(12) Patent Application Publication (10) Pub. No.: US 2006/0167784 A1 Hoffberg (43) Pub

Total Page:16

File Type:pdf, Size:1020Kb

(12) Patent Application Publication (10) Pub. No.: US 2006/0167784 A1 Hoffberg (43) Pub US 2006O167784A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0167784 A1 Hoffberg (43) Pub. Date: Jul. 27, 2006 (54) GAME THEORETIC PRIORITIZATION Related U.S. Application Data SCHEME FOR MOBILEAD HOC NETWORKS PERMITTING HERARCHAL (60) Provisional application No. 60/609,070, filed on Sep. DEFERENCE 10, 2004. (76) Inventor: Steven M. Hoffberg, West Harrison, Publication Classification NY (US) (51) Int. Cl. G06O 40/00 (2006.01) Correspondence Address: (52) U.S. Cl. ................................................................ T05/37 Steven M. Hoffberg, Esq. (57) ABSTRACT MILDE & HOFFBERG, LLP Suite 460 A method for providing unequal allocation of rights among 10 Bank Street agents while operating according to fair principles, com White Plains, NY 10606 (US) prising assigning a hierarchal rank to each agent; providing a synthetic economic value to a first set of agents at the a high level of the hierarchy; allocating portions of the Syn (21) Appl. No.: 11/005,460 thetic economic value by the first set of agents to a second set of agents at respectively different hierarchal rank than the first set of agents; and conducting an auction amongst agents (22) Filed: Dec. 6, 2004 using the synthetic economic value as the currency. Time Update ("Predict") Measurement Update ("Correct") (1) Project the state ahead (1) Compute the Kalman Gain x = AX-1 + Buk K = P, HT (HP, H+R) (2) Project the error covariance ahead (2) Update estimate with P = AP A+ Q measurement I k Xk = x + K. (Ik- HS) (3) Update the error covariance P (I- KH) P. Initial estimates for X-1 and P-1 Patent Application Publication Jul. 27, 2006 Sheet 1 of 6 US 2006/0167784 A1 Patent Application Publication Jul. 27, 2006 Sheet 2 of 6 US 2006/0167784 A1 O1 O2 HMM with mixture of Gaussians output Fig. 3 A1 A2 O1 O2 B1 B2 input-output HMM Factorial HMM Coupled HMM Fig. 4A Fig. 4B Fig. 4C Patent Application Publication Jul. 27, 2006 Sheet 3 of 6 US 2006/0167784 A1 u-N Time Update Measurement Update ("Predict”) ("Correct") Fig. 5 Time Update ("Predict") Measurement Update ("Correct") (1) Project the state ahead (1) Compute the Kalman Gain * = Axk-1 + Buk K = P, HT (HP, H+R) (2) Project the error covariance ahead (2) Update estimate with P AP. A+ Q measurement / S = X + K. (lk - HX) (3) Update the error covariance P = (1 - KH) P. Initial estimates for X-1 and P-1 Fig. 6 Patent Application Publication Jul. 27, 2006 Sheet 4 of 6 US 2006/0167784 A1 Time Update ("Predict") Measurement Update ("Correct") (1) Project the state ahead (1) Compute the Kalman Gain x = fix. , uk, O) K = P. H. (H.P.H + W.R.V.) (2) Update estimate with (2) Project the error covariance ahead measurement Ik P = AP. A + W.Qk-W". Xk Xk H K (Ik- h(xk y O)) (3) Update the error Covariance P = (1 - KH) P. Initial estimates for X-1 and P Fig. 7 Patent Application Publication Jul. 27, 2006 Sheet 5 of 6 „?Ilossebold„Ilosseoold; DE!¡EE|--|-- Josseoold 9 Patent Application Publication Jul. 27, 2006 Sheet 6 of 6 US 2006/0167784 A1 Proximity 101 (x) w Prospective Conjunction 102 (x) W2 Type of event 103 (x) W3 Type of event and sensed Condition 104. (x) W4 Fig. 9 High Memory dump Unit D Location Codes priority Itinerary string 201 202 203 messages 205 206 204 Event 301 Location 302 Time 303 Source 304 Expiration 305 Reliability 306 Message 307 Fig. 10 US 2006/0167784 A1 Jul. 27, 2006 GAME THEORETIC PRIORITIZATION SCHEME cations and display rendering considered normal. Typically, FOR MOBILEAD HOCNETWORKS PERMITTING both client and server are connected to the Internet through HERARCHAL DEFERENCE Internet Service providers, each having its own router. 0006. It is also known to provide so-called proxy servers FIELD OF THE INVENTION and firewalls, which are automated systems that insulate the 0001. The present invention relates to the field of ad hoc client system from the Internet. Further, so-called Internet network protocols and control architectures. applications and applets are known which provide local intelligence at the client system. Further, it is known to BACKGROUND OF THE INVENTION provide a local server within the client system for locally processing a portion of the information. These local servers, 0002. A number of fields of endeavor are relevant to the applications and applets are non-standard, and thus require present invention, and exemplary prior art, incorporated special software to be available locally for execution. herein by reference, are disclosed below. The references disclosed provide a skilled artisan with embodiments of 0007 Thus, the Internet poses a number of advantages elements of the present invention, and the teachings therein for commercial use, including low cost and ubiquitous may be combined and Subcombined in various manners in connectivity. Therefore, it is desirable to employ standard accordance with the present teachings. The topical headings Internet technologies while achieving Sufficient quality com are advisory