Chapter 12.V)

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 12.V) ARTICLE IN PRESS Levels of Reasoning in Keynesian Beauty Contests: A Generative Framework✶ Felix Mauersberger∗, Rosemarie Nagel†,1 ∗Department of Economics and Business, Universitat Pompeu Fabra, Barcelona GSE, Barcelona, Spain †Department of Economics and Business, Universitat Pompeu Fabra, Barcelona GSE, ICREA, Barcelona, Spain 1Corresponding author: e-mail address: [email protected] CONTENTS 1 Introduction ....................................................................................... 543 2 An Overview of Experimental Economics ..................................................... 547 2.1 Experimental Economics Areas with Archetypal Games and Markets ....... 547 2.1.1 Public Good Provision ............................................................ 549 2.1.2 Bargaining .......................................................................... 550 2.1.3 Coordination Games .............................................................. 551 2.1.4 Industrial Organization ........................................................... 552 2.1.5 Asset Markets ...................................................................... 553 2.1.6 Auctions ............................................................................. 554 2.2 New Questions and Areas Since the Late 90s .................................. 557 2.3 Boundedly Rational Models........................................................ 559 3 The Keynesian Beauty Contest: A Generative Framework for Archetypal Games in Economics ......................................................................................... 562 3.1 The Beauty Contest as a Canonical Formulation ............................... 563 3.2 Continuous Strategy Space ........................................................ 567 3.2.1 Games of Strategic Substitutes ................................................. 568 3.2.2 Games of Strategic Complements.............................................. 569 ✶ We thank Larbi Alaoui, Jess Benhabib, Antoni Bosch, Pablo Brañas-Garza, Christoph Bühren, Antonio Cabrales, Gabriele Camera, John Duffy, Björn Frank, Willemien Kets, Anita Kopanyi-Peuker, Kiminori Matsuyama, Shabnam Mousavi, Mechthild Nagel, Antonio Penta, Michael Reiter, Ricardo Serrano-Padial, Edouard Schaal, Shyam Sunder, Michael Woodford, three anonymous referees, and the editor Cars Hommes for valuable comments. For financial support we both thank the Barcelona GSE; Felix Mauers- berger acknowledges the FPI grant from the Spanish Ministry of Science and Innovation and Rosemarie Nagel the grant MINECO-ECO2014-56154-R from the Spanish Ministry of Education. Handbook of Computational Economics, ISSN 1574-0021, https://doi.org/10.1016/bs.hescom.2018.05.002 Copyright © 2018 Elsevier B.V. All rights reserved. 541 ARTICLE IN PRESS 542 Levels of Reasoning in Keynesian Beauty Contests 3.2.3 Public and Private Information ................................................. 572 3.2.4 Other Games ....................................................................... 572 3.3 Discrete Strategy Space and Multiplicity ........................................ 573 3.3.1 Strategic Complements........................................................... 573 3.3.2 Strategic Substitutes .............................................................. 576 3.3.3 Matching ............................................................................ 577 3.3.4 Strategic Heterogeneity........................................................... 578 3.4 Other Dimensions ................................................................... 579 3.4.1 Game Structure .................................................................... 579 3.4.2 Experimental Implementation................................................... 581 4 Behavioral Regularities in BC-Experiments and Level-k ................................... 582 4.1 The Basic BC Experiment .......................................................... 583 4.1.1 First Period Choices............................................................... 583 4.1.2 The Level-k Model and Related Models ...................................... 583 4.1.3 Behavior over Time in the Basic BC Game ................................... 589 4.1.4 Heterogeneity of Subject Pools in Lab- and Field-BC Games ............ 590 4.1.5 Two Person Games................................................................ 592 4.1.6 Mixing Experienced with Inexperienced Subjects........................... 594 4.1.7 Strategic Substitutes vs. Strategic Complements............................ 595 4.2 De-Framing the Rules to (De-)Anchor Beliefs ................................... 595 4.2.1 Interior Equilibrium................................................................ 597 4.2.2 Public and Private Information – Anchoring Beliefs ........................ 598 4.2.3 Stochastic Common Shocks..................................................... 601 4.3 Multiple Equilibria (BC Game with b = 1) ....................................... 603 4.3.1 Minimum Effort Game ............................................................ 603 4.3.2 Public and Private Signals ....................................................... 604 4.3.3 Global Games ...................................................................... 605 4.3.4 Ultimatum Games (Played in Extensive Form) .............................. 607 4.4 Auction in the Laboratory and the Field ......................................... 609 4.5 Other Games with Discrete Strategy Spaces .................................... 610 4.5.1 A Ring Game – Spatial Reasoning ............................................. 610 4.5.2 Schelling Matching................................................................ 