Chain equilibria in secure strategies
In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case...
Gespeichert in:
Veröffentlicht in: | Automation and remote control 2017-06, Vol.78 (6), p.1159-1172 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1172 |
---|---|
container_issue | 6 |
container_start_page | 1159 |
container_title | Automation and remote control |
container_volume | 78 |
creator | Iskakov, A. B. Iskakov, M. B. |
description | In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players
j
>
i
but ignores the threats of players
j
<
i
provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium. |
doi_str_mv | 10.1134/S0005117917060169 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1907343584</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1907343584</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-ce846bbd4030594ab72309bd16f62f836f7c61a7ab7c9d3d263d6c5a07a291743</originalsourceid><addsrcrecordid>eNp1kE9LxDAQxYMoWFc_gLeCeKzOZNqkPUrxHyx4UM8hTdM1y9ruJu3Bb29KPQjiaRje770ZHmOXCDeIlN--AkCBKCuUIABFdcQSFFBmBMSPWTLL2ayfsrMQtgCIwClh1_WHdn1qD5PbucY7ncYtWDN5m4bR69FunA3n7KTTu2AvfuaKvT_cv9VP2frl8bm-W2eGUIyZsWUumqbNgaCoct1ITlA1LYpO8K4k0UkjUMsomKqllgtqhSk0SM3j4zmt2NWSu_fDYbJhVNth8n08qbACSTkV5UzhQhk_hOBtp_befWr_pRDU3Ib600b08MUTIttvrP-V_K_pGy4PXq0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1907343584</pqid></control><display><type>article</type><title>Chain equilibria in secure strategies</title><source>SpringerLink Journals</source><creator>Iskakov, A. B. ; Iskakov, M. B.</creator><creatorcontrib>Iskakov, A. B. ; Iskakov, M. B.</creatorcontrib><description>In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players
j
>
i
but ignores the threats of players
j
<
i
provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium.</description><identifier>ISSN: 0005-1179</identifier><identifier>EISSN: 1608-3032</identifier><identifier>DOI: 10.1134/S0005117917060169</identifier><language>eng</language><publisher>Moscow: Pleiades Publishing</publisher><subject>Asymmetry ; Battlefields ; CAE) and Design ; Calculus of Variations and Optimal Control; Optimization ; Chains ; Competition ; Computer-Aided Engineering (CAD ; Control ; Economic models ; Game theory ; Mathematical Game Theory and Applications ; Mathematics ; Mathematics and Statistics ; Mechanical Engineering ; Mechatronics ; Players ; Robotics ; Security ; Systems Theory</subject><ispartof>Automation and remote control, 2017-06, Vol.78 (6), p.1159-1172</ispartof><rights>Pleiades Publishing, Ltd. 2017</rights><rights>Copyright Springer Science & Business Media 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c316t-ce846bbd4030594ab72309bd16f62f836f7c61a7ab7c9d3d263d6c5a07a291743</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1134/S0005117917060169$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1134/S0005117917060169$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Iskakov, A. B.</creatorcontrib><creatorcontrib>Iskakov, M. B.</creatorcontrib><title>Chain equilibria in secure strategies</title><title>Automation and remote control</title><addtitle>Autom Remote Control</addtitle><description>In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players
j
>
i
but ignores the threats of players
j
<
i
provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium.</description><subject>Asymmetry</subject><subject>Battlefields</subject><subject>CAE) and Design</subject><subject>Calculus of Variations and Optimal Control; Optimization</subject><subject>Chains</subject><subject>Competition</subject><subject>Computer-Aided Engineering (CAD</subject><subject>Control</subject><subject>Economic models</subject><subject>Game theory</subject><subject>Mathematical Game Theory and Applications</subject><subject>Mathematics</subject><subject>Mathematics and Statistics</subject><subject>Mechanical Engineering</subject><subject>Mechatronics</subject><subject>Players</subject><subject>Robotics</subject><subject>Security</subject><subject>Systems Theory</subject><issn>0005-1179</issn><issn>1608-3032</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kE9LxDAQxYMoWFc_gLeCeKzOZNqkPUrxHyx4UM8hTdM1y9ruJu3Bb29KPQjiaRje770ZHmOXCDeIlN--AkCBKCuUIABFdcQSFFBmBMSPWTLL2ayfsrMQtgCIwClh1_WHdn1qD5PbucY7ncYtWDN5m4bR69FunA3n7KTTu2AvfuaKvT_cv9VP2frl8bm-W2eGUIyZsWUumqbNgaCoct1ITlA1LYpO8K4k0UkjUMsomKqllgtqhSk0SM3j4zmt2NWSu_fDYbJhVNth8n08qbACSTkV5UzhQhk_hOBtp_befWr_pRDU3Ib600b08MUTIttvrP-V_K_pGy4PXq0</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Iskakov, A. B.