only, and are not intended to limit the appli munications to effect an efficient transaction. cability of any reference. While some embodiments are 0008. A widely dispersed network of access points may discussed as being preferred, it should be understood that all implement a mobile telecommunications protocol. Such as embodiments discussed, in any portion of this documents, IETF RFC 3344 (Mobile IP, IPv4), or various mobile ad hoc whether stated as having advantages or not, form a part of network (MANET) protocols, 2.5G or 3G cellular, or other the invention and may be combined and/or subcombined in types of protocols. Preferably, the protocol allows the client a consistent manner in accordance with the teachings hereof. to maintain a remote connection while traversing between 0003) Internet various access points. See, U.S. Pub. application No. 20040073642, expressly incorporated herein by reference. 0004 The Internet is structured such various networks Mobile Internet Protocol (Mobile IP or MIP, in this case, v4) are interconnected, with communications effected by is an Internet Engineering Task Force (IETF) network layer addressed packets conforming to a common protocol. Based protocol, specified in RFC-3344. It is designed to allow on the packet addressing, information is routed from Source seamless connectivity session maintenance under TCP to destination, often through a set of networks having (Transmission Control Protocol) or other connection ori multiple potential pathways. The communications medium ented transport protocols when a mobile node moves from is shared between all users. Statistically, some proportion of one IP subnet to another. MIPv4 uses two network infra the packets are extraordinarily delayed, or simply lost. structure entities, a Home Agent (HA) and an optional Therefore, protocols involving communications using these Foreign Agent (FA), to deliver packets to the mobile node packets include error detection schemes that request a when it has left its home network. MIPv4 also supports retransmit of required data not received within a time point-of-attachment Care-of Addresses (CoA) if a FA is window. In the even that the network nears capacity or is unavailable. Mobile IP is increasingly being deployed for otherwise Subject to limiting constraint, the incidence of 2.5/3G (2.5 or third generation wireless) provider networks delayed or lost packets increases, thereby increasing and may be deployed in medium and large Enterprise IEEE requests for retransmission and retransmission. Therefore, as 802.11 -based LANs (Local Area Networks) with multiple the network approaches available bandwidth, the load subnets. MIPv4 relies on the use of permanently assigned increases, ultimately leading to failure. In instances where a “home’ IP addresses to help maintain connectivity when a minimum quality of service must be guaranteed, special mobile device connects to a foreign network. On the other Internet technologies are required, to reserve bandwidth or hand, IPsec-based (Internet Protocol Security, a security to specify network pathways. End-to-end quality of service protocol from IETF) VPNs (Virtual Private Networks) use a guarantees, however, may exceed the cost of circuit tunneling scheme in which the outer source IP address is Switched technologies, such as dialup modems, especially based on a CoA at the point-of-attachment and an inner where the high quality needs are intermittent. source IP address assigned for the “home' domain. In 0005 Internet usage typically involves an Internet server, general if either address is changed, such as when the mobile an automated system capable of responding to communica node Switches IP subnets, then a new tunnel is negotiated tions received through the Internet, and often communicat with new keys and several round trip message exchanges. ing with other systems not directly connected to the Internet. The renegotiation of the tunnel interferes with seamless The server typically has relatively large bandwidth to the mobility across wired and wireless IP networks spanning Internet, allowing multiple simultaneous communications multiple IP subnets. sessions, and usually Supports the hypertext transport pro tocol (HTTP), which provides, in conjunction with a so 0009 Market Economy Systems called web browser on a remote client system, a human 0010. In modem retail transactions, predetermined price readable interface which facilitates navigation of various transactions are common, with market transactions, i.e., resources available in the Internet. The client systems are commerce conducted in a setting which allows the transac typically human user interfaces, which employ a browser to tion price to float based on the respective valuation allocated display HTTP “web pages”. The browser typically does not by the buyer(s) and seller(s), often left to specialized fields. provide intelligence. Bandwidth between the client and While interpersonal negotiation is often used to set a transfer Internet is typically relatively small, and various communi price, this price is often different from a transfer price that US 2006/0167784 A1 Jul.
