registered enhanced performance in terms of Temporal Delay, Classification, Prediction, Reliability, and Stability. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. A game-theoretic approach for power pricing in a resilient supply chain considering a dual channel biorefining structure and the hybrid power plant.
- Author
-
Rajabzadeh, Hamed and Babazadeh, Reza
- Subjects
- *
HYBRID power , *SUPPLY chains , *PRICES , *POWER plants , *FOSSIL fuels , *FRACTIONAL powers - Abstract
This study investigates power pricing decisions in a resilient supply chain, including the main biomass supplier, biorefinery, the hybrid power plant, and the backup supplier. The power plant's main fuel is considered biofuel derived from Jatropha Curcas L. (JCL). However, due to unavoidable uncertainties in biofuel supply links, the shortage in meeting demand is inevitable. Therefore, for increasing the supply chain's resiliency, the fossil fuel backup supplier is taken into account to make up the shortage with anticipated fossil fuel. Due to environmental concerns, the penalty cost is considered for excessive use of fossil fuel. The model is studied under two cases by considering a dual-channel biorefining. Different game-theoretic models are established for varied power configurations and interactions of supply chain members. It is observed from the numerical study that, depending on the fractional part of the power plant's requirements of biofuel and JCL supplied by the biorefinery (Case 1) and the main supplier (Case 2), respectively the performance of the supply chain increases in the presence of the backup supplier. Additionally, the sensitivity analysis shows that Case 1 is more profitable than Case 2 for chain members. Moreover, in contrast to the fossil fuel replacement coefficient, the greater the convertibility degree of the JCL, the larger the profits for the members. • Studying the power pricing decisions in a resilient supply chain. • Considering backup supplier for a hybrid biofuel-fossil fuel power plant. • Applying game-theoretic model for choosing the best supply chain structure. • Conducting numerical study and performing sensitivity analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
14. To cooperate, or not to cooperate, that is the question. Strategic analysis for the implementation of industrial symbiosis.
- Author
-
Mollica, Melissa, Fraccascia, Luca, and Nastasi, Alberto
- Abstract
The lack of adequate support in strategic decision-making hampers the widespread of industrial symbiosis (IS). Although various business models for IS are available, existing literature focuses solely on cooperation between waste producers and waste users to replace primary inputs with waste. This paper proposes a strategic analysis for waste producers introducing IS, comparing the traditional cooperative approach with a competitive new product development strategy. Using a game-theoretical model, a third hybrid strategy is defined. The paper examines the impact of market characteristics, investment requirements, IS costs, and primary input purchase costs on the strategic choices of waste producers, providing insights for managers and decision-makers. Results suggest that the characteristics of the market where to enter significantly affect the final strategic behavior. Specifically, the main strategic discriminating factors are the market size, the consumers' willingness to pay, and the investment extent. • The literature focuses on cooperative approaches toward industrial symbiosis. • Waste producers can cooperate with symbiotic partners or compete with them. • The strategic choice of a waste producer is analyzed with a game-theoretical model. • Market characteristics and investment extent are the main strategic drivers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. On the Role of Ad Networks: To Endogenize or Not to Endogenize the Number of Bidders in Auctions?
- Author
-
Pahwa, Parneet
- Subjects
AUCTIONS ,INTERNET advertising ,INTERNET auctions ,BIDDERS ,MONETARY incentives ,DISPLAY advertising ,ADVERTISING - Abstract
In the world of online advertising, demand for banner slots by advertisers is matched with the inventory available at different publishers by an intermediary (Ad Network or an Exchange). One important feature of auctions in the online advertising space is that publishers typically have multiple slots and advertisers are not necessarily interested in purchasing one unit but are rather interested in purchasing thousands of impressions. Furthermore, an ad network may have different types of publishers with varying quality of advertising space available. Consequently, bidders may value slots in one set of publishers very differently from slots in a different set. For instance, firms selling financial products and services may value slots at CNN.com's financial section or WSJ.com very differently from slots available at people.com or even the weather section in CNN.com. So, the dilemma confronting an ad network that has inventory from different publishers, facing demand from say, advertisers selling financial products is whether to pool the inventory and conduct a single auction or conduct separate auctions so that the advertisers know that they are bidding for slots on CNN.com's financial section or on WSJ.com and not for slots on the weather section on CNN.com or some other less preferred slots. Given the critical role that ad networks play, in serving the request of advertisers to get their advertising banners displayed in online media we examine the economic incentives of these intermediaries to derive implications for the optimal market design. More specifically, we seek answers to the following questions. Given the variation in the quality of inventory available from different publishers under what market conditions should the intermediary pool the inventory across the different publishers and conduct a single (undisclosed) auction and when would it be more profitable to conduct different (disclosed) auctions? Given a fixed number of bidders, if the intermediary chooses to conduct two auctions how many bidders should be allocated to each auction and how do market parameters such as the number of bidders or the inventory available of each type affect the allocation rule. Finally, if the intermediary chooses to conduct two auctions should they charge the same commission or different commissions in each auction? We find that when the number of advertisers is small then pooling inventory and conducting a single auction is the optimal strategy. Under these conditions when the inventory of the publishers is sufficiently differentiated it may even be optimal for the intermediary to conduct a single auction but ignore the inventory of the publisher that is valued lower. When the number of advertisers is large, we find very interestingly that conducting multiple auctions is not always optimal. Indeed, when the inventory of publishers is sufficiently differentiated conducting a single auction and ignoring the inventory of the publisher that is valued lower can still be optimal. We also identify market conditions when conducting two auctions and charging a single commission in both markets is more profitable than conducting two auctions and charging separate commissions (and vice versa). [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
16. Artificial Neural Network Controller in Two-Area and Five-Area System with Security Attack and Game-Theory Based Defender Action.
