Computing Correlated Equilibria in Multi-Player Games∗
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Potential Games. Congestion Games. Price of Anarchy and Price of Stability
8803 Connections between Learning, Game Theory, and Optimization Maria-Florina Balcan Lecture 13: October 5, 2010 Reading: Algorithmic Game Theory book, Chapters 17, 18 and 19. Price of Anarchy and Price of Staility We assume a (finite) game with n players, where player i's set of possible strategies is Si. We let s = (s1; : : : ; sn) denote the (joint) vector of strategies selected by players in the space S = S1 × · · · × Sn of joint actions. The game assigns utilities ui : S ! R or costs ui : S ! R to any player i at any joint action s 2 S: any player maximizes his utility ui(s) or minimizes his cost ci(s). As we recall from the introductory lectures, any finite game has a mixed Nash equilibrium (NE), but a finite game may or may not have pure Nash equilibria. Today we focus on games with pure NE. Some NE are \better" than others, which we formalize via a social objective function f : S ! R. Two classic social objectives are: P sum social welfare f(s) = i ui(s) measures social welfare { we make sure that the av- erage satisfaction of the population is high maxmin social utility f(s) = mini ui(s) measures the satisfaction of the most unsatisfied player A social objective function quantifies the efficiency of each strategy profile. We can now measure how efficient a Nash equilibrium is in a specific game. Since a game may have many NE we have at least two natural measures, corresponding to the best and the worst NE. We first define the best possible solution in a game Definition 1. -
Lecture Notes
GRADUATE GAME THEORY LECTURE NOTES BY OMER TAMUZ California Institute of Technology 2018 Acknowledgments These lecture notes are partially adapted from Osborne and Rubinstein [29], Maschler, Solan and Zamir [23], lecture notes by Federico Echenique, and slides by Daron Acemoglu and Asu Ozdaglar. I am indebted to Seo Young (Silvia) Kim and Zhuofang Li for their help in finding and correcting many errors. Any comments or suggestions are welcome. 2 Contents 1 Extensive form games with perfect information 7 1.1 Tic-Tac-Toe ........................................ 7 1.2 The Sweet Fifteen Game ................................ 7 1.3 Chess ............................................ 7 1.4 Definition of extensive form games with perfect information ........... 10 1.5 The ultimatum game .................................. 10 1.6 Equilibria ......................................... 11 1.7 The centipede game ................................... 11 1.8 Subgames and subgame perfect equilibria ...................... 13 1.9 The dollar auction .................................... 14 1.10 Backward induction, Kuhn’s Theorem and a proof of Zermelo’s Theorem ... 15 2 Strategic form games 17 2.1 Definition ......................................... 17 2.2 Nash equilibria ...................................... 17 2.3 Classical examples .................................... 17 2.4 Dominated strategies .................................. 22 2.5 Repeated elimination of dominated strategies ................... 22 2.6 Dominant strategies .................................. -
Game-Based Verification and Synthesis
Downloaded from orbit.dtu.dk on: Sep 30, 2021 Game-based verification and synthesis Vester, Steen Publication date: 2016 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Vester, S. (2016). Game-based verification and synthesis. Technical University of Denmark. DTU Compute PHD-2016 No. 414 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Ph.D. Thesis Doctor of Philosophy Game-based verification and synthesis Steen Vester Kongens Lyngby, Denmark 2016 PHD-2016-414 ISSN: 0909-3192 DTU Compute Department of Applied Mathematics and Computer Science Technical University of Denmark Richard Petersens Plads Building 324 2800 Kongens Lyngby, Denmark Phone +45 4525 3031 [email protected] www.compute.dtu.dk Summary Infinite-duration games provide a convenient way to model distributed, reactive and open systems in which several entities and an uncontrollable environment interact. -
The Next Digital Decade Essays on the Future of the Internet
THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus THE NEXT DIGITAL DECADE ESSAYS ON THE FUTURE OF THE INTERNET Edited by Berin Szoka & Adam Marcus NextDigitalDecade.com TechFreedom techfreedom.org Washington, D.C. This work was published by TechFreedom (TechFreedom.org), a non-profit public policy think tank based in Washington, D.C. TechFreedom’s mission is to unleash the progress of technology that improves the human condition and expands individual capacity to choose. We gratefully acknowledge the generous and unconditional support for this project provided by VeriSign, Inc. More information about this book is available at NextDigitalDecade.com ISBN 978-1-4357-6786-7 © 2010 by TechFreedom, Washington, D.C. This work is licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Cover Designed by Jeff Fielding. THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET 3 TABLE OF CONTENTS Foreword 7 Berin Szoka 25 Years After .COM: Ten Questions 9 Berin Szoka Contributors 29 Part I: The Big Picture & New Frameworks CHAPTER 1: The Internet’s Impact on Culture & Society: Good or Bad? 49 Why We Must Resist the Temptation of Web 2.0 51 Andrew Keen The Case for Internet Optimism, Part 1: Saving the Net from Its Detractors 57 Adam Thierer CHAPTER 2: Is the Generative -
Collusion Constrained Equilibrium
Theoretical Economics 13 (2018), 307–340 1555-7561/20180307 Collusion constrained equilibrium Rohan Dutta Department of Economics, McGill University David K. Levine Department of Economics, European University Institute and Department of Economics, Washington University in Saint Louis Salvatore Modica Department of Economics, Università di Palermo We study collusion within groups in noncooperative games. The primitives are the preferences of the players, their assignment to nonoverlapping groups, and the goals of the groups. Our notion of collusion is that a group coordinates the play of its members among different incentive compatible plans to best achieve its goals. Unfortunately, equilibria that meet this requirement need not exist. We instead introduce the weaker notion of collusion constrained equilibrium. This al- lows groups to put positive probability on alternatives that are suboptimal for the group in certain razor’s edge cases where the set of incentive compatible plans changes discontinuously. These collusion constrained equilibria exist and are a subset of the correlated equilibria of the underlying game. We examine four per- turbations of the underlying game. In each case,we show that equilibria in which groups choose the best alternative exist and that limits of these equilibria lead to collusion constrained equilibria. We also show that for a sufficiently broad class of perturbations, every collusion constrained equilibrium arises as such a limit. We give an application to a voter participation game that shows how collusion constraints may be socially costly. Keywords. Collusion, organization, group. JEL classification. C72, D70. 1. Introduction As the literature on collective action (for example, Olson 1965) emphasizes, groups often behave collusively while the preferences of individual group members limit the possi- Rohan Dutta: [email protected] David K. -
Electronic Commerce (Algorithmic Game Theory) (Tentative Syllabus)
EECS 547: Electronic Commerce (Algorithmic Game Theory) (Tentative Syllabus) Lecture: Tuesday and Thursday 10:30am-Noon in 1690 BBB Section: Friday 3pm-4pm in EECS 3427 Email: [email protected] Instructor: Grant Schoenebeck Office Hours: Wednesday 3pm and by appointment; 3636 BBBB Graduate Student Instructor: Biaoshuai Tao Office Hours: 4-5pm Friday in Learning Center (between BBB and Dow in basement) Introduction: As the internet draws together strategic actors, it becomes increasingly important to understand how strategic agents interact with computational artifacts. Algorithmic game theory studies both how to models strategic agents (game theory) and how to design systems that take agent strategies into account (mechanism design). On-line auction sites (including search word auctions), cyber currencies, and crowd-sourcing are all obvious applications. However, even more exist such as designing non- monetary award systems (reputation systems, badges, leader-boards, Facebook “likes”), recommendation systems, and data-analysis when strategic agents are involved. In this particular course, we will especially focus on information elicitation mechanisms (crowd- sourcing). Description: Modeling and analysis for strategic decision environments, combining computational and economic perspectives. Essential elements of game theory, including solution concepts and equilibrium computation. Design of mechanisms for resource allocation and social choice, for example as motivated by problems in electronic commerce and social computing. Format: The two weeks will be background lectures. The next half of the class will be seminar style and will focus on crowd-sourcing, and especially information elicitation mechanisms. Each class period, the class will read a paper (or set of papers), and a pair of students will briefly present the papers and lead a class discussion. -
Correlated Equilibria and Communication in Games Françoise Forges