Recommended publications
  • PEER Stage2 10.1016%2Fj.Jebo.2
    Leveraging Resistance to Change and the Skunk Works Model of Innovation Andrea Fosfuri, Thomas Rønde To cite this version: Andrea Fosfuri, Thomas Rønde. Leveraging Resistance to Change and the Skunk Works Model of Innovation. Journal of Economic Behavior and Organization, Elsevier, 2009, 72 (1), pp.274. 10.1016/j.jebo.2009.05.008. hal-00699208 HAL Id: hal-00699208 https://hal.archives-ouvertes.fr/hal-00699208 Submitted on 20 May 2012 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Accepted Manuscript Title: Leveraging Resistance to Change and the Skunk Works Model of Innovation Authors: Andrea Fosfuri, Thomas Rønde PII: S0167-2681(09)00136-X DOI: doi:10.1016/j.jebo.2009.05.008 Reference: JEBO 2395 To appear in: Journal of Economic Behavior & Organization Received date: 14-8-2007 Revised date: 4-5-2009 Accepted date: 6-5-2009 Please cite this article as: Fosfuri, A., Rønde, T., Leveraging Resistance to Change and the Skunk Works Model of Innovation, Journal of Economic Behavior and Organization (2008), doi:10.1016/j.jebo.2009.05.008 This is a PDF file of an unedited manuscript that has been accepted for publication.
    [Show full text]
  • BLACK HOLES: the OTHER SIDE of INFINITY General Information
    BLACK HOLES: THE OTHER SIDE OF INFINITY General Information Deep in the middle of our Milky Way galaxy lies an object made famous by science fiction—a supermassive black hole. Scientists have long speculated about the existence of black holes. German astronomer Karl Schwarzschild theorized that black holes form when massive stars collapse. The resulting gravity from this collapse would be so strong that the matter would become more and more dense. The gravity would eventually become so strong that nothing, not even radiation moving at the speed of light, could escape. Schwarzschild’s theories were predicted by Einstein and then borne out mathematically in 1939 by American astrophysicists Robert Oppenheimer and Hartland Snyder. WHAT EXACTLY IS A BLACK HOLE? First, it’s not really a hole! A black hole is an extremely massive concentration of matter, created when the largest stars collapse at the end of their lives. Astronomers theorize that a point with infinite density—called a singularity—lies at the center of black holes. SO WHY IS IT CALLED A HOLE? Albert Einstein’s 1915 General Theory of Relativity deals largely with the effects of gravity, and in essence predicts the existence of black holes and singularities. Einstein hypothesized that gravity is a direct result of mass distorting space. He argued that space behaves like an invisible fabric with an elastic quality. Celestial bodies interact with this “fabric” of space-time, appearing to create depressions termed “gravity wells” and drawing nearby objects into orbit around them. Based on this principle, the more massive a body is in space, the deeper the gravity well it will create.