- Author
-
Khadarvali, S., Madhusudhan, V., and Kiranmayi, R.
- Subjects
- *
PHASOR measurement , *SECURITY systems , *ARTIFICIAL neural networks , *WIRELESS Internet , *ELECTRICAL load , *GRIDS (Cartography) - Abstract
Smart grids are the latest technology to generate and dispatch an optimal amount of power. Thus, there is a need for stability analysis in smart grid systems. If the smart grid is incorporated into the power system, then the phasor measurement unit (PMU) is used to measure the voltage, current, and frequency. Additionally, the central control unit monitors and controls the power. However, there is a possibility of inserting wrong data into the smart grid as the PMUs are transmitting the data through the Internet and other wireless protocols. There is a need to find solutions to this threat to make the power flow safe and secure in the future. In this paper, two-area load frequency control (LFC) is used for testing the game-theory based security treatment and improving the system's stability by using an artificial neural network. The two-area system and five-area system are used to test the stability of the power system. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. A quantitative analysis of risk-sharing agreements with patient support programs for improving medication adherence.
- Author
-
Zhang, Hui, Huang, Tao, and Yan, Tao
- Abstract
Medication adherence is a challenge for patients, drugmakers, and payers. To promote adherence, some payers adopt a form of pay-for-success value-based risk-sharing agreements. Drugmakers reduce prices for meaningful improvement in adherence and share patient information and resources with payers; as a return, payers run patient support programs and put drugs on a tier with lower copays. We use a game-theoretic approach to investigate the optimal program effect and the optimal prices with and without improvement in adherence, measured by Proportion of Days Covered, under such an agreement. Since negotiation power impacts how prices are determined, we consider several pricing settings: the payer or the drugmaker sets both prices or sets one price simultaneously or sequentially. Although a discount for improved adherence tends to promote adherence, it may not always be achievable nor guarantees better adherence. The drugmaker with strong negotiation power can align its interest with social welfare but the payer may not. The payer with strong negotiation power can improve more adherence than the drugmaker. Balanced negotiation power contributes either the most or the least to adherence depending on contract form and decision sequence. Although cost-sharing by the drugmaker expects to increase program efforts, it may not be true. We find that the policymaker prefers different levels of cost-sharing under different pricing settings. The payer may have a first-mover advantage when setting the price without improved adherence; the drugmaker, however, does not have such an advantage. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. Essays in game theory and bankruptcy
- Author
-
Aslan, Ercan, Thomas, Jonathan, and Kawamura, Kohei
- Subjects
330.01 ,elimination ,iterative elimination ,proportional division ,PROP ,union-consistency ,bankruptcy ,risk-averse investors ,game-theory - Abstract
In Chapter 1 I study the iterative strategy elimination mechanisms for normal form games. The literature is mostly clustered around the order of elimination. The conventional elimination also requires more strict knowledge assumptions if the elimination is iterative. I define an elimination process which requires weaker rationality. I establish some preliminary results suggesting that my mechanism is order independent whenever iterative elimination of weakly dominated strategies (IEWDS) is so. I also specify conditions under which the \undercutting problem" occurs. Comparison of other elimination mechanisms in the literature (Iterated Weak Strategy Elimination, Iterated Strict Strategy Elimination, Generalized Strategy Eliminability Criterion, RBEU, Dekel-Fudenberg Procedure, Asheim- Dufwenberg Procedure) and mine is also studied to some extent. In Chapter 2 I study the axiomatic characterization of a well-known bankruptcy rule: Proportional Division (PROP). The rule allocates shares proportional to agents' claims and hence, is intuitive according to many authors. I give supporting evidence to this opinion by first defining a new type of consistency requirement, i.e. union-consistency and showing that PROP is the only rule that satisfies anonymity, continuity and union-consistency. Note that anonymity and continuity are very general requirements and satisfied by almost all the rules that have been studied in this literature. Thus, I prove that we can choose a unique rule among them by only requiring union-consistency. Then, I define a bankruptcy operator and give some intuition on it. A bankruptcy operator is a mapping from the set of bankruptcy operators to itself. I prove that any rule will converge to PROP under this operator as the claims increase. I show nice characteristics of the operator some of which are related to PROP. I also give a definition for continuity of an operator. In Chapter 3 investigate risk-averse investors' behaviour towards a risky firm. In order to find Pareto Optimal allocations regarding a joint venture, I employ a 2-stage game, first stage of which involves a social-planner committing to an ex-post bankruptcy rule. A bankruptcy rule is a set of suggestions for solving each possible bankruptcy problem. A bankruptcy problem occurs when there is not enough endowment to allocate to the agents each of whom has a claim on it. I devise the game-theoretic approach posed in K1br1s and K1br1s (2013) and extend it further. In fact, that paper considers a comparison among 4 renowned bankruptcy rules whereas mine do not restrict attention to any particular rule but rather aim to find a Pareto Optimal(PO) one. I start with 2 agent case in order to give some insight to the reader and then, generalise the results to an arbitrary number of investors. I find socially desirable (PO) allocations and show that the same can be achieved through financial markets by the help of some well-known results.