610 4.5.3 Mixed Equilibrium Games in Lab and Field .................................. 611 5 Elicitation Methods .............................................................................. 612 5.1 Strategy (Vector) Method ........................................................... 613 5.2 Response Time (RT)................................................................. 615 5.3 Mouselab, Eye-Tracking ............................................................ 616 5.4 Continuous Time Decision-Making................................................ 616 5.5 Written Comments, Chats, and Other Communication Tools, Team Decisions ............................................................................. 616 5.6 Asking for Guesses .................................................................. 617 5.7 Personal Characteristics and Training ........................................... 617 5.8 Neuroeconomics..................................................................... 618 6 Discussion ......................................................................................... 620 References............................................................................................ 623 ARTICLE IN PRESS 1 Introduction 543 “Because of the success of science, there is a kind of a pseudo-science. Social science is an example of a science which is not a science. They follow the forms. You gather data, you do so and so and so forth, but they don’t get any laws, they haven’t found out anything. They haven’t got anywhere – yet. Maybe someday they will, but it’s not very well developed.” (Richard Feynman, radio interview, 1981) “[This] is the principal problem of classical economics: how is the absolutely selfish ‘homo economicus’ going to act under given external circumstances?” (John von Neumann, 1932) 1 INTRODUCTION Aiming to improve the design of cockpits, US Air Force researchers in 1950 obtained body measures from 4063 pilots, containing 140 dimensions from size to thumb length. For every dimension, the “approximate average” was defined as 0.3 times the standard deviation above or below the sample mean. For the ten most vital di- mensions, between 990 (waist circumference) and 1713 (neck circumference) pilots belonged to the average defined this way. However, not a single pilot was “approx- imately average” with respect to all ten dimensions. Not only did the average pilot simply not exist, Daniels (1952) concluded that “the ‘average man’ is a misleading and illusory concept.” As prominently argued by Kirman (1992), the “reduction of the behavior of a group of heterogeneous agents even if they are all themselves utility maximizers, is not simply an analytical convenience as often explained, but is both unjustified and leads to conclusions which are usually misleading and often wrong.” This chapter shows that laboratory experiments can be used as an effective tool to uncover the usually rich heterogeneity of behavioral responses. For our context, we define heterogeneity as the existence of several distinct types which have to be described using various specifications with different parameters or even different functional forms. Homogeneity, in contrast, means that all agents can be defined by the same specification. It is important to distinguish between heterogeneity and ran- domness: heterogeneity points to systematic differences in a specification, so that at least one structural parameter differs across the population. A situation where the population can be described by the same specification and differences only come from random draws from a well-defined distribution may more accurately be de- scribed by randomness. We distinguish two dimensions of heterogeneity: firstly related to situations; and secondly related to behavior across games and within a game. While there is a myr- iad of different
Recommended publications
  • A Class of N-Player Colonel Blotto Games with Multidimensional Private Information
    University of Zurich Department of Economics Working Paper Series ISSN 1664-7041 (print) ISSN 1664-705X (online) Working Paper No. 336 A Class of N-Player Colonel Blotto Games with Multidimensional Private Information Christian Ewerhart and Dan Kovenock Revised version, February 2021 A Class of N-Player Colonel Blotto Games With Multidimensional Private Information Christian Ewerhart Dan Kovenocky Department of Economics Economic Science Institute University of Zurich Chapman University Revised version: February 1, 2021 Abstract. In this paper, we study N-player Colonel Blotto games with incomplete information about battlefield valuations. Such games arise in job markets, research and development, electoral competition, security analysis, and conflict resolution. For M N + 1 battlefields, we identify a Bayes-Nash equilibrium in which the resource ≥ allocation to a given battlefield is strictly monotone in the valuation of that battlefield. We also explore extensions such as heterogeneous budgets, the case M N, full-support ≤ type distributions, and network games. Keywords. Colonel Blotto games Private information Bayes-Nash equilibrium · · · Generalized Dirichlet distributions Networks · *) Corresponding author. Postal address: Schönberggasse 1, 8001 Zurich, Switzerland. E-mail address: [email protected]. ) E-mail address: [email protected]. y 1 Introduction In a Colonel Blotto game, players simultaneously and independently allocate their en- dowments of a resource across a set of battlefields. The player that deploys the largest amount of the resource to a given battlefield scores a win and enjoys a gain in utility equivalent to her valuation of that battlefield. Thus, a player’s utility corresponds to the sum of the valuations of all battlefields won by the player.