    [Show full text]
  • Closed Timelike Curves, Singularities and Causality: a Survey from Gödel to Chronological Protection
    Closed Timelike Curves, Singularities and Causality: A Survey from Gödel to Chronological Protection Jean-Pierre Luminet Aix-Marseille Université, CNRS, Laboratoire d’Astrophysique de Marseille , France; Centre de Physique Théorique de Marseille (France) Observatoire de Paris, LUTH (France) [email protected] Abstract: I give a historical survey of the discussions about the existence of closed timelike curves in general relativistic models of the universe, opening the physical possibility of time travel in the past, as first recognized by K. Gödel in his rotating universe model of 1949. I emphasize that journeying into the past is intimately linked to spacetime models devoid of timelike singularities. Since such singularities arise as an inevitable consequence of the equations of general relativity given physically reasonable assumptions, time travel in the past becomes possible only when one or another of these assumptions is violated. It is the case with wormhole-type solutions. S. Hawking and other authors have tried to save the paradoxical consequences of time travel in the past by advocating physical mechanisms of chronological protection; however, such mechanisms remain presently unknown, even when quantum fluctuations near horizons are taken into account. I close the survey by a brief and pedestrian discussion of Causal Dynamical Triangulations, an approach to quantum gravity in which causality plays a seminal role. Keywords: time travel; closed timelike curves; singularities; wormholes; Gödel’s universe; chronological protection; causal dynamical triangulations 1. Introduction In 1949, the mathematician and logician Kurt Gödel, who had previously demonstrated the incompleteness theorems that broke ground in logic, mathematics, and philosophy, became interested in the theory of general relativity of Albert Einstein, of which he became a close colleague at the Institute for Advanced Study at Princeton.
    [Show full text]
  • Light Rays, Singularities, and All That
    Light Rays, Singularities, and All That Edward Witten School of Natural Sciences, Institute for Advanced Study Einstein Drive, Princeton, NJ 08540 USA Abstract This article is an introduction to causal properties of General Relativity. Topics include the Raychaudhuri equation, singularity theorems of Penrose and Hawking, the black hole area theorem, topological censorship, and the Gao-Wald theorem. The article is based on lectures at the 2018 summer program Prospects in Theoretical Physics at the Institute for Advanced Study, and also at the 2020 New Zealand Mathematical Research Institute summer school in Nelson, New Zealand. Contents 1 Introduction 3 2 Causal Paths 4 3 Globally Hyperbolic Spacetimes 11 3.1 Definition . 11 3.2 Some Properties of Globally Hyperbolic Spacetimes . 15 3.3 More On Compactness . 18 3.4 Cauchy Horizons . 21 3.5 Causality Conditions . 23 3.6 Maximal Extensions . 24 4 Geodesics and Focal Points 25 4.1 The Riemannian Case . 25 4.2 Lorentz Signature Analog . 28 4.3 Raychaudhuri’s Equation . 31 4.4 Hawking’s Big Bang Singularity Theorem . 35 5 Null Geodesics and Penrose’s Theorem 37 5.1 Promptness . 37 5.2 Promptness And Focal Points . 40 5.3 More On The Boundary Of The Future . 46 1 5.4 The Null Raychaudhuri Equation . 47 5.5 Trapped Surfaces . 52 5.6 Penrose’s Theorem . 54 6 Black Holes 58 6.1 Cosmic Censorship . 58 6.2 The Black Hole Region . 60 6.3 The Horizon And Its Generators . 63 7 Some Additional Topics 66 7.1 Topological Censorship . 67 7.2 The Averaged Null Energy Condition .