- Published
- 2016
19. EDGly: detection of influential nodes using game theory.
- Author
-
Jain, Minni, Jaswani, Aman, Mehra, Ankita, and Mudgal, Laqshay
- Subjects
GAME theory ,SOCIAL networks ,INFECTIOUS disease transmission ,CENTRALITY ,ELECTRONIC data processing - Abstract
Identifying those nodes that play a critical role within a network is of great importance. Many applications such as gossip spreading, disease spreading, news dispersion, identifying prominent individuals in a social network, etc. may take advantage of this knowledge in a complex network. The basic concept is generally to identify the nodes with the highest criticality in a network. As a result, the centrality principle has been studied extensively and in great detail, focusing on creating a consistent and accurate location of nodes within a network in terms of their importance. Both single centrality measures and group centrality measures, although, have their certain drawbacks. Other solutions to this problem include the game-theoretic Shapley Value (SV) calculations measuring the effect of a collection of nodes in complex networks via dynamic network data propagation process. Our novel proposed algorithm aims to find the most significant communities in a graph with community structure and then employs the SV-based games to find the most influential node from each community. A Susceptible-Infected-Recovered (SIR) model has been employed to distinctly determine each powerful node's capacity to spread. The results of the SIR simulation have also been used to show the contrast between the spreading capacity of nodes found through our proposed algorithm and that of nodes found using SV-algorithm and centrality measures alone. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. APPLICATIONS OF GAME- THEORY IN ACTIVE STRATEGIC PORTFOLIO MANAGEMENT- THE CASE OF HEDGE - FUNDS ADAPTATION FOR THE REAL CONSTRAINTS IN ROMANIAN CAPITAL MARKET.
- Author
-
VRĂJITORU, Eugen-Silviu, BOSCOIANU, Mircea, and BOSCOIANU, Elena-Corina
- Subjects
GAME theory ,HEDGE funds ,PORTFOLIO management (Investments) ,CAPITAL market ,COVID-19 pandemic ,ECONOMIC activity - Published
- 2021
- Full Text
- View/download PDF
21. To Discount or Not to Discount: A GameTheoretic Analysis of the Pricing and Survival Dilemma in Luxury E-commerce.
- Author
-
Zhang, Yingxin, Gupta, Shubham, Kumar, Subodha, and Hu, Xiangpei
- Abstract
Selling conspicuous products online is challenging for both brands (brands) and thirdparty e-commerce platforms (platforms). For brands, the trade-off between offering online discount and maintaining high-end brand image gives no easy answer, which leads to wide application of Minimum Advertised Pricing (MAP) policy to restrain their retailers. For platforms, lack of authority in controlling prices leaves them in a struggling-to-survive situation. Platforms could resort to Platform Discount promotion only when brands agree to participate. This interaction between MAP policy and platform discount, even though it is crucial for conspicuous brands and platforms, has not been studied in the current literature. To fill this gap, we analyze interaction between the brands and third-party e-commerce platforms using a game-theoretic model. [ABSTRACT FROM AUTHOR]
- Published
- 2021
22. Handling hierarchy in cloud data centers: A Hyper-Heuristic approach for resource contention and energy-aware Virtual Machine management.
- Author
-
Zhang, Jiayin, Yu, Huiqun, Fan, Guisheng, Li, Zengpeng, Xu, Jin, and Li, Jun
- Subjects
- *
VIRTUAL machine systems , *SERVER farms (Computer network management) , *EVIDENCE gaps , *HYPERVISOR (Computer software) , *POWER resources , *ENERGY consumption - Abstract
For cloud data centers, a performant yet energy-efficient operation is critical for service quality and experience. The growing demand for cloud-based services has led to the development of large-scale hierarchical data center structures, characterized by horizontal expansion and vertical hierarchy, leading to challenges in managing Virtual Machines (VM) at a granular level. The hierarchical arrangement can increase the risk of deployment failures, often stemming from inadequate computational resources on physical hosts, even when the cluster-level resources seem sufficient. While substantial work has gone into managing VMs at the physical host level, there remains a dearth of research under hierarchical data center configurations. To fill the research gap, we address the hierarchy in cloud data centers with a novel two-stage approach named VMM-HHGT, aiming at suppressing VM deployment failures, while balancing the energy consumption and computation resource contention. VMM-HHGT comprises a Hyper-Heuristic-assisted broker (VMM-HH), which can learn the workload patterns and hardware configurations to generate cluster-selection heuristics. An offline training process is incorporated for continuous heuristic evolution with zero overhead on decision-making. Besides, a Game-Theory-assisted hypervisor (GT) is designed for inter-host live VM migration for fine-grained balancing of energy consumption and resource contention. Extensive experiments with traces from real-world VMware data centers show that VMM-HHGT achieves a higher deployment success rate compared to the state-of-the-art approaches, with a well-situated performance in energy consumption and resource contention. • Handling hierarchy in cloud data centers to suppress VM deployment failures. • A two-stage solution for initial VM placement and live migration in the long term. • A Hyper-Heuristic-assisted broker for initial cluster-level VM placement. • A Game-Theory-assisted hypervisor for host-level VM placement and long-term migration. • Effectively suppressed deployment failures with satisfying performance and energy efficiency. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Influential individuals can promote prosocial practices in heterogeneous societies: a mathematical and agent-based model.
- Author
-
Crabtree SA, Wren CD, Dixit A, and Levin SA
- Abstract
In this paper, we examine how different governance types impact prosocial behaviors in a heterogenous society. We construct a general theoretical framework to examine a game-theoretic model to assess the ease of achieving a cooperative outcome. We then build a dynamic agent-based model to examine three distinct governance types in a heterogenous population: monitoring one's neighbors, despotic leadership, and influencing one's neighbors to adapt strategies that lead to better fitness. In our research, we find that while despotic leadership may lead towards high prosociality and high returns it does not exceed the effects of a local individual who can exert positive influence in the community. This may suggest that greater individual gains can be had by cooperating and that global hierarchical leadership may not be essential as long as influential individuals exert their influence for public good and not for public ill., (© The Author(s) 2024. Published by Oxford University Press on behalf of National Academy of Sciences.)