    [Show full text]
  • Campaigning Is Hard but Approximately Manageable
    Computational Analyses of the Electoral College: Campaigning Is Hard But Approximately Manageable Sina Dehghani,1 Hamed Saleh,2 Saeed Seddighin,3 Shang-Hua Teng4 1 Institute for Research in Fundamental Sciences 2 University of Maryland 3 TTIC 4 University of Southern California [email protected], [email protected], [email protected], [email protected] Abstract Electoral College, Political Campaigns, and In the classical discrete Colonel Blotto game—introduced Multi-Battleground Resource Allocation by Borel in 1921—two colonels simultaneously distribute their troops across multiple battlefields. The winner of each The president of the United States is elected by the Electoral battlefield is determined by a winner-take-all rule, indepen- College, which consists of electors selected based on 51 con- dently of other battlefields. In the original formulation, each current elections. The number of electors each of the 50 colonel’s goal is to win as many battlefields as possible. The states and D. C. can select is determined every 10 years by Blotto game and its extensions have been used in a wide the United States Census. All but two states1 use a winner- range of applications from political campaign—exemplified take-all system, and in typical election without any third- by the U.S presidential election—to marketing campaign, party candidate, the ticket that wins the majority votes in the from (innovative) technology competition to sports compe- state earns the right to have their slate of electors from that tition. Despite persistent efforts, efficient methods for find- state chosen to vote in the Electoral College. Thus, in prin- ing the optimal strategies in Blotto games have been elu- sive for almost a century—due to exponential explosion in ciple, the team that receives the majority of electoral votes the organic solution space—until Ahmadinejad, Dehghani, wins the race and its main candidate is elected as president.
    [Show full text]
  • Lowest Unique Bid Auctions with Signals
    Lowest Unique Bid Auctions with Signals 1,2, Andrea Gallice 1 Department of Economics and Statistics, University of Torino, Corso Unione Sovietica 218bis, 10134, Torino, Italy 2 Collegio Carlo Alberto, Via Real Collegio 30, 10024, Moncalieri, Italy. Abstract A lowest unique bid auction allocates a good to the agent who submits the lowest bid that is not matched by any other bid. This peculiar mechanism recently experi- enced a surge in popularity on the Internet. We study lowest unique bid auctions from a theoretical point of view and show that in equilibrium the mechanism is unprofitable for the seller unless there exist sizeable gains from trade. But we also show that it can become highly lucrative if some bidders are myopic. In this second case, we analyze the key role played by a number of private signals bidders receive about the current status of the bids they submitted. JEL Classification: D44, C72. Keywords: Lowest unique bid auctions; pay-per-bid auctions; signals. I would like to thank Luca Anderlini, Paolo Ghirardato, Harold Houba, Clemens König, Ignacio Monzon, Amnon Rapoport, Yaron Raviv, Eilon Solan and Dmitri Vinogradov for useful comments as well as seminar participants at the Collegio Carlo Alberto, University of Siena, SMYE conference (Is- tanbul), BEELab-LabSi workshop (Florence), SED Conference on Economic Design (Maastricht), SIE meeting (Rome) and the University of Cagliari for helpful discussion. I also acknowledge able research assistantship from Susanna Calimani. All errors are mine. Contacts: [email protected]; telephone: +390116705287; fax: +390116705082. 1 1 Introduction A new wave of websites has been intriguing consumers on the Internet over the very last few years.