    [Show full text]
  • Variational Principles in Models of Behavioral Sciences
    VARIATIONAL PRINCIPLES IN MODELS OF BEHAVIORAL SCIENCES T. Q. BAO1, B. S. MORDUKHOVICH2 and A. SOUBEYRAN3 Abstract. This paper develops some mathematical models arising in behavioral sciences, particularly in psychology, which are formalized via general preferences with variable ordering structures. Our considerations are based on the recent “variational rationality approach” that unifies numerous theories in different branches of behavioral sciences by using, in particular, worthwhile change and stay dynamics and variational traps. In the mathematical framework of this approach, we derive a new variational principle, which can be viewed as an extension of the Ekeland variational principle to the case of set-valued mappings on quasimetric spaces with cone-valued ordering variable structures. Such a general setting is proved to be appropriate for broad applications to the functioning of goal systems in psychology, which are developed in the paper. In this way we give a certain answer to the following striking question: in the world, where all things change (preferences, motivations, resistances, etc.), where goal systems drive a lot of entwined course pursuits between means and ends—what can stay fixed for a while? The obtained mathematical results and new insights open the door to developing powerful models of adaptive behavior, which strongly depart from pure static general equilibrium models of the Walrasian type that are typical in economics. Mathematics Subject Classification: 49J53, 90C29, 93J99 Key words: variable ordering structures, multiobjective optimization, variable preferences, variational principles, variational rationality, stability and change dynamics, variational traps 1 Introduction and Motivations In this introductory section, we first describe the major features of some stability/stay and change dynamical models in behavioral sciences and the essence of the “variational rationality” approach to them.
    [Show full text]
  • Stable Wormholes in the Background of an Exponential F (R) Gravity
    universe Article Stable Wormholes in the Background of an Exponential f (R) Gravity Ghulam Mustafa 1, Ibrar Hussain 2,* and M. Farasat Shamir 3 1 Department of Mathematics, Shanghai University, Shanghai 200444, China; [email protected] 2 School of Electrical Engineering and Computer Science, National University of Sciences and Technology, H-12, Islamabad 44000, Pakistan 3 National University of Computer and Emerging Sciences, Lahore Campus, Punjab 54000, Pakistan; [email protected] * Correspondence: [email protected] Received: 21 January 2020; Accepted: 3 March 2020; Published: 26 March 2020 Abstract: The current paper is devoted to investigating wormhole solutions with an exponential gravity model in the background of f (R) theory. Spherically symmetric static spacetime geometry is chosen to explore wormhole solutions with anisotropic fluid source. The behavior of the traceless matter is studied by employing a particular equation of state to describe the important properties of the shape-function of the wormhole geometry. Furthermore, the energy conditions and stability analysis are done for two specific shape-functions. It is seen that the energy condition are to be violated for both of the shape-functions chosen here. It is concluded that our results are stable and realistic. Keywords: wormholes; stability; f (R) gravity; energy conditions 1. Introduction The discussion on wormhole geometry is a very hot subject among the investigators of the different modified theories of gravity. The concept of wormhole was first expressed by Flamm [1] in 1916. After 20 years, Einstein and Rosen [2] calculated the wormhole geometry in a specific background. In fact, it was the second attempt to realize the basic structure of wormholes.
    [Show full text]
  • Weyl Metrics and Wormholes
    Prepared for submission to JCAP Weyl metrics and wormholes Gary W. Gibbons,a;b Mikhail S. Volkovb;c aDAMTP, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK bLaboratoire de Math´ematiqueset Physique Th´eorique,LMPT CNRS { UMR 7350, Universit´ede Tours, Parc de Grandmont, 37200 Tours, France cDepartment of General Relativity and Gravitation, Institute of Physics, Kazan Federal University, Kremlevskaya street 18, 420008 Kazan, Russia E-mail: [email protected], [email protected] Abstract. We study solutions obtained via applying dualities and complexifications to the vacuum Weyl metrics generated by massive rods and by point masses. Rescal- ing them and extending to complex parameter values yields axially symmetric vacuum solutions containing singularities along circles that can be viewed as singular mat- ter sources. These solutions have wormhole topology with several asymptotic regions interconnected by throats and their sources can be viewed as thin rings of negative tension encircling the throats. For a particular value of the ring tension the geometry becomes exactly flat although the topology remains non-trivial, so that the rings liter- ally produce holes in flat space. To create a single ring wormhole of one metre radius one needs a negative energy equivalent to the mass of Jupiter. Further duality trans- formations dress the rings with the scalar field, either conventional or phantom. This gives rise to large classes of static, axially symmetric solutions, presumably including all previously known solutions for a gravity-coupled massless scalar field, as for exam- ple the spherically symmetric Bronnikov-Ellis wormholes with phantom scalar. The multi-wormholes contain infinite struts everywhere at the symmetry axes, apart from arXiv:1701.05533v3 [hep-th] 25 May 2017 solutions with locally flat geometry.