- Published
- 2024
- Full Text
- View/download PDF
24. A Framework for Contractual Graphs
- Author
-
Renita M. Murimi
- Subjects
contractual graphs ,Shapley value ,kernel ,game-theory ,smart contracts ,Information technology ,T58.5-58.64 - Abstract
This paper studies contractual graphs, where the formation of edges between nodes result in dyadic exchanges. Each dyadic exchange is analyzed as a contractual agreement that is implemented upon fulfilment of underlying conditions. As these dyadic exchanges proliferate, the resulting population of these exchanges creates a contractual graph. A contractual framework for graphs is especially useful in applications where AI-enabled software is employed to create or automate smart contracts between nodes. While some smart contracts may be easily created and executed, others may contain a higher level of ambiguity which may prevent their efficient implementation. Ambiguity in contractual elements is especially difficult to implement, since nodes have to efficiently sense the ambiguity and allocate appropriate amounts of computational resources to the ambiguous contractual task. This paper develops a two-node contractual model of graphs, with varying levels of ambiguity in the contracts and examines its consequences for a market where tasks of differing ambiguity are available to be completed by nodes. The central theme of this paper is that as ambiguity increases, it is difficult for nodes to efficiently commit to the contract since there is an uncertainty in the amount of resources that they have to allocate for completion of the tasks specified in the contract. Thus, while linguistic ambiguity or situational ambiguity might not be cognitively burdensome for humans, it might become expensive for nodes involved in the smart contract. The paper also shows that timing matters—the order in which nodes enter the contract is important as they proceed to sense the ambiguity in a task and then allocate appropriate resources. We propose a game-theoretic formulation to scrutinize how nodes that move first to complete a task are differently impacted than those that move second. We discuss the applications of such a contractual framework for graphs and obtain conditions under which two-node contracts can achieve a successful coalition.
- Published
- 2021
- Full Text
- View/download PDF
25. Hypergraph Clustering Based on Game-Theory for Mining Microbial High-Order Interaction Module.
- Author
-
Yu, Limin, Shen, Xianjun, Yang, Jincai, Wei, Kaiping, Zhong, Duo, and Xiang, Ruilong
- Subjects
- *
GAME theory , *MINES & mineral resources , *SOURCE code , *ALGORITHMS , *NATURE , *HYPERGRAPHS - Abstract
Microbial community is ubiquitous in nature, which has a great impact on the living environment and human health. All these effects of microbial communities on the environment and their hosts are often referred to as the functions of these communities, which depend largely on the composition of the communities. The study of microbial higher-order module can help us understand the dynamic development and evolution process of microbial community and explore community function. Considering that traditional clustering methods depend on the number of clusters or the influence of data that does not belong to any cluster, this paper proposes a hypergraph clustering algorithm based on game theory to mine the microbial high-order interaction module (HCGI), and the hypergraph clustering problem naturally turns into a clustering game problem, the partition of network modules is transformed into finding the critical point of evolutionary stability strategy (ESS). The experimental results show HCGI does not depend on the number of classes, and can get more conservative and better quality microbial clustering module, which provides reference for researchers and saves time and cost. The source code of HCGI in this paper can be downloaded from https://github.com/ylm0505/HCGI. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
26. Rumour Source Detection Using Game Theory.
- Author
-
Jain, Minni, Jaswani, Aman, Mehra, Ankita, and Mudgal, Laqshay
- Subjects
GAME theory ,SOCIAL networks ,CENTRALITY ,PANIC - Abstract
Social networks have become a critical part of our lives as they enable us to interact with a lot of people. These networks have become the main sources for creating, sharing and also extracting information regarding various subjects. But all this information may not be true and may contain a lot of unverified rumours that have the potential of spreading incorrect information to the masses, which may even lead to situations of widespread panic. Thus, it is of great importance to identify those nodes and edges that play a crucial role in a network in order to find the most influential sources of rumour spreading. Generally, the basic idea is to classify the nodes and edges in a network with the highest criticality. Most of the existing work regarding the same focuses on using simple centrality measures which focus on the individual contribution of a node in a network. Game-theoretic approaches such as Shapley Value (SV) algorithms suggest that individual marginal contribution should be measured for a given player as the weighted average marginal increase in the yield of any coalition that this player might join. For our experiment, we have played five SV-based games to find the top 10 most influential nodes on three network datasets (Enron, USAir97 and Les Misérables). We have compared our results to the ones obtained by using primitive centrality measures. Our results show that SVbased approach is better at understanding the marginal contribution, and therefore the actual influence, of each node to the entire network. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
27. Least-cost Distribution Network Tariff Design in Theory and Practice.
- Author
-
Schittekatte, Tim and Meeus, Leonardo
- Subjects
- *
THEORY-practice relationship , *DESIGN services , *TARIFF , *POWER resources - Abstract
In this paper a game-theoretical model with self-interest pursuing consumers is introduced in order to assess how to design a least-cost distribution tariff under two constraints that regulators typically face. The first constraint is related to difficulties regarding the implementation of cost-reflective tariffs. In practice, so-called cost-reflective tariffs are only a proxy for the actual cost driver(s) in distribution grids. The second constraint has to do with fairness. There is a fear that active consumers investing in distributed energy resources (DER) might benefit at the expense of passive consumers. We find that both constraints have a significant impact on the least-cost network tariff design, and the results depend on the state of the grid. If most of the grid investments still have to be made, passive and active consumers can both benefit from cost-reflective tariffs, while this is not the case for passive consumers if the costs are mostly sunk. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
28. Motivating Students in Collaborative Activities With Game-Theoretic Group Recommendations.
- Author
-
Papamitsiou, Zacharoula and Economides, Anastasios A.