    [Show full text]
  • Prophylaxy Copie.Pdf
    Social interactions and the prophylaxis of SI epidemics on networks Géraldine Bouveret, Antoine Mandel To cite this version: Géraldine Bouveret, Antoine Mandel. Social interactions and the prophylaxis of SI epi- demics on networks. Journal of Mathematical Economics, Elsevier, 2021, 93, pp.102486. 10.1016/j.jmateco.2021.102486. halshs-03165772 HAL Id: halshs-03165772 https://halshs.archives-ouvertes.fr/halshs-03165772 Submitted on 17 Mar 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Social interactions and the prophylaxis of SI epidemics on networkssa G´eraldineBouveretb Antoine Mandel c March 17, 2021 Abstract We investigate the containment of epidemic spreading in networks from a nor- mative point of view. We consider a susceptible/infected model in which agents can invest in order to reduce the contagiousness of network links. In this setting, we study the relationships between social efficiency, individual behaviours and network structure. First, we characterise individual and socially efficient behaviour using the notions of communicability and exponential centrality. Second, we show, by computing the Price of Anarchy, that the level of inefficiency can scale up to lin- early with the number of agents.
    [Show full text]
  • Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
    Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game Yongle Wu, Beibei Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742, USA. {wuyl, bebewang, kjrliu}@umd.edu Abstract—Cognitive radio technologies have become a promis- adversaries. So far, there have been only a few papers regard- ing approach to increase the efficiency of spectrum utilization. ing security issues. For instance, the primary user emulation Although cognitive radio has been intensively studied in recent attack was described and a transmitter verification scheme was years, only a few works have discussed security aspects. In this paper, we focus on the jamming attack, one of major threats to proposed to test whether the given signal came from a primary cognitive radio networks, where a malicious user wants to jam user in [8]; [9] employed a Hammer model to identify, analyze the communications of secondary users by injecting interference. and assess denial of service attacks; in [10], security issues Aware of the absence of several primary users and the presence of the IEEE 802.22 standard were addressed; [11] discussed of a malicious user, a secondary user can allocate power to those an attack that malicious users attempted to affect an artificial- fallow bands with a randomized strategy, in hope of alleviating the damage caused by the malicious user. We model this scenario intelligence-based secondary user’s behavior by misleading the into a two-player zero-sum game, and derive its unique Nash learning process. Equilibrium under certain conditions using the Colonel Blotto In this paper, we mainly focus on one kind of malicious at- game approach, which provides a minimax strategy that the tacks in cognitive radio networks, namely, the jamming attack secondary user should adopt in order to minimize the worst- [12], where a malicious user, or the “jammer”, wants to prevent case damage caused by the malicious user.
    [Show full text]
  • 0<GFGEB<J &&%, 5GDBKB<:D 0<GFGEO 11
    Economics 221: Political Economy II Winter 2006-2007 Professor Matthew Jackson Oce: 241; Phone: 723-3544 Email: [email protected] Web site: http://www.stanford.edu/ jacksonm Overview: This course examines political processes and the studies how the design of political in- stitutions a ect societal welfare and economic outcomes. The course starts by examining the motivations for and challenges of forming political states and institutions, and how the structure and workings of political institutions a ect economic outcomes and societal welfare. Topics include: the origins of states, anarchy and the social contract, liberalism, wars and arms races, constitutional design, federalism, models of strategic voting behavior, asymme- tries of information and voting behavior, agenda formation and control, logrolling, lobbying, vote-buying and political in uence, nomination processes, and the politics of federations of states. Prerequisite: Economics 220. Requirements: You will be continuing the work on the projects that you began in Economics 220. This will involve re ning a model and producing some results if the problem you proposed in 220 was theoretical in nature, and if the work is empirical, then you should begin or continue your analysis of data. There will be several di erent due dates of updates on the project. The projects will be judged based on the progress made past what was completed in 220. In the latter part of the course, there will also be student presentations and discussions of some of the papers. A note on the readings and class discussions: Reading the papers before class is critical to the course, as much of the emphasis of the course will not only be on \what" the papers tell us, but also on \why" these are interesting issues and \how" the research was conducted.