Correlated equilibria and communication in games Françoise Forges To cite this version: Françoise Forges. Correlated equilibria and communication in games. Computational Complex- ity. Theory, Techniques, and Applications, pp.295-704, 2012, 10.1007/978-1-4614-1800-9_45. hal- 01519895 HAL Id: hal-01519895 https://hal.archives-ouvertes.fr/hal-01519895 Submitted on 9 May 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Correlated Equilibrium and Communication in Games Françoise Forges, CEREMADE, Université Paris-Dauphine Article Outline Glossary I. De…nition of the Subject and its Importance II. Introduction III. Correlated Equilibrium: De…nition and Basic Properties IV. Correlated Equilibrium and Communication V. Correlated Equilibrium in Bayesian Games VI. Related Topics and Future Directions VII. Bibliography Acknowledgements The author wishes to thank Elchanan Ben-Porath, Frédéric Koessler, R. Vijay Krishna, Ehud Lehrer, Bob Nau, Indra Ray, Jérôme Renault, Eilon Solan, Sylvain Sorin, Bernhard von Stengel, Tristan Tomala, Amparo Ur- bano, Yannick Viossat and, especially, Olivier Gossner and Péter Vida, for useful comments and suggestions. Glossary Bayesian game: an interactive decision problem consisting of a set of n players, a set of types for every player, a probability distribution which ac- counts for the players’ beliefs over each others’ types, a set of actions for every player and a von Neumann-Morgenstern utility function de…ned over n-tuples of types and actions for every player. -
Characterizing Solution Concepts in Terms of Common Knowledge Of
Characterizing Solution Concepts in Terms of Common Knowledge of Rationality Joseph Y. Halpern∗ Computer Science Department Cornell University, U.S.A. e-mail: [email protected] Yoram Moses† Department of Electrical Engineering Technion—Israel Institute of Technology 32000 Haifa, Israel email: [email protected] March 15, 2018 Abstract Characterizations of Nash equilibrium, correlated equilibrium, and rationaliz- ability in terms of common knowledge of rationality are well known (Aumann 1987; arXiv:1605.01236v1 [cs.GT] 4 May 2016 Brandenburger and Dekel 1987). Analogous characterizations of sequential equi- librium, (trembling hand) perfect equilibrium, and quasi-perfect equilibrium in n-player games are obtained here, using results of Halpern (2009, 2013). ∗Supported in part by NSF under grants CTC-0208535, ITR-0325453, and IIS-0534064, by ONR un- der grant N00014-02-1-0455, by the DoD Multidisciplinary University Research Initiative (MURI) pro- gram administered by the ONR under grants N00014-01-1-0795 and N00014-04-1-0725, and by AFOSR under grants F49620-02-1-0101 and FA9550-05-1-0055. †The Israel Pollak academic chair at the Technion; work supported in part by Israel Science Foun- dation under grant 1520/11. 1 Introduction Arguably, the major goal of epistemic game theory is to characterize solution concepts epistemically. Characterizations of the solution concepts that are most commonly used in strategic-form games, namely, Nash equilibrium, correlated equilibrium, and rational- izability, in terms of common knowledge of rationality are well known (Aumann 1987; Brandenburger and Dekel 1987). We show how to get analogous characterizations of sequential equilibrium (Kreps and Wilson 1982), (trembling hand) perfect equilibrium (Selten 1975), and quasi-perfect equilibrium (van Damme 1984) for arbitrary n-player games, using results of Halpern (2009, 2013). -
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space Adam Smith Shuang Song Abhradeep Thakurta Boston University Google Research, Brain Team Google Research, Brain Team [email protected] [email protected] [email protected] Abstract We revisit the problem of counting the number of distinct elements F0(D) in a data stream D, over a domain [u]. We propose an ("; δ)-differentially private algorithm that approximates F0(D) within a factor of (1 ± γ), and with additive error of p O( ln(1/δ)="), using space O(ln(ln(u)/γ)/γ2). We improve on the prior work at least quadratically and up to exponentially, in terms of both space and additive p error. Our additive error guarantee is optimal up to a factor of O( ln(1/δ)), n ln(u) 1 o and the space bound is optimal up to a factor of O min ln γ ; γ2 . We assume the existence of an ideal uniform random hash function, and ignore the space required to store it. We later relax this requirement by assuming pseudo- random functions and appealing to a computational variant of differential privacy, SIM-CDP. Our algorithm is built on top of the celebrated Flajolet-Martin (FM) sketch. We show that FM-sketch is differentially private as is, as long as there are p ≈ ln(1/δ)=(εγ) distinct elements in the data set. Along the way, we prove a structural result showing that the maximum of k i.i.d. random variables is statisti- cally close (in the sense of "-differential privacy) to the maximum of (k + 1) i.i.d. -