- Abstract
Recommending educational resources to groups of students is a common task in collaborative learning contexts. However, differences in within-group motivational factors might lead to conflicts in students’ intention to use the resources. Previous methods fail to achieve high goodness of recommendation for the majority of students in heterogeneous groups. This study demonstrates a game-theoretic solution for recommending educational resources to homogeneous and heterogeneous groups. The group members are the players, the resources comprise the set of possible actions, and selecting those items that will maximize all students’ motivation in the collaborative activity is a problem of finding the Nash Equilibrium (NE). In case the NE is Pareto efficient, none of the players can get more payoff (motivation) without decreasing the payoff of any other player, indicating an optimal benefit for the group as a whole. The suggested approach was empirically evaluated in a controlled experiment with a real dataset. The relevance of each delivered item to its corresponding students was explored both from the perspective of the group and its the individual students. The accuracy of the predicted group/individual motivation, the goodness of the ranked list of recommendations, and the problem-solving performance for the treatment group were significantly higher compared to the control groups. Limitations of the approach, as well as future work plans conclude the paper. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
29. The value of information systems for product recovery management.
- Author
-
Toyasaki, Fuminori, Wakolbinger, Tina, and Kettinger, WilliamJ.
- Subjects
PRODUCT recovery ,INFORMATION storage & retrieval systems ,BUSINESS logistics management ,INDUSTRIAL procurement ,SUPPLY chains ,INVENTORY control ,MATHEMATICAL models ,MANAGEMENT - Abstract
This article sheds light on the role of information systems in product recovery management. We first develop analytical models and then provide a numerical example to determine under what conditions investments in Information-intensive Product Recovery Systems (IPRS) are economically justifiable for manufacturers and when policy-makers need to consider facilitating their implementation. The results of the analytical models indicate that the recovery network (collection) structure and product characteristics determine if precision improvements or increased sorting speed associated with IS investments will lead to higher profit gains. Manufacturers should carefully assess conflicting impacts of current manufacturing and recycling technology trends on the value of IPRS. Implementing IPRS might end up reducing manufacturers' profits under a highly time efficient decentralised collection structure. We show that negotiations with competitors about IPRS implementation may lead to a win–win situation and allow consumers to enjoy the lowest product price if the binding force of the agreement is strong. Otherwise, some manufacturers follow free-rider strategies. This article has immediate application to manufacturers' IS strategy and to government policy-makers considering investing in and/or structuring product recovery closed-loop supply chain processes within their jurisdictions. It also opens a potential stream of research concerning the role of IPRS to automate, informate and transform closed-loop supply chains for eco-efficiency. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
30. ON THE INTERACTION BETWEEN DISTRIBUTION NETWORK TARIFF DESIGN AND THE BUSINESS CASE FOR RESIDENTIAL STORAGE.
- Author
-
Schittekatte, Tim and Meeus, Leonardo
- Subjects
PHOTOVOLTAIC power generation ,SOLAR energy ,ELECTRIC batteries ,ELECTRIC power distribution grids ,ENERGY consumption - Abstract
Battery adoption by residential consumers, mostly coupled with a new or existing solar PV system, is expected to rise in the near future. In that regards, distribution network tariff design plays an important role. The network tariff design should align the business case of storage with the impact it has on the local grid. We evaluate capacity-based network charges and two types of network charges which stimulate self-consumption: net-purchase and bi-directional volumetric network charges. We show that when grid costs are sunk, all network tariff design options will overincentivise battery adoption at the expense of the overall cost of the system. In contrast, when many future grid costs are to be made, the considered network tariff design options will mostly under-incentivise battery adoption, and potential system-level gains are missed out. Besides the network tariff design, also time-varying energy prices do improve the business case of storage. The impact of interactions between the network tariff design and time-varying energy prices on the total system costs need more investigation. [ABSTRACT FROM AUTHOR]
- Published
- 2019
31. Analysis of Product Distribution Strategy in Digital Publishing Industry Based on Game-Theory
- Author
-
Xu Li-ping and Chen Haiyan
- Subjects
industry chain ,game-theory ,distribution strategy ,02.50.le ,Physics ,QC1-999 - Abstract
The digital publishing output increased significantly year by year. It has been the most vigorous point of economic growth and has been more important to press and publication industry. Its distribution channel has been diversified, which is different from the traditional industry. A deep research has been done in digital publishing industry, for making clear of the constitution of the industry chain and establishing the model of industry chain. The cooperative and competitive relationship between different distribution channels have been analyzed basing on a game-theory. By comparing the distribution quantity and the market size between the static distribution strategy and dynamic distribution strategy, we get the theory evidence about how to choose the distribution strategy to get the optimal benefit.
- Published
- 2017
- Full Text
- View/download PDF
32. Spatial Coordination Games for Large-Scale Visualization
- Author
-
Ribeiro, Andre, Yoneki, Eiko, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, and Bulling, Nils, editor
- Published
- 2015
- Full Text
- View/download PDF
33. Reclamation: Taking Back Control of Words.
- Author
-
Popa-Wyatt, Mihaela
- Subjects
- *
PREDICTION theory , *DISCRIMINATORY language , *VOCABULARY - Abstract
Reclamation is the phenomenon of an oppressed group repurposing language to its own ends. A case study is reclamation of slur words. Popa-Wyatt and Wyatt (2018) argued that a slurring utterance is a speech act which performs a discourse role assignment. It assigns a subordinate role to the target, while the speaker assumes a dominant role. This pair of role assignments is used to oppress the target. Here the author focuses on how reclamation works and under what conditions its benefits can stabilise. She starts by reviewing the data and describing preconditions and motivations for reclamation. Can reclamation be explained in the same basic framework as regular slurring utterances? She argues that it can. The author also identifies some features that must be a prediction of any theory of reclamation. She concludes that reclamation is an instance of a much broader class of acts we do with words to change the distribution of power: it begets power, but it also requires it. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
34. Sharing Solar PV and Energy Storage in Apartment Buildings: Resource Allocation and Pricing.
- Author
-
Fleischhacker, Andreas, Auer, Hans, Lettner, Georg, and Botterud, Audun
- Abstract
While solar PV generation is well-established on single-family houses, there is still a lack of installations on apartment buildings. To understand the effect of sharing distributed generation, we developed two energy sharing models: 1) a welfare optimization, and 2) a game theoretical (bi-level) model. We introduced two type players: 1) the owner of distributed generation (e.g., solar PV and energy storage), and 2) the consumers. Furthermore, we included consumer preferences by multiple objectives such as emissions reduction and distributed generation in addition to cost in the model. We applied both models to a numerical example using data from the electricity market in Texas, USA. The results showed that welfare is maximized in both models, but shared differently between the owner of the generation and the consumers. One exception is the bi-level model with uniform price auctions which results in a reduction in system welfare to maximize owner revenues. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
35. 基于博弈论的虚拟制造网络车间调度优化方法.