    [Show full text]
  • Report of Contributions
    Conference on Mechanism and Institution Design 2020 (CMID20) Report of Contributions https://conference2.aau.at/e/CMID20 Conference on M … / Report of Contributions Life cycle of startup financing Contribution ID: 14 Type: not specified Life cycle of startup financing Thursday, 11 June 2020 00:00 (1 hour) Presenter: BOYARCHENKO, Svetlana September 27, 2021 Page 1 Conference on M … / Report of Contributions Manipulation of Attractiveness in … Contribution ID: 15 Type: not specified Manipulation of Attractiveness in Two-Sided Stable Matches Thursday, 11 June 2020 01:00 (1 hour) Presenter: SARAIVA, Gustavo September 27, 2021 Page 2 Conference on M … / Report of Contributions A strategic tax mechanism Contribution ID: 16 Type: not specified A strategic tax mechanism Thursday, 11 June 2020 09:00 (1 hour) Presenter: STAMATOPOULOS, Georgios September 27, 2021 Page 3 Conference on M … / Report of Contributions Confidence Management in Tourn … Contribution ID: 17 Type: not specified Confidence Management in Tournaments Presenter: WU, Zenan September 27, 2021 Page 4 Conference on M … / Report of Contributions Implementation in undominated st … Contribution ID: 18 Type: not specified Implementation in undominated strategies with applications to economic environments Thursday, 11 June 2020 07:00 (1 hour) Presenter: MUKHERJEE, Saptarshi September 27, 2021 Page 5 Conference on M … / Report of Contributions Stable Doctor-Hospital Matching … Contribution ID: 19 Type: not specified Stable Doctor-Hospital Matching Mechanisms under Distributional and Hierarchical
    [Show full text]
  • Quantum Fluctuations and Thermodynamic Processes in The
    Quantum fluctuations and thermodynamic processes in the presence of closed timelike curves by Tsunefumi Tanaka A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Physics Montana State University © Copyright by Tsunefumi Tanaka (1997) Abstract: A closed timelike curve (CTC) is a closed loop in spacetime whose tangent vector is everywhere timelike. A spacetime which contains CTC’s will allow time travel. One of these spacetimes is Grant space. It can be constructed from Minkowski space by imposing periodic boundary conditions in spatial directions and making the boundaries move toward each other. If Hawking’s chronology protection conjecture is correct, there must be a physical mechanism preventing the formation of CTC’s. Currently the most promising candidate for the chronology protection mechanism is the back reaction of the metric to quantum vacuum fluctuations. In this thesis the quantum fluctuations for a massive scalar field, a self-interacting field, and for a field at nonzero temperature are calculated in Grant space. The stress-energy tensor is found to remain finite everywhere in Grant space for the massive scalar field with sufficiently large field mass. Otherwise it diverges on chronology horizons like the stress-energy tensor for a massless scalar field. If CTC’s exist they will have profound effects on physical processes. Causality can be protected even in the presence of CTC’s if the self-consistency condition is imposed on all processes. Simple classical thermodynamic processes of a box filled with ideal gas in the presence of CTC’s are studied. If a system of boxes is closed, its state does not change as it travels through a region of spacetime with CTC’s.
    [Show full text]
  • Strategy Evolution and Resolution Deduction in Diplomacy
    957 2005 003 Strategy Evolution and Resolution Deduction in Diplomacy Berto Booijink Li Strategy Evolution and Resolution Deduction in Diplomacy Berto Booijink May 2005 Master's thesis Artificial Intelligence University of Groningen Supervisor: Dr. LC. Verbrugge RuG Referee: Prof. Dr. L.R.B. Schomaker Abstract A translation of this abstract in Dutch starts on the next page. Diplomacy is a strategic game for seven players. Each player represents a European empire in the early years of the twentieth century with which he tries to conquer Europe. The players have the disposal of armies and fleets (units) to achieve this goal. The game proceeds in rounds. Each round all players simultaneously reveal orders for their units. All orders together deter- mine which are actually carried out and which are not; orders may hinder or support other orders. Usually, Diplomacy players have the opportunity to negotiate with each other. This work focuses on a variant of Diplomacy, no-press, in which negotiation is not allowed. Game theory is a research area in artificial intelligence that investigates the interaction be- tween human beings. Party games provide an excellent domain for such research. Games with large search spaces are particularly interesting. Diplomacy surpasses even Go in this regard, so classic search algorithms do not stand a chance in Diplomacy. More intelligent techniques are required to fathom Diplomacy. This work aims at logic-based Diplomacy order processing and at evolutionary Diplomacy strategy forming. To this length the goal is to develop a logic-based resolution model and an evolutionary player model with the following specifications: the resolution model must determine the correct board state, resulting from any set of orders, within insignificantly small response times, compared to those of human players.