    [Show full text]
  • Statistical GGP Game Decomposition Aline Hufschmitt, Jean-Noël Vittaut, Nicolas Jouandeau
    Statistical GGP Game Decomposition Aline Hufschmitt, Jean-Noël Vittaut, Nicolas Jouandeau To cite this version: Aline Hufschmitt, Jean-Noël Vittaut, Nicolas Jouandeau. Statistical GGP Game Decomposition. Computer Games - 7th Workshop, CGW 2018, Held in Conjunction with the 27th International Con- ference on Artificial Intelligence, IJCAI 2018, Jul 2018, Stockholm, Sweden. pp.79-97, 10.1007/978- 3-030-24337-1_4. hal-02182443 HAL Id: hal-02182443 https://hal.archives-ouvertes.fr/hal-02182443 Submitted on 15 Oct 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. In Proceedings of the IJCAI-18 Workshop on Computer Games (CGW 2018) Statistical GGP Game Decomposition Aline Hufschmitt, Jean-No¨elVittaut, and Nicolas Jouandeau LIASD - University of Paris 8, France falinehuf,jnv,[email protected] Abstract. This paper presents a statistical approach for the decompo- sition of games in the General Game Playing framework. General game players can drastically decrease game search cost if they hold a decom- posed version of the game. Previous works on decomposition rely on syn- tactical structures, which can be missing from the game description, or on the disjunctive normal form of the rules, which is very costly to compute.
    [Show full text]
  • Common Belief Foundations of Global Games∗
    Common Belief Foundations of Global Games Stephen Morris Hyun Song Shin Muhamet Yildiz Princeton University Bank of International Settlements M.I.T. January 2015 Abstract Complete information games– i.e., games where there is common certainty of payoffs– often have multiple rationalizable actions. What happens if the common certainty of payoffs assumption is relaxed? Consider a two player game where a player’spayoff depends on a payoff parameter. Define a player’s"rank belief" as the probability he assigns to his payoff parameter being higher than his opponent’s. We show that there is a unique rationalizable action played when there is common certainty of rank beliefs, and we argue this is the driving force behind selection results in the global games literature. We consider what happens if players’payoff parameters are derived from common and idiosyncratic terms with fat tailed distributions, and we approach complete information by shrinking the distribution of both terms. There are two cases. If the common component has a thicker tails, then there is common certainty of rank beliefs, and thus uniqueness and equilibrium selection. If the idiosyncratic terms has thicker tails, then there is approximate common certainty of payoffs, and thus multiple rationalizable actions. 1 Introduction Complete information games often have many equilibria. Even when they have a single equilibrium, they often have many actions that are rationalizable, and are therefore consistent with common This paper incorporates material from a working paper of the same title circulated in 2009 (Morris and Shin (2009)). We are grateful for comments from seminar participants at Northwestern on this iteration of the project.
    [Show full text]
  • Generalizations on the Colonel Blotto Game
    Generalizations on the Colonel Blotto Game Dan Kovenock∗and Brian Robersony Abstract In this paper we characterize the equilibrium in a relaxed version of the Colonel Blotto game in which battlefield valuations maybe heterogeneous across battlefields and asymmetric across players and the, possibly asymmetric, budget constraints hold only on average, and then show how this characterization partially extends to the full Colonel Blotto game, in which the budget constraints must be satisfied with probability one. For the non-constant-sum generalization of the Colonel Blotto game examined, we find that there exist non-pathological parameter configurations with multiple, payoff inequivalent, equilibria. ∗Dan Kovenock, Economic Science Institute, Argyros School of Business and Economics, Chapman Uni- versity, One University Drive, Orange, CA 92866 USA t:714-628-7226 E-mail: [email protected] yBrian Roberson, Purdue University, Department of Economics, Krannert School of Management, 403 W. State Street, West Lafayette, IN 47907 USA t: 765-494-4531 E-mail: [email protected] (Correspondent) 1 1 Introduction The Colonel Blotto game is a two-player resource allocation game in which each player is endowed with a level of resources to allocate across a set of battlefields, within each battlefield the player that allocates the higher level of resources wins the battlefield, and each player's payoff is the sum of the valuations of the battlefields won. This simple game, that originates with Borel (1921), illustrates the fundamental strategic considerations that arise in multi- dimensional resource allocation competition such as: political campaign resource allocation, research and development competition where innovation involves obtaining a collection of interrelated patents, attack and defense of a collection of targets, etc.