- Author
-
聂黎, 张国辉, 王小刚, and 白跃伟
- Abstract
Copyright of China Mechanical Engineering is the property of Editorial Board of China Mechanical Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
36. The generalized ideal free distribution model: Merging current ideal free distribution models into a central framework.
- Author
-
Menezes, Jorge F.S. and Kotler, Burt P.
- Subjects
- *
ECOLOGY , *HABITAT selection , *GAME theory , *COMMUNITIES , *PHENOTYPES - Abstract
Highlights • We expand the ideal free distribution using matrix equations. • With this expansion, we can represent any trophic web. • From it we can predict distribution of individuals among habitats or patches. • This model summarizes up to 13 other extensions of the ideal free distribution. Abstract Density-dependent habitat selection is a central theme in ecology. Empirical studies collect data with increasing resolution and provide greater opportunities for its testing. However, several different density-dependent habitat selection models exist in the literature incorporating many different scenarios. We attempt to unify some of these models in a single framework, to increase our predictive power, and assist researchers in making predictions from combinations of these models. To achieve this, we created the generalized ideal free distribution, an expansion of the ideal free distribution model. With this model, we synthesize many of the previous theoretical developments in habitat selection to better incorporate temporal dynamics. By using community matrices to represent the interaction between individuals, we demonstrated that thirteen scenarios represented in other studies can be combined into a single model. In addition, for four of these scenarios, our predictions are similar to the original studies that developed these scenarios. Additionally, we derived four novel predictions that take advantage of using community matrices to represent distribution. We discuss how this model creates a connection between community interactions and the distribution of individuals, and its uses in other subjects in ecology. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
37. Quality-of-Service Aware Game Theory-Based Uplink Power Control for 5G Heterogeneous Networks.
- Author
-
Ahmad, I., Narmeen, R., Kaleem, Z., Nguyen, Long D., and Ha, Dac-Binh
- Subjects
- *
GAME theory , *5G networks , *MOBILE communication systems , *DATA , *ENERGY conservation - Abstract
The fifth-generation (5G) mobile communication system is expecting to support users with diverse data rate requirements by densely deploying small cells. The users attached with small cells make use of the same frequency band as the existing macro cell users, that causes severe co-channel interference and degrades the performance. To overcome this challenge, we propose a game theoretical framework for the optimal uplink power allocation for small cells, i.e., femtocell deployed underlaid macrocell. In this paper, femtocell users play a non-cooperative game to choose the optimal power to maximize the sum-rate of the system. Furthermore, an iterative quality-of-service (QoS)-aware game theory based power control (QoS-GTPC) scheme is proposed to optimize the femtocell user power taking into account macrocell user QoS requirements. Simulation results verify that the proposed QoS-GTPC scheme significantly improves the sum-rate and reduces outage and interference, as compared with conventional power control scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
38. Security Games in the Field: Deployments on a Transit System
- Author
-
Fave, Francesco M. Delle, Brown, Matthew, Zhang, Chao, Shieh, Eric, Jiang, Albert Xin, Rosoff, Heather, Tambe, Milind, Sullivan, John P., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, Series editor, Tanaka, Yuzuru, Series editor, Wahlster, Wolfgang, Series editor, Siekmann, Jörg, Series editor, Dalpiaz, Fabiano, editor, Dix, Jürgen, editor, and van Riemsdijk, M. Birna, editor
- Published
- 2014
- Full Text
- View/download PDF
39. Aggregation of Households in Community Energy Systems: An Analysis from Actors’ and Market Perspectives
- Author
-
Seyedfarzad Sarfarazi, Marc Deissenroth-Uhrig, and Valentin Bertsch
- Subjects
decentralized energy system ,energy community ,community energy storage ,community energy system ,game-theory ,Stackelberg ,Technology - Abstract
In decentralized energy systems, electricity generated and flexibility offered by households can be organized in the form of community energy systems. Business models, which enable this aggregation at the community level, will impact on the involved actors and the electricity market. For the case of Germany, in this paper different aggregation scenarios are analyzed from the perspective of actors and the market. The main components in these scenarios are the Community Energy Storage (CES) technology, the electricity tariff structure, and the aggregation goal. For this evaluation, a bottom-up community energy system model is presented, in which the households and retailer are the key actors. In our model, we distinguish between the households with inflexible electricity load and the flexible households that own a heat pump or Photovoltaic (PV) storage systems. By using a game-theoretic approach and modeling the interaction between the retailer and households as a Stackelberg game, a community real-time pricing structure is derived. To find the solution of the modeled Stackelberg game, a genetic algorithm is implemented. To analyze the impact of the aggregation scenarios on the electricity market, a “Market Alignment Indicator” is proposed. The results show that under the considered regulatory framework, the deployment of a CES can increase the retailer’s operational profits while improving the alignment of the community energy system with the signals from the electricity market. Depending on the aggregation goal of the retailer, the implementation of community real-time pricing could lead to a similar impact. Moreover, such a tariff structure can lead to financial benefits for flexible households.