    [Show full text]
  • 5306 Strategic Game Theory for Managers
    -1- Australian Graduate School of Management 5306 STRATEGIC GAME THEORYFOR MANAGERS Mngt 5306 Term 3, 2009 R.E. Marks Lectures: in HDR on Wed, Fri @ 11:00 Ext. 19271, Room AGSM 118 www.agsm.edu.au/bobm/teaching/SGTM.html [email protected] Reading/Reference List & Course Outline Game theory provides a simple, but rich, framework for analysing once-off and repeated interplay between people or firms, where the manner in which each reacts depends upon the other’sreaction: strategic interaction. These interactions occur in markets, in organisations, and in the household. This course—through lectures, experiential learning, and computer simulations—will attempt to provide students with understanding of many interactions they may encounter as managers, including price wars, wars of attrition, the value of cooperation interactions, and the value of information. Outline of course: Lecture Topic 1Intro duction and General principles 2,3 Simultaneous-Move Games I 4Games with Sequential Moves 5Simultaneous-Move Games II 6Combining Sequential and Simultaneous 7−10 Decision Analysis: Games Against Nature 11 Mixed Strategies and Unpredictability 12, 13 Uncertainty and Information In-class midterm exam. (Oct. 30) 14 Strategic Moves, Credibility,and Commitment 15, 16 The Prisoner’sDilemma and Repetition 17 Bargaining 18 Bidding and Auction Design 19 Contracting —Employing, Financing, Franchising 20,21 Choosing the Right Game: Co-opetition 22,23 Student presentations Recommended text: Dixit A., & Skeath S., Games of Strategy, New York: Norton: 3rd edition, 2009. Buy this for the exercises and the elucidation of theory from the lectures. -2- As well, the following books might be found useful: Dixit A., & Nalebuff B., The Art of Strategy: A Game Theorist’sGuide to Success in Business and Life, NY:Norton, 2008.
    [Show full text]
  • Resource Constrained Adaptive Sensing
    RESOURCE CONSTRAINED ADAPTIVE SENSING by Raghuram Rangarajan A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical Engineering: Systems) in The University of Michigan 2007 Doctoral Committee: Professor Alfred O. Hero III, Chair Professor Jeffrey A. Fessler Professor Susan A. Murphy Professor Demosthenis Teneketzis Assistant Professor Clayton Scott c Raghuram Rangarajan 2007 All Rights Reserved To my mom, my dad, and my brother ii ACKNOWLEDGEMENTS I would like to extend my sincere thanks and deepest gratitude to Professor Alfred Hero for his invaluable guidance, encouragement, and patience during the course of my research. Through the years, I have come to admire Professor Hero’s vast knowledge and deep insight on any scientific field, creativity in problem solving, and his exceptional time management skills. I consider myself extremely lucky to have found an advisor in Professor Alfred Hero and his attributes will definitely exert a great influence in all my future endeavors. My sincere thanks and gratitude also goes to Raviv Raich, with whom I have collaborated on many of my research topics. His invaluable inputs on my research and his ability to breakdown problems have helped me find solutions much quicker and more efficiently. It has also been an absolute pleasure interacting with him on a day-to-day basis for the last 3 years on many other topics of research and life in general. I am grateful to my committee members Professor Jeffrey Fessler, Professor Susan Murphy, Professor Demosthenis Teneketzis, and Professor Clayton Scott for their valuable input on my work and their helpful comments on my dissertation.
    [Show full text]