    [Show full text]
  • Essays on Supermodular Games, Design, and Political Theory
    Selection, Learning, and Nomination: Essays on Supermodular Games, Design, and Political Theory Thesis by Laurent Mathevet In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena, California 2008 (Defended May 15th, 2008) ii c 2008 Laurent Mathevet All Rights Reserved iii For my parents, Denise and Ren´eMathevet iv Acknowledgements Many people have helped me along the way. Christelle has been a source of happiness, and without her uncompromising support and faith in me, I would have been miserable. My parents, to whom this dissertation is dedicated, have shown continual and unconditional support despite the distance. They are a constant source of inspiration. I also wish to thank my advisors, Federico Echenique and Matthew Jackson, for their help and encouragement. Federico has spent numerous hours advising me, meeting with me nearly every week since my second year as a graduate student. He has endeavored to extract the most out of me, discarding unpromising thoughts and results, reading my drafts countless times and demanding (countless!) rewrites. Most importantly, he found the right words in those difficult times of a PhD graduate student. Matt has also been a wonderful advisor, available, demanding, and encouraging. I have benefited greatly from his comments, which are the kind that shapes the core of a research project. Matt has funded me for several years, which allowed me to concentrate on research. I also thank him for his invitation to spend a term at Stanford to further my research. I am indebted to Preston McAfee, whose personality, charisma, and sharpness have made meetings with him among the most fruitful and enjoyable.
    [Show full text]
  • Game Theory for Signal Processing in Networks
    Game Theory for Signal Processing in Networks Giacomo Bacci, Samson Lasaulce, Walid Saad, and Luca Sanguinetti Abstract In this tutorial, the basics of game theory are introduced along with an overview of its most recent and emerging applications in signal processing. One of the main features of this contribution is to gather in a single paper some fundamental game-theoretic notions and tools which, over the past few years, have become widely spread over a large number of papers. In particular, both strategic-form and coalition-form games are described in details while the key connections and differences betweenthemareoutlined.Moreover,aparticularattention is also devoted to clarify the connections between strategic-form games and distributed optimization and learning algorithms. Beyond an introduction to the basic concepts andmainsolutionapproaches,severalcarefullydesigned examples are provided to allow a better understanding of how to apply the described tools. I. INTRODUCTION game theory (GT) is a branch of mathematics that enables the modeling and analysis of the interactions between several decision-makers (called players) who can have conflicting or common objectives. A game is a situation in which the benefit or cost achieved by each player from an interactive situation depends, not only on its own decisions, but also on those taken by the other players. For example, the time a car driver needs to get back home generally depends not only on the route he/she chooses but also on the decisions taken by the other drivers. Therefore, in a game, the actions and objectives of the players are tightly coupled.Untilveryrecently,GThas been used only marginally in signal processing (SP), with notable examples being some applications in robust detection and estimation [1] as well as watermarking [2] (in which the watermarking problem is seen as a game between the data embedder and the attacker).
    [Show full text]
  • Convergence to Approximate Nash Equilibria in Congestion Games†
    Convergence to Approximate Nash Equilibria in Congestion Games† Steve Chien‡ Alistair Sinclair§ Abstract We study the ability of decentralized, local dynamics in non-cooperative games to rapidly reach an approximate Nash equilibrium. For symmetric congestion games in which the edge delays satisfy a “bounded jump” condition, we show that convergence to an ε-Nash equilibrium occurs within a number of steps that is polynomial in the number of players and ε−1. This appears to be the first such result for a class of games that includes examples for which finding an exact Nash equilibrium is PLS-complete, and in which shortest paths to an exact equilibrium are exponentially long. We show moreover that rapid convergence holds even under only the apparently minimal assumption that no player is excluded from moving for arbitrarily many steps. We also prove that, in a generalized setting where players have different “tolerances” εi that specify their thresholds in the approximate Nash equilibrium, the number of moves made by a player before equilibrium is reached depends only on his associated εi, and not on those of the other players. Finally, we show that polynomial time convergence still holds even when a bounded number of edges are allowed to have arbitrary delay functions. 1 Introduction The emerging field of algorithmic game theory has led to a fundamental re-examination, from a computational perspective, of the classical concept of Nash equilibrium [20]. Much of this activity has focused on understanding the structure of Nash equilibria (as expressed, notably, in the “price of anarchy,” see e.g. [22, 25, 24]) and the computational complexity of finding them (see, e.g., [10, 7, 4]).
    [Show full text]