- Published
- 2020
- Full Text
- View/download PDF
40. Cost-Efficient NGN Rollout
- Author
-
Verbrugge, Sofie, Van Ooteghem, Jan, Casier, Koen, Van der Wee, Marlies, Tahon, Mathieu, Hadjiantonis, Antonis M., editor, and Stiller, Burkhard, editor
- Published
- 2012
- Full Text
- View/download PDF
41. Computers & Security / Game-theoretic APT defense: An experimental study on robotics
- Author
-
Rass, Stefan, König, Sandra, Wachter, Jasmin, Mayoral-Vilches, Víctor, and Panaousis, Emmanouil
- Subjects
Stealthy intrusion ,Attack graph ,Attack tree ,Game-theory ,Attacker-defender games ,Cyber physical system ,Cyber risk ,Cyber security ,Advanced persistent threats - Abstract
This paper proposes a novel game-theoretic framework for defending against Advanced Persistent Threats (APTs). It applies the original Cut-The-Rope model into an experimental study extending the previously studied attacker movements beyond the Poisson distribution to a realistic set of attack actions. More importantly, it demonstrates the value of this framework on an experimental study of an APT defense game on attack graphs, which lets a security officer establish an optimized defense policy against stealthy intrusions. The security model and algorithm under study is designed for practical use with attack graphs as threat models, possibly including vulnerability information if available. The game-theoretic optimization delivers a proactive defense policy under the following assumptions or requirements: first, we do not need to assume that the system is, or has been, clean from adversaries at any time. At the moment when the defender computes the defense policy, the attacker is assumed to already be in the system (also having penetrated it until an unknown depth). Second, the defender does not rely on any signaling or other indicators of adversarial activity, nor is there a reliable feedback mechanism to tell the defender if its actions were successful or not. Third, the model can use information on exploits, such as Common Vulnerabilities and Exposures (CVE) numbers, to refine the defense game, but can also operate without such information. We corroborate our findings on publicly documented attack graphs from the robotics domain; without and with CVE information. We run experiments against two different types of defense regimes, and compare the results against an intuitive baseline defense heuristic. The results show that the optimized defense strongly outperforms simple heuristics, like taking the shortest or easiest attack paths. Version of record
- Published
- 2023
- Full Text
- View/download PDF
42. Price and Warranty Competition in a Duopoly Supply Chain
- Author
-
Sinha, Santanu, Sarmah, S. P., Choi, Tsan-Ming, editor, and Cheng, T.C. Edwin, editor
- Published
- 2011
- Full Text
- View/download PDF
43. Game-theory based trading analysis between distribution network operator and multi-microgrids.
- Author
-
Lin, Wei, Jin, Xiaolong, Mu, Yunfei, Jia, Hongjie, Yu, Xiaodan, Pu, Tianjiao, and Chen, Naishi
- Abstract
Abstract A game-theory based trading analysis between distribution network operator (DNO) and multi-microgrids (multi-MGs) is proposed in this paper. Firstly, the model of DNO and MG are developed respectively. The operational objective of the DNO is trading profit (TP) maximization and the operational objective of the MGs are operation cost (OC) minimization. Secondly, a game composed of DNO and MGs is formulated and the Karush–Kuhn–Tucker (KKT) method is utilized to achieve the Nash Equilibrium (NE) point. Numerical results show that the proposed solution method is able to balance different interest of DNO and MGs simultaneously and the trading behaviors under different market prices are analyzed, which contributes to the optimal operation in aspect of payoff maximization. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
44. An iterative method for detection of the collusive strategy in prisoner's dilemma game of electricity market.
- Author
-
Mohtavipour, Seyed Saeid and Zideh, Mehdi Jabbari
- Subjects
- *
NASH equilibrium , *ELECTRICAL engineering , *FINITE element method , *DECISION making , *ITERATIVE methods (Mathematics) - Abstract
The aim of this article is to present a method, which is called the 'iterative collusive strategy (CS) search method', to detect the CS in prisoner's dilemma game in which there is collusive equilibrium. We apply this method to an example of two‐player prisoner's dilemma game and a numerical duopoly example to show its effectiveness. To simulate the electricity market models, we use this method with a local optimization algorithm. Then, we employ a hybrid technique by applying an agent‐based model to the iterative CS search method for improving the results and speeding up their convergence. We simulate an electricity market example with transmission constraint to test the effectiveness of local and hybrid iterative CS search methods. Simulation results show that both local and hybrid iterative CS search methods could successfully identify the CS; however, the hybrid iterative CS search method converges to the final results with less iteration numbers. © 2018 Institute of Electrical Engineers of Japan. Published by John Wiley & Sons, Inc. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