</creator><creator>Iskakov, M. B.</creator><general>Pleiades Publishing</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20170601</creationdate><title>Chain equilibria in secure strategies</title><author>Iskakov, A. B. ; Iskakov, M. B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-ce846bbd4030594ab72309bd16f62f836f7c61a7ab7c9d3d263d6c5a07a291743</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Asymmetry</topic><topic>Battlefields</topic><topic>CAE) and Design</topic><topic>Calculus of Variations and Optimal Control; Optimization</topic><topic>Chains</topic><topic>Competition</topic><topic>Computer-Aided Engineering (CAD</topic><topic>Control</topic><topic>Economic models</topic><topic>Game theory</topic><topic>Mathematical Game Theory and Applications</topic><topic>Mathematics</topic><topic>Mathematics and Statistics</topic><topic>Mechanical Engineering</topic><topic>Mechatronics</topic><topic>Players</topic><topic>Robotics</topic><topic>Security</topic><topic>Systems Theory</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Iskakov, A. B.</creatorcontrib><creatorcontrib>Iskakov, M. B.</creatorcontrib><collection>CrossRef</collection><jtitle>Automation and remote control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Iskakov, A. B.</au><au>Iskakov, M. B.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Chain equilibria in secure strategies</atitle><jtitle>Automation and remote control</jtitle><stitle>Autom Remote Control</stitle><date>2017-06-01</date><risdate>2017</risdate><volume>78</volume><issue>6</issue><spage>1159</spage><epage>1172</epage><pages>1159-1172</pages><issn>0005-1179</issn><eissn>1608-3032</eissn><abstract>In this paper we introduce a modification of the concept of Equilibrium in Secure Strategies (EinSS), which takes into account the non-uniform attitudes of players to security in non-cooperative games. In particular, we examine an asymmetric attitude of players to mutual threats in the simplest case, when all players are strictly ordered by their relation to security. Namely, we assume that the players can be reindexed so that each player i in his behavior takes into account the threats posed by players
j
>
i
but ignores the threats of players
j
<
i
provided that these threats are effectively contained by some counterthreats. A corresponding equilibrium will be called a Chain EinSS. The conceptual meaning of this equilibrium is illustrated by two continuous games that have no pure Nash equilibrium or (conventional) EinSS. The Colonel Blotto two-player game (Borel 1953; Owen 1968) for two battlefields with different price always admits a Chain EinSS with intuitive interpretation. The product competition of many players on a segment (Eaton, Lipsey 1975; Shaked 1975) with the linear distribution of consumer preferences always admits a unique Chain EinSS solution (up to a permutation of players). Finally, we compare Chain EinSS with Stackelberg equilibrium.</abstract><cop>Moscow</cop><pub>Pleiades Publishing</pub><doi>10.1134/S0005117917060169</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0005-1179 |
ispartof | Automation and remote control, 2017-06, Vol.78 (6), p.1159-1172 |
issn | 0005-1179 1608-3032 |
language | eng |
recordid | cdi_proquest_journals_1907343584 |
source | SpringerLink Journals |
subjects | Asymmetry Battlefields CAE) and Design Calculus of Variations and Optimal Control Optimization Chains Competition Computer-Aided Engineering (CAD Control Economic models Game theory Mathematical Game Theory and Applications Mathematics Mathematics and Statistics Mechanical Engineering Mechatronics Players Robotics Security Systems Theory |
title | Chain equilibria in secure strategies |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T01%3A03%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Chain%20equilibria%20in%20secure%20strategies&rft.jtitle=Automation%20and%20remote%20control&rft.au=Iskakov,%20A.%20B.&rft.date=2017-06-01&rft.volume=78&rft.issue=6&rft.spage=1159&rft.epage=1172&rft.pages=1159-1172&rft.issn=0005-1179&rft.eissn=1608-3032&rft_id=info:doi/10.1134/S0005117917060169&rft_dat=%3Cproquest_cross%3E1907343584%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1907343584&rft_id=info:pmid/&rfr_iscdi=true |