Survey of the Computational Complexity of Finding a Nash Equilibrium
Survey of the Computational Complexity of Finding a Nash Equilibrium Valerie Ishida 22 April 2009 1 Abstract This survey reviews the complexity classes of interest for describing the problem of finding a Nash Equilibrium, the reductions that led to the conclusion that finding a Nash Equilibrium of a game in the normal form is PPAD-complete, and the reduction from a succinct game with a nice expected utility function to finding a Nash Equilibrium in a normal form game with two players. 2 Introduction 2.1 Motivation For many years it was unknown whether a Nash Equilibrium of a normal form game could be found in polynomial time. The motivation for being able to due so is to find game solutions that people are satisfied with. Consider an entertaining game that some friends are playing. If there is a set of strategies that constitutes and equilibrium each person will probably be satisfied. Likewise if financial games such as auctions could be solved in polynomial time in a way that all of the participates were satisfied that they could not do any better given the situation, then that would be great. There has been much progress made in the last fifty years toward finding the complexity of this problem. It turns out to be a hard problem unless PPAD = FP. This survey reviews the complexity classes of interest for describing the prob- lem of finding a Nash Equilibrium, the reductions that led to the conclusion that finding a Nash Equilibrium of a game in the normal form is PPAD-complete, and the reduction from a succinct game with a nice expected utility function to finding a Nash Equilibrium in a normal form game with two players. -
Equilibrium Computation in Normal Form Games
Tutorial Overview Game Theory Refresher Solution Concepts Computational Formulations Equilibrium Computation in Normal Form Games Costis Daskalakis & Kevin Leyton-Brown Part 1(a) Equilibrium Computation in Normal Form Games Costis Daskalakis & Kevin Leyton-Brown, Slide 1 Tutorial Overview Game Theory Refresher Solution Concepts Computational Formulations Overview 1 Plan of this Tutorial 2 Getting Our Bearings: A Quick Game Theory Refresher 3 Solution Concepts 4 Computational Formulations Equilibrium Computation in Normal Form Games Costis Daskalakis & Kevin Leyton-Brown, Slide 2 Tutorial Overview Game Theory Refresher Solution Concepts Computational Formulations Plan of this Tutorial This tutorial provides a broad introduction to the recent literature on the computation of equilibria of simultaneous-move games, weaving together both theoretical and applied viewpoints. It aims to explain recent results on: the complexity of equilibrium computation; representation and reasoning methods for compactly represented games. It also aims to be accessible to those having little experience with game theory. Our focus: the computational problem of identifying a Nash equilibrium in different game models. We will also more briefly consider -equilibria, correlated equilibria, pure-strategy Nash equilibria, and equilibria of two-player zero-sum games. Equilibrium Computation in Normal Form Games Costis Daskalakis & Kevin Leyton-Brown, Slide 3 Tutorial Overview Game Theory Refresher Solution Concepts Computational Formulations Part 1: Normal-Form Games -
Correlated Equilibria 1 the Chicken-Dare Game 2 Correlated
MS&E 334: Computation of Equilibria Lecture 6 - 05/12/2009 Correlated Equilibria Lecturer: Amin Saberi Scribe: Alex Shkolnik 1 The Chicken-Dare Game The chicken-dare game can be throught of as two drivers racing towards an intersection. A player can chose to dare (d) and pass through the intersection or chicken out (c) and stop. The game results in a draw when both players chicken out and the worst possible outcome if they both dare. A player wins when he dares while the other chickens out. The game has one possible payoff matrix given by d c d 0; 0 4; 1 c 1; 4 3; 3 with two pure strategy Nash equilibria (d; c) and (c; d) and one mixed equilibrium where each player mixes the pure strategies with probability 1=2 each. Now suppose that prior to playing the game the players performed the following experiment. The players draw a ball labeled with a strategy, either (c) or (d) from a bag containing three balls labelled c; c; d. The players then agree to follow the strategy suggested by the ball. It can be verified that there is no incentive to deviate from such an agreement since the suggested strategy is best in expectation. This experiment is equivalent to having the following strategy profile chosen for the players by some third party, a correlation device. d c d 0 1=3 c 1=3 1=3 This matrix above is not of rank one and so is not a Nash profile. And, the social welfare in this scenario is 16=3 which is greater than that of any Nash equilibrium.