45. Adaptive and Distributed Radio Resource Allocation in Densely Deployed Wireless LANs: A Game-Theoretic Approach.
- Author
-
Song, Taewon, Kim, Tae-Yoon, Kim, Wonjung, and Pack, Sangheon
- Subjects
- *
RADIO resource management , *LOCAL area networks , *INTERFERENCE channels (Telecommunications) , *RESOURCE management , *WIDTH measurement , *ALGORITHMS , *COMPUTER simulation - Abstract
As increasing numbers of access points (APs) are deployed in wireless local area networks (WLANs), they experience severe channel interference. Thus, a well-defined resource management scheme for APs should be devised. Undoubtedly, a centralized and deterministic resource management is not appropriate, owing to the distributed operation and dynamic channel condition of densely deployed WLANs. To address this problem, an adaptive and distributed radio resource allocation (ADRA) algorithm is proposed, in which an optimal mixed strategy for selecting the channel width of APs is derived via a game-theoretic approach. ADRA also fits into the densely deployed WLAN in that it considers partially overlapped channels. Simulation results show that ADRA can provide a comparable throughput and fairness performance to centralized algorithms, even though it functions in a distributed manner. Moreover, it is shown that ADRA works adaptively even when network environments change rapidly. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
46. Developing Organizational Competences for Conflict Management: The Use of the Prisoner's Dilemma in Higher Education
- Author
-
Andreina Bruno, Giuseppina Dell'Aversana, and Gloria Guidetti
- Subjects
conflict ,higher education ,prisoner's dilemma ,game-theory ,psychoanalytic approach ,Psychology ,BF1-990 - Abstract
Interpersonal relationship require sophisticated competences of cohabitation. However, the availability of training tools to develop conflict management skills is limited and problematic. The prisoner's dilemma game (PDG), the most widely known example of game theory, a nonzero-sum game, has been used, in higher education, to provide students with an opportunity of active learning and for understanding counterintuitive concepts. It creates a condition of emotive, moral and decisional conflict in and between agents. This paper presents a case-study in higher education in which PDG was proposed to enhance organizational competences for conflict management, according to the psychoanalytic approach to organizational studies. The study aims to explore: (1) the significant characteristics of PDG used in an affective-emotional key in higher education; (2) the learning outcomes that PDG enables to activate in the participants in relation to the development of organizational skills for conflict management. Twenty students' reflective journals were analyzed using thematic analysis. Findings indicated that PDG is perceived as a useful device in students' learning experience, which is appreciated in relation to its concreteness, intensity and debriefing phase. Learning outcomes allow new meanings about conflict, by emphasizing its defensive, automatic and interpersonal dimension. This paper contributes to the understanding of PDG as a tool to develop competences in dealing with the challenges of conflict management, since it seems to favor the overcoming of the individualistic stereotype in conflict representation by highlighting the interdependence of social interaction.
- Published
- 2018
- Full Text
- View/download PDF
47. Mapping causal functional contributions derived from the clinical assessment of brain damage after stroke
- Author
-
Melissa Zavaglia, Nils D. Forkert, Bastian Cheng, Christian Gerloff, Götz Thomalla, and Claus C. Hilgetag
- Subjects
NIHSS ,Lesion inference ,Multi-perturbation Shapley value Analysis (MSA) ,Game-theory ,Computer applications to medicine. Medical informatics ,R858-859.7 ,Neurology. Diseases of the nervous system ,RC346-429 - Abstract
Lesion analysis reveals causal contributions of brain regions to mental functions, aiding the understanding of normal brain function as well as rehabilitation of brain-damaged patients. We applied a novel lesion inference technique based on game theory, Multi-perturbation Shapley value Analysis (MSA), to a large clinical lesion dataset. We used MSA to analyze the lesion patterns of 148 acute stroke patients together with their neurological deficits, as assessed by the National Institutes of Health Stroke Scale (NIHSS). The results revealed regional functional contributions to essential behavioral and cognitive functions as reflected in the NIHSS, particularly by subcortical structures. There were also side specific differences of functional contributions between the right and left hemispheric brain regions which may reflect the dominance of the left hemispheric syndrome aphasia in the NIHSS. Comparison of MSA to established lesion inference methods demonstrated the feasibility of the approach for analyzing clinical data and indicated its capability for objectively inferring functional contributions from multiple injured, potentially interacting sites, at the cost of having to predict the outcome of unknown lesion configurations. The analysis of regional functional contributions to neurological symptoms measured by the NIHSS contributes to the interpretation of this widely used standardized stroke scale in clinical practice as well as clinical trials and provides a first approximation of a ‘map of stroke’.
- Published
- 2015
- Full Text
- View/download PDF
48. Social Perspective of Software Development Methods: The Case of the Prisoner Dilemma and Extreme Programming
- Author
-
Hazzan, Orit, Dubinsky, Yael, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Baumeister, Hubert, editor, Marchesi, Michele, editor, and Holcombe, Mike, editor
- Published
- 2005
- Full Text
- View/download PDF
49. A Game-Theoretic Framework to Preserve Location Information Privacy in Location-Based Service Applications
- Author
-
Mulugeta Kassaw Tefera and Xiaolong Yang
- Subjects
mobile networks ,location-based service ,security and privacy ,game-theory ,privacy preservation ,prisoner’s dilemma ,Nash Equilibrium ,Chemical technology ,TP1-1185 - Abstract
Recently, the growing ubiquity of location-based service (LBS) technology has increased the likelihood of users’ privacy breaches due to the exposure of their real-life information to untrusted third parties. Extensive use of such LBS applications allows untrusted third-party adversarial entities to collect large quantities of information regarding users’ locations over time, along with their identities. Due to the high risk of private information leakage using resource-constrained smart mobile devices, most LBS users may not be adequately encouraged to access all LBS applications. In this paper, we study the use of game theory to protect users against private information leakage in LBSs due to malicious or selfish behavior of third-party observers. In this study, we model a scenario of privacy protection gameplay between a privacy protector and an outside visitor and then derive the situation of the prisoner’s dilemma game to analyze the traditional privacy protection problems. Based on the analysis, we determine the corresponding benefits to both players using a point of view that allows the visitor to access a certain amount of information and denies further access to the user’s private information when exposure of privacy is forthcoming. Our proposed model uses the collection of private information about historical access data and current LBS access scenario to effectively determine the probability that the visitor’s access is an honest one. Moreover, we present the procedures involved in the privacy protection model and framework design, using game theory for decision-making. Finally, by employing a comparison analysis, we perform some experiments to assess the effectiveness and superiority of the proposed game-theoretic model over the traditional solutions.
- Published
- 2019
- Full Text
- View/download PDF
50. Secure Generalized Vickrey Auction without Third-party Servers
- Author
-
Yokoo, Makoto, Suzuki, Koutarou, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Juels, Ari, editor
- Published
- 